| CVE-2026-35227 |
Improper resource management in CODESYS Modbus TCP Server |
12.05.2026 |
|
| CVE-2026-0541 |
|
12.05.2026 |
6.7 |
| CVE-2026-0802 |
|
12.05.2026 |
6 |
| CVE-2026-0804 |
|
12.05.2026 |
6.7 |
| CVE-2026-1185 |
|
12.05.2026 |
5.4 |
| CVE-2026-1681 |
net: Stack Overflow with Ping (to own IP Address) via Shell |
12.05.2026 |
6.1 |
| CVE-2026-41530 |
|
12.05.2026 |
|
| CVE-2026-41872 |
|
12.05.2026 |
|
| CVE-2026-45430 |
|
12.05.2026 |
7.1 |
| CVE-2026-7255 |
|
12.05.2026 |
6.5 |
| CVE-2026-7256 |
|
12.05.2026 |
8.8 |
| CVE-2026-7257 |
|
12.05.2026 |
4.4 |
| CVE-2026-7287 |
|
12.05.2026 |
7.5 |
| CVE-2026-0502 |
Cross Site Request Forgery (CSRF) in SAP BusinessObjects Business Intelligence Platform |
12.05.2026 |
5.4 |
| CVE-2026-27682 |
Reflected Cross-Site Scripting (XSS) vulnerability in SAP NetWeaver Application Server ABAP (Applications based on Business Server Pages) |
12.05.2026 |
4.7 |
| CVE-2026-34258 |
Content Spoofing vulnerability in SAPUI5 (Search UI) |
12.05.2026 |
4.7 |
| CVE-2026-34259 |
OS Command Injection Vulnerability in SAP Forecasting & Replenishment |
12.05.2026 |
8.2 |
| CVE-2026-34260 |
SQL injection vulnerability in SAP S/4HANA (SAP Enterprise Search for ABAP) |
12.05.2026 |
9.6 |
| CVE-2026-34263 |
Missing authentication check in SAP Commerce cloud configuration |
12.05.2026 |
9.6 |
| CVE-2026-40129 |
Code Injection vulnerability in SAP Application Server ABAP for SAP NetWeaver and ABAP Platform |
12.05.2026 |
4.3 |
| CVE-2026-40131 |
SQL Injection vulnerability in SAP HANA Deployment Infrastructure (HDI) deploy library |
12.05.2026 |
3.4 |
| CVE-2026-40132 |
Missing Authorization Check in SAP Strategic Enterprise Management (BSP application Balanced Scorecard Wizard) |
12.05.2026 |
5.4 |
| CVE-2026-40133 |
Missing Authorization check in SAP S/4HANA Condition Maintenance |
12.05.2026 |
6.3 |
| CVE-2026-40134 |
Missing Authorization Check in SAP Incentive and Commission Management |
12.05.2026 |
4.3 |
| CVE-2026-40135 |
OS Command Injection vulnerability in SAP NetWeaver Application Server for ABAP and ABAP Platform |
12.05.2026 |
6.5 |
| CVE-2026-40136 |
Denial of service (DoS) in SAP Financial Consolidation |
12.05.2026 |
4.3 |
| CVE-2026-40137 |
Cross-Site Scripting (XSS) vulnerability in Business Server Pages Application (TAF_APPLAUNCHER) |
12.05.2026 |
6.1 |
| CVE-2026-45391 |
|
12.05.2026 |
|
| CVE-2026-45392 |
|
12.05.2026 |
|
| CVE-2026-45393 |
|
12.05.2026 |
|
| CVE-2026-45321 |
Malware in 42 @tanstack/* packages exfiltrates cloud credentials, GitHub tokens, and SSH keys |
12.05.2026 |
9.6 |
| CVE-2026-45362 |
|
12.05.2026 |
3.2 |
| CVE-2026-8349 |
omec-project amf NGAP Message memory corruption |
11.05.2026 |
|
| CVE-2026-8346 |
D-Link DIR-816 portForward command injection |
11.05.2026 |
|
| CVE-2026-34963 |
barebox EFI PE Loader Memory Safety Vulnerabilities |
11.05.2026 |
8.4 |
| CVE-2026-34962 |
barebox ext4 Directory Parsing Infinite Loop Denial of Service |
11.05.2026 |
6.2 |
| CVE-2026-42554 |
Fiber: XSS in AutoFormat Content Negotiation |
11.05.2026 |
|
| CVE-2026-43899 |
DeepChat: Incomplete Fix for CVE-2025-55733 leads to Remote Code Execution via Markdown Links bypassing `isValidExternalUrl` |
11.05.2026 |
9.6 |
| CVE-2026-43900 |
DeepChat: Persistent DOM XSS via HTML Entity Encoding in `<antArtifact>` SVG Rendering (Bypass of `svgSanitizer.ts`) |
11.05.2026 |
9.3 |
| CVE-2026-43901 |
Wireshark MCP: Arbitrary file write via export_objects when WIRESHARK_MCP_ALLOWED_DIRS is not configured |
11.05.2026 |
6.8 |
| CVE-2026-43911 |
Vaultwarden: Refresh tokens not invalidated on security stamp rotation |
11.05.2026 |
6.8 |
| CVE-2026-43912 |
Vaultwarden: Cross-Org Group Binding Enables Unauthorized Read And Write Access Into Another Organization |
11.05.2026 |
8.7 |
| CVE-2026-43913 |
Vaultwarden: Unconfirmed Owner Can Purge Entire Organization Vault |
11.05.2026 |
8.1 |
| CVE-2026-43914 |
Vaultwarden: Brute-force protection bypass vulnerability |
11.05.2026 |
7.3 |
| CVE-2026-8345 |
D-Link DIR-816 singlePortForward sub_445E7C command injection |
11.05.2026 |
|
| CVE-2026-34961 |
barebox ext4 Extent Parsing Out-of-Bounds Read |
11.05.2026 |
6.2 |
| CVE-2026-42046 |
libcaca: Heap OOB write in canvas import functions caused by int overflow |
11.05.2026 |
7.8 |
| CVE-2026-42188 |
Geyser: Server-Side Request Forgery (SSRF) via Player Head Texture URL |
11.05.2026 |
2.4 |
| CVE-2026-42564 |
jotty·page: Unauthenticated Path Traversal leads to sensitive file disclosure and session-token reuse impact |
11.05.2026 |
8.2 |
| CVE-2026-43886 |
Outline: OAuth Scope Validation Logic Error Allows Privilege Escalation to Wildcard API Access |
11.05.2026 |
8.2 |
| CVE-2026-43887 |
Outline: Stored XSS via Comment Mentions |
11.05.2026 |
7.3 |
| CVE-2026-43888 |
Outline: Zip Extraction Path Escape via PATH_MAX Truncation in Collection Import |
11.05.2026 |
8.7 |
| CVE-2026-43889 |
Outline: Unauthorized Document Publication via Mixed collectionId+documentId Share |
11.05.2026 |
6.5 |
| CVE-2026-43890 |
Outline: IDOR in subscriptions.create allows cross-tenant subscription on private documents (sibling of GHSA-23jj-rp48-w7q7) |
11.05.2026 |
7.7 |
| CVE-2026-43897 |
Link Preview JS: vunerable to IPv6 and internal loopback attacks |
11.05.2026 |
|
| CVE-2026-44695 |
Outline: Slack OAuth state can link a victim Outline account to an attacker Slack identity |
11.05.2026 |
5.8 |
| CVE-2026-7010 |
HTTP::Tiny versions before 0.093 for Perl do not validate CRLF in HTTP request lines or control field header values |
11.05.2026 |
|
| CVE-2026-8344 |
D-Link DIR-816 formDMZ.cgi sub_445E7C command injection |
11.05.2026 |
|
| CVE-2026-34960 |
barebox Out-of-Bounds Read in DHCP Option Parsing |
11.05.2026 |
6.5 |
| CVE-2026-42600 |
MinIO: Path Traversal via msgpack Body in `ReadMultiple` Storage-REST Endpoint |
11.05.2026 |
|
| CVE-2026-43873 |
WWBN AVideo: Unauthenticated Disclosure of CloneSite `myKey` via Error Echo in `cloneClient.json.php` Enables Cross-Site DB Dump of the Configured Clone Server |
11.05.2026 |
7.5 |
| CVE-2026-43875 |
WWBN AVideo: Password Hash Leaked in MobileManager OAuth Redirect URL Enables Account Takeover |
11.05.2026 |
6.8 |
| CVE-2026-43876 |
WWBN AVideo: HTML Injection in notifySubscribers.json.php Enables Platform-Branded Phishing Emails to Channel Subscribers |
11.05.2026 |
6.4 |
| CVE-2026-43877 |
WWBN AVideo: CSRF in userSavePhoto.php Allows Cross-Origin Overwrite of Any Logged-in User's Profile Photo with Arbitrary Bytes |
11.05.2026 |
5.4 |
| CVE-2026-43878 |
WWBN AVideo: Reflected XSS in plugin/Meet/iframe.php via Unescaped `user`/`pass` Parameters Reflected into JavaScript String Literal |
11.05.2026 |
6.1 |
| CVE-2026-43879 |
WWBN AVideo: Blind SSRF in YPTWallet Donation Webhook via Missing isSSRFSafeURL() Check and CURLOPT_FOLLOWLOCATION Redirect Bypass |
11.05.2026 |
5.4 |
| CVE-2026-43880 |
WWBN AVideo: Unauthenticated Arbitrary Email Sending via sendEmail.json.php Allows Phishing from Site's Legitimate From Address |
11.05.2026 |
5.3 |
| CVE-2026-43881 |
WWBN AVideo: Unauthenticated User Enumeration in `objects/users.json.php` via `isCompany` Parameter Flips `$ignoreAdmin = true` and Defeats Admin-Only Listing Guard |
11.05.2026 |
5.3 |
| CVE-2026-43882 |
WWBN AVideo: Unauthenticated CRLF/ICS Injection in Scheduler downloadICS.php Allows Calendar Event Spoofing |
11.05.2026 |
4.3 |
| CVE-2026-43883 |
WWBN AVideo: IDOR in PayPalYPT agreementCancel.json.php Allows Any Authenticated User to Cancel Arbitrary PayPal Subscription Agreements |
11.05.2026 |
4.2 |
| CVE-2026-43884 |
WWBN AVideo: SSRF Protection Bypass via HTTP Redirect and DNS Rebinding in isSSRFSafeURL() |
11.05.2026 |
7.7 |
| CVE-2026-43885 |
WWBN AVideo: Exposure of Sensitive Information to an Unauthorized Actor and Missing Authorization |
11.05.2026 |
|
| CVE-2026-43893 |
exiftool-vendored: Argument injection via newline characters in tag names |
11.05.2026 |
8.2 |
| CVE-2026-20696 |
|
11.05.2026 |
|
| CVE-2026-28819 |
|
11.05.2026 |
|
| CVE-2026-28830 |
|
11.05.2026 |
|
| CVE-2026-28840 |
|
11.05.2026 |
|
| CVE-2026-28846 |
|
11.05.2026 |
|
| CVE-2026-28847 |
|
11.05.2026 |
|
| CVE-2026-28848 |
|
11.05.2026 |
|
| CVE-2026-28860 |
|
11.05.2026 |
|
| CVE-2026-28872 |
|
11.05.2026 |
|
| CVE-2026-28873 |
|
11.05.2026 |
|
| CVE-2026-28883 |
|
11.05.2026 |
|
| CVE-2026-28897 |
|
11.05.2026 |
|
| CVE-2026-28901 |
|
11.05.2026 |
|
| CVE-2026-28902 |
|
11.05.2026 |
|
| CVE-2026-28903 |
|
11.05.2026 |
|
| CVE-2026-28904 |
|
11.05.2026 |
|
| CVE-2026-28905 |
|
11.05.2026 |
|
| CVE-2026-28906 |
|
11.05.2026 |
|
| CVE-2026-28907 |
|
11.05.2026 |
|
| CVE-2026-28908 |
|
11.05.2026 |
|
| CVE-2026-28910 |
|
11.05.2026 |
|
| CVE-2026-28913 |
|
11.05.2026 |
|
| CVE-2026-28914 |
|
11.05.2026 |
|
| CVE-2026-28915 |
|
11.05.2026 |
|
| CVE-2026-28917 |
|
11.05.2026 |
|
| CVE-2026-28918 |
|
11.05.2026 |
|
| CVE-2026-28919 |
|
11.05.2026 |
|
| CVE-2026-28920 |
|
11.05.2026 |
|
| CVE-2026-28922 |
|
11.05.2026 |
|
| CVE-2026-28923 |
|
11.05.2026 |
|
| CVE-2026-28924 |
|
11.05.2026 |
|
| CVE-2026-28925 |
|
11.05.2026 |
|
| CVE-2026-28929 |
|
11.05.2026 |
|
| CVE-2026-28930 |
|
11.05.2026 |
|
| CVE-2026-28936 |
|
11.05.2026 |
|
| CVE-2026-28940 |
|
11.05.2026 |
|
| CVE-2026-28941 |
|
11.05.2026 |
|
| CVE-2026-28942 |
|
11.05.2026 |
|
| CVE-2026-28943 |
|
11.05.2026 |
|
| CVE-2026-28944 |
|
11.05.2026 |
|
| CVE-2026-28946 |
|
11.05.2026 |
|
| CVE-2026-28947 |
|
11.05.2026 |
|
| CVE-2026-28951 |
|
11.05.2026 |
|
| CVE-2026-28952 |
|
11.05.2026 |
|
| CVE-2026-28953 |
|
11.05.2026 |
|
| CVE-2026-28954 |
|
11.05.2026 |
|
| CVE-2026-28955 |
|
11.05.2026 |
|
| CVE-2026-28956 |
|
11.05.2026 |
|
| CVE-2026-28957 |
|
11.05.2026 |
|
| CVE-2026-28958 |
|
11.05.2026 |
|
| CVE-2026-28959 |
|
11.05.2026 |
|
| CVE-2026-28961 |
|
11.05.2026 |
|
| CVE-2026-28962 |
|
11.05.2026 |
|
| CVE-2026-28963 |
|
11.05.2026 |
|
| CVE-2026-28964 |
|
11.05.2026 |
|
| CVE-2026-28965 |
|
11.05.2026 |
|
| CVE-2026-28967 |
|
11.05.2026 |
|
| CVE-2026-28969 |
|
11.05.2026 |
|
| CVE-2026-28971 |
|
11.05.2026 |
|
| CVE-2026-28972 |
|
11.05.2026 |
|
| CVE-2026-28974 |
|
11.05.2026 |
|
| CVE-2026-28976 |
|
11.05.2026 |
|
| CVE-2026-28977 |
|
11.05.2026 |
|
| CVE-2026-28978 |
|
11.05.2026 |
|
| CVE-2026-28983 |
|
11.05.2026 |
|
| CVE-2026-28985 |
|
11.05.2026 |
|
| CVE-2026-28986 |
|
11.05.2026 |
|
| CVE-2026-28987 |
|
11.05.2026 |
|
| CVE-2026-28988 |
|
11.05.2026 |
|
| CVE-2026-28990 |
|
11.05.2026 |
|
| CVE-2026-28991 |
|
11.05.2026 |
|
| CVE-2026-28992 |
|
11.05.2026 |
|
| CVE-2026-28993 |
|
11.05.2026 |
|
| CVE-2026-28994 |
|
11.05.2026 |
|
| CVE-2026-28995 |
|
11.05.2026 |
|
| CVE-2026-28996 |
|
11.05.2026 |
|
| CVE-2026-37630 |
|
11.05.2026 |
|
| CVE-2026-39869 |
|
