Show filters
28 Total Results
Displaying 21-28 of 28
Sort by:
Attacker Value
Unknown
CVE-2015-3171
Disclosure Date: July 25, 2017 (last updated November 26, 2024)
sosreport 3.2 uses weak permissions for generated sosreport archives, which allows local users with access to /var/tmp/ to obtain sensitive information by reading the contents of the archive.
0
Attacker Value
Unknown
CVE-2014-7436
Disclosure Date: October 19, 2014 (last updated October 05, 2023)
The SOS recette (aka com.sos.recette) application 1.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
0
Attacker Value
Unknown
CVE-2014-6694
Disclosure Date: September 24, 2014 (last updated October 05, 2023)
The 5SOS Family Planet (aka uk.co.pixelkicks.fivesos) application 2.3.4 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
0
Attacker Value
Unknown
CVE-2014-3925
Disclosure Date: June 01, 2014 (last updated October 05, 2023)
sosreport in Red Hat sos 1.7 and earlier on Red Hat Enterprise Linux (RHEL) 5 produces an archive with an fstab file potentially containing cleartext passwords, and lacks a warning about reviewing this archive to detect included passwords, which might allow remote attackers to obtain sensitive information by leveraging access to a technical-support data stream.
0
Attacker Value
Unknown
CVE-2014-0246
Disclosure Date: May 29, 2014 (last updated October 05, 2023)
SOSreport stores the md5 hash of the GRUB bootloader password in an archive, which allows local users to obtain sensitive information by reading the archive.
0
Attacker Value
Unknown
CVE-2011-4083
Disclosure Date: February 17, 2014 (last updated October 05, 2023)
The sosreport utility in the Red Hat sos package before 1.7-9 and 2.x before 2.2-17 includes (1) Certificate-based Red Hat Network private entitlement keys and the (2) private key for the entitlement in an archive of debugging information, which might allow remote attackers to obtain sensitive information by reading the archive.
0
Attacker Value
Unknown
CVE-2012-2664
Disclosure Date: June 29, 2012 (last updated October 04, 2023)
The sosreport utility in the Red Hat sos package before 2.2-29 does not remove the root user password information from the Kickstart configuration file (/root/anaconda-ks.cfg) when creating an archive of debugging information, which might allow attackers to obtain passwords or password hashes.
0
Attacker Value
Unknown
CVE-2008-7309
Disclosure Date: April 05, 2012 (last updated October 04, 2023)
Insoshi before 20080920 does not properly restrict the use of a hash to provide values for a model's attributes, which allows remote attackers to set the ForumPost user_id value via a modified URL, related to a "mass assignment" vulnerability.
0