Latest CVE Feed

Vulnerabilities published in the last 30 days. Filter by severity, exploit status, or attack vector.

Score
Vulnerability
Published
4.8 MEDIUM
CVE-2026-1711 — Pega Platform versions 8.1.0 through 25.1.1 are affected by a Stored Cross-Site Scripting…

Pega Platform versions 8.1.0 through 25.1.1 are affected by a Stored Cross-Site Scripting vulnerability in a user interface component. Requires a high privileged user with a developer role.

pega_platform | Remote | Cross-Site Scripting
Apr 15, 2026 Apr 15, 2026
Apr 15, 2026
Apr 15, 2026
5.1 MEDIUM
CVE-2026-1564 — Pega Platform versions 8.1.0 through 25.1.1 are affected by an HTML Injection vulnerabili…

Pega Platform versions 8.1.0 through 25.1.1 are affected by an HTML Injection vulnerability in a user interface component. Requires a high privileged user with a developer role.

pega_platform | Remote | Injection
Apr 15, 2026 Apr 15, 2026
Apr 15, 2026
Apr 15, 2026
8.8 HIGH
CVE-2026-40261 — Composer has Command Injection via Malicious Perforce Reference

Composer is a dependency manager for PHP. Versions 1.0 through 2.2.26 and 2.3 through 2.9.5 contain a command injection vulnerability in the Perforce::syncCodeBase() method, which appends the $source…

composer | Remote | Injection
Apr 15, 2026 Apr 15, 2026
Apr 15, 2026
Apr 15, 2026
6.1 MEDIUM
CVE-2026-40186 — ApostropheCMS: sanitize-html allowedTags Bypass via Entity-Decoded Text in nonTextTags El…

ApostropheCMS is an open-source Node.js content management system. A regression introduced in commit 49d0bb7, included in versions 2.17.1 of the ApostropheCMS-maintained sanitize-html package bypasse…

apostrophecms sanitize-html | Remote | Cross-Site Scripting
Apr 15, 2026 Apr 15, 2026
Apr 15, 2026
Apr 15, 2026
7.8 HIGH
CVE-2026-40176 — Composer is vulnerable to Command Injection via Malicious Perforce Repository

Composer is a dependency manager for PHP. Versions 1.0 through 2.2.26 and 2.3 through 2.9.5 contain a command injection vulnerability in the Perforce::generateP4Command() method, which constructs she…

composer | Injection
Apr 15, 2026 Apr 15, 2026
Apr 15, 2026
Apr 15, 2026
9.4 CRITICAL
CVE-2026-40173 — Dgraph: Unauthenticated pprof endpoint leaks admin auth token

Dgraph is an open source distributed GraphQL database. Versions 25.3.1 and prior contain an unauthenticated credential disclosure vulnerability where the /debug/pprof/cmdline endpoint is registered o…

dgraph | Remote | Authentication
Apr 15, 2026 Apr 16, 2026
Apr 15, 2026
Apr 16, 2026
8.5 HIGH
CVE-2026-22676 — Barracuda RMM < 2025.2.2 Privilege Escalation via Insecure Directory Permissions

Barracuda RMM versions prior to 2025.2.2 contain a privilege escalation vulnerability that allows local attackers to gain SYSTEM-level privileges by exploiting overly permissive filesystem ACLs on th…

rmm | Authorization
Apr 15, 2026 Apr 15, 2026
Apr 15, 2026
Apr 15, 2026
6.5 MEDIUM
CVE-2026-6385 — Ffmpeg: ffmpeg: denial of service and potential arbitrary code execution via signed integ…

A flaw was found in FFmpeg. A remote attacker could exploit this vulnerability by providing a specially crafted MPEG-PS/VOB media file containing a malicious DVD subtitle stream. This vulnerability i…

Remote | Memory Corruption
Apr 15, 2026 Apr 15, 2026
Apr 15, 2026
Apr 15, 2026
7.3 HIGH
CVE-2026-6384 — Gimp: gimp: arbitrary code execution or denial of service via buffer overflow in gif imag…

A flaw was found in gimp. This buffer overflow vulnerability in the GIF image loading component's `ReadJeffsImage` function allows an attacker to write beyond an allocated buffer by processing a spec…

| Memory Corruption
Apr 15, 2026 Apr 15, 2026
Apr 15, 2026
Apr 15, 2026
6.5 MEDIUM
CVE-2026-6364 — Google Chrome Skia Out-of-Bounds Read

Out of bounds read in Skia in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted file. (Chromium security se…

chrome | Remote | Memory Corruption
Apr 15, 2026 Apr 16, 2026
Apr 15, 2026
Apr 16, 2026
8.8 HIGH
CVE-2026-6363 — Google Chrome V8 Type Confusion Memory Access

Type Confusion in V8 in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. (Chromium security severity: Medium)

chrome | Remote | Memory Corruption
Apr 15, 2026 Apr 15, 2026
Apr 15, 2026
Apr 15, 2026
6.3 MEDIUM
CVE-2026-6362 — Google Chrome Use After Free in Codecs Vulnerability

Use after free in Codecs in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to potentially perform out of bounds memory access via a crafted video file. (Chromium security severity: H…

chrome | Remote | Memory Corruption
Apr 15, 2026 Apr 16, 2026
Apr 15, 2026
Apr 16, 2026
7.2 HIGH
CVE-2026-6361 — Google Chrome PDFium Heap Buffer Overflow

Heap buffer overflow in PDFium in Google Chrome on Windows prior to 147.0.7727.101 allowed a remote attacker who convinced a user to engage in specific UI gestures to execute arbitrary code inside a …

chrome | Remote | Memory Corruption
Apr 15, 2026 Apr 16, 2026
Apr 15, 2026
Apr 16, 2026
8.8 HIGH
CVE-2026-6360 — Google Chrome FileSystem Use-After-Free Vulnerability

Use after free in FileSystem in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page. (Chromium security severity: High)

chrome | Remote | Memory Corruption
Apr 15, 2026 Apr 15, 2026
Apr 15, 2026
Apr 15, 2026
8.8 HIGH
CVE-2026-6359 — Google Chrome Use After Free in Video on Windows

Use after free in Video in Google Chrome on Windows prior to 147.0.7727.101 allowed a remote attacker who had compromised the renderer process to perform out of bounds memory access via a crafted HTM…

chrome | Remote | Memory Corruption
Apr 15, 2026 Apr 15, 2026
Apr 15, 2026
Apr 15, 2026
8.8 HIGH
CVE-2026-6358 — Google Chrome Android Use-After-Free Vulnerability

Use after free in XR in Google Chrome on Android prior to 147.0.7727.101 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: Critic…

chrome | Remote | Memory Corruption
Apr 15, 2026 Apr 15, 2026
Apr 15, 2026
Apr 15, 2026
7.5 HIGH
CVE-2026-6319 — Google Chrome Android Use-After-Free RCE

Use after free in Payments in Google Chrome on Android prior to 147.0.7727.101 allowed a remote attacker who convinced a user to engage in specific UI gestures to execute arbitrary code via a crafted…

chrome | Remote | Memory Corruption
Apr 15, 2026 Apr 16, 2026
Apr 15, 2026
Apr 16, 2026
8.8 HIGH
CVE-2026-6318 — Google Chrome Codecs Use After Free Vulnerability

Use after free in Codecs in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Medium)

chrome | Remote | Memory Corruption
Apr 15, 2026 Apr 16, 2026
Apr 15, 2026
Apr 16, 2026
8.8 HIGH
CVE-2026-6317 — Google Chrome Use After Free Remote Code Execution Vulnerability

Use after free in Cast in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)

chrome | Remote | Memory Corruption
Apr 15, 2026 Apr 15, 2026
Apr 15, 2026
Apr 15, 2026
8.8 HIGH
CVE-2026-6316 — Google Chrome Use After Free in Forms Vulnerability

Use after free in Forms in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

chrome | Remote | Memory Corruption
Apr 15, 2026 Apr 15, 2026
Apr 15, 2026
Apr 15, 2026
Showing 20 of 6566 Results