Total CVEs

125,574

Critical Severity

2,253

High Severity

7,771

Last 7 Days

1,121
Quick preset (or use dates below)
Clear Filters
📅 Showing Year: 2026 (January 1 - December 31, 2026) View All Years →
Showing 61 - 80 of 21,979 CVEs

Ollama for Windows contains a Remote Code Execution vulnerability in its update mechanism due to improper handling of attacker‑controlled HTTP response headers. When downloading updates, the application constructs local file paths using values derived from HTTP headers without validation. These valu...

Vendor: Ollama
Product: Ollama
Published: Apr 29, 2026
Source: NVD

Ollama for Windows does not perform integrity or authenticity verification of downloaded update executables. Unlike other platforms, the Windows implementation of the update verification routine unconditionally returns success so no digital signature or trust validation is performed before staging o...

Vendor: Ollama
Product: Ollama
Published: Apr 29, 2026
Source: NVD
CVE-2026-2902 MEDIUM - 6.1

The WP Meteor Website Speed Optimization Addon plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'frontend_rewrite' function's 'WPMETEOR[N]WPMETEOR' placeholder content in all versions up to, and including, 3.4.16 due to insufficient input sanitizatio...

Published: Apr 29, 2026
Source: NVD
CVE-2026-22745 MEDIUM - 5.3

Spring MVC and WebFlux applications are vulnerable to Denial of Service attacks when resolving static resources. More precisely, an application can be vulnerable when all the following are true: * the application is using Spring MVC or Spring WebFlux * the application is serving static reso...

Vendor: VMware
Product: Spring Framework
Published: Apr 29, 2026
Source: NVD

Spring MVC and WebFlux applications are vulnerable to cache poisoning when resolving static resources. More precisely, an application can be vulnerable when all the following are true: * the application is using Spring MVC or Spring WebFlux * the application is configuring the  resource cha...

Vendor: VMware
Product: Spring Framework
Published: Apr 29, 2026
Source: NVD

A WebFlux server application that processes multipart requests creates temp files for parts larger than 10 K. Under some circumstances, temp files may remain not deleted after the request is fully processed. This allows an attacker to consume available disk space. Older, unsupported versions are al...

Vendor: VMware
Product: Spring Framework
Published: Apr 29, 2026
Source: NVD
CVE-2026-4019 MEDIUM - 5.3

The Complianz – GDPR/CCPA Cookie Consent plugin for WordPress is vulnerable to unauthorized data access in all versions up to, and including, 7.4.5 This is due to the REST API endpoint at /wp-json/complianz/v1/consent-area/{post_id}/{block_id} using __return_true as the permission_callback, allowing...

Published: Apr 29, 2026
Source: NVD

This vulnerability exists in e-Sushrut due to disclosure of sensitive information and hardcoded AES encryption keys in client-side JavaScript. An unauthenticated remote attacker could exploit this vulnerability by accessing the client-side code to extract sensitive information and cryptographic keys...

Vendor: CDAC-Noida
Product: e-Sushrut, Hospital Management Information System (HMIS)
Published: Apr 29, 2026
Source: NVD

This vulnerability exists in e-Sushrut due to the use of reversible Base64 encoding for protecting sensitive data. An authenticated attacker could exploit this vulnerability by decoding and manipulating Base64-encoded parameters in the request URL to gain unauthorized access to sensitive information...

Vendor: CDAC-Noida
Product: e-Sushrut, Hospital Management Information System (HMIS)
Published: Apr 29, 2026
Source: NVD

This vulnerability exists in e-Sushrut due to improper authorization checks during resource access. An authenticated attacker could exploit this vulnerability by manipulating encoded parameters in the request URL to gain unauthorized access to patient accounts on the targeted system.

Vendor: CDAC-Noida
Product: e-Sushrut, Hospital Management Information System (HMIS)
Published: Apr 29, 2026
Source: NVD

This vulnerability exists in e-Sushrut due to improper access control in resource access validation. An authenticated attacker could exploit this vulnerability by manipulating parameter in the API request URL to gain unauthorized access to sensitive information of patients on the targeted system.

Vendor: CDAC-Noida
Product: e-Sushrut, Hospital Management Information System (HMIS)
Published: Apr 29, 2026
Source: NVD

This vulnerability exists in e-Sushrut due to exposure of OTPs in plaintext within API responses. A remote attacker could exploit this vulnerability by intercepting API responses containing valid OTPs. Successful exploitation of this vulnerability could allow an attacker to impersonate the target u...

Vendor: CDAC-Noida
Product: e-Sushrut, Hospital Management Information System (HMIS)
Published: Apr 29, 2026
Source: NVD

This vulnerability exists in e-Sushrut due to improper authentication logic that relies on client-side response parameters to determine authentication status. A remote attacker could exploit this vulnerability by intercepting and modifying the server response. Successful exploitation of this vuln...

Vendor: CDAC-Noida
Product: e-Sushrut, Hospital Management Information System (HMIS)
Published: Apr 29, 2026
Source: NVD
CVE-2026-42412 MEDIUM - 6.5

Missing Authorization vulnerability in weDevs WP User Frontend allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects WP User Frontend: from n/a through 4.3.1.

Vendor: weDevs
Product: WP User Frontend
Published: Apr 29, 2026
Source: NVD

SQL injection (SQLi) in MegaCMS v12.0.0, specifically in the “id_territorio” parameter of the “/web_comunications/cms/get_provincias” endpoint. The vulnerability arises from inadequate validation and sanitisation of user input. Specifically, via a POST request, the “id_territorio” parameter, used im...

Published: Apr 29, 2026
Source: NVD
CVE-2025-10503 MEDIUM - 6.1

The authentication endpoint accepts user-supplied input without enforcing expected validation constraints, leading to a lack of proper output encoding. This allows for the injection of malicious JavaScript payloads, enabling reflected cross-site scripting. An attacker can leverage this vulnerabilit...

Vendor: WSO2
Product: WSO2 Identity Server
Published: Apr 29, 2026
Source: NVD
CVE-2026-42377 HIGH - 7.3

Missing Authorization vulnerability in Brainstorm Force SureForms Pro allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects SureForms Pro: from n/a through 2.8.0.

Vendor: Brainstorm Force
Product: SureForms Pro
Published: Apr 29, 2026
Source: NVD
CVE-2026-35155 HIGH - 7.1

Dell iDRAC10, versions 1.20.70.50 and 1.30.05.10, contains an Insufficiently Protected Credentials vulnerability. A race condition vulnerability exists that could allow an authenticated low‑privileged attacker to gain elevated access.

Vendor: Dell
Product: iDRAC10
Published: Apr 29, 2026
Source: NVD

Insufficient verification of data authenticity in PackageManagerService prior to SMR Mar-2026 Release 1 allows local attackers to modify the installation restriction of specific application.

Vendor: Samsung Mobile
Product: Samsung Mobile Devices
Published: Apr 29, 2026
Source: NVD
CVE-2026-42615 HIGH - 7.2

GCHQ CyberChef before 11.0.0 allows XSS via Show Base64 offsets, as demonstrated by the /#recipe=Show_Base64_offsets('%3Cscript substring.

Vendor: GCHQ
Product: CyberChef
Published: Apr 29, 2026
Source: NVD