Total CVEs

126,116

Critical Severity

2,290

High Severity

7,924

Last 7 Days

1,177
Quick preset (or use dates below)
Clear Filters
๐Ÿ“… Showing Year: 2026 (January 1 - December 31, 2026) View All Years โ†’
Showing 821 - 840 of 897 CVEs

Gitea does not properly verify repository context when deleting attachments. A user who previously uploaded an attachment to a repository may be able to delete it after losing access to that repository by making the request through a different repository they can access.

Vendor: go
Product: code.gitea.io/gitea
Published: Jan 23, 2026
Source: GitHub

The ArchiveReader.extractContents() function used by cctl image load and container image load performs no pathname validation before extracting an archive member. This means that a carelessly or maliciously constructed archive can extract a file into any user-writable location on the system using re...

Vendor: swift
Product: github.com/apple/containerization
Published: Jan 22, 2026
Source: GitHub

Dell PowerScale OneFS, versions 9.5.0.0 through 9.5.1.5, versions 9.6.0.0 through 9.7.1.10, versions 9.8.0.0 through 9.10.1.3, versions starting from 9.11.0.0 and prior to 9.13.0.0, contains a Time-of-check Time-of-use (TOCTOU) race condition vulnerability. A low privileged attacker with adjacent ne...

Vendor: Dell
Product: PowerScale OneFS
Published: Jan 22, 2026
Source: NVD

Moonraker is a Python web server providing API access to Klipper 3D printing firmware. In versions 0.9.3 and below, instances configured with the "ldap" component enabled are vulnerable to LDAP search filter injection techniques via the login endpoint. The 401 error response message can be...

Vendor: pip
Product: moonraker
Published: Jan 22, 2026
Source: GitHub

ACE vulnerability in configuration file processing by QOS.CH logback-core up to and including version 1.5.24 in Java applications, allows an attacker to instantiate classes already present on the class path by compromising an existing logback configuration file. The instantiation of a potential...

Vendor: maven
Product: ch.qos.logback:logback-core
Published: Jan 22, 2026
Source: GitHub

Backstage is an open framework for building developer portals, and @backstage/backend-defaults provides the default implementations and setup for a standard Backstage backend app. Prior to versions 0.12.2, 0.13.2, 0.14.1, and 0.15.0, the `FetchUrlReader` component, used by the catalog and other plug...

Vendor: npm
Product: @backstage/backend-defaults
Published: Jan 21, 2026
Source: GitHub

FastAPI Api Key provides a backend-agnostic library that provides an API key system. Version 1.1.0 has a timing side-channel vulnerability in verify_key(). The method applied a random delay only on verification failures, allowing an attacker to statistically distinguish valid from invalid API keys b...

Vendor: pip
Product: fastapi-api-key
Published: Jan 21, 2026
Source: GitHub

A flaw was found in the Keycloak Admin REST API. This vulnerability allows the exposure of backend schema and rules, potentially leading to targeted attacks or privilege escalation via improper access control.

Vendor: maven
Product: org.keycloak:keycloak-services
Published: Jan 21, 2026
Source: GitHub
CVE-2026-0988 LOW - 3.7

A flaw was found in glib. Missing validation of offset and count parameters in the g_buffered_input_stream_peek() function can lead to an integer overflow during length calculation. When specially crafted values are provided, this overflow results in an incorrect size being passed to memcpy(), trigg...

Published: Jan 21, 2026
Source: NVD
CVE-2026-1035 LOW - 3.1

A flaw was found in the Keycloak server during refresh token processing, specifically in the TokenManager class responsible for enforcing refresh token reuse policies. When strict refresh token rotation is enabled, the validation and update of refresh token usage are not performed atomically. This a...

Vendor: maven
Product: org.keycloak:keycloak-services
Published: Jan 21, 2026
Source: GitHub

SiYuan is a personal knowledge management system. Versions prior to 3.5.4 are vulnerable to reflected cross-site scripting in /api/icon/getDynamicIcon due to unsanitized SVG input. The endpoint generates SVG images for text icons (type=8). The content query parameter is inserted directly into the SV...

Vendor: go
Product: github.com/siyuan-note/siyuan/kernel
Published: Jan 21, 2026
Source: GitHub

Vulnerability in the Oracle Zero Data Loss Recovery Appliance Software product of Oracle Zero Data Loss Recovery Appliance (component: Security). Supported versions that are affected are 23.1.0-23.1.202509. Difficult to exploit vulnerability allows unauthenticated attacker with network access via O...

Published: Jan 20, 2026
Source: NVD

Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Pluggable Auth). Supported versions that are affected are 9.0.0-9.5.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful at...

Published: Jan 20, 2026
Source: NVD

Vulnerability in Oracle Java SE (component: JavaFX). Supported versions that are affected are Oracle Java SE: 8u471-b50. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE. Successful attacks require human inte...

Published: Jan 20, 2026
Source: NVD

Vulnerability in the Oracle ZFS Storage Appliance Kit product of Oracle Systems (component: Filesystems). The supported version that is affected is 8.8. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle ZFS Storage Appliance Kit executes...

Published: Jan 20, 2026
Source: NVD

HackerOne community member Faraz Ahmed (PakCyberbot) has reported a format string injection in the Revive Adserver settings. When specific character combinations are used in a setting, the admin user console could be disabled due to a fatal PHP error.

Vendor: Revive
Product: Revive Adserver
Published: Jan 20, 2026
Source: NVD

A flaw in Node.js's permission model allows a file's access and modification timestamps to be changed via `futimes()` even when the process has only read permissions. Unlike `utimes()`, `futimes()` does not apply the expected write-permission checks, which means file metadata can be modifi...

Vendor: nodejs
Product: node
Published: Jan 20, 2026
Source: NVD

Race condition in the turbo-frame element handler in Hotwired Turbo before 8.0.x causes logout operations to fail when delayed frame responses reapply session cookies after logout. This can be exploited by remote attackers via selective network delays (e.g. delaying requests based on sequence or tim...

Vendor: npm
Product: @hotwired/turbo
Published: Jan 20, 2026
Source: GitHub

LobeChat is an open source chat application platform. Prior to version 2.0.0-next.193, `knowledgeBase.removeFilesFromKnowledgeBase` tRPC ep allows authenticated users to delete files from any knowledge base without verifying ownership. `userId` filter in the database query is commented out, so it�...

Vendor: npm
Product: @lobehub/chat
Published: Jan 20, 2026
Source: GitHub

IBM ApplinX 11.1 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts.

Vendor: IBM
Product: ApplinX
Published: Jan 20, 2026
Source: NVD