Security
CVE Feed
Latest vulnerabilities from the National Vulnerability Database.
10557
Total
721
Critical
3059
High
3365
Medium
| CVE ID | Severity | Score | Description | Published |
|---|---|---|---|---|
| CVE-2026-42348 | MEDIUM | 5.9 | OpenTelemetry.OpAmp.Client is the OpAMP client for OpenTelemetry .NET. Prior to 0.2.0-alpha.1, when receiving responses from the OpAMP server over HTTP, the OpAMP client allocates an … | May 12, 2026 |
| CVE-2026-42303 | UNKNOWN | — | Fides is an open-source privacy engineering platform. From 2.75.0 to before 2.83.2, Fides deployments that enable both subject identity verification and duplicate privacy request detection … | May 12, 2026 |
| CVE-2026-42300 | UNKNOWN | — | DevGuard provides vulnerability management for the full software supply chain. Prior to 1.2.2, the SessionMiddleware accepts a client-supplied X-Admin-Token HTTP request header and uses its … | May 12, 2026 |
| CVE-2026-42177 | MEDIUM | 5.3 | linux-entra-sso is a browser plugin for Linux to SSO on Microsoft Entra ID. Prior to 1.8.1, platform/chrome/js/platform-chrome.js:69-88 registers a single declarativeNetRequest rule whose urlFilter is … | May 12, 2026 |
| CVE-2026-42175 | MEDIUM | 6.5 | requests-hardened is a library that overrides the default behaviors of the requests library, and adds new security features. Prior to , the SSRF protection in … | May 12, 2026 |
| CVE-2026-42141 | HIGH | 7.7 | Xibo is an open source digital signage platform with a web content management system and Windows display player software. Prior to 4.4.1, an authenticated Server-Side … | May 12, 2026 |
| CVE-2026-42048 | CRITICAL | 9.6 | Langflow is a tool for building and deploying AI-powered agents and workflows. Prior to 1.9.0, Langflow is vulnerable to Path Traversal in the Knowledge Bases … | May 12, 2026 |
| CVE-2026-42045 | MEDIUM | 6.2 | LobeHub is a work-and-lifestyle space to find, build, and collaborate with agent teammates that grow with you. Prior to 2.1.48, when LobeChat processes custom tags … | May 12, 2026 |
| CVE-2026-41895 | UNKNOWN | — | changedetection.io is a free open source web page change detection tool. In 0.54.9 and earlier, xpath_filter() switches to XML mode for XML/RSS content and creates … | May 12, 2026 |
| CVE-2026-41614 | MEDIUM | 6.2 | Improper access control in M365 Copilot for Desktop allows an unauthorized attacker to perform spoofing locally. | May 12, 2026 |
| CVE-2026-41613 | HIGH | 8.8 | Session fixation in Visual Studio Code allows an unauthorized attacker to elevate privileges over a network. | May 12, 2026 |
| CVE-2026-41612 | MEDIUM | 5.5 | Relative path traversal in Visual Studio Code allows an unauthorized attacker to disclose information locally. | May 12, 2026 |
| CVE-2026-41611 | HIGH | 7.8 | Improper neutralization of script-related html tags in a web page (basic xss) in Visual Studio Code allows an unauthorized attacker to execute code locally. | May 12, 2026 |
| CVE-2026-41610 | MEDIUM | 6.3 | Improper neutralization of input during web page generation ('cross-site scripting') in Visual Studio Code allows an unauthorized attacker to bypass a security feature locally. | May 12, 2026 |
| CVE-2026-41513 | UNKNOWN | — | Horilla is an HR and CRM software. In 1.5.0, the notification endpoints trust the unvalidated next parameter and redirect users to arbitrary external URLs. This … | May 12, 2026 |
| CVE-2026-41109 | HIGH | 8.8 | Improper neutralization of special elements in output used by a downstream component ('injection') in GitHub Copilot and Visual Studio allows an unauthorized attacker to bypass … | May 12, 2026 |
| CVE-2026-41107 | HIGH | 7.4 | External control of file name or path in Microsoft Edge (Chromium-based) allows an unauthorized attacker to disclose information over a network. | May 12, 2026 |
| CVE-2026-41103 | CRITICAL | 9.1 | Incorrect implementation of authentication algorithm in Microsoft SSO Plugin for Jira & Confluence allows an unauthorized attacker to elevate privileges over a network. | May 12, 2026 |
| CVE-2026-41102 | HIGH | 7.1 | Improper access control in Microsoft Office PowerPoint allows an authorized attacker to perform spoofing locally. | May 12, 2026 |
| CVE-2026-41101 | HIGH | 7.1 | Improper access control in Microsoft Office Word allows an authorized attacker to perform spoofing locally. | May 12, 2026 |
| CVE-2026-41100 | MEDIUM | 4.4 | Improper access control in M365 Copilot allows an authorized attacker to perform spoofing locally. | May 12, 2026 |
| CVE-2026-41097 | MEDIUM | 6.7 | Reliance on a component that is not updateable in Windows Secure Boot allows an authorized attacker to bypass a security feature locally. | May 12, 2026 |
| CVE-2026-41096 | CRITICAL | 9.8 | Heap-based buffer overflow in Microsoft Windows DNS allows an unauthorized attacker to execute code over a network. | May 12, 2026 |
| CVE-2026-41095 | HIGH | 7.8 | Use after free in Data Deduplication allows an authorized attacker to elevate privileges locally. | May 12, 2026 |
| CVE-2026-41094 | HIGH | 8.8 | Improper control of generation of code ('code injection') in Microsoft Data Formulator allows an unauthorized attacker to execute code over a network. | May 12, 2026 |