Total CVEs

125,872

Critical Severity

2,276

High Severity

7,883

Last 7 Days

1,163
Quick preset (or use dates below)
Clear Filters
๐Ÿ“… Showing Year: 2026 (January 1 - December 31, 2026) View All Years โ†’
Showing 701 - 720 of 1,284 CVEs
CVE-2026-2751 HIGH - 8.3

Blind SQL Injection via unsanitized array keys in Service Dependencies deletion. Vulnerability in Centreon Centreon Web on Central Server on Linux (Service Dependencies modules) allows Blind SQL Injection.This issue affects Centreon Web on Central Server before 25.10.8, 24.10.20, 24.04.24.

Published: Feb 27, 2026
Source: NVD
CVE-2026-28372 HIGH - 7.4

telnetd in GNU inetutils through 2.7 allows privilege escalation that can be exploited by abusing systemd service credentials support added to the login(1) implementation of util-linux in release 2.40. This is related to client control over the CREDENTIALS_DIRECTORY environment variable, and require...

Vendor: GNU
Product: inetutils
Published: Feb 27, 2026
Source: NVD
CVE-2026-28208 MEDIUM - 5.9

Junrar is an open source java RAR archive library. Prior to version 7.5.8, a backslash path traversal vulnerability in `LocalFolderExtractor` allows an attacker to write arbitrary files with attacker-controlled content anywhere on the filesystem when a crafted RAR archive is extracted on Linux/Unix....

Vendor: junrar
Product: junrar
Published: Feb 26, 2026
Source: NVD
CVE-2026-28296 MEDIUM - 4.3

A flaw was found in the FTP GVfs backend. A remote attacker could exploit this input validation vulnerability by supplying specially crafted file paths containing carriage return and line feed (CRLF) sequences. These unsanitized sequences allow the attacker to terminate intended FTP commands and inj...

Vendor: Red Hat
Product: Red Hat Enterprise Linux 10, Red Hat Enterprise Linux 6, Red Hat Enterprise Linux 7, Red Hat Enterprise Linux 8, Red Hat Enterprise Linux 9
Published: Feb 26, 2026
Source: NVD
CVE-2026-28295 MEDIUM - 4.3

A flaw was found in the FTP GVfs backend. A malicious FTP server can exploit this vulnerability by providing an arbitrary IP address and port in its passive mode (PASV) response. The client unconditionally trusts this information and attempts to connect to the specified endpoint, allowing the malici...

Vendor: Red Hat
Product: Red Hat Enterprise Linux 10, Red Hat Enterprise Linux 6, Red Hat Enterprise Linux 7, Red Hat Enterprise Linux 8, Red Hat Enterprise Linux 9
Published: Feb 26, 2026
Source: NVD
CVE-2026-27975 CRITICAL - 9.8

Ajenti is a Linux and BSD modular server admin panel. Prior to version 2.2.13, an unauthenticated user could gain access to a server to execute arbitrary code on this server. This is fixed in the version 2.2.13.

Vendor: ajenti
Product: ajenti
Published: Feb 26, 2026
Source: NVD
CVE-2026-27884 MEDIUM - 5.3

NetExec is a network execution tool. Prior to version 1.5.1, the module spider_plus improperly creates the output file and folder path when saving files from SMB shares. It does not take into account that it is possible for Linux SMB shares to have path traversal characters such as `../` in them. An...

Vendor: Pennyw0rth
Product: NetExec
Published: Feb 26, 2026
Source: NVD
CVE-2026-26104 MEDIUM - 5.5

A flaw was found in the udisks storage management daemon that allows unprivileged users to back up LUKS encryption headers without authorization. The issue occurs because a privileged D-Bus method responsible for exporting encryption metadata does not perform a policy check. As a result, sensitive c...

Vendor: Red Hat
Product: Red Hat Enterprise Linux 10, Red Hat Enterprise Linux 6, Red Hat Enterprise Linux 7, Red Hat Enterprise Linux 8, Red Hat Enterprise Linux 9
Published: Feb 25, 2026
Source: NVD
CVE-2026-26103 HIGH - 7.1

A flaw was found in the udisks storage management daemon that exposes a privileged D-Bus API for restoring LUKS encryption headers without proper authorization checks. The issue allows a local unprivileged user to instruct the root-owned udisks daemon to overwrite encryption metadata on block device...

Vendor: Red Hat
Product: Red Hat Enterprise Linux 10, Red Hat Enterprise Linux 6, Red Hat Enterprise Linux 7, Red Hat Enterprise Linux 8, Red Hat Enterprise Linux 9
Published: Feb 25, 2026
Source: NVD
CVE-2025-33181 HIGH - 7.3

NVIDIA Cumulus Linux and NVOS products contain a vulnerability in the NVUE interface, where a low-privileged user could inject a command. A successful exploit of this vulnerability might lead to escalation of privileges.

