Page 528 of 10668 results (0.136 seconds)

CVSS: 5.5EPSS: 0%CPEs: 16EXPL: 0

This could lead to local information disclosure with no additional execution privileges. • https://www.unisoc.com/en_us/secy/announcementDetail/1654776866982133761 • CWE-862: Missing Authorization •

CVSS: 5.9EPSS: 0%CPEs: 2EXPL: 0

SAP BusinessObjects Platform - versions 420, 430, Information design tool transmits sensitive information as cleartext in the binaries over the network. This could allow an unauthenticated attacker with deep knowledge to gain sensitive information such as user credentials and domain names, which may have a low impact on confidentiality and no impact on the integrity and availability of the system. • https://i7p.wdf.sap.corp/sap/support/notes/3302595 https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html • CWE-522: Insufficiently Protected Credentials •

CVSS: 9.1EPSS: 0%CPEs: 2EXPL: 0

The attacker can impersonate any user on the platform resulting into accessing and modifying data. • https://launchpad.support.sap.com/#/notes/3307833 https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

A buffer overflow in the component /Enclave.cpp of Electronics and Telecommunications Research Institute ShieldStore commit 58d455617f99705f0ffd8a27616abdf77bdc1bdc allows attackers to cause an information leak via a crafted structure from an untrusted operating system. • http://electronics.com http://shieldstore.com https://github.com/cocoppang/ShieldStore/blob/master/Enclave/Enclave.cpp https://github.com/cocoppang/ShieldStore/issues/19 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 5.4EPSS: 0%CPEs: 7EXPL: 0

A vulnerability exists in Aruba InstantOS and ArubaOS 10 where an edge-case combination of network configuration, a specific WLAN environment and an attacker already possessing valid user credentials on that WLAN can lead to sensitive information being disclosed via the WLAN. The scenarios in which this disclosure of potentially sensitive information can occur are complex and depend on factors that are beyond the control of the attacker. • https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-006.txt •