Vulnerabilities (CVE)

Filtered by CWE-200
Total 9148 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2016-3158 3 Fedoraproject, Oracle, Xen 3 Fedora, Vm Server, Xen 2025-04-12 1.7 LOW 3.8 LOW
The xrstor function in arch/x86/xstate.c in Xen 4.x does not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allows local guest OS users to obtain sensitive register content information from another guest by leveraging pending exception and mask bits. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-2076.
CVE-2015-8488 1 Cybozu 1 Office 2025-04-12 4.3 MEDIUM 4.3 MEDIUM
Cybozu Office 10.3.0 allows remote attackers to read image files via a crafted e-mail message, a different vulnerability than CVE-2015-8487.
CVE-2015-7915 1 Sauter 1 Moduweb Vision 2025-04-12 10.0 HIGH 9.8 CRITICAL
Sauter EY-WS505F0x0 moduWeb Vision before 1.6.0 sends cleartext credentials, which allows remote attackers to obtain sensitive information by sniffing the network.
CVE-2015-1116 1 Apple 1 Iphone Os 2025-04-12 2.1 LOW N/A
The UIKit View component in Apple iOS before 8.3 displays unblurred application snapshots in the Task Switcher, which makes it easier for physically proximate attackers to obtain sensitive information by reading the device screen.
CVE-2016-5709 1 Solarwinds 1 Virtualization Manager 2025-04-12 1.9 LOW 4.7 MEDIUM
SolarWinds Virtualization Manager 6.3.1 and earlier uses weak encryption to store passwords in /etc/shadow, which allows local users with superuser privileges to obtain user passwords via a brute force attack.
CVE-2014-4311 1 Epicor 1 Epicor Enterprise 2025-04-12 5.0 MEDIUM N/A
Epicor Enterprise 7.4 before FS74SP6_HotfixTL054181 allows attackers to obtain the (1) Database Connection and (2) E-mail Connection passwords by reading HTML source code of the database connection and email settings page.
CVE-2015-5730 1 Wordpress 1 Wordpress 2025-04-12 5.0 MEDIUM N/A
The sanitize_widget_instance function in wp-includes/class-wp-customize-widgets.php in WordPress before 4.2.4 does not use a constant-time comparison for widgets, which allows remote attackers to conduct a timing side-channel attack by measuring the delay before inequality is calculated.
CVE-2016-0259 1 Ibm 1 Websphere Mq 2025-04-12 2.1 LOW 2.5 LOW
runmqsc in IBM WebSphere MQ 8.x before 8.0.0.5 allows local users to bypass an intended +dsp authority requirement and obtain sensitive information via unspecified display commands.
CVE-2016-0287 2 Ibm, Microsoft 2 I Access, Windows 2025-04-12 2.1 LOW 7.8 HIGH
IBM i Access 7.1 on Windows allows local users to discover registry passwords via unspecified vectors.
CVE-2015-8553 2 Redhat, Xen 2 Enterprise Linux, Xen 2025-04-12 2.1 LOW 6.5 MEDIUM
Xen allows guest OS users to obtain sensitive information from uninitialized locations in host OS kernel memory by not enabling memory and I/O decoding control bits. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-0777.
CVE-2015-5073 2 Ibm, Pcre 2 Powerkvm, Pcre 2025-04-12 6.4 MEDIUM 9.1 CRITICAL
Heap-based buffer overflow in the find_fixedlength function in pcre_compile.c in PCRE before 8.38 allows remote attackers to cause a denial of service (crash) or obtain sensitive information from heap memory and possibly bypass the ASLR protection mechanism via a crafted regular expression with an excess closing parenthesis.
CVE-2016-1992 1 Hp 2 Enterprise Security Manager, Enterprise Security Manager Express 2025-04-12 4.0 MEDIUM 6.5 MEDIUM
HPE ArcSight ESM before 6.8c, and ArcSight ESM Express before 6.9.1, allows remote authenticated users to obtain sensitive information via unspecified vectors.
CVE-2016-2999 1 Ibm 1 Connections 2025-04-12 4.0 MEDIUM 6.5 MEDIUM
IBM Connections 4.x through 4.5 CR5, 5.0 before CR4, and 5.5 before CR1 allows remote authenticated users to obtain sensitive information via an unspecified brute-force attack.
CVE-2015-7548 1 Openstack 1 Nova 2025-04-12 2.1 LOW 3.5 LOW
OpenStack Compute (Nova) before 2015.1.3 (kilo) and 12.0.x before 12.0.1 (liberty), when using libvirt to spawn instances and use_cow_images is set to false, allow remote authenticated users to read arbitrary files by overwriting an instance disk with a crafted image and requesting a snapshot.
CVE-2016-3371 1 Microsoft 7 Windows 10, Windows 7, Windows 8.1 and 4 more 2025-04-12 4.3 MEDIUM 5.5 MEDIUM
The kernel API in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold, 1511, and 1607 does not properly enforce permissions, which allows local users to obtain sensitive information via a crafted application, aka "Windows Kernel Elevation of Privilege Vulnerability."
CVE-2014-3851 1 Pyplate 1 Pyplate 2025-04-12 2.1 LOW N/A
usr/lib/cgi-bin/create_passwd_file.py in Pyplate 0.08 uses world-readable permissions for passwd.db, which allows local users to obtain the administrator password by reading this file.
CVE-2016-1677 6 Canonical, Debian, Google and 3 more 10 Ubuntu Linux, Debian Linux, Chrome and 7 more 2025-04-12 4.3 MEDIUM 6.5 MEDIUM
uri.js in Google V8 before 5.1.281.26, as used in Google Chrome before 51.0.2704.63, uses an incorrect array type, which allows remote attackers to obtain sensitive information by calling the decodeURI function and leveraging "type confusion."
CVE-2016-2513 1 Djangoproject 1 Django 2025-04-12 2.6 LOW 3.1 LOW
The password hasher in contrib/auth/hashers.py in Django before 1.8.10 and 1.9.x before 1.9.3 allows remote attackers to enumerate users via a timing attack involving login requests.
CVE-2016-0397 1 Ibm 1 Bigfix Webreports 2025-04-12 4.3 MEDIUM 5.9 MEDIUM
WebReports in IBM BigFix Platform (formerly Tivoli Endpoint Manager) 9.x before 9.5.2 allows remote attackers to obtain sensitive information by sniffing the network for HTTP traffic.
CVE-2015-8602 1 Token Insert Entity Project 1 Token Insert Entity 2025-04-12 3.5 LOW N/A
The Token Insert Entity module 7.x-1.x before 7.x-1.1 for Drupal does not properly check permissions, which allows remote authenticated users with certain permissions to bypass intended access restrictions and possibly obtain sensitive information by inserting a token, which embeds a rendered entity in the main node.