Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2020-13179

Summary
Assigner-Teradici
Assigner Org ID-ba3c294d-a544-4fff-ad44-2de7c7bbb6be
Published At-11 Aug, 2020 | 18:06
Updated At-04 Aug, 2024 | 12:11
Rejected At-
Credits

Broker Protocol messages in Teradici PCoIP Standard Agent for Windows and Graphics Agent for Windows prior to 20.04.1 are not cleaned up in server memory, which may allow an attacker to read confidential information from a memory dump via forcing a crashing during the single sign-on procedure.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:Teradici
Assigner Org ID:ba3c294d-a544-4fff-ad44-2de7c7bbb6be
Published At:11 Aug, 2020 | 18:06
Updated At:04 Aug, 2024 | 12:11
Rejected At:
▼CVE Numbering Authority (CNA)

Broker Protocol messages in Teradici PCoIP Standard Agent for Windows and Graphics Agent for Windows prior to 20.04.1 are not cleaned up in server memory, which may allow an attacker to read confidential information from a memory dump via forcing a crashing during the single sign-on procedure.

Affected Products
Vendor
n/a
Product
- PCoIP Standard Agent for Windows - PCoIP Graphics Agent for Windows
Versions
Affected
  • PCoIP Standard Agent for Windows 20.04 and earlier, PCoIP Graphics Agent for Windows 20.04 and earlier
Problem Types
TypeCWE IDDescription
CWECWE-200Exposure of Sensitive Information (CWE-200)
Type: CWE
CWE ID: CWE-200
Description: Exposure of Sensitive Information (CWE-200)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://advisory.teradici.com/security-advisories/60/
x_refsource_MISC
Hyperlink: https://advisory.teradici.com/security-advisories/60/
Resource:
x_refsource_MISC
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://advisory.teradici.com/security-advisories/60/
x_refsource_MISC
x_transferred
Hyperlink: https://advisory.teradici.com/security-advisories/60/
Resource:
x_refsource_MISC
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:security@teradici.com
Published At:11 Aug, 2020 | 19:15
Updated At:04 Nov, 2021 | 16:10

Broker Protocol messages in Teradici PCoIP Standard Agent for Windows and Graphics Agent for Windows prior to 20.04.1 are not cleaned up in server memory, which may allow an attacker to read confidential information from a memory dump via forcing a crashing during the single sign-on procedure.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.15.5MEDIUM
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Primary2.02.1LOW
AV:L/AC:L/Au:N/C:P/I:N/A:N
Type: Primary
Version: 3.1
Base score: 5.5
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Type: Primary
Version: 2.0
Base score: 2.1
Base severity: LOW
Vector:
AV:L/AC:L/Au:N/C:P/I:N/A:N
CPE Matches

teradici
teradici
>>graphics_agent>>Versions before 20.04.1(exclusive)
cpe:2.3:a:teradici:graphics_agent:*:*:*:*:*:windows:*:*
teradici
teradici
>>pcoip_standard_agent>>Versions before 20.04.1(exclusive)
cpe:2.3:a:teradici:pcoip_standard_agent:*:*:*:*:*:windows:*:*
Weaknesses
CWE IDTypeSource
CWE-212Primarynvd@nist.gov
CWE-200Secondarysecurity@teradici.com
CWE ID: CWE-212
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-200
Type: Secondary
Source: security@teradici.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://advisory.teradici.com/security-advisories/60/security@teradici.com
Vendor Advisory
Hyperlink: https://advisory.teradici.com/security-advisories/60/
Source: security@teradici.com
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

1098Records found

CVE-2018-15532
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-3.8||LOW
EPSS-0.15% / 35.95%
||
7 Day CHG~0.00%
Published-17 Mar, 2019 | 21:23
Updated-05 Aug, 2024 | 09:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

SynTP.sys in Synaptics Touchpad drivers before 2018-06-06 allows local users to obtain sensitive information about freed kernel addresses.

Action-Not Available
Vendor-n/aHP Inc.
Product-synaptics_touchpad_drivern/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2018-15765
Matching Score-4
Assigner-Dell
ShareView Details
Matching Score-4
Assigner-Dell
CVSS Score-3.4||LOW
EPSS-0.14% / 34.90%
||
7 Day CHG~0.00%
Published-18 Oct, 2018 | 22:00
Updated-16 Sep, 2024 | 19:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell EMC Secure Remote Services, versions prior to 3.32.00.08, contains an Information Exposure vulnerability. The log file contents store sensitive data including executed commands to generate authentication tokens which may prove useful to an attacker for crafting malicious authentication tokens for querying the application and subsequent attacks.

Action-Not Available
Vendor-Dell Inc.
Product-emc_secure_remote_servicesESRS Virtual Edition
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2018-15594
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.07% / 21.29%
||
7 Day CHG~0.00%
Published-20 Aug, 2018 | 08:00
Updated-05 Aug, 2024 | 10:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

arch/x86/kernel/paravirt.c in the Linux kernel before 4.18.1 mishandles certain indirect calls, which makes it easier for attackers to conduct Spectre-v2 attacks against paravirtual guests.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncDebian GNU/LinuxCanonical Ltd.
Product-ubuntu_linuxdebian_linuxlinux_kerneln/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2024-43046
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.06% / 18.93%
||
7 Day CHG~0.00%
Published-07 Apr, 2025 | 10:15
Updated-06 Oct, 2025 | 20:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Information Exposure in TZ Secure OS

