Improper input validation in Dynamics Business Central allows an authorized attacker to disclose information locally.
The default privileges for the running service Normand Remisol Advance Launcher in Beckman Coulter Remisol Advance v2.0.12.1 and prior allows non-privileged users to overwrite and manipulate executables and libraries. This allows attackers to access sensitive data.
Improper conditions check in the Intel(R) SGX SDK software may allow a privileged user to potentially enable information disclosure via local access.
An information disclosure vulnerability exists when the win32k component improperly provides kernel information, aka 'Win32k Information Disclosure Vulnerability'.
Microsoft Intune Portal for iOS Security Feature Bypass Vulnerability
Microsoft Local Security Authority (LSA) Server Information Disclosure Vulnerability
Windows Kernel Information Disclosure Vulnerability
Windows Common Log File System Driver Information Disclosure Vulnerability
Windows TCP/IP Information Disclosure Vulnerability
Automox Agent prior to version 37 on Windows and Linux and Version 36 on OSX could allow for a non privileged user to obtain sensitive information during the install process.
A security out-of-bounds read information disclosure vulnerability in Trend Micro Worry-Free Business Security Server could allow a local attacker to send garbage data to a specific named pipe and crash the server. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
Windows Kernel Information Disclosure Vulnerability
Windows Wireless Wide Area Network Service (WwanSvc) Information Disclosure Vulnerability
Windows Kernel Information Disclosure Vulnerability
ASP.NET Core Security Feature Bypass Vulnerability
Windows Power Management Service Information Disclosure Vulnerability
Windows Kernel Information Disclosure Vulnerability
Windows Common Log File System Driver Information Disclosure Vulnerability
Windows Smart Card Resource Management Server Security Feature Bypass Vulnerability
Windows Group Policy Security Feature Bypass Vulnerability
Windows Cryptographic Services Information Disclosure Vulnerability
Out-of-bounds read in Windows Storage Management Provider allows an authorized attacker to disclose information locally.
Windows Cryptographic Services Information Disclosure Vulnerability
In Stormshield SSO Agent 2.x before 2.1.1 and 3.x before 3.0.2, the cleartext user password and PSK are contained in the log file of the .exe installer.
Windows Hyper-V Information Disclosure Vulnerability
Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability
Windows Graphics Component Information Disclosure Vulnerability
Remote Desktop Licensing Diagnoser Information Disclosure Vulnerability
Windows Common Log File System Driver Information Disclosure Vulnerability
Windows Remote Access Connection Manager Information Disclosure Vulnerability
Windows WLAN AutoConfig Service Information Disclosure Vulnerability
Windows Kernel Memory Information Disclosure Vulnerability
Windows Kernel Elevation of Privilege Vulnerability
Storage Spaces Controller Information Disclosure Vulnerability
Windows Virtualization-Based Security (VBS) Security Feature Bypass Vulnerability
Microsoft DirectMusic Information Disclosure Vulnerability
Windows Kernel Memory Information Disclosure Vulnerability
Windows Kernel Memory Information Disclosure Vulnerability
Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability
Win32k Information Disclosure Vulnerability
Windows CSC Service Information Disclosure Vulnerability
Windows Kernel Memory Information Disclosure Vulnerability
Windows CDP User Components Information Disclosure Vulnerability
Windows Cryptographic Information Disclosure Vulnerability
IBM SPSS Modeler on Windows 17.0, 18.0, 18.2.2, 18.3, 18.4, and 18.5 requires the end user to have access to the server SSL key which could allow a local user to decrypt and obtain sensitive information. IBM X-Force ID: 256117.
A link following vulnerability in the Trend Micro Apex One and Apex One as a Service agent could allow a local attacker to disclose sensitive information. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
Insertion of sensitive information into log file in Windows Kernel allows an authorized attacker to disclose information locally.
Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability
Windows Installer Information Disclosure Vulnerability
Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability