Vulnerabilities (CVE)

Filtered by CWE-319
Total 703 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2018-11402 1 Simplisafe 2 U9k-kp1000, U9k-kp1000 Firmware 2024-11-21 1.9 LOW 6.6 MEDIUM
SimpliSafe Original has Unencrypted Keypad Transmissions, which allows physically proximate attackers to discover the PIN.
CVE-2018-11399 1 Simplisafe 8 U9k-es1000, U9k-es1000 Firmware, U9k-kr1 and 5 more 2024-11-21 1.9 LOW 4.3 MEDIUM
SimpliSafe Original has Unencrypted Sensor Transmissions, which allows physically proximate attackers to obtain potentially sensitive information about the specific times when alarm-system events occur.
CVE-2018-11338 1 Intuit 1 Lacerte 2024-11-21 5.0 MEDIUM 7.5 HIGH
Intuit Lacerte 2017 for Windows in a client/server environment transfers the entire customer list in cleartext over SMB, which allows attackers to (1) obtain sensitive information by sniffing the network or (2) conduct man-in-the-middle (MITM) attacks via unspecified vectors. The customer list contains each customer's full name, social security number (SSN), address, job title, phone number, Email address, spouse's phone/Email address, and other sensitive information. After the client software authenticates to the server database, the server sends the customer list. There is no need for further exploitation as all sensitive data is exposed. This vulnerability was validated on Intuit Lacerte 2017, however older versions of Lacerte may be vulnerable.
CVE-2018-11050 1 Dell 1 Emc Networker 2024-11-21 3.3 LOW 8.8 HIGH
Dell EMC NetWorker versions between 9.0 and 9.1.1.8 through 9.2.1.3, and the version 18.1.0.1 contain a Clear-Text authentication over network vulnerability in the Rabbit MQ Advanced Message Queuing Protocol (AMQP) component. User credentials are sent unencrypted to the remote AMQP service. An unauthenticated attacker in the same network collision domain, could potentially sniff the password from the network and use it to access the component using the privileges of the compromised user.
CVE-2017-8154 1 Huawei 2 Honor 8 Lite, Honor 8 Lite Firmware 2024-11-21 2.6 LOW 5.3 MEDIUM
The Themes App Honor 8 Lite Huawei mobile phones with software of versions before Prague-L31C576B172, versions before Prague-L31C530B160, versions before Prague-L31C432B180 has a man-in-the-middle (MITM) vulnerability due to the use of the insecure HTTP protocol for theme download. An attacker may exploit this vulnerability to tamper with downloaded themes.
CVE-2017-7252 1 Botan Project 1 Botan 2024-11-21 N/A 7.5 HIGH
bcrypt password hashing in Botan before 2.1.0 does not correctly handle passwords with a length between 57 and 72 characters, which makes it easier for attackers to determine the cleartext password.
CVE-2017-20109 1 Calabrio 1 Teleopti Workforce Management 2024-11-21 4.0 MEDIUM 4.3 MEDIUM
A vulnerability classified as problematic was found in Teleopti WFM up to 7.1.0. Affected by this vulnerability is an unknown functionality of the file /TeleoptiWFM/Administration/GetOneTenant of the component Administration. The manipulation leads to information disclosure (Credentials). The attack can be launched remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue.
CVE-2017-16041 1 Ikst Project 1 Ikst 2024-11-21 4.3 MEDIUM 5.9 MEDIUM
ikst versions before 1.1.2 download resources over HTTP, which leaves it vulnerable to MITM attacks.
CVE-2017-16040 1 Gfe-sass Project 1 Gfe-sass 2024-11-21 9.3 HIGH 8.1 HIGH
gfe-sass is a library for promises (CommonJS/Promises/A,B,D) gfe-sass downloads resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested resources with an attacker controlled copy if the attacker is on the network or positioned in between the user and the remote server.
