Filter and search through 392,393 vulnerabilities
| CVE ID | Description | CVSS | Priority | Trend | Exploit | Patch |
|---|---|---|---|---|---|---|
| CVE-2026-22712 | Improper Encoding or Escaping of Output due to magic word replacement in ParserAfterTidy vulnerability in The Wikimedia Foundation Mediawiki - Approve... | 0.0 | 0 | Neutral | No |
| No |
| CVE-2026-22710 | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in The Wikimedia Foundation Mediawiki - Wiki... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-22709 | In vm2 for version 3.10.0, `Promise.prototype.then` `Promise.prototype.catch` callback sanitization can be bypassed. This allows attackers to escape t... | 9.8 | 751 | Neutral | No | Yes |
| CVE-2026-22708 | Cursor is a code editor built for programming with AI. Prior to 2.3, hen the Cursor Agent is running in Auto-Run Mode with Allowlist mode enabled, cer... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-22705 | ### Summary A timing side-channel was discovered in the Decompose algorithm which is used during ML-DSA signing to generate hints for the signature. ... | 6.4 | 196 | Neutral | No | Yes |
| CVE-2026-22704 | ### Summary Stored XSS Leading to Account Takeover ### Details The Exploit Chain: 1.Upload: The attacker uploads an `.html` file containing a JavaScr... | 8.0 | 564 | Neutral | No | Yes |
| CVE-2026-22703 | ### Impact A Cosign bundle can be crafted to successfully verify an artifact even if the embedded Rekor entry does not reference the artifact's diges... | 5.5 | 125 | Neutral | No | Yes |
| CVE-2026-22702 | ## Impact TOCTOU (Time-of-Check-Time-of-Use) vulnerabilities in `virtualenv` allow local attackers to perform symlink-based attacks on directory crea... | 4.5 | 101 | Neutral | No | Yes |
| CVE-2026-22701 | ## Vulnerability Summary **Title:** Time-of-Check-Time-of-Use (TOCTOU) Symlink Vulnerability in SoftFileLock **Affected Component:** `filelock` pack... | 5.3 | 117 | Neutral | No | Yes |
| CVE-2026-22700 | ### Summary A denial-of-service vulnerability exists in the SM2 public-key encryption (PKE) implementation: the `decrypt()` path performs unchecked `... | 7.5 | 471 | Neutral | No | Yes |
| CVE-2026-22699 | ### Summary A denial-of-service vulnerability exists in the SM2 PKE decryption path where an invalid elliptic-curve point (C1) is decoded and the res... | 7.5 | 471 | Neutral | No | Yes |
| CVE-2026-22698 | ### Summary A critical vulnerability exists in the SM2 Public Key Encryption (PKE) implementation where the ephemeral nonce `k` is generated with sev... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-22697 | CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications... | 7.5 | 386 | Neutral | No | Yes |
| CVE-2026-22696 | ## Impact This vulnerability involves a critical gap in the cryptographic verification process within the dcap-qvl. The library fetches QE Identity c... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2026-22695 | LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From 1.6.5... | 7.1 | 407 | Neutral | Yes | Yes |
| CVE-2026-22694 | AliasVault is a privacy-first password manager with built-in email aliasing. AliasVault Android versions 0.24.0 through 0.25.2 contained an issue in h... | 6.1 | 173 | Neutral | No | No |
| CVE-2026-22693 | HarfBuzz is a text shaping engine. Prior to version 12.3.0, a null pointer dereference vulnerability exists in the SubtableUnicodesCache::create funct... | 5.3 | 124 | Neutral | No | Yes |
| CVE-2026-22691 | ### Impact An attacker who exploits this vulnerability can craft a PDF which leads to possibly long runtimes for invalid `startxref` entries. When reb... | 5.3 | 124 | Neutral | No | Yes |
| CVE-2026-22690 | ### Impact An attacker who exploits this vulnerability can craft a PDF which leads to possibly long runtimes for actually invalid files. This can be a... | 5.3 | 124 | Neutral | No | Yes |
| CVE-2026-22689 | **Summary** The Mailpit WebSocket server is configured to accept connections from any origin. This lack of Origin header validation introduces a Cross... | 6.5 | 209 | Neutral | No | Yes |