There may be information disclosure during memory re-allocation in TZ Secure OS.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca6426qcn9274_firmwareqdu1010_firmwareqca6698aq_firmwareipq6010snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-ac\)sdx55qcs4290_firmwaresnapdragon_xr2_5g_platform_firmwaresdx80mwcn3620sd670_firmwareqcn6023_firmwarefastconnect_6200_firmwaresnapdragon_865\+_5g_mobile_platform_\(sm8250-ab\)snapdragon_855\+\/860_mobile_platform_\(sm8150-ac\)qcn5121_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-ab\)sd670sxr2330psnapdragon_auto_5g_modem-rf_gen_2qca9984qcn6274_firmwaresnapdragon_4_gen_1_mobile_platformsd_675_firmwaresnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-ab\)qcn5021qca6574aqcs8550_firmware9205_lte_modem_firmwaresd888_firmwaresc8380xp_firmwareqcn5052_firmwareipq5312_firmwareipq6010_firmwareipq5312qcn9012sa8155_firmwaresdx80m_firmwareqcn9012_firmwareqcn9024snapdragon_865_5g_mobile_platformaqt1000smart_audio_400_platformsnapdragon_685_4g_mobile_platform_\(sm6225-ad\)snapdragon_wear_4100\+_platformqdu1210snapdragon_8_gen_3_mobile_platformsd_675snapdragon_wear_1300_platformqcn9160qca8386sxr2130snapdragon_ar2_gen_1_platform_firmwareqcn6402qca6574ausxr2130_firmwareqam8620psnapdragon_ar1_gen_1_platform_\"luna1\"snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-af\)sxr2230psnapdragon_865_5g_mobile_platform_firmwarewcn3680bsd675sa7775p_firmwareipq6028qcn9072_firmwaresd460sa8255pqca6574qcn7606_firmwareqca6574au_firmwareqcn6274snapdragon_x65_5g_modem-rf_system_firmwareqcn9070vision_intelligence_300_platformwcd9335_firmwaresa8295pqam8775pqcn9000_firmwarecsra6640_firmwareqcn6412wcd9341_firmwarewcn6650sa8620p_firmwaressg2125p_firmwaresd662_firmwaresd865_5g_firmwaresnapdragon_780g_5g_mobile_platformqca8084sd460_firmwareqca6678aq_firmwareqsm8350_firmwaresdx55_firmwaresnapdragon_429_mobile_platformqxm8083fastconnect_6700wsa8832_firmwareipq6000_firmwarewcn7861qsm8250_firmwarewcn3950qcc710qca6431_firmwaresa6145pqca6421_firmwareqca8082_firmwareqca6420qcf8000sfpqcm5430_firmwaresnapdragon_x35_5g_modem-rf_systemwcd9380wcn3950_firmwareqcm6490_firmwaresnapdragon_780g_5g_mobile_platform_firmwarewcn6650_firmwareipq6000qam8620p_firmwaresnapdragon_662_mobile_platform_firmwaresnapdragon_x62_5g_modem-rf_systemqca6335_firmwarewcn3988_firmwareqcn5021_firmwarecsr8811robotics_rb2_platformwcn7880_firmwarewsa8810snapdragon_768g_5g_mobile_platform_\(sm7250-ac\)sxr2250p_firmwaresnapdragon_695_5g_mobile_platform_firmwarewcn3910_firmwareqcm8550qamsrv1haqt1000_firmwaresnapdragon_8\+_gen_1_mobile_platformsa8770p_firmwareqca6574a_firmwaresm6370snapdragon_x50_5g_modem-rf_systemsnapdragon_8cx_compute_platform_\(sc8180xp-af\)_firmwaresnapdragon_680_4g_mobile_platform_firmwareqca6688aqqca6595au_firmwaresnapdragon_460_mobile_platformsm4125_firmwareqcn7606qca6698aqsnapdragon_695_5g_mobile_platformsnapdragon_855_mobile_platform_firmwaresa8650p_firmwaresnapdragon_x24_lte_modem_firmwaresnapdragon_x24_lte_modemsm6650_firmwareqca8081_firmwaresnapdragon_665_mobile_platform_firmwareqcs4290fastconnect_6200qcn9024_firmwaresnapdragon_778g_5g_mobile_platform_firmwaresm7635qcm4490_firmwareipq9048_firmwareqru1032315_5g_iot_modemqcn6402_firmwaresm7315_firmwareqca6595snapdragon_480\+_5g_mobile_platform_\(sm4350-ac\)_firmwarewcn6740_firmwaresnapdragon_850_mobile_compute_platform_firmwarewcd9390snapdragon_8\+_gen_2_mobile_platform_firmwarecsra6620_firmwareqcn9070_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-ab\)_firmwareqcn9022snapdragon_675_mobile_platform_firmwareipq6005_firmwareqam8255p_firmwaresdx57msm7325p_firmwarevision_intelligence_400_platform_firmwareqca6688aq_firmwaresrv1l_firmwarewcn7881_firmwareqcn6422_firmwareimmersive_home_3210_platformqcn6023sxr2330p_firmwaresnapdragon_x72_5g_modem-rf_systemwcd9385_firmwarecsr8811_firmwarefastconnect_6700_firmwareqca8072_firmwaresnapdragon_4_gen_2_mobile_platformsnapdragon_888_5g_mobile_platform_firmwarear8035qcm2290_firmwaresnapdragon_690_5g_mobile_platformsnapdragon_8_gen_1_mobile_platformsnapdragon_8cx_compute_platform_\(sc8180x-ab\)_firmwaresm7635_firmwarewcn3660bipq9574_firmwaresm7250pqru1032_firmwaresnapdragon_480_5g_mobile_platformsa8150p_firmwareqcn5052ipq9048qca6564aqcn9013_firmwaresa6155p_firmwareipq5302_firmwaresnapdragon_xr2\+_gen_1_platformtalynplusqca0000qca6574_firmwareqamsrv1h_firmwareqcm8550_firmwareqam8650pqcn9274snapdragon_ar2_gen_1_platformqdu1210_firmwareqfw7124_firmwareipq9570sdx71msd_8cx_firmwaresnapdragon_782g_mobile_platform_\(sm7325-af\)_firmwareqmp1000ipq5300qcn6432wcn7881wcd9326_firmwaresnapdragon_460_mobile_platform_firmwareqcs6490snapdragon_8cx_compute_platform_\(sc8180x-aa\)_firmwareimmersive_home_326_platform_firmwarewcn6755_firmwaresdx71m_firmwaresd_8_gen1_5gsnapdragon_x75_5g_modem-rf_systemqcs5430_firmwaresm7675snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-aa\)_firmwaresa8155psnapdragon_x62_5g_modem-rf_system_firmwarewcn7750_firmwaresxr2250pwcn3990_firmwarewcn6450ipq9554sm8750_firmwareqca9377_firmwaresnapdragon_670_mobile_platformqcf8000qcs9100qdu1110_firmwareqru1052_firmwareqca6335wsa8815qca6564auqca4024_firmwareqcs2290wcd9340qcn5124qcn6412_firmwaresm7325psa8530probotics_rb3_platformsnapdragon_662_mobile_platformsnapdragon_wear_1300_platform_firmwareqcn9011ipq5332ipq6028_firmwaresnapdragon_x50_5g_modem-rf_system_firmwareqca6174a_firmwaresrv1htalynplus_firmwarefastconnect_6900_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwaresnapdragon_765_5g_mobile_platform_\(sm7250-aa\)_firmwareqcn9072snapdragon_wear_4100\+_platform_firmwarewcd9326snapdragon_680_4g_mobile_platformqca9984_firmwareqca4004smart_audio_400_platform_firmwarear8031snapdragon_8cx_compute_platform_\(sc8180x-ab\)snapdragon_845_mobile_platform_firmwarewsa8845qfw7114sd675_firmwaresrv1h_firmwareqca8081snapdragon_ar1_gen_1_platform_\"luna1\"_firmwarewsa8830_firmwarewsa8840sxr1230psa6145p_firmwaresnapdragon_678_mobile_platform_\(sm6150-ac\)_firmwaresnapdragon_auto_5g_modem-rfqam8295psnapdragon_x55_5g_modem-rf_systemsa8540p_firmwareqca0000_firmwareqdu1010qam8295p_firmwareqca8072qcn9160_firmwaresm8635p_firmwaresnapdragon_8cx_compute_platform_\(sc8180xp-ac\)_firmwaresnapdragon_x65_5g_modem-rf_systemwcn3620_firmwaresm6650qru1062