Common Vulnerabilities & Exposures
Quick views
Columns
Showing 50 of 48479 results.
| CVE | Severity | Affected Products | Updated |
|---|---|---|---|
| CVE-2026-40899 | HIGH8.3 | dataease:dataease | Apr 16, 2026 |
| CVE-2026-33083 | HIGH8.7 | dataease:dataease | Apr 16, 2026 |
| CVE-2026-33207 | HIGH8.6 | dataease:dataease | Apr 16, 2026 |
| CVE-2026-5121 | HIGH7.5 | Red Hat:Red Hat Enterprise Linux 10; Red Hat:Red Hat Enterprise Linux 6; Red Hat:Red Hat Enterprise Linux 7 Extended Lifecycle Support; Red Hat:Red Hat Enterprise Linux 8; Red Hat:Red Hat Enterprise Linux 8.2 Advanced Update Support; Red Hat:Red Hat Enterprise Linux 9; Red Hat:Red Hat Hardened Images; Red Hat:Red Hat OpenShift Container Platform 4 | Apr 16, 2026 |
| CVE-2026-31843 | CRITICAL10.0 | goodoneuz:pay-uz | Apr 16, 2026 |
| CVE-2026-4424 | HIGH7.5 | Red Hat:Red Hat Enterprise Linux 10; Red Hat:Red Hat Enterprise Linux 6; Red Hat:Red Hat Enterprise Linux 7 Extended Lifecycle Support; Red Hat:Red Hat Enterprise Linux 8; Red Hat:Red Hat Enterprise Linux 8.2 Advanced Update Support; Red Hat:Red Hat Enterprise Linux 9; Red Hat:Red Hat Hardened Images; Red Hat:Red Hat OpenShift Container Platform 4 | Apr 16, 2026 |
| CVE-2026-33122 | HIGH8.6 | dataease:dataease | Apr 16, 2026 |
| CVE-2025-54502 | HIGH7.1 | AMD:AMD Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics; AMD:AMD EPYC™ 4004 Series Processors; AMD:AMD EPYC™ 7002 Series Processors; AMD:AMD EPYC™ 7003 Series Processors; AMD:AMD EPYC™ 8004 Series Processors; AMD:AMD EPYC™ 9004 Series Processors; AMD:AMD EPYC™ 9005 Series Processors; AMD:AMD EPYC™ 9V64H Processor; AMD:AMD EPYC™ Embedded 7002 Series Processors; AMD:AMD EPYC™ Embedded 7003 Series Processors; AMD:AMD EPYC™ Embedded 8004 Series Processors; AMD:AMD EPYC™ Embedded 9004 Series Processors (formerly codenamed "Bergamo"); AMD:AMD EPYC™ Embedded 9004 Series Processors (formerly codenamed "Genoa"); AMD:AMD EPYC™ Embedded 9005 Series Processors; AMD:AMD Instinct™ MI300A Series Processors; AMD:AMD Ryzen™ 3000 Series Desktop Processors; AMD:AMD Ryzen™ 3000 Series Mobile Processors with Radeon™ Graphics; AMD:AMD Ryzen™ 4000 Series Desktop Processors; AMD:AMD Ryzen™ 4000 Series Mobile Processors with Radeon™ Graphics; AMD:AMD Ryzen™ 5000 Series Desktop Processors; AMD:AMD Ryzen™ 5000 Series Desktop Processors with Radeon™ Graphics; AMD:AMD Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics; AMD:AMD Ryzen™ 6000 Series Processors with Radeon™ Graphics; AMD:AMD Ryzen™ 7000 Series Desktop Processors; AMD:AMD Ryzen™ 7000 Series Desktop Processors (formerly codenamed "Raphael"); AMD:AMD Ryzen™ 7020 Series Processors with Radeon™ Graphics; AMD:AMD Ryzen™ 7030 Series Mobile Processors with Radeon™ Graphics; AMD:AMD Ryzen™ 7035 Series Processors with Radeon™ Graphics; AMD:AMD Ryzen™ 7040 Series Mobile Processors with Radeon™ Graphics; AMD:AMD Ryzen™ 7045 Series Mobile Processors with Radeon™ Graphics; AMD:AMD Ryzen™ 8000 Series Desktop Processors; AMD:AMD Ryzen™ 8000 Series Desktop Processors (formerly codenamed "Phoenix"); AMD:AMD Ryzen™ 8040 Series Mobile Processors with Radeon™ Graphics; AMD:AMD Ryzen™ 9000 Series Desktop Processors; AMD:AMD Ryzen™ 9000 Series Desktop Processors (formerly codenamed "Granite Ridge"); AMD:AMD Ryzen™ 9000HX Series