CVE Find - Vulnerabilities Database

CVE Find is a real-time vulnerability database indexing 349 102 security flaws (CVE) from MITRE, NVD, CISA KEV, CWE and CAPEC. 1618 new CVEs were published in the last 7 days.

Data aggregated from: MITRE Corporation (CVE, CWE, CAPEC), National Vulnerability Database – NIST (NVD), CISA Known Exploited Vulnerabilities (KEV), FIRST (EPSS).

CVE Find
With CVE Find, explore the world's largest database of vulnerabilities.

349 102 vulnerabilities

Last update : 2026-05-10 10h45 +00:00
Common Vulnerabilities and Exposures (CVE), is a list of publicly disclosed computer security flaws.
View CVE 2025
0
Created 7 days ago
0
Updated 7 days ago
0
Created 30 days ago
0
Updated 30 days ago

Free CVE Email Notifications

Get free real-time alerts on new vulnerabilities with CVE Find.
Stay protected and informed instantly !

The last 10 High CVE

Total 349 102 CVE in Datadase
CVE ID Published Description Score Severity

CVE-2026-8234

2026-05-10
07h16 +00:00
A security vulnerability has been detected in EFM ipTIME A8004T 14.18.2. This vulnerability affects ...
Overflow
8.8
High

CVE-2026-42605

2026-05-09
20h16 +00:00
AzuraCast is a self-hosted, all-in-one web radio management suite. Prior to version 0.23.6, the curr...
Directory Traversal
8.8
High

CVE-2026-42569

2026-05-09
20h16 +00:00
phpVMS is a PHP application to run and simulate an airline. Prior to version 7.0.6, a critical vulne...
Authorization problems
9.4
Critical

CVE-2026-42562

2026-05-09
20h16 +00:00
Plainpad is a self hosted note taking app. Prior to version 1.1.1, Plainpad allows a low-privilege a...
Improper Privilege Management
8.3
High

CVE-2026-42560

2026-05-09
06h16 +00:00
auth provides authentication via oauth2, direct and email. From versions 1.18.0 to before 1.25.2 and...
Authorization problems
9.1
Critical

CVE-2026-41705

2026-05-09
01h16 +00:00
Spring AI's MilvusVectorStore#doDelete(List) implementation is vulnerable to filter-expression injec...
8.6
High

CVE-2026-44313

2026-05-09
00h16 +00:00
Linkwarden is a self-hosted, open-source collaborative bookmark manager to collect, organize and arc...
Server-Side Request Forgery - SSRF
9.1
Critical

CVE-2026-42556

2026-05-08
23h16 +00:00
Postiz is an AI social media scheduling tool. From version 2.21.6 to before version 2.21.7, any auth...
Cross-site Scripting
8.9
High

CVE-2026-42454

2026-05-08
23h16 +00:00
Termix is a web-based server management platform with SSH terminal, tunneling, and file editing capa...
OS Command Injection
9.9
Critical

CVE-2026-42354

2026-05-08
23h16 +00:00
Sentry is an error tracking and performance monitoring tool. From version 21.12.0 to before version ...
9.1
Critical

Distribution by CVSS scores


CVE created per quarter since 1999

Frequently asked questions about CVE Find

CVE Find is a cybersecurity vulnerability search engine that aggregates and indexes CVE (Common Vulnerabilities and Exposures), CWE, CAPEC and CPE data from MITRE, NVD and CISA. It allows you to search, filter and monitor security flaws via configurable real-time alerts.

A CVE (Common Vulnerability and Exposure) is a unique identifier assigned to a publicly disclosed computer security flaw. Each CVE is managed by MITRE Corporation and referenced in the NIST National Vulnerability Database (NVD) with a CVSS score evaluating its severity from 0 to 10.

CVSS (Common Vulnerability Scoring System) is an international standard that evaluates the severity of a vulnerability on a scale of 0 to 10. A score of 9 to 10 is rated Critical, 7 to 8.9 High, 4 to 6.9 Medium, and 0.1 to 3.9 Low.

CISA KEV (Known Exploited Vulnerabilities) is a catalog maintained by the US Cybersecurity Agency (CISA) listing CVE vulnerabilities actively exploited in real cyberattacks. US federal organizations are required to remediate them within a mandated deadline.

CVE Find offers a free alert system: create an account, then configure alerts by keyword, by vendor/product (CPE), by CWE category, by CVSS score or based on the CISA KEV list. Notifications are sent by email as soon as a new CVE matches your criteria.