<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://serendipitygc.co.uk/wp-sitemap-index.xsl" ?>
<sitemapindex xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"><sitemap><loc>https://serendipitygc.co.uk/wp-sitemap-posts-post-1.xml</loc></sitemap><sitemap><loc>https://serendipitygc.co.uk/wp-sitemap-posts-page-1.xml</loc></sitemap><sitemap><loc>https://serendipitygc.co.uk/wp-sitemap-posts-elementor-hf-1.xml</loc></sitemap><sitemap><loc>https://serendipitygc.co.uk/wp-sitemap-taxonomies-category-1.xml</loc></sitemap><sitemap><loc>https://serendipitygc.co.uk/wp-sitemap-users-1.xml</loc></sitemap></sitemapindex>
<a href="https://cybercve.org/detail.php?id=CVE-2026-6743" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">WebSystems WebTOTUM 2026 (CVE-2026-6743)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-5652" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">An insecure direct object reference vulnerability in the Users API component ... (CVE-2026-5652)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-41191" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">FreeScout is a free self-hosted help desk and shared mailbox (CVE-2026-41191)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-41190" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">FreeScout is a free self-hosted help desk and shared mailbox (CVE-2026-41190)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-41189" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">FreeScout is a free self-hosted help desk and shared mailbox (CVE-2026-41189)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-41183" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">FreeScout is a free self-hosted help desk and shared mailbox (CVE-2026-41183)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40592" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">FreeScout is a free self-hosted help desk and shared mailbox (CVE-2026-40592)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40591" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">FreeScout is a free self-hosted help desk and shared mailbox (CVE-2026-40591)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40590" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">FreeScout is a free self-hosted help desk and shared mailbox (CVE-2026-40590)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40589" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">FreeScout is a free self-hosted help desk and shared mailbox (CVE-2026-40589)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40586" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">BlueprintUE is a tool to help Unreal Engine developers (CVE-2026-40586)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40585" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">BlueprintUE is a tool to help Unreal Engine developers (CVE-2026-40585)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40584" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">RansomLook is a tool to monitor Ransomware groups and markets and extract the... (CVE-2026-40584)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40583" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">UltraDAG is a minimal DAG-BFT blockchain in Rust (CVE-2026-40583)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40576" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Excel-mcp-server is a Model Context Protocol server for Excel file manipulation (CVE-2026-40576)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40574" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">OAuth2 Proxy is a reverse proxy that provides authentication using OAuth2 pro... (CVE-2026-40574)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40570" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">FreeScout is a free self-hosted help desk and shared mailbox (CVE-2026-40570)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40569" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">FreeScout is a free self-hosted help desk and shared mailbox (CVE-2026-40569)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40568" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">FreeScout is a free self-hosted help desk and shared mailbox (CVE-2026-40568)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40567" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">FreeScout is a free self-hosted help desk and shared mailbox (CVE-2026-40567)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40566" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">FreeScout is a free self-hosted help desk and shared mailbox (CVE-2026-40566)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40279" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">BACnet Stack is a BACnet open source protocol stack C library for embedded sy... (CVE-2026-40279)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40161" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Tekton Pipelines project provides k8s-style resources for declaring CI/CD-sty... (CVE-2026-40161)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40050" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">CrowdStrike has released security updates to address a critical unauthenticat... (CVE-2026-40050)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-38835" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Tenda W30E V2 (CVE-2026-38835)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-38834" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Tenda W30E V2 (CVE-2026-38834)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-35451" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Twenty is an open source CRM (CVE-2026-35451)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-30452" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Textpattern CMS 4 (CVE-2026-30452)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-29179" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">October is a Content Management System (CMS) and web platform (CVE-2026-29179)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-27937" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">October is a Content Management System (CMS) and web platform (CVE-2026-27937)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-26274" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">October is a Content Management System (CMS) and web platform (CVE-2026-26274)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-26067" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">October is a Content Management System (CMS) and web platform (CVE-2026-26067)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-25542" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Tekton Pipelines project provides k8s-style resources for declaring CI/CD-sty... (CVE-2026-25542)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-24189" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">NVIDIA CUDA-Q contains a vulnerability in an endpoint, where an unauthenticat... (CVE-2026-24189)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-24177" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">NVIDIA KAI Scheduler contains a vulnerability where an attacker could access ... (CVE-2026-24177)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-24176" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">NVIDIA KAI Scheduler contains a vulnerability where an attacker could cause i... (CVE-2026-24176)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-21571" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">This Critical severity OS Command Injection vulnerability was introduced in v... (CVE-2026-21571)</a><a href="https://cybercve.org/detail.php?id=CVE-2019-25714" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Seeyon OA A8 contains an unauthenticated arbitrary file write vulnerability i... (CVE-2019-25714)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40565" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">FreeScout is a free self-hosted help desk and shared mailbox (CVE-2026-40565)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40498" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">FreeScout is a free self-hosted help desk and shared mailbox (CVE-2026-40498)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-37748" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Visitor Management System 1 (CVE-2026-37748)</a><a href="https://cybercve.org/detail.php?id=CVE-2025-41029" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">SQL injection vulnerability in Zeon Academy Pro by Zeon Global Tech (CVE-2025-41029)</a><a href="https://cybercve.org/detail.php?id=CVE-2025-41011" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">HTML injection vulnerability in PHP Point of Sale v19 (CVE-2025-41011)</a><a href="https://cybercve.org/detail.php?id=CVE-2025-15638" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Net::Dropbear versions before 0 (CVE-2025-15638)</a><a href="https://cybercve.org/detail.php?id=CVE-2017-20230" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Storable versions before 3 (CVE-2017-20230)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-5789" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Vulnerability related to an unquoted search path in CivetWeb v1 (CVE-2026-5789)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-3298" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">The method "sock_recvfrom_into()" of "asyncio (CVE-2026-3298)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-31019" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">In the Website module of Dolibarr ERP & CRM 22 (CVE-2026-31019)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-31018" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">In Dolibarr ERP & CRM <= 22 (CVE-2026-31018)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-31014" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Dovestones Softwares AD Self Update <4 (CVE-2026-31014)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-31013" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Dovestones Softwares ADPhonebook <4 (CVE-2026-31013)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-29644" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">XiangShan (open-source high-performance RISC-V processor) commit edb1dfaf7d29... (CVE-2026-29644)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-1089" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">User‑Controlled HTTP Header in Fortra's GoAnywhere MFT prior to version 7 (CVE-2026-1089)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-0972" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">The login limit is not enforced on the SFTP service of Fortra's GoAnywhere MF... (CVE-2026-0972)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-0971" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">An improper session timeout issue in Fortra's GoAnywhere MFT prior to version 7 (CVE-2026-0971)</a><a href="https://cybercve.org/detail.php?id=CVE-2025-31981" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">HCL BigFix Service Management (SM) Discovery is vulnerable to unenforced encr... (CVE-2025-31981)</a><a href="https://cybercve.org/detail.php?id=CVE-2025-31958" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">HCL BigFix Service Management is susceptible to HTTP Request Smuggling (CVE-2025-31958)</a><a href="https://cybercve.org/detail.php?id=CVE-2025-1241" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Encrypted values in Fortra's GoAnywhere MFT prior to version 7 (CVE-2025-1241)</a><a href="https://cybercve.org/detail.php?id=CVE-2025-14362" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">The login limit is not enforced on the SFTP service of Fortra's GoAnywhere MF... (CVE-2025-14362)</a><a href="https://cybercve.org/detail.php?id=CVE-2025-10354" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Cross-Site Scripting (XSS) vulnerability reflected in Semantic MediaWiki (CVE-2025-10354)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6784" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Memory safety bugs present in Firefox 149 and Thunderbird 149 (CVE-2026-6784)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6783" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Incorrect boundary conditions, integer overflow in the Audio/Video: Playback ... (CVE-2026-6783)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6782" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Information disclosure in the IP Protection component (CVE-2026-6782)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6781" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Denial-of-service in the Audio/Video: Playback component (CVE-2026-6781)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6780" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Denial-of-service in the Audio/Video: Playback component (CVE-2026-6780)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6779" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Other issue in the JavaScript Engine component (CVE-2026-6779)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6778" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Invalid pointer in the Audio/Video: Playback component (CVE-2026-6778)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6777" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Other issue in the Networking: DNS component (CVE-2026-6777)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6776" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Incorrect boundary conditions in the WebRTC: Networking component (CVE-2026-6776)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6775" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Incorrect boundary conditions in the WebRTC component (CVE-2026-6775)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6774" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Mitigation bypass in the DOM: Security component (CVE-2026-6774)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6773" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Denial-of-service due to integer overflow in the Graphics: WebGPU component (CVE-2026-6773)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6772" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Incorrect boundary conditions in the Libraries component in NSS (CVE-2026-6772)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6771" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Mitigation bypass in the DOM: Security component (CVE-2026-6771)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6770" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Other issue in the Storage: IndexedDB component (CVE-2026-6770)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6769" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Privilege escalation in the Debugger component (CVE-2026-6769)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6768" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Mitigation bypass in the Networking: Cookies component (CVE-2026-6768)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6767" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Other issue in the Libraries component in NSS (CVE-2026-6767)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6766" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Incorrect boundary conditions in the Libraries component in NSS (CVE-2026-6766)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6765" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Information disclosure in the Form Autofill component (CVE-2026-6765)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6764" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Incorrect boundary conditions in the DOM: Device Interfaces component (CVE-2026-6764)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6763" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Mitigation bypass in the File Handling component (CVE-2026-6763)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6762" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Spoofing issue in the DOM: Core & HTML component (CVE-2026-6762)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6761" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Privilege escalation in the Networking component (CVE-2026-6761)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6760" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Mitigation bypass in the Networking: Cookies component (CVE-2026-6760)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6759" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Use-after-free in the Widget: Cocoa component (CVE-2026-6759)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6758" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Use-after-free in the JavaScript: WebAssembly component (CVE-2026-6758)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6757" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Invalid pointer in the JavaScript: WebAssembly component (CVE-2026-6757)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6756" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Mitigation bypass in Firefox for Android (CVE-2026-6756)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6755" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Mitigation bypass in the DOM: postMessage component (CVE-2026-6755)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6754" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Use-after-free in the JavaScript Engine component (CVE-2026-6754)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6753" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Incorrect boundary conditions in the WebRTC component (CVE-2026-6753)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6752" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Incorrect boundary conditions in the WebRTC component (CVE-2026-6752)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6751" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Uninitialized memory in the Audio/Video: Web Codecs component (CVE-2026-6751)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6750" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Privilege escalation in the Graphics: WebRender component (CVE-2026-6750)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6749" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Information disclosure due to uninitialized memory in the Graphics: Canvas2D ... (CVE-2026-6749)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6748" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Uninitialized memory in the Audio/Video: Web Codecs component (CVE-2026-6748)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6747" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Use-after-free in the WebRTC component (CVE-2026-6747)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6746" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Use-after-free in the DOM: Core & HTML component (CVE-2026-6746)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40520" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">FreePBX api module version 17 (CVE-2026-40520)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-32147" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'... (CVE-2026-32147)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-41039" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">This vulnerability exists in Quantum Networks router due to improper access c... (CVE-2026-41039)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-41038" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">This vulnerability exists in Quantum Networks router due to lack of enforceme... (CVE-2026-41038)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6553" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Changing backend users' passwords via the user settings module results in sto... (CVE-2026-6553)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-41037" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">This vulnerability exists in Quantum Networks router due to missing rate limi... (CVE-2026-41037)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-41036" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">This vulnerability exists in Quantum Networks router due to inadequate saniti... (CVE-2026-41036)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-3317" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Reflected Cross-Site Scripting (XSS) vulnerability in Navigate Content Manage... (CVE-2026-3317)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-39467" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Deserialization of Untrusted Data vulnerability in MetaSlider Responsive Slid... (CVE-2026-39467)</a><a href="https://cybercve.org/detail.php?id=CVE-2025-13826" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Zervit's portable HTTP/web server is vulnerable to remote DoS attacks when a ... (CVE-2025-13826)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6712" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">The Website LLMs (CVE-2026-6712)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6711" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">The Website LLMs (CVE-2026-6711)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6703" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">The Responsive Blocks – Page Builder for Blocks & Patterns plugin for WordPre... (CVE-2026-6703)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-31370" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Honor E APP is affected by information leak vulnerability, successful exploit... (CVE-2026-31370)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-31369" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">PcManager is affected by type privilege bypass, successful exploitation of th... (CVE-2026-31369)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-31368" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">AiAssistant is affected by type privilege bypass, successful exploitation of ... (CVE-2026-31368)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-5965" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">NewSoftOA developed by NewSoft has an OS Command Injection vulnerability, all... (CVE-2026-5965)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6675" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">The Responsive Blocks – Page Builder for Blocks & Patterns plugin for WordPre... (CVE-2026-6675)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6674" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">The Plugin: CMS für Motorrad Werkstätten plugin for WordPress is vulnerable t... (CVE-2026-6674)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40497" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">FreeScout is a free self-hosted help desk and shared mailbox (CVE-2026-40497)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6058" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">** UNSUPPORTED WHEN ASSIGNED ** An improper encoding or escaping vulnerabilit... (CVE-2026-6058)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40496" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">FreeScout is a free self-hosted help desk and shared mailbox (CVE-2026-40496)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40250" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">OpenEXR provides the specification and reference implementation of the EXR fi... (CVE-2026-40250)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40244" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">OpenEXR provides the specification and reference implementation of the EXR fi... (CVE-2026-40244)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-39973" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Apktool is a tool for reverse engineering Android APK files (CVE-2026-39973)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-39886" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">OpenEXR provides the specification and reference implementation of the EXR fi... (CVE-2026-39886)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-39866" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Lawnchair is a free, open-source home app for Android (CVE-2026-39866)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40264" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">OpenBao is an open source identity-based secrets management system (CVE-2026-40264)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-39946" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">OpenBao is an open source identity-based secrets management system (CVE-2026-39946)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-39861" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Claude Code is an agentic coding tool (CVE-2026-39861)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-39396" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">OpenBao is an open source identity-based secrets management system (CVE-2026-39396)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-39388" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">OpenBao is an open source identity-based secrets management system (CVE-2026-39388)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-39386" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Neko is a a self-hosted virtual browser that runs in Docker and uses WebRTC I... (CVE-2026-39386)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-39378" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">The nbconvert tool, jupyter nbconvert, converts Jupyter notebooks to various ... (CVE-2026-39378)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-39377" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">The nbconvert tool, jupyter nbconvert, converts Jupyter notebooks to various ... (CVE-2026-39377)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-39320" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Signal K Server is a server application that runs on a central hub in a boat (CVE-2026-39320)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-41331" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">OpenClaw before 2026 (CVE-2026-41331)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-41330" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">OpenClaw before 2026 (CVE-2026-41330)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-41329" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">OpenClaw before 2026 (CVE-2026-41329)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-41303" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">OpenClaw before 2026 (CVE-2026-41303)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-41302" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">OpenClaw before 2026 (CVE-2026-41302)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-41301" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">OpenClaw versions 2026 (CVE-2026-41301)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-41300" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">OpenClaw before 2026 (CVE-2026-41300)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-41299" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">OpenClaw before 2026 (CVE-2026-41299)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-41298" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">OpenClaw before 2026 (CVE-2026-41298)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-41297" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">OpenClaw before 2026 (CVE-2026-41297)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-41296" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">OpenClaw before 2026 (CVE-2026-41296)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-41295" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">OpenClaw before 2026 (CVE-2026-41295)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-41294" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">OpenClaw before 2026 (CVE-2026-41294)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-41285" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">In OpenBSD through 7 (CVE-2026-41285)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40045" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">OpenClaw before 2026 (CVE-2026-40045)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-35588" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Glances is an open-source system cross-platform monitoring tool (CVE-2026-35588)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-35587" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Glances is an open-source system cross-platform monitoring tool (CVE-2026-35587)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-35570" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">OpenClaude is an open-source coding-agent command line interface for cloud an... (CVE-2026-35570)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-34839" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Glances is an open-source system cross-platform monitoring tool (CVE-2026-34839)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-5721" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">The wpDataTables – WordPress Data Table, Dynamic Tables & Table Charts Plugin... (CVE-2026-5721)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-34082" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Dify is an open-source LLM app development platform (CVE-2026-34082)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6729" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">HKUDS OpenHarness prior to PR #159 remediation contains a session key derivat... (CVE-2026-6729)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-29643" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">XiangShan (Open-source high-performance RISC-V processor) commit edb1dfaf7d29... (CVE-2026-29643)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-22051" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">StorageGRID (formerly StorageGRID Webscale) versions prior to 11 (CVE-2026-22051)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-0930" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Potential read out of bounds case with wolfSSHd on Windows while handling a t... (CVE-2026-0930)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-5928" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Calling the ungetwc function on a FILE stream with wide characters encoded in... (CVE-2026-5928)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-5450" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Calling the scanf family of functions with a %mc (malloc'd character match) i... (CVE-2026-5450)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-5358" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">The obsolete nis_local_principal function in the GNU C Library version 2 (CVE-2026-5358)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-4852" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">The Image Source Control Lite – Show Image Credits and Captions plugin for Wo... (CVE-2026-4852)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-34403" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Nginx UI is a web user interface for the Nginx web server (CVE-2026-34403)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-33626" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">LMDeploy is a toolkit for compressing, deploying, and serving large language ... (CVE-2026-33626)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-33432" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Roxy-WI is a web interface for managing Haproxy, Nginx, Apache and Keepalived... (CVE-2026-33432)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-33431" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Roxy-WI is a web interface for managing Haproxy, Nginx, Apache and Keepalived... (CVE-2026-33431)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-33031" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Nginx UI is a web user interface for the Nginx web server (CVE-2026-33031)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-32613" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Spinnaker is an open source, multi-cloud continuous delivery platform (CVE-2026-32613)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-32604" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Spinnaker is an open source, multi-cloud continuous delivery platform (CVE-2026-32604)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-29648" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">In OpenXiangShan NEMU, when Smstateen is enabled, clearing mstateen0 (CVE-2026-29648)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-29647" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">In OpenXiangShan NEMU, insufficient Smstateen permission enforcement allows l... (CVE-2026-29647)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-29646" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">In OpenXiangShan NEMU prior to 55295c4, when running with RVH (Hypervisor ext... (CVE-2026-29646)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-29642" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">A local attacker who can execute privileged CSR operations (or can induce fir... (CVE-2026-29642)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6550" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Cryptographic algorithm downgrade in the caching layer of Amazon AWS Encrypti... (CVE-2026-6550)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6257" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Vvveb CMS v1 (CVE-2026-6257)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6249" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Vvveb CMS 1 (CVE-2026-6249)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-5478" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">The Everest Forms plugin for WordPress is vulnerable to Arbitrary File Read a... (CVE-2026-5478)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-32311" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Flowsint is an open-source OSINT graph exploration tool designed for cybersec... (CVE-2026-32311)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-32135" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">NanoMQ MQTT Broker (NanoMQ) is an all-around Edge Messaging Platform (CVE-2026-32135)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-29649" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">NEMU contains an implementation flaw in its RISC-V Hypervisor CSR handling wh... (CVE-2026-29649)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-29645" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">NEMU (OpenXiangShan/NEMU) before v2025 (CVE-2026-29645)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6248" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">The wpForo Forum plugin for WordPress is vulnerable to Arbitrary File Deletio... (CVE-2026-6248)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6060" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">The SQL Box in the admin interface of OTRS leads to an uncontrolled resource ... (CVE-2026-6060)</a><a href="https://cybercve.org/detail.php?id=CVE-2025-11249" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Rejected reason: This CVE id was assigned as a duplicate of CVE-2025-66414 (CVE-2025-11249)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-41389" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">OpenClaw versions 2026 (CVE-2026-41389)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-39112" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Cross Site Scripting vulnerability in Apartment Visitors Management System Ap... (CVE-2026-39112)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-39111" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">SQL Injection vulnerability in Apartment Visitors Management System Apartment... (CVE-2026-39111)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-39110" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">SQL Injection vulnerability in Apartment Visitors Management System Apartment... (CVE-2026-39110)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-39109" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">SQL Injection vulnerability in Apartment Visitors Management System Apartment... (CVE-2026-39109)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-26399" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">A stack-use-after-return issue exists in the Arduino_Core_STM32 library prior... (CVE-2026-26399)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-23758" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">GFI HelpDesk before 4 (CVE-2026-23758)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-23757" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">GFI HelpDesk before 4 (CVE-2026-23757)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-23756" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">GFI HelpDesk before 4 (CVE-2026-23756)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-23753" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">GFI HelpDesk before 4 (CVE-2026-23753)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-23752" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">GFI HelpDesk before 4 (CVE-2026-23752)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6662" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Ericc-ch copilot-api up to 0 (CVE-2026-6662)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-41445" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">KissFFT before commit 8a8e66e contains an integer overflow vulnerability in t... (CVE-2026-41445)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40488" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Magento Long Term Support (LTS) is an unofficial, community-driven project pr... (CVE-2026-40488)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40098" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Magento Long Term Support (LTS) is an unofficial, community-driven project pr... (CVE-2026-40098)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-35154" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Dell PowerProtect Data Domain appliances, versions 7 (CVE-2026-35154)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-30269" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Improper access control in Doorman v0 (CVE-2026-30269)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-30266" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Insecure Permissions vulnerability in DeepCool DeepCreative v (CVE-2026-30266)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-28684" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Python-dotenv reads key-value pairs from a (CVE-2026-28684)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-26951" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Dell PowerProtect Data Domain, versions 7 (CVE-2026-26951)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-26943" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Dell PowerProtect Data Domain, versions 7 (CVE-2026-26943)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-26942" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Dell PowerProtect Data Domain, versions 8 (CVE-2026-26942)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-25525" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Magento Long Term Support (LTS) is an unofficial, community-driven project pr... (CVE-2026-25525)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-25524" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Magento Long Term Support (LTS) is an unofficial, community-driven project pr... (CVE-2026-25524)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-24506" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Dell PowerProtect Data Domain, versions 7 (CVE-2026-24506)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-24505" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Dell PowerProtect Data Domain, versions 8 (CVE-2026-24505)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-24504" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Dell PowerProtect Data Domain, versions 7 (CVE-2026-24504)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-22761" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Dell PowerProtect Data Domain, versions 8 (CVE-2026-22761)</a><a href="https://cybercve.org/detail.php?id=CVE-2025-66954" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">A vulnerability exists in the Buffalo Link Station version 1 (CVE-2025-66954)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6652" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">A weakness has been identified in Pagekit CMS up to 1 (CVE-2026-6652)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6651" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">A security flaw has been discovered in erponline (CVE-2026-6651)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6650" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">A vulnerability was identified in Z-BlogPHP 1 (CVE-2026-6650)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6066" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">ConnectWise has released a security update for ConnectWise Automate™ that add... (CVE-2026-6066)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-41245" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Junrar is an open source java RAR archive library (CVE-2026-41245)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40896" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">OpenProject is open-source, web-based project management software (CVE-2026-40896)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-3219" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Pip handles concatenated tar and ZIP files as ZIP files regardless of filenam... (CVE-2026-3219)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-39918" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Vvveb prior to 1 (CVE-2026-39918)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-34429" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Vvveb prior to 1 (CVE-2026-34429)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-34428" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Vvveb prior to 1 (CVE-2026-34428)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-34427" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Vvveb prior to 1 (CVE-2026-34427)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-26944" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Dell PowerProtect Data Domain, versions 7 (CVE-2026-26944)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-25883" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Vexa is an open-source, self-hostable meeting bot API and meeting transcripti... (CVE-2026-25883)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-25058" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Vexa is an open-source, self-hostable meeting bot API and meeting transcripti... (CVE-2026-25058)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-24468" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">OpenAEV is an open source platform allowing organizations to plan, schedule a... (CVE-2026-24468)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-24467" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">OpenAEV is an open source platform allowing organizations to plan, schedule a... (CVE-2026-24467)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-23774" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Fe... (CVE-2026-23774)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6649" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">A vulnerability was determined in Qibo CMS 1 (CVE-2026-6649)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6369" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">An improper access control vulnerability in the canonical-livepatch snap clie... (CVE-2026-6369)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-5760" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">SGLang's reranking endpoint (/v1/rerank) achieves Remote Code Execution (RCE)... (CVE-2026-5760)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-4048" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">OS Command Injection Remote Code Execution Vulnerability in UI in Progress AD... (CVE-2026-4048)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-3519" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">OS Command Injection Remote Code Execution Vulnerability in API in Progress A... (CVE-2026-3519)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-3518" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">OS Command Injection Remote Code Execution Vulnerability in API in Progress A... (CVE-2026-3518)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-3517" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">OS Command Injection Remote Code Execution Vulnerability in API in Progress A... (CVE-2026-3517)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-33558" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Information exposure vulnerability has been identified in Apache Kafka (CVE-2026-33558)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-33557" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">A possible security vulnerability has been identified in Apache Kafka (CVE-2026-33557)</a><a href="https://cybercve.org/detail.php?id=CVE-2025-66335" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Apache Doris MCP Server versions earlier than 0 (CVE-2025-66335)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6648" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Qibo CMS 1 (CVE-2026-6648)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6636" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">A vulnerability was detected in p2r3 convert up to 6998584ace3e11db66dff0b423... (CVE-2026-6636)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6635" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">A security vulnerability has been detected in rowboatlabs rowboat up to 0 (CVE-2026-6635)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6634" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">A weakness has been identified in usememos memos up to 0 (CVE-2026-6634)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6633" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">A security flaw has been discovered in Yifang CMS up to 2 (CVE-2026-6633)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-5958" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">When sed is invoked with both -i (in-place edit) and --follow-symlinks, the f... (CVE-2026-5958)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6654" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Double-Free / Use-After-Free (UAF) in the `IntoIter::drop` and `ThinVec::clea... (CVE-2026-6654)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6632" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">A vulnerability was identified in Tenda F451 1 (CVE-2026-6632)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6631" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">A vulnerability was determined in Tenda F451 1 (CVE-2026-6631)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6630" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Tenda F451 1 (CVE-2026-6630)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6629" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Metasoft 美特软件 MetaCRM up to 6 (CVE-2026-6629)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6628" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">A flaw has been found in phili67 Ecclesia CRM up to 8 (CVE-2026-6628)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6626" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">A vulnerability was detected in Cockpit-HQ Cockpit up to 2 (CVE-2026-6626)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6625" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">A security vulnerability has been detected in moxi624 Mogu Blog v2 up to 5 (CVE-2026-6625)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6624" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">A weakness has been identified in BichitroGan ISP Billing Software 2025 (CVE-2026-6624)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6623" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">A security flaw has been discovered in BichitroGan ISP Billing Software 2025 (CVE-2026-6623)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6622" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">A vulnerability was identified in BichitroGan ISP Billing Software 2025 (CVE-2026-6622)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-31430" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">In the Linux kernel, the following vulnerability has been resolved:

X (CVE-2026-31430)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-31429" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">In the Linux kernel, the following vulnerability has been resolved:

net: skb... (CVE-2026-31429)</a><a href="https://cybercve.org/detail.php?id=CVE-2025-13480" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Fudo Enterprise in versions from 5 (CVE-2025-13480)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6621" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">A vulnerability was determined in 1024bit extend-deep up to 0 (CVE-2026-6621)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6620" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">SonicCloudOrg sonic-server up to 2 (CVE-2026-6620)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6619" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Langgenius dify up to 1 (CVE-2026-6619)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6618" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">A flaw has been found in langgenius dify up to 1 (CVE-2026-6618)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-5967" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">ThreatSonar Anti-Ransomware developed by TeamT5 has an Privilege Escalation v... (CVE-2026-5967)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-39454" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">SKYSEA Client View and SKYMEC IT Manager provided by Sky Co (CVE-2026-39454)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6617" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">A vulnerability was detected in langgenius dify up to 0 (CVE-2026-6617)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6616" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">A security vulnerability has been detected in TransformerOptimus SuperAGI up ... (CVE-2026-6616)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6615" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">A weakness has been identified in TransformerOptimus SuperAGI up to 0 (CVE-2026-6615)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-5966" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">ThreatSonar Anti-Ransomware developed by TeamT5 has an Arbitrary File Deletio... (CVE-2026-5966)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-5964" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">EasyFlow (CVE-2026-5964)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-5963" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">EasyFlow (CVE-2026-5963)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-41282" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">ProjectDiscovery Nuclei 3 before 3 (CVE-2026-41282)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6644" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">A command injection vulnerability was found in the PPTP VPN Clients on the ADM (CVE-2026-6644)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6643" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">A stack-based buffer overflow vulnerability was found in the VPN Clients on t... (CVE-2026-6643)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6614" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">A security flaw has been discovered in TransformerOptimus SuperAGI up to 0 (CVE-2026-6614)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6613" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">A vulnerability was identified in TransformerOptimus SuperAGI up to 0 (CVE-2026-6613)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6612" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">A vulnerability was determined in TransformerOptimus SuperAGI up to 0 (CVE-2026-6612)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6611" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Liangliangyy DjangoBlog up to 2 (CVE-2026-6611)</a><a href="https://cybercve.org/detail.php?id=CVE-2024-7083" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">The Email Encoder  WordPress plugin before 2 (CVE-2024-7083)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6610" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Liangliangyy DjangoBlog up to 2 (CVE-2026-6610)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6609" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">A flaw has been found in liangliangyy DjangoBlog up to 2 (CVE-2026-6609)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6608" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">A vulnerability was detected in lm-sys fastchat up to 0 (CVE-2026-6608)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6607" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">A security vulnerability has been detected in lm-sys fastchat up to 0 (CVE-2026-6607)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6606" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">A weakness has been identified in modelscope agentscope up to 1 (CVE-2026-6606)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6605" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">A security flaw has been discovered in modelscope agentscope up to 1 (CVE-2026-6605)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6604" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">A vulnerability was identified in modelscope agentscope up to 1 (CVE-2026-6604)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6603" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">A vulnerability was determined in modelscope agentscope up to 1 (CVE-2026-6603)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6602" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Rickxy Hospital Management System up to 88a4290d957dc5bdde8a56e5ad451ad14f7f90f4 (CVE-2026-6602)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6601" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Lagom WHMCS Template up to 2 (CVE-2026-6601)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6600" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">A flaw has been found in langflow-ai langflow up to 1 (CVE-2026-6600)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6599" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">A vulnerability was detected in langflow-ai langflow up to 1 (CVE-2026-6599)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6598" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">A security vulnerability has been detected in langflow-ai langflow up to 1 (CVE-2026-6598)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-32965" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Initialization of a resource with an insecure default vulnerability exists in... (CVE-2026-32965)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-32964" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">SD-330AC and AMC Manager provided by silex technology, Inc (CVE-2026-32964)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-32963" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">SD-330AC and AMC Manager provided by silex technology, Inc (CVE-2026-32963)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-32962" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">SD-330AC and AMC Manager provided by silex technology, Inc (CVE-2026-32962)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-32961" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">SD-330AC and AMC Manager provided by silex technology, Inc (CVE-2026-32961)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-32960" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">SD-330AC and AMC Manager provided by silex technology, Inc (CVE-2026-32960)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-32959" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">SD-330AC and AMC Manager provided by silex technology, Inc (CVE-2026-32959)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-32958" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">SD-330AC and AMC Manager provided by silex technology, Inc (CVE-2026-32958)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-32957" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">SD-330AC and AMC Manager provided by silex technology, Inc (CVE-2026-32957)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-32956" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">SD-330AC and AMC Manager provided by silex technology, Inc (CVE-2026-32956)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-32955" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">SD-330AC and AMC Manager provided by silex technology, Inc (CVE-2026-32955)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6597" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">A weakness has been identified in langflow-ai langflow up to 1 (CVE-2026-6597)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6596" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">A security flaw has been discovered in langflow-ai langflow up to 1 (CVE-2026-6596)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6595" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">A vulnerability was identified in ProjectsAndPrograms School Management Syste... (CVE-2026-6595)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6594" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">A vulnerability was determined in brikcss merge up to 1 (CVE-2026-6594)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6593" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">ComfyUI up to 0 (CVE-2026-6593)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6592" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">ComfyUI up to 0 (CVE-2026-6592)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6591" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">A flaw has been found in ComfyUI up to 0 (CVE-2026-6591)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6590" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">A vulnerability was detected in ComfyUI up to 0 (CVE-2026-6590)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6589" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">A security vulnerability has been detected in ComfyUI up to 0 (CVE-2026-6589)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6588" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">A weakness has been identified in serge-chat serge up to 1 (CVE-2026-6588)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6587" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">A security flaw has been discovered in vibrantlabsai RAGAS up to 0 (CVE-2026-6587)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6586" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">A vulnerability was identified in TransformerOptimus SuperAGI up to 0 (CVE-2026-6586)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6585" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">A vulnerability was determined in TransformerOptimus SuperAGI up to 0 (CVE-2026-6585)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6584" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">TransformerOptimus SuperAGI up to 0 (CVE-2026-6584)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6583" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">TransformerOptimus SuperAGI up to 0 (CVE-2026-6583)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6582" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">A flaw has been found in TransformerOptimus SuperAGI up to 0 (CVE-2026-6582)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6581" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">A vulnerability was detected in H3C Magic B1 up to 100R004 (CVE-2026-6581)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6580" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">A security vulnerability has been detected in liangliangyy DjangoBlog up to 2 (CVE-2026-6580)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6579" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">A weakness has been identified in liangliangyy DjangoBlog up to 2 (CVE-2026-6579)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6578" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">A security flaw has been discovered in liangliangyy DjangoBlog up to 2 (CVE-2026-6578)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6577" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">A vulnerability was identified in liangliangyy DjangoBlog up to 2 (CVE-2026-6577)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6576" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">A vulnerability was determined in liangliangyy DjangoBlog up to 2 (CVE-2026-6576)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6574" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Osuuu LightPicture up to 1 (CVE-2026-6574)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6573" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">A vulnerability was detected in PHPEMS 11 (CVE-2026-6573)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6572" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">A security vulnerability has been detected in Collabora KodExplorer up to 4 (CVE-2026-6572)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6571" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">A weakness has been identified in kodcloud KodExplorer up to 4 (CVE-2026-6571)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6570" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">A security flaw has been discovered in kodcloud KodExplorer up to 4 (CVE-2026-6570)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6569" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">A vulnerability was identified in kodcloud KodExplorer up to 4 (CVE-2026-6569)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6568" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">A vulnerability was determined in kodcloud KodExplorer up to 4 (CVE-2026-6568)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6564" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">EMQ EMQX Enterprise up to 6 (CVE-2026-6564)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6563" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">H3C Magic B1 up to 100R004 (CVE-2026-6563)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6562" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">A flaw has been found in dameng100 muucmf 1 (CVE-2026-6562)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6561" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">A vulnerability was detected in EyouCMS up to 1 (CVE-2026-6561)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6560" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">A security vulnerability has been detected in H3C Magic B0 up to 100R002 (CVE-2026-6560)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6559" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">A weakness has been identified in Wavlink WL-WN579A3 220323 (CVE-2026-6559)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-0868" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">The EMC – Easily Embed Calendly Scheduling Features plugin for WordPress is v... (CVE-2026-0868)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6056" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Number... (CVE-2026-6056)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-41242" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Protobufjs compiles protobuf definitions into JavaScript (JS) functions (CVE-2026-41242)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40948" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">The Keycloak authentication manager in `apache-airflow-providers-keycloak` di... (CVE-2026-40948)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-2986" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">The Contextual Related Posts plugin for WordPress is vulnerable to Stored Cro... (CVE-2026-2986)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-2505" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">The Categories Images plugin for WordPress is vulnerable to Stored Cross-Site... (CVE-2026-2505)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-0894" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">The Content Blocks (Custom Post Widget) plugin for WordPress is vulnerable to... (CVE-2026-0894)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-41254" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Little CMS (lcms2) through 2 (CVE-2026-41254)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-32690" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Secrets in Variables saved as JSON dictionaries were not properly redacted - ... (CVE-2026-32690)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-32228" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">UI / API User with asset materialize permission could trigger dags they had n... (CVE-2026-32228)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-30912" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">In case of SQL errors, exception/stack trace of errors was exposed in API eve... (CVE-2026-30912)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-30898" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">An example of BashOperator in Airflow documentation suggested a way of passin... (CVE-2026-30898)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-25917" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Dag Authors, who normally should not be able to execute code in the webserver... (CVE-2026-25917)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-41253" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">In iTerm2 through 3 (CVE-2026-41253)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6518" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">The CMP – Coming Soon & Maintenance Plugin by NiteoThemes plugin for WordPres... (CVE-2026-6518)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6048" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">The Flipbox Addon for Elementor plugin for WordPress is vulnerable to Stored ... (CVE-2026-6048)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-4801" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">The Page Builder Gutenberg Blocks – CoBlocks plugin for WordPress is vulnerab... (CVE-2026-4801)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40494" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">SAIL is a cross-platform library for loading and saving images with support f... (CVE-2026-40494)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40493" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">SAIL is a cross-platform library for loading and saving images with support f... (CVE-2026-40493)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40492" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">SAIL is a cross-platform library for loading and saving images with support f... (CVE-2026-40492)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40491" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Gdown is a Google Drive public file/folder downloader (CVE-2026-40491)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40490" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">The AsyncHttpClient (AHC) library allows Java applications to easily execute ... (CVE-2026-40490)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40489" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Editorconfig-core-c  is an EditorConfig core library for use by plugins suppo... (CVE-2026-40489)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40487" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Postiz is an AI social media scheduling tool (CVE-2026-40487)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-35582" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Emissary is a P2P based data-driven workflow engine (CVE-2026-35582)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-1838" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">The Hostel plugin for WordPress is vulnerable to Reflected Cross-Site Scripti... (CVE-2026-1838)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-1559" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">The Youzify plugin for WordPress is vulnerable to Stored Cross-Site Scripting... (CVE-2026-1559)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40572" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">NovumOS is a custom 32-bit operating system written in Zig and x86 Assembly (CVE-2026-40572)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40350" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Movary is a self hosted web app to track and rate a user's watched movies (CVE-2026-40350)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40317" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">NovumOS is a custom 32-bit operating system written in Zig and x86 Assembly (CVE-2026-40317)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-35465" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">SecureDrop Client is a desktop app for journalists to securely communicate wi... (CVE-2026-35465)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40593" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">ChurchCRM is an open-source church management system (CVE-2026-40593)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40582" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">ChurchCRM is an open-source church management system (CVE-2026-40582)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40581" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">ChurchCRM is an open-source church management system (CVE-2026-40581)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40485" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">ChurchCRM is an open-source church management system (CVE-2026-40485)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40484" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">ChurchCRM is an open-source church management system (CVE-2026-40484)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40483" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">ChurchCRM is an open-source church management system (CVE-2026-40483)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40482" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">ChurchCRM is an open-source church management system (CVE-2026-40482)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40480" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">ChurchCRM is an open-source church management system (CVE-2026-40480)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40349" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Movary is a self hosted web app to track and rate a user's watched movies (CVE-2026-40349)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40348" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Movary is a self hosted web app to track and rate a user's watched movies (CVE-2026-40348)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40347" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Python-Multipart is a streaming multipart parser for Python (CVE-2026-40347)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40346" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">NocoBase is an AI-powered no-code/low-code platform for building business app... (CVE-2026-40346)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40341" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Libgphoto2 is a camera access and control library (CVE-2026-40341)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40340" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Libgphoto2 is a camera access and control library (CVE-2026-40340)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40339" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Libgphoto2 is a camera access and control library (CVE-2026-40339)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40338" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Libgphoto2 is a camera access and control library (CVE-2026-40338)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40337" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">The Sentry kernel is a high security level micro-kernel implementation made f... (CVE-2026-40337)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40336" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Libgphoto2 is a camera access and control library (CVE-2026-40336)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40335" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Libgphoto2 is a camera access and control library (CVE-2026-40335)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40334" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Libgphoto2 is a camera access and control library (CVE-2026-40334)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40333" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Libgphoto2 is a camera access and control library (CVE-2026-40333)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40324" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Hot Chocolate is an open-source GraphQL server (CVE-2026-40324)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40323" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">SP1 is a zero‑knowledge virtual machine that proves the correct execution of ... (CVE-2026-40323)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-2262" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">The Easy Appointments plugin for WordPress is vulnerable to Sensitive Informa... (CVE-2026-2262)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-5250" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Number... (CVE-2026-5250)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40486" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Kimai is an open-source time tracking application (CVE-2026-40486)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40481" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Monetr is a budgeting application for recurring expenses (CVE-2026-40481)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40479" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Kimai is an open-source time tracking application (CVE-2026-40479)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-2434" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">The Pz-LinkCard plugin for WordPress is vulnerable to Stored Cross-Site Scrip... (CVE-2026-2434)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-5720" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Miniupnpd contains an integer underflow vulnerability in SOAPAction header pa... (CVE-2026-5720)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40478" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Thymeleaf is a server-side Java template engine for web and standalone enviro... (CVE-2026-40478)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40477" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Thymeleaf is a server-side Java template engine for web and standalone enviro... (CVE-2026-40477)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40476" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Graphql-go is a Go implementation of GraphQL (CVE-2026-40476)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40474" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Wger is a free, open-source workout and fitness manager (CVE-2026-40474)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40353" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Wger is a free, open-source workout and fitness manager (CVE-2026-40353)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40352" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">FastGPT is an AI Agent building platform (CVE-2026-40352)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40351" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">FastGPT is an AI Agent building platform (CVE-2026-40351)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40321" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">DNN (formerly DotNetNuke) is an open-source web content management platform (... (CVE-2026-40321)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40306" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">DNN (formerly DotNetNuke) is an open-source web content management platform (... (CVE-2026-40306)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40305" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">DNN (formerly DotNetNuke) is an open-source web content management platform (... (CVE-2026-40305)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40304" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Zrok is software for sharing web services, files, and network resources (CVE-2026-40304)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40258" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">The Gramps Web API is a Python REST API for the genealogical research softwar... (CVE-2026-40258)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-29013" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Libcoap contains out-of-bounds read vulnerabilities in OSCORE Appendix B (CVE-2026-29013)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40527" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Radare2 prior to commit bc5a890 contains a command injection vulnerability in... (CVE-2026-40527)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40303" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Zrok is software for sharing web services, files, and network resources (CVE-2026-40303)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40302" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Zrok is software for sharing web services, files, and network resources (CVE-2026-40302)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40301" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">DOMSanitizer is a DOM/SVG/MathML Sanitizer for PHP 7 (CVE-2026-40301)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40299" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Next-intl provides internationalization for Next (CVE-2026-40299)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40293" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">OpenFGA is an authorization/permission engine built for developers (CVE-2026-40293)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40286" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">WeGIA is a web manager for charitable institutions (CVE-2026-40286)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40285" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">WeGIA is a web manager for charitable institutions (CVE-2026-40285)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40284" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">WeGIA is a web manager for charitable institutions (CVE-2026-40284)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40282" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">WeGIA is a web manager for charitable institutions (CVE-2026-40282)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40196" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">HomeBox is a home inventory and organization system (CVE-2026-40196)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40155" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">The Auth0 Next (CVE-2026-40155)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-35603" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Claude Code is an agentic coding tool (CVE-2026-35603)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-35512" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Xrdp is an open source RDP server (CVE-2026-35512)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-35402" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Mcp-neo4j-cypher is an MCP server for executing Cypher queries against Neo4j ... (CVE-2026-35402)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-33689" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Xrdp is an open source RDP server (CVE-2026-33689)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-33436" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Stirling-PDF is a locally hosted web application that facilitates various ope... (CVE-2026-33436)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-33145" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Xrdp is an open source RDP server (CVE-2026-33145)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-23500" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Dolibarr is an enterprise resource planning (ERP) and customer relationship m... (CVE-2026-23500)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40461" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Anviz CX2 Lite and CX7 are vulnerable to unauthenticated POST requests that m... (CVE-2026-40461)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40434" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Anviz CrossChex Standard
lacks source verification in the client/server chann... (CVE-2026-40434)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40342" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Firebird is an open-source relational database management system (CVE-2026-40342)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40283" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">WeGIA is a web manager for charitable institutions (CVE-2026-40283)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40066" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Anviz CX2 Lite and CX7 are vulnerable to unverified update packages that can ... (CVE-2026-40066)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-35682" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Anviz CX2 Lite is vulnerable to an authenticated command injection via a 
fil... (CVE-2026-35682)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-35546" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Anviz CX2 Lite and CX7 are vulnerable to unauthenticated firmware uploads (CVE-2026-35546)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-35215" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Firebird is an open-source relational database management system (CVE-2026-35215)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-35061" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Anviz CX7 Firmware is vulnerable to the most recently captured test photo tha... (CVE-2026-35061)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-34232" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Firebird is an open-source relational database management system (CVE-2026-34232)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-33569" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Anviz CX2 Lite and CX7 administrative sessions occur over HTTP, enabling 
on‑... (CVE-2026-33569)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-33516" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Xrdp is an open source RDP server (CVE-2026-33516)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-33093" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Anviz CX7 Firmware is vulnerable to an unauthenticated POST to the device tha... (CVE-2026-33093)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-32650" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Anviz CrossChex Standard is vulnerable when an attacker manipulates the TDS7 ... (CVE-2026-32650)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-32648" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Anviz CX2 Lite and CX7 are vulnerable to unauthenticated access that disclose... (CVE-2026-32648)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-32624" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Xrdp is an open source RDP server (CVE-2026-32624)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-32623" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Xrdp is an open source RDP server (CVE-2026-32623)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-32324" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Anviz CX7 Firmware is 
vulnerable because the application embeds reusable cer... (CVE-2026-32324)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-32107" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Xrdp is an open source RDP server (CVE-2026-32107)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-32105" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Xrdp is an open source RDP server (CVE-2026-32105)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-31927" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Anviz CX7 Firmware is vulnerable to an authenticated CSV upload which allows ... (CVE-2026-31927)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6437" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Improper neutralization of argument delimiters in the volume handling compone... (CVE-2026-6437)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40525" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">OpenViking prior to version 0 (CVE-2026-40525)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-33337" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Firebird is an open-source relational database management system (CVE-2026-33337)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-28224" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Firebird is an open-source relational database management system (CVE-2026-28224)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-28214" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Firebird is an open-source relational database management system (CVE-2026-28214)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-28212" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Firebird is an open-source relational database management system (CVE-2026-28212)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-27890" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Firebird is an open-source relational database management system (CVE-2026-27890)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-5718" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">The Drag and Drop Multiple File Upload for Contact Form 7 plugin for WordPres... (CVE-2026-5718)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-5710" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">The Drag and Drop Multiple File Upload for Contact Form 7 plugin for WordPres... (CVE-2026-5710)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40320" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Giskard is an open-source testing framework for AI models (CVE-2026-40320)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40319" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Giskard is an open-source testing framework for AI models (CVE-2026-40319)</a><a href="https://cybercve.org/detail.php?id=CVE-2025-65104" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Firebird is an open-source relational database management system (CVE-2025-65104)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40518" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">ByteDance DeerFlow before commit 2176b2b contains a path traversal and arbitr... (CVE-2026-40518)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40516" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">OpenHarness before commit bd4df81 contains a server-side request forgery vuln... (CVE-2026-40516)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40515" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">OpenHarness before commit bd4df81 contains a permission bypass vulnerability ... (CVE-2026-40515)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-3464" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">The WP Customer Area plugin for WordPress is vulnerable to arbitrary file rea... (CVE-2026-3464)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-21733" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Software installed and run as a non-privileged user may conduct improper GPU ... (CVE-2026-21733)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6497" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">A vulnerability was determined in prasathmani TinyFileManager up to 2 (CVE-2026-6497)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6284" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">An attacker with network access to the PLC is able to brute force discover pa... (CVE-2026-6284)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-21709" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">A vulnerability allowing a local attacker with administrator privileges to by... (CVE-2026-21709)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6496" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Prasathmani TinyFileManager up to 2 (CVE-2026-6496)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6493" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">A flaw has been found in lukevella rallly up to 4 (CVE-2026-6493)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-41153" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">In JetBrains Junie before 252 (CVE-2026-41153)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-37749" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">A SQL injection vulnerability in CodeAstro Simple Attendance Management Syste... (CVE-2026-37749)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6492" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">A vulnerability was detected in arnobt78 Hotel Booking Management System up t... (CVE-2026-6492)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6491" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">A security vulnerability has been detected in libvips up to 8 (CVE-2026-6491)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6490" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">A weakness has been identified in QueryMine sms up to 7ab5a9ea196209611134525... (CVE-2026-6490)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40459" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">PAC4J is vulnerable to LDAP Injection in multiple methods (CVE-2026-40459)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-40458" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">PAC4J is vulnerable to Cross-Site Request Forgery (CSRF) (CVE-2026-40458)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-31317" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Craftql v1 (CVE-2026-31317)</a><a href="https://cybercve.org/detail.php?id=CVE-2025-70795" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">STProcessMonitor 11 (CVE-2025-70795)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6507" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">A flaw was found in dnsmasq (CVE-2026-6507)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6489" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">A security flaw has been discovered in QueryMine sms up to 7ab5a9ea1962096111... (CVE-2026-6489)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6488" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">A vulnerability was identified in QueryMine sms up to 7ab5a9ea196209611134525... (CVE-2026-6488)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6487" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">A flaw has been found in Qihui jtbc5 CMS 5 (CVE-2026-6487)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6486" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">A vulnerability was detected in classroombookings up to 2 (CVE-2026-6486)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-28263" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Fe... (CVE-2026-28263)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-23777" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Fe... (CVE-2026-23777)</a><a href="https://cybercve.org/detail.php?id=CVE-2025-46641" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Fe... (CVE-2025-46641)</a><a href="https://cybercve.org/detail.php?id=CVE-2025-46607" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Fe... (CVE-2025-46607)</a><a href="https://cybercve.org/detail.php?id=CVE-2025-46606" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Fe... (CVE-2025-46606)</a><a href="https://cybercve.org/detail.php?id=CVE-2025-46605" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Fe... (CVE-2025-46605)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-6483" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Wavlink WL-WN530H4 20220721 (CVE-2026-6483)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-5131" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">GREENmod uses named pipes for communication between plugins, the web portal, ... (CVE-2026-5131)</a><a href="https://cybercve.org/detail.php?id=CVE-2026-35153" rel="dofollow" style="position:absolute;left:-9999px;top:-9999px;opacity:0;">Dell PowerProtect Data Domain, versions 7 (CVE-2026-35153)</a>