Current Month — April 2026 (2881)
| CVE ID | CVSS | Severity | CWE | KEV | EPSS | VAP | Description | Published |
|---|---|---|---|---|---|---|---|---|
| CVE-2026-6388 | 9.1 | CRITICAL | CWE-1220 | — | 6.37 | A flaw was found in ArgoCD Image Updater. This vulnerability allows an attacker,...A flaw was found in ArgoCD Image Updater. This vulnerability allows an attacker, with permissions to create or modify an ImageUpdater resource in a multi-tenant environment, to bypass namespace boundaries. By exploiting insufficient validation, the attacker can trigger unauthorized image updates on applications managed by other tenants. This leads to cross-namespace privilege escalation, impacting application integrity through unauthorized application updates. |
2026-04-15 | |
| CVE-2026-40500 | 6.1 | MEDIUM | CWE-918 | — | 4.27 | ProcessWire CMS version 3.0.255 and prior contain a server-side request forgery ...ProcessWire CMS version 3.0.255 and prior contain a server-side request forgery vulnerability in the admin panel's 'Add Module From URL' feature that allows authenticated administrators to supply arbitrary URLs to the module download parameter, causing the server to issue outbound HTTP requests to attacker-controlled internal or external hosts. Attackers can exploit differentiable error messages returned by the server to perform reliable internal network port scanning, host enumeration across RFC-1918 ranges, and potential access to cloud instance metadata endpoints. |
2026-04-15 | |
| CVE-2026-1711 | 4.8 | MEDIUM | CWE-79 | — | 3.36 | Pega Platform versions 8.1.0 through 25.1.1 are affected by a Stored Cross-Site ...Pega Platform versions 8.1.0 through 25.1.1 are affected by a Stored Cross-Site Scripting vulnerability in a user interface component. Requires a high privileged user with a developer role. |
2026-04-15 | |
| CVE-2026-1564 | 5.1 | MEDIUM | CWE-80 | — | 3.57 | Pega Platform versions 8.1.0 through 25.1.1 are affected by an HTML Injection vu...Pega Platform versions 8.1.0 through 25.1.1 are affected by an HTML Injection vulnerability in a user interface component. Requires a high privileged user with a developer role. |
2026-04-15 | |
| CVE-2026-6398 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This can...Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage. |
2026-04-15 | |
| CVE-2026-40261 | 8.8 | HIGH | CWE-20 | — | 6.16 | Composer is a dependency manager for PHP. Versions 1.0 through 2.2.26 and 2.3 th...Composer is a dependency manager for PHP. Versions 1.0 through 2.2.26 and 2.3 through 2.9.5 contain a command injection vulnerability in the Perforce::syncCodeBase() method, which appends the $sourceReference parameter to a shell command without proper escaping, and additionally in the Perforce::generateP4Command() method as in GHSA-wg36-wvj6-r67p / CVE-2026-40176, which interpolates user-supplied Perforce connection parameters (port, user, client) from the source url field without proper escaping. An attacker can inject arbitrary commands through crafted source reference or source url values containing shell metacharacters, even if Perforce is not installed. Unlike CVE-2026-40176, the source reference and url are provided as part of package metadata, meaning any compromised or malicious Composer repository can serve package metadata declaring perforce as a source type with malicious values. This vulnerability is exploitable when installing or updating dependencies from source, including the default behavior when installing dev-prefixed versions. This issue has been fixed in Composer 2.2.27 (2.2 LTS) and 2.9.6 (mainline). If developers are unable to immediately update, they can avoid installing dependencies from source by using --prefer-dist or the preferred-install: dist config setting, and only use trusted Composer repositories as a workaround. |
2026-04-15 | |
| CVE-2026-40186 | 6.1 | MEDIUM | CWE-79 | — | 4.27 | ApostropheCMS is an open-source Node.js content management system. A regression ...ApostropheCMS is an open-source Node.js content management system. A regression introduced in commit 49d0bb7, included in versions 2.17.1 of the ApostropheCMS-maintained sanitize-html package bypasses allowedTags enforcement for text inside nonTextTagsArray elements (textarea and option). ApostropheCMS version 4.28.0 is affected through its dependency on the vulnerable sanitize-html version. The code at packages/sanitize-html/index.js:569-573 incorrectly assumes that htmlparser2 does not decode entities inside these elements and skips escaping, but htmlparser2 10.x does decode entities before passing text to the ontext callback. As a result, entity-encoded HTML is decoded by the parser and then written directly to the output as literal HTML characters, completely bypassing the allowedTags filter. An attacker can inject arbitrary tags including XSS payloads through any allowed option or textarea element using entity encoding. This affects non-default configurations where option or textarea are included in allowedTags, which is common in form builders and CMS platforms. This issue has been fixed in version 2.17.2 of sanitize-html and 4.29.0 of ApostropheCMS. |
2026-04-15 | |
| CVE-2026-40176 | 7.8 | HIGH | CWE-20 | — | 5.46 | Composer is a dependency manager for PHP. Versions 1.0 through 2.2.26 and 2.3 th...Composer is a dependency manager for PHP. Versions 1.0 through 2.2.26 and 2.3 through 2.9.5 contain a command injection vulnerability in the Perforce::generateP4Command() method, which constructs shell commands by interpolating user-supplied Perforce connection parameters (port, user, client) without proper escaping. An attacker can inject arbitrary commands through these values in a malicious composer.json declaring a Perforce VCS repository, leading to command execution in the context of the user running Composer, even if Perforce is not installed. VCS repositories are only loaded from the root composer.json or the composer config directory, so this cannot be exploited through composer.json files of packages installed as dependencies. Users are at risk if they run Composer commands on untrusted projects with attacker-supplied composer.json files. This issue has been fixed in Composer 2.2.27 (2.2 LTS) and 2.9.6 (mainline). |
2026-04-15 | |
| CVE-2026-40173 | 9.4 | CRITICAL | CWE-200 | — | 6.58 | Dgraph is an open source distributed GraphQL database. Versions 25.3.1 and prior...Dgraph is an open source distributed GraphQL database. Versions 25.3.1 and prior contain an unauthenticated credential disclosure vulnerability where the /debug/pprof/cmdline endpoint is registered on the default mux and reachable without authentication, exposing the full process command line including the admin token configured via the --security "token=..." startup flag. An attacker can retrieve the leaked token and reuse it in the X-Dgraph-AuthToken header to gain unauthorized access to admin-only endpoints such as /admin/config/cache_mb, bypassing the adminAuthHandler token validation. This enables unauthorized privileged administrative access including configuration changes and operational control actions in any deployment where the Alpha HTTP port is reachable by untrusted parties. This issue has been fixed in version 25.3.2. |
2026-04-15 | |
| CVE-2026-22676 | 8.5 | HIGH | CWE-732 | — | 5.95 | Barracuda RMM versions prior to 2025.2.2 contain a privilege escalation vulnerab...Barracuda RMM versions prior to 2025.2.2 contain a privilege escalation vulnerability that allows local attackers to gain SYSTEM-level privileges by exploiting overly permissive filesystem ACLs on the C:\Windows\Automation directory. Attackers can modify existing automation content or place attacker-controlled files in this directory, which are then executed under the NT AUTHORITY\SYSTEM account during routine automation cycles, typically succeeding within the next execution cycle. |
2026-04-15 | |
| CVE-2026-6385 | 6.5 | MEDIUM | CWE-190 | — | 4.55 | A flaw was found in FFmpeg. A remote attacker could exploit this vulnerability b...A flaw was found in FFmpeg. A remote attacker could exploit this vulnerability by providing a specially crafted MPEG-PS/VOB media file containing a malicious DVD subtitle stream. This vulnerability is caused by a signed integer overflow in the DVD subtitle parser's fragment reassembly bounds checks, leading to a heap out-of-bounds write. Successful exploitation can result in a denial of service (DoS) due to an application crash, and potentially lead to arbitrary code execution. |
2026-04-15 | |
| CVE-2026-6384 | 7.3 | HIGH | CWE-120 | — | 5.11 | A flaw was found in gimp. This buffer overflow vulnerability in the GIF image lo...A flaw was found in gimp. This buffer overflow vulnerability in the GIF image loading component's `ReadJeffsImage` function allows an attacker to write beyond an allocated buffer by processing a specially crafted GIF file. This can lead to a denial of service or potentially arbitrary code execution. |
2026-04-15 | |
| CVE-2026-6364 | 0.0 | NONE | CWE-125 | — | 0.00 | Out of bounds read in Skia in Google Chrome prior to 147.0.7727.101 allowed a re...Out of bounds read in Skia in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted file. (Chromium security severity: Medium) |
2026-04-15 | |
| CVE-2026-6363 | 8.8 | HIGH | CWE-843 | — | 6.16 | Type Confusion in V8 in Google Chrome prior to 147.0.7727.101 allowed a remote a...Type Confusion in V8 in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. (Chromium security severity: Medium) |
2026-04-15 | |
| CVE-2026-6362 | 0.0 | NONE | CWE-416 | — | 0.00 | Use after free in Codecs in Google Chrome prior to 147.0.7727.101 allowed a remo...Use after free in Codecs in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to potentially perform out of bounds memory access via a crafted video file. (Chromium security severity: High) |
2026-04-15 | |
| CVE-2026-6361 | 7.2 | HIGH | CWE-122 | — | 5.04 | Heap buffer overflow in PDFium in Google Chrome on Windows prior to 147.0.7727.1...Heap buffer overflow in PDFium in Google Chrome on Windows prior to 147.0.7727.101 allowed a remote attacker who convinced a user to engage in specific UI gestures to execute arbitrary code inside a sandbox via a crafted PDF file. (Chromium security severity: High) |
2026-04-15 | |
| CVE-2026-6360 | 8.8 | HIGH | CWE-416 | — | 6.16 | Use after free in FileSystem in Google Chrome prior to 147.0.7727.101 allowed a ...Use after free in FileSystem in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page. (Chromium security severity: High) |
2026-04-15 | |
| CVE-2026-6359 | 8.8 | HIGH | CWE-416 | — | 6.16 | Use after free in Video in Google Chrome on Windows prior to 147.0.7727.101 allo...Use after free in Video in Google Chrome on Windows prior to 147.0.7727.101 allowed a remote attacker who had compromised the renderer process to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High) |
2026-04-15 | |
| CVE-2026-6358 | 8.8 | HIGH | CWE-416 | — | 6.16 | Use after free in XR in Google Chrome on Android prior to 147.0.7727.101 allowed...Use after free in XR in Google Chrome on Android prior to 147.0.7727.101 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: Critical) |
2026-04-15 | |
| CVE-2026-6319 | 0.0 | NONE | CWE-416 | — | 0.00 | Use after free in Payments in Google Chrome on Android prior to 147.0.7727.101 a...Use after free in Payments in Google Chrome on Android prior to 147.0.7727.101 allowed a remote attacker who convinced a user to engage in specific UI gestures to execute arbitrary code via a crafted HTML page. (Chromium security severity: Medium) |
2026-04-15 | |
| CVE-2026-6318 | 0.0 | NONE | CWE-416 | — | 0.00 | Use after free in Codecs in Google Chrome prior to 147.0.7727.101 allowed a remo...Use after free in Codecs in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Medium) |
2026-04-15 | |
| CVE-2026-6317 | 8.8 | HIGH | CWE-416 | — | 6.16 | Use after free in Cast in Google Chrome prior to 147.0.7727.101 allowed a remote...Use after free in Cast in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High) |
2026-04-15 | |
| CVE-2026-6316 | 8.8 | HIGH | CWE-416 | — | 6.16 | Use after free in Forms in Google Chrome prior to 147.0.7727.101 allowed a remot...Use after free in Forms in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High) |
2026-04-15 | |
| CVE-2026-6315 | 8.8 | HIGH | CWE-416 | — | 6.16 | Use after free in Permissions in Google Chrome on Android prior to 147.0.7727.10...Use after free in Permissions in Google Chrome on Android prior to 147.0.7727.101 allowed a remote attacker who convinced a user to engage in specific UI gestures to execute arbitrary code via a crafted HTML page. (Chromium security severity: High) |
2026-04-15 | |
| CVE-2026-6314 | 8.3 | HIGH | CWE-787 | — | 5.81 | Out of bounds write in GPU in Google Chrome prior to 147.0.7727.101 allowed a re...Out of bounds write in GPU in Google Chrome prior to 147.0.7727.101 allowed a remote attacker who had compromised the GPU process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High) |
2026-04-15 | |
| CVE-2026-6313 | 3.1 | LOW | CWE-284 | — | 2.17 | Insufficient policy enforcement in CORS in Google Chrome prior to 147.0.7727.101...Insufficient policy enforcement in CORS in Google Chrome prior to 147.0.7727.101 allowed a remote attacker who had compromised the renderer process to leak cross-origin data via a crafted HTML page. (Chromium security severity: High) |
2026-04-15 | |
| CVE-2026-6312 | 3.1 | LOW | N/A | — | 2.17 | Insufficient policy enforcement in Passwords in Google Chrome prior to 147.0.772...Insufficient policy enforcement in Passwords in Google Chrome prior to 147.0.7727.101 allowed a remote attacker who had compromised the renderer process to leak cross-origin data via a crafted HTML page. (Chromium security severity: High) |
2026-04-15 | |
| CVE-2026-6311 | 8.3 | HIGH | CWE-457 | — | 5.81 | Uninitialized Use in Accessibility in Google Chrome on Windows prior to 147.0.77...Uninitialized Use in Accessibility in Google Chrome on Windows prior to 147.0.7727.101 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High) |
2026-04-15 | |
| CVE-2026-6310 | 8.3 | HIGH | CWE-416 | — | 5.81 | Use after free in Dawn in Google Chrome prior to 147.0.7727.101 allowed a remote...Use after free in Dawn in Google Chrome prior to 147.0.7727.101 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High) |
2026-04-15 | |
| CVE-2026-6309 | 8.3 | HIGH | CWE-416 | — | 5.81 | Use after free in Viz in Google Chrome prior to 147.0.7727.101 allowed a remote ...Use after free in Viz in Google Chrome prior to 147.0.7727.101 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High) |
2026-04-15 | |
| CVE-2026-6308 | 0.0 | NONE | CWE-125 | — | 0.00 | Out of bounds read in Media in Google Chrome prior to 147.0.7727.101 allowed a r...Out of bounds read in Media in Google Chrome prior to 147.0.7727.101 allowed a remote attacker who convinced a user to engage in specific UI gestures to execute arbitrary code via a crafted HTML page. (Chromium security severity: High) |
2026-04-15 | |
| CVE-2026-6307 | 8.8 | HIGH | CWE-843 | — | 6.16 | Type Confusion in Turbofan in Google Chrome prior to 147.0.7727.101 allowed a re...Type Confusion in Turbofan in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High) |
2026-04-15 | |
| CVE-2026-6306 | 0.0 | NONE | CWE-122 | — | 0.00 | Heap buffer overflow in PDFium in Google Chrome prior to 147.0.7727.101 allowed ...Heap buffer overflow in PDFium in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted PDF file. (Chromium security severity: High) |
2026-04-15 | |
| CVE-2026-6305 | 8.8 | HIGH | CWE-122 | — | 6.16 | Heap buffer overflow in PDFium in Google Chrome prior to 147.0.7727.101 allowed ...Heap buffer overflow in PDFium in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted PDF file. (Chromium security severity: High) |
2026-04-15 | |
| CVE-2026-6304 | 8.3 | HIGH | CWE-416 | — | 5.81 | Use after free in Graphite in Google Chrome prior to 147.0.7727.101 allowed a re...Use after free in Graphite in Google Chrome prior to 147.0.7727.101 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High) |
2026-04-15 | |
| CVE-2026-6303 | 0.0 | NONE | CWE-416 | — | 0.00 | Use after free in Codecs in Google Chrome prior to 147.0.7727.101 allowed a remo...Use after free in Codecs in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High) |
2026-04-15 | |
| CVE-2026-6302 | 8.8 | HIGH | CWE-416 | — | 6.16 | Use after free in Video in Google Chrome prior to 147.0.7727.101 allowed a remot...Use after free in Video in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High) |
2026-04-15 | |
| CVE-2026-6301 | 8.8 | HIGH | CWE-843 | — | 6.16 | Type Confusion in Turbofan in Google Chrome prior to 147.0.7727.101 allowed a re...Type Confusion in Turbofan in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High) |
2026-04-15 | |
| CVE-2026-6300 | 8.8 | HIGH | CWE-416 | — | 6.16 | Use after free in CSS in Google Chrome prior to 147.0.7727.101 allowed a remote ...Use after free in CSS in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High) |
2026-04-15 | |
| CVE-2026-6299 | 8.8 | HIGH | CWE-416 | — | 6.16 | Use after free in Prerender in Google Chrome prior to 147.0.7727.101 allowed a r...Use after free in Prerender in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: Critical) |
2026-04-15 | |
| CVE-2026-6298 | 4.3 | MEDIUM | CWE-122 | — | 3.01 | Heap buffer overflow in Skia in Google Chrome prior to 147.0.7727.101 allowed a ...Heap buffer overflow in Skia in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page. (Chromium security severity: Critical) |
2026-04-15 | |
| CVE-2026-6297 | 8.3 | HIGH | CWE-416 | — | 5.81 | Use after free in Proxy in Google Chrome prior to 147.0.7727.101 allowed an atta...Use after free in Proxy in Google Chrome prior to 147.0.7727.101 allowed an attacker in a privileged network position to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical) |
2026-04-15 | |
| CVE-2026-6296 | 9.6 | CRITICAL | CWE-122 | — | 6.72 | Heap buffer overflow in ANGLE in Google Chrome prior to 147.0.7727.101 allowed a...Heap buffer overflow in ANGLE in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical) |
2026-04-15 | |
| CVE-2026-40919 | 6.1 | MEDIUM | CWE-787 | — | 4.27 | A flaw was found in GIMP. This vulnerability, a buffer overflow in the `file-sea...A flaw was found in GIMP. This vulnerability, a buffer overflow in the `file-seattle-filmworks` plugin, can be exploited when a user opens a specially crafted Seattle Filmworks file. A remote attacker could leverage this to cause a denial of service (DoS), leading to the plugin crashing and potentially impacting the stability of the GIMP application. |
2026-04-15 | |
| CVE-2026-40918 | 5.5 | MEDIUM | CWE-131 | — | 3.85 | A flaw was found in GIMP. Processing a specially crafted PVR image file with lar...A flaw was found in GIMP. Processing a specially crafted PVR image file with large dimensions can lead to a denial of service (DoS). This occurs due to a stack-based buffer overflow and an out-of-bounds read in the PVR image loader, causing the application to crash. Systems that process untrusted PVR image files are affected. |
2026-04-15 | |
| CVE-2026-40917 | 5.0 | MEDIUM | CWE-125 | — | 3.50 | A flaw was found in GIMP. This vulnerability, a heap buffer over-read in the `ic...A flaw was found in GIMP. This vulnerability, a heap buffer over-read in the `icns_slurp()` function, occurs when processing specially crafted ICNS image files. An attacker could provide a malicious ICNS file, potentially leading to application crashes or information disclosure on systems that process such files. |
2026-04-15 | |
| CVE-2026-40916 | 5.0 | MEDIUM | CWE-787 | — | 3.50 | A flaw was found in GIMP. A stack buffer overflow vulnerability in the TIM image...A flaw was found in GIMP. A stack buffer overflow vulnerability in the TIM image loader's 4BPP decoding path allows a local user to cause a Denial of Service (DoS). By opening a specially crafted TIM image file, the application crashes due to an unconditional overflow when writing to a variable-length array. |
2026-04-15 | |
| CVE-2026-40915 | 5.5 | MEDIUM | CWE-190 | — | 3.85 | A flaw was found in GIMP. A remote attacker could exploit an integer overflow vu...A flaw was found in GIMP. A remote attacker could exploit an integer overflow vulnerability in the FITS image loader by providing a specially crafted FITS file. This integer overflow leads to a zero-byte memory allocation, which is then subjected to a heap buffer overflow when processing pixel data. Successful exploitation could result in a denial of service (DoS) or potentially arbitrary code execution. |
2026-04-15 | |
| CVE-2026-39857 | 5.3 | MEDIUM | CWE-200 | — | 3.71 | ApostropheCMS is an open-source Node.js content management system. Versions 4.28...ApostropheCMS is an open-source Node.js content management system. Versions 4.28.0 and prior contain an authorization bypass vulnerability in the choices and counts query parameters of the REST API, where these query builders execute MongoDB distinct() operations that bypass the publicApiProjection restrictions intended to limit which fields are exposed publicly. The choices and counts parameters are processed via applyBuildersSafely before the projection is applied, and MongoDB's distinct operation does not respect projections, returning all distinct values directly. The results are returned in the API response without any filtering against publicApiProjection or removeForbiddenFields. An unauthenticated attacker can extract all distinct field values for any schema field type that has a registered query builder, including string, integer, float, select, boolean, date, slug, and relationship fields. Fields protected with viewPermission are similarly exposed, and the counts variant additionally reveals how many documents have each distinct value. Both the piece-type and page REST APIs are affected. This issue has been fixed in version 4.29.0. |
2026-04-15 | |
| CVE-2026-35569 | 8.7 | HIGH | CWE-79 | — | 6.09 | ApostropheCMS is an open-source Node.js content management system. Versions 4.28...ApostropheCMS is an open-source Node.js content management system. Versions 4.28.0 and prior contain a stored cross-site scripting vulnerability in SEO-related fields (SEO Title and Meta Description), where user-controlled input is rendered without proper output encoding into HTML contexts including <title> tags, <meta> attributes, and JSON-LD structured data. An attacker can inject a payload such as "></title><script>alert(1)</script> to break out of the intended HTML context and execute arbitrary JavaScript in the browser of any authenticated user who views the affected page. This can be leveraged to perform authenticated API requests, access sensitive data such as usernames, email addresses, and roles via internal APIs, and exfiltrate it to an attacker-controlled server. This issue has been fixed in version 4.29.0. |
2026-04-15 | |
| CVE-2026-33889 | 5.4 | MEDIUM | CWE-79 | — | 3.78 | ApostropheCMS is an open-source Node.js content management system. Versions 4.28...ApostropheCMS is an open-source Node.js content management system. Versions 4.28.0 and prior contain a stored cross-site scripting vulnerability in the @apostrophecms/color-field module, where color values prefixed with -- bypass TinyColor validation intended for CSS custom properties, and the launder.string() call performs only type coercion without stripping HTML metacharacters. These unsanitized values are then concatenated directly into <style> tags both in per-widget style elements rendered for all visitors and in the global stylesheet rendered for editors, with the output marked as safe HTML. An editor can inject a value which closes the style tag and executes arbitrary JavaScript in the browser of every visitor to any page containing the affected widget. This enables mass session hijacking, cookie theft, and privilege escalation to administrative control if an admin views draft content. This issue has been fixed in version 4.29.0. |
2026-04-15 | |
| CVE-2026-33888 | 5.3 | MEDIUM | CWE-200 | — | 3.71 | ApostropheCMS is an open-source Node.js content management system. Versions 4.28...ApostropheCMS is an open-source Node.js content management system. Versions 4.28.0 and prior contain an authorization bypass vulnerability in the getRestQuery method of the @apostrophecms/piece-type module, where the method checks whether a MongoDB projection has already been set before applying the admin-configured publicApiProjection. An unauthenticated attacker can supply a project query parameter in the REST API request, which is processed by applyBuildersSafely before the permission check, pre-populating the projection state and causing the publicApiProjection to be skipped entirely. This allows disclosure of any field on publicly queryable documents that the administrator explicitly restricted from the public API, such as internal notes, draft content, or metadata. Exploitation is trivial, requiring only appending query parameters to a public URL with no authentication. This issue has been fixed in version 4.29.0. |
2026-04-15 | |
| CVE-2026-33877 | 3.7 | LOW | CWE-208 | — | 2.59 | ApostropheCMS is an open-source Node.js content management system. Versions 4.28...ApostropheCMS is an open-source Node.js content management system. Versions 4.28.0 and prior contain a timing side-channel vulnerability in the password reset endpoint (/api/v1/@apostrophecms/login/reset-request) that allows unauthenticated username and email enumeration. When a user is not found, the handler returns after a fixed 2-second artificial delay, but when a valid user is found, it performs a MongoDB update and SMTP email send with no equivalent delay normalization, producing measurably different response times. The endpoint also accepts both username and email via an $or query, and has no rate limiting as the existing checkLoginAttempts throttle only applies to the login flow. This enables automated enumeration of valid accounts for use in credential stuffing or targeted phishing. Only instances that have explicitly enabled the passwordReset option are affected, as it defaults to false. This issue has been fixed in version 4.29.0. |
2026-04-15 | |
| CVE-2026-6383 | 5.4 | MEDIUM | CWE-863 | — | 3.78 | A flaw was found in KubeVirt's Role-Based Access Control (RBAC) evaluation logic...A flaw was found in KubeVirt's Role-Based Access Control (RBAC) evaluation logic. The authorization mechanism improperly truncates subresource names, leading to incorrect permission evaluations. This allows authenticated users with specific custom roles to gain unauthorized access to subresources, potentially disclosing sensitive information or performing actions they are not permitted to do. Additionally, legitimate users may be denied access to resources. |
2026-04-15 | |
| CVE-2026-6245 | 5.5 | MEDIUM | CWE-805 | — | 3.85 | A flaw was found in the System Security Services Daemon (SSSD). The pam_passkey_...A flaw was found in the System Security Services Daemon (SSSD). The pam_passkey_child_read_data() function within the PAM passkey responder fails to properly handle raw bytes received from a pipe. Because the data is treated as a NUL-terminated C string without explicit termination, it results in an out-of-bounds read when processed by functions like snprintf(). A local attacker could potentially trigger this vulnerability by initiating a crafted passkey authentication request, causing the SSSD PAM responder to crash, resulting in a local Denial of Service (DoS). |
2026-04-15 | |
| CVE-2026-5189 | 9.2 | CRITICAL | CWE-798 | — | 6.44 | CWE-798: Use of Hard-coded Credentials in Sonatype Nexus Repository Manager vers...CWE-798: Use of Hard-coded Credentials in Sonatype Nexus Repository Manager versions 3.0.0 through 3.70.5 allows an unauthenticated attacker with network access to gain unauthorized read/write access to the internal database and execute arbitrary OS commands as the Nexus process user. Exploitation requires the non-default nexus.orient.binaryListenerEnabled=true configuration to be enabled. |
2026-04-15 | |
| CVE-2026-40256 | 5.0 | MEDIUM | CWE-22 | — | 3.50 | Weblate is a web based localization tool. In versions prior to 5.17, repository-...Weblate is a web based localization tool. In versions prior to 5.17, repository-boundary validation relies on string prefix checks on resolved absolute paths. In multiple code paths, the check uses startswith against the repository root path. This is not path-segment aware and can be bypassed when the external path shares the same string prefix as the repository path (for example, repo and repo_outside). This issue has been fixed in version 5.17. |
2026-04-15 | |
| CVE-2026-39845 | 4.1 | MEDIUM | CWE-918 | — | 2.87 | Weblate is a web based localization tool. In versions prior to 5.17, the webhook...Weblate is a web based localization tool. In versions prior to 5.17, the webhook add-on did not utilize existing SSRF protections. This issue has been fixed in version 5.17. If developers are unable to update immediately, they can disable the webhook add-on as a workaround. |
2026-04-15 | |
| CVE-2026-34632 | 8.2 | HIGH | CWE-427 | — | 5.74 | Adobe Photoshop Installer was affected by an Uncontrolled Search Path Element vu...Adobe Photoshop Installer was affected by an Uncontrolled Search Path Element vulnerability that could have resulted in arbitrary code execution in the context of the current user. A low-privileged local attacker could have exploited this vulnerability by manipulating the search path used by the application to locate critical resources, potentially causing unauthorized code execution. Exploitation of this issue required user interaction in that a user had to be running the installer. |
2026-04-15 | |
| CVE-2026-34393 | 8.8 | HIGH | CWE-269 | — | 6.16 | Weblate is a web based localization tool. In versions prior to 5.17, the user pa...Weblate is a web based localization tool. In versions prior to 5.17, the user patching API endpoint didn't properly limit the scope of edits. This issue has been fixed in version 5.17. |
2026-04-15 | |
| CVE-2026-34244 | 5.0 | MEDIUM | CWE-200 | — | 3.50 | Weblate is a web based localization tool. In versions prior to 5.17, a user with...Weblate is a web based localization tool. In versions prior to 5.17, a user with the project.edit permission (granted by the per-project "Administration" role) can configure machine translation service URLs pointing to arbitrary internal network addresses. During configuration validation, Weblate makes an HTTP request to the attacker-controlled URL and reflects up to 200 characters of the response body back to the user in an error message. This constitutes a Server-Side Request Forgery (SSRF) with partial response read. This issue has been fixed in version 5.17. If developers are unable to immediately upgrade, they can limit available machinery services via WEBLATE_MACHINERY setting. |
2026-04-15 | |
| CVE-2026-34242 | 7.7 | HIGH | CWE-22 | — | 5.39 | Weblate is a web based localization tool. In versions prior to 5.17, the ZIP dow...Weblate is a web based localization tool. In versions prior to 5.17, the ZIP download feature didn't verify downloaded files, potentially following symlinks outside the repository. This issue has been fixed in version 5.17. |
2026-04-15 | |
| CVE-2026-33667 | 7.4 | HIGH | CWE-307 | — | 5.18 | OpenProject is an open-source project management application. In versions prior ...OpenProject is an open-source project management application. In versions prior to 17.3.0, 2FA OTP verification in the confirm_otp action of the two_factor_authentication module has no rate limiting, lockout mechanism, or failed-attempt tracking. The existing brute_force_block_after_failed_logins setting only counts password login failures and does not apply to the 2FA verification stage, and neither the fail_login nor stage_failure methods increment any counter, lock the account, or add any delay. With the default TOTP drift window of ±60 seconds allowing approximately 5 valid codes at any time, an attacker who knows a user's password can brute-force the 6-digit TOTP code at roughly 5-10 attempts per second with an expected completion time of approximately 11 hours. The same vulnerability applies to backup code verification. This effectively allows complete 2FA bypass for any account where the password is known. This issue has been fixed in version 17.3.0. |
2026-04-15 | |
| CVE-2026-33440 | 5.0 | MEDIUM | CWE-918 | — | 3.50 | Weblate is a web based localization tool. In versions prior to 5.17, the ALLOWED...Weblate is a web based localization tool. In versions prior to 5.17, the ALLOWED_ASSET_DOMAINS setting applied only to the first issued requests and didn't restrict possible redirects. This issue has been fixed in version 5.17. |
2026-04-15 | |
| CVE-2026-33435 | 8.0 | HIGH | CWE-23 | — | 5.60 | Weblate is a web based localization tool. In versions prior to 5.17, the project...Weblate is a web based localization tool. In versions prior to 5.17, the project backup didn't filter Git and Mercurial configuration files which could lead to remote code execution under certain circumstances. This issue has been fixed in version 5.17. If developers are unable to update immediately, they can limit the scope of the vulnerability by restricting access to the project backup, as it is only accessible to users who can create projects. |
2026-04-15 | |
| CVE-2026-33220 | 6.8 | MEDIUM | CWE-22 | — | 4.76 | Weblate is a web based localization tool. In versions prior to 5.17, the transla...Weblate is a web based localization tool. In versions prior to 5.17, the translation memory API exposed unintended endpoints, which in turn didn't perform proper access control. This issue has been fixed in version 5.17. If developers are unable to update immediately, they can disable this feature as the CDN add-on is not enabled by default. |
2026-04-15 | |
| CVE-2026-5758 | 6.5 | MEDIUM | N/A | — | 4.55 | JavaScript is vulnerable to prototype pollution in Mafintosh's protocol-buffers-...JavaScript is vulnerable to prototype pollution in Mafintosh's protocol-buffers-schema Version 3.6.0, where an attacker may alter the application logic, bypass security checks, cause a DoS or achieve remote code execution. |
2026-04-15 | |
| CVE-2026-33214 | 4.3 | MEDIUM | CWE-862 | — | 3.01 | Weblate is a web based localization tool. In versions prior to 5.17, the transla...Weblate is a web based localization tool. In versions prior to 5.17, the translation memory API exposed unintended endpoints, which in turn didn't enforce proper access control. This issue has been fixed in version 5.17. If users are unable to update immediately, they can work around this issue by blocking access to /api/memory/ in the HTTP server, which removes access to this feature. |
2026-04-15 | |
| CVE-2026-33212 | 3.1 | LOW | CWE-284 | — | 2.17 | Weblate is a web based localization tool. In versions prior to 5.17, the tasks A...Weblate is a web based localization tool. In versions prior to 5.17, the tasks API didn't verify user access for pending tasks. This could expose logs of in-progress operations to users who don't have access to given scope. The attacker needs to brute-force the random UUID of the task, so exploiting this is unlikely with the default API rate limits. This issue has been fixed in version 5.17. |
2026-04-15 | |
| CVE-2026-32631 | 7.4 | HIGH | CWE-200 | — | 5.18 | Git for Windows is the Windows port of Git. Versions prior to 2.53.0.windows.3 d...Git for Windows is the Windows port of Git. Versions prior to 2.53.0.windows.3 do not have protections that prevent attackers from obtaining a user's NTLM hash. The NTLM hash can be obtained by tricking users into cloning a malicious repository, or checking out a malicious branch, that accesses an attacker-controlled server. By default, NTLM authentication does not need any user interaction. By brute-forcing the NTLMv2 hash (which is expensive, but possible), credentials can be extracted. This issue has been fixed in version 2.53.0.windows.3. |
2026-04-15 | |
| CVE-2026-30993 | 0.0 | NONE | N/A | — | 0.00 | Slah CMS v1.5.0 and below was discovered to contain a remote code execution (RCE...Slah CMS v1.5.0 and below was discovered to contain a remote code execution (RCE) vulnerability in the session() function at config.php. This vulnerability is exploitable via a crafted input. |
2026-04-15 | |
| CVE-2026-6372 | 7.5 | HIGH | CWE-862 | — | 5.25 | Missing Authorization vulnerability in Plisio Accept Cryptocurrencies with Plisi...Missing Authorization vulnerability in Plisio Accept Cryptocurrencies with Plisio allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Accept Cryptocurrencies with Plisio: from n/a through 2.0.5. |
2026-04-15 | |
| CVE-2026-6370 | 5.9 | MEDIUM | CWE-79 | — | 4.13 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in HashThemes Mini Ajax Cart for WooCommerce allows Stored XSS.This issue affects Mini Ajax Cart for WooCommerce: from n/a through 1.3.4. |
2026-04-15 | |
| CVE-2026-30996 | 7.5 | HIGH | CWE-22 | — | 5.25 | An issue in the file handling logic of the component download.php of SAC-NFe v2....An issue in the file handling logic of the component download.php of SAC-NFe v2.0.02 allows attackers to execute a directory traversal and read arbitrary files from the system via a crafted GET request. |
2026-04-15 | |
| CVE-2026-30995 | 8.6 | HIGH | CWE-89 | — | 6.02 | Slah CMS v1.5.0 and below was discovered to contain a SQL injection vulnerabilit...Slah CMS v1.5.0 and below was discovered to contain a SQL injection vulnerability via the id parameter in the vereador_ver.php endpoint. |
2026-04-15 | |
| CVE-2026-30994 | 7.5 | HIGH | CWE-284 | — | 5.25 | Incorrect access control in the config.php component of Slah v1.5.0 and below al...Incorrect access control in the config.php component of Slah v1.5.0 and below allows unauthenticated attackers to access sensitive information, including active session credentials. |
2026-04-15 | |
| CVE-2025-63029 | 7.6 | HIGH | CWE-89 | — | 5.32 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti...Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WC Lovers WCFM Marketplace allows SQL Injection.This issue affects WCFM Marketplace: from n/a through 3.7.1. |
2026-04-15 | |
| CVE-2025-15636 | 6.5 | MEDIUM | CWE-79 | — | 4.55 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Emarket-design YouTube Showcase allows Stored XSS.This issue affects YouTube Showcase: from n/a through 3.5.1. |
2026-04-15 | |
| CVE-2025-15635 | 4.3 | MEDIUM | CWE-352 | — | 3.01 | Cross-Site Request Forgery (CSRF) vulnerability in Zaytech Smart Online Order fo...Cross-Site Request Forgery (CSRF) vulnerability in Zaytech Smart Online Order for Clover allows Cross Site Request Forgery.This issue affects Smart Online Order for Clover: from n/a through 1.6.0. |
2026-04-15 | |
| CVE-2025-15610 | 9.3 | CRITICAL | CWE-502 | — | 6.51 | Deserialization of untrusted data vulnerability in OpenText, Inc RightFax on Win...Deserialization of untrusted data vulnerability in OpenText, Inc RightFax on Windows, 64 bit, 32 bit allows Object Injection.This issue affects RightFax: through 25.4. |
2026-04-15 | |
| CVE-2026-5387 | 9.3 | CRITICAL | CWE-862 | — | 6.51 | The vulnerability, if exploited, could allow an unauthenticated miscreant to per...The vulnerability, if exploited, could allow an unauthenticated miscreant to perform operations intended only for Simulator Instructor or Simulator Developer (Administrator) roles, resulting in privilege escalation with potential for modification of simulation parameters, training configuration, and training records. |
2026-04-15 | |
| CVE-2026-30625 | 0.0 | NONE | N/A | — | 0.00 | Upsonic 0.71.6 contains a remote code execution vulnerability in its MCP server/...Upsonic 0.71.6 contains a remote code execution vulnerability in its MCP server/task creation functionality. The application allows users to define MCP tasks with arbitrary command and args values. Although an allowlist exists, certain allowed commands (npm, npx) accept argument flags that enable execution of arbitrary OS commands. Maliciously crafted MCP tasks may lead to remote code execution with the privileges of the Upsonic process. In version 0.72.0 Upsonic added a warning about using Stdio servers being able to execute commands directly on the machine. |
2026-04-15 | |
| CVE-2026-30624 | 8.6 | HIGH | CWE-77 | — | 6.02 | Agent Zero 0.9.8 contains a remote code execution vulnerability in its External ...Agent Zero 0.9.8 contains a remote code execution vulnerability in its External MCP Servers configuration feature. The application allows users to define MCP servers using a JSON configuration containing arbitrary command and args values. These values are executed by the application when the configuration is applied without sufficient validation or restriction. An attacker may supply a malicious MCP configuration to execute arbitrary operating system commands, potentially resulting in remote code execution with the privileges of the Agent Zero process. |
2026-04-15 | |
| CVE-2026-30617 | 8.6 | HIGH | CWE-77 | — | 6.02 | LangChain-ChatChat 0.3.1 contains a remote code execution vulnerability in its M...LangChain-ChatChat 0.3.1 contains a remote code execution vulnerability in its MCP STDIO server configuration and execution handling. A remote attacker can access the publicly exposed MCP management interface and configure an MCP STDIO server with attacker-controlled commands and arguments. When the MCP server is started and MCP is enabled for agent execution, subsequent agent activity triggers execution of arbitrary commands on the server. Successful exploitation allows arbitrary command execution within the context of the LangChain-ChatChat service. |
2026-04-15 | |
| CVE-2026-30616 | 7.3 | HIGH | CWE-77 | — | 5.11 | Jaaz 1.0.30 contains a remote code execution vulnerability in its MCP STDIO comm...Jaaz 1.0.30 contains a remote code execution vulnerability in its MCP STDIO command execution handling. A remote attacker can send crafted network requests to the network-accessible Jaaz application, causing attacker-controlled commands to be executed on the server. Successful exploitation results in arbitrary command execution within the context of the Jaaz service, potentially allowing full compromise of the affected system. |
2026-04-15 | |
| CVE-2026-30615 | 8.0 | HIGH | CWE-77 | — | 5.60 | A prompt injection vulnerability in Windsurf 1.9544.26 allows remote attackers t...A prompt injection vulnerability in Windsurf 1.9544.26 allows remote attackers to execute arbitrary commands on a victim system. When Windsurf processes attacker-controlled HTML content, malicious instructions can cause unauthorized modification of the local MCP configuration and automatic registration of a malicious MCP STDIO server, resulting in execution of arbitrary commands without further user interaction. Successful exploitation may allow attackers to execute commands on behalf of the user, persist malicious MCP configuration changes, and access sensitive information exposed through the application. |
2026-04-15 | |
| CVE-2026-30461 | 0.0 | NONE | N/A | — | 0.00 | Daylight Studio FuelCMS v1.5.2 was discovered to contain an authenticated remote...Daylight Studio FuelCMS v1.5.2 was discovered to contain an authenticated remote code execution (RCE) vulnerability via the /controllers/Installer.php and the function add_git_submodule. |
2026-04-15 | |
| CVE-2026-20205 | 7.2 | HIGH | CWE-532 | — | 5.04 | In Splunk MCP Server app versions below 1.0.3 , a user who holds a role with acc...In Splunk MCP Server app versions below 1.0.3 , a user who holds a role with access to the Splunk `_internal` index or possesses the high-privilege capability `mcp_tool_admin` could view users session and authorization tokens in clear text.<br><br>The vulnerability would require either local access to the log files or administrative access to internal indexes, which by default only the admin role receives. <br><br>Review roles and capabilities on your instance and restrict internal index access to administrator-level roles. See [Define roles on the Splunk platform with capabilities](https://docs.splunk.com/Documentation/Splunk/latest/Security/Rolesandcapabilities) and [Connecting to MCP Server and Admin settings](https://help.splunk.com/en/splunk-enterprise/mcp-server-for-splunk-platform/connecting-to-mcp-server-and-admin-settings) in the Splunk documentation for more information. |
2026-04-15 | |
| CVE-2026-20204 | 7.1 | HIGH | CWE-377 | — | 4.97 | In Splunk Enterprise versions below 10.2.1, 10.0.5, 9.4.10, and 9.3.11, and Splu...In Splunk Enterprise versions below 10.2.1, 10.0.5, 9.4.10, and 9.3.11, and Splunk Cloud Platform versions below 10.4.2603.0, 10.3.2512.5, 10.2.2510.9, 10.1.2507.19, 10.0.2503.13, and 9.3.2411.127, a low-privileged user that does not hold the `admin` or `power` Splunk roles could potentially perform a Remote Code Execution (RCE) by uploading a malicious file to the `$SPLUNK_HOME/var/run/splunk/apptemp` directory due to improper handling and insufficient isolation of temporary files within the `apptemp` directory. |
2026-04-15 | |
| CVE-2026-20203 | 4.3 | MEDIUM | CWE-284 | — | 3.01 | In Splunk Enterprise versions below 10.2.2, 10.0.5, 9.4.10, and 9.3.11, and Splu...In Splunk Enterprise versions below 10.2.2, 10.0.5, 9.4.10, and 9.3.11, and Splunk Cloud Platform versions below 10.4.2603.0, 10.3.2512.6, 10.2.2510.10, 10.1.2507.19, 10.0.2503.13, and 9.3.2411.127, a low-privileged user that does not hold the `admin` or `power` Splunk roles, has write permission on the app, and does not hold the high-privilege capability `accelerate_datamodel`, could turn on or off Data Model Acceleration due to improper access control. |
2026-04-15 | |
| CVE-2026-20202 | 6.6 | MEDIUM | CWE-176 | — | 4.62 | In Splunk Enterprise versions below 10.2.2, 10.0.5, 9.4.10, and 9.3.11, and Splu...In Splunk Enterprise versions below 10.2.2, 10.0.5, 9.4.10, and 9.3.11, and Splunk Cloud Platform versions below 10.4.2603.0, 10.3.2512.6, 10.2.2510.10, 10.1.2507.20, 10.0.2503.13, and 9.3.2411.127, a user who holds a role that contains the high-privilege capability `edit_user`could create a specially crafted username that includes a null byte or a non-UTF-8 percent-encoded byte due to improper input validation.<br><br>This could lead to inconsistent conversion of usernames into a proper format for storage and account management inconsistencies, such as being unable to edit or delete affected users. |
2026-04-15 | |
| CVE-2025-67841 | 0.0 | NONE | N/A | — | 0.00 | Nordic Semiconductor IronSide SE for nRF54H20 before 23.0.2+17 has an Algorithmi...Nordic Semiconductor IronSide SE for nRF54H20 before 23.0.2+17 has an Algorithmic complexity issue. |
2026-04-15 | |
| CVE-2025-53444 | 4.3 | MEDIUM | CWE-352 | — | 3.01 | Cross-Site Request Forgery (CSRF) vulnerability in DeluxeThemes Userpro allows C...Cross-Site Request Forgery (CSRF) vulnerability in DeluxeThemes Userpro allows Cross Site Request Forgery.This issue affects Userpro: from n/a before 5.1.11. |
2026-04-15 | |
| CVE-2025-12141 | 1.3 | LOW | CWE-200 | — | 0.91 | In Grafana's alerting system, users with edit permissions for a contact point, s...In Grafana's alerting system, users with edit permissions for a contact point, specifically the permissions “alert.notifications:write” or “alert.notifications.receivers:test” that are granted as part of the fixed role "Contact Point Writer", which is part of the basic role Editor - can edit contact points created by other users, modify the endpoint URL to a controlled server. By invoking the test functionality, attackers can capture and extract redacted secure settings, such as authentication credentials for third-party services (e.g., Slack tokens). This leads to unauthorized access and potential compromise of external integrations. |
2026-04-15 | |
| CVE-2026-4667 | 7.3 | HIGH | CWE-250 | — | 5.11 | HP System Optimizer might potentially be vulnerable to escalation of privilege. ...HP System Optimizer might potentially be vulnerable to escalation of privilege. HP is releasing an update to mitigate this potential vulnerability. |
2026-04-15 | |
| CVE-2026-30364 | 7.5 | HIGH | CWE-121 | — | 5.25 | CentSDR commit e40795 was discovered to contain a stack overflow in the "Thread1...CentSDR commit e40795 was discovered to contain a stack overflow in the "Thread1" function. |
2026-04-15 | |
| CVE-2024-53412 | 8.4 | HIGH | CWE-77 | — | 5.88 | Command injection in the connect function in NietThijmen ShoppingCart 0.0.2 allo...Command injection in the connect function in NietThijmen ShoppingCart 0.0.2 allows an attacker to execute arbitrary shell commands and achieve remote code execution via injection of malicious payloads into the Port field |
2026-04-15 | |
| CVE-2026-40784 | 8.1 | HIGH | CWE-639 | 0.0% p4 | 5.67 | Authorization Bypass Through User-Controlled Key vulnerability in Mahmudul Hasan...Authorization Bypass Through User-Controlled Key vulnerability in Mahmudul Hasan Arif FluentBoards fluent-boards allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects FluentBoards: from n/a through <= 1.91.2. |
2026-04-15 | |
| CVE-2026-40764 | 8.1 | HIGH | CWE-352 | 0.0% p0 | 5.67 | Cross-Site Request Forgery (CSRF) vulnerability in Syed Balkhi Contact Form by W...Cross-Site Request Forgery (CSRF) vulnerability in Syed Balkhi Contact Form by WPForms wpforms-lite allows Cross Site Request Forgery.This issue affects Contact Form by WPForms: from n/a through <= 1.10.0.2. |
2026-04-15 | |
| CVE-2026-40745 | 7.6 | HIGH | CWE-89 | 0.0% p5 | 5.32 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti...Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in bdthemes Element Pack Elementor Addons bdthemes-element-pack-lite allows Blind SQL Injection.This issue affects Element Pack Elementor Addons: from n/a through <= 8.4.2. |
2026-04-15 | |
| CVE-2026-40742 | 5.3 | MEDIUM | CWE-862 | 0.0% p4 | 3.71 | Missing Authorization vulnerability in Nelio Software Nelio AB Testing nelio-ab-...Missing Authorization vulnerability in Nelio Software Nelio AB Testing nelio-ab-testing allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Nelio AB Testing: from n/a through <= 8.2.8. |
2026-04-15 | |
| CVE-2026-40737 | 5.3 | MEDIUM | CWE-639 | 0.0% p4 | 3.71 | Authorization Bypass Through User-Controlled Key vulnerability in VillaTheme COM...Authorization Bypass Through User-Controlled Key vulnerability in VillaTheme COMPE compe-woo-compare-products allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects COMPE: from n/a through <= 1.1.4. |
2026-04-15 | |
| CVE-2026-40728 | 4.3 | MEDIUM | CWE-862 | 0.0% p4 | 3.01 | Missing Authorization vulnerability in BlockArt Magazine Blocks magazine-blocks ...Missing Authorization vulnerability in BlockArt Magazine Blocks magazine-blocks allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Magazine Blocks: from n/a through <= 1.8.3. |
2026-04-15 | |
| CVE-2026-39884 | 8.3 | HIGH | CWE-88 | 0.0% p14 | 5.81 | mcp-server-kubernetes is a Model Context Protocol server for Kubernetes cluster ...mcp-server-kubernetes is a Model Context Protocol server for Kubernetes cluster management. Versions 3.4.0 and prior contain an argument injection vulnerability in the port_forward tool in src/tools/port_forward.ts, where a kubectl command is constructed via string concatenation with user-controlled input and then naively split on spaces before being passed to spawn(). Unlike all other tools in the codebase which correctly use array-based argument passing with execFileSync(), port_forward treats every space in user-controlled fields (namespace, resourceType, resourceName, localPort, targetPort) as an argument boundary, allowing an attacker to inject arbitrary kubectl flags. This enables exposure of internal Kubernetes services to the network by injecting --address=0.0.0.0, cross-namespace targeting by injecting additional -n flags, and indirect exploitation via prompt injection against AI agents connected to the MCP server. This issue has been fixed in version 3.5.0. |
2026-04-15 | |
| CVE-2026-40688 | 7.2 | HIGH | CWE-787 | 0.4% p62 | 5.05 | A out-of-bounds write vulnerability in Fortinet FortiWeb 8.0.0 through 8.0.3, Fo...A out-of-bounds write vulnerability in Fortinet FortiWeb 8.0.0 through 8.0.3, FortiWeb 7.6.0 through 7.6.6, FortiWeb 7.4.0 through 7.4.11 may allow attacker to execute unauthorized code or commands via <insert attack vector here> |
2026-04-14 | |
| CVE-2026-39399 | 9.6 | CRITICAL | CWE-20 | 0.3% p49 | 6.73 | NuGet Gallery is a package repository that powers nuget.org. A security vulnerab...NuGet Gallery is a package repository that powers nuget.org. A security vulnerability exists in the NuGetGallery backend job’s handling of .nuspec files within NuGet packages. An attacker can supply a crafted nuspec file with malicious metadata, leading to cross package metadata injection that may result in remote code execution (RCE) and/or arbitrary blob writes due to insufficient input validation. The issue is exploitable via URI fragment injection using unsanitized package identifiers, allowing an attacker to control the resolved blob path. This enables writes to arbitrary blobs within the storage container, not limited to .nupkg files, resulting in potential tampering of existing content. This issue has been patched in commit 0e80f87628349207cdcaf55358491f8a6f1ca276. |
2026-04-14 | |
| CVE-2026-39387 | 7.2 | HIGH | CWE-98 | 0.2% p43 | 5.05 | BoidCMS is an open-source, PHP-based flat-file CMS for building simple websites ...BoidCMS is an open-source, PHP-based flat-file CMS for building simple websites and blogs, using JSON as its database. Versions prior to 2.1.3 are vulnerable to a critical Local File Inclusion (LFI) attack via the tpl parameter, which can lead to Remote Code Execution (RCE).The application fails to sanitize the tpl (template) parameter during page creation and updates. This parameter is passed directly to a require_once() statement without path validation. An authenticated administrator can exploit this by injecting path traversal sequences (../) into the tpl value to escape the intended theme directory and include arbitrary files — specifically, files from the server's media/ directory. When combined with the file upload functionality, this becomes a full RCE chain: an attacker can first upload a file with embedded PHP code (e.g., disguised as image data), then use the path traversal vulnerability to include that file via require_once(), executing the embedded code with web server privileges. This issue has been fixed in version 2.1.3. |
2026-04-14 | |
| CVE-2026-35589 | 8.0 | HIGH | CWE-1385 | 0.0% p5 | 5.60 | nanobot is a personal AI assistant. Versions prior to 0.1.5 contain a Cross-Site...nanobot is a personal AI assistant. Versions prior to 0.1.5 contain a Cross-Site WebSocket Hijacking (CSWSH) vulnerability exists in the bridge's WebSocket server in bridge/src/server.ts, resulting from an incomplete remediation of CVE-2026-2577. The original fix changed the binding from 0.0.0.0 to 127.0.0.1 and added an optional BRIDGE_TOKEN parameter, but token authentication is disabled by default and the server does not validate the Origin header during the WebSocket handshake. Because browsers do not enforce the Same-Origin Policy on WebSockets unless the server explicitly denies cross-origin connections, any website visited by a user running the bridge can establish a WebSocket connection to ws://127.0.0.1:3001/ and gain full access to the bridge API. This allows an attacker to hijack the WhatsApp session, read incoming messages, steal authentication QR codes, and send messages on behalf of the user. This issue has bee fixed in version 0.1.5. |
2026-04-14 | |
| CVE-2026-35034 | 6.5 | MEDIUM | CWE-400 | 0.0% p11 | 4.55 | Jellyfin is an open source self hosted media server. Versions prior to 10.11.7 c...Jellyfin is an open source self hosted media server. Versions prior to 10.11.7 contain a denial of service vulnerability in the SyncPlay group creation endpoint (POST /SyncPlay/New), where an authenticated user can create groups with names of unlimited size due to insufficient input validation. By sending large payloads combined with arbitrary group IDs, an attacker can lock out the endpoint for other clients attempting to join SyncPlay groups and significantly increase the memory usage of the Jellyfin process, potentially leading to an out-of-memory crash. This issue has been fixed in version 10.11.7. |
2026-04-14 | |
| CVE-2026-35033 | 9.3 | CRITICAL | CWE-88 | 0.1% p31 | 6.51 | Jellyfin is an open source self hosted media server. Versions prior to 10.11.7 c...Jellyfin is an open source self hosted media server. Versions prior to 10.11.7 contain an unauthenticated arbitrary file read vulnerability via ffmpeg argument injection through the StreamOptions query parameter parsing mechanism. The ParseStreamOptions method in StreamingHelpers.cs adds any lowercase query parameter to a dictionary without validation, bypassing the RegularExpression attribute on the level controller parameter, and the unsanitized value is concatenated directly into the ffmpeg command line. By injecting a drawtext filter with a textfile argument, an attacker can read arbitrary server files such as /etc/shadow and exfiltrate their contents as text rendered in the video stream response. The vulnerable /Videos/{itemId}/stream endpoint has no Authorize attribute, making this exploitable without authentication, though item GUIDs are pseudorandom and require an authenticated user to obtain. This issue has been fixed in version 10.11.7. |
2026-04-14 | |
| CVE-2026-35032 | 8.6 | HIGH | CWE-73 | 0.0% p11 | 6.02 | Jellyfin is an open source self hosted media server. Versions prior to 10.11.7 c...Jellyfin is an open source self hosted media server. Versions prior to 10.11.7 contain a vulnerability chain in the LiveTV M3U tuner endpoint (POST /LiveTv/TunerHosts), where the tuner URL is not validated, allowing local file read via non-HTTP paths and Server-Side Request Forgery (SSRF) via HTTP URLs. This is exploitable by any authenticated user because the EnableLiveTvManagement permission defaults to true for all new users. An attacker can chain these vulnerabilities by adding an M3U tuner pointing to an attacker-controlled server, serving a crafted M3U with a channel pointing to the Jellyfin database, exfiltrating the database to extract admin session tokens, and escalating to admin privileges. This issue has been fixed in version 10.11.7. If users are unable to upgrade immediately, they can disable Live TV Management privileges for all users. |
2026-04-14 | |
| CVE-2026-35031 | 9.9 | CRITICAL | CWE-20 | 0.2% p47 | 6.94 | Jellyfin is an open source self hosted media server. Versions prior to 10.11.7 c...Jellyfin is an open source self hosted media server. Versions prior to 10.11.7 contain a vulnerability chain in the subtitle upload endpoint (POST /Videos/{itemId}/Subtitles), where the Format field is not validated, allowing path traversal via the file extension and enabling arbitrary file write. This arbitrary file write can be chained into arbitrary file read via .strm files, database extraction, admin privilege escalation, and ultimately remote code execution as root via ld.so.preload. Exploitation requires an administrator account or a user that has been explicitly granted the "Upload Subtitles" permission. This issue has been fixed in version 10.11.7. If users are unable to upgrade immediately, they can grant non-administrator users Subtitle upload permissions to reduce attack surface. |
2026-04-14 | |
| CVE-2026-34457 | 9.1 | CRITICAL | CWE-290 | 0.1% p22 | 6.37 | OAuth2 Proxy is a reverse proxy that provides authentication using OAuth2 provid...OAuth2 Proxy is a reverse proxy that provides authentication using OAuth2 providers. Versions prior to 7.15.2 contain a configuration-dependent authentication bypass in deployments where OAuth2 Proxy is used with an auth_request-style integration (such as nginx auth_request) and either --ping-user-agent is set or --gcp-healthchecks is enabled. In affected configurations, OAuth2 Proxy treats any request with the configured health check User-Agent value as a successful health check regardless of the requested path, allowing an unauthenticated remote attacker to bypass authentication and access protected upstream resources. Deployments that do not use auth_request-style subrequests or that do not enable --ping-user-agent/--gcp-healthchecks are not affected. This issue is fixed in 7.15.2. |
2026-04-14 | |
| CVE-2026-34454 | 3.5 | LOW | CWE-384 | 0.0% p0 | 2.45 | OAuth2 Proxy is a reverse proxy that provides authentication using OAuth2 provid...OAuth2 Proxy is a reverse proxy that provides authentication using OAuth2 providers. A regression introduced in 7.11.0 prevents OAuth2 Proxy from clearing the session cookie when rendering the sign-in page. In deployments that rely on the sign-in page as part of their logout flow, a user may be shown the sign-in page while the existing session cookie remains valid, meaning the browser session is not actually logged out. On shared workstations or devices, a subsequent user could continue to use the previous user's authenticated session. Deployments that use a dedicated logout/sign-out endpoint to terminate sessions are not affected. This issue is fixed in 7.15.2 |
2026-04-14 | |
| CVE-2026-33414 | 4.0 | MEDIUM | CWE-78 | 0.0% p7 | 2.80 | Podman is a tool for managing OCI containers and pods. Versions 4.8.0 through 5....Podman is a tool for managing OCI containers and pods. Versions 4.8.0 through 5.8.1 contain a command injection vulnerability in the HyperV machine backend in pkg/machine/hyperv/stubber.go, where the VM image path is inserted into a PowerShell double-quoted string without sanitization, allowing $() subexpression injection. Because PowerShell evaluates subexpressions inside double-quoted strings before executing the outer command, an attacker who can control the VM image path through a crafted machine name or image directory can execute arbitrary PowerShell commands with the privileges of the Podman process. On typical Windows installations this means SYSTEM-level code execution, and only Windows is affected as the code is exclusive to the HyperV backend. This issue has been patched in version 5.8.2. |
2026-04-14 | |
| CVE-2026-33023 | 7.8 | HIGH | CWE-416 | 0.0% p2 | 5.46 | libsixel is a SIXEL encoder/decoder implementation derived from kmiya's sixel. I...libsixel is a SIXEL encoder/decoder implementation derived from kmiya's sixel. In versions 1.8.7 and prior, when built with the --with-gdk-pixbuf2 option, a use-after-free vulnerability exists in load_with_gdkpixbuf() in loader.c. The cleanup path manually frees the sixel_frame_t object and its internal buffers without consulting the reference count, even though the object was created via the refcounted constructor sixel_frame_new() and exposed to the public callback. A callback that calls sixel_frame_ref(frame) to retain a logically valid reference will hold a dangling pointer after sixel_helper_load_image_file() returns, and any subsequent access to the frame or its fields triggers a use-after-free confirmed by AddressSanitizer. The root cause is a consistency failure between two cleanup strategies in the same codebase: sixel_frame_unref() is used in load_with_builtin() but raw free() is used in load_with_gdkpixbuf(). An attacker supplying a crafted image to any application built against libsixel with gdk-pixbuf2 support can trigger this reliably, potentially leading to information disclosure, memory corruption, or code execution. This issue has been fixed in version 1.8.7-r1. |
2026-04-14 | |
| CVE-2026-33021 | 7.3 | HIGH | CWE-416 | 0.0% p2 | 5.11 | libsixel is a SIXEL encoder/decoder implementation derived from kmiya's sixel. V...libsixel is a SIXEL encoder/decoder implementation derived from kmiya's sixel. Versions 1.8.7 and prior contain a use-after-free vulnerability in sixel_encoder_encode_bytes() because sixel_frame_init() stores the caller-owned pixel buffer pointer directly in frame->pixels without making a defensive copy. When a resize operation is triggered, sixel_frame_convert_to_rgb888() unconditionally frees this caller-owned buffer and replaces it with a new internal allocation, leaving the caller with a dangling pointer. Any subsequent access to the original buffer by the caller constitutes a use-after-free, confirmed by AddressSanitizer. An attacker who controls incoming frames can trigger this bug repeatedly and predictably, resulting in a reliable crash with potential for code execution. This issue has been fixed in version 1.8.7-r1. |
2026-04-14 | |
| CVE-2026-27301 | 5.5 | MEDIUM | CWE-122 | 0.0% p5 | 3.85 | Adobe Framemaker versions 2022.8 and earlier are affected by a Heap-based Buffer...Adobe Framemaker versions 2022.8 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could lead to memory exposure. An attacker could leverage this vulnerability to disclose sensitive information stored in memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
2026-04-14 | |
| CVE-2026-27300 | 5.5 | MEDIUM | CWE-824 | 0.0% p5 | 3.85 | Adobe Framemaker versions 2022.8 and earlier are affected by an Access of Uninit...Adobe Framemaker versions 2022.8 and earlier are affected by an Access of Uninitialized Pointer vulnerability that could lead to memory exposure. An attacker could leverage this vulnerability to disclose sensitive information. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
2026-04-14 | |
| CVE-2026-27299 | 6.3 | MEDIUM | CWE-20 | 0.0% p8 | 4.41 | Adobe Framemaker versions 2022.8 and earlier are affected by an Improper Input V...Adobe Framemaker versions 2022.8 and earlier are affected by an Improper Input Validation vulnerability that could lead to arbitrary file system read. An attacker could leverage this vulnerability to access sensitive files or data on the system. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
2026-04-14 | |
| CVE-2026-27298 | 7.8 | HIGH | CWE-843 | 0.0% p6 | 5.46 | Adobe Framemaker versions 2022.8 and earlier are affected by an Access of Resour...Adobe Framemaker versions 2022.8 and earlier are affected by an Access of Resource Using Incompatible Type ('Type Confusion') vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
2026-04-14 | |
| CVE-2026-27297 | 7.8 | HIGH | CWE-191 | 0.0% p6 | 5.46 | Adobe Framemaker versions 2022.8 and earlier are affected by an Integer Underflo...Adobe Framemaker versions 2022.8 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
2026-04-14 | |
| CVE-2026-27296 | 7.8 | HIGH | CWE-191 | 0.0% p6 | 5.46 | Adobe Framemaker versions 2022.8 and earlier are affected by an Integer Underflo...Adobe Framemaker versions 2022.8 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
2026-04-14 | |
| CVE-2026-27295 | 7.8 | HIGH | CWE-787 | 0.0% p6 | 5.46 | Adobe Framemaker versions 2022.8 and earlier are affected by an out-of-bounds wr...Adobe Framemaker versions 2022.8 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
2026-04-14 | |
| CVE-2026-27294 | 7.8 | HIGH | CWE-125 | 0.0% p6 | 5.46 | Adobe Framemaker versions 2022.8 and earlier are affected by an out-of-bounds re...Adobe Framemaker versions 2022.8 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
2026-04-14 | |
| CVE-2026-27293 | 7.8 | HIGH | CWE-122 | 0.0% p6 | 5.46 | Adobe Framemaker versions 2022.8 and earlier are affected by a Heap-based Buffer...Adobe Framemaker versions 2022.8 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
2026-04-14 | |
| CVE-2026-27292 | 7.8 | HIGH | CWE-416 | 0.0% p9 | 5.46 | Adobe Framemaker versions 2022.8 and earlier are affected by a Use After Free vu...Adobe Framemaker versions 2022.8 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
2026-04-14 | |
| CVE-2026-27290 | 8.6 | HIGH | CWE-426 | 0.0% p6 | 6.02 | Adobe Framemaker versions 2022.8 and earlier are affected by an Untrusted Search...Adobe Framemaker versions 2022.8 and earlier are affected by an Untrusted Search Path vulnerability that might allow attackers to execute arbitrary code in the context of the current user. If the application uses a search path to locate critical resources such as programs, then an attacker could modify that search path to point to a malicious program, which the targeted application would then execute. Exploitation of this issue does not require user interaction. |
2026-04-14 | |
| CVE-2026-40291 | 8.8 | HIGH | CWE-269 | 0.0% p11 | 6.16 | Chamilo LMS is an open-source learning management system. In versions prior to 2...Chamilo LMS is an open-source learning management system. In versions prior to 2.0.0-RC.3, an insecure direct object modification vulnerability in the PUT /api/users/{id} endpoint allows any authenticated user with ROLE_STUDENT to escalate their privileges to ROLE_ADMIN by modifying the roles field on their own user record. The API Platform security expression is_granted('EDIT', object) only verifies record ownership, and the roles field is included in the writable serialization group, enabling any user to set arbitrary roles such as ROLE_ADMIN. Successful exploitation grants full administrative control of the platform, including access to all courses, user data, grades, and administrative settings. This issue has been fixed in version 2.0.0-RC.3. |
2026-04-14 | |
| CVE-2026-39907 | 7.0 | HIGH | CWE-73 | 0.3% p54 | 4.91 | Unisys WebPerfect Image Suite versions 3.0.3960.22810 and 3.0.3960.22604 expose ...Unisys WebPerfect Image Suite versions 3.0.3960.22810 and 3.0.3960.22604 expose an unauthenticated WCF SOAP endpoint on TCP port 1208 that accepts unsanitized file paths in the ReadLicense action's LFName parameter, allowing remote attackers to trigger SMB connections and leak NTLMv2 machine-account hashes. Attackers can submit crafted SOAP requests with UNC paths to force the server to initiate outbound SMB connections, exposing authentication credentials that may be relayed for privilege escalation or lateral movement within the network. |
2026-04-14 | |
| CVE-2026-39906 | 7.0 | HIGH | CWE-441 | 0.2% p38 | 4.91 | Unisys WebPerfect Image Suite versions 3.0.3960.22810 and 3.0.3960.22604 expose ...Unisys WebPerfect Image Suite versions 3.0.3960.22810 and 3.0.3960.22604 expose a deprecated .NET Remoting TCP channel that allows remote unauthenticated attackers to leak NTLMv2 machine-account hashes by supplying a Windows UNC path as a target file argument through object-unmarshalling techniques. Attackers can capture the leaked NTLMv2 hash and relay it to other hosts to achieve privilege escalation or lateral movement depending on network configuration and patch level. |
2026-04-14 | |
| CVE-2026-35196 | 8.8 | HIGH | CWE-78 | 0.1% p30 | 6.16 | Chamilo LMS is an open-source learning management system. In versions prior to 2...Chamilo LMS is an open-source learning management system. In versions prior to 2.0.0-RC.3, an OS Command Injection vulnerability exists in the main/inc/ajax/gradebook.ajax.php endpoint within the export_all_certificates action, where the course code retrieved from the session variable $_SESSION['_cid'] via api_get_course_id() is concatenated directly into a shell_exec() command string without sanitization or escaping using escapeshellarg(). If an attacker can manipulate or poison their session data to inject shell metacharacters into the _cid variable, they can achieve arbitrary command execution on the underlying server. Successful exploitation grants full access to read system files and credentials, alters the application and database, or disrupts server availability. This issue has been fixed in version 2.0.0-RC.3. |
2026-04-14 | |
| CVE-2026-34631 | 7.8 | HIGH | CWE-787 | 0.0% p6 | 5.46 | InCopy versions 20.5.2, 21.2 and earlier are affected by an out-of-bounds write ...InCopy versions 20.5.2, 21.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
2026-04-14 | |
| CVE-2026-34619 | 7.7 | HIGH | CWE-22 | 0.1% p17 | 5.39 | ColdFusion versions 2023.18, 2025.6 and earlier are affected by an Improper Limi...ColdFusion versions 2023.18, 2025.6 and earlier are affected by an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to access unauthorized files or directories outside the intended restrictions. Exploitation of this issue does not require user interaction. |
2026-04-14 | |
| CVE-2026-34602 | 7.1 | HIGH | CWE-639 | 0.0% p7 | 4.97 | Chamilo LMS is an open-source learning management system. In versions prior to 2...Chamilo LMS is an open-source learning management system. In versions prior to 2.0.0-RC.3, the /api/course_rel_users endpoint is vulnerable to Insecure Direct Object Reference (IDOR), allowing an authenticated attacker to modify the user parameter in the request body to enroll any arbitrary user into any course without proper authorization checks. The backend trusts the user-supplied input for the user field and performs no server-side verification that the requester owns the referenced user ID or has permission to act on behalf of other users. This enables unauthorized manipulation of user-course relationships, potentially granting unintended access to course materials, bypassing enrollment controls, and compromising platform integrity. This issue has been fixed in version 2.0.0-RC.3. |
2026-04-14 | |
| CVE-2026-34370 | 6.5 | MEDIUM | CWE-285 | 0.0% p7 | 4.55 | Chamilo LMS is an open-source learning management system. In versions prior to 2...Chamilo LMS is an open-source learning management system. In versions prior to 2.0.0-RC.3, the notebook module contains an Insecure Direct Object Reference (IDOR) vulnerability that allows any authenticated student to read the private course notes of any other user on the platform by manipulating the notebook_id parameter in the editnote action. The application fetches the note content using only the supplied integer ID without verifying that the requesting user owns the note, and the full title and HTML body are rendered in the edit form and returned to the attacker's browser. While ownership checks exist in the write paths (updateNote() and delete_note()), they are entirely absent from the read path (get_note_information()). This issue has been fixed in version 2.0.0-RC.3. |
2026-04-14 | |
| CVE-2026-34213 | 5.4 | MEDIUM | CWE-639 | 0.0% p10 | 3.78 | Docmost is open-source collaborative wiki and documentation software. Starting i...Docmost is open-source collaborative wiki and documentation software. Starting in version 0.3.0 and prior to version 0.71.0, improper authorization in Docmost allows a low-privileged authenticated user to overwrite another page's attachment within the same workspace by supplying a victim `attachmentId` to `POST /api/files/upload`. This is a remote integrity issue requiring no victim interaction. Version 0.71.0 contains a patch. |
2026-04-14 | |
| CVE-2026-34212 | 5.4 | MEDIUM | CWE-79 | 0.0% p8 | 3.78 | Docmost is open-source collaborative wiki and documentation software. In version...Docmost is open-source collaborative wiki and documentation software. In versions prior to 0.71.0, improper neutralization of attachment URLs in Docmost allows a low-privileged authenticated user to store a malicious `javascript:` URL inside an attachment node in page content. When another user views the page and activates the attachment link/icon, attacker-controlled JavaScript executes in the context of the Docmost origin. Version 0.71.0 patches the issue. |
2026-04-14 | |
| CVE-2026-33193 | 4.6 | MEDIUM | CWE-79 | 0.0% p8 | 3.22 | Docmost is open-source collaborative wiki and documentation software. Versions p...Docmost is open-source collaborative wiki and documentation software. Versions prior to 0.70.0 are vulnerable to a stored cross-site scripting (XSS) attack due to improper handling of MIME type spoofing (GHSL-2026-052). An attacker could exploit this flaw to inject malicious scripts, potentially compromising the security of users and data. Version 0.70.0 contains a patch. |
2026-04-14 | |
| CVE-2026-33146 | 4.3 | MEDIUM | CWE-285 | 0.0% p11 | 3.01 | Docmost is open-source collaborative wiki and documentation software. An authori...Docmost is open-source collaborative wiki and documentation software. An authorization bypass vulnerability in versions 0.70.0 through 0.70.2 exposes restricted child page titles and text snippets through the public search endpoint (`POST /api/search/share-search`) for publicly shared content. This flaw allows unauthenticated users to enumerate and retrieve content that should remain hidden from public share viewers, leading to a confidentiality breach. Version 0.70.3 contains a patch. |
2026-04-14 | |
| CVE-2026-33019 | 7.1 | HIGH | CWE-125 | 0.0% p2 | 4.97 | libsixel is a SIXEL encoder/decoder implementation derived from kmiya's sixel. V...libsixel is a SIXEL encoder/decoder implementation derived from kmiya's sixel. Versions 1.8.7 and prior contain an integer overflow leading to an out-of-bounds heap read in the --crop option handling of img2sixel, where positive coordinates up to INT_MAX are accepted without overflow-safe bounds checking. In sixel_encoder_do_clip(), the expression clip_w + clip_x overflows to a large negative value when clip_x is INT_MAX, causing the bounds guard to be skipped entirely, and the unclamped coordinate is passed through sixel_frame_clip() to clip(), which computes a source pointer far beyond the image buffer and passes it to memmove(). An attacker supplying a specially crafted crop argument with any valid image can trigger an out-of-bounds read in the heap, resulting in a reliable crash and potential information disclosure. This issue has been fixed in version 1.8.7-r1. |
2026-04-14 | |
| CVE-2026-33018 | 7.0 | HIGH | CWE-416 | 0.0% p2 | 4.90 | libsixel is a SIXEL encoder/decoder implementation derived from kmiya's sixel. V...libsixel is a SIXEL encoder/decoder implementation derived from kmiya's sixel. Versions 1.8.7 and prior contain a Use-After-Free vulnerability via the load_gif() function in fromgif.c, where a single sixel_frame_t object is reused across all frames of an animated GIF and gif_init_frame() unconditionally frees and reallocates frame->pixels between frames without consulting the object's reference count. Because the public API explicitly provides sixel_frame_ref() to retain a frame and sixel_frame_get_pixels() to access the raw pixel buffer, a callback following this documented usage pattern will hold a dangling pointer after the second frame is decoded, resulting in a heap use-after-free confirmed by ASAN. Any application using sixel_helper_load_image_file() with a multi-frame callback to process user-supplied animated GIFs is affected, with a reliable crash as the minimum impact and potential for code execution. This issue has been fixed in version 1.8.7-r1. |
2026-04-14 | |
| CVE-2026-27308 | 2.4 | LOW | CWE-400 | 0.0% p4 | 1.68 | ColdFusion versions 2023.18, 2025.6 and earlier are affected by an Uncontrolled ...ColdFusion versions 2023.18, 2025.6 and earlier are affected by an Uncontrolled Resource Consumption vulnerability that could lead to application denial-of-service. A high-privileged attacker could exploit this vulnerability and exhaust system resources, reducing application speed. Exploitation of this issue does not require user interaction. |
2026-04-14 | |
| CVE-2026-27307 | 2.4 | LOW | CWE-400 | 0.0% p4 | 1.68 | ColdFusion versions 2023.18, 2025.6 and earlier are affected by an Uncontrolled ...ColdFusion versions 2023.18, 2025.6 and earlier are affected by an Uncontrolled Resource Consumption vulnerability that could lead to application denial-of-service. A high-privileged attacker could exploit this vulnerability and exhaust system resources, reducing application speed. Exploitation of this issue does not require user interaction. |
2026-04-14 | |
| CVE-2026-27306 | 8.4 | HIGH | CWE-20 | 0.0% p13 | 5.88 | ColdFusion versions 2023.18, 2025.6 and earlier are affected by an Improper Inpu...ColdFusion versions 2023.18, 2025.6 and earlier are affected by an Improper Input Validation vulnerability that could result in arbitrary code execution in the context of the current user. Attacker requires elevated privileges. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
2026-04-14 | |
| CVE-2026-27305 | 8.6 | HIGH | CWE-22 | 0.1% p30 | 6.02 | ColdFusion versions 2023.18, 2025.6 and earlier are affected by an Improper Limi...ColdFusion versions 2023.18, 2025.6 and earlier are affected by an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability that could lead to arbitrary file system read. An attacker could exploit this vulnerability to access sensitive files and directories outside the intended access scope. Exploitation of this issue does not require user interaction. |
2026-04-14 | |
| CVE-2026-27304 | 9.3 | CRITICAL | CWE-20 | 0.0% p12 | 6.51 | ColdFusion versions 2023.18, 2025.6 and earlier are affected by an Improper Inpu...ColdFusion versions 2023.18, 2025.6 and earlier are affected by an Improper Input Validation vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue does not require user interaction. |
2026-04-14 | |
| CVE-2026-27282 | 7.5 | HIGH | CWE-20 | 0.2% p43 | 5.26 | ColdFusion versions 2023.18, 2025.6 and earlier are affected by an Improper Inpu...ColdFusion versions 2023.18, 2025.6 and earlier are affected by an Improper Input Validation vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized access. Exploitation of this issue requires user interaction. |
2026-04-14 | |
| CVE-2025-15565 | 5.3 | MEDIUM | CWE-862 | 0.0% p11 | 3.71 | The Nexi XPay plugin for WordPress is vulnerable to unauthorized modification of...The Nexi XPay plugin for WordPress is vulnerable to unauthorized modification of data due to missing authorization checks on the redirect function in all versions up to, and including, 8.3.0. This makes it possible for unauthenticated attackers to mark pending WooCommerce orders as paid/completed. |
2026-04-14 | |
| CVE-2026-34161 | 5.1 | MEDIUM | CWE-79 | 0.0% p14 | 3.57 | Chamilo LMS is an open-source learning management system. In versions prior to 2...Chamilo LMS is an open-source learning management system. In versions prior to 2.0.0-RC.3, a Stored Cross-Site Scripting (XSS) vulnerability exists in the social post attachment upload functionality, where an authenticated user can upload a malicious HTML file containing JavaScript via the /api/social_post_attachments endpoint. The uploaded file is served back from the application at the generated contentUrl without sanitization, content type restrictions, or a Content-Disposition: attachment header, causing the JavaScript to execute in the browser within the application's origin. Because the payload is stored server-side and runs in the trusted origin, an attacker can perform session hijacking, account takeover, privilege escalation (if an admin views the link), and arbitrary actions on behalf of the victim. This issue has been fixed in version 2.0.0-RC.3. |
2026-04-14 | |
| CVE-2026-34160 | 8.6 | HIGH | CWE-306 | 0.1% p15 | 6.02 | Chamilo LMS is an open-source learning management system. In versions prior to 2...Chamilo LMS is an open-source learning management system. In versions prior to 2.0.0-RC.3, the PENS (Package Exchange Notification Services) plugin endpoint at public/plugin/Pens/pens.php is accessible without authentication and accepts a user-controlled package-url parameter that the server fetches using curl without filtering private or internal IP addresses, enabling unauthenticated Server-Side Request Forgery (SSRF). An attacker can exploit this to probe internal network services, access cloud metadata endpoints (such as 169.254.169.254) to steal IAM credentials and sensitive instance metadata, or trigger state-changing operations on internal services via the receipt and alerts callback parameters. No authentication is required to exploit either SSRF vector, significantly increasing the attack surface. This issue has been fixed in version 2.0.0-RC.3. |
2026-04-14 | |
| CVE-2026-33715 | 7.2 | HIGH | CWE-306 | 0.1% p17 | 5.04 | Chamilo LMS is an open-source learning management system. In version 2.0-RC.2, t...Chamilo LMS is an open-source learning management system. In version 2.0-RC.2, the file public/main/inc/ajax/install.ajax.php is accessible without authentication on fully installed instances because, unlike other AJAX endpoints, it does not include the global.inc.php file that performs authentication and installation-completed checks. Its test_mailer action accepts an arbitrary Symfony Mailer DSN string from POST data and uses it to connect to an attacker-specified SMTP server, enabling Server-Side Request Forgery (SSRF) into internal networks via the SMTP protocol. An unauthenticated attacker can also abuse this to weaponize the Chamilo server as an open email relay for phishing and spam campaigns, with emails appearing to originate from the server's IP address. Additionally, error responses from failed SMTP connections may disclose information about internal network topology and running services. This issue has been fixed in version 2.0.0-RC.3. |
2026-04-14 | |
| CVE-2026-33714 | 7.1 | HIGH | CWE-89 | 0.0% p8 | 4.97 | Chamilo is an open-source learning management system (LMS). Version 2.0.0-RC.2 c...Chamilo is an open-source learning management system (LMS). Version 2.0.0-RC.2 contains a SQL Injection vulnerability in the statistics AJAX endpoint, which is an incomplete fix for CVE-2026-30881. While CVE-2026-30881 was patched by applying Security::remove_XSS() to the date_start and date_end parameters in the get_user_registration_by_month action, the same parameters remain unsanitized in the users_active action within the same file (public/main/inc/ajax/statistics.ajax.php), where they are directly interpolated into a SQL query. An authenticated admin can exploit this to perform time-based blind SQL injection, enabling extraction of arbitrary data from the database. This issue has been fixed in version 2.0.0. |
2026-04-14 | |
| CVE-2026-27287 | 7.8 | HIGH | CWE-125 | 0.0% p1 | 5.46 | InCopy versions 20.5.2, 21.2 and earlier are affected by an out-of-bounds read v...InCopy versions 20.5.2, 21.2 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
2026-04-14 | |
| CVE-2026-25133 | 4.8 | MEDIUM | CWE-79 | 0.0% p1 | 3.36 | October is a Content Management System (CMS) and web platform. Versions prior to...October is a Content Management System (CMS) and web platform. Versions prior to 3.7.14 and 4.1.10 contain a stored cross-site scripting (XSS) vulnerability in the SVG sanitization logic. The regex pattern used to strip event handler attributes (such as onclick or onload) could be bypassed using a crafted payload that exploits how the pattern matches attribute boundaries, allowing malicious SVG files to be uploaded through the Media Manager with embedded JavaScript. Exploitation could lead to privilege escalation if a superuser views or embeds the malicious SVG, and requires authenticated backend access with media upload permissions. The SVG must be viewed or embedded in a page for the payload to trigger. This issue has been fixed in versions 3.7.14 and 4.1.10. |
2026-04-14 | |
| CVE-2026-25125 | 4.9 | MEDIUM | CWE-94 | 0.0% p0 | 3.43 | October is a Content Management System (CMS) and web platform. Versions prior to...October is a Content Management System (CMS) and web platform. Versions prior to 3.7.14 and 4.1.10 contain a server-side information disclosure vulnerability in the INI settings parser. Because PHP's parse_ini_string() function supports ${} syntax for environment variable interpolation, attackers with Editor access could inject patterns such as ${APP_KEY} or ${DB_PASSWORD} into CMS page settings fields, causing sensitive environment variables to be resolved, stored in the template, and returned to the attacker when the page was reopened. This could enable exfiltration of credentials and secrets (database passwords, AWS keys, application keys), potentially leading to further attacks such as database access or cookie forgery. The vulnerability is only relevant when cms.safe_mode is enabled, as direct PHP injection is already possible otherwise. This issue has been fixed in versions 3.7.14 and 4.1.10. If users are unable to immediately upgrade, they can workaround this issue by restricting Editor tool access to fully trusted administrators only, and ensuring database and cloud service credentials are not accessible from the web server's network. |
2026-04-14 | |
| CVE-2026-24893 | 8.8 | HIGH | CWE-20 | 0.3% p51 | 6.17 | openITCOCKPIT is an open source monitoring tool built for different monitoring e...openITCOCKPIT is an open source monitoring tool built for different monitoring engines. openITCOCKPIT Community Edition prior to version 5.5.2 contains a command injection vulnerability that allows an authenticated user with permission to add or modify hosts to execute arbitrary OS commands on the monitoring backend. The vulnerability arises because user-controlled host attributes (specifically the host address) are expanded into monitoring command templates without validation, escaping, or quoting. These templates are later executed by the monitoring engine (Nagios/Icinga) via a shell, resulting in remote code execution. Version 5.5.2 patches the issue. |
2026-04-14 | |
| CVE-2026-40683 | 7.7 | HIGH | CWE-843 | 0.0% p3 | 5.39 | In OpenStack Keystone before 28.0.1, the LDAP identity backend does not convert ...In OpenStack Keystone before 28.0.1, the LDAP identity backend does not convert the user enabled attribute to a boolean when the user_enabled_invert configuration option is False (the default). The _ldap_res_to_model method in the UserApi class only performed string-to-boolean conversion when user_enabled_invert was True. When False, the raw string value from LDAP (e.g., "FALSE") was used directly. Since non-empty strings are truthy in Python, users marked as disabled in LDAP were treated as enabled by Keystone, allowing them to authenticate and perform actions. All deployments using the LDAP identity backend without user_enabled_invert=True or user_enabled_emulation are affected. |
2026-04-14 | |
| CVE-2026-34630 | 7.8 | HIGH | CWE-122 | 0.0% p6 | 5.46 | Bridge versions 16.0.2, 15.1.4 and earlier are affected by a Heap-based Buffer O...Bridge versions 16.0.2, 15.1.4 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
2026-04-14 | |
| CVE-2026-34618 | 7.8 | HIGH | CWE-787 | 0.0% p6 | 5.46 | Illustrator versions 30.2, 29.8.5 and earlier are affected by an out-of-bounds w...Illustrator versions 30.2, 29.8.5 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
2026-04-14 | |
| CVE-2026-27313 | 7.8 | HIGH | CWE-122 | 0.0% p6 | 5.46 | Bridge versions 16.0.2, 15.1.4 and earlier are affected by a Heap-based Buffer O...Bridge versions 16.0.2, 15.1.4 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
2026-04-14 | |
| CVE-2026-27312 | 7.8 | HIGH | CWE-122 | 0.0% p0 | 5.46 | Bridge versions 16.0.2, 15.1.4 and earlier are affected by a Heap-based Buffer O...Bridge versions 16.0.2, 15.1.4 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
2026-04-14 | |
| CVE-2026-27311 | 7.8 | HIGH | CWE-122 | 0.0% p0 | 5.46 | Bridge versions 16.0.2, 15.1.4 and earlier are affected by a Heap-based Buffer O...Bridge versions 16.0.2, 15.1.4 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
2026-04-14 | |
| CVE-2026-27310 | 7.8 | HIGH | CWE-122 | 0.0% p0 | 5.46 | Bridge versions 16.0.2, 15.1.4 and earlier are affected by a Heap-based Buffer O...Bridge versions 16.0.2, 15.1.4 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
2026-04-14 | |
| CVE-2026-27289 | 7.8 | HIGH | CWE-125 | 0.0% p6 | 5.46 | Photoshop Desktop versions 27.4 and earlier are affected by an out-of-bounds rea...Photoshop Desktop versions 27.4 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
2026-04-14 | |
| CVE-2026-27222 | 5.5 | MEDIUM | CWE-369 | 0.0% p4 | 3.85 | Bridge versions 16.0.2, 15.1.4 and earlier are affected by a Divide By Zero vuln...Bridge versions 16.0.2, 15.1.4 and earlier are affected by a Divide By Zero vulnerability that could lead to application denial-of-service. An attacker could exploit this vulnerability to crash the application or render it unresponsive. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
2026-04-14 | |
| CVE-2026-34625 | 5.4 | MEDIUM | CWE-79 | 0.0% p8 | 3.78 | Adobe Experience Manager versions 6.5.24, FP11.7 and earlier are affected by a D...Adobe Experience Manager versions 6.5.24, FP11.7 and earlier are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability. An attacker could exploit this issue by manipulating the DOM environment to execute malicious JavaScript within the context of the victim's browser. Exploitation of this issue requires user interaction in that a victim must visit a crafted webpage. |
2026-04-14 | |
| CVE-2026-34624 | 5.4 | MEDIUM | CWE-79 | 0.0% p8 | 3.78 | Adobe Experience Manager versions 6.5.24, FP11.7 and earlier are affected by a D...Adobe Experience Manager versions 6.5.24, FP11.7 and earlier are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability. An attacker could exploit this issue by manipulating the DOM environment to execute malicious JavaScript within the context of the victim's browser. Exploitation of this issue requires user interaction in that a victim must visit a crafted webpage. |
2026-04-14 | |
| CVE-2026-34623 | 5.4 | MEDIUM | CWE-79 | 0.0% p8 | 3.78 | Adobe Experience Manager versions 6.5.24, FP11.7 and earlier are affected by a D...Adobe Experience Manager versions 6.5.24, FP11.7 and earlier are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability. An attacker could exploit this issue by manipulating the DOM environment to execute malicious JavaScript within the context of the victim's browser. Exploitation of this issue requires user interaction in that a victim must visit a specially crafted web page. |
2026-04-14 | |
| CVE-2026-5756 | 0.0 | NONE | N/A | 0.0% p7 | 0.00 | Unauthenticated Configuration File Modification Vulnerability in DRC Central Off...Unauthenticated Configuration File Modification Vulnerability in DRC Central Office Services (COS) allows an attacker to modify the server's configuration file, potentially leading to mass data exfiltration, malicious traffic interception, or disruption of testing services. |
2026-04-14 | |
| CVE-2026-5754 | 0.0 | NONE | N/A | 0.0% p8 | 0.00 | Reflected Cross-Site Scripting (XSS) Vulnerability in Radware Alteon 34.5.4.0 vA...Reflected Cross-Site Scripting (XSS) Vulnerability in Radware Alteon 34.5.4.0 vADC load-balancer allows an attacker to inject malicious scripts into the website, potentially leading to unauthorized actions, data theft, or other malicious activities. |
2026-04-14 | |
| CVE-2026-5752 | 9.3 | CRITICAL | N/A | 0.0% p5 | 6.51 | Sandbox Escape Vulnerability in Terrarium allows arbitrary code execution with r...Sandbox Escape Vulnerability in Terrarium allows arbitrary code execution with root privileges on a host process via JavaScript prototype chain traversal. |
2026-04-14 | |
| CVE-2026-34629 | 7.8 | HIGH | CWE-122 | 0.0% p6 | 5.46 | InDesign Desktop versions 20.5.2, 21.2 and earlier are affected by a Heap-based ...InDesign Desktop versions 20.5.2, 21.2 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
2026-04-14 | |
| CVE-2026-34628 | 7.8 | HIGH | CWE-122 | 0.0% p6 | 5.46 | InDesign Desktop versions 20.5.2, 21.2 and earlier are affected by a Heap-based ...InDesign Desktop versions 20.5.2, 21.2 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
2026-04-14 | |
| CVE-2026-34627 | 7.8 | HIGH | CWE-122 | 0.0% p6 | 5.46 | InDesign Desktop versions 20.5.2, 21.2 and earlier are affected by a Heap-based ...InDesign Desktop versions 20.5.2, 21.2 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
2026-04-14 | |
| CVE-2026-34617 | 8.7 | HIGH | CWE-79 | 0.0% p12 | 6.09 | Adobe Connect versions 2025.3, 12.10 and earlier are affected by a Cross-Site Sc...Adobe Connect versions 2025.3, 12.10 and earlier are affected by a Cross-Site Scripting (XSS) vulnerability that could result in privilege escalation. A low-privileged attacker could exploit this vulnerability to inject malicious scripts into a web page, potentially gaining elevated access or control over the victim's account or session. Exploitation of this issue requires user interaction in that a victim must visit a maliciously crafted URL or interact with a compromised web page. Scope is changed. |
2026-04-14 | |
| CVE-2026-34615 | 9.3 | CRITICAL | CWE-502 | 1.4% p80 | 6.55 | Adobe Connect versions 2025.3, 12.10 and earlier are affected by a Deserializati...Adobe Connect versions 2025.3, 12.10 and earlier are affected by a Deserialization of Untrusted Data vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue does not require user interaction. Scope is changed. |
2026-04-14 | |
| CVE-2026-34614 | 6.1 | MEDIUM | CWE-79 | 0.1% p21 | 4.27 | Adobe Connect versions 2025.3, 12.10 and earlier are affected by a reflected Cro...Adobe Connect versions 2025.3, 12.10 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser. Scope is changed. |
2026-04-14 | |
| CVE-2026-33829 | 4.3 | MEDIUM | CWE-200 | 0.1% p19 | 3.01 | Exposure of sensitive information to an unauthorized actor in Windows Snipping T...Exposure of sensitive information to an unauthorized actor in Windows Snipping Tool allows an unauthorized attacker to perform spoofing over a network. |
2026-04-14 | |
| CVE-2026-33827 | 8.1 | HIGH | CWE-362 | 0.1% p17 | 5.67 | Concurrent execution using shared resource with improper synchronization ('race ...Concurrent execution using shared resource with improper synchronization ('race condition') in Windows TCP/IP allows an unauthorized attacker to execute code over a network. |
2026-04-14 | |
| CVE-2026-33826 | 8.0 | HIGH | CWE-20 | 0.4% p58 | 5.61 | Improper input validation in Windows Active Directory allows an authorized attac...Improper input validation in Windows Active Directory allows an authorized attacker to execute code over an adjacent network. |
2026-04-14 | |
| CVE-2026-33825 | 7.8 | HIGH | CWE-1220 | 0.0% p12 | 5.46 | Insufficient granularity of access control in Microsoft Defender allows an autho...Insufficient granularity of access control in Microsoft Defender allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-33824 | 9.8 | CRITICAL | CWE-415 | 0.1% p20 | 6.86 | Double free in Windows IKE Extension allows an unauthorized attacker to execute ...Double free in Windows IKE Extension allows an unauthorized attacker to execute code over a network. |
2026-04-14 | |
| CVE-2026-33822 | 6.1 | MEDIUM | CWE-125 | 0.0% p14 | 4.27 | Out-of-bounds read in Microsoft Office Word allows an unauthorized attacker to d...Out-of-bounds read in Microsoft Office Word allows an unauthorized attacker to disclose information locally. |
2026-04-14 | |
| CVE-2026-33120 | 8.8 | HIGH | CWE-822 | 0.1% p19 | 6.16 | Untrusted pointer dereference in SQL Server allows an authorized attacker to exe...Untrusted pointer dereference in SQL Server allows an authorized attacker to execute code over a network. |
2026-04-14 | |
| CVE-2026-33116 | 7.5 | HIGH | CWE-20 | 0.9% p74 | 5.28 | Loop with unreachable exit condition ('infinite loop') in .NET, .NET Framework, ...Loop with unreachable exit condition ('infinite loop') in .NET, .NET Framework, Visual Studio allows an unauthorized attacker to deny service over a network. |
2026-04-14 | |
| CVE-2026-33115 | 8.4 | HIGH | CWE-416 | 0.0% p13 | 5.88 | Use after free in Microsoft Office Word allows an unauthorized attacker to execu...Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally. |
2026-04-14 | |
| CVE-2026-33114 | 8.4 | HIGH | CWE-822 | 0.0% p13 | 5.88 | Untrusted pointer dereference in Microsoft Office Word allows an unauthorized at...Untrusted pointer dereference in Microsoft Office Word allows an unauthorized attacker to execute code locally. |
2026-04-14 | |
| CVE-2026-33104 | 7.0 | HIGH | CWE-362 | 0.0% p10 | 4.90 | Concurrent execution using shared resource with improper synchronization ('race ...Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Win32K - GRFX allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-33103 | 5.5 | MEDIUM | CWE-284 | 0.0% p10 | 3.85 | Improper access control in Microsoft Dynamics 365 (on-premises) allows an author...Improper access control in Microsoft Dynamics 365 (on-premises) allows an authorized attacker to disclose information locally. |
2026-04-14 | |
| CVE-2026-33101 | 7.8 | HIGH | CWE-416 | 0.0% p13 | 5.46 | Use after free in Windows Print Spooler Components allows an authorized attacker...Use after free in Windows Print Spooler Components allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-33100 | 7.0 | HIGH | CWE-416 | 0.0% p12 | 4.90 | Use after free in Windows Ancillary Function Driver for WinSock allows an author...Use after free in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-33099 | 7.0 | HIGH | CWE-416 | 0.0% p12 | 4.90 | Use after free in Windows Ancillary Function Driver for WinSock allows an author...Use after free in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-33098 | 7.8 | HIGH | CWE-416 | 0.0% p13 | 5.46 | Use after free in Windows Container Isolation FS Filter Driver allows an authori...Use after free in Windows Container Isolation FS Filter Driver allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-33096 | 7.5 | HIGH | CWE-125 | 0.1% p22 | 5.25 | Out-of-bounds read in Windows HTTP.sys allows an unauthorized attacker to deny s...Out-of-bounds read in Windows HTTP.sys allows an unauthorized attacker to deny service over a network. |
2026-04-14 | |
| CVE-2026-33095 | 7.8 | HIGH | CWE-416 | 0.1% p18 | 5.46 | Use after free in Microsoft Office Word allows an unauthorized attacker to execu...Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally. |
2026-04-14 | |
| CVE-2026-32226 | 5.9 | MEDIUM | CWE-362 | 0.1% p21 | 4.13 | Concurrent execution using shared resource with improper synchronization ('race ...Concurrent execution using shared resource with improper synchronization ('race condition') in .NET Framework allows an unauthorized attacker to deny service over a network. |
2026-04-14 | |
| CVE-2026-32225 | 8.8 | HIGH | CWE-693 | 0.1% p22 | 6.16 | Protection mechanism failure in Windows Shell allows an unauthorized attacker to...Protection mechanism failure in Windows Shell allows an unauthorized attacker to bypass a security feature over a network. |
2026-04-14 | |
| CVE-2026-32224 | 7.0 | HIGH | CWE-416 | 0.0% p12 | 4.90 | Use after free in Windows Server Update Service allows an authorized attacker to...Use after free in Windows Server Update Service allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-32223 | 6.8 | MEDIUM | CWE-122 | 0.1% p18 | 4.76 | Heap-based buffer overflow in Windows USB Print Driver allows an unauthorized at...Heap-based buffer overflow in Windows USB Print Driver allows an unauthorized attacker to elevate privileges with a physical attack. |
2026-04-14 | |
| CVE-2026-32222 | 7.8 | HIGH | CWE-822 | 0.0% p13 | 5.46 | Untrusted pointer dereference in Windows Win32K - ICOMP allows an authorized att...Untrusted pointer dereference in Windows Win32K - ICOMP allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-32221 | 8.4 | HIGH | CWE-122 | 0.0% p13 | 5.88 | Heap-based buffer overflow in Microsoft Graphics Component allows an unauthorize...Heap-based buffer overflow in Microsoft Graphics Component allows an unauthorized attacker to execute code locally. |
2026-04-14 | |
| CVE-2026-32220 | 4.4 | MEDIUM | CWE-284 | 0.0% p13 | 3.08 | Improper access control in Windows Virtualization-Based Security (VBS) Enclave a...Improper access control in Windows Virtualization-Based Security (VBS) Enclave allows an authorized attacker to bypass a security feature locally. |
2026-04-14 | |
| CVE-2026-32219 | 7.0 | HIGH | CWE-362 | 0.0% p10 | 4.90 | Double free in Microsoft Brokering File System allows an authorized attacker to ...Double free in Microsoft Brokering File System allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-32218 | 5.5 | MEDIUM | CWE-532 | 0.1% p16 | 3.85 | Insertion of sensitive information into log file in Windows Kernel allows an aut...Insertion of sensitive information into log file in Windows Kernel allows an authorized attacker to disclose information locally. |
2026-04-14 | |
| CVE-2026-32217 | 5.5 | MEDIUM | CWE-532 | 0.1% p16 | 3.85 | Insertion of sensitive information into log file in Windows Kernel allows an aut...Insertion of sensitive information into log file in Windows Kernel allows an authorized attacker to disclose information locally. |
2026-04-14 | |
| CVE-2026-32216 | 5.5 | MEDIUM | CWE-476 | 0.0% p11 | 3.85 | Null pointer dereference in Windows Redirected Drive Buffering allows an authori...Null pointer dereference in Windows Redirected Drive Buffering allows an authorized attacker to deny service locally. |
2026-04-14 | |
| CVE-2026-32215 | 5.5 | MEDIUM | CWE-532 | 0.1% p16 | 3.85 | Insertion of sensitive information into log file in Windows Kernel allows an aut...Insertion of sensitive information into log file in Windows Kernel allows an authorized attacker to disclose information locally. |
2026-04-14 | |
| CVE-2026-32214 | 5.5 | MEDIUM | CWE-284 | 0.0% p10 | 3.85 | Improper access control in Universal Plug and Play (upnp.dll) allows an authoriz...Improper access control in Universal Plug and Play (upnp.dll) allows an authorized attacker to disclose information locally. |
2026-04-14 | |
| CVE-2026-32212 | 5.5 | MEDIUM | CWE-59 | 0.0% p13 | 3.85 | Improper link resolution before file access ('link following') in Universal Plug...Improper link resolution before file access ('link following') in Universal Plug and Play (upnp.dll) allows an authorized attacker to disclose information locally. |
2026-04-14 | |
| CVE-2026-32203 | 7.5 | HIGH | CWE-20 | 0.1% p34 | 5.25 | Stack-based buffer overflow in .NET and Visual Studio allows an unauthorized att...Stack-based buffer overflow in .NET and Visual Studio allows an unauthorized attacker to deny service over a network. |
2026-04-14 | |
| CVE-2026-32202 | 4.3 | MEDIUM | CWE-693 | 0.1% p18 | 3.01 | Protection mechanism failure in Windows Shell allows an unauthorized attacker to...Protection mechanism failure in Windows Shell allows an unauthorized attacker to perform spoofing over a network. |
2026-04-14 | |
| CVE-2026-32201 | 6.5 | MEDIUM | CWE-20 | ✓ | 1.2% p78 | 4.59 | Improper input validation in Microsoft Office SharePoint allows an unauthorized ...Improper input validation in Microsoft Office SharePoint allows an unauthorized attacker to perform spoofing over a network. |
2026-04-14 |
| CVE-2026-32200 | 7.8 | HIGH | CWE-416 | 0.1% p18 | 5.46 | Use after free in Microsoft Office PowerPoint allows an unauthorized attacker to...Use after free in Microsoft Office PowerPoint allows an unauthorized attacker to execute code locally. |
2026-04-14 | |
| CVE-2026-32199 | 7.8 | HIGH | CWE-416 | 0.1% p18 | 5.46 | Use after free in Microsoft Office Excel allows an unauthorized attacker to exec...Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally. |
2026-04-14 | |
| CVE-2026-32198 | 7.8 | HIGH | CWE-416 | 0.1% p18 | 5.46 | Use after free in Microsoft Office Excel allows an unauthorized attacker to exec...Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally. |
2026-04-14 | |
| CVE-2026-32197 | 7.8 | HIGH | CWE-416 | 0.1% p18 | 5.46 | Use after free in Microsoft Office Excel allows an unauthorized attacker to exec...Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally. |
2026-04-14 | |
| CVE-2026-32196 | 6.1 | MEDIUM | CWE-79 | 0.0% p13 | 4.27 | Improper neutralization of input during web page generation ('cross-site scripti...Improper neutralization of input during web page generation ('cross-site scripting') in Windows Admin Center allows an unauthorized attacker to perform spoofing over a network. |
2026-04-14 | |
| CVE-2026-32195 | 7.0 | HIGH | CWE-121 | 0.0% p12 | 4.90 | Stack-based buffer overflow in Windows Kernel allows an authorized attacker to e...Stack-based buffer overflow in Windows Kernel allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-32192 | 7.8 | HIGH | CWE-502 | 0.4% p63 | 5.47 | Deserialization of untrusted data in Azure Monitor Agent allows an authorized at...Deserialization of untrusted data in Azure Monitor Agent allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-32190 | 8.4 | HIGH | CWE-416 | 0.0% p13 | 5.88 | Use after free in Microsoft Office allows an unauthorized attacker to execute co...Use after free in Microsoft Office allows an unauthorized attacker to execute code locally. |
2026-04-14 | |
| CVE-2026-32189 | 7.8 | HIGH | CWE-416 | 0.1% p18 | 5.46 | Use after free in Microsoft Office Excel allows an unauthorized attacker to exec...Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally. |
2026-04-14 | |
| CVE-2026-32188 | 7.1 | HIGH | CWE-125 | 0.1% p16 | 4.97 | Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to ...Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to disclose information locally. |
2026-04-14 | |
| CVE-2026-32184 | 7.8 | HIGH | CWE-502 | 0.4% p63 | 5.47 | Deserialization of untrusted data in Microsoft High Performance Compute Pack (HP...Deserialization of untrusted data in Microsoft High Performance Compute Pack (HPC) allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-32183 | 7.8 | HIGH | CWE-77 | 0.1% p15 | 5.46 | Improper neutralization of special elements used in a command ('command injectio...Improper neutralization of special elements used in a command ('command injection') in Windows Snipping Tool allows an unauthorized attacker to execute code locally. |
2026-04-14 | |
| CVE-2026-32181 | 5.5 | MEDIUM | CWE-269 | 0.0% p10 | 3.85 | Improper privilege management in Microsoft Windows allows an authorized attacker...Improper privilege management in Microsoft Windows allows an authorized attacker to deny service locally. |
2026-04-14 | |
| CVE-2026-32178 | 7.5 | HIGH | CWE-138 | 0.1% p16 | 5.25 | Improper neutralization of special elements in .NET allows an unauthorized attac...Improper neutralization of special elements in .NET allows an unauthorized attacker to perform spoofing over a network. |
2026-04-14 | |
| CVE-2026-32176 | 6.7 | MEDIUM | CWE-89 | 0.1% p21 | 4.69 | Improper neutralization of special elements used in an sql command ('sql injecti...Improper neutralization of special elements used in an sql command ('sql injection') in SQL Server allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-32171 | 8.8 | HIGH | CWE-522 | 0.1% p17 | 6.16 | Insufficiently protected credentials in Azure Logic Apps allows an authorized at...Insufficiently protected credentials in Azure Logic Apps allows an authorized attacker to elevate privileges over a network. |
2026-04-14 | |
| CVE-2026-32168 | 7.8 | HIGH | CWE-20 | 0.1% p20 | 5.46 | Improper input validation in Azure Monitor Agent allows an authorized attacker t...Improper input validation in Azure Monitor Agent allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-32167 | 6.7 | MEDIUM | CWE-89 | 0.1% p16 | 4.69 | Improper neutralization of special elements used in an sql command ('sql injecti...Improper neutralization of special elements used in an sql command ('sql injection') in SQL Server allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-32165 | 7.8 | HIGH | CWE-362 | 0.0% p10 | 5.46 | Use after free in Windows User Interface Core allows an authorized attacker to e...Use after free in Windows User Interface Core allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-32164 | 7.8 | HIGH | CWE-362 | 0.0% p10 | 5.46 | Concurrent execution using shared resource with improper synchronization ('race ...Concurrent execution using shared resource with improper synchronization ('race condition') in Windows User Interface Core allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-32163 | 7.8 | HIGH | CWE-362 | 0.0% p10 | 5.46 | Concurrent execution using shared resource with improper synchronization ('race ...Concurrent execution using shared resource with improper synchronization ('race condition') in Windows User Interface Core allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-32162 | 8.4 | HIGH | CWE-349 | 0.0% p8 | 5.88 | Acceptance of extraneous untrusted data with trusted data in Windows COM allows ...Acceptance of extraneous untrusted data with trusted data in Windows COM allows an unauthorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-32160 | 7.8 | HIGH | CWE-362 | 0.0% p10 | 5.46 | Concurrent execution using shared resource with improper synchronization ('race ...Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Push Notifications allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-32159 | 7.8 | HIGH | CWE-362 | 0.0% p10 | 5.46 | Concurrent execution using shared resource with improper synchronization ('race ...Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Push Notifications allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-32158 | 7.8 | HIGH | CWE-362 | 0.0% p10 | 5.46 | Concurrent execution using shared resource with improper synchronization ('race ...Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Push Notifications allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-32157 | 8.8 | HIGH | CWE-416 | 0.1% p31 | 6.16 | Use after free in Remote Desktop Client allows an unauthorized attacker to execu...Use after free in Remote Desktop Client allows an unauthorized attacker to execute code over a network. |
2026-04-14 | |
| CVE-2026-32156 | 7.4 | HIGH | CWE-416 | 0.0% p12 | 5.18 | Use after free in Windows Universal Plug and Play (UPnP) Device Host allows an u...Use after free in Windows Universal Plug and Play (UPnP) Device Host allows an unauthorized attacker to execute code locally. |
2026-04-14 | |
| CVE-2026-32155 | 7.8 | HIGH | CWE-416 | 0.0% p13 | 5.46 | Use after free in Desktop Window Manager allows an authorized attacker to elevat...Use after free in Desktop Window Manager allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-32154 | 7.8 | HIGH | CWE-416 | 0.0% p13 | 5.46 | Use after free in Desktop Window Manager allows an authorized attacker to elevat...Use after free in Desktop Window Manager allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-32153 | 7.8 | HIGH | CWE-362 | 0.0% p11 | 5.46 | Use after free in Microsoft Windows Speech allows an authorized attacker to elev...Use after free in Microsoft Windows Speech allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-32152 | 7.8 | HIGH | CWE-416 | 0.0% p13 | 5.46 | Use after free in Desktop Window Manager allows an authorized attacker to elevat...Use after free in Desktop Window Manager allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-32151 | 6.5 | MEDIUM | CWE-200 | 0.1% p24 | 4.55 | Exposure of sensitive information to an unauthorized actor in Windows Shell allo...Exposure of sensitive information to an unauthorized actor in Windows Shell allows an authorized attacker to disclose information over a network. |
2026-04-14 | |
| CVE-2026-32150 | 7.0 | HIGH | CWE-362 | 0.0% p10 | 4.90 | Concurrent execution using shared resource with improper synchronization ('race ...Concurrent execution using shared resource with improper synchronization ('race condition') in Function Discovery Service (fdwsd.dll) allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-32149 | 7.3 | HIGH | CWE-20 | 0.1% p29 | 5.11 | Improper input validation in Windows Hyper-V allows an authorized attacker to ex...Improper input validation in Windows Hyper-V allows an authorized attacker to execute code locally. |
2026-04-14 | |
| CVE-2026-32093 | 7.0 | HIGH | CWE-122 | 0.0% p15 | 4.90 | Concurrent execution using shared resource with improper synchronization ('race ...Concurrent execution using shared resource with improper synchronization ('race condition') in Function Discovery Service (fdwsd.dll) allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-32091 | 8.4 | HIGH | CWE-362 | 0.0% p12 | 5.88 | Concurrent execution using shared resource with improper synchronization ('race ...Concurrent execution using shared resource with improper synchronization ('race condition') in Microsoft Brokering File System allows an unauthorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-32090 | 7.8 | HIGH | CWE-362 | 0.0% p11 | 5.46 | Concurrent execution using shared resource with improper synchronization ('race ...Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Speech Brokered Api allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-32089 | 7.8 | HIGH | CWE-362 | 0.0% p11 | 5.46 | Use after free in Windows Speech Brokered Api allows an authorized attacker to e...Use after free in Windows Speech Brokered Api allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-32088 | 6.1 | MEDIUM | CWE-362 | 0.0% p13 | 4.27 | Concurrent execution using shared resource with improper synchronization ('race ...Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Biometric Service allows an unauthorized attacker to bypass a security feature with a physical attack. |
2026-04-14 | |
| CVE-2026-32087 | 7.0 | HIGH | CWE-122 | 0.0% p12 | 4.90 | Heap-based buffer overflow in Function Discovery Service (fdwsd.dll) allows an a...Heap-based buffer overflow in Function Discovery Service (fdwsd.dll) allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-32086 | 7.0 | HIGH | CWE-362 | 0.0% p10 | 4.90 | Concurrent execution using shared resource with improper synchronization ('race ...Concurrent execution using shared resource with improper synchronization ('race condition') in Function Discovery Service (fdwsd.dll) allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-32085 | 5.5 | MEDIUM | CWE-200 | 0.0% p11 | 3.85 | Exposure of sensitive information to an unauthorized actor in Windows Remote Pro...Exposure of sensitive information to an unauthorized actor in Windows Remote Procedure Call allows an authorized attacker to disclose information locally. |
2026-04-14 | |
| CVE-2026-32084 | 5.5 | MEDIUM | CWE-200 | 0.0% p11 | 3.85 | Exposure of sensitive information to an unauthorized actor in Windows File Explo...Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an authorized attacker to disclose information locally. |
2026-04-14 | |
| CVE-2026-32083 | 7.0 | HIGH | CWE-362 | 0.0% p10 | 4.90 | Concurrent execution using shared resource with improper synchronization ('race ...Concurrent execution using shared resource with improper synchronization ('race condition') in Windows SSDP Service allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-32082 | 7.0 | HIGH | CWE-362 | 0.0% p10 | 4.90 | Concurrent execution using shared resource with improper synchronization ('race ...Concurrent execution using shared resource with improper synchronization ('race condition') in Windows SSDP Service allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-32081 | 5.5 | MEDIUM | CWE-200 | 0.0% p11 | 3.85 | Exposure of sensitive information to an unauthorized actor in Windows File Explo...Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an authorized attacker to disclose information locally. |
2026-04-14 | |
| CVE-2026-32080 | 7.0 | HIGH | CWE-416 | 0.0% p12 | 4.90 | Use after free in Windows WalletService allows an authorized attacker to elevate...Use after free in Windows WalletService allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-32079 | 5.5 | MEDIUM | CWE-200 | 0.0% p11 | 3.85 | Exposure of sensitive information to an unauthorized actor in Windows File Explo...Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an authorized attacker to disclose information locally. |
2026-04-14 | |
| CVE-2026-32078 | 7.8 | HIGH | CWE-416 | 0.0% p13 | 5.46 | Use after free in Windows Projected File System allows an authorized attacker to...Use after free in Windows Projected File System allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-32077 | 7.8 | HIGH | CWE-822 | 0.0% p13 | 5.46 | Untrusted pointer dereference in Windows Universal Plug and Play (UPnP) Device H...Untrusted pointer dereference in Windows Universal Plug and Play (UPnP) Device Host allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-32076 | 7.8 | HIGH | CWE-125 | 0.0% p13 | 5.46 | Out-of-bounds read in Windows Storage Spaces Controller allows an authorized att...Out-of-bounds read in Windows Storage Spaces Controller allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-32075 | 7.0 | HIGH | CWE-416 | 0.0% p12 | 4.90 | Use after free in Windows Universal Plug and Play (UPnP) Device Host allows an a...Use after free in Windows Universal Plug and Play (UPnP) Device Host allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-32074 | 7.8 | HIGH | CWE-415 | 0.0% p13 | 5.46 | Double free in Windows Projected File System allows an authorized attacker to el...Double free in Windows Projected File System allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-32073 | 7.0 | HIGH | CWE-416 | 0.0% p12 | 4.90 | Use after free in Windows Ancillary Function Driver for WinSock allows an author...Use after free in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-32072 | 6.2 | MEDIUM | CWE-287 | 0.0% p11 | 4.34 | Improper authentication in Windows Active Directory allows an unauthorized attac...Improper authentication in Windows Active Directory allows an unauthorized attacker to perform spoofing locally. |
2026-04-14 | |
| CVE-2026-32071 | 7.5 | HIGH | CWE-476 | 0.1% p28 | 5.25 | Null pointer dereference in Windows Local Security Authority Subsystem Service (...Null pointer dereference in Windows Local Security Authority Subsystem Service (LSASS) allows an unauthorized attacker to deny service over a network. |
2026-04-14 | |
| CVE-2026-32070 | 7.0 | HIGH | CWE-416 | 0.0% p12 | 4.90 | Use after free in Windows Common Log File System Driver allows an authorized att...Use after free in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-32069 | 7.8 | HIGH | CWE-415 | 0.0% p13 | 5.46 | Double free in Windows Projected File System allows an authorized attacker to el...Double free in Windows Projected File System allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-32068 | 7.0 | HIGH | CWE-362 | 0.0% p10 | 4.90 | Concurrent execution using shared resource with improper synchronization ('race ...Concurrent execution using shared resource with improper synchronization ('race condition') in Windows SSDP Service allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-27931 | 5.5 | MEDIUM | CWE-125 | 0.0% p13 | 3.85 | Out-of-bounds read in Windows GDI allows an unauthorized attacker to disclose in...Out-of-bounds read in Windows GDI allows an unauthorized attacker to disclose information locally. |
2026-04-14 | |
| CVE-2026-27930 | 5.5 | MEDIUM | CWE-125 | 0.0% p13 | 3.85 | Out-of-bounds read in Windows GDI allows an unauthorized attacker to disclose in...Out-of-bounds read in Windows GDI allows an unauthorized attacker to disclose information locally. |
2026-04-14 | |
| CVE-2026-27929 | 7.0 | HIGH | CWE-367 | 0.0% p10 | 4.90 | Time-of-check time-of-use (toctou) race condition in Windows LUAFV allows an aut...Time-of-check time-of-use (toctou) race condition in Windows LUAFV allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-27928 | 8.7 | HIGH | CWE-20 | 0.1% p20 | 6.09 | Improper input validation in Windows Hello allows an unauthorized attacker to by...Improper input validation in Windows Hello allows an unauthorized attacker to bypass a security feature over a network. |
2026-04-14 | |
| CVE-2026-27927 | 7.8 | HIGH | CWE-362 | 0.0% p11 | 5.46 | Concurrent execution using shared resource with improper synchronization ('race ...Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Projected File System allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-27926 | 7.0 | HIGH | CWE-362 | 0.0% p10 | 4.90 | Concurrent execution using shared resource with improper synchronization ('race ...Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Cloud Files Mini Filter Driver allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-27925 | 6.5 | MEDIUM | CWE-416 | 0.1% p18 | 4.55 | Use after free in Windows Universal Plug and Play (UPnP) Device Host allows an u...Use after free in Windows Universal Plug and Play (UPnP) Device Host allows an unauthorized attacker to disclose information over an adjacent network. |
2026-04-14 | |
| CVE-2026-27924 | 7.8 | HIGH | CWE-416 | 0.0% p13 | 5.46 | Use after free in Desktop Window Manager allows an authorized attacker to elevat...Use after free in Desktop Window Manager allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-27923 | 7.8 | HIGH | CWE-416 | 0.0% p13 | 5.46 | Use after free in Desktop Window Manager allows an authorized attacker to elevat...Use after free in Desktop Window Manager allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-27922 | 7.0 | HIGH | CWE-416 | 0.0% p12 | 4.90 | Use after free in Windows Ancillary Function Driver for WinSock allows an author...Use after free in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-27921 | 7.0 | HIGH | CWE-362 | 0.0% p15 | 4.90 | Concurrent execution using shared resource with improper synchronization ('race ...Concurrent execution using shared resource with improper synchronization ('race condition') in Windows TCP/IP allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-27920 | 7.8 | HIGH | CWE-822 | 0.0% p13 | 5.46 | Untrusted pointer dereference in Windows Universal Plug and Play (UPnP) Device H...Untrusted pointer dereference in Windows Universal Plug and Play (UPnP) Device Host allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-27919 | 7.8 | HIGH | CWE-822 | 0.0% p13 | 5.46 | Untrusted pointer dereference in Windows Universal Plug and Play (UPnP) Device H...Untrusted pointer dereference in Windows Universal Plug and Play (UPnP) Device Host allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-27918 | 7.8 | HIGH | CWE-362 | 0.0% p11 | 5.46 | Concurrent execution using shared resource with improper synchronization ('race ...Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Shell allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-27917 | 7.0 | HIGH | CWE-416 | 0.0% p12 | 4.90 | Use after free in Windows WFP NDIS Lightweight Filter Driver (wfplwfs.sys) allow...Use after free in Windows WFP NDIS Lightweight Filter Driver (wfplwfs.sys) allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-27916 | 7.8 | HIGH | CWE-416 | 0.0% p13 | 5.46 | Use after free in Windows Universal Plug and Play (UPnP) Device Host allows an a...Use after free in Windows Universal Plug and Play (UPnP) Device Host allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-27915 | 7.8 | HIGH | CWE-416 | 0.0% p13 | 5.46 | Use after free in Windows Universal Plug and Play (UPnP) Device Host allows an a...Use after free in Windows Universal Plug and Play (UPnP) Device Host allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-27914 | 7.8 | HIGH | CWE-284 | 0.1% p16 | 5.46 | Improper access control in Microsoft Management Console allows an authorized att...Improper access control in Microsoft Management Console allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-27913 | 7.7 | HIGH | CWE-20 | 0.1% p19 | 5.39 | Improper input validation in Windows BitLocker allows an unauthorized attacker t...Improper input validation in Windows BitLocker allows an unauthorized attacker to bypass a security feature locally. |
2026-04-14 | |
| CVE-2026-27912 | 8.0 | HIGH | CWE-285 | 0.2% p45 | 5.61 | Improper authorization in Windows Kerberos allows an authorized attacker to elev...Improper authorization in Windows Kerberos allows an authorized attacker to elevate privileges over an adjacent network. |
2026-04-14 | |
| CVE-2026-27911 | 7.8 | HIGH | CWE-362 | 0.0% p10 | 5.46 | Concurrent execution using shared resource with improper synchronization ('race ...Concurrent execution using shared resource with improper synchronization ('race condition') in Windows User Interface Core allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-27910 | 7.8 | HIGH | CWE-280 | 0.0% p12 | 5.46 | Improper handling of insufficient permissions or privileges in Windows Installer...Improper handling of insufficient permissions or privileges in Windows Installer allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-27909 | 7.8 | HIGH | CWE-416 | 0.1% p23 | 5.46 | Use after free in Microsoft Windows Search Component allows an authorized attack...Use after free in Microsoft Windows Search Component allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-27908 | 7.0 | HIGH | CWE-416 | 0.1% p22 | 4.90 | Use after free in Windows TDI Translation Driver (tdx.sys) allows an authorized ...Use after free in Windows TDI Translation Driver (tdx.sys) allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-27907 | 7.8 | HIGH | CWE-191 | 0.1% p24 | 5.46 | Integer underflow (wrap or wraparound) in Windows Storage Spaces Controller allo...Integer underflow (wrap or wraparound) in Windows Storage Spaces Controller allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-27906 | 4.4 | MEDIUM | CWE-20 | 0.1% p24 | 3.08 | Improper input validation in Windows Hello allows an authorized attacker to bypa...Improper input validation in Windows Hello allows an authorized attacker to bypass a security feature locally. |
2026-04-14 | |
| CVE-2026-27303 | 9.6 | CRITICAL | CWE-502 | 1.5% p81 | 6.77 | Adobe Connect versions 2025.3, 12.10 and earlier are affected by a Deserializati...Adobe Connect versions 2025.3, 12.10 and earlier are affected by a Deserialization of Untrusted Data vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue does not require user interaction. Scope is changed. |
2026-04-14 | |
| CVE-2026-27288 | 5.4 | MEDIUM | CWE-79 | 0.0% p8 | 3.78 | Adobe Experience Manager versions 6.5.24, FP11.7 and earlier are affected by a D...Adobe Experience Manager versions 6.5.24, FP11.7 and earlier are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability. An attacker could exploit this issue by manipulating the DOM environment to execute malicious JavaScript within the context of the victim's browser. Exploitation of this issue requires user interaction in that a victim must visit a crafted webpage. |
2026-04-14 | |
| CVE-2026-27258 | 5.5 | MEDIUM | CWE-787 | 0.0% p5 | 3.85 | DNG SDK versions 1.7.1 2502 and earlier are affected by an out-of-bounds write v...DNG SDK versions 1.7.1 2502 and earlier are affected by an out-of-bounds write vulnerability that could lead to application denial-of-service. An attacker could leverage this vulnerability to corrupt memory, causing the application to crash or become unresponsive. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
2026-04-14 | |
| CVE-2026-27246 | 9.3 | CRITICAL | CWE-79 | 0.1% p26 | 6.51 | Adobe Connect versions 2025.3, 12.10 and earlier are affected by a DOM-based Cro...Adobe Connect versions 2025.3, 12.10 and earlier are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability. An attacker could exploit this issue by manipulating the DOM environment to execute malicious JavaScript within the context of the victim's browser. Exploitation of this issue requires user interaction in that a victim must visit a crafted webpage. Scope is changed. |
2026-04-14 | |
| CVE-2026-27245 | 9.3 | CRITICAL | CWE-79 | 0.1% p26 | 6.51 | Adobe Connect versions 2025.3, 12.10 and earlier are affected by a reflected Cro...Adobe Connect versions 2025.3, 12.10 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser. Scope is changed. |
2026-04-14 | |
| CVE-2026-27243 | 9.3 | CRITICAL | CWE-79 | 0.1% p26 | 6.51 | Adobe Connect versions 2025.3, 12.10 and earlier are affected by a reflected Cro...Adobe Connect versions 2025.3, 12.10 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser. Scope is changed. |
2026-04-14 | |
| CVE-2026-26184 | 7.8 | HIGH | CWE-126 | 0.1% p18 | 5.46 | Buffer over-read in Windows Projected File System allows an authorized attacker ...Buffer over-read in Windows Projected File System allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-26183 | 7.8 | HIGH | CWE-284 | 0.1% p17 | 5.46 | Improper access control in Windows RPC API allows an authorized attacker to elev...Improper access control in Windows RPC API allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-26182 | 7.0 | HIGH | CWE-416 | 0.1% p17 | 4.90 | Use after free in Windows Ancillary Function Driver for WinSock allows an author...Use after free in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-26181 | 7.8 | HIGH | CWE-362 | 0.1% p16 | 5.46 | Use after free in Microsoft Brokering File System allows an authorized attacker ...Use after free in Microsoft Brokering File System allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-26180 | 7.8 | HIGH | CWE-122 | 0.1% p18 | 5.46 | Heap-based buffer overflow in Windows Kernel allows an authorized attacker to el...Heap-based buffer overflow in Windows Kernel allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-26179 | 7.8 | HIGH | CWE-415 | 0.1% p18 | 5.46 | Double free in Windows Kernel allows an authorized attacker to elevate privilege...Double free in Windows Kernel allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-26178 | 8.8 | HIGH | CWE-190 | 0.2% p42 | 6.17 | Integer size truncation in Windows Advanced Rasterization Platform (WARP) allows...Integer size truncation in Windows Advanced Rasterization Platform (WARP) allows an unauthorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-26177 | 7.0 | HIGH | CWE-416 | 0.1% p17 | 4.90 | Use after free in Windows Ancillary Function Driver for WinSock allows an author...Use after free in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-26176 | 7.8 | HIGH | CWE-122 | 0.1% p18 | 5.46 | Heap-based buffer overflow in Windows Client Side Caching driver (csc.sys) allow...Heap-based buffer overflow in Windows Client Side Caching driver (csc.sys) allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-26175 | 4.6 | MEDIUM | CWE-908 | 0.2% p37 | 3.22 | Use of uninitialized resource in Windows Boot Manager allows an unauthorized att...Use of uninitialized resource in Windows Boot Manager allows an unauthorized attacker to bypass a security feature with a physical attack. |
2026-04-14 | |
| CVE-2026-26174 | 7.0 | HIGH | CWE-362 | 0.0% p15 | 4.90 | Concurrent execution using shared resource with improper synchronization ('race ...Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Server Update Service allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-26173 | 7.0 | HIGH | CWE-362 | 0.0% p15 | 4.90 | Concurrent execution using shared resource with improper synchronization ('race ...Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-26172 | 7.8 | HIGH | CWE-362 | 0.0% p15 | 5.46 | Concurrent execution using shared resource with improper synchronization ('race ...Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Push Notifications allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-26171 | 7.5 | HIGH | CWE-400 | 0.6% p69 | 5.27 | Uncontrolled resource consumption in .NET allows an unauthorized attacker to den...Uncontrolled resource consumption in .NET allows an unauthorized attacker to deny service over a network. |
2026-04-14 | |
| CVE-2026-26170 | 7.8 | HIGH | CWE-20 | 0.1% p25 | 5.46 | Improper input validation in Microsoft PowerShell allows an authorized attacker ...Improper input validation in Microsoft PowerShell allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-26169 | 6.1 | MEDIUM | CWE-126 | 0.1% p23 | 4.27 | Buffer over-read in Windows Kernel Memory allows an authorized attacker to discl...Buffer over-read in Windows Kernel Memory allows an authorized attacker to disclose information locally. |
2026-04-14 | |
| CVE-2026-26168 | 7.8 | HIGH | CWE-362 | 0.0% p15 | 5.46 | Concurrent execution using shared resource with improper synchronization ('race ...Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-26167 | 8.8 | HIGH | CWE-362 | 0.1% p16 | 6.16 | Concurrent execution using shared resource with improper synchronization ('race ...Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Push Notifications allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-26166 | 7.0 | HIGH | CWE-415 | 0.1% p17 | 4.90 | Double free in Windows Shell allows an authorized attacker to elevate privileges...Double free in Windows Shell allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-26165 | 7.0 | HIGH | CWE-416 | 0.1% p17 | 4.90 | Use after free in Windows Shell allows an authorized attacker to elevate privile...Use after free in Windows Shell allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-26163 | 7.8 | HIGH | CWE-415 | 0.1% p18 | 5.46 | Double free in Windows Kernel allows an authorized attacker to elevate privilege...Double free in Windows Kernel allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-26162 | 7.8 | HIGH | CWE-843 | 0.1% p35 | 5.46 | Access of resource using incompatible type ('type confusion') in Windows OLE all...Access of resource using incompatible type ('type confusion') in Windows OLE allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-26161 | 7.8 | HIGH | CWE-20 | 0.1% p25 | 5.46 | Untrusted pointer dereference in Windows Sensor Data Service allows an authorize...Untrusted pointer dereference in Windows Sensor Data Service allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-26160 | 7.8 | HIGH | CWE-306 | 0.1% p17 | 5.46 | Missing authentication for critical function in Windows Remote Desktop Licensing...Missing authentication for critical function in Windows Remote Desktop Licensing Service allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-26159 | 7.8 | HIGH | CWE-306 | 0.1% p17 | 5.46 | Missing authentication for critical function in Windows Remote Desktop Licensing...Missing authentication for critical function in Windows Remote Desktop Licensing Service allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-26156 | 7.8 | HIGH | CWE-20 | 0.1% p30 | 5.46 | Heap-based buffer overflow in Windows Hyper-V allows an unauthorized attacker to...Heap-based buffer overflow in Windows Hyper-V allows an unauthorized attacker to execute code locally. |
2026-04-14 | |
| CVE-2026-26155 | 6.5 | MEDIUM | CWE-126 | 0.1% p27 | 4.55 | Microsoft Local Security Authority Subsystem Service Information Disclosure Vuln...Microsoft Local Security Authority Subsystem Service Information Disclosure Vulnerability |
2026-04-14 | |
| CVE-2026-26154 | 7.5 | HIGH | CWE-20 | 0.2% p36 | 5.25 | Improper input validation in Windows Server Update Service allows an unauthorize...Improper input validation in Windows Server Update Service allows an unauthorized attacker to perform tampering over a network. |
2026-04-14 | |
| CVE-2026-26153 | 7.8 | HIGH | CWE-125 | 0.1% p18 | 5.46 | Out-of-bounds read in Windows Encrypting File System (EFS) allows an authorized ...Out-of-bounds read in Windows Encrypting File System (EFS) allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-26152 | 7.0 | HIGH | CWE-922 | 0.1% p33 | 4.90 | Insecure storage of sensitive information in Windows Cryptographic Services allo...Insecure storage of sensitive information in Windows Cryptographic Services allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-26151 | 7.1 | HIGH | CWE-357 | 0.1% p23 | 4.97 | Insufficient ui warning of dangerous operations in Windows Remote Desktop allows...Insufficient ui warning of dangerous operations in Windows Remote Desktop allows an unauthorized attacker to perform spoofing over a network. |
2026-04-14 | |
| CVE-2026-26149 | 9.0 | CRITICAL | CWE-150 | 0.1% p23 | 6.30 | Improper neutralization of escape, meta, or control sequences in Microsoft Power...Improper neutralization of escape, meta, or control sequences in Microsoft Power Apps allows an authorized attacker to bypass a security feature over a network. |
2026-04-14 | |
| CVE-2026-26143 | 7.8 | HIGH | CWE-20 | 0.1% p26 | 5.46 | Improper input validation in Microsoft PowerShell allows an unauthorized attacke...Improper input validation in Microsoft PowerShell allows an unauthorized attacker to bypass a security feature locally. |
2026-04-14 | |
| CVE-2026-25184 | 7.0 | HIGH | CWE-362 | 0.0% p15 | 4.90 | Concurrent execution using shared resource with improper synchronization ('race ...Concurrent execution using shared resource with improper synchronization ('race condition') in Applocker Filter Driver (applockerfltr.sys) allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-24907 | 5.1 | MEDIUM | CWE-79 | 0.1% p20 | 3.57 | October is a Content Management System (CMS) and web platform. Versions prior to...October is a Content Management System (CMS) and web platform. Versions prior to 3.7.14 and 4.1.10 contain a stored cross-site scripting (XSS) vulnerability in the Event Log mail preview feature. When viewing logged mail messages, HTML content was rendered in an iframe without proper sandboxing, allowing JavaScript execution in the viewer's browser context. This issue has been fixed in versions 3.7.14 and 4.1.10. If users are unable to update immediately, workarounds include restricting mail template editing permissions to fully trusted administrators only and restricting Event Log viewing permissions to minimize exposure. |
2026-04-14 | |
| CVE-2026-24906 | 5.1 | MEDIUM | CWE-79 | 0.1% p20 | 3.57 | October is a Content Management System (CMS) and web platform. Versions prior to...October is a Content Management System (CMS) and web platform. Versions prior to 3.7.14 and 4.1.10 contain a Stored Cross-Site Scripting (XSS) vulnerability in the Backend Editor Settings. The Markup Classes fields (used for paragraph styles, inline styles, table styles, etc.) did not sanitize input to valid CSS class name characters. Malicious values were rendered unsanitized in Froala editor dropdown menus, allowing JavaScript execution when any user opened a RichEditor. Exploitation could lead to privilege escalation if a superuser opens any RichEditor during routine content editing (e.g., editing a blog post), and requires authenticated backend access with editor settings permissions. This issue has been fixed in versions 3.7.14 and 4.1.10. To workaround this issue, restrict editor settings permissions to fully trusted administrators only |
2026-04-14 | |
| CVE-2026-23670 | 5.7 | MEDIUM | CWE-822 | 0.1% p18 | 3.99 | Untrusted pointer dereference in Windows Virtualization-Based Security (VBS) Enc...Untrusted pointer dereference in Windows Virtualization-Based Security (VBS) Enclave allows an authorized attacker to bypass a security feature locally. |
2026-04-14 | |
| CVE-2026-23666 | 7.5 | HIGH | CWE-755 | 0.1% p24 | 5.25 | Improper input validation in .NET Framework allows an unauthorized attacker to d...Improper input validation in .NET Framework allows an unauthorized attacker to deny service over a network. |
2026-04-14 | |
| CVE-2026-23657 | 7.8 | HIGH | CWE-416 | 0.1% p23 | 5.46 | Use after free in Microsoft Office Word allows an unauthorized attacker to execu...Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally. |
2026-04-14 | |
| CVE-2026-23653 | 5.7 | MEDIUM | CWE-77 | 0.1% p29 | 3.99 | Improper neutralization of special elements used in a command ('command injectio...Improper neutralization of special elements used in a command ('command injection') in GitHub Copilot and Visual Studio Code allows an authorized attacker to disclose information over a network. |
2026-04-14 | |
| CVE-2026-21331 | 6.1 | MEDIUM | CWE-79 | 0.1% p21 | 4.27 | Adobe Connect versions 2025.3, 12.10 and earlier are affected by a reflected Cro...Adobe Connect versions 2025.3, 12.10 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser. Scope is changed. |
2026-04-14 | |
| CVE-2026-20945 | 4.6 | MEDIUM | CWE-79 | 0.1% p18 | 3.22 | Improper neutralization of input during web page generation ('cross-site scripti...Improper neutralization of input during web page generation ('cross-site scripting') in Microsoft Office SharePoint allows an authorized attacker to perform spoofing over a network. |
2026-04-14 | |
| CVE-2026-20930 | 7.8 | HIGH | CWE-362 | 0.0% p15 | 5.46 | Concurrent execution using shared resource with improper synchronization ('race ...Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Management Services allows an authorized attacker to elevate privileges locally. |
2026-04-14 | |
| CVE-2026-20928 | 4.6 | MEDIUM | CWE-212 | 0.2% p37 | 3.22 | Improper removal of sensitive information before storage or transfer in Windows ...Improper removal of sensitive information before storage or transfer in Windows Recovery Environment Agent allows an unauthorized attacker to bypass a security feature with a physical attack. |
2026-04-14 | |
| CVE-2026-20806 | 5.5 | MEDIUM | CWE-843 | 0.1% p32 | 3.85 | Access of resource using incompatible type ('type confusion') in Windows COM all...Access of resource using incompatible type ('type confusion') in Windows COM allows an authorized attacker to disclose information locally. |
2026-04-14 | |
| CVE-2026-0390 | 6.7 | MEDIUM | CWE-807 | 0.1% p25 | 4.69 | Reliance on untrusted inputs in a security decision in Windows Boot Loader allow...Reliance on untrusted inputs in a security decision in Windows Boot Loader allows an authorized attacker to bypass a security feature locally. |
2026-04-14 | |
| CVE-2026-0209 | 6.9 | MEDIUM | CWE-783 | 0.0% p1 | 4.83 | Under certain administrative conditions, FlashArray Purity may apply snapshot re...Under certain administrative conditions, FlashArray Purity may apply snapshot retention policies earlier or later than configured. |
2026-04-14 | |
| CVE-2026-0207 | 8.5 | HIGH | CWE-532 | 0.0% p1 | 5.95 | A vulnerability exists in FlashBlade whereby sensitive information may be logged...A vulnerability exists in FlashBlade whereby sensitive information may be logged under specific conditions. |
2026-04-14 | |
| CVE-2025-70023 | 0.0 | NONE | N/A | 0.0% p3 | 0.00 | An issue pertaining to CWE-843: Access of Resource Using Incompatible Type was d...An issue pertaining to CWE-843: Access of Resource Using Incompatible Type was discovered in transloadit uppy v0.25.6. |
2026-04-14 | |
| CVE-2026-34626 | 6.3 | MEDIUM | CWE-1321 | 0.0% p8 | 4.41 | Acrobat Reader versions 26.001.21411, 24.001.30360, 24.001.30362 and earlier are...Acrobat Reader versions 26.001.21411, 24.001.30360, 24.001.30362 and earlier are affected by an Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') vulnerability that could result in arbitrary file system read in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
2026-04-14 | |
| CVE-2026-34622 | 8.6 | HIGH | CWE-1321 | 0.1% p30 | 6.02 | Acrobat Reader versions 26.001.21411, 24.001.30360, 24.001.30362 and earlier are...Acrobat Reader versions 26.001.21411, 24.001.30360, 24.001.30362 and earlier are affected by an Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
2026-04-14 | |
| CVE-2026-27291 | 7.8 | HIGH | CWE-787 | 0.0% p6 | 5.46 | InDesign Desktop versions 20.5.2, 21.2 and earlier are affected by an out-of-bou...InDesign Desktop versions 20.5.2, 21.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
2026-04-14 | |
| CVE-2026-27286 | 5.5 | MEDIUM | CWE-122 | 0.0% p5 | 3.85 | InDesign Desktop versions 20.5.2, 21.2 and earlier are affected by a Heap-based ...InDesign Desktop versions 20.5.2, 21.2 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could lead to memory exposure. An attacker could leverage this vulnerability to disclose sensitive information stored in memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
2026-04-14 | |
| CVE-2026-27285 | 5.5 | MEDIUM | CWE-122 | 0.0% p4 | 3.85 | InDesign Desktop versions 20.5.2, 21.2 and earlier are affected by a Heap-based ...InDesign Desktop versions 20.5.2, 21.2 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could lead to application denial-of-service. An attacker could exploit this vulnerability to crash the application or disrupt its functionality. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
2026-04-14 | |
| CVE-2026-27284 | 7.8 | HIGH | CWE-125 | 0.0% p6 | 5.46 | InDesign Desktop versions 20.5.2, 21.2 and earlier are affected by an out-of-bou...InDesign Desktop versions 20.5.2, 21.2 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
2026-04-14 | |
| CVE-2026-27283 | 7.8 | HIGH | CWE-416 | 0.0% p9 | 5.46 | InDesign Desktop versions 20.5.2, 21.2 and earlier are affected by a Use After F...InDesign Desktop versions 20.5.2, 21.2 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
2026-04-14 | |
| CVE-2026-27238 | 7.8 | HIGH | CWE-122 | 0.0% p6 | 5.46 | InDesign Desktop versions 20.5.2, 21.2 and earlier are affected by a Heap-based ...InDesign Desktop versions 20.5.2, 21.2 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
2026-04-14 | |
| CVE-2026-22692 | 4.9 | MEDIUM | CWE-284 | 0.0% p1 | 3.43 | October is a Content Management System (CMS) and web platform. Versions prior to...October is a Content Management System (CMS) and web platform. Versions prior to 3.7.13 and versions 4.0.0 through 4.1.4 contain a sandbox bypass vulnerability in the optional Twig safe mode feature (CMS_SAFE_MODE). Certain methods on the collect() helper were not properly restricted, allowing authenticated users with template editing permissions to bypass sandbox protections. Exploitation requires authenticated backend access with CMS template editing permissions and only affects installations with CMS_SAFE_MODE enabled (disabled by default). This issue has been fixed in versions 3.7.13 and 4.1.5. To workaround this issue, users can disable CMS_SAFE_MODE if untrusted template editing is not required, and restrict CMS template editing permissions to fully trusted administrators only. |
2026-04-14 | |
| CVE-2026-5713 | 5.3 | MEDIUM | CWE-121 | 0.0% p1 | 3.71 | The "profiling.sampling" module (Python 3.15+) and "asyncio introspection capabi...The "profiling.sampling" module (Python 3.15+) and "asyncio introspection capabilities" (3.14+, "python -m asyncio ps" and "python -m asyncio pstree") features could be used to read and write addresses in a privileged process if that process connected to a malicious or "infected" Python process via the remote debugging feature. This vulnerability requires persistently and repeatedly connecting to the process to be exploited, even after the connecting process crashes with high likelihood due to ASLR. |
2026-04-14 | |
| CVE-2026-4832 | 6.9 | MEDIUM | CWE-798 | 0.1% p18 | 4.83 | CWE-798 Use of Hard-coded Credentials vulnerability exists that could cause unau...CWE-798 Use of Hard-coded Credentials vulnerability exists that could cause unauthorized access to sensitive device information when an unauthenticated attacker is able to interrogate the SNMP port. |
2026-04-14 | |
| CVE-2026-39815 | 8.8 | HIGH | CWE-89 | 0.1% p22 | 6.16 | A improper neutralization of special elements used in an sql command ('sql injec...A improper neutralization of special elements used in an sql command ('sql injection') vulnerability in Fortinet FortiDDoS-F 7.2.1 through 7.2.2 may allow attacker to execute unauthorized code or commands via sending crafted HTTP requests |
2026-04-14 | |
| CVE-2026-39814 | 6.7 | MEDIUM | CWE-23 | 0.0% p2 | 4.69 | A relative path traversal vulnerability in Fortinet FortiWeb 8.0.0 through 8.0.2...A relative path traversal vulnerability in Fortinet FortiWeb 8.0.0 through 8.0.2, FortiWeb 7.6.0 through 7.6.6, FortiWeb 7.4.1 through 7.4.12, FortiWeb 7.2.7 through 7.2.12, FortiWeb 7.0.10 through 7.0.12 may allow attacker to execute unauthorized code or commands via <insert attack vector here> |
2026-04-14 | |
| CVE-2026-39813 | 9.8 | CRITICAL | CWE-24 | 0.1% p18 | 6.86 | A path traversal: '../filedir' vulnerability in Fortinet FortiSandbox 5.0.0 thro...A path traversal: '../filedir' vulnerability in Fortinet FortiSandbox 5.0.0 through 5.0.5, FortiSandbox 4.4.0 through 4.4.8 may allow attacker to escalation of privilege via <insert attack vector here> |
2026-04-14 | |
| CVE-2026-39812 | 4.8 | MEDIUM | CWE-79 | 0.0% p7 | 3.36 | A improper neutralization of input during web page generation ('cross-site scrip...A improper neutralization of input during web page generation ('cross-site scripting') vulnerability in Fortinet FortiSandbox 5.0.0 through 5.0.5, FortiSandbox 4.4.0 through 4.4.8, FortiSandbox 4.2 all versions, FortiSandbox PaaS 5.0.0 through 5.0.5, FortiSandbox PaaS 4.4.0 through 4.4.8, FortiSandbox PaaS 4.2 all versions may allow attacker to execute unauthorized code or commands via <insert attack vector here> |
2026-04-14 | |
| CVE-2026-39811 | 4.9 | MEDIUM | CWE-190 | 0.1% p25 | 3.43 | A integer overflow or wraparound vulnerability in Fortinet FortiWeb 8.0.0 throug...A integer overflow or wraparound vulnerability in Fortinet FortiWeb 8.0.0 through 8.0.3, FortiWeb 7.6.0 through 7.6.6, FortiWeb 7.4 all versions, FortiWeb 7.2 all versions, FortiWeb 7.0 all versions may allow attacker to denial of service via <insert attack vector here> |
2026-04-14 | |
| CVE-2026-39810 | 6.0 | MEDIUM | CWE-321 | 0.0% p1 | 4.20 | A use of hard-coded cryptographic key vulnerability in Fortinet FortiClientEMS 7...A use of hard-coded cryptographic key vulnerability in Fortinet FortiClientEMS 7.4.0 through 7.4.5 may allow attacker to information disclosure via decrypting database dump. |
2026-04-14 | |
| CVE-2026-39809 | 6.7 | MEDIUM | CWE-89 | 0.0% p5 | 4.69 | A improper neutralization of special elements used in an sql command ('sql injec...A improper neutralization of special elements used in an sql command ('sql injection') vulnerability in Fortinet FortiClientEMS 7.4.0 through 7.4.5, FortiClientEMS 7.2.0 through 7.2.12, FortiClientEMS 7.0 all versions may allow attacker to execute unauthorized code or commands via sending crafted requests |
2026-04-14 | |
| CVE-2026-39808 | 9.8 | CRITICAL | CWE-78 | 0.3% p52 | 6.87 | A improper neutralization of special elements used in an os command ('os command...A improper neutralization of special elements used in an os command ('os command injection') vulnerability in Fortinet FortiSandbox 4.4.0 through 4.4.8 may allow attacker to execute unauthorized code or commands via <insert attack vector here> |
2026-04-14 | |
| CVE-2026-38533 | 0.0 | NONE | N/A | 0.0% p7 | 0.00 | An improper authorization vulnerability in the /api/v1/users/{id} endpoint of Sn...An improper authorization vulnerability in the /api/v1/users/{id} endpoint of Snipe-IT v8.4.0 allows authenticated attackers with the users.edit permission to modify sensitive authentication and account-state fields of other non-admin users via supplying a crafted PUT request. |
2026-04-14 | |
| CVE-2026-38532 | 8.1 | HIGH | CWE-639 | 0.0% p7 | 5.67 | A Broken Object-Level Authorization (BOLA) in the /Contact/Persons/PersonControl...A Broken Object-Level Authorization (BOLA) in the /Contact/Persons/PersonController.php endpoint of Webkul Krayin CRM v2.2.x allows authenticated attackers to arbitrarily read, modify, and permanently delete any contact owned by other users via supplying a crafted GET request. |
2026-04-14 | |
| CVE-2026-38530 | 8.1 | HIGH | CWE-639 | 0.0% p7 | 5.67 | A Broken Object-Level Authorization (BOLA) in the /Controllers/Lead/LeadControll...A Broken Object-Level Authorization (BOLA) in the /Controllers/Lead/LeadController.php endpoint of Webkul Krayin CRM v2.2.x allows authenticated attackers to arbitrarily read, modify, and permanently delete any lead owned by other users via supplying a crafted GET request. |
2026-04-14 | |
| CVE-2026-38529 | 8.8 | HIGH | CWE-269 | 0.0% p10 | 6.16 | A Broken Object-Level Authorization (BOLA) in the /Settings/UserController.php e...A Broken Object-Level Authorization (BOLA) in the /Settings/UserController.php endpoint of Webkul Krayin CRM v2.2.x allows authenticated attackers to arbitrarily reset user passwords and perform a full account takeover via supplying a crafted HTTP request. |
2026-04-14 | |
| CVE-2026-38528 | 7.1 | HIGH | CWE-89 | 0.0% p7 | 4.97 | Krayin CRM v2.2.x was discovered to contain a SQL injection vulnerability via th...Krayin CRM v2.2.x was discovered to contain a SQL injection vulnerability via the rotten_lead parameter at /Lead/LeadDataGrid.php. |
2026-04-14 | |
| CVE-2026-38527 | 8.5 | HIGH | CWE-918 | 0.0% p7 | 5.95 | A Server-Side Request Forgery (SSRF) in the /settings/webhooks/create component ...A Server-Side Request Forgery (SSRF) in the /settings/webhooks/create component of Webkul Krayin CRM v2.2.x allows attackers to scan internal resources via supplying a crafted POST request. |
2026-04-14 | |
| CVE-2026-38526 | 9.9 | CRITICAL | CWE-434 | 0.1% p17 | 6.93 | An authenticated arbitrary file upload vulnerability in the /admin/tinymce/uploa...An authenticated arbitrary file upload vulnerability in the /admin/tinymce/upload endpoint of Webkul Krayin CRM v2.2.x allows attackers to execute arbitrary code via uploading a crafted PHP file. |
2026-04-14 | |
| CVE-2026-2405 | 5.3 | MEDIUM | CWE-400 | 0.0% p12 | 3.71 | CWE-400 Uncontrolled Resource Consumption vulnerability exists that could cause ...CWE-400 Uncontrolled Resource Consumption vulnerability exists that could cause excessive troubleshooting zip file creation and denial of service when a Web Admin user floods the system with POST /helpabout requests. |
2026-04-14 | |
| CVE-2026-2404 | 6.9 | MEDIUM | CWE-116 | 0.0% p12 | 4.83 | CWE-116 Improper Encoding or Escaping of Output vulnerability exists that could ...CWE-116 Improper Encoding or Escaping of Output vulnerability exists that could cause log injection and forged log when an attacker alters the POST /j_security check request payload. |
2026-04-14 | |
| CVE-2026-2403 | 5.3 | MEDIUM | CWE-1284 | 0.1% p24 | 3.71 | CWE-1284 Improper Validation of Specified Quantity in Input vulnerability exists...CWE-1284 Improper Validation of Specified Quantity in Input vulnerability exists that could cause Event and Data Log truncation impacting log integrity when a Web Admin user alters the POST /logsettings request payload. |
2026-04-14 | |
| CVE-2026-2402 | 6.9 | MEDIUM | CWE-307 | 0.1% p15 | 4.83 | CWE-307 Improper Restriction of Excessive Authentication Attempts vulnerability ...CWE-307 Improper Restriction of Excessive Authentication Attempts vulnerability exists that would allow an attacker to gain access to the user account by performing an arbitrary number of authentication attempts with different credentials on a sequence of requests to multiple endpoints. |
2026-04-14 | |
| CVE-2026-2401 | 2.4 | LOW | CWE-532 | 0.0% p2 | 1.68 | CWE-532 Insertion of Sensitive Information into Log File vulnerability exists th...CWE-532 Insertion of Sensitive Information into Log File vulnerability exists that could cause confidential information to be exposed when a Web Admin user executes a malicious file provided by an attacker. |
2026-04-14 | |
| CVE-2026-2400 | 5.3 | MEDIUM | CWE-93 | 0.0% p14 | 3.71 | CWE-93 Improper Neutralization of CRLF Sequences ('CRLF Injection') vulnerabilit...CWE-93 Improper Neutralization of CRLF Sequences ('CRLF Injection') vulnerability exists that could cause application user credentials to reset when a Web Admin user alters the POST /setPCBEDesc request payload. |
2026-04-14 | |
| CVE-2026-2399 | 6.9 | MEDIUM | CWE-22 | 0.0% p5 | 4.83 | CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traver...CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability exists that could cause critical files overwritten with text data when a Web Admin user alters the POST /REST/upssleep request payload. |
2026-04-14 | |
| CVE-2026-27316 | 2.7 | LOW | CWE-522 | 0.0% p6 | 1.89 | A insufficiently protected credentials vulnerability in Fortinet FortiSandbox 5....A insufficiently protected credentials vulnerability in Fortinet FortiSandbox 5.0.0 through 5.0.5, FortiSandbox 4.4 all versions, FortiSandbox PaaS 5.0.1 through 5.0.5 may allow an authenticathed administrator to read LDAP server credentials via client-side inspection. |
2026-04-14 | |
| CVE-2026-25691 | 6.7 | MEDIUM | CWE-22 | 0.0% p11 | 4.69 | A improper limitation of a pathname to a restricted directory ('path traversal')...A improper limitation of a pathname to a restricted directory ('path traversal') vulnerability in Fortinet FortiSandbox 5.0.0 through 5.0.5, FortiSandbox 4.4.0 through 4.4.8, FortiSandbox 4.2 all versions, FortiSandbox Cloud 5.0.4, FortiSandbox PaaS 5.0.4 may allow a privileged attacker with super-admin profile and CLI access to delete an arbitrary directory via HTTP crafted requests. |
2026-04-14 | |
| CVE-2026-23708 | 7.5 | HIGH | CWE-287 | 0.1% p18 | 5.25 | A improper authentication vulnerability in Fortinet FortiSOAR PaaS 7.6.0 through...A improper authentication vulnerability in Fortinet FortiSOAR PaaS 7.6.0 through 7.6.3, FortiSOAR PaaS 7.5.0 through 7.5.2, FortiSOAR on-premise 7.6.0 through 7.6.3, FortiSOAR on-premise 7.5.0 through 7.5.2 may allow an unauthenticated attacker to bypass authentication via replaying captured 2FA request. The attack requires being able to intercept and decrypt authentication traffic and precise timing to replay the request before token expiration, which raises the attack complexity. |
2026-04-14 | |
| CVE-2026-22828 | 8.1 | HIGH | CWE-122 | 0.1% p33 | 5.67 | A heap-based buffer overflow vulnerability in Fortinet FortiAnalyzer Cloud 7.6.2...A heap-based buffer overflow vulnerability in Fortinet FortiAnalyzer Cloud 7.6.2 through 7.6.4, FortiManager Cloud 7.6.2 through 7.6.4 may allow a remote unauthenticated attacker to execute arbitrary code or commands via specifically crafted requests. Successful exploitation would require a large amount of effort in preparation because of ASLR and network segmentation |
2026-04-14 | |
| CVE-2026-22576 | 4.3 | MEDIUM | CWE-257 | 0.0% p10 | 3.01 | A storing passwords in a recoverable format vulnerability in Fortinet FortiSOAR ...A storing passwords in a recoverable format vulnerability in Fortinet FortiSOAR PaaS 7.6.0 through 7.6.4, FortiSOAR PaaS 7.5.0 through 7.5.2, FortiSOAR PaaS 7.4 all versions, FortiSOAR PaaS 7.3 all versions, FortiSOAR on-premise 7.6.0 through 7.6.4, FortiSOAR on-premise 7.5.0 through 7.5.2, FortiSOAR on-premise 7.4 all versions, FortiSOAR on-premise 7.3 all versions may allow an authenticated remote attacker to retrieve passwords for multiple installed connectors via server address modification in connector configuration. |
2026-04-14 | |
| CVE-2026-22574 | 4.1 | MEDIUM | CWE-257 | 0.0% p9 | 2.87 | A storing passwords in a recoverable format vulnerability in Fortinet FortiSOAR ...A storing passwords in a recoverable format vulnerability in Fortinet FortiSOAR PaaS 7.6.0 through 7.6.4, FortiSOAR PaaS 7.5.0 through 7.5.2, FortiSOAR PaaS 7.4 all versions, FortiSOAR PaaS 7.3 all versions, FortiSOAR on-premise 7.6.0 through 7.6.4, FortiSOAR on-premise 7.5.0 through 7.5.2, FortiSOAR on-premise 7.4 all versions, FortiSOAR on-premise 7.3 all versions may allow an authenticated remote attacker to retrieve Service account password via server address modification in LDAP configuration. |
2026-04-14 | |
| CVE-2026-22573 | 6.5 | MEDIUM | CWE-22 | 0.1% p16 | 4.55 | An improper limitation of a pathname to a restricted directory ('path traversal'...An improper limitation of a pathname to a restricted directory ('path traversal') vulnerability in Fortinet FortiSOAR PaaS 7.6.0 through 7.6.3, FortiSOAR PaaS 7.5 all versions, FortiSOAR PaaS 7.4 all versions, FortiSOAR PaaS 7.3 all versions, FortiSOAR on-premise 7.6.0 through 7.6.3, FortiSOAR on-premise 7.5 all versions, FortiSOAR on-premise 7.4 all versions, FortiSOAR on-premise 7.3 all versions may allow an authenticated remote attacker to perform path traversal attack via File Content Extraction actions. |
2026-04-14 | |
| CVE-2026-22155 | 6.5 | MEDIUM | CWE-319 | 0.0% p3 | 4.55 | A cleartext transmission of sensitive information vulnerability in Fortinet Fort...A cleartext transmission of sensitive information vulnerability in Fortinet FortiSOAR PaaS 7.6.0 through 7.6.3, FortiSOAR PaaS 7.5.0 through 7.5.2, FortiSOAR PaaS 7.4 all versions, FortiSOAR PaaS 7.3 all versions, FortiSOAR on-premise 7.6.0 through 7.6.2, FortiSOAR on-premise 7.5.0 through 7.5.1, FortiSOAR on-premise 7.4 all versions, FortiSOAR on-premise 7.3 all versions may allow attacker to information disclosure via <insert attack vector here> |
2026-04-14 | |
| CVE-2026-22154 | 4.6 | MEDIUM | CWE-79 | 0.0% p9 | 3.22 | An improper neutralization of input during web page generation ('cross-site scri...An improper neutralization of input during web page generation ('cross-site scripting') vulnerability in Fortinet FortiSOAR PaaS 7.6.0 through 7.6.3, FortiSOAR PaaS 7.5.0 through 7.5.2, FortiSOAR PaaS 7.4 all versions, FortiSOAR PaaS 7.3 all versions, FortiSOAR on-premise 7.6.0 through 7.6.3, FortiSOAR on-premise 7.5.0 through 7.5.2, FortiSOAR on-premise 7.4 all versions, FortiSOAR on-premise 7.3 all versions may allow an authenticated remote attacker to perform a stored cross site scripting (XSS) attack via crafted HTTP Requests. |
2026-04-14 | |
| CVE-2026-21742 | 5.7 | MEDIUM | CWE-319 | 0.0% p6 | 3.99 | A cleartext transmission of sensitive information vulnerability in Fortinet Fort...A cleartext transmission of sensitive information vulnerability in Fortinet FortiSOAR PaaS 7.6.0 through 7.6.3, FortiSOAR PaaS 7.5.0 through 7.5.2, FortiSOAR PaaS 7.4 all versions, FortiSOAR PaaS 7.3 all versions, FortiSOAR on-premise 7.6.0 through 7.6.2, FortiSOAR on-premise 7.5.0 through 7.5.1, FortiSOAR on-premise 7.4 all versions, FortiSOAR on-premise 7.3 all versions may allow an authenticated attacker to view cleartext password in response for Secure Message Exchange and Radius queries, if configured |
2026-04-14 | |
| CVE-2026-21741 | 2.4 | LOW | CWE-601 | 0.0% p9 | 1.68 | An URL Redirection to Untrusted Site ('Open Redirect') vulnerability [CWE-601] v...An URL Redirection to Untrusted Site ('Open Redirect') vulnerability [CWE-601] vulnerability in Fortinet FortiNAC-F 7.6.0 through 7.6.5, FortiNAC-F 7.4 all versions, FortiNAC-F 7.2 all versions may allow a remote privileged attacker with system administrator role to redirect users to an arbitrary website via crafted CSV file. |
2026-04-14 | |
| CVE-2025-68649 | 6.0 | MEDIUM | CWE-22 | 0.0% p11 | 4.20 | An improper limitation of a pathname to a restricted directory ('path traversal'...An improper limitation of a pathname to a restricted directory ('path traversal') vulnerability in Fortinet FortiAnalyzer 7.6.0 through 7.6.4, FortiAnalyzer 7.4.0 through 7.4.7, FortiAnalyzer 7.2 all versions, FortiAnalyzer 7.0 all versions, FortiAnalyzer Cloud 7.6.0 through 7.6.4, FortiAnalyzer Cloud 7.4.0 through 7.4.7, FortiAnalyzer Cloud 7.2 all versions, FortiAnalyzer Cloud 7.0 all versions, FortiManager 7.6.0 through 7.6.4, FortiManager 7.4.0 through 7.4.7, FortiManager 7.2 all versions, FortiManager 7.0 all versions, FortiManager Cloud 7.6.0 through 7.6.4, FortiManager Cloud 7.4.0 through 7.4.7, FortiManager Cloud 7.2 all versions, FortiManager Cloud 7.0 all versions may allow a privileged attacker to delete files from the underlying filesystem via crafted CLI requests. |
2026-04-14 | |
| CVE-2025-65136 | 6.1 | MEDIUM | CWE-79 | 0.0% p8 | 4.27 | In manikandan580 School-management-system 1.0, a reflected XSS vulnerability exi...In manikandan580 School-management-system 1.0, a reflected XSS vulnerability exists in /studentms/admin/contact-us.php via the pagedes POST parameter. |
2026-04-14 | |
| CVE-2025-65135 | 9.8 | CRITICAL | CWE-89 | 0.0% p8 | 6.86 | In manikandan580 School-management-system 1.0, a time-based blind SQL injection ...In manikandan580 School-management-system 1.0, a time-based blind SQL injection vulnerability exists in /studentms/admin/between-date-reprtsdetails.php through the fromdate POST parameter. |
2026-04-14 | |
| CVE-2025-65134 | 0.0 | NONE | N/A | 0.0% p4 | 0.00 | In manikandan580 School-management-system 1.0, a reflected cross-site scripting ...In manikandan580 School-management-system 1.0, a reflected cross-site scripting (XSS) vulnerability exists in /studentms/admin/contact-us.php via the email POST parameter. |
2026-04-14 | |
| CVE-2025-65133 | 0.0 | NONE | N/A | 0.0% p8 | 0.00 | A SQL injection vulnerability exists in the School Management System (version 1....A SQL injection vulnerability exists in the School Management System (version 1.0) by manikandan580. An unauthenticated or authenticated remote attacker can supply a crafted HTTP request to the affected endpoint to manipulate SQL query logic and extract sensitive database information. |
2026-04-14 | |
| CVE-2025-65132 | 6.1 | MEDIUM | CWE-79 | 0.0% p8 | 4.27 | alandsilva26 hotel-management-php 1.0 is vulnerable to Cross Site Scripting (XSS...alandsilva26 hotel-management-php 1.0 is vulnerable to Cross Site Scripting (XSS) in /public/admin/edit_room.php which allows an attacker to inject and execute arbitrary JavaScript via the room_id GET parameter. |
2026-04-14 | |
| CVE-2025-63939 | 9.8 | CRITICAL | CWE-89 | 0.0% p8 | 6.86 | Improper input handling in /Grocery/search_products_itname.php, in anirudhkannan...Improper input handling in /Grocery/search_products_itname.php, in anirudhkannan Grocery Store Management System 1.0, allows SQL injection via the sitem_name POST parameter. |
2026-04-14 | |
| CVE-2025-61886 | 5.4 | MEDIUM | CWE-79 | 0.0% p8 | 3.78 | An Improper Neutralization of Input During Web Page Generation ('Cross-site Scri...An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability [CWE-79] vulnerability in Fortinet FortiSandbox 5.0.0 through 5.0.4, FortiSandbox PaaS 5.0.0 through 5.0.4 may allow an attacker to perform an XSS attack via crafted HTTP requests. |
2026-04-14 | |
| CVE-2025-61848 | 7.2 | HIGH | CWE-89 | 0.0% p8 | 5.04 | An improper neutralization of special elements used in an sql command ('sql inje...An improper neutralization of special elements used in an sql command ('sql injection') vulnerability in Fortinet FortiAnalyzer 7.6.0 through 7.6.4, FortiAnalyzer 7.4.0 through 7.4.8, FortiAnalyzer 7.2 all versions, FortiAnalyzer 7.0 all versions, FortiAnalyzer Cloud 7.6.0 through 7.6.4, FortiAnalyzer Cloud 7.4.0 through 7.4.8, FortiAnalyzer Cloud 7.2 all versions, FortiAnalyzer Cloud 7.0 all versions, FortiManager 7.6.0 through 7.6.4, FortiManager 7.4.0 through 7.4.8, FortiManager 7.2 all versions, FortiManager 7.0 all versions, FortiManager Cloud 7.6.0 through 7.6.4, FortiManager Cloud 7.4.0 through 7.4.8, FortiManager Cloud 7.2 all versions, FortiManager Cloud 7.0 all versions may allow a privileged authenticated attacker to execute unauthorized code or commands via JSON RPC API |
2026-04-14 | |
| CVE-2025-61624 | 6.0 | MEDIUM | CWE-22 | 0.0% p6 | 4.20 | An Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'...An Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') [CWE-22] vulnerability in Fortinet FortiOS 7.6.0 through 7.6.4, FortiOS 7.4.0 through 7.4.9, FortiOS 7.2 all versions, FortiOS 7.0 all versions, FortiOS 6.4 all versions, FortiPAM 1.7.0, FortiPAM 1.6 all versions, FortiPAM 1.5 all versions, FortiPAM 1.4 all versions, FortiPAM 1.3 all versions, FortiPAM 1.2 all versions, FortiPAM 1.1 all versions, FortiPAM 1.0 all versions, FortiProxy 7.6.0 through 7.6.4, FortiProxy 7.4.0 through 7.4.11, FortiProxy 7.2 all versions, FortiProxy 7.0 all versions, FortiSwitchManager 7.2.0 through 7.2.7, FortiSwitchManager 7.0.0 through 7.0.6 may allow an authenticated attacker with admin profile and at least read-write permissions to write or delete arbitrary files via specific CLI commands. |
2026-04-14 | |
| CVE-2025-59809 | 4.3 | MEDIUM | CWE-918 | 0.0% p7 | 3.01 | A server-side request forgery (ssrf) vulnerability [CWE-918] vulnerability in Fo...A server-side request forgery (ssrf) vulnerability [CWE-918] vulnerability in Fortinet FortiSOAR PaaS 7.6.4, FortiSOAR PaaS 7.6.0 through 7.6.2, FortiSOAR PaaS 7.5.0 through 7.5.2, FortiSOAR PaaS 7.4 all versions, FortiSOAR PaaS 7.3 all versions, FortiSOAR on-premise 7.6.4, FortiSOAR on-premise 7.6.0 through 7.6.2, FortiSOAR on-premise 7.5.0 through 7.5.2, FortiSOAR on-premise 7.4 all versions, FortiSOAR on-premise 7.3 all versions may allow an authenticated attacker to discover services running on local ports via crafted requests. |
2026-04-14 | |
| CVE-2025-53847 | 6.5 | MEDIUM | CWE-306 | 0.0% p2 | 4.55 | A missing authentication for critical function vulnerability in Fortinet FortiOS...A missing authentication for critical function vulnerability in Fortinet FortiOS 7.6.0 through 7.6.3, FortiOS 7.4.0 through 7.4.8, FortiOS 7.2.0 through 7.2.11, FortiOS 7.0.0 through 7.0.17, FortiOS 6.4 all versions, FortiOS 6.2.9 through 6.2.17 allows attacker to execute unauthorized code or commands via specially crafted packets. |
2026-04-14 | |
| CVE-2024-23104 | 5.4 | MEDIUM | CWE-200 | 0.0% p13 | 3.78 | An exposure of sensitive information to an unauthorized actor vulnerability in F...An exposure of sensitive information to an unauthorized actor vulnerability in Fortinet FortiNDR 7.6.0, FortiNDR 7.4.0 through 7.4.8, FortiNDR 7.2 all versions, FortiNDR 7.1 all versions, FortiNDR 7.0 all versions, FortiVoice 7.0.0 through 7.0.1 may allow a remote authenticated attacker with at least read-only permission on system maintenance to access backup information via crafted HTTP requests |
2026-04-14 | |
| CVE-2026-4914 | 5.4 | MEDIUM | CWE-79 | 0.1% p21 | 3.78 | Stored XSS in Ivanti N-ITSM before version 2025.4 allows a remote authenticated ...Stored XSS in Ivanti N-ITSM before version 2025.4 allows a remote authenticated attacker to obtain limited information from other user sessions. User interaction is required. |
2026-04-14 | |
| CVE-2026-4913 | 5.7 | MEDIUM | CWE-424 | 0.1% p28 | 3.99 | Improper protection of an alternate path in Ivanti N-ITSM before version 2025.4 ...Improper protection of an alternate path in Ivanti N-ITSM before version 2025.4 allows a remote authenticated attacker to retain access when their account has been disabled. |
2026-04-14 | |
| CVE-2026-4369 | 7.1 | HIGH | CWE-79 | 0.0% p5 | 4.97 | A maliciously crafted HTML payload in an assembly variant name, when displayed d...A maliciously crafted HTML payload in an assembly variant name, when displayed during the delete confirmation dialog and clicked by a user, can trigger a Stored Cross-site Scripting (XSS) vulnerability in the Autodesk Fusion desktop application. A malicious actor may leverage this vulnerability to read local files or execute arbitrary code in the context of the current process. |
2026-04-14 | |
| CVE-2026-4345 | 7.1 | HIGH | CWE-79 | 0.0% p5 | 4.97 | A maliciously crafted HTML payload, stored in a design name and exported to CSV,...A maliciously crafted HTML payload, stored in a design name and exported to CSV, can trigger a Stored Cross-site Scripting (XSS) vulnerability in the Autodesk Fusion desktop application. A malicious actor may leverage this vulnerability to read local files or execute arbitrary code in the context of the current process. |
2026-04-14 | |
| CVE-2026-4344 | 7.1 | HIGH | CWE-79 | 0.0% p5 | 4.97 | A maliciously crafted HTML payload in a component name, when displayed during th...A maliciously crafted HTML payload in a component name, when displayed during the delete confirmation dialog and clicked by a user, can trigger a Stored Cross-site Scripting (XSS) vulnerability in the Autodesk Fusion desktop application. A malicious actor may leverage this vulnerability to read local files or execute arbitrary code in the context of the current process. |
2026-04-14 | |
| CVE-2026-37980 | 6.9 | MEDIUM | CWE-79 | 0.1% p15 | 4.83 | A flaw was found in Keycloak, specifically in the organization selection login p...A flaw was found in Keycloak, specifically in the organization selection login page. A remote attacker with `manage-realm` or `manage-organizations` administrative privileges can exploit a Stored Cross-Site Scripting (XSS) vulnerability. This flaw occurs because the `organization.alias` is placed into an inline JavaScript `onclick` handler, allowing a crafted JavaScript payload to execute in a user's browser when they view the login page. Successful exploitation enables arbitrary JavaScript execution, potentially leading to session theft, unauthorized account actions, or further attacks against users of the affected realm. |
2026-04-14 | |
| CVE-2026-37602 | 2.7 | LOW | CWE-89 | 0.0% p5 | 1.89 | SourceCodester Patient Appointment Scheduler System v1.0 is vulnerable to SQL In...SourceCodester Patient Appointment Scheduler System v1.0 is vulnerable to SQL Injection in the file /scheduler/admin/user/manage_user.php. |
2026-04-14 | |
| CVE-2026-37601 | 2.7 | LOW | CWE-89 | 0.0% p5 | 1.89 | SourceCodester Patient Appointment Scheduler System v1.0 is vulnerable to SQL In...SourceCodester Patient Appointment Scheduler System v1.0 is vulnerable to SQL Injection in the file /scheduler/admin/appointments/manage_appointment.php. |
2026-04-14 | |
| CVE-2026-37600 | 2.7 | LOW | CWE-89 | 0.0% p5 | 1.89 | SourceCodester Patient Appointment Scheduler System v1.0 is vulnerable to SQL In...SourceCodester Patient Appointment Scheduler System v1.0 is vulnerable to SQL Injection in the file /scheduler/admin/appointments/view_details.php. |
2026-04-14 | |
| CVE-2026-37598 | 2.7 | LOW | CWE-89 | 0.0% p13 | 1.89 | SourceCodester Patient Appointment Scheduler System v1.0 is vulnerable to arbitr...SourceCodester Patient Appointment Scheduler System v1.0 is vulnerable to arbitrary code execution (RCE) via /scheduler/classes/SystemSettings.php?f=update_settings. |
2026-04-14 | |
| CVE-2026-37597 | 2.7 | LOW | CWE-89 | 0.0% p5 | 1.89 | SourceCodester Online Employees Work From Home Attendance System v1.0 is vulnera...SourceCodester Online Employees Work From Home Attendance System v1.0 is vulnerable to SQL Injection in the file /wfh_attendance/admin/attendance_list.php. |
2026-04-14 | |
| CVE-2026-37596 | 2.7 | LOW | CWE-89 | 0.0% p5 | 1.89 | SourceCodester Online Employees Work From Home Attendance System v1.0 is vulnera...SourceCodester Online Employees Work From Home Attendance System v1.0 is vulnerable to SQL Injection in the file /wfh_attendance/admin/manage_department.php. |
2026-04-14 | |
| CVE-2026-37595 | 2.7 | LOW | CWE-89 | 0.0% p5 | 1.89 | SourceCodester Online Employees Work From Home Attendance System v1.0 is vulnera...SourceCodester Online Employees Work From Home Attendance System v1.0 is vulnerable to SQL Injection in the file /wfh_attendance/admin/manage_employee.php. |
2026-04-14 | |
| CVE-2026-37594 | 2.7 | LOW | CWE-89 | 0.0% p5 | 1.89 | SourceCodester Online Employees Work From Home Attendance System v1.0 is vulnera...SourceCodester Online Employees Work From Home Attendance System v1.0 is vulnerable to SQL Injection in the file /wfh_attendance/admin/view_employee.php. |
2026-04-14 | |
| CVE-2026-37593 | 2.7 | LOW | CWE-89 | 0.0% p5 | 1.89 | SourceCodester Online Employees Work From Home Attendance System v1.0 is vulnera...SourceCodester Online Employees Work From Home Attendance System v1.0 is vulnerable to SQL Injection in the file /wfh_attendance/admin/view_att.php. |
2026-04-14 | |
| CVE-2026-37592 | 2.7 | LOW | CWE-89 | 0.0% p7 | 1.89 | Sourcecodester Storage Unit Rental Management System v1.0 is vulnerable to SQL i...Sourcecodester Storage Unit Rental Management System v1.0 is vulnerable to SQL in the file /storage/admin/maintenance/manage_pricing.php. |
2026-04-14 | |
| CVE-2026-37591 | 2.7 | LOW | CWE-89 | 0.0% p5 | 1.89 | Sourcecodester Storage Unit Rental Management System v1.0 is vulnerable to SQL i...Sourcecodester Storage Unit Rental Management System v1.0 is vulnerable to SQL injection in the file /storage/admin/tenants/view_details.php. |
2026-04-14 | |
| CVE-2026-37590 | 2.7 | LOW | CWE-89 | 0.0% p5 | 1.89 | SourceCodester Storage Unit Rental Management System v1.0 is vulnerable to SQL I...SourceCodester Storage Unit Rental Management System v1.0 is vulnerable to SQL Injection in the file /storage/admin/rents/manage_rent.php. |
2026-04-14 | |
| CVE-2026-37589 | 2.7 | LOW | CWE-89 | 0.0% p5 | 1.89 | SourceCodester Storage Unit Rental Management System v1.0 is vulnerable to SQL I...SourceCodester Storage Unit Rental Management System v1.0 is vulnerable to SQL Injection in the file /storage/admin/maintenance/manage_storage_unit.php. |
2026-04-14 | |
| CVE-2026-30480 | 0.0 | NONE | N/A | 0.0% p4 | 0.00 | A Local File Inclusion (LFI) vulnerability in the NFSen module (nfsen.inc.php) o...A Local File Inclusion (LFI) vulnerability in the NFSen module (nfsen.inc.php) of LibreNMS 22.11.0-23-gd091788f2 allows authenticated attackers to include arbitrary PHP files from the server filesystem via path traversal sequences in the nfsen parameter. |
2026-04-14 | |
| CVE-2025-69993 | 6.1 | MEDIUM | CWE-79 | 0.0% p8 | 4.27 | Leaflet versions up to and including 1.9.4 are vulnerable to Cross-Site Scriptin...Leaflet versions up to and including 1.9.4 are vulnerable to Cross-Site Scripting (XSS) via the bindPopup() method. This method renders user-supplied input as raw HTML without sanitization, allowing attackers to inject arbitrary JavaScript code through event handler attributes (e.g., <img src=x onerror="alert('XSS')">). When a victim views an affected map popup, the malicious script executes in the context of the victim's browser session. |
2026-04-14 | |
| CVE-2025-69893 | 0.0 | NONE | N/A | 0.0% p6 | 0.00 | A side-channel vulnerability exists in the implementation of BIP-39 mnemonic pro...A side-channel vulnerability exists in the implementation of BIP-39 mnemonic processing, as observed in Trezor One v1.13.0 to v1.14.0, Trezor T v1.13.0 to v1.14.0, and Trezor Safe v1.13.0 to v1.14.0 hardware wallets. This originates from the BIP-39 standard guidelines, which induce non-constant time execution and specific branch patterns for word searching. An attacker with physical access during the initial setup phase can collect a single side-channel trace. By utilizing profiling-based Deep Learning Side-Channel Analysis (DL-SCA), the attacker can recover the mnemonic code and subsequently steal the assets. The issue was patched. |
2026-04-14 | |
| CVE-2025-61260 | 0.0 | NONE | N/A | 0.0% p5 | 0.00 | A vulnerability was identified in OpenAI Codex CLI v0.23.0 and before that enabl...A vulnerability was identified in OpenAI Codex CLI v0.23.0 and before that enables code execution through malicious MCP (Model Context Protocol) configuration files. The attack is triggered when a user runs the codex command inside a malicious or compromised repository. Codex automatically loads project-local .env and .codex/config.toml files without requiring user confirmation, allowing attackers to embed arbitrary commands that execute immediately. |
2026-04-14 | |
| CVE-2026-31049 | 0.0 | NONE | N/A | 0.1% p28 | 0.00 | An issue in Hostbill v.2025-11-24 and 2025-12-01 allows a remote attacker to exe...An issue in Hostbill v.2025-11-24 and 2025-12-01 allows a remote attacker to execute arbitrary code and escalate privileges via the CSV registration field |
2026-04-14 | |
| CVE-2025-8095 | 9.1 | CRITICAL | CWE-257 | 0.0% p6 | 6.37 | The OECH1 prefix encoding is intended to obfuscate values across the OpenEdge pl...The OECH1 prefix encoding is intended to obfuscate values across the OpenEdge platform. It has been identified as cryptographically weak and unsuitable for stored encodings and enterprise applications. OECH1 encodings should be considered exploitable and immediately replaced by any other supported prefix encoding, all of which are based on symmetric encryption. |
2026-04-14 | |
| CVE-2026-5307 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This can...Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage. |
2026-04-14 | |
| CVE-2026-2450 | 7.4 | HIGH | CWE-520 | 0.0% p4 | 5.18 | .NET misconfiguration: use of impersonation vulnerability in upKeeper Solutions ....NET misconfiguration: use of impersonation vulnerability in upKeeper Solutions upKeeper Instant Privilege Access allows Hijacking a Privileged Thread of Execution.This issue affects upKeeper Instant Privilege Access: through 1.5.0. |
2026-04-14 | |
| CVE-2024-9168 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This can...Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage. |
2026-04-14 | |
| CVE-2026-2449 | 9.0 | CRITICAL | CWE-88 | 0.1% p21 | 6.30 | Improper neutralization of argument delimiters in a command ('argument injection...Improper neutralization of argument delimiters in a command ('argument injection') vulnerability in upKeeper Solutions upKeeper Instant Privilege Access allows Hijacking a Privileged Thread of Execution.This issue affects upKeeper Instant Privilege Access: through 1.5.0. |
2026-04-14 | |
| CVE-2026-24069 | 5.4 | MEDIUM | CWE-863 | 0.0% p1 | 3.78 | Kiuwan SAST improperly authorizes SSO logins for locally disabled mapped user ac...Kiuwan SAST improperly authorizes SSO logins for locally disabled mapped user accounts, allowing disabled users to continue accessing the application. Kiuwan Cloud was affected, and Kiuwan SAST on-premise (KOP) was affected before 2.8.2509.4. |
2026-04-14 | |
| CVE-2025-13822 | 5.3 | MEDIUM | CWE-639 | 0.0% p13 | 3.71 | MCPHub in versions below 0.11.0 is vulnerable to authentication bypass. Some end...MCPHub in versions below 0.11.0 is vulnerable to authentication bypass. Some endpoints are not protected by authentication middleware, allowing an unauthenticated attacker to perform actions in the name of other users and using their privileges. |
2026-04-14 | |
| CVE-2026-4109 | 4.3 | MEDIUM | CWE-862 | 0.0% p6 | 3.01 | The Eventin – Events Calendar, Event Booking, Ticket & Registration (AI Powered)...The Eventin – Events Calendar, Event Booking, Ticket & Registration (AI Powered) plugin for WordPress is vulnerable to unauthorized access of data due to a improper capability check on the get_item_permissions_check() function in all versions up to, and including, 4.1.8. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read arbitrary order data including customer PII (name, email, phone) by iterating order IDs. |
2026-04-14 | |
| CVE-2026-27668 | 8.7 | HIGH | CWE-266 | 0.0% p11 | 6.09 | A vulnerability has been identified in RUGGEDCOM CROSSBOW Secure Access Manager ...A vulnerability has been identified in RUGGEDCOM CROSSBOW Secure Access Manager Primary (SAM-P) (All versions < V5.8). User Administrators are allowed to administer groups they belong to. This could allow an authenticated User Administrator to escalate their own privileges and grant themselves access to any device group at any access level. |
2026-04-14 | |
| CVE-2026-25654 | 8.7 | HIGH | CWE-639 | 0.0% p13 | 6.09 | A vulnerability has been identified in SINEC NMS (All versions < V4.0 SP3). Affe...A vulnerability has been identified in SINEC NMS (All versions < V4.0 SP3). Affected products do not properly validate user authorization when processing password reset requests. This could allow an authenticated remote attacker to bypass authorization checks, leading to the ability to reset the password of any arbitrary user account. |
2026-04-14 | |
| CVE-2025-40745 | 6.3 | MEDIUM | CWE-295 | 0.0% p4 | 4.41 | A vulnerability has been identified in Siemens Software Center (All versions < V...A vulnerability has been identified in Siemens Software Center (All versions < V3.5.8.2), Simcenter 3D (All versions < V2506.6000), Simcenter Femap (All versions < V2506.0002), Simcenter STAR-CCM+ (All versions < V2602), Solid Edge SE2025 (All versions < V225.0 Update 13), Solid Edge SE2026 (All versions < V226.0 Update 04), Tecnomatix Plant Simulation (All versions < V2504.0008). Affected applications do not properly validate client certificates to connect to Analytics Service endpoint. This could allow an unauthenticated remote attacker to perform man in the middle attacks. |
2026-04-14 | |
| CVE-2026-2582 | 6.5 | MEDIUM | CWE-94 | 0.1% p24 | 4.55 | The The Germanized for WooCommerce plugin for WordPress is vulnerable to arbitra...The The Germanized for WooCommerce plugin for WordPress is vulnerable to arbitrary shortcode execution via 'account_holder' parameter in all versions up to, and including, 3.20.5. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes. |
2026-04-14 | |
| CVE-2026-3017 | 7.2 | HIGH | CWE-502 | 0.0% p11 | 5.04 | The Smart Post Show – Post Grid, Post Carousel & Slider, and List Category Posts...The Smart Post Show – Post Grid, Post Carousel & Slider, and List Category Posts plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.0.12 via deserialization of untrusted input in the import_shortcodes() function. This makes it possible for authenticated attackers, with Administrator-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present. |
2026-04-14 | |
| CVE-2026-4479 | 4.4 | MEDIUM | CWE-79 | 0.0% p5 | 3.08 | The WholeSale Products Dynamic Pricing Management WooCommerce plugin for WordPre...The WholeSale Products Dynamic Pricing Management WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. |
2026-04-14 | |
| CVE-2026-4059 | 6.4 | MEDIUM | CWE-79 | 0.0% p10 | 4.48 | The ShopLentor plugin for WordPress is vulnerable to Stored Cross-Site Scripting...The ShopLentor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the woolentor_quickview_button shortcode's button_text attribute in all versions up to, and including, 3.3.5. This is due to insufficient input sanitization and missing output escaping on user-supplied shortcode attributes. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-04-14 | |
| CVE-2026-40315 | 7.2 | HIGH | CWE-89 | 0.0% p5 | 5.04 | PraisonAI is a multi-agent teams system. Prior to 4.5.133, there is an SQL ident...PraisonAI is a multi-agent teams system. Prior to 4.5.133, there is an SQL identifier injection vulnerability in SQLiteConversationStore where the table_prefix configuration value is directly concatenated into SQL queries via f-strings without any validation or sanitization. Since SQL identifiers cannot be safely parameterized, an attacker who controls the table_prefix value (e.g., through from_yaml or from_dict configuration input) can inject arbitrary SQL fragments that alter query structure. This enables unauthorized data access, such as reading internal SQLite tables like sqlite_master, and manipulation of query results through techniques like UNION-based injection. The vulnerability propagates from configuration input in config.py, through factory.py, to the SQL query construction in sqlite.py. Exploitation requires the ability to influence configuration input, and successful exploitation leads to internal schema disclosure and full query result tampering. This issue has been fixed in version 4.5.133. |
2026-04-14 | |
| CVE-2026-40313 | 9.1 | CRITICAL | CWE-829 | 0.0% p8 | 6.37 | PraisonAI is a multi-agent teams system. In versions 4.5.139 and below, the GitH...PraisonAI is a multi-agent teams system. In versions 4.5.139 and below, the GitHub Actions workflows are vulnerable to ArtiPACKED attack, a known credential leakage vector caused by using actions/checkout without setting persist-credentials: false. By default, actions/checkout writes the GITHUB_TOKEN (and sometimes ACTIONS_RUNTIME_TOKEN) into the .git/config file for persistence, and if any subsequent workflow step uploads artifacts (build outputs, logs, test results, etc.), these tokens can be inadvertently included. Since PraisonAI is a public repository, any user with read access can download these artifacts and extract the leaked tokens, potentially enabling an attacker to push malicious code, poison releases and PyPI/Docker packages, steal repository secrets, and execute a full supply chain compromise affecting all downstream users. The issue spans numerous workflow and action files across .github/workflows/ and .github/actions/. This issue has been fixed in version 4.5.140. |
2026-04-14 | |
| CVE-2026-40289 | 9.1 | CRITICAL | CWE-306 | 0.1% p17 | 6.37 | PraisonAI is a multi-agent teams system. In versions below 4.5.139 of PraisonAI ...PraisonAI is a multi-agent teams system. In versions below 4.5.139 of PraisonAI and 1.5.140 of praisonaiagents, the browser bridge (praisonai browser start) is vulnerable to unauthenticated remote session hijacking due to missing authentication and a bypassable origin check on its /ws WebSocket endpoint. The server binds to 0.0.0.0 by default and only validates the Origin header when one is present, meaning any non-browser client that omits the header is accepted without restriction. An unauthenticated network attacker can connect, send a start_session message, and the server will route it to the first idle browser-extension WebSocket (effectively hijacking that session) and then broadcast all resulting automation actions and outputs back to the attacker. This enables unauthorized remote control of connected browser automation sessions, leakage of sensitive page context and automation results, and misuse of model-backed browser actions in any environment where the bridge is network-reachable. This issue has been fixed in versions 4.5.139 of PraisonAI and 1.5.140 of praisonaiagents. |
2026-04-14 | |
| CVE-2026-40288 | 9.8 | CRITICAL | CWE-78 | 0.1% p20 | 6.86 | PraisonAI is a multi-agent teams system. In versions below 4.5.139 of PraisonAI ...PraisonAI is a multi-agent teams system. In versions below 4.5.139 of PraisonAI and 1.5.140 of praisonaiagents, the workflow engine is vulnerable to arbitrary command and code execution through untrusted YAML files. When praisonai workflow run <file.yaml> loads a YAML file with type: job, the JobWorkflowExecutor in job_workflow.py processes steps that support run: (shell commands via subprocess.run()), script: (inline Python via exec()), and python: (arbitrary Python script execution)—all without any validation, sandboxing, or user confirmation. The affected code paths include action_run() in workflow.py and _exec_shell(), _exec_inline_python(), and _exec_python_script() in job_workflow.py. An attacker who can supply or influence a workflow YAML file (particularly in CI pipelines, shared repositories, or multi-tenant deployment environments) can achieve full arbitrary command execution on the host system, compromising the machine and any accessible data or credentials. This issue has been fixed in versions 4.5.139 of PraisonAI and 1.5.140 of praisonaiagents. |
2026-04-14 | |
| CVE-2026-40287 | 8.4 | HIGH | CWE-94 | 0.0% p6 | 5.88 | PraisonAI is a multi-agent teams system. Versions 4.5.138 and below are vulnerab...PraisonAI is a multi-agent teams system. Versions 4.5.138 and below are vulnerable to arbitrary code execution through automatic, unsanitized import of a tools.py file from the current working directory. Components including call.py (import_tools_from_file()), tool_resolver.py (_load_local_tools()), and CLI tool-loading paths blindly import ./tools.py at startup without any validation, sandboxing, or user confirmation. An attacker who can place a malicious tools.py in the directory where PraisonAI is launched (such as through a shared project, cloned repository, or writable workspace) achieves immediate arbitrary Python code execution in the host environment. This compromises the full PraisonAI process, the host system, and any connected data or credentials. This issue has been fixed in version 4.5.139. |
2026-04-14 | |
| CVE-2026-1607 | 6.4 | MEDIUM | CWE-79 | 0.0% p8 | 4.48 | The Surbma | Booking.com Shortcode plugin for WordPress is vulnerable to Stored ...The Surbma | Booking.com Shortcode plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's `surbma-bookingcom` shortcode in all versions up to, and including, 2.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-04-14 | |
| CVE-2026-6264 | 9.8 | CRITICAL | N/A | 0.2% p46 | 6.87 | A critical vulnerability in the Talend JobServer and Talend Runtime allows unaut...A critical vulnerability in the Talend JobServer and Talend Runtime allows unauthenticated remote code execution via the JMX monitoring port. The attack vector is the JMX monitoring port of the Talend JobServer. The vulnerability can be mitigated for the Talend JobServer by requiring TLS client authentication for the monitoring port; however, the patch must be applied for full mitigation. For Talend ESB Runtime, the vulnerability can be mitigated by disabling the JobServer JMX monitoring port, which is disabled by default from the R2024-07-RT patch. |
2026-04-14 | |
| CVE-2026-6227 | 7.2 | HIGH | CWE-22 | 0.3% p54 | 5.05 | The BackWPup plugin for WordPress is vulnerable to Local File Inclusion via the ...The BackWPup plugin for WordPress is vulnerable to Local File Inclusion via the `block_name` parameter of the `/wp-json/backwpup/v1/getblock` REST endpoint in all versions up to, and including, 5.6.6 due to a non-recursive `str_replace()` sanitization of path traversal sequences. This makes it possible for authenticated attackers, with Administrator-level access and above, to include arbitrary PHP files on the server via crafted traversal sequences (e.g., `....//`), which can be leveraged to read sensitive files such as `wp-config.php` or achieve remote code execution in certain configurations. Administrators have the ability to grant individual users permission to handle backups, which may then allow lower-level users to exploit this vulnerability. |
2026-04-14 | |
| CVE-2026-4388 | 7.2 | HIGH | CWE-79 | 0.1% p21 | 5.04 | The Form Maker by 10Web plugin for WordPress is vulnerable to Stored Cross-Site ...The Form Maker by 10Web plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Matrix field (Text Box input type) in form submissions in all versions up to, and including, 1.15.40. This is due to insufficient input sanitization (`sanitize_text_field` strips tags but not quotes) and missing output escaping when rendering submission data in the admin Submissions view. This makes it possible for unauthenticated attackers to inject arbitrary JavaScript through a form submission that executes in the browser of an administrator who views the submission details. |
2026-04-14 | |
| CVE-2026-34984 | 7.1 | HIGH | CWE-200 | 0.0% p11 | 4.97 | External Secrets Operator reads information from a third-party service and autom...External Secrets Operator reads information from a third-party service and automatically injects the values as Kubernetes Secrets. Versions 2.2.0 and below contain a vulnerability in runtime/template/v2/template.go where the v2 template engine removes env and expandenv from Sprig's TxtFuncMap() but leaves the getHostByName function accessible to user-controlled templates. Since ESO executes templates within the controller process, an attacker who can create or update templated ExternalSecret resources can invoke controller-side DNS lookups using secret-derived values. This creates a DNS exfiltration primitive, allowing fetched secret material to be leaked via DNS queries without requiring direct outbound network access from the attacker's workload. The impact is a confidentiality issue, particularly in environments where untrusted or lower-trust users can author templated ExternalSecret resources and the controller has DNS resolution capability. This issue has been fixed in version 2.3.0. |
2026-04-14 | |
| CVE-2026-4365 | 9.1 | CRITICAL | CWE-862 | 0.1% p16 | 6.37 | The LearnPress plugin for WordPress is vulnerable to unauthorized data deletion ...The LearnPress plugin for WordPress is vulnerable to unauthorized data deletion due to a missing capability check on the `delete_question_answer()` function in all versions up to, and including, 4.3.2.8. The plugin exposes a `wp_rest` nonce in public frontend HTML (`lpData`) to unauthenticated visitors, and uses that nonce as the only security gate for the `lp-load-ajax` AJAX dispatcher. The `delete_question_answer` action has no capability or ownership check. This makes it possible for unauthenticated attackers to delete any quiz answer option by sending a crafted POST request with a publicly available nonce. |
2026-04-14 | |
| CVE-2026-4352 | 7.5 | HIGH | CWE-89 | 0.1% p19 | 5.25 | The JetEngine plugin for WordPress is vulnerable to SQL Injection via the Custom...The JetEngine plugin for WordPress is vulnerable to SQL Injection via the Custom Content Type (CCT) REST API search endpoint in all versions up to, and including, 3.8.6.1. This is due to the `_cct_search` parameter being interpolated directly into a SQL query string via `sprintf()` without sanitization or use of `$wpdb->prepare()`. WordPress REST API's `wp_unslash()` call on `$_GET` strips the `wp_magic_quotes()` protection, allowing single-quote-based injection. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. The Custom Content Types module must be enabled with at least one CCT configured with a public REST GET endpoint for exploitation. |
2026-04-14 | |
| CVE-2026-39426 | 5.1 | MEDIUM | CWE-79 | 0.0% p14 | 3.57 | MaxKB is an open-source AI assistant for enterprise. Versions 2.7.1 and below co...MaxKB is an open-source AI assistant for enterprise. Versions 2.7.1 and below contain a Stored Cross-Site Scripting (XSS) vulnerability where the frontend's MdRenderer.vue component parses custom <iframe_render> tags from LLM responses or Application Prologue configurations, bypassing standard Markdown sanitization and XSS filtering. The unsanitized HTML content is passed to the IframeRender.vue component, which renders it directly into an <iframe> via the srcdoc attribute configured with sandbox="allow-scripts allow-same-origin". This can be a dangerous combination, allowing injected scripts to escape the iframe and execute JavaScript in the parent window using window.parent. Since the Prologue is rendered for any user visiting an application's chat interface, this results in a high-impact Stored XSS that can lead to session hijacking, unauthorized actions, and sensitive data exposure. This issue has been fixed in version 2.8.0. |
2026-04-14 | |
| CVE-2026-39425 | 5.1 | MEDIUM | CWE-80 | 0.1% p21 | 3.57 | MaxKB is an open-source AI assistant for enterprise. Versions 2.7.1 and below co...MaxKB is an open-source AI assistant for enterprise. Versions 2.7.1 and below contain a Stored Cross-Site Scripting (XSS) vulnerability that allows authenticated users to inject arbitrary HTML and JavaScript into the Application prologue (Opening Remarks) field by wrapping malicious payloads in <html_rander> tags. The backend fails to sanitize or encode HTML entities in the prologue field when applications are created or updated via the /admin/api/workspace/{workspace_id}/application endpoint, storing the raw payload directly in the database. The frontend then renders this content using an innerHTML-equivalent mechanism, trusting <html_rander>-wrapped content to be safe, which enables persistent DOM-based Stored XSS execution against any visitor who opens the affected chatbot interface. Exploitation can lead to session hijacking, unauthorized actions performed on behalf of victims (such as deleting workspaces or applications), and sensitive data exposure. This issue has been fixed in version 2.8.0. |
2026-04-14 | |
| CVE-2026-39419 | 3.1 | LOW | CWE-74 | 0.0% p14 | 2.17 | MaxKB is an open-source AI assistant for enterprise. In versions 2.7.1 and below...MaxKB is an open-source AI assistant for enterprise. In versions 2.7.1 and below, an authenticated user can bypass sandbox result validation and spoof tool execution results by exploiting Python frame introspection to read the wrapper's UUID from its bytecode constants, then writing a forged result directly to file descriptor 1 (bypassing stdout redirection). By calling sys.exit(0), the attacker terminates the wrapper before it prints the legitimate output, causing the MaxKB service to parse and trust the spoofed response as the genuine tool result. This issue has been fixed in version 2.8.0. |
2026-04-14 | |
| CVE-2026-34225 | 4.3 | MEDIUM | CWE-918 | 0.0% p6 | 3.01 | Open WebUI is a self-hosted artificial intelligence platform designed to operate...Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Versions 0.7.2 and below contain a Blind Server Side Request Forgery in the functionality that allows editing an image via a prompt. The affected function performs a GET request to a user-provided URL with no restriction on the domain, allowing the local address space to be accessed. Since the SSRF is blind (the response cannot be read), the primary impact is port scanning of the local network, as whether a port is open can be determined based on whether the GET request succeeds or fails. These response differentials can be automated to iterate through the entire port range and identify open ports. If the service running on an open port can be inferred, an attacker may be able to interact with it in a meaningful way, provided the service offers state-changing GET request endpoints. This issue was unresolved at the time of publication. |
2026-04-14 | |
| CVE-2026-39424 | 5.3 | MEDIUM | CWE-1236 | 0.1% p18 | 3.71 | MaxKB is an open-source AI assistant for enterprise. In versions 2.7.1 and below...MaxKB is an open-source AI assistant for enterprise. In versions 2.7.1 and below, the chat export feature is vulnerable to Improper Neutralization of Formula Elements in a CSV File. When an administrator exports the application chat history to an Excel file (.xlsx) via the /admin/api/workspace/{workspace_id}/application/{application_id}/chat/export endpoint, strings starting with formula characters are written directly without proper sanitization. Opening this file in spreadsheet applications like Microsoft Excel can lead to Arbitrary Code Execution (RCE) on the administrator's workstation via Dynamic Data Exchange (DDE). The issue is a variant of CVE-2025-4546, which fixed the exact same pattern in apps/dataset/serializers/document_serializers.py but missed the application chat export sink. This issue has been fixed in version 2.8.0. |
2026-04-14 | |
| CVE-2026-39423 | 6.9 | MEDIUM | CWE-79 | 0.0% p13 | 4.83 | MaxKB is an open-source AI assistant for enterprise. Versions 2.7.1 and below co...MaxKB is an open-source AI assistant for enterprise. Versions 2.7.1 and below contain an Eval Injection vulnerability in the Markdown rendering engine that allows any user capable of interacting with the AI chat interface to execute arbitrary JavaScript in the browsers of other users, including administrators, resulting in Stored Cross-Site Scripting (XSS). This issue has been fixed in version 2.8.0. |
2026-04-14 | |
| CVE-2026-39422 | 6.9 | MEDIUM | CWE-79 | 0.0% p13 | 4.83 | MaxKB is an open-source AI assistant for enterprise. Versions 2.7.1 and below co...MaxKB is an open-source AI assistant for enterprise. Versions 2.7.1 and below contain a Stored Cross-Site Scripting (XSS) vulnerability through the application name or icon fields when creating an application. When a victim visits the public chat interface (/ui/chat/{access_token}), the ChatHeadersMiddleware retrieves the application data and directly inserts the unescaped application name and icon into the HTML response via string replacement. This allows an attacker to execute arbitrary JavaScript in the victim's browser context. This issue has been fixed in version 2.8.0. |
2026-04-14 | |
| CVE-2026-39421 | 6.3 | MEDIUM | CWE-94 | 0.1% p22 | 4.41 | MaxKB is an open-source AI assistant for enterprise. Versions 2.7.1 and below co...MaxKB is an open-source AI assistant for enterprise. Versions 2.7.1 and below contain a sandbox escape vulnerability in the ToolExecutor component. By leveraging Python's ctypes library to execute raw system calls, an authenticated attacker with workspace privileges can bypass the LD_PRELOAD-based sandbox.so module to achieve arbitrary code execution via direct kernel system calls, enabling full network exfiltration and container compromise. The library intercepts critical standard system functions such as execve, system, connect, and open. It also intercepts mprotect to prevent PROT_EXEC (executable memory) allocations within the sandboxed Python processes, but pkey_mprotect is not blocked. This issue has been fixed in version 2.8.0. |
2026-04-14 | |
| CVE-2026-39420 | 6.3 | MEDIUM | CWE-78 | 0.2% p36 | 4.41 | MaxKB is an open-source AI assistant for enterprise. In versions 2.7.1 and below...MaxKB is an open-source AI assistant for enterprise. In versions 2.7.1 and below, an incomplete sandbox protection mechanism allows an authenticated user with tool execution privileges to escape the LD_PRELOAD-based sandbox. By env command the attacker can clear the environment variables and drop the sandbox.so hook, leading to unrestricted Remote Code Execution (RCE) and network access. MaxKB restricts untrusted Python code execution via the Tool Debug API by injecting sandbox.so through the LD_PRELOAD environment variable. This intercepts sensitive C library functions (like execve, socket, open) to restrict network and file access. However, a patch allowed the /usr/bin/env utility to be executed by the sandboxed user. When an attacker is permitted to create subprocesses, they can execute the env -i python command. The -i flag instructs env to completely clear all environment variables before running the target program. This effectively drops the LD_PRELOAD environment variable. The newly spawned Python process will therefore execute natively without any sandbox hooks, bypassing all network and file system restrictions. This issue has been fixed in version 2.8.0. |
2026-04-14 | |
| CVE-2026-39418 | 5.0 | MEDIUM | CWE-918 | 0.0% p7 | 3.50 | MaxKB is an open-source AI assistant for enterprise. In versions 2.7.1 and below...MaxKB is an open-source AI assistant for enterprise. In versions 2.7.1 and below, sandbox network protection can be bypassed by using socket.sendto() with the MSG_FASTOPEN flag. This allows authenticated user with tool-editing permissions to reach internal services that are explicitly blocked by the sandbox's banned hosts configuration. MaxKB's sandbox uses LD_PRELOAD to hook the connect() function and block connections to banned IPs, but Linux's sendto() with the MSG_FASTOPEN flag can establish TCP connections directly through the kernel without ever calling connect(), completely bypassing the IP validation. Although sendto is listed in the syscall() wrapper, this is ineffective because glibc invokes the kernel syscall directly rather than routing through the hooked syscall() function. This issue has been fixed in version 2.8.0. |
2026-04-14 | |
| CVE-2026-34264 | 6.5 | MEDIUM | CWE-204 | 0.0% p8 | 4.55 | During authorization checks in SAP Human Capital Management for SAP S/4HANA, the...During authorization checks in SAP Human Capital Management for SAP S/4HANA, the system returns specific messages. Due to this, an authenticated user with low privileges could guess and enumerate the content shown, beyond their authorized scope. This leads to disclosure of sensitive information causing a high impact on confidentiality, while integrity and availability are unaffected. |
2026-04-14 | |
| CVE-2026-34262 | 5.0 | MEDIUM | CWE-522 | 0.0% p6 | 3.50 | Information Disclosure Vulnerability in SAP HANA Cockpit and HANA Database Explo...Information Disclosure Vulnerability in SAP HANA Cockpit and HANA Database Explorer |
2026-04-14 | |
| CVE-2026-34261 | 6.5 | MEDIUM | CWE-862 | 0.0% p6 | 4.55 | Due to a missing authorization check in SAP Business Analytics and SAP Content M...Due to a missing authorization check in SAP Business Analytics and SAP Content Management, an authenticated user could make unauthorized calls to certain remote function modules, potentially accessing sensitive information beyond their intended permissions. This vulnerability affects confidentiality, with no impact on integrity and availability. |
2026-04-14 | |
| CVE-2026-34257 | 6.1 | MEDIUM | CWE-601 | 0.0% p10 | 4.27 | Due to an Open Redirect vulnerability in SAP NetWeaver Application Server ABAP, ...Due to an Open Redirect vulnerability in SAP NetWeaver Application Server ABAP, an unauthenticated attacker could craft malicious URL that, if accessed by a victim, they could be redirected to the page controlled by the attacker. This causes low impact on confidentiality and integrity of the application with no impact on availability. |
2026-04-14 | |
| CVE-2026-34256 | 7.1 | HIGH | CWE-862 | 0.0% p10 | 4.97 | Due to a missing authorization check in SAP ERP and SAP S/4HANA (Private Cloud a...Due to a missing authorization check in SAP ERP and SAP S/4HANA (Private Cloud and On-Premise), an authenticated attacker could execute a particular ABAP report to overwrite any existing eight?character executable ABAP report without authorization. If the overwritten report is subsequently executed, the intended functionality could become unavailable. Successful exploitation impacts availability, with a limited impact on integrity confined to the affected report, while confidentiality remains unaffected. |
2026-04-14 | |
| CVE-2026-40164 | 7.5 | HIGH | CWE-328 | 0.0% p10 | 5.25 | jq is a command-line JSON processor. Before commit 0c7d133c3c7e37c00b6d46b658a02...jq is a command-line JSON processor. Before commit 0c7d133c3c7e37c00b6d46b658a02244fdd3c784, jq used MurmurHash3 with a hardcoded, publicly visible seed (0x432A9843) for all JSON object hash table operations, which allowed an attacker to precompute key collisions offline. By supplying a crafted JSON object (~100 KB) where all keys hashed to the same bucket, hash table lookups degraded from O(1) to O(n), turning any jq expression into an O(n²) operation and causing significant CPU exhaustion. This affected common jq use cases such as CI/CD pipelines, web services, and data processing scripts, and was far more practical to exploit than existing heap overflow issues since it required only a small payload. This issue has been patched in commit 0c7d133c3c7e37c00b6d46b658a02244fdd3c784. |
2026-04-14 | |
| CVE-2026-39417 | 4.6 | MEDIUM | CWE-20 | 0.1% p18 | 3.22 | MaxKB is an open-source AI assistant for enterprise. Versions 2.7.1 and below co...MaxKB is an open-source AI assistant for enterprise. Versions 2.7.1 and below contain an incomplete fix for CVE-2025-53928, where a Remote Code Execution vulnerability still exists in the MCP node of the workflow engine. MaxKB only restricts the referencing code path (loading MCP config from the database). The else branch, responsible for loading mcp_servers directly from user-supplied JSON remains completely unpatched. Since mcp_source is an optional field (required=False), an attacker can simply omit it or set it to any non-referencing value to bypass the fix. By calling the workflow creation API directly with a crafted JSON payload, an attacker can inject a complete MCP node configuration with stdio transport, arbitrary command, and args — achieving RCE when the workflow is triggered via chat. This issue has been fixed in version 2.8.0. |
2026-04-14 | |
| CVE-2026-34069 | 5.3 | MEDIUM | CWE-617 | 0.0% p11 | 3.71 | nimiq/core-rs-albatross is a Rust implementation of the Nimiq Proof-of-Stake pro...nimiq/core-rs-albatross is a Rust implementation of the Nimiq Proof-of-Stake protocol based on the Albatross consensus algorithm. In versions 1.2.2 and below, an unauthenticated p2p peer can cause the RequestMacroChain message handler task to panic. Sending a RequestMacroChain message where the first locator hash on the victim’s main chain is a micro block hash (not a macro block hash) causes said panic. The RequestMacroChain::handle handler selects the locator based only on "is on main chain", then calls get_macro_blocks() and panics via .unwrap() when the selected hash is not a macro block (BlockchainError::BlockIsNotMacro). This issue has been fixed in version 1.3.0. |
2026-04-14 | |
| CVE-2026-33948 | 2.9 | LOW | CWE-20 | 0.1% p26 | 2.03 | jq is a command-line JSON processor. Commits before 6374ae0bcdfe33a18eb0ae6db284...jq is a command-line JSON processor. Commits before 6374ae0bcdfe33a18eb0ae6db28493b1f34a0a5b contain a vulnerability where CLI input parsing allows validation bypass via embedded NUL bytes. When reading JSON from files or stdin, jq uses strlen() to determine buffer length instead of the actual byte count from fgets(), causing it to truncate input at the first NUL byte and parse only the preceding prefix. This enables an attacker to craft input with a benign JSON prefix before a NUL byte followed by malicious trailing data, where jq validates only the prefix as valid JSON while silently discarding the suffix. Workflows relying on jq to validate untrusted JSON before forwarding it to downstream consumers are susceptible to parser differential attacks, as those consumers may process the full input including the malicious trailing bytes. This issue has been patched by commit 6374ae0bcdfe33a18eb0ae6db28493b1f34a0a5b. |
2026-04-14 | |
| CVE-2026-27683 | 4.1 | MEDIUM | CWE-79 | 0.0% p8 | 2.87 | SAP BusinessObjects Business Intelligence application allows an authenticated at...SAP BusinessObjects Business Intelligence application allows an authenticated attacker to inject malicious JavaScript payloads through crafted URLs. When a victim accesses the URL, the script executes in the user�s browser, potentially exposing restricted information. This results in a low impact on confidentiality with no impact on integrity and availability. |
2026-04-14 | |
| CVE-2026-27681 | 9.9 | CRITICAL | CWE-89 | 0.0% p14 | 6.93 | Due to insufficient authorization checks in SAP Business Planning and Consolidat...Due to insufficient authorization checks in SAP Business Planning and Consolidation and SAP Business Warehouse, an authenticated user can execute crafted SQL statements to read, modify, and delete database data. This leads to a high impact on the confidentiality, integrity, and availability of the system. |
2026-04-14 | |
| CVE-2026-27679 | 6.5 | MEDIUM | CWE-862 | 0.0% p7 | 4.55 | Due to missing authorization checks in the SAP S/4HANA frontend OData Service (M...Due to missing authorization checks in the SAP S/4HANA frontend OData Service (Manage Reference Structures), an attacker could update and delete child entities via exposed OData services without proper authorization. This vulnerability has a high impact on integrity, while confidentiality and availability are not impacted. |
2026-04-14 | |
| CVE-2026-27678 | 6.5 | MEDIUM | CWE-862 | 0.0% p7 | 4.55 | Due to missing authorization checks in the SAP S/4HANA backend OData Service (Ma...Due to missing authorization checks in the SAP S/4HANA backend OData Service (Manage Reference Structures), an attacker could update and delete child entities via exposed OData services without proper authorization. This vulnerability has a high impact on integrity, while confidentiality and availability are not impacted. |
2026-04-14 | |
| CVE-2026-27677 | 6.5 | MEDIUM | CWE-862 | 0.0% p7 | 4.55 | Due to missing authorization checks in the SAP S/4HANA OData Service (Manage Ref...Due to missing authorization checks in the SAP S/4HANA OData Service (Manage Reference Equipment), an attacker could update and delete child entities via OData services without proper authorization. This vulnerability has a high impact on integrity, while confidentiality and availability are not impacted. |
2026-04-14 | |
| CVE-2026-27676 | 4.3 | MEDIUM | CWE-862 | 0.0% p7 | 3.01 | Due to missing authorization checks in the SAP S/4HANA OData Service (Manage Tec...Due to missing authorization checks in the SAP S/4HANA OData Service (Manage Technical Object Structures), an attacker could update and delete child entities via exposed OData services without proper authorization. This vulnerability results in a low impact on integrity, while confidentiality and availability are not impacted. |
2026-04-14 | |
| CVE-2026-27675 | 2.0 | LOW | CWE-94 | 0.0% p7 | 1.40 | SAP Landscape Transformation contains a vulnerability in an RFC-exposed function...SAP Landscape Transformation contains a vulnerability in an RFC-exposed function module that could allow a high privileged adversary to inject arbitrary ABAP code and operating system commands. Due to this, some information could be modified, but the attacker does not have control over kind or degree. This leads to a low impact on integrity, while confidentiality and availability are not impacted. |
2026-04-14 | |
| CVE-2026-27674 | 6.1 | MEDIUM | CWE-94 | 0.1% p16 | 4.27 | Due to a Code Injection vulnerability in SAP NetWeaver Application Server Java (...Due to a Code Injection vulnerability in SAP NetWeaver Application Server Java (Web Dynpro Java), an unauthenticated attacker could supply crafted input that is interpreted by the application and causes it to reference attacker-controlled content. If a victim accesses the affected functionality, that attacker-controlled content could be executed in the victim�s browser, potentially resulting in session compromise. This could allow the attacker to execute arbitrary client-side code, impacting the confidentiality and integrity of the application, with no impact to availability. |
2026-04-14 | |
| CVE-2026-27673 | 4.9 | MEDIUM | CWE-862 | 0.0% p8 | 3.43 | Due to a missing authorization check, SAP S/4HANA (Private Cloud and On-Premise)...Due to a missing authorization check, SAP S/4HANA (Private Cloud and On-Premise) allows an authenticated user to delete files on the operating system and gain unauthorized control over file operations which could leads to no impact on Confidentiality, Low impact on Integrity and Availability of the application. |
2026-04-14 | |
| CVE-2026-27672 | 4.3 | MEDIUM | CWE-862 | 0.0% p6 | 3.01 | The Material Master application does not enforce authorization checks for authen...The Material Master application does not enforce authorization checks for authenticated users when executing reports, resulting in the disclosure of sensitive information. This vulnerability has a low impact on confidentiality and does not affect integrity and availability of the system. |
2026-04-14 | |
| CVE-2026-24318 | 4.2 | MEDIUM | CWE-539 | 0.0% p9 | 2.94 | Due to an Insecure session management vulnerability in SAP Business Objects Busi...Due to an Insecure session management vulnerability in SAP Business Objects Business Intelligence Platform, an unauthenticated attacker could obtain valid session tokens and reuse them to gain unauthorized access to a victim�s session. If the application continues to accept previously issued tokens after authentication, the attacker could assume the victim�s authenticated context. This could allow the attacker to access or modify information within the victim�s session scope, impacting confidentiality and integrity, while availability remains unaffected. |
2026-04-14 | |
| CVE-2026-0512 | 6.1 | MEDIUM | CWE-79 | 0.1% p21 | 4.27 | Due to a Cross-Site Scripting (XSS) vulnerability in the SAP Supplier Relationsh...Due to a Cross-Site Scripting (XSS) vulnerability in the SAP Supplier Relationship Management (SICF Handler in SRM Catalog), an unauthenticated attacker could craft a malicious URL, that if accessed by a victim, results in execution of malicious content within the victim's browser. This could allow the attacker to access and modify information, impacting the confidentiality and integrity of the application, while availability remains unaffected. |
2026-04-14 | |
| CVE-2026-6203 | 6.1 | MEDIUM | CWE-601 | 1.2% p78 | 4.31 | The User Registration & Membership plugin for WordPress is vulnerable to Open Re...The User Registration & Membership plugin for WordPress is vulnerable to Open Redirect in versions up to and including 5.1.4. This is due to insufficient validation of user-supplied URLs passed via the 'redirect_to_on_logout' GET parameter before redirecting users. The `redirect_to_on_logout` GET parameter is passed directly to WordPress's `wp_redirect()` function instead of the domain-restricted `wp_safe_redirect()`. While `esc_url_raw()` is applied to sanitize malformed URLs, it does not restrict the redirect destination to the local domain, allowing an attacker to craft a specially formed link that redirects users to potentially malicious external URLs after logout, which could be used to facilitate phishing attacks. |
2026-04-13 | |
| CVE-2026-39979 | 6.9 | MEDIUM | CWE-125 | 0.0% p12 | 4.83 | jq is a command-line JSON processor. In commits before 2f09060afab23fe9390cce7cb...jq is a command-line JSON processor. In commits before 2f09060afab23fe9390cce7cb860b10416e1bf5f, the jv_parse_sized() API in libjq accepts a counted buffer with an explicit length parameter, but its error-handling path formats the input buffer using %s in jv_string_fmt(), which reads until a NUL terminator is found rather than respecting the caller-supplied length. This means that when malformed JSON is passed in a non-NUL-terminated buffer, the error construction logic performs an out-of-bounds read past the end of the buffer. The vulnerability is reachable by any libjq consumer calling jv_parse_sized() with untrusted input, and depending on memory layout, can result in memory disclosure or process termination. The issue has been patched in commit 2f09060afab23fe9390cce7cb860b10416e1bf5f. |
2026-04-13 | |
| CVE-2026-39956 | 6.1 | MEDIUM | CWE-125 | 0.0% p1 | 4.27 | jq is a command-line JSON processor. In commits after 69785bf77f86e2ea1b4a20ca86...jq is a command-line JSON processor. In commits after 69785bf77f86e2ea1b4a20ca86775916889e91c9, the _strindices builtin in jq's src/builtin.c passes its arguments directly to jv_string_indexes() without verifying they are strings, and jv_string_indexes() in src/jv.c relies solely on assert() checks that are stripped in release builds compiled with -DNDEBUG. This allows an attacker to crash jq trivially with input like _strindices(0), and by crafting a numeric value whose IEEE-754 bit pattern maps to a chosen pointer, achieve a controlled pointer dereference and limited memory read/probe primitive. Any deployment that evaluates untrusted jq filters against a release build is vulnerable. This issue has been patched in commit fdf8ef0f0810e3d365cdd5160de43db46f57ed03. |
2026-04-13 | |
| CVE-2026-6224 | 6.9 | MEDIUM | CWE-264 | 0.0% p11 | 4.83 | A security flaw has been discovered in nocobase plugin-workflow-javascript up to...A security flaw has been discovered in nocobase plugin-workflow-javascript up to 2.0.23. This issue affects the function createSafeConsole of the file packages/plugins/@nocobase/plugin-workflow-javascript/src/server/Vm.js. Performing a manipulation results in sandbox issue. The attack can be initiated remotely. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-04-13 | |
| CVE-2026-6220 | 5.1 | MEDIUM | CWE-918 | 0.0% p9 | 3.57 | A vulnerability was identified in HummerRisk up to 1.5.0. This vulnerability aff...A vulnerability was identified in HummerRisk up to 1.5.0. This vulnerability affects the function ServerService.addServer of the file ServerService.java of the component Video File Download URL Handler. Such manipulation of the argument streamIp leads to server-side request forgery. It is possible to launch the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-04-13 | |
| CVE-2026-4786 | 7.0 | HIGH | CWE-77 | 0.0% p2 | 4.90 | Mitgation of CVE-2026-4519 was incomplete. If the URL contained "%action" the mi...Mitgation of CVE-2026-4519 was incomplete. If the URL contained "%action" the mitigation could be bypassed for certain browser types the "webbrowser.open()" API could have commands injected into the underlying shell. See CVE-2026-4519 for details. |
2026-04-13 | |
| CVE-2026-40312 | 6.2 | MEDIUM | CWE-193 | 0.0% p1 | 4.34 | ImageMagick is free and open-source software used for editing and manipulating d...ImageMagick is free and open-source software used for editing and manipulating digital images. In versions below 7.1.2-19, an off by one error in the MSL decoder could result in a crash when a malicous MSL file is read. This issue has been fixed in version 7.1.2-19. |
2026-04-13 | |
| CVE-2026-40311 | 5.5 | MEDIUM | CWE-416 | 0.0% p3 | 3.85 | ImageMagick is free and open-source software used for editing and manipulating d...ImageMagick is free and open-source software used for editing and manipulating digital images. Versions below 7.1.2-19 and 6.9.13-44 contain a heap use-after-free vulnerability that can cause a crash when reading and printing values from an invalid XMP profile. This issue has been fixed in versions 6.9.13-44 and 7.1.2-19. |
2026-04-13 | |
| CVE-2026-40310 | 5.5 | MEDIUM | CWE-122 | 0.0% p1 | 3.85 | ImageMagick is free and open-source software used for editing and manipulating d...ImageMagick is free and open-source software used for editing and manipulating digital images. Versions below both 7.1.2-19 and 6.9.13-44, contain a heap out-of-bounds write in the JP2 encoder with when a user specifies an invalid sampling index. This issue has been fixed in versions 6.9.13-44 and 7.1.2-19. |
2026-04-13 | |
| CVE-2026-40183 | 5.5 | MEDIUM | CWE-122 | 0.0% p1 | 3.85 | ImageMagick is free and open-source software used for editing and manipulating d...ImageMagick is free and open-source software used for editing and manipulating digital images. In versions below 7.1.2-19, the JXL encoder has an heap write overflow when a user specifies that the image should be encoded as 16 bit floats. This issue has been fixed in version 7.1.2-19. |
2026-04-13 | |
| CVE-2026-40169 | 6.2 | MEDIUM | CWE-122 | 0.0% p1 | 4.34 | ImageMagick is free and open-source software used for editing and manipulating d...ImageMagick is free and open-source software used for editing and manipulating digital images. In versions below 7.1.2-19, a crafted image could result in an out of bounds heap write when writing a yaml or json output, resulting in a crash. This issue has been fixed in version 7.1.2-19. |
2026-04-13 | |
| CVE-2026-34238 | 5.1 | MEDIUM | CWE-190 | 0.0% p1 | 3.57 | ImageMagick is free and open-source software used for editing and manipulating d...ImageMagick is free and open-source software used for editing and manipulating digital images. In versions below both 7.1.2-19 and 6.9.13-44, an integer overflow in the despeckle operation causes a heap buffer overflow on 32-bit builds that will result in an out of bounds write. This issue has been fixed in versions 6.9.13-44 and 7.1.2-19. |
2026-04-13 | |
| CVE-2026-33947 | 6.2 | MEDIUM | CWE-674 | 0.0% p2 | 4.34 | jq is a command-line JSON processor. In versions 1.8.1 and below, functions jv_s...jq is a command-line JSON processor. In versions 1.8.1 and below, functions jv_setpath(), jv_getpath(), and delpaths_sorted() in jq's src/jv_aux.c use unbounded recursion whose depth is controlled by the length of a caller-supplied path array, with no depth limit enforced. An attacker can supply a JSON document containing a flat array of ~65,000 integers (~200 KB) that, when used as a path argument by a trusted jq filter, exhausts the C call stack and crashes the process with a segmentation fault (SIGSEGV). This bypass works because the existing MAX_PARSING_DEPTH (10,000) limit only protects the JSON parser, not runtime path operations where arrays can be programmatically constructed to arbitrary lengths. The impact is denial of service (unrecoverable crash) affecting any application or service that processes untrusted JSON input through jq's setpath, getpath, or delpaths builtins. This issue has been addressed in commit fb59f1491058d58bdc3e8dd28f1773d1ac690a1f. |
2026-04-13 | |
| CVE-2026-33908 | 7.5 | HIGH | CWE-674 | 0.0% p12 | 5.25 | ImageMagick is free and open-source software used for editing and manipulating d...ImageMagick is free and open-source software used for editing and manipulating digital images. In versions below both 7.1.2-19 and 6.9.13-44, Magick frees the memory of the XML tree via the `DestroyXMLTree()` function; however, this process is executed recursively with no depth limit imposed. When Magick processes an XML file with deeply nested structures, it will exhaust the stack memory, resulting in a Denial of Service (DoS) attack. This issue has been fixed in versions 6.9.13-44 and 7.1.2-19. |
2026-04-13 | |
| CVE-2026-33905 | 5.5 | MEDIUM | CWE-125 | 0.0% p1 | 3.85 | ImageMagick is free and open-source software used for editing and manipulating d...ImageMagick is free and open-source software used for editing and manipulating digital images. In versions below both 7.1.2-19 and 6.9.13-44, the -sample operation has an out of bounds read when an specific offset is set through the `sample:offset` define that could lead to an out of bounds read. This issue has been fixed in versions 6.9.13-44 and 7.1.2-19. |
2026-04-13 | |
| CVE-2026-33902 | 5.5 | MEDIUM | CWE-674 | 0.0% p1 | 3.85 | ImageMagick is free and open-source software used for editing and manipulating d...ImageMagick is free and open-source software used for editing and manipulating digital images. In versions below both 7.1.2-19 and 6.9.13-44, a stack overflow vulnerability in ImageMagick's FX expression parser allows an attacker to crash the process by providing a deeply nested expression. This issue has been fixed in versions 6.9.13-44 and 7.1.2-19. |
2026-04-13 | |
| CVE-2026-6219 | 4.8 | MEDIUM | CWE-74 | 0.2% p39 | 3.37 | A vulnerability was determined in aandrew-me ytDownloader up to 3.20.2. This aff...A vulnerability was determined in aandrew-me ytDownloader up to 3.20.2. This affects the function child_process.exec of the file src/compressor.js of the component Compressor Feature. This manipulation causes command injection. The attack can only be executed locally. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure. |
2026-04-13 | |
| CVE-2026-6218 | 5.3 | MEDIUM | CWE-79 | 0.0% p8 | 3.71 | A vulnerability was found in aandrew-me ytDownloader up to 3.20.2. Affected by t...A vulnerability was found in aandrew-me ytDownloader up to 3.20.2. Affected by this issue is the function createTextNode of the component Error Details Panel. The manipulation results in cross site scripting. The attack may be performed from remote. The vendor was contacted early about this disclosure. |
2026-04-13 | |
| CVE-2026-6216 | 5.1 | MEDIUM | CWE-79 | 0.0% p8 | 3.57 | A security vulnerability has been detected in DbGate up to 7.1.4. This affects a...A security vulnerability has been detected in DbGate up to 7.1.4. This affects an unknown function of the file packages/web/src/icons/FontIcon.svelte of the component SVG Icon String Handler. Such manipulation of the argument applicationIcon leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed publicly and may be used. Upgrading to version 7.1.5 mitigates this issue. It is advisable to upgrade the affected component. |
2026-04-13 | |
| CVE-2026-33901 | 7.5 | HIGH | CWE-122 | 0.0% p11 | 5.25 | ImageMagick is free and open-source software used for editing and manipulating d...ImageMagick is free and open-source software used for editing and manipulating digital images. In versions below both 7.1.2-19 and 6.9.13-44, a heap buffer overflow occurs in the MVG decoder that could result in an out of bounds write when processing a crafted image. This issue has been fixed in versions 6.9.13-44 and 7.1.2-19. |
2026-04-13 | |
| CVE-2026-33900 | 5.9 | MEDIUM | CWE-190 | 0.0% p12 | 4.13 | ImageMagick is free and open-source software used for editing and manipulating d...ImageMagick is free and open-source software used for editing and manipulating digital images. In versions below both 7.1.2-19 and 6.9.13-44, the viff encoder contains an integer truncation/wraparound issue on 32-bit builds that could trigger an out of bounds heap write, potentially causing a crash. This issue has been fixed in versions 6.9.13-44 and 7.1.2-19. |
2026-04-13 | |
| CVE-2026-33899 | 5.3 | MEDIUM | CWE-122 | 0.0% p11 | 3.71 | ImageMagick is free and open-source software used for editing and manipulating d...ImageMagick is free and open-source software used for editing and manipulating digital images. In versions below 7.1.2-189 and 6.9.13-44, when `Magick` parses an XML file it is possible that a single zero byte is written out of the bounds. This issue has been fixed in versions 6.9.13-44 and 7.1.2-19. |
2026-04-13 | |
| CVE-2026-33740 | 5.4 | MEDIUM | CWE-639 | 0.0% p5 | 3.78 | EspoCRM is an open source customer relationship management application. In versi...EspoCRM is an open source customer relationship management application. In versions 9.3.3 and below, the POST /api/v1/Email/importEml endpoint contains an Insecure Direct Object Reference (IDOR) vulnerability where the attacker-supplied fileId parameter is used to fetch any attachment directly from the repository without verifying that the current user has authorization to access it. Any authenticated user with Email:create and Import permissions can exploit this to read another user's .eml attachment contents by importing them as a new email into the attacker's mailbox, while the original victim attachment record is deleted as a side effect of the import flow. This is inconsistent with the standard attachment download path, which enforces ACL checks before returning file data, and is practically exploitable because attachment IDs are commonly exposed in normal UI and API workflows such as stream payloads and download links. This issue is fixed in version 9.3.4. |
2026-04-13 | |
| CVE-2026-33659 | 3.5 | LOW | CWE-367 | 0.0% p11 | 2.45 | EspoCRM is an open source customer relationship management application. In versi...EspoCRM is an open source customer relationship management application. In versions 9.3.3 and below, the POST /api/v1/Attachment/fromImageUrl endpoint is vulnerable to Server-Side Request Forgery (SSRF) via a DNS rebinding (TOCTOU) condition. Host validation uses dns_get_record() but the actual HTTP request resolves hostnames through curl's internal resolver (gethostbyname()), allowing the two lookups to return different IP addresses for the same hostname. A secondary issue exists where an empty DNS result (due to DNS failure, IPv6-only domains, or non-existent hostnames) causes the validation to implicitly allow the host without further checks. An authenticated attacker with default attachment creation access can exploit this gap to bypass internal IP restrictions and scan internal network ports, confirm the existence of internal hosts, and interact with internal HTTP-based services, though data extraction from binary protocol services and remote code execution are not possible through this endpoint. This issue has been fixed in version 9.3.4. |
2026-04-13 | |
| CVE-2026-32272 | 8.7 | HIGH | CWE-89 | 0.0% p8 | 6.09 | Craft Commerce is an ecommerce platform for Craft CMS. In versions 5.0.0 through...Craft Commerce is an ecommerce platform for Craft CMS. In versions 5.0.0 through 5.5.4, an SQL injection vulnerability exists where the ProductQuery::hasVariant and VariantQuery::hasProduct properties bypass the input sanitization blocklist added to ElementIndexesController in a prior security fix (GHSA-2453-mppf-46cj). The blocklist only strips top-level Yii2 Query properties such as where and orderBy, but hasVariant and hasProduct pass through untouched and internally call Craft::configure() on a subquery without sanitization, re-introducing SQL injection. Any authenticated control panel user can exploit this via boolean-based blind SQL injection to extract arbitrary database contents, including security keys that enable forging admin sessions for privilege escalation. This issue has been fixed in version 5.6.0. |
2026-04-13 | |
| CVE-2026-32271 | 7.7 | HIGH | CWE-89 | 0.2% p41 | 5.40 | Craft Commerce is an ecommerce platform for Craft CMS. In versions 4.0.0 through...Craft Commerce is an ecommerce platform for Craft CMS. In versions 4.0.0 through 4.10.2 and 5.0.0 through 5.5.4, there is an SQL injection vulnerability in the Commerce TotalRevenue widget which allows any authenticated control panel user to achieve remote code execution through a four-step exploitation chain. The attack exploits unsanitized widget settings interpolated into SQL expressions, combined with PDO's default multi-statement query support, to inject a maliciously serialized PHP object into the queue table. When the queue consumer processes the injected job, the unrestricted unserialize() call in yii2-queue instantiates a GuzzleHttp FileCookieJar gadget chain whose __destruct() method writes a PHP webshell to the server's webroot. The complete chain requires only three HTTP requests, no administrative privileges, and results in arbitrary command execution as the PHP process user, with queue processing triggered via an unauthenticated endpoint. This issue has been fixed in versions 4.10.3 and 5.5.5. |
2026-04-13 | |
| CVE-2026-31280 | 0.0 | NONE | N/A | 0.0% p3 | 0.00 | An issue in the Bluetooth RFCOMM service of Parani M10 Motorcycle Intercom v2.1....An issue in the Bluetooth RFCOMM service of Parani M10 Motorcycle Intercom v2.1.3 allows unauthorized attackers to cause a Denial of Service (DoS) via supplying crafted RFCOMM frames. |
2026-04-13 | |
| CVE-2026-26460 | 6.1 | MEDIUM | CWE-80 | 0.0% p4 | 4.27 | A HTML Injection vulnerability exists in the Dashboard module of Vtiger CRM 8.4....A HTML Injection vulnerability exists in the Dashboard module of Vtiger CRM 8.4.0. The application fails to properly neutralize user-supplied input in the tabid parameter of the DashBoardTab view (getTabContents action), allowing an attacker to inject arbitrary HTML content into the dashboard interface. The injected content is rendered in the victim's browser |
2026-04-13 | |
| CVE-2025-70936 | 5.4 | MEDIUM | CWE-79 | 0.0% p8 | 3.78 | Vtiger CRM 8.4.0 contains a reflected cross-site scripting (XSS) vulnerability i...Vtiger CRM 8.4.0 contains a reflected cross-site scripting (XSS) vulnerability in the MailManager module. Improper handling of user-controlled input in the _folder parameter allows a specially crafted, double URL-encoded payload to be reflected and executed in the context of an authenticated user s session. |
2026-04-13 | |
| CVE-2025-51414 | 8.8 | HIGH | CWE-94 | 0.0% p4 | 6.16 | In Phpgurukul Online Course Registration v3.1, an arbitrary file upload vulnerab...In Phpgurukul Online Course Registration v3.1, an arbitrary file upload vulnerability was discovered within the profile picture upload functionality on the /my-profile.php page. |
2026-04-13 | |
| CVE-2026-6215 | 5.3 | MEDIUM | CWE-918 | 0.0% p9 | 3.71 | A weakness has been identified in DbGate up to 7.1.4. The impacted element is th...A weakness has been identified in DbGate up to 7.1.4. The impacted element is the function apiServerUrl1 of the file packages/rest/src/openApiDriver.ts of the component REST/GraphQL. This manipulation causes server-side request forgery. The attack may be initiated remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-04-13 | |
| CVE-2026-6202 | 5.3 | MEDIUM | CWE-74 | 0.0% p7 | 3.71 | A security flaw has been discovered in code-projects Easy Blog Site 1.0. This af...A security flaw has been discovered in code-projects Easy Blog Site 1.0. This affects an unknown function of the file post.php. Performing a manipulation of the argument tags results in sql injection. The attack may be initiated remotely. The exploit has been released to the public and may be used for attacks. |
2026-04-13 | |
| CVE-2026-6201 | 5.3 | MEDIUM | CWE-266 | 0.0% p10 | 3.71 | A vulnerability was identified in CodeAstro Online Job Portal 1.0. The impacted ...A vulnerability was identified in CodeAstro Online Job Portal 1.0. The impacted element is an unknown function of the file /jobs/job-delete.php of the component Delete Job Posting Handler. Such manipulation of the argument ID leads to improper access controls. The attack can be launched remotely. The exploit is publicly available and might be used. |
2026-04-13 | |
| CVE-2026-33657 | 4.6 | MEDIUM | CWE-80 | 0.0% p7 | 3.22 | EspoCRM is an open source customer relationship management application. Versions...EspoCRM is an open source customer relationship management application. Versions 9.3.3 and below have a stored HTML injection vulnerability that allows any authenticated user with standard (non-administrative) privileges to inject arbitrary HTML into system-generated email notifications by crafting malicious content in the post field of stream activity notes. The vulnerability exists because server-side Handlebars templates render the post field using unescaped triple-brace syntax, the Markdown processor preserves inline HTML by default, and the rendering pipeline explicitly skips sanitization for fields present in additionalData, creating a path where attacker-controlled HTML is accepted, stored, and rendered directly into emails without any escaping. Since the emails are sent using the system's configured SMTP identity (such as an administrative sender address), the injected content appears fully trusted to recipients, enabling phishing attacks, user tracking via embedded resources like image beacons, and UI manipulation within email content. The @mention feature further increases the impact by allowing targeted delivery of malicious emails to specific users. This issue has been fixed in version 9.3.4. |
2026-04-13 | |
| CVE-2026-33534 | 4.3 | MEDIUM | CWE-918 | 0.0% p6 | 3.01 | EspoCRM is an open source customer relationship management application. Versions...EspoCRM is an open source customer relationship management application. Versions 9.3.3 and below have an authenticated Server-Side Request Forgery (SSRF) vulnerability that allows bypassing the internal-host validation logic by using alternative IPv4 representations such as octal notation (e.g., 0177.0.0.1 instead of 127.0.0.1). This is caused by HostCheck::isNotInternalHost() function relying on PHP's filter_var(..., FILTER_VALIDATE_IP), which does not recognize alternative IP formats, causing the validation to fall through to a DNS lookup that returns no records and incorrectly treats the host as safe, however the cURL subsequently normalizes the address and connects to the loopback destination. Through the confirmed /api/v1/Attachment/fromImageUrl endpoint, an authenticated user can force the server to make requests to loopback-only services and store the fetched response as an attachment. This vulnerability is distinct from CVE-2023-46736 (which involved redirect-based SSRF) and may allow access to internal resources reachable from the application runtime. This issue has been fixed in version 9.3.4. |
2026-04-13 | |
| CVE-2026-32605 | 7.5 | HIGH | CWE-125 | 0.0% p12 | 5.25 | nimiq/core-rs-albatross is a Rust implementation of the Nimiq Proof-of-Stake pro...nimiq/core-rs-albatross is a Rust implementation of the Nimiq Proof-of-Stake protocol based on the Albatross consensus algorithm. Prior to version 1.3.0, an untrusted peer could crash a validator by publishing a signed tendermint proposal message where signer == validators.num_validators(). ProposalSender::send uses > instead of >= for the signer bounds check, so the equality case passes and reaches validators.get_validator_by_slot_band(signer), which panics with an out-of-bounds index before any signature verification runs. This issue has been fixed in version 1.3.0. |
2026-04-13 | |
| CVE-2026-32270 | 1.7 | LOW | CWE-200 | 0.0% p14 | 1.19 | Craft Commerce is an ecommerce platform for Craft CMS. In versions 4.0.0 through...Craft Commerce is an ecommerce platform for Craft CMS. In versions 4.0.0 through 4.10.2 and 5.0.0 through 5.5.4, the PaymentsController::actionPay discloses some order data to unauthenticated users when an order number is provided and the email check fails during an anonymous payment. The JSON error response includes the serialized order object (order), which contains some sensitive fields such as customer email, shipping address, and billing address. The frontend payment flow's actionPay() retrieves orders by number before authorization is fully enforcedLoad order by number. This issue has been fixed in versions 4.11.0 and 5.6.0. |
2026-04-13 | |
| CVE-2026-31048 | 9.8 | CRITICAL | CWE-94 | 0.0% p4 | 6.86 | An issue in the <code>pickle</code> protocol of Pyro v3.x allows attackers to ex...An issue in the <code>pickle</code> protocol of Pyro v3.x allows attackers to execute arbitrary code via supplying a crafted pickled string message. |
2026-04-13 | |
| CVE-2026-6200 | 7.4 | HIGH | CWE-119 | 0.0% p14 | 5.18 | A vulnerability was determined in Tenda F456 1.0.0.5. The affected element is th...A vulnerability was determined in Tenda F456 1.0.0.5. The affected element is the function formwebtypelibrary of the file /goform/webtypelibrary. This manipulation of the argument menufacturer/Go causes stack-based buffer overflow. The attack can be initiated remotely. The exploit has been publicly disclosed and may be utilized. |
2026-04-13 | |
| CVE-2026-6199 | 7.4 | HIGH | CWE-119 | 0.0% p14 | 5.18 | A vulnerability was found in Tenda F456 1.0.0.5. Impacted is the function fromqo...A vulnerability was found in Tenda F456 1.0.0.5. Impacted is the function fromqossetting of the file /goform/qossetting. The manipulation of the argument page results in stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been made public and could be used. |
2026-04-13 | |
| CVE-2026-6198 | 7.4 | HIGH | CWE-119 | 0.0% p14 | 5.18 | A vulnerability has been found in Tenda F456 1.0.0.5. This issue affects the fun...A vulnerability has been found in Tenda F456 1.0.0.5. This issue affects the function fromNatStaticSetting of the file /goform/NatStaticSetting. The manipulation of the argument page leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. |
2026-04-13 | |
| CVE-2026-6197 | 7.4 | HIGH | CWE-119 | 0.0% p14 | 5.18 | A flaw has been found in Tenda F456 1.0.0.5. This vulnerability affects the func...A flaw has been found in Tenda F456 1.0.0.5. This vulnerability affects the function formWrlsafeset of the file /goform/AdvSetWrlsafeset. Executing a manipulation of the argument mit_ssid can lead to stack-based buffer overflow. The attack may be performed from remote. The exploit has been published and may be used. |
2026-04-13 | |
| CVE-2026-40044 | 9.3 | CRITICAL | CWE-502 | 0.1% p33 | 6.51 | Pachno 1.0.6 contains a deserialization vulnerability that allows unauthenticate...Pachno 1.0.6 contains a deserialization vulnerability that allows unauthenticated attackers to execute arbitrary code by injecting malicious serialized objects into cache files. Attackers can write PHP object payloads to world-writable cache files with predictable names in the cache directory, which are unserialized during framework bootstrap before authentication checks occur. |
2026-04-13 | |
| CVE-2026-40043 | 7.1 | HIGH | CWE-639 | 0.1% p22 | 4.97 | Pachno 1.0.6 contains an authentication bypass vulnerability in the runSwitchUse...Pachno 1.0.6 contains an authentication bypass vulnerability in the runSwitchUser() action that allows authenticated low-privilege users to escalate privileges by manipulating the original_username cookie. Attackers can set the client-controlled original_username cookie to any value and request a switch to user ID 1 to obtain session tokens or password hashes belonging to administrator accounts. |
2026-04-13 | |
| CVE-2026-40042 | 9.3 | CRITICAL | CWE-403 | 0.0% p13 | 6.51 | Pachno 1.0.6 contains an XML external entity injection vulnerability that allows...Pachno 1.0.6 contains an XML external entity injection vulnerability that allows unauthenticated attackers to read arbitrary files by exploiting unsafe XML parsing in the TextParser helper. Attackers can inject malicious XML entities through wiki table syntax and inline tags in issue descriptions, comments, and wiki articles to trigger entity resolution via simplexml_load_string() without LIBXML_NONET restrictions. |
2026-04-13 | |
| CVE-2026-40041 | 5.3 | MEDIUM | CWE-352 | 0.0% p2 | 3.71 | Pachno 1.0.6 contains a cross-site request forgery vulnerability that allows att...Pachno 1.0.6 contains a cross-site request forgery vulnerability that allows attackers to perform arbitrary actions in authenticated user context by exploiting missing CSRF protections on state-changing endpoints. Attackers can craft malicious requests targeting login, registration, file upload, milestone editing, and administrative functions to force logout, create accounts, modify roles, inject comments, or upload files when authenticated users visit attacker-controlled websites. |
2026-04-13 | |
| CVE-2026-40040 | 8.7 | HIGH | CWE-434 | 0.1% p27 | 6.09 | Pachno 1.0.6 contains an unrestricted file upload vulnerability that allows auth...Pachno 1.0.6 contains an unrestricted file upload vulnerability that allows authenticated users to upload arbitrary file types by bypassing ineffective extension filtering to the /uploadfile endpoint. Attackers can upload executable files .php5 scripts to web-accessible directories and execute them to achieve remote code execution on the server. |
2026-04-13 | |
| CVE-2026-40039 | 7.1 | HIGH | CWE-305 | 0.0% p8 | 4.97 | Pachno 1.0.6 contains an open redirection vulnerability that allows attackers to...Pachno 1.0.6 contains an open redirection vulnerability that allows attackers to redirect users to arbitrary external websites by manipulating the return_to parameter. Attackers can craft malicious login URLs with unvalidated return_to values to conduct phishing attacks and steal user credentials. |
2026-04-13 | |
| CVE-2026-40038 | 5.1 | MEDIUM | CWE-79 | 0.0% p8 | 3.57 | Pachno 1.0.6 contains a stored cross-site scripting vulnerability that allows at...Pachno 1.0.6 contains a stored cross-site scripting vulnerability that allows attackers to execute arbitrary HTML and script code by injecting malicious payloads into POST parameters. Attackers can inject scripts through the value, comment_body, article_content, description, and message parameters across multiple controllers, which are stored in the database and executed in users' browser sessions due to improper sanitization via Request::getRawParameter() or Request::getParameter() calls. |
2026-04-13 | |
| CVE-2026-29955 | 8.8 | HIGH | CWE-94 | 0.0% p11 | 6.16 | The `/registercrd` endpoint in KubePlus 4.14 in the kubeconfiggenerator componen...The `/registercrd` endpoint in KubePlus 4.14 in the kubeconfiggenerator component is vulnerable to command injection. The component uses `subprocess.Popen()` with `shell=True` parameter to execute shell commands, and the user-supplied `chartName` parameter is directly concatenated into the command string without any sanitization or validation. An attacker can inject arbitrary shell commands by crafting a malicious `chartName` parameter value. |
2026-04-13 | |
| CVE-2026-6196 | 7.4 | HIGH | CWE-119 | 0.0% p14 | 5.18 | A vulnerability was detected in Tenda F456 1.0.0.5. This affects the function fr...A vulnerability was detected in Tenda F456 1.0.0.5. This affects the function fromexeCommand of the file /goform/exeCommand. Performing a manipulation of the argument cmdinput results in stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit is now public and may be used. |
2026-04-13 | |
| CVE-2026-6195 | 8.9 | HIGH | CWE-77 | 0.9% p75 | 6.26 | A security vulnerability has been detected in Totolink A7100RU 7.4cu.2313_b20191...A security vulnerability has been detected in Totolink A7100RU 7.4cu.2313_b20191024. Affected by this issue is the function setPasswordCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Such manipulation of the argument admpass leads to os command injection. The attack can be executed remotely. The exploit has been disclosed publicly and may be used. |
2026-04-13 | |
| CVE-2026-6194 | 7.4 | HIGH | CWE-119 | 0.1% p22 | 5.18 | A weakness has been identified in Totolink A3002MU B20211125.1046. Affected by t...A weakness has been identified in Totolink A3002MU B20211125.1046. Affected by this vulnerability is the function sub_410188 of the file /boafrm/formWlanSetup of the component HTTP Request Handler. This manipulation of the argument wan-url causes stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be used for attacks. |
2026-04-13 | |
| CVE-2026-32316 | 8.2 | HIGH | CWE-122 | 0.0% p12 | 5.74 | jq is a command-line JSON processor. An integer overflow vulnerability exists th...jq is a command-line JSON processor. An integer overflow vulnerability exists through version 1.8.1 within the jvp_string_append() and jvp_string_copy_replace_bad functions, where concatenating strings with a combined length exceeding 2^31 bytes causes a 32-bit unsigned integer overflow in the buffer allocation size calculation, resulting in a drastically undersized heap buffer. Subsequent memory copy operations then write the full string data into this undersized buffer, causing a heap buffer overflow classified as CWE-190 (Integer Overflow) leading to CWE-122 (Heap-based Buffer Overflow). Any system evaluating untrusted jq queries is affected, as an attacker can crash the process or potentially achieve further exploitation through heap corruption by crafting queries that produce extremely large strings. The root cause is the absence of string size bounds checking, unlike arrays and objects which already have size limits. The issue has been addressed in commit e47e56d226519635768e6aab2f38f0ab037c09e5. |
2026-04-13 | |
| CVE-2026-28291 | 8.1 | HIGH | CWE-78 | 0.1% p26 | 5.67 | simple-git enables running native Git commands from JavaScript. Versions up to a...simple-git enables running native Git commands from JavaScript. Versions up to and including 3.31.1 allow execution of arbitrary commands through Git option manipulation, bypassing safety checks meant to block dangerous options like -u and --upload-pack. The flaw stems from an incomplete fix for CVE-2022-25860, as Git's flexible option parsing allows numerous character combinations (e.g., -vu, -4u, -nu) to circumvent the regular-expression-based blocklist in the unsafe operations plugin. Due to the virtually infinite number of valid option variants that Git accepts, a complete blocklist-based mitigation may be infeasible without fully emulating Git's option parsing behavior. This issue has been fixed in version 3.32.0. |
2026-04-13 | |
| CVE-2026-6193 | 6.9 | MEDIUM | CWE-74 | 0.0% p8 | 4.83 | A security flaw has been discovered in PHPGurukul Daily Expense Tracking System ...A security flaw has been discovered in PHPGurukul Daily Expense Tracking System 1.1. Affected is an unknown function of the file /register.php. The manipulation of the argument email results in sql injection. The attack may be launched remotely. The exploit has been released to the public and may be used for attacks. |
2026-04-13 | |
| CVE-2026-6192 | 4.8 | MEDIUM | CWE-189 | 0.0% p2 | 3.36 | A vulnerability was identified in uclouvain openjpeg up to 2.5.4. This impacts t...A vulnerability was identified in uclouvain openjpeg up to 2.5.4. This impacts the function opj_pi_initialise_encode in the library src/lib/openjp2/pi.c. The manipulation leads to integer overflow. The attack must be carried out locally. The exploit is publicly available and might be used. The identifier of the patch is 839936aa33eb8899bbbd80fda02796bb65068951. It is suggested to install a patch to address this issue. |
2026-04-13 | |
| CVE-2026-6191 | 5.3 | MEDIUM | CWE-74 | 0.0% p7 | 3.71 | A vulnerability was determined in itsourcecode Construction Management System 1....A vulnerability was determined in itsourcecode Construction Management System 1.0. This affects an unknown function of the file /equipments.php. Executing a manipulation of the argument Name can lead to sql injection. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized. |
2026-04-13 | |
| CVE-2026-6190 | 5.3 | MEDIUM | CWE-74 | 0.0% p7 | 3.71 | A vulnerability was found in itsourcecode Construction Management System 1.0. Th...A vulnerability was found in itsourcecode Construction Management System 1.0. The impacted element is an unknown function of the file /employees.php. Performing a manipulation of the argument Name results in sql injection. The attack can be initiated remotely. The exploit has been made public and could be used. |
2026-04-13 | |
| CVE-2026-6189 | 6.9 | MEDIUM | CWE-74 | 0.0% p8 | 4.83 | A vulnerability has been found in SourceCodester Pharmacy Sales and Inventory Sy...A vulnerability has been found in SourceCodester Pharmacy Sales and Inventory System 1.0. The affected element is an unknown function of the file /ajax.php?action=login. Such manipulation of the argument Username leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. |
2026-04-13 | |
| CVE-2026-39940 | 5.3 | MEDIUM | CWE-601 | 0.0% p11 | 3.71 | ChurchCRM is an open-source church management system. Prior to 7.0.0, it was pos...ChurchCRM is an open-source church management system. Prior to 7.0.0, it was possible in many places across the ChurchCRM application to create a link that, when visited by an authenticated user, would redirect them to any URL chosen by an attacker if they clicked 'Cancel' button on the page. For this write-up the DonatedItemEditor.php will be used as an example, however wherever all instances of 'linkBack' should be assessed. This vulnerability is fixed in 7.0.0. |
2026-04-13 | |
| CVE-2026-36952 | 2.7 | LOW | CWE-89 | 0.0% p5 | 1.89 | Sourcecodester Online Thesis Archiving System v1.0 is vulnerable to SQL injectio...Sourcecodester Online Thesis Archiving System v1.0 is vulnerable to SQL injection in the file /otas/admin/curriculum/manage_curriculum.php. |
2026-04-13 | |
| CVE-2026-36950 | 2.7 | LOW | CWE-89 | 0.0% p5 | 1.89 | Sourcecodester Online Thesis Archiving System v1.0 is vulnerable to SQL injectio...Sourcecodester Online Thesis Archiving System v1.0 is vulnerable to SQL injection in /otas/projects_per_department.php. |
2026-04-13 | |
| CVE-2026-36948 | 7.3 | HIGH | CWE-89 | 0.0% p7 | 5.11 | Sourcecodester Online Thesis Archiving System v1.0 is vulnerale to SQL injection...Sourcecodester Online Thesis Archiving System v1.0 is vulnerale to SQL injection in the file /otas/view_archive.php. |
2026-04-13 | |
| CVE-2026-33555 | 4.0 | MEDIUM | CWE-130 | 0.0% p0 | 2.80 | An issue was discovered in HAProxy before 3.3.6. The HTTP/3 parser does not chec...An issue was discovered in HAProxy before 3.3.6. The HTTP/3 parser does not check that the received body length matches a previously announced content-length when the stream is closed via a frame with an empty payload. This can cause desynchronization issues with the backend server and could be used for request smuggling. The earliest affected version is 2.6. |
2026-04-13 | |
| CVE-2026-23891 | 9.3 | CRITICAL | CWE-79 | 0.1% p18 | 6.51 | Decidim is a participatory democracy framework. In versions below 0.30.5 and 0.3...Decidim is a participatory democracy framework. In versions below 0.30.5 and 0.31.0.rc1 through 0.31.0, a stored code execution vulnerability in the user name field allows a low-privileged attacker to execute arbitrary code in the context of any user who passively visits a comment page, resulting in high confidentiality and integrity impact across security boundaries. This issue has been fixed in versions 0.30.5 and 0.31.1. |
2026-04-13 | |
| CVE-2026-6231 | 5.3 | MEDIUM | CWE-20 | 0.0% p12 | 3.71 | The bson_validate function may return early on specific inputs and incorrectly r...The bson_validate function may return early on specific inputs and incorrectly report success. This behavior could result in skipping validation for BSON data, allowing malformed or invalid UTF-8 sequences to bypass validation and be processed incorrectly. The issue may affect applications that rely on these functions to validate untrusted BSON data before further processing. This issue affects MongoDB C Driver versions prior to 1.30.5, MongoDB C Driver version 2.0.0 and MongoDB C Driver version 2.0.1 |
2026-04-13 | |
| CVE-2026-6188 | 6.9 | MEDIUM | CWE-74 | 0.0% p8 | 4.83 | A flaw has been found in SourceCodester Pharmacy Sales and Inventory System 1.0....A flaw has been found in SourceCodester Pharmacy Sales and Inventory System 1.0. Impacted is an unknown function of the file /ajax.php?action=delete_sales. This manipulation of the argument ID causes sql injection. It is possible to initiate the attack remotely. The exploit has been published and may be used. |
2026-04-13 | |
| CVE-2026-6187 | 6.9 | MEDIUM | CWE-74 | 0.0% p8 | 4.83 | A vulnerability was detected in SourceCodester Pharmacy Sales and Inventory Syst...A vulnerability was detected in SourceCodester Pharmacy Sales and Inventory System 1.0. This issue affects some unknown processing of the file /ajax.php?action=chk_prod_availability. The manipulation of the argument ID results in sql injection. The attack may be performed from remote. The exploit is now public and may be used. |
2026-04-13 | |
| CVE-2026-6186 | 7.4 | HIGH | CWE-119 | 0.0% p12 | 5.18 | A security vulnerability has been detected in UTT HiPER 1200GW up to 2.5.3-17030...A security vulnerability has been detected in UTT HiPER 1200GW up to 2.5.3-170306. This vulnerability affects the function strcpy of the file /goform/formNatStaticMap. The manipulation of the argument NatBind leads to buffer overflow. The attack is possible to be carried out remotely. The exploit has been disclosed publicly and may be used. |
2026-04-13 | |
| CVE-2026-6184 | 4.8 | MEDIUM | CWE-79 | 0.0% p8 | 3.36 | A weakness has been identified in code-projects Simple Content Management System...A weakness has been identified in code-projects Simple Content Management System 1.0. This affects an unknown part of the file /web/admin/welcome.php. Executing a manipulation of the argument News Title can lead to cross site scripting. The attack can be executed remotely. The exploit has been made available to the public and could be used for attacks. |
2026-04-13 | |
| CVE-2026-36938 | 2.7 | LOW | CWE-89 | 0.0% p5 | 1.89 | Sourcecodester Online Resort Management System v1.0 is vulnerable to SQL injecti...Sourcecodester Online Resort Management System v1.0 is vulnerable to SQL injection in /orms/admin/rooms/view_room.php. |
2026-04-13 | |
| CVE-2026-36937 | 2.7 | LOW | CWE-89 | 0.0% p5 | 1.89 | Sourcecodester Online Resort Management System v1.0 is vulnerable to SQL injecti...Sourcecodester Online Resort Management System v1.0 is vulnerable to SQL injection in /orms/admin/reservations/view_details.php. |
2026-04-13 | |
| CVE-2026-34188 | 7.5 | HIGH | CWE-78 | 0.4% p58 | 5.26 | Improper Neutralization of Special Elements used in an OS Command vulnerability ...Improper Neutralization of Special Elements used in an OS Command vulnerability allows OS Command Injection via Event Response execution. This issue affects Pandora FMS: from 777 through 800 |
2026-04-13 | |
| CVE-2026-34186 | 8.7 | HIGH | CWE-89 | 0.0% p8 | 6.09 | Improper Neutralization of Special Elements used in an SQL Command vulnerability...Improper Neutralization of Special Elements used in an SQL Command vulnerability allows SQL Injection via custom fields. This issue affects Pandora FMS: from 777 through 800 |
2026-04-13 | |
| CVE-2026-30813 | 8.7 | HIGH | CWE-89 | 0.0% p8 | 6.09 | Improper Neutralization of Special Elements used in an SQL Command vulnerability...Improper Neutralization of Special Elements used in an SQL Command vulnerability allows SQL Injection via module search. This issue affects Pandora FMS: from 777 through 800 |
2026-04-13 | |
| CVE-2026-30812 | 2.1 | LOW | CWE-79 | 0.0% p14 | 1.47 | Improper Neutralization of Input During Web Page Generation vulnerability allows...Improper Neutralization of Input During Web Page Generation vulnerability allows Stored Cross-Site Scripting via event comments. This issue affects Pandora FMS: from 777 through 800 |
2026-04-13 | |
| CVE-2026-30811 | 8.4 | HIGH | CWE-276 | 0.0% p11 | 5.88 | Missing Authorization vulnerability allows Exposure of Sensitive Information via...Missing Authorization vulnerability allows Exposure of Sensitive Information via configuration endpoint. This issue affects Pandora FMS: from 777 through 800 |
2026-04-13 | |
| CVE-2026-30809 | 8.7 | HIGH | CWE-78 | 0.5% p64 | 6.10 | Improper Neutralization of Special Elements used in an OS Command vulnerability ...Improper Neutralization of Special Elements used in an OS Command vulnerability allows OS Command Injection via WebServerModuleDebug. This issue affects Pandora FMS: from 777 through 800 |
2026-04-13 | |
| CVE-2026-30806 | 8.7 | HIGH | CWE-78 | 0.6% p70 | 6.11 | Improper Neutralization of Special Elements used in an OS Command vulnerability ...Improper Neutralization of Special Elements used in an OS Command vulnerability allows OS Command Injection via Network Report. This issue affects Pandora FMS: from 777 through 800 |
2026-04-13 | |
| CVE-2026-30804 | 8.6 | HIGH | CWE-434 | 0.4% p58 | 6.03 | Unrestricted Upload of File with Dangerous Type vulnerability allows Remote Code...Unrestricted Upload of File with Dangerous Type vulnerability allows Remote Code Execution via file upload. This issue affects Pandora FMS: from 777 through 800 |
2026-04-13 | |
| CVE-2025-69627 | 8.4 | HIGH | CWE-416 | 0.0% p0 | 5.88 | Nitro PDF Pro for Windows 14.41.1.4 contains a heap use-after-free vulnerability...Nitro PDF Pro for Windows 14.41.1.4 contains a heap use-after-free vulnerability in the implementation of the JavaScript method this.mailDoc(). During execution, an internal XID object is allocated and then freed prematurely, after which the freed pointer is still passed into UI and logging helper functions. Because the freed memory region may contain unpredictable heap data or remnants of attacker-controlled JavaScript strings, downstream routines such as wcscmp() may process invalid or stale pointers. This can result in access violations and non-deterministic crashes. |
2026-04-13 | |
| CVE-2025-69624 | 7.5 | HIGH | CWE-476 | 0.0% p2 | 5.25 | Nitro PDF Pro for Windows 14.41.1.4 contains a NULL pointer dereference vulnerab...Nitro PDF Pro for Windows 14.41.1.4 contains a NULL pointer dereference vulnerability in the JavaScript implementation of app.alert(). When app.alert() is called with more than one argument and the first argument evaluates to null (for example, app.alert(app.activeDocs, true) when app.activeDocs is null), the engine routes the call through a fallback path intended for non-string arguments. In this path, js_ValueToString() is invoked on the null value and returns an invalid string pointer, which is then passed to JS_GetStringChars() without validation. Dereferencing this pointer leads to an access violation and application crash when opening a crafted PDF. |
2026-04-13 | |
| CVE-2025-66769 | 7.5 | HIGH | CWE-476 | 0.0% p2 | 5.25 | A NULL pointer dereference in Nitro PDF Pro for Windows v14.41.1.4 allows attack...A NULL pointer dereference in Nitro PDF Pro for Windows v14.41.1.4 allows attackers to cause a Denial of Service (DoS) via a crafted XFA packet. |
2026-04-13 | |
| CVE-2025-63743 | 5.4 | MEDIUM | CWE-79 | 0.0% p6 | 3.78 | Cross-Site Scripting vulnerability in the Snipe-IT web-based asset management sy...Cross-Site Scripting vulnerability in the Snipe-IT web-based asset management system v8.3.0 to up and including v8.3.1 allows authenticated attacker with lowest privileges sufficient only to log in, to inject arbitrary JavaScript code via "Name" and "Surname" fields. The JavaScript code is executed whenever "Activity Report" or modified profile is viewed directly by any user with sufficient permissions. Successful exploitation of this issue requires that the profile's "Display Name" is not set. The vulnerability is fixed in v8.3.2. |
2026-04-13 | |
| CVE-2025-31991 | 6.8 | MEDIUM | CWE-307 | 0.0% p6 | 4.76 | Rate Limiting for attempting a user login is not being properly enforced, making...Rate Limiting for attempting a user login is not being properly enforced, making HCL DevOps Velocity susceptible to brute-force attacks past the unsuccessful login attempt limit. This vulnerability is fixed in 5.1.7. |
2026-04-13 | |
| CVE-2026-6183 | 6.9 | MEDIUM | CWE-74 | 0.0% p8 | 4.83 | A security flaw has been discovered in code-projects Simple Content Management S...A security flaw has been discovered in code-projects Simple Content Management System 1.0. Affected by this issue is some unknown functionality of the file /web/index.php. Performing a manipulation of the argument ID results in sql injection. Remote exploitation of the attack is possible. The exploit has been released to the public and may be used for attacks. |
2026-04-13 | |
| CVE-2026-6182 | 6.9 | MEDIUM | CWE-74 | 0.0% p8 | 4.83 | A vulnerability was identified in code-projects Simple Content Management System...A vulnerability was identified in code-projects Simple Content Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /web/admin/login.php. Such manipulation of the argument User leads to sql injection. The attack may be launched remotely. The exploit is publicly available and might be used. |
2026-04-13 | |
| CVE-2026-36945 | 2.7 | LOW | CWE-89 | 0.0% p5 | 1.89 | Sourcecodester Computer and Mobile Repair Shop Management System v1.0 is vulnera...Sourcecodester Computer and Mobile Repair Shop Management System v1.0 is vulnerable to SQL injection in the file /rsms/admin/clients/manage_client.php |
2026-04-13 | |
| CVE-2026-36944 | 2.7 | LOW | CWE-89 | 0.0% p5 | 1.89 | Sourcecodester Computer and Mobile Repair Shop Management System v1.0 is vulnera...Sourcecodester Computer and Mobile Repair Shop Management System v1.0 is vulnerale to SQL injection in the file/rsms/admin/repairs/view_details.php. |
2026-04-13 | |
| CVE-2026-36943 | 2.7 | LOW | CWE-89 | 0.0% p5 | 1.89 | Sourcecodester Computer and Mobile Repair Shop Management System v1.0 is vulnera...Sourcecodester Computer and Mobile Repair Shop Management System v1.0 is vulnerable to SQL injection in the file /rsms/admin/repairs/manage_repair.php. |
2026-04-13 | |
| CVE-2026-36942 | 2.7 | LOW | N/A | 0.0% p5 | 1.89 | Sourcecodester Online Resort Management System v1.0 is vulnerable to SQL injecti...Sourcecodester Online Resort Management System v1.0 is vulnerable to SQL injection in the file /orms/admin/activities/manage_activity.php. |
2026-04-13 | |
| CVE-2026-36941 | 2.7 | LOW | CWE-89 | 0.0% p5 | 1.89 | Sourcecodester Online Resort Management System v1.0 is vulnerable to SQL Injecti...Sourcecodester Online Resort Management System v1.0 is vulnerable to SQL Injection in the file /orms/admin/rooms/manage_room.php. |
2026-04-13 | |
| CVE-2026-31283 | 9.8 | CRITICAL | CWE-770 | 0.0% p12 | 6.86 | In Totara LMS v19.1.5 and before, the forgot password API does not implement rat...In Totara LMS v19.1.5 and before, the forgot password API does not implement rate limiting for the target email address. which can be used for an Email Bombing attack. |
2026-04-13 | |
| CVE-2026-31282 | 9.8 | CRITICAL | CWE-284 | 0.0% p12 | 6.86 | Totara LMS v19.1.5 and before is vulnerable to Incorrect Access Control. The log...Totara LMS v19.1.5 and before is vulnerable to Incorrect Access Control. The login page code can be manipulated to reveal the login form. An attacker can chain that with missing rate-limit on the login form to launch a brute force attack. |
2026-04-13 | |
| CVE-2026-31281 | 8.0 | HIGH | CWE-79 | 0.0% p12 | 5.60 | Totara LMS v19.1.5 and before is vulnerable to HTLM Injection. An attacker can i...Totara LMS v19.1.5 and before is vulnerable to HTLM Injection. An attacker can inject malicious HTLM code in a message and send it to all the users in the application, resulting in executing the code and may lead to session hijacking and executing commands on the victim's browser. |
2026-04-13 | |
| CVE-2026-30999 | 7.5 | HIGH | CWE-122 | 0.0% p12 | 5.25 | A heap buffer overflow in the av_bprint_finalize() function of FFmpeg v8.0.1 all...A heap buffer overflow in the av_bprint_finalize() function of FFmpeg v8.0.1 allows attackers to cause a Denial of Service (DoS) via a crafted input. |
2026-04-13 | |
| CVE-2026-30998 | 7.5 | HIGH | CWE-400 | 0.0% p11 | 5.25 | An improper resource deallocation and closure vulnerability in the tools/zmqsend...An improper resource deallocation and closure vulnerability in the tools/zmqsend.c component of FFmpeg v8.0.1 allows attackers to cause a Denial of Service (DoS) via supplying a crafted input file. |
2026-04-13 | |
| CVE-2026-30997 | 7.5 | HIGH | CWE-125 | 0.0% p11 | 5.25 | An out-of-bounds read in the read_global_param() function (libavcodec/av1dec.c) ...An out-of-bounds read in the read_global_param() function (libavcodec/av1dec.c) of FFmpeg v8.0.1 allows attackers to cause a Denial of Service (DoS) via a crafted input. |
2026-04-13 | |
| CVE-2026-29628 | 6.2 | MEDIUM | CWE-121 | 0.0% p2 | 4.34 | A stack overflow in the experimental/tinyobj_loader_opt.h file of tinyobjloader ...A stack overflow in the experimental/tinyobj_loader_opt.h file of tinyobjloader commit d56555b allows attackers to cause a Denial of Service (DoS) via supplying a crafted .mtl file. |
2026-04-13 | |
| CVE-2026-1462 | 8.8 | HIGH | CWE-502 | 0.1% p18 | 6.16 | A vulnerability in the `TFSMLayer` class of the `keras` package, version 3.13.0,...A vulnerability in the `TFSMLayer` class of the `keras` package, version 3.13.0, allows attacker-controlled TensorFlow SavedModels to be loaded during deserialization of `.keras` models, even when `safe_mode=True`. This bypasses the security guarantees of `safe_mode` and enables arbitrary attacker-controlled code execution during model inference under the victim's privileges. The issue arises due to the unconditional loading of external SavedModels, serialization of attacker-controlled file paths, and the lack of validation in the `from_config()` method. |
2026-04-13 | |
| CVE-2026-36947 | 2.7 | LOW | CWE-89 | 0.0% p5 | 1.89 | Sourcecodester Computer and Mobile Repair Shop Management System v1.0 is vulnera...Sourcecodester Computer and Mobile Repair Shop Management System v1.0 is vulnerable to SQL Injection in the file /rsms/admin/services/view_service.php. |
2026-04-13 | |
| CVE-2026-36946 | 2.7 | LOW | CWE-89 | 0.0% p5 | 1.89 | Sourcecodester Computer and Mobile Repair Shop Management System v1.0 is vulnera...Sourcecodester Computer and Mobile Repair Shop Management System v1.0 is vulnerable to SQL injection in the file /rsms/admin/inquiries/view_details.php. |
2026-04-13 | |
| CVE-2026-36923 | 2.7 | LOW | CWE-89 | 0.0% p5 | 1.89 | Sourcecodester Cab Management System 1.0 is vulnerable to SQL Injection in the f...Sourcecodester Cab Management System 1.0 is vulnerable to SQL Injection in the file /cms/admin/bookings/view_booking.php. |
2026-04-13 | |
| CVE-2026-36922 | 2.7 | LOW | CWE-89 | 0.0% p5 | 1.89 | Sourcecodester Cab Management System v1.0 is vulnerable to SQL injection in the ...Sourcecodester Cab Management System v1.0 is vulnerable to SQL injection in the file /cms/admin/categories/view_category.php. |
2026-04-13 | |
| CVE-2026-36920 | 2.7 | LOW | CWE-89 | 0.0% p5 | 1.89 | Sourcecodester Online Reviewer System v1.0 is vulnerable to SQL Injection in the...Sourcecodester Online Reviewer System v1.0 is vulnerable to SQL Injection in the file /system/system/admins/assessments/examproper/questions-view.php. |
2026-04-13 | |
| CVE-2026-36919 | 2.7 | LOW | CWE-89 | 0.0% p5 | 1.89 | Sourcecodester Online Reviewer System v1.0 is vulnerale to SQL Injection in the ...Sourcecodester Online Reviewer System v1.0 is vulnerale to SQL Injection in the file /system/system/admins/assessments/examproper/exam-update.php. |
2026-04-13 | |
| CVE-2026-36874 | 2.7 | LOW | CWE-89 | 0.0% p5 | 1.89 | Sourcecodester Basic Library System v1.0 is vulnerable to SQL Injection in /libr...Sourcecodester Basic Library System v1.0 is vulnerable to SQL Injection in /librarysystem/load_student.php. |
2026-04-13 | |
| CVE-2026-36873 | 2.7 | LOW | CWE-89 | 0.0% p5 | 1.89 | Sourcecodester Basic Library System v1.0 is vulnerable to SQL Injection in /libr...Sourcecodester Basic Library System v1.0 is vulnerable to SQL Injection in /librarysystem/load_admin.php. |
2026-04-13 | |
| CVE-2026-36872 | 2.7 | LOW | CWE-89 | 0.0% p5 | 1.89 | Sourcecodester Basic Library System v1.0 is vulnerable to SQL Injection in /libr...Sourcecodester Basic Library System v1.0 is vulnerable to SQL Injection in /librarysystem/load_book.php. |
2026-04-13 | |
| CVE-2026-6204 | 8.5 | HIGH | CWE-78 | 0.0% p0 | 5.95 | LibreNMS versions before 26.3.0 are affected by an authenticated remote code exe...LibreNMS versions before 26.3.0 are affected by an authenticated remote code execution vulnerability by abusing the Binary Locations config and the Netcommand feature. Successful exploitation requires administrative privileges. Exploitation could result in compromise of the underlying web server. |
2026-04-13 | |
| CVE-2026-2728 | 4.6 | MEDIUM | CWE-79 | 0.0% p0 | 3.22 | LibreNMS versions before 26.3.0 are affected by an authenticated Cross-site Scri...LibreNMS versions before 26.3.0 are affected by an authenticated Cross-site Scripting vulnerability on the showconfig page. Successful exploitation requires administrative privileges. Exploitation could result in XSS attacks being performed against other users with access to the page. |
2026-04-13 | |
| CVE-2025-15632 | 5.1 | MEDIUM | CWE-79 | 0.0% p9 | 3.57 | A vulnerability has been found in 1Panel-dev MaxKB up to 2.4.2. Impacted is an u...A vulnerability has been found in 1Panel-dev MaxKB up to 2.4.2. Impacted is an unknown function of the file ui/src/chat.ts of the component MdPreview. Such manipulation leads to cross site scripting. The attack can be executed remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.5.0 is recommended to address this issue. The name of the patch is 7230daa5ec3e6574b6ede83dd48a4fbc0e70b8d8. It is advisable to upgrade the affected component. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product. |
2026-04-13 | |
| CVE-2026-0234 | 7.2 | HIGH | CWE-347 | 0.0% p7 | 5.04 | An improper verification of cryptographic signature vulnerability exists in Cort...An improper verification of cryptographic signature vulnerability exists in Cortex XSOAR and Cortex XSIAM platforms during integration of Microsoft Teams that enables an unauthenticated user to access and modify protected resources. |
2026-04-13 | |
| CVE-2026-0233 | 2.0 | LOW | CWE-295 | 0.0% p1 | 1.40 | A certificate validation vulnerability in Palo Alto Networks Autonomous Digital ...A certificate validation vulnerability in Palo Alto Networks Autonomous Digital Experience Manager on Windows allows an unauthenticated attacker with adjacent network access to execute arbitrary code with NT AUTHORITY\SYSTEM privileges. |
2026-04-13 | |
| CVE-2026-0232 | 4.0 | MEDIUM | CWE-15 | 0.0% p2 | 2.80 | A problem with a protection mechanism in the Palo Alto Networks Cortex XDR agent...A problem with a protection mechanism in the Palo Alto Networks Cortex XDR agent on Windows allows a local Windows administrator to disable the agent. This issue may be leveraged by malware to perform malicious activity without detection. |
2026-04-13 | |
| CVE-2026-6168 | 7.4 | HIGH | CWE-119 | 0.1% p22 | 5.18 | A flaw has been found in TOTOLINK A7000R up to 9.1.0u.6115. The affected element...A flaw has been found in TOTOLINK A7000R up to 9.1.0u.6115. The affected element is the function setWiFiEasyGuestCfg of the file /cgi-bin/cstecgi.cgi. This manipulation of the argument ssid5g causes stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been published and may be used. |
2026-04-13 | |
| CVE-2026-6167 | 6.9 | MEDIUM | CWE-74 | 0.0% p8 | 4.83 | A vulnerability was detected in code-projects Faculty Management System 1.0. Imp...A vulnerability was detected in code-projects Faculty Management System 1.0. Impacted is an unknown function of the file /subject-print.php. The manipulation of the argument ID results in sql injection. The attack may be launched remotely. The exploit is now public and may be used. |
2026-04-13 | |
| CVE-2026-6166 | 6.9 | MEDIUM | CWE-74 | 0.0% p8 | 4.83 | A security vulnerability has been detected in code-projects Vehicle Showroom Man...A security vulnerability has been detected in code-projects Vehicle Showroom Management System 1.0. This issue affects some unknown processing of the file /util/UpdateVehicleFunction.php. The manipulation of the argument VEHICLE_ID leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used. |
2026-04-13 | |
| CVE-2026-5936 | 8.5 | HIGH | CWE-918 | 0.0% p7 | 5.95 | An attacker can control a server-side HTTP request by supplying a crafted URL, c...An attacker can control a server-side HTTP request by supplying a crafted URL, causing the server to initiate requests to arbitrary destinations. This behavior may be exploited to probe internal network services, access otherwise unreachable endpoints (e.g., cloud metadata services), or bypass network access controls, potentially leading to sensitive information disclosure and further compromise of the internal environment. |
2026-04-13 | |
| CVE-2026-40436 | 7.1 | HIGH | N/A | 0.0% p11 | 4.97 | The ZTE ZXEDM iEMS product has a password reset vulnerability for any user.Becau...The ZTE ZXEDM iEMS product has a password reset vulnerability for any user.Because the management of the cloud EMS portal does not properly control access to the user list acquisition function, attackers can read all user list information through the user list interface. Attackers can reset the passwords of obtained user information, causing risks such as unauthorized operations. |
2026-04-13 | |
| CVE-2026-3830 | 8.6 | HIGH | CWE-89 | 0.1% p19 | 6.02 | The Product Filter for WooCommerce by WBW WordPress plugin before 3.1.3 does not...The Product Filter for WooCommerce by WBW WordPress plugin before 3.1.3 does not sanitize and escape a parameter before using it in a SQL statement, allowing unauthenticated users to perform SQL injection attacks |
2026-04-13 | |
| CVE-2026-34866 | 5.1 | MEDIUM | CWE-120 | 0.0% p0 | 3.57 | Out-of-bounds write vulnerability in the WEB module.Impact: Successful exploitat...Out-of-bounds write vulnerability in the WEB module.Impact: Successful exploitation of this vulnerability will affect availability and confidentiality. |
2026-04-13 | |
| CVE-2026-34865 | 10.0 | CRITICAL | CWE-122 | 0.0% p5 | 7.00 | Out-of-bounds write vulnerability in the WEB module.Impact: Successful exploitat...Out-of-bounds write vulnerability in the WEB module.Impact: Successful exploitation of this vulnerability will affect availability and confidentiality. |
2026-04-13 | |
| CVE-2025-15441 | 6.8 | MEDIUM | CWE-89 | 0.0% p10 | 4.76 | The Form Maker by 10Web WordPress plugin before 1.15.38 does not properly prepa...The Form Maker by 10Web WordPress plugin before 1.15.38 does not properly prepare SQL queries when the "MySQL Mapping" feature is in use, which could make SQL Injection attacks possible in certain contexts. |
2026-04-13 | |
| CVE-2026-6165 | 6.9 | MEDIUM | CWE-74 | 0.0% p8 | 4.83 | A weakness has been identified in code-projects Vehicle Showroom Management Syst...A weakness has been identified in code-projects Vehicle Showroom Management System 1.0. This vulnerability affects unknown code of the file /util/Login_check.php. Executing a manipulation of the argument ID can lead to sql injection. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks. |
2026-04-13 | |
| CVE-2026-6164 | 6.9 | MEDIUM | CWE-74 | 0.0% p8 | 4.83 | A security flaw has been discovered in code-projects Lost and Found Thing Manage...A security flaw has been discovered in code-projects Lost and Found Thing Management 1.0. This affects an unknown part of the file /addcat.php. Performing a manipulation of the argument cata results in sql injection. The attack can be initiated remotely. The exploit has been released to the public and may be used for attacks. |
2026-04-13 | |
| CVE-2026-6163 | 6.9 | MEDIUM | CWE-74 | 0.0% p8 | 4.83 | A vulnerability was identified in code-projects Lost and Found Thing Management ...A vulnerability was identified in code-projects Lost and Found Thing Management 1.0. Affected by this issue is some unknown functionality of the file /catageory.php. Such manipulation of the argument cat leads to sql injection. It is possible to launch the attack remotely. The exploit is publicly available and might be used. |
2026-04-13 | |
| CVE-2026-40447 | 5.1 | MEDIUM | CWE-190 | 0.0% p2 | 3.57 | Integer overflow or wraparound vulnerability in Samsung Open Source Escargot all...Integer overflow or wraparound vulnerability in Samsung Open Source Escargot allows undefined behavior.This issue affects Escargot: 97e8115ab1110bc502b4b5e4a0c689a71520d335. |
2026-04-13 | |
| CVE-2026-21014 | 5.1 | MEDIUM | N/A | 0.0% p2 | 3.57 | Improper access control in Samsung Camera prior to version 16.5.00.28 allows loc...Improper access control in Samsung Camera prior to version 16.5.00.28 allows local attacker to access location data. User interaction is required for triggering this vulnerability. |
2026-04-13 | |
| CVE-2026-21013 | 6.9 | MEDIUM | N/A | 0.0% p2 | 4.83 | Incorrect default permission in Galaxy Wearable prior to version 2.2.68.26 allow...Incorrect default permission in Galaxy Wearable prior to version 2.2.68.26 allows local attackers to access sensitive information. |
2026-04-13 | |
| CVE-2026-21012 | 6.8 | MEDIUM | NVD-CWE-noinfo | 0.0% p2 | 4.76 | External control of file name in AODManager prior to SMR Apr-2026 Release 1 allo...External control of file name in AODManager prior to SMR Apr-2026 Release 1 allows privileged local attacker to create file with system privilege. |
2026-04-13 | |
| CVE-2026-21011 | 5.4 | MEDIUM | CWE-732 | 0.0% p5 | 3.78 | Incorrect privilege assignment in Bluetooth in Maintenance mode prior to SMR Apr...Incorrect privilege assignment in Bluetooth in Maintenance mode prior to SMR Apr-2026 Release 1 allows physical attackers to bypass Extend Unlock. |
2026-04-13 | |
| CVE-2026-21010 | 6.6 | MEDIUM | NVD-CWE-noinfo | 0.0% p5 | 4.62 | Improper input validation in Retail Mode prior to SMR Apr-2026 Release 1 allows ...Improper input validation in Retail Mode prior to SMR Apr-2026 Release 1 allows local attackers to trigger privileged functions. |
2026-04-13 | |
| CVE-2026-21009 | 4.1 | MEDIUM | N/A | 0.0% p5 | 2.87 | Improper check for exceptional conditions in Recents prior to SMR Apr-2026 Relea...Improper check for exceptional conditions in Recents prior to SMR Apr-2026 Release 1 allows physical attacker to bypass App Pinning. |
2026-04-13 | |
| CVE-2026-21008 | 5.1 | MEDIUM | NVD-CWE-noinfo | 0.0% p2 | 3.57 | Exposure of sensitive information in S Share prior to SMR Apr-2026 Release 1 all...Exposure of sensitive information in S Share prior to SMR Apr-2026 Release 1 allows adjacent attacker to access sensitive information. |
2026-04-13 | |
| CVE-2026-21007 | 4.4 | MEDIUM | CWE-754 | 0.0% p5 | 3.08 | Improper check for exceptional conditions in Device Care prior to SMR Apr-2026 R...Improper check for exceptional conditions in Device Care prior to SMR Apr-2026 Release 1 allows physical attackers to bypass Knox Guard. |
2026-04-13 | |
| CVE-2026-21006 | 4.7 | MEDIUM | NVD-CWE-noinfo | 0.0% p5 | 3.29 | Improper access control in Samsung DeX prior to SMR Apr-2026 Release 1 allows ph...Improper access control in Samsung DeX prior to SMR Apr-2026 Release 1 allows physical attackers to access to hidden notification contents. |
2026-04-13 | |
| CVE-2026-6162 | 5.1 | MEDIUM | CWE-79 | 0.0% p8 | 3.57 | A vulnerability has been found in PHPGurukul Company Visitor Management System 2...A vulnerability has been found in PHPGurukul Company Visitor Management System 2.0. This impacts an unknown function of the file /bwdates-reports-details.php. The manipulation of the argument fromdate leads to cross site scripting. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used. |
2026-04-13 | |
| CVE-2026-6161 | 6.9 | MEDIUM | CWE-74 | 0.0% p8 | 4.83 | A vulnerability was determined in code-projects Simple ChatBox up to 1.0. This a...A vulnerability was determined in code-projects Simple ChatBox up to 1.0. This affects an unknown part of the file /chatbox/insert.php of the component Endpoint. Executing a manipulation of the argument msg can lead to sql injection. It is possible to launch the attack remotely. The exploit has been publicly disclosed and may be utilized. |
2026-04-13 | |
| CVE-2026-6160 | 5.5 | MEDIUM | CWE-200 | 0.0% p8 | 3.85 | A vulnerability was found in code-projects Simple ChatBox 1.0. Affected by this ...A vulnerability was found in code-projects Simple ChatBox 1.0. Affected by this issue is the function SimpleChatbox_PHP of the file chatbox.sql of the component Endpoint. Performing a manipulation results in file and directory information exposure. It is possible to initiate the attack remotely. The exploit has been made public and could be used. |
2026-04-13 | |
| CVE-2026-6159 | 5.3 | MEDIUM | CWE-79 | 0.0% p9 | 3.71 | A vulnerability has been found in code-projects Simple ChatBox up to 1.0. Affect...A vulnerability has been found in code-projects Simple ChatBox up to 1.0. Affected by this vulnerability is an unknown functionality of the file /chatbox/insert.php of the component Endpoint. Such manipulation of the argument msg leads to cross site scripting. The attack may be performed from remote. The exploit has been disclosed to the public and may be used. |
2026-04-13 | |
| CVE-2026-6158 | 6.9 | MEDIUM | CWE-77 | 2.4% p84 | 4.90 | A flaw has been found in Totolink N300RH 6.1c.1353_B20190305. Affected is the fu...A flaw has been found in Totolink N300RH 6.1c.1353_B20190305. Affected is the function setUpgradeUboot of the file upgrade.so. This manipulation of the argument FileName causes os command injection. The attack is possible to be carried out remotely. The exploit has been published and may be used. |
2026-04-13 | |
| CVE-2026-40446 | 6.9 | MEDIUM | CWE-843 | 0.0% p1 | 4.83 | Access of resource using incompatible type ('type confusion') vulnerability in S...Access of resource using incompatible type ('type confusion') vulnerability in Samsung Open Source Escargot allows Pointer Manipulation.This issue affects Escargot: 97e8115ab1110bc502b4b5e4a0c689a71520d335. |
2026-04-13 | |
| CVE-2026-35553 | 8.4 | HIGH | CWE-121 | 0.0% p1 | 5.88 | Bluetooth ACPI Drivers provided by Dynabook Inc. contain a stack-based buffer ov...Bluetooth ACPI Drivers provided by Dynabook Inc. contain a stack-based buffer overflow vulnerability. An attacker may execute arbitrary code by modifying certain registry values. |
2026-04-13 | |
| CVE-2026-25209 | 6.5 | MEDIUM | CWE-125 | 0.0% p12 | 4.55 | Out-of-bounds read vulnerability in Samsung Open Source Escargot allows Resource...Out-of-bounds read vulnerability in Samsung Open Source Escargot allows Resource Leak Exposure.This issue affects Escargot: 97e8115ab1110bc502b4b5e4a0c689a71520d335. |
2026-04-13 | |
| CVE-2026-25208 | 8.1 | HIGH | CWE-190 | 0.0% p12 | 5.67 | Integer overflow vulnerability in Samsung Open Source Escargot allows Overflow B...Integer overflow vulnerability in Samsung Open Source Escargot allows Overflow Buffers.This issue affects Escargot: 97e8115ab1110bc502b4b5e4a0c689a71520d335. |
2026-04-13 | |
| CVE-2026-25207 | 7.4 | HIGH | CWE-787 | 0.0% p2 | 5.18 | Out-of-bounds write vulnerability in Samsung Open Source Escargot allows Overflo...Out-of-bounds write vulnerability in Samsung Open Source Escargot allows Overflow Buffers.This issue affects Escargot: 97e8115ab1110bc502b4b5e4a0c689a71520d335. |
2026-04-13 | |
| CVE-2026-25206 | 6.7 | MEDIUM | CWE-125 | 0.0% p2 | 4.69 | Out-of-bounds read vulnerability in Samsung Open Source Escargot allows Resource...Out-of-bounds read vulnerability in Samsung Open Source Escargot allows Resource Leak Exposure.This issue affects Escargot: 97e8115ab1110bc502b4b5e4a0c689a71520d335. |
2026-04-13 | |
| CVE-2026-21003 | 5.2 | MEDIUM | N/A | 0.0% p13 | 3.64 | Improper input validation in data related to network restrictions prior to SMR A...Improper input validation in data related to network restrictions prior to SMR Apr-2026 Release 1 allows physical attackers to bypass the restrictions. |
2026-04-13 | |
| CVE-2026-6157 | 7.4 | HIGH | CWE-119 | 0.1% p22 | 5.18 | A vulnerability was detected in Totolink A800R 4.1.2cu.5137_B20200730. This impa...A vulnerability was detected in Totolink A800R 4.1.2cu.5137_B20200730. This impacts the function setAppEasyWizardConfig in the library /lib/cste_modules/app.so. The manipulation of the argument apcliSsid results in buffer overflow. The attack can be executed remotely. The exploit is now public and may be used. |
2026-04-13 | |
| CVE-2026-6156 | 8.9 | HIGH | CWE-77 | 0.9% p75 | 6.26 | A security vulnerability has been detected in Totolink A7100RU 7.4cu.2313_b20191...A security vulnerability has been detected in Totolink A7100RU 7.4cu.2313_b20191024. This affects the function setIpQosRules of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument Comment leads to os command injection. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used. |
2026-04-13 | |
| CVE-2026-6155 | 8.9 | HIGH | CWE-77 | 0.9% p75 | 6.26 | A weakness has been identified in Totolink A7100RU 7.4cu.2313. The impacted elem...A weakness has been identified in Totolink A7100RU 7.4cu.2313. The impacted element is the function setWanCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Executing a manipulation of the argument pppoeServiceName can lead to os command injection. The attack may be launched remotely. The exploit has been made available to the public and could be used for attacks. |
2026-04-13 | |
| CVE-2026-6154 | 8.9 | HIGH | CWE-77 | 0.9% p75 | 6.26 | A security flaw has been discovered in Totolink A7100RU 7.4cu.2313_b20191024. Th...A security flaw has been discovered in Totolink A7100RU 7.4cu.2313_b20191024. The affected element is the function setWizardCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Performing a manipulation of the argument wizard results in os command injection. The attack may be initiated remotely. The exploit has been released to the public and may be used for attacks. |
2026-04-13 | |
| CVE-2026-6153 | 6.9 | MEDIUM | CWE-74 | 0.0% p8 | 4.83 | A vulnerability was identified in code-projects Vehicle Showroom Management Syst...A vulnerability was identified in code-projects Vehicle Showroom Management System 1.0. Impacted is an unknown function of the file /util/StaffDetailsFunction.php. Such manipulation of the argument STAFF_ID leads to sql injection. The attack can be launched remotely. The exploit is publicly available and might be used. |
2026-04-13 | |
| CVE-2026-6179 | 6.3 | MEDIUM | CWE-79 | 0.0% p14 | 4.41 | Stored Cross Site Scripting in NightWolf Penetration Testing Platform allows att...Stored Cross Site Scripting in NightWolf Penetration Testing Platform allows attack trigger and run malicious script in user's browser |
2026-04-13 | |
| CVE-2026-6152 | 6.9 | MEDIUM | CWE-74 | 0.0% p8 | 4.83 | A vulnerability was determined in code-projects Vehicle Showroom Management Syst...A vulnerability was determined in code-projects Vehicle Showroom Management System 1.0. This issue affects some unknown processing of the file /util/StaffAddingFunction.php. This manipulation of the argument STAFF_ID causes sql injection. The attack can be initiated remotely. The exploit has been publicly disclosed and may be utilized. |
2026-04-13 | |
| CVE-2026-6151 | 6.9 | MEDIUM | CWE-74 | 0.0% p8 | 4.83 | A vulnerability was found in code-projects Vehicle Showroom Management System 1....A vulnerability was found in code-projects Vehicle Showroom Management System 1.0. This vulnerability affects unknown code of the file /util/PaymentStatusFunction.php. The manipulation of the argument CUSTOMER_ID results in sql injection. It is possible to launch the attack remotely. The exploit has been made public and could be used. |
2026-04-13 | |
| CVE-2026-6150 | 5.3 | MEDIUM | CWE-79 | 0.0% p9 | 3.71 | A vulnerability has been found in code-projects Simple Laundry System 1.0. This ...A vulnerability has been found in code-projects Simple Laundry System 1.0. This affects an unknown part of the file /checkupdatestatus.php. The manipulation of the argument serviceId leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. |
2026-04-13 | |
| CVE-2026-6149 | 6.9 | MEDIUM | CWE-74 | 0.0% p8 | 4.83 | A flaw has been found in code-projects Vehicle Showroom Management System 1.0. A...A flaw has been found in code-projects Vehicle Showroom Management System 1.0. Affected by this issue is some unknown functionality of the file /util/BookVehicleFunction.php. Executing a manipulation of the argument BRANCH_ID can lead to sql injection. The attack may be performed from remote. The exploit has been published and may be used. |
2026-04-13 | |
| CVE-2026-6148 | 6.9 | MEDIUM | CWE-74 | 0.0% p8 | 4.83 | A vulnerability was detected in code-projects Vehicle Showroom Management System...A vulnerability was detected in code-projects Vehicle Showroom Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /util/MonthTotalReportUpdateFunction.php. Performing a manipulation of the argument BRANCH_ID results in sql injection. The attack is possible to be carried out remotely. The exploit is now public and may be used. |
2026-04-13 | |
| CVE-2026-6143 | 5.3 | MEDIUM | CWE-346 | 0.0% p5 | 3.71 | A security flaw has been discovered in farion1231 cc-switch up to 3.12.3. Affect...A security flaw has been discovered in farion1231 cc-switch up to 3.12.3. Affected by this issue is some unknown functionality of the file src-tauri/src/proxy/server.rs of the component ProxyServer. The manipulation results in permissive cross-domain policy with untrusted domains. The attack can be executed remotely. The exploit has been released to the public and may be used for attacks. |
2026-04-13 | |
| CVE-2026-6142 | 6.9 | MEDIUM | CWE-74 | 0.0% p8 | 4.83 | A vulnerability was identified in tushar-2223 Hotel Management System up to bb1f...A vulnerability was identified in tushar-2223 Hotel Management System up to bb1f3b3666124b888f1e4bcf51b6fba9fbb01d15. Affected by this vulnerability is an unknown functionality of the file /admin/roomdelete.php. The manipulation of the argument ID leads to sql injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used. This product follows a rolling release approach for continuous delivery, so version details for affected or updated releases are not provided. The project was informed of the problem early through an issue report but has not responded yet. |
2026-04-13 | |
| CVE-2026-6141 | 5.3 | MEDIUM | CWE-77 | 0.7% p72 | 3.73 | A vulnerability was determined in danielmiessler Personal_AI_Infrastructure up t...A vulnerability was determined in danielmiessler Personal_AI_Infrastructure up to 2.3.0. Affected is an unknown function of the file Skills/Parser/Tools/parse_url.ts. Executing a manipulation can lead to os command injection. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized. This patch is called 14322e87e58bf585cf3c7b9295578a6eb7dc4945. It is advisable to implement a patch to correct this issue. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product. |
2026-04-13 | |
| CVE-2026-6140 | 8.9 | HIGH | CWE-77 | 0.9% p75 | 6.26 | A vulnerability was found in Totolink A7100RU 7.4cu.2313_b20191024. This impacts...A vulnerability was found in Totolink A7100RU 7.4cu.2313_b20191024. This impacts the function UploadFirmwareFile of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Performing a manipulation of the argument FileName results in os command injection. The attack may be initiated remotely. The exploit has been made public and could be used. |
2026-04-13 | |
| CVE-2026-6139 | 8.9 | HIGH | CWE-77 | 0.9% p75 | 6.26 | A vulnerability has been found in Totolink A7100RU 7.4cu.2313_b20191024. This af...A vulnerability has been found in Totolink A7100RU 7.4cu.2313_b20191024. This affects the function UploadOpenVpnCert of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Such manipulation of the argument FileName leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. |
2026-04-13 | |
| CVE-2026-6138 | 8.9 | HIGH | CWE-77 | 0.9% p75 | 6.26 | A flaw has been found in Totolink A7100RU 7.4cu.2313_b20191024. The impacted ele...A flaw has been found in Totolink A7100RU 7.4cu.2313_b20191024. The impacted element is the function setAccessDeviceCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. This manipulation of the argument mac causes os command injection. The attack can be initiated remotely. The exploit has been published and may be used. |
2026-04-13 | |
| CVE-2026-6137 | 7.4 | HIGH | CWE-119 | 0.0% p14 | 5.18 | A vulnerability was detected in Tenda F451 1.0.0.7_cn_svn7958. The affected elem...A vulnerability was detected in Tenda F451 1.0.0.7_cn_svn7958. The affected element is the function fromAdvSetWan of the file /goform/AdvSetWan. The manipulation of the argument wanmode/PPPOEPassword results in stack-based buffer overflow. It is possible to launch the attack remotely. The exploit is now public and may be used. |
2026-04-13 | |
| CVE-2026-6136 | 7.4 | HIGH | CWE-119 | 0.0% p14 | 5.18 | A security vulnerability has been detected in Tenda F451 1.0.0.7_cn_svn7958. Imp...A security vulnerability has been detected in Tenda F451 1.0.0.7_cn_svn7958. Impacted is the function frmL7ImForm of the file /goform/L7Im. The manipulation of the argument page leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used. |
2026-04-13 | |
| CVE-2026-6135 | 7.4 | HIGH | CWE-119 | 0.0% p14 | 5.18 | A weakness has been identified in Tenda F451 1.0.0.7_cn_svn7958. This issue affe...A weakness has been identified in Tenda F451 1.0.0.7_cn_svn7958. This issue affects the function fromSetIpBind of the file /goform/SetIpBind. Executing a manipulation of the argument page can lead to stack-based buffer overflow. The attack may be performed from remote. The exploit has been made available to the public and could be used for attacks. |
2026-04-13 | |
| CVE-2026-6134 | 7.4 | HIGH | CWE-119 | 0.0% p4 | 5.18 | A security flaw has been discovered in Tenda F451 1.0.0.7_cn_svn7958. This vulne...A security flaw has been discovered in Tenda F451 1.0.0.7_cn_svn7958. This vulnerability affects the function fromqossetting of the file /goform/qossetting. Performing a manipulation of the argument qos results in stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been released to the public and may be used for attacks. |
2026-04-12 | |
| CVE-2026-6133 | 7.4 | HIGH | CWE-119 | 0.0% p14 | 5.18 | A vulnerability was identified in Tenda F451 1.0.0.7_cn_svn7958. This affects th...A vulnerability was identified in Tenda F451 1.0.0.7_cn_svn7958. This affects the function fromSafeUrlFilter of the file /goform/SafeUrlFilter. Such manipulation of the argument page leads to stack-based buffer overflow. The attack can be executed remotely. The exploit is publicly available and might be used. |
2026-04-12 | |
| CVE-2026-6132 | 8.9 | HIGH | CWE-77 | 0.9% p75 | 6.26 | A vulnerability was determined in Totolink A7100RU 7.4cu.2313_b20191024. Affecte...A vulnerability was determined in Totolink A7100RU 7.4cu.2313_b20191024. Affected by this issue is the function setLedCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. This manipulation of the argument enable causes os command injection. Remote exploitation of the attack is possible. The exploit has been publicly disclosed and may be utilized. |
2026-04-12 | |
| CVE-2026-6131 | 8.9 | HIGH | CWE-77 | 0.9% p75 | 6.26 | A vulnerability was found in Totolink A7100RU 7.4cu.2313_b20191024. Affected by ...A vulnerability was found in Totolink A7100RU 7.4cu.2313_b20191024. Affected by this vulnerability is the function setTracerouteCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument command results in os command injection. The attack may be launched remotely. The exploit has been made public and could be used. |
2026-04-12 | |
| CVE-2026-6130 | 6.9 | MEDIUM | CWE-77 | 0.8% p74 | 4.86 | A flaw has been found in chatboxai chatbox up to 1.20.0. This impacts the functi...A flaw has been found in chatboxai chatbox up to 1.20.0. This impacts the function StdioClientTransport of the file src/main/mcp/ipc-stdio-transport.ts of the component Model Context Protocol Server Management System. Executing a manipulation of the argument args/env can lead to os command injection. The attack can be launched remotely. The exploit has been published and may be used. The project was informed of the problem early through an issue report but has not responded yet. |
2026-04-12 | |
| CVE-2026-6129 | 6.9 | MEDIUM | CWE-287 | 0.1% p25 | 4.83 | A vulnerability was detected in zhayujie chatgpt-on-wechat CowAgent up to 2.0.4....A vulnerability was detected in zhayujie chatgpt-on-wechat CowAgent up to 2.0.4. This affects an unknown function of the component Agent Mode Service. Performing a manipulation results in missing authentication. The attack can be initiated remotely. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet. |
2026-04-12 | |
| CVE-2026-40396 | 4.0 | MEDIUM | CWE-670 | 0.0% p1 | 2.80 | Varnish Cache 9 before 9.0.1 allows a "workspace overflow" denial of service (da...Varnish Cache 9 before 9.0.1 allows a "workspace overflow" denial of service (daemon panic) after timeout_linger. A malicious client could send an HTTP/1 request, wait long enough until the session releases its worker thread (timeout_linger) and resume traffic before the session is closed (timeout_idle) sending more than one request at once to trigger a pipelining operation between requests. This vulnerability affecting Varnish Cache 9.0.0 emerged from a port of the Varnish Enterprise non-blocking architecture for HTTP/2. New code was needed to adapt to a more recent workspace API that formalizes the pipelining operation. In addition to the workspace change on the Varnish Cache side, other differences created merge conflicts, like partial support for trailers in Varnish Enterprise. The conflict resolution missed one code path configuring pipelining to perform a complete workspace rollback, losing the guarantee that prefetched data would fit inside workspace_client during the transition from one request to the next. This can result in a workspace overflow, triggering a panic and crashing the Varnish server. |
2026-04-12 | |
| CVE-2026-40395 | 4.0 | MEDIUM | CWE-770 | 0.0% p11 | 2.80 | Varnish Enterprise before 6.0.16r12 allows a "workspace overflow" denial of serv...Varnish Enterprise before 6.0.16r12 allows a "workspace overflow" denial of service (daemon panic) for shared VCL. The headerplus.write_req0() function from vmod_headerplus updates the underlying req0, which is normally the original read-only request from which req is derived (readable and writable from VCL). This is useful in the active VCL, after amending req, to prepare a refined req0 before switching to a different VCL with the return (vcl(<label>)) action. This is for example how the Varnish Controller operates shared VCL deployments. If the amended req contained too many header fields for req0, this would have resulted in a workspace overflow that would in turn trigger a panic and crash the Varnish Enterprise server. This could be used as a Denial of Service attack vector by malicious clients. |
2026-04-12 | |
| CVE-2026-40394 | 4.0 | MEDIUM | CWE-670 | 0.0% p11 | 2.80 | Varnish Cache 9 before 9.0.1 and Varnish Enterprise before 6.0.16r11 allows a "w...Varnish Cache 9 before 9.0.1 and Varnish Enterprise before 6.0.16r11 allows a "workspace overflow" denial of service (daemon panic) for certain amounts of prefetched data. The setup of an HTTP/2 session starts with a speculative HTTP/1 transport, and upon upgrading to h2 the HTTP/1 request is repurposed as stream zero. During the upgrade, a buffer allocation is made to reserve space to send frames to the client. This allocation would split the original workspace, and depending on the amount of prefetched data, the next fetch could perform a pipelining operation that would run out of workspace. |
2026-04-12 | |
| CVE-2026-40393 | 8.1 | HIGH | CWE-787 | 0.0% p12 | 5.67 | In Mesa before 25.3.6 and 26 before 26.0.1, out-of-bounds memory access can occu...In Mesa before 25.3.6 and 26 before 26.0.1, out-of-bounds memory access can occur in WebGPU because the amount of to-be-allocated data depends on an untrusted party, and is then used for alloca. |
2026-04-12 | |
| CVE-2026-40386 | 4.0 | MEDIUM | CWE-191 | 0.0% p1 | 2.80 | In libexif through 0.6.25, an integer underflow in size checking for Fuji and Ol...In libexif through 0.6.25, an integer underflow in size checking for Fuji and Olympus MakerNote decoding could be used by attackers to crash or leak information out of libexif-using programs. |
2026-04-12 | |
| CVE-2026-40385 | 4.0 | MEDIUM | CWE-190 | 0.0% p1 | 2.80 | In libexif through 0.6.25, an unsigned 32bit integer overflow in Nikon MakerNote...In libexif through 0.6.25, an unsigned 32bit integer overflow in Nikon MakerNote handling could be used by local attackers to cause crashes or information leaks. This only affects 32bit systems. |
2026-04-12 | |
| CVE-2019-25713 | 7.1 | HIGH | CWE-89 | 0.0% p7 | 4.97 | MyT-PM 1.5.1 contains an SQL injection vulnerability that allows authenticated a...MyT-PM 1.5.1 contains an SQL injection vulnerability that allows authenticated attackers to execute arbitrary SQL queries by injecting malicious code through the Charge[group_total] parameter. Attackers can submit crafted POST requests to the /charge/admin endpoint with error-based, time-based blind, or stacked query payloads to extract sensitive database information or manipulate data. |
2026-04-12 | |
| CVE-2019-25712 | 6.9 | MEDIUM | CWE-787 | 0.0% p2 | 4.83 | BlueAuditor 1.7.2.0 contains a buffer overflow vulnerability in the registration...BlueAuditor 1.7.2.0 contains a buffer overflow vulnerability in the registration key field that allows local attackers to crash the application by submitting an oversized key value. Attackers can trigger a denial of service by entering a 256-byte buffer of repeated characters in the Key registration field, causing the application to crash during registration processing. |
2026-04-12 | |
| CVE-2019-25711 | 6.9 | MEDIUM | CWE-807 | 0.0% p5 | 4.83 | SpotFTP Password Recover 2.4.2 contains a denial of service vulnerability that a...SpotFTP Password Recover 2.4.2 contains a denial of service vulnerability that allows local attackers to crash the application by supplying an oversized buffer in the Name field during registration. Attackers can generate a 256-byte payload, paste it into the Name input field, and trigger a crash when submitting the registration code. |
2026-04-12 | |
| CVE-2019-25710 | 8.8 | HIGH | CWE-89 | 0.0% p8 | 6.16 | Dolibarr ERP-CRM 8.0.4 contains an SQL injection vulnerability in the rowid para...Dolibarr ERP-CRM 8.0.4 contains an SQL injection vulnerability in the rowid parameter of the admin dict.php endpoint that allows attackers to execute arbitrary SQL queries. Attackers can inject malicious SQL code through the rowid POST parameter to extract sensitive database information using error-based SQL injection techniques. |
2026-04-12 | |
| CVE-2019-25709 | 9.3 | CRITICAL | CWE-552 | 0.1% p18 | 6.51 | CF Image Hosting Script 1.6.5 allows unauthenticated attackers to download and d...CF Image Hosting Script 1.6.5 allows unauthenticated attackers to download and decode the application database by accessing the imgdb.db file in the upload/data directory. Attackers can extract delete IDs stored in plaintext from the deserialized database and use them to delete all pictures via the d parameter. |
2026-04-12 | |
| CVE-2019-25708 | 5.3 | MEDIUM | CWE-352 | 0.0% p2 | 3.71 | Heatmiser Wifi Thermostat 1.7 contains a cross-site request forgery vulnerabilit...Heatmiser Wifi Thermostat 1.7 contains a cross-site request forgery vulnerability that allows attackers to change administrator credentials by tricking authenticated users into submitting malicious requests. Attackers can craft HTML forms targeting the networkSetup.htm endpoint with parameters usnm, usps, and cfps to modify the admin username and password without user consent. |
2026-04-12 | |
| CVE-2019-25707 | 7.1 | HIGH | CWE-89 | 0.0% p7 | 4.97 | eBrigade ERP 4.5 contains an SQL injection vulnerability that allows authenticat...eBrigade ERP 4.5 contains an SQL injection vulnerability that allows authenticated attackers to execute arbitrary SQL queries by injecting malicious code through the 'id' parameter. Attackers can send GET requests to pdf.php with crafted SQL payloads in the 'id' parameter to extract sensitive database information including table names and schema details. |
2026-04-12 | |
| CVE-2019-25706 | 8.7 | HIGH | CWE-538 | 0.1% p31 | 6.09 | Across DR-810 contains an unauthenticated file disclosure vulnerability that all...Across DR-810 contains an unauthenticated file disclosure vulnerability that allows remote attackers to download the rom-0 backup file containing sensitive information by sending a simple GET request. Attackers can access the rom-0 endpoint without authentication to retrieve and decompress the backup file, exposing router passwords and other sensitive configuration data. |
2026-04-12 | |
| CVE-2019-25705 | 8.6 | HIGH | CWE-787 | 0.0% p2 | 6.02 | Echo Mirage 3.1 contains a stack buffer overflow vulnerability that allows local...Echo Mirage 3.1 contains a stack buffer overflow vulnerability that allows local attackers to crash the application or execute arbitrary code by supplying an oversized string in the Rules action field. Attackers can create a malicious text file with a crafted payload exceeding buffer boundaries and paste it into the action field through the Rules dialog to trigger the overflow and overwrite the return address. |
2026-04-12 | |
| CVE-2019-25703 | 7.1 | HIGH | CWE-89 | 0.0% p7 | 4.97 | ImpressCMS 1.3.11 contains a time-based blind SQL injection vulnerability that a...ImpressCMS 1.3.11 contains a time-based blind SQL injection vulnerability that allows authenticated attackers to manipulate database queries by injecting SQL code through the 'bid' parameter. Attackers can send POST requests to the admin.php endpoint with malicious 'bid' values containing SQL commands to extract sensitive database information. |
2026-04-12 | |
| CVE-2019-25701 | 8.6 | HIGH | CWE-787 | 0.0% p2 | 6.02 | Easy Video to iPod Converter 1.6.20 contains a local buffer overflow vulnerabili...Easy Video to iPod Converter 1.6.20 contains a local buffer overflow vulnerability in the user registration field that allows local attackers to overwrite the structured exception handler. Attackers can input a crafted payload exceeding 996 bytes in the username field to trigger SEH overwrite and execute arbitrary code with user privileges. |
2026-04-12 | |
| CVE-2019-25699 | 7.1 | HIGH | CWE-89 | 0.0% p7 | 4.97 | Newsbull Haber Script 1.0.0 contains multiple SQL injection vulnerabilities in t...Newsbull Haber Script 1.0.0 contains multiple SQL injection vulnerabilities in the search parameter that allow authenticated attackers to extract database information through time-based, blind, and boolean-based injection techniques. Attackers can inject malicious SQL code through the search parameter in endpoints like /admin/comment/records, /admin/category/records, /admin/news/records, and /admin/menu/childs to manipulate database queries and retrieve sensitive data. |
2026-04-12 | |
| CVE-2019-25697 | 8.8 | HIGH | CWE-89 | 0.1% p20 | 6.16 | CMSsite 1.0 contains an SQL injection vulnerability that allows unauthenticated ...CMSsite 1.0 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the cat_id parameter. Attackers can send GET requests to category.php with malicious cat_id values to extract sensitive database information including usernames and credentials. |
2026-04-12 | |
| CVE-2019-25695 | 8.6 | HIGH | CWE-787 | 0.0% p2 | 6.02 | R 3.4.4 contains a local buffer overflow vulnerability that allows attackers to ...R 3.4.4 contains a local buffer overflow vulnerability that allows attackers to execute arbitrary code by injecting malicious input into the GUI Preferences language field. Attackers can craft a payload with a 292-byte offset and JMP ESP instruction to execute commands like calc.exe when the payload is pasted into the Language for menus and messages field. |
2026-04-12 | |
| CVE-2019-25693 | 7.1 | HIGH | CWE-352 | 0.0% p2 | 4.97 | ResourceSpace 8.6 contains an SQL injection vulnerability that allows authentica...ResourceSpace 8.6 contains an SQL injection vulnerability that allows authenticated attackers to execute arbitrary SQL queries by injecting malicious code through the keywords parameter in collection_edit.php. Attackers can submit POST requests with crafted SQL payloads in the keywords field to extract sensitive database information including schema names, user credentials, and other confidential data. |
2026-04-12 | |
| CVE-2019-25691 | 8.6 | HIGH | CWE-787 | 0.0% p2 | 6.02 | Faleemi Desktop Software 1.8 contains a local buffer overflow vulnerability in t...Faleemi Desktop Software 1.8 contains a local buffer overflow vulnerability in the System Setup dialog that allows attackers to bypass DEP protections through structured exception handling exploitation. Attackers can inject a crafted payload into the Save Path for Snapshot and Record file field to trigger a buffer overflow and execute arbitrary code via ROP chain gadgets. |
2026-04-12 | |
| CVE-2019-25689 | 8.6 | HIGH | CWE-787 | 0.0% p2 | 6.02 | HTML5 Video Player 1.2.5 contains a local buffer overflow vulnerability that all...HTML5 Video Player 1.2.5 contains a local buffer overflow vulnerability that allows attackers to execute arbitrary code by supplying an oversized key code string. Attackers can craft a malicious payload exceeding 997 bytes and paste it into the KEY CODE field in the Help Register dialog to trigger code execution and spawn a calculator process. |
2026-04-12 | |
| CVE-2018-25258 | 8.6 | HIGH | CWE-434 | 0.0% p2 | 6.02 | RGui 3.5.0 contains a local buffer overflow vulnerability in the GUI preferences...RGui 3.5.0 contains a local buffer overflow vulnerability in the GUI preferences dialog that allows attackers to bypass DEP protections through structured exception handling exploitation. Attackers can craft malicious input in the Language for menus and messages field to trigger a stack-based buffer overflow, execute a ROP chain for VirtualAlloc allocation, and achieve arbitrary code execution. |
2026-04-12 | |
| CVE-2018-25257 | 7.1 | HIGH | CWE-89 | 0.0% p7 | 4.97 | Adianti Framework 5.5.0 and 5.6.0 contains an SQL injection vulnerability that a...Adianti Framework 5.5.0 and 5.6.0 contains an SQL injection vulnerability that allows authenticated users to manipulate database queries by injecting SQL code through the name field in SystemProfileForm. Attackers can submit crafted SQL statements in the profile edit endpoint to modify user credentials and gain administrative access. |
2026-04-12 | |
| CVE-2017-20239 | 5.1 | MEDIUM | CWE-79 | 0.0% p10 | 3.57 | MDwiki contains a cross-site scripting vulnerability that allows remote attacker...MDwiki contains a cross-site scripting vulnerability that allows remote attackers to execute arbitrary JavaScript by injecting malicious code through the location hash parameter. Attackers can craft URLs with JavaScript payloads in the hash fragment that are parsed and rendered without sanitization, causing the injected scripts to execute in the victim's browser context. |
2026-04-12 | |
| CVE-2026-6126 | 6.9 | MEDIUM | CWE-287 | 0.1% p22 | 4.83 | A weakness has been identified in zhayujie chatgpt-on-wechat CowAgent 2.0.4. The...A weakness has been identified in zhayujie chatgpt-on-wechat CowAgent 2.0.4. The affected element is an unknown function of the component Administrative HTTP Endpoint. This manipulation causes missing authentication. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be used for attacks. The project was informed of the problem early through an issue report but has not responded yet. |
2026-04-12 | |
| CVE-2026-6125 | 5.3 | MEDIUM | CWE-74 | 0.0% p13 | 3.71 | A security flaw has been discovered in Dromara warm-flow up to 1.8.4. Impacted i...A security flaw has been discovered in Dromara warm-flow up to 1.8.4. Impacted is the function SpelHelper.parseExpression of the file /warm-flow/save-json of the component Workflow Definition Handler. The manipulation of the argument listenerPath/skipCondition/permissionFlag results in code injection. The attack may be performed from remote. The exploit has been released to the public and may be used for attacks. |
2026-04-12 | |
| CVE-2026-6124 | 7.4 | HIGH | CWE-119 | 0.0% p14 | 5.18 | A vulnerability was determined in Tenda F451 1.0.0.7. This vulnerability affects...A vulnerability was determined in Tenda F451 1.0.0.7. This vulnerability affects the function fromSafeMacFilter of the file /goform/SafeMacFilter of the component httpd. Executing a manipulation of the argument page/menufacturer can lead to stack-based buffer overflow. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized. |
2026-04-12 | |
| CVE-2026-6123 | 7.4 | HIGH | CWE-119 | 0.1% p25 | 5.18 | A vulnerability was found in Tenda F451 1.0.0.7. This affects the function fromA...A vulnerability was found in Tenda F451 1.0.0.7. This affects the function fromAddressNat of the file /goform/addressNat of the component httpd. Performing a manipulation of the argument entrys results in stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been made public and could be used. |
2026-04-12 | |
| CVE-2026-6122 | 7.4 | HIGH | CWE-119 | 0.0% p14 | 5.18 | A vulnerability has been found in Tenda F451 1.0.0.7. Affected by this issue is ...A vulnerability has been found in Tenda F451 1.0.0.7. Affected by this issue is the function frmL7ProtForm of the file /goform/L7Prot of the component httpd. Such manipulation of the argument page leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. |
2026-04-12 | |
| CVE-2026-6121 | 7.4 | HIGH | CWE-119 | 0.0% p14 | 5.18 | A flaw has been found in Tenda F451 1.0.0.7. Affected by this vulnerability is t...A flaw has been found in Tenda F451 1.0.0.7. Affected by this vulnerability is the function WrlclientSet of the file /goform/WrlclientSet of the component httpd. This manipulation of the argument GO causes stack-based buffer overflow. The attack may be initiated remotely. The exploit has been published and may be used. |
2026-04-12 | |
| CVE-2026-6120 | 7.4 | HIGH | CWE-119 | 0.0% p14 | 5.18 | A vulnerability was detected in Tenda F451 1.0.0.7. Affected is the function fro...A vulnerability was detected in Tenda F451 1.0.0.7. Affected is the function fromDhcpListClient of the file /goform/DhcpListClient of the component httpd. The manipulation of the argument page results in stack-based buffer overflow. The attack can be launched remotely. The exploit is now public and may be used. |
2026-04-12 | |
| CVE-2026-6119 | 5.3 | MEDIUM | CWE-918 | 0.0% p1 | 3.71 | A vulnerability was identified in AstrBotDevs AstrBot up to 4.22.1. The affected...A vulnerability was identified in AstrBotDevs AstrBot up to 4.22.1. The affected element is the function post_data.get of the component API Endpoint. Such manipulation leads to server-side request forgery. The attack may be performed from remote. The exploit is publicly available and might be used. The project was informed of the problem early through an issue report but has not responded yet. |
2026-04-12 | |
| CVE-2026-6118 | 5.3 | MEDIUM | CWE-74 | 3.4% p87 | 3.81 | A vulnerability was determined in AstrBotDevs AstrBot up to 4.22.1. Impacted is ...A vulnerability was determined in AstrBotDevs AstrBot up to 4.22.1. Impacted is the function add_mcp_server of the file astrbot/dashboard/routes/tools.py of the component MCP Endpoint. This manipulation of the argument command causes command injection. The attack is possible to be carried out remotely. The exploit has been publicly disclosed and may be utilized. The project was informed of the problem early through an issue report but has not responded yet. |
2026-04-12 | |
| CVE-2026-6117 | 5.3 | MEDIUM | CWE-264 | 0.0% p11 | 3.71 | A vulnerability was found in AstrBotDevs AstrBot up to 4.22.1. This issue affect...A vulnerability was found in AstrBotDevs AstrBot up to 4.22.1. This issue affects the function install_plugin_upload of the file astrbot/dashboard/routes/plugin.py of the component install-upload Endpoint. The manipulation of the argument File results in sandbox issue. The attack can be executed remotely. The exploit has been made public and could be used. The project was informed of the problem early through an issue report but has not responded yet. |
2026-04-12 | |
| CVE-2026-6116 | 8.9 | HIGH | CWE-77 | 0.9% p75 | 6.26 | A vulnerability has been found in Totolink A7100RU 7.4cu.2313_b20191024. This vu...A vulnerability has been found in Totolink A7100RU 7.4cu.2313_b20191024. This vulnerability affects the function setDiagnosisCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument ip leads to os command injection. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used. |
2026-04-12 | |
| CVE-2026-6115 | 8.9 | HIGH | CWE-77 | 0.9% p75 | 6.26 | A flaw has been found in Totolink A7100RU 7.4cu.2313_b20191024. This affects the...A flaw has been found in Totolink A7100RU 7.4cu.2313_b20191024. This affects the function setAppCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Executing a manipulation of the argument enable can lead to os command injection. The attack may be launched remotely. The exploit has been published and may be used. |
2026-04-12 | |
| CVE-2026-6114 | 8.9 | HIGH | CWE-77 | 0.9% p75 | 6.26 | A vulnerability was detected in Totolink A7100RU 7.4cu.2313_b20191024. Affected ...A vulnerability was detected in Totolink A7100RU 7.4cu.2313_b20191024. Affected by this issue is the function setNetworkCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Performing a manipulation of the argument proto results in os command injection. The attack may be initiated remotely. The exploit is now public and may be used. |
2026-04-12 | |
| CVE-2026-6113 | 8.9 | HIGH | CWE-77 | 0.9% p75 | 6.26 | A security vulnerability has been detected in Totolink A7100RU 7.4cu.2313_b20191...A security vulnerability has been detected in Totolink A7100RU 7.4cu.2313_b20191024. Affected by this vulnerability is the function setTtyServiceCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Such manipulation of the argument ttyEnable leads to os command injection. The attack can be launched remotely. The exploit has been disclosed publicly and may be used. |
2026-04-12 | |
| CVE-2026-6112 | 8.9 | HIGH | CWE-77 | 0.9% p75 | 6.26 | A weakness has been identified in Totolink A7100RU 7.4cu.2313_b20191024. Affecte...A weakness has been identified in Totolink A7100RU 7.4cu.2313_b20191024. Affected is the function setRadvdCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. This manipulation of the argument maxRtrAdvInterval causes os command injection. The attack can be initiated remotely. The exploit has been made available to the public and could be used for attacks. |
2026-04-12 | |
| CVE-2026-6111 | 5.3 | MEDIUM | CWE-918 | 0.0% p12 | 3.71 | A security flaw has been discovered in FoundationAgents MetaGPT up to 0.8.1. Thi...A security flaw has been discovered in FoundationAgents MetaGPT up to 0.8.1. This impacts the function decode_image of the file metagpt/utils/common.py. The manipulation of the argument img_url_or_b64 results in server-side request forgery. It is possible to launch the attack remotely. The exploit has been released to the public and may be used for attacks. The project was informed of the problem early through an issue report but has not responded yet. |
2026-04-12 | |
| CVE-2026-6110 | 6.9 | MEDIUM | CWE-74 | 0.1% p16 | 4.83 | A vulnerability was identified in FoundationAgents MetaGPT up to 0.8.1. This aff...A vulnerability was identified in FoundationAgents MetaGPT up to 0.8.1. This affects the function generate_thoughts of the file metagpt/strategy/tot.py of the component Tree-of-Thought Solver. The manipulation leads to code injection. It is possible to initiate the attack remotely. The exploit is publicly available and might be used. The project was informed of the problem early through an issue report but has not responded yet. |
2026-04-12 | |
| CVE-2026-1116 | 8.2 | HIGH | CWE-79 | 0.0% p1 | 5.74 | A Cross-site Scripting (XSS) vulnerability was identified in the `from_dict` met...A Cross-site Scripting (XSS) vulnerability was identified in the `from_dict` method of the `AppLollmsMessage` class in parisneo/lollms prior to version 2.2.0. The vulnerability arises from the lack of sanitization or HTML encoding of the `content` field when deserializing user-provided data. This allows an attacker to inject malicious HTML or JavaScript payloads, which can be executed in the context of another user's browser. Exploitation of this vulnerability can lead to account takeover, session hijacking, or wormable attacks. |
2026-04-12 | |
| CVE-2026-6109 | 5.3 | MEDIUM | CWE-352 | 0.0% p0 | 3.71 | A vulnerability was determined in FoundationAgents MetaGPT up to 0.8.1. The impa...A vulnerability was determined in FoundationAgents MetaGPT up to 0.8.1. The impacted element is the function evaluateCode of the file metagpt/environment/minecraft/mineflayer/index.js of the component Mineflayer HTTP API. Executing a manipulation can lead to cross-site request forgery. The attack may be performed from remote. The exploit has been publicly disclosed and may be utilized. The project was informed of the problem early through an issue report but has not responded yet. |
2026-04-12 | |
| CVE-2026-6108 | 5.3 | MEDIUM | CWE-77 | 0.3% p48 | 3.72 | A vulnerability was found in 1Panel-dev MaxKB up to 2.6.1. The affected element ...A vulnerability was found in 1Panel-dev MaxKB up to 2.6.1. The affected element is the function execute of the file apps/application/flow/step_node/mcp_node/impl/base_mcp_node.py of the component Model Context Protocol Node. Performing a manipulation results in os command injection. The attack is possible to be carried out remotely. The exploit has been made public and could be used. You should upgrade the affected component. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product. |
2026-04-12 | |
| CVE-2026-6107 | 5.1 | MEDIUM | CWE-79 | 0.0% p9 | 3.57 | A flaw has been found in 1Panel-dev MaxKB up to 2.6.1. This issue affects some u...A flaw has been found in 1Panel-dev MaxKB up to 2.6.1. This issue affects some unknown processing of the file apps/common/middleware/chat_headers_middleware.py of the component ChatHeadersMiddleware. This manipulation of the argument Name causes cross site scripting. Remote exploitation of the attack is possible. Upgrading to version 2.8.0 is capable of addressing this issue. Patch name: 026a2d623e2aa5efa67c4834651e79d5d7cab1da. Upgrading the affected component is advised. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product. |
2026-04-12 | |
| CVE-2026-6106 | 5.1 | MEDIUM | CWE-79 | 0.0% p9 | 3.57 | A vulnerability was detected in 1Panel-dev MaxKB up to 2.2.1. This vulnerability...A vulnerability was detected in 1Panel-dev MaxKB up to 2.2.1. This vulnerability affects the function StaticHeadersMiddleware of the file apps/common/middleware/static_headers_middleware.py of the component Public Chat Interface. The manipulation of the argument Name results in cross site scripting. The attack may be launched remotely. The exploit is now public and may be used. Upgrading to version 2.8.0 is able to resolve this issue. The patch is identified as 026a2d623e2aa5efa67c4834651e79d5d7cab1da. It is recommended to upgrade the affected component. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product. |
2026-04-11 | |
| CVE-2026-6105 | 6.9 | MEDIUM | CWE-266 | 0.0% p11 | 4.83 | A security vulnerability has been detected in perfree go-fastdfs-web up to 1.3.7...A security vulnerability has been detected in perfree go-fastdfs-web up to 1.3.7. This affects an unknown part of the file src/main/java/com/perfree/controller/InstallController.java of the component doInstall Interface. The manipulation leads to improper authorization. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-04-11 | |
| CVE-2026-23900 | 6.5 | MEDIUM | CWE-79 | 0.0% p8 | 4.55 | Various stored XSS vulnerabilities in the maps- and icon rendering logic in Phoc...Various stored XSS vulnerabilities in the maps- and icon rendering logic in Phoca Maps component 5.0.0-6.0.2 have been discovered. |
2026-04-11 | |
| CVE-2026-5809 | 7.1 | HIGH | CWE-73 | 0.0% p9 | 4.97 | The wpForo Forum plugin for WordPress is vulnerable to Arbitrary File Deletion i...The wpForo Forum plugin for WordPress is vulnerable to Arbitrary File Deletion in versions up to and including 3.0.2. This is due to a two-step logic flaw: the topic_add() and topic_edit() action handlers accept arbitrary user-supplied data[*] arrays from $_REQUEST and store them as postmeta without restricting which fields may contain array values. Because 'body' is included in the allowed topic fields list, an attacker can supply data[body][fileurl] with an arbitrary file path (e.g., wp-config.php or an absolute server path). This poisoned fileurl is persisted to the plugin's custom postmeta database table. Subsequently, when the attacker submits wpftcf_delete[]=body on a topic_edit request, the add_file() method retrieves the stored postmeta record, extracts the attacker-controlled fileurl, passes it through wpforo_fix_upload_dir() which only rewrites legitimate wpforo upload paths and returns all other paths unchanged, and then calls wp_delete_file() on the unvalidated path. This makes it possible for authenticated attackers, with subscriber-level access and above, to delete arbitrary files writable by the PHP process on the server, including critical files such as wp-config. |
2026-04-11 | |
| CVE-2026-34621 | 8.6 | HIGH | CWE-1321 | ✓ | 6.1% p90 | 6.20 | Acrobat Reader versions 24.001.30356, 26.001.21367 and earlier are affected by a...Acrobat Reader versions 24.001.30356, 26.001.21367 and earlier are affected by an Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
2026-04-11 |
| CVE-2026-5226 | 6.1 | MEDIUM | CWE-79 | 0.1% p27 | 4.27 | The Optimole – Optimize Images in Real Time plugin for WordPress is vulnerable t...The Optimole – Optimize Images in Real Time plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via URL paths in versions up to, and including, 4.2.3 This is due to insufficient output escaping on user-supplied URL paths in the get_current_url() function, which are inserted into JavaScript code via str_replace() without proper JavaScript context escaping in the replace_content() function. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. |
2026-04-11 | |
| CVE-2026-5217 | 7.2 | HIGH | CWE-79 | 0.1% p23 | 5.04 | The Optimole – Optimize Images | Convert WebP & AVIF | CDN & Lazy Load | Image O...The Optimole – Optimize Images | Convert WebP & AVIF | CDN & Lazy Load | Image Optimization plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 4.2.2. This is due to insufficient input sanitization and output escaping on the user-supplied 's' parameter (srcset descriptor) in the unauthenticated /wp-json/optimole/v1/optimizations REST endpoint. The endpoint validates requests using an HMAC signature and timestamp, but these values are exposed directly in the frontend HTML making them accessible to any visitor. The plugin uses sanitize_text_field() on the descriptor value of rest.php, which strips HTML tags but does not escape double quotes. The poisoned descriptor is then stored via transients (backed by the WordPress options table) and later retrieved and injected verbatim into the srcset attribute of tag_replacer.php without proper escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts into pages that will execute whenever a user accesses the injected page. |
2026-04-11 | |
| CVE-2026-5207 | 6.5 | MEDIUM | CWE-89 | 0.0% p7 | 4.55 | The LifterLMS plugin for WordPress is vulnerable to SQL Injection via the 'order...The LifterLMS plugin for WordPress is vulnerable to SQL Injection via the 'order' parameter in all versions up to, and including, 9.2.1. This is due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Instructor-level access and above who have the edit_post capability on the quiz, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. |
2026-04-11 | |
| CVE-2026-5144 | 8.8 | HIGH | CWE-269 | 0.0% p14 | 6.16 | The BuddyPress Groupblog plugin for WordPress is vulnerable to Privilege Escalat...The BuddyPress Groupblog plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.9.3. This is due to the group blog settings handler accepting the `groupblog-blogid`, `default-member`, and `groupblog-silent-add` parameters from user input without proper authorization checks. The `groupblog-blogid` parameter allows any group admin (including Subscribers who create their own group) to associate their group with any blog on the Multisite network, including the main site (blog ID 1). The `default-member` parameter accepts any WordPress role, including `administrator`, without validation against a whitelist. When combined with `groupblog-silent-add`, any user who joins the attacker's group is automatically added to the targeted blog with the injected role. This makes it possible for authenticated attackers, with Subscriber-level access and above, to escalate any user (including themselves via a second account) to Administrator on the main site of the Multisite network. |
2026-04-11 | |
| CVE-2026-4979 | 5.0 | MEDIUM | CWE-918 | 0.0% p8 | 3.50 | The UsersWP – Front-end login form, User Registration, User Profile & Members Di...The UsersWP – Front-end login form, User Registration, User Profile & Members Directory plugin for WP plugin for WordPress is vulnerable to blind Server-Side Request Forgery in all versions up to, and including, 1.2.58. This is due to insufficient URL origin validation in the process_image_crop() method when processing avatar/banner image crop operations. The function accepts a user-controlled URL via the uwp_crop POST parameter and only validates it using esc_url() for sanitization and wp_check_filetype() for extension verification, without enforcing that the URL references a local uploads file. The URL is then passed to uwp_resizeThumbnailImage() which uses it in PHP image processing functions (getimagesize(), imagecreatefrom*()) that support URL wrappers and perform outbound HTTP requests. This makes it possible for authenticated attackers with subscriber-level access and above to coerce the WordPress server into making arbitrary HTTP requests to attacker-controlled or internal network destinations, enabling internal network scanning and potential access to sensitive services. |
2026-04-11 | |
| CVE-2026-4895 | 6.4 | MEDIUM | CWE-79 | 0.0% p10 | 4.48 | The GreenShift - Animation and Page Builder Blocks plugin for WordPress is vulne...The GreenShift - Animation and Page Builder Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to, and including, 12.8.9 This is due to insufficient input sanitization and output escaping in the gspb_greenShift_block_script_assets() function. The function uses str_replace() to insert 'fetchpriority="high"' before 'src=' attributes when processing greenshift-blocks/image blocks with the disablelazy attribute enabled. Because this replacement operates on the entire HTML string without parsing, contributors can inject the string 'src=' into HTML attribute values (such as class attributes). When the str_replace executes, the double quotes in the replacement string break out of the attribute context, allowing injection of malicious HTML attributes like onfocus with JavaScript payloads. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-04-11 | |
| CVE-2026-3498 | 6.4 | MEDIUM | CWE-79 | 0.0% p8 | 4.48 | The BlockArt Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scri...The BlockArt Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'clientId' block attribute in all versions up to, and including, 2.2.15. This is due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-04-11 | |
| CVE-2026-3371 | 4.3 | MEDIUM | CWE-639 | 0.0% p7 | 3.01 | The Tutor LMS – eLearning and online course solution plugin for WordPress is vul...The Tutor LMS – eLearning and online course solution plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 3.9.7. This is due to missing authorization checks in the `save_course_content_order()` private method, which is called unconditionally by the `tutor_update_course_content_order` AJAX handler. While the handler's `content_parent` branch includes a `can_user_manage()` check, the `save_course_content_order()` call processes attacker-supplied `tutor_topics_lessons_sorting` JSON without any ownership or capability verification. This makes it possible for authenticated attackers with Subscriber-level access or above to detach lessons from topics, reorder course content, and reassign lessons between topics in any course, including admin-owned courses, by sending a crafted AJAX request with manipulated topic and lesson IDs. |
2026-04-11 | |
| CVE-2026-3358 | 5.4 | MEDIUM | CWE-862 | 0.1% p18 | 3.78 | The Tutor LMS – eLearning and online course solution plugin for WordPress is vul...The Tutor LMS – eLearning and online course solution plugin for WordPress is vulnerable to unauthorized private course enrollment in all versions up to, and including, 3.9.7. This is due to missing post_status validation in the `enroll_now()` and `course_enrollment()` functions. Both enrollment endpoints verify the nonce, user authentication, and whether the course is purchasable, but fail to check if the course has a `private` post_status. This makes it possible for authenticated attackers with Subscriber-level access or above to enroll in private courses by sending a crafted POST request with the target course ID. The enrollment record is created in the database and the private course title and enrollment status are exposed in the subscriber's dashboard, though WordPress core access control prevents the subscriber from viewing the actual course content (returns 404). Enrollment in private courses should be restricted to users with the `read_private_posts` capability. |
2026-04-11 | |
| CVE-2026-40354 | 2.9 | LOW | CWE-61 | 0.0% p2 | 2.03 | Flatpak xdg-desktop-portal before 1.20.4 and 1.21.x before 1.21.1 allows any Fla...Flatpak xdg-desktop-portal before 1.20.4 and 1.21.x before 1.21.1 allows any Flatpak app to trash any file in the host context via a symlink attack on g_file_trash. |
2026-04-11 | |
| CVE-2026-33119 | 5.4 | MEDIUM | CWE-451 | 0.1% p19 | 3.78 | User interface (ui) misrepresentation of critical information in Microsoft Edge ...User interface (ui) misrepresentation of critical information in Microsoft Edge (Chromium-based) allows an unauthorized attacker to perform spoofing over a network. |
2026-04-10 | |
| CVE-2026-33118 | 4.3 | MEDIUM | CWE-451 | 0.1% p22 | 3.01 | Microsoft Edge (Chromium-based) Spoofing VulnerabilityMicrosoft Edge (Chromium-based) Spoofing Vulnerability |
2026-04-10 | |
| CVE-2026-40252 | 5.3 | MEDIUM | CWE-284 | 0.1% p17 | 3.71 | FastGPT is an AI Agent building platform. Prior to 4.14.10.4, Broken Access Cont...FastGPT is an AI Agent building platform. Prior to 4.14.10.4, Broken Access Control vulnerability (IDOR/BOLA) allows any authenticated team to access and execute applications belonging to other teams by supplying a foreign appId. While the API correctly validates the team token, it does not verify that the requested application belongs to the authenticated team. This leads to cross-tenant data exposure and unauthorized execution of private AI workflows. This vulnerability is fixed in 4.14.10.4. |
2026-04-10 | |
| CVE-2026-40242 | 7.2 | HIGH | CWE-918 | 0.0% p4 | 5.04 | Arcane is an interface for managing Docker containers, images, networks, and vol...Arcane is an interface for managing Docker containers, images, networks, and volumes. Prior to 1.17.3, the /api/templates/fetch endpoint accepts a caller-supplied url parameter and performs a server-side HTTP GET request to that URL without authentication and without URL scheme or host validation. The server's response is returned directly to the caller. type. This constitutes an unauthenticated SSRF vulnerability affecting any publicly reachable Arcane instance. This vulnerability is fixed in 1.17.3. |
2026-04-10 | |
| CVE-2026-40194 | 3.7 | LOW | CWE-208 | 0.0% p0 | 2.59 | phpseclib is a PHP secure communications library. Prior to 3.0.51, 2.0.53, and 1...phpseclib is a PHP secure communications library. Prior to 3.0.51, 2.0.53, and 1.0.28, phpseclib\Net\SSH2::get_binary_packet() uses PHP's != operator to compare a received SSH packet HMAC against the locally computed HMAC. != on equal-length binary strings in PHP uses memcmp(), which short-circuits on the first differing byte. This is a real variable-time comparison (CWE-208), proven by scaling benchmarks. This vulnerability is fixed in 3.0.51, 2.0.53, and 1.0.28. |
2026-04-10 | |
| CVE-2026-40191 | 6.8 | MEDIUM | CWE-863 | 0.0% p2 | 4.76 | ClearanceKit intercepts file-system access events on macOS and enforces per-proc...ClearanceKit intercepts file-system access events on macOS and enforces per-process access policies. Prior to 5.0.4-beta-1f46165, ClearanceKit's Endpoint Security event handler only checked the source path of dual-path file operations against File Access Authorization (FAA) rules and App Jail policies. The destination path was ignored entirely. This allowed any local process to bypass file-access protection by using rename, link, copyfile, exchangedata, or clone operations to place or replace files inside protected directories. This vulnerability is fixed in 5.0.4-beta-1f46165. |
2026-04-10 | |
| CVE-2026-40190 | 5.6 | MEDIUM | CWE-1321 | 0.0% p12 | 3.92 | LangSmith Client SDKs provide SDK's for interacting with the LangSmith platform....LangSmith Client SDKs provide SDK's for interacting with the LangSmith platform. Prior to 0.5.18, the LangSmith JavaScript/TypeScript SDK (langsmith) contains an incomplete prototype pollution fix in its internally vendored lodash set() utility. The baseAssignValue() function only guards against the __proto__ key, but fails to prevent traversal via constructor.prototype. This allows an attacker who controls keys in data processed by the createAnonymizer() API to pollute Object.prototype, affecting all objects in the Node.js process. This vulnerability is fixed in 0.5.18. |
2026-04-10 | |
| CVE-2026-40189 | 9.3 | CRITICAL | CWE-862 | 0.1% p28 | 6.51 | goshs is a SimpleHTTPServer written in Go. Prior to 2.0.0-beta.4, goshs enforces...goshs is a SimpleHTTPServer written in Go. Prior to 2.0.0-beta.4, goshs enforces the documented per-folder .goshs ACL/basic-auth mechanism for directory listings and file reads, but it does not enforce the same authorization checks for state-changing routes. An unauthenticated attacker can upload files with PUT, upload files with multipart POST /upload, create directories with ?mkdir, and delete files with ?delete inside a .goshs-protected directory. By deleting the .goshs file itself, the attacker can remove the folder's auth policy and then access previously protected content without credentials. This results in a critical authorization bypass affecting confidentiality, integrity, and availability. This vulnerability is fixed in 2.0.0-beta.4. |
2026-04-10 | |
| CVE-2026-40188 | 7.7 | HIGH | CWE-1314 | 0.0% p7 | 5.39 | goshs is a SimpleHTTPServer written in Go. From 1.0.7 to before 2.0.0-beta.4, th...goshs is a SimpleHTTPServer written in Go. From 1.0.7 to before 2.0.0-beta.4, the SFTP command rename sanitizes only the source path and not the destination, so it is possible to write outside of the root directory of the SFTP. This vulnerability is fixed in 2.0.0-beta.4. |
2026-04-10 | |
| CVE-2026-40185 | 7.1 | HIGH | CWE-862 | 0.0% p7 | 4.97 | TREK is a collaborative travel planner. Prior to 2.7.2, TREK was missing authori...TREK is a collaborative travel planner. Prior to 2.7.2, TREK was missing authorization checks on the Immich trip photo management routes. This vulnerability is fixed in 2.7.2. |
2026-04-10 | |
| CVE-2026-40184 | 3.7 | LOW | CWE-306 | 0.1% p15 | 2.59 | TREK is a collaborative travel planner. Prior to 2.7.2, TREK served uploaded pho...TREK is a collaborative travel planner. Prior to 2.7.2, TREK served uploaded photos without requiring authentication. This vulnerability is fixed in 2.7.2. |
2026-04-10 | |
| CVE-2026-40180 | 7.7 | HIGH | CWE-22 | 0.0% p13 | 5.39 | Quarkus OpenAPI Generator is Quarkus' extensions for generation of Rest Clients ...Quarkus OpenAPI Generator is Quarkus' extensions for generation of Rest Clients and server stubs generation. Prior to 2.16.0 and 2.15.0-lts, the unzip() method in ApicurioCodegenWrapper.java extracts ZIP entries without validating that the resolved file path stays within the intended output directory. At line 101, the destination is constructed as new File(toOutputDir, entry.getName()) and the content is written immediately. A malicious ZIP archive containing entries with path traversal sequences (e.g., ../../malicious.java) would write files outside the target directory. This vulnerability is fixed in 2.16.0 and 2.15.0-lts. |
2026-04-10 | |
| CVE-2026-40178 | 6.9 | MEDIUM | CWE-287 | 0.1% p22 | 4.83 | ajenti.plugin.core defines all necessary core elements to allow Ajenti to run pr...ajenti.plugin.core defines all necessary core elements to allow Ajenti to run properly. Prior to 0.112, if the 2FA was activated, it was possible during a short moment after the authentication of an user to bypass its authentication. This vulnerability is fixed in 0.112. |
2026-04-10 | |
| CVE-2026-40177 | 9.3 | CRITICAL | CWE-287 | 0.1% p22 | 6.51 | ajenti.plugin.core defines all necessary core elements to allow Ajenti to run pr...ajenti.plugin.core defines all necessary core elements to allow Ajenti to run properly. Prior to 0.112, if the 2FA was activated, it was possible to bypass the password authentication This vulnerability is fixed in 0.112. |
2026-04-10 | |
| CVE-2026-40175 | 10.0 | CRITICAL | CWE-113 | 0.4% p60 | 7.01 | Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15....Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.0 and 0.3.1, the Axios library is vulnerable to a specific "Gadget" attack chain that allows Prototype Pollution in any third-party dependency to be escalated into Remote Code Execution (RCE) or Full Cloud Compromise (via AWS IMDSv2 bypass). This vulnerability is fixed in 1.15.0 and 0.3.1. |
2026-04-10 | |
| CVE-2026-40168 | 8.2 | HIGH | CWE-918 | 0.0% p12 | 5.74 | Postiz is an AI social media scheduling tool. Prior to 2.21.5, the /api/public/s...Postiz is an AI social media scheduling tool. Prior to 2.21.5, the /api/public/stream endpoint is vulnerable to SSRF. Although the application validates the initially supplied URL and blocks direct private/internal hosts, it does not re-validate the final destination after HTTP redirects. As a result, an attacker can supply a public HTTPS URL that passes validation and then redirects the server-side request to an internal resource. |
2026-04-10 | |
| CVE-2026-39922 | 5.3 | MEDIUM | CWE-918 | 0.0% p10 | 3.71 | GeoNode versions 4.0 before 4.4.5 and 5.0 before 5.0.2 contain a server-side req...GeoNode versions 4.0 before 4.4.5 and 5.0 before 5.0.2 contain a server-side request forgery vulnerability in the service registration endpoint that allows authenticated attackers to trigger outbound network requests to arbitrary URLs by submitting a crafted service URL during form validation. Attackers can probe internal network targets including loopback addresses, RFC1918 private IP ranges, link-local addresses, and cloud metadata services by exploiting insufficient URL validation in the WMS service handler without private IP filtering or allowlist enforcement. |
2026-04-10 | |
| CVE-2026-39921 | 5.3 | MEDIUM | CWE-918 | 0.0% p8 | 3.71 | GeoNode versions 4.0 before 4.4.5 and 5.0 before 5.0.2 contain a server-side req...GeoNode versions 4.0 before 4.4.5 and 5.0 before 5.0.2 contain a server-side request forgery vulnerability that allows authenticated users with document upload permissions to trigger arbitrary outbound HTTP requests by providing a malicious URL via the doc_url parameter during document upload. Attackers can supply URLs pointing to internal network targets, loopback addresses, RFC1918 addresses, or cloud metadata services to cause the server to make requests to internal resources without SSRF mitigations such as private IP filtering or redirect validation. |
2026-04-10 | |
| CVE-2026-32252 | 7.7 | HIGH | CWE-285 | 0.0% p7 | 5.39 | Chartbrew is an open-source web application that can connect directly to databas...Chartbrew is an open-source web application that can connect directly to databases and APIs and use the data to create charts. Prior to 4.9.0, a cross-tenant authorization bypass exists in Chartbrew in GET /team/:team_id/template/generate/:project_id. The GET handler calls checkAccess(req, "updateAny", "chart") without awaiting the returned promise, and it does not verify that the supplied project_id belongs to req.params.team_id or to the caller's team. As a result, an authenticated attacker with valid template-generation permissions in their own team can request the template model for a project belonging to another team and receive victim project data. This vulnerability is fixed in 4.9.0. |
2026-04-10 | |
| CVE-2026-30232 | 7.8 | HIGH | CWE-918 | 0.0% p8 | 5.46 | Chartbrew is an open-source web application that can connect directly to databas...Chartbrew is an open-source web application that can connect directly to databases and APIs and use the data to create charts. Prior to 4.8.5, Chartbrew allows authenticated users to create API data connections with arbitrary URLs. The server fetches these URLs using request-promise without any IP address validation, enabling Server-Side Request Forgery attacks against internal networks and cloud metadata endpoints. This vulnerability is fixed in 4.8.5. |
2026-04-10 | |
| CVE-2026-3446 | 6.0 | MEDIUM | CWE-345 | 0.0% p6 | 4.20 | When calling base64.b64decode() or related functions the decoding process would ...When calling base64.b64decode() or related functions the decoding process would stop after encountering the first padded quad regardless of whether there was more information to be processed. This can lead to data being accepted which may be processed differently by other implementations. Use "validate=True" to enable stricter processing of base64 data. |
2026-04-10 | |
| CVE-2026-33737 | 5.3 | MEDIUM | CWE-611 | 0.0% p7 | 3.71 | Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, mu...Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, multiple files use simplexml_load_string() without XXE protection. With LIBXML_NOENT flag, arbitrary server files can be read. This vulnerability is fixed in 1.11.38 and 2.0.0-RC.3. |
2026-04-10 | |
| CVE-2026-33736 | 6.5 | MEDIUM | CWE-639 | 0.0% p7 | 4.55 | Chamilo LMS is a learning management system. Prior to 2.0.0-RC.3, any authentica...Chamilo LMS is a learning management system. Prior to 2.0.0-RC.3, any authenticated user (including ROLE_STUDENT) can enumerate all platform users and access personal information (email, phone, roles) via GET /api/users, including administrator accounts. This vulnerability is fixed in 2.0.0-RC.3. |
2026-04-10 | |
| CVE-2026-33710 | 7.5 | HIGH | CWE-330 | 0.0% p8 | 5.25 | Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, RE...Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, REST API keys are generated using md5(time() + (user_id * 5) - rand(10000, 10000)). The rand(10000, 10000) call always returns exactly 10000 (min == max), making the formula effectively md5(timestamp + user_id*5 - 10000). An attacker who knows a username and approximate key creation time can brute-force the API key. This vulnerability is fixed in 1.11.38 and 2.0.0-RC.3. |
2026-04-10 | |
| CVE-2026-33708 | 6.5 | MEDIUM | CWE-862 | 0.0% p7 | 4.55 | Chamilo LMS is a learning management system. Prior to 1.11.38, the get_user_info...Chamilo LMS is a learning management system. Prior to 1.11.38, the get_user_info_from_username REST API endpoint returns personal information (email, first name, last name, user ID, active status) of any user to any authenticated user, including students. There is no authorization check. This vulnerability is fixed in 1.11.38. |
2026-04-10 | |
| CVE-2026-33707 | 9.4 | CRITICAL | CWE-640 | 0.1% p20 | 6.58 | Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, th...Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, the default password reset mechanism generates tokens using sha1($email) with no random component, no expiration, and no rate limiting. An attacker who knows a user's email can compute the reset token and change the victim's password without authentication. This vulnerability is fixed in 1.11.38 and 2.0.0-RC.3. |
2026-04-10 | |
| CVE-2026-33706 | 7.1 | HIGH | CWE-269 | 0.0% p6 | 4.97 | Chamilo LMS is a learning management system. Prior to 1.11.38, any authenticated...Chamilo LMS is a learning management system. Prior to 1.11.38, any authenticated user with a REST API key can modify their own status field via the update_user_from_username endpoint. A student (status=5) can change their status to Teacher/CourseManager (status=1), gaining course creation and management privileges. This vulnerability is fixed in 1.11.38. |
2026-04-10 | |
| CVE-2026-33705 | 5.3 | MEDIUM | CWE-538 | 0.0% p12 | 3.71 | Chamilo LMS is a learning management system. Prior to 1.11.38, Twig template fil...Chamilo LMS is a learning management system. Prior to 1.11.38, Twig template files (.tpl) under /main/template/default/ are directly accessible without authentication via HTTP GET requests. These templates expose internal application logic, variable names, AJAX endpoint URLs, and admin panel structure. This vulnerability is fixed in 1.11.38. |
2026-04-10 | |
| CVE-2026-33704 | 7.1 | HIGH | CWE-434 | 0.2% p44 | 4.98 | Chamilo LMS is a learning management system. Prior to 1.11.38, any authenticated...Chamilo LMS is a learning management system. Prior to 1.11.38, any authenticated user (including students) can write arbitrary content to files on the server via the BigUpload endpoint. The key parameter controls the filename and the raw POST body becomes the file content. While .php extensions are filtered to .phps, the .pht extension passes through unmodified. On Apache configurations where .pht is handled as PHP, this leads to Remote Code Execution. This vulnerability is fixed in 1.11.38. |
2026-04-10 | |
| CVE-2026-33703 | 7.1 | HIGH | CWE-639 | 0.0% p11 | 4.97 | Chamilo LMS is a learning management system. Prior to 2.0.0-RC.3, an Insecure Di...Chamilo LMS is a learning management system. Prior to 2.0.0-RC.3, an Insecure Direct Object Reference (IDOR) vulnerability in the /social-network/personal-data/{userId} endpoint allows any authenticated user to access full personal data and API tokens of arbitrary users by modifying the userId parameter. This results in mass disclosure of sensitive user information and credentials, enabling a full platform data breach. This vulnerability is fixed in 2.0.0-RC.3. |
2026-04-10 | |
| CVE-2026-33702 | 7.1 | HIGH | CWE-639 | 0.0% p9 | 4.97 | Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, Ch...Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, Chamilo LMS contains an Insecure Direct Object Reference (IDOR) vulnerability in the Learning Path progress saving endpoint. The file lp_ajax_save_item.php accepts a uid (user ID) parameter directly from $_REQUEST and uses it to load and modify another user's Learning Path progress — including score, status, completion, and time — without verifying that the requesting user matches the target user ID. Any authenticated user enrolled in a course can overwrite another user's Learning Path progress by simply changing the uid parameter in the request. This vulnerability is fixed in 1.11.38 and 2.0.0-RC.3. |
2026-04-10 | |
| CVE-2026-33698 | 9.3 | CRITICAL | CWE-552 | 0.1% p16 | 6.51 | Chamilo LMS is a learning management system. Prior to 1.11.38, a chained attack ...Chamilo LMS is a learning management system. Prior to 1.11.38, a chained attack can enable otherwise-blocked PHP code from the main/install/ directory and allow an unauthenticated attacker to modify existing files or create new files where allowed by system permissions. This only affects portals with the main/install/ directory still present and read-accessible. This vulnerability is fixed in 1.11.38. |
2026-04-10 | |
| CVE-2026-33618 | 8.8 | HIGH | CWE-95 | 0.0% p14 | 6.16 | Chamilo LMS is a learning management system. Prior to .0.0-RC.3, the PlatformCon...Chamilo LMS is a learning management system. Prior to .0.0-RC.3, the PlatformConfigurationController::decodeSettingArray() method uses PHP's eval() to parse platform settings from the database. An attacker with admin access (obtainable via Advisory 1) can inject arbitrary PHP code into the settings, which is then executed when any user (including unauthenticated) requests /platform-config/list. This vulnerability is fixed in 2.0.0-RC.3. |
2026-04-10 | |
| CVE-2026-27460 | 6.5 | MEDIUM | CWE-409 | 0.0% p12 | 4.55 | Tandoor Recipes is an application for managing recipes, planning meals, and buil...Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. Prior to 2.6.5, a critical Denial of Service (DoS) vulnerability was in the recipe import functionality. This vulnerability allows an authenticated user to crash the server or make a significantly degrade its performance by uploading a large size ZIP file (ZIP Bomb). This vulnerability is fixed in 2.6.5. |
2026-04-10 | |
| CVE-2026-5483 | 8.5 | HIGH | CWE-201 | 0.1% p19 | 5.95 | A flaw was found in odh-dashboard in Red Hat Openshift AI. This vulnerability in...A flaw was found in odh-dashboard in Red Hat Openshift AI. This vulnerability in the `odh-dashboard` component of Red Hat OpenShift AI (RHOAI) allows for the disclosure of Kubernetes Service Account tokens through a NodeJS endpoint. This could enable an attacker to gain unauthorized access to Kubernetes resources. |
2026-04-10 | |
| CVE-2026-40163 | 8.2 | HIGH | CWE-22 | 0.1% p23 | 5.74 | Saltcorn is an extensible, open source, no-code database application builder. Pr...Saltcorn is an extensible, open source, no-code database application builder. Prior to 1.4.5, 1.5.5, and 1.6.0-beta.4, the POST /sync/offline_changes endpoint allows an unauthenticated attacker to create arbitrary directories and write a changes.json file with attacker-controlled JSON content anywhere on the server filesystem. The GET /sync/upload_finished endpoint allows an unauthenticated attacker to list arbitrary directory contents and read specific JSON files. This vulnerability is fixed in 1.4.5, 1.5.5, and 1.6.0-beta.4. |
2026-04-10 | |
| CVE-2026-40162 | 7.1 | HIGH | CWE-20 | 0.1% p24 | 4.97 | Bugsink is a self-hosted error tracking tool. In 2.1.0, an authenticated file wr...Bugsink is a self-hosted error tracking tool. In 2.1.0, an authenticated file write vulnerability was identified in Bugsink 2.1.0 in the artifact bundle assembly flow. A user with a valid authentication token could cause the application to write attacker-controlled content to a filesystem location writable by the Bugsink process. This vulnerability is fixed in 2.1.1. |
2026-04-10 | |
| CVE-2026-33141 | 6.5 | MEDIUM | CWE-639 | 0.0% p3 | 4.55 | Chamilo LMS is a learning management system. Prior to 2.0.0-RC.3, an Insecure Di...Chamilo LMS is a learning management system. Prior to 2.0.0-RC.3, an Insecure Direct Object Reference (IDOR) vulnerability in the REST API stats endpoint allows any authenticated user (including low-privilege students with ROLE_USER) to read any other user's learning progress, certificates, and gradebook scores for any course, without enrollment or supervisory relationship. This vulnerability is fixed in 2.0.0-RC.3. |
2026-04-10 | |
| CVE-2026-32932 | 4.7 | MEDIUM | CWE-601 | 0.0% p7 | 3.29 | Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, an...Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, an Open Redirect vulnerability in the session course edit page allows an attacker to redirect an authenticated administrator to an arbitrary external URL after saving coach assignment changes. The redirect also leaks the id_session parameter to the attacker's server. This vulnerability is fixed in 1.11.38 and 2.0.0-RC.3. |
2026-04-10 | |
| CVE-2026-32931 | 7.5 | HIGH | CWE-434 | 0.2% p36 | 5.25 | Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, an...Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, an unrestricted file upload vulnerability in the exercise sound upload function allows an authenticated teacher to upload a PHP webshell by spoofing the Content-Type header to audio/mpeg. The uploaded file retains its original .php extension and is placed in a web-accessible directory, enabling Remote Code Execution as the web server user (www-data). This vulnerability is fixed in 1.11.38 and 2.0.0-RC.3. |
2026-04-10 | |
| CVE-2026-32930 | 7.1 | HIGH | CWE-639 | 0.0% p6 | 4.97 | Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, an...Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, an Insecure Direct Object Reference (IDOR) vulnerability in the gradebook evaluation edit page allows any authenticated teacher to view and modify the settings (name, max score, weight) of evaluations belonging to any other course by manipulating the editeval GET parameter. This vulnerability is fixed in 1.11.38 and 2.0.0-RC.3. |
2026-04-10 | |
| CVE-2026-32894 | 7.1 | HIGH | CWE-476 | 0.0% p8 | 4.97 | Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, an...Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, an Insecure Direct Object Reference (IDOR) vulnerability in the gradebook result view page allows any authenticated teacher to delete any student's grade result across the entire platform by manipulating the delete_mark or resultdelete GET parameters. No ownership or course-scope verification is performed. This vulnerability is fixed in 1.11.38 and 2.0.0-RC.3. |
2026-04-10 | |
| CVE-2026-32893 | 5.4 | MEDIUM | CWE-79 | 0.0% p8 | 3.78 | Chamilo LMS is a learning management system. Prior to 2.0.0-RC.3, a Reflected Cr...Chamilo LMS is a learning management system. Prior to 2.0.0-RC.3, a Reflected Cross-Site Scripting (XSS) vulnerability in the exercise question list admin panel allows an attacker to execute arbitrary JavaScript in an authenticated teacher's browser. The pagination code merges all $_GET parameters via array_merge() and outputs the result via http_build_query() directly into HTML href attributes without htmlspecialchars() encoding. This vulnerability is fixed in 2.0.0-RC.3. |
2026-04-10 | |
| CVE-2026-32892 | 9.1 | CRITICAL | CWE-78 | 0.2% p41 | 6.38 | Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, Ch...Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, Chamilo LMS contains an OS Command Injection vulnerability in the file move function. The move() function in fileManage.lib.php passes user-controlled path values directly into exec() shell commands without using escapeshellarg(). When a user moves a document via document.php, the move_to POST parameter — which only passes through Security::remove_XSS() (an HTML-only filter) — is concatenated directly into shell commands such as exec("mv $source $target"). By default, Chamilo allows all authenticated users to create courses (allow_users_to_create_courses = true). Any user who is a teacher in a course (including self-created courses) can move documents, making this vulnerability exploitable by any authenticated user. The attacker must first place a directory with shell metacharacters in its name on the filesystem (achievable via Course Backup Import), then move a document into that directory to trigger arbitrary command execution as the web server user (www-data). This vulnerability is fixed in 1.11.38 and 2.0.0-RC.3. |
2026-04-10 | |
| CVE-2026-31941 | 7.7 | HIGH | CWE-918 | 0.0% p7 | 5.39 | Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, Ch...Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, Chamilo LMS contains a Server-Side Request Forgery (SSRF) vulnerability in the Social Wall feature. The endpoint read_url_with_open_graph accepts a URL from the user via the social_wall_new_msg_main POST parameter and performs two server-side HTTP requests to that URL without validating whether the target is an internal or external resource. This allows an authenticated attacker to force the server to make arbitrary HTTP requests to internal services, scan internal ports, and access cloud instance metadata. This vulnerability is fixed in 1.11.38 and 2.0.0-RC.3. |
2026-04-10 | |
| CVE-2026-31940 | 7.5 | HIGH | CWE-384 | 0.0% p10 | 5.25 | Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, in...Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, in main/lp/aicc_hacp.php, user-controlled request parameters are directly used to set the PHP session ID before loading global bootstrap. This leads to session fixation. This vulnerability is fixed in 1.11.38 and 2.0.0-RC.3. |
2026-04-10 | |
| CVE-2026-31939 | 8.3 | HIGH | CWE-22 | 0.0% p12 | 5.81 | Chamilo LMS is a learning management system. Prior to 1.11.38, there is a path t...Chamilo LMS is a learning management system. Prior to 1.11.38, there is a path traversal in main/exercise/savescores.php leading to arbitrary file feletion. User input from $_REQUEST['test'] is concatenated directly into filesystem path without canonicalization or traversal checks. This vulnerability is fixed in 1.11.38. |
2026-04-10 | |
| CVE-2026-1502 | 5.7 | MEDIUM | N/A | 0.0% p12 | 3.99 | CR/LF bytes were not rejected by HTTP client proxy tunnel headers or host.CR/LF bytes were not rejected by HTTP client proxy tunnel headers or host. |
2026-04-10 | |
| CVE-2025-66447 | 0.0 | NONE | CWE-601 | 0.0% p8 | 0.00 | Chamilo LMS is a learning management system. From 1.11.0 to 2.0-beta.1, anyone c...Chamilo LMS is a learning management system. From 1.11.0 to 2.0-beta.1, anyone can trigger a malicious redirect through the use of the redirect parameter to /login. This vulnerability is fixed in 2.0-beta.2. |
2026-04-10 | |
| CVE-2026-40200 | 8.1 | HIGH | CWE-670 | 0.0% p2 | 5.67 | An issue was discovered in musl libc 0.7.10 through 1.2.6. Stack-based memory co...An issue was discovered in musl libc 0.7.10 through 1.2.6. Stack-based memory corruption can occur during qsort of very large arrays, due to incorrectly implemented double-word primitives. The number of elements must exceed about seven million, i.e., the 32nd Leonardo number on 32-bit platforms (or the 64th Leonardo number on 64-bit platforms, which is not practical). |
2026-04-10 | |
| CVE-2026-40160 | 7.1 | HIGH | CWE-918 | 0.0% p12 | 4.97 | PraisonAIAgents is a multi-agent teams system. Prior to 1.5.128, web_crawl's htt...PraisonAIAgents is a multi-agent teams system. Prior to 1.5.128, web_crawl's httpx fallback path passes user-supplied URLs directly to httpx.AsyncClient.get() with follow_redirects=True and no host validation. An LLM agent tricked into crawling an internal URL can reach cloud metadata endpoints (169.254.169.254), internal services, and localhost. The response content is returned to the agent and may appear in output visible to the attacker. This fallback is the default crawl path on a fresh PraisonAI installation (no Tavily key, no Crawl4AI installed). This vulnerability is fixed in 1.5.128. |
2026-04-10 | |
| CVE-2026-40159 | 5.5 | MEDIUM | CWE-200 | 0.0% p3 | 3.85 | PraisonAI is a multi-agent teams system. Prior to 4.5.128, PraisonAI’s MCP (Mode...PraisonAI is a multi-agent teams system. Prior to 4.5.128, PraisonAI’s MCP (Model Context Protocol) integration allows spawning background servers via stdio using user-supplied command strings (e.g., MCP("npx -y @smithery/cli ...")). These commands are executed through Python’s subprocess module. By default, the implementation forwards the entire parent process environment to the spawned subprocess. As a result, any MCP command executed in this manner inherits all environment variables from the host process, including sensitive data such as API keys, authentication tokens, and database credentials. This behavior introduces a security risk when untrusted or third-party commands are used. In common scenarios where MCP tools are invoked via package runners such as npx -y, arbitrary code from external or potentially compromised packages may execute with access to these inherited environment variables. This creates a risk of unintended credential exposure and enables potential supply chain attacks through silent exfiltration of secrets. This vulnerability is fixed in 4.5.128. |
2026-04-10 | |
| CVE-2026-40158 | 8.6 | HIGH | CWE-94 | 0.0% p8 | 6.02 | PraisonAI is a multi-agent teams system. Prior to 4.5.128, PraisonAI's AST-based...PraisonAI is a multi-agent teams system. Prior to 4.5.128, PraisonAI's AST-based Python sandbox can be bypassed using type.__getattribute__ trampoline, allowing arbitrary code execution when running untrusted agent code. The _execute_code_direct function in praisonaiagents/tools/python_tools.py uses AST filtering to block dangerous Python attributes like __subclasses__, __globals__, and __bases__. However, the filter only checks ast.Attribute nodes, allowing a bypass. The sandbox relies on AST-based filtering of attribute access but fails to account for dynamic attribute resolution via built-in methods such as type.getattribute, resulting in incomplete enforcement of security restrictions. The string '__subclasses__' is an ast.Constant, not an ast.Attribute, so it is never checked against the blocked list. This vulnerability is fixed in 4.5.128. |
2026-04-10 | |
| CVE-2026-40157 | 9.4 | CRITICAL | CWE-22 | 0.1% p21 | 6.58 | PraisonAI is a multi-agent teams system. Prior to 4.5.128, cmd_unpack in the rec...PraisonAI is a multi-agent teams system. Prior to 4.5.128, cmd_unpack in the recipe CLI extracts .praison tar archives using raw tar.extract() without validating archive member paths. A .praison bundle containing ../../ entries will write files outside the intended output directory. An attacker who distributes a malicious bundle can overwrite arbitrary files on the victim's filesystem when they run praisonai recipe unpack. This vulnerability is fixed in 4.5.128. |
2026-04-10 | |
| CVE-2026-40156 | 7.8 | HIGH | CWE-94 | 0.0% p6 | 5.46 | PraisonAI is a multi-agent teams system. Prior to 4.5.128, PraisonAI automatical...PraisonAI is a multi-agent teams system. Prior to 4.5.128, PraisonAI automatically loads a file named tools.py from the current working directory to discover and register custom agent tools. This loading process uses importlib.util.spec_from_file_location and immediately executes module-level code via spec.loader.exec_module() without explicit user consent, validation, or sandboxing. The tools.py file is loaded implicitly, even when it is not referenced in configuration files or explicitly requested by the user. As a result, merely placing a file named tools.py in the working directory is sufficient to trigger code execution. This behavior violates the expected security boundary between user-controlled project files (e.g., YAML configurations) and executable code, as untrusted content in the working directory is treated as trusted and executed automatically. If an attacker can place a malicious tools.py file into a directory where a user or automated system (e.g., CI/CD pipeline) runs praisonai, arbitrary code execution occurs immediately upon startup, before any agent logic begins. This vulnerability is fixed in 4.5.128. |
2026-04-10 | |
| CVE-2026-40103 | 4.3 | MEDIUM | CWE-836 | 0.0% p7 | 3.01 | Vikunja is an open-source self-hosted task management platform. Prior to 2.3.0, ...Vikunja is an open-source self-hosted task management platform. Prior to 2.3.0, Vikunja's scoped API token enforcement for custom project background routes is method-confused. A token with only projects.background can successfully delete a project background, while a token with only projects.background_delete is rejected. This is a scoped-token authorization bypass. This vulnerability is fixed in 2.3.0. |
2026-04-10 | |
| CVE-2026-40100 | 5.3 | MEDIUM | CWE-918 | 0.0% p14 | 3.71 | FastGPT is an AI Agent building platform. Prior to 4.14.10.3, the /api/core/app/...FastGPT is an AI Agent building platform. Prior to 4.14.10.3, the /api/core/app/mcpTools/runTool endpoint accepts arbitrary URLs without authentication. The internal IP check in isInternalAddress() only blocks private IPs when CHECK_INTERNAL_IP=true, which is not the default. This allows unauthenticated attackers to perform SSRF against internal network resources. This vulnerability is fixed in 4.14.10.3. |
2026-04-10 | |
| CVE-2026-40097 | 3.7 | LOW | CWE-129 | 0.0% p8 | 2.59 | Step CA is an online certificate authority for secure, automated certificate man...Step CA is an online certificate authority for secure, automated certificate management for DevOps. From 0.24.0 to before 0.30.0-rc3, an attacker can trigger an index out-of-bounds panic in Step CA by sending a crafted attestation key (AK) certificate with an empty Extended Key Usage (EKU) extension during TPM device attestation. When processing a device-attest-01 ACME challenge using TPM attestation, Step CA validates that the AK certificate contains the tcg-kp-AIKCertificate Extended Key Usage OID. During this validation, the EKU extension value is decoded from its ASN.1 representation and the first element is checked. A crafted certificate could include an EKU extension that decodes to an empty sequence, causing the code to panic when accessing the first element of the empty slice. This vulnerability is only reachable when a device-attest-01 ACME challenge with TPM attestation is configured. Deployments not using TPM device attestation are not affected. This vulnerability is fixed in 0.30.0-rc3. |
2026-04-10 | |
| CVE-2026-40086 | 5.3 | MEDIUM | CWE-22 | 0.0% p14 | 3.71 | Rembg is a tool to remove images background. Prior to 2.0.75, a path traversal v...Rembg is a tool to remove images background. Prior to 2.0.75, a path traversal vulnerability in the rembg HTTP server allows unauthenticated remote attackers to read arbitrary files from the server's filesystem. By sending a crafted request with a malicious model_path parameter, an attacker can force the server to attempt loading any file as an ONNX model, revealing file existence, permissions, and potentially file contents through error messages. This vulnerability is fixed in 2.0.75. |
2026-04-10 | |
| CVE-2026-40074 | 6.3 | MEDIUM | CWE-755 | 0.0% p11 | 4.41 | SvelteKit is a framework for rapidly developing robust, performant web applicati...SvelteKit is a framework for rapidly developing robust, performant web applications using Svelte. Prior to 2.57.1, redirect, when called from inside the handle server hook with a location parameter containing characters that are invalid in a HTTP header, will cause an unhandled TypeError. This could result in DoS on some platforms, especially if the location passed to redirect contains unsanitized user input. This vulnerability is fixed in 2.57.1. |
2026-04-10 | |
| CVE-2026-40073 | 8.2 | HIGH | CWE-770 | 0.1% p17 | 5.74 | SvelteKit is a framework for rapidly developing robust, performant web applicati...SvelteKit is a framework for rapidly developing robust, performant web applications using Svelte. Prior to 2.57.1, under certain circumstances, requests could bypass the BODY_SIZE_LIMIT on SvelteKit applications running with adapter-node. This bypass does not affect body size limits at other layers of the application stack, so limits enforced in the WAF, gateway, or at the platform level are unaffected. This vulnerability is fixed in 2.57.1. |
2026-04-10 | |
| CVE-2026-35670 | 6.0 | MEDIUM | CWE-807 | 0.1% p22 | 4.20 | OpenClaw before 2026.3.22 contains a webhook reply delivery vulnerability that a...OpenClaw before 2026.3.22 contains a webhook reply delivery vulnerability that allows attackers to rebind chat replies to unintended users by exploiting mutable username matching instead of stable numeric user identifiers. Attackers can manipulate username changes to redirect webhook-triggered replies to different users, bypassing the intended recipient binding recorded in webhook events. |
2026-04-10 | |
| CVE-2026-35669 | 8.7 | HIGH | CWE-648 | 0.0% p11 | 6.09 | OpenClaw before 2026.3.25 contains a privilege escalation vulnerability in gatew...OpenClaw before 2026.3.25 contains a privilege escalation vulnerability in gateway-authenticated plugin HTTP routes that incorrectly mint operator.admin runtime scope regardless of caller-granted scopes. Attackers can exploit this scope boundary bypass to gain elevated privileges and perform unauthorized administrative actions. |
2026-04-10 | |
| CVE-2026-35668 | 7.1 | HIGH | CWE-22 | 0.0% p12 | 4.97 | OpenClaw before 2026.3.24 contains a path traversal vulnerability in sandbox enf...OpenClaw before 2026.3.24 contains a path traversal vulnerability in sandbox enforcement allowing sandboxed agents to read arbitrary files from other agents' workspaces via unnormalized mediaUrl or fileUrl parameter keys. Attackers can exploit incomplete parameter validation in normalizeSandboxMediaParams and missing mediaLocalRoots context to access sensitive files including API keys and configuration data outside designated sandbox roots. |
2026-04-10 | |
| CVE-2026-35667 | 6.9 | MEDIUM | CWE-404 | 0.0% p2 | 4.83 | OpenClaw before 2026.3.24 contains an incomplete fix for CVE-2026-27486 where th...OpenClaw before 2026.3.24 contains an incomplete fix for CVE-2026-27486 where the !stop chat command uses an unpatched killProcessTree function from shell-utils.ts that sends SIGKILL immediately without graceful SIGTERM shutdown. Attackers can trigger process termination via the !stop command, causing data corruption, resource leaks, and skipped security-sensitive cleanup operations. |
2026-04-10 | |
| CVE-2026-35666 | 7.7 | HIGH | CWE-706 | 0.0% p13 | 5.39 | OpenClaw before 2026.3.22 contains an allowlist bypass vulnerability in system.r...OpenClaw before 2026.3.22 contains an allowlist bypass vulnerability in system.run approvals that fails to unwrap /usr/bin/time wrappers. Attackers can bypass executable binding restrictions by using an unregistered time wrapper to reuse approval state for inner commands. |
2026-04-10 | |
| CVE-2026-35665 | 6.9 | MEDIUM | CWE-405 | 0.1% p18 | 4.83 | OpenClaw before 2026.3.24 contains an incomplete fix for CVE-2026-32011 where th...OpenClaw before 2026.3.24 contains an incomplete fix for CVE-2026-32011 where the Feishu webhook handler accepts request bodies with permissive limits of 1MB and 30-second timeout before signature verification. An unauthenticated attacker can exhaust server connection resources by sending concurrent slow HTTP POST requests to the Feishu webhook endpoint, blocking legitimate webhook deliveries. |
2026-04-10 | |
| CVE-2026-35664 | 6.9 | MEDIUM | CWE-288 | 0.1% p17 | 4.83 | OpenClaw before 2026.3.25 contains an authentication bypass vulnerability in raw...OpenClaw before 2026.3.25 contains an authentication bypass vulnerability in raw card send surface that allows unpaired recipients to mint legacy callback payloads. Attackers can send raw card commands to bypass DM pairing restrictions and reach callback handling without proper authorization. |
2026-04-10 | |
| CVE-2026-35663 | 8.7 | HIGH | CWE-648 | 0.0% p11 | 6.09 | OpenClaw before 2026.3.25 contains a privilege escalation vulnerability allowing...OpenClaw before 2026.3.25 contains a privilege escalation vulnerability allowing non-admin operators to self-request broader scopes during backend reconnect. Attackers can bypass pairing requirements to reconnect as operator.admin, gaining unauthorized administrative privileges. |
2026-04-10 | |
| CVE-2026-35662 | 5.3 | MEDIUM | CWE-862 | 0.0% p7 | 3.71 | OpenClaw before 2026.3.22 fails to enforce controlScope restrictions on the send...OpenClaw before 2026.3.22 fails to enforce controlScope restrictions on the send action, allowing leaf subagents to message controlled child sessions beyond their authorized scope. Attackers can exploit this by using the send action to communicate with child sessions without proper scope validation, bypassing intended access control restrictions. |
2026-04-10 | |
| CVE-2026-35661 | 6.9 | MEDIUM | CWE-288 | 0.0% p11 | 4.83 | OpenClaw before 2026.3.25 contains an authorization bypass vulnerability in Tele...OpenClaw before 2026.3.25 contains an authorization bypass vulnerability in Telegram callback query handling that allows attackers to mutate session state without satisfying normal DM pairing requirements. Remote attackers can exploit weaker callback-only authorization in direct messages to bypass DM pairing and modify session state. |
2026-04-10 | |
| CVE-2026-35660 | 7.2 | HIGH | CWE-862 | 0.0% p12 | 5.04 | OpenClaw before 2026.3.23 contains an insufficient access control vulnerability ...OpenClaw before 2026.3.23 contains an insufficient access control vulnerability in the Gateway agent /reset endpoint that allows callers with operator.write permission to reset admin sessions. Attackers with operator.write privileges can invoke /reset or /new messages with an explicit sessionKey to bypass operator.admin requirements and reset arbitrary sessions. |
2026-04-10 | |
| CVE-2026-35659 | 5.1 | MEDIUM | CWE-345 | 0.0% p0 | 3.57 | OpenClaw before 2026.3.22 contains a service discovery vulnerability where TXT m...OpenClaw before 2026.3.22 contains a service discovery vulnerability where TXT metadata from Bonjour and DNS-SD could influence CLI routing even when actual service resolution failed. Attackers can exploit unresolved hints to steer routing decisions to unintended targets by providing malicious discovery metadata. |
2026-04-10 | |
| CVE-2026-35658 | 6.0 | MEDIUM | CWE-668 | 0.0% p9 | 4.20 | OpenClaw before 2026.3.2 contains a filesystem boundary bypass vulnerability in ...OpenClaw before 2026.3.2 contains a filesystem boundary bypass vulnerability in the image tool that fails to honor tools.fs.workspaceOnly restrictions. Attackers can traverse sandbox bridge mounts outside the workspace to read files that other filesystem tools would reject. |
2026-04-10 | |
| CVE-2026-35657 | 7.1 | HIGH | CWE-863 | 0.0% p6 | 4.97 | OpenClaw before 2026.3.25 contains an authorization bypass vulnerability in the ...OpenClaw before 2026.3.25 contains an authorization bypass vulnerability in the HTTP /sessions/:sessionKey/history route that skips operator.read scope validation. Attackers can access session history without proper operator read permissions by sending HTTP requests to the vulnerable endpoint. |
2026-04-10 | |
| CVE-2026-35656 | 6.3 | MEDIUM | CWE-290 | 0.1% p32 | 4.41 | OpenClaw before 2026.3.22 contains an authentication bypass vulnerability in the...OpenClaw before 2026.3.22 contains an authentication bypass vulnerability in the X-Forwarded-For header processing when trustedProxies is configured, allowing attackers to spoof loopback hops. Remote attackers can inject forged forwarding headers to bypass canvas authentication and rate-limiting protections by masquerading as loopback clients. |
2026-04-10 | |
| CVE-2026-35655 | 6.9 | MEDIUM | CWE-807 | 0.0% p11 | 4.83 | OpenClaw before 2026.3.22 contains an identity spoofing vulnerability in ACP per...OpenClaw before 2026.3.22 contains an identity spoofing vulnerability in ACP permission resolution that trusts conflicting tool identity hints from rawInput and metadata. Attackers can spoof tool identities through rawInput parameters to suppress dangerous-tool prompting and bypass security restrictions. |
2026-04-10 | |
| CVE-2026-35654 | 6.9 | MEDIUM | CWE-288 | 0.0% p7 | 4.83 | OpenClaw before 2026.3.25 contains an authorization bypass vulnerability in Micr...OpenClaw before 2026.3.25 contains an authorization bypass vulnerability in Microsoft Teams feedback invokes that allows unauthorized senders to record session feedback. Attackers can bypass sender allowlist checks via feedback invoke endpoints to trigger unauthorized feedback recording or reflection. |
2026-04-10 | |
| CVE-2026-35653 | 7.2 | HIGH | CWE-863 | 0.1% p15 | 5.04 | OpenClaw before 2026.3.24 contains an incorrect authorization vulnerability in t...OpenClaw before 2026.3.24 contains an incorrect authorization vulnerability in the POST /reset-profile endpoint that allows authenticated callers with operator.write access to browser.request to bypass profile mutation restrictions. Attackers can invoke POST /reset-profile through the browser.request surface to stop the running browser, close Playwright connections, and move profile directories to Trash, crossing intended privilege boundaries. |
2026-04-10 | |
| CVE-2026-35652 | 6.9 | MEDIUM | CWE-696 | 0.0% p13 | 4.83 | OpenClaw before 2026.3.22 contains an authorization bypass vulnerability in inte...OpenClaw before 2026.3.22 contains an authorization bypass vulnerability in interactive callback dispatch that allows non-allowlisted senders to execute action handlers. Attackers can bypass sender authorization checks by dispatching callbacks before normal security validation completes, enabling unauthorized actions. |
2026-04-10 | |
| CVE-2026-35651 | 5.3 | MEDIUM | CWE-150 | 0.0% p7 | 3.71 | OpenClaw versions 2026.2.13 through 2026.3.24 contain an ANSI escape sequence in...OpenClaw versions 2026.2.13 through 2026.3.24 contain an ANSI escape sequence injection vulnerability in approval prompts that allows attackers to spoof terminal output. Untrusted tool metadata can carry ANSI control sequences into approval prompts and permission logs, enabling attackers to manipulate displayed information through malicious tool titles. |
2026-04-10 | |
| CVE-2026-35650 | 7.7 | HIGH | CWE-15 | 0.1% p19 | 5.39 | OpenClaw before 2026.3.22 contains an environment variable override handling vul...OpenClaw before 2026.3.22 contains an environment variable override handling vulnerability that allows attackers to bypass the shared host environment policy through inconsistent sanitization paths. Attackers can supply blocked or malformed override keys that slip through inconsistent validation to execute arbitrary code with unintended environment variables. |
2026-04-10 | |
| CVE-2026-35649 | 6.3 | MEDIUM | CWE-183 | 0.0% p6 | 4.41 | OpenClaw before 2026.3.22 contains a settings reconciliation vulnerability that ...OpenClaw before 2026.3.22 contains a settings reconciliation vulnerability that allows attackers to bypass intended deny-all revocations by exploiting empty allowlist handling. The vulnerability treats explicit empty allowlists as unset during reconciliation, silently undoing intended access control denials and restoring previously revoked permissions. |
2026-04-10 | |
| CVE-2026-35648 | 2.3 | LOW | CWE-367 | 0.0% p7 | 1.61 | OpenClaw before 2026.3.22 contains a policy bypass vulnerability where queued no...OpenClaw before 2026.3.22 contains a policy bypass vulnerability where queued node actions are not revalidated against current command policy when delivered. Attackers can exploit stale allowlists or declarations that survive policy tightening to execute unauthorized commands. |
2026-04-10 | |
| CVE-2026-35647 | 6.9 | MEDIUM | CWE-288 | 0.0% p7 | 4.83 | OpenClaw before 2026.3.25 contains an access control vulnerability where verific...OpenClaw before 2026.3.25 contains an access control vulnerability where verification notices bypass DM policy checks and reply to unpaired peers. Attackers can send verification notices to users outside allowed direct message policies by exploiting insufficient access validation before message transmission. |
2026-04-10 | |
| CVE-2026-35643 | 8.6 | HIGH | CWE-940 | 0.0% p11 | 6.02 | OpenClaw before 2026.3.22 contains an unvalidated WebView JavascriptInterface vu...OpenClaw before 2026.3.22 contains an unvalidated WebView JavascriptInterface vulnerability allowing attackers to inject arbitrary instructions. Untrusted pages can invoke the canvas bridge to execute malicious code within the Android application context. |
2026-04-10 | |
| CVE-2026-35641 | 8.4 | HIGH | CWE-349 | 0.0% p0 | 5.88 | OpenClaw before 2026.3.24 contains an arbitrary code execution vulnerability in ...OpenClaw before 2026.3.24 contains an arbitrary code execution vulnerability in local plugin and hook installation that allows attackers to execute malicious code by crafting a .npmrc file with a git executable override. During npm install execution in the staged package directory, attackers can leverage git dependencies to trigger execution of arbitrary programs specified in the attacker-controlled .npmrc configuration file. |
2026-04-10 | |
| CVE-2026-35621 | 7.1 | HIGH | CWE-862 | 0.0% p8 | 4.97 | OpenClaw before 2026.3.24 contains a privilege escalation vulnerability where th...OpenClaw before 2026.3.24 contains a privilege escalation vulnerability where the /allowlist command fails to re-validate gateway client scopes for internal callers, allowing operator.write-scoped clients to mutate channel authorization policy. Attackers can exploit chat.send to build an internal command-authorized context and persist channel allowFrom and groupAllowFrom policy changes reserved for operator.admin scope. |
2026-04-10 | |
| CVE-2026-35620 | 5.3 | MEDIUM | CWE-862 | 0.1% p17 | 3.71 | OpenClaw before 2026.3.24 contains missing authorization vulnerabilities in the ...OpenClaw before 2026.3.24 contains missing authorization vulnerabilities in the /send and /allowlist chat command handlers. The /send command allows non-owner command-authorized senders to change owner-only session delivery policy settings, and the /allowlist mutating commands fail to enforce operator.admin scope. Attackers with operator.write scope can invoke /send on|off|inherit to persistently mutate the current session's sendPolicy, and execute /allowlist add commands to modify config-backed allowFrom entries and pairing-store allowlist entries without proper admin authorization. |
2026-04-10 | |
| CVE-2026-35619 | 5.3 | MEDIUM | CWE-863 | 0.0% p7 | 3.71 | OpenClaw before 2026.3.24 contains an authorization bypass vulnerability in the ...OpenClaw before 2026.3.24 contains an authorization bypass vulnerability in the HTTP /v1/models endpoint that fails to enforce operator read scope requirements. Attackers with only operator.approvals scope can enumerate gateway model metadata through the HTTP compatibility route, bypassing the stricter WebSocket RPC authorization checks. |
2026-04-10 | |
| CVE-2026-35602 | 5.4 | MEDIUM | CWE-770 | 0.0% p10 | 3.78 | Vikunja is an open-source self-hosted task management platform. Prior to 2.3.0, ...Vikunja is an open-source self-hosted task management platform. Prior to 2.3.0, the Vikunja file import endpoint uses the attacker-controlled Size field from the JSON metadata inside the import zip instead of the actual decompressed file content length for the file size enforcement check. By setting Size to 0 in the JSON while including large compressed file entries in the zip, an attacker bypasses the configured maximum file size limit. This vulnerability is fixed in 2.3.0. |
2026-04-10 | |
| CVE-2026-35601 | 4.1 | MEDIUM | CWE-93 | 0.0% p7 | 2.87 | Vikunja is an open-source self-hosted task management platform. Prior to 2.3.0, ...Vikunja is an open-source self-hosted task management platform. Prior to 2.3.0, the CalDAV output generator builds iCalendar VTODO entries via raw string concatenation without applying RFC 5545 TEXT value escaping. User-controlled task titles containing CRLF characters break the iCalendar property boundary, allowing injection of arbitrary iCalendar properties such as ATTACH, VALARM, or ORGANIZER. This vulnerability is fixed in 2.3.0. |
2026-04-10 | |
| CVE-2026-35600 | 5.4 | MEDIUM | CWE-79 | 0.0% p8 | 3.78 | Vikunja is an open-source self-hosted task management platform. Prior to 2.3.0, ...Vikunja is an open-source self-hosted task management platform. Prior to 2.3.0, task titles are embedded directly into Markdown link syntax in overdue email notifications without escaping Markdown special characters. When rendered by goldmark and sanitized by bluemonday (which allows <a> and <img> tags), injected Markdown constructs produce phishing links and tracking pixels in legitimate notification emails. This vulnerability is fixed in 2.3.0. |
2026-04-10 | |
| CVE-2026-35599 | 6.5 | MEDIUM | CWE-407 | 0.0% p12 | 4.55 | Vikunja is an open-source self-hosted task management platform. Prior to 2.3.0, ...Vikunja is an open-source self-hosted task management platform. Prior to 2.3.0, the addRepeatIntervalToTime function uses an O(n) loop that advances a date by the task's RepeatAfter duration until it exceeds the current time. By creating a repeating task with a 1-second interval and a due date far in the past, an attacker triggers billions of loop iterations, consuming CPU and holding a database connection for minutes per request. This vulnerability is fixed in 2.3.0. |
2026-04-10 | |
| CVE-2026-35598 | 4.3 | MEDIUM | CWE-862 | 0.0% p7 | 3.01 | Vikunja is an open-source self-hosted task management platform. Prior to 2.3.0, ...Vikunja is an open-source self-hosted task management platform. Prior to 2.3.0, the CalDAV GetResource and GetResourcesByList methods fetch tasks by UID from the database without verifying that the authenticated user has access to the task's project. Any authenticated CalDAV user who knows (or guesses) a task UID can read the full task data from any project on the instance. This vulnerability is fixed in 2.3.0. |
2026-04-10 | |
| CVE-2026-35597 | 5.9 | MEDIUM | CWE-307 | 0.0% p8 | 4.13 | Vikunja is an open-source self-hosted task management platform. Prior to 2.3.0, ...Vikunja is an open-source self-hosted task management platform. Prior to 2.3.0, the TOTP failed-attempt lockout mechanism is non-functional due to a database transaction handling bug. When a TOTP validation fails, the login handler in pkg/routes/api/v1/login.go calls HandleFailedTOTPAuth and then unconditionally rolls back. HandleFailedTOTPAuth in pkg/user/totp.go uses an in-memory counter (key-value store) to track failed attempts. When the counter reaches 10, it calls user.SetStatus(s, StatusAccountLocked) on the same database session s. Because the login handler always rolls back after a TOTP failure, the StatusAccountLocked write is undone. The in-memory counter correctly increments past 10, so the lockout code executes on every subsequent attempt, but the database write is rolled back every time. This allows unlimited brute-force attempts against TOTP codes. This vulnerability is fixed in 2.3.0. |
2026-04-10 | |
| CVE-2026-35596 | 4.3 | MEDIUM | CWE-863 | 0.0% p7 | 3.01 | Vikunja is an open-source self-hosted task management platform. Prior to 2.3.0, ...Vikunja is an open-source self-hosted task management platform. Prior to 2.3.0, the hasAccessToLabel function contains a SQL operator precedence bug that allows any authenticated user to read any label that has at least one task association, regardless of project access. Label titles, descriptions, colors, and creator information are exposed. This vulnerability is fixed in 2.3.0. |
2026-04-10 | |
| CVE-2026-35595 | 8.3 | HIGH | CWE-269 | 0.0% p7 | 5.81 | Vikunja is an open-source self-hosted task management platform. Prior to 2.3.0, ...Vikunja is an open-source self-hosted task management platform. Prior to 2.3.0, the CanUpdate check at pkg/models/project_permissions.go:139-148 only requires CanWrite on the new parent project when changing parent_project_id. However, Vikunja's permission model uses a recursive CTE that walks up the project hierarchy to compute permissions. Moving a project under a different parent changes the permission inheritance chain. When a user has inherited Write access (from a parent project share) and reparents the child project under their own project tree, the CTE resolves their ownership of the new parent as Admin (permission level 2) on the moved project. This vulnerability is fixed in 2.3.0. |
2026-04-10 | |
| CVE-2026-22560 | 5.3 | MEDIUM | CWE-601 | 0.0% p9 | 3.71 | An open redirect vulnerability in Rocket.Chat versions prior to 8.4.0 allows use...An open redirect vulnerability in Rocket.Chat versions prior to 8.4.0 allows users to be redirected to arbitrary URLs by manipulating parameters within a SAML endpoint. |
2026-04-10 | |
| CVE-2026-40228 | 2.9 | LOW | CWE-669 | 0.0% p1 | 2.03 | In systemd 259, systemd-journald can send ANSI escape sequences to the terminals...In systemd 259, systemd-journald can send ANSI escape sequences to the terminals of arbitrary users when a "logger -p emerg" command is executed, if ForwardToWall=yes is set. |
2026-04-10 | |
| CVE-2026-40227 | 6.2 | MEDIUM | CWE-1025 | 0.0% p4 | 4.34 | In systemd 260 before 261, a local unprivileged user can trigger an assert via a...In systemd 260 before 261, a local unprivileged user can trigger an assert via an IPC API call with an array or map that has a null element. |
2026-04-10 | |
| CVE-2026-40226 | 6.4 | MEDIUM | CWE-348 | 0.0% p0 | 4.48 | In nspawn in systemd 233 through 259 before 260, an escape-to-host action can oc...In nspawn in systemd 233 through 259 before 260, an escape-to-host action can occur via a crafted optional config file. |
2026-04-10 | |
| CVE-2026-40225 | 6.4 | MEDIUM | CWE-669 | 0.0% p5 | 4.48 | In udev in systemd before 260, local root execution can occur via malicious hard...In udev in systemd before 260, local root execution can occur via malicious hardware devices and unsanitized kernel output. |
2026-04-10 | |
| CVE-2026-40224 | 6.7 | MEDIUM | CWE-863 | 0.0% p1 | 4.69 | In systemd 259 before 260, there is local privilege escalation in systemd-machin...In systemd 259 before 260, there is local privilege escalation in systemd-machined because varlink can be used to reach the root namespace. |
2026-04-10 | |
| CVE-2026-40223 | 4.7 | MEDIUM | CWE-696 | 0.0% p2 | 3.29 | In systemd 258 before 260, a local unprivileged user can trigger an assert when ...In systemd 258 before 260, a local unprivileged user can trigger an assert when a Delegate=yes and User=<unset> unit exists and is running. |
2026-04-10 | |
| CVE-2026-35594 | 6.5 | MEDIUM | CWE-613 | 0.0% p11 | 4.55 | Vikunja is an open-source self-hosted task management platform. Prior to 2.3.0, ...Vikunja is an open-source self-hosted task management platform. Prior to 2.3.0, Vikunja's link share authentication (GetLinkShareFromClaims in pkg/models/link_sharing.go) constructs authorization objects entirely from JWT claims without any server-side database validation. When a project owner deletes a link share or downgrades its permissions, all previously issued JWTs continue to grant the original permission level for up to 72 hours (the default service.jwtttl). This vulnerability is fixed in 2.3.0. |
2026-04-10 | |
| CVE-2026-34727 | 7.4 | HIGH | CWE-287 | 0.0% p11 | 5.18 | Vikunja is an open-source self-hosted task management platform. Prior to 2.3.0, ...Vikunja is an open-source self-hosted task management platform. Prior to 2.3.0, the OIDC callback handler issues a full JWT token without checking whether the matched user has TOTP two-factor authentication enabled. When a local user with TOTP enrolled is matched via the OIDC email fallback mechanism, the second factor is completely skipped. This vulnerability is fixed in 2.3.0. |
2026-04-10 | |
| CVE-2026-29043 | 5.5 | MEDIUM | CWE-122 | 0.0% p12 | 3.85 | HDF5 is software for managing data. In 1.14.1-2 and earlier, an attacker who can...HDF5 is software for managing data. In 1.14.1-2 and earlier, an attacker who can control an h5 file parsed by HDF5 can trigger a write-based heap buffer overflow condition in the H5T__ref_mem_setnull method. This can lead to a denial-of-service condition, and potentially further issues such as remote code execution depending on the practical exploitability of the heap overflow against modern operating systems. |
2026-04-10 | |
| CVE-2026-29002 | 8.6 | HIGH | CWE-639 | 0.0% p9 | 6.02 | CouchCMS contains a privilege escalation vulnerability that allows authenticated...CouchCMS contains a privilege escalation vulnerability that allows authenticated Admin-level users to create SuperAdmin accounts by tampering with the f_k_levels_list parameter in user creation requests. Attackers can modify the parameter value from 4 to 10 in the HTTP request body to bypass authorization validation and gain full application control, circumventing restrictions on SuperAdmin account creation and privilege assignment. |
2026-04-10 | |
| CVE-2026-23781 | 9.8 | CRITICAL | CWE-798 | 0.0% p15 | 6.86 | An issue was discovered in BMC Control-M/MFT 9.0.20 through 9.0.22. A set of def...An issue was discovered in BMC Control-M/MFT 9.0.20 through 9.0.22. A set of default debug user credentials is hardcoded in cleartext within the application package. If left unchanged, these credentials can be easily obtained and may allow unauthorized access to the MFT API debug interface. |
2026-04-10 | |
| CVE-2026-36236 | 9.8 | CRITICAL | CWE-89 | 0.0% p8 | 6.86 | SourceCodester Engineers Online Portal v1.0 is vulnerable to SQL Injection in up...SourceCodester Engineers Online Portal v1.0 is vulnerable to SQL Injection in update_password.php via the new_password parameter. |
2026-04-10 | |
| CVE-2026-36235 | 9.8 | CRITICAL | CWE-89 | 0.0% p8 | 6.86 | A SQL injection vulnerability was found in the scheduleSubList.php file of itsou...A SQL injection vulnerability was found in the scheduleSubList.php file of itsourcecode Online Student Enrollment System v1.0. The reason for this issue is that the 'subjcode' parameter is directly embedded into the SQL query via string interpolation without any sanitization or validation. |
2026-04-10 | |
| CVE-2026-36234 | 9.8 | CRITICAL | CWE-89 | 0.0% p8 | 6.86 | itsourcecode Online Student Enrollment System v1.0 is vulnerable to SQL Injectio...itsourcecode Online Student Enrollment System v1.0 is vulnerable to SQL Injection in newCourse.php via the 'coursename' parameter. |
2026-04-10 | |
| CVE-2026-36233 | 9.8 | CRITICAL | CWE-89 | 0.0% p8 | 6.86 | A SQL injection vulnerability was found in the assignInstructorSubjects.php file...A SQL injection vulnerability was found in the assignInstructorSubjects.php file of itsourcecode Online Student Enrollment System v1.0. The reason for this issue is that attackers can inject malicious code via the parameter "subjcode" and use it directly in SQL queries without the need for appropriate cleaning or validation. |
2026-04-10 | |
| CVE-2026-36232 | 9.8 | CRITICAL | CWE-89 | 0.0% p8 | 6.86 | A SQL injection vulnerability was found in the instructorClasses.php file of its...A SQL injection vulnerability was found in the instructorClasses.php file of itsourcecode Online Student Enrollment System v1.0. The reason for this issue is that the 'classId' parameter from $_GET['classId'] is directly concatenated into the SQL query without any sanitization or validation. |
2026-04-10 | |
| CVE-2026-31262 | 6.1 | MEDIUM | CWE-200 | 0.1% p16 | 4.27 | Cross Site Scripting vulnerability in Altenar Sportsbook Software Platform (SB2)...Cross Site Scripting vulnerability in Altenar Sportsbook Software Platform (SB2) v.2.0 allows a remote attacker to obtain sensitive information and execute arbitrary code via the URL parameter |
2026-04-10 | |
| CVE-2026-29861 | 9.8 | CRITICAL | CWE-89 | 0.0% p8 | 6.86 | PHP-MYSQL-User-Login-System v1.0 was discovered to contain a SQL injection vulne...PHP-MYSQL-User-Login-System v1.0 was discovered to contain a SQL injection vulnerability via the username parameter at login.php. |
2026-04-10 | |
| CVE-2026-23782 | 7.5 | HIGH | CWE-284 | 0.1% p16 | 5.25 | An issue was discovered in BMC Control-M/MFT 9.0.20 through 9.0.22. An API manag...An issue was discovered in BMC Control-M/MFT 9.0.20 through 9.0.22. An API management endpoint allows unauthenticated users to obtain both an API identifier and its corresponding secret value. With these exposed secrets, an attacker could invoke privileged API operations, potentially leading to unauthorized access. |
2026-04-10 | |
| CVE-2026-23780 | 8.8 | HIGH | CWE-89 | 0.2% p37 | 6.16 | An issue was discovered in BMC Control-M/MFT 9.0.20 through 9.0.22. A SQL inject...An issue was discovered in BMC Control-M/MFT 9.0.20 through 9.0.22. A SQL injection vulnerability in the MFT API's debug interface allows an authenticated attacker to inject malicious queries due to improper input validation and unsafe dynamic SQL handling. Successful exploitation can enable arbitrary file read/write operations and potentially lead to remote code execution. |
2026-04-10 | |
| CVE-2025-44560 | 9.8 | CRITICAL | CWE-120 | 0.0% p12 | 6.86 | owntone-server 2ca10d9 is vulnerable to Buffer Overflow due to lack of recursive...owntone-server 2ca10d9 is vulnerable to Buffer Overflow due to lack of recursive checking. |
2026-04-10 | |
| CVE-2026-6069 | 7.5 | HIGH | N/A | 0.0% p12 | 5.25 | NASM’s disasm() function contains a stack based buffer overflow when formatting ...NASM’s disasm() function contains a stack based buffer overflow when formatting disassembly output, allowing an attacker triggered out-of-bounds write when `slen` exceeds the buffer capacity. |
2026-04-10 | |
| CVE-2026-6068 | 6.5 | MEDIUM | N/A | 0.0% p7 | 4.55 | NASM contains a heap use after free vulnerability in response file (-@) processi...NASM contains a heap use after free vulnerability in response file (-@) processing where a dangling pointer to freed memory is stored in the global depend_file and later dereferenced, as the response-file buffer is freed before the pointer is used, allowing for data corruption or unexpected behavior. |
2026-04-10 | |
| CVE-2026-6067 | 7.5 | HIGH | N/A | 0.1% p17 | 5.25 | A heap buffer overflow vulnerability exists in the Netwide Assembler (NASM) due ...A heap buffer overflow vulnerability exists in the Netwide Assembler (NASM) due to a lack of bounds checking in the obj_directive() function. This vulnerability can be exploited by a user assembling a malicious .asm file, potentially leading to heap memory corruption, denial of service (crash), and arbitrary code execution. |
2026-04-10 | |
| CVE-2026-40217 | 8.8 | HIGH | CWE-420 | 0.2% p40 | 6.17 | LiteLLM through 2026-04-08 allows remote attackers to execute arbitrary code via...LiteLLM through 2026-04-08 allows remote attackers to execute arbitrary code via bytecode rewriting at the /guardrails/test_custom_code URI. |
2026-04-10 | |
| CVE-2026-33092 | 7.8 | HIGH | CWE-15 | 0.0% p2 | 5.46 | Local privilege escalation due to improper handling of environment variables. Th...Local privilege escalation due to improper handling of environment variables. The following products are affected: Acronis True Image OEM (macOS) before build 42571, Acronis True Image (macOS) before build 42902. |
2026-04-10 | |
| CVE-2025-5804 | 7.5 | HIGH | CWE-98 | 0.1% p20 | 5.25 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Case Themes Case Theme User allows PHP Local File Inclusion.This issue affects Case Theme User: from n/a before 1.0.4. |
2026-04-10 | |
| CVE-2025-58920 | 7.1 | HIGH | CWE-79 | 0.0% p9 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Zootemplate Cerato allows Reflected XSS.This issue affects Cerato: from n/a through 2.2.18. |
2026-04-10 | |
| CVE-2025-58913 | 8.1 | HIGH | CWE-98 | 0.1% p30 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in CactusThemes VideoPro allows PHP Local File Inclusion.This issue affects VideoPro: from n/a through 2.3.8.1. |
2026-04-10 | |
| CVE-2026-5774 | 6.0 | MEDIUM | CWE-362 | 0.0% p1 | 4.20 | Improper synchronization of the userTokens map in the API server in Canonical Ju...Improper synchronization of the userTokens map in the API server in Canonical Juju 4.0.5, 3.6.20, and 2.9.56 may allow an authenticated user to possibly cause a denial of service on the server or possibly reuse a single-use discharge token. |
2026-04-10 | |
| CVE-2026-5412 | 9.9 | CRITICAL | CWE-285 | 0.0% p10 | 6.93 | In Juju versions prior to 2.9.57 and 3.6.21, an authorization issue exists in th...In Juju versions prior to 2.9.57 and 3.6.21, an authorization issue exists in the Controller facade. An authenticated user can call the CloudSpec API method to extract the cloud credentials used to bootstrap the controller. This allows a low-privileged user to access sensitive credentials. This issue is resolved in Juju versions 2.9.57 and 3.6.21. |
2026-04-10 | |
| CVE-2026-5777 | 8.7 | HIGH | CWE-306 | 0.0% p1 | 6.09 | This vulnerability exists in the Atom 3x Projector due to improper exposure of t...This vulnerability exists in the Atom 3x Projector due to improper exposure of the Android Debug Bridge (ADB) service over the local network without authentication or access controls. An unauthenticated attacker on the same network can exploit this vulnerability to obtain root-level access, leading to complete compromise of the targeted device. |
2026-04-10 | |
| CVE-2026-6057 | 9.8 | CRITICAL | CWE-22 | 0.1% p29 | 6.86 | FalkorDB Browser 1.9.3 contains an unauthenticated path traversal vulnerability ...FalkorDB Browser 1.9.3 contains an unauthenticated path traversal vulnerability in the file upload API that allows remote attackers to write arbitrary files and achieve remote code execution. |
2026-04-10 | |
| CVE-2026-4162 | 7.1 | HIGH | CWE-862 | 0.0% p10 | 4.97 | The Gravity SMTP plugin for WordPress is vulnerable to Missing Authorization in ...The Gravity SMTP plugin for WordPress is vulnerable to Missing Authorization in versions up to, and including, 2.1.4. This is due to the plugin not properly verifying that a user is authorized to perform an action. This makes it possible for authenticated attackers, with subscriber-level access and above, to uninstall and deactivate the plugin and delete plugin options. NOTE: This vulnerability is also exploitable via a Cross-Site Request Forgery vector. |
2026-04-10 | |
| CVE-2021-47961 | 8.1 | HIGH | CWE-256 | 0.0% p12 | 5.67 | A plaintext storage of a password vulnerability in Synology SSL VPN Client befor...A plaintext storage of a password vulnerability in Synology SSL VPN Client before 1.4.5-0684 allows remote attackers to access or influence the user's PIN code due to insecure storage. This may lead to unauthorized VPN configuration and potential interception of subsequent VPN traffic when combined with user interaction. |
2026-04-10 | |
| CVE-2021-47960 | 6.5 | MEDIUM | CWE-552 | 0.0% p7 | 4.55 | A files or directories accessible to external parties vulnerability in Synology ...A files or directories accessible to external parties vulnerability in Synology SSL VPN Client before 1.4.5-0684 allows remote attackers to access files within the installation directory via a local HTTP server bound to the loopback interface. By leveraging user interaction with a crafted web page, attackers may retrieve sensitive files such as configuration files, certificates, and logs, leading to information disclosure. |
2026-04-10 | |
| CVE-2026-6042 | 4.8 | MEDIUM | CWE-404 | 0.0% p2 | 3.36 | A security flaw has been discovered in musl libc up to 1.2.6. Affected is the fu...A security flaw has been discovered in musl libc up to 1.2.6. Affected is the function iconv of the file src/locale/iconv.c of the component GB18030 4-byte Decoder. Performing a manipulation results in inefficient algorithmic complexity. The attack must be initiated from a local position. To fix this issue, it is recommended to deploy a patch. |
2026-04-10 | |
| CVE-2026-6038 | 6.9 | MEDIUM | CWE-74 | 0.0% p8 | 4.83 | A vulnerability was identified in code-projects Vehicle Showroom Management Syst...A vulnerability was identified in code-projects Vehicle Showroom Management System 1.0. This impacts an unknown function of the file /util/RegisterCustomerFunction.php. Such manipulation of the argument BRANCH_ID leads to sql injection. The attack may be performed from remote. The exploit is publicly available and might be used. |
2026-04-10 | |
| CVE-2026-6037 | 6.9 | MEDIUM | CWE-74 | 0.0% p8 | 4.83 | A vulnerability was determined in code-projects Vehicle Showroom Management Syst...A vulnerability was determined in code-projects Vehicle Showroom Management System 1.0. This affects an unknown function of the file /util/AddVehicleFunction.php. This manipulation of the argument BRANCH_ID causes sql injection. The attack is possible to be carried out remotely. The exploit has been publicly disclosed and may be utilized. |
2026-04-10 | |
| CVE-2026-6036 | 6.9 | MEDIUM | CWE-74 | 0.0% p8 | 4.83 | A vulnerability was found in code-projects Vehicle Showroom Management System 1....A vulnerability was found in code-projects Vehicle Showroom Management System 1.0. The impacted element is an unknown function of the file /util/VehicleDetailsFunction.php. The manipulation of the argument VEHICLE_ID results in sql injection. The attack can be executed remotely. The exploit has been made public and could be used. |
2026-04-10 | |
| CVE-2026-33457 | 5.3 | MEDIUM | CWE-140 | 0.0% p12 | 3.71 | Livestatus injection in the prediction graph page in Checkmk <2.5.0b4, <2.4.0p26...Livestatus injection in the prediction graph page in Checkmk <2.5.0b4, <2.4.0p26, and <2.3.0p47 allows an authenticated user to inject arbitrary Livestatus commands via a crafted service name parameter due to insufficient sanitization of the service description value. |
2026-04-10 | |
| CVE-2026-33456 | 5.1 | MEDIUM | CWE-140 | 0.0% p11 | 3.57 | Livestatus injection in the notification test mode in Checkmk <2.5.0b4 and <2.4....Livestatus injection in the notification test mode in Checkmk <2.5.0b4 and <2.4.0p26 allows an authenticated user with access to the notification test page to inject arbitrary Livestatus commands via a crafted service description. |
2026-04-10 | |
| CVE-2026-33455 | 5.3 | MEDIUM | CWE-140 | 0.0% p12 | 3.71 | Livestatus injection in the monitoring quicksearch in Checkmk <2.5.0b4 allows an...Livestatus injection in the monitoring quicksearch in Checkmk <2.5.0b4 allows an authenticated attacker to inject livestatus commands via the search query due to insufficient input sanitization in search filter plugins. |
2026-04-10 | |
| CVE-2026-6035 | 5.3 | MEDIUM | CWE-79 | 0.0% p9 | 3.71 | A vulnerability has been found in code-projects Vehicle Showroom Management Syst...A vulnerability has been found in code-projects Vehicle Showroom Management System 1.0. The affected element is an unknown function of the file /BranchManagement/ServiceAndSalesReport.php. The manipulation of the argument BRANCH_ID leads to cross site scripting. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used. |
2026-04-10 | |
| CVE-2026-6034 | 5.3 | MEDIUM | CWE-79 | 0.0% p9 | 3.71 | A flaw has been found in code-projects Vehicle Showroom Management System 1.0. I...A flaw has been found in code-projects Vehicle Showroom Management System 1.0. Impacted is an unknown function of the file /BranchManagement/ProfitAndLossReport.php. Executing a manipulation of the argument BRANCH_ID can lead to cross site scripting. The attack may be launched remotely. The exploit has been published and may be used. |
2026-04-10 | |
| CVE-2026-6033 | 5.3 | MEDIUM | CWE-74 | 0.0% p7 | 3.71 | A vulnerability was determined in CodeAstro Online Classroom 1.0. Affected is an...A vulnerability was determined in CodeAstro Online Classroom 1.0. Affected is an unknown function of the file /updatedetailsfromstudent.php?eno=146891650. Executing a manipulation of the argument fname can lead to sql injection. The attack may be performed from remote. The exploit has been publicly disclosed and may be utilized. |
2026-04-10 | |
| CVE-2026-6032 | 5.3 | MEDIUM | CWE-79 | 0.0% p9 | 3.71 | A vulnerability was found in code-projects Simple Laundry System 1.0. This impac...A vulnerability was found in code-projects Simple Laundry System 1.0. This impacts an unknown function of the file /checkcheckout.php. Performing a manipulation of the argument serviceId results in cross site scripting. The attack is possible to be carried out remotely. The exploit has been made public and could be used. |
2026-04-10 | |
| CVE-2026-6031 | 6.9 | MEDIUM | CWE-74 | 0.0% p8 | 4.83 | A vulnerability has been found in code-projects Simple IT Discussion Forum 1.0. ...A vulnerability has been found in code-projects Simple IT Discussion Forum 1.0. This affects an unknown function of the file /add-category-function.php. Such manipulation of the argument Category leads to sql injection. The attack can be executed remotely. The exploit has been disclosed to the public and may be used. |
2026-04-10 | |
| CVE-2026-5525 | 6.0 | MEDIUM | CWE-121 | 0.0% p1 | 4.20 | A stack-based buffer overflow vulnerability exists in Notepad++ version 8.9.3 in...A stack-based buffer overflow vulnerability exists in Notepad++ version 8.9.3 in the file drop handler component. When a user drags and drops a directory path of exactly 259 characters without a trailing backslash, the application appends a backslash and null terminator without proper bounds checking, resulting in a stack buffer overflow and application crash (STATUS_STACK_BUFFER_OVERRUN). |
2026-04-10 | |
| CVE-2026-40212 | 5.4 | MEDIUM | CWE-79 | 0.0% p8 | 3.78 | OpenStack Skyline before 5.0.1, 6.0.0, and 7.0.0 has a DOM-based Cross-Site Scri...OpenStack Skyline before 5.0.1, 6.0.0, and 7.0.0 has a DOM-based Cross-Site Scripting (XSS) vulnerability in the console because document.write is used unsafely, which is relevant in scenarios where administrators use the console web interface to view instance console logs. |
2026-04-10 | |
| CVE-2026-6030 | 5.3 | MEDIUM | CWE-74 | 0.0% p7 | 3.71 | A flaw has been found in itsourcecode Construction Management System 1.0. The im...A flaw has been found in itsourcecode Construction Management System 1.0. The impacted element is an unknown function of the file /del1.php. This manipulation of the argument toolname causes sql injection. Remote exploitation of the attack is possible. The exploit has been published and may be used. |
2026-04-10 | |
| CVE-2026-6029 | 8.9 | HIGH | CWE-77 | 0.9% p75 | 6.26 | A vulnerability was detected in Totolink A7100RU 7.4cu.2313_b20191024. The affec...A vulnerability was detected in Totolink A7100RU 7.4cu.2313_b20191024. The affected element is the function setVpnAccountCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument User results in os command injection. The attack may be launched remotely. The exploit is now public and may be used. |
2026-04-10 | |
| CVE-2026-6028 | 8.9 | HIGH | CWE-77 | 0.9% p75 | 6.26 | A security vulnerability has been detected in Totolink A7100RU 7.4cu.2313_b20191...A security vulnerability has been detected in Totolink A7100RU 7.4cu.2313_b20191024. Impacted is the function setPptpServerCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument enable leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used. |
2026-04-10 | |
| CVE-2026-6027 | 8.9 | HIGH | CWE-77 | 0.9% p75 | 6.26 | A weakness has been identified in Totolink A7100RU 7.4cu.2313_b20191024. This is...A weakness has been identified in Totolink A7100RU 7.4cu.2313_b20191024. This issue affects the function setUrlFilterRules of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Executing a manipulation of the argument enable can lead to os command injection. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks. |
2026-04-10 | |
| CVE-2026-6026 | 8.9 | HIGH | CWE-77 | 0.9% p75 | 6.26 | A security flaw has been discovered in Totolink A7100RU 7.4cu.2313_b20191024. Th...A security flaw has been discovered in Totolink A7100RU 7.4cu.2313_b20191024. This vulnerability affects the function setPortalConfWeChat of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Performing a manipulation of the argument enable results in os command injection. The attack can be initiated remotely. The exploit has been released to the public and may be used for attacks. |
2026-04-10 | |
| CVE-2026-4432 | 6.5 | MEDIUM | N/A | 0.0% p10 | 4.55 | The YITH WooCommerce Wishlist WordPress plugin before 4.13.0 does not properly v...The YITH WooCommerce Wishlist WordPress plugin before 4.13.0 does not properly validate wishlist ownership in the save_title() AJAX handler before allowing wishlist renaming operations. The function only checks for a valid nonce, which is publicly exposed in the page source of the /wishlist/ page, making it possible for unauthenticated attackers to rename any wishlist belonging to any user on the site. |
2026-04-10 | |
| CVE-2026-28704 | 8.4 | HIGH | CWE-427 | 0.0% p1 | 5.88 | Emocheck insecurely loads Dynamic Link Libraries (DLLs). If a crafted DLL file i...Emocheck insecurely loads Dynamic Link Libraries (DLLs). If a crafted DLL file is placed to the same directory, an arbitrary code may be executed with the privilege of the user invoking EmoCheck. |
2026-04-10 | |
| CVE-2026-1115 | 9.6 | CRITICAL | CWE-79 | 0.0% p13 | 6.72 | A Stored Cross-Site Scripting (XSS) vulnerability was identified in the social f...A Stored Cross-Site Scripting (XSS) vulnerability was identified in the social feature of parisneo/lollms, affecting the latest version prior to 2.2.0. The vulnerability exists in the `create_post` function within `backend/routers/social/__init__.py`, where user-provided content is directly assigned to the `DBPost` model without sanitization. This allows attackers to inject and store malicious JavaScript, which is executed in the browsers of users viewing the Home Feed, including administrators. This can lead to account takeover, session hijacking, and wormable attacks. The issue is resolved in version 2.2.0. |
2026-04-10 | |
| CVE-2025-14545 | 6.5 | MEDIUM | N/A | 0.1% p23 | 4.55 | The YML for Yandex Market WordPress plugin before 5.0.26 is vulnerable to Remote...The YML for Yandex Market WordPress plugin before 5.0.26 is vulnerable to Remote Code Execution via the feed generation process. |
2026-04-10 | |
| CVE-2026-6025 | 8.9 | HIGH | CWE-77 | 0.9% p75 | 6.26 | A vulnerability was identified in Totolink A7100RU 7.4cu.2313_b20191024. This af...A vulnerability was identified in Totolink A7100RU 7.4cu.2313_b20191024. This affects the function setSyslogCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Such manipulation of the argument enable leads to os command injection. It is possible to launch the attack remotely. The exploit is publicly available and might be used. |
2026-04-10 | |
| CVE-2026-6024 | 6.9 | MEDIUM | CWE-22 | 0.1% p19 | 4.83 | A vulnerability was determined in Tenda i6 1.0.0.7(2204). Affected by this issue...A vulnerability was determined in Tenda i6 1.0.0.7(2204). Affected by this issue is the function R7WebsSecurityHandlerfunction of the component HTTP Handler. This manipulation causes path traversal. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized. |
2026-04-10 | |
| CVE-2026-6016 | 7.4 | HIGH | CWE-119 | 0.0% p14 | 5.18 | A vulnerability was found in Tenda AC9 15.03.02.13. The affected element is the ...A vulnerability was found in Tenda AC9 15.03.02.13. The affected element is the function decodePwd of the file /goform/WizardHandle of the component POST Request Handler. Performing a manipulation of the argument WANS results in stack-based buffer overflow. The attack can be initiated remotely. The exploit has been made public and could be used. |
2026-04-10 | |
| CVE-2026-6015 | 7.4 | HIGH | CWE-119 | 0.0% p14 | 5.18 | A vulnerability has been found in Tenda AC9 15.03.02.13. Impacted is the functio...A vulnerability has been found in Tenda AC9 15.03.02.13. Impacted is the function formQuickIndex of the file /goform/QuickIndex of the component POST Request Handler. Such manipulation of the argument PPPOEPassword leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. |
2026-04-10 | |
| CVE-2026-5477 | 8.2 | HIGH | CWE-190 | 0.0% p12 | 5.74 | An integer overflow existed in the wolfCrypt CMAC implementation, that could be ...An integer overflow existed in the wolfCrypt CMAC implementation, that could be exploited to forge CMAC tags. The function wc_CmacUpdate used the guard `if (cmac->totalSz != 0)` to skip XOR-chaining on the first block (where digest is all-zeros and the XOR is a no-op). However, totalSz is word32 and wraps to zero after 2^28 block flushes (4 GiB), causing the guard to erroneously discard the live CBC-MAC chain state. Any two messages sharing a common suffix beyond the 4 GiB mark then produce identical CMAC tags, enabling a zero-work prefix-substitution forgery. The fix removes the guard, making the XOR unconditional; the no-op property on the first block is preserved because digest is zero-initialized by wc_InitCmac_ex. |
2026-04-10 | |
| CVE-2026-6014 | 7.4 | HIGH | CWE-119 | 0.0% p13 | 5.18 | A flaw has been found in D-Link DIR-513 1.10. This issue affects the function fo...A flaw has been found in D-Link DIR-513 1.10. This issue affects the function formAdvanceSetup of the file /goform/formAdvanceSetup of the component POST Request Handler. This manipulation of the argument webpage causes buffer overflow. It is possible to initiate the attack remotely. The exploit has been published and may be used. This vulnerability only affects products that are no longer supported by the maintainer. |
2026-04-10 | |
| CVE-2026-6013 | 7.4 | HIGH | CWE-119 | 0.0% p13 | 5.18 | A vulnerability was detected in D-Link DIR-513 1.10. This vulnerability affects ...A vulnerability was detected in D-Link DIR-513 1.10. This vulnerability affects the function formSetRoute of the file /goform/formSetRoute of the component POST Request Handler. The manipulation of the argument curTime results in buffer overflow. The attack may be performed from remote. The exploit is now public and may be used. This vulnerability only affects products that are no longer supported by the maintainer. |
2026-04-10 | |
| CVE-2026-6012 | 7.4 | HIGH | CWE-119 | 0.0% p13 | 5.18 | A security vulnerability has been detected in D-Link DIR-513 1.10. This affects ...A security vulnerability has been detected in D-Link DIR-513 1.10. This affects the function formSetPassword of the file /goform/formSetPassword of the component POST Request Handler. The manipulation of the argument curTime leads to buffer overflow. The attack is possible to be carried out remotely. The exploit has been disclosed publicly and may be used. This vulnerability only affects products that are no longer supported by the maintainer. |
2026-04-10 | |
| CVE-2026-6011 | 6.3 | MEDIUM | CWE-918 | 0.0% p13 | 4.41 | A weakness has been identified in OpenClaw up to 2026.1.26. Affected by this iss...A weakness has been identified in OpenClaw up to 2026.1.26. Affected by this issue is some unknown functionality of the file src/agents/tools/web-fetch.ts of the component assertPublicHostname Handler. Executing a manipulation can lead to server-side request forgery. The attack can be executed remotely. This attack is characterized by high complexity. The exploitation is known to be difficult. The exploit has been made available to the public and could be used for attacks. Upgrading to version 2026.1.29 can resolve this issue. This patch is called b623557a2ec7e271bda003eb3ac33fbb2e218505. Upgrading the affected component is advised. |
2026-04-10 | |
| CVE-2026-4482 | 6.8 | MEDIUM | CWE-732 | 0.0% p0 | 4.76 | The installer certificate files in the …/bootstrap/common/ssl folder do not seem...The installer certificate files in the …/bootstrap/common/ssl folder do not seem to have restricted permissions on Windows systems (users have read and execute access). For the client.key file in particular, this could potentially lead to exploits, as this exposes agent identity material to any locally authenticated standard user. |
2026-04-10 | |
| CVE-2026-6010 | 5.3 | MEDIUM | CWE-74 | 0.0% p7 | 3.71 | A security flaw has been discovered in CodeAstro Online Classroom 1.0/2.php. Aff...A security flaw has been discovered in CodeAstro Online Classroom 1.0/2.php. Affected by this vulnerability is an unknown functionality of the file /OnlineClassroom/takeassessment2.php?exid=14. Performing a manipulation of the argument Q1 results in sql injection. Remote exploitation of the attack is possible. The exploit has been released to the public and may be used for attacks. |
2026-04-10 | |
| CVE-2026-6007 | 5.3 | MEDIUM | CWE-74 | 0.0% p7 | 3.71 | A vulnerability was found in itsourcecode Construction Management System 1.0. Th...A vulnerability was found in itsourcecode Construction Management System 1.0. This affects an unknown function of the file /del.php. The manipulation of the argument equipname results in sql injection. The attack can be launched remotely. The exploit has been made public and could be used. |
2026-04-10 | |
| CVE-2026-6006 | 5.3 | MEDIUM | CWE-74 | 0.0% p7 | 3.71 | A vulnerability has been found in code-projects Patient Record Management System...A vulnerability has been found in code-projects Patient Record Management System 1.0. The impacted element is an unknown function of the file /edit_hpatient.php. The manipulation of the argument ID leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. |
2026-04-10 | |
| CVE-2026-6005 | 5.3 | MEDIUM | CWE-74 | 0.0% p7 | 3.71 | A flaw has been found in code-projects Patient Record Management System 1.0. The...A flaw has been found in code-projects Patient Record Management System 1.0. The affected element is an unknown function of the file /hematology_print.php. Executing a manipulation of the argument hem_id can lead to sql injection. It is possible to launch the attack remotely. The exploit has been published and may be used. |
2026-04-10 | |
| CVE-2026-5501 | 8.6 | HIGH | CWE-295 | 0.0% p6 | 6.02 | wolfSSL_X509_verify_cert in the OpenSSL compatibility layer accepts a certificat...wolfSSL_X509_verify_cert in the OpenSSL compatibility layer accepts a certificate chain in which the leaf's signature is not checked, if the attacker supplies an untrusted intermediate with Basic Constraints `CA:FALSE` that is legitimately signed by a trusted root. An attacker who obtains any leaf certificate from a trusted CA (e.g. a free DV cert from Let's Encrypt) can forge a certificate for any subject name with any public key and arbitrary signature bytes, and the function returns `WOLFSSL_SUCCESS` / `X509_V_OK`. The native wolfSSL TLS handshake path (`ProcessPeerCerts`) is not susceptible and the issue is limited to applications using the OpenSSL compatibility API directly, which would include integrations of wolfSSL into nginx and haproxy. |
2026-04-10 | |
| CVE-2026-5500 | 8.7 | HIGH | CWE-20 | 0.1% p32 | 6.09 | wolfSSL's wc_PKCS7_DecodeAuthEnvelopedData() does not properly sanitize the AES-...wolfSSL's wc_PKCS7_DecodeAuthEnvelopedData() does not properly sanitize the AES-GCM authentication tag length received and has no lower bounds check. A man-in-the-middle can therefore truncate the mac field from 16 bytes to 1 byte, reducing the tag check from 2⁻¹²⁸ to 2⁻⁸. |
2026-04-10 | |
| CVE-2026-5479 | 7.6 | HIGH | CWE-354 | 0.0% p0 | 5.32 | In wolfSSL's EVP layer, the ChaCha20-Poly1305 AEAD decryption path in wolfSSL_EV...In wolfSSL's EVP layer, the ChaCha20-Poly1305 AEAD decryption path in wolfSSL_EVP_CipherFinal (and related EVP cipher finalization functions) fails to verify the authentication tag before returning plaintext to the caller. When an application uses the EVP API to perform ChaCha20-Poly1305 decryption, the implementation computes or accepts the tag but does not compare it against the expected value. |
2026-04-10 | |
| CVE-2026-5466 | 7.6 | HIGH | CWE-347 | 0.0% p1 | 5.32 | wolfSSL's ECCSI signature verifier `wc_VerifyEccsiHash` decodes the `r` and `s` ...wolfSSL's ECCSI signature verifier `wc_VerifyEccsiHash` decodes the `r` and `s` scalars from the signature blob via `mp_read_unsigned_bin` with no check that they lie in `[1, q-1]`. A crafted forged signature could verify against any message for any identity, using only publicly-known constants. |
2026-04-10 | |
| CVE-2026-5188 | 2.3 | LOW | CWE-191 | 0.0% p7 | 1.61 | An integer underflow issue exists in wolfSSL when parsing the Subject Alternativ...An integer underflow issue exists in wolfSSL when parsing the Subject Alternative Name (SAN) extension of X.509 certificates. A malformed certificate can specify an entry length larger than the enclosing sequence, causing the internal length counter to wrap during parsing. This results in incorrect handling of certificate data. The issue is limited to configurations using the original ASN.1 parsing implementation which is off by default. |
2026-04-10 | |
| CVE-2026-2305 | 6.4 | MEDIUM | CWE-79 | 0.0% p12 | 4.48 | The AddFunc Head & Footer Code plugin for WordPress is vulnerable to Stored Cros...The AddFunc Head & Footer Code plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the `aFhfc_head_code`, `aFhfc_body_code`, and `aFhfc_footer_code` post meta values in all versions up to, and including, 2.3. This is due to the plugin outputting these meta values without any sanitization or escaping. While the plugin restricts its own metabox and save handler to administrators via `current_user_can('manage_options')`, it does not use `register_meta()` with an `auth_callback` to protect these meta keys. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts via the WordPress Custom Fields interface that execute when an administrator previews or views the post. |
2026-04-10 | |
| CVE-2026-6004 | 6.9 | MEDIUM | CWE-74 | 0.0% p8 | 4.83 | A vulnerability was detected in code-projects Simple IT Discussion Forum 1.0. Im...A vulnerability was detected in code-projects Simple IT Discussion Forum 1.0. Impacted is an unknown function of the file /delete-category.php. Performing a manipulation of the argument cat_id results in sql injection. It is possible to initiate the attack remotely. The exploit is now public and may be used. |
2026-04-10 | |
| CVE-2026-6003 | 4.8 | MEDIUM | CWE-79 | 0.0% p8 | 3.36 | A security vulnerability has been detected in code-projects Simple IT Discussion...A security vulnerability has been detected in code-projects Simple IT Discussion Forum 1.0. This issue affects some unknown processing of the file /admin/user.php. Such manipulation of the argument fname leads to cross site scripting. The attack may be performed from remote. The exploit has been disclosed publicly and may be used. |
2026-04-10 | |
| CVE-2026-6000 | 2.1 | LOW | CWE-200 | 0.0% p9 | 1.47 | A vulnerability was found in code-projects Online Library Management System 1.0....A vulnerability was found in code-projects Online Library Management System 1.0. Affected is an unknown function of the file /sql/library.sql of the component SQL Database Backup File Handler. Performing a manipulation results in information disclosure. The attack may be initiated remotely. The exploit has been made public and could be used. |
2026-04-10 | |
| CVE-2026-5999 | 5.3 | MEDIUM | CWE-266 | 0.0% p12 | 3.71 | A vulnerability has been found in JeecgBoot up to 3.9.1. This impacts an unknown...A vulnerability has been found in JeecgBoot up to 3.9.1. This impacts an unknown function of the component SysAnnouncementController. Such manipulation leads to improper authorization. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor confirmed the issue and will provide a fix in the upcoming release. |
2026-04-10 | |
| CVE-2026-33551 | 3.5 | LOW | CWE-863 | 0.0% p5 | 2.45 | An issue was discovered in OpenStack Keystone 14 through 26 before 26.1.1, 27.0....An issue was discovered in OpenStack Keystone 14 through 26 before 26.1.1, 27.0.0, 28.0.0, and 29.0.0. Restricted application credentials can create EC2 credentials. By using a restricted application credential to call the EC2 credential creation API, an authenticated user with only a reader role may obtain an EC2/S3 credential that carries the full set of the parent user's S3 permissions, effectively bypassing the role restrictions imposed on the application credential. Only deployments that use restricted application credentials in combination with the EC2/S3 compatibility API (swift3 / s3api) are affected. |
2026-04-10 | |
| CVE-2026-5998 | 5.5 | MEDIUM | CWE-22 | 0.0% p14 | 3.85 | A flaw has been found in zhayujie chatgpt-on-wechat CowAgent up to 2.0.4. This a...A flaw has been found in zhayujie chatgpt-on-wechat CowAgent up to 2.0.4. This affects the function dispatch of the file agent/memory/service.py of the component API Memory Content Endpoint. This manipulation of the argument filename causes path traversal. The attack can be initiated remotely. The exploit has been published and may be used. Upgrading to version 2.0.5 mitigates this issue. Patch name: 174ee0cafc9e8e9d97a23c305418251485b8aa89. It is recommended to upgrade the affected component. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product. |
2026-04-10 | |
| CVE-2026-5997 | 8.9 | HIGH | CWE-77 | 0.9% p75 | 6.26 | A vulnerability was detected in Totolink A7100RU 7.4cu.2313_b20191024. The impac...A vulnerability was detected in Totolink A7100RU 7.4cu.2313_b20191024. The impacted element is the function setLoginPasswordCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument admpass results in os command injection. It is possible to launch the attack remotely. The exploit is now public and may be used. |
2026-04-10 | |
| CVE-2026-5996 | 8.9 | HIGH | CWE-77 | 0.9% p75 | 6.26 | A security vulnerability has been detected in Totolink A7100RU 7.4cu.2313_b20191...A security vulnerability has been detected in Totolink A7100RU 7.4cu.2313_b20191024. The affected element is the function setAdvancedInfoShow of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument tty_server leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used. |
2026-04-10 | |
| CVE-2026-4977 | 4.3 | MEDIUM | CWE-862 | 0.0% p8 | 3.01 | The UsersWP – Front-end login form, User Registration, User Profile & Members Di...The UsersWP – Front-end login form, User Registration, User Profile & Members Directory plugin for WordPress is vulnerable to Improper Access Control in all versions up to, and including, 1.2.58 This is due to insufficient field-level permission validation in the upload_file_remove() AJAX handler where the $htmlvar parameter is not validated against a whitelist of allowed fields or checked against the field's for_admin_use property. This makes it possible for authenticated attackers, with subscriber-level access and above, to clear or reset any restricted usermeta column for their own user record, including fields marked as "For admin use only", bypassing intended field-level access restrictions. |
2026-04-10 | |
| CVE-2026-4664 | 5.3 | MEDIUM | CWE-287 | 0.1% p35 | 3.71 | The Customer Reviews for WooCommerce plugin for WordPress is vulnerable to authe...The Customer Reviews for WooCommerce plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 5.103.0. This is due to the `create_review_permissions_check()` function comparing the user-supplied `key` parameter against the order's `ivole_secret_key` meta value using strict equality (`===`), without verifying that the stored key is non-empty. For orders where no review reminder email has been sent, the `ivole_secret_key` meta is not set, causing `get_meta()` to return an empty string. An attacker can supply `key: ""` to match this empty value and bypass the permission check. This makes it possible for unauthenticated attackers to submit, modify, and inject product reviews on any product — including products not associated with the referenced order — via the REST API endpoint `POST /ivole/v1/review`. Reviews are auto-approved by default since `ivole_enable_moderation` defaults to `"no"`. |
2026-04-10 | |
| CVE-2026-4351 | 8.1 | HIGH | CWE-22 | 0.1% p17 | 5.67 | The Perfmatters plugin for WordPress is vulnerable to arbitrary file overwrite v...The Perfmatters plugin for WordPress is vulnerable to arbitrary file overwrite via path traversal in all versions up to, and including, 2.5.9. This is due to the `PMCS::action_handler()` method processing the bulk action `activate`/`deactivate` handlers without any authorization check or nonce verification. The `$_GET['snippets'][]` values are passed unsanitized to `Snippet::activate()`/`Snippet::deactivate()` which call `Snippet::update()` then `file_put_contents()` with the traversed path. This makes it possible for authenticated attackers, with Subscriber-level access and above, to overwrite arbitrary files on the server with a fixed PHP docblock content, potentially causing denial of service by corrupting critical files like `.htaccess` or `index.php`. |
2026-04-10 | |
| CVE-2026-4305 | 6.1 | MEDIUM | CWE-79 | 0.0% p9 | 4.27 | The Royal WordPress Backup & Restore Plugin plugin for WordPress is vulnerable t...The Royal WordPress Backup & Restore Plugin plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'wpr_pending_template' parameter in all versions up to, and including, 1.0.16 due to insufficient input validation. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick an administrator into performing an action such as clicking on a link. |
2026-04-10 | |
| CVE-2026-4057 | 4.3 | MEDIUM | CWE-862 | 0.0% p8 | 3.01 | The Download Manager plugin for WordPress is vulnerable to unauthorized modifica...The Download Manager plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the `makeMediaPublic()` and `makeMediaPrivate()` functions in all versions up to, and including, 3.3.51. This is due to the functions only checking for `edit_posts` capability without verifying post ownership via `current_user_can('edit_post', $id)`, and the destructive operations executing before the admin-level check in `mediaAccessControl()`. This makes it possible for authenticated attackers, with Contributor-level access and above, to strip all protection metadata (password, access restrictions, private flag) from any media file they do not own, making admin-protected files publicly accessible via their direct URL. |
2026-04-10 | |
| CVE-2026-3360 | 7.5 | HIGH | CWE-862 | 0.1% p27 | 5.25 | The Tutor LMS – eLearning and online course solution plugin for WordPress is vul...The Tutor LMS – eLearning and online course solution plugin for WordPress is vulnerable to an Insecure Direct Object Reference in all versions up to, and including, 3.9.7. This is due to missing authentication and authorization checks in the `pay_incomplete_order()` function. The function accepts an attacker-controlled `order_id` parameter and uses it to look up order data, then writes billing fields to the order owner's profile (`$order_data->user_id`) without verifying the requester's identity or ownership. Because the Tutor nonce (`_tutor_nonce`) is exposed on public frontend pages, this makes it possible for unauthenticated attackers to overwrite the billing profile (name, email, phone, address) of any user who has an incomplete manual order, by sending a crafted POST request with a guessed or enumerated `order_id`. |
2026-04-10 | |
| CVE-2026-2712 | 5.4 | MEDIUM | CWE-863 | 0.0% p11 | 3.78 | The WP-Optimize plugin for WordPress is vulnerable to unauthorized access of fun...The WP-Optimize plugin for WordPress is vulnerable to unauthorized access of functionality due to missing capability checks in the `receive_heartbeat()` function in `includes/class-wp-optimize-heartbeat.php` in all versions up to, and including, 4.5.0. This is due to the Heartbeat handler directly invoking `Updraft_Smush_Manager_Commands` methods without verifying user capabilities, nonce tokens, or the allowed commands whitelist that the normal AJAX handler (`updraft_smush_ajax`) enforces. This makes it possible for authenticated attackers, with Subscriber-level access and above, to invoke admin-only Smush operations including reading log files (`get_smush_logs`), deleting all backup images (`clean_all_backup_images`), triggering bulk image processing (`process_bulk_smush`), and modifying Smush options (`update_smush_options`). |
2026-04-10 | |
| CVE-2026-1924 | 4.3 | MEDIUM | CWE-352 | 0.0% p3 | 3.01 | The Aruba HiSpeed Cache plugin for WordPress is vulnerable to Cross-Site Request...The Aruba HiSpeed Cache plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.0.4. This is due to missing nonce verification on the `ahsc_ajax_reset_options()` function. This makes it possible for unauthenticated attackers to reset all plugin settings to their default values via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. |
2026-04-10 | |
| CVE-2026-1263 | 6.4 | MEDIUM | CWE-79 | 0.0% p10 | 4.48 | The Webling plugin for WordPress is vulnerable to Stored Cross-Site Scripting in...The Webling plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 3.9.0 due to insufficient input sanitization, insufficient output escaping, and missing capabilities checks in the 'webling_admin_save_form' and 'webling_admin_save_memberlist' functions. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject Webling forms and memberlists with arbitrary web scripts that will execute whenever an administrator views the related form or memberlist area of the WordPress admin. |
2026-04-10 | |
| CVE-2026-5995 | 8.9 | HIGH | CWE-77 | 0.9% p75 | 6.26 | A weakness has been identified in Totolink A7100RU 7.4cu.2313_b20191024. Impacte...A weakness has been identified in Totolink A7100RU 7.4cu.2313_b20191024. Impacted is the function setMiniuiHomeInfoShow of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Executing a manipulation of the argument lan_info can lead to os command injection. The attack may be performed from remote. The exploit has been made available to the public and could be used for attacks. |
2026-04-10 | |
| CVE-2026-5994 | 8.9 | HIGH | CWE-77 | 0.9% p75 | 6.26 | A security flaw has been discovered in Totolink A7100RU 7.4cu.2313_b20191024. Th...A security flaw has been discovered in Totolink A7100RU 7.4cu.2313_b20191024. This issue affects the function setTelnetCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Performing a manipulation of the argument telnet_enabled results in os command injection. The attack is possible to be carried out remotely. The exploit has been released to the public and may be used for attacks. |
2026-04-10 | |
| CVE-2026-5993 | 8.9 | HIGH | CWE-77 | 0.9% p75 | 6.26 | A vulnerability was identified in Totolink A7100RU 7.4cu.2313_b20191024. This vu...A vulnerability was identified in Totolink A7100RU 7.4cu.2313_b20191024. This vulnerability affects the function setWiFiGuestCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Such manipulation of the argument wifiOff leads to os command injection. The attack can be executed remotely. The exploit is publicly available and might be used. |
2026-04-10 | |
| CVE-2026-5992 | 7.4 | HIGH | CWE-119 | 0.0% p14 | 5.18 | A vulnerability was determined in Tenda F451 1.0.0.7. This affects the function ...A vulnerability was determined in Tenda F451 1.0.0.7. This affects the function fromP2pListFilter of the file /goform/P2pListFilter. This manipulation of the argument page causes stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been publicly disclosed and may be utilized. |
2026-04-10 | |
| CVE-2026-5991 | 7.4 | HIGH | CWE-119 | 0.0% p14 | 5.18 | A vulnerability was found in Tenda F451 1.0.0.7. Affected by this issue is the f...A vulnerability was found in Tenda F451 1.0.0.7. Affected by this issue is the function formWrlExtraSet of the file /goform/WrlExtraSet. The manipulation of the argument GO results in stack-based buffer overflow. The attack may be launched remotely. The exploit has been made public and could be used. |
2026-04-10 | |
| CVE-2026-5990 | 7.4 | HIGH | CWE-119 | 0.0% p14 | 5.18 | A vulnerability has been found in Tenda F451 1.0.0.7. Affected by this vulnerabi...A vulnerability has been found in Tenda F451 1.0.0.7. Affected by this vulnerability is the function fromSafeEmailFilter of the file /goform/SafeEmailFilter. The manipulation of the argument page leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. |
2026-04-10 | |
| CVE-2026-5989 | 7.4 | HIGH | CWE-119 | 0.0% p14 | 5.18 | A flaw has been found in Tenda F451 1.0.0.7. Affected is the function fromRouteS...A flaw has been found in Tenda F451 1.0.0.7. Affected is the function fromRouteStatic of the file /goform/RouteStatic. Executing a manipulation of the argument page can lead to stack-based buffer overflow. The attack can be launched remotely. The exploit has been published and may be used. |
2026-04-10 | |
| CVE-2026-5460 | 6.3 | MEDIUM | CWE-416 | 0.1% p17 | 4.41 | A heap use-after-free exists in wolfSSL's TLS 1.3 post-quantum cryptography (PQC...A heap use-after-free exists in wolfSSL's TLS 1.3 post-quantum cryptography (PQC) hybrid KeyShare processing. In the error handling path of TLSX_KeyShare_ProcessPqcHybridClient() in src/tls.c, the inner function TLSX_KeyShare_ProcessPqcClient_ex() frees a KyberKey object upon encountering an error. The caller then invokes TLSX_KeyShare_FreeAll(), which attempts to call ForceZero() on the already-freed KyberKey, resulting in writes of zero bytes over freed heap memory. |
2026-04-10 | |
| CVE-2026-5448 | 2.3 | LOW | CWE-122 | 0.0% p4 | 1.61 | X.509 date buffer overflow in wolfSSL_X509_notAfter / wolfSSL_X509_notBefore. A ...X.509 date buffer overflow in wolfSSL_X509_notAfter / wolfSSL_X509_notBefore. A buffer overflow may occur when parsing date fields from a crafted X.509 certificate via the compatibility layer API. This is only triggered when calling these two APIs directly from an application, and does not affect TLS or certificate verify operations in wolfSSL. |
2026-04-10 | |
| CVE-2026-5393 | 6.3 | MEDIUM | CWE-125 | 0.0% p12 | 4.41 | Dual-Algorithm CertificateVerify out-of-bounds read. When processing a dual-algo...Dual-Algorithm CertificateVerify out-of-bounds read. When processing a dual-algorithm CertificateVerify message, an out-of-bounds read can occur on crafted input. This can only occur when --enable-experimental and --enable-dual-alg-certs is used when building wolfSSL. |
2026-04-10 | |
| CVE-2026-5392 | 2.3 | LOW | CWE-125 | 0.0% p3 | 1.61 | Heap out-of-bounds read in PKCS7 parsing. A crafted PKCS7 message can trigger an...Heap out-of-bounds read in PKCS7 parsing. A crafted PKCS7 message can trigger an OOB read on the heap. The missing bounds check is in the indefinite-length end-of-content verification loop in PKCS7_VerifySignedData(). |
2026-04-10 | |
| CVE-2026-5988 | 7.4 | HIGH | CWE-119 | 0.0% p14 | 5.18 | A vulnerability was detected in Tenda F451 1.0.0.7. This impacts the function fo...A vulnerability was detected in Tenda F451 1.0.0.7. This impacts the function formWrlsafeset of the file /goform/AdvSetWrlsafeset. Performing a manipulation of the argument mit_ssid results in stack-based buffer overflow. The attack can be initiated remotely. The exploit is now public and may be used. |
2026-04-09 | |
| CVE-2026-5987 | 5.1 | MEDIUM | CWE-791 | 0.1% p17 | 3.57 | A security vulnerability has been detected in Sanluan PublicCMS up to 6.202506.d...A security vulnerability has been detected in Sanluan PublicCMS up to 6.202506.d. This affects the function AbstractFreemarkerView.doRender of the file publiccms-parent/publiccms-core/src/main/java/com/publiccms/common/base/AbstractFreemarkerView.java of the component FreeMarker Template Handler. Such manipulation leads to improper neutralization of special elements used in a template engine. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report but has not responded yet. |
2026-04-09 | |
| CVE-2026-5986 | 5.5 | MEDIUM | CWE-400 | 0.1% p17 | 3.85 | A weakness has been identified in Zod jsVideoUrlParser up to 0.5.1. The impacted...A weakness has been identified in Zod jsVideoUrlParser up to 0.5.1. The impacted element is the function getTime in the library lib/util.js. This manipulation of the argument timestamp causes inefficient regular expression complexity. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be used for attacks. The project was informed of the problem early through an issue report but has not responded yet. |
2026-04-09 | |
| CVE-2026-5985 | 6.9 | MEDIUM | CWE-74 | 0.0% p11 | 4.83 | A security flaw has been discovered in code-projects Simple IT Discussion Forum ...A security flaw has been discovered in code-projects Simple IT Discussion Forum 1.0. The affected element is an unknown function of the file /crud.php. The manipulation of the argument user_Id results in sql injection. The attack may be performed from remote. The exploit has been released to the public and may be used for attacks. |
2026-04-09 | |
| CVE-2026-5507 | 4.1 | MEDIUM | CWE-502 | 0.0% p5 | 2.87 | When restoring a session from cache, a pointer from the serialized session data ...When restoring a session from cache, a pointer from the serialized session data is used in a free operation without validation. An attacker who can poison the session cache could trigger an arbitrary free. Exploitation requires the ability to inject a crafted session into the cache and for the application to call specific session restore APIs. |
2026-04-09 | |
| CVE-2026-5504 | 6.3 | MEDIUM | CWE-354 | 0.0% p6 | 4.41 | A padding oracle exists in wolfSSL's PKCS7 CBC decryption that could allow an at...A padding oracle exists in wolfSSL's PKCS7 CBC decryption that could allow an attacker to recover plaintext through repeated decryption queries with modified ciphertext. In previous versions of wolfSSL the interior padding bytes are not validated. |
2026-04-09 | |
| CVE-2026-5503 | 6.9 | MEDIUM | CWE-787 | 0.1% p17 | 4.83 | In TLSX_EchChangeSNI, the ctx->extensions branch set extensions unconditionally ...In TLSX_EchChangeSNI, the ctx->extensions branch set extensions unconditionally even when TLSX_Find returned NULL. This caused TLSX_UseSNI to attach the attacker-controlled publicName to the shared WOLFSSL_CTX when no inner SNI was configured. TLSX_EchRestoreSNI then failed to clean it up because its removal was gated on serverNameX != NULL. The inner ClientHello was sized before the pollution but written after it, causing TLSX_SNI_Write to memcpy 255 bytes past the allocation boundary. |
2026-04-09 | |
| CVE-2026-5295 | 5.9 | MEDIUM | CWE-121 | 0.0% p5 | 4.13 | A stack buffer overflow exists in wolfSSL's PKCS7 implementation in the wc_PKCS7...A stack buffer overflow exists in wolfSSL's PKCS7 implementation in the wc_PKCS7_DecryptOri() function in wolfcrypt/src/pkcs7.c. When processing a CMS EnvelopedData message containing an OtherRecipientInfo (ORI) recipient, the function copies an ASN.1-parsed OID into a fixed 32-byte stack buffer (oriOID[MAX_OID_SZ]) via XMEMCPY without first validating that the parsed OID length does not exceed MAX_OID_SZ. A crafted CMS EnvelopedData message with an ORI recipient containing an OID longer than 32 bytes triggers a stack buffer overflow. Exploitation requires the library to be built with --enable-pkcs7 (disabled by default) and the application to have registered an ORI decrypt callback via wc_PKCS7_SetOriDecryptCb(). |
2026-04-09 | |
| CVE-2026-34424 | 9.3 | CRITICAL | CWE-506 | 0.2% p39 | 6.52 | Smart Slider 3 Pro version 3.5.1.35 for WordPress and Joomla contains a multi-st...Smart Slider 3 Pro version 3.5.1.35 for WordPress and Joomla contains a multi-stage remote access toolkit injected through a compromised update system that allows unauthenticated attackers to execute arbitrary code and commands. Attackers can trigger pre-authentication remote shell execution via HTTP headers, establish authenticated backdoors accepting arbitrary PHP code or OS commands, create hidden administrator accounts, exfiltrate credentials and access keys, and maintain persistence through multiple injection points including must-use plugins and core file modifications. |
2026-04-09 | |
| CVE-2026-5984 | 7.4 | HIGH | CWE-119 | 0.0% p5 | 5.18 | A vulnerability was identified in D-Link DIR-605L 2.13B01. Impacted is the funct...A vulnerability was identified in D-Link DIR-605L 2.13B01. Impacted is the function formSetLog of the file /goform/formSetLog of the component POST Request Handler. The manipulation of the argument curTime leads to buffer overflow. The attack is possible to be carried out remotely. The exploit is publicly available and might be used. This vulnerability only affects products that are no longer supported by the maintainer. |
2026-04-09 | |
| CVE-2026-5983 | 7.4 | HIGH | CWE-119 | 0.1% p15 | 5.18 | A vulnerability was determined in D-Link DIR-605L 2.13B01. This issue affects th...A vulnerability was determined in D-Link DIR-605L 2.13B01. This issue affects the function formSetDDNS of the file /goform/formSetDDNS of the component POST Request Handler. Executing a manipulation of the argument curTime can lead to buffer overflow. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized. This vulnerability only affects products that are no longer supported by the maintainer. |
2026-04-09 | |
| CVE-2026-5982 | 7.4 | HIGH | CWE-119 | 0.1% p15 | 5.18 | A vulnerability was found in D-Link DIR-605L 2.13B01. This vulnerability affects...A vulnerability was found in D-Link DIR-605L 2.13B01. This vulnerability affects the function formAdvNetwork of the file /goform/formAdvNetwork of the component POST Request Handler. Performing a manipulation of the argument curTime results in buffer overflow. Remote exploitation of the attack is possible. The exploit has been made public and could be used. This vulnerability only affects products that are no longer supported by the maintainer. |
2026-04-09 | |
| CVE-2026-5981 | 7.4 | HIGH | CWE-119 | 0.1% p15 | 5.18 | A vulnerability has been found in D-Link DIR-605L 2.13B01. This affects the func...A vulnerability has been found in D-Link DIR-605L 2.13B01. This affects the function formAdvFirewall of the file /goform/formAdvFirewall of the component POST Request Handler. Such manipulation of the argument curTime leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer. |
2026-04-09 | |
| CVE-2026-5778 | 2.1 | LOW | CWE-191 | 0.1% p18 | 1.47 | Integer underflow in wolfSSL packet sniffer <= 5.9.0 allows an attacker to cause...Integer underflow in wolfSSL packet sniffer <= 5.9.0 allows an attacker to cause a program crash in the AEAD decryption path by injecting a TLS record shorter than the explicit IV plus authentication tag into traffic inspected by ssl_DecodePacket. The underflow wraps a 16-bit length to a large value that is passed to AEAD decryption routines, causing a large out-of-bounds read and crash. An unauthenticated attacker can trigger this remotely via malformed TLS Application Data records. |
2026-04-09 | |
| CVE-2026-5772 | 2.1 | LOW | CWE-126 | 0.0% p14 | 1.47 | A 1-byte stack buffer over-read was identified in the MatchDomainName function (...A 1-byte stack buffer over-read was identified in the MatchDomainName function (src/internal.c) during wildcard hostname validation when the LEFT_MOST_WILDCARD_ONLY flag is active. If a wildcard * exhausts the entire hostname string, the function reads one byte past the buffer without a bounds check, which could cause a crash. |
2026-04-09 | |
| CVE-2026-5264 | 8.3 | HIGH | CWE-122 | 0.2% p47 | 5.82 | Heap buffer overflow in DTLS 1.3 ACK message processing. A remote attacker can s...Heap buffer overflow in DTLS 1.3 ACK message processing. A remote attacker can send a crafted DTLS 1.3 ACK message that triggers a heap buffer overflow. |
2026-04-09 | |
| CVE-2026-5263 | 7.0 | HIGH | CWE-295 | 0.0% p7 | 4.90 | URI nameConstraints from constrained intermediate CAs are parsed but not enforce...URI nameConstraints from constrained intermediate CAs are parsed but not enforced during certificate chain verification in wolfcrypt/src/asn.c. A compromised or malicious sub-CA could issue leaf certificates with URI SAN entries that violate the nameConstraints of the issuing CA, and wolfSSL would accept them as valid. |
2026-04-09 | |
| CVE-2026-40154 | 9.3 | CRITICAL | CWE-829 | 0.0% p9 | 6.51 | PraisonAI is a multi-agent teams system. Prior to 4.5.128, PraisonAI treats remo...PraisonAI is a multi-agent teams system. Prior to 4.5.128, PraisonAI treats remotely fetched template files as trusted executable code without integrity verification, origin validation, or user confirmation, enabling supply chain attacks through malicious templates. This vulnerability is fixed in 4.5.128. |
2026-04-09 | |
| CVE-2026-40153 | 7.4 | HIGH | CWE-526 | 0.0% p9 | 5.18 | PraisonAIAgents is a multi-agent teams system. Prior to 1.5.128, the execute_com...PraisonAIAgents is a multi-agent teams system. Prior to 1.5.128, the execute_command function in shell_tools.py calls os.path.expandvars() on every command argument at line 64, manually re-implementing shell-level environment variable expansion despite using shell=False (line 88) for security. This allows exfiltration of secrets stored in environment variables (database credentials, API keys, cloud access keys). The approval system displays the unexpanded $VAR references to human reviewers, creating a deceptive approval where the displayed command differs from what actually executes. This vulnerability is fixed in 1.5.128. |
2026-04-09 | |
| CVE-2026-40152 | 5.3 | MEDIUM | CWE-22 | 0.1% p19 | 3.71 | PraisonAIAgents is a multi-agent teams system. Prior to 1.5.128, he list_files()...PraisonAIAgents is a multi-agent teams system. Prior to 1.5.128, he list_files() tool in FileTools validates the directory parameter against workspace boundaries via _validate_path(), but passes the pattern parameter directly to Path.glob() without any validation. Since Python's Path.glob() supports .. path segments, an attacker can use relative path traversal in the glob pattern to enumerate arbitrary files outside the workspace, obtaining file metadata (existence, name, size, timestamps) for any path on the filesystem. This vulnerability is fixed in 1.5.128. |
2026-04-09 | |
| CVE-2026-40151 | 5.3 | MEDIUM | CWE-200 | 0.0% p12 | 3.71 | PraisonAI is a multi-agent teams system. Prior to 4.5.128, the AgentOS deploymen...PraisonAI is a multi-agent teams system. Prior to 4.5.128, the AgentOS deployment platform exposes a GET /api/agents endpoint that returns agent names, roles, and the first 100 characters of agent system instructions to any unauthenticated caller. The AgentOS FastAPI application has no authentication middleware, no API key validation, and defaults to CORS allow_origins=["*"] with host="0.0.0.0", making every deployment network-accessible and queryable from any origin by default. This vulnerability is fixed in 4.5.128. |
2026-04-09 | |
| CVE-2026-40150 | 7.7 | HIGH | CWE-918 | 0.0% p8 | 5.39 | PraisonAIAgents is a multi-agent teams system. Prior to 1.5.128, the web_crawl()...PraisonAIAgents is a multi-agent teams system. Prior to 1.5.128, the web_crawl() function in praisonaiagents/tools/web_crawl_tools.py accepts arbitrary URLs from AI agents with zero validation. No scheme allowlisting, hostname/IP blocklisting, or private network checks are applied before fetching. This allows an attacker (or prompt injection in crawled content) to force the agent to fetch cloud metadata endpoints, internal services, or local files via file:// URLs. This vulnerability is fixed in 1.5.128. |
2026-04-09 | |
| CVE-2026-40149 | 7.9 | HIGH | CWE-396 | 0.0% p3 | 5.53 | PraisonAI is a multi-agent teams system. Prior to 4.5.128, the gateway's /api/ap...PraisonAI is a multi-agent teams system. Prior to 4.5.128, the gateway's /api/approval/allow-list endpoint permits unauthenticated modification of the tool approval allowlist when no auth_token is configured (the default). By adding dangerous tool names (e.g., shell_exec, file_write) to the allowlist, an attacker can cause the ExecApprovalManager to auto-approve all future agent invocations of those tools, bypassing the human-in-the-loop safety mechanism that the approval system is specifically designed to enforce. This vulnerability is fixed in 4.5.128. |
2026-04-09 | |
| CVE-2026-40148 | 6.5 | MEDIUM | CWE-409 | 0.0% p10 | 4.55 | PraisonAI is a multi-agent teams system. Prior to 4.5.128, the _safe_extractall(...PraisonAI is a multi-agent teams system. Prior to 4.5.128, the _safe_extractall() function in PraisonAI's recipe registry validates archive members against path traversal attacks but performs no checks on individual member sizes, cumulative extracted size, or member count before calling tar.extractall(). An attacker can publish a malicious recipe bundle containing highly compressible data (e.g., 10GB of zeros compressing to ~10MB) that exhausts the victim's disk when pulled via LocalRegistry.pull() or HttpRegistry.pull(). This vulnerability is fixed in 4.5.128. |
2026-04-09 | |
| CVE-2026-40117 | 6.2 | MEDIUM | CWE-862 | 0.0% p5 | 4.34 | PraisonAIAgents is a multi-agent teams system. Prior to 1.5.128, read_skill_file...PraisonAIAgents is a multi-agent teams system. Prior to 1.5.128, read_skill_file() in skill_tools.py allows reading arbitrary files from the filesystem by accepting an unrestricted skill_path parameter. Unlike file_tools.read_file which enforces workspace boundary confinement, and unlike run_skill_script which requires critical-level approval, read_skill_file has neither protection. An agent influenced by prompt injection can exfiltrate sensitive files without triggering any approval prompt. This vulnerability is fixed in 1.5.128. |
2026-04-09 | |
| CVE-2026-40116 | 7.5 | HIGH | CWE-770 | 0.0% p12 | 5.25 | PraisonAI is a multi-agent teams system. Prior to 4.5.128, the /media-stream Web...PraisonAI is a multi-agent teams system. Prior to 4.5.128, the /media-stream WebSocket endpoint in PraisonAI's call module accepts connections from any client without authentication or Twilio signature validation. Each connection opens an authenticated session to OpenAI's Realtime API using the server's API key. There are no limits on concurrent connections, message rate, or message size, allowing an unauthenticated attacker to exhaust server resources and drain the victim's OpenAI API credits. This vulnerability is fixed in 4.5.128. |
2026-04-09 | |
| CVE-2026-40115 | 6.2 | MEDIUM | CWE-770 | 0.0% p6 | 4.34 | PraisonAI is a multi-agent teams system. Prior to 4.5.128, the WSGI-based recipe...PraisonAI is a multi-agent teams system. Prior to 4.5.128, the WSGI-based recipe registry server (server.py) reads the entire HTTP request body into memory based on the client-supplied Content-Length header with no upper bound. Combined with authentication being disabled by default (no token configured), any local process can send arbitrarily large POST requests to exhaust server memory and cause a denial of service. The Starlette-based server (serve.py) has RequestSizeLimitMiddleware with a 10MB limit, but the WSGI server lacks any equivalent protection. This vulnerability is fixed in 4.5.128. |
2026-04-09 | |
| CVE-2026-40114 | 7.2 | HIGH | CWE-918 | 0.0% p10 | 5.04 | PraisonAI is a multi-agent teams system. Prior to 4.5.128, the /api/v1/runs endp...PraisonAI is a multi-agent teams system. Prior to 4.5.128, the /api/v1/runs endpoint accepts an arbitrary webhook_url in the request body with no URL validation. When a submitted job completes (success or failure), the server makes an HTTP POST request to this URL using httpx.AsyncClient. An unauthenticated attacker can use this to make the server send POST requests to arbitrary internal or external destinations, enabling SSRF against cloud metadata services, internal APIs, and other network-adjacent services. This vulnerability is fixed in 4.5.128. |
2026-04-09 | |
| CVE-2026-40112 | 5.4 | MEDIUM | CWE-79 | 0.0% p8 | 3.78 | PraisonAI is a multi-agent teams system. Prior to 4.5.128, the Flask API endpoin...PraisonAI is a multi-agent teams system. Prior to 4.5.128, the Flask API endpoint in src/praisonai/api.py renders agent output as HTML without effective sanitization. The _sanitize_html function relies on the nh3 library, which is not listed as a required or optional dependency in pyproject.toml. When nh3 is absent (the default installation), the sanitizer is a no-op that returns HTML unchanged. An attacker who can influence agent input (via RAG data poisoning, web scraping results, or prompt injection) can inject arbitrary JavaScript that executes in the browser of anyone viewing the API output. This vulnerability is fixed in 4.5.128. |
2026-04-09 | |
| CVE-2026-40111 | 9.3 | CRITICAL | CWE-78 | 0.0% p6 | 6.51 | PraisonAIAgents is a multi-agent teams system. Prior to 1.5.128, he memory hooks...PraisonAIAgents is a multi-agent teams system. Prior to 1.5.128, he memory hooks executor in praisonaiagents passes a user-controlled command string directly to subprocess.run() with shell=True at src/praisonai-agents/praisonaiagents/memory/hooks.py. No sanitization is performed and shell metacharacters are interpreted by /bin/sh before the intended command executes. Two independent attack surfaces exist. The first is via pre_run_command and post_run_command hook event types registered through the hooks configuration. The second and more severe surface is the .praisonai/hooks.json lifecycle configuration, where hooks registered for events such as BEFORE_TOOL and AFTER_TOOL fire automatically during agent operation. An agent that gains file-write access through prompt injection can overwrite .praisonai/hooks.json and have its payload execute silently at every subsequent lifecycle event without further user interaction. This vulnerability is fixed in 1.5.128. |
2026-04-09 | |
| CVE-2026-39848 | 6.5 | MEDIUM | CWE-306 | 0.0% p13 | 4.55 | Dockyard is a Docker container management app. Prior to 1.1.0, Docker container ...Dockyard is a Docker container management app. Prior to 1.1.0, Docker container start and stop operations are performed through GET requests without CSRF protection. A remote attacker can cause a logged-in administrator's browser to request /apps/action.php?action=stop&name=<container> or /apps/action.php?action=start&name=<container>, which starts or stops the target container. This vulnerability is fixed in 1.1.0. |
2026-04-09 | |
| CVE-2026-35646 | 6.3 | MEDIUM | CWE-307 | 0.1% p20 | 4.41 | OpenClaw before 2026.3.25 contains a pre-authentication rate-limit bypass vulner...OpenClaw before 2026.3.25 contains a pre-authentication rate-limit bypass vulnerability in webhook token validation that allows attackers to brute-force weak webhook secrets. The vulnerability exists because invalid webhook tokens are rejected without throttling repeated authentication attempts, enabling attackers to guess weak tokens through rapid successive requests. |
2026-04-09 | |
| CVE-2026-35645 | 6.1 | MEDIUM | CWE-648 | 0.0% p11 | 4.27 | OpenClaw before 2026.3.25 contains a privilege escalation vulnerability in the g...OpenClaw before 2026.3.25 contains a privilege escalation vulnerability in the gateway plugin subagent fallback deleteSession function that uses a synthetic operator.admin runtime scope. Attackers can exploit this by triggering session deletion without a request-scoped client to execute privileged operations with unintended administrative scope. |
2026-04-09 | |
| CVE-2026-35644 | 7.1 | HIGH | CWE-312 | 0.0% p5 | 4.97 | OpenClaw before 2026.3.22 contains an information disclosure vulnerability that ...OpenClaw before 2026.3.22 contains an information disclosure vulnerability that allows attackers with operator.read scope to expose credentials embedded in channel baseUrl and httpUrl fields. Attackers can access gateway snapshots via config.get and channels.status endpoints to retrieve sensitive authentication information from URL userinfo components. |
2026-04-09 | |
| CVE-2026-35642 | 5.3 | MEDIUM | CWE-288 | 0.0% p7 | 3.71 | OpenClaw before 2026.3.25 contains an authorization bypass vulnerability where g...OpenClaw before 2026.3.25 contains an authorization bypass vulnerability where group reaction events bypass the requireMention access control mechanism. Attackers can trigger reactions in mention-gated groups to enqueue agent-visible system events that should remain restricted. |
2026-04-09 | |
| CVE-2026-35640 | 6.9 | MEDIUM | CWE-696 | 0.1% p21 | 4.83 | OpenClaw before 2026.3.25 parses JSON request bodies before validating webhook s...OpenClaw before 2026.3.25 parses JSON request bodies before validating webhook signatures, allowing unauthenticated attackers to force resource-intensive parsing operations. Remote attackers can send malicious webhook requests to trigger denial of service by exhausting server resources through forced JSON parsing before signature rejection. |
2026-04-09 | |
| CVE-2026-35639 | 8.7 | HIGH | CWE-648 | 0.2% p44 | 6.10 | OpenClaw before 2026.3.22 contains a privilege escalation vulnerability in the d...OpenClaw before 2026.3.22 contains a privilege escalation vulnerability in the device.pair.approve method that allows an operator.pairing approver to approve pending device requests with broader operator scopes than the approver actually holds. Attackers can exploit insufficient scope validation to escalate privileges to operator.admin and achieve remote code execution on the Node infrastructure. |
2026-04-09 | |
| CVE-2026-35638 | 8.7 | HIGH | CWE-286 | 0.0% p13 | 6.09 | OpenClaw before 2026.3.22 contains a privilege escalation vulnerability in the C...OpenClaw before 2026.3.22 contains a privilege escalation vulnerability in the Control UI that allows unauthenticated sessions to retain self-declared privileged scopes without device identity verification. Attackers can exploit the device-less allow path in the trusted-proxy mechanism to maintain elevated permissions by declaring arbitrary scopes, bypassing device identity requirements. |
2026-04-09 | |
| CVE-2026-35637 | 6.9 | MEDIUM | CWE-696 | 0.1% p17 | 4.83 | OpenClaw before 2026.3.22 performs cite expansion before completing channel and ...OpenClaw before 2026.3.22 performs cite expansion before completing channel and DM authorization checks, allowing cite work and content handling prior to final auth decisions. Attackers can exploit this timing vulnerability to access or manipulate content before proper authorization validation occurs. |
2026-04-09 | |
| CVE-2026-35636 | 7.1 | HIGH | CWE-696 | 0.0% p9 | 4.97 | OpenClaw versions 2026.3.11 through 2026.3.24 contain a session isolation bypass...OpenClaw versions 2026.3.11 through 2026.3.24 contain a session isolation bypass vulnerability where session_status resolves sessionId to canonical session keys before enforcing visibility checks. Sandboxed child sessions can exploit this to access parent or sibling sessions that should be blocked by explicit sessionKey restrictions. |
2026-04-09 | |
| CVE-2026-35635 | 6.3 | MEDIUM | CWE-706 | 0.0% p11 | 4.41 | OpenClaw before 2026.3.22 contains a webhook path route replacement vulnerabilit...OpenClaw before 2026.3.22 contains a webhook path route replacement vulnerability in the Synology Chat extension that allows attackers to collapse multi-account configurations onto shared webhook paths. Attackers can exploit inherited or duplicate webhook paths to bypass per-account DM access control policies and replace route ownership across accounts. |
2026-04-09 | |
| CVE-2026-35634 | 5.1 | MEDIUM | CWE-288 | 0.0% p8 | 3.57 | OpenClaw before 2026.3.23 contains an authentication bypass vulnerability in the...OpenClaw before 2026.3.23 contains an authentication bypass vulnerability in the Canvas gateway where authorizeCanvasRequest() unconditionally allows local-direct requests without validating bearer tokens or canvas capabilities. Attackers can send unauthenticated loopback HTTP and WebSocket requests to Canvas routes to bypass authentication and gain unauthorized access. |
2026-04-09 | |
| CVE-2026-35633 | 6.9 | MEDIUM | CWE-789 | 0.2% p46 | 4.84 | OpenClaw before 2026.3.22 contains an unbounded memory allocation vulnerability ...OpenClaw before 2026.3.22 contains an unbounded memory allocation vulnerability in remote media HTTP error handling that allows attackers to trigger excessive memory consumption. Attackers can send crafted HTTP error responses with large bodies to remote media endpoints, causing the application to allocate unbounded memory before failure handling occurs. |
2026-04-09 | |
| CVE-2026-35632 | 6.9 | MEDIUM | CWE-61 | 0.1% p20 | 4.83 | OpenClaw through 2026.2.22 contains a symlink traversal vulnerability in agents....OpenClaw through 2026.2.22 contains a symlink traversal vulnerability in agents.create and agents.update handlers that use fs.appendFile on IDENTITY.md without symlink containment checks. Attackers with workspace access can plant symlinks to append attacker-controlled content to arbitrary files, enabling remote code execution via crontab injection or unauthorized access via SSH key manipulation. |
2026-04-09 | |
| CVE-2026-35631 | 7.1 | HIGH | CWE-862 | 0.0% p8 | 4.97 | OpenClaw before 2026.3.22 fails to enforce operator.admin scope on mutating inte...OpenClaw before 2026.3.22 fails to enforce operator.admin scope on mutating internal ACP chat commands, allowing unauthorized modifications. Attackers without admin privileges can execute mutating control-plane actions by directly invoking affected ACP commands to bypass authorization gates. |
2026-04-09 | |
| CVE-2026-35629 | 5.3 | MEDIUM | CWE-918 | 0.0% p11 | 3.71 | OpenClaw before 2026.3.25 contains a server-side request forgery vulnerability i...OpenClaw before 2026.3.25 contains a server-side request forgery vulnerability in multiple channel extensions that fail to properly guard configured base URLs against SSRF attacks. Attackers can exploit unprotected fetch() calls against configured endpoints to rebind requests to blocked internal destinations and access restricted resources. |
2026-04-09 | |
| CVE-2026-35628 | 6.3 | MEDIUM | CWE-307 | 0.0% p13 | 4.41 | OpenClaw before 2026.3.25 contains a missing rate limiting vulnerability in Tele...OpenClaw before 2026.3.25 contains a missing rate limiting vulnerability in Telegram webhook authentication that allows attackers to brute-force weak webhook secrets. The vulnerability enables repeated authentication guesses without throttling, permitting attackers to systematically guess webhook secrets through brute-force attacks. |
2026-04-09 | |
| CVE-2026-35627 | 6.9 | MEDIUM | CWE-696 | 0.1% p26 | 4.83 | OpenClaw before 2026.3.22 performs cryptographic and dispatch operations on inbo...OpenClaw before 2026.3.22 performs cryptographic and dispatch operations on inbound Nostr direct messages before enforcing sender and pairing policy validation. Attackers can trigger unauthorized pre-authentication computation by sending crafted DM messages, enabling denial of service through resource exhaustion. |
2026-04-09 | |
| CVE-2026-35626 | 6.9 | MEDIUM | CWE-405 | 0.1% p23 | 4.83 | OpenClaw before 2026.3.22 contains an unauthenticated resource exhaustion vulner...OpenClaw before 2026.3.22 contains an unauthenticated resource exhaustion vulnerability in voice call webhook handling that buffers request bodies before provider signature checks. Attackers can send large or malicious webhook requests to exhaust server resources without authentication by bypassing signature validation. |
2026-04-09 | |
| CVE-2026-35625 | 8.5 | HIGH | CWE-648 | 0.0% p10 | 5.95 | OpenClaw before 2026.3.25 contains a privilege escalation vulnerability where si...OpenClaw before 2026.3.25 contains a privilege escalation vulnerability where silent local shared-auth reconnects auto-approve scope-upgrade requests, widening paired device permissions from operator.read to operator.admin. Attackers can exploit this by triggering local reconnection to silently escalate privileges and achieve remote code execution on the node. |
2026-04-09 | |
| CVE-2026-35624 | 2.3 | LOW | CWE-807 | 0.1% p17 | 1.61 | OpenClaw before 2026.3.22 contains a policy confusion vulnerability in room auth...OpenClaw before 2026.3.22 contains a policy confusion vulnerability in room authorization that matches colliding room names instead of stable room tokens. Attackers can exploit similarly named rooms to bypass allowlist policies and gain unauthorized access to protected Nextcloud Talk rooms. |
2026-04-09 | |
| CVE-2026-35623 | 6.3 | MEDIUM | CWE-307 | 0.1% p17 | 4.41 | OpenClaw before 2026.3.25 contains a missing rate limiting vulnerability in webh...OpenClaw before 2026.3.25 contains a missing rate limiting vulnerability in webhook authentication that allows attackers to brute-force weak webhook passwords without throttling. Remote attackers can repeatedly submit incorrect password guesses to the webhook endpoint to compromise authentication and gain unauthorized access. |
2026-04-09 | |
| CVE-2026-35622 | 6.0 | MEDIUM | CWE-290 | 0.0% p13 | 4.20 | OpenClaw before 2026.3.22 contains an improper authentication verification vulne...OpenClaw before 2026.3.22 contains an improper authentication verification vulnerability in Google Chat app-url webhook handling that accepts add-on principals outside intended deployment bindings. Attackers can bypass webhook authentication by providing non-deployment add-on principals to execute unauthorized actions through the Google Chat integration. |
2026-04-09 | |
| CVE-2026-35618 | 8.3 | HIGH | CWE-294 | 0.0% p10 | 5.81 | OpenClaw before 2026.3.23 contains a replay identity vulnerability in Plivo V2 s...OpenClaw before 2026.3.23 contains a replay identity vulnerability in Plivo V2 signature verification that allows attackers to bypass replay protection by modifying query parameters. The verification path derives replay keys from the full URL including query strings instead of the canonicalized base URL, enabling attackers to mint new verified request keys through unsigned query-only changes to signed requests. |
2026-04-09 | |
| CVE-2026-35617 | 2.3 | LOW | CWE-807 | 0.1% p16 | 1.61 | OpenClaw before 2026.3.25 contains an authorization bypass vulnerability in Goog...OpenClaw before 2026.3.25 contains an authorization bypass vulnerability in Google Chat group policy enforcement that relies on mutable space display names. Attackers can rebind group policies by changing or colliding space display names to gain unauthorized access to protected resources. |
2026-04-09 | |
| CVE-2026-34512 | 7.2 | HIGH | CWE-863 | 0.0% p11 | 5.04 | OpenClaw before 2026.3.25 contains an improper access control vulnerability in t...OpenClaw before 2026.3.25 contains an improper access control vulnerability in the HTTP /sessions/:sessionKey/kill route that allows any bearer-authenticated user to invoke admin-level session termination functions without proper scope validation. Attackers can exploit this by sending authenticated requests to kill arbitrary subagent sessions via the killSubagentRunAdmin function, bypassing ownership and operator scope restrictions. |
2026-04-09 | |
| CVE-2026-5980 | 7.4 | HIGH | CWE-119 | 0.1% p15 | 5.18 | A flaw has been found in D-Link DIR-605L 2.13B01. Affected by this issue is the ...A flaw has been found in D-Link DIR-605L 2.13B01. Affected by this issue is the function formSetMACFilter of the file /goform/formSetMACFilter of the component POST Request Handler. This manipulation of the argument curTime causes buffer overflow. The attack may be initiated remotely. The exploit has been published and may be used. This vulnerability only affects products that are no longer supported by the maintainer. |
2026-04-09 | |
| CVE-2026-5979 | 7.4 | HIGH | CWE-119 | 0.1% p15 | 5.18 | A vulnerability was detected in D-Link DIR-605L 2.13B01. Affected by this vulner...A vulnerability was detected in D-Link DIR-605L 2.13B01. Affected by this vulnerability is the function formVirtualServ of the file /goform/formVirtualServ of the component POST Request Handler. The manipulation of the argument curTime results in buffer overflow. The attack can be launched remotely. The exploit is now public and may be used. This vulnerability only affects products that are no longer supported by the maintainer. |
2026-04-09 | |
| CVE-2026-5978 | 8.9 | HIGH | CWE-77 | 1.3% p79 | 6.27 | A security vulnerability has been detected in Totolink A7100RU 7.4cu.2313_b20191...A security vulnerability has been detected in Totolink A7100RU 7.4cu.2313_b20191024. Affected is the function setWiFiAclRules of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument mode leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used. |
2026-04-09 | |
| CVE-2026-5977 | 8.9 | HIGH | CWE-77 | 1.3% p79 | 6.27 | A weakness has been identified in Totolink A7100RU 7.4cu.2313_b20191024. This im...A weakness has been identified in Totolink A7100RU 7.4cu.2313_b20191024. This impacts the function setWiFiBasicCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Executing a manipulation of the argument wifiOff can lead to os command injection. It is possible to launch the attack remotely. The exploit has been made available to the public and could be used for attacks. |
2026-04-09 | |
| CVE-2026-5447 | 6.3 | MEDIUM | CWE-122 | 0.0% p12 | 4.41 | Heap buffer overflow in CertFromX509 via AuthorityKeyIdentifier size confusion. ...Heap buffer overflow in CertFromX509 via AuthorityKeyIdentifier size confusion. A heap buffer overflow occurs when converting an X.509 certificate internally due to incorrect size handling of the AuthorityKeyIdentifier extension. |
2026-04-09 | |
| CVE-2026-5446 | 6.0 | MEDIUM | CWE-323 | 0.0% p14 | 4.20 | In wolfSSL, ARIA-GCM cipher suites used in TLS 1.2 and DTLS 1.2 reuse an identic...In wolfSSL, ARIA-GCM cipher suites used in TLS 1.2 and DTLS 1.2 reuse an identical 12-byte GCM nonce for every application-data record. Because wc_AriaEncrypt is stateless and passes the caller-supplied IV verbatim to the MagicCrypto SDK with no internal counter, and because the explicit IV is zero-initialized at session setup and never incremented in non-FIPS builds. This vulnerability affects wolfSSL builds configured with --enable-aria and the proprietary MagicCrypto SDK (a non-default, opt-in configuration required for Korean regulatory deployments). AES-GCM is not affected because wc_AesGcmEncrypt_ex maintains an internal invocation counter independently of the call-site guard. |
2026-04-09 | |
| CVE-2026-40109 | 3.1 | LOW | CWE-287 | 0.0% p1 | 2.17 | Flux notification-controller is the event forwarder and notification dispatcher ...Flux notification-controller is the event forwarder and notification dispatcher for the GitOps Toolkit controllers. Prior to 1.8.3, the gcr Receiver type in Flux notification-controller does not validate the email claim of Google OIDC tokens used for Pub/Sub push authentication. This allows any valid Google-issued token, to authenticate against the Receiver webhook endpoint, triggering unauthorized Flux reconciliations. Exploitation requires the attacker to know the Receiver's webhook URL. The webhook path is generated as /hook/sha256sum(token+name+namespace), where the token is a random string stored in a Kubernetes Secret. There is no API or endpoint that enumerates webhook URLs. An attacker cannot discover the path without either having access to the cluster and permissions to read the Receiver's .status.webhookPath in the target namespace, or obtaining the URL through other means (e.g. leaked secrets or access to Pub/Sub config). Upon successful authentication, the controller triggers a reconciliation for all resources listed in the Receiver's .spec.resources. However, the practical impact is limited: Flux reconciliation is idempotent, so if the desired state in the configured sources (Git, OCI, Helm) has not changed, the reconciliation results in a no-op with no effect on cluster state. Additionally, Flux controllers deduplicate reconciliation requests, sending many requests in a short period results in only a single reconciliation being processed. This vulnerability is fixed in 1.8.3. |
2026-04-09 | |
| CVE-2026-40107 | 8.7 | HIGH | CWE-918 | 0.1% p18 | 6.09 | SiYuan is a personal knowledge management system. Prior to 3.6.4, SiYuan configu...SiYuan is a personal knowledge management system. Prior to 3.6.4, SiYuan configures Mermaid.js with securityLevel: "loose" and htmlLabels: true. In this mode, <img> tags with src attributes survive Mermaid's internal DOMPurify and land in SVG <foreignObject> blocks. The SVG is injected via innerHTML with no secondary sanitization. When a victim opens a note containing a malicious Mermaid diagram, the Electron client fetches the URL. On Windows, a protocol-relative URL (//attacker.com/image.png) resolves as a UNC path (\\attacker.com\image.png). Windows attempts SMB authentication automatically, sending the victim's NTLMv2 hash to the attacker. This vulnerability is fixed in 3.6.4. |
2026-04-09 | |
| CVE-2026-40093 | 8.1 | HIGH | CWE-1284 | 0.1% p20 | 5.67 | nimiq-blockchain provides persistent block storage for Nimiq's Rust implementati...nimiq-blockchain provides persistent block storage for Nimiq's Rust implementation. In 1.3.0 and earlier, block timestamp validation enforces that timestamp >= parent.timestamp for non-skip blocks and timestamp == parent.timestamp + MIN_PRODUCER_TIMEOUT for skip blocks, but there is no visible upper bound check against the wall clock. A malicious block-producing validator can set block timestamps arbitrarily far in the future. This directly affects reward calculations via Policy::supply_at() and batch_delay() in blockchain/src/reward.rs, inflating the monetary supply beyond the intended emission schedule. |
2026-04-09 | |
| CVE-2026-35206 | 4.8 | MEDIUM | CWE-22 | 0.0% p4 | 3.36 | Helm is a package manager for Charts for Kubernetes. In Helm versions <=3.20.1 a...Helm is a package manager for Charts for Kubernetes. In Helm versions <=3.20.1 and <=4.1.3, a specially crafted Chart will cause helm pull --untar [chart URL | repo/chartname] to write the Chart's contents to the immediate output directory (as defaulted to the current working directory; or as given by the --destination and --untardir flags), rather than the expected output directory suffixed by the chart's name. This vulnerability is fixed in 3.20.2 and 4.1.4. |
2026-04-09 | |
| CVE-2023-54364 | 5.1 | MEDIUM | CWE-79 | 0.1% p20 | 3.57 | Joomla HikaShop 4.7.4 contains a reflected cross-site scripting vulnerability th...Joomla HikaShop 4.7.4 contains a reflected cross-site scripting vulnerability that allows unauthenticated attackers to inject malicious scripts by manipulating GET parameters in the product filter endpoint. Attackers can craft malicious URLs containing XSS payloads in the from_option, from_ctrl, from_task, or from_itemid parameters to steal session tokens or login credentials when victims visit the link. |
2026-04-09 | |
| CVE-2023-54363 | 5.1 | MEDIUM | CWE-79 | 0.1% p20 | 3.57 | Joomla Solidres 2.13.3 contains a reflected cross-site scripting vulnerability t...Joomla Solidres 2.13.3 contains a reflected cross-site scripting vulnerability that allows unauthenticated attackers to inject malicious scripts by manipulating multiple GET parameters including show, reviews, type_id, distance, facilities, categories, prices, location, and Itemid. Attackers can craft malicious URLs containing JavaScript payloads in these parameters to steal session tokens, login credentials, or manipulate site content when victims visit the crafted links. |
2026-04-09 | |
| CVE-2023-54362 | 5.1 | MEDIUM | CWE-79 | 0.0% p9 | 3.57 | Joomla VirtueMart Shopping-Cart 4.0.12 contains a reflected cross-site scripting...Joomla VirtueMart Shopping-Cart 4.0.12 contains a reflected cross-site scripting vulnerability that allows attackers to inject malicious scripts by manipulating the keyword parameter. Attackers can craft malicious URLs containing script payloads in the keyword parameter of the product-variants endpoint to execute arbitrary JavaScript in victim browsers and steal session tokens or credentials. |
2026-04-09 | |
| CVE-2023-54361 | 5.1 | MEDIUM | CWE-79 | 0.0% p11 | 3.57 | Joomla iProperty Real Estate 4.1.1 contains a reflected cross-site scripting vul...Joomla iProperty Real Estate 4.1.1 contains a reflected cross-site scripting vulnerability that allows attackers to inject malicious scripts by manipulating the filter_keyword parameter. Attackers can craft URLs containing JavaScript payloads in the filter_keyword GET parameter of the all-properties-with-map endpoint to execute arbitrary code in victim browsers and steal session tokens or credentials. |
2026-04-09 | |
| CVE-2023-54360 | 5.1 | MEDIUM | CWE-79 | 0.0% p9 | 3.57 | Joomla JLex Review 6.0.1 contains a reflected cross-site scripting vulnerability...Joomla JLex Review 6.0.1 contains a reflected cross-site scripting vulnerability that allows attackers to inject malicious scripts by manipulating the review_id URL parameter. Attackers can craft malicious links containing JavaScript payloads that execute in victims' browsers when clicked, enabling session hijacking or credential theft. |
2026-04-09 | |
| CVE-2023-54359 | 8.8 | HIGH | CWE-89 | 0.1% p24 | 6.16 | WordPress adivaha Travel Plugin 2.3 contains a time-based blind SQL injection vu...WordPress adivaha Travel Plugin 2.3 contains a time-based blind SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the 'pid' GET parameter. Attackers can send requests to the /mobile-app/v3/ endpoint with crafted 'pid' values using XOR-based payloads to extract sensitive database information or cause denial of service. |
2026-04-09 | |
| CVE-2023-54358 | 5.1 | MEDIUM | CWE-79 | 0.1% p24 | 3.57 | WordPress adivaha Travel Plugin 2.3 contains a reflected cross-site scripting vu...WordPress adivaha Travel Plugin 2.3 contains a reflected cross-site scripting vulnerability that allows unauthenticated attackers to inject malicious scripts by manipulating the isMobile parameter. Attackers can craft malicious URLs containing JavaScript payloads in the isMobile GET parameter at the /mobile-app/v3/ endpoint to execute arbitrary code in victims' browsers and steal session tokens or credentials. |
2026-04-09 | |
| CVE-2026-5976 | 8.9 | HIGH | CWE-77 | 1.3% p79 | 6.27 | A security flaw has been discovered in Totolink A7100RU 7.4cu.2313_b20191024. Th...A security flaw has been discovered in Totolink A7100RU 7.4cu.2313_b20191024. This affects the function setStorageCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Performing a manipulation of the argument sambaEnabled results in os command injection. It is possible to initiate the attack remotely. The exploit has been released to the public and may be used for attacks. |
2026-04-09 | |
| CVE-2026-5975 | 8.9 | HIGH | CWE-77 | 1.3% p79 | 6.27 | A vulnerability was identified in Totolink A7100RU 7.4cu.2313_b20191024. The imp...A vulnerability was identified in Totolink A7100RU 7.4cu.2313_b20191024. The impacted element is the function setDmzCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Such manipulation of the argument wanIdx leads to os command injection. The attack may be performed from remote. The exploit is publicly available and might be used. |
2026-04-09 | |
| CVE-2026-5974 | 6.9 | MEDIUM | CWE-77 | 1.8% p82 | 4.88 | A vulnerability was determined in FoundationAgents MetaGPT up to 0.8.1. The affe...A vulnerability was determined in FoundationAgents MetaGPT up to 0.8.1. The affected element is the function Bash.run in the library metagpt/tools/libs/terminal.py. This manipulation causes os command injection. The attack is possible to be carried out remotely. The project was informed of the problem early through a pull request but has not reacted yet. |
2026-04-09 | |
| CVE-2026-5973 | 6.9 | MEDIUM | CWE-77 | 1.8% p82 | 4.88 | A vulnerability was found in FoundationAgents MetaGPT up to 0.8.1. Impacted is t...A vulnerability was found in FoundationAgents MetaGPT up to 0.8.1. Impacted is the function get_mime_type of the file metagpt/utils/common.py. The manipulation results in os command injection. The attack can be executed remotely. The exploit has been made public and could be used. The project was informed of the problem early through a pull request but has not reacted yet. |
2026-04-09 | |
| CVE-2026-5972 | 6.9 | MEDIUM | CWE-77 | 1.8% p82 | 4.88 | A vulnerability has been found in FoundationAgents MetaGPT up to 0.8.1. This iss...A vulnerability has been found in FoundationAgents MetaGPT up to 0.8.1. This issue affects the function Terminal.run_command in the library metagpt/tools/libs/terminal.py. The manipulation leads to os command injection. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used. The identifier of the patch is d04ffc8dc67903e8b327f78ec121df5e190ffc7b. Applying a patch is the recommended action to fix this issue. |
2026-04-09 | |
| CVE-2026-5194 | 9.3 | CRITICAL | CWE-295 | 0.0% p10 | 6.51 | Missing hash/digest size and OID checks allow digests smaller than allowed when ...Missing hash/digest size and OID checks allow digests smaller than allowed when verifying ECDSA certificates, or smaller than is appropriate for the relevant key type, to be accepted by signature verification functions. This could lead to reduced security of ECDSA certificate-based authentication if the public CA key used is also known. This affects ECDSA/ECC verification when EdDSA or ML-DSA is also enabled. |
2026-04-09 | |
| CVE-2026-5187 | 2.3 | LOW | CWE-122 | 0.0% p14 | 1.61 | Two potential heap out-of-bounds write locations existed in DecodeObjectId() in ...Two potential heap out-of-bounds write locations existed in DecodeObjectId() in wolfcrypt/src/asn.c. First, a bounds check only validates one available slot before writing two OID arc values (out[0] and out[1]), enabling a 2-byte out-of-bounds write when outSz equals 1. Second, multiple callers pass sizeof(decOid) (64 bytes on 64-bit platforms) instead of the element count MAX_OID_SZ (32), causing the function to accept crafted OIDs with 33 or more arcs that write past the end of the allocated buffer. |
2026-04-09 | |
| CVE-2026-40089 | 9.9 | CRITICAL | CWE-918 | 0.0% p12 | 6.93 | Sonicverse is a Self-hosted Docker Compose stack for live radio streaming. The S...Sonicverse is a Self-hosted Docker Compose stack for live radio streaming. The Sonicverse Radio Audio Streaming Stack dashboard contains a Server-Side Request Forgery (SSRF) vulnerability in its API client (apps/dashboard/lib/api.ts). Installations created using the provided install.sh script (including the one‑liner bash <(curl -fsSL https://sonicverse.short.gy/install-audiostack)) are affected. In these deployments, the dashboard accepts user-controlled URLs and passes them directly to a server-side HTTP client without sufficient validation. An authenticated operator can abuse this to make arbitrary HTTP requests from the dashboard backend to internal or external systems. This vulnerability is fixed with commit cb1ddbacafcb441549fe87d3eeabdb6a085325e4. |
2026-04-09 | |
| CVE-2026-40088 | 9.6 | CRITICAL | CWE-78 | 0.1% p17 | 6.72 | PraisonAI is a multi-agent teams system. Prior to 4.5.121, the execute_command f...PraisonAI is a multi-agent teams system. Prior to 4.5.121, the execute_command function and workflow shell execution are exposed to user-controlled input via agent workflows, YAML definitions, and LLM-generated tool calls, allowing attackers to inject arbitrary shell commands through shell metacharacters. This vulnerability is fixed in 4.5.121. |
2026-04-09 | |
| CVE-2026-40087 | 5.3 | MEDIUM | CWE-1336 | 0.0% p14 | 3.71 | LangChain is a framework for building agents and LLM-powered applications. Prior...LangChain is a framework for building agents and LLM-powered applications. Prior to 0.3.84 and 1.2.28, LangChain's f-string prompt-template validation was incomplete in two respects. First, some prompt template classes accepted f-string templates and formatted them without enforcing the same attribute-access validation as PromptTemplate. In particular, DictPromptTemplate and ImagePromptTemplate could accept templates containing attribute access or indexing expressions and subsequently evaluate those expressions during formatting. Second, f-string validation based on parsed top-level field names did not reject nested replacement fields inside format specifiers. In this pattern, the nested replacement field appears in the format specifier rather than in the top-level field name. As a result, earlier validation based on parsed field names did not reject the template even though Python formatting would still attempt to resolve the nested expression at runtime. This vulnerability is fixed in 0.3.84 and 1.2.28. |
2026-04-09 | |
| CVE-2026-40077 | 3.5 | LOW | CWE-184 | 0.1% p16 | 2.45 | Beszel is a server monitoring platform. Prior to 0.18.7, some API endpoints in t...Beszel is a server monitoring platform. Prior to 0.18.7, some API endpoints in the Beszel hub accept a user-supplied system ID and proceed without further checks that the user should have access to that system. As a result, any authenticated user can access these routes for any system if they know the system's ID. System IDs are random 15 character alphanumeric strings, and are not exposed to all users. However, it is theoretically possible for an authenticated user to enumerate a valid system ID via web API. To use the containers endpoints, the user would also need to enumerate a container ID, which is 12 digit hexadecimal string. This vulnerability is fixed in 0.18.7. |
2026-04-09 | |
| CVE-2026-39977 | 7.1 | HIGH | CWE-22 | 0.1% p18 | 4.97 | flatpak-builder is a tool to build flatpaks from source. From 1.4.5 to before 1....flatpak-builder is a tool to build flatpaks from source. From 1.4.5 to before 1.4.8, the license-files manifest key takes an array of paths to user defined licence files relative to the source directory of the module. The paths from that array are resolved using g_file_resolve_relative_path() and validated to stay inside the source directory using two checks - g_file_get_relative_path() which does not resolve symlinks and g_file_query_file_type() with G_FILE_QUERY_INFO_NOFOLLOW_SYMLINKS which only applies to the final path component. The copy operation runs on host. This can be exploited by using a crafted manifest and/or source to read arbitrary files from the host and capture them into the build output. This vulnerability is fixed in 1.4.8. |
2026-04-09 | |
| CVE-2026-35577 | 6.8 | MEDIUM | CWE-346 | 0.0% p4 | 4.76 | Apollo MCP Server is a Model Context Protocol server that exposes GraphQL operat...Apollo MCP Server is a Model Context Protocol server that exposes GraphQL operations as MCP tools. Prior to version 1.7.0, the Apollo MCP Server did not validate the Host header on incoming HTTP requests when using StreamableHTTP transport. In configurations where an HTTP-based MCP server is run on localhost without additional authentication or network-level controls, this could potentially allow a malicious website—visited by a user running the server locally—to use DNS rebinding techniques to bypass same-origin policy restrictions and issue requests to the local MCP server. If successfully exploited, this could allow an attacker to invoke tools or access resources exposed by the MCP server on behalf of the local user. This issue is limited to HTTP-based transport modes (StreamableHTTP). It does not affect servers using stdio transport. The practical risk is further reduced in deployments that use authentication, network-level access controls, or are not bound to localhost. This vulnerability is fixed in 1.7.0. |
2026-04-09 | |
| CVE-2026-35063 | 8.7 | HIGH | CWE-862 | 0.0% p13 | 6.09 | OpenPLC_V3 REST API endpoint checks for JWT presence but never verifies the call...OpenPLC_V3 REST API endpoint checks for JWT presence but never verifies the caller's role. Any authenticated user with role=user can delete any other user, including administrators, by specifying their user ID or they can create new accounts with role=admin, escalating to full administrator access. |
2026-04-09 | |
| CVE-2026-34734 | 7.8 | HIGH | CWE-416 | 0.0% p2 | 5.46 | HDF5 is software for managing data. In 1.14.1-2 and earlier, a heap-use-after-fr...HDF5 is software for managing data. In 1.14.1-2 and earlier, a heap-use-after-free was found in the h5dump helper utility. An attacker who can supply a malicious h5 file can trigger a heap use-after-free. The freed object is referenced in a memmove call from H5T__conv_struct. The original object was allocated by H5D__typeinfo_init_phase3 and freed by H5D__typeinfo_term. |
2026-04-09 | |
| CVE-2026-29923 | 7.8 | HIGH | CWE-269 | 0.0% p2 | 5.46 | The pstrip64.sys driver in EnTech Taiwan PowerStrip <=3.90.736 allows local user...The pstrip64.sys driver in EnTech Taiwan PowerStrip <=3.90.736 allows local users to escalate privileges to SYSTEM via a crafted IOCTL request enabling unprivileged users to map arbitrary physical memory into their address space and modify critical kernel structures. |
2026-04-09 | |
| CVE-2026-39912 | 9.1 | CRITICAL | CWE-201 | 0.1% p21 | 6.37 | V2Board 1.6.1 through 1.7.4 and Xboard through 0.1.9 expose authentication token...V2Board 1.6.1 through 1.7.4 and Xboard through 0.1.9 expose authentication tokens in HTTP response bodies of the loginWithMailLink endpoint when the login_with_mail_link_enable feature is active. Unauthenticated attackers can POST to the loginWithMailLink endpoint with a known email address to receive the full authentication URL in the response, then exchange the token at the token2Login endpoint to obtain a valid bearer token with complete account access including admin privileges. |
2026-04-09 | |
| CVE-2026-35556 | 9.2 | CRITICAL | CWE-256 | 0.1% p16 | 6.44 | OpenPLC_V3 is vulnerable to a Plaintext Storage of a Password vulnerability that...OpenPLC_V3 is vulnerable to a Plaintext Storage of a Password vulnerability that could allow an attacker to retrieve credentials and access sensitive information. |
2026-04-09 | |
| CVE-2026-35195 | 6.1 | MEDIUM | CWE-787 | 0.0% p3 | 4.27 | Wasmtime is a runtime for WebAssembly. Prior to 24.0.7, 36.0.7, 42.0.2, and 43.0...Wasmtime is a runtime for WebAssembly. Prior to 24.0.7, 36.0.7, 42.0.2, and 43.0.1, Wasmtime's implementation of transcoding strings between components contains a bug where the return value of a guest component's realloc is not validated before the host attempts to write through the pointer. This enables a guest to cause the host to write arbitrary transcoded string bytes to an arbitrary location up to 4GiB away from the base of linear memory. These writes on the host could hit unmapped memory or could corrupt host data structures depending on Wasmtime's configuration. Wasmtime by default reserves 4GiB of virtual memory for a guest's linear memory meaning that this bug will by default on hosts cause the host to hit unmapped memory and abort the process due to an unhandled fault. Wasmtime can be configured, however, to reserve less memory for a guest and to remove all guard pages, so some configurations of Wasmtime may lead to corruption of data outside of a guest's linear memory, such as host data structures or other guests's linear memories. This vulnerability is fixed in 24.0.7, 36.0.7, 42.0.2, and 43.0.1. |
2026-04-09 | |
| CVE-2026-35186 | 6.1 | MEDIUM | CWE-789 | 0.0% p13 | 4.27 | Wasmtime is a runtime for WebAssembly. From 25.0.0 to before 36.0.7, 42.0.2, and...Wasmtime is a runtime for WebAssembly. From 25.0.0 to before 36.0.7, 42.0.2, and 43.0.1, Wasmtime's Winch compiler backend contains a bug where translating the table.grow operator causes the result to be incorrectly typed. For 32-bit tables this means that the result of the operator, internally in Winch, is tagged as a 64-bit value instead of a 32-bit value. This invalid internal representation of Winch's compiler state compounds into further issues depending on how the value is consumed. The primary consequence of this bug is that bytes in the host's address space can be stored/read from. This is only applicable to the 16 bytes before linear memory, however, as the only significant return value of table.grow that can be misinterpreted is -1. The bytes before linear memory are, by default, unmapped memory. Wasmtime will detect this fault and abort the process, however, because wasm should not be able to access these bytes. Overall this this bug in Winch represents a DoS vector by crashing the host process, a correctness issue within Winch, and a possible leak of up to 16-bytes before linear memory. Wasmtime's default compiler is Cranelift, not Winch, and Wasmtime's default settings are to place guard pages before linear memory. This means that Wasmtime's default configuration is not affected by this issue, and when explicitly choosing Winch Wasmtime's otherwise default configuration leads to a DoS. Disabling guard pages before linear memory is required to possibly leak up to 16-bytes of host data. This vulnerability is fixed in 36.0.7, 42.0.2, and 43.0.1. |
2026-04-09 | |
| CVE-2026-34988 | 2.3 | LOW | CWE-119 | 0.0% p1 | 1.61 | Wasmtime is a runtime for WebAssembly. From 28.0.0 to before 36.0.7, 42.0.2, and...Wasmtime is a runtime for WebAssembly. From 28.0.0 to before 36.0.7, 42.0.2, and 43.0.1, Wasmtime's implementation of its pooling allocator contains a bug where in certain configurations the contents of linear memory can be leaked from one instance to the next. The implementation of resetting the virtual memory permissions for linear memory used the wrong predicate to determine if resetting was necessary, where the compilation process used a different predicate. This divergence meant that the pooling allocator incorrectly deduced at runtime that resetting virtual memory permissions was not necessary while compile-time determine that virtual memory could be relied upon. The pooling allocator must be in use, Config::memory_guard_size configuration option must be 0, Config::memory_reservation configuration must be less than 4GiB, and pooling allocator must be configured with max_memory_size the same as the memory_reservation value in order to exploit this vulnerability. If all of these conditions are applicable then when a linear memory is reused the VM permissions of the previous iteration are not reset. This means that the compiled code, which is assuming out-of-bounds loads will segfault, will not actually segfault and can read the previous contents of linear memory if it was previously mapped. This represents a data leakage vulnerability between guest WebAssembly instances which breaks WebAssembly's semantics and additionally breaks the sandbox that Wasmtime provides. Wasmtime is not vulnerable to this issue with its default settings, nor with the default settings of the pooling allocator, but embeddings are still allowed to configure these values to cause this vulnerability. This vulnerability is fixed in 36.0.7, 42.0.2, and 43.0.1. |
2026-04-09 | |
| CVE-2026-34987 | 9.0 | CRITICAL | CWE-125 | 0.0% p14 | 6.30 | Wasmtime is a runtime for WebAssembly. From 25.0.0 to before 36.0.7, 42.0.2, and...Wasmtime is a runtime for WebAssembly. From 25.0.0 to before 36.0.7, 42.0.2, and 43.0.1, Wasmtime with its Winch (baseline) non-default compiler backend may allow properly constructed guest Wasm to access host memory outside of its linear-memory sandbox. This vulnerability requires use of the Winch compiler (-Ccompiler=winch). By default, Wasmtime uses its Cranelift backend, not Winch. With Winch, the same incorrect assumption is present in theory on both aarch64 and x86-64. The aarch64 case has an observed-working proof of concept, while the x86-64 case is theoretical and may not be reachable in practice. This Winch compiler bug can allow the Wasm guest to access memory before or after the linear-memory region, independently of whether pre- or post-guard regions are configured. The accessible range in the initial bug proof-of-concept is up to 32KiB before the start of memory, or ~4GiB after the start of memory, independently of the size of pre- or post-guard regions or the use of explicit or guard-region-based bounds checking. However, the underlying bug assumes a 32-bit memory offset stored in a 64-bit register has its upper bits cleared when it may not, and so closely related variants of the initial proof-of-concept may be able to access truly arbitrary memory in-process. This could result in a host process segmentation fault (DoS), an arbitrary data leak from the host process, or with a write, potentially an arbitrary RCE. This vulnerability is fixed in 36.0.7, 42.0.2, and 43.0.1. |
2026-04-09 | |
| CVE-2026-34983 | 1.0 | LOW | CWE-416 | 0.0% p5 | 0.70 | Wasmtime is a runtime for WebAssembly. In 43.0.0, cloning a wasmtime::Linker is ...Wasmtime is a runtime for WebAssembly. In 43.0.0, cloning a wasmtime::Linker is unsound and can result in use-after-free bugs. This bug is not controllable by guest Wasm programs. It can only be triggered by a specific sequence of embedder API calls made by the host. Specifically, the following steps must occur to trigger the bug clone a wasmtime::Linker, drop the original linker instance, use the new, cloned linker instance, resulting in a use-after-free. This vulnerability is fixed in 43.0.1. |
2026-04-09 | |
| CVE-2026-34971 | 9.0 | CRITICAL | CWE-125 | 0.0% p2 | 6.30 | Wasmtime is a runtime for WebAssembly. From 32.0.0 to before 36.0.7, 42.0.2, and...Wasmtime is a runtime for WebAssembly. From 32.0.0 to before 36.0.7, 42.0.2, and 43.0.1, Wasmtime's Cranelift compilation backend contains a bug on aarch64 when performing a certain shape of heap accesses which means that the wrong address is accessed. When combined with explicit bounds checks a guest WebAssembly module this can create a situation where there are two diverging computations for the same address: one for the address to bounds-check and one for the address to load. This difference in address being operated on means that a guest module can pass a bounds check but then load a different address. Combined together this enables an arbitrary read/write primitive for guest WebAssembly when accesssing host memory. This is a sandbox escape as guests are able to read/write arbitrary host memory. This vulnerability has a few ingredients, all of which must be met, for this situation to occur and bypass the sandbox restrictions. This miscompiled shape of load only occurs on 64-bit WebAssembly linear memories, or when Config::wasm_memory64 is enabled. 32-bit WebAssembly is not affected. Spectre mitigations or signals-based-traps must be disabled. When spectre mitigations are enabled then the offending shape of load is not generated. When signals-based-traps are disabled then spectre mitigations are also automatically disabled. The specific bug in Cranelift is a miscompile of a load of the shape load(iadd(base, ishl(index, amt))) where amt is a constant. The amt value is masked incorrectly to test if it's a certain value, and this incorrect mask means that Cranelift can pattern-match this lowering rule during instruction selection erroneously, diverging from WebAssembly's and Cranelift's semantics. This incorrect lowering would, for example, load an address much further away than intended as the correct address's computation would have wrapped around to a smaller value insetad. This vulnerability is fixed in 36.0.7, 42.0.2, and 43.0.1. |
2026-04-09 | |
| CVE-2026-34946 | 5.9 | MEDIUM | CWE-670 | 0.0% p3 | 4.13 | Wasmtime is a runtime for WebAssembly. From 25.0.0 to before 36.0.7, 42.0.2, and...Wasmtime is a runtime for WebAssembly. From 25.0.0 to before 36.0.7, 42.0.2, and 43.0.1, Wasmtime's Winch compiler contains a vulnerability where the compilation of the table.fill instruction can result in a host panic. This means that a valid guest can be compiled with Winch, on any architecture, and cause the host to panic. This represents a denial-of-service vulnerability in Wasmtime due to guests being able to trigger a panic. The specific issue is that a historical refactoring changed how compiled code referenced tables within the table.* instructions. This refactoring forgot to update the Winch code paths associated as well, meaning that Winch was using the wrong indexing scheme. Due to the feature support of Winch the only problem that can result is tables being mixed up or nonexistent tables being used, meaning that the guest is limited to panicking the host (using a nonexistent table), or executing spec-incorrect behavior and modifying the wrong table. This vulnerability is fixed in 36.0.7, 42.0.2, and 43.0.1. |
2026-04-09 | |
| CVE-2026-34945 | 2.3 | LOW | CWE-681 | 0.0% p3 | 1.61 | Wasmtime is a runtime for WebAssembly. From 25.0.0 to before 36.0.7, 42.0.2, and...Wasmtime is a runtime for WebAssembly. From 25.0.0 to before 36.0.7, 42.0.2, and 43.0.1, Wasmtime's Winch compiler contains a bug where a 64-bit table, part of the memory64 proposal of WebAssembly, incorrectly translated the table.size instruction. This bug could lead to disclosing data on the host's stack to WebAssembly guests. The host's stack can possibly contain sensitive data related to other host-originating operations which is not intended to be disclosed to guests. This bug specifically arose from a mistake where the return value of table.size was statically typed as a 32-bit integer, as opposed to consulting the table's index type to see how large the returned register could be. When combined with details about Wnich's ABI, such as multi-value returns, this can be combined to read stack data from the host, within a guest. This vulnerability is fixed in 36.0.7, 42.0.2, and 43.0.1. |
2026-04-09 | |
| CVE-2026-34944 | 4.1 | MEDIUM | CWE-248 | 0.0% p0 | 2.87 | Wasmtime is a runtime for WebAssembly. Prior to 24.0.7, 36.0.7, 42.0.2, and 43.0...Wasmtime is a runtime for WebAssembly. Prior to 24.0.7, 36.0.7, 42.0.2, and 43.0.1, On x86-64 platforms with SSE3 disabled Wasmtime's compilation of the f64x2.splat WebAssembly instruction with Cranelift may load 8 more bytes than is necessary. When signals-based-traps are disabled this can result in a uncaught segfault due to loading from unmapped guard pages. With guard pages disabled it's possible for out-of-sandbox data to be loaded, but this data is not visible to WebAssembly guests. This vulnerability is fixed in 24.0.7, 36.0.7, 42.0.2, and 43.0.1. |
2026-04-09 | |
| CVE-2026-34943 | 5.6 | MEDIUM | CWE-248 | 0.0% p3 | 3.92 | Wasmtime is a runtime for WebAssembly. Prior to 24.0.7, 36.0.7, 42.0.2, and 43.0...Wasmtime is a runtime for WebAssembly. Prior to 24.0.7, 36.0.7, 42.0.2, and 43.0.1, Wasmtime contains a possible panic which can happen when a flags-typed component model value is lifted with the Val type. If bits are set outside of the set of flags the component model specifies that these bits should be ignored but Wasmtime will panic when this value is lifted. This panic only affects wasmtime's implementation of lifting into Val, not when using the flags! macro. This additionally only affects flags-typed values which are part of a WIT interface. This has the risk of being a guest-controlled panic within the host which Wasmtime considers a DoS vector. This vulnerability is fixed in 24.0.7, 36.0.7, 42.0.2, and 43.0.1. |
2026-04-09 | |
| CVE-2026-34942 | 5.9 | MEDIUM | CWE-129 | 0.0% p3 | 4.13 | Wasmtime is a runtime for WebAssembly. Prior to 24.0.7, 36.0.7, 42.0.2, and 43.0...Wasmtime is a runtime for WebAssembly. Prior to 24.0.7, 36.0.7, 42.0.2, and 43.0.1, Wasmtime's implementation of transcoding strings into the Component Model's utf16 or latin1+utf16 encodings improperly verified the alignment of reallocated strings. This meant that unaligned pointers could be passed to the host for transcoding which would trigger a host panic. This panic is possible to trigger from malicious guests which transfer very specific strings across components with specific addresses. Host panics are considered a DoS vector in Wasmtime as the panic conditions are controlled by the guest in this situation. This vulnerability is fixed in 24.0.7, 36.0.7, 42.0.2, and 43.0.1. |
2026-04-09 | |
| CVE-2026-34941 | 6.9 | MEDIUM | CWE-125 | 0.0% p3 | 4.83 | Wasmtime is a runtime for WebAssembly. Prior to 24.0.7, 36.0.7, 42.0.2, and 43.0...Wasmtime is a runtime for WebAssembly. Prior to 24.0.7, 36.0.7, 42.0.2, and 43.0.1, Wasmtime contains a vulnerability where when transcoding a UTF-16 string to the latin1+utf16 component-model encoding it would incorrectly validate the byte length of the input string when performing a bounds check. Specifically the number of code units were checked instead of the byte length, which is twice the size of the code units. This vulnerability can cause the host to read beyond the end of a WebAssembly's linear memory in an attempt to transcode nonexistent bytes. In Wasmtime's default configuration this will read unmapped memory on a guard page, terminating the process with a segfault. Wasmtime can be configured, however, without guard pages which would mean that host memory beyond the end of linear memory may be read and interpreted as UTF-16. A host segfault is a denial-of-service vulnerability in Wasmtime, and possibly being able to read beyond the end of linear memory is additionally a vulnerability. Note that reading beyond the end of linear memory requires nonstandard configuration of Wasmtime, specifically with guard pages disabled. This vulnerability is fixed in 24.0.7, 36.0.7, 42.0.2, and 43.0.1. |
2026-04-09 | |
| CVE-2026-31170 | 9.8 | CRITICAL | CWE-77 | 0.1% p23 | 6.86 | An issue was discovered in ToToLink A3300R firmware v17.0.0cu.557_B20221024 allo...An issue was discovered in ToToLink A3300R firmware v17.0.0cu.557_B20221024 allowing attackers to execute arbitrary commands via the stun-pass parameter to /cgi-bin/cstecgi.cgi. |
2026-04-09 | |
| CVE-2026-28205 | 9.2 | CRITICAL | CWE-1188 | 0.1% p24 | 6.44 | OpenPLC_V3 is vulnerable to an Initialization of a Resource with an Insecure Def...OpenPLC_V3 is vulnerable to an Initialization of a Resource with an Insecure Default vulnerability which could allow an attacker to gain access to the system by bypassing authentication via an API. |
2026-04-09 | |
| CVE-2026-5971 | 6.9 | MEDIUM | CWE-94 | 0.1% p21 | 4.83 | A flaw has been found in FoundationAgents MetaGPT up to 0.8.1. This vulnerabilit...A flaw has been found in FoundationAgents MetaGPT up to 0.8.1. This vulnerability affects the function ActionNode.xml_fill of the file metagpt/actions/action_node.py of the component XML Handler. Executing a manipulation can lead to improper neutralization of directives in dynamically evaluated code. The attack may be launched remotely. The exploit has been published and may be used. The project was informed of the problem early through a pull request but has not reacted yet. |
2026-04-09 | |
| CVE-2026-5970 | 6.9 | MEDIUM | CWE-74 | 0.1% p21 | 4.83 | A vulnerability was detected in FoundationAgents MetaGPT up to 0.8.1. This affec...A vulnerability was detected in FoundationAgents MetaGPT up to 0.8.1. This affects the function check_solution of the component HumanEvalBenchmark/MBPPBenchmark. Performing a manipulation results in code injection. The attack may be initiated remotely. The exploit is now public and may be used. The project was informed of the problem early through a pull request but has not reacted yet. |
2026-04-09 | |
| CVE-2026-5329 | 8.5 | HIGH | CWE-20 | 0.2% p45 | 5.96 | Rapid7 Velociraptor versions prior to 0.76.2 contain an improper input validatio...Rapid7 Velociraptor versions prior to 0.76.2 contain an improper input validation vulnerability in the client monitoring message handler on the Velociraptor server (primarily Linux) that allows an authenticated remote attacker to write to arbitrary internal server queues via a crafted monitoring message with a malicious queue name. The server handler that receives client monitoring messages does not sufficiently validate the queue name supplied by the client, allowing a rogue client to write arbitrary messages to privileged internal queues. This may lead to remote code execution on the Velociraptor server. Rapid7 Hosted Velociraptor instances are not affected by this vulnerability. |
2026-04-09 | |
| CVE-2026-40072 | 1.7 | LOW | CWE-918 | 0.1% p16 | 1.19 | web3.py allows you to interact with the Ethereum blockchain using Python. From 6...web3.py allows you to interact with the Ethereum blockchain using Python. From 6.0.0b3 to before 7.15.0 and 8.0.0b2, web3.py implements CCIP Read / OffchainLookup (EIP-3668) by performing HTTP requests to URLs supplied by smart contracts in offchain_lookup_payload["urls"]. The implementation uses these contract-supplied URLs directly (after {sender} / {data} template substitution) without any destination validation. CCIP Read is enabled by default (global_ccip_read_enabled = True on all providers), meaning any application using web3.py's .call() method is exposed without explicit opt-in. This results in Server-Side Request Forgery (SSRF) when web3.py is used in backend services, indexers, APIs, or any environment that performs eth_call / .call() against untrusted or user-supplied contract addresses. A malicious contract can force the web3.py process to issue HTTP requests to arbitrary destinations, including internal network services and cloud metadata endpoints. This vulnerability is fixed in 7.15.0 and 8.0.0b2. |
2026-04-09 | |
| CVE-2026-40071 | 5.4 | MEDIUM | CWE-863 | 0.0% p9 | 3.78 | pyLoad is a free and open-source download manager written in Python. Prior to 0....pyLoad is a free and open-source download manager written in Python. Prior to 0.5.0b3.dev97, the /json/package_order, /json/link_order, and /json/abort_link WebUI JSON endpoints enforce weaker permissions than the core API methods they invoke. This allows authenticated low-privileged users to execute MODIFY operations that should be denied by pyLoad's own permission model. This vulnerability is fixed in 0.5.0b3.dev97. |
2026-04-09 | |
| CVE-2026-40070 | 8.1 | HIGH | CWE-347 | 0.0% p0 | 5.67 | BSV Ruby SDK is the Ruby SDK for the BSV blockchain. From 0.3.1 to before 0.8.2,...BSV Ruby SDK is the Ruby SDK for the BSV blockchain. From 0.3.1 to before 0.8.2, BSV::Wallet::WalletClient#acquire_certificate persists certificate records to storage without verifying the certifier's signature over the certificate contents. In acquisition_protocol: 'direct', the caller supplies all certificate fields (including signature:) and the record is written to storage verbatim. In acquisition_protocol: 'issuance', the client POSTs to a certifier URL and writes whatever signature the response body contains, also without verification. An attacker who can reach either API (or who controls a certifier endpoint targeted by the issuance path) can forge identity certificates that subsequently appear authentic to list_certificates and prove_certificate. |
2026-04-09 | |
| CVE-2026-40069 | 7.5 | HIGH | CWE-754 | 0.0% p12 | 5.25 | BSV Ruby SDK is the Ruby SDK for the BSV blockchain. From 0.1.0 to before 0.8.2,...BSV Ruby SDK is the Ruby SDK for the BSV blockchain. From 0.1.0 to before 0.8.2, BSV::Network::ARC's failure detection only recognises REJECTED and DOUBLE_SPEND_ATTEMPTED. ARC responses with txStatus values of INVALID, MALFORMED, MINED_IN_STALE_BLOCK, or any ORPHAN-containing extraInfo / txStatus are silently treated as successful broadcasts. Applications that gate actions on broadcaster success are tricked into trusting transactions that were never accepted by the network. This vulnerability is fixed in 0.8.2. |
2026-04-09 | |
| CVE-2026-39987 | 9.3 | CRITICAL | CWE-306 | 3.2% p87 | 6.61 | marimo is a reactive Python notebook. Prior to 0.23.0, Marimo has a Pre-Auth RCE...marimo is a reactive Python notebook. Prior to 0.23.0, Marimo has a Pre-Auth RCE vulnerability. The terminal WebSocket endpoint /terminal/ws lacks authentication validation, allowing an unauthenticated attacker to obtain a full PTY shell and execute arbitrary system commands. Unlike other WebSocket endpoints (e.g., /ws) that correctly call validate_auth() for authentication, the /terminal/ws endpoint only checks the running mode and platform support before accepting connections, completely skipping authentication verification. This vulnerability is fixed in 0.23.0. |
2026-04-09 | |
| CVE-2026-39985 | 4.3 | MEDIUM | CWE-601 | 0.0% p9 | 3.01 | LORIS (Longitudinal Online Research and Imaging System) is a self-hosted web app...LORIS (Longitudinal Online Research and Imaging System) is a self-hosted web application that provides data- and project-management for neuroimaging research. Prior to 27.0.3 and 28.0.1, the redirect parameter upon login to LORIS was not validating the value of the redirect as being within LORIS, which could be used to trick users into visiting arbitrary URLs if they are given a link with a third party redirect parameter. This vulnerability is fixed in 27.0.3 and 28.0.1. |
2026-04-09 | |
| CVE-2026-39983 | 8.6 | HIGH | CWE-93 | 7.0% p91 | 6.23 | basic-ftp is an FTP client for Node.js. Prior to 5.2.1, basic-ftp allows FTP com...basic-ftp is an FTP client for Node.js. Prior to 5.2.1, basic-ftp allows FTP command injection via CRLF sequences (\r\n) in file path parameters passed to high-level path APIs such as cd(), remove(), rename(), uploadFrom(), downloadTo(), list(), and removeDir(). The library's protectWhitespace() helper only handles leading spaces and returns other paths unchanged, while FtpContext.send() writes the resulting command string directly to the control socket with \r\n appended. This lets attacker-controlled path strings split one intended FTP command into multiple commands. This vulnerability is fixed in 5.2.1. |
2026-04-09 | |
| CVE-2026-39981 | 8.8 | HIGH | CWE-22 | 0.5% p67 | 6.18 | AGiXT is a dynamic AI Agent Automation Platform. Prior to 1.9.2, the safe_join()...AGiXT is a dynamic AI Agent Automation Platform. Prior to 1.9.2, the safe_join() function in the essential_abilities extension fails to validate that resolved file paths remain within the designated agent workspace. An authenticated attacker can use directory traversal sequences to read, write, or delete arbitrary files on the server hosting the AGiXT instance. This vulnerability is fixed in 1.9.2. |
2026-04-09 | |
| CVE-2026-39980 | 9.1 | CRITICAL | CWE-1336 | 0.1% p26 | 6.37 | OpenCTI is an open source platform for managing cyber threat intelligence knowle...OpenCTI is an open source platform for managing cyber threat intelligence knowledge and observables. Prior to 6.9.5, the safeEjs.ts file does not properly sanitize EJS templates. Users with the Manage customization capability can run arbitrary JavaScript in the context of the OpenCTI platform process during notifier template execution. This vulnerability is fixed in 6.9.5. |
2026-04-09 | |
| CVE-2026-39961 | 6.8 | MEDIUM | CWE-269 | 0.0% p9 | 4.76 | Aiven Operator allows you to provision and manage Aiven Services from your Kuber...Aiven Operator allows you to provision and manage Aiven Services from your Kubernetes cluster. From 0.31.0 to before 0.37.0, a developer with create permission on ClickhouseUser CRDs in their own namespace can exfiltrate secrets from any other namespace — production database credentials, API keys, service tokens — with a single kubectl apply. The operator reads the victim's secret using its ClusterRole and writes the password into a new secret in the attacker's namespace. The operator acts as a confused deputy: its ServiceAccount has cluster-wide secret read/write (aiven-operator-role ClusterRole), and it trusts user-supplied namespace values in spec.connInfoSecretSource.namespace without validation. No admission webhook enforces this boundary — the ServiceUser webhook returns nil, and no ClickhouseUser webhook exists. This vulnerability is fixed in 0.37.0. |
2026-04-09 | |
| CVE-2026-39911 | 8.7 | HIGH | CWE-668 | 0.1% p31 | 6.09 | Hashgraph Guardian through version 3.5.0 contains an unsandboxed JavaScript exec...Hashgraph Guardian through version 3.5.0 contains an unsandboxed JavaScript execution vulnerability in the Custom Logic policy block worker that allows authenticated Standard Registry users to execute arbitrary code by passing user-supplied JavaScript expressions directly to the Node.js Function() constructor without isolation. Attackers can import native Node.js modules to read arbitrary files from the container filesystem, access process environment variables containing sensitive credentials such as RSA private keys, JWT signing keys, and API tokens, and forge valid authentication tokens for any user including administrators. |
2026-04-09 | |
| CVE-2026-39315 | 6.1 | MEDIUM | CWE-184 | 0.1% p18 | 4.27 | Unhead is a document head and template manager. Prior to 2.1.13, useHeadSafe() i...Unhead is a document head and template manager. Prior to 2.1.13, useHeadSafe() is the composable that Nuxt's own documentation explicitly recommends for rendering user-supplied content in <head> safely. Internally, the hasDangerousProtocol() function in packages/unhead/src/plugins/safe.ts decodes HTML entities before checking for blocked URI schemes (javascript:, data:, vbscript:). The decoder uses two regular expressions with fixed-width digit caps. The HTML5 specification imposes no limit on leading zeros in numeric character references. When a padded entity exceeds the regex digit cap, the decoder silently skips it. The undecoded string is then passed to startsWith('javascript:'), which does not match. makeTagSafe() writes the raw value directly into SSR HTML output. The browser's HTML parser decodes the padded entity natively and constructs the blocked URI. This vulnerability is fixed in 2.1.13. |
2026-04-09 | |
| CVE-2026-35207 | 5.4 | MEDIUM | CWE-295 | 0.0% p4 | 3.78 | dde-control-center is the control panel of DDE, the Deepin Desktop Environment. ...dde-control-center is the control panel of DDE, the Deepin Desktop Environment. plugin-deepinid is a plugin in dde-control-center, which provides the deepinid cloud service. Prior to 6.1.80, plugin-deepinid is configured to skip TLS certificate verification when fetching the user's avatar from openapi.deepin.com or other providers. An MITM attacker could intercept the traffic, replace the avatar with a malicious or misleading image, and potentially identify the user by the avatar. This vulnerability is fixed in dde-control-center 6.1.80 and 5.9.9. |
2026-04-09 | |
| CVE-2026-30478 | 8.8 | HIGH | CWE-427 | 0.0% p2 | 6.16 | A Dynamic-link Library Injection vulnerability in GatewayGeo MapServer for Windo...A Dynamic-link Library Injection vulnerability in GatewayGeo MapServer for Windows version 5 allows attackers to escalate privileges via a crafted executable. |
2026-04-09 | |
| CVE-2026-1584 | 7.5 | HIGH | CWE-476 | 0.1% p28 | 5.25 | A flaw was found in gnutls. A remote, unauthenticated attacker can exploit this ...A flaw was found in gnutls. A remote, unauthenticated attacker can exploit this vulnerability by sending a specially crafted ClientHello message with an invalid Pre-Shared Key (PSK) binder value during the TLS handshake. This can lead to a NULL pointer dereference, causing the server to crash and resulting in a remote Denial of Service (DoS) condition. |
2026-04-09 | |
| CVE-2025-70797 | 6.1 | MEDIUM | CWE-79 | 0.1% p18 | 4.27 | Cross Site Scripting vulnerability in Limesurvey v.6.15.20+251021 allows a remot...Cross Site Scripting vulnerability in Limesurvey v.6.15.20+251021 allows a remote attacker to execute arbitrary code via the Box[title] and box[url] parameters. |
2026-04-09 | |
| CVE-2025-63238 | 6.1 | MEDIUM | CWE-79 | 0.0% p8 | 4.27 | A Reflected Cross-Site Scripting (XSS) affects LimeSurvey versions prior to 6.15...A Reflected Cross-Site Scripting (XSS) affects LimeSurvey versions prior to 6.15.11+250909, due to the lack of validation of gid parameter in getInstance() function in application/models/QuestionCreate.php. This allows an attacker to craft a malicious URL and compromise the logged in user. |
2026-04-09 | |
| CVE-2026-5962 | 6.9 | MEDIUM | CWE-22 | 0.1% p18 | 4.83 | A vulnerability was detected in Tenda CH22 1.0.0.6(468). This issue affects the ...A vulnerability was detected in Tenda CH22 1.0.0.6(468). This issue affects the function R7WebsSecurityHandlerfunction of the component httpd. The manipulation results in path traversal. The attack may be launched remotely. The exploit is now public and may be used. |
2026-04-09 | |
| CVE-2026-5961 | 6.9 | MEDIUM | CWE-74 | 0.0% p11 | 4.83 | A security vulnerability has been detected in code-projects Simple IT Discussion...A security vulnerability has been detected in code-projects Simple IT Discussion Forum 1.0. This vulnerability affects unknown code of the file /topic-details.php. The manipulation of the argument post_id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used. |
2026-04-09 | |
| CVE-2026-39976 | 7.1 | HIGH | CWE-287 | 0.1% p20 | 4.97 | Laravel Passport provides OAuth2 server support to Laravel. From 13.0.0 to befor...Laravel Passport provides OAuth2 server support to Laravel. From 13.0.0 to before 13.7.1, there is an Authentication Bypass for client_credentials tokens. the league/oauth2-server library sets the JWT sub claim to the client identifier (since there's no user). The token guard then passes this value to retrieveById() without validating it's actually a user identifier, potentially resolving an unrelated real user. Any machine-to-machine token can inadvertently authenticate as an actual user. This vulnerability is fixed in 13.7.1. |
2026-04-09 | |
| CVE-2026-39974 | 8.5 | HIGH | CWE-918 | 0.0% p8 | 5.95 | n8n-MCP is a Model Context Protocol (MCP) server that provides AI assistants wit...n8n-MCP is a Model Context Protocol (MCP) server that provides AI assistants with comprehensive access to n8n node documentation, properties, and operations. Prior to 2.47.4, an authenticated Server-Side Request Forgery in n8n-mcp allows a caller holding a valid AUTH_TOKEN to cause the server to issue HTTP requests to arbitrary URLs supplied through multi-tenant HTTP headers. Response bodies are reflected back through JSON-RPC, so an attacker can read the contents of any URL the server can reach — including cloud instance metadata endpoints (AWS IMDS, GCP, Azure, Alibaba, Oracle), internal network services, and any other host the server process has network access to. The primary at-risk deployments are multi-tenant HTTP installations where more than one operator can present a valid AUTH_TOKEN, or where a token is shared with less-trusted clients. Single-tenant stdio deployments and HTTP deployments without multi-tenant headers are not affected. This vulnerability is fixed in 2.47.4. |
2026-04-09 | |
| CVE-2026-39972 | 7.1 | HIGH | CWE-1289 | 0.1% p26 | 4.97 | Mercure is a protocol for pushing data updates to web browsers and other HTTP cl...Mercure is a protocol for pushing data updates to web browsers and other HTTP clients in a battery-efficient way. Prior to 0.22.0, a cache key collision vulnerability in TopicSelectorStore allows an attacker to poison the match result cache, potentially causing private updates to be delivered to unauthorized subscribers or blocking delivery to authorized ones. The cache key was constructed by concatenating the topic selector and topic with an underscore separator. Because both topic selectors and topics can contain underscores, two distinct pairs can produce the same key. An attacker who can subscribe to the hub or publish updates with crafted topic names can exploit this to bypass authorization checks on private updates. This vulnerability is fixed in 0.22.0. |
2026-04-09 | |
| CVE-2026-39962 | 8.8 | HIGH | CWE-90 | 0.2% p37 | 6.16 | MISP is an open source threat intelligence and sharing platform. Prior to 2.5.36...MISP is an open source threat intelligence and sharing platform. Prior to 2.5.36, improper neutralization of special elements in an LDAP query in ApacheAuthenticate.php allows LDAP injection via an unsanitized username value when ApacheAuthenticate.apacheEnv is configured to use a user-controlled server variable instead of REMOTE_USER (such as in certain proxy setups). An attacker able to control that value can manipulate the LDAP search filter and potentially bypass authentication constraints or cause unauthorized LDAP queries. This vulnerability is fixed in 2.5.36. |
2026-04-09 | |
| CVE-2026-39959 | 7.1 | HIGH | CWE-290 | 0.0% p2 | 4.97 | Tmds.DBus provides .NET libraries for working with D-Bus from .NET. Tmds.DBus an...Tmds.DBus provides .NET libraries for working with D-Bus from .NET. Tmds.DBus and Tmds.DBus.Protocol are vulnerable to malicious D-Bus peers. A peer on the same bus can spoof signals by impersonating the owner of a well-known name, exhaust system resources or cause file descriptor spillover by sending messages with an excessive number of Unix file descriptors, and crash the application by sending malformed message bodies that cause unhandled exceptions on the SynchronizationContext. This vulnerability is fixed in Tmds.DBus 0.92.0 and Tmds.DBus.Protocol 0.92.0 and 0.21.3. |
2026-04-09 | |
| CVE-2026-39958 | 5.2 | MEDIUM | CWE-93 | 0.1% p17 | 3.64 | oma is a package manager for AOSC OS. Prior to 1.25.2, oma-topics is responsible...oma is a package manager for AOSC OS. Prior to 1.25.2, oma-topics is responsible for fetching metadata for testing repositories (topics) named "Topic Manifests" ({mirror}/debs/manifest/topics.json) from remote repository servers, registering them as APT source entries. However, the name field in said metadata were not checked for transliteration. In this case, a malicious party may supply a malformed Topic Manifest, which may cause malicious APT source entries to be added to /etc/apt/sources.list.d/atm.list as oma-topics finishes fetching and registering metadata. This vulnerability is fixed in 1.25.2. |
2026-04-09 | |
| CVE-2026-39957 | 2.3 | LOW | CWE-863 | 0.0% p9 | 1.61 | Lychee is a free, open-source photo-management tool. Prior to 7.5.4, a SQL opera...Lychee is a free, open-source photo-management tool. Prior to 7.5.4, a SQL operator-precedence bug in SharingController::listAll() causes the orWhereNotNull('user_group_id') clause to escape the ownership filter applied by the when() block. Any authenticated non-admin user with upload permission who owns at least one album can retrieve all user-group-based sharing permissions across the entire instance, including private albums owned by other users. This vulnerability is fixed in 7.5.4. |
2026-04-09 | |
| CVE-2026-39943 | 6.5 | MEDIUM | CWE-200 | 0.0% p7 | 4.55 | Directus is a real-time API and App dashboard for managing SQL database content....Directus is a real-time API and App dashboard for managing SQL database content. Prior to 11.17.0, Directus stores revision records (in directus_revisions) whenever items are created or updated. Due to the revision snapshot code not consistently calling the prepareDelta sanitization pipeline, sensitive fields (including user tokens, two-factor authentication secrets, external auth identifiers, auth data, stored credentials, and AI provider API keys) could be stored in plaintext within revision records. This vulnerability is fixed in 11.17.0. |
2026-04-09 | |
| CVE-2026-39942 | 8.5 | HIGH | CWE-284 | 0.0% p10 | 5.95 | Directus is a real-time API and App dashboard for managing SQL database content....Directus is a real-time API and App dashboard for managing SQL database content. Prior to 11.17.0, the PATCH /files/{id} endpoint accepts a user-controlled filename_disk parameter. By setting this value to match the storage path of another user's file, an attacker can overwrite that file's content while manipulating metadata fields such as uploaded_by to obscure the tampering. This vulnerability is fixed in 11.17.0. |
2026-04-09 | |
| CVE-2026-39856 | 5.5 | MEDIUM | CWE-125 | 0.0% p4 | 3.85 | osslsigncode is a tool that implements Authenticode signing and timestamping. Pr...osslsigncode is a tool that implements Authenticode signing and timestamping. Prior to 2.13, an out-of-bounds read vulnerability exists in osslsigncode version 2.12 and earlier in the PE page-hash computation code (pe_page_hash_calc()). When processing PE sections for page hashing, the function uses PointerToRawData and SizeOfRawData values from section headers without validating that the referenced region lies within the mapped file. An attacker can craft a PE file with section headers that point beyond the end of the file. When osslsigncode computes page hashes for such a file, it may attempt to hash data from an invalid memory region, causing an out-of-bounds read and potentially crashing the process. The vulnerability can be triggered while signing a malicious PE file with page hashing enabled (-ph), or while verifying a malicious signed PE file that already contains page hashes. Verification of an already signed file does not require the verifier to pass -ph. This vulnerability is fixed in 2.13. |
2026-04-09 | |
| CVE-2026-39855 | 5.5 | MEDIUM | CWE-125 | 0.0% p4 | 3.85 | osslsigncode is a tool that implements Authenticode signing and timestamping. Pr...osslsigncode is a tool that implements Authenticode signing and timestamping. Prior to 2.13, an integer underflow vulnerability exists in osslsigncode version 2.12 and earlier in the PE page-hash computation code (pe_page_hash_calc()). When page hash processing is performed on a PE file, the function subtracts hdrsize from pagesize without first validating that pagesize >= hdrsize. If a malicious PE file sets SizeOfHeaders (hdrsize) larger than SectionAlignment (pagesize), the subtraction underflows and produces a very large unsigned length. The code allocates a zero-filled buffer of pagesize bytes and then attempts to hash pagesize - hdrsize bytes from that buffer. After the underflow, this results in an out-of-bounds read from the heap and can crash the process. The vulnerability can be triggered while signing a malicious PE file with page hashing enabled (-ph), or while verifying a malicious signed PE file that already contains page hashes. Verification of an already signed file does not require the verifier to pass -ph. This vulnerability is fixed in 2.13. |
2026-04-09 | |
| CVE-2026-30479 | 9.1 | CRITICAL | CWE-94 | 0.1% p26 | 6.37 | A Dynamic-link Library Injection vulnerability in OSGeo Project MapServer before...A Dynamic-link Library Injection vulnerability in OSGeo Project MapServer before v8.0 allows attackers to execute arbitrary code via a crafted executable. |
2026-04-09 | |
| CVE-2026-5960 | 2.1 | LOW | CWE-200 | 0.0% p10 | 1.47 | A weakness has been identified in code-projects Patient Record Management System...A weakness has been identified in code-projects Patient Record Management System 1.0. This affects an unknown part of the file /db/hcpms.sql of the component SQL Database Backup File Handler. Executing a manipulation can lead to information disclosure. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks. |
2026-04-09 | |
| CVE-2026-4878 | 6.7 | MEDIUM | CWE-367 | 0.0% p1 | 4.69 | A flaw was found in libcap. A local unprivileged user can exploit a Time-of-chec...A flaw was found in libcap. A local unprivileged user can exploit a Time-of-check-to-time-of-use (TOCTOU) race condition in the `cap_set_file()` function. This allows an attacker with write access to a parent directory to redirect file capability updates to an attacker-controlled file. By doing so, capabilities can be injected into or stripped from unintended executables, leading to privilege escalation. |
2026-04-09 | |
| CVE-2026-39941 | 5.3 | MEDIUM | CWE-79 | 0.0% p10 | 3.71 | ChurchCRM is an open-source church management system. Prior to 7.1.0, an XSS vul...ChurchCRM is an open-source church management system. Prior to 7.1.0, an XSS vulnerability allows attacker-supplied input sent via a the EName and EDesc parameters in EditEventAttendees.php to be rendered in a page without proper output encoding, enabling arbitrary JavaScript execution in victims' browsers. This vulnerability is fixed in 7.1.0. |
2026-04-09 | |
| CVE-2026-39853 | 7.8 | HIGH | CWE-121 | 0.0% p3 | 5.46 | osslsigncode is a tool that implements Authenticode signing and timestamping. Pr...osslsigncode is a tool that implements Authenticode signing and timestamping. Prior to 2.12, A stack buffer overflow vulnerability exists in osslsigncode in several signature verification paths. During verification of a PKCS#7 signature, the code copies the digest value from a parsed SpcIndirectDataContent structure into a fixed-size stack buffer (mdbuf[EVP_MAX_MD_SIZE], 64 bytes) without validating that the source length fits within the destination buffer. This pattern is present in the verification handlers for PE, MSI, CAB, and script files. An attacker can craft a malicious signed file with an oversized digest field in SpcIndirectDataContent. When a user verifies such a file with osslsigncode verify, the unbounded memcpy can overflow the stack buffer and corrupt adjacent stack state. This vulnerability is fixed in 2.12. |
2026-04-09 | |
| CVE-2026-39843 | 7.7 | HIGH | CWE-918 | 0.0% p8 | 5.39 | Plane is an an open-source project management tool. From 0.28.0 to before 1.3.0,...Plane is an an open-source project management tool. From 0.28.0 to before 1.3.0, the remediation of GHSA-jcc6-f9v6-f7jw is incomplete which could lead to the same full read Server-Side Request Forgery when a normal html page contains a link tag with an href that redirects to a private IP address is supplied to Add link by an authenticated attacker with low privileges. Redirects for the main page URL are validated, but not the favicon fetch path. fetch_and_encode_favicon() still uses requests.get(favicon_url, ...) with the default redirect-following. This vulnerability is fixed in 1.3.0. |
2026-04-09 | |
| CVE-2026-39398 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: The affected product and advisory are not public.Rejected reason: The affected product and advisory are not public. |
2026-04-09 | |
| CVE-2026-35205 | 8.4 | HIGH | CWE-636 | 0.0% p4 | 5.88 | Helm is a package manager for Charts for Kubernetes. From 4.0.0 to 4.1.3, Helm w...Helm is a package manager for Charts for Kubernetes. From 4.0.0 to 4.1.3, Helm will install plugins missing provenance (.prov file) when signature verification is required. This vulnerability is fixed in 4.1.4. |
2026-04-09 | |
| CVE-2026-35204 | 8.4 | HIGH | CWE-22 | 0.0% p4 | 5.88 | Helm is a package manager for Charts for Kubernetes. From 4.0.0 to 4.1.3, a spec...Helm is a package manager for Charts for Kubernetes. From 4.0.0 to 4.1.3, a specially crafted Helm plugin, when installed or updated, will cause Helm to write the contents of the plugin to an arbitrary filesystem location. To prevent this, validate that the plugin.yaml of the Helm plugin does not include a version: field containing POSIX dot-dot path separators ie. "/../". This vulnerability is fixed in 4.1.4. |
2026-04-09 | |
| CVE-2026-35041 | 4.2 | MEDIUM | CWE-1333 | 0.0% p12 | 2.94 | fast-jwt provides fast JSON Web Token (JWT) implementation. From 5.0.0 to 6.2.0,...fast-jwt provides fast JSON Web Token (JWT) implementation. From 5.0.0 to 6.2.0, a denial-of-service condition exists in fast-jwt when the allowedAud verification option is configured using a regular expression. Because the aud claim is attacker-controlled and the library evaluates it against the supplied RegExp, a crafted JWT can trigger catastrophic backtracking in the JavaScript regex engine, resulting in significant CPU consumption during verification. This vulnerability is fixed in 6.2.1. |
2026-04-09 | |
| CVE-2026-35040 | 5.3 | MEDIUM | CWE-440 | 0.1% p21 | 3.71 | fast-jwt provides fast JSON Web Token (JWT) implementation. Prior to 6.2.1, usin...fast-jwt provides fast JSON Web Token (JWT) implementation. Prior to 6.2.1, using certain modifiers on RegExp objects in the allowedAud, allowedIss, allowedSub, allowedJti, or allowedNonce options in verify functions can cause certain unintended behaviours. This is because some modifiers are stateful and will cause failures in every second verification attempt regardless of the validity of the token provided. Such modifiers are /g (global matching) and /y (sticky matching). This does NOT allow invalid tokens to be accepted, only for valid tokens to be improperly rejected in some configurations. Instead it causes 50% of valid authentication requests to fail in an alternating pattern. This vulnerability is fixed in 6.2.1. |
2026-04-09 | |
| CVE-2025-70365 | 5.4 | MEDIUM | CWE-79 | 0.0% p8 | 3.78 | A stored cross-site scripting (XSS) vulnerability exists in Kiamo before 8.4 due...A stored cross-site scripting (XSS) vulnerability exists in Kiamo before 8.4 due to improper output encoding of user-supplied input in administrative interfaces. An authenticated administrative user can inject arbitrary JavaScript code that is executed in the browser of users viewing the affected pages. |
2026-04-09 | |
| CVE-2025-70364 | 8.8 | HIGH | CWE-94 | 0.1% p16 | 6.16 | An issue was discovered in Kiamo before 8.4 allowing authenticated administrativ...An issue was discovered in Kiamo before 8.4 allowing authenticated administrative attackers to execute arbitrary PHP code on the server. |
2026-04-09 | |
| CVE-2025-15480 | 2.7 | LOW | CWE-1258 | 0.1% p17 | 1.89 | In Ubuntu, ubuntu-desktop-provision version 24.04.4 could leak sensitive user cr...In Ubuntu, ubuntu-desktop-provision version 24.04.4 could leak sensitive user credentials during crash reporting. Upon installation failure, if a user submitted a bug report to Launchpad, ubuntu-desktop-provision could include the user's password hash in the attached logs. |
2026-04-09 | |
| CVE-2025-14551 | 2.7 | LOW | CWE-1258 | 0.1% p17 | 1.89 | In Ubuntu, Subiquity version 24.04.4 could leak sensitive user credentials durin...In Ubuntu, Subiquity version 24.04.4 could leak sensitive user credentials during crash reporting. Upon installation failure, if a user submitted a bug report to Launchpad, Subiquity could include certain user credentials, such as the user's plaintext Wi-Fi password, in the attached logs. |
2026-04-09 | |
| CVE-2026-5959 | 7.5 | HIGH | CWE-287 | 0.1% p34 | 5.25 | A security flaw has been discovered in GL.iNet GL-RM1, GL-RM10, GL-RM10RC and GL...A security flaw has been discovered in GL.iNet GL-RM1, GL-RM10, GL-RM10RC and GL-RM1PE 1.8.1. Affected by this issue is some unknown functionality of the component Factory Reset Handler. Performing a manipulation results in improper authentication. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. Upgrading to version 1.8.2 can resolve this issue. It is advisable to upgrade the affected component. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product. |
2026-04-09 | |
| CVE-2026-5445 | 9.1 | CRITICAL | CWE-125 | 0.1% p19 | 6.37 | An out-of-bounds read vulnerability exists in the `DecodeLookupTable` function w...An out-of-bounds read vulnerability exists in the `DecodeLookupTable` function within `DicomImageDecoder.cpp`. The lookup-table decoding logic used for `PALETTE COLOR` images does not validate pixel indices against the lookup table size. Crafted images containing indices larger than the palette size cause the decoder to read beyond allocated lookup table memory and expose heap contents in the output image. |
2026-04-09 | |
| CVE-2026-5444 | 7.1 | HIGH | CWE-787 | 0.0% p2 | 4.97 | A heap buffer overflow vulnerability exists in the PAM image parsing logic. When...A heap buffer overflow vulnerability exists in the PAM image parsing logic. When Orthanc processes a crafted PAM image embedded in a DICOM file, image dimensions are multiplied using 32-bit unsigned arithmetic. Specially chosen values can cause an integer overflow during buffer size calculation, resulting in the allocation of a small buffer followed by a much larger write operation during pixel processing. |
2026-04-09 | |
| CVE-2026-5443 | 9.8 | CRITICAL | CWE-787 | 0.1% p19 | 6.86 | A heap buffer overflow vulnerability exists during the decoding of `PALETTE COLO...A heap buffer overflow vulnerability exists during the decoding of `PALETTE COLOR` DICOM images. Pixel length validation uses 32-bit multiplication for width and height calculations. If these values overflow, the validation check incorrectly succeeds, allowing the decoder to read and write to memory beyond allocated buffers. |
2026-04-09 | |
| CVE-2026-5442 | 9.8 | CRITICAL | CWE-787 | 0.1% p19 | 6.86 | A heap buffer overflow vulnerability exists in the DICOM image decoder. Dimensio...A heap buffer overflow vulnerability exists in the DICOM image decoder. Dimension fields are encoded using Value Representation (VR) Unsigned Long (UL), instead of the expected VR Unsigned Short (US), which allows extremely large dimensions to be processed. This causes an integer overflow during frame size calculation and results in out-of-bounds memory access during image decoding. |
2026-04-09 | |
| CVE-2026-5441 | 7.1 | HIGH | CWE-125 | 0.0% p2 | 4.97 | An out-of-bounds read vulnerability exists in the `DecodePsmctRle1` function of ...An out-of-bounds read vulnerability exists in the `DecodePsmctRle1` function of `DicomImageDecoder.cpp`. The `PMSCT_RLE1` decompression routine, which decodes the proprietary Philips Compression format, does not properly validate escape markers placed near the end of the compressed data stream. A crafted sequence at the end of the buffer can cause the decoder to read beyond the allocated memory region and leak heap data into the rendered image output. |
2026-04-09 | |
| CVE-2026-5440 | 7.5 | HIGH | CWE-770 | 1.6% p81 | 5.30 | A memory exhaustion vulnerability exists in the HTTP server due to unbounded use...A memory exhaustion vulnerability exists in the HTTP server due to unbounded use of the `Content-Length` header. The server allocates memory directly based on the attacker supplied header value without enforcing an upper limit. A crafted HTTP request containing an extremely large `Content-Length` value can trigger excessive memory allocation and server termination, even without sending a request body. |
2026-04-09 | |
| CVE-2026-5439 | 7.5 | HIGH | CWE-770 | 0.1% p15 | 5.25 | A memory exhaustion vulnerability exists in ZIP archive processing. Orthanc auto...A memory exhaustion vulnerability exists in ZIP archive processing. Orthanc automatically extracts ZIP archives uploaded to certain endpoints and trusts metadata fields describing the uncompressed size of archived files. An attacker can craft a small ZIP archive containing a forged size value, causing the server to allocate extremely large buffers during extraction. |
2026-04-09 | |
| CVE-2026-5438 | 7.5 | HIGH | CWE-770 | 0.1% p15 | 5.25 | A gzip decompression bomb vulnerability exists when Orthanc processes HTTP reque...A gzip decompression bomb vulnerability exists when Orthanc processes HTTP request with `Content-Encoding: gzip`. The server does not enforce limits on decompressed size and allocates memory based on attacker-controlled compression metadata. A specially crafted gzip payload can trigger excessive memory allocation and exhaust system memory. |
2026-04-09 | |
| CVE-2026-5437 | 7.5 | HIGH | CWE-125 | 0.0% p14 | 5.25 | An out-of-bounds read vulnerability exists in `DicomStreamReader` during DICOM m...An out-of-bounds read vulnerability exists in `DicomStreamReader` during DICOM meta-header parsing. When processing malformed metadata structures, the parser may read beyond the bounds of the allocated metadata buffer. Although this issue does not typically crash the server or expose data directly to the attacker, it reflects insufficient input validation in the parsing logic. |
2026-04-09 | |
| CVE-2026-4116 | 7.2 | HIGH | CWE-176 | 0.1% p33 | 5.04 | Improper handling of Unicode encoding in SonicWall SMA1000 series appliances all...Improper handling of Unicode encoding in SonicWall SMA1000 series appliances allows a remote authenticated SSLVPN user to bypass Workplace/Connect Tunnel TOTP authentication. |
2026-04-09 | |
| CVE-2026-4114 | 0.0 | NONE | CWE-176 | 0.0% p11 | 0.00 | Improper handling of Unicode encoding in SonicWall SMA1000 series appliances all...Improper handling of Unicode encoding in SonicWall SMA1000 series appliances allows a remote authenticated SSLVPN admin to bypass AMC TOTP authentication. |
2026-04-09 | |
| CVE-2026-4113 | 7.2 | HIGH | CWE-204 | 0.1% p25 | 5.04 | An observable response discrepancy vulnerability in the SonicWall SMA1000 series...An observable response discrepancy vulnerability in the SonicWall SMA1000 series appliances allows a remote attacker to enumerate SSL VPN user credentials. |
2026-04-09 | |
| CVE-2026-4112 | 0.0 | NONE | CWE-89 | 0.1% p21 | 0.00 | Improper neutralization of special elements used in an SQL command (“SQL Injecti...Improper neutralization of special elements used in an SQL command (“SQL Injection”) in SonicWall SMA1000 series appliances allows a remote authenticated attacker with read-only administrator privileges to escalate privileges to primary administrator. |
2026-04-09 | |
| CVE-2026-34757 | 5.1 | MEDIUM | CWE-416 | 0.0% p3 | 3.57 | LIBPNG is a reference library for use in applications that read, create, and man...LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From 1.0.9 to before 1.6.57, passing a pointer obtained from png_get_PLTE, png_get_tRNS, or png_get_hIST back into the corresponding setter on the same png_struct/png_info pair causes the setter to read from freed memory and copy its contents into the replacement buffer. The setter frees the internal buffer before copying from the caller-supplied pointer, which now dangles. The freed region may contain stale data (producing silently corrupted chunk metadata) or data from subsequent heap allocations (leaking unrelated heap contents into the chunk struct). This vulnerability is fixed in 1.6.57. |
2026-04-09 | |
| CVE-2026-34578 | 8.2 | HIGH | CWE-90 | 0.2% p43 | 5.75 | OPNsense is a FreeBSD based firewall and routing platform. Prior to 26.1.6, OPNs...OPNsense is a FreeBSD based firewall and routing platform. Prior to 26.1.6, OPNsense's LDAP authentication connector passes the login username directly into an LDAP search filter without calling ldap_escape(). An unauthenticated attacker can inject LDAP filter metacharacters into the username field of the WebGUI login page to enumerate valid LDAP usernames in the configured directory. When the LDAP server configuration includes an Extended Query to restrict login to members of a specific group, the same injection can be used to bypass that group membership restriction and authenticate as any LDAP user whose password is known, regardless of group membership. This vulnerability is fixed in 26.1.6. |
2026-04-09 | |
| CVE-2025-70811 | 4.3 | MEDIUM | CWE-352 | 0.0% p4 | 3.01 | Cross Site Request Forgery vulnerability in Phpbb phbb3 v.3.3.15 allows a local ...Cross Site Request Forgery vulnerability in Phpbb phbb3 v.3.3.15 allows a local attacker to execute arbitrary code via the Admin Control Panel icon management functionality. |
2026-04-09 | |
| CVE-2025-70810 | 8.8 | HIGH | CWE-352 | 0.0% p8 | 6.16 | Cross Site Request Forgery vulnerability in Phpbb phbb3 v.3.3.15 allows a local ...Cross Site Request Forgery vulnerability in Phpbb phbb3 v.3.3.15 allows a local attacker to execute arbitrary code via the login function and the authentication mechanism |
2026-04-09 | |
| CVE-2025-62718 | 9.3 | CRITICAL | CWE-441 | 0.0% p9 | 6.51 | Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15....Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.0 and 0.31.0, Axios does not correctly handle hostname normalization when checking NO_PROXY rules. Requests to loopback addresses like localhost. (with a trailing dot) or [::1] (IPv6 literal) skip NO_PROXY matching and go through the configured proxy. This goes against what developers expect and lets attackers force requests through a proxy, even if NO_PROXY is set up to protect loopback or internal services. This issue leads to the possibility of proxy bypass and SSRF vulnerabilities allowing attackers to reach sensitive loopback or internal services despite the configured protections. This vulnerability is fixed in 1.15.0 and 0.31.0. |
2026-04-09 | |
| CVE-2025-50228 | 9.1 | CRITICAL | CWE-918 | 0.0% p10 | 6.37 | Jizhicms v2.5.4 is vulnerable to Server-Side Request Forgery (SSRF) in User Eval...Jizhicms v2.5.4 is vulnerable to Server-Side Request Forgery (SSRF) in User Evaluation, Message, and Comment modules. |
2026-04-09 | |
| CVE-2026-4660 | 7.5 | HIGH | CWE-200 | 0.0% p12 | 5.25 | HashiCorp’s go-getter library up to v1.8.5 may allow arbitrary file reads on the...HashiCorp’s go-getter library up to v1.8.5 may allow arbitrary file reads on the file system during certain git operations through a maliciously crafted URL. This vulnerability, CVE-2026-4660, is fixed in go-getter v1.8.6. This vulnerability does not affect the go-getter/v2 branch and package. |
2026-04-09 | |
| CVE-2025-45806 | 6.1 | MEDIUM | CWE-79 | 0.0% p8 | 4.27 | A cross-site scripting (XSS) vulnerability in rrweb-snapshot before v2.0.0-alpha...A cross-site scripting (XSS) vulnerability in rrweb-snapshot before v2.0.0-alpha.18 allows attackers to execute arbitrary web scripts or HTML via a crafted payload. |
2026-04-09 | |
| CVE-2026-3005 | 6.4 | MEDIUM | CWE-79 | 0.0% p9 | 4.48 | The List category posts plugin for WordPress is vulnerable to Stored Cross-Site ...The List category posts plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'catlist' shortcode in all versions up to, and including, 0.94.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-04-09 | |
| CVE-2026-2519 | 5.3 | MEDIUM | CWE-472 | 0.0% p12 | 3.71 | The Online Scheduling and Appointment Booking System – Bookly plugin for WordPre...The Online Scheduling and Appointment Booking System – Bookly plugin for WordPress is vulnerable to price manipulation via the 'tips' parameter in all versions up to, and including, 27.0. This is due to the plugin trusting a user-supplied input without server-side validation against the configured price. This makes it possible for unauthenticated attackers to submit a negative number to the 'tips' parameter, causing the total price to be reduced to zero. |
2026-04-09 | |
| CVE-2026-24661 | 3.7 | LOW | CWE-770 | 0.1% p15 | 2.59 | Mattermost Plugins versions <=2.1.3.0 fail to limit the request body size on the...Mattermost Plugins versions <=2.1.3.0 fail to limit the request body size on the {{/changes}} webhook endpoint which allows an authenticated attacker to cause memory exhaustion and denial of service via sending an oversized JSON payload. Mattermost Advisory ID: MMSA-2026-00611 |
2026-04-09 | |
| CVE-2026-21388 | 3.7 | LOW | CWE-770 | 0.1% p15 | 2.59 | Mattermost Plugins versions <=2.3.1 fail to limit the request body size on the {...Mattermost Plugins versions <=2.3.1 fail to limit the request body size on the {{/lifecycle}} webhook endpoint which allows an authenticated attacker to cause memory exhaustion and denial of service via sending an oversized JSON payload. Mattermost Advisory ID: MMSA-2026-00610 |
2026-04-09 | |
| CVE-2024-1490 | 7.2 | HIGH | CWE-94 | 0.1% p26 | 5.04 | An authenticated remote attacker with high privileges can exploit the OpenVPN co...An authenticated remote attacker with high privileges can exploit the OpenVPN configuration via the web-based management interface of a WAGO PLC. If user-defined scripts are permitted, OpenVPN may allow the execution of arbitrary shell commands enabling the attacker to run arbitrary commands on the device. |
2026-04-09 | |
| CVE-2026-4901 | 6.9 | MEDIUM | CWE-532 | 0.1% p15 | 4.83 | Hydrosystem Control System saves sensitive information into a log file. Critical...Hydrosystem Control System saves sensitive information into a log file. Critically, user credentials are logged allowing the attacker to obtain further authorized access into the system. Combined with vulnerability CVE-2026-34184, these sensitive information could be accessed by an unauthorized user.This issue was fixed in Hydrosystem Control System version 9.8.5 |
2026-04-09 | |
| CVE-2026-34185 | 8.7 | HIGH | CWE-89 | 0.0% p9 | 6.09 | Hydrosystem Control System is vulnerable to SQL Injection across most scripts an...Hydrosystem Control System is vulnerable to SQL Injection across most scripts and input parameters. Because no protections are in place, an authenticated attacker can inject arbitrary SQL commands, potentially gaining full control over the database.This issue was fixed in Hydrosystem Control System version 9.8.5 |
2026-04-09 | |
| CVE-2026-34184 | 8.8 | HIGH | CWE-862 | 0.1% p16 | 6.16 | Hydrosystem Control System does not enforce authorization for some directories. ...Hydrosystem Control System does not enforce authorization for some directories. This allows an unauthorized attacker to read all files in these directories and even execute some of them. Critically the attacker could run PHP scripts directly on the connected database.This issue was fixed in Hydrosystem Control System version 9.8.5 |
2026-04-09 | |
| CVE-2026-34179 | 9.1 | CRITICAL | CWE-915 | 0.1% p30 | 6.37 | In Canonical LXD versions 4.12 through 6.7, the doCertificateUpdate function in ...In Canonical LXD versions 4.12 through 6.7, the doCertificateUpdate function in lxd/certificates.go does not validate the Type field when handling PUT/PATCH requests to /1.0/certificates/{fingerprint} for restricted TLS certificate users, allowing a remote authenticated attacker to escalate privileges to cluster admin. |
2026-04-09 | |
| CVE-2026-34178 | 9.1 | CRITICAL | CWE-20 | 0.1% p16 | 6.37 | In Canonical LXD before 6.8, the backup import path validates project restrictio...In Canonical LXD before 6.8, the backup import path validates project restrictions against backup/index.yaml in the supplied tar archive but creates the instance from backup/container/backup.yaml, a separate file in the same archive that is never checked against project restrictions. An authenticated remote attacker with instance-creation permission in a restricted project can craft a backup archive where backup.yaml carries restricted settings such as security.privileged=true or raw.lxc directives, bypassing all project restriction enforcement and allowing full host compromise. |
2026-04-09 | |
| CVE-2026-34177 | 9.1 | CRITICAL | CWE-184 | 0.1% p33 | 6.37 | Canonical LXD versions 4.12 through 6.7 contain an incomplete denylist in isVMLo...Canonical LXD versions 4.12 through 6.7 contain an incomplete denylist in isVMLowLevelOptionForbidden (lxd/project/limits/permissions.go), which omits raw.apparmor and raw.qemu.conf from the set of keys blocked under the restricted.virtual-machines.lowlevel=block project restriction. A remote attacker with can_edit permission on a VM instance in a restricted project can inject an AppArmor rule and a QEMU chardev configuration that bridges the LXD Unix socket into the guest VM, enabling privilege escalation to LXD cluster administrator and subsequently to host root. |
2026-04-09 | |
| CVE-2026-5854 | 8.9 | HIGH | CWE-77 | 0.3% p55 | 6.24 | A vulnerability was detected in Totolink A7100RU 7.4cu.2313_b20191024. Affected ...A vulnerability was detected in Totolink A7100RU 7.4cu.2313_b20191024. Affected by this issue is the function setWiFiEasyCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Performing a manipulation of the argument merge results in os command injection. It is possible to initiate the attack remotely. The exploit is now public and may be used. |
2026-04-09 | |
| CVE-2026-5853 | 8.9 | HIGH | CWE-77 | 1.3% p79 | 6.27 | A security vulnerability has been detected in Totolink A7100RU 7.4cu.2313_b20191...A security vulnerability has been detected in Totolink A7100RU 7.4cu.2313_b20191024. Affected by this vulnerability is the function setIpv6LanCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Such manipulation of the argument addrPrefixLen leads to os command injection. The attack may be performed from remote. The exploit has been disclosed publicly and may be used. |
2026-04-09 | |
| CVE-2026-5852 | 8.9 | HIGH | CWE-77 | 1.3% p79 | 6.27 | A weakness has been identified in Totolink A7100RU 7.4cu.2313_b20191024. Affecte...A weakness has been identified in Totolink A7100RU 7.4cu.2313_b20191024. Affected is the function setIptvCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. This manipulation of the argument igmpVer causes os command injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be used for attacks. |
2026-04-09 | |
| CVE-2026-5851 | 8.9 | HIGH | CWE-77 | 1.3% p79 | 6.27 | A security flaw has been discovered in Totolink A7100RU 7.4cu.2313_b20191024. Th...A security flaw has been discovered in Totolink A7100RU 7.4cu.2313_b20191024. This impacts the function setUPnPCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument enable results in os command injection. The attack can be executed remotely. The exploit has been released to the public and may be used for attacks. |
2026-04-09 | |
| CVE-2026-5850 | 8.9 | HIGH | CWE-77 | 1.3% p79 | 6.27 | A vulnerability was identified in Totolink A7100RU 7.4cu.2313_b20191024. This af...A vulnerability was identified in Totolink A7100RU 7.4cu.2313_b20191024. This affects the function setVpnPassCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument pptpPassThru leads to os command injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used. |
2026-04-09 | |
| CVE-2026-5849 | 6.9 | MEDIUM | CWE-22 | 0.1% p24 | 4.83 | A vulnerability was determined in Tenda i12 1.0.0.11(3862). The impacted element...A vulnerability was determined in Tenda i12 1.0.0.11(3862). The impacted element is an unknown function of the component HTTP Handler. Executing a manipulation can lead to path traversal. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized. |
2026-04-09 | |
| CVE-2026-5848 | 5.1 | MEDIUM | CWE-74 | 0.1% p20 | 3.57 | A vulnerability was found in jeecgboot JimuReport up to 2.3.0. The affected elem...A vulnerability was found in jeecgboot JimuReport up to 2.3.0. The affected element is the function DriverManager.getConnection of the file /drag/onlDragDataSource/testConnection of the component Data Source Handler. Performing a manipulation of the argument dbUrl results in code injection. The attack may be initiated remotely. The exploit has been made public and could be used. The vendor confirmed the issue and will provide a fix in the upcoming release. |
2026-04-09 | |
| CVE-2026-5847 | 2.1 | LOW | CWE-200 | 0.0% p10 | 1.47 | A vulnerability has been found in code-projects Movie Ticketing System 1.0. Impa...A vulnerability has been found in code-projects Movie Ticketing System 1.0. Impacted is an unknown function of the file /db/moviedb.sql of the component SQL Database Backup File Handler. Such manipulation leads to information disclosure. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. |
2026-04-09 | |
| CVE-2026-5844 | 7.3 | HIGH | CWE-77 | 0.3% p50 | 5.12 | A vulnerability was found in D-Link DIR-882 1.01B02. Impacted is the function sp...A vulnerability was found in D-Link DIR-882 1.01B02. Impacted is the function sprintf of the file prog.cgi of the component HNAP1 SetNetworkSettings Handler. The manipulation of the argument IPAddress results in os command injection. The attack may be performed from remote. The exploit has been made public and could be used. This vulnerability only affects products that are no longer supported by the maintainer. |
2026-04-09 | |
| CVE-2026-5842 | 6.9 | MEDIUM | CWE-285 | 0.1% p18 | 4.83 | A security vulnerability has been detected in decolua 9router up to 0.3.47. The ...A security vulnerability has been detected in decolua 9router up to 0.3.47. The impacted element is an unknown function of the file /api of the component Administrative API Endpoint. The manipulation leads to authorization bypass. The attack is possible to be carried out remotely. The exploit has been disclosed publicly and may be used. Upgrading to version 0.3.75 is sufficient to resolve this issue. It is suggested to upgrade the affected component. |
2026-04-09 | |
| CVE-2026-5841 | 6.9 | MEDIUM | CWE-22 | 0.1% p24 | 4.83 | A weakness has been identified in Tenda i3 1.0.0.6(2204). The affected element i...A weakness has been identified in Tenda i3 1.0.0.6(2204). The affected element is the function R7WebsSecurityHandler of the component HTTP Handler. Executing a manipulation can lead to path traversal. The attack can be executed remotely. The exploit has been made available to the public and could be used for attacks. |
2026-04-09 | |
| CVE-2026-5840 | 5.1 | MEDIUM | CWE-74 | 0.0% p10 | 3.57 | A security flaw has been discovered in PHPGurukul News Portal Project 4.1. Impac...A security flaw has been discovered in PHPGurukul News Portal Project 4.1. Impacted is an unknown function of the file /admin/check_availability.php. Performing a manipulation of the argument Username results in sql injection. Remote exploitation of the attack is possible. The exploit has been released to the public and may be used for attacks. |
2026-04-09 | |
| CVE-2026-5839 | 5.1 | MEDIUM | CWE-74 | 0.0% p10 | 3.57 | A vulnerability was identified in PHPGurukul News Portal Project 4.1. This issue...A vulnerability was identified in PHPGurukul News Portal Project 4.1. This issue affects some unknown processing of the file /admin/add-subcategory.php. Such manipulation of the argument sucatdescription leads to sql injection. The attack may be launched remotely. The exploit is publicly available and might be used. |
2026-04-09 | |
| CVE-2026-5838 | 5.1 | MEDIUM | CWE-74 | 0.0% p10 | 3.57 | A vulnerability was determined in PHPGurukul News Portal Project 4.1. This vulne...A vulnerability was determined in PHPGurukul News Portal Project 4.1. This vulnerability affects unknown code of the file /admin/add-subadmins.php. This manipulation of the argument sadminusername causes sql injection. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized. |
2026-04-09 | |
| CVE-2026-5742 | 6.4 | MEDIUM | CWE-79 | 0.1% p19 | 4.48 | The UsersWP plugin for WordPress is vulnerable to Stored Cross-Site Scripting in...The UsersWP plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to and including 1.2.60. This is due to insufficient input sanitization of user-supplied URL fields and improper output escaping when rendering user profile data in badge widgets. This makes it possible for authenticated attackers, with subscriber-level access and above, to inject arbitrary web scripts that will execute whenever a user accesses a page containing the affected badge widget. |
2026-04-09 | |
| CVE-2026-4336 | 6.4 | MEDIUM | CWE-79 | 0.0% p14 | 4.48 | The Ultimate FAQ Accordion plugin for WordPress is vulnerable to Stored Cross-Si...The Ultimate FAQ Accordion plugin for WordPress is vulnerable to Stored Cross-Site Scripting via FAQ content in all versions up to, and including, 2.4.7. This is due to the plugin calling html_entity_decode() on post_content during rendering in the set_display_variables() function (View.FAQ.class.php, line 746), which converts HTML entity-encoded payloads back into executable HTML, combined with insufficient output escaping in the faq-answer.php template where the decoded content is echoed without wp_kses_post() or any other sanitization. The ufaq custom post type is registered with 'show_in_rest' => true and defaults to 'post' capability_type, allowing Author-level users to create and publish FAQs via the REST API. An Author can submit entity-encoded malicious HTML (e.g., <img src=x onerror=alert()>) which bypasses WordPress's kses sanitization at save time (since kses sees entities as plain text, not tags), but is then decoded back into executable HTML by html_entity_decode() at render time. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in FAQ pages that will execute whenever a user accesses an injected FAQ, either directly or via the [ultimate-faqs] shortcode. |
2026-04-09 | |
| CVE-2026-1830 | 9.8 | CRITICAL | CWE-862 | 0.2% p46 | 6.87 | The Quick Playground plugin for WordPress is vulnerable to Remote Code Execution...The Quick Playground plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.3.1. This is due to insufficient authorization checks on REST API endpoints that expose a sync code and allow arbitrary file uploads. This makes it possible for unauthenticated attackers to retrieve the sync code, upload PHP files with path traversal, and achieve remote code execution on the server. |
2026-04-09 | |
| CVE-2026-5837 | 6.9 | MEDIUM | CWE-74 | 0.0% p11 | 4.83 | A vulnerability was found in PHPGurukul News Portal Project 4.1. This affects an...A vulnerability was found in PHPGurukul News Portal Project 4.1. This affects an unknown part of the file /news-details.php. The manipulation of the argument Comment results in sql injection. The attack can be launched remotely. The exploit has been made public and could be used. |
2026-04-09 | |
| CVE-2026-5836 | 4.8 | MEDIUM | CWE-79 | 0.0% p9 | 3.36 | A vulnerability has been found in code-projects Online Shoe Store 1.0. Affected ...A vulnerability has been found in code-projects Online Shoe Store 1.0. Affected by this issue is some unknown functionality of the file /admin/admin_product.php. The manipulation of the argument product_name leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. |
2026-04-09 | |
| CVE-2026-5835 | 4.8 | MEDIUM | CWE-79 | 0.0% p9 | 3.36 | A flaw has been found in code-projects Online Shoe Store 1.0. Affected by this v...A flaw has been found in code-projects Online Shoe Store 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/admin_football.php. Executing a manipulation of the argument product_name can lead to cross site scripting. It is possible to launch the attack remotely. The exploit has been published and may be used. |
2026-04-09 | |
| CVE-2026-5834 | 4.8 | MEDIUM | CWE-79 | 0.0% p9 | 3.36 | A vulnerability was detected in code-projects Online Shoe Store 1.0. Affected is...A vulnerability was detected in code-projects Online Shoe Store 1.0. Affected is an unknown function of the file /admin/admin_running.php. Performing a manipulation of the argument product_name results in cross site scripting. It is possible to initiate the attack remotely. The exploit is now public and may be used. |
2026-04-09 | |
| CVE-2026-5833 | 4.8 | MEDIUM | CWE-74 | 0.3% p53 | 3.37 | A security vulnerability has been detected in awwaiid mcp-server-taskwarrior up ...A security vulnerability has been detected in awwaiid mcp-server-taskwarrior up to 1.0.1. This impacts the function server.setRequestHandler of the file index.ts. Such manipulation of the argument Identifier leads to command injection. The attack must be carried out locally. The exploit has been disclosed publicly and may be used. The name of the patch is 1ee3d282debfa0a99afeb41d22c4b2fd5a3148f2. Applying a patch is advised to resolve this issue. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product. |
2026-04-09 | |
| CVE-2026-5357 | 6.4 | MEDIUM | CWE-79 | 0.0% p12 | 4.48 | The Download Manager plugin for WordPress is vulnerable to Stored Cross-Site Scr...The Download Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'sid' parameter of the 'wpdm_members' shortcode in versions up to and including 3.3.52. This is due to insufficient input sanitization and output escaping on the user-supplied 'sid' shortcode attribute. The sid parameter is extracted without sanitization in the members() function and stored via update_post_meta(), then echoed directly into an HTML id attribute in the members.php template without applying esc_attr(). This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the injected page. |
2026-04-09 | |
| CVE-2026-4429 | 6.4 | MEDIUM | CWE-79 | 0.1% p19 | 4.48 | The OSM – OpenStreetMap plugin for WordPress is vulnerable to Stored Cross-Site ...The OSM – OpenStreetMap plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'marker_name' and 'file_color_list' shortcode attribute of the [osm_map_v3] shortcode in all versions up to and including 6.1.15. This is due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-04-09 | |
| CVE-2026-4124 | 5.4 | MEDIUM | CWE-862 | 0.1% p18 | 3.78 | The Ziggeo plugin for WordPress is vulnerable to Missing Authorization in all ve...The Ziggeo plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 3.1.1. The wp_ajax_ziggeo_ajax handler only verifies a nonce (check_ajax_referer) but performs no capability checks via current_user_can(). Furthermore, the nonce ('ziggeo_ajax_nonce') is exposed to all logged-in users on every page via the wp_head and admin_head hooks . This makes it possible for authenticated attackers, with Subscriber-level access and above, to invoke multiple administrative operations including: saving arbitrary translation strings (translations_panel_save_strings via update_option('ziggeo_translations')), creating/updating/deleting event templates (event_editor_save_template/update_template/remove_template via update_option('ziggeo_events')), modifying SDK application settings (sdk_applications operations), and managing notifications (notification_handler via update_option('ziggeo_notifications')). |
2026-04-09 | |
| CVE-2026-3574 | 4.4 | MEDIUM | CWE-79 | 0.0% p13 | 3.08 | The Experto Dashboard for WooCommerce plugin for WordPress is vulnerable to Stor...The Experto Dashboard for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's settings fields (including 'Navigation Font Size', 'Navigation Font Weight', 'Heading Font Size', 'Heading Font Weight', 'Text Font Size', and 'Text Font Weight') in all versions up to and including 1.0.4. This is due to insufficient input sanitization (no sanitize callback in register_setting()) and missing output escaping (no esc_attr() in the field_callback() printf output) on user-supplied values. This makes it possible for authenticated attackers, with Administrator-level access and above, to inject arbitrary web scripts in the plugin settings page that will execute whenever a user accesses the settings page. This only affects multi-site installations and installations where unfiltered_html has been disabled. |
2026-04-09 | |
| CVE-2026-3568 | 4.3 | MEDIUM | CWE-639 | 0.0% p10 | 3.01 | The MStore API plugin for WordPress is vulnerable to Insecure Direct Object Ref...The MStore API plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 4.18.3. This is due to the update_user_profile() function in controllers/flutter-user.php processing the 'meta_data' JSON parameter without any allowlist, blocklist, or validation of meta keys. The function reads raw JSON from php://input (line 1012), decodes it (line 1013), authenticates the user via cookie validation (line 1015), and then directly iterates over the user-supplied meta_data array passing arbitrary keys and values to update_user_meta() (line 1080) with no sanitization or restrictions. This makes it possible for authenticated attackers, with Subscriber-level access and above, to modify arbitrary user meta fields on their own accounts, including sensitive fields like wp_user_level (to escalate to administrator-level legacy checks), plugin-specific authorization flags (e.g., _wpuf_user_active, aiowps_account_status), and billing/profile fields with unsanitized values (potentially enabling Stored XSS in admin contexts). Note that wp_capabilities cannot be directly exploited this way because it requires a serialized array value, but wp_user_level (a simple integer) and numerous plugin-specific meta keys are exploitable. |
2026-04-09 | |
| CVE-2026-5832 | 6.9 | MEDIUM | CWE-918 | 0.1% p18 | 4.83 | A weakness has been identified in atototo api-lab-mcp up to 0.2.1. This affects ...A weakness has been identified in atototo api-lab-mcp up to 0.2.1. This affects the function analyze_api_spec/generate_test_scenarios/test_http_endpoint of the file src/mcp/http-server.ts of the component HTTP Interface. This manipulation of the argument source/url causes server-side request forgery. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be used for attacks. The project was informed of the problem early through an issue report but has not responded yet. |
2026-04-09 | |
| CVE-2026-5831 | 5.3 | MEDIUM | CWE-77 | 1.2% p79 | 3.75 | A security flaw has been discovered in Agions taskflow-ai up to 2.1.8. This impa...A security flaw has been discovered in Agions taskflow-ai up to 2.1.8. This impacts an unknown function of the file src/mcp/server/handlers.ts of the component terminal_execute. Performing a manipulation results in os command injection. The attack is possible to be carried out remotely. Upgrading to version 2.1.9 will fix this issue. The patch is named c1550b445b9f24f38c4414e9a545f5f79f23a0fe. Upgrading the affected component is recommended. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product. |
2026-04-09 | |
| CVE-2026-5830 | 7.4 | HIGH | CWE-119 | 0.0% p14 | 5.18 | A vulnerability was identified in Tenda AC15 15.03.05.18. This affects the funct...A vulnerability was identified in Tenda AC15 15.03.05.18. This affects the function websGetVar of the file /goform/SysToolChangePwd. Such manipulation of the argument oldPwd/newPwd/cfmPwd leads to stack-based buffer overflow. The attack can be executed remotely. The exploit is publicly available and might be used. |
2026-04-09 | |
| CVE-2026-5829 | 6.9 | MEDIUM | CWE-74 | 0.0% p11 | 4.83 | A vulnerability was determined in code-projects Simple IT Discussion Forum 1.0. ...A vulnerability was determined in code-projects Simple IT Discussion Forum 1.0. The impacted element is an unknown function of the file /pages/content.php. This manipulation of the argument post_id causes sql injection. Remote exploitation of the attack is possible. The exploit has been publicly disclosed and may be utilized. |
2026-04-09 | |
| CVE-2026-5828 | 6.9 | MEDIUM | CWE-74 | 0.0% p11 | 4.83 | A vulnerability was found in code-projects Simple IT Discussion Forum 1.0. The a...A vulnerability was found in code-projects Simple IT Discussion Forum 1.0. The affected element is an unknown function of the file /functions/addcomment.php. The manipulation of the argument postid results in sql injection. The attack may be launched remotely. The exploit has been made public and could be used. |
2026-04-09 | |
| CVE-2026-4326 | 8.8 | HIGH | CWE-862 | 0.1% p26 | 6.16 | The Vertex Addons for Elementor plugin for WordPress is vulnerable to Missing Au...The Vertex Addons for Elementor plugin for WordPress is vulnerable to Missing Authorization in all versions up to and including 1.6.4. This is due to improper authorization enforcement in the activate_required_plugins() function. Specifically, the current_user_can('install_plugins') capability check does not terminate execution when it fails — it only sets an error message variable while allowing the plugin installation and activation code to execute. The error response is only sent after the installation and activation have already completed. This makes it possible for authenticated attackers, with Subscriber-level access and above, to install and activate arbitrary plugins from the WordPress. |
2026-04-09 | |
| CVE-2026-5827 | 6.9 | MEDIUM | CWE-74 | 0.0% p11 | 4.83 | A vulnerability has been found in code-projects Simple IT Discussion Forum 1.0. ...A vulnerability has been found in code-projects Simple IT Discussion Forum 1.0. Impacted is an unknown function of the file /question-function.php. The manipulation of the argument content leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. |
2026-04-09 | |
| CVE-2026-5826 | 5.3 | MEDIUM | CWE-79 | 0.0% p1 | 3.71 | A flaw has been found in code-projects Simple IT Discussion Forum 1.0. This issu...A flaw has been found in code-projects Simple IT Discussion Forum 1.0. This issue affects some unknown processing of the file /edit-category.php. Executing a manipulation of the argument Category can lead to cross site scripting. The attack can be launched remotely. The exploit has been published and may be used. |
2026-04-09 | |
| CVE-2026-5825 | 5.3 | MEDIUM | CWE-79 | 0.0% p1 | 3.71 | A vulnerability was detected in code-projects Simple Laundry System 1.0. This vu...A vulnerability was detected in code-projects Simple Laundry System 1.0. This vulnerability affects unknown code of the file /delmemberinfo.php. Performing a manipulation of the argument userid results in cross site scripting. The attack can be initiated remotely. The exploit is now public and may be used. |
2026-04-09 | |
| CVE-2026-5824 | 6.9 | MEDIUM | CWE-74 | 0.0% p11 | 4.83 | A security vulnerability has been detected in code-projects Simple Laundry Syste...A security vulnerability has been detected in code-projects Simple Laundry System 1.0. This affects an unknown part of the file /userchecklogin.php. Such manipulation of the argument userid leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used. |
2026-04-09 | |
| CVE-2026-5823 | 5.3 | MEDIUM | CWE-74 | 0.0% p8 | 3.71 | A weakness has been identified in itsourcecode Construction Management System 1....A weakness has been identified in itsourcecode Construction Management System 1.0. Affected by this issue is some unknown functionality of the file /borrowed_tool_report.php. This manipulation of the argument Home causes sql injection. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be used for attacks. |
2026-04-09 | |
| CVE-2026-5815 | 7.4 | HIGH | CWE-119 | 0.1% p26 | 5.18 | A vulnerability was detected in D-Link DIR-645 1.01/1.02/1.03. Impacted is the f...A vulnerability was detected in D-Link DIR-645 1.01/1.02/1.03. Impacted is the function hedwigcgi_main of the file /cgi-bin/hedwig.cgi. The manipulation results in stack-based buffer overflow. The attack can be launched remotely. The exploit is now public and may be used. This vulnerability only affects products that are no longer supported by the maintainer. |
2026-04-09 | |
| CVE-2026-5814 | 6.9 | MEDIUM | CWE-74 | 0.0% p11 | 4.83 | A security vulnerability has been detected in PHPGurukul Online Course Registrat...A security vulnerability has been detected in PHPGurukul Online Course Registration 3.1. This issue affects some unknown processing of the file /admin/check_availability.php. The manipulation of the argument regno leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used. |
2026-04-09 | |
| CVE-2026-5813 | 6.9 | MEDIUM | CWE-74 | 0.0% p11 | 4.83 | A weakness has been identified in PHPGurukul Online Course Registration 3.1. Thi...A weakness has been identified in PHPGurukul Online Course Registration 3.1. This vulnerability affects unknown code of the file /check_availability.php. Executing a manipulation of the argument cid can lead to sql injection. It is possible to launch the attack remotely. The exploit has been made available to the public and could be used for attacks. |
2026-04-08 | |
| CVE-2026-5812 | 5.3 | MEDIUM | CWE-840 | 0.0% p13 | 3.71 | A security flaw has been discovered in SourceCodester Pharmacy Product Managemen...A security flaw has been discovered in SourceCodester Pharmacy Product Management System 1.0. This affects an unknown part of the file add-sales.php of the component POST Parameter Handler. Performing a manipulation of the argument txtqty results in business logic errors. It is possible to initiate the attack remotely. The exploit has been released to the public and may be used for attacks. |
2026-04-08 | |
| CVE-2026-5811 | 5.3 | MEDIUM | CWE-840 | 0.0% p13 | 3.71 | A vulnerability was identified in SourceCodester Online Food Ordering System 1.0...A vulnerability was identified in SourceCodester Online Food Ordering System 1.0. Affected by this issue is the function save_product of the file /Actions.php of the component POST Parameter Handler. Such manipulation of the argument price leads to business logic errors. The attack may be performed from remote. The exploit is publicly available and might be used. |
2026-04-08 | |
| CVE-2026-5173 | 8.5 | HIGH | CWE-749 | 0.0% p5 | 5.95 | GitLab has remediated an issue in GitLab CE/EE affecting all versions from 16.9....GitLab has remediated an issue in GitLab CE/EE affecting all versions from 16.9.6 before 18.8.9, 18.9 before 18.9.5, and 18.10 before 18.10.3 that could have allowed an authenticated user to invoke unintended server-side methods through websocket connections due to improper access control. |
2026-04-08 | |
| CVE-2026-4916 | 2.7 | LOW | CWE-862 | 0.0% p1 | 1.89 | GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.2 ...GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.2 before 18.8.9, 18.9 before 18.9.5, and 18.10 before 18.10.3 that could have allowed an authenticated user with custom role permissions to demote or remove higher-privileged group members due to improper authorization checks on member management operations. |
2026-04-08 | |
| CVE-2026-4398 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering...Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. |
2026-04-08 | |
| CVE-2026-4332 | 5.4 | MEDIUM | CWE-79 | 0.0% p4 | 3.78 | GitLab has remediated an issue in GitLab EE affecting all versions from 18.2 bef...GitLab has remediated an issue in GitLab EE affecting all versions from 18.2 before 18.8.9, 18.9 before 18.9.5, and 18.10 before 18.10.3 that, in customizable analytics dashboards, could have allowed an authenticated user to execute arbitrary JavaScript in the context of other users' browsers due to improper input sanitization. |
2026-04-08 | |
| CVE-2026-3438 | 5.1 | MEDIUM | CWE-79 | 0.3% p53 | 3.58 | A reflected cross-site scripting vulnerability exists in Sonatype Nexus Reposito...A reflected cross-site scripting vulnerability exists in Sonatype Nexus Repository versions 3.0.0 through 3.90.2 that allows unauthenticated remote attackers to execute arbitrary JavaScript in a victim's browser through a specially crafted URL. Exploitation requires user interaction. |
2026-04-08 | |
| CVE-2026-3199 | 9.4 | CRITICAL | CWE-502 | 0.1% p23 | 6.58 | A vulnerability in the task management component of Sonatype Nexus Repository ve...A vulnerability in the task management component of Sonatype Nexus Repository versions 3.22.1 through 3.90.2 allows an authenticated attacker with task creation permissions to execute arbitrary code, bypassing the nexus.scripts.allowCreation security control. |
2026-04-08 | |
| CVE-2026-2619 | 4.3 | MEDIUM | CWE-863 | 0.0% p2 | 3.01 | GitLab has remediated an issue in GitLab EE affecting all versions from 18.6 bef...GitLab has remediated an issue in GitLab EE affecting all versions from 18.6 before 18.8.9, 18.9 before 18.9.5, and 18.10 before 18.10.3 that under certain circumstances could have allowed an authenticated user with auditor privileges to modify vulnerability flag data in private projects due to incorrect authorization. |
2026-04-08 | |
| CVE-2026-2104 | 4.3 | MEDIUM | CWE-639 | 0.0% p2 | 3.01 | GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.2 ...GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.2 before 18.8.9, 18.9 before 18.9.5, and 18.10 before 18.10.3 that could have allowed an authenticated user to access confidential issues assigned to other users via CSV export due to insufficient authorization checks. |
2026-04-08 | |
| CVE-2026-1752 | 4.3 | MEDIUM | CWE-863 | 0.0% p1 | 3.01 | GitLab has remediated an issue in GitLab EE affecting all versions from 11.3 bef...GitLab has remediated an issue in GitLab EE affecting all versions from 11.3 before 18.8.9, 18.9 before 18.9.5, and 18.10 before 18.10.3 that could have allowed an authenticated user with developer-role permissions to modify protected environment settings due to improper authorization checks in the API. |
2026-04-08 | |
| CVE-2026-1516 | 5.7 | MEDIUM | CWE-94 | 0.0% p13 | 3.99 | GitLab has remediated an issue in GitLab EE affecting all versions from 18.0.0 b...GitLab has remediated an issue in GitLab EE affecting all versions from 18.0.0 before 18.8.9, 18.9 before 18.9.5, and 18.10 before 18.10.3 that in Code Quality reports could have allowed an authenticated user to leak IP addresses of users viewing the report via specially crafted content. |
2026-04-08 | |
| CVE-2026-1101 | 6.5 | MEDIUM | CWE-1284 | 0.0% p5 | 4.55 | GitLab has remediated an issue in GitLab EE affecting all versions from 18.2 bef...GitLab has remediated an issue in GitLab EE affecting all versions from 18.2 before 18.8.9, 18.9 before 18.9.5, and 18.10 before 18.10.3 that could have allowed an authenticated user to cause denial of service to the GitLab instance due to improper input validation in GraphQL queries. |
2026-04-08 | |
| CVE-2026-1092 | 7.5 | HIGH | CWE-1284 | 0.0% p11 | 5.25 | GitLab has remediated an issue in GitLab CE/EE affecting all versions from 12.10...GitLab has remediated an issue in GitLab CE/EE affecting all versions from 12.10 before 18.8.9, 18.9 before 18.9.5, and 18.10 before 18.10.3 that could have allowed an unauthenticated user to cause denial of service due to improper input validation of JSON payloads. |
2026-04-08 | |
| CVE-2025-9484 | 4.3 | MEDIUM | CWE-862 | 0.0% p2 | 3.01 | GitLab has remediated an issue in GitLab EE affecting all versions from 16.6 bef...GitLab has remediated an issue in GitLab EE affecting all versions from 16.6 before 18.8.9, 18.9 before 18.9.5, and 18.10 before 18.10.3 that under certain circumstances could have allowed an authenticated user to have access to other users' email addresses via certain GraphQL queries. |
2026-04-08 | |
| CVE-2025-12664 | 7.5 | HIGH | CWE-1284 | 0.1% p16 | 5.25 | GitLab has remediated an issue in GitLab CE/EE affecting all versions from 13.0 ...GitLab has remediated an issue in GitLab CE/EE affecting all versions from 13.0 before 18.8.9, 18.9 before 18.9.5, and 18.10 before 18.10.3 that could have allowed an unauthenticated user to cause denial of service by sending repeated GraphQL queries. |
2026-04-08 | |
| CVE-2026-5919 | 6.5 | MEDIUM | CWE-20 | 0.0% p11 | 4.55 | Insufficient validation of untrusted input in WebSockets in Google Chrome prior ...Insufficient validation of untrusted input in WebSockets in Google Chrome prior to 147.0.7727.55 allowed a remote attacker who had compromised the renderer process to bypass same origin policy via a crafted HTML page. (Chromium security severity: Low) |
2026-04-08 | |
| CVE-2026-5918 | 4.3 | MEDIUM | CWE-346 | 0.0% p3 | 3.01 | Inappropriate implementation in Navigation in Google Chrome prior to 147.0.7727....Inappropriate implementation in Navigation in Google Chrome prior to 147.0.7727.55 allowed a remote attacker who had compromised the renderer process to leak cross-origin data via a crafted HTML page. (Chromium security severity: Low) |
2026-04-08 | |
| CVE-2026-5915 | 8.1 | HIGH | CWE-20 | 0.1% p27 | 5.67 | Insufficient validation of untrusted input in WebML in Google Chrome prior to 14...Insufficient validation of untrusted input in WebML in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Low) |
2026-04-08 | |
| CVE-2026-5914 | 8.8 | HIGH | CWE-843 | 0.0% p6 | 6.16 | Type Confusion in CSS in Google Chrome prior to 147.0.7727.55 allowed an attacke...Type Confusion in CSS in Google Chrome prior to 147.0.7727.55 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension. (Chromium security severity: Low) |
2026-04-08 | |
| CVE-2026-5913 | 8.1 | HIGH | CWE-125 | 0.1% p24 | 5.67 | Out of bounds read in Blink in Google Chrome prior to 147.0.7727.55 allowed a re...Out of bounds read in Blink in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: Low) |
2026-04-08 | |
| CVE-2026-5912 | 8.8 | HIGH | CWE-472 | 0.1% p27 | 6.16 | Integer overflow in WebRTC in Google Chrome prior to 147.0.7727.55 allowed a rem...Integer overflow in WebRTC in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Low) |
2026-04-08 | |
| CVE-2026-5911 | 4.3 | MEDIUM | CWE-693 | 0.0% p9 | 3.01 | Policy bypass in ServiceWorkers in Google Chrome prior to 147.0.7727.55 allowed ...Policy bypass in ServiceWorkers in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to bypass content security policy via a crafted HTML page. (Chromium security severity: Low) |
2026-04-08 | |
| CVE-2026-5910 | 8.8 | HIGH | CWE-472 | 0.1% p24 | 6.16 | Integer overflow in Media in Google Chrome prior to 147.0.7727.55 allowed a remo...Integer overflow in Media in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to potentially exploit heap corruption via a crafted video file. (Chromium security severity: Low) |
2026-04-08 | |
| CVE-2026-5909 | 8.8 | HIGH | CWE-472 | 0.1% p24 | 6.16 | Integer overflow in Media in Google Chrome prior to 147.0.7727.55 allowed a remo...Integer overflow in Media in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to potentially exploit heap corruption via a crafted video file. (Chromium security severity: Low) |
2026-04-08 | |
| CVE-2026-5908 | 8.8 | HIGH | CWE-472 | 0.1% p24 | 6.16 | Integer overflow in Media in Google Chrome prior to 147.0.7727.55 allowed a remo...Integer overflow in Media in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to potentially exploit heap corruption via a crafted video file. (Chromium security severity: Low) |
2026-04-08 | |
| CVE-2026-5907 | 8.1 | HIGH | CWE-125 | 0.1% p24 | 5.67 | Insufficient data validation in Media in Google Chrome prior to 147.0.7727.55 al...Insufficient data validation in Media in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to perform an out of bounds memory read via a crafted video file. (Chromium security severity: Low) |
2026-04-08 | |
| CVE-2026-5906 | 4.3 | MEDIUM | CWE-451 | 0.0% p7 | 3.01 | Incorrect security UI in Omnibox in Google Chrome on Android prior to 147.0.7727...Incorrect security UI in Omnibox in Google Chrome on Android prior to 147.0.7727.55 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Low) |
2026-04-08 | |
| CVE-2026-5905 | 6.5 | MEDIUM | CWE-451 | 0.0% p5 | 4.55 | Incorrect security UI in Permissions in Google Chrome on Windows prior to 147.0....Incorrect security UI in Permissions in Google Chrome on Windows prior to 147.0.7727.55 allowed a remote attacker to perform domain spoofing via a crafted HTML page. (Chromium security severity: Low) |
2026-04-08 | |
| CVE-2026-5904 | 8.8 | HIGH | CWE-416 | 0.0% p8 | 6.16 | Use after free in V8 in Google Chrome prior to 147.0.7727.55 allowed an attacker...Use after free in V8 in Google Chrome prior to 147.0.7727.55 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension. (Chromium security severity: Low) |
2026-04-08 | |
| CVE-2026-5903 | 6.5 | MEDIUM | CWE-693 | 0.0% p8 | 4.55 | Policy bypass in IFrameSandbox in Google Chrome prior to 147.0.7727.55 allowed a...Policy bypass in IFrameSandbox in Google Chrome prior to 147.0.7727.55 allowed a remote attacker who convinced a user to engage in specific UI gestures to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Low) |
2026-04-08 | |
| CVE-2026-5902 | 9.8 | CRITICAL | CWE-362 | 0.1% p26 | 6.86 | Race in Media in Google Chrome on Android prior to 147.0.7727.55 allowed a remot...Race in Media in Google Chrome on Android prior to 147.0.7727.55 allowed a remote attacker who had compromised the renderer process to corrupt media stream metadata via a crafted HTML page. (Chromium security severity: Low) |
2026-04-08 | |
| CVE-2026-5901 | 6.5 | MEDIUM | CWE-602 | 0.0% p5 | 4.55 | Insufficient policy enforcement in DevTools in Google Chrome prior to 147.0.7727...Insufficient policy enforcement in DevTools in Google Chrome prior to 147.0.7727.55 allowed an attacker who convinced a user to install a malicious extension to bypass enterprise host restrictions for cookie modification via a crafted Chrome Extension. (Chromium security severity: Low) |
2026-04-08 | |
| CVE-2026-5900 | 4.3 | MEDIUM | CWE-693 | 0.0% p8 | 3.01 | Policy bypass in Downloads in Google Chrome prior to 147.0.7727.55 allowed a rem...Policy bypass in Downloads in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to bypass of multi-download protections via a crafted HTML page. (Chromium security severity: Low) |
2026-04-08 | |
| CVE-2026-5899 | 6.1 | MEDIUM | CWE-346 | 0.0% p2 | 4.27 | Insufficient policy enforcement in History Navigation in Google Chrome prior to ...Insufficient policy enforcement in History Navigation in Google Chrome prior to 147.0.7727.55 allowed a remote attacker who convinced a user to engage in specific UI gestures to inject arbitrary scripts or HTML (UXSS) via a crafted HTML page. (Chromium security severity: Low) |
2026-04-08 | |
| CVE-2026-5898 | 4.3 | MEDIUM | CWE-451 | 0.0% p7 | 3.01 | Incorrect security UI in Omnibox in Google Chrome on iOS prior to 147.0.7727.55 ...Incorrect security UI in Omnibox in Google Chrome on iOS prior to 147.0.7727.55 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low) |
2026-04-08 | |
| CVE-2026-5897 | 4.3 | MEDIUM | CWE-451 | 0.0% p7 | 3.01 | Incorrect security UI in Downloads in Google Chrome prior to 147.0.7727.55 allow...Incorrect security UI in Downloads in Google Chrome prior to 147.0.7727.55 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low) |
2026-04-08 | |
| CVE-2026-5896 | 6.1 | MEDIUM | CWE-693 | 0.0% p8 | 4.27 | Policy bypass in Audio in Google Chrome prior to 147.0.7727.55 allowed a remote ...Policy bypass in Audio in Google Chrome prior to 147.0.7727.55 allowed a remote attacker who convinced a user to engage in specific UI gestures to bypass sandbox download restrictions via a crafted HTML page. (Chromium security severity: Low) |
2026-04-08 | |
| CVE-2026-5895 | 5.4 | MEDIUM | CWE-451 | 0.1% p20 | 3.78 | Incorrect security UI in Omnibox in Google Chrome on iOS prior to 147.0.7727.55 ...Incorrect security UI in Omnibox in Google Chrome on iOS prior to 147.0.7727.55 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name. (Chromium security severity: Low) |
2026-04-08 | |
| CVE-2026-5894 | 4.3 | MEDIUM | CWE-358 | 0.0% p5 | 3.01 | Inappropriate implementation in PDF in Google Chrome prior to 147.0.7727.55 allo...Inappropriate implementation in PDF in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Low) |
2026-04-08 | |
| CVE-2026-5893 | 6.8 | MEDIUM | CWE-362 | 0.0% p8 | 4.76 | Race in V8 in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to ...Race in V8 in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium) |
2026-04-08 | |
| CVE-2026-5892 | 6.6 | MEDIUM | CWE-1268 | 0.0% p7 | 4.62 | Insufficient policy enforcement in PWAs in Google Chrome prior to 147.0.7727.55 ...Insufficient policy enforcement in PWAs in Google Chrome prior to 147.0.7727.55 allowed a remote attacker who had compromised the renderer process to install a PWA without user consent via a crafted HTML page. (Chromium security severity: Medium) |
2026-04-08 | |
| CVE-2026-5891 | 4.3 | MEDIUM | CWE-451 | 0.1% p16 | 3.01 | Insufficient policy enforcement in browser UI in Google Chrome prior to 147.0.77...Insufficient policy enforcement in browser UI in Google Chrome prior to 147.0.7727.55 allowed a remote attacker who had compromised the renderer process to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium) |
2026-04-08 | |
| CVE-2026-5890 | 0.0 | NONE | CWE-362 | 0.0% p11 | 0.00 | Race in WebCodecs in Google Chrome prior to 147.0.7727.55 allowed a remote attac...Race in WebCodecs in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page. (Chromium security severity: Medium) |
2026-04-08 | |
| CVE-2026-5889 | 4.3 | MEDIUM | CWE-326 | 0.0% p0 | 3.01 | Cryptographic Flaw in PDFium in Google Chrome prior to 147.0.7727.55 allowed an ...Cryptographic Flaw in PDFium in Google Chrome prior to 147.0.7727.55 allowed an attacker to read potentially sensitive information from encrypted PDFs via a brute-force attack. (Chromium security severity: Medium) |
2026-04-08 | |
| CVE-2026-5888 | 6.5 | MEDIUM | CWE-457 | 0.0% p8 | 4.55 | Uninitialized Use in WebCodecs in Google Chrome prior to 147.0.7727.55 allowed a...Uninitialized Use in WebCodecs in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page. (Chromium security severity: Medium) |
2026-04-08 | |
| CVE-2026-5887 | 4.3 | MEDIUM | CWE-20 | 0.0% p10 | 3.01 | Insufficient validation of untrusted input in Downloads in Google Chrome on Wind...Insufficient validation of untrusted input in Downloads in Google Chrome on Windows prior to 147.0.7727.55 allowed a remote attacker to bypass download restrictions via a crafted HTML page. (Chromium security severity: Medium) |
2026-04-08 | |
| CVE-2026-5886 | 5.3 | MEDIUM | CWE-125 | 0.0% p8 | 3.71 | Out of bounds read in WebAudio in Google Chrome on Mac prior to 147.0.7727.55 al...Out of bounds read in WebAudio in Google Chrome on Mac prior to 147.0.7727.55 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page. (Chromium security severity: Medium) |
2026-04-08 | |
| CVE-2026-5885 | 6.5 | MEDIUM | CWE-20 | 0.0% p13 | 4.55 | Insufficient validation of untrusted input in WebML in Google Chrome on Windows ...Insufficient validation of untrusted input in WebML in Google Chrome on Windows prior to 147.0.7727.55 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page. (Chromium security severity: Medium) |
2026-04-08 | |
| CVE-2026-5884 | 8.8 | HIGH | CWE-20 | 0.1% p33 | 6.16 | Insufficient validation of untrusted input in Media in Google Chrome prior to 14...Insufficient validation of untrusted input in Media in Google Chrome prior to 147.0.7727.55 allowed a remote attacker who had compromised the renderer process to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Medium) |
2026-04-08 | |
| CVE-2026-5883 | 0.0 | NONE | CWE-416 | 0.1% p15 | 0.00 | Use after free in Media in Google Chrome prior to 147.0.7727.55 allowed a remote...Use after free in Media in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Medium) |
2026-04-08 | |
| CVE-2026-5882 | 4.3 | MEDIUM | CWE-451 | 0.0% p7 | 3.01 | Incorrect security UI in Fullscreen in Google Chrome prior to 147.0.7727.55 allo...Incorrect security UI in Fullscreen in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium) |
2026-04-08 | |
| CVE-2026-5881 | 6.5 | MEDIUM | CWE-284 | 0.0% p6 | 4.55 | Policy bypass in LocalNetworkAccess in Google Chrome prior to 147.0.7727.55 allo...Policy bypass in LocalNetworkAccess in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Medium) |
2026-04-08 | |
| CVE-2026-5880 | 4.3 | MEDIUM | CWE-451 | 0.0% p7 | 3.01 | Insufficient policy enforcement in browser UI in Google Chrome prior to 147.0.77...Insufficient policy enforcement in browser UI in Google Chrome prior to 147.0.7727.55 allowed a remote attacker who had compromised the renderer process to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium) |
2026-04-08 | |
| CVE-2026-5879 | 8.8 | HIGH | CWE-20 | 0.1% p35 | 6.16 | Insufficient validation of untrusted input in ANGLE in Google Chrome on Mac prio...Insufficient validation of untrusted input in ANGLE in Google Chrome on Mac prior to 147.0.7727.55 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Medium) |
2026-04-08 | |
| CVE-2026-5878 | 4.3 | MEDIUM | CWE-451 | 0.0% p7 | 3.01 | Incorrect security UI in Blink in Google Chrome prior to 147.0.7727.55 allowed a...Incorrect security UI in Blink in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium) |
2026-04-08 | |
| CVE-2026-5877 | 8.8 | HIGH | CWE-416 | 0.1% p34 | 6.16 | Use after free in Navigation in Google Chrome prior to 147.0.7727.55 allowed a r...Use after free in Navigation in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Medium) |
2026-04-08 | |
| CVE-2026-5876 | 6.5 | MEDIUM | CWE-1300 | 0.0% p10 | 4.55 | Side-channel information leakage in Navigation in Google Chrome prior to 147.0.7...Side-channel information leakage in Navigation in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium) |
2026-04-08 | |
| CVE-2026-5875 | 4.3 | MEDIUM | CWE-639 | 0.0% p6 | 3.01 | Policy bypass in Blink in Google Chrome prior to 147.0.7727.55 allowed a remote ...Policy bypass in Blink in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium) |
2026-04-08 | |
| CVE-2026-5874 | 9.6 | CRITICAL | CWE-416 | 0.1% p30 | 6.72 | Use after free in PrivateAI in Google Chrome prior to 147.0.7727.55 allowed a re...Use after free in PrivateAI in Google Chrome prior to 147.0.7727.55 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium) |
2026-04-08 | |
| CVE-2026-5873 | 8.8 | HIGH | CWE-125 | 0.1% p28 | 6.16 | Out of bounds read and write in V8 in Google Chrome prior to 147.0.7727.55 allow...Out of bounds read and write in V8 in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High) |
2026-04-08 | |
| CVE-2026-5872 | 8.8 | HIGH | CWE-416 | 0.1% p34 | 6.16 | Use after free in Blink in Google Chrome prior to 147.0.7727.55 allowed a remote...Use after free in Blink in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High) |
2026-04-08 | |
| CVE-2026-5871 | 8.8 | HIGH | CWE-843 | 0.1% p28 | 6.16 | Type Confusion in V8 in Google Chrome prior to 147.0.7727.55 allowed a remote at...Type Confusion in V8 in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High) |
2026-04-08 | |
| CVE-2026-5870 | 8.8 | HIGH | CWE-472 | 0.1% p28 | 6.16 | Integer overflow in Skia in Google Chrome prior to 147.0.7727.55 allowed a remot...Integer overflow in Skia in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High) |
2026-04-08 | |
| CVE-2026-5869 | 4.3 | MEDIUM | CWE-122 | 0.0% p8 | 3.01 | Heap buffer overflow in WebML in Google Chrome prior to 147.0.7727.55 allowed a ...Heap buffer overflow in WebML in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page. (Chromium security severity: High) |
2026-04-08 | |
| CVE-2026-5868 | 8.8 | HIGH | CWE-122 | 0.1% p25 | 6.16 | Heap buffer overflow in ANGLE in Google Chrome on Mac prior to 147.0.7727.55 all...Heap buffer overflow in ANGLE in Google Chrome on Mac prior to 147.0.7727.55 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High) |
2026-04-08 | |
| CVE-2026-5867 | 4.3 | MEDIUM | CWE-122 | 0.0% p8 | 3.01 | Heap buffer overflow in WebML in Google Chrome prior to 147.0.7727.55 allowed a ...Heap buffer overflow in WebML in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page. (Chromium security severity: High) |
2026-04-08 | |
| CVE-2026-5866 | 8.8 | HIGH | CWE-416 | 0.1% p34 | 6.16 | Use after free in Media in Google Chrome prior to 147.0.7727.55 allowed a remote...Use after free in Media in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High) |
2026-04-08 | |
| CVE-2026-5865 | 8.8 | HIGH | CWE-843 | 0.1% p28 | 6.16 | Type Confusion in V8 in Google Chrome prior to 147.0.7727.55 allowed a remote at...Type Confusion in V8 in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High) |
2026-04-08 | |
| CVE-2026-5864 | 4.3 | MEDIUM | CWE-122 | 0.0% p8 | 3.01 | Heap buffer overflow in WebAudio in Google Chrome prior to 147.0.7727.55 allowed...Heap buffer overflow in WebAudio in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page. (Chromium security severity: High) |
2026-04-08 | |
| CVE-2026-5863 | 8.8 | HIGH | NVD-CWE-noinfo | 0.1% p28 | 6.16 | Inappropriate implementation in V8 in Google Chrome prior to 147.0.7727.55 allow...Inappropriate implementation in V8 in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High) |
2026-04-08 | |
| CVE-2026-5862 | 8.8 | HIGH | NVD-CWE-noinfo | 0.1% p28 | 6.16 | Inappropriate implementation in V8 in Google Chrome prior to 147.0.7727.55 allow...Inappropriate implementation in V8 in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High) |
2026-04-08 | |
| CVE-2026-5861 | 8.8 | HIGH | CWE-416 | 0.1% p34 | 6.16 | Use after free in V8 in Google Chrome prior to 147.0.7727.55 allowed a remote at...Use after free in V8 in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High) |
2026-04-08 | |
| CVE-2026-5860 | 8.8 | HIGH | CWE-416 | 0.1% p31 | 6.16 | Use after free in WebRTC in Google Chrome prior to 147.0.7727.55 allowed a remot...Use after free in WebRTC in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High) |
2026-04-08 | |
| CVE-2026-5859 | 8.8 | HIGH | CWE-472 | 0.1% p23 | 6.16 | Integer overflow in WebML in Google Chrome prior to 147.0.7727.55 allowed a remo...Integer overflow in WebML in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical) |
2026-04-08 | |
| CVE-2026-5858 | 8.8 | HIGH | CWE-122 | 0.1% p23 | 6.16 | Heap buffer overflow in WebML in Google Chrome prior to 147.0.7727.55 allowed a ...Heap buffer overflow in WebML in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: Critical) |
2026-04-08 | |
| CVE-2026-5810 | 5.1 | MEDIUM | CWE-79 | 0.0% p8 | 3.57 | A flaw has been found in SourceCodester Sales and Inventory System 1.0. Affected...A flaw has been found in SourceCodester Sales and Inventory System 1.0. Affected is an unknown function of the file /delete.php of the component GET Parameter Handler. This manipulation of the argument ID causes cross site scripting. Remote exploitation of the attack is possible. The exploit has been published and may be used. |
2026-04-08 | |
| CVE-2026-5808 | 5.3 | MEDIUM | CWE-79 | 0.0% p11 | 3.71 | A vulnerability was detected in openstatusHQ openstatus up to 1b678e71a85961ae31...A vulnerability was detected in openstatusHQ openstatus up to 1b678e71a85961ae319cbb214a8eae634059330c. This impacts an unknown function of the file apps/dashboard/src/app/(dashboard)/onboarding/client.tsx of the component Onboarding Endpoint. The manipulation of the argument callbackURL results in cross site scripting. The attack may be launched remotely. This product operates on a rolling release basis, ensuring continuous delivery. Consequently, there are no version details for either affected or updated releases. The patch is identified as 43d9b2b9ef8ae1a98f9bdc8a9f86d6a3dfaa2dfb. It is advisable to implement a patch to correct this issue. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product. |
2026-04-08 | |
| CVE-2026-5806 | 5.1 | MEDIUM | CWE-79 | 0.0% p8 | 3.57 | A security vulnerability has been detected in code-projects Easy Blog Site 1.0. ...A security vulnerability has been detected in code-projects Easy Blog Site 1.0. This affects an unknown function of the file /posts/update.php. The manipulation of the argument postTitle leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used. |
2026-04-08 | |
| CVE-2026-5711 | 6.4 | MEDIUM | CWE-79 | 0.0% p10 | 4.48 | The Post Blocks & Tools plugin for WordPress is vulnerable to Stored Cross-Site ...The Post Blocks & Tools plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'sliderStyle' block attribute in the Posts Slider block in all versions up to, and including, 1.3.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-04-08 | |
| CVE-2026-40037 | 7.1 | HIGH | CWE-601 | 0.0% p9 | 4.97 | OpenClaw before 2026.3.31 (patched in 2026.4.8) contains a request body replay v...OpenClaw before 2026.3.31 (patched in 2026.4.8) contains a request body replay vulnerability in fetchWithSsrFGuard that allows unsafe request bodies to be resent across cross-origin redirects. Attackers can exploit this by triggering redirects to exfiltrate sensitive request data or headers to unintended origins. |
2026-04-08 | |
| CVE-2026-40036 | 8.7 | HIGH | CWE-409 | 0.1% p32 | 6.09 | Unfurl before 2026.04 contains an unbounded zlib decompression vulnerability in ...Unfurl before 2026.04 contains an unbounded zlib decompression vulnerability in parse_compressed.py that allows remote attackers to cause denial of service. Attackers can submit highly compressed payloads via URL parameters to the /json/visjs endpoint that expand to gigabytes, exhausting server memory and crashing the service. |
2026-04-08 | |
| CVE-2026-40035 | 9.3 | CRITICAL | CWE-489 | 0.1% p32 | 6.51 | Unfurl through 2025.08 contains an improper input validation vulnerability in co...Unfurl through 2025.08 contains an improper input validation vulnerability in config parsing that enables Flask debug mode by default. The debug configuration value is read as a string and passed directly to app.run(), causing any non-empty string to evaluate truthy, allowing attackers to access the Werkzeug debugger and disclose sensitive information or achieve remote code execution. |
2026-04-08 | |
| CVE-2026-40032 | 8.5 | HIGH | CWE-78 | 0.0% p5 | 5.95 | UAC (Unix-like Artifacts Collector) before 3.3.0-rc1 contains a command injectio...UAC (Unix-like Artifacts Collector) before 3.3.0-rc1 contains a command injection vulnerability in the placeholder substitution and command execution pipeline where the _run_command() function passes constructed command strings directly to eval without proper sanitization. Attackers can inject shell metacharacters or command substitutions through attacker-controlled inputs including %line% values from foreach iterators and %user% / %user_home% values derived from system files to achieve arbitrary command execution with the privileges of the UAC process. |
2026-04-08 | |
| CVE-2026-40031 | 8.5 | HIGH | CWE-427 | 0.0% p2 | 5.95 | MemProcFS before 5.17 contains multiple unsafe library-loading patterns that ena...MemProcFS before 5.17 contains multiple unsafe library-loading patterns that enable DLL and shared-library hijacking across six attack surfaces, including bare-name LoadLibraryU and dlopen calls without path qualification for vmmpyc, libMSCompression, and plugin DLLs. An attacker who places a malicious DLL or shared library in the working directory or manipulates LD_LIBRARY_PATH can achieve arbitrary code execution when MemProcFS loads. |
2026-04-08 | |
| CVE-2026-40030 | 8.4 | HIGH | CWE-78 | 0.0% p7 | 5.88 | parseusbs before 1.9 contains an OS command injection vulnerability where the vo...parseusbs before 1.9 contains an OS command injection vulnerability where the volume listing path argument (-v flag) is passed unsanitized into an os.popen() shell command with ls, allowing arbitrary command injection via crafted volume path arguments containing shell metacharacters. An attacker can provide a crafted volume path via the -v flag that injects arbitrary commands during volume content enumeration. |
2026-04-08 | |
| CVE-2026-40029 | 8.5 | HIGH | CWE-78 | 0.0% p7 | 5.95 | parseusbs before 1.9 contains an OS command injection vulnerability in parseUSBs...parseusbs before 1.9 contains an OS command injection vulnerability in parseUSBs.py where LNK file paths are passed unsanitized into an os.popen() shell command, allowing arbitrary command execution via crafted .lnk filenames containing shell metacharacters. An attacker can craft a .lnk filename with embedded shell metacharacters that execute arbitrary commands on the forensic examiner's machine during USB artifact parsing. |
2026-04-08 | |
| CVE-2026-40028 | 5.1 | MEDIUM | CWE-79 | 0.0% p8 | 3.57 | Hayabusa versions prior to 3.8.0 contain a cross-site scripting (XSS) vulnerabil...Hayabusa versions prior to 3.8.0 contain a cross-site scripting (XSS) vulnerability in its HTML report output that allows an attacker to execute arbitrary JavaScript when a user scans JSON-exported logs containing malicious content in the Computer field. An attacker can inject JavaScript into the Computer field of JSON logs that executes in the forensic examiner's browser session when viewing the generated HTML report, leading to information disclosure or code execution. |
2026-04-08 | |
| CVE-2026-40027 | 8.4 | HIGH | CWE-22 | 0.0% p1 | 5.88 | ALEAPP (Android Logs Events And Protobuf Parser) through 3.4.0 contains a path t...ALEAPP (Android Logs Events And Protobuf Parser) through 3.4.0 contains a path traversal vulnerability in the NQ_Vault.py artifact parser that uses attacker-controlled file_name_from values from a database directly as the output filename, allowing arbitrary file writes outside the report output directory. An attacker can embed a path traversal payload such as ../../../outside_written.bin in the database to write files to arbitrary locations, potentially achieving code execution by overwriting executable files or configuration. |
2026-04-08 | |
| CVE-2026-40026 | 4.8 | MEDIUM | CWE-125 | 0.0% p2 | 3.36 | The Sleuth Kit through 4.14.0 contains an out-of-bounds read vulnerability in th...The Sleuth Kit through 4.14.0 contains an out-of-bounds read vulnerability in the ISO9660 filesystem parser where the parse_susp() function trusts len_id, len_des, and len_src fields from the disk image to memcpy data into a stack buffer without verifying that the source data falls within the parsed SUSP block. An attacker can craft a malicious ISO image that causes reads past the end of the SUSP data buffer, and a zero-length SUSP entry can trigger an infinite parsing loop. |
2026-04-08 | |
| CVE-2026-40025 | 4.8 | MEDIUM | CWE-125 | 0.0% p1 | 3.36 | The Sleuth Kit through 4.14.0 contains an out-of-bounds read vulnerability in th...The Sleuth Kit through 4.14.0 contains an out-of-bounds read vulnerability in the APFS filesystem keybag parser where the wrapped_key_parser class follows attacker-controlled length fields without bounds checking, causing heap reads past the allocated buffer. An attacker can craft a malicious APFS disk image that triggers information disclosure or crashes when processed by any Sleuth Kit tool that parses APFS volumes. |
2026-04-08 | |
| CVE-2026-40024 | 8.4 | HIGH | CWE-22 | 0.0% p7 | 5.88 | The Sleuth Kit through 4.14.0 contains a path traversal vulnerability in tsk_rec...The Sleuth Kit through 4.14.0 contains a path traversal vulnerability in tsk_recover that allows an attacker to write files to arbitrary locations outside the intended recovery directory via crafted filenames or directory paths with path traversal sequences in a filesystem image. An attacker can craft a malicious filesystem image with embedded /../ sequences in filenames that, when processed by tsk_recover, writes files outside the output directory, potentially achieving code execution by overwriting shell configuration or cron entries. |
2026-04-08 | |
| CVE-2026-39901 | 5.7 | MEDIUM | CWE-285 | 0.0% p7 | 3.99 | monetr is a budgeting application focused on planning for recurring expenses. Pr...monetr is a budgeting application focused on planning for recurring expenses. Prior to 1.12.3, a transaction integrity flaw allows an authenticated tenant user to soft-delete synced non-manual transactions through the transaction update endpoint, despite the application explicitly blocking deletion of those transactions via the normal DELETE path. This bypass undermines the intended protection for imported transaction records and allows protected transactions to be hidden from normal views. This vulnerability is fixed in 1.12.3. |
2026-04-08 | |
| CVE-2026-5805 | 6.9 | MEDIUM | CWE-74 | 0.0% p11 | 4.83 | A weakness has been identified in code-projects Easy Blog Site up to 1.0. The im...A weakness has been identified in code-projects Easy Blog Site up to 1.0. The impacted element is an unknown function of the file /users/contact_us.php. Executing a manipulation of the argument Name can lead to sql injection. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks. |
2026-04-08 | |
| CVE-2026-5803 | 5.3 | MEDIUM | CWE-918 | 0.0% p14 | 3.71 | A security flaw has been discovered in bigsk1 openai-realtime-ui up to 188ccde27...A security flaw has been discovered in bigsk1 openai-realtime-ui up to 188ccde27fdf3d8fab8da81f3893468f53b2797c. The affected element is an unknown function of the file server.js of the component API Proxy Endpoint. Performing a manipulation of the argument Query results in server-side request forgery. The attack can be initiated remotely. The exploit has been released to the public and may be used for attacks. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The patch is named 54f8f50f43af97c334a881af7b021e84b5b8310f. It is suggested to install a patch to address this issue. |
2026-04-08 | |
| CVE-2026-5451 | 6.4 | MEDIUM | CWE-79 | 0.0% p12 | 4.48 | The Extensions for Leaflet Map plugin for WordPress is vulnerable to Stored Cros...The Extensions for Leaflet Map plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'elevation-track' shortcode in all versions up to, and including, 4.14. This is due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-04-08 | |
| CVE-2026-5436 | 8.1 | HIGH | CWE-22 | 0.2% p46 | 5.68 | The MW WP Form plugin for WordPress is vulnerable to Arbitrary File Move/Read in...The MW WP Form plugin for WordPress is vulnerable to Arbitrary File Move/Read in all versions up to and including 5.1.1. This is due to insufficient validation of the $name parameter (upload field key) passed to the generate_user_file_dirpath() function, which uses WordPress's path_join() — a function that returns absolute paths unchanged, discarding the intended base directory. The attacker-controlled key is injected via the mwf_upload_files[] POST parameter, which is loaded into the plugin's Data model via _set_request_valiables(). During form processing, regenerate_upload_file_keys() iterates over these keys and calls generate_user_filepath() with the attacker-supplied key as the $name argument — the key survives validation because the targeted file (e.g., wp-config.php) genuinely exists at the absolute path. The _get_attachments() method then re-reads the same surviving keys and passes the resolved file path to move_temp_file_to_upload_dir(), which calls rename() to move the file into the uploads folder. This makes it possible for unauthenticated attackers to move arbitrary files on the server, which can easily lead to remote code execution when the right file is moved (such as wp-config.php). The vulnerability is only exploitable if a file upload field is added to the form and the “Saving inquiry data in database” option is enabled. |
2026-04-08 | |
| CVE-2026-39892 | 6.9 | MEDIUM | CWE-119 | 0.1% p17 | 4.83 | cryptography is a package designed to expose cryptographic primitives and recipe...cryptography is a package designed to expose cryptographic primitives and recipes to Python developers. From 45.0.0 to before 46.0.7, if a non-contiguous buffer was passed to APIs which accepted Python buffers (e.g. Hash.update()), this could lead to buffer overflows. This vulnerability is fixed in 46.0.7. |
2026-04-08 | |
| CVE-2026-39891 | 8.8 | HIGH | CWE-94 | 0.1% p16 | 6.16 | PraisonAI is a multi-agent teams system. Prior to 4.5.115, the create_agent_cent...PraisonAI is a multi-agent teams system. Prior to 4.5.115, the create_agent_centric_tools() function returns tools (like acp_create_file) that process file content using template rendering. When user input from agent.start() is passed directly into these tools without escaping, template expressions in the input are executed rather than treated as literal text. This vulnerability is fixed in 4.5.115. |
2026-04-08 | |
| CVE-2026-39890 | 9.8 | CRITICAL | CWE-502 | 0.4% p59 | 6.87 | PraisonAI is a multi-agent teams system. Prior to 4.5.115, the AgentService.load...PraisonAI is a multi-agent teams system. Prior to 4.5.115, the AgentService.loadAgentFromFile method uses the js-yaml library to parse YAML files without disabling dangerous tags (such as !!js/function and !!js/undefined). This allows an attacker to craft a malicious YAML file that, when parsed, executes arbitrary JavaScript code. An attacker can exploit this vulnerability by uploading a malicious agent definition file via the API endpoint, leading to remote code execution (RCE) on the server. This vulnerability is fixed in 4.5.115. |
2026-04-08 | |
| CVE-2026-39889 | 7.5 | HIGH | CWE-200 | 0.0% p13 | 5.25 | PraisonAI is a multi-agent teams system. Prior to 4.5.115, the A2U (Agent-to-Use...PraisonAI is a multi-agent teams system. Prior to 4.5.115, the A2U (Agent-to-User) event stream server in PraisonAI exposes all agent activity without authentication. The create_a2u_routes() function registers the following endpoints with NO authentication checks: /a2u/info, /a2u/subscribe, /a2u/events/{stream_name}, /a2u/events/sub/{id}, and /a2u/health. This vulnerability is fixed in 4.5.115. |
2026-04-08 | |
| CVE-2026-39888 | 9.9 | CRITICAL | CWE-657 | 0.1% p26 | 6.93 | PraisonAI is a multi-agent teams system. Prior to 1.5.115, execute_code() in pra...PraisonAI is a multi-agent teams system. Prior to 1.5.115, execute_code() in praisonaiagents.tools.python_tools defaults to sandbox_mode="sandbox", which runs user code in a subprocess wrapped with a restricted __builtins__ dict and an AST-based blocklist. The AST blocklist embedded inside the subprocess wrapper (blocked_attrs of python_tools.py) contains only 11 attribute names — a strict subset of the 30+ names blocked in the direct-execution path. The four attributes that form a frame-traversal chain out of the sandbox are all absent from the subprocess list (__traceback__, tb_frame, f_back, and f_builtins). Chaining these attributes through a caught exception exposes the real Python builtins dict of the subprocess wrapper frame, from which exec can be retrieved and called under a non-blocked variable name — bypassing every remaining security layer. This vulnerability is fixed in 1.5.115. |
2026-04-08 | |
| CVE-2026-39885 | 7.5 | HIGH | CWE-918 | 0.0% p12 | 5.25 | FrontMCP is a TypeScript-first framework for the Model Context Protocol (MCP). P...FrontMCP is a TypeScript-first framework for the Model Context Protocol (MCP). Prior to 2.3.0, the mcp-from-openapi library uses @apidevtools/json-schema-ref-parser to dereference $ref pointers in OpenAPI specifications without configuring any URL restrictions or custom resolvers. A malicious OpenAPI specification containing $ref values pointing to internal network addresses, cloud metadata endpoints, or local files will cause the library to fetch those resources during the initialize() call. This enables Server-Side Request Forgery (SSRF) and local file read attacks when processing untrusted OpenAPI specifications. This vulnerability is fixed in 2.3.0. |
2026-04-08 | |
| CVE-2026-39883 | 7.3 | HIGH | CWE-426 | 0.0% p0 | 5.11 | OpenTelemetry-Go is the Go implementation of OpenTelemetry. From 1.15.0 to 1.42....OpenTelemetry-Go is the Go implementation of OpenTelemetry. From 1.15.0 to 1.42.0, the fix for CVE-2026-24051 changed the Darwin ioreg command to use an absolute path but left the BSD kenv command using a bare name, allowing the same PATH hijacking attack on BSD and Solaris platforms. This vulnerability is fixed in 1.43.0. |
2026-04-08 | |
| CVE-2026-39882 | 5.3 | MEDIUM | CWE-789 | 0.0% p5 | 3.71 | OpenTelemetry-Go is the Go implementation of OpenTelemetry. Prior to 1.43.0, the...OpenTelemetry-Go is the Go implementation of OpenTelemetry. Prior to 1.43.0, the otlp HTTP exporters (traces/metrics/logs) read the full HTTP response body into an in-memory bytes.Buffer without a size cap. This is exploitable for memory exhaustion when the configured collector endpoint is attacker-controlled (or a network attacker can mitm the exporter connection). This vulnerability is fixed in 1.43.0. |
2026-04-08 | |
| CVE-2026-39881 | 5.0 | MEDIUM | CWE-94 | 0.2% p36 | 3.50 | Vim is an open source, command line text editor. Prior to 9.2.0316, a command in...Vim is an open source, command line text editor. Prior to 9.2.0316, a command injection vulnerability in Vim's netbeans interface allows a malicious netbeans server to execute arbitrary Ex commands when Vim connects to it, via unsanitized strings in the defineAnnoType and specialKeys protocol messages. This vulnerability is fixed in 9.2.0316. |
2026-04-08 | |
| CVE-2026-39860 | 9.0 | CRITICAL | CWE-61 | 0.0% p5 | 6.30 | Nix is a package manager for Linux and other Unix systems. A bug in the fix for ...Nix is a package manager for Linux and other Unix systems. A bug in the fix for CVE-2024-27297 allowed for arbitrary overwrites of files writable by the Nix process orchestrating the builds (typically the Nix daemon running as root in multi-user installations) by following symlinks during fixed-output derivation output registration. This affects sandboxed Linux builds - sandboxed macOS builds are unaffected. The location of the temporary output used for the output copy was located inside the build chroot. A symlink, pointing to an arbitrary location in the filesystem, could be created by the derivation builder at that path. During output registration, the Nix process (running in the host mount namespace) would follow that symlink and overwrite the destination with the derivation's output contents. In multi-user installations, this allows all users able to submit builds to the Nix daemon (allowed-users - defaulting to all users) to gain root privileges by modifying sensitive files. This vulnerability is fixed in 2.34.5, 2.33.4, 2.32.7, 2.31.4, 2.30.4, 2.29.3, and 2.28.6. |
2026-04-08 | |
| CVE-2026-39844 | 5.9 | MEDIUM | CWE-22 | 0.1% p20 | 4.13 | NiceGUI is a Python-based UI framework. Prior to 3.10.0, Since PurePosixPath onl...NiceGUI is a Python-based UI framework. Prior to 3.10.0, Since PurePosixPath only recognizes forward slashes (/) as path separators, an attacker can bypass this sanitization on Windows by using backslashes (\) in the upload filename. Applications that construct file paths using file.name (a pattern demonstrated in NiceGUI's bundled examples) are vulnerable to arbitrary file write on Windows. This vulnerability is fixed in 3.10.0. |
2026-04-08 | |
| CVE-2026-39429 | 8.2 | HIGH | CWE-302 | 0.1% p23 | 5.74 | kcp is a Kubernetes-like control plane for form-factors and use-cases beyond Kub...kcp is a Kubernetes-like control plane for form-factors and use-cases beyond Kubernetes and container workloads. Prior to 0.30.3 and 0.29.3, the cache server is directly exposed by the root shard and has no authentication or authorization in place. This allows anyone who can access the root shard to read and write to the cache server. This vulnerability is fixed in 0.30.3 and 0.29.3. |
2026-04-08 | |
| CVE-2026-39416 | 8.5 | HIGH | CWE-79 | 0.1% p25 | 5.95 | AIL framework is an open-source platform to collect, crawl, process and analyse ...AIL framework is an open-source platform to collect, crawl, process and analyse unstructured data. Prior to 6.8, a stored cross-site scripting (XSS) vulnerability was identified in the modal item preview functionality. When item content longer than 800 characters was processed, attacker-controlled content was returned without an explicit text/plain content type, allowing the browser to interpret the response as active HTML. This could result in execution of arbitrary JavaScript in the context of an authenticated user viewing a crafted item. This vulnerability is fixed in 6.8. |
2026-04-08 | |
| CVE-2026-39415 | 5.3 | MEDIUM | CWE-602 | 0.1% p26 | 3.71 | Frappe Learning Management System (LMS) is a learning system that helps users st...Frappe Learning Management System (LMS) is a learning system that helps users structure their content. Prior to 2.46.0, a vulnerability has been identified in Frappe Learning where quiz scores can be modified by students before submission. The application currently relies on client-side calculated scores, which can be altered using browser developer tools prior to sending the submission request. While this does not allow modification of other users’ data or privilege escalation, it compromises the integrity of quiz results and undermines academic reliability. This issue affects data integrity but does not expose confidential information or allow unauthorized access to other accounts. This vulnerability is fixed in 2.46.0. |
2026-04-08 | |
| CVE-2026-39414 | 7.1 | HIGH | CWE-770 | 0.0% p10 | 4.97 | MinIO is a high-performance object storage system. From RELEASE.2018-08-18T03-49...MinIO is a high-performance object storage system. From RELEASE.2018-08-18T03-49-57Z to before RELEASE.2025-12-20T04-58-37Z, MinIO's S3 Select feature is vulnerable to memory exhaustion when processing CSV files containing lines longer than available memory. The CSV reader's nextSplit() function calls bufio.Reader.ReadBytes('\n') with no size limit, buffering the entire input in memory until a newline is found. A CSV file with no newline characters causes the entire contents to be read into a single allocation, leading to an OOM crash of the MinIO server process. This is exploitable by any authenticated user with s3:PutObject and s3:GetObject permissions. The attack is especially practical when combined with compression: a ~2 MB gzip-compressed CSV can decompress to gigabytes of data without newlines, allowing a small upload to cause large memory consumption on the server. However, compression is not required — a sufficiently large uncompressed CSV with no newlines triggers the same issue. |
2026-04-08 | |
| CVE-2026-5802 | 6.9 | MEDIUM | CWE-77 | 1.8% p82 | 4.88 | A vulnerability was identified in idachev mcp-javadc up to 1.2.4. Impacted is an...A vulnerability was identified in idachev mcp-javadc up to 1.2.4. Impacted is an unknown function of the component HTTP Interface. Such manipulation of the argument jarFilePath leads to os command injection. It is possible to launch the attack remotely. The exploit is publicly available and might be used. The project was informed of the problem early through an issue report but has not responded yet. |
2026-04-08 | |
| CVE-2026-39880 | 5.0 | MEDIUM | CWE-362 | 0.0% p8 | 3.50 | Remnawave Backend is the backend for the Remnawave proxy and user management sol...Remnawave Backend is the backend for the Remnawave proxy and user management solution. Prior to 2.7.5, a glitch in the HWID device registration logic allows an authenticated user to bypass the configured limit for HWID devices and register more devices than expected, allowing them to resell subscriptions and consume excessive traffic. This vulnerability is fixed in 2.7.5. |
2026-04-08 | |
| CVE-2026-39864 | 4.4 | MEDIUM | CWE-125 | 0.2% p42 | 3.09 | Kamailio is an open source implementation of a SIP Signaling Server. Prior to 6....Kamailio is an open source implementation of a SIP Signaling Server. Prior to 6.0.5 and 5.8.7, an out-of-bounds read in the auth module of Kamailio (formerly OpenSER and SER) allows remote attackers to cause a denial of service (process crash) via a specially crafted SIP packet if a successful user authentication without a database backend is followed by additional user identity checks. This vulnerability is fixed in 6.0.5 and 5.8.7. |
2026-04-08 | |
| CVE-2026-39863 | 7.5 | HIGH | CWE-119 | 0.1% p34 | 5.25 | Kamailio is an open source implementation of a SIP Signaling Server. Prior to 6....Kamailio is an open source implementation of a SIP Signaling Server. Prior to 6.1.1, 6.0.6, and 5.8.8, an out-of-bounds access in the core of Kamailio (formerly OpenSER and SER) allows remote attackers to cause a denial of service (process crash) via a specially crafted data packet sent over TCP. The issue impacts Kamailio instances having TCP or TLS listeners. This vulnerability is fixed in 5.1.1, 6.0.6, and 5.8.8. |
2026-04-08 | |
| CVE-2026-39862 | 6.3 | MEDIUM | CWE-78 | 0.5% p66 | 4.43 | Tophat is a mobile applications testing harness. Prior to 2.5.1, Tophat is affec...Tophat is a mobile applications testing harness. Prior to 2.5.1, Tophat is affected by remote code execution via crafted tophat:// or http://localhost:29070 URLs. The arguments query parameter flows unsanitized from URL parsing through to /bin/bash -c execution, allowing an attacker to execute arbitrary commands on a developer's macOS workstation. Any developer with Tophat installed is vulnerable. For previously trusted build hosts, no confirmation dialog appears. Attacker commands run with the user's permissions. This vulnerability is fixed in 2.5.1. |
2026-04-08 | |
| CVE-2026-39859 | 6.3 | MEDIUM | CWE-22 | 0.1% p18 | 4.41 | LiquidJS is a Shopify / GitHub Pages compatible template engine in pure JavaScri...LiquidJS is a Shopify / GitHub Pages compatible template engine in pure JavaScript. Prior to 10.25.3, liquidjs 10.25.0 documents root as constraining filenames passed to renderFile() and parseFile(), but top-level file loads do not enforce that boundary. A Liquid instance configured with an empty temporary directory as root can return the contents of arbitrary files. This vulnerability is fixed in 10.25.3. |
2026-04-08 | |
| CVE-2026-39413 | 4.2 | MEDIUM | CWE-347 | 0.0% p3 | 2.94 | LightRAG provides simple and fast retrieval-augmented generation. Prior to 1.4.1...LightRAG provides simple and fast retrieval-augmented generation. Prior to 1.4.14, the LightRAG API is vulnerable to a JWT algorithm confusion attack where an attacker can forge tokens by specifying 'alg': 'none' in the JWT header. Since the jwt.decode() call does not explicitly deny the 'none' algorithm, a crafted token without a signature will be accepted as valid, leading to unauthorized access. This vulnerability is fixed in 1.4.14. |
2026-04-08 | |
| CVE-2026-39412 | 5.3 | MEDIUM | CWE-200 | 0.0% p11 | 3.71 | LiquidJS is a Shopify / GitHub Pages compatible template engine in pure JavaScri...LiquidJS is a Shopify / GitHub Pages compatible template engine in pure JavaScript. Prior to 10.25.4, the sort_natural filter bypasses the ownPropertyOnly security option, allowing template authors to extract values of prototype-inherited properties through a sorting side-channel attack. Applications relying on ownPropertyOnly: true as a security boundary (e.g., multi-tenant template systems) are exposed to information disclosure of sensitive prototype properties such as API keys and tokens. This vulnerability is fixed in 10.25.4. |
2026-04-08 | |
| CVE-2026-39411 | 5.0 | MEDIUM | CWE-287 | 0.0% p5 | 3.50 | LobeHub is a work-and-lifestyle space to find, build, and collaborate with agent...LobeHub is a work-and-lifestyle space to find, build, and collaborate with agent teammates that grow with you. Prior to 2.1.48, the webapi authentication layer trusts a client-controlled X-lobe-chat-auth header that is only XOR-obfuscated, not signed or otherwise authenticated. Because the XOR key is hardcoded in the repository, an attacker can forge arbitrary auth payloads and bypass authentication on protected webapi routes. Affected routes include /webapi/chat/[provider], /webapi/models/[provider], /webapi/models/[provider]/pull, and /webapi/create-image/comfyui. This vulnerability is fixed in 2.1.48. |
2026-04-08 | |
| CVE-2026-39362 | 5.3 | MEDIUM | CWE-918 | 0.0% p13 | 3.71 | InvenTree is an Open Source Inventory Management System. Prior to 1.2.7 and 1.3....InvenTree is an Open Source Inventory Management System. Prior to 1.2.7 and 1.3.0, when INVENTREE_DOWNLOAD_FROM_URL is enabled (opt-in), authenticated users can supply remote_image URLs that are fetched server-side via requests.get() with only Django's URLValidator check. There is no validation against private IP ranges or internal hostnames. Redirects are followed (allow_redirects=True), enabling bypass of any URL-format checks. This vulnerability is fixed in 1.2.7 and 1.3.0. |
2026-04-08 | |
| CVE-2026-35525 | 8.2 | HIGH | CWE-61 | 0.1% p15 | 5.74 | LiquidJS is a Shopify / GitHub Pages compatible template engine in pure JavaScri...LiquidJS is a Shopify / GitHub Pages compatible template engine in pure JavaScript. Prior to 10.25.3, for {% include %}, {% render %}, and {% layout %}, LiquidJS checks whether the candidate path is inside the configured partials or layouts roots before reading it. That check is path-based, not realpath-based. Because of that, a file like partials/link.liquid passes the directory containment check as long as its pathname is under the allowed root. If link.liquid is actually a symlink to a file outside the allowed root, the filesystem follows the symlink when the file is opened and LiquidJS renders the external target. So the restriction is applied to the path string that was requested, not to the file that is actually read. This matters in environments where an attacker can place templates or otherwise influence files under a trusted template root, including uploaded themes, extracted archives, mounted content, or repository-controlled template trees. This vulnerability is fixed in 10.25.3. |
2026-04-08 | |
| CVE-2026-35479 | 6.6 | MEDIUM | CWE-285 | 0.0% p9 | 4.62 | InvenTree is an Open Source Inventory Management System. Prior to 1.2.7 and 1.3....InvenTree is an Open Source Inventory Management System. Prior to 1.2.7 and 1.3.0, any users who have staff access permissions can install plugins via the API, without requiring "superuser" account access. This level of permission requirement is out of alignment with other plugin actions (such as uninstalling) which do require superuser access. The vulnerability allows staff users (who may be considered to have a lower level of trust than a superuser account) to install arbitrary (and potentially harmful) plugins. This vulnerability is fixed in 1.2.7 and 1.3.0. |
2026-04-08 | |
| CVE-2026-35478 | 8.3 | HIGH | CWE-639 | 0.1% p20 | 5.81 | InvenTree is an Open Source Inventory Management System. From 0.16.0 to before 1...InvenTree is an Open Source Inventory Management System. From 0.16.0 to before 1.2.7, any authenticated InvenTree user can create a valid API token attributed to any other user in the system — including administrators and superusers — by supplying the target's user ID in the user field of a POST /api/user/tokens/ request. The returned token is immediately usable for full API authentication as the target user, from any network location, with no further interaction required. This vulnerability is fixed in 1.2.7 and 1.3.0. |
2026-04-08 | |
| CVE-2026-35477 | 5.5 | MEDIUM | CWE-1336 | 0.0% p8 | 3.85 | InvenTree is an Open Source Inventory Management System. From 1.2.3 to 1.2.6, th...InvenTree is an Open Source Inventory Management System. From 1.2.3 to 1.2.6, the fix for CVE-2026-27629 upgraded the PART_NAME_FORMAT validator to use jinja2.sandbox.SandboxedEnvironment. However, the actual renderer in part/helpers.py was not updated and still uses the non-sandboxed jinja2.Environment. Additionally, the validator uses a dummy Part instance with pk=None, which allows conditional template expressions to behave differently during validation versus production rendering. A staff user with settings access can craft a template that passes validation but executes arbitrary code during rendering. This issue requires access by a user with granted staff permissions. This vulnerability is fixed in 1.2.7 and 1.3.0. |
2026-04-08 | |
| CVE-2026-35476 | 7.2 | HIGH | CWE-285 | 0.0% p10 | 5.04 | InvenTree is an Open Source Inventory Management System. Prior to 1.2.7 and 1.3....InvenTree is an Open Source Inventory Management System. Prior to 1.2.7 and 1.3.0, a non-staff authenticated user can elevate their account to a staff level via a POST request against their user account endpoint. The write permissions on the API endpoint are improperly configured, allowing any user to change their staff status. This vulnerability is fixed in 1.2.7 and 1.3.0. |
2026-04-08 | |
| CVE-2026-23869 | 7.5 | HIGH | CWE-400 | 0.4% p62 | 5.26 | A denial of service vulnerability exists in React Server Components, affecting t...A denial of service vulnerability exists in React Server Components, affecting the following packages: react-server-dom-parcel, react-server-dom-turbopack and react-server-dom-webpack (versions 19.0.0 through 19.0.4, 19.1.0 through 19.1.5, and 19.2.0 through 19.2.4). The vulnerability is triggered by sending specially crafted HTTP requests to Server Function endpoints.The payload of the HTTP request causes excessive CPU usage for up to a minute ending in a thrown error that is catchable. |
2026-04-08 | |
| CVE-2026-39851 | 5.3 | MEDIUM | CWE-204 | 0.1% p17 | 3.71 | Saleor is an e-commerce platform. From 2.10.0 to before 3.23.0a3, 3.22.47, 3.21....Saleor is an e-commerce platform. From 2.10.0 to before 3.23.0a3, 3.22.47, 3.21.54, and 3.20.118, the requestEmailChange() mutation was revealing the existence of user-provided email addresses in error messages. This vulnerability is fixed in 3.23.0a3, 3.22.47, 3.21.54, and 3.20.118. |
2026-04-08 | |
| CVE-2026-35455 | 7.3 | HIGH | CWE-79 | 0.0% p5 | 5.11 | immich is a high performance self-hosted photo and video management solution. Pr...immich is a high performance self-hosted photo and video management solution. Prior to 2.7.0, sStored Cross-Site Scripting (XSS) in the 360° panorama viewer allows any authenticated user to execute arbitrary JavaScript in the browser of any other user who views the malicious panorama with the OCR overlay enabled. The attacker uploads an equirectangular image containing crafted text; OCR extracts it, and the panorama viewer renders it via innerHTML without sanitization. This enables session hijacking (via persistent API key creation), private photo exfiltration, and access to GPS location history and face biometric data. This vulnerability is fixed in 2.7.0. |
2026-04-08 | |
| CVE-2026-35446 | 7.7 | HIGH | CWE-552 | 0.0% p9 | 5.39 | LORIS (Longitudinal Online Research and Imaging System) is a self-hosted web app...LORIS (Longitudinal Online Research and Imaging System) is a self-hosted web application that provides data- and project-management for neuroimaging research. From 24.0.0 to before 27.0.3 and 28.0.1, an incorrect order of operations in the FilesDownloadHandler could result in an attacker escaping the intended download directories. This vulnerability is fixed in 27.0.3 and 28.0.1. |
2026-04-08 | |
| CVE-2026-35407 | 5.9 | MEDIUM | CWE-285 | 0.0% p10 | 4.13 | Saleor is an e-commerce platform. From 2.10.0 to before 3.23.0a3, 3.22.47, 3.21....Saleor is an e-commerce platform. From 2.10.0 to before 3.23.0a3, 3.22.47, 3.21.54, and 3.20.118, a business-logic and authorization flaw was found in the account email change workflow, the confirmation flow did not verify that the email change confirmation token was issued for the given authenticated user. As a result, a valid email-change token generated for one account can be replayed while authenticated as a different account. The second account’s email address is then updated to the token's new_email, even though that token was never issued for that account. This vulnerability is fixed in 3.23.0a3, 3.22.47, 3.21.54, and 3.20.118. |
2026-04-08 | |
| CVE-2026-35403 | 6.5 | MEDIUM | CWE-79 | 0.0% p9 | 4.55 | LORIS (Longitudinal Online Research and Imaging System) is a self-hosted web app...LORIS (Longitudinal Online Research and Imaging System) is a self-hosted web application that provides data- and project-management for neuroimaging research. From 15.10 to before 27.0.3 and 28.0.1, there is a potential for a cross-site scripting attack in the survey_accounts module if a user provides an invalid visit label. While the data is properly JSON encoded, the Content-Type header is not set causing the web browser to interpret the payload as HTML, opening the possibility of a cross-site scripting if a user is tricked into following an invalid link. This vulnerability is fixed in 27.0.3 and 28.0.1. |
2026-04-08 | |
| CVE-2026-35401 | 7.5 | HIGH | CWE-770 | 0.1% p16 | 5.25 | Saleor is an e-commerce platform. From 2.0.0 to before 3.23.0a3, 3.22.47, 3.21.5...Saleor is an e-commerce platform. From 2.0.0 to before 3.23.0a3, 3.22.47, 3.21.54, and 3.20.118, a malicious actor can include many GraphQL mutations or queries in a single API call using aliases or chaining multiple mutations, resulting in resource exhaustion. This vulnerability is fixed in 3.23.0a3, 3.22.47, 3.21.54, and 3.20.118. |
2026-04-08 | |
| CVE-2026-35400 | 3.5 | LOW | CWE-59 | 0.0% p7 | 2.45 | LORIS (Longitudinal Online Research and Imaging System) is a self-hosted web app...LORIS (Longitudinal Online Research and Imaging System) is a self-hosted web application that provides data- and project-management for neuroimaging research. From 20.0.0 to before 27.0.3 and 28.0.1, an endpoint in the publication module was incorrectly trusting the baseURL submitted by a user's POST request rather than the internal LORIS value. This could result in a theoretical attacker with publication module access forging an email to an external domain under the attacker's control which appeared to come from LORIS. This vulnerability is fixed in 27.0.3 and 28.0.1. |
2026-04-08 | |
| CVE-2026-35169 | 8.7 | HIGH | CWE-79 | 0.0% p9 | 6.09 | LORIS (Longitudinal Online Research and Imaging System) is a self-hosted web app...LORIS (Longitudinal Online Research and Imaging System) is a self-hosted web application that provides data- and project-management for neuroimaging research. From to before 27.0.3 and 28.0.1, the help_editor module of LORIS did not properly sanitize some user supplied variables which could result in a reflected cross-site scripting attack if a user is tricked into following an invalid link. The same input vector could also allow an attacker to download arbitrary markdown files on an unpatched server. This vulnerability is fixed in 27.0.3 and 28.0.1. |
2026-04-08 | |
| CVE-2026-35165 | 6.3 | MEDIUM | CWE-639 | 0.0% p8 | 4.41 | LORIS (Longitudinal Online Research and Imaging System) is a self-hosted web app...LORIS (Longitudinal Online Research and Imaging System) is a self-hosted web application that provides data- and project-management for neuroimaging research. From 21.0.0 to before 27.0.3 and 28.0.1, while the document_repository frontend was restricting file access, the backend endpoint was not correctly verifying access permissions. A user could theoretically download a file that they should not have access to, if they know or can brute force the filename. This vulnerability is fixed in 27.0.3 and 28.0.1. |
2026-04-08 | |
| CVE-2026-34985 | 6.3 | MEDIUM | CWE-639 | 0.0% p11 | 4.41 | LORIS (Longitudinal Online Research and Imaging System) is a self-hosted web app...LORIS (Longitudinal Online Research and Imaging System) is a self-hosted web application that provides data- and project-management for neuroimaging research. From 16.1.0 to before 27.0.3 and 28.0.1, While the frontend of the media module filters files that the user should not have access to, the backend was not applying access checks and it would be possible for someone who should not have access to a file to access it if they know the filename. This vulnerability is fixed in 27.0.3 and 28.0.1. |
2026-04-08 | |
| CVE-2026-34837 | 5.3 | MEDIUM | CWE-862 | 0.0% p13 | 3.71 | Zammad is a web based open source helpdesk/customer support system. Prior to 7.0...Zammad is a web based open source helpdesk/customer support system. Prior to 7.0.1, he REST endpoint POST /api/v1/ai_assistance/text_tools/:id contains an authorization failure. Context data (e.g., a group or organization) supplied to be used in the AI prompt were not checked if they are accessible for the current user. This leads to having data present in the AI prompt that were not authorized before being used. A user needs to have ticket.agent permission to be able to use the provided context data. This vulnerability is fixed in 7.0.1. |
2026-04-08 | |
| CVE-2026-34782 | 5.3 | MEDIUM | CWE-862 | 0.0% p13 | 3.71 | Zammad is a web based open source helpdesk/customer support system. Prior to 7.0...Zammad is a web based open source helpdesk/customer support system. Prior to 7.0.1 and 6.5.4, the REST endpoint POST /api/v1/ai_assistance/text_tools/:id was not checking if a user is privileged to use the text tool, resulting in being able to use it in all situations. This vulnerability is fixed in 7.0.1 and 6.5.4. |
2026-04-08 | |
| CVE-2026-34724 | 8.7 | HIGH | CWE-94 | 0.1% p17 | 6.09 | Zammad is a web based open source helpdesk/customer support system. Prior to 7.0...Zammad is a web based open source helpdesk/customer support system. Prior to 7.0.1, a server-side template injection vulnerability which leads to RCE via AI Agent exists. Impact is limited to environments where an attacker can control or influence type_enrichment_data (typically high-privilege administrative configuration). This vulnerability is fixed in 7.0.1. |
2026-04-08 | |
| CVE-2026-34723 | 8.7 | HIGH | CWE-284 | 0.0% p13 | 6.09 | Zammad is a web based open source helpdesk/customer support system. Prior to 7.0...Zammad is a web based open source helpdesk/customer support system. Prior to 7.0.1 and 6.5.4, unauthenticated remote attackers were able to access the getting started endpoint to get access to sensitive internal entity data, even after the system setup was completed. This vulnerability is fixed in 7.0.1 and 6.5.4. |
2026-04-08 | |
| CVE-2026-34722 | 6.9 | MEDIUM | CWE-862 | 0.1% p16 | 4.83 | Zammad is a web based open source helpdesk/customer support system. Prior to 7.0...Zammad is a web based open source helpdesk/customer support system. Prior to 7.0.1 and 6.5.4, the used endpoint for ticket creation was missing authorization if the related parameter for adding links is used. This vulnerability is fixed in 7.0.1 and 6.5.4. |
2026-04-08 | |
| CVE-2026-34721 | 5.9 | MEDIUM | CWE-352 | 0.0% p5 | 4.13 | Zammad is a web based open source helpdesk/customer support system. Prior to 7.0...Zammad is a web based open source helpdesk/customer support system. Prior to 7.0.1 and 6.5.4, the OAuth callback endpoints for Microsoft, Google, and Facebook external credentials do not validate a CSRF state parameter. This vulnerability is fixed in 7.0.1 and 6.5.4. |
2026-04-08 | |
| CVE-2026-34720 | 2.3 | LOW | CWE-346 | 0.0% p5 | 1.61 | Zammad is a web based open source helpdesk/customer support system. Prior to 7.0...Zammad is a web based open source helpdesk/customer support system. Prior to 7.0.1 and 6.5.4, the SSO mechanism in Zammad was not verifying the header originates from a trusted SSO proxy/gateway before applying further actions on it. This vulnerability is fixed in 7.0.1 and 6.5.4. |
2026-04-08 | |
| CVE-2026-34719 | 8.3 | HIGH | CWE-918 | 0.0% p7 | 5.81 | Zammad is a web based open source helpdesk/customer support system. Prior to 7.0...Zammad is a web based open source helpdesk/customer support system. Prior to 7.0.1 and 6.5.4, the webhook model was missing a proper validation for loop back addresses, or link-local addresses — only the URL scheme (HTTP/HTTPS) as well as the hostname was checked. This could end up in retrieving confidential metadata of cloud/hosting providers. The existing check is now extended and is applied when configuring webhooks as well as triggering webhook jobs. This vulnerability is fixed in 7.0.1 and 6.5.4. |
2026-04-08 | |
| CVE-2026-34718 | 5.3 | MEDIUM | CWE-80 | 0.1% p19 | 3.71 | Zammad is a web based open source helpdesk/customer support system. Prior to 7.0...Zammad is a web based open source helpdesk/customer support system. Prior to 7.0.1 and 6.5.4, the HTML sanitizer for ticket articles was missing proper sanitization of data: ... URI schemes, resulting in storing such malicious content in the database of the Zammad instance. The Zammad GUI is rendering this content, due to applied CSP rules no harm was done by e.g., clicking such a link. This vulnerability is fixed in 7.0.1 and 6.5.4. |
2026-04-08 | |
| CVE-2026-34392 | 7.5 | HIGH | CWE-552 | 0.0% p12 | 5.25 | LORIS (Longitudinal Online Research and Imaging System) is a self-hosted web app...LORIS (Longitudinal Online Research and Imaging System) is a self-hosted web application that provides data- and project-management for neuroimaging research. From 20.0.0 to before 27.0.3 and 28.0.1, a bug in the static file router can allow an attacker to traverse outside of the intended directory, allowing unintended files to be downloaded through the static, css, and js endpoints. This vulnerability is fixed in 27.0.3 and 28.0.1. |
2026-04-08 | |
| CVE-2026-34248 | 2.1 | LOW | CWE-284 | 0.0% p13 | 1.47 | Zammad is a web based open source helpdesk/customer support system. Prior to 7.0...Zammad is a web based open source helpdesk/customer support system. Prior to 7.0.1, customers in shared organizations (means they can see each other's tickets) could see fields which are not intended for customers - including fields not intended for them at all (e.g. priority, custom ticket attributes for internal purposes). This was the case when a customer opened a ticket from another user of the same shared organization. They are not able to modify these field. This vulnerability is fixed in 7.0.1. |
2026-04-08 | |
| CVE-2026-34166 | 3.7 | LOW | CWE-400 | 0.0% p14 | 2.59 | LiquidJS is a Shopify / GitHub Pages compatible template engine in pure JavaScri...LiquidJS is a Shopify / GitHub Pages compatible template engine in pure JavaScript. Prior to 10.25.3, the replace filter in LiquidJS incorrectly accounts for memory usage when the memoryLimit option is enabled. It charges str.length + pattern.length + replacement.length bytes to the memory limiter, but the actual output from str.split(pattern).join(replacement) can be quadratically larger when the pattern occurs many times in the input string. This allows an attacker who controls template content to bypass the memoryLimit DoS protection with approximately 2,500x amplification, potentially causing out-of-memory conditions. This vulnerability is fixed in 10.25.3. |
2026-04-08 | |
| CVE-2026-33350 | 7.5 | HIGH | CWE-89 | 0.0% p14 | 5.25 | LORIS (Longitudinal Online Research and Imaging System) is a self-hosted web app...LORIS (Longitudinal Online Research and Imaging System) is a self-hosted web application that provides data- and project-management for neuroimaging research. Prior to 27.0.3 and 28.0.1, a SQL injection has been identified in some code sections for the MRI feedback popup window of the imaging browser. Attackers can use SQL ingestion to access/alter data on the server. This vulnerability is fixed in 27.0.3 and 28.0.1. |
2026-04-08 | |
| CVE-2026-30817 | 6.8 | MEDIUM | CWE-15 | 0.0% p7 | 4.76 | An external configuration control vulnerability in the OpenVPN module of TP-Link...An external configuration control vulnerability in the OpenVPN module of TP-Link AX53 v1.0 allows an authenticated adjacent attacker to read arbitrary files when a malicious configuration file is processed. Successful exploitation may allow unauthorized access to arbitrary files on the device, potentially exposing sensitive information.This issue affects AX53 v1.0: before 1.7.1 Build 20260213. |
2026-04-08 | |
| CVE-2026-2942 | 9.8 | CRITICAL | CWE-434 | 0.2% p38 | 6.87 | The ProSolution WP Client plugin for WordPress is vulnerable to arbitrary file u...The ProSolution WP Client plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'proSol_fileUploadProcess' function in all versions up to, and including, 1.9.9. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. |
2026-04-08 | |
| CVE-2026-27806 | 7.8 | HIGH | CWE-78 | 0.0% p2 | 5.46 | Fleet is open source device management software. Prior to 4.81.1, the Orbit agen...Fleet is open source device management software. Prior to 4.81.1, the Orbit agent's FileVault disk encryption key rotation flow on collects a local user's password via a GUI dialog and interpolates it directly into a Tcl/expect script executed via exec.Command("expect", "-c", script). Because the password is inserted into Tcl brace-quoted send {%s}, a password containing } terminates the literal and injects arbitrary Tcl commands. Since Orbit runs as root, this allows a local unprivileged user to escalate to root privileges. This vulnerability is fixed in 4.81.1. |
2026-04-08 | |
| CVE-2026-20709 | 5.8 | MEDIUM | CWE-1394 | 0.0% p4 | 4.06 | Use of Default Cryptographic Key in the hardware for some Intel(R) Pentium(R) Pr...Use of Default Cryptographic Key in the hardware for some Intel(R) Pentium(R) Processor Silver Series, Intel(R) Celeron(R) Processor J Series, Intel(R) Celeron(R) Processor N Series may allow an escalation of privilege. Hardware reverse engineer adversary with a privileged user combined with a high complexity attack may enable escalation of privilege. This result may potentially occur via physical access when attack requirements are present with special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (high), integrity (none) and availability (none) of the vulnerable system, resulting in subsequent system confidentiality (high), integrity (high) and availability (none) impacts. |
2026-04-08 | |
| CVE-2026-0814 | 4.3 | MEDIUM | CWE-862 | 0.0% p7 | 3.01 | The Advanced Contact form 7 DB plugin for WordPress is vulnerable to unauthorize...The Advanced Contact form 7 DB plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'vsz_cf7_export_to_excel' function in all versions up to, and including, 2.0.9. This makes it possible for authenticated attackers, with Subscriber-level access and above, to export form submissions to excel file. |
2026-04-08 | |
| CVE-2026-0811 | 5.4 | MEDIUM | CWE-352 | 0.0% p2 | 3.78 | The Advanced Contact form 7 DB plugin for WordPress is vulnerable to Cross-Site ...The Advanced Contact form 7 DB plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.0.9. This is due to missing or incorrect nonce validation on the 'vsz_cf7_save_setting_callback' function. This makes it possible for unauthenticated attackers to delete form entry via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. |
2026-04-08 | |
| CVE-2025-50673 | 7.5 | HIGH | CWE-120 | 0.0% p5 | 5.25 | A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to impro...A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to improper handling of the http_lanport parameter in the /webgl.asp endpoint. |
2026-04-08 | |
| CVE-2025-50672 | 7.5 | HIGH | CWE-120 | 0.1% p15 | 5.25 | A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to impro...A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to improper handling of parameters in the /yyxz_dlink.asp endpoint. |
2026-04-08 | |
| CVE-2025-50671 | 7.5 | HIGH | CWE-121 | 0.1% p32 | 5.25 | A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to impro...A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to improper handling of parameters in the /xwgl_ref.asp endpoint. An attacker can exploit this vulnerability by sending a crafted HTTP GET request with excessively long strings in parameters name, en, user_id, shibie_name, time, act, log, and rpri. |
2026-04-08 | |
| CVE-2025-50670 | 7.5 | HIGH | CWE-120 | 0.1% p32 | 5.25 | A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to impro...A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to improper handling of parameters in the /xwgl_bwr.asp endpoint. An attacker can exploit this vulnerability by sending a crafted HTTP GET request in the name, qq, and time parameters. |
2026-04-08 | |
| CVE-2025-50669 | 7.5 | HIGH | CWE-120 | 0.1% p15 | 5.25 | A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 and DI-8003G...A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 and DI-8003G 19.12.10A1 due to improper handling of the wan_ping parameter in the /wan_ping.asp endpoint. |
2026-04-08 | |
| CVE-2025-50668 | 7.5 | HIGH | CWE-120 | 0.0% p5 | 5.25 | A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to impro...A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to improper handling of the s parameter in the /web_list_opt.asp endpoint. |
2026-04-08 | |
| CVE-2025-50667 | 7.5 | HIGH | CWE-120 | 0.1% p15 | 5.25 | A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to impro...A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to improper handling of the iface parameter in the /wan_line_detection.asp endpoint. |
2026-04-08 | |
| CVE-2025-50666 | 7.5 | HIGH | CWE-120 | 0.1% p17 | 5.25 | A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to impro...A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to improper handling of multiple parameters in the /web_post.asp endpoint. An attacker can exploit this vulnerability by sending a crafted HTTP GET request in parameters such as name, en, user_id, log, and time. |
2026-04-08 | |
| CVE-2025-50665 | 7.5 | HIGH | CWE-120 | 0.1% p17 | 5.25 | A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to impro...A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to improper handling of input parameters in the /web_keyword.asp endpoint. An attacker can exploit this vulnerability by sending a crafted HTTP GET request via the name, en, time, mem_gb2312, and mem_utf8 parameters. |
2026-04-08 | |
| CVE-2025-50664 | 7.5 | HIGH | CWE-121 | 0.1% p32 | 5.25 | A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to impro...A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to improper handling of parameters in the /user_group.asp endpoint. The attacker can exploit this vulnerability by sending a crafted HTTP GET request with parameters name, mem, pri, and attr. |
2026-04-08 | |
| CVE-2025-50663 | 7.5 | HIGH | CWE-121 | 0.1% p15 | 5.25 | A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to impro...A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to improper handling of the name parameter in the /usb_paswd.asp endpoint. |
2026-04-08 | |
| CVE-2025-50662 | 7.5 | HIGH | CWE-121 | 0.1% p15 | 5.25 | A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to impro...A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to improper handling of the name parameter in the /url_group.asp endpoint. |
2026-04-08 | |
| CVE-2025-50661 | 7.5 | HIGH | CWE-121 | 0.1% p32 | 5.25 | A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to impro...A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to improper handling of multiple parameters in the /url_rule.asp endpoint. An attacker can exploit this vulnerability by sending a crafted HTTP GET request with parameters name, en, ips, u, time, act, rpri, and log. |
2026-04-08 | |
| CVE-2025-50660 | 7.5 | HIGH | CWE-121 | 0.1% p15 | 5.25 | A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to impro...A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to improper handling of the name parameter in the /url_member.asp endpoint. |
2026-04-08 | |
| CVE-2025-50659 | 7.5 | HIGH | CWE-121 | 0.1% p15 | 5.25 | A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to impro...A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to improper handling of the custom_error parameter in the /user.asp endpoint. |
2026-04-08 | |
| CVE-2025-50657 | 7.5 | HIGH | CWE-121 | 0.1% p15 | 5.25 | A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to impro...A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to improper handling of the pid parameter in the /trace.asp endpoint. |
2026-04-08 | |
| CVE-2025-50655 | 7.5 | HIGH | CWE-121 | 0.1% p15 | 5.25 | A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to impro...A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to improper handling of the name parameter in the /thd_group.asp endpoint. |
2026-04-08 | |
| CVE-2025-50654 | 7.5 | HIGH | CWE-120 | 0.1% p15 | 5.25 | A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to impro...A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to improper validation of the id parameter in the /thd_member.asp endpoint. |
2026-04-08 | |
| CVE-2025-50653 | 7.5 | HIGH | CWE-120 | 0.1% p15 | 5.25 | A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to impro...A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to improper handling of the name and mem parameters in the /time_group.asp endpoint. |
2026-04-08 | |
| CVE-2025-50652 | 7.5 | HIGH | CWE-120 | 0.0% p13 | 5.25 | An issue in D-Link DI-8003 16.07.26A1 related to improper handling of the id par...An issue in D-Link DI-8003 16.07.26A1 related to improper handling of the id parameter in the /saveparm_usb.asp endpoint. |
2026-04-08 | |
| CVE-2025-50650 | 7.5 | HIGH | CWE-120 | 0.1% p15 | 5.25 | A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to inade...A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to inadequate validation of input size in the routes_static parameter in the /router.asp endpoint. |
2026-04-08 | |
| CVE-2025-50649 | 7.5 | HIGH | CWE-120 | 0.1% p15 | 5.25 | A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to impro...A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to improper input validation in the vlan_name parameter in the /shut_set.asp endpoint. |
2026-04-08 | |
| CVE-2025-50648 | 7.5 | HIGH | CWE-120 | 0.1% p15 | 5.25 | A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to inade...A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to inadequate input validation in the /tggl.asp endpoint. |
2026-04-08 | |
| CVE-2025-50647 | 7.5 | HIGH | CWE-120 | 0.1% p15 | 5.25 | A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1, specificall...A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1, specifically in the handling of the wans parameter in the qos.asp endpoint. |
2026-04-08 | |
| CVE-2025-50646 | 7.5 | HIGH | CWE-120 | 0.1% p15 | 5.25 | A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to insuf...A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to insufficient input validation on the name parameter in the /qos_type_asp.asp endpoint. |
2026-04-08 | |
| CVE-2025-50645 | 7.5 | HIGH | CWE-120 | 0.0% p14 | 5.25 | A vulnerability has been discovered in D-Link DI-8003 16.07.26A1, which can lead...A vulnerability has been discovered in D-Link DI-8003 16.07.26A1, which can lead to a buffer overflow when the s parameter in the pppoe_list_opt.asp endpoint is manipulated. By sending a crafted request with an excessively large value for the s parameter, an attacker can trigger a buffer overflow condition. |
2026-04-08 | |
| CVE-2025-50644 | 7.5 | HIGH | CWE-120 | 0.1% p15 | 5.25 | A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to impro...A buffer overflow vulnerability exists in D-Link DI-8003 16.07.26A1 due to improper validation of user input in the qj.asp endpoint. |
2026-04-08 | |
| CVE-2026-33756 | 7.5 | HIGH | CWE-770 | 0.1% p28 | 5.25 | Saleor is an e-commerce platform. From 2.0.0 to before 3.23.0a3, 3.22.47, 3.21.5...Saleor is an e-commerce platform. From 2.0.0 to before 3.23.0a3, 3.22.47, 3.21.54, and 3.20.118, Saleor supports query batching by submitting multiple GraphQL operations in a single HTTP request as a JSON array but wasn't enforcing any upper limit on the number of operations. This allowed an unauthenticated attacker to send a single HTTP request many operations (bypassing the per query complexity limit) to exhaust resources. This vulnerability is fixed in 3.23.0a3, 3.22.47, 3.21.54, and 3.20.118. |
2026-04-08 | |
| CVE-2026-33466 | 8.1 | HIGH | CWE-22 | 0.4% p59 | 5.68 | Improper Limitation of a Pathname to a Restricted Directory (CWE-22) in Logstash...Improper Limitation of a Pathname to a Restricted Directory (CWE-22) in Logstash can lead to arbitrary file write and potentially remote code execution via Relative Path Traversal (CAPEC-139). The archive extraction utilities used by Logstash do not properly validate file paths within compressed archives. An attacker who can serve a specially crafted archive to Logstash through a compromised or attacker-controlled update endpoint can write arbitrary files to the host filesystem with the privileges of the Logstash process. In certain configurations where automatic pipeline reloading is enabled, this can be escalated to remote code execution. |
2026-04-08 | |
| CVE-2026-33459 | 6.5 | MEDIUM | CWE-400 | 0.0% p13 | 4.55 | Uncontrolled Resource Consumption (CWE-400) in Kibana can lead to denial of serv...Uncontrolled Resource Consumption (CWE-400) in Kibana can lead to denial of service via Excessive Allocation (CAPEC-130). An authenticated user with access to the automatic import feature can submit specially crafted requests with excessively large input values. When multiple such requests are sent concurrently, the backend services become unstable, resulting in service disruption and deployment unavailability for all users. |
2026-04-08 | |
| CVE-2026-33458 | 6.3 | MEDIUM | CWE-918 | 0.1% p15 | 4.41 | Server-Side Request Forgery (CWE-918) in Kibana One Workflow can lead to informa...Server-Side Request Forgery (CWE-918) in Kibana One Workflow can lead to information disclosure. An authenticated user with workflow creation and execution privileges can bypass host allowlist restrictions in the Workflows Execution Engine, potentially exposing sensitive internal endpoints and data. |
2026-04-08 | |
| CVE-2026-32591 | 5.2 | MEDIUM | CWE-918 | 0.0% p7 | 3.64 | A flaw was found in Red Hat Quay's Proxy Cache configuration feature. When an or...A flaw was found in Red Hat Quay's Proxy Cache configuration feature. When an organization administrator configures an upstream registry for proxy caching, Quay makes a network connection to the specified registry hostname without verifying that it points to a legitimate external service. An attacker with organization administrator privileges could supply a crafted hostname to force the Quay server to make requests to internal network services, cloud infrastructure endpoints, or other resources that should not be accessible from the Quay application. |
2026-04-08 | |
| CVE-2026-32590 | 7.1 | HIGH | CWE-502 | 0.1% p17 | 4.97 | A flaw was found in Red Hat Quay's handling of resumable container image layer u...A flaw was found in Red Hat Quay's handling of resumable container image layer uploads. The upload process stores intermediate data in the database using a format that, if tampered with, could allow an attacker to execute arbitrary code on the Quay server. |
2026-04-08 | |
| CVE-2026-32589 | 7.1 | HIGH | CWE-639 | 0.0% p8 | 4.97 | A flaw was found in Red Hat Quay's container image upload process. An authentica...A flaw was found in Red Hat Quay's container image upload process. An authenticated user with push access to any repository on the registry can interfere with image uploads in progress by other users, including those in repositories they do not have access to. This could allow the attacker to read, modify, or cancel another user's in-progress image upload. |
2026-04-08 | |
| CVE-2025-52222 | 7.5 | HIGH | CWE-120 | 0.0% p5 | 5.25 | D-Link DI-8003 v16.07.26A1, DI-8500 v16.07.26A1; DI-8003G v17.12.21A1, DI-8200G ...D-Link DI-8003 v16.07.26A1, DI-8500 v16.07.26A1; DI-8003G v17.12.21A1, DI-8200G v17.12.20A1, DI-8200 v16.07.26A1, DI-8400 v16.07.26A1, DI-8004w v16.07.26A1, DI-8100 v16.07.26A1, and DI-8100G v17.12.20A1 were discovered to contain a buffer overflow via the rd_en, rd_auth, rd_acct, http_hadmin, http_hadminpwd, rd_key, and rd_ip parameters in the radius_asp function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request. |
2026-04-08 | |
| CVE-2025-52221 | 9.8 | CRITICAL | CWE-787 | 0.1% p16 | 6.86 | Tenda AC6 15.03.05.16_multi is vulnerable to Buffer Overflow in the formSetCfm f...Tenda AC6 15.03.05.16_multi is vulnerable to Buffer Overflow in the formSetCfm function via the funcname, funcpara1, and funcpara2 parameters. |
2026-04-08 | |
| CVE-2025-45059 | 7.5 | HIGH | CWE-120 | 0.0% p5 | 5.25 | D-Link DI-8300 v16.07.26A1 was discovered to contain a buffer overflow via the f...D-Link DI-8300 v16.07.26A1 was discovered to contain a buffer overflow via the fn parameter in the tgfile_htm function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. |
2026-04-08 | |
| CVE-2025-45058 | 7.5 | HIGH | CWE-120 | 0.0% p5 | 5.25 | D-Link DI-8300 v16.07.26A1 was discovered to contain a buffer overflow via the f...D-Link DI-8300 v16.07.26A1 was discovered to contain a buffer overflow via the fx parameter in the jingx_asp function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. |
2026-04-08 | |
| CVE-2025-45057 | 7.5 | HIGH | CWE-120 | 0.0% p5 | 5.25 | D-Link DI-8300 v16.07.26A1 was discovered to contain a buffer overflow via the i...D-Link DI-8300 v16.07.26A1 was discovered to contain a buffer overflow via the ip parameter in the ip_position_asp function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. |
2026-04-08 | |
| CVE-2026-4837 | 6.6 | MEDIUM | CWE-95 | 0.3% p53 | 4.63 | An eval() injection vulnerability in the Rapid7 Insight Agent beaconing logic fo...An eval() injection vulnerability in the Rapid7 Insight Agent beaconing logic for Linux versions could theoretically allow an attacker to achieve remote code execution as root via a crafted beacon response. Because the Agent uses mutual TLS (mTLS) to verify commands from the Rapid7 Platform, it is unlikely that the eval() function could be exploited remotely without prior, highly privileged access to the backend platform. |
2026-04-08 | |
| CVE-2026-4498 | 7.7 | HIGH | CWE-250 | 0.1% p17 | 5.39 | Execution with Unnecessary Privileges (CWE-250) in Kibana’s Fleet plugin debug r...Execution with Unnecessary Privileges (CWE-250) in Kibana’s Fleet plugin debug route handlers can lead reading index data beyond their direct Elasticsearch RBAC scope via Privilege Abuse (CAPEC-122). This requires an authenticated Kibana user with Fleet sub-feature privileges (such as agents, agent policies, and settings management). |
2026-04-08 | |
| CVE-2026-33461 | 7.7 | HIGH | CWE-863 | 0.1% p17 | 5.39 | Incorrect Authorization (CWE-863) in Kibana can lead to information disclosure v...Incorrect Authorization (CWE-863) in Kibana can lead to information disclosure via Privilege Abuse (CAPEC-122). A user with limited Fleet privileges can exploit an internal API endpoint to retrieve sensitive configuration data, including private keys and authentication tokens, that should only be accessible to users with higher-level settings privileges. The endpoint composes its response by fetching full configuration objects and returning them directly, bypassing the authorization checks enforced by the dedicated settings APIs. |
2026-04-08 | |
| CVE-2026-33460 | 4.3 | MEDIUM | CWE-863 | 0.0% p7 | 3.01 | Incorrect Authorization (CWE-863) in Kibana can lead to cross-space information ...Incorrect Authorization (CWE-863) in Kibana can lead to cross-space information disclosure via Privilege Abuse (CAPEC-122). A user with Fleet agent management privileges in one Kibana space can retrieve Fleet Server policy details from other spaces through an internal enrollment endpoint. The endpoint bypasses space-scoped access controls by using an unscoped internal client, returning operational identifiers, policy names, management state, and infrastructure linkage details from spaces the user is not authorized to access. |
2026-04-08 | |
| CVE-2026-31017 | 9.1 | CRITICAL | CWE-918 | 0.0% p11 | 6.37 | A Server-Side Request Forgery (SSRF) vulnerability exists in the Print Format fu...A Server-Side Request Forgery (SSRF) vulnerability exists in the Print Format functionality of ERPNext v16.0.1 and Frappe Framework v16.1.1, where user-supplied HTML is insufficiently sanitized before being rendered into PDF. When generating PDFs from user-controlled HTML content, the application allows the inclusion of HTML elements such as <iframe> that reference external resources. The PDF rendering engine automatically fetches these resources on the server side. An attacker can abuse this behavior to force the server to make arbitrary HTTP requests to internal services, including cloud metadata endpoints, potentially leading to sensitive information disclosure. |
2026-04-08 | |
| CVE-2026-30080 | 7.5 | HIGH | CWE-294 | 0.0% p9 | 5.25 | OpenAirInterface v2.2.0 accepts Security Mode Complete without any integrity pro...OpenAirInterface v2.2.0 accepts Security Mode Complete without any integrity protection. Configuration has supported integrity NIA1 and NIA2. But if an UE sends initial registration request with only security capability IA0, OpenAirInterface accepts and proceeds. This downgrade security context can lead to the possibility of replay attack. |
2026-04-08 | |
| CVE-2026-30075 | 7.5 | HIGH | CWE-120 | 0.1% p23 | 5.25 | OpenAirInterface Version 2.2.0 has a Buffer Overflow vulnerability in processing...OpenAirInterface Version 2.2.0 has a Buffer Overflow vulnerability in processing UplinkNASTransport containing Authentication Response containing a NAS PDU with oversize response (For example 100 byte). The response is decoded by AMF and passed to the AUSF component for verification. AUSF crashes on receiving this oversize response. This can prohibit users from further registration and verification and can cause Denial of Services (DoS). |
2026-04-08 | |
| CVE-2026-2377 | 6.5 | MEDIUM | CWE-918 | 0.0% p11 | 4.55 | A flaw was found in mirror-registry. Authenticated users can exploit the log exp...A flaw was found in mirror-registry. Authenticated users can exploit the log export feature by providing a specially crafted web address (URL). This allows the application's backend to make arbitrary requests to internal network resources, a vulnerability known as Server-Side Request Forgery (SSRF). This could lead to unauthorized access to sensitive information or other internal systems. |
2026-04-08 | |
| CVE-2025-57175 | 6.4 | MEDIUM | CWE-259 | 0.0% p6 | 4.48 | Siklu EtherHaul 8010 siklu-uimage-nxp-enc-10_6_2-18707-ea552dc00b devices have a...Siklu EtherHaul 8010 siklu-uimage-nxp-enc-10_6_2-18707-ea552dc00b devices have a static root password. |
2026-04-08 | |
| CVE-2025-14243 | 5.3 | MEDIUM | CWE-209 | 0.1% p21 | 3.71 | A flaw was found in the OpenShift Mirror Registry. This vulnerability allows an ...A flaw was found in the OpenShift Mirror Registry. This vulnerability allows an unauthenticated, remote attacker to enumerate valid usernames and email addresses via different error messages during authentication failures and account creation. |
2026-04-08 | |
| CVE-2023-46945 | 9.1 | CRITICAL | CWE-918 | 0.0% p11 | 6.37 | QD 20230821 is vulnerable to Server-side request forgery (SSRF) via a crafted re...QD 20230821 is vulnerable to Server-side request forgery (SSRF) via a crafted request |
2026-04-08 | |
| CVE-2026-33753 | 6.2 | MEDIUM | CWE-295 | 0.0% p0 | 4.34 | rfc3161-client is a Python library implementing the Time-Stamp Protocol (TSP) de...rfc3161-client is a Python library implementing the Time-Stamp Protocol (TSP) described in RFC 3161. Prior to 1.0.6, an Authorization Bypass vulnerability in rfc3161-client's signature verification allows any attacker to impersonate a trusted TimeStamping Authority (TSA). By exploiting a logic flaw in how the library extracts the leaf certificate from an unordered PKCS#7 bag of certificates, an attacker can append a spoofed certificate matching the target common_name and Extended Key Usage (EKU) requirements. This tricks the library into verifying these authorization rules against the forged certificate while validating the cryptographic signature against an actual trusted TSA (such as FreeTSA), thereby bypassing the intended TSA authorization pinning entirely. This vulnerability is fixed in 1.0.6. |
2026-04-08 | |
| CVE-2026-33229 | 8.6 | HIGH | CWE-862 | 0.2% p36 | 6.02 | XWiki Platform is a generic wiki platform offering runtime services for applicat...XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Prior to 17.4.8 and 17.10.1, an improperly protected scripting API allows any user with script right to bypass the sandboxing of the Velocity scripting API and execute, e.g., arbitrary Python scripts, allowing full access to the XWiki instance and thereby compromising the confidentiality, integrity and availability of the whole instance. Note that script right already constitutes a high level of access that we don't recommend giving to untrusted users. This vulnerability is fixed in 17.4.8 and 17.10.1. |
2026-04-08 | |
| CVE-2026-31040 | 9.8 | CRITICAL | CWE-94 | 0.1% p31 | 6.86 | A vulnerability was identified in stata-mcp prior to v1.13.0 where insufficient ...A vulnerability was identified in stata-mcp prior to v1.13.0 where insufficient validation of user-supplied Stata do-file content can lead to command execution. |
2026-04-08 | |
| CVE-2026-39865 | 5.9 | MEDIUM | CWE-400 | 0.0% p3 | 4.13 | Axios is a promise based HTTP client for the browser and Node.js. Starting in ve...Axios is a promise based HTTP client for the browser and Node.js. Starting in version 1.13.0 and prior to 1.13.2, Axios HTTP/2 session cleanup logic contains a state corruption bug that allows a malicious server to crash the client process through concurrent session closures. The vulnerability exists in the Http2Sessions.getSession() method in lib/adapters/http.js. The session cleanup logic contains a control flow error when removing sessions from the sessions array. This vulnerability is fixed in 1.13.2. |
2026-04-08 | |
| CVE-2026-39410 | 4.8 | MEDIUM | CWE-20 | 0.0% p14 | 3.36 | Hono is a Web application framework that provides support for any JavaScript run...Hono is a Web application framework that provides support for any JavaScript runtime. Prior to 4.12.12, a discrepancy between browser cookie parsing and parse() handling allows cookie prefix protections to be bypassed. Cookie names that are treated as distinct by the browser may be normalized to the same key by parse(), allowing attacker-controlled cookies to override legitimate ones. This vulnerability is fixed in 4.12.12. |
2026-04-08 | |
| CVE-2026-39409 | 6.3 | MEDIUM | CWE-180 | 0.1% p16 | 4.41 | Hono is a Web application framework that provides support for any JavaScript run...Hono is a Web application framework that provides support for any JavaScript runtime. Prior to 4.12.12, ipRestriction() does not canonicalize IPv4-mapped IPv6 client addresses (e.g. ::ffff:127.0.0.1) before applying IPv4 allow or deny rules. In environments such as Node.js dual-stack, this can cause IPv4 rules to fail to match, leading to unintended authorization behavior. This vulnerability is fixed in 4.12.12. |
2026-04-08 | |
| CVE-2026-39408 | 5.9 | MEDIUM | CWE-22 | 0.0% p11 | 4.13 | Hono is a Web application framework that provides support for any JavaScript run...Hono is a Web application framework that provides support for any JavaScript runtime. Prior to 4.12.12, a path traversal issue in toSSG() allows files to be written outside the configured output directory during static site generation. When using dynamic route parameters via ssgParams, specially crafted values can cause generated file paths to escape the intended output directory. This vulnerability is fixed in 4.12.12. |
2026-04-08 | |
| CVE-2026-39407 | 5.3 | MEDIUM | CWE-22 | 0.1% p20 | 3.71 | Hono is a Web application framework that provides support for any JavaScript run...Hono is a Web application framework that provides support for any JavaScript runtime. Prior to 4.12.12, a path handling inconsistency in serveStatic allows protected static files to be accessed by using repeated slashes (//) in the request path. When route-based middleware (e.g., /admin/*) is used for authorization, the router may not match paths containing repeated slashes, while serveStatic resolves them as normalized paths. This can lead to a middleware bypass. This vulnerability is fixed in 4.12.12. |
2026-04-08 | |
| CVE-2026-39406 | 5.3 | MEDIUM | CWE-22 | 0.1% p15 | 3.71 | @hono/node-server allows running the Hono application on Node.js. Prior to 1.19....@hono/node-server allows running the Hono application on Node.js. Prior to 1.19.13, a path handling inconsistency in serveStatic allows protected static files to be accessed by using repeated slashes (//) in the request path. When route-based middleware (e.g., /admin/*) is used for authorization, the router may not match paths containing repeated slashes, while serveStatic resolves them as normalized paths. This can lead to a middleware bypass. This vulnerability is fixed in 1.19.13. |
2026-04-08 | |
| CVE-2026-39394 | 8.1 | HIGH | CWE-93 | 0.0% p5 | 5.67 | CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, mo...CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to 0.31.4.0, the Install::index() controller reads the host POST parameter without any validation and passes it directly into updateEnvSettings(), which writes it into the .env file via preg_replace(). Because newline characters in the value are not stripped, an attacker can inject arbitrary configuration directives into the .env file. The install routes have CSRF protection explicitly disabled, and the InstallFilter can be bypassed when cache('settings') is empty (cache expiry or fresh deployment). This vulnerability is fixed in 0.31.4.0. |
2026-04-08 | |
| CVE-2026-39393 | 8.1 | HIGH | CWE-306 | 0.0% p5 | 5.67 | CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, mo...CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to 0.31.4.0, the install route guard in ci4ms relies solely on a volatile cache check (cache('settings')) combined with .env file existence to block post-installation access to the setup wizard. When the database is temporarily unreachable during a cache miss (TTL expiry or admin-triggered cache clear), the guard fails open, allowing an unauthenticated attacker to overwrite the .env file with attacker-controlled database credentials, achieving full application takeover. This vulnerability is fixed in 0.31.4.0. |
2026-04-08 | |
| CVE-2026-39392 | 5.5 | MEDIUM | CWE-79 | 0.0% p1 | 3.85 | CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, mo...CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to 0.31.4.0, the Pages module does not apply the html_purify validation rule to content fields during create and update operations, while the Blog module does. Page content is stored unsanitized in the database and rendered as raw HTML on the public frontend via echo $pageInfo->content. An authenticated admin with page-editing privileges can inject arbitrary JavaScript that executes in the browser of every public visitor viewing the page. This vulnerability is fixed in 0.31.4.0. |
2026-04-08 | |
| CVE-2026-39391 | 4.8 | MEDIUM | CWE-79 | 0.0% p0 | 3.36 | CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, mo...CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to 0.31.4.0, the blacklist (ban) note parameter in UserController::ajax_blackList_post() is stored in the database without sanitization and rendered into an HTML data-note attribute without escaping. An admin with blacklist privileges can inject arbitrary JavaScript that executes in the browser of any other admin who views the user management page. This vulnerability is fixed in 0.31.4.0. |
2026-04-08 | |
| CVE-2026-39390 | 5.5 | MEDIUM | CWE-79 | 0.0% p1 | 3.85 | CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, mo...CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to 0.31.4.0, the Google Maps iframe setting (cMap field) in compInfosPost() sanitizes input using strip_tags() with an <iframe> allowlist and regex-based removal of on\w+ event handlers. However, the srcdoc attribute is not an event handler and passes all filters. An attacker with admin settings access can inject an <iframe srcdoc="..."> payload with HTML-entity-encoded JavaScript that executes in the context of the parent page when rendered to unauthenticated frontend visitors. This vulnerability is fixed in 0.31.4.0. |
2026-04-08 | |
| CVE-2026-39389 | 6.7 | MEDIUM | CWE-285 | 0.0% p3 | 4.69 | CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, mo...CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to 0.31.4.0, This vulnerability is fixed in 0.31.4.0. |
2026-04-08 | |
| CVE-2026-35023 | 5.3 | MEDIUM | CWE-639 | 0.0% p7 | 3.71 | Wimi Teamwork On-Premises versions prior to 8.2.0 contain an insecure direct obj...Wimi Teamwork On-Premises versions prior to 8.2.0 contain an insecure direct object reference vulnerability in the preview.php endpoint where the item_id parameter lacks proper authorization checks. Attackers can enumerate sequential item_id values to access and retrieve image previews from other users' private or group conversations, resulting in unauthorized disclosure of sensitive information. |
2026-04-08 | |
| CVE-2026-2509 | 6.4 | MEDIUM | CWE-79 | 0.0% p1 | 4.48 | The Page Builder: Pagelayer plugin for WordPress is vulnerable to Stored Cross-S...The Page Builder: Pagelayer plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Button widget's Custom Attributes field in all versions up to, and including, 2.0.8. This is due to an incomplete event handler blocklist in the 'pagelayer_xss_content' XSS filtering function, which blocks common, but not all, event handlers. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-04-08 | |
| CVE-2025-58713 | 6.4 | MEDIUM | CWE-276 | 0.0% p0 | 4.48 | A container privilege escalation flaw was found in certain Red Hat Process Autom...A container privilege escalation flaw was found in certain Red Hat Process Automation Manager images. This issue stems from the /etc/passwd file being created with group-writable permissions during build time. In certain conditions, an attacker who can execute commands within an affected container, even as a non-root user, can leverage their membership in the root group to modify the /etc/passwd file. This could allow the attacker to add a new user with any arbitrary UID, including UID 0, leading to full root privileges within the container. |
2026-04-08 | |
| CVE-2025-57854 | 6.4 | MEDIUM | CWE-276 | 0.0% p0 | 4.48 | A container privilege escalation flaw was found in certain OpenShift Update Serv...A container privilege escalation flaw was found in certain OpenShift Update Service (OSUS) images. This issue stems from the /etc/passwd file being created with group-writable permissions during build time. In certain conditions, an attacker who can execute commands within an affected container, even as a non-root user, may be able to leverage their membership in the root group to modify the /etc/passwd file. This could allow the attacker to add a new user with any arbitrary UID, including UID 0, leading to full root privileges within the container. |
2026-04-08 | |
| CVE-2025-57853 | 6.4 | MEDIUM | CWE-276 | 0.0% p0 | 4.48 | A container privilege escalation flaw was found in certain Web Terminal images. ...A container privilege escalation flaw was found in certain Web Terminal images. This issue stems from the /etc/passwd file being created with group-writable permissions during build time. In certain conditions, an attacker who can execute commands within an affected container, even as a non-root user, can leverage their membership in the root group to modify the /etc/passwd file. This could allow the attacker to add a new user with any arbitrary UID, including UID 0, leading to full root privileges within the container. |
2026-04-08 | |
| CVE-2025-57851 | 6.4 | MEDIUM | CWE-276 | 0.0% p0 | 4.48 | A container privilege escalation flaw was found in certain Multicluster Engine f...A container privilege escalation flaw was found in certain Multicluster Engine for Kubernetes images. This issue stems from the /etc/passwd file being created with group-writable permissions during build time. In certain conditions, an attacker who can execute commands within an affected container, even as a non-root user, can leverage their membership in the root group to modify the /etc/passwd file. This could allow the attacker to add a new user with any arbitrary UID, including UID 0, leading to full root privileges within the container. |
2026-04-08 | |
| CVE-2025-57847 | 6.4 | MEDIUM | CWE-276 | 0.0% p0 | 4.48 | A container privilege escalation flaw was found in certain Ansible Automation Pl...A container privilege escalation flaw was found in certain Ansible Automation Platform images. This issue arises from the /etc/passwd file being created with group-writable permissions during the build process. In certain conditions, an attacker who can execute commands within an affected container, even as a non-root user, can leverage their membership in the root group to modify the /etc/passwd file. This vulnerability allows an attacker to add a new user with any arbitrary UID, including UID 0, gaining full root privileges within the container. |
2026-04-08 | |
| CVE-2025-14816 | 9.3 | CRITICAL | CWE-317 | 0.0% p1 | 6.51 | Cleartext Storage of Sensitive Information in GUI vulnerability in Mitsubishi El...Cleartext Storage of Sensitive Information in GUI vulnerability in Mitsubishi Electric GENESIS64 versions 10.97.3 and prior, Mitsubishi Electric ICONICS Suite versions 10.97.3 and prior, Mitsubishi Electric MobileHMI versions 10.97.3 and prior, Mitsubishi Electric Hyper Historian versions 10.97.3 and prior, Mitsubishi Electric AnalytiX versions 10.97.3 and prior, Mitsubishi Electric GENESIS versions 11.02 and prior, Mitsubishi Electric MC Works64 all versions, Mitsubishi Electric Iconics Digital Solutions GENESIS64 versions 10.97.3 and prior, Mitsubishi Electric Iconics Digital Solutions ICONICS Suite versions 10.97.3 and prior, Mitsubishi Electric Iconics Digital Solutions MobileHMI versions 10.97.3 and prior, Mitsubishi Electric Iconics Digital Solutions Hyper Historian versions 10.97.3 and prior, Mitsubishi Electric Iconics Digital Solutions AnalytiX versions 10.97.3 and prior, and Mitsubishi Electric Iconics Digital Solutions GENESIS versions 11.02 and prior allows a local attacker to disclose the SQL Server credentials displayed in plain text in the GUI of the Hyper Historian Splitter feature by exploiting this vulnerability, when SQL authentication is used for the SQL Server authentication. As a result, the unauthorized attacker could access the SQL Server and disclose, tamper with, or destroy data on the server, potentially cause a denial-of-service (DoS) condition on the system. |
2026-04-08 | |
| CVE-2025-14815 | 9.3 | CRITICAL | CWE-312 | 0.0% p1 | 6.51 | Cleartext Storage of Sensitive Information vulnerability in Mitsubishi Electric ...Cleartext Storage of Sensitive Information vulnerability in Mitsubishi Electric GENESIS64 versions 10.97.3 and prior, Mitsubishi Electric ICONICS Suite versions 10.97.3 and prior, Mitsubishi Electric MobileHMI versions 10.97.3 and prior, Mitsubishi Electric Hyper Historian versions 10.97.3 and prior, Mitsubishi Electric AnalytiX versions 10.97.3 and prior, Mitsubishi Electric GENESIS versions 11.02 and prior, Mitsubishi Electric MC Works64 all versions, Mitsubishi Electric Iconics Digital Solutions GENESIS64 versions 10.97.3 and prior, Mitsubishi Electric Iconics Digital Solutions ICONICS Suite versions 10.97.3 and prior, Mitsubishi Electric Iconics Digital Solutions MobileHMI versions 10.97.3 and prior, Mitsubishi Electric Iconics Digital Solutions Hyper Historian versions 10.97.3 and prior, Mitsubishi Electric Iconics Digital Solutions AnalytiX versions 10.97.3 and prior, and Mitsubishi Electric Iconics Digital Solutions GENESIS versions 11.02 and prior allows a local attacker to disclose the SQL Server credentials stored in plaintext within the local SQLite file by exploiting this vulnerability, when the local caching feature using SQLite is enabled and SQL authentication is used for the SQL Server authentication. As a result, the unauthorized attacker could access the SQL Server and disclose, tamper with, or destroy data on the server, potentially cause a denial-of-service (DoS) condition on the system. |
2026-04-08 | |
| CVE-2026-5302 | 6.3 | MEDIUM | CWE-942 | 0.1% p19 | 4.41 | CORS misconfiguration in CoolerControl/coolercontrold <4.0.0 allows unauthentica...CORS misconfiguration in CoolerControl/coolercontrold <4.0.0 allows unauthenticated remote attackers to read data and send commands to the service via malicious websites |
2026-04-08 | |
| CVE-2026-5301 | 7.6 | HIGH | CWE-79 | 0.0% p5 | 5.32 | Stored XSS in log viewer in CoolerControl/coolercontrol-ui <4.0.0 allows unauthe...Stored XSS in log viewer in CoolerControl/coolercontrol-ui <4.0.0 allows unauthenticated attackers to take over the service via malicious JavaScript in poisoned log entries |
2026-04-08 | |
| CVE-2026-5300 | 5.9 | MEDIUM | CWE-306 | 0.0% p0 | 4.13 | Unauthenticated functionality in CoolerControl/coolercontrold <4.0.0 allows una...Unauthenticated functionality in CoolerControl/coolercontrold <4.0.0 allows unauthenticated attackers to view and modify potentially sensitive data via HTTP requests |
2026-04-08 | |
| CVE-2026-4402 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This can...Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage. |
2026-04-08 | |
| CVE-2026-28261 | 7.8 | HIGH | CWE-532 | 0.0% p2 | 5.46 | Dell Elastic Cloud Storage, version 3.8.1.7 and prior, and Dell ObjectScale, ver...Dell Elastic Cloud Storage, version 3.8.1.7 and prior, and Dell ObjectScale, versions prior to 4.1.0.3 and version 4.2.0.0, contains an Insertion of Sensitive Information into Log File vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to secret exposure. The attacker may be able to use the exposed secret to access the vulnerable system with privileges of the compromised account. |
2026-04-08 | |
| CVE-2026-27102 | 6.6 | MEDIUM | CWE-266 | 0.0% p1 | 4.62 | Dell PowerScale OneFS, versions 9.5.0.0 through 9.10.1.6 and versions 9.11.0.0 t...Dell PowerScale OneFS, versions 9.5.0.0 through 9.10.1.6 and versions 9.11.0.0 through 9.13.0.1, contains an incorrect privilege assignment vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to elevation of privileges. |
2026-04-08 | |
| CVE-2026-24511 | 4.4 | MEDIUM | CWE-209 | 0.0% p0 | 3.08 | Dell PowerScale OneFS, versions 9.5.0.0 through 9.10.1.6 and versions 9.11.0.0 t...Dell PowerScale OneFS, versions 9.5.0.0 through 9.10.1.6 and versions 9.11.0.0 through 9.13.0.0, contains a generation of error message containing sensitive information vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to information disclosure. |
2026-04-08 | |
| CVE-2026-5208 | 8.2 | HIGH | CWE-78 | 0.1% p22 | 5.74 | Command injection in alerts in CoolerControl/coolercontrold <4.0.0 allows authen...Command injection in alerts in CoolerControl/coolercontrold <4.0.0 allows authenticated attackers to execute arbitrary code as root via injected bash commands in alert names |
2026-04-08 | |
| CVE-2026-3396 | 7.5 | HIGH | CWE-89 | 18.9% p95 | 5.82 | WCAPF – WooCommerce Ajax Product Filter plugin is vulnerable to time-based SQL I...WCAPF – WooCommerce Ajax Product Filter plugin is vulnerable to time-based SQL Injection via the 'post-author' parameter in all versions up to, and including, 4.2.3 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. |
2026-04-08 | |
| CVE-2026-3243 | 8.8 | HIGH | CWE-22 | 0.2% p44 | 6.17 | The Advanced Members for ACF plugin for WordPress is vulnerable to arbitrary fil...The Advanced Members for ACF plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the create_crop function in all versions up to, and including, 1.2.5. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php). The vulnerability was partially patched in version 1.2.5. |
2026-04-08 | |
| CVE-2026-2481 | 6.4 | MEDIUM | CWE-79 | 0.0% p1 | 4.48 | The Beaver Builder Page Builder – Drag and Drop Website Builder plugin for WordP...The Beaver Builder Page Builder – Drag and Drop Website Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'settings[js]' parameter in versions up to, and including, 2.10.1.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-04-08 | |
| CVE-2026-28264 | 3.3 | LOW | CWE-732 | 0.0% p0 | 2.31 | Dell PowerProtect Agent Service, version(s) prior to 20.1, contain(s) an Incorre...Dell PowerProtect Agent Service, version(s) prior to 20.1, contain(s) an Incorrect Permission Assignment for Critical Resource vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Information exposure. |
2026-04-08 | |
| CVE-2026-1865 | 6.5 | MEDIUM | CWE-89 | 0.0% p8 | 4.55 | The User Registration & Membership – Free & Paid Memberships, Subscriptions, Con...The User Registration & Membership – Free & Paid Memberships, Subscriptions, Content Restriction, User Profile, Custom User Registration & Login Builder plugin for WordPress is vulnerable to SQL Injection via the ‘membership_ids[]’ parameter in all versions up to, and including, 5.1.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. |
2026-04-08 | |
| CVE-2026-1673 | 4.3 | MEDIUM | CWE-352 | 0.0% p2 | 3.01 | The BEAR – Bulk Editor and Products Manager Professional for WooCommerce by Plug...The BEAR – Bulk Editor and Products Manager Professional for WooCommerce by Pluginus.Net plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.1.5. This is due to missing nonce validation on the woobe_delete_tax_term() function. This makes it possible for unauthenticated attackers to delete WooCommerce taxonomy terms (categories, tags, etc.) via a forged request granted they can trick a site administrator or shop manager into performing an action such as clicking on a link. |
2026-04-08 | |
| CVE-2026-1672 | 6.5 | MEDIUM | CWE-352 | 0.0% p0 | 4.55 | The BEAR – Bulk Editor and Products Manager Professional for WooCommerce by Plug...The BEAR – Bulk Editor and Products Manager Professional for WooCommerce by Pluginus.Net plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.1.5. This is due to missing nonce validation on the woobe_redraw_table_row() function. This makes it possible for unauthenticated attackers to update WooCommerce product data including prices, descriptions, and other product fields via a forged request granted they can trick a site administrator or shop manager into performing an action such as clicking on a link. |
2026-04-08 | |
| CVE-2026-4303 | 6.4 | MEDIUM | CWE-79 | 0.0% p14 | 4.48 | The WP Visitor Statistics (Real Time Traffic) plugin for WordPress is vulnerable...The WP Visitor Statistics (Real Time Traffic) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'wsm_showDayStatsGraph' shortcode in all versions up to, and including, 8.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-04-08 | |
| CVE-2026-4300 | 6.4 | MEDIUM | CWE-79 | 0.0% p12 | 4.48 | The Robo Gallery plugin for WordPress is vulnerable to Stored Cross-Site Scripti...The Robo Gallery plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'Loading Label' setting in all versions up to, and including, 5.1.3. The plugin uses a custom `|***...***|` marker pattern in its `fixJsFunction()` method to embed raw JavaScript function references within JSON-encoded configuration objects. When a gallery's options are rendered on the frontend, `json_encode()` wraps all string values in double quotes. The `fixJsFunction()` method then strips the `"|***` and `***|"` sequences, effectively converting a JSON string value into raw JavaScript code. The Loading Label field (stored as `rbs_gallery_LoadingWord` post_meta) is an `rbstext` type field that is sanitized with `sanitize_text_field()` on save. While this strips HTML tags, it does not strip the `|***...***|` markers since they contain no HTML. When a user inputs `|***alert(document.domain)***|`, the value passes through sanitization intact, is stored in post_meta, and is later retrieved and output within an inline `<script>` tag via `renderMainBlock()` with the quote markers stripped — resulting in arbitrary JavaScript execution. The gallery post type uses `capability_type => 'post'`, allowing Author-level users to create galleries. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses a page containing the gallery shortcode. |
2026-04-08 | |
| CVE-2026-4073 | 6.4 | MEDIUM | CWE-79 | 0.0% p12 | 4.48 | The pdfl.io plugin for WordPress is vulnerable to Stored Cross-Site Scripting vi...The pdfl.io plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'pdflio' shortcode in all versions up to, and including, 1.0.5. This is due to insufficient input sanitization and output escaping on the 'text' shortcode attribute. The output_shortcode() function directly concatenates the user-supplied $text variable into HTML output without applying esc_html() or any other escaping function. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-04-08 | |
| CVE-2026-4025 | 6.4 | MEDIUM | CWE-79 | 0.0% p14 | 4.48 | The PrivateContent Free plugin for WordPress is vulnerable to Stored Cross-Site ...The PrivateContent Free plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'align' shortcode attribute in the [pc-login-form] shortcode in all versions up to, and including, 1.2.0. This is due to insufficient input sanitization and output escaping on the 'align' attribute. Specifically, the attribute value flows from the shortcode through pc_login_form() to pc_static::form_align(), where it is directly concatenated into an HTML class attribute without esc_attr() or any escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-04-08 | |
| CVE-2026-39716 | 5.3 | MEDIUM | CWE-862 | 0.0% p10 | 3.71 | Missing Authorization vulnerability in CKThemes Flipmart flipmart allows Exploit...Missing Authorization vulnerability in CKThemes Flipmart flipmart allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Flipmart: from n/a through <= 2.8. |
2026-04-08 | |
| CVE-2026-39715 | 5.3 | MEDIUM | CWE-862 | 0.0% p10 | 3.71 | Missing Authorization vulnerability in AnyTrack AnyTrack Affiliate Link Manager ...Missing Authorization vulnerability in AnyTrack AnyTrack Affiliate Link Manager anytrack-affiliate-link-manager allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects AnyTrack Affiliate Link Manager: from n/a through <= 1.5.5. |
2026-04-08 | |
| CVE-2026-39714 | 5.3 | MEDIUM | CWE-862 | 0.0% p10 | 3.71 | Missing Authorization vulnerability in G5Theme G5Plus April g5plus-april allows ...Missing Authorization vulnerability in G5Theme G5Plus April g5plus-april allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects G5Plus April: from n/a through <= 6.8. |
2026-04-08 | |
| CVE-2026-39713 | 5.3 | MEDIUM | CWE-862 | 0.0% p10 | 3.71 | Missing Authorization vulnerability in mailercloud Mailercloud – Integrate...Missing Authorization vulnerability in mailercloud Mailercloud – Integrate webforms and synchronize website contacts mailercloud-integrate-webforms-synchronize-contacts allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Mailercloud – Integrate webforms and synchronize website contacts: from n/a through <= 1.0.7. |
2026-04-08 | |
| CVE-2026-39712 | 5.3 | MEDIUM | CWE-80 | 0.1% p16 | 3.71 | Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vu...Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in tagDiv tagDiv Composer td-composer allows Code Injection.This issue affects tagDiv Composer: from n/a through <= 5.4.3. |
2026-04-08 | |
| CVE-2026-39711 | 5.3 | MEDIUM | CWE-201 | 0.0% p10 | 3.71 | Insertion of Sensitive Information Into Sent Data vulnerability in stmcan RT-The...Insertion of Sensitive Information Into Sent Data vulnerability in stmcan RT-Theme 18 | Extensions rt18-extensions allows Retrieve Embedded Sensitive Data.This issue affects RT-Theme 18 | Extensions: from n/a through <= 2.5. |
2026-04-08 | |
| CVE-2026-39710 | 5.4 | MEDIUM | CWE-352 | 0.0% p3 | 3.78 | Cross-Site Request Forgery (CSRF) vulnerability in stmcan RT-Theme 18 | Extensio...Cross-Site Request Forgery (CSRF) vulnerability in stmcan RT-Theme 18 | Extensions rt18-extensions allows Cross Site Request Forgery.This issue affects RT-Theme 18 | Extensions: from n/a through <= 2.5. |
2026-04-08 | |
| CVE-2026-39709 | 5.3 | MEDIUM | CWE-201 | 0.0% p10 | 3.71 | Insertion of Sensitive Information Into Sent Data vulnerability in thetechtribe ...Insertion of Sensitive Information Into Sent Data vulnerability in thetechtribe The Tribal the-tech-tribe allows Retrieve Embedded Sensitive Data.This issue affects The Tribal: from n/a through <= 1.3.4. |
2026-04-08 | |
| CVE-2026-39708 | 6.5 | MEDIUM | CWE-79 | 0.0% p9 | 4.55 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in uicore UiCore Elements uicore-elements allows Stored XSS.This issue affects UiCore Elements: from n/a through <= 1.3.14. |
2026-04-08 | |
| CVE-2026-39707 | 5.3 | MEDIUM | CWE-862 | 0.0% p10 | 3.71 | Missing Authorization vulnerability in ZealousWeb Accept PayPal Payments using C...Missing Authorization vulnerability in ZealousWeb Accept PayPal Payments using Contact Form 7 contact-form-7-paypal-extension allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Accept PayPal Payments using Contact Form 7: from n/a through <= 4.0.4. |
2026-04-08 | |
| CVE-2026-39706 | 5.3 | MEDIUM | CWE-862 | 0.0% p10 | 3.71 | Missing Authorization vulnerability in Netro Systems Make My Trivia trivialy all...Missing Authorization vulnerability in Netro Systems Make My Trivia trivialy allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Make My Trivia: from n/a through <= 1.1.0. |
2026-04-08 | |
| CVE-2026-39705 | 5.3 | MEDIUM | CWE-862 | 0.0% p10 | 3.71 | Missing Authorization vulnerability in Mulika Team MIPL WC Multisite Sync mipl-w...Missing Authorization vulnerability in Mulika Team MIPL WC Multisite Sync mipl-wc-multisite-sync allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects MIPL WC Multisite Sync: from n/a through <= 1.4.4. |
2026-04-08 | |
| CVE-2026-39704 | 5.3 | MEDIUM | CWE-862 | 0.0% p10 | 3.71 | Missing Authorization vulnerability in nfusionsolutions Precious Metals Automate...Missing Authorization vulnerability in nfusionsolutions Precious Metals Automated Product Pricing – Pro precious-metals-automated-product-pricing-pro allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Precious Metals Automated Product Pricing – Pro: from n/a through <= 4.0.5. |
2026-04-08 | |
| CVE-2026-39703 | 6.5 | MEDIUM | CWE-79 | 0.0% p9 | 4.55 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in wpbits WPBITS Addons For Elementor Page Builder wpbits-addons-for-elementor allows Stored XSS.This issue affects WPBITS Addons For Elementor Page Builder: from n/a through <= 1.8.1. |
2026-04-08 | |
| CVE-2026-39702 | 6.5 | MEDIUM | CWE-79 | 0.0% p9 | 4.55 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Wealcoder Animation Addons for Elementor animation-addons-for-elementor allows DOM-Based XSS.This issue affects Animation Addons for Elementor: from n/a through <= 2.6.1. |
2026-04-08 | |
| CVE-2026-39701 | 5.3 | MEDIUM | CWE-862 | 0.0% p10 | 3.71 | Missing Authorization vulnerability in Andrew ShopWP wpshopify allows Exploiting...Missing Authorization vulnerability in Andrew ShopWP wpshopify allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects ShopWP: from n/a through <= 5.2.4. |
2026-04-08 | |
| CVE-2026-39700 | 5.3 | MEDIUM | CWE-862 | 0.0% p10 | 3.71 | Missing Authorization vulnerability in WPXPO WowOptin optin allows Exploiting In...Missing Authorization vulnerability in WPXPO WowOptin optin allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WowOptin: from n/a through <= 1.4.32. |
2026-04-08 | |
| CVE-2026-39699 | 5.3 | MEDIUM | CWE-862 | 0.0% p10 | 3.71 | Missing Authorization vulnerability in massiveshift AI Workflow Automation ai-wo...Missing Authorization vulnerability in massiveshift AI Workflow Automation ai-workflow-automation-lite allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects AI Workflow Automation: from n/a through <= 1.4.2. |
2026-04-08 | |
| CVE-2026-39698 | 5.3 | MEDIUM | CWE-862 | 0.0% p10 | 3.71 | Missing Authorization vulnerability in PublisherDesk The Publisher Desk ads.txt ...Missing Authorization vulnerability in PublisherDesk The Publisher Desk ads.txt the-publisher-desk-ads-txt allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects The Publisher Desk ads.txt: from n/a through <= 1.5.0. |
2026-04-08 | |
| CVE-2026-39697 | 5.3 | MEDIUM | CWE-862 | 0.0% p10 | 3.71 | Missing Authorization vulnerability in HBSS Technologies MAIO – The new AI...Missing Authorization vulnerability in HBSS Technologies MAIO – The new AI GEO / SEO tool maio-the-new-ai-geo-seo-tool allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects MAIO – The new AI GEO / SEO tool: from n/a through <= 6.2.8. |
2026-04-08 | |
| CVE-2026-39696 | 6.5 | MEDIUM | CWE-79 | 0.0% p9 | 4.55 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Elfsight Elfsight WhatsApp Chat CC elfsight-whatsapp-chat allows DOM-Based XSS.This issue affects Elfsight WhatsApp Chat CC: from n/a through <= 1.2.0. |
2026-04-08 | |
| CVE-2026-39695 | 5.4 | MEDIUM | CWE-918 | 0.0% p10 | 3.78 | Server-Side Request Forgery (SSRF) vulnerability in podigee Podigee podigee allo...Server-Side Request Forgery (SSRF) vulnerability in podigee Podigee podigee allows Server Side Request Forgery.This issue affects Podigee: from n/a through <= 1.4.0. |
2026-04-08 | |
| CVE-2026-39694 | 5.3 | MEDIUM | CWE-862 | 0.0% p10 | 3.71 | Missing Authorization vulnerability in NSquared Simply Schedule Appointments sim...Missing Authorization vulnerability in NSquared Simply Schedule Appointments simply-schedule-appointments allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Simply Schedule Appointments: from n/a through <= 1.6.10.2. |
2026-04-08 | |
| CVE-2026-39693 | 5.9 | MEDIUM | CWE-79 | 0.0% p9 | 4.13 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in fesomia FSM Custom Featured Image Caption fsm-custom-featured-image-caption allows DOM-Based XSS.This issue affects FSM Custom Featured Image Caption: from n/a through <= 1.25.1. |
2026-04-08 | |
| CVE-2026-39692 | 6.5 | MEDIUM | CWE-79 | 0.0% p9 | 4.55 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in tagDiv tagDiv Composer td-composer allows Stored XSS.This issue affects tagDiv Composer: from n/a through <= 5.4.3. |
2026-04-08 | |
| CVE-2026-39691 | 5.3 | MEDIUM | CWE-862 | 0.0% p10 | 3.71 | Missing Authorization vulnerability in AdAstraCrypto Cryptocurrency Donation Box...Missing Authorization vulnerability in AdAstraCrypto Cryptocurrency Donation Box – Bitcoin & Crypto Donations cryptocurrency-donation-box allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Cryptocurrency Donation Box – Bitcoin & Crypto Donations: from n/a through <= 2.2.13. |
2026-04-08 | |
| CVE-2026-39690 | 5.3 | MEDIUM | CWE-862 | 0.0% p10 | 3.71 | Missing Authorization vulnerability in Paul Bearne Author Avatars List/Block aut...Missing Authorization vulnerability in Paul Bearne Author Avatars List/Block author-avatars allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Author Avatars List/Block: from n/a through <= 2.1.25. |
2026-04-08 | |
| CVE-2026-39689 | 0.0 | NONE | CWE-862 | 0.0% p5 | 0.00 | Missing Authorization vulnerability in eshipper eShipper Commerce eshipper-comme...Missing Authorization vulnerability in eshipper eShipper Commerce eshipper-commerce allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects eShipper Commerce: from n/a through <= 2.16.12. |
2026-04-08 | |
| CVE-2026-39688 | 5.3 | MEDIUM | CWE-862 | 0.0% p10 | 3.71 | Missing Authorization vulnerability in Glowlogix WP Frontend Profile wp-front-en...Missing Authorization vulnerability in Glowlogix WP Frontend Profile wp-front-end-profile allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Frontend Profile: from n/a through <= 1.3.9. |
2026-04-08 | |
| CVE-2026-39687 | 5.3 | MEDIUM | CWE-862 | 0.0% p10 | 3.71 | Missing Authorization vulnerability in Rapid Car Check Rapid Car Check Vehicle D...Missing Authorization vulnerability in Rapid Car Check Rapid Car Check Vehicle Data free-vehicle-data-uk allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Rapid Car Check Vehicle Data: from n/a through <= 2.0. |
2026-04-08 | |
| CVE-2026-39686 | 0.0 | NONE | CWE-497 | 0.0% p6 | 0.00 | Exposure of Sensitive System Information to an Unauthorized Control Sphere vulne...Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in bannersky BSK PDF Manager bsk-pdf-manager allows Retrieve Embedded Sensitive Data.This issue affects BSK PDF Manager: from n/a through <= 3.7.2. |
2026-04-08 | |
| CVE-2026-39685 | 5.3 | MEDIUM | CWE-862 | 0.0% p10 | 3.71 | Missing Authorization vulnerability in lvaudore The Moneytizer the-moneytizer al...Missing Authorization vulnerability in lvaudore The Moneytizer the-moneytizer allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects The Moneytizer: from n/a through <= 10.0.10. |
2026-04-08 | |
| CVE-2026-39684 | 7.5 | HIGH | CWE-98 | 0.1% p32 | 5.25 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in UnTheme OrganicFood organicfood allows PHP Local File Inclusion.This issue affects OrganicFood: from n/a through <= 3.6.4. |
2026-04-08 | |
| CVE-2026-39683 | 5.9 | MEDIUM | CWE-79 | 0.0% p9 | 4.13 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Chief Gnome Garden Gnome Package garden-gnome-package allows DOM-Based XSS.This issue affects Garden Gnome Package: from n/a through <= 2.4.1. |
2026-04-08 | |
| CVE-2026-39682 | 5.3 | MEDIUM | CWE-862 | 0.0% p10 | 3.71 | Missing Authorization vulnerability in Arjan Pronk linkPizza-Manager linkpizza-m...Missing Authorization vulnerability in Arjan Pronk linkPizza-Manager linkpizza-manager allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects linkPizza-Manager: from n/a through <= 5.5.5. |
2026-04-08 | |
| CVE-2026-39681 | 7.5 | HIGH | CWE-98 | 0.1% p32 | 5.25 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ApusTheme Homeo homeo allows PHP Local File Inclusion.This issue affects Homeo: from n/a through <= 1.2.59. |
2026-04-08 | |
| CVE-2026-39680 | 5.3 | MEDIUM | CWE-862 | 0.0% p10 | 3.71 | Missing Authorization vulnerability in MWP Development Diet Calorie Calculator d...Missing Authorization vulnerability in MWP Development Diet Calorie Calculator diet-calorie-calculator allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Diet Calorie Calculator: from n/a through <= 1.1.1. |
2026-04-08 | |
| CVE-2026-39679 | 7.5 | HIGH | CWE-98 | 0.1% p32 | 5.25 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ApusTheme Freeio freeio allows PHP Local File Inclusion.This issue affects Freeio: from n/a through <= 1.3.21. |
2026-04-08 | |
| CVE-2026-39678 | 5.3 | MEDIUM | CWE-862 | 0.0% p10 | 3.71 | Missing Authorization vulnerability in DOTonPAPER Pinpoint Booking System bookin...Missing Authorization vulnerability in DOTonPAPER Pinpoint Booking System booking-system allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Pinpoint Booking System: from n/a through <= 2.9.9.6.5. |
2026-04-08 | |
| CVE-2026-39677 | 7.5 | HIGH | CWE-98 | 0.1% p32 | 5.25 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Creatives_Planet Emphires emphires allows PHP Local File Inclusion.This issue affects Emphires: from n/a through <= 3.9. |
2026-04-08 | |
| CVE-2026-39676 | 5.3 | MEDIUM | CWE-862 | 0.0% p10 | 3.71 | Missing Authorization vulnerability in Shahjada Download Manager download-manage...Missing Authorization vulnerability in Shahjada Download Manager download-manager allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Download Manager: from n/a through <= 3.3.52. |
2026-04-08 | |
| CVE-2026-39675 | 5.3 | MEDIUM | CWE-862 | 0.0% p10 | 3.71 | Missing Authorization vulnerability in webmuehle Court Reservation court-reserva...Missing Authorization vulnerability in webmuehle Court Reservation court-reservation allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Court Reservation: from n/a through <= 1.10.11. |
2026-04-08 | |
| CVE-2026-39674 | 6.5 | MEDIUM | CWE-79 | 0.0% p9 | 4.55 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Manoj Kumar MK Google Directions google-distance-calculator allows DOM-Based XSS.This issue affects MK Google Directions: from n/a through <= 3.1.1. |
2026-04-08 | |
| CVE-2026-39673 | 5.3 | MEDIUM | CWE-862 | 0.0% p10 | 3.71 | Missing Authorization vulnerability in shrikantkale iZooto izooto-web-push allow...Missing Authorization vulnerability in shrikantkale iZooto izooto-web-push allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects iZooto: from n/a through <= 3.7.20. |
2026-04-08 | |
| CVE-2026-39672 | 5.3 | MEDIUM | CWE-862 | 0.0% p10 | 3.71 | Missing Authorization vulnerability in shiptime ShipTime: Discounted Shipping Ra...Missing Authorization vulnerability in shiptime ShipTime: Discounted Shipping Rates shiptime-discount-shipping allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects ShipTime: Discounted Shipping Rates: from n/a through <= 1.1.1. |
2026-04-08 | |
| CVE-2026-39671 | 7.1 | HIGH | CWE-352 | 0.0% p3 | 4.97 | Cross-Site Request Forgery (CSRF) vulnerability in Dotstore Extra Fees Plugin fo...Cross-Site Request Forgery (CSRF) vulnerability in Dotstore Extra Fees Plugin for WooCommerce woo-conditional-product-fees-for-checkout allows Cross Site Request Forgery.This issue affects Extra Fees Plugin for WooCommerce: from n/a through <= 4.3.3. |
2026-04-08 | |
| CVE-2026-39670 | 6.0 | MEDIUM | CWE-918 | 0.0% p11 | 4.20 | Server-Side Request Forgery (SSRF) vulnerability in Brecht Visual Link Preview v...Server-Side Request Forgery (SSRF) vulnerability in Brecht Visual Link Preview visual-link-preview allows Server Side Request Forgery.This issue affects Visual Link Preview: from n/a through <= 2.3.0. |
2026-04-08 | |
| CVE-2026-39669 | 5.3 | MEDIUM | CWE-862 | 0.0% p10 | 3.71 | Missing Authorization vulnerability in NitroPack NitroPack nitropack allows Expl...Missing Authorization vulnerability in NitroPack NitroPack nitropack allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects NitroPack: from n/a through <= 1.19.3. |
2026-04-08 | |
| CVE-2026-39668 | 5.3 | MEDIUM | CWE-862 | 0.0% p10 | 3.71 | Missing Authorization vulnerability in g5theme Book Previewer for Woocommerce bo...Missing Authorization vulnerability in g5theme Book Previewer for Woocommerce book-previewer-for-woocommerce allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Book Previewer for Woocommerce: from n/a through <= 1.0.6. |
2026-04-08 | |
| CVE-2026-39667 | 5.9 | MEDIUM | CWE-79 | 0.0% p9 | 4.13 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Jongmyoung Kim Korea SNS korea-sns allows DOM-Based XSS.This issue affects Korea SNS: from n/a through <= 1.7.0. |
2026-04-08 | |
| CVE-2026-39666 | 6.5 | MEDIUM | CWE-79 | 0.0% p9 | 4.55 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in telepathy Hello Bar Popup Builder hellobar allows DOM-Based XSS.This issue affects Hello Bar Popup Builder: from n/a through <= 1.5.1. |
2026-04-08 | |
| CVE-2026-39665 | 6.5 | MEDIUM | CWE-79 | 0.0% p9 | 4.55 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Vladimir Prelovac SEO Friendly Images seo-image allows DOM-Based XSS.This issue affects SEO Friendly Images: from n/a through <= 3.0.5. |
2026-04-08 | |
| CVE-2026-39664 | 5.3 | MEDIUM | CWE-862 | 0.0% p10 | 3.71 | Missing Authorization vulnerability in leadrebel Leadrebel leadrebel allows Expl...Missing Authorization vulnerability in leadrebel Leadrebel leadrebel allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Leadrebel: from n/a through <= 1.0.2. |
2026-04-08 | |
| CVE-2026-39663 | 5.3 | MEDIUM | CWE-862 | 0.0% p10 | 3.71 | Missing Authorization vulnerability in themetechmount TrueBooker truebooker-appo...Missing Authorization vulnerability in themetechmount TrueBooker truebooker-appointment-booking allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects TrueBooker: from n/a through <= 1.1.5. |
2026-04-08 | |
| CVE-2026-39662 | 5.3 | MEDIUM | CWE-862 | 0.0% p10 | 3.71 | Missing Authorization vulnerability in ProWCPlugins Product Price by Formula for...Missing Authorization vulnerability in ProWCPlugins Product Price by Formula for WooCommerce product-price-by-formula-for-woocommerce allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Product Price by Formula for WooCommerce: from n/a through <= 2.5.6. |
2026-04-08 | |
| CVE-2026-39660 | 5.3 | MEDIUM | CWE-862 | 0.0% p10 | 3.71 | Missing Authorization vulnerability in Automattic WP Job Manager wp-job-manager ...Missing Authorization vulnerability in Automattic WP Job Manager wp-job-manager allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Job Manager: from n/a through <= 2.4.1. |
2026-04-08 | |
| CVE-2026-39659 | 5.3 | MEDIUM | CWE-862 | 0.0% p10 | 3.71 | Missing Authorization vulnerability in Ultimate Member Ultimate Member ultimate-...Missing Authorization vulnerability in Ultimate Member Ultimate Member ultimate-member allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Ultimate Member: from n/a through <= 2.11.3. |
2026-04-08 | |
| CVE-2026-39658 | 5.3 | MEDIUM | CWE-862 | 0.0% p10 | 3.71 | Missing Authorization vulnerability in Coding Panda Panda Pods Repeater Field pa...Missing Authorization vulnerability in Coding Panda Panda Pods Repeater Field panda-pods-repeater-field allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Panda Pods Repeater Field: from n/a through <= 1.5.12. |
2026-04-08 | |
| CVE-2026-39657 | 5.3 | MEDIUM | CWE-862 | 0.0% p10 | 3.71 | Missing Authorization vulnerability in leadlovers leadlovers forms leadlovers-fo...Missing Authorization vulnerability in leadlovers leadlovers forms leadlovers-forms allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects leadlovers forms: from n/a through <= 1.0.2. |
2026-04-08 | |
| CVE-2026-39656 | 5.3 | MEDIUM | CWE-862 | 0.0% p10 | 3.71 | Missing Authorization vulnerability in Razorpay Razorpay for WooCommerce woo-raz...Missing Authorization vulnerability in Razorpay Razorpay for WooCommerce woo-razorpay allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Razorpay for WooCommerce: from n/a through <= 4.8.2. |
2026-04-08 | |
| CVE-2026-39654 | 0.0 | NONE | CWE-79 | 0.0% p11 | 0.00 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Ashish Ajani WP Simple HTML Sitemap wp-simple-html-sitemap allows DOM-Based XSS.This issue affects WP Simple HTML Sitemap: from n/a through <= 3.8. |
2026-04-08 | |
| CVE-2026-39653 | 4.3 | MEDIUM | CWE-862 | 0.0% p8 | 3.01 | Missing Authorization vulnerability in Deepen Bajracharya Video Conferencing wit...Missing Authorization vulnerability in Deepen Bajracharya Video Conferencing with Zoom video-conferencing-with-zoom-api allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Video Conferencing with Zoom: from n/a through <= 4.6.6. |
2026-04-08 | |
| CVE-2026-39652 | 5.3 | MEDIUM | CWE-862 | 0.0% p10 | 3.71 | Missing Authorization vulnerability in igms iGMS Direct Booking igms-direct-book...Missing Authorization vulnerability in igms iGMS Direct Booking igms-direct-booking allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects iGMS Direct Booking: from n/a through <= 1.3. |
2026-04-08 | |
| CVE-2026-39651 | 6.3 | MEDIUM | CWE-862 | 0.0% p11 | 4.41 | Missing Authorization vulnerability in TotalSuite Total Poll Lite totalpoll-lite...Missing Authorization vulnerability in TotalSuite Total Poll Lite totalpoll-lite allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Total Poll Lite: from n/a through <= 4.12.0. |
2026-04-08 | |
| CVE-2026-39650 | 5.3 | MEDIUM | CWE-862 | 0.0% p10 | 3.71 | Missing Authorization vulnerability in Unitech Web UnitechPay unitechpay-paiemen...Missing Authorization vulnerability in Unitech Web UnitechPay unitechpay-paiements-mobile-money allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects UnitechPay: from n/a through <= 1.0.2. |
2026-04-08 | |
| CVE-2026-39649 | 5.3 | MEDIUM | CWE-862 | 0.0% p10 | 3.71 | Missing Authorization vulnerability in themebeez Royale News royale-news allows ...Missing Authorization vulnerability in themebeez Royale News royale-news allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Royale News: from n/a through <= 2.2.4. |
2026-04-08 | |
| CVE-2026-39648 | 5.3 | MEDIUM | CWE-862 | 0.0% p10 | 3.71 | Missing Authorization vulnerability in themebeez Cream Blog cream-blog allows Ex...Missing Authorization vulnerability in themebeez Cream Blog cream-blog allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Cream Blog: from n/a through <= 2.1.7. |
2026-04-08 | |
| CVE-2026-39647 | 5.4 | MEDIUM | CWE-918 | 0.0% p10 | 3.78 | Server-Side Request Forgery (SSRF) vulnerability in sonaar MP3 Audio Player for ...Server-Side Request Forgery (SSRF) vulnerability in sonaar MP3 Audio Player for Music, Radio & Podcast by Sonaar mp3-music-player-by-sonaar allows Server Side Request Forgery.This issue affects MP3 Audio Player for Music, Radio & Podcast by Sonaar: from n/a through <= 5.11. |
2026-04-08 | |
| CVE-2026-39646 | 6.5 | MEDIUM | CWE-79 | 0.0% p9 | 4.55 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in bozdoz Leaflet Map leaflet-map allows Stored XSS.This issue affects Leaflet Map: from n/a through <= 3.4.4. |
2026-04-08 | |
| CVE-2026-39645 | 5.4 | MEDIUM | CWE-918 | 0.0% p10 | 3.78 | Server-Side Request Forgery (SSRF) vulnerability in Global Payments GlobalPaymen...Server-Side Request Forgery (SSRF) vulnerability in Global Payments GlobalPayments WooCommerce global-payments-woocommerce allows Server Side Request Forgery.This issue affects GlobalPayments WooCommerce: from n/a through <= 1.18.0. |
2026-04-08 | |
| CVE-2026-39644 | 5.3 | MEDIUM | CWE-862 | 0.0% p10 | 3.71 | Missing Authorization vulnerability in Roxnor Wp Ultimate Review wp-ultimate-rev...Missing Authorization vulnerability in Roxnor Wp Ultimate Review wp-ultimate-review allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Wp Ultimate Review: from n/a through <= 2.3.8. |
2026-04-08 | |
| CVE-2026-39643 | 5.3 | MEDIUM | CWE-862 | 0.0% p10 | 3.71 | Missing Authorization vulnerability in Payment Plugins Payment Plugins for PayPa...Missing Authorization vulnerability in Payment Plugins Payment Plugins for PayPal WooCommerce pymntpl-paypal-woocommerce allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Payment Plugins for PayPal WooCommerce: from n/a through <= 2.0.13. |
2026-04-08 | |
| CVE-2026-39641 | 6.5 | MEDIUM | CWE-352 | 0.0% p3 | 4.55 | Cross-Site Request Forgery (CSRF) vulnerability in Skywarrior Blackfyre blackfyr...Cross-Site Request Forgery (CSRF) vulnerability in Skywarrior Blackfyre blackfyre allows Cross Site Request Forgery.This issue affects Blackfyre: from n/a through <= 2.5.4. |
2026-04-08 | |
| CVE-2026-39640 | 9.6 | CRITICAL | CWE-352 | 0.0% p4 | 6.72 | Cross-Site Request Forgery (CSRF) vulnerability in mndpsingh287 Theme Editor the...Cross-Site Request Forgery (CSRF) vulnerability in mndpsingh287 Theme Editor theme-editor allows Code Injection.This issue affects Theme Editor: from n/a through <= 3.2. |
2026-04-08 | |
| CVE-2026-39639 | 6.5 | MEDIUM | CWE-862 | 0.0% p8 | 4.55 | Missing Authorization vulnerability in redpixelstudios RPS Include Content rps-i...Missing Authorization vulnerability in redpixelstudios RPS Include Content rps-include-content allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects RPS Include Content: from n/a through <= 1.2.2. |
2026-04-08 | |
| CVE-2026-39638 | 5.9 | MEDIUM | CWE-79 | 0.0% p9 | 4.13 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Themeum Qubely qubely allows Stored XSS.This issue affects Qubely: from n/a through <= 1.8.14. |
2026-04-08 | |
| CVE-2026-39637 | 5.3 | MEDIUM | CWE-862 | 0.0% p10 | 3.71 | Missing Authorization vulnerability in SpabRice Mogi mogi allows Exploiting Inco...Missing Authorization vulnerability in SpabRice Mogi mogi allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Mogi: from n/a through <= 1.2.3. |
2026-04-08 | |
| CVE-2026-39636 | 6.5 | MEDIUM | CWE-79 | 0.0% p9 | 4.55 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in livemesh Livemesh Addons for Elementor addons-for-elementor allows Stored XSS.This issue affects Livemesh Addons for Elementor: from n/a through <= 9.0. |
2026-04-08 | |
| CVE-2026-39635 | 5.4 | MEDIUM | CWE-352 | 0.0% p2 | 3.78 | Cross-Site Request Forgery (CSRF) vulnerability in ThemeGoods Grand Magazine gra...Cross-Site Request Forgery (CSRF) vulnerability in ThemeGoods Grand Magazine grandmagazine allows Cross Site Request Forgery.This issue affects Grand Magazine: from n/a through <= 3.5.5. |
2026-04-08 | |
| CVE-2026-39634 | 5.4 | MEDIUM | CWE-352 | 0.0% p3 | 3.78 | Cross-Site Request Forgery (CSRF) vulnerability in ThemeGoods Grand Portfolio gr...Cross-Site Request Forgery (CSRF) vulnerability in ThemeGoods Grand Portfolio grandportfolio allows Cross Site Request Forgery.This issue affects Grand Portfolio: from n/a through <= 3.3. |
2026-04-08 | |
| CVE-2026-39633 | 6.5 | MEDIUM | CWE-352 | 0.0% p2 | 4.55 | Cross-Site Request Forgery (CSRF) vulnerability in ThemeGoods Grand Car Rental g...Cross-Site Request Forgery (CSRF) vulnerability in ThemeGoods Grand Car Rental grandcarrental allows Cross Site Request Forgery.This issue affects Grand Car Rental: from n/a through <= 3.6.9. |
2026-04-08 | |
| CVE-2026-39632 | 6.5 | MEDIUM | CWE-352 | 0.0% p3 | 4.55 | Cross-Site Request Forgery (CSRF) vulnerability in ThemeGoods Grand Blog grandbl...Cross-Site Request Forgery (CSRF) vulnerability in ThemeGoods Grand Blog grandblog allows Cross Site Request Forgery.This issue affects Grand Blog: from n/a through <= 3.1. |
2026-04-08 | |
| CVE-2026-39631 | 4.9 | MEDIUM | CWE-862 | 0.0% p9 | 3.43 | Missing Authorization vulnerability in Ronik@UnlimitedWP WPSchoolPress wpschoolp...Missing Authorization vulnerability in Ronik@UnlimitedWP WPSchoolPress wpschoolpress allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WPSchoolPress: from n/a through <= 2.2.35. |
2026-04-08 | |
| CVE-2026-39630 | 6.4 | MEDIUM | CWE-918 | 0.0% p7 | 4.48 | Server-Side Request Forgery (SSRF) vulnerability in Getty Images Getty Images ge...Server-Side Request Forgery (SSRF) vulnerability in Getty Images Getty Images getty-images allows Server Side Request Forgery.This issue affects Getty Images: from n/a through <= 4.1.0. |
2026-04-08 | |
| CVE-2026-39629 | 5.3 | MEDIUM | CWE-80 | 0.1% p15 | 3.71 | Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vu...Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in kutethemes Uminex uminex allows Code Injection.This issue affects Uminex: from n/a through <= 1.0.9. |
2026-04-08 | |
| CVE-2026-39628 | 5.3 | MEDIUM | CWE-80 | 0.1% p16 | 3.71 | Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vu...Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in kutethemes DukaMarket dukamarket allows Code Injection.This issue affects DukaMarket: from n/a through <= 1.3.0. |
2026-04-08 | |
| CVE-2026-39627 | 4.3 | MEDIUM | CWE-862 | 0.0% p8 | 3.01 | Missing Authorization vulnerability in wproyal Ashe ashe allows Exploiting Incor...Missing Authorization vulnerability in wproyal Ashe ashe allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Ashe: from n/a through <= 2.266. |
2026-04-08 | |
| CVE-2026-39626 | 5.3 | MEDIUM | CWE-80 | 0.1% p16 | 3.71 | Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vu...Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in kutethemes Armania armania allows Code Injection.This issue affects Armania: from n/a through <= 1.4.8. |
2026-04-08 | |
| CVE-2026-39625 | 5.3 | MEDIUM | CWE-80 | 0.1% p15 | 3.71 | Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vu...Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in kutethemes TechOne techone allows Code Injection.This issue affects TechOne: from n/a through <= 3.0.3. |
2026-04-08 | |
| CVE-2026-39624 | 5.3 | MEDIUM | CWE-862 | 0.0% p10 | 3.71 | Missing Authorization vulnerability in kutethemes Biolife biolife allows Exploit...Missing Authorization vulnerability in kutethemes Biolife biolife allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Biolife: from n/a through <= 3.2.3. |
2026-04-08 | |
| CVE-2026-39623 | 7.5 | HIGH | CWE-98 | 0.1% p32 | 5.25 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in kutethemes Biolife biolife allows PHP Local File Inclusion.This issue affects Biolife: from n/a through <= 3.2.3. |
2026-04-08 | |
| CVE-2026-39622 | 5.3 | MEDIUM | CWE-862 | 0.0% p10 | 3.71 | Missing Authorization vulnerability in acmethemes Education Base education-base ...Missing Authorization vulnerability in acmethemes Education Base education-base allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Education Base: from n/a through <= 3.0.8. |
2026-04-08 | |
| CVE-2026-39621 | 8.8 | HIGH | CWE-352 | 0.0% p4 | 6.16 | Cross-Site Request Forgery (CSRF) vulnerability in spicethemes SpicePress spicep...Cross-Site Request Forgery (CSRF) vulnerability in spicethemes SpicePress spicepress allows Upload a Web Shell to a Web Server.This issue affects SpicePress: from n/a through <= 2.3.2.5. |
2026-04-08 | |
| CVE-2026-39620 | 9.6 | CRITICAL | CWE-352 | 0.0% p4 | 6.72 | Cross-Site Request Forgery (CSRF) vulnerability in priyanshumittal Appointment a...Cross-Site Request Forgery (CSRF) vulnerability in priyanshumittal Appointment appointment allows Upload a Web Shell to a Web Server.This issue affects Appointment: from n/a through <= 3.5.5. |
2026-04-08 | |
| CVE-2026-39619 | 9.6 | CRITICAL | CWE-352 | 0.0% p4 | 6.72 | Cross-Site Request Forgery (CSRF) vulnerability in priyanshumittal Busiprof busi...Cross-Site Request Forgery (CSRF) vulnerability in priyanshumittal Busiprof busiprof allows Upload a Web Shell to a Web Server.This issue affects Busiprof: from n/a through <= 2.5.2. |
2026-04-08 | |
| CVE-2026-39618 | 4.3 | MEDIUM | CWE-352 | 0.0% p3 | 3.01 | Cross-Site Request Forgery (CSRF) vulnerability in themearile NewsExo newsexo al...Cross-Site Request Forgery (CSRF) vulnerability in themearile NewsExo newsexo allows Cross Site Request Forgery.This issue affects NewsExo: from n/a through <= 7.1. |
2026-04-08 | |
| CVE-2026-39617 | 9.6 | CRITICAL | CWE-352 | 0.0% p4 | 6.72 | Cross-Site Request Forgery (CSRF) vulnerability in priyanshumittal Bluestreet bl...Cross-Site Request Forgery (CSRF) vulnerability in priyanshumittal Bluestreet bluestreet allows Cross Site Request Forgery.This issue affects Bluestreet: from n/a through <= 1.7.3. |
2026-04-08 | |
| CVE-2026-39616 | 5.3 | MEDIUM | CWE-639 | 0.0% p10 | 3.71 | Authorization Bypass Through User-Controlled Key vulnerability in dFactory Downl...Authorization Bypass Through User-Controlled Key vulnerability in dFactory Download Attachments download-attachments allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Download Attachments: from n/a through <= 1.4.0. |
2026-04-08 | |
| CVE-2026-39615 | 5.9 | MEDIUM | CWE-79 | 0.0% p9 | 4.13 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Shahjada Download Manager download-manager allows Stored XSS.This issue affects Download Manager: from n/a through <= 3.3.53. |
2026-04-08 | |
| CVE-2026-39614 | 5.4 | MEDIUM | CWE-862 | 0.0% p7 | 3.78 | Missing Authorization vulnerability in ilGhera JW Player for WordPress jw-player...Missing Authorization vulnerability in ilGhera JW Player for WordPress jw-player-7-for-wp allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects JW Player for WordPress: from n/a through <= 2.3.6. |
2026-04-08 | |
| CVE-2026-39613 | 7.5 | HIGH | CWE-98 | 0.1% p32 | 5.25 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in kutethemes Boutique kute-boutique allows PHP Local File Inclusion.This issue affects Boutique: from n/a through <= 2.3.3. |
2026-04-08 | |
| CVE-2026-39612 | 5.3 | MEDIUM | CWE-862 | 0.0% p10 | 3.71 | Missing Authorization vulnerability in kutethemes KuteShop kuteshop allows Explo...Missing Authorization vulnerability in kutethemes KuteShop kuteshop allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects KuteShop: from n/a through <= 4.2.9. |
2026-04-08 | |
| CVE-2026-39611 | 7.5 | HIGH | CWE-98 | 0.1% p32 | 5.25 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in kutethemes KuteShop kuteshop allows PHP Local File Inclusion.This issue affects KuteShop: from n/a through <= 4.2.9. |
2026-04-08 | |
| CVE-2026-39610 | 5.3 | MEDIUM | CWE-862 | 0.0% p10 | 3.71 | Missing Authorization vulnerability in Pankaj Kumar WpXmas-Snow wpxmas-snow allo...Missing Authorization vulnerability in Pankaj Kumar WpXmas-Snow wpxmas-snow allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WpXmas-Snow: from n/a through <= 1.1. |
2026-04-08 | |
| CVE-2026-39609 | 5.3 | MEDIUM | CWE-862 | 0.0% p10 | 3.71 | Missing Authorization vulnerability in Wava.co Wava Payment wava-payment allows ...Missing Authorization vulnerability in Wava.co Wava Payment wava-payment allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Wava Payment: from n/a through <= 0.3.7. |
2026-04-08 | |
| CVE-2026-39608 | 5.3 | MEDIUM | CWE-862 | 0.0% p10 | 3.71 | Missing Authorization vulnerability in iPOSPays iPOSpays Gateways WC ipospays-ga...Missing Authorization vulnerability in iPOSPays iPOSpays Gateways WC ipospays-gateways-wc allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects iPOSpays Gateways WC: from n/a through <= 1.3.7. |
2026-04-08 | |
| CVE-2026-39607 | 5.4 | MEDIUM | CWE-862 | 0.0% p7 | 3.78 | Missing Authorization vulnerability in Wpbens Filter Plus filter-plus allows Exp...Missing Authorization vulnerability in Wpbens Filter Plus filter-plus allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Filter Plus: from n/a through <= 1.1.17. |
2026-04-08 | |
| CVE-2026-39606 | 5.3 | MEDIUM | CWE-862 | 0.0% p10 | 3.71 | Missing Authorization vulnerability in Foysal Imran BizReview bizreview allows E...Missing Authorization vulnerability in Foysal Imran BizReview bizreview allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects BizReview: from n/a through <= 1.5.13. |
2026-04-08 | |
| CVE-2026-39605 | 5.3 | MEDIUM | CWE-862 | 0.0% p10 | 3.71 | Missing Authorization vulnerability in Obadiah Super Custom Login super-custom-l...Missing Authorization vulnerability in Obadiah Super Custom Login super-custom-login allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Super Custom Login: from n/a through <= 1.1. |
2026-04-08 | |
| CVE-2026-39604 | 5.9 | MEDIUM | CWE-79 | 0.0% p9 | 4.13 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in zookatron MyBookTable Bookstore mybooktable allows Stored XSS.This issue affects MyBookTable Bookstore: from n/a through <= 3.6.0. |
2026-04-08 | |
| CVE-2026-39603 | 5.4 | MEDIUM | CWE-352 | 0.0% p3 | 3.78 | Cross-Site Request Forgery (CSRF) vulnerability in ThemeGoods Grand Photography ...Cross-Site Request Forgery (CSRF) vulnerability in ThemeGoods Grand Photography grandphotography allows Cross Site Request Forgery.This issue affects Grand Photography: from n/a through <= 5.7.8. |
2026-04-08 | |
| CVE-2026-39602 | 0.0 | NONE | CWE-862 | 0.0% p5 | 0.00 | Missing Authorization vulnerability in Rustaurius Order Tracking order-tracking ...Missing Authorization vulnerability in Rustaurius Order Tracking order-tracking allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Order Tracking: from n/a through <= 3.4.3. |
2026-04-08 | |
| CVE-2026-39592 | 4.3 | MEDIUM | CWE-862 | 0.0% p7 | 3.01 | Missing Authorization vulnerability in Andy Ha DEPART depart-deposit-and-part-pa...Missing Authorization vulnerability in Andy Ha DEPART depart-deposit-and-part-payment-for-woo allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects DEPART: from n/a through <= 1.0.7. |
2026-04-08 | |
| CVE-2026-39588 | 5.3 | MEDIUM | CWE-862 | 0.0% p10 | 3.71 | Missing Authorization vulnerability in nmerii NM Gift Registry and Wishlist Lite...Missing Authorization vulnerability in nmerii NM Gift Registry and Wishlist Lite nm-gift-registry-and-wishlist-lite allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects NM Gift Registry and Wishlist Lite: from n/a through <= 5.13. |
2026-04-08 | |
| CVE-2026-39586 | 5.3 | MEDIUM | CWE-201 | 0.0% p10 | 3.71 | Insertion of Sensitive Information Into Sent Data vulnerability in Ateeq Rafeeq ...Insertion of Sensitive Information Into Sent Data vulnerability in Ateeq Rafeeq RepairBuddy computer-repair-shop allows Retrieve Embedded Sensitive Data.This issue affects RepairBuddy: from n/a through <= 4.1132. |
2026-04-08 | |
| CVE-2026-39585 | 5.3 | MEDIUM | CWE-862 | 0.0% p10 | 3.71 | Missing Authorization vulnerability in Arraytics Booktics booktics allows Exploi...Missing Authorization vulnerability in Arraytics Booktics booktics allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Booktics: from n/a through <= 1.0.16. |
2026-04-08 | |
| CVE-2026-39575 | 6.5 | MEDIUM | CWE-79 | 0.0% p9 | 4.55 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Ronald Huereca Custom Query Blocks post-type-archive-mapping allows DOM-Based XSS.This issue affects Custom Query Blocks: from n/a through <= 5.5.0. |
2026-04-08 | |
| CVE-2026-39572 | 4.0 | MEDIUM | CWE-497 | 0.0% p10 | 2.80 | Exposure of Sensitive System Information to an Unauthorized Control Sphere vulne...Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in magepeopleteam Bus Ticket Booking with Seat Reservation bus-ticket-booking-with-seat-reservation allows Retrieve Embedded Sensitive Data.This issue affects Bus Ticket Booking with Seat Reservation: from n/a through < 5.6.5. |
2026-04-08 | |
| CVE-2026-39571 | 5.3 | MEDIUM | CWE-497 | 0.0% p10 | 3.71 | Exposure of Sensitive System Information to an Unauthorized Control Sphere vulne...Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in Themefic Instantio instantio allows Retrieve Embedded Sensitive Data.This issue affects Instantio: from n/a through <= 3.3.30. |
2026-04-08 | |
| CVE-2026-39570 | 5.3 | MEDIUM | CWE-201 | 0.0% p10 | 3.71 | Insertion of Sensitive Information Into Sent Data vulnerability in AA Web Servan...Insertion of Sensitive Information Into Sent Data vulnerability in AA Web Servant 12 Step Meeting List 12-step-meeting-list allows Retrieve Embedded Sensitive Data.This issue affects 12 Step Meeting List: from n/a through <= 3.19.9. |
2026-04-08 | |
| CVE-2026-39569 | 6.5 | MEDIUM | CWE-862 | 0.0% p8 | 4.55 | Missing Authorization vulnerability in AA Web Servant 12 Step Meeting List 12-st...Missing Authorization vulnerability in AA Web Servant 12 Step Meeting List 12-step-meeting-list allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects 12 Step Meeting List: from n/a through <= 3.19.9. |
2026-04-08 | |
| CVE-2026-39566 | 4.0 | MEDIUM | CWE-497 | 0.0% p10 | 2.80 | Exposure of Sensitive System Information to an Unauthorized Control Sphere vulne...Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in Designinvento DirectoryPress directorypress allows Retrieve Embedded Sensitive Data.This issue affects DirectoryPress: from n/a through <= 3.6.26. |
2026-04-08 | |
| CVE-2026-39565 | 4.3 | MEDIUM | CWE-862 | 0.0% p7 | 3.01 | Missing Authorization vulnerability in magepeopleteam WpTravelly tour-booking-ma...Missing Authorization vulnerability in magepeopleteam WpTravelly tour-booking-manager allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WpTravelly: from n/a through <= 2.1.7. |
2026-04-08 | |
| CVE-2026-39564 | 5.3 | MEDIUM | CWE-201 | 0.0% p10 | 3.71 | Insertion of Sensitive Information Into Sent Data vulnerability in sunshinephoto...Insertion of Sensitive Information Into Sent Data vulnerability in sunshinephotocart Sunshine Photo Cart sunshine-photo-cart allows Retrieve Embedded Sensitive Data.This issue affects Sunshine Photo Cart: from n/a through < 3.6.2. |
2026-04-08 | |
| CVE-2026-39563 | 5.3 | MEDIUM | CWE-862 | 0.0% p10 | 3.71 | Missing Authorization vulnerability in ILLID Share This Image share-this-image a...Missing Authorization vulnerability in ILLID Share This Image share-this-image allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Share This Image: from n/a through <= 2.12. |
2026-04-08 | |
| CVE-2026-39562 | 5.3 | MEDIUM | CWE-862 | 0.0% p10 | 3.71 | Missing Authorization vulnerability in BoldGrid Client Invoicing by Sprout Invoi...Missing Authorization vulnerability in BoldGrid Client Invoicing by Sprout Invoices sprout-invoices allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Client Invoicing by Sprout Invoices: from n/a through <= 20.8.10. |
2026-04-08 | |
| CVE-2026-39561 | 5.3 | MEDIUM | CWE-862 | 0.0% p10 | 3.71 | Missing Authorization vulnerability in WP Chill Revive.so revive-so allows Explo...Missing Authorization vulnerability in WP Chill Revive.so revive-so allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Revive.so: from n/a through <= 2.0.7. |
2026-04-08 | |
| CVE-2026-39544 | 7.5 | HIGH | CWE-98 | 0.1% p32 | 5.25 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in themeStek LabtechCO labtechco allows PHP Local File Inclusion.This issue affects LabtechCO: from n/a through <= 8.3. |
2026-04-08 | |
| CVE-2026-39543 | 5.3 | MEDIUM | CWE-862 | 0.0% p10 | 3.71 | Missing Authorization vulnerability in Themefic Tourfic tourfic allows Exploitin...Missing Authorization vulnerability in Themefic Tourfic tourfic allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Tourfic: from n/a through <= 2.21.4. |
2026-04-08 | |
| CVE-2026-39542 | 5.3 | MEDIUM | CWE-201 | 0.0% p10 | 3.71 | Insertion of Sensitive Information Into Sent Data vulnerability in Doofinder Doo...Insertion of Sensitive Information Into Sent Data vulnerability in Doofinder Doofinder for WooCommerce doofinder-for-woocommerce allows Retrieve Embedded Sensitive Data.This issue affects Doofinder for WooCommerce: from n/a through <= 2.10.13. |
2026-04-08 | |
| CVE-2026-39541 | 5.9 | MEDIUM | CWE-79 | 0.0% p9 | 4.13 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Themefic Hydra Booking hydra-booking allows Stored XSS.This issue affects Hydra Booking: from n/a through <= 1.1.38. |
2026-04-08 | |
| CVE-2026-39538 | 7.5 | HIGH | CWE-98 | 0.1% p32 | 5.25 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Mikado-Themes Mikado Core mikado-core allows PHP Local File Inclusion.This issue affects Mikado Core: from n/a through <= 1.6. |
2026-04-08 | |
| CVE-2026-39536 | 5.3 | MEDIUM | CWE-497 | 0.0% p10 | 3.71 | Exposure of Sensitive System Information to an Unauthorized Control Sphere vulne...Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in WP Chill RSVP and Event Management rsvp allows Retrieve Embedded Sensitive Data.This issue affects RSVP and Event Management: from n/a through <= 2.7.16. |
2026-04-08 | |
| CVE-2026-39535 | 5.3 | MEDIUM | CWE-862 | 0.0% p10 | 3.71 | Missing Authorization vulnerability in fullworks Display Eventbrite Events widge...Missing Authorization vulnerability in fullworks Display Eventbrite Events widget-for-eventbrite-api allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Display Eventbrite Events: from n/a through <= 6.5.6. |
2026-04-08 | |
| CVE-2026-39528 | 5.3 | MEDIUM | CWE-862 | 0.0% p10 | 3.71 | Missing Authorization vulnerability in WP Delicious WP Delicious delicious-recip...Missing Authorization vulnerability in WP Delicious WP Delicious delicious-recipes allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Delicious: from n/a through <= 1.9.5. |
2026-04-08 | |
| CVE-2026-39526 | 5.4 | MEDIUM | CWE-639 | 0.0% p11 | 3.78 | Authorization Bypass Through User-Controlled Key vulnerability in wpstream WpStr...Authorization Bypass Through User-Controlled Key vulnerability in wpstream WpStream wpstream allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WpStream: from n/a through < 4.11.2. |
2026-04-08 | |
| CVE-2026-39521 | 4.9 | MEDIUM | CWE-918 | 0.0% p7 | 3.43 | Server-Side Request Forgery (SSRF) vulnerability in Nelio Software Nelio Content...Server-Side Request Forgery (SSRF) vulnerability in Nelio Software Nelio Content nelio-content allows Server Side Request Forgery.This issue affects Nelio Content: from n/a through <= 4.3.1. |
2026-04-08 | |
| CVE-2026-39520 | 5.3 | MEDIUM | CWE-862 | 0.0% p10 | 3.71 | Missing Authorization vulnerability in weDevs weDocs wedocs allows Exploiting In...Missing Authorization vulnerability in weDevs weDocs wedocs allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects weDocs: from n/a through <= 2.1.18. |
2026-04-08 | |
| CVE-2026-39517 | 6.5 | MEDIUM | CWE-79 | 0.0% p9 | 4.55 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in A WP Life Blog Filter blog-filter allows DOM-Based XSS.This issue affects Blog Filter: from n/a through <= 1.7.6. |
2026-04-08 | |
| CVE-2026-39516 | 5.3 | MEDIUM | CWE-497 | 0.0% p10 | 3.71 | Exposure of Sensitive System Information to an Unauthorized Control Sphere vulne...Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in POSIMYTH Nexter Blocks the-plus-addons-for-block-editor allows Retrieve Embedded Sensitive Data.This issue affects Nexter Blocks: from n/a through <= 4.7.0. |
2026-04-08 | |
| CVE-2026-39510 | 2.7 | LOW | CWE-639 | 0.0% p9 | 1.89 | Authorization Bypass Through User-Controlled Key vulnerability in WP Chill Image...Authorization Bypass Through User-Controlled Key vulnerability in WP Chill Image Photo Gallery Final Tiles Grid final-tiles-grid-gallery-lite allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Image Photo Gallery Final Tiles Grid: from n/a through <= 3.6.11. |
2026-04-08 | |
| CVE-2026-39509 | 5.3 | MEDIUM | CWE-862 | 0.0% p10 | 3.71 | Missing Authorization vulnerability in wpWax Directorist directorist allows Expl...Missing Authorization vulnerability in wpWax Directorist directorist allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Directorist: from n/a through <= 8.5.10. |
2026-04-08 | |
| CVE-2026-39508 | 6.5 | MEDIUM | CWE-79 | 0.0% p9 | 4.55 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Josh Kohlbach Advanced Coupons for WooCommerce Coupons advanced-coupons-for-woocommerce-free allows DOM-Based XSS.This issue affects Advanced Coupons for WooCommerce Coupons: from n/a through <= 4.7.1.1. |
2026-04-08 | |
| CVE-2026-39506 | 4.3 | MEDIUM | CWE-862 | 0.0% p8 | 3.01 | Missing Authorization vulnerability in Jordy Meow AI Engine (Pro) ai-engine-pro ...Missing Authorization vulnerability in Jordy Meow AI Engine (Pro) ai-engine-pro allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects AI Engine (Pro): from n/a through < 3.4.2. |
2026-04-08 | |
| CVE-2026-39505 | 5.3 | MEDIUM | CWE-862 | 0.0% p10 | 3.71 | Missing Authorization vulnerability in Craig Hewitt Seriously Simple Podcasting ...Missing Authorization vulnerability in Craig Hewitt Seriously Simple Podcasting seriously-simple-podcasting allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Seriously Simple Podcasting: from n/a through <= 3.14.2. |
2026-04-08 | |
| CVE-2026-39504 | 5.4 | MEDIUM | CWE-862 | 0.0% p7 | 3.78 | Missing Authorization vulnerability in InstaWP InstaWP Connect instawp-connect a...Missing Authorization vulnerability in InstaWP InstaWP Connect instawp-connect allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects InstaWP Connect: from n/a through <= 0.1.2.5. |
2026-04-08 | |
| CVE-2026-39501 | 5.3 | MEDIUM | CWE-862 | 0.0% p10 | 3.71 | Missing Authorization vulnerability in RealMag777 FOX woocommerce-currency-switc...Missing Authorization vulnerability in RealMag777 FOX woocommerce-currency-switcher allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects FOX: from n/a through <= 1.4.5. |
2026-04-08 | |
| CVE-2026-39500 | 6.5 | MEDIUM | CWE-79 | 0.0% p9 | 4.55 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Themesflat themesflat-addons-for-elementor themesflat-addons-for-elementor allows Stored XSS.This issue affects themesflat-addons-for-elementor: from n/a through <= 2.3.2. |
2026-04-08 | |
| CVE-2026-39497 | 7.6 | HIGH | CWE-89 | 0.0% p10 | 5.32 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti...Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in RealMag777 FOX woocommerce-currency-switcher allows Blind SQL Injection.This issue affects FOX: from n/a through <= 1.4.5. |
2026-04-08 | |
| CVE-2026-39496 | 7.6 | HIGH | CWE-89 | 0.0% p10 | 5.32 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti...Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in YayCommerce YayMail yaymail allows Blind SQL Injection.This issue affects YayMail: from n/a through <= 4.3.3. |
2026-04-08 | |
| CVE-2026-39495 | 8.5 | HIGH | CWE-89 | 0.0% p9 | 5.95 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti...Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in NSquared Simply Schedule Appointments simply-schedule-appointments allows Blind SQL Injection.This issue affects Simply Schedule Appointments: from n/a through <= 1.6.9.27. |
2026-04-08 | |
| CVE-2026-39488 | 6.3 | MEDIUM | CWE-862 | 0.0% p11 | 4.41 | Missing Authorization vulnerability in SureCart SureCart surecart allows Exploit...Missing Authorization vulnerability in SureCart SureCart surecart allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects SureCart: from n/a through <= 4.0.2. |
2026-04-08 | |
| CVE-2026-39487 | 7.6 | HIGH | CWE-89 | 0.0% p10 | 5.32 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti...Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in ameliabooking Amelia ameliabooking allows Blind SQL Injection.This issue affects Amelia: from n/a through <= 2.1.1. |
2026-04-08 | |
| CVE-2026-39486 | 0.0 | NONE | CWE-89 | 0.0% p7 | 0.00 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti...Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WP Chill Download Monitor download-monitor allows Blind SQL Injection.This issue affects Download Monitor: from n/a through <= 5.1.8. |
2026-04-08 | |
| CVE-2026-39485 | 4.3 | MEDIUM | CWE-862 | 0.0% p7 | 3.01 | Missing Authorization vulnerability in embedplus Youtube Embed Plus youtube-embe...Missing Authorization vulnerability in embedplus Youtube Embed Plus youtube-embed-plus allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Youtube Embed Plus: from n/a through <= 14.2.4. |
2026-04-08 | |
| CVE-2026-39484 | 4.7 | MEDIUM | CWE-601 | 0.0% p8 | 3.29 | URL Redirection to Untrusted Site ('Open Redirect') vulnerability in John Darrel...URL Redirection to Untrusted Site ('Open Redirect') vulnerability in John Darrel Hide My WP Ghost hide-my-wp allows Phishing.This issue affects Hide My WP Ghost: from n/a through < 7.0.00. |
2026-04-08 | |
| CVE-2026-39483 | 6.5 | MEDIUM | CWE-79 | 0.0% p9 | 4.55 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Hidekazu Ishikawa VK All in One Expansion Unit vk-all-in-one-expansion-unit allows Stored XSS.This issue affects VK All in One Expansion Unit: from n/a through <= 9.113.3. |
2026-04-08 | |
| CVE-2026-39482 | 6.5 | MEDIUM | CWE-79 | 0.0% p9 | 4.55 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in PublishPress Post Expirator post-expirator allows DOM-Based XSS.This issue affects Post Expirator: from n/a through <= 4.9.4. |
2026-04-08 | |
| CVE-2026-39479 | 7.6 | HIGH | CWE-89 | 0.0% p10 | 5.32 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti...Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Brainstorm Force OttoKit suretriggers allows Blind SQL Injection.This issue affects OttoKit: from n/a through <= 1.1.20. |
2026-04-08 | |
| CVE-2026-39477 | 4.3 | MEDIUM | CWE-862 | 0.0% p8 | 3.01 | Missing Authorization vulnerability in Brainstorm Force CartFlows cartflows allo...Missing Authorization vulnerability in Brainstorm Force CartFlows cartflows allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects CartFlows: from n/a through <= 2.2.3. |
2026-04-08 | |
| CVE-2026-39476 | 4.3 | MEDIUM | CWE-862 | 0.0% p7 | 3.01 | Missing Authorization vulnerability in Syed Balkhi User Feedback userfeedback-li...Missing Authorization vulnerability in Syed Balkhi User Feedback userfeedback-lite allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects User Feedback: from n/a through <= 1.10.1. |
2026-04-08 | |
| CVE-2026-39475 | 8.5 | HIGH | CWE-89 | 0.0% p9 | 5.95 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti...Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Syed Balkhi User Feedback userfeedback-lite allows Blind SQL Injection.This issue affects User Feedback: from n/a through <= 1.10.1. |
2026-04-08 | |
| CVE-2026-39473 | 5.3 | MEDIUM | CWE-201 | 0.0% p10 | 3.71 | Insertion of Sensitive Information Into Sent Data vulnerability in Pär Thernströ...Insertion of Sensitive Information Into Sent Data vulnerability in Pär Thernström Simple History simple-history allows Retrieve Embedded Sensitive Data.This issue affects Simple History: from n/a through <= 5.24.0. |
2026-04-08 | |
| CVE-2026-39469 | 4.3 | MEDIUM | CWE-497 | 0.0% p8 | 3.01 | Exposure of Sensitive System Information to an Unauthorized Control Sphere vulne...Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in Softaculous PageLayer pagelayer allows Retrieve Embedded Sensitive Data.This issue affects PageLayer: from n/a through <= 2.0.8. |
2026-04-08 | |
| CVE-2026-39466 | 7.6 | HIGH | CWE-89 | 0.0% p10 | 5.32 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti...Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WPMU DEV - Your All-in-One WordPress Platform Broken Link Checker broken-link-checker allows Blind SQL Injection.This issue affects Broken Link Checker: from n/a through <= 2.4.7. |
2026-04-08 | |
| CVE-2026-39464 | 5.5 | MEDIUM | CWE-918 | 0.0% p8 | 3.85 | Server-Side Request Forgery (SSRF) vulnerability in SeedProd Coming Soon Page, U...Server-Side Request Forgery (SSRF) vulnerability in SeedProd Coming Soon Page, Under Construction & Maintenance Mode by SeedProd coming-soon allows Server Side Request Forgery.This issue affects Coming Soon Page, Under Construction & Maintenance Mode by SeedProd: from n/a through <= 6.19.8. |
2026-04-08 | |
| CVE-2026-33088 | 6.9 | MEDIUM | CWE-89 | 0.0% p11 | 4.83 | Movable Type provided by Six Apart Ltd. contains an SQL Injection vulnerability ...Movable Type provided by Six Apart Ltd. contains an SQL Injection vulnerability which may allow an attacker to execute an arbitrary SQL statement. |
2026-04-08 | |
| CVE-2026-25776 | 9.3 | CRITICAL | CWE-94 | 0.1% p19 | 6.51 | Movable Type provided by Six Apart Ltd. contains a code injection vulnerability ...Movable Type provided by Six Apart Ltd. contains a code injection vulnerability which may allow an attacker to execute arbitrary Perl script. |
2026-04-08 | |
| CVE-2026-1396 | 6.4 | MEDIUM | CWE-79 | 0.0% p9 | 4.48 | The Magic Conversation For Gravity Forms plugin for WordPress is vulnerable to S...The Magic Conversation For Gravity Forms plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'magic-conversation' shortcode in all versions up to, and including, 3.0.97 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-04-08 | |
| CVE-2026-4655 | 6.4 | MEDIUM | CWE-79 | 0.0% p11 | 4.48 | The Element Pack Addons for Elementor plugin for WordPress is vulnerable to Stor...The Element Pack Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the SVG Image Widget in versions up to and including 8.4.2. This is due to insufficient input sanitization and output escaping on SVG content fetched from remote URLs in the render_svg() function. The function fetches SVG content using wp_safe_remote_get() and then directly echoes it to the page without any sanitization, only applying a preg_replace() to add attributes to the SVG tag which does not remove malicious event handlers. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary JavaScript in SVG files that will execute whenever a user accesses a page containing the malicious widget. |
2026-04-08 | |
| CVE-2026-4654 | 5.3 | MEDIUM | CWE-639 | 0.0% p14 | 3.71 | The Awesome Support – WordPress HelpDesk & Support Plugin plugin for WordPress i...The Awesome Support – WordPress HelpDesk & Support Plugin plugin for WordPress is vulnerable to Insecure Direct Object Reference in versions up to, and including, 6.3.7. This is due to the wpas_get_ticket_replies_ajax() function failing to verify whether the authenticated user has permission to view the specific ticket being requested. This makes it possible for authenticated attackers, with subscriber-level access and above, to access sensitive information from all support tickets in the system by manipulating the ticket_id parameter. |
2026-04-08 | |
| CVE-2026-4483 | 7.0 | HIGH | CWE-782 | 0.1% p15 | 4.90 | An exposed IOCTL with an insufficient access control vulnerability has been ide...An exposed IOCTL with an insufficient access control vulnerability has been identified in the utility, MxGeneralIo, for Moxa’s industrial x86 computers. The affected utility, MxGeneralIo, exposes IOCTL methods that permit direct read and write access to MSR and system memory. A local attacker with high privileges could abuse these interfaces to perform unauthorized operations. Successful exploitation may result in privilege escalation on Windows 7 systems or cause a system crash (BSoD) on Windows 10 and 11 systems, leading to a denial-of-service condition. The vulnerability could slightly affect the confidentiality and integrity of the device, but availability might be heavily impacted. No impact to the subsequent system has been identified. |
2026-04-08 | |
| CVE-2026-4330 | 4.3 | MEDIUM | CWE-639 | 0.0% p12 | 3.01 | The Blog2Social: Social Media Auto Post & Scheduler plugin for WordPress is vuln...The Blog2Social: Social Media Auto Post & Scheduler plugin for WordPress is vulnerable to authorization bypass through user-controlled key in all versions up to, and including, 8.8.3. This is due to the plugin's AJAX handlers failing to validate that the user-supplied 'b2s_id' parameter belongs to the current user before performing UPDATE and DELETE operations. This makes it possible for authenticated attackers, with Subscriber-level access and above, to modify, reschedule, or delete other users' scheduled social media posts. |
2026-04-08 | |
| CVE-2026-5508 | 6.4 | MEDIUM | CWE-79 | 0.0% p9 | 4.48 | The WowPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting v...The WowPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's `wowpress` shortcode in all versions up to, and including, 1.0.0. This is due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-04-08 | |
| CVE-2026-5506 | 6.4 | MEDIUM | CWE-79 | 0.0% p10 | 4.48 | The Wavr plugin for WordPress is vulnerable to Stored Cross-Site Scripting via t...The Wavr plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's `wave` shortcode in all versions up to, and including, 0.2.6. This is due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-04-08 | |
| CVE-2026-5169 | 4.4 | MEDIUM | CWE-79 | 0.0% p13 | 3.08 | The Inquiry Form to Posts or Pages plugin for WordPress is vulnerable to Stored ...The Inquiry Form to Posts or Pages plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'Form Header' field in versions up to and including 1.0. This is due to insufficient input sanitization when saving via update_option() and lack of output escaping when displaying the stored value. The vulnerability exists in two locations: (1) the plugin settings page at inq_form.php line 180 where the value is echoed into an HTML attribute without esc_attr(), and (2) the front-end shortcode output at inquery_form_to_posts_or_pages.php line 139 where the value is output in HTML content without esc_html(). This makes it possible for authenticated attackers with administrator-level access to inject arbitrary web scripts that will execute whenever a user accesses the plugin settings page or views a page containing the [inquiry_form] shortcode. |
2026-04-08 | |
| CVE-2026-5167 | 5.3 | MEDIUM | CWE-639 | 0.1% p23 | 3.71 | The Masteriyo LMS – Online Course Builder for eLearning, LMS & Education plugin ...The Masteriyo LMS – Online Course Builder for eLearning, LMS & Education plugin for WordPress is vulnerable to Authorization Bypass Through User-Controlled Key in versions up to and including 2.1.7. This is due to insufficient webhook signature verification in the handle_webhook() function. The webhook endpoint processes unauthenticated requests and only performs signature verification if both the webhook_secret setting is configured AND the HTTP_STRIPE_SIGNATURE header is present. Since webhook_secret defaults to an empty string, the webhook processes attacker-controlled JSON payloads without any verification. This makes it possible for unauthenticated attackers to send fake Stripe webhook events with arbitrary order_id values in the metadata, mark any order as completed without payment, and gain unauthorized access to paid course content. |
2026-04-08 | |
| CVE-2026-4871 | 6.4 | MEDIUM | CWE-79 | 0.0% p9 | 4.48 | The Sports Club Management plugin for WordPress is vulnerable to Stored Cross-Si...The Sports Club Management plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'before' and 'after' attributes of the `scm_member_data` shortcode in all versions up to, and including, 1.12.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-04-08 | |
| CVE-2026-4808 | 7.2 | HIGH | CWE-434 | 0.3% p54 | 5.05 | The Gerador de Certificados – DevApps plugin for WordPress is vulnerable to arbi...The Gerador de Certificados – DevApps plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the moveUploadedFile() function in all versions up to, and including, 1.3.6. This makes it possible for authenticated attackers, with Administrator-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. |
2026-04-08 | |
| CVE-2026-4338 | 7.5 | HIGH | NVD-CWE-noinfo | 0.1% p17 | 5.25 | The ActivityPub WordPress plugin before 8.0.2 does not properly filter posts to ...The ActivityPub WordPress plugin before 8.0.2 does not properly filter posts to be displayed, allowed unauthenticated users to access drafts/scheduled/pending posts |
2026-04-08 | |
| CVE-2026-4141 | 4.3 | MEDIUM | CWE-352 | 0.0% p2 | 3.01 | The Quran Translations plugin for WordPress is vulnerable to Cross-Site Request ...The Quran Translations plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.7. This is due to missing nonce validation in the quran_playlist_options() function that handles the plugin's settings page. The function processes POST requests to update plugin options via update_option() without any wp_nonce_field() in the form or wp_verify_nonce()/check_admin_referer() verification before processing. This makes it possible for unauthenticated attackers to modify plugin settings (toggling display options for PDF, RSS, podcast, media player links, playlist title, and playlist code) via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. |
2026-04-08 | |
| CVE-2026-3781 | 5.4 | MEDIUM | CWE-89 | 0.0% p7 | 3.78 | The Attendance Manager plugin for WordPress is vulnerable to SQL Injection via t...The Attendance Manager plugin for WordPress is vulnerable to SQL Injection via the 'attmgr_off' parameter in all versions up to, and including, 0.6.2. This is due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. |
2026-04-08 | |
