Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total15,025
Critical923
High3,045
Medium10,857
Reset
Showing 2161-2180 of 15025 records
Threat Entry Updated 2026-01-22

CVE-2026-0733 - Online Course Registration System Plugin

A vulnerability was determined in PHPGurukul Online Course Registration System up to 3.1. This impacts an unknown function of the file /onlinecourse/admin/manage-students.php. This manipulation of the argument id/cid causes sql injection. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized.

PLUGIN Online Course Registration System

CVE-2026-0733

MEDIUM CVSS 5.3 2026-01-09
Threat Entry Updated 2026-01-14

CVE-2026-0732 - DI-8200G Plugin

A vulnerability was found in D-Link DI-8200G 17.12.20A1. This affects an unknown function of the file /upgrade_filter.asp. The manipulation of the argument path results in command injection. The attack may be performed from remote. The exploit has been made public and could be used.

PLUGIN DI-8200G

CVE-2026-0732

MEDIUM CVSS 5.3 2026-01-09
Threat Entry Updated 2026-02-12

CVE-2026-22712 - Mediawiki - ApprovedRevs Extension Plugin

Improper Encoding or Escaping of Output due to magic word replacement in ParserAfterTidy vulnerability in The Wikimedia Foundation Mediawiki - ApprovedRevs Extension allows Input Data Manipulation.This issue affects Mediawiki - ApprovedRevs Extension: 1.45, 1.44, 1.43, 1.39.

PLUGIN Mediawiki - ApprovedRevs Extension

CVE-2026-22712

LOW CVSS 2.3 2026-01-09
Threat Entry Updated 2026-02-12

CVE-2026-22710 - Mediawiki - Wikibase Extension Plugin

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in The Wikimedia Foundation Mediawiki - Wikibase Extension allows Cross-Site Scripting (XSS).This issue affects Mediawiki - Wikibase Extension: 1.45, 1.44, 1.43, 1.39.

PLUGIN Mediawiki - Wikibase Extension

CVE-2026-22710

LOW CVSS 2.3 2026-01-09
Threat Entry Updated 2026-01-29

CVE-2026-0731 - WA1200 Plugin

A vulnerability has been found in TOTOLINK WA1200 5.9c.2914. The impacted element is an unknown function of the file cstecgi.cgi of the component HTTP Request Handler. The manipulation leads to null pointer dereference. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used.

PLUGIN WA1200

CVE-2026-0731

MEDIUM CVSS 5.5 2026-01-08
Threat Entry Updated 2026-01-22

CVE-2026-0729 - Intern Membership Management System Plugin

A vulnerability was detected in code-projects Intern Membership Management System 1.0. Impacted is an unknown function of the file /intern/admin/add_activity.php. Performing a manipulation of the argument Title results in sql injection. Remote exploitation of the attack is possible. The exploit is now public and may be used.

PLUGIN Intern Membership Management System

CVE-2026-0729

MEDIUM CVSS 5.1 2026-01-08
Threat Entry Updated 2026-01-22

CVE-2026-0730 - Staff Leave Management System Plugin

A flaw has been found in PHPGurukul Staff Leave Management System 1.0. The affected element is the function ADD_STAFF/UPDATE_STAFF of the file /staffleave/slms/slms/adminviews.py of the component SVG File Handler. Executing a manipulation of the argument profile_pic can lead to cross site scripting. The attack can be executed remotely. The exploit has been published and may be used.

PLUGIN Staff Leave Management System

CVE-2026-0730

MEDIUM CVSS 4.8 2026-01-08
Threat Entry Updated 2026-01-13

CVE-2025-14436 - Brevo For Woocommerce Plugin

The Brevo for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘user_connection_id’ parameter in all versions up to, and including, 4.0.49 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Brevo For Woocommerce

CVE-2025-14436

HIGH CVSS 7.2 2026-01-08
Threat Entry Updated 2026-02-02

CVE-2026-22588 - Spree Plugin

Spree is an open source e-commerce solution built with Ruby on Rails. Prior to versions 4.10.2, 5.0.7, 5.1.9, and 5.2.5, an Authenticated Insecure Direct Object Reference (IDOR) vulnerability was identified that allows an authenticated user to retrieve other users’ address information by modifying an existing order. By editing an order they legitimately own and manipulating address identifiers in the request, the backend server accepts and processes references to addresses belonging to other users, subsequently associating those addresses with the attacker’s order and returning them in the response. This issue has…

PLUGIN Spree

CVE-2026-22588

MEDIUM CVSS 6.5 2026-01-08
Threat Entry Updated 2026-01-22

CVE-2026-0728 - Intern Membership Management System Plugin

A security vulnerability has been detected in code-projects Intern Membership Management System 1.0. This issue affects some unknown processing of the file /intern/admin/delete_admin.php. Such manipulation of the argument admin_id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed publicly and may be used.

