16457 results (0.409 seconds)

CVSS: -EPSS: %CPEs: -EXPL: 0

19 Feb 2026 — Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in Metagauss EventPrime eventprime-event-calendar-management allows Retrieve Embedded Sensitive Data.This issue affects EventPrime: from n/a through <= 4.2.8.3. • https://patchstack.com/database/Wordpress/Plugin/eventprime-event-calendar-management/vulnerability/wordpress-eventprime-plugin-4-2-8-3-sensitive-data-exposure-vulnerability? • CWE-497: Exposure of Sensitive System Information to an Unauthorized Control Sphere •

CVSS: -EPSS: %CPEs: -EXPL: 0

19 Feb 2026 — Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in rtCamp rtMedia for WordPress, BuddyPress and bbPress buddypress-media allows Retrieve Embedded Sensitive Data.This issue affects rtMedia for WordPress, BuddyPress and bbPress: from n/a through <= 4.7.8. • https://patchstack.com/database/Wordpress/Plugin/buddypress-media/vulnerability/wordpress-rtmedia-for-wordpress-buddypress-and-bbpress-plugin-4-7-8-sensitive-data-exposure-vulnerability? • CWE-497: Exposure of Sensitive System Information to an Unauthorized Control Sphere •

CVSS: -EPSS: %CPEs: -EXPL: 0

19 Feb 2026 — Insertion of Sensitive Information Into Sent Data vulnerability in Shahjahan Jewel Ninja Tables ninja-tables allows Retrieve Embedded Sensitive Data.This issue affects Ninja Tables: from n/a through <= 5.2.5. • https://patchstack.com/database/Wordpress/Plugin/ninja-tables/vulnerability/wordpress-ninja-tables-plugin-5-2-5-sensitive-data-exposure-vulnerability? • CWE-201: Insertion of Sensitive Information Into Sent Data •

CVSS: 6.5EPSS: %CPEs: 2EXPL: 0

19 Feb 2026 — A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Information disclosure. • https://www.dell.com/support/kbdoc/en-us/000429268/dsa-2026-102-dell-unisphere-for-powermax-and-powermax-eem-security-update-for-multiple-vulnerabilities • CWE-73: External Control of File Name or Path •

CVSS: 8.8EPSS: %CPEs: 1EXPL: 1

18 Feb 2026 — Attackers can exploit this vulnerability by crafting specially formed POST requests to the /vorlagen/ endpoint, enabling unauthorized database manipulation and potential information disclosure. • https://www.exploit-db.com/exploits/47589 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 9.3EPSS: %CPEs: 1EXPL: 0

18 Feb 2026 — This leads to the disclosure of sensitive information, including configuration files with database credentials. ... This leads to the disclosure of sensitive information, including configuration files with database credentials. • https://github.com/InvoicePlane/InvoicePlane/commit/add8bb798dde621f886823065ef1841986543c69 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 6.8EPSS: %CPEs: 4EXPL: 0

18 Feb 2026 — In Splunk Enterprise versions below 10.2.0, 10.0.2, 9.4.7, 9.3.9, and 9.2.11, a user of a Splunk Search Head Cluster (SHC) deployment who holds a role with access to the Splunk `_internal` index could view the RSA `accessKey` value from the [<u>Authentication.conf</u> ](https://help.splunk.com/en/splunk-enterprise/administer/admin-manual/10.2/configuration-file-reference/10.2.0-configuration-file-reference/authentication.conf)file, in plain text. • https://advisory.splunk.com/advisories/SVD-2026-0207 • CWE-532: Insertion of Sensitive Information into Log File •

CVSS: 6.8EPSS: %CPEs: 4EXPL: 0

18 Feb 2026 — In Splunk Enterprise versions below 10.2.0, 10.0.2, 9.4.7, 9.3.9, and 9.2.11, a user of a Splunk Search Head Cluster (SHC) deployment who holds a role with access to the Splunk `_internal` index could view the `integrationKey`, `secretKey`, and `appSecretKey` secrets, generated by [Duo Two-Factor Authentication for Splunk Enterprise](https://duo.com/docs/splunk), in plain text. • https://advisory.splunk.com/advisories/SVD-2026-0203 • CWE-532: Insertion of Sensitive Information into Log File •

CVSS: 6.8EPSS: %CPEs: 7EXPL: 0

18 Feb 2026 — In Splunk Enterprise versions below 10.2.0, 10.0.2, 9.4.7, 9.3.8, and 9.2.11, and Splunk Cloud Platform versions below 10.2.2510.0, 10.1.2507.11, 10.0.2503.9, and 9.3.2411.120, a user of a Splunk Search Head Cluster (SHC) deployment who holds a role with access to the the Splunk _internal index could view the Security Assertion Markup Language (SAML) configurations for Attribute query requests (AQRs) or Authentication extensions in plain text within the conf.log file, depending on which feature is configure... • https://advisory.splunk.com/advisories/SVD-2026-0209 • CWE-532: Insertion of Sensitive Information into Log File •

CVSS: 4.3EPSS: %CPEs: 3EXPL: 0

18 Feb 2026 — This could lead to a sensitive information disclosure. • https://advisory.splunk.com/advisories/SVD-2026-0206 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •