Page 2 of 12062 results (0.006 seconds)

CVSS: 7.8EPSS: 0%CPEs: -EXPL: 0

03 Feb 2025 — Insertion of Sensitive Information into Log File vulnerability in DualCube MooWoodle allows Retrieve Embedded Sensitive Data. This issue affects MooWoodle: from n/a through 3.2.4. • https://patchstack.com/database/wordpress/plugin/moowoodle/vulnerability/wordpress-moowoodle-plugin-3-2-4-sensitive-data-exposure-vulnerability? • CWE-532: Insertion of Sensitive Information into Log File •

CVSS: 5.7EPSS: 0%CPEs: 1EXPL: 0

03 Feb 2025 — This could lead to local information disclosure, if an attacker has physical access to the device, if a malicious actor has already obtained the System privilege. • https://corp.mediatek.com/product-security-bulletin/February-2025 • CWE-1295: Debug Messages Revealing Unnecessary Information •

CVSS: 6.2EPSS: 0%CPEs: 1EXPL: 0

03 Feb 2025 — This could lead to local information disclosure, if an attacker has physical access to the device, with no additional execution privileges needed. • https://corp.mediatek.com/product-security-bulletin/February-2025 • CWE-125: Out-of-bounds Read •

CVSS: 4.9EPSS: 0%CPEs: 1EXPL: 0

03 Feb 2025 — This could lead to local information disclosure, if an attacker has physical access to the device, with no additional execution privileges needed. • https://corp.mediatek.com/product-security-bulletin/February-2025 • CWE-457: Use of Uninitialized Variable •

CVSS: 4.3EPSS: 0%CPEs: 2EXPL: 0

31 Jan 2025 — IBM Sterling B2B Integrator 6.0.0.0 through 6.1.2.5 and 6.2.0.0 through 6.2.0.3 Standard Edition EBICS server could allow an authenticated user to obtain sensitive filename information due to an observable discrepancy. • https://www.ibm.com/support/pages/node/7182063 • CWE-203: Observable Discrepancy •

CVSS: 6.8EPSS: 0%CPEs: -EXPL: 0

31 Jan 2025 — Insertion of Sensitive Information Into Sent Data vulnerability in UkrSolution Barcode Generator for WooCommerce allows Retrieve Embedded Sensitive Data. This issue affects Barcode Generator for WooCommerce: from n/a through 2.0.2. • https://patchstack.com/database/wordpress/plugin/embedding-barcodes-into-product-pages-and-orders/vulnerability/wordpress-barcode-generator-for-woocommerce-plugin-2-0-2-sensitive-data-exposure-vulnerability? • CWE-201: Insertion of Sensitive Information Into Sent Data •

CVSS: 3.3EPSS: 0%CPEs: -EXPL: 0

31 Jan 2025 — This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of XPS files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other ... •

CVSS: 3.3EPSS: 0%CPEs: -EXPL: 0

31 Jan 2025 — This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of XPS files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other ... •

CVSS: 3.3EPSS: 0%CPEs: -EXPL: 0

31 Jan 2025 — This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JB2 files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other ... •

CVSS: 3.3EPSS: 0%CPEs: -EXPL: 0

31 Jan 2025 — This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JB2 files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other ... •