A remote unauthorized attacker may gather sensitive...
High severity
Unreviewed
Published
Jun 12, 2025
to the GitHub Advisory Database
•
Updated Jun 12, 2025
Description
Published by the National Vulnerability Database
Jun 12, 2025
Published to the GitHub Advisory Database
Jun 12, 2025
Last updated
Jun 12, 2025
A remote unauthorized attacker may gather sensitive information of the application, due to missing authorization of configuration settings of the product.
References