CVE & Exploit Intelligence Database

Updated 2h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,123 CVEs tracked 53,219 with exploits 4,686 exploited in wild 1,539 CISA KEV 3,912 Nuclei templates 37,757 vendors 42,422 researchers
1,067 results Clear all
CVE-2025-70040 5.3 MEDIUM
jimeng-web-mcp 2.1.2 - Info Disclosure
An issue pertaining to CWE-532: Insertion of Sensitive Information into Log File was discovered in LupinLin1 jimeng-web-mcp v2.1.2. This allows an attacker to obtain sensitive information.
CWE-532 Mar 09, 2026
CVE-2026-29184 2.0 LOW EPSS 0.00
Backstage <3.1.4 - Info Disclosure
Backstage is an open framework for building developer portals. Prior to version 3.1.4, a malicious scaffolder template can bypass the log redaction mechanism to exfiltrate secrets provided run through task event logs. This issue has been patched in version 3.1.4.
CWE-532 Mar 07, 2026
CVE-2026-24308 EPSS 0.00
Apache ZooKeeper 3.8.5/3.9.4 - Info Disclosure
Improper handling of configuration values in ZKConfig in Apache ZooKeeper 3.8.5 and 3.9.4 on all platforms allows an attacker to expose sensitive information stored in client configuration in the client's logfile. Configuration values are exposed at INFO level logging rendering potential production systems affected by the issue. Users are recommended to upgrade to version 3.8.6 or 3.9.5 which fixes this issue.
CWE-532 Mar 07, 2026
CVE-2026-21786 3.3 LOW EPSS 0.00
HCL Sametime for iOS - Info Disclosure
HCL Sametime for iOS is impacted by a sensitive information disclosure. Hostnames information is written in application logs and certain URLs.
CWE-532 Mar 05, 2026
CVE-2025-62879 6.8 MEDIUM EPSS 0.00
Rancher Backup Operator - Info Disclosure
A vulnerability has been identified within the Rancher Backup Operator, resulting in the leakage of S3 tokens (both accessKey and secretKey) into the rancher-backup-operator pod's logs.
CWE-532 Mar 04, 2026
CVE-2026-1265 4.3 MEDIUM EPSS 0.00
IBM InfoSphere Information Server 11.7.0.0-11.7.1.6 - Info Disclosure
IBM InfoSphere Information Server 11.7.0.0 through 11.7.1.6 is vulnerable to writing of sensitive Information in a log file.
CWE-532 Mar 03, 2026
CVE-2025-48635 7.7 HIGH EPSS 0.00
TaskFragmentOrganizerController - Privilege Escalation
In multiple functions of TaskFragmentOrganizerController.java, there is a possible activity token leak due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CWE-532 Mar 02, 2026
CVE-2026-27900 5.0 MEDIUM 1 Writeup EPSS 0.00
Terraform Provider for Linode <v3.9.0 - Info Disclosure
The Terraform Provider for Linode versions prior to v3.9.0 logged sensitive information including some passwords, StackScript content, and object storage data in debug logs without redaction. Provider debug logging is not enabled by default. This issue is exposed when debug/provider logs are explicitly enabled (for example in local troubleshooting, CI/CD jobs, or centralized log collection). If enabled, sensitive values may be written to logs and then retained, shared, or exported beyond the original execution environment. An authenticated user with access to provider debug logs (through log aggregation systems, CI/CD pipelines, or debug output) would thus be able to extract these sensitive credentials. Versions 3.9.0 and later sanitize debug logs by logging only non-sensitive metadata such as labels, regions, and resource IDs while redacting credentials, tokens, keys, scripts, and other sensitive content. Some other mitigations and workarounds are available. Disable Terraform/provider debug logging or set it to `WARN` level or above, restrict access to existing and historical logs, purge/retention-trim logs that may contain sensitive values, and/or rotate potentially exposed secrets/credentials.
CWE-532 Feb 26, 2026
CVE-2025-0976 4.7 MEDIUM EPSS 0.00
Hitachi Ops Center API Config Manager <11.0.4-00 - Info Disclosure
Information Exposure Vulnerability in Hitachi Ops Center API Configuration Manager, Hitachi Configuration Manager.This issue affects Hitachi Ops Center API Configuration Manager: from 10.0.0-00 before 11.0.4-00; Hitachi Configuration Manager: from 8.6.1-00 before 11.0.5-00.
CWE-532 Feb 25, 2026
CVE-2025-5781 5.2 MEDIUM EPSS 0.00
Hitachi Ops Center API Config Manager - Info Disclosure
Information Exposure Vulnerability in Hitachi Ops Center API Configuration Manager, Hitachi Configuration Manager, Hitachi Device Manager allows Session Hijacking.This issue affects Hitachi Ops Center API Configuration Manager: from 10.0.0-00 before 11.0.5-00; Hitachi Configuration Manager: from 8.5.1-00 before 11.0.5-00; Hitachi Device Manager: from 8.4.1-00 before 8.6.5-00.
