Free Security Tools & CVE Database

Track CVE vulnerabilities, run security tools, and stay informed with expert cybersecurity guides.

🛡️ CVE Vulnerability Database (5,484+ CVEs tracked) Browse all →

🔴 Critical (473) 🟠 High (1,691) 🟡 Medium 🟢 Low 📅 2026
CVE-2026-41686
Claude SDK for TypeScript provides access to the Claude API from server-side TypeScript or JavaScript applications. From version 0.79.0 to before version 0.91.1, the BetaLocalFilesystemMemoryTool in the Anthropic TypeScript SDK created memory files and directories using the Node.js default modes (0o...
CVE-2026-38751 7.2
OpenSTAManager version 2.10 and earlier contains an arbitrary file upload vulnerability in the module update functionality (modules/aggiornamenti/upload_modules.php)
CVE-2026-25863 7.5
Conditional Fields for Contact Form 7 WordPress plugin through version 2.6.7 contains an uncontrolled resource consumption vulnerability in the Wpcf7cfMailParser class where the hide_hidden_mail_fields_regex_callback() method reads an iteration count directly from user-supplied POST parameters witho...
CVE-2026-43616 7.1
Detect-It-Easy prior to 3.21 contains a path traversal vulnerability that allows attackers to write arbitrary files to the filesystem by crafting malicious archive entries with relative traversal sequences or absolute paths. Attackers can exploit insufficient path normalization during archive extrac...
CVE-2026-42796 9.8
Arelle before 2.39.10 contains an unauthenticated remote code execution vulnerability in the /rest/configure REST endpoint that accepts a plugins query parameter and forwards it to the plugin manager without authentication or authorization. Attackers can supply a URL to a malicious Python file throu...
CVE-2026-42146 5.5
CImg Library is a C++ library for image processing. Prior to commit c3aacf5, the nb_colors field read from the BMP file header is used directly to compute an allocation size without validating it against the remaining file size. A crafted BMP file with a large nb_colors value triggers an out-of-memo...
🏢 Browse CVEs by Vendor:
Openclaw (66) Axiomthemes (58) Apache (47) Mozilla (43) Wireshark (42) Tenda (41) Google (34) Adobe (27)

🛠️ Security Tools View all →

🔐
Password Checker
Test your password strength
🔑
Password Generator
Generate secure passwords
🛡️
Privacy Score Quiz
Rate your digital privacy habits
🎣
Phishing Detector
Analyze suspicious emails
🔓
Data Breach Info
What to do after a breach
🌐
VPN Comparison
Compare top VPN services
🔒
Encryption Strength
Evaluate algorithm security
📶
WiFi Security
Audit your WiFi settings
📱
2FA Guide
2FA support by service
👁️
Social Privacy Audit
Lock down your social accounts

📝 Latest Articles

Email Account Takeover Recovery 2026: The First 24 Hours After Your Email Gets Hacked
How-To Guides

Email Account Takeover Recovery 2026: The First 24 Hours After Your Email Gets Hacked

Email account takeover is the on-ramp for nearly every form of financial cybercrime tracked by the FBI. Here is the exact hour-by-hour playbook I use when a client's Gmail or Outlook is compromised — covering OAuth token revocation, session kills, financial damage control, and IC3 reporting in the critical first 24 hours.

Apr 26, 2026 11 min read
What Is Quishing? How QR Code Phishing Attacks Work in 2026
Threat Analysis

What Is Quishing? How QR Code Phishing Attacks Work in 2026

QR code phishing (quishing) bypasses email security by hiding malicious URLs inside QR code images. Learn how the attack works, why mobile is the weak link, and the defenses that actually stop it.

Apr 25, 2026 9 min read