Page 22 of 12364 results (0.051 seconds)

CVSS: 4.8EPSS: 0%CPEs: -EXPL: 0

08 Feb 2025 — The manipulation of the argument arg[0] leads to information disclosure. ... The manipulation of the argument arg[0] leads to information disclosure. ... Dank Manipulation des Arguments arg[0] mit unbekannten Daten kann eine information disclosure-Schwachstelle ausgenutzt werden. • https://github.com/RT-Thread/rt-thread/issues/9877 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-284: Improper Access Control •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

07 Feb 2025 — in OpenHarmony v4.1.2 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through use after free. • https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-02.md • CWE-416: Use After Free •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

07 Feb 2025 — in OpenHarmony v4.1.2 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through buffer overflow. • https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-02.md • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 3.3EPSS: 0%CPEs: -EXPL: 0

06 Feb 2025 — IBM EntireX 11.1 could allow a local user to obtain sensitive information when a detailed technical error message is returned. This information could be used in further attacks against the system. • https://www.ibm.com/support/pages/node/7182693 • CWE-209: Generation of Error Message Containing Sensitive Information •

CVSS: 7.7EPSS: 0%CPEs: -EXPL: 0

06 Feb 2025 — An information disclosure vulnerability exists in the Vault API functionality of ClearML Enterprise Server 3.22.5-1533. • https://talosintelligence.com/vulnerability_reports/TALOS-2024-2112 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 7.5EPSS: 0%CPEs: -EXPL: 1

06 Feb 2025 — Directory Traversal in File Upload in Gleamtech FileVista 9.2.0.0 allows remote attackers to achieve Code Execution, Information Disclosure, and Escalation of Privileges via injecting malicious payloads in HTTP requests to manipulate file paths, bypass access controls, and upload malicious files. • https://packetstorm.news/files/id/189021 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 9.8EPSS: 0%CPEs: -EXPL: 1

06 Feb 2025 — Exploiting this flaw can lead to unauthorized information disclosure, privilege escalation, or database manipulation. • https://github.com/ahrixia/CVE-2024-57430 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 4.3EPSS: 0%CPEs: -EXPL: 0

05 Feb 2025 — IBM ApplinX 11.1 stores sensitive information in cleartext in memory that could be obtained by an authenticated user. • https://www.ibm.com/support/pages/node/7182522 • CWE-316: Cleartext Storage of Sensitive Information in Memory •

CVSS: 4.3EPSS: 0%CPEs: -EXPL: 0

05 Feb 2025 — IBM ApplinX 11.1 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. • https://www.ibm.com/support/pages/node/7182522 • CWE-209: Generation of Error Message Containing Sensitive Information •

CVSS: 5.9EPSS: 0%CPEs: -EXPL: 0

05 Feb 2025 — IBM ApplinX 11.1 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. • https://www.ibm.com/support/pages/node/7182522 • CWE-327: Use of a Broken or Risky Cryptographic Algorithm •