Vulnerabilities (CVE)

Filtered by CWE-200
Total 8242 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2013-4165 1 Bitcoin 1 Bitcoin Core 2024-02-04 4.3 MEDIUM N/A
The HTTPAuthorized function in bitcoinrpc.cpp in bitcoind 0.8.1 provides information about authentication failure upon detecting the first incorrect byte of a password, which makes it easier for remote attackers to determine passwords via a timing side-channel attack.
CVE-2012-3718 1 Apple 2 Mac Os X, Mac Os X Server 2024-02-04 2.1 LOW N/A
Apple Mac OS X before 10.7.5 and 10.8.x before 10.8.2 allows local users to read passwords entered into Login Window (aka LoginWindow) or Screen Saver Unlock by installing an input method that intercepts keystrokes.
CVE-2013-6237 1 Islonline 2 Isl Desktop Plugin, Isl Light 2024-02-04 3.5 LOW N/A
The ISL Desktop plugin for Windows before 1.4.7 for ISL Light 3.5.4 and earlier allows remote authenticated users to obtain sensitive information by pasting the clipboard contents that have been copied by another user in the session.
CVE-2012-2422 1 Intuit 1 Quickbooks 2024-02-04 2.9 LOW N/A
Intuit QuickBooks 2009 through 2012 might allow remote attackers to obtain pathname information via the qbwc://docontrol/GetCompanyFile functionality.
CVE-2012-1926 1 Opera 1 Opera Browser 2024-02-04 5.0 MEDIUM N/A
Opera before 11.62 allows remote attackers to bypass the Same Origin Policy via the (1) history.pushState and (2) history.replaceState functions in conjunction with cross-domain frames, leading to unintended read access to history.state information.
CVE-2012-6325 1 Vmware 1 Vcenter Server Appliance 2024-02-04 4.0 MEDIUM N/A
VMware vCenter Server Appliance (vCSA) 5.0 before Update 2 does not properly parse XML documents, which allows remote authenticated users to read arbitrary files via unspecified vectors.
CVE-2013-6791 1 Microsoft 1 Enhanced Mitigation Experience Toolkit 2024-02-04 4.3 MEDIUM N/A
Microsoft Enhanced Mitigation Experience Toolkit (EMET) before 4.0 uses predictable addresses for hooked functions, which makes it easier for context-dependent attackers to defeat the ASLR protection mechanism via a return-oriented programming (ROP) attack.
CVE-2012-4411 1 Xen 1 Xen 2024-02-04 4.6 MEDIUM N/A
The graphical console in Xen 4.0, 4.1 and 4.2 allows local OS guest administrators to obtain sensitive host resource information via the qemu monitor. NOTE: this might be a duplicate of CVE-2007-0998.
CVE-2011-4283 1 Moodle 1 Moodle 2024-02-04 5.0 MEDIUM N/A
Moodle 1.9.x before 1.9.11 and 2.0.x before 2.0.2 places an IMS enterprise enrolment file in the course-files area, which allows remote attackers to obtain sensitive information via a request for imsenterprise-enrol.xml.
CVE-2013-3597 1 Searchblox 1 Searchblox 2024-02-04 5.0 MEDIUM N/A
servlet/CollectionListServlet in SearchBlox before 7.5 build 1 allows remote attackers to read usernames and passwords via a getList action.
CVE-2013-6832 1 Freebsd 1 Freebsd 2024-02-04 4.9 MEDIUM N/A
The nand_ioctl function in sys/dev/nand/nand_geom.c in the nand driver in the kernel in FreeBSD 10 and earlier does not properly initialize a certain data structure, which allows local users to obtain sensitive information from kernel memory via a crafted ioctl call.
CVE-2013-0558 1 Ibm 2 Sterling B2b Integrator, Sterling File Gateway 2024-02-04 5.0 MEDIUM N/A
IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote attackers to obtain sensitive information about application implementation via unspecified vectors.
CVE-2013-4569 1 Mediawiki 1 Mediawiki 2024-02-04 4.3 MEDIUM N/A
The CleanChanges extension for MediaWiki before 1.19.9, 1.20.x before 1.20.8, and 1.21.x before 1.21.3, when "Group changes by page in recent changes and watchlist" is enabled, allows remote attackers to obtain sensitive information (revision-deleted IPs) via the Recent Changes page.
CVE-2013-2322 1 Hp 1 Nonstop Sql\/mx 2024-02-04 3.5 LOW N/A
HP SQL/MX 3.2 and earlier on NonStop servers, when SQL/MP Objects are used, allows remote authenticated users to obtain sensitive information via unspecified vectors, aka the "SQL/MP index" issue.
CVE-2013-1835 1 Moodle 1 Moodle 2024-02-04 3.5 LOW N/A
Moodle 2.x through 2.1.10, 2.2.x before 2.2.8, 2.3.x before 2.3.5, and 2.4.x before 2.4.2 allows remote authenticated administrators to obtain sensitive information from the external repositories of arbitrary users by leveraging the login_as feature.
CVE-2012-5615 2 Mariadb, Oracle 2 Mariadb, Mysql 2024-02-04 5.0 MEDIUM N/A
Oracle MySQL 5.5.38 and earlier, 5.6.19 and earlier, and MariaDB 5.5.28a, 5.3.11, 5.2.13, 5.1.66, and possibly other versions, generates different error messages with different time delays depending on whether a user name exists, which allows remote attackers to enumerate valid usernames.
CVE-2012-6548 2 Linux, Redhat 2 Linux Kernel, Enterprise Linux 2024-02-04 1.9 LOW N/A
The udf_encode_fh function in fs/udf/namei.c in the Linux kernel before 3.6 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel heap memory via a crafted application.
CVE-2011-4922 1 Pidgin 1 Pidgin 2024-02-04 2.1 LOW N/A
cipher.c in the Cipher API in libpurple in Pidgin before 2.7.10 retains encryption-key data in process memory, which might allow local users to obtain sensitive information by reading a core file or other representation of memory contents.
CVE-2013-0693 2 Emerson, Enea 4 Dl 8000 Remote Terminal Unit, Roc 800 Remote Terminal Unit, Roc 800l Remote Terminal Unit and 1 more 2024-02-04 10.0 HIGH N/A
The kernel in ENEA OSE on the Emerson Process Management ROC800 RTU with software 3.50 and earlier, DL8000 RTU with software 2.30 and earlier, and ROC800L RTU with software 1.20 and earlier performs network-beacon broadcasts, which allows remote attackers to obtain potentially sensitive information about device presence by listening for broadcast traffic.
CVE-2012-6466 1 Opera 1 Opera Browser 2024-02-04 5.0 MEDIUM N/A
Opera before 12.10 does not properly handle incorrect size data in a WebP image, which allows remote attackers to obtain potentially sensitive information from process memory by using a crafted image as the fill pattern for a canvas.