Page 14 of 11805 results (0.013 seconds)

CVSS: 4.3EPSS: 0%CPEs: -EXPL: 0

Due to missing authorization checks, SAP Business Warehouse (BEx Analyzer) allows an authenticated attacker to access information over the network which is otherwise restricted. On successful exploitation the attacker can enumerate information causing a limited impact on confidentiality of the application. • https://me.sap.com/notes/3481992 https://url.sap/sapsecuritypatchday • CWE-359: Exposure of Private Personal Information to an Unauthorized Actor CWE-862: Missing Authorization •

CVSS: 4.3EPSS: 0%CPEs: -EXPL: 0

Due to missing authorization checks, SAP BEx Analyzer allows an authenticated attacker to access information over the network which is otherwise restricted. On successful exploitation the attacker can enumerate information causing a limited impact on confidentiality of the application. • https://me.sap.com/notes/3481588 https://url.sap/sapsecuritypatchday • CWE-359: Exposure of Private Personal Information to an Unauthorized Actor CWE-862: Missing Authorization •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

After Effects versions 23.6.6, 24.5 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. ... This vulnerability allows remote attackers to disclose sensitive information on affected installations of Adobe After Effects. • https://helpx.adobe.com/security/products/after_effects/apsb24-55.html • CWE-125: Out-of-bounds Read •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

Premiere Pro versions 24.5, 23.6.8 and earlier are affected by a Use After Free vulnerability that could lead to disclosure of sensitive memory. ... This vulnerability allows remote attackers to disclose sensitive information on affected installations of Adobe Premiere Pro. • https://helpx.adobe.com/security/products/premiere_pro/apsb24-58.html • CWE-416: Use After Free •

CVSS: 5.9EPSS: 0%CPEs: -EXPL: 0

IBM Maximo Application Suite - Manage Component 8.10, 8.11, and 9.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. • https://exchange.xforce.ibmcloud.com/vulnerabilities/292799 https://www.ibm.com/support/pages/node/7167725 • CWE-327: Use of a Broken or Risky Cryptographic Algorithm •