Page 11 of 10846 results (0.116 seconds)

CVSS: 5.5EPSS: 0%CPEs: 5EXPL: 0

In validateAccountsInternal of AccountManagerService.java, there is a possible way to leak account credentials to a third party app due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. • https://android.googlesource.com/platform/frameworks/base/+/55a3d36701bb874358f685d3ac3381eda10fcff0 https://source.android.com/security/bulletin/2024-11-01 • CWE-276: Incorrect Default Permissions •

CVSS: 6.2EPSS: 0%CPEs: 5EXPL: 0

In visitUris of multiple files, there is a possible information disclosure due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. • https://android.googlesource.com/platform/frameworks/base/+/50eec20b570cd4cbbe8c5971af4c9dda3ddcb858 https://source.android.com/security/bulletin/2024-11-01 •

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 0

This could lead to local information disclosure with no additional execution privileges needed. • https://android.googlesource.com/platform/frameworks/base/+/6aa1b4fbf5936a1ff5bdbb79397c94910a6ed8f5 https://source.android.com/security/bulletin/2024-11-01 • CWE-125: Out-of-bounds Read •

CVSS: 5.7EPSS: 0%CPEs: 2EXPL: 0

An information disclosure vulnerability exists in the backup configuration process where the SAS token is not masked in the configuration response. This oversight results in sensitive information leakage within the yb_backup log files, exposing the SAS token in plaintext. • https://github.com/yugabyte/yugabyte-db/commit/920989b6c0db0222bb7a0cce46febc76cf72d438 • CWE-532: Insertion of Sensitive Information into Log File •

CVSS: 6.2EPSS: 0%CPEs: 30EXPL: 0

Windows Package Library Manager Information Disclosure Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38203 • CWE-693: Protection Mechanism Failure •