Filtered by CWE-200
Total 9146 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2025-20232 2025-03-26 5.7 Medium
In Splunk Enterprise versions below 9.3.3, 9.2.5, and 9.1.8 and Splunk Cloud Platform versions below 9.3.2408.103, 9.2.2406.108, 9.2.2403.113, 9.1.2312.208 and 9.1.2308.212, a low-privileged user that does not hold the “admin“ or “power“ Splunk roles could run a saved search with a risky command using the permissions of a higher-privileged user to bypass the SPL safeguards for risky commands on the “/app/search/search“ endpoint through its “s“ parameter. <br>The vulnerability requires the attacker to phish the victim by tricking them into initiating a request within their browser. The authenticated user should not be able to exploit the vulnerability at will.
CVE-2025-20226 2025-03-26 5.7 Medium
In Splunk Enterprise versions below 9.4.1, 9.3.3, 9.2.5, and 9.1.8 and Splunk Cloud Platform versions below 9.3.2408.107, 9.2.2406.111, and 9.1.2308.214, a low-privileged user that does not hold the "admin" or "power" Splunk roles could run a saved search with a risky command using the permissions of a higher-privileged user to bypass the SPL safeguards for risky commands on the "/services/streams/search" endpoint through its "q" parameter. The vulnerability requires the attacker to phish the victim by tricking them into initiating a request within their browser. The authenticated user should not be able to exploit the vulnerability at will.
CVE-2025-30353 2025-03-26 8.6 High
Directus is a real-time API and App dashboard for managing SQL database content. Starting in version 9.12.0 and prior to version 11.5.0, when a Flow with the "Webhook" trigger and the "Data of Last Operation" response body encounters a ValidationError thrown by a failed condition operation, the API response includes sensitive data. This includes environmental variables, sensitive API keys, user accountability information, and operational data. This issue poses a significant security risk, as any unintended exposure of this data could lead to potential misuse. Version 11.5.0 fixes the issue.
CVE-2025-30352 2025-03-26 5.3 Medium
Directus is a real-time API and App dashboard for managing SQL database content. Starting in version 9.0.0-alpha.4 and prior to version 11.5.0, the `search` query parameter allows users with access to a collection to filter items based on fields they do not have permission to view. This allows the enumeration of unknown field contents. The searchable columns (numbers & strings) are not checked against permissions when injecting the `where` clauses for applying the search query. This leads to the possibility of enumerating those un-permitted fields. Version 11.5.0 fixes the issue.
CVE-2024-34529 1 Nebari 1 Nebari 2025-03-26 4.8 Medium
Nebari through 2024.4.1 prints the temporary Keycloak root password.
CVE-2024-26309 1 Archerirm 1 Archer 2025-03-26 5.3 Medium
Archer Platform 6.x before 6.14 P2 HF2 (6.14.0.2.2) contains a sensitive information disclosure vulnerability. An unauthenticated attacker could potentially obtain access to sensitive information via an internal URL.
CVE-2023-21237 1 Google 1 Android 2025-03-26 5.5 Medium
In applyRemoteView of NotificationContentInflater.java, there is a possible way to hide foreground service notification due to misleading or insufficient UI. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-251586912
CVE-2022-47070 1 Nvs365 2 Nvs-365-v01, Nvs-365-v01 Firmware 2025-03-26 7.5 High
NVS365 V01 is vulnerable to Incorrect Access Control. After entering a wrong password, the url will be sent to the server twice. In the second package, the server will return the correct password information.
CVE-2022-47367 2 Google, Unisoc 14 Android, S8000, Sc7731e and 11 more 2025-03-26 4.8 Medium
In bluetooth driver, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.
CVE-2022-47325 2 Google, Unisoc 14 Android, S8000, Sc7731e and 11 more 2025-03-26 6.4 Medium
In wlan driver, there is a possible missing permission check. This could lead to local information disclosure.
CVE-2022-47324 2 Google, Unisoc 14 Android, S8000, Sc7731e and 11 more 2025-03-26 6.4 Medium
In wlan driver, there is a possible missing permission check. This could lead to local information disclosure.
CVE-2022-44268 1 Imagemagick 1 Imagemagick 2025-03-26 6.5 Medium
ImageMagick 7.1.0-49 is vulnerable to Information Disclosure. When it parses a PNG image (e.g., for resize), the resulting image could have embedded the content of an arbitrary. file (if the magick binary has permissions to read it).
CVE-2022-38686 2 Google, Unisoc 14 Android, S8000, Sc7731e and 11 more 2025-03-26 6.4 Medium
In wlan driver, there is a possible missing params check. This could lead to local denial of service in wlan services.
CVE-2025-30222 2025-03-26 N/A
Shescape is a simple shell escape library for JavaScript. Versions 1.7.2 through 2.1.1 are vulnerable to potential environment variable exposure on Windows with CMD. This impact users of Shescape on Windows that explicitly configure `shell: 'cmd.exe'` or `shell: true` using any of `quote`/`quoteAll`/`escape`/`escapeAll`. An attacker may be able to get read-only access to environment variables. This bug has been patched in v2.1.2. For those who are already using v2 of Shescape, no further changes are required. Those who are are using v1 of Shescape should follow the migration guide to upgrade to v2. There is no plan to release a patch compatible with v1 of Shescape. As a workaround, users can remove all instances of `%` from user input before using Shescape.
CVE-2025-23203 2025-03-26 5.5 Medium
Icinga Director is an Icinga config deployment tool. A Security vulnerability has been found starting in version 1.0.0 and prior to 1.10.3 and 1.11.3 on several director endpoints of REST API. To reproduce this vulnerability an authenticated user with permission to access the Director is required (plus api access with regard to the api endpoints). And even though some of these Icinga Director users are restricted from accessing certain objects, are able to retrieve information related to them if their name is known. This makes it possible to change the configuration of these objects by those Icinga Director users restricted from accessing them. This results in further exploitation, data breaches and sensitive information disclosure. Affected endpoints include icingaweb2/director/service, if the host name is left out of the query; icingaweb2/directore/notification; icingaweb2/director/serviceset; and icingaweb2/director/scheduled-downtime. In addition, the endpoint `icingaweb2/director/services?host=filteredHostName` returns a status code 200 even though the services for the host is filtered. This in turn lets the restricted user know that the host `filteredHostName` exists even though the user is restricted from accessing it. This could again result in further exploitation of this information and data breaches. Icinga Director has patches in versions 1.10.3 and 1.11.1. If upgrading is not feasible, disable the director module for the users other than admin role for the time being.
CVE-2022-47329 2 Google, Unisoc 14 Android, S8000, Sc7731e and 11 more 2025-03-26 6.4 Medium
In wlan driver, there is a possible missing permission check. This could lead to local information disclosure.
CVE-2022-47328 2 Google, Unisoc 14 Android, S8000, Sc7731e and 11 more 2025-03-26 6.4 Medium
In wlan driver, there is a possible missing permission check. This could lead to local information disclosure.
CVE-2022-47326 2 Google, Unisoc 14 Android, S8000, Sc7731e and 11 more 2025-03-26 6.4 Medium
In wlan driver, there is a possible missing permission check. This could lead to local information disclosure.
CVE-2025-2228 2025-03-26 5.7 Medium
The Responsive Addons for Elementor – Free Elementor Addons Plugin and Elementor Templates plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.6.8 the 'register_user' function. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract sensitive data including usernames and passwords of any users who register via the Edit Login | Registration Form widget, as long as that user opens the email notification for successful registration.
CVE-2023-0659 1 Bdcom 2 1704-wgl, 1704-wgl Firmware 2025-03-25 5.3 Medium
A vulnerability was found in BDCOM 1704-WGL 2.0.6314. It has been classified as critical. This affects an unknown part of the file /param.file.tgz of the component Backup File Handler. The manipulation leads to information disclosure. It is possible to initiate the attack remotely. The identifier VDB-220101 was assigned to this vulnerability.