Total CVEs

126,184

Critical Severity

2,292

High Severity

7,950

Last 7 Days

1,214
Quick preset (or use dates below)
Clear Filters
📅 Showing Year: 2026 (January 1 - December 31, 2026) View All Years →
Showing 2,061 - 2,080 of 22,589 CVEs
CVE-2026-41666 MEDIUM - 6.6

Integer overflow in tensor copy size calculation in Samsung Open Source ONE could lead to out of bounds access during loop state propagation. Affected version is prior to commit 1.30.0.

Vendor: Samsung Open Source
Product: ONE
Published: Apr 22, 2026
Source: NVD
CVE-2026-41665 MEDIUM - 6.1

Integer overflow in scratch buffer initialization size calculation in Samsung Open Source ONE cause incorrect memory initialization for large intermediate tensors. Affected version is prior to commit 1.30.0.

Vendor: Samsung Open Source
Product: ONE
Published: Apr 22, 2026
Source: NVD
CVE-2026-41664 MEDIUM - 6.6

Integer overflow in memory copy size calculation in Samsung Open Source ONE could lead to invalid memory operations with large tensor shapes. Affected version is prior to commit 1.30.0.

Vendor: Samsung Open Source
Product: ONE
Published: Apr 22, 2026
Source: NVD
CVE-2026-40450 MEDIUM - 6.6

Integer overflow in output tensor copy size calculation in Samsung Open Source ONE could cause incorrect copy length and memory corruption for oversized tensors. Affected version is prior to commit 1.30.0.

Vendor: Samsung Open Source
Product: ONE
Published: Apr 22, 2026
Source: NVD
CVE-2026-40449 MEDIUM - 6.6

Integer overflow in buffer size calculation could result in out of bounds memory access when handling large tensors in Samsung Open Source ONE. Affected version is prior to commit 1.30.0.

Vendor: Samsung Open Source
Product: ONE
Published: Apr 22, 2026
Source: NVD
CVE-2026-40448 MEDIUM - 5.3

Potential Integer overflow in tensor allocation size calculation could lead to insufficient memory allocation for large tensors in Samsung Open Source ONE. Affected version is prior to commit  1.30.0.

Vendor: Samsung Open Source
Product: ONE
Published: Apr 22, 2026
Source: NVD
CVE-2026-22754 HIGH - 7.5

Vulnerability in Spring Spring Security. If an application uses <sec:intercept-url servlet-path="/servlet-path" pattern="/endpoint/**"/> to define the servlet path for computing a path matcher, then the servlet path is not included and the related authorization rules are no...

Vendor: Spring
Product: Spring Security
Published: Apr 22, 2026
Source: NVD
CVE-2026-22753 HIGH - 7.5

Vulnerability in Spring Spring Security. If an application is using securityMatchers(String) and a PathPatternRequestMatcher.Builder bean to prepend a servlet path, matching requests to that filter chain may fail and its related security components will not be exercised as intended by the applicatio...

Vendor: Spring
Product: Spring Security
Published: Apr 22, 2026
Source: NVD
CVE-2026-22748 MEDIUM - 5.3

Vulnerability in Spring Spring Security. When an application configures JWT decoding with NimbusJwtDecoder  or NimbusReactiveJwtDecoder, it must configure an OAuth2TokenValidator<Jwt> separately, for example by calling setJwtValidator.This issue affects Spring Security: from 6.3.0 through 6.3....

Vendor: Spring
Product: Spring Security
Published: Apr 22, 2026
Source: NVD
CVE-2026-22747 MEDIUM - 6.8

Vulnerability in Spring Spring Security. SubjectX500PrincipalExtractor does not correctly handle certain malformed X.509 certificate CN values, which can lead to reading the wrong value for the username. In a carefully crafted certificate, this can lead to an attacker impersonating another user. Thi...

Vendor: Spring
Product: Spring Security
Published: Apr 22, 2026
Source: NVD

Vulnerability in Spring Spring Security. If an application is using the UserDetails#isEnabled, #isAccountNonExpired, or #isAccountNonLocked user attributes, to enable, expire, or lock users, then DaoAuthenticationProvider's timing attack defense can be bypassed for users who are disabled, expir...

Vendor: Spring
Product: Spring Security
Published: Apr 22, 2026
Source: NVD
CVE-2026-40451 MEDIUM - 6.1

DeepL Chrome browser extension versions from v1.22.0 to v.1.23.0 contain a cross-site scripting vulnerability, which allows an attacker to execute arbitrary script in a user's browser, and inject malicious HTML into web pages viewed by the user.

Vendor: DeepL
Product: Chrome browser extension
Published: Apr 22, 2026
Source: NVD
CVE-2026-6835 MEDIUM - 6.1

The a+HCM developed by aEnrich has an Arbitrary File Upload vulnerability, allowing unauthenticated remote attackers to upload arbitrary files to any path, including HTML documents, which may result in a XSS-like effect.

Published: Apr 22, 2026
Source: NVD
CVE-2026-6834 MEDIUM - 6.5

The a+HRD developed by aEnrich has a Missing Authorization vulnerability, allowing authenticated remote attackers to arbitrarily read database contents through a specific API method.

Published: Apr 22, 2026
Source: NVD
CVE-2026-6833 MEDIUM - 6.5

The a+HRD developed by aEnrich has a SQL Injection vulnerability, allowing authenticated remote attackers to inject arbitrary SQL commands to read database contents.

Published: Apr 22, 2026
Source: NVD
CVE-2026-6416 LOW - 2.7

Tanium addressed an uncontrolled resource consumption vulnerability in Interact.

Published: Apr 22, 2026
Source: NVD
CVE-2026-6408 LOW - 2.7

Tanium addressed an information disclosure vulnerability in Tanium Server.

Published: Apr 22, 2026
Source: NVD
CVE-2026-6392 LOW - 2.7

Tanium addressed an information disclosure vulnerability in Threat Response.

Published: Apr 22, 2026
Source: NVD
CVE-2026-6386 MEDIUM - 6.2

In order to apply a particular protection key to an address range, the kernel must update the corresponding page table entries. The subroutine which handled this failed to take into account the presence of 1GB largepage mappings created using the shm_create_largepage(3) interface. In particular, i...

Published: Apr 22, 2026
Source: NVD
CVE-2026-5398 HIGH - 8.4

The implementation of TIOCNOTTY failed to clear a back-pointer from the structure representing the controlling terminal to the calling process' session. If the invoking process then exits, the terminal structure may end up containing a pointer to freed memory. A malicious process can abuse th...

Published: Apr 22, 2026
Source: NVD