Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2019-19107

Summary
Assigner-ABB
Assigner Org ID-2b718523-d88f-4f37-9bbd-300c20644bf9
Published At-22 Apr, 2020 | 14:38
Updated At-05 Aug, 2024 | 02:09
Rejected At-
Credits

ABB/Busch-Jaeger Telephone Gateway TG/S 3.2 Information Exposure

The Configuration pages in ABB Telephone Gateway TG/S 3.2 and Busch-Jaeger 6186/11 Telefon-Gateway for user profiles and services transfer the password in plaintext (although hidden when displayed).

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:ABB
Assigner Org ID:2b718523-d88f-4f37-9bbd-300c20644bf9
Published At:22 Apr, 2020 | 14:38
Updated At:05 Aug, 2024 | 02:09
Rejected At:
▼CVE Numbering Authority (CNA)
ABB/Busch-Jaeger Telephone Gateway TG/S 3.2 Information Exposure

The Configuration pages in ABB Telephone Gateway TG/S 3.2 and Busch-Jaeger 6186/11 Telefon-Gateway for user profiles and services transfer the password in plaintext (although hidden when displayed).

Affected Products
Vendor
ABBABB
Product
TG/S 3.2 Telephone Gateway
Versions
Affected
  • 2CDG 110 135 R0011
Vendor
Busch-Jaeger (ABB)Busch-Jaeger
Product
6186/11 Telefon-Gateway
Versions
Affected
  • 2CKA006136A0187
Problem Types
TypeCWE IDDescription
CWECWE-264CWE-264 Permissions, Privileges, and Access Controls
Type: CWE
CWE ID: CWE-264
Description: CWE-264 Permissions, Privileges, and Access Controls
Metrics
VersionBase scoreBase severityVector
3.16.2MEDIUM
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Version: 3.1
Base score: 6.2
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://search.abb.com/library/Download.aspx?DocumentID=9AKK107680A3921&LanguageCode=en&DocumentPartId=&Action=Launch
x_refsource_MISC
Hyperlink: https://search.abb.com/library/Download.aspx?DocumentID=9AKK107680A3921&LanguageCode=en&DocumentPartId=&Action=Launch
Resource:
x_refsource_MISC
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://search.abb.com/library/Download.aspx?DocumentID=9AKK107680A3921&LanguageCode=en&DocumentPartId=&Action=Launch
x_refsource_MISC
x_transferred
Hyperlink: https://search.abb.com/library/Download.aspx?DocumentID=9AKK107680A3921&LanguageCode=en&DocumentPartId=&Action=Launch
Resource:
x_refsource_MISC
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cybersecurity@ch.abb.com
Published At:22 Apr, 2020 | 15:15
Updated At:03 Nov, 2021 | 18:44

The Configuration pages in ABB Telephone Gateway TG/S 3.2 and Busch-Jaeger 6186/11 Telefon-Gateway for user profiles and services transfer the password in plaintext (although hidden when displayed).

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.15.5MEDIUM
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Secondary3.16.2MEDIUM
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Primary2.02.1LOW
AV:L/AC:L/Au:N/C:P/I:N/A:N
Type: Primary
Version: 3.1
Base score: 5.5
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Type: Secondary
Version: 3.1
Base score: 6.2
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Type: Primary
Version: 2.0
Base score: 2.1
Base severity: LOW
Vector:
AV:L/AC:L/Au:N/C:P/I:N/A:N
CPE Matches

ABB
abb
>>tg\/s3.2>>-
cpe:2.3:h:abb:tg\/s3.2:-:*:*:*:*:*:*:*
ABB
abb
>>tg\/s3.2_firmware>>-
cpe:2.3:o:abb:tg\/s3.2_firmware:-:*:*:*:*:*:*:*
Busch-Jaeger (ABB)
busch-jaeger
>>6186\/11>>-
cpe:2.3:h:busch-jaeger:6186\/11:-:*:*:*:*:*:*:*
Busch-Jaeger (ABB)
busch-jaeger
>>6186\/11_firmware>>-
cpe:2.3:o:busch-jaeger:6186\/11_firmware:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-319Primarynvd@nist.gov
CWE-264Secondarycybersecurity@ch.abb.com
CWE ID: CWE-319
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-264
Type: Secondary
Source: cybersecurity@ch.abb.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://search.abb.com/library/Download.aspx?DocumentID=9AKK107680A3921&LanguageCode=en&DocumentPartId=&Action=Launchcybersecurity@ch.abb.com
Vendor Advisory
Hyperlink: https://search.abb.com/library/Download.aspx?DocumentID=9AKK107680A3921&LanguageCode=en&DocumentPartId=&Action=Launch
Source: cybersecurity@ch.abb.com
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

64Records found

CVE-2024-45449
Matching Score-4
Assigner-Huawei Technologies
ShareView Details
Matching Score-4
Assigner-Huawei Technologies
CVSS Score-5.1||MEDIUM
EPSS-0.02% / 4.20%
||
7 Day CHG~0.00%
Published-04 Sep, 2024 | 02:21
Updated-06 Sep, 2024 | 14:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Access permission verification vulnerability in the ringtone setting module Impact: Successful exploitation of this vulnerability may affect service confidentiality.

