Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2011-2720

Summary
Assigner-redhat
Assigner Org ID-53f830b8-0a3f-465b-8143-3b8a9948e749
Published At-05 Aug, 2011 | 21:00
Updated At-06 Aug, 2024 | 23:08
Rejected At-
Credits

The autocompletion functionality in GLPI before 0.80.2 does not blacklist certain username and password fields, which allows remote attackers to obtain sensitive information via a crafted POST request.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:redhat
Assigner Org ID:53f830b8-0a3f-465b-8143-3b8a9948e749
Published At:05 Aug, 2011 | 21:00
Updated At:06 Aug, 2024 | 23:08
Rejected At:
▼CVE Numbering Authority (CNA)

The autocompletion functionality in GLPI before 0.80.2 does not blacklist certain username and password fields, which allows remote attackers to obtain sensitive information via a crafted POST request.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://forge.indepnet.net/issues/3017
x_refsource_CONFIRM
https://bugzilla.redhat.com/show_bug.cgi?id=726185
x_refsource_CONFIRM
https://forge.indepnet.net/projects/glpi/repository/revisions/14956
x_refsource_CONFIRM
http://secunia.com/advisories/45542
third-party-advisory
x_refsource_SECUNIA
https://forge.indepnet.net/projects/glpi/repository/revisions/14951
x_refsource_CONFIRM
http://www.openwall.com/lists/oss-security/2011/07/26/11
mailing-list
x_refsource_MLIST
https://forge.indepnet.net/projects/glpi/repository/revisions/14957
x_refsource_CONFIRM
http://www.openwall.com/lists/oss-security/2011/07/25/7
mailing-list
x_refsource_MLIST
http://www.mandriva.com/security/advisories?name=MDVSA-2012:014
vendor-advisory
x_refsource_MANDRIVA
https://forge.indepnet.net/projects/glpi/repository/revisions/14958
x_refsource_CONFIRM
http://www.securityfocus.com/bid/48884
vdb-entry
x_refsource_BID
https://forge.indepnet.net/projects/glpi/repository/revisions/14955
x_refsource_CONFIRM
https://forge.indepnet.net/projects/glpi/repository/revisions/14966
x_refsource_CONFIRM
http://www.glpi-project.org/spip.php?page=annonce&id_breve=237&lang=en
x_refsource_CONFIRM
http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063408.html
vendor-advisory
x_refsource_FEDORA
https://forge.indepnet.net/projects/glpi/repository/revisions/14960
x_refsource_CONFIRM
https://forge.indepnet.net/projects/glpi/repository/revisions/14954
x_refsource_CONFIRM
http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063679.html
vendor-advisory
x_refsource_FEDORA
http://secunia.com/advisories/45366
third-party-advisory
x_refsource_SECUNIA
https://forge.indepnet.net/projects/glpi/repository/revisions/14952
x_refsource_CONFIRM
https://forge.indepnet.net/projects/glpi/versions/605
x_refsource_CONFIRM
Hyperlink: https://forge.indepnet.net/issues/3017
Resource:
x_refsource_CONFIRM
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=726185
Resource:
x_refsource_CONFIRM
Hyperlink: https://forge.indepnet.net/projects/glpi/repository/revisions/14956
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/45542
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://forge.indepnet.net/projects/glpi/repository/revisions/14951
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.openwall.com/lists/oss-security/2011/07/26/11
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: https://forge.indepnet.net/projects/glpi/repository/revisions/14957
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.openwall.com/lists/oss-security/2011/07/25/7
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2012:014
Resource:
vendor-advisory
x_refsource_MANDRIVA
Hyperlink: https://forge.indepnet.net/projects/glpi/repository/revisions/14958
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.securityfocus.com/bid/48884
Resource:
vdb-entry
x_refsource_BID
Hyperlink: https://forge.indepnet.net/projects/glpi/repository/revisions/14955
Resource:
x_refsource_CONFIRM
Hyperlink: https://forge.indepnet.net/projects/glpi/repository/revisions/14966
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.glpi-project.org/spip.php?page=annonce&id_breve=237&lang=en
Resource:
x_refsource_CONFIRM
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063408.html
Resource:
vendor-advisory
x_refsource_FEDORA
Hyperlink: https://forge.indepnet.net/projects/glpi/repository/revisions/14960
Resource:
x_refsource_CONFIRM
Hyperlink: https://forge.indepnet.net/projects/glpi/repository/revisions/14954
Resource:
x_refsource_CONFIRM
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063679.html
Resource:
vendor-advisory
x_refsource_FEDORA
Hyperlink: http://secunia.com/advisories/45366
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://forge.indepnet.net/projects/glpi/repository/revisions/14952
Resource:
x_refsource_CONFIRM
Hyperlink: https://forge.indepnet.net/projects/glpi/versions/605
Resource:
x_refsource_CONFIRM
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://forge.indepnet.net/issues/3017
x_refsource_CONFIRM
x_transferred
https://bugzilla.redhat.com/show_bug.cgi?id=726185
x_refsource_CONFIRM
x_transferred
https://forge.indepnet.net/projects/glpi/repository/revisions/14956
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/45542
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://forge.indepnet.net/projects/glpi/repository/revisions/14951
x_refsource_CONFIRM
x_transferred
http://www.openwall.com/lists/oss-security/2011/07/26/11
mailing-list
x_refsource_MLIST
x_transferred
https://forge.indepnet.net/projects/glpi/repository/revisions/14957
x_refsource_CONFIRM
x_transferred
http://www.openwall.com/lists/oss-security/2011/07/25/7
mailing-list
x_refsource_MLIST
x_transferred
http://www.mandriva.com/security/advisories?name=MDVSA-2012:014
vendor-advisory
x_refsource_MANDRIVA
x_transferred
https://forge.indepnet.net/projects/glpi/repository/revisions/14958
x_refsource_CONFIRM
x_transferred
http://www.securityfocus.com/bid/48884
vdb-entry
x_refsource_BID
x_transferred
https://forge.indepnet.net/projects/glpi/repository/revisions/14955
x_refsource_CONFIRM
x_transferred
https://forge.indepnet.net/projects/glpi/repository/revisions/14966
x_refsource_CONFIRM
x_transferred
http://www.glpi-project.org/spip.php?page=annonce&id_breve=237&lang=en
x_refsource_CONFIRM
x_transferred
http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063408.html
vendor-advisory
x_refsource_FEDORA
x_transferred
https://forge.indepnet.net/projects/glpi/repository/revisions/14960
x_refsource_CONFIRM
x_transferred
https://forge.indepnet.net/projects/glpi/repository/revisions/14954
x_refsource_CONFIRM
x_transferred
http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063679.html
vendor-advisory
x_refsource_FEDORA
x_transferred
http://secunia.com/advisories/45366
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://forge.indepnet.net/projects/glpi/repository/revisions/14952
x_refsource_CONFIRM
x_transferred
https://forge.indepnet.net/projects/glpi/versions/605
x_refsource_CONFIRM
x_transferred
Hyperlink: https://forge.indepnet.net/issues/3017
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=726185
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://forge.indepnet.net/projects/glpi/repository/revisions/14956
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/45542
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://forge.indepnet.net/projects/glpi/repository/revisions/14951
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.openwall.com/lists/oss-security/2011/07/26/11
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: https://forge.indepnet.net/projects/glpi/repository/revisions/14957
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.openwall.com/lists/oss-security/2011/07/25/7
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2012:014
Resource:
vendor-advisory
x_refsource_MANDRIVA
x_transferred
Hyperlink: https://forge.indepnet.net/projects/glpi/repository/revisions/14958
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.securityfocus.com/bid/48884
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: https://forge.indepnet.net/projects/glpi/repository/revisions/14955
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://forge.indepnet.net/projects/glpi/repository/revisions/14966
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.glpi-project.org/spip.php?page=annonce&id_breve=237&lang=en
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063408.html
Resource:
vendor-advisory
x_refsource_FEDORA
x_transferred
Hyperlink: https://forge.indepnet.net/projects/glpi/repository/revisions/14960
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://forge.indepnet.net/projects/glpi/repository/revisions/14954
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063679.html
Resource:
vendor-advisory
x_refsource_FEDORA
x_transferred
Hyperlink: http://secunia.com/advisories/45366
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://forge.indepnet.net/projects/glpi/repository/revisions/14952
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://forge.indepnet.net/projects/glpi/versions/605
Resource:
x_refsource_CONFIRM
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secalert@redhat.com
Published At:05 Aug, 2011 | 21:55
Updated At:11 Apr, 2025 | 00:51

The autocompletion functionality in GLPI before 0.80.2 does not blacklist certain username and password fields, which allows remote attackers to obtain sensitive information via a crafted POST request.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.05.0MEDIUM
AV:N/AC:L/Au:N/C:P/I:N/A:N
Type: Primary
Version: 2.0
Base score: 5.0
Base severity: MEDIUM
Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:N
CPE Matches

GLPI Project
glpi-project
>>glpi>>Versions up to 0.80.1(inclusive)
cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.5
cpe:2.3:a:glpi-project:glpi:0.5:*:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.5
cpe:2.3:a:glpi-project:glpi:0.5:rc1:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.5
cpe:2.3:a:glpi-project:glpi:0.5:rc2:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.6
cpe:2.3:a:glpi-project:glpi:0.6:*:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.6
cpe:2.3:a:glpi-project:glpi:0.6:rc1:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.6
cpe:2.3:a:glpi-project:glpi:0.6:rc2:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.6
cpe:2.3:a:glpi-project:glpi:0.6:rc3:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.42
cpe:2.3:a:glpi-project:glpi:0.42:*:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.51
cpe:2.3:a:glpi-project:glpi:0.51:*:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.51a
cpe:2.3:a:glpi-project:glpi:0.51a:*:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.65
cpe:2.3:a:glpi-project:glpi:0.65:*:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.65
cpe:2.3:a:glpi-project:glpi:0.65:rc1:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.65
cpe:2.3:a:glpi-project:glpi:0.65:rc2:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.68
cpe:2.3:a:glpi-project:glpi:0.68:*:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.68
cpe:2.3:a:glpi-project:glpi:0.68:rc1:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.68
cpe:2.3:a:glpi-project:glpi:0.68:rc2:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.68
cpe:2.3:a:glpi-project:glpi:0.68:rc3:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.68.1
cpe:2.3:a:glpi-project:glpi:0.68.1:*:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.68.2
cpe:2.3:a:glpi-project:glpi:0.68.2:*:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.68.3
cpe:2.3:a:glpi-project:glpi:0.68.3:*:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.70
cpe:2.3:a:glpi-project:glpi:0.70:*:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.70
cpe:2.3:a:glpi-project:glpi:0.70:rc1:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.70
cpe:2.3:a:glpi-project:glpi:0.70:rc2:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.70
cpe:2.3:a:glpi-project:glpi:0.70:rc3:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.70.1
cpe:2.3:a:glpi-project:glpi:0.70.1:*:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.70.2
cpe:2.3:a:glpi-project:glpi:0.70.2:*:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.71
cpe:2.3:a:glpi-project:glpi:0.71:*:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.71.1
cpe:2.3:a:glpi-project:glpi:0.71.1:*:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.71.1
cpe:2.3:a:glpi-project:glpi:0.71.1:rc1:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.71.1
cpe:2.3:a:glpi-project:glpi:0.71.1:rc2:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.71.1
cpe:2.3:a:glpi-project:glpi:0.71.1:rc3:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.71.2
cpe:2.3:a:glpi-project:glpi:0.71.2:*:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.71.3
cpe:2.3:a:glpi-project:glpi:0.71.3:*:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.71.4
cpe:2.3:a:glpi-project:glpi:0.71.4:*:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.71.5
cpe:2.3:a:glpi-project:glpi:0.71.5:*:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.71.6
cpe:2.3:a:glpi-project:glpi:0.71.6:*:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.72
cpe:2.3:a:glpi-project:glpi:0.72:*:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.72
cpe:2.3:a:glpi-project:glpi:0.72:rc1:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.72
cpe:2.3:a:glpi-project:glpi:0.72:rc2:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.72
cpe:2.3:a:glpi-project:glpi:0.72:rc3:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.72.1
cpe:2.3:a:glpi-project:glpi:0.72.1:*:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.72.2
cpe:2.3:a:glpi-project:glpi:0.72.2:*:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.72.3
cpe:2.3:a:glpi-project:glpi:0.72.3:*:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.72.4
cpe:2.3:a:glpi-project:glpi:0.72.4:*:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.78
cpe:2.3:a:glpi-project:glpi:0.78:*:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.78.1
cpe:2.3:a:glpi-project:glpi:0.78.1:*:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.78.2
cpe:2.3:a:glpi-project:glpi:0.78.2:*:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.78.3
cpe:2.3:a:glpi-project:glpi:0.78.3:*:*:*:*:*:*:*
GLPI Project
glpi-project
>>glpi>>0.78.4
cpe:2.3:a:glpi-project:glpi:0.78.4:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-200Primarynvd@nist.gov
CWE ID: CWE-200
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063408.htmlsecalert@redhat.com
N/A
http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063679.htmlsecalert@redhat.com
N/A
http://secunia.com/advisories/45366secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/45542secalert@redhat.com
N/A
http://www.glpi-project.org/spip.php?page=annonce&id_breve=237&lang=ensecalert@redhat.com
N/A
http://www.mandriva.com/security/advisories?name=MDVSA-2012:014secalert@redhat.com
N/A
http://www.openwall.com/lists/oss-security/2011/07/25/7secalert@redhat.com
Patch
http://www.openwall.com/lists/oss-security/2011/07/26/11secalert@redhat.com
Patch
http://www.securityfocus.com/bid/48884secalert@redhat.com
N/A
https://bugzilla.redhat.com/show_bug.cgi?id=726185secalert@redhat.com
Patch
https://forge.indepnet.net/issues/3017secalert@redhat.com
N/A
https://forge.indepnet.net/projects/glpi/repository/revisions/14951secalert@redhat.com
Patch
https://forge.indepnet.net/projects/glpi/repository/revisions/14952secalert@redhat.com
Patch
https://forge.indepnet.net/projects/glpi/repository/revisions/14954secalert@redhat.com
Patch
https://forge.indepnet.net/projects/glpi/repository/revisions/14955secalert@redhat.com
Patch
https://forge.indepnet.net/projects/glpi/repository/revisions/14956secalert@redhat.com
Patch
https://forge.indepnet.net/projects/glpi/repository/revisions/14957secalert@redhat.com
