Page 109 of 10548 results (0.015 seconds)

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

IBM App Connect Enterprise 12.0.1.0 through 12.0.12.1 could allow an authenticated user to obtain sensitive user information using an expired access token. IBM X-Force ID: 288175. IBM App Connect Enterprise 12.0.1.0 a 12.0.12.1 podría permitir que un usuario autenticado obtenga información confidencial del usuario utilizando un token de acceso caducado. ID de IBM X-Force: 288175. • https://exchange.xforce.ibmcloud.com/vulnerabilities/288175 https://www.ibm.com/support/pages/node/7154606 • CWE-324: Use of a Key Past its Expiration Date •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

IBM App Connect Enterprise 12.0.1.0 through 12.0.12.1 could allow an authenticated user to obtain sensitive user information using an expired access token. IBM X-Force ID: 288176. IBM App Connect Enterprise 12.0.1.0 a 12.0.12.1 podría permitir que un usuario autenticado obtenga información confidencial del usuario utilizando un token de acceso caducado. ID de IBM X-Force: 288176. • https://exchange.xforce.ibmcloud.com/vulnerabilities/288176 https://www.ibm.com/support/pages/node/7154606 • CWE-324: Use of a Key Past its Expiration Date •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

IBM App Connect Enterprise 12.0.1.0 through 12.0.12.1 could allow an authenticated user to obtain sensitive calendar information using an expired access token. IBM X-Force ID: 288174. IBM App Connect Enterprise 12.0.1.0 a 12.0.12.1 podría permitir que un usuario autenticado obtenga información confidencial del calendario utilizando un token de acceso caducado. ID de IBM X-Force: 288174.v • https://exchange.xforce.ibmcloud.com/vulnerabilities/288174 https://www.ibm.com/support/pages/node/7154606 • CWE-324: Use of a Key Past its Expiration Date •

CVSS: -EPSS: 0%CPEs: 9EXPL: 0

In the Linux kernel, the following vulnerability has been resolved: comedi: dt9812: fix DMA buffers on stack USB transfer buffers are typically mapped for DMA and must not be allocated on the stack or transfers will fail. Allocate proper transfer buffers in the various command helpers and return an error on short transfers instead of acting on random stack data. Note that this also fixes a stack info leak on systems where DMA is not used as 32 bytes are always sent to the device regardless of how short the command is. • https://git.kernel.org/stable/c/63274cd7d38a3322d90b66a5bc976de1fb899051 https://git.kernel.org/stable/c/a6af69768d5cb4b2528946d53be5fa19ade37723 https://git.kernel.org/stable/c/365a346cda82f51d835c49136a00a9df8a78c7f2 https://git.kernel.org/stable/c/8a52bc480992c7c9da3ebfea456af731f50a4b97 https://git.kernel.org/stable/c/39ea61037ae78f14fa121228dd962ea3280eacf3 https://git.kernel.org/stable/c/3efb7af8ac437085b6c776e5b54830b149d86efe https://git.kernel.org/stable/c/786f5b03450454557ff858a8bead5d7c0cbf78d6 https://git.kernel.org/stable/c/3ac273d154d634e2034508a14db82a95d •

CVSS: 9.6EPSS: 0%CPEs: 5EXPL: 1

This vulnerability could lead to Privilege Escalation to the level of cluster controller, or to information leakage, affecting anyone who does not have strict access controls on their Redis instance. ... This flaw allows an attacker with access to the Redis server to gain read/write access to the data in Redis. • https://github.com/vt0x78/CVE-2024-31989 https://github.com/argoproj/argo-cd/commit/2de0ceade243039c120c28374016c04ff9590d1d https://github.com/argoproj/argo-cd/commit/35a7d6c7fa1534aceba763d6a68697f36c12e678 https://github.com/argoproj/argo-cd/commit/4e2fe302c3352a0012ecbe7f03476b0e07f7fc6c https://github.com/argoproj/argo-cd/commit/53570cbd143bced49d4376d6e31bd9c7bd2659ff https://github.com/argoproj/argo-cd/commit/6ef7b62a0f67e74b4aac2aee31c98ae49dd95d12 https://github.com/argoproj/argo-cd/commit/9552034a80070a93a161bfa330359585f3b85f07 https://github.com&#x • CWE-327: Use of a Broken or Risky Cryptographic Algorithm CWE-1240: Use of a Cryptographic Primitive with a Risky Implementation •