Latest CVE Feed

Vulnerabilities published in the last 30 days. Filter by severity, exploit status, or attack vector.

Score
Vulnerability
Published
0.0 NA
CVE-2026-40199 — Net::CIDR::Lite versions before 0.23 for Perl mishandles IPv4 mapped IPv6 addresses, whic…

Net::CIDR::Lite versions before 0.23 for Perl mishandles IPv4 mapped IPv6 addresses, which may allow IP ACL bypass. _pack_ipv6() includes the sentinel byte from _pack_ipv4() when building the packed…

| Misconfiguration
Apr 10, 2026 Apr 10, 2026
Apr 10, 2026
Apr 10, 2026
0.0 NA
CVE-2026-40198 — Net::CIDR::Lite versions before 0.23 for Perl does not validate IPv6 group count, which m…

Net::CIDR::Lite versions before 0.23 for Perl does not validate IPv6 group count, which may allow IP ACL bypass. _pack_ipv6() does not check that uncompressed IPv6 addresses (without ::) have exactl…

| Misconfiguration
Apr 10, 2026 Apr 10, 2026
Apr 10, 2026
Apr 10, 2026
4.3 MEDIUM
CVE-2026-33118 — Microsoft Edge (Chromium-based) Spoofing Vulnerability

None

Apr 10, 2026 Apr 10, 2026
Apr 10, 2026
Apr 10, 2026
5.4 MEDIUM
CVE-2026-33119 — Microsoft Edge (Chromium-based) for Android Spoofing Vulnerability

None

Apr 10, 2026 Apr 10, 2026
Apr 10, 2026
Apr 10, 2026
6.3 MEDIUM
CVE-2026-5724 — Missing Authentication on Streaming gRPC Replication Endpoint

The frontend gRPC server's streaming interceptor chain did not include the authorization interceptor. When a ClaimMapper and Authorizer are configured, unary RPCs enforce authentication and authoriza…

Remote | Authorization
Apr 10, 2026 Apr 10, 2026
Apr 10, 2026
Apr 10, 2026
5.3 MEDIUM
CVE-2026-40252 — Broken Access Control (IDOR) Leading to Cross-Tenant Application Access in FastGPT

FastGPT is an AI Agent building platform. Prior to 4.14.10.4, Broken Access Control vulnerability (IDOR/BOLA) allows any authenticated team to access and execute applications belonging to other teams…

Remote | Authorization
Apr 10, 2026 Apr 10, 2026
Apr 10, 2026
Apr 10, 2026
7.2 HIGH
CVE-2026-40242 — Arcane Unauthenticated SSRF with Conditional Response Reflection in Template Fetch Endpoi…

Arcane is an interface for managing Docker containers, images, networks, and volumes. Prior to 1.17.3, the /api/templates/fetch endpoint accepts a caller-supplied url parameter and performs a server-…

Remote | Server-Side Request Forgery
Apr 10, 2026 Apr 10, 2026
Apr 10, 2026
Apr 10, 2026
3.7 LOW
CVE-2026-40194 — phpseclib has a variable-time HMAC comparison in SSH2::get_binary_packet() using != inste…

phpseclib is a PHP secure communications library. Prior to 3.0.51, 2.0.53, and 1.0.28, phpseclib\Net\SSH2::get_binary_packet() uses PHP's != operator to compare a received SSH packet HMAC against the…

Remote | Cryptography
Apr 10, 2026 Apr 10, 2026
Apr 10, 2026
Apr 10, 2026
6.8 MEDIUM
CVE-2026-40191 — ClearanceKit has a policy bypass via dual-path Endpoint Security events checking only sou…

ClearanceKit intercepts file-system access events on macOS and enforces per-process access policies. Prior to 5.0.4-beta-1f46165, ClearanceKit's Endpoint Security event handler only checked the sour…

| Path Traversal
Apr 10, 2026 Apr 10, 2026
Apr 10, 2026
Apr 10, 2026
5.6 MEDIUM
CVE-2026-40190 — LangSmith Client SDKs has Prototype Pollution in langsmith-sdk via Incomplete `__proto__`…

LangSmith Client SDKs provide SDK's for interacting with the LangSmith platform. Prior to 0.5.18, the LangSmith JavaScript/TypeScript SDK (langsmith) contains an incomplete prototype pollution fix in…

Remote | Misconfiguration
Apr 10, 2026 Apr 10, 2026
Apr 10, 2026
Apr 10, 2026
9.3 CRITICAL
CVE-2026-40189 — goshs has a file-based ACL authorization bypass in goshs state-changing routes

goshs is a SimpleHTTPServer written in Go. Prior to 2.0.0-beta.4, goshs enforces the documented per-folder .goshs ACL/basic-auth mechanism for directory listings and file reads, but it does not enfor…

Remote | Authorization
Apr 10, 2026 Apr 10, 2026
Apr 10, 2026
Apr 10, 2026
7.7 HIGH
CVE-2026-40188 — goshs is Missing Write Protection for Parametric Data Values

goshs is a SimpleHTTPServer written in Go. From 1.0.7 to before 2.0.0-beta.4, the SFTP command rename sanitizes only the source path and not the destination, so it is possible to write outside of the…

Remote | Path Traversal
Apr 10, 2026 Apr 10, 2026
Apr 10, 2026
Apr 10, 2026
7.1 HIGH
CVE-2026-40185 — Missing Authorization on Immich Trip Photo Routes in TREK

TREK is a collaborative travel planner. Prior to 2.7.2, TREK was missing authorization checks on the Immich trip photo management routes. This vulnerability is fixed in 2.7.2.

Remote | Authorization
Apr 10, 2026 Apr 10, 2026
Apr 10, 2026
Apr 10, 2026
3.7 LOW
CVE-2026-40184 — Unauthenticated Access to Uploaded Files in TREK

TREK is a collaborative travel planner. Prior to 2.7.2, TREK served uploaded photos without requiring authentication. This vulnerability is fixed in 2.7.2.

Remote | Authentication
Apr 10, 2026 Apr 10, 2026
Apr 10, 2026
Apr 10, 2026
7.7 HIGH
CVE-2026-40180 — Zip Slip Path Traversal in quarkus-openapi-generator ApicurioCodegenWrapper class

Quarkus OpenAPI Generator is Quarkus' extensions for generation of Rest Clients and server stubs generation. Prior to 2.16.0 and 2.15.0-lts, the unzip() method in ApicurioCodegenWrapper.java extracts…

Remote | Path Traversal
Apr 10, 2026 Apr 10, 2026
Apr 10, 2026
Apr 10, 2026
6.9 MEDIUM
CVE-2026-40178 — ajenti.plugin.core has a race conditions in 2FA

ajenti.plugin.core defines all necessary core elements to allow Ajenti to run properly. Prior to 0.112, if the 2FA was activated, it was possible during a short moment after the authentication of an …

Remote | Authentication
Apr 10, 2026 Apr 10, 2026
Apr 10, 2026
Apr 10, 2026
9.3 CRITICAL
CVE-2026-40177 — Password bypass when 2FA is activated

ajenti.plugin.core defines all necessary core elements to allow Ajenti to run properly. Prior to 0.112, if the 2FA was activated, it was possible to bypass the password authentication This vulnerabil…

Remote | Authentication
Apr 10, 2026 Apr 10, 2026
Apr 10, 2026
Apr 10, 2026
10.0 CRITICAL
CVE-2026-40175 — Axios has Unrestricted Cloud Metadata Exfiltration via Header Injection Chain

Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.0, the Axios library is vulnerable to a specific "Gadget" attack chain that allows Prototype Pollution in any third-par…

Remote | Supply Chain
Apr 10, 2026 Apr 10, 2026
Apr 10, 2026
Apr 10, 2026
8.2 HIGH
CVE-2026-40168 — Postiz has Server-Side Request Forgery via Redirect Bypass in /api/public/stream

Postiz is an AI social media scheduling tool. Prior to 2.21.5, the /api/public/stream endpoint is vulnerable to SSRF. Although the application validates the initially supplied URL and blocks direct p…

Remote | Server-Side Request Forgery
Apr 10, 2026 Apr 10, 2026
Apr 10, 2026
Apr 10, 2026
5.3 MEDIUM
CVE-2026-39922 — GeoNode < 4.4.5, 5.0.2 SSRF via Service Registration

GeoNode versions 4.0 before 4.4.5 and 5.0 before 5.0.2 contain a server-side request forgery vulnerability in the service registration endpoint that allows authenticated attackers to trigger outbound…

Remote | Server-Side Request Forgery
Apr 10, 2026 Apr 10, 2026
Apr 10, 2026
Apr 10, 2026
Showing 20 of 6361 Results