Patch
https://forge.indepnet.net/projects/glpi/repository/revisions/14958secalert@redhat.com
Patch
https://forge.indepnet.net/projects/glpi/repository/revisions/14960secalert@redhat.com
Patch
https://forge.indepnet.net/projects/glpi/repository/revisions/14966secalert@redhat.com
Patch
https://forge.indepnet.net/projects/glpi/versions/605secalert@redhat.com
N/A
http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063408.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063679.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/45366af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/45542af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.glpi-project.org/spip.php?page=annonce&id_breve=237&lang=enaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.mandriva.com/security/advisories?name=MDVSA-2012:014af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.openwall.com/lists/oss-security/2011/07/25/7af854a3a-2127-422b-91ae-364da2661108
Patch
http://www.openwall.com/lists/oss-security/2011/07/26/11af854a3a-2127-422b-91ae-364da2661108
Patch
http://www.securityfocus.com/bid/48884af854a3a-2127-422b-91ae-364da2661108
N/A
https://bugzilla.redhat.com/show_bug.cgi?id=726185af854a3a-2127-422b-91ae-364da2661108
Patch
https://forge.indepnet.net/issues/3017af854a3a-2127-422b-91ae-364da2661108
N/A
https://forge.indepnet.net/projects/glpi/repository/revisions/14951af854a3a-2127-422b-91ae-364da2661108
Patch
https://forge.indepnet.net/projects/glpi/repository/revisions/14952af854a3a-2127-422b-91ae-364da2661108
Patch
https://forge.indepnet.net/projects/glpi/repository/revisions/14954af854a3a-2127-422b-91ae-364da2661108
Patch
https://forge.indepnet.net/projects/glpi/repository/revisions/14955af854a3a-2127-422b-91ae-364da2661108
Patch
https://forge.indepnet.net/projects/glpi/repository/revisions/14956af854a3a-2127-422b-91ae-364da2661108
Patch
https://forge.indepnet.net/projects/glpi/repository/revisions/14957af854a3a-2127-422b-91ae-364da2661108
Patch
https://forge.indepnet.net/projects/glpi/repository/revisions/14958af854a3a-2127-422b-91ae-364da2661108
Patch
https://forge.indepnet.net/projects/glpi/repository/revisions/14960af854a3a-2127-422b-91ae-364da2661108
Patch
https://forge.indepnet.net/projects/glpi/repository/revisions/14966af854a3a-2127-422b-91ae-364da2661108
Patch
https://forge.indepnet.net/projects/glpi/versions/605af854a3a-2127-422b-91ae-364da2661108
N/A
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063408.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063679.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/45366
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/45542
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.glpi-project.org/spip.php?page=annonce&id_breve=237&lang=en
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2012:014
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.openwall.com/lists/oss-security/2011/07/25/7
Source: secalert@redhat.com
Resource:
Patch
Hyperlink: http://www.openwall.com/lists/oss-security/2011/07/26/11
Source: secalert@redhat.com
Resource:
Patch
Hyperlink: http://www.securityfocus.com/bid/48884
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=726185
Source: secalert@redhat.com
Resource:
Patch
Hyperlink: https://forge.indepnet.net/issues/3017
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://forge.indepnet.net/projects/glpi/repository/revisions/14951
Source: secalert@redhat.com
Resource:
Patch
Hyperlink: https://forge.indepnet.net/projects/glpi/repository/revisions/14952
Source: secalert@redhat.com
Resource:
Patch
Hyperlink: https://forge.indepnet.net/projects/glpi/repository/revisions/14954
Source: secalert@redhat.com
Resource:
Patch
Hyperlink: https://forge.indepnet.net/projects/glpi/repository/revisions/14955
Source: secalert@redhat.com
Resource:
Patch
Hyperlink: https://forge.indepnet.net/projects/glpi/repository/revisions/14956
Source: secalert@redhat.com
Resource:
Patch
Hyperlink: https://forge.indepnet.net/projects/glpi/repository/revisions/14957
Source: secalert@redhat.com
Resource:
Patch
Hyperlink: https://forge.indepnet.net/projects/glpi/repository/revisions/14958
Source: secalert@redhat.com
Resource:
Patch
Hyperlink: https://forge.indepnet.net/projects/glpi/repository/revisions/14960
Source: secalert@redhat.com
Resource:
Patch
Hyperlink: https://forge.indepnet.net/projects/glpi/repository/revisions/14966
Source: secalert@redhat.com
Resource:
Patch
Hyperlink: https://forge.indepnet.net/projects/glpi/versions/605
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063408.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063679.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/45366
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/45542
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.glpi-project.org/spip.php?page=annonce&id_breve=237&lang=en
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2012:014
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.openwall.com/lists/oss-security/2011/07/25/7
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: http://www.openwall.com/lists/oss-security/2011/07/26/11
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: http://www.securityfocus.com/bid/48884
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=726185
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://forge.indepnet.net/issues/3017
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://forge.indepnet.net/projects/glpi/repository/revisions/14951
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://forge.indepnet.net/projects/glpi/repository/revisions/14952
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://forge.indepnet.net/projects/glpi/repository/revisions/14954
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://forge.indepnet.net/projects/glpi/repository/revisions/14955
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://forge.indepnet.net/projects/glpi/repository/revisions/14956
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://forge.indepnet.net/projects/glpi/repository/revisions/14957
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://forge.indepnet.net/projects/glpi/repository/revisions/14958
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://forge.indepnet.net/projects/glpi/repository/revisions/14960
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://forge.indepnet.net/projects/glpi/repository/revisions/14966
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://forge.indepnet.net/projects/glpi/versions/605
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

2741Records found

CVE-2015-6759
Matching Score-4
Assigner-Chrome
ShareView Details
Matching Score-4
Assigner-Chrome
CVSS Score-5||MEDIUM
EPSS-0.80% / 73.15%
||
7 Day CHG~0.00%
Published-15 Oct, 2015 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The shouldTreatAsUniqueOrigin function in platform/weborigin/SecurityOrigin.cpp in Blink, as used in Google Chrome before 46.0.2490.71, does not ensure that the origin of a LocalStorage resource is considered unique, which allows remote attackers to obtain sensitive information via vectors involving a blob: URL.

Action-Not Available
Vendor-n/aGoogle LLC
Product-chromen/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2014-4781
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-5||MEDIUM
EPSS-0.22% / 45.10%
||
7 Day CHG~0.00%
Published-13 Feb, 2015 | 02:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The alert module in IBM InfoSphere BigInsights 2.1.2 and 3.x before 3.0.0.2 allows remote attackers to obtain sensitive Alert management-services API information via a network-tracing attack.

Action-Not Available
Vendor-n/aIBM Corporation
Product-infosphere_biginsightsn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2010-1138
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-0.77% / 72.52%
||
7 Day CHG~0.00%
Published-12 Apr, 2010 | 18:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The virtual networking stack in VMware Workstation 7.0 before 7.0.1 build 227600, VMware Workstation 6.5.x before 6.5.4 build 246459 on Windows, VMware Player 3.0 before 3.0.1 build 227600, VMware Player 2.5.x before 2.5.4 build 246459 on Windows, VMware ACE 2.6 before 2.6.1 build 227600 and 2.5.x before 2.5.4 build 246459, VMware Server 2.x, and VMware Fusion 3.0 before 3.0.1 build 232708 and 2.x before 2.0.7 build 246742 allows remote attackers to obtain sensitive information from memory on the host OS by examining received network packets, related to interaction between the guest OS and the host vmware-vmx process.

Action-Not Available
Vendor-n/aVMware (Broadcom Inc.)Microsoft Corporation
Product-workstationserverwindowsfusionaceplayern/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2015-5959
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-1.46% / 80.05%
||
7 Day CHG~0.00%
Published-06 Sep, 2017 | 21:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Froxlor before 0.9.33.2 with the default configuration/setup might allow remote attackers to obtain the database password by reading /logs/sql-error.log.

Action-Not Available
Vendor-froxlorn/a
Product-froxlorn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2015-6629
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-5||MEDIUM
EPSS-0.10% / 28.38%
||
7 Day CHG~0.00%
Published-08 Dec, 2015 | 23:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Wi-Fi in Android 5.x before 5.1.1 LMY48Z allows attackers to obtain sensitive information via unspecified vectors, as demonstrated by obtaining Signature or SignatureOrSystem access, aka internal bug 22667667.

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2015-6611
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-5||MEDIUM
EPSS-0.12% / 31.26%
||
7 Day CHG~0.00%
Published-03 Nov, 2015 | 11:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

mediaserver in Android before 5.1.1 LMY48X and 6.0 before 2015-11-01 allows remote attackers to obtain sensitive information, and consequently bypass an unspecified protection mechanism, via unknown vectors, aka internal bugs 23905951, 23912202, 23953967, 23696300, 23600291, 23756261, 23541506, 23284974, 23542351, and 23542352, a different vulnerability than CVE-2015-8074.

