| CVE | Vendor / Product | Sev | Risk | CVSS | EPSS | KEV | Published | Description |
|---|---|---|---|---|---|---|---|---|
| CVE-2026-5056 | — | 0.00 | — | — | May 6, 2026 | |||
| CVE-2023-24287 | — | 0.00 | — | — | May 6, 2026 | |||
| CVE-2023-24286 | — | 0.00 | — | — | May 6, 2026 | |||
| CVE-2023-24285 | — | 0.00 | — | — | May 6, 2026 | |||
| CVE-2023-24284 | — | 0.00 | — | — | May 6, 2026 | |||
| CVE-2023-24283 | — | 0.00 | — | — | May 6, 2026 | |||
| CVE-2023-24291 | — | 0.00 | — | — | May 6, 2026 | |||
| CVE-2023-24288 | — | 0.00 | — | — | May 6, 2026 | |||
| CVE-2026-42014 | — | 0.00 | — | — | May 6, 2026 | |||
| CVE-2026-42015 | — | 0.00 | — | — | May 6, 2026 | |||
| CVE-2026-5419 | — | 0.00 | — | — | May 6, 2026 | |||
| CVE-2026-5260 | — | 0.00 | — | — | May 6, 2026 | |||
| CVE-2026-42013 | — | 0.00 | — | — | May 6, 2026 | |||
| CVE-2026-42012 | — | 0.00 | — | — | May 6, 2026 | |||
| CVE-2023-34854 | — | 0.00 | — | — | May 6, 2026 | |||
| CVE-2022-45592 | — | 0.00 | — | — | May 6, 2026 | |||
| CVE-2022-2205 | — | 0.00 | — | — | May 6, 2026 | |||
| CVE-2016-1000212 | — | 0.00 | — | — | May 6, 2026 | |||
| CVE-2026-35331 | — | 0.00 | — | — | May 6, 2026 | |||
| CVE-2026-35330 | — | 0.00 | — | — | May 6, 2026 | |||
| CVE-2026-35329 | — | 0.00 | — | — | May 6, 2026 | |||
| CVE-2026-35332 | — | 0.00 | — | — | May 6, 2026 | |||
| CVE-2026-35334 | — | 0.00 | — | — | May 6, 2026 | |||
| CVE-2026-35333 | — | 0.00 | — | — | May 6, 2026 | |||
| CVE-2026-35328 | — | 0.00 | — | — | May 6, 2026 | |||
| CVE-2024-52948 | — | 0.00 | — | — | May 6, 2026 | |||
| CVE-2026-1767 | — | 0.00 | — | — | May 6, 2026 | |||
| CVE-2026-1766 | — | 0.00 | — | — | May 6, 2026 | |||
| CVE-2026-1765 | — | 0.00 | — | — | May 6, 2026 | |||
| CVE-2026-1764 | — | 0.00 | — | — | May 6, 2026 | |||
| CVE-2026-2046 | — | 0.00 | — | — | May 6, 2026 | |||
| CVE-2026-1403 | — | 0.00 | — | — | May 6, 2026 | |||
| CVE-2023-4638 | — | 0.00 | — | — | May 6, 2026 | |||
| CVE-2023-6396 | — | 0.00 | — | — | May 6, 2026 | |||
| CVE-2026-2306 | Med | 0.28 | 4.3 | 0.00 | May 6, 2026 | The Ninja Tables – Easy Data Table Builder plugin for WordPress is vulnerable to unauthorized database table creation due to missing authorization checks on the `createFluentCartTable` function in all versions up to, and including, 5.2.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, to create arbitrary Ninja Tables in the database which can lead to database pollution and resource exhaustion. | ||
| CVE-2026-5343 | — | 0.00 | — | — | May 6, 2026 | Mentioned in Drupal. See https://www.drupal.org/security for vendor details. | ||
| CVE-2026-5753 | Med | 0.42 | 6.5 | 0.00 | May 6, 2026 | The All-in-One WP Migration Unlimited Extension plugin for WordPress is vulnerable to Missing Authorization in versions up to, and including, 2.83. This is due to the 'Ai1wmve_Schedules_Controller::save' handler for 'admin_post_ai1wm_schedule_event_save' not verifying user capabilities before saving schedule data. This makes it possible for authenticated attackers, with subscriber-level access and above, to create scheduled export jobs and send backup notifications to attacker-controlled email addresses. Because such notifications include the random backup filename, full site backups can subsequently be downloaded from the target site, resulting in sensitive information exposure. | ||
| CVE-2026-3208 | Med | 0.34 | 5.3 | 0.00 | May 6, 2026 | The Mercado Pago payments for WooCommerce plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'mp_pix_image' WooCommerce API endpoint in all versions up to, and including, 8.7.11. This makes it possible for unauthenticated attackers to retrieve PIX payment QR code images for arbitrary orders. PIX QR codes contain sensitive merchant information including PIX keys (which may be CPF/CNPJ personal identifiers), transaction amounts, merchant name and city, and MercadoPago transaction references. | ||
| CVE-2026-7573 | Med | 0.33 | 5.0 | 0.00 | May 6, 2026 | An authorization bypass (CWE-639) in the GetUserRoles gRPC API endpoint in Velocidex Velociraptor below version 0.76.5 allows any authenticated low-privilege user to retrieve the complete ACL policy (roles and permissions) for any user across all organizations by supplying targeted Name and Org parameters via a network request. | ||
| CVE-2026-7572 | Med | 0.29 | 4.4 | 0.00 | May 6, 2026 | An off-by-one error (CWE-193) in the ConsumeUnit16Array and ConsumeUnit64Array functions in Velocidex Velociraptor before version 0.76.5 on Windows and Linux allows a local attacker to cause a Denial of Service (DoS) via a process crash by providing a specially crafted .evtx file to the parse_evtx VQL plugin. | ||
| CVE-2025-71256 | Hig | 0.49 | 7.5 | 0.00 | May 6, 2026 | In nr modem, there is a possible improper input validation. This could lead to remote denial of service with no additional execution privileges needed. | ||
| CVE-2025-71255 | Hig | 0.49 | 7.5 | 0.00 | May 6, 2026 | In Modem IMS, there is a possible improper input validation. This could lead to remote denial of service with no additional execution privileges needed. | ||
| CVE-2025-71254 | Hig | 0.49 | 7.5 | 0.00 | May 6, 2026 | In Modem IMS, there is a possible improper input validation. This could lead to remote denial of service with no additional execution privileges needed. | ||
| CVE-2025-71253 | Hig | 0.49 | 7.5 | 0.00 | May 6, 2026 | In Modem IMS, there is a possible improper input validation. This could lead to remote denial of service with no additional execution privileges needed. | ||
| CVE-2025-71252 | Hig | 0.49 | 7.5 | 0.00 | May 6, 2026 | In Modem IMS, there is a possible improper input validation. This could lead to remote denial of service with no additional execution privileges needed. | ||
| CVE-2025-71251 | Hig | 0.49 | 7.5 | 0.00 | May 6, 2026 | In IMS, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed. | ||
| CVE-2026-44405 | Low | 0.15 | 3.4 | 0.00 | May 6, 2026 | In Paramiko through 4.0.0 before a448945, rsakey.py allows the SHA-1 algorithm. | ||
| CVE-2026-40934 | Med | 0.44 | 6.8 | 0.00 | May 5, 2026 | Jupyter Server is the backend for Jupyter web applications. In versions 2.17.0 and earlier, the secret used to sign authentication cookies is persisted to a static file at ~/.local/share/jupyter/runtime/jupyter_cookie_secret and is never rotated when a user changes their password. After a password reset and server restart, any previously issued authentication cookie remains cryptographically valid because the signing key has not changed. An attacker who has captured a session cookie through any means retains full authenticated access to the server regardless of subsequent password changes. This affects deployments using password-based authentication, particularly shared or public-facing servers where credential rotation is expected to revoke existing sessions. This issue has been fixed in version 2.18.0. | ||
| CVE-2026-40110 | Hig | 0.40 | 7.3 | 0.00 | May 5, 2026 | Jupyter Server is the backend for Jupyter web applications. In versions 2.17.0 and earlier, the Origin header validation uses Python's re.match() to check incoming origins against the allow_origin_pat configuration value. Because re.match() only anchors at the start of the string and does not require a full match, a pattern intended to match only a trusted domain (e.g., trusted.example.com) will also match any origin that begins with that domain followed by additional characters (e.g., trusted.example.com.evil.com). An attacker who controls such a domain can bypass the CORS origin restriction and make cross-origin requests to the Jupyter Server API from an untrusted site. This issue has been fixed in version 2.18.0. | ||
