Show filters
261 Total Results
Displaying 211-220 of 261
Sort by:
Attacker Value
Unknown

CVE-2020-25778

Disclosure Date: October 14, 2020 (last updated February 22, 2025)
Trend Micro Antivirus for Mac 2020 (Consumer) has a vulnerability in a specific kernel extension where an attacker could supply a kernel pointer and leak several bytes of memory. An attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability.
Attacker Value
Unknown

CVE-2020-15666

Disclosure Date: October 01, 2020 (last updated February 22, 2025)
When trying to load a non-video in an audio/video context the exact status code (200, 302, 404, 500, 412, 403, etc.) was disclosed via the MediaError Message. This level of information leakage is inconsistent with the standardized onerror/onsuccess disclosure and can lead to inferring login status to services or device discovery on a local network among other attacks. This vulnerability affects Firefox < 80 and Firefox for Android < 80.
Attacker Value
Unknown

CVE-2020-4629

Disclosure Date: September 29, 2020 (last updated February 22, 2025)
IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 could allow a local user with specialized access to obtain sensitive information from a detailed technical error message. This information could be used in further attacks against the system. IBM X-Force ID: 185370.
Attacker Value
Unknown

CVE-2020-16121

Disclosure Date: September 24, 2020 (last updated February 22, 2025)
PackageKit provided detailed error messages to unprivileged callers that exposed information about file presence and mimetype of files that the user would be unable to determine on its own.
Attacker Value
Unknown

CVE-2020-25633

Disclosure Date: September 18, 2020 (last updated February 22, 2025)
A flaw was found in RESTEasy client in all versions of RESTEasy up to 4.5.6.Final. It may allow client users to obtain the server's potentially sensitive information when the server got WebApplicationException from the RESTEasy client call. The highest threat from this vulnerability is to data confidentiality.
Attacker Value
Unknown

CVE-2020-24925

Disclosure Date: September 15, 2020 (last updated February 22, 2025)
A Sensitive Source Code Path Disclosure vulnerability is found in ElkarBackup v1.3.3. An attacker is able to view the path of the source code jobs/sort where entire source code path is displayed in the browser itself helping the attacker identify the code structure /app/elkarbackup/src/Binovo/ElkarBackupBundle/Controller/DefaultController.php
Attacker Value
Unknown

CVE-2018-19947

Disclosure Date: September 11, 2020 (last updated February 22, 2025)
The vulnerability have been reported to affect earlier versions of Helpdesk. If exploited, this information exposure vulnerability could disclose sensitive information. QNAP has already fixed the issue in Helpdesk 3.0.3 and later.
Attacker Value
Unknown

CVE-2020-4166

Disclosure Date: August 27, 2020 (last updated February 22, 2025)
IBM Security Guardium Insights 2.0.1 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 174402.
Attacker Value
Unknown

CVE-2019-4699

Disclosure Date: August 26, 2020 (last updated February 22, 2025)
IBM Security Guardium Data Encryption (GDE) 3.0.0.2 generates an error message that includes sensitive information about its environment, users, or associated data. IBM X-Force ID: 171931.
Attacker Value
Unknown

CVE-2020-15132

Disclosure Date: August 05, 2020 (last updated February 21, 2025)
In Sulu before versions 1.6.35, 2.0.10, and 2.1.1, when the "Forget password" feature on the login screen is used, Sulu asks the user for a username or email address. If the given string is not found, a response with a `400` error code is returned, along with a error message saying that this user name does not exist. This enables attackers to retrieve valid usernames. Also, the response of the "Forgot Password" request returns the email address to which the email was sent, if the operation was successful. This information should not be exposed, as it can be used to gather email addresses. This problem was fixed in versions 1.6.35, 2.0.10 and 2.1.1.