CVE-2017-16035 1 Hubspot 1 Hubl-server 2024-11-21 9.3 HIGH 8.1 HIGH
The hubl-server module is a wrapper for the HubL Development Server. During installation hubl-server downloads a set of dependencies from api.hubapi.com. It appears in the code that these files are downloaded over HTTPS however the api.hubapi.com endpoint redirects to a HTTP url. Because of this behavior an attacker with the ability to man-in-the-middle a developer or system performing a package installation could compromise the integrity of the installation.
CVE-2017-12716 1 Abbott 8 Accent, Accent Firmware, Accent Mri and 5 more 2024-11-21 3.3 LOW 6.5 MEDIUM
Abbott Laboratories Accent and Anthem pacemakers manufactured prior to Aug 28, 2017 transmit unencrypted patient information via RF communications to programmers and home monitoring units. Additionally, the Accent and Anthem pacemakers store the optional patient information without encryption. CVSS v3 base score: 3.1, CVSS vector string: AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N. Abbott has developed a firmware update to help mitigate the identified vulnerabilities.
CVE-2017-12310 1 Cisco 1 Spark Hybrid Calendar Service 2024-11-21 5.0 MEDIUM 7.5 HIGH
A vulnerability in the auto discovery phase of Cisco Spark Hybrid Calendar Service could allow an unauthenticated, remote attacker to view sensitive information in the unencrypted headers of an HTTP method request. The attacker could use this information to conduct additional reconnaissance attacks leading to the disclosure of sensitive customer data. The vulnerability exists in the auto discovery phase because an unencrypted HTTP request is made due to requirements for implementing the Hybrid Calendar service. An attacker could exploit this vulnerability by monitoring the unencrypted traffic on the network. An exploit could allow the attacker to access sensitive customer data belonging to Office365 users, such as email and calendar events. Cisco Bug IDs: CSCvg35593.
CVE-2017-0925 2 Debian, Gitlab 2 Debian Linux, Gitlab 2024-11-21 4.0 MEDIUM 7.2 HIGH
Gitlab Enterprise Edition version 10.1.0 is vulnerable to an insufficiently protected credential issue in the project service integration API endpoint resulting in an information disclosure of plaintext password.
CVE-2015-7542 3 Aquamaniac, Debian, Opensuse 3 Gwenhywfar, Debian Linux, Leap 2024-11-21 5.0 MEDIUM 5.3 MEDIUM
A vulnerability exists in libgwenhywfar through 4.12.0 due to the usage of outdated bundled CA certificates.
CVE-2014-5380 1 Granding 2 Grand Ma300, Grand Ma300 Firmware 2024-11-21 5.0 MEDIUM 7.5 HIGH
Grand MA 300 allows retrieval of the access PIN from sniffed data.
CVE-2012-5562 1 Redhat 1 Satellite 2024-11-21 3.3 LOW 6.5 MEDIUM
rhn-proxy: may transmit credentials over clear-text when accessing RHN Satellite
CVE-2012-1257 1 Pidgin 1 Pidgin 2024-11-21 2.1 LOW 5.5 MEDIUM
Pidgin 2.10.0 uses DBUS for certain cleartext communication, which allows local users to obtain sensitive information via a dbus session monitor.
CVE-2010-4177 2 Fedoraproject, Oracle 2 Fedora, Mysql-gui-tools 2024-11-21 2.1 LOW 5.5 MEDIUM
mysql-gui-tools (mysql-query-browser and mysql-admin) before 5.0r14+openSUSE-2.3 exposes the password of a user connected to the MySQL server in clear text form via the list of running processes.
CVE-2003-5002 1 Ibm 1 Iss Blackice Pc Protection 2024-11-20 5.0 MEDIUM 3.7 LOW
A vulnerability was found in ISS BlackICE PC Protection. It has been declared as problematic. Affected by this vulnerability is the component Update Handler which allows cleartext transmission of data. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
CVE-2024-28169 2024-11-15 N/A 5.4 MEDIUM
Cleartext transmission of sensitive information for some BigDL software maintained by Intel(R) before version 2.5.0 may allow an authenticated user to potentially enable denial of service via adjacent access.