Page 3 of 14543 results (0.116 seconds)

CVSS: 3.3EPSS: 0%CPEs: 1EXPL: 0

22 Apr 2026 — If the CWD is more permissive or accessible to other users than /tmp, it may lead to unintended information disclosure or unauthorized access to temporary data. • https://github.com/uutils/coreutils/pull/10566 • CWE-377: Insecure Temporary File •

CVSS: 6.1EPSS: 0%CPEs: -EXPL: 0

22 Apr 2026 — A local user could exploit this by convincing a victim to open a malicious SVG file, which may lead to a denial of service (DoS) or potentially information disclosure. • https://access.redhat.com/security/cve/CVE-2026-6861 • CWE-193: Off-by-one Error •

CVSS: 2.5EPSS: 0%CPEs: -EXPL: 0

22 Apr 2026 — This allows the attacker to inject a malicious `.desktop` launcher, which could lead to unintended actions or information disclosure if the launcher is subsequently processed. • https://access.redhat.com/security/cve/CVE-2026-6842 • CWE-732: Incorrect Permission Assignment for Critical Resource •

CVSS: 2.7EPSS: 0%CPEs: 3EXPL: 0

22 Apr 2026 — Tanium addressed an information disclosure vulnerability in Tanium Server. • https://security.tanium.com/TAN-2026-012 • CWE-522: Insufficiently Protected Credentials •

CVSS: 2.7EPSS: 0%CPEs: 2EXPL: 0

22 Apr 2026 — Tanium addressed an information disclosure vulnerability in Threat Response. • https://security.tanium.com/TAN-2026-011 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 1

21 Apr 2026 — WWBN AVideo is an open source video platform. In versions 29.0 and prior, the file `git.json.php` at the web root executes `git log -1` and returns the full output as JSON to any unauthenticated user. This exposes the exact deployed commit hash (enabling version fingerprinting against known CVEs), developer names and email addresses (PII), and commit messages which may contain references to internal systems or security fixes. As of time of publication, no known patched versions are available. • https://github.com/WWBN/AVideo/security/advisories/GHSA-52hf-63q4-r926 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 8.2EPSS: 0%CPEs: 1EXPL: 0

21 Apr 2026 — A successful exploit of this vulnerability might lead to denial of service and information disclosure. • https://nvd.nist.gov/vuln/detail/CVE-2026-24189 • CWE-125: Out-of-bounds Read •

CVSS: 7.7EPSS: 0%CPEs: 1EXPL: 0

21 Apr 2026 — A successful exploit of this vulnerability might lead to information disclosure. • https://nvd.nist.gov/vuln/detail/CVE-2026-24177 • CWE-306: Missing Authentication for Critical Function •

CVSS: 4.9EPSS: 0%CPEs: 2EXPL: 0

21 Apr 2026 — Prior to 3.7.14 and 4.1.10, a server-side information disclosure vulnerability was identified in the handling of CSS preprocessor files. • https://github.com/octobercms/october/security/advisories/GHSA-3888-q23f-x7qh • CWE-184: Incomplete List of Disallowed Inputs CWE-863: Incorrect Authorization •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

21 Apr 2026 — FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.213, an unauthenticated attacker can access diagnostic and system tools that should be restricted to administrators. The /system/cron endpoint relies on a static MD5 hash derived from the APP_KEY, which is exposed in the response and logs. Accessing these endpoints reveals sensitive server information (Full Path Disclosure), process IDs, and allows for Resource Exhaustion (DoS) by triggering heavy background tasks repeatedly ... • https://github.com/freescout-help-desk/freescout/commit/b1d6c2c601a6ec3626ab13e679607b5084dfbd38 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-284: Improper Access Control CWE-770: Allocation of Resources Without Limits or Throttling •