Page 10 of 10846 results (0.012 seconds)

CVSS: 5.6EPSS: 0%CPEs: -EXPL: 0

Improper access control in UEFI firmware in some Intel(R) Server M20NTP Family may allow a privileged user to potentially enable information disclosure via local access. • https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01175.html • CWE-284: Improper Access Control •

CVSS: 6.5EPSS: 0%CPEs: 2EXPL: 0

An information disclosure vulnerability exists in Yugabyte Anywhere, where the LDAP bind password is logged in plaintext within application logs. This flaw results in the unintentional exposure of sensitive information in Yugabyte Anywhere logs, potentially allowing unauthorized users with access to these logs to view the LDAP bind password.  • https://github.com/yugabyte/yugabyte-db/commit/0bf6e5a3e9c0718a28e654483596615d0798b208 • CWE-532: Insertion of Sensitive Information into Log File •

CVSS: 2.2EPSS: 0%CPEs: -EXPL: 0

Out-of-bounds read in some Intel(R) VPL software before version 24.1.4 may allow an authenticated user to potentially enable information disclosure via local access. • https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01131.html • CWE-125: Out-of-bounds Read •

CVSS: 4.6EPSS: 0%CPEs: -EXPL: 0

Improper initialization in firmware for some Intel(R) PROSet/Wireless Software and Intel(R) Killer(TM) Wi-Fi before version 23.40 may allow a privileged user to potentially enable information disclosure via local access. • https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01108.html • CWE-665: Improper Initialization •

CVSS: 5.0EPSS: 0%CPEs: 4EXPL: 0

This could lead to local information disclosure with User execution privileges needed. • https://android.googlesource.com/platform/frameworks/base/+/4677d3ee0ec2d31acc6108fea7be6cced971da37 https://source.android.com/security/bulletin/2024-11-01 • CWE-862: Missing Authorization •