_firmwaresa8775psdm429w_firmwaresdx65m_firmwareqca6564au_firmwareqca8075qca4024sd888sm8750pqca6430snapdragon_8\+_gen_2_mobile_platformsm7250p_firmwareqca8082qca8084_firmwaresnapdragon_7c\+_gen_3_compute_firmwaresa7255psd_8cxipq6018ipq6018_firmwaresnapdragon_ar1_gen_1_platformssg2115p_firmwaresnapdragon_675_mobile_platformsnapdragon_7c\+_gen_3_computesm7675p_firmwaresd855_firmwaresnapdragon_778g\+_5g_mobile_platform_\(sm7325-ae\)fastconnect_7800_firmwaresnapdragon_888_5g_mobile_platformqcm2290sm8735_firmwareqcf8000_firmwaresdx61_firmwarewcn7860sm7315sg8275p_firmwareqcn9074_firmwaresnapdragon_678_mobile_platform_\(sm6150-ac\)snapdragon_855\+\/860_mobile_platform_\(sm8150-ac\)_firmwaresm8750p_firmwaresa8155p_firmwaressg2115psa7255p_firmwareqca6431fastconnect_7800sm8550pqca8386_firmwaresnapdragon_4_gen_1_mobile_platform_firmwareqca6436snapdragon_8_gen_2_mobile_platformsnapdragon_685_4g_mobile_platform_\(sm6225-ad\)_firmwareqcs5430wcn3990qca6584au_firmwareqxm8083_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-ac\)_firmwarefastconnect_6800wcn6755fastconnect_6900qca6426_firmwaresa9000p_firmwaresnapdragon_8c_compute_platform_\(sc8180xp-ad\)_firmwarewsa8832qca8085qdu1110qdx1011_firmwaresdx61snapdragon_x72_5g_modem-rf_system_firmwaresnapdragon_8_gen_1_mobile_platform_firmwarefastconnect_6800_firmwareqdu1000_firmwarewcn3910snapdragon_8cx_gen_3_compute_platform_\(sc8280xp-bb\)_firmwaresnapdragon_782g_mobile_platform_\(sm7325-af\)snapdragon_8\+_gen_1_mobile_platform_firmwarewcn7880snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-aa\)snapdragon_765_5g_mobile_platform_\(sm7250-aa\)qfw7114_firmwareqcn5122snapdragon_870_5g_mobile_platform_\(sm8250-ac\)sa8530p_firmwaresd855snapdragon_8c_compute_platform_\(sc8180x-ad\)_firmwarewsa8835_firmwaresa8255p_firmwaresm4635_firmwarerobotics_rb2_platform_firmwarewsa8830wcn6450_firmwareqca6564a_firmwareipq9008_firmwaresrv1m_firmwaresa6155pqcn5022csra6620sc8380xpqam8775p_firmwarewcn3980qcn5121immersive_home_3210_platform_firmwareqcs6490_firmwaresd_8_gen1_5g_firmwareipq6005qcn5022_firmwarewcd9378qca6391_firmwaresnapdragon_778g_5g_mobile_platformwcd9340_firmwareipq9554_firmwaresnapdragon_480_5g_mobile_platform_firmwaresnapdragon_665_mobile_platformqcn9000ipq5332_firmwarevideo_collaboration_vc3_platformqca8337qca6696_firmwareqcm4290wcd9380_firmwareqep8111_firmwarewcn7860_firmware315_5g_iot_modem_firmwarear8035_firmwaresa8295p_firmwareqmp1000_firmwaresnapdragon_8cx_compute_platform_\(sc8180xp-af\)snapdragon_750g_5g_mobile_platformar8031_firmwarewcd9360_firmwareqca6797aqimmersive_home_326_platformqca6174asxr2230p_firmwareqcm4490snapdragon_x35_5g_modem-rf_system_firmwarewcd9306_firmwareqcn6422qamsrv1msnapdragon_670_mobile_platform_firmwareqcn6432_firmwaresnapdragon_768g_5g_mobile_platform_\(sm7250-ac\)_firmwaresrv1lsa6155_firmwarewcd9378_firmwareqcc710_firmwarewcd9335qca6584auwsa8845hsnapdragon_765g_5g_mobile_platform_\(sm7250-ab\)_firmwaresnapdragon_870_5g_mobile_platform_\(sm8250-ac\)_firmwarewsa8840_firmwareqcs8300qca6421wsa8815_firmwareqcf8001_firmwareqdx1010_firmwarewcn7861_firmwaresnapdragon_888\+_5g_mobile_platform_\(sm8350-ac\)snapdragon_429_mobile_platform_firmwareqcf8000sfp_firmwareqcs9100_firmwaresnapdragon_850_mobile_compute_platformsnapdragon_8cx_compute_platform_\(sc8180x-aa\)wsa8835vision_intelligence_300_platform_firmwaresnapdragon_8_gen_3_mobile_platform_firmwareqcs2290_firmwareqru1052wcn3988wcd9390_firmwaresnapdragon_ar1_gen_1_platform_firmwaresm8650qqcn5152_firmwaresm8550p_firmwaresnapdragon_auto_5g_modem-rf_firmwareqca6678aqsa8155wcd9375sm4635ipq9574sm8635qam8650p_firmware9205_lte_modemqcs4490_firmwaresnapdragon_xr2\+_gen_1_platform_firmwarerobotics_rb3_platform_firmwaresm8635psnapdragon_778g\+_5g_mobile_platform_\(sm7325-ae\)_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-af\)_firmwareqcn6224sa8775p_firmwareqamsrv1m_firmwarewcd9360ipq9570_firmwaresm8650q_firmwaresnapdragon_8c_compute_platform_\(sc8180x-ad\)qdx1011sm7675_firmwaresnapdragon_690_5g_mobile_platform_firmwarevision_intelligence_400_platformsnapdragon_865\+_5g_mobile_platform_\(sm8250-ab\)_firmwareqsm8250wcd9395_firmwarewcd9306sa8650psm6370_firmwareqca4004_firmwaressg2125psnapdragon_845_mobile_platformqca6310_firmwaresnapdragon_x55_5g_modem-rf_system_firmwarewcn3660b_firmwareqca8085_firmwaresnapdragon_x70_modem-rf_system_firmwarewcn6740qca6310qcm5430snapdragon_480\+_5g_mobile_platform_\(sm4350-ac\)sdx57m_firmwareqcn6024_firmwareqep8111qca6420_firmwarewcn3999qca6696sa8540pqsm8350sa8770pqcn9013qca6595_firmwareqcm6490snapdragon_4_gen_2_mobile_platform_firmwarewsa8810_firmwarewcd9370sd662wsa8845_firmwaresnapdragon_855_mobile_platformqca6430_firmwareqcn5152qca9377qdx1010sa6155snapdragon_x70_modem-rf_systemsnapdragon_x75_5g_modem-rf_system_firmwareqcn6024csra6640snapdragon_8cx_gen_3_compute_platform_\(sc8280xp-ab\)_firmwareqcn9074qru1062qdu1000qca6595ausdm429wsa8620psxr1230p_firmwareqcm4290_firmwaresnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-bb\)snapdragon_8c_compute_platform_\(sc8180xp-ad\)sa9000pqcs8300_firmwarewcn7750wcn3980_firmwaresm8735qcs4490qcn9022_firmwareqcn5122_firmwaresnapdragon_8cx_compute_platform_\(sc8180xp-ac\)qcf8001qca6391ipq9008qam8255pwcd9370_firmwaresnapdragon_765g_5g_mobile_platform_\(sm7250-ab\)qfw7124qcn9011_firmwareqcs8550wcd9341sd865_5gsa8150psnapdragon_xr2_5g_platformwcd9395qcn6224_firmwareqca6797aq_firmwaresm8635_firmwarewcd9375_firmwareipq5302qcn5124_firmwarewcn3680b_firmwarewcn3999_firmwaresm7675psg8275pqca8075_firmwaresdx65mwcd9385snapdragon_888\+_5g_mobile_platform_\(sm8350-ac\)_firmwaresa7775psm4125snapdragon_750g_5g_mobile_platform_firmwaresm8750ipq5300_firmwareqca6436_firmwaresnapdragon_8_gen_2_mobile_platform_firmwarevideo_collaboration_vc3_platform_firmwareqca8337_firmwaresrv1mwsa8845h_firmwareSnapdragon
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2018-1505
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-4||MEDIUM
EPSS-0.04% / 12.54%
||
7 Day CHG~0.00%
Published-06 Dec, 2018 | 14:00
Updated-17 Sep, 2024 | 02:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM i2 Enterprise Insight Analysis 2.1.7 allows web pages to be stored locally which can be read by another user on the system. IBM X-Force ID: 141413.

