Filter and search through 199,861 vulnerabilities
| CVE ID | Description | CVSS | Priority | Trend | Exploit | Patch |
|---|---|---|---|---|---|---|
| CVE-2026-26252 | Rejected reason: Not used | 0.0 | 0 | Neutral | No |
| No |
| CVE-2026-26251 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2026-26250 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2026-26249 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2026-26226 | beautiful-mermaid versions prior to 0.1.3 contain an SVG attribute injection issue that can lead to cross-site scripting (XSS) when rendering attacker... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-26225 | Intego Personal Backup, a macOS backup utility that allows users to create scheduled backups and bootable system clones, contains a local privilege es... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-26224 | Intego Log Reporter, a macOS diagnostic utility bundled with Intego security products that collects system and application logs for support analysis, ... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-26221 | Hyland OnBase contains an unauthenticated .NET Remoting exposure in the OnBase Workflow Timer Service (Hyland.Core.Workflow.NTService.exe). An attacke... | 0.0 | 0 | Neutral | Yes | No |
| CVE-2026-26220 | LightLLM version 1.1.0 and prior contain an unauthenticated remote code execution vulnerability in PD (prefill-decode) disaggregation mode. The PD mas... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-26215 | manga-image-translator version beta-0.3 and prior in shared API mode contains an unsafe deserialization vulnerability that can lead to unauthenticated... | 0.0 | 0 | Neutral | Yes | No |
| CVE-2026-26205 | A security vulnerability has been discovered in how the `input.parsed_path` field is constructed. HTTP request paths are treated as full URIs when par... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-26092 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2026-26091 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2026-26090 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2026-26089 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2026-26088 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2026-26087 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2026-26086 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2026-26085 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2026-26063 | A vulnerability in CediPay allows attackers to bypass input validation in the transaction API. Affected users: All deployments running versions prior... | 0.0 | 0 | Neutral | No | Yes |