| CVE-2026-40075 | Hig | 0.49 | 7.5 | 0.00 | May 5, 2026 | OpenMRS Core is an open source electronic medical record system platform. In versions 2.7.8 and earlier and versions 2.8.0 through 2.8.5, the `/openmrs/moduleResources/{moduleid}` endpoint is vulnerable to a path traversal attack. The ModuleResourcesServlet constructs a filesystem path from user-controlled input without performing path boundary validation — the getFile() method concatenates the user-supplied path into an absolute filesystem path without calling normalize() or checking that the result stays within the allowed module resources directory. Because this endpoint serves static resources required for rendering the login page, it is not protected by authentication filters, allowing unauthenticated exploitation. An attacker can traverse directories and read arbitrary files from the server filesystem, including /etc/passwd and application configuration files containing database credentials. Successful exploitation requires the target deployment to run on Apache Tomcat versions prior to 8.5.31, where the ..; path parameter bypass is not mitigated by the container. Deployments on Tomcat 8.5.31 or later and Tomcat 9.0.10 or later are protected at the container level, though the underlying code defect remains. This issue has been fixed in versions after 2.7.8 (within the 2.7.x branch) and in version 2.8.6 and later. |
- CVE-2026-5056May 6, 2026risk 0.00cvss —epss —
- CVE-2023-24287May 6, 2026risk 0.00cvss —epss —
- CVE-2023-24286May 6, 2026risk 0.00cvss —epss —
- CVE-2023-24285May 6, 2026risk 0.00cvss —epss —
- CVE-2023-24284May 6, 2026risk 0.00cvss —epss —
- CVE-2023-24283May 6, 2026risk 0.00cvss —epss —
- CVE-2023-24291May 6, 2026risk 0.00cvss —epss —
- CVE-2023-24288May 6, 2026risk 0.00cvss —epss —
- CVE-2026-42014May 6, 2026risk 0.00cvss —epss —
- CVE-2026-42015May 6, 2026risk 0.00cvss —epss —
- CVE-2026-5419May 6, 2026risk 0.00cvss —epss —
- CVE-2026-5260May 6, 2026risk 0.00cvss —epss —
- CVE-2026-42013May 6, 2026risk 0.00cvss —epss —
- CVE-2026-42012May 6, 2026risk 0.00cvss —epss —
- CVE-2023-34854May 6, 2026risk 0.00cvss —epss —
- CVE-2022-45592May 6, 2026risk 0.00cvss —epss —
- CVE-2022-2205May 6, 2026risk 0.00cvss —epss —
- CVE-2016-1000212May 6, 2026risk 0.00cvss —epss —
- CVE-2026-35331May 6, 2026risk 0.00cvss —epss —
- CVE-2026-35330May 6, 2026risk 0.00cvss —epss —
- CVE-2026-35329May 6, 2026risk 0.00cvss —epss —
- CVE-2026-35332May 6, 2026risk 0.00cvss —epss —
- CVE-2026-35334May 6, 2026risk 0.00cvss —epss —
- CVE-2026-35333May 6, 2026risk 0.00cvss —epss —
- CVE-2026-35328May 6, 2026risk 0.00cvss —epss —
- CVE-2024-52948May 6, 2026risk 0.00cvss —epss —
- CVE-2026-1767May 6, 2026risk 0.00cvss —epss —
- CVE-2026-1766May 6, 2026risk 0.00cvss —epss —
- CVE-2026-1765May 6, 2026risk 0.00cvss —epss —
- CVE-2026-1764May 6, 2026risk 0.00cvss —epss —
- CVE-2026-2046May 6, 2026risk 0.00cvss —epss —
- CVE-2026-1403May 6, 2026risk 0.00cvss —epss —
- CVE-2023-4638May 6, 2026risk 0.00cvss —epss —
- CVE-2023-6396May 6, 2026risk 0.00cvss —epss —
- risk 0.28cvss 4.3epss 0.00
The Ninja Tables – Easy Data Table Builder plugin for WordPress is vulnerable to unauthorized database table creation due to missing authorization checks on the `createFluentCartTable` function in all versions up to, and including, 5.2.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, to create arbitrary Ninja Tables in the database which can lead to database pollution and resource exhaustion.
- CVE-2026-5343May 6, 2026risk 0.00cvss —epss —
Mentioned in Drupal. See https://www.drupal.org/security for vendor details.
- risk 0.42cvss 6.5epss 0.00
The All-in-One WP Migration Unlimited Extension plugin for WordPress is vulnerable to Missing Authorization in versions up to, and including, 2.83. This is due to the 'Ai1wmve_Schedules_Controller::save' handler for 'admin_post_ai1wm_schedule_event_save' not verifying user capabilities before saving schedule data. This makes it possible for authenticated attackers, with subscriber-level access and above, to create scheduled export jobs and send backup notifications to attacker-controlled email addresses. Because such notifications include the random backup filename, full site backups can subsequently be downloaded from the target site, resulting in sensitive information exposure.
