6.9

CVSS4.0

CVE-2021-47754 - Arunna 1.0.0 - 'Multiple' Cross-Site Request Forgery (CSRF)

Arunna 1.0.0 contains a cross-site request forgery vulnerability that allows attackers to manipulate user profile settings without authentication. Attackers can craft a malicious form to change user details, including passwords, email, and administrative privileges by tricking authenticated users i…

📅 Published: Jan. 15, 2026, 3:52 p.m. 🔄 Last Modified: Jan. 26, 2026, 4:15 p.m.

9.3

CVSS4.0

CVE-2021-47753 - phpKF CMS 3.00 Beta y6 - Remote Code Execution (RCE) (Unauthenticated)

phpKF CMS 3.00 Beta y6 contains an unauthenticated file upload vulnerability that allows remote attackers to execute arbitrary code by bypassing file extension checks. Attackers can upload a PHP file disguised as a PNG, rename it, and execute system commands through a crafted web shell parameter.

📅 Published: Jan. 15, 2026, 3:52 p.m. 🔄 Last Modified: Jan. 23, 2026, 6:31 p.m.

8.7

CVSS4.0

CVE-2021-47752 - AWebServer GhostBuilding 18 - Denial of Service (DoS)

AWebServer GhostBuilding 18 contains a denial of service vulnerability that allows remote attackers to overwhelm the server by sending multiple concurrent HTTP requests. Attackers can generate high-volume requests to multiple endpoints including /mysqladmin to potentially crash or render the servic…

📅 Published: Jan. 15, 2026, 3:52 p.m. 🔄 Last Modified: Jan. 23, 2026, 6:32 p.m.

8.8

CVSS3.1

CVE-2025-61973 -

A local privilege escalation vulnerability exists during the installation of Epic Games Store via the Microsoft Store. A low-privilege user can replace a DLL file during the installation process, which may result in unintended elevation of privileges.

📅 Published: Jan. 15, 2026, 3:19 p.m. 🔄 Last Modified: Jan. 16, 2026, 3:55 p.m.

7.1

CVSS4.0

CVE-2026-0897 - Denial of Service in Keras via Excessive Memory Allocation in HDF5 Metadata

Allocation of Resources Without Limits or Throttling in the HDF5 weight loading component in Google Keras 3.0.0 through 3.13.0 on all platforms allows a remote attacker to cause a Denial of Service (DoS) through memory exhaustion and a crash of the Python interpreter via a crafted .keras archive co…

📅 Published: Jan. 15, 2026, 2:09 p.m. 🔄 Last Modified: Jan. 23, 2026, 6:35 p.m.

0.0

CVE-2026-0991 -

This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

📅 Published: Jan. 15, 2026, 1:33 p.m. 🔄 Last Modified: Jan. 23, 2026, 11:15 p.m.

6.4

CVSS3.1

CVE-2025-13859 - AffiliateX 1.0.0 - 1.3.9.3 - Authenticated (Subscriber+) Missing Authorization to Stored Cross-Site…

The AffiliateX – Amazon Affiliate Plugin plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the save_customization_settings AJAX action in versions 1.0.0 to 1.3.9.3. This makes it possible for authenticated attackers, with Subscriber-level a…

📅 Published: Jan. 15, 2026, 1:23 p.m. 🔄 Last Modified: Jan. 16, 2026, 3:55 p.m.

8.8

CVSS3.1

CVE-2025-13062 - Supreme Modules Lite <= 2.5.62 - Authenticated (Author+) Arbitrary File Upload via JSON Upload Bypa…

The Supreme Modules Lite plugin for WordPress is vulnerable to arbitrary file upload in all versions up to, and including, 2.5.62. This is due to insufficient file type validation detecting JSON files, allowing double extension files to bypass sanitization while being accepted as a valid JSON file.…

📅 Published: Jan. 15, 2026, 1:23 p.m. 🔄 Last Modified: Jan. 16, 2026, 3:55 p.m.

5.3

CVSS3.1

CVE-2025-12895 - Kalium <= 3.29 - Missing Authorization to Unauthenticated Mail Relay via kalium_vc_contact_form_req…

The Kalium 3 | Creative WordPress & WooCommerce Theme theme for WordPress is vulnerable to unauthorized email sending due to a missing capability check on the kalium_vc_contact_form_request() function in all versions up to, and including, 3.29. This makes it possible for unauthenticated attackers t…

📅 Published: Jan. 15, 2026, 1:23 p.m. 🔄 Last Modified: Jan. 16, 2026, 3:55 p.m.

4.3

CVSS3.1

CVE-2026-22646 -

Certain error messages returned by the application expose internal system details that should not be visible to end users, providing attackers with valuable reconnaissance information (like file paths, database errors, or software versions) that can be used to map the application's internal structu…

📅 Published: Jan. 15, 2026, 1:15 p.m. 🔄 Last Modified: Jan. 29, 2026, 4:18 p.m.
Total resulsts: 330471
Page 259 of 33,048
« previous page » next page
Filters