| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2026-31543 | crash_dump: don't log dm-crypt key bytes in read_key_from_user_keying | Linux | Linux | - | - | 2026-04-24 14:33:12 | Deep Dive |
| CVE-2026-31542 | x86/platform/uv: Handle deconfigured sockets | Linux | Linux | - | - | 2026-04-24 14:33:11 | Deep Dive |
| CVE-2026-31541 | tracing: Fix trace_marker copy link list updates | Linux | Linux | - | - | 2026-04-24 14:33:11 | Deep Dive |
| CVE-2026-31540 | drm/i915/gt: Check set_default_submission() before deferencing | Linux | Linux | - | - | 2026-04-24 14:33:10 | Deep Dive |
| CVE-2026-31539 | smb: smbdirect: introduce smbdirect_socket.recv_io.credits.available | Linux | Linux | - | - | 2026-04-24 14:30:26 | Deep Dive |
| CVE-2026-31538 | smb: server: make use of smbdirect_socket.recv_io.credits.available | Linux | Linux | - | - | 2026-04-24 14:30:26 | Deep Dive |
| CVE-2026-31537 | smb: server: make use of smbdirect_socket.send_io.bcredits | Linux | Linux | - | - | 2026-04-24 14:30:25 | Deep Dive |
| CVE-2026-31536 | smb: server: let send_done handle a completion without IB_SEND_SIGNALED | Linux | Linux | - | - | 2026-04-24 14:30:24 | Deep Dive |
| CVE-2026-31535 | smb: client: make use of smbdirect_socket.recv_io.credits.available | Linux | Linux | - | - | 2026-04-24 14:30:24 | Deep Dive |
| CVE-2026-25660 | Authentication bypass for certain API calls | Ericsson | CodeChecker | - | - | 2026-04-24 13:10:26 | Deep Dive |
| CVE-2026-21515 | Azure IoT Central Elevation of Privilege Vulnerability | Microsoft | Azure IOT Central | Critical | 9.9 | 2026-04-24 12:51:34 | Deep Dive |
| CVE-2026-38743 | Apache Airflow: Dags endpoint might provide access to otherwise inaccessible entities | Apache Software Foundation | Apache Airflow | - | - | 2026-04-24 12:36:40 | Deep Dive |
| CVE-2026-40690 | Apache Airflow: Assets graph view bypasses DAG level access control displaying unrelated topologies and all DAGs names to unauthorized users | Apache Software Foundation | Apache Airflow | - | - | 2026-04-24 12:35:33 | Deep Dive |
| CVE-2026-5265 | Ovn: ovn: heap over-read in icmp error response generation - security issue | Red Hat | Fast Datapath for RHEL 7 | Medium | 6.5 | 2026-04-24 12:25:07 | Deep Dive |
| CVE-2026-5367 | Ovn: ovn: information disclosure via crafted dhcpv6 packets | Red Hat | Fast Datapath for RHEL 7 | High | 8.6 | 2026-04-24 12:25:05 | Deep Dive |
| CVE-2026-4313 | Stored XSS in AdaptiveGRC | C&F | AdaptiveGRC | - | - | 2026-04-24 11:05:43 | Deep Dive |
| CVE-2026-6043 | Insecure Default Configuration in P4 Server | Perforce | Helix Core Server (P4D) | - | - | 2026-04-24 11:02:51 | Deep Dive |
| CVE-2026-23902 | Apache DolphinScheduler: Users are able to use tenants that are not defined on the platform during workflow execution. | Apache Software Foundation | Apache DolphinScheduler | - | - | 2026-04-24 10:56:18 | Deep Dive |
| CVE-2025-62233 | Apache DolphinScheduler: Deserialization of untrusted data in RPC | Apache Software Foundation | Apache DolphinScheduler | - | - | 2026-04-24 10:54:55 | Deep Dive |
| CVE-2026-41044 | Apache ActiveMQ, Apache ActiveMQ Broker, Apache ActiveMQ All: Authenticated user can perform RCE via DestinationView MBean exposed by Jolokia | Apache Software Foundation | Apache ActiveMQ | - | - | 2026-04-24 10:16:54 | Deep Dive |