0.0

CVE-2026-31676 - rxrpc: only handle RESPONSE during service challenge

In the Linux kernel, the following vulnerability has been resolved: rxrpc: only handle RESPONSE during service challenge Only process RESPONSE packets while the service connection is still in RXRPC_CONN_SERVICE_CHALLENGING. Check that state under state_lock before running response verification an…

📅 Published: April 25, 2026, 8:46 a.m. 🔄 Last Modified: April 25, 2026, 8:46 a.m.

0.0

CVE-2026-31675 - net/sched: sch_netem: fix out-of-bounds access in packet corruption

In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_netem: fix out-of-bounds access in packet corruption In netem_enqueue(), the packet corruption logic uses get_random_u32_below(skb_headlen(skb)) to select an index for modifying skb->data. When an AF_PACKET TX_RING…

📅 Published: April 25, 2026, 8:46 a.m. 🔄 Last Modified: April 25, 2026, 8:46 a.m.

0.0

CVE-2026-31674 - netfilter: ip6t_rt: reject oversized addrnr in rt_mt6_check()

In the Linux kernel, the following vulnerability has been resolved: netfilter: ip6t_rt: reject oversized addrnr in rt_mt6_check() Reject rt match rules whose addrnr exceeds IP6T_RT_HOPS. rt_mt6() expects addrnr to stay within the bounds of rtinfo->addrs[]. Validate addrnr during rule installatio…

📅 Published: April 25, 2026, 8:46 a.m. 🔄 Last Modified: April 25, 2026, 8:46 a.m.

0.0

CVE-2026-31673 - af_unix: read UNIX_DIAG_VFS data under unix_state_lock

In the Linux kernel, the following vulnerability has been resolved: af_unix: read UNIX_DIAG_VFS data under unix_state_lock Exact UNIX diag lookups hold a reference to the socket, but not to u->path. Meanwhile, unix_release_sock() clears u->path under unix_state_lock() and drops the path reference…

📅 Published: April 25, 2026, 8:46 a.m. 🔄 Last Modified: April 25, 2026, 8:46 a.m.

9.2

CVSS4.0

CVE-2026-6951 -

Versions of the package simple-git before 3.36.0 are vulnerable to Remote Code Execution (RCE) due to an incomplete fix for [CVE-2022-25912](https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-3112221) that blocks the -c option but not the equivalent --config form. If untrusted input can reach the opti…

📅 Published: April 25, 2026, 5 a.m. 🔄 Last Modified: April 25, 2026, 5 a.m.

7.8

CVSS3.1

CVE-2026-42171 -

NSIS (Nullsoft Scriptable Install System) 3.06.1 before 3.12 sometimes uses the Low IL temp directory when executing as SYSTEM, allowing local attackers to gain privileges (if they can cause my_GetTempFileName to return 0, as shown in the references).

📅 Published: April 24, 2026, 9:20 p.m. 🔄 Last Modified: April 24, 2026, 9:21 p.m.

9.1

CVSS3.1

CVE-2026-41248 - Official Clerk JavaScript SDKs: Middleware-based route protection bypass

Clerk JavaScript is the official JavaScript repository for Clerk authentication. createRouteMatcher in @clerk/nextjs, @clerk/nuxt, and @clerk/astro can be bypassed by certain crafted requests, allowing them to skip middleware gating and reach downstream handlers. This vulnerability is fixed in @cle…

📅 Published: April 24, 2026, 9:04 p.m. 🔄 Last Modified: April 24, 2026, 9:04 p.m.

3.1

CVSS3.1

CVE-2026-41488 - angchain-openai: Image token counting SSRF protection can be bypassed via DNS rebinding

LangChain is a framework for building agents and LLM-powered applications. Prior to 1.1.14, langchain-openai's _url_to_size() helper (used by get_num_tokens_from_messages for image token counting) validated URLs for SSRF protection and then fetched them in a separate network operation with independ…

📅 Published: April 24, 2026, 8:57 p.m. 🔄 Last Modified: April 24, 2026, 8:57 p.m.

6.5

CVSS3.1

CVE-2026-41481 - LangChain: HTMLHeaderTextSplitter.split_text_from_url SSRF Redirect Bypass

LangChain is a framework for building agents and LLM-powered applications. Prior to langchain-text-splitters 1.1.2, HTMLHeaderTextSplitter.split_text_from_url() validated the initial URL using validate_safe_url() but then performed the fetch with requests.get() with redirects enabled (the default)…

📅 Published: April 24, 2026, 8:54 p.m. 🔄 Last Modified: April 24, 2026, 8:55 p.m.

10

CVSS3.1

CVE-2026-41478 - Saltcorn: SQL Injection via Unparameterized Sync Endpoints (maxLoadedId)

Saltcorn is an extensible, open source, no-code database application builder. Prior to 1.4.6, 1.5.6, and 1.6.0-beta.5, a SQL injection vulnerability in Saltcorn’s mobile-sync routes allows any authenticated low-privilege user with read access to at least one table to inject arbitrary SQL through sy…

📅 Published: April 24, 2026, 8:52 p.m. 🔄 Last Modified: April 24, 2026, 8:52 p.m.
Total resulsts: 346529
Page 2 of 34,653
« previous page » next page
Filters