Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CWE CATEGORY:Information Management Errors
Category ID:199
Vulnerability Mapping:Prohibited
Status:Draft
DetailsContent HistoryObserved CVE ExamplesReports
2745Vulnerabilities found

CVE-2025-53765
Assigner-Microsoft Corporation
ShareView Details
Assigner-Microsoft Corporation
CVSS Score-4.4||MEDIUM
EPSS-0.07% / 20.55%
||
7 Day CHG~0.00%
Published-12 Aug, 2025 | 17:10
Updated-28 Aug, 2025 | 19:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Azure Stack Hub Information Disclosure Vulnerability

Exposure of private personal information to an unauthorized actor in Azure Stack allows an authorized attacker to disclose information locally.

Action-Not Available
Vendor-Microsoft Corporation
Product-azure_app_service_on_azure_stackazure_stack_hubAzure Stack Hub
CWE ID-CWE-359
Exposure of Private Personal Information to an Unauthorized Actor
CVE-2025-20067
Assigner-Intel Corporation
ShareView Details
Assigner-Intel Corporation
CVSS Score-6.8||MEDIUM
EPSS-0.01% / 1.96%
||
7 Day CHG~0.00%
Published-12 Aug, 2025 | 16:58
Updated-13 Aug, 2025 | 17:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Observable timing discrepancy in firmware for some Intel(R) CSME and Intel(R) SPS may allow a privileged user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/a
Product-Intel(R) CSME and Intel(R) SPS
CWE ID-CWE-208
Observable Timing Discrepancy
CVE-2025-8452
Assigner-Austin Hackers Anonymous
ShareView Details
Assigner-Austin Hackers Anonymous
CVSS Score-4.3||MEDIUM
EPSS-0.02% / 2.20%
||
7 Day CHG~0.00%
Published-12 Aug, 2025 | 15:23
Updated-15 Aug, 2025 | 06:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Unauthenticated leak of sensitive information affecting multiple models from Brother Industries, Ltd., Toshiba Tec, and Konica Minolta, Inc.

By using the "uscan" protocol provided by the eSCL specification, an attacker can discover the serial number of multi-function printers that implement the Brother-provided firmware. This serial number can, in turn, can be leveraged by the flaw described by CVE-2024-51978 to calculate the default administrator password. This flaw is similar to CVE-2024-51977, with the only difference being the protocol by which an attacker can use to learn the remote device's serial number. The eSCL/uscan vector is typically only exposed on the local network. Any discovery service that implements the eSCL specification can be used to exploit this vulnerability, and one such implementation is the runZero Explorer. Changing the default administrator password will render this vulnerability virtually worthless, since the calculated default administrator password would no longer be the correct password.

