Page 20 of 12301 results (0.006 seconds)

CVSS: 5.9EPSS: 0%CPEs: 2EXPL: 0

12 Feb 2025 — A remote attacker could potentially exploit this vulnerability, leading to information disclosure. ... A remote attacker could potentially exploit this vulnerability, leading to information disclosure. • https://www.dell.com/support/kbdoc/en-us/000226620/dsa-2024-221-security-update-for-dell-bsafe-ssl-j-multiple-vulnerabilities • CWE-295: Improper Certificate Validation •

CVSS: 9.0EPSS: 0%CPEs: 2EXPL: 0

12 Feb 2025 — A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering. • https://nvidia.custhelp.com/app/answers/detail/a_id/5616 • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •

CVSS: 5.8EPSS: 0%CPEs: 1EXPL: 0

12 Feb 2025 — Insertion of Sensitive Information into Externally-Accessible File or Directory vulnerability in Matt Cromwell Give – Divi Donation Modules allows Retrieve Embedded Sensitive Data. This issue affects Give – Divi Donation Modules: from n/a through 2.0.0. The Give – Divi Donation Modules plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.0.0. This makes it possible for unauthenticated attackers to extract sensitive user or configuration data. • https://patchstack.com/database/wordpress/plugin/give-donation-modules-for-divi/vulnerability/wordpress-give-divi-donation-modules-plugin-2-0-0-sensitive-data-exposure-vulnerability? • CWE-538: Insertion of Sensitive Information into Externally-Accessible File or Directory •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

11 Feb 2025 — A successful exploit of this vulnerability might lead to code execution, denial of service, data corruption, information disclosure, or escalation of privilege. • https://nvidia.custhelp.com/app/answers/detail/a_id/5611 • CWE-20: Improper Input Validation •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

11 Feb 2025 — GeoNetwork is a catalog application to manage spatially referenced resources. In versions prior to 4.2.10 and 4.4.5, the search end-point response headers contain information about Elasticsearch software in use. This information is valuable from a security point of view because it allows software used by the server to be easily identified. GeoNetwork 4.4.5 and 4.2.10 fix this issue. No known workarounds are available. • https://docs.geonetwork-opensource.org/4.4/api/search • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 0

11 Feb 2025 — Microsoft Excel Information Disclosure Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21383 • CWE-125: Out-of-bounds Read •

CVSS: 7.5EPSS: 0%CPEs: -EXPL: 0

11 Feb 2025 — Cleartext Storage of Sensitive Information vulnerability in Salesforce Tableau Server can record the Personal Access Token (PAT) into logging repositories.This issue affects Tableau Server: before 2022.1.3, before 2021.4.8, before 2021.3.13, before 2021.2.14, before 2021.1.16, before 2020.4.19. • https://help.salesforce.com/s/articleView?id=000390611&type=1 • CWE-312: Cleartext Storage of Sensitive Information •

CVSS: 2.3EPSS: 0%CPEs: 5EXPL: 0

11 Feb 2025 — An exposure of sensitive information to an unauthorized actor in Fortinet FortiAnalyzer 6.4.0 through 7.6.0 allows attacker to cause information disclosure via filter manipulation. • https://fortiguard.fortinet.com/psirt/FG-IR-24-422 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 3.5EPSS: 0%CPEs: 1EXPL: 0

11 Feb 2025 — The SolarWinds Platform is vulnerable to an information disclosure vulnerability through an error message. • https://documentation.solarwinds.com/en/success_center/orionplatform/content/release_notes/solarwinds_platform_2025-1_release_notes.htm • CWE-209: Generation of Error Message Containing Sensitive Information •

CVSS: 4.3EPSS: 0%CPEs: -EXPL: 0

11 Feb 2025 — SAP NetWeaver Application Server Java allows an attacker to access an endpoint that can disclose information about deployed server components, including their XML definitions. This information should ideally be restricted to customer administrators, even though they may not need it. These XML files are not entirely SAP-internal as they are deployed with the server. In such a scenario, sensitive information could be exposed without compromising its integrity or availability. • https://me.sap.com/notes/3550027 • CWE-863: Incorrect Authorization •