Filter and search through 392,438 vulnerabilities
| CVE ID | Description | CVSS | Priority | Trend | Exploit | Patch |
|---|---|---|---|---|---|---|
| CVE-2026-22458 | Missing Authorization vulnerability in Mikado-Themes Wanderland wanderland allows Exploiting Incorrectly Configured Access Control Security Levels.Thi... | 4.3 | 163 | Neutral | No |
| Yes |
| CVE-2026-22450 | Missing Authorization vulnerability in Select-Themes Don Peppe donpeppe allows Exploiting Incorrectly Configured Access Control Security Levels.This i... | 4.3 | 163 | Neutral | No | Yes |
| CVE-2026-22447 | Missing Authorization vulnerability in Select-Themes Prowess prowess allows Exploiting Incorrectly Configured Access Control Security Levels.This issu... | 4.3 | 163 | Neutral | No | Yes |
| CVE-2026-22445 | Missing Authorization vulnerability in Proptech Plugin Apimo Connector apimo allows Exploiting Incorrectly Configured Access Control Security Levels.T... | 5.3 | 188 | Neutral | No | Yes |
| CVE-2026-22444 | The "create core" API of Apache Solr 8.6 through 9.10.0 lacks sufficient input validation on some API parameters, which can cause Solr to check the ex... | 7.1 | 493 | Neutral | Yes | Yes |
| CVE-2026-22430 | Authorization Bypass Through User-Controlled Key vulnerability in Mikado-Themes Verdure verdure allows Exploiting Incorrectly Configured Access Contro... | 5.4 | 142 | Neutral | No | Yes |
| CVE-2026-22426 | Authorization Bypass Through User-Controlled Key vulnerability in Elated-Themes Sweet Jane sweetjane allows Exploiting Incorrectly Configured Access C... | 5.4 | 142 | Neutral | No | Yes |
| CVE-2026-22411 | Authorization Bypass Through User-Controlled Key vulnerability in Mikado-Themes Dolcino dolcino allows Exploiting Incorrectly Configured Access Contro... | 5.4 | 142 | Neutral | No | Yes |
| CVE-2026-22409 | Authorization Bypass Through User-Controlled Key vulnerability in Mikado-Themes Justicia justicia allows Exploiting Incorrectly Configured Access Cont... | 5.4 | 142 | Neutral | No | Yes |
| CVE-2026-22407 | Authorization Bypass Through User-Controlled Key vulnerability in Mikado-Themes Roam roam allows Exploiting Incorrectly Configured Access Control Secu... | 5.4 | 142 | Neutral | No | Yes |
| CVE-2026-22406 | Authorization Bypass Through User-Controlled Key vulnerability in Mikado-Themes Overton overton allows Exploiting Incorrectly Configured Access Contro... | 5.4 | 142 | Neutral | No | Yes |
| CVE-2026-22404 | Authorization Bypass Through User-Controlled Key vulnerability in Mikado-Themes Innovio innovio allows Exploiting Incorrectly Configured Access Contro... | 5.4 | 142 | Neutral | No | Yes |
| CVE-2026-22402 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in pavothemes Triply triply allo... | 7.5 | 379 | Neutral | No | Yes |
| CVE-2026-22401 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in pavothemes Freshio freshio al... | 7.5 | 386 | Neutral | No | Yes |
| CVE-2026-22400 | Authorization Bypass Through User-Controlled Key vulnerability in Mikado-Themes Holmes holmes allows Exploiting Incorrectly Configured Access Control ... | 5.4 | 142 | Neutral | No | Yes |
| CVE-2026-22398 | Authorization Bypass Through User-Controlled Key vulnerability in Mikado-Themes Fleur fleur allows Exploiting Incorrectly Configured Access Control Se... | 5.4 | 142 | Neutral | No | Yes |
| CVE-2026-22396 | Authorization Bypass Through User-Controlled Key vulnerability in Mikado-Themes Fiorello fiorello allows Exploiting Incorrectly Configured Access Cont... | 5.4 | 142 | Neutral | No | Yes |
| CVE-2026-22393 | Authorization Bypass Through User-Controlled Key vulnerability in Mikado-Themes Curly curly allows Exploiting Incorrectly Configured Access Control Se... | 5.4 | 142 | Neutral | No | Yes |
| CVE-2026-22391 | Authorization Bypass Through User-Controlled Key vulnerability in Mikado-Themes Cocco cocco allows Exploiting Incorrectly Configured Access Control Se... | 5.4 | 142 | Neutral | No | Yes |
| CVE-2026-22388 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Imran Emu Owl Carousel WP owl-carousel-wp allows... | 5.9 | 245 | Neutral | No | Yes |