| CVE-2026-3618 | 6.4 | MEDIUM | CWE-79 | 0.1% p19 | 4.48 | The Columns by BestWebSoft plugin for WordPress is vulnerable to Stored Cross-Si...The Columns by BestWebSoft plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'id' shortcode attribute of the [print_clmns] shortcode in all versions up to and including 1.0.3. This is due to insufficient input sanitization and output escaping on the 'id' attribute. The shortcode receives the 'id' parameter via shortcode_atts() at line 596 and directly embeds it into HTML output at line 731 (in a div id attribute) and into inline CSS at lines 672-729 without any escaping or sanitization. While the SQL query uses %d to cast the value to an integer for database lookup, the original unsanitized string value of $id is still used in the HTML/CSS output. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. The attack requires that at least one column exists in the plugin (created by an admin), as the SQL query must return results for the output branch to be reached. |
2026-04-08 | |
| CVE-2026-3594 | 5.3 | MEDIUM | CWE-200 | 0.1% p35 | 3.71 | The Riaxe Product Customizer plugin for WordPress is vulnerable to Sensitive Inf...The Riaxe Product Customizer plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.4 via the '/wp-json/InkXEProductDesignerLite/orders' REST API endpoint. The endpoint is registered with 'permission_callback' set to '__return_true', meaning no authentication or authorization checks are performed. The endpoint queries WooCommerce order data from the database and returns it to the requester, including customer first and last names, customer IDs, order IDs, order totals, order dates, currencies, and order statuses. This makes it possible for unauthenticated attackers to extract sensitive customer and order information from the WooCommerce store. |
2026-04-08 | |
| CVE-2026-3535 | 9.8 | CRITICAL | CWE-434 | 0.3% p56 | 6.87 | The DSGVO Google Web Fonts GDPR plugin for WordPress is vulnerable to arbitrary ...The DSGVO Google Web Fonts GDPR plugin for WordPress is vulnerable to arbitrary file upload due to missing file type validation in the `DSGVOGWPdownloadGoogleFonts()` function in all versions up to, and including, 1.1. The function is exposed via a `wp_ajax_nopriv_` hook, requiring no authentication. It fetches a user-supplied URL as a CSS file, extracts URLs from its content, and downloads those files to a publicly accessible directory without validating the file type. This makes it possible for unauthenticated attackers to upload arbitrary files including PHP webshells, leading to remote code execution. The exploit requires the site to use one of a handful of specific themes (twentyfifteen, twentyseventeen, twentysixteen, storefront, salient, or shapely). |
2026-04-08 | |
| CVE-2026-3480 | 6.5 | MEDIUM | CWE-862 | 0.0% p10 | 4.55 | The WP Blockade plugin for WordPress is vulnerable to Missing Authorization in a...The WP Blockade plugin for WordPress is vulnerable to Missing Authorization in all versions up to and including 0.9.14. The plugin registers an admin_post action hook 'wp-blockade-shortcode-render' that maps to the render_shortcode_preview() function. This function lacks any capability check (current_user_can()) and nonce verification, allowing any authenticated user to execute arbitrary WordPress shortcodes. The function takes a user-supplied 'shortcode' parameter from $_GET, passes it through stripslashes(), and directly executes it via do_shortcode(). This makes it possible for authenticated attackers, with Subscriber-level access and above, to execute arbitrary shortcodes, which could lead to information disclosure, privilege escalation, or other impacts depending on what shortcodes are registered on the site (e.g., shortcodes from other plugins that display sensitive data, perform actions, or include files). |
2026-04-08 | |
| CVE-2026-3477 | 5.3 | MEDIUM | CWE-862 | 0.0% p8 | 3.71 | The PZ Frontend Manager plugin for WordPress is vulnerable to Missing Authorizat...The PZ Frontend Manager plugin for WordPress is vulnerable to Missing Authorization in all versions up to and including 1.0.6. The pzfm_user_request_action_callback() function, registered via the wp_ajax_pzfm_user_request_action action hook, lacks both capability checks and nonce verification. This function handles user activation, deactivation, and deletion operations. When the 'dataType' parameter is set to 'delete', the function calls wp_delete_user() on all provided user IDs without verifying that the current user has the appropriate permissions. Notably, the similar pzfm_remove_item_callback() function does check pzfm_can_delete_user() before performing deletions, indicating this was an oversight. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary WordPress users (including administrators) by sending a crafted request to the AJAX endpoint. |
2026-04-08 | |
| CVE-2026-3142 | 6.4 | MEDIUM | CWE-79 | 0.0% p14 | 4.48 | The Pinterest Site Verification plugin using Meta Tag plugin for WordPress is vu...The Pinterest Site Verification plugin using Meta Tag plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'post_var' parameter in versions up to, and including, 1.8 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-04-08 | |
| CVE-2026-2838 | 4.4 | MEDIUM | CWE-79 | 0.0% p10 | 3.08 | The Whole Enquiry Cart for WooCommerce plugin for WordPress is vulnerable to Sto...The Whole Enquiry Cart for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘woowhole_success_msg’ parameter in all versions up to, and including, 1.2.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. |
2026-04-08 | |
| CVE-2025-1794 | 5.4 | MEDIUM | CWE-79 | 0.0% p8 | 3.78 | The AM LottiePlayer plugin for WordPress is vulnerable to Stored Cross-Site Scri...The AM LottiePlayer plugin for WordPress is vulnerable to Stored Cross-Site Scripting via uploaded SVG files in all versions up to, and including, 3.6.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-04-08 | |
| CVE-2026-3311 | 6.4 | MEDIUM | CWE-79 | 0.0% p9 | 4.48 | The The Plus Addons for Elementor – Addons for Elementor, Page Templates, Widget...The The Plus Addons for Elementor – Addons for Elementor, Page Templates, Widgets, Mega Menu, WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Progress Bar shortcode in all versions up to, and including, 6.4.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-04-08 | |
| CVE-2026-33273 | 5.1 | MEDIUM | CWE-434 | 0.0% p14 | 3.57 | Unrestricted upload of file with dangerous type issue exists in MATCHA INVOICE 2...Unrestricted upload of file with dangerous type issue exists in MATCHA INVOICE 2.6.6 and earlier. If this vulnerability is exploited, an arbitrary file may be created by an administrator of the product. As a result, arbitrary code may be executed on the server. |
2026-04-08 | |
| CVE-2026-27787 | 5.1 | MEDIUM | CWE-79 | 0.0% p9 | 3.57 | Cross-site scripting vulnerability exists in MATCHA SNS 1.3.9 and earlier. If th...Cross-site scripting vulnerability exists in MATCHA SNS 1.3.9 and earlier. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the website using the product. |
2026-04-08 | |
| CVE-2026-24913 | 8.7 | HIGH | CWE-89 | 0.0% p10 | 6.09 | SQL Injection vulnerability exists in MATCHA INVOICE 2.6.6 and earlier. If this ...SQL Injection vulnerability exists in MATCHA INVOICE 2.6.6 and earlier. If this vulnerability is exploited, information stored in the database may be obtained or altered by a user who can log in to the product. |
2026-04-08 | |
| CVE-2026-4785 | 6.4 | MEDIUM | CWE-79 | 0.0% p12 | 4.48 | The LatePoint – Calendar Booking Plugin for Appointments and Events plugin for W...The LatePoint – Calendar Booking Plugin for Appointments and Events plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'button_caption' parameter in the [latepoint_resources] shortcode in versions up to and including 5.3.0. This is due to insufficient output escaping when the 'items' parameter is set to 'bundles'. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-04-08 | |
| CVE-2026-4341 | 6.4 | MEDIUM | CWE-79 | 0.0% p12 | 4.48 | The Prime Slider – Addons for Elementor plugin for WordPress is vulnerable to St...The Prime Slider – Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'follow_us_text' setting of the Mount widget in all versions up to, and including, 4.1.10. This is due to insufficient input sanitization and output escaping. Specifically, the `render_social_link()` function in `modules/mount/widgets/mount.php` outputs the `follow_us_text` Elementor widget setting using `echo` without any escaping function. The setting value is stored in `_elementor_data` post meta via `update_post_meta`. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-04-08 | |
| CVE-2026-4333 | 6.4 | MEDIUM | CWE-79 | 0.0% p12 | 4.48 | The LearnPress – WordPress LMS Plugin plugin for WordPress is vulnerable to Stor...The LearnPress – WordPress LMS Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'skin' attribute of the learn_press_courses shortcode in all versions up to and including 4.3.3. This is due to insufficient input sanitization and output escaping on the 'skin' shortcode attribute. The attribute value is used directly in an sprintf() call that generates HTML (class attribute and data-layout attribute) without any esc_attr() escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-04-08 | |
| CVE-2026-4299 | 5.3 | MEDIUM | CWE-862 | 0.0% p14 | 3.71 | The MainWP Child Reports plugin for WordPress is vulnerable to Missing Authoriza...The MainWP Child Reports plugin for WordPress is vulnerable to Missing Authorization in all versions up to and including 2.2.6. This is due to a missing capability check in the heartbeat_received() function in the Live_Update class. This makes it possible for authenticated attackers, with Subscriber-level access and above, to obtain MainWP Child Reports activity log entries (including action summaries, user information, IP addresses, and contextual data) via the WordPress Heartbeat API by sending a crafted heartbeat request with the 'wp-mainwp-stream-heartbeat' data key. |
2026-04-08 | |
| CVE-2026-4003 | 9.8 | CRITICAL | CWE-862 | 0.5% p66 | 6.88 | The Users manager – PN plugin for WordPress is vulnerable to Privilege Escalatio...The Users manager – PN plugin for WordPress is vulnerable to Privilege Escalation via Arbitrary User Meta Update in all versions up to and including 1.1.15. This is due to a flawed authorization logic check in the userspn_ajax_nopriv_server() function within the 'userspn_form_save' case. The conditional only blocks unauthenticated users when the user_id is empty, but when a non-empty user_id is supplied, execution bypasses this check entirely and proceeds to update arbitrary user meta via update_user_meta() without any authentication or authorization verification. Additionally, the nonce required for this AJAX endpoint ('userspn-nonce') is exposed to all visitors via wp_localize_script on the public wp_enqueue_scripts hook, rendering the nonce check ineffective as a security control. This makes it possible for unauthenticated attackers to update arbitrary user metadata for any user account, including the userspn_secret_token field. |
2026-04-08 | |
| CVE-2026-3646 | 5.3 | MEDIUM | CWE-862 | 0.2% p40 | 3.72 | The LTL Freight Quotes – R+L Carriers Edition plugin for WordPress is vulnerable...The LTL Freight Quotes – R+L Carriers Edition plugin for WordPress is vulnerable to Missing Authorization via the plugin's webhook handler in all versions up to, and including, 3.3.13. This is due to missing authentication, authorization, and nonce verification on a standalone PHP file that directly processes GET parameters and updates WordPress options. This makes it possible for unauthenticated attackers to modify the plugin's subscription plan settings, effectively downgrading the store from a paid plan to the Trial Plan, changing the store type, and manipulating subscription expiration dates, potentially disabling premium features such as Dropship and Hazardous Material handling. |
2026-04-08 | |
| CVE-2026-3600 | 6.4 | MEDIUM | CWE-79 | 0.0% p12 | 4.48 | The Investi plugin for WordPress is vulnerable to Stored Cross-Site Scripting vi...The Investi plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'investi-announcements-accordion' shortcode's 'maximum-num-years' attribute in all versions up to, and including, 1.0.26. This is due to insufficient input sanitization and output escaping on user-supplied shortcode attributes. Specifically, the 'maximum-num-years' attribute value is read directly from shortcode attributes and interpolated into a double-quoted HTML attribute without any escaping (no esc_attr(), htmlspecialchars(), or similar). This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-04-08 | |
| CVE-2026-3513 | 6.4 | MEDIUM | CWE-79 | 0.0% p12 | 4.48 | The TableOn – WordPress Posts Table Filterable plugin for WordPress is vulnerabl...The TableOn – WordPress Posts Table Filterable plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'tableon_button' shortcode in all versions up to and including 1.0.4.4. This is due to insufficient input sanitization and output escaping on user-supplied shortcode attributes such as 'class', 'help_link', 'popup_title', and 'help_title'. The do_shortcode_button() function extracts these attributes without sanitization and passes them to TABLEON_HELPER::draw_html_item(), which concatenates attribute values into HTML using single quotes without escaping (line 29: $item .= " {$key}='{$value}'"). This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-04-08 | |
| CVE-2026-3239 | 6.4 | MEDIUM | CWE-79 | 0.0% p9 | 4.48 | The Strong Testimonials plugin for WordPress is vulnerable to Stored Cross-Site ...The Strong Testimonials plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's testimonial_view shortcode in all versions up to, and including, 3.2.21 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-04-08 | |
| CVE-2026-4379 | 6.4 | MEDIUM | CWE-79 | 0.0% p1 | 4.48 | The LightPress Lightbox plugin for WordPress is vulnerable to Stored Cross-Site ...The LightPress Lightbox plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the `group` attribute in the `[gallery]` shortcode in all versions up to, and including, 2.3.4. This is due to the plugin modifying gallery shortcode output to include the `group` attribute value without proper escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-04-08 | |
| CVE-2026-2988 | 6.4 | MEDIUM | CWE-79 | 0.0% p1 | 4.48 | The Blubrry PowerPress plugin for WordPress is vulnerable to Stored Cross-Site S...The Blubrry PowerPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'powerpress' and 'podcast' shortcodes in versions up to, and including, 11.15.15 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-04-08 | |
| CVE-2026-5726 | 7.8 | HIGH | CWE-121 | 0.0% p0 | 5.46 | ASDA-Soft Stack-based Buffer Overflow VulnerabilityASDA-Soft Stack-based Buffer Overflow Vulnerability |
2026-04-08 | |
| CVE-2026-1163 | 4.1 | MEDIUM | CWE-613 | 0.0% p13 | 2.87 | An insufficient session expiration vulnerability exists in the latest version of...An insufficient session expiration vulnerability exists in the latest version of parisneo/lollms. The application fails to invalidate active sessions after a password reset, allowing an attacker to continue using an old session token. This issue arises due to the absence of logic to reject requests after a period of inactivity and the excessively long default session duration of 31 days. The vulnerability enables an attacker to maintain persistent access to a compromised account, even after the victim resets their password. |
2026-04-08 | |
| CVE-2026-3499 | 8.8 | HIGH | CWE-352 | 0.0% p4 | 6.16 | The Product Feed PRO for WooCommerce by AdTribes – Product Feeds for WooCommerce...The Product Feed PRO for WooCommerce by AdTribes – Product Feeds for WooCommerce plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions 13.4.6 through 13.5.2.1. This is due to missing or incorrect nonce validation on the ajax_migrate_to_custom_post_type, ajax_adt_clear_custom_attributes_product_meta_keys, ajax_update_file_url_to_lower_case, ajax_use_legacy_filters_and_rules, and ajax_fix_duplicate_feed functions. This makes it possible for unauthenticated attackers to trigger feed migration, clear custom-attribute transient caches, rewrite feed file URLs to lowercase, toggle legacy filter and rule settings, and delete duplicated feed posts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. |
2026-04-08 | |
| CVE-2026-3296 | 9.8 | CRITICAL | CWE-502 | 0.0% p7 | 6.86 | The Everest Forms plugin for WordPress is vulnerable to PHP Object Injection in ...The Everest Forms plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.4.3 via deserialization of untrusted input from form entry metadata. This is due to the html-admin-page-entries-view.php file calling PHP's native unserialize() on stored entry meta values without passing the allowed_classes parameter. This makes it possible for unauthenticated attackers to inject a serialized PHP object payload through any public Everest Forms form field. The payload survives sanitize_text_field() sanitization (serialization control characters are not stripped) and is stored in the wp_evf_entrymeta database table. When an administrator views entries or views an individual entry, the unsafe unserialize() call processes the stored data without class restrictions. |
2026-04-08 | |
| CVE-2026-33810 | 7.5 | HIGH | N/A | 0.0% p1 | 5.25 | When verifying a certificate chain containing excluded DNS constraints, these co...When verifying a certificate chain containing excluded DNS constraints, these constraints are not correctly applied to wildcard DNS SANs which use a different case than the constraint. This only affects validation of otherwise trusted certificate chains, issued by a root CA in the VerifyOptions.Roots CertPool, or in the system certificate pool. |
2026-04-08 | |
| CVE-2026-32289 | 6.1 | MEDIUM | N/A | 0.0% p2 | 4.27 | Context was not properly tracked across template branches for JS template litera...Context was not properly tracked across template branches for JS template literals, leading to possibly incorrect escaping of content when branches were used. Additionally template actions within JS template literals did not properly track the brace depth, leading to incorrect escaping being applied. These issues could cause actions within JS template literals to be incorrectly or improperly escaped, leading to XSS vulnerabilities. |
2026-04-08 | |
| CVE-2026-32288 | 5.5 | MEDIUM | N/A | 0.0% p0 | 3.85 | tar.Reader can allocate an unbounded amount of memory when reading a maliciously...tar.Reader can allocate an unbounded amount of memory when reading a maliciously-crafted archive containing a large number of sparse regions encoded in the "old GNU sparse map" format. |
2026-04-08 | |
| CVE-2026-32283 | 7.5 | HIGH | N/A | 0.0% p5 | 5.25 | If one side of the TLS connection sends multiple key update messages post-handsh...If one side of the TLS connection sends multiple key update messages post-handshake in a single record, the connection can deadlock, causing uncontrolled consumption of resources. This can lead to a denial of service. This only affects TLS 1.3. |
2026-04-08 | |
| CVE-2026-32282 | 6.4 | MEDIUM | N/A | 0.0% p0 | 4.48 | On Linux, if the target of Root.Chmod is replaced with a symlink while the chmod...On Linux, if the target of Root.Chmod is replaced with a symlink while the chmod operation is in progress, Chmod can operate on the target of the symlink, even when the target lies outside the root. The Linux fchmodat syscall silently ignores the AT_SYMLINK_NOFOLLOW flag, which Root.Chmod uses to avoid symlink traversal. Root.Chmod checks its target before acting and returns an error if the target is a symlink lying outside the root, so the impact is limited to cases where the target is replaced with a symlink between the check and operation. |
2026-04-08 | |
| CVE-2026-32281 | 7.5 | HIGH | N/A | 0.0% p5 | 5.25 | Validating certificate chains which use policies is unexpectedly inefficient whe...Validating certificate chains which use policies is unexpectedly inefficient when certificates in the chain contain a very large number of policy mappings, possibly causing denial of service. This only affects validation of otherwise trusted certificate chains, issued by a root CA in the VerifyOptions.Roots CertPool, or in the system certificate pool. |
2026-04-08 | |
| CVE-2026-32280 | 7.5 | HIGH | CWE-770 | 0.0% p5 | 5.25 | During chain building, the amount of work that is done is not correctly limited ...During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions.Intermediates, which can lead to a denial of service. This affects both direct users of crypto/x509 and users of crypto/tls. |
2026-04-08 | |
| CVE-2026-27144 | 7.1 | HIGH | N/A | 0.0% p0 | 4.97 | The compiler is meant to unwrap pointers which are the operands of a memory move...The compiler is meant to unwrap pointers which are the operands of a memory move; a no-op interface conversion prevented the compiler from making the correct determination about non-overlapping moves, potentially leading to memory corruption at runtime. |
2026-04-08 | |
| CVE-2026-27143 | 9.8 | CRITICAL | N/A | 0.0% p6 | 6.86 | Arithmetic over induction variables in loops were not correctly checked for unde...Arithmetic over induction variables in loops were not correctly checked for underflow or overflow. As a result, the compiler would allow for invalid indexing to occur at runtime, potentially leading to memory corruption. |
2026-04-08 | |
| CVE-2026-27140 | 8.8 | HIGH | N/A | 0.0% p5 | 6.16 | SWIG file names containing 'cgo' and well-crafted payloads could lead to code sm...SWIG file names containing 'cgo' and well-crafted payloads could lead to code smuggling and arbitrary code execution at build time due to trust layer bypass. |
2026-04-08 | |
| CVE-2025-14732 | 6.4 | MEDIUM | CWE-87 | 0.0% p1 | 4.48 | The Elementor Website Builder – More Than Just a Page Builder plugin for WordPre...The Elementor Website Builder – More Than Just a Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via several widget parameters in all versions up to, and including, 3.35.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-04-08 | |
| CVE-2026-4788 | 8.4 | HIGH | CWE-532 | 0.0% p1 | 5.88 | IBM Tivoli Netcool Impact 7.1.0.0 through 7.1.0.37 stores sensitive information ...IBM Tivoli Netcool Impact 7.1.0.0 through 7.1.0.37 stores sensitive information in log files that could be read by a local user. |
2026-04-08 | |
| CVE-2026-3357 | 8.8 | HIGH | CWE-502 | 0.3% p49 | 6.17 | IBM Langflow Desktop 1.6.0 through 1.8.2 Langflow could allow an authenticated u...IBM Langflow Desktop 1.6.0 through 1.8.2 Langflow could allow an authenticated user to execute arbitrary code on the system, caused by an insecure default setting which permits the deserialization of untrusted data in the FAISS component. |
2026-04-08 | |
| CVE-2026-1346 | 9.3 | CRITICAL | CWE-250 | 0.0% p0 | 6.51 | IBM Verify Identity Access Container 11.0 through 11.0.2 and IBM Security Verify...IBM Verify Identity Access Container 11.0 through 11.0.2 and IBM Security Verify Access Container 10.0 through 10.0.9.1 and IBM Verify Identity Access 11.0 through 11.0.2 and IBM Security Verify Access 10.0 through 10.0.9.1 could allow a locally authenticated user to escalate their privileges to root due to execution with unnecessary privileges than required. |
2026-04-08 | |
| CVE-2026-1343 | 7.2 | HIGH | CWE-918 | 0.1% p15 | 5.04 | IBM Verify Identity Access Container 11.0 through 11.0.2 and IBM Security Verify...IBM Verify Identity Access Container 11.0 through 11.0.2 and IBM Security Verify Access Container 10.0 through 10.0.9.1 and IBM Verify Identity Access 11.0 through 11.0.2 and IBM Security Verify Access 10.0 through 10.0.9.1 allows an attacker to contact internal authentication endpoints which are protected by the Reverse Proxy. |
2026-04-08 | |
| CVE-2026-4406 | 4.7 | MEDIUM | CWE-79 | 0.1% p19 | 3.29 | The Gravity Forms plugin for WordPress is vulnerable to Reflected Cross-Site Scr...The Gravity Forms plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the `form_ids` parameter in the `gform_get_config` AJAX action in all versions up to, and including, 2.9.30. This is due to the `GFCommon::send_json()` method outputting JSON-encoded data wrapped in HTML comment delimiters using `echo` and `wp_die()`, which serves the response with a `Content-Type: text/html` header instead of `application/json`. The `wp_json_encode()` function does not HTML-encode angle brackets within JSON string values, allowing injected HTML/script tags in `form_ids` array values to be parsed and executed by the browser. The required `config_nonce` is generated with `wp_create_nonce('gform_config_ajax')` and is publicly embedded on every page that renders a Gravity Forms form, making it identical for all unauthenticated visitors within the same 12-hour nonce tick. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. This vulnerability cannot be exploited against users who are authenticated on the target system, but could be used to alter the target page. |
2026-04-08 | |
| CVE-2026-4401 | 5.4 | MEDIUM | CWE-352 | 0.0% p5 | 3.78 | The Download Monitor plugin for WordPress is vulnerable to Cross-Site Request Fo...The Download Monitor plugin for WordPress is vulnerable to Cross-Site Request Forgery in the `actions_handler()` and `bulk_actions_handler()` methods in `class-dlm-downloads-path.php` in all versions up to, and including, 5.1.10. This is due to missing nonce verification on these functions. This makes it possible for unauthenticated attackers to delete, disable, or enable approved download paths via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. |
2026-04-08 | |
| CVE-2026-4394 | 6.1 | MEDIUM | CWE-79 | 0.1% p24 | 4.27 | The Gravity Forms plugin for WordPress is vulnerable to Stored Cross-Site Script...The Gravity Forms plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Credit Card field's 'Card Type' sub-field (`input_<id>.4`) in all versions up to, and including, 2.9.30. This is due to the `get_value_entry_detail()` method in the `GF_Field_CreditCard` class outputting the card type value without escaping, combined with `get_value_save_entry()` accepting and storing unsanitized user input for the `input_<id>.4` parameter. The Card Type field is not rendered on the frontend form (it is normally derived from the card number), but the backend submission parser blindly accepts it if included in the POST request. This makes it possible for unauthenticated attackers to inject arbitrary web scripts that execute when an administrator views the form entry in the WordPress dashboard. |
2026-04-08 | |
| CVE-2026-2263 | 5.3 | MEDIUM | CWE-862 | 0.1% p15 | 3.71 | The Hustle – Email Marketing, Lead Generation, Optins, Popups plugin for WordPre...The Hustle – Email Marketing, Lead Generation, Optins, Popups plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'hustle_module_converted' AJAX action in all versions up to, and including, 7.8.10.2. This makes it possible for unauthenticated attackers to forge conversion tracking events for any Hustle module, including draft modules that are never displayed to users, thereby manipulating marketing analytics and conversion statistics. |
2026-04-08 | |
| CVE-2026-1342 | 8.5 | HIGH | CWE-829 | 0.0% p2 | 5.95 | IBM Verify Identity Access Container 11.0 through 11.0.2 and IBM Security Verify...IBM Verify Identity Access Container 11.0 through 11.0.2 and IBM Security Verify Access Container 10.0 through 10.0.9.1 and IBM Verify Identity Access 11.0 through 11.0.2 and IBM Security Verify Access 10.0 through 10.0.9.1 could allow a locally authenticated user to execute malicious scripts from outside of its control sphere. |
2026-04-08 | |
| CVE-2026-4656 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering...Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. |
2026-04-07 | |
| CVE-2026-39936 | 6.9 | MEDIUM | CWE-79 | 0.1% p19 | 4.83 | Improper neutralization of input during web page generation ('cross-site scripti...Improper neutralization of input during web page generation ('cross-site scripting') vulnerability in The Wikimedia Foundation Mediawiki - Score Extension allows Cross-Site Scripting (XSS). The issue has been remediated on the `master` branch, and in the release branches for MediaWiki versions 1.43, 1.44, and 1.45. |
2026-04-07 | |
| CVE-2026-39935 | 6.9 | MEDIUM | CWE-79 | 0.1% p19 | 4.83 | Improper neutralization of input during web page generation ('cross-site scripti...Improper neutralization of input during web page generation ('cross-site scripting') vulnerability in The Wikimedia Foundation Mediawiki - CampaignEvents Extension allows Cross-Site Scripting (XSS). This issue was remediated only on the `master` branch. |
2026-04-07 | |
| CVE-2025-20628 | 6.9 | MEDIUM | CWE-1220 | 0.1% p16 | 4.83 | An insufficient granularity of access control vulnerability exists in PingIDM (f...An insufficient granularity of access control vulnerability exists in PingIDM (formerly ForgeRock Identity Management) where administrators cannot properly configure access rules for Remote Connector Servers (RCS) running in client mode. This means attackers can spoof a client-mode RCS (if one exists) to intercept and/or modify an identity’s security-relevant properties, such as passwords and account recovery information. This issue is exploitable only when an RCS is configured to run in client mode. |
2026-04-07 | |
| CVE-2026-4065 | 5.4 | MEDIUM | CWE-862 | 0.0% p10 | 3.78 | The Smart Slider 3 plugin for WordPress is vulnerable to unauthorized access and...The Smart Slider 3 plugin for WordPress is vulnerable to unauthorized access and modification of data due to missing capability checks on multiple wp_ajax_smart-slider3 controller actions in all versions up to, and including, 3.5.1.33. The display_admin_ajax() method does not call checkForCap() (which requires unfiltered_html capability), and several controller actions only validate the nonce (validateToken()) without calling validatePermission(). This makes it possible for authenticated attackers, with Contributor-level access and above, to enumerate slider metadata and create, modify, and delete image storage records by obtaining the nextend_nonce exposed on post editor pages. |
2026-04-07 | |
| CVE-2026-39937 | 8.8 | HIGH | CWE-212 | 0.1% p17 | 6.16 | Improper removal of sensitive information before storage or transfer vulnerabili...Improper removal of sensitive information before storage or transfer vulnerability in The Wikimedia Foundation Mediawiki - CentralAuth Extension allows Resource Leak Exposure. The issue has been remediated on the `master` branch, and in the release branches for MediaWiki versions 1.43, 1.44, and 1.45. |
2026-04-07 | |
| CVE-2026-39934 | 6.9 | MEDIUM | CWE-835 | 0.1% p17 | 4.83 | Loop with unreachable exit condition ('infinite loop') vulnerability in The Wiki...Loop with unreachable exit condition ('infinite loop') vulnerability in The Wikimedia Foundation Mediawiki - GrowthExperiments Extension allows Leveraging Time-of-Check and Time-of-Use (TOCTOU) Race Conditions. This issue was remediated only on the `master` branch. |
2026-04-07 | |
| CVE-2026-39933 | 6.9 | MEDIUM | CWE-79 | 0.1% p19 | 4.83 | Improper neutralization of input during web page generation ('cross-site scripti...Improper neutralization of input during web page generation ('cross-site scripting') vulnerability in The Wikimedia Foundation Mediawiki - GlobalWatchlist Extension allows Cross-Site Scripting (XSS). The issue has been remediated on the `master` branch, and in the release branches for MediaWiki versions 1.43, 1.44, and 1.45. |
2026-04-07 | |
| CVE-2026-39847 | 9.1 | CRITICAL | CWE-22 | 0.1% p20 | 6.37 | Emmett is a full-stack Python web framework designed with simplicity. From 2.5.0...Emmett is a full-stack Python web framework designed with simplicity. From 2.5.0 to before 2.8.1, the RSGI static handler for Emmett's internal assets (/__emmett__ paths) is vulnerable to path traversal attacks. An attacker can use ../ sequences (eg /__emmett__/../rsgi/handlers.py) to read arbitrary files outside the assets directory. This vulnerability is fixed in 2.8.1. |
2026-04-07 | |
| CVE-2026-39846 | 9.0 | CRITICAL | CWE-79 | 0.1% p34 | 6.30 | SiYuan is a personal knowledge management system. Prior to 3.6.4, a malicious no...SiYuan is a personal knowledge management system. Prior to 3.6.4, a malicious note synced to another user can trigger remote code execution in the SiYuan Electron desktop client. The root cause is that table caption content is stored without safe escaping and later unescaped into rendered HTML, creating a stored XSS sink. Because the desktop renderer runs with nodeIntegration enabled and contextIsolation disabled, attacker-controlled JavaScript executes with access to Node.js APIs. In practice, an attacker can import a crafted note into a synced workspace, wait for the victim to sync, and achieve code execution when the victim opens the note. This vulnerability is fixed in 3.6.4. |
2026-04-07 | |
| CVE-2026-35568 | 7.6 | HIGH | CWE-346 | 0.0% p4 | 5.32 | MCP Java SDK is the official Java SDK for Model Context Protocol servers and cli...MCP Java SDK is the official Java SDK for Model Context Protocol servers and clients. Prior to 1.0.0, the java-sdk contains a DNS rebinding vulnerability. This vulnerability allows an attacker to access a locally or network-private java-sdk MCP server via a victims browser that is either local, or network adjacent. This allows an attacker to make any tool call to the server as if they were a locally running MCP connected AI agent. This vulnerability is fixed in 1.0.0. |
2026-04-07 | |
| CVE-2026-35406 | 6.2 | MEDIUM | CWE-400 | 0.0% p3 | 4.34 | Aardvark-dns is an authoritative dns server for A/AAAA container records. From 1...Aardvark-dns is an authoritative dns server for A/AAAA container records. From 1.16.0 to 1.17.0, a truncated TCP DNS query followed by a connection reset causes aardvark-dns to enter an unrecoverable infinite error loop at 100% CPU. This vulnerability is fixed in 1.17.1. |
2026-04-07 | |
| CVE-2026-34781 | 2.8 | LOW | CWE-476 | 0.0% p2 | 1.96 | Electron is a framework for writing cross-platform desktop applications using Ja...Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. Prior to 39.8.5, 40.8.5, 41.1.0, and 42.0.0-alpha.5, apps that call clipboard.readImage() may be vulnerable to a denial of service. If the system clipboard contains image data that fails to decode, the resulting null bitmap is passed unchecked to image construction, triggering a controlled abort and crashing the process. Apps are only affected if they call clipboard.readImage(). Apps that do not read images from the clipboard are not affected. This issue does not allow memory corruption or code execution. This vulnerability is fixed in 39.8.5, 40.8.5, 41.1.0, and 42.0.0-alpha.5. |
2026-04-07 | |
| CVE-2026-34765 | 6.0 | MEDIUM | CWE-668 | 0.1% p17 | 4.20 | Electron is a framework for writing cross-platform desktop applications using Ja...Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. Prior to 39.8.5, 40.8.5, 41.1.0, and 42.0.0-alpha.5, when a renderer calls window.open() with a target name, Electron did not correctly scope the named-window lookup to the opener's browsing context group. A renderer could navigate an existing child window that was opened by a different, unrelated renderer if both used the same target name. If that existing child was created with more permissive webPreferences (via setWindowOpenHandler's overrideBrowserWindowOptions), content loaded by the second renderer inherits those permissions. Apps are only affected if they open multiple top-level windows with differing trust levels and use setWindowOpenHandler to grant child windows elevated webPreferences such as a privileged preload script. Apps that do not elevate child window privileges, or that use a single top-level window, are not affected. Apps that additionally grant nodeIntegration: true or sandbox: false to child windows (contrary to the security recommendations) may be exposed to arbitrary code execution. This vulnerability is fixed in 39.8.5, 40.8.5, 41.1.0, and 42.0.0-alpha.5. |
2026-04-07 | |
| CVE-2026-34582 | 8.7 | HIGH | CWE-841 | 0.0% p9 | 6.09 | Botan is a C++ cryptography library. Prior to version 3.11.1, the TLS 1.3 implem...Botan is a C++ cryptography library. Prior to version 3.11.1, the TLS 1.3 implementation allowed ApplicationData records to be processed prior to the Finished message being received. A server which is attempting to enforce client authentication via certificates can by bypassed by a client which entirely omits Certificate, CertificateVerify, and the Finished message and instead sends application data records. This vulnerability is fixed in 3.11.1. |
2026-04-07 | |
| CVE-2026-34580 | 9.3 | CRITICAL | CWE-295 | 0.0% p8 | 6.51 | Botan is a C++ cryptography library. In 3.11.0, the function Certificate_Store::...Botan is a C++ cryptography library. In 3.11.0, the function Certificate_Store::certificate_known had a misleading name; it would return true if any certificate in the store had a DN (and subject key identifier, if set) matching that of the argument. It did not check that the cert it found and the cert it was passed were actually the same certificate. In 3.11.0 an extension of path validation logic was made which assumed that certificate_known only returned true if the certificates were in fact identical. The impact is that if an end entity certificate is presented, and its DN (and subject key identifier, if set) match that of any trusted root, the end entity certificate is accepted immediately as if it itself were a trusted root. , This vulnerability is fixed in 3.11.1. |
2026-04-07 | |
| CVE-2026-34371 | 6.3 | MEDIUM | CWE-22 | 0.0% p13 | 4.41 | LibreChat is a ChatGPT clone with additional features. Prior to 0.8.4, LibreChat...LibreChat is a ChatGPT clone with additional features. Prior to 0.8.4, LibreChat trusts the name field returned by the execute_code sandbox when persisting code-generated artifacts. On deployments using the default local file strategy, a malicious artifact filename containing traversal sequences (for example, ../../../../../app/client/dist/poc.txt) is concatenated into the server-side destination path and written with fs.writeFileSync() without sanitization. This gives any user who can trigger execute_code an arbitrary file write primitive as the LibreChat server user. This vulnerability is fixed in 0.8.4. |
2026-04-07 | |
| CVE-2026-34079 | 8.7 | HIGH | CWE-22 | 0.1% p32 | 6.09 | Flatpak is a Linux application sandboxing and distribution framework. Prior to 1...Flatpak is a Linux application sandboxing and distribution framework. Prior to 1.16.4, the caching for ld.so removes outdated cache files without properly checking that the app controlled path to the outdated cache is in the cache directory. This allows Flatpak apps to delete arbitrary files on the host. This vulnerability is fixed in 1.16.4. |
2026-04-07 | |
| CVE-2026-34078 | 9.3 | CRITICAL | CWE-61 | 0.2% p39 | 6.52 | Flatpak is a Linux application sandboxing and distribution framework. Prior to 1...Flatpak is a Linux application sandboxing and distribution framework. Prior to 1.16.4, the Flatpak portal accepts paths in the sandbox-expose options which can be app-controlled symlinks pointing at arbitrary paths. Flatpak run mounts the resolved host path in the sandbox. This gives apps access to all host files and can be used as a primitive to gain code execution in the host context. This vulnerability is fixed in 1.16.4. |
2026-04-07 | |
| CVE-2026-39401 | 5.3 | MEDIUM | CWE-862 | 0.0% p13 | 3.71 | Cronicle is a multi-server task scheduler and runner, with a web based front-end...Cronicle is a multi-server task scheduler and runner, with a web based front-end UI. Prior to 0.9.111, jb child processes can include an update_event key in their JSON output. The server applies this directly to the parent event's stored configuration without any authorization check. A low-privilege user who can create and run events can modify any event property, including webhook URLs and notification emails. This vulnerability is fixed in 0.9.111. |
2026-04-07 | |
| CVE-2026-39400 | 5.3 | MEDIUM | CWE-79 | 0.1% p16 | 3.71 | Cronicle is a multi-server task scheduler and runner, with a web based front-end...Cronicle is a multi-server task scheduler and runner, with a web based front-end UI. Prior to 0.9.111, a non-admin user with create_events and run_events privileges can inject arbitrary JavaScript through job output fields (html.content, html.title, table.header, table.rows, table.caption). The server stores this data without sanitization, and the client renders it via innerHTML on the Job Details page. This vulnerability is fixed in 0.9.111. |
2026-04-07 | |
| CVE-2026-39397 | 9.4 | CRITICAL | CWE-862 | 0.1% p15 | 6.58 | @delmaredigital/payload-puck is a PayloadCMS plugin for integrating Puck visual ...@delmaredigital/payload-puck is a PayloadCMS plugin for integrating Puck visual page builder. Prior to 0.6.23, all /api/puck/* CRUD endpoint handlers registered by createPuckPlugin() called Payload's local API with the default overrideAccess: true, bypassing all collection-level access control. The access option passed to createPuckPlugin() and any access rules defined on Puck-registered collections were silently ignored on these endpoints. This vulnerability is fixed in 0.6.23. |
2026-04-07 | |
| CVE-2026-35533 | 7.7 | HIGH | CWE-284 | 0.0% p2 | 5.39 | mise manages dev tools like node, python, cmake, and terraform. From 2026.2.18 t...mise manages dev tools like node, python, cmake, and terraform. From 2026.2.18 through 2026.4.5, mise loads trust-control settings from a local project .mise.toml before the trust check runs. An attacker who can place a malicious .mise.toml in a repository can make that same file appear trusted and then reach dangerous directives such as [env] _.source, templates, hooks, or tasks. |
2026-04-07 | |
| CVE-2026-34080 | 6.8 | MEDIUM | CWE-1289 | 0.0% p5 | 4.76 | xdg-dbus-proxy is a filtering proxy for D-Bus connections. Prior to 0.1.7, a pol...xdg-dbus-proxy is a filtering proxy for D-Bus connections. Prior to 0.1.7, a policy parser vulnerability allows bypassing eavesdrop restrictions. The proxy checks for eavesdrop=true in policy rules but fails to handle eavesdrop ='true' (with a space before the equals sign) and similar cases. Clients can intercept D-Bus messages they should not have access to. This vulnerability is fixed in 0.1.7. |
2026-04-07 | |
| CVE-2026-34045 | 8.2 | HIGH | CWE-209 | 0.1% p21 | 5.74 | Podman Desktop is a graphical tool for developing on containers and Kubernetes. ...Podman Desktop is a graphical tool for developing on containers and Kubernetes. Prior to 1.26.2, an unauthenticated HTTP server exposed by Podman Desktop allows any network attacker to remotely trigger denial-of-service conditions and extract sensitive information. By abusing missing connection limits and timeouts, an attacker can exhaust file descriptors and kernel memory, leading to application crash or full host freeze. Additionally, verbose error responses disclose internal paths and system details (including usernames on Windows), aiding further exploitation. The issue requires no authentication or user interaction and is exploitable over the network. This vulnerability is fixed in 1.26.2. |
2026-04-07 | |
| CVE-2026-33439 | 9.3 | CRITICAL | CWE-502 | 0.1% p31 | 6.51 | Open Access Management (OpenAM) is an access management solution. Prior to 16.0....Open Access Management (OpenAM) is an access management solution. Prior to 16.0.6, OpenIdentityPlatform OpenAM is vulnerable to pre-authentication Remote Code Execution (RCE) via unsafe Java deserialization of the jato.clientSession HTTP parameter. This bypasses the WhitelistObjectInputStream mitigation that was applied to the jato.pageSession parameter after CVE-2021-35464. An unauthenticated attacker can achieve arbitrary command execution on the server by sending a crafted serialized Java object as the jato.clientSession GET/POST parameter to any JATO ViewBean endpoint whose JSP contains <jato:form> tags (e.g., the Password Reset pages). This vulnerability is fixed in 16.0.6. |
2026-04-07 | |
| CVE-2026-32712 | 5.4 | MEDIUM | CWE-79 | 0.0% p6 | 3.78 | Open Source Point of Sale is a web based point-of-sale application written in PH...Open Source Point of Sale is a web based point-of-sale application written in PHP using CodeIgniter framework. Prior to 3.4.3, a Stored Cross-Site Scripting (XSS) vulnerability exists in the Daily Sales management table. The customer_name column is configured with escape: false in the bootstrap-table column configuration, causing customer names to be rendered as raw HTML. An attacker with customer management permissions can inject arbitrary JavaScript into a customer's first_name or last_name field, which executes in the browser of any user viewing the Daily Sales page. This vulnerability is fixed in 3.4.3. |
2026-04-07 | |
| CVE-2026-29181 | 7.5 | HIGH | CWE-770 | 0.1% p16 | 5.25 | OpenTelemetry-Go is the Go implementation of OpenTelemetry. From 1.36.0 to 1.40....OpenTelemetry-Go is the Go implementation of OpenTelemetry. From 1.36.0 to 1.40.0, multi-value baggage: header extraction parses each header field-value independently and aggregates members across values. This allows an attacker to amplify cpu and allocations by sending many baggage: header lines, even when each individual value is within the 8192-byte per-value parse limit. This vulnerability is fixed in 1.41.0. |
2026-04-07 | |
| CVE-2026-27949 | 2.0 | LOW | CWE-200 | 0.0% p10 | 1.40 | Plane is an an open-source project management tool. Prior to 1.3.0, a vulnerabil...Plane is an an open-source project management tool. Prior to 1.3.0, a vulnerability was identified in Plane's authentication flow where a user's email address is included as a query parameter in the URL during error handling (e.g., when an invalid magic code is submitted). Transmitting personally identifiable information (PII) via GET request query strings is classified as an insecure design practice. The affected code path is located in the authentication utility module (packages/utils/src/auth.ts). This vulnerability is fixed in 1.3.0. |
2026-04-07 | |
| CVE-2026-5741 | 6.9 | MEDIUM | CWE-77 | 2.2% p84 | 4.90 | A weakness has been identified in suvarchal docker-mcp-server up to 0.1.0. The i...A weakness has been identified in suvarchal docker-mcp-server up to 0.1.0. The impacted element is the function stop_container/remove_container/pull_image of the file src/index.ts of the component HTTP Interface. This manipulation causes os command injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be used for attacks. The project was informed of the problem early through an issue report but has not responded yet. |
2026-04-07 | |
| CVE-2026-5739 | 6.9 | MEDIUM | CWE-74 | 0.1% p19 | 4.83 | A security flaw has been discovered in PowerJob 5.1.0/5.1.1/5.1.2. The affected ...A security flaw has been discovered in PowerJob 5.1.0/5.1.1/5.1.2. The affected element is the function GroovyEvaluator.evaluate of the file /openApi/addWorkflowNode of the component OpenAPI Endpoint. The manipulation of the argument nodeParams results in code injection. The attack can be executed remotely. The project was informed of the problem early through an issue report but has not responded yet. |
2026-04-07 | |
| CVE-2026-3566 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: After further discussion, the issue was determined to not meet ...Rejected reason: After further discussion, the issue was determined to not meet the criteria for CVE assignment. |
2026-04-07 | |
| CVE-2026-39841 | 6.3 | MEDIUM | CWE-80 | 0.1% p16 | 4.41 | Improper neutralization of Script-Related HTML tags in a web page (basic XSS) vu...Improper neutralization of Script-Related HTML tags in a web page (basic XSS) vulnerability in Wikimedia Foundation Mediawiki - Cargo Extension allows Stored XSS.This issue affects Mediawiki - Cargo Extension: before 3.8.7. |
2026-04-07 | |
| CVE-2026-39840 | 5.1 | MEDIUM | CWE-79 | 0.1% p16 | 3.57 | Improper neutralization of input during web page generation ('cross-site scripti...Improper neutralization of input during web page generation ('cross-site scripting') vulnerability in Wikimedia Foundation Mediawiki - Cargo Extension allows XSS Targeting Non-Script Elements.This issue affects Mediawiki - Cargo Extension: before 3.8.7. |
2026-04-07 | |
| CVE-2026-39839 | 6.3 | MEDIUM | CWE-80 | 0.0% p15 | 4.41 | Improper neutralization of Script-Related HTML tags in a web page (basic XSS) vu...Improper neutralization of Script-Related HTML tags in a web page (basic XSS) vulnerability in Wikimedia Foundation Mediawiki - Cargo Extension allows Stored XSS.This issue affects Mediawiki - Cargo Extension: before 3.8.7. |
2026-04-07 | |
| CVE-2026-39837 | 6.3 | MEDIUM | CWE-80 | 0.1% p16 | 4.41 | Improper neutralization of Script-Related HTML tags in a web page (basic XSS) vu...Improper neutralization of Script-Related HTML tags in a web page (basic XSS) vulnerability in WikiWorks Mediawiki - Cargo Extension allows Stored XSS.This issue affects Mediawiki - Cargo Extension: before 3.8.7. |
2026-04-07 | |
| CVE-2026-39395 | 4.3 | MEDIUM | CWE-754 | 0.0% p8 | 3.01 | Cosign provides code signing and transparency for containers and binaries. Prior...Cosign provides code signing and transparency for containers and binaries. Prior to 3.0.6 and 2.6.3, cosign verify-blob-attestation may erroneously report a "Verified OK" result for attestations with malformed payloads or mismatched predicate types. For old-format bundles and detached signatures, this was due to a logic flaw in the error handling of the predicate type validation. For new-format bundles, the predicate type validation was bypassed completely. This vulnerability is fixed in 3.0.6 and 2.6.3. |
2026-04-07 | |
| CVE-2026-39382 | 9.3 | CRITICAL | CWE-78 | 0.1% p19 | 6.51 | dbt enables data analysts and engineers to transform their data using the same p...dbt enables data analysts and engineers to transform their data using the same practices that software engineers use to build applications. Inside the reusable workflow dbt-labs/actions/blob/main/.github/workflows/open-issue-in-repo.yml, the prep job uses peter-evans/find-comment to search for an existing comment indicating that a docs issue has already been opened. The output steps.issue_comment.outputs.comment-body is then interpolated directly into a bash if statement. Because comment-body is attacker-controlled text and is inserted into shell syntax without escaping, a malicious comment body can break out of the quoted string and inject arbitrary shell commands. This vulnerability is fixed with commit bbed8d28354e9c644c5a7df13946a3a0451f9ab9. |
2026-04-07 | |
| CVE-2026-39381 | 5.3 | MEDIUM | CWE-863 | 0.0% p12 | 3.71 | Parse Server is an open source backend that can be deployed to any infrastructur...Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.8.0-alpha.7 and 8.6.75, the GET /sessions/me endpoint returns _Session fields that the server operator explicitly configured as protected via the protectedFields server option. Any authenticated user can retrieve their own session's protected fields with a single request. The equivalent GET /sessions and GET /sessions/:objectId endpoints correctly strip protected fields. This vulnerability is fixed in 9.8.0-alpha.7 and 8.6.75. |
2026-04-07 | |
| CVE-2026-39380 | 5.4 | MEDIUM | CWE-79 | 0.0% p8 | 3.78 | Open Source Point of Sale is a web based point-of-sale application written in PH...Open Source Point of Sale is a web based point-of-sale application written in PHP using CodeIgniter framework. Prior to 3.4.3, a Stored Cross-Site Scripting (XSS) vulnerability exists in the Stock Locations configuration feature. The application fails to properly sanitize user input supplied through the stock_location parameter, allowing attackers to inject malicious JavaScript code that is stored in the database and executed when rendered in the Employees interface. This vulnerability is fixed in 3.4.3. |
2026-04-07 | |
| CVE-2026-39376 | 7.5 | HIGH | CWE-674 | 0.1% p16 | 5.25 | FastFeedParser is a high performance RSS, Atom and RDF parser. Prior to 0.5.10, ...FastFeedParser is a high performance RSS, Atom and RDF parser. Prior to 0.5.10, when parse() fetches a URL that returns an HTML page containing a <meta http-equiv="refresh"> tag, it recursively calls itself with the redirect URL — with no depth limit, no visited-URL deduplication, and no redirect count cap. An attacker-controlled server that returns an infinite chain of HTML meta-refresh responses causes unbounded recursion, exhausting the Python call stack and crashing the process. This vulnerability can also be chained with the companion SSRF issue to reach internal network targets after bypassing the initial URL check. This vulnerability is fixed in 0.5.10. |
2026-04-07 | |
| CVE-2026-39374 | 6.5 | MEDIUM | CWE-639 | 0.0% p8 | 4.55 | Plane is an an open-source project management tool. Prior to 1.3.0, the IssueBul...Plane is an an open-source project management tool. Prior to 1.3.0, the IssueBulkUpdateDateEndpoint allows a project member (ADMIN or MEMBER) to modify the start_date and target_date of ANY issue across the entire Plane instance, regardless of workspace or project membership. The endpoint fetches issues by ID without filtering by workspace or project, enabling cross-boundary data modification. This vulnerability is fixed in 1.3.0. |
2026-04-07 | |
| CVE-2026-39373 | 5.3 | MEDIUM | CWE-409 | 0.0% p14 | 3.71 | JWCrypto implements JWK, JWS, and JWE specifications using python-cryptography. ...JWCrypto implements JWK, JWS, and JWE specifications using python-cryptography. Prior to 1.5.7, an unauthenticated attacker can exhaust server memory by sending crafted JWE tokens with ZIP compression. The existing patch for CVE-2024-28102 limits input token size to 250KB but does not validate the decompressed output size. An unauthenticated attacker can cause memory exhaustion on memory-constrained systems. A token under the 250KB input limit can decompress to approximately 100MB. This vulnerability is fixed in 1.5.7. |
2026-04-07 | |
| CVE-2026-39371 | 8.1 | HIGH | CWE-352 | 0.0% p0 | 5.67 | RedwoodSDK is a server-first React framework. From 1.0.0-beta.50 to 1.0.5, erver...RedwoodSDK is a server-first React framework. From 1.0.0-beta.50 to 1.0.5, erver functions exported from "use server" files could be invoked via GET requests, bypassing their intended HTTP method. In cookie-authenticated applications, this allowed cross-site GET navigations to trigger state-changing functions, because browsers send SameSite=Lax cookies on top-level GET requests. This affected all server functions -- both serverAction() handlers and bare exported functions in "use server" files. This vulnerability is fixed in 1.0.6. |
2026-04-07 | |
| CVE-2026-39370 | 7.1 | HIGH | CWE-918 | 0.0% p8 | 4.97 | WWBN AVideo is an open source video platform. In versions 26.0 and prior, object...WWBN AVideo is an open source video platform. In versions 26.0 and prior, objects/aVideoEncoder.json.php still allows attacker-controlled downloadURL values with common media or archive extensions such as .mp4, .mp3, .zip, .jpg, .png, .gif, and .webm to bypass SSRF validation. The server then fetches the response and stores it as media content. This allows an authenticated uploader to turn the upload-by-URL flow into a reliable SSRF response-exfiltration primitive. The vulnerability is caused by an incomplete fix for CVE-2026-27732. |
2026-04-07 | |
| CVE-2026-39369 | 7.6 | HIGH | CWE-22 | 0.1% p17 | 5.32 | WWBN AVideo is an open source video platform. In versions 26.0 and prior, object...WWBN AVideo is an open source video platform. In versions 26.0 and prior, objects/aVideoEncoderReceiveImage.json.php allowed an authenticated uploader to fetch attacker-controlled same-origin /videos/... URLs, bypass traversal scrubbing, and expose server-local files through the GIF poster storage path. The vulnerable GIF branch could be abused to read local files such as /etc/passwd or application source files and republish those bytes through a normal public GIF media URL. |
2026-04-07 | |
| CVE-2026-39368 | 6.5 | MEDIUM | CWE-918 | 0.0% p8 | 4.55 | WWBN AVideo is an open source video platform. In versions 26.0 and prior, the Li...WWBN AVideo is an open source video platform. In versions 26.0 and prior, the Live restream log callback flow accepted an attacker-controlled restreamerURL and later fetched that stored URL server-side, enabling stored SSRF for authenticated streamers. The vulnerable flow allowed a low-privilege user with streaming permission to store an arbitrary callback URL and trigger server-side requests to loopback or internal HTTP services through the restream log feature. |
2026-04-07 | |
| CVE-2026-39367 | 5.4 | MEDIUM | CWE-79 | 0.0% p8 | 3.78 | WWBN AVideo is an open source video platform. In versions 26.0 and prior, AVideo...WWBN AVideo is an open source video platform. In versions 26.0 and prior, AVideo's EPG (Electronic Program Guide) feature parses XML from user-controlled URLs and renders programme titles directly into HTML without any sanitization or escaping. A user with upload permission can set a video's epg_link to a malicious XML file whose <title> elements contain JavaScript. This payload executes in the browser of any unauthenticated visitor to the public EPG page, enabling session hijacking and account takeover. |
2026-04-07 | |
| CVE-2026-39366 | 6.5 | MEDIUM | CWE-345 | 0.0% p3 | 4.55 | WWBN AVideo is an open source video platform. In versions 26.0 and prior, the Pa...WWBN AVideo is an open source video platform. In versions 26.0 and prior, the PayPal IPN v1 handler at plugin/PayPalYPT/ipn.php lacks transaction deduplication, allowing an attacker to replay a single legitimate IPN notification to repeatedly inflate their wallet balance and renew subscriptions. The newer ipnV2.php and webhook.php handlers correctly deduplicate via PayPalYPT_log entries, but the v1 handler was never updated and remains actively referenced as the notify_url for billing plans. |
2026-04-07 | |
| CVE-2026-39365 | 6.3 | MEDIUM | CWE-22 | 4.1% p88 | 4.53 | Vite is a frontend tooling framework for JavaScript. From 6.0.0 to before 6.4.2,...Vite is a frontend tooling framework for JavaScript. From 6.0.0 to before 6.4.2, 7.3.2, and 8.0.5, the dev server’s handling of .map requests for optimized dependencies resolves file paths and calls readFile without restricting ../ segments in the URL. As a result, it is possible to bypass the server.fs.strict allow list and retrieve .map files located outside the project root, provided they can be parsed as valid source map JSON. This vulnerability is fixed in 6.4.2, 7.3.2, and 8.0.5. |
2026-04-07 | |
| CVE-2026-39364 | 8.2 | HIGH | CWE-180 | 2.6% p85 | 5.82 | Vite is a frontend tooling framework for JavaScript. From 7.1.0 to before 7.3.2 ...Vite is a frontend tooling framework for JavaScript. From 7.1.0 to before 7.3.2 and 8.0.5, on the Vite dev server, files that should be blocked by server.fs.deny (e.g., .env, *.crt) can be retrieved with HTTP 200 responses when query parameters such as ?raw, ?import&raw, or ?import&url&inline are appended. This vulnerability is fixed in 7.3.2 and 8.0.5. |
2026-04-07 | |
| CVE-2026-39363 | 8.2 | HIGH | CWE-200 | 0.1% p25 | 5.74 | Vite is a frontend tooling framework for JavaScript. From 6.0.0 to before 6.4.2,...Vite is a frontend tooling framework for JavaScript. From 6.0.0 to before 6.4.2, 7.3.2, and 8.0.5, if it is possible to connect to the Vite dev server’s WebSocket without an Origin header, an attacker can invoke fetchModule via the custom WebSocket event vite:invoke and combine file://... with ?raw (or ?inline) to retrieve the contents of arbitrary files on the server as a JavaScript string (e.g., export default "..."). The access control enforced in the HTTP request path (such as server.fs.allow) is not applied to this WebSocket-based execution path. This vulnerability is fixed in 6.4.2, 7.3.2, and 8.0.5. |
2026-04-07 | |
| CVE-2026-39361 | 7.7 | HIGH | CWE-918 | 0.0% p10 | 5.39 | OpenObserve is a cloud-native observability platform. In 0.70.3 and earlier, the...OpenObserve is a cloud-native observability platform. In 0.70.3 and earlier, the validate_enrichment_url function in src/handler/http/request/enrichment_table/mod.rs fails to block IPv6 addresses because Rust's url crate returns them with surrounding brackets (e.g. "[::1]" not "::1"). An authenticated attacker can reach internal services blocked from external access. On cloud deployments this enables retrieval of IAM credentials via AWS IMDSv1 (169.254.169.254), GCP metadata, or Azure IMDS. On self-hosted deployments it allows probing internal network services. |
2026-04-07 | |
| CVE-2026-39356 | 7.5 | HIGH | CWE-89 | 0.0% p12 | 5.25 | Drizzle is a modern TypeScript ORM. Prior to 0.45.2 and 1.0.0-beta.20, Drizzle O...Drizzle is a modern TypeScript ORM. Prior to 0.45.2 and 1.0.0-beta.20, Drizzle ORM improperly escaped quoted SQL identifiers in its dialect-specific escapeName() implementations. In affected versions, embedded identifier delimiters were not escaped before the identifier was wrapped in quotes or backticks. As a result, applications that pass attacker-controlled input to APIs that construct SQL identifiers or aliases, such as sql.identifier(), .as(), may allow an attacker to terminate the quoted identifier and inject SQL. This vulnerability is fixed in 0.45.2 and 1.0.0-beta.20. |
2026-04-07 | |
| CVE-2026-39322 | 9.2 | CRITICAL | CWE-287 | 0.0% p14 | 6.44 | PolarLearn is a free and open-source learning program. In 0-PRERELEASE-15 and ea...PolarLearn is a free and open-source learning program. In 0-PRERELEASE-15 and earlier, POST /api/v1/auth/sign-in creates a valid session for banned accounts before verifying the supplied password. That session is then accepted across authenticated /api routes, enabling account data access and authenticated actions as the banned user. |
2026-04-07 | |
| CVE-2026-32864 | 8.5 | HIGH | CWE-125 | 0.0% p3 | 5.95 | There is a memory corruption vulnerability due to an out-of-bounds read in mgcor...There is a memory corruption vulnerability due to an out-of-bounds read in mgcore_SH_25_3!aligned_free() in NI LabVIEW. This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI file. This vulnerability affects NI LabVIEW 2026 Q1 (26.1.0) and prior versions. |
2026-04-07 | |
| CVE-2026-32863 | 8.5 | HIGH | CWE-125 | 0.0% p3 | 5.95 | There is a memory corruption vulnerability due to an out-of-bounds read in sentr...There is a memory corruption vulnerability due to an out-of-bounds read in sentry_transaction_context_set_operation() in NI LabVIEW. This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI file. This vulnerability affects NI LabVIEW 2026 Q1 (26.1.0) and prior versions. |
2026-04-07 | |
| CVE-2026-32862 | 8.5 | HIGH | CWE-787 | 0.0% p5 | 5.95 | There is a memory corruption vulnerability due to an out-of-bounds write in ResF...There is a memory corruption vulnerability due to an out-of-bounds write in ResFileFactory::InitResourceMgr() in NI LabVIEW. This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI file. This vulnerability affects NI LabVIEW 2026 Q1 (26.1.0) and prior versions. |
2026-04-07 | |
| CVE-2026-32861 | 8.5 | HIGH | CWE-787 | 0.0% p5 | 5.95 | There is a memory corruption vulnerability due to an out-of-bounds write when lo...There is a memory corruption vulnerability due to an out-of-bounds write when loading a corrupted LVCLASS file in NI LabVIEW. This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted .lvclass file. This vulnerability affects NI LabVIEW 2026 Q1 (26.1.0) and prior versions. |
2026-04-07 | |
| CVE-2026-32860 | 8.5 | HIGH | CWE-787 | 0.0% p5 | 5.95 | There is a memory corruption vulnerability due to an out-of-bounds write when lo...There is a memory corruption vulnerability due to an out-of-bounds write when loading a corrupted LVLIB file in NI LabVIEW. This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted .lvlib file. This vulnerability affects NI LabVIEW 2026 Q1 (26.1.0) and prior versions. |
2026-04-07 | |
| CVE-2025-69515 | 9.1 | CRITICAL | CWE-941 | 0.1% p15 | 6.37 | An issue in JXL 9 Inch Car Android Double Din Player Android v12.0 allows attack...An issue in JXL 9 Inch Car Android Double Din Player Android v12.0 allows attackers to force the infotainment system into accepting falsified GPS signals as legitimate, resulting in the device reporting an incorrect or static location. |
2026-04-07 | |
| CVE-2025-56015 | 7.5 | HIGH | CWE-284 | 0.0% p11 | 5.25 | In GenieACS 1.2.13, an unauthenticated access vulnerability exists in the NBI AP...In GenieACS 1.2.13, an unauthenticated access vulnerability exists in the NBI API endpoint. |
2026-04-07 | |
| CVE-2025-14859 | 7.0 | HIGH | CWE-327 | 0.0% p1 | 4.90 | The Semtech LR11xx LoRa transceivers implement secure boot functionality using d...The Semtech LR11xx LoRa transceivers implement secure boot functionality using digital signatures to authenticate firmware. However, the implementation uses a non-standard cryptographic hashing algorithm that is vulnerable to second preimage attacks. An attacker with physical access to the device can exploit this weakness to generate a malicious firmware image with a hash collision, bypassing the secure boot verification mechanism and installing arbitrary unauthorized firmware on the device. |
2026-04-07 | |
| CVE-2025-14858 | 5.1 | MEDIUM | CWE-226 | 0.0% p2 | 3.57 | The Semtech LR11xx LoRa transceivers running early versions of firmware contains...The Semtech LR11xx LoRa transceivers running early versions of firmware contains an information disclosure vulnerability in its firmware validation functionality. When a host issues a firmware validity check command via the SPI interface, the device decrypts the provided encrypted firmware package block-by-block to validate its integrity. However, the last decrypted firmware block remains uncleared in memory after the validation process completes. An attacker with access to the SPI interface can subsequently issue memory read commands to retrieve the decrypted firmware contents from this residual memory, effectively bypassing the firmware encryption protection mechanism. The attack requires physical access to the device's SPI interface. |
2026-04-07 | |
| CVE-2025-14857 | 5.4 | MEDIUM | CWE-123 | 0.0% p6 | 3.78 | An improper access control vulnerability exists in Semtech LoRa LR11xxx transcei...An improper access control vulnerability exists in Semtech LoRa LR11xxx transceivers running early versions of firmware where the memory write command accessible via the physical SPI interface fails to enforce write protection on the program call stack. An attacker with physical access to the SPI interface can overwrite stack memory to hijack program control flow and achieve limited arbitrary code execution. However, the impact is limited to the active attack session: the device's secure boot mechanism prevents persistent firmware modification, the crypto engine isolates cryptographic keys from direct firmware access, and all modifications are lost upon device reboot or loss of physical access. |
2026-04-07 | |
| CVE-2026-5736 | 6.9 | MEDIUM | CWE-74 | 0.0% p13 | 4.83 | A vulnerability was identified in PowerJob 5.1.0/5.1.1/5.1.2. Impacted is an unk...A vulnerability was identified in PowerJob 5.1.0/5.1.1/5.1.2. Impacted is an unknown function of the file powerjob-server/powerjob-server-starter/src/main/java/tech/powerjob/server/web/controller/InstanceController.java of the component detailPlus Endpoint. The manipulation of the argument customQuery leads to sql injection. Remote exploitation of the attack is possible. The project was informed of the problem early through an issue report but has not responded yet. |
2026-04-07 | |
| CVE-2026-39360 | 5.3 | MEDIUM | CWE-862 | 0.0% p8 | 3.71 | RustFS is a distributed object storage system built in Rust. Prior to alpha.90, ...RustFS is a distributed object storage system built in Rust. Prior to alpha.90, RustFS contains a missing authorization check in the multipart copy path (UploadPartCopy). A low-privileged user who cannot read objects from a victim bucket can still exfiltrate victim objects by copying them into an attacker-controlled multipart upload and completing the upload. This breaks tenant isolation in multi-user / multi-tenant deployments. This vulnerability is fixed in alpha.90. |
2026-04-07 | |
| CVE-2026-39355 | 9.9 | CRITICAL | CWE-862 | 0.0% p14 | 6.93 | Genealogy is a family tree PHP application. Prior to 5.9.1, a critical broken ac...Genealogy is a family tree PHP application. Prior to 5.9.1, a critical broken access control vulnerability in the genealogy application allows any authenticated user to transfer ownership of arbitrary non-personal teams to themselves. This enables complete takeover of other users’ team workspaces and unrestricted access to all genealogy data associated with the compromised team. This vulnerability is fixed in 5.9.1. |
2026-04-07 | |
| CVE-2026-39354 | 6.5 | MEDIUM | CWE-639 | 0.0% p8 | 4.55 | Scoold is a Q&A and a knowledge sharing platform for teams. Prior to 1.66.2, an ...Scoold is a Q&A and a knowledge sharing platform for teams. Prior to 1.66.2, an authenticated authorization flaw in Scoold allows any logged-in, low-privilege user to overwrite another user's existing question by supplying that question's public ID as the postId parameter to POST /questions/ask. Because question IDs are exposed in normal question URLs, a low-privilege attacker can take a victim question ID from a public page and cause attacker-controlled content to be stored under that existing question object. This causes direct integrity loss of user-generated content and corrupts the integrity of the existing discussion thread. This vulnerability is fixed in 1.66.2. |
2026-04-07 | |
| CVE-2026-39351 | 6.9 | MEDIUM | CWE-862 | 0.0% p12 | 4.83 | Frappe is a full-stack web application framework. Prior to 16.14.0 and 15.104.0,...Frappe is a full-stack web application framework. Prior to 16.14.0 and 15.104.0, Frappe allows unrestricted Doctype access via API exploit. |
2026-04-07 | |
| CVE-2026-39349 | 2.1 | LOW | CWE-326 | 0.0% p2 | 1.47 | OrangeHRM is a comprehensive human resource management (HRM) system. From 5.0 to...OrangeHRM is a comprehensive human resource management (HRM) system. From 5.0 to 5.8, OrangeHRM Open Source encrypts certain sensitive fields with AES in ECB mode, which preserves block-aligned plaintext patterns in ciphertext and enables pattern disclosure against stored data. This vulnerability is fixed in 5.8.1. |
2026-04-07 | |
| CVE-2026-39348 | 5.3 | MEDIUM | CWE-862 | 0.0% p8 | 3.71 | OrangeHRM is a comprehensive human resource management (HRM) system. From 5.0 to...OrangeHRM is a comprehensive human resource management (HRM) system. From 5.0 to 5.8, OrangeHRM Open Source omits authorization on job specification and vacancy attachment download handlers, allowing authenticated low-privilege users to read attachments via direct reference to attachment identifiers. This vulnerability is fixed in 5.8.1. |
2026-04-07 | |
| CVE-2026-39347 | 5.1 | MEDIUM | CWE-285 | 0.0% p9 | 3.57 | OrangeHRM is a comprehensive human resource management (HRM) system. From 5.0 to...OrangeHRM is a comprehensive human resource management (HRM) system. From 5.0 to 5.8, OrangeHRM Open Source accepts changes to self-appraisal submissions for administrator users after those submissions have been marked completed, breaking integrity of finalized appraisal records. This vulnerability is fixed in 5.8.1. |
2026-04-07 | |
| CVE-2026-39346 | 5.3 | MEDIUM | CWE-284 | 0.0% p9 | 3.71 | OrangeHRM is a comprehensive human resource management (HRM) system. From 5.0 to...OrangeHRM is a comprehensive human resource management (HRM) system. From 5.0 to 5.8, OrangeHRM Open Source allowed authenticated users to bypass disabled-module access controls via URL-encoded request paths and access functionality of modules disabled by an administrator. This vulnerability is fixed in 5.8.1. |
2026-04-07 | |
| CVE-2026-39345 | 4.6 | MEDIUM | CWE-22 | 0.1% p16 | 3.22 | OrangeHRM is a comprehensive human resource management (HRM) system. From 5.0 to...OrangeHRM is a comprehensive human resource management (HRM) system. From 5.0 to 5.8, OrangeHRM Open Source fails to restrict email template file resolution to the intended plugins directory, allowing an authenticated actor who can influence the template path to read arbitrary local files. This vulnerability is fixed in 5.8.1. |
2026-04-07 | |
| CVE-2026-22711 | 6.9 | MEDIUM | CWE-87 | 0.1% p19 | 4.83 | Improper neutralization of alternate XSS syntax vulnerability in The Wikimedia F...Improper neutralization of alternate XSS syntax vulnerability in The Wikimedia Foundation Mediawiki - Wikilove Extension allows Cross-Site Scripting (XSS).The issue has been remediated on the `master` branch, and in the release branches for MediaWiki versions 1.43, 1.44, and 1.45. |
2026-04-07 | |
| CVE-2025-71058 | 9.1 | CRITICAL | CWE-94 | 0.2% p36 | 6.37 | Dual DHCP DNS Server 8.01 improperly accepts and caches UDP DNS responses withou...Dual DHCP DNS Server 8.01 improperly accepts and caches UDP DNS responses without validating that the response originates from a legitimate configured upstream DNS server. The implementation matches responses primarily by TXID and inserts results into the cache, enabling a remote attacker to inject forged responses and poison the DNS cache, potentially redirecting victims to attacker-controlled destinations. |
2026-04-07 | |
| CVE-2026-39344 | 8.1 | HIGH | CWE-79 | 0.0% p11 | 5.67 | ChurchCRM is an open-source church management system. Prior to 7.1.0, there is a...ChurchCRM is an open-source church management system. Prior to 7.1.0, there is a Reflected Cross-Site Scripting (XSS) vulnerability on the login page, which is caused by the lack of sanitization or encoding of the username parameter received from the URL. The username parameter value is directly displayed in the login page input element without filter, allowing attackers to insert malicious JavaScript scripts. If successful, script can be executed on the client side, potentially stealing sensitive data such as session cookies or replacing the display to show the attacker's login form. This vulnerability is fixed in 7.1.0. |
2026-04-07 | |
| CVE-2026-39343 | 7.2 | HIGH | CWE-89 | 0.0% p10 | 5.04 | ChurchCRM is an open-source church management system. Prior to 7.1.0, a SQL inje...ChurchCRM is an open-source church management system. Prior to 7.1.0, a SQL injection vulnerability exists in the EditEventTypes.php file, which is only accessible to administrators. The EN_tyid POST parameter is not sanitized before being used in a SQL query, allowing an administrator to execute arbitrary SQL commands directly against the database. This vulnerability is fixed in 7.1.0. |
2026-04-07 | |
| CVE-2026-39342 | 9.4 | CRITICAL | CWE-89 | 0.0% p9 | 6.58 | ChurchCRM is an open-source church management system. Prior to 7.1.0, the search...ChurchCRM is an open-source church management system. Prior to 7.1.0, the searchwhat parameter via QueryView.php with the QueryID=15 is vulnerable to a SQL injection. The authenticated user requires access to Data/Reports > Query Menu and access to the "Advanced Search" query. This vulnerability is fixed in 7.1.0. |
2026-04-07 | |
| CVE-2026-39341 | 8.1 | HIGH | CWE-89 | 0.0% p8 | 5.67 | ChurchCRM is an open-source church management system. Prior to 7.1.0, the applic...ChurchCRM is an open-source church management system. Prior to 7.1.0, the application is vulnerable to time-based SQL injection due to an improper input validation. Endpoint Reports/ConfirmReportEmail.php?familyId= is not correctly sanitising user input, specifically, the sanitised input is not used to create the SQL query. This vulnerability is fixed in 7.1.0. |
2026-04-07 | |
| CVE-2026-39340 | 8.1 | HIGH | CWE-89 | 0.0% p8 | 5.67 | ChurchCRM is an open-source church management system. Prior to 7.1.0, a SQL inje...ChurchCRM is an open-source church management system. Prior to 7.1.0, a SQL injection vulnerability exists in PropertyTypeEditor.php, part of the administration functionality for managing property type categories (People → Person Properties / Family Properties). The vulnerability was introduced when legacyFilterInput() which both strips HTML and escapes SQL — was replaced with sanitizeText(), which strips HTML only. User-supplied values from the Name and Description fields are concatenated directly into raw INSERT and UPDATE queries with no SQL escaping. This allows any authenticated user with the MenuOptions role (a non-admin staff permission) to perform time-based blind injection and exfiltrate any data from the database, including password hashes of all users. This vulnerability is fixed in 7.1.0. |
2026-04-07 | |
| CVE-2026-39339 | 9.1 | CRITICAL | CWE-284 | 0.1% p31 | 6.37 | ChurchCRM is an open-source church management system. Prior to 7.1.0, a critica...ChurchCRM is an open-source church management system. Prior to 7.1.0, a critical authentication bypass vulnerability in ChurchCRM's API middleware (ChurchCRM/Slim/Middleware/AuthMiddleware.php) allows unauthenticated attackers to access all protected API endpoints by including "api/public" anywhere in the request URL, leading to complete exposure of church member data and system information. This vulnerability is fixed in 7.1.0. |
2026-04-07 | |
| CVE-2026-39338 | 8.6 | HIGH | CWE-79 | 0.0% p11 | 6.02 | ChurchCRM is an open-source church management system. Prior to 7.1.0, a Blind Re...ChurchCRM is an open-source church management system. Prior to 7.1.0, a Blind Reflected Cross-Site Scripting vulnerability exists in the search parameter accepted by the ChurchCRM dashboard. The application fails to sanitize or encode user-supplied input prior to rendering it within the browser's DOM. Although the application ultimately returns an HTTP 500 error due to the malformed API request caused by the payload, the browser's JavaScript engine parses and executes the injected <script> tags before the error response is returned — resulting in successful code execution regardless of the server-side error. This vulnerability is fixed in 7.1.0. |
2026-04-07 | |
| CVE-2026-39337 | 10.0 | CRITICAL | CWE-94 | 0.3% p55 | 7.01 | ChurchCRM is an open-source church management system. Prior to 7.1.0, critical p...ChurchCRM is an open-source church management system. Prior to 7.1.0, critical pre-authentication remote code execution vulnerability in ChurchCRM's setup wizard allows unauthenticated attackers to inject arbitrary PHP code during the initial installation process, leading to complete server compromise. The "$dbPassword" variable is not sanitized. This vulnerability exists due to an incomplete fix for CVE-2025-62521. This vulnerability is fixed in 7.1.0. |
2026-04-07 | |
| CVE-2026-39336 | 6.1 | MEDIUM | CWE-79 | 0.0% p9 | 4.27 | ChurchCRM is an open-source church management system. Prior to 7.1.0, a stored c...ChurchCRM is an open-source church management system. Prior to 7.1.0, a stored cross-site scripting issue affects the Directory Reports form fields set from config, Person editor defaults rendered into address fields, and external self-registration form defaults. This is primarily an admin-to-admin stored XSS path where writable configuration fields are abused. This vulnerability is fixed in 7.1.0. |
2026-04-07 | |
| CVE-2026-39335 | 6.1 | MEDIUM | CWE-79 | 0.0% p8 | 4.27 | ChurchCRM is an open-source church management system. Prior to 7.1.1, there is S...ChurchCRM is an open-source church management system. Prior to 7.1.1, there is Stored XSS in group remove control and family editor state/country. This is primarily an admin-to-admin stored XSS path when writable entity fields are abused. This vulnerability is fixed in 7.1.1. |
2026-04-07 | |
| CVE-2026-39334 | 8.8 | HIGH | CWE-89 | 0.0% p9 | 6.16 | ChurchCRM is an open-source church management system. Prior to 7.1.0, an SQL inj...ChurchCRM is an open-source church management system. Prior to 7.1.0, an SQL injection vulnerability was found in the endpoint /SettingsIndividual.php in ChurchCRM 7.0.5. Authenticated users without any specific privileges can inject arbitrary SQL statements through the type array parameter via the index and thus extract and modify information from the database. This vulnerability is fixed in 7.1.0. |
2026-04-07 | |
| CVE-2026-39333 | 8.7 | HIGH | CWE-79 | 0.0% p9 | 6.09 | ChurchCRM is an open-source church management system. Prior to 7.1.0, he FindFun...ChurchCRM is an open-source church management system. Prior to 7.1.0, he FindFundRaiser.php endpoint reflects user-supplied input (DateStart and DateEnd) into HTML input field attributes without proper output encoding for the HTML attribute context. An authenticated attacker can craft a malicious URL that executes arbitrary JavaScript when visited by another authenticated user. This constitutes a reflected XSS vulnerability. This vulnerability is fixed in 7.1.0. |
2026-04-07 | |
| CVE-2026-39332 | 8.7 | HIGH | CWE-79 | 0.0% p9 | 6.09 | ChurchCRM is an open-source church management system. Prior to 7.1.0, a reflecte...ChurchCRM is an open-source church management system. Prior to 7.1.0, a reflected Cross-Site Scripting (XSS) vulnerability in GeoPage.php allows any authenticated user to inject arbitrary JavaScript into the browser of another authenticated user. Because the payload fires automatically via autofocus with no user interaction required, an attacker can steal session cookies and fully take over any victim account, including administrator accounts, by tricking them into submitting a crafted form. This vulnerability is fixed in 7.1.0. |
2026-04-07 | |
| CVE-2026-39331 | 8.1 | HIGH | CWE-639 | 0.0% p12 | 5.67 | ChurchCRM is an open-source church management system. Prior to 7.1.0, an authent...ChurchCRM is an open-source church management system. Prior to 7.1.0, an authenticated API user can modify any family record's state without proper authorization by simply changing the {familyId} parameter in requests, regardless of whether they possess the required EditRecords privilege. /family/{familyId}/verify, /family/{familyId}/verify/url, /family/{familyId}/verify/now, /family/{familyId}/activate/{status}, and /family/{familyId}/geocode lack role-based access control, allowing users to deactivate/reactivate arbitrary families, spam verification emails, and mark families as verified and trigger geocoding. This vulnerability is fixed in 7.1.0. |
2026-04-07 | |
| CVE-2026-39330 | 8.8 | HIGH | CWE-89 | 0.0% p9 | 6.16 | ChurchCRM is an open-source church management system. Prior to 7.1.0, an SQL inj...ChurchCRM is an open-source church management system. Prior to 7.1.0, an SQL injection vulnerability was found in the endpoint /PropertyAssign.php in ChurchCRM. Authenticated users with the role Manage Groups & Roles (ManageGroups) and Edit Records (isEditRecordsEnabled) can inject arbitrary SQL statements through the Value parameter and thus extract and modify information from the database. This vulnerability is fixed in 7.1.0. |
2026-04-07 | |
| CVE-2026-39329 | 8.8 | HIGH | CWE-89 | 0.0% p9 | 6.16 | ChurchCRM is an open-source church management system. Prior to 7.1.0, an SQL inj...ChurchCRM is an open-source church management system. Prior to 7.1.0, an SQL injection vulnerability was identified in /EventNames.php in ChurchCRM. Authenticated users with AddEvent privileges can inject SQL via the newEvtTypeCntLst parameter during event type creation. The vulnerable flow reaches an ON DUPLICATE KEY UPDATE clause where unescaped user input is interpolated directly. This vulnerability is fixed in 7.1.0. |
2026-04-07 | |
| CVE-2026-39328 | 8.9 | HIGH | CWE-79 | 0.0% p12 | 6.23 | ChurchCRM is an open-source church management system. Prior to 7.1.0, a stored c...ChurchCRM is an open-source church management system. Prior to 7.1.0, a stored cross-site scripting vulnerability exists in ChurchCRM's person profile editing functionality. Non-administrative users who have the EditSelf permission can inject malicious JavaScript into their Facebook, LinkedIn, and X profile fields. Due to a 50-character field limit, the payload is distributed across all three fields and chains their onfocus event handlers to execute in sequence. When any user, including administrators, views the attacker's profile, their session cookies are exfiltrated to a remote server. This vulnerability is fixed in 7.1.0. |
2026-04-07 | |
| CVE-2026-39327 | 8.8 | HIGH | CWE-89 | 0.0% p9 | 6.16 | ChurchCRM is an open-source church management system. Prior to 7.1.0, an SQL inj...ChurchCRM is an open-source church management system. Prior to 7.1.0, an SQL injection vulnerability was found in the endpoint /MemberRoleChange.php in ChurchCRM 7.0.5. Authenticated users with the role Manage Groups & Roles (ManageGroups) can inject arbitrary SQL statements through the NewRole parameter and thus extract and modify information from the database. This vulnerability is fixed in 7.1.0. |
2026-04-07 | |
| CVE-2026-39326 | 8.8 | HIGH | CWE-89 | 0.0% p9 | 6.16 | ChurchCRM is an open-source church management system. Prior to 7.1.0, an SQL inj...ChurchCRM is an open-source church management system. Prior to 7.1.0, an SQL injection vulnerability was found in the endpoint /PropertyTypeEditor.php in ChurchCRM. Authenticated users with the role isMenuOptionsEnabled can inject arbitrary SQL statements through the Name and Description parameters and thus extract and modify information from the database. This vulnerability is fixed in 7.1.0. |
2026-04-07 | |
| CVE-2026-39325 | 7.2 | HIGH | CWE-89 | 0.0% p10 | 5.04 | ChurchCRM is an open-source church management system. Prior to 7.1.0, an SQL inj...ChurchCRM is an open-source church management system. Prior to 7.1.0, an SQL injection vulnerability was found in the endpoint /SettingsUser.php in ChurchCRM 7.0.5. Authenticated administrative users can inject arbitrary SQL statements through the type array parameter via the index and thus extract and modify information from the database. This vulnerability is fixed in 7.1.0. |
2026-04-07 | |
| CVE-2026-39324 | 9.3 | CRITICAL | CWE-287 | 0.0% p11 | 6.51 | Rack::Session is a session management implementation for Rack. From 2.0.0 to bef...Rack::Session is a session management implementation for Rack. From 2.0.0 to before 2.1.2, Rack::Session::Cookie incorrectly handles decryption failures when configured with secrets:. If cookie decryption fails, the implementation falls back to a default decoder instead of rejecting the cookie. This allows an unauthenticated attacker to supply a crafted session cookie that is accepted as valid session data without knowledge of any configured secret. Because this mechanism is used to load session state, an attacker can manipulate session contents and potentially gain unauthorized access. This vulnerability is fixed in 2.1.2. |
2026-04-07 | |
| CVE-2026-39323 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-...Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2026-39326. Reason: This candidate is a duplicate of CVE-2026-39326. Notes: All CVE users should reference CVE-2026-39326 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.another CVE. |
2026-04-07 | |
| CVE-2026-39321 | 6.3 | MEDIUM | CWE-208 | 0.0% p13 | 4.41 | Parse Server is an open source backend that can be deployed to any infrastructur...Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.8.0-alpha.6 and 8.6.74, he login endpoint response time differs measurably depending on whether the submitted username or email exists in the database. When a user is not found, the server responds immediately. When a user exists but the password is wrong, a bcrypt comparison runs first, adding significant latency. This timing difference allows an unauthenticated attacker to enumerate valid usernames. This vulnerability is fixed in 9.8.0-alpha.6 and 8.6.74. |
2026-04-07 | |
| CVE-2026-39319 | 8.8 | HIGH | CWE-89 | 0.0% p9 | 6.16 | ChurchCRM is an open-source church management system. Prior to 7.1.0, a second o...ChurchCRM is an open-source church management system. Prior to 7.1.0, a second order SQL injection vulnerability was found in the endpoint /FundRaiserEditor.php in ChurchCRM. A user has to be authenticated but doesn't need any privileges. These users can inject arbitrary SQL statements through the iCurrentFundraiser PHP session parameter and thus extract and modify information from the database. This vulnerability is fixed in 7.1.0. |
2026-04-07 | |
| CVE-2026-39318 | 8.8 | HIGH | CWE-89 | 0.0% p9 | 6.16 | ChurchCRM is an open-source church management system. Versions prior to 7.1.0 ha...ChurchCRM is an open-source church management system. Versions prior to 7.1.0 have an SQL injection vulnerability in the endpoints `/GroupPropsFormRowOps.php`, `/PersonCustomFieldsRowOps.php`, and `/FamilyCustomFieldsRowOps.php`. A user has to be authenticated. For `ManageGroups` privileges have to be enabled and for the other two endpoints the attack has to be executed by an administrative user. These users can inject arbitrary SQL statements through the `Field` parameter and thus modify tables from the database. This vulnerability is fixed in 7.1.0. |
2026-04-07 | |
| CVE-2026-39317 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-...Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2026-39334. Reason: This candidate is a duplicate of CVE-2026-39334. Notes: All CVE users should reference CVE-2026-39334 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.another CVE. |
2026-04-07 | |
| CVE-2026-35576 | 8.7 | HIGH | CWE-79 | 0.0% p9 | 6.09 | ChurchCRM is an open-source church management system. Prior to 7.0.0, a stored c...ChurchCRM is an open-source church management system. Prior to 7.0.0, a stored cross-site scripting (XSS) vulnerability exists in ChurchCRM within the Person Property Management subsystem. This issue persists in versions patched for CVE-2023-38766 and allows an authenticated user to inject arbitrary JavaScript code via dynamically assigned person properties. The malicious payload is persistently stored and executed when other users view the affected person profile or access the printable view, potentially leading to session hijacking or full account compromise. This vulnerability is fixed in 7.0.0. |
2026-04-07 | |
| CVE-2026-35575 | 8.0 | HIGH | CWE-79 | 0.0% p11 | 5.60 | ChurchCRM is an open-source church management system. Prior to 6.5.3, a Stored C...ChurchCRM is an open-source church management system. Prior to 6.5.3, a Stored Cross-Site Scripting (Stored XSS) vulnerability in the admin panel’s group-creation feature allows any user with group-creation privileges to inject malicious JavaScript that executes automatically when an administrator views the page. This enables attackers to steal the administrator’s session cookies, potentially leading to full administrative account takeover. This vulnerability is fixed in 6.5.3. |
2026-04-07 | |
| CVE-2026-35573 | 9.1 | CRITICAL | CWE-22 | 0.3% p56 | 6.38 | ChurchCRM is an open-source church management system. Prior to 6.5.3, a path tra...ChurchCRM is an open-source church management system. Prior to 6.5.3, a path traversal vulnerability in ChurchCRM's backup restore functionality allows authenticated administrators to upload arbitrary files and achieve remote code execution by overwriting Apache .htaccess configuration files. The vulnerability exists in src/ChurchCRM/Backup/RestoreJob.php. The $rawUploadedFile['name'] parameter is user-controlled and allows uploading files with arbitrary names to /var/www/html/tmp_attach/ChurchCRMBackups/. This vulnerability is fixed in 6.5.3. |
2026-04-07 | |
| CVE-2026-35572 | 7.0 | HIGH | CWE-918 | 0.0% p13 | 4.90 | ChurchCRM is an open-source church management system. Prior to 6.5.3, it is poss...ChurchCRM is an open-source church management system. Prior to 6.5.3, it is possible to trigger server-side HTTP/HTTPS requests to arbitrary hosts (SSRF) by supplying a crafted URL in the Referer request header. The server subsequently makes an outbound request to the attacker-controlled domain, confirmed via OAST. This vulnerability is fixed in 6.5.3. |
2026-04-07 | |
| CVE-2026-31272 | 9.8 | CRITICAL | CWE-284 | 0.1% p17 | 6.86 | MRCMS 3.1.2 contains an access control vulnerability. The save() method in src/m...MRCMS 3.1.2 contains an access control vulnerability. The save() method in src/main/java/org/marker/mushroom/controller/UserController.java lacks proper authorization validation, enabling direct addition of super administrator accounts without authentication. |
2026-04-07 | |
| CVE-2026-31271 | 9.8 | CRITICAL | CWE-288 | 0.1% p32 | 6.86 | megagao production_ssm v1.0 contains an authorization bypass vulnerability in th...megagao production_ssm v1.0 contains an authorization bypass vulnerability in the user addition functionality. The insert() method in UserController.java lacks authentication checks, allowing unauthenticated attackers to create super administrator accounts by directly accessing the /user/insert endpoint. This leads to complete system compromise. |
2026-04-07 | |
| CVE-2026-24175 | 7.5 | HIGH | CWE-248 | 0.0% p15 | 5.25 | NVIDIA Triton Inference Server contains a vulnerability where an attacker could ...NVIDIA Triton Inference Server contains a vulnerability where an attacker could cause a server crash by sending a malformed request header to the server. A successful exploit of this vulnerability might lead to denial of service. |
2026-04-07 | |
| CVE-2026-24174 | 7.5 | HIGH | CWE-681 | 0.0% p15 | 5.25 | NVIDIA Triton Inference Server contains a vulnerability where an attacker could ...NVIDIA Triton Inference Server contains a vulnerability where an attacker could cause a server crash by sending a malformed request to the server. A successful exploit of this vulnerability might lead to denial of service. |
2026-04-07 | |
| CVE-2026-24173 | 7.5 | HIGH | CWE-190 | 0.0% p15 | 5.25 | NVIDIA Triton Inference Server contains a vulnerability where an attacker could ...NVIDIA Triton Inference Server contains a vulnerability where an attacker could cause a server crash by sending a malformed request to the server. A successful exploit of this vulnerability might lead to denial of service. |
2026-04-07 | |
| CVE-2026-24156 | 7.3 | HIGH | CWE-502 | 0.1% p16 | 5.11 | NVIDIA DALI contains a vulnerability where an attacker could cause a deserializa...NVIDIA DALI contains a vulnerability where an attacker could cause a deserialization of untrusted data. A successful exploit of this vulnerability might lead to arbitrary code execution. |
2026-04-07 | |
| CVE-2026-24147 | 4.8 | MEDIUM | CWE-22 | 0.1% p20 | 3.36 | NVIDIA Triton Inference Server contains a vulnerability in triton server where a...NVIDIA Triton Inference Server contains a vulnerability in triton server where an attacker may cause an information disclosure by uploading a model configuration. A successful exploit of this vulnerability may lead to information disclosure or denial of service. |
2026-04-07 | |
| CVE-2026-24146 | 7.5 | HIGH | CWE-789 | 0.0% p15 | 5.25 | NVIDIA Triton Inference Server contains a vulnerability where insufficient input...NVIDIA Triton Inference Server contains a vulnerability where insufficient input validation and a large number of outputs could cause a server crash. A successful exploit of this vulnerability might lead to denial of service. |
2026-04-07 | |
| CVE-2026-22682 | 8.4 | HIGH | CWE-863 | 0.0% p1 | 5.88 | OpenHarness prior to commit 166fcfe contains an improper access control vulnerab...OpenHarness prior to commit 166fcfe contains an improper access control vulnerability in built-in file tools due to inconsistent parameter handling in permission enforcement, allowing attackers who can influence agent tool execution to read arbitrary local files outside the intended repository scope. Attackers can exploit the path parameter not being passed to the PermissionChecker in read_file, write_file, edit_file, and notebook_edit tools to bypass deny rules and access sensitive files such as configuration files, credentials, and SSH material, or create and overwrite files in restricted host paths in full_auto mode. |
2026-04-07 | |
| CVE-2026-22680 | 6.9 | MEDIUM | CWE-862 | 0.1% p23 | 4.83 | OpenViking versions prior to 0.3.3 contain a missing authorization vulnerability...OpenViking versions prior to 0.3.3 contain a missing authorization vulnerability in the task polling endpoints that allows unauthorized attackers to enumerate or retrieve background task metadata created by other users. Attackers can access the /api/v1/tasks and /api/v1/tasks/{task_id} routes without authentication to expose task type, task status, resource identifiers, archive URIs, result payloads, and error information, potentially causing cross-tenant interference in multi-tenant deployments. |
2026-04-07 | |
| CVE-2026-4631 | 9.8 | CRITICAL | CWE-78 | 0.1% p28 | 6.86 | Cockpit's remote login feature passes user-supplied hostnames and usernames from...Cockpit's remote login feature passes user-supplied hostnames and usernames from the web interface to the SSH client without validation or sanitization. An attacker with network access to the Cockpit web service can craft a single HTTP request to the login endpoint that injects malicious SSH options or shell commands, achieving code execution on the Cockpit host without valid credentials. The injection occurs during the authentication flow before any credential verification takes place, meaning no login is required to exploit the vulnerability. |
2026-04-07 | |
| CVE-2026-39384 | 7.6 | HIGH | CWE-639 | 0.0% p11 | 5.32 | FreeScout is a free help desk and shared inbox built with PHP's Laravel framewor...FreeScout is a free help desk and shared inbox built with PHP's Laravel framework. Prior to 1.8.212, FreeScout does not take the limit_user_customer_visibility parameter into account when merging customers. This vulnerability is fixed in 1.8.212. |
2026-04-07 | |
| CVE-2026-39316 | 4.0 | MEDIUM | CWE-416 | 0.0% p5 | 2.80 | OpenPrinting CUPS is an open source printing system for Linux and other Unix-lik...OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.16 and prior, a use-after-free vulnerability exists in the CUPS scheduler (cupsd) when temporary printers are automatically deleted. cupsdDeleteTemporaryPrinters() in scheduler/printers.c calls cupsdDeletePrinter() without first expiring subscriptions that reference the printer, leaving cupsd_subscription_t.dest as a dangling pointer to freed heap memory. The dangling pointer is subsequently dereferenced at multiple code sites, causing a crash (denial of service) of the cupsd daemon. With heap grooming, this can be leveraged for code execution. |
2026-04-07 | |
| CVE-2026-39314 | 4.0 | MEDIUM | CWE-191 | 0.0% p4 | 2.80 | OpenPrinting CUPS is an open source printing system for Linux and other Unix-lik...OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.16 and prior, an integer underflow vulnerability in _ppdCreateFromIPP() (cups/ppd-cache.c) allows any unprivileged local user to crash the cupsd root process by supplying a negative job-password-supported IPP attribute. The bounds check only caps the upper bound, so a negative value passes validation, is cast to size_t (wrapping to ~2^64), and is used as the length argument to memset() on a 33-byte stack buffer. This causes an immediate SIGSEGV in the cupsd root process. Combined with systemd's Restart=on-failure, an attacker can repeat the crash for sustained denial of service. |
2026-04-07 | |
| CVE-2026-39312 | 7.5 | HIGH | CWE-789 | 0.2% p48 | 5.26 | SoftEtherVPN is a an open-source cross-platform multi-protocol VPN Program. In 5...SoftEtherVPN is a an open-source cross-platform multi-protocol VPN Program. In 5.2.5188 and earlier, a pre-authentication denial-of-service vulnerability exists in SoftEther VPN Developer Edition 5.2.5188 (and likely earlier versions of Developer Edition). An unauthenticated remote attacker can crash the vpnserver process by sending a single malformed EAP-TLS packet over raw L2TP (UDP/1701), terminating all active VPN sessions. |
2026-04-07 | |
| CVE-2026-39308 | 7.1 | HIGH | CWE-22 | 0.1% p19 | 4.97 | PraisonAI is a multi-agent teams system. Prior to 1.5.113, PraisonAI's recipe re...PraisonAI is a multi-agent teams system. Prior to 1.5.113, PraisonAI's recipe registry publish endpoint writes uploaded recipe bundles to a filesystem path derived from the bundle's internal manifest.json before it verifies that the manifest name and version match the HTTP route. A malicious publisher can place ../ traversal sequences in the bundle manifest and cause the registry server to create files outside the configured registry root even though the request is ultimately rejected with HTTP 400. This is an arbitrary file write / path traversal issue on the registry host. It affects deployments that expose the recipe registry publish flow. If the registry is intentionally run without a token, any network client that can reach the service can trigger it. If a token is configured, any user with publish access can still exploit it. This vulnerability is fixed in 1.5.113. |
2026-04-07 | |
| CVE-2026-39307 | 8.1 | HIGH | CWE-22 | 0.0% p14 | 5.67 | PraisonAI is a multi-agent teams system. Prior to 1.5.113, The PraisonAI templat...PraisonAI is a multi-agent teams system. Prior to 1.5.113, The PraisonAI templates installation feature is vulnerable to a "Zip Slip" Arbitrary File Write attack. When downloading and extracting template archives from external sources (e.g., GitHub), the application uses Python's zipfile.extractall() without verifying if the files within the archive resolve outside of the intended extraction directory. This vulnerability is fixed in 1.5.113. |
2026-04-07 | |
| CVE-2026-39306 | 7.3 | HIGH | CWE-22 | 0.0% p13 | 5.11 | PraisonAI is a multi-agent teams system. Prior to 1.5.113, PraisonAI's recipe re...PraisonAI is a multi-agent teams system. Prior to 1.5.113, PraisonAI's recipe registry pull flow extracts attacker-controlled .praison tar archives with tar.extractall() and does not validate archive member paths before extraction. A malicious publisher can upload a recipe bundle that contains ../ traversal entries and any user who later pulls that recipe will write files outside the output directory they selected. This is a path traversal / arbitrary file write vulnerability on the client side of the recipe registry workflow. It affects both the local registry pull path and the HTTP registry pull path. The checksum verification does not prevent exploitation because the malicious traversal payload is part of the signed bundle itself. This vulnerability is fixed in 1.5.113. |
2026-04-07 | |
| CVE-2026-39305 | 9.0 | CRITICAL | CWE-22 | 0.0% p6 | 6.30 | PraisonAI is a multi-agent teams system. Prior to 1.5.113, the Action Orchestrat...PraisonAI is a multi-agent teams system. Prior to 1.5.113, the Action Orchestrator feature contains a Path Traversal vulnerability that allows an attacker (or compromised agent) to write to arbitrary files outside of the configured workspace directory. By supplying relative path segments (../) in the target path, malicious actions can overwrite sensitive system files or drop executable payloads on the host. This vulnerability is fixed in 1.5.113. |
2026-04-07 | |
| CVE-2026-35615 | 9.2 | CRITICAL | CWE-22 | 0.1% p24 | 6.44 | PraisonAI is a multi-agent teams system. Prior to 1.5.113, _validate_path() call...PraisonAI is a multi-agent teams system. Prior to 1.5.113, _validate_path() calls os.path.normpath() first, which collapses .. sequences, then checks for '..' in normalized. Since .. is already collapsed, the check always passes. This makes the check completely useless and allows trivial path traversal to any file on the system. This vulnerability is fixed in 1.5.113. |
2026-04-07 | |
| CVE-2026-35614 | 9.3 | CRITICAL | CWE-89 | 0.0% p11 | 6.51 | Frappe is a full-stack web application framework. Prior to 16.14.0 and 15.104.0,...Frappe is a full-stack web application framework. Prior to 16.14.0 and 15.104.0, Frappe has a SQL injection in bulk_update. This vulnerability is fixed in 16.14.0 and 15.104.0. |
2026-04-07 | |
| CVE-2026-35613 | 5.1 | MEDIUM | CWE-22 | 0.0% p4 | 3.57 | coursevault-preview is a utility for previewing course material files from a con...coursevault-preview is a utility for previewing course material files from a configured directory. coursevault-preview versions prior to 0.1.1 contain a path traversal vulnerability in the resolveSafe utility. The boundary check used String.prototype.startsWith(baseDir) on a normalized path, which does not enforce a directory boundary. An attacker who controls the relativePath argument to affected CoursevaultPreview methods may be able to read files outside the configured baseDir when a sibling directory exists whose name shares the same string prefix. This vulnerability is fixed in 0.1.1. |
2026-04-07 | |
| CVE-2026-35611 | 7.5 | HIGH | CWE-1333 | 0.1% p16 | 5.25 | Addressable is an alternative implementation to the URI implementation that is p...Addressable is an alternative implementation to the URI implementation that is part of Ruby's standard library. From 2.3.0 to before 2.9.0, within the URI template implementation in Addressable, two classes of URI template generate regular expressions vulnerable to catastrophic backtracking. Templates using the * (explode) modifier with any expansion operator (e.g., {foo*}, {+var*}, {#var*}, {/var*}, {.var*}, {;var*}, {?var*}, {&var*}) generate patterns with nested unbounded quantifiers that are O(2^n) when matched against a maliciously crafted URI. Templates using multiple variables with the + or # operators (e.g., {+v1,v2,v3}) generate patterns with O(n^k) complexity due to the comma separator being within the matched character class, causing ambiguous backtracking across k variables. When matched against a maliciously crafted URI, this can result in catastrophic backtracking and uncontrolled resource consumption, leading to denial of service. This vulnerability is fixed in 2.9.0. |
2026-04-07 | |
| CVE-2026-35610 | 8.8 | HIGH | CWE-285 | 0.0% p13 | 6.16 | PolarLearn is a free and open-source learning program. In 0-PRERELEASE-14 and ea...PolarLearn is a free and open-source learning program. In 0-PRERELEASE-14 and earlier, setCustomPassword(userId, password) and deleteUser(userId) in the account-management module used an inverted admin check. Because of the inverted condition, authenticated non-admin users were allowed to execute both actions, while real admins were rejected. This is a direct privilege-escalation issue in the application. |
2026-04-07 | |
| CVE-2026-35608 | 5.3 | MEDIUM | CWE-79 | 0.1% p19 | 3.71 | QuickDrop is an easy-to-use file sharing application. Prior to 1.5.3, a stored X...QuickDrop is an easy-to-use file sharing application. Prior to 1.5.3, a stored XSS vulnerability exists in the file preview endpoint. The application allows SVG files to be uploaded via the /api/file/upload-chunk endpoint. An attacker can upload a specially crafted SVG file containing a JavaScript payload. When any user views the file preview, the script executes in the context of the application's domain. This vulnerability is fixed in 1.5.3. |
2026-04-07 | |
| CVE-2026-35607 | 8.1 | HIGH | CWE-269 | 0.1% p25 | 5.67 | File Browser is a file managing interface for uploading, deleting, previewing, r...File Browser is a file managing interface for uploading, deleting, previewing, renaming, and editing files within a specified directory. Prior to 2.63.1, the fix in commit b6a4fb1 ("self-registered users don't get execute perms") stripped Execute permission and Commands from users created via the signup handler. The same fix was not applied to the proxy auth handler. Users auto-created on first successful proxy-auth login are granted execution capabilities from global defaults, even though the signup path was explicitly changed to prevent execution rights from being inherited by automatically provisioned accounts. This vulnerability is fixed in 2.63.1. |
2026-04-07 | |
| CVE-2026-35606 | 5.3 | MEDIUM | CWE-862 | 0.0% p13 | 3.71 | File Browser is a file managing interface for uploading, deleting, previewing, r...File Browser is a file managing interface for uploading, deleting, previewing, renaming, and editing files within a specified directory. Prior to 2.63.1, the resourceGetHandler in http/resource.go returns full text file content without checking the Perm.Download permission flag. All three other content-serving endpoints (/api/raw, /api/preview, /api/subtitle) correctly verify this permission before serving content. A user with download: false can read any text file within their scope through two bypass paths. This vulnerability is fixed in 2.63.1. |
2026-04-07 | |
| CVE-2026-35605 | 6.3 | MEDIUM | CWE-22 | 0.1% p20 | 4.41 | File Browser is a file managing interface for uploading, deleting, previewing, r...File Browser is a file managing interface for uploading, deleting, previewing, renaming, and editing files within a specified directory. Prior to 2.63.1, the Matches() function in rules/rules.go uses strings.HasPrefix() without a trailing directory separator when matching paths against access rules. A rule for /uploads also matches /uploads_backup/, granting or denying access to unintended directories. This vulnerability is fixed in 2.63.1. |
2026-04-07 | |
| CVE-2026-35604 | 8.2 | HIGH | CWE-863 | 0.1% p22 | 5.74 | File Browser is a file managing interface for uploading, deleting, previewing, r...File Browser is a file managing interface for uploading, deleting, previewing, renaming, and editing files within a specified directory. Prior to 2.63.1, when an admin revokes a user's Share and Download permissions, existing share links created by that user remain fully accessible to unauthenticated users. The public share download handler does not re-check the share owner's current permissions. This vulnerability is fixed in 2.63.1. |
2026-04-07 | |
| CVE-2026-35592 | 5.3 | MEDIUM | CWE-22 | 0.0% p8 | 3.71 | pyLoad is a free and open-source download manager written in Python. Prior to 0....pyLoad is a free and open-source download manager written in Python. Prior to 0.5.0b3.dev97, the _safe_extractall() function in src/pyload/plugins/extractors/UnTar.py uses os.path.commonprefix() for its path traversal check, which performs character-level string comparison rather than path-level comparison. This allows a specially crafted tar archive to write files outside the intended extraction directory. The correct function os.path.commonpath() was added to the codebase in the CVE-2026-32808 fix (commit 5f4f0fa) but was never applied to _safe_extractall(), making this an incomplete fix. This vulnerability is fixed in 0.5.0b3.dev97. |
2026-04-07 | |
| CVE-2026-35586 | 6.8 | MEDIUM | CWE-863 | 0.0% p4 | 4.76 | pyLoad is a free and open-source download manager written in Python. Prior to 0....pyLoad is a free and open-source download manager written in Python. Prior to 0.5.0b3.dev97, the ADMIN_ONLY_CORE_OPTIONS authorization set in set_config_value() uses incorrect option names ssl_cert and ssl_key, while the actual configuration option names are ssl_certfile and ssl_keyfile. This name mismatch causes the admin-only check to always evaluate to False, allowing any user with SETTINGS permission to overwrite the SSL certificate and key file paths. Additionally, the ssl_certchain option was never added to the admin-only set at all. This vulnerability is fixed in 0.5.0b3.dev97. |
2026-04-07 | |
| CVE-2026-35585 | 7.5 | HIGH | CWE-78 | 1.1% p77 | 5.28 | File Browser is a file managing interface for uploading, deleting, previewing, r...File Browser is a file managing interface for uploading, deleting, previewing, renaming, and editing files within a specified directory. From 2.0.0 through 2.63.1, the hook system in File Browser — which executes administrator-defined shell commands on file events such as upload, rename, and delete — is vulnerable to OS command injection. Variable substitution for values like $FILE and $USERNAME is performed via os.Expand without sanitization. An attacker with file write permission can craft a malicious filename containing shell metacharacters, causing the server to execute arbitrary OS commands when the hook fires. This results in Remote Code Execution (RCE). This feature has been disabled by default for all installations from v2.33.8 onwards, including for existent installations. |
2026-04-07 | |
| CVE-2026-35584 | 6.9 | MEDIUM | CWE-306 | 0.1% p21 | 4.83 | FreeScout is a free help desk and shared inbox built with PHP's Laravel framewor...FreeScout is a free help desk and shared inbox built with PHP's Laravel framework. Prior to 1.8.212, the endpoint GET /thread/read/{conversation_id}/{thread_id} does not require authentication and does not validate whether the given thread_id belongs to the given conversation_id. This allows any unauthenticated attacker to mark any thread as read by passing arbitrary IDs, enumerate valid thread IDs via HTTP response codes (200 vs 404), and manipulate opened_at timestamps across conversations (IDOR). This vulnerability is fixed in 1.8.212. |
2026-04-07 | |
| CVE-2026-35583 | 5.3 | MEDIUM | CWE-22 | 0.1% p15 | 3.71 | Emissary is a P2P based data-driven workflow engine. Prior to 8.39.0, the config...Emissary is a P2P based data-driven workflow engine. Prior to 8.39.0, the configuration API endpoint (/api/configuration/{name}) validated configuration names using a blacklist approach that checked for \, /, .., and trailing .. This could potentially be bypassed using URL-encoded variants, double-encoding, or Unicode normalization to achieve path traversal and read configuration files outside the intended directory. This vulnerability is fixed in 8.39.0. |
2026-04-07 | |
| CVE-2026-35581 | 7.2 | HIGH | CWE-78 | 0.1% p23 | 5.04 | Emissary is a P2P based data-driven workflow engine. Prior to 8.39.0, the Execut...Emissary is a P2P based data-driven workflow engine. Prior to 8.39.0, the Executrix utility class constructed shell commands by concatenating configuration-derived values — including the PLACE_NAME parameter — with insufficient sanitization. Only spaces were replaced with underscores, allowing shell metacharacters (;, |, $, `, (, ), etc.) to pass through into /bin/sh -c command execution. This vulnerability is fixed in 8.39.0. |
2026-04-07 | |
| CVE-2026-35580 | 9.1 | CRITICAL | CWE-77 | 0.0% p5 | 6.37 | Emissary is a P2P based data-driven workflow engine. Prior to 8.39.0, GitHub Act...Emissary is a P2P based data-driven workflow engine. Prior to 8.39.0, GitHub Actions workflow files contained shell injection points where user-controlled workflow_dispatch inputs were interpolated directly into shell commands via ${{ }} expression syntax. An attacker with repository write access could inject arbitrary shell commands, leading to repository poisoning and supply chain compromise affecting all downstream users. This vulnerability is fixed in 8.39.0. |
2026-04-07 | |
| CVE-2026-35578 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: This CVE is a duplicate of another CVE.** REJECT ** DO NOT USE...Rejected reason: This CVE is a duplicate of another CVE.** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2026-39940. Reason: This candidate is a reservation duplicate of CVE-2026-39940. Notes: All CVE users should reference CVE-2026-39940 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage. |
2026-04-07 | |
| CVE-2026-35574 | 7.3 | HIGH | CWE-79 | 0.0% p9 | 5.11 | ChurchCRM is an open-source church management system. Prior to 6.5.3, a stored C...ChurchCRM is an open-source church management system. Prior to 6.5.3, a stored Cross-Site Scripting (XSS) vulnerability in ChurchCRM's Note Editor allows authenticated users with note-adding permissions to execute arbitrary JavaScript code in the context of other users' browsers, including administrators. This can lead to session hijacking, privilege escalation, and unauthorized access to sensitive church member data. This vulnerability is fixed in 6.5.3. |
2026-04-07 | |
| CVE-2026-35523 | 7.5 | HIGH | CWE-306 | 0.1% p31 | 5.25 | Strawberry GraphQL is a library for creating GraphQL APIs. Strawberry up until v...Strawberry GraphQL is a library for creating GraphQL APIs. Strawberry up until version 0.312.3 is vulnerable to an authentication bypass on WebSocket subscription endpoints. The legacy graphql-ws subprotocol handler does not verify that a connection_init handshake has been completed before processing start (subscription) messages. This allows a remote attacker to skip the on_ws_connect authentication hook entirely by connecting with the graphql-ws subprotocol and sending a start message directly, without ever sending connection_init. This vulnerability is fixed in 0.312.3. |
2026-04-07 | |
| CVE-2026-23696 | 9.4 | CRITICAL | CWE-89 | 0.1% p20 | 6.58 | Windmill CE and EE versions 1.276.0 through 1.603.2 contain an SQL injection vul...Windmill CE and EE versions 1.276.0 through 1.603.2 contain an SQL injection vulnerability in the folder ownership management functionality that allows authenticated attackers to inject SQL through the owner parameter. An attacker can use the injection to read sensitive data such as the JWT signing secret and administrative user identifiers, forge an administrative token, and then execute arbitrary code via the workflow execution endpoints. |
2026-04-07 | |
| CVE-2026-22683 | 8.7 | HIGH | CWE-862 | 0.3% p51 | 6.10 | Windmill versions 1.56.0 through 1.614.0 contain a missing authorization vulnera...Windmill versions 1.56.0 through 1.614.0 contain a missing authorization vulnerability that allows users with the Operator role to perform prohibited entity creation and modification actions via the backend API. Although Operators are documented and priced as unable to create or modify entities, the API does not enforce the Operator restriction on workspace endpoints, allowing an Operator to create and update scripts, flows, apps, and raw_apps. Since Operators can also execute scripts via the jobs API, this allows direct privilege escalation to remote code execution within the Windmill deployment. This vulnerability has existed since the introduction of the Operator role in version 1.56.0. |
2026-04-07 | |
| CVE-2025-70844 | 6.1 | MEDIUM | CWE-94 | 0.0% p11 | 4.27 | yaffa v2.0.0 is vulnerable to Cross Site Scripting (XSS). An attacker can inject...yaffa v2.0.0 is vulnerable to Cross Site Scripting (XSS). An attacker can inject malicious JavaScript into the "Add Account Group" function on the account-group page, allowing execution of arbitrary script in the context of users who view the affected page. |
2026-04-07 | |
| CVE-2025-14944 | 5.3 | MEDIUM | CWE-862 | 0.0% p14 | 3.71 | The Backup Migration plugin for WordPress is vulnerable to Missing Authorization...The Backup Migration plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 2.0.0. This is due to a missing capability check on the 'initializeOfflineAjax' function and lack of proper nonce verification. The endpoint only validates against hardcoded tokens which are publicly exposed in the plugin's JavaScript. This makes it possible for unauthenticated attackers to trigger the backup upload queue processing, potentially causing unexpected backup transfers to configured cloud storage targets and resource exhaustion. |
2026-04-07 | |
| CVE-2025-14821 | 7.8 | HIGH | CWE-427 | 0.0% p1 | 5.46 | A flaw was found in libssh. This vulnerability allows local man-in-the-middle at...A flaw was found in libssh. This vulnerability allows local man-in-the-middle attacks, security downgrades of SSH (Secure Shell) connections, and manipulation of trusted host information, posing a significant risk to the confidentiality, integrity, and availability of SSH communications via an insecure default configuration on Windows systems where the library automatically loads configuration files from the C:\etc directory, which can be created and modified by unprivileged local users. |
2026-04-07 | |
| CVE-2024-36058 | 9.8 | CRITICAL | CWE-89 | 0.1% p29 | 6.86 | The Send Basket functionality in Koha Library before 23.05.10 is susceptible to ...The Send Basket functionality in Koha Library before 23.05.10 is susceptible to Time-Based SQL Injection because it fails to sanitize the POST parameter bib_list in /cgi-bin/koha/opac-sendbasket.pl, allowing library users to read arbitrary data from the database. |
2026-04-07 | |
| CVE-2026-5745 | 5.5 | MEDIUM | CWE-476 | 0.0% p4 | 3.85 | A flaw was found in libarchive. A NULL pointer dereference vulnerability exists ...A flaw was found in libarchive. A NULL pointer dereference vulnerability exists in the ACL parsing logic, specifically within the archive_acl_from_text_nl() function. When processing a malformed ACL string (such as a bare "d" or "default" tag without subsequent fields), the function fails to perform adequate validation before advancing the pointer. An attacker can exploit this by providing a maliciously crafted archive, causing an application utilizing the libarchive API (such as bsdtar) to crash, resulting in a Denial of Service (DoS). |
2026-04-07 | |
| CVE-2026-5359 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This can...Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage. |
2026-04-07 | |
| CVE-2026-4931 | 6.8 | MEDIUM | CWE-681 | 0.0% p12 | 4.76 | Smart contract Marginal v1 performs unsafe downcast, allowing attackers to settl...Smart contract Marginal v1 performs unsafe downcast, allowing attackers to settle a large debt position for a negligible asset cost. |
2026-04-07 | |
| CVE-2026-35571 | 4.8 | MEDIUM | CWE-79 | 0.0% p8 | 3.36 | Emissary is a P2P based data-driven workflow engine. Prior to 8.39.0, Mustache n...Emissary is a P2P based data-driven workflow engine. Prior to 8.39.0, Mustache navigation templates interpolated configuration-controlled link values directly into href attributes without URL scheme validation. An administrator who could modify the navItems configuration could inject javascript: URIs, enabling stored cross-site scripting (XSS) against other authenticated users viewing the Emissary web interface. This vulnerability is fixed in 8.39.0. |
2026-04-07 | |
| CVE-2026-35567 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-...Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2026-39327. Reason: This candidate is a duplicate of CVE-2026-39327. Notes: All CVE users should reference CVE-2026-39327 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.another CVE. |
2026-04-07 | |
| CVE-2026-35566 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-...Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2026-39319. Reason: This candidate is a duplicate of CVE-2026-39319. Notes: All CVE users should reference CVE-2026-39319 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.another CVE. |
2026-04-07 | |
| CVE-2026-35534 | 7.6 | HIGH | CWE-79 | 0.0% p9 | 5.32 | ChurchCRM is an open-source church management system. Prior to 7.1.0, a stored c...ChurchCRM is an open-source church management system. Prior to 7.1.0, a stored cross-site scripting vulnerability exists in PersonView.php due to incorrect use of sanitizeText() as an output sanitizer for HTML attribute context. The function only strips HTML tags, it does not escape quote characters allowing an attacker to break out of the href attribute and inject arbitrary JavaScript event handlers. Any authenticated user with the EditRecords role can store the payload in a person's Facebook field. The XSS fires against any user who views that person's profile page, including administrators, enabling session hijacking and full account takeover. This vulnerability is fixed in 7.1.0. |
2026-04-07 | |
| CVE-2026-35526 | 7.5 | HIGH | CWE-770 | 0.1% p17 | 5.25 | Strawberry GraphQL is a library for creating GraphQL APIs. Prior to 0.312.3, Str...Strawberry GraphQL is a library for creating GraphQL APIs. Prior to 0.312.3, Strawberry GraphQL's WebSocket subscription handlers for both the graphql-transport-ws and legacy graphql-ws protocols allocate an asyncio.Task and associated Operation object for every incoming subscribe message without enforcing any limit on the number of active subscriptions per connection. An unauthenticated attacker can open a single WebSocket connection, send connection_init, and then flood subscribe messages with unique IDs. Each message unconditionally spawns a new asyncio.Task and async generator, causing linear memory growth and event loop saturation. This leads to server degradation or an OOM crash. This vulnerability is fixed in 0.312.3. |
2026-04-07 | |
| CVE-2026-35521 | 8.8 | HIGH | CWE-78 | 0.3% p52 | 6.17 | FTLDNS (pihole-FTL) provides an interactive API and also generates statistics fo...FTLDNS (pihole-FTL) provides an interactive API and also generates statistics for Pi-hole's Web interface. From 6.0 to before 6.6, the Pi-hole FTL engine contains a Remote Code Execution (RCE) vulnerability in the DHCP hosts configuration parameter (dhcp.hosts). This vulnerability allows an authenticated attacker to inject arbitrary dnsmasq configuration directives through newline characters, ultimately achieving command execution on the underlying system. This vulnerability is fixed in 6.6. |
2026-04-07 | |
| CVE-2026-35520 | 8.8 | HIGH | CWE-78 | 0.2% p45 | 6.17 | FTLDNS (pihole-FTL) provides an interactive API and also generates statistics fo...FTLDNS (pihole-FTL) provides an interactive API and also generates statistics for Pi-hole's Web interface. From 6.0 to before 6.6, the Pi-hole FTL engine contains a Remote Code Execution (RCE) vulnerability in the DHCP lease time configuration parameter (dhcp.leaseTime). This vulnerability allows an authenticated attacker to inject arbitrary dnsmasq configuration directives through newline characters, ultimately achieving command execution on the underlying system. This vulnerability is fixed in 6.6. |
2026-04-07 | |
| CVE-2026-35519 | 8.8 | HIGH | CWE-78 | 0.2% p45 | 6.17 | FTLDNS (pihole-FTL) provides an interactive API and also generates statistics fo...FTLDNS (pihole-FTL) provides an interactive API and also generates statistics for Pi-hole's Web interface. From 6.0 to before 6.6, the Pi-hole FTL engine contains a Remote Code Execution (RCE) vulnerability in the DNS host record configuration parameter (dns.hostRecord). This vulnerability allows an authenticated attacker to inject arbitrary dnsmasq configuration directives through newline characters, ultimately achieving command execution on the underlying system. This vulnerability is fixed in 6.6. |
2026-04-07 | |
| CVE-2026-35518 | 8.8 | HIGH | CWE-78 | 0.2% p45 | 6.17 | FTLDNS (pihole-FTL) provides an interactive API and also generates statistics fo...FTLDNS (pihole-FTL) provides an interactive API and also generates statistics for Pi-hole's Web interface. From 6.0 to before 6.6, the Pi-hole FTL engine contains a Remote Code Execution (RCE) vulnerability in the DNS CNAME records configuration parameter (dns.cnameRecords). This vulnerability allows an authenticated attacker to inject arbitrary dnsmasq configuration directives through newline characters, ultimately achieving command execution on the underlying system. This vulnerability is fixed in 6.6. |
2026-04-07 | |
| CVE-2026-35517 | 8.8 | HIGH | CWE-78 | 0.2% p45 | 6.17 | FTLDNS (pihole-FTL) provides an interactive API and also generates statistics fo...FTLDNS (pihole-FTL) provides an interactive API and also generates statistics for Pi-hole's Web interface. From 6.0 to before 6.6, the Pi-hole FTL engine contains a Remote Code Execution (RCE) vulnerability in the upstream DNS servers configuration parameter (dns.upstreams). This vulnerability allows an authenticated attacker to inject arbitrary dnsmasq configuration directives through newline characters, ultimately achieving command execution on the underlying system. This vulnerability is fixed in 6.6. |
2026-04-07 | |
| CVE-2026-35516 | 5.0 | MEDIUM | CWE-918 | 0.0% p8 | 3.50 | LinkAce is a self-hosted archive to collect website links. Prior to 2.5.4, LinkR...LinkAce is a self-hosted archive to collect website links. Prior to 2.5.4, LinkRepository::update and CheckLinksCommand::checkLink do not check for private IPs. An authenticated user can read responses from internal services (AWS IMDSv1, cloud metadata, internal APIs) by creating a link with a public URL and then updating it to a private IP. The links:check cron job makes the request server-side without IP filtering. This can expose cloud credentials, internal service data, and network topology. This vulnerability is fixed in 2.5.4. |
2026-04-07 | |
| CVE-2026-35515 | 6.3 | MEDIUM | CWE-74 | 0.0% p5 | 4.41 | Nest is a framework for building scalable Node.js server-side applications. Prio...Nest is a framework for building scalable Node.js server-side applications. Prior to 11.1.18, SseStream._transform() interpolates message.type and message.id directly into Server-Sent Events text protocol output without sanitizing newline characters (\r, \n). Since the SSE protocol treats both \r and \n as field delimiters and \n\n as event boundaries, an attacker who can influence these fields through upstream data sources can inject arbitrary SSE events, spoof event types, and corrupt reconnection state. This vulnerability is fixed in 11.1.18. |
2026-04-07 | |
| CVE-2026-35492 | 6.5 | MEDIUM | CWE-22 | 0.0% p3 | 4.55 | Kedro-Datasets is a Kendo plugin providing data connectors. Prior to 9.3.0, Part...Kedro-Datasets is a Kendo plugin providing data connectors. Prior to 9.3.0, PartitionedDataset in kedro-datasets was vulnerable to path traversal. Partition IDs were concatenated directly with the dataset base path without validation. An attacker or malicious input containing .. components in a partition ID could cause files to be written outside the configured dataset directory, potentially overwriting arbitrary files on the filesystem. Users of PartitionedDataset with any storage backend (local filesystem, S3, GCS, etc.) are affected. This vulnerability is fixed in 9.3.0. |
2026-04-07 | |
| CVE-2026-35491 | 6.1 | MEDIUM | CWE-863 | 0.0% p2 | 4.27 | FTLDNS (pihole-FTL) provides an interactive API and also generates statistics fo...FTLDNS (pihole-FTL) provides an interactive API and also generates statistics for Pi-hole's Web interface. From 6.0 to before 6.6, Pi-hole FTL supports a CLI password feature (webserver.api.cli_pw) that creates “CLI” API sessions intended to be read-only for configuration changes. While /api/config correctly blocks CLI sessions from mutating configuration, /api/teleporter allowed Teleporter imports for CLI sessions, enabling a CLI-scoped session to overwrite configuration via a Teleporter archive (authorization bypass). This vulnerability is fixed in 6.6. |
2026-04-07 | |
| CVE-2026-35490 | 9.8 | CRITICAL | CWE-863 | 0.0% p5 | 6.86 | changedetection.io is a free open source web page change detection tool. Prior t...changedetection.io is a free open source web page change detection tool. Prior to 0.54.8, the @login_optionally_required decorator is placed before (outer to) @blueprint.route() instead of after it. In Flask, @route() must be the outermost decorator because it registers the function it receives. When the order is reversed, @route() registers the original undecorated function, and the auth wrapper is never in the call chain. This silently disables authentication on these routes. This vulnerability is fixed in 0.54.8. |
2026-04-07 | |
| CVE-2026-35489 | 7.3 | HIGH | CWE-639 | 0.1% p33 | 5.11 | Tandoor Recipes is an application for managing recipes, planning meals, and buil...Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. Prior to 2.6.4, the POST /api/food/{id}/shopping/ endpoint reads amount and unit directly from request.data and passes them without validation to ShoppingListEntry.objects.create(). Invalid amount values (non-numeric strings) cause an unhandled exception and HTTP 500. A unit ID from a different Space can be associated cross-space, leaking foreign-key references across tenant boundaries. All other endpoints creating ShoppingListEntry use ShoppingListEntrySerializer, which validates and sanitizes these fields. This vulnerability is fixed in 2.6.4. |
2026-04-07 | |
| CVE-2026-35488 | 8.1 | HIGH | CWE-749 | 0.0% p13 | 5.67 | Tandoor Recipes is an application for managing recipes, planning meals, and buil...Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. Prior to 2.6.4, RecipeBookViewSet and RecipeBookEntryViewSet use CustomIsShared as an alternative permission class, but CustomIsShared.has_object_permission() returns True for all HTTP methods — including DELETE, PUT, and PATCH — without checking request.method in SAFE_METHODS. Any user who is in the shared list of a RecipeBook can delete or overwrite it, even though shared access is semantically read-only. This vulnerability is fixed in 2.6.4. |
2026-04-07 | |
| CVE-2026-35487 | 5.3 | MEDIUM | CWE-22 | 0.1% p20 | 3.71 | text-generation-webui is an open-source web interface for running Large Language...text-generation-webui is an open-source web interface for running Large Language Models. Prior to 4.3, an unauthenticated path traversal vulnerability in load_prompt() allows reading any .txt file on the server filesystem. The file content is returned verbatim in the API response. This vulnerability is fixed in 4.3. |
2026-04-07 | |
| CVE-2026-35486 | 7.5 | HIGH | CWE-918 | 0.0% p12 | 5.25 | text-generation-webui is an open-source web interface for running Large Language...text-generation-webui is an open-source web interface for running Large Language Models. Prior to 4.3, he superbooga and superboogav2 RAG extensions fetch user-supplied URLs via requests.get() with zero validation — no scheme check, no IP filtering, no hostname allowlist. An attacker can access cloud metadata endpoints, steal IAM credentials, and probe internal services. The fetched content is exfiltrated through the RAG pipeline. This vulnerability is fixed in 4.3. |
2026-04-07 | |
| CVE-2026-33816 | 9.8 | CRITICAL | NVD-CWE-noinfo | 0.1% p17 | 6.86 | Memory-safety vulnerability in github.com/jackc/pgx/v5.Memory-safety vulnerability in github.com/jackc/pgx/v5. |
2026-04-07 | |
| CVE-2026-33815 | 9.8 | CRITICAL | NVD-CWE-noinfo | 0.1% p17 | 6.86 | Memory-safety vulnerability in github.com/jackc/pgx/v5.Memory-safety vulnerability in github.com/jackc/pgx/v5. |
2026-04-07 | |
| CVE-2026-30460 | 8.8 | HIGH | NVD-CWE-noinfo | 0.1% p31 | 6.16 | Daylight Studio FuelCMS v1.5.2 was discovered to contain an authenticated remote...Daylight Studio FuelCMS v1.5.2 was discovered to contain an authenticated remote code execution (RCE) vulnerability in the Blocks module. |
2026-04-07 | |
| CVE-2026-1079 | 6.0 | MEDIUM | CWE-284 | 0.1% p16 | 4.20 | A native messaging host vulnerability in Pega Browser Extension (PBE) affects us...A native messaging host vulnerability in Pega Browser Extension (PBE) affects users of all versions of Pega Robotic Automation who have installed Pega Browser Extension. A bad actor could create a website that contains malicious code that targets PBE. The vulnerability could occur if a user navigates to this website. The malicious website could then present an unexpected message box. |
2026-04-07 | |
| CVE-2026-1078 | 7.2 | HIGH | CWE-284 | 0.1% p16 | 5.04 | An arbitrary file-write vulnerability in Pega Browser Extension (PBE) affects Pe...An arbitrary file-write vulnerability in Pega Browser Extension (PBE) affects Pega Robotic Automation version 22.1 or R25 users who are running automations that work with Google Chrome or Microsoft Edge. A bad actor could create a website that includes malicious code. The vulnerability could occur if a Robot Runtime user navigates to the malicious website. |
2026-04-07 | |
| CVE-2025-52908 | 9.8 | CRITICAL | CWE-120 | 0.0% p4 | 6.86 | An issue was discovered in the Wi-Fi driver in Samsung Mobile Processor and Wear...An issue was discovered in the Wi-Fi driver in Samsung Mobile Processor and Wearable Processor Exynos 980, 850, 1280, 1330, 1380, 1480, 1580, W920, W930, and W1000. Incorrect Handling of the NL80211 vendor command leads to a buffer overflow via a certain ioctl message, issue 1 of 2. |
2026-04-07 | |
| CVE-2025-24819 | 5.7 | MEDIUM | CWE-23 | 0.0% p7 | 3.99 | Nokia MantaRay NM is vulnerable to a Relative Path Traversal vulnerability due t...Nokia MantaRay NM is vulnerable to a Relative Path Traversal vulnerability due to improper validation of input parameter on the file system in Software Manager application. |
2026-04-07 | |
| CVE-2025-24818 | 8.0 | HIGH | CWE-77 | 0.1% p29 | 5.60 | Nokia MantaRay NM is vulnerable to an OS command injection vulnerability due to ...Nokia MantaRay NM is vulnerable to an OS command injection vulnerability due to improper neutralization of special elements used in an OS command in Log Search application. |
2026-04-07 | |
| CVE-2025-24817 | 8.0 | HIGH | CWE-78 | 0.1% p29 | 5.60 | Nokia MantaRay NM is vulnerable to an OS command injection vulnerability due to ...Nokia MantaRay NM is vulnerable to an OS command injection vulnerability due to improper neutralization of special elements used in an OS command in Symptom Collector application. |
2026-04-07 | |
| CVE-2024-36057 | 9.8 | CRITICAL | CWE-94 | 0.1% p34 | 6.86 | Koha Library before 23.05.10 fails to sanitize user-controllable filenames prior...Koha Library before 23.05.10 fails to sanitize user-controllable filenames prior to unzipping, leading to remote code execution. The line "qx/unzip $filename -d $dirname/;" in upload-cover-image.pl is vulnerable to command injection via shell metacharacters because input data can be controlled by an attacker and is directly included in a system command, i.e., an attack can occur via malicious filenames after uploading a .zip file and clicking Process Images. |
2026-04-07 | |
| CVE-2026-5384 | 5.8 | MEDIUM | CWE-863 | 0.0% p9 | 4.06 | An issue that could allow a credential to be updated and used for a task from ou...An issue that could allow a credential to be updated and used for a task from outside of the authorized organization scope has been resolved. This is an instance of CWE-863: Incorrect Authorization, and has an estimated CVSS score of CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N (5.8 Medium). This issue was fixed in version 4.0.26021.0 of the runZero Platform. |
2026-04-07 | |
| CVE-2026-5383 | 4.4 | MEDIUM | CWE-863 | 0.0% p13 | 3.08 | An issue that could allow access to Explorer groups from outside of the authoriz...An issue that could allow access to Explorer groups from outside of the authorized organization scope has been resolved. This is an instance of CWE-863: Incorrect Authorization, and has an estimated CVSS score of CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:L (4.4 Medium). This issue was fixed in version 4.0.260208.0 of the runZero Explorer. |
2026-04-07 | |
| CVE-2026-5381 | 2.2 | LOW | CWE-863 | 0.0% p8 | 1.54 | An issue that could expose task information outside of the authorized organizati...An issue that could expose task information outside of the authorized organization scope has been resolved. This is an instance of CWE-863: Incorrect Authorization, and has an estimated CVSS score of CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N (2.2 Low). This issue was fixed in version 4.0.260205.0 of the runZero Platform. |
2026-04-07 | |
| CVE-2026-5379 | 3.0 | LOW | CWE-863 | 0.0% p4 | 2.10 | An issue that allowed MCP agents to access certificate information from outside ...An issue that allowed MCP agents to access certificate information from outside of their authorized organization scope has been resolved. This is an instance of CWE-863: Incorrect Authorization, and has an estimated CVSS score of CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:N (3.0 Low). This issue was fixed in version 4.0.260203.0 of the runZero Platform. |
2026-04-07 | |
| CVE-2026-5378 | 5.8 | MEDIUM | CWE-863 | 0.0% p9 | 4.06 | An issue that allowed administrators to create and update users outside of their...An issue that allowed administrators to create and update users outside of their authorized organization scope has been resolved. This is an instance of CWE-863: Incorrect Authorization, and has an estimated CVSS score of CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N (5.8 Medium). This issue was fixed in version 4.0.260203.0 of the runZero Platform. |
2026-04-07 | |
| CVE-2026-5376 | 5.9 | MEDIUM | CWE-613 | 0.0% p9 | 4.13 | An issue that could prevent session inactivity timeouts from triggering due to a...An issue that could prevent session inactivity timeouts from triggering due to automatic page reloading has been resolved. This is an instance of CWE-613: Insufficient Control of Resources After Expiration or Release, and has an estimated CVSS score of CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N (5.9 Medium). This issue was fixed in version 4.0.260203.0 of the runZero Platform. |
2026-04-07 | |
| CVE-2026-5375 | 2.7 | LOW | CWE-200 | 0.0% p9 | 1.89 | An issue that could allow a user with access to a credential to view sensitive f...An issue that could allow a user with access to a credential to view sensitive fields through an API response has been resolved. This is an instance of CWE-200: Exposure of Sensitive Information to an Unauthorized Actor, and has an estimated CVSS score of CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N (2.7 Low). This issue was fixed in version 4.0.260203.0 of the runZero Platform. |
2026-04-07 | |
| CVE-2026-5374 | 5.8 | MEDIUM | CWE-863 | 0.0% p9 | 4.06 | An issue that allowed MCP agents to access remediation and asset information fro...An issue that allowed MCP agents to access remediation and asset information from outside of the authorized organization scope has been resolved. This is an instance of CWE-863: Incorrect Authorization, and has an estimated CVSS score of CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N (5.8 Medium). This issue was fixed in version 4.0.260202.0 of the runZero Platform. |
2026-04-07 | |
| CVE-2026-5373 | 8.1 | HIGH | CWE-269 | 0.0% p7 | 5.67 | An issue that allowed all-organization administrators to promote accounts to sup...An issue that allowed all-organization administrators to promote accounts to superuser status has been resolved. This is an instance of CWE-269: Improper Privilege Management, and has an estimated CVSS score of CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N (8.1 High). This issue was fixed in version 4.0.260202.0 of the runZero Platform. |
2026-04-07 | |
| CVE-2026-5372 | 6.4 | MEDIUM | CWE-89 | 0.0% p8 | 4.48 | An issue that allowed a SQL injection attack vector related to saved queries (in...An issue that allowed a SQL injection attack vector related to saved queries (introduced in version 4.0.260123.0). This is an instance of CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection'), and has an estimated CVSS score of CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H (6.4 Medium). This issue was fixed in version 4.0.260123.1 of the runZero Platform. |
2026-04-07 | |
| CVE-2026-4740 | 8.2 | HIGH | CWE-295 | 0.0% p0 | 5.74 | A flaw was found in Open Cluster Management (OCM), the technology underlying Red...A flaw was found in Open Cluster Management (OCM), the technology underlying Red Hat Advanced Cluster Management (ACM). Improper validation of Kubernetes client certificate renewal allows a managed cluster administrator to forge a client certificate that can be approved by the OCM controller. This enables cross-cluster privilege escalation and may allow an attacker to gain control over other managed clusters, including the hub cluster. |
2026-04-07 | |
| CVE-2026-35485 | 7.5 | HIGH | CWE-22 | 0.5% p65 | 5.26 | text-generation-webui is an open-source web interface for running Large Language...text-generation-webui is an open-source web interface for running Large Language Models. Prior to 4.3, an unauthenticated path traversal vulnerability in load_grammar() allows reading any file on the server filesystem with no extension restriction. Gradio does not server-side validate dropdown values, so an attacker can POST directory traversal payloads (e.g., ../../../etc/passwd) via the API and receive the full file contents in the response. This vulnerability is fixed in 4.3. |
2026-04-07 | |
| CVE-2026-35484 | 5.3 | MEDIUM | CWE-22 | 0.1% p20 | 3.71 | text-generation-webui is an open-source web interface for running Large Language...text-generation-webui is an open-source web interface for running Large Language Models. Prior to 4.3, an unauthenticated path traversal vulnerability in load_preset() allows reading any .yaml file on the server filesystem. The parsed YAML key-value pairs (including passwords, API keys, connection strings) are returned in the API response. This vulnerability is fixed in 4.3. |
2026-04-07 | |
| CVE-2026-35483 | 5.3 | MEDIUM | CWE-22 | 0.1% p20 | 3.71 | text-generation-webui is an open-source web interface for running Large Language...text-generation-webui is an open-source web interface for running Large Language Models. Prior to 4.3, an unauthenticated path traversal vulnerability in load_template() allows reading files with .jinja, .jinja2, .yaml, or .yml extensions from anywhere on the server filesystem. For .jinja files the content is returned verbatim; for .yaml files a parsed key is extracted. This vulnerability is fixed in 4.3. |
2026-04-07 | |
| CVE-2026-35481 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: Further research determined the issue does not satisfy the assi...Rejected reason: Further research determined the issue does not satisfy the assignment rules. |
2026-04-07 | |
| CVE-2026-35480 | 6.2 | MEDIUM | CWE-770 | 0.0% p4 | 4.34 | go-ipld-prime is an implementation of the InterPlanetary Linked Data (IPLD) spec...go-ipld-prime is an implementation of the InterPlanetary Linked Data (IPLD) spec interfaces, a batteries-included codec implementations of IPLD for CBOR and JSON, and tooling for basic operations on IPLD objects. Prior to 0.22.0, the DAG-CBOR decoder uses collection sizes declared in CBOR headers as Go preallocation hints for maps and lists. The decoder does not cap these size hints or account for their cost in its allocation budget, allowing small payloads to cause excessive memory allocation. This vulnerability is fixed in 0.22.0. |
2026-04-07 | |
| CVE-2026-35464 | 7.5 | HIGH | CWE-502 | 0.1% p25 | 5.25 | pyLoad is a free and open-source download manager written in Python. The fix for...pyLoad is a free and open-source download manager written in Python. The fix for CVE-2026-33509 added an ADMIN_ONLY_OPTIONS set to block non-admin users from modifying security-critical config options. The storage_folder option is not in this set and passes the existing path restriction because the Flask session directory is outside both PKGDIR and userdir. A user with SETTINGS and ADD permissions can redirect downloads to the Flask filesystem session store, plant a malicious pickle payload as a predictable session file, and trigger arbitrary code execution when any HTTP request arrives with the corresponding session cookie. This vulnerability is fixed with commit c4cf995a2803bdbe388addfc2b0f323277efc0e1. |
2026-04-07 | |
| CVE-2026-35463 | 8.8 | HIGH | CWE-78 | 0.3% p52 | 6.17 | pyLoad is a free and open-source download manager written in Python. In 0.5.0b3....pyLoad is a free and open-source download manager written in Python. In 0.5.0b3.dev96 and earlier, the ADMIN_ONLY_OPTIONS protection mechanism restricts security-critical configuration values (reconnect scripts, SSL certs, proxy credentials) to admin-only access. However, this protection is only applied to core config options, not to plugin config options. The AntiVirus plugin stores an executable path (avfile) in its config, which is passed directly to subprocess.Popen(). A non-admin user with SETTINGS permission can change this path to achieve remote code execution. |
2026-04-07 | |
| CVE-2026-35462 | 4.3 | MEDIUM | CWE-613 | 0.0% p9 | 3.01 | Papra is a minimalistic document management and archiving platform. Prior to 26....Papra is a minimalistic document management and archiving platform. Prior to 26.4.0, API keys with an expiresAt date are never validated against the current time during authentication. Any API key — regardless of its expiration date — is accepted indefinitely, allowing a user whose key has expired to continue accessing all protected endpoints as if the key were still valid. This vulnerability is fixed in 26.4.0. |
2026-04-07 | |
| CVE-2026-35461 | 5.0 | MEDIUM | CWE-918 | 0.0% p7 | 3.50 | Papra is a minimalistic document management and archiving platform. Prior to 26....Papra is a minimalistic document management and archiving platform. Prior to 26.4.0, the Papra webhook system allows authenticated users to register arbitrary URLs as webhook endpoints with no validation of the destination address. The server makes outbound HTTP POST requests to registered URLs, including localhost, internal network ranges, and cloud provider metadata endpoints, on every document event. This vulnerability is fixed in 26.4.0. |
2026-04-07 | |
| CVE-2026-35460 | 4.3 | MEDIUM | CWE-79 | 0.0% p9 | 3.01 | Papra is a minimalistic document management and archiving platform. Prior to 26....Papra is a minimalistic document management and archiving platform. Prior to 26.4.0, transactional email templates in Papra interpolate user.name directly into HTML without escaping or sanitization. An attacker who registers with a display name containing HTML tags will have those tags injected into the verification and password reset email bodies. Since emails are sent from the legitimate domain (e.g: auth@mail.papra.app), this enables convincing phishing attacks that appear to originate from official Papra notifications. This vulnerability is fixed in 26.4.0. |
2026-04-07 | |
| CVE-2026-35458 | 8.7 | HIGH | CWE-1333 | 0.1% p17 | 6.09 | Gotenberg is an API for converting document formats. In 8.29.1 and earlier, Gote...Gotenberg is an API for converting document formats. In 8.29.1 and earlier, Gotenberg uses dlclark/regexp2 to compile user-supplied scope patterns without setting a proper timeout. Users with access to features using this logic can hang workers indefinitely. |
2026-04-07 | |
| CVE-2026-35457 | 8.2 | HIGH | CWE-770 | 0.1% p16 | 5.74 | libp2p-rust is the official rust language Implementation of the libp2p networkin...libp2p-rust is the official rust language Implementation of the libp2p networking stack. Prior to 0.17.1, the rendezvous server stores pagination cookies without bounds. An unauthenticated peer can repeatedly issue DISCOVER requests and force unbounded memory growth. This vulnerability is fixed in 0.17.1. |
2026-04-07 | |
| CVE-2026-35405 | 7.5 | HIGH | CWE-770 | 0.1% p16 | 5.25 | libp2p-rust is the official rust language Implementation of the libp2p networkin...libp2p-rust is the official rust language Implementation of the libp2p networking stack. Prior to 0.17.1, libp2p-rendezvous server has no limit on how many namespaces a single peer can register. A malicious peer can just keep registering unique namespaces in a loop and the server happily accepts every single one allocating memory for each registration with no pushback. Keep doing this long enough (or with multiple sybil peers) and the server process gets OOM killed. This vulnerability is fixed in 0.17.1. |
2026-04-07 | |
| CVE-2026-30079 | 9.8 | CRITICAL | CWE-288 | 0.1% p18 | 6.86 | In OpenAirInterface V2.2.0 AMF, Out of sequence messages causes incorrect state ...In OpenAirInterface V2.2.0 AMF, Out of sequence messages causes incorrect state transition during UE registration procedure. This allows authentication to be bypassed completely. If a SecurityModeComplete message is sent after InitialUERegistration, a registration reject is received followed by a registration accept! This leads the UE to be registered without proper authentication. |
2026-04-07 | |
| CVE-2026-24660 | 8.1 | HIGH | CWE-190 | 0.1% p16 | 5.67 | A heap-based buffer overflow vulnerability exists in the x3f_load_huffman functi...A heap-based buffer overflow vulnerability exists in the x3f_load_huffman functionality of LibRaw Commit d20315b. A specially crafted malicious file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability. |
2026-04-07 | |
| CVE-2026-24450 | 8.1 | HIGH | CWE-190 | 0.1% p16 | 5.67 | An integer overflow vulnerability exists in the uncompressed_fp_dng_load_raw fun...An integer overflow vulnerability exists in the uncompressed_fp_dng_load_raw functionality of LibRaw Commit 8dc68e2. A specially crafted malicious file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability. |
2026-04-07 | |
| CVE-2026-21413 | 9.8 | CRITICAL | CWE-129 | 0.1% p16 | 6.86 | A heap-based buffer overflow vulnerability exists in the lossless_jpeg_load_raw ...A heap-based buffer overflow vulnerability exists in the lossless_jpeg_load_raw functionality of LibRaw Commit 0b56545 and Commit d20315b. A specially crafted malicious file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability. |
2026-04-07 | |
| CVE-2026-20911 | 9.8 | CRITICAL | CWE-131 | 0.1% p16 | 6.86 | A heap-based buffer overflow vulnerability exists in the HuffTable::initval func...A heap-based buffer overflow vulnerability exists in the HuffTable::initval functionality of LibRaw Commit 0b56545 and Commit d20315b. A specially crafted malicious file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability. |
2026-04-07 | |
| CVE-2026-20889 | 9.8 | CRITICAL | CWE-190 | 0.1% p16 | 6.86 | A heap-based buffer overflow vulnerability exists in the x3f_thumb_loader functi...A heap-based buffer overflow vulnerability exists in the x3f_thumb_loader functionality of LibRaw Commit d20315b. A specially crafted malicious file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability. |
2026-04-07 | |
| CVE-2026-20884 | 8.1 | HIGH | CWE-190 | 0.1% p16 | 5.67 | An integer overflow vulnerability exists in the deflate_dng_load_raw functionali...An integer overflow vulnerability exists in the deflate_dng_load_raw functionality of LibRaw Commit 8dc68e2. A specially crafted malicious file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability. |
2026-04-07 | |
| CVE-2025-62818 | 9.8 | CRITICAL | CWE-787 | 0.1% p16 | 6.86 | An issue was discovered in Samsung Mobile Processor, Wearable Processor, and Mod...An issue was discovered in Samsung Mobile Processor, Wearable Processor, and Modem Exynos 980, 990, 850, 1080, 2100, 1280, 2200, 1330, 1380, 1480, 2400, 1580, 2500, 9110, W920, W930, W1000, Modem 5123, Modem 5300, and Modem 5400. An out-of-bounds write occurs due to a mismatch between the TP-UDHI and UDL values when processing an SMS TP-UD packet. |
2026-04-07 | |
| CVE-2025-52909 | 9.8 | CRITICAL | CWE-120 | 0.1% p16 | 6.86 | An issue was discovered in the Wi-Fi driver in Samsung Mobile Processor and Wear...An issue was discovered in the Wi-Fi driver in Samsung Mobile Processor and Wearable Processor Exynos 980, 850, 1280, 1330, 1380, 1480, 1580, W920, W930, and W1000. Incorrect Handling of the NL80211 vendor command leads to a buffer overflow via a certain ioctl message, issue 2 of 2. |
2026-04-07 | |
| CVE-2026-5627 | 9.1 | CRITICAL | CWE-29 | 0.0% p13 | 6.37 | A path traversal vulnerability exists in mintplex-labs/anything-llm versions up ...A path traversal vulnerability exists in mintplex-labs/anything-llm versions up to and including 1.9.1, within the `AgentFlows` component. The vulnerability arises from improper handling of user input in the `loadFlow` and `deleteFlow` methods in `server/utils/agentFlows/index.js`. Specifically, the combination of `path.join` and `normalizePath` allows attackers to bypass directory restrictions and access or delete arbitrary `.json` files on the server. This can lead to information disclosure, such as leaking sensitive configuration files containing API keys, or denial of service by deleting critical files like `package.json`. The issue is resolved in version 1.12.1. |
2026-04-07 | |
| CVE-2026-5735 | 9.8 | CRITICAL | CWE-787 | 0.1% p16 | 6.86 | Memory safety bugs present in Firefox 149.0.1 and Thunderbird 149.0.1. Some of t...Memory safety bugs present in Firefox 149.0.1 and Thunderbird 149.0.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability was fixed in Firefox 149.0.2 and Thunderbird 149.0.2. |
2026-04-07 | |
| CVE-2026-5734 | 9.8 | CRITICAL | CWE-787 | 0.1% p18 | 6.86 | Memory safety bugs present in Firefox ESR 140.9.0, Thunderbird ESR 140.9.0, Fire...Memory safety bugs present in Firefox ESR 140.9.0, Thunderbird ESR 140.9.0, Firefox 149.0.1 and Thunderbird 149.0.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability was fixed in Firefox 149.0.2, Firefox ESR 140.9.1, Thunderbird 149.0.2, and Thunderbird 140.9.1. |
2026-04-07 | |
| CVE-2026-5733 | 8.8 | HIGH | CWE-119 | 0.0% p11 | 6.16 | Incorrect boundary conditions in the Graphics: WebGPU component. This vulnerabil...Incorrect boundary conditions in the Graphics: WebGPU component. This vulnerability was fixed in Firefox 149.0.2 and Thunderbird 149.0.2. |
2026-04-07 | |
| CVE-2026-5732 | 8.8 | HIGH | CWE-190 | 0.0% p12 | 6.16 | Incorrect boundary conditions, integer overflow in the Graphics: Text component....Incorrect boundary conditions, integer overflow in the Graphics: Text component. This vulnerability was fixed in Firefox 149.0.2, Firefox ESR 140.9.1, Thunderbird 149.0.2, and Thunderbird 140.9.1. |
2026-04-07 | |
| CVE-2026-5731 | 9.8 | CRITICAL | CWE-119 | 0.1% p21 | 6.86 | Memory safety bugs present in Firefox ESR 115.34.0, Firefox ESR 140.9.0, Thunder...Memory safety bugs present in Firefox ESR 115.34.0, Firefox ESR 140.9.0, Thunderbird ESR 140.9.0, Firefox 149.0.1 and Thunderbird 149.0.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability was fixed in Firefox 149.0.2, Firefox ESR 115.34.1, Firefox ESR 140.9.1, Thunderbird 149.0.2, and Thunderbird 140.9.1. |
2026-04-07 | |
| CVE-2026-3466 | 8.5 | HIGH | CWE-79 | 0.0% p8 | 5.95 | Insufficient sanitization of dashboard dashlet title links in Checkmk 2.2.0 (EOL...Insufficient sanitization of dashboard dashlet title links in Checkmk 2.2.0 (EOL), Checkmk 2.3.0 before 2.3.0p46, Checkmk 2.4.0 before 2.4.0p25, and Checkmk 2.5.0 (beta) before 2.5.0b3 allows an attacker with dashboard creation privileges to perform stored cross-site scripting (XSS) attacks by tricking a victim into clicking a crafted dashlet title link on a shared dashboard. |
2026-04-07 | |
| CVE-2026-23818 | 8.8 | HIGH | CWE-601 | 0.0% p13 | 6.16 | A vulnerability has been identified in the graphical user interface (GUI) of HPE...A vulnerability has been identified in the graphical user interface (GUI) of HPE Aruba Networking Private 5G Core On-Prem that could allow an attacker to abuse an open redirect vulnerability in the login flow using a crafted URL. Successful exploitation may redirect an authenticated user to an attacker-controlled server hosting a spoofed login page prompting the unsuspecting victim to give away their credentials, which could then be captured by the attacker, before being redirected back to the legitimate login page. |
2026-04-07 | |
| CVE-2026-22679 | 9.3 | CRITICAL | CWE-306 | 0.4% p60 | 6.52 | Weaver (Fanwei) E-cology 10.0 versions prior to 20260312 contain an unauthentica...Weaver (Fanwei) E-cology 10.0 versions prior to 20260312 contain an unauthenticated remote code execution vulnerability in the /papi/esearch/data/devops/dubboApi/debug/method endpoint that allows attackers to execute arbitrary commands by invoking exposed debug functionality. Attackers can craft POST requests with attacker-controlled interfaceName and methodName parameters to reach command-execution helpers and achieve arbitrary command execution on the system. Exploitation evidence was first observed by the Shadowserver Foundation on 2026-03-31 (UTC). |
2026-04-07 | |
| CVE-2026-22666 | 8.6 | HIGH | CWE-95 | 0.2% p35 | 6.02 | Dolibarr ERP/CRM versions prior to 23.0.2 contain an authenticated remote code e...Dolibarr ERP/CRM versions prior to 23.0.2 contain an authenticated remote code execution vulnerability in the dol_eval_standard() function that fails to apply forbidden string checks in whitelist mode and does not detect PHP dynamic callable syntax. Attackers with administrator privileges can inject malicious payloads through computed extrafields or other evaluation paths using PHP dynamic callable syntax to bypass validation and achieve arbitrary command execution via eval(). |
2026-04-07 | |
| CVE-2025-39666 | 9.3 | CRITICAL | CWE-426 | 0.0% p1 | 6.51 | Local privilege escalation in Checkmk 2.2.0 (EOL), Checkmk 2.3.0 before 2.3.0p46...Local privilege escalation in Checkmk 2.2.0 (EOL), Checkmk 2.3.0 before 2.3.0p46, Checkmk 2.4.0 before 2.4.0p25, and Checkmk 2.5.0 (beta) before 2.5.0b3 allows a site user to escalate their privileges to root, by manipulating files in the site context that are processed when the `omd` administrative command is run by root. |
2026-04-07 | |
| CVE-2021-4473 | 9.3 | CRITICAL | CWE-78 | 0.8% p74 | 6.53 | Tianxin Internet Behavior Management System contains a command injection vulnera...Tianxin Internet Behavior Management System contains a command injection vulnerability in the Reporter component endpoint that allows unauthenticated attackers to execute arbitrary commands by supplying a crafted objClass parameter containing shell metacharacters and output redirection. Attackers can exploit this vulnerability to write malicious PHP files into the web root and achieve remote code execution with the privileges of the web server process. This vulnerability has been fixed in version NACFirmware_4.0.0.7_20210716.180815_topsec_0_basic.bin. Exploitation evidence was first observed by the Shadowserver Foundation on 2024-06-01 (UTC). |
2026-04-07 | |
| CVE-2026-31842 | 8.7 | HIGH | CWE-444 | 0.1% p18 | 6.09 | Tinyproxy through 1.11.3 is vulnerable to HTTP request parsing desynchronization...Tinyproxy through 1.11.3 is vulnerable to HTTP request parsing desynchronization due to a case-sensitive comparison of the Transfer-Encoding header in src/reqs.c. The is_chunked_transfer() function uses strcmp() to compare the header value against "chunked", even though RFC 7230 specifies that transfer-coding names are case-insensitive. By sending a request with Transfer-Encoding: Chunked, an unauthenticated remote attacker can cause Tinyproxy to misinterpret the request as having no body. In this state, Tinyproxy sets content_length.client to -1, skips pull_client_data_chunked(), forwards request headers upstream, and transitions into relay_connection() raw TCP forwarding while unread body data remains buffered. This leads to inconsistent request state between Tinyproxy and backend servers. RFC-compliant backends (e.g., Node.js, Nginx) will continue waiting for chunked body data, causing connections to hang indefinitely. This behavior enables application-level denial of service through backend worker exhaustion. Additionally, in deployments where Tinyproxy is used for request-body inspection, filtering, or security enforcement, the unread body may be forwarded without proper inspection, resulting in potential security control bypass. |
2026-04-07 | |
| CVE-2026-34904 | 7.5 | HIGH | CWE-352 | 0.0% p4 | 5.25 | Cross-Site Request Forgery (CSRF) vulnerability in Analytify Simple Social Media...Cross-Site Request Forgery (CSRF) vulnerability in Analytify Simple Social Media Share Buttons allows Cross Site Request Forgery.This issue affects Simple Social Media Share Buttons: from n/a through 6.2.0. |
2026-04-07 | |
| CVE-2026-34903 | 5.4 | MEDIUM | CWE-862 | 0.0% p11 | 3.78 | Missing Authorization vulnerability in OceanWP Ocean Extra allows Exploiting Inc...Missing Authorization vulnerability in OceanWP Ocean Extra allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Ocean Extra: from n/a through 2.5.3. |
2026-04-07 | |
| CVE-2026-34899 | 5.3 | MEDIUM | CWE-862 | 0.0% p10 | 3.71 | Missing Authorization vulnerability in Eniture technology LTL Freight Quotes – W...Missing Authorization vulnerability in Eniture technology LTL Freight Quotes – Worldwide Express Edition allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects LTL Freight Quotes – Worldwide Express Edition: from n/a through 5.2.1. |
2026-04-07 | |
| CVE-2026-34896 | 7.5 | HIGH | CWE-352 | 0.0% p4 | 5.25 | Cross-Site Request Forgery (CSRF) vulnerability in Analytify Under Construction,...Cross-Site Request Forgery (CSRF) vulnerability in Analytify Under Construction, Coming Soon & Maintenance Mode allows Cross Site Request Forgery.This issue affects Under Construction, Coming Soon & Maintenance Mode: from n/a through 2.1.1. |
2026-04-07 | |
| CVE-2026-3177 | 5.3 | MEDIUM | CWE-345 | 0.0% p0 | 3.71 | The Charitable – Donation Plugin for WordPress – Fundraising with Recurring Dona...The Charitable – Donation Plugin for WordPress – Fundraising with Recurring Donations & More plugin for WordPress is vulnerable to Insufficient Verification of Data Authenticity in versions up to, and including, 1.8.9.7. This is due to missing cryptographic verification of incoming Stripe webhook events. This makes it possible for unauthenticated attackers to forge payment_intent.succeeded webhook payloads and mark pending donations as completed without a real payment. |
2026-04-07 | |
| CVE-2026-5465 | 8.8 | HIGH | CWE-639 | 0.1% p17 | 6.16 | The Booking for Appointments and Events Calendar – Amelia plugin for WordPress i...The Booking for Appointments and Events Calendar – Amelia plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.1.3. This is due to the `UpdateProviderCommandHandler` failing to validate changes to the `externalId` field when a Provider (Employee) user updates their own profile. The `externalId` maps directly to a WordPress user ID and is passed to `wp_set_password()` and `wp_update_user()` without authorization checks. This makes it possible for authenticated attackers, with Provider-level (Employee) access and above, to take over any WordPress account — including Administrator — by injecting an arbitrary `externalId` value when updating their own provider profile. |
2026-04-07 | |
| CVE-2026-4079 | 6.5 | MEDIUM | CWE-89 | 0.0% p8 | 4.55 | The SQL Chart Builder WordPress plugin before 2.3.8 does not properly escape use...The SQL Chart Builder WordPress plugin before 2.3.8 does not properly escape user input as it is concatened to SQL queries, making it possible for attackers to conduct SQL Injection attacks against the dynamic filter functionality. |
2026-04-07 | |
| CVE-2026-1900 | 6.5 | MEDIUM | CWE-306 | 0.0% p9 | 4.55 | The Link Whisper Free WordPress plugin before 0.9.1 has a publicly accessible RE...The Link Whisper Free WordPress plugin before 0.9.1 has a publicly accessible REST endpoint that allows unauthenticated settings updates. |
2026-04-07 | |
| CVE-2026-1114 | 9.8 | CRITICAL | CWE-284 | 0.1% p18 | 6.86 | In parisneo/lollms version 2.1.0, the application's session management is vulner...In parisneo/lollms version 2.1.0, the application's session management is vulnerable to improper access control due to the use of a weak secret key for signing JSON Web Tokens (JWT). This vulnerability allows an attacker to perform an offline brute-force attack to recover the secret key. Once the secret key is obtained, the attacker can forge administrative tokens by modifying the JWT payload and resigning it with the cracked secret. This enables unauthorized users to escalate privileges, impersonate the administrator, and gain access to restricted endpoints. The issue is resolved in version 2.2.0. |
2026-04-07 | |
| CVE-2025-15611 | 5.4 | MEDIUM | CWE-918 | 0.0% p6 | 3.78 | The Popup Box WordPress plugin before 5.5.0 does not properly validate nonces i...The Popup Box WordPress plugin before 5.5.0 does not properly validate nonces in the add_or_edit_popupbox() function before saving popup data, allowing unauthenticated attackers to perform Cross-Site Request Forgery attacks. When an authenticated admin visits a malicious page, the attacker can create or modify popups with arbitrary JavaScript that executes in the admin panel and frontend. |
2026-04-07 | |
| CVE-2026-1839 | 6.5 | MEDIUM | CWE-502 | 0.0% p5 | 4.55 | A vulnerability in the HuggingFace Transformers library, specifically in the `Tr...A vulnerability in the HuggingFace Transformers library, specifically in the `Trainer` class, allows for arbitrary code execution. The `_load_rng_state()` method in `src/transformers/trainer.py` at line 3059 calls `torch.load()` without the `weights_only=True` parameter. This issue affects all versions of the library supporting `torch>=2.2` when used with PyTorch versions below 2.6, as the `safe_globals()` context manager provides no protection in these versions. An attacker can exploit this vulnerability by supplying a malicious checkpoint file, such as `rng_state.pth`, which can execute arbitrary code when loaded. The issue is resolved in version v5.0.0rc3. |
2026-04-07 | |
| CVE-2025-65116 | 5.5 | MEDIUM | CWE-763 | 0.0% p2 | 3.85 | Buffer Overflow Vulnerability in JP1/IT Desktop Management 2 - Manager on Window...Buffer Overflow Vulnerability in JP1/IT Desktop Management 2 - Manager on Windows, JP1/IT Desktop Management 2 - Operations Director on Windows, Job Management Partner 1/IT Desktop Management 2 - Manager on Windows, JP1/IT Desktop Management - Manager on Windows, Job Management Partner 1/IT Desktop Management - Manager on Windows, JP1/NETM/DM Manager on Windows, JP1/NETM/DM Client on Windows, Job Management Partner 1/Software Distribution Manager on Windows, Job Management Partner 1/Software Distribution Client on Windows.This issue affects JP1/IT Desktop Management 2 - Manager: from 13-50 before 13-50-02, from 13-11 before 13-11-04, from 13-10 before 13-10-07, from 13-01 before 13-01-07, from 13-00 before 13-00-05, from 12-60 before 12-60-12, from 10-50 through 12-50-11; JP1/IT Desktop Management 2 - Operations Director: from 13-50 before 13-50-02, from 13-11 before 13-11-04, from 13-10 before 13-10-07, from 13-01 before 13-01-07, from 13-00 before 13-00-05, from 12-60 before 12-60-12, from 10-50 through 12-50-11; Job Management Partner 1/IT Desktop Management 2 - Manager: from 10-50 through 10-50-11; JP1/IT Desktop Management - Manager: from 09-50 through 10-10-16; Job Management Partner 1/IT Desktop Management - Manager: from 09-50 through 10-10-16; JP1/NETM/DM Manager: from 09-00 through 10-20-02; JP1/NETM/DM Client: from 09-00 through 10-20-02; Job Management Partner 1/Software Distribution Manager: from 09-00 through 09-51-13; Job Management Partner 1/Software Distribution Client: from 09-00 through 09-51-13. |
2026-04-07 | |
| CVE-2025-65115 | 8.8 | HIGH | CWE-73 | 0.1% p23 | 6.16 | Remote Code Execution Vulnerability in JP1/IT Desktop Management 2 - Manager on ...Remote Code Execution Vulnerability in JP1/IT Desktop Management 2 - Manager on Windows, JP1/IT Desktop Management 2 - Operations Director on Windows, Job Management Partner 1/IT Desktop Management 2 - Manager on Windows, JP1/IT Desktop Management - Manager on Windows, Job Management Partner 1/IT Desktop Management - Manager on Windows, JP1/NETM/DM Manager on Windows, JP1/NETM/DM Client on Windows, Job Management Partner 1/Software Distribution Manager on Windows, Job Management Partner 1/Software Distribution Client on Windows.This issue affects JP1/IT Desktop Management 2 - Manager: from 13-50 before 13-50-02, from 13-11 before 13-11-04, from 13-10 before 13-10-07, from 13-01 before 13-01-07, from 13-00 before 13-00-05, from 12-60 before 12-60-12, from 10-50 through 12-50-11; JP1/IT Desktop Management 2 - Operations Director: from 13-50 before 13-50-02, from 13-11 before 13-11-04, from 13-10 before 13-10-07, from 13-01 before 13-01-07, from 13-00 before 13-00-05, from 12-60 before 12-60-12, from 10-50 through 12-50-11; Job Management Partner 1/IT Desktop Management 2 - Manager: from 10-50 through 10-50-11; JP1/IT Desktop Management - Manager: from 09-50 through 10-10-16; Job Management Partner 1/IT Desktop Management - Manager: from 09-50 through 10-10-16; JP1/NETM/DM Manager: from 09-00 through 10-20-02; JP1/NETM/DM Client: from 09-00 through 10-20-02; Job Management Partner 1/Software Distribution Manager: from 09-00 through 09-51-13; Job Management Partner 1/Software Distribution Client: from 09-00 through 09-51-13. |
2026-04-07 | |
| CVE-2026-0740 | 9.8 | CRITICAL | CWE-434 | 0.1% p26 | 6.86 | The Ninja Forms - File Uploads plugin for WordPress is vulnerable to arbitrary f...The Ninja Forms - File Uploads plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'NF_FU_AJAX_Controllers_Uploads::handle_upload' function in all versions up to, and including, 3.3.26. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. Note: The vulnerability was partially patched in version 3.3.25 and fully patched in version 3.3.27. |
2026-04-07 | |
| CVE-2026-20446 | 4.3 | MEDIUM | CWE-787 | 0.0% p4 | 3.01 | In sec boot, there is a possible out of bounds write due to an integer overflow....In sec boot, there is a possible out of bounds write due to an integer overflow. This could lead to local denial of service, if an attacker has physical access to the device, with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09963054; Issue ID: MSV-3899. |
2026-04-07 | |
| CVE-2026-20433 | 8.8 | HIGH | CWE-787 | 0.1% p19 | 6.16 | In Modem, there is a possible out of bounds write due to a missing bounds check....In Modem, there is a possible out of bounds write due to a missing bounds check. This could lead to remote escalation of privilege, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: MOLY01088681; Issue ID: MSV-4460. |
2026-04-07 | |
| CVE-2026-20432 | 8.0 | HIGH | CWE-787 | 0.1% p22 | 5.60 | In Modem, there is a possible out of bounds write due to a missing bounds check....In Modem, there is a possible out of bounds write due to a missing bounds check. This could lead to remote escalation of privilege, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: MOLY01406170; Issue ID: MSV-4461. |
2026-04-07 | |
| CVE-2026-20431 | 6.5 | MEDIUM | CWE-770 | 0.1% p18 | 4.55 | In Modem, there is a possible system crash due to a logic error. This could lead...In Modem, there is a possible system crash due to a logic error. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01106496; Issue ID: MSV-4467. |
2026-04-07 | |
| CVE-2026-5719 | 5.3 | MEDIUM | CWE-74 | 0.0% p8 | 3.71 | A flaw has been found in itsourcecode Construction Management System 1.0. This a...A flaw has been found in itsourcecode Construction Management System 1.0. This affects an unknown function of the file /borrowedtool.php. Executing a manipulation of the argument code can lead to sql injection. It is possible to launch the attack remotely. The exploit has been published and may be used. |
2026-04-07 | |
| CVE-2025-13044 | 6.2 | MEDIUM | CWE-340 | 0.0% p0 | 4.34 | IBM Concert 1.0.0 through 2.2.0 creates temporary files with predictable names, ...IBM Concert 1.0.0 through 2.2.0 creates temporary files with predictable names, which allows local users to overwrite arbitrary files via a symlink attack. |
2026-04-07 | |
| CVE-2026-5705 | 5.3 | MEDIUM | CWE-79 | 0.0% p1 | 3.71 | A vulnerability was identified in code-projects Online Hotel Booking 1.0. Affect...A vulnerability was identified in code-projects Online Hotel Booking 1.0. Affected by this vulnerability is an unknown functionality of the file /booknow.php of the component Booking Endpoint. Such manipulation of the argument roomname leads to cross site scripting. It is possible to launch the attack remotely. The exploit is publicly available and might be used. |
2026-04-07 | |
| CVE-2026-5692 | 6.9 | MEDIUM | CWE-77 | 4.9% p89 | 4.98 | A vulnerability was found in Totolink A7100RU 7.4cu.2313_b20191024. This impacts...A vulnerability was found in Totolink A7100RU 7.4cu.2313_b20191024. This impacts the function setGameSpeedCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument enable results in os command injection. The attack may be performed from remote. The exploit has been made public and could be used. |
2026-04-07 | |
| CVE-2026-5691 | 6.9 | MEDIUM | CWE-77 | 4.9% p89 | 4.98 | A vulnerability has been found in Totolink A7100RU 7.4cu.2313_b20191024. This af...A vulnerability has been found in Totolink A7100RU 7.4cu.2313_b20191024. This affects the function setFirewallType of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument firewallType leads to os command injection. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used. |
2026-04-06 | |
| CVE-2026-5690 | 6.9 | MEDIUM | CWE-77 | 4.9% p89 | 4.98 | A flaw has been found in Totolink A7100RU 7.4cu.2313_b20191024. The impacted ele...A flaw has been found in Totolink A7100RU 7.4cu.2313_b20191024. The impacted element is the function setRemoteCfg of the file /cgi-bin/cstecgi.cgi. Executing a manipulation of the argument enable can lead to os command injection. The attack can be executed remotely. The exploit has been published and may be used. |
2026-04-06 | |
| CVE-2026-5689 | 6.9 | MEDIUM | CWE-77 | 4.9% p89 | 4.98 | A vulnerability was detected in Totolink A7100RU 7.4cu.2313_b20191024. The affec...A vulnerability was detected in Totolink A7100RU 7.4cu.2313_b20191024. The affected element is the function setNtpCfg of the file /cgi-bin/cstecgi.cgi. Performing a manipulation of the argument tz results in os command injection. Remote exploitation of the attack is possible. The exploit is now public and may be used. |
2026-04-06 | |
| CVE-2026-5688 | 6.9 | MEDIUM | CWE-77 | 4.9% p89 | 4.98 | A security vulnerability has been detected in Totolink A7100RU 7.4cu.2313_b20191...A security vulnerability has been detected in Totolink A7100RU 7.4cu.2313_b20191024. Impacted is the function setDdnsCfg of the file /cgi-bin/cstecgi.cgi. Such manipulation of the argument provider leads to os command injection. The attack may be launched remotely. The exploit has been disclosed publicly and may be used. |
2026-04-06 | |
| CVE-2026-5687 | 7.4 | HIGH | CWE-119 | 0.0% p14 | 5.18 | A weakness has been identified in Tenda CX12L 16.03.53.12. This issue affects th...A weakness has been identified in Tenda CX12L 16.03.53.12. This issue affects the function fromNatStaticSetting of the file /goform/NatStaticSetting. This manipulation of the argument page causes stack-based buffer overflow. The attack may be initiated remotely. The exploit has been made available to the public and could be used for attacks. |
2026-04-06 | |
| CVE-2026-5686 | 7.4 | HIGH | CWE-119 | 0.0% p4 | 5.18 | A security flaw has been discovered in Tenda CX12L 16.03.53.12. This vulnerabili...A security flaw has been discovered in Tenda CX12L 16.03.53.12. This vulnerability affects the function fromRouteStatic of the file /goform/RouteStatic. The manipulation of the argument page results in stack-based buffer overflow. The attack can be launched remotely. The exploit has been released to the public and may be used for attacks. |
2026-04-06 | |
| CVE-2026-5685 | 7.4 | HIGH | CWE-119 | 0.0% p14 | 5.18 | A vulnerability was identified in Tenda CX12L 16.03.53.12. This affects the func...A vulnerability was identified in Tenda CX12L 16.03.53.12. This affects the function fromAddressNat of the file /goform/addressNat. The manipulation of the argument page leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit is publicly available and might be used. |
2026-04-06 | |
| CVE-2026-5684 | 8.6 | HIGH | CWE-119 | 0.1% p15 | 6.02 | A vulnerability was determined in Tenda CX12L 16.03.53.12. Affected by this issu...A vulnerability was determined in Tenda CX12L 16.03.53.12. Affected by this issue is the function fromwebExcptypemanFilter of the file /goform/webExcptypemanFilter. Executing a manipulation of the argument page can lead to stack-based buffer overflow. The attack requires access to the local network. The exploit has been publicly disclosed and may be utilized. |
2026-04-06 | |
| CVE-2026-35475 | 5.1 | MEDIUM | CWE-601 | 0.0% p8 | 3.57 | WeGIA is a Web manager for charitable institutions. Prior to 3.6.9, the redirect...WeGIA is a Web manager for charitable institutions. Prior to 3.6.9, the redirect parameter is taken directly from $_GET with no URL validation or whitelist check, then used verbatim in a header("Location: ...") call. This vulnerability is fixed in 3.6.9. |
2026-04-06 | |
| CVE-2026-35474 | 5.1 | MEDIUM | CWE-601 | 0.0% p8 | 3.57 | WeGIA is a Web manager for charitable institutions. Prior to 3.6.9, open redirec...WeGIA is a Web manager for charitable institutions. Prior to 3.6.9, open redirect has been found in WeGIA webapp. The redirect parameter is taken directly from $_GET with no URL validation or whitelist check, then used verbatim in a header("Location: ...") call. This vulnerability is fixed in 3.6.9. |
2026-04-06 | |
| CVE-2026-35473 | 5.1 | MEDIUM | CWE-601 | 0.0% p8 | 3.57 | WeGIA is a Web manager for charitable institutions. Prior to 3.6.9, an Open Redi...WeGIA is a Web manager for charitable institutions. Prior to 3.6.9, an Open Redirect vulnerability was identified in the /WeGIA/controle/control.php endpoint of the WeGIA application, specifically through the nextPage parameter when combined with metodo=listarId and nomeClasse=IentradaControle. The application fails to validate or restrict the nextPage parameter, allowing attackers to redirect users to arbitrary external websites. This can be abused for phishing attacks, credential theft, malware distribution, and social engineering using the trusted WeGIA domain. This vulnerability is fixed in 3.6.9. |
2026-04-06 | |
| CVE-2026-35471 | 9.8 | CRITICAL | CWE-22 | 0.1% p29 | 6.86 | goshs is a SimpleHTTPServer written in Go. Prior to 2.0.0-beta.3, tdeleteFile() ...goshs is a SimpleHTTPServer written in Go. Prior to 2.0.0-beta.3, tdeleteFile() missing return after path traversal check. This vulnerability is fixed in 2.0.0-beta.3. |
2026-04-06 | |
| CVE-2026-35454 | 8.7 | HIGH | CWE-22 | 0.1% p24 | 6.09 | The Code Extension Marketplace is an open-source alternative to the VS Code Mark...The Code Extension Marketplace is an open-source alternative to the VS Code Marketplace. Prior to 2.4.2, Zip Slip vulnerability in coder/code-marketplace allowed a malicious VSIX file to write arbitrary files outside the extension directory. ExtractZip passed raw zip entry names to a callback that wrote files via filepath.Join with no boundary check; filepath.Join resolved .. components but did not prevent the result from escaping the base path. This vulnerability is fixed in 2.4.2. |
2026-04-06 | |
| CVE-2026-35452 | 5.3 | MEDIUM | CWE-200 | 0.0% p12 | 3.71 | WWBN AVideo is an open source video platform. In versions 26.0 and prior, the pl...WWBN AVideo is an open source video platform. In versions 26.0 and prior, the plugin/CloneSite/client.log.php endpoint serves the clone operation log file without any authentication. Every other endpoint in the CloneSite plugin directory enforces User::isAdmin(). The log contains internal filesystem paths, remote server URLs, and SSH connection metadata. |
2026-04-06 | |
| CVE-2026-35450 | 5.3 | MEDIUM | CWE-306 | 0.0% p12 | 3.71 | WWBN AVideo is an open source video platform. In versions 26.0 and prior, the pl...WWBN AVideo is an open source video platform. In versions 26.0 and prior, the plugin/API/check.ffmpeg.json.php endpoint probes the FFmpeg remote server configuration and returns connectivity status without any authentication. All sibling FFmpeg management endpoints (kill.ffmpeg.json.php, list.ffmpeg.json.php, ffmpeg.php) require User::isAdmin(). |
2026-04-06 | |
| CVE-2026-35449 | 5.3 | MEDIUM | CWE-200 | 0.0% p10 | 3.71 | WWBN AVideo is an open source video platform. In versions 26.0 and prior, the in...WWBN AVideo is an open source video platform. In versions 26.0 and prior, the install/test.php diagnostic script has its CLI-only access guard disabled by commenting out the die() statement. The script remains accessible via HTTP after installation, exposing video viewer statistics including IP addresses, session IDs, and user agents to unauthenticated visitors. |
2026-04-06 | |
| CVE-2026-35448 | 3.7 | LOW | CWE-862 | 0.0% p12 | 2.59 | WWBN AVideo is an open source video platform. In versions 26.0 and prior, the Bl...WWBN AVideo is an open source video platform. In versions 26.0 and prior, the BlockonomicsYPT plugin's check.php endpoint returns payment order data for any Bitcoin address without requiring authentication. The endpoint was designed as an AJAX polling helper for the authenticated invoice.php page, but it performs no access control checks of its own. Since Bitcoin addresses are publicly visible on the blockchain, an attacker can query payment records for any address used on the platform. |
2026-04-06 | |
| CVE-2026-35444 | 7.1 | HIGH | CWE-125 | 0.0% p2 | 4.97 | SDL_image is a library to load images of various formats as SDL surfaces. In do_...SDL_image is a library to load images of various formats as SDL surfaces. In do_layer_surface() in src/IMG_xcf.c, pixel index values from decoded XCF tile data are used directly as colormap indices without validating them against the colormap size (cm_num). A crafted .xcf file with a small colormap and out-of-range pixel indices causes heap out-of-bounds reads of up to 762 bytes past the colormap allocation. Both IMAGE_INDEXED code paths are affected (bpp=1 and bpp=2). The leaked heap bytes are written into the output surface pixel data, making them potentially observable in the rendered image. This vulnerability is fixed with commit 996bf12888925932daace576e09c3053410896f8. |
2026-04-06 | |
| CVE-2026-35442 | 8.1 | HIGH | CWE-200 | 0.0% p11 | 5.67 | Directus is a real-time API and App dashboard for managing SQL database content....Directus is a real-time API and App dashboard for managing SQL database content. Prior to 11.17.0, aggregate functions (min, max) applied to fields with the conceal special type incorrectly return raw database values instead of the masked placeholder. When combined with groupBy, any authenticated user with read access to the affected collection can extract concealed field values, including static API tokens and two-factor authentication secrets from directus_users. This vulnerability is fixed in 11.17.0. |
2026-04-06 | |
| CVE-2026-35441 | 6.5 | MEDIUM | CWE-400 | 0.0% p10 | 4.55 | Directus is a real-time API and App dashboard for managing SQL database content....Directus is a real-time API and App dashboard for managing SQL database content. Prior to 11.17.0, Directus' GraphQL endpoints (/graphql and /graphql/system) did not deduplicate resolver invocations within a single request. An authenticated user could exploit GraphQL aliasing to repeat an expensive relational query many times in a single request, forcing the server to execute a large number of independent complex database queries concurrently, multiplying database load linearly with the number of aliases. The existing token limit on GraphQL queries still permitted enough aliases for significant resource exhaustion, while the relational depth limit applied per alias without reducing the total number executed. Rate limiting is disabled by default, meaning no built-in throttle prevented this from causing CPU, memory, and I/O exhaustion that could degrade or crash the service. Any authenticated user, including those with minimal read-only permissions, could trigger this condition. This vulnerability is fixed in 11.17.0. |
2026-04-06 | |
| CVE-2026-35413 | 5.3 | MEDIUM | CWE-200 | 0.0% p14 | 3.71 | Directus is a real-time API and App dashboard for managing SQL database content....Directus is a real-time API and App dashboard for managing SQL database content. Prior to 11.16.1, when GRAPHQL_INTROSPECTION=false is configured, Directus correctly blocks standard GraphQL introspection queries (__schema, __type). However, the server_specs_graphql resolver on the /graphql/system endpoint returns an equivalent SDL representation of the schema and was not subject to the same restriction. This allowed the introspection control to be bypassed, exposing schema structure (collection names, field names, types, and relationships) to unauthenticated users at the public permission level, and to authenticated users at their permitted permission level. This vulnerability is fixed in 11.16.1. |
2026-04-06 | |
| CVE-2026-35412 | 7.1 | HIGH | CWE-863 | 0.0% p9 | 4.97 | Directus is a real-time API and App dashboard for managing SQL database content....Directus is a real-time API and App dashboard for managing SQL database content. Prior to 11.16.1, Directus' TUS resumable upload endpoint (/files/tus) allows any authenticated user with basic file upload permissions to overwrite arbitrary existing files by UUID. The TUS controller performs only collection-level authorization checks, verifying the user has some permission on directus_files, but never validates item-level access to the specific file being replaced. As a result, row-level permission rules (e.g., "users can only update their own files") are completely bypassed via the TUS path while being correctly enforced on the standard REST upload path. This vulnerability is fixed in 11.16.1. |
2026-04-06 | |
| CVE-2026-35411 | 4.3 | MEDIUM | CWE-601 | 0.0% p14 | 3.01 | Directus is a real-time API and App dashboard for managing SQL database content....Directus is a real-time API and App dashboard for managing SQL database content. Prior to 11.16.1, Directus is vulnerable to an open redirect via the redirect query parameter on the /admin/tfa-setup page. When an administrator who has not yet configured Two-Factor Authentication (2FA) visits a crafted URL, they are presented with the legitimate Directus 2FA setup page. After completing the setup process, the application redirects the user to the attacker-controlled URL specified in the redirect parameter without any validation. This vulnerability could be used in phishing attacks targeting Directus administrators, as the initial interaction occurs on a trusted domain. This vulnerability is fixed in 11.16.1. |
2026-04-06 | |
| CVE-2026-35410 | 6.1 | MEDIUM | CWE-184 | 0.0% p12 | 4.27 | Directus is a real-time API and App dashboard for managing SQL database content....Directus is a real-time API and App dashboard for managing SQL database content. Prior to 11.16.1, an open redirect vulnerability exists in the login redirection logic. The isLoginRedirectAllowed function fails to correctly identify certain malformed URLs as external, allowing attackers to bypass redirect allow-list validation and redirect users to arbitrary external domains upon successful authentication. This vulnerability is fixed in 11.16.1. |
2026-04-06 | |
| CVE-2026-35409 | 7.7 | HIGH | CWE-918 | 0.0% p8 | 5.39 | Directus is a real-time API and App dashboard for managing SQL database content....Directus is a real-time API and App dashboard for managing SQL database content. Prior to 11.16.0, a Server-Side Request Forgery (SSRF) protection bypass has been identified and fixed in Directus. The IP address validation mechanism used to block requests to local and private networks could be circumvented using IPv4-Mapped IPv6 address notation. This vulnerability is fixed in 11.16.0. |
2026-04-06 | |
| CVE-2026-35408 | 8.7 | HIGH | CWE-346 | 0.0% p4 | 6.09 | Directus is a real-time API and App dashboard for managing SQL database content....Directus is a real-time API and App dashboard for managing SQL database content. Prior to 11.17.0, Directus's Single Sign-On (SSO) login pages lacked a Cross-Origin-Opener-Policy (COOP) HTTP response header. Without this header, a malicious cross-origin window that opens the Directus login page retains the ability to access and manipulate the window object of that page. An attacker can exploit this to intercept and redirect the OAuth authorization flow to an attacker-controlled OAuth client, causing the victim to unknowingly grant access to their authentication provider account (e.g. Google, Discord). This vulnerability is fixed in 11.17.0. |
2026-04-06 | |
| CVE-2026-35404 | 4.7 | MEDIUM | CWE-601 | 0.0% p8 | 3.29 | Open edX Platform enables the authoring and delivery of online learning at any s...Open edX Platform enables the authoring and delivery of online learning at any scale. he view_survey endpoint accepts a redirect_url GET parameter that is passed directly to HttpResponseRedirect() without any URL validation. When a non-existent survey name is provided, the server issues an immediate HTTP 302 redirect to the attacker-controlled URL. Additionally, the same unvalidated URL is embedded in a hidden form field and returned in a JSON response after form submission, where client-side JavaScript performs location.href = url. This enables phishing and credential theft attacks against authenticated Open edX users. This vulnerability is fixed with commit 76462f1e5fa9b37d2621ad7ad19514b403908970. |
2026-04-06 | |
| CVE-2026-22675 | 5.1 | MEDIUM | CWE-79 | 0.0% p12 | 3.57 | OCS Inventory NG Server version 2.12.3 and prior contain a stored cross-site scr...OCS Inventory NG Server version 2.12.3 and prior contain a stored cross-site scripting vulnerability that allows unauthenticated attackers to execute arbitrary JavaScript by submitting malicious User-Agent HTTP headers to the /ocsinventory endpoint. Attackers can register rogue agents or craft requests with malicious User-Agent values that are stored without sanitation and rendered with insufficient encoding in the web console, leading to arbitrary JavaScript execution in the browsers of authenticated users viewing the statistics dashboard. |
2026-04-06 | |
| CVE-2026-5683 | 5.1 | MEDIUM | CWE-119 | 0.0% p1 | 3.57 | A vulnerability was found in Tenda CX12L 16.03.53.12. Affected by this vulnerabi...A vulnerability was found in Tenda CX12L 16.03.53.12. Affected by this vulnerability is the function fromP2pListFilter of the file /goform/P2pListFilter. Performing a manipulation of the argument page results in stack-based buffer overflow. The attack must originate from the local network. The exploit has been made public and could be used. |
2026-04-06 | |
| CVE-2026-35472 | 5.1 | MEDIUM | CWE-601 | 0.0% p8 | 3.57 | WeGIA is a Web manager for charitable institutions. Prior to 3.6.9, an Open Redi...WeGIA is a Web manager for charitable institutions. Prior to 3.6.9, an Open Redirect vulnerability was identified in the /WeGIA/controle/control.php endpoint of the WeGIA application, specifically through the nextPage parameter when combined with metodo=listarTodos and nomeClasse=EstoqueControle. The application fails to validate or restrict the nextPage parameter, allowing attackers to redirect users to arbitrary external websites. This can be abused for phishing attacks, credential theft, malware distribution, and social engineering using the trusted WeGIA domain. This vulnerability is fixed in 3.6.9. |
2026-04-06 | |
| CVE-2026-35399 | 8.5 | HIGH | CWE-79 | 0.0% p11 | 5.95 | WeGIA is a Web manager for charitable institutions. Prior to 3.6.9, a stored XSS...WeGIA is a Web manager for charitable institutions. Prior to 3.6.9, a stored XSS vulnerability allows an attacker to inject malicious scripts through a backup filename. This could lead to unauthorized execution of malicious code in the victim's browser, compromising session data or executing actions on behalf of the user. This vulnerability is fixed in 3.6.9. |
2026-04-06 | |
| CVE-2026-35398 | 5.1 | MEDIUM | CWE-601 | 0.0% p8 | 3.57 | WeGIA is a Web manager for charitable institutions. Prior to 3.6.9, an Open Redi...WeGIA is a Web manager for charitable institutions. Prior to 3.6.9, an Open Redirect vulnerability was identified in the /WeGIA/controle/control.php endpoint of the WeGIA application, specifically through the nextPage parameter when combined with metodo=listarTodos & listarId_Nome and nomeClasse=OrigemControle. The application fails to validate or restrict the nextPage parameter, allowing attackers to redirect users to arbitrary external websites. This can be abused for phishing attacks, credential theft, malware distribution, and social engineering using the trusted WeGIA domain. This vulnerability is fixed in 3.6.9. |
2026-04-06 | |
| CVE-2026-35396 | 5.1 | MEDIUM | CWE-601 | 0.0% p8 | 3.57 | WeGIA is a Web manager for charitable institutions. Prior to 3.6.9, an Open Redi...WeGIA is a Web manager for charitable institutions. Prior to 3.6.9, an Open Redirect vulnerability was identified in the /WeGIA/controle/control.php endpoint of the WeGIA application, specifically through the nextPage parameter when combined with metodo=listarId and nomeClasse=IsaidaControle. The application fails to validate or restrict the nextPage parameter, allowing attackers to redirect users to arbitrary external websites. This can be abused for phishing attacks, credential theft, malware distribution, and social engineering using the trusted WeGIA domain. This vulnerability is fixed in 3.6.9. |
2026-04-06 | |
| CVE-2026-35395 | 8.8 | HIGH | CWE-89 | 0.0% p9 | 6.16 | WeGIA is a Web manager for charitable institutions. Prior to 3.6.9, WeGIA (Web g...WeGIA is a Web manager for charitable institutions. Prior to 3.6.9, WeGIA (Web gerenciador para instituições assistenciais) contains a SQL injection vulnerability in dao/memorando/DespachoDAO.php. The id_memorando parameter is extracted from $_REQUEST without validation and directly interpolated into SQL queries, allowing any authenticated user to execute arbitrary SQL commands against the database. This vulnerability is fixed in 3.6.9. |
2026-04-06 | |
