The vulnerability lies in the Glances REST API, where the /api/4/args and /api/4/args/{item} endpoints exposed sensitive configuration data. These endpoints are implemented by the _api_args and _api_args_item methods within the GlancesRestfulApi class. The core issue was that these methods directly used vars(self.args) to serialize and return the application's command-line arguments without any sanitization. When Glances is run in its default mode without a password, these endpoints are unauthenticated. This allows any user on the network to retrieve sensitive information, including SNMP community strings, authentication keys, and password hashes for offline cracking. The patch, commit ff14eb9780ee10ec018c754754b1c8c7bfb6c44f, addresses this by introducing a _sanitize_args helper method that redacts known sensitive keys from the arguments before they are returned. The vulnerable functions, _api_args and _api_args_item, were modified to use this new sanitization function, thus mitigating the information disclosure.