Total
736 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2019-4381 | 1 Ibm | 1 I | 2023-03-02 | 2.1 LOW | 5.5 MEDIUM |
IBM i 7.27.3 Clustering could allow a local attacker to obtain sensitive information, caused by the use of advanced node failure detection using the REST API to interface with the HMC. An attacker could exploit this vulnerability to obtain HMC credentials. IBM X-Force ID: 162159. | |||||
CVE-2016-4996 | 1 Redhat | 2 Enterprise Linux Server, Satellite | 2023-02-12 | 1.9 LOW | 7.0 HIGH |
discovery-debug in Foreman before 6.2 when the ssh service has been enabled on discovered nodes displays the root password in plaintext in the system journal when used to log in, which allows local users with access to the system journal to obtain the root password by reading the system journal, or by clicking Logs on the console. | |||||
CVE-2013-6372 | 1 Jenkins-ci | 1 Subversion-plugin | 2023-02-12 | 2.1 LOW | N/A |
The Subversion plugin before 1.54 for Jenkins stores credentials using base64 encoding, which allows local users to obtain passwords and SSH private keys by reading a subversion.credentials file. | |||||
CVE-2013-4509 | 2 Ibus Project, Opensuse | 2 Ibus, Opensuse | 2023-02-12 | 1.9 LOW | N/A |
The default configuration of IBUS 1.5.4, and possibly 1.5.2 and earlier, when IBus.InputPurpose.PASSWORD is not set and used with GNOME 3, does not obscure the entered password characters, which allows physically proximate attackers to obtain a user password by reading the lockscreen. | |||||
CVE-2012-6088 | 1 Rpm | 1 Rpm | 2023-02-12 | 4.3 MEDIUM | N/A |
The rpmpkgRead function in lib/package.c in RPM 4.10.x before 4.10.2 does not return an error code in certain situations involving an "unparseable signature," which allows remote attackers to bypass RPM signature checks via a crafted package. | |||||
CVE-2012-6115 | 1 Redhat | 1 Enterprise Virtualization Manager | 2023-02-12 | 2.1 LOW | N/A |
The domain management tool (rhevm-manage-domains) in Red Hat Enterprise Virtualization Manager (RHEV-M) 3.1 and earlier, when the validate action is enabled, logs the administrative password to a world-readable log file, which allows local users to obtain sensitive information by reading this file. | |||||
CVE-2012-0814 | 1 Openbsd | 1 Openssh | 2023-02-12 | 3.5 LOW | N/A |
The auth_parse_options function in auth-options.c in sshd in OpenSSH before 5.7 provides debug messages containing authorized_keys command options, which allows remote authenticated users to obtain potentially sensitive information by reading these messages, as demonstrated by the shared user account required by Gitolite. NOTE: this can cross privilege boundaries because a user account may intentionally have no shell or filesystem access, and therefore may have no supported way to read an authorized_keys file in its own home directory. | |||||
CVE-2012-0794 | 1 Moodle | 1 Moodle | 2023-02-12 | 5.0 MEDIUM | N/A |
The rc4encrypt function in lib/moodlelib.php in Moodle 1.9.x before 1.9.16, 2.0.x before 2.0.7, 2.1.x before 2.1.4, and 2.2.x before 2.2.1 uses a hardcoded password of nfgjeingjk, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by reading this script's source code within the open-source software distribution. | |||||
CVE-2008-1676 | 2 Netscape, Redhat | 2 Certificate Management System, Certificate System | 2023-02-12 | 7.5 HIGH | N/A |
Red Hat PKI Common Framework (rhpki-common) in Red Hat Certificate System (aka Certificate Server or RHCS) 7.1 through 7.3, and Netscape Certificate Management System 6.x, does not recognize Certificate Authority profile constraints on Extensions, which might allow remote attackers to bypass intended restrictions and conduct man-in-the-middle attacks by submitting a certificate signing request (CSR) and using the resulting certificate. | |||||
