Latest CVE Feed

Vulnerabilities published in the last 30 days. Filter by severity, exploit status, or attack vector.

Score
Vulnerability
Published
5.4 MEDIUM
CVE-2026-39350 — Istio AuthorizationPolicy Incorrect Regex Matching of Dots in serviceAccounts Fields Allo…

Istio is an open platform to connect, manage, and secure microservices. In versions 1.25.0 through 1.27.8, 1.28.0 through 1.28.5, 1.29.0, and 1.29.1, the serviceAccounts and notServiceAccounts fields…

istio | Remote | Authorization
Apr 15, 2026 Apr 15, 2026
Apr 15, 2026
Apr 15, 2026
9.1 CRITICAL
CVE-2026-6388 — Argocd-image-updater: argocd image updater: cross-namespace privilege escalation via insu…

A flaw was found in ArgoCD Image Updater. This vulnerability allows an attacker, with permissions to create or modify an ImageUpdater resource in a multi-tenant environment, to bypass namespace bound…

Remote | Authorization
Apr 15, 2026 Apr 15, 2026
Apr 15, 2026
Apr 15, 2026
6.8 MEDIUM
CVE-2026-40500 — ProcessWire CMS SSRF via Add Module From URL

ProcessWire CMS version 3.0.255 and prior contain a server-side request forgery vulnerability in the admin panel's 'Add Module From URL' feature that allows authenticated administrators to supply arb…

processwire | Remote | Server-Side Request Forgery
Apr 15, 2026 Apr 15, 2026
Apr 15, 2026
Apr 15, 2026
4.8 MEDIUM
CVE-2026-1711 — Pega Platform versions 8.1.0 through 25.1.1 are affected by a Stored Cross-Site Scripting…

Pega Platform versions 8.1.0 through 25.1.1 are affected by a Stored Cross-Site Scripting vulnerability in a user interface component. Requires a high privileged user with a developer role.

pega_platform | Remote | Cross-Site Scripting
Apr 15, 2026 Apr 15, 2026
Apr 15, 2026
Apr 15, 2026
5.1 MEDIUM
CVE-2026-1564 — Pega Platform versions 8.1.0 through 25.1.1 are affected by an HTML Injection vulnerabili…

Pega Platform versions 8.1.0 through 25.1.1 are affected by an HTML Injection vulnerability in a user interface component. Requires a high privileged user with a developer role.

pega_platform | Remote | Injection
Apr 15, 2026 Apr 15, 2026
Apr 15, 2026
Apr 15, 2026
8.8 HIGH
CVE-2026-40261 — Composer has Command Injection via Malicious Perforce Reference

Composer is a dependency manager for PHP. Versions 1.0 through 2.2.26 and 2.3 through 2.9.5 contain a command injection vulnerability in the Perforce::syncCodeBase() method, which appends the $source…

composer | Remote | Injection
Apr 15, 2026 Apr 15, 2026
Apr 15, 2026
Apr 15, 2026
6.1 MEDIUM
CVE-2026-40186 — ApostropheCMS: sanitize-html allowedTags Bypass via Entity-Decoded Text in nonTextTags El…

ApostropheCMS is an open-source Node.js content management system. A regression introduced in commit 49d0bb7, included in versions 2.17.1 of the ApostropheCMS-maintained sanitize-html package bypasse…

apostrophecms sanitize-html | Remote | Cross-Site Scripting
Apr 15, 2026 Apr 15, 2026
Apr 15, 2026
Apr 15, 2026
7.8 HIGH
CVE-2026-40176 — Composer is vulnerable to Command Injection via Malicious Perforce Repository

Composer is a dependency manager for PHP. Versions 1.0 through 2.2.26 and 2.3 through 2.9.5 contain a command injection vulnerability in the Perforce::generateP4Command() method, which constructs she…

composer | Injection
Apr 15, 2026 Apr 15, 2026
Apr 15, 2026
Apr 15, 2026
9.4 CRITICAL
CVE-2026-40173 — Dgraph: Unauthenticated pprof endpoint leaks admin auth token

Dgraph is an open source distributed GraphQL database. Versions 25.3.1 and prior contain an unauthenticated credential disclosure vulnerability where the /debug/pprof/cmdline endpoint is registered o…

dgraph | Remote | Authentication
Apr 15, 2026 Apr 16, 2026
Apr 15, 2026
Apr 16, 2026
8.5 HIGH
CVE-2026-22676 — Barracuda RMM < 2025.2.2 Privilege Escalation via Insecure Directory Permissions