- risk 0.34cvss 5.3epss 0.00
The Mercado Pago payments for WooCommerce plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'mp_pix_image' WooCommerce API endpoint in all versions up to, and including, 8.7.11. This makes it possible for unauthenticated attackers to retrieve PIX payment QR code images for arbitrary orders. PIX QR codes contain sensitive merchant information including PIX keys (which may be CPF/CNPJ personal identifiers), transaction amounts, merchant name and city, and MercadoPago transaction references.
- risk 0.33cvss 5.0epss 0.00
An authorization bypass (CWE-639) in the GetUserRoles gRPC API endpoint in Velocidex Velociraptor below version 0.76.5 allows any authenticated low-privilege user to retrieve the complete ACL policy (roles and permissions) for any user across all organizations by supplying targeted Name and Org parameters via a network request.
- risk 0.29cvss 4.4epss 0.00
An off-by-one error (CWE-193) in the ConsumeUnit16Array and ConsumeUnit64Array functions in Velocidex Velociraptor before version 0.76.5 on Windows and Linux allows a local attacker to cause a Denial of Service (DoS) via a process crash by providing a specially crafted .evtx file to the parse_evtx VQL plugin.
- risk 0.49cvss 7.5epss 0.00
In nr modem, there is a possible improper input validation. This could lead to remote denial of service with no additional execution privileges needed.
- risk 0.49cvss 7.5epss 0.00
In Modem IMS, there is a possible improper input validation. This could lead to remote denial of service with no additional execution privileges needed.
- risk 0.49cvss 7.5epss 0.00
In Modem IMS, there is a possible improper input validation. This could lead to remote denial of service with no additional execution privileges needed.
- risk 0.49cvss 7.5epss 0.00
In Modem IMS, there is a possible improper input validation. This could lead to remote denial of service with no additional execution privileges needed.
- risk 0.49cvss 7.5epss 0.00
In Modem IMS, there is a possible improper input validation. This could lead to remote denial of service with no additional execution privileges needed.
- risk 0.49cvss 7.5epss 0.00
In IMS, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed.
- risk 0.15cvss 3.4epss 0.00
In Paramiko through 4.0.0 before a448945, rsakey.py allows the SHA-1 algorithm.
- risk 0.44cvss 6.8epss 0.00
Jupyter Server is the backend for Jupyter web applications. In versions 2.17.0 and earlier, the secret used to sign authentication cookies is persisted to a static file at ~/.local/share/jupyter/runtime/jupyter_cookie_secret and is never rotated when a user changes their password. After a password reset and server restart, any previously issued authentication cookie remains cryptographically valid because the signing key has not changed. An attacker who has captured a session cookie through any means retains full authenticated access to the server regardless of subsequent password changes. This affects deployments using password-based authentication, particularly shared or public-facing servers where credential rotation is expected to revoke existing sessions. This issue has been fixed in version 2.18.0.
- risk 0.40cvss 7.3epss 0.00
Jupyter Server is the backend for Jupyter web applications. In versions 2.17.0 and earlier, the Origin header validation uses Python's re.match() to check incoming origins against the allow_origin_pat configuration value. Because re.match() only anchors at the start of the string and does not require a full match, a pattern intended to match only a trusted domain (e.g., trusted.example.com) will also match any origin that begins with that domain followed by additional characters (e.g., trusted.example.com.evil.com). An attacker who controls such a domain can bypass the CORS origin restriction and make cross-origin requests to the Jupyter Server API from an untrusted site. This issue has been fixed in version 2.18.0.
- risk 0.49cvss 7.5epss 0.00
OpenMRS Core is an open source electronic medical record system platform. In versions 2.7.8 and earlier and versions 2.8.0 through 2.8.5, the `/openmrs/moduleResources/{moduleid}` endpoint is vulnerable to a path traversal attack. The ModuleResourcesServlet constructs a filesystem path from user-controlled input without performing path boundary validation — the getFile() method concatenates the user-supplied path into an absolute filesystem path without calling normalize() or checking that the result stays within the allowed module resources directory. Because this endpoint serves static resources required for rendering the login page, it is not protected by authentication filters, allowing unauthenticated exploitation. An attacker can traverse directories and read arbitrary files from the server filesystem, including /etc/passwd and application configuration files containing database credentials. Successful exploitation requires the target deployment to run on Apache Tomcat versions prior to 8.5.31, where the ..; path parameter bypass is not mitigated by the container. Deployments on Tomcat 8.5.31 or later and Tomcat 9.0.10 or later are protected at the container level, though the underlying code defect remains. This issue has been fixed in versions after 2.7.8 (within the 2.7.x branch) and in version 2.8.6 and later.