Total CVEs

125,728

Critical Severity

2,261

High Severity

7,831

Last 7 Days

1,201
Quick preset (or use dates below)
Clear Filters
📅 Showing Year: 2026 (January 1 - December 31, 2026) View All Years →
Showing 1,201 - 1,220 of 22,133 CVEs
CVE-2026-41495 MEDIUM - 5.3

n8n-MCP Logs Sensitive Request Data on Unauthorized /mcp Requests

Vendor: npm
Product: n8n-mcp
Published: Apr 23, 2026
Source: GitHub
CVE-2026-39440 CRITICAL - 9.9

Improper Control of Generation of Code ('Code Injection') vulnerability in Funnelforms LLC FunnelFormsPro allows Remote Code Inclusion.This issue affects FunnelFormsPro: from n/a through 3.8.1.

Vendor: Funnelforms LLC
Product: FunnelFormsPro
Published: Apr 23, 2026
Source: NVD
CVE-2025-66286 MEDIUM - 4.7

An API design flaw in WebKitGTK and WPE WebKit allows untrusted web content to unexpectedly perform IP connections, DNS lookups, and HTTP requests. Applications expect to use the WebPage::send-request signal handler to approve or reject all network requests. However, certain types of HTTP requests b...

Vendor: Red Hat
Product: Red Hat Enterprise Linux 6, Red Hat Enterprise Linux 7, Red Hat Enterprise Linux 8, Red Hat Enterprise Linux 9
Published: Apr 23, 2026
Source: NVD
CVE-2025-13763 MEDIUM - 5.7

Multiple uses of uninitialized variables were found in libopensc that may lead to information disclosure or application crash. An attack requires a crafted USB device or smart card that would present the system with specially crafted responses to the APDUs

Vendor: OpenSC, Red Hat
Product: OpenSC, Red Hat Enterprise Linux 10, Red Hat Enterprise Linux 7, Red Hat Enterprise Linux 8, Red Hat Enterprise Linux 9
Published: Apr 23, 2026
Source: NVD
CVE-2026-31532 HIGH - 7.8

In the Linux kernel, the following vulnerability has been resolved: can: raw: fix ro->uniq use-after-free in raw_rcv() raw_release() unregisters raw CAN receive filters via can_rx_unregister(), but receiver deletion is deferred with call_rcu(). This leaves a window where raw_rcv() may still be ...

Vendor: Linux
Product: Linux
Published: Apr 23, 2026
Source: NVD
CVE-2026-31531 MEDIUM - 5.5

In the Linux kernel, the following vulnerability has been resolved: ipv4: nexthop: allocate skb dynamically in rtm_get_nexthop() When querying a nexthop object via RTM_GETNEXTHOP, the kernel currently allocates a fixed-size skb using NLMSG_GOODSIZE. While sufficient for single nexthops and small E...

Vendor: Linux
Product: Linux
Published: Apr 23, 2026
Source: NVD
CVE-2026-28040 MEDIUM - 6.5

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Magepeople inc. Taxi Booking Manager for WooCommerce allows Stored XSS.This issue affects Taxi Booking Manager for WooCommerce: from n/a through 2.0.0.

Vendor: Magepeople inc.
Product: Taxi Booking Manager for WooCommerce
Published: Apr 23, 2026
Source: NVD
CVE-2025-62110 MEDIUM - 6.5

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Rescue Themes Rescue Shortcodes allows Stored XSS.This issue affects Rescue Shortcodes: from n/a through 3.3.

Vendor: Rescue Themes
Product: Rescue Shortcodes
Published: Apr 23, 2026
Source: NVD
CVE-2025-62104 MEDIUM - 4.3

Missing Authorization vulnerability in Navneil Naicker ACF Galerie 4 allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects ACF Galerie 4: from n/a through 1.4.2.

Vendor: Navneil Naicker
Product: ACF Galerie 4
Published: Apr 23, 2026
Source: NVD
CVE-2026-6903 HIGH - 7.5

The LabOne Web Server, backing the LabOne User Interface, contains insufficient input validation in its file access functionality. An unauthenticated attacker could exploit this vulnerability to read arbitrary files on the host system that are accessible to the operating system user running the LabO...

Published: Apr 23, 2026
Source: NVD
CVE-2026-6887 CRITICAL - 9.8

Borg SPM 2007 (Sales Ended in 2008) developed by BorG Technology Corporation has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read, modify, and delete database contents.

Published: Apr 23, 2026
Source: NVD
CVE-2026-6886 CRITICAL - 9.8

Borg SPM 2007 (Sales Ended in 2008) developed by BorG Technology Corporation has a Authentication Bypass vulnerability, allowing unauthenticated remote attackers to log into the system as any user.

Published: Apr 23, 2026
Source: NVD
CVE-2026-6885 CRITICAL - 9.8

Borg SPM 2007 (Sales Ended in 2008) developed by BorG Technology Corporation has an Arbitrary File Upload vulnerability, allowing unauthenticated remote attackers to upload and execute web shell backdoors, thereby enabling arbitrary code execution on the server.

Published: Apr 23, 2026
Source: NVD
CVE-2026-5464 HIGH - 7.2

The ExactMetrics – Google Analytics Dashboard for WordPress (Website Stats Plugin) plugin for WordPress is vulnerable to unauthorized arbitrary plugin installation and activation in all versions up to, and including, 9.1.2. This is due to the reports page exposing the 'onboarding_key' tran...

Published: Apr 23, 2026
Source: NVD
CVE-2026-3960 MEDIUM - 5.9

A critical remote code execution vulnerability exists in the unauthenticated REST API endpoint /99/ImportSQLTable in H2O-3 version 3.46.0.9 and prior. The vulnerability arises due to insufficient security controls in the parameter blacklist mechanism, which only targets MySQL JDBC driver-specific da...

Published: Apr 23, 2026
Source: NVD

A Generation of Error Message Containing Sensitive Information vulnerability in the Materialized View Refresh mechanism in Google BigQuery on Google Cloud Platform allows an authenticated user to potentially disclose sensitive data using a crafted materialized view that triggers a runtime error duri...

Published: Apr 23, 2026
Source: NVD
CVE-2026-41564 HIGH - 7.5

CryptX versions before 0.088 for Perl do not reseed the Crypt::PK PRNG state after forking. The Crypt::PK::RSA, Crypt::PK::DSA, Crypt::PK::DH, Crypt::PK::ECC, Crypt::PK::Ed25519 and Crypt::PK::X25519 modules seed a per-object PRNG state in their constructors and reuse it without fork detection. A C...

Vendor: MIK
Product: CryptX
Published: Apr 23, 2026
Source: NVD
CVE-2026-4512 LOW - 3.5

The reCaptcha by WebDesignBy WordPress plugin before 2.0 does not sanitize or escape the Site Key setting before outputting it in a JavaScript string context via the grecaptcha_js() function. This allows administrators on multisite installations (who do not have the unfiltered_html capability) to in...

Published: Apr 23, 2026
Source: NVD
CVE-2026-4106 MEDIUM - 5.3

The HT Mega Addons for Elementor WordPress plugin before 3.0.7 contains an unauthenticated AJAX action returning some PII (such as full name, city, state and country) of customers who placed orders in the last 7 days

Published: Apr 23, 2026
Source: NVD
CVE-2026-41040 HIGH - 7.5

GROWI provided by GROWI, Inc. is vulnerable to a regular expression denial of service (ReDoS) via a crafted input string.

Vendor: GROWI, Inc.
Product: GROWI
Published: Apr 23, 2026
Source: NVD