Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CWE CATEGORY:Information Management Errors
Category ID:199
Vulnerability Mapping:Prohibited
Status:Draft
DetailsContent HistoryObserved CVE ExamplesReports
2749Vulnerabilities found

CVE-2025-53211
Assigner-Patchstack
ShareView Details
Assigner-Patchstack
CVSS Score-5.3||MEDIUM
EPSS-0.04% / 10.67%
||
7 Day CHG~0.00%
Published-27 Jun, 2025 | 13:21
Updated-30 Jun, 2025 | 18:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress Audio Editor & Recorder plugin <= 2.2.3 - Sensitive Data Exposure Vulnerability

Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in Roland Beaussant Audio Editor &amp; Recorder allows Retrieve Embedded Sensitive Data. This issue affects Audio Editor &amp; Recorder: from n/a through 2.2.3.

Action-Not Available
Vendor-Roland Beaussant
Product-Audio Editor &amp; Recorder
CWE ID-CWE-497
Exposure of Sensitive System Information to an Unauthorized Control Sphere
CVE-2025-6748
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-2.4||LOW
EPSS-0.01% / 0.30%
||
7 Day CHG~0.00%
Published-27 Jun, 2025 | 01:31
Updated-30 Jun, 2025 | 18:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Bharti Airtel Thanks App files cleartext storage in a file or on disk

A vulnerability classified as problematic has been found in Bharti Airtel Thanks App 4.105.4 on Android. Affected is an unknown function of the file /Android/data/com.myairtelapp/files/. The manipulation leads to cleartext storage in a file or on disk. It is possible to launch the attack on the physical device. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-Bharti Airtel
Product-Thanks App
CWE ID-CWE-312
Cleartext Storage of Sensitive Information
CWE ID-CWE-313
Cleartext Storage in a File or on Disk
CVE-2025-47820
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-2||LOW
EPSS-0.01% / 0.52%
||
7 Day CHG~0.00%
Published-27 Jun, 2025 | 00:00
Updated-30 Jun, 2025 | 18:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Flock Safety Gunshot Detection devices before 1.3 have cleartext storage of code.

Action-Not Available
Vendor-Flock Safety
Product-Gunshot Detection devices
CWE ID-CWE-312
Cleartext Storage of Sensitive Information
CVE-2025-47824
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-2||LOW
EPSS-0.01% / 0.52%
||
7 Day CHG~0.00%
Published-27 Jun, 2025 | 00:00
Updated-30 Jun, 2025 | 18:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Flock Safety LPR (License Plate Reader) devices with firmware through 2.2 have cleartext storage of code.

Action-Not Available
Vendor-Flock Safety
Product-License Plate Reader
CWE ID-CWE-312
Cleartext Storage of Sensitive Information
CVE-2025-5731
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-6.2||MEDIUM
EPSS-0.02% / 2.33%
||
7 Day CHG~0.00%
Published-26 Jun, 2025 | 21:28
Updated-22 Jul, 2025 | 16:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Infinispan: credential leakage in infinispan cli

A flaw was found in Infinispan CLI. A sensitive password, decoded from a Base64-encoded Kubernetes secret, is processed in plaintext and included in a command string that may expose the data in an error message when a command is not found.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat Data Grid 8.5.4Red Hat JBoss Enterprise Application Platform 7Red Hat JBoss Enterprise Application Platform 8Red Hat JBoss Enterprise Application Platform Expansion Pack
CWE ID-CWE-209
Generation of Error Message Containing Sensitive Information
CVE-2025-36034
Assigner-IBM Corporation
ShareView Details
Assigner-IBM Corporation
CVSS Score-5.3||MEDIUM
EPSS-0.01% / 1.55%
||
7 Day CHG~0.00%
Published-26 Jun, 2025 | 15:14
Updated-26 Aug, 2025 | 14:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IBM InfoSphere DataStage Flow Designer information disclosure

IBM InfoSphere DataStage Flow Designer in IBM InfoSphere Information Server 11.7 discloses sensitive user information in API requests in clear text that could be intercepted using man in the middle techniques.

Action-Not Available
Vendor-IBM Corporation
Product-infosphere_information_serverInfoSphere Information Server
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2025-6561
Assigner-TWCERT/CC
ShareView Details
Assigner-TWCERT/CC
CVSS Score-9.8||CRITICAL
EPSS-0.12% / 31.80%
||
7 Day CHG~0.00%
Published-26 Jun, 2025 | 11:45
Updated-26 Jun, 2025 | 18:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Hunt Electronic Hybrid DVR - Exposure of Sensitive System Information

Certain hybrid DVR models ((HBF-09KD and HBF-16NK)) from Hunt Electronic have an Exposure of Sensitive Information vulnerability, allowing unauthenticated remote attackers to directly access a system configuration file and obtain plaintext administrator credentials.

Action-Not Available
Vendor-Hunt Electronic
Product-HBF-09KDHBF-16NK
CWE ID-CWE-256
Plaintext Storage of a Password
CWE ID-CWE-497
Exposure of Sensitive System Information to an Unauthorized Control Sphere
CVE-2025-41647
Assigner-CERT@VDE
ShareView Details
Assigner-CERT@VDE
CVSS Score-5.5||MEDIUM
EPSS-0.01% / 0.33%
||
7 Day CHG~0.00%
Published-25 Jun, 2025 | 09:40
Updated-26 Jun, 2025 | 18:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Lenze: Plaintext Password Disclosure in PLC Designer V4 Interface

A local, low-privileged attacker can learn the password of the connected controller in PLC Designer V4 due to an incorrect implementation that results in the password being displayed in plain text under special conditions.

Action-Not Available
Vendor-Lenze
Product-PLC Designer V4
CWE ID-CWE-312
Cleartext Storage of Sensitive Information
CVE-2024-51977
Assigner-Rapid7, Inc.
ShareView Details
Assigner-Rapid7, Inc.
CVSS Score-5.3||MEDIUM
EPSS-51.31% / 97.80%
||
7 Day CHG+1.51%
Published-25 Jun, 2025 | 07:15
Updated-25 Jul, 2025 | 16:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Unauthenticated leak of sensitive information affecting multiple models from Brother Industries, Ltd., FUJIFILM Business Innovation, Ricoh, Toshiba Tec, and Konica Minolta, Inc.

An unauthenticated attacker who can access either the HTTP service (TCP port 80), the HTTPS service (TCP port 443), or the IPP service (TCP port 631), can leak several pieces of sensitive information from a vulnerable device. The URI path /etc/mnt_info.csv can be accessed via a GET request and no authentication is required. The returned result is a comma separated value (CSV) table of information. The leaked information includes the device’s model, firmware version, IP address, and serial number.

Action-Not Available
Vendor-Toshiba TecFUJIFILM Business InnovationKonica Minolta, Inc.Brother Industries, LtdRicoh Company, Ltd.
Product-HL-L2360DNDCP-L2531DWDCP-J4543NHL-1210WRHL-L6200DWTTD-4420DNZDCP-L6600DWMFC-L2717DWDocuPrint P260 dwMFC-7895DWDCP-L2540DNMFC-J6580CDWMFC-J3930DWDCP-L2537DWDCP-J928N-WBM 340FWMFC-L2690DWHL-L2325DWMFC-L2771DWDCP-B7535DWDCP-L2550DNRDocuPrint M275 zMFC-1911WHL-1218WDocuPrint P388 dwMFC-L5802DWPT-E550W (for China)MFC-J1170DWbizhub 5020iMFC-J6983CDWMFC-L8690CDWMFC-L6950DWHL-L2371DNPT-E550W (for Russia)HL-L5200DWTMFC-L9570CDW(for Japan)DCP-L2540DWHL-L2340DWQL-1115NWBHL-L2375DWRHL-1212WRHL-1212WEMFC-J1215WMFC-L6800DWMFC-J5730DWMFC-1912WRMFC-J1205W(XL)DocuPrint P378 dwMFC-L5700DWHL-L2380DWMFC-J6530DWHL-L2352DWMFC-7880DNDCP-L2520DWDCP-J982N-W/BDCP-L5500DNDCP-J772DWHL-L2315DWDCP-T420WDCP-J4143NHL-2590DNHL-L2350DWMFC-L2710DNMFC-B7715DWMFC-L3730CDNTD-2135NMFC-J6730DWMFC-L2710DWRDCP-B7530DNPT-P750WDCP-L2551DNMFC-J5845DW(XL)QL-820NWBPT-E550W (for Vietnum)MFC-J4345DW XLDocuPrint P118 wDCP-C421WMFC-L2705DWRJ-3050MFC-9150CDNHL-B2080DWMFC-1910WEMFC-L5755DWM 340WDCP-L2540DNRMFC-L6702DWMFC-J998DWNDCP-1615NWDCP-C1210NTD-4550DNWBDocuPrint P285 dwHL-L6200DWRJ-3150AiHL-L6400DWHL-T4000DWADS-3600WDCP-L3510CDWDCP-T710W(for China)MFC-L2751DWDCP-L2560DWRDCP-L3551CDWDCP-J1200W(XL)MFC-T810WHL-L2357DWDCP-T520WMFC-J895DWMFC-L2701DWSP-1 (for Japan)MFC-J1605DNDocuPrint P288 dwDCP-1623WRDCP-9030CDNDocuPrint P378 dMFC-L5800DWHL-L6400DWGMFC-L5850DWMFC-J4340DW(XL)HL-L3230CDNMFC-J5945DWMFC-L2715DWDocuPrint M375 zHL-L2366DWDCP-J1200NPT-E850TKW (for Vietnum)DCP-T226DCP-1610WEMFC-J738DNDCP-L2530DWMFC-J4443NMFC-J939DNMFC-J5330DWDCP-T225DCP-J1203NHL-L2372DNPT-D800WMFC-L2700DNHL-L8260CDNHL-L6300DWMFC-J5335DWMFC-T810W(for China)DCP-1610WDCP-T825DWDCP-L5650DNMFC-J6997CDWSP 230SFNwMFC-L2710DWMFC-L8610CDW(for Japan)HL-L6250DNDCP-7190DWMFC-L5900DWPJ-773HL-L9310CDWMFC-L2740DWFAX-L2710DNMFC-J1800DWMFC-L2716DWADS-2800WHL-L2385DWMFC-J1012DWQL-810WHL-L5100DNTDCP-1618WMFC-L6900DWGHL-L2390DWMFC-J4940DNMFC-J6999CDWMFC-L3710CDWHL-1211WHL-L2370DWXLMFC-L5702DWMFC-7890DNMFC-T920DWDocuPrint M118 zHL-L8260CDWDCP-L2551DWNFC-J903NDocuPrint M115 fwTD-4420DNMFC-J497DWPT-E550W (for US, EU)HL-L2395DWHL-L6402DWDocuPrint P115 wHL-L5202DWHL-L2365DWPT-P950NWMFC-J904NMFC-J939DWNDocuPrint M378 dHL-L2365DWRDocuPrint M225 zDCP-1617NWDCP-L5652DNMFC-L8900CDWbizhub 3080MFMFC-J6947DWMFC-7889DWQL-820NWBcHL-L8360CDWTDCP-L3517CDWMFC-J6995CDWDCP-1616NWMFC-L2750DWDCP-J572NMFC-L3770CDWMFC-L2700DW(ASA)HL-L2360DWRJ-3150DCP-T428WHL-L2351DWDCP-J973N-W/BHL-1223WRMFC-J5630CDWDCP-J981NDCP-J988NMFC-L2700DWRMFC-8530DNHL-L2350DWRRJ-3050AiHL-3190CDWMFC-J739DWNDCP-J987N-WDCP-T510W(for China)DCP-J1800NHL-L6450DWMFC-L5750DWMFC-L2700DWMFC-J1010DWDocuPrint P385 dwTD-2125NDocuPrint M235 dwDCP-L5602DNQL-1110NWBcDocuPrint P235 dDCP-J572DWDocuPrint M375 dfDCP-1612WDCP-L3550CDWDocuPrint M265 zMFC-J805DW XLMFC-J2730DWMFC-L5700DNRJ-3250WBMFC-L2715DW(for Tiwan, Koria)MFC-J738DWNMFC-1911NWDCP-L2552DNMFC-L6700DWHL-L2376DWDocuPrint M118 wDCP-1622WEDCP-T220MFC-J6583CDWDCP-L8410CDWMFC-1915WDCP-J1050DWHL-1212WDCP-L2550DWQL-810WcMFC-J6935DWDCP-L5600DNMFC-L3750CDWDCP-J1800DWDocuPrint P265 dwHL-J6000DWMFC-J995DW XLMFC-L3735CDNDCP-J1140DWMFC-J6535DWHL-L2386DWMFC-L3745CDWDocuPrint M288 dwPT-E550W (for Koria)MFC-J4540NHL-L5050DNHL-L3230CDWbizhub 3000MFDCP-L2535DWMFC-L9570CDWRJ-4250WBMFC-L2720DNMFC-L8610CDWHL-J6000CDWDCP-J914NMFC-J690DWDCP-B7520DWPT-E800WDocuPrint P268 dHL-3160CDWHL-L8360CDWADS-2400NMFC-J815DW XLMFC-J5830DWDCP-T510WHL-1210WMFC-L2710DNRMFC-L2740DWRHL-5595DNHDCP-T720DWMFC-L2732DWMFC-J491DWRJ-2050TD-2120NMFC-L2713DWDCP-L2560DWDCP-J1200WEHL-J6100DWMFC-L9577CDWDocuPrint M288 zMFC-L2680WMFC-1910WDCP-L5502DNDCP-7180DNP 201Wbizhub 4020iMFC-4340DWEDCP-1623WEPT-E850TKW (for Asia pacific, EU, US)MFC-L2750DWRDCP-L2520DWRDCP-J577NTD-2130NMFC-L2703DWPJ-883MFC-L2685DWMFC-J998DNMFC-1916NWDocuPrint M285 zDocuPrint M115 zMFC-L2707DWDCP-J972NDocuPrint P375 dwPT-E550W (for Tiwan, Hongkong)RJ-2150MFC-J6930DWDocuPrint P275 dwHL-L6300DWTHL-L2375DWMFC-T910DWbizhub 5000iMFC-L2720DWMFC-L6902DWPT-E550W (for Thailand)HL-L5100DNDCP-J915NMFC-L2750DWXLHL-L2370DWMFC-L2720DWRDocuPrint M225 dwMFC-8540DNDCP-1610WRHL-1222WEDCP-L2541DWe-STUDIO302DNFMFC-J3530DWMFC-J898NQL-1110NWBHL-5595DNPT-E850TKW (for Tiwan)PT-E850TKW (for UAE)HL-L5102DWMFC-J890DWTD-4520DNPT-P900WcMFC-L2712DWDCP-T426WDCP-J582NHL-1210WEMFC-J4535DW(XL)DocuPrint M115 wMFC-J905NMFC-L2712DNDCP-7090DWMFC-J893NDCP-7190DNDCP-J526NDCP-7195DWMFC-L2730DWRHL-L2370DNDocuPrint P360 dwDocuPrint M260 zPT-E850TKW (for China)MFC-J5930DWPT-E850TKW (for Thailand)DCP-7189DWHL-L6202DWMFC-J1300DWRJ-2140DCP-L2532DWMFC-J6945DWHL-2595DWMFC-L5902DWDCP-T525WMFC-J4540DW(XL)DCP-L2550DNMFC-J4440NMFC-J4440DWHL-2560DNFAX-L2700DNDocuPrint P375 dMFC-L2730DNMFC-J6980CDWHL-L3210CWMFC-J995DWHL-L2360DNRSP 230DNwHL-L6400DWTPT-P900WDCP-1612WRDocuPrint P225 dHL-5590DNHL-L2370DNRDocuPrint M268 dwMFC-9350CDWMFC-J926N-WBe-STUDIO301DNDCP-J987N-BDCP-J978N-W/BMFC-T4500DWDCP-J587NPT-E850TKW (for Koria)HL-L6250DWDocuPrint M378 dfDocuPrint M268 zMFC-J739DNHL-B2050DNHL-L2340DWRDCP-J1700DWSP-1MFC-L2730DWMFC-L6750DWMFC-L6970DWDCP-T725DWDocuPrint P268 dwDCP-J4140NDCP-J774DWbizhub 4000iHL-L5200DWMFC-B7720DNDCP-T425WDCP-T710WMFC-J2330DWHL-L3290CDWHL-2569DWDCP-1612WEHL-L2305WMFC-L6900DWMFC-J1500NMFC-J805DWDocuPrint M385 zHL-L3270CDWHL-1223WEMFC-1919NWDocuPrint M235 zDCP-J528NDCP-L2530DWRADS-3000NMFC-J4335DW(XL)MFC-L2770DWMFC-T925DWDCP-L2550DW(TWN)DCP-T820DWDCP-J1100DW
CWE ID-CWE-538
Insertion of Sensitive Information into Externally-Accessible File or Directory
CVE-2025-5087
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-6||MEDIUM
EPSS-0.03% / 5.29%
||
7 Day CHG~0.00%
Published-24 Jun, 2025 | 18:30
Updated-26 Jun, 2025 | 18:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cleartext Transmission of Sensitive Information in Kaleris Navis N4

Kaleris NAVIS N4 ULC (Ultra Light Client) communicates insecurely using zlib-compressed data over HTTP. An attacker capable of observing network traffic between Ultra Light Clients and N4 servers can extract sensitive information, including plaintext credentials.

Action-Not Available
Vendor-Kaleris
Product-Navis N4
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2025-49147
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.04% / 10.51%
||
7 Day CHG~0.00%
Published-24 Jun, 2025 | 17:37
Updated-26 Jun, 2025 | 18:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Umbraco.Cms Vulnerable to Disclosure of Configured Password Requirements

Umbraco, a free and open source .NET content management system, has a vulnerability in versions 10.0.0 through 10.8.10 and 13.0.0 through 13.9.1. Via a request to an anonymously authenticated endpoint it's possible to retrieve information about the configured password requirements. The information available is limited but would perhaps give some additional detail useful for someone attempting to brute force derive a user's password. This information was not exposed in Umbraco 7 or 8, nor in 14 or higher versions. The vulnerability is patched in versions 10.8.11 and 13.9.2.

Action-Not Available
Vendor-Umbraco A/S (Umbraco)
Product-Umbraco-CMS
CWE ID-CWE-497
Exposure of Sensitive System Information to an Unauthorized Control Sphere
CVE-2025-4378
Assigner-TR-CERT (Computer Emergency Response Team of the Republic of Türkiye)
ShareView Details
Assigner-TR-CERT (Computer Emergency Response Team of the Republic of Türkiye)
CVSS Score-10||CRITICAL
EPSS-0.03% / 7.10%
||
7 Day CHG~0.00%
Published-24 Jun, 2025 | 16:27
Updated-26 Jun, 2025 | 18:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Hardcoded Credentials in Ataturk University's ATA-AOF Mobile Application

Cleartext Transmission of Sensitive Information, Use of Hard-coded Credentials vulnerability in Ataturk University ATA-AOF Mobile Application allows Authentication Abuse, Authentication Bypass.This issue affects ATA-AOF Mobile Application: before 20.06.2025.