Action-Not Available
Vendor-Huawei Technologies Co., Ltd.
Product-emuiharmonyosHarmonyOSEMUI
CWE ID-CWE-264
Not Available
CVE-2009-0014
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-2.1||LOW
EPSS-0.05% / 15.09%
||
7 Day CHG~0.00%
Published-13 Feb, 2009 | 00:00
Updated-07 Aug, 2024 | 04:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Folder Manager in Apple Mac OS X 10.5.6 uses insecure default permissions when recreating a Downloads folder after it has been deleted, which allows local users to bypass intended access restrictions and read the Downloads folder.

Action-Not Available
Vendor-n/aApple Inc.
Product-mac_os_x_servermac_os_xn/a
CWE ID-CWE-264
Not Available
CVE-2024-54104
Matching Score-4
Assigner-Huawei Technologies
ShareView Details
Matching Score-4
Assigner-Huawei Technologies
CVSS Score-6.2||MEDIUM
EPSS-0.05% / 14.62%
||
7 Day CHG+0.01%
Published-12 Dec, 2024 | 11:58
Updated-12 Dec, 2024 | 20:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-process screen stack vulnerability in the UIExtension module Impact: Successful exploitation of this vulnerability may affect service confidentiality.

Action-Not Available
Vendor-Huawei Technologies Co., Ltd.
Product-harmonyosHarmonyOS
CWE ID-CWE-264
Not Available
CVE-2019-0069
Matching Score-4
Assigner-Juniper Networks, Inc.
ShareView Details
Matching Score-4
Assigner-Juniper Networks, Inc.
CVSS Score-5.9||MEDIUM
EPSS-0.02% / 3.65%
||
7 Day CHG~0.00%
Published-09 Oct, 2019 | 19:26
Updated-16 Sep, 2024 | 23:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Junos OS: vSRX, SRX1500, SRX4K, ACX5K, EX4600, QFX5100, QFX5110, QFX5200, QFX10K and NFX Series: console management port device authentication credentials are logged in clear text

On EX4600, QFX5100 Series, NFX Series, QFX10K Series, QFX5110, QFX5200 Series, QFX5110, QFX5200, QFX10K Series, vSRX, SRX1500, SRX4000 Series, vSRX, SRX1500, SRX4000, QFX5110, QFX5200, QFX10K Series, when the user uses console management port to authenticate, the credentials used during device authentication are written to a log file in clear text. This issue does not affect users that are logging-in using telnet, SSH or J-web to the management IP. This issue affects ACX, NFX, SRX, EX and QFX platforms with the Linux Host OS architecture, it does not affect other SRX and EX platforms that do not use the Linux Host OS architecture. This issue affects Juniper Networks Junos OS: 15.1X49 versions prior to 15.1X49-D110 on vSRX, SRX1500, SRX4000 Series; 15.1X53 versions prior to 15.1X53-D234 on QFX5110, QFX5200 Series; 15.1X53 versions prior to 15.1X53-D68 on QFX10K Series; 17.1 versions prior to 17.1R2-S8, 17.1R3, on QFX5110, QFX5200, QFX10K Series; 17.2 versions prior to 17.2R1-S7, 17.2R2-S6, 17.2R3 on QFX5110, QFX5200, QFX10K Series; 17.3 versions prior to 17.3R2 on vSRX, SRX1500, SRX4000, QFX5110, QFX5200, QFX10K Series; 14.1X53 versions prior to 14.1X53-D47 on ACX5000, EX4600, QFX5100 Series; 15.1 versions prior to 15.1R7 on ACX5000, EX4600, QFX5100 Series; 16.1R7 versions prior to 16.1R7 on ACX5000, EX4600, QFX5100 Series; 17.1 versions prior to 17.1R2-S10, 17.1R3 on ACX5000, EX4600, QFX5100 Series; 17.2 versions prior to 17.2R3 on ACX5000, EX4600, QFX5100 Series; 17.3 versions prior to 17.3R3 on ACX5000, EX4600, QFX5100 Series; 17.4 versions prior to 17.4R2 on ACX5000, EX4600, QFX5100 Series; 18.1 versions prior to 18.1R2 on ACX5000, EX4600, QFX5100 Series; 15.1X53 versions prior to 15.1X53-D496 on NFX Series, 17.2 versions prior to 17.2R3-S1 on NFX Series; 17.3 versions prior to 17.3R3-S4 on NFX Series; 17.4 versions prior to 17.4R2-S4, 17.4R3 on NFX Series, 18.1 versions prior to 18.1R3-S4 on NFX Series; 18.2 versions prior to 18.2R2-S3, 18.2R3 on NFX Series; 18.3 versions prior to 18.3R1-S3, 18.3R2 on NFX Series; 18.4 versions prior to 18.4R1-S1, 18.4R2 on NFX Series.

Action-Not Available
Vendor-Juniper Networks, Inc.
Product-srx4000ex4600qfx5200qfx10008nfx150nfx250junosacx5000qfx5110qfx10016vsrxsrx1500Junos OS
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2007-4701
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-2.1||LOW
EPSS-0.07% / 22.69%
||
7 Day CHG~0.00%
Published-15 Nov, 2007 | 02:00
Updated-07 Aug, 2024 | 15:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

WebKit on Apple Mac OS X 10.4 through 10.4.10 does not create temporary files securely when Safari is previewing a PDF file, which allows local users to read the contents of that file.

