0.0

CVE-2026-25698 -

Not used

πŸ“… Published: Feb. 5, 2026, 8:56 a.m. πŸ”„ Last Modified: Feb. 6, 2026, 3:55 a.m.

0.0

CVE-2026-25696 -

Not used

πŸ“… Published: Feb. 5, 2026, 8:56 a.m. πŸ”„ Last Modified: Feb. 6, 2026, 3:55 a.m.

0.0

CVE-2026-25695 -

Not used

πŸ“… Published: Feb. 5, 2026, 8:56 a.m. πŸ”„ Last Modified: Feb. 6, 2026, 3:55 a.m.

0.0

CVE-2026-25697 -

Not used

πŸ“… Published: Feb. 5, 2026, 8:56 a.m. πŸ”„ Last Modified: Feb. 6, 2026, 3:55 a.m.

0.0

CVE-2026-25694 -

Not used

πŸ“… Published: Feb. 5, 2026, 8:56 a.m. πŸ”„ Last Modified: Feb. 6, 2026, 3:55 a.m.

0.0

CVE-2026-25692 -

Not used

πŸ“… Published: Feb. 5, 2026, 8:56 a.m. πŸ”„ Last Modified: Feb. 6, 2026, 3:55 a.m.

0.0

CVE-2026-25693 -

Not used

πŸ“… Published: Feb. 5, 2026, 8:56 a.m. πŸ”„ Last Modified: Feb. 6, 2026, 3:55 a.m.

4.3

CVSS3.1

CVE-2025-13416 - ProfileGrid – User Profiles, Groups and Communities <= 5.9.7.2 - Missing Authorization to Authentic…

The ProfileGrid – User Profiles, Groups and Communities plugin for WordPress is vulnerable to unauthorized user suspension due to a missing capability check on the pm_deactivate_user_from_group() function in all versions up to, and including, 5.9.7.2. This makes it possible for authenticated attack…

πŸ“… Published: Feb. 5, 2026, 8:25 a.m. πŸ”„ Last Modified: April 22, 2026, 8:15 p.m.

6.4

CVSS3.1

CVE-2026-1319 - Robin Image Optimizer <= 2.0.2 - Authenticated (Author+) Stored Cross-Site Scripting via Image Alte…

The Robin Image Optimizer – Unlimited Image Optimization & WebP Converter plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'Alternative Text' field of a Media Library image in all versions up to, and including, 2.0.2 due to insufficient input sanitization and output escapin…

πŸ“… Published: Feb. 5, 2026, 8:25 a.m. πŸ”„ Last Modified: April 15, 2026, 9:30 p.m.

5.1

CVSS4.0

CVE-2026-25198 - Open Redirect Vulnerability Enabling Phishing in web2py

web2py versions 2.27.1-stable+timestamp.2023.11.16.08.03.57 and prior contain an open redirect vulnerability. If this vulnerability is exploited, the user may be redirected to an arbitrary website when accessing a specially crafted URL. As a result, the user may become a victim of a phishing attack.

πŸ“… Published: Feb. 5, 2026, 7:38 a.m. πŸ”„ Last Modified: April 17, 2026, 11:15 p.m.
Total resulsts: 349182
Page 1790 of 34,919
Β« previous page Β» next page
Filters