Filter and search through 392,393 vulnerabilities
| CVE ID | Description | CVSS | Priority | Trend | Exploit | Patch |
|---|---|---|---|---|---|---|
| CVE-2026-22850 | Koko Analytics is an open-source analytics plugin for WordPress. Versions prior to 2.1.3 are vulnerable to arbitrary SQL execution through unescaped a... | 8.3 | 509 | Neutral | No |
| No |
| CVE-2026-22849 | Saleor is an e-commerce platform. Starting in version 3.0.0 and prior to versions 3.20.108, 3.21.43, and 3.22.27, Saleor was allowing users to modify ... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-22844 | A Command Injection vulnerability in Zoom Node Multimedia Routers (MMRs) before version 5.2.1716.0 may allow a meeting participant to conduct remote c... | 9.9 | 858 | Neutral | Yes | No |
| CVE-2026-22837 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2026-22836 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2026-22835 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2026-22834 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2026-22833 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2026-22832 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2026-22831 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2026-22830 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2026-22829 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2026-22822 | ### Summary The `getSecretKey` template function, while introduced for senhasegura Devops Secrets Management (DSM) provider, has the ability to fetch... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-22820 | ### Summary A TOCTOU race condition vulnerability allows a user to exceed the set number of active tunnels in their subscription plan. ### Details ... | 3.7 | 102 | Neutral | No | Yes |
| CVE-2026-22819 | ### Summary This vulnerability allows a user i.e a free plan user to get more than the desired subdomains due to lack of db transaction lock mechanism... | 3.1 | 94 | Neutral | No | Yes |
| CVE-2026-22818 | ## Summary A flaw in Hono’s JWK/JWKS JWT verification middleware allowed the algorithm specified in the JWT header to influence signature verificatio... | 6.5 | 216 | Neutral | No | Yes |
| CVE-2026-22817 | ## Summary A flaw in Hono’s JWK/JWKS JWT verification middleware allowed the JWT header’s `alg` value to influence signature verification when the se... | 6.5 | 216 | Neutral | No | Yes |
| CVE-2026-22816 | Gradle is a build automation tool, and its native-platform tool provides Java bindings for native APIs. When resolving dependencies in versions before... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-22814 | ### Summary **Description** A Mass Assignment (CWE-915) vulnerability in AdonisJS Lucid may allow a remote attacker who can influence data that is pas... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-22813 | ### Summary A malicious website can abuse the server URL override feature of the OpenCode web UI to achieve cross-site scripting on `http://localhost:... | 6.1 | 272 | Neutral | No | Yes |