Action-Not Available
Vendor-Toshiba TecBrother Industries, LtdKonica Minolta, Inc.
Product-DCP-T830DWMFC-L2900DWXLHL-L6412DWRJ-2035BMFC-L2740DWMFC-J7600CDWHL-L2365DWMFC-L2740DWRMFC-J904NMFC-L2716DWHL-L2370DNRADS-1350WTD-2125NDCP-L2540DNRADS-3300WDCP-L2622DWRJ-3150AiDCP-J1800NMFC-J5340DWADS-4900WMFC-L2720DWMFC-J4940DNHL-B2100DBMFC-J5830DWADS-4300NMFC-1916NWMFC-L2685DWHL-L2350DWRMFC-J1012DWDCP-L2560DWRDCP-L2550DW(TWN)HL-L6200DWDCP-L2551DWHL-L3280CDWHL-L9410CDNDCP-L2540DWDCP-L6600DWHL-L2360DNRDCP-J1203NDCP-J978N-W/BDCP-L2600DDCP-B7658DWDCP-J915NDCP-J973N-W/BHL-1222WEMFC-J926N-WBRJ-3250WBMFC-L8610CDW(for Japan)MFC-J1500NMFC-L2820DWXLHL-2569DWDCP-1610WRDCP-T820DWMFC-T925DWTD-4650TNWBRMFC-J905NTD-4750TNWBRMFC-L2880DWMFC-L2705DWMFC-L2886DWDCP-T720DWMFC-L6700DWHL-L2370DNMFC-J5855DW XLDCP-L5510DWTD-4550DNWBHL-B2158WDCP-L2530DWHL-1212WDCP-T428WDCP-L2508DWHL-J7010CDWDCP-B7578DWMFC-L2860DWEHL-L2475DWMFC-L2712DWDCP-T530DWMFC-J739DNDCP-L2647DWHL-L2340DWHL-2560DNDS/MDS-940DWHL-L2357DWMFC-J6740DWDCP-T825DWHL-L5218DNHL-L2350DWMFC-L2750DWMFC-J6980CDWHL-L8240CDWMFC-L2861DWMFC-L3710CDWQL-1115NWBMFC-L2703DWMFC-L5900DWMFC-L2765DWMFC-J3540DWRJ-3050AiHL-L6210DWTMFC-L5715DNMFC-T920DWADS-4500WDCP-B7608WMFC-L5755DWDCP-J1050DWDCP-T425WDCP-L2550DNHL-5595DNHMFC-L6800DWMFC-J5930DWTJ-TJ-4522TNHL-J6000DWMFC-J6535DWDCP-L3520CDWEHL-L5202DWDCP-B7628DWMFC-L2980DWHL-1210WESP-1DCP-T435WMFC-T4500DWPT-E550W (for US, EU)MFC-J1300DWHL-L2461DNTD-2320DSATD-4520DNDCP-L2550DNRDCP-L1632WPT-E850TKW (for Tiwan)MFC-L5902DWMFC-J6935DWTD-2320DTJ-4121TNRDCP-L2532DWMFC-L2680WMFC-L5710DNMFC-L3765CDWHL-L2447DWNFC-J903NVC-500WHL-L3230CDNHL-L3240CDWMFC-J939DWNMFC-J6947DWMFC-L2760DWMFC-L2771DWMFC-L2715DWDCP-L3520CDWHL-B2100DDCP-L3560CDWTJ-4620TNQL-1110NWBHL-L5100DNbizhub 4000iMFC-L3755CDWMFC-L2750DWRMFC-L2920DWMFC-L2827DWXLDCP-L3517CDWMFC-J5335DWDCP-T236QL-810WcDCP-L2648DWMFC-L5715DWHL-L2375DWMFC-4340DWEMFC-J5945DWHL-L2376DWDCP-L3515CDWDCP-L2531DWTD-4750TNWBMFC-L3720CDWMFC-B7810DWDCP-L2665DWHL-L9310CDWMFC-T935DWMFC-L5915DWQL-820NWBPT-P750WMFC-J5730DWMFC-J6959DWFAX-L2800DWHL-L6410DNMFC-J6930DWMFC-L6702DWHL-L6300DWMFC-J4535DW(XL)HL-L2386DWHL-L2464DWDCP-T420WMFC-J4345DW XLRJ-2050DCP-L3550CDWHL-L2420DWHL-L5228DWHL-L8230CDWMFC-J3530DWQL-810WMFC-L6950DWHL-L3228CDWMFC-J491DWHL-2590DNMFC-L8690CDWDCP-J1200NDCP-L2628DWMFC-L5702DWDCP-L5518DNDCP-L3510CDWDCP-L2640DNMFC-J6957DWHL-L6415DWTMFC-L2820DWMFC-J4540NMFC-J1215WMFC-7890DNHL-L5102DWMFC-L3768CDWMFC-L2700DWRMFC-L6915DN CSPMFC-L9570CDWDCP-L2620DWRJ-4250WBFAX-L2710DNPT-E850TKW (for UAE)HL-L1230WHL-L6400DWGHL-L6415DWHL-5590DNHL-L2360DNHL-T4000DWDCP-L5662DNADS-1800WHL-B2188DWDCP-L3568CDWMFC-EX670WMFC-L3730CDNe-STUDIO302DNFDCP-J988NMFC-J738DWNRJ-3150HL-3190CDWDCP-L5502DNMFC-8530DNHL-B2080DWDCP-J572NHL-L8360CDWTDCP-J1200W(XL)DCP-C421WDCP-L2627DWEMFC-7895DWHL-B2181DWMFC-J6995CDWMFC-L6900DWGPT-P900WHL-L2360DWDCP-7195DWHL-L6450DWDCP-7090DWbizhub 5000iHL-L2366DWMFC-L2730DWHL-B2050DNHL-L8260CDWMFC-J6583CDWDCP-J982N-W/BMFC-J890DWPT-E800WHL-L2460DWHL-L2865DWMFC-J5800CDWHL-L5200DWDCP-T535DWDCP-L1848WMFC-J893NMFC-J7100CDWMFC-L5718DNDCP-J4140NTJ-4005DNDCP-T710W(for China)HL-L6418DWTD-2120NHL-L3290CDWDCP-L2520DWHL-J6010DWMFC-T930DWHL-L2380DWMFC-J5340DWEDCP-J4143NMFC-J738DNMFC-L2700DW(ASA)HL-L6300DWTMFC-L2806DWDCP-1612WEHL-L5215DWHL-L2385DWMFC-L6915DWDCP-J528NMFC-T810W(for China)HL-L2467DWMFC-L2710DNMFC-L6810DWDCP-1610WHL-L2400DWEHL-L2372DNTD-2135NHL-L6415DN CSPHL-L2445DWMFC-J895DWMFC-L5700DWMFC-J6530DWTD-4420TNHL-L6250DWDCP-T510WDCP-1623WRPJ-773MFC-L5800DWDCP-J981NMFC-1912WRADS-1250WMFC-L2770DWHL-1210WRMFC-J1010DWMFC-L2800DWTD-4650TNWBMFC-L6820DWMFC-J1205W(XL)DCP-B7558WMFC-J1170DWPT-E550W (for Thailand)bizhub 4020iTJ-4121TNMFC-J1800DWDCP-B7535DWMFC-L5710DWADS-2700WDCP-T730DWMFC-7880DNDCP-L2660DWDS-740DTD-4420DNHL-3160CDWHL-L2315DWDCP-L5500DNPT-E850TKW (for Thailand)TD-4520TNMFC-T910DWHL-L3220CDWHL-L5050DNMFC-L6902DWDCP-T525WDCP-T225MFC-J2730DWHL-L3220CWHL-L8260CDNHL-L5212DWMFC-L8390CDWHL-L2390DWMFC-EX915DWMFC-J4540DW(XL)MFC-B7811DWMFC-J4443NMFC-J4335DW(XL)DCP-B7620DWDCP-L2552DNHL-L2365DWRDCP-J4543NMFC-L9577CDWHL-L5210DWTMFC-L6750DWDCP-T520WHL-1223WEPT-E850TKW (for China)DCP-1612WTD-2320DFMFC-L9570CDW(for Japan)MFC-J690DWDCP-J1200WEMFC-J6999CDWMFC-L2805DWDCP-7180DNTJ-4422TNMFC-J2340DWMFC-L8340CDWTJ-4021TNRMFC-L2710DWDCP-L2550DWDCP-L1638WHL-L2375DWRHL-L5200DWTMFC-9150CDNMFC-J6983CDWHL-L5215DNDCP-J987N-WHL-L2395DWMFC-J5845DW(XL)PT-D800WHL-B2150WHL-L2425DWMFC-L2717DWDCP-1623WEMFC-J5630CDWDCP-J582NMFC-J5955DWMFC-J3940DWHL-L6210DWDCP-B7648DWFAX-L2700DNADS-3600WDCP-B7530DNMFC-J7700CDWDCP-L2540DNDCP-C1210NADS-2800WMFC-L3750CDWMFC-J4340DW(XL)MFC-J5855DWMFC-L2807DWDCP-J972NMFC-L8610CDWDCP-L2640DWHL-L2351DWHL-L2371DNMFC-L2827DWDCP-L1630WDCP-T510W(for China)HL-L6202DWMFC-L9670CDNMFC-9350CDWDCP-T238HL-L2340DWRHL-L5212DNMFC-L2960DWHL-L3288CDWTD-2350DPT-E850TKW (for Koria)DCP-J577NMFC-L3770CDWDCP-1616NWHL-L9470CDNPT-E850TKW (for Asia pacific, EU, US)ADS-1700WDCP-L5600DNMFC-J6580CDWHL-L1808WHL-L2460DNMFC-L2713DWDCP-T536DWDCP-1618WHL-2595DWPT-E550W (for Vietnum)MFC-J815DW XLDCP-J928N-WBMFC-L2751DWDCP-B7620DWBMFC-J3930DWDCP-B7548WHL-L8360CDWDCP-7190DWMFC-J898NHL-L3220CWETD-2350DFMFC-7889DWMFC-L6720DWDCP-J1700DWDCP-L2625DWMFC-J6945DWTD-4420DNZHL-EX415DWMFC-J998DWNPT-P900WcDCP-L8410CDWMFC-J2330DWMFC-L3780CDWMFC-J6955DWDCP-J1800DWMFC-L2710DWRMFC-L8900CDWDCP-T439WDCP-L2518DWMFC-L5802DWHL-JF1HL-L5100DNTMFC-T810WMFC-B7715DWDCP-T725DWDCP-T835DWHL-L6310DWDCP-1615NWMFC-J2740DWHL-L6415DNHL-L2440DWDCP-L2605DWMFC-1910WEMFC-L6912DWHL-L5210DWDCP-J526NHL-L5210DNDCP-7190DNMFC-J5345DWHL-L2352DWPT-P950NWPT-E550W (for Tiwan, Hongkong)TJ-4520TNMFC-L3735CDNHL-1218WHL-L1232WMFC-B7720DNMFC-J7500CDWTJ-4020TNDCP-L3555CDWMFC-L9635CDNMFC-J6730DWMFC-L2880DWXLDCP-1610WEMFC-1911NWTJ-4420TNMFC-L5728DWMFC-L3740CDWDCP-J587NMFC-J6540DWDCP-L2627DWDCP-L5652DNHL-L1238WMFC-L9610CDNDCP-L5610DNMFC-1919NWDCP-T220HL-L2370DWMFC-J6555DW XLDCP-J1100DWDCP-L2520DWRMFC-L2715DW(for Tiwan, Koria)MFC-8540DNADS-2700WeHL-1210WMFC-L5750DWTD-2310DDCP-9030CDNHL-L2370DWXLDCP-B7520DWRJ-3035BMFC-L3745CDWMFC-EX910HL-L3270CDWHL-1212WEHL-L2305Wbizhub 5020iMFC-L2700DNDCP-L2537DWMFC-J497DWDCP-L3551CDWDCP-T430WMFC-L2885DWHL-L2460DWXLMFC-L2720DNMFC-L2922DWMFC-J998DNRJ-2150ADS-3000NDCP-L2530DWRDCP-L2535DWDCP-B7600DBDCP-L2680DWMFC-L2720DWRTD-2130NMFC-L2730DNDCP-T426WMFC-J6540DWEMFC-J7300CDWPT-E550W (for Koria)HL-L2325DWHL-L2405WHL-L2480DWHL-1223WRHL-L6200DWTMFC-L2707DWMFC-L2710DNRHL-B2180DWMFC-L6910DNHL-5595DNDCP-J1140DWDCP-L5660DNHL-EX470WDCP-J987N-BMFC-J5330DWMFC-J939DNDCP-B7638DNDCP-T436WTD-2350DFSAHL-L2400DWMFC-L2712DNMFC-B7810DWBTD-2350DSAMFC-L2690DWMFC-L3760CDWTJ-4120TNHL-B2180DWBMFC-L5850DWHL-L6400DWTDCP-L2541DWMFC-L2732DWMFC-J6997CDWHL-L3230CDWHL-J6000CDWHL-J6100DWMFC-L9630CDNMFC-L5700DNHL-L6400DWDCP-B7640DWMFC-L2860DWMFC-L2862DWDCP-L5602DNHL-L6250DNDCP-1612WRMFC-L2900DWHL-L8245CDWMFC-L2701DWDCP-B7650DWHL-L6217DWHL-L9430CDNRJ-2140DCP-J774DWHL-1211WDCP-T735DWMFC-J805DW XLMFC-L6970DWMFC-J6555DWDCP-J914NDCP-J572DWMFC-J4440DWMFC-L2700DWNFC-EX670MFC-L2750DWXLDCP-7189DWPT-E550W (for Russia)PT-E550W (for China)PJ-883QL-820NWBcMFC-J739DWNMFC-J995DW XLMFC-J805DWDCP-L2600DWDCP-L2551DNDCP-L5512DNMFC-L6710DWHL-L3300CDWMFC-L6915DNDCP-J772DWADS-4700WMFC-1915WDCP-T230DCP-L5650DNMFC-L2802DNHL-L2465DWHL-L3215CWe-STUDIO301DNMFC-L5717DWDCP-T226DCP-L3528CDWHL-L3210CWMFC-L2730DWRMFC-1911WMFC-J1605DNMFC-L5912DWRJ-3050PT-E850TKW (for Vietnum)HL-L3295CDWADS-2400NMFC-B7800DNTJ-4010TNMFC-L2802DWDCP-L2560DWDCP-L5510DNMFC-1910WSP-1 (for Japan)DCP-1617NWMFC-L3740CDWEMFC-J6940DWDCP-T710WDCP-1622WEDCP-B7640DWBMFC-L2817DWMFC-L2835DWHL-L6402DWMFC-L6900DWHL-1212WRMFC-J4440NDCP-L2627DWXLQL-1110NWBcMFC-J995DWTJ-4021TNDCP-L2548DWMFC-J5740DWDCP-B7600DMFC-L8395CDW
CWE ID-CWE-538
Insertion of Sensitive Information into Externally-Accessible File or Directory
CVE-2025-40753
Assigner-Siemens
ShareView Details
Assigner-Siemens
CVSS Score-6.8||MEDIUM
EPSS-0.01% / 0.27%
||
7 Day CHG~0.00%
Published-12 Aug, 2025 | 11:17
Updated-13 Aug, 2025 | 20:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in POWER METER SICAM Q100 (7KG9501-0AA01-0AA1) (All versions >= V2.60 < V2.62), POWER METER SICAM Q100 (7KG9501-0AA01-2AA1) (All versions >= V2.60 < V2.62), POWER METER SICAM Q100 (7KG9501-0AA31-0AA1) (All versions >= V2.60 < V2.62), POWER METER SICAM Q100 (7KG9501-0AA31-2AA1) (All versions >= V2.60 < V2.62), POWER METER SICAM Q200 family (All versions >= V2.70 < V2.80). Affected devices export the password for the SMTP account as plain text in the Configuration File. This could allow an authenticated local attacker to extract it and use the configured SMTP service for arbitrary purposes.

Action-Not Available
Vendor-Siemens AG
Product-POWER METER SICAM Q200 familyPOWER METER SICAM Q100
CWE ID-CWE-312
Cleartext Storage of Sensitive Information
CVE-2025-40752
Assigner-Siemens
ShareView Details
Assigner-Siemens
CVSS Score-6.8||MEDIUM
EPSS-0.01% / 0.27%
||
7 Day CHG~0.00%
Published-12 Aug, 2025 | 11:17
Updated-13 Aug, 2025 | 20:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in POWER METER SICAM Q100 (7KG9501-0AA01-0AA1) (All versions >= V2.60 < V2.62), POWER METER SICAM Q100 (7KG9501-0AA01-2AA1) (All versions >= V2.60 < V2.62), POWER METER SICAM Q100 (7KG9501-0AA31-0AA1) (All versions >= V2.60 < V2.62), POWER METER SICAM Q100 (7KG9501-0AA31-2AA1) (All versions >= V2.60 < V2.62), POWER METER SICAM Q200 family (All versions >= V2.70 < V2.80). Affected devices store the password for the SMTP account as plain text. This could allow an authenticated local attacker to extract it and use the configured SMTP service for arbitrary purposes.

Action-Not Available
Vendor-Siemens AG
Product-POWER METER SICAM Q200 familyPOWER METER SICAM Q100
CWE ID-CWE-312
Cleartext Storage of Sensitive Information
CVE-2024-41984
Assigner-Siemens
ShareView Details
Assigner-Siemens
CVSS Score-2.1||LOW
EPSS-0.01% / 1.50%
||
7 Day CHG~0.00%
Published-12 Aug, 2025 | 11:16
Updated-12 Aug, 2025 | 19:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in SmartClient modules Opcenter QL Home (SC) (All versions >= V13.2 < V2506), SOA Audit (All versions >= V13.2 < V2506), SOA Cockpit (All versions >= V13.2 < V2506). The affected application improperly handles error while accessing an inaccessible resource leading to exposing the system applications.

Action-Not Available
Vendor-Siemens AG
Product-SmartClient modules Opcenter QL Home (SC)SOA CockpitSOA Audit
CWE ID-CWE-209
Generation of Error Message Containing Sensitive Information
CVE-2024-41983
Assigner-Siemens
ShareView Details
Assigner-Siemens
CVSS Score-5.1||MEDIUM
EPSS-0.02% / 3.34%
||
7 Day CHG~0.00%
Published-12 Aug, 2025 | 11:16
Updated-12 Aug, 2025 | 19:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in SmartClient modules Opcenter QL Home (SC) (All versions >= V13.2 < V2506), SOA Audit (All versions >= V13.2 < V2506), SOA Cockpit (All versions >= V13.2 < V2506). The affected application displays SQL statement in the error messages encountered during the generation of reports using Cockpit tool.

Action-Not Available
Vendor-Siemens AG
Product-SmartClient modules Opcenter QL Home (SC)SOA CockpitSOA Audit
CWE ID-CWE-209
Generation of Error Message Containing Sensitive Information
CVE-2025-47444
Assigner-Patchstack
ShareView Details
Assigner-Patchstack
CVSS Score-7.5||HIGH
EPSS-0.04% / 11.09%
||
7 Day CHG~0.00%
Published-12 Aug, 2025 | 06:37
Updated-12 Aug, 2025 | 14:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress GiveWP Plugin < 4.6.1 is vulnerable to Sensitive Data (PII) Exposure

Insertion of Sensitive Information Into Sent Data vulnerability in Liquid Web GiveWP allows Retrieve Embedded Sensitive Data.This issue affects GiveWP: from n/a before 4.6.1.

Action-Not Available
Vendor-Liquid Web, LLC
Product-GiveWP
CWE ID-CWE-201
Insertion of Sensitive Information Into Sent Data
CVE-2025-8852
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-5.3||MEDIUM
EPSS-0.03% / 7.51%
||
7 Day CHG~0.00%
Published-11 Aug, 2025 | 14:02
Updated-11 Aug, 2025 | 18:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WuKongOpenSource WukongCRM API Response upload information exposure

A vulnerability was identified in WuKongOpenSource WukongCRM 11.0. This affects an unknown part of the file /adminFile/upload of the component API Response Handler. The manipulation leads to information exposure through error message. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

Action-Not Available
Vendor-WuKongOpenSource
Product-WukongCRM
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE ID-CWE-209
Generation of Error Message Containing Sensitive Information
CVE-2025-8863
Assigner-Yugabyte, Inc.
ShareView Details
Assigner-Yugabyte, Inc.
CVSS Score-7||HIGH
EPSS-0.02% / 4.48%
||
7 Day CHG~0.00%
Published-11 Aug, 2025 | 13:03
Updated-11 Aug, 2025 | 18:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

YugabyteDB diagnostic information was transmitted over HTTP, which could expose sensitive data during transmission

Action-Not Available
Vendor-YugabyteDB Inc
Product-YugabyteDB
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2025-8862
Assigner-Yugabyte, Inc.
ShareView Details
Assigner-Yugabyte, Inc.
CVSS Score-7||HIGH
EPSS-0.06% / 17.20%
||
7 Day CHG~0.00%
Published-11 Aug, 2025 | 12:40
Updated-11 Aug, 2025 | 19:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

YugabyteDB has been collecting diagnostics information from YugabyteDB servers, which may include sensitive gflag configurations. To mitigate this, we recommend upgrading the database to a version where this information is properly redacted.

Action-Not Available
Vendor-YugabyteDB Inc
Product-YugabyteDB
CWE ID-CWE-201
Insertion of Sensitive Information Into Sent Data
CVE-2025-8774
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-2||LOW
EPSS-0.01% / 1.49%
||
7 Day CHG~0.00%
Published-09 Aug, 2025 | 20:32
Updated-12 Aug, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
riscv-boom SonicBOOM L1 Data Cache timing discrepancy

A vulnerability has been found in riscv-boom SonicBOOM up to 2.2.3 and classified as problematic. Affected by this vulnerability is an unknown functionality of the component L1 Data Cache Handler. The manipulation leads to observable timing discrepancy. Local access is required to approach this attack. The complexity of an attack is rather high. The exploitation appears to be difficult. The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-riscv-boom
Product-SonicBOOM
CWE ID-CWE-203
Observable Discrepancy
CWE ID-CWE-208
Observable Timing Discrepancy
CVE-2025-8741
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-6.3||MEDIUM
EPSS-0.02% / 2.53%
||
7 Day CHG~0.00%
Published-08 Aug, 2025 | 21:32
Updated-12 Aug, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
macrozheng mall login cleartext transmission

A vulnerability was found in macrozheng mall up to 1.0.3. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /admin/login. The manipulation leads to cleartext transmission of sensitive information. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-macrozheng
Product-mall
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2025-52586
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-7.5||HIGH
EPSS-0.01% / 0.19%
||
7 Day CHG~0.00%
Published-08 Aug, 2025 | 16:00
Updated-08 Aug, 2025 | 20:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
EG4 Electronics EG4 Inverters Cleartext Transmission of Sensitive Information

The MOD3 command traffic between the monitoring application and the inverter is transmitted in plaintext without encryption or obfuscation. This vulnerability may allow an attacker with access to a local network to intercept, manipulate, replay, or forge critical data, including read/write operations for voltage, current, and power configuration, operational status, alarms, telemetry, system reset, or inverter control commands, potentially disrupting power generation or reconfiguring inverter settings.