Action-Not Available
Vendor-IBM Corporation
Product-i2_enterprise_insight_analysisi2 Enterprise Insight Analysis
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2018-1568
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-4||MEDIUM
EPSS-0.04% / 12.54%
||
7 Day CHG~0.00%
Published-05 Dec, 2018 | 17:00
Updated-17 Sep, 2024 | 04:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM QRadar SIEM 7.2 and 7.3 allows web pages to be stored locally which can be read by another user on the system. IBM X-Force ID: 143118.

Action-Not Available
Vendor-IBM Corporation
Product-qradar_incident_forensicsQRadar SIEM
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2018-15407
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.06% / 18.79%
||
7 Day CHG~0.00%
Published-05 Oct, 2018 | 14:00
Updated-26 Nov, 2024 | 14:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco HyperFlex World-Readable Sensitive Information Vulnerability

A vulnerability in the installation process of Cisco HyperFlex Software could allow an authenticated, local attacker to read sensitive information. The vulnerability is due to insufficient cleanup of installation files. An attacker could exploit this vulnerability by accessing the residual installation files on an affected system. A successful exploit could allow the attacker to collect sensitive information regarding the configuration of the system.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-hyperflex_hx_data_platformCisco HyperFlex HX-Series
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE ID-CWE-459
Incomplete Cleanup
CVE-2018-1564
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-4.4||MEDIUM
EPSS-0.05% / 14.04%
||
7 Day CHG~0.00%
Published-20 Jul, 2018 | 16:00
Updated-16 Sep, 2024 | 22:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM Sterling B2B Integrator Standard Edition 5.2 through 5.2.6 could allow a local user with administrator privileges to obtain user passwords found in debugging messages. IBM X-Force ID: 142968.

Action-Not Available
Vendor-IBM Corporation
Product-sterling_b2b_integratorSterling B2B Integrator
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2018-15615
Matching Score-4
Assigner-Avaya, Inc.
ShareView Details
Matching Score-4
Assigner-Avaya, Inc.
CVSS Score-7.2||HIGH
EPSS-0.06% / 17.23%
||
7 Day CHG~0.00%
Published-24 Sep, 2018 | 13:00
Updated-05 Aug, 2024 | 10:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CMS Supervisor Information Disclosure

A vulnerability in the Supervisor component of Avaya Call Management System allows local administrative user to extract sensitive information from users connecting to a remote CMS host. Affected versions of CMS Supervisor include R17.0.x and R18.0.x.

Action-Not Available
Vendor-Avaya LLC
Product-call_management_system_supervisorCall Management System Supervisor
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2017-5223
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-8.90% / 92.45%
||
7 Day CHG~0.00%
Published-16 Jan, 2017 | 06:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in PHPMailer before 5.2.22. PHPMailer's msgHTML method applies transformations to an HTML document to make it usable as an email message body. One of the transformations is to convert relative image URLs into attachments using a script-provided base directory. If no base directory is provided, it resolves to /, meaning that relative image URLs get treated as absolute local file paths and added as attachments. To form a remote vulnerability, the msgHTML method must be called, passed an unfiltered, user-supplied HTML document, and must not set a base directory.

Action-Not Available
Vendor-phpmailer_projectn/a
Product-phpmailern/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2023-30841
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-6||MEDIUM
EPSS-0.02% / 3.46%
||
7 Day CHG~0.00%
Published-26 Apr, 2023 | 18:24
Updated-30 Jan, 2025 | 21:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Ironic and ironic-inspector deployed within Baremetal Operator may expose as ConfigMaps

Baremetal Operator (BMO) is a bare metal host provisioning integration for Kubernetes. Prior to version 0.3.0, ironic and ironic-inspector deployed within Baremetal Operator using the included `deploy.sh` store their `.htpasswd` files as ConfigMaps instead of Secrets. This causes the plain-text username and hashed password to be readable by anyone having a cluster-wide read-access to the management cluster, or access to the management cluster's Etcd storage. This issue is patched in baremetal-operator PR#1241, and is included in BMO release 0.3.0 onwards. As a workaround, users may modify the kustomizations and redeploy the BMO, or recreate the required ConfigMaps as Secrets per instructions in baremetal-operator PR#1241.

Action-Not Available
Vendor-metal3-ioThe Linux Foundation
Product-baremetal_operatorbaremetal-operator
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2021-34771
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.14% / 33.55%
||
7 Day CHG~0.00%
Published-09 Sep, 2021 | 05:01
Updated-07 Nov, 2024 | 22:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IOS XR Software Unauthorized Information Disclosure Vulnerability

A vulnerability in the Cisco IOS XR Software CLI could allow an authenticated, local attacker to view more information than their privileges allow. This vulnerability is due to insufficient application of restrictions during the execution of a specific command. An attacker could exploit this vulnerability by running a specific command. A successful exploit could allow the attacker to view sensitive configuration information that their privileges might not otherwise allow them to access.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ios_xrCisco IOS XR Software
CWE ID-CWE-201
Insertion of Sensitive Information Into Sent Data
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2021-25350
Matching Score-4
Assigner-Samsung Mobile
ShareView Details
Matching Score-4
Assigner-Samsung Mobile
CVSS Score-2||LOW
EPSS-0.05% / 15.03%
||
7 Day CHG~0.00%
Published-25 Mar, 2021 | 16:10
Updated-03 Aug, 2024 | 20:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Information Exposure vulnerability in Samsung Account prior to version 12.1.1.3 allows physically proximate attackers to access user information via log.

Action-Not Available
Vendor-Google LLCSamsungSamsung Electronics
Product-androidaccountSamsung Account
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE ID-CWE-532
Insertion of Sensitive Information into Log File
CVE-2021-25464
Matching Score-4
Assigner-Samsung Mobile
ShareView Details
Matching Score-4
Assigner-Samsung Mobile
CVSS Score-3.3||LOW
EPSS-0.06% / 17.64%
||
7 Day CHG~0.00%
Published-09 Sep, 2021 | 18:05
Updated-03 Aug, 2024 | 20:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An improper file management vulnerability in SamsungCapture prior to version 4.8.02 allows sensitive information leak.