Vendor: NVIDIA
Product: Cumulus Linux GA, Cumulus Linux LTS, NVOS
Published: Feb 24, 2026
Source: NVD
CVE-2025-33180 HIGH - 8.0

NVIDIA Cumulus Linux and NVOS products contain a vulnerability in the NVUE interface, where a low-privileged user could inject a command. A successful exploit of this vulnerability might lead to escalation of privileges.

Vendor: NVIDIA
Product: Cumulus Linux GA, Cumulus Linux LTS, NVOS
Published: Feb 24, 2026
Source: NVD
CVE-2025-33179 HIGH - 8.0

NVIDIA Cumulus Linux and NVOS products contain a vulnerability in the NVUE interface, where a low-privileged user could run an unauthorized command. A successful exploit of this vulnerability might lead to escalation of privileges.

Vendor: NVIDIA
Product: Cumulus Linux GA, Cumulus Linux LTS, NVOS
Published: Feb 24, 2026
Source: NVD
CVE-2025-10010 MEDIUM - 6.8

The CPSD CryptoPro Secure Disk application boots a small Linux operating system to perform user authentication before using BitLocker to decrypt the Windows partition. The system is located on a separate unencrypted partition which can be reached by anyone with access to the hard disk. Multiple che...

Vendor: CPSD IT SERVICES GMBH
Product: CryptoPro Secure Disk for BitLocker
Published: Feb 24, 2026
Source: NVD
CVE-2026-2664 HIGH - 7.8

An out of bounds read vulnerability in the grpcfuse kernel module present in the Linux VM in Docker Desktop for Windows, Linux and macOS up to version 4.61.0 could allow a local attacker to cause an unspecified impact by writing to /proc/docker entries. The issue has been fixed inย Docker Desktop 4.6...

Vendor: docker
Product: desktop
Published: Feb 24, 2026
Source: NVD
CVE-2025-14905 HIGH - 7.2

A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `schema_attr_enum_callback` function within the `schema.c` file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional format...

Vendor: Red Hat
Product: Red Hat Directory Server 11, Red Hat Directory Server 12, Red Hat Directory Server 13, Red Hat Enterprise Linux 10, Red Hat Enterprise Linux 6, Red Hat Enterprise Linux 7, Red Hat Enterprise Linux 8, Red Hat Enterprise Linux 9
Published: Feb 23, 2026
Source: NVD
CVE-2025-30416 CRITICAL - 10.0

Sensitive data disclosure and manipulation due to missing authorization. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 39938, Acronis Cyber Protect 15 (Linux, Windows) before build 41800.

Vendor: Acronis
Product: Acronis Cyber Protect 16, Acronis Cyber Protect 15
Published: Feb 20, 2026
Source: NVD
CVE-2025-30412 CRITICAL - 10.0

Sensitive data disclosure and manipulation due to improper authentication. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 39938, Acronis Cyber Protect 15 (Linux, Windows) before build 41800.

Vendor: Acronis
Product: Acronis Cyber Protect 16, Acronis Cyber Protect 15
Published: Feb 20, 2026
Source: NVD
CVE-2025-30411 CRITICAL - 10.0

Sensitive data disclosure and manipulation due to improper authentication. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 39938, Acronis Cyber Protect 15 (Linux, Windows) before build 41800.

Vendor: Acronis
Product: Acronis Cyber Protect 16, Acronis Cyber Protect 15
Published: Feb 20, 2026
Source: NVD
CVE-2025-30410 CRITICAL - 9.8

Sensitive data disclosure and manipulation due to missing authentication. The following products are affected: Acronis Cyber Protect Cloud Agent (Linux, macOS, Windows) before build 39870, Acronis Cyber Protect 16 (Linux, macOS, Windows) before build 39938, Acronis Cyber Protect 15 (Linux, macOS, Wi...

Vendor: Acronis
Product: Acronis Cyber Protect Cloud Agent, Acronis Cyber Protect 16, Acronis Cyber Protect 15
Published: Feb 20, 2026
Source: NVD
CVE-2026-27212 CRITICAL - 7.8

Swiper is a free and mobile touch slider with hardware accelerated transitions and native behavior. Versions 6.5.1 through 12.1.1 have a Prototype pollution vulnerability. The vulnerability resides in line 94 of shared/utils.mjs, where the indexOf() function is used to check whether user provided in...

Vendor: npm
Product: swiper
Published: Feb 19, 2026
Source: GitHub