CVE-2011-4587 | 1 Moodle | 1 Moodle | 2023-02-12 | 6.8 MEDIUM | N/A |
lib/moodlelib.php in Moodle 1.9.x before 1.9.15, 2.0.x before 2.0.6, and 2.1.x before 2.1.3 does not properly handle certain zero values in the password policy, which makes it easier for remote attackers to obtain access by leveraging the possible existence of user accounts that have unchangeable blank passwords. | |||||
CVE-2015-1842 | 1 Redhat | 1 Openstack | 2023-02-12 | 10.0 HIGH | N/A |
The puppet manifests in the Red Hat openstack-puppet-modules package before 2014.2.13-2 uses a default password of CHANGEME for the pcsd daemon, which allows remote attackers to execute arbitrary shell commands via unspecified vectors. | |||||
CVE-2014-3692 | 1 Redhat | 1 Cloudforms 3.1 Management Engine | 2023-02-12 | 10.0 HIGH | N/A |
The customization template in Red Hat CloudForms 3.1 Management Engine (CFME) 5.3 uses a default password for the root account when a password is not specified for a new image, which allows remote attackers to gain privileges. | |||||
CVE-2014-3489 | 1 Redhat | 1 Cloudforms 3.0 Management Engine | 2023-02-12 | 4.3 MEDIUM | N/A |
lib/util/miq-password.rb in Red Hat CloudForms 3.0 Management Engine (CFME) before 5.2.4.2 uses a hard-coded salt, which makes it easier for remote attackers to guess passwords via a brute force attack. | |||||
CVE-2014-0202 | 1 Redhat | 1 Rhevm-dwh | 2023-02-12 | 2.1 LOW | N/A |
The setup script in ovirt-engine-dwh, as used in the Red Hat Enterprise Virtualization Manager data warehouse (rhevm-dwh) package before 3.3.3, stores the history database password in cleartext, which allows local users to obtain sensitive information by reading an unspecified file. | |||||
CVE-2014-0184 | 1 Redhat | 1 Cloudforms 3.0 Management Engine | 2023-02-12 | 4.9 MEDIUM | N/A |
Red Hat CloudForms 3.0 Management Engine (CFME) before 5.2.4.2 logs the root password when deploying a VM, which allows local users to obtain sensitive information by reading the evm.log file. | |||||
CVE-2012-5563 | 1 Openstack | 1 Folsom | 2023-02-12 | 4.0 MEDIUM | N/A |
OpenStack Keystone, as used in OpenStack Folsom 2012.2, does not properly implement token expiration, which allows remote authenticated users to bypass intended authorization restrictions by creating new tokens through token chaining. NOTE: this issue exists because of a CVE-2012-3426 regression. | |||||
CVE-2012-3359 | 1 Redhat | 2 Conga, Enterprise Linux | 2023-02-12 | 3.7 LOW | N/A |
Luci in Red Hat Conga stores the user's username and password in a Base64 encoded string in the __ac session cookie, which allows attackers to gain privileges by accessing this cookie. NOTE: this issue has been SPLIT due to different vulnerability types. Use CVE-2013-7347 for the incorrect enforcement of a user timeout. | |||||
CVE-2016-3704 | 2 Fedoraproject, Pulpproject | 2 Fedora, Pulp | 2023-02-12 | 5.0 MEDIUM | 7.5 HIGH |
Pulp before 2.8.5 uses bash's $RANDOM in an unsafe way to generate passwords. | |||||
CVE-2019-5456 | 1 Ui | 1 Unifi Controller | 2022-12-06 | 4.3 MEDIUM | 8.1 HIGH |
SMTP MITM refers to a malicious actor setting up an SMTP proxy server between the UniFi Controller version <= 5.10.21 and their actual SMTP server to record their SMTP credentials for malicious use later. | |||||
CVE-2013-4496 | 2 Canonical, Samba | 2 Ubuntu Linux, Samba | 2022-08-29 | 5.0 MEDIUM | N/A |
Samba 3.x before 3.6.23, 4.0.x before 4.0.16, and 4.1.x before 4.1.6 does not enforce the password-guessing protection mechanism for all interfaces, which makes it easier for remote attackers to obtain access via brute-force ChangePasswordUser2 (1) SAMR or (2) RAP attempts. |