Page 448 of 10646 results (0.201 seconds)

CVSS: 8.5EPSS: 0%CPEs: 5EXPL: 2

This vulnerability stems from Weave GitOps Terraform Runners (`tf-runner`), where sensitive data is inadvertently printed - potentially revealing sensitive user data in their pod logs. ... A successful exploit could allow the attacker to utilize this sensitive data, potentially leading to unauthorized access or control of the system. • https://github.com/weaveworks/tf-controller/commit/28282bc644054e157c3b9a3d38f1f9551ce09074 https://github.com/weaveworks/tf-controller/commit/6323b355bd7f5d2ce85d0244fe0883af3881df4e https://github.com/weaveworks/tf-controller/commit/9708fda28ccd0466cb0a8fd409854ab4d92f7dca https://github.com/weaveworks/tf-controller/commit/98a0688036e9dbcf43fa84960d9a1ef3e09a69cf https://github.com/weaveworks/tf-controller/issues/637 https://github.com/weaveworks/tf-controller/issues/649 https://github.com/weaveworks/tf-controller/security/advisories/GHSA-6hvv-j432-23cv • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 7.5EPSS: 0%CPEs: 16EXPL: 0

Server information leak of configuration data when an error is generated in response to a specially crafted message.  • https://process.honeywell.com • CWE-209: Generation of Error Message Containing Sensitive Information CWE-394: Unexpected Status Code or Return Value •

CVSS: 5.3EPSS: 0%CPEs: 4EXPL: 0

An information disclosure issue in GitLab CE/EE affecting all versions from 16.0 prior to 16.0.6, and version 16.1.0 allows unauthenticated actors to access the import error information if a project was imported from GitHub. • https://gitlab.com/gitlab-org/gitlab/-/issues/415131 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-209: Generation of Error Message Containing Sensitive Information CWE-287: Improper Authentication •

CVSS: 3.9EPSS: 0%CPEs: 6EXPL: 0

An information disclosure issue in Gitlab CE/EE affecting all versions from 13.6 prior to 15.11.10, all versions from 16.0 prior to 16.0.6, all versions from 16.1 prior to 16.1.1, resulted in the Sidekiq log including webhook tokens when the log format was set to `default`. • https://gitlab.com/gitlab-org/gitlab/-/issues/409034 • CWE-532: Insertion of Sensitive Information into Log File •

CVSS: 3.3EPSS: 0%CPEs: 1EXPL: 0

Kofax Power PDF PDF File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. ... The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. ... The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. • https://www.zerodayinitiative.com/advisories/ZDI-23-952 • CWE-125: Out-of-bounds Read •