Page 7 of 10525 results (0.088 seconds)

CVSS: 7.8EPSS: 0%CPEs: -EXPL: 0

A maliciously crafted SLDPRT file when parsed in odxsw_dll.dll through Autodesk AutoCAD can force a Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, write sensitive data, or execute arbitrary code in the context of the current process. Un archivo SLDPRT creado con fines malintencionados, cuando se analiza en odxsw_dll.dll a través de Autodesk AutoCAD, puede provocar una vulnerabilidad de lectura fuera de los límites. Un actor malintencionado puede aprovechar esta vulnerabilidad para provocar un bloqueo, escribir datos confidenciales o ejecutar código arbitrario en el contexto del proceso actual. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Autodesk AutoCAD. • https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0019 • CWE-125: Out-of-bounds Read •

CVSS: 8.1EPSS: 0%CPEs: -EXPL: 0

A CORS misconfiguration in parisneo/lollms-webui prior to version 10 allows attackers to steal sensitive information such as logs, browser sessions, and settings containing private API keys from other services. This vulnerability can also enable attackers to perform actions on behalf of a user, such as deleting a project or sending a message. The issue impacts the confidentiality and integrity of the information. • https://github.com/parisneo/lollms-webui/commit/c1bb1ad19752aa7541675b398495eaf98fd589f1 https://huntr.com/bounties/e688f71b-a3a4-4f6d-b48a-837073fa6908 • CWE-346: Origin Validation Error •

CVSS: -EPSS: 0%CPEs: 8EXPL: 0

In the Linux kernel, the following vulnerability has been resolved: vt: prevent kernel-infoleak in con_font_get() font.data may not initialize all memory spaces depending on the implementation of vc->vc_sw->con_font_get. This may cause info-leak, so to prevent this, it is safest to modify it to initialize the allocated memory space to 0, and it generally does not affect the overall performance of the system. • https://git.kernel.org/stable/c/05e2600cb0a4d73b0779cf29512819616252aeeb https://git.kernel.org/stable/c/efc67cee700b89ffbdb74a0603a083ec1290ae31 https://git.kernel.org/stable/c/dc794e878e6d79f75205be456b1042a289c5759d https://git.kernel.org/stable/c/1e5a17dc77d8a8bbe67040b32e2ef755901aba44 https://git.kernel.org/stable/c/b3959d5eca136e0588f9af3867b34032160cb826 https://git.kernel.org/stable/c/23c4cb8a56978e5b1baa171d42e616e316c2039d https://git.kernel.org/stable/c/dc2d5f02636c7587bdd6d1f60fc59c55860b00a4 https://git.kernel.org/stable/c/adb1f312f38f0d2c928ceaff089262798 •

CVSS: 3.5EPSS: 0%CPEs: -EXPL: 0

HCL Connections is vulnerable to an information disclosure vulnerability, due to an IBM WebSphere Application Server error, which could allow a user to obtain sensitive information they are not entitled to due to the improper handling of request data. • https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0116967 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 6.5EPSS: 0%CPEs: -EXPL: 0

An out-of-bounds access issue was addressed with improved bounds checking. This issue is fixed in macOS Ventura 13.7.1, macOS Sonoma 14.7.1. Processing a maliciously crafted file may lead to unexpected app termination. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Apple macOS. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of ICC profiles. • https://support.apple.com/en-us/121568 https://support.apple.com/en-us/121570 • CWE-125: Out-of-bounds Read •