Total
807 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2017-14418 | 1 D-link | 2 Dir-850l, Dir-850l Firmware | 2019-10-02 | 4.3 MEDIUM | 8.1 HIGH |
The D-Link NPAPI extension, as used in conjunction with D-Link DIR-850L REV. B (with firmware through FW208WWb02) devices, sends the cleartext admin password over the Internet as part of interaction with mydlink Cloud Services. | |||||
CVE-2017-14111 | 1 Philips | 2 Intellispace Cardiovascular, Xcelera | 2019-10-02 | 4.0 MEDIUM | 7.2 HIGH |
The workstation logging function in Philips IntelliSpace Cardiovascular (ISCV) 2.3.0 and earlier and Xcelera R4.1L1 and earlier records domain authentication credentials, which if accessed allows an attacker to use credentials to access the application, or other user entitlements. | |||||
CVE-2017-1378 | 1 Ibm | 1 Tivoli Storage Manager | 2019-10-02 | 2.1 LOW | 7.8 HIGH |
IBM Spectrum Protect 7.1 and 8.1 (formerly Tivoli Storage Manager) disclosed unencrypted login credentials to Vmware vCenter in the application trace output which could be obtained by a local user. IBM X-Force ID: 126875. | |||||
CVE-2017-1362 | 1 Ibm | 1 Security Identity Manager | 2019-10-02 | 2.1 LOW | 7.8 HIGH |
IBM Security Identity Manager Adapters 6.0 and 7.0 stores user credentials in plain in clear text which can be read by a local user. IBM X-Force ID: 126801. | |||||
CVE-2017-1337 | 1 Ibm | 1 Websphere Mq | 2019-10-02 | 4.3 MEDIUM | 8.1 HIGH |
IBM WebSphere MQ 9.0.1 and 9.0.2 Java/JMS application can incorrectly transmit user credentials in plain text. IBM X-Force ID: 126245. | |||||
CVE-2017-1207 | 1 Ibm | 2 Integration Bus, Websphere Message Broker | 2019-10-02 | 2.1 LOW | 5.5 MEDIUM |
IBM WebSphere Message Broker stores user credentials in plain in clear text which can be read by a local user. IBM X-Force ID: 123777. | |||||
CVE-2019-11769 | 1 Teamviewer | 1 Teamviewer | 2019-09-13 | 7.2 HIGH | 7.8 HIGH |
An issue was discovered in TeamViewer 14.2.2558. Updating the product as a non-administrative user requires entering administrative credentials into the GUI. Subsequently, these credentials are processed in Teamviewer.exe, which allows any application running in the same non-administrative user context to intercept them in cleartext within process memory. By using this technique, a local attacker is able to obtain administrative credentials in order to elevate privileges. This vulnerability can be exploited by injecting code into Teamviewer.exe which intercepts calls to GetWindowTextW and logs the processed credentials. |