Action-Not Available
Vendor-Ataturk University
Product-ATA-AOF Mobile Application
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2025-3092
Assigner-CERT@VDE
ShareView Details
Assigner-CERT@VDE
CVSS Score-7.5||HIGH
EPSS-0.05% / 13.73%
||
7 Day CHG~0.00%
Published-24 Jun, 2025 | 08:14
Updated-26 Jun, 2025 | 18:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
MB connect line: Observable response discrepancy in mbCONNECT24/mymbCONNECT24

An unauthenticated remote attacker can enumerate valid user names from an unprotected endpoint.

Action-Not Available
Vendor-MB connect lineHelmholz
Product-myREX24myREX24.virtualmymbCONNECT24mbCONNECT24
CWE ID-CWE-204
Observable Response Discrepancy
CVE-2025-48463
Assigner-5f57b9bf-260d-4433-bf07-b6a79e9bb7d4
ShareView Details
Assigner-5f57b9bf-260d-4433-bf07-b6a79e9bb7d4
CVSS Score-3.1||LOW
EPSS-0.01% / 0.64%
||
7 Day CHG~0.00%
Published-24 Jun, 2025 | 02:10
Updated-09 Jul, 2025 | 15:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Unencrypted HTTP Communication

Successful exploitation of the vulnerability could allow an attacker to intercept data and conduct session hijacking on the exposed data as the vulnerable product uses unencrypted HTTP communication, potentially leading to unauthorised access or data tampering.

Action-Not Available
Vendor-Advantech (Advantech Co., Ltd.)
Product-wise-4010lanwise-4060lanwise-4010lan_firmwarewise-4050lanwise-4060lan_firmwarewise-4050lan_firmwareAdvantech Wireless Sensing and Equipment (WISE)
CWE ID-CWE-312
Cleartext Storage of Sensitive Information
CVE-2025-5416
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-2.7||LOW
EPSS-0.03% / 7.47%
||
7 Day CHG~0.00%
Published-20 Jun, 2025 | 16:04
Updated-13 Aug, 2025 | 13:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Keycloak-core: keycloak environment information

A vulnerability has been identified in Keycloak that could lead to unauthorized information disclosure. While it requires an already authenticated user, the /admin/serverinfo endpoint can inadvertently provide sensitive environment information.

Action-Not Available
Vendor-Red Hat, Inc.
Product-keycloakRed Hat Build of Keycloak
CWE ID-CWE-497
Exposure of Sensitive System Information to an Unauthorized Control Sphere
CVE-2025-52719
Assigner-Patchstack
ShareView Details
Assigner-Patchstack
CVSS Score-4.3||MEDIUM
EPSS-0.04% / 11.21%
||
7 Day CHG+0.01%
Published-20 Jun, 2025 | 15:03
Updated-23 Jun, 2025 | 20:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress ProfileGrid plugin <= 5.9.5.2 - Full Path Disclosure (FPD) Vulnerability

Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in Metagauss ProfileGrid allows Retrieve Embedded Sensitive Data. This issue affects ProfileGrid : from n/a through 5.9.5.2.

Action-Not Available
Vendor-Metagauss Inc.
Product-ProfileGrid
CWE ID-CWE-497
Exposure of Sensitive System Information to an Unauthorized Control Sphere
CVE-2025-49715
Assigner-Microsoft Corporation
ShareView Details
Assigner-Microsoft Corporation
CVSS Score-7.5||HIGH
EPSS-0.11% / 29.92%
||
7 Day CHG~0.00%
Published-20 Jun, 2025 | 01:04
Updated-17 Jul, 2025 | 00:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Dynamics 365 FastTrack Implementation Assets Information Disclosure Vulnerability

Exposure of private personal information to an unauthorized actor in Dynamics 365 FastTrack Implementation Assets allows an unauthorized attacker to disclose information over a network.

Action-Not Available
Vendor-Microsoft Corporation
Product-dynamics_365Dynamics 365 FastTrack Implementation
CWE ID-CWE-359
Exposure of Private Personal Information to an Unauthorized Actor
CVE-2025-44203
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.03% / 6.06%
||
7 Day CHG~0.00%
Published-20 Jun, 2025 | 00:00
Updated-24 Jun, 2025 | 15:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In HotelDruid 3.0.7, an unauthenticated attacker can exploit verbose SQL error messages on creadb.php before the 'create database' button is pressed. By sending malformed POST requests to this endpoint, the attacker may obtain the administrator username, password hash, and salt. In some cases, the attack results in a Denial of Service (DoS), preventing the administrator from logging in even with the correct credentials.

Action-Not Available
Vendor-n/a
Product-n/a
CWE ID-CWE-209
Generation of Error Message Containing Sensitive Information
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2025-32880
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.03% / 7.30%
||
7 Day CHG~0.00%
Published-20 Jun, 2025 | 00:00
Updated-08 Jul, 2025 | 14:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered on COROS PACE 3 devices through 3.0808.0. It implements a function to connect the watch to a WLAN. With WLAN access, the COROS Pace 3 downloads firmware files via HTTP. However, the communication is not encrypted and allows sniffing and machine-in-the-middle attacks.

Action-Not Available
Vendor-yftechn/a
Product-coros_pace_3_firmwarecoros_pace_3n/a
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2025-26199
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.20% / 42.27%
||
7 Day CHG+0.01%
Published-18 Jun, 2025 | 00:00
Updated-09 Jul, 2025 | 18:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

CloudClassroom-PHP-Project v1.0 is affected by an insecure credential transmission vulnerability. The application transmits passwords over unencrypted HTTP during the login process, exposing sensitive credentials to potential interception by network-based attackers. A remote attacker with access to the same network (e.g., public Wi-Fi or compromised router) can capture login credentials via Man-in-the-Middle (MitM) techniques. If the attacker subsequently uses the credentials to log in and exploit administrative functions (e.g., file upload), this may lead to remote code execution depending on the environment.

Action-Not Available
Vendor-vishalmathurn/a
Product-cloudclassroom-php_projectn/a
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2025-5141
Assigner-Fortra, LLC
ShareView Details
Assigner-Fortra, LLC
CVSS Score-5.5||MEDIUM
EPSS-0.02% / 3.06%
||
7 Day CHG~0.00%
Published-17 Jun, 2025 | 19:30
Updated-29 Aug, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Core Privileged Access Manager (BoKS) Leakage of Sensitive Data via the Cache

A binary in the BoKS Server Agent component of Fortra's Core Privileged Access Manager (BoKS) on versions 7.2.0 (up to 7.2.0.17), 8.1.0 (up to 8.1.0.22), 8.1.1 (up to 8.1.1.7), 9.0.0 (up to 9.0.0.1) and also legacy tar installs of BoKS 7.2 without hotfix #0474 on Linux, AIX, and Solaris allows low privilege local users to dump data from the cache.

Action-Not Available
Vendor-Fortra LLC
Product-Core Privileged Access Manager (BoKS)
CWE ID-CWE-524
Use of Cache Containing Sensitive Information
CVE-2025-49134
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-2.1||LOW
EPSS-0.05% / 14.21%
||
7 Day CHG~0.00%
Published-16 Jun, 2025 | 21:03
Updated-17 Jun, 2025 | 20:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Weblate exposes personal IP address via e-mail

Weblate is a web based localization tool. Prior to version 5.12, the audit log notifications included the full IP address of the acting user. This could be obtained by third-party servers such as SMTP relays, or spam filters. This issue has been patched in version 5.12.

Action-Not Available
Vendor-WeblateOrg
Product-weblate
CWE ID-CWE-359
Exposure of Private Personal Information to an Unauthorized Actor
CVE-2025-49584
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-8.7||HIGH
EPSS-0.06% / 18.93%
||
7 Day CHG~0.00%
Published-13 Jun, 2025 | 17:21
Updated-16 Jun, 2025 | 12:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
XWiki makes title of inaccessible pages available through the class property values REST API

XWiki is a generic wiki platform. In XWiki Platform versions 10.9 through 16.4.6, 16.5.0-rc-1 through 16.10.2, and 17.0.0-rc-1, the title of every single page whose reference is known can be accessed through the REST API as long as an XClass with a page property is accessible, this is the default for an XWiki installation. This allows an attacker to get titles of pages whose reference is known, one title per request. This doesn't affect fully private wikis as the REST endpoint checks access rights on the XClass definition. The impact on confidentiality depends on the strategy for page names. By default, page names match the title, so the impact should be low but if page names are intentionally obfuscated because the titles are sensitive, the impact could be high. This has been fixed in XWiki 16.4.7, 16.10.3 and 17.0.0 by adding access control checks before getting the title of any page.

Action-Not Available
Vendor-XWiki SAS
Product-xwiki-platform
CWE ID-CWE-201
Insertion of Sensitive Information Into Sent Data
CVE-2025-4227
Assigner-Palo Alto Networks, Inc.
ShareView Details
Assigner-Palo Alto Networks, Inc.
CVSS Score-1||LOW
EPSS-0.01% / 0.57%
||
7 Day CHG~0.00%
Published-13 Jun, 2025 | 05:50
Updated-27 Jun, 2025 | 16:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
GlobalProtect App: Interception in Endpoint Traffic Policy Enforcement

An improper access control vulnerability in the Endpoint Traffic Policy Enforcement https://docs.paloaltonetworks.com/globalprotect/6-0/globalprotect-app-new-features/new-features-released-in-gp-app/endpoint-traffic-policy-enforcement feature of the Palo Alto Networks GlobalProtect™ app allows certain packets to remain unencrypted instead of being properly secured within the tunnel. An attacker with physical access to the network can inject rogue devices to intercept these packets. Under normal operating conditions, the GlobalProtect app automatically recovers from this interception within one minute.

Action-Not Available
Vendor-Palo Alto Networks, Inc.
Product-globalprotectGlobalProtect App
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2025-4229
Assigner-Palo Alto Networks, Inc.
ShareView Details
Assigner-Palo Alto Networks, Inc.
CVSS Score-6||MEDIUM
EPSS-0.06% / 19.82%
||
7 Day CHG~0.00%
Published-13 Jun, 2025 | 05:42
Updated-16 Jun, 2025 | 12:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
PAN-OS: Traffic Information Disclosure Vulnerability

An information disclosure vulnerability in the SD-WAN feature of Palo Alto Networks PAN-OS® software enables an unauthorized user to view unencrypted data sent from the firewall through the SD-WAN interface. This requires the user to be able to intercept packets sent from the firewall. Cloud NGFW and Prisma® Access are not affected by this vulnerability.

Action-Not Available
Vendor-Palo Alto Networks, Inc.
Product-Prisma AccessCloud NGFWPAN-OS
CWE ID-CWE-497
Exposure of Sensitive System Information to an Unauthorized Control Sphere
CVE-2025-4233
Assigner-Palo Alto Networks, Inc.
ShareView Details
Assigner-Palo Alto Networks, Inc.
CVSS Score-5.1||MEDIUM
EPSS-0.02% / 3.91%
||
7 Day CHG~0.00%
Published-12 Jun, 2025 | 22:14
Updated-16 Jun, 2025 | 12:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Prisma Access Browser: Inappropriate implementation in Cache

An insufficient implementation of cache vulnerability in Palo Alto Networks Prisma® Access Browser enables users to bypass certain data control policies.

Action-Not Available
Vendor-Palo Alto Networks, Inc.
Product-Prisma Access Browser
CWE ID-CWE-524
Use of Cache Containing Sensitive Information
CVE-2025-5485
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-8.8||HIGH
EPSS-0.06% / 19.59%
||
7 Day CHG~0.00%
Published-12 Jun, 2025 | 20:05
Updated-16 Jun, 2025 | 12:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SinoTrack GPS Receiver Weak Authentication

User names used to access the web management interface are limited to the device identifier, which is a numerical identifier no more than 10 digits. A malicious actor can enumerate potential targets by incrementing or decrementing from known identifiers or through enumerating random digit sequences.

Action-Not Available
Vendor-SinoTrack
Product-IOT PC Platform
CWE ID-CWE-204
Observable Response Discrepancy
CVE-2025-49194
Assigner-SICK AG
ShareView Details
Assigner-SICK AG
CVSS Score-7.5||HIGH
EPSS-0.04% / 13.21%
||
7 Day CHG~0.00%
Published-12 Jun, 2025 | 14:17
Updated-13 Jun, 2025 | 06:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Unencrypted communication

The server supports authentication methods in which credentials are sent in plaintext over unencrypted channels. If an attacker were to intercept traffic between a client and this server, the credentials would be exposed.

Action-Not Available
Vendor-SICK AG
Product-SICK Media Server
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2025-49187
Assigner-SICK AG
ShareView Details
Assigner-SICK AG
CVSS Score-5.3||MEDIUM
EPSS-0.05% / 15.65%
||
7 Day CHG~0.00%
Published-12 Jun, 2025 | 13:29
Updated-12 Jun, 2025 | 16:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
User enumeration

For failed login attempts, the application returns different error messages depending on whether the login failed due to an incorrect password or a non-existing username. This allows an attacker to guess usernames until they find an existing one.

