Information Disclosure

12829 CVEs technique

Monthly

CVE-2025-48509 Monitor

Missing Checks in certain functions related to RMP initialization can allow a local admin privileged attacker to cause misidentification of I/O memory, potentially resulting in a loss of guest memory integrity

Information Disclosure
NVD
EPSS
0.0%
CVE-2025-29952 Monitor

Improper Initialization within the AMD Secure Encrypted Virtualization (SEV) firmware can allow an admin privileged attacker to corrupt RMP covered memory, potentially resulting in loss of guest memory integrity

Information Disclosure
NVD
EPSS
0.0%
CVE-2025-29946 Monitor

Insufficient or Incomplete Data Removal in Hardware Component in SEV firmware doesn't fully flush IOMMU. This can potentially lead to a loss of confidentiality and integrity in guest memory.

Information Disclosure
NVD
EPSS
0.0%
CVE-2025-0029 Monitor

Improper handling of error condition during host-induced faults can allow a local high-privileged attack to selectively drop guest DMA writes, potentially resulting in a loss of SEV-SNP guest memory integrity

Information Disclosure
NVD
EPSS
0.0%
CVE-2025-0012 Monitor

Improper handling of overlap between the segmented reverse map table (RMP) and system management mode (SMM) memory could allow a privileged attacker corrupt or partially infer SMM memory resulting in loss of integrity or confidentiality.

Information Disclosure
NVD
EPSS
0.0%
CVE-2024-21953 Monitor

Improper input validation in IOMMU could allow a malicious hypervisor to reconfigure IOMMU registers resulting in loss of guest data integrity.

Information Disclosure
NVD
EPSS
0.0%
CVE-2021-26410 Monitor

Improper syscall input validation in ASP (AMD Secure Processor) may force the kernel into reading syscall parameter values from its own memory space allowing an attacker to infer the contents of the kernel memory leading to potential information disclosure.

Linux Information Disclosure
NVD
EPSS
0.0%
CVE-2026-21355 MEDIUM This Month

Out-of-bounds memory read in DNG SDK 1.7.1 (2410) and earlier enables attackers to extract sensitive information from process memory when a user opens a specially crafted file. The vulnerability requires local user interaction but poses a direct confidentiality risk to applications processing untrusted DNG image files. No patch is currently available for affected versions.

Buffer Overflow Information Disclosure Dng Software Development Kit
NVD
CVSS 3.1
5.5
EPSS
0.0%
CVE-2026-21345 HIGH This Week

Code execution in Substance 3D Stager 3.1.6 and earlier through a crafted file that triggers an out-of-bounds memory read during parsing. An attacker can exploit this vulnerability by tricking a user into opening a malicious file, achieving arbitrary code execution with the victim's privileges. No patch is currently available for this vulnerability.

Buffer Overflow Information Disclosure Substance 3d Stager
NVD
CVSS 3.1
7.8
EPSS
0.0%
CVE-2026-21344 HIGH This Week

Substance 3D Stager 3.1.6 and earlier contains an out-of-bounds read vulnerability in file parsing that allows arbitrary code execution when a victim opens a malicious crafted file. The vulnerability affects local users and requires user interaction to exploit, making social engineering a viable attack vector. No patch is currently available for this high-severity flaw.

Buffer Overflow Information Disclosure Substance 3d Stager
NVD
CVSS 3.1
7.8
EPSS
0.0%
CVE-2026-21343 HIGH This Week

Code execution in Substance 3D Stager 3.1.6 and earlier results from an out-of-bounds read vulnerability in malformed file parsing that allows attackers to corrupt memory and execute arbitrary code within the user's context. The vulnerability requires user interaction, as victims must open a specially crafted file to trigger exploitation. No patch is currently available for this high-severity flaw.

Buffer Overflow Information Disclosure Substance 3d Stager
NVD
CVSS 3.1
7.8
EPSS
0.0%
CVE-2026-25805 MEDIUM POC This Month

Zed Editor versions prior to 0.219.4 fail to display tool invocation parameters during permission prompts or after execution, allowing attackers with high privileges to execute tools with malicious or unintended parameters without user awareness. Public exploit code exists for this vulnerability. The issue is resolved in version 0.219.4, which adds expandable tool call details for transparency.

Information Disclosure Zed
NVD GitHub
CVSS 3.1
6.4
EPSS
0.1%
CVE-2026-21340 MEDIUM This Month

Out-of-bounds memory read in Substance 3D Designer 15.1.0 and earlier allows attackers to extract sensitive data from process memory when a victim opens a specially crafted file. The vulnerability requires user interaction but can bypass existing protections to leak confidential information. No patch is currently available for this local attack vector.

Buffer Overflow Information Disclosure Substance 3d Designer
NVD
CVSS 3.1
5.5
EPSS
0.0%
CVE-2026-21339 MEDIUM This Month

Out-of-bounds memory reads in Substance 3D Designer 15.1.0 and earlier allow attackers to extract sensitive data from process memory when a victim opens a specially crafted file. This local vulnerability requires user interaction and affects systems running the vulnerable Designer versions. No patch is currently available for this issue.

Buffer Overflow Information Disclosure Substance 3d Designer
NVD
CVSS 3.1
5.5
EPSS
0.0%
CVE-2026-21337 MEDIUM This Month

Memory disclosure in Substance 3D Designer 15.1.0 and earlier stems from an out-of-bounds read flaw that exposes sensitive data from application memory. An attacker can exploit this vulnerability by crafting a malicious file and tricking a user into opening it, requiring no special privileges. Currently, no patch is available for affected users.

Buffer Overflow Information Disclosure Substance 3d Designer
NVD
CVSS 3.1
5.5
EPSS
0.0%
CVE-2026-21325 HIGH This Week

Arbitrary code execution in Adobe After Effects 25.6 and earlier results from an out-of-bounds read vulnerability triggered when parsing specially crafted files. An attacker can exploit this by tricking users into opening a malicious file, gaining execution privileges within the victim's user context. No patch is currently available for this vulnerability.

Buffer Overflow Information Disclosure After Effects
NVD
CVSS 3.1
7.8
EPSS
0.0%
CVE-2026-21324 HIGH This Week

Code execution in Adobe After Effects 25.6 and earlier through out-of-bounds memory reads when processing malicious files. An attacker can exploit this vulnerability to execute arbitrary code with user privileges by tricking victims into opening a crafted file. No patch is currently available for this vulnerability.

Buffer Overflow Information Disclosure After Effects
NVD
CVSS 3.1
7.8
EPSS
0.0%
CVE-2026-21322 HIGH This Week

Out-of-bounds memory reads in Adobe After Effects 25.6 and earlier enable arbitrary code execution when users open specially crafted files. An attacker can exploit this parsing vulnerability by delivering a malicious file that triggers a read past allocated buffer boundaries, executing code with the privileges of the affected user. No patch is currently available for this high-severity vulnerability that requires user interaction to exploit.

Buffer Overflow Information Disclosure After Effects
NVD
CVSS 3.1
7.8
EPSS
0.0%
CVE-2026-21319 MEDIUM This Month

Out-of-bounds memory read in Adobe After Effects 25.6 and earlier allows attackers to disclose sensitive information from process memory by tricking users into opening specially crafted files. This local vulnerability requires user interaction but carries no patch availability, leaving affected systems exposed until an update is released.

Buffer Overflow Information Disclosure After Effects
NVD
CVSS 3.1
5.5
EPSS
0.0%
CVE-2026-21317 MEDIUM This Month

Adobe Audition versions 25.3 and earlier contain an out-of-bounds read vulnerability that exposes sensitive data from application memory when a user opens a crafted file. This local attack requires user interaction but carries no patch availability, leaving affected users vulnerable to information disclosure. The vulnerability affects confidentiality with medium severity (CVSS 5.5) and currently has no evidence of active exploitation.

