Latest CVE Feed

Vulnerabilities published in the last 30 days. Filter by severity, exploit status, or attack vector.

Score
Vulnerability
Published
4.3 MEDIUM
CVE-2026-28195 — JetBrains TeamCity Unauthenticated Build Configuration Parameter Injection

In JetBrains TeamCity before 2025.11.3 missing authorization allowed project developers to add parameters to build configurations

teamcity | Remote | Authorization
Feb 25, 2026 Feb 25, 2026
Feb 25, 2026
Feb 25, 2026
6.1 MEDIUM
CVE-2026-28194 — JetBrains TeamCity Open Redirect Vulnerability

In JetBrains TeamCity before 2025.11.3 open redirect was possible in the React project creation flow

teamcity | Remote | Misconfiguration
Feb 25, 2026 Feb 25, 2026
Feb 25, 2026
Feb 25, 2026
8.8 HIGH
CVE-2026-28193 — JetBrains YouTrack Unvalidated Request Vulnerability

In JetBrains YouTrack before 2025.3.121962 apps were able to send requests to the app permissions endpoint

youtrack | Remote | Server-Side Request Forgery
Feb 25, 2026 Feb 26, 2026
Feb 25, 2026
Feb 26, 2026
9.8 CRITICAL
CVE-2026-2624 — Authentication Bypass in ePati's Antikor NGFW

Missing Authentication for Critical Function vulnerability in ePati Cyber ​​Security Technologies Inc. Antikor Next Generation Firewall (NGFW) allows Authentication Bypass.This issue affects Antikor …

antikor_next_generation_firewall | Remote | Authentication
Feb 25, 2026 Feb 26, 2026
Feb 25, 2026
Feb 26, 2026
2.6 LOW
CVE-2026-21725 — Authorization Bypass via TOCTOU in Grafana Datasource Deletion by Name

A time-of-create-to-time-of-use (TOCTOU) vulnerability lets recently deleted-then-recreated data sources be re-deleted without permission to do so. This requires several very stringent conditions to…

grafana | Remote | Race Condition
Feb 25, 2026 Feb 27, 2026
Feb 25, 2026
Feb 27, 2026
9.1 CRITICAL
CVE-2026-0704 — Octopus Deploy File Traversal Vulnerability

In affected version of Octopus Deploy it was possible to remove files and/or contents of files on the host using an API endpoint. The field lacked validation which could potentially result in ways to…

linux_kernel windows octopus_server | Remote | Path Traversal
Feb 25, 2026 Feb 27, 2026
Feb 25, 2026
Feb 27, 2026
6.5 MEDIUM
CVE-2026-3118 — Rhdh: graphql injection leading to platform-wide denial of service (dos) in rh developer …

A security flaw was identified in the Orchestrator Plugin of Red Hat Developer Hub (Backstage). The issue occurs due to insufficient input validation in GraphQL query handling. An authenticated user …

developer_hub | Remote | Injection
Feb 25, 2026 Feb 27, 2026
Feb 25, 2026
Feb 27, 2026
7.0 HIGH
CVE-2026-25701 — openSUSE sdbootutil Temporary File Insecure Directory Creation Vulnerability

An Insecure Temporary File vulnerability in openSUSE sdbootutil allows local users to pre-create a directory to achieve various effects like: * gain access to possible private information found in…

| Information Disclosure
Feb 25, 2026 Feb 25, 2026
Feb 25, 2026
Feb 25, 2026
5.5 MEDIUM
CVE-2026-26104 — Udisks: missing authorization check allows unprivileged users to back up luks headers via…

A flaw was found in the udisks storage management daemon that allows unprivileged users to back up LUKS encryption headers without authorization. The issue occurs because a privileged D-Bus method re…

enterprise_linux udisks gix-date | Authorization
Feb 25, 2026 Mar 02, 2026
Feb 25, 2026
Mar 02, 2026
7.1 HIGH
CVE-2026-26103 — Udisks: missing authorization check allows unprivileged users to restore luks headers via…

A flaw was found in the udisks storage management daemon that exposes a privileged D-Bus API for restoring LUKS encryption headers without proper authorization checks. The issue allows a local unpriv…

enterprise_linux udisks gix-date | Authorization
Feb 25, 2026 Mar 02, 2026
Feb 25, 2026
Mar 02, 2026
3.8 LOW
CVE-2025-67860 — NeuVector scanner insecurely handles passwords as command arguments

