Page 4 of 12229 results (0.030 seconds)

CVSS: 4.3EPSS: 0%CPEs: -EXPL: 0

11 Feb 2025 — SAP NetWeaver Application Server Java allows an attacker to access an endpoint that can disclose information about deployed server components, including their XML definitions. This information should ideally be restricted to customer administrators, even though they may not need it. These XML files are not entirely SAP-internal as they are deployed with the server. In such a scenario, sensitive information could be exposed without compromising its integrity or availability. • https://me.sap.com/notes/3550027 • CWE-863: Incorrect Authorization •

CVSS: 5.3EPSS: 0%CPEs: -EXPL: 0

11 Feb 2025 — This issue does not enable data modification and has no impact on server availability. • https://me.sap.com/notes/3561264 • CWE-204: Observable Response Discrepancy •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

11 Feb 2025 — This makes it possible for unauthenticated attackers to extract sensitive data stored insecurely in the /wp-content/uploads/smack_uci_uploads/exports/ directory which can contain information like exported user data. • https://plugins.trac.wordpress.org/browser/wp-ultimate-exporter/trunk/exportExtensions/ExportExtension.php#L1678 • CWE-922: Insecure Storage of Sensitive Information •

CVSS: 3.3EPSS: 0%CPEs: -EXPL: 0

11 Feb 2025 — The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. •

CVSS: 6.4EPSS: 0%CPEs: -EXPL: 0

10 Feb 2025 — This can lead to multiple security issues including denial of service, stored XSS, and information disclosure. • https://huntr.com/bounties/1025793a-3c19-4148-a26e-80cd84d4822d • CWE-306: Missing Authentication for Critical Function •

CVSS: 7.0EPSS: 0%CPEs: 2EXPL: 0

10 Feb 2025 — An attacker with physical access could exploit this vulnerability to obtain cryptographic private keys which can then be used to perform impersonation, data decryption and man in the middle attacks on the targeted device. ... An attacker with physical access could exploit this vulnerability to obtain cryptographic private keys which can then be used to perform impersonation, data decryption and man in the middle attacks on the targeted device. • https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2025-0017 • CWE-321: Use of Hard-coded Cryptographic Key •

CVSS: 6.5EPSS: 0%CPEs: -EXPL: 0

10 Feb 2025 — A sensitive information disclosure vulnerability in the Tenda W18E V16.01.0.8(1625) web management portal allows an unauthenticated remote attacker to retrieve sensitive configuration information, including WiFi SSID, WiFi password, and base64-encoded administrator credentials, by sending a specially crafted HTTP POST request to the getQuickCfgWifiAndLogin function, bypassing authentication checks. • https://reddassolutions.com/blog/tenda_w18e_security_research • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 4.8EPSS: 0%CPEs: -EXPL: 0

08 Feb 2025 — The manipulation of the argument arg[0] leads to information disclosure. ... The manipulation of the argument arg[0] leads to information disclosure. ... Dank Manipulation des Arguments arg[0] mit unbekannten Daten kann eine information disclosure-Schwachstelle ausgenutzt werden. • https://github.com/RT-Thread/rt-thread/issues/9877 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-284: Improper Access Control •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

07 Feb 2025 — in OpenHarmony v4.1.2 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through use after free. • https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-02.md • CWE-416: Use After Free •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

07 Feb 2025 — in OpenHarmony v4.1.2 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through buffer overflow. • https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-02.md • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •