CVE & Exploit Intelligence Database

Updated 2h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,123 CVEs tracked 53,219 with exploits 4,686 exploited in wild 1,539 CISA KEV 3,912 Nuclei templates 37,757 vendors 42,422 researchers
521 results Clear all
CVE-2026-30835 EPSS 0.00
Parse Server <8.6.7/9.5.0-alpha.6 - Info Disclosure
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.7 and 9.5.0-alpha.6, malformed $regex query parameter (e.g. [abc) causes the database to return a structured error object that is passed unsanitized through the API response. This leaks database internals such as error messages, error codes, code names, cluster timestamps, and topology details. The vulnerability is exploitable by any client that can send query requests, depending on the deployment's permission configuration. This issue has been patched in versions 8.6.7 and 9.5.0-alpha.6.
CWE-209 Mar 06, 2026
CVE-2026-29110 2.2 LOW EPSS 0.00
Cryptomator <1.19.0 - Info Disclosure
Cryptomator encrypts data being stored on cloud infrastructure. Prior to version 1.19.0, in non-debug mode Cryptomator might leak cleartext paths into the log file. This can reveal meta information about the files stored inside a vault at a time, where the actual vault is closed. Not every cleartext path is logged. Only if a filesystem request fails for some reason (e.g. damaged encrypted file, not existing file), a log message is created. This issue has been patched in version 1.19.0.
CWE-209 Mar 06, 2026
CVE-2026-2752 5.3 MEDIUM EPSS 0.00
Navtor NavBox - Info Disclosure
Navtor NavBox allows information disclosure via the /api/ais-data endpoint. A remote, unauthenticated attacker can send crafted requests to trigger an unhandled exception, causing the server to return verbose .NET stack traces. These error messages expose internal class names, method calls, and third-party library references (e.g., System.Data.SQLite), which may assist attackers in mapping the application's internal structure.
CWE-209 Mar 06, 2026
CVE-2026-28675 5.3 MEDIUM 1 Writeup EPSS 0.00
OpenSift <1.6.3-alpha - Info Disclosure
OpenSift is an AI study tool that sifts through large datasets using semantic search and generative AI. Prior to version 1.6.3-alpha, some endpoints returned raw exception strings to clients. Additionally, login token material was exposed in UI/rendered responses and token rotation output. This issue has been patched in version 1.6.3-alpha.
CWE-200 Mar 06, 2026
CVE-2026-22052 EPSS 0.00
ONTAP >=9.12.1 - Info Disclosure
ONTAP versions 9.12.1 and higher with S3 NAS buckets are susceptible to an information disclosure vulnerability. Successful exploit could allow an authenticated attacker to view a listing of the contents in a directory for which they lack permission.
CWE-209 Mar 05, 2026
CVE-2026-27643 5.3 MEDIUM 1 Writeup EPSS 0.00
free5GC UDR <=1.4.1 - Info Disclosure
free5GC UDR is the user data repository (UDR) for free5GC, an an open-source project for 5th generation (5G) mobile core networks. In versions up to and including 1.4.1, the NEF component reliably leaks internal parsing error details (e.g., invalid character 'n' after top-level value) to remote clients, which can aid attackers in service fingerprinting. All deployments of free5GC using the Nnef_PfdManagement service may be affected. free5gc/udr pull request 56 contains a patch for the issue. There is no direct workaround at the application level. The recommendation is to apply the provided patch.
CWE-209 Feb 24, 2026
CVE-2025-69253 5.3 MEDIUM 1 Writeup EPSS 0.00
free5GC UDR <=1.4.1 - Info Disclosure
free5GC is an open-source project for 5th generation (5G) mobile core networks. Versions up to and including 1.4.1 of the User Data Repository are affected by Improper Error Handling with Information Exposure. The NEF component reliably leaks internal parsing error details (e.g., invalid character 'n' after top-level value) to remote clients, which can aid attackers in service fingerprinting. All deployments of free5GC using the Nnef_PfdManagement service may be vulnerable. free5gc/udr pull request 56 contains a patch. No direct workaround is available at the application level. Applying the official patch is recommended.
CWE-209 Feb 24, 2026
CVE-2025-69208 5.3 MEDIUM 1 Writeup EPSS 0.00
free5GC UDR <1.4.1 - Info Disclosure
free5GC UDR is the user data repository (UDR) for free5GC, an an open-source project for 5th generation (5G) mobile core networks. Versions prior to 1.4.1 contain an Improper Error Handling vulnerability with Information Exposure. All deployments of free5GC using the Nnef_PfdManagement service may be affected. The NEF component reliably leaks internal parsing errors (e.g., invalid character 'n' after top-level value) to remote clients. This can aid attackers in fingerprinting server software and logic flows. Version 1.4.1 fixes the issue. There is no direct workaround at the application level. The recommended mitigation is to apply the provided patch.
CWE-209 Feb 23, 2026
CVE-2025-65995 6.5 MEDIUM EPSS 0.00
Airflow <3.1.4/2.11.1 - Info Disclosure
When a DAG failed during parsing, Airflow’s error-reporting in the UI could include the full kwargs passed to the operators. If those kwargs contained sensitive values (such as secrets), they might be exposed in the UI tracebacks to authenticated users who had permission to view that DAG.  The issue has been fixed in Airflow 3.1.4 and 2.11.1, and users are strongly advised to upgrade to prevent potential disclosure of sensitive information.
