Vulnerabilities (CVE)

Filtered by CWE-200
Total 8331 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2015-8950 1 Linux 1 Linux Kernel 2025-04-12 4.3 MEDIUM 5.5 MEDIUM
arch/arm64/mm/dma-mapping.c in the Linux kernel before 4.0.3, as used in the ION subsystem in Android and other products, does not initialize certain data structures, which allows local users to obtain sensitive information from kernel memory by triggering a dma_mmap call.
CVE-2015-8280 1 Samsung 1 Web Viewer 2025-04-12 5.0 MEDIUM 7.5 HIGH
Web Viewer 1.0.0.193 on Samsung SRN-1670D devices allows remote attackers to discover credentials by reading detailed error messages.
CVE-2014-3867 1 Ibm 1 Sametime 2025-04-12 5.0 MEDIUM N/A
The Meeting Server in IBM Sametime 8.x through 8.5.2.1 and 9.x through 9.0.0.1 does not include the HTTPOnly flag in a Set-Cookie header for an unspecified cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie, a different vulnerability than CVE-2013-3984.
CVE-2015-1097 1 Apple 2 Iphone Os, Tvos 2025-04-12 1.9 LOW N/A
IOMobileFramebuffer in Apple iOS before 8.3 and Apple TV before 7.2 allows attackers to obtain sensitive information about kernel memory via a crafted app.
CVE-2015-7787 1 Asus 2 Wl-330nul, Wl-330nul Firmware 2025-04-12 3.3 LOW 4.3 MEDIUM
ASUS Japan WL-330NUL devices with firmware before 3.0.0.42 allow remote attackers to discover the WPA2-PSK passphrase via unspecified vectors.
CVE-2014-8111 1 Apache 1 Tomcat Connectors 2025-04-12 5.0 MEDIUM N/A
Apache Tomcat Connectors (mod_jk) before 1.2.41 ignores JkUnmount rules for subtrees of previous JkMount rules, which allows remote attackers to access otherwise restricted artifacts via unspecified vectors.
CVE-2015-6414 1 Cisco 1 Telepresence Video Communication Server Software 2025-04-12 2.1 LOW N/A
Cisco TelePresence Video Communication Server (VCS) X8.6 uses the same encryption key across different customers' installations, which makes it easier for local users to defeat cryptographic protection mechanisms by leveraging knowledge of a key from another installation, aka Bug ID CSCuw64516.
CVE-2016-10105 1 Piwigo 1 Piwigo 2025-04-12 7.5 HIGH 9.8 CRITICAL
admin/plugin.php in Piwigo through 2.8.3 doesn't validate the sections variable while using it to include files. This can cause information disclosure and code execution if it contains a .. sequence.
CVE-2015-6759 1 Google 1 Chrome 2025-04-12 5.0 MEDIUM N/A
The shouldTreatAsUniqueOrigin function in platform/weborigin/SecurityOrigin.cpp in Blink, as used in Google Chrome before 46.0.2490.71, does not ensure that the origin of a LocalStorage resource is considered unique, which allows remote attackers to obtain sensitive information via vectors involving a blob: URL.
CVE-2015-6661 1 Drupal 1 Drupal 2025-04-12 5.0 MEDIUM N/A
Drupal 6.x before 6.37 and 7.x before 7.39 allows remote attackers to obtain sensitive node titles by reading the menu.
CVE-2016-4620 1 Apple 1 Iphone Os 2025-04-12 4.3 MEDIUM 3.3 LOW
The Sandbox Profiles component in Apple iOS before 10 does not properly restrict access to directory metadata for SMS draft directories, which allows attackers to discover text-message recipients via a crafted app.
CVE-2015-6629 1 Google 1 Android 2025-04-12 5.0 MEDIUM N/A
Wi-Fi in Android 5.x before 5.1.1 LMY48Z allows attackers to obtain sensitive information via unspecified vectors, as demonstrated by obtaining Signature or SignatureOrSystem access, aka internal bug 22667667.
CVE-2016-6415 1 Cisco 3 Ios, Ios Xe, Ios Xr 2025-04-12 5.0 MEDIUM 7.5 HIGH
The server IKEv1 implementation in Cisco IOS 12.2 through 12.4 and 15.0 through 15.6, IOS XE through 3.18S, IOS XR 4.3.x and 5.0.x through 5.2.x, and PIX before 7.0 allows remote attackers to obtain sensitive information from device memory via a Security Association (SA) negotiation request, aka Bug IDs CSCvb29204 and CSCvb36055 or BENIGNCERTAIN.
CVE-2015-5738 2 F5, Marvell 5 Traffix Signaling Delivery Controller, Octeon Ii Cn6000, Octeon Ii Cn6010 and 2 more 2025-04-12 5.0 MEDIUM 7.5 HIGH
The RSA-CRT implementation in the Cavium Software Development Kit (SDK) 2.x, when used on OCTEON II CN6xxx Hardware on Linux to support TLS with Perfect Forward Secrecy (PFS), makes it easier for remote attackers to obtain private RSA keys by conducting a Lenstra side-channel attack.
CVE-2015-5863 1 Apple 3 Iphone Os, Mac Os X, Watchos 2025-04-12 2.1 LOW N/A
IOStorageFamily in Apple iOS before 9 does not properly initialize an unspecified data structure, which allows local users to obtain sensitive information from kernel memory via unknown vectors.
CVE-2016-1618 1 Google 1 Chrome 2025-04-12 4.3 MEDIUM 6.5 MEDIUM
Blink, as used in Google Chrome before 48.0.2564.82, does not ensure that a proper cryptographicallyRandomValues random number generator is used, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors.
CVE-2014-9576 1 Vdgsecurity 1 Vdg Sense 2025-04-12 5.0 MEDIUM N/A
VDG Security SENSE (formerly DIVA) 2.3.13 has a hardcoded password of (1) ArpaRomaWi for the root Postgres account and !DVService for the (2) postgres and (3) NTP Windows user accounts, which allows remote attackers to obtain access.
CVE-2015-2913 1 Orientdb 1 Orientdb 2025-04-12 4.3 MEDIUM 5.9 MEDIUM
server/network/protocol/http/OHttpSessionManager.java in the Studio component in OrientDB Server Community Edition before 2.0.15 and 2.1.x before 2.1.1 improperly relies on the java.util.Random class for generation of random Session ID values, which makes it easier for remote attackers to predict a value by determining the internal state of the PRNG in this class.
CVE-2016-6685 1 Google 1 Android 2025-04-12 4.3 MEDIUM 5.5 MEDIUM
The kernel in Android before 2016-10-05 on Nexus 6P devices allows attackers to obtain sensitive information via a crafted application, aka internal bug 30402628.
CVE-2016-0790 2 Jenkins, Redhat 2 Jenkins, Openshift 2025-04-12 5.0 MEDIUM 5.3 MEDIUM
Jenkins before 1.650 and LTS before 1.642.2 do not use a constant-time algorithm to verify API tokens, which makes it easier for remote attackers to determine API tokens via a brute-force approach.