Total CVEs

125,862

Critical Severity

2,275

High Severity

7,879

Last 7 Days

1,159
Quick preset (or use dates below)
Clear Filters
๐Ÿ“… Showing Year: 2026 (January 1 - December 31, 2026) View All Years โ†’
Showing 321 - 340 of 22,267 CVEs
CVE-2025-56535 MEDIUM - 6.1

A cross-site scripting (XSS) vulnerability in opennebula v6.10.0.1 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the zone attribute parameter.

Vendor: opennebula
Product: opennebula
Published: Apr 29, 2026
Source: NVD
CVE-2025-56534 MEDIUM - 6.1

A cross-site scripting (XSS) vulnerability in the custom authenticator driver of opennebula v6.10.0.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload.

Vendor: opennebula
Product: opennebula
Published: Apr 29, 2026
Source: NVD
CVE-2026-7384 HIGH - 7.3

A vulnerability was detected in ezequiroga mcp-bases 357ca19c7a49a9b9cb2ef639b366f03aba8bea39/c630b8ab0f970614d42da8e566e9c0d15a16414c. This impacts the function search_papers of the file research_server.py. Performing a manipulation of the argument topic results in path traversal. Remote exploitati...

Published: Apr 29, 2026
Source: NVD
CVE-2026-7111 HIGH - 8.4

Text::CSV_XS versions before 1.62 for Perl have a use-after-free when registered callbacks extend the Perl argument stack, which may enable type confusion or memory corruption. The Parse, print, getline, and getline_all methods invoke registered callbacks (for example after_parse, before_print, or ...

Published: Apr 29, 2026
Source: NVD
CVE-2026-5161 HIGH - 8.8

Improper link resolution before file access ('link following') vulnerability in TUBITAK BILGEM Software Technologies Research Institute Pardus About allows Symlink Attack. This issue affects Pardus About: before v1.2.1.

Published: Apr 29, 2026
Source: NVD
CVE-2026-5141 HIGH - 8.8

Improper Privilege Management, Improper Access Control, Incorrect privilege assignment vulnerability in TUBITAK BILGEM Software Technologies Research Institute Pardus Software Center allows Hijacking a privileged process. This issue affects Pardus Software Center: from 1.0.2 before 1.0.3.

Published: Apr 29, 2026
Source: NVD
CVE-2026-41952 HIGH - 7.8

Local privilege escalation due to improper input validation. The following products are affected: Acronis DeviceLock DLP (Windows) before build 9.0.93212, Acronis Cyber Protect Cloud Agent (Windows) before build 42183.

Vendor: Acronis
Product: Acronis DeviceLock DLP, Acronis Cyber Protect Cloud Agent
Published: Apr 29, 2026
Source: NVD
CVE-2026-41220 HIGH - 7.8

Local privilege escalation due to improper input validation. The following products are affected: Acronis DeviceLock DLP (Windows) before build 9.0.93212, Acronis Cyber Protect Cloud Agent (Windows) before build 42183.

Vendor: Acronis
Product: Acronis DeviceLock DLP, Acronis Cyber Protect Cloud Agent
Published: Apr 29, 2026
Source: NVD
CVE-2026-38992 CRITICAL - 9.8

Cockpit v2.13.5 and earlier is vulnerable to arbitrary code execution via the filter parameter within multiple endpoints. This vulnerability allows an attacker to run system commands on the underlying infrastructure via the MongoLite $func operator.

Published: Apr 29, 2026
Source: NVD
CVE-2026-36841 CRITICAL - 9.8

TOTOLINK N200RE V5 was discovered to contain a command injection vulnerability via the macstr and bandstr parameters in the formMapDelDevice function.

Published: Apr 29, 2026
Source: NVD
CVE-2026-36837 HIGH - 7.5

TOTOLINK A3002RU V3 <= V3.0.0-B20220304.1804 was discovered to contain a stack-based buffer overflow via the hostname parameter in the formMapDelDevice function.

Published: Apr 29, 2026
Source: NVD
CVE-2026-25852 MEDIUM - 6.7

Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis DeviceLock DLP (Windows) before build 9.0.93212.

Vendor: Acronis
Product: Acronis DeviceLock DLP
Published: Apr 29, 2026
Source: NVD
CVE-2026-5140 CRITICAL - 9.6

Improper neutralization of CRLF sequences ('CRLF injection') vulnerability in TUBITAK BILGEM Software Technologies Research Institute Pardus allows Authentication Bypass. This issue affects Pardus: from <=0.6.4 before 0.8.0.

Published: Apr 29, 2026
Source: NVD
CVE-2026-42525 MEDIUM - 4.3

Jenkins Microsoft Entra ID (previously Azure AD) Plugin 666.v6060de32f87d and earlier does not restrict the redirect URL after login, allowing attackers to perform phishing attacks.

Vendor: Jenkins Project
Product: Jenkins Microsoft Entra ID (previously Azure AD) Plugin
Published: Apr 29, 2026
Source: NVD
CVE-2026-42524 HIGH - 8.0

Jenkins HTML Publisher Plugin 427 and earlier does not escape job name and URL in the legacy wrapper file, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

Vendor: Jenkins Project
Product: Jenkins HTML Publisher Plugin
Published: Apr 29, 2026
Source: NVD
CVE-2026-42523 CRITICAL - 9.0

Jenkins GitHub Plugin 1.46.0 and earlier improperly processes the current job URL as part of JavaScript implementing validation of the feature "GitHub hook trigger for GITScm polling", resulting in a stored cross-site scripting (XSS) vulnerability exploitable by non-anonymous attackers wit...

Vendor: Jenkins Project
Product: Jenkins GitHub Plugin
Published: Apr 29, 2026
Source: NVD
CVE-2026-42522 MEDIUM - 4.3

A missing permission check in Jenkins GitHub Branch Source Plugin 1967.vdea_d580c1a_b_a_ and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL with attacker-specified GitHub App credentials.

Vendor: Jenkins Project
Product: Jenkins GitHub Branch Source Plugin
Published: Apr 29, 2026
Source: NVD
CVE-2026-42521 MEDIUM - 6.5

Jenkins Matrix Authorization Strategy Plugin 2.0-beta-1 through 3.2.9 (both inclusive) invokes parameterless constructors of classes specified in configuration when deserializing inheritance strategies, without restricting the classes that can be instantiated, allowing attackers with Item/Configure ...

Vendor: Jenkins Project
Product: Jenkins Matrix Authorization Strategy Plugin
Published: Apr 29, 2026
Source: NVD
CVE-2026-42520 HIGH - 7.5

Jenkins Credentials Binding Plugin 719.v80e905ef14eb_ and earlier does not sanitize file names for file and zip file credentials, allowing attackers able to provide credentials to a job to write files to arbitrary locations on the node filesystem, which can lead to remote code execution if Jenkins i...

Vendor: Jenkins Project
Product: Jenkins Credentials Binding Plugin
Published: Apr 29, 2026
Source: NVD
CVE-2026-42519 MEDIUM - 4.3

A missing permission check in Jenkins Script Security Plugin 1399.ve6a_66547f6e1 and earlier allows attackers with Overall/Read permission to enumerate pending and approved Script Security classpaths.

Vendor: Jenkins Project
Product: Jenkins Script Security Plugin
Published: Apr 29, 2026
Source: NVD