| CVE-2026-35394 | 8.3 | HIGH | CWE-939 | 0.1% p15 | 5.81 | Mobile Next is an MCP server for mobile development and automation. Prior to 0.0...Mobile Next is an MCP server for mobile development and automation. Prior to 0.0.50, the mobile_open_url tool in mobile-mcp passes user-supplied URLs directly to Android's intent system without any scheme validation, allowing execution of arbitrary Android intents, including USSD codes, phone calls, SMS messages, and content provider access. This vulnerability is fixed in 0.0.50. |
2026-04-06 | |
| CVE-2026-35393 | 9.8 | CRITICAL | CWE-22 | 0.1% p29 | 6.86 | goshs is a SimpleHTTPServer written in Go. Prior to 2.0.0-beta.3, the POST multi...goshs is a SimpleHTTPServer written in Go. Prior to 2.0.0-beta.3, the POST multipart upload directory not sanitized. This vulnerability is fixed in 2.0.0-beta.3. |
2026-04-06 | |
| CVE-2026-35392 | 9.8 | CRITICAL | CWE-22 | 0.1% p29 | 6.86 | goshs is a SimpleHTTPServer written in Go. Prior to 2.0.0-beta.3, PUT upload in ...goshs is a SimpleHTTPServer written in Go. Prior to 2.0.0-beta.3, PUT upload in httpserver/updown.go has no path sanitization. This vulnerability is fixed in 2.0.0-beta.3. |
2026-04-06 | |
| CVE-2026-35391 | 8.7 | HIGH | CWE-348 | 0.0% p5 | 6.09 | Bulwark Webmail is a self-hosted webmail client for Stalwart Mail Server. Prior ...Bulwark Webmail is a self-hosted webmail client for Stalwart Mail Server. Prior to 1.4.11, the getClientIP() function in lib/admin/session.ts trusted the first (leftmost) entry of the X-Forwarded-For header, which is fully controlled by the client. An attacker could forge their source IP address to bypass IP-based rate limiting (enabling brute-force attacks against the admin login) or forge audit log entries (making malicious activity appear to originate from arbitrary IP addresses). This vulnerability is fixed in 1.4.11. |
2026-04-06 | |
| CVE-2026-35390 | 5.3 | MEDIUM | CWE-79 | 0.0% p8 | 3.71 | Bulwark Webmail is a self-hosted webmail client for Stalwart Mail Server. Prior ...Bulwark Webmail is a self-hosted webmail client for Stalwart Mail Server. Prior to 1.4.11, the reverse proxy (proxy.ts) set the Content-Security-Policy-Report-Only header instead of the enforcing Content-Security-Policy header. This means cross-site scripting (XSS) attacks were logged but not blocked. Any user who could inject script content (e.g., via crafted email HTML) could execute arbitrary JavaScript in the context of the application, potentially stealing session tokens or performing actions on behalf of the user. This vulnerability is fixed in 1.4.11. |
2026-04-06 | |
| CVE-2026-35389 | 8.7 | HIGH | CWE-295 | 0.0% p5 | 6.09 | Bulwark Webmail is a self-hosted webmail client for Stalwart Mail Server. Prior ...Bulwark Webmail is a self-hosted webmail client for Stalwart Mail Server. Prior to 1.4.11, S/MIME signature verification did not validate the certificate trust chain (checkChain: false). Any email signed with a self-signed or untrusted certificate was displayed as having a valid signature. This vulnerability is fixed in 1.4.11. |
2026-04-06 | |
| CVE-2026-35213 | 8.7 | HIGH | CWE-1333 | 0.3% p48 | 6.10 | @hapi/content provided HTTP Content-* headers parsing. All versions of @hapi/con...@hapi/content provided HTTP Content-* headers parsing. All versions of @hapi/content through 6.0.0 are vulnerable to Regular Expression Denial of Service (ReDoS) via crafted HTTP header values. Three regular expressions used to parse Content-Type and Content-Disposition headers contain patterns susceptible to catastrophic backtracking. This vulnerability is fixed in 6.0.1. |
2026-04-06 | |
| CVE-2026-35208 | 5.3 | MEDIUM | CWE-79 | 0.1% p20 | 3.71 | lichess.org is the forever free, adless and open source chess server. Any approv...lichess.org is the forever free, adless and open source chess server. Any approved streamer can inject arbitrary HTML into /streamer and the homepage “Live streams” widget by placing markup in their Twitch/YouTube stream title. CSP is present and blocks inline script execution, but the issue is still a server-side HTML injection sink. To trigger this, a Lichess account only needs to satisfy the normal streamer requirements and get approved. Per Streamer.canApply, that means an account older than 2 days with at least 15 games, or a verified/titled account. After moderator approval, once the streamer goes live, Lichess pulls the platform title and renders it into the UI as-is. No extra privileges are needed beyond a normal approved streamer profile. This vulnerability is fixed with commit 0d5002696ae705e1888bf77de107c73de57bb1b3. |
2026-04-06 | |
| CVE-2026-34972 | 5.0 | MEDIUM | CWE-863 | 0.0% p11 | 3.50 | OpenFGA is a high-performance and flexible authorization/permission engine built...OpenFGA is a high-performance and flexible authorization/permission engine built for developers and inspired by Google Zanzibar. From 1.8.0 to 1.13.1, under specific conditions, BatchCheck calls with multiple checks sent for the same object, relation, and user combination can result in improper policy enforcement. This vulnerability is fixed in 1.14.0. |
2026-04-06 | |
| CVE-2025-54601 | 7.0 | HIGH | CWE-362 | 0.0% p1 | 4.90 | An issue was discovered in the Wi-Fi driver in Samsung Mobile Processor amd Wear...An issue was discovered in the Wi-Fi driver in Samsung Mobile Processor amd Wearable Processor Exynos 980, 850, 1080, 1280, 1330, 1380, 1480, 1580, W920, W930, and W1000. Improper synchronization on a global variable leads to a double free. An attacker can trigger a race condition by invoking an ioctl function concurrently from multiple threads. |
2026-04-06 | |
| CVE-2026-5682 | 6.3 | MEDIUM | CWE-310 | 0.0% p3 | 4.41 | A vulnerability has been found in Meesho Online Shopping App up to 27.3 on Andro...A vulnerability has been found in Meesho Online Shopping App up to 27.3 on Android. Affected is an unknown function of the file /api/endpoint of the component com.meesho.supply. Such manipulation leads to risky cryptographic algorithm. The attack may be performed from remote. The attack requires a high level of complexity. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. |
2026-04-06 | |
| CVE-2026-5681 | 5.3 | MEDIUM | CWE-74 | 0.0% p8 | 3.71 | A flaw has been found in itsourcecode sanitize or validate this input 1.0. This ...A flaw has been found in itsourcecode sanitize or validate this input 1.0. This impacts an unknown function of the file /borrowedequip.php of the component Parameter Handler. This manipulation of the argument emp_id causes sql injection. The attack is possible to be carried out remotely. The exploit has been published and may be used. |
2026-04-06 | |
| CVE-2026-5679 | 5.1 | MEDIUM | CWE-77 | 1.4% p80 | 3.61 | A security vulnerability has been detected in Totolink A3300R 17.0.0cu.557_B2022...A security vulnerability has been detected in Totolink A3300R 17.0.0cu.557_B20221024. The impacted element is the function vsetTr069Cfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument stun_pass leads to os command injection. The exploit has been disclosed publicly and may be used. |
2026-04-06 | |
| CVE-2026-35459 | 9.3 | CRITICAL | CWE-918 | 0.0% p9 | 6.51 | pyLoad is a free and open-source download manager written in Python. In 0.5.0b3....pyLoad is a free and open-source download manager written in Python. In 0.5.0b3.dev96 and earlier, pyLoad has a server-side request forgery (SSRF) vulnerability. The fix for CVE-2026-33992 added IP validation to BaseDownloader.download() that checks the hostname of the initial download URL. However, pycurl is configured with FOLLOWLOCATION=1 and MAXREDIRS=10, causing it to automatically follow HTTP redirects. Redirect targets are never validated against the SSRF filter. An authenticated user with ADD permission can bypass the SSRF fix by submitting a URL that redirects to an internal address. |
2026-04-06 | |
| CVE-2026-35203 | 7.5 | HIGH | CWE-125 | 0.1% p16 | 5.25 | ZLMediaKit is a streaming media service framework. the VP9 RTP payload parser in...ZLMediaKit is a streaming media service framework. the VP9 RTP payload parser in ext-codec/VP9Rtp.cpp reads multiple fields from the RTP payload based on flag bits in the first byte, without verifying that sufficient data exists in the buffer. A crafted VP9 RTP packet with a 1-byte payload (0xFF, all flags set) causes the parser to read past the end of the allocated buffer, resulting in a heap-buffer-overflow. This vulnerability is fixed with commit 435dcbcbbf700fd63b2ca9eac6cef3b5ea75169d. |
2026-04-06 | |
| CVE-2026-35201 | 5.9 | MEDIUM | CWE-125 | 0.1% p16 | 4.13 | Discount is an implementation of John Gruber's Markdown markup language in C. Fr...Discount is an implementation of John Gruber's Markdown markup language in C. From 1.3.1.1 to before 2.2.7.4, a signed length truncation bug causes an out-of-bounds read in the default Markdown parse path. Inputs larger than INT_MAX are truncated to a signed int before entering the native parser, allowing the parser to read past the end of the supplied buffer and crash the process. This vulnerability is fixed in 2.2.7.4. |
2026-04-06 | |
| CVE-2026-35200 | 2.1 | LOW | CWE-436 | 0.0% p7 | 1.47 | Parse Server is an open source backend that can be deployed to any infrastructur...Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 8.6.73 and 9.7.1-alpha.4, a file can be uploaded with a filename extension that passes the file extension allowlist (e.g., .txt) but with a Content-Type header that differs from the extension (e.g., text/html). The Content-Type is passed to the storage adapter without consistency validation. Storage adapters that store and serve the provided Content-Type (such as S3 or GCS) serve the file with the mismatched Content-Type. The default GridFS adapter is not affected because it derives Content-Type from the filename at serving time. This vulnerability is fixed in 8.6.73 and 9.7.1-alpha.4. |
2026-04-06 | |
| CVE-2026-35199 | 6.1 | MEDIUM | CWE-122 | 0.1% p17 | 4.27 | SymCrypt is the core cryptographic function library currently used by Windows. F...SymCrypt is the core cryptographic function library currently used by Windows. From 103.5.0 to before 103.11.0, The SymCryptXmssSign function passes a 64-bit leaf count value to a helper function that accepts a 32-bit parameter. For XMSS^MT parameter sets with total tree height >= 32 (which includes standard predefined parameters), this causes silent truncation to zero, resulting in a drastically undersized scratch buffer allocation followed by a heap buffer overflow during signature computation. Exploiting this issue would require an application using SymCrypt to perform an XMSS^MT signature using an attacker-controlled parameter set. It is uncommon for applications to allow the use of attacker-controlled parameter sets for signing, since signing is a private key operation, and private keys must be trusted by definition. Additionally, XMSS(^MT) signing should only be performed in a Hardware Security Module (HSM). XMSS(^MT) signing is provided in SymCrypt only for testing purposes. This is a general rule irrespective of this CVE; XMSS(^MT) and other stateful signature schemes are only cryptographically secure when it is guaranteed that the same state cannot be reused for two different signatures, which cannot be guaranteed by software alone. For this reason, XMSS(^MT) signing is also not FIPS approved when performed outside of an HSM. Fixed in version 103.11.0. |
2026-04-06 | |
| CVE-2026-35197 | 6.6 | MEDIUM | CWE-94 | 0.0% p4 | 4.62 | dye is a portable and respectful color library for shell scripts. Prior to 1.1.1...dye is a portable and respectful color library for shell scripts. Prior to 1.1.1, certain dye template expressions would result in execution of arbitrary code. This issue was discovered and fixed by dye's author, and is not known to be exploited. This vulnerability is fixed in 1.1.1. |
2026-04-06 | |
| CVE-2026-35187 | 7.7 | HIGH | CWE-918 | 0.0% p8 | 5.39 | pyLoad is a free and open-source download manager written in Python. In 0.5.0b3....pyLoad is a free and open-source download manager written in Python. In 0.5.0b3.dev96 and earlier, the parse_urls API function in src/pyload/core/api/__init__.py fetches arbitrary URLs server-side via get_url(url) (pycurl) without any URL validation, protocol restriction, or IP blacklist. An authenticated user with ADD permission can make HTTP/HTTPS requests to internal network resources and cloud metadata endpoints, read local files via file:// protocol (pycurl reads the file server-side), interact with internal services via gopher:// and dict:// protocols, and enumerate file existence via error-based oracle (error 37 vs empty response). |
2026-04-06 | |
| CVE-2026-35185 | 8.7 | HIGH | CWE-284 | 0.1% p21 | 6.09 | HAX CMS helps manage microsite universe with PHP or NodeJs backends. Prior to 25...HAX CMS helps manage microsite universe with PHP or NodeJs backends. Prior to 25.0.0, the /server-status endpoint is publicly accessible and exposes sensitive information including authentication tokens (user_token), user activity, client IP addresses, and server configuration details. This allows any unauthenticated user to monitor real-time user interactions and gather internal infrastructure information. This vulnerability is fixed in 25.0.0. |
2026-04-06 | |
| CVE-2026-35184 | 8.7 | HIGH | CWE-89 | 0.0% p10 | 6.09 | EcclesiaCRM is CRM Software for church management. Prior to 8.0.0, there is a SQ...EcclesiaCRM is CRM Software for church management. Prior to 8.0.0, there is a SQL injection vulnerability in v2/templates/query/queryview.php via the custom and value parameters. This vulnerability is fixed in 8.0.0. |
2026-04-06 | |
| CVE-2026-35183 | 7.1 | HIGH | CWE-639 | 0.0% p10 | 4.97 | Brave CMS is an open-source CMS. Prior to 2.0.6, an Insecure Direct Object Refer...Brave CMS is an open-source CMS. Prior to 2.0.6, an Insecure Direct Object Reference (IDOR) vulnerability exists in the article image deletion feature. It is located in app/Http/Controllers/Dashboard/ArticleController.php within the deleteImage method. The endpoint accepts a filename from the URL but does not verify ownership. This allows an authenticated user with edit permissions to delete images attached to articles owned by other users. This vulnerability is fixed in 2.0.6. |
2026-04-06 | |
| CVE-2026-35182 | 8.8 | HIGH | CWE-862 | 0.0% p11 | 6.16 | Brave CMS is an open-source CMS. Prior to 2.0.6, this vulnerability is a missing...Brave CMS is an open-source CMS. Prior to 2.0.6, this vulnerability is a missing authorization check found in the update role endpoint at routes/web.php. The POST route for /rights/update-role/{id} lacks the checkUserPermissions:assign-user-roles middleware. This allows any authenticated user to change account roles and promote themselves to Super Admin. This vulnerability is fixed in 2.0.6. |
2026-04-06 | |
| CVE-2026-35181 | 4.3 | MEDIUM | CWE-352 | 0.0% p4 | 3.01 | WWBN AVideo is an open source video platform. In versions 26.0 and prior, the pl...WWBN AVideo is an open source video platform. In versions 26.0 and prior, the player skin configuration endpoint at admin/playerUpdate.json.php does not validate CSRF tokens. The plugins table is explicitly excluded from the ORM's domain-based security check via ignoreTableSecurityCheck(), removing the only other layer of defense. Combined with SameSite=None cookies, a cross-origin POST can modify the video player appearance on the entire platform. |
2026-04-06 | |
| CVE-2026-35180 | 4.3 | MEDIUM | CWE-352 | 0.0% p3 | 3.01 | WWBN AVideo is an open source video platform. In versions 26.0 and prior, the si...WWBN AVideo is an open source video platform. In versions 26.0 and prior, the site customization endpoint at admin/customize_settings_nativeUpdate.json.php lacks CSRF token validation and writes uploaded logo files to disk before the ORM's domain-based security check executes. Combined with SameSite=None cookie policy, a cross-origin POST can overwrite the platform's logo with attacker-controlled content. |
2026-04-06 | |
| CVE-2026-35179 | 5.3 | MEDIUM | CWE-862 | 0.1% p15 | 3.71 | WWBN AVideo is an open source video platform. In versions 26.0 and prior, the So...WWBN AVideo is an open source video platform. In versions 26.0 and prior, the SocialMediaPublisher plugin exposes a publishInstagram.json.php endpoint that acts as an unauthenticated proxy to the Facebook/Instagram Graph API. The endpoint accepts user-controlled parameters including an access token, container ID, and Instagram account ID, and passes them directly to the Graph API via InstagramUploader::publishMediaIfIsReady(). This allows any unauthenticated user to make arbitrary Graph API calls through the server, potentially using stolen tokens or abusing the platform's own credentials. |
2026-04-06 | |
| CVE-2026-35178 | 9.3 | CRITICAL | CWE-94 | 0.7% p71 | 6.53 | Workbench is a suite of tools for administrators and developers to interact with...Workbench is a suite of tools for administrators and developers to interact with Salesforce.com organizations via the Force.com APIs. Prior to 65.0.0, Workbench contains remote code execution vulnerability in the timezone conversion flow, which processes attacker-controlled cookie values in an unsafe manner. This vulnerability is fixed in 65.0.0. |
2026-04-06 | |
| CVE-2026-35176 | 7.1 | HIGH | CWE-125 | 0.0% p2 | 4.97 | openFPGALoader is a utility for programming FPGAs. In 1.1.1 and earlier, a heap-...openFPGALoader is a utility for programming FPGAs. In 1.1.1 and earlier, a heap-buffer-overflow read vulnerability exists in POFParser::parseSection() that allows out-of-bounds heap memory access when parsing a crafted .pof file. No FPGA hardware is required to trigger this vulnerability. |
2026-04-06 | |
| CVE-2026-35172 | 7.5 | HIGH | CWE-284 | 0.0% p12 | 5.25 | Distribution is a toolkit to pack, ship, store, and deliver container content. P...Distribution is a toolkit to pack, ship, store, and deliver container content. Prior to 3.1.0, distribution can restore read access in repo a after an explicit delete when storage.cache.blobdescriptor: redis and storage.delete.enabled: true are both enabled. The delete path clears the shared digest descriptor but leaves stale repo-scoped membership behind, so a later Stat or Get from repo b repopulates the shared descriptor and makes the deleted blob readable from repo a again. This vulnerability is fixed in 3.1.0. |
2026-04-06 | |
| CVE-2026-35170 | 7.1 | HIGH | CWE-125 | 0.0% p2 | 4.97 | openFPGALoader is a utility for programming FPGAs. In 1.1.1 and earlier, a heap-...openFPGALoader is a utility for programming FPGAs. In 1.1.1 and earlier, a heap-buffer-overflow read vulnerability exists in BitParser::parseHeader() that allows out-of-bounds heap memory access when parsing a crafted .bit file. No FPGA hardware is required to trigger this vulnerability. |
2026-04-06 | |
| CVE-2026-35022 | 9.3 | CRITICAL | CWE-78 | 0.3% p54 | 6.52 | Anthropic Claude Code CLI and Claude Agent SDK contain an OS command injection v...Anthropic Claude Code CLI and Claude Agent SDK contain an OS command injection vulnerability in authentication helper execution where helper configuration values are executed using shell=true without input validation. Attackers who can influence authentication settings can inject shell metacharacters through parameters like apiKeyHelper, awsAuthRefresh, awsCredentialExport, and gcpAuthRefresh to execute arbitrary commands with the privileges of the user or automation environment, enabling credential theft and environment variable exfiltration. |
2026-04-06 | |
| CVE-2026-35021 | 8.4 | HIGH | CWE-78 | 0.0% p9 | 5.88 | Anthropic Claude Code CLI and Claude Agent SDK contain an OS command injection v...Anthropic Claude Code CLI and Claude Agent SDK contain an OS command injection vulnerability in the prompt editor invocation utility that allows attackers to execute arbitrary commands by crafting malicious file paths. Attackers can inject shell metacharacters such as $() or backtick expressions into file paths that are interpolated into shell commands executed via execSync. Although the file path is wrapped in double quotes, POSIX shell semantics (POSIX §2.2.3) do not prevent command substitution within double quotes, allowing injected expressions to be evaluated and resulting in arbitrary command execution with the privileges of the user running the CLI. |
2026-04-06 | |
| CVE-2026-35020 | 8.6 | HIGH | CWE-78 | 0.1% p25 | 6.02 | Anthropic Claude Code CLI and Claude Agent SDK contain an OS command injection v...Anthropic Claude Code CLI and Claude Agent SDK contain an OS command injection vulnerability in the command lookup helper and deep-link terminal launcher that allows local attackers to execute arbitrary commands by manipulating the TERMINAL environment variable. Attackers can inject shell metacharacters into the TERMINAL variable which are interpreted by /bin/sh when the command lookup helper constructs and executes shell commands with shell=true. The vulnerability can be triggered during normal CLI execution as well as via the deep-link handler path, resulting in arbitrary command execution with the privileges of the user running the CLI. |
2026-04-06 | |
| CVE-2025-57834 | 7.5 | HIGH | CWE-20 | 0.1% p31 | 5.25 | An issue was discovered in Samsung Mobile Processor, Wearable Processor, and Mod...An issue was discovered in Samsung Mobile Processor, Wearable Processor, and Modem (Exynos 980, 850, 990, 1080, 2100, 1280, 2200, 1330, 1380, 1480, 2400, 1580, 2500, 1680, 9110, W920, W930, W1000, Modem 5123, Modem 5300, Modem 5400, and Modem 5410). The absence of proper input validation leads to a Denial of Service. |
2026-04-06 | |
| CVE-2025-54602 | 7.0 | HIGH | CWE-362 | 0.0% p1 | 4.90 | An issue was discovered in the Wi-Fi driver in Samsung Mobile Processor and Wear...An issue was discovered in the Wi-Fi driver in Samsung Mobile Processor and Wearable Processor Exynos 980, 850, 1080, 1280, 1330, 1380, 1480, 1580, W920, W930, and W1000. Improper synchronization on a global variable leads to a use-after-free. An attacker can trigger a race condition by invoking an ioctl function concurrently from multiple threads. |
2026-04-06 | |
| CVE-2025-54328 | 10.0 | CRITICAL | CWE-121 | 0.1% p20 | 7.00 | An issue was discovered in SMS in Samsung Mobile Processor, Wearable Processor, ...An issue was discovered in SMS in Samsung Mobile Processor, Wearable Processor, and Modem Exynos 980, 990, 850, 1080, 2100, 1280, 2200, 1330, 1380, 1480, 2400, 1580, 2500, 9110, W920, W930, W1000, Modem 5123, Modem 5300, and Modem 5400. A Stack-based Buffer Overflow occurs while parsing SMS RP-DATA messages. |
2026-04-06 | |
| CVE-2026-5678 | 6.9 | MEDIUM | CWE-77 | 4.9% p89 | 4.98 | A weakness has been identified in Totolink A7100RU 7.4cu.2313_b20191024. The aff...A weakness has been identified in Totolink A7100RU 7.4cu.2313_b20191024. The affected element is the function setScheduleCfg of the file /cgi-bin/cstecgi.cgi. Executing a manipulation of the argument mode can lead to os command injection. The attack may be launched remotely. The exploit has been made available to the public and could be used for attacks. |
2026-04-06 | |
| CVE-2026-5677 | 6.9 | MEDIUM | CWE-77 | 4.9% p89 | 4.98 | A security flaw has been discovered in Totolink A7100RU 7.4cu.2313_b20191024. Im...A security flaw has been discovered in Totolink A7100RU 7.4cu.2313_b20191024. Impacted is the function CsteSystem of the file /cgi-bin/cstecgi.cgi. Performing a manipulation of the argument resetFlags results in os command injection. The attack may be initiated remotely. The exploit has been released to the public and may be used for attacks. |
2026-04-06 | |
| CVE-2026-5676 | 6.9 | MEDIUM | CWE-287 | 0.1% p25 | 4.83 | A vulnerability was identified in Totolink A8000R 5.9c.681_B20180413. This issue...A vulnerability was identified in Totolink A8000R 5.9c.681_B20180413. This issue affects the function setLanguageCfg of the file /cgi-bin/cstecgi.cgi. Such manipulation of the argument langType leads to missing authentication. The attack can be launched remotely. The exploit is publicly available and might be used. |
2026-04-06 | |
| CVE-2026-33817 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: CVE confirmed to be a false positiveRejected reason: CVE confirmed to be a false positive |
2026-04-06 | |
| CVE-2026-0049 | 6.2 | MEDIUM | CWE-400 | 0.0% p0 | 4.34 | In onHeaderDecoded of LocalImageResolver.java, there is a possible persistent de...In onHeaderDecoded of LocalImageResolver.java, there is a possible persistent denial of service due to resource exhaustion. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. |
2026-04-06 | |
| CVE-2025-58349 | 9.1 | CRITICAL | CWE-400 | 0.1% p16 | 6.37 | An issue was discovered in L2 in Samsung Mobile Processor, Wearable Processor, a...An issue was discovered in L2 in Samsung Mobile Processor, Wearable Processor, and Modem Exynos 980, 990, 850, 1080, 2100, 1280, 2200, 1330, 1380, 1480, 2400, 1580, 2500, 9110, W920, W930, W1000, Modem 5123, Modem 5300, and Modem 5400. Incorrect handling of LTE MAC packets containing many MAC Control Elements (CEs) leads to baseband crashes. |
2026-04-06 | |
| CVE-2025-54324 | 7.5 | HIGH | CWE-400 | 0.1% p17 | 5.25 | An issue was discovered in NAS in Samsung Mobile Processor, Wearable Processor, ...An issue was discovered in NAS in Samsung Mobile Processor, Wearable Processor, and Modem Exynos 980, 990, 850, 1080, 2100, 1280, 2200, 1330, 1380, 1480, 2400, 1580, 2500, 9110, W920, W930, W1000, Modem 5123, Modem 5300, and Modem 5400. Incorrect Handling of a DL NAS Transport packet leads to a Denial of Service. |
2026-04-06 | |
| CVE-2025-48651 | 5.5 | MEDIUM | NVD-CWE-noinfo | 0.0% p0 | 3.85 | In importWrappedKey of KMKeymasterApplet.java, there is a possible way access ke...In importWrappedKey of KMKeymasterApplet.java, there is a possible way access keys that should be restricted due to improper input validation. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. |
2026-04-06 | |
| CVE-2026-5675 | 5.3 | MEDIUM | CWE-74 | 0.0% p8 | 3.71 | A vulnerability was found in itsourcecode Construction Management System 1.0. Th...A vulnerability was found in itsourcecode Construction Management System 1.0. This affects an unknown part of the file /borrowed_tool.php of the component Parameter Handler. The manipulation of the argument emp results in sql injection. It is possible to launch the attack remotely. The exploit has been made public and could be used. |
2026-04-06 | |
| CVE-2026-5672 | 6.9 | MEDIUM | CWE-74 | 0.0% p11 | 4.83 | A vulnerability has been found in code-projects Simple IT Discussion Forum 1.0. ...A vulnerability has been found in code-projects Simple IT Discussion Forum 1.0. Affected by this issue is some unknown functionality of the file /edit-category.php of the component Parameter Handler. The manipulation of the argument cat_id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. |
2026-04-06 | |
| CVE-2026-5671 | 5.3 | MEDIUM | CWE-79 | 0.0% p10 | 3.71 | A vulnerability was determined in Cyber-III Student-Management-System up to 1a93...A vulnerability was determined in Cyber-III Student-Management-System up to 1a938fa61e9f735078e9b291d2e6215b4942af3f. Impacted is an unknown function of the file /admin/class%20schedule/delete_batch.php of the component Class Schedule Deletion Endpoint. Executing a manipulation of the argument batch can lead to cross site scripting. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The project was informed of the problem early through an issue report but has not responded yet. |
2026-04-06 | |
| CVE-2026-35470 | 8.8 | HIGH | CWE-89 | 0.0% p9 | 6.16 | OpenSTAManager is an open source management software for technical assistance an...OpenSTAManager is an open source management software for technical assistance and invoicing. Prior to 2.10.2, confronta_righe.php files across different modules in OpenSTAManager contain an SQL Injection vulnerability. The righe parameter received via $_GET['righe'] is directly concatenated into an SQL query without any sanitization, parameterization or validation. An authenticated attacker can inject arbitrary SQL statements to extract sensitive data from the database, including user credentials, customer information, invoice data and any other stored data. This vulnerability is fixed in 2.10.2. |
2026-04-06 | |
| CVE-2026-35209 | 7.5 | HIGH | CWE-1321 | 0.0% p12 | 5.25 | defu is software that allows uers to assign default properties recursively. Prio...defu is software that allows uers to assign default properties recursively. Prior to version 6.1.5, applications that pass unsanitized user input (e.g. parsed JSON request bodies, database records, or config files from untrusted sources) as the first argument to `defu()` are vulnerable to prototype pollution. A crafted payload containing a `__proto__` key can override intended default values in the merged resul. The internal `_defu` function used `Object.assign({}, defaults)` to copy the defaults object. `Object.assign` invokes the `__proto__` setter, which replaces the resulting object's `[[Prototype]]` with attacker-controlled values. Properties inherited from the polluted prototype then bypass the existing `__proto__` key guard in the `for...in` loop and land in the final result. Version 6.1.5 replaces `Object.assign({}, defaults)` with object spread (`{ ...defaults }`), which uses `[[DefineOwnProperty]]` and does not invoke the `__proto__` setter. |
2026-04-06 | |
| CVE-2026-35177 | 4.1 | MEDIUM | CWE-22 | 0.0% p3 | 2.87 | Vim is an open source, command line text editor. Prior to 9.2.0280, a path trave...Vim is an open source, command line text editor. Prior to 9.2.0280, a path traversal bypass in Vim's zip.vim plugin allows overwriting of arbitrary files when opening specially crafted zip archives, circumventing the previous fix for CVE-2025-53906. This vulnerability is fixed in 9.2.0280. |
2026-04-06 | |
| CVE-2026-35175 | 7.2 | HIGH | CWE-862 | 0.1% p19 | 5.04 | Ajenti is a Linux and BSD modular server admin panel. Prior to 2.2.15, an authen...Ajenti is a Linux and BSD modular server admin panel. Prior to 2.2.15, an authenticated user (using the auth_users plugin authentication method) could install a custom package even if this user is not superuser. This vulnerability is fixed in 2.2.15. |
2026-04-06 | |
| CVE-2026-35174 | 9.1 | CRITICAL | CWE-22 | 0.5% p63 | 6.38 | Chyrp Lite is an ultra-lightweight blogging engine. Prior to 2026.01, a path tra...Chyrp Lite is an ultra-lightweight blogging engine. Prior to 2026.01, a path traversal vulnerability exists in the administration console that allows an administrator or a user with Change Settings permission to change the uploads path to any folder. This vulnerability allows the user to download any file on the server, including config.json.php with database credentials and overwrite critical system files, leading to remote code execution. This vulnerability is fixed in 2026.01. |
2026-04-06 | |
| CVE-2026-35173 | 6.5 | MEDIUM | CWE-639 | 0.0% p7 | 4.55 | Chyrp Lite is an ultra-lightweight blogging engine. Prior to 2026.01, an IDOR / ...Chyrp Lite is an ultra-lightweight blogging engine. Prior to 2026.01, an IDOR / Mass Assignment issue exists in the Post model that allows authenticated users with post editing permissions (Edit Post, Edit Draft, Edit Own Post, Edit Own Draft) to modify posts they do not own and do not have permission to edit. By passing internal class properties such as id into the post_attributes payload, an attacker can alter the object being instantiated. As a result, further actions are performed on another user’s post rather than the attacker’s own post, effectively enabling post takeover. This vulnerability is fixed in 2026.01. |
2026-04-06 | |
| CVE-2026-35171 | 9.8 | CRITICAL | CWE-94 | 0.4% p60 | 6.87 | Kedro is a toolbox for production-ready data science. Prior to 1.3.0, Kedro allo...Kedro is a toolbox for production-ready data science. Prior to 1.3.0, Kedro allows the logging configuration file path to be set via the KEDRO_LOGGING_CONFIG environment variable and loads it without validation. The logging configuration schema supports the special () key, which enables arbitrary callable instantiation. An attacker can exploit this to execute arbitrary system commands during application startup. This is a critical remote code execution (RCE) vulnerability caused by unsafe use of logging.config.dictConfig() with user-controlled input. This vulnerability is fixed in 1.3.0. |
2026-04-06 | |
| CVE-2026-35166 | 5.3 | MEDIUM | CWE-79 | 0.1% p19 | 3.71 | Hugo is a static site generator. From 0.60.0 to before 0.159.2, links and image ...Hugo is a static site generator. From 0.60.0 to before 0.159.2, links and image links in the default markdown to HTML renderer are not properly escaped. Hugo users who trust their Markdown content or have custom render hooks for links and images are not affected. This vulnerability is fixed in 0.159.2. |
2026-04-06 | |
| CVE-2026-35164 | 8.8 | HIGH | CWE-434 | 0.3% p52 | 6.17 | Brave CMS is an open-source CMS. Prior to 2.0.6, an unrestricted file upload vul...Brave CMS is an open-source CMS. Prior to 2.0.6, an unrestricted file upload vulnerability exists in the CKEditor upload functionality. It is found in app/Http/Controllers/Dashboard/CkEditorController.php within the ckupload method. The method fails to validate uploaded file types and relies entirely on user input. This allows an authenticated user to upload executable PHP scripts and gain Remote Code Execution. This vulnerability is fixed in 2.0.6. |
2026-04-06 | |
| CVE-2026-35052 | 5.3 | MEDIUM | CWE-79 | 0.6% p69 | 3.73 | D-Tale is the combination of a Flask back-end and a React front-end to view & an...D-Tale is the combination of a Flask back-end and a React front-end to view & analyze Pandas data structures. Prior to 3.22.0, users hosting D-Tale publicly while using a redis or shelf storage layer could be vulnerable to remote code execution allowing attackers to run malicious code on the server. This vulnerability is fixed in 3.22.0. |
2026-04-06 | |
| CVE-2026-35050 | 9.1 | CRITICAL | CWE-22 | 0.1% p22 | 6.37 | text-generation-webui is an open-source web interface for running Large Language...text-generation-webui is an open-source web interface for running Large Language Models. Prior to 4.1.1, users can save extention settings in "py" format and in the app root directory. This allows to overwrite python files, for instance the "download-model.py" file could be overwritten. Then, this python file can be triggered to get executed from "Model" menu when requesting to download a new model. This vulnerability is fixed in 4.1.1. |
2026-04-06 | |
| CVE-2026-35047 | 9.3 | CRITICAL | CWE-434 | 0.3% p56 | 6.52 | Brave CMS is an open-source CMS. Prior to 2.0.6, an Unrestricted File Upload vul...Brave CMS is an open-source CMS. Prior to 2.0.6, an Unrestricted File Upload vulnerability in the CKEditor endpoint allows attackers to upload arbitrary files, including executable scripts. This may lead to Remote Code Execution (RCE) on the server, potentially resulting in full system compromise, data exfiltration, or service disruption. All users running affected versions of BraveCMS are impacted. This vulnerability is fixed in 2.0.6. |
2026-04-06 | |
| CVE-2026-35046 | 5.4 | MEDIUM | CWE-79 | 0.0% p8 | 3.78 | Tandoor Recipes is an application for managing recipes, planning meals, and buil...Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. Prior to 2.6.4, Tandoor Recipes allows authenticated users to inject arbitrary <style> tags into recipe step instructions. The bleach.clean() sanitizer explicitly whitelists the <style> tag, causing the backend to persist and serve unsanitized CSS payloads via the API. Any client consuming instructions_markdown from the API and rendering it as HTML without additional sanitization will execute attacker-controlled CSS — enabling UI redressing, phishing overlays, visual defacement, and CSS-based data exfiltration. This vulnerability is fixed in 2.6.4. |
2026-04-06 | |
| CVE-2026-35045 | 8.1 | HIGH | CWE-639 | 0.0% p9 | 5.67 | Tandoor Recipes is an application for managing recipes, planning meals, and buil...Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. Prior to 2.6.4, the PUT /api/recipe/batch_update/ endpoint in Tandoor Recipes allows any authenticated user within a Space to modify any recipe in that Space, including recipes marked as private by other users. This bypasses all object-level authorization checks enforced on standard single-recipe endpoints (PUT /api/recipe/{id}/), enabling forced exposure of private recipes, unauthorized self-grant of access via the shared list, and metadata tampering. This vulnerability is fixed in 2.6.4. |
2026-04-06 | |
| CVE-2026-35044 | 8.8 | HIGH | CWE-1336 | 0.0% p13 | 6.16 | BentoML is a Python library for building online serving systems optimized for AI...BentoML is a Python library for building online serving systems optimized for AI apps and model inference. Prior to 1.4.38, the Dockerfile generation function generate_containerfile() in src/bentoml/_internal/container/generate.py uses an unsandboxed jinja2.Environment with the jinja2.ext.do extension to render user-provided dockerfile_template files. When a victim imports a malicious bento archive and runs bentoml containerize, attacker-controlled Jinja2 template code executes arbitrary Python directly on the host machine, bypassing all container isolation. This vulnerability is fixed in 1.4.38. |
2026-04-06 | |
| CVE-2026-35043 | 7.8 | HIGH | CWE-78 | 0.1% p17 | 5.46 | BentoML is a Python library for building online serving systems optimized for AI...BentoML is a Python library for building online serving systems optimized for AI apps and model inference. Prior to 1.4.38, the cloud deployment path in src/bentoml/_internal/cloud/deployment.py was not included in the fix for CVE-2026-33744. Line 1648 interpolates system_packages directly into a shell command using an f-string without any quoting. The generated script is uploaded to BentoCloud as setup.sh and executed on the cloud build infrastructure during deployment, making this a remote code execution on the CI/CD tier. This vulnerability is fixed in 1.4.38. |
2026-04-06 | |
| CVE-2026-30613 | 4.6 | MEDIUM | CWE-200 | 0.0% p7 | 3.22 | An information disclosure vulnerability exists in AZIOT 1 Node Smart Switch (16a...An information disclosure vulnerability exists in AZIOT 1 Node Smart Switch (16amp)- WiFi/Bluetooth Enabled Software Version: 1.1.9 due to improper access control on the UART debug interface. An attacker with physical access can connect to the UART interface and obtain sensitive information from the serial console without authentication. |
2026-04-06 | |
| CVE-2025-61166 | 6.1 | MEDIUM | CWE-601 | 0.0% p7 | 4.27 | An open redirect in Ascertia SigningHub User v10.0 allows attackers to redirect ...An open redirect in Ascertia SigningHub User v10.0 allows attackers to redirect users to a malicious site via a crafted URL. |
2026-04-06 | |
| CVE-2025-59440 | 7.5 | HIGH | CWE-400 | 0.1% p17 | 5.25 | An issue was discovered in USIM in Samsung Mobile Processor, Wearable Processor,...An issue was discovered in USIM in Samsung Mobile Processor, Wearable Processor, and Modem Exynos 980, 990, 850, 1080, 2100, 1280, 2200, 1330, 1380, 1480, 2400, 1580, 2500, 9110, W920, W930, W1000, Modem 5123, Modem 5300, and Modem 5400. Improper handling of SIM card proactive commands leads to a Denial of Service. |
2026-04-06 | |
| CVE-2025-57835 | 7.5 | HIGH | CWE-20 | 0.1% p34 | 5.25 | An issue was discovered in RRC in Samsung Mobile Processor, Wearable Processor, ...An issue was discovered in RRC in Samsung Mobile Processor, Wearable Processor, and Modem Exynos 980, 990, 850, 1080, 2100, 1280, 2200, 1330, 1380, 1480, 2400, 1580, 2500, 9110, W920, W930, W1000, Modem 5123, Modem 5300, and Modem 5400. Improper memory initialization results in an illegal memory access, causing a system crash via a malformed RRCReconfiguration message. |
2026-04-06 | |
| CVE-2026-5670 | 5.3 | MEDIUM | CWE-284 | 0.0% p12 | 3.71 | A vulnerability was found in Cyber-III Student-Management-System up to 1a938fa61...A vulnerability was found in Cyber-III Student-Management-System up to 1a938fa61e9f735078e9b291d2e6215b4942af3f. This issue affects the function move_uploaded_file of the file /AssignmentSection/submission/upload.php. Performing a manipulation of the argument File results in unrestricted upload. The attack can be initiated remotely. The exploit has been made public and could be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The project was informed of the problem early through an issue report but has not responded yet. |
2026-04-06 | |
| CVE-2026-5669 | 6.9 | MEDIUM | CWE-74 | 0.0% p11 | 4.83 | A vulnerability has been found in Cyber-III Student-Management-System up to 1a93...A vulnerability has been found in Cyber-III Student-Management-System up to 1a938fa61e9f735078e9b291d2e6215b4942af3f. This vulnerability affects unknown code of the file /login.php of the component Parameter Handler. Such manipulation of the argument Password leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The project was informed of the problem early through an issue report but has not responded yet. |
2026-04-06 | |
| CVE-2026-5668 | 4.8 | MEDIUM | CWE-79 | 0.0% p9 | 3.36 | A flaw has been found in Cyber-III Student-Management-System up to 1a938fa61e9f7...A flaw has been found in Cyber-III Student-Management-System up to 1a938fa61e9f735078e9b291d2e6215b4942af3f. This affects an unknown part of the file /admin/Add%20notice/add%20notice.php. This manipulation of the argument $_SERVER['PHP_SELF'] causes cross site scripting. It is possible to initiate the attack remotely. The exploit has been published and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The project was informed of the problem early through an issue report but has not responded yet. |
2026-04-06 | |
| CVE-2026-35042 | 7.5 | HIGH | CWE-345 | 0.0% p5 | 5.25 | fast-jwt provides fast JSON Web Token (JWT) implementation. In 6.1.0 and earlier...fast-jwt provides fast JSON Web Token (JWT) implementation. In 6.1.0 and earlier, fast-jwt does not validate the crit (Critical) Header Parameter defined in RFC 7515 §4.1.11. When a JWS token contains a crit array listing extensions that fast-jwt does not understand, the library accepts the token instead of rejecting it. This violates the MUST requirement in the RFC. |
2026-04-06 | |
| CVE-2026-35039 | 9.1 | CRITICAL | CWE-345 | 0.0% p9 | 6.37 | fast-jwt provides fast JSON Web Token (JWT) implementation. From 0.0.1 to before...fast-jwt provides fast JSON Web Token (JWT) implementation. From 0.0.1 to before 6.2.0, setting up a custom cacheKeyBuilder method which does not properly create unique keys for different tokens can lead to cache collisions. This could cause tokens to be mis-identified during the verification process leading to valid tokens returning claims from different valid tokens and users being mis-identified as other users based on the wrong token. Version 6.2.0 contains a patch. |
2026-04-06 | |
| CVE-2026-35037 | 7.2 | HIGH | CWE-918 | 0.0% p12 | 5.04 | Ech0 is an open-source, self-hosted publishing platform for personal idea sharin...Ech0 is an open-source, self-hosted publishing platform for personal idea sharing. Prior to 4.2.8, the GET /api/website/title endpoint accepts an arbitrary URL via the website_url query parameter and makes a server-side HTTP request to it without any validation of the target host or IP address. The endpoint requires no authentication. An attacker can use this to reach internal network services, cloud metadata endpoints (169.254.169.254), and localhost-bound services, with partial response data exfiltrated via the HTML <title> tag extraction This vulnerability is fixed in 4.2.8. |
2026-04-06 | |
| CVE-2026-35036 | 7.5 | HIGH | CWE-918 | 0.0% p13 | 5.25 | Ech0 is an open-source, self-hosted publishing platform for personal idea sharin...Ech0 is an open-source, self-hosted publishing platform for personal idea sharing. Prior to 4.2.8, Ech0 implements link preview (editor fetches a page title) through GET /api/website/title. That is legitimate product behavior, but the implementation is unsafe: the route is unauthenticated, accepts a fully attacker-controlled URL, performs a server-side GET, reads the entire response body into memory (io.ReadAll). There is no host allowlist, no SSRF filter, and InsecureSkipVerify: true on the outbound client. Anyone who can reach the instance can force the Ech0 server to open HTTP/HTTPS URLs of their choice as seen from the server’s network position (Docker bridge, VPC, localhost from the process view). This vulnerability is fixed in 4.2.8. |
2026-04-06 | |
| CVE-2026-35035 | 7.2 | HIGH | CWE-79 | 0.1% p26 | 5.04 | CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, mo...CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to 0.31.2.0, the application fails to properly sanitize user-controlled input within System Settings – Company Information. Several administrative configuration fields accept attacker-controlled input that is stored server-side and later rendered without proper output encoding. These values are persisted in the database and rendered unsafely on public-facing pages only, such as the main landing page. There is no execution in the administrative dashboard—the vulnerability only impacts the public frontend. This vulnerability is fixed in 0.31.2.0. |
2026-04-06 | |
| CVE-2026-35030 | 9.4 | CRITICAL | CWE-287 | 0.1% p24 | 6.58 | LiteLLM is a proxy server (AI Gateway) to call LLM APIs in OpenAI (or native) fo...LiteLLM is a proxy server (AI Gateway) to call LLM APIs in OpenAI (or native) format. Prior to 1.83.0, when JWT authentication is enabled (enable_jwt_auth: true), the OIDC userinfo cache uses token[:20] as the cache key. JWT headers produced by the same signing algorithm generate identical first 20 characters. This configuration option is not enabled by default. Most instances are not affected. An unauthenticated attacker can craft a token whose first 20 characters match a legitimate user's cached token. On cache hit, the attacker inherits the legitimate user's identity and permissions. This affects deployments with JWT/OIDC authentication enabled. Fixed in v1.83.0. |
2026-04-06 | |
| CVE-2026-35029 | 8.7 | HIGH | CWE-863 | 0.2% p41 | 6.10 | LiteLLM is a proxy server (AI Gateway) to call LLM APIs in OpenAI (or native) fo...LiteLLM is a proxy server (AI Gateway) to call LLM APIs in OpenAI (or native) format. Prior to 1.83.0, the /config/update endpoint does not enforce admin role authorization. A user who is already authenticated into the platform can then use this endpoint to modify proxy configuration and environment variables, register custom pass-through endpoint handlers pointing to attacker-controlled Python code, achieving remote code execution, read arbitrary server files by setting UI_LOGO_PATH and fetching via /get_image, and take over other privileged accounts by overwriting UI_USERNAME and UI_PASSWORD environment variables. Fixed in v1.83.0. |
2026-04-06 | |
| CVE-2026-34992 | 7.1 | HIGH | CWE-311 | 0.0% p0 | 4.97 | Antrea is a Kubernetes networking solution intended to be Kubernetes native. Pri...Antrea is a Kubernetes networking solution intended to be Kubernetes native. Prior to 2.4.5 and 2.5.2, a missing encryption vulnerability affects inter-Node Pod traffic. In Antrea clusters configured for dual-stack networking with IPsec encryption enabled (trafficEncryptionMode: ipsec), Antrea fails to apply encryption for IPv6 Pod traffic. While the IPv4 traffic is correctly encrypted via ESP (Encapsulating Security Payload), traffic using IPv6 is transmitted in plaintext. This occurs because the packets are encapsulated (using Geneve or VXLAN) but bypass the IPsec encryption layer. Impacted Users: users with dual-stack clusters and IPsec encryption enabled. Single-stack IPv4 or IPv6 clusters are not affected. This vulnerability is fixed in 2.4.5 and 2.5.2. |
2026-04-06 | |
| CVE-2026-34989 | 9.4 | CRITICAL | CWE-79 | 0.1% p16 | 6.58 | CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, mo...CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to 31.0.0.0, the application fails to properly sanitize user-controlled input when users update their profile name (e.g., full name / username). An attacker can inject a malicious JavaScript payload into their profile name, which is then stored server-side. This stored payload is later rendered unsafely in multiple application views without proper output encoding, leading to stored cross-site scripting (XSS). This vulnerability is fixed in 31.0.0.0. |
2026-04-06 | |
| CVE-2026-34986 | 7.5 | HIGH | CWE-248 | 0.0% p5 | 5.25 | Go JOSE provides an implementation of the Javascript Object Signing and Encrypti...Go JOSE provides an implementation of the Javascript Object Signing and Encryption set of standards in Go, including support for JSON Web Encryption (JWE), JSON Web Signature (JWS), and JSON Web Token (JWT) standards. Prior to 4.1.4 and 3.0.5, decrypting a JSON Web Encryption (JWE) object will panic if the alg field indicates a key wrapping algorithm (one ending in KW, with the exception of A128GCMKW, A192GCMKW, and A256GCMKW) and the encrypted_key field is empty. The panic happens when cipher.KeyUnwrap() in key_wrap.go attempts to allocate a slice with a zero or negative length based on the length of the encrypted_key. This code path is reachable from ParseEncrypted() / ParseEncryptedJSON() / ParseEncryptedCompact() followed by Decrypt() on the resulting object. Note that the parse functions take a list of accepted key algorithms. If the accepted key algorithms do not include any key wrapping algorithms, parsing will fail and the application will be unaffected. This panic is also reachable by calling cipher.KeyUnwrap() directly with any ciphertext parameter less than 16 bytes long, but calling this function directly is less common. Panics can lead to denial of service. This vulnerability is fixed in 4.1.4 and 3.0.5. |
2026-04-06 | |
| CVE-2026-34981 | 5.8 | MEDIUM | CWE-918 | 0.0% p10 | 4.06 | The whisperX API is a tool for enhancing and analyzing audio content. From 0.3.1...The whisperX API is a tool for enhancing and analyzing audio content. From 0.3.1 to 0.5.0, FileService.download_from_url() in app/services/file_service.py calls requests.get(url) with zero URL validation. The file extension check occurs AFTER the HTTP request is already made, and can be bypassed by appending .mp3 to any internal URL. The /speech-to-text-url endpoint is unauthenticated. This vulnerability is fixed in 0.6.0. |
2026-04-06 | |
| CVE-2026-34977 | 9.3 | CRITICAL | CWE-78 | 0.1% p29 | 6.51 | Aperi'Solve is an open-source steganalysis web platform. Prior to 3.2.1, when up...Aperi'Solve is an open-source steganalysis web platform. Prior to 3.2.1, when uploading a JPEG, a user can specify an optional password to accompany the JPEG. This password is then directly passed into an expect command, which is then subsequently passed into a bash -c command, without any form of sanitization or validation. An unauthenticated attacker can achieve root-level RCE inside the worker container with a single HTTP request, enabling full read/write access to all user-uploaded images, analysis results, and plaintext steganography passwords stored on disk. Because the container shares a Docker network with PostgreSQL and Redis (no authentication on either), the attacker can pivot to dump the entire database or manipulate the job queue to poison results for other users. If Docker socket mounting or host volume mounts are present, this could escalate to full host compromise. This would also include defacement of the website itself. This vulnerability is fixed in 3.2.1. |
2026-04-06 | |
| CVE-2026-34976 | 10.0 | CRITICAL | CWE-862 | 0.0% p12 | 7.00 | Dgraph is an open source distributed GraphQL database. Prior to 25.3.1, the rest...Dgraph is an open source distributed GraphQL database. Prior to 25.3.1, the restoreTenant admin mutation is missing from the authorization middleware config (admin.go), making it completely unauthenticated. Unlike the similar restore mutation which requires Guardian-of-Galaxy authentication, restoreTenant executes with zero middleware. This mutation accepts attacker-controlled backup source URLs (including file:// for local filesystem access), S3/MinIO credentials, encryption key file paths, and Vault credential file paths. An unauthenticated attacker can overwrite the entire database, read server-side files, and perform SSRF. This vulnerability is fixed in 25.3.1. |
2026-04-06 | |
| CVE-2026-34975 | 8.5 | HIGH | CWE-93 | 0.0% p10 | 5.95 | Plunk is an open-source email platform built on top of AWS SES. Prior to 0.8.0, ...Plunk is an open-source email platform built on top of AWS SES. Prior to 0.8.0, a CRLF header injection vulnerability was discovered in SESService.ts, where user-supplied values for from.name, subject, custom header keys/values, and attachment filenames were interpolated directly into raw MIME messages without sanitization. An authenticated API user could inject arbitrary email headers (e.g. Bcc, Reply-To) by embedding carriage return/line feed characters in these fields, enabling silent email forwarding, reply redirection, or sender spoofing. The fix adds input validation at the schema level to reject any of these fields containing \r or \n characters, consistent with the existing validation already applied to the contentId field. This vulnerability is fixed in 0.8.0. |
2026-04-06 | |
| CVE-2026-34841 | 9.8 | CRITICAL | CWE-494 | 0.0% p7 | 6.86 | Bruno is an open source IDE for exploring and testing APIs. Prior to 3.2.1, Brun...Bruno is an open source IDE for exploring and testing APIs. Prior to 3.2.1, Bruno was affected by a supply chain attack involving compromised versions of the axios npm package, which introduced a hidden dependency deploying a cross-platform Remote Access Trojan (RAT). Users of @usebruno/cli who ran npm install between 00:21 UTC and ~03:30 UTC on March 31, 2026 may have been impacted. Upgrade to 3.2.1 |
2026-04-06 | |
| CVE-2026-34783 | 8.1 | HIGH | CWE-22 | 0.1% p33 | 5.67 | Ferret is a declarative system for working with web data. Prior to 2.0.0-alpha.4...Ferret is a declarative system for working with web data. Prior to 2.0.0-alpha.4, a path traversal vulnerability in Ferret's IO::FS::WRITE standard library function allows a malicious website to write arbitrary files to the filesystem of the machine running Ferret. When an operator scrapes a website that returns filenames containing ../ sequences, and uses those filenames to construct output paths (a standard scraping pattern), the attacker controls both the destination path and the file content. This can lead to remote code execution via cron jobs, SSH authorized_keys, shell profiles, or web shells. This vulnerability is fixed in 2.0.0-alpha.4. |
2026-04-06 | |
| CVE-2026-31313 | 5.4 | MEDIUM | CWE-79 | 0.0% p9 | 3.78 | An authenticated stored cross-site scripting (XSS) vulnerability in the creation...An authenticated stored cross-site scripting (XSS) vulnerability in the creation/editing module of Feehi CMS v2.1.1 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the Content field. |
2026-04-06 | |
| CVE-2026-5704 | 5.0 | MEDIUM | CWE-434 | 0.0% p6 | 3.50 | A flaw was found in tar. A remote attacker could exploit this vulnerability by c...A flaw was found in tar. A remote attacker could exploit this vulnerability by crafting a malicious archive, leading to hidden file injection with fully attacker-controlled content. This bypasses pre-extraction inspection mechanisms, potentially allowing an attacker to introduce malicious files onto a system without detection. |
2026-04-06 | |
| CVE-2026-5666 | 5.5 | MEDIUM | CWE-200 | 0.0% p12 | 3.85 | A vulnerability was detected in code-projects Online FIR System 1.0. Affected by...A vulnerability was detected in code-projects Online FIR System 1.0. Affected by this issue is some unknown functionality of the file /complaints.sql of the component SQL Database Backup File Handler. The manipulation results in insecure storage of sensitive information. The attack may be performed from remote. The exploit is now public and may be used. |
2026-04-06 | |
| CVE-2026-5665 | 6.9 | MEDIUM | CWE-74 | 0.0% p11 | 4.83 | A security vulnerability has been detected in code-projects Online FIR System 1....A security vulnerability has been detected in code-projects Online FIR System 1.0. Affected by this vulnerability is an unknown functionality of the file /Login/checklogin.php of the component Login. The manipulation of the argument email/password leads to sql injection. The attack is possible to be carried out remotely. The exploit has been disclosed publicly and may be used. |
2026-04-06 | |
| CVE-2026-34982 | 8.2 | HIGH | CWE-78 | 0.0% p5 | 5.74 | Vim is an open source, command line text editor. Prior to version 9.2.0276, a mo...Vim is an open source, command line text editor. Prior to version 9.2.0276, a modeline sandbox bypass in Vim allows arbitrary OS command execution when a user opens a crafted file. The `complete`, `guitabtooltip` and `printheader` options are missing the `P_MLE` flag, allowing a modeline to be executed. Additionally, the `mapset()` function lacks a `check_secure()` call, allowing it to be abused from sandboxed expressions. Commit 9.2.0276 fixes the issue. |
2026-04-06 | |
| CVE-2026-34969 | 2.3 | LOW | CWE-200 | 0.1% p17 | 1.61 | Nhost is an open source Firebase alternative with GraphQL. Prior to 0.48.0, the ...Nhost is an open source Firebase alternative with GraphQL. Prior to 0.48.0, the auth service's OAuth provider callback flow places the refresh token directly into the redirect URL as a query parameter. Refresh tokens in URLs are logged in browser history, server access logs, HTTP Referer headers, and proxy/CDN logs. Note that the refresh token is one-time use and all of these leak vectors are on owned infrastructure or services integrated by the application developer. This vulnerability is fixed in 0.48.0. |
2026-04-06 | |
| CVE-2026-34951 | 5.1 | MEDIUM | CWE-79 | 0.0% p9 | 3.57 | Workbench is a suite of tools for administrators and developers to interact with...Workbench is a suite of tools for administrators and developers to interact with Salesforce.com organizations via the Force.com APIs. Prior to 65.0.0, Workbench contains a reflected cross-site scripting vulnerability via the footerScripts parameter, which does not sanitize user-supplied input before rendering it in the page response. Improper neutralization of input during web page generation ('cross-site scripting') vulnerability in Workbench allows XSS Targeting Error Pages. This vulnerability is fixed in 65.0.0. |
2026-04-06 | |
| CVE-2026-34950 | 9.1 | CRITICAL | CWE-327 | 0.0% p4 | 6.37 | fast-jwt provides fast JSON Web Token (JWT) implementation. In 6.1.0 and earlier...fast-jwt provides fast JSON Web Token (JWT) implementation. In 6.1.0 and earlier, the publicKeyPemMatcher regex in fast-jwt/src/crypto.js uses a ^ anchor that is defeated by any leading whitespace in the key string, re-enabling the exact same JWT algorithm confusion attack that CVE-2023-48223 patched. |
2026-04-06 | |
| CVE-2026-34940 | 8.7 | HIGH | CWE-78 | 0.1% p18 | 6.09 | KubeAI is an AI inference operator for kubernetes. Prior to 0.23.2, the ollamaSt...KubeAI is an AI inference operator for kubernetes. Prior to 0.23.2, the ollamaStartupProbeScript() function in internal/modelcontroller/engine_ollama.go constructs a shell command string using fmt.Sprintf with unsanitized model URL components (ref, modelParam). This shell command is executed via bash -c as a Kubernetes startup probe. An attacker who can create or update Model custom resources can inject arbitrary shell commands that execute inside model server pods. This vulnerability is fixed in 0.23.2. |
2026-04-06 | |
| CVE-2026-34764 | 2.3 | LOW | CWE-416 | 0.0% p4 | 1.61 | Electron is a framework for writing cross-platform desktop applications using Ja...Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. From 33.0.0-alpha.1 to before 39.8.5, 40.8.5, 41.1.0, and 42.0.0-alpha.5, apps that use offscreen rendering with GPU shared textures may be vulnerable to a use-after-free. Under certain conditions, the release() callback provided on a paint event texture can outlive its backing native state, and invoking it after that point dereferences freed memory in the main process, which may lead to a crash or memory corruption. Apps are only affected if they use offscreen rendering with webPreferences.offscreen: { useSharedTexture: true }. Apps that do not enable shared-texture offscreen rendering are not affected. To mitigate this issue, ensure texture.release() is called promptly after the texture has been consumed, before the texture object becomes unreachable. This vulnerability is fixed in 39.8.5, 40.8.5, 41.1.0, and 42.0.0-alpha.5. |
2026-04-06 | |
| CVE-2026-34756 | 6.5 | MEDIUM | CWE-770 | 0.0% p8 | 4.55 | vLLM is an inference and serving engine for large language models (LLMs). From 0...vLLM is an inference and serving engine for large language models (LLMs). From 0.1.0 to before 0.19.0, a Denial of Service vulnerability exists in the vLLM OpenAI-compatible API server. Due to the lack of an upper bound validation on the n parameter in the ChatCompletionRequest and CompletionRequest Pydantic models, an unauthenticated attacker can send a single HTTP request with an astronomically large n value. This completely blocks the Python asyncio event loop and causes immediate Out-Of-Memory crashes by allocating millions of request object copies in the heap before the request even reaches the scheduling queue. This vulnerability is fixed in 0.19.0. |
2026-04-06 | |
| CVE-2026-34755 | 6.5 | MEDIUM | CWE-770 | 0.0% p13 | 4.55 | vLLM is an inference and serving engine for large language models (LLMs). From 0...vLLM is an inference and serving engine for large language models (LLMs). From 0.7.0 to before 0.19.0, the VideoMediaIO.load_base64() method at vllm/multimodal/media/video.py splits video/jpeg data URLs by comma to extract individual JPEG frames, but does not enforce a frame count limit. The num_frames parameter (default: 32), which is enforced by the load_bytes() code path, is completely bypassed in the video/jpeg base64 path. An attacker can send a single API request containing thousands of comma-separated base64-encoded JPEG frames, causing the server to decode all frames into memory and crash with OOM. This vulnerability is fixed in 0.19.0. |
2026-04-06 | |
| CVE-2026-34589 | 8.4 | HIGH | CWE-190 | 0.0% p7 | 5.88 | OpenEXR provides the specification and reference implementation of the EXR file ...OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. From 3.2.0 to before 3.2.7, 3.3.9, and 3.4.9, the DWA lossy decoder constructs temporary per-component block pointers using signed 32-bit arithmetic. For a large enough width, the calculation overflows and later decoder stores operate on a wrapped pointer outside the allocated rowBlock backing store. This vulnerability is fixed in 3.2.7, 3.3.9, and 3.4.9. |
2026-04-06 | |
| CVE-2026-34588 | 8.6 | HIGH | CWE-125 | 0.0% p6 | 6.02 | OpenEXR provides the specification and reference implementation of the EXR file ...OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. From 3.1.0 to before 3.2.7, 3.3.9, and 3.4.9, internal_exr_undo_piz() advances the working wavelet pointer with signed 32-bit arithmetic. Because nx, ny, and wcount are int, a crafted EXR file can make this product overflow and wrap. The next channel then decodes from an incorrect address. The wavelet decode path operates in place, so this yields both out-of-bounds reads and out-of-bounds writes. This vulnerability is fixed in 3.2.7, 3.3.9, and 3.4.9. |
2026-04-06 | |
| CVE-2026-34444 | 7.9 | HIGH | CWE-284 | 0.1% p25 | 5.53 | Lupa integrates the runtimes of Lua or LuaJIT2 into CPython. In 2.6 and earlier,...Lupa integrates the runtimes of Lua or LuaJIT2 into CPython. In 2.6 and earlier, attribute_filter is not consistently applied when attributes are accessed through built-in functions like getattr and setattr. This allows an attacker to bypass the intended restrictions and eventually achieve arbitrary code execution. |
2026-04-06 | |
| CVE-2026-34402 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-...Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2026-39330. Reason: This candidate is a duplicate of CVE-2026-39330. Notes: All CVE users should reference CVE-2026-39330 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.another CVE. |
2026-04-06 | |
| CVE-2026-34380 | 5.9 | MEDIUM | CWE-190 | 0.0% p14 | 4.13 | OpenEXR provides the specification and reference implementation of the EXR file ...OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. From 3.2.0 to before 3.2.7, 3.3.9, and 3.4.9, a signed integer overflow exists in undo_pxr24_impl() in src/lib/OpenEXRCore/internal_pxr24.c at line 377. The expression (uint64_t)(w * 3) computes w * 3 as a signed 32-bit integer before casting to uint64_t. When w is large, this multiplication constitutes undefined behavior under the C standard. On tested builds (clang/gcc without sanitizers), two's-complement wraparound commonly occurs, and for specific values of w the wrapped result is a small positive integer, which may allow the subsequent bounds check to pass incorrectly. If the check is bypassed, the decoding loop proceeds to write pixel data through dout, potentially extending far beyond the allocated output buffer. This vulnerability is fixed in 3.2.7, 3.3.9, and 3.4.9. |
2026-04-06 | |
| CVE-2026-34379 | 7.1 | HIGH | CWE-704 | 0.1% p18 | 4.97 | OpenEXR provides the specification and reference implementation of the EXR file ...OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. From 3.2.0 to before 3.2.7, 3.3.9, and 3.4.9, a misaligned memory write vulnerability exists in LossyDctDecoder_execute() in src/lib/OpenEXRCore/internal_dwa_decoder.h:749. When decoding a DWA or DWAB-compressed EXR file containing a FLOAT-type channel, the decoder performs an in-place HALF→FLOAT conversion by casting an unaligned uint8_t * row pointer to float * and writing through it. Because the row buffer may not be 4-byte aligned, this constitutes undefined behavior under the C standard and crashes immediately on architectures that enforce alignment (ARM, RISC-V, etc.). On x86 it is silently tolerated at runtime but remains exploitable via compiler optimizations that assume aligned access. This vulnerability is fixed in 3.2.7, 3.3.9, and 3.4.9. |
2026-04-06 | |
| CVE-2026-34378 | 6.5 | MEDIUM | CWE-190 | 0.0% p10 | 4.55 | OpenEXR provides the specification and reference implementation of the EXR file ...OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. From 3.4.0 to before 3.4.9, a missing bounds check on the dataWindow attribute in EXR file headers allows an attacker to trigger a signed integer overflow in generic_unpack(). By setting dataWindow.min.x to a large negative value, OpenEXRCore computes an enormous image width, which is later used in a signed integer multiplication that overflows, causing the process to terminate with SIGILL via UBSan. This vulnerability is fixed in 3.4.9. |
2026-04-06 | |
| CVE-2026-34217 | 6.9 | MEDIUM | CWE-668 | 0.1% p20 | 4.83 | SandboxJS is a JavaScript sandboxing library. Prior to 0.8.36, a scope modificat...SandboxJS is a JavaScript sandboxing library. Prior to 0.8.36, a scope modification vulnerability exists in @nyariv/sandboxjs. The vulnerability allows untrusted sandboxed code to leak internal interpreter objects through the new operator, exposing sandbox scope objects in the scope hierarchy to untrusted code; an unexpected and undesired exploit. While this could allow modifying scopes inside the sandbox, code evaluation remains sandboxed and prototypes remain protected throughout the execution. This vulnerability is fixed in 0.8.36. |
2026-04-06 | |
| CVE-2026-34211 | 6.9 | MEDIUM | CWE-674 | 0.1% p17 | 4.83 | SandboxJS is a JavaScript sandboxing library. Prior to 0.8.36, the @nyariv/sandb...SandboxJS is a JavaScript sandboxing library. Prior to 0.8.36, the @nyariv/sandboxjs parser contains unbounded recursion in the restOfExp function and the lispify/lispifyExpr call chain. An attacker can crash any Node.js process that parses untrusted input by supplying deeply nested expressions (e.g., ~2000 nested parentheses), causing a RangeError: Maximum call stack size exceeded that terminates the process. This vulnerability is fixed in 0.8.36. |
2026-04-06 | |
| CVE-2026-34208 | 10.0 | CRITICAL | CWE-693 | 0.2% p39 | 7.01 | SandboxJS is a JavaScript sandboxing library. Prior to 0.8.36, SandboxJS blocks ...SandboxJS is a JavaScript sandboxing library. Prior to 0.8.36, SandboxJS blocks direct assignment to global objects (for example Math.random = ...), but this protection can be bypassed through an exposed callable constructor path: this.constructor.call(target, attackerObject). Because this.constructor resolves to the internal SandboxGlobal function and Function.prototype.call is allowed, attacker code can write arbitrary properties into host global objects and persist those mutations across sandbox instances in the same process. This vulnerability is fixed in 0.8.36. |
2026-04-06 | |
| CVE-2026-34148 | 7.5 | HIGH | CWE-400 | 0.1% p18 | 5.25 | Fedify is a TypeScript library for building federated server apps powered by Act...Fedify is a TypeScript library for building federated server apps powered by ActivityPub. Prior to 1.9.6, 1.10.5, 2.0.8, and 2.1.1, @fedify/fedify follows HTTP redirects recursively in its remote document loader and authenticated document loader without enforcing a maximum redirect count or visited-URL loop detection. An attacker who controls a remote ActivityPub key or actor URL can force a server using Fedify to make repeated outbound requests from a single inbound request, leading to resource consumption and denial of service. This vulnerability is fixed in 1.9.6, 1.10.5, 2.0.8, and 2.1.1. |
2026-04-06 | |
| CVE-2026-33752 | 8.6 | HIGH | CWE-918 | 0.0% p2 | 6.02 | curl_cffi is the a Python binding for curl. Prior to 0.15.0, curl_cffi does not ...curl_cffi is the a Python binding for curl. Prior to 0.15.0, curl_cffi does not restrict requests to internal IP ranges, and follows redirects automatically via the underlying libcurl. Because of this, an attacker-controlled URL can redirect requests to internal services such as cloud metadata endpoints. In addition, curl_cffi’s TLS impersonation feature can make these requests appear as legitimate browser traffic, which may bypass certain network controls. This vulnerability is fixed in 0.15.0. |
2026-04-06 | |
| CVE-2026-33727 | 6.4 | MEDIUM | CWE-269 | 0.0% p3 | 4.48 | Pi-hole is a Linux network-level advertisement and Internet tracker blocking app...Pi-hole is a Linux network-level advertisement and Internet tracker blocking application. Version 6.4 has a local privilege-escalation vulnerability allows code execution as root from the low-privilege pihole account. Important context: the pihole account uses nologin, so this is not a direct interactive-login issue. However, nologin does not prevent code from running as UID pihole if a Pi-hole component is compromised. In that realistic post-compromise scenario, attacker-controlled content in /etc/pihole/versions is sourced by root-run Pi-hole scripts, leading to root code execution. This vulnerability is fixed in 6.4.1. |
2026-04-06 | |
| CVE-2026-33405 | 3.1 | LOW | CWE-79 | 0.0% p8 | 2.17 | Pi-hole Admin Interface is a web interface for managing Pi-hole, a network-level...Pi-hole Admin Interface is a web interface for managing Pi-hole, a network-level ad and internet tracker blocking application. From 6.0 to before 6.5, the formatInfo() function in queries.js renders data.upstream, data.client.ip, and data.ede.text into HTML without escaping when a user expands a query row in the Query Log, enabling stored HTML injection. JavaScript execution is blocked by the server's CSP (script-src 'self'). The same fields are properly escaped in the table view (rowCallback), confirming the omission was an oversight. This vulnerability is fixed in 6.5. |
2026-04-06 | |
| CVE-2026-31354 | 5.4 | MEDIUM | CWE-79 | 0.0% p6 | 3.78 | Multiple authenticated stored cross-site scripting (XSS) vulnerabilities in the ...Multiple authenticated stored cross-site scripting (XSS) vulnerabilities in the Permissions module of Feehi CMS v2.1.1 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the Group, Category or Description parameters. |
2026-04-06 | |
| CVE-2026-31353 | 5.4 | MEDIUM | CWE-79 | 0.0% p7 | 3.78 | An authenticated stored cross-site scripting (XSS) vulnerability in the Category...An authenticated stored cross-site scripting (XSS) vulnerability in the Category module of Feehi CMS v2.1.1 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the Name parameter. |
2026-04-06 | |
| CVE-2026-31352 | 5.4 | MEDIUM | CWE-79 | 0.0% p9 | 3.78 | An authenticated stored cross-site scripting (XSS) vulnerability in the Role Man...An authenticated stored cross-site scripting (XSS) vulnerability in the Role Management module of Feehi CMS v2.1.1 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the Role Name parameter. |
2026-04-06 | |
| CVE-2026-31351 | 4.8 | MEDIUM | CWE-79 | 0.0% p8 | 3.36 | An authenticated stored cross-site scripting (XSS) vulnerability in the creation...An authenticated stored cross-site scripting (XSS) vulnerability in the creation/editing module of Feehi CMS v2.1.1 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the Title parameter. |
2026-04-06 | |
| CVE-2026-31350 | 5.4 | MEDIUM | CWE-79 | 0.0% p9 | 3.78 | An authenticated stored cross-site scripting (XSS) vulnerability in Feehi CMS v2...An authenticated stored cross-site scripting (XSS) vulnerability in Feehi CMS v2.1.1 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the Page Sign parameter. |
2026-04-06 | |
| CVE-2026-21382 | 7.8 | HIGH | CWE-120 | 0.0% p1 | 5.46 | Memory Corruption when handling power management requests with improperly sized ...Memory Corruption when handling power management requests with improperly sized input/output buffers. |
2026-04-06 | |
| CVE-2026-21381 | 7.6 | HIGH | CWE-126 | 0.0% p8 | 5.32 | Transient DOS when receiving a service data frame with excessive length during d...Transient DOS when receiving a service data frame with excessive length during device matching over a neighborhood awareness network protocol connection. |
2026-04-06 | |
| CVE-2026-21380 | 7.8 | HIGH | CWE-416 | 0.0% p1 | 5.46 | Memory Corruption when using deprecated DMABUF IOCTL calls to manage video memor...Memory Corruption when using deprecated DMABUF IOCTL calls to manage video memory. |
2026-04-06 | |
| CVE-2026-21378 | 7.8 | HIGH | CWE-126 | 0.0% p1 | 5.46 | Memory Corruption when accessing an output buffer without validating its size du...Memory Corruption when accessing an output buffer without validating its size during IOCTL processing in a camera sensor driver. |
2026-04-06 | |
| CVE-2026-21376 | 7.8 | HIGH | CWE-126 | 0.0% p0 | 5.46 | Memory Corruption when accessing an output buffer without validating its size du...Memory Corruption when accessing an output buffer without validating its size during IOCTL processing in a camera sensor driver. |
2026-04-06 | |
| CVE-2026-21375 | 7.8 | HIGH | CWE-126 | 0.0% p1 | 5.46 | Memory Corruption when accessing an output buffer without validating its size du...Memory Corruption when accessing an output buffer without validating its size during IOCTL processing. |
2026-04-06 | |
| CVE-2026-21374 | 7.8 | HIGH | CWE-126 | 0.0% p0 | 5.46 | Memory Corruption when processing auxiliary sensor input/output control commands...Memory Corruption when processing auxiliary sensor input/output control commands with insufficient buffer size validation. |
2026-04-06 | |
| CVE-2026-21373 | 7.8 | HIGH | CWE-126 | 0.0% p1 | 5.46 | Memory Corruption when accessing an output buffer without validating its size du...Memory Corruption when accessing an output buffer without validating its size during IOCTL processing. |
2026-04-06 | |
| CVE-2026-21372 | 7.8 | HIGH | CWE-122 | 0.0% p0 | 5.46 | Memory Corruption when sending IOCTL requests with invalid buffer sizes during m...Memory Corruption when sending IOCTL requests with invalid buffer sizes during memcpy operations. |
2026-04-06 | |
| CVE-2026-21371 | 7.8 | HIGH | CWE-126 | 0.0% p0 | 5.46 | Memory Corruption when retrieving output buffer with insufficient size validatio...Memory Corruption when retrieving output buffer with insufficient size validation. |
2026-04-06 | |
| CVE-2026-21367 | 7.6 | HIGH | CWE-126 | 0.0% p8 | 5.32 | Transient DOS when processing nonstandard FILS Discovery Frames with out-of-rang...Transient DOS when processing nonstandard FILS Discovery Frames with out-of-range action sizes during initial scans. |
2026-04-06 | |
| CVE-2025-47400 | 7.1 | HIGH | CWE-126 | 0.0% p0 | 4.97 | Cryptographic issue while copying data to a destination buffer without validatin...Cryptographic issue while copying data to a destination buffer without validating its size. |
2026-04-06 | |
| CVE-2025-47392 | 8.8 | HIGH | CWE-190 | 0.0% p0 | 6.16 | Memory corruption when decoding corrupted satellite data files with invalid sign...Memory corruption when decoding corrupted satellite data files with invalid signature offsets. |
2026-04-06 | |
| CVE-2025-47391 | 7.8 | HIGH | CWE-121 | 0.0% p0 | 5.46 | Memory corruption while processing a frame request from user.Memory corruption while processing a frame request from user. |
2026-04-06 | |
| CVE-2025-47390 | 7.8 | HIGH | CWE-126 | 0.0% p0 | 5.46 | Memory corruption while preprocessing IOCTL request in JPEG driver.Memory corruption while preprocessing IOCTL request in JPEG driver. |
2026-04-06 | |
| CVE-2025-47389 | 7.8 | HIGH | CWE-120 | 0.0% p0 | 5.46 | Memory corruption when buffer copy operation fails due to integer overflow durin...Memory corruption when buffer copy operation fails due to integer overflow during attestation report generation. |
2026-04-06 | |
| CVE-2025-47374 | 6.5 | MEDIUM | CWE-416 | 0.0% p2 | 4.55 | Memory Corruption when accessing freed memory due to concurrent fence deregistra...Memory Corruption when accessing freed memory due to concurrent fence deregistration and signal handling. |
2026-04-06 | |
| CVE-2024-14032 | 8.5 | HIGH | CWE-862 | 0.0% p1 | 5.95 | Twitch Studio version 0.114.8 and prior contain a privilege escalation vulnerabi...Twitch Studio version 0.114.8 and prior contain a privilege escalation vulnerability in its privileged helper tool that allows local attackers to execute arbitrary code as root by exploiting an unprotected XPC service. Attackers can invoke the installFromPath:toPath:withReply: method to overwrite system files and privileged binaries, achieving full system compromise. Twitch Studio was discontinued in May 2024. |
2026-04-06 | |
| CVE-2026-5664 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-...Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2026-30078. Reason: This candidate is a reservation duplicate of CVE-2026-30078. Notes: All CVE users should reference CVE-2026-30078 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage. |
2026-04-06 | |
| CVE-2026-5663 | 6.9 | MEDIUM | CWE-77 | 1.8% p82 | 4.88 | A security flaw has been discovered in OFFIS DCMTK up to 3.7.0. This impacts the...A security flaw has been discovered in OFFIS DCMTK up to 3.7.0. This impacts the function executeOnReception/executeOnEndOfStudy of the file dcmnet/apps/storescp.cc of the component storescp. Performing a manipulation results in os command injection. Remote exploitation of the attack is possible. The patch is named edbb085e45788dccaf0e64d71534cfca925784b8. Applying a patch is the recommended action to fix this issue. |
2026-04-06 | |
| CVE-2026-5661 | 5.5 | MEDIUM | CWE-404 | 0.1% p22 | 3.85 | A vulnerability was identified in Free5GC 4.2.0. This affects an unknown functio...A vulnerability was identified in Free5GC 4.2.0. This affects an unknown function of the component NGSetupRequest Handler. Such manipulation leads to denial of service. The attack may be launched remotely. The exploit is publicly available and might be used. |
2026-04-06 | |
| CVE-2026-34897 | 6.5 | MEDIUM | CWE-79 | 0.0% p9 | 4.55 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in David Lingren Media LIbrary Assistant allows Stored XSS.This issue affects Media LIbrary Assistant: from n/a through 3.34. |
2026-04-06 | |
| CVE-2026-34885 | 8.5 | HIGH | CWE-89 | 5.7% p90 | 6.12 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti...Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in David Lingren Media LIbrary Assistant allows SQL Injection.This issue affects Media LIbrary Assistant: from n/a through 3.34. |
2026-04-06 | |
| CVE-2026-33540 | 7.5 | HIGH | CWE-918 | 0.0% p10 | 5.25 | Distribution is a toolkit to pack, ship, store, and deliver container content. P...Distribution is a toolkit to pack, ship, store, and deliver container content. Prior to 3.1.0, in pull-through cache mode, distribution discovers token auth endpoints by parsing WWW-Authenticate challenges returned by the configured upstream registry. The realm URL from a bearer challenge is used without validating that it matches the upstream registry host. As a result, an attacker-controlled upstream (or an attacker with MitM position to the upstream) can cause distribution to send the configured upstream credentials via basic auth to an attacker-controlled realm URL. This vulnerability is fixed in 3.1.0. |
2026-04-06 | |
| CVE-2026-33510 | 8.8 | HIGH | CWE-87 | 0.0% p14 | 6.16 | Homarr is an open-source dashboard. Prior to 1.57.0, a DOM-based Cross-Site Scri...Homarr is an open-source dashboard. Prior to 1.57.0, a DOM-based Cross-Site Scripting (XSS) vulnerability has been discovered in Homarr's /auth/login page. The application improperly trusts a URL parameter (callbackUrl), which is passed to redirect and router.push. An attacker can craft a malicious link that, when opened by an authenticated user, performs a client-side redirect and executes arbitrary JavaScript in the context of their browser. This could lead to credential theft, internal network pivoting, and unauthorized actions performed on behalf of the victim. This vulnerability is fixed in 1.57.0. |
2026-04-06 | |
| CVE-2026-33406 | 5.4 | MEDIUM | CWE-79 | 0.0% p11 | 3.78 | Pi-hole Admin Interface is a web interface for managing Pi-hole, a network-level...Pi-hole Admin Interface is a web interface for managing Pi-hole, a network-level ad and internet tracker blocking application. From 6.0 to before 6.5, configuration values from the /api/config endpoint are placed directly into HTML value="" attributes without escaping in settings-advanced.js, enabling HTML attribute injection. A double quote in any config value breaks out of the attribute context. JavaScript execution is blocked by the server's CSP (script-src 'self'), but injected attributes can alter element styling for UI redressing. The primary attack vector is importing a malicious teleporter backup, which bypasses per-field server-side validation. This vulnerability is fixed in 6.5. |
2026-04-06 | |
| CVE-2026-33404 | 3.4 | LOW | CWE-79 | 0.0% p6 | 2.38 | Pi-hole Admin Interface is a web interface for managing Pi-hole, a network-level...Pi-hole Admin Interface is a web interface for managing Pi-hole, a network-level ad and internet tracker blocking application. From 6.0 to before 6.5, client hostnames and IP addresses from the FTL database are rendered into the DOM without escaping in network.js (Network page) and charts.js/index.js (Dashboard chart tooltips). While upstream validation in dnsmasq and FTL blocks HTML characters via normal DHCP/DNS paths, the web UI performs no output escaping — an inconsistency with other fields in the same file that are properly escaped. This vulnerability is fixed in 6.5. |
2026-04-06 | |
| CVE-2026-33403 | 6.1 | MEDIUM | CWE-79 | 0.1% p20 | 4.27 | Pi-hole Admin Interface is a web interface for managing Pi-hole, a network-level...Pi-hole Admin Interface is a web interface for managing Pi-hole, a network-level ad and internet tracker blocking application. From 6.0 to before 6.5, a reflected DOM-based XSS vulnerability in taillog.js allows an unauthenticated attacker to inject arbitrary HTML into the Pi-hole admin interface by crafting a malicious URL. The file query parameter is interpolated into an innerHTML assignment without escaping. Because the Content-Security-Policy is missing the form-action directive, injected <form> elements can exfiltrate credentials to an external origin. This vulnerability is fixed in 6.5. |
2026-04-06 | |
| CVE-2026-32602 | 4.2 | MEDIUM | CWE-367 | 0.0% p8 | 2.94 | Homarr is an open-source dashboard. Prior to 1.57.0, the user registration endpo...Homarr is an open-source dashboard. Prior to 1.57.0, the user registration endpoint (/api/trpc/user.register) is vulnerable to a race condition that allows an attacker to create multiple user accounts from a single-use invite token. The registration flow performs three sequential database operations without a transaction: CHECK, CREATE, and DELETE. Because these operations are not atomic, concurrent requests can all pass the validation step (1) before any of them reaches the deletion step (3). This allows multiple accounts to be registered using a single invite token that was intended to be single-use. This vulnerability is fixed in 1.57.0. |
2026-04-06 | |
| CVE-2026-31153 | 5.4 | MEDIUM | CWE-79 | 0.0% p8 | 3.78 | A stored cross-site scripting (XSS) vulnerability in Bynder v0.1.394 allows atta...A stored cross-site scripting (XSS) vulnerability in Bynder v0.1.394 allows attackers to execute arbitrary web scripts or HTML via a crafted payload. |
2026-04-06 | |
| CVE-2026-31151 | 9.8 | CRITICAL | CWE-288 | 0.1% p16 | 6.86 | An issue in the login mechanism of Kaleris YMS v7.2.2.1 allows attackers to bypa...An issue in the login mechanism of Kaleris YMS v7.2.2.1 allows attackers to bypass login verification to access the application 's resources. |
2026-04-06 | |
| CVE-2026-31150 | 4.3 | MEDIUM | CWE-284 | 0.0% p7 | 3.01 | Incorrect access control in Kaleris YMS v7.2.2.1 allows authenticated attackers ...Incorrect access control in Kaleris YMS v7.2.2.1 allows authenticated attackers with only the shipping/receiving role to view the truck's dashboard resources. |
2026-04-06 | |
| CVE-2026-31067 | 6.8 | MEDIUM | CWE-78 | 0.1% p35 | 4.76 | A remote command execution (RCE) vulnerability in the /goform/formReleaseConnect...A remote command execution (RCE) vulnerability in the /goform/formReleaseConnect component of UTT Aggressive 520W v3v1.7.7-180627 allows attackers to execute arbitrary commands via a crafted string. |
2026-04-06 | |
| CVE-2026-31066 | 4.5 | MEDIUM | CWE-120 | 0.0% p3 | 3.15 | UTT Aggressive HiPER 810G v3v1.7.7-171114 was discovered to contain a buffer ove...UTT Aggressive HiPER 810G v3v1.7.7-171114 was discovered to contain a buffer overflow in the selDateType parameter of the formTaskEdit function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. |
2026-04-06 | |
| CVE-2026-31065 | 4.5 | MEDIUM | CWE-120 | 0.0% p3 | 3.15 | UTT Aggressive 520W v3v1.7.7-180627 was discovered to contain a buffer overflow ...UTT Aggressive 520W v3v1.7.7-180627 was discovered to contain a buffer overflow in the addCommand parameter of the formConfigCliForEngineerOnly function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. |
2026-04-06 | |
| CVE-2026-31063 | 4.5 | MEDIUM | CWE-120 | 0.0% p3 | 3.15 | UTT Aggressive HiPER 1200GW v2.5.3-170306 was discovered to contain a buffer ove...UTT Aggressive HiPER 1200GW v2.5.3-170306 was discovered to contain a buffer overflow in the pools parameter of the formArpBindConfig function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. |
2026-04-06 | |
| CVE-2026-31062 | 4.5 | MEDIUM | CWE-120 | 0.0% p3 | 3.15 | UTT Aggressive 520W v3v1.7.7-180627 was discovered to contain a buffer overflow ...UTT Aggressive 520W v3v1.7.7-180627 was discovered to contain a buffer overflow in the filename parameter of the formFtpServerDirConfig function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. |
2026-04-06 | |
| CVE-2026-31061 | 4.5 | MEDIUM | CWE-120 | 0.0% p3 | 3.15 | UTT Aggressive HiPER 810G v3v1.7.7-171114 was discovered to contain a buffer ove...UTT Aggressive HiPER 810G v3v1.7.7-171114 was discovered to contain a buffer overflow in the timestart parameter of the ConfigAdvideo function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. |
2026-04-06 | |
| CVE-2026-31060 | 4.5 | MEDIUM | CWE-120 | 0.0% p3 | 3.15 | UTT Aggressive HiPER 810G v3v1.7.7-171114 was discovered to contain a buffer ove...UTT Aggressive HiPER 810G v3v1.7.7-171114 was discovered to contain a buffer overflow in the notes parameter of the formGroupConfig function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. |
2026-04-06 | |
| CVE-2026-31059 | 9.8 | CRITICAL | CWE-77 | 0.6% p68 | 6.88 | A remote command execution (RCE) vulnerability in the /goform/formDia component ...A remote command execution (RCE) vulnerability in the /goform/formDia component of UTT Aggressive HiPER 520W v3v1.7.7-180627 allows attackers to execute arbitrary commands via a crafted string. |
2026-04-06 | |
| CVE-2026-31058 | 4.5 | MEDIUM | CWE-120 | 0.0% p3 | 3.15 | UTT Aggressive HiPER 1200GW v2.5.3-170306 was discovered to contain a buffer ove...UTT Aggressive HiPER 1200GW v2.5.3-170306 was discovered to contain a buffer overflow in the timeRangeName parameter of the formConfigDnsFilterGlobal function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. |
2026-04-06 | |
| CVE-2026-31053 | 6.2 | MEDIUM | CWE-415 | 0.0% p2 | 4.34 | A double free vulnerability exists in librz/bin/format/le/le.c in the function l...A double free vulnerability exists in librz/bin/format/le/le.c in the function le_load_fixup_record(). When processing malformed or circular LE fixup chains, relocation entries may be freed multiple times during error handling. A specially crafted LE binary can trigger heap corruption and cause the application to crash, resulting in a denial-of-service condition. An attacker with a crafted binary could cause a denial of service when the tool is integrated on a service pipeline. |
2026-04-06 | |
| CVE-2026-29047 | 7.2 | HIGH | CWE-89 | 0.0% p8 | 5.04 | GLPI is a free asset and IT management software package. From 10.0.0 to before 1...GLPI is a free asset and IT management software package. From 10.0.0 to before 10.0.24 and 11.0.6, an authenticated user can perform a SQL injection via the logs export feature. This vulnerability is fixed in 10.0.24 and 11.0.6. |
2026-04-06 | |
| CVE-2026-26263 | 8.1 | HIGH | CWE-89 | 0.0% p11 | 5.67 | GLPI is a free asset and IT management software package. From 11.0.0 to before 1...GLPI is a free asset and IT management software package. From 11.0.0 to before 11.0.6, an unauthenticated time-based blind SQL injection exists in GLPI's Search engine. This vulnerability is fixed in 11.0.6. |
2026-04-06 | |
| CVE-2026-26027 | 7.5 | HIGH | CWE-79 | 0.0% p13 | 5.25 | GLPI is a free asset and IT management software package. From 11.0.0 to before 1...GLPI is a free asset and IT management software package. From 11.0.0 to before 11.0.6, an unauthenticated user can store an XSS payload through the inventory endpoint. This vulnerability is fixed in 11.0.6. |
2026-04-06 | |
| CVE-2026-26026 | 9.1 | CRITICAL | CWE-94 | 0.1% p18 | 6.37 | GLPI is a free asset and IT management software package. From 11.0.0 to before 1...GLPI is a free asset and IT management software package. From 11.0.0 to before 11.0.6, template injection by an administrator lead to RCE. This vulnerability is fixed in 11.0.6. |
2026-04-06 | |
| CVE-2026-25932 | 7.2 | HIGH | CWE-79 | 0.0% p9 | 5.04 | GLPI is a Free Asset and IT Management Software package. From 0.60 to before 10....GLPI is a Free Asset and IT Management Software package. From 0.60 to before 10.0.24, an authenticated technician user can store an XSS payload in a supplier fields. This vulnerability is fixed in 10.0.24. |
2026-04-06 | |
| CVE-2026-5660 | 5.3 | MEDIUM | CWE-74 | 0.0% p8 | 3.71 | A vulnerability was determined in itsourcecode Construction Management System 1....A vulnerability was determined in itsourcecode Construction Management System 1.0. The impacted element is an unknown function of the file /borrowed_equip.php of the component Parameter Handler. This manipulation of the argument emp causes sql injection. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized. |
2026-04-06 | |
| CVE-2026-5659 | 5.3 | MEDIUM | CWE-20 | 0.0% p15 | 3.71 | A vulnerability was found in pytries datrie up to 0.8.3. The affected element is...A vulnerability was found in pytries datrie up to 0.8.3. The affected element is the function Trie.load/Trie.read/Trie.__setstate__ of the file src/datrie.pyx of the component trie File Handler. The manipulation results in deserialization. The attack can be launched remotely. The exploit has been made public and could be used. The project was informed of the problem early through an issue report but has not responded yet. |
2026-04-06 | |
| CVE-2026-30078 | 7.5 | HIGH | CWE-20 | 0.1% p19 | 5.25 | OpenAirInterface V2.2.0 AMF crashes when it receives an NGAP message with invali...OpenAirInterface V2.2.0 AMF crashes when it receives an NGAP message with invalid procedure code or invalid PDU-type. For example when the message specification requires InitiatingMessage but sent with successfulOutcome. |
2026-04-06 | |
| CVE-2026-3524 | 8.8 | HIGH | CWE-862 | 0.0% p3 | 6.16 | Mattermost Plugin Legal Hold versions <=1.1.4 fail to halt request processing af...Mattermost Plugin Legal Hold versions <=1.1.4 fail to halt request processing after a failed authorization check in ServeHTTP which allows an authenticated attacker to access, create, download, and delete legal hold data via crafted API requests to the plugin's endpoints. Mattermost Advisory ID: MMSA-2026-00621 |
2026-04-06 | |
| CVE-2026-5650 | 5.5 | MEDIUM | CWE-200 | 0.0% p12 | 3.85 | A vulnerability was found in code-projects Online Application System for Admissi...A vulnerability was found in code-projects Online Application System for Admission 1.0. Impacted is an unknown function of the file /enrollment/database/oas.sql. Performing a manipulation results in insecure storage of sensitive information. The attack is possible to be carried out remotely. The exploit has been made public and could be used. |
2026-04-06 | |
| CVE-2026-5649 | 5.3 | MEDIUM | CWE-74 | 0.0% p1 | 3.71 | A vulnerability has been found in code-projects Online Application System for Ad...A vulnerability has been found in code-projects Online Application System for Admission 1.0. This issue affects some unknown processing of the file /enrollment/admsnform.php of the component Endpoint. Such manipulation leads to sql injection. The attack can be executed remotely. The exploit has been disclosed to the public and may be used. |
2026-04-06 | |
| CVE-2026-5648 | 6.9 | MEDIUM | CWE-74 | 0.0% p11 | 4.83 | A flaw has been found in code-projects Simple Laundry System 1.0. This vulnerabi...A flaw has been found in code-projects Simple Laundry System 1.0. This vulnerability affects unknown code of the file /userfinishregister.php of the component Parameter Handler. This manipulation of the argument firstName causes sql injection. Remote exploitation of the attack is possible. The exploit has been published and may be used. |
2026-04-06 | |
| CVE-2026-5647 | 4.8 | MEDIUM | CWE-79 | 0.0% p9 | 3.36 | A vulnerability was detected in code-projects Online Shoe Store 1.0. This affect...A vulnerability was detected in code-projects Online Shoe Store 1.0. This affects an unknown part of the file /admin/admin_feature.php of the component Add Product Page. The manipulation of the argument product_name results in cross site scripting. The attack may be launched remotely. The exploit is now public and may be used. |
2026-04-06 | |
| CVE-2026-5646 | 6.9 | MEDIUM | CWE-74 | 0.0% p1 | 4.83 | A security vulnerability has been detected in code-projects Easy Blog Site 1.0. ...A security vulnerability has been detected in code-projects Easy Blog Site 1.0. Affected by this issue is some unknown functionality of the file login.php. The manipulation of the argument username/password leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used. |
2026-04-06 | |
| CVE-2026-5645 | 6.9 | MEDIUM | CWE-74 | 0.0% p10 | 4.83 | A weakness has been identified in projectworlds Car Rental System 1.0. Affected ...A weakness has been identified in projectworlds Car Rental System 1.0. Affected by this vulnerability is an unknown functionality of the file /pay.php of the component Parameter Handler. Executing a manipulation of the argument mpesa can lead to sql injection. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks. |
2026-04-06 | |
| CVE-2026-5673 | 5.6 | MEDIUM | CWE-125 | 0.0% p1 | 3.92 | A flaw was found in libtheora. This heap-based out-of-bounds read vulnerability ...A flaw was found in libtheora. This heap-based out-of-bounds read vulnerability exists within the AVI (Audio Video Interleave) parser, specifically in the avi_parse_input_file() function. A local attacker could exploit this by tricking a user into opening a specially crafted AVI file containing a truncated header sub-chunk. This could lead to a denial-of-service (application crash) or potentially leak sensitive information from the heap. |
2026-04-06 | |
| CVE-2026-5644 | 4.8 | MEDIUM | CWE-79 | 0.0% p9 | 3.36 | A security flaw has been discovered in Cyber-III Student-Management-System up to...A security flaw has been discovered in Cyber-III Student-Management-System up to 1a938fa61e9f735078e9b291d2e6215b4942af3f. Affected is an unknown function of the file /admin/Add%20notice/batch-notice.php. Performing a manipulation of the argument $_SERVER['PHP_SELF'] results in cross site scripting. The attack can be initiated remotely. The exploit has been released to the public and may be used for attacks. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The project was informed of the problem early through an issue report but has not responded yet. |
2026-04-06 | |
| CVE-2026-5643 | 4.8 | MEDIUM | CWE-79 | 0.0% p9 | 3.36 | A vulnerability was identified in Cyber-III Student-Management-System up to 1a93...A vulnerability was identified in Cyber-III Student-Management-System up to 1a938fa61e9f735078e9b291d2e6215b4942af3f. This impacts an unknown function of the file /admin/Add%20notice/notice.php of the component Admin Add Endpoint. Such manipulation of the argument $_SERVER['PHP_SELF'] leads to cross site scripting. It is possible to launch the attack remotely. The exploit is publicly available and might be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The project was informed of the problem early through an issue report but has not responded yet. |
2026-04-06 | |
| CVE-2026-5642 | 6.9 | MEDIUM | CWE-266 | 0.1% p16 | 4.83 | A vulnerability was determined in Cyber-III Student-Management-System up to 1a93...A vulnerability was determined in Cyber-III Student-Management-System up to 1a938fa61e9f735078e9b291d2e6215b4942af3f. This affects an unknown function of the file /viva/update.php of the component HTTP POST Request Handler. This manipulation of the argument Name causes improper authorization. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The project was informed of the problem early through an issue report but has not responded yet. |
2026-04-06 | |
| CVE-2026-5641 | 5.3 | MEDIUM | CWE-74 | 0.0% p8 | 3.71 | A vulnerability was found in PHPGurukul Online Shopping Portal Project 2.1. The ...A vulnerability was found in PHPGurukul Online Shopping Portal Project 2.1. The impacted element is an unknown function of the file /admin/update-image1.php of the component Parameter Handler. The manipulation of the argument filename results in sql injection. The attack may be performed from remote. The exploit has been made public and could be used. |
2026-04-06 | |
| CVE-2026-5640 | 5.3 | MEDIUM | CWE-74 | 0.0% p8 | 3.71 | A vulnerability has been found in PHPGurukul Online Shopping Portal Project 2.1....A vulnerability has been found in PHPGurukul Online Shopping Portal Project 2.1. The affected element is an unknown function of the file /admin/update-image2.php of the component Parameter Handler. The manipulation of the argument filename leads to sql injection. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used. |
2026-04-06 | |
| CVE-2026-5639 | 5.3 | MEDIUM | CWE-74 | 0.0% p1 | 3.71 | A flaw has been found in PHPGurukul Online Shopping Portal Project 2.1. Impacted...A flaw has been found in PHPGurukul Online Shopping Portal Project 2.1. Impacted is an unknown function of the file /admin/update-image3.php of the component Parameter Handler. Executing a manipulation of the argument filename can lead to sql injection. The attack can be executed remotely. The exploit has been published and may be used. |
2026-04-06 | |
| CVE-2026-5638 | 5.5 | MEDIUM | CWE-22 | 0.1% p19 | 3.85 | A vulnerability was detected in HerikLyma CPPWebFramework up to 3.1. This issue ...A vulnerability was detected in HerikLyma CPPWebFramework up to 3.1. This issue affects some unknown processing. Performing a manipulation results in path traversal. Remote exploitation of the attack is possible. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet. |
2026-04-06 | |
| CVE-2026-5637 | 6.9 | MEDIUM | CWE-74 | 0.0% p10 | 4.83 | A security vulnerability has been detected in projectworlds Car Rental System 1....A security vulnerability has been detected in projectworlds Car Rental System 1.0. This vulnerability affects unknown code of the file /message_admin.php of the component Parameter Handler. Such manipulation of the argument Message leads to sql injection. The attack may be launched remotely. The exploit has been disclosed publicly and may be used. |
2026-04-06 | |
| CVE-2026-37977 | 3.7 | LOW | CWE-346 | 0.0% p0 | 2.59 | A flaw was found in Keycloak. A remote attacker can exploit a Cross-Origin Resou...A flaw was found in Keycloak. A remote attacker can exploit a Cross-Origin Resource Sharing (CORS) header injection vulnerability in Keycloak's User-Managed Access (UMA) token endpoint. This flaw occurs because the `azp` claim from a client-supplied JSON Web Token (JWT) is used to set the `Access-Control-Allow-Origin` header before the JWT signature is validated. When a specially crafted JWT with an attacker-controlled `azp` value is processed, this value is reflected as the CORS origin, even if the grant is later rejected. This can lead to the exposure of low-sensitivity information from authorization server error responses, weakening origin isolation, but only when a target client is misconfigured with `webOrigins: ["*"]`. |
2026-04-06 | |
| CVE-2026-5636 | 5.3 | MEDIUM | CWE-74 | 0.0% p1 | 3.71 | A weakness has been identified in PHPGurukul Online Shopping Portal Project 2.1....A weakness has been identified in PHPGurukul Online Shopping Portal Project 2.1. This affects an unknown part of the file /cancelorder.php of the component Parameter Handler. This manipulation of the argument oid causes sql injection. The attack may be initiated remotely. The exploit has been made available to the public and could be used for attacks. |
2026-04-06 | |
| CVE-2026-5635 | 5.3 | MEDIUM | CWE-74 | 0.0% p1 | 3.71 | A security flaw has been discovered in PHPGurukul Online Shopping Portal Project...A security flaw has been discovered in PHPGurukul Online Shopping Portal Project 2.1. Affected by this issue is some unknown functionality of the file /categorywise-products.php of the component Parameter Handler. The manipulation of the argument cid results in sql injection. The attack can be launched remotely. The exploit has been released to the public and may be used for attacks. |
2026-04-06 | |
| CVE-2026-5634 | 6.9 | MEDIUM | CWE-74 | 0.0% p10 | 4.83 | A vulnerability was identified in projectworlds Car Rental Project 1.0. Affected...A vulnerability was identified in projectworlds Car Rental Project 1.0. Affected by this vulnerability is an unknown functionality of the file /book_car.php of the component Parameter Handler. The manipulation of the argument fname leads to sql injection. The attack can be initiated remotely. The exploit is publicly available and might be used. |
2026-04-06 | |
| CVE-2026-5633 | 6.9 | MEDIUM | CWE-918 | 0.1% p16 | 4.83 | A vulnerability was determined in assafelovic gpt-researcher up to 3.4.3. Affect...A vulnerability was determined in assafelovic gpt-researcher up to 3.4.3. Affected is an unknown function of the component ws Endpoint. Executing a manipulation of the argument source_urls can lead to server-side request forgery. It is possible to launch the attack remotely. The exploit has been publicly disclosed and may be utilized. The project was informed of the problem early through an issue report but has not responded yet. |
2026-04-06 | |
| CVE-2026-5632 | 6.9 | MEDIUM | CWE-287 | 0.1% p23 | 4.83 | A vulnerability was found in assafelovic gpt-researcher up to 3.4.3. This impact...A vulnerability was found in assafelovic gpt-researcher up to 3.4.3. This impacts an unknown function of the component HTTP REST API Endpoint. Performing a manipulation results in missing authentication. It is possible to initiate the attack remotely. The exploit has been made public and could be used. The project was informed of the problem early through an issue report but has not responded yet. |
2026-04-06 | |
| CVE-2026-5631 | 6.9 | MEDIUM | CWE-74 | 0.1% p19 | 4.83 | A vulnerability has been found in assafelovic gpt-researcher up to 3.4.3. This a...A vulnerability has been found in assafelovic gpt-researcher up to 3.4.3. This affects the function extract_command_data of the file backend/server/server_utils.py of the component ws Endpoint. Such manipulation of the argument args leads to code injection. The attack may be performed from remote. The exploit has been disclosed to the public and may be used. The project was informed of the problem early through an issue report but has not responded yet. |
2026-04-06 | |
| CVE-2026-5630 | 5.3 | MEDIUM | CWE-79 | 0.0% p1 | 3.71 | A flaw has been found in assafelovic gpt-researcher up to 3.4.3. The impacted el...A flaw has been found in assafelovic gpt-researcher up to 3.4.3. The impacted element is an unknown function of the file backend/server/app.py of the component Report API. This manipulation causes cross site scripting. The attack is possible to be carried out remotely. The exploit has been published and may be used. The project was informed of the problem early through an issue report but has not responded yet. |
2026-04-06 | |
| CVE-2026-5629 | 7.4 | HIGH | CWE-119 | 0.0% p14 | 5.18 | A vulnerability was detected in Belkin F9K1015 1.00.10. The affected element is ...A vulnerability was detected in Belkin F9K1015 1.00.10. The affected element is the function formSetFirewall of the file /goform/formSetFirewall. The manipulation of the argument webpage results in stack-based buffer overflow. The attack can be executed remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-04-06 | |
| CVE-2026-5628 | 7.4 | HIGH | CWE-119 | 0.0% p14 | 5.18 | A security vulnerability has been detected in Belkin F9K1015 1.00.10. Impacted i...A security vulnerability has been detected in Belkin F9K1015 1.00.10. Impacted is the function formSetSystemSettings of the file /goform/formSetSystemSettings of the component Setting Handler. The manipulation of the argument webpage leads to stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-04-06 | |
| CVE-2026-5625 | 5.3 | MEDIUM | CWE-79 | 0.0% p10 | 3.71 | A weakness has been identified in assafelovic gpt-researcher up to 3.4.3. This i...A weakness has been identified in assafelovic gpt-researcher up to 3.4.3. This issue affects some unknown processing of the file gpt_researcher/skills/researcher.py of the component WebSocket Interface. Executing a manipulation of the argument task can lead to cross site scripting. The attack may be launched remotely. The exploit has been made available to the public and could be used for attacks. The project was informed of the problem early through an issue report but has not responded yet. |
2026-04-06 | |
| CVE-2026-5624 | 5.3 | MEDIUM | CWE-352 | 0.0% p4 | 3.71 | A security flaw has been discovered in ProjectSend r2002. This vulnerability aff...A security flaw has been discovered in ProjectSend r2002. This vulnerability affects unknown code of the file upload.php. Performing a manipulation results in cross-site request forgery. The attack may be initiated remotely. The exploit has been released to the public and may be used for attacks. Upgrading to version r2029 is able to resolve this issue. The patch is named 2c0d25824ab571b6c219ac1a188ad9350149661b. You should upgrade the affected component. |
2026-04-06 | |
| CVE-2026-5623 | 5.3 | MEDIUM | CWE-918 | 0.0% p10 | 3.71 | A vulnerability was identified in hcengineering Huly Platform 0.7.382. This affe...A vulnerability was identified in hcengineering Huly Platform 0.7.382. This affects an unknown part of the file server/front/src/index.ts of the component Import Endpoint. Such manipulation leads to server-side request forgery. The attack can be launched remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-04-06 | |
| CVE-2026-5621 | 4.8 | MEDIUM | CWE-77 | 0.5% p65 | 3.37 | A vulnerability was found in ChrisChinchilla Vale-MCP up to 0.1.0. Affected by t...A vulnerability was found in ChrisChinchilla Vale-MCP up to 0.1.0. Affected by this vulnerability is an unknown functionality of the file src/index.ts of the component HTTP Interface. The manipulation of the argument config_path results in os command injection. Attacking locally is a requirement. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-04-06 | |
| CVE-2026-5620 | 5.3 | MEDIUM | CWE-74 | 0.0% p10 | 3.71 | A vulnerability has been found in itsourcecode Construction Management System 1....A vulnerability has been found in itsourcecode Construction Management System 1.0. Affected is an unknown function of the file /borrowed_equip_report.php of the component Parameter Handler. The manipulation of the argument Home leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. |
2026-04-06 | |
| CVE-2026-5619 | 4.8 | MEDIUM | CWE-77 | 0.5% p65 | 3.37 | A flaw has been found in Braffolk mcp-summarization-functions up to 0.1.5. This ...A flaw has been found in Braffolk mcp-summarization-functions up to 0.1.5. This impacts an unknown function of the file src/server/mcp-server.ts of the component summarize_command. Executing a manipulation of the argument command can lead to os command injection. The attack requires local access. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-04-06 | |
| CVE-2026-5618 | 6.3 | MEDIUM | CWE-918 | 0.1% p15 | 4.41 | A vulnerability was detected in kalcaddle kodbox up to 1.64. This affects an unk...A vulnerability was detected in kalcaddle kodbox up to 1.64. This affects an unknown function of the component shareMake/shareCheck. Performing a manipulation of the argument siteFrom/siteTo results in server-side request forgery. The attack is possible to be carried out remotely. The complexity of an attack is rather high. The exploitability is reported as difficult. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-04-06 | |
| CVE-2026-5616 | 6.9 | MEDIUM | CWE-287 | 0.1% p30 | 4.83 | A security vulnerability has been detected in JeecgBoot 3.9.0/3.9.1. The impacte...A security vulnerability has been detected in JeecgBoot 3.9.0/3.9.1. The impacted element is an unknown function of the file jeecg-boot/jeecg-module-system/jeecg-system-biz/src/main/java/org/jeecg/modules/airag/JeecgBizToolsProvider.java of the component AI Chat Module. Such manipulation leads to missing authentication. The attack can be executed remotely. The name of the patch is b7c9aeba7aefda9e008ea8fe4fc3daf08d0c5b39/2c1cc88b8d983868df8c520a343d6ff4369d9e59. It is best practice to apply a patch to resolve this issue. The project fixed the issue with a commit which shall be part of the next official release. |
2026-04-06 | |
| CVE-2026-5615 | 5.3 | MEDIUM | CWE-79 | 1.9% p83 | 3.77 | A weakness has been identified in givanz Vvvebjs up to 2.0.5. The affected eleme...A weakness has been identified in givanz Vvvebjs up to 2.0.5. The affected element is an unknown function of the file upload.php of the component File Upload Endpoint. This manipulation of the argument uploadAllowExtensions causes cross site scripting. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be used for attacks. Patch name: 8cac22cff99b8bc701c408aa8e887fa702755336. Applying a patch is the recommended action to fix this issue. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product. |
2026-04-06 | |
| CVE-2026-5614 | 7.4 | HIGH | CWE-119 | 0.0% p14 | 5.18 | A security flaw has been discovered in Belkin F9K1015 1.00.10. Impacted is the f...A security flaw has been discovered in Belkin F9K1015 1.00.10. Impacted is the function formSetPassword of the file /goform/formSetPassword. The manipulation of the argument webpage results in stack-based buffer overflow. The attack may be launched remotely. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-04-06 | |
| CVE-2026-5613 | 7.4 | HIGH | CWE-119 | 0.0% p14 | 5.18 | A vulnerability was identified in Belkin F9K1015 1.00.10. This issue affects the...A vulnerability was identified in Belkin F9K1015 1.00.10. This issue affects the function formReboot of the file /goform/formReboot. The manipulation of the argument webpage leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-04-06 | |
| CVE-2026-5612 | 7.4 | HIGH | CWE-119 | 0.0% p14 | 5.18 | A vulnerability was determined in Belkin F9K1015 1.00.10. This vulnerability aff...A vulnerability was determined in Belkin F9K1015 1.00.10. This vulnerability affects the function formWlEncrypt of the file /goform/formWlEncrypt. Executing a manipulation of the argument webpage can lead to stack-based buffer overflow. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-04-06 | |
| CVE-2026-5611 | 7.4 | HIGH | CWE-119 | 0.0% p14 | 5.18 | A vulnerability was found in Belkin F9K1015 1.00.10. This affects the function f...A vulnerability was found in Belkin F9K1015 1.00.10. This affects the function formCrossBandSwitch of the file /goform/formCrossBandSwitch. Performing a manipulation of the argument webpage results in stack-based buffer overflow. The attack can be initiated remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-04-06 | |
| CVE-2026-5610 | 7.4 | HIGH | CWE-119 | 0.0% p14 | 5.18 | A vulnerability has been found in Belkin F9K1015 1.00.10. Affected by this issue...A vulnerability has been found in Belkin F9K1015 1.00.10. Affected by this issue is the function formWISP5G of the file /goform/formWISP5G. Such manipulation of the argument webpage leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-04-06 | |
| CVE-2026-5609 | 7.4 | HIGH | CWE-119 | 0.0% p14 | 5.18 | A flaw has been found in Tenda i12 1.0.0.11(3862). Affected by this vulnerabilit...A flaw has been found in Tenda i12 1.0.0.11(3862). Affected by this vulnerability is the function formwrlSSIDset of the file /goform/wifiSSIDset of the component Parameter Handler. This manipulation of the argument index/wl_radio causes stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been published and may be used. |
2026-04-06 | |
| CVE-2026-5608 | 7.4 | HIGH | CWE-119 | 0.0% p14 | 5.18 | A vulnerability was detected in Belkin F9K1122 1.00.33. Affected is the function...A vulnerability was detected in Belkin F9K1122 1.00.33. Affected is the function formWlanSetup of the file /goform/formWlanSetup. The manipulation of the argument webpage results in stack-based buffer overflow. The attack may be performed from remote. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-04-06 | |
| CVE-2026-5607 | 5.3 | MEDIUM | CWE-918 | 0.0% p11 | 3.71 | A security vulnerability has been detected in imprvhub mcp-browser-agent up to 0...A security vulnerability has been detected in imprvhub mcp-browser-agent up to 0.8.0. This impacts the function CallToolRequestSchema of the file src/handlers.ts of the component URL Parameter Handler. The manipulation of the argument request.params.name/request.params.arguments leads to server-side request forgery. The attack is possible to be carried out remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-04-06 | |
| CVE-2026-5606 | 5.3 | MEDIUM | CWE-74 | 0.0% p1 | 3.71 | A security flaw has been discovered in PHPGurukul Online Shopping Portal Project...A security flaw has been discovered in PHPGurukul Online Shopping Portal Project 2.1. The affected element is an unknown function of the file /order-details.php of the component Parameter Handler. The manipulation of the argument orderid results in sql injection. It is possible to launch the attack remotely. |
2026-04-06 | |
| CVE-2026-5605 | 7.4 | HIGH | CWE-119 | 0.0% p4 | 5.18 | A weakness has been identified in Tenda CH22 1.0.0.1. This affects the function ...A weakness has been identified in Tenda CH22 1.0.0.1. This affects the function formWrlExtraSet of the file /goform/WrlExtraSet. Executing a manipulation of the argument GO can lead to stack-based buffer overflow. The attack can be executed remotely. The exploit has been made available to the public and could be used for attacks. |
2026-04-06 | |
| CVE-2026-5604 | 7.4 | HIGH | CWE-119 | 0.0% p14 | 5.18 | A security flaw has been discovered in Tenda CH22 1.0.0.1. The impacted element ...A security flaw has been discovered in Tenda CH22 1.0.0.1. The impacted element is the function formCertLocalPrecreate of the file /goform/CertLocalPrecreate of the component Parameter Handler. Performing a manipulation of the argument standard results in stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been released to the public and may be used for attacks. |
2026-04-05 | |
| CVE-2026-5603 | 4.8 | MEDIUM | CWE-77 | 0.1% p24 | 3.36 | A vulnerability was identified in elgentos magento2-dev-mcp up to 1.0.2. The aff...A vulnerability was identified in elgentos magento2-dev-mcp up to 1.0.2. The affected element is the function executeMagerun2Command of the file src/index.ts. Such manipulation leads to os command injection. An attack has to be approached locally. The exploit is publicly available and might be used. The name of the patch is aa1ffcc0aea1b212c69787391783af27df15ae9d. A patch should be applied to remediate this issue. |
2026-04-05 | |
| CVE-2026-5602 | 4.8 | MEDIUM | CWE-77 | 0.1% p24 | 3.36 | A vulnerability was determined in Nor2-io heim-mcp up to 0.1.3. Impacted is the ...A vulnerability was determined in Nor2-io heim-mcp up to 0.1.3. Impacted is the function registerTools of the file src/tools.ts of the component new_heim_application/deploy_heim_application/deploy_heim_application_to_cloud. This manipulation causes os command injection. The attack requires local access. The exploit has been publicly disclosed and may be utilized. Patch name: c321d8af25f77668781e6ccb43a1336f9185df37. It is suggested to install a patch to address this issue. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product. |
2026-04-05 | |
| CVE-2026-5601 | 5.5 | MEDIUM | CWE-200 | 0.0% p11 | 3.85 | A vulnerability was found in Acrel Electrical Prepaid Cloud Platform 1.0. This i...A vulnerability was found in Acrel Electrical Prepaid Cloud Platform 1.0. This issue affects some unknown processing of the file /bin.rar of the component Backup File Handler. The manipulation results in information disclosure. The attack can be launched remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-04-05 | |
| CVE-2026-5597 | 5.3 | MEDIUM | CWE-22 | 0.0% p6 | 3.71 | A flaw has been found in griptape-ai griptape 0.19.4. This affects an unknown pa...A flaw has been found in griptape-ai griptape 0.19.4. This affects an unknown part of the file griptape\tools\computer\tool.py of the component ComputerTool. Executing a manipulation of the argument filename can lead to path traversal. It is possible to launch the attack remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-04-05 | |
| CVE-2026-35679 | 3.5 | LOW | CWE-358 | 0.0% p0 | 2.45 | Zcash zcashd before 6.12.0 allows invalid transactions to be accepted under cert...Zcash zcashd before 6.12.0 allows invalid transactions to be accepted under certain conditions, which potentially could have resulted in the draining of user funds from the Sprout pool. It was sometimes not verifying Sprout proofs. |
2026-04-05 | |
| CVE-2026-5596 | 5.3 | MEDIUM | CWE-74 | 0.0% p8 | 3.71 | A vulnerability was detected in griptape-ai griptape 0.19.4. Affected by this is...A vulnerability was detected in griptape-ai griptape 0.19.4. Affected by this issue is some unknown functionality of the file griptape/tools/sql/tool.py of the component SqlTool. Performing a manipulation results in sql injection. It is possible to initiate the attack remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-04-05 | |
| CVE-2019-25704 | 8.8 | HIGH | CWE-89 | 0.0% p9 | 6.16 | Kados R10 GreenBee contains an SQL injection vulnerability that allows attackers...Kados R10 GreenBee contains an SQL injection vulnerability that allows attackers to manipulate database queries by injecting SQL code through the filter_user_mail parameter. Attackers can send crafted requests with malicious SQL statements to extract sensitive database information or modify data. |
2026-04-05 | |
| CVE-2019-25702 | 8.8 | HIGH | CWE-89 | 0.0% p9 | 6.16 | Kados R10 GreenBee contains an SQL injection vulnerability that allows attackers...Kados R10 GreenBee contains an SQL injection vulnerability that allows attackers to manipulate database queries by injecting SQL code through the id_project parameter. Attackers can send crafted requests with malicious SQL statements in the id_project parameter to extract sensitive database information or modify data. |
2026-04-05 | |
| CVE-2019-25700 | 8.8 | HIGH | CWE-89 | 0.0% p9 | 6.16 | Kados R10 GreenBee contains an SQL injection vulnerability that allows attackers...Kados R10 GreenBee contains an SQL injection vulnerability that allows attackers to manipulate database queries by injecting SQL code through the sort_direction parameter. Attackers can submit malicious SQL statements in the sort_direction parameter to extract sensitive database information or modify data. |
2026-04-05 | |
| CVE-2019-25698 | 8.8 | HIGH | CWE-89 | 0.0% p9 | 6.16 | Kados R10 GreenBee contains an SQL injection vulnerability that allows attackers...Kados R10 GreenBee contains an SQL injection vulnerability that allows attackers to manipulate database queries by injecting SQL code through the id_to_delete parameter. Attackers can send crafted requests with malicious SQL statements in the id_to_delete field to extract or modify sensitive database information. |
2026-04-05 | |
| CVE-2019-25696 | 8.8 | HIGH | CWE-89 | 0.0% p9 | 6.16 | Kados R10 GreenBee contains an SQL injection vulnerability that allows attackers...Kados R10 GreenBee contains an SQL injection vulnerability that allows attackers to manipulate database queries by injecting SQL code through the language_tag parameter. Attackers can submit malicious SQL statements in the language_tag parameter to extract sensitive database information or modify data. |
2026-04-05 | |
| CVE-2019-25694 | 8.8 | HIGH | CWE-89 | 0.1% p24 | 6.16 | Kados R10 GreenBee contains an SQL injection vulnerability that allows unauthent...Kados R10 GreenBee contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the user2reset parameter. Attackers can send crafted requests with malicious SQL payloads to extract sensitive database information or modify data. |
2026-04-05 | |
| CVE-2019-25692 | 8.8 | HIGH | CWE-89 | 0.0% p9 | 6.16 | Kados R10 GreenBee contains an SQL injection vulnerability that allows attackers...Kados R10 GreenBee contains an SQL injection vulnerability that allows attackers to manipulate database queries by injecting SQL code through the 'id_to_modify' parameter. Attackers can send crafted requests with malicious SQL statements in the id_to_modify field to extract sensitive database information or modify data. |
2026-04-05 | |
| CVE-2019-25690 | 8.8 | HIGH | CWE-89 | 0.0% p9 | 6.16 | Kados R10 GreenBee contains an SQL injection vulnerability that allows attackers...Kados R10 GreenBee contains an SQL injection vulnerability that allows attackers to manipulate database queries by injecting SQL code through the mng_profile_id parameter. Attackers can send crafted requests with malicious SQL payloads in the mng_profile_id parameter to extract sensitive database information. |
2026-04-05 | |
| CVE-2019-25688 | 8.8 | HIGH | CWE-89 | 0.1% p24 | 6.16 | Kados R10 GreenBee contains an SQL injection vulnerability that allows unauthent...Kados R10 GreenBee contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the menu_lev1 parameter. Attackers can send crafted requests with malicious SQL payloads in the menu_lev1 parameter to extract sensitive database information or modify database contents. |
2026-04-05 | |
| CVE-2019-25687 | 9.3 | CRITICAL | CWE-22 | 0.4% p60 | 6.52 | Pegasus CMS 1.0 contains a remote code execution vulnerability in the extra_fiel...Pegasus CMS 1.0 contains a remote code execution vulnerability in the extra_fields.php plugin that allows unauthenticated attackers to execute arbitrary commands by exploiting unsafe eval functionality. Attackers can send POST requests to the submit.php endpoint with malicious PHP code in the action parameter to achieve code execution and obtain an interactive shell. |
2026-04-05 | |
| CVE-2019-25686 | 8.7 | HIGH | CWE-306 | 0.2% p36 | 6.09 | Core FTP 2.0 build 653 contains a denial of service vulnerability in the PBSZ co...Core FTP 2.0 build 653 contains a denial of service vulnerability in the PBSZ command that allows unauthenticated attackers to crash the service by sending a malformed command with an oversized buffer. Attackers can send a PBSZ command with a payload exceeding 211 bytes to trigger an access violation and crash the FTP server process. |
2026-04-05 | |
| CVE-2019-25685 | 8.7 | HIGH | CWE-22 | 0.2% p40 | 6.10 | phpBB contains an arbitrary file upload vulnerability that allows authenticated ...phpBB contains an arbitrary file upload vulnerability that allows authenticated attackers to upload malicious files by exploiting the plupload functionality and phar:// stream wrapper. Attackers can upload a crafted zip file containing serialized PHP objects that execute arbitrary code when deserialized through the imagick parameter in attachment settings. |
2026-04-05 | |
| CVE-2019-25684 | 8.8 | HIGH | CWE-89 | 0.1% p23 | 6.16 | OpenDocMan 1.3.4 contains an SQL injection vulnerability that allows unauthentic...OpenDocMan 1.3.4 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the 'where' parameter. Attackers can send GET requests to search.php with malicious SQL payloads in the 'where' parameter to extract sensitive database information. |
2026-04-05 | |
| CVE-2019-25683 | 6.9 | MEDIUM | CWE-532 | 0.0% p3 | 4.83 | FileZilla 3.40.0 contains a denial of service vulnerability in the local search ...FileZilla 3.40.0 contains a denial of service vulnerability in the local search functionality that allows local attackers to crash the application by supplying a malformed path string. Attackers can trigger the crash by entering a crafted path containing 384 'A' characters followed by 'BBBB' and 'CCCC' sequences in the search directory field and initiating a local search operation. |
2026-04-05 | |
| CVE-2019-25682 | 5.3 | MEDIUM | CWE-352 | 0.0% p2 | 3.71 | CMSsite 1.0 contains a cross-site request forgery vulnerability that allows atta...CMSsite 1.0 contains a cross-site request forgery vulnerability that allows attackers to perform unauthorized administrative actions by crafting malicious HTML forms. Attackers can trick authenticated administrators into visiting crafted pages that submit POST requests to the users.php endpoint with parameters like source=add_user, source=edit_user, or del=1 to create, modify, or delete admin accounts. |
2026-04-05 | |
| CVE-2019-25681 | 8.6 | HIGH | CWE-787 | 0.0% p3 | 6.02 | Xlight FTP Server 3.9.1 contains a structured exception handler (SEH) overwrite ...Xlight FTP Server 3.9.1 contains a structured exception handler (SEH) overwrite vulnerability that allows local attackers to crash the application and overwrite SEH pointers by supplying a crafted buffer string. Attackers can inject a 428-byte payload through the program execution field in virtual server configuration to trigger a buffer overflow that corrupts the SEH chain and enables potential code execution. |
2026-04-05 | |
| CVE-2019-25680 | 8.8 | HIGH | CWE-89 | 0.1% p24 | 6.16 | Advance Gift Shop Pro Script 2.0.3 contains an SQL injection vulnerability that ...Advance Gift Shop Pro Script 2.0.3 contains an SQL injection vulnerability that allows unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code through the search parameter. Attackers can submit crafted SQL payloads in the 's' parameter of search requests to extract sensitive database information including version details and other data. |
2026-04-05 | |
| CVE-2019-25679 | 8.5 | HIGH | CWE-787 | 0.0% p2 | 5.95 | RealTerm Serial Terminal 2.0.0.70 contains a structured exception handling (SEH)...RealTerm Serial Terminal 2.0.0.70 contains a structured exception handling (SEH) buffer overflow vulnerability in the Echo Port tab that allows local attackers to execute arbitrary code by supplying a malicious payload. Attackers can craft a buffer overflow payload with a POP POP RET gadget chain and shellcode that triggers code execution when pasted into the Port field and the Change button is clicked. |
2026-04-05 | |
| CVE-2019-25678 | 8.8 | HIGH | CWE-306 | 0.1% p18 | 6.16 | C4G Basic Laboratory Information System 3.4 contains multiple SQL injection vuln...C4G Basic Laboratory Information System 3.4 contains multiple SQL injection vulnerabilities that allow unauthenticated attackers to execute arbitrary SQL commands by injecting malicious code through the site parameter. Attackers can send GET requests to the users_select.php endpoint with crafted SQL payloads to extract sensitive database information including patient records and system credentials. |
2026-04-05 | |
| CVE-2019-25677 | 6.9 | MEDIUM | CWE-379 | 0.0% p2 | 4.83 | WinRAR 5.61 contains a denial of service vulnerability that allows local attacke...WinRAR 5.61 contains a denial of service vulnerability that allows local attackers to crash the application by placing a malformed winrar.lng language file in the installation directory. Attackers can trigger the crash by opening an archive and pressing the test button, causing an access violation at memory address 004F1DB8 when the application attempts to read invalid data. |
2026-04-05 | |
| CVE-2019-25676 | 8.8 | HIGH | CWE-79 | 0.1% p32 | 6.16 | Ask Expert Script 3.0.5 contains cross-site scripting and SQL injection vulnerab...Ask Expert Script 3.0.5 contains cross-site scripting and SQL injection vulnerabilities that allow unauthenticated attackers to inject malicious code by manipulating URL parameters. Attackers can inject script tags through the cateid parameter in categorysearch.php or SQL code through the view parameter in list-details.php to execute arbitrary code or extract database information. |
2026-04-05 | |
| CVE-2019-25675 | 8.8 | HIGH | CWE-89 | 0.2% p41 | 6.17 | eDirectory contains multiple SQL injection vulnerabilities that allow unauthenti...eDirectory contains multiple SQL injection vulnerabilities that allow unauthenticated attackers to bypass administrator authentication and disclose sensitive files by injecting SQL code into parameters. Attackers can exploit the key parameter in the login endpoint with union-based SQL injection to authenticate as administrator, then leverage authenticated file disclosure vulnerabilities in language_file.php to read arbitrary PHP files from the server. |
2026-04-05 | |
| CVE-2019-25674 | 8.8 | HIGH | CWE-89 | 0.2% p47 | 6.17 | CMSsite 1.0 contains an SQL injection vulnerability that allows unauthenticated ...CMSsite 1.0 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the 'post' parameter. Attackers can send GET requests to post.php with malicious 'post' values to extract sensitive database information or perform time-based blind SQL injection attacks. |
2026-04-05 | |
| CVE-2019-25673 | 8.7 | HIGH | CWE-434 | 0.1% p20 | 6.09 | UniSharp Laravel File Manager v2.0.0-alpha7 and v2.0 contain an arbitrary file u...UniSharp Laravel File Manager v2.0.0-alpha7 and v2.0 contain an arbitrary file upload vulnerability that allows authenticated attackers to upload malicious files by sending multipart form data to the upload endpoint. Attackers can upload PHP files with the type parameter set to Files and execute arbitrary code by accessing the uploaded file through the working directory path. |
2026-04-05 | |
| CVE-2019-25672 | 8.8 | HIGH | CWE-89 | 0.1% p23 | 6.16 | PilusCart 1.4.1 contains a SQL injection vulnerability that allows unauthenticat...PilusCart 1.4.1 contains a SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the 'send' parameter. Attackers can submit POST requests to the comment submission endpoint with RLIKE-based boolean SQL injection payloads to extract sensitive database information. |
2026-04-05 | |
| CVE-2019-25671 | 8.7 | HIGH | CWE-22 | 0.4% p61 | 6.10 | VA MAX 8.3.4 contains a remote code execution vulnerability that allows authenti...VA MAX 8.3.4 contains a remote code execution vulnerability that allows authenticated attackers to execute arbitrary commands by injecting shell metacharacters into the mtu_eth0 parameter. Attackers can send POST requests to the changeip.php endpoint with malicious payload in the mtu_eth0 field to execute commands as the apache user. |
2026-04-05 | |
| CVE-2019-25670 | 8.6 | HIGH | CWE-787 | 0.0% p4 | 6.02 | River Past Video Cleaner 7.6.3 contains a structured exception handler buffer ov...River Past Video Cleaner 7.6.3 contains a structured exception handler buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying a malicious string in the Lame_enc.dll field. Attackers can craft a payload with 280 bytes of padding, a next structured exception handler override, and shellcode to trigger code execution when the application processes the input. |
2026-04-05 | |
| CVE-2019-25669 | 8.8 | HIGH | CWE-89 | 0.0% p9 | 6.16 | qdPM 9.1 contains an SQL injection vulnerability that allows attackers to manipu...qdPM 9.1 contains an SQL injection vulnerability that allows attackers to manipulate database queries by injecting SQL code through the search_by_extrafields[] parameter. Attackers can send POST requests to the users endpoint with malicious search_by_extrafields[] values to trigger SQL syntax errors and extract database information. |
2026-04-05 | |
| CVE-2019-25668 | 8.8 | HIGH | CWE-89 | 0.1% p25 | 6.16 | News Website Script 2.0.5 contains an SQL injection vulnerability that allows un...News Website Script 2.0.5 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the news ID parameter. Attackers can send GET requests to index.php/show/news/ with malicious SQL statements to extract sensitive database information. |
2026-04-05 | |
| CVE-2019-25667 | 6.9 | MEDIUM | CWE-787 | 0.0% p3 | 4.83 | TaskInfo 8.2.0.280 contains a local buffer overflow vulnerability that allows at...TaskInfo 8.2.0.280 contains a local buffer overflow vulnerability that allows attackers to crash the application by supplying oversized input to registration fields. Attackers can paste excessively long strings into the New User Name or New Serial Number textboxes in the Help menu's registration dialog to trigger a denial of service condition. |
2026-04-05 | |
| CVE-2019-25666 | 6.9 | MEDIUM | CWE-787 | 0.0% p3 | 4.83 | SpotAuditor 3.6.7 contains a local buffer overflow vulnerability in the Base64 P...SpotAuditor 3.6.7 contains a local buffer overflow vulnerability in the Base64 Password Decoder component that allows attackers to crash the application. Attackers can supply an oversized Base64 string through the decoder interface to trigger a denial of service condition. |
2026-04-05 | |
| CVE-2019-25665 | 6.9 | MEDIUM | CWE-787 | 0.0% p3 | 4.83 | River Past Ringtone Converter 2.7.6.1601 contains a local buffer overflow vulner...River Past Ringtone Converter 2.7.6.1601 contains a local buffer overflow vulnerability that allows attackers to crash the application by supplying oversized input to activation fields. Attackers can paste 300 bytes of data into the Email textbox and Activation code textarea via the Help menu's Activate dialog to trigger a denial of service condition. |
2026-04-05 | |
| CVE-2019-25664 | 7.1 | HIGH | CWE-89 | 0.0% p8 | 4.97 | SuiteCRM 7.10.7 contains a time-based SQL injection vulnerability in the record ...SuiteCRM 7.10.7 contains a time-based SQL injection vulnerability in the record parameter of the Users module DetailView action that allows authenticated attackers to manipulate database queries. Attackers can append SQL code to the record parameter in GET requests to the index.php endpoint to extract sensitive database information through time-based blind SQL injection techniques. |
2026-04-05 | |
| CVE-2019-25663 | 7.1 | HIGH | CWE-89 | 0.0% p8 | 4.97 | SuiteCRM 7.10.7 contains a SQL injection vulnerability that allows authenticated...SuiteCRM 7.10.7 contains a SQL injection vulnerability that allows authenticated attackers to manipulate database queries by injecting SQL code through the parentTab parameter. Attackers can send GET requests to the email module with malicious parentTab values using boolean-based SQL injection techniques to extract sensitive database information. |
2026-04-05 | |
| CVE-2019-25662 | 8.8 | HIGH | CWE-89 | 0.1% p24 | 6.16 | ResourceSpace 8.6 contains an SQL injection vulnerability that allows unauthenti...ResourceSpace 8.6 contains an SQL injection vulnerability that allows unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code through the 'ref' parameter. Attackers can send GET requests to the watched_searches.php endpoint with crafted SQL payloads to extract sensitive database information including usernames and credentials. |
2026-04-05 | |
| CVE-2019-25661 | 6.9 | MEDIUM | CWE-787 | 0.0% p3 | 4.83 | Remote Process Explorer 1.0.0.16 contains a local buffer overflow vulnerability ...Remote Process Explorer 1.0.0.16 contains a local buffer overflow vulnerability that allows attackers to cause a denial of service by sending a crafted payload to the Add Computer dialog. Attackers can paste a malicious string into the computer name textbox and trigger a crash by connecting to the added computer, overwriting the SEH chain and corrupting exception handlers. |
2026-04-05 | |
| CVE-2019-25660 | 6.9 | MEDIUM | CWE-787 | 0.0% p3 | 4.83 | LanHelper 1.74 contains a local buffer overflow vulnerability that allows attack...LanHelper 1.74 contains a local buffer overflow vulnerability that allows attackers to crash the application by sending excessively long input strings. Attackers can exploit the Form Send Message feature by pasting 6000 bytes of data into the Message text field to trigger a denial of service condition. |
2026-04-05 | |
| CVE-2019-25659 | 6.9 | MEDIUM | CWE-787 | 0.0% p3 | 4.83 | ASPRunner Professional 6.0.766 contains a local buffer overflow vulnerability th...ASPRunner Professional 6.0.766 contains a local buffer overflow vulnerability that allows attackers to cause a denial of service by supplying an excessively long project name. Attackers can paste 180 or more characters into the Project name field during project creation to trigger an application crash. |
2026-04-05 | |
| CVE-2019-25658 | 6.8 | MEDIUM | CWE-787 | 0.0% p4 | 4.76 | a-Mac Address Change 5.4 contains a local buffer overflow vulnerability that all...a-Mac Address Change 5.4 contains a local buffer overflow vulnerability that allows local attackers to crash the application by supplying oversized input to registration form fields. Attackers can paste 212 bytes of data into the 'Your Name', 'Your Company', or 'Register Code' fields and click the Register button to trigger a denial of service crash. |
2026-04-05 | |
| CVE-2019-25657 | 6.8 | MEDIUM | CWE-226 | 0.0% p4 | 4.76 | AnyBurn 4.3 x86 contains a denial of service vulnerability that allows local att...AnyBurn 4.3 x86 contains a denial of service vulnerability that allows local attackers to crash the application by supplying an excessively long string to the image conversion function. Attackers can paste a large buffer into the source or destination image file fields and click Convert Now to trigger a crash. |
2026-04-05 | |
| CVE-2019-25656 | 8.6 | HIGH | CWE-787 | 0.0% p4 | 6.02 | R i386 3.5.0 contains a local buffer overflow vulnerability in the GUI Preferenc...R i386 3.5.0 contains a local buffer overflow vulnerability in the GUI Preferences dialog that allows local attackers to trigger a structured exception handler (SEH) overwrite by supplying malicious input. Attackers can craft a payload string in the 'Language for menus and messages' field to overwrite SEH records and achieve code execution with calculator or arbitrary shellcode. |
2026-04-05 | |
| CVE-2018-25256 | 6.8 | MEDIUM | CWE-787 | 0.0% p4 | 4.76 | IP TOOLS 2.50 contains a local buffer overflow vulnerability in the SNMP Scanner...IP TOOLS 2.50 contains a local buffer overflow vulnerability in the SNMP Scanner component that allows local attackers to crash the application by supplying oversized input. Attackers can paste malicious data into the 'From Addr' and 'To Addr' fields and trigger the crash by clicking the Start button, causing denial of service and SEH overwrite. |
2026-04-05 | |
| CVE-2026-5595 | 5.3 | MEDIUM | CWE-22 | 0.1% p21 | 3.71 | A security vulnerability has been detected in griptape-ai griptape 0.19.4. Affec...A security vulnerability has been detected in griptape-ai griptape 0.19.4. Affected by this vulnerability is the function load_files_from_disk/list_files_from_disk/save_content_to_file/save_memory_artifacts_to_disk of the component FileManagerTool. Such manipulation leads to path traversal. The attack may be performed from remote. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-04-05 | |
| CVE-2026-5594 | 5.3 | MEDIUM | CWE-74 | 0.0% p14 | 3.71 | A weakness has been identified in premAI-io premsql up to 0.2.1. Affected is the...A weakness has been identified in premAI-io premsql up to 0.2.1. Affected is the function eval of the file premsql/agents/baseline/workers/followup.py. This manipulation of the argument result causes code injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-04-05 | |
| CVE-2026-5587 | 5.3 | MEDIUM | CWE-74 | 0.0% p8 | 3.71 | A vulnerability was identified in wbbeyourself MAC-SQL up to 31a9df5e0d520be4769...A vulnerability was identified in wbbeyourself MAC-SQL up to 31a9df5e0d520be4769be57a4b9022e5e34a14f4. This affects the function _execute_sql of the file core/agents.py of the component Refiner Agent. The manipulation leads to sql injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used. This product follows a rolling release approach for continuous delivery, so version details for affected or updated releases are not provided. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-04-05 | |
| CVE-2026-5586 | 5.3 | MEDIUM | CWE-74 | 0.0% p1 | 3.71 | A vulnerability was determined in zhongyu09 openchatbi up to 0.2.1. The impacted...A vulnerability was determined in zhongyu09 openchatbi up to 0.2.1. The impacted element is an unknown function of the component Multi-stage Text2SQL Workflow. Executing a manipulation of the argument keywords can lead to sql injection. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-04-05 | |
| CVE-2026-5585 | 5.5 | MEDIUM | CWE-200 | 0.0% p11 | 3.85 | A vulnerability was found in Tencent AI-Infra-Guard 4.0. The affected element is...A vulnerability was found in Tencent AI-Infra-Guard 4.0. The affected element is an unknown function of the file common/websocket/task_manager.go of the component Task Detail Endpoint. Performing a manipulation results in information disclosure. The attack may be initiated remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-04-05 | |
| CVE-2026-5584 | 6.9 | MEDIUM | CWE-74 | 0.1% p17 | 4.83 | A vulnerability has been found in Fosowl agenticSeek 0.1.0. Impacted is the func...A vulnerability has been found in Fosowl agenticSeek 0.1.0. Impacted is the function PyInterpreter.execute of the file sources/tools/PyInterpreter.py of the component query Endpoint. Such manipulation leads to code injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-04-05 | |
| CVE-2026-5583 | 5.3 | MEDIUM | CWE-74 | 0.0% p1 | 3.71 | A security vulnerability has been detected in PHPGurukul Online Shopping Portal ...A security vulnerability has been detected in PHPGurukul Online Shopping Portal Project 2.1. This affects an unknown part of the file /my-profile.php of the component Parameter Handler. The manipulation of the argument fullname leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used. |
2026-04-05 | |
| CVE-2026-5580 | 5.3 | MEDIUM | CWE-74 | 0.0% p1 | 3.71 | A vulnerability was identified in CodeAstro Online Classroom 1.0. Impacted is an...A vulnerability was identified in CodeAstro Online Classroom 1.0. Impacted is an unknown function of the file /OnlineClassroom/addvideos.php of the component Parameter Handler. The manipulation of the argument videotitle leads to sql injection. It is possible to initiate the attack remotely. The exploit is publicly available and might be used. |
2026-04-05 | |
| CVE-2026-5579 | 5.3 | MEDIUM | CWE-74 | 0.0% p1 | 3.71 | A vulnerability was determined in CodeAstro Online Classroom 1.0. This issue aff...A vulnerability was determined in CodeAstro Online Classroom 1.0. This issue affects some unknown processing of the file /OnlineClassroom/updatedetailsfromfaculty.php?myfid=108 of the component Parameter Handler. Executing a manipulation of the argument fname can lead to sql injection. The attack may be performed from remote. The exploit has been publicly disclosed and may be utilized. |
2026-04-05 | |
| CVE-2026-5578 | 5.3 | MEDIUM | CWE-74 | 0.0% p1 | 3.71 | A vulnerability was found in CodeAstro Online Classroom 1.0. This vulnerability ...A vulnerability was found in CodeAstro Online Classroom 1.0. This vulnerability affects unknown code of the file /OnlineClassroom/addassessment.php of the component Parameter Handler. Performing a manipulation of the argument deleteid results in sql injection. The attack is possible to be carried out remotely. The exploit has been made public and could be used. |
2026-04-05 | |
| CVE-2026-5577 | 6.9 | MEDIUM | CWE-74 | 0.0% p10 | 4.83 | A vulnerability has been found in Song-Li cross_browser up to ca690f0fe6954fd9bc...A vulnerability has been found in Song-Li cross_browser up to ca690f0fe6954fd9bcda36d071b68ed8682a786a. This affects an unknown part of the file flask/uniquemachine_app.py of the component details Endpoint. Such manipulation of the argument ID leads to sql injection. The attack can be executed remotely. The exploit has been disclosed to the public and may be used. This product implements a rolling release for ongoing delivery, which means version information for affected or updated releases is unavailable. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-04-05 | |
| CVE-2026-5576 | 5.1 | MEDIUM | CWE-284 | 0.0% p2 | 3.57 | A flaw has been found in SourceCodester/jkev Record Management System 1.0. Affec...A flaw has been found in SourceCodester/jkev Record Management System 1.0. Affected by this issue is some unknown functionality of the file save_emp.php of the component Add Employee Page. This manipulation causes unrestricted upload. Remote exploitation of the attack is possible. The exploit has been published and may be used. |
2026-04-05 | |
| CVE-2026-5575 | 6.9 | MEDIUM | CWE-74 | 0.0% p10 | 4.83 | A vulnerability was detected in SourceCodester/jkev Record Management System 1.0...A vulnerability was detected in SourceCodester/jkev Record Management System 1.0. Affected by this vulnerability is an unknown functionality of the file index.php of the component Login. The manipulation of the argument Username results in sql injection. The attack may be launched remotely. The exploit is now public and may be used. |
2026-04-05 | |
| CVE-2026-5574 | 6.9 | MEDIUM | CWE-862 | 0.0% p3 | 4.83 | A security vulnerability has been detected in Technostrobe HI-LED-WR120-G2 5.5.0...A security vulnerability has been detected in Technostrobe HI-LED-WR120-G2 5.5.0.1R6.03.30. Affected is the function deletefile of the component FsBrowseClean. The manipulation of the argument dir/path leads to missing authorization. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-04-05 | |
| CVE-2026-5573 | 6.9 | MEDIUM | CWE-284 | 0.1% p15 | 4.83 | A weakness has been identified in Technostrobe HI-LED-WR120-G2 5.5.0.1R6.03.30. ...A weakness has been identified in Technostrobe HI-LED-WR120-G2 5.5.0.1R6.03.30. This impacts an unknown function of the file /fs. Executing a manipulation of the argument cwd can lead to unrestricted upload. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-04-05 | |
| CVE-2026-5572 | 5.3 | MEDIUM | CWE-352 | 0.0% p0 | 3.71 | A security flaw has been discovered in Technostrobe HI-LED-WR120-G2 5.5.0.1R6.03...A security flaw has been discovered in Technostrobe HI-LED-WR120-G2 5.5.0.1R6.03.30. This affects an unknown function. Performing a manipulation results in cross-site request forgery. The attack can be initiated remotely. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-04-05 | |
| CVE-2026-5571 | 5.5 | MEDIUM | CWE-200 | 0.0% p11 | 3.85 | A vulnerability was identified in Technostrobe HI-LED-WR120-G2 5.5.0.1R6.03.30. ...A vulnerability was identified in Technostrobe HI-LED-WR120-G2 5.5.0.1R6.03.30. The impacted element is an unknown function of the file /fs of the component Configuration Data Handler. Such manipulation of the argument File leads to information disclosure. It is possible to launch the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-04-05 | |
| CVE-2026-5570 | 6.9 | MEDIUM | CWE-287 | 0.1% p26 | 4.83 | A vulnerability was determined in Technostrobe HI-LED-WR120-G2 5.5.0.1R6.03.30. ...A vulnerability was determined in Technostrobe HI-LED-WR120-G2 5.5.0.1R6.03.30. The affected element is the function index_config of the file /LoginCB. This manipulation causes improper authentication. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-04-05 | |
| CVE-2026-5569 | 6.9 | MEDIUM | CWE-266 | 0.1% p15 | 4.83 | A vulnerability was found in Technostrobe HI-LED-WR120-G2 5.5.0.1R6.03.30. Impac...A vulnerability was found in Technostrobe HI-LED-WR120-G2 5.5.0.1R6.03.30. Impacted is an unknown function of the file /Technostrobe/ of the component Endpoint. The manipulation results in improper access controls. The attack may be performed from remote. The exploit has been made public and could be used. Multiple endpoints are affected. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-04-05 | |
| CVE-2026-5568 | 5.1 | MEDIUM | CWE-79 | 0.0% p1 | 3.57 | A vulnerability has been found in Akaunting up to 3.1.21. This issue affects som...A vulnerability has been found in Akaunting up to 3.1.21. This issue affects some unknown processing of the component Invoice/Billing. The manipulation of the argument notes leads to cross site scripting. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-04-05 | |
| CVE-2026-5567 | 7.4 | HIGH | CWE-119 | 0.0% p14 | 5.18 | A flaw has been found in Tenda M3 1.0.0.10. This vulnerability affects the funct...A flaw has been found in Tenda M3 1.0.0.10. This vulnerability affects the function setAdvPolicyData of the file /goform/setAdvPolicyData of the component Destination Handler. Executing a manipulation of the argument policyType can lead to buffer overflow. The attack can be executed remotely. The exploit has been published and may be used. |
2026-04-05 | |
| CVE-2026-5566 | 7.4 | HIGH | CWE-119 | 0.0% p14 | 5.18 | A vulnerability was detected in UTT HiPER 1250GW up to 3.2.7-210907-180535. This...A vulnerability was detected in UTT HiPER 1250GW up to 3.2.7-210907-180535. This affects the function strcpy of the file /goform/formNatStaticMap. Performing a manipulation of the argument NatBind results in buffer overflow. Remote exploitation of the attack is possible. The exploit is now public and may be used. |
2026-04-05 | |
| CVE-2026-5565 | 6.9 | MEDIUM | CWE-74 | 0.0% p11 | 4.83 | A security vulnerability has been detected in code-projects Simple Laundry Syste...A security vulnerability has been detected in code-projects Simple Laundry System 1.0. Affected by this issue is some unknown functionality of the file /delmemberinfo.php of the component Parameter Handler. Such manipulation of the argument userid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed publicly and may be used. |
2026-04-05 | |
| CVE-2026-5564 | 6.9 | MEDIUM | CWE-74 | 0.0% p11 | 4.83 | A weakness has been identified in code-projects Simple Laundry System 1.0. Affec...A weakness has been identified in code-projects Simple Laundry System 1.0. Affected by this vulnerability is an unknown functionality of the file /searchguest.php of the component Parameter Handler. This manipulation of the argument searchServiceId causes sql injection. The attack may be initiated remotely. The exploit has been made available to the public and could be used for attacks. |
2026-04-05 | |
| CVE-2026-5563 | 5.3 | MEDIUM | CWE-74 | 0.0% p8 | 3.71 | A security flaw has been discovered in AutohomeCorp frostmourne up to 1.0. Affec...A security flaw has been discovered in AutohomeCorp frostmourne up to 1.0. Affected is the function httpTest of the file /api/monitor-api/alarm/previewData of the component Alarm Preview. The manipulation results in sql injection. The attack can be launched remotely. The exploit has been released to the public and may be used for attacks. |
2026-04-05 | |
| CVE-2026-5562 | 6.9 | MEDIUM | CWE-74 | 0.1% p28 | 4.83 | A vulnerability was identified in provectus kafka-ui up to 0.7.2. This impacts t...A vulnerability was identified in provectus kafka-ui up to 0.7.2. This impacts the function validateAccess of the file /api/smartfilters/testexecutions of the component Endpoint. The manipulation leads to code injection. The attack can be initiated remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-04-05 | |
| CVE-2026-5561 | 5.3 | MEDIUM | CWE-74 | 0.0% p3 | 3.71 | A vulnerability was determined in Campcodes Complete POS Management and Inventor...A vulnerability was determined in Campcodes Complete POS Management and Inventory System up to 4.0.6. This affects an unknown function of the file app/Http/Controllers/SettingsController.php of the component Environment Variable Handler. Executing a manipulation can lead to injection. It is possible to launch the attack remotely. The exploit has been publicly disclosed and may be utilized. |
2026-04-05 | |
| CVE-2026-5560 | 5.3 | MEDIUM | CWE-74 | 0.0% p1 | 3.71 | A vulnerability was found in PHPGurukul Online Shopping Portal Project 2.1. The ...A vulnerability was found in PHPGurukul Online Shopping Portal Project 2.1. The impacted element is an unknown function of the file /payment-method.php of the component Parameter Handler. Performing a manipulation of the argument paymethod results in sql injection. It is possible to initiate the attack remotely. The exploit has been made public and could be used. |
2026-04-05 | |
| CVE-2026-5559 | 5.3 | MEDIUM | CWE-791 | 0.0% p4 | 3.71 | A vulnerability has been found in AntaresMugisho PyBlade 0.1.8-alpha/0.1.9-alpha...A vulnerability has been found in AntaresMugisho PyBlade 0.1.8-alpha/0.1.9-alpha. The affected element is the function _is_safe_ast of the file sandbox.py of the component AST Validation. Such manipulation leads to improper neutralization of special elements used in a template engine. The attack may be performed from remote. The exploit has been disclosed to the public and may be used. The project was informed of the problem early through an issue report but has not responded yet. |
2026-04-05 | |
| CVE-2026-5558 | 5.3 | MEDIUM | CWE-74 | 0.0% p1 | 3.71 | A flaw has been found in PHPGurukul PHPGurukul Online Shopping Portal Project up...A flaw has been found in PHPGurukul PHPGurukul Online Shopping Portal Project up to 2.1. Impacted is an unknown function of the file /pending-orders.php of the component Parameter Handler. This manipulation of the argument ID causes sql injection. The attack is possible to be carried out remotely. The exploit has been published and may be used. |
2026-04-05 | |
| CVE-2026-5557 | 5.3 | MEDIUM | CWE-287 | 0.1% p18 | 3.71 | A vulnerability was detected in badlogic pi-mono up to 0.58.4. This issue affect...A vulnerability was detected in badlogic pi-mono up to 0.58.4. This issue affects some unknown processing of the file packages/mom/src/slack.ts of the component pi-mom Slack Bot. The manipulation results in authentication bypass using alternate channel. The attack can be executed remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-04-05 | |
| CVE-2026-5556 | 5.3 | MEDIUM | CWE-74 | 0.0% p13 | 3.71 | A security vulnerability has been detected in badlogic pi-mono up to 0.58.4. Thi...A security vulnerability has been detected in badlogic pi-mono up to 0.58.4. This vulnerability affects the function discoverAndLoadExtensions of the file packages/coding-agent/src/core/extensions/loader.ts. The manipulation leads to code injection. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-04-05 | |
| CVE-2026-5555 | 6.9 | MEDIUM | CWE-74 | 0.0% p11 | 4.83 | A weakness has been identified in code-projects Concert Ticket Reservation Syste...A weakness has been identified in code-projects Concert Ticket Reservation System 1.0. This affects an unknown part of the file /ConcertTicketReservationSystem-master/login.php of the component Parameter Handler. Executing a manipulation of the argument Email can lead to sql injection. The attack may be launched remotely. The exploit has been made available to the public and could be used for attacks. |
2026-04-05 | |
| CVE-2026-5554 | 6.9 | MEDIUM | CWE-74 | 0.0% p11 | 4.83 | A security flaw has been discovered in code-projects Concert Ticket Reservation ...A security flaw has been discovered in code-projects Concert Ticket Reservation System 1.0. Affected by this issue is some unknown functionality of the file /ConcertTicketReservationSystem-master/process_search.php of the component Parameter Handler. Performing a manipulation of the argument searching results in sql injection. The attack may be initiated remotely. The exploit has been released to the public and may be used for attacks. |
2026-04-05 | |
| CVE-2026-5553 | 5.3 | MEDIUM | CWE-74 | 0.0% p1 | 3.71 | A vulnerability was identified in itsourcecode Online Cellphone System 1.0. Affe...A vulnerability was identified in itsourcecode Online Cellphone System 1.0. Affected by this vulnerability is an unknown functionality of the file /cp/available.php of the component Parameter Handler. Such manipulation of the argument Name leads to sql injection. The attack can be launched remotely. The exploit is publicly available and might be used. |
2026-04-05 | |
| CVE-2026-5552 | 5.3 | MEDIUM | CWE-74 | 0.0% p1 | 3.71 | A weakness has been identified in PHPGurukul Online Shopping Portal Project 2.1....A weakness has been identified in PHPGurukul Online Shopping Portal Project 2.1. This issue affects some unknown processing of the file /sub-category.php of the component Parameter Handler. This manipulation of the argument pid causes sql injection. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be used for attacks. |
2026-04-05 | |
| CVE-2026-5551 | 6.9 | MEDIUM | CWE-74 | 0.0% p11 | 4.83 | A security flaw has been discovered in itsourcecode Free Hotel Reservation Syste...A security flaw has been discovered in itsourcecode Free Hotel Reservation System 1.0. This vulnerability affects unknown code of the file /hotel/admin/login.php of the component Parameter Handler. The manipulation of the argument email results in sql injection. The attack may be launched remotely. The exploit has been released to the public and may be used for attacks. |
2026-04-05 | |
| CVE-2026-5550 | 8.7 | HIGH | CWE-119 | 0.0% p14 | 6.09 | A vulnerability was identified in Tenda AC10 16.03.10.10_multi_TDE01. This affec...A vulnerability was identified in Tenda AC10 16.03.10.10_multi_TDE01. This affects the function fromSysToolChangePwd of the file /bin/httpd. The manipulation leads to stack-based buffer overflow. The attack may be initiated remotely. Multiple endpoints might be affected. |
2026-04-05 | |
| CVE-2026-5548 | 8.7 | HIGH | CWE-119 | 0.0% p14 | 6.09 | A vulnerability was found in Tenda AC10 16.03.10.10_multi_TDE01. Affected by thi...A vulnerability was found in Tenda AC10 16.03.10.10_multi_TDE01. Affected by this vulnerability is the function fromSysToolChangePwd of the file /bin/httpd. Performing a manipulation of the argument sys.userpass results in stack-based buffer overflow. The attack can be initiated remotely. |
2026-04-05 | |
| CVE-2026-5547 | 5.3 | MEDIUM | CWE-77 | 0.8% p74 | 3.73 | A vulnerability has been found in Tenda AC10 16.03.10.10_multi_TDE01. Affected i...A vulnerability has been found in Tenda AC10 16.03.10.10_multi_TDE01. Affected is the function formAddMacfilterRule of the file /bin/httpd. Such manipulation leads to os command injection. It is possible to launch the attack remotely. Multiple endpoints might be affected. |
2026-04-05 | |
| CVE-2026-5546 | 5.3 | MEDIUM | CWE-284 | 0.0% p2 | 3.71 | A flaw has been found in Campcodes Complete Online Learning Management System 1....A flaw has been found in Campcodes Complete Online Learning Management System 1.0. This impacts the function add_lesson of the file /application/models/Crud_model.php. This manipulation causes unrestricted upload. It is possible to initiate the attack remotely. The exploit has been published and may be used. |
2026-04-05 | |
| CVE-2026-5544 | 7.4 | HIGH | CWE-119 | 0.0% p14 | 5.18 | A security flaw has been discovered in UTT HiPER 1250GW up to 3.2.7-210907-18053...A security flaw has been discovered in UTT HiPER 1250GW up to 3.2.7-210907-180535. The impacted element is an unknown function of the file /goform/formRemoteControl. The manipulation of the argument Profile results in stack-based buffer overflow. The attack can be executed remotely. The exploit has been released to the public and may be used for attacks. |
2026-04-05 | |
| CVE-2026-5543 | 5.3 | MEDIUM | CWE-74 | 0.0% p8 | 3.71 | A vulnerability was identified in PHPGurukul User Registration & Login and User ...A vulnerability was identified in PHPGurukul User Registration & Login and User Management System 3.3. The affected element is an unknown function of the file /admin/yesterday-reg-users.php. The manipulation of the argument ID leads to sql injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used. |
2026-04-05 | |
| CVE-2026-5542 | 5.3 | MEDIUM | CWE-79 | 0.0% p10 | 3.71 | A vulnerability was determined in code-projects Simple Laundry System 1.0. Impac...A vulnerability was determined in code-projects Simple Laundry System 1.0. Impacted is an unknown function of the file /modstaffinfo.php of the component Parameter Handler. Executing a manipulation of the argument userid can lead to cross site scripting. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized. |
2026-04-05 | |
| CVE-2026-5541 | 5.3 | MEDIUM | CWE-79 | 0.0% p10 | 3.71 | A vulnerability was found in code-projects Simple Laundry System 1.0. This issue...A vulnerability was found in code-projects Simple Laundry System 1.0. This issue affects some unknown processing of the file /modmemberinfo.php of the component Parameter Handler. Performing a manipulation of the argument userid results in cross site scripting. The attack may be initiated remotely. The exploit has been made public and could be used. |
2026-04-05 | |
| CVE-2026-5540 | 6.9 | MEDIUM | CWE-74 | 0.0% p11 | 4.83 | A vulnerability has been found in code-projects Simple Laundry System 1.0. This ...A vulnerability has been found in code-projects Simple Laundry System 1.0. This vulnerability affects unknown code of the file /modifymember.php of the component Parameter Handler. Such manipulation of the argument firstName leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. |
2026-04-05 | |
| CVE-2026-5590 | 6.4 | MEDIUM | CWE-476 | 0.0% p13 | 4.48 | A race condition during TCP connection teardown can cause tcp_recv() to operate ...A race condition during TCP connection teardown can cause tcp_recv() to operate on a connection that has already been released. If tcp_conn_search() returns NULL while processing a SYN packet, a NULL pointer derived from stale context data is passed to tcp_backlog_is_full() and dereferenced without validation, leading to a crash. |
2026-04-05 | |
| CVE-2026-5539 | 5.3 | MEDIUM | CWE-79 | 0.0% p10 | 3.71 | A flaw has been found in code-projects Simple Laundry System 1.0. This affects a...A flaw has been found in code-projects Simple Laundry System 1.0. This affects an unknown part of the file /modifymember.php of the component Parameter Handler. This manipulation of the argument firstName causes cross site scripting. The attack can be initiated remotely. The exploit has been published and may be used. |
2026-04-05 | |
| CVE-2026-5538 | 5.3 | MEDIUM | CWE-918 | 0.0% p11 | 3.71 | A vulnerability was detected in QingdaoU OnlineJudge up to 1.6.1. Affected by th...A vulnerability was detected in QingdaoU OnlineJudge up to 1.6.1. Affected by this issue is the function service_url of the file JudgeServer.service_url of the component judge_server_heartbeat Endpoint. The manipulation results in server-side request forgery. It is possible to launch the attack remotely. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-04-05 | |
| CVE-2026-5537 | 5.3 | MEDIUM | CWE-74 | 0.0% p8 | 3.71 | A security vulnerability has been detected in halex CourseSEL up to 1.1.0. Affec...A security vulnerability has been detected in halex CourseSEL up to 1.1.0. Affected by this vulnerability is the function check_sel of the file Apps/Index/Controller/IndexController.class.php of the component HTTP GET Parameter Handler. The manipulation of the argument seid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-04-05 | |
| CVE-2026-5536 | 6.9 | MEDIUM | CWE-20 | 0.0% p13 | 4.83 | A weakness has been identified in FedML-AI FedML up to 0.8.9. Affected is the fu...A weakness has been identified in FedML-AI FedML up to 0.8.9. Affected is the function sendMessage of the file grpc_server.py of the component gRPC server. Executing a manipulation can lead to deserialization. The attack may be performed from remote. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-04-05 | |
| CVE-2026-5535 | 5.3 | MEDIUM | CWE-22 | 0.0% p13 | 3.71 | A security flaw has been discovered in FedML-AI FedML up to 0.8.9. This impacts ...A security flaw has been discovered in FedML-AI FedML up to 0.8.9. This impacts an unknown function of the file FileUtils.java of the component MQTT Message Handler. Performing a manipulation of the argument dataSet results in path traversal. The attack is possible to be carried out remotely. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-04-05 | |
| CVE-2026-5534 | 6.9 | MEDIUM | CWE-74 | 0.0% p11 | 4.83 | A vulnerability was identified in itsourcecode Online Enrollment System 1.0. Thi...A vulnerability was identified in itsourcecode Online Enrollment System 1.0. This affects an unknown function of the file /sms/user/index.php?view=edit&id=10 of the component Parameter Handler. Such manipulation of the argument USERID leads to sql injection. The attack can be executed remotely. The exploit is publicly available and might be used. |
2026-04-05 | |
| CVE-2026-5533 | 5.3 | MEDIUM | CWE-79 | 0.0% p9 | 3.71 | A vulnerability was determined in badlogic pi-mono 0.58.4. The impacted element ...A vulnerability was determined in badlogic pi-mono 0.58.4. The impacted element is an unknown function of the file packages/web-ui/src/tools/artifacts/SvgArtifact.ts of the component SVG Artifact Handler. This manipulation causes cross site scripting. Remote exploitation of the attack is possible. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-04-05 | |
| CVE-2026-5532 | 5.3 | MEDIUM | CWE-77 | 0.9% p75 | 3.74 | A vulnerability was found in ScrapeGraphAI scrapegraph-ai up to 1.74.0. The affe...A vulnerability was found in ScrapeGraphAI scrapegraph-ai up to 1.74.0. The affected element is the function create_sandbox_and_execute of the file scrapegraphai/nodes/generate_code_node.py of the component GenerateCodeNode Component. The manipulation results in os command injection. The attack may be launched remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-04-05 | |
| CVE-2026-5531 | 5.5 | MEDIUM | CWE-312 | 0.0% p3 | 3.85 | A vulnerability has been found in SourceCodester Student Result Management Syste...A vulnerability has been found in SourceCodester Student Result Management System 1.0. Impacted is an unknown function of the file /login_credentials.txt of the component HTTP GET Request Handler. The manipulation leads to cleartext storage in a file or on disk. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. |
2026-04-05 | |
| CVE-2026-5530 | 5.3 | MEDIUM | CWE-918 | 0.0% p10 | 3.71 | A flaw has been found in Ollama up to 18.1. This issue affects some unknown proc...A flaw has been found in Ollama up to 18.1. This issue affects some unknown processing of the file server/download.go of the component Model Pull API. Executing a manipulation can lead to server-side request forgery. The attack can be launched remotely. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-04-05 | |
| CVE-2026-5529 | 5.3 | MEDIUM | CWE-266 | 0.0% p1 | 3.71 | A vulnerability was detected in Dromara lamp-cloud up to 5.8.1. This vulnerabili...A vulnerability was detected in Dromara lamp-cloud up to 5.8.1. This vulnerability affects the function pageUser of the file /defUser/pageUser of the component DefUserController. Performing a manipulation results in improper authorization. The attack can be initiated remotely. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet. |
2026-04-05 | |
| CVE-2026-5528 | 5.3 | MEDIUM | CWE-77 | 0.3% p56 | 3.72 | A security vulnerability has been detected in MoussaabBadla code-screenshot-mcp ...A security vulnerability has been detected in MoussaabBadla code-screenshot-mcp up to 0.1.0. This affects an unknown part of the component HTTP Interface. Such manipulation leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-04-05 | |
| CVE-2026-5526 | 6.9 | MEDIUM | CWE-266 | 0.1% p15 | 4.83 | A security flaw has been discovered in Tenda 4G03 Pro up to 1.0/1.1/04.03.01.53/...A security flaw has been discovered in Tenda 4G03 Pro up to 1.0/1.1/04.03.01.53/192.168.0.1. Affected by this vulnerability is an unknown functionality of the file /bin/httpd. The manipulation results in improper access controls. The attack may be performed from remote. The exploit has been released to the public and may be used for attacks. |
2026-04-04 | |
| CVE-2018-25246 | 8.7 | HIGH | CWE-306 | 0.1% p17 | 6.09 | Wikipedia 12.0 contains a denial of service vulnerability that allows unauthenti...Wikipedia 12.0 contains a denial of service vulnerability that allows unauthenticated attackers to crash the application by submitting oversized input through the search functionality. Attackers can paste a large buffer of repeated characters into the search bar to trigger an application crash. |
2026-04-04 | |
| CVE-2016-20054 | 5.3 | MEDIUM | CWE-79 | 0.0% p2 | 3.71 | Nodcms contains a cross-site request forgery vulnerability that allows attackers...Nodcms contains a cross-site request forgery vulnerability that allows attackers to perform unauthorized administrative actions by crafting malicious forms. Attackers can trick authenticated administrators into submitting requests to admin/user_manipulate and admin/settings/generall endpoints to create users or modify application settings without explicit consent. |
2026-04-04 | |
| CVE-2018-25255 | 8.6 | HIGH | CWE-787 | 0.0% p4 | 6.02 | 10-Strike LANState 8.8 contains a local buffer overflow vulnerability in structu...10-Strike LANState 8.8 contains a local buffer overflow vulnerability in structured exception handling that allows local attackers to execute arbitrary code by crafting malicious LSM map files. Attackers can create a specially formatted LSM file with a payload in the ObjCaption parameter that overflows the buffer, overwrites the SEH chain, and executes shellcode when the file is opened in the application. |
2026-04-04 | |
| CVE-2018-25254 | 9.3 | CRITICAL | CWE-787 | 0.2% p46 | 6.52 | NICO-FTP 3.0.1.19 contains a structured exception handler buffer overflow vulner...NICO-FTP 3.0.1.19 contains a structured exception handler buffer overflow vulnerability that allows remote attackers to execute arbitrary code by sending crafted FTP commands. Attackers can connect to the FTP service and send oversized data in response handlers to overwrite SEH pointers and redirect execution to injected shellcode. |
2026-04-04 | |
| CVE-2018-25253 | 6.9 | MEDIUM | CWE-787 | 0.0% p3 | 4.83 | Termite 3.4 contains a buffer overflow vulnerability in the User interface langu...Termite 3.4 contains a buffer overflow vulnerability in the User interface language settings field that allows local attackers to cause a denial of service by supplying an excessively long string. Attackers can paste a 2000-byte payload into the Settings User interface language field to crash the application. |
2026-04-04 | |
| CVE-2018-25252 | 6.9 | MEDIUM | CWE-787 | 0.0% p3 | 4.83 | FTP Voyager 16.2.0 contains a denial of service vulnerability that allows local ...FTP Voyager 16.2.0 contains a denial of service vulnerability that allows local attackers to crash the application by injecting oversized buffer data into the site profile IP field. Attackers can create a malicious site profile containing 500 bytes of repeated characters and paste it into the IP field to trigger a buffer overflow that crashes the FTP Voyager process. |
2026-04-04 | |
| CVE-2018-25251 | 8.6 | HIGH | CWE-787 | 0.0% p4 | 6.02 | Snes9K 0.0.9z contains a buffer overflow vulnerability in the Netplay Socket Por...Snes9K 0.0.9z contains a buffer overflow vulnerability in the Netplay Socket Port Number field that allows local attackers to trigger a structured exception handler (SEH) overwrite. Attackers can craft a malicious payload and paste it into the Socket Port Number field via the Netplay Options menu to achieve code execution through SEH chain exploitation. |
2026-04-04 | |
| CVE-2018-25250 | 5.1 | MEDIUM | CWE-79 | 0.0% p9 | 3.57 | MyBB Last User's Threads in Profile Plugin 1.2 contains a persistent cross-site ...MyBB Last User's Threads in Profile Plugin 1.2 contains a persistent cross-site scripting vulnerability that allows attackers to inject malicious scripts by crafting thread subjects with script tags. Attackers can create threads with script payloads in the subject field that execute when users visit the attacker's profile page. |
2026-04-04 | |
| CVE-2018-25249 | 5.1 | MEDIUM | CWE-79 | 0.0% p7 | 3.57 | MyBB My Arcade Plugin 1.3 contains a persistent cross-site scripting vulnerabili...MyBB My Arcade Plugin 1.3 contains a persistent cross-site scripting vulnerability that allows authenticated users to inject malicious scripts through arcade game score comments. Attackers can add crafted HTML and JavaScript payloads in the comment field that execute when other users view or edit the comment. |
2026-04-04 | |
| CVE-2018-25248 | 5.1 | MEDIUM | CWE-79 | 0.0% p7 | 3.57 | MyBB Downloads Plugin 2.0.3 contains a persistent cross-site scripting vulnerabi...MyBB Downloads Plugin 2.0.3 contains a persistent cross-site scripting vulnerability that allows regular members to inject malicious scripts through the download title field. Attackers can submit a new download with HTML/JavaScript code in the title parameter, which executes when administrators validate the download in downloads.php. |
2026-04-04 | |
| CVE-2018-25247 | 5.1 | MEDIUM | CWE-79 | 0.0% p8 | 3.57 | MyBB Like Plugin 3.0.0 contains a cross-site scripting vulnerability that allows...MyBB Like Plugin 3.0.0 contains a cross-site scripting vulnerability that allows attackers to inject malicious scripts by creating posts or threads with unvalidated subject content. Attackers can craft post subjects containing script tags that execute when other users view the attacker's profile, where liked posts are displayed without sanitization. |
2026-04-04 | |
| CVE-2018-25245 | 8.7 | HIGH | CWE-601 | 0.1% p15 | 6.09 | 7 Tik 1.0.1.0 contains a denial of service vulnerability that allows attackers t...7 Tik 1.0.1.0 contains a denial of service vulnerability that allows attackers to crash the application by submitting excessively long input strings to the search functionality. Attackers can paste a buffer of 7700 characters into the search bar to trigger an application crash. |
2026-04-04 | |
| CVE-2018-25244 | 6.9 | MEDIUM | CWE-1312 | 0.0% p3 | 4.83 | Eco Search 1.0.2.0 contains a denial of service vulnerability that allows local ...Eco Search 1.0.2.0 contains a denial of service vulnerability that allows local attackers to crash the application by submitting an excessively long string to the search functionality. Attackers can paste a buffer of 950 or more characters into the search bar and trigger a crash by initiating a search operation. |
2026-04-04 | |
| CVE-2018-25243 | 6.9 | MEDIUM | CWE-763 | 0.0% p3 | 4.83 | FastTube 1.0.1.0 contains a denial of service vulnerability that allows local at...FastTube 1.0.1.0 contains a denial of service vulnerability that allows local attackers to crash the application by submitting an excessively long string to the search functionality. Attackers can paste a buffer of 1900 characters into the search bar and trigger a crash when the search operation is executed. |
2026-04-04 | |
| CVE-2018-25242 | 6.9 | MEDIUM | CWE-1389 | 0.0% p3 | 4.83 | One Search 1.1.0.0 contains a denial of service vulnerability that allows local ...One Search 1.1.0.0 contains a denial of service vulnerability that allows local attackers to crash the application by submitting excessively long input strings to the search functionality. Attackers can paste a buffer of 950 or more characters into the search bar to trigger an unhandled exception that crashes the application. |
2026-04-04 | |
| CVE-2018-25241 | 8.7 | HIGH | CWE-306 | 0.1% p17 | 6.09 | VPN Browser+ 1.1.0.0 contains a denial of service vulnerability that allows unau...VPN Browser+ 1.1.0.0 contains a denial of service vulnerability that allows unauthenticated attackers to crash the application by submitting oversized input through the search functionality. Attackers can paste a large buffer of characters into the search bar to trigger an unhandled exception that terminates the application. |
2026-04-04 | |
| CVE-2018-25240 | 6.9 | MEDIUM | CWE-1260 | 0.0% p3 | 4.83 | Watchr 1.1.0.0 contains a denial of service vulnerability that allows local atta...Watchr 1.1.0.0 contains a denial of service vulnerability that allows local attackers to crash the application by submitting an excessively long string to the search functionality. Attackers can paste a buffer of 8145 characters into the search bar and trigger a search operation to cause the application to crash. |
2026-04-04 | |
| CVE-2018-25239 | 6.9 | MEDIUM | CWE-470 | 0.0% p3 | 4.83 | Smart VPN 1.1.3.0 contains a denial of service vulnerability that allows local a...Smart VPN 1.1.3.0 contains a denial of service vulnerability that allows local attackers to crash the application by submitting oversized input through the search interface. Attackers can paste a buffer of 2100 characters into the top right search bar to trigger an unhandled exception that crashes the application. |
2026-04-04 | |
| CVE-2018-25238 | 6.9 | MEDIUM | CWE-1260 | 0.0% p3 | 4.83 | VSCO 1.1.1.0 contains a denial of service vulnerability that allows local attack...VSCO 1.1.1.0 contains a denial of service vulnerability that allows local attackers to crash the application by submitting an excessively long string through the search functionality. Attackers can paste a buffer of 5000 characters into the search bar and navigate back to trigger an application crash. |
2026-04-04 | |
| CVE-2016-20061 | 8.5 | HIGH | CWE-428 | 0.0% p2 | 5.95 | sheed AntiVirus 2.3 contains an unquoted service path vulnerability in the ShavP...sheed AntiVirus 2.3 contains an unquoted service path vulnerability in the ShavProt service that allows local attackers to escalate privileges by exploiting the service binary path. Attackers can insert a malicious executable in the unquoted path and trigger service restart or system reboot to execute code with LocalSystem privileges. |
2026-04-04 | |
| CVE-2016-20060 | 8.5 | HIGH | CWE-428 | 0.0% p2 | 5.95 | Hotspot Shield 6.0.3 contains an unquoted service path vulnerability in the hshl...Hotspot Shield 6.0.3 contains an unquoted service path vulnerability in the hshld service binary that allows local attackers to escalate privileges by injecting malicious executables. Attackers can place executable files in the service path and upon service restart or system reboot, the malicious code executes with LocalSystem privileges. |
2026-04-04 | |
| CVE-2016-20059 | 8.5 | HIGH | CWE-428 | 0.0% p2 | 5.95 | IObit Malware Fighter 4.3.1 contains an unquoted service path vulnerability in t...IObit Malware Fighter 4.3.1 contains an unquoted service path vulnerability in the IMFservice and LiveUpdateSvc services that allows local attackers to escalate privileges. Attackers can insert a malicious executable file in the unquoted service path and trigger privilege escalation when the service restarts or the system reboots, executing code with LocalSystem privileges. |
2026-04-04 | |
| CVE-2016-20058 | 8.5 | HIGH | CWE-428 | 0.1% p20 | 5.95 | Netgate AMITI Antivirus build 23.0.305 contains an unquoted service path vulnera...Netgate AMITI Antivirus build 23.0.305 contains an unquoted service path vulnerability in the AmitiAvSrv and AmitiAntivirusHealth services that allows local attackers to escalate privileges. Attackers can place a malicious executable in the unquoted service path and trigger service restart or system reboot to execute code with LocalSystem privileges. |
2026-04-04 | |
| CVE-2016-20057 | 8.5 | HIGH | CWE-428 | 0.1% p20 | 5.95 | NETGATE Registry Cleaner build 16.0.205 contains an unquoted service path vulner...NETGATE Registry Cleaner build 16.0.205 contains an unquoted service path vulnerability in the NGRegClnSrv service that allows local attackers to escalate privileges by exploiting the service binary path. Attackers can place a malicious executable in the unquoted path and trigger service restart or system reboot to execute code with LocalSystem privileges. |
2026-04-04 | |
| CVE-2016-20056 | 8.5 | HIGH | CWE-428 | 0.0% p2 | 5.95 | Spy Emergency build 23.0.205 contains an unquoted service path vulnerability in ...Spy Emergency build 23.0.205 contains an unquoted service path vulnerability in the SpyEmrgHealth and SpyEmrgSrv services that allows local attackers to escalate privileges by inserting malicious executables. Attackers can place executable files in the unquoted service path and trigger service restart or system reboot to execute code with LocalSystem privileges. |
2026-04-04 | |
| CVE-2016-20055 | 8.5 | HIGH | CWE-428 | 0.0% p3 | 5.95 | IObit Advanced SystemCare 10.0.2 contains an unquoted service path vulnerability...IObit Advanced SystemCare 10.0.2 contains an unquoted service path vulnerability in the AdvancedSystemCareService10 service that allows local attackers to escalate privileges. Attackers can place a malicious executable in the service path and trigger privilege escalation when the service restarts or the system reboots, executing code with LocalSystem privileges. |
2026-04-04 | |
| CVE-2016-20053 | 6.9 | MEDIUM | CWE-352 | 0.0% p5 | 4.83 | Redaxo CMS 5.2 contains a cross-site request forgery vulnerability that allows u...Redaxo CMS 5.2 contains a cross-site request forgery vulnerability that allows unauthenticated attackers to create administrative user accounts by tricking authenticated administrators into visiting malicious pages. Attackers can craft HTML forms targeting the users endpoint with hidden fields containing admin credentials and account parameters to add new administrator accounts without user consent. |
2026-04-04 | |
| CVE-2016-20052 | 9.3 | CRITICAL | CWE-434 | 0.3% p52 | 6.52 | Snews CMS 1.7 contains an unrestricted file upload vulnerability that allows una...Snews CMS 1.7 contains an unrestricted file upload vulnerability that allows unauthenticated attackers to upload arbitrary files including PHP executables to the snews_files directory. Attackers can upload malicious PHP files through the multipart form-data upload endpoint and execute them by accessing the uploaded file path to achieve remote code execution. |
2026-04-04 | |
| CVE-2016-20051 | 6.9 | MEDIUM | CWE-352 | 0.0% p2 | 4.83 | Snews CMS 1.7 contains a cross-site request forgery vulnerability that allows at...Snews CMS 1.7 contains a cross-site request forgery vulnerability that allows attackers to change administrator credentials without authentication by crafting malicious HTML forms. Attackers can trick authenticated administrators into visiting a page containing a hidden form that submits POST requests to the changeup action, modifying the admin username and password parameters to gain unauthorized access. |
2026-04-04 | |
| CVE-2016-20050 | 6.9 | MEDIUM | CWE-787 | 0.0% p3 | 4.83 | NetSchedScan 1.0 contains a buffer overflow vulnerability in the scan Hostname/I...NetSchedScan 1.0 contains a buffer overflow vulnerability in the scan Hostname/IP field that allows local attackers to crash the application by supplying an oversized input string. Attackers can paste a crafted payload containing 388 bytes of data followed by 4 bytes of EIP overwrite into the Hostname/IP field to trigger a denial of service condition. |
2026-04-04 | |
| CVE-2026-3666 | 8.8 | HIGH | CWE-22 | 0.0% p9 | 6.16 | The wpForo Forum plugin for WordPress is vulnerable to arbitrary file deletion i...The wpForo Forum plugin for WordPress is vulnerable to arbitrary file deletion in all versions up to, and including, 2.4.16. This is due to a missing file name/path validation against path traversal sequences. This makes it possible for authenticated attackers, with subscriber level access and above, to delete arbitrary files on the server by embedding a crafted path traversal string in a forum post body and then deleting the post. |
2026-04-04 | |
| CVE-2026-3309 | 6.5 | MEDIUM | CWE-94 | 0.0% p11 | 4.55 | The Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User ...The Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 4.16.11. This is due to the plugin allowing user-supplied billing field values from the checkout process to be interpolated into shortcode template strings that are subsequently processed without proper sanitization of shortcode syntax. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes by submitting crafted billing field values during the checkout process. |
2026-04-04 | |
| CVE-2026-2936 | 7.2 | HIGH | CWE-79 | 0.0% p6 | 5.04 | The Visitor Traffic Real Time Statistics plugin for WordPress is vulnerable to S...The Visitor Traffic Real Time Statistics plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'page_title' parameter in all versions up to, and including, 8.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever an admin user accesses the Traffic by Title section. |
2026-04-04 | |
| CVE-2026-1233 | 7.5 | HIGH | CWE-798 | 0.0% p5 | 5.25 | The Text to Speech for WP (AI Voices by Mementor) plugin for WordPress is vulner...The Text to Speech for WP (AI Voices by Mementor) plugin for WordPress is vulnerable to sensitive information exposure in all versions up to, and including, 1.9.8. This is due to the plugin containing hardcoded MySQL database credentials for the vendor's external telemetry server in the `Mementor_TTS_Remote_Telemetry` class. This makes it possible for unauthenticated attackers to extract and decode these credentials, gaining unauthorized write access to the vendor's telemetry database. |
2026-04-04 | |
| CVE-2026-0626 | 6.4 | MEDIUM | CWE-79 | 0.0% p1 | 4.48 | The WPFunnels – Easy Funnel Builder To Optimize Buyer Journeys And Get More Lead...The WPFunnels – Easy Funnel Builder To Optimize Buyer Journeys And Get More Leads & Sales plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'wpf_optin_form' shortcode in all versions up to, and including, 3.7.9 due to insufficient input sanitization and output escaping of the 'button_icon' parameter. This makes it possible for authenticated attackers, with contributor level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-04-04 | |
| CVE-2025-14938 | 5.3 | MEDIUM | CWE-434 | 0.0% p7 | 3.71 | The Listeo Core plugin for WordPress is vulnerable to unauthenticated arbitrary ...The Listeo Core plugin for WordPress is vulnerable to unauthenticated arbitrary media upload in all versions up to, and including, 2.0.27 via the "listeo_core_handle_dropped_media" function. This is due to missing authorization and capability checks on the AJAX endpoint handling file uploads. This makes it possible for unauthenticated attackers to upload arbitrary media to the site's media library, without achieving direct code execution. |
2026-04-04 | |
| CVE-2026-5425 | 7.2 | HIGH | CWE-79 | 0.1% p23 | 5.04 | The Widgets for Social Photo Feed plugin for WordPress is vulnerable to Stored C...The Widgets for Social Photo Feed plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'feed_data' parameter keys in all versions up to, and including, 1.7.9 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-04-04 | |
| CVE-2026-3445 | 7.1 | HIGH | CWE-862 | 0.0% p7 | 4.97 | The Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User ...The Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress plugin for WordPress is vulnerable to unauthorized membership payment bypass in all versions up to, and including, 4.16.11. This is due to a missing ownership verification on the `change_plan_sub_id` parameter in the `process_checkout()` function. This makes it possible for authenticated attackers, with subscriber level access and above, to reference another user's active subscription during checkout to manipulate proration calculations, allowing them to obtain paid lifetime membership plans without payment via the `ppress_process_checkout` AJAX action. |
2026-04-04 | |
| CVE-2026-2826 | 4.3 | MEDIUM | CWE-862 | 0.0% p8 | 3.01 | The Kadence Blocks — Page Builder Toolkit for Gutenberg Editor plugin for WordPr...The Kadence Blocks — Page Builder Toolkit for Gutenberg Editor plugin for WordPress is vulnerable to authorization bypass in all versions up to, and including, 3.6.3. This is due to the plugin not properly verifying that a user has the `upload_files` capability in the `process_pattern` REST API endpoint. This makes it possible for authenticated attackers, with contributor level access and above, to upload images to the WordPress Media Library by supplying remote image URLs that the server downloads and creates as media attachments. |
2026-04-04 | |
| CVE-2026-2437 | 6.4 | MEDIUM | CWE-79 | 0.0% p9 | 4.48 | The WP Travel Engine – Tour Booking Plugin – Tour Operator Software plugin for W...The WP Travel Engine – Tour Booking Plugin – Tour Operator Software plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'wte_trip_tax' shortcode in all versions up to, and including, 6.7.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-04-04 | |
| CVE-2026-4896 | 8.1 | HIGH | CWE-639 | 0.0% p1 | 5.67 | The WCFM – Frontend Manager for WooCommerce along with Bookings Subscription Lis...The WCFM – Frontend Manager for WooCommerce along with Bookings Subscription Listings Compatible plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 6.7.25 via multiple AJAX actions including `wcfm_modify_order_status`, `delete_wcfm_article`, `delete_wcfm_product`, and the article management controller due to missing validation on user-supplied object IDs. This makes it possible for authenticated attackers, with Vendor-level access and above, to modify the status of any order, delete or modify any post/product/page, regardless of ownership. |
2026-04-04 | |
| CVE-2026-2600 | 6.4 | MEDIUM | CWE-79 | 0.0% p1 | 4.48 | The ElementsKit Elementor Addons and Templates plugin for WordPress is vulnerabl...The ElementsKit Elementor Addons and Templates plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'ekit_tab_title' parameter in the Simple Tab widget in all versions up to, and including, 3.7.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-04-04 | |
| CVE-2026-0738 | 6.4 | MEDIUM | CWE-79 | 0.0% p1 | 4.48 | The WP Shortcodes Plugin - Shortcodes Ultimate plugin for WordPress is vulnerabl...The WP Shortcodes Plugin - Shortcodes Ultimate plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the su_carousel shortcode in all versions up to, and including, 7.4.8. This is due to insufficient input sanitization and output escaping in the 'su_slide_link' attachment meta field. This makes it possible for authenticated attackers, with author level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-04-04 | |
| CVE-2026-0737 | 6.4 | MEDIUM | CWE-79 | 0.0% p1 | 4.48 | The WP Shortcodes Plugin - Shortcodes Ultimate plugin for WordPress is vulnerabl...The WP Shortcodes Plugin - Shortcodes Ultimate plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 7.4.7. This is due to insufficient input sanitization and output escaping in the 'src' attribute of the su_lightbox shortcode. This makes it possible for authenticated attackers, with contributor level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-04-04 | |
| CVE-2026-0664 | 6.4 | MEDIUM | CWE-79 | 0.0% p1 | 4.48 | The Royal Addons for Elementor plugin for WordPress is vulnerable to Stored Cros...The Royal Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'button_text' parameter in all versions up to, and including, 1.7.1049 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-04-04 | |
| CVE-2026-0552 | 6.4 | MEDIUM | CWE-79 | 0.0% p1 | 4.48 | The Simple Shopping Cart plugin for WordPress is vulnerable to Stored Cross-Site...The Simple Shopping Cart plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'wpsc_display_product' shortcode in all versions up to, and including, 5.2.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-04-04 | |
| CVE-2025-15064 | 6.4 | MEDIUM | CWE-79 | 0.0% p1 | 4.48 | The Ultimate Member – User Profile, Registration, Login, Member Directory, Conte...The Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the user description field in all versions up to, and including, 2.11.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with subscriber level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. The vulnerability is only exploitable when "HTML support for user description" is enabled in Ultimate Member settings. |
2026-04-04 | |
| CVE-2025-13368 | 6.4 | MEDIUM | CWE-79 | 0.0% p1 | 4.48 | The Xpro Addons — 140+ Widgets for Elementor plugin for WordPress is vulnerable ...The Xpro Addons — 140+ Widgets for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Pricing Widget's 'onClick Event' setting in all versions up to, and including, 1.4.20 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-04-04 | |
| CVE-2026-2949 | 6.4 | MEDIUM | CWE-79 | 0.0% p9 | 4.48 | The Xpro Addons — 140+ Widgets for Elementor plugin for WordPress is vulnerable ...The Xpro Addons — 140+ Widgets for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Icon Box widget in versions up to, and including, 1.4.24 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-04-04 | |
| CVE-2026-2924 | 6.4 | MEDIUM | CWE-79 | 0.0% p9 | 4.48 | The Gutenverse – Ultimate WordPress FSE Blocks Addons & Ecosystem plugin for Wor...The Gutenverse – Ultimate WordPress FSE Blocks Addons & Ecosystem plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'imageLoad' parameter in versions up to, and including, 3.4.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-04-04 | |
| CVE-2026-3571 | 6.5 | MEDIUM | CWE-862 | 0.0% p5 | 4.55 | The Pie Register – User Registration, Profiles & Content Restriction plugin for ...The Pie Register – User Registration, Profiles & Content Restriction plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the pie_main() function in all versions up to, and including, 3.8.4.8. This makes it possible for unauthenticated attackers to change registration form status. |
2026-04-04 | |
| CVE-2026-35616 | 9.8 | CRITICAL | CWE-284 | ✓ | 25.3% p96 | 7.62 | A improper access control vulnerability in Fortinet FortiClientEMS 7.4.5 through...A improper access control vulnerability in Fortinet FortiClientEMS 7.4.5 through 7.4.6 may allow an unauthenticated attacker to execute unauthorized code or commands via crafted requests. |
2026-04-04 |
| CVE-2026-34780 | 8.3 | HIGH | CWE-668 | 0.0% p10 | 5.81 | Electron is a framework for writing cross-platform desktop applications using Ja...Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. From versions 39.0.0-alpha.1 to before 39.8.0, 40.0.0-alpha.1 to before 40.7.0, and 41.0.0-alpha.1 to before 41.0.0-beta.8, apps that pass VideoFrame objects (from the WebCodecs API) across the contextBridge are vulnerable to a context isolation bypass. An attacker who can execute JavaScript in the main world (for example, via XSS) can use a bridged VideoFrame to gain access to the isolated world, including any Node.js APIs exposed to the preload script. Apps are only affected if a preload script returns, resolves, or passes a VideoFrame object to the main world via contextBridge.exposeInMainWorld(). Apps that do not bridge VideoFrame objects are not affected. This issue has been patched in versions 39.8.0, 40.7.0, and 41.0.0-beta.8. |
2026-04-04 | |
| CVE-2026-34955 | 8.8 | HIGH | CWE-78 | 0.0% p11 | 6.16 | PraisonAI is a multi-agent teams system. Prior to version 4.5.97, SubprocessSand...PraisonAI is a multi-agent teams system. Prior to version 4.5.97, SubprocessSandbox in all modes (BASIC, STRICT, NETWORK_ISOLATED) calls subprocess.run() with shell=True and relies solely on string-pattern matching to block dangerous commands. The blocklist does not include sh or bash as standalone executables, allowing trivial sandbox escape in STRICT mode via sh -c '<command>'. This issue has been patched in version 4.5.97. |
2026-04-04 | |
| CVE-2026-34779 | 6.5 | MEDIUM | CWE-78 | 0.0% p6 | 4.55 | Electron is a framework for writing cross-platform desktop applications using Ja...Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. Prior to versions 38.8.6, 39.8.1, 40.8.0, and 41.0.0-beta.8, on macOS, app.moveToApplicationsFolder() used an AppleScript fallback path that did not properly handle certain characters in the application bundle path. Under specific conditions, a crafted launch path could lead to arbitrary AppleScript execution when the user accepted the move-to-Applications prompt. Apps are only affected if they call app.moveToApplicationsFolder(). Apps that do not use this API are not affected. This issue has been patched in versions 38.8.6, 39.8.1, 40.8.0, and 41.0.0-beta.8. |
2026-04-04 | |
| CVE-2026-34778 | 5.9 | MEDIUM | CWE-290 | 0.0% p3 | 4.13 | Electron is a framework for writing cross-platform desktop applications using Ja...Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. Prior to versions 38.8.6, 39.8.1, 40.8.1, and 41.0.0, a service worker running in a session could spoof reply messages on the internal IPC channel used by webContents.executeJavaScript() and related methods, causing the main-process promise to resolve with attacker-controlled data. Apps are only affected if they have service workers registered and use the result of webContents.executeJavaScript() (or webFrameMain.executeJavaScript()) in security-sensitive decisions. This issue has been patched in versions 38.8.6, 39.8.1, 40.8.1, and 41.0.0. |
2026-04-04 | |
| CVE-2026-34777 | 5.4 | MEDIUM | CWE-346 | 0.0% p3 | 3.78 | Electron is a framework for writing cross-platform desktop applications using Ja...Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. Prior to versions 38.8.6, 39.8.1, 40.8.1, and 41.0.0, when an iframe requests fullscreen, pointerLock, keyboardLock, openExternal, or media permissions, the origin passed to session.setPermissionRequestHandler() was the top-level page's origin rather than the requesting iframe's origin. Apps that grant permissions based on the origin parameter or webContents.getURL() may inadvertently grant permissions to embedded third-party content. The correct requesting URL remains available via details.requestingUrl. Apps that already check details.requestingUrl are not affected. This issue has been patched in versions 38.8.6, 39.8.1, 40.8.1, and 41.0.0. |
2026-04-04 | |
| CVE-2026-34776 | 5.3 | MEDIUM | CWE-125 | 0.0% p2 | 3.71 | Electron is a framework for writing cross-platform desktop applications using Ja...Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. Prior to versions 38.8.6, 39.8.1, 40.8.1, and 41.0.0, on macOS and Linux, apps that call app.requestSingleInstanceLock() were vulnerable to an out-of-bounds heap read when parsing a crafted second-instance message. Leaked memory could be delivered to the app's second-instance event handler. This issue is limited to processes running as the same user as the Electron app. Apps that do not call app.requestSingleInstanceLock() are not affected. Windows is not affected by this issue. This issue has been patched in versions 38.8.6, 39.8.1, 40.8.1, and 41.0.0. |
2026-04-04 | |
| CVE-2026-34775 | 6.8 | MEDIUM | CWE-653 | 0.0% p9 | 4.76 | Electron is a framework for writing cross-platform desktop applications using Ja...Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. Prior to versions 38.8.6, 39.8.4, 40.8.4, and 41.0.0, the nodeIntegrationInWorker webPreference was not correctly scoped in all configurations. In certain process-sharing scenarios, workers spawned in frames configured with nodeIntegrationInWorker: false could still receive Node.js integration. Apps are only affected if they enable nodeIntegrationInWorker. Apps that do not use nodeIntegrationInWorker are not affected. This issue has been patched in versions 38.8.6, 39.8.4, 40.8.4, and 41.0.0. |
2026-04-04 | |
| CVE-2026-34774 | 8.1 | HIGH | CWE-416 | 0.1% p17 | 5.67 | Electron is a framework for writing cross-platform desktop applications using Ja...Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. Prior to versions 39.8.1, 40.7.0, and 41.0.0, apps that use offscreen rendering and allow child windows via window.open() may be vulnerable to a use-after-free. If the parent offscreen WebContents is destroyed while a child window remains open, subsequent paint frames on the child dereference freed memory, which may lead to a crash or memory corruption. Apps are only affected if they use offscreen rendering (webPreferences.offscreen: true) and their setWindowOpenHandler permits child windows. Apps that do not use offscreen rendering, or that deny child windows, are not affected. This issue has been patched in versions 39.8.1, 40.7.0, and 41.0.0. |
2026-04-04 | |
| CVE-2026-34773 | 4.7 | MEDIUM | CWE-20 | 0.0% p8 | 3.29 | Electron is a framework for writing cross-platform desktop applications using Ja...Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. Prior to versions 38.8.6, 39.8.1, 40.8.1, and 41.0.0, on Windows, app.setAsDefaultProtocolClient(protocol) did not validate the protocol name before writing to the registry. Apps that pass untrusted input as the protocol name may allow an attacker to write to arbitrary subkeys under HKCU\Software\Classes\, potentially hijacking existing protocol handlers. Apps are only affected if they call app.setAsDefaultProtocolClient() with a protocol name derived from external or untrusted input. Apps that use a hardcoded protocol name are not affected. This issue has been patched in versions 38.8.6, 39.8.1, 40.8.1, and 41.0.0. |
2026-04-04 | |
| CVE-2026-34772 | 5.8 | MEDIUM | CWE-416 | 0.0% p3 | 4.06 | Electron is a framework for writing cross-platform desktop applications using Ja...Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. Prior to versions 38.8.6, 39.8.0, 40.7.0, and 41.0.0-beta.8, apps that allow downloads and programmatically destroy sessions may be vulnerable to a use-after-free. If a session is torn down while a native save-file dialog is open for a download, dismissing the dialog dereferences freed memory, which may lead to a crash or memory corruption. Apps that do not destroy sessions at runtime, or that do not permit downloads, are not affected. This issue has been patched in versions 38.8.6, 39.8.0, 40.7.0, and 41.0.0-beta.8. |
2026-04-04 | |
| CVE-2026-34771 | 7.5 | HIGH | CWE-416 | 0.0% p12 | 5.25 | Electron is a framework for writing cross-platform desktop applications using Ja...Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. Prior to versions 38.8.6, 39.8.0, 40.7.0, and 41.0.0-beta.8, apps that register an asynchronous session.setPermissionRequestHandler() may be vulnerable to a use-after-free when handling fullscreen, pointer-lock, or keyboard-lock permission requests. If the requesting frame navigates or the window closes while the permission handler is pending, invoking the stored callback dereferences freed memory, which may lead to a crash or memory corruption. Apps that do not set a permission request handler, or whose handler responds synchronously, are not affected. This issue has been patched in versions 38.8.6, 39.8.0, 40.7.0, and 41.0.0-beta.8. |
2026-04-04 | |
| CVE-2026-34770 | 7.0 | HIGH | CWE-416 | 0.0% p3 | 4.90 | Electron is a framework for writing cross-platform desktop applications using Ja...Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. Prior to versions 38.8.6, 39.8.1, 40.8.0, and 41.0.0-beta.8, apps that use the powerMonitor module may be vulnerable to a use-after-free. After the native PowerMonitor object is garbage-collected, the associated OS-level resources (a message window on Windows, a shutdown handler on macOS) retain dangling references. A subsequent session-change event (Windows) or system shutdown (macOS) dereferences freed memory, which may lead to a crash or memory corruption. All apps that access powerMonitor events (suspend, resume, lock-screen, etc.) are potentially affected. The issue is not directly renderer-controllable. This issue has been patched in versions 38.8.6, 39.8.1, 40.8.0, and 41.0.0-beta.8. |
2026-04-04 | |
| CVE-2026-34769 | 7.7 | HIGH | CWE-88 | 0.0% p5 | 5.39 | Electron is a framework for writing cross-platform desktop applications using Ja...Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. Prior to versions 38.8.6, 39.8.0, 40.7.0, and 41.0.0-beta.8, an undocumented commandLineSwitches webPreference allowed arbitrary switches to be appended to the renderer process command line. Apps that construct webPreferences by spreading untrusted configuration objects may inadvertently allow an attacker to inject switches that disable renderer sandboxing or web security controls. Apps are only affected if they construct webPreferences from external or untrusted input without an allowlist. Apps that use a fixed, hardcoded webPreferences object are not affected. This issue has been patched in versions 38.8.6, 39.8.0, 40.7.0, and 41.0.0-beta.8. |
2026-04-04 | |
| CVE-2026-34768 | 3.9 | LOW | CWE-428 | 0.0% p1 | 2.73 | Electron is a framework for writing cross-platform desktop applications using Ja...Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. Prior to versions 38.8.6, 39.8.1, 40.8.0, and 41.0.0-beta.8, on Windows, app.setLoginItemSettings({openAtLogin: true}) wrote the executable path to the Run registry key without quoting. If the app is installed to a path containing spaces, an attacker with write access to an ancestor directory may be able to cause a different executable to run at login instead of the intended app. On a default Windows install, standard system directories are protected against writes by standard users, so exploitation typically requires a non-standard install location. This issue has been patched in versions 38.8.6, 39.8.1, 40.8.0, and 41.0.0-beta.8. |
2026-04-04 | |
| CVE-2026-34767 | 5.9 | MEDIUM | CWE-74 | 0.0% p9 | 4.13 | Electron is a framework for writing cross-platform desktop applications using Ja...Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. Prior to versions 38.8.6, 39.8.3, 40.8.3, and 41.0.3, apps that register custom protocol handlers via protocol.handle() / protocol.registerSchemesAsPrivileged() or modify response headers via webRequest.onHeadersReceived may be vulnerable to HTTP response header injection if attacker-controlled input is reflected into a response header name or value. An attacker who can influence a header value may be able to inject additional response headers, affecting cookies, content security policy, or cross-origin access controls. Apps that do not reflect external input into response headers are not affected. This issue has been patched in versions 38.8.6, 39.8.3, 40.8.3, and 41.0.3. |
2026-04-04 | |
| CVE-2026-34766 | 3.3 | LOW | CWE-862 | 0.0% p6 | 2.31 | Electron is a framework for writing cross-platform desktop applications using Ja...Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. Prior to versions 38.8.6, 39.8.0, 40.7.0, and 41.0.0-beta.8, the select-usb-device event callback did not validate the chosen device ID against the filtered list that was presented to the handler. An app whose handler could be influenced to select a device ID outside the filtered set would grant access to a device that did not match the renderer's requested filters or was listed in exclusionFilters. The WebUSB security blocklist remained enforced regardless, so security-sensitive devices on the blocklist were not affected. The practical impact is limited to apps with unusual device-selection logic. This issue has been patched in versions 38.8.6, 39.8.0, 40.7.0, and 41.0.0-beta.8. |
2026-04-04 | |
| CVE-2026-35468 | 5.3 | MEDIUM | CWE-252 | 0.1% p17 | 3.71 | nimiq/core-rs-albatross is a Rust implementation of the Nimiq Proof-of-Stake pro...nimiq/core-rs-albatross is a Rust implementation of the Nimiq Proof-of-Stake protocol based on the Albatross consensus algorithm. Prior to version 1.3.0, two peer-facing consensus request handlers assume that the history index is always available and call blockchain.history_store.history_index().unwrap() directly. That assumption is false by construction. HistoryStoreProxy::history_index() explicitly returns None for the valid HistoryStoreProxy::WithoutIndex state. when a full node is syncing or otherwise running without the history index, a remote peer can send RequestTransactionsProof or RequestTransactionReceiptsByAddress and trigger an Option::unwrap() panic on the request path. This issue has been patched in version 1.3.0. |
2026-04-03 | |
| CVE-2026-34954 | 8.6 | HIGH | CWE-918 | 0.0% p12 | 6.02 | PraisonAI is a multi-agent teams system. Prior to version 1.5.95, FileTools.down...PraisonAI is a multi-agent teams system. Prior to version 1.5.95, FileTools.download_file() in praisonaiagents validates the destination path but performs no validation on the url parameter, passing it directly to httpx.stream() with follow_redirects=True. An attacker who controls the URL can reach any host accessible from the server including cloud metadata services and internal network services. This issue has been patched in version 1.5.95. |
2026-04-03 | |
| CVE-2026-34953 | 9.1 | CRITICAL | CWE-863 | 0.0% p11 | 6.37 | PraisonAI is a multi-agent teams system. Prior to version 4.5.97, OAuthManager.v...PraisonAI is a multi-agent teams system. Prior to version 4.5.97, OAuthManager.validate_token() returns True for any token not found in its internal store, which is empty by default. Any HTTP request to the MCP server with an arbitrary Bearer token is treated as authenticated, granting full access to all registered tools and agent capabilities. This issue has been patched in version 4.5.97. |
2026-04-03 | |
| CVE-2026-34952 | 9.1 | CRITICAL | CWE-306 | 0.0% p13 | 6.37 | PraisonAI is a multi-agent teams system. Prior to version 4.5.97, the PraisonAI ...PraisonAI is a multi-agent teams system. Prior to version 4.5.97, the PraisonAI Gateway server accepts WebSocket connections at /ws and serves agent topology at /info with no authentication. Any network client can connect, enumerate registered agents, and send arbitrary messages to agents and their tool sets. This issue has been patched in version 4.5.97. |
2026-04-03 | |
| CVE-2026-34939 | 6.5 | MEDIUM | CWE-1333 | 0.0% p14 | 4.55 | PraisonAI is a multi-agent teams system. Prior to version 4.5.90, MCPToolIndex.s...PraisonAI is a multi-agent teams system. Prior to version 4.5.90, MCPToolIndex.search_tools() compiles a caller-supplied string directly as a Python regular expression with no validation, sanitization, or timeout. A crafted regex causes catastrophic backtracking in the re engine, blocking the Python thread for hundreds of seconds and causing a complete service outage. This issue has been patched in version 4.5.90. |
2026-04-03 | |
| CVE-2026-34938 | 10.0 | CRITICAL | CWE-693 | 0.1% p30 | 7.00 | PraisonAI is a multi-agent teams system. Prior to version 1.5.90, execute_code()...PraisonAI is a multi-agent teams system. Prior to version 1.5.90, execute_code() in praisonai-agents runs attacker-controlled Python inside a three-layer sandbox that can be fully bypassed by passing a str subclass with an overridden startswith() method to the _safe_getattr wrapper, achieving arbitrary OS command execution on the host. This issue has been patched in version 1.5.90. |
2026-04-03 | |
| CVE-2026-34937 | 7.8 | HIGH | CWE-78 | 0.1% p21 | 5.46 | PraisonAI is a multi-agent teams system. Prior to version 1.5.90, run_python() i...PraisonAI is a multi-agent teams system. Prior to version 1.5.90, run_python() in praisonai constructs a shell command string by interpolating user-controlled code into python3 -c "<code>" and passing it to subprocess.run(..., shell=True). The escaping logic only handles \ and ", leaving $() and backtick substitutions unescaped, allowing arbitrary OS command execution before Python is invoked. This issue has been patched in version 1.5.90. |
2026-04-03 | |
| CVE-2026-34936 | 7.7 | HIGH | CWE-918 | 0.0% p9 | 5.39 | PraisonAI is a multi-agent teams system. Prior to version 4.5.90, passthrough() ...PraisonAI is a multi-agent teams system. Prior to version 4.5.90, passthrough() and apassthrough() in praisonai accept a caller-controlled api_base parameter that is concatenated with endpoint and passed directly to httpx.Client.request() when the litellm primary path raises AttributeError. No URL scheme validation, private IP filtering, or domain allowlist is applied, allowing requests to any host reachable from the server. This issue has been patched in version 4.5.90. |
2026-04-03 | |
| CVE-2026-34935 | 9.8 | CRITICAL | CWE-78 | 0.1% p26 | 6.86 | PraisonAI is a multi-agent teams system. From version 4.5.15 to before version 4...PraisonAI is a multi-agent teams system. From version 4.5.15 to before version 4.5.69, the --mcp CLI argument is passed directly to shlex.split() and forwarded through the call chain to anyio.open_process() with no validation, allowlist check, or sanitization at any hop, allowing arbitrary OS command execution as the process user. This issue has been patched in version 4.5.69. |
2026-04-03 | |
| CVE-2026-34934 | 9.8 | CRITICAL | CWE-89 | 0.1% p19 | 6.86 | PraisonAI is a multi-agent teams system. Prior to version 4.5.90, the get_all_us...PraisonAI is a multi-agent teams system. Prior to version 4.5.90, the get_all_user_threads function constructs raw SQL queries using f-strings with unescaped thread IDs fetched from the database. An attacker stores a malicious thread ID via update_thread. When the application loads the thread list, the injected payload executes and grants full database access. This issue has been patched in version 4.5.90. |
2026-04-03 | |
| CVE-2026-34933 | 5.5 | MEDIUM | CWE-617 | 0.0% p4 | 3.85 | Avahi is a system which facilitates service discovery on a local network via the...Avahi is a system which facilitates service discovery on a local network via the mDNS/DNS-SD protocol suite. Prior to version 0.9-rc4, any unprivileged local user can crash avahi-daemon by sending a single D-Bus method call with conflicting publish flags. This issue has been patched in version 0.9-rc4. |
2026-04-03 | |
| CVE-2026-34824 | 7.5 | HIGH | CWE-125 | 0.0% p14 | 5.25 | Mesop is a Python-based UI framework that allows users to build web applications...Mesop is a Python-based UI framework that allows users to build web applications. From version 1.2.3 to before version 1.2.5, an uncontrolled resource consumption vulnerability exists in the WebSocket implementation of the Mesop framework. An unauthenticated attacker can send a rapid succession of WebSocket messages, forcing the server to spawn an unbounded number of operating system threads. This leads to thread exhaustion and Out of Memory (OOM) errors, causing a complete Denial of Service (DoS) for any application built on the framework. This issue has been patched in version 1.2.5. |
2026-04-03 | |
| CVE-2026-34788 | 6.5 | MEDIUM | CWE-89 | 0.0% p7 | 4.55 | Emlog is an open source website building system. In versions 2.6.2 and prior, a ...Emlog is an open source website building system. In versions 2.6.2 and prior, a SQL injection vulnerability exists in include/model/tag_model.php at line 168. The updateTagName() function directly interpolates user input into the SQL query string without using parameterized queries or proper escaping ($this->db->escape_string()), making it vulnerable to SQL injection attacks. At time of publication, there are no publicly available patches. |
2026-04-03 | |
| CVE-2026-34787 | 6.5 | MEDIUM | CWE-98 | 0.1% p18 | 4.55 | Emlog is an open source website building system. In versions 2.6.2 and prior, a ...Emlog is an open source website building system. In versions 2.6.2 and prior, a Local File Inclusion (LFI) vulnerability exists in admin/plugin.php at line 80. The $plugin parameter from the GET request is directly used in a require_once path without proper sanitization. If the CSRF token check can be bypassed (see potential bypass conditions), an attacker can include arbitrary PHP files from the server filesystem, leading to code execution. At time of publication, there are no publicly available patches. |
2026-04-03 | |
| CVE-2026-34612 | 9.9 | CRITICAL | CWE-89 | 0.2% p37 | 6.93 | Kestra is an open-source, event-driven orchestration platform. Prior to version ...Kestra is an open-source, event-driven orchestration platform. Prior to version 1.3.7, Kestra (default docker-compose deployment) contains a SQL Injection vulnerability that leads to Remote Code Execution (RCE) in the following endpoint "GET /api/v1/main/flows/search". Once a user is authenticated, simply visiting a crafted link is enough to trigger the vulnerability. The injected payload is executed by PostgreSQL using COPY ... TO PROGRAM ..., which in turn runs arbitrary OS commands on the host. This issue has been patched in version 1.3.7. |
2026-04-03 | |
| CVE-2026-34607 | 7.2 | HIGH | CWE-22 | 0.4% p60 | 5.05 | Emlog is an open source website building system. In versions 2.6.2 and prior, a ...Emlog is an open source website building system. In versions 2.6.2 and prior, a path traversal vulnerability exists in the emUnZip() function (include/lib/common.php:793). When extracting ZIP archives (plugin/template uploads, backup imports), the function calls $zip->extractTo($path) without sanitizing ZIP entry names. An authenticated admin can upload a crafted ZIP containing entries with ../ sequences to write arbitrary files to the server filesystem, including PHP webshells, achieving Remote Code Execution (RCE). At time of publication, there are no publicly available patches. |
2026-04-03 | |
| CVE-2026-34229 | 6.1 | MEDIUM | CWE-79 | 0.0% p8 | 4.27 | Emlog is an open source website building system. Prior to version 2.6.8, there i...Emlog is an open source website building system. Prior to version 2.6.8, there is a stored cross-site scripting (XSS) vulnerability in emlog comment module via URI scheme validation bypass. This issue has been patched in version 2.6.8. |
2026-04-03 | |
| CVE-2026-34228 | 8.7 | HIGH | CWE-352 | 0.0% p4 | 6.09 | Emlog is an open source website building system. Prior to version 2.6.8, the bac...Emlog is an open source website building system. Prior to version 2.6.8, the backend upgrade interface accepts remote SQL and ZIP URLs via GET parameters. The server first downloads and executes the SQL file, then downloads the ZIP file and extracts it directly into the web root directory. This process does not validate a CSRF token. Therefore, an attacker only needs to trick an authenticated administrator into visiting a malicious link to achieve arbitrary SQL execution and arbitrary file write. This issue has been patched in version 2.6.8. |
2026-04-03 | |
| CVE-2026-34061 | 4.9 | MEDIUM | CWE-345 | 0.0% p6 | 3.43 | nimiq/core-rs-albatross is a Rust implementation of the Nimiq Proof-of-Stake pro...nimiq/core-rs-albatross is a Rust implementation of the Nimiq Proof-of-Stake protocol based on the Albatross consensus algorithm. Prior to version 1.3.0, an elected validator proposer can send an election macro block whose header.interlink does not match the canonical next interlink. Honest validators accept that proposal in verify_macro_block_proposal() because the proposal path validates header shape, successor relation, proposer, body root, and state, but never checks the interlink binding for election blocks. The same finalized block is later rejected by verify_block() during push with InvalidInterlink. Because validators prevote and precommit the malformed header hash itself, the failure happens after Tendermint decides the block, not before voting. This issue has been patched in version 1.3.0. |
2026-04-03 | |
| CVE-2026-34052 | 5.9 | MEDIUM | CWE-401 | 0.1% p17 | 4.13 | LTI JupyterHub Authenticator is a JupyterHub authenticator for LTI. Prior to ver...LTI JupyterHub Authenticator is a JupyterHub authenticator for LTI. Prior to version 1.6.3, the LTI 1.1 validator stores OAuth nonces in a class-level dictionary that grows without bounds. Nonces are added before signature validation, so an attacker with knowledge of a valid consumer key can send repeated requests with unique nonces to gradually exhaust server memory, causing a denial of service. This issue has been patched in version 1.6.3. |
2026-04-03 | |
| CVE-2026-33184 | 7.5 | HIGH | CWE-191 | 0.1% p17 | 5.25 | nimiq/core-rs-albatross is a Rust implementation of the Nimiq Proof-of-Stake pro...nimiq/core-rs-albatross is a Rust implementation of the Nimiq Proof-of-Stake protocol based on the Albatross consensus algorithm. Prior to version 1.3.0, the discovery handler accepts a peer-controlled limit during handshake and stores it unchanged. The immediate HandshakeAck path then honors limit = 0 and returns zero contacts, which makes the session look benign. Later, after the same session reaches Established, the periodic update path computes self.peer_list_limit.unwrap() as usize - 1. With limit = 0, that wraps to usize::MAX and then in rand 0.9.2, choose_multiple() immediately attempts Vec::with_capacity(amount), which deterministically panics with capacity overflow. This issue has been patched in version 1.3.0. |
2026-04-03 | |
| CVE-2021-4477 | 9.3 | CRITICAL | CWE-284 | 0.0% p0 | 6.51 | Hirschmann HiLCOS OpenBAT and BAT450 products contain a firewall bypass vulnerab...Hirschmann HiLCOS OpenBAT and BAT450 products contain a firewall bypass vulnerability in IPv6 IPsec deployments that allows traffic from VPN connections to bypass configured firewall rules. Attackers can exploit this vulnerability by establishing IPv6 IPsec connections (IKEv1 or IKEv2) while simultaneously using an IPv6 Internet connection to circumvent firewall policy enforcement. |
2026-04-03 | |
| CVE-2018-25236 | 9.3 | CRITICAL | CWE-287 | 0.0% p7 | 6.51 | Hirschmann HiOS and HiSecOS products RSP, RSPE, RSPS, RSPL, MSP, EES, EESX, GRS,...Hirschmann HiOS and HiSecOS products RSP, RSPE, RSPS, RSPL, MSP, EES, EESX, GRS, OS, RED, EAGLE contain an authentication bypass vulnerability in the HTTP(S) management module that allows unauthenticated remote attackers to gain administrative access by crafting specially formed HTTP requests. Attackers can exploit improper authentication handling to obtain the authentication status and privileges of a previously authenticated user without providing valid credentials. |
2026-04-03 | |
| CVE-2017-20238 | 7.1 | HIGH | CWE-285 | 0.0% p0 | 4.97 | Hirschmann Industrial HiVision versions 06.0.00 and 07.0.00 prior to 06.0.06 and...Hirschmann Industrial HiVision versions 06.0.00 and 07.0.00 prior to 06.0.06 and 07.0.01 contains an improper authorization vulnerability that allows read-only users to gain write access to managed devices by bypassing access control mechanisms. Attackers can exploit alternative interfaces such as the web interface or SNMP browser to modify device configurations despite having restricted permissions. |
2026-04-03 | |
| CVE-2017-20236 | 9.3 | CRITICAL | CWE-78 | 0.1% p26 | 6.51 | ProSoft Technology ICX35-HWC versions 1.3 and prior cellular gateways contain an...ProSoft Technology ICX35-HWC versions 1.3 and prior cellular gateways contain an input validation vulnerability in the web user interface that allows remote attackers to inject and execute system commands by submitting malicious input through unvalidated fields. Attackers can exploit this vulnerability to gain root privileges and execute arbitrary commands on the device through the accessible web interface. |
2026-04-03 | |
| CVE-2017-20235 | 9.3 | CRITICAL | CWE-287 | 0.0% p8 | 6.51 | ProSoft Technology ICX35-HWC version 1.3 and prior cellular gateways contain an ...ProSoft Technology ICX35-HWC version 1.3 and prior cellular gateways contain an authentication bypass vulnerability in the web user interface that allows unauthenticated attackers to gain access to administrative functions without valid credentials. Attackers can bypass the authentication mechanism in affected firmware versions to obtain full administrative access to device configuration and settings. |
2026-04-03 | |
| CVE-2017-20234 | 9.3 | CRITICAL | CWE-798 | 0.0% p7 | 6.51 | GarrettCom Magnum 6K and 10K managed switches contain an authentication bypass v...GarrettCom Magnum 6K and 10K managed switches contain an authentication bypass vulnerability that allows unauthenticated attackers to gain unauthorized access by exploiting a hardcoded string in the authentication mechanism. Attackers can bypass login controls to access administrative functions and sensitive switch configuration without valid credentials. |
2026-04-03 | |
| CVE-2017-20233 | 5.3 | MEDIUM | CWE-284 | 0.0% p0 | 3.71 | Hirschmann HiLCOS products OpenBAT, BAT450, WLC, BAT867 contains a firewall filt...Hirschmann HiLCOS products OpenBAT, BAT450, WLC, BAT867 contains a firewall filtering vulnerability that fails to correctly filter IPv4 multicast and broadcast traffic when management IP address filtering is disabled, allowing configured filter rules to be bypassed. Attackers with network access can inject or observe multicast and broadcast packets that should have been blocked by the firewall. |
2026-04-03 | |
| CVE-2026-34990 | 5.0 | MEDIUM | CWE-287 | 0.0% p1 | 3.50 | OpenPrinting CUPS is an open source printing system for Linux and other Unix-lik...OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.16 and prior, a local unprivileged user can coerce cupsd into authenticating to an attacker-controlled localhost IPP service with a reusable Authorization: Local ... token. That token is enough to drive /admin/ requests on localhost, and the attacker can combine CUPS-Create-Local-Printer with printer-is-shared=true to persist a file:///... queue even though the normal FileDevice policy rejects such URIs. Printing to that queue gives an arbitrary root file overwrite; the PoC below uses that primitive to drop a sudoers fragment and demonstrate root command execution. At time of publication, there are no publicly available patches. |
2026-04-03 | |
| CVE-2026-34980 | 6.1 | MEDIUM | CWE-20 | 0.0% p12 | 4.27 | OpenPrinting CUPS is an open source printing system for Linux and other Unix-lik...OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.16 and prior, in a network-exposed cupsd with a shared target queue, an unauthorized client can send a Print-Job to that shared PostScript queue without authentication. The server accepts a page-border value supplied as textWithoutLanguage, preserves an embedded newline through option escaping and reparse, and then reparses the resulting second-line PPD: text as a trusted scheduler control record. A follow-up raw print job can therefore make the server execute an attacker-chosen existing binary such as /usr/bin/vim as lp. At time of publication, there are no publicly available patches. |
2026-04-03 | |
| CVE-2026-34979 | 5.3 | MEDIUM | CWE-122 | 0.1% p15 | 3.71 | OpenPrinting CUPS is an open source printing system for Linux and other Unix-lik...OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.16 and prior, there is a heap-based buffer overflow in the CUPS scheduler when building filter option strings from job attribute. At time of publication, there are no publicly available patches. |
2026-04-03 | |
| CVE-2026-34978 | 6.5 | MEDIUM | CWE-22 | 0.1% p22 | 4.55 | OpenPrinting CUPS is an open source printing system for Linux and other Unix-lik...OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.16 and prior, the RSS notifier allows .. path traversal in notify-recipient-uri (e.g., rss:///../job.cache), letting a remote IPP client write RSS XML bytes outside CacheDir/rss (anywhere that is lp-writable). In particular, because CacheDir is group-writable by default (typically root:lp and mode 0770), the notifier (running as lp) can replace root-managed state files via temp-file + rename(). This PoC clobbers CacheDir/job.cache with RSS XML, and after restarting cupsd the scheduler fails to parse the job cache and previously queued jobs disappear. At time of publication, there are no publicly available patches. |
2026-04-03 | |
| CVE-2026-34947 | 2.7 | LOW | CWE-200 | 0.1% p17 | 1.89 | Discourse is an open-source discussion platform. From versions 2026.1.0-latest t...Discourse is an open-source discussion platform. From versions 2026.1.0-latest to before 2026.1.3, 2026.2.0-latest to before 2026.2.2, and 2026.3.0-latest to before 2026.3.0, staged user custom fields and username are exposed on public invite pages without email verification. This issue has been patched in versions 2026.1.3, 2026.2.2, and 2026.3.0. |
2026-04-03 | |
| CVE-2026-33709 | 5.1 | MEDIUM | CWE-601 | 0.1% p16 | 3.57 | JupyterHub is software that allows one to create a multi-user server for Jupyter...JupyterHub is software that allows one to create a multi-user server for Jupyter notebooks. Prior to version 5.4.4, an open redirect vulnerability in JupyterHub allows attackers to construct links which, when clicked, take users to the JupyterHub login page, after which they are sent to an arbitrary attacker-controlled site outside JupyterHub instead of a JupyterHub page, bypassing JupyterHub's check to prevent this. This issue has been patched in version 5.4.4. |
2026-04-03 | |
| CVE-2026-33175 | 8.8 | HIGH | CWE-287 | 0.1% p27 | 6.16 | OAuthenticator is software that allows OAuth2 identity providers to be plugged i...OAuthenticator is software that allows OAuth2 identity providers to be plugged in and used with JupyterHub. Prior to version 17.4.0, an authentication bypass vulnerability in oauthenticator allows an attacker with an unverified email address on an Auth0 tenant to login to JupyterHub. When email is used as the usrname_claim, this gives users control over their username and the possibility of account takeover. This issue has been patched in version 17.4.0. |
2026-04-03 | |
| CVE-2026-28797 | 8.7 | HIGH | CWE-20 | 0.1% p23 | 6.09 | RAGFlow is an open-source RAG (Retrieval-Augmented Generation) engine. In versio...RAGFlow is an open-source RAG (Retrieval-Augmented Generation) engine. In versions 0.24.0 and prior, a Server-Side Template Injection (SSTI) vulnerability exists in RAGFlow's Agent workflow Text Processing (StringTransform) and Message components. These components use Python's jinja2.Template (unsandboxed) to render user-supplied templates, allowing any authenticated user to execute arbitrary operating system commands on the server. At time of publication, there are no publicly available patches. |
2026-04-03 | |
| CVE-2026-27885 | 7.2 | HIGH | CWE-89 | 0.0% p12 | 5.04 | Piwigo is an open source photo gallery application for the web. Prior to version...Piwigo is an open source photo gallery application for the web. Prior to version 16.3.0, a SQL Injection vulnerability was discovered in Piwigo affecting the Activity List API endpoint. This vulnerability allows an authenticated administrator to extract sensitive data from the database, including user credentials, email addresses, and all stored content. This issue has been patched in version 16.3.0. |
2026-04-03 | |
| CVE-2026-27834 | 7.2 | HIGH | CWE-89 | 0.0% p12 | 5.04 | Piwigo is an open source photo gallery application for the web. Prior to version...Piwigo is an open source photo gallery application for the web. Prior to version 16.3.0, a SQL Injection vulnerability exists in the pwg.users.getList Web Service API method. The filter parameter is directly concatenated into a SQL query without proper sanitization, allowing authenticated administrators to execute arbitrary SQL commands. This issue has been patched in version 16.3.0. |
2026-04-03 | |
| CVE-2026-27833 | 7.5 | HIGH | CWE-862 | 0.0% p13 | 5.25 | Piwigo is an open source photo gallery application for the web. Prior to version...Piwigo is an open source photo gallery application for the web. Prior to version 16.3.0, the pwg.history.search API method in Piwigo is registered without the admin_only option, allowing unauthenticated users to access the full browsing history of all gallery visitors. This issue has been patched in version 16.3.0. |
2026-04-03 | |
| CVE-2026-27634 | 8.7 | HIGH | CWE-89 | 0.1% p22 | 6.09 | Piwigo is an open source photo gallery application for the web. Prior to version...Piwigo is an open source photo gallery application for the web. Prior to version 16.3.0, the four date filter parameters (f_min_date_available, f_max_date_available, f_min_date_created, f_max_date_created) in ws_std_image_sql_filter() are concatenated directly into SQL without any escaping or type validation. This could result in an unauthenticated attacker reading the full database, including user password hashes. This issue has been patched in version 16.3.0. |
2026-04-03 | |
| CVE-2026-27481 | 6.3 | MEDIUM | CWE-200 | 0.1% p17 | 4.41 | Discourse is an open-source discussion platform. From versions 2026.1.0-latest t...Discourse is an open-source discussion platform. From versions 2026.1.0-latest to before 2026.1.3, 2026.2.0-latest to before 2026.2.2, and 2026.3.0-latest to before 2026.3.0, an authorization bypass vulnerability allows unauthenticated or unauthorized users to view hidden (staff-only) tags and its associated data. All Discourse instances with tagging enabled and staff-only tag groups configured are impacted. This issue has been patched in versions 2026.1.3, 2026.2.2, and 2026.3.0. |
2026-04-03 | |
| CVE-2026-27456 | 4.7 | MEDIUM | CWE-59 | 0.0% p1 | 3.29 | util-linux is a random collection of Linux utilities. Prior to version 2.41.4, a...util-linux is a random collection of Linux utilities. Prior to version 2.41.4, a TOCTOU (Time-of-Check-Time-of-Use) vulnerability has been identified in the SUID binary /usr/bin/mount from util-linux. The mount binary, when setting up loop devices, validates the source file path with user privileges via fork() + setuid() + realpath(), but subsequently re-canonicalizes and opens it with root privileges (euid=0) without verifying that the path has not been replaced between both operations. Neither O_NOFOLLOW, nor inode comparison, nor post-open fstat() are employed. This allows a local unprivileged user to replace the source file with a symlink pointing to any root-owned file or device during the race window, causing the SUID binary to open and mount it as root. Exploitation requires an /etc/fstab entry with user,loop options whose path points to a directory where the attacker has write permission, and that /usr/bin/mount has the SUID bit set (the default configuration on virtually all Linux distributions). The impact is unauthorized read access to root-protected files and block devices, including backup images, disk volumes, and any file containing a valid filesystem. This issue has been patched in version 2.41.4. |
2026-04-03 | |
| CVE-2026-27447 | 4.8 | MEDIUM | CWE-863 | 0.0% p9 | 3.36 | OpenPrinting CUPS is an open source printing system for Linux and other Unix-lik...OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.16 and prior, CUPS daemon (cupsd) contains an authorization bypass vulnerability due to case-insensitive username comparison during authorization checks. The vulnerability allows an unprivileged user to gain unauthorized access to restricted operations by using a user with a username that differs only in case from an authorized user. At time of publication, there are no publicly available patches. |
2026-04-03 | |
| CVE-2018-25237 | 9.3 | CRITICAL | CWE-120 | 0.1% p26 | 6.51 | Hirschmann HiSecOS devices versions prior to 05.3.03 contain a buffer overflow v...Hirschmann HiSecOS devices versions prior to 05.3.03 contain a buffer overflow vulnerability in the HTTPS login interface when RADIUS authentication is enabled that allows remote attackers to crash the device or execute arbitrary code by submitting a password longer than 128 characters. Attackers can exploit improper bounds checking in password handling to overflow a fixed-size buffer and achieve denial of service or remote code execution. |
2026-04-03 | |
| CVE-2016-15058 | 8.6 | HIGH | CWE-257 | 0.0% p0 | 6.02 | Hirschmann HiLCOS Classic Platform switches Classic L2E, L2P, L3E, L3P versions ...Hirschmann HiLCOS Classic Platform switches Classic L2E, L2P, L3E, L3P versions prior to 09.0.06 and Classic L2B prior to 05.3.07 contain a credential exposure vulnerability where user passwords are synchronized with SNMPv1/v2 community strings and transmitted in plaintext when the feature is enabled. Attackers with local network access can sniff SNMP traffic or extract configuration data to recover plaintext credentials and gain unauthorized administrative access to the switches. |
2026-04-03 | |
| CVE-2015-10148 | 8.8 | HIGH | CWE-321 | 0.0% p0 | 6.16 | Hirschmann HiLCOS devices OpenBAT, WLC, BAT300, BAT54 prior to 8.80 and OpenBAT ...Hirschmann HiLCOS devices OpenBAT, WLC, BAT300, BAT54 prior to 8.80 and OpenBAT prior to 9.10 are shipped with identical default SSH and SSL keys that cannot be changed, allowing unauthenticated remote attackers to decrypt or intercept encrypted management communications. Attackers can perform man-in-the-middle attacks, impersonate devices, and expose sensitive information by leveraging the shared default cryptographic keys across multiple devices. |
2026-04-03 | |
| CVE-2026-34511 | 6.0 | MEDIUM | CWE-330 | 0.0% p8 | 4.20 | OpenClaw before 2026.4.2 reuses the PKCE verifier as the OAuth state parameter i...OpenClaw before 2026.4.2 reuses the PKCE verifier as the OAuth state parameter in the Gemini OAuth flow, exposing it through the redirect URL. Attackers who capture the redirect URL can obtain both the authorization code and PKCE verifier, defeating PKCE protection and enabling token redemption. |
2026-04-03 | |
| CVE-2026-32662 | 6.9 | MEDIUM | CWE-489 | 0.0% p11 | 4.83 | Development and test API endpoints are present that mirror production functional...Development and test API endpoints are present that mirror production functionality. |
2026-04-03 | |
| CVE-2026-32646 | 8.7 | HIGH | CWE-306 | 0.1% p23 | 6.09 | A specific administrative endpoint is accessible without proper authentication, ...A specific administrative endpoint is accessible without proper authentication, exposing device management functions. |
2026-04-03 | |
| CVE-2026-28767 | 6.9 | MEDIUM | CWE-306 | 0.1% p17 | 4.83 | A specific administrative endpoint notifications is accessible without proper au...A specific administrative endpoint notifications is accessible without proper authentication. |
2026-04-03 | |
| CVE-2026-28766 | 9.2 | CRITICAL | CWE-306 | 0.1% p23 | 6.44 | A specific endpoint exposes all user account information for registered Gardyn u...A specific endpoint exposes all user account information for registered Gardyn users without requiring authentication. |
2026-04-03 | |
| CVE-2026-26058 | 6.1 | MEDIUM | CWE-22 | 0.0% p1 | 4.27 | Zulip is an open-source team collaboration tool. From version 1.4.0 to before ve...Zulip is an open-source team collaboration tool. From version 1.4.0 to before version 11.6, ./manage.py import reads arbitrary files from the server filesystem via path traversal in uploads/records.json. A crafted export tarball causes the server to copy any file the zulip user can read into the uploads directory during import. This issue has been patched in version 11.6. |
2026-04-03 | |
| CVE-2026-25742 | 5.3 | MEDIUM | CWE-862 | 0.0% p11 | 3.71 | Zulip is an open-source team collaboration tool. Prior to version 11.6, Zulip is...Zulip is an open-source team collaboration tool. Prior to version 11.6, Zulip is an open-source team collaboration tool. From version 1.4.0 to before version 11.6, even after spectator access (enable_spectator_access / WEB_PUBLIC_STREAMS_ENABLED) is disabled, attachments originating from web-public streams can still be retrieved anonymously. As a result, file contents remain accessible even after public access is intended to be disabled. Similarly, even after spectator access is disabled, the /users/me/<stream_id>/topics endpoint remains reachable anonymously, allowing retrieval of topic history for web-public streams. This issue has been patched in version 11.6. This issue has been patched in version 11.6. |
2026-04-03 | |
| CVE-2026-25197 | 9.3 | CRITICAL | CWE-639 | 0.0% p10 | 6.51 | A specific endpoint allows authenticated users to pivot to other user profiles b...A specific endpoint allows authenticated users to pivot to other user profiles by modifying the id number in the API call. |
2026-04-03 | |
| CVE-2026-22665 | 8.6 | HIGH | CWE-178 | 0.0% p9 | 6.02 | prompts.chat prior to commit 1464475 contains an identity confusion vulnerabilit...prompts.chat prior to commit 1464475 contains an identity confusion vulnerability due to inconsistent case-sensitive and case-insensitive handling of usernames across write and read paths, allowing attackers to create case-variant usernames that bypass uniqueness checks. Attackers can exploit non-deterministic username resolution to impersonate victim accounts, replace profile content on canonical URLs, and inject attacker-controlled metadata and content across the platform. |
2026-04-03 | |
| CVE-2026-22664 | 7.1 | HIGH | CWE-918 | 0.0% p8 | 4.97 | prompts.chat prior to commit 30a8f04 contains a server-side request forgery vuln...prompts.chat prior to commit 30a8f04 contains a server-side request forgery vulnerability in Fal.ai media status polling that allows authenticated users to perform arbitrary outbound requests by supplying attacker-controlled URLs in the token parameter. Attackers can exploit the lack of URL validation to disclose the FAL_API_KEY in the Authorization header, enabling credential theft, internal network probing, and abuse of the victim's Fal.ai account. |
2026-04-03 | |
| CVE-2026-22663 | 8.7 | HIGH | CWE-862 | 0.0% p11 | 6.09 | prompts.chat prior to commit 7b81836 contains multiple authorization bypass vuln...prompts.chat prior to commit 7b81836 contains multiple authorization bypass vulnerabilities due to missing isPrivate checks across API endpoints and page metadata generation that allow unauthorized users to access sensitive data associated with private prompts. Attackers can exploit these missing authorization checks to retrieve private prompt version history, change requests, examples, current content, and metadata including titles and descriptions exposed via HTML meta tags. |
2026-04-03 | |
| CVE-2026-22662 | 5.3 | MEDIUM | CWE-918 | 0.0% p8 | 3.71 | prompts.chat prior to commit 1464475 contains a blind server-side request forger...prompts.chat prior to commit 1464475 contains a blind server-side request forgery vulnerability in the Wiro media generator that allows authenticated users to perform server-side fetches of user-controlled inputImageUrl parameters. Attackers can exploit this vulnerability by sending POST requests to the /api/media-generate endpoint to probe internal networks, access internal services, and exfiltrate data through the upstream Wiro service without receiving direct response bodies. |
2026-04-03 | |
| CVE-2026-22661 | 8.6 | HIGH | CWE-22 | 0.1% p23 | 6.02 | prompts.chat prior to commit 0f8d4c3 contains a path traversal vulnerability in ...prompts.chat prior to commit 0f8d4c3 contains a path traversal vulnerability in skill file handling that allows attackers to write arbitrary files to the client system by crafting malicious ZIP archives with unsanitized filenames containing path traversal sequences. Attackers can exploit missing server-side filename validation to inject path traversal sequences ../ into skill file archives, which when extracted by vulnerable tools write files outside the intended directory and overwrite shell initialization files to achieve code execution. |
2026-04-03 | |
| CVE-2025-10681 | 8.8 | HIGH | CWE-798 | 0.1% p16 | 6.16 | Storage credentials are hardcoded in the mobile app and device firmware. These c...Storage credentials are hardcoded in the mobile app and device firmware. These credentials do not adequately limit end user permissions and do not expire within a reasonable amount of time. This vulnerability may grant unauthorized access to production storage containers. |
2026-04-03 | |
| CVE-2022-4987 | 7.0 | HIGH | CWE-426 | 0.0% p0 | 4.90 | Hirschmann Industrial HiVision version 08.1.03 prior to 08.1.04 and 08.2.00 cont...Hirschmann Industrial HiVision version 08.1.03 prior to 08.1.04 and 08.2.00 contains a vulnerability in the execution of user-configured external applications that allows a local attacker to execute arbitrary binaries. Due to insufficient path sanitization, an attacker can place a malicious binary in the execution path of a configured external application, causing it to be executed instead of the intended application. This can result in execution with elevated privileges depending on the context of the external application. |
2026-04-03 | |
| CVE-2020-37216 | 8.7 | HIGH | CWE-20 | 0.0% p5 | 6.09 | Hirschmann HiOS devices versions prior to 08.1.00 and 07.1.01 contain a denial ...Hirschmann HiOS devices versions prior to 08.1.00 and 07.1.01 contain a denial of service vulnerability in the EtherNet/IP stack where improper handling of packet length fields allows remote attackers to crash or hang the device. Attackers can send specially crafted UDP EtherNet/IP packets with a length value larger than the actual packet size to render the device inoperable. |
2026-04-03 | |
| CVE-2017-20237 | 9.3 | CRITICAL | CWE-287 | 0.0% p12 | 6.51 | Hirschmann Industrial HiVision versions prior to 06.0.07 and 07.0.03 contains an...Hirschmann Industrial HiVision versions prior to 06.0.07 and 07.0.03 contains an authentication bypass vulnerability in the master service that allows unauthenticated remote attackers to execute arbitrary commands with administrative privileges. Attackers can invoke exposed interface methods over the remote service to bypass authentication and achieve remote code execution on the underlying operating system. |
2026-04-03 | |
| CVE-2026-5484 | 5.5 | MEDIUM | CWE-266 | 0.0% p13 | 3.85 | A weakness has been identified in BookStackApp BookStack up to 26.03. Affected i...A weakness has been identified in BookStackApp BookStack up to 26.03. Affected is the function chapterToMarkdown of the file app/Exports/ExportFormatter.php of the component Chapter Export Handler. Executing a manipulation of the argument pages can lead to improper access controls. It is possible to launch the attack remotely. The exploit has been made available to the public and could be used for attacks. Upgrading to version 26.03.1 is able to address this issue. This patch is called 8a59895ba063040cc8dafd82e94024c406df3d04. It is advisable to upgrade the affected component. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product. |
2026-04-03 | |
| CVE-2026-28798 | 9.0 | CRITICAL | CWE-918 | 0.1% p17 | 6.30 | ZimaOS is a fork of CasaOS, an operating system for Zima devices and x86-64 syst...ZimaOS is a fork of CasaOS, an operating system for Zima devices and x86-64 systems with UEFI. Prior to version 1.5.3, a proxy endpoint (/v1/sys/proxy) exposed by ZimaOS's web interface can be abused (via an externally reachable domain using a Cloudflare Tunnel) to make requests to internal localhost services. This results in unauthenticated access to internal-only endpoints and sensitive local services when the product is reachable from the Internet through a Cloudflare Tunnel. This issue has been patched in version 1.5.3. |
2026-04-03 | |
| CVE-2026-25726 | 8.1 | HIGH | CWE-338 | 0.1% p19 | 5.67 | Cloudreve is a self-hosted file management and sharing system. Prior to version ...Cloudreve is a self-hosted file management and sharing system. Prior to version 4.13.0, the application uses the weak pseudo-random number generator math/rand seeded with time.Now().UnixNano() to generate critical security secrets, including the secret_key, and hash_id_salt. These secrets are generated upon first startup and persisted in the database. An attacker can exploit this by obtaining the administrator's account creation time (via public API endpoints) to narrow the search window for the PRNG seed, and use known hashid to validate the seed. By brute-forcing the seed (demonstrated to take <3 hours on general consumer PC), an attacker can predict the secret_key. This allows them to forge valid JSON Web Tokens (JWTs) for any user, including administrators, leading to full account takeover and privilege escalation. This issue has been patched in version 4.13.0. |
2026-04-03 | |
| CVE-2026-3184 | 3.7 | LOW | CWE-289 | 0.1% p26 | 2.59 | A flaw was found in util-linux. Improper hostname canonicalization in the `login...A flaw was found in util-linux. Improper hostname canonicalization in the `login(1)` utility, when invoked with the `-h` option, can modify the supplied remote hostname before setting `PAM_RHOST`. A remote attacker could exploit this by providing a specially crafted hostname, potentially bypassing host-based Pluggable Authentication Modules (PAM) access control rules that rely on fully qualified domain names. This could lead to unauthorized access. |
2026-04-03 | |
| CVE-2026-2625 | 4.0 | MEDIUM | CWE-347 | 0.0% p0 | 2.80 | A flaw was found in rust-rpm-sequoia. An attacker can exploit this vulnerability...A flaw was found in rust-rpm-sequoia. An attacker can exploit this vulnerability by providing a specially crafted Red Hat Package Manager (RPM) file. During the RPM signature verification process, this crafted file can trigger an error in the OpenPGP signature parsing code, leading to an unconditional termination of the rpm process. This issue results in an application level denial of service, making the system unable to process RPM files for signature verification. |
2026-04-03 | |
| CVE-2026-5476 | 2.1 | LOW | CWE-189 | 0.0% p8 | 1.47 | A vulnerability was identified in NASA cFS up to 7.0.0 on 32-bit. Affected is th...A vulnerability was identified in NASA cFS up to 7.0.0 on 32-bit. Affected is the function CFE_TBL_ValidateCodecLoadSize of the file cfe/modules/tbl/fsw/src/cfe_tbl_passthru_codec.c. The manipulation leads to integer overflow. The complexity of an attack is rather high. The exploitability is told to be difficult. A fix is planned for the upcoming version milestone of the project. |
2026-04-03 | |
| CVE-2026-5475 | 5.1 | MEDIUM | CWE-119 | 0.0% p8 | 3.57 | A vulnerability was determined in NASA cFS up to 7.0.0. This impacts the functio...A vulnerability was determined in NASA cFS up to 7.0.0. This impacts the function CFE_SB_TransmitMsg of the file cfe_sb_priv.c of the component CCSDS Header Size Handler. Executing a manipulation can lead to memory corruption. The project was informed of the problem early through an issue report but has not responded yet. |
2026-04-03 | |
| CVE-2026-32186 | 10.0 | CRITICAL | CWE-918 | 0.1% p26 | 7.00 | Server-side request forgery (ssrf) in Microsoft Bing allows an unauthorized atta...Server-side request forgery (ssrf) in Microsoft Bing allows an unauthorized attacker to elevate privileges over a network. |
2026-04-03 | |
| CVE-2026-0545 | 9.1 | CRITICAL | CWE-306 | 0.2% p47 | 6.38 | In mlflow/mlflow, the FastAPI job endpoints under `/ajax-api/3.0/jobs/*` are not...In mlflow/mlflow, the FastAPI job endpoints under `/ajax-api/3.0/jobs/*` are not protected by authentication or authorization when the `basic-auth` app is enabled. This vulnerability affects the latest version of the repository. If job execution is enabled (`MLFLOW_SERVER_ENABLE_JOB_EXECUTION=true`) and any job function is allowlisted, any network client can submit, read, search, and cancel jobs without credentials, bypassing basic-auth entirely. This can lead to unauthenticated remote code execution if allowed jobs perform privileged actions such as shell execution or filesystem changes. Even if jobs are deemed safe, this still constitutes an authentication bypass, potentially resulting in job spam, denial of service (DoS), or data exposure in job results. |
2026-04-03 | |
| CVE-2026-5474 | 5.3 | MEDIUM | CWE-119 | 0.0% p4 | 3.71 | A vulnerability was found in NASA cFS up to 7.0.0. This affects the function CFE...A vulnerability was found in NASA cFS up to 7.0.0. This affects the function CFE_MSG_GetSize of the file apps/to_lab/fsw/src/to_lab_passthru_encode.c of the component CCSDS Packet Header Handler. Performing a manipulation results in heap-based buffer overflow. The attacker must have access to the local network to execute the attack. The project was informed of the problem early through an issue report but has not responded yet. |
2026-04-03 | |
| CVE-2026-5473 | 2.0 | LOW | CWE-20 | 0.0% p4 | 1.40 | A vulnerability has been found in NASA cFS up to 7.0.0. The impacted element is ...A vulnerability has been found in NASA cFS up to 7.0.0. The impacted element is the function pickle.load of the component Pickle Module. Such manipulation leads to deserialization. The attack needs to be performed locally. The attack requires a high level of complexity. The exploitability is regarded as difficult. The exploit has been disclosed to the public and may be used. The project was informed of the problem early through an issue report but has not responded yet. |
2026-04-03 | |
| CVE-2026-28373 | 9.6 | CRITICAL | CWE-22 | 0.0% p10 | 6.72 | The Stackfield Desktop App before 1.10.2 for macOS and Windows contains a path t...The Stackfield Desktop App before 1.10.2 for macOS and Windows contains a path traversal vulnerability in certain decryption functionality when processing the filePath property. A malicious export can write arbitrary content to any path on the victim's filesystem. |
2026-04-03 | |
| CVE-2026-5472 | 5.3 | MEDIUM | CWE-284 | 0.0% p11 | 3.71 | A flaw has been found in ProjectsAndPrograms School Management System up to 6b6f...A flaw has been found in ProjectsAndPrograms School Management System up to 6b6fae5426044f89c08d0dd101c7fa71f9042a59. The affected element is an unknown function of the file /admin_panel/settings.php of the component Profile Picture Handler. This manipulation of the argument File causes unrestricted upload. Remote exploitation of the attack is possible. The exploit has been published and may be used. This product follows a rolling release approach for continuous delivery, so version details for affected or updated releases are not provided. |
2026-04-03 | |
| CVE-2026-5470 | 5.3 | MEDIUM | CWE-918 | 0.0% p11 | 3.71 | A security vulnerability has been detected in mixelpixx Google-Research-MCP 1e06...A security vulnerability has been detected in mixelpixx Google-Research-MCP 1e062d7bd887bfe5f6e582b6cc288bb897b35cf2/ca613b736ab787bc926932f59cddc69457185a83. This issue affects the function extractContent of the file src/services/content-extractor.service.ts of the component Model Context Protocol Handler. The manipulation of the argument URL leads to server-side request forgery. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used. This product uses a rolling release model to deliver continuous updates. As a result, specific version information for affected or updated releases is not available. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-04-03 | |
| CVE-2026-35218 | 8.7 | HIGH | CWE-79 | 0.0% p8 | 6.09 | Budibase is an open-source low-code platform. Prior to version 3.32.5, Budibase'...Budibase is an open-source low-code platform. Prior to version 3.32.5, Budibase's Builder Command Palette renders entity names (tables, views, queries, automations) using Svelte's {@html} directive without any sanitization. An authenticated user with Builder access can create a table, automation, view, or query whose name contains an HTML payload (e.g. <img src=x onerror=alert(document.domain)>). When any Builder-role user in the same workspace opens the Command Palette (Ctrl+K), the payload executes in their browser, stealing their session cookie and enabling full account takeover. This issue has been patched in version 3.32.5. |
2026-04-03 | |
| CVE-2026-35216 | 9.0 | CRITICAL | CWE-78 | 0.6% p68 | 6.32 | Budibase is an open-source low-code platform. Prior to version 3.33.4, an unauth...Budibase is an open-source low-code platform. Prior to version 3.33.4, an unauthenticated attacker can achieve Remote Code Execution (RCE) on the Budibase server by triggering an automation that contains a Bash step via the public webhook endpoint. No authentication is required to trigger the exploit. The process executes as root inside the container. This issue has been patched in version 3.33.4. |
2026-04-03 | |
| CVE-2026-35214 | 8.7 | HIGH | CWE-22 | 0.1% p34 | 6.09 | Budibase is an open-source low-code platform. Prior to version 3.33.4, the plugi...Budibase is an open-source low-code platform. Prior to version 3.33.4, the plugin file upload endpoint (POST /api/plugin/upload) passes the user-supplied filename directly to createTempFolder() without sanitizing path traversal sequences. An attacker with Global Builder privileges can craft a multipart upload with a filename containing ../ to delete arbitrary directories via rmSync and write arbitrary files via tarball extraction to any filesystem path the Node.js process can access. This issue has been patched in version 3.33.4. |
2026-04-03 | |
| CVE-2026-31818 | 9.6 | CRITICAL | CWE-918 | 0.0% p1 | 6.72 | Budibase is an open-source low-code platform. Prior to version 3.33.4, a server-...Budibase is an open-source low-code platform. Prior to version 3.33.4, a server-side request forgery (SSRF) vulnerability exists in Budibase's REST datasource connector. The platform's SSRF protection mechanism (IP blacklist) is rendered completely ineffective because the BLACKLIST_IPS environment variable is not set by default in any of the official deployment configurations. When this variable is empty, the blacklist function unconditionally returns false, allowing all requests through without restriction. This issue has been patched in version 3.33.4. |
2026-04-03 | |
| CVE-2026-27124 | 8.2 | HIGH | CWE-441 | 0.1% p18 | 5.74 | FastMCP is the standard framework for building MCP applications. Prior to versio...FastMCP is the standard framework for building MCP applications. Prior to version 3.2.0, while testing the GitHubProvider OAuth integration, which allows authentication to a FastMCP MCP server via a FastMCP OAuthProxy using GitHub OAuth, it was discovered that the FastMCP OAuthProxy does not properly validate the user's consent upon receiving the authorization code from GitHub. In combination with GitHub’s behavior of skipping the consent page for previously authorized clients, this introduces a Confused Deputy vulnerability. This issue has been patched in version 3.2.0. |
2026-04-03 | |
| CVE-2026-25118 | 6.3 | MEDIUM | CWE-598 | 0.1% p24 | 4.41 | immich is a high performance self-hosted photo and video management solution. Pr...immich is a high performance self-hosted photo and video management solution. Prior to version 2.6.0, the Immich application is vulnerable to credential disclosure when a user authenticates to a shared album. During the authentication process, the application transmits the album password within the URL query parameters in a GET request to /api/shared-links/me. This exposes the password in browser history, proxy and server logs, and referrer headers, allowing unintended disclosure of authentication credentials. The impact of this vulnerability is the potential compromise of shared album access and unauthorized exposure of sensitive user data. This issue has been patched in version 2.6.0. |
2026-04-03 | |
| CVE-2026-25044 | 8.7 | HIGH | CWE-78 | 0.1% p22 | 6.09 | Budibase is an open-source low-code platform. Prior to version 3.33.4, the bash ...Budibase is an open-source low-code platform. Prior to version 3.33.4, the bash automation step executes user-provided commands using execSync without proper sanitization or validation. User input is processed through processStringSync which allows template interpolation, potentially allowing arbitrary command execution. This issue has been patched in version 3.33.4. |
2026-04-03 | |
| CVE-2026-25043 | 5.3 | MEDIUM | CWE-770 | 0.0% p14 | 3.71 | Budibase is an open-source low-code platform. Prior to version 3.23.25, a busine...Budibase is an open-source low-code platform. Prior to version 3.23.25, a business logic vulnerability exists in Budibase’s password reset functionality due to the absence of rate limiting, CAPTCHA, or abuse prevention mechanisms on the “Forgot Password” endpoint. An unauthenticated attacker can repeatedly trigger password reset requests for the same email address, resulting in hundreds of password reset emails being sent in a short time window. This enables large-scale email flooding, user harassment, denial of service (DoS) against user inboxes, and potential financial and reputational impact for Budibase. This issue has been patched in version 3.23.25. |
2026-04-03 | |
| CVE-2026-23471 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering...Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. |
2026-04-03 | |
| CVE-2025-68153 | 7.1 | HIGH | CWE-863 | 0.0% p2 | 4.97 | Juju is an open source application orchestration engine that enables any applica...Juju is an open source application orchestration engine that enables any application operation on any infrastructure at any scale through special operators called ‘charms’. From versions 2.9 to before 2.9.56 and 3.6 to before 3.6.19, any authenticated user, machine or controller under a Juju controller can modify the resources of an application within the entire controller. This issue has been patched in versions 2.9.56 and 3.6.19. |
2026-04-03 | |
| CVE-2025-68152 | 6.9 | MEDIUM | CWE-863 | 0.0% p2 | 4.83 | Juju is an open source application orchestration engine that enables any applica...Juju is an open source application orchestration engine that enables any application operation on any infrastructure at any scale through special operators called ‘charms’. From versions 2.9 to before 2.9.56 and 3.6 to before 3.6.19, it is possible that a compromised workload machine under a Juju controller can read any log file for any entity in any model at any level. This issue has been patched in versions 2.9.56 and 3.6.19. |
2026-04-03 | |
| CVE-2025-64340 | 6.7 | MEDIUM | CWE-78 | 0.0% p9 | 4.69 | FastMCP is the standard framework for building MCP applications. Prior to versio...FastMCP is the standard framework for building MCP applications. Prior to version 3.2.0, server names containing shell metacharacters (e.g., &) can cause command injection on Windows when passed to fastmcp install claude-code or fastmcp install gemini-cli. These install paths use subprocess.run() with a list argument, but on Windows the target CLIs often resolve to .cmd wrappers that are executed through cmd.exe, which interprets metacharacters in the flattened command string. This issue has been patched in version 3.2.0. |
2026-04-03 | |
| CVE-2026-5469 | 5.1 | MEDIUM | CWE-918 | 0.0% p12 | 3.57 | A weakness has been identified in Casdoor 2.356.0. This vulnerability affects un...A weakness has been identified in Casdoor 2.356.0. This vulnerability affects unknown code of the component Webhook URL Handler. Executing a manipulation can lead to server-side request forgery. The attack can be launched remotely. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-04-03 | |
| CVE-2026-26477 | 4.3 | MEDIUM | CWE-770 | 0.1% p33 | 3.01 | An issue in Dokuwiki v.2025-05-14b "Librarian" [56.2] allows a remote attacker t...An issue in Dokuwiki v.2025-05-14b "Librarian" [56.2] allows a remote attacker to cause a denial of service via the media_upload_xhr() function in the media.php file |
2026-04-03 | |
| CVE-2025-59711 | 8.3 | HIGH | CWE-22 | 0.7% p70 | 5.83 | An issue was discovered in Biztalk360 before 11.5. Because of mishandling of use...An issue was discovered in Biztalk360 before 11.5. Because of mishandling of user-provided input in an upload mechanism, an authenticated attacker is able to write files outside of the destination directory and/or coerce an authentication from the service, aka Directory Traversal. |
2026-04-03 | |
| CVE-2025-59710 | 8.8 | HIGH | CWE-434 | 0.2% p36 | 6.16 | An issue was discovered in Biztalk360 before 11.5. Because of incorrect access c...An issue was discovered in Biztalk360 before 11.5. Because of incorrect access control, any user is able to request the loading a DLL file. During the loading, a method is called. An attacker can craft a malicious DLL, upload it to the server, and use it to achieve remote code execution on the server. |
2026-04-03 | |
| CVE-2025-59709 | 6.8 | MEDIUM | CWE-22 | 0.2% p45 | 4.77 | An issue was discovered in Biztalk360 through 11.5. because of mishandling of us...An issue was discovered in Biztalk360 through 11.5. because of mishandling of user-provided input in a path to be read by the server, a Super User attacker is able to read files on the system and/or coerce an authentication from the service, aka Directory Traversal. |
2026-04-03 | |
| CVE-2026-5468 | 5.1 | MEDIUM | CWE-79 | 0.0% p6 | 3.57 | A security flaw has been discovered in Casdoor 2.356.0. This affects the functio...A security flaw has been discovered in Casdoor 2.356.0. This affects the function dangerouslySetInnerHTML. Performing a manipulation of the argument formCss/formCssMobile/formSideHtml results in cross site scripting. The attack can be initiated remotely. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-04-03 | |
| CVE-2026-28736 | 4.3 | MEDIUM | CWE-639 | 0.0% p0 | 3.01 | ** UNSUPPORTED WHEN ASSIGNED ** Focalboard version 8.0 fails to validate file ow...** UNSUPPORTED WHEN ASSIGNED ** Focalboard version 8.0 fails to validate file ownership when serving uploaded files. This allows an authenticated attacker who knows a victim's fileID to read the content of the file. NOTE: Focalboard as a standalone product is not maintained and no fix will be issued. |
2026-04-03 | |
| CVE-2026-25773 | 8.1 | HIGH | CWE-89 | 0.0% p1 | 5.67 | ** UNSUPPORTED WHEN ASSIGNED ** Focalboard version 8.0 fails to sanitize categor...** UNSUPPORTED WHEN ASSIGNED ** Focalboard version 8.0 fails to sanitize category IDs before incorporating them into dynamic SQL statements when reordering categories. An attacker can inject a malicious SQL payload into the category id field, which is stored in the database and later executed unsanitized when the category reorder API processes the stored value. This Second-Order SQL Injection (Time-Based Blind) allows an authenticated attacker to exfiltrate sensitive data including password hashes of other users. NOTE: Focalboard as a standalone product is not maintained and no fix will be issued. |
2026-04-03 | |
| CVE-2026-27655 | 7.3 | HIGH | CWE-79 | 0.0% p3 | 5.11 | Zohocorp ManageEngine Exchange Reporter Plus versions before 5802 are vulnerable...Zohocorp ManageEngine Exchange Reporter Plus versions before 5802 are vulnerable to Stored XSS in Permissions Based on Mailboxes report. |
2026-04-03 | |
| CVE-2026-5467 | 5.3 | MEDIUM | CWE-601 | 0.0% p0 | 3.71 | A vulnerability was identified in Casdoor 2.356.0. Affected by this issue is som...A vulnerability was identified in Casdoor 2.356.0. Affected by this issue is some unknown functionality of the component OAuth Authorization Request Handler. Such manipulation of the argument redirect_uri leads to open redirect. It is possible to launch the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-04-03 | |
| CVE-2026-4108 | 7.3 | HIGH | CWE-79 | 0.0% p5 | 5.11 | Zohocorp ManageEngine Exchange Reporter Plus versions before 5802 are vulnerable...Zohocorp ManageEngine Exchange Reporter Plus versions before 5802 are vulnerable to Stored XSS in Non-Owner Mailbox Permission report. |
2026-04-03 | |
| CVE-2026-4107 | 7.3 | HIGH | CWE-79 | 0.0% p4 | 5.11 | Zohocorp ManageEngine Exchange Reporter Plus versions before 5802 are vulnerable...Zohocorp ManageEngine Exchange Reporter Plus versions before 5802 are vulnerable to Stored XSS in Folder Message Count and Size report. |
2026-04-03 | |
| CVE-2026-3880 | 7.3 | HIGH | CWE-79 | 0.0% p3 | 5.11 | Zohocorp ManageEngine Exchange Reporter Plus versions before 5802 are vulnerable...Zohocorp ManageEngine Exchange Reporter Plus versions before 5802 are vulnerable to Stored XSS in Public Folder Client Permissions report. |
2026-04-03 | |
| CVE-2026-3879 | 7.3 | HIGH | CWE-79 | 0.0% p5 | 5.11 | Zohocorp ManageEngine Exchange Reporter Plus versions before 5802 are vulnerable...Zohocorp ManageEngine Exchange Reporter Plus versions before 5802 are vulnerable to Stored XSS in Equipment Mailbox Details report. |
2026-04-03 | |
| CVE-2026-28703 | 7.3 | HIGH | CWE-79 | 0.0% p5 | 5.11 | Zohocorp ManageEngine Exchange Reporter Plus versions before 5802 are vulnerable...Zohocorp ManageEngine Exchange Reporter Plus versions before 5802 are vulnerable to Stored XSS in Mails Exchanged Between Users report. |
2026-04-03 | |
| CVE-2026-28756 | 7.3 | HIGH | CWE-79 | 0.0% p3 | 5.11 | Zohocorp ManageEngine Exchange Reporter Plus versions before 5802 are vulnerable...Zohocorp ManageEngine Exchange Reporter Plus versions before 5802 are vulnerable to Stored XSS in Permissions based on Distribution Groups report. |
2026-04-03 | |
| CVE-2026-28754 | 7.3 | HIGH | CWE-79 | 0.0% p5 | 5.11 | Zohocorp ManageEngine Exchange Reporter Plus versions before 5802 are vulnerable...Zohocorp ManageEngine Exchange Reporter Plus versions before 5802 are vulnerable to Stored XSS in Distribution Lists report. |
2026-04-03 | |
| CVE-2026-4350 | 8.1 | HIGH | CWE-22 | 0.1% p29 | 5.67 | The Perfmatters plugin for WordPress is vulnerable to arbitrary file deletion vi...The Perfmatters plugin for WordPress is vulnerable to arbitrary file deletion via path traversal in all versions up to, and including, 2.5.9.1. This is due to the `PMCS::action_handler()` method processing the `$_GET['delete']` parameter without any sanitization, authorization check, or nonce verification. The unsanitized filename is concatenated with the storage directory path and passed to `unlink()`. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files on the server by using `../` path traversal sequences, including `wp-config.php` which would force WordPress into the installation wizard and allow full site takeover. |
2026-04-03 | |
| CVE-2026-5463 | 9.3 | CRITICAL | CWE-77 | 1.8% p82 | 6.56 | Command injection vulnerability in console.run_module_with_output() in pymetaspl...Command injection vulnerability in console.run_module_with_output() in pymetasploit3 through version 1.0.6 allows attackers to inject newline characters into module options such as RHOSTS. This breaks the intended command structure and causes the Metasploit console to execute additional unintended commands, potentially leading to arbitrary command execution and manipulation of Metasploit sessions. |
2026-04-03 | |
| CVE-2026-35549 | 6.5 | MEDIUM | CWE-789 | 0.0% p14 | 4.55 | An issue was discovered in MariaDB Server before 11.4.10, 11.5.x through 11.8.x ...An issue was discovered in MariaDB Server before 11.4.10, 11.5.x through 11.8.x before 11.8.6, and 12.x before 12.2.2. If the caching_sha2_password authentication plugin is installed, and some user accounts are configured to use it, a large packet can crash the server because sha256_crypt_r uses alloca. |
2026-04-03 | |
| CVE-2026-35545 | 5.3 | MEDIUM | CWE-669 | 0.0% p13 | 3.71 | An issue was discovered in Roundcube Webmail before 1.5.15 and 1.6.15. The remot...An issue was discovered in Roundcube Webmail before 1.5.15 and 1.6.15. The remote image blocking feature can be bypassed via SVG content in an e-mail message. This may lead to information disclosure or access-control bypass. This involves the animate element with attributeName=fill/filter/stroke. |
2026-04-03 | |
| CVE-2026-35544 | 5.3 | MEDIUM | CWE-669 | 0.0% p12 | 3.71 | An issue was discovered in Roundcube Webmail before 1.5.14 and 1.6.14. Insuffici...An issue was discovered in Roundcube Webmail before 1.5.14 and 1.6.14. Insufficient Cascading Style Sheets (CSS) sanitization in HTML e-mail messages may lead to a fixed-position mitigation bypass via the use of !important. |
2026-04-03 | |
| CVE-2026-35543 | 5.3 | MEDIUM | CWE-669 | 0.0% p12 | 3.71 | An issue was discovered in Roundcube Webmail before 1.5.14 and 1.6.14. The remot...An issue was discovered in Roundcube Webmail before 1.5.14 and 1.6.14. The remote image blocking feature can be bypassed via SVG content (with animate attributes) in an e-mail message. This may lead to information disclosure or access-control bypass. |
2026-04-03 | |
| CVE-2026-35542 | 5.3 | MEDIUM | CWE-669 | 0.0% p12 | 3.71 | An issue was discovered in Roundcube Webmail before 1.5.14 and 1.6.14. The remot...An issue was discovered in Roundcube Webmail before 1.5.14 and 1.6.14. The remote image blocking feature can be bypassed via a crafted background attribute of a BODY element in an e-mail message. This may lead to information disclosure or access-control bypass. |
2026-04-03 | |
| CVE-2026-35541 | 4.2 | MEDIUM | CWE-843 | 0.0% p10 | 2.94 | An issue was discovered in Roundcube Webmail before 1.5.14 and 1.6.14. Incorrect...An issue was discovered in Roundcube Webmail before 1.5.14 and 1.6.14. Incorrect password comparison in the password plugin could lead to type confusion that allows a password change without knowing the old password. |
2026-04-03 | |
| CVE-2026-35540 | 5.4 | MEDIUM | CWE-669 | 0.0% p13 | 3.78 | An issue was discovered in Roundcube Webmail 1.6.0 before 1.6.14. Insufficient C...An issue was discovered in Roundcube Webmail 1.6.0 before 1.6.14. Insufficient Cascading Style Sheets (CSS) sanitization in HTML e-mail messages may lead to SSRF or Information Disclosure, e.g., if stylesheet links point to local network hosts. |
2026-04-03 | |
| CVE-2026-35539 | 6.1 | MEDIUM | CWE-79 | 0.0% p12 | 4.27 | An issue was discovered in Roundcube Webmail before 1.5.14 and 1.6.14. XSS exist...An issue was discovered in Roundcube Webmail before 1.5.14 and 1.6.14. XSS exists because of insufficient HTML attachment sanitization in preview mode. A victim must preview a text/html attachment. |
2026-04-03 | |
| CVE-2026-35538 | 3.1 | LOW | CWE-88 | 0.0% p12 | 2.17 | An issue was discovered in Roundcube Webmail before 1.5.14 and 1.6.14. Unsanitiz...An issue was discovered in Roundcube Webmail before 1.5.14 and 1.6.14. Unsanitized IMAP SEARCH command arguments could lead to IMAP injection or CSRF bypass during mail search. |
2026-04-03 | |
| CVE-2026-35537 | 3.7 | LOW | CWE-502 | 0.0% p13 | 2.59 | An issue was discovered in Roundcube Webmail before 1.5.14 and 1.6.14. Unsafe de...An issue was discovered in Roundcube Webmail before 1.5.14 and 1.6.14. Unsafe deserialization in the redis/memcache session handler may lead to arbitrary file write operations by unauthenticated attackers via crafted session data. |
2026-04-03 | |
| CVE-2026-35536 | 7.2 | HIGH | CWE-159 | 0.1% p15 | 5.04 | In Tornado before 6.5.5, cookie attribute injection could occur because the doma...In Tornado before 6.5.5, cookie attribute injection could occur because the domain, path, and samesite arguments to .RequestHandler.set_cookie were not checked for crafted characters. |
2026-04-03 | |
| CVE-2026-35535 | 7.4 | HIGH | CWE-271 | 0.0% p0 | 5.18 | In Sudo through 1.9.17p2 before 3e474c2, a failure of a setuid, setgid, or setgr...In Sudo through 1.9.17p2 before 3e474c2, a failure of a setuid, setgid, or setgroups call, during a privilege drop before running the mailer, is not a fatal error and can lead to privilege escalation. |
2026-04-03 | |
| CVE-2026-28815 | 7.5 | HIGH | CWE-125 | 0.0% p15 | 5.25 | A remote attacker can supply a short X-Wing HPKE encapsulated key and trigger an...A remote attacker can supply a short X-Wing HPKE encapsulated key and trigger an out-of-bounds read in the C decapsulation path, potentially causing a crash or memory disclosure depending on runtime protections. This issue is fixed in swift-crypto version 4.3.1. |
2026-04-03 | |
| CVE-2026-35508 | 5.4 | MEDIUM | CWE-79 | 0.0% p8 | 3.78 | Shynet before 0.14.0 allows XSS in urldisplay and iconify template filters,Shynet before 0.14.0 allows XSS in urldisplay and iconify template filters, |
2026-04-03 | |
| CVE-2026-35507 | 6.4 | MEDIUM | CWE-348 | 0.0% p2 | 4.48 | Shynet before 0.14.0 allows Host header injection in the password reset flow.Shynet before 0.14.0 allows Host header injection in the password reset flow. |
2026-04-03 | |
| CVE-2026-33107 | 10.0 | CRITICAL | CWE-918 | 0.0% p12 | 7.00 | Server-side request forgery (ssrf) in Azure Databricks allows an unauthorized at...Server-side request forgery (ssrf) in Azure Databricks allows an unauthorized attacker to elevate privileges over a network. |
2026-04-03 | |
| CVE-2026-33105 | 10.0 | CRITICAL | CWE-285 | 0.0% p12 | 7.00 | Improper authorization in Microsoft Azure Kubernetes Service allows an unauthori...Improper authorization in Microsoft Azure Kubernetes Service allows an unauthorized attacker to elevate privileges over a network. |
2026-04-03 | |
| CVE-2026-32213 | 10.0 | CRITICAL | CWE-285 | 0.0% p12 | 7.00 | Improper authorization in Azure AI Foundry allows an unauthorized attacker to el...Improper authorization in Azure AI Foundry allows an unauthorized attacker to elevate privileges over a network. |
2026-04-03 | |
| CVE-2026-32211 | 9.1 | CRITICAL | CWE-306 | 0.1% p17 | 6.37 | Missing authentication for critical function in Azure MCP Server allows an unaut...Missing authentication for critical function in Azure MCP Server allows an unauthorized attacker to disclose information over a network. |
2026-04-03 | |
| CVE-2026-32173 | 8.6 | HIGH | CWE-287 | 0.1% p16 | 6.02 | Improper authentication in Azure SRE Agent allows an unauthorized attacker to di...Improper authentication in Azure SRE Agent allows an unauthorized attacker to disclose information over a network. |
2026-04-03 | |
| CVE-2026-26135 | 9.6 | CRITICAL | CWE-918 | 0.0% p10 | 6.72 | Server-side request forgery (ssrf) in Azure Custom Locations Resource Provider (...Server-side request forgery (ssrf) in Azure Custom Locations Resource Provider (RP) allows an authorized attacker to elevate privileges over a network. |
2026-04-03 | |
| CVE-2022-4986 | 8.7 | HIGH | CWE-400 | 0.0% p0 | 6.09 | Hirschmann EagleSDV version 05.4.01 prior to 05.4.02 contains a denial-of-servic...Hirschmann EagleSDV version 05.4.01 prior to 05.4.02 contains a denial-of-service vulnerability that causes the device to crash during session establishment when using TLS 1.0 or TLS 1.1. Attackers can trigger a crash by initiating TLS connections with these protocol versions to disrupt service availability. |
2026-04-02 | |
| CVE-2026-35467 | 7.5 | HIGH | CWE-522 | 0.0% p6 | 5.25 | The stored API keys in temporary browser client is not marked as protected allow...The stored API keys in temporary browser client is not marked as protected allowing for JavScript console or other errors to allow for extraction of the encryption credentials. |
2026-04-02 | |
| CVE-2026-35466 | 6.1 | MEDIUM | CWE-79 | 0.0% p8 | 4.27 | XSS vulnerability in cveInterface.js allows for inject HTML to be passed to disp...XSS vulnerability in cveInterface.js allows for inject HTML to be passed to display, as cveInterface trusts input from CVE API services |
2026-04-02 | |
| CVE-2026-30252 | 6.1 | MEDIUM | CWE-79 | 0.0% p9 | 4.27 | Multiple reflected cross-site scripting (XSS) vulnerabilities in the login.php e...Multiple reflected cross-site scripting (XSS) vulnerabilities in the login.php endpoint of Interzen Consulting S.r.l ZenShare Suite v17.0 allows attackers to execute arbitrary Javascript in the context of the user's browser via a crafted URL injected into the codice_azienda and red_url parameters. |
2026-04-02 | |
| CVE-2026-30251 | 6.1 | MEDIUM | CWE-79 | 0.0% p9 | 4.27 | A reflected cross-site scripting (XSS) vulnerability in the login_newpwd.php end...A reflected cross-site scripting (XSS) vulnerability in the login_newpwd.php endpoint of Interzen Consulting S.r.l ZenShare Suite v17.0 allows attackers to execute arbitrary Javascript in the context of the user's browser via a crafted URL injected into the codice_azienda parameter. |
2026-04-02 | |
| CVE-2025-15620 | 9.2 | CRITICAL | CWE-306 | 0.0% p0 | 6.44 | HiOS Switch Platform versions 09.1.00 prior to 09.4.05 and 10.3.01 contains a de...HiOS Switch Platform versions 09.1.00 prior to 09.4.05 and 10.3.01 contains a denial-of-service vulnerability in the web interface that allows remote attackers to reboot the affected device by sending a malicious HTTP GET request to a specific endpoint. Attackers can trigger an uncontrolled reboot condition through crafted HTTP requests to cause service disruption and unavailability of the switch. |
2026-04-02 | |
| CVE-2024-14033 | 8.7 | HIGH | CWE-400 | 0.0% p0 | 6.09 | Hirschmann Industrial IT products (BAT-R, BAT-F, BAT450-F, BAT867-R, BAT867-F, W...Hirschmann Industrial IT products (BAT-R, BAT-F, BAT450-F, BAT867-R, BAT867-F, WLC, BAT Controller Virtual) contain a heap overflow vulnerability in the HiLCOS web interface that allows unauthenticated remote attackers to trigger a denial-of-service condition by sending specially crafted requests to the web interface. Attackers can exploit this heap overflow to crash the affected device and cause service disruption, particularly in configurations where the Public Spot functionality is enabled. |
2026-04-02 | |
| CVE-2026-35383 | 6.9 | MEDIUM | CWE-540 | 0.0% p13 | 4.83 | Bentley Systems iTwin Platform exposed a Cesium ion access token in the source o...Bentley Systems iTwin Platform exposed a Cesium ion access token in the source of some web pages. An unauthenticated attacker could use this token to enumerate or delete certain assets. As of 2026-03-27, the token is no longer present in the web pages and cannot be used to enumerate or delete assets. |
2026-04-02 | |
| CVE-2026-35053 | 9.2 | CRITICAL | CWE-306 | 0.1% p30 | 6.44 | OneUptime is an open-source monitoring and observability platform. Prior to vers...OneUptime is an open-source monitoring and observability platform. Prior to version 10.0.42, the Worker service's ManualAPI exposes workflow execution endpoints (GET /workflow/manual/run/:workflowId and POST /workflow/manual/run/:workflowId) without any authentication middleware. An attacker who can obtain or guess a workflow ID can trigger arbitrary workflow execution with attacker-controlled input data, enabling JavaScript code execution, notification abuse, and data manipulation. This issue has been patched in version 10.0.42. |
2026-04-02 | |
| CVE-2026-34932 | 8.5 | HIGH | CWE-79 | 0.1% p19 | 5.95 | hoppscotch is an open source API development ecosystem. Prior to version 2026.3....hoppscotch is an open source API development ecosystem. Prior to version 2026.3.0, there is a stored XSS vulnerability that can lead to CSRF. This issue has been patched in version 2026.3.0. |
2026-04-02 | |
| CVE-2026-34931 | 8.5 | HIGH | CWE-601 | 0.1% p16 | 5.95 | hoppscotch is an open source API development ecosystem. Prior to version 2026.3....hoppscotch is an open source API development ecosystem. Prior to version 2026.3.0, there is an open redirect vulnerability that leads to token exfiltration. With these tokens, the attacker can sign in as the victim to takeover their account. This issue has been patched in version 2026.3.0. |
2026-04-02 | |
| CVE-2026-34848 | 5.4 | MEDIUM | CWE-79 | 0.0% p8 | 3.78 | hoppscotch is an open source API development ecosystem. Prior to version 2026.3....hoppscotch is an open source API development ecosystem. Prior to version 2026.3.0, there is a stored XSS vulnerability in the team member overflow tooltip via display name. This issue has been patched in version 2026.3.0. |
2026-04-02 | |
| CVE-2026-34847 | 4.7 | MEDIUM | CWE-601 | 0.0% p8 | 3.29 | hoppscotch is an open source API development ecosystem. Prior to version 2026.3....hoppscotch is an open source API development ecosystem. Prior to version 2026.3.0, the /enter page contains a DOM-based open redirect vulnerability. The redirect query parameter is directly used to construct a URL and redirect the user without proper validation. This issue has been patched in version 2026.3.0. |
2026-04-02 | |
| CVE-2026-34840 | 8.1 | HIGH | CWE-347 | 0.1% p18 | 5.67 | OneUptime is an open-source monitoring and observability platform. Prior to vers...OneUptime is an open-source monitoring and observability platform. Prior to version 10.0.42, OneUptime's SAML SSO implementation (App/FeatureSet/Identity/Utils/SSO.ts) has decoupled signature verification and identity extraction. isSignatureValid() verifies the first <Signature> element in the XML DOM using xml-crypto, while getEmail() always reads from assertion[0] via xml2js. An attacker can prepend an unsigned assertion containing an arbitrary identity before a legitimately signed assertion, resulting in authentication bypass. This issue has been patched in version 10.0.42. |
2026-04-02 | |
| CVE-2026-34838 | 9.9 | CRITICAL | CWE-502 | 0.5% p66 | 6.95 | Group-Office is an enterprise customer relationship management and groupware too...Group-Office is an enterprise customer relationship management and groupware tool. Prior to versions 6.8.156, 25.0.90, and 26.0.12, a vulnerability in the AbstractSettingsCollection model leads to insecure deserialization when these settings are loaded. By injecting a serialized FileCookieJar object into a setting string, an authenticated attacker can achieve Arbitrary File Write, leading directly to Remote Code Execution (RCE) on the server. This issue has been patched in versions 6.8.156, 25.0.90, and 26.0.12. |
2026-04-02 | |
| CVE-2026-34834 | 8.7 | HIGH | CWE-287 | 0.1% p25 | 6.09 | Bulwark Webmail is a self-hosted webmail client for Stalwart Mail Server. Prior ...Bulwark Webmail is a self-hosted webmail client for Stalwart Mail Server. Prior to version 1.4.10, the verifyIdentity() function contained logic that returned true if no session cookies were present. This allowed unauthenticated attackers to bypass security checks and access/modify user settings via the /api/settings endpoint by providing arbitrary headers. This issue has been patched in version 1.4.10. |
2026-04-02 | |
| CVE-2026-34833 | 8.7 | HIGH | CWE-312 | 0.0% p4 | 6.09 | Bulwark Webmail is a self-hosted webmail client for Stalwart Mail Server. Prior ...Bulwark Webmail is a self-hosted webmail client for Stalwart Mail Server. Prior to version 1.4.10, the GET /api/auth/session endpoint previously included the user's plaintext password in the JSON response. This exposed credentials to browser logs, local caches, and network proxie. This issue has been patched in version 1.4.10. |
2026-04-02 | |
| CVE-2026-34832 | 6.5 | MEDIUM | CWE-639 | 0.0% p14 | 4.55 | Scoold is a Q&A and a knowledge sharing platform for teams. Prior to version 1.6...Scoold is a Q&A and a knowledge sharing platform for teams. Prior to version 1.66.1, Scoold contains an authenticated authorization flaw in feedback deletion that allows any logged-in, low-privilege user to delete another user's feedback post by submitting its ID to POST /feedback/{id}/delete. The handler enforces authentication but does not enforce object ownership (or moderator/admin authorization) before deletion. In verification, a second non-privileged account successfully deleted a victim account's feedback item, and the item immediately disappeared from the feedback listing/detail views. This issue has been patched in version 1.66.1. |
2026-04-02 | |
| CVE-2026-34825 | 8.5 | HIGH | CWE-89 | 0.0% p14 | 5.95 | NocoBase is an AI-powered no-code/low-code platform for building business applic...NocoBase is an AI-powered no-code/low-code platform for building business applications and enterprise solutions. Prior to version 2.0.30, NocoBase plugin-workflow-sql substitutes template variables directly into raw SQL strings via getParsedValue() without parameterization or escaping. Any user who triggers a workflow containing a SQL node with template variables from user-controlled data can inject arbitrary SQL. This issue has been patched in version 2.0.30. |
2026-04-02 | |
| CVE-2026-34762 | 2.7 | LOW | CWE-20 | 0.1% p24 | 1.89 | Ella Core is a 5G core designed for private networks. Prior to version 1.8.0, th...Ella Core is a 5G core designed for private networks. Prior to version 1.8.0, the PUT /api/v1/subscriber/{imsi} API accepts an IMSI identifier from both the URL path and the JSON request body but never verifies they match. This allows an authenticated NetworkManager to modify any subscriber's policy while the audit trail records a fabricated or unrelated subscriber IMSI. This issue has been patched in version 1.8.0. |
2026-04-02 | |
| CVE-2026-34761 | 5.8 | MEDIUM | CWE-476 | 0.1% p19 | 4.06 | Ella Core is a 5G core designed for private networks. Prior to version 1.8.0, El...Ella Core is a 5G core designed for private networks. Prior to version 1.8.0, Ella Core panics when processing a NGAP handover failure message. An attacker able to cause a gNodeB to send NGAP handover failure messages to Ella Core can crash the process, causing service disruption for all connected subscribers. This issue has been patched in version 1.8.0. |
2026-04-02 | |
| CVE-2026-34760 | 5.9 | MEDIUM | CWE-20 | 0.1% p19 | 4.13 | vLLM is an inference and serving engine for large language models (LLMs). From v...vLLM is an inference and serving engine for large language models (LLMs). From version 0.5.5 to before version 0.18.0, Librosa defaults to using numpy.mean for mono downmixing (to_mono), while the international standard ITU-R BS.775-4 specifies a weighted downmixing algorithm. This discrepancy results in inconsistency between audio heard by humans (e.g., through headphones/regular speakers) and audio processed by AI models (Which infra via Librosa, such as vllm, transformer). This issue has been patched in version 0.18.0. |
2026-04-02 | |
| CVE-2024-14034 | 9.3 | CRITICAL | CWE-287 | 0.0% p1 | 6.51 | Hirschmann HiEOS devices versions prior to 01.1.00 contain an authentication byp...Hirschmann HiEOS devices versions prior to 01.1.00 contain an authentication bypass vulnerability in the HTTP(S) management module that allows unauthenticated remote attackers to gain administrative access by sending specially crafted HTTP(S) requests. Attackers can exploit improper authentication handling to obtain elevated privileges and perform unauthorized actions including configuration download or upload and firmware modification. |
2026-04-02 | |
| CVE-2023-7343 | 8.5 | HIGH | CWE-269 | 0.0% p0 | 5.95 | HiSecOS web server versions 05.0.00 to 08.3.01 prior to 08.3.02 contains a privi...HiSecOS web server versions 05.0.00 to 08.3.01 prior to 08.3.02 contains a privilege escalation vulnerability that allows authenticated users with operator or auditor roles to escalate privileges to the administrator role by sending specially crafted packets to the web server. Attackers can exploit this flaw to gain full administrative access to the affected device. |
2026-04-02 | |
| CVE-2026-5418 | 6.9 | MEDIUM | CWE-918 | 0.1% p16 | 4.83 | A vulnerability was identified in appsmithorg appsmith up to 1.97. Impacted is t...A vulnerability was identified in appsmithorg appsmith up to 1.97. Impacted is the function computeDisallowedHosts of the file app/server/appsmith-interfaces/src/main/java/com/appsmith/util/WebClientUtils.java of the component Dashboard. Such manipulation leads to server-side request forgery. The attack may be launched remotely. The exploit is publicly available and might be used. Upgrading to version 1.99 is recommended to address this issue. The affected component should be upgraded. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product. |
2026-04-02 | |
| CVE-2026-5417 | 5.1 | MEDIUM | CWE-918 | 0.0% p14 | 3.57 | A vulnerability was determined in Dataease SQLbot up to 1.6.0. This issue affect...A vulnerability was determined in Dataease SQLbot up to 1.6.0. This issue affects the function get_es_data_by_http of the file backend/apps/db/es_engine.py of the component Elasticsearch Handler. This manipulation of the argument address causes server-side request forgery. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized. Upgrading to version 1.7.0 is capable of addressing this issue. You should upgrade the affected component. The vendor was contacted early about this disclosure. |
2026-04-02 | |
| CVE-2026-34759 | 9.2 | CRITICAL | CWE-862 | 0.3% p48 | 6.45 | OneUptime is an open-source monitoring and observability platform. Prior to vers...OneUptime is an open-source monitoring and observability platform. Prior to version 10.0.42, multiple notification API endpoints are registered without authentication middleware, while sibling endpoints in the same codebase correctly use ClusterKeyAuthorization.isAuthorizedServiceMiddleware. These endpoints are externally reachable via the Nginx proxy at /notification/. Combined with a projectId leak from the public Status Page API, an unauthenticated attacker can purchase phone numbers on the victim's Twilio account and delete all existing alerting numbers. This issue has been patched in version 10.0.42. |
2026-04-02 | |
| CVE-2026-34758 | 9.1 | CRITICAL | CWE-306 | 0.0% p11 | 6.37 | OneUptime is an open-source monitoring and observability platform. Prior to vers...OneUptime is an open-source monitoring and observability platform. Prior to version 10.0.42, unauthenticated access to Notification test and Phone Number management endpoints allows SMS/Call/Email/WhatsApp abuse and phone number purchase. This issue has been patched in version 10.0.42. |
2026-04-02 | |
| CVE-2026-34752 | 8.7 | HIGH | CWE-248 | 0.1% p16 | 6.09 | Haraka is a Node.js mail server. Prior to version 3.1.4, sending an email with _...Haraka is a Node.js mail server. Prior to version 3.1.4, sending an email with __proto__: as a header name crashes the Haraka worker process. This issue has been patched in version 3.1.4. |
2026-04-02 | |
| CVE-2026-34745 | 9.1 | CRITICAL | CWE-22 | 0.1% p17 | 6.37 | Fireshare facilitates self-hosted media and link sharing. Prior to version 1.5.3...Fireshare facilitates self-hosted media and link sharing. Prior to version 1.5.3, the fix for CVE-2026-33645 was applied to the authenticated /api/uploadChunked endpoint but was not applied to the unauthenticated /api/uploadChunked/public endpoint in the same file (app/server/fireshare/api.py). An unauthenticated attacker can exploit the checkSum parameter to write arbitrary files with attacker-controlled content to any writable path on the server filesystem. This issue has been patched in version 1.5.3. |
2026-04-02 | |
| CVE-2026-34743 | 1.7 | LOW | CWE-122 | 0.1% p17 | 1.19 | XZ Utils provide a general-purpose data-compression library plus command-line to...XZ Utils provide a general-purpose data-compression library plus command-line tools. Prior to version 5.8.3, if lzma_index_decoder() was used to decode an Index that contained no Records, the resulting lzma_index was left in a state where where a subsequent lzma_index_append() would allocate too little memory, and a buffer overflow would occur. This issue has been patched in version 5.8.3. |
2026-04-02 | |
| CVE-2026-34742 | 7.6 | HIGH | CWE-1188 | 0.1% p17 | 5.32 | The Go MCP SDK used Go's standard encoding/json. Prior to version 1.4.0, the Mod...The Go MCP SDK used Go's standard encoding/json. Prior to version 1.4.0, the Model Context Protocol (MCP) Go SDK does not enable DNS rebinding protection by default for HTTP-based servers. When an HTTP-based MCP server is run on localhost without authentication with StreamableHTTPHandler or SSEHandler, a malicious website could exploit DNS rebinding to bypass same-origin policy restrictions and send requests to the local MCP server. This could allow an attacker to invoke tools or access resources exposed by the MCP server on behalf of the user in those limited circumstances. This issue has been patched in version 1.4.0. |
2026-04-02 | |
| CVE-2026-34736 | 5.3 | MEDIUM | CWE-287 | 0.1% p20 | 3.71 | Open edX Platform enables the authoring and delivery of online learning at any s...Open edX Platform enables the authoring and delivery of online learning at any scale. From the maple release to before the ulmo release, an unauthenticated attacker can fully bypass the email verification process by combining two issues: the OAuth2 password grant issuing tokens to inactive users (documented behavior) and the activation_key being exposed in the REST API response at /api/user/v1/accounts/. This issue has been patched in the ulmo release. |
2026-04-02 | |
| CVE-2026-34735 | 8.7 | HIGH | CWE-434 | 0.1% p21 | 6.09 | The Hytale Modding Wiki is a free service for Hytale mods to host their document...The Hytale Modding Wiki is a free service for Hytale mods to host their documentation & wikis. In version 1.2.0 and prior, the quickUpload() endpoint validates uploaded files by checking their MIME type (via PHP's finfo, which inspects file contents) but constructs the stored filename using the client-supplied file extension from getClientOriginalExtension(). These two checks are independent: an attacker can upload a file whose content passes the MIME allowlist while using a .php extension. The file is stored on the public disk and is directly accessible via URL, allowing server-side code execution. At time of publication no known patches exist. |
2026-04-02 | |
| CVE-2026-34730 | 5.5 | MEDIUM | CWE-22 | 0.0% p0 | 3.85 | Copier is a library and CLI app for rendering project templates. Prior to versio...Copier is a library and CLI app for rendering project templates. Prior to version 9.14.1, Copier's _external_data feature allows a template to load YAML files using template-controlled paths. If untrusted templates are in scope, a malicious template can read attacker-chosen YAML-parseable local files that are accessible to the user running Copier and expose their contents in rendered output. This issue has been patched in version 9.14.1. |
2026-04-02 | |
| CVE-2026-34726 | 4.4 | MEDIUM | CWE-22 | 0.0% p4 | 3.08 | Copier is a library and CLI app for rendering project templates. Prior to versio...Copier is a library and CLI app for rendering project templates. Prior to version 9.14.1, Copier's _subdirectory setting is documented as the subdirectory to use as the template root. However, the current implementation accepts parent-directory traversal such as .. and uses it directly when selecting the template root. As a result, a template can escape its own directory and make Copier render files from the parent directory without --UNSAFE. This issue has been patched in version 9.14.1. |
2026-04-02 | |
| CVE-2026-34581 | 8.1 | HIGH | CWE-288 | 0.0% p8 | 5.67 | goshs is a SimpleHTTPServer written in Go. From version 1.1.0 to before version ...goshs is a SimpleHTTPServer written in Go. From version 1.1.0 to before version 2.0.0-beta.2, when using the Share Token it is possible to bypass the limited selected file download with all the gosh functionalities, including code exec. This issue has been patched in version 2.0.0-beta.2. |
2026-04-02 | |
| CVE-2026-34426 | 6.9 | MEDIUM | CWE-184 | 0.0% p12 | 4.83 | OpenClaw versions prior to commit b57b680 contain an approval bypass vulnerabili...OpenClaw versions prior to commit b57b680 contain an approval bypass vulnerability due to inconsistent environment variable normalization between approval and execution paths, allowing attackers to inject attacker-controlled environment variables into execution without approval system validation. Attackers can exploit differing normalization logic to discard non-portable keys during approval processing while accepting them at execution time, bypassing operator review and potentially influencing runtime behavior including execution of attacker-controlled binaries. |
2026-04-02 | |
| CVE-2026-34425 | 5.3 | MEDIUM | CWE-184 | 0.1% p16 | 3.71 | OpenClaw versions prior to commit 8aceaf5 contain a preflight validation bypass ...OpenClaw versions prior to commit 8aceaf5 contain a preflight validation bypass vulnerability in shell-bleed protection that allows attackers to execute blocked script content by using piped or complex command forms that the parser fails to recognize. Attackers can craft commands such as piped execution, command substitution, or subshell invocation to bypass the validateScriptFileForShellBleed() validation checks and execute arbitrary script content that would otherwise be blocked. |
2026-04-02 | |
| CVE-2025-43264 | 8.8 | HIGH | CWE-119 | 0.0% p6 | 6.16 | The issue was addressed with improved memory handling. This issue is fixed in ma...The issue was addressed with improved memory handling. This issue is fixed in macOS Sequoia 15.6. Processing a maliciously crafted image may corrupt process memory. |
2026-04-02 | |
| CVE-2025-43257 | 8.7 | HIGH | CWE-59 | 0.0% p1 | 6.09 | This issue was addressed with improved handling of symlinks. This issue is fixed...This issue was addressed with improved handling of symlinks. This issue is fixed in macOS Sequoia 15.6. An app may be able to break out of its sandbox. |
2026-04-02 | |
| CVE-2025-43238 | 6.2 | MEDIUM | CWE-190 | 0.0% p1 | 4.34 | An integer overflow was addressed with improved input validation. This issue is ...An integer overflow was addressed with improved input validation. This issue is fixed in macOS Sequoia 15.6, macOS Sonoma 14.7.7, macOS Ventura 13.7.7. An app may be able to cause unexpected system termination. |
2026-04-02 | |
| CVE-2025-43236 | 3.3 | LOW | CWE-843 | 0.0% p0 | 2.31 | A type confusion issue was addressed with improved memory handling. This issue i...A type confusion issue was addressed with improved memory handling. This issue is fixed in macOS Sequoia 15.6, macOS Sonoma 14.7.7, macOS Ventura 13.7.7. An attacker may be able to cause unexpected app termination. |
2026-04-02 | |
| CVE-2025-43219 | 8.8 | HIGH | CWE-787 | 0.0% p6 | 6.16 | The issue was addressed with improved memory handling. This issue is fixed in ma...The issue was addressed with improved memory handling. This issue is fixed in macOS Sequoia 15.6. Processing a maliciously crafted image may corrupt process memory. |
2026-04-02 | |
| CVE-2025-43210 | 6.3 | MEDIUM | CWE-125 | 0.0% p5 | 4.41 | An out-of-bounds access issue was addressed with improved bounds checking. This ...An out-of-bounds access issue was addressed with improved bounds checking. This issue is fixed in iOS 18.6 and iPadOS 18.6, iPadOS 17.7.9, macOS Sequoia 15.6, macOS Sonoma 14.7.7, macOS Ventura 13.7.7, tvOS 18.6, visionOS 2.6, watchOS 11.6. Processing a maliciously crafted media file may lead to unexpected app termination or corrupt process memory. |
2026-04-02 | |
| CVE-2025-43202 | 8.8 | HIGH | CWE-787 | 0.0% p5 | 6.16 | This issue was addressed with improved memory handling. This issue is fixed in i...This issue was addressed with improved memory handling. This issue is fixed in iOS 18.6 and iPadOS 18.6, macOS Sequoia 15.6. Processing a file may lead to memory corruption. |
2026-04-02 | |
| CVE-2024-44303 | 7.5 | HIGH | CWE-284 | 0.1% p24 | 5.25 | The issue was addressed with improved checks. This issue is fixed in macOS Sequo...The issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.1. A malicious application may be able to modify protected parts of the file system. |
2026-04-02 | |
| CVE-2024-44286 | 7.5 | HIGH | CWE-288 | 0.1% p24 | 5.25 | This issue was addressed through improved state management. This issue is fixed ...This issue was addressed through improved state management. This issue is fixed in macOS Sequoia 15.1. An attacker with physical access can input keyboard events to apps running on a locked device. |
2026-04-02 | |
| CVE-2024-44250 | 8.2 | HIGH | CWE-269 | 0.1% p17 | 5.74 | A permissions issue was addressed with additional restrictions. This issue is fi...A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sequoia 15.1. An app may be able to execute arbitrary code out of its sandbox or with certain elevated privileges. |
2026-04-02 | |
| CVE-2024-44219 | 7.5 | HIGH | CWE-284 | 0.1% p24 | 5.25 | A permissions issue was addressed with additional restrictions. This issue is fi...A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sequoia 15.1. A malicious application with root privileges may be able to access private information. |
2026-04-02 | |
| CVE-2024-40858 | 7.1 | HIGH | CWE-284 | 0.1% p19 | 4.97 | A permissions issue was addressed with additional restrictions. This issue is fi...A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sequoia 15.1. An app may be able to access Contacts without user consent. |
2026-04-02 | |
| CVE-2024-40849 | 7.5 | HIGH | CWE-362 | 0.1% p22 | 5.25 | A race condition was addressed with additional validation. This issue is fixed i...A race condition was addressed with additional validation. This issue is fixed in macOS Sequoia 15.1. An app may be able to break out of its sandbox. |
2026-04-02 | |
| CVE-2023-7342 | 8.7 | HIGH | CWE-269 | 0.0% p0 | 6.09 | HiSecOS web server versions 03.4.00 prior to 04.1.00 contains a privilege escala...HiSecOS web server versions 03.4.00 prior to 04.1.00 contains a privilege escalation vulnerability that allows authenticated users with operator or auditor roles to escalate privileges to the administrator role by sending specially crafted packets to the web server. Attackers can exploit this flaw to gain full administrative access to the affected device. |
2026-04-02 | |
| CVE-2026-5414 | 5.5 | MEDIUM | CWE-99 | 0.0% p12 | 3.85 | A security flaw has been discovered in Newgen OmniDocs up to 12.0.00. Affected b...A security flaw has been discovered in Newgen OmniDocs up to 12.0.00. Affected by this issue is some unknown functionality of the file /omnidocs/WebApiRequestRedirection. The manipulation of the argument DocumentId results in improper control of resource identifiers. The attack may be performed from remote. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-04-02 | |
| CVE-2026-5413 | 6.3 | MEDIUM | CWE-200 | 0.0% p11 | 4.41 | A vulnerability was identified in Newgen OmniDocs up to 12.0.00. Affected by thi...A vulnerability was identified in Newgen OmniDocs up to 12.0.00. Affected by this vulnerability is an unknown functionality of the file /omnidocs/GetWebApiConfiguration. The manipulation of the argument connectionDetails leads to information disclosure. The attack is possible to be carried out remotely. The attack is considered to have high complexity. The exploitation appears to be difficult. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-04-02 | |
| CVE-2026-5370 | 5.1 | MEDIUM | CWE-79 | 0.0% p10 | 3.57 | A vulnerability was identified in krayin laravel-crm up to 2.2. Impacted is the ...A vulnerability was identified in krayin laravel-crm up to 2.2. Impacted is the function composeMail of the file packages/Webkul/Admin/tests/e2e-pw/tests/mail/inbox.spec.ts of the component Activities Module/Notes Module. The manipulation leads to cross site scripting. Remote exploitation of the attack is possible. The exploit is publicly available and might be used. The identifier of the patch is 73ed28d466bf14787fdb86a120c656a4af270153. To fix this issue, it is recommended to deploy a patch. |
2026-04-02 | |
| CVE-2026-5368 | 6.9 | MEDIUM | CWE-74 | 0.0% p10 | 4.83 | A vulnerability was determined in projectworlds Car Rental Project 1.0. The affe...A vulnerability was determined in projectworlds Car Rental Project 1.0. The affected element is an unknown function of the file /login.php of the component Parameter Handler. This manipulation of the argument uname causes sql injection. Remote exploitation of the attack is possible. The exploit has been publicly disclosed and may be utilized. |
2026-04-02 | |
| CVE-2026-35414 | 4.2 | MEDIUM | CWE-670 | 0.0% p5 | 2.94 | OpenSSH before 10.3 mishandles the authorized_keys principals option in uncommon...OpenSSH before 10.3 mishandles the authorized_keys principals option in uncommon scenarios involving a principals list in conjunction with a Certificate Authority that makes certain use of comma characters. |
2026-04-02 | |
| CVE-2026-34835 | 4.8 | MEDIUM | CWE-1286 | 0.1% p28 | 3.36 | Rack is a modular Ruby web server interface. From versions 3.0.0.beta1 to before...Rack is a modular Ruby web server interface. From versions 3.0.0.beta1 to before 3.1.21, and 3.2.0 to before 3.2.6, Rack::Request parses the Host header using an AUTHORITY regular expression that accepts characters not permitted in RFC-compliant hostnames, including /, ?, #, and @. Because req.host returns the full parsed value, applications that validate hosts using naive prefix or suffix checks can be bypassed. This can lead to host header poisoning in applications that use req.host, req.url, or req.base_url for link generation, redirects, or origin validation. This issue has been patched in versions 3.1.21 and 3.2.6. |
2026-04-02 | |
| CVE-2026-34828 | 7.1 | HIGH | CWE-613 | 0.0% p1 | 4.97 | listmonk is a standalone, self-hosted, newsletter and mailing list manager. From...listmonk is a standalone, self-hosted, newsletter and mailing list manager. From version 4.1.0 to before version 6.1.0, a session management vulnerability allows previously issued authenticated sessions to remain valid after sensitive account security changes, specifically password reset and password change. As a result, an attacker who has already obtained a valid session cookie can retain access to the account even after the victim changes or resets their password. This weakens account recovery and session security guarantees. This issue has been patched in version 6.1.0. |
2026-04-02 | |
| CVE-2026-34827 | 7.5 | HIGH | CWE-400 | 0.1% p16 | 5.25 | Rack is a modular Ruby web server interface. From versions 3.0.0.beta1 to before...Rack is a modular Ruby web server interface. From versions 3.0.0.beta1 to before 3.1.21, and 3.2.0 to before 3.2.6, Rack::Multipart::Parser#handle_mime_head parses quoted multipart parameters such as Content-Disposition: form-data; name="..." using repeated String#index searches combined with String#slice! prefix deletion. For escape-heavy quoted values, this causes super-linear processing. An unauthenticated attacker can send a crafted multipart/form-data request containing many parts with long backslash-escaped parameter values to trigger excessive CPU usage during multipart parsing. This results in a denial of service condition in Rack applications that accept multipart form data. This issue has been patched in versions 3.1.21 and 3.2.6. |
2026-04-02 | |
| CVE-2026-34725 | 8.2 | HIGH | CWE-79 | 0.0% p6 | 5.74 | DbGate is cross-platform database manager. From version 7.0.0 to before version ...DbGate is cross-platform database manager. From version 7.0.0 to before version 7.1.5, a stored XSS vulnerability exists in DbGate because attacker-controlled SVG icon strings are rendered as raw HTML without sanitization. In the web UI this allows script execution in another user's browser; in the Electron desktop app this can escalate to local code execution because Electron is configured with nodeIntegration: true and contextIsolation: false. This issue has been patched in version 7.1.5. |
2026-04-02 | |
| CVE-2026-34717 | 9.9 | CRITICAL | CWE-89 | 0.0% p14 | 6.93 | OpenProject is an open-source, web-based project management software. Prior to v...OpenProject is an open-source, web-based project management software. Prior to version 17.2.3, the =n operator in modules/reporting/lib/report/operator.rb:177 embeds user input directly into SQL WHERE clauses without parameterization. This issue has been patched in version 17.2.3. |
2026-04-02 | |
| CVE-2026-34715 | 5.3 | MEDIUM | CWE-113 | 0.0% p10 | 3.71 | ewe is a Gleam web server. Prior to version 3.0.6, the encode_headers function i...ewe is a Gleam web server. Prior to version 3.0.6, the encode_headers function in src/ewe/internal/encoder.gleam directly interpolates response header keys and values into raw HTTP bytes without validating or stripping CRLF (\r\n) sequences. An application that passes user-controlled data into response headers (e.g., setting a Location redirect header from a request parameter) allows an attacker to inject arbitrary HTTP response content, leading to response splitting, cache poisoning, and possible cross-site scripting. Notably, ewe does validate CRLF in incoming request headers via validate_field_value() in the HTTP/1.1 parser — but provides no equivalent protection for outgoing response headers in the encoder. This issue has been patched in version 3.0.6. |
2026-04-02 | |
| CVE-2026-34610 | 5.9 | MEDIUM | CWE-681 | 0.0% p5 | 4.13 | The leancrypto library is a cryptographic library that exclusively contains only...The leancrypto library is a cryptographic library that exclusively contains only PQC-resistant cryptographic algorithms. Prior to version 1.7.1, lc_x509_extract_name_segment() casts size_t vlen to uint8_t when storing the Common Name (CN) length. An attacker who crafts a certificate with CN = victim's CN + 256 bytes padding gets cn_size = (uint8_t)(256 + N) = N, where N is the victim's CN length. The first N bytes of the attacker's CN are the victim's identity. After parsing, the attacker's certificate has an identical CN to the victim's — enabling identity impersonation in PKCS#7 verification, certificate chain matching, and code signing. This issue has been patched in version 1.7.1. |
2026-04-02 | |
| CVE-2026-34608 | 4.9 | MEDIUM | CWE-125 | 0.1% p17 | 3.43 | NanoMQ MQTT Broker (NanoMQ) is an all-around Edge Messaging Platform. Prior to v...NanoMQ MQTT Broker (NanoMQ) is an all-around Edge Messaging Platform. Prior to version 0.24.10, in NanoMQ's webhook_inproc.c, the hook_work_cb() function processes nng messages by parsing the message body with cJSON_Parse(body). The body is obtained from nng_msg_body(msg), which is a binary buffer without a guaranteed null terminator. This leads to an out-of-bounds read (OOB read) as cJSON_Parse reads until it finds a \0, potentially accessing memory beyond the allocated buffer (e.g., nng_msg metadata or adjacent heap/stack). The issue is often masked by nng's allocation padding (extra 32 bytes of zeros for non-power-of-two sizes <1024 or non-aligned). The overflow is reliably triggered when the JSON payload length is a power-of-two >=1024 (no padding added). This issue has been patched in version 0.24.10. |
2026-04-02 | |
| CVE-2026-34606 | 6.9 | MEDIUM | CWE-79 | 0.0% p9 | 4.83 | Frappe Learning Management System (LMS) is a learning system that helps users st...Frappe Learning Management System (LMS) is a learning system that helps users structure their content. From version 2.27.0 to before version 2.48.0, Frappe LMS was vulnerable to stored XSS. This issue has been patched in version 2.48.0. |
2026-04-02 | |
| CVE-2026-34601 | 7.5 | HIGH | CWE-91 | 0.1% p16 | 5.25 | xmldom is a pure JavaScript W3C standard-based (XML DOM Level 2 Core) `DOMParser...xmldom is a pure JavaScript W3C standard-based (XML DOM Level 2 Core) `DOMParser` and `XMLSerializer` module. In xmldom versions 0.6.0 and prior and @xmldom/xmldom prior to versions 0.8.12 and 0.9.9, xmldom/xmldom allows attacker-controlled strings containing the CDATA terminator ]]> to be inserted into a CDATASection node. During serialization, XMLSerializer emitted the CDATA content verbatim without rejecting or safely splitting the terminator. As a result, data intended to remain text-only became active XML markup in the serialized output, enabling XML structure injection and downstream business-logic manipulation. This issue has been patched in xmldom version 0.6.0 and @xmldom/xmldom versions 0.8.12 and 0.9.9. |
2026-04-02 | |
| CVE-2026-34598 | 7.1 | HIGH | CWE-79 | 0.0% p12 | 4.97 | YesWiki is a wiki system written in PHP. Prior to version 4.6.0, a stored and bl...YesWiki is a wiki system written in PHP. Prior to version 4.6.0, a stored and blind XSS vulnerability exists in the form title field. A malicious attacker can inject JavaScript without any authentication via a form title that is saved in the backend database. When any user visits that injected page, the JavaScript payload gets executed. This issue has been patched in version 4.6.0. |
2026-04-02 | |
| CVE-2026-34593 | 8.2 | HIGH | CWE-400 | 0.1% p16 | 5.74 | Ash Framework is a declarative, extensible framework for building Elixir applica...Ash Framework is a declarative, extensible framework for building Elixir applications. Prior to version 3.22.0, Ash.Type.Module.cast_input/2 unconditionally creates a new Erlang atom via Module.concat([value]) for any user-supplied binary string that starts with "Elixir.", before verifying whether the referenced module exists. Because Erlang atoms are never garbage-collected and the BEAM atom table has a hard default limit of approximately 1,048,576 entries, an attacker who can submit values to any resource attribute or argument of type :module can exhaust this table and crash the entire BEAM VM, taking down the application. This issue has been patched in version 3.22.0. |
2026-04-02 | |
| CVE-2026-34591 | 7.1 | HIGH | CWE-22 | 0.0% p11 | 4.97 | Poetry is a dependency manager for Python. From version 1.4.0 to before version ...Poetry is a dependency manager for Python. From version 1.4.0 to before version 2.3.3, a crafted wheel can contain ../ paths that Poetry writes to disk without containment checks, allowing arbitrary file write with the privileges of the Poetry process. It is reachable from untrusted package artifacts during normal install flows. (Normally, installing a malicious wheel is not sufficient for execution of malicious code. Malicious code will only be executed after installation if the malicious package is imported or invoked by the user.). This issue has been patched in version 2.3.3. |
2026-04-02 | |
| CVE-2026-34590 | 5.4 | MEDIUM | CWE-918 | 0.0% p9 | 3.78 | Postiz is an AI social media scheduling tool. Prior to version 2.21.4, the POST ...Postiz is an AI social media scheduling tool. Prior to version 2.21.4, the POST /webhooks/ endpoint for creating webhooks uses WebhooksDto which validates the url field with only @IsUrl() (format check), missing the @IsSafeWebhookUrl validator that blocks internal/private network addresses. The update (PUT /webhooks/) and test (POST /webhooks/send) endpoints correctly apply @IsSafeWebhookUrl. When a post is published, the orchestrator fetches the stored webhook URL without runtime validation, enabling blind SSRF against internal services. This issue has been patched in version 2.21.4. |
2026-04-02 | |
| CVE-2026-34584 | 5.4 | MEDIUM | CWE-639 | 0.0% p8 | 3.78 | listmonk is a standalone, self-hosted, newsletter and mailing list manager. From...listmonk is a standalone, self-hosted, newsletter and mailing list manager. From version 4.1.0 to before version 6.1.0, bugs in list permission checks allows users in a multi-user environment to access to lists (which they don't have access to) under different scenarios. This only affects multi-user environments with untrusted users. This issue has been patched in version 6.1.0. |
2026-04-02 | |
| CVE-2026-34577 | 8.6 | HIGH | CWE-918 | 0.1% p23 | 6.02 | Postiz is an AI social media scheduling tool. Prior to version 2.21.3, the GET /...Postiz is an AI social media scheduling tool. Prior to version 2.21.3, the GET /public/stream endpoint in PublicController accepts a user-supplied url query parameter and proxies the full HTTP response back to the caller. The only validation is url.endsWith('mp4'), which is trivially bypassable by appending .mp4 as a query parameter value or URL fragment. The endpoint requires no authentication and has no SSRF protections, allowing an unauthenticated attacker to read responses from internal services, cloud metadata endpoints, and other network-internal resources. This issue has been patched in version 2.21.3. |
2026-04-02 | |
| CVE-2026-34576 | 8.3 | HIGH | CWE-918 | 0.0% p10 | 5.81 | Postiz is an AI social media scheduling tool. Prior to version 2.21.3, the POST ...Postiz is an AI social media scheduling tool. Prior to version 2.21.3, the POST /public/v1/upload-from-url endpoint accepts a user-supplied URL and fetches it server-side using axios.get() with no SSRF protections. The only validation is a file extension check (.png, .jpg, etc.) which is trivially bypassed by appending an image extension to any URL path. An authenticated API user can fetch internal network resources, cloud instance metadata, and other internal services, with the response data uploaded to storage and returned to the attacker. This issue has been patched in version 2.21.3. |
2026-04-02 | |
| CVE-2026-34526 | 5.0 | MEDIUM | CWE-918 | 0.0% p8 | 3.50 | SillyTavern is a locally installed user interface that allows users to interact ...SillyTavern is a locally installed user interface that allows users to interact with text generation large language models, image generation engines, and text-to-speech voice models. Prior to version 1.17.0, in src/endpoints/search.js, the hostname is checked against /^\d+\.\d+\.\d+\.\d+$/. This only matches literal dotted-quad IPv4 (e.g. 127.0.0.1, 10.0.0.1). It does not catch: localhost (hostname, not dotted-quad), [::1] (IPv6 loopback), and DNS names resolving to internal addresses (e.g. localtest.me -> 127.0.0.1). A separate port check (urlObj.port !== '') limits exploitation to services on default ports (80/443), making this lower severity than a fully unrestricted SSRF. This issue has been patched in version 1.17.0. |
2026-04-02 | |
| CVE-2026-34524 | 8.3 | HIGH | CWE-22 | 0.1% p17 | 5.81 | SillyTavern is a locally installed user interface that allows users to interact ...SillyTavern is a locally installed user interface that allows users to interact with text generation large language models, image generation engines, and text-to-speech voice models. Prior to version 1.17.0, a path traversal vulnerability in chat endpoints allows an authenticated attacker to read and delete arbitrary files under their user data root (for example secrets.json and settings.json) by supplying avatar_url="..". This issue has been patched in version 1.17.0. |
2026-04-02 | |
| CVE-2026-34523 | 5.3 | MEDIUM | CWE-22 | 0.1% p20 | 3.71 | SillyTavern is a locally installed user interface that allows users to interact ...SillyTavern is a locally installed user interface that allows users to interact with text generation large language models, image generation engines, and text-to-speech voice models. Prior to version 1.17.0, a path traversal vulnerability in the static file route handler allows any unauthenticated user to determine whether files exist anywhere on the server's filesystem. by sending percent-encoded "../" sequences (%2E%2E%2F) in requests to static file routes, an attacker can check for the existence of files. This issue has been patched in version 1.17.0. |
2026-04-02 | |
| CVE-2026-34522 | 8.1 | HIGH | CWE-22 | 0.1% p20 | 5.67 | SillyTavern is a locally installed user interface that allows users to interact ...SillyTavern is a locally installed user interface that allows users to interact with text generation large language models, image generation engines, and text-to-speech voice models. Prior to version 1.17.0, a path traversal vulnerability in /api/chats/import allows an authenticated attacker to write attacker-controlled files outside the intended chats directory by injecting traversal sequences into character_name. This issue has been patched in version 1.17.0. |
2026-04-02 | |
| CVE-2026-34124 | 7.1 | HIGH | CWE-120 | 0.0% p10 | 4.97 | A denial-of-service vulnerability was identified in TP-Link Tapo C520WS v2.6 wit...A denial-of-service vulnerability was identified in TP-Link Tapo C520WS v2.6 within the HTTP request path parsing logic. The implementation enforces length restrictions on the raw request path but does not account for path expansion performed during normalization. An attacker on the adjacent network may send a crafted HTTP request to cause buffer overflow and memory corruption, leading to system interruption or device reboot. |
2026-04-02 | |
| CVE-2026-33271 | 6.7 | MEDIUM | CWE-732 | 0.0% p1 | 4.69 | Local privilege escalation due to insecure folder permissions. The following pro...Local privilege escalation due to insecure folder permissions. The following products are affected: Acronis True Image (Windows) before build 42902. |
2026-04-02 | |
| CVE-2026-32762 | 4.8 | MEDIUM | CWE-436 | 0.0% p10 | 3.36 | Rack is a modular Ruby web server interface. From versions 3.0.0.beta1 to before...Rack is a modular Ruby web server interface. From versions 3.0.0.beta1 to before 3.1.21 and 3.2.0 to before 3.2.6, Rack::Utils.forwarded_values parses the RFC 7239 Forwarded header by splitting on semicolons before handling quoted-string values. Because quoted values may legally contain semicolons, a header can be interpreted by Rack as multiple Forwarded directives rather than as a single quoted for value. In deployments where an upstream proxy, WAF, or intermediary validates or preserves quoted Forwarded values differently, this discrepancy can allow an attacker to smuggle host, proto, for, or by parameters through a single header value. This issue has been patched in versions 3.1.21 and 3.2.6. |
2026-04-02 | |
| CVE-2026-28728 | 6.7 | MEDIUM | CWE-427 | 0.0% p2 | 4.69 | Local privilege escalation due to DLL hijacking vulnerability. The following pro...Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis True Image (Windows) before build 42902. |
2026-04-02 | |
| CVE-2026-27774 | 6.7 | MEDIUM | CWE-427 | 0.0% p2 | 4.69 | Local privilege escalation due to DLL hijacking vulnerability. The following pro...Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis True Image (Windows) before build 42902. |
2026-04-02 | |
| CVE-2026-26962 | 4.8 | MEDIUM | CWE-93 | 0.1% p15 | 3.36 | Rack is a modular Ruby web server interface. From version 3.2.0 to before versio...Rack is a modular Ruby web server interface. From version 3.2.0 to before version 3.2.6, Rack::Multipart::Parser unfolds folded multipart part headers incorrectly. When a multipart header contains an obs-fold sequence, Rack preserves the embedded CRLF in parsed parameter values such as filename or name instead of removing the folded line break during unfolding. As a result, applications that later reuse those parsed values in HTTP response headers may be vulnerable to downstream header injection or response splitting. This issue has been patched in version 3.2.6. |
2026-04-02 | |
| CVE-2026-5360 | 6.3 | MEDIUM | CWE-843 | 0.1% p18 | 4.41 | A vulnerability has been found in Free5GC 4.2.0. The affected element is an unkn...A vulnerability has been found in Free5GC 4.2.0. The affected element is an unknown function of the component aper. Such manipulation leads to type confusion. The attack may be launched remotely. This attack is characterized by high complexity. The exploitability is described as difficult. The exploit has been disclosed to the public and may be used. The name of the patch is 26205eb01705754b7b902ad6c4b613c96c881e29. It is best practice to apply a patch to resolve this issue. |
2026-04-02 | |
| CVE-2026-5355 | 5.3 | MEDIUM | CWE-77 | 0.3% p53 | 3.72 | A vulnerability has been found in Trendnet TEW-657BRM 1.00.1. Affected by this i...A vulnerability has been found in Trendnet TEW-657BRM 1.00.1. Affected by this issue is the function vpn_drop of the file /setup.cgi. The manipulation of the argument policy_name leads to os command injection. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used. The vendor confirms, that "[t]he product in question (...) has been discontinued and end of life since June 23, 2011, that is more than 14 years ago. We no longer provide support for this product, so we are not able to confirm the vulnerabilities. We will make an announcement on our website's product support page and notify customers who registered their products with us." This vulnerability only affects products that are no longer supported by the maintainer. |
2026-04-02 | |
| CVE-2026-5354 | 5.3 | MEDIUM | CWE-77 | 0.3% p53 | 3.72 | A flaw has been found in Trendnet TEW-657BRM 1.00.1. Affected by this vulnerabil...A flaw has been found in Trendnet TEW-657BRM 1.00.1. Affected by this vulnerability is the function vpn_connect of the file /setup.cgi. Executing a manipulation of the argument policy_name can lead to os command injection. The attack can be executed remotely. The exploit has been published and may be used. The vendor confirms, that "[t]he product in question (...) has been discontinued and end of life since June 23, 2011, that is more than 14 years ago. We no longer provide support for this product, so we are not able to confirm the vulnerabilities. We will make an announcement on our website's product support page and notify customers who registered their products with us." This vulnerability only affects products that are no longer supported by the maintainer. |
2026-04-02 | |
| CVE-2026-5353 | 5.3 | MEDIUM | CWE-77 | 0.3% p53 | 3.72 | A vulnerability was detected in Trendnet TEW-657BRM 1.00.1. Affected is the func...A vulnerability was detected in Trendnet TEW-657BRM 1.00.1. Affected is the function ping_test of the file /setup.cgi. Performing a manipulation of the argument c4_IPAddr results in os command injection. Remote exploitation of the attack is possible. The exploit is now public and may be used. The vendor confirms, that "[t]he product in question (...) has been discontinued and end of life since June 23, 2011, that is more than 14 years ago. We no longer provide support for this product, so we are not able to confirm the vulnerabilities. We will make an announcement on our website's product support page and notify customers who registered their products with us." This vulnerability only affects products that are no longer supported by the maintainer. |
2026-04-02 | |
| CVE-2026-5352 | 5.3 | MEDIUM | CWE-77 | 0.3% p53 | 3.72 | A security vulnerability has been detected in Trendnet TEW-657BRM 1.00.1. This i...A security vulnerability has been detected in Trendnet TEW-657BRM 1.00.1. This impacts the function Edit of the file /setup.cgi. Such manipulation of the argument pcdb_list leads to os command injection. The attack may be launched remotely. The exploit has been disclosed publicly and may be used. The vendor confirms, that "[t]he product in question (...) has been discontinued and end of life since June 23, 2011, that is more than 14 years ago. We no longer provide support for this product, so we are not able to confirm the vulnerabilities. We will make an announcement on our website's product support page and notify customers who registered their products with us." This vulnerability only affects products that are no longer supported by the maintainer. |
2026-04-02 | |
| CVE-2026-35388 | 2.5 | LOW | CWE-420 | 0.0% p1 | 1.75 | OpenSSH before 10.3 omits connection multiplexing confirmation for proxy-mode mu...OpenSSH before 10.3 omits connection multiplexing confirmation for proxy-mode multiplexing sessions. |
2026-04-02 | |
| CVE-2026-35387 | 3.1 | LOW | CWE-670 | 0.0% p8 | 2.17 | OpenSSH before 10.3 can use unintended ECDSA algorithms. Listing of any ECDSA al...OpenSSH before 10.3 can use unintended ECDSA algorithms. Listing of any ECDSA algorithm in PubkeyAcceptedAlgorithms or HostbasedAcceptedAlgorithms is misinterpreted to mean all ECDSA algorithms. |
2026-04-02 | |
| CVE-2026-35386 | 3.6 | LOW | CWE-696 | 0.0% p0 | 2.52 | In OpenSSH before 10.3, command execution can occur via shell metacharacters in ...In OpenSSH before 10.3, command execution can occur via shell metacharacters in a username within a command line. This requires a scenario where the username on the command line is untrusted, and also requires a non-default configurations of % in ssh_config. |
2026-04-02 | |
| CVE-2026-35385 | 7.5 | HIGH | CWE-281 | 0.0% p11 | 5.25 | In OpenSSH before 10.3, a file downloaded by scp may be installed setuid or setg...In OpenSSH before 10.3, a file downloaded by scp may be installed setuid or setgid, an outcome contrary to some users' expectations, if the download is performed as root with -O (legacy scp protocol) and without -p (preserve mode). |
2026-04-02 | |
| CVE-2026-35038 | 5.3 | MEDIUM | CWE-20 | 0.1% p18 | 3.71 | Signal K Server is a server application that runs on a central hub in a boat. Pr...Signal K Server is a server application that runs on a central hub in a boat. Prior to version 2.24.0, there is an arbitrary prototype read vulnerability via `from` field bypass. This vulnerability allows a low-privileged authenticated user to bypass prototype boundary filtering to extract internal functions and properties from the global prototype object this violates data isolation and lets a user read more than they should. This issue has been patched in version 2.24.0. |
2026-04-02 | |
| CVE-2026-34877 | 9.8 | CRITICAL | CWE-250 | 0.1% p35 | 6.86 | An issue was discovered in Mbed TLS versions from 2.19.0 up to 3.6.5, Mbed TLS 4...An issue was discovered in Mbed TLS versions from 2.19.0 up to 3.6.5, Mbed TLS 4.0.0. Insufficient protection of serialized SSL context or session structures allows an attacker who can modify the serialized structures to induce memory corruption, leading to arbitrary code execution. This is caused by Incorrect Use of Privileged APIs. |
2026-04-02 | |
| CVE-2026-34831 | 4.8 | MEDIUM | CWE-130 | 0.0% p10 | 3.36 | Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, a...Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Files#fail sets the Content-Length response header using String#size instead of String#bytesize. When the response body contains multibyte UTF-8 characters, the declared Content-Length is smaller than the number of bytes actually sent on the wire. Because Rack::Files reflects the requested path in 404 responses, an attacker can trigger this mismatch by requesting a non-existent path containing percent-encoded UTF-8 characters. This results in incorrect HTTP response framing and may cause response desynchronization in deployments that rely on the incorrect Content-Length value. This issue has been patched in versions 2.2.23, 3.1.21, and 3.2.6. |
2026-04-02 | |
| CVE-2026-34830 | 5.9 | MEDIUM | CWE-625 | 0.0% p12 | 4.13 | Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, a...Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Sendfile#map_accel_path interpolates the value of the X-Accel-Mapping request header directly into a regular expression when rewriting file paths for X-Accel-Redirect. Because the header value is not escaped, an attacker who can supply X-Accel-Mapping to the backend can inject regex metacharacters and control the generated X-Accel-Redirect response header. In deployments using Rack::Sendfile with x-accel-redirect, this can allow an attacker to cause nginx to serve unintended files from configured internal locations. This issue has been patched in versions 2.2.23, 3.1.21, and 3.2.6. |
2026-04-02 | |
| CVE-2026-34829 | 7.5 | HIGH | CWE-400 | 0.1% p16 | 5.25 | Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, a...Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Multipart::Parser only wraps the request body in a BoundedIO when CONTENT_LENGTH is present. When a multipart/form-data request is sent without a Content-Length header, such as with HTTP chunked transfer encoding, multipart parsing continues until end-of-stream with no total size limit. For file parts, the uploaded body is written directly to a temporary file on disk rather than being constrained by the buffered in-memory upload limit. An unauthenticated attacker can therefore stream an arbitrarily large multipart file upload and consume unbounded disk space. This results in a denial of service condition for Rack applications that accept multipart form data. This issue has been patched in versions 2.2.23, 3.1.21, and 3.2.6. |
2026-04-02 | |
| CVE-2026-34826 | 5.3 | MEDIUM | CWE-400 | 0.1% p15 | 3.71 | Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, a...Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Utils.get_byte_ranges parses the HTTP Range header without limiting the number of individual byte ranges. Although the existing fix for CVE-2024-26141 rejects ranges whose total byte coverage exceeds the file size, it does not restrict the count of ranges. An attacker can supply many small overlapping ranges such as 0-0,0-0,0-0,... to trigger disproportionate CPU, memory, I/O, and bandwidth consumption per request. This results in a denial of service condition in Rack file-serving paths that process multipart byte range responses. This issue has been patched in versions 2.2.23, 3.1.21, and 3.2.6. |
2026-04-02 | |
| CVE-2026-34786 | 5.3 | MEDIUM | CWE-180 | 0.0% p11 | 3.71 | Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, a...Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Static#applicable_rules evaluates several header_rules types against the raw URL-encoded PATH_INFO, while the underlying file-serving path is decoded before the file is served. As a result, a request for a URL-encoded variant of a static path can serve the same file without the headers that header_rules were intended to apply. In deployments that rely on Rack::Static to attach security-relevant response headers to static content, this can allow an attacker to bypass those headers by requesting an encoded form of the path. This issue has been patched in versions 2.2.23, 3.1.21, and 3.2.6. |
2026-04-02 | |
| CVE-2026-34785 | 7.5 | HIGH | CWE-187 | 0.0% p12 | 5.25 | Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, a...Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Static determines whether a request should be served as a static file using a simple string prefix check. When configured with URL prefixes such as "/css", it matches any request path that begins with that string, including unrelated paths such as "/css-config.env" or "/css-backup.sql". As a result, files under the static root whose names merely share the configured prefix may be served unintentionally, leading to information disclosure. This issue has been patched in versions 2.2.23, 3.1.21, and 3.2.6. |
2026-04-02 | |
| CVE-2026-34763 | 5.3 | MEDIUM | CWE-625 | 0.0% p10 | 3.71 | Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, a...Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Directory interpolates the configured root path directly into a regular expression when deriving the displayed directory path. If root contains regex metacharacters such as +, *, or ., the prefix stripping can fail and the generated directory listing may expose the full filesystem path in the HTML output. This issue has been patched in versions 2.2.23, 3.1.21, and 3.2.6. |
2026-04-02 | |
| CVE-2026-34230 | 5.3 | MEDIUM | CWE-400 | 0.1% p15 | 3.71 | Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, a...Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Utils.select_best_encoding processes Accept-Encoding values with quadratic time complexity when the header contains many wildcard (*) entries. Because this method is used by Rack::Deflater to choose a response encoding, an unauthenticated attacker can send a single request with a crafted Accept-Encoding header and cause disproportionate CPU consumption on the compression middleware path. This results in a denial of service condition for applications using Rack::Deflater. This issue has been patched in versions 2.2.23, 3.1.21, and 3.2.6. |
2026-04-02 | |
| CVE-2026-34083 | 6.1 | MEDIUM | CWE-346 | 0.0% p2 | 4.27 | Signal K Server is a server application that runs on a central hub in a boat. Pr...Signal K Server is a server application that runs on a central hub in a boat. Prior to version 2.24.0, SignalK Server contains a code-level vulnerability in its OIDC login and logout handlers where the unvalidated HTTP Host header is used to construct the OAuth2 redirect_uri. Because the redirectUri configuration is silently unset by default, an attacker can spoof the Host header to steal OAuth authorization codes and hijack user sessions in realistic deployments as The OIDC provider will then send the authorization code to whatever domain was injected. This issue has been patched in version 2.24.0. |
2026-04-02 | |
| CVE-2026-33951 | 6.9 | MEDIUM | CWE-284 | 0.1% p21 | 4.83 | Signal K Server is a server application that runs on a central hub in a boat. Pr...Signal K Server is a server application that runs on a central hub in a boat. Prior to version 2.24.0-beta.1, the SignalK Server exposes an unauthenticated HTTP endpoint that allows remote attackers to modify navigation data source priorities. This endpoint, accessible via PUT /signalk/v1/api/sourcePriorities, does not enforce authentication or authorization checks and directly assigns user-controlled input to the server configuration. As a result, attackers can influence which GPS, AIS, or other sensor data sources are trusted by the system. The changes are immediately applied and persisted to disk, allowing the manipulation to survive server restarts. This issue has been patched in version 2.24.0-beta.1. |
2026-04-02 | |
| CVE-2026-33950 | 9.4 | CRITICAL | CWE-285 | 0.1% p19 | 6.58 | Signal K Server is a server application that runs on a central hub in a boat. Pr...Signal K Server is a server application that runs on a central hub in a boat. Prior to version 2.24.0-beta.4, there is a privilege escalation vulnerability by Admin Role Injection via /enableSecurity. An unauthenticated attacker can gain full Administrator access to the SignalK server at any time, allowing them to modify sensitive vessel routing data, alter server configurations, and access restricted endpoints. This issue has been patched in version 2.24.0-beta.4. |
2026-04-02 | |
| CVE-2026-30603 | 6.8 | MEDIUM | CWE-345 | 0.0% p1 | 4.76 | An issue in the firmware update mechanism of Qianniao QN-L23PA0904 v20250721.164...An issue in the firmware update mechanism of Qianniao QN-L23PA0904 v20250721.1640 allows attackers to gain root access, install backdoors, and exfiltrate data via supplying a crafted iu.sh script contained in an SD card. |
2026-04-02 | |
| CVE-2026-26961 | 3.7 | LOW | CWE-436 | 0.0% p11 | 2.59 | Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, a...Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Multipart::Parser extracts the boundary parameter from multipart/form-data using a greedy regular expression. When a Content-Type header contains multiple boundary parameters, Rack selects the last one rather than the first. In deployments where an upstream proxy, WAF, or intermediary interprets the first boundary parameter, this mismatch can allow an attacker to smuggle multipart content past upstream inspection and have Rack parse a different body structure than the intermediary validated. This issue has been patched in versions 2.2.23, 3.1.21, and 3.2.6. |
2026-04-02 | |
| CVE-2026-26895 | 5.3 | MEDIUM | CWE-203 | 0.0% p14 | 3.71 | User enumeration vulnerability in /pwreset.php in osTicket v1.18.2 allows remote...User enumeration vulnerability in /pwreset.php in osTicket v1.18.2 allows remote attackers to enumerate valid usernames registered in the platform. |
2026-04-02 | |
| CVE-2026-25212 | 9.9 | CRITICAL | CWE-250 | 0.0% p14 | 6.93 | An issue was discovered in Percona PMM before 3.7. Because an internal database ...An issue was discovered in Percona PMM before 3.7. Because an internal database user retains specific superuser privileges, an attacker with pmm-admin rights can abuse the "Add data source" feature to break out of the database context and execute shell commands on the underlying operating system. |
2026-04-02 | |
| CVE-2026-5351 | 5.3 | MEDIUM | CWE-77 | 0.3% p53 | 3.72 | A weakness has been identified in Trendnet TEW-657BRM 1.00.1. This affects the f...A weakness has been identified in Trendnet TEW-657BRM 1.00.1. This affects the function add_wps_client of the file /setup.cgi. This manipulation of the argument wl_enrolee_pin causes os command injection. The attack may be initiated remotely. The exploit has been made available to the public and could be used for attacks. The vendor confirms, that "[t]he product in question (...) has been discontinued and end of life since June 23, 2011, that is more than 14 years ago. We no longer provide support for this product, so we are not able to confirm the vulnerabilities. We will make an announcement on our website's product support page and notify customers who registered their products with us." This vulnerability only affects products that are no longer supported by the maintainer. |
2026-04-02 | |
| CVE-2026-5350 | 7.4 | HIGH | CWE-119 | 0.1% p26 | 5.18 | A security flaw has been discovered in Trendnet TEW-657BRM 1.00.1. The impacted ...A security flaw has been discovered in Trendnet TEW-657BRM 1.00.1. The impacted element is the function update_pcdb of the file /setup.cgi. The manipulation of the argument mac_pc_dba results in stack-based buffer overflow. The attack can be launched remotely. The exploit has been released to the public and may be used for attacks. The vendor confirms, that "[t]he product in question (...) has been discontinued and end of life since June 23, 2011, that is more than 14 years ago. We no longer provide support for this product, so we are not able to confirm the vulnerabilities. We will make an announcement on our website's product support page and notify customers who registered their products with us." This vulnerability only affects products that are no longer supported by the maintainer. |
2026-04-02 | |
| CVE-2026-5349 | 7.4 | HIGH | CWE-119 | 0.1% p26 | 5.18 | A vulnerability was identified in Trendnet TEW-657BRM 1.00.1. The affected eleme...A vulnerability was identified in Trendnet TEW-657BRM 1.00.1. The affected element is the function add_apcdb of the file /setup.cgi. The manipulation of the argument mac_pc_dba leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit is publicly available and might be used. The vendor confirms, that "[t]he product in question (...) has been discontinued and end of life since June 23, 2011, that is more than 14 years ago. We no longer provide support for this product, so we are not able to confirm the vulnerabilities. We will make an announcement on our website's product support page and notify customers who registered their products with us." This vulnerability only affects products that are no longer supported by the maintainer. |
2026-04-02 | |
| CVE-2026-34876 | 7.5 | HIGH | CWE-125 | 0.0% p4 | 5.25 | An issue was discovered in Mbed TLS 3.x before 3.6.6. An out-of-bounds read vuln...An issue was discovered in Mbed TLS 3.x before 3.6.6. An out-of-bounds read vulnerability in mbedtls_ccm_finish() in library/ccm.c allows attackers to obtain adjacent CCM context data via invocation of the multipart CCM API with an oversized tag_len parameter. This is caused by missing validation of the tag_len parameter against the size of the internal 16-byte authentication buffer. The issue affects the public multipart CCM API in Mbed TLS 3.x, where mbedtls_ccm_finish() can be invoked directly by applications. In Mbed TLS 4.x versions prior to the fix, the same missing validation exists in the internal implementation; however, the function is not exposed as part of the public API. Exploitation requires application-level invocation of the multipart CCM API. |
2026-04-02 | |
| CVE-2026-33746 | 9.8 | CRITICAL | CWE-287 | 0.0% p12 | 6.86 | Convoy is a KVM server management panel for hosting businesses. From version 3.9...Convoy is a KVM server management panel for hosting businesses. From version 3.9.0-beta to before version 4.5.1, the JWTService::decode() method did not verify the cryptographic signature of JWT tokens. While the method configured a symmetric HMAC-SHA256 signer via lcobucci/jwt, it only validated time-based claims (exp, nbf, iat) using the StrictValidAt constraint. The SignedWith constraint was not included in the validation step. This means an attacker could forge or tamper with JWT token payloads — such as modifying the user_uuid claim — and the token would be accepted as valid, as long as the time-based claims were satisfied. This directly impacts the SSO authentication flow (LoginController::authorizeToken), allowing an attacker to authenticate as any user by crafting a token with an arbitrary user_uuid. This issue has been patched in version 4.5.1. |
2026-04-02 | |
| CVE-2026-33691 | 6.8 | MEDIUM | CWE-178 | 0.1% p20 | 4.76 | The OWASP core rule set (CRS) is a set of generic attack detection rules for use...The OWASP core rule set (CRS) is a set of generic attack detection rules for use with compatible web application firewalls. Prior to versions 3.3.9 and 4.25.0, a bypass was identified in OWASP CRS that allows uploading files with dangerous extensions (.php, .phar, .jsp, .jspx) by inserting whitespace padding in the filename (e.g. photo. php or shell.jsp ). The affected rules do not normalize whitespace before evaluating the file extension regex, so the dot-extension check fails to match. This issue has been patched in versions 3.3.9 and 4.25.0. |
2026-04-02 | |
| CVE-2026-30332 | 7.5 | HIGH | CWE-367 | 0.0% p1 | 5.25 | A Time-of-Check to Time-of-Use (TOCTOU) race condition vulnerability in Balena E...A Time-of-Check to Time-of-Use (TOCTOU) race condition vulnerability in Balena Etcher for Windows prior to v2.1.4 allows attackers to escalate privileges and execute arbitrary code via replacing a legitimate script with a crafted payload during the flashing process. |
2026-04-02 | |
| CVE-2026-5346 | 6.9 | MEDIUM | CWE-918 | 0.1% p15 | 4.83 | A vulnerability was determined in huimeicloud hm_editor up to 2.2.3. Impacted is...A vulnerability was determined in huimeicloud hm_editor up to 2.2.3. Impacted is the function client.get of the file src/mcp-server.js of the component image-to-base64 Endpoint. Executing a manipulation of the argument url can lead to server-side request forgery. It is possible to launch the attack remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-04-02 | |
| CVE-2026-5344 | 5.3 | MEDIUM | CWE-22 | 0.0% p4 | 3.71 | A security vulnerability has been detected in Textpattern up to 4.9.1. Affected ...A security vulnerability has been detected in Textpattern up to 4.9.1. Affected by this vulnerability is the function mt_uploadImage of the file rpc/TXP_RPCServer.php of the component XML-RPC Handler. The manipulation of the argument file.name leads to path traversal. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used. The vendor confirmed the issue and will provide a fix in the upcoming release. |
2026-04-02 | |
| CVE-2026-5342 | 5.5 | MEDIUM | CWE-119 | 0.1% p23 | 3.85 | A flaw has been found in LibRaw up to 0.22.0. This affects the function LibRaw::...A flaw has been found in LibRaw up to 0.22.0. This affects the function LibRaw::nikon_load_padded_packed_raw of the file src/decoders/decoders_libraw.cpp of the component TIFF/NEF. Executing a manipulation of the argument load_flags/raw_width can lead to out-of-bounds read. It is possible to launch the attack remotely. The exploit has been published and may be used. Upgrading to version 0.22.1 mitigates this issue. This patch is called b8397cd45657b84e88bd1202528d1764265f185c. It is advisable to upgrade the affected component. |
2026-04-02 | |
| CVE-2026-5339 | 5.1 | MEDIUM | CWE-74 | 0.1% p34 | 3.57 | A vulnerability was detected in Tenda G103 1.0.0.5. The impacted element is the ...A vulnerability was detected in Tenda G103 1.0.0.5. The impacted element is the function action_set_net_settings of the file gpon.lua of the component Setting Handler. Performing a manipulation of the argument authLoid/authLoidPassword/authPassword/authSerialNo/authType/oltType/usVlanId/usVlanPriority results in command injection. It is possible to initiate the attack remotely. The exploit is now public and may be used. |
2026-04-02 | |
| CVE-2026-35002 | 9.3 | CRITICAL | CWE-95 | 0.6% p69 | 6.53 | Agno versions prior to 2.3.24 contain an arbitrary code execution vulnerability ...Agno versions prior to 2.3.24 contain an arbitrary code execution vulnerability in the model execution component that allows attackers to execute arbitrary Python code by manipulating the field_type parameter passed to eval(). Attackers can influence the field_type value in a FunctionCall to achieve remote code execution. |
2026-04-02 | |
| CVE-2026-34974 | 5.4 | MEDIUM | CWE-79 | 0.0% p8 | 3.78 | phpMyFAQ is an open source FAQ web application. Prior to version 4.1.1, the rege...phpMyFAQ is an open source FAQ web application. Prior to version 4.1.1, the regex-based SVG sanitizer in phpMyFAQ (SvgSanitizer.php) can be bypassed using HTML entity encoding in javascript: URLs within SVG <a href> attributes. Any user with edit_faq permission can upload a malicious SVG that executes arbitrary JavaScript when viewed, enabling privilege escalation from editor to full admin takeover. This issue has been patched in version 4.1.1. |
2026-04-02 | |
| CVE-2026-34973 | 6.9 | MEDIUM | CWE-943 | 0.1% p22 | 4.83 | phpMyFAQ is an open source FAQ web application. Prior to version 4.1.1, the sear...phpMyFAQ is an open source FAQ web application. Prior to version 4.1.1, the searchCustomPages() method in phpmyfaq/src/phpMyFAQ/Search.php uses real_escape_string() (via escape()) to sanitize the search term before embedding it in LIKE clauses. However, real_escape_string() does not escape SQL LIKE metacharacters % (match any sequence) and _ (match any single character). An unauthenticated attacker can inject these wildcards into search queries, causing them to match unintended records — including content that was not meant to be surfaced — resulting in information disclosure. This issue has been patched in version 4.1.1. |
2026-04-02 | |
| CVE-2026-34823 | 5.1 | MEDIUM | CWE-79 | 0.0% p8 | 3.57 | Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS)...Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS) via the remark parameter to /manage/password/web/. An authenticated attacker can inject arbitrary JavaScript that is stored and executed when other users view the affected page. |
2026-04-02 | |
| CVE-2026-34822 | 5.1 | MEDIUM | CWE-79 | 0.0% p4 | 3.57 | Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS)...Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS) via the new_cert_name parameter to /manage/ca/certificate/. An authenticated attacker can inject arbitrary JavaScript that is stored and executed when other users view the affected page. |
2026-04-02 | |
| CVE-2026-34821 | 5.1 | MEDIUM | CWE-79 | 0.0% p14 | 3.57 | Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS)...Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS) via the remark parameter to /manage/vpnauthentication/user/. An authenticated attacker can inject arbitrary JavaScript that is stored and executed when other users view the affected page. |
2026-04-02 | |
| CVE-2026-34820 | 5.1 | MEDIUM | CWE-79 | 0.0% p8 | 3.57 | Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS)...Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS) via the remark parameter to /manage/ipsec/. An authenticated attacker can inject arbitrary JavaScript that is stored and executed when other users view the affected page. |
2026-04-02 | |
| CVE-2026-34819 | 5.1 | MEDIUM | CWE-79 | 0.0% p1 | 3.57 | Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS)...Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS) via the REMARK parameter to /cgi-bin/openvpnclient.cgi. An authenticated attacker can inject arbitrary JavaScript that is stored and executed when other users view the affected page. |
2026-04-02 | |
| CVE-2026-34818 | 5.1 | MEDIUM | CWE-79 | 0.0% p8 | 3.57 | Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS)...Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS) via the remark parameter to /manage/dnsmasq/localdomains/. An authenticated attacker can inject arbitrary JavaScript that is stored and executed when other users view the affected page. |
2026-04-02 | |
| CVE-2026-34817 | 5.1 | MEDIUM | CWE-79 | 0.0% p8 | 3.57 | Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS)...Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS) via the ADDRESS BCC parameter to /cgi-bin/smtprouting.cgi. An authenticated attacker can inject arbitrary JavaScript that is stored and executed when other users view the affected page. |
2026-04-02 | |
| CVE-2026-34816 | 5.1 | MEDIUM | CWE-79 | 0.0% p8 | 3.57 | Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS)...Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS) via the domain parameter to /manage/smtpscan/domainrouting/. An authenticated attacker can inject arbitrary JavaScript that is stored and executed when other users view the affected page. |
2026-04-02 | |
| CVE-2026-34815 | 5.1 | MEDIUM | CWE-79 | 0.0% p8 | 3.57 | Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS)...Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS) via the DOMAIN parameter to /cgi-bin/smtpdomains.cgi. An authenticated attacker can inject arbitrary JavaScript that is stored and executed when other users view the affected page. |
2026-04-02 | |
| CVE-2026-34814 | 5.1 | MEDIUM | CWE-79 | 0.0% p8 | 3.57 | Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS)...Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS) via the group parameter to /cgi-bin/proxygroup.cgi. An authenticated attacker can inject arbitrary JavaScript that is stored and executed when other users view the affected page. |
2026-04-02 | |
| CVE-2026-34813 | 5.1 | MEDIUM | CWE-79 | 0.0% p8 | 3.57 | Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS)...Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS) via the user parameter to /cgi-bin/proxyuser.cgi. An authenticated attacker can inject arbitrary JavaScript that is stored and executed when other users view the affected page. |
2026-04-02 | |
| CVE-2026-34812 | 5.1 | MEDIUM | CWE-79 | 0.0% p8 | 3.57 | Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS)...Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS) via the mimetypes parameter to /cgi-bin/proxypolicy.cgi. An authenticated attacker can inject arbitrary JavaScript that is stored and executed when other users view the affected page. |
2026-04-02 | |
| CVE-2026-34811 | 5.1 | MEDIUM | CWE-79 | 0.0% p8 | 3.57 | Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS)...Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS) via the remark parameter to /cgi-bin/xtaccess.cgi. An authenticated attacker can inject arbitrary JavaScript that is stored and executed when other users view the affected page. |
2026-04-02 | |
| CVE-2026-34810 | 5.1 | MEDIUM | CWE-79 | 0.0% p8 | 3.57 | Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS)...Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS) via the remark parameter to /cgi-bin/vpnfw.cgi. An authenticated attacker can inject arbitrary JavaScript that is stored and executed when other users view the affected page. |
2026-04-02 | |
| CVE-2026-34809 | 5.1 | MEDIUM | CWE-79 | 0.0% p8 | 3.57 | Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS)...Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS) via the remark parameter to /cgi-bin/zonefw.cgi. An authenticated attacker can inject arbitrary JavaScript that is stored and executed when other users view the affected page. |
2026-04-02 | |
| CVE-2026-34808 | 5.1 | MEDIUM | CWE-79 | 0.0% p8 | 3.57 | Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS)...Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS) via the remark parameter to /cgi-bin/outgoingfw.cgi. An authenticated attacker can inject arbitrary JavaScript that is stored and executed when other users view the affected page. |
2026-04-02 | |
| CVE-2026-34807 | 5.1 | MEDIUM | CWE-79 | 0.0% p8 | 3.57 | Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS)...Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS) via the remark parameter to /cgi-bin/incoming.cgi. An authenticated attacker can inject arbitrary JavaScript that is stored and executed when other users view the affected page. |
2026-04-02 | |
| CVE-2026-34806 | 5.1 | MEDIUM | CWE-79 | 0.0% p8 | 3.57 | Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS)...Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS) via the remark parameter to /cgi-bin/snat.cgi. An authenticated attacker can inject arbitrary JavaScript that is stored and executed when other users view the affected page. |
2026-04-02 | |
| CVE-2026-34805 | 5.1 | MEDIUM | CWE-79 | 0.0% p8 | 3.57 | Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS)...Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS) via the remark parameter to /cgi-bin/dnat.cgi. An authenticated attacker can inject arbitrary JavaScript that is stored and executed when other users view the affected page. |
2026-04-02 | |
| CVE-2026-34804 | 5.1 | MEDIUM | CWE-79 | 0.0% p8 | 3.57 | Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS)...Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS) via the dscp parameter to /manage/qos/rules/. An authenticated attacker can inject arbitrary JavaScript that is stored and executed when other users view the affected page. |
2026-04-02 | |
| CVE-2026-34803 | 5.1 | MEDIUM | CWE-79 | 0.0% p8 | 3.57 | Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS)...Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS) via the name parameter to /manage/qos/classes/. An authenticated attacker can inject arbitrary JavaScript that is stored and executed when other users view the affected page. |
2026-04-02 | |
| CVE-2026-34802 | 5.1 | MEDIUM | CWE-79 | 0.0% p8 | 3.57 | Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS)...Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS) via the remark user ham spam parameter to /cgi-bin/salearn.cgi. An authenticated attacker can inject arbitrary JavaScript that is stored and executed when other users view the affected page. |
2026-04-02 | |
| CVE-2026-34801 | 5.1 | MEDIUM | CWE-79 | 0.0% p8 | 3.57 | Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS)...Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS) via the remark parameter to /manage/dhcp/fixed_leases/. An authenticated attacker can inject arbitrary JavaScript that is stored and executed when other users view the affected page. |
2026-04-02 | |
| CVE-2026-34800 | 5.1 | MEDIUM | CWE-79 | 0.0% p8 | 3.57 | Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS)...Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS) via the NAME parameter to /cgi-bin/uplinkeditor.cgi. An authenticated attacker can inject arbitrary JavaScript that is stored and executed when other users view the affected page. |
2026-04-02 | |
| CVE-2026-34799 | 5.1 | MEDIUM | CWE-79 | 0.0% p8 | 3.57 | Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS)...Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS) via the remark parameter to /manage/dnsmasq/hosts/. An authenticated attacker can inject arbitrary JavaScript that is stored and executed when other users view the affected page. |
2026-04-02 | |
| CVE-2026-34798 | 5.1 | MEDIUM | CWE-79 | 0.0% p8 | 3.57 | Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS)...Endian Firewall version 3.3.25 and prior allow stored cross-site scripting (XSS) via the remark parameter to /cgi-bin/routing.cgi. An authenticated attacker can inject arbitrary JavaScript that is stored and executed when other users view the affected page. |
2026-04-02 | |
| CVE-2026-34797 | 8.7 | HIGH | CWE-78 | 0.5% p65 | 6.10 | Endian Firewall version 3.3.25 and prior allow authenticated users to execute ar...Endian Firewall version 3.3.25 and prior allow authenticated users to execute arbitrary OS commands via the DATE parameter to /cgi-bin/logs_smtp.cgi. The DATE parameter value is used to construct a file path that is passed to a Perl open() call, which allows command injection due to an incomplete regular expression validation. |
2026-04-02 | |
| CVE-2026-34796 | 8.7 | HIGH | CWE-78 | 0.5% p65 | 6.10 | Endian Firewall version 3.3.25 and prior allow authenticated users to execute ar...Endian Firewall version 3.3.25 and prior allow authenticated users to execute arbitrary OS commands via the DATE parameter to /cgi-bin/logs_openvpn.cgi. The DATE parameter value is used to construct a file path that is passed to a Perl open() call, which allows command injection due to an incomplete regular expression validation. |
2026-04-02 | |
| CVE-2026-34795 | 8.7 | HIGH | CWE-78 | 0.5% p65 | 6.10 | Endian Firewall version 3.3.25 and prior allow authenticated users to execute ar...Endian Firewall version 3.3.25 and prior allow authenticated users to execute arbitrary OS commands via the DATE parameter to /cgi-bin/logs_log.cgi. The DATE parameter value is used to construct a file path that is passed to a Perl open() call, which allows command injection due to an incomplete regular expression validation. |
2026-04-02 | |
| CVE-2026-34794 | 8.7 | HIGH | CWE-78 | 0.5% p65 | 6.10 | Endian Firewall version 3.3.25 and prior allow authenticated users to execute ar...Endian Firewall version 3.3.25 and prior allow authenticated users to execute arbitrary OS commands via the DATE parameter to /cgi-bin/logs_ids.cgi. The DATE parameter value is used to construct a file path that is passed to a Perl open() call, which allows command injection due to an incomplete regular expression validation. |
2026-04-02 | |
| CVE-2026-34793 | 8.7 | HIGH | CWE-78 | 0.5% p65 | 6.10 | Endian Firewall version 3.3.25 and prior allow authenticated users to execute ar...Endian Firewall version 3.3.25 and prior allow authenticated users to execute arbitrary OS commands via the DATE parameter to /cgi-bin/logs_firewall.cgi. The DATE parameter value is used to construct a file path that is passed to a Perl open() call, which allows command injection due to an incomplete regular expression validation. |
2026-04-02 | |
| CVE-2026-34792 | 8.7 | HIGH | CWE-78 | 0.5% p65 | 6.10 | Endian Firewall version 3.3.25 and prior allow authenticated users to execute ar...Endian Firewall version 3.3.25 and prior allow authenticated users to execute arbitrary OS commands via the DATE parameter to /cgi-bin/logs_clamav.cgi. The DATE parameter value is used to construct a file path that is passed to a Perl open() call, which allows command injection due to an incomplete regular expression validation. |
2026-04-02 | |
| CVE-2026-34791 | 8.7 | HIGH | CWE-78 | 0.5% p65 | 6.10 | Endian Firewall version 3.3.25 and prior allow authenticated users to execute ar...Endian Firewall version 3.3.25 and prior allow authenticated users to execute arbitrary OS commands via the DATE parameter to /cgi-bin/logs_proxy.cgi. The DATE parameter value is used to construct a file path that is passed to a Perl open() call, which allows command injection due to an incomplete regular expression validation. |
2026-04-02 | |
| CVE-2026-34790 | 7.1 | HIGH | CWE-22 | 0.2% p36 | 4.97 | Endian Firewall version 3.3.25 and prior allow authenticated users to delete arb...Endian Firewall version 3.3.25 and prior allow authenticated users to delete arbitrary files via directory traversal in the remove ARCHIVE parameter to /cgi-bin/backup.cgi. The remove ARCHIVE parameter value is used to construct a file path without sanitization of directory traversal sequences, which is then passed to an unlink() call. |
2026-04-02 | |
| CVE-2026-34729 | 6.1 | MEDIUM | CWE-79 | 0.0% p8 | 4.27 | phpMyFAQ is an open source FAQ web application. Prior to version 4.1.1, there is...phpMyFAQ is an open source FAQ web application. Prior to version 4.1.1, there is a stored XSS vulnerability via Regex Bypass in Filter::removeAttributes(). This issue has been patched in version 4.1.1. |
2026-04-02 | |
| CVE-2026-34728 | 8.7 | HIGH | CWE-22 | 0.2% p38 | 6.10 | phpMyFAQ is an open source FAQ web application. Prior to version 4.1.1, the Medi...phpMyFAQ is an open source FAQ web application. Prior to version 4.1.1, the MediaBrowserController::index() method handles file deletion for the media browser. When the fileRemove action is triggered, the user-supplied name parameter is concatenated with the base upload directory path without any path traversal validation. The FILTER_SANITIZE_SPECIAL_CHARS filter only encodes HTML special characters (&, ', ", <, >) and characters with ASCII value < 32, and does not prevent directory traversal sequences like ../. Additionally, the endpoint does not validate CSRF tokens, making it exploitable via CSRF attacks. This issue has been patched in version 4.1.1. |
2026-04-02 | |
| CVE-2026-33641 | 7.8 | HIGH | CWE-78 | 0.0% p5 | 5.46 | Glances is an open-source system cross-platform monitoring tool. Prior to versio...Glances is an open-source system cross-platform monitoring tool. Prior to version 4.5.3, Glances supports dynamic configuration values in which substrings enclosed in backticks are executed as system commands during configuration parsing. This behavior occurs in Config.get_value() and is implemented without validation or restriction of the executed commands. If an attacker can modify or influence configuration files, arbitrary commands will execute automatically with the privileges of the Glances process during startup or configuration reload. In deployments where Glances runs with elevated privileges (e.g., as a system service), this may lead to privilege escalation. This issue has been patched in version 4.5.3. |
2026-04-02 | |
| CVE-2026-33544 | 7.7 | HIGH | CWE-362 | 0.0% p14 | 5.39 | Tinyauth is an authentication and authorization server. Prior to version 5.0.5, ...Tinyauth is an authentication and authorization server. Prior to version 5.0.5, all three OAuth service implementations (GenericOAuthService, GithubOAuthService, GoogleOAuthService) store PKCE verifiers and access tokens as mutable struct fields on singleton instances shared across all concurrent requests. When two users initiate OAuth login for the same provider concurrently, a race condition between VerifyCode() and Userinfo() causes one user to receive a session with the other user's identity. This issue has been patched in version 5.0.5. |
2026-04-02 | |
| CVE-2026-33533 | 7.1 | HIGH | CWE-942 | 0.0% p9 | 4.97 | Glances is an open-source system cross-platform monitoring tool. Prior to versio...Glances is an open-source system cross-platform monitoring tool. Prior to version 4.5.3, the Glances XML-RPC server (activated with glances -s or glances --server) sends Access-Control-Allow-Origin: * on every HTTP response. Because the XML-RPC handler does not validate the Content-Type header, an attacker-controlled webpage can issue a CORS "simple request" (POST with Content-Type: text/plain) containing a valid XML-RPC payload. The browser sends the request without a preflight check, the server processes the XML body and returns the full system monitoring dataset, and the wildcard CORS header lets the attacker's JavaScript read the response. The result is complete exfiltration of hostname, OS version, IP addresses, CPU/memory/disk/network stats, and the full process list including command lines (which often contain tokens, passwords, or internal paths). This issue has been patched in version 4.5.3. |
2026-04-02 | |
| CVE-2026-32871 | 10.0 | CRITICAL | CWE-918 | 0.2% p36 | 7.00 | FastMCP is a Pythonic way to build MCP servers and clients. Prior to version 3.2...FastMCP is a Pythonic way to build MCP servers and clients. Prior to version 3.2.0, the OpenAPIProvider in FastMCP exposes internal APIs to MCP clients by parsing OpenAPI specifications. The RequestDirector class is responsible for constructing HTTP requests to the backend service. A vulnerability exists in the _build_url() method. When an OpenAPI operation defines path parameters (e.g., /api/v1/users/{user_id}), the system directly substitutes parameter values into the URL template string without URL-encoding. Subsequently, urllib.parse.urljoin() resolves the final URL. Since urljoin() interprets ../ sequences as directory traversal, an attacker controlling a path parameter can perform path traversal attacks to escape the intended API prefix and access arbitrary backend endpoints. This results in authenticated SSRF, as requests are sent with the authorization headers configured in the MCP provider. This issue has been patched in version 3.2.0. |
2026-04-02 | |
| CVE-2026-32629 | 5.4 | MEDIUM | CWE-20 | 0.2% p43 | 3.79 | phpMyFAQ is an open source FAQ web application. Prior to version 4.1.1, an unaut...phpMyFAQ is an open source FAQ web application. Prior to version 4.1.1, an unauthenticated attacker can submit a guest FAQ with an email address that is syntactically valid per RFC 5321 (quoted local part) yet contains raw HTML — for example "<script>alert(1)</script>"@evil.com. PHP's FILTER_VALIDATE_EMAIL accepts this email as valid. The email is stored in the database without HTML sanitization and later rendered in the admin FAQ editor template using Twig's |raw filter, which bypasses auto-escaping entirely. This issue has been patched in version 4.1.1. |
2026-04-02 | |
| CVE-2026-31937 | 7.5 | HIGH | CWE-407 | 0.1% p16 | 5.25 | Suricata is a network IDS, IPS and NSM engine. Prior to version 7.0.15, ineffici...Suricata is a network IDS, IPS and NSM engine. Prior to version 7.0.15, inefficiency in DCERPC buffering can lead to a performance degradation. This issue has been patched in version 7.0.15. |
2026-04-02 | |
| CVE-2026-31935 | 7.5 | HIGH | CWE-400 | 0.1% p16 | 5.25 | Suricata is a network IDS, IPS and NSM engine. Prior to versions 7.0.15 and 8.0....Suricata is a network IDS, IPS and NSM engine. Prior to versions 7.0.15 and 8.0.4, flooding of craft HTTP2 continuation frames can lead to memory exhaustion, usually resulting in the Suricata process being shut down by the operating system. This issue has been patched in versions 7.0.15 and 8.0.4. |
2026-04-02 | |
| CVE-2026-31934 | 7.5 | HIGH | CWE-407 | 0.1% p16 | 5.25 | Suricata is a network IDS, IPS and NSM engine. From version 8.0.0 to before vers...Suricata is a network IDS, IPS and NSM engine. From version 8.0.0 to before version 8.0.4, there is a quadratic complexity issue when searching for URLs in mime encoded messages over SMTP leading to a performance impact. This issue has been patched in version 8.0.4. |
2026-04-02 | |
| CVE-2026-5338 | 5.1 | MEDIUM | CWE-74 | 0.4% p58 | 3.58 | A security vulnerability has been detected in Tenda G103 1.0.0.5. The affected e...A security vulnerability has been detected in Tenda G103 1.0.0.5. The affected element is the function action_set_system_settings of the file system.lua of the component Setting Handler. Such manipulation of the argument lanIp leads to command injection. The attack may be performed from remote. The exploit has been disclosed publicly and may be used. |
2026-04-02 | |
| CVE-2026-5334 | 6.9 | MEDIUM | CWE-74 | 0.0% p8 | 4.83 | A weakness has been identified in itsourcecode Online Enrollment System 1.0. Imp...A weakness has been identified in itsourcecode Online Enrollment System 1.0. Impacted is an unknown function of the file /enrollment/index.php?view=edit&id=3 of the component Parameter Handler. This manipulation of the argument deptid causes sql injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be used for attacks. |
2026-04-02 | |
| CVE-2026-5333 | 6.9 | MEDIUM | CWE-74 | 0.3% p49 | 4.84 | A security flaw has been discovered in DefaultFuction Content-Management-System ...A security flaw has been discovered in DefaultFuction Content-Management-System 1.0. This issue affects some unknown processing of the file /admin/tools.php. The manipulation of the argument host results in command injection. The attack can be executed remotely. The exploit has been released to the public and may be used for attacks. |
2026-04-02 | |
| CVE-2026-5332 | 5.1 | MEDIUM | CWE-79 | 0.0% p7 | 3.57 | A vulnerability was identified in Xiaopi Panel 1.0.0. This vulnerability affects...A vulnerability was identified in Xiaopi Panel 1.0.0. This vulnerability affects unknown code of the file /demo.php of the component WAF Firewall. The manipulation of the argument param leads to cross site scripting. Remote exploitation of the attack is possible. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-04-02 | |
| CVE-2026-3692 | 8.7 | HIGH | CWE-78 | 0.2% p37 | 6.09 | In Progress Flowmon versions prior to 12.5.8, a vulnerability exists whereby an ...In Progress Flowmon versions prior to 12.5.8, a vulnerability exists whereby an authenticated low-privileged user may craft a request during the report generation process that results in unintended commands being executed on the server. |
2026-04-02 | |
| CVE-2026-35168 | 8.8 | HIGH | CWE-89 | 0.1% p23 | 6.16 | OpenSTAManager is an open source management software for technical assistance an...OpenSTAManager is an open source management software for technical assistance and invoicing. Prior to version 2.10.2, the Aggiornamenti (Updates) module in OpenSTAManager contains a database conflict resolution feature (op=risolvi-conflitti-database) that accepts a JSON array of SQL statements via POST and executes them directly against the database without any validation, allowlist, or sanitization. An authenticated attacker with access to the Aggiornamenti module can execute arbitrary SQL statements including CREATE, DROP, ALTER, INSERT, UPDATE, DELETE, SELECT INTO OUTFILE, and any other SQL command supported by the MySQL server. Foreign key checks are explicitly disabled before execution (SET FOREIGN_KEY_CHECKS=0), further reducing database integrity protections. This issue has been patched in version 2.10.2. |
2026-04-02 | |
| CVE-2026-31933 | 7.5 | HIGH | CWE-407 | 0.1% p16 | 5.25 | Suricata is a network IDS, IPS and NSM engine. Prior to versions 7.0.15 and 8.0....Suricata is a network IDS, IPS and NSM engine. Prior to versions 7.0.15 and 8.0.4, specially crafted traffic can cause Suricata to slow down, affecting performance in IDS mode. This issue has been patched in versions 7.0.15 and 8.0.4. |
2026-04-02 | |
| CVE-2026-31932 | 7.5 | HIGH | CWE-407 | 0.1% p16 | 5.25 | Suricata is a network IDS, IPS and NSM engine. Prior to versions 7.0.15 and 8.0....Suricata is a network IDS, IPS and NSM engine. Prior to versions 7.0.15 and 8.0.4, inefficiency in KRB5 buffering can lead to performance degradation. This issue has been patched in versions 7.0.15 and 8.0.4. |
2026-04-02 | |
| CVE-2026-31931 | 7.5 | HIGH | CWE-476 | 0.1% p18 | 5.25 | Suricata is a network IDS, IPS and NSM engine. From version 8.0.0 to before vers...Suricata is a network IDS, IPS and NSM engine. From version 8.0.0 to before version 8.0.4, use of the "tls.alpn" rule keyword can cause Suricata to crash with a NULL dereference. This issue has been patched in version 8.0.4. |
2026-04-02 | |
| CVE-2026-30867 | 5.7 | MEDIUM | CWE-617 | 0.0% p13 | 3.99 | CocoaMQTT is a MQTT 5.0 client library for iOS and macOS written in Swift. Prior...CocoaMQTT is a MQTT 5.0 client library for iOS and macOS written in Swift. Prior to version 2.2.2, a vulnerability exists in the packet parsing logic of CocoaMQTT that allows an attacker (or a compromised/malicious MQTT broker) to remotely crash the host iOS/macOS/tvOS application. If an attacker publishes the 4-byte malformed payload to a shared topic with the RETAIN flag set to true, the MQTT broker will persist the payload. Any time a vulnerable client connects and subscribes to that topic, the broker will automatically push the malformed packet. The app will instantly crash in the background before the user can even interact with it. This effectively "bricks" the mobile application (a persistent DoS) until the retained message is manually wiped from the broker database. This issue has been patched in version 2.2.2. |
2026-04-02 | |
| CVE-2026-2737 | 8.5 | HIGH | CWE-79 | 0.1% p16 | 5.95 | A vulnerability exists in Progress Flowmon versions prior to 12.5.8 and 13.0.6, ...A vulnerability exists in Progress Flowmon versions prior to 12.5.8 and 13.0.6, whereby an administrator who clicks a malicious link provided by an attacker may inadvertently trigger unintended actions within their authenticated web session. |
2026-04-02 | |
| CVE-2026-2701 | 9.1 | CRITICAL | CWE-78 | 0.3% p49 | 6.38 | Authenticated user can upload a malicious file to the server and execute it, whi...Authenticated user can upload a malicious file to the server and execute it, which leads to remote code execution. |
2026-04-02 | |
| CVE-2026-2699 | 9.8 | CRITICAL | CWE-284 | 9.9% p93 | 7.16 | Customer Managed ShareFile Storage Zones Controller (SZC) allows an unauthentica...Customer Managed ShareFile Storage Zones Controller (SZC) allows an unauthenticated attacker to access restricted configuration pages. This leads to changing system configuration and potential remote code execution. |
2026-04-02 | |
| CVE-2026-29782 | 7.2 | HIGH | CWE-502 | 0.1% p29 | 5.04 | OpenSTAManager is an open source management software for technical assistance an...OpenSTAManager is an open source management software for technical assistance and invoicing. Prior to version 2.10.2, the oauth2.php file in OpenSTAManager is an unauthenticated endpoint ($skip_permissions = true). It loads a record from the zz_oauth2 table using the attacker-controlled GET parameter state, and during the OAuth2 configuration flow calls unserialize() on the access_token field without any class restriction. This issue has been patched in version 2.10.2. |
2026-04-02 | |
| CVE-2026-28805 | 8.8 | HIGH | CWE-89 | 0.0% p10 | 6.16 | OpenSTAManager is an open source management software for technical assistance an...OpenSTAManager is an open source management software for technical assistance and invoicing. Prior to version 2.10.2, multiple AJAX select handlers in OpenSTAManager are vulnerable to Time-Based Blind SQL Injection through the options[stato] GET parameter. The user-supplied value is read from $superselect['stato'] and concatenated directly into SQL WHERE clauses as a bare expression, without any sanitization, parameterization, or allowlist validation. An authenticated attacker can inject arbitrary SQL statements to extract sensitive data from the database, including usernames, password hashes, financial records, and any other information stored in the MySQL database. This issue has been patched in version 2.10.2. |
2026-04-02 | |
| CVE-2026-5331 | 5.1 | MEDIUM | CWE-22 | 0.1% p28 | 3.57 | A vulnerability was determined in OpenCart 4.1.0.3. This affects an unknown part...A vulnerability was determined in OpenCart 4.1.0.3. This affects an unknown part of the file installer.php of the component Extension Installer Page. Executing a manipulation can lead to path traversal. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-04-02 | |
| CVE-2026-5330 | 6.9 | MEDIUM | CWE-266 | 0.1% p15 | 4.83 | A vulnerability was found in SourceCodester/mayuri_k Best Courier Management Sys...A vulnerability was found in SourceCodester/mayuri_k Best Courier Management System 1.0. Affected by this issue is some unknown functionality of the file /ajax.php?action=delete_user of the component User Delete Handler. Performing a manipulation of the argument ID results in improper access controls. The attack may be initiated remotely. The exploit has been made public and could be used. |
2026-04-02 | |
| CVE-2026-5328 | 5.3 | MEDIUM | CWE-74 | 0.0% p10 | 3.71 | A weakness has been identified in shsuishang modulithshop up to 829bac71f507e846...A weakness has been identified in shsuishang modulithshop up to 829bac71f507e84684c782b9b062b8bf3b5585d6. The impacted element is the function listItem of the file src/main/java/com/suisung/shopsuite/pt/service/impl/ProductIndexServiceImpl.java of the component ProductItemDao Interface. Executing a manipulation of the argument sidx/sort can lead to sql injection. The attack may be performed from remote. The exploit has been made available to the public and could be used for attacks. This product utilizes a rolling release system for continuous delivery, and as such, version information for affected or updated releases is not disclosed. This patch is called 42bcb9463425d1be906c3b290cf29885eb5a2324. A patch should be applied to remediate this issue. |
2026-04-02 | |
| CVE-2026-4636 | 8.1 | HIGH | CWE-551 | 0.0% p7 | 5.67 | A flaw was found in Keycloak. An authenticated user with the uma_protection role...A flaw was found in Keycloak. An authenticated user with the uma_protection role can bypass User-Managed Access (UMA) policy validation. This allows the attacker to include resource identifiers owned by other users in a policy creation request, even if the URL path specifies an attacker-owned resource. Consequently, the attacker gains unauthorized permissions to victim-owned resources, enabling them to obtain a Requesting Party Token (RPT) and access sensitive information or perform unauthorized actions. |
2026-04-02 | |
| CVE-2026-4634 | 7.5 | HIGH | CWE-1050 | 0.1% p25 | 5.25 | A flaw was found in Keycloak. An unauthenticated attacker can exploit this vulne...A flaw was found in Keycloak. An unauthenticated attacker can exploit this vulnerability by sending a specially crafted POST request with an excessively long scope parameter to the OpenID Connect (OIDC) token endpoint. This leads to high resource consumption and prolonged processing times, ultimately resulting in a Denial of Service (DoS) for the Keycloak server. |
2026-04-02 | |
| CVE-2026-4325 | 5.3 | MEDIUM | CWE-653 | 0.0% p11 | 3.71 | A flaw was found in Keycloak. The SingleUseObjectProvider, a global key-value st...A flaw was found in Keycloak. The SingleUseObjectProvider, a global key-value store, lacks proper type and namespace isolation. This vulnerability allows an attacker to delete arbitrary single-use entries, which can enable the replay of consumed action tokens, such as password reset links. This could lead to unauthorized access or account compromise. |
2026-04-02 | |
| CVE-2026-4282 | 7.4 | HIGH | CWE-653 | 0.0% p13 | 5.18 | A flaw was found in Keycloak. The SingleUseObjectProvider, a global key-value st...A flaw was found in Keycloak. The SingleUseObjectProvider, a global key-value store, lacks proper type and namespace isolation. This vulnerability allows an unauthenticated attacker to forge authorization codes. Successful exploitation can lead to the creation of admin-capable access tokens, resulting in privilege escalation. |
2026-04-02 | |
| CVE-2026-3872 | 7.3 | HIGH | CWE-601 | 0.0% p9 | 5.11 | A flaw was found in Keycloak. This issue allows an attacker, who controls anothe...A flaw was found in Keycloak. This issue allows an attacker, who controls another path on the same web server, to bypass the allowed path in redirect Uniform Resource Identifiers (URIs) that use a wildcard. A successful attack may lead to the theft of an access token, resulting in information disclosure. |
2026-04-02 | |
| CVE-2026-34890 | 6.5 | MEDIUM | CWE-79 | 0.0% p9 | 4.55 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Mark O’Donnell MSTW League Manager allows DOM-Based XSS.This issue affects MSTW League Manager: from n/a through 2.10. |
2026-04-02 | |
| CVE-2026-5327 | 5.3 | MEDIUM | CWE-74 | 1.2% p79 | 3.75 | A security flaw has been discovered in efforthye fast-filesystem-mcp up to 3.5.1...A security flaw has been discovered in efforthye fast-filesystem-mcp up to 3.5.1. The affected element is the function handleGetDiskUsage of the file src/index.ts. Performing a manipulation results in command injection. The attack is possible to be carried out remotely. The exploit has been released to the public and may be used for attacks. The project was informed of the problem early through an issue report but has not responded yet. |
2026-04-02 | |
| CVE-2026-5326 | 5.5 | MEDIUM | CWE-285 | 0.0% p12 | 3.85 | A vulnerability was identified in SourceCodester Leave Application System 1.0. I...A vulnerability was identified in SourceCodester Leave Application System 1.0. Impacted is an unknown function of the file /index.php?page=manage_user of the component User Information Handler. Such manipulation of the argument ID leads to authorization bypass. The attack can be executed remotely. The exploit is publicly available and might be used. |
2026-04-02 | |
| CVE-2026-5246 | 6.3 | MEDIUM | CWE-285 | 0.1% p18 | 4.41 | A vulnerability was determined in Cesanta Mongoose up to 7.20. Affected is the f...A vulnerability was determined in Cesanta Mongoose up to 7.20. Affected is the function mg_tls_verify_cert_signature of the file mongoose.c of the component P-384 Public Key Handler. Executing a manipulation can lead to authorization bypass. The attack can be executed remotely. Attacks of this nature are highly complex. The exploitability is told to be difficult. The exploit has been publicly disclosed and may be utilized. Upgrading to version 7.21 is able to address this issue. This patch is called 0d882f1b43ff2308b7486a56a9d60cd6dba8a3f1. The affected component should be upgraded. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product. |
2026-04-02 | |
| CVE-2026-5245 | 6.3 | MEDIUM | CWE-119 | 0.1% p22 | 4.41 | A vulnerability was found in Cesanta Mongoose up to 7.20. This impacts the funct...A vulnerability was found in Cesanta Mongoose up to 7.20. This impacts the function handle_mdns_record of the file mongoose.c of the component mDNS Record Handler. Performing a manipulation of the argument buf results in stack-based buffer overflow. Remote exploitation of the attack is possible. A high degree of complexity is needed for the attack. The exploitability is said to be difficult. The exploit has been made public and could be used. Upgrading to version 7.21 will fix this issue. The patch is named 0d882f1b43ff2308b7486a56a9d60cd6dba8a3f1. You should upgrade the affected component. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product. |
2026-04-02 | |
| CVE-2026-33617 | 5.3 | MEDIUM | CWE-497 | 0.0% p11 | 3.71 | An unauthenticated remote attacker can access a configuration file containing da...An unauthenticated remote attacker can access a configuration file containing database credentials. This can result in a some loss of confidentiality, but there is no endpoint exposed to use these credentials. |
2026-04-02 | |
| CVE-2026-33616 | 7.5 | HIGH | CWE-89 | 0.1% p19 | 5.25 | An unauthenticated remote attacker can exploit an unauthenticated blind SQL Inje...An unauthenticated remote attacker can exploit an unauthenticated blind SQL Injection vulnerability in the mb24api endpoint due to improper neutralization of special elements in a SQL SELECT command. This can result in a total loss of confidentiality. |
2026-04-02 | |
| CVE-2026-33615 | 9.1 | CRITICAL | CWE-89 | 0.1% p27 | 6.37 | An unauthenticated remote attacker can exploit an unauthenticated SQL Injection ...An unauthenticated remote attacker can exploit an unauthenticated SQL Injection vulnerability in the setinfo endpoint due to improper neutralization of special elements in a SQL UPDATE command. This can result in a total loss of integrity and availability. |
2026-04-02 | |
| CVE-2026-33614 | 7.5 | HIGH | CWE-89 | 0.1% p19 | 5.25 | An unauthenticated remote attacker can exploit an unauthenticated SQL Injection ...An unauthenticated remote attacker can exploit an unauthenticated SQL Injection vulnerability in the getinfo endpoint due to improper neutralization of special elements in a SQL SELECT command. This can result in a total loss of confidentiality. |
2026-04-02 | |
| CVE-2026-29144 | 7.8 | HIGH | CWE-20 | 0.1% p27 | 5.46 | SEPPmail Secure Email Gateway before version 15.0.3 allows an attacker to bypass...SEPPmail Secure Email Gateway before version 15.0.3 allows an attacker to bypass subject sanitization and forge security tags using Unicode lookalike characters. |
2026-04-02 | |
| CVE-2026-29143 | 7.8 | HIGH | CWE-20 | 0.1% p27 | 5.46 | SEPPmail Secure Email Gateway before version 15.0.3 does not properly authentica...SEPPmail Secure Email Gateway before version 15.0.3 does not properly authenticate the inner message of S/MIME-encrypted MIME entities, allowing an attacker to control trusted headers. |
2026-04-02 | |
| CVE-2026-29142 | 6.3 | MEDIUM | CWE-325 | 0.0% p6 | 4.41 | SEPPmail Secure Email Gateway before version 15.0.3 allows an attacker to forge ...SEPPmail Secure Email Gateway before version 15.0.3 allows an attacker to forge a GINA-encrypted email. |
2026-04-02 | |
| CVE-2026-29141 | 7.7 | HIGH | CWE-20 | 0.1% p27 | 5.39 | SEPPmail Secure Email Gateway before version 15.0.3 allows an attacker to bypass...SEPPmail Secure Email Gateway before version 15.0.3 allows an attacker to bypass subject sanitization and forge tags such as [signed OK]. |
2026-04-02 | |
| CVE-2026-29140 | 7.7 | HIGH | CWE-295 | 0.0% p8 | 5.39 | SEPPmail Secure Email Gateway before version 15.0.3 allows an attacker to cause ...SEPPmail Secure Email Gateway before version 15.0.3 allows an attacker to cause attacker-controlled certificates to be used for future encryption to a victim by adding the certificates to S/MIME signatures. |
2026-04-02 | |
| CVE-2026-29139 | 7.8 | HIGH | CWE-288 | 0.1% p16 | 5.46 | SEPPmail Secure Email Gateway before version 15.0.3 allows account takeover by a...SEPPmail Secure Email Gateway before version 15.0.3 allows account takeover by abusing GINA account initialization to reset a victim account password. |
