Show filters
421 Total Results
Displaying 111-120 of 421
Sort by:
Attacker Value
Unknown

CVE-2024-43694

Disclosure Date: September 26, 2024 (last updated February 26, 2025)
In the goTenna Pro ATAK Plugin application, the encryption keys are stored along with a static IV on the device. This allows for complete decryption of keys stored on the device. This allows an attacker to decrypt all encrypted broadcast communications based on broadcast keys stored on the device.
Attacker Value
Unknown

CVE-2024-47197

Disclosure Date: September 26, 2024 (last updated February 26, 2025)
Exposure of Sensitive Information to an Unauthorized Actor, Insecure Storage of Sensitive Information vulnerability in Maven Archetype Plugin. This issue affects Maven Archetype Plugin: from 3.2.1 before 3.3.0. Users are recommended to upgrade to version 3.3.0, which fixes the issue. Archetype integration testing creates a file called ./target/classes/archetype-it/archetype-settings.xml This file contains all the content from the users ~/.m2/settings.xml file, which often contains information they do not want to publish. We expect that on many developer machines, this also contains credentials. When the user runs mvn verify again (without a mvn clean), this file becomes part of the final artifact. If a developer were to publish this into Maven Central or any other remote repository (whether as a release or a snapshot) their credentials would be published without them knowing.
Attacker Value
Unknown

CVE-2024-39339

Disclosure Date: September 18, 2024 (last updated February 26, 2025)
A vulnerability has been discovered in all versions of Smartplay headunits, which are widely used in Suzuki and Toyota cars. This misconfiguration can lead to information disclosure, leaking sensitive details such as diagnostic log traces, system logs, headunit passwords, and personally identifiable information (PII). The exposure of such information may have serious implications for user privacy and system integrity.
0
Attacker Value
Unknown

CVE-2023-43753

Disclosure Date: September 16, 2024 (last updated February 26, 2025)
Improper conditions check in some Intel(R) Processors with Intel(R) SGX may allow a privileged user to potentially enable information disclosure via local access.
0
Attacker Value
Unknown

CVE-2024-37728

Disclosure Date: September 10, 2024 (last updated February 26, 2025)
Arbitrary File Read vulnerability in Xi'an Daxi Information Technology Co., Ltd OfficeWeb365 v.7.18.23.0 and v8.6.1.0 allows a remote attacker to obtain sensitive information via the "Pic/Indexes" interface
0
Attacker Value
Unknown

CVE-2024-39775

Disclosure Date: September 02, 2024 (last updated February 26, 2025)
in OpenHarmony v4.1.0 and prior versions allow a remote attacker cause information leak through out-of-bounds Read.
Attacker Value
Unknown

CVE-2024-39612

Disclosure Date: September 02, 2024 (last updated February 26, 2025)
in OpenHarmony v4.0.0 and prior versions allow a local attacker cause information leak through out-of-bounds Read.
Attacker Value
Unknown

CVE-2024-38382

Disclosure Date: September 02, 2024 (last updated February 26, 2025)
in OpenHarmony v4.0.0 and prior versions allow a local attacker cause information leak through out-of-bounds Read.
Attacker Value
Unknown

CVE-2024-5288

Disclosure Date: August 27, 2024 (last updated February 26, 2025)
An issue was discovered in wolfSSL before 5.7.0. A safe-error attack via Rowhammer, namely FAULT+PROBE, leads to ECDSA key disclosure. When WOLFSSL_CHECK_SIG_FAULTS is used in signing operations with private ECC keys, such as in server-side TLS connections, the connection is halted if any fault occurs. The success rate in a certain amount of connection requests can be processed via an advanced technique for ECDSA key recovery.
0
Attacker Value
Unknown

CVE-2024-42677

Disclosure Date: August 15, 2024 (last updated February 26, 2025)
An issue in Huizhi enterprise resource management system v.1.0 and before allows a local attacker to obtain sensitive information via the /nssys/common/filehandle. Aspx component