Action-Not Available
Vendor-EG4 Electronics
Product-EG4 12kPVEG4 6000XPEG4 Flex 21EG4 12000XPEG4 GridBossEG4 Flex 18EG4 18kPV
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2025-54799
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-2.3||LOW
EPSS-0.02% / 4.48%
||
7 Day CHG~0.00%
Published-07 Aug, 2025 | 00:04
Updated-07 Aug, 2025 | 21:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Lego does not enforce HTTPS

Let's Encrypt client and ACME library written in Go (Lego). In versions 4.25.1 and below, the github.com/go-acme/lego/v4/acme/api package (thus the lego library and the lego cli as well) don't enforce HTTPS when talking to CAs as an ACME client. Unlike the http-01 challenge which solves an ACME challenge over unencrypted HTTP, the ACME protocol requires HTTPS when a client communicates with the CA to performs ACME functions. However, the library fails to enforce HTTPS both in the original discover URL (configured by the library user) and in the subsequent addresses returned by the CAs in the directory and order objects. If users input HTTP URLs or CAs misconfigure endpoints, protocol operations occur over HTTP instead of HTTPS. This compromises privacy by exposing request/response details like account and request identifiers to network attackers. This was fixed in version 4.25.2.

Action-Not Available
Vendor-go-acme
Product-lego
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2025-36020
Assigner-IBM Corporation
ShareView Details
Assigner-IBM Corporation
CVSS Score-5.9||MEDIUM
EPSS-0.02% / 3.77%
||
7 Day CHG~0.00%
Published-06 Aug, 2025 | 14:28
Updated-13 Aug, 2025 | 18:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IBM Guardium Data Protection information disclosure

IBM Guardium Data Protection could allow a remote attacker to obtain sensitive information due to cleartext transmission of sensitive credential information.

Action-Not Available
Vendor-IBM Corporation
Product-guardium_data_protectionGuardium Data Protection
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2025-23320
Assigner-NVIDIA Corporation
ShareView Details
Assigner-NVIDIA Corporation
CVSS Score-7.5||HIGH
EPSS-0.04% / 8.85%
||
7 Day CHG~0.00%
Published-06 Aug, 2025 | 12:37
Updated-12 Aug, 2025 | 16:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability in the Python backend, where an attacker could cause the shared memory limit to be exceeded by sending a very large request. A successful exploit of this vulnerability might lead to information disclosure.

Action-Not Available
Vendor-NVIDIA CorporationLinux Kernel Organization, IncMicrosoft Corporation
Product-triton_inference_serverwindowslinux_kernelTriton Inference Server
CWE ID-CWE-209
Generation of Error Message Containing Sensitive Information
CVE-2025-46390
Assigner-Israel National Cyber Directorate (INCD)
ShareView Details
Assigner-Israel National Cyber Directorate (INCD)
CVSS Score-7.5||HIGH
EPSS-0.04% / 11.09%
||
7 Day CHG~0.00%
Published-06 Aug, 2025 | 10:55
Updated-06 Aug, 2025 | 20:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

CWE-204: Observable Response Discrepancy

Action-Not Available
Vendor-Emby
Product-MediaBrowser
CWE ID-CWE-204
Observable Response Discrepancy
CVE-2025-47324
Assigner-Qualcomm, Inc.
ShareView Details
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.03% / 7.56%
||
7 Day CHG~0.00%
Published-06 Aug, 2025 | 07:26
Updated-18 Aug, 2025 | 18:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Exposure of Sensitive Information Through Metadata in Powerline Communication Firmware

Information disclosure while accessing and modifying the PIB file of a remote device via powerline.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca7005_firmwareqca7005Snapdragon
CWE ID-CWE-1230
Exposure of Sensitive Information Through Metadata
CVE-2025-51055
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-8.6||HIGH
EPSS-0.02% / 2.65%
||
7 Day CHG~0.00%
Published-06 Aug, 2025 | 00:00
Updated-07 Aug, 2025 | 21:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insecure Data Storage of credentials has been found in /api_vedo/configuration/config.yml file in Vedo Suite version 2024.17. This file contains clear-text credentials, secret keys, and database information.

Action-Not Available
Vendor-n/a
Product-n/a
CWE ID-CWE-312
Cleartext Storage of Sensitive Information
CVE-2025-54125
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-8.7||HIGH
EPSS-0.05% / 14.28%
||
7 Day CHG~0.00%
Published-05 Aug, 2025 | 23:30
Updated-06 Aug, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
XWiki Platform: Password and email exposure in xml.vm fields

XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. XWiki Platform Legacy Old Core and XWiki Platform Old Core versions 1.1 through 16.4.6, 16.5.0-rc-1 through 16.10.4 and 17.0.0-rc-1 through 17.1.0, the XML export of a page in XWiki that can be triggered by any user with view rights on a page by appending ?xpage=xml to the URL includes password and email properties stored on a document that aren't named password or email. This is fixed in versions 16.4.7, 16.10.5 and 17.2.0-rc-1. To work around this issue, the file templates/xml.vm in the deployed WAR can be deleted if the XML isn't needed. There isn't any feature in XWiki itself that depends on the XML export.

Action-Not Available
Vendor-XWiki SAS
Product-xwiki-platform
CWE ID-CWE-359
Exposure of Private Personal Information to an Unauthorized Actor
CVE-2025-54124
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-7.1||HIGH
EPSS-0.04% / 10.99%
||
7 Day CHG~0.00%
Published-05 Aug, 2025 | 23:28
Updated-06 Aug, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
XWiki Platform: Any user with editing rights can access password properties through Database List Properties

XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. XWiki Platform Legacy Old Core and XWiki Platform Old Core versions 9.8-rc-1 through 16.4.6, 16.5.0-rc-1 through 16.10.4, and 17.0.0-rc-1 through 17.1.0, any user with editing rights can create an XClass with a database list property that references a password property. When adding an object of that XClass, the content of that password property is displayed. In practice, with a standard rights setup, this means that any user with an account on the wiki can access password hashes of all users, and possibly other password properties (with hashed or plain storage) that are on pages that the user can view. This issue is fixed in versions 16.4.7, 16.10.5 and 17.2.0-rc-1.

Action-Not Available
Vendor-XWiki SAS
Product-xwiki-platform
CWE ID-CWE-359
Exposure of Private Personal Information to an Unauthorized Actor
CVE-2025-8548
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-6.3||MEDIUM
EPSS-0.04% / 13.14%
||
7 Day CHG~0.00%
Published-05 Aug, 2025 | 06:02
Updated-05 Aug, 2025 | 14:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
atjiu pybbs Registered Email SettingsApiController.java sendEmailCode information exposure

A vulnerability was found in atjiu pybbs up to 6.0.0 and classified as problematic. This issue affects the function sendEmailCode of the file src/main/java/co/yiiu/pybbs/controller/api/SettingsApiController.java of the component Registered Email Handler. The manipulation of the argument email leads to information exposure through error message. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The identifier of the patch is 234197c4f8fc7ce24bdcff5430cd42492f28936a. It is recommended to apply a patch to fix this issue.

Action-Not Available
Vendor-atjiu
Product-pybbs
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE ID-CWE-209
Generation of Error Message Containing Sensitive Information
CVE-2025-46658
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.06% / 17.40%
||
7 Day CHG~0.00%
Published-05 Aug, 2025 | 00:00
Updated-05 Aug, 2025 | 21:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in ExonautWeb in 4C Strategies Exonaut 21.6. There are verbose error messages.

