6.4

CVSS3.1

CVE-2026-1922 - The Events Calendar Shortcode & Block <= 3.1.2 - Authenticated (Contributor+) Stored Cross-Site Scr…

The The Events Calendar Shortcode & Block plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's `ecs-list-events` shortcode `message` attribute in all versions up to, and including, 3.1.2 due to insufficient input sanitization and output escaping on user supplied attrib…

📅 Published: Feb. 10, 2026, 9:26 a.m. 🔄 Last Modified: Feb. 10, 2026, 4:10 p.m.

7.2

CVSS3.1

CVE-2026-1866 - Name Directory <= 1.32.0 - Unauthenticated Stored Cross-Site Scripting via Double HTML-Entity Encod…

The Name Directory plugin for WordPress is vulnerable to Stored Cross-Site Scripting via double HTML-entity encoding in all versions up to, and including, 1.32.0. This is due to the plugin's sanitization function calling `html_entity_decode()` before `wp_kses()`, and then calling `html_entity_decod…

📅 Published: Feb. 10, 2026, 9:26 a.m. 🔄 Last Modified: Feb. 10, 2026, 3:27 p.m.

7.5

CVSS3.1

CVE-2026-2268 - Ninja Forms <= 3.14.0 - Unauthenticated Information Disclosure in nf_ajax_submit AJAX Action

The Ninja Forms plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.14.0. This is due to the unsafe application of the `ninja_forms_merge_tags` filter to user-supplied input within repeater fields, which allows the resolution of `{post_meta:K…

📅 Published: Feb. 10, 2026, 9:26 a.m. 🔄 Last Modified: Feb. 10, 2026, 3:28 p.m.

1

CVSS4.0

CVE-2026-23901 - Apache Shiro: Brute force attack possible to determine valid user names

Observable Timing Discrepancy vulnerability in Apache Shiro. This issue affects Apache Shiro: from 1.*, 2.* before 2.0.7. Users are recommended to upgrade to version 2.0.7 or later, which fixes the issue. Prior to Shiro 2.0.7, code paths for non-existent vs. existing users are different enough, …

📅 Published: Feb. 10, 2026, 9:25 a.m. 🔄 Last Modified: Feb. 10, 2026, 3:37 p.m.

9.8

CVSS3.1

CVE-2025-11242 - SSRF in Teknolist Computer's Okulistik

Server-Side Request Forgery (SSRF) vulnerability in Teknolist Computer Systems Software Publishing Industry and Trade Inc. Okulistik allows Server Side Request Forgery.This issue affects Okulistik: through 21102025.

📅 Published: Feb. 10, 2026, 8:36 a.m. 🔄 Last Modified: Feb. 10, 2026, 3:32 p.m.

5.3

CVSS3.1

CVE-2026-1722 - WCFM Marketplace <= 3.7.0 - Insecure Direct Object Reference to Unauthenticated Arbitrary Refund Re…

The WCFM Marketplace – Multivendor Marketplace for WooCommerce plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 3.7.0. This is due to the plugin not implementing authorization checks in the `wcfm-refund-requests-form` AJAX controller. This…

📅 Published: Feb. 10, 2026, 7:27 a.m. 🔄 Last Modified: Feb. 10, 2026, 3:35 p.m.

5.1

CVSS4.0

CVE-2026-2099 - Flowring|AgentFlow - Stored Cross-Site Scripting

AgentFlow developed by Flowring has a Stored Cross-Site Scripting vulnerability, allowing authenticated remote attackers to inject persistent JavaScript codes that are executed in users' browsers upon page load.

📅 Published: Feb. 10, 2026, 7:09 a.m. 🔄 Last Modified: Feb. 10, 2026, 3:36 p.m.

5.1

CVSS4.0

CVE-2026-2098 - Flowring|AgentFlow - Reflected Cross-site Scripting

AgentFlow developed by Flowring has a Reflected Cross-site Scripting vulnerability, allowing unauthenticated remote attackers to execute arbitrary JavaScript codes in user's browser through phishing attacks.

📅 Published: Feb. 10, 2026, 7:06 a.m. 🔄 Last Modified: Feb. 10, 2026, 3:38 p.m.

8.7

CVSS4.0

CVE-2026-2097 - Flowring|Agentflow - Arbitrary File Upload

Agentflow developed by Flowring has an Arbitrary File Upload vulnerability, allowing authenticated remote attackers to upload and execute web shell backdoors, thereby enabling arbitrary code execution on the server.

📅 Published: Feb. 10, 2026, 7:02 a.m. 🔄 Last Modified: Feb. 10, 2026, 3:39 p.m.

9.3

CVSS4.0

CVE-2026-2096 - Flowring|Agentflow - Missing Authenticaton

Agentflow developed by Flowring has a Missing Authentication vulnerability, allowing unauthenticated remote attackers to read, modify, and delete database contents by using a specific functionality.

📅 Published: Feb. 10, 2026, 6:59 a.m. 🔄 Last Modified: Feb. 10, 2026, 7:34 p.m.
Total resulsts: 332073
Page 24 of 33,208
« previous page » next page
Filters