Action-Not Available
Vendor-n/aApple Inc.
Product-mac_os_x_servermac_os_xn/a
CWE ID-CWE-264
Not Available
CVE-2007-5751
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-2.1||LOW
EPSS-0.05% / 16.29%
||
7 Day CHG~0.00%
Published-31 Oct, 2007 | 17:00
Updated-07 Aug, 2024 | 15:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Liferea before 1.4.6 uses weak permissions (0644) for the feedlist.opml backup file, which allows local users to obtain credentials.

Action-Not Available
Vendor-liferean/a
Product-liferean/a
CWE ID-CWE-264
Not Available
CVE-2022-0005
Matching Score-4
Assigner-Intel Corporation
ShareView Details
Matching Score-4
Assigner-Intel Corporation
CVSS Score-2.4||LOW
EPSS-0.04% / 10.98%
||
7 Day CHG~0.00%
Published-12 May, 2022 | 16:36
Updated-05 May, 2025 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Sensitive information accessible by physical probing of JTAG interface for some Intel(R) Processors with SGX may allow an unprivileged user to potentially enable information disclosure via physical access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-core_i7-6870hqxeon_e-2286gcore_i7-6850core_i7-8670t_firmwarecore_i3-9100ecore_i7-7700t_firmwarepentium_gold_g5500tcore_i5-10610u_firmwarecore_i3-10100core_i9-10910_firmwarecore_i3-7320t_firmwarecore_i7-8850h_firmwarecore_i3-7300core_i5-11400core_i9-7900xceleron_g5900t_firmwarecore_i7-10510ycore_i7-10710u_firmwarecore_i7-7820x_firmwarecore_i5-11500bcore_i9-11900_firmwarecore_i9-9800x_firmwarexeon_e-2174g_firmwarexeon_e-2276ml_firmwarexeon_w-1270p_firmwarexeon_e-2246gcore_i9-10900_firmwarepentium_gold_g4560core_i9-9960xcore_i3-6300tcore_i5-1155g7_firmwarexeon_e-2374gxeon_w-2123core_i7-9700k_firmwarexeon_e-2254ml_firmwarecore_i3-9300t_firmwarecore_i5-11260hxeon_e-2236xeon_e-2374g_firmwarecore_i9-10940x_x-seriescore_i7-8709g_firmwarepentium_gold_g6605xeon_w-1270epentium_gold_g6405u_firmwarepentium_gold_g5400tcore_i7-10875h_firmwarexeon_w-2295_firmwarexeon_w-2102_firmwarepentium_gold_4415u_firmwarecore_i9-9900kf_firmwarexeon_e-2278geceleron_g5925core_i3-6120core_i7-6785r_firmwarecore_i7-8709gpentium_gold_g6505pentium_gold_g5600_firmwarexeon_w-10855mcore_i9-11900kfcore_i5-10600t_firmwarexeon_w-3275_firmwarexeon_w-1270xeon_e-2254me_firmwarecore_i7-11700k_firmwarecore_i5-10300h_firmwarepentium_gold_g6400xeon_w-3235core_i9-10900tpentium_gold_g5400_firmwarexeon_e-2126gcore_i5-10500t_firmwarecore_i7-10700tecore_i5-10600_firmwarecore_i9-10900kpentium_gold_g4620_firmwarecore_i7-8809g_firmwarecore_i9-10900x_x-seriescore_i7_8565u_firmwarecore_i5-11400fxeon_w-11955mcore_i5-10400txeon_w-1290ecore_i3-7110u_firmwareceleron_g5925_firmwarecore_i7-6820eq_firmwarecore_i9-10940x_x-series_firmwarecore_i7-9700kfcore_i9-10900xxeon_w-1290te_firmwarecore_i3-8000tcore_i9-11980hk_firmwarecore_i5-10110y_firmwarexeon_w-3335core_i3-8100b_firmwarecore_i9-10900te_firmwarecore_i9-11900kcore_i5-10500hcore_i3-8300t_firmwarecore_i9-11900kb_firmwarecore_i3-7167u_firmwarecore_i7-6800k_firmwarexeon_w-11555mrecore_i5-10600kfxeon_w-10855_firmwarecore_i7-10700_firmwarepentium_gold_g6600_firmwarexeon_e-2146gxeon_w-2123_firmwarecore_i9-10850hcore_i7-7820eq_firmwarecore_i5-11500he_firmwarecore_i7-6650u_firmwarecore_i3-10100exeon_w-2102pentium_gold_g5420tcore_i5-11320h_firmwarexeon_w-3365_firmwarecore_i7-10700kf_firmwarexeon_e-2286g_firmwarecore_i7-6800kcore_i7-7560upentium_gold_g6400te_firmwarecore_i7-9700txeon_w-2104_firmwarecore_i7-8550u_firmwarecore_i5-11600kfxeon_e-2284g_firmwareceleron_g5900_firmwarexeon_w-2245core_i7-6498duxeon_w-2195_firmwarexeon_w-2275_firmwarexeon_e-2288g_firmwarexeon_e-2276mxeon_w-1250te_firmwarexeon_e-2224gcore_i3-8100_firmwarecore_i3-11100he_firmwarepentium_gold_g7400core_i7-6510upentium_gold_4417u_firmwarecore_i5-11400hcore_i9-11900hxeon_w-2235_firmwarecore_i7-9700t_firmwarecore_i7-7510ucore_i7-8665ue_firmwarecore_i7-10810ucore_i3-10300tcore_i7-7820hq_firmwarecore_i3-8100core_i3-8145uexeon_w-2155_firmwarecore_i5-1130g7pentium_gold_4425ycore_i7-6560u_firmwarepentium_gold_g5500_firmwarepentium_gold_g5500t_firmwarexeon_e-2378g_firmwarecore_i9-11900pentium_gold_g4620core_i9-9960x_x-series_firmwarecore_i7-10700tcore_i9-9900kfxeon_e-2246g_firmwarecore_i3-7100pentium_gold_6500ycore_i7-7600u_firmwarecore_i3-6120_firmwarecore_i7-9700kf_firmwarecore_i5-1145g7core_i5-10500ecore_i7-10750hcore_i9-10850kpentium_gold_g6405core_i3-7100e_firmwarexeon_e-2226ge_firmwarecore_i7-7640xcore_i7-1060ng7xeon_e-2226gepentium_gold_g7400tecore_i7-7820hk_firmwarexeon_w-1390_firmwarexeon_w-2175_firmwarecore_i3-8100hcore_i3-7300t_firmwarecore_i7-8706gpentium_gold_g6400tcore_i3-6300core_i7-11850h_firmwarecore_i3-8120core_i7-9700f_firmwarecore_i9-11900fcore_i9-10920xcore_i9-11950hcore_i9-9940x_x-series_firmwarecore_i7-6500u_firmwarexeon_w-1300_firmwarecore_i3-8130u_firmwarecore_i7-6950x_firmwarecore_i9-10885hcore_i7-8557ucore_i3-6320xeon_e-2386gcore_i3-9100t_firmwarecore_i3-8350k_firmwarecore_i5-11400_firmwareceleron_n5105_firmwarecore_i7-11850hepentium_gold_g6605_firmwarecore_i7-10750h_firmwarexeon_e-2134xeon_w-1290tecore_i9-9820x_firmwarecore_i5-1145g7exeon_w-3265_firmwarecore_i7-8557u_firmwarexeon_w-11865mre_firmwarecore_i9-10980hkxeon_e-2176mxeon_w-11155mlecore_i7-10700k_firmwarecore_i9-10900t_firmwarexeon_w-3275m_firmwarepentium_gold_g6505_firmwarecore_i5-11400f_firmwarecore_i3-10305_firmwarecore_i3-7100u_firmwarexeon_e-2274gcore_i3-10325_firmwarecore_i7-10510y_firmwareceleron_g5905t_firmwarecore_i9-11900k_firmwarexeon_e-2134_firmwarecore_i7-11700b_firmwarecore_i3-7007u_firmwarecore_i7-11800h_firmwarecore_i7-1060ng7_firmwarecore_i7-8500yxeon_w-3323xeon_w-3245m_firmwarecore_i9-11900t_firmwarexeon_e-2226g_firmwarecore_i9-7960xxeon_w-2133_firmwarecore_i7-6700te_firmwarexeon_w-1370pentium_gold_6500y_firmwarexeon_w-3375xeon_e-2174gpentium_gold_g5420_firmwarecore_i7-8510y_firmwarepentium_gold_g6405t_firmwarecore_i3-10320_firmwarexeon_e-2176gxeon_e-2288gcore_i3-6100hcore_i7-7500uxeon_e-2274g_firmwarexeon_w-1370pcore_i3-6320t_firmwarecore_i3-10320core_i3-8121upentium_gold_g5400xeon_e-2124g_firmwarecore_i3-10105fceleron_n5095_firmwarecore_i3-7120_firmwarexeon_e-2224_firmwarexeon_w-1390t_firmwarexeon_w-2235core_i3-6098pxeon_w-3175xcore_i7-10875hxeon_w-3225core_i3-7101tecore_i3-8121u_firmwarecore_i7-7700core_i3-11100hecore_i5-10400hpentium_gold_7505core_i7-9800x_firmwarecore_i5-10505_firmwarexeon_w-10885mxeon_e-2224g_firmwarecore_i9-9940xpentium_gold_g6500_firmwarepentium_gold_g4600_firmwarepentium_gold_g5620_firmwarecore_i9-9980xe_firmwarecore_i9-9900xcore_i9-9900t_firmwarecore_i9-7940xcore_i5-10110ycore_i9-9920x_x-seriescore_i7-9700ecore_i3-7007ucore_i9-11900kf_firmwarexeon_e-2254mecore_i7-8500y_firmwarecore_i7-9700texeon_w-11865mld_firmwarecore_i7-6700t_firmwarecore_i7-6700tcore_i7-6822eq_firmwarecore_i3-6102e_firmwarexeon_w-3235_firmwarexeon_w-2125core_i3-10105tcore_i9-9900k_firmwarecore_i3-8100h_firmwareceleron_g5905_firmwarecore_i5-11300hcore_i7-10510u_firmwarecore_i7-6820hk_firmwarecore_i7-7700_firmwarecore_i7-7800x_firmwarecore_i3-10105t_firmwarecore_i5-10400h_firmwarecore_i3-7100t_firmwarecore_i3-9100hlcore_i7-11390h_firmwarecore_i9-10900kfcore_i3-10100tcore_i9-9980hk_firmwarecore_i3-9100f_firmwarepentium_gold_g6600xeon_e-2144gcore_i7-7700hq_firmwarecore_i9-9980hkxeon_w-11555mlecore_i5-11500hexeon_e-2244gcore_i3-7100tcore_i3-6102exeon_w-1390tcore_i9-9960x_x-seriesxeon_w-2125_firmwarecore_i5-1140g7core_i7-11700kfcore_i7-10610ucore_i7-6770hqcore_i7-9850h_firmwarepentium_gold_g5420core_i7-11700_firmwarecore_i7-7740xcore_i7-11375hcore_i7-8559ucore_i9-10850h_firmwarexeon_e-2124gcore_i5-11500tpentium_gold_g7400_firmwarecore_i9-9920x_firmwarexeon_w-1250e_firmwarecore_i7-8670_firmwarecore_i7-8560ucore_i7-11600h_firmwarecore_i5-11400h_firmwarepentium_gold_g5600core_i7-6600ucore_i3-6320_firmwarecore_i3-6100e_firmwarexeon_w-1290t_firmwarecore_i7-9750h_firmwarecore_i3-10325core_i9-7920x_firmwarexeon_e-2356gcore_i7-8700core_i3-7130ucore_i5-1145gre_firmwareceleron_n5100core_i3-10105f_firmwarexeon_w-3245mxeon_e-2334core_i7-9850hxeon_w-11555mle_firmwarexeon_w-1350core_i3-10110u_firmwarecore_i9-10980xecore_i7-8750hfcore_i7-6500uxeon_w-11865mlecore_i7-11850hxeon_w-1290core_i9-11900f_firmwarexeon_e-2186gxeon_e-2314_firmwarexeon_w-3345_firmwarecore_i3-10110ucore_i7-8665u_firmwarepentium_gold_g7400te_firmwarecore_i7-8086k_firmwarecore_i9-10885h_firmwarexeon_w-2223_firmwarecore_i3-10100y_firmwarecore_i7-7567u_firmwarecore_i3-9100e_firmwarecore_i5-11500_firmwarecore_i3-7320_firmwarecore_i7-6770hq_firmwarecore_i7-8569u_firmwarepentium_gold_6405uxeon_w-1350pcore_i9-10900xeon_w-1250celeron_n5100_firmwarecore_i5-1145g7_firmwarexeon_w-3245_firmwarecore_i3-6110ucore_i7-11800hcore_i7-11370h_firmwarecore_i3-10300core_i7-11375h_firmwarexeon_w-1290p_firmwarexeon_w-1250p_firmwarecore_i3-8100t_firmwarepentium_gold_4417ucore_i9-9960x_firmwareceleron_g5920core_i3-7100h_firmwarecore_i7-8565ucore_i7-8670core_i9-10940x_firmwarecore_i7-6600u_firmwarecore_i7-6567u_firmwarexeon_e-2104g_firmwarexeon_e-2234_firmwarecore_i5-11500h_firmwarecore_i7-7700kcore_i7-8510