Vulnerabilities (CVE)

Filtered by CWE-199
Total 7 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2016-5486 1 Oracle 1 Sun Zfs Storage Appliance Kit 2024-11-21 4.9 MEDIUM 5.5 MEDIUM
Unspecified vulnerability in the Sun ZFS Storage Appliance Kit (AK) component in Oracle Sun Systems Products Suite AK 2013 allows local users to affect confidentiality via vectors related to Core Services.
CVE-2016-5405 1 Redhat 4 Enterprise Linux Desktop, Enterprise Linux Hpc Node, Enterprise Linux Server and 1 more 2024-11-21 5.0 MEDIUM 9.8 CRITICAL
389 Directory Server in Red Hat Enterprise Linux Desktop 6 through 7, Red Hat Enterprise Linux HPC Node 6 through 7, Red Hat Enterprise Linux Server 6 through 7, and Red Hat Enterprise Linux Workstation 6 through 7 allows remote attackers to obtain user passwords.
CVE-2016-10841 1 Cpanel 1 Cpanel 2024-11-21 2.1 LOW 5.3 MEDIUM
The bin/mkvhostspasswd script in cPanel before 11.54.0.4 discloses password hashes (SEC-73).
CVE-2015-8346 2 Debian, Redmine 2 Debian Linux, Redmine 2024-11-21 5.0 MEDIUM 5.3 MEDIUM
app/views/timelog/_form.html.erb in Redmine before 2.6.8, 3.0.x before 3.0.6, and 3.1.x before 3.1.2 allows remote attackers to obtain sensitive information about subjects of issues by viewing the time logging form.
CVE-2014-1595 2 Apple, Mozilla 4 Mac Os X, Firefox, Firefox Esr and 1 more 2024-11-21 2.1 LOW N/A
Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, and Thunderbird before 31.3 on Apple OS X 10.10 omit a CoreGraphics disable-logging action that is needed by jemalloc-based applications, which allows local users to obtain sensitive information by reading /tmp files, as demonstrated by credential information.
CVE-2014-1591 1 Mozilla 2 Firefox, Seamonkey 2024-11-21 4.3 MEDIUM N/A
Mozilla Firefox 33.0 and SeaMonkey before 2.31 include path strings in CSP violation reports, which allows remote attackers to obtain sensitive information via a web site that receives a report after a redirect.
CVE-2024-51522 1 Huawei 1 Harmonyos 2024-11-07 N/A 5.5 MEDIUM
Vulnerability of improper device information processing in the device management module Impact: Successful exploitation of this vulnerability may affect availability.