Action-Not Available
Vendor-n/a
Product-n/a
CWE ID-CWE-209
Generation of Error Message Containing Sensitive Information
CVE-2025-8528
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-6.3||MEDIUM
EPSS-0.02% / 2.53%
||
7 Day CHG~0.00%
Published-04 Aug, 2025 | 22:02
Updated-28 Aug, 2025 | 11:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Exrick xboot getMenuList sensitive information in a cookie

A vulnerability classified as problematic has been found in Exrick xboot up to 3.3.4. Affected is an unknown function of the file /xboot/permission/getMenuList. The manipulation leads to cleartext storage of sensitive information in a cookie. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used.

Action-Not Available
Vendor-exrickExrick
Product-xbootxboot
CWE ID-CWE-312
Cleartext Storage of Sensitive Information
CWE ID-CWE-315
Cleartext Storage of Sensitive Information in a Cookie
CVE-2025-23288
Assigner-NVIDIA Corporation
ShareView Details
Assigner-NVIDIA Corporation
CVSS Score-3.3||LOW
EPSS-0.01% / 1.45%
||
7 Day CHG~0.00%
Published-02 Aug, 2025 | 22:10
Updated-04 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NVIDIA GPU Display Driver for Windows contains a vulnerability  where an attacker may cause an exposure of sensitive system information with local unprivileged system access. A successful exploit of this vulnerability may lead to Information disclosure.

Action-Not Available
Vendor-NVIDIA Corporation
Product-GPU Display Drivers
CWE ID-CWE-497
Exposure of Sensitive System Information to an Unauthorized Control Sphere
CVE-2025-23287
Assigner-NVIDIA Corporation
ShareView Details
Assigner-NVIDIA Corporation
CVSS Score-3.3||LOW
EPSS-0.01% / 1.45%
||
7 Day CHG~0.00%
Published-02 Aug, 2025 | 22:10
Updated-04 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NVIDIA GPU Display Driver for Windows contains a vulnerability where an attacker may access sensitive system-level information. A successful exploit of this vulnerability may lead to Information disclosure.

Action-Not Available
Vendor-NVIDIA Corporation
Product-GPU Display Drivers
CWE ID-CWE-497
Exposure of Sensitive System Information to an Unauthorized Control Sphere
CVE-2025-54834
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) U.S. Civilian Government
ShareView Details
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) U.S. Civilian Government
CVSS Score-6.9||MEDIUM
EPSS-0.04% / 8.65%
||
7 Day CHG~0.00%
Published-31 Jul, 2025 | 17:26
Updated-31 Jul, 2025 | 18:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
OPEXUS FOIAXpress Public Access Link (PAL) unauthenticated username enumeration

OPEXUS FOIAXpress Public Access Link (PAL) version v11.1.0 allows an unauthenticated, remote attacker to query the /App/CreateRequest.aspx endpoint to check for the existence of valid usernames. There are no rate-limiting mechanisms in place.

Action-Not Available
Vendor-OPEXUS
Product-FOIAXpress Public Access Link (PAL)
CWE ID-CWE-204
Observable Response Discrepancy
CVE-2025-7738
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-4.4||MEDIUM
EPSS-0.01% / 1.81%
||
7 Day CHG~0.00%
Published-31 Jul, 2025 | 14:12
Updated-04 Aug, 2025 | 22:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Python3.11-django-ansible-base: sensitive authenticator secrets returned in clear text via api in aap

A flaw was found in Ansible Automation Platform (AAP) where the Gateway API returns the client secret for certain GitHub Enterprise authenticators in clear text. This vulnerability affects administrators or auditors accessing authenticator configurations. While access is limited to privileged users, the clear text exposure of sensitive credentials increases the risk of accidental leaks or misuse.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat Ansible Automation Platform 2.5 for RHEL 8Red Hat Ansible Automation Platform 2.5 for RHEL 9
CWE ID-CWE-312
Cleartext Storage of Sensitive Information
CVE-2025-50777
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.01% / 0.26%
||
7 Day CHG~0.00%
Published-30 Jul, 2025 | 00:00
Updated-06 Aug, 2025 | 16:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The firmware of the AZIOT 2MP Full HD Smart Wi-Fi CCTV Home Security Camera (version V1.00.02) contains an Incorrect Access Control vulnerability that allows local attackers to gain root shell access. Once accessed, the device exposes critical data including Wi-Fi credentials and ONVIF service credentials stored in plaintext, enabling further compromise of the network and connected systems.

Action-Not Available
Vendor-aziotn/a
Product-2mp_full_hd_smart_wi-fi_cctv_home_security_camera2mp_full_hd_smart_wi-fi_cctv_home_security_camera_firmwaren/a
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-312
Cleartext Storage of Sensitive Information
CVE-2025-43217
Assigner-Apple Inc.
ShareView Details
Assigner-Apple Inc.
CVSS Score-4||MEDIUM
EPSS-0.01% / 1.23%
||
7 Day CHG~0.00%
Published-29 Jul, 2025 | 23:36
Updated-31 Jul, 2025 | 20:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The issue was addressed by adding additional logic. This issue is fixed in iPadOS 17.7.9, iOS 18.6 and iPadOS 18.6. Privacy Indicators for microphone or camera access may not be correctly displayed.

Action-Not Available
Vendor-Apple Inc.
Product-ipadosiphone_osiOS and iPadOSiPadOS
CWE ID-CWE-359
Exposure of Private Personal Information to an Unauthorized Actor
CVE-2025-31276
Assigner-Apple Inc.
ShareView Details
Assigner-Apple Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.03% / 7.76%
||
7 Day CHG~0.00%
Published-29 Jul, 2025 | 23:35
Updated-31 Jul, 2025 | 21:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

This issue was addressed through improved state management. This issue is fixed in iOS 18.6 and iPadOS 18.6, iPadOS 17.7.9. Remote content may be loaded even when the 'Load Remote Images' setting is turned off.

Action-Not Available
Vendor-Apple Inc.
Product-ipadosiphone_osiOS and iPadOSiPadOS
CWE ID-CWE-359
Exposure of Private Personal Information to an Unauthorized Actor
CVE-2025-43227
Assigner-Apple Inc.
ShareView Details
Assigner-Apple Inc.
CVSS Score-7.5||HIGH
EPSS-0.07% / 20.95%
||
7 Day CHG~0.00%
Published-29 Jul, 2025 | 23:35
Updated-31 Jul, 2025 | 20:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

This issue was addressed through improved state management. This issue is fixed in Safari 18.6, iOS 18.6 and iPadOS 18.6, macOS Sequoia 15.6, tvOS 18.6, watchOS 11.6, visionOS 2.6. Processing maliciously crafted web content may disclose sensitive user information.

