Page 385 of 10738 results (0.018 seconds)

CVSS: 6.0EPSS: 0%CPEs: 4EXPL: 0

This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure. • https://access.redhat.com/errata/RHSA-2024:2394 https://access.redhat.com/errata/RHSA-2024:2950 https://access.redhat.com/errata/RHSA-2024:3138 https://access.redhat.com/security/cve/CVE-2023-39189 https://bugzilla.redhat.com/show_bug.cgi?id=2226777 https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html • CWE-125: Out-of-bounds Read •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

HP LIFE Android Mobile application is potentially vulnerable to escalation of privilege and/or information disclosure. • https://support.hp.com/us-en/document/ish_9393937-9393961-16/hpsbgn03870 • CWE-284: Improper Access Control •

CVSS: 7.1EPSS: 0%CPEs: 4EXPL: 0

Sensitive information disclosure and manipulation due to missing authorization. • https://security-advisory.acronis.com/advisories/SEC-6600 • CWE-862: Missing Authorization •

CVSS: 5.3EPSS: 0%CPEs: 3EXPL: 0

Mattermost fails to properly check the creator of an attached file when adding the file to a draft post, potentially exposing unauthorized file information. Mattermost no verifica adecuadamente el creador de un archivo adjunto al agregar el fichero a un borrador de publicación, lo que potencialmente expone información del archivo no autorizada. • https://mattermost.com/security-updates • CWE-862: Missing Authorization •

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 0

Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Iulia Cazan Image Regenerate & Select Crop.This issue affects Image Regenerate & Select Crop: from n/a through 7.3.0. Exposición de información confidencial a una vulnerabilidad de actor no autorizado en Iulia Cazan Image Regenerate & Select Crop. Este problema afecta a Image Regenerate & Select Crop: desde n/a hasta 7.3.0. The Image Regenerate & Select Crop plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 7.3.0 via the log file directory. This can allow unauthenticated attackers to extract sensitive data if directory indexing is enabled or if they are able to determine the log file format and bruteforce potential log filenames. • https://patchstack.com/database/vulnerability/image-regenerate-select-crop/wordpress-image-regenerate-select-crop-plugin-7-3-0-sensitive-data-exposure-via-log-file-vulnerability? • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •