Information Disclosure

Information Disclosure vulnerabilities expose sensitive data to unauthorized parties. This can include credentials, configuration details, personal information, or system internals.

Total CVEs

65

Typical Severity

MEDIUM

Category

Data Exposure

Understanding Information Disclosure

Detailed information about this vulnerability type.

How to Identify

  • Review security advisories
  • Perform regular security testing

Prevention Best Practices

  • Follow security best practices
  • Keep systems updated

Information Disclosure CVEs (65)

DescriptionVendor / ProductExploit Status
CVE-2019-11535.5

This vulnerability allows an attacker to access sensitive information from a user's system, which could help them take further control of it. However, the attacker must first log on to the affected system and run a specially crafted application to exploit this weakness.

microsoftoffice
Exploit Available
over 6 years agoAug 14, 2019
CVE-2019-11485.5

This vulnerability allows an attacker to access sensitive information from a user's system, which could help them take further control of the system. To exploit it, the attacker must first log on to the affected system and run a specially crafted application.

microsoftoffice
Exploit Available
over 6 years agoAug 14, 2019
CVE-2019-11435.5

This vulnerability allows an attacker to access sensitive information from a user's system, which could help them take further control of it. To exploit this, the attacker might trick the user into opening a malicious document or visiting a harmful website.

microsoftwindows 10
Exploit Available
over 6 years agoAug 14, 2019
CVE-2019-10785.5

An attacker can exploit this vulnerability to access sensitive information from a user's system, potentially leading to further attacks. However, they need to be authenticated and must run a specially crafted application on the target machine to take advantage of this flaw.

microsoftwindows 10
Exploit Available
over 6 years agoAug 14, 2019
CVE-2019-10304.3

This vulnerability allows an attacker to access sensitive information from a user's system by exploiting flaws in how Microsoft Edge handles data in memory. To succeed, the attacker must trick the user into visiting a malicious website or clicking on a harmful link, as there’s no way for the attacker to force the user to do so.

microsoftedge
Exploit Available
over 6 years agoAug 14, 2019
Showing 61 to 65 of 65 results