Action-Not Available
Vendor-SamsungSamsung Electronics
Product-captureSamsung Capture
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2023-21449
Matching Score-4
Assigner-Samsung Mobile
ShareView Details
Matching Score-4
Assigner-Samsung Mobile
CVSS Score-4||MEDIUM
EPSS-0.07% / 21.56%
||
7 Day CHG~0.00%
Published-16 Mar, 2023 | 00:00
Updated-26 Feb, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper access control vulnerability in Call application prior to SMR Mar-2023 Release 1 allows local attackers to access sensitive information without proper permission.

Action-Not Available
Vendor-Samsung ElectronicsSamsung
Product-androidSamsung Mobile Devices
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2021-25392
Matching Score-4
Assigner-Samsung Mobile
ShareView Details
Matching Score-4
Assigner-Samsung Mobile
CVSS Score-4||MEDIUM
EPSS-0.01% / 0.85%
||
7 Day CHG~0.00%
Published-11 Jun, 2021 | 14:45
Updated-03 Aug, 2024 | 20:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper protection of backup path configuration in Samsung Dex prior to SMR MAY-2021 Release 1 allows local attackers to get sensitive information via changing the path.

Action-Not Available
Vendor-Google LLCSamsung Electronics
Product-androidSamsung Mobile Devices
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE ID-CWE-326
Inadequate Encryption Strength
CVE-2024-41629
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.6||MEDIUM
EPSS-0.01% / 0.92%
||
7 Day CHG~0.00%
Published-12 Sep, 2024 | 00:00
Updated-13 Sep, 2024 | 16:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue in Texas Instruments Fusion Digital Power Designer v.7.10.1 allows a local attacker to obtain sensitive information via the plaintext storage of credentials

Action-Not Available
Vendor-tin/atexas_instruments
Product-fusion_digital_power_designern/afusion_digital_power_designer
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE ID-CWE-312
Cleartext Storage of Sensitive Information
CVE-2021-25369
Matching Score-4
Assigner-Samsung Mobile
ShareView Details
Matching Score-4
Assigner-Samsung Mobile
CVSS Score-6.2||MEDIUM
EPSS-0.16% / 36.39%
||
7 Day CHG~0.00%
Published-26 Mar, 2021 | 18:22
Updated-30 Oct, 2025 | 15:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2022-11-29||Apply updates per vendor instructions.

An improper access control vulnerability in sec_log file prior to SMR MAR-2021 Release 1 exposes sensitive kernel information to userspace.

Action-Not Available
Vendor-Google LLCSamsung ElectronicsSamsung
Product-androidSamsung Mobile DevicesMobile Devices
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2024-40850
Matching Score-4
Assigner-Apple Inc.
ShareView Details
Matching Score-4
Assigner-Apple Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.03% / 7.55%
||
7 Day CHG~0.00%
Published-16 Sep, 2024 | 23:22
Updated-04 Nov, 2025 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A file access issue was addressed with improved input validation. This issue is fixed in macOS Ventura 13.7, iOS 17.7 and iPadOS 17.7, visionOS 2, watchOS 11, macOS Sequoia 15, iOS 18 and iPadOS 18, macOS Sonoma 14.7, tvOS 18. An app may be able to access user-sensitive data.

Action-Not Available
Vendor-Apple Inc.
Product-tvoswatchosipadosmacosvisionosiphone_osiOS and iPadOStvOSvisionOSwatchOSmacOS
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2023-21435
Matching Score-4
Assigner-Samsung Mobile
ShareView Details
Matching Score-4
Assigner-Samsung Mobile
CVSS Score-4.4||MEDIUM
EPSS-0.06% / 17.30%
||
7 Day CHG~0.00%
Published-09 Feb, 2023 | 00:00
Updated-24 Mar, 2025 | 18:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Exposure of Sensitive Information vulnerability in Fingerprint TA prior to SMR Feb-2023 Release 1 allows attackers to access the memory address information via log.

Action-Not Available
Vendor-Samsung ElectronicsSamsung
Product-androidSamsung Mobile Devices
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE ID-CWE-532
Insertion of Sensitive Information into Log File
CVE-2011-0197
Matching Score-4
Assigner-Apple Inc.
ShareView Details
Matching Score-4
Assigner-Apple Inc.
CVSS Score-2.1||LOW
EPSS-0.05% / 13.95%
||
7 Day CHG~0.00%
Published-24 Jun, 2011 | 20:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

App Store in Apple Mac OS X before 10.6.8 creates a log entry containing a user's AppleID password, which might allow local users to obtain sensitive information by reading a log file, as demonstrated by a log file that has non-default permissions.

Action-Not Available
Vendor-n/aApple Inc.
Product-mac_os_xmac_os_x_servern/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2023-21624
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-6.2||MEDIUM
EPSS-0.04% / 11.85%
||
7 Day CHG~0.00%
Published-04 Jul, 2023 | 04:46
Updated-02 Aug, 2024 | 09:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Information Exposure in DSP Services

Information disclosure in DSP Services while loading dynamic module.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qam8255p_firmwarewsa8830sa6150p_firmwaresa8145p_firmwaresnapdragon_7c\+_gen_3_firmwaresnapdragon_778g\+_firmwaresa8150p_firmwareqca6595au_firmwaresa6155snapdragon_x55_5gsnapdragon_wear_4100\+wcd9370snapdragon_835_firmwareqca6426wcn3990_firmwarewcd9385_firmwaresnapdragon_782g_firmwarewcn3660bsnapdragon_888\+_firmwaresa8155qca6320_firmwaresm7315_firmwareqca6574au_firmwaresnapdragon_x55_5g_firmwarewcn3680b_firmwareqca6595ausa6155_firmwarewcd9375_firmwaresnapdragon_865\+wcn3610_firmwareqca6436_firmwaresnapdragon_xr2_5gsnapdragon_w5\+_gen_1sa6155p_firmwareqca6310qcs8155qca6698aqsa8155_firmwaresnapdragon_778g_5g_firmwaresa6145p_firmwarefastconnect_6700_firmwaresa8195pwcd9340wsa8810_firmwaresw5100qca6436sa8255p_firmwaresa6155psnapdragon_865_firmwarewcd9335snapdragon_780g_firmwareqca6698aq_firmwarewcd9385sxr2130_firmwaresa8255pwcd9341qca6696_firmwareqca6797aqsnapdragon_xr2_5g_firmwarewcd9375sa8150psnapdragon_870wsa8830_firmwaresd865_5g_firmwaresnapdragon_778g_5gwsa8815_firmwarewsa8835_firmwaresnapdragon_870_firmwaresa8195p_firmwarefastconnect_6800_firmwaresnapdragon_865\+_firmwarewcn3610wcd9380_firmwarewcn3990sw5100psd865_5gfastconnect_6800snapdragon_778g\+snapdragon_865snapdragon_780gsd888wsa8835qca6574wcd9380snapdragon_7c\+_gen_3fastconnect_6700sxr2130qca6574asm7325psnapdragon_888_firmwareqca6310_firmwarewcd9335_firmwarewcn3980qca6574_firmwarewcd9340_firmwarewsa8815sm7325p_firmwareqca6320snapdragon_782gqca6426_firmwarewcn3660b_firmwareqca6574a_firmwaresd835wcn3980_firmwaresm7315qca6391snapdragon_w5\+_gen_1_firmwarewcn6740_firmwaresnapdragon_wear_4100\+_firmwarefastconnect_6900fastconnect_6900_firmwareqca6797aq_firmwareqca6574ausa8155p_firmwarewcd9341_firmwarewsa8810sw5100p_firmwaresa6145pwcn3680bsd835_firmwaresnapdragon_835snapdragon_888sa8145psnapdragon_888\+qca6696wcn6740qca6391_firmwarewcd9370_firmwaresa6150psd888_firmwaresa8155pqcs8155_firmwaresw5100_firmwareqam8255pSnapdragon
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2023-21237
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-6.2||MEDIUM
EPSS-0.70% / 71.88%
||
7 Day CHG~0.00%
Published-28 Jun, 2023 | 00:00
Updated-23 Oct, 2025 | 14:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2024-03-26||Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