Processors; AMD:AMD Ryzen™ AI 300 Series Processors; AMD:AMD Ryzen™ AI Max 300 Series Processors; AMD:AMD Ryzen™ Embedded 5000 Series Processors; AMD:AMD Ryzen™ Embedded 7000 Series Processors; AMD:AMD Ryzen™ Embedded 8000 Series Processors; AMD:AMD Ryzen™ Embedded 9000 Series Processors; AMD:AMD Ryzen™ Embedded R1000 Series Processors; AMD:AMD Ryzen™ Embedded R2000 Series Processors; AMD:AMD Ryzen™ Embedded V1000 Series Processors (formerly codenamed "Raven Ridge"); AMD:AMD Ryzen™ Embedded V2000 Series Processors; AMD:AMD Ryzen™ Embedded V3000 Series Processors; AMD:AMD Ryzen™ Threadripper™ 7000 Processors; AMD:AMD Ryzen™ Threadripper™ 9000 Processors; AMD:AMD Ryzen™ Threadripper™ PRO 3000 WX-Series Processors; AMD:AMD Ryzen™ Threadripper™ PRO 5000 WX-Series Processors; AMD:AMD Ryzen™ Threadripper™ PRO 7000 WX-Series Processors; AMD:AMD Ryzen™ Threadripper™ PRO 9000 WX-Series Processors; AMD:AMD Ryzen™ Z1 Series Processors; AMD:AMD Ryzen™ Z2 Series Processors; AMD:AMD Ryzen™ Z2 Series Processors Extreme; AMD:AMD Ryzen™ Z2 Series Processors Go | Apr 16, 2026 |
| CVE-2026-20184 | CRITICAL9.8 | Cisco:Cisco Webex Meetings | Apr 16, 2026 |
| CVE-2026-6442 | HIGH8.3 | Snowflake:Cortex Code CLI | Apr 16, 2026 |
| CVE-2026-33082 | HIGH8.7 | dataease:dataease | Apr 16, 2026 |
| CVE-2026-41082 | HIGH7.3 | OCaml:opam | Apr 16, 2026 |
| CVE-2026-33121 | HIGH8.7 | dataease:dataease | Apr 16, 2026 |
| CVE-2025-27363 | HIGH8.1 | FreeType:FreeType | Apr 16, 2026 |
| CVE-2026-41035 | HIGH7.4 | Samba:rsync | Apr 16, 2026 |
| CVE-2026-33084 | HIGH8.7 | dataease:dataease | Apr 16, 2026 |
| CVE-2026-5329 | HIGH8.5 | Rapid7:Velociraptor | Apr 16, 2026 |
| CVE-2026-2336 | HIGH8.7 | Microchip:IStaX | Apr 16, 2026 |
| CVE-2026-6409 | HIGH7.1 | Protocol Buffers:Protobuf-php (Pecl) | Apr 16, 2026 |
| CVE-2026-3324 | HIGH8.2 | Zohocorp:ManageEngine Log360 | Apr 16, 2026 |
| CVE-2026-33793 | HIGH8.5 | Juniper Networks:Junos OS; Juniper Networks:Junos OS Evolved | Apr 16, 2026 |
| CVE-2025-11252 | CRITICAL9.8 | Signum Technology Promotion and Training Inc.:windesk.fm | Apr 16, 2026 |
| CVE-2026-33804 | HIGH7.4 | @fastify/middie:@fastify/middie | Apr 16, 2026 |
| CVE-2026-6388 | CRITICAL9.1 | Red Hat:Red Hat OpenShift GitOps | Apr 16, 2026 |
| CVE-2026-5785 | HIGH8.1 | Zohocorp:ManageEngine PAM360; Zohocorp:ManageEngine Password Manager Pro | Apr 16, 2026 |
| CVE-2026-6270 | CRITICAL9.1 | @fastify/middie:@fastify/middie | Apr 16, 2026 |
| CVE-2026-40193 | HIGH8.2 | foxcpp:maddy | Apr 16, 2026 |
| CVE-2026-4880 | CRITICAL9.8 | ukrsolution:Barcode Scanner (+Mobile App) – Inventory manager, Order fulfillment system, POS (Point of Sale) | Apr 16, 2026 |
| CVE-2026-23666 | HIGH7.5 | Microsoft:Microsoft .NET Framework 3.5; Microsoft:Microsoft .NET Framework 3.5 AND 4.7.2; Microsoft:Microsoft .NET Framework 3.5 AND 4.8; Microsoft:Microsoft .NET Framework 3.5 AND 4.8.1; Microsoft:Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2; Microsoft:Microsoft .NET Framework 4.8 | Apr 16, 2026 |
