Show filters
297 Total Results
Displaying 251-260 of 297
Sort by:
Attacker Value
Unknown
CVE-2020-25633
Disclosure Date: September 18, 2020 (last updated February 22, 2025)
A flaw was found in RESTEasy client in all versions of RESTEasy up to 4.5.6.Final. It may allow client users to obtain the server's potentially sensitive information when the server got WebApplicationException from the RESTEasy client call. The highest threat from this vulnerability is to data confidentiality.
0
Attacker Value
Unknown
CVE-2020-24925
Disclosure Date: September 15, 2020 (last updated February 22, 2025)
A Sensitive Source Code Path Disclosure vulnerability is found in ElkarBackup v1.3.3. An attacker is able to view the path of the source code jobs/sort where entire source code path is displayed in the browser itself helping the attacker identify the code structure /app/elkarbackup/src/Binovo/ElkarBackupBundle/Controller/DefaultController.php
0
Attacker Value
Unknown
CVE-2018-19947
Disclosure Date: September 11, 2020 (last updated February 22, 2025)
The vulnerability have been reported to affect earlier versions of Helpdesk. If exploited, this information exposure vulnerability could disclose sensitive information. QNAP has already fixed the issue in Helpdesk 3.0.3 and later.
0
Attacker Value
Unknown
CVE-2020-4166
Disclosure Date: August 27, 2020 (last updated February 22, 2025)
IBM Security Guardium Insights 2.0.1 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 174402.
0
Attacker Value
Unknown
CVE-2019-4699
Disclosure Date: August 26, 2020 (last updated February 22, 2025)
IBM Security Guardium Data Encryption (GDE) 3.0.0.2 generates an error message that includes sensitive information about its environment, users, or associated data. IBM X-Force ID: 171931.
0
Attacker Value
Unknown
CVE-2020-15132
Disclosure Date: August 05, 2020 (last updated February 21, 2025)
In Sulu before versions 1.6.35, 2.0.10, and 2.1.1, when the "Forget password" feature on the login screen is used, Sulu asks the user for a username or email address. If the given string is not found, a response with a `400` error code is returned, along with a error message saying that this user name does not exist. This enables attackers to retrieve valid usernames. Also, the response of the "Forgot Password" request returns the email address to which the email was sent, if the operation was successful. This information should not be exposed, as it can be used to gather email addresses. This problem was fixed in versions 1.6.35, 2.0.10 and 2.1.1.
0
Attacker Value
Unknown
CVE-2020-14337
Disclosure Date: July 31, 2020 (last updated February 21, 2025)
A data exposure flaw was found in Tower, where sensitive data was revealed from the HTTP return error codes. This flaw allows an unauthenticated, remote attacker to retrieve pages from the default organization and verify existing usernames. The highest threat from this vulnerability is to data confidentiality.
0
Attacker Value
Unknown
CVE-2020-8213
Disclosure Date: July 30, 2020 (last updated February 21, 2025)
An information exposure vulnerability exists in UniFi Protect before v1.13.4-beta.5 that allowed unauthenticated attackers access to valid usernames for the UniFi Protect web application via HTTP response code and response timing.
0
Attacker Value
Unknown
CVE-2020-15125
Disclosure Date: July 29, 2020 (last updated February 21, 2025)
In auth0 (npm package) versions before 2.27.1, a DenyList of specific keys that should be sanitized from the request object contained in the error object is used. The key for Authorization header is not sanitized and in certain cases the Authorization header value can be logged exposing a bearer token. You are affected by this vulnerability if you are using the auth0 npm package, and you are using a Machine to Machine application authorized to use Auth0's management API
0
Attacker Value
Unknown
CVE-2020-13997
Disclosure Date: July 28, 2020 (last updated February 21, 2025)
In Shopware before 6.2.3, the database password is leaked to an unauthenticated user when a DriverException occurs and verbose error handling is enabled.
0