Filter and search through 392,438 vulnerabilities
| CVE ID | Description | CVSS | Priority | Trend | Exploit | Patch |
|---|---|---|---|---|---|---|
| CVE-2026-22050 | ONTAP versions 9.16.1 prior to 9.16.1P9 and 9.17.1 prior to 9.17.1P2 with snapshot locking enabled are susceptible to a vulnerability which could allo... | 4.3 | 120 | Neutral | No |
| Yes |
| CVE-2026-22047 | iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of International Color Consortium (ICC) col... | 8.8 | 646 | Neutral | Yes | Yes |
| CVE-2026-22046 | iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of International Color Consortium (ICC) col... | 8.8 | 545 | Neutral | No | Yes |
| CVE-2026-22045 | ## Impact There is a potential vulnerability in Traefik ACME TLS certificates' automatic generation: the ACME TLS-ALPN fast path can allow unauthenti... | 7.5 | 386 | Neutral | No | Yes |
| CVE-2026-22043 | ## Summary A flawed `deny_only` short-circuit in RustFS IAM allows a restricted service account or STS credential to self-issue an unrestricted servi... | 9.8 | 588 | Neutral | No | Yes |
| CVE-2026-22042 | ### Summary The `ImportIam` admin API validates permissions using **`ExportIAMAction`** instead of **`ImportIAMAction`**, allowing a principal with *... | 8.8 | 587 | Neutral | No | Yes |
| CVE-2026-22041 | ### Impact Non-string types are converted into string types, leading to type errors in %d conversions. ### Patches The problem has been patched in ve... | 5.3 | 225 | Neutral | Yes | Yes |
| CVE-2026-22039 | ### Summary A critical authorization boundary bypass in namespaced Kyverno Policy [apiCall](https://kyverno.io/docs/policy-types/cluster-policy/exter... | 9.9 | 714 | Neutral | No | Yes |
| CVE-2026-22037 | ### Summary A security vulnerability exists in `@fastify/express` where middleware registered with a specific path prefix can be bypassed using URL-en... | 8.4 | 513 | Neutral | No | Yes |
| CVE-2026-22036 | ### Impact The `fetch()` API supports chained HTTP encoding algorithms for response content according to RFC 9110 (e.g., Content-Encoding: gzip, br).... | 7.5 | 386 | Neutral | No | Yes |
| CVE-2026-22035 | Greenshot is an open source Windows screenshot utility. Versions 1.3.310 and below arvulnerable to OS Command Injection through unsanitized filename p... | 7.3 | 335 | Neutral | No | Yes |
| CVE-2026-22034 | Snuffleupagus is a module that raises the cost of attacks against website by killing bug classes and providing a virtual patching system. On deploymen... | 0.0 | 0 | Neutral | No | No |
| CVE-2026-22033 | ### Prologue These vulnerabilities have been found and chained by DCODX-AI. Validation of the exploit chain has been confirmed manually. ### Summar... | 5.4 | 223 | Neutral | No | Yes |
| CVE-2026-22032 | ## Security Advisory: Open Redirect in Directus SAML Authentication ### Summary An open redirect vulnerability exists in the Directus SAML authentic... | 6.1 | 207 | Neutral | No | Yes |
| CVE-2026-22031 | ### Summary A security vulnerability exists in `@fastify/middie` where middleware registered with a specific path prefix can be bypassed using URL-enc... | 8.4 | 513 | Neutral | No | Yes |
| CVE-2026-22030 | React Router (or Remix v2) is vulnerable to CSRF attacks on document POST requests to UI routes when using server-side route `action` handlers in [Fra... | 6.5 | 273 | Neutral | No | Yes |
| CVE-2026-22029 | React Router (and Remix v1/v2) SPA open navigation redirects originating from loaders or actions in [Framework Mode](https://reactrouter.com/start/mod... | 8.0 | 569 | Neutral | No | Yes |
| CVE-2026-22028 | ## Impact **Vulnerability Type:** HTML Injection via JSON Type Confusion **Affected Versions:** Preact 10.26.5 through 10.28.1 **Severity:** Low to... | 6.1 | 165 | Neutral | No | Yes |
| CVE-2026-22027 | CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications... | 6.0 | 146 | Neutral | No | Yes |
| CVE-2026-22026 | CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications... | 7.5 | 386 | Neutral | No | Yes |