Action-Not Available
Vendor-SICK AG
Product-SICK Field Analytics
CWE ID-CWE-204
Observable Response Discrepancy
CVE-2025-49183
Assigner-SICK AG
ShareView Details
Assigner-SICK AG
CVSS Score-7.5||HIGH
EPSS-0.02% / 4.07%
||
7 Day CHG~0.00%
Published-12 Jun, 2025 | 13:21
Updated-13 Jun, 2025 | 08:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Unencrypted communication (HTTP)

All communication with the REST API is unencrypted (HTTP), allowing an attacker to intercept traffic between an actor and the webserver. This leads to the possibility of information gathering and downloading media files.

Action-Not Available
Vendor-SICK AG
Product-SICK Media Server
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2025-0163
Assigner-IBM Corporation
ShareView Details
Assigner-IBM Corporation
CVSS Score-5.3||MEDIUM
EPSS-0.05% / 15.20%
||
7 Day CHG~0.00%
Published-11 Jun, 2025 | 14:20
Updated-24 Aug, 2025 | 11:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IBM Security Verify Access information disclosure

IBM Security Verify Access Appliance and Docker 10.0 through 10.0.8 could allow a remote attacker to enumerate usernames due to an observable response discrepancy of disabled accounts.

Action-Not Available
Vendor-IBM Corporation
Product-security_verify_accesssecurity_verify_access_dockerSecurity Verify AccessSecurity Verify Access Docker
CWE ID-CWE-204
Observable Response Discrepancy
CVE-2025-0036
Assigner-Advanced Micro Devices Inc.
ShareView Details
Assigner-Advanced Micro Devices Inc.
CVSS Score-3.2||LOW
EPSS-0.01% / 1.91%
||
7 Day CHG~0.00%
Published-09 Jun, 2025 | 23:57
Updated-30 Jun, 2025 | 14:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In AMD Versal Adaptive SoC devices, the incorrect configuration of the SSS during runtime (post-boot) cryptographic operations could cause data to be incorrectly written to and read from invalid locations as well as returning incorrect cryptographic data.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-Versal HBM SeriesVersal AI Edge SeriesVersal AI Core SeriesVersal Premium SeriesVersal Prime SeriesAlveo V80 Compute AcceleratorVersal Adaptive SoC DevicesVersal RF Series
CWE ID-CWE-497
Exposure of Sensitive System Information to an Unauthorized Control Sphere
CWE ID-CWE-682
Incorrect Calculation
CWE ID-CWE-772
Missing Release of Resource after Effective Lifetime
CWE ID-CWE-940
Improper Verification of Source of a Communication Channel
CWE ID-CWE-941
Incorrectly Specified Destination in a Communication Channel
CVE-2025-31045
Assigner-Patchstack
ShareView Details
Assigner-Patchstack
CVSS Score-7.5||HIGH
EPSS-0.05% / 13.48%
||
7 Day CHG~0.00%
Published-09 Jun, 2025 | 15:56
Updated-12 Jun, 2025 | 16:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress elfsight Contact Form widget <= 2.3.1 - Sensitive Data Exposure Vulnerability

Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in elfsight elfsight Contact Form widget allows Retrieve Embedded Sensitive Data. This issue affects elfsight Contact Form widget: from n/a through 2.3.1.

Action-Not Available
Vendor-elfsight
Product-elfsight Contact Form widget
CWE ID-CWE-497
Exposure of Sensitive System Information to an Unauthorized Control Sphere
CVE-2025-48261
Assigner-Patchstack
ShareView Details
Assigner-Patchstack
CVSS Score-7.5||HIGH
EPSS-0.05% / 13.48%
||
7 Day CHG~0.00%
Published-09 Jun, 2025 | 15:53
Updated-02 Jul, 2025 | 19:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress MultiVendorX <= 4.2.22 - Sensitive Data Exposure Vulnerability

Insertion of Sensitive Information Into Sent Data vulnerability in MultiVendorX MultiVendorX allows Retrieve Embedded Sensitive Data. This issue affects MultiVendorX: from n/a through 4.2.22.

Action-Not Available
Vendor-multivendorxMultiVendorX
Product-multivendorxMultiVendorX
CWE ID-CWE-201
Insertion of Sensitive Information Into Sent Data
CVE-2025-5893
Assigner-TWCERT/CC
ShareView Details
Assigner-TWCERT/CC
CVSS Score-9.3||CRITICAL
EPSS-0.13% / 32.71%
||
7 Day CHG~0.00%
Published-09 Jun, 2025 | 06:54
Updated-09 Jun, 2025 | 13:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Honding Technology Smart Parking Management System - Exposure of Sensitive Information

Smart Parking Management System from Honding Technology has an Exposure of Sensitive Information vulnerability, allowing unauthenticated remote attackers to access a specific page and obtain plaintext administrator credentials.

Action-Not Available
Vendor-Honding Technology
Product-Smart Parking Management System
CWE ID-CWE-256
Plaintext Storage of a Password
CWE ID-CWE-497
Exposure of Sensitive System Information to an Unauthorized Control Sphere
CVE-2025-45001
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.01% / 2.02%
||
7 Day CHG~0.00%
Published-09 Jun, 2025 | 00:00
Updated-23 Jun, 2025 | 14:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

react-native-keys 0.7.11 is vulnerable to sensitive information disclosure (remote) as encryption cipher and Base64 chunks are stored as plaintext in the compiled native binary. Attackers can extract these secrets using basic static analysis tools.

Action-Not Available
Vendor-numann/a
Product-react-native-keysn/a
CWE ID-CWE-312
Cleartext Storage of Sensitive Information
CVE-2025-49128
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-4||MEDIUM
EPSS-0.01% / 0.24%
||
7 Day CHG~0.00%
Published-06 Jun, 2025 | 21:18
Updated-09 Jun, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Jackson-core Vulnerable to Memory Disclosure via Source Snippet in JsonLocation

Jackson-core contains core low-level incremental ("streaming") parser and generator abstractions used by Jackson Data Processor. Starting in version 2.0.0 and prior to version 2.13.0, a flaw in jackson-core's `JsonLocation._appendSourceDesc` method allows up to 500 bytes of unintended memory content to be included in exception messages. When parsing JSON from a byte array with an offset and length, the exception message incorrectly reads from the beginning of the array instead of the logical payload start. This results in possible information disclosure in systems using pooled or reused buffers, like Netty or Vert.x. This issue was silently fixed in jackson-core version 2.13.0, released on September 30, 2021, via PR #652. All users should upgrade to version 2.13.0 or later. If upgrading is not immediately possible, applications can mitigate the issue by disabling exception message exposure to clients to avoid returning parsing exception messages in HTTP responses and/or disabling source inclusion in exceptions to prevent Jackson from embedding any source content in exception messages, avoiding leakage.