In applyRemoteView of NotificationContentInflater.java, there is a possible way to hide foreground service notification due to misleading or insufficient UI. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-251586912

Action-Not Available
Vendor-n/aGoogle LLCAndroid
Product-androidAndroidandroidPixel
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2023-21267
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-5.5||MEDIUM
EPSS-0.01% / 0.20%
||
7 Day CHG~0.00%
Published-14 Aug, 2023 | 20:59
Updated-02 Aug, 2024 | 09:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In multiple functions of KeyguardViewMediator.java, there is a possible way to bypass lockdown mode with screen pinning due to a logic error in the code. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroid
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2023-1633
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-6.6||MEDIUM
EPSS-0.02% / 6.11%
||
7 Day CHG~0.00%
Published-24 Sep, 2023 | 00:09
Updated-24 Sep, 2024 | 15:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Insecure barbican configuration file leaking credential

A credentials leak flaw was found in OpenStack Barbican. This flaw allows a local authenticated attacker to read the configuration file, gaining access to sensitive credentials.

Action-Not Available
Vendor-RDOn/aOpenStackRed Hat, Inc.
Product-openstack_platformbarbicanRed Hat OpenStack Platform 17.0OpenStack RDORed Hat OpenStack Platform 13 (Queens)Red Hat OpenStack Platform 16.2openstack-barbicanRed Hat OpenStack Platform 16.1
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2023-3006
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.01% / 2.58%
||
7 Day CHG~0.00%
Published-31 May, 2023 | 00:00
Updated-09 Jan, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A known cache speculation vulnerability, known as Branch History Injection (BHI) or Spectre-BHB, becomes actual again for the new hw AmpereOne. Spectre-BHB is similar to Spectre v2, except that malicious code uses the shared branch history (stored in the CPU Branch History Buffer, or BHB) to influence mispredicted branches within the victim's hardware context. Once that occurs, speculation caused by the mispredicted branches can cause cache allocation. This issue leads to obtaining information that should not be accessible.

Action-Not Available
Vendor-n/aLinux Kernel Organization, Inc
Product-linux_kernelKernel
CWE ID-CWE-226
Sensitive Information in Resource Not Removed Before Reuse
CWE ID-CWE-212
Improper Removal of Sensitive Information Before Storage or Transfer
CVE-2008-3897
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-2.1||LOW
EPSS-0.06% / 19.82%
||
7 Day CHG~0.00%
Published-03 Sep, 2008 | 14:00
Updated-07 Aug, 2024 | 09:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

DiskCryptor 0.2.6 on Windows stores pre-boot authentication passwords in the BIOS Keyboard buffer and does not clear this buffer before and after use, which allows local users to obtain sensitive information by reading the physical memory locations associated with this buffer.

Action-Not Available
Vendor-freed0mn/aMicrosoft Corporation
Product-windowsdisckcryptorn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2023-28723
Matching Score-4
Assigner-Intel Corporation
ShareView Details
Matching Score-4
Assigner-Intel Corporation
CVSS Score-3.3||LOW
EPSS-0.10% / 26.61%
||
7 Day CHG~0.00%
Published-14 Nov, 2023 | 19:04
Updated-30 Aug, 2024 | 15:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Exposure of sensitive information to an unauthorized actor in some Intel(R) Aptio* V UEFI Firmware Integrator Tools may allow an authenticated user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncIntel CorporationMicrosoft Corporation
Product-windowslinux_kernelaptio_v_uefi_firmware_integrator_toolsIntel(R) Aptio* V UEFI Firmware Integrator Tools
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2023-28203
Matching Score-4
Assigner-Apple Inc.
ShareView Details
Matching Score-4
Assigner-Apple Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.06% / 17.10%
||
7 Day CHG~0.00%
Published-28 Jul, 2023 | 04:30
Updated-07 Mar, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The issue was addressed with improved checks. This issue is fixed in Apple Music 4.2.0 for Android. An app may be able to access contacts.

Action-Not Available
Vendor-Apple Inc.
Product-musicApple Music for Android
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2010-3861
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-2.1||LOW
EPSS-0.05% / 16.01%
||
7 Day CHG~0.00%
Published-10 Dec, 2010 | 18:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The ethtool_get_rxnfc function in net/core/ethtool.c in the Linux kernel before 2.6.36 does not initialize a certain block of heap memory, which allows local users to obtain potentially sensitive information via an ETHTOOL_GRXCLSRLALL ethtool command with a large info.rule_cnt value, a different vulnerability than CVE-2010-2478.

Action-Not Available
Vendor-n/aSUSELinux Kernel Organization, IncCanonical Ltd.openSUSE
Product-linux_kernelubuntu_linuxopensuselinux_enterprise_serverlinux_enterprise_real_time_extensionlinux_enterprise_desktopn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2023-28271
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.21% / 43.82%
||
7 Day CHG~0.00%
Published-11 Apr, 2023 | 19:13
Updated-23 Jan, 2025 | 01:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Kernel Memory Information Disclosure Vulnerability

Windows Kernel Memory Information Disclosure Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_21h2windows_10_1809windows_server_2016windows_server_2012windows_server_2008windows_10_1507windows_11_21h2windows_10_22h2windows_server_2022windows_10_20h2windows_11_22h2windows_server_2019windows_10_1607Windows Server 2012 R2 (Server Core installation)Windows 10 Version 22H2Windows Server 2016Windows 10 Version 20H2Windows Server 2012 (Server Core installation)Windows 10 Version 21H2Windows Server 2012 R2Windows Server 2008 Service Pack 2Windows Server 2008 R2 Service Pack 1 (Server Core installation)Windows Server 2008 Service Pack 2 (Server Core installation)Windows 10 Version 1607Windows 11 version 22H2Windows Server 2022Windows 11 version 21H2Windows 10 Version 1507Windows Server 2012Windows Server 2016 (Server Core installation)Windows 10 Version 1809Windows Server 2019Windows Server 2008 Service Pack 2Windows Server 2008 R2 Service Pack 1Windows Server 2019 (Server Core installation)
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2024-57096
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.03% / 7.32%
||
7 Day CHG~0.00%
Published-14 May, 2025 | 00:00
Updated-30 Oct, 2025 | 20:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue in wps office before v.19302 allows a local attacker to obtain sensitive information via a crafted file.