11.05.2026 |
|
| CVE-2026-39870 |
|
11.05.2026 |
|
| CVE-2026-39871 |
|
11.05.2026 |
|
| CVE-2026-41489 |
Pi-hole: Local privilege escalation via config-controlled path in root-executed service hooks |
11.05.2026 |
8.8 |
| CVE-2026-42888 |
Audiobookshelf: Path Traversal vulnerability in the audiobookshelf project |
11.05.2026 |
|
| CVE-2026-43652 |
|
11.05.2026 |
|
| CVE-2026-43653 |
|
11.05.2026 |
|
| CVE-2026-43654 |
|
11.05.2026 |
|
| CVE-2026-43655 |
|
11.05.2026 |
|
| CVE-2026-43656 |
|
11.05.2026 |
|
| CVE-2026-43658 |
|
11.05.2026 |
|
| CVE-2026-43659 |
|
11.05.2026 |
|
| CVE-2026-43660 |
|
11.05.2026 |
|
| CVE-2026-43661 |
|
11.05.2026 |
|
| CVE-2026-43666 |
|
11.05.2026 |
|
| CVE-2026-43668 |
|
11.05.2026 |
|
| CVE-2026-43874 |
WWBN AVideo: Incomplete Fix for YPTSocket autoEvalCodeOnHTML Strip: Unauthenticated Cross-User JavaScript Execution via `$msg['json']` Relay Bypass |
11.05.2026 |
7.2 |
| CVE-2026-36734 |
|
11.05.2026 |
|
| CVE-2026-42050 |
ImageMagick: Stack buffer overflow in XTileImage |
11.05.2026 |
5.5 |
| CVE-2026-42882 |
oxyno-zeta/s3-proxy: Security Issues in Resource Path Matching |
11.05.2026 |
9.4 |
| CVE-2026-42883 |
Audiobookshelf: Cross-library file exfiltration via unscoped bulk download endpoint |
11.05.2026 |
6.5 |
| CVE-2026-42884 |
Audiobookshelf: Collection endpoints bypass library access controls exposing restricted library data |
11.05.2026 |
4.3 |
| CVE-2026-42885 |
Audiobookshelf: Path prefix bypass in filesystem existence check leaks out-of-scope file existence |
11.05.2026 |
4.3 |
| CVE-2026-42886 |
Audiobookshelf: Memory amplification DoS via oversized compressed details entry in backup upload |
11.05.2026 |
4.9 |
| CVE-2026-42887 |
Audiobookshelf: Stored Cross-Site Scripting in Login Page Custom Message |
11.05.2026 |
4.5 |
| CVE-2026-8320 |
jishenghua jshERP updatePlatformConfigByKey Endpoint UserService.java getUserByWeixinCode server-side request forgery |
11.05.2026 |
|
| CVE-2026-8321 |
inkeep agents runAuth Middleware runAuth.ts createDevContext authentication bypass |
11.05.2026 |
|
| CVE-2022-4988 |
Alien::FreeImage versions through 1.001 for Perl contains several vulnerable libraries |
11.05.2026 |
|
| CVE-2026-2614 |
Arbitrary File Read via Prompt Tag Source Validation Bypass in mlflow/mlflow |
11.05.2026 |
|
| CVE-2026-42565 |
@workos/authkit-session: Open Redirect via state-derived redirect target |
11.05.2026 |
4.3 |
| CVE-2026-42869 |
SOCFortress CoPilot: Hardcoded JWT secret allows unauthenticated full admin compromise and lateral movement into all integrated SOC tools |
11.05.2026 |
10 |
| CVE-2026-42870 |
WeGIA: Cross-Site Scripting (XSS) Stored endpoint 'informacao_adicional.php' parameter 'descricao' |
11.05.2026 |
|
| CVE-2026-42872 |
WeGIA: Reflected XSS in listar_arquivos_etapa.php |
11.05.2026 |
6.1 |
| CVE-2026-42873 |
WeGIA: Error Handling Upload DocDependente |
11.05.2026 |
0 |
| CVE-2026-42874 |
Microdot: HTTP response splitting in Response.set_cookie() |
11.05.2026 |
3.7 |
| CVE-2026-42875 |
External Secrets Operator: Namespace Isolation Bypass in CAProvider ConfigMap Resolution for SecretStore |
11.05.2026 |
|
| CVE-2026-42876 |
External Secrets Operator: Priviledge escalation with secret overwriting |
11.05.2026 |
4.9 |
| CVE-2026-45025 |
WeGIA: Stored XSS in html/atendido/etapa_processo.php |
11.05.2026 |
6.8 |
| CVE-2026-45026 |
WeGIA: Stored XSS in html/atendido/processo_aceitacao.php |
11.05.2026 |
6.8 |
| CVE-2026-6146 |
Amazon::Credentials versions through 1.2.0 for Perl uses rand to generate encryption keys |
11.05.2026 |
|
| CVE-2026-8319 |
aiwaves-cn agents cheshire_cat_core stray_cat.py recall_relevant_memories_to_working_memory resource consumption |
11.05.2026 |
|
| CVE-2026-42864 |
FireFighter: Unauthenticated SSRF in Raid jira_bot endpoint allows IAM credential theft |
11.05.2026 |
9.9 |
| CVE-2026-42866 |
Tookie: Arbitrary file write via path traversal in -u username / -U userfile output filename |
11.05.2026 |
|
| CVE-2026-42871 |
WeGIA: Error Handling familiar_docfamiliar |
11.05.2026 |
|
| CVE-2026-43968 |
CR Injection in SSE Encoder Enables Event Splitting via cow_sse:event/1 |
12.05.2026 |
|
| CVE-2026-43969 |
Cookie Request Header Injection via Unvalidated Encoder in cow_cookie:cookie/1 |
12.05.2026 |
|
| CVE-2026-45222 |
Summarize Insecure Daemon Configuration File Permissions |
11.05.2026 |
|
| CVE-2026-45223 |
Crabbox < 0.9.0 Authentication Bypass via Admin Claim Injection |
11.05.2026 |
|
| CVE-2026-45224 |
Crabbox < 0.9.0 Path Traversal via Islo Provider Workspace Resolution |
11.05.2026 |
|
| CVE-2026-7790 |
Unbounded chunk-size hex digits in cowlib cause quadratic CPU and memory DoS |
12.05.2026 |
|
| CVE-2026-8318 |
VectifyAI PageIndex PDF Table of Contents page_index.py toc_transformer infinite loop |
11.05.2026 |
|
| CVE-2026-30635 |
|
11.05.2026 |
|
| CVE-2026-40612 |
jq: Stack overflow via unbounded recursion in jv_contains |
11.05.2026 |
|
| CVE-2026-41256 |
jq: Embedded NUL truncates top-level jq programs loaded with -f |
11.05.2026 |
5.5 |
| CVE-2026-41257 |
jq: Signed-int overflow in `stack_reallocate` (jq VM stack) |
11.05.2026 |
|
| CVE-2026-42856 |
Network-AI: Missing authentication on MCP HTTP endpoint allows unauthenticated privileged tool calls |
11.05.2026 |
|
| CVE-2026-42857 |
Open edX Platform: Stored CSS Injection in Email Notifications via Incomplete HTML Sanitization |
11.05.2026 |
4.6 |
| CVE-2026-42858 |
Open edX Platform: Server-Side Request Forgery (SSRF) in SAML Provider Data Sync Endpoint |
11.05.2026 |
8.5 |
| CVE-2026-42859 |
Neat VNC: Buffer overflow due to oversized RSA public keys |
11.05.2026 |
|
| CVE-2026-42860 |
Open edx Enterprise Service: SSRF via SAML metadata URL in sync_provider_data endpoint |
11.05.2026 |
8.5 |
| CVE-2026-42865 |
Inbox Zero: Cross-account cleaner email stream exposure |
11.05.2026 |
|
| CVE-2026-43639 |
Bitwarden Server < 2026.4.0 Missing Authorization via Provider Clients |
11.05.2026 |
|
| CVE-2026-43640 |
Bitwarden Server < 2026.4.1 Authentication Bypass via SCIM API Key |
11.05.2026 |
|
| CVE-2026-43894 |
jq: Wild stack write via signed-integer overflow in decNumber D2U() macro |
11.05.2026 |
6.2 |
| CVE-2026-43895 |
jq: Embedded NUL in jq import paths causes local redaction-policy bypass and preserves sensitive fields in published artifacts |
11.05.2026 |
4.4 |
| CVE-2026-43896 |
jq: Stack Overflow in Recursive Object Merge |
11.05.2026 |
6.2 |
| CVE-2026-43995 |
Flowise: SSRF Protection Bypass via Direct node-fetch / axios Usage (Patch Enforcement Failure) |
11.05.2026 |
|
| CVE-2026-44413 |
|
11.05.2026 |
8.2 |
| CVE-2026-44777 |
jq: stack overflow in module loading on mutual `include` |
11.05.2026 |
|
| CVE-2026-7210 |
The expat and elementtree parsers use insufficient entropy for XML hash-flooding protection |
11.05.2026 |
|
| CVE-2026-7308 |
Nexus Repository 3 - Stored Cross-Site Scripting (XSS) via HTML Browse Page |
11.05.2026 |
|
| CVE-2026-2291 |
CVE-2026-2291 |
11.05.2026 |
|
| CVE-2026-2393 |
Server-Side Request Forgery (SSRF) in mlflow/mlflow |
11.05.2026 |
|
| CVE-2026-34093 |
Special:UserRights allows viewing user rights from private wiki |
11.05.2026 |
|
| CVE-2026-34094 |
Customized help link for page protection indicator is relative to subpage name, because the link target is missing the "/wiki/" prefix |
11.05.2026 |
|
| CVE-2026-34095 |
action=raw with Special:Mypage subpage title responds with "Content-Type: text/html" on ctype=text/javascript request |
11.05.2026 |
|
| CVE-2026-36962 |
|
11.05.2026 |
|
| CVE-2026-36983 |
|
11.05.2026 |
|
| CVE-2026-38566 |
|
11.05.2026 |
|
| CVE-2026-38567 |
|
11.05.2026 |
|
| CVE-2026-38568 |
|
11.05.2026 |
|
| CVE-2026-38569 |
|
11.05.2026 |
|
| CVE-2026-3048 |
Nexus Repository 3 - Improper LDAP Referral Handling |
11.05.2026 |
|
| CVE-2026-3609 |
XIGNCODE3 xhunter1.sys kernel driver contains a Privilege Escalation Vulnerability |
11.05.2026 |
|
| CVE-2026-41250 |
XSS in taiga-front |
11.05.2026 |
5.7 |
| CVE-2026-41431 |
Zen Browser MAR updater ships with signature verification removed — unsigned updates accepted |
11.05.2026 |
8 |
| CVE-2026-42312 |
pyload-ng: non-admin SETTINGS users can disable outbound TLS peer verification |
11.05.2026 |
6.8 |
| CVE-2026-42313 |
pyload-ng: non-admin SETTINGS users can redirect all outbound traffic through an attacker-controlled proxy |
11.05.2026 |
8.3 |
| CVE-2026-42314 |
pyLoad: Path Traversal via Package Folder Name |
11.05.2026 |
6.5 |
| CVE-2026-42315 |
pyLoad: Path Traversal via Package Folder Name in set_package_data |
11.05.2026 |
8.1 |
| CVE-2026-42316 |
KQL injection via kusto.tables.topics.mapping in kafka-sink-azure-kusto |
11.05.2026 |
5.9 |
| CVE-2026-43638 |
Bitwarden Server < 2026.4.1 Missing Authorization via Organization Cipher Import |
11.05.2026 |
|
| CVE-2026-44226 |
pyLoad: Unauthenticated traceback disclosure via global exception handler in WebUI |
11.05.2026 |
5.3 |
| CVE-2026-44658 |
Zen Browser: RSS Live-Folder Item URLs Are Not Scheme-Restricted Before Trusted Tab Creation |
11.05.2026 |
2.4 |
| CVE-2026-44659 |
Zen Browser Mac - Address Bar Spoofing via Long Subdomain |
11.05.2026 |
4.7 |
| CVE-2026-44991 |
OpenClaw < 2026.4.21 - Authorization Bypass in Owner-Enforced Commands via Wildcard Channel Senders |
11.05.2026 |
|
| CVE-2026-44992 |
OpenClaw 2026.4.5 < 2026.4.20 - MiniMax API Host Override via Workspace dotenv |
11.05.2026 |
|
| CVE-2026-44993 |
OpenClaw < 2026.4.20 - Direct Message Misclassification in Feishu Card Actions |
11.05.2026 |
|
| CVE-2026-44994 |
OpenClaw < 2026.4.22 - Authentication Bypass in Gateway Control UI Bootstrap Config Endpoint |
11.05.2026 |
|
| CVE-2026-44995 |
OpenClaw < 2026.4.20 - Arbitrary Code Execution via MCP stdio Environment Variables |
11.05.2026 |
|
| CVE-2026-44996 |
OpenClaw < 2026.4.15 - Arbitrary Local File Read via Webchat Audio Embedding |
11.05.2026 |
|
| CVE-2026-44997 |
OpenClaw < 2026.4.22 - Security Envelope Constraint Bypass in ACP Child Sessions |
11.05.2026 |
|
| CVE-2026-44998 |
OpenClaw < 2026.4.20 - Tool Policy Bypass via Bundled MCP/LSP Tools |
11.05.2026 |
|
| CVE-2026-44999 |
OpenClaw < 2026.4.20 - Improper Trust Labeling in Isolated Cron Awareness Events |
11.05.2026 |
|
| CVE-2026-45000 |
OpenClaw < 2026.4.20 - Server-Side Request Forgery via Browser CDP Profile Creation |
11.05.2026 |
|
| CVE-2026-45001 |
OpenClaw < 2026.4.20 - Gateway Config Mutation Guard Bypass via Agent Tool Access |
11.05.2026 |
|
| CVE-2026-45002 |
OpenClaw < 2026.4.20 - Hook Session-Key Bypass via Template Mapping |
11.05.2026 |
|
| CVE-2026-45003 |
OpenClaw < 2026.4.22 - Connector Endpoint Host Override via Workspace dotenv Files |
11.05.2026 |
|
| CVE-2026-45004 |
OpenClaw < 2026.4.23 - Arbitrary Code Execution via setup-api.js in Current Working Directory |
11.05.2026 |
|
| CVE-2026-45005 |
OpenClaw < 2026.4.23 - Webhook Route Secret Cache Not Invalidated After Rotation |
11.05.2026 |
|
| CVE-2026-45006 |
OpenClaw < 2026.4.23 - Unsafe Config Mutation via Gateway Tool Denylist Bypass |
11.05.2026 |
|
| CVE-2026-4890 |
CVE-2026-4890 |
11.05.2026 |
|
| CVE-2026-4891 |
CVE-2026-4891 |
11.05.2026 |
|
| CVE-2026-4892 |
CVE-2026-4892 |
11.05.2026 |
|
| CVE-2026-4893 |
CVE-2026-4893 |
11.05.2026 |
|
| CVE-2026-5172 |
CVE-2026-5172 |
11.05.2026 |
|
| CVE-2026-5266 |
|
11.05.2026 |
|
| CVE-2026-8305 |
OpenClaw bluebubbles Webhook monitor.ts handleBlueBubblesWebhookRequest improper authentication |
11.05.2026 |
|
| CVE-2026-31248 |
|
11.05.2026 |
|
| CVE-2026-31249 |
|
11.05.2026 |
|
| CVE-2026-31250 |
|
11.05.2026 |
|
| CVE-2026-31251 |
|
11.05.2026 |
|
| CVE-2026-31252 |
|
11.05.2026 |
|
| CVE-2026-31253 |
|
11.05.2026 |
|
| CVE-2026-31254 |
|
11.05.2026 |
|
| CVE-2026-33356 |
Meari MQTT broker missing per-device subscribe ACL |
11.05.2026 |
7.7 |
| CVE-2026-33357 |
Meari OpenAPI device status IDOR |
11.05.2026 |
7.5 |
| CVE-2026-33359 |
Meari unauthenticated alert image access in cloud object storage |
11.05.2026 |
7.5 |
| CVE-2026-33361 |
Meari weak XOR obfuscation |
11.05.2026 |
7.5 |
| CVE-2026-33362 |
Meari SDK hardcoded cryptographic keys |
11.05.2026 |
8.6 |
| CVE-2026-36906 |
|
11.05.2026 |
|
| CVE-2026-42349 |
Clerk: Authorization bypass when combining organization, billing, or reverification checks |
11.05.2026 |
|
| CVE-2026-42603 |
OWASP BLT: pre-commit-fix.yaml executes untrusted fork code via pull_request_target |
11.05.2026 |
8.8 |
| CVE-2026-42842 |
grav-plugin-form: XSS via Taxonomy Field Values in Admin Panel |
11.05.2026 |
5.4 |
| CVE-2026-42843 |
grav-plugin-api: Grav API Privilege Escalation to Super Admin |
11.05.2026 |
8.8 |
| CVE-2026-42845 |
Grav: Anonymous Page Content Overwrite via Form File Upload filename Override |
11.05.2026 |
|
| CVE-2026-44737 |
grav-plugin-admin: Stored Cross-Site Scripting (XSS) Reflected endpoint /admin/pages/[page], parameter data[header][title] |
11.05.2026 |
|
| CVE-2026-44738 |
Grav: Twig sandbox allows editor-role users to exfiltrate all plugin secrets via Config::toArray() |
11.05.2026 |
7.7 |
| CVE-2025-61305 |
|
11.05.2026 |
|
| CVE-2025-61306 |
|
11.05.2026 |
|
| CVE-2025-61307 |
|
11.05.2026 |
|
| CVE-2025-61308 |
|
11.05.2026 |
|
| CVE-2025-61309 |
|
11.05.2026 |
|
| CVE-2025-61310 |
|
11.05.2026 |
|
| CVE-2025-61311 |
|
11.05.2026 |
|
| CVE-2025-61312 |
|
11.05.2026 |
|
| CVE-2025-61313 |
|
11.05.2026 |
|
| CVE-2025-61314 |
|
11.05.2026 |
|
| CVE-2025-63750 |
|
11.05.2026 |
|
| CVE-2025-65415 |
|
11.05.2026 |
|
| CVE-2025-65416 |
|
11.05.2026 |
|
| CVE-2025-65417 |
|
11.05.2026 |
|
| CVE-2025-65418 |
|
11.05.2026 |
|
| CVE-2026-31246 |
|
11.05.2026 |
|
| CVE-2026-31247 |
|
11.05.2026 |
|
| CVE-2026-34086 |
AbuseFilter misuses ::userCanBitfield, exposing access-controlled information |
11.05.2026 |
|
| CVE-2026-34087 |
Users API leaks whether privileged users have their user groups disabled for lack of 2FA |
11.05.2026 |
|
| CVE-2026-34088 |
RecentChanges entries expose suppressed content via generated log page html |
11.05.2026 |
|
| CVE-2026-34089 |
Memory leak in Scribunto causes runJobs.php to run out of memory |
11.05.2026 |
|
| CVE-2026-34090 |
Suggested investigations: Handle suppressed usernames |
11.05.2026 |
|
| CVE-2026-34091 |
User localization leaked by AbuseFilter + EventStream |
11.05.2026 |
|
| CVE-2026-34092 |
Block UI elements in 'tools'-sidebar shows presence of an autoblocked IP |
11.05.2026 |
|
| CVE-2026-3319 |
Multiple vulnerabilities in Cradle e-commerce |
11.05.2026 |
|
| CVE-2026-3320 |
Multiple vulnerabilities in Cradle e-commerce |
11.05.2026 |
|
| CVE-2026-42607 |
Grav: Remote Code Execution (RCE) via Malicious Plugin ZIP Upload in Direct Install Feature |
11.05.2026 |
9.1 |
| CVE-2026-42608 |
Grav: Unauthenticated Path Traversal & Arbitrary File Write in FormFlash component. |
11.05.2026 |
|
| CVE-2026-42609 |
Grav: Administrative Account Disruption and Privilege De-escalation via User Overwrite Logic |
11.05.2026 |
8.1 |
| CVE-2026-42610 |
Grav: Sensitive Information Disclosure via Accounts Service Bypass |
11.05.2026 |
6.5 |
| CVE-2026-42611 |
Grav: Stored XSS via Tag Injection |
11.05.2026 |
8.9 |
| CVE-2026-42612 |
Grav: Publisher-Level Stored XSS via Unquoted Event Attributes |
11.05.2026 |
8.5 |
| CVE-2026-42613 |
Grav: Privilege Escalation via Missing Server-Side Validation of groups/access |
11.05.2026 |
9.4 |
| CVE-2026-42841 |
Grav: Stored XSS via Markdown media attribute() action in Grav CMS |
11.05.2026 |
|
| CVE-2026-44197 |
Wagtail: Improper permission handling when comparing revisions |
11.05.2026 |
6.5 |
| CVE-2026-44198 |
Wagtail: Improper permission handling when viewing page history |
11.05.2026 |
4.3 |
| CVE-2026-44199 |
Wagtail: Improper permission handling when deleting form submissions |
11.05.2026 |
6.5 |
| CVE-2026-44200 |
Wagtail: Improper permission handling when copying pages |
11.05.2026 |
6.5 |
| CVE-2026-44201 |
Wagtail: Improper restriction handling on Documents and Images API |
11.05.2026 |
5.3 |
| CVE-2026-44643 |
Angular Expressions - Remote Code Execution using filters |
11.05.2026 |
|
| CVE-2026-6093 |
Corteza 2024.9.8 - SQL Injection in MSSQL JSON-path meta filter via incorrect T-SQL string escaping |
11.05.2026 |
|
| CVE-2026-6815 |
CVE-2026-6815 |
11.05.2026 |
|
| CVE-2026-7813 |
pgAdmin 4: Cross-user data access and shared-server privilege escalation in server mode |
11.05.2026 |
9.9 |
| CVE-2026-7814 |
pgAdmin 4: Stored XSS via crafted PostgreSQL object names in Browser Tree and Explain Visualizer |
11.05.2026 |
4.8 |
| CVE-2026-7815 |
pgAdmin 4: SQL injection in Maintenance tool option values leading to remote code execution |
11.05.2026 |
8.8 |
| CVE-2026-7816 |
pgAdmin 4: OS command injection in Import/Export query export via psql metacommand breakout |
11.05.2026 |
8.8 |
| CVE-2026-7817 |
pgAdmin 4: Local file inclusion and server-side request forgery in LLM API configuration endpoints |
11.05.2026 |
6.5 |
| CVE-2026-7818 |
pgAdmin 4: Unsafe deserialization (CWE-502) in file-backed session manager leads to remote code execution |
11.05.2026 |
7 |
| CVE-2026-7819 |
pgAdmin 4: Symbolic-link path traversal in File Manager allows arbitrary file write |
11.05.2026 |
8.1 |
| CVE-2026-7820 |
pgAdmin 4: Account-lockout bypass via Flask-Security default /login view |
11.05.2026 |
6.5 |
| CVE-2026-8291 |
Open5GS NRF nnrf-handler.c ogs_nnrf_nfm_handle_nf_profile denial of service |
11.05.2026 |
|
| CVE-2026-8292 |
Open5GS NRF conv.c yuarel_parse denial of service |
11.05.2026 |
|
| CVE-2026-4802 |
Cockpit: cockpit: arbitrary command execution via crafted links in system logs ui |
12.05.2026 |
|
| CVE-2026-8289 |
Open5GS SMF nsmf-handler.c smf_nsmf_handle_update_data_in_vsmf denial of service |
11.05.2026 |
|
| CVE-2026-8290 |
Open5GS SMF nsmf-handler.c smf_nsmf_handle_update_data_in_vsmf denial of service |
11.05.2026 |
|
| CVE-2026-8288 |
Open5GS SMF gsm-handler.c denial of service |
11.05.2026 |
|