Buffer Overflow Information Disclosure Audition
NVD
CVSS 3.1
5.5
EPSS
0.0%
CVE-2026-21315 MEDIUM This Month

Memory disclosure in Adobe Audition 25.3 and earlier through an out-of-bounds read vulnerability allows attackers to access sensitive information from process memory when a user opens a specially crafted file. Exploitation requires user interaction and does not enable code execution or system availability impact. No patch is currently available for this vulnerability.

Buffer Overflow Information Disclosure Audition
NVD
CVSS 3.1
5.5
EPSS
0.0%
CVE-2026-21314 MEDIUM This Month

Memory disclosure in Adobe Audition 25.3 and earlier stems from an out-of-bounds read flaw that could expose sensitive data from process memory. An attacker must trick a user into opening a specially crafted file to trigger the vulnerability, which requires no elevated privileges but offers no path to code execution or system availability impact.

Buffer Overflow Information Disclosure Audition
NVD
CVSS 3.1
5.5
EPSS
0.0%
CVE-2026-21313 MEDIUM This Month

Out-of-bounds memory read in Adobe Audition 25.3 and earlier enables attackers to extract sensitive data from process memory when a user opens a specially crafted file. No patch is currently available for this vulnerability, which requires user interaction to trigger but poses a confirmed risk to confidentiality. Local attackers can exploit this to disclose information without requiring elevated privileges or additional user actions beyond opening the malicious file.

Buffer Overflow Information Disclosure Audition
NVD
CVSS 3.1
5.5
EPSS
0.0%
CVE-2025-6010 Awaiting Data

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. No vendor patch available.

Information Disclosure
NVD
CVE-2025-32467 MEDIUM This Month

Use of uninitialized variable for some TDX Module before version tdx1.5 within Ring 0: Hypervisor may allow an information disclosure. Authorized adversary with a privileged user combined with a high complexity attack may enable data exposure. [CVSS 4.1 MEDIUM]

Information Disclosure
NVD
CVSS 3.1
4.1
EPSS
0.0%
CVE-2025-32007 MEDIUM This Month

Out-of-bounds read for some TDX before version tdx module 1.5.24 within Ring 0: Hypervisor may allow an information disclosure. Authorized adversary with a privileged user combined with a low complexity attack may enable data exposure. [CVSS 4.4 MEDIUM]

Information Disclosure
NVD
CVSS 3.1
4.4
EPSS
0.0%
CVE-2025-32003 MEDIUM This Month

Out-of-bounds read in the firmware for some 100GbE Intel(R) Ethernet Network Adapter E810 before version cvl fw 1.7.6, cpk 1.3.7 within Ring 0: Bare Metal OS may allow a denial of service. [CVSS 6.5 MEDIUM]

Denial Of Service Intel Information Disclosure Buffer Overflow Ethernet Controller
NVD VulDB
CVSS 3.1
6.5
EPSS
0.0%
CVE-2025-27940 MEDIUM This Month

Out-of-bounds read for some TDX Module before version tdx1.5 within Ring 0: Hypervisor may allow an information disclosure. Software side channel adversary with a privileged user combined with a high complexity attack may enable data exposure. [CVSS 4.1 MEDIUM]

Information Disclosure
NVD
CVSS 3.1
4.1
EPSS
0.0%
CVE-2025-27708 MEDIUM This Month

Out-of-bounds read in the firmware for some Intel(R) Converged Security and Management Engine (CSME) Firmware (FW) within Ring 0: Kernel may allow an information disclosure. System software adversary with a privileged user combined with a low complexity attack may enable data exposure. [CVSS 4.1 MEDIUM]

Linux Information Disclosure
NVD
CVSS 3.1
4.1
EPSS
0.0%
CVE-2025-27572 MEDIUM This Month

Exposure of sensitive information during transient execution for some TDX within Ring 0: Hypervisor may allow an information disclosure. Authorized adversary with a privileged user combined with a high complexity attack may enable data exposure. [CVSS 4.1 MEDIUM]

Information Disclosure
NVD
CVSS 3.1
4.1
EPSS
0.0%
CVE-2025-25058 LOW Monitor

Ethernet 800-Serie versions up to 2.2.2.0 contains a vulnerability that allows attackers to an information disclosure (CVSS 3.3).

Linux Esxi Information Disclosure
NVD
CVSS 3.1
3.3
EPSS
0.0%
CVE-2026-1774 npm CRITICAL PATCH Act Now

Prototype pollution in CASL Ability authorization library versions 2.4.0 through 6.7.4. Can lead to authorization bypass in applications using CASL for access control.

Information Disclosure
NVD GitHub
CVSS 3.1
9.8
EPSS
0.0%
CVE-2025-11537 Maven MEDIUM PATCH This Month

A flaw was found in Keycloak. When the logging format is configured to a verbose, user-supplied pattern (such as the pre-defined 'long' pattern), sensitive headers including Authorization and Cookie are disclosed to the logs in cleartext. [CVSS 5.0 MEDIUM]

Information Disclosure Redhat
NVD
CVSS 3.1
5.0
EPSS
0.0%
CVE-2026-2268 HIGH This Week

Unauthenticated attackers can extract arbitrary post metadata from WordPress sites running Ninja Forms plugin versions up to 3.14.0 through improper merge tag filtering in repeater fields, potentially exposing sensitive data like API keys, billing information, and customer details. The vulnerability is exploitable remotely without authentication via the nf_ajax_submit AJAX action and currently lacks a patch.

WordPress Information Disclosure
NVD
CVSS 3.1
7.5
EPSS
0.1%
CVE-2026-23720 HIGH This Week

Code execution in Simcenter Femap and Nastran versions prior to V2512 results from an out-of-bounds read flaw triggered when parsing malicious NDB files. A local attacker with user interaction can exploit this vulnerability to execute arbitrary code with the privileges of the affected application. No patch is currently available for this vulnerability.

Buffer Overflow Information Disclosure Simcenter Nastran Simcenter Femap
NVD
CVSS 3.1
7.8
EPSS
0.0%
CVE-2026-23718 HIGH This Week

Out-of-bounds read in Simcenter Femap and Nastran versions prior to V2512 during NDB file parsing enables local code execution under the current process context. An attacker can exploit this vulnerability through specially crafted NDB files to achieve arbitrary code execution. No patch is currently available for this high-severity vulnerability affecting both products.

Buffer Overflow Information Disclosure Simcenter Femap Simcenter Nastran
NVD
CVSS 3.1
7.8
EPSS
0.0%
CVE-2026-23717 HIGH This Week

Simcenter Femap and Nastran versions prior to 2512 are vulnerable to out-of-bounds memory reads when processing maliciously crafted XDB files, enabling arbitrary code execution with the privileges of the affected application. Local attackers can exploit this vulnerability through specially designed files to achieve full system compromise. No patch is currently available for this high-severity flaw.

Buffer Overflow Information Disclosure Simcenter Nastran Simcenter Femap
NVD
CVSS 3.1
7.8
EPSS
0.0%
CVE-2026-23716 HIGH This Week

Arbitrary code execution in Simcenter Femap and Nastran versions prior to 2512 results from an out-of-bounds read when processing malicious XDB files, enabling local attackers to achieve process-level code execution. An attacker with local access can craft a specially designed XDB file to trigger the memory vulnerability and execute arbitrary code with the privileges of the affected application. No patch is currently available for this vulnerability.

Buffer Overflow Information Disclosure Simcenter Femap Simcenter Nastran
NVD
CVSS 3.1
7.8
EPSS
0.0%
CVE-2026-25957 npm MEDIUM PATCH This Month

Cube.js versions 1.1.17 through 1.5.12 and 1.4.x before 1.4.2 are vulnerable to denial of service attacks where an authenticated attacker can craft a malicious request to completely disable the Cube API. This network-accessible vulnerability requires valid credentials but no user interaction, making it exploitable by any authenticated user with API access. No patch is currently available for affected versions.

