CVE & Exploit Intelligence Database

Updated 2h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,098 CVEs tracked 53,218 with exploits 4,684 exploited in wild 1,536 CISA KEV 3,912 Nuclei templates 37,750 vendors 42,417 researchers
43 results Clear all
CVE-2026-27120 6.1 MEDIUM 1 Writeup EPSS 0.00
Leafkit <1.4.1 - XSS
Leafkit is a templating language with Swift-inspired syntax. Prior to 1.4.1, htmlEscaped in leaf-kit will only escape html special characters if the extended grapheme clusters match, which allows bypassing escaping by using an extended grapheme cluster containing both the special html character and some additional characters. In the case of html attributes, this can lead to XSS if there is a leaf variable in the attribute that is user controlled. This vulnerability is fixed in 1.4.1.
CWE-79 Feb 20, 2026
CVE-2026-20613 7.8 HIGH EPSS 0.00
Container <0.8.0 - Path Traversal
The ArchiveReader.extractContents() function used by cctl image load and container image load performs no pathname validation before extracting an archive member. This means that a carelessly or maliciously constructed archive can extract a file into any user-writable location on the system using relative pathnames. This issue is addressed in container 0.8.0 and containerization 0.21.0.
CWE-22 Jan 23, 2026
CVE-2026-23886 5.3 MEDIUM 1 Writeup EPSS 0.00
Swift W3C TraceContext <1.0.0-beta.5 & Swift OTel <1.0.4 - DoS
Swift W3C TraceContext is a Swift implementation of the W3C Trace Context standard, and Swift OTel is an OpenTelemetry Protocol (OTLP) backend for Swift Log, Swift Metrics, and Swift Distributed Tracing. Prior to Swift W3C TraceContext version 1.0.0-beta.5 and Swift OTel version 1.0.4, a denial-of-service vulnerability due to improper input validation allows a remote attacker to crash the service via a malformed HTTP header. This allows crashing the process with data coming from the network when used with, for example, an HTTP server. Most common way of using Swift W3C Trace Context is through Swift OTel. Version 1.0.0-beta.5 of Swift W3C TraceContext and version 1.0.4 of Swift OTel contain a patch for this issue. As a workaround, disable either Swift OTel or the code that extracts the trace information from an incoming header (such as a `TracingMiddleware`).
CWE-20 Jan 19, 2026
CVE-2025-54951 9.8 CRITICAL 1 Writeup EPSS 0.00
Pypi Executorch < 0.7.0 - Heap Buffer Overflow
A group of related buffer overflow vulnerabilities in the loading of ExecuTorch models can cause the runtime to crash and potentially result in code execution or other undesirable effects. This issue affects ExecuTorch prior to commit cea9b23aa8ff78aff92829a466da97461cc7930c.
CWE-122 Aug 07, 2025
CVE-2025-54950 9.8 CRITICAL 1 Writeup EPSS 0.00
Pypi Executorch < 0.7.0 - Out-of-Bounds Read
An out-of-bounds access vulnerability in the loading of ExecuTorch models can cause the runtime to crash and potentially result in code execution or other undesirable effects. This issue affects ExecuTorch prior to commit b6b7a16df5e7852d976d8c34c8a7e9a1b6f7d005.
CWE-125 Aug 07, 2025
CVE-2025-54949 9.8 CRITICAL 1 Writeup EPSS 0.00
Pypi Executorch < 0.7.0 - Heap Buffer Overflow
A heap buffer overflow vulnerability in the loading of ExecuTorch models can potentially result in code execution or other undesirable effects. This issue affects ExecuTorch prior to commit ede82493dae6d2d43f8c424e7be4721abe5242be
CWE-122 Aug 07, 2025
CVE-2025-30405 9.8 CRITICAL 1 Writeup EPSS 0.00
Pypi Executorch < 0.7.0 - Integer Overflow
An integer overflow vulnerability in the loading of ExecuTorch models can cause objects to be placed outside their allocated memory area, potentially resulting in code execution or other undesirable effects. This issue affects ExecuTorch prior to commit 0830af8207240df8d7f35b984cdf8bc35d74fa73.
CWE-190 Aug 07, 2025
CVE-2025-30404 9.8 CRITICAL 1 Writeup EPSS 0.00
ExecuTorch <d158236b1dc84539c1b16843bc74054c9dcba006 - Code Injection
An integer overflow vulnerability in the loading of ExecuTorch models can cause overlapping allocations, potentially resulting in code execution or other undesirable effects. This issue affects ExecuTorch prior to commit d158236b1dc84539c1b16843bc74054c9dcba006.
CWE-190 Aug 07, 2025
CVE-2025-30402 8.1 HIGH 1 Writeup EPSS 0.00
ExecuTorch <93b1a0c15f7eda49b2bc46b5b4c49557b4e9810f - Memory Corru...
A heap-buffer-overflow vulnerability in the loading of ExecuTorch methods can cause the runtime to crash and potentially result in code execution or other undesirable effects. This issue affects ExecuTorch prior to commit 93b1a0c15f7eda49b2bc46b5b4c49557b4e9810f
Jul 11, 2025
CVE-2025-0509 7.3 HIGH EPSS 0.00
Sparkle <2.6.4 - Open Redirect
A security issue was found in Sparkle before version 2.6.4. An attacker can replace an existing signed update with another payload, bypassing Sparkle’s (Ed)DSA signing checks.
CWE-552 Feb 04, 2025
CVE-2025-0343 7.5 HIGH EPSS 0.00
Swift ASN.1 - Info Disclosure
Swift ASN.1 can be caused to crash when parsing certain BER/DER constructions. This crash is caused by a confusion in the ASN.1 library itself which assumes that certain objects can only be provided in either constructed or primitive forms, and will trigger a preconditionFailure if that constraint isn't met. Importantly, these constraints are actually required to be true in DER, but that correctness wasn't enforced on the early node parser side so it was incorrect to rely on it later on in decoding, which is what the library did. These crashes can be triggered when parsing any DER/BER format object. There is no memory-safety issue here: the crash is a graceful one from the Swift runtime. The impact of this is that it can be used as a denial-of-service vector when parsing BER/DER data from unknown sources, e.g. when parsing TLS certificates.
CWE-228 Jan 15, 2025
CVE-2024-27529 8.4 HIGH EPSS 0.00
wasm3 139076a - Memory Corruption
wasm3 139076a contains memory leaks in Read_utf8.
CWE-125 Nov 08, 2024
CVE-2024-28867 5.9 MEDIUM 1 Writeup EPSS 0.00
Apple Swift Prometheus < 2.0.0-alpha.2 - Injection
Swift Prometheus is a Swift client for the Prometheus monitoring system, supporting counters, gauges and histograms. In code which applies _un-sanitized string values into metric names or labels_, an attacker could make use of this and send a `?lang` query parameter containing newlines, `}` or similar characters which can lead to the attacker taking over the exported format -- including creating unbounded numbers of stored metrics, inflating server memory usage, or causing "bogus" metrics. This vulnerability is fixed in2.0.0-alpha.2.
CWE-74 Mar 29, 2024
CVE-2024-25713 8.6 HIGH EPSS 0.04
Ibireme Yyjson < 0.8.0 - Code Injection
yyjson through 0.8.0 has a double free, leading to remote code execution in some cases, because the pool_free function lacks loop checks. (pool_free is part of the pool series allocator, along with pool_malloc and pool_realloc.)
CWE-94 Feb 29, 2024
CVE-2024-21631 6.5 MEDIUM 1 Writeup EPSS 0.00
Vapor < 4.90.0 - Integer Overflow
Vapor is an HTTP web framework for Swift. Prior to version 4.90.0, Vapor's `vapor_urlparser_parse` function uses `uint16_t` indexes when parsing a URI's components, which may cause integer overflows when parsing untrusted inputs. This vulnerability does not affect Vapor directly but could impact applications relying on the URI type for validating user input. The URI type is used in several places in Vapor. A developer may decide to use URI to represent a URL in their application (especially if that URL is then passed to the HTTP Client) and rely on its public properties and methods. However, URI may fail to properly parse a valid (albeit abnormally long) URL, due to string ranges being converted to 16-bit integers. An attacker may use this behavior to trick the application into accepting a URL to an untrusted destination. By padding the port number with zeros, an attacker can cause an integer overflow to occur when the URL authority is parsed and, as a result, spoof the host. Version 4.90.0 contains a patch for this issue. As a workaround, validate user input before parsing as a URI or, if possible, use Foundation's `URL` and `URLComponents` utilities.
CWE-190 Jan 03, 2024
CVE-2023-26154 5.9 MEDIUM 1 Writeup EPSS 0.00
PubNub <7.4.0, <6.19.0, <7.3.0, <6.1.0, <5.3.0, <0.4.0 - Path Trave...
Versions of the package pubnub before 7.4.0; all versions of the package com.pubnub:pubnub; versions of the package pubnub before 6.19.0; all versions of the package github.com/pubnub/go; versions of the package github.com/pubnub/go/v7 before 7.2.0; versions of the package pubnub before 7.3.0; versions of the package pubnub/pubnub before 6.1.0; versions of the package pubnub before 5.3.0; versions of the package pubnub before 0.4.0; versions of the package pubnub/c-core before 4.5.0; versions of the package com.pubnub:pubnub-kotlin before 7.7.0; versions of the package pubnub/swift before 6.2.0; versions of the package pubnub before 5.2.0; versions of the package pubnub before 4.3.0 are vulnerable to Insufficient Entropy via the getKey function, due to inefficient implementation of the AES-256-CBC cryptographic algorithm. The provided encrypt function is less secure when hex encoding and trimming are applied, leaving half of the bits in the key always the same for every encoded message or file. **Note:** In order to exploit this vulnerability, the attacker needs to invest resources in preparing the attack and brute-force the encryption.
CWE-331 Dec 06, 2023
CVE-2023-44487 7.5 HIGH KEV 27 PoCs Analysis EPSS 0.94
Ietf HTTP < 1.57.0 - Denial of Service
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
CWE-400 Oct 10, 2023
CVE-2023-44386 5.3 MEDIUM 1 Writeup EPSS 0.00
Vapor < 4.84.2 - Denial of Service
Vapor is an HTTP web framework for Swift. There is a denial of service vulnerability impacting all users of affected versions of Vapor. The HTTP1 error handler closed connections when HTTP parse errors occur instead of passing them on. The issue is fixed as of Vapor release 4.84.2.
CWE-231 Oct 05, 2023
CVE-2023-39138 7.8 HIGH EPSS 0.00
ZIPFoundation <0.9.16 - Path Traversal
An issue in ZIPFoundation v0.9.16 allows attackers to execute a path traversal via extracting a crafted zip file.
CWE-22 Aug 30, 2023
CVE-2023-39135 7.8 HIGH EPSS 0.01
Zip Swift <2.1.2 - Path Traversal
An issue in Zip Swift v2.1.2 allows attackers to execute a path traversal attack via a crafted zip entry.
CWE-22 Aug 30, 2023