Action-Not Available
Vendor-kingsoftn/a
Product-wps_officen/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2018-13811
Matching Score-4
Assigner-Siemens
ShareView Details
Matching Score-4
Assigner-Siemens
CVSS Score-5.5||MEDIUM
EPSS-0.03% / 7.50%
||
7 Day CHG~0.00%
Published-13 Dec, 2018 | 16:00
Updated-05 Aug, 2024 | 09:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in SIMATIC STEP 7 (TIA Portal) (All Versions < V15.1). Password hashes with insufficient computational effort could allow an attacker to access to a project file and reconstruct passwords. The vulnerability could be exploited by an attacker with local access to the project file. No user interaction is required to exploit the vulnerability. The vulnerability could allow the attacker to obtain certain passwords from the project. At the time of advisory publication no public exploitation of this vulnerability was known.

Action-Not Available
Vendor-Siemens AG
Product-simatic_step_7_\(tia_portal\)SIMATIC STEP 7 (TIA Portal)
CWE ID-CWE-916
Use of Password Hash With Insufficient Computational Effort
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2018-14023
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-4||MEDIUM
EPSS-0.07% / 21.16%
||
7 Day CHG~0.00%
Published-20 Aug, 2018 | 22:00
Updated-05 Aug, 2024 | 09:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Open Whisper Signal (aka Signal-Desktop) before 1.15.0-beta.10 allows information leakage.

Action-Not Available
Vendor-signaln/a
Product-signal-desktopn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2008-3902
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-2.1||LOW
EPSS-0.11% / 29.86%
||
7 Day CHG~0.00%
Published-03 Sep, 2008 | 19:00
Updated-07 Aug, 2024 | 09:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

HP firmware 68DTT F.0D stores pre-boot authentication passwords in the BIOS Keyboard buffer and does not clear this buffer after use, which allows local users to obtain sensitive information by reading the physical memory locations associated with this buffer, aka SSRT080104.

Action-Not Available
Vendor-n/aHP Inc.
Product-68dttn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2018-12337
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-4.6||MEDIUM
EPSS-0.06% / 19.81%
||
7 Day CHG~0.00%
Published-17 Jun, 2018 | 16:00
Updated-05 Aug, 2024 | 08:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Reliance on Security Through Obscurity vulnerability in ECOS Secure Boot Stick (aka SBS) 5.6.5 allows an attacker to partially extract confidential configurations via user-space emulation.

Action-Not Available
Vendor-ecosn/a
Product-secure_boot_stick_firmwaresecure_boot_stickn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2023-1055
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.06% / 16.90%
||
7 Day CHG~0.00%
Published-27 Feb, 2023 | 00:00
Updated-11 Mar, 2025 | 14:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in RHDS 11 and RHDS 12. While browsing entries LDAP tries to decode the userPassword attribute instead of the userCertificate attribute which could lead into sensitive information leaked. An attacker with a local account where the cockpit-389-ds is running can list the processes and display the hashed passwords. The highest threat from this vulnerability is to data confidentiality.

Action-Not Available
Vendor-n/aRed Hat, Inc.Fedora Project
Product-fedoradirectory_serverRed Hat Directory Server
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE ID-CWE-295
Improper Certificate Validation
CVE-2017-2715
Matching Score-4
Assigner-Huawei Technologies
ShareView Details
Matching Score-4
Assigner-Huawei Technologies
CVSS Score-7.8||HIGH
EPSS-0.03% / 7.89%
||
7 Day CHG~0.00%
Published-22 Nov, 2017 | 19:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Files APP 7.1.1.309 and earlier versions in some Huawei mobile phones has a brute-force password cracking vulnerability due to the improper design of the Safe key database. An unauthorized attacker could access sensitive database information and may crack users' Safe passwords, leading to information leak.

Action-Not Available
Vendor-Huawei Technologies Co., Ltd.
Product-filesFiles &#xa3;&#xa8;Files is the smartphone APP&#xa3;&#xa9;
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2008-3895
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-2.1||LOW
EPSS-0.06% / 19.82%
||
7 Day CHG~0.00%
Published-03 Sep, 2008 | 14:00
Updated-07 Aug, 2024 | 09:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

LILO 22.6.1 and earlier stores pre-boot authentication passwords in the BIOS Keyboard buffer and does not clear this buffer before and after use, which allows local users to obtain sensitive information by reading the physical memory locations associated with this buffer.

Action-Not Available
Vendor-lilon/a
Product-lilon/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2024-40793
Matching Score-4
Assigner-Apple Inc.
ShareView Details
Matching Score-4
Assigner-Apple Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.02% / 4.07%
||
7 Day CHG~0.00%
Published-29 Jul, 2024 | 22:16
Updated-04 Nov, 2025 | 18:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

This issue was addressed by removing the vulnerable code. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, macOS Ventura 13.6.8, macOS Monterey 12.7.6, iOS 17.6 and iPadOS 17.6, watchOS 10.6, macOS Sonoma 14.6. An app may be able to access user-sensitive data.

Action-Not Available
Vendor-Apple Inc.
Product-ipadosiphone_osmacoswatchoswatchOSiOS and iPadOSmacOS
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2021-22529
Matching Score-4
Assigner-OpenText (formerly Micro Focus)
ShareView Details
Matching Score-4
Assigner-OpenText (formerly Micro Focus)
CVSS Score-6.3||MEDIUM
EPSS-0.05% / 16.57%
||
7 Day CHG~0.00%
Published-28 Aug, 2024 | 06:29
Updated-13 Sep, 2024 | 18:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Sensitive Data Exposure leaks potential information in NetIQ Advance Authentication

A vulnerability identified in NetIQ Advance Authentication that leaks sensitive server information. This issue affects NetIQ Advance Authentication version before 6.3.5.1

Action-Not Available
Vendor-Open Text CorporationMicro Focus International Limited
Product-netiq_advanced_authenticationNetIQ Advance Authenticationnetiq_advanced_authentication
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2010-3296
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-2.1||LOW
EPSS-0.10% / 26.93%
||
7 Day CHG~0.00%
Published-30 Sep, 2010 | 14:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The cxgb_extension_ioctl function in drivers/net/cxgb3/cxgb3_main.c in the Linux kernel before 2.6.36-rc5 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a CHELSIO_GET_QSET_NUM ioctl call.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncSUSEDebian GNU/LinuxCanonical Ltd.openSUSE
Product-linux_kernelubuntu_linuxopensusedebian_linuxlinux_enterprise_serverlinux_enterprise_real_time_extensionlinux_enterprise_desktopn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2024-40863
Matching Score-4
Assigner-Apple Inc.
ShareView Details
Matching Score-4
Assigner-Apple Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.07% / 20.09%
||
7 Day CHG~0.00%
Published-16 Sep, 2024 | 23:23
Updated-04 Nov, 2025 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

This issue was addressed with improved data protection. This issue is fixed in iOS 18 and iPadOS 18. An app may be able to leak sensitive user information.

Action-Not Available
Vendor-Apple Inc.
Product-ipadosiphone_osiOS and iPadOS
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2018-1118
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-2.3||LOW
EPSS-0.11% / 29.14%
||
7 Day CHG~0.00%
Published-10 May, 2018 | 22:00
Updated-05 Aug, 2024 | 03:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Linux kernel vhost since version 4.8 does not properly initialize memory in messages passed between virtual guests and the host operating system in the vhost/vhost.c:vhost_new_msg() function. This can allow local privileged users to read some kernel memory contents when reading from the /dev/vhost-net device file.

