VYPR

CVEs

351,818 total · page 28 of 7,037

  • CVE-2026-42891MedMay 12, 2026
    risk 0.42cvss 6.5epss 0.00

    User interface (ui) misrepresentation of critical information in Microsoft Edge (Chromium-based) allows an unauthorized attacker to perform spoofing over a network.

  • CVE-2026-42838MedMay 12, 2026
    risk 0.35cvss 5.4epss 0.00

    Improper neutralization of special elements in output used by a downstream component ('injection') in Microsoft Edge (Chromium-based) allows an unauthorized attacker to elevate privileges over a network.

  • CVE-2026-42833CriMay 12, 2026
    risk 0.59cvss 9.1epss 0.00

    Execution with unnecessary privileges in Microsoft Dynamics 365 (on-premises) allows an authorized attacker to execute code over a network.

  • CVE-2026-42832HigMay 12, 2026
    risk 0.50cvss 7.7epss 0.00

    Improper access control in Microsoft Office allows an unauthorized attacker to perform spoofing locally.

  • CVE-2026-42831HigMay 12, 2026
    risk 0.51cvss 7.8epss 0.00

    Heap-based buffer overflow in Microsoft Office allows an unauthorized attacker to execute code locally.

  • CVE-2026-42830MedMay 12, 2026
    risk 0.42cvss 6.5epss 0.00

    Untrusted search path in Azure Monitor Agent allows an authorized attacker to elevate privileges locally.

  • CVE-2026-42825HigMay 12, 2026
    risk 0.46cvss 7.0epss 0.00

    Use after free in Windows Telephony Service allows an authorized attacker to elevate privileges locally.

  • CVE-2026-42823CriMay 12, 2026
    risk 0.64cvss 9.9epss 0.00

    Improper access control in Azure Logic Apps allows an authorized attacker to elevate privileges over a network.

  • CVE-2026-42541MedMay 12, 2026
    risk 0.28cvss 4.3epss 0.00

    Kubewarden is a policy engine for Kubernetes. Prior to , An attacker with privileged AdmissionPolicy or AdmissionPolicyGroup create permissions (which isn't the default) can craft a policy that makes use of the can_i host callback. The callback issues a SubjectAccessReview (SAR) requests to enumerate RBAC permissions of any user or service account across the cluster. can_i does not perform that check to enforce the context-aware allow-list and forwards the request directly to the callback handler, which executes a real SubjectAccessReview using policy-server privileges. This creates a policy-level authorization gap: can_i is effectively usable even when the policy has no context-aware resource grant. This is an information disclosure / reconnaissance issue, and not direct workload data exfiltration. The attacker learns permission information, such as whether specific service accounts can "get secrets", "create pods", or "bind clusterroles" in chosen namespaces. This vulnerability is fixed in .

  • CVE-2026-42348MedMay 12, 2026
    risk 0.31cvss 5.9epss 0.00

    OpenTelemetry.OpAmp.Client is the OpAMP client for OpenTelemetry .NET. Prior to 0.2.0-alpha.1, when receiving responses from the OpAMP server over HTTP, the OpAMP client allocates an unbounded buffer to read all bytes from the server, with no upper-bound on the number of bytes consumed. This could cause memory exhaustion in the consuming application if the configured OpAMP server is attacker-controlled (or a network attacker can MitM the connection) and an extremely large body is returned in the response. This vulnerability is fixed in 0.2.0-alpha.1.

  • CVE-2026-42303MedMay 12, 2026
    risk 0.33cvss epss 0.00

    Fides is an open-source privacy engineering platform. From 2.75.0 to before 2.83.2, Fides deployments that enable both subject identity verification and duplicate privacy request detection are affected by a vulnerability in which an administrator can approve a privacy request whose identity was never verified. For erasure policies, this can result in unauthorized deletion of a data subject's records across every integration configured in the affected deployment. This vulnerability is fixed in 2.83.2.

  • CVE-2026-42300CriMay 12, 2026
    risk 0.53cvss epss 0.00

    DevGuard provides vulnerability management for the full software supply chain. Prior to 1.2.2, the SessionMiddleware accepts a client-supplied X-Admin-Token HTTP request header and uses its raw string value as the authenticated userID when no Kratos session cookie is present. An unauthenticated attacker who knows or can guess a target user's Kratos identity UUID can issue requests as that user. Where the target user is an organisation admin or owner, this gives the attacker full control over that organisation's DevGuard resources. This vulnerability is fixed in 1.2.2.

  • CVE-2026-42177MedMay 12, 2026
    risk 0.34cvss 5.3epss 0.00

    linux-entra-sso is a browser plugin for Linux to SSO on Microsoft Entra ID. Prior to 1.8.1, platform/chrome/js/platform-chrome.js:69-88 registers a single declarativeNetRequest rule whose urlFilter is Platform.SSO_URL + "/*", i.e. "https://login.microsoftonline.com/*". Chrome's urlFilter without a | or || anchor is substring-matched against the full request URL. The same applied rule action is modifyHeaders that attaches the Entra ID Primary Refresh Token cookie. The Firefox adapter in platform/firefox/js/platform-firefox.js:53 performs a belt-and-braces startsWith(Platform.SSO_URL) check before injecting the header; the Chrome adapter does not. When the extension holds broad host permissions through the optional_host_permissions: ["https://*/*"] declared in platform/chrome/manifest.json:34, a main-frame navigation to a URL whose path embeds https://login.microsoftonline.com/ causes Chrome to attach the PRT cookie to the request to the attacker-controlled host. This vulnerability is fixed in 1.8.1.

  • CVE-2026-42175MedMay 12, 2026
    risk 0.35cvss 6.5epss 0.00

    requests-hardened is a library that overrides the default behaviors of the requests library, and adds new security features. Prior to , the SSRF protection in requests-hardened fails to block IP addresses within the RFC 6598 Shared Address Space (100.64.0.0/10). An attacker who can supply arbitrary URLs to requests-hardened could exploit this gap to access internal services hosted within 100.64.0.0/10. This is for example relevant in environments such as AWS EKS where 100.64.0.0/10 is commonly used as the default pod CIDR. The impact is environment-dependent, deployments that utilize the affected CIDR range for internal networking are exposed to SSRF bypass, while others may not be affected. This vulnerability is fixed in .

  • CVE-2026-42141HigMay 12, 2026
    risk 0.50cvss 7.7epss 0.00

    Xibo is an open source digital signage platform with a web content management system and Windows display player software. Prior to 4.4.1, an authenticated Server-Side Request Forgery (SSRF) vulnerability in the Xibo CMS allows users with Library upload permissions to make arbitrary HTTP requests from the CMS server to internal or external network resources. This can be exploited to scan internal infrastructure, access local cloud metadata endpoints (e.g., AWS IMDS), interact with internal services that lack authentication, or exfiltrate data. This vulnerability is fixed in 4.4.1.

  • CVE-2026-42048CriMay 12, 2026
    risk 0.62cvss 9.6epss 0.00

    Langflow is a tool for building and deploying AI-powered agents and workflows. Prior to 1.9.0, Langflow is vulnerable to Path Traversal in the Knowledge Bases API (DELETE /api/v1/knowledge_bases). This occurs because user-supplied knowledge base names are concatenated directly into file paths without proper sanitization or boundary validation. An authenticated attacker can exploit this flaw to delete arbitrary directories anywhere on the server's filesystem, leading to data loss and potential service disruption. This vulnerability is fixed in 1.9.0.

  • CVE-2026-42045MedMay 12, 2026
    risk 0.40cvss 6.2epss 0.00

    LobeHub is a work-and-lifestyle space to find, build, and collaborate with agent teammates that grow with you. Prior to 2.1.48, when LobeChat processes custom tags in the Render process of src/features/Portal/Artifacts/Body/Renderer/index.tsx, if no type match is found, it will choose to call the default method, HTMLRenderer, for HTML rendering. If an attacker can induce the LLM to output content containing malicious tags, an XSS vulnerability can be created on the client side. Additionally, Lobechat's Electron main process exposes an IPC interface called runCommand, used to invoke system commands. This interface allows arbitrary command execution and does not filter the command parameter. Therefore, if an attacker can obtain a handle to window.parent.electronAPI via XSS and call the runCommand method of the IPC, the ipcMain process can execute arbitrary system commands with the current user's privileges. This vulnerability is fixed in 2.1.48.

  • CVE-2026-41895HigMay 12, 2026
    risk 0.49cvss 7.5epss 0.00

    changedetection.io is a free open source web page change detection tool. In 0.54.9 and earlier, xpath_filter() switches to XML mode for XML/RSS content and creates etree.XMLParser(strip_cdata=False) without explicitly disabling external entity resolution, external DTD loading, or network-backed entity lookup. The helper then parses untrusted XML bytes directly with etree.fromstring(...).

  • CVE-2026-41614MedMay 12, 2026
    risk 0.40cvss 6.2epss 0.00

    Improper access control in M365 Copilot for Desktop allows an unauthorized attacker to perform spoofing locally.

  • CVE-2026-41613HigMay 12, 2026
    risk 0.57cvss 8.8epss 0.00

    Session fixation in Visual Studio Code allows an unauthorized attacker to elevate privileges over a network.

  • CVE-2026-41612MedMay 12, 2026
    risk 0.36cvss 5.5epss 0.00

    Relative path traversal in Visual Studio Code allows an unauthorized attacker to disclose information locally.

  • CVE-2026-41611HigMay 12, 2026
    risk 0.51cvss 7.8epss 0.00

    Improper neutralization of script-related html tags in a web page (basic xss) in Visual Studio Code allows an unauthorized attacker to execute code locally.

  • CVE-2026-41610MedMay 12, 2026
    risk 0.41cvss 6.3epss 0.00

    Improper neutralization of input during web page generation ('cross-site scripting') in Visual Studio Code allows an unauthorized attacker to bypass a security feature locally.

  • CVE-2026-41513MedMay 12, 2026
    risk 0.31cvss epss 0.00

    Horilla is an HR and CRM software. In 1.5.0, the notification endpoints trust the unvalidated next parameter and redirect users to arbitrary external URLs. This allows an attacker to turn trusted application links into phishing or social-engineering redirects.

  • CVE-2026-41109HigMay 12, 2026
    risk 0.57cvss 8.8epss 0.00

    Improper neutralization of special elements in output used by a downstream component ('injection') in GitHub Copilot and Visual Studio allows an unauthorized attacker to bypass a security feature over a network.

  • CVE-2026-41107HigMay 12, 2026
    risk 0.48cvss 7.4epss 0.00

    External control of file name or path in Microsoft Edge (Chromium-based) allows an unauthorized attacker to disclose information over a network.

  • CVE-2026-41103CriMay 12, 2026
    risk 0.59cvss 9.1epss 0.00

    Incorrect implementation of authentication algorithm in Microsoft SSO Plugin for Jira & Confluence allows an unauthorized attacker to elevate privileges over a network.

  • CVE-2026-41102HigMay 12, 2026
    risk 0.46cvss 7.1epss 0.00

    Improper access control in Microsoft Office PowerPoint allows an authorized attacker to perform spoofing locally.

  • CVE-2026-41101HigMay 12, 2026
    risk 0.46cvss 7.1epss 0.00

    Improper access control in Microsoft Office Word allows an authorized attacker to perform spoofing locally.

  • CVE-2026-41100MedMay 12, 2026
    risk 0.29cvss 4.4epss 0.00

    Improper access control in M365 Copilot allows an authorized attacker to perform spoofing locally.

  • CVE-2026-41097MedMay 12, 2026
    risk 0.44cvss 6.7epss 0.00

    Reliance on a component that is not updateable in Windows Secure Boot allows an authorized attacker to bypass a security feature locally.

  • CVE-2026-41096CriMay 12, 2026
    risk 0.64cvss 9.8epss 0.00

    Heap-based buffer overflow in Microsoft Windows DNS allows an unauthorized attacker to execute code over a network.

  • CVE-2026-41095HigMay 12, 2026
    risk 0.51cvss 7.8epss 0.00

    Use after free in Data Deduplication allows an authorized attacker to elevate privileges locally.

  • CVE-2026-41094HigMay 12, 2026
    risk 0.57cvss 8.8epss 0.00

    Improper control of generation of code ('code injection') in Microsoft Data Formulator allows an unauthorized attacker to execute code over a network.

  • CVE-2026-41089CriMay 12, 2026
    risk 0.64cvss 9.8epss 0.00

    Stack-based buffer overflow in Windows Netlogon allows an unauthorized attacker to execute code over a network.

  • CVE-2026-41088HigMay 12, 2026
    risk 0.51cvss 7.8epss 0.00

    External control of file name or path in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.

  • CVE-2026-41086HigMay 12, 2026
    risk 0.57cvss 8.8epss 0.00

    Improper access control in Windows Admin Center allows an authorized attacker to elevate privileges over a network.

  • CVE-2026-40421MedMay 12, 2026
    risk 0.28cvss 4.3epss 0.00

    External control of file name or path in Microsoft Office Word allows an unauthorized attacker to disclose information over a network.

  • CVE-2026-40420HigMay 12, 2026
    risk 0.57cvss 8.8epss 0.00

    Improper access control in Microsoft Office Click-To-Run allows an authorized attacker to elevate privileges locally.

  • CVE-2026-40419HigMay 12, 2026
    risk 0.51cvss 7.8epss 0.00

    Use after free in Microsoft Office allows an authorized attacker to elevate privileges locally.

  • CVE-2026-40418HigMay 12, 2026
    risk 0.51cvss 7.8epss 0.00

    Use after free in Microsoft Office Click-To-Run allows an authorized attacker to elevate privileges locally.

  • CVE-2026-40417HigMay 12, 2026
    risk 0.51cvss 7.8epss 0.00

    Weak authentication in Dynamics Business Central allows an authorized attacker to elevate privileges locally.

  • CVE-2026-40416MedMay 12, 2026
    risk 0.28cvss 4.3epss 0.00

    User interface (ui) misrepresentation of critical information in Microsoft Edge (Chromium-based) allows an unauthorized attacker to perform spoofing over a network.

  • CVE-2026-40415HigMay 12, 2026
    risk 0.53cvss 8.1epss 0.00

    Use after free in Windows TCP/IP allows an unauthorized attacker to execute code over a network.

  • CVE-2026-40414HigMay 12, 2026
    risk 0.48cvss 7.4epss 0.00

    Null pointer dereference in Windows TCP/IP allows an unauthorized attacker to deny service over an adjacent network.

  • CVE-2026-40413HigMay 12, 2026
    risk 0.48cvss 7.4epss 0.00

    Null pointer dereference in Windows TCP/IP allows an unauthorized attacker to deny service over an adjacent network.

  • CVE-2026-40410HigMay 12, 2026
    risk 0.46cvss 7.0epss 0.00

    Use after free in Windows SMB Client allows an authorized attacker to elevate privileges locally.

  • CVE-2026-40408HigMay 12, 2026
    risk 0.51cvss 7.8epss 0.00

    Use after free in Windows Kernel-Mode Drivers allows an authorized attacker to elevate privileges locally.

  • CVE-2026-40407HigMay 12, 2026
    risk 0.51cvss 7.8epss 0.00

    Heap-based buffer overflow in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.

  • CVE-2026-40406HigMay 12, 2026
    risk 0.49cvss 7.5epss 0.00

    Use after free in Windows TCP/IP allows an unauthorized attacker to disclose information over a network.