Action-Not Available
Vendor-FasterXML, LLC.
Product-jackson-core
CWE ID-CWE-209
Generation of Error Message Containing Sensitive Information
CVE-2025-49419
Assigner-Patchstack
ShareView Details
Assigner-Patchstack
CVSS Score-5.5||MEDIUM
EPSS-0.04% / 11.86%
||
7 Day CHG~0.00%
Published-06 Jun, 2025 | 12:54
Updated-06 Jun, 2025 | 14:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress Foxit eSign for WordPress <= 2.0.3 - Other Vulnerability Type Vulnerability

Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in esigngenie Foxit eSign for WordPress allows Retrieve Embedded Sensitive Data. This issue affects Foxit eSign for WordPress: from n/a through 2.0.3.

Action-Not Available
Vendor-esigngenie
Product-Foxit eSign for WordPress
CWE ID-CWE-497
Exposure of Sensitive System Information to an Unauthorized Control Sphere
CVE-2025-23969
Assigner-Patchstack
ShareView Details
Assigner-Patchstack
CVSS Score-5.3||MEDIUM
EPSS-0.04% / 11.42%
||
7 Day CHG~0.00%
Published-06 Jun, 2025 | 12:54
Updated-06 Jun, 2025 | 14:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress KI Live Video Conferences <= 5.5.15 - Sensitive Data Exposure Vulnerability

Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in whassan KI Live Video Conferences allows Retrieve Embedded Sensitive Data. This issue affects KI Live Video Conferences: from n/a through 5.5.15.

Action-Not Available
Vendor-whassan
Product-KI Live Video Conferences
CWE ID-CWE-497
Exposure of Sensitive System Information to an Unauthorized Control Sphere
CVE-2025-49294
Assigner-Patchstack
ShareView Details
Assigner-Patchstack
CVSS Score-5.3||MEDIUM
EPSS-0.04% / 11.42%
||
7 Day CHG~0.00%
Published-06 Jun, 2025 | 12:53
Updated-06 Jun, 2025 | 19:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress Crawlomatic Multisite Scraper Post Generator plugin <= 2.6.8.2 - Sensitive Data Exposure via Log Exposure vulnerability

Insertion of Sensitive Information Into Sent Data vulnerability in CodeRevolution Crawlomatic Multisite Scraper Post Generator allows Retrieve Embedded Sensitive Data. This issue affects Crawlomatic Multisite Scraper Post Generator: from n/a through 2.6.8.2.

Action-Not Available
Vendor-CodeRevolution
Product-Crawlomatic Multisite Scraper Post Generator
CWE ID-CWE-201
Insertion of Sensitive Information Into Sent Data
CVE-2025-5733
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-5.3||MEDIUM
EPSS-0.03% / 6.58%
||
7 Day CHG~0.00%
Published-06 Jun, 2025 | 03:41
Updated-06 Jun, 2025 | 16:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Modern Events Calendar <= 7.21.9 - Information Exposure

The Modern Events Calendar Lite plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 7.21.9. This is due improper or insufficient validation of the id property when exporting calendars. This makes it possible for unauthenticated attackers to retrieve the full path of the web application, which can be used to aid other attacks. The information displayed is not useful on its own, and requires another vulnerability to be present for damage to an affected website.

Action-Not Available
Vendor-webnus/
Product-Modern Events Calendar Lite
CWE ID-CWE-201
Insertion of Sensitive Information Into Sent Data
CVE-2024-56342
Assigner-IBM Corporation
ShareView Details
Assigner-IBM Corporation
CVSS Score-4.3||MEDIUM
EPSS-0.05% / 13.46%
||
7 Day CHG~0.00%
Published-06 Jun, 2025 | 01:27
Updated-24 Aug, 2025 | 11:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IBM Verify Identity Access Digital Credentials information disclosure

IBM Verify Identity Access Digital Credentials 24.06 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system.

Action-Not Available
Vendor-IBM Corporation
Product-verify_identity_access_digital_credentialsVerify Identity Access Digital Credentials
CWE ID-CWE-209
Generation of Error Message Containing Sensitive Information
CVE-2025-31134
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.06% / 19.63%
||
7 Day CHG~0.00%
Published-04 Jun, 2025 | 19:35
Updated-10 Jun, 2025 | 15:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
FreshRSS vulnerable to directory enumeration via ext.php

FreshRSS is a self-hosted RSS feed aggregator. Prior to version 1.26.2, an attacker can gain additional information about the server by checking if certain directories exist. An attacker can, for example, check if older PHP versions are installed or if certain software is installed on the server and potentially use that information to further attack the server. Version 1.26.2 contains a patch for the issue.

Action-Not Available
Vendor-freshrssFreshRSS
Product-freshrssFreshRSS
CWE ID-CWE-201
Insertion of Sensitive Information Into Sent Data
CVE-2025-48934
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.06% / 18.96%
||
7 Day CHG~0.00%
Published-04 Jun, 2025 | 19:21
Updated-02 Jul, 2025 | 13:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Deno.env.toObject() ignores the variables listed in --deny-env and returns all environment variables

Deno is a JavaScript, TypeScript, and WebAssembly runtime. Prior to versions 2.1.13 and 2.2.13, the `Deno.env.toObject` method ignores any variables listed in the `--deny-env` option of the `deno run` command. When looking at the documentation of the `--deny-env` option this might lead to a false impression that variables listed in the option are impossible to read. Software relying on the combination of both flags to allow access to most environment variables except a few sensitive ones will be vulnerable to malicious code trying to steal secrets using the `Deno.env.toObject()` method. Versions 2.1.13 and 2.2.13 contains a patch.