A vulnerability has been identified in the NeuVector scanner where the scanner process accepts registry and controller credentials as command-line arguments, potentially exposing sensitive credential…

| Information Disclosure
Feb 25, 2026 Feb 25, 2026
Feb 25, 2026
Feb 25, 2026
8.3 HIGH
CVE-2025-67601 — Rancher CLI skips TLS verification on Rancher CLI login command

A vulnerability has been identified within Rancher Manager, where using self-signed CA certificates and passing the -skip-verify flag to the Rancher CLI login command without also passing the –cacert…

rancher rancher | Remote | Misconfiguration
Feb 25, 2026 Mar 03, 2026
Feb 25, 2026
Mar 03, 2026
9.9 CRITICAL
CVE-2025-62878 — Local Path Provisioner vulnerable to Path Traversal via parameters.pathPattern

A malicious user can manipulate the parameters.pathPattern to create PersistentVolumes in arbitrary locations on the host node, potentially overwriting sensitive files or gaining access to unintended…

rancher | Remote | Path Traversal
Feb 25, 2026 Feb 25, 2026
Feb 25, 2026
Feb 25, 2026
4.3 MEDIUM
CVE-2026-2410 — Disable Admin Notices – Hide Dashboard Notifications <= 1.4.2 - Cross-Site Request Forger…

The Disable Admin Notices – Hide Dashboard Notifications plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.4.2. This is due to missing nonce val…

Remote | Cross-Site Request Forgery
Feb 25, 2026 Feb 25, 2026
Feb 25, 2026
Feb 25, 2026
6.4 MEDIUM
CVE-2026-2367 — Secure Copy Content Protection and Content Locking <= 5.0.1 - Authenticated (Contributor+…

The Secure Copy Content Protection and Content Locking plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'ays_block' shortcode in all versions up to, and including, 5…

secure_copy_content_protection_and_content_locking | Remote | Cross-Site Scripting
Feb 25, 2026 Feb 25, 2026
Feb 25, 2026
Feb 25, 2026
4.3 MEDIUM
CVE-2026-2301 — Post Duplicator <= 3.0.8 - Missing Authorization to Authenticated (Contributor+) Protecte…

The Post Duplicator plugin for WordPress is vulnerable to unauthorized arbitrary protected post meta insertion in all versions up to, and including, 3.0.8. This is due to the `duplicate_post()` funct…

post_duplicator | Remote | Authorization
Feb 25, 2026 Feb 25, 2026
Feb 25, 2026
Feb 25, 2026
4.3 MEDIUM
CVE-2025-14742 — WP Recipe Maker <= 10.2.3 - Missing Authorization to Authenticated (Subscriber+) Sensitiv…

The WP Recipe Maker plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'ajax_search_recipes' and 'ajax_get_recipe' functions in all versions up…

wp_recipe_maker | Remote | Authorization
Feb 25, 2026 Feb 25, 2026
Feb 25, 2026
Feb 25, 2026
5.4 MEDIUM
CVE-2026-3171 — SourceCodester/Patrick Mvuma Patients Waiting Area Queue Management System queue.php cros…

A flaw has been found in SourceCodester/Patrick Mvuma Patients Waiting Area Queue Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /queue.php. This manipu…

patients_waiting_area_queue_management_system | Remote | Cross-Site Scripting
Feb 25, 2026 Feb 25, 2026
Feb 25, 2026
Feb 25, 2026
5.0 MEDIUM
CVE-2026-2479 — Responsive Lightbox & Gallery <= 2.7.1 - Authenticated (Author+) Server-Side Request Forg…

The Responsive Lightbox & Gallery plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 2.7.1. This is due to the use of `strpos()` for substring-bas…

responsive_lightbox | Remote | Server-Side Request Forgery
Feb 25, 2026 Feb 25, 2026
Feb 25, 2026
Feb 25, 2026
7.5 HIGH
CVE-2026-2416 — Geo Mashup <= 1.13.17 - Unauthenticated SQL Injection via 'sort' Parameter

The Geo Mashup plugin for WordPress is vulnerable to SQL Injection via the 'sort' parameter in all versions up to, and including, 1.13.17. This is due to insufficient escaping on the user supplied pa…

Remote | Injection
Feb 25, 2026 Feb 25, 2026
Feb 25, 2026
Feb 25, 2026
Showing 20 of 5340 Results