Barracuda RMM versions prior to 2025.2.2 contain a privilege escalation vulnerability that allows local attackers to gain SYSTEM-level privileges by exploiting overly permissive filesystem ACLs on th…

rmm | Authorization
Apr 15, 2026 Apr 15, 2026
Apr 15, 2026
Apr 15, 2026
6.5 MEDIUM
CVE-2026-6385 — Ffmpeg: ffmpeg: denial of service and potential arbitrary code execution via signed integ…

A flaw was found in FFmpeg. A remote attacker could exploit this vulnerability by providing a specially crafted MPEG-PS/VOB media file containing a malicious DVD subtitle stream. This vulnerability i…

Remote | Memory Corruption
Apr 15, 2026 Apr 15, 2026
Apr 15, 2026
Apr 15, 2026
7.3 HIGH
CVE-2026-6384 — Gimp: gimp: arbitrary code execution or denial of service via buffer overflow in gif imag…

A flaw was found in gimp. This buffer overflow vulnerability in the GIF image loading component's `ReadJeffsImage` function allows an attacker to write beyond an allocated buffer by processing a spec…

| Memory Corruption
Apr 15, 2026 Apr 15, 2026
Apr 15, 2026
Apr 15, 2026
6.5 MEDIUM
CVE-2026-6364 — Google Chrome Skia Out-of-Bounds Read

Out of bounds read in Skia in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted file. (Chromium security se…

chrome | Remote | Memory Corruption
Apr 15, 2026 Apr 16, 2026
Apr 15, 2026
Apr 16, 2026
8.8 HIGH
CVE-2026-6363 — Google Chrome V8 Type Confusion Memory Access

Type Confusion in V8 in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. (Chromium security severity: Medium)

chrome | Remote | Memory Corruption
Apr 15, 2026 Apr 15, 2026
Apr 15, 2026
Apr 15, 2026
6.3 MEDIUM
CVE-2026-6362 — Google Chrome Use After Free in Codecs Vulnerability

Use after free in Codecs in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to potentially perform out of bounds memory access via a crafted video file. (Chromium security severity: H…

chrome | Remote | Memory Corruption
Apr 15, 2026 Apr 16, 2026
Apr 15, 2026
Apr 16, 2026
7.2 HIGH
CVE-2026-6361 — Google Chrome PDFium Heap Buffer Overflow

Heap buffer overflow in PDFium in Google Chrome on Windows prior to 147.0.7727.101 allowed a remote attacker who convinced a user to engage in specific UI gestures to execute arbitrary code inside a …

chrome | Remote | Memory Corruption
Apr 15, 2026 Apr 16, 2026
Apr 15, 2026
Apr 16, 2026
8.8 HIGH
CVE-2026-6360 — Google Chrome FileSystem Use-After-Free Vulnerability

Use after free in FileSystem in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page. (Chromium security severity: High)

chrome | Remote | Memory Corruption
Apr 15, 2026 Apr 15, 2026
Apr 15, 2026
Apr 15, 2026
8.8 HIGH
CVE-2026-6359 — Google Chrome Use After Free in Video on Windows

Use after free in Video in Google Chrome on Windows prior to 147.0.7727.101 allowed a remote attacker who had compromised the renderer process to perform out of bounds memory access via a crafted HTM…

chrome | Remote | Memory Corruption
Apr 15, 2026 Apr 15, 2026
Apr 15, 2026
Apr 15, 2026
8.8 HIGH
CVE-2026-6358 — Google Chrome Android Use-After-Free Vulnerability

Use after free in XR in Google Chrome on Android prior to 147.0.7727.101 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: Critic…

chrome | Remote | Memory Corruption
Apr 15, 2026 Apr 15, 2026
Apr 15, 2026
Apr 15, 2026
7.5 HIGH
CVE-2026-6319 — Google Chrome Android Use-After-Free RCE

Use after free in Payments in Google Chrome on Android prior to 147.0.7727.101 allowed a remote attacker who convinced a user to engage in specific UI gestures to execute arbitrary code via a crafted…

chrome | Remote | Memory Corruption
Apr 15, 2026 Apr 16, 2026
Apr 15, 2026
Apr 16, 2026
Showing 20 of 6533 Results