Page 173 of 10568 results (0.022 seconds)

CVSS: -EPSS: 0%CPEs: 3EXPL: 0

Information disclosure in persistent watchers handling in Apache ZooKeeper due to missing ACL check. ... It's important to note that only the path is exposed by this vulnerability, not the data of znode, but since znode path can contain sensitive information like user name or login ID, this issue is potentially critical. Users are recommended to upgrade to version 3.9.2, 3.8.4 which fixes the issue. • http://www.openwall.com/lists/oss-security/2024/03/14/2 https://lists.apache.org/thread/96s5nqssj03rznz9hv58txdb2k1lr79k • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

Zemana AntiLogger v2.74.204.664 is vulnerable to a Memory Information Leak vulnerability by triggering the 0x80002020 IOCTL code of the zam64.sys and zamguard64.sys drivers Zemana AntiLogger v2.74.204.664 es afectado por una vulnerabilidad de fuga de información de memoria al activar el código IOCTL 0x80002020 de los controladores zam64.sys y zamguard64.sys • https://fluidattacks.com/advisories/gomez https://zemana.com/us/antilogger.html • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-404: Improper Resource Shutdown or Release •

CVSS: 6.5EPSS: 0%CPEs: -EXPL: 0

Information exposure through microarchitectural state after transient execution from some register files for some Intel(R) Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. ... This issue may allow a malicious actor to achieve a local information disclosure, impacting the data confidentiality of the targeted system. • http://www.openwall.com/lists/oss-security/2024/03/12/13 https://lists.debian.org/debian-lts-announce/2024/05/msg00003.html https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EIUICU6CVJUIB6BPJ7P5QTPQR5VOBHFK https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H63LGAQXPEVJOES73U4XK65I6DASOAAG https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org • CWE-1342: Information Exposure through Microarchitectural State after Transient Execution •

CVSS: 3.3EPSS: 0%CPEs: -EXPL: 0

Insertion of sensitive information into log file for some Intel(R) Local Manageability Service software before version 2316.5.1.2 may allow an authenticated user to potentially enable information disclosure via local access. • https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00923.html • CWE-532: Insertion of Sensitive Information into Log File •

CVSS: 5.5EPSS: 0%CPEs: -EXPL: 0

Non-transparent sharing of return predictor targets between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access. • https://lists.debian.org/debian-lts-announce/2024/05/msg00003.html https://security.netapp.com/advisory/ntap-20240405-0008 https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00982.html • CWE-1303: Non-Transparent Sharing of Microarchitectural Resources •