ycore_i7-10870hxeon_w-3323_firmwarecore_i3-10100fcore_i3-7320tcore_i7-10510ucore_i3-6300t_firmwarepentium_gold_4425y_firmwarexeon_w-1290pcore_i9-9900_firmwarepentium_gold_g5500core_i7-7920hq_firmwarecore_i3-10300_firmwarecore_i5-10500h_firmwarecore_i7-6850kcore_i7-9750hf_firmwarexeon_e-2324gxeon_w-3245core_i7-6660ucore_i9-7980xecore_i7-6870hq_firmwarecore_i3-6100ecore_i3-8000t_firmwarecore_i7-9700fcore_i7-6970hq_firmwarecore_i3-8000_firmwarecore_i5-10210ucore_i7-6820hqpentium_gold_g4600xeon_e-2186m_firmwarexeon_w-2295xeon_w-3345core_i3-7300_firmwarexeon_e-2234pentium_gold_g5400t_firmwarecore_i3-9100tcore_i5-10500core_i5-11300h_firmwarecore_i3-7367ucore_i7-7740x_firmwarexeon_w-11155mre_firmwarecore_i9-9800xpentium_gold_g6405tcore_i9-9940x_x-seriesceleron_g5900tcore_i3-7100hcore_i7-8850hcore_i9-8950hk_firmwarecore_i3-6100ucore_i5-11600_firmwarecore_i5-10400t_firmwarecore_i9-9900kscore_i9-7920xxeon_w-11865mrecore_i3-10100_firmwarecore_i9-7960x_firmwarecore_i5-11600kcore_i9-10900tecore_i9-8950hkcore_i3-6157ucore_i3-10100yxeon_e-2378core_i7-7820xcore_i5-10600tcore_i5-10600kf_firmwarecore_i7-7700k_firmwarecore_i7-7800xxeon_w-1290_firmwarexeon_w-3275mxeon_e-2386g_firmwarexeon_e-2176m_firmwarecore_i9-10900e_firmwarexeon_e-2278g_firmwareceleron_g5205u_firmwarecore_i9-9920xpentium_gold_g6505tcore_i7-7660ucore_i9-10910xeon_e-2278gel_firmwarecore_i3-9320core_i3-6320tcore_i7-7700hqcore_i7-6820hq_firmwarexeon_e-2236_firmwarexeon_e-2244g_firmwarecore_i7-6900k_firmwarepentium_gold_g6500tcore_i3-10100t_firmwarecore_i7-10700f_firmwarepentium_gold_4415y_firmwarexeon_w-2255_firmwarecore_i3-6100t_firmwarexeon_w-11155mrexeon_w-2135core_i3-10105core_i5-1140g7_firmwarepentium_gold_6405u_firmwarecore_i5-11400tcore_i7-6850_firmwarexeon_w-2104core_i7-11700kcore_i9-10900kf_firmwarecore_i7-8550uxeon_e-2276mlcore_i7-10810u_firmwarexeon_w-1350_firmwarecore_i9-10920x_firmwarecore_i9-10940xcore_i3-7101e_firmwarecore_i9-9880h_firmwarecore_i7-9700core_i9-9900x_x-series_firmwarexeon_w-3265m_firmwarecore_i7-6700hqcore_i3-8300core_i3-7102e_firmwarecore_i7-9850hepentium_gold_g6400t_firmwarexeon_e-2334_firmwarexeon_e-2276me_firmwarecore_i7-10700kfcore_i7-9850hl_firmwareceleron_g5905xeon_w-1370p_firmwarecore_i5-11600kf_firmwarecore_i7-9800xxeon_e-2136_firmwarepentium_gold_4410y_firmwarexeon_w-1270_firmwarepentium_gold_g7400tcore_i5-1130g7_firmwarecore_i7-6660u_firmwarecore_i9-11900kbxeon_w-2225xeon_e-2276mepentium_gold_7505_firmwarexeon_w-1250ecore_i7-6950xcore_i3-6100te_firmwarecore_i9-11900h_firmwarecore_i7-8700b_firmwarecore_i7-6567uxeon_e-2356g_firmwarecore_i3-10305t_firmwarecore_i3-11100b_firmwarecore_i7-8706g_firmwarexeon_w-10855m_firmwarecore_i9-10850k_firmwarecore_i3-6167u_firmwarecore_i7-7660u_firmwarexeon_e-2146g_firmwarecore_i7-11600hcore_i7-7920hqcore_i7-10700core_i3-9130ucore_i5-1135g7_firmwarexeon_e-2126g_firmwarecore_i3-6110u_firmwarecore_i9-11950h_firmwarexeon_w-1350p_firmwarecore_i7-10610u_firmwarecore_i5-10500e_firmwarepentium_gold_4410ycore_i5-1145grecore_i3-7020uxeon_w-3265mcore_i5-11600k_firmwarecore_i5-1135g7xeon_w-2195core_i3-8145u_firmwarecore_i9-10920x_x-series_firmwarecore_i9-9940x_firmwarexeon_e-2136xeon_e-2378_firmwarexeon_w-1270pcore_i3-8145ucore_i3-9300core_i5-10400core_i3-7020u_firmwarecore_i7-7567uxeon_w-1250pcore_i7-8700kcore_i3-7130u_firmwarecore_i7-10870h_firmwarecore_i3-6098p_firmwarecore_i5-1155g7core_i3-9300tcore_i7-7820hqcore_i7-7820eqcore_i3-6120tcore_i7-9700kxeon_w-11865mldcore_i7-11700kf_firmwarepentium_gold_g6405_firmwarecore_i3-8109ucore_i7-6920hq_firmwarecore_i7-7640x_firmwarecore_i3-11100bxeon_w-3275xeon_e-2144g_firmwarecore_i7-10700te_firmwarecore_i3-7320core_i7-10700epentium_gold_g7400eceleron_g5305ucore_i7-8750h_firmwarecore_i3-10100teceleron_g5205uxeon_e-2388gpentium_gold_g5420t_firmwarecore_i5-10210u_firmwarecore_i7-11390hcore_i3-8140u_firmwarecore_i7-9700te_firmwarexeon_e-2226gceleron_g5905tcore_i3-9300_firmwarecore_i7-6700texeon_w-3375_firmwarecore_i3-10100te_firmwarecore_i3-6120t_firmwarexeon_e-2278gcore_i5-10600k_firmwarepentium_gold_g5600tcore_i9-10900ecore_i3-9100core_i5-10610ucore_i7-9750hcore_i3-6100u_firmwarexeon_e-2124core_i3-10110y_firmwarecore_i9-11980hkxeon_e-2186g_firmwarepentium_gold_g7400e_firmwarecore_i9-7980xe_firmwarexeon_w-3265xeon_e-1105c_firmwarecore_i5-10500tecore_i7-6700_firmwarecore_i7-8559u_firmwarexeon_w-1270te_firmwarexeon_e-2184g_firmwarecore_i7-7500u_firmwarecore_i5-10210y_firmwarecore_i3-8000core_i5-11500core_i3-6100tecore_i7-8700k_firmwarecore_i7-11700pentium_gold_g6400ecore_i7-6498