Information Disclosure

Information Disclosure vulnerabilities expose sensitive data to unauthorized parties. This can include credentials, configuration details, personal information, or system internals.

Total CVEs

65

Typical Severity

MEDIUM

Category

Data Exposure

Understanding Information Disclosure

Detailed information about this vulnerability type.

How to Identify

  • Review security advisories
  • Perform regular security testing

Prevention Best Practices

  • Follow security best practices
  • Keep systems updated

Information Disclosure CVEs (65)

DescriptionVendor / ProductExploit Status
CVE-2026-216598.7

This vulnerability allows an attacker to remotely run any code on the affected Frick Controls Quantum HD devices without needing to log in, which can completely take over the system. It affects versions 10.22 and earlier, meaning any device running these versions is at risk if exposed to the internet.

johnsoncontrolsfrick controls quantum hd firmware
Exploit Available
about 1 month agoFeb 27, 2026
CVE-2025-155675.1

This vulnerability allows an attacker to access some sensitive information from the Health Module that should be protected. To exploit this, the attacker needs to find a way to bypass the existing security measures, which may be easier if they have some level of access to the system.

Unknown
Exploit Available
about 1 month agoFeb 27, 2026
CVE-2026-262075.4

This vulnerability allows any authenticated user to manipulate policies on posts they shouldn't be able to access, including private posts, and to discover which posts have policies based on error messages. It affects users of the discourse platform who have the `discourse-policy` plugin enabled and can be fixed by upgrading to the latest versions or disabling the plugin altogether.

discoursediscourse
Exploit Available
about 1 month agoFeb 26, 2026
CVE-2026-27837.5

This vulnerability allows an attacker to access sensitive information from a user's system through a flaw in Firefox's JavaScript engine. It affects versions of Firefox and Thunderbird before 148 and 140.8, meaning users need to update their software to protect against potential data leaks.

mozillafirefox
Exploit Available
about 1 month agoFeb 24, 2026
CVE-2026-29765.3

This vulnerability allows an attacker to remotely access sensitive information from the FastApiAdmin application by manipulating a specific file path in the download function. It affects versions up to 2.2.0, and the method to exploit this weakness is publicly available, making it easier for attackers to carry out their attacks.

fastapiadminfastapi-admin
Exploit Available
about 1 month agoFeb 23, 2026
CVE-2026-29755.5

This vulnerability allows an attacker to access sensitive information from the FastApiAdmin application remotely. It affects versions up to 2.2.0 and can be exploited through a specific function in the code that handles custom documentation, making it important for users to update to a secure version.

fastapiadminfastapi-admin
Exploit Available
about 1 month agoFeb 23, 2026
CVE-2026-28945.5

This vulnerability allows an attacker to remotely access sensitive information from the funadmin application, specifically through a function related to password recovery. The issue affects versions up to 7.1.0-rc4, and there is already a publicly available exploit that could be used to take advantage of this flaw.

funadminfunadmin
Exploit Available
about 2 months agoFeb 21, 2026
CVE-2025-526033.5

This vulnerability allows an attacker to access limited internal information from HCL Connections if they navigate the system in a specific way. However, the attacker must have access to the application and follow a particular sequence of actions to exploit this issue.

hcltechconnections
Theoretical
about 2 months agoFeb 20, 2026
CVE-2025-332537.3

An attacker can execute their own code on a user's system by tricking them into opening a specially crafted file in the NVIDIA NeMo Framework. This requires the user to be convinced to load the malicious file, which could lead to serious issues like crashing the system, leaking sensitive information, or altering data.

nvidianemo
Theoretical
about 2 months agoFeb 18, 2026
CVE-2025-332527.8

This vulnerability allows an attacker to run their own code on systems using the NVIDIA NeMo Framework, which could lead to serious issues like crashing the system, stealing information, or altering data. To exploit this, the attacker needs to have access to the affected system, making it crucial for users to secure their environments.

nvidianemo
Theoretical
about 2 months agoFeb 18, 2026
CVE-2025-332517.8

This vulnerability allows an attacker to run their own code on systems using the NVIDIA NeMo Framework, which could lead to serious issues like crashing the system, stealing information, or altering data. To exploit this flaw, the attacker needs access to the affected system, making it crucial for users to secure their environments.

nvidianemo
Exploit Available
about 2 months agoFeb 18, 2026
CVE-2025-332507.8

This vulnerability allows an attacker to run their own code on systems using the NVIDIA NeMo Framework, which could lead to serious issues like crashing the system, stealing information, or altering data. To exploit this flaw, the attacker would need access to the affected system, making it crucial for administrators to secure their environments.

nvidianemo
Exploit Available
about 2 months agoFeb 18, 2026
CVE-2025-332497.8

This vulnerability allows an attacker to run harmful code on systems using the NVIDIA NeMo Framework by sending specially crafted input through a voice-preprocessing script. If successful, this could lead to unauthorized access, data leaks, or even altering important information, but it requires the attacker to have the ability to submit malicious input to the system.

nvidianemo
Exploit Available
about 2 months agoFeb 18, 2026
CVE-2025-332467.8

This vulnerability allows an attacker to execute malicious commands on a system using the NVIDIA NeMo Framework by providing specially crafted input to a configuration setting. To exploit this, the attacker needs access to the ASR Evaluator utility, which could lead to unauthorized actions like altering data or gaining higher privileges.

nvidianemo
Exploit Available
about 2 months agoFeb 18, 2026
CVE-2025-332458.8

This vulnerability allows an attacker to run their own code on a system using the NVIDIA NeMo Framework, which could lead to unauthorized access, data theft, or manipulation. To exploit this flaw, the attacker needs to send specially crafted data to the affected system.

nvidianemo
Theoretical
about 2 months agoFeb 18, 2026
CVE-2025-332437.8

This vulnerability allows an attacker to run malicious code on systems using the NVIDIA NeMo Framework, potentially leading to unauthorized access, data theft, or manipulation. It requires the attacker to have access to a distributed environment where the framework is deployed, making it particularly dangerous in collaborative or cloud-based setups.

nvidianemo
Exploit Available
about 2 months agoFeb 18, 2026
CVE-2025-332417.8

This vulnerability allows an attacker to run their own code on a system using the NVIDIA NeMo Framework by tricking it into loading a specially crafted file. For this to work, the attacker needs to get that malicious file onto the target system, which could lead to unauthorized access, data theft, or changes to the system.

nvidianemo
Theoretical
about 2 months agoFeb 18, 2026
CVE-2025-332407.8

An attacker can exploit a vulnerability in NVIDIA Megatron Bridge to run their own code on the system, potentially gaining higher access rights, stealing sensitive information, or altering data. This requires the attacker to provide malicious input to a specific data shuffling tutorial within the software.

Unknown
Exploit Available
about 2 months agoFeb 18, 2026
CVE-2025-332397.8

This vulnerability allows an attacker to run their own code on a system using NVIDIA Megatron Bridge, potentially leading to unauthorized access, data leaks, or tampering with information. The attacker needs to provide malicious input in a specific data merging tutorial for the exploit to work.

Unknown
Theoretical
about 2 months agoFeb 18, 2026
CVE-2025-332367.8

This vulnerability allows an attacker to inject malicious code into the NVIDIA NeMo Framework, which could lead to running unauthorized commands, gaining higher access privileges, stealing sensitive information, or altering data. To exploit this, the attacker needs to provide specially crafted data to the system.

nvidianemo
Theoretical
about 2 months agoFeb 18, 2026
Showing 21 to 40 of 65 results