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2015-6276
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-5||MEDIUM
EPSS-0.17% / 38.37%
||
7 Day CHG~0.00%
Published-05 Sep, 2015 | 01:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cisco TelePresence IX5000 8.0.3 stores a private key associated with an X.509 certificate under the web root with insufficient access control, which allows remote attackers to obtain cleartext versions of HTTPS traffic or spoof devices via a direct request to the certificate directory, aka Bug ID CSCuu63501.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-telepresence_system_software_ixn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2010-0551
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-0.39% / 59.19%
||
7 Day CHG~0.00%
Published-04 Feb, 2010 | 19:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

HTTP authentication implementation in Geo++ GNCASTER 1.4.0.7 and earlier allows remote attackers to read authentication headers of other users via a large request with an incorrect authentication attempt, which includes sensitive memory in the response. NOTE: this is referred to as a "memory leak" by some sources, but is better characterized as "memory disclosure."

Action-Not Available
Vendor-geoppn/a
Product-geo\+\+_gncastern/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2018-18648
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.11% / 29.38%
||
7 Day CHG~0.00%
Published-04 Dec, 2018 | 23:00
Updated-05 Aug, 2024 | 11:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in GitLab Community and Enterprise Edition before 11.2.7, 11.3.x before 11.3.8, and 11.4.x before 11.4.3. It has Information Exposure Through an Error Message.

Action-Not Available
Vendor-n/aGitLab Inc.
Product-gitlabn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2010-0549
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-0.35% / 56.45%
||
7 Day CHG~0.00%
Published-04 Feb, 2010 | 19:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in the Network Controller in Xerox WorkCentre 6400 System Software 060.070.109.11407 through 060.070.109.29510, and Net Controller 060.079.11410 through 060.079.29310, allows remote attackers to access "directory structure" via a crafted PostScript file, aka "Unauthorized Directory Structure Access Vulnerability."

Action-Not Available
Vendor-n/aXerox Corporation
Product-workcentre_6400_net_controllerworkcentre_6400_system_softwaren/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2015-5831
Matching Score-4
Assigner-Apple Inc.
ShareView Details
Matching Score-4
Assigner-Apple Inc.
CVSS Score-5||MEDIUM
EPSS-0.52% / 66.00%
||
7 Day CHG~0.00%
Published-18 Sep, 2015 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NetworkExtension in the kernel in Apple iOS before 9 does not properly initialize an unspecified data structure, which allows attackers to obtain sensitive memory-layout information via a crafted app.

Action-Not Available
Vendor-n/aApple Inc.
Product-iphone_osmac_os_xn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2015-6135
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-5||MEDIUM
EPSS-9.83% / 92.68%
||
7 Day CHG~0.00%
Published-09 Dec, 2015 | 11:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Microsoft (1) VBScript 5.7 and 5.8 and (2) JScript 5.7 and 5.8 engines, as used in Internet Explorer 8 through 11 and other products, allow remote attackers to obtain sensitive information from process memory via a crafted web site, aka "Scripting Engine Information Disclosure Vulnerability."

Action-Not Available
Vendor-n/aMicrosoft Corporation
Product-internet_explorervbscriptjscriptn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2010-0670
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-0.26% / 48.92%
||
7 Day CHG~0.00%
Published-22 Feb, 2010 | 19:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in the IP-Tech JQuarks (com_jquarks) Component before 0.2.4 for Joomla! allows attackers to obtain the installation path for Joomla! via unknown vectors.

Action-Not Available
Vendor-iptechinsiden/aJoomla!
Product-joomla\!com_jquarksn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2015-5738
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.51% / 65.21%
||
7 Day CHG~0.00%
Published-26 Jul, 2016 | 17:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The RSA-CRT implementation in the Cavium Software Development Kit (SDK) 2.x, when used on OCTEON II CN6xxx Hardware on Linux to support TLS with Perfect Forward Secrecy (PFS), makes it easier for remote attackers to obtain private RSA keys by conducting a Lenstra side-channel attack.

Action-Not Available
Vendor-marvelln/aF5, Inc.
Product-traffix_signaling_delivery_controllerocteon_ii_cn6000software_development_kitocteon_ii_cn6010octeon_ii_cn6020n/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2010-0563
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-0.45% / 62.67%
||
7 Day CHG~0.00%
Published-08 Feb, 2010 | 21:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Single Sign-on (SSO) functionality in IBM WebSphere Application Server (WAS) 7.0.0.0 through 7.0.0.8 does not recognize the Requires SSL configuration option, which might allow remote attackers to obtain sensitive information by sniffing network sessions that were expected to be encrypted.

Action-Not Available
Vendor-n/aIBM Corporation
Product-websphere_application_servern/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2009-4254
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-0.25% / 48.20%
||
7 Day CHG~0.00%
Published-10 Dec, 2009 | 01:00
Updated-07 Aug, 2024 | 06:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

PowerPhlogger 2.2.5 allows remote attackers to obtain sensitive information via a direct request to (1) edCss.inc.php, (2) foot.inc.php, (3) get_csscolors.inc.php, (4) head.inc.php, (5) head_stuff.inc.php, (6) loglist.inc.php, and (7) pphlogger_send.inc.php in include/, which reveals the installation path in an error message.

Action-Not Available
Vendor-phpeen/a
Product-pphloggern/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2015-5730
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-10.12% / 92.81%
||
7 Day CHG~0.00%
Published-09 Nov, 2015 | 11:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The sanitize_widget_instance function in wp-includes/class-wp-customize-widgets.php in WordPress before 4.2.4 does not use a constant-time comparison for widgets, which allows remote attackers to conduct a timing side-channel attack by measuring the delay before inequality is calculated.