du_firmwarecore_i7-8700bcore_i5-10500tcore_i5-10600core_i9-10920x_x-seriescore_i5-10500_firmwarexeon_w-2245_firmwarexeon_w-1250tecore_i3-9100tepentium_gold_g6500t_firmwarecore_i5-11500t_firmwarexeon_e-2388g_firmwarecore_i3-6006u_firmwarepentium_gold_g6405ucore_i7-10700kpentium_gold_g5600t_firmwarexeon_e-2336core_i3-8109u_firmwarexeon_e-2186mcore_i5-11600t_firmwarecore_i9-9880hcore_i7-6650ucore_i7-8705g_firmwarexeon_e-2286mcore_i3-9350k_firmwarecore_i7-11370hxeon_w-1300core_i7-8665uecore_i3-8130ucore_i3-7167ucore_i3-8300tcore_i5-11500hcore_i3-7340core_i5-11600tcore_i7-8650ucore_i5-10200hpentium_gold_g5620core_i9-9900kcore_i7-8705gxeon_e-2284gcore_i5-10400fxeon_e-2324g_firmwarecore_i3-6157u_firmwarecore_i7-7600uxeon_w-2265_firmwarexeon_w-3223_firmwarexeon_e-2278ge_firmwarecore_i3-7100epentium_gold_g6400_firmwarexeon_w-10855xeon_w-2275xeon_w-3175x_firmwarexeon_w-2265core_i7-7510u_firmwarecore_i3-7101ecore_i9-9900xeon_w-10885m_firmwarecore_i3-8145ue_firmwarecore_i9-9820xxeon_e-2276m_firmwarexeon_w-1270e_firmwarecore_i3-7350k_firmwarexeon_w-2135_firmwarecore_i7-9850hlxeon_w-3365xeon_e-2286m_firmwarecore_i7-11850he_firmwarecore_i3-7120core_i7-9750hfpentium_gold_4415uxeon_w-2175core_i7-6850k_firmwarexeon_w-3335_firmwarecore_i3-10110ycore_i3-9130u_firmwarecore_i7-7820hkpentium_gold_5405uxeon_e-2176g_firmwarexeon_e-2254mlxeon_w-11855mcore_i3-6100celeron_g5900core_i3-9350kxeon_w-1390core_i7-11700t_firmwarecore_i5-11600core_i7-11700fcore_i3-6100tcore_i7-8750hxeon_w-2145_firmwareceleron_n5105core_i7-8665ucore_i3-10100e_firmwarecore_i3-10305tcore_i3-9350kf_firmwarecore_i9-7940x_firmwarexeon_w-1370_firmwarecore_i3-7101te_firmwarecore_i3-8140ucore_i3-8350kcore_i5-10600kcore_i7-8086kcore_i9-7900x_firmwarecore_i7-9700e_firmwarecore_i7-10850hcore_i3-7120tcore_i3-8120_firmwarecore_i7-8560u_firmwarecore_i9-9900x_firmwarecore_i3-9100hl_firmwarecore_i5-10500te_firmwarecore_i3-8020_firmwarexeon_w-1290e_firmwarecore_i3-10300t_firmwarecore_i5-1145g7e_firmwarecore_i5-11500b_firmwarecore_i3-8100bcore_i9-9920x_x-series_firmwarexeon_w-1390p_firmwarecore_i3-6167ucore_i3-10100f_firmwarecore_i9-10900f_firmwarexeon_w-11955m_firmwarecore_i3-7100ucore_i7-8700tcore_i3-7100_firmwarecore_i3-9320_firmwarecore_i7-6700k_firmwarecore_i7-6510u_firmwarecore_i7-11700tceleron_n5095core_i7-8700t_firmwarexeon_e-1105ccore_i7-10700e_firmwarecore_i3-9100te_firmwarecore_i3-7120t_firmwarecore_i7-6700kcore_i7-6970hqcore_i3-7340_firmwarepentium_gold_g7400t_firmwarexeon_w-2223core_i7-6822eqcore_i3-7300txeon_e-2184gcore_i9-11900tcore_i5-11260h_firmwarecore_i5-10400f_firmwarecore_i7-6785rcore_i7-6560ucore_i7-8565u_firmwarecore_i9-10980xe_firmwarexeon_w-11855m_firmwarepentium_gold_5405u_firmwarecore_i7_8565ucore_i7-8569ucore_i5-11400t_firmwarecore_i7-10700t_firmwarecore_i9-9900tcore_i7-6900kcore_i7-7700tcore_i7-9700_firmwarecore_i9-9980xepentium_gold_g4560_firmwarexeon_w-2133xeon_e-2336_firmwarecore_i3-9350kfxeon_w-1290tcore_i7-8809gcore_i3-10105_firmwarecore_i5-11320hcore_i7-8650u_firmwarecore_i7-11700bcore_i3-6300_firmwarecore_i7-10850h_firmwarecore_i9-9900x_x-seriesxeon_e-2314xeon_w-11555mre_firmwarecore_i3-7110ucore_i3-10305core_i7-8700_firmwarecore_i3-6100h_firmwarecore_i3-7350kcore_i7-9850he_firmwarepentium_gold_4415yxeon_w-1390pcore_i3-8300_firmwarecore_i3-9100_firmwarecore_i5-10505core_i7-6700core_i7-6820eqcore_i7-6920hqcore_i7-6820hkcore_i7-7560u_firmwarecore_i9-10900x_firmwarexeon_w-2255core_i3-6006ucore_i7-10710uxeon_w-11865mle_firmwarecore_i5-10210ycore_i5-10300hcore_i9-10900x_x-series_firmwarexeon_e-2276g_firmwarecore_i3-8020celeron_g5920_firmwarexeon_w-1270texeon_e-2224pentium_gold_g6500core_i9-9900ks_firmwarexeon_w-2145xeon_e-2124_firmwarecore_i3-9100fcore_i7-11700f_firmwarexeon_w-1250_firmwarecore_i9-10900fxeon_e-2278gelxeon_w-3225_firmwarexeon_e-2378gcore_i3-8100tcore_i5-10200h_firmwarecore_i3-6100_firmwarecore_i9-10980hk_firmwarecore_i7-8670tpentium_gold_g6400tecore_i5-10400_firmwarexeon_w-3223xeon_w-2155core_i7-6700hq_firmwarexeon_e-2104gcore_i3-7367u_firmwarecore_i3-7102epentium_gold_g6400e_firmwarepentium_gold_g6505t_firmwarexeon_w-11155mle_firmwarexeon_e-2276gceleron_g5305u_firmwarecore_i7-10700fcore_i9-10900k_firmwarecore_i7-8750hf_firmwarexeon_w-2225_firmwareIntel(R) Processors with SGX
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2007-5827
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-2.1||LOW
EPSS-0.05% / 16.13%
||
7 Day CHG~0.00%
Published-05 Nov, 2007 | 19:00
Updated-07 Aug, 2024 | 15:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

