| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2026-43320 | drm/amd/display: Fix dsc eDP issue | Linux | Linux | - | - | 2026-05-08 13:26:15 | Deep Dive |
| CVE-2026-43319 | spi: spidev: fix lock inversion between spi_lock and buf_lock | Linux | Linux | 中危 | - | 2026-05-08 13:26:14 | Deep Dive |
| CVE-2026-43318 | drm/amdgpu: fix sync handling in amdgpu_dma_buf_move_notify | Linux | Linux | - | - | 2026-05-08 13:26:14 | Deep Dive |
| CVE-2026-43317 | most: core: fix leak on early registration failure | Linux | Linux | - | - | 2026-05-08 13:26:13 | Deep Dive |
| CVE-2026-43316 | media: solo6x10: Check for out of bounds chip_id | Linux | Linux | - | - | 2026-05-08 13:26:12 | Deep Dive |
| CVE-2025-71302 | drm/panthor: fix for dma-fence safe access rules | Linux | Linux | - | - | 2026-05-08 13:26:11 | Deep Dive |
| CVE-2026-44334 | PraisonAI: Unauthenticated RCE via `tool_override.py` | MervinPraison | PraisonAI | High | 8.4 | 2026-05-08 13:25:33 | Deep Dive |
| CVE-2026-41497 | Incomplete fix for CVE-2026-34935: Command Injection in MervinPraison/PraisonAI | MervinPraison | PraisonAI | Critical | 9.8 | 2026-05-08 13:23:36 | Deep Dive |
| CVE-2026-41496 | PraisonAI: SQL Injection via unvalidated `table_prefix` in 9 conversation store backends (incomplete fix for CVE-2026-40315) | MervinPraison | PraisonAI | High | 8.1 | 2026-05-08 13:19:11 | Deep Dive |
| CVE-2026-44126 | Insecure deserialization | SEPPmail AG | Secure Email Gateway | - | - | 2026-05-08 13:15:52 | Deep Dive |
| CVE-2025-71301 | drm/tests: shmem: Hold reservation lock around vmap/vunmap | Linux | Linux | 中危 | - | 2026-05-08 13:15:22 | Deep Dive |
| CVE-2025-71300 | Revert "arm64: zynqmp: Add an OP-TEE node to the device tree" | Linux | Linux | - | - | 2026-05-08 13:15:21 | Deep Dive |
| CVE-2026-44125 | Missing Authorization in GINAv2 | SEPPmail AG | Secure Email Gateway | - | - | 2026-05-08 13:15:08 | Deep Dive |
| CVE-2026-44129 | Server-side template injection | SEPPmail AG | Secure Email Gateway | - | - | 2026-05-08 13:14:37 | Deep Dive |
| CVE-2026-41493 | yard: Possible arbitrary path traversal and file access via yard server | lsegal | yard | - | - | 2026-05-08 13:13:49 | Deep Dive |
| CVE-2026-44128 | Unauthenticated Remote Code Execution | SEPPmail AG | Secure Email Gateway | - | - | 2026-05-08 13:13:46 | Deep Dive |
| CVE-2026-44127 | Local File Inclusion (LFI) and Arbitrary File Deletion | SEPPmail AG | Secure Email Gateway | - | - | 2026-05-08 13:13:06 | Deep Dive |
| CVE-2026-7864 | Exposure of Sensitive Information to an Unauthorized Actor | SEPPmail AG | Secure Email Gateway | - | - | 2026-05-08 13:12:18 | Deep Dive |
| CVE-2026-43315 | KVM: nSVM: Remove a user-triggerable WARN on nested_svm_load_cr3() succeeding | Linux | Linux | 中危 | - | 2026-05-08 13:11:32 | Deep Dive |
| CVE-2026-43314 | dm: remove fake timeout to avoid leak request | Linux | Linux | 中危 | - | 2026-05-08 13:11:31 | Deep Dive |