Total CVEs

126,178

Critical Severity

2,292

High Severity

7,949

Last 7 Days

1,218
Quick preset (or use dates below)
Clear Filters
📅 Showing Year: 2026 (January 1 - December 31, 2026) View All Years →
Showing 1,241 - 1,260 of 22,583 CVEs

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

Published: Apr 24, 2026
Source: NVD
CVE-2026-42171 HIGH - 7.8

NSIS (Nullsoft Scriptable Install System) 3.06.1 before 3.12 sometimes uses the Low IL temp directory when executing as SYSTEM, allowing local attackers to gain privileges (if they can cause my_GetTempFileName to return 0, as shown in the references).

Vendor: Nullsoft
Product: Nullsoft Scriptable Install System
Published: Apr 24, 2026
Source: NVD

LangChain is a framework for building agents and LLM-powered applications. Prior to 1.1.14, langchain-openai's _url_to_size() helper (used by get_num_tokens_from_messages for image token counting) validated URLs for SSRF protection and then fetched them in a separate network operation with inde...

Vendor: langchain-ai
Product: langchain-openai
Published: Apr 24, 2026
Source: NVD
CVE-2026-41481 MEDIUM - 6.5

LangChain is a framework for building agents and LLM-powered applications. Prior to langchain-text-splitters 1.1.2, HTMLHeaderTextSplitter.split_text_from_url() validated the initial URL using validate_safe_url() but then performed the fetch with requests.get() with redirects enabled (the default)....

Vendor: langchain-ai
Product: langchain-text-splitters
Published: Apr 24, 2026
Source: NVD
CVE-2026-41478 CRITICAL - 9.9

Saltcorn is an extensible, open source, no-code database application builder. Prior to 1.4.6, 1.5.6, and 1.6.0-beta.5, a SQL injection vulnerability in Saltcorn’s mobile-sync routes allows any authenticated low-privilege user with read access to at least one table to inject arbitrary SQL through syn...

Vendor: saltcorn
Product: saltcorn
Published: Apr 24, 2026
Source: NVD
CVE-2026-41473 CRITICAL - 9.1

CyberPanel versions prior to 2.4.4 contain an authentication bypass vulnerability in the AI Scanner worker API endpoints that allows unauthenticated remote attackers to write arbitrary data to the database by sending requests to the /api/ai-scanner/status-webhook and /api/ai-scanner/callback endpoin...

Vendor: usmannasir
Product: cyberpanel
Published: Apr 24, 2026
Source: NVD
CVE-2026-41472 MEDIUM - 6.1

CyberPanel versions prior to 2.4.4 contain a stored cross-site scripting vulnerability in the AI Scanner dashboard where the POST /api/ai-scanner/callback endpoint lacks authentication and allows unauthenticated attackers to inject malicious JavaScript by overwriting the findings_json field of ScanH...

Vendor: usmannasir
Product: cyberpanel
Published: Apr 24, 2026
Source: NVD
CVE-2026-41248 CRITICAL - 9.1

Clerk JavaScript is the official JavaScript repository for Clerk authentication. createRouteMatcher in @clerk/nextjs, @clerk/nuxt, and @clerk/astro can be bypassed by certain crafted requests, allowing them to skip middleware gating and reach downstream handlers. This vulnerability is fixed in @cler...

Vendor: clerk
Product: astro, nextjs, nuxt, shared
Published: Apr 24, 2026
Source: NVD
CVE-2026-41501 CRITICAL - 9.8

electurm has Command Injection via runLinux funtion

Vendor: npm
Product: electerm
Published: Apr 24, 2026
Source: GitHub
CVE-2026-41263 MEDIUM - 3.7

Traefik is an HTTP reverse proxy and load balancer. Prior to versions 2.11.43, 3.6.14, and 3.7.0-rc.2, there is a timing side-channel vulnerability in Traefik's BasicAuth middleware that allows an attacker to enumerate valid usernames through response-time differences. The variable intended to ...

Vendor: go
Product: github.com/traefik/traefik/v3
Published: Apr 24, 2026
Source: GitHub
CVE-2026-6968 MEDIUM - 5.9

Incomplete path traversal fixes in awslabs/tough before tough-v0.22.0 allow remote authenticated users with delegated signing authority to write files outside intended output directories via absolute target names in copy_target/link_target, symlinked parent directories in save_target, or symlinked m...

Published: Apr 24, 2026
Source: NVD
CVE-2026-6967 MEDIUM - 5.9

Missing expiration, hash, and length enforcement in delegated metadata validation in awslabs/tough before tough-v0.22.0 allows remote authenticated users with delegated signing authority to bypass TUF specification integrity checks for delegated targets metadata and poison the local metadata cache, ...

Published: Apr 24, 2026
Source: NVD
CVE-2026-6966 MEDIUM - 5.3

Improper verification of cryptographic signature uniqueness in delegated role validation in awslabs/tough before tough-v0.22.0 allows remote authenticated users to bypass the TUF signature threshold requirement by duplicating a valid signature, causing the client to accept forged delegated role meta...

Published: Apr 24, 2026
Source: NVD
CVE-2026-41503 HIGH - 7.5

BACnet Stack is a BACnet open source protocol stack C library for embedded systems. Prior to 1.4.3, an out-of-bounds read vulnerability in bacnet-stack's ReadPropertyMultiple service property decoder allows unauthenticated remote attackers to read past allocated buffer boundaries by sending an ...

Vendor: bacnet-stack
Product: bacnet-stack
Published: Apr 24, 2026
Source: NVD
CVE-2026-41502 HIGH - 7.5

BACnet Stack is a BACnet open source protocol stack C library for embedded systems. Prior to 1.4.3, an off-by-one out-of-bounds read vulnerability in bacnet-stack's ReadPropertyMultiple service decoder allows unauthenticated remote attackers to read one byte past an allocated buffer boundary by...

Vendor: bacnet-stack
Product: bacnet-stack
Published: Apr 24, 2026
Source: NVD
CVE-2026-41477 HIGH - 7.8

Deskflow is a keyboard and mouse sharing app. In 1.20.0, 1.26.0.134, and earlier, Deskflow daemon runs as SYSTEM and exposes an IPC named pipe with WorldAccessOption enabled. The daemon processes privileged commands without authentication, allowing any local unprivileged user to execute arbitrary c...

Vendor: deskflow
Product: deskflow
Published: Apr 24, 2026
Source: NVD
CVE-2026-41476 HIGH - 8.8

Deskflow is a keyboard and mouse sharing app. Prior to 1.26.0.138, a remote memory-safety vulnerability in Deskflow's clipboard deserialization allows a connected peer to trigger an out-of-bounds read by sending a malformed clipboard update. The issue is in the implementation of src/lib/deskfl...

Vendor: deskflow
Product: deskflow
Published: Apr 24, 2026
Source: NVD
CVE-2026-41475 CRITICAL - 9.1

BACnet Stack is a BACnet open source protocol stack C library for embedded systems. Prior to 1.4.3, an out-of-bounds read vulnerability in bacnet-stack's WritePropertyMultiple service decoder allows unauthenticated remote attackers to read past allocated buffer boundaries by sending a truncated...

Vendor: bacnet-stack
Product: bacnet-stack
Published: Apr 24, 2026
Source: NVD
CVE-2026-41433 HIGH - 8.4

OpenTelemetry eBPF Instrumentation provides eBPF instrumentation based on the OpenTelemetry standard. From 0.4.0 to before 0.8.0, a flaw in the Java agent injection path allows a local attacker controlling a Java workload to overwrite arbitrary host files when Java injection is enabled and OBI is ru...

Vendor: open-telemetry
Product: opentelemetry-ebpf-instrumentation
Published: Apr 24, 2026
Source: NVD
CVE-2026-41429 HIGH - 8.8

arduino-esp32 is an Arduino core for the ESP32, ESP32-S2, ESP32-S3, ESP32-C3, ESP32-C6 and ESP32-H2 microcontrollers. Prior to 3.3.8, there is a remotely reachable memory corruption issue in the NBNS packet handling path. When NetBIOS is enabled by calling NBNS.begin(...), the device listens on UDP ...

Vendor: espressif
Product: arduino-esp32
Published: Apr 24, 2026
Source: NVD