PLUGIN Intern Membership Management System

CVE-2026-0728

MEDIUM CVSS 5.1 2026-01-08
Threat Entry Updated 2026-01-22

CVE-2026-0747 - Remote Desktop Manager Plugin

Exposure of sensitive information in the TeamViewer entry dashboard component in Devolutions Remote Desktop Manager 2025.3.24.0 through 2025.3.28.0 on Windows allows an external observer to view a password on screen via a defective masking feature, for example during physical observation or screen sharing.

PLUGIN Remote Desktop Manager

CVE-2026-0747

LOW CVSS 3.3 2026-01-08
Threat Entry Updated 2026-01-13

CVE-2026-22257 - Salvo Plugin

Salvo is a Rust web backend framework. Prior to version 0.88.1, the function list_html generates a file view of a folder without sanitizing the files or folders names, this may potentially lead to XSS in cases where a website allow the access to public files using this feature and anyone can upload a file. This issue has been patched in version 0.88.1.

PLUGIN Salvo

CVE-2026-22257

HIGH CVSS 8.8 2026-01-08
Threat Entry Updated 2026-01-13

CVE-2026-22256 - Salvo Plugin

Salvo is a Rust web backend framework. Prior to version 0.88.1, the function list_html generate an file view of a folder which include a render of the current path, in which its inserted in the HTML without proper sanitation, this leads to reflected XSS using the fact that request path is decoded and normalized in the matching stage but not is inserted raw in the html view (current.path), the only constraint here is for the root path (eg. /files in the PoC example) to have a sub directory (e.g common…

PLUGIN Salvo

CVE-2026-22256

HIGH CVSS 8.8 2026-01-08
Threat Entry Updated 2026-02-02

CVE-2026-21860 - Werkzeug Plugin

Werkzeug is a comprehensive WSGI web application library. Prior to version 3.1.5, Werkzeug's safe_join function allows path segments with Windows device names that have file extensions or trailing spaces. On Windows, there are special device names such as CON, AUX, etc that are implicitly present and readable in every directory. Windows still accepts them with any file extension, such as CON.txt, or trailing spaces such as CON. This issue has been patched in version 3.1.5.

PLUGIN Werkzeug

CVE-2026-21860

MEDIUM CVSS 6.3 2026-01-08
Threat Entry Updated 2026-02-02

CVE-2026-22253 - Soft Serve Plugin

Soft Serve is a self-hostable Git server for the command line. Prior to version 0.11.2, an authorization bypass in the LFS lock deletion endpoint allows any authenticated user with repository write access to delete locks owned by other users by setting the force flag. The vulnerable code path processes force deletions before retrieving user context, bypassing ownership validation entirely. This issue has been patched in version 0.11.2.

PLUGIN Soft Serve

CVE-2026-22253

MEDIUM CVSS 5.4 2026-01-08
Threat Entry Updated 2026-02-18

CVE-2026-22234 - eCase Portal Plugin

OPEXUS eCasePortal before version 9.0.45.0 allows an unauthenticated attacker to navigate to the 'Attachments.aspx' endpoint, iterate through predictable values of 'formid', and download or delete all user-uploaded files, or upload new files.

PLUGIN eCase Portal

CVE-2026-22234

CRITICAL CVSS 9.3 2026-01-08
Threat Entry Updated 2026-02-18

CVE-2026-22235 - eComplaint Plugin

OPEXUS eComplaint before version 9.0.45.0 allows an attacker to visit the the 'DocumentOpen.aspx' endpoint, iterate through predictable values of 'chargeNumber', and download any uploaded files.

PLUGIN eComplaint

CVE-2026-22235

HIGH CVSS 8.7 2026-01-08
Threat Entry Updated 2026-01-13

CVE-2026-22587 - DevonWay Plugin

Ideagen DevonWay contains a stored cross site scripting vulnerability. A remote, authenticated attacker could craft a payload in the 'Reports' page that executes when another user views the report. Fixed in 2.62.4 and 2.62 LTS.

PLUGIN DevonWay

CVE-2026-22587

MEDIUM CVSS 4.8 2026-01-08
Threat Entry Updated 2026-02-05

CVE-2026-22233 - eCASE Audit Plugin

OPEXUS eCASE Audit allows an authenticated attacker to save JavaScript as a comment in the "Estimated Staff Hours" field. The JavaScript is executed whenever another user visits the Project Cost tab. Fixed in OPEXUS eCASE Audit 11.14.2.0.

PLUGIN eCASE Audit

CVE-2026-22233

MEDIUM CVSS 4.8 2026-01-08
Threat Entry Updated 2026-02-05

CVE-2026-22232 - eCASE Audit Plugin

OPEXUS eCASE Audit allows an authenticated attacker to save JavaScript in the "A or SIC Number" field within the Project Setup functionality. The JavaScript is executed whenever another user views the project. Fixed in OPEXUS eCASE Audit 11.14.2.0.

PLUGIN eCASE Audit

CVE-2026-22232

MEDIUM CVSS 4.8 2026-01-08
Scroll to top