Action-Not Available
Vendor-n/aWordPress.org
Product-wordpressn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2015-6411
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-5||MEDIUM
EPSS-0.25% / 48.20%
||
7 Day CHG~0.00%
Published-15 Dec, 2015 | 02:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cisco FirePOWER Management Center 5.4.1.3, 6.0.0, and 6.0.1 provides verbose responses to requests for help files, which allows remote attackers to obtain potentially sensitive version information by reading an unspecified field, aka Bug ID CSCux37061.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-secure_firewall_management_centern/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2014-4821
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-5||MEDIUM
EPSS-0.32% / 54.58%
||
7 Day CHG~0.00%
Published-28 Oct, 2014 | 19:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM WebSphere Portal 6.1.0 through 6.1.0.6 CF27, 6.1.5 through 6.1.5.3 CF27, 7.0 through 7.0.0.2 CF28, 8.0 through 8.0.0.1 CF14, and 8.5.0 before CF03 provides different web-server error codes depending on whether a requested file exists, which allows remote attackers to determine the validity of filenames via a series of requests.

Action-Not Available
Vendor-n/aIBM Corporation
Product-websphere_portaln/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2018-18205
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.89% / 74.65%
||
7 Day CHG~0.00%
Published-15 Mar, 2019 | 20:00
Updated-05 Aug, 2024 | 11:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Topvision CC8800 CMTS C-E devices allow remote attackers to obtain sensitive information via a direct request for /WebContent/startup.tar.gz with userName=admin in a cookie.

Action-Not Available
Vendor-top-visionn/a
Product-cc8800ce_firmwarecc8800cen/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2010-0463
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-0.26% / 49.13%
||
7 Day CHG~0.00%
Published-29 Jan, 2010 | 18:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Horde IMP 4.3.6 and earlier does not request that the web browser avoid DNS prefetching of domain names contained in e-mail messages, which makes it easier for remote attackers to determine the network location of the webmail user by logging DNS requests.

Action-Not Available
Vendor-n/aHorde LLC
Product-impn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2015-5827
Matching Score-4
Assigner-Apple Inc.
ShareView Details
Matching Score-4
Assigner-Apple Inc.
CVSS Score-5||MEDIUM
EPSS-0.44% / 62.31%
||
7 Day CHG~0.00%
Published-18 Sep, 2015 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

WebKit in Apple iOS before 9 allows remote attackers to bypass the Same Origin Policy and obtain an object reference via vectors involving a (1) custom event, (2) message event, or (3) pop state event.

Action-Not Available
Vendor-n/aApple Inc.
Product-safariiphone_osn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2015-6485
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-5.3||MEDIUM
EPSS-0.42% / 60.91%
||
7 Day CHG~0.00%
Published-12 Mar, 2016 | 02:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Schneider Electric Telvent Sage 2300 RTUs with firmware before C3413-500-S01, and LANDAC II-2, Sage 1410, Sage 1430, Sage 1450, Sage 2400, and Sage 3030M RTUs with firmware before C3414-500-S02J2, allow remote attackers to obtain sensitive information from device memory by reading a padding field of an Ethernet packet.

Action-Not Available
Vendor-n/aSchneider Electric SE
Product-sage_landac_ii-2sage_1410sage_3030msage_2300sage_1450sage_2400sage_1430telvent_rtu_firmwaren/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2009-5045
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-1.87% / 82.37%
||
7 Day CHG~0.00%
Published-06 Nov, 2019 | 19:51
Updated-07 Aug, 2024 | 07:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dump Servlet information leak in jetty before 6.1.22.

Action-Not Available
Vendor-n/aDebian GNU/LinuxEclipse Foundation AISBL
Product-debian_linuxjettyn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2019-13557
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-5.3||MEDIUM
EPSS-0.17% / 38.40%
||
7 Day CHG~0.00%
Published-08 Nov, 2019 | 17:26
Updated-04 Aug, 2024 | 23:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Tasy EMR, Tasy WebPortal Versions 3.02.1757 and prior, there is an information exposure vulnerability which may allow a remote attacker to access system and configuration information.

Action-Not Available
Vendor-n/aPhilips
Product-tasy_emrtasy_webportalTasy EMR
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2018-19226
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5.3||MEDIUM
EPSS-0.24% / 47.61%
||
7 Day CHG~0.00%
Published-12 Nov, 2018 | 20:00
Updated-17 Sep, 2024 | 03:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in LAOBANCMS 2.0. It allows remote attackers to list .txt files via a direct request for the /data/0/admin.txt URI.

Action-Not Available
Vendor-laobancmsn/a
Product-laobancmsn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2010-0660
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-0.18% / 39.53%
||
7 Day CHG~0.00%
Published-18 Feb, 2010 | 17:19
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Google Chrome before 4.0.249.78 sends an https URL in the Referer header of an http request in certain circumstances involving https to http redirection, which allows remote HTTP servers to obtain potentially sensitive information via standard HTTP logging.

Action-Not Available
Vendor-n/aGoogle LLC
Product-chromen/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2010-0667
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-0.77% / 72.47%
||
7 Day CHG~0.00%
Published-26 Feb, 2010 | 19:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

MoinMoin 1.9 before 1.9.1 does not perform the expected clearing of the sys.argv array in situations where the GATEWAY_INTERFACE environment variable is set, which allows remote attackers to obtain sensitive information via unspecified vectors.

Action-Not Available
Vendor-moinmon/a
Product-moinmoinn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2018-16948
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.38% / 58.37%
||
7 Day CHG~0.00%
Published-12 Sep, 2018 | 01:00
Updated-05 Aug, 2024 | 10:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in OpenAFS before 1.6.23 and 1.8.x before 1.8.2. Several RPC server routines did not fully initialize their output variables before returning, leaking memory contents from both the stack and the heap. Because the OpenAFS cache manager functions as an Rx server for the AFSCB service, clients are also susceptible to information leakage. For example, RXAFSCB_TellMeAboutYourself leaks kernel memory and KAM_ListEntry leaks kaserver memory.