| CVE-2026-33824 | CRITICAL9.8 | Microsoft:Windows 10 Version 1607; Microsoft:Windows 10 Version 1809; Microsoft:Windows 10 Version 21H2; Microsoft:Windows 10 Version 22H2; Microsoft:Windows 11 Version 23H2; Microsoft:Windows 11 Version 24H2; Microsoft:Windows 11 Version 25H2; Microsoft:Windows 11 version 22H3; Microsoft:Windows 11 version 26H1; Microsoft:Windows Server 2016; Microsoft:Windows Server 2016 (Server Core installation); Microsoft:Windows Server 2019; Microsoft:Windows Server 2019 (Server Core installation); Microsoft:Windows Server 2022; Microsoft:Windows Server 2022, 23H2 Edition (Server Core installation); Microsoft:Windows Server 2025; Microsoft:Windows Server 2025 (Server Core installation) | Apr 16, 2026 |
| CVE-2026-33827 | HIGH8.1 | Microsoft:Windows 10 Version 1607; Microsoft:Windows 10 Version 1809; Microsoft:Windows 10 Version 21H2; Microsoft:Windows 10 Version 22H2; Microsoft:Windows 11 Version 23H2; Microsoft:Windows 11 Version 24H2; Microsoft:Windows 11 Version 25H2; Microsoft:Windows 11 version 22H3; Microsoft:Windows 11 version 26H1; Microsoft:Windows Server 2012; Microsoft:Windows Server 2012 (Server Core installation); Microsoft:Windows Server 2012 R2; Microsoft:Windows Server 2012 R2 (Server Core installation); Microsoft:Windows Server 2016; Microsoft:Windows Server 2016 (Server Core installation); Microsoft:Windows Server 2019; Microsoft:Windows Server 2019 (Server Core installation); Microsoft:Windows Server 2022; Microsoft:Windows Server 2022, 23H2 Edition (Server Core installation); Microsoft:Windows Server 2025; Microsoft:Windows Server 2025 (Server Core installation) | Apr 16, 2026 |
| CVE-2026-33115 | HIGH8.4 | Microsoft:Microsoft 365 Apps for Enterprise; Microsoft:Microsoft Office LTSC 2021; Microsoft:Microsoft Office LTSC 2024; Microsoft:Microsoft Office LTSC for Mac 2021; Microsoft:Microsoft Office LTSC for Mac 2024 | Apr 16, 2026 |
| CVE-2026-33114 | HIGH8.4 | Microsoft:Microsoft 365 Apps for Enterprise; Microsoft:Microsoft Office LTSC 2021; Microsoft:Microsoft Office LTSC 2024; Microsoft:Microsoft Office LTSC for Mac 2021; Microsoft:Microsoft Office LTSC for Mac 2024 | Apr 16, 2026 |
| CVE-2026-33104 | HIGH7.0 | Microsoft:Windows 10 Version 1607; Microsoft:Windows 10 Version 1809; Microsoft:Windows 10 Version 21H2; Microsoft:Windows 10 Version 22H2; Microsoft:Windows 11 Version 23H2; Microsoft:Windows 11 Version 24H2; Microsoft:Windows 11 Version 25H2; Microsoft:Windows 11 version 22H3; Microsoft:Windows 11 version 26H1; Microsoft:Windows Server 2012; Microsoft:Windows Server 2012 (Server Core installation); Microsoft:Windows Server 2012 R2; Microsoft:Windows Server 2012 R2 (Server Core installation); Microsoft:Windows Server 2016; Microsoft:Windows Server 2016 (Server Core installation); Microsoft:Windows Server 2019; Microsoft:Windows Server 2019 (Server Core installation); Microsoft:Windows Server 2022; Microsoft:Windows Server 2022, 23H2 Edition (Server Core installation); Microsoft:Windows Server 2025; Microsoft:Windows Server 2025 (Server Core installation) | Apr 16, 2026 |
| CVE-2026-33101 | HIGH7.8 | Microsoft:Windows 11 Version 24H2; Microsoft:Windows 11 Version 25H2; Microsoft:Windows 11 version 26H1; Microsoft:Windows Server 2022, 23H2 Edition (Server Core installation); Microsoft:Windows Server 2025; Microsoft:Windows Server 2025 (Server Core installation) | Apr 16, 2026 |
| CVE-2026-33100 | HIGH7.0 | Microsoft:Windows 10 Version 1607; Microsoft:Windows 10 Version 1809; Microsoft:Windows 10 Version 21H2; Microsoft:Windows 10 Version 22H2; Microsoft:Windows 11 Version 23H2; Microsoft:Windows 11 Version 24H2; Microsoft:Windows 11 Version 25H2; Microsoft:Windows 11 version 22H3; Microsoft:Windows 11 version 26H1; Microsoft:Windows Server 2012; Microsoft:Windows Server 2012 (Server Core installation); Microsoft:Windows Server 2012 R2; Microsoft:Windows Server 2012 R2 (Server Core installation); Microsoft:Windows Server 2016; Microsoft:Windows Server 2016 (Server Core installation); Microsoft:Windows Server 2019; Microsoft:Windows Server 2019 (Server Core installation); Microsoft:Windows Server 2022; Microsoft:Windows Server 2022, 23H2 Edition (Server Core installation); Microsoft:Windows Server 2025; Microsoft:Windows Server 2025 (Server Core installation) | Apr 16, 2026 |
| CVE-2026-40502 | HIGH8.7 | HKUDS:OpenHarness | Apr 16, 2026 |
| CVE-2026-33099 | HIGH7.0 | Microsoft:Windows 10 Version 1607; Microsoft:Windows 10 Version 1809; Microsoft:Windows 10 Version 21H2; Microsoft:Windows 10 Version 22H2; Microsoft:Windows 11 Version 23H2; Microsoft:Windows 11 Version 24H2; Microsoft:Windows 11 Version 25H2; Microsoft:Windows 11 version 22H3; Microsoft:Windows Server 2012; Microsoft:Windows Server 2012 (Server Core installation); Microsoft:Windows Server 2012 R2; Microsoft:Windows Server 2012 R2 (Server Core installation); Microsoft:Windows Server 2016; Microsoft:Windows Server 2016 (Server Core installation); Microsoft:Windows Server 2019; Microsoft:Windows Server 2019 (Server Core installation); Microsoft:Windows Server 2022; Microsoft:Windows Server 2022, 23H2 Edition (Server Core installation) | Apr 16, 2026 |
| CVE-2026-32225 | HIGH8.8 | Microsoft:Windows 10 Version 1607; Microsoft:Windows 10 Version 1809; Microsoft:Windows 10 Version 21H2; Microsoft:Windows 10 Version 22H2; Microsoft:Windows 11 Version 23H2; Microsoft:Windows 11 Version 24H2; Microsoft:Windows 11 Version 25H2; Microsoft:Windows 11 version 22H3; Microsoft:Windows 11 version 26H1; Microsoft:Windows Server 2012; Microsoft:Windows Server 2012 (Server Core installation); Microsoft:Windows Server 2012 R2; Microsoft:Windows Server 2012 R2 (Server Core installation); Microsoft:Windows Server 2016; Microsoft:Windows Server 2016 (Server Core installation); Microsoft:Windows Server 2019; Microsoft:Windows Server 2019 (Server Core installation); Microsoft:Windows Server 2022; Microsoft:Windows Server 2022, 23H2 Edition (Server Core installation); Microsoft:Windows Server 2025; Microsoft:Windows Server 2025 (Server Core installation) | Apr 16, 2026 |
| CVE-2026-32203 | HIGH7.5 | Microsoft:.NET 10.0; Microsoft:.NET 8.0; Microsoft:.NET 9.0; Microsoft:Microsoft Visual Studio 2022 version 17.12; Microsoft:Microsoft Visual Studio 2022 version 17.14 | Apr 16, 2026 |
| CVE-2026-26171 | HIGH7.5 | Microsoft:.NET 10.0; Microsoft:.NET 8.0; Microsoft:.NET 9.0 | Apr 16, 2026 |
| CVE-2026-32200 | HIGH7.8 | Microsoft:Microsoft 365 Apps for Enterprise; Microsoft:Microsoft Office 2019; Microsoft:Microsoft Office LTSC 2021; Microsoft:Microsoft Office LTSC 2024; Microsoft:Microsoft PowerPoint 2016 | Apr 16, 2026 |
| CVE-2026-32199 | HIGH7.8 | Microsoft:Microsoft 365 Apps for Enterprise; Microsoft:Microsoft Excel 2016; Microsoft:Microsoft Office 2019; Microsoft:Microsoft Office LTSC 2021; Microsoft:Microsoft Office LTSC 2024; Microsoft:Microsoft Office LTSC for Mac 2021; Microsoft:Microsoft Office LTSC for Mac 2024; Microsoft:Office Online Server | Apr 16, 2026 |
| CVE-2026-32198 | HIGH7.8 | Microsoft:Microsoft 365 Apps for Enterprise; Microsoft:Microsoft Excel 2016; Microsoft:Microsoft Office 2019; Microsoft:Microsoft Office LTSC 2021; Microsoft:Microsoft Office LTSC 2024; Microsoft:Microsoft Office LTSC for Mac 2021; Microsoft:Microsoft Office LTSC for Mac 2024; Microsoft:Office Online Server | Apr 16, 2026 |
| CVE-2026-32197 | HIGH7.8 | Microsoft:Microsoft 365 Apps for Enterprise; Microsoft:Microsoft Excel 2016; Microsoft:Microsoft Office 2019; Microsoft:Microsoft Office LTSC 2021; Microsoft:Microsoft Office LTSC 2024; Microsoft:Microsoft Office LTSC for Mac 2021; Microsoft:Microsoft Office LTSC for Mac 2024; Microsoft:Office Online Server | Apr 16, 2026 |
| CVE-2026-32190 | HIGH8.4 | Microsoft:Microsoft 365 Apps for Enterprise; Microsoft:Microsoft Office 2016; Microsoft:Microsoft Office 2019; Microsoft:Microsoft Office LTSC 2021; Microsoft:Microsoft Office LTSC 2024; Microsoft:Microsoft Office LTSC for Mac 2021; Microsoft:Microsoft Office LTSC for Mac 2024 | Apr 16, 2026 |
| CVE-2026-32171 | HIGH8.8 | Microsoft:Azure Logic Apps | Apr 16, 2026 |
| CVE-2026-32164 | HIGH7.8 | Microsoft:Windows 10 Version 1607; Microsoft:Windows 10 Version 1809; Microsoft:Windows 10 Version 21H2; Microsoft:Windows 10 Version 22H2; Microsoft:Windows 11 Version 23H2; Microsoft:Windows 11 Version 24H2; Microsoft:Windows 11 Version 25H2; Microsoft:Windows 11 version 22H3; Microsoft:Windows 11 version 26H1; Microsoft:Windows Server 2016; Microsoft:Windows Server 2016 (Server Core installation); Microsoft:Windows Server 2019; Microsoft:Windows Server 2019 (Server Core installation); Microsoft:Windows Server 2022; Microsoft:Windows Server 2022, 23H2 Edition (Server Core installation); Microsoft:Windows Server 2025; Microsoft:Windows Server 2025 (Server Core installation) | Apr 16, 2026 |
| CVE-2026-32163 | HIGH7.8 | Microsoft:Windows 10 Version 1809; Microsoft:Windows 10 Version 21H2; Microsoft:Windows 10 Version 22H2; Microsoft:Windows 11 Version 23H2; Microsoft:Windows 11 Version 24H2; Microsoft:Windows 11 Version 25H2; Microsoft:Windows 11 version 22H3; Microsoft:Windows 11 version 26H1; Microsoft:Windows Server 2019; Microsoft:Windows Server 2019 (Server Core installation); Microsoft:Windows Server 2022; Microsoft:Windows Server 2022, 23H2 Edition (Server Core installation); Microsoft:Windows Server 2025; Microsoft:Windows Server 2025 (Server Core installation) | Apr 16, 2026 |
| CVE-2026-32162 | HIGH8.4 | Microsoft:Windows 10 Version 1809; Microsoft:Windows 10 Version 21H2; Microsoft:Windows 10 Version 22H2; Microsoft:Windows 11 Version 23H2; Microsoft:Windows 11 Version 24H2; Microsoft:Windows 11 Version 25H2; Microsoft:Windows 11 version 22H3; Microsoft:Windows 11 version 26H1; Microsoft:Windows Server 2019; Microsoft:Windows Server 2019 (Server Core installation); Microsoft:Windows Server 2022; Microsoft:Windows Server 2022, 23H2 Edition (Server Core installation); Microsoft:Windows Server 2025; Microsoft:Windows Server 2025 (Server Core installation) | Apr 16, 2026 |
Page 1 of 970
CVE® content © MITRE Corporation. Licensed under the CVE Terms of Use. Terms
