Filter and search through 392,393 vulnerabilities
| CVE ID | Description | CVSS | Priority | Trend | Exploit | Patch |
|---|---|---|---|---|---|---|
| CVE-2026-23496 | ### Summary The application fails to enforce proper server-side authorization checks on the API endpoint responsible for managing "Favourite Output Ch... | 5.4 | 164 | Neutral | No |
| Yes |
| CVE-2026-23495 | ### Summary The API endpoint for listing Predefined Properties in the Pimcore platform lacks adequate server-side authorization checks. Predefined Pro... | 4.3 | 142 | Neutral | No | Yes |
| CVE-2026-23494 | ### Summary The application fails to enforce proper server-side authorization checks on the API endpoint responsible for reading or listing static rou... | 6.5 | 252 | Neutral | No | Yes |
| CVE-2026-23493 | ### Summary The http_error_log file stores the $_COOKIE and $_SERVER variables, which means sensitive information such as database passwords, cookie s... | 4.9 | 97 | Neutral | No | Yes |
| CVE-2026-23492 | ### Summary An **incomplete SQL injection patch** in the Admin Search Find API allows an authenticated attacker to perform **blind SQL injection**. Al... | 4.9 | 327 | Neutral | Yes | Yes |
| CVE-2026-23490 | ### Summary After reviewing pyasn1 v0.6.1 a Denial-of-Service issue has been found that leads to memory exhaustion from malformed RELATIVE-OID with e... | 7.5 | 386 | Neutral | No | Yes |
| CVE-2026-23478 | Cal.com is open-source scheduling software. From 3.1.6 to before 6.0.7, there is a vulnerability in a custom NextAuth JWT callback that allows attacke... | 0.0 | 0 | Neutral | Yes | No |
| CVE-2026-23477 | Rocket.Chat is an open-source, secure, fully customizable communications platform. In Rocket.Chat versions up to 6.12.0, the API endpoint GET /api/v1/... | 6.5 | 319 | Neutral | Yes | No |
| CVE-2026-23013 | In the Linux kernel, the following vulnerability has been resolved: net: octeon_ep_vf: fix free_irq dev_id mismatch in IRQ rollback octep_vf_request... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-23012 | In the Linux kernel, the following vulnerability has been resolved: mm/damon/core: remove call_control in inactive contexts If damon_call() is execu... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-23011 | In the Linux kernel, the following vulnerability has been resolved: ipv4: ip_gre: make ipgre_header() robust Analog to commit db5b4e39c4e6 ("ip6_gre... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-23010 | In the Linux kernel, the following vulnerability has been resolved: ipv6: Fix use-after-free in inet6_addr_del(). syzbot reported use-after-free of ... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-23009 | In the Linux kernel, the following vulnerability has been resolved: xhci: sideband: don't dereference freed ring when removing sideband endpoint xhc... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-23008 | In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx: Fix KMS with 3D on HW version 10 HW version 10 does not have GB Surf... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-23007 | In the Linux kernel, the following vulnerability has been resolved: block: zero non-PI portion of auto integrity buffer The auto-generated integrity... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-23006 | In the Linux kernel, the following vulnerability has been resolved: ASoC: tlv320adcx140: fix null pointer The "snd_soc_component" in "adcx140_priv" ... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-23005 | In the Linux kernel, the following vulnerability has been resolved: x86/fpu: Clear XSTATE_BV[i] in guest XSAVE state whenever XFD[i]=1 When loading ... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-23004 | In the Linux kernel, the following vulnerability has been resolved: dst: fix races in rt6_uncached_list_del() and rt_del_uncached_list() syzbot was ... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-23003 | In the Linux kernel, the following vulnerability has been resolved: ip6_tunnel: use skb_vlan_inet_prepare() in __ip6_tnl_rcv() Blamed commit did not... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-23002 | In the Linux kernel, the following vulnerability has been resolved: lib/buildid: use __kernel_read() for sleepable context Prevent a "BUG: unable to... | 0.0 | 0 | Neutral | No | Yes |