Vulnerabilities (CVE)

Filtered by CWE-319
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2017-14486 1 Vibease 2 Chat, Wireless Remote Vibrator 2019-10-03 5.0 MEDIUM 7.5 HIGH
The Vibease Wireless Remote Vibrator app for Android and the Vibease Chat app for iOS use cleartext to exchange messages with other apps and the PLAIN SASL mechanism to send auth tokens to Vibease servers, which allows remote attackers to obtain user credentials, messages, and other sensitive information by sniffing the network for XMPP traffic.
CVE-2017-1181 1 Ibm 1 Tivoli Monitoring 2019-10-03 1.9 LOW 7.0 HIGH
IBM Tivoli Monitoring Portal V6 client could allow a local attacker to gain elevated privileges for IBM Tivoli Monitoring, caused by the default console connection not being encrypted. IBM X-Force ID: 123487.
CVE-2017-1000024 1 Gnome 1 Shotwell 2019-10-03 5.0 MEDIUM 7.5 HIGH
Shotwell version 0.24.4 or earlier and 0.25.3 or earlier is vulnerable to an information disclosure in the web publishing plugins resulting in potential password and oauth token plaintext transmission
CVE-2017-5652 1 Apache 1 Impala 2019-10-03 5.0 MEDIUM 7.5 HIGH
During a routine security analysis, it was found that one of the ports in Apache Impala (incubating) 2.7.0 to 2.8.0 sent data in plaintext even when the cluster was configured to use TLS. The port in question was used by the StatestoreSubscriber class which did not use the appropriate secure Thrift transport when TLS was turned on. It was therefore possible for an adversary, with access to the network, to eavesdrop on the packets going to and coming from that port and view the data in plaintext.
CVE-2018-4227 1 Apple 2 Iphone Os, Mac Os X 2019-10-03 5.0 MEDIUM 7.5 HIGH
An issue was discovered in certain Apple products. iOS before 11.4 is affected. macOS before 10.13.5 is affected. The issue involves the "Mail" component. It allows remote attackers to read the cleartext content of S/MIME encrypted messages via direct exfiltration.
CVE-2019-10428 1 Jenkins 1 Aqua Security Scanner 2019-09-25 5.0 MEDIUM 7.5 HIGH
Jenkins Aqua Security Scanner Plugin 3.0.17 and earlier transmitted configured credentials in plain text as part of the global Jenkins configuration form, potentially resulting in their exposure.