iSCSI Enterprise Target (iscsitarget) 0.4.15 uses weak permissions for /etc/ietd.conf, which allows local users to obtain passwords.

Action-Not Available
Vendor-iscsitargetn/aDebian GNU/Linux
Product-debian_linuxiscsitargetn/a
CWE ID-CWE-264
Not Available
CVE-2017-7143
Matching Score-4
Assigner-Apple Inc.
ShareView Details
Matching Score-4
Assigner-Apple Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.07% / 22.93%
||
7 Day CHG~0.00%
Published-23 Oct, 2017 | 01:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in certain Apple products. macOS before 10.13 is affected. The issue involves the "Captive Network Assistant" component. It allows remote attackers to discover cleartext passwords in opportunistic circumstances by sniffing the network during use of the captive portal browser, which has a UI error that can lead to cleartext transmission without the user's awareness.

Action-Not Available
Vendor-n/aApple Inc.
Product-mac_os_xn/a
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2024-6388
Matching Score-4
Assigner-Canonical Ltd.
ShareView Details
Matching Score-4
Assigner-Canonical Ltd.
CVSS Score-5.9||MEDIUM
EPSS-0.03% / 8.20%
||
7 Day CHG~0.00%
Published-27 Jun, 2024 | 15:39
Updated-27 Aug, 2025 | 16:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Marco Trevisan discovered that the Ubuntu Advantage Desktop Daemon, before version 1.12, leaks the Pro token to unprivileged users by passing the token as an argument in plaintext.

