Total CVEs

125,743

Critical Severity

2,263

High Severity

7,843

Last 7 Days

1,210
Quick preset (or use dates below)
Clear Filters
📅 Showing Year: 2026 (January 1 - December 31, 2026) View All Years →
Showing 1,141 - 1,160 of 22,148 CVEs
CVE-2026-6942 CRITICAL - 9.8

radare2-mcp version 1.6.0 and earlier contains an os command injection vulnerability that allows remote attackers to execute arbitrary commands by bypassing the command filter through shell metacharacters in user-controlled input passed to r2_cmd_str(). Attackers can inject shell metacharacters thro...

Published: Apr 23, 2026
Source: NVD
CVE-2026-6941 MEDIUM - 6.6

radare2 prior to 6.1.4 contains a path traversal vulnerability in its project notes handling that allows attackers to read or write files outside the configured project directory by importing a malicious .zrp archive containing a symlinked notes.txt file. Attackers can craft a .zrp archive with a sy...

Vendor: radare
Product: radare2
Published: Apr 23, 2026
Source: NVD
CVE-2026-6940 HIGH - 7.1

radare2 prior to 6.1.4 contains a path traversal vulnerability in project deletion that allows local attackers to recursively delete arbitrary directories by supplying absolute paths that escape the configured dir.projects root directory. Attackers can craft absolute paths to project marker files ou...

Vendor: radare
Product: radare2
Published: Apr 23, 2026
Source: NVD

A weakness in SpiceJet’s public booking retrieval page permits full passenger booking details to be accessed using only a PNR and last name, with no authentication or verification mechanisms. This results in exposure of extensive personal, travel, and booking metadata to any unauthenticated user who...

Published: Apr 23, 2026
Source: NVD

A vulnerability in SpiceJet’s booking API allows unauthenticated users to query passenger name records (PNRs) without any access controls. Because PNR identifiers follow a predictable pattern, an attacker could systematically enumerate valid records and obtain associated passenger names. This flaw s...

Published: Apr 23, 2026
Source: NVD
CVE-2026-28525 MEDIUM - 6.8

SWUpdate contains an integer underflow vulnerability in the multipart upload parser in mongoose_multipart.c that allows unauthenticated attackers to cause a denial of service by sending a crafted HTTP POST request to /upload with a malformed multipart boundary and controlled TCP stream timing. Attac...

Vendor: sbabic
Product: swupdate
Published: Apr 23, 2026
Source: NVD
CVE-2026-41279 HIGH - 7.5

Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, the text-to-speech generation endpoint (POST /api/v1/text-to-speech/generate) is whitelisted (no auth) and accepts a credentialId directly in the request body. When called without a chatflowI...

Vendor: FlowiseAI
Product: Flowise
Published: Apr 23, 2026
Source: NVD
CVE-2026-41278 HIGH - 7.5

Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, the GET /api/v1/public-chatflows/:id endpoint returns the full chatflow object without sanitization for public chatflows. Docker validation revealed this is worse than initially assessed: the...

Vendor: FlowiseAI
Product: Flowise
Published: Apr 23, 2026
Source: NVD
CVE-2026-41277 HIGH - 8.8

Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, a Mass Assignment vulnerability in the DocumentStore creation endpoint allows authenticated users to control the primary key (id) and internal state fields of DocumentStore entities. Because ...

Vendor: FlowiseAI
Product: Flowise
Published: Apr 23, 2026
Source: NVD
CVE-2026-41276 CRITICAL - 9.8

Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, this vulnerability allows remote attackers to bypass authentication on affected installations of FlowiseAI Flowise. Authentication is not required to exploit this vulnerability. The specific ...

Vendor: FlowiseAI
Product: Flowise
Published: Apr 23, 2026
Source: NVD
CVE-2026-41275 HIGH - 7.5

Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, the password reset functionality on cloud.flowiseai.com sends a reset password link over the unsecured HTTP protocol instead of HTTPS. This behavior introduces the risk of a man-in-the-middle...

Vendor: FlowiseAI
Product: Flowise
Published: Apr 23, 2026
Source: NVD
CVE-2026-41273 HIGH - 8.2

Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, Flowise contains an authentication bypass vulnerability that allows an unauthenticated attacker to obtain OAuth 2.0 access tokens associated with a public chatflow. By accessing a public chat...

Vendor: FlowiseAI
Product: Flowise
Published: Apr 23, 2026
Source: NVD
CVE-2026-41272 HIGH - 7.1

Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, the core security wrappers (secureAxiosRequest and secureFetch) intended to prevent Server-Side Request Forgery (SSRF) contain multiple logic flaws. These flaws allow attackers to bypass the ...

Vendor: FlowiseAI
Product: Flowise, flowise-components
Published: Apr 23, 2026
Source: NVD
CVE-2026-41271 HIGH - 7.1

Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, a Server-Side Request Forgery (SSRF) vulnerability exists in FlowiseAI's POST/GET API Chain components that allows unauthenticated attackers to force the server to make arbitrary HTTP re...

Vendor: FlowiseAI
Product: Flowise, flowise-components
Published: Apr 23, 2026
Source: NVD
CVE-2026-41270 HIGH - 7.1

Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, a Server-Side Request Forgery (SSRF) protection bypass vulnerability exists in the Custom Function feature. While the application implements SSRF protection via HTTP_DENY_LIST for axios and n...

Vendor: FlowiseAI
Product: Flowise, flowise-components
Published: Apr 23, 2026
Source: NVD
CVE-2026-41269 HIGH - 7.1

Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, the Chatflow configuration file upload settings can be modified to allow the application/javascript MIME type. This lets an attacker upload .js files even though the frontend doesn’t normally...

Vendor: FlowiseAI
Product: Flowise
Published: Apr 23, 2026
Source: NVD
CVE-2026-41268 HIGH - 7.7

Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, Flowise is vulnerable to a critical unauthenticated remote command execution (RCE) vulnerability. It can be exploited via a parameter override bypass using the FILE-STORAGE:: keyword combined...

Vendor: FlowiseAI
Product: Flowise
Published: Apr 23, 2026
Source: NVD
CVE-2026-41267 HIGH - 8.1

Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, an improper mass assignment (JSON injection) vulnerability in the account registration endpoint of Flowise Cloud allows unauthenticated attackers to inject server-managed fields and nested ob...

Vendor: FlowiseAI
Product: Flowise
Published: Apr 23, 2026
Source: NVD
CVE-2026-41266 HIGH - 7.5

Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, /api/v1/public-chatbotConfig/:id ep exposes sensitive data including API keys, HTTP authorization headers and internal configuration without any authentication. An attacker with knowledge jus...

Vendor: FlowiseAI
Product: Flowise
Published: Apr 23, 2026
Source: NVD
CVE-2026-41265 CRITICAL - 9.8

Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, the specific flaw exists within the run method of the Airtable_Agents class. The issue results from the lack of proper sandboxing when evaluating an LLM generated python script. Using prompt ...

Vendor: FlowiseAI
Product: Flowise
Published: Apr 23, 2026
Source: NVD