0.0

CVE-2026-31678 - openvswitch: defer tunnel netdev_put to RCU release

In the Linux kernel, the following vulnerability has been resolved: openvswitch: defer tunnel netdev_put to RCU release ovs_netdev_tunnel_destroy() may run after NETDEV_UNREGISTER already detached the device. Dropping the netdev reference in destroy can race with concurrent readers that still obsโ€ฆ

๐Ÿ“… Published: April 25, 2026, 8:46 a.m. ๐Ÿ”„ Last Modified: April 25, 2026, 8:46 a.m.

0.0

CVE-2026-31677 - crypto: af_alg - limit RX SG extraction by receive buffer budget

In the Linux kernel, the following vulnerability has been resolved: crypto: af_alg - limit RX SG extraction by receive buffer budget Make af_alg_get_rsgl() limit each RX scatterlist extraction to the remaining receive buffer budget. af_alg_get_rsgl() currently uses af_alg_readable() only as a gaโ€ฆ

๐Ÿ“… Published: April 25, 2026, 8:46 a.m. ๐Ÿ”„ Last Modified: April 25, 2026, 8:46 a.m.

0.0

CVE-2026-31676 - rxrpc: only handle RESPONSE during service challenge

In the Linux kernel, the following vulnerability has been resolved: rxrpc: only handle RESPONSE during service challenge Only process RESPONSE packets while the service connection is still in RXRPC_CONN_SERVICE_CHALLENGING. Check that state under state_lock before running response verification anโ€ฆ

๐Ÿ“… Published: April 25, 2026, 8:46 a.m. ๐Ÿ”„ Last Modified: April 25, 2026, 8:46 a.m.

0.0

CVE-2026-31675 - net/sched: sch_netem: fix out-of-bounds access in packet corruption

In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_netem: fix out-of-bounds access in packet corruption In netem_enqueue(), the packet corruption logic uses get_random_u32_below(skb_headlen(skb)) to select an index for modifying skb->data. When an AF_PACKET TX_RINGโ€ฆ

๐Ÿ“… Published: April 25, 2026, 8:46 a.m. ๐Ÿ”„ Last Modified: April 25, 2026, 8:46 a.m.

0.0

CVE-2026-31674 - netfilter: ip6t_rt: reject oversized addrnr in rt_mt6_check()

In the Linux kernel, the following vulnerability has been resolved: netfilter: ip6t_rt: reject oversized addrnr in rt_mt6_check() Reject rt match rules whose addrnr exceeds IP6T_RT_HOPS. rt_mt6() expects addrnr to stay within the bounds of rtinfo->addrs[]. Validate addrnr during rule installatioโ€ฆ

๐Ÿ“… Published: April 25, 2026, 8:46 a.m. ๐Ÿ”„ Last Modified: April 25, 2026, 8:46 a.m.

0.0

CVE-2026-31673 - af_unix: read UNIX_DIAG_VFS data under unix_state_lock

In the Linux kernel, the following vulnerability has been resolved: af_unix: read UNIX_DIAG_VFS data under unix_state_lock Exact UNIX diag lookups hold a reference to the socket, but not to u->path. Meanwhile, unix_release_sock() clears u->path under unix_state_lock() and drops the path referenceโ€ฆ

๐Ÿ“… Published: April 25, 2026, 8:46 a.m. ๐Ÿ”„ Last Modified: April 25, 2026, 8:46 a.m.

9.2

CVSS4.0

CVE-2026-6951 -

Versions of the package simple-git before 3.36.0 are vulnerable to Remote Code Execution (RCE) due to an incomplete fix for [CVE-2022-25912](https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-3112221) that blocks the -c option but not the equivalent --config form. If untrusted input can reach the optiโ€ฆ

๐Ÿ“… Published: April 25, 2026, 5 a.m. ๐Ÿ”„ Last Modified: April 25, 2026, 5 a.m.

7.8

CVSS3.1

CVE-2026-42171 -

NSIS (Nullsoft Scriptable Install System) 3.06.1 before 3.12 sometimes uses the Low IL temp directory when executing as SYSTEM, allowing local attackers to gain privileges (if they can cause my_GetTempFileName to return 0, as shown in the references).

๐Ÿ“… Published: April 24, 2026, 9:20 p.m. ๐Ÿ”„ Last Modified: April 24, 2026, 9:21 p.m.

9.1

CVSS3.1

CVE-2026-41248 - Official Clerk JavaScript SDKs: Middleware-based route protection bypass

Clerk JavaScript is the official JavaScript repository for Clerk authentication. createRouteMatcher in @clerk/nextjs, @clerk/nuxt, and @clerk/astro can be bypassed by certain crafted requests, allowing them to skip middleware gating and reach downstream handlers. This vulnerability is fixed in @cleโ€ฆ

๐Ÿ“… Published: April 24, 2026, 9:04 p.m. ๐Ÿ”„ Last Modified: April 24, 2026, 9:04 p.m.

3.1

CVSS3.1

CVE-2026-41488 - angchain-openai: Image token counting SSRF protection can be bypassed via DNS rebinding

LangChain is a framework for building agents and LLM-powered applications. Prior to 1.1.14, langchain-openai's _url_to_size() helper (used by get_num_tokens_from_messages for image token counting) validated URLs for SSRF protection and then fetched them in a separate network operation with independโ€ฆ

๐Ÿ“… Published: April 24, 2026, 8:57 p.m. ๐Ÿ”„ Last Modified: April 24, 2026, 8:57 p.m.
Total resulsts: 347919
Page 139 of 34,792
ยซ previous page ยป next page
Filters