|
191
|
- |
|
-
|
-
|
Inadequate Encryption Strength vulnerability in TP-Link Archer C7 v5 and v5.8 (uhttpd modules) allows Password Recovery Exploitation. The web interface encrypts the admin password client-side using R…
New
|
CWE-326
Inadequate Encryption Strength
|
CVE-2026-5363
|
2026-04-16 09:16 |
2026-04-16 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
192
|
9.8 |
CRITICAL
Network
|
-
|
-
|
The Barcode Scanner (+Mobile App) – Inventory manager, Order fulfillment system, POS (Point of Sale) plugin for WordPress is vulnerable to privilege escalation via insecure token-based authentication…
New
|
CWE-269
Improper Privilege Management
|
CVE-2026-4880
|
2026-04-16 09:16 |
2026-04-16 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
193
|
2.9 |
LOW
Local
|
-
|
-
|
Yubico libfido2 before 1.17.0, python-fido2 before 2.2.0, and yubikey-manager before 5.9.1 have an unintended DLL search path.
New
|
CWE-426
Untrusted Search Path
|
CVE-2026-40947
|
2026-04-16 09:16 |
2026-04-16 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
194
|
8.2 |
HIGH
Network
|
-
|
-
|
maddy is a composable, all-in-one mail server. Versions prior to 0.9.3 contain an LDAP injection vulnerability in the auth.ldap module where user-supplied usernames are interpolated into LDAP search …
New
|
CWE-90
LDAP Injection
|
CVE-2026-40193
|
2026-04-16 09:16 |
2026-04-16 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
195
|
4.3 |
MEDIUM
Network
|
-
|
-
|
The Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress plugin for WordPress is vulnerable to Missing Authorization in all versions u…
New
|
CWE-862
Missing Authorization
|
CVE-2026-4949
|
2026-04-16 08:16 |
2026-04-16 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
196
|
8.8 |
HIGH
Network
|
-
|
-
|
OWASP BLT is a QA testing and vulnerability disclosure platform that encompasses websites, apps, git repositories, and more. Versions prior to 2.1.1 contain an RCE vulnerability in the .github/workfl…
New
|
CWE-94 CWE-95
Code Injection Eval Injection
|
CVE-2026-40316
|
2026-04-16 08:16 |
2026-04-16 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
197
|
- |
|
-
|
-
|
Pillow is a Python imaging library. Versions 10.3.0 through 12.1.1 did not limit the amount of GZIP-compressed data read when decoding a FITS image, making them vulnerable to decompression bomb attac…
New
|
CWE-400 CWE-770
Uncontrolled Resource Consumption Allocation of Resources Without Limits or Throttling
|
CVE-2026-40192
|
2026-04-16 08:16 |
2026-04-16 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
198
|
- |
|
-
|
-
|
Prometheus is an open-source monitoring system and time series database. Versions 3.0 through 3.5.1 and 3.6.0 through 3.11.1 have stored cross-site scripting vulnerabilities in multiple components of…
New
|
CWE-79
Cross-site Scripting
|
CVE-2026-40179
|
2026-04-16 08:16 |
2026-04-16 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
199
|
5.4 |
MEDIUM
Network
|
-
|
-
|
Istio is an open platform to connect, manage, and secure microservices. In versions 1.25.0 through 1.27.8, 1.28.0 through 1.28.5, 1.29.0, and 1.29.1, the serviceAccounts and notServiceAccounts fields…
New
|
CWE-185 CWE-863
Incorrect Regular Expression Incorrect Authorization
|
CVE-2026-39350
|
2026-04-16 08:16 |
2026-04-16 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
200
|
9.1 |
CRITICAL
Network
|
-
|
-
|
A flaw was found in ArgoCD Image Updater. This vulnerability allows an attacker, with permissions to create or modify an ImageUpdater resource in a multi-tenant environment, to bypass namespace bound…
New
|
CWE-1220
Insufficient Granularity of Access Control
|
CVE-2026-6388
|
2026-04-16 07:17 |
2026-04-16 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|