
CVE-2021-0693
https://notcve.org/view.php?id=CVE-2021-0693
06 Oct 2021 — This could lead to local information disclosure with no additional execution privileges needed. • https://source.android.com/security/bulletin/2021-09-01 •

CVE-2021-0695
https://notcve.org/view.php?id=CVE-2021-0695
06 Oct 2021 — This could lead to local information disclosure with User execution privileges needed. • https://source.android.com/security/bulletin/2021-09-01 • CWE-416: Use After Free •

CVE-2021-0690
https://notcve.org/view.php?id=CVE-2021-0690
06 Oct 2021 — This could lead to remote information disclosure with no additional execution privileges needed. • https://source.android.com/security/bulletin/2021-09-01 • CWE-787: Out-of-bounds Write •

CVE-2021-0644
https://notcve.org/view.php?id=CVE-2021-0644
06 Oct 2021 — This could lead to local information disclosure with User execution privileges needed. • https://source.android.com/security/bulletin/2021-09-01 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2021-0686
https://notcve.org/view.php?id=CVE-2021-0686
06 Oct 2021 — This could lead to local information disclosure with no additional execution privileges needed. • https://source.android.com/security/bulletin/2021-09-01 • CWE-862: Missing Authorization •

CVE-2021-0682
https://notcve.org/view.php?id=CVE-2021-0682
06 Oct 2021 — This could lead to local information disclosure with User execution privileges needed. • https://source.android.com/security/bulletin/2021-09-01 • CWE-862: Missing Authorization •

CVE-2021-36170
https://notcve.org/view.php?id=CVE-2021-36170
06 Oct 2021 — An information disclosure vulnerability [CWE-200] in FortiAnalyzerVM and FortiManagerVM versions 7.0.0 and 6.4.6 and below may allow an authenticated attacker to read the FortiCloud credentials which were used to activate the trial license in cleartext. • https://fortiguard.com/advisory/FG-IR-21-112 • CWE-522: Insufficiently Protected Credentials •

CVE-2021-31986
https://notcve.org/view.php?id=CVE-2021-31986
05 Oct 2021 — This can lead to a buffer overflow resulting in crashes and data leakage. • https://www.axis.com/files/tech_notes/CVE-2021-31986.pdf • CWE-122: Heap-based Buffer Overflow CWE-787: Out-of-bounds Write •

CVE-2021-25118 – Yoast SEO 16.7-17.2 - Unauthenticated Full Path Disclosure
https://notcve.org/view.php?id=CVE-2021-25118
05 Oct 2021 — El plugin Yoast SEO WordPress (desde la versión 16.7 hasta la 17.2) revela la ruta interna completa de las imágenes destacadas en las entradas a través de los puntos finales REST wp/v2/posts, lo que podría ayudar a un atacante a identificar otras vulnerabilidades o ayudar durante la explotación de otras vulnerabilidades identificadas The Yoast SEO plugin for WordPress is vulnerable to Sensitive Data Exposure in versions up to, and including, 17.2 via the /wp/v2/posts REST endpoints that disclo... • https://plugins.trac.wordpress.org/changeset/2608691 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2021-41092 – Docker CLI leaks private registry credentials to registry-1.docker.io
https://notcve.org/view.php?id=CVE-2021-41092
04 Oct 2021 — Para usuarios que no puedan actualizar, asegúrese de que las entradas credsStore o credHelpers configuradas en el archivo de configuración hagan referencia a un ayudante de credenciales instalado que sea ejecutable y esté en el PATH An information disclosure issue was discovered in the command line interface of Docker. • https://cert-portal.siemens.com/productcert/pdf/ssa-222547.pdf • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-522: Insufficiently Protected Credentials •