Action-Not Available
Vendor-denodenoland
Product-denodeno
CWE ID-CWE-201
Insertion of Sensitive Information Into Sent Data
CVE-2025-48996
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.04% / 12.18%
||
7 Day CHG~0.00%
Published-02 Jun, 2025 | 19:24
Updated-04 Jun, 2025 | 14:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Unauthenticated Disclosure of PSU HAX CMS Site Listings via haxPsuUsage API Endpoint

HAX open-apis provides microservice apis for HAX webcomponents repo that are shared infrastructure calls. An unauthenticated information disclosure vulnerability exists in the Penn State University deployment of the HAX content management system via the `haxPsuUsage` API endpoint, related to a flat present in open-apis versions up to and including 10.0.2. This allows any remote unauthenticated user to retrieve a full list of PSU websites hosted on HAX CMS. When chained with other authorization issues (e.g., HAX-3), this could assist in targeted attacks such as unauthorized content modification or deletion. Commit 06c2e1fbb7131a8fe66aa0600f38dcacae6b7ac7 patches the vulnerability.

Action-Not Available
Vendor-haxtheweb
Product-issues
CWE ID-CWE-201
Insertion of Sensitive Information Into Sent Data
CVE-2025-48995
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-6.9||MEDIUM
EPSS-0.04% / 8.80%
||
7 Day CHG~0.00%
Published-02 Jun, 2025 | 16:23
Updated-02 Jun, 2025 | 17:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SignXML's signature verification with HMAC is vulnerable to a timing attack

SignXML is an implementation of the W3C XML Signature standard in Python. When verifying signatures with X509 certificate validation turned off and HMAC shared secret set (`signxml.XMLVerifier.verify(require_x509=False, hmac_key=...`), versions of SignXML prior to 4.0.4 are vulnerable to a potential timing attack. The verifier may leak information about the correct HMAC when comparing it with the user supplied hash, allowing users to reconstruct the correct HMAC for any data.

Action-Not Available
Vendor-XML-Security
Product-signxml
CWE ID-CWE-208
Observable Timing Discrepancy
CVE-2025-48941
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.04% / 13.20%
||
7 Day CHG~0.00%
Published-02 Jun, 2025 | 15:58
Updated-02 Jul, 2025 | 15:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
MyBB may disclosure unviewable threads' titles in searches

MyBB is free and open source forum software. Prior to version 1.8.39, the search component does not validate permissions correctly, which allows attackers to determine the existence of hidden (draft, unapproved, or soft-deleted) threads containing specified text in the title. The visibility state (`mybb_threads.visible` integer column) of threads is not validated in internal search queries, whose result is used to output a general success or failure of the search. While MyBB validates permissions when displaying the final search results, a search operation that internally produces at least one result outputs a redirect response (as a HTTP redirect, or a success message page with delayed redirect, depending on configuration). On the other hand, a search operation that internally produces no results outputs a corresponding message in the response without a redirect. This allows a user to determine whether threads matching title search parameters exist, including draft threads (`visible` with a value of `-2`), soft-deleted threads (`visible` with a value of `-1`), and unapproved threads (`visible` with a value of `0`); in addition to displaying generally visible threads (`visible` with a value of `1`). This vulnerability does not affect other layers of permissions. In order to exploit the vulnerability, the user must have access to the search functionality, and general access to forums containing the thread(s). The vulnerability does not expose the message content of posts. MyBB 1.8.39 resolves this issue.

Action-Not Available
Vendor-MyBB
Product-mybbmybb
CWE ID-CWE-1230
Exposure of Sensitive Information Through Metadata
CVE-2025-1499
Assigner-IBM Corporation
ShareView Details
Assigner-IBM Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.03% / 5.81%
||
7 Day CHG~0.00%
Published-01 Jun, 2025 | 11:30
Updated-26 Aug, 2025 | 14:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IBM InfoSphere Information Server information disclosure

IBM InfoSphere Information Server 11.7 stores credential information for database authentication in a cleartext parameter file that could be viewed by an authenticated user.

Action-Not Available
Vendor-IBM Corporation
Product-infosphere_information_server_on_cloudinfosphere_information_serverInfoSphere Information Server
CWE ID-CWE-312
Cleartext Storage of Sensitive Information
CVE-2024-13916
Assigner-CERT.PL
ShareView Details
Assigner-CERT.PL
CVSS Score-6.9||MEDIUM
EPSS-0.02% / 4.09%
||
7 Day CHG~0.00%
Published-30 May, 2025 | 15:16
Updated-10 Jun, 2025 | 10:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Exposure of Applications' Encryption PINs in Kruger&Matz AppLock

An application "com.pri.applock", which is pre-loaded on Kruger&Matz smartphones, allows a user to encrypt any application using user-provided PIN code or by using biometric data. Exposed ”com.android.providers.settings.fingerprint.PriFpShareProvider“ content provider's public method query() allows any other malicious application, without any granted Android system permissions, to exfiltrate the PIN code. Only version (version name: 13, version code: 33) was tested and confirmed to have this vulnerability. Application update was released in April 2025.

Action-Not Available
Vendor-Kruger&Matz
Product-com.pri.applock
CWE ID-CWE-497
Exposure of Sensitive System Information to an Unauthorized Control Sphere
CVE-2025-48331
Assigner-Patchstack
ShareView Details
Assigner-Patchstack
CVSS Score-7.5||HIGH
EPSS-0.05% / 13.48%
||
7 Day CHG~0.00%
Published-30 May, 2025 | 14:01
Updated-30 May, 2025 | 22:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress WooCommerce Orders & Customers Exporter <= 5.0 - Sensitive Data Exposure Vulnerability

Insertion of Sensitive Information Into Sent Data vulnerability in Vanquish WooCommerce Orders & Customers Exporter allows Retrieve Embedded Sensitive Data.This issue affects WooCommerce Orders & Customers Exporter: from n/a through 5.0.

Action-Not Available
Vendor-Vanquish
Product-WooCommerce Orders & Customers Exporter
CWE ID-CWE-201
Insertion of Sensitive Information Into Sent Data
CVE-2025-48381
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.06% / 19.66%
||
7 Day CHG~0.00%
Published-30 May, 2025 | 03:38
Updated-30 May, 2025 | 16:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CVAT has information disclosure via browsable API

Computer Vision Annotation Tool (CVAT) is an interactive video and image annotation tool for computer vision. In versions starting from 2.4.0 to before 2.38.0, an authenticated CVAT user may be able to retrieve the IDs and names of all tasks, projects, labels, and the IDs of all jobs and quality reports on the CVAT instance. In addition, if the instance contains many resources of a particular type, retrieving this information may tie up system resources, denying access to legitimate users. This issue has been patched in version 2.38.0.

Action-Not Available
Vendor-cvat-ai
Product-cvat
CWE ID-CWE-201
Insertion of Sensitive Information Into Sent Data
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • ...
  • 54
  • 55
  • Next