CWE-209 Feb 21, 2026
CVE-2026-27004 5.5 MEDIUM 1 Writeup EPSS 0.00
OpenClaw <2026.2.15 - Privilege Escalation
OpenClaw is a personal AI assistant. Prior to version 2026.2.15, in some shared-agent deployments, OpenClaw session tools (`sessions_list`, `sessions_history`, `sessions_send`) allowed broader session targeting than some operators intended. This is primarily a configuration/visibility-scoping issue in multi-user environments where peers are not equally trusted. In Telegram webhook mode, monitor startup also did not fall back to per-account `webhookSecret` when only the account-level secret was configured. In shared-agent, multi-user, less-trusted environments: session-tool access could expose transcript content across peer sessions. In single-agent or trusted environments, practical impact is limited. In Telegram webhook mode, account-level secret wiring could be missed unless an explicit monitor webhook secret override was provided. Version 2026.2.15 fixes the issue.
CWE-209 Feb 20, 2026
CVE-2026-26957 1 Writeup EPSS 0.00
Libredesk <1.0.2-0.20260215211005-727213631ce6 - SSRF
Libredesk is a self-hosted customer support desk application. Versions prior to 1.0.2-0.20260215211005-727213631ce6 fail to validate destination URLs for webhooks, allowing an attacker posing as an authenticated "Application Admin" to force the server to make HTTP requests to arbitrary internal destinations. This could compromise the underlying cloud infrastructure or internal corporate network where the service is hosted. This issue has been fixed in version 1.0.2-0.20260215211005-727213631ce6.
CWE-209 Feb 20, 2026
CVE-2025-36348 4.9 MEDIUM EPSS 0.00
IBM Sterling B2B Integrator - Info Disclosure
IBM Sterling B2B Integrator versions 6.1.0.0 through 6.1.2.7_2, 6.2.0.0 through 6.2.0.5, and 6.2.1.0 through 6.2.1.1, and IBM Sterling File Gateway versions 6.1.0.0 through 6.1.2.7_2, 6.2.0.0 through 6.2.0.5, and 6.2.1.0 through 6.2.1.1 may expose sensitive information to a remote privileged attacker due to the application returning detailed technical error messages in the browser.
CWE-209 Feb 17, 2026
CVE-2026-23598 6.5 MEDIUM EPSS 0.00
HPE Aruba 5G Core - Info Disclosure
Vulnerabilities in the API error handling of an HPE Aruba Networking 5G Core server API could allow an unauthenticated remote attacker to obtain sensitive information. Successful exploitation could allow an attacker to access details such as user accounts, roles, and system configuration, as well as to gain insight into internal services and workflows, increasing the risk of unauthorized access and elevated privileges when combined with other vulnerabilities.
CWE-209 Feb 17, 2026
CVE-2025-66594 5.3 MEDIUM EPSS 0.00
Yokogawa Electric Corporation - Info Disclosure
A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. Detailed messages are displayed on the error page. This information could be exploited by an attacker for other attacks. The affected products and versions are as follows: FAST/TOOLS (Packages: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to R10.04
CWE-209 Feb 09, 2026
CVE-2023-38281 5.3 MEDIUM EPSS 0.00
IBM Cloud Pak System - Open Redirect
IBM Cloud Pak System does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic.
CWE-209 Feb 04, 2026
CVE-2023-38017 5.3 MEDIUM EPSS 0.00
IBM Cloud Pak System - XSS
IBM Cloud Pak System is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
CWE-209 Feb 04, 2026
CVE-2023-38010 5.3 MEDIUM EPSS 0.00
IBM Cloud Pak System - Info Disclosure
IBM Cloud Pak System displays sensitive information in user messages that could aid in further attacks against the system.
CWE-209 Feb 04, 2026
CVE-2025-12773 6.5 MEDIUM EPSS 0.00
Brocade SANnav <2.4.0a - Info Disclosure
A vulnerability in update-reports-purge-settings.sh script logging for Brocade SANnav before 2.4.0a could allow the collection of SANnav database password in the system audit logs. The vulnerability could allow a remote authenticated attacker with access to the audit logs to access the Brocade SANnav database password.
CWE-209 Feb 03, 2026
CVE-2025-1395 8.2 HIGH EPSS 0.00
Codriapp Innovation & Software Technologies Inc. HeyGarson <3001202...
Generation of Error Message Containing Sensitive Information vulnerability in Codriapp Innovation and Software Technologies Inc. HeyGarson allows Fuzzing for application mapping.This issue affects HeyGarson: through 30012026. NOTE: The vendor was contacted several times to verifying fixing process but did not respond in any way.
CWE-209 Jan 30, 2026
CVE-2025-11065 5.3 MEDIUM 1 Writeup EPSS 0.00
github.com/go-viper/mapstructure/v2 - Info Disclosure
A flaw was found in github.com/go-viper/mapstructure/v2, in the field processing component using mapstructure.WeakDecode. This vulnerability allows information disclosure through detailed error messages that may leak sensitive input values via malformed user-supplied data processed in security-critical contexts.
CWE-209 Jan 26, 2026