Filter and search through 392,315 vulnerabilities
| CVE ID | Description | CVSS | Priority | Trend | Exploit | Patch |
|---|---|---|---|---|---|---|
| CVE-2026-22699 | ### Summary A denial-of-service vulnerability exists in the SM2 PKE decryption path where an invalid elliptic-curve point (C1) is decoded and the res... | 7.5 | 471 | Neutral | No |
| Yes |
| CVE-2026-22698 | ### Summary A critical vulnerability exists in the SM2 Public Key Encryption (PKE) implementation where the ephemeral nonce `k` is generated with sev... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-22697 | CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications... | 7.5 | 386 | Neutral | No | Yes |
| CVE-2026-22696 | ## Impact This vulnerability involves a critical gap in the cryptographic verification process within the dcap-qvl. The library fetches QE Identity c... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-22695 | LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From 1.6.5... | 7.1 | 407 | Neutral | Yes | Yes |
| CVE-2026-22694 | AliasVault is a privacy-first password manager with built-in email aliasing. AliasVault Android versions 0.24.0 through 0.25.2 contained an issue in h... | 6.1 | 173 | Neutral | No | No |
| CVE-2026-22693 | HarfBuzz is a text shaping engine. Prior to version 12.3.0, a null pointer dereference vulnerability exists in the SubtableUnicodesCache::create funct... | 5.3 | 124 | Neutral | No | Yes |
| CVE-2026-22691 | ### Impact An attacker who exploits this vulnerability can craft a PDF which leads to possibly long runtimes for invalid `startxref` entries. When reb... | 5.3 | 124 | Neutral | No | Yes |
| CVE-2026-22690 | ### Impact An attacker who exploits this vulnerability can craft a PDF which leads to possibly long runtimes for actually invalid files. This can be a... | 5.3 | 124 | Neutral | No | Yes |
| CVE-2026-22689 | **Summary** The Mailpit WebSocket server is configured to accept connections from any origin. This lack of Origin header validation introduces a Cross... | 6.5 | 209 | Neutral | No | Yes |
| CVE-2026-22688 | ### Vulnerability **Description** --- **Vulnerability Overview** This issue is a command injection vulnerability (CWE-78) that allows authenticate... | 8.8 | 708 | Neutral | No | Yes |
| CVE-2026-22687 | ### Summary After WeKnora enables the Agent service, it allows users to call the database query tool. Due to insufficient backend validation, an attac... | 9.8 | 717 | Neutral | No | Yes |
| CVE-2026-22686 | A critical sandbox escape vulnerability exists in **enclave-vm** (affected: **< 2.6.0**, patched: **2.7.0**) that can allow untrusted, sandboxed JavaS... | 10.0 | 856 | Neutral | Yes | Yes |
| CVE-2026-22685 | DevToys is a desktop app for developers. In versions from 2.0.0.0 to before 2.0.9.0, a path traversal vulnerability exists in the DevToys extension in... | 8.8 | 553 | Neutral | No | No |
| CVE-2026-22646 | Certain error messages returned by the application expose internal system details that should not be visible to end users, providing attackers with va... | 4.3 | 128 | Neutral | No | No |
| CVE-2026-22645 | The application discloses all used components, versions and license information to unauthenticated actors, giving attackers the opportunity to target ... | 5.3 | 196 | Neutral | No | No |
| CVE-2026-22644 | Certain requests pass the authentication token in the URL as string query parameter, making it vulnerable to theft through server logs, proxy logs and... | 5.3 | 132 | Neutral | No | No |
| CVE-2026-22643 | In Grafana, an excessively long dashboard title or panel name will cause Chromium browsers to become unresponsive due to Improper Input Validation vul... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-22642 | An open redirect vulnerability has been identified in Grafana OSS organization switching functionality. Prerequisites for exploitation: - Multiple org... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-22641 | This vulnerability in Grafana's datasource proxy API allows authorization checks to be bypassed by adding an extra slash character in the URL path. Us... | 0.0 | 0 | Neutral | No | No |