Vulnerabilities (CVE)

Filtered by CWE-199
Total 7 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2016-5405 1 Redhat 4 Enterprise Linux Desktop, Enterprise Linux Hpc Node, Enterprise Linux Server and 1 more 2025-04-20 5.0 MEDIUM 9.8 CRITICAL
389 Directory Server in Red Hat Enterprise Linux Desktop 6 through 7, Red Hat Enterprise Linux HPC Node 6 through 7, Red Hat Enterprise Linux Server 6 through 7, and Red Hat Enterprise Linux Workstation 6 through 7 allows remote attackers to obtain user passwords.
CVE-2014-1595 2 Apple, Mozilla 4 Mac Os X, Firefox, Firefox Esr and 1 more 2025-04-12 2.1 LOW N/A
Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, and Thunderbird before 31.3 on Apple OS X 10.10 omit a CoreGraphics disable-logging action that is needed by jemalloc-based applications, which allows local users to obtain sensitive information by reading /tmp files, as demonstrated by credential information.
CVE-2014-1591 1 Mozilla 2 Firefox, Seamonkey 2025-04-12 4.3 MEDIUM N/A
Mozilla Firefox 33.0 and SeaMonkey before 2.31 include path strings in CSP violation reports, which allows remote attackers to obtain sensitive information via a web site that receives a report after a redirect.
CVE-2016-5486 1 Oracle 1 Sun Zfs Storage Appliance Kit 2025-04-12 4.9 MEDIUM 5.5 MEDIUM
Unspecified vulnerability in the Sun ZFS Storage Appliance Kit (AK) component in Oracle Sun Systems Products Suite AK 2013 allows local users to affect confidentiality via vectors related to Core Services.
CVE-2015-8346 2 Debian, Redmine 2 Debian Linux, Redmine 2025-04-12 5.0 MEDIUM 5.3 MEDIUM
app/views/timelog/_form.html.erb in Redmine before 2.6.8, 3.0.x before 3.0.6, and 3.1.x before 3.1.2 allows remote attackers to obtain sensitive information about subjects of issues by viewing the time logging form.
CVE-2016-10841 1 Cpanel 1 Cpanel 2024-11-21 2.1 LOW 5.3 MEDIUM
The bin/mkvhostspasswd script in cPanel before 11.54.0.4 discloses password hashes (SEC-73).
CVE-2024-51522 1 Huawei 1 Harmonyos 2024-11-07 N/A 6.2 MEDIUM
Vulnerability of improper device information processing in the device management module Impact: Successful exploitation of this vulnerability may affect availability.