Page 5 of 13444 results (0.073 seconds)

CVSS: 4.2EPSS: 0%CPEs: -EXPL: 0

18 Mar 2025 — yimioa before v2024.07.04 was discovered to contain an information disclosure vulnerability via the component /resources/application.yml. • https://gitee.com/r1bbit/yimioa/issues/IBI7LR • CWE-538: Insertion of Sensitive Information into Externally-Accessible File or Directory •

CVSS: 7.3EPSS: 0%CPEs: 3EXPL: 0

17 Mar 2025 — This issue was addressed by using HTTPS when sending information over the network. ... A user in a privileged network position may be able to leak sensitive information. • https://support.apple.com/en-us/121837 • CWE-319: Cleartext Transmission of Sensitive Information

CVSS: 5.3EPSS: 0%CPEs: -EXPL: 1

16 Mar 2025 — The manipulation leads to information disclosure. ... Durch das Beeinflussen mit unbekannten Daten kann eine information disclosure-Schwachstelle ausgenutzt werden. • https://github.com/geo-chen/IROAD?tab=readme-ov-file#finding-8-dumping-files-over-http-and-rtsp-without-authentication • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-284: Improper Access Control •

CVSS: 3.3EPSS: 0%CPEs: 2EXPL: 0

15 Mar 2025 — This issue can lead to information disclosure and privilege escalation if exploited effectively. • https://access.redhat.com/security/cve/CVE-2025-2157 • CWE-922: Insecure Storage of Sensitive Information

CVSS: 7.4EPSS: 0%CPEs: 1EXPL: 0

14 Mar 2025 — Python's execution environment cannot guarantee true isolation between redundant executions, the constant-time comparison implementation in Python is subject to timing variations, the randomized execution order and timing provide insufficient protection against sophisticated fault attacks, and the error handling may leak timing information about partial execution results. Python's execution environment cannot guarantee true isolation between redundant executions, the constant-time comparison i... • https://en.wikipedia.org/wiki/Fault_attack • CWE-1240: Use of a Cryptographic Primitive with a Risky Implementation CWE-1279: Cryptographic Operations are run Before Supporting Units are Ready •

CVSS: 4.1EPSS: 0%CPEs: 1EXPL: 0

14 Mar 2025 — IBM Security QRadar 3.12 EDR stores user credentials in plain text which can be read by a local privileged user. • https://www.ibm.com/support/pages/node/7185938 • CWE-256: Plaintext Storage of a Password •

CVSS: 5.9EPSS: 0%CPEs: 1EXPL: 0

14 Mar 2025 — IBM Security QRadar 3.12 EDR uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt sensitive credential information. • https://www.ibm.com/support/pages/node/7185938 • CWE-327: Use of a Broken or Risky Cryptographic Algorithm •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

13 Mar 2025 — A Path Traversal Information Disclosure vulnerability exists in "Sante PACS Server.exe". • https://www.tenable.com/security/research/tra-2025-08 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

13 Mar 2025 — Exposure of sensitive information in My Personal Credentials password history component in Devolutions Remote Desktop Manager 2024.3.29 and earlier on Windows allows an authenticated user to inadvertently leak the My Personal Credentials in a shared vault via the clear history feature due to faulty business logic. • https://devolutions.net/security/advisories/DEVO-2025-0004 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

13 Mar 2025 — Exposure of password in web-based SSH authentication component in Devolutions Server 2024.3.13 and earlier allows a user to unadvertently leak his SSH password due to missing password masking. • https://devolutions.net/security/advisories/DEVO-2025-0004 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •