Page 11 of 11332 results (0.063 seconds)

CVSS: 8.2EPSS: 0%CPEs: -EXPL: 0

Insufficient control flow management in some Intel(R) QAT Engine for OpenSSL software before version v1.6.1 may allow information disclosure via network access. • https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01177.html • CWE-691: Insufficient Control Flow Management •

CVSS: 5.6EPSS: 0%CPEs: -EXPL: 0

Improper access control in UEFI firmware in some Intel(R) Server M20NTP Family may allow a privileged user to potentially enable information disclosure via local access. • https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01175.html • CWE-284: Improper Access Control •

CVSS: 6.5EPSS: 0%CPEs: 2EXPL: 0

An information disclosure vulnerability exists in Yugabyte Anywhere, where the LDAP bind password is logged in plaintext within application logs. This flaw results in the unintentional exposure of sensitive information in Yugabyte Anywhere logs, potentially allowing unauthorized users with access to these logs to view the LDAP bind password.  • https://github.com/yugabyte/yugabyte-db/commit/0bf6e5a3e9c0718a28e654483596615d0798b208 • CWE-532: Insertion of Sensitive Information into Log File •

CVSS: 2.2EPSS: 0%CPEs: -EXPL: 0

Out-of-bounds read in some Intel(R) VPL software before version 24.1.4 may allow an authenticated user to potentially enable information disclosure via local access. • https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01131.html • CWE-125: Out-of-bounds Read •

CVSS: 4.6EPSS: 0%CPEs: -EXPL: 0

Improper initialization in firmware for some Intel(R) PROSet/Wireless Software and Intel(R) Killer(TM) Wi-Fi before version 23.40 may allow a privileged user to potentially enable information disclosure via local access. • https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01108.html • CWE-665: Improper Initialization •