Total CVEs

130,823

Critical Severity

2,726

High Severity

9,741

Last 7 Days

915
Quick preset (or use dates below)
Clear Filters
📅 Showing Year: 2026 (January 1 - December 31, 2026) View All Years →
Showing 1 - 20 of 27,228 CVEs
CVE-2026-47124 MEDIUM - 6.5

Nezha Monitoring: Nezha WebSocket server stream discloses cross-tenant server telemetry to authenticated members

Vendor: go
Product: github.com/nezhahq/nezha
Published: May 23, 2026
Source: GitHub
CVE-2026-46716 CRITICAL - 9.9

Nezha Monitoring: RoleMember can run shell on every server (cross-tenant RCE) via POST /api/v1/cron

Vendor: go
Product: github.com/nezhahq/nezha
Published: May 23, 2026
Source: GitHub
CVE-2026-47125 HIGH - 8.8

Arcane: Missing admin authorization on global variables endpoint

Vendor: go
Product: github.com/getarcaneapp/arcane/backend
Published: May 23, 2026
Source: GitHub
CVE-2026-47157 MEDIUM - 6.5

aiograpi: Unsafe signup challenge path handling

Vendor: pip
Product: aiograpi
Published: May 23, 2026
Source: GitHub

Parse Server: Pre-authentication denial of service via client version header regex backtracking

Vendor: npm
Product: parse-server
Published: May 23, 2026
Source: GitHub
CVE-2026-47120 MEDIUM - 5.4

Nezha Monitoring: RoleMember can fire other users' cron tasks via AlertRule.FailTriggerTasks (no ownership check)

Vendor: go
Product: github.com/nezhahq/nezha
Published: May 23, 2026
Source: GitHub
CVE-2026-46717 HIGH - 8.5

Nezha Monitoring: RoleMember-reachable SSRF with full response-body reflection via POST /api/v1/notification

Vendor: go
Product: github.com/nezhahq/nezha
Published: May 23, 2026
Source: GitHub

Flask-Security-Too OAuth reauthentication freshness bypass via cross- user OAuth identity acceptance

Vendor: pip
Product: Flask-Security-Too
Published: May 22, 2026
Source: GitHub
CVE-2026-46670 CRITICAL - 9.8

YesWiki: Unauthenticated SQL Injection

Vendor: composer
Product: yeswiki/yeswiki
Published: May 22, 2026
Source: GitHub
CVE-2026-47166 MEDIUM - 5.7

ImageMagick: Heap Buffer Over-Read in distributed pixel cache server

Vendor: nuget
Product: Magick.NET-Q16-AnyCPU
Published: May 22, 2026
Source: GitHub
CVE-2026-47165 MEDIUM - 4.1

ImageMagick: Information Disclosure in distributed pixel cache server because it is not using a challenge–response authentication model

Vendor: nuget
Product: Magick.NET-Q16-AnyCPU
Published: May 22, 2026
Source: GitHub
CVE-2026-46693 MEDIUM - 4.1

ImageMagick: Race Condition in distributed pixel cache server can result in file descriptor hijacking

Vendor: nuget
Product: Magick.NET-Q16-AnyCPU
Published: May 22, 2026
Source: GitHub
CVE-2026-46692 MEDIUM - 4.1

ImageMagick: Heap Buffer Over-Write in distributed pixel cache server

Vendor: nuget
Product: Magick.NET-Q16-AnyCPU
Published: May 22, 2026
Source: GitHub

STER uses unencrypted TCP traffic to transmit data over the network. It allows an attacker to conduct a Man-In-The-Middle attack and obtain sensitive data such as passwords, personal data, or authentication tokens. This issue was fixed in version 9.5.

Vendor: Centralny Instytut Ochrony Pracy - Państwowy Instytut Badawczy
Product: STER
Published: May 22, 2026
Source: NVD

Use of a weak password encoding algorithm in STER software allows the value of the password to be guessed after analyzing how passwords with known values are encoded. This issue was fixed in version 9.5.

Vendor: Centralny Instytut Ochrony Pracy - Państwowy Instytut Badawczy
Product: STER
Published: May 22, 2026
Source: NVD

A SQL injection vulnerability has been identified in STER. Improper neutralization of input provided by user into multiple Search Filters allows for SQL Injection attacks. It allows an authenticated attacker to view sensitive data such as data belonging to other users, or any other data that the app...

Vendor: Centralny Instytut Ochrony Pracy - Państwowy Instytut Badawczy
Product: STER
Published: May 22, 2026
Source: NVD
CVE-2026-9011 HIGH - 7.5

The Ditty – Responsive News Tickers, Sliders, and Lists plugin for WordPress is vulnerable to authorization bypass in all versions up to, and including, 3.1.65. This is due to the plugin not properly verifying that a user is authorized to perform an action. This makes it possible for unauthenticated...

Published: May 22, 2026
Source: NVD
CVE-2026-8692 MEDIUM - 4.3

The Vedrixa Forms – User Registration Form, Signup Form & Drag & Drop Form Builder plugin for WordPress is vulnerable to authorization bypass in all versions up to, and including, 1.1.1. This is due to the plugin not properly verifying that a user is authorized to perform an action. This mak...

Published: May 22, 2026
Source: NVD
CVE-2026-8684 MEDIUM - 5.3

The MotoPress Hotel Booking plugin for WordPress is vulnerable to authorization bypass in all versions up to, and including, 6.0.1. This is due to the plugin not properly verifying that a user is authorized to perform an action. This makes it possible for unauthenticated attackers to overwrite or de...

Published: May 22, 2026
Source: NVD
CVE-2026-8679 HIGH - 7.5

The AudioIgniter plugin for WordPress is vulnerable to Insecure Direct Object Reference in versions up to, and including, 2.0.2. This is due to the handle_playlist_endpoint() function (hooked to template_redirect) accepting a user-controlled playlist ID via the audioigniter_playlist_id query var or ...

Published: May 22, 2026
Source: NVD