Action-Not Available
Vendor-openafsn/aDebian GNU/Linux
Product-openafsdebian_linuxn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2015-6469
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-5||MEDIUM
EPSS-0.36% / 57.41%
||
7 Day CHG~0.00%
Published-25 Sep, 2015 | 01:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The interpreter in IBC Solar ServeMaster TLP+ and Danfoss TLX Pro+ allows remote attackers to discover script source code via unspecified vectors.

Action-Not Available
Vendor-ibc_solarn/a
Product-danfoss_tlx_pro\+servemaster_tlp\+n/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2010-0642
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-1.50% / 80.37%
||
7 Day CHG~0.00%
Published-17 Feb, 2010 | 18:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cisco Collaboration Server (CCS) 5 allows remote attackers to read the source code of JHTML files via URL encoded characters in the filename extension, as demonstrated by (1) changing .jhtml to %2Ejhtml, (2) changing .jhtml to .jhtm%6C, (3) appending %00 after .jhtml, and (4) appending %c0%80 after .jhtml, related to the (a) doc/docindex.jhtml, (b) browserId/wizardForm.jhtml, (c) webline/html/forms/callback.jhtml, (d) webline/html/forms/callbackICM.jhtml, (e) webline/html/agent/AgentFrame.jhtml, (f) webline/html/agent/default/badlogin.jhtml, (g) callme/callForm.jhtml, (h) webline/html/multichatui/nowDefunctWindow.jhtml, (i) browserId/wizard.jhtml, (j) admin/CiscoAdmin.jhtml, (k) msccallme/mscCallForm.jhtml, and (l) webline/html/admin/wcs/LoginPage.jhtml components.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-collaboration_servern/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2021-20993
Matching Score-4
Assigner-CERT@VDE
ShareView Details
Matching Score-4
Assigner-CERT@VDE
CVSS Score-5.3||MEDIUM
EPSS-0.23% / 45.97%
||
7 Day CHG~0.00%
Published-13 May, 2021 | 13:45
Updated-16 Sep, 2024 | 22:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WAGO: Managed Switches: Exposure of sensitive information through directory listing

In multiple managed switches by WAGO in different versions the activated directory listing provides an attacker with the index of the resources located inside the directory.

Action-Not Available
Vendor-wagoWAGO
Product-0852-1305_firmware0852-13050852-1305\/000-001_firmware0852-1505\/000-0010852-0303_firmware0852-1305\/000-0010852-1505\/000-001_firmware0852-1505_firmware0852-03030852-15050852-13050852-1305/000-0010852-1505/000-0010852-03030852-1505
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2015-6622
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-5||MEDIUM
EPSS-0.10% / 28.38%
||
7 Day CHG~0.00%
Published-08 Dec, 2015 | 23:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Native Frameworks Library in Android before 5.1.1 LMY48Z and 6.0 before 2015-12-01 allows attackers to obtain sensitive information, and consequently bypass an unspecified protection mechanism, via unknown vectors, as demonstrated by obtaining Signature or SignatureOrSystem access, aka internal bug 23905002.

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2015-6364
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-5||MEDIUM
EPSS-0.25% / 48.20%
||
7 Day CHG~0.00%
Published-14 Nov, 2015 | 02:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cisco Content Delivery System Manager Software 3.2 on Videoscape Distribution Suite Service Manager allows remote attackers to obtain sensitive information via crafted URLs in REST API requests, aka Bug ID CSCuv86960.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-videoscape_distribution_suite_service_managern/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2010-0385
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-0.43% / 62.00%
||
7 Day CHG~0.00%
Published-25 Jan, 2010 | 19:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Tor before 0.2.1.22, and 0.2.2.x before 0.2.2.7-alpha, when functioning as a bridge directory authority, allows remote attackers to obtain sensitive information about bridge identities and bridge descriptors via a dbg-stability.txt directory query.

Action-Not Available
Vendor-torn/a
Product-torn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2015-5909
Matching Score-4
Assigner-Apple Inc.
ShareView Details
Matching Score-4
Assigner-Apple Inc.
CVSS Score-5||MEDIUM
EPSS-0.31% / 53.34%
||
7 Day CHG~0.00%
Published-18 Sep, 2015 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IDE Xcode Server in Apple Xcode before 7.0 does not properly restrict access to repository e-mail lists, which allows remote attackers to obtain potentially sensitive build information in opportunistic circumstances by leveraging incorrect notification delivery.

Action-Not Available
Vendor-n/aApple Inc.
Product-xcoden/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2015-5858
Matching Score-4
Assigner-Apple Inc.
ShareView Details
Matching Score-4
Assigner-Apple Inc.
CVSS Score-5||MEDIUM
EPSS-0.50% / 64.86%
||
7 Day CHG~0.00%
Published-18 Sep, 2015 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The CFNetwork HTTPProtocol component in Apple iOS before 9 allows remote attackers to bypass the HSTS protection mechanism, and consequently obtain sensitive information, via a crafted URL.

Action-Not Available
Vendor-n/aApple Inc.
Product-iphone_oswatchosn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2015-6631
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-5||MEDIUM
EPSS-0.14% / 35.19%
||
7 Day CHG~0.00%
Published-08 Dec, 2015 | 23:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

libstagefright in Android before 5.1.1 LMY48Z and 6.0 before 2015-12-01 allows remote attackers to obtain sensitive information, and consequently bypass an unspecified protection mechanism, via unknown vectors, as demonstrated by obtaining Signature or SignatureOrSystem access, aka internal bug 24623447.

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2015-6727
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-0.60% / 68.49%
||
7 Day CHG~0.00%
Published-01 Sep, 2015 | 14:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Special:DeletedContributions page in MediaWiki before 1.23.10, 1.24.x before 1.24.3, and 1.25.x before 1.25.2 allows remote attackers to determine if an IP is autoblocked via the "Change block" text.