Action-Not Available
Vendor-Apple Inc.
Product-ipadosiphone_oswatchostvosvisionosmacossafariwatchOSmacOStvOSSafariiOS and iPadOSvisionOS
CWE ID-CWE-359
Exposure of Private Personal Information to an Unauthorized Actor
CVE-2025-43259
Assigner-Apple Inc.
ShareView Details
Assigner-Apple Inc.
CVSS Score-4.6||MEDIUM
EPSS-0.02% / 3.04%
||
7 Day CHG~0.00%
Published-29 Jul, 2025 | 23:35
Updated-01 Aug, 2025 | 14:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

This issue was addressed with improved redaction of sensitive information. This issue is fixed in macOS Sequoia 15.6, macOS Sonoma 14.7.7, macOS Ventura 13.7.7. An attacker with physical access to a locked device may be able to view sensitive user information.

Action-Not Available
Vendor-Apple Inc.
Product-macosmacOS
CWE ID-CWE-359
Exposure of Private Personal Information to an Unauthorized Actor
CVE-2025-52899
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.04% / 9.81%
||
7 Day CHG-0.00%
Published-29 Jul, 2025 | 19:16
Updated-22 Aug, 2025 | 15:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Tuleap vulnerable to user enumeration via the lost password form

Tuleap is an Open Source Suite created to facilitate management of software development and collaboration. In Tuleap Community Edition prior to version 16.9.99.1750843170 and Tuleap Enterprise Edition prior to 16.8-4 and 16.9-2, the forgot password form allows for user enumeration. This is fixed in Tuleap Community Edition version 16.9.99.1750843170 and Tuleap Enterprise Edition 16.8-4 and 16.9-2.

Action-Not Available
Vendor-Enalean SAS
Product-tuleaptuleap
CWE ID-CWE-204
Observable Response Discrepancy
CVE-2025-54422
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-6.9||MEDIUM
EPSS-0.00% / 0.14%
||
7 Day CHG~0.00%
Published-29 Jul, 2025 | 12:47
Updated-04 Aug, 2025 | 17:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Sandboxie exposes encrypted sandbox key during password change

Sandboxie is a sandbox-based isolation software for 32-bit and 64-bit Windows NT-based operating systems. In versions 1.16.1 and below, a critical security vulnerability exists in password handling mechanisms. During encrypted sandbox creation, user passwords are transmitted via shared memory, exposing them to potential interception. The vulnerability is particularly severe during password modification operations, where both old and new passwords are passed as plaintext command-line arguments to the Imbox process without any encryption or obfuscation. This implementation flaw allows any process within the user session, including unprivileged processes, to retrieve these sensitive credentials by reading the command-line arguments, thereby bypassing standard privilege requirements and creating a significant security risk. This is fixed in version 1.16.2.

Action-Not Available
Vendor-sandboxie-plussandboxie-plus
Product-sandboxieSandboxie
CWE ID-CWE-312
Cleartext Storage of Sensitive Information
CWE ID-CWE-322
Key Exchange without Entity Authentication
CWE ID-CWE-497
Exposure of Sensitive System Information to an Unauthorized Control Sphere
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2025-52490
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-7.3||HIGH
EPSS-0.02% / 3.78%
||
7 Day CHG~0.00%
Published-29 Jul, 2025 | 00:00
Updated-06 Aug, 2025 | 16:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Couchbase Sync Gateway before 3.2.6. In sgcollect_info_options.log and sync_gateway.log, there are cleartext passwords in redacted and unredacted output.

Action-Not Available
Vendor-n/aCouchbase, Inc.
Product-sync_gatewayn/a
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2025-54538
Assigner-JetBrains s.r.o.
ShareView Details
Assigner-JetBrains s.r.o.
CVSS Score-5.5||MEDIUM
EPSS-0.00% / 0.00%
||
7 Day CHG~0.00%
Published-28 Jul, 2025 | 16:20
Updated-29 Jul, 2025 | 16:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In JetBrains TeamCity before 2025.07 password exposure was possible via command line in the "hg pull" command

Action-Not Available
Vendor-JetBrains s.r.o.
Product-teamcityTeamCity
CWE ID-CWE-312
Cleartext Storage of Sensitive Information
CVE-2025-54537
Assigner-JetBrains s.r.o.
ShareView Details
Assigner-JetBrains s.r.o.
CVSS Score-5.5||MEDIUM
EPSS-0.00% / 0.00%
||
7 Day CHG~0.00%
Published-28 Jul, 2025 | 16:20
Updated-29 Jul, 2025 | 16:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In JetBrains TeamCity before 2025.07 user credentials were stored in plain text in memory snapshots

Action-Not Available
Vendor-JetBrains s.r.o.
Product-teamcityTeamCity
CWE ID-CWE-312
Cleartext Storage of Sensitive Information
CVE-2022-50237
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-5.9||MEDIUM
EPSS-0.01% / 1.91%
||
7 Day CHG~0.00%
Published-28 Jul, 2025 | 00:00
Updated-29 Jul, 2025 | 14:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The ed25519-dalek crate before 2 for Rust allows a double public key signing function oracle attack. The Keypair implementation leads to a simple computation for extracting a private key.

Action-Not Available
Vendor-dalek-cryptography
Product-ed25519-dalek
CWE ID-CWE-497
Exposure of Sensitive System Information to an Unauthorized Control Sphere
CVE-2025-30124
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.02% / 4.56%
||
7 Day CHG~0.00%
Published-28 Jul, 2025 | 00:00
Updated-30 Jul, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered on Marbella KR8s Dashcam FF 2.0.8 devices. When a new SD card is inserted into the dashcam, the existing password is written onto the SD card in cleartext automatically. An attacker with temporary access to the dashcam can switch the SD card to steal this password.

Action-Not Available
Vendor-n/a
Product-n/a
CWE ID-CWE-312
Cleartext Storage of Sensitive Information
CVE-2025-8205
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-6.3||MEDIUM
EPSS-0.01% / 1.40%
||
7 Day CHG~0.00%
Published-26 Jul, 2025 | 18:32
Updated-31 Jul, 2025 | 16:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Comodo Dragon IP DNS Leakage Detector cleartext transmission

A vulnerability, which was classified as problematic, has been found in Comodo Dragon up to 134.0.6998.179. Affected by this issue is some unknown functionality of the component IP DNS Leakage Detector. The manipulation leads to cleartext transmission of sensitive information. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-comodoComodo
Product-dragonDragon
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2025-0252
Assigner-HCL Software
ShareView Details
Assigner-HCL Software
CVSS Score-2.6||LOW
EPSS-0.02% / 2.29%
||
7 Day CHG~0.00%
Published-25 Jul, 2025 | 00:08
Updated-25 Jul, 2025 | 15:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
HCL IEM is affected by a password in cleartext vulnerability

HCL IEM is affected by a password in cleartext vulnerability.  Sensitive information is transmitted without adequate protection, potentially exposing it to unauthorized access during transit.

Action-Not Available
Vendor-HCL Technologies Ltd.
Product-IEM
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2025-0250
Assigner-HCL Software
ShareView Details
Assigner-HCL Software
CVSS Score-2.2||LOW
EPSS-0.02% / 2.84%
||
7 Day CHG~0.00%
Published-24 Jul, 2025 | 23:28
Updated-25 Jul, 2025 | 15:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
HCL IEM is affected by an authorization token sent in cookie vulnerability

HCL IEM is affected by an authorization token sent in cookie vulnerability.  A token used for authentication and authorization is being handled in a manner that may increase its exposure to security risks.

Action-Not Available
Vendor-HCL Technologies Ltd.
Product-IEM
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2025-53940
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-8.5||HIGH
EPSS-0.02% / 2.45%
||
7 Day CHG~0.00%
Published-24 Jul, 2025 | 22:23
Updated-25 Jul, 2025 | 15:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Quiet uses insecure, inconsistent verification on local backend token

Quiet is an alternative to team chat apps like Slack, Discord, and Element that does not require trusting a central server or running one's own. In versions 6.1.0-alpha.4 and below, Quiet's API for backend/frontend communication was using an insecure, not constant-time comparison function for token verification. This allowed for a potential timing attack where an attacker would try different token values and observe tiny differences in the response time (wrong characters fail faster) to guess the whole token one character at a time. This is fixed in version 6.0.1.

Action-Not Available
Vendor-TryQuiet
Product-quiet
CWE ID-CWE-208
Observable Timing Discrepancy
CVE-2025-33013
Assigner-IBM Corporation
ShareView Details
Assigner-IBM Corporation
CVSS Score-6.2||MEDIUM
EPSS-0.01% / 1.76%
||
7 Day CHG-0.00%
Published-24 Jul, 2025 | 14:55
Updated-22 Aug, 2025 | 18:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IBM MQ Operator information disclosure

IBM MQ Operator LTS 2.0.0 through 2.0.29, MQ Operator CD 3.0.0, 3.0.1, 3.1.0 through 3.1.3, 3.3.0, 3.4.0, 3.4.1, 3.5.0, 3.5.1, 3.6.0, and MQ Operator SC2 3.2.0 through 3.2.13 Container could disclose sensitive information to a local user due to improper clearing of heap memory before release.

Action-Not Available
Vendor-IBM Corporation
Product-supplied_mq_advanced_container_imagesmq_operatorMQ Operator
CWE ID-CWE-212
Improper Removal of Sensitive Information Before Storage or Transfer
CWE ID-CWE-244
Improper Clearing of Heap Memory Before Release ('Heap Inspection')
CVE-2025-4976
Assigner-GitLab Inc.
ShareView Details
Assigner-GitLab Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.01% / 1.62%
||
7 Day CHG~0.00%
Published-24 Jul, 2025 | 06:05
Updated-28 Jul, 2025 | 14:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Exposure of Sensitive Information Due to Incompatible Policies in GitLab

An issue has been discovered in GitLab EE affecting all versions from 17.0 before 18.0.5, 18.1 before 18.1.3, and 18.2 before 18.2.1 that, under certain circumstances, could have allowed an attacker to access internal notes in GitLab Duo responses.

Action-Not Available
Vendor-GitLab Inc.
Product-gitlabGitLab
CWE ID-CWE-213
Exposure of Sensitive Information Due to Incompatible Policies
CVE-2025-4394
Assigner-Medtronic
ShareView Details
Assigner-Medtronic
CVSS Score-6.8||MEDIUM
EPSS-0.01% / 1.01%
||
7 Day CHG~0.00%
Published-24 Jul, 2025 | 03:26
Updated-25 Jul, 2025 | 15:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Medtronic MyCareLink Patient Monitor Unencrypted Filesystem Vulnerability

Medtronic MyCareLink Patient Monitor uses an unencrypted filesystem on internal storage, which allows an attacker with physical access to read and modify files. This issue affects MyCareLink Patient Monitor models 24950 and 24952: before June 25, 2025

Action-Not Available
Vendor-Medtronic
Product-MyCareLink Patient Monitor 24950MyCareLink Patient Monitor 24952
CWE ID-CWE-312
Cleartext Storage of Sensitive Information
CVE-2025-53703
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-8.7||HIGH
EPSS-0.01% / 0.90%
||
7 Day CHG~0.00%
Published-22 Jul, 2025 | 21:31
Updated-23 Jul, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
DuraComm DP-10iN-100-MU Cleartext Transmission of Sensitive Information

DuraComm SPM-500 DP-10iN-100-MU transmits sensitive data without encryption over a channel that could be intercepted by attackers.

Action-Not Available
Vendor-DuraComm Corporation
Product-SPM-500 DP-10iN-100-MU
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2025-54129
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.03% / 8.45%
||
7 Day CHG~0.00%
Published-21 Jul, 2025 | 20:53
Updated-22 Aug, 2025 | 15:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
HAXiam allows for User Enumeration

HAXiam is a packaging wrapper for HAXcms which allows anyone to spawn their own microsite management platform. In versions 11.0.4 and below, the application returns a 200 response when requesting the data of a valid user and a 404 response when requesting the data of an invalid user. This can be used to infer the existence of valid user accounts. An authenticated attacker can use automated tooling to brute force potential usernames and use the application's response to identify valid accounts. This can be used in conjunction with other vulnerabilities, such as the lack of authorization checks, to enumerate and deface another user's sites. This is fixed in version 11.0.5.

Action-Not Available
Vendor-psuhaxtheweb
Product-haxiamissues
CWE ID-CWE-204
Observable Response Discrepancy
CVE-2025-36107
Assigner-IBM Corporation
ShareView Details
Assigner-IBM Corporation
CVSS Score-5.9||MEDIUM
EPSS-0.02% / 2.80%
||
7 Day CHG~0.00%
Published-21 Jul, 2025 | 18:07
Updated-18 Aug, 2025 | 01:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IBM Cognos Analytics Mobile (iOS) information disclosure

IBM Cognos Analytics Mobile (iOS) 1.1.0 through 1.1.22 could allow malicious actors to obtain sensitive information due to the cleartext transmission of data.

Action-Not Available
Vendor-IBM Corporation
Product-cognos_analytics_mobileCognos Analytics Mobile
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
  • Previous
  • 1
  • 2
  • 3
  • 4
  • ...
  • 54
  • 55
  • Next