Vulnerabilities (CVE)

Filtered by CWE-200
Total 8836 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2025-32983 2025-04-25 N/A 7.5 HIGH
NETSCOUT nGeniusONE before 6.4.0 b2350 allows Technical Information Disclosure via a Stack Trace.
CVE-2024-21501 2 Apostrophecms, Fedoraproject 2 Sanitize-html, Fedora 2025-04-25 N/A 5.3 MEDIUM
Versions of the package sanitize-html before 2.12.1 are vulnerable to Information Exposure when used on the backend and with the style attribute allowed, allowing enumeration of files in the system (including project dependencies). An attacker could exploit this vulnerability to gather details about the file system structure and dependencies of the targeted server.
CVE-2022-26885 1 Apache 1 Dolphinscheduler 2025-04-25 N/A 7.5 HIGH
When using tasks to read config files, there is a risk of database password disclosure. We recommend you upgrade to version 2.0.6 or higher.
CVE-2025-3628 2025-04-25 N/A 4.3 MEDIUM
A flaw has was found in Moodle where anonymous assignment submissions can be de-anonymized via search, revealing student identities.
CVE-2025-32044 2025-04-25 N/A 7.5 HIGH
A flaw has been identified in Moodle where, on certain sites, unauthenticated users could retrieve sensitive user data—including names, contact information, and hashed passwords—via stack traces returned by specific API calls. Sites with PHP configured with zend.exception_ignore_args = 1 in the php.ini file are not affected by this vulnerability.
CVE-2025-3923 2025-04-25 N/A 5.3 MEDIUM
The Prevent Direct Access – Protect WordPress Files plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.8.8 via the 'generate_unique_string' due to insufficient randomness of the generated file name. This makes it possible for unauthenticated attackers to extract sensitive data including files protected by the plugin if the attacker can determine the file name.
CVE-2022-28607 1 Isic.lk Project 1 Isic.lk 2025-04-24 N/A 7.5 HIGH
An issue was discovered in asith-eranga ISIC tour booking through version published on Feb 13th 2018, allows attackers to gain sensitive information via the action parameter to /system/user/modules/mod_users/controller.php.
CVE-2022-42766 2 Google, Unisoc 14 Android, S8011, Sc7731e and 11 more 2025-04-23 N/A 5.5 MEDIUM
In wlan driver, there is a possible missing permission check, This could lead to local information disclosure.
CVE-2021-37192 1 Siemens 1 Sinema Remote Connect Server 2025-04-23 3.3 LOW 4.3 MEDIUM
A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.0 SP2). The affected software has an information disclosure vulnerability that could allow an attacker to retrieve a list of network devices a known user can manage.
CVE-2021-37190 1 Siemens 1 Sinema Remote Connect Server 2025-04-23 3.3 LOW 4.3 MEDIUM
A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.0 SP2). The affected software has an information disclosure vulnerability that could allow an attacker to retrieve VPN connection for a known user.
CVE-2023-50324 1 Ibm 1 Cognos Command Center 2025-04-23 N/A 5.3 MEDIUM
IBM Cognos Command Center 10.2.4.1 and 10.2.5 exposes details the X-AspNet-Version Response Header that could allow an attacker to obtain information of the application environment to conduct further attacks. IBM X-Force ID: 275038.
CVE-2022-42782 2 Google, Unisoc 14 Android, S8000, Sc7731e and 11 more 2025-04-23 N/A 5.5 MEDIUM
In wlan driver, there is a possible missing permission check, This could lead to local information disclosure.
CVE-2025-25192 1 Glpi-project 1 Glpi 2025-04-23 N/A 6.5 MEDIUM
GLPI is a free asset and IT management software package. Prior to version 10.0.18, a low privileged user can enable debug mode and access sensitive information. Version 10.0.18 contains a patch. As a workaround, one may delete the `install/update.php` file.
CVE-2024-45799 1 Rathena 1 Fluxcp 2025-04-23 N/A 7.3 HIGH
FluxCP is a web-based Control Panel for rAthena servers written in PHP. A javascript injection is possible via venders/buyers list pages and shop names, that are currently not sanitized. This allows executing arbitrary javascript code on the user's browser just by visiting the shop pages. As a result all logged in to fluxcp users can have their session info stolen. This issue has been addressed in release version 1.3. All users are advised to upgrade. There are no known workarounds for this vulnerability.
CVE-2022-29244 2 Netapp, Npmjs 2 Ontap Select Deploy Administration Utility, Npm 2025-04-23 5.0 MEDIUM 7.5 HIGH
npm pack ignores root-level .gitignore and .npmignore file exclusion directives when run in a workspace or with a workspace flag (ie. `--workspaces`, `--workspace=<name>`). Anyone who has run `npm pack` or `npm publish` inside a workspace, as of v7.9.0 and v7.13.0 respectively, may be affected and have published files into the npm registry they did not intend to include. Users should upgrade to the latest, patched version of npm v8.11.0, run: npm i -g npm@latest . Node.js versions v16.15.1, v17.19.1, and v18.3.0 include the patched v8.11.0 version of npm.
CVE-2025-3698 1 Tecno 1 Carlcare 2025-04-23 N/A 7.5 HIGH
Interface exposure vulnerability in the mobile application (com.transsion.carlcare) may lead to information leakage risk.
CVE-2024-11299 2025-04-23 N/A 5.3 MEDIUM
The Memberpress plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.11.37 via the WordPress core search feature. This makes it possible for unauthenticated attackers to extract sensitive data from posts that have been restricted to higher-level roles such as administrator.
CVE-2025-23174 2025-04-23 N/A 7.5 HIGH
CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CVE-2025-32958 2025-04-23 N/A 9.8 CRITICAL
Adept is a language for general purpose programming. Prior to commit a1a41b7, the remoteBuild.yml workflow file uses actions/upload-artifact@v4 to upload the mac-standalone artifact. This artifact is a zip of the current directory, which includes the automatically generated .git/config file containing the run's GITHUB_TOKEN. Seeing as the artifact can be downloaded prior to the end of the workflow, there is a few seconds where an attacker can extract the token from the artifact and use it with the Github API to push malicious code or rewrite release commits in the AdeptLanguage/Adept repository. This issue has been patched in commit a1a41b7.
CVE-2025-29316 2025-04-22 N/A 6.2 MEDIUM
An issue in DataPatrol Screenshot watermark, printing watermark agent v.3.5.2.0 allows a physically proximate attacker to obtain sensitive information