Total CVEs

130,823

Critical Severity

2,726

High Severity

9,741

Last 7 Days

911
Quick preset (or use dates below)
Clear Filters
📅 Showing Year: 2026 (January 1 - December 31, 2026) View All Years →
Showing 41 - 60 of 27,228 CVEs

Previously, a revoked 'SignatureKey' belonging to a CA was not correctly checked for revocation. Now, both the 'key' and 'key.SignatureKey' are checked for @revoked.

Vendor: golang.org/x/crypto
Product: golang.org/x/crypto/ssh/knownhosts
Published: May 22, 2026
Source: NVD

SSH servers which use CertChecker as a public key callback without setting IsUserAuthority or IsHostAuthority could be caused to panic by a client presenting a certificate. CertChecker now returns an error instead of panicking when these callbacks are nil.

Vendor: golang.org/x/crypto
Product: golang.org/x/crypto/ssh
Published: May 22, 2026
Source: NVD

When writing data larger than 4GB in a single Write call on an SSH channel, an integer overflow in the internal payload size calculation caused the write loop to spin indefinitely, sending empty packets without making progress. The size comparison now uses int64 to prevent truncation.

Vendor: golang.org/x/crypto
Product: golang.org/x/crypto/ssh
Published: May 22, 2026
Source: NVD

The in-memory keyring returned by NewKeyring() silently accepted keys with the ConfirmBeforeUse constraint but never enforced it. The key would sign without any confirmation prompt, with no indication to the caller that the constraint was not in effect. NewKeyring() now returns an error when unsuppo...

Vendor: golang.org/x/crypto
Product: golang.org/x/crypto/ssh/agent
Published: May 22, 2026
Source: NVD

When adding a key to a remote agent constraint extensions such as restrict-destination-v00@openssh.com were not serialized in the request. Destination restrictions were silently stripped when forwarding keys, allowing unrestricted use of the key on the remote host. The client now serializes all cons...

Vendor: golang.org/x/crypto
Product: golang.org/x/crypto/ssh/agent
Published: May 22, 2026
Source: NVD

The Verify() method for FIDO/U2F security key types (sk-ecdsa-sha2-nistp256@openssh.com, sk-ssh-ed25519@openssh.com) did not check the User Presence flag. Signatures generated without physical touch were accepted, allowing unattended use of a hardware security key. To restore the previous behavior, ...

Vendor: golang.org/x/crypto
Product: golang.org/x/crypto/ssh
Published: May 22, 2026
Source: NVD

A malicious SSH peer could send unsolicited global request responses to fill an internal buffer, blocking the connection's read loop. The blocked goroutine could not be released by calling Close(), resulting in a resource leak per connection. Unsolicited global responses are now discarded.

Vendor: golang.org/x/crypto
Product: golang.org/x/crypto/ssh
Published: May 22, 2026
Source: NVD

The RSA and DSA public key parsers did not enforce size limits on key parameters. A crafted public key with an excessively large modulus or DSA parameter could cause several minutes of CPU consumption during signature verification. This could be triggered by unauthenticated clients during public key...

Vendor: golang.org/x/crypto
Product: golang.org/x/crypto/ssh
Published: May 22, 2026
Source: NVD

When an SSH server authentication callback returned PartialSuccessError with non-nil Permissions, those permissions were silently discarded, potentially dropping certificate restrictions such as force-command after a second factor succeeded. Returning non-nil Permissions with PartialSuccessError now...

Vendor: golang.org/x/crypto
Product: golang.org/x/crypto/ssh
Published: May 22, 2026
Source: NVD

An authenticated SSH client that repeatedly opened channels which were rejected by the server caused unbounded memory growth, eventually crashing the server process and affecting all connected users. Rejected channels are now properly removed from the connection's internal state and released fo...

Vendor: golang.org/x/crypto
Product: golang.org/x/crypto/ssh
Published: May 22, 2026
Source: NVD

A cross-site scripting (XSS) vulnerability in SketchUp 2026's Dynamic Components feature allows remote code execution and local file exfiltration through maliciously crafted SKP files. The vulnerability stems from improper input sanitization in the component options window, enabling attackers t...

Published: May 22, 2026
Source: NVD
CVE-2026-34911 HIGH - 7.7

A malicious actor with access to the network and low privileges could exploit a Path Traversal vulnerability found in UniFi OS devices to access files on the underlying system that could be manipulated to obtain sensitive information.

Published: May 22, 2026
Source: NVD
CVE-2026-34910 CRITICAL - 10.0

A malicious actor with access to the network could exploit an Improper Input Validation vulnerability found in UniFi OS devices to execute a Command Injection.

Published: May 22, 2026
Source: NVD
CVE-2026-34909 CRITICAL - 10.0

A malicious actor with access to the network could exploit a Path Traversal vulnerability found in UniFi OS devices to access files on the underlying system that could be manipulated to access an underlying account.

Published: May 22, 2026
Source: NVD
CVE-2026-34908 CRITICAL - 10.0

A malicious actor with access to the network could exploit an Improper Access Control vulnerability found in UniFi OS devices to make unauthorized changes to the system.

Published: May 22, 2026
Source: NVD
CVE-2026-33000 CRITICAL - 9.1

A malicious actor with access to the network and high privileges could exploit an Improper Input Validation vulnerability found in UniFi OS devices to execute a Command Injection.

Vendor: Ubiquiti Inc
Product: UniFi OS Server
Published: May 22, 2026
Source: NVD

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

Published: May 21, 2026
Source: NVD
CVE-2026-46701 HIGH - 7.6

Network-AI: Unauthenticated Cross-Origin MCP Tool Invocation via Empty Default Secret

Vendor: npm
Product: network-ai
Published: May 21, 2026
Source: GitHub

Concrete CMS 9 before 9.5.0 is vulnerable to Cross Site Request Forgery (CSRF) at concrete/controllers/backend/file approveVersion(). The Concrete CMS security team gave this vulnerability a CVSS v.4.0 score of 2.3 with vector CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N. Thanks Y...

Published: May 21, 2026
Source: NVD

Concrete CMS 9 before 9.5.0 is vulnerable to Cross Site Request Forgery (CSRF) at concrete/controllers/backend/file rescanMultiple(). The Concrete CMS security team gave this vulnerability a CVSS v.4.0 score of 2.3 with vector CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N. Thanks Y...

Published: May 21, 2026
Source: NVD