The NVD is the U.S. government repository of standards based vulnerability management data represented using the Security Content Automation Protocol (SCAP). This data enables automation of vulnerability management, security measurement, and compliance. The NVD includes databases of security checklist references, security-related software flaws, product names, and impact metrics.
For information on how to cite the NVD, including the database's Digital Object Identifier (DOI), please consult NIST's Public Data Repository.
Legal Disclaimer:
Here is where you can read the NVD legal disclaimer.
-
CVE-2026-5941 - Parsing logic flaws cause non-signature data to be misidentified as valid signatures when processing malformed form field hierarchies, leading to invalid memory writes and program crashes during internal data structure construction.
Published: April 27, 2026; 8:16:24 AM -0400V3.1: 7.1 HIGH
-
CVE-2026-5447 - Heap buffer overflow in CertFromX509 via AuthorityKeyIdentifier size confusion. A heap buffer overflow occurs when converting an X.509 certificate internally due to incorrect size handling of the AuthorityKeyIdentifier extension.
Published: April 09, 2026; 5:16:13 PM -0400V3.1: 7.5 HIGH
-
CVE-2026-5263 - URI nameConstraints from constrained intermediate CAs are parsed but not enforced during certificate chain verification in wolfcrypt/src/asn.c. A compromised or malicious sub-CA could issue leaf certificates with URI SAN entries that violate the n... read CVE-2026-5263
Published: April 09, 2026; 6:16:36 PM -0400V3.1: 6.5 MEDIUM
-
CVE-2026-5942 - Flaws in page lifecycle management allow document structure changes to desynchronize internal component states, causing subsequent operations to access invalidated objects and crash the program.
Published: April 27, 2026; 8:16:24 AM -0400 -
CVE-2026-5264 - Heap buffer overflow in DTLS 1.3 ACK message processing. A remote attacker can send a crafted DTLS 1.3 ACK message that triggers a heap buffer overflow.
Published: April 09, 2026; 6:16:36 PM -0400V3.1: 9.8 CRITICAL
-
CVE-2026-5943 - Document structural anomalies caused inconsistencies between page element relationships and internal index states. When scripts triggered document modifications, object reference validity was not properly maintained, leading to a crash when access... read CVE-2026-5943
Published: April 27, 2026; 8:16:24 AM -0400 -
CVE-2026-7233 - A vulnerability was determined in Artifex MuPDF up to 1.28.0. The impacted element is the function fz_subset_cff_for_gids of the file subset-cff.c of the component CFF Index Handler. This manipulation causes out-of-bounds read. The attack can only... read CVE-2026-7233
Published: April 28, 2026; 3:16:04 AM -0400V3.1: 6.1 MEDIUM
-
CVE-2026-41332 - OpenClaw before 2026.3.28 contains an environment variable sanitization vulnerability where GIT_TEMPLATE_DIR and AWS_CONFIG_FILE are not blocked in the host-env blocklist. Attackers can exploit approved exec requests to redirect git or AWS CLI beh... read CVE-2026-41332
Published: April 23, 2026; 6:16:38 PM -0400V3.1: 5.3 MEDIUM
-
CVE-2026-4958 - A vulnerability has been found in OpenBMB XAgent 1.0.0. This affects the function ReplayServer.on_connect/ReplayServer.send_data of the file XAgentServer/application/websockets/replayer.py of the component WebSocket Endpoint. Such manipulation of ... read CVE-2026-4958
Published: March 27, 2026; 12:16:24 PM -0400V3.1: 6.5 MEDIUM
-
CVE-2026-41339 - OpenClaw before 2026.4.2 exposes configPath and stateDir metadata in Gateway connect success snapshots to non-admin authenticated clients. Non-admin clients can recover host-specific filesystem paths and deployment details, enabling host fingerpri... read CVE-2026-41339
Published: April 23, 2026; 6:16:40 PM -0400V3.1: 4.3 MEDIUM
-
CVE-2026-4957 - A flaw has been found in OpenBMB XAgent 1.0.0. The impacted element is the function FunctionHandler.handle_tool_call of the file XAgent/function_handler.py of the component API Key Handler. This manipulation of the argument api_key causes sensitiv... read CVE-2026-4957
Published: March 27, 2026; 11:17:03 AM -0400V3.1: 2.7 LOW
-
CVE-2026-31612 - In the Linux kernel, the following vulnerability has been resolved: ksmbd: validate EaNameLength in smb2_get_ea() smb2_get_ea() reads ea_req->EaNameLength from the client request and passes it directly to strncmp() as the comparison length witho... read CVE-2026-31612
Published: April 24, 2026; 11:16:40 AM -0400 -
CVE-2026-31611 - In the Linux kernel, the following vulnerability has been resolved: ksmbd: require 3 sub-authorities before reading sub_auth[2] parse_dacl() compares each ACE SID against sid_unix_NFS_mode and on match reads sid.sub_auth[2] as the file mode. If... read CVE-2026-31611
Published: April 24, 2026; 11:16:40 AM -0400 -
CVE-2026-4959 - A vulnerability was found in OpenBMB XAgent 1.0.0. This impacts the function check_user of the file XAgentServer/application/websockets/share.py of the component ShareServer WebSocket Endpoint. Performing a manipulation of the argument interaction... read CVE-2026-4959
Published: March 27, 2026; 12:16:25 PM -0400V3.1: 7.5 HIGH
-
CVE-2026-31610 - In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix mechToken leak when SPNEGO decode fails after token alloc The kernel ASN.1 BER decoder calls action callbacks incrementally as it walks the input. When ksmbd_decode_... read CVE-2026-31610
Published: April 24, 2026; 11:16:40 AM -0400V3.1: 5.5 MEDIUM
-
CVE-2026-31609 - In the Linux kernel, the following vulnerability has been resolved: smb: client: avoid double-free in smbd_free_send_io() after smbd_send_batch_flush() smbd_send_batch_flush() already calls smbd_free_send_io(), so we should not call it again aft... read CVE-2026-31609
Published: April 24, 2026; 11:16:40 AM -0400 -
CVE-2026-35379 - A logic error in the tr utility of uutils coreutils causes the program to incorrectly define the [:graph:] and [:print:] character classes. The implementation mistakenly includes the ASCII space character (0x20) in the [:graph:] class and excludes... read CVE-2026-35379
Published: April 22, 2026; 1:16:42 PM -0400 -
CVE-2026-35380 - A logic error in the cut utility of uutils coreutils causes the program to incorrectly interpret the literal two-byte string '' (two single quotes) as an empty delimiter. The implementation mistakenly maps this string to the NUL character for both... read CVE-2026-35380
Published: April 22, 2026; 1:16:43 PM -0400 -
CVE-2026-41341 - OpenClaw before 2026.3.31 contains a logic error in Discord component interaction routing that misclassifies group direct messages as direct messages in extensions/discord/src/monitor/agent-components-helpers.ts. Attackers can exploit this misclas... read CVE-2026-41341
Published: April 23, 2026; 6:16:40 PM -0400V3.1: 5.4 MEDIUM
-
CVE-2026-41342 - OpenClaw before 2026.3.28 contains an authentication bypass vulnerability in the remote onboarding component that persists unauthenticated discovery endpoints without explicit trust confirmation. Attackers can spoof discovery endpoints to redirect... read CVE-2026-41342
Published: April 23, 2026; 6:16:40 PM -0400V3.1: 8.1 HIGH