Information Disclosure Cube.Js
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2026-25934 Go MEDIUM PATCH This Month

Corrupted Git pack and index files are not properly validated in go-git versions before 5.16.5, allowing an attacker to supply malicious packfiles that bypass integrity checks and cause go-git to consume corrupted data. This can result in unexpected application errors and denial of service conditions for any system using the vulnerable go-git library to fetch or process Git repositories. The vulnerability requires user interaction to fetch from a malicious or compromised Git source.

Information Disclosure Go Git Redhat Suse
NVD GitHub
CVSS 3.1
4.3
EPSS
0.0%
CVE-2026-25918 npm MEDIUM PATCH This Month

Unity-Cli versions up to 1.8.2 is affected by insertion of sensitive information into log file (CVSS 5.5).

Information Disclosure Unity Cli
NVD GitHub
CVSS 3.1
5.5
EPSS
0.0%
CVE-2026-25814 CRITICAL Act Now

PlaciPy has an injection vulnerability allowing user input to be processed as commands — sixth critical flaw.

Information Disclosure Placipy
NVD GitHub
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-25813 HIGH This Week

Placipy versions up to 1.0.0 is affected by insertion of sensitive information into log file (CVSS 7.5).

Information Disclosure Placipy
NVD GitHub
CVSS 3.1
7.5
EPSS
0.0%
CVE-2026-25480 PyPI MEDIUM POC PATCH This Month

Cache poisoning in Litestar before 2.20.0 allows unauthenticated remote attackers to exploit improper Unicode normalization in the FileStore cache backend to create collisions between cache keys, enabling one URL to serve another URL's cached responses. Public exploit code exists for this vulnerability. An attacker can leverage this to serve malicious cached content to users accessing legitimate endpoints.

Information Disclosure Litestar
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2026-25478 PyPI HIGH POC PATCH This Week

Litestar ASGI framework versions before 2.20.0 fail to properly escape regex metacharacters in CORS origin validation, allowing attackers to bypass origin restrictions through crafted malicious origins. This configuration flaw affects cross-origin request filtering and enables unauthorized cross-origin access. Public exploit code exists for this vulnerability.

Information Disclosure Litestar
NVD GitHub
CVSS 3.1
7.4
EPSS
0.0%
CVE-2026-25231 HIGH POC This Week

Unauthenticated directory traversal in FileRise prior to version 3.3.0 allows remote attackers to read arbitrary files from the /uploads directory without authentication by directly accessing guessable file paths. Public exploit code exists for this vulnerability, enabling attackers to expose sensitive data and breach user privacy. No patch is currently available.

Authentication Bypass Information Disclosure Filerise
NVD GitHub
CVSS 3.1
7.5
EPSS
0.1%
CVE-2025-7432 Monitor

DPA countermeasures in Silicon Labs' Series 2 devices are not reseeded under certain conditions. This may allow an attacker to eventually extract secret keys through a DPA attack.

Information Disclosure
NVD
EPSS
0.0%
CVE-2026-24027 MEDIUM This Month

Crafted zones can lead to increased incoming network traffic. [CVSS 5.3 MEDIUM]

Information Disclosure Suse
NVD
CVSS 3.1
5.3
EPSS
0.0%
CVE-2025-59024 MEDIUM This Month

Crafted delegations or IP fragments can poison cached delegations in Recursor. [CVSS 6.5 MEDIUM]

Information Disclosure Suse
NVD
CVSS 3.1
6.5
EPSS
0.0%
CVE-2025-59023 HIGH This Week

Crafted delegations or IP fragments can poison cached delegations in Recursor. [CVSS 8.2 HIGH]

Information Disclosure Suse
NVD
CVSS 3.1
8.2
EPSS
0.0%
CVE-2025-10464 MEDIUM This Month

Birtech Information Technologies Industry and Trade Ltd. Co. Senseway is affected by cleartext storage of sensitive information (CVSS 6.5).

Information Disclosure
NVD
CVSS 3.1
6.5
EPSS
0.0%
CVE-2025-7708 MEDIUM This Month

Insertion of Sensitive Information Into Sent Data vulnerability in Atlas Educational Software Industry Ltd. Co. [CVSS 6.8 MEDIUM]

Information Disclosure
NVD
CVSS 3.1
6.8
EPSS
0.0%
CVE-2026-25846 MEDIUM This Month

Youtrack versions up to 2025.3.119033 is affected by insertion of sensitive information into log file (CVSS 6.5).

Information Disclosure Youtrack
NVD
CVSS 3.1
6.5
EPSS
0.0%
CVE-2026-25916 MEDIUM PATCH This Month

Roundcube Webmail versions before 1.5.13 and 1.6.x before 1.6.13 fail to block SVG feImage elements when the "Block remote images" security feature is enabled, allowing attackers to bypass the protection and load remote content. This remote image bypass could enable tracking, information disclosure, or facilitate phishing attacks against users who rely on this feature to prevent remote content loading. No patch is currently available for this medium-severity vulnerability.

Information Disclosure Suse
NVD GitHub
CVSS 3.1
4.3
EPSS
0.0%
CVE-2026-2215 LOW Monitor

A vulnerability was detected in rachelos WeRSS we-mp-rss up to 1.4.8. This issue affects some unknown processing of the file core/auth.py of the component JWT Handler. Performing a manipulation of the argument SECRET_KEY results in use of default cryptographic key. The attack can be initiated remotely. The attack is considered to have high complexity. The exploitability is assessed as difficult...

Information Disclosure
NVD VulDB
CVSS 3.1
3.7
EPSS
0.0%
CVE-2025-66598 HIGH This Week

A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This product supports old SSL/TLS versions, potentially allowing an attacker to decrypt communications with the web server. [CVSS 7.5 HIGH]

Information Disclosure
NVD
CVSS 3.1
7.5
EPSS
0.0%
CVE-2025-66597 HIGH This Week

A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This product supports weak cryptographic algorithms, potentially allowing an attacker to decrypt communications with the web server. [CVSS 7.5 HIGH]

Information Disclosure
NVD
CVSS 3.1
7.5
EPSS
0.0%
CVE-2025-66594 MEDIUM This Month

A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. Detailed messages are displayed on the error page. [CVSS 5.3 MEDIUM]

Information Disclosure
NVD
CVSS 3.1
5.3
EPSS
0.0%
CVE-2025-66608 HIGH This Week

A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This product does not properly validate URLs. [CVSS 7.5 HIGH]

Information Disclosure
NVD
CVSS 3.1
7.5
EPSS
0.1%
CVE-2025-66607 MEDIUM This Month

A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. The response header contains an insecure setting. [CVSS 5.3 MEDIUM]

Information Disclosure
NVD
CVSS 3.1
5.3
EPSS
0.0%
CVE-2025-66606 CRITICAL Act Now

Yokogawa FAST/TOOLS has a third vulnerability involving improper encoding of output that could enable injection attacks against the SCADA web interface.

Information Disclosure
NVD
CVSS 3.1
9.6
EPSS
0.0%
CVE-2025-66605 MEDIUM This Month

A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. Since there are input fields on this webpage with the autocomplete attribute enabled, the input content could be saved in the browser the user is using. [CVSS 5.3 MEDIUM]

Information Disclosure
NVD
CVSS 3.1
5.3
EPSS
0.0%
CVE-2025-66604 MEDIUM This Month

A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. The library version could be displayed on the web page. [CVSS 5.3 MEDIUM]

Information Disclosure
NVD
CVSS 3.1
5.3
EPSS
0.0%
CVE-2025-66603 CRITICAL Act Now

Yokogawa FAST/TOOLS has a second web server vulnerability involving improper cryptographic handling that weakens the security of SCADA communications.

Information Disclosure
NVD
CVSS 3.1
9.8
EPSS
0.1%
CVE-2025-66602 CRITICAL Act Now

Yokogawa FAST/TOOLS SCADA has a vulnerability in its web server component enabling unauthorized access to the industrial control monitoring system.

Information Disclosure
NVD
CVSS 3.1
9.8
EPSS
0.1%
CVE-2025-66601 MEDIUM This Month

A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This product does not specify MIME types. [CVSS 6.1 MEDIUM]

Information Disclosure
NVD
CVSS 3.1
6.1
EPSS
0.0%
CVE-2025-66600 Monitor

A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This product lacks HSTS (HTTP Strict Transport Security) configuration.

Information Disclosure
NVD
EPSS
0.1%
CVE-2025-66599 Monitor

A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. Physical paths could be displayed on web pages.

Information Disclosure
NVD
EPSS
0.1%
CVE-2026-2177 HIGH POC This Week

SourceCodester Prison Management System 1.0 contains a session fixation vulnerability in its login component that allows unauthenticated remote attackers to hijack user sessions. Public exploit code exists for this vulnerability, which enables attackers to impersonate legitimate users and gain unauthorized access to the system. No patch is currently available.

Information Disclosure Prison Management System
NVD GitHub VulDB
CVSS 3.1
7.3
EPSS
0.0%
CVE-2026-2148 MEDIUM POC This Month

Tenda AC21 firmware version 16.03.08.16 contains an information disclosure vulnerability in the /cgi-bin/DownloadFlash web management interface that allows unauthenticated remote attackers to access sensitive data. Public exploit code exists for this vulnerability, and no patch is currently available, leaving affected devices at risk of data exposure.

Information Disclosure Ac21 Firmware
NVD GitHub VulDB
CVSS 3.1
5.3
EPSS
0.0%
CVE-2026-2147 MEDIUM POC This Month

Tenda AC21 firmware version 16.03.08.16 contains an information disclosure vulnerability in the web management interface's /cgi-bin/DownloadLog endpoint that allows unauthenticated remote attackers to access sensitive data. Public exploit code is available for this vulnerability, increasing the risk of active exploitation. No patch is currently available for affected devices.

Information Disclosure Ac21 Firmware
NVD GitHub VulDB
CVSS 3.1
5.3
EPSS
0.0%
CVE-2026-2209 MEDIUM PATCH This Month

Wekan versions up to 8.18 contain an authorization bypass in the custom translation handler that allows authenticated users to manipulate translation settings they should not have access to. An attacker with valid credentials can exploit the setCreateTranslation function to gain unauthorized access to modify translations, potentially affecting application functionality and data integrity. The vulnerability has been patched in version 8.19 and users should upgrade immediately.

Information Disclosure Wekan
NVD GitHub VulDB
CVSS 3.1
6.3
EPSS
0.0%
CVE-2026-2207 MEDIUM PATCH This Month

WeKan versions up to 8.20 contain an information disclosure vulnerability in the Activity Publication Handler that allows unauthenticated remote attackers to access sensitive data through manipulation of the activities.js file. The vulnerability requires no user interaction and can be exploited over the network with low complexity. Users should upgrade to version 8.21 or apply patch 91a936e07d2976d4246dfe834281c3aaa87f9503 to remediate this issue.

Information Disclosure Wekan
NVD GitHub VulDB
CVSS 3.1
5.3
EPSS
0.1%
CVE-2026-2206 MEDIUM PATCH This Month

Improper access controls in WeKan's administrative repair handler (fixDuplicateLists.js) allow authenticated remote attackers to manipulate list data and gain unauthorized access to sensitive information. Affected versions through 8.20 can be remediated by upgrading to version 8.21 or applying the referenced patch.

Information Disclosure Wekan
NVD GitHub VulDB
CVSS 3.1
6.3
EPSS
0.1%
CVE-2026-2205 MEDIUM PATCH This Month

WeKan versions up to 8.20 contain an information disclosure vulnerability in the Meteor Publication Handler's card publication mechanism that allows authenticated remote attackers to access sensitive data. The vulnerability requires valid credentials but no user interaction to exploit, and is resolved in version 8.21.

Information Disclosure Wekan
NVD GitHub VulDB
CVSS 3.1
4.3
EPSS
0.0%
CVE-2026-25858 CRITICAL Act Now

macrozheng mall e-commerce platform v1.0.3 has an authentication vulnerability in password reset enabling unauthorized account takeover.

Information Disclosure
NVD GitHub
CVSS 4.0
9.3
EPSS
0.4%
CVE-2026-25562 MEDIUM PATCH This Month

Wekan versions before 8.19 fail to properly restrict attachment metadata visibility, allowing authenticated users to enumerate attachment information from boards and cards they should not have access to. This information disclosure vulnerability requires valid credentials and can expose sensitive metadata to unauthorized users across the platform. A patch is available.

Information Disclosure Wekan
NVD GitHub
CVSS 3.1
4.3
EPSS
0.0%
CVE-2026-2109 MEDIUM POC This Month

Coco Annotator through version 0.11.1 contains an authorization bypass in the Delete Category Handler endpoint (/api/undo/) that allows authenticated attackers to manipulate category IDs and access or modify unauthorized data. The vulnerability requires valid credentials but can be exploited remotely with public exploit code available. No patch is currently available from the vendor.

Information Disclosure Coco Annotator
NVD GitHub VulDB
CVSS 3.1
5.4
EPSS
0.0%
CVE-2026-25793 Go HIGH PATCH This Week

Nebula is a scalable overlay networking tool. [CVSS 8.1 HIGH]

Information Disclosure Nebula Redhat Suse
NVD GitHub VulDB
CVSS 3.1
8.1
EPSS
0.0%
CVE-2026-25754 npm HIGH PATCH This Week

AdonisJS is a TypeScript-first web framework. versions up to 10.1.3 is affected by improperly controlled modification of object prototype attributes (prototype pollution) (CVSS 7.2).

Prototype Pollution Information Disclosure Bodyparser
NVD GitHub VulDB
CVSS 3.1
7.2
EPSS
0.0%
CVE-2026-25628 Cargo HIGH POC PATCH This Week

Arbitrary file append vulnerability in Qdrant vector database versions 1.9.3 through 1.15.x allows authenticated users with minimal read-only privileges to write to arbitrary files through an unsanitized log file path parameter in the /logger endpoint. Public exploit code exists for this vulnerability, enabling attackers to corrupt system files or inject malicious content with high impact to confidentiality, integrity, and availability. The issue is resolved in version 1.16.0.

Information Disclosure AI / ML Qdrant
NVD GitHub
CVSS 3.1
8.5
EPSS
0.0%
CVE-2026-25597 PHP MEDIUM PATCH This Month

Prestashop versions up to 8.2.4 contains a vulnerability that allows attackers to determine whether a customer account exists in the system by measuring response (CVSS 5.3).

Information Disclosure Prestashop
NVD GitHub
CVSS 3.1
5.3
EPSS
0.1%
CVE-2026-25641 npm CRITICAL POC PATCH Act Now

SandboxJS has a fifth CVSS 10.0 escape via a TOCTOU race condition in sandbox validation, allowing code to slip through during the check-execute gap.

Information Disclosure Sandboxjs
NVD GitHub
CVSS 3.1
10.0
EPSS
0.0%
CVE-2026-25586 npm CRITICAL POC PATCH Act Now

SandboxJS has a third CVSS 10.0 sandbox escape via Map prototype shadowing that allows complete sandbox bypass.

Information Disclosure Sandboxjs
NVD GitHub
CVSS 3.1
10.0
EPSS
0.0%
CVE-2026-25751 npm HIGH PATCH This Week

Unauthenticated attackers can retrieve sensitive InfluxDB credentials from FUXA versions through 1.2.9 due to missing authentication controls, enabling direct database access. An attacker exploiting this vulnerability can read, modify, or delete all historical process data and perform denial of service attacks by corrupting the database. FUXA 1.2.10 addresses this issue, but no patch is currently available for affected versions.

Scada Denial Of Service Information Disclosure Fuxa
NVD GitHub
CVSS 3.1
7.5
EPSS
0.0%
CVE-2026-25650 PyPI HIGH PATCH This Week

Unauthenticated attackers can exploit arbitrary attribute access in MCP Salesforce Connector versions prior to 0.1.10 to extract sensitive Salesforce authentication tokens. This vulnerability requires only network access with no user interaction, enabling complete disclosure of credentials used for Salesforce API integration. Organizations using affected versions should upgrade to 0.1.10 immediately.

Information Disclosure AI / ML Mcp Salesforce Connector
NVD GitHub
CVSS 3.1
7.5
EPSS
0.0%
CVE-2026-25724 npm LOW PATCH Monitor

Claude Code versions prior to 2.1.7 allow unauthorized file access by bypassing deny rules through symbolic link traversal, enabling attackers to read restricted files that administrators explicitly blocked. An attacker with access to the system can exploit this vulnerability to access sensitive files like /etc/passwd by leveraging symlinks that point to denied resources. This vulnerability affects AI/ML tools using Claude Code and currently has no available patch.

Information Disclosure
NVD GitHub VulDB
CVSS 4.0
2.3
EPSS
0.1%
CVE-2025-70963 Go HIGH POC PATCH This Week

Gophish <=0.12.1 is vulnerable to Incorrect Access Control. The administrative dashboard exposes each user’s long-lived API key directly inside the rendered HTML/JavaScript of the page on every login. [CVSS 7.6 HIGH]

Authentication Bypass Information Disclosure Gophish Suse
NVD GitHub
CVSS 3.1
7.6
EPSS
0.0%
CVE-2026-2103 HIGH POC This Week

Syteline Erp versions up to 10.0.8803.16889 is affected by use of hard-coded cryptographic key (CVSS 7.1).

Information Disclosure Syteline Erp
NVD
CVSS 3.1
7.1
EPSS
0.0%
CVE-2019-25304 HIGH POC This Week

SecurosCtrlService contains a vulnerability that allows attackers to potentially execute code with elevated privileges (CVSS 7.8).

Information Disclosure
NVD Exploit-DB
CVSS 3.1
7.8
EPSS
0.0%
EPSS 0%
Monitor

Missing Checks in certain functions related to RMP initialization can allow a local admin privileged attacker to cause misidentification of I/O memory, potentially resulting in a loss of guest memory integrity

Information Disclosure
NVD
EPSS 0%
Monitor

Improper Initialization within the AMD Secure Encrypted Virtualization (SEV) firmware can allow an admin privileged attacker to corrupt RMP covered memory, potentially resulting in loss of guest memory integrity

Information Disclosure
NVD
EPSS 0%
Monitor

Insufficient or Incomplete Data Removal in Hardware Component in SEV firmware doesn't fully flush IOMMU. This can potentially lead to a loss of confidentiality and integrity in guest memory.

Information Disclosure
NVD
EPSS 0%
Monitor

Improper handling of error condition during host-induced faults can allow a local high-privileged attack to selectively drop guest DMA writes, potentially resulting in a loss of SEV-SNP guest memory integrity

Information Disclosure
NVD
EPSS 0%
Monitor

Improper handling of overlap between the segmented reverse map table (RMP) and system management mode (SMM) memory could allow a privileged attacker corrupt or partially infer SMM memory resulting in loss of integrity or confidentiality.

Information Disclosure
NVD
EPSS 0%
Monitor

Improper input validation in IOMMU could allow a malicious hypervisor to reconfigure IOMMU registers resulting in loss of guest data integrity.

Information Disclosure
NVD
EPSS 0%
Monitor

Improper syscall input validation in ASP (AMD Secure Processor) may force the kernel into reading syscall parameter values from its own memory space allowing an attacker to infer the contents of the kernel memory leading to potential information disclosure.

Linux Information Disclosure
NVD
EPSS 0% CVSS 5.5
MEDIUM This Month

Out-of-bounds memory read in DNG SDK 1.7.1 (2410) and earlier enables attackers to extract sensitive information from process memory when a user opens a specially crafted file. The vulnerability requires local user interaction but poses a direct confidentiality risk to applications processing untrusted DNG image files. No patch is currently available for affected versions.

Buffer Overflow Information Disclosure Dng Software Development Kit
NVD
EPSS 0% CVSS 7.8
HIGH This Week

Code execution in Substance 3D Stager 3.1.6 and earlier through a crafted file that triggers an out-of-bounds memory read during parsing. An attacker can exploit this vulnerability by tricking a user into opening a malicious file, achieving arbitrary code execution with the victim's privileges. No patch is currently available for this vulnerability.

Buffer Overflow Information Disclosure Substance 3d Stager
NVD
EPSS 0% CVSS 7.8
HIGH This Week

Substance 3D Stager 3.1.6 and earlier contains an out-of-bounds read vulnerability in file parsing that allows arbitrary code execution when a victim opens a malicious crafted file. The vulnerability affects local users and requires user interaction to exploit, making social engineering a viable attack vector. No patch is currently available for this high-severity flaw.

Buffer Overflow Information Disclosure Substance 3d Stager
NVD
EPSS 0% CVSS 7.8
HIGH This Week

Code execution in Substance 3D Stager 3.1.6 and earlier results from an out-of-bounds read vulnerability in malformed file parsing that allows attackers to corrupt memory and execute arbitrary code within the user's context. The vulnerability requires user interaction, as victims must open a specially crafted file to trigger exploitation. No patch is currently available for this high-severity flaw.

Buffer Overflow Information Disclosure Substance 3d Stager
NVD
EPSS 0% CVSS 6.4
MEDIUM POC This Month

Zed Editor versions prior to 0.219.4 fail to display tool invocation parameters during permission prompts or after execution, allowing attackers with high privileges to execute tools with malicious or unintended parameters without user awareness. Public exploit code exists for this vulnerability. The issue is resolved in version 0.219.4, which adds expandable tool call details for transparency.

Information Disclosure Zed
NVD GitHub
EPSS 0% CVSS 5.5
MEDIUM This Month

Out-of-bounds memory read in Substance 3D Designer 15.1.0 and earlier allows attackers to extract sensitive data from process memory when a victim opens a specially crafted file. The vulnerability requires user interaction but can bypass existing protections to leak confidential information. No patch is currently available for this local attack vector.

Buffer Overflow Information Disclosure Substance 3d Designer
NVD
EPSS 0% CVSS 5.5
MEDIUM This Month

Out-of-bounds memory reads in Substance 3D Designer 15.1.0 and earlier allow attackers to extract sensitive data from process memory when a victim opens a specially crafted file. This local vulnerability requires user interaction and affects systems running the vulnerable Designer versions. No patch is currently available for this issue.

Buffer Overflow Information Disclosure Substance 3d Designer
NVD
EPSS 0% CVSS 5.5
MEDIUM This Month

Memory disclosure in Substance 3D Designer 15.1.0 and earlier stems from an out-of-bounds read flaw that exposes sensitive data from application memory. An attacker can exploit this vulnerability by crafting a malicious file and tricking a user into opening it, requiring no special privileges. Currently, no patch is available for affected users.

Buffer Overflow Information Disclosure Substance 3d Designer
NVD
EPSS 0% CVSS 7.8
HIGH This Week

Arbitrary code execution in Adobe After Effects 25.6 and earlier results from an out-of-bounds read vulnerability triggered when parsing specially crafted files. An attacker can exploit this by tricking users into opening a malicious file, gaining execution privileges within the victim's user context. No patch is currently available for this vulnerability.

Buffer Overflow Information Disclosure After Effects
NVD
EPSS 0% CVSS 7.8
HIGH This Week

Code execution in Adobe After Effects 25.6 and earlier through out-of-bounds memory reads when processing malicious files. An attacker can exploit this vulnerability to execute arbitrary code with user privileges by tricking victims into opening a crafted file. No patch is currently available for this vulnerability.

Buffer Overflow Information Disclosure After Effects
NVD
EPSS 0% CVSS 7.8
HIGH This Week

Out-of-bounds memory reads in Adobe After Effects 25.6 and earlier enable arbitrary code execution when users open specially crafted files. An attacker can exploit this parsing vulnerability by delivering a malicious file that triggers a read past allocated buffer boundaries, executing code with the privileges of the affected user. No patch is currently available for this high-severity vulnerability that requires user interaction to exploit.

Buffer Overflow Information Disclosure After Effects
NVD
EPSS 0% CVSS 5.5
MEDIUM This Month

Out-of-bounds memory read in Adobe After Effects 25.6 and earlier allows attackers to disclose sensitive information from process memory by tricking users into opening specially crafted files. This local vulnerability requires user interaction but carries no patch availability, leaving affected systems exposed until an update is released.

Buffer Overflow Information Disclosure After Effects
NVD
EPSS 0% CVSS 5.5
MEDIUM This Month

Adobe Audition versions 25.3 and earlier contain an out-of-bounds read vulnerability that exposes sensitive data from application memory when a user opens a crafted file. This local attack requires user interaction but carries no patch availability, leaving affected users vulnerable to information disclosure. The vulnerability affects confidentiality with medium severity (CVSS 5.5) and currently has no evidence of active exploitation.

Buffer Overflow Information Disclosure Audition
NVD
EPSS 0% CVSS 5.5
MEDIUM This Month

Memory disclosure in Adobe Audition 25.3 and earlier through an out-of-bounds read vulnerability allows attackers to access sensitive information from process memory when a user opens a specially crafted file. Exploitation requires user interaction and does not enable code execution or system availability impact. No patch is currently available for this vulnerability.

Buffer Overflow Information Disclosure Audition
NVD
EPSS 0% CVSS 5.5
MEDIUM This Month

Memory disclosure in Adobe Audition 25.3 and earlier stems from an out-of-bounds read flaw that could expose sensitive data from process memory. An attacker must trick a user into opening a specially crafted file to trigger the vulnerability, which requires no elevated privileges but offers no path to code execution or system availability impact.

Buffer Overflow Information Disclosure Audition
NVD
EPSS 0% CVSS 5.5
MEDIUM This Month

Out-of-bounds memory read in Adobe Audition 25.3 and earlier enables attackers to extract sensitive data from process memory when a user opens a specially crafted file. No patch is currently available for this vulnerability, which requires user interaction to trigger but poses a confirmed risk to confidentiality. Local attackers can exploit this to disclose information without requiring elevated privileges or additional user actions beyond opening the malicious file.

Buffer Overflow Information Disclosure Audition
NVD
Awaiting Data

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. No vendor patch available.

Information Disclosure
NVD
EPSS 0% CVSS 4.1
MEDIUM This Month

Use of uninitialized variable for some TDX Module before version tdx1.5 within Ring 0: Hypervisor may allow an information disclosure. Authorized adversary with a privileged user combined with a high complexity attack may enable data exposure. [CVSS 4.1 MEDIUM]

Information Disclosure
NVD
EPSS 0% CVSS 4.4
MEDIUM This Month

Out-of-bounds read for some TDX before version tdx module 1.5.24 within Ring 0: Hypervisor may allow an information disclosure. Authorized adversary with a privileged user combined with a low complexity attack may enable data exposure. [CVSS 4.4 MEDIUM]

Information Disclosure
NVD
EPSS 0% CVSS 6.5
MEDIUM This Month

Out-of-bounds read in the firmware for some 100GbE Intel(R) Ethernet Network Adapter E810 before version cvl fw 1.7.6, cpk 1.3.7 within Ring 0: Bare Metal OS may allow a denial of service. [CVSS 6.5 MEDIUM]

Denial Of Service Intel Information Disclosure +2
NVD VulDB
EPSS 0% CVSS 4.1
MEDIUM This Month

Out-of-bounds read for some TDX Module before version tdx1.5 within Ring 0: Hypervisor may allow an information disclosure. Software side channel adversary with a privileged user combined with a high complexity attack may enable data exposure. [CVSS 4.1 MEDIUM]

Information Disclosure
NVD
EPSS 0% CVSS 4.1
MEDIUM This Month

Out-of-bounds read in the firmware for some Intel(R) Converged Security and Management Engine (CSME) Firmware (FW) within Ring 0: Kernel may allow an information disclosure. System software adversary with a privileged user combined with a low complexity attack may enable data exposure. [CVSS 4.1 MEDIUM]

Linux Information Disclosure
NVD
EPSS 0% CVSS 4.1
MEDIUM This Month

Exposure of sensitive information during transient execution for some TDX within Ring 0: Hypervisor may allow an information disclosure. Authorized adversary with a privileged user combined with a high complexity attack may enable data exposure. [CVSS 4.1 MEDIUM]

Information Disclosure
NVD
EPSS 0% CVSS 3.3
LOW Monitor

Ethernet 800-Serie versions up to 2.2.2.0 contains a vulnerability that allows attackers to an information disclosure (CVSS 3.3).

Linux Esxi Information Disclosure
NVD
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Prototype pollution in CASL Ability authorization library versions 2.4.0 through 6.7.4. Can lead to authorization bypass in applications using CASL for access control.

Information Disclosure
NVD GitHub
EPSS 0% CVSS 5.0
MEDIUM PATCH This Month

A flaw was found in Keycloak. When the logging format is configured to a verbose, user-supplied pattern (such as the pre-defined 'long' pattern), sensitive headers including Authorization and Cookie are disclosed to the logs in cleartext. [CVSS 5.0 MEDIUM]

Information Disclosure Redhat
NVD
EPSS 0% CVSS 7.5
HIGH This Week

Unauthenticated attackers can extract arbitrary post metadata from WordPress sites running Ninja Forms plugin versions up to 3.14.0 through improper merge tag filtering in repeater fields, potentially exposing sensitive data like API keys, billing information, and customer details. The vulnerability is exploitable remotely without authentication via the nf_ajax_submit AJAX action and currently lacks a patch.

WordPress Information Disclosure
NVD
EPSS 0% CVSS 7.8
HIGH This Week

Code execution in Simcenter Femap and Nastran versions prior to V2512 results from an out-of-bounds read flaw triggered when parsing malicious NDB files. A local attacker with user interaction can exploit this vulnerability to execute arbitrary code with the privileges of the affected application. No patch is currently available for this vulnerability.

Buffer Overflow Information Disclosure Simcenter Nastran +1
NVD
EPSS 0% CVSS 7.8
HIGH This Week

Out-of-bounds read in Simcenter Femap and Nastran versions prior to V2512 during NDB file parsing enables local code execution under the current process context. An attacker can exploit this vulnerability through specially crafted NDB files to achieve arbitrary code execution. No patch is currently available for this high-severity vulnerability affecting both products.

Buffer Overflow Information Disclosure Simcenter Femap +1
NVD
EPSS 0% CVSS 7.8
HIGH This Week

Simcenter Femap and Nastran versions prior to 2512 are vulnerable to out-of-bounds memory reads when processing maliciously crafted XDB files, enabling arbitrary code execution with the privileges of the affected application. Local attackers can exploit this vulnerability through specially designed files to achieve full system compromise. No patch is currently available for this high-severity flaw.

Buffer Overflow Information Disclosure Simcenter Nastran +1
NVD
EPSS 0% CVSS 7.8
HIGH This Week

Arbitrary code execution in Simcenter Femap and Nastran versions prior to 2512 results from an out-of-bounds read when processing malicious XDB files, enabling local attackers to achieve process-level code execution. An attacker with local access can craft a specially designed XDB file to trigger the memory vulnerability and execute arbitrary code with the privileges of the affected application. No patch is currently available for this vulnerability.

Buffer Overflow Information Disclosure Simcenter Femap +1
NVD
EPSS 0% CVSS 6.5
MEDIUM PATCH This Month

Cube.js versions 1.1.17 through 1.5.12 and 1.4.x before 1.4.2 are vulnerable to denial of service attacks where an authenticated attacker can craft a malicious request to completely disable the Cube API. This network-accessible vulnerability requires valid credentials but no user interaction, making it exploitable by any authenticated user with API access. No patch is currently available for affected versions.

