Total CVEs

126,178

Critical Severity

2,292

High Severity

7,949

Last 7 Days

1,210
Quick preset (or use dates below)
Clear Filters
📅 Showing Year: 2026 (January 1 - December 31, 2026) View All Years →
Showing 141 - 160 of 230 CVEs
CVE-2026-2664 HIGH - 7.8

An out of bounds read vulnerability in the grpcfuse kernel module present in the Linux VM in Docker Desktop for Windows, Linux and macOS up to version 4.61.0 could allow a local attacker to cause an unspecified impact by writing to /proc/docker entries. The issue has been fixed in Docker Desktop 4.6...

Vendor: docker
Product: desktop
Published: Feb 24, 2026
Source: NVD
CVE-2025-30410 CRITICAL - 9.8

Sensitive data disclosure and manipulation due to missing authentication. The following products are affected: Acronis Cyber Protect Cloud Agent (Linux, macOS, Windows) before build 39870, Acronis Cyber Protect 16 (Linux, macOS, Windows) before build 39938, Acronis Cyber Protect 15 (Linux, macOS, Wi...

Vendor: Acronis
Product: Acronis Cyber Protect Cloud Agent, Acronis Cyber Protect 16, Acronis Cyber Protect 15
Published: Feb 20, 2026
Source: NVD
CVE-2025-4960 HIGH - 7.8

The com.epson.InstallNavi.helper tool, deployed with the EPSON printer driver installer, contains a local privilege escalation vulnerability due to multiple flaws in its implementation. It fails to properly authenticate clients over the XPC protocol and does not correctly enforce macOS’s authorizati...

Published: Feb 19, 2026
Source: NVD
CVE-2026-27487 HIGH - 7.6

OpenClaw is a personal AI assistant. In versions 2026.2.13 and below, when using macOS, the Claude CLI keychain credential refresh path constructed a shell command to write the updated JSON blob into Keychain via security add-generic-password -w .... Because OAuth tokens are user-controlled data, th...

Vendor: npm
Product: openclaw
Published: Feb 18, 2026
Source: GitHub
CVE-2026-26327 HIGH - 6.5

OpenClaw is a personal AI assistant. Discovery beacons (Bonjour/mDNS and DNS-SD) include TXT records such as `lanHost`, `tailnetDns`, `gatewayPort`, and `gatewayTlsSha256`. TXT records are unauthenticated. Prior to version 2026.2.14, some clients treated TXT values as authoritative routing/pinning i...

Vendor: npm
Product: openclaw
Published: Feb 18, 2026
Source: GitHub
CVE-2026-26320 HIGH - 6.5

OpenClaw is a personal AI assistant. OpenClaw macOS desktop client registers the `openclaw://` URL scheme. For `openclaw://agent` deep links without an unattended `key`, the app shows a confirmation dialog that previously displayed only the first 240 characters of the message, but executed the full ...

Vendor: npm
Product: openclaw
Published: Feb 17, 2026
Source: GitHub

Intego Personal Backup, a macOS backup utility that allows users to create scheduled backups and bootable system clones, contains a local privilege escalation vulnerability. Backup task definitions are stored in a location writable by non-privileged users while being processed with elevated privileg...

Vendor: Intego
Product: Personal Backup
Published: Feb 12, 2026
Source: NVD

Intego Log Reporter, a macOS diagnostic utility bundled with Intego security products that collects system and application logs for support analysis, contains a local privilege escalation vulnerability. A root-executed diagnostic script creates and writes files in /tmp without enforcing secure direc...

Vendor: Intego
Product: Log Reporter
Published: Feb 12, 2026
Source: NVD
CVE-2026-20700 HIGH - 7.8

A memory corruption issue was addressed with improved state management. This issue is fixed in watchOS 26.3, tvOS 26.3, macOS Tahoe 26.3, visionOS 26.3, iOS 26.3 and iPadOS 26.3. An attacker with memory write capability may be able to execute arbitrary code. Apple is aware of a report that this issu...

Vendor: Apple
Product: macOS, watchOS, visionOS, iOS and iPadOS, tvOS
Published: Feb 11, 2026
Source: NVD

A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Tahoe 26.3. An app may be able to access information about a user's contacts.

Vendor: Apple
Product: macOS
Published: Feb 11, 2026
Source: NVD
CVE-2026-20680 MEDIUM - 6.5

The issue was addressed with additional restrictions on the observability of app states. This issue is fixed in macOS Tahoe 26.3, macOS Sonoma 14.8.4, macOS Sequoia 15.7.4, iOS 18.7.5 and iPadOS 18.7.5, iOS 26.3 and iPadOS 26.3. A sandboxed app may be able to access sensitive user data.

Vendor: Apple
Product: macOS, iOS and iPadOS
Published: Feb 11, 2026
Source: NVD
CVE-2026-20677 CRITICAL - 9.0

A race condition was addressed with improved handling of symbolic links. This issue is fixed in macOS Tahoe 26.3, macOS Sonoma 14.8.4, iOS 18.7.5 and iPadOS 18.7.5, visionOS 26.3, iOS 26.3 and iPadOS 26.3. A shortcut may be able to bypass sandbox restrictions.

Vendor: Apple
Product: macOS, visionOS, iOS and iPadOS
Published: Feb 11, 2026
Source: NVD
CVE-2026-20676 MEDIUM - 5.3

This issue was addressed through improved state management. This issue is fixed in iOS 26.3 and iPadOS 26.3, Safari 26.3, macOS Tahoe 26.3, visionOS 26.3. A website may be able to track users through Safari web extensions.

Vendor: Apple
Product: Safari, macOS, visionOS, iOS and iPadOS
Published: Feb 11, 2026
Source: NVD
CVE-2026-20675 MEDIUM - 5.5

The issue was addressed with improved bounds checks. This issue is fixed in watchOS 26.3, tvOS 26.3, macOS Tahoe 26.3, macOS Sonoma 14.8.4, macOS Sequoia 15.7.4, iOS 18.7.5 and iPadOS 18.7.5, visionOS 26.3, iOS 26.3 and iPadOS 26.3. Processing a maliciously crafted image may lead to disclosure of us...

Vendor: Apple
Product: macOS, watchOS, visionOS, iOS and iPadOS, tvOS
Published: Feb 11, 2026
Source: NVD
CVE-2026-20673 MEDIUM - 5.3

A logic issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.7.4, iOS 18.7.5 and iPadOS 18.7.5, macOS Tahoe 26.3, macOS Sonoma 14.8.4. Turning off "Load remote content in messages” may not apply to all mail previews.

Vendor: Apple
Product: macOS, iOS and iPadOS
Published: Feb 11, 2026
Source: NVD

A logic issue was addressed with improved checks. This issue is fixed in watchOS 26.3, tvOS 26.3, macOS Tahoe 26.3, macOS Sonoma 14.8.4, macOS Sequoia 15.7.4, iOS 18.7.5 and iPadOS 18.7.5, visionOS 26.3, iOS 26.3 and iPadOS 26.3. An attacker in a privileged network position may be able to intercept ...

Vendor: Apple
Product: macOS, watchOS, visionOS, iOS and iPadOS, tvOS
Published: Feb 11, 2026
Source: NVD
CVE-2026-20669 MEDIUM - 5.5

A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in macOS Tahoe 26.3. An app may be able to access sensitive user data.

Vendor: Apple
Product: macOS
Published: Feb 11, 2026
Source: NVD
CVE-2026-20667 HIGH - 8.8

A logic issue was addressed with improved checks. This issue is fixed in watchOS 26.3, macOS Tahoe 26.3, macOS Sonoma 14.8.4, macOS Sequoia 15.7.4, iOS 26.3 and iPadOS 26.3. An app may be able to break out of its sandbox.

Vendor: Apple
Product: macOS, watchOS, iOS and iPadOS
Published: Feb 11, 2026
Source: NVD
CVE-2026-20666 MEDIUM - 5.5

An authorization issue was addressed with improved state management. This issue is fixed in macOS Tahoe 26.3. An app may be able to access sensitive user data.

Vendor: Apple
Product: macOS
Published: Feb 11, 2026
Source: NVD
CVE-2026-20662 MEDIUM - 4.6

An authorization issue was addressed with improved state management. This issue is fixed in macOS Sequoia 15.7.4, macOS Tahoe 26.3. An attacker with physical access to a locked device may be able to view sensitive user information.

Vendor: Apple
Product: macOS
Published: Feb 11, 2026
Source: NVD