Action-Not Available
Vendor-n/aWikimedia FoundationCanonical Ltd.
Product-ubuntu_linuxmediawikin/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2010-0523
Matching Score-4
Assigner-Apple Inc.
ShareView Details
Matching Score-4
Assigner-Apple Inc.
CVSS Score-5||MEDIUM
EPSS-0.21% / 43.34%
||
7 Day CHG~0.00%
Published-30 Mar, 2010 | 18:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Wiki Server in Apple Mac OS X 10.5.8 does not restrict the file types of uploaded files, which allows remote attackers to obtain sensitive information or possibly have unspecified other impact via a crafted file, as demonstrated by a Java applet.

Action-Not Available
Vendor-n/aApple Inc.
Product-mac_os_x_servern/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2010-0548
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-0.21% / 43.20%
||
7 Day CHG~0.00%
Published-04 Feb, 2010 | 19:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple unspecified vulnerabilities in the Network Controller and Web Server in Xerox WorkCentre 5632, 5638, 5645, 5655, 5665, 5675, and 5687 allow remote attackers to (1) access mailboxes via unknown vectors that bypass Scan to Mailbox authorization or (2) read device configuration information via via unknown vectors that bypass web server authorization.

Action-Not Available
Vendor-n/aXerox Corporation
Product-workcentre_5687workcentre_5632workcentre_5675workcentre_5655workcentre_5645workcentre_5638workcentre_5665n/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2015-6355
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-5||MEDIUM
EPSS-0.47% / 63.57%
||
7 Day CHG~0.00%
Published-04 Nov, 2015 | 02:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The web interface in Cisco Unified Computing System (UCS) 2.2(5b)A on blade servers allows remote attackers to obtain potentially sensitive version information by visiting an unspecified URL, aka Bug ID CSCuw87226.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-unified_computing_systemn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2010-0383
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-0.46% / 63.35%
||
7 Day CHG~0.00%
Published-25 Jan, 2010 | 19:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Tor before 0.2.1.22, and 0.2.2.x before 0.2.2.7-alpha, uses deprecated identity keys for certain directory authorities, which makes it easier for man-in-the-middle attackers to compromise the anonymity of traffic sources and destinations.

Action-Not Available
Vendor-torn/a
Product-torn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2015-5729
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-1.35% / 79.32%
||
7 Day CHG~0.00%
Published-23 Mar, 2017 | 20:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Soft Access Point (AP) feature in Samsung Smart TVs X10P, X12, X14H, X14J, and NT14U and Xpress M288OFW printers generate weak WPA2 PSK keys, which makes it easier for remote attackers to obtain sensitive information or bypass authentication via a brute-force attack.

Action-Not Available
Vendor-n/aSamsung
Product-nt14u_cnx10p_firmwarent14u_eux12_usx10p_eum288ofw_firmwarex12_firmwarex14h_usx12_eux14j_cnx14h_cnx14h_firmwarex10p_usm288ofwx14j_firmwarex14j_usnt14u_firmwarex14h_eunt14u_usx10p_ibrx14j_eun/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2009-5122
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-0.23% / 45.77%
||
7 Day CHG~0.00%
Published-23 Aug, 2012 | 10:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Personal Email Manager component in Websense Email Security before 7.2 allows remote attackers to obtain potentially sensitive information from the JBoss status page via an unspecified query.

Action-Not Available
Vendor-websensen/a
Product-websense_email_securityn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2000-0588
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-4.09% / 88.13%
||
7 Day CHG~0.00%
Published-13 Oct, 2000 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

SawMill 5.0.21 CGI program allows remote attackers to read the first line of arbitrary files by listing the file in the rfcf parameter, whose contents SawMill attempts to parse as configuration commands.

Action-Not Available
Vendor-sawmilln/a
Product-sawmilln/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2021-21376
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-6.4||MEDIUM
EPSS-0.42% / 61.33%
||
7 Day CHG~0.00%
Published-23 Mar, 2021 | 15:25
Updated-03 Aug, 2024 | 18:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Information Exposure in OMERO.web

OMERO.web is open source Django-based software for managing microscopy imaging. OMERO.web before version 5.9.0 loads various information about the current user such as their id, name and the groups they are in, and these are available on the main webclient pages. This represents an information exposure vulnerability. Some additional information being loaded is not used by the webclient and is being removed in this release. This is fixed in version 5.9.0.

Action-Not Available
Vendor-openmicroscopyome
Product-omero.webomero-web
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2010-0464
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-0.26% / 49.13%
||
7 Day CHG~0.00%
Published-29 Jan, 2010 | 18:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Roundcube 0.3.1 and earlier does not request that the web browser avoid DNS prefetching of domain names contained in e-mail messages, which makes it easier for remote attackers to determine the network location of the webmail user by logging DNS requests.

Action-Not Available
Vendor-n/aRoundcube Webmail Project
Product-webmailn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2014-4746
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-5||MEDIUM
EPSS-0.38% / 58.81%
||
7 Day CHG~0.00%
Published-12 Aug, 2014 | 01:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM WebSphere Portal 8.0.0 before 8.0.0.1 CF13 and 8.5.0 through CF01 provides different error codes for firewall-traversal requests depending on whether the intranet host exists, which allows remote attackers to map the intranet network via a series of requests.

Action-Not Available
Vendor-n/aIBM Corporation
Product-websphere_portaln/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2018-18428
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-37.20% / 97.05%
||
7 Day CHG~0.00%
Published-19 Oct, 2018 | 22:00
Updated-05 Aug, 2024 | 11:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

TP-Link TL-SC3130 1.6.18P12_121101 devices allow unauthenticated RTSP stream access, as demonstrated by a /jpg/image.jpg URI.

Action-Not Available
Vendor-n/aTP-Link Systems Inc.
Product-tl-sc3130tl-sc3130_firmwaren/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • ...
  • 54
  • 55
  • Next
Details not found