CWE-532 Feb 25, 2026
CVE-2025-27555 6.5 MEDIUM EPSS 0.00
Airflow <2.11.1 - Info Disclosure
Airflow versions before 2.11.1 have a vulnerability that allows authenticated users with audit log access to see sensitive values in audit logs which they should not see. When sensitive connection parameters were set via airflow CLI, values of those variables appeared in the audit log and were stored unencrypted in the Airflow database. While this risk is limited to users with audit log access, it is recommended to upgrade to Airflow 2.11.1 or a later version, which addresses this issue. Users who previously used the CLI to set connections should manually delete entries with those connection sensitive values from the log table. This is similar but not the same issue as CVE-2024-50378
CWE-532 Feb 24, 2026
CVE-2026-2605 5.3 MEDIUM EPSS 0.00
Tanium TanOS - Info Disclosure
Tanium addressed an insertion of sensitive information into log file vulnerability in TanOS.
CWE-532 Feb 20, 2026
CVE-2026-2350 6.5 MEDIUM EPSS 0.00
Tanium Interact/TDS - Info Disclosure
Tanium addressed an insertion of sensitive information into log file vulnerability in Interact and TDS.
CWE-532 Feb 20, 2026
CVE-2026-1292 6.5 MEDIUM EPSS 0.00
Tanium Trends - Info Disclosure
Tanium addressed an insertion of sensitive information into log file vulnerability in Trends.
CWE-532 Feb 20, 2026
CVE-2026-20144 6.8 MEDIUM EPSS 0.00
Splunk Enterprise <10.2.0 - Info Disclosure
In Splunk Enterprise versions below 10.2.0, 10.0.2, 9.4.7, 9.3.8, and 9.2.11, and Splunk Cloud Platform versions below 10.2.2510.0, 10.1.2507.11, 10.0.2503.9, and 9.3.2411.120, a user of a Splunk Search Head Cluster (SHC) deployment who holds a role with access to the the Splunk _internal index could view the Security Assertion Markup Language (SAML) configurations for Attribute query requests (AQRs) or Authentication extensions in plain text within the conf.log file, depending on which feature is configured.
CWE-532 Feb 18, 2026
CVE-2026-20142 6.8 MEDIUM EPSS 0.00
Splunk Enterprise <10.2.0 - Info Disclosure
In Splunk Enterprise versions below 10.2.0, 10.0.2, 9.4.7, 9.3.9, and 9.2.11, a user of a Splunk Search Head Cluster (SHC) deployment who holds a role with access to the Splunk `_internal` index could view the RSA `accessKey` value from the [<u>Authentication.conf</u> ](https://help.splunk.com/en/splunk-enterprise/administer/admin-manual/10.2/configuration-file-reference/10.2.0-configuration-file-reference/authentication.conf)file, in plain text.
CWE-532 Feb 18, 2026
CVE-2026-20138 6.8 MEDIUM EPSS 0.00
Splunk Enterprise <10.2.0 - Info Disclosure
In Splunk Enterprise versions below 10.2.0, 10.0.2, 9.4.7, 9.3.9, and 9.2.11, a user of a Splunk Search Head Cluster (SHC) deployment who holds a role with access to the Splunk `_internal` index could view the `integrationKey`, `secretKey`, and `appSecretKey` secrets, generated by [Duo Two-Factor Authentication for Splunk Enterprise](https://duo.com/docs/splunk), in plain text.
CWE-532 Feb 18, 2026
CVE-2026-20663 3.3 LOW EPSS 0.00
iOS <26.3-18.7.5 - Info Disclosure
The issue was resolved by sanitizing logging. This issue is fixed in iOS 26.3 and iPadOS 26.3, iOS 18.7.5 and iPadOS 18.7.5. An app may be able to enumerate a user's installed apps.
CWE-532 Feb 11, 2026
CVE-2026-20646 3.3 LOW EPSS 0.00
macOS Tahoe <26.3 - Info Disclosure
A logging issue was addressed with improved data redaction. This issue is fixed in macOS Tahoe 26.3. A malicious app may be able to read sensitive location information.
CWE-532 Feb 11, 2026
CVE-2026-1495 6.5 MEDIUM EPSS 0.00
PI to CONNECT - Privilege Escalation
The vulnerability, if exploited, could allow an attacker with Event Log Reader (S-1-5-32-573) privileges to obtain proxy details, including URL and proxy credentials, from the PI to CONNECT event log files. This could enable unauthorized access to the proxy server.
CWE-532 Feb 10, 2026