Filter and search through 199,448 vulnerabilities
| CVE ID | Description | CVSS | Priority | Trend | Exploit | Patch |
|---|---|---|---|---|---|---|
| CVE-2026-23644 | ### Summary The [commit](https://github.com/esm-dev/esm.sh/commit/9d77b88c320733ff6689d938d85d246a3af9af16) does not actually fix the path traversal ... | 0.0 | 0 | Neutral | No |
| Yes |
| CVE-2026-23630 | Docmost is open-source collaborative wiki and documentation software. In versions 0.3.0 through 0.23.2, Mermaid code block rendering is vulnerable to ... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-23582 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2026-23581 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2026-23580 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2026-23579 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2026-23578 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2026-23577 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2026-23576 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2026-23575 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2026-23574 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2026-23528 | ### Impact When [Jupyter Lab](https://jupyterlab.readthedocs.io/en/latest/), [jupyter-server-proxy](https://github.com/jupyterhub/jupyter-server-proxy... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-23526 | CVAT is an open source interactive video and image annotation tool for computer vision. In versions 1.0.0 through 2.54.0, users that have the staff st... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-23518 | ### Summary A vulnerability in Fleet’s Windows MDM enrollment flow could allow an attacker to submit forged authentication tokens that are not proper... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-23517 | ### Summary A broken access control issue in Fleet allowed authenticated users to access debug and profiling endpoints regardless of role. As a resul... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-23516 | CVAT is an open source interactive video and image annotation tool for computer vision. In versions 2.2.0 through 2.54.0, an attacker is able to execu... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-23478 | Cal.com is open-source scheduling software. From 3.1.6 to before 6.0.7, there is a vulnerability in a custom NextAuth JWT callback that allows attacke... | 0.0 | 0 | Neutral | Yes | No |
| CVE-2026-23014 | In the Linux kernel, the following vulnerability has been resolved: perf: Ensure swevent hrtimer is properly destroyed With the change to hrtimer_tr... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-23013 | In the Linux kernel, the following vulnerability has been resolved: net: octeon_ep_vf: fix free_irq dev_id mismatch in IRQ rollback octep_vf_request... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-23012 | In the Linux kernel, the following vulnerability has been resolved: mm/damon/core: remove call_control in inactive contexts If damon_call() is execu... | 0.0 | 0 | Neutral | No | Yes |