Information Disclosure Cube.Js
NVD GitHub
EPSS 0% CVSS 4.3
MEDIUM PATCH This Month

Corrupted Git pack and index files are not properly validated in go-git versions before 5.16.5, allowing an attacker to supply malicious packfiles that bypass integrity checks and cause go-git to consume corrupted data. This can result in unexpected application errors and denial of service conditions for any system using the vulnerable go-git library to fetch or process Git repositories. The vulnerability requires user interaction to fetch from a malicious or compromised Git source.

Information Disclosure Go Git Redhat +1
NVD GitHub
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

Unity-Cli versions up to 1.8.2 is affected by insertion of sensitive information into log file (CVSS 5.5).

Information Disclosure Unity Cli
NVD GitHub
EPSS 0% CVSS 9.8
CRITICAL Act Now

PlaciPy has an injection vulnerability allowing user input to be processed as commands — sixth critical flaw.

Information Disclosure Placipy
NVD GitHub
EPSS 0% CVSS 7.5
HIGH This Week

Placipy versions up to 1.0.0 is affected by insertion of sensitive information into log file (CVSS 7.5).

Information Disclosure Placipy
NVD GitHub
EPSS 0% CVSS 6.5
MEDIUM POC PATCH This Month

Cache poisoning in Litestar before 2.20.0 allows unauthenticated remote attackers to exploit improper Unicode normalization in the FileStore cache backend to create collisions between cache keys, enabling one URL to serve another URL's cached responses. Public exploit code exists for this vulnerability. An attacker can leverage this to serve malicious cached content to users accessing legitimate endpoints.

Information Disclosure Litestar
NVD GitHub
EPSS 0% CVSS 7.4
HIGH POC PATCH This Week

Litestar ASGI framework versions before 2.20.0 fail to properly escape regex metacharacters in CORS origin validation, allowing attackers to bypass origin restrictions through crafted malicious origins. This configuration flaw affects cross-origin request filtering and enables unauthorized cross-origin access. Public exploit code exists for this vulnerability.

Information Disclosure Litestar
NVD GitHub
EPSS 0% CVSS 7.5
HIGH POC This Week

Unauthenticated directory traversal in FileRise prior to version 3.3.0 allows remote attackers to read arbitrary files from the /uploads directory without authentication by directly accessing guessable file paths. Public exploit code exists for this vulnerability, enabling attackers to expose sensitive data and breach user privacy. No patch is currently available.

Authentication Bypass Information Disclosure Filerise
NVD GitHub
EPSS 0%
Monitor

DPA countermeasures in Silicon Labs' Series 2 devices are not reseeded under certain conditions. This may allow an attacker to eventually extract secret keys through a DPA attack.

Information Disclosure
NVD
EPSS 0% CVSS 5.3
MEDIUM This Month

Crafted zones can lead to increased incoming network traffic. [CVSS 5.3 MEDIUM]

Information Disclosure Suse
NVD
EPSS 0% CVSS 6.5
MEDIUM This Month

Crafted delegations or IP fragments can poison cached delegations in Recursor. [CVSS 6.5 MEDIUM]

Information Disclosure Suse
NVD
EPSS 0% CVSS 8.2
HIGH This Week

Crafted delegations or IP fragments can poison cached delegations in Recursor. [CVSS 8.2 HIGH]

Information Disclosure Suse
NVD
EPSS 0% CVSS 6.5
MEDIUM This Month

Birtech Information Technologies Industry and Trade Ltd. Co. Senseway is affected by cleartext storage of sensitive information (CVSS 6.5).

Information Disclosure
NVD
EPSS 0% CVSS 6.8
MEDIUM This Month

Insertion of Sensitive Information Into Sent Data vulnerability in Atlas Educational Software Industry Ltd. Co. [CVSS 6.8 MEDIUM]

Information Disclosure
NVD
EPSS 0% CVSS 6.5
MEDIUM This Month

Youtrack versions up to 2025.3.119033 is affected by insertion of sensitive information into log file (CVSS 6.5).

Information Disclosure Youtrack
NVD
EPSS 0% CVSS 4.3
MEDIUM PATCH This Month

Roundcube Webmail versions before 1.5.13 and 1.6.x before 1.6.13 fail to block SVG feImage elements when the "Block remote images" security feature is enabled, allowing attackers to bypass the protection and load remote content. This remote image bypass could enable tracking, information disclosure, or facilitate phishing attacks against users who rely on this feature to prevent remote content loading. No patch is currently available for this medium-severity vulnerability.

Information Disclosure Suse
NVD GitHub
EPSS 0% CVSS 3.7
LOW Monitor

A vulnerability was detected in rachelos WeRSS we-mp-rss up to 1.4.8. This issue affects some unknown processing of the file core/auth.py of the component JWT Handler. Performing a manipulation of the argument SECRET_KEY results in use of default cryptographic key. The attack can be initiated remotely. The attack is considered to have high complexity. The exploitability is assessed as difficult...

Information Disclosure
NVD VulDB
EPSS 0% CVSS 7.5
HIGH This Week

A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This product supports old SSL/TLS versions, potentially allowing an attacker to decrypt communications with the web server. [CVSS 7.5 HIGH]

Information Disclosure
NVD
EPSS 0% CVSS 7.5
HIGH This Week

A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This product supports weak cryptographic algorithms, potentially allowing an attacker to decrypt communications with the web server. [CVSS 7.5 HIGH]

Information Disclosure
NVD
EPSS 0% CVSS 5.3
MEDIUM This Month

A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. Detailed messages are displayed on the error page. [CVSS 5.3 MEDIUM]

Information Disclosure
NVD
EPSS 0% CVSS 7.5
HIGH This Week

A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This product does not properly validate URLs. [CVSS 7.5 HIGH]

Information Disclosure
NVD
EPSS 0% CVSS 5.3
MEDIUM This Month

A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. The response header contains an insecure setting. [CVSS 5.3 MEDIUM]

Information Disclosure
NVD
EPSS 0% CVSS 9.6
CRITICAL Act Now

Yokogawa FAST/TOOLS has a third vulnerability involving improper encoding of output that could enable injection attacks against the SCADA web interface.

Information Disclosure
NVD
EPSS 0% CVSS 5.3
MEDIUM This Month

A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. Since there are input fields on this webpage with the autocomplete attribute enabled, the input content could be saved in the browser the user is using. [CVSS 5.3 MEDIUM]

Information Disclosure
NVD
EPSS 0% CVSS 5.3
MEDIUM This Month

A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. The library version could be displayed on the web page. [CVSS 5.3 MEDIUM]

Information Disclosure
NVD
EPSS 0% CVSS 9.8
CRITICAL Act Now

Yokogawa FAST/TOOLS has a second web server vulnerability involving improper cryptographic handling that weakens the security of SCADA communications.

Information Disclosure
NVD
EPSS 0% CVSS 9.8
CRITICAL Act Now

Yokogawa FAST/TOOLS SCADA has a vulnerability in its web server component enabling unauthorized access to the industrial control monitoring system.

Information Disclosure
NVD
EPSS 0% CVSS 6.1
MEDIUM This Month

A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This product does not specify MIME types. [CVSS 6.1 MEDIUM]

Information Disclosure
NVD
EPSS 0%
Monitor

A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This product lacks HSTS (HTTP Strict Transport Security) configuration.

Information Disclosure
NVD
EPSS 0%
Monitor

A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. Physical paths could be displayed on web pages.

Information Disclosure
NVD
EPSS 0% CVSS 7.3
HIGH POC This Week

SourceCodester Prison Management System 1.0 contains a session fixation vulnerability in its login component that allows unauthenticated remote attackers to hijack user sessions. Public exploit code exists for this vulnerability, which enables attackers to impersonate legitimate users and gain unauthorized access to the system. No patch is currently available.

