Search 11 security sources in one query

Search NVD, OSV, CISA KEV and KISA — by CVE ID, package name, or keyword.

Recently published CVEs

The most recently published vulnerabilities.

  • Malicious code in netping (PyPI)

    Risk 0.00OSV
  • MEDIUM

    Quick.CMS 6.7 contains a cross-site scripting vulnerability in the sliders form that allows authenticated attackers to inject malicious scripts by submitting XSS payloads through the sDescription parameter. Attackers can craft CSRF forms targeting the admin.php?p=sliders-form endpoint to execute arbitrary JavaScript in victim browsers when the form is submitted.

    Risk 2.55NVD
  • HIGH

    Fuel CMS 1.4.13 contains a blind SQL injection vulnerability that allows authenticated attackers to manipulate database queries by injecting SQL code through the 'col' parameter in the Activity Log interface. Attackers can send requests to the logs endpoint with malicious SQL payloads in the 'col' parameter to extract database information based on response time delays.

    Risk 3.55NVD
  • HIGH

    WordPress Plugin Backup and Restore 1.0.3 contains an arbitrary file deletion vulnerability that allows authenticated attackers to delete files by manipulating parameters in AJAX requests. Attackers can send POST requests to admin-ajax.php with crafted file_name and folder_name parameters to delete arbitrary files from the WordPress installation directory.

    Risk 4.35NVD

Actively exploited (CISA KEV)

Vulnerabilities confirmed to be exploited in the wild.

  • KEVHIGH

    Improper neutralization of input during web page generation ('cross-site scripting') in Microsoft Exchange Server allows an unauthorized attacker to perform spoofing over a network.

    Risk 7.05NVD · KEV
  • KEVCRITICAL

    May 2026: This security advisory provides the details and fix information for a vulnerability that was discovered and fixed after the was disclosed in February 2026. This new advisory is for a new vulnerability in the control connection handshaking. The section of this advisory includes Show Control Connections guidance to help with system checks.  A vulnerability in the peering authentication in Cisco Catalyst SD-WAN Controller, formerly SD-WAN vSmart, and Cisco Catalyst SD-WAN Manage

    Risk 8.00NVD · KEV
  • KEVCRITICAL

    Incorrect implementation of an authentication algorithm in Ivanti vTM other than versions 22.2R1 or 22.7R2 allows a remote unauthenticated attacker to bypass authentication of the admin panel.

    Risk 7.90KEV · KISA · NVD
  • KEVCRITICAL

    An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] vulnerability in Fortinet FortiAnalyzer 7.6.0 through 7.6.5, FortiAnalyzer 7.4.0 through 7.4.9, FortiAnalyzer 7.2.0 through 7.2.11, FortiAnalyzer 7.0.0 through 7.0.15, FortiManager 7.6.0 through 7.6.5, FortiManager 7.4.0 through 7.4.9, FortiManager 7.2.0 through 7.2.11, FortiManager 7.0.0 through 7.0.15, FortiOS 7.6.0 through 7.6.5, FortiOS 7.4.0 through 7.4.10, FortiOS 7.2.0 through 7.2.12, FortiOS 7.0.0 through

Top high-risk CVEs (last 7d)

Sorted by risk_score desc, CRITICAL · HIGH only.

  • KEVCRITICAL

    May 2026: This security advisory provides the details and fix information for a vulnerability that was discovered and fixed after the was disclosed in February 2026. This new advisory is for a new vulnerability in the control connection handshaking. The section of this advisory includes Show Control Connections guidance to help with system checks.  A vulnerability in the peering authentication in Cisco Catalyst SD-WAN Controller, formerly SD-WAN vSmart, and Cisco Catalyst SD-WAN Manage

    Risk 8.00NVD · KEV
  • KEVHIGH

    Improper neutralization of input during web page generation ('cross-site scripting') in Microsoft Exchange Server allows an unauthorized attacker to perform spoofing over a network.

    Risk 7.05NVD · KEV
  • CRITICAL

    vm2 is an open source vm/sandbox for Node.js. Prior to 3.11.3, it is possible to catch a host exception using the yield* expression inside an async generator. When the generator is closed using the return function, the value is awaited on and exceptions thrown in the then call will be caught by the runtime and passed to the yield* iterator as the next value. This allows attackers to write code which can escape from the VM2 sandbox and execute arbitrary commands on the host system. This vulnerabi

    Risk 6.40NVD · OSV · GITHUB_ADVISORY
Search across 11 sources
NVD
OSV
CISA KEV
GitHub Advisory
MITRE CVE
Exploit-DB
RustSec
PyPA
Go Vuln DB
Ruby Advisory
npm Advisory
Composer Advisory
NVD
OSV
CISA KEV
GitHub Advisory
MITRE CVE
Exploit-DB
RustSec
PyPA
Go Vuln DB
Ruby Advisory
npm Advisory
Composer Advisory