Information Disclosure
Information Disclosure vulnerabilities expose sensitive data to unauthorized parties. This can include credentials, configuration details, personal information, or system internals.
65
MEDIUM
Data Exposure
Understanding Information Disclosure
Detailed information about this vulnerability type.
How to Identify
- •Review security advisories
- •Perform regular security testing
Prevention Best Practices
- ✓Follow security best practices
- ✓Keep systems updated
Information Disclosure CVEs (65)
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2019-1153 | 5.5 | This vulnerability allows an attacker to access sensitive information from a user's system, which could help them take further control of it. However, the attacker must first log on to the affected system and run a specially crafted application to exploit this weakness. | microsoftoffice | Exploit Available | over 6 years agoAug 14, 2019 |
| CVE-2019-1148 | 5.5 | This vulnerability allows an attacker to access sensitive information from a user's system, which could help them take further control of the system. To exploit it, the attacker must first log on to the affected system and run a specially crafted application. | microsoftoffice | Exploit Available | over 6 years agoAug 14, 2019 |
| CVE-2019-1143 | 5.5 | This vulnerability allows an attacker to access sensitive information from a user's system, which could help them take further control of it. To exploit this, the attacker might trick the user into opening a malicious document or visiting a harmful website. | microsoftwindows 10 | Exploit Available | over 6 years agoAug 14, 2019 |
| CVE-2019-1078 | 5.5 | An attacker can exploit this vulnerability to access sensitive information from a user's system, potentially leading to further attacks. However, they need to be authenticated and must run a specially crafted application on the target machine to take advantage of this flaw. | microsoftwindows 10 | Exploit Available | over 6 years agoAug 14, 2019 |
| CVE-2019-1030 | 4.3 | This vulnerability allows an attacker to access sensitive information from a user's system by exploiting flaws in how Microsoft Edge handles data in memory. To succeed, the attacker must trick the user into visiting a malicious website or clicking on a harmful link, as there’s no way for the attacker to force the user to do so. | microsoftedge | Exploit Available | over 6 years agoAug 14, 2019 |