Page 32 of 10556 results (0.015 seconds)

CVSS: 2.5EPSS: 0%CPEs: -EXPL: 0

Improper check for unusual or exceptional conditions in Intel(R) TDX Module firmware before version 1.5.06 may allow a privileged user to potentially enable information disclosure via local access. • https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01099.html • CWE-754: Improper Check for Unusual or Exceptional Conditions •

CVSS: 3.1EPSS: 0%CPEs: 4EXPL: 0

TYPO3 is a free and open source Content Management Framework. Backend users could see items in the backend page tree without having access if the mounts pointed to pages restricted for their user/group, or if no mounts were configured but the pages allowed access to "everybody." However, affected users could not manipulate these pages. Users are advised to update to TYPO3 versions 10.4.46 ELTS, 11.5.40 LTS, 12.4.21 LTS, 13.3.1 that fix the problem described. There are no known workarounds for this vulnerability. • https://github.com/TYPO3/typo3/security/advisories/GHSA-rf5m-h8q9-9w6q https://typo3.org/security/advisory/typo3-core-sa-2024-012 • CWE-863: Incorrect Authorization •

CVSS: 6.5EPSS: 0%CPEs: 24EXPL: 0

Windows Kerberos Information Disclosure Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43547 • CWE-325: Missing Cryptographic Step •

CVSS: 5.6EPSS: 0%CPEs: 8EXPL: 0

Windows Cryptographic Information Disclosure Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43546 • CWE-203: Observable Discrepancy •

CVSS: 5.5EPSS: 0%CPEs: 5EXPL: 0

Windows Resilient File System (ReFS) Information Disclosure Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43500 • CWE-126: Buffer Over-read •