Action-Not Available
Vendor-Linux Kernel Organization, IncDebian GNU/LinuxRed Hat, Inc.Canonical Ltd.
Product-enterprise_linux_serverubuntu_linuxdebian_linuxlinux_kernelenterprise_linux_workstationvirtualization_hostenterprise_linux_desktopvhost
CWE ID-CWE-665
Improper Initialization
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2021-30314
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-6.2||MEDIUM
EPSS-0.10% / 26.65%
||
7 Day CHG~0.00%
Published-13 Jan, 2022 | 11:40
Updated-03 Aug, 2024 | 22:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Lack of validation for third party application accessing the service can lead to information disclosure in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcn3991_firmwarewsa8830sa6150p_firmwaresa8145p_firmwareqcs610qcs2290_firmwareqcs4290wcn3950_firmwaresa8150p_firmwaresd765g_firmwareqcs2290qca6595au_firmwareqca6390_firmwaresa6155wcd9370qcs605_firmwareqca6426wcn3990_firmwarewcn3998wcd9385_firmwaresdxr2_5g_firmwarewcn3950sd_8_gen1_5g_firmwaresm6375_firmwaresd662sd460_firmwaresa8155sm7315_firmwareqca6574au_firmwareqca6595ausa6155_firmwarewcd9375_firmwarewcn3998_firmwaresm7250p_firmwarewcn3610_firmwareqca6436_firmwaresd778gsa6155p_firmwaresm6225qcs6490sdxr2_5gsa8155_firmwaresd662_firmwarewcn3988_firmwaresa6145p_firmwaresd205sd778g_firmwarewsa8810_firmwarequalcomm215_firmwaresd765gsd765_firmwareqca6436wcn6851sa6155pqcs603_firmwareqcs4290_firmwarewcd9385wcd9341qca6696_firmwareqcs6490_firmwaresd870_firmwareqca6390wcd9375wcn3910_firmwaresa8150pwsa8830_firmwaresda429wsd210sd865_5g_firmwareqcm6490sd888_5g_firmwarewcn3988wcn6850_firmwarewsa8815_firmwarewsa8835_firmwaresm8475wcn6750_firmwarewcn3610qcm2290_firmwaresm6375wcn3991sda429w_firmwarewcd9380_firmwarewcn3990sd780gsd865_5gsdx55m_firmwarewcn6856_firmwaresd888wsa8835qca6574sd665_firmwarewcd9380sd888_5gqualcomm215qca6574awcn6855_firmwaresm7325pwcn3980wcn6750qca6574_firmwareqcs605wsa8815sm7325p_firmwaresd665wcn3910wcn6850sd765qca6426_firmwareqca6574a_firmwaresd768g_firmwarewcn3980_firmwaresm7315sd460qca6391sdx55mwcn6740_firmwareqcm4290qcm6490_firmwaresd480_firmwareqcs603wcn6851_firmwaresm6225_firmwareqca6574ausa8155p_firmwaresd205_firmwarewcd9341_firmwareqcm4290_firmwaresd480sd870wcn6855wsa8810sd210_firmwareqcs610_firmwarewcn6856sa6145psd768gsa8145pwcn6740qca6696qca6391_firmwaresd780g_firmwarewcd9370_firmwaresa6150psd888_firmwaresa8155psm7250pqcm2290Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2018-11942
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.04% / 13.14%
||
7 Day CHG~0.00%
Published-14 Jun, 2019 | 17:02
Updated-05 Aug, 2024 | 08:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Failure to initialize the reserved memory which is sent to the firmware might lead to exposure of 1 byte of uninitialized kernel SKB memory to FW in Snapdragon Auto, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in IPQ4019, IPQ8064, IPQ8074, MDM9150, MDM9206, MDM9607, MDM9640, MDM9650, MSM8996AU, QCS405, QCS605, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 636, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM630, SDM660, SDX20, SDX24

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sd_850mdm9150_firmwaremdm9640_firmwaresd_820asd_675msm8996au_firmwaresd_670_firmwaresdx24mdm9650sd_636msm8996ausd_450_firmwaresd_845_firmwaresd_820a_firmwareqcs605_firmwareipq4019_firmwaresd_675_firmwaremdm9206sd_425_firmwaresdx24_firmwaresd_625_firmwareipq8074sd_450sd_845mdm9206_firmwareqcs605mdm9640sd_835_firmwaremdm9650_firmwaresd_835ipq8064sda660ipq8064_firmwaresd_427_firmwaresd_712sd_855sd_730_firmwaresdx20sd_425sdm660sd_430_firmwaremdm9607_firmwaresd_435sd_710_firmwaresdm630qcs405sd_625ipq8074_firmwaremdm9607sd_636_firmwaremdm9150sd_730sd_850_firmwareqcs405_firmwaresd_712_firmwaresdm630_firmwaresda660_firmwaresd_427ipq4019sd_430sd_670sd_435_firmwaresd_710sdx20_firmwaresdm660_firmwaresd_855_firmwareSnapdragon Auto, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2021-21587
Matching Score-4
Assigner-Dell
ShareView Details
Matching Score-4
Assigner-Dell
CVSS Score-5.3||MEDIUM
EPSS-5.40% / 90.01%
||
7 Day CHG~0.00%
Published-15 Jul, 2021 | 16:15
Updated-16 Sep, 2024 | 17:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell Wyse Management Suite versions 3.2 and earlier contain a full path disclosure vulnerability. A local unauthenticated attacker could exploit this vulnerability in order to obtain the path of files and folders.

Action-Not Available
Vendor-Dell Inc.
Product-wyse_management_suiteWyse Management Suite
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2018-12155
Matching Score-4
Assigner-Intel Corporation
ShareView Details
Matching Score-4
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.06% / 18.58%
||
7 Day CHG~0.00%
Published-05 Dec, 2018 | 21:00
Updated-05 Aug, 2024 | 08:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Data leakage in cryptographic libraries for Intel IPP before 2019 update1 release may allow an authenticated user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-Intel Corporation
Product-integrated_performance_primitivesIntel Integrated Performance Primitives
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2018-11195
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.8||MEDIUM
EPSS-0.12% / 30.69%
||
7 Day CHG~0.00%
Published-01 Jun, 2018 | 19:00
Updated-05 Aug, 2024 | 08:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Mahara 17.04 before 17.04.8 and 17.10 before 17.10.5 and 18.04 before 18.04.1 are vulnerable to the browser "back and refresh" attack. This allows malicious users with physical access to the web browser of a Mahara user, after they have logged in, to potentially gain access to their Mahara credentials.

Action-Not Available
Vendor-n/aMahara
Product-maharan/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2018-12224
Matching Score-4
Assigner-Intel Corporation
ShareView Details
Matching Score-4
Assigner-Intel Corporation
CVSS Score-3.3||LOW
EPSS-0.04% / 10.69%
||
7 Day CHG~0.00%
Published-14 Mar, 2019 | 20:00
Updated-16 Sep, 2024 | 20:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer leakage in igdkm64.sys in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 may allow an authenticated user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-Microsoft CorporationIntel Corporation
Product-graphics_driverwindowsIntel(R) Graphics Driver for Windows
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • ...
  • 21
  • 22
  • Next
Details not found