Action-Not Available
Vendor-Canonical Ltd.
Product-ubuntu_advantage_desktop_daemonUbuntu Advantage Desktop Proubuntu_advantage_desktop_pro
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CWE ID-CWE-497
Exposure of Sensitive System Information to an Unauthorized Control Sphere
CVE-2024-51524
Matching Score-4
Assigner-Huawei Technologies
ShareView Details
Matching Score-4
Assigner-Huawei Technologies
CVSS Score-4||MEDIUM
EPSS-0.02% / 3.87%
||
7 Day CHG~0.00%
Published-05 Nov, 2024 | 09:15
Updated-07 Nov, 2024 | 20:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Permission control vulnerability in the Wi-Fi module Impact: Successful exploitation of this vulnerability may affect service confidentiality.

Action-Not Available
Vendor-Huawei Technologies Co., Ltd.
Product-harmonyosHarmonyOS
CWE ID-CWE-264
Not Available
CVE-2024-51527
Matching Score-4
Assigner-Huawei Technologies
ShareView Details
Matching Score-4
Assigner-Huawei Technologies
CVSS Score-5.1||MEDIUM
EPSS-0.01% / 1.60%
||
7 Day CHG~0.00%
Published-05 Nov, 2024 | 09:25
Updated-07 Nov, 2024 | 19:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Permission control vulnerability in the Gallery app Impact: Successful exploitation of this vulnerability may affect service confidentiality.

Action-Not Available
Vendor-Huawei Technologies Co., Ltd.
Product-emuiharmonyosHarmonyOSEMUI
CWE ID-CWE-264
Not Available
CVE-2024-51525
Matching Score-4
Assigner-Huawei Technologies
ShareView Details
Matching Score-4
Assigner-Huawei Technologies
CVSS Score-6.2||MEDIUM
EPSS-0.02% / 4.16%
||
7 Day CHG~0.00%
Published-05 Nov, 2024 | 09:19
Updated-07 Nov, 2024 | 20:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Permission control vulnerability in the clipboard module Impact: Successful exploitation of this vulnerability may affect service confidentiality.

Action-Not Available
Vendor-Huawei Technologies Co., Ltd.
Product-harmonyosHarmonyOS
CWE ID-CWE-264
Not Available
CVE-2021-1258
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.04% / 12.78%
||
7 Day CHG~0.00%
Published-13 Jan, 2021 | 21:17
Updated-12 Nov, 2024 | 20:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco AnyConnect Secure Mobility Client Arbitrary File Read Vulnerability

A vulnerability in the upgrade component of Cisco AnyConnect Secure Mobility Client could allow an authenticated, local attacker with low privileges to read arbitrary files on the underlying operating system (OS) of an affected device. The vulnerability is due to insufficient file permission restrictions. An attacker could exploit this vulnerability by sending a crafted command from the local CLI to the application. A successful exploit could allow the attacker to read arbitrary files on the underlying OS of the affected device. The attacker would need to have valid user credentials to exploit this vulnerability.

Action-Not Available
Vendor-Cisco Systems, Inc.McAfee, LLCMicrosoft Corporation
Product-agent_epolicy_orchestrator_extensionwindowsanyconnect_secure_mobility_clientCisco AnyConnect Secure Mobility Client
CWE ID-CWE-264
Not Available
CWE ID-CWE-269
Improper Privilege Management
  • Previous
  • 1
  • 2
  • Next
Details not found