Filtered by CWE-359
Total 144 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2025-43217 1 Apple 3 Ios, Ipados, Iphone Os 2025-11-03 4 Medium
The issue was addressed by adding additional logic. This issue is fixed in iPadOS 17.7.9, iOS 18.6 and iPadOS 18.6. Privacy Indicators for microphone or camera access may not be correctly displayed.
CVE-2025-31276 1 Apple 3 Ios, Ipados, Iphone Os 2025-11-03 5.3 Medium
This issue was addressed through improved state management. This issue is fixed in iOS 18.6 and iPadOS 18.6, iPadOS 17.7.9. Remote content may be loaded even when the 'Load Remote Images' setting is turned off.
CVE-2024-42325 1 Zabbix 1 Zabbix 2025-11-03 3.5 Low
Zabbix API user.get returns all users that share common group with the calling user. This includes media and other information, such as login attempts, etc.
CVE-2025-43279 1 Apple 1 Macos 2025-11-03 6.2 Medium
A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Tahoe 26. An app may be able to access user-sensitive data.
CVE-2025-62644 2 Rbi, Restaurant Brands International 2 Restaurant Brands International Assistant, Assistant Platform 2025-10-31 5 Medium
The Restaurant Brands International (RBI) assistant platform through 2025-09-06 has a Global Store Directory that shares personal information among authenticated users.
CVE-2025-53765 1 Microsoft 2 Azure App Service On Azure Stack, Azure Stack Hub 2025-10-30 4.4 Medium
Exposure of private personal information to an unauthorized actor in Azure Stack allows an authorized attacker to disclose information locally.
CVE-2025-10859 2 Apple, Mozilla 3 Ios, Firefox, Firefox For Ios 2025-10-30 4 Medium
Cookie storage for non-HTML temporary documents was being shared incorrectly with normal browsing content, allowing information from private tabs to escape Incognito mode even after the user closed all tabs This vulnerability affects Firefox for iOS < 143.1.
CVE-2023-45720 1 Hcltech 1 Leap 2025-10-29 5.3 Medium
Insufficient default configuration in HCL Leap allows anonymous access to directory information.
CVE-2025-11145 1 Cbk Soft 1 Envision 2025-10-29 7.5 High
Observable Discrepancy, Exposure of Sensitive Information to an Unauthorized Actor, Exposure of Private Personal Information to an Unauthorized Actor vulnerability in CBK Soft Software Hardware Electronic Computer Systems Industry and Trade Inc. EnVision allows Account Footprinting.This issue affects enVision: before 250566.
CVE-2025-35981 1 Gallagher 1 Command Centre 2025-10-27 5.5 Medium
Exposure of Private Personal Information to an Unauthorized Actor (CWE-359) in the Command Centre Server allows a privileged Operator to view limited personal data about a Cardholder they would not normally have permissions to view. This issue affects Command Centre Server: 9.30.1874 (MR1), 9.20.2337 (MR3), 9.10.3194 (MR6).
CVE-2025-53950 3 Apple, Fortinet, Microsoft 4 Macos, Fortidlp, Fortidlp Agent and 1 more 2025-10-16 5.1 Medium
An Exposure of Private Personal Information ('Privacy Violation') vulnerability [CWE-359] in Fortinet FortiDLP Agent's Outlookproxy plugin for MacOS and Windows 11.5.1 and 11.4.2 through 11.4.6 and 11.3.2 through 11.3.4 and 11.2.0 through 11.2.3 and 11.1.1. through 11.1.2 and 11.0.1 and 10.5.1 and 10.4.0, and 10.3.1 may allow an authenticated administrator to collect current user's email information.
CVE-2024-38103 1 Microsoft 1 Edge 2025-10-14 5.9 Medium
Microsoft Edge (Chromium-based) Information Disclosure Vulnerability
CVE-2025-62362 2025-10-14 N/A
gpp-burgerportaal is a Dutch government citizen portal application. In versions before 2.0.3, 3.0.2, and 4.0.1, the name and email address of employees who publish content are exposed in network responses and can be discovered by viewing the browser's developer tools network tab. This information disclosure may violate employee privacy expectations and could be used for targeted attacks or unwanted contact. This issue has been patched in versions 2.0.3, 3.0.2, and 4.0.1. No known workarounds exist.
CVE-2025-5009 2 Apple, Google 2 Ios, Gemini 2025-10-09 N/A
In Gemini iOS, when a user shared a snippet of a conversation, it would share the entire conversation via a sharable public link that contained the entire conversation history and not just the snippet.
CVE-2023-36018 1 Microsoft 1 Jupyter 2025-10-09 7.8 High
Visual Studio Code Jupyter Extension Spoofing Vulnerability
CVE-2023-36052 1 Microsoft 1 Azure Command-line Interface 2025-10-08 8.6 High
Azure CLI REST Command Information Disclosure Vulnerability
CVE-2025-59843 2 Flagforge, Flagforgectf 2 Flagforge, Flagforge 2025-10-08 5.3 Medium
Flag Forge is a Capture The Flag (CTF) platform. From versions 2.0.0 to before 2.3.1, the public endpoint /api/user/[username] returns user email addresses in its JSON response. The problem has been patched in FlagForge version 2.3.1. The fix removes email addresses from public API responses while keeping the endpoint publicly accessible. Users should upgrade to version 2.3.1 or later to eliminate exposure. There are no workarounds for this vulnerability.
CVE-2025-1939 1 Mozilla 1 Firefox 2025-09-29 3.9 Low
Android apps can load web pages using the Custom Tabs feature. This feature supports a transition animation that could have been used to trick a user into granting sensitive permissions by hiding what the user was actually clicking. This vulnerability affects Firefox < 136.
CVE-2025-53374 1 Dokploy 1 Dokploy 2025-09-29 4.3 Medium
Dokploy is a self-hostable Platform as a Service (PaaS) that simplifies the deployment and management of applications and databases. An authenticated low-privileged account can retrieve detailed profile information about another users in the same organization by directly invoking user.one. The response discloses personally-identifiable information (PII) such as e-mail address, role, two-factor status, organization ID, and various account flags. The fix will be available in the v0.23.7.
CVE-2024-49765 1 Discourse 1 Discourse 2025-09-26 5.3 Medium
Discourse is an open source platform for community discussion. Sites that are using discourse connect but still have local logins enabled could allow attackers to bypass discourse connect to create accounts and login. This problem is patched in the latest version of Discourse. Users unable to upgrade who are using discourse connect may disable all other login methods as a workaround.