Page 3 of 16651 results (0.030 seconds)

CVSS: 6.1EPSS: %CPEs: -EXPL: 0

17 Mar 2026 — By using a specially crafted EMF file, an attacker could exploit this vulnerability to perform an out-of-bounds read, potentially leading to the disclosure of sensitive information. • https://talosintelligence.com/vulnerability_reports/TALOS-2025-2319 • CWE-125: Out-of-bounds Read •

CVSS: 6.1EPSS: %CPEs: -EXPL: 0

17 Mar 2026 — By using a specially crafted EMF file, an attacker could exploit this vulnerability to perform an out-of-bounds read, potentially leading to the disclosure of sensitive information. • https://talosintelligence.com/vulnerability_reports/TALOS-2025-2320 • CWE-125: Out-of-bounds Read •

CVSS: 6.1EPSS: %CPEs: -EXPL: 0

17 Mar 2026 — By using a specially crafted EMF file, an attacker could exploit this vulnerability to perform an out-of-bounds read, potentially leading to the disclosure of sensitive information. • https://talosintelligence.com/vulnerability_reports/TALOS-2025-2321 • CWE-125: Out-of-bounds Read •

CVSS: 6.1EPSS: %CPEs: -EXPL: 0

17 Mar 2026 — By using a specially crafted EMF file, an attacker could exploit this vulnerability to perform an out-of-bounds read, potentially leading to the disclosure of sensitive information. • https://talosintelligence.com/vulnerability_reports/TALOS-2025-2324 • CWE-125: Out-of-bounds Read •

CVSS: 6.1EPSS: %CPEs: -EXPL: 0

17 Mar 2026 — By using a specially crafted EMF file, an attacker could exploit this vulnerability to perform an out-of-bounds read, potentially leading to the disclosure of sensitive information. • https://talosintelligence.com/vulnerability_reports/TALOS-2025-2325 • CWE-125: Out-of-bounds Read •

CVSS: 5.7EPSS: 0%CPEs: 1EXPL: 0

17 Mar 2026 — This can cause limited cleartext disclosure when attacker-controlled content shares a sector with sensitive data, and it can allow plaintext injection into a mounted encrypted volume when an attacker can modify the underlying encrypted media. • https://jetico.com/data-encryption/encrypt-hard-drives-bestcrypt-volume-encryption/ • CWE-345: Insufficient Verification of Data Authenticity CWE-312: Cleartext Storage of Sensitive Information CWE-693: Protection Mechanism Failure •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

17 Mar 2026 — Outline is a service that allows for collaborative documentation. Prior to 1.5.0, the events.list API endpoint, used for retrieving activity logs, contains a logic flaw in its filtering mechanism. It allows any authenticated user to retrieve activity events associated with documents that have no collection (e.g., Private Drafts, Deleted Documents), regardless of the user's actual permissions on those documents. While the document content is not directly exposed, this vulnerability leaks sensitive metadata (... • https://github.com/outline/outline/security/advisories/GHSA-69x7-6fcr-mm6g • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 5.4EPSS: 0%CPEs: -EXPL: 0

17 Mar 2026 — This can lead to a Denial of Service (DoS) by triggering database errors, and potentially enable Boolean-based Blind SQL injection, which could allow an attacker to extract sensitive information from the database. • https://access.redhat.com/security/cve/CVE-2026-4324 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 8.7EPSS: 0%CPEs: 1EXPL: 0

16 Mar 2026 — An unauthenticated attacker can supply directory traversal sequences via the firmware parameter to access arbitrary files on the server, leading to information disclosure of sensitive system files. • https://www.vulncheck.com/advisories/zwickroell-test-data-management-path-traversal-lfi • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

16 Mar 2026 — Mattermost versions 10.11.x <= 10.11.10 Fail to invalidate cached permalink preview data when a user loses channel access which allows the user to continue viewing private channel content via previously cached permalink previews until cache reset or relogin.. Mattermost Advisory ID: MMSA-2026-00580 • https://mattermost.com/security-updates • CWE-672: Operation on a Resource after Expiration or Release •