Total
8254 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2016-8294 | 1 Oracle | 1 Peoplesoft Enterprise Peopletools | 2024-02-04 | 4.0 MEDIUM | 4.3 MEDIUM |
Unspecified vulnerability in the PeopleSoft Enterprise PeopleTools component in Oracle PeopleSoft Products 8.54 and 8.55 allows remote authenticated users to affect confidentiality via unknown vectors. | |||||
CVE-2016-0287 | 2 Ibm, Microsoft | 2 I Access, Windows | 2024-02-04 | 2.1 LOW | 7.8 HIGH |
IBM i Access 7.1 on Windows allows local users to discover registry passwords via unspecified vectors. | |||||
CVE-2016-3688 | 1 Dotcms | 1 Dotcms | 2024-02-04 | 4.0 MEDIUM | 6.5 MEDIUM |
SQL injection vulnerability in dotCMS before 3.5 allows remote administrators to execute arbitrary SQL commands via the c0-e3 parameter to dwr/call/plaincall/UserAjax.getUsersList.dwr. | |||||
CVE-2015-1967 | 1 Ibm | 1 Websphere Mq | 2024-02-04 | 4.3 MEDIUM | N/A |
MQ Explorer in IBM WebSphere MQ before 8.0.0.3 does not recognize the absence of the compatibility-mode option, which allows remote attackers to obtain sensitive information by sniffing the network for a session in which TLS is not used. | |||||
CVE-2015-8487 | 1 Cybozu | 1 Office | 2024-02-04 | 2.6 LOW | 4.3 MEDIUM |
Cybozu Office 9.0.0 through 10.3 allows remote attackers to discover CSRF tokens via unspecified vectors, a different vulnerability than CVE-2015-8488. | |||||
CVE-2016-3261 | 1 Microsoft | 1 Internet Explorer | 2024-02-04 | 2.6 LOW | 5.3 MEDIUM |
Microsoft Internet Explorer 11 allows remote attackers to obtain sensitive information via a crafted web site, aka "Internet Explorer Information Disclosure Vulnerability." | |||||
CVE-2015-3677 | 1 Apple | 1 Mac Os X | 2024-02-04 | 4.3 MEDIUM | N/A |
The LZVN compression feature in AppleFSCompression in Apple OS X before 10.10.4 allows attackers to obtain sensitive memory-layout information for the kernel via a crafted app. | |||||
CVE-2015-7528 | 2 Kubernetes, Redhat | 2 Kubernetes, Openshift | 2024-02-04 | 5.0 MEDIUM | 5.3 MEDIUM |
Kubernetes before 1.2.0-alpha.5 allows remote attackers to read arbitrary pod logs via a container name. | |||||
CVE-2016-2183 | 6 Cisco, Nodejs, Openssl and 3 more | 9 Content Security Management Appliance, Node.js, Openssl and 6 more | 2024-02-04 | 5.0 MEDIUM | 7.5 HIGH |
The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a "Sweet32" attack. | |||||
CVE-2016-8871 | 1 Botan Project | 1 Botan | 2024-02-04 | 2.1 LOW | 6.2 MEDIUM |
In Botan 1.11.29 through 1.11.32, RSA decryption with certain padding options had a detectable timing channel which could given sufficient queries be used to recover plaintext, aka an "OAEP side channel" attack. | |||||
CVE-2015-6630 | 1 Google | 1 Android | 2024-02-04 | 4.3 MEDIUM | N/A |
SystemUI in Android 5.x before 5.1.1 LMY48Z and 6.0 before 2015-12-01 allows attackers to read screenshots and consequently gain privileges via a crafted application, aka internal bug 19121797. | |||||
CVE-2016-0090 | 1 Microsoft | 3 Windows 10, Windows 8.1, Windows Server 2012 | 2024-02-04 | 2.1 LOW | 7.1 HIGH |
Hyper-V in Microsoft Windows 8.1, Windows Server 2012 R2, and Windows 10 allows guest OS users to obtain sensitive information from host OS memory via a crafted application, aka "Hyper-V Information Disclosure Vulnerability." | |||||
CVE-2016-5172 | 1 Google | 1 Chrome | 2024-02-04 | 4.3 MEDIUM | 6.5 MEDIUM |
The parser in Google V8, as used in Google Chrome before 53.0.2785.113, mishandles scopes, which allows remote attackers to obtain sensitive information from arbitrary memory locations via crafted JavaScript code. | |||||
CVE-2016-5812 | 1 Moxa | 7 Oncell G3001 Firmware, Oncell G3100v2, Oncell G3100v2 Firmware and 4 more | 2024-02-04 | 2.1 LOW | 3.3 LOW |
Moxa OnCell G3100V2 devices before 2.8 and G3111, G3151, G3211, and G3251 devices before 1.7 use cleartext password storage, which makes it easier for local users to obtain sensitive information by reading a configuration file. | |||||
CVE-2015-7935 | 1 Motorola | 1 Moscad Ip Gateway Firmware | 2024-02-04 | 5.0 MEDIUM | 7.5 HIGH |
Motorola Solutions MOSCAD IP Gateway allows remote attackers to read arbitrary files via unspecified vectors. | |||||
CVE-2015-6641 | 1 Google | 1 Android | 2024-02-04 | 2.9 LOW | 3.1 LOW |
Bluetooth in Android 6.0 before 2016-01-01 allows remote attackers to obtain sensitive Contacts information by leveraging pairing, aka internal bug 23607427. | |||||
CVE-2016-4482 | 4 Canonical, Fedoraproject, Linux and 1 more | 11 Ubuntu Linux, Fedora, Linux Kernel and 8 more | 2024-02-04 | 2.1 LOW | 6.2 MEDIUM |
The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel through 4.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call. | |||||
CVE-2016-3648 | 1 Symantec | 1 Endpoint Protection Manager | 2024-02-04 | 4.0 MEDIUM | 8.8 HIGH |
Symantec Endpoint Protection Manager (SEPM) 12.1 before RU6 MP5 allows remote authenticated users to bypass the Authentication Lock protection mechanism, and conduct brute-force password-guessing attacks against management-console accounts, by entering data into the authorization window. | |||||
CVE-2015-3721 | 1 Apple | 2 Iphone Os, Mac Os X | 2024-02-04 | 4.3 MEDIUM | N/A |
The kernel in Apple iOS before 8.4 and OS X before 10.10.4 does not properly handle HFS parameters, which allows attackers to obtain sensitive memory-layout information via a crafted app. | |||||
CVE-2015-5310 | 1 Google | 1 Android | 2024-02-04 | 3.3 LOW | 4.3 MEDIUM |
The WNM Sleep Mode code in wpa_supplicant 2.x before 2.6 does not properly ignore key data in response frames when management frame protection (MFP) was not negotiated, which allows remote attackers to inject arbitrary broadcast or multicast packets or cause a denial of service (ignored packets) via a WNM Sleep Mode response. |