Information Disclosure Prison Management System
NVD GitHub VulDB
EPSS 0% CVSS 5.3
MEDIUM POC This Month

Tenda AC21 firmware version 16.03.08.16 contains an information disclosure vulnerability in the /cgi-bin/DownloadFlash web management interface that allows unauthenticated remote attackers to access sensitive data. Public exploit code exists for this vulnerability, and no patch is currently available, leaving affected devices at risk of data exposure.

Information Disclosure Ac21 Firmware
NVD GitHub VulDB
EPSS 0% CVSS 5.3
MEDIUM POC This Month

Tenda AC21 firmware version 16.03.08.16 contains an information disclosure vulnerability in the web management interface's /cgi-bin/DownloadLog endpoint that allows unauthenticated remote attackers to access sensitive data. Public exploit code is available for this vulnerability, increasing the risk of active exploitation. No patch is currently available for affected devices.

Information Disclosure Ac21 Firmware
NVD GitHub VulDB
EPSS 0% CVSS 6.3
MEDIUM PATCH This Month

Wekan versions up to 8.18 contain an authorization bypass in the custom translation handler that allows authenticated users to manipulate translation settings they should not have access to. An attacker with valid credentials can exploit the setCreateTranslation function to gain unauthorized access to modify translations, potentially affecting application functionality and data integrity. The vulnerability has been patched in version 8.19 and users should upgrade immediately.

Information Disclosure Wekan
NVD GitHub VulDB
EPSS 0% CVSS 5.3
MEDIUM PATCH This Month

WeKan versions up to 8.20 contain an information disclosure vulnerability in the Activity Publication Handler that allows unauthenticated remote attackers to access sensitive data through manipulation of the activities.js file. The vulnerability requires no user interaction and can be exploited over the network with low complexity. Users should upgrade to version 8.21 or apply patch 91a936e07d2976d4246dfe834281c3aaa87f9503 to remediate this issue.

Information Disclosure Wekan
NVD GitHub VulDB
EPSS 0% CVSS 6.3
MEDIUM PATCH This Month

Improper access controls in WeKan's administrative repair handler (fixDuplicateLists.js) allow authenticated remote attackers to manipulate list data and gain unauthorized access to sensitive information. Affected versions through 8.20 can be remediated by upgrading to version 8.21 or applying the referenced patch.

Information Disclosure Wekan
NVD GitHub VulDB
EPSS 0% CVSS 4.3
MEDIUM PATCH This Month

WeKan versions up to 8.20 contain an information disclosure vulnerability in the Meteor Publication Handler's card publication mechanism that allows authenticated remote attackers to access sensitive data. The vulnerability requires valid credentials but no user interaction to exploit, and is resolved in version 8.21.

Information Disclosure Wekan
NVD GitHub VulDB
EPSS 0% CVSS 9.3
CRITICAL Act Now

macrozheng mall e-commerce platform v1.0.3 has an authentication vulnerability in password reset enabling unauthorized account takeover.

Information Disclosure
NVD GitHub
EPSS 0% CVSS 4.3
MEDIUM PATCH This Month

Wekan versions before 8.19 fail to properly restrict attachment metadata visibility, allowing authenticated users to enumerate attachment information from boards and cards they should not have access to. This information disclosure vulnerability requires valid credentials and can expose sensitive metadata to unauthorized users across the platform. A patch is available.

Information Disclosure Wekan
NVD GitHub
EPSS 0% CVSS 5.4
MEDIUM POC This Month

Coco Annotator through version 0.11.1 contains an authorization bypass in the Delete Category Handler endpoint (/api/undo/) that allows authenticated attackers to manipulate category IDs and access or modify unauthorized data. The vulnerability requires valid credentials but can be exploited remotely with public exploit code available. No patch is currently available from the vendor.

Information Disclosure Coco Annotator
NVD GitHub VulDB
EPSS 0% CVSS 8.1
HIGH PATCH This Week

Nebula is a scalable overlay networking tool. [CVSS 8.1 HIGH]

Information Disclosure Nebula Redhat +1
NVD GitHub VulDB
EPSS 0% CVSS 7.2
HIGH PATCH This Week

AdonisJS is a TypeScript-first web framework. versions up to 10.1.3 is affected by improperly controlled modification of object prototype attributes (prototype pollution) (CVSS 7.2).

Prototype Pollution Information Disclosure Bodyparser
NVD GitHub VulDB
EPSS 0% CVSS 8.5
HIGH POC PATCH This Week

Arbitrary file append vulnerability in Qdrant vector database versions 1.9.3 through 1.15.x allows authenticated users with minimal read-only privileges to write to arbitrary files through an unsanitized log file path parameter in the /logger endpoint. Public exploit code exists for this vulnerability, enabling attackers to corrupt system files or inject malicious content with high impact to confidentiality, integrity, and availability. The issue is resolved in version 1.16.0.

Information Disclosure AI / ML Qdrant
NVD GitHub
EPSS 0% CVSS 5.3
MEDIUM PATCH This Month

Prestashop versions up to 8.2.4 contains a vulnerability that allows attackers to determine whether a customer account exists in the system by measuring response (CVSS 5.3).

Information Disclosure Prestashop
NVD GitHub
EPSS 0% CVSS 10.0
CRITICAL POC PATCH Act Now

SandboxJS has a fifth CVSS 10.0 escape via a TOCTOU race condition in sandbox validation, allowing code to slip through during the check-execute gap.

Information Disclosure Sandboxjs
NVD GitHub
EPSS 0% CVSS 10.0
CRITICAL POC PATCH Act Now

SandboxJS has a third CVSS 10.0 sandbox escape via Map prototype shadowing that allows complete sandbox bypass.

Information Disclosure Sandboxjs
NVD GitHub
EPSS 0% CVSS 7.5
HIGH PATCH This Week

Unauthenticated attackers can retrieve sensitive InfluxDB credentials from FUXA versions through 1.2.9 due to missing authentication controls, enabling direct database access. An attacker exploiting this vulnerability can read, modify, or delete all historical process data and perform denial of service attacks by corrupting the database. FUXA 1.2.10 addresses this issue, but no patch is currently available for affected versions.

Scada Denial Of Service Information Disclosure +1
NVD GitHub
EPSS 0% CVSS 7.5
HIGH PATCH This Week

Unauthenticated attackers can exploit arbitrary attribute access in MCP Salesforce Connector versions prior to 0.1.10 to extract sensitive Salesforce authentication tokens. This vulnerability requires only network access with no user interaction, enabling complete disclosure of credentials used for Salesforce API integration. Organizations using affected versions should upgrade to 0.1.10 immediately.

Information Disclosure AI / ML Mcp Salesforce Connector
NVD GitHub
EPSS 0% CVSS 2.3
LOW PATCH Monitor

Claude Code versions prior to 2.1.7 allow unauthorized file access by bypassing deny rules through symbolic link traversal, enabling attackers to read restricted files that administrators explicitly blocked. An attacker with access to the system can exploit this vulnerability to access sensitive files like /etc/passwd by leveraging symlinks that point to denied resources. This vulnerability affects AI/ML tools using Claude Code and currently has no available patch.

Information Disclosure
NVD GitHub VulDB
EPSS 0% CVSS 7.6
HIGH POC PATCH This Week

Gophish <=0.12.1 is vulnerable to Incorrect Access Control. The administrative dashboard exposes each user’s long-lived API key directly inside the rendered HTML/JavaScript of the page on every login. [CVSS 7.6 HIGH]

Authentication Bypass Information Disclosure Gophish +1
NVD GitHub
EPSS 0% CVSS 7.1
HIGH POC This Week

Syteline Erp versions up to 10.0.8803.16889 is affected by use of hard-coded cryptographic key (CVSS 7.1).

Information Disclosure Syteline Erp
NVD
EPSS 0% CVSS 7.8
HIGH POC This Week

SecurosCtrlService contains a vulnerability that allows attackers to potentially execute code with elevated privileges (CVSS 7.8).

Information Disclosure
NVD Exploit-DB
Prev Page 26 of 143 Next

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy