Vulnerabilities (CVE)

Filtered by CWE-200
Total 8253 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2016-3273 1 Microsoft 2 Edge, Internet Explorer 2024-02-04 2.6 LOW 5.3 MEDIUM
The XSS Filter in Microsoft Internet Explorer 9 through 11 and Microsoft Edge does not properly restrict JavaScript code, which allows remote attackers to obtain sensitive information via a crafted web site, aka "Microsoft Browser Information Disclosure Vulnerability."
CVE-2015-3412 2 Php, Redhat 8 Php, Enterprise Linux, Enterprise Linux Desktop and 5 more 2024-02-04 5.0 MEDIUM 5.3 MEDIUM
PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 does not ensure that pathnames lack %00 sequences, which might allow remote attackers to read arbitrary files via crafted input to an application that calls the stream_resolve_include_path function in ext/standard/streamsfuncs.c, as demonstrated by a filename\0.extension attack that bypasses an intended configuration in which client users may read files with only one specific extension.
CVE-2015-5781 1 Apple 2 Iphone Os, Mac Os X 2024-02-04 4.3 MEDIUM N/A
ImageIO in Apple iOS before 8.4.1 and OS X before 10.10.5 does not properly initialize an unspecified data structure, which allows remote attackers to obtain sensitive information from process memory via a crafted PNG image.
CVE-2015-3284 1 Openafs 1 Openafs 2024-02-04 2.1 LOW N/A
pioctls in OpenAFS 1.6.x before 1.6.13 allows local users to read kernel memory via crafted commands.
CVE-2016-3267 1 Microsoft 2 Edge, Internet Explorer 2024-02-04 4.3 MEDIUM 5.3 MEDIUM
Microsoft Internet Explorer 9 through 11 and Microsoft Edge allow remote attackers to determine the existence of unspecified files via a crafted web site, aka "Microsoft Browser Information Disclosure Vulnerability."
CVE-2016-1853 1 Apple 1 Mac Os X 2024-02-04 5.0 MEDIUM 7.5 HIGH
Tcl in Apple OS X before 10.11.5 allows remote attackers to obtain sensitive information by leveraging SSLv2 support.
CVE-2015-1686 1 Microsoft 2 Internet Explorer, Vbscript 2024-02-04 4.3 MEDIUM N/A
The Microsoft (1) VBScript 5.6 through 5.8 and (2) JScript 5.6 through 5.8 engines, as used in Internet Explorer 8 through 11 and other products, allow remote attackers to bypass the ASLR protection mechanism via a crafted web site, aka "VBScript and JScript ASLR Bypass."
CVE-2015-4989 1 Ibm 1 Tealeaf Customer Experience 2024-02-04 5.0 MEDIUM 3.7 LOW
The portal in IBM Tealeaf Customer Experience before 8.7.1.8814, 8.8 before 8.8.0.9026, 9.0.0, 9.0.0A, 9.0.1 before 9.0.1.1083, 9.0.1A before 9.0.1.5073, 9.0.2 before 9.0.2.1095, and 9.0.2A before 9.0.2.5144 allows remote attackers to read arbitrary charts by specifying an internal chart name.
CVE-2015-6114 1 Microsoft 1 Silverlight 2024-02-04 4.3 MEDIUM N/A
Microsoft Silverlight 5 before 5.1.41105.00 allows remote attackers to bypass the ASLR protection mechanism via a crafted web site, aka "Microsoft Silverlight Information Disclosure Vulnerability," a different vulnerability than CVE-2015-6165.
CVE-2015-4395 1 Hybridauth Social Login Project 1 Hybridauth Social Login 2024-02-04 3.5 LOW N/A
The HybridAuth Social Login module 7.x-2.x before 7.x-2.10 for Drupal stores passwords in plaintext when the "Ask user for a password when registering" option is enabled, which allows remote authenticated users with certain permissions to obtain sensitive information by leveraging access to the database.
CVE-2015-5491 1 Dynamic Display Block Project 1 Dynamic Display Block 2024-02-04 3.5 LOW N/A
The Dynamic display block module 7.x-1.x before 7.x-1.1 for Drupal allows remote authenticated users to bypass intended access restrictions and read sensitive titles by leveraging the "administer ddblock" permission.
CVE-2015-6551 1 Veritas 2 Netbackup, Netbackup Appliance 2024-02-04 4.3 MEDIUM 5.9 MEDIUM
Veritas NetBackup 7.x through 7.5.0.7 and 7.6.0.x through 7.6.0.4 and NetBackup Appliance through 2.5.4 and 2.6.0.x through 2.6.0.4 do not use TLS for administration-console traffic to the NBU server, which allows remote attackers to obtain sensitive information by sniffing the network for key-exchange packets.
CVE-2015-7314 1 Gollum Project 1 Gollum 2024-02-04 4.3 MEDIUM N/A
The Precious module in gollum before 4.0.1 allows remote attackers to read arbitrary files by leveraging the lack of a certain temporary-file check.
CVE-2016-7152 5 Apple, Google, Microsoft and 2 more 6 Safari, Chrome, Edge and 3 more 2024-02-04 5.0 MEDIUM 5.3 MEDIUM
The HTTPS protocol does not consider the role of the TCP congestion window in providing information about content length, which makes it easier for remote attackers to obtain cleartext data by leveraging a web-browser configuration in which third-party cookies are sent, aka a "HEIST" attack.
CVE-2016-3834 1 Google 1 Android 2024-02-04 4.3 MEDIUM 5.5 MEDIUM
The camera APIs in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-08-01 allow attackers to bypass intended access restrictions and obtain sensitive information about ANW buffer addresses via a crafted application, aka internal bug 28466701.
CVE-2015-7511 3 Canonical, Debian, Gnupg 3 Ubuntu Linux, Debian Linux, Libgcrypt 2024-02-04 1.9 LOW 2.0 LOW
Libgcrypt before 1.6.5 does not properly perform elliptic-point curve multiplication during decryption, which makes it easier for physically proximate attackers to extract ECDH keys by measuring electromagnetic emanations.
CVE-2016-5946 1 Ibm 2 Spectrum Control, Tivoli Storage Productivity Center 2024-02-04 4.0 MEDIUM 6.5 MEDIUM
Directory traversal vulnerability in IBM Spectrum Control (formerly Tivoli Storage Productivity Center) 5.2.x before 5.2.11 allows remote authenticated users to read arbitrary files via a .. (dot dot) in a URL.
CVE-2015-1000008 1 Mp3-jplayer Project 1 Mp3-jplayer 2024-02-04 5.0 MEDIUM 5.3 MEDIUM
Path Disclosure Vulnerability in wordpress plugin MP3-jPlayer v2.3.2
CVE-2016-3325 1 Microsoft 2 Edge, Internet Explorer 2024-02-04 2.6 LOW 3.1 LOW
Microsoft Internet Explorer 11 and Microsoft Edge allow remote attackers to obtain sensitive information via a crafted web site, aka "Microsoft Browser Information Disclosure Vulnerability."
CVE-2015-5317 2 Jenkins, Redhat 2 Jenkins, Openshift 2024-02-04 5.0 MEDIUM N/A
The Fingerprints pages in Jenkins before 1.638 and LTS before 1.625.2 might allow remote attackers to obtain sensitive job and build name information via a direct request.