Vulnerabilities (CVE)

Filtered by CWE-200
Total 9301 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2018-3817 1 Elastic 1 Logstash 2024-11-21 4.0 MEDIUM 6.5 MEDIUM
When logging warnings regarding deprecated settings, Logstash before 5.6.6 and 6.x before 6.1.2 could inadvertently log sensitive information.
CVE-2018-3813 1 Flir 6 Brickstream 2300 2d, Brickstream 2300 2d Firmware, Brickstream 2300 3d and 3 more 2024-11-21 5.0 MEDIUM 9.8 CRITICAL
getConfigExportFile.cgi on FLIR Brickstream 2300 devices 2.0 4.1.53.166 has Incorrect Access Control, as demonstrated by reading the AVI_USER_ID and AVI_USER_PASSWORD fields via a direct request.
CVE-2018-3809 1 Zeit 1 Serve 2024-11-21 5.0 MEDIUM 5.3 MEDIUM
Information exposure through directory listings in serve 6.5.3 allows directory listing and file access even when they have been set to be ignored.
CVE-2018-3760 3 Debian, Redhat, Sprockets Project 4 Debian Linux, Cloudforms, Enterprise Linux and 1 more 2024-11-21 5.0 MEDIUM 7.5 HIGH
There is an information leak vulnerability in Sprockets. Versions Affected: 4.0.0.beta7 and lower, 3.7.1 and lower, 2.12.4 and lower. Specially crafted requests can be used to access files that exists on the filesystem that is outside an application's root directory, when the Sprockets server is used in production. All users running an affected release should either upgrade or use one of the work arounds immediately.
CVE-2018-3665 6 Canonical, Citrix, Debian and 3 more 14 Ubuntu Linux, Xenserver, Debian Linux and 11 more 2024-11-21 4.7 MEDIUM 5.6 MEDIUM
System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially allow a local process to infer data from another process through a speculative execution side channel.
CVE-2018-3652 1 Intel 34 Atom C, Xeon, Xeon Bronze 3104 and 31 more 2024-11-21 4.6 MEDIUM 7.6 HIGH
Existing UEFI setting restrictions for DCI (Direct Connect Interface) in 5th and 6th generation Intel Xeon Processor E3 Family, Intel Xeon Scalable processors, and Intel Xeon Processor D Family allows a limited physical presence attacker to potentially access platform secrets via debug interfaces.
CVE-2018-3626 3 Intel, Linux, Microsoft 3 Sgx Sdk, Linux Kernel, Windows 2024-11-21 1.9 LOW 4.7 MEDIUM
Edger8r tool in the Intel SGX SDK before version 2.1.2 (Linux) and 1.9.6 (Windows) may generate code that is susceptible to a side channel potentially allowing a local user to access unauthorized information.
CVE-2018-3621 1 Intel 1 Driver\&support Assistant 2024-11-21 3.3 LOW 6.5 MEDIUM
Insufficient input validation in the Intel Driver & Support Assistant before 3.6.0.4 may allow an unauthenticated user to potentially enable information disclosure via adjacent access.
CVE-2018-3619 1 Intel 17 Core I3, Core I5, Core I7 and 14 more 2024-11-21 2.1 LOW 4.6 MEDIUM
Information disclosure vulnerability in storage media in systems with Intel Optane memory module with Whole Disk Encryption may allow an attacker to recover data via physical access.
CVE-2018-3598 1 Google 1 Android 2024-11-21 5.0 MEDIUM 7.5 HIGH
In Qualcomm Android for MSM, Firefox OS for MSM, and QRD Android with all Android releases from CAF using the Linux kernel before security patch level 2018-04-05, insufficient validation of parameters from userspace in the camera driver can lead to information leak and out-of-bounds access.
CVE-2018-2402 1 Sap 1 Hana 2024-11-21 3.5 LOW 7.6 HIGH
In systems using the optional capture & replay functionality of SAP HANA, 1.00 and 2.00, (see SAP Note 2362820 for more information about capture & replay), user credentials may be stored in clear text in the indexserver trace files of the control system. An attacker with the required authorizations on the control system may be able to access the user credentials and gain unauthorized access to data in the captured or target system.
CVE-2018-2026 1 Ibm 1 Financial Transaction Manager 2024-11-21 4.0 MEDIUM 4.3 MEDIUM
IBM Financial Transaction Manager 3.2.1 for Digital Payments could allow an authenticated user to obtain a directory listing of internal product files. IBM X-Force ID: 155552.
CVE-2018-2022 1 Ibm 1 Qradar Security Information And Event Manager 2024-11-21 5.0 MEDIUM 5.3 MEDIUM
IBM QRadar SIEM 7.2 and 7.3 discloses sensitive information to unauthorized users. The information can be used to mount further attacks on the system. IBM X-Force ID: 155346.
CVE-2018-2013 1 Ibm 1 Api Connect 2024-11-21 5.0 MEDIUM 5.3 MEDIUM
IBM API Connect 2018.1 through 2018.4.1.5 could disclose sensitive information to an unauthorized user that could aid in further attacks against the system. IBM X-Force ID: 155193.
CVE-2018-2011 1 Ibm 1 Api Connect 2024-11-21 5.0 MEDIUM 5.3 MEDIUM
IBM API Connect 2018.1 through 2018.4.1.5 could allow an attacker to obtain sensitive information from a specially crafted HTTP request that could aid an attacker in further attacks against the system. IBM X-Force ID: 155150.
CVE-2018-2009 1 Ibm 1 Api Connect 2024-11-21 4.0 MEDIUM 6.5 MEDIUM
IBM API Connect v2018.1 and 2018.4.1 is affected by an information disclosure vulnerability in the consumer API. Any registered user can obtain a list of all other users in all other orgs, including email id/names, etc. IBM X-Force ID: 155148.
CVE-2018-2008 1 Ibm 1 Tririga Application Platform 2024-11-21 4.0 MEDIUM 4.3 MEDIUM
IBM TRIRIGA Application Platform 3.5.3 and 3.6.0 could disclose sensitive information to an authenticated user that could aid in further attacks against the system. IBM X-Force ID: 155146.
CVE-2018-2005 1 Ibm 1 Bigfix Platform 2024-11-21 2.1 LOW 3.3 LOW
IBM BigFix Platform 9.2 and 9.5 stores potentially sensitive information in process memory that could be read by a local attacker with elevated permissions. IBM X-Force ID: 155007
CVE-2018-25081 1 Bitwarden 1 Bitwarden 2024-11-21 N/A 7.5 HIGH
Bitwarden through 2023.2.1 offers password auto-fill within a cross-domain IFRAME element. NOTE: the vendor's position is that there have been important legitimate cross-domain configurations (e.g., an apple.com IFRAME element on the icloud.com website) and that "Auto-fill on page load" is not enabled by default.
CVE-2018-25022 1 Toktok 1 Toxcore 2024-11-21 4.3 MEDIUM 3.1 LOW
The Onion module in toxcore before 0.2.2 doesn't restrict which packets can be onion-routed, which allows a remote attacker to discover a target user's IP address (when knowing only their Tox Id) by positioning themselves close to target's Tox Id in the DHT for the target to establish an onion connection with the attacker, guessing the target's DHT public key and creating a DHT node with public key close to it, and finally onion-routing a NAT Ping Request to the target, requesting it to ping the just created DHT node.