Total CVEs

125,862

Critical Severity

2,275

High Severity

7,879

Last 7 Days

1,159
Quick preset (or use dates below)
Clear Filters
๐Ÿ“… Showing Year: 2026 (January 1 - December 31, 2026) View All Years โ†’
Showing 461 - 480 of 7,579 CVEs
CVE-2026-41278 HIGH - 7.5

Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, the GET /api/v1/public-chatflows/:id endpoint returns the full chatflow object without sanitization for public chatflows. Docker validation revealed this is worse than initially assessed: the...

Vendor: FlowiseAI
Product: Flowise
Published: Apr 23, 2026
Source: NVD
CVE-2026-41277 HIGH - 8.8

Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, a Mass Assignment vulnerability in the DocumentStore creation endpoint allows authenticated users to control the primary key (id) and internal state fields of DocumentStore entities. Because ...

Vendor: FlowiseAI
Product: Flowise
Published: Apr 23, 2026
Source: NVD
CVE-2026-41275 HIGH - 7.5

Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, the password reset functionality on cloud.flowiseai.com sends a reset password link over the unsecured HTTP protocol instead of HTTPS. This behavior introduces the risk of a man-in-the-middle...

Vendor: FlowiseAI
Product: Flowise
Published: Apr 23, 2026
Source: NVD
CVE-2026-41273 HIGH - 8.2

Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, Flowise contains an authentication bypass vulnerability that allows an unauthenticated attacker to obtain OAuth 2.0 access tokens associated with a public chatflow. By accessing a public chat...

Vendor: FlowiseAI
Product: Flowise
Published: Apr 23, 2026
Source: NVD
CVE-2026-41272 HIGH - 7.1

Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, the core security wrappers (secureAxiosRequest and secureFetch) intended to prevent Server-Side Request Forgery (SSRF) contain multiple logic flaws. These flaws allow attackers to bypass the ...

Vendor: FlowiseAI
Product: Flowise, flowise-components
Published: Apr 23, 2026
Source: NVD
CVE-2026-41271 HIGH - 7.1

Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, a Server-Side Request Forgery (SSRF) vulnerability exists in FlowiseAI's POST/GET API Chain components that allows unauthenticated attackers to force the server to make arbitrary HTTP re...

Vendor: FlowiseAI
Product: Flowise, flowise-components
Published: Apr 23, 2026
Source: NVD
CVE-2026-41270 HIGH - 7.1

Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, a Server-Side Request Forgery (SSRF) protection bypass vulnerability exists in the Custom Function feature. While the application implements SSRF protection via HTTP_DENY_LIST for axios and n...

Vendor: FlowiseAI
Product: Flowise, flowise-components
Published: Apr 23, 2026
Source: NVD
CVE-2026-41269 HIGH - 7.1

Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, the Chatflow configuration file upload settings can be modified to allow the application/javascript MIME type. This lets an attacker upload .js files even though the frontend doesnโ€™t normally...

Vendor: FlowiseAI
Product: Flowise
Published: Apr 23, 2026
Source: NVD
CVE-2026-41268 HIGH - 7.7

Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, Flowise is vulnerable to a critical unauthenticated remote command execution (RCE) vulnerability. It can be exploited via a parameter override bypass using the FILE-STORAGE:: keyword combined...

Vendor: FlowiseAI
Product: Flowise
Published: Apr 23, 2026
Source: NVD
CVE-2026-41267 HIGH - 8.1

Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, an improper mass assignment (JSON injection) vulnerability in the account registration endpoint of Flowise Cloud allows unauthenticated attackers to inject server-managed fields and nested ob...

Vendor: FlowiseAI
Product: Flowise
Published: Apr 23, 2026
Source: NVD
CVE-2026-41266 HIGH - 7.5

Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, /api/v1/public-chatbotConfig/:id ep exposes sensitive data including API keys, HTTP authorization headers and internal configuration without any authentication. An attacker with knowledge jus...

Vendor: FlowiseAI
Product: Flowise
Published: Apr 23, 2026
Source: NVD
CVE-2026-41138 HIGH - 8.3

Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, there is a remote code execution vulnerability in AirtableAgent.ts caused by lack of input verification when using Pandas. The userโ€™s input is directly applied to the question parameter withi...

Vendor: FlowiseAI
Product: Flowise
Published: Apr 23, 2026
Source: NVD
CVE-2026-41137 HIGH - 8.8

Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, The CSVAgent allows providing a custom Pandas CSV read code. Due to lack of sanitization, an attacker can provide a command injection payload that will get interpolated and executed by the se...

Vendor: FlowiseAI
Product: Flowise, flowise-components
Published: Apr 23, 2026
Source: NVD
CVE-2026-41259 HIGH - 7.5

Mastodon is a free, open-source social network server based on ActivityPub. Prior to v4.5.9, v4.4.16, and v4.3.22, Mastodon allows restricting new user sign-up based on e-mail domain names, and performs basic validation on e-mail addresses, but fails to restrict characters that are interpreted diffe...

Vendor: mastodon
Product: mastodon
Published: Apr 23, 2026
Source: NVD
CVE-2026-41246 HIGH - 8.1

Contour is a Kubernetes ingress controller using Envoy proxy. From v1.19.0 to before v1.33.4, v1.32.5, and v1.31.6, Contour's Cookie Rewriting feature is vulnerable to Lua code injection. An attacker with RBAC permissions to create or modify HTTPProxy resources can craft a malicious value in sp...

Vendor: projectcontour
Product: contour
Published: Apr 23, 2026
Source: NVD
CVE-2026-41241 HIGH - 8.7

pretalx is a conference planning tool. Prior to 2026.1.0, The organiser search in the pretalx backend rendered submission titles, speaker display names, and user names/emails into the result dropdown using innerHTML string interpolation. Any user who controls one of those fields (which includes any ...

Vendor: pretalx
Product: pretalx
Published: Apr 23, 2026
Source: NVD
CVE-2026-41205 HIGH - 7.5

Mako is a template library written in Python. Prior to 1.3.11, TemplateLookup.get_template() is vulnerable to path traversal when a URI starts with // (e.g., //../../../secret.txt). The root cause is an inconsistency between two slash-stripping implementations. Any file readable by the process can b...

Vendor: sqlalchemy
Product: mako
Published: Apr 23, 2026
Source: NVD
CVE-2026-6920 HIGH - 7.5

Out of bounds read in GPU in Google Chrome on Android prior to 147.0.7727.117 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

Vendor: google
Product: chrome
Published: Apr 23, 2026
Source: NVD
CVE-2026-34003 HIGH - 7.8

A flaw was found in the X.Org X server's XKB key types request validation. A local attacker could send a specially crafted request to the X server, leading to an out-of-bounds memory access vulnerability. This could result in the disclosure of sensitive information or cause the server to crash,...

Vendor: Red Hat
Product: Red Hat Enterprise Linux 10, Red Hat Enterprise Linux 6, Red Hat Enterprise Linux 7, Red Hat Enterprise Linux 8, Red Hat Enterprise Linux 9
Published: Apr 23, 2026
Source: NVD
CVE-2026-34001 HIGH - 7.8

A flaw was found in the X.Org X server. This use-after-free vulnerability occurs in the XSYNC fence triggering logic, specifically within the miSyncTriggerFence() function. An attacker with access to the X11 server can exploit this without user interaction, leading to a server crash and potentially ...

Vendor: Red Hat
Product: Red Hat Enterprise Linux 10, Red Hat Enterprise Linux 6, Red Hat Enterprise Linux 7, Red Hat Enterprise Linux 8, Red Hat Enterprise Linux 9
Published: Apr 23, 2026
Source: NVD