Total CVEs

126,140

Critical Severity

2,292

High Severity

7,933

Last 7 Days

1,188
Quick preset (or use dates below)
Clear Filters
📅 Showing Year: 2026 (January 1 - December 31, 2026) View All Years →
Showing 621 - 640 of 22,545 CVEs
CVE-2026-42646 HIGH - 7.6

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Steve Burge TaxoPress simple-tags allows Blind SQL Injection.This issue affects TaxoPress: from n/a through <= 3.44.0.

Vendor: Steve Burge
Product: TaxoPress
Published: Apr 29, 2026
Source: NVD
CVE-2026-42645 MEDIUM - 4.3

Cross-Site Request Forgery (CSRF) vulnerability in Dmitry V. (CEO of "UKR Solution") Barcode Scanner with Inventory & Order Manager barcode-scanner-lite-pos-to-manage-products-inventory-and-orders allows Cross Site Request Forgery.This issue affects Barcode Scanner with Inventory &...

Vendor: Dmitry V. (CEO of "UKR Solution")
Product: Barcode Scanner with Inventory & Order Manager
Published: Apr 29, 2026
Source: NVD
CVE-2026-42644 MEDIUM - 5.3

Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in WPDeveloper BetterDocs betterdocs allows Retrieve Embedded Sensitive Data.This issue affects BetterDocs: from n/a through <= 4.3.10.

Vendor: WPDeveloper
Product: BetterDocs
Published: Apr 29, 2026
Source: NVD
CVE-2026-42643 MEDIUM - 5.9

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in StellarWP Image Widget image-widget allows Stored XSS.This issue affects Image Widget: from n/a through <= 4.4.11.

Vendor: StellarWP
Product: Image Widget
Published: Apr 29, 2026
Source: NVD
CVE-2026-42642 MEDIUM - 5.3

Missing Authorization vulnerability in StellarWP GiveWP give allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects GiveWP: from n/a through <= 4.14.5.

Vendor: StellarWP
Product: GiveWP
Published: Apr 29, 2026
Source: NVD
CVE-2026-42641 MEDIUM - 5.4

Server-Side Request Forgery (SSRF) vulnerability in ILLID Share This Image share-this-image allows Server Side Request Forgery.This issue affects Share This Image: from n/a through <= 2.14.

Vendor: ILLID
Product: Share This Image
Published: Apr 29, 2026
Source: NVD

Ollama for Windows contains a Remote Code Execution vulnerability in its update mechanism due to improper handling of attacker‑controlled HTTP response headers. When downloading updates, the application constructs local file paths using values derived from HTTP headers without validation. These valu...

Vendor: Ollama
Product: Ollama
Published: Apr 29, 2026
Source: NVD

Ollama for Windows does not perform integrity or authenticity verification of downloaded update executables. Unlike other platforms, the Windows implementation of the update verification routine unconditionally returns success so no digital signature or trust validation is performed before staging o...

Vendor: Ollama
Product: Ollama
Published: Apr 29, 2026
Source: NVD
CVE-2026-2902 MEDIUM - 6.1

The WP Meteor Website Speed Optimization Addon plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'frontend_rewrite' function's 'WPMETEOR[N]WPMETEOR' placeholder content in all versions up to, and including, 3.4.16 due to insufficient input sanitizatio...

Published: Apr 29, 2026
Source: NVD
CVE-2026-22745 MEDIUM - 5.3

Spring MVC and WebFlux applications are vulnerable to Denial of Service attacks when resolving static resources. More precisely, an application can be vulnerable when all the following are true: * the application is using Spring MVC or Spring WebFlux * the application is serving static reso...

Vendor: VMware
Product: Spring Framework
Published: Apr 29, 2026
Source: NVD

Spring MVC and WebFlux applications are vulnerable to cache poisoning when resolving static resources. More precisely, an application can be vulnerable when all the following are true: * the application is using Spring MVC or Spring WebFlux * the application is configuring the  resource cha...

Vendor: VMware
Product: Spring Framework
Published: Apr 29, 2026
Source: NVD

A WebFlux server application that processes multipart requests creates temp files for parts larger than 10 K. Under some circumstances, temp files may remain not deleted after the request is fully processed. This allows an attacker to consume available disk space. Older, unsupported versions are al...

Vendor: VMware
Product: Spring Framework
Published: Apr 29, 2026
Source: NVD
CVE-2026-4019 MEDIUM - 5.3

The Complianz – GDPR/CCPA Cookie Consent plugin for WordPress is vulnerable to unauthorized data access in all versions up to, and including, 7.4.5 This is due to the REST API endpoint at /wp-json/complianz/v1/consent-area/{post_id}/{block_id} using __return_true as the permission_callback, allowing...

Published: Apr 29, 2026
Source: NVD

This vulnerability exists in e-Sushrut due to disclosure of sensitive information and hardcoded AES encryption keys in client-side JavaScript. An unauthenticated remote attacker could exploit this vulnerability by accessing the client-side code to extract sensitive information and cryptographic keys...

Vendor: CDAC-Noida
Product: e-Sushrut, Hospital Management Information System (HMIS)
Published: Apr 29, 2026
Source: NVD

This vulnerability exists in e-Sushrut due to the use of reversible Base64 encoding for protecting sensitive data. An authenticated attacker could exploit this vulnerability by decoding and manipulating Base64-encoded parameters in the request URL to gain unauthorized access to sensitive information...

Vendor: CDAC-Noida
Product: e-Sushrut, Hospital Management Information System (HMIS)
Published: Apr 29, 2026
Source: NVD

This vulnerability exists in e-Sushrut due to improper authorization checks during resource access. An authenticated attacker could exploit this vulnerability by manipulating encoded parameters in the request URL to gain unauthorized access to patient accounts on the targeted system.

Vendor: CDAC-Noida
Product: e-Sushrut, Hospital Management Information System (HMIS)
Published: Apr 29, 2026
Source: NVD

This vulnerability exists in e-Sushrut due to improper access control in resource access validation. An authenticated attacker could exploit this vulnerability by manipulating parameter in the API request URL to gain unauthorized access to sensitive information of patients on the targeted system.

Vendor: CDAC-Noida
Product: e-Sushrut, Hospital Management Information System (HMIS)
Published: Apr 29, 2026
Source: NVD

This vulnerability exists in e-Sushrut due to exposure of OTPs in plaintext within API responses. A remote attacker could exploit this vulnerability by intercepting API responses containing valid OTPs. Successful exploitation of this vulnerability could allow an attacker to impersonate the target u...

Vendor: CDAC-Noida
Product: e-Sushrut, Hospital Management Information System (HMIS)
Published: Apr 29, 2026
Source: NVD

This vulnerability exists in e-Sushrut due to improper authentication logic that relies on client-side response parameters to determine authentication status. A remote attacker could exploit this vulnerability by intercepting and modifying the server response. Successful exploitation of this vuln...

Vendor: CDAC-Noida
Product: e-Sushrut, Hospital Management Information System (HMIS)
Published: Apr 29, 2026
Source: NVD
CVE-2026-42412 MEDIUM - 6.5

Missing Authorization vulnerability in weDevs WP User Frontend allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects WP User Frontend: from n/a through 4.3.1.

Vendor: weDevs
Product: WP User Frontend
Published: Apr 29, 2026
Source: NVD