2026-04-02 | |
| CVE-2026-29138 | 6.3 | MEDIUM | CWE-90 | 0.1% p19 | 4.41 | SEPPmail Secure Email Gateway before version 15.0.3 allows attackers with a spec...SEPPmail Secure Email Gateway before version 15.0.3 allows attackers with a specially crafted email address to claim another user's PGP signature as their own. |
2026-04-02 | |
| CVE-2026-29137 | 5.3 | MEDIUM | CWE-20 | 0.1% p28 | 3.71 | SEPPmail Secure Email Gateway before version 15.0.3 allows an attacker to hide s...SEPPmail Secure Email Gateway before version 15.0.3 allows an attacker to hide security tags from users by crafting a long subject. |
2026-04-02 | |
| CVE-2026-29136 | 5.3 | MEDIUM | CWE-79 | 0.0% p10 | 3.71 | SEPPmail Secure Email Gateway before version 15.0.3 allows an attacker to inject...SEPPmail Secure Email Gateway before version 15.0.3 allows an attacker to inject HTML into notification emails about new CA certificates. |
2026-04-02 | |
| CVE-2026-29135 | 5.3 | MEDIUM | CWE-20 | 0.1% p28 | 3.71 | SEPPmail Secure Email Gateway before version 15.0.3 allows an attacker to craft ...SEPPmail Secure Email Gateway before version 15.0.3 allows an attacker to craft a password-tag that bypasses subject sanitization. |
2026-04-02 | |
| CVE-2026-29134 | 5.3 | MEDIUM | CWE-807 | 0.1% p24 | 3.71 | SEPPmail Secure Email Gateway before version 15.0.3 allows an external user to m...SEPPmail Secure Email Gateway before version 15.0.3 allows an external user to modify GINA webdomain metadata and bypass per-domain restrictions. |
2026-04-02 | |
| CVE-2026-29133 | 5.3 | MEDIUM | CWE-20 | 0.1% p26 | 3.71 | SEPPmail Secure Email Gateway before version 15.0.3 allows an attacker to upload...SEPPmail Secure Email Gateway before version 15.0.3 allows an attacker to upload PGP keys with UIDs that do not match their email address. |
2026-04-02 | |
| CVE-2026-29132 | 6.3 | MEDIUM | CWE-306 | 0.1% p16 | 4.41 | SEPPmail Secure Email Gateway before version 15.0.3 allows an attacker with acce...SEPPmail Secure Email Gateway before version 15.0.3 allows an attacker with access to a victim's GINA account to bypass a second-password check and read protected emails. |
2026-04-02 | |
| CVE-2026-29131 | 4.9 | MEDIUM | CWE-90 | 0.1% p16 | 3.43 | SEPPmail Secure Email Gateway before version 15.0.3 allows attackers with a spec...SEPPmail Secure Email Gateway before version 15.0.3 allows attackers with a specially crafted email address to read the contents of emails encrypted for other users. |
2026-04-02 | |
| CVE-2026-0634 | 7.8 | HIGH | CWE-88 | 0.1% p16 | 5.46 | Code execution in AssistFeedbackService of TECNO Pova7 Pro 5G on Android allows ...Code execution in AssistFeedbackService of TECNO Pova7 Pro 5G on Android allows local apps to execute arbitrary code as system via command injection. |
2026-04-02 | |
| CVE-2026-5244 | 6.9 | MEDIUM | CWE-119 | 0.1% p22 | 4.83 | A vulnerability has been found in Cesanta Mongoose up to 7.20. This affects the ...A vulnerability has been found in Cesanta Mongoose up to 7.20. This affects the function mg_tls_recv_cert of the file mongoose.c of the component TLS 1.3 Handler. Such manipulation of the argument pubkey leads to heap-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 7.21 mitigates this issue. The name of the patch is 0d882f1b43ff2308b7486a56a9d60cd6dba8a3f1. It is advisable to upgrade the affected component. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product. |
2026-04-02 | |
| CVE-2026-5032 | 7.5 | HIGH | CWE-200 | 0.1% p18 | 5.25 | The W3 Total Cache plugin for WordPress is vulnerable to information exposure in...The W3 Total Cache plugin for WordPress is vulnerable to information exposure in all versions up to, and including, 2.9.3. This is due to the plugin bypassing its entire output buffering and processing pipeline when the request's User-Agent header contains "W3 Total Cache", which causes raw mfunc/mclude dynamic fragment HTML comments — including the W3TC_DYNAMIC_SECURITY security token — to be rendered in the page source. This makes it possible for unauthenticated attackers to discover the value of the W3TC_DYNAMIC_SECURITY constant by sending a crafted User-Agent header to any page that contains developer-placed dynamic fragment tags, granted the site has the fragment caching feature enabled. With the leaked W3TC_DYNAMIC_SECURITY token, an attacker can craft valid mfunc tags to execute arbitrary PHP code on the server, achieving remote code execution. |
2026-04-02 | |
| CVE-2026-0688 | 6.4 | MEDIUM | CWE-918 | 0.0% p8 | 4.48 | The Webmention plugin for WordPress is vulnerable to Server-Side Request Forgery...The Webmention plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 5.6.2 via the 'Tools::read' function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services. |
2026-04-02 | |
| CVE-2026-0686 | 7.2 | HIGH | CWE-918 | 0.1% p16 | 5.04 | The Webmention plugin for WordPress is vulnerable to Server-Side Request Forgery...The Webmention plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 5.6.2 in the 'MF2::parse_authorpage' function via the 'Receiver::post' function. This makes it possible for unauthenticated attackers to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services. |
2026-04-02 | |
| CVE-2026-5325 | 5.1 | MEDIUM | CWE-79 | 0.0% p8 | 3.57 | A vulnerability was determined in SourceCodester Simple Customer Relationship Ma...A vulnerability was determined in SourceCodester Simple Customer Relationship Management System 1.0. This issue affects some unknown processing of the file /create-ticket.php of the component Create Ticket. This manipulation of the argument Description causes cross site scripting. Remote exploitation of the attack is possible. The exploit has been publicly disclosed and may be utilized. |
2026-04-02 | |
| CVE-2026-5323 | 4.8 | MEDIUM | CWE-918 | 0.0% p2 | 3.36 | A vulnerability was found in priyankark a11y-mcp up to 1.0.5. This vulnerability...A vulnerability was found in priyankark a11y-mcp up to 1.0.5. This vulnerability affects the function A11yServer of the file src/index.js. The manipulation results in server-side request forgery. The attack must be initiated from a local position. The exploit has been made public and could be used. This product operates on a rolling release basis, ensuring continuous delivery. Consequently, there are no version details for either affected or updated releases. Upgrading to version 1.0.6 is able to resolve this issue. The patch is identified as e3e11c9e8482bd06b82fd9fced67be4856f0dffc. It is recommended to upgrade the affected component. The vendor acknowledged the issue but provides additional context for the CVSS rating: "a11y-mcp is a local stdio MCP server - it has no HTTP endpoint and is not network-accessible. The caller is always the local user or an LLM acting on their behalf with user approval." |
2026-04-02 | |
| CVE-2026-5322 | 6.9 | MEDIUM | CWE-74 | 0.0% p10 | 4.83 | A vulnerability has been found in AlejandroArciniegas mcp-data-vis bc597e391f184...A vulnerability has been found in AlejandroArciniegas mcp-data-vis bc597e391f184d2187062fd567599a3cb72adf51/de5a51525a69822290eaee569a1ab447b490746d. This affects the function Request of the file src/servers/database/server.js of the component MCP Handler. The manipulation leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This product uses a rolling release model to deliver continuous updates. As a result, specific version information for affected or updated releases is not available. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-04-02 | |
| CVE-2026-4347 | 8.1 | HIGH | CWE-22 | 0.1% p25 | 5.67 | The MW WP Form plugin for WordPress is vulnerable to arbitrary file moving due t...The MW WP Form plugin for WordPress is vulnerable to arbitrary file moving due to insufficient file path validation via the 'generate_user_filepath' function and the 'move_temp_file_to_upload_dir' function in all versions up to, and including, 5.1.0. This makes it possible for unauthenticated attackers to move arbitrary files on the server, which can easily lead to remote code execution when the right file is moved (such as wp-config.php). The vulnerability is only exploitable if a file upload field is added to the form and the “Saving inquiry data in database” option is enabled. |
2026-04-02 | |
| CVE-2026-1540 | 7.2 | HIGH | CWE-94 | 0.1% p28 | 5.04 | The Spam Protect for Contact Form 7 WordPress plugin before 1.2.10 allows loggin...The Spam Protect for Contact Form 7 WordPress plugin before 1.2.10 allows logging to a PHP file, which could allow an attacker with editor access to achieve Remote Code Execution by using a crafted header |
2026-04-02 | |
| CVE-2026-5321 | 5.3 | MEDIUM | CWE-346 | 0.0% p0 | 3.71 | A flaw has been found in vanna-ai vanna up to 2.0.2. Affected by this issue is s...A flaw has been found in vanna-ai vanna up to 2.0.2. Affected by this issue is some unknown functionality of the component FastAPI/Flask Server. Executing a manipulation can lead to permissive cross-domain policy with untrusted domains. The attack can be launched remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-04-02 | |
| CVE-2026-5320 | 6.9 | MEDIUM | CWE-287 | 0.1% p26 | 4.83 | A vulnerability was detected in vanna-ai vanna up to 2.0.2. Affected by this vul...A vulnerability was detected in vanna-ai vanna up to 2.0.2. Affected by this vulnerability is an unknown functionality of the file /api/vanna/v2/ of the component Chat API Endpoint. Performing a manipulation results in missing authentication. The attack can be initiated remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-04-02 | |
| CVE-2026-5319 | 5.3 | MEDIUM | CWE-79 | 0.0% p1 | 3.71 | A security vulnerability has been detected in itsourcecode Payroll Management Sy...A security vulnerability has been detected in itsourcecode Payroll Management System up to 1.0. Affected is an unknown function of the file /navbar.php. Such manipulation of the argument page leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used. |
2026-04-02 | |
| CVE-2026-5318 | 5.3 | MEDIUM | CWE-119 | 0.0% p7 | 3.71 | A weakness has been identified in LibRaw up to 0.22.0. This impacts the function...A weakness has been identified in LibRaw up to 0.22.0. This impacts the function HuffTable::initval of the file src/decompressors/losslessjpeg.cpp of the component JPEG DHT Parser. This manipulation of the argument bits[] causes out-of-bounds write. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be used for attacks. Upgrading to version 0.22.1 will fix this issue. Patch name: a6734e867b19d75367c05f872ac26322464e3995. It is advisable to upgrade the affected component. |
2026-04-02 | |
| CVE-2026-5317 | 5.3 | MEDIUM | CWE-119 | 0.0% p13 | 3.71 | A security flaw has been discovered in Nothings stb up to 1.22. This affects the...A security flaw has been discovered in Nothings stb up to 1.22. This affects the function start_decoder of the file stb_vorbis.c. The manipulation results in out-of-bounds write. The attack may be performed from remote. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-04-02 | |
| CVE-2026-1243 | 5.4 | MEDIUM | CWE-79 | 0.0% p7 | 3.78 | IBM Content Navigator 3.0.15, 3.1.0, and 3.2.0 is vulnerable to cross-site scrip...IBM Content Navigator 3.0.15, 3.1.0, and 3.2.0 is vulnerable to cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. |
2026-04-02 | |
| CVE-2026-5316 | 5.3 | MEDIUM | CWE-400 | 0.0% p10 | 3.71 | A vulnerability was identified in Nothings stb up to 1.22. The impacted element ...A vulnerability was identified in Nothings stb up to 1.22. The impacted element is the function setup_free of the file stb_vorbis.c. The manipulation leads to allocation of resources. The attack is possible to be carried out remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-04-02 | |
| CVE-2026-5315 | 5.3 | MEDIUM | CWE-119 | 0.0% p10 | 3.71 | A vulnerability was determined in Nothings stb up to 1.26. The affected element ...A vulnerability was determined in Nothings stb up to 1.26. The affected element is the function stbtt__buf_get8 in the library stb_truetype.h of the component TTF File Handler. Executing a manipulation can lead to out-of-bounds read. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-04-02 | |
| CVE-2026-21767 | 4.0 | MEDIUM | CWE-306 | 0.0% p4 | 2.80 | HCL BigFix Platform is affected by insufficient authentication. The application...HCL BigFix Platform is affected by insufficient authentication. The application might allow users to access sensitive areas of the application without proper authentication. |
2026-04-02 | |
| CVE-2026-21765 | 8.8 | HIGH | CWE-276 | 0.0% p1 | 6.16 | HCL BigFix Platform is affected by insecure permissions on private cryptographic...HCL BigFix Platform is affected by insecure permissions on private cryptographic keys. The private cryptographic keys located on a Windows host machine might be subject to overly permissive file system permissions. |
2026-04-02 | |
| CVE-2026-5314 | 5.3 | MEDIUM | CWE-119 | 0.0% p10 | 3.71 | A vulnerability was found in Nothings stb up to 1.26. Impacted is the function s...A vulnerability was found in Nothings stb up to 1.26. Impacted is the function stbtt_InitFont_internal in the library stb_truetype.h of the component TTF File Handler. Performing a manipulation results in out-of-bounds read. Remote exploitation of the attack is possible. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-04-01 | |
| CVE-2026-4759 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering...Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. |
2026-04-01 | |
| CVE-2026-3882 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering...Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. |
2026-04-01 | |
| CVE-2026-32929 | 8.4 | HIGH | CWE-125 | 0.0% p2 | 5.88 | V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read in VS6ComFile!ge...V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read in VS6ComFile!get_macro_mem_COM. Opening a crafted V7 file may lead to information disclosure from the affected product. |
2026-04-01 | |
| CVE-2026-32928 | 8.4 | HIGH | CWE-121 | 0.0% p6 | 5.88 | V-SFT versions 6.2.10.0 and prior contain a stack-based buffer overflow in VS6Co...V-SFT versions 6.2.10.0 and prior contain a stack-based buffer overflow in VS6ComFile!CSaveData::_conv_AnimationItem. Opening a crafted V7 file may lead to arbitrary code execution on the affected product. |
2026-04-01 | |
| CVE-2026-32927 | 8.4 | HIGH | CWE-125 | 0.0% p2 | 5.88 | V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in...V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in VS6MemInIF!set_temp_type_default. Opening a crafted V7 file may lead to information disclosure from the affected product. |
2026-04-01 | |
| CVE-2026-32926 | 8.4 | HIGH | CWE-125 | 0.0% p2 | 5.88 | V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in...V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in VS6ComFile!load_link_inf. Opening a crafted V7 file may lead to information disclosure from the affected product. |
2026-04-01 | |
| CVE-2026-32925 | 8.4 | HIGH | CWE-121 | 0.0% p6 | 5.88 | V-SFT versions 6.2.10.0 and prior contain a stack-based buffer overflow in VS6Co...V-SFT versions 6.2.10.0 and prior contain a stack-based buffer overflow in VS6ComFile!CV7BaseMap::WriteV7DataToRom. Opening a crafted V7 file may lead to arbitrary code execution on the affected product. |
2026-04-01 | |
| CVE-2025-66487 | 2.7 | LOW | CWE-770 | 0.0% p12 | 1.89 | IBM Aspera Shares 1.9.9 through 1.11.0 does not properly rate limit the frequenc...IBM Aspera Shares 1.9.9 through 1.11.0 does not properly rate limit the frequency that an authenticated user can send emails, which could result in email flooding or a denial of service. |
2026-04-01 | |
| CVE-2025-66486 | 4.8 | MEDIUM | CWE-80 | 0.0% p9 | 3.36 | IBM Aspera Shares 1.9.9 through 1.11.0 is vulnerable to HTML injection. A remote...IBM Aspera Shares 1.9.9 through 1.11.0 is vulnerable to HTML injection. A remote attacker could inject malicious HTML code, which when viewed, would be executed in the victim's Web browser within the security context of the hosting site. |
2026-04-01 | |
| CVE-2025-66485 | 5.4 | MEDIUM | CWE-644 | 0.0% p8 | 3.78 | IBM Aspera Shares 1.9.9 through 1.11.0 is vulnerable to HTTP header injection, c...IBM Aspera Shares 1.9.9 through 1.11.0 is vulnerable to HTTP header injection, caused by improper validation of input by the HOST headers. This could allow an attacker to conduct various attacks against the vulnerable system, including cross-site scripting, cache poisoning or session hijacking. |
2026-04-01 | |
| CVE-2025-66484 | 5.5 | MEDIUM | CWE-79 | 0.0% p6 | 3.85 | IBM Aspera Shares 1.9.9 through 1.11.0 is vulnerable to stored cross-site script...IBM Aspera Shares 1.9.9 through 1.11.0 is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. |
2026-04-01 | |
| CVE-2025-66483 | 6.3 | MEDIUM | CWE-613 | 0.0% p7 | 4.41 | IBM Aspera Shares 1.9.9 through 1.11.0 does not invalidate session after a passw...IBM Aspera Shares 1.9.9 through 1.11.0 does not invalidate session after a password reset which could allow an authenticated user to impersonate another user on the system. |
2026-04-01 | |
| CVE-2025-36375 | 6.5 | MEDIUM | CWE-352 | 0.0% p3 | 4.55 | IBM DataPower Gateway 10.6CD 10.6.1.0 through 10.6.5.0 and IBM DataPower Gateway...IBM DataPower Gateway 10.6CD 10.6.1.0 through 10.6.5.0 and IBM DataPower Gateway 10.5.0 10.5.0.0 through 10.5.0.20 and IBM DataPower Gateway 10.6.0 10.6.0.0 through 10.6.0.8 IBM DataPower Gateway is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. |
2026-04-01 | |
| CVE-2025-0711 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering...Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. |
2026-04-01 | |
| CVE-2026-5313 | 5.3 | MEDIUM | CWE-404 | 0.0% p13 | 3.71 | A vulnerability has been found in Nothings stb up to 2.30. This issue affects th...A vulnerability has been found in Nothings stb up to 2.30. This issue affects the function stbi__gif_load_next in the library stb_image.h of the component GIF Decoder. Such manipulation leads to denial of service. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-04-01 | |
| CVE-2026-3987 | 8.6 | HIGH | CWE-22 | 0.6% p68 | 6.04 | A path traversal vulnerability in the Fireware OS Web UI on WatchGuard Firebox s...A path traversal vulnerability in the Fireware OS Web UI on WatchGuard Firebox systems may allow a privileged authenticated remote attacker to execute arbitrary code in the context of an elevated system process.This issue affects Fireware OS 12.6.1 up to and including 12.11.8 and 2025.1 up to and including 2026.1.2. |
2026-04-01 | |
| CVE-2026-34572 | 8.8 | HIGH | CWE-284 | 0.1% p24 | 6.16 | CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, mo...CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to version 0.31.0.0, the application fails to immediately revoke active user sessions when an account is deactivated. Due to a logic flaw in the backend design, account state changes are enforced only during authentication (login), not for already-established sessions. The system implicitly assumes that authenticated users remain trusted for the lifetime of their session. There is no session expiration or account expiration mechanism in place, causing deactivated accounts to retain indefinite access until the user manually logs out. This behavior breaks the intended access control policy and results in persistent unauthorized access, representing a critical security flaw. This issue has been patched in version 0.31.0.0. |
2026-04-01 | |
| CVE-2026-34571 | 9.9 | CRITICAL | CWE-79 | 0.1% p16 | 6.93 | CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, mo...CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to version 0.31.0.0, a Stored Cross-Site Scripting (Stored XSS) vulnerability exists in the backend user management functionality. The application fails to properly sanitize user-controlled input before rendering it in the administrative interface, allowing attackers to inject persistent JavaScript code. This results in automatic execution whenever backend users access the affected page, enabling session hijacking, privilege escalation, and full administrative account compromise. This issue has been patched in version 0.31.0.0. |
2026-04-01 | |
| CVE-2026-34570 | 8.8 | HIGH | CWE-284 | 0.1% p24 | 6.16 | CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, mo...CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to version 0.31.0.0, the application fails to immediately revoke active user sessions when an account is deleted. Due to a logic flaw in the backend design, account state changes are enforced only during authentication (login), not for already-established sessions. The system implicitly assumes that authenticated users remain trusted for the lifetime of their session. There is no session expiration or account expiration mechanism in place, causing deleted accounts to retain indefinite access until the user manually logs out. This behavior breaks the intended access control policy and results in persistent unauthorized access. This issue has been patched in version 0.31.0.0. |
2026-04-01 | |
| CVE-2026-34569 | 9.9 | CRITICAL | CWE-79 | 0.0% p13 | 6.93 | CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, mo...CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to version 0.31.0.0, the application fails to properly sanitize user-controlled input when creating or editing blog categories. An attacker can inject a malicious JavaScript payload into the category title field, which is then stored server-side. This stored payload is later rendered unsafely across public-facing blog category pages, administrative interfaces, and blog post views without proper output encoding, leading to stored cross-site scripting (XSS). This issue has been patched in version 0.31.0.0. |
2026-04-01 | |
| CVE-2026-34568 | 9.1 | CRITICAL | CWE-79 | 0.0% p13 | 6.37 | CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, mo...CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to version 0.31.0.0, the application fails to properly sanitize user-controlled input when creating or editing blog posts. An attacker can inject a malicious JavaScript payload into blog post content, which is then stored server-side. This stored payload is later rendered unsafely in multiple application views without proper output encoding, leading to stored cross-site scripting (XSS). This issue has been patched in version 0.31.0.0. |
2026-04-01 | |
| CVE-2026-34567 | 9.1 | CRITICAL | CWE-79 | 0.0% p13 | 6.37 | CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, mo...CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to version 0.31.0.0, the application fails to properly sanitize user-controlled input when creating or editing blog posts within the Categories section. An attacker can inject a malicious JavaScript payload into the Categories content, which is then stored server-side. This stored payload is later rendered unsafely when the Categories are viewed via blog posts, without proper output encoding, leading to stored cross-site scripting (XSS). This issue has been patched in version 0.31.0.0. |
2026-04-01 | |
| CVE-2026-34566 | 9.1 | CRITICAL | CWE-79 | 0.0% p13 | 6.37 | CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, mo...CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to version 0.31.0.0, the application fails to properly sanitize user-controlled input within the Page Management functionality when creating or editing pages. Multiple input fields accept attacker-controlled JavaScript payloads that are stored server-side. These stored values are later rendered without proper output encoding across administrative page lists and public-facing page views, leading to stored DOM-based cross-site scripting (XSS). This issue has been patched in version 0.31.0.0. |
2026-04-01 | |
| CVE-2026-34565 | 9.1 | CRITICAL | CWE-79 | 0.0% p13 | 6.37 | CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, mo...CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to version 0.31.0.0, the application fails to properly sanitize user-controlled input when adding Posts to navigation menus through the Menu Management functionality. Post-related data selected via the Posts section is stored server-side and rendered without proper output encoding. These stored values are later rendered unsafely within administrative dashboards and public-facing navigation menus, resulting in stored DOM-based cross-site scripting (XSS). This issue has been patched in version 0.31.0.0. |
2026-04-01 | |
| CVE-2026-34564 | 9.1 | CRITICAL | CWE-79 | 0.0% p13 | 6.37 | CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, mo...CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to version 0.31.0.0, the application fails to properly sanitize user-controlled input when adding Pages to navigation menus through the Menu Management functionality. Page-related data selected via the Pages section is stored server-side and rendered without proper output encoding. This stored payload is later rendered unsafely within administrative interfaces and public-facing navigation menus, leading to stored DOM-based cross-site scripting (XSS). This issue has been patched in version 0.31.0.0. |
2026-04-01 | |
| CVE-2026-34563 | 9.1 | CRITICAL | CWE-79 | 0.0% p13 | 6.37 | CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, mo...CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to version 0.31.0.0, the application fails to properly sanitize user-controlled input when handling backup uploads and processing backup metadata. An attacker can inject a malicious JavaScript payload into the backup filename via the uploaded xss.sql, which uses SQL functionality to insert the XSS payload server-side. This stored payload is later rendered unsafely in multiple backup management views without proper output encoding, leading to stored blind cross-site scripting (Blind XSS). This issue has been patched in version 0.31.0.0. |
2026-04-01 | |
| CVE-2026-34562 | 4.7 | MEDIUM | CWE-79 | 0.0% p14 | 3.29 | CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, mo...CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to version 0.31.0.0, the application fails to properly sanitize user-controlled input within System Settings – Company Information. Several administrative configuration fields accept attacker-controlled input that is stored server-side and later rendered without proper output encoding. This issue has been patched in version 0.31.0.0. |
2026-04-01 | |
| CVE-2026-34561 | 4.7 | MEDIUM | CWE-79 | 0.0% p14 | 3.29 | CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, mo...CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to version 0.31.0.0, the application fails to properly sanitize user-controlled input within System Settings – Social Media Management. Multiple configuration fields, including Social Media and Social Media Link, accept attacker-controlled input that is stored server-side and later rendered without proper output encoding. This issue has been patched in version 0.31.0.0. |
2026-04-01 | |
| CVE-2026-34560 | 9.1 | CRITICAL | CWE-79 | 0.0% p5 | 6.37 | CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, mo...CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to version 0.31.0.0, the application renders user-controlled input unsafely within the logs interface. If any stored XSS payload exists within logged data, it is rendered without proper output encoding. This issue becomes a Blind XSS scenario because the attacker does not see immediate execution. Instead, the payload is stored within application logs and only executes later when an administrator views the logs page. This issue has been patched in version 0.31.0.0. |
2026-04-01 | |
| CVE-2026-34559 | 9.1 | CRITICAL | CWE-79 | 0.0% p3 | 6.37 | CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, mo...CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to version 0.31.0.0, the application fails to properly sanitize user-controlled input when creating or editing blog tags. An attacker can inject a malicious JavaScript payload into the tag name field, which is then stored server-side. This stored payload is later rendered unsafely across public tag pages and administrative interfaces without proper output encoding, leading to stored cross-site scripting (XSS). This issue has been patched in version 0.31.0.0. |
2026-04-01 | |
| CVE-2026-5312 | 5.5 | MEDIUM | CWE-266 | 0.1% p24 | 3.85 | A weakness has been identified in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, D...A weakness has been identified in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205. Affected by this vulnerability is the function FMT_restart/Status_HDInfo/SMART_List/ScanDisk_info/ScanDisk/volume_status/Get_Volume_Mapping/FMT_check_disk_remount_state/FMT_rebuildinfo/FMT_result_list/FMT_result_list_phy/FMT_get_dminfo/FMT_manually_rebuild_info/Get_current_raidtype of the file /cgi-bin/dsk_mgr.cgi. Executing a manipulation can lead to improper access controls. It is possible to launch the attack remotely. The exploit has been made available to the public and could be used for attacks. |
2026-04-01 | |
| CVE-2026-4820 | 4.3 | MEDIUM | CWE-614 | 0.0% p1 | 3.01 | IBM Maximo Application Suite 9.1, 9.0, 8.11, and 8.10 does not set the secure at...IBM Maximo Application Suite 9.1, 9.0, 8.11, and 8.10 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic. |
2026-04-01 | |
| CVE-2026-4364 | 5.4 | MEDIUM | CWE-79 | 0.0% p3 | 3.78 | IBM Verify Identity Access Container 11.0 through 11.0.2 and IBM Security Verify...IBM Verify Identity Access Container 11.0 through 11.0.2 and IBM Security Verify Access Container 10.0 through 10.0.9.1 and IBM Verify Identity Access 11.0 through 11.0.2 and IBM Security Verify Access 10.0 through 10.0.9.1 allows certificate listings retrieved via a browser session to return a JSON payload while incorrectly specifying the response Content-Type as text/html. Because the content is delivered with an HTML MIME type, browsers may interpret the JSON data as executable script under certain conditions. This creates an opportunity for JavaScript injection, potentially leading to cross-site scripting (XSS). |
2026-04-01 | |
| CVE-2026-4101 | 8.1 | HIGH | CWE-287 | 0.1% p28 | 5.67 | IBM Verify Identity Access Container 11.0 through 11.0.2 and IBM Security Verify...IBM Verify Identity Access Container 11.0 through 11.0.2 and IBM Security Verify Access Container 10.0 through 10.0.9.1 and IBM Verify Identity Access 11.0 through 11.0.2 and IBM Security Verify Access 10.0 through 10.0.9.1 under certain load conditions could allow an attacker to bypass authentication mechanisms and gain unauthorized access to the application. |
2026-04-01 | |
| CVE-2026-34873 | 9.1 | CRITICAL | CWE-287 | 0.0% p10 | 6.37 | An issue was discovered in Mbed TLS 3.5.0 through 4.0.0. Client impersonation ca...An issue was discovered in Mbed TLS 3.5.0 through 4.0.0. Client impersonation can occur while resuming a TLS 1.3 session. |
2026-04-01 | |
| CVE-2026-34545 | 8.4 | HIGH | CWE-122 | 0.1% p21 | 5.88 | OpenEXR provides the specification and reference implementation of the EXR file ...OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. From version 3.4.0 to before version 3.4.7, an attacker providing a crafted .exr file with HTJ2K compression and a channel width of 32768 can write controlled data beyond the output heap buffer in any application that decodes EXR images. The write primitive is 2 bytes per overflow iteration or 4 bytes (by another path), repeating for each additional pixel past the overflow point. In this context, a heap write overflow can lead to remote code execution on systems. This issue has been patched in version 3.4.7. |
2026-04-01 | |
| CVE-2026-34544 | 8.4 | HIGH | CWE-190 | 0.0% p3 | 5.88 | OpenEXR provides the specification and reference implementation of the EXR file ...OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. From version 3.4.0 to before version 3.4.8, a crafted B44 or B44A EXR file can cause an out-of-bounds write in any application that decodes it via exr_decoding_run(). Consequences range from immediate crash (most likely) to corruption of adjacent heap allocations (layout-dependent). This issue has been patched in version 3.4.8. |
2026-04-01 | |
| CVE-2026-34543 | 8.7 | HIGH | CWE-908 | 0.0% p11 | 6.09 | OpenEXR provides the specification and reference implementation of the EXR file ...OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. From version 3.4.0 to before version 3.4.8, sensitive information from heap memory may be leaked through the decoded pixel data (information disclosure). This occurs under default settings; simply reading a malicious EXR file is sufficient to trigger the issue, without any user interaction. This issue has been patched in version 3.4.8. |
2026-04-01 | |
| CVE-2026-34531 | 6.5 | MEDIUM | CWE-287 | 0.0% p13 | 4.55 | Flask-HTTPAuth provides Basic, Digest and Token HTTP authentication for Flask ro...Flask-HTTPAuth provides Basic, Digest and Token HTTP authentication for Flask routes. Prior to version 4.8.1, in a situation where the client makes a request to a token protected resource without passing a token, or passing an empty token, Flask-HTTPAuth would invoke the application's token verification callback function with the token argument set to an empty string. If the application had any users in its database with an empty string set as their token, then it could potentially authenticate the client request against any of those users. This issue has been patched in version 4.8.1. |
2026-04-01 | |
| CVE-2026-34530 | 6.9 | MEDIUM | CWE-79 | 0.1% p19 | 4.83 | File Browser is a file managing interface for uploading, deleting, previewing, r...File Browser is a file managing interface for uploading, deleting, previewing, renaming, and editing files within a specified directory. Prior to version 2.62.2, the SPA index page in File Browser is vulnerable to Stored Cross-Site Scripting (XSS) via admin-controlled branding fields. An admin who sets branding.name to a malicious payload injects persistent JavaScript that executes for ALL visitors, including unauthenticated users. This issue has been patched in version 2.62.2. |
2026-04-01 | |
| CVE-2026-34529 | 7.6 | HIGH | CWE-79 | 0.0% p10 | 5.32 | File Browser is a file managing interface for uploading, deleting, previewing, r...File Browser is a file managing interface for uploading, deleting, previewing, renaming, and editing files within a specified directory. Prior to version 2.62.2, the EPUB preview function in File Browser is vulnerable to Stored Cross-Site Scripting (XSS). JavaScript embedded in a crafted EPUB file executes in the victim's browser when they preview the file. This issue has been patched in version 2.62.2. |
2026-04-01 | |
| CVE-2026-34528 | 8.1 | HIGH | CWE-269 | 0.2% p39 | 5.68 | File Browser is a file managing interface for uploading, deleting, previewing, r...File Browser is a file managing interface for uploading, deleting, previewing, renaming, and editing files within a specified directory. Prior to version 2.62.2, the signupHandler in File Browser applies default user permissions via d.settings.Defaults.Apply(user), then strips only Admin. The Execute permission and Commands list from the default user template are not stripped. When an administrator has enabled signup, server-side execution, and set Execute=true in the default user template, any unauthenticated user who self-registers inherits shell execution capabilities and can run arbitrary commands on the server. This issue has been patched in version 2.62.2. |
2026-04-01 | |
| CVE-2026-34525 | 6.3 | MEDIUM | CWE-20 | 0.1% p27 | 4.41 | AIOHTTP is an asynchronous HTTP client/server framework for asyncio and Python. ...AIOHTTP is an asynchronous HTTP client/server framework for asyncio and Python. Prior to version 3.13.4, multiple Host headers were allowed in aiohttp. This issue has been patched in version 3.13.4. |
2026-04-01 | |
| CVE-2026-34520 | 2.7 | LOW | CWE-113 | 0.1% p17 | 1.89 | AIOHTTP is an asynchronous HTTP client/server framework for asyncio and Python. ...AIOHTTP is an asynchronous HTTP client/server framework for asyncio and Python. Prior to version 3.13.4, the C parser (the default for most installs) accepted null bytes and control characters in response headers. This issue has been patched in version 3.13.4. |
2026-04-01 | |
| CVE-2026-34519 | 2.7 | LOW | CWE-113 | 0.1% p18 | 1.89 | AIOHTTP is an asynchronous HTTP client/server framework for asyncio and Python. ...AIOHTTP is an asynchronous HTTP client/server framework for asyncio and Python. Prior to version 3.13.4, an attacker who controls the reason parameter when creating a Response may be able to inject extra headers or similar exploits. This issue has been patched in version 3.13.4. |
2026-04-01 | |
| CVE-2026-34518 | 2.7 | LOW | CWE-200 | 0.1% p16 | 1.89 | AIOHTTP is an asynchronous HTTP client/server framework for asyncio and Python. ...AIOHTTP is an asynchronous HTTP client/server framework for asyncio and Python. Prior to version 3.13.4, when following redirects to a different origin, aiohttp drops the Authorization header, but retains the Cookie and Proxy-Authorization headers. This issue has been patched in version 3.13.4. |
2026-04-01 | |
| CVE-2026-34517 | 2.7 | LOW | CWE-770 | 0.1% p16 | 1.89 | AIOHTTP is an asynchronous HTTP client/server framework for asyncio and Python. ...AIOHTTP is an asynchronous HTTP client/server framework for asyncio and Python. Prior to version 3.13.4, for some multipart form fields, aiohttp read the entire field into memory before checking client_max_size. This issue has been patched in version 3.13.4. |
2026-04-01 | |
| CVE-2026-34516 | 6.6 | MEDIUM | CWE-770 | 0.1% p15 | 4.62 | AIOHTTP is an asynchronous HTTP client/server framework for asyncio and Python. ...AIOHTTP is an asynchronous HTTP client/server framework for asyncio and Python. Prior to version 3.13.4, a response with an excessive number of multipart headers may be allowed to use more memory than intended, potentially allowing a DoS vulnerability. This issue has been patched in version 3.13.4. |
2026-04-01 | |
| CVE-2026-34515 | 6.6 | MEDIUM | CWE-36 | 0.1% p22 | 4.62 | AIOHTTP is an asynchronous HTTP client/server framework for asyncio and Python. ...AIOHTTP is an asynchronous HTTP client/server framework for asyncio and Python. Prior to version 3.13.4, on Windows the static resource handler may expose information about a NTLMv2 remote path. This issue has been patched in version 3.13.4. |
2026-04-01 | |
| CVE-2026-34514 | 2.7 | LOW | CWE-113 | 0.1% p18 | 1.89 | AIOHTTP is an asynchronous HTTP client/server framework for asyncio and Python. ...AIOHTTP is an asynchronous HTTP client/server framework for asyncio and Python. Prior to version 3.13.4, an attacker who controls the content_type parameter in aiohttp could use this to inject extra headers or similar exploits. This issue has been patched in version 3.13.4. |
2026-04-01 | |
| CVE-2026-34513 | 2.7 | LOW | CWE-770 | 0.1% p16 | 1.89 | AIOHTTP is an asynchronous HTTP client/server framework for asyncio and Python. ...AIOHTTP is an asynchronous HTTP client/server framework for asyncio and Python. Prior to version 3.13.4, an unbounded DNS cache could result in excessive memory usage possibly resulting in a DoS situation. This issue has been patched in version 3.13.4. |
2026-04-01 | |
| CVE-2026-2862 | 5.3 | MEDIUM | CWE-444 | 0.0% p13 | 3.71 | IBM Verify Identity Access Container 11.0 through 11.0.2 and IBM Security Verify...IBM Verify Identity Access Container 11.0 through 11.0.2 and IBM Security Verify Access Container 10.0 through 10.0.9.1 and IBM Verify Identity Access 11.0 through 11.0.2 and IBM Security Verify Access 10.0 through 10.0.9.1 IBM Security Verify could allow a remote attacker to access sensitive information due to an inconsistent interpretation of an HTTP request by a reverse proxy. |
2026-04-01 | |
| CVE-2026-2475 | 3.1 | LOW | CWE-601 | 0.0% p9 | 2.17 | IBM Verify Identity Access Container 11.0 through 11.0.2 and IBM Security Verify...IBM Verify Identity Access Container 11.0 through 11.0.2 and IBM Security Verify Access Container 10.0 through 10.0.9.1 and IBM Verify Identity Access 11.0 through 11.0.2 and IBM Security Verify Access 10.0 through 10.0.9.1 could allow a remote attacker to conduct phishing attacks, caused by an open redirect vulnerability. An attacker could exploit this vulnerability using a specially crafted request to redirect a victim to arbitrary Web sites. |
2026-04-01 | |
| CVE-2026-22815 | 6.9 | MEDIUM | CWE-400 | 0.1% p16 | 4.83 | AIOHTTP is an asynchronous HTTP client/server framework for asyncio and Python. ...AIOHTTP is an asynchronous HTTP client/server framework for asyncio and Python. Prior to version 3.13.4, insufficient restrictions in header/trailer handling could cause uncapped memory usage. This issue has been patched in version 3.13.4. |
2026-04-01 | |
| CVE-2026-1491 | 5.3 | MEDIUM | CWE-444 | 0.0% p13 | 3.71 | IBM Verify Identity Access Container 11.0 through 11.0.2 and IBM Security Verify...IBM Verify Identity Access Container 11.0 through 11.0.2 and IBM Security Verify Access Container 10.0 through 10.0.9.1 and IBM Verify Identity Access 11.0 through 11.0.2 and IBM Security Verify Access 10.0 through 10.0.9.1 IBM Security Verify could allow a remote attacker to access sensitive information due to an inconsistent interpretation of an HTTP request by a reverse proxy. |
2026-04-01 | |
| CVE-2026-1345 | 7.3 | HIGH | CWE-78 | 0.1% p20 | 5.11 | IBM Verify Identity Access Container 11.0 through 11.0.2 and IBM Security Verify...IBM Verify Identity Access Container 11.0 through 11.0.2 and IBM Security Verify Access Container 10.0 through 10.0.9.1 and IBM Verify Identity Access 11.0 through 11.0.2 and IBM Security Verify Access 10.0 through 10.0.9.1 could allow an unauthenticated user to execute arbitrary commands as lower user privileges on the system due to improper validation of user supplied input. |
2026-04-01 | |
| CVE-2025-36373 | 4.1 | MEDIUM | CWE-497 | 0.0% p9 | 2.87 | IBM DataPower Gateway 10.6CD 10.6.1.0 through 10.6.5.0 and IBM DataPower Gateway...IBM DataPower Gateway 10.6CD 10.6.1.0 through 10.6.5.0 and IBM DataPower Gateway 10.5.0 10.5.0.0 through 10.5.0.20 and IBM DataPower Gateway 10.6.0 10.6.0.0 through 10.6.0.8 IBM DataPower Gateway could disclose sensitive system information from other domains to an administrative user. |
2026-04-01 | |
| CVE-2025-13916 | 5.9 | MEDIUM | CWE-327 | 0.0% p3 | 4.13 | IBM Aspera Shares 1.9.9 through 1.11.0 uses weaker than expected cryptographic a...IBM Aspera Shares 1.9.9 through 1.11.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information |
2026-04-01 | |
| CVE-2026-5311 | 5.5 | MEDIUM | CWE-266 | 0.3% p48 | 3.86 | A security flaw has been discovered in D-Link DNS-120, DNR-202L, DNS-315L, DNS-3...A security flaw has been discovered in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205. Affected is the function Webdav_Access_List of the file /cgi-bin/file_center.cgi. Performing a manipulation of the argument cmd results in improper access controls. It is possible to initiate the attack remotely. The exploit has been released to the public and may be used for attacks. |
2026-04-01 | |
| CVE-2026-34872 | 9.1 | CRITICAL | CWE-347 | 0.0% p3 | 6.37 | An issue was discovered in Mbed TLS 3.5.x and 3.6.x through 3.6.5 and TF-PSA-Cry...An issue was discovered in Mbed TLS 3.5.x and 3.6.x through 3.6.5 and TF-PSA-Crypto 1.0. There is a lack of contributory behavior in FFDH due to improper input validation. Using finite-field Diffie-Hellman, the other party can force the shared secret into a small set of values (lack of contributory behavior). This is a problem for protocols that depend on contributory behavior (which is not the case for TLS). The attack can be carried by the peer, or depending on the protocol by an active network attacker (person in the middle). |
2026-04-01 | |
| CVE-2026-34750 | 6.5 | MEDIUM | CWE-22 | 0.1% p21 | 4.55 | Payload is a free and open source headless content management system. Prior to v...Payload is a free and open source headless content management system. Prior to version 3.78.0 in @payloadcms/storage-azure, @payloadcms/storage-gcs, @payloadcms/storage-r2, and @payloadcms/storage-s3, the client-upload signed-URL endpoints for S3, GCS, Azure, and R2 did not properly sanitize filenames. An attacker could craft filenames to escape the intended storage location. This issue has been patched in version 3.78.0 for @payloadcms/storage-azure, @payloadcms/storage-gcs, @payloadcms/storage-r2, and @payloadcms/storage-s3. |
2026-04-01 | |
| CVE-2026-34749 | 5.4 | MEDIUM | CWE-352 | 0.0% p6 | 3.78 | Payload is a free and open source headless content management system. Prior to v...Payload is a free and open source headless content management system. Prior to version 3.79.1, a Cross-Site Request Forgery (CSRF) vulnerability exists in the authentication flow. Under certain conditions, the configured CSRF protection could be bypassed, allowing cross-site requests to be made. This issue has been patched in version 3.79.1. |
2026-04-01 | |
| CVE-2026-34748 | 8.7 | HIGH | CWE-79 | 0.0% p10 | 6.09 | Payload is a free and open source headless content management system. Prior to v...Payload is a free and open source headless content management system. Prior to version 3.78.0 in @payloadcms/next, a stored Cross-Site Scripting (XSS) vulnerability existed in the admin panel. An authenticated user with write access to a collection could save content that, when viewed by another user, would execute in their browser. This issue has been patched in version 3.78.0. |
2026-04-01 | |
| CVE-2026-34747 | 8.5 | HIGH | CWE-89 | 0.1% p20 | 5.95 | Payload is a free and open source headless content management system. Prior to v...Payload is a free and open source headless content management system. Prior to version 3.79.1, certain request inputs were not properly validated. An attacker could craft requests that influence SQL query execution, potentially exposing or modifying data in collections. This issue has been patched in version 3.79.1. |
2026-04-01 | |
| CVE-2026-34746 | 7.7 | HIGH | CWE-918 | 0.0% p10 | 5.39 | Payload is a free and open source headless content management system. Prior to v...Payload is a free and open source headless content management system. Prior to version 3.79.1, an authenticated Server-Side Request Forgery (SSRF) vulnerability exists in the upload functionality. Authenticated users with create or update access to an upload-enabled collection could cause the server to make outbound HTTP requests to arbitrary URLs. This issue has been patched in version 3.79.1. |
2026-04-01 | |
| CVE-2026-34456 | 9.1 | CRITICAL | CWE-284 | 0.1% p23 | 6.37 | Reviactyl is an open-source game server management panel built using Laravel, Re...Reviactyl is an open-source game server management panel built using Laravel, React, FilamentPHP, Vite, and Go. From version 26.2.0-beta.1 to before version 26.2.0-beta.5, a vulnerability in the OAuth authentication flow allowed automatic linking of social accounts based solely on matching email addresses. An attacker could create or control a social account (e.g., Google, GitHub, Discord) using a victim’s email address and gain full access to the victim's account without knowing their password. This results in a full account takeover with no prior authentication required. This issue has been patched in version 26.2.0-beta.5. |
2026-04-01 | |
| CVE-2026-34455 | 8.7 | HIGH | CWE-89 | 0.0% p12 | 6.09 | Hi.Events is an open-source event management and ticket selling platform. From v...Hi.Events is an open-source event management and ticket selling platform. From version 0.8.0-beta.1 to before version 1.7.1-beta, multiple repository classes pass the user-supplied sort_by query parameter directly to Eloquent's orderBy() without validation, enabling SQL injection. The application uses PostgreSQL which supports stacked queries. This issue has been patched in version 1.7.1-beta. |
2026-04-01 | |
| CVE-2025-66442 | 5.1 | MEDIUM | CWE-385 | 0.0% p5 | 3.57 | In Mbed TLS through 4.0.0, there is a compiler-induced timing side channel (in R...In Mbed TLS through 4.0.0, there is a compiler-induced timing side channel (in RSA and CBC/ECB decryption) that only occurs with LLVM's select-optimize feature. TF-PSA-Crypto through 1.0.0 is also affected. |
2026-04-01 | |
| CVE-2026-35000 | 7.1 | HIGH | CWE-184 | 0.1% p17 | 4.97 | ChangeDetection.io versions prior to 0.54.7 contain a protection bypass vulnerab...ChangeDetection.io versions prior to 0.54.7 contain a protection bypass vulnerability in the SafeXPath3Parser implementation that allows attackers to read arbitrary local files by using unblocked XPath 3.0/3.1 functions such as json-doc() and similar file-access primitives. Attackers can exploit the incomplete blocklist of dangerous XPath functions to access sensitive data from the local filesystem. |
2026-04-01 | |
| CVE-2026-34874 | 7.5 | HIGH | CWE-476 | 0.1% p22 | 5.25 | An issue was discovered in Mbed TLS through 3.6.5 and 4.x through 4.0.0. There i...An issue was discovered in Mbed TLS through 3.6.5 and 4.x through 4.0.0. There is a NULL pointer dereference in distinguished name parsing that allows an attacker to write to address 0. |
2026-04-01 | |
| CVE-2026-34871 | 6.7 | MEDIUM | CWE-338 | 0.0% p2 | 4.69 | An issue was discovered in Mbed TLS before 3.6.6 and 4.x before 4.1.0 and TF-PSA...An issue was discovered in Mbed TLS before 3.6.6 and 4.x before 4.1.0 and TF-PSA-Crypto before 1.1.0. There is a Predictable Seed in a Pseudo-Random Number Generator (PRNG). |
2026-04-01 | |
| CVE-2026-25835 | 7.7 | HIGH | CWE-335 | 0.0% p2 | 5.39 | Mbed TLS before 3.6.6 and TF-PSA-Crypto before 1.1.0 misuse seeds in a Pseudo-Ra...Mbed TLS before 3.6.6 and TF-PSA-Crypto before 1.1.0 misuse seeds in a Pseudo-Random Number Generator (PRNG). |
2026-04-01 | |
| CVE-2026-25833 | 7.5 | HIGH | CWE-121 | 0.0% p15 | 5.25 | Mbed TLS 3.5.0 to 3.6.5 fixed in 3.6.6 and 4.1.0 has a buffer overflow in the x5...Mbed TLS 3.5.0 to 3.6.5 fixed in 3.6.6 and 4.1.0 has a buffer overflow in the x509_inet_pton_ipv6() function |
2026-04-01 | |
| CVE-2026-34875 | 9.8 | CRITICAL | CWE-120 | 0.1% p16 | 6.86 | An issue was discovered in Mbed TLS through 3.6.5 and TF-PSA-Crypto 1.0.0. A buf...An issue was discovered in Mbed TLS through 3.6.5 and TF-PSA-Crypto 1.0.0. A buffer overflow can occur in public key export for FFDH keys. |
2026-04-01 | |
| CVE-2026-34751 | 9.1 | CRITICAL | CWE-472 | 0.1% p16 | 6.37 | Payload is a free and open source headless content management system. Prior to v...Payload is a free and open source headless content management system. Prior to version 3.79.1 in @payloadcms/graphql and payload, a vulnerability in the password recovery flow could allow an unauthenticated attacker to perform actions on behalf of a user who initiates a password reset. This issue has been patched in version 3.79.1 for @payloadcms/graphql and payload. |
2026-04-01 | |
| CVE-2026-34447 | 5.5 | MEDIUM | CWE-22 | 0.0% p1 | 3.85 | Open Neural Network Exchange (ONNX) is an open standard for machine learning int...Open Neural Network Exchange (ONNX) is an open standard for machine learning interoperability. Prior to version 1.21.0, there is a symlink traversal vulnerability in external data loading allows reading files outside the model directory. This issue has been patched in version 1.21.0. |
2026-04-01 | |
| CVE-2026-34446 | 4.7 | MEDIUM | CWE-22 | 0.0% p1 | 3.29 | Open Neural Network Exchange (ONNX) is an open standard for machine learning int...Open Neural Network Exchange (ONNX) is an open standard for machine learning interoperability. Prior to version 1.21.0, there is an issue in onnx.load, the code checks for symlinks to prevent path traversal, but completely misses hardlinks because a hardlink looks exactly like a regular file on the filesystem. This issue has been patched in version 1.21.0. |
2026-04-01 | |
| CVE-2026-34445 | 8.6 | HIGH | CWE-20 | 0.1% p17 | 6.02 | Open Neural Network Exchange (ONNX) is an open standard for machine learning int...Open Neural Network Exchange (ONNX) is an open standard for machine learning interoperability. Prior to version 1.21.0, the ExternalDataInfo class in ONNX was using Python’s setattr() function to load metadata (like file paths or data lengths) directly from an ONNX model file. It didn’t check if the "keys" in the file were valid. Due to this, an attacker could craft a malicious model that overwrites internal object properties. This issue has been patched in version 1.21.0. |
2026-04-01 | |
| CVE-2026-34397 | 6.3 | MEDIUM | CWE-269 | 0.0% p1 | 4.41 | Himmelblau is an interoperability suite for Microsoft Azure Entra ID and Intune....Himmelblau is an interoperability suite for Microsoft Azure Entra ID and Intune. From versions 2.0.0-alpha to before 2.3.9 and 3.0.0-alpha to before 3.1.1, there is a conditional local privilege escalation vulnerability in an edge-case naming collision. Only authenticated himmelblau users whose mapped CN/short name exactly matches a privileged local group name (e.g., "sudo", "wheel", "docker", "adm") can cause the NSS module to resolve that group name to their fake primary group. If the system uses NSS results for group-based authorization decisions (sudo, polkit, etc.), this can grant the attacker the privileges of that group. This issue has been patched in versions 2.3.9 and 3.1.1. |
2026-04-01 | |
| CVE-2026-34376 | 7.5 | HIGH | CWE-863 | 0.0% p13 | 5.25 | PdfDing is a selfhosted PDF manager, viewer and editor offering a seamless user ...PdfDing is a selfhosted PDF manager, viewer and editor offering a seamless user experience on multiple devices. Prior to version 1.7.0, an access-control vulnerability allows unauthenticated users to retrieve password-protected shared PDFs by directly calling the file-serving endpoint without completing the password verification flow. This results in unauthorized access to confidential documents that users expected to be protected by a shared-link password. This issue has been patched in version 1.7.0. |
2026-04-01 | |
| CVE-2026-34236 | 8.2 | HIGH | CWE-331 | 0.0% p1 | 5.74 | Auth0-PHP is a PHP SDK for Auth0 Authentication and Management APIs. From versio...Auth0-PHP is a PHP SDK for Auth0 Authentication and Management APIs. From version 8.0.0 to before version 8.19.0, in applications built with the Auth0 PHP SDK, cookies are encrypted with insufficient entropy, which may result in threat actors brute-forcing the encryption key and forging session cookies. This issue has been patched in version 8.19.0. |
2026-04-01 | |
| CVE-2026-34222 | 7.7 | HIGH | CWE-285 | 0.0% p1 | 5.39 | Open WebUI is a self-hosted artificial intelligence platform designed to operate...Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to version 0.8.11, there is a broken access control vulnerability in tool values. This issue has been patched in version 0.8.11. |
2026-04-01 | |
| CVE-2026-34159 | 9.8 | CRITICAL | CWE-119 | 0.2% p36 | 6.86 | llama.cpp is an inference of several LLM models in C/C++. Prior to version b8492...llama.cpp is an inference of several LLM models in C/C++. Prior to version b8492, the RPC backend's deserialize_tensor() skips all bounds validation when a tensor's buffer field is 0. An unauthenticated attacker can read and write arbitrary process memory via crafted GRAPH_COMPUTE messages. Combined with pointer leaks from ALLOC_BUFFER/BUFFER_GET_BASE, this gives full ASLR bypass and remote code execution. No authentication required, just TCP access to the RPC server port. This issue has been patched in version b8492. |
2026-04-01 | |
| CVE-2026-34076 | 7.4 | HIGH | CWE-918 | 0.0% p13 | 5.18 | Clerk JavaScript is the official JavaScript repository for Clerk authentication....Clerk JavaScript is the official JavaScript repository for Clerk authentication. In @clerk/hono from versions 0.1.0 to before 0.1.5, @clerk/express from versions 2.0.0 to before 2.0.7, @clerk/backend from versions 3.0.0 to before 3.2.3, and @clerk/fastify from versions 3.1.0 to before 3.1.5, the clerkFrontendApiProxy function in @clerk/backend is vulnerable to Server-Side Request Forgery (SSRF). An unauthenticated attacker can craft a request path that causes the proxy to send the application's Clerk-Secret-Key to an attacker-controlled server. This issue has been patched in @clerk/hono version 0.1.5, @clerk/express version 2.0.7, @clerk/backend version 3.2.3, and @clerk/fastify version 3.1.5. |
2026-04-01 | |
| CVE-2026-34072 | 8.3 | HIGH | CWE-287 | 0.1% p15 | 5.81 | Cr*nMaster (cronmaster) is a Cronjob management UI with human readable syntax, l...Cr*nMaster (cronmaster) is a Cronjob management UI with human readable syntax, live logging and log history for cronjobs. Prior to version 2.2.0, an authentication bypass in middleware allows unauthenticated requests with an invalid session cookie to be treated as authenticated when the middleware’s session-validation fetch fails. This can result in unauthorized access to protected pages and unauthorized execution of privileged Next.js Server Actions. This issue has been patched in version 2.2.0. |
2026-04-01 | |
| CVE-2026-27489 | 8.7 | HIGH | CWE-23 | 0.1% p20 | 6.09 | Open Neural Network Exchange (ONNX) is an open standard for machine learning int...Open Neural Network Exchange (ONNX) is an open standard for machine learning interoperability. Prior to version 1.21.0, a path traversal vulnerability via symlink allows to read arbitrary files outside model or user-provided directory. This issue has been patched in version 1.21.0. |
2026-04-01 | |
| CVE-2026-25834 | 6.5 | MEDIUM | CWE-295 | 0.0% p5 | 4.55 | Mbed TLS v3.3.0 up to 3.6.5 and 4.0.0 allows Algorithm Downgrade.Mbed TLS v3.3.0 up to 3.6.5 and 4.0.0 allows Algorithm Downgrade. |
2026-04-01 | |
| CVE-2026-34604 | 7.1 | HIGH | CWE-22 | 0.1% p23 | 4.97 | Tina is a headless content management system. Prior to version 2.2.2, @tinacms/g...Tina is a headless content management system. Prior to version 2.2.2, @tinacms/graphql uses string-based path containment checks in FilesystemBridge. That blocks plain ../ traversal, but it does not resolve symlink or junction targets. If a symlink/junction already exists under the allowed content root, a path like content/posts/pivot/owned.md is still considered "inside" the base even though the real filesystem target can be outside it. As a result, FilesystemBridge.get(), put(), delete(), and glob() can operate on files outside the intended root. This issue has been patched in version 2.2.2. |
2026-04-01 | |
| CVE-2026-34603 | 7.1 | HIGH | CWE-22 | 0.1% p22 | 4.97 | Tina is a headless content management system. Prior to version 2.2.2, @tinacms/c...Tina is a headless content management system. Prior to version 2.2.2, @tinacms/cli recently added lexical path-traversal checks to the dev media routes, but the implementation still validates only the path string and does not resolve symlink or junction targets. If a link already exists under the media root, Tina accepts a path like pivot/written-from-media.txt as "inside" the media directory and then performs real filesystem operations through that link target. This allows out-of-root media listing and write access, and the same root cause also affects delete. This issue has been patched in version 2.2.2. |
2026-04-01 | |
| CVE-2026-33990 | 6.8 | MEDIUM | CWE-918 | 0.0% p7 | 4.76 | Docker Model Runner (DMR) is software used to manage, run, and deploy AI models ...Docker Model Runner (DMR) is software used to manage, run, and deploy AI models using Docker. Prior to version 1.1.25, Docker Model Runner contains an SSRF vulnerability in its OCI registry token exchange flow. When pulling a model, Model Runner follows the realm URL from the registry's WWW-Authenticate header without validating the scheme, hostname, or IP range. A malicious OCI registry can set the realm to an internal URL (e.g., http://127.0.0.1:3000/), causing Model Runner running on the host to make arbitrary GET requests to internal services and reflect the full response body back to the caller. Additionally, the token exchange mechanism can relay data from internal services back to the attacker-controlled registry via the Authorization: Bearer header. This issue has been patched in version 1.1.25. For Docker Desktop users, enabling Enhanced Container Isolation (ECI) blocks container access to Model Runner, preventing exploitation. However, if the Docker Model Runner is exposed to localhost over TCP in specific configurations, the vulnerability is still exploitable. |
2026-04-01 | |
| CVE-2026-33978 | 5.4 | MEDIUM | CWE-79 | 0.0% p8 | 3.78 | Notesnook is a note-taking app focused on user privacy & ease of use. Prior to v...Notesnook is a note-taking app focused on user privacy & ease of use. Prior to version 3.3.17, a stored XSS vulnerability exists in the mobile share / web clip flow because attacker-controlled clip metadata is concatenated into HTML without escaping and then rendered with innerHTML inside the mobile share editor WebView. An attacker can control the shared title metadata (for example through Android/iOS share metadata such as TITLE / SUBJECT, or through link-preview title data) and inject HTML such as </a><img src=x onerror=...>. When the victim opens the Notesnook share flow and selects Web clip, the payload is inserted into the generated HTML and executed in the mobile editor WebView. This issue has been patched in version 3.3.17. |
2026-04-01 | |
| CVE-2026-33949 | 8.1 | HIGH | CWE-22 | 0.2% p36 | 5.67 | Tina is a headless content management system. Prior to version 2.2.2, a path tra...Tina is a headless content management system. Prior to version 2.2.2, a path traversal vulnerability in @tinacms/graphql allows unauthenticated users to write and overwrite arbitrary files within the project root. This is achieved by manipulating the relativePath parameter in GraphQL mutations. The impact includes the ability to replace critical server configuration files and potentially execute arbitrary commands by sabotaging build script. This issue has been patched in version 2.2.2. |
2026-04-01 | |
| CVE-2026-30643 | 9.8 | CRITICAL | CWE-94 | 0.1% p21 | 6.86 | An issue was discovered in DedeCMS 5.7.118 allowing attackers to execute code vi...An issue was discovered in DedeCMS 5.7.118 allowing attackers to execute code via crafted setup tag values in a module upload. |
2026-04-01 | |
| CVE-2026-30273 | 7.3 | HIGH | CWE-89 | 0.0% p10 | 5.11 | pandas-ai v3.0.0 was discovered to contain a SQL injection vulnerability via the...pandas-ai v3.0.0 was discovered to contain a SQL injection vulnerability via the pandasai.agent.base._execute_sql_query component. |
2026-04-01 | |
| CVE-2026-2265 | 6.5 | MEDIUM | N/A | 0.1% p28 | 4.55 | An unauthenticated remote code execution (RCE) vulnerability exists in applicati...An unauthenticated remote code execution (RCE) vulnerability exists in applications that use the Replicator node package manager (npm) version 1.0.5 to deserialize untrusted user input and execute the resulting object. |
2026-04-01 | |
| CVE-2024-43028 | 9.8 | CRITICAL | CWE-77 | 0.8% p73 | 6.88 | A command injection vulnerability in the component /jmreport/show of jeecg boot ...A command injection vulnerability in the component /jmreport/show of jeecg boot v3.0.0 to v3.5.3 allows attackers to execute arbitrary code via a crafted HTTP request. |
2026-04-01 | |
| CVE-2024-40489 | 9.8 | CRITICAL | CWE-94 | 1.0% p77 | 6.89 | There is an injection vulnerability in jeecg boot versions 3.0.0 to 3.5.3 due to...There is an injection vulnerability in jeecg boot versions 3.0.0 to 3.5.3 due to lax character filtering, which allows attackers to execute arbitrary code on components through specially crafted HTTP requests. |
2026-04-01 | |
| CVE-2026-4829 | 5.4 | MEDIUM | CWE-287 | 0.0% p10 | 3.78 | Improper authentication in the external OAuth authentication flow in Devolutions...Improper authentication in the external OAuth authentication flow in Devolutions Server 2026.1.11 and earlier allows an authenticated user to authenticate as other users, including administrators, via reuse of a session code from an external authentication flow. |
2026-04-01 | |
| CVE-2026-4828 | 8.2 | HIGH | CWE-1390 | 0.0% p12 | 5.74 | Improper authentication in the OAuth login functionality in Devolutions Server 2...Improper authentication in the OAuth login functionality in Devolutions Server 2026.1.11 and earlier allows a remote attacker with valid credentials to bypass multi-factor authentication via a crafted login request. |
2026-04-01 | |
| CVE-2026-35099 | 7.4 | HIGH | CWE-362 | 0.0% p2 | 5.18 | Lakeside SysTrack Agent 11 before 11.5.0.15 has a race condition with resultant ...Lakeside SysTrack Agent 11 before 11.5.0.15 has a race condition with resultant local privilege escalation to SYSTEM. The fixed versions are 11.2.1.28, 11.3.0.38, 11.4.0.24, and 11.5.0.15. |
2026-04-01 | |
| CVE-2026-34510 | 6.9 | MEDIUM | CWE-41 | 0.1% p18 | 4.83 | OpenClaw before 2026.3.22 contains a path traversal vulnerability in Windows med...OpenClaw before 2026.3.22 contains a path traversal vulnerability in Windows media loaders that accepts remote-host file URLs and UNC-style paths before local-path validation. Attackers can exploit this by providing network-hosted file targets that are treated as local content, bypassing intended access restrictions. |
2026-04-01 | |
| CVE-2026-31027 | 9.8 | CRITICAL | CWE-120 | 0.8% p73 | 6.88 | TOTOlink A3600R v5.9c.4959 contains a buffer overflow vulnerability in the setAp...TOTOlink A3600R v5.9c.4959 contains a buffer overflow vulnerability in the setAppEasyWizardConfig interface of /lib/cste_modules/app.so. The vulnerability occurs because the rootSsid parameter is not properly validated for length, allowing remote attackers to trigger a buffer overflow, potentially leading to arbitrary code execution or denial of service. |
2026-04-01 | |
| CVE-2025-67807 | 4.7 | MEDIUM | CWE-204 | 0.0% p8 | 3.29 | The login mechanism of Sage DPW 2025_06_004 displays distinct responses for vali...The login mechanism of Sage DPW 2025_06_004 displays distinct responses for valid and invalid usernames, allowing enumeration of existing accounts in versions before 2021_06_000. On-premise administrators can toggle this behaviour in newer versions. |
2026-04-01 | |
| CVE-2025-67806 | 3.7 | LOW | CWE-203 | 0.0% p10 | 2.59 | The login mechanism of Sage DPW 2021_06_004 displays distinct responses for vali...The login mechanism of Sage DPW 2021_06_004 displays distinct responses for valid and invalid usernames, allowing enumeration of existing accounts in versions before 2021_06_000. On-premise administrators can toggle this behavior in newer versions. |
2026-04-01 | |
| CVE-2025-67805 | 5.9 | MEDIUM | CWE-306 | 0.0% p12 | 4.13 | A non-default configuration in Sage DPW 2025_06_004 allows unauthenticated acces...A non-default configuration in Sage DPW 2025_06_004 allows unauthenticated access to diagnostic endpoints within the Database Monitor feature, exposing sensitive information such as hashes and table names. This feature is disabled by default in all installations and never available in Sage DPW Cloud. It was forcibly disabled again in version 2025_06_003. |
2026-04-01 | |
| CVE-2026-30573 | 7.5 | HIGH | CWE-1284 | 0.0% p14 | 5.25 | A Business Logic vulnerability exists in SourceCodester Pharmacy Product Managem...A Business Logic vulnerability exists in SourceCodester Pharmacy Product Management System 1.0. The vulnerability is located in the add-sales.php file. The application fails to validate the "txtprice" and "txttotalcost" parameters, allowing attackers to submit negative values for sales transactions. This leads to incorrect financial calculations, corruption of sales reports, and potential financial loss. |
2026-04-01 | |
| CVE-2026-30526 | 6.1 | MEDIUM | CWE-79 | 0.0% p11 | 4.27 | A Reflected Cross-Site Scripting (XSS) vulnerability exists in SourceCodester Zo...A Reflected Cross-Site Scripting (XSS) vulnerability exists in SourceCodester Zoo Management System v1.0. The vulnerability is located in the login page, specifically within the msg parameter. The application reflects the content of the msg parameter back to the user without proper HTML encoding or sanitization. This allows remote attackers to inject arbitrary web script or HTML via a crafted URL. |
2026-04-01 | |
| CVE-2026-30523 | 6.5 | MEDIUM | CWE-20 | 0.1% p18 | 4.55 | A Business Logic vulnerability exists in SourceCodester Loan Management System v...A Business Logic vulnerability exists in SourceCodester Loan Management System v1.0 due to the lack of proper input validation. The application allows administrators to define "Loan Plans" which determine the duration of a loan (in months). However, the backend fails to validate that the duration must be a positive integer. An attacker can submit a negative value for the months parameter. The system accepts this invalid data and creates a loan plan with a negative duration. |
2026-04-01 | |
| CVE-2026-30292 | 8.4 | HIGH | CWE-73 | 0.0% p4 | 5.88 | An arbitrary file overwrite vulnerability in Docudepot PDF Reader: PDF Viewer AP...An arbitrary file overwrite vulnerability in Docudepot PDF Reader: PDF Viewer APP v1.0.34 allows attackers to overwrite critical internal files via the file import process, leading to arbitrary code execution or information exposure. |
2026-04-01 | |
| CVE-2026-30291 | 8.4 | HIGH | CWE-73 | 0.0% p4 | 5.88 | An arbitrary file overwrite vulnerability in Ora Tools PDF Reader ' Reader & Edi...An arbitrary file overwrite vulnerability in Ora Tools PDF Reader ' Reader & Editor APPv4.3.5 allows attackers to overwrite critical internal files via the file import process, leading to arbitrary code execution or information exposure. |
2026-04-01 | |
| CVE-2026-29598 | 5.4 | MEDIUM | CWE-79 | 0.0% p8 | 3.78 | Multiple stored cross-site scripting (XSS) vulnerabilities in the submit_add_use...Multiple stored cross-site scripting (XSS) vulnerabilities in the submit_add_user.asp endpoint of DDSN Interactive Acora CMS v10.7.1 allow attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the First Name and Last Name parameters. |
2026-04-01 | |
| CVE-2025-13535 | 6.4 | MEDIUM | CWE-79 | 0.1% p19 | 4.48 | The King Addons for Elementor plugin for WordPress is vulnerable to multiple Con...The King Addons for Elementor plugin for WordPress is vulnerable to multiple Contributor+ DOM-Based Stored Cross-Site Scripting vulnerabilities in all versions up to, and including, 51.1.38. This is due to insufficient input sanitization and output escaping across multiple widgets and features. The plugin uses esc_attr() and esc_url() within JavaScript inline event handlers (onclick attributes), which allows HTML entities to be decoded by the DOM, enabling attackers to break out of the JavaScript context. Additionally, several JavaScript files use unsafe DOM manipulation methods (template literals, .html(), and window.location.href with unvalidated URLs) with user-controlled data. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts via Elementor widget settings that execute when a user accesses the injected page or when an administrator previews the page in Elementor's editor. The vulnerability was partially patched in version 5.1.51. |
2026-04-01 | |
| CVE-2026-3877 | 7.3 | HIGH | CWE-79 | 0.0% p8 | 5.11 | A reflected cross-site scripting (XSS) vulnerability in the dashboard search fun...A reflected cross-site scripting (XSS) vulnerability in the dashboard search functionality of the VertiGIS FM solution allows attackers to craft a malicious URL, that if visited by an authenticated victim, will execute arbitrary JavaScript in the victim's context. Such a URL could be delivered through various means, for instance, by sending a link or by tricking victims to visit a page crafted by the attacker. |
2026-04-01 | |
| CVE-2026-35094 | 3.3 | LOW | CWE-825 | 0.0% p2 | 2.31 | A flaw was found in libinput. An attacker capable of deploying a Lua plugin file...A flaw was found in libinput. An attacker capable of deploying a Lua plugin file in specific system directories can exploit a dangling pointer vulnerability. This occurs when a garbage collection cleanup function is called, leaving a pointer that can then be printed to system logs. This could potentially expose sensitive data if the memory location is re-used, leading to information disclosure. For this exploit to work, Lua plugins must be enabled in libinput and loaded by the compositor. |
2026-04-01 | |
| CVE-2026-35093 | 8.8 | HIGH | CWE-94 | 0.0% p4 | 6.16 | A flaw was found in libinput. A local attacker who can place a specially crafted...A flaw was found in libinput. A local attacker who can place a specially crafted Lua bytecode file in certain system or user configuration directories can bypass security restrictions. This allows the attacker to run unauthorized code with the same permissions as the program using libinput, such as a graphical compositor. This could lead to the attacker monitoring keyboard input and sending that information to an external location. |
2026-04-01 | |
| CVE-2026-35092 | 7.5 | HIGH | CWE-190 | 1.0% p76 | 5.28 | A flaw was found in Corosync. An integer overflow vulnerability in Corosync's jo...A flaw was found in Corosync. An integer overflow vulnerability in Corosync's join message sanity validation allows a remote, unauthenticated attacker to send crafted User Datagram Protocol (UDP) packets. This can cause the service to crash, leading to a denial of service. This vulnerability specifically affects Corosync deployments configured to use totemudp/totemudpu mode. |
2026-04-01 | |
| CVE-2026-35091 | 8.2 | HIGH | CWE-253 | 0.3% p56 | 5.75 | A flaw was found in Corosync. A remote unauthenticated attacker can exploit a wr...A flaw was found in Corosync. A remote unauthenticated attacker can exploit a wrong return value vulnerability in the Corosync membership commit token sanity check by sending a specially crafted User Datagram Protocol (UDP) packet. This can lead to an out-of-bounds read, causing a denial of service (DoS) and potentially disclosing limited memory contents. This vulnerability affects Corosync when running in totemudp/totemudpu mode, which is the default configuration. |
2026-04-01 | |
| CVE-2026-34999 | 6.9 | MEDIUM | CWE-306 | 0.1% p19 | 4.83 | OpenViking versions 0.2.5 prior to 0.2.14 contain a missing authentication vulne...OpenViking versions 0.2.5 prior to 0.2.14 contain a missing authentication vulnerability in the bot proxy router that allows remote unauthenticated attackers to access protected bot proxy functionality by sending requests to the POST /bot/v1/chat and POST /bot/v1/chat/stream endpoints. Attackers can bypass authentication checks and interact directly with the upstream bot backend through the OpenViking proxy without providing valid credentials. |
2026-04-01 | |
| CVE-2026-34430 | 8.6 | HIGH | CWE-184 | 0.1% p28 | 6.02 | ByteDance Deer-Flow versions prior to commit 92c7a20 contain a sandbox escape vu...ByteDance Deer-Flow versions prior to commit 92c7a20 contain a sandbox escape vulnerability in bash tool handling that allows attackers to execute arbitrary commands on the host system by bypassing regex-based validation using shell features such as directory changes and relative paths. Attackers can exploit the incomplete shell semantics modeling to read and modify files outside the sandbox boundary and achieve arbitrary command execution through subprocess invocation with shell interpretation enabled. |
2026-04-01 | |
| CVE-2026-30522 | 6.5 | MEDIUM | CWE-602 | 0.0% p12 | 4.55 | A Business Logic vulnerability exists in SourceCodester Loan Management System v...A Business Logic vulnerability exists in SourceCodester Loan Management System v1.0 due to improper server-side validation. The application allows administrators to create "Loan Plans" with specific penalty rates for overdue payments. While the frontend interface prevents users from entering negative numbers in the "Monthly Overdue Penalty" field, this constraint is not enforced on the backend. An authenticated attacker can bypass the client-side restriction by manipulating the HTTP POST request to submit a negative value for the penalty_rate. |
2026-04-01 | |
| CVE-2026-30289 | 8.4 | HIGH | CWE-73 | 0.0% p1 | 5.88 | An arbitrary file overwrite vulnerability in Tinybeans Private Family Album App ...An arbitrary file overwrite vulnerability in Tinybeans Private Family Album App v5.9.5-prod allows attackers to overwrite critical internal files via the file import process, leading to arbitrary code execution or information exposure. |
2026-04-01 | |
| CVE-2026-30287 | 8.4 | HIGH | CWE-73 | 0.0% p1 | 5.88 | An arbitrary file overwrite vulnerability in Deep Thought Industries ACE Scanner...An arbitrary file overwrite vulnerability in Deep Thought Industries ACE Scanner PDF Scanner v1.4.5 allows attackers to overwrite critical internal files via the file import process, leading to arbitrary code execution or information exposure. |
2026-04-01 | |
| CVE-2026-29014 | 9.3 | CRITICAL | CWE-94 | 15.8% p94 | 6.98 | MetInfo CMS versions 7.9, 8.0, and 8.1 contain an unauthenticated PHP code injec...MetInfo CMS versions 7.9, 8.0, and 8.1 contain an unauthenticated PHP code injection vulnerability that allows remote attackers to execute arbitrary code by sending crafted requests with malicious PHP code. Attackers can exploit insufficient input neutralization in the execution path to achieve remote code execution and gain full control over the affected server. |
2026-04-01 | |
| CVE-2026-22768 | 7.3 | HIGH | CWE-732 | 0.0% p1 | 5.11 | Dell AppSync, version(s) 4.6.0, contain(s) an Incorrect Permission Assignment fo...Dell AppSync, version(s) 4.6.0, contain(s) an Incorrect Permission Assignment for Critical Resource vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges. |
2026-04-01 | |
| CVE-2026-22767 | 7.3 | HIGH | CWE-61 | 0.0% p2 | 5.11 | Dell AppSync, version(s) 4.6.0, contain(s) an UNIX Symbolic Link (Symlink) Follo...Dell AppSync, version(s) 4.6.0, contain(s) an UNIX Symbolic Link (Symlink) Following vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Information tampering. |
2026-04-01 | |
| CVE-2026-24096 | 5.3 | MEDIUM | CWE-280 | 0.0% p14 | 3.71 | Insufficient permission validation on multiple REST API Quick Setup endpoints in...Insufficient permission validation on multiple REST API Quick Setup endpoints in Checkmk 2.5.0 (beta) before version 2.5.0b2 and 2.4.0 before version 2.4.0p25 allows low-privileged users to perform unauthorized actions or obtain sensitive information |
2026-04-01 | |
| CVE-2026-0932 | 6.9 | MEDIUM | CWE-918 | 0.1% p20 | 4.83 | Blind server-side request forgery (SSRF) vulnerability in legacy connection meth...Blind server-side request forgery (SSRF) vulnerability in legacy connection methods of document co-authoring features in M-Files Server before 26.3 allow an unauthenticated attacker to cause the server to send HTTP GET requests to arbitrary URLs. |
2026-04-01 | |
| CVE-2026-23899 | 8.6 | HIGH | CWE-284 | 0.0% p0 | 6.02 | An improper access check allows unauthorized access to webservice endpoints.An improper access check allows unauthorized access to webservice endpoints. |
2026-04-01 | |
| CVE-2026-23898 | 8.6 | HIGH | CWE-73 | 0.0% p0 | 6.02 | Lack of input validation leads to an arbitrary file deletion vulnerability in th...Lack of input validation leads to an arbitrary file deletion vulnerability in the autoupdate server mechanism. |
2026-04-01 | |
| CVE-2026-21632 | 5.9 | MEDIUM | CWE-79 | 0.0% p0 | 4.13 | Lack of output escaping for article titles leads to XSS vectors in various locat...Lack of output escaping for article titles leads to XSS vectors in various locations. |
2026-04-01 | |
| CVE-2026-21631 | 5.9 | MEDIUM | CWE-79 | 0.0% p0 | 4.13 | Lack of output escaping leads to a XSS vector in the multilingual associations c...Lack of output escaping leads to a XSS vector in the multilingual associations component. |
2026-04-01 | |
| CVE-2026-21630 | 6.9 | MEDIUM | CWE-89 | 0.0% p0 | 4.83 | Improperly built order clauses lead to a SQL injection vulnerability in the arti...Improperly built order clauses lead to a SQL injection vulnerability in the articles webservice endpoint. |
2026-04-01 | |
| CVE-2026-21629 | 6.3 | MEDIUM | CWE-284 | 0.0% p0 | 4.41 | The ajax component was excluded from the default logged-in-user check in the adm...The ajax component was excluded from the default logged-in-user check in the administrative area. This behavior was potentially unexpected by 3rd party developers. |
2026-04-01 | |
| CVE-2026-1879 | 5.3 | MEDIUM | CWE-284 | 0.0% p2 | 3.71 | A vulnerability was detected in Harvard University IQSS Dataverse up to 6.8. Thi...A vulnerability was detected in Harvard University IQSS Dataverse up to 6.8. This affects an unknown function of the file /ThemeAndWidgets.xhtml of the component Theme Customization. Performing a manipulation of the argument uploadLogo results in unrestricted upload. Remote exploitation of the attack is possible. The exploit is now public and may be used. Upgrading to version 6.10 mitigates this issue. You should upgrade the affected component. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product. |
2026-04-01 | |
| CVE-2026-5261 | 6.9 | MEDIUM | CWE-284 | 0.1% p15 | 4.83 | A vulnerability was identified in Shandong Hoteam InforCenter PLM up to 8.3.8. T...A vulnerability was identified in Shandong Hoteam InforCenter PLM up to 8.3.8. The impacted element is the function uploadFileToIIS of the file /Base/BaseHandler.ashx. The manipulation of the argument File leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-04-01 | |
| CVE-2026-4370 | 10.0 | CRITICAL | CWE-295 | 0.1% p21 | 7.00 | A vulnerability was identified in Juju from version 3.2.0 until 3.6.19 and from ...A vulnerability was identified in Juju from version 3.2.0 until 3.6.19 and from version 4.0 until 4.0.4, where the internal Dqlite database cluster fails to perform proper TLS client and server authentication. Specifically, the Juju controller's database endpoint does not validate client certificates when a new node attempts to join the cluster. An unauthenticated attacker with network reachability to the Juju controller's Dqlite port can exploit this flaw to join the database cluster. Once joined, the attacker gains full read and write access to the underlying database, allowing for total data compromise. |
2026-04-01 | |
| CVE-2026-34889 | 6.5 | MEDIUM | CWE-79 | 0.0% p9 | 4.55 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Brainstorm Force Ultimate Addons for WPBakery Page Builder allows DOM-Based XSS.This issue affects Ultimate Addons for WPBakery Page Builder: from n/a before 3.21.4. |
2026-04-01 | |
| CVE-2026-5259 | 5.3 | MEDIUM | CWE-918 | 0.0% p11 | 3.71 | A vulnerability was determined in AutohomeCorp frostmourne up to 1.0. The affect...A vulnerability was determined in AutohomeCorp frostmourne up to 1.0. The affected element is an unknown function of the file frostmourne-monitor/src/main/java/com/autohome/frostmourne/monitor/controller/AlarmController.java of the component Alarm Preview. Executing a manipulation can lead to server-side request forgery. The attack may be performed from remote. The exploit has been publicly disclosed and may be utilized. |
2026-04-01 | |
| CVE-2026-28265 | 4.4 | MEDIUM | CWE-35 | 0.0% p2 | 3.08 | PowerStore, contains a Path Traversal vulnerability in the Service user. A low p...PowerStore, contains a Path Traversal vulnerability in the Service user. A low privileged attacker with local access could potentially exploit this vulnerability, leading to modification of arbitrary system files. |
2026-04-01 | |
| CVE-2026-27101 | 4.7 | MEDIUM | CWE-22 | 0.3% p54 | 3.30 | Dell Secure Connect Gateway (SCG) 5.0 Appliance and Application version(s) 5.28....Dell Secure Connect Gateway (SCG) 5.0 Appliance and Application version(s) 5.28.00.xx to 5.32.00.xx, contain(s) an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability. A high privileged attacker within the management network could potentially exploit this vulnerability, leading to remote execution. |
2026-04-01 | |
| CVE-2026-5258 | 6.9 | MEDIUM | CWE-22 | 0.1% p30 | 4.83 | A vulnerability was found in Sanster IOPaint 1.5.3. Impacted is the function _ge...A vulnerability was found in Sanster IOPaint 1.5.3. Impacted is the function _get_file of the file iopaint/file_manager/file_manager.py of the component File Manager. Performing a manipulation of the argument filename results in path traversal. The attack is possible to be carried out remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-04-01 | |
| CVE-2026-5257 | 6.9 | MEDIUM | CWE-74 | 0.0% p10 | 4.83 | A vulnerability has been found in code-projects Simple Laundry System 1.0. This ...A vulnerability has been found in code-projects Simple Laundry System 1.0. This issue affects some unknown processing of the file /delstaffinfo.php of the component Parameter Handler. Such manipulation of the argument userid leads to sql injection. The attack can be executed remotely. The exploit has been disclosed to the public and may be used. |
2026-04-01 | |
| CVE-2026-5256 | 6.9 | MEDIUM | CWE-74 | 0.0% p10 | 4.83 | A flaw has been found in code-projects Simple Laundry System 1.0. This vulnerabi...A flaw has been found in code-projects Simple Laundry System 1.0. This vulnerability affects unknown code of the file /modify.php of the component Parameter Handler. This manipulation of the argument firstName causes sql injection. Remote exploitation of the attack is possible. The exploit has been published and may be used. |
2026-04-01 | |
| CVE-2026-5255 | 5.3 | MEDIUM | CWE-79 | 0.0% p9 | 3.71 | A vulnerability was detected in code-projects Simple Laundry System 1.0. This af...A vulnerability was detected in code-projects Simple Laundry System 1.0. This affects an unknown part of the file /delstaffinfo.php of the component Parameter Handler. The manipulation of the argument userid results in cross site scripting. The attack may be launched remotely. The exploit is now public and may be used. |
2026-04-01 | |
| CVE-2026-2696 | 5.3 | MEDIUM | CWE-200 | 0.0% p11 | 3.71 | The Export All URLs WordPress plugin before 5.1 generates CSV filenames containi...The Export All URLs WordPress plugin before 5.1 generates CSV filenames containing posts URLS (including private posts) in a predictable pattern using a random 6-digit number. These files are stored in the publicly accessible wp-content/uploads/ directory. As a result, any unauthenticated user can brute-force the filenames to gain access to sensitive data contained within the exported files. |
2026-04-01 | |
| CVE-2025-15484 | 9.1 | CRITICAL | CWE-287 | 0.0% p11 | 6.37 | The Order Notification for WooCommerce WordPress plugin before 3.6.3 overrides ...The Order Notification for WooCommerce WordPress plugin before 3.6.3 overrides WooCommerce's permission checks to grant full access to all unauthenticated requests, enabling complete read/write access to store resources like products, coupons, and customers. |
2026-04-01 | |
| CVE-2026-5292 | 8.8 | HIGH | CWE-125 | 0.1% p19 | 6.16 | Out of bounds read in WebCodecs in Google Chrome prior to 146.0.7680.178 allowed...Out of bounds read in WebCodecs in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: Medium) |
2026-04-01 | |
| CVE-2026-5291 | 6.5 | MEDIUM | CWE-200 | 0.0% p7 | 4.55 | Inappropriate implementation in WebGL in Google Chrome prior to 146.0.7680.178 a...Inappropriate implementation in WebGL in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page. (Chromium security severity: Medium) |
2026-04-01 | |
| CVE-2026-5290 | 9.6 | CRITICAL | CWE-416 | 0.1% p20 | 6.72 | Use after free in Compositing in Google Chrome prior to 146.0.7680.178 allowed a...Use after free in Compositing in Google Chrome prior to 146.0.7680.178 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High) |
2026-04-01 | |
| CVE-2026-5289 | 9.6 | CRITICAL | CWE-416 | 0.1% p20 | 6.72 | Use after free in Navigation in Google Chrome prior to 146.0.7680.178 allowed a ...Use after free in Navigation in Google Chrome prior to 146.0.7680.178 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High) |
2026-04-01 | |
| CVE-2026-5288 | 9.6 | CRITICAL | CWE-416 | 0.1% p19 | 6.72 | Use after free in WebView in Google Chrome on Android prior to 146.0.7680.178 al...Use after free in WebView in Google Chrome on Android prior to 146.0.7680.178 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High) |
2026-04-01 | |
| CVE-2026-5287 | 8.8 | HIGH | CWE-416 | 0.1% p23 | 6.16 | Use after free in PDF in Google Chrome prior to 146.0.7680.178 allowed a remote ...Use after free in PDF in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted PDF file. (Chromium security severity: High) |
2026-04-01 | |
| CVE-2026-5286 | 8.8 | HIGH | CWE-416 | 0.1% p23 | 6.16 | Use after free in Dawn in Google Chrome prior to 146.0.7680.178 allowed a remote...Use after free in Dawn in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High) |
2026-04-01 | |
| CVE-2026-5285 | 8.8 | HIGH | CWE-416 | 0.1% p21 | 6.16 | Use after free in WebGL in Google Chrome prior to 146.0.7680.178 allowed a remot...Use after free in WebGL in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High) |
2026-04-01 | |
| CVE-2026-5284 | 7.5 | HIGH | CWE-416 | 0.1% p23 | 5.25 | Use after free in Dawn in Google Chrome prior to 146.0.7680.178 allowed a remote...Use after free in Dawn in Google Chrome prior to 146.0.7680.178 allowed a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page. (Chromium security severity: High) |
2026-04-01 | |
| CVE-2026-5283 | 6.5 | MEDIUM | CWE-285 | 0.0% p2 | 4.55 | Inappropriate implementation in ANGLE in Google Chrome prior to 146.0.7680.178 a...Inappropriate implementation in ANGLE in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: High) |
2026-04-01 | |
| CVE-2026-5282 | 8.1 | HIGH | CWE-125 | 0.1% p19 | 5.67 | Out of bounds read in WebCodecs in Google Chrome prior to 146.0.7680.178 allowed...Out of bounds read in WebCodecs in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High) |
2026-04-01 | |
| CVE-2026-5281 | 8.8 | HIGH | CWE-416 | ✓ | 3.3% p87 | 6.26 | Use after free in Dawn in Google Chrome prior to 146.0.7680.178 allowed a remote...Use after free in Dawn in Google Chrome prior to 146.0.7680.178 allowed a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page. (Chromium security severity: High) |
2026-04-01 |
| CVE-2026-5280 | 8.8 | HIGH | CWE-416 | 0.1% p21 | 6.16 | Use after free in WebCodecs in Google Chrome prior to 146.0.7680.178 allowed a r...Use after free in WebCodecs in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High) |
2026-04-01 | |
| CVE-2026-5279 | 8.8 | HIGH | CWE-120 | 0.1% p23 | 6.16 | Object corruption in V8 in Google Chrome prior to 146.0.7680.178 allowed a remot...Object corruption in V8 in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High) |
2026-04-01 | |
| CVE-2026-5278 | 8.8 | HIGH | CWE-416 | 0.1% p21 | 6.16 | Use after free in Web MIDI in Google Chrome on Android prior to 146.0.7680.178 a...Use after free in Web MIDI in Google Chrome on Android prior to 146.0.7680.178 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High) |
2026-04-01 | |
| CVE-2026-5277 | 7.5 | HIGH | CWE-472 | 0.1% p24 | 5.25 | Integer overflow in ANGLE in Google Chrome on Windows prior to 146.0.7680.178 al...Integer overflow in ANGLE in Google Chrome on Windows prior to 146.0.7680.178 allowed a remote attacker who had compromised the renderer process to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High) |
2026-04-01 | |
| CVE-2026-5276 | 6.5 | MEDIUM | CWE-693 | 0.0% p13 | 4.55 | Insufficient policy enforcement in WebUSB in Google Chrome prior to 146.0.7680.1...Insufficient policy enforcement in WebUSB in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page. (Chromium security severity: High) |
2026-04-01 | |
| CVE-2026-5275 | 8.8 | HIGH | CWE-122 | 0.1% p21 | 6.16 | Heap buffer overflow in ANGLE in Google Chrome on Mac prior to 146.0.7680.178 al...Heap buffer overflow in ANGLE in Google Chrome on Mac prior to 146.0.7680.178 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High) |
2026-04-01 | |
| CVE-2026-5274 | 8.8 | HIGH | CWE-472 | 0.1% p20 | 6.16 | Integer overflow in Codecs in Google Chrome prior to 146.0.7680.178 allowed a re...Integer overflow in Codecs in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High) |
2026-04-01 | |
| CVE-2026-5273 | 6.3 | MEDIUM | CWE-416 | 0.1% p20 | 4.41 | Use after free in CSS in Google Chrome prior to 146.0.7680.178 allowed a remote ...Use after free in CSS in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High) |
2026-04-01 | |
| CVE-2026-5272 | 8.8 | HIGH | CWE-122 | 0.0% p6 | 6.16 | Heap buffer overflow in GPU in Google Chrome prior to 146.0.7680.178 allowed a r...Heap buffer overflow in GPU in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High) |
2026-04-01 | |
| CVE-2026-5254 | 5.1 | MEDIUM | CWE-79 | 0.0% p0 | 3.57 | A security vulnerability has been detected in welovemedia FFmate up to 2.0.15. A...A security vulnerability has been detected in welovemedia FFmate up to 2.0.15. Affected by this issue is some unknown functionality of the file /ui/app/components/AppJsonTreeView.vue of the component Webhook Handler. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-04-01 | |
| CVE-2026-5253 | 5.1 | MEDIUM | CWE-79 | 0.0% p8 | 3.57 | A weakness has been identified in bufanyun HotGo 1.0/2.0. Affected by this vulne...A weakness has been identified in bufanyun HotGo 1.0/2.0. Affected by this vulnerability is an unknown functionality of the file /web/src/layout/components/Header/MessageList.vue of the component editNotice Endpoint. Executing a manipulation can lead to cross site scripting. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-04-01 | |
| CVE-2026-5252 | 5.1 | MEDIUM | CWE-79 | 0.0% p1 | 3.57 | A security flaw has been discovered in z-9527 admin 1.0/2.0. Affected is an unkn...A security flaw has been discovered in z-9527 admin 1.0/2.0. Affected is an unknown function of the file /server/routes/message.js of the component Message Create Endpoint. Performing a manipulation results in cross site scripting. The attack can be initiated remotely. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-04-01 | |
| CVE-2026-5251 | 5.3 | MEDIUM | CWE-913 | 0.1% p16 | 3.71 | A vulnerability was identified in z-9527 admin 1.0/2.0. This impacts an unknown ...A vulnerability was identified in z-9527 admin 1.0/2.0. This impacts an unknown function of the file /server/routes/user.js of the component User Update Endpoint. Such manipulation of the argument isAdmin with the input 1 leads to dynamically-determined object attributes. It is possible to launch the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-04-01 | |
| CVE-2026-5249 | 5.1 | MEDIUM | CWE-79 | 0.0% p8 | 3.57 | A vulnerability was found in gougucms 4.08.18. This impacts an unknown function ...A vulnerability was found in gougucms 4.08.18. This impacts an unknown function of the file \gougucms-master\app\admin\view\user\record.html of the component Record Endpoint. Performing a manipulation of the argument value.content results in cross site scripting. It is possible to initiate the attack remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-04-01 | |
| CVE-2026-4947 | 7.1 | HIGH | CWE-284 | 0.0% p8 | 4.97 | Addressed a potential insecure direct object reference (IDOR) vulnerability in t...Addressed a potential insecure direct object reference (IDOR) vulnerability in the signing invitation acceptance process. Under certain conditions, this issue could have allowed an attacker to access or modify unauthorized resources by manipulating user-supplied object identifiers, potentially leading to forged signatures and compromising the integrity and authenticity of documents undergoing the signing process. The issue was caused by insufficient authorization validation on referenced resources during request processing. |
2026-04-01 | |
| CVE-2026-4374 | 8.8 | HIGH | CWE-611 | 0.0% p14 | 6.16 | Improper Restriction of XML External Entity Reference vulnerability in RTI Conne...Improper Restriction of XML External Entity Reference vulnerability in RTI Connext Professional (Routing Service,Observability Collector,Recording Service,Queueing Service,Cloud Discovery Service) allows Serialized Data External Linking, Data Serializat... |
2026-04-01 | |
| CVE-2026-3831 | 4.3 | MEDIUM | CWE-862 | 0.0% p9 | 3.01 | The Database for Contact Form 7, WPforms, Elementor forms plugin for WordPress i...The Database for Contact Form 7, WPforms, Elementor forms plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the entries_shortcode() function in all versions up to, and including, 1.4.9. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract all form submissions - including names, emails, phone numbers. |
2026-04-01 | |
| CVE-2026-3780 | 7.3 | HIGH | CWE-426 | 0.0% p1 | 5.11 | The application's installer runs with elevated privileges but resolves system ex...The application's installer runs with elevated privileges but resolves system executables and DLLs using untrusted search paths that can include user-writable directories, allowing a local attacker to place malicious binaries with the same names and have them loaded or executed instead of the legitimate system files, resulting in local privilege escalation. |
2026-04-01 | |
| CVE-2026-3779 | 7.8 | HIGH | CWE-416 | 0.0% p5 | 5.46 | The application's list box calculate array logic keeps stale references to page ...The application's list box calculate array logic keeps stale references to page or form objects after they are deleted or re-created, which allows crafted documents to trigger a use-after-free when the calculation runs and can potentially lead to arbitrary code execution. |
2026-04-01 | |
| CVE-2026-3778 | 6.2 | MEDIUM | CWE-674 | 0.0% p2 | 4.34 | The application does not detect or guard against cyclic PDF object references wh...The application does not detect or guard against cyclic PDF object references while handling JavaScript in PDF. When pages and annotations are crafted that reference each other in a loop, passing the document to APIs (e.g., SOAP) that perform deep traversal can cause uncontrolled recursion, stack exhaustion, and application crashes. |
2026-04-01 | |
| CVE-2026-3777 | 5.5 | MEDIUM | CWE-416 | 0.0% p3 | 3.85 | The application does not properly validate the lifetime and validity of internal...The application does not properly validate the lifetime and validity of internal view cache pointers after JavaScript changes the document zoom and page state. When a script modifies the zoom property and then triggers a page change, the original view object may be destroyed while stale pointers are still kept and later dereferenced, which under crafted JavaScript and document structures can lead to a use-after-free condition and potentially allow arbitrary code execution. |
2026-04-01 | |
| CVE-2026-3776 | 5.5 | MEDIUM | CWE-476 | 0.0% p3 | 3.85 | The application does not validate the presence of required appearance (AP) data ...The application does not validate the presence of required appearance (AP) data before accessing stamp annotation resources. When a PDF contains a stamp annotation missing its AP entry, the code continues to dereference the associated object without a prior null or validity check, which allows a crafted document to trigger a null pointer dereference and crash the application, resulting in denial of service. |
2026-04-01 | |
| CVE-2026-3775 | 7.8 | HIGH | CWE-427 | 0.0% p2 | 5.46 | The application's update service, when checking for updates, loads certain syste...The application's update service, when checking for updates, loads certain system libraries from a search path that includes directories writable by low‑privileged users and is not strictly restricted to trusted system locations. Because these libraries may be resolved and loaded from user‑writable locations, a local attacker can place a malicious library there and have it loaded with SYSTEM privileges, resulting in local privilege escalation and arbitrary code execution. |
2026-04-01 | |
| CVE-2026-3774 | 4.7 | MEDIUM | CWE-200 | 0.0% p3 | 3.29 | The application allows PDF JavaScript and document/print actions (such as WillPr...The application allows PDF JavaScript and document/print actions (such as WillPrint/DidPrint) to update form fields, annotations, or optional content groups (OCGs) immediately before or after redaction, encryption, or printing. These script‑driven updates are not fully covered by the existing redaction, encryption, and printing logic, which, under specific document structures and user workflows, may cause a small amount of sensitive content to remain unremoved or unencrypted as expected, or result in printed output that slightly differs from what was reviewed on screen. |
2026-04-01 | |
| CVE-2026-5248 | 5.3 | MEDIUM | CWE-913 | 0.1% p16 | 3.71 | A vulnerability has been found in gougucms 4.08.18. This affects the function re...A vulnerability has been found in gougucms 4.08.18. This affects the function reg_submit of the file gougucms-master\app\home\controller\Login.php of the component User Registration Handler. Such manipulation of the argument level leads to dynamically-determined object attributes. The attack may be performed from remote. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-04-01 | |
| CVE-2026-35057 | 5.1 | MEDIUM | CWE-79 | 0.0% p8 | 3.57 | XenForo before 2.3.10 and before 2.2.19 is vulnerable to stored cross-site scrip...XenForo before 2.3.10 and before 2.2.19 is vulnerable to stored cross-site scripting (XSS) in structured text mentions, primarily affecting legacy profile post content. An attacker can inject malicious scripts through crafted mentions that are stored and executed when other users view the content. |
2026-04-01 | |
| CVE-2026-35056 | 8.6 | HIGH | CWE-94 | 0.4% p62 | 6.03 | XenForo before 2.3.9 and before 2.2.18 allows remote code execution (RCE) by aut...XenForo before 2.3.9 and before 2.2.18 allows remote code execution (RCE) by authenticated, but malicious, admin users. An attacker with admin panel access can execute arbitrary code on the server. |
2026-04-01 | |
| CVE-2026-35055 | 5.1 | MEDIUM | CWE-79 | 0.0% p8 | 3.57 | XenForo before 2.3.9 and before 2.2.18 is vulnerable to cross-site scripting (XS...XenForo before 2.3.9 and before 2.2.18 is vulnerable to cross-site scripting (XSS) related to lightbox usage in posts. An attacker can inject malicious scripts that execute when users interact with post content displayed in the lightbox. |
2026-04-01 | |
| CVE-2026-35054 | 5.1 | MEDIUM | CWE-79 | 0.0% p8 | 3.57 | XenForo before 2.3.9 is vulnerable to stored cross-site scripting (XSS) related ...XenForo before 2.3.9 is vulnerable to stored cross-site scripting (XSS) related to BB code rendering. An attacker can inject malicious scripts through BB code that are stored and executed when other users view the content. |
2026-04-01 | |
| CVE-2026-2394 | 6.3 | MEDIUM | CWE-126 | 0.0% p9 | 4.41 | Buffer Over-read vulnerability in RTI Connext Professional (Core Libraries) allo...Buffer Over-read vulnerability in RTI Connext Professional (Core Libraries) allows Overread Buffers.This issue affects Connext Professional: from 7.4.0 before 7.7.0, from 7.0.0 before 7.3.1.1, from 6.1.0 before 6.1.*, from 6.0.0 before 6.0.*, from 5.3.0 before 5.3.*, from 4.3x before 5.2.*. |
2026-04-01 | |
| CVE-2025-71282 | 8.7 | HIGH | CWE-209 | 0.0% p12 | 6.09 | XenForo before 2.3.7 discloses filesystem paths through exception messages trigg...XenForo before 2.3.7 discloses filesystem paths through exception messages triggered by open_basedir restrictions. This allows an attacker to obtain information about the server's directory structure. |
2026-04-01 | |
| CVE-2025-71281 | 8.7 | HIGH | CWE-94 | 0.1% p16 | 6.09 | XenForo before 2.3.7 does not properly restrict methods callable from within tem...XenForo before 2.3.7 does not properly restrict methods callable from within templates. A loose prefix match was used instead of a stricter first-word match for methods accessible through callbacks and variable method calls in templates, potentially allowing unauthorized method invocations. |
2026-04-01 | |
| CVE-2025-71280 | 6.9 | MEDIUM | CWE-200 | 0.0% p2 | 4.83 | XenForo before 2.3.7 allows information disclosure via local account page cachin...XenForo before 2.3.7 allows information disclosure via local account page caching on shared systems. On systems where multiple users share a browser or machine, cached account pages could expose sensitive user information to other local users. |
2026-04-01 | |
| CVE-2025-71279 | 9.3 | CRITICAL | CWE-287 | 0.1% p28 | 6.51 | XenForo before 2.3.7 contains a security issue affecting Passkeys that have been...XenForo before 2.3.7 contains a security issue affecting Passkeys that have been added to user accounts. An attacker may be able to compromise the security of Passkey-based authentication. |
2026-04-01 | |
| CVE-2025-71278 | 8.7 | HIGH | CWE-863 | 0.0% p13 | 6.09 | XenForo before 2.3.5 allows OAuth2 client applications to request unauthorized s...XenForo before 2.3.5 allows OAuth2 client applications to request unauthorized scopes. This affects any customer using OAuth2 clients on any version of XenForo 2.3 prior to 2.3.5, potentially allowing client applications to gain access beyond their intended authorization level. |
2026-04-01 | |
| CVE-2025-13855 | 7.6 | HIGH | CWE-89 | 0.1% p28 | 5.32 | IBM Storage Protect Server 8.2.0 IBM Storage Protect Plus Server is vulnerable t...IBM Storage Protect Server 8.2.0 IBM Storage Protect Plus Server is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify, or delete information in the back-end database. |
2026-04-01 | |
| CVE-2024-58342 | 5.3 | MEDIUM | CWE-601 | 0.0% p8 | 3.71 | XenForo before 2.2.17 and 2.3.1 allows open redirect via a specially crafted URL...XenForo before 2.2.17 and 2.3.1 allows open redirect via a specially crafted URL. The getDynamicRedirect() function does not adequately validate the redirect target, allowing attackers to redirect users to arbitrary external sites using crafted URLs containing newlines, user credentials, or host mismatches. |
2026-04-01 | |
| CVE-2026-5240 | 5.3 | MEDIUM | CWE-79 | 0.0% p10 | 3.71 | A security vulnerability has been detected in code-projects BloodBank Managing S...A security vulnerability has been detected in code-projects BloodBank Managing System 1.0. This affects an unknown part of the file /admin_state.php. The manipulation of the argument statename leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used. |
2026-04-01 | |
| CVE-2026-5238 | 6.9 | MEDIUM | CWE-74 | 0.0% p11 | 4.83 | A weakness has been identified in itsourcecode Payroll Management System 1.0. Af...A weakness has been identified in itsourcecode Payroll Management System 1.0. Affected by this issue is some unknown functionality of the file /view_employee.php of the component Parameter Handler. Executing a manipulation of the argument ID can lead to sql injection. The attack may be performed from remote. The exploit has been made available to the public and could be used for attacks. |
2026-04-01 | |
| CVE-2026-4668 | 6.5 | MEDIUM | CWE-89 | 0.0% p1 | 4.55 | The Booking for Appointments and Events Calendar - Amelia plugin for WordPress i...The Booking for Appointments and Events Calendar - Amelia plugin for WordPress is vulnerable to SQL Injection via the `sort` parameter in the payments listing endpoint in all versions up to, and including, 2.1.2. This is due to insufficient escaping on the user-supplied `sort` parameter and lack of sufficient preparation on the existing SQL query in `PaymentRepository.php`, where the sort field is interpolated directly into an ORDER BY clause without sanitization or whitelist validation. PDO prepared statements do not protect ORDER BY column names. GET requests also skip Amelia's nonce validation entirely. This makes it possible for authenticated attackers, with Manager-level (`wpamelia-manager`) access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database via time-based blind SQL injection. |
2026-04-01 |
Previous Month — March 2026 (5735)
| CVE ID | CVSS | Severity | CWE | KEV | EPSS | VAP | Description | Published |
|---|---|---|---|---|---|---|---|---|
| CVE-2026-5237 | 6.9 | MEDIUM | CWE-74 | 0.0% p11 | 4.83 | A security flaw has been discovered in itsourcecode Payroll Management System 1....A security flaw has been discovered in itsourcecode Payroll Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /manage_user.php of the component Parameter Handler. Performing a manipulation of the argument ID results in sql injection. The attack is possible to be carried out remotely. The exploit has been released to the public and may be used for attacks. |
2026-03-31 | |
| CVE-2026-5236 | 4.8 | MEDIUM | CWE-119 | 0.0% p0 | 3.36 | A vulnerability was identified in Axiomatic Bento4 up to 1.6.0-641. Affected is ...A vulnerability was identified in Axiomatic Bento4 up to 1.6.0-641. Affected is the function AP4_BitReader::SkipBits of the file Ap4Dac4Atom.cpp of the component DSI v1 Parser. Such manipulation of the argument n_presentations leads to heap-based buffer overflow. The attack needs to be performed locally. The exploit is publicly available and might be used. The project was informed of the problem early through an issue report but has not responded yet. |
2026-03-31 | |
| CVE-2026-5235 | 4.8 | MEDIUM | CWE-119 | 0.0% p2 | 3.36 | A vulnerability was determined in Axiomatic Bento4 up to 1.6.0-641. This impacts...A vulnerability was determined in Axiomatic Bento4 up to 1.6.0-641. This impacts the function AP4_BitReader::ReadCache of the file Ap4Dac4Atom.cpp of the component MP4 File Parser. This manipulation causes heap-based buffer overflow. The attack needs to be launched locally. The exploit has been publicly disclosed and may be utilized. The project was informed of the problem early through an issue report but has not responded yet. |
2026-03-31 | |
| CVE-2026-34556 | 6.2 | MEDIUM | CWE-125 | 0.0% p3 | 4.34 | iccDEV provides a set of libraries and tools for working with ICC color manageme...iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to version 2.3.1.6, there is a heap-buffer-overflow (HBO) in icAnsiToUtf8() in the XML conversion path. The issue is triggered by a crafted ICC profile which causes icAnsiToUtf8(std::string&, char const*) to treat an input buffer as a C-string and call operations that rely on strlen()/null-termination. AddressSanitizer reports an out-of-bounds READ of size 115 past a 114-byte heap allocation, with the failure observed while running the iccToXml tool. This issue has been patched in version 2.3.1.6. |
2026-03-31 | |
| CVE-2026-34555 | 6.2 | MEDIUM | CWE-121 | 0.0% p3 | 4.34 | iccDEV provides a set of libraries and tools for working with ICC color manageme...iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to version 2.3.1.6, there is a stack-buffer-overflow (SBO) in CIccTagFixedNum<>::GetValues() and a related bug chain. The primary crash is an AddressSanitizer-reported WRITE of size 4 that overflows a 4-byte stack variable (rv) via the call chain CIccTagFixedNum::GetValues() -> CIccTagStruct::GetElemNumberValue(). This issue has been patched in version 2.3.1.6. |
2026-03-31 | |
| CVE-2026-34554 | 6.2 | MEDIUM | CWE-125 | 0.0% p3 | 4.34 | iccDEV provides a set of libraries and tools for working with ICC color manageme...iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to version 2.3.1.6, a heap-buffer-overflow (HBO) in CIccApplyCmmSearch::costFunc() can be triggered via malformed JSON configuration input to the iccApplySearch tool. AddressSanitizer reports an out-of-bounds READ of size 8 originating from CIccApplyCmmSearch::costFunc(CIccSearchVec&) at IccProfLib/IccCmmSearch.cpp:112:5. This issue has been patched in version 2.3.1.6. |
2026-03-31 | |
| CVE-2026-34553 | 4.0 | MEDIUM | CWE-562 | 0.0% p2 | 2.80 | iccDEV provides a set of libraries and tools for working with ICC color manageme...iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to version 2.3.1.6, there is a defect in LUT dump/iteration logic affecting CIccCLUT::Iterate() and output produced by CIccMBB::Describe() (via CLUT dumping). This issue has been patched in version 2.3.1.6. |
2026-03-31 | |
| CVE-2026-34552 | 6.2 | MEDIUM | CWE-476 | 0.0% p3 | 4.34 | iccDEV provides a set of libraries and tools for working with ICC color manageme...iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to version 2.3.1.6, there is an Undefined Behavior (UB) issue in IccTagLut.cpp where the code performs member access through a null pointer of type CIccApplyCLUT. This issue has been patched in version 2.3.1.6. |
2026-03-31 | |
| CVE-2026-34551 | 6.2 | MEDIUM | CWE-476 | 0.0% p3 | 4.34 | iccDEV provides a set of libraries and tools for working with ICC color manageme...iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to version 2.3.1.6, a null-pointer dereference (NPD) in CIccTagLut16::Write() can be triggered when processing a crafted ICC profile (embedded in a TIFF and extracted during iccTiffDump). This issue has been patched in version 2.3.1.6. |
2026-03-31 | |
| CVE-2026-34550 | 6.2 | MEDIUM | CWE-681 | 0.0% p3 | 4.34 | iccDEV provides a set of libraries and tools for working with ICC color manageme...iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to version 2.3.1.6, there is an Undefined Behavior (UB) condition in IccProfLib/IccIO.cpp caused by an implicit conversion from a negative signed integer to size_t (unsigned), which changes the value. This issue has been patched in version 2.3.1.6. |
2026-03-31 | |
| CVE-2026-34549 | 6.2 | MEDIUM | CWE-758 | 0.0% p3 | 4.34 | iccDEV provides a set of libraries and tools for working with ICC color manageme...iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to version 2.3.1.6, there is an Undefined Behavior (UB) condition in IccUtil.cpp triggered by a crafted input profile. Under UndefinedBehaviorSanitizer, the issue is reported as invalid left shift operations on icUInt32Number (unsigned 32-bit) where the shifted value “cannot be represented” in that type. This issue has been patched in version 2.3.1.6. |
2026-03-31 | |
| CVE-2026-34548 | 6.2 | MEDIUM | CWE-681 | 0.0% p3 | 4.34 | iccDEV provides a set of libraries and tools for working with ICC color manageme...iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to version 2.3.1.6, there is an Undefined Behavior (UB) condition in the XML conversion tooling path (iccToXml) caused by an implicit conversion from a negative signed integer to icUInt32Number (unsigned 32-bit), which changes the value. This issue has been patched in version 2.3.1.6. |
2026-03-31 | |
| CVE-2026-34547 | 6.2 | MEDIUM | CWE-758 | 0.0% p3 | 4.34 | iccDEV provides a set of libraries and tools for working with ICC color manageme...iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to version 2.3.1.6, an Undefined Behavior (UB) condition in IccUtil.cpp can be triggered by a crafted ICC profile when running iccDumpProfile. This issue has been patched in version 2.3.1.6. |
2026-03-31 | |
| CVE-2026-34546 | 6.2 | MEDIUM | CWE-369 | 0.0% p3 | 4.34 | iccDEV provides a set of libraries and tools for working with ICC color manageme...iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to version 2.3.1.6, a crafted TIFF input can trigger Undefined Behavior (UB) due to division by zero in the TIFF handling code paths used by iccTiffDump. This issue has been patched in version 2.3.1.6. |
2026-03-31 | |
| CVE-2026-2480 | 6.4 | MEDIUM | CWE-79 | 0.0% p9 | 4.48 | The WP Shortcodes Plugin — Shortcodes Ultimate plugin for WordPress is vulnerabl...The WP Shortcodes Plugin — Shortcodes Ultimate plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'max_width' attribute of the `su_box` shortcode in all versions up to, and including, 7.4.10 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-03-31 | |
| CVE-2026-5215 | 5.3 | MEDIUM | CWE-266 | 0.1% p15 | 3.71 | A vulnerability was identified in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, D...A vulnerability was identified in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205. The impacted element is the function cgi_get_ipv6 of the file /cgi-bin/network_mgr.cgi. Such manipulation leads to improper access controls. The exploit is publicly available and might be used. |
2026-03-31 | |
| CVE-2026-5214 | 7.4 | HIGH | CWE-119 | 0.0% p9 | 5.18 | A vulnerability was found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-32...A vulnerability was found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205. Impacted is the function cgi_addgroup_get_group_quota_minsize of the file /cgi-bin/account_mgr.cgi. The manipulation of the argument Name results in stack-based buffer overflow. The attack may be performed from remote. The exploit has been made public and could be used. |
2026-03-31 | |
| CVE-2026-34605 | 8.6 | HIGH | CWE-79 | 0.1% p31 | 6.02 | SiYuan is a personal knowledge management system. From version 3.6.0 to before v...SiYuan is a personal knowledge management system. From version 3.6.0 to before version 3.6.2, the SanitizeSVG function introduced in version 3.6.0 to fix XSS in the unauthenticated /api/icon/getDynamicIcon endpoint can be bypassed by using namespace-prefixed element names such as <x:script xmlns:x="http://www.w3.org/2000/svg">. The Go HTML5 parser records the element's tag as "x:script" rather than "script", so the tag check passes it through. The SVG is served with Content-Type: image/svg+xml and no Content Security Policy; when a browser opens the response directly, its XML parser resolves the prefix to the SVG namespace and executes the embedded script. This issue has been patched in version 3.6.2. |
2026-03-31 | |
| CVE-2026-34585 | 8.6 | HIGH | CWE-79 | 0.1% p20 | 6.02 | SiYuan is a personal knowledge management system. Prior to version 3.6.2, a vuln...SiYuan is a personal knowledge management system. Prior to version 3.6.2, a vulnerability allows crafted block attribute values to bypass server-side attribute escaping when an HTML entity is mixed with raw special characters. An attacker can embed a malicious IAL value inside a .sy document, package it as a .sy.zip, and have the victim import it through the normal Import -> SiYuan .sy.zip workflow. Once the note is opened, the malicious attribute breaks out of its original HTML context and injects an event handler, resulting in stored XSS. In the Electron desktop client, this XSS reaches remote code execution because injected JavaScript runs with access to Node/Electron APIs. This issue has been patched in version 3.6.2. |
2026-03-31 | |
| CVE-2026-34542 | 6.2 | MEDIUM | CWE-121 | 0.0% p3 | 4.34 | iccDEV provides a set of libraries and tools for working with ICC color manageme...iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to version 2.3.1.6, a crafted ICC profile can trigger a stack-buffer-overflow (SBO) in CIccCalculatorFunc::Apply() when processed via iccApplyNamedCmm. Under AddressSanitizer, the failure is reported as a 4-byte write stack-buffer-overflow in IccProfLib/IccMpeCalc.cpp:3873, reachable through the MPE calculator / curve set initialization path. This issue has been patched in version 2.3.1.6. |
2026-03-31 | |
| CVE-2026-34541 | 6.2 | MEDIUM | CWE-476 | 0.0% p3 | 4.34 | iccDEV provides a set of libraries and tools for working with ICC color manageme...iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to version 2.3.1.6, a crafted ICC profile can trigger Undefined Behavior (UB) via a null-pointer member call in CIccCombinedConnectionConditions::CIccCombinedConnectionConditions() (reported by UBSan as “member call on null pointer of type CIccTagSpectralViewingConditions”). The issue is reachable when running iccApplyNamedCmm with -PCC using a malformed .icc profile. This issue has been patched in version 2.3.1.6. |
2026-03-31 | |
| CVE-2026-34540 | 6.2 | MEDIUM | CWE-122 | 0.0% p3 | 4.34 | iccDEV provides a set of libraries and tools for working with ICC color manageme...iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to version 2.3.1.6, a crafted ICC profile can trigger a heap-buffer-overflow (HBO) in icMemDump() when iccDumpProfile attempts to dump/describe malformed tag contents. The issue is observable under AddressSanitizer as an out-of-bounds heap read in icMemDump(...) at IccProfLib/IccUtil.cpp:1002, reachable via CIccTagUnknown::Describe(). This issue has been patched in version 2.3.1.6. |
2026-03-31 | |
| CVE-2026-34539 | 6.2 | MEDIUM | CWE-122 | 0.0% p3 | 4.34 | iccDEV provides a set of libraries and tools for working with ICC color manageme...iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to version 2.3.1.6, a crafted ICC profile and TIFF input can trigger a heap-buffer-overflow (HBO) in CTiffImg::WriteLine(). The issue is observable under AddressSanitizer as an out-of-bounds heap read when running iccSpecSepToTiff on a malicious .icc + .tif pair, leading to a crash during TIFF strip writing. This issue has been patched in version 2.3.1.6. |
2026-03-31 | |
| CVE-2026-34537 | 6.2 | MEDIUM | CWE-758 | 0.0% p3 | 4.34 | iccDEV provides a set of libraries and tools for working with ICC color manageme...iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to version 2.3.1.6, a crafted ICC profile can trigger Undefined Behavior (UB) in CIccOpDefEnvVar::Exec() due to invalid enum values being loaded for icSigCmmEnvVar. The issue is observable under UBSan as a “load of value … not a valid value for type icSigCmmEnvVar”, indicating an invalid enum/type value being consumed during ICC profile processing. This issue has been patched in version 2.3.1.6. |
2026-03-31 | |
| CVE-2026-34536 | 6.2 | MEDIUM | CWE-674 | 0.0% p3 | 4.34 | iccDEV provides a set of libraries and tools for working with ICC color manageme...iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to version 2.3.1.6, a crafted ICC profile can trigger a stack overflow (SO) in SIccCalcOp::ArgsUsed(). The issue is observable under AddressSanitizer as a stack-overflow when iccApplyProfiles processes a malicious profile, with the crash occurring while computing argument usage during calculator underflow/overflow checks. This issue has been patched in version 2.3.1.6. |
2026-03-31 | |
| CVE-2026-34535 | 6.2 | MEDIUM | CWE-122 | 0.0% p3 | 4.34 | iccDEV provides a set of libraries and tools for working with ICC color manageme...iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to version 2.3.1.6, a crafted ICC profile can trigger a segmentation fault (SEGV) in CIccTagArray::Cleanup(). The issue is observable under UBSan/ASan as misaligned member access / misaligned pointer loads followed by an invalid read leading to process crash when running iccRoundTrip on a malicious profile. This issue has been patched in version 2.3.1.6. |
2026-03-31 | |
| CVE-2026-34534 | 6.2 | MEDIUM | CWE-122 | 0.0% p3 | 4.34 | iccDEV provides a set of libraries and tools for working with ICC color manageme...iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to version 2.3.1.6, a crafted ICC profile can trigger a heap-buffer-overflow (HBO) in CIccMpeSpectralMatrix::Describe(). The issue is observable under AddressSanitizer as an out-of-bounds heap read when running iccDumpProfile on a malicious profile. This issue has been patched in version 2.3.1.6. |
2026-03-31 | |
| CVE-2026-34533 | 6.2 | MEDIUM | CWE-758 | 0.0% p3 | 4.34 | iccDEV provides a set of libraries and tools for working with ICC color manageme...iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to version 2.3.1.6, a crafted ICC profile can trigger Undefined Behavior (UB) in CIccCalculatorFunc::ApplySequence() due to invalid enum values being loaded for icChannelFuncSignature. The issue is observable under UBSan as a “load of value … not a valid value for type icChannelFuncSignature”, indicating a type/enum value confusion scenario during ICC profile processing. This issue has been patched in version 2.3.1.6. |
2026-03-31 | |
| CVE-2026-34453 | 7.5 | HIGH | CWE-863 | 3.5% p87 | 5.35 | SiYuan is a personal knowledge management system. Prior to version 3.6.2, the pu...SiYuan is a personal knowledge management system. Prior to version 3.6.2, the publish service exposes bookmarked blocks from password-protected documents to unauthenticated visitors. In publish/read-only mode, /api/bookmark/getBookmark filters bookmark results by calling FilterBlocksByPublishAccess(nil, ...). Because the filter treats a nil context as authorized, it skips the publish password check and returns bookmarked blocks from documents configured as Protected. As a result, anyone who can access the publish service can retrieve content from protected documents without providing the required password, as long as at least one block in the document is bookmarked. This issue has been patched in version 3.6.2. |
2026-03-31 | |
| CVE-2026-34452 | 5.8 | MEDIUM | CWE-59 | 0.0% p4 | 4.06 | The Claude SDK for Python provides access to the Claude API from Python applicat...The Claude SDK for Python provides access to the Claude API from Python applications. From version 0.86.0 to before version 0.87.0, the async local filesystem memory tool in the Anthropic Python SDK validated that model-supplied paths resolved inside the sandboxed memory directory, but then returned the unresolved path for subsequent file operations. A local attacker able to write to the memory directory could retarget a symlink between validation and use, causing reads or writes to escape the sandbox. The synchronous memory tool implementation was not affected. This issue has been patched in version 0.87.0. |
2026-03-31 | |
| CVE-2026-34451 | 6.3 | MEDIUM | CWE-22 | 0.1% p17 | 4.41 | Claude SDK for TypeScript provides access to the Claude API from server-side Typ...Claude SDK for TypeScript provides access to the Claude API from server-side TypeScript or JavaScript applications. From version 0.79.0 to before version 0.81.0, the local filesystem memory tool in the Anthropic TypeScript SDK validated model-supplied paths using a string prefix check that did not append a trailing path separator. A model steered by prompt injection could supply a crafted path that resolved to a sibling directory sharing the memory root's name as a prefix, allowing reads and writes outside the sandboxed memory directory. This issue has been patched in version 0.81.0. |
2026-03-31 | |
| CVE-2026-34450 | 4.8 | MEDIUM | CWE-276 | 0.0% p0 | 3.36 | The Claude SDK for Python provides access to the Claude API from Python applicat...The Claude SDK for Python provides access to the Claude API from Python applications. From version 0.86.0 to before version 0.87.0, the local filesystem memory tool in the Anthropic Python SDK created memory files with mode 0o666, leaving them world-readable on systems with a standard umask and world-writable in environments with a permissive umask such as many Docker base images. A local attacker on a shared host could read persisted agent state, and in containerized deployments could modify memory files to influence subsequent model behavior. Both the synchronous and asynchronous memory tool implementations were affected. This issue has been patched in version 0.87.0. |
2026-03-31 | |
| CVE-2026-34449 | 9.6 | CRITICAL | CWE-942 | 0.1% p33 | 6.72 | SiYuan is a personal knowledge management system. Prior to version 3.6.2, a mali...SiYuan is a personal knowledge management system. Prior to version 3.6.2, a malicious website can achieve Remote Code Execution (RCE) on any desktop running SiYuan by exploiting the permissive CORS policy (Access-Control-Allow-Origin: * + Access-Control-Allow-Private-Network: true) to inject a JavaScript snippet via the API. The injected snippet executes in Electron's Node.js context with full OS access the next time the user opens SiYuan's UI. No user interaction is required beyond visiting the malicious website while SiYuan is running. This issue has been patched in version 3.6.2. |
2026-03-31 | |
| CVE-2026-34448 | 9.0 | CRITICAL | CWE-79 | 0.0% p15 | 6.30 | SiYuan is a personal knowledge management system. Prior to version 3.6.2, an att...SiYuan is a personal knowledge management system. Prior to version 3.6.2, an attacker who can place a malicious URL in an Attribute View mAsse field can trigger stored XSS when a victim opens the Gallery or Kanban view with “Cover From -> Asset Field” enabled. The vulnerable code accepts arbitrary http(s) URLs without extensions as images, stores the attacker-controlled string in coverURL, and injects it directly into an <img src="..."> attribute without escaping. In the Electron desktop client, the injected JavaScript executes with nodeIntegration enabled and contextIsolation disabled, so the XSS reaches arbitrary OS command execution under the victim’s account. This issue has been patched in version 3.6.2. |
2026-03-31 | |
| CVE-2026-34443 | 6.9 | MEDIUM | CWE-918 | 0.0% p10 | 4.83 | FreeScout is a free help desk and shared inbox built with PHP's Laravel framewor...FreeScout is a free help desk and shared inbox built with PHP's Laravel framework. Prior to version 1.8.211, checkIpByMask() in app/Misc/Helper.php checks whether the input IP contains a / character. Plain IP addresses never contain /, so the function always returns false without checking any CIDR ranges. The entire 10.0.0.0/8 and 172.16.0.0/12 private ranges are unprotected. This issue has been patched in version 1.8.211. |
2026-03-31 | |
| CVE-2026-34442 | 5.4 | MEDIUM | CWE-20 | 0.1% p22 | 3.78 | FreeScout is a free help desk and shared inbox built with PHP's Laravel framewor...FreeScout is a free help desk and shared inbox built with PHP's Laravel framework. Prior to version 1.8.211, host header manipulation in FreeScout version (http://localhost:8080/system/status) allows an attacker to inject an arbitrary domain into generated absolute URLs. This leads to External Resource Loading and Open Redirect behavior. When the application constructs links and assets using the unvalidated Host header, user requests can be redirected to attacker-controlled domains and external resources may be loaded from malicious servers. This issue has been patched in version 1.8.211. |
2026-03-31 | |
| CVE-2026-34441 | 4.8 | MEDIUM | CWE-444 | 0.0% p12 | 3.36 | cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library...cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library. Prior to version 0.40.0, cpp-httplib is vulnerable to HTTP Request Smuggling. The server's static file handler serves GET responses without consuming the request body. On HTTP/1.1 keep-alive connections, the unread body bytes remain on the TCP stream and are interpreted as the start of a new HTTP request. An attacker can embed an arbitrary HTTP request inside the body of a GET request, which the server processes as a separate request. This issue has been patched in version 0.40.0. |
2026-03-31 | |
| CVE-2026-34406 | 9.4 | CRITICAL | CWE-915 | 0.3% p50 | 6.59 | APTRS (Automated Penetration Testing Reporting System) is a Python and Django-ba...APTRS (Automated Penetration Testing Reporting System) is a Python and Django-based automated reporting tool designed for penetration testers and security organizations. Prior to version 2.0.1, the edit_user endpoint (POST /api/auth/edituser/<pk>) allows Any user who can reach that endpoint and submit crafted permission to escalate their own account (or any other account) to superuser by including "is_superuser": true in the request body. The root cause is that CustomUserSerializer explicitly includes is_superuser in its fields list but omits it from read_only_fields, making it a writable field. The edit_user view performs no additional validation to prevent non-superusers from modifying this field. Once is_superuser is set to true, gaining unrestricted access to all application functionality without requiring re-authentication. This issue has been patched in version 2.0.1. |
2026-03-31 | |
| CVE-2026-34405 | 6.1 | MEDIUM | CWE-79 | 0.0% p8 | 4.27 | Nuxt OG Image generates OG Images with Vue templates in Nuxt. Prior to version 6...Nuxt OG Image generates OG Images with Vue templates in Nuxt. Prior to version 6.2.5, the image‑generation component by the URI: /_og/d/ (and, in older versions, /og-image/) contains a vulnerability that allows injection of arbitrary attributes into the HTML page body. This issue has been patched in version 6.2.5. |
2026-03-31 | |
| CVE-2026-34404 | 6.9 | MEDIUM | CWE-400 | 0.1% p17 | 4.83 | Nuxt OG Image generates OG Images with Vue templates in Nuxt. Prior to version 6...Nuxt OG Image generates OG Images with Vue templates in Nuxt. Prior to version 6.2.5, the image‑generation component by the URI: /_og/d/ (and, in older versions, /og-image/) contains a Denial of Service (DoS) vulnerability. The issue arises because there is no restriction on the width and height parameters of the generated image. The vulnerability was reproduced using the standard configuration and the default templates. This issue has been patched in version 6.2.5. |
2026-03-31 | |
| CVE-2026-34401 | 6.5 | MEDIUM | CWE-611 | 0.3% p53 | 4.56 | XML Notepad is a Windows program that provides a simple intuitive User Interface...XML Notepad is a Windows program that provides a simple intuitive User Interface for browsing and editing XML documents. Prior to version 2.9.0.21, XML Notepad does not disable DTD processing by default which means external entities are resolved automatically. There is a well known attack related to malicious DTD files where an attacker to craft a malicious XML file that loads a DTD that causes XML Notepad to make outbound HTTP/SMB requests, potentially leaking local file contents or capturing the victim's NTLM credentials. This issue has been patched in version 2.9.0.21. |
2026-03-31 | |
| CVE-2026-34400 | 6.9 | MEDIUM | CWE-89 | 0.0% p3 | 4.83 | Alerta is a monitoring tool. Prior to version 9.1.0, the Query string search API...Alerta is a monitoring tool. Prior to version 9.1.0, the Query string search API (q=) was vulnerable to SQL injection via the Postgres query parser, which built WHERE clauses by interpolating user-supplied search terms directly into SQL strings via f-strings. This issue has been patched in version 9.1.0. |
2026-03-31 | |
| CVE-2026-5213 | 7.4 | HIGH | CWE-119 | 0.0% p9 | 5.18 | A vulnerability was determined in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, D...A vulnerability was determined in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205. The affected element is the function cgi_adduser_to_session of the file /cgi-bin/account_mgr.cgi. This manipulation of the argument read_list causes stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized. |
2026-03-31 | |
| CVE-2026-5212 | 7.4 | HIGH | CWE-119 | 0.1% p28 | 5.18 | A vulnerability has been found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, D...A vulnerability has been found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205. This issue affects the function Webdav_Upload_File of the file /cgi-bin/webdav_mgr.cgi. The manipulation of the argument f_file leads to stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used. |
2026-03-31 | |
| CVE-2026-3470 | 3.8 | LOW | CWE-20 | 0.2% p35 | 2.66 | A vulnerability exists in the SonicWall Email Security appliance due to improper...A vulnerability exists in the SonicWall Email Security appliance due to improper input sanitization that may lead to data corruption, allowing a remote authenticated attacker as admin user could exploit this issue by providing crafted input that corrupts application database. |
2026-03-31 | |
| CVE-2026-3469 | 2.7 | LOW | CWE-20 | 0.2% p35 | 1.89 | A denial-of-service (DoS) vulnerability exists due to improper input validation ...A denial-of-service (DoS) vulnerability exists due to improper input validation in the SonicWall Email Security appliance, allowing a remote authenticated attacker as admin user to cause the application to become unresponsive. |
2026-03-31 | |
| CVE-2026-3468 | 4.8 | MEDIUM | CWE-79 | 0.0% p14 | 3.36 | A stored Cross-Site Scripting (XSS) vulnerability has been identified in the Son...A stored Cross-Site Scripting (XSS) vulnerability has been identified in the SonicWall Email Security appliance due to improper neutralization of user-supplied input during web page generation, allowing a remote authenticated attacker as admin user to potentially execute arbitrary JavaScript code. |
2026-03-31 | |
| CVE-2026-34740 | 6.5 | MEDIUM | CWE-918 | 0.0% p7 | 4.55 | WWBN AVideo is an open source video platform. In versions 26.0 and prior, the EP...WWBN AVideo is an open source video platform. In versions 26.0 and prior, the EPG (Electronic Program Guide) link feature in AVideo allows authenticated users with upload permissions to store arbitrary URLs that the server fetches on every EPG page visit. The URL is validated only with PHP's FILTER_VALIDATE_URL, which accepts internal network addresses. Although AVideo has a dedicated isSSRFSafeURL() function for preventing SSRF, it is not called in this code path. This results in a stored server-side request forgery vulnerability that can be used to scan internal networks, access cloud metadata services, and interact with internal services. At time of publication, there are no publicly available patches. |
2026-03-31 | |
| CVE-2026-34739 | 6.1 | MEDIUM | CWE-79 | 0.0% p8 | 4.27 | WWBN AVideo is an open source video platform. In versions 26.0 and prior, the Us...WWBN AVideo is an open source video platform. In versions 26.0 and prior, the User_Location plugin's testIP.php page reflects the ip request parameter directly into an HTML input element without applying htmlspecialchars() or any other output encoding. This allows an attacker to inject arbitrary HTML and JavaScript via a crafted URL. Although the page is restricted to admin users, AVideo's SameSite=None cookie configuration allows cross-origin exploitation, meaning an attacker can lure an admin to a malicious link that executes JavaScript in their authenticated session. At time of publication, there are no publicly available patches. |
2026-03-31 | |
| CVE-2026-34738 | 4.3 | MEDIUM | CWE-285 | 0.0% p7 | 3.01 | WWBN AVideo is an open source video platform. In versions 26.0 and prior, AVideo...WWBN AVideo is an open source video platform. In versions 26.0 and prior, AVideo's video processing pipeline accepts an overrideStatus request parameter that allows any uploader to set a video's status to any valid state, including "active" (a). This bypasses the admin-controlled moderation and draft workflows. The setStatus() method validates the status code against a list of known values but does not verify that the caller has permission to set that particular status. As a result, any user with upload permissions can publish videos directly, circumventing content review processes. At time of publication, there are no publicly available patches. |
2026-03-31 | |
| CVE-2026-34737 | 6.5 | MEDIUM | CWE-862 | 0.0% p8 | 4.55 | WWBN AVideo is an open source video platform. In versions 26.0 and prior, the St...WWBN AVideo is an open source video platform. In versions 26.0 and prior, the StripeYPT plugin includes a test.php debug endpoint that is accessible to any logged-in user, not just administrators. This endpoint processes Stripe webhook-style payloads and triggers subscription operations, including cancellation. Due to a bug in the retrieveSubscriptions() method that cancels subscriptions instead of merely retrieving them, any authenticated user can cancel arbitrary Stripe subscriptions by providing a subscription ID. At time of publication, there are no publicly available patches. |
2026-03-31 | |
| CVE-2026-34733 | 6.5 | MEDIUM | CWE-284 | 0.1% p20 | 4.55 | WWBN AVideo is an open source video platform. In versions 26.0 and prior, the AV...WWBN AVideo is an open source video platform. In versions 26.0 and prior, the AVideo installation script install/deleteSystemdPrivate.php contains a PHP operator precedence bug in its CLI-only access guard. The script is intended to run exclusively from the command line, but the guard condition !php_sapi_name() === 'cli' never evaluates to true due to how PHP resolves operator precedence. The ! (logical NOT) operator binds more tightly than === (strict comparison), causing the expression to always evaluate to false, which means the die() statement never executes. As a result, the script is accessible via HTTP without authentication and will delete files from the server's temp directory while also disclosing the temp directory contents in its response. At time of publication, there are no publicly available patches. |
2026-03-31 | |
| CVE-2026-34732 | 5.3 | MEDIUM | CWE-306 | 0.1% p17 | 3.71 | WWBN AVideo is an open source video platform. In versions 26.0 and prior, the AV...WWBN AVideo is an open source video platform. In versions 26.0 and prior, the AVideo CreatePlugin template for list.json.php does not include any authentication or authorization check. While the companion templates add.json.php and delete.json.php both require admin privileges, the list.json.php template was shipped without this guard. Every plugin that uses the CreatePlugin code generator inherits this omission, resulting in 21 unauthenticated data listing endpoints across the platform. These endpoints expose sensitive data including user PII, payment transaction logs, IP addresses, user agents, and internal system records. At time of publication, there are no publicly available patches. |
2026-03-31 | |
| CVE-2026-34731 | 7.5 | HIGH | CWE-306 | 0.2% p38 | 5.26 | WWBN AVideo is an open source video platform. In versions 26.0 and prior, the AV...WWBN AVideo is an open source video platform. In versions 26.0 and prior, the AVideo on_publish_done.php endpoint in the Live plugin allows unauthenticated users to terminate any active live stream. The endpoint processes RTMP callback events to mark streams as finished in the database, but performs no authentication or authorization checks before doing so. An attacker can enumerate active stream keys from the unauthenticated stats.json.php endpoint, then send crafted POST requests to on_publish_done.php to terminate any live broadcast. This enables denial-of-service against all live streaming functionality on the platform. At time of publication, there are no publicly available patches. |
2026-03-31 | |
| CVE-2026-34716 | 6.4 | MEDIUM | CWE-79 | 0.1% p16 | 4.48 | WWBN AVideo is an open source video platform. In versions 26.0 and prior, the AV...WWBN AVideo is an open source video platform. In versions 26.0 and prior, the AVideo YPTSocket plugin's caller feature renders incoming call notifications using the jQuery Toast Plugin, passing the caller's display name directly as the heading parameter. The toast plugin constructs the heading as raw HTML ('<h2>' + heading + '</h2>') and inserts it into the DOM via jQuery's .html() method, which parses and executes any embedded HTML or script content. An attacker can set their display name to an XSS payload and trigger code execution on any online user's browser simply by initiating a call - no victim interaction is required beyond being connected to the WebSocket. At time of publication, there are no publicly available patches. |
2026-03-31 | |
| CVE-2026-34613 | 6.5 | MEDIUM | CWE-352 | 0.0% p3 | 4.55 | WWBN AVideo is an open source video platform. In versions 26.0 and prior, the AV...WWBN AVideo is an open source video platform. In versions 26.0 and prior, the AVideo endpoint objects/pluginSwitch.json.php allows administrators to enable or disable any installed plugin. The endpoint checks for an active admin session but does not validate a CSRF token. Additionally, the plugins database table is explicitly listed in ignoreTableSecurityCheck(), which means the ORM-level Referer/Origin domain validation in ObjectYPT::save() is also bypassed. Combined with SameSite=None on session cookies, an attacker can disable critical security plugins (such as LoginControl for 2FA, subscription enforcement, or access control plugins) by luring an admin to a malicious page. At time of publication, there are no publicly available patches. |
2026-03-31 | |
| CVE-2026-34611 | 6.5 | MEDIUM | CWE-352 | 0.0% p3 | 4.55 | WWBN AVideo is an open source video platform. In versions 26.0 and prior, the AV...WWBN AVideo is an open source video platform. In versions 26.0 and prior, the AVideo endpoint objects/emailAllUsers.json.php allows administrators to send HTML emails to every registered user on the platform. While the endpoint verifies admin session status, it does not validate a CSRF token. Because AVideo sets SameSite=None on session cookies, a cross-origin POST request from an attacker-controlled page will include the admin's session cookie automatically. An attacker who lures an admin to a malicious page can send an arbitrary HTML email to every user on the platform, appearing to originate from the instance's legitimate SMTP address. At time of publication, there are no publicly available patches. |
2026-03-31 | |
| CVE-2026-34586 | 6.5 | MEDIUM | CWE-863 | 0.0% p9 | 4.55 | PdfDing is a selfhosted PDF manager, viewer and editor offering a seamless user ...PdfDing is a selfhosted PDF manager, viewer and editor offering a seamless user experience on multiple devices. Prior to version 1.7.1, check_shared_access_allowed() validates only session existence — it does not check SharedPdf.inactive (expiration / max views) or SharedPdf.deleted. The Serve and Download endpoints rely solely on this function, allowing previously-authorized users to access shared PDF content after expiration, view limit, or soft-deletion. This issue has been patched in version 1.7.1. |
2026-03-31 | |
| CVE-2026-34396 | 6.1 | MEDIUM | CWE-79 | 0.0% p8 | 4.27 | WWBN AVideo is an open source video platform. In versions 26.0 and prior, the AV...WWBN AVideo is an open source video platform. In versions 26.0 and prior, the AVideo admin panel renders plugin configuration values in HTML forms without applying htmlspecialchars() or any other output encoding. The jsonToFormElements() function in admin/functions.php directly interpolates user-controlled values into textarea contents, option elements, and input attributes. An attacker who can set a plugin configuration value (either as a compromised admin or by chaining with CSRF on admin/save.json.php) can inject arbitrary JavaScript that executes whenever any administrator visits the plugin configuration page. At time of publication, there are no publicly available patches. |
2026-03-31 | |
| CVE-2026-34395 | 6.5 | MEDIUM | CWE-862 | 0.0% p9 | 4.55 | WWBN AVideo is an open source video platform. In versions 26.0 and prior, the pl...WWBN AVideo is an open source video platform. In versions 26.0 and prior, the plugin/YPTWallet/view/users.json.php endpoint returns all platform users with their personal information and wallet balances to any authenticated user. The endpoint checks User::isLogged() but does not check User::isAdmin(), so any registered user can dump the full user database. At time of publication, there are no publicly available patches. |
2026-03-31 | |
| CVE-2026-34394 | 8.1 | HIGH | CWE-352 | 0.0% p3 | 5.67 | WWBN AVideo is an open source video platform. In versions 26.0 and prior, AVideo...WWBN AVideo is an open source video platform. In versions 26.0 and prior, AVideo's admin plugin configuration endpoint (admin/save.json.php) lacks any CSRF token validation. There is no call to isGlobalTokenValid() or verifyToken() before processing the request. Combined with the application's explicit SameSite=None cookie policy, an attacker can forge cross-origin POST requests from a malicious page to overwrite arbitrary plugin settings on a victim administrator's session. Because the plugins table is included in the ignoreTableSecurityCheck() array in objects/Object.php, standard table-level access controls are also bypassed. This allows a complete takeover of platform functionality by reconfiguring payment processors, authentication providers, cloud storage credentials, and more. At time of publication, there are no publicly available patches. |
2026-03-31 | |
| CVE-2026-34384 | 4.5 | MEDIUM | CWE-352 | 0.0% p3 | 3.15 | Admidio is an open-source user management solution. Prior to version 5.0.8, the ...Admidio is an open-source user management solution. Prior to version 5.0.8, the create_user, assign_member, and assign_user action modes in modules/registration.php approve pending user registrations via GET request without validating a CSRF token. Unlike the delete_user mode in the same file (which correctly validates the token), these three approval actions read their parameters from $_GET and perform irreversible state changes without any protection. An attacker who has submitted a pending registration can extract their own user UUID from the registration confirmation email URL, then trick any user with the rol_approve_users right into visiting a crafted URL that automatically approves the registration. This bypasses the manual registration approval workflow entirely. This issue has been patched in version 5.0.8. |
2026-03-31 | |
| CVE-2026-34383 | 4.3 | MEDIUM | CWE-20 | 0.0% p7 | 3.01 | Admidio is an open-source user management solution. Prior to version 5.0.8, the ...Admidio is an open-source user management solution. Prior to version 5.0.8, the inventory module's item_save endpoint accepts a user-controllable POST parameter imported that, when set to true, completely bypasses both CSRF token validation and server-side form validation. An authenticated user can craft a direct POST request to save arbitrary inventory item data without CSRF protection and without the field value checks that the FormPresenter validation normally enforces. This issue has been patched in version 5.0.8. |
2026-03-31 | |
| CVE-2026-34382 | 4.6 | MEDIUM | CWE-352 | 0.0% p4 | 3.22 | Admidio is an open-source user management solution. From version 5.0.0 to before...Admidio is an open-source user management solution. From version 5.0.0 to before version 5.0.8, the delete mode handler in mylist_function.php permanently deletes list configurations without validating a CSRF token. An attacker who can lure an authenticated user to a malicious page can silently destroy that user's list configurations — including organization-wide shared lists when the victim holds administrator rights. This issue has been patched in version 5.0.8. |
2026-03-31 | |
| CVE-2026-34381 | 7.5 | HIGH | CWE-284 | 0.1% p22 | 5.25 | Admidio is an open-source user management solution. From version 5.0.0 to before...Admidio is an open-source user management solution. From version 5.0.0 to before version 5.0.8, Admidio relies on adm_my_files/.htaccess to deny direct HTTP access to uploaded documents. The Docker image ships with AllowOverride None in the Apache configuration, which causes Apache to silently ignore all .htaccess files. As a result, any file uploaded to the documents module regardless of the role-based permissions configured in the UI, is directly accessible over HTTP without authentication by anyone who knows the file path. The file path is disclosed in the upload response JSON. This issue has been patched in version 5.0.8. |
2026-03-31 | |
| CVE-2026-34372 | 5.3 | MEDIUM | CWE-288 | 0.0% p9 | 3.71 | Sulu is an open-source PHP content management system based on the Symfony framew...Sulu is an open-source PHP content management system based on the Symfony framework. From versions 1.0.0 to before 2.6.22, and 3.0.0 to before 3.0.5, a user which has permission for the Sulu Admin via at least one role could have access to the sub-entities of contacts via the admin API without even have permission for contacts. This issue has been patched in versions 2.6.22 and 3.0.5. |
2026-03-31 | |
| CVE-2026-34367 | 7.6 | HIGH | CWE-918 | 0.0% p9 | 5.32 | InvoiceShelf is an open-source web & mobile app that helps track expenses, payme...InvoiceShelf is an open-source web & mobile app that helps track expenses, payments and create professional invoices and estimates. Prior to version 2.2.0, a Server-Side Request Forgery (SSRF) vulnerability exists in the Invoice PDF generation module. User-supplied HTML in the invoice Notes field is passed unsanitised to the Dompdf rendering library, which will fetch any remote resources referenced in the markup. This can be triggered via the PDF preview and email delivery endpoints. This issue has been patched in version 2.2.0. |
2026-03-31 | |
| CVE-2026-34366 | 7.6 | HIGH | CWE-918 | 0.0% p8 | 5.32 | InvoiceShelf is an open-source web & mobile app that helps track expenses, payme...InvoiceShelf is an open-source web & mobile app that helps track expenses, payments and create professional invoices and estimates. Prior to version 2.2.0, a Server-Side Request Forgery (SSRF) vulnerability exists in the Payment receipt PDF generation module. User-supplied HTML in the payment Notes field is passed unsanitised to the Dompdf rendering library, which will fetch any remote resources referenced in the markup. The vulnerability is exploitable directly via the PDF receipt endpoint, regardless of whether automated email attachments are enabled. This issue has been patched in version 2.2.0. |
2026-03-31 | |
| CVE-2026-5211 | 7.4 | HIGH | CWE-119 | 0.0% p9 | 5.18 | A flaw has been found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, ...A flaw has been found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205. This vulnerability affects the function UPnP_AV_Server_Path_Del of the file /cgi-bin/app_mgr.cgi. Executing a manipulation of the argument f_dir can lead to stack-based buffer overflow. The attack can be executed remotely. The exploit has been published and may be used. |
2026-03-31 | |
| CVE-2026-34784 | 8.2 | HIGH | CWE-285 | 0.0% p12 | 5.74 | Parse Server is an open source backend that can be deployed to any infrastructur...Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.71 and 9.7.1-alpha.1, file downloads via HTTP Range requests bypass the afterFind(Parse.File) trigger and its validators on storage adapters that support streaming (e.g. the default GridFS adapter). This allows access to files that should be protected by afterFind trigger authorization logic or built-in validators such as requireUser. This issue has been patched in versions 8.6.71 and 9.7.1-alpha.1. |
2026-03-31 | |
| CVE-2026-34365 | 7.6 | HIGH | CWE-918 | 0.0% p8 | 5.32 | InvoiceShelf is an open-source web & mobile app that helps track expenses, payme...InvoiceShelf is an open-source web & mobile app that helps track expenses, payments and create professional invoices and estimates. Prior to version 2.2.0, a Server-Side Request Forgery (SSRF) vulnerability exists in the Estimate PDF generation module. User-supplied HTML in the estimate Notes field is passed unsanitised to the Dompdf rendering library, which will fetch any remote resources referenced in the markup. The vulnerability is exploitable directly via the PDF preview and customer view endpoints regardless of whether automated email attachments are enabled. This issue has been patched in version 2.2.0. |
2026-03-31 | |
| CVE-2026-34215 | 8.2 | HIGH | CWE-200 | 0.0% p14 | 5.74 | Parse Server is an open source backend that can be deployed to any infrastructur...Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.63 and 9.7.0-alpha.7, the verify password endpoint returns unsanitized authentication data, including MFA TOTP secrets, recovery codes, and OAuth access tokens. An attacker who knows a user's password can extract the MFA secret to generate valid MFA codes, defeating multi-factor authentication protection. This issue has been patched in versions 8.6.63 and 9.7.0-alpha.7. |
2026-03-31 | |
| CVE-2026-34206 | 6.1 | MEDIUM | CWE-79 | 0.0% p11 | 4.27 | Captcha Protect is a Traefik middleware to add an anti-bot challenge to individu...Captcha Protect is a Traefik middleware to add an anti-bot challenge to individual IPs in a subnet when traffic spikes are detected from that subnet. Prior to version 1.12.2, a reflected cross-site scripting (XSS) vulnerability exists in github.com/libops/captcha-protect. The challenge page accepted a client-supplied destination value and rendered it into HTML using Go's text/template. Because text/template does not perform contextual HTML escaping, an attacker could supply a crafted destination value that breaks out of the hidden input attribute and injects arbitrary script into the challenge page. This issue has been patched in version 1.12.2. |
2026-03-31 | |
| CVE-2026-34204 | 7.1 | HIGH | CWE-287 | 0.0% p6 | 4.97 | MinIO is a high-performance object storage system. Prior to version RELEASE.2026...MinIO is a high-performance object storage system. Prior to version RELEASE.2026-03-26T21-24-40Z, a flaw in extractMetadataFromMime() allows any authenticated user with s3:PutObject permission to inject internal server-side encryption metadata into objects by sending crafted X-Minio-Replication-* headers on a normal PutObject request. This issue has been patched in version RELEASE.2026-03-26T21-24-40Z. |
2026-03-31 | |
| CVE-2026-34203 | 2.7 | LOW | CWE-521 | 0.0% p8 | 1.89 | Nautobot is a Network Source of Truth and Network Automation Platform. Prior to ...Nautobot is a Network Source of Truth and Network Automation Platform. Prior to versions 2.4.30 and 3.0.10, user creation and editing via the REST API fails to apply the password validation rules defined by Django's AUTH_PASSWORD_VALIDATORS setting (which defaults to an empty list, i.e., no specific rules, but can be configured in Nautobot's nautobot_config.py to apply various rules if desired). This can potentially allow for the creation or modification of users to have passwords that are weak or otherwise do not comply with configured standards. This issue has been patched in versions 2.4.30 and 3.0.10. |
2026-03-31 | |
| CVE-2026-30290 | 8.4 | HIGH | CWE-22 | 0.0% p6 | 5.88 | An arbitrary file overwrite vulnerability in InTouch Contacts & Caller ID APP v6...An arbitrary file overwrite vulnerability in InTouch Contacts & Caller ID APP v6.38.1 allows attackers to overwrite critical internal files via the file import process, leading to arbitrary code execution or information exposure. |
2026-03-31 | |
| CVE-2026-30285 | 9.8 | CRITICAL | CWE-22 | 0.1% p29 | 6.86 | An arbitrary file overwrite vulnerability in Zora: Post, Trade, Earn Crypto v2.6...An arbitrary file overwrite vulnerability in Zora: Post, Trade, Earn Crypto v2.60.0 allows attackers to overwrite critical internal files via the file import process, leading to arbitrary code execution or information exposure. |
2026-03-31 | |
| CVE-2026-30280 | 5.3 | MEDIUM | CWE-434 | 0.0% p0 | 3.71 | An arbitrary file overwrite vulnerability in RAREPROB SOLUTIONS PRIVATE LIMITED ...An arbitrary file overwrite vulnerability in RAREPROB SOLUTIONS PRIVATE LIMITED Video player Play All Videos v1.0.135 allows attackers to overwrite critical internal files via the file import process, leading to arbtrary code execution or information exposure. |
2026-03-31 | |
| CVE-2026-5210 | 6.9 | MEDIUM | CWE-73 | 0.1% p17 | 4.83 | A vulnerability was detected in SourceCodester Leave Application System 1.0. Thi...A vulnerability was detected in SourceCodester Leave Application System 1.0. This affects an unknown part. Performing a manipulation of the argument page results in file inclusion. Remote exploitation of the attack is possible. The exploit is now public and may be used. |
2026-03-31 | |
| CVE-2026-5209 | 4.8 | MEDIUM | CWE-79 | 0.0% p9 | 3.36 | A security vulnerability has been detected in SourceCodester Leave Application S...A security vulnerability has been detected in SourceCodester Leave Application System 1.0. Affected by this issue is some unknown functionality of the component User Management Handler. Such manipulation leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed publicly and may be used. |
2026-03-31 | |
| CVE-2026-3356 | 9.3 | CRITICAL | CWE-306 | 0.1% p20 | 6.51 | The MS27102A Remote Spectrum Monitor is vulnerable to an authentication bypass t...The MS27102A Remote Spectrum Monitor is vulnerable to an authentication bypass that allows unauthorized users to access and manipulate its management interface. Because the device provides no mechanism to enable or configure authentication, the issue is inherent to its design rather than a deployment error. |
2026-03-31 | |
| CVE-2026-30521 | 6.5 | MEDIUM | NVD-CWE-noinfo | 0.0% p12 | 4.55 | A Business Logic vulnerability exists in SourceCodester Loan Management System v...A Business Logic vulnerability exists in SourceCodester Loan Management System v1.0 due to improper server-side validation. The application allows administrators to create "Loan Plans" with specific interest rates. While the frontend interface prevents users from entering negative numbers, this constraint is not enforced on the backend. An authenticated attacker can bypass the client-side restriction by manipulating the HTTP POST request to submit a negative value for the interest_percentage. This results in the creation of loan plans with negative interest rates. |
2026-03-31 | |
| CVE-2026-5206 | 5.3 | MEDIUM | CWE-74 | 0.0% p8 | 3.71 | A security vulnerability has been detected in code-projects Simple Gym Managemen...A security vulnerability has been detected in code-projects Simple Gym Management System 1.0. This vulnerability affects unknown code of the component Payment Handler. The manipulation of the argument Payment_id/Amount/customer_id/payment_type/customer_name leads to sql injection. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used. |
2026-03-31 | |
| CVE-2026-33415 | 5.1 | MEDIUM | CWE-284 | 0.0% p7 | 3.57 | Discourse is an open-source discussion platform. From versions 2026.1.0-latest t...Discourse is an open-source discussion platform. From versions 2026.1.0-latest to before 2026.1.3, 2026.2.0-latest to before 2026.2.2, and 2026.3.0-latest to before 2026.3.0, an authenticated moderator-level user could retrieve post content, topic titles, and usernames from categories they were not authorized to view. Insufficient access controls on a sentiment analytics endpoint allowed category permission boundaries to be bypassed. This issue has been patched in versions 2026.1.3, 2026.2.2, and 2026.3.0. |
2026-03-31 | |
| CVE-2026-33300 | 5.3 | MEDIUM | CWE-200 | 0.0% p10 | 3.71 | Discourse is an open-source discussion platform. From versions 2026.1.0-latest t...Discourse is an open-source discussion platform. From versions 2026.1.0-latest to before 2026.1.3, 2026.2.0-latest to before 2026.2.2, and 2026.3.0-latest to before 2026.3.0, an authorization bypass in the Category Chatables Controller show action allowed moderators to get information on hidden groups names and user count. This issue has been patched in versions 2026.1.3, 2026.2.2, and 2026.3.0. |
2026-03-31 | |
| CVE-2026-33185 | 5.3 | MEDIUM | CWE-918 | 0.0% p8 | 3.71 | Discourse is an open-source discussion platform. From versions 2026.1.0-latest t...Discourse is an open-source discussion platform. From versions 2026.1.0-latest to before 2026.1.3, 2026.2.0-latest to before 2026.2.2, and 2026.3.0-latest to before 2026.3.0, the group email settings test endpoint could be used to make the server initiate outbound connections to arbitrary hosts and ports. This could allow probing of internal network infrastructure. The endpoint was accessible to non-staff group owners. This issue has been patched in versions 2026.1.3, 2026.2.2, and 2026.3.0. |
2026-03-31 | |
| CVE-2026-33074 | 6.3 | MEDIUM | CWE-269 | 0.0% p11 | 4.41 | Discourse is an open-source discussion platform. From versions 2026.1.0-latest t...Discourse is an open-source discussion platform. From versions 2026.1.0-latest to before 2026.1.3, 2026.2.0-latest to before 2026.2.2, and 2026.3.0-latest to before 2026.3.0, a user may be able to purchase a lower tier subscription but grant themselves the benefits that comes along with a higher tier subscription. This issue has been patched in versions 2026.1.3, 2026.2.2, and 2026.3.0. |
2026-03-31 | |
| CVE-2026-33073 | 2.0 | LOW | CWE-200 | 0.0% p9 | 1.40 | Discourse is an open-source discussion platform. From versions 2026.1.0-latest t...Discourse is an open-source discussion platform. From versions 2026.1.0-latest to before 2026.1.3, 2026.2.0-latest to before 2026.2.2, and 2026.3.0-latest to before 2026.3.0, the discourse-subscriptions plugin leaks stripe API keys across sites in a multisite cluster resulting in the potential for stripe related information to be leaked across sites within the same multisite cluster. This issue has been patched in versions 2026.1.3, 2026.2.2, and 2026.3.0. |
2026-03-31 | |
| CVE-2026-32951 | 4.3 | MEDIUM | CWE-200 | 0.0% p9 | 3.01 | Discourse is an open-source discussion platform. From versions 2026.1.0-latest t...Discourse is an open-source discussion platform. From versions 2026.1.0-latest to before 2026.1.3, 2026.2.0-latest to before 2026.2.2, and 2026.3.0-latest to before 2026.3.0, an authenticated user can obtain shared draft topic titles by sending an inline onebox request with a category_id parameter matching the shared drafts category. This issue has been patched in versions 2026.1.3, 2026.2.2, and 2026.3.0. |
2026-03-31 | |
| CVE-2026-32726 | 8.1 | HIGH | CWE-863 | 0.0% p9 | 5.67 | SciTokens C++ is a minimal library for creating and using SciTokens from C or C+...SciTokens C++ is a minimal library for creating and using SciTokens from C or C++. Prior to version 1.4.1, scitokens-cpp is vulnerable to an authorization bypass in path-based scope validation. The enforcer used a simple string-prefix comparison when checking whether a requested resource path was covered by a token's authorized scope path. Because the check did not require a path-segment boundary, a token scoped to one path could incorrectly authorize access to sibling paths that merely started with the same prefix. This issue has been patched in version 1.4.1. |
2026-03-31 | |
| CVE-2026-32725 | 8.3 | HIGH | CWE-23 | 0.2% p38 | 5.82 | SciTokens C++ is a minimal library for creating and using SciTokens from C or C+...SciTokens C++ is a minimal library for creating and using SciTokens from C or C++. Prior to version 1.4.1, scitokens-cpp is vulnerable to an authorization bypass when processing path-based scopes in tokens. The library normalizes the scope path from the token before authorization and collapses ".." path components instead of rejecting them. As a result, an attacker can use parent-directory traversal in the scope claim to broaden the effective authorization beyond the intended directory. This issue has been patched in version 1.4.1. |
2026-03-31 | |
| CVE-2026-32620 | 5.3 | MEDIUM | CWE-200 | 0.0% p9 | 3.71 | Discourse is an open-source discussion platform. From versions 2026.1.0-latest t...Discourse is an open-source discussion platform. From versions 2026.1.0-latest to before 2026.1.3, 2026.2.0-latest to before 2026.2.2, and 2026.3.0-latest to before 2026.3.0, non-staff users could access read receipt information for staff-only posts they weren't supposed to see. No post content was exposed, only metadata about who read the post and when. This issue has been patched in versions 2026.1.3, 2026.2.2, and 2026.3.0. |
2026-03-31 | |
| CVE-2026-32619 | 6.3 | MEDIUM | CWE-285 | 0.0% p9 | 4.41 | Discourse is an open-source discussion platform. From versions 2026.1.0-latest t...Discourse is an open-source discussion platform. From versions 2026.1.0-latest to before 2026.1.3, 2026.2.0-latest to before 2026.2.2, and 2026.3.0-latest to before 2026.3.0, users who lost access to a topic (e.g., removed from a private category group) could still interact with polls in that topic, including voting and toggling poll status. No content was exposed, but users could modify poll state in topics they should no longer have access to. This issue has been patched in versions 2026.1.3, 2026.2.2, and 2026.3.0. |
2026-03-31 | |
| CVE-2026-32618 | 4.3 | MEDIUM | CWE-200 | 0.0% p9 | 3.01 | Discourse is an open-source discussion platform. From versions 2026.1.0-latest t...Discourse is an open-source discussion platform. From versions 2026.1.0-latest to before 2026.1.3, 2026.2.0-latest to before 2026.2.2, and 2026.3.0-latest to before 2026.3.0, there is possible channel membership inference from chat user search without authorization. This issue has been patched in versions 2026.1.3, 2026.2.2, and 2026.3.0. |
2026-03-31 | |
| CVE-2026-32615 | 5.3 | MEDIUM | CWE-285 | 0.0% p8 | 3.71 | Discourse is an open-source discussion platform. From versions 2026.1.0-latest t...Discourse is an open-source discussion platform. From versions 2026.1.0-latest to before 2026.1.3, 2026.2.0-latest to before 2026.2.2, and 2026.3.0-latest to before 2026.3.0, category group moderators could perform privileged actions on topics inside private categories they did not have read access to. This issue has been patched in versions 2026.1.3, 2026.2.2, and 2026.3.0. |
2026-03-31 | |
| CVE-2026-32607 | 2.1 | LOW | CWE-79 | 0.0% p8 | 1.47 | Discourse is an open-source discussion platform. From versions 2026.1.0-latest t...Discourse is an open-source discussion platform. From versions 2026.1.0-latest to before 2026.1.3, 2026.2.0-latest to before 2026.2.2, and 2026.3.0-latest to before 2026.3.0, when the hidden prioritize_full_name_in_ux site setting is enabled (defaults to false, requires console access to change), user and group display names are rendered without HTML escaping in several assignment-related UI paths. This allows users with assign permission to inject arbitrary HTML/JavaScript that executes in the browser of any user viewing an affected topic. This issue has been patched in versions 2026.1.3, 2026.2.2, and 2026.3.0. |
2026-03-31 | |
| CVE-2026-32273 | 5.4 | MEDIUM | CWE-79 | 0.0% p8 | 3.78 | Discourse is an open-source discussion platform. From versions 2026.1.0-latest t...Discourse is an open-source discussion platform. From versions 2026.1.0-latest to before 2026.1.3, 2026.2.0-latest to before 2026.2.2, and 2026.3.0-latest to before 2026.3.0, updating a category description via API is not sanitizing the description string, which can lead to XSS attacks. This issue has been patched in versions 2026.1.3, 2026.2.2, and 2026.3.0. |
2026-03-31 | |
| CVE-2026-32243 | 5.3 | MEDIUM | CWE-79 | 0.0% p8 | 3.71 | Discourse is an open-source discussion platform. From versions 2026.1.0-latest t...Discourse is an open-source discussion platform. From versions 2026.1.0-latest to before 2026.1.3, 2026.2.0-latest to before 2026.2.2, and 2026.3.0-latest to before 2026.3.0, an attacker with the ability to create shared AI conversations could inject arbitrary HTML and JavaScript via crafted conversation titles. This payload would execute in the browser of any user viewing the onebox preview, potentially allowing session hijacking or unauthorized actions on behalf of the victim. This issue has been patched in versions 2026.1.3, 2026.2.2, and 2026.3.0. |
2026-03-31 | |
| CVE-2026-32143 | 5.3 | MEDIUM | CWE-200 | 0.0% p10 | 3.71 | Discourse is an open-source discussion platform. From versions 2026.1.0-latest t...Discourse is an open-source discussion platform. From versions 2026.1.0-latest to before 2026.1.3, 2026.2.0-latest to before 2026.2.2, and 2026.3.0-latest to before 2026.3.0, moderators could export CSV data for admin-restricted reports, bypassing the report visibility restrictions. This could expose sensitive operational data intended only for admins. This issue has been patched in versions 2026.1.3, 2026.2.2, and 2026.3.0. |
2026-03-31 | |
| CVE-2026-32113 | 5.1 | MEDIUM | CWE-601 | 0.1% p15 | 3.57 | Discourse is an open-source discussion platform. From versions 2026.1.0-latest t...Discourse is an open-source discussion platform. From versions 2026.1.0-latest to before 2026.1.3, 2026.2.0-latest to before 2026.2.2, and 2026.3.0-latest to before 2026.3.0, the enter action in StaticController reads the sso_destination_url cookie and redirects to it with allow_other_host: true without validating the destination URL. While this cookie is normally set during legitimate DiscourseConnect Provider flows with cryptographically validated SSO payloads, cookies are client-controlled and can be set by attackers. This issue has been patched in versions 2026.1.3, 2026.2.2, and 2026.3.0. |
2026-03-31 | |
| CVE-2026-30520 | 5.4 | MEDIUM | CWE-89 | 0.0% p7 | 3.78 | A Blind SQL Injection vulnerability exists in SourceCodester Loan Management Sys...A Blind SQL Injection vulnerability exists in SourceCodester Loan Management System v1.0. The vulnerability is located in the ajax.php file (specifically the save_loan action). The application fails to properly sanitize user input supplied to the "borrower_id" parameter in a POST request, allowing an authenticated attacker to inject malicious SQL commands. |
2026-03-31 | |
| CVE-2026-30286 | 9.8 | CRITICAL | CWE-22 | 0.1% p32 | 6.86 | An arbitrary file overwrite vulnerability in Funambol, Inc. Zefiro Cloud v32.0.2...An arbitrary file overwrite vulnerability in Funambol, Inc. Zefiro Cloud v32.0.2026011614 allows attackers to overwrite critical internal files via the file import process, leading to arbitrary code execution or information exposure. |
2026-03-31 | |
| CVE-2026-30283 | 9.8 | CRITICAL | CWE-22 | 0.1% p27 | 6.86 | An arbitrary file overwrite vulnerability in PEAKSEL D.O.O. NIS Animal Sounds an...An arbitrary file overwrite vulnerability in PEAKSEL D.O.O. NIS Animal Sounds and Ringtones v1.3.0 allows attackers to overwrite critical internal files via the file import process, leading to arbitrary code execution or information exposure. |
2026-03-31 | |
| CVE-2026-30282 | 9.0 | CRITICAL | CWE-22 | 0.0% p14 | 6.30 | An arbitrary file overwrite vulnerability in UXGROUP LLC Cast to TV Screen Mirro...An arbitrary file overwrite vulnerability in UXGROUP LLC Cast to TV Screen Mirroring v2.2.77 allows attackers to overwrite critical internal files via the file import process, leading to arbtrary code execution or information exposure. |
2026-03-31 | |
| CVE-2026-30279 | 8.4 | HIGH | CWE-22 | 0.0% p6 | 5.88 | An arbitrary file overwrite vulnerability in Squareapps LLC My Location Travel T...An arbitrary file overwrite vulnerability in Squareapps LLC My Location Travel Timeline v11.80 allows attackers to overwrite critical internal files via the file import process, leading to arbitrary code execution or information exposure. |
2026-03-31 | |
| CVE-2026-30278 | 9.8 | CRITICAL | CWE-22 | 0.1% p25 | 6.86 | An arbitrary file overwrite vulnerability in FLY is FUN Aviation Navigation v35....An arbitrary file overwrite vulnerability in FLY is FUN Aviation Navigation v35.33 allows attackers to overwrite critical internal files via the file import process, leading to arbitrary code execution or information exposure. |
2026-03-31 | |
| CVE-2026-30277 | 8.4 | HIGH | CWE-22 | 0.0% p6 | 5.88 | An arbitrary file overwrite vulnerability in PDF Reader App : TA/UTAX Mobile Pri...An arbitrary file overwrite vulnerability in PDF Reader App : TA/UTAX Mobile Print v3.7.2.251001 allows attackers to overwrite critical internal files via the file import process, leading to arbitrary code execution or information exposure. |
2026-03-31 | |
| CVE-2025-62184 | 4.8 | MEDIUM | CWE-79 | 0.0% p8 | 3.36 | Pega Platform versions 8.1.0 through 25.1.0 are affected by a Stored Cross-site ...Pega Platform versions 8.1.0 through 25.1.0 are affected by a Stored Cross-site Scripting vulnerability in a user interface component. Requires an administrative user and given extensive access rights, impact to Confidentiality is low and Integrity is none. |
2026-03-31 | |
| CVE-2026-5205 | 5.3 | MEDIUM | CWE-918 | 0.0% p10 | 3.71 | A vulnerability was identified in chatwoot up to 4.11.2. Affected by this vulner...A vulnerability was identified in chatwoot up to 4.11.2. Affected by this vulnerability is the function Webhooks::Trigger in the library lib/webhooks/trigger.rb of the component Webhook API. Such manipulation of the argument url leads to server-side request forgery. The attack can be launched remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-31 | |
| CVE-2026-34361 | 9.3 | CRITICAL | CWE-552 | 0.0% p13 | 6.51 | HAPI FHIR is a complete implementation of the HL7 FHIR standard for healthcare i...HAPI FHIR is a complete implementation of the HL7 FHIR standard for healthcare interoperability in Java. Prior to version 6.9.4, the FHIR Validator HTTP service exposes an unauthenticated "/loadIG" endpoint that makes outbound HTTP requests to attacker-controlled URLs. Combined with a startsWith() URL prefix matching flaw in the credential provider (ManagedWebAccessUtils.getServer()), an attacker can steal authentication tokens (Bearer, Basic, API keys) configured for legitimate FHIR servers by registering a domain that prefix-matches a configured server URL. This issue has been patched in version 6.9.4. |
2026-03-31 | |
| CVE-2026-34360 | 5.8 | MEDIUM | CWE-918 | 0.0% p12 | 4.06 | HAPI FHIR is a complete implementation of the HL7 FHIR standard for healthcare i...HAPI FHIR is a complete implementation of the HL7 FHIR standard for healthcare interoperability in Java. Prior to version 6.9.4, the /loadIG HTTP endpoint in the FHIR Validator HTTP service accepts a user-supplied URL via JSON body and makes server-side HTTP requests to it without any hostname, scheme, or domain validation. An unauthenticated attacker with network access to the validator can probe internal network services, cloud metadata endpoints, and map network topology through error-based information leakage. With explore=true (the default for this code path), each request triggers multiple outbound HTTP calls, amplifying reconnaissance capability. This issue has been patched in version 6.9.4. |
2026-03-31 | |
| CVE-2026-34359 | 7.4 | HIGH | CWE-346 | 0.0% p3 | 5.18 | HAPI FHIR is a complete implementation of the HL7 FHIR standard for healthcare i...HAPI FHIR is a complete implementation of the HL7 FHIR standard for healthcare interoperability in Java. Prior to version 6.9.4, ManagedWebAccessUtils.getServer() uses String.startsWith() to match request URLs against configured server URLs for authentication credential dispatch. Because configured server URLs (e.g., http://tx.fhir.org) lack a trailing slash or host boundary check, an attacker-controlled domain like http://tx.fhir.org.attacker.com matches the prefix and receives Bearer tokens, Basic auth credentials, or API keys when the HTTP client follows a redirect to that domain. This issue has been patched in version 6.9.4. |
2026-03-31 | |
| CVE-2026-24165 | 7.8 | HIGH | CWE-502 | 0.0% p10 | 5.46 | NVIDIA BioNeMo contains a vulnerability where a user could cause a deserializati...NVIDIA BioNeMo contains a vulnerability where a user could cause a deserialization of untrusted data. A successful exploit of this vulnerability might lead to code execution, denial of service, information disclosure, and data tampering. |
2026-03-31 | |
| CVE-2026-24164 | 8.8 | HIGH | CWE-502 | 0.1% p22 | 6.16 | NVIDIA BioNeMo contains a vulnerability where a user could cause a deserializati...NVIDIA BioNeMo contains a vulnerability where a user could cause a deserialization of untrusted data. A successful exploit of this vulnerability might lead to code execution, denial of service, information disclosure, and data tampering. |
2026-03-31 | |
| CVE-2026-24154 | 7.6 | HIGH | CWE-78 | 0.0% p9 | 5.32 | NVIDIA Jetson Linux has vulnerability in initrd, where an unprivileged attacker ...NVIDIA Jetson Linux has vulnerability in initrd, where an unprivileged attacker with physical access coul inject incorrect command line arguments. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, denial of service, data tampering, and information disclosure. |
2026-03-31 | |
| CVE-2026-24153 | 5.2 | MEDIUM | CWE-501 | 0.0% p1 | 3.64 | NVIDIA Jetson Linux has a vulnerability in initrd, where the nvluks trusted appl...NVIDIA Jetson Linux has a vulnerability in initrd, where the nvluks trusted application is not disabled. A successful exploit of this vulnerability might lead to information disclosure. |
2026-03-31 | |
| CVE-2026-24148 | 8.3 | HIGH | CWE-1188 | 0.0% p11 | 5.81 | NVIDIA Jetson for JetPack contains a vulnerability in the system initialization ...NVIDIA Jetson for JetPack contains a vulnerability in the system initialization logic, where an unprivileged attacker could cause the initialization of a resource with an insecure default. A successful exploit of this vulnerability might lead to information disclosure of encrypted data, data tampering, and partial denial of service across devices sharing the same machine ID. |
2026-03-31 | |
| CVE-2026-5204 | 7.4 | HIGH | CWE-119 | 0.1% p26 | 5.18 | A vulnerability was determined in Tenda CH22 1.0.0.1. Affected is the function f...A vulnerability was determined in Tenda CH22 1.0.0.1. Affected is the function formWebTypeLibrary of the file /goform/webtypelibrary of the component Parameter Handler. This manipulation of the argument webSiteId causes stack-based buffer overflow. The attack can be initiated remotely. The exploit has been publicly disclosed and may be utilized. |
2026-03-31 | |
| CVE-2026-5203 | 5.1 | MEDIUM | CWE-22 | 0.1% p16 | 3.57 | A vulnerability was found in CMS Made Simple up to 2.2.22. This impacts the func...A vulnerability was found in CMS Made Simple up to 2.2.22. This impacts the function _copyFilesToFolder in the library modules/UserGuide/lib/class.UserGuideImporterExporter.php of the component UserGuide Module XML Import. The manipulation results in path traversal. It is possible to launch the attack remotely. The exploit has been made public and could be used. This issue has been reported early to the project. They confirmed, that "this has already been discovered and fixed for the next release." |
2026-03-31 | |
| CVE-2026-4819 | 4.9 | MEDIUM | CWE-522 | 0.0% p11 | 3.43 | In Search Guard FLX versions from 1.0.0 up to 4.0.1, the audit logging feature m...In Search Guard FLX versions from 1.0.0 up to 4.0.1, the audit logging feature might log user credentials from users logging into Kibana. |
2026-03-31 | |
| CVE-2026-4818 | 6.8 | MEDIUM | CWE-285 | 0.0% p9 | 4.76 | In Search Guard FLX versions from 3.0.0 up to 4.0.1, there exists an issue which...In Search Guard FLX versions from 3.0.0 up to 4.0.1, there exists an issue which allows users without the necessary privileges to execute some management operations against data streams. |
2026-03-31 | |
| CVE-2026-34595 | 5.3 | MEDIUM | CWE-843 | 0.0% p8 | 3.71 | Parse Server is an open source backend that can be deployed to any infrastructur...Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.70 and 9.7.0-alpha.18, an authenticated user with find class-level permission can bypass the protectedFields class-level permission setting on LiveQuery subscriptions. By sending a subscription with a $or, $and, or $nor operator value as a plain object with numeric keys and a length property (an "array-like" object) instead of an array, the protected-field guard is bypassed. The subscription event firing acts as a binary oracle, allowing the attacker to infer whether a protected field matches a given test value. This issue has been patched in versions 8.6.70 and 9.7.0-alpha.18. |
2026-03-31 | |
| CVE-2026-34574 | 5.3 | MEDIUM | CWE-697 | 0.0% p8 | 3.71 | Parse Server is an open source backend that can be deployed to any infrastructur...Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.69 and 9.7.0-alpha.14, an authenticated user can bypass the immutability guard on session fields (expiresAt, createdWith) by sending a null value in a PUT request to the session update endpoint. This allows nullifying the session expiry, making the session valid indefinitely and bypassing configured session length policies. This issue has been patched in versions 8.6.69 and 9.7.0-alpha.14. |
2026-03-31 | |
| CVE-2026-34573 | 8.2 | HIGH | CWE-407 | 0.1% p16 | 5.74 | Parse Server is an open source backend that can be deployed to any infrastructur...Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.68 and 9.7.0-alpha.12, the GraphQL query complexity validator can be exploited to cause a denial-of-service by sending a crafted query with binary fan-out fragment spreads. A single unauthenticated request can block the Node.js event loop for seconds, denying service to all concurrent users. This only affects deployments that have enabled the requestComplexity.graphQLDepth or requestComplexity.graphQLFields configuration options. This issue has been patched in versions 8.6.68 and 9.7.0-alpha.12. |
2026-03-31 | |
| CVE-2026-34243 | 9.8 | CRITICAL | CWE-77 | 0.2% p46 | 6.87 | wenxian is a tool to generate BIBTEX files from given identifiers (DOI, PMID, ar...wenxian is a tool to generate BIBTEX files from given identifiers (DOI, PMID, arXiv ID, or paper title). In versions 0.3.1 and prior, a GitHub Actions workflow uses untrusted user input from issue_comment.body directly inside a shell command, allowing potential command injection and arbitrary code execution on the runner. At time of publication, there are no publicly available patches. |
2026-03-31 | |
| CVE-2026-34240 | 7.5 | HIGH | CWE-347 | 0.0% p1 | 5.25 | JOSE is a Javascript Object Signing and Encryption (JOSE) library. Prior to vers...JOSE is a Javascript Object Signing and Encryption (JOSE) library. Prior to version 0.3.5+1, a vulnerability in jose could allow an unauthenticated, remote attacker to forge valid JWS/JWT tokens by using a key embedded in the JOSE header (jwk). The vulnerability exists because key selection could treat header-provided jwk as a verification candidate even when that key was not present in the trusted key store. Since JOSE headers are untrusted input, an attacker could exploit this by creating a token payload, embedding an attacker-controlled public key in the header, and signing with the matching private key. Applications using affected versions for token verification are impacted. This issue has been patched in version 0.3.5+1. A workaround for this issue involves rejecting tokens where header jwk is present unless that jwk matches a key already present in the application's trusted key store. |
2026-03-31 | |
| CVE-2026-34237 | 6.1 | MEDIUM | CWE-942 | 0.0% p10 | 4.27 | MCP Java SDK is the official Java SDK for Model Context Protocol servers and cli...MCP Java SDK is the official Java SDK for Model Context Protocol servers and clients. Prior to versions 1.0.1 and 1.1.1, there is a hardcoded wildcard CORS vulnerability. This issue has been patched in versions 1.0.1 and 1.1.1. |
2026-03-31 | |
| CVE-2026-34235 | 6.9 | MEDIUM | CWE-125 | 0.1% p17 | 4.83 | PJSIP is a free and open source multimedia communication library written in C. P...PJSIP is a free and open source multimedia communication library written in C. Prior to version 2.17, a heap out-of-bounds read vulnerability exists in PJSIP's VP9 RTP unpacketizer that occurs when parsing crafted VP9 Scalability Structure (SS) data. Insufficient bounds checking on the payload descriptor length may cause reads beyond the allocated RTP payload buffer. This issue has been patched in version 2.17. A workaround for this issue involves disabling VP9 codec if not needed. |
2026-03-31 | |
| CVE-2026-34231 | 6.1 | MEDIUM | CWE-79 | 0.0% p8 | 4.27 | Slippers is a UI component framework for Django. Prior to version 0.6.3, a Cross...Slippers is a UI component framework for Django. Prior to version 0.6.3, a Cross-Site Scripting (XSS) vulnerability exists in the {% attrs %} template tag of the slippers Django package. When a context variable containing untrusted data is passed to {% attrs %}, the value is interpolated into an HTML attribute string without escaping, allowing an attacker to break out of the attribute context and inject arbitrary HTML or JavaScript into the rendered page. This issue has been patched in version 0.6.3. |
2026-03-31 | |
| CVE-2026-34227 | 5.9 | MEDIUM | CWE-306 | 0.0% p4 | 4.13 | Sliver is a command and control framework that uses a custom Wireguard netstack....Sliver is a command and control framework that uses a custom Wireguard netstack. Prior to version 1.7.4, a single click on a malicious link gives an unauthenticated attacker immediate, silent control over every active C2 session or beacon, capable of exfiltrating all collected target data (e.g. SSH keys, ntds.dit) or destroying the entire compromised infrastructure, entirely through the operator's own browser. This issue has been patched in version 1.7.4. |
2026-03-31 | |
| CVE-2026-34221 | 8.3 | HIGH | CWE-1321 | 0.1% p27 | 5.81 | MikroORM is a TypeScript ORM for Node.js based on Data Mapper, Unit of Work and ...MikroORM is a TypeScript ORM for Node.js based on Data Mapper, Unit of Work and Identity Map patterns. Prior to versions 6.6.10 and 7.0.6, a prototype pollution vulnerability exists in the Utils.merge helper used internally by MikroORM when merging object structures. The function did not prevent special keys such as __proto__, constructor, or prototype, allowing attacker-controlled input to modify the JavaScript object prototype when merged. This issue has been patched in versions 6.6.10 and 7.0.6. |
2026-03-31 | |
| CVE-2026-34220 | 9.3 | CRITICAL | CWE-89 | 0.0% p11 | 6.51 | MikroORM is a TypeScript ORM for Node.js based on Data Mapper, Unit of Work and ...MikroORM is a TypeScript ORM for Node.js based on Data Mapper, Unit of Work and Identity Map patterns. Prior to versions 6.6.10 and 7.0.6, there is a SQL injection vulnerability when specially crafted objects are interpreted as raw SQL query fragments. This issue has been patched in versions 6.6.10 and 7.0.6. |
2026-03-31 | |
| CVE-2026-34219 | 8.2 | HIGH | CWE-190 | 0.1% p16 | 5.74 | libp2p-rust is the official rust language Implementation of the libp2p networkin...libp2p-rust is the official rust language Implementation of the libp2p networking stack. Prior to version 0.49.4, the Rust libp2p Gossipsub implementation contains a remotely reachable panic in backoff expiry handling. After a peer sends a crafted PRUNE control message with an attacker-controlled, near-maximum backoff value, the value is accepted and stored as an Instant near the representable upper bound. On a later heartbeat, the implementation performs unchecked Instant + Duration arithmetic (backoff_time + slack), which can overflow and panic with: overflow when adding duration to instant. This issue is reachable from any Gossipsub peer over normal TCP + Noise + mplex/yamux connectivity and requires no further authentication beyond becoming a protocol peer. This issue has been patched in version 0.49.4. |
2026-03-31 | |
| CVE-2026-34218 | 6.3 | MEDIUM | CWE-269 | 0.0% p2 | 4.41 | ClearanceKit intercepts file-system access events on macOS and enforces per-proc...ClearanceKit intercepts file-system access events on macOS and enforces per-process access policies. Prior to version 4.2.14, two related startup defects created a window during which only the single compile-time baseline rule was enforced by opfilter. All managed (MDM-delivered) and user-defined file-access rules were not applied until the user interacted with policies through the GUI, triggering a policy mutation over XPC. This issue has been patched in version 4.2.14. |
2026-03-31 | |
| CVE-2026-30284 | 8.6 | HIGH | CWE-73 | 0.0% p1 | 6.02 | An arbitrary file overwrite vulnerability in UXGROUP LLC Voice Recorder v10.0 al...An arbitrary file overwrite vulnerability in UXGROUP LLC Voice Recorder v10.0 allows attackers to overwrite critical internal files via the file import process, leading to arbitrary code execution or information exposure. |
2026-03-31 | |
| CVE-2026-30281 | 9.8 | CRITICAL | CWE-73 | 0.1% p24 | 6.86 | An arbitrary file overwrite vulnerability in MaruNuri LLC v2.0.23 allows attacke...An arbitrary file overwrite vulnerability in MaruNuri LLC v2.0.23 allows attackers to overwrite critical internal files via the file import process, leading to arbitrary code execution or information exposure. |
2026-03-31 | |
| CVE-2026-30276 | 9.8 | CRITICAL | CWE-73 | 0.1% p22 | 6.86 | An arbitrary file overwrite vulnerability in DeftPDF Document Translator v54.0 a...An arbitrary file overwrite vulnerability in DeftPDF Document Translator v54.0 allows attackers to overwrite critical internal files via the file import process, leading to arbitrary code execution or information exposure. |
2026-03-31 | |
| CVE-2026-22569 | 5.4 | MEDIUM | CWE-1289 | 0.1% p24 | 3.78 | An incorrect startup configuration of affected versions of Zscaler Client Connec...An incorrect startup configuration of affected versions of Zscaler Client Connector on Windows may cause a limited amount of traffic from being inspected under rare circumstances. |
2026-03-31 | |
| CVE-2026-22561 | 4.7 | MEDIUM | CWE-427 | 0.0% p1 | 3.29 | Uncontrolled search path elements in Anthropic Claude for Windows installer (Cla...Uncontrolled search path elements in Anthropic Claude for Windows installer (Claude Setup.exe) versions prior to 1.1.3363 allow local privilege escalation via DLL search-order hijacking. The installer loads DLLs (e.g., profapi.dll) from its own directory after UAC elevation, enabling arbitrary code execution if a malicious DLL is planted alongside the installer. |
2026-03-31 | |
| CVE-2026-4799 | 4.3 | MEDIUM | CWE-601 | 0.0% p8 | 3.01 | In Search Guard FLX up to version 4.0.1, it is possible to use specially crafted...In Search Guard FLX up to version 4.0.1, it is possible to use specially crafted requests to redirect the user to an untrusted URL. |
2026-03-31 | |
| CVE-2026-34532 | 9.1 | CRITICAL | CWE-863 | 0.0% p11 | 6.37 | Parse Server is an open source backend that can be deployed to any infrastructur...Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.67 and 9.7.0-alpha.11, an attacker can bypass Cloud Function validator access controls by appending "prototype.constructor" to the function name in the URL. When a Cloud Function handler is declared using the function keyword and its validator is a plain object or arrow function, the trigger store traversal resolves the handler through its own prototype chain while the validator store fails to mirror this traversal, causing all access control enforcement to be skipped. This allows unauthenticated callers to invoke Cloud Functions that are meant to be protected by validators such as requireUser, requireMaster, or custom validation logic. This issue has been patched in versions 8.6.67 and 9.7.0-alpha.11. |
2026-03-31 | |
| CVE-2026-34504 | 6.9 | MEDIUM | CWE-918 | 0.0% p15 | 4.83 | OpenClaw before 2026.3.28 contains a server-side request forgery vulnerability i...OpenClaw before 2026.3.28 contains a server-side request forgery vulnerability in the fal provider image-generation-provider.ts component that allows attackers to fetch internal URLs. A malicious or compromised fal relay can exploit unguarded image download fetches to expose internal service metadata and responses through the image pipeline. |
2026-03-31 | |
| CVE-2026-34503 | 8.6 | HIGH | CWE-613 | 0.0% p8 | 6.02 | OpenClaw before 2026.3.28 fails to disconnect active WebSocket sessions when dev...OpenClaw before 2026.3.28 fails to disconnect active WebSocket sessions when devices are removed or tokens are revoked. Attackers with revoked credentials can maintain unauthorized access through existing live sessions until forced reconnection. |
2026-03-31 | |
| CVE-2026-34377 | 8.4 | HIGH | CWE-347 | 0.0% p5 | 5.88 | ZEBRA is a Zcash node written entirely in Rust. Prior to zebrad version 4.3.0 an...ZEBRA is a Zcash node written entirely in Rust. Prior to zebrad version 4.3.0 and zebra-consensus version 5.0.1, a logic error in Zebra's transaction verification cache could allow a malicious miner to induce a consensus split. By matching a valid transaction's txid while providing invalid authorization data, a miner could cause vulnerable Zebra nodes to accept an invalid block, leading to a consensus split from the rest of the Zcash network. This would not allow invalid transactions to be accepted but could result in a consensus split between vulnerable Zebra nodes and invulnerable Zebra and Zcashd nodes. This issue has been patched in zebrad version 4.3.0 and zebra-consensus version 5.0.1. |
2026-03-31 | |
| CVE-2026-34373 | 5.3 | MEDIUM | CWE-346 | 0.0% p4 | 3.71 | Parse Server is an open source backend that can be deployed to any infrastructur...Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.66 and 9.7.0-alpha.10, the GraphQL API endpoint does not respect the allowOrigin server option and unconditionally allows cross-origin requests from any website. This bypasses origin restrictions that operators configure to control which websites can interact with the Parse Server API. The REST API correctly enforces the configured allowOrigin restriction. This issue has been patched in versions 8.6.66 and 9.7.0-alpha.10. |
2026-03-31 | |
| CVE-2026-34363 | 8.2 | HIGH | CWE-362 | 0.0% p12 | 5.74 | Parse Server is an open source backend that can be deployed to any infrastructur...Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.65 and 9.7.0-alpha.9, when multiple clients subscribe to the same class via LiveQuery, the event handlers process each subscriber concurrently using shared mutable objects. The sensitive data filter modifies these shared objects in-place, so when one subscriber's filter removes a protected field, subsequent subscribers may receive the already-filtered object. This can cause protected fields and authentication data to leak to clients that should not see them, or cause clients that should see the data to receive an incomplete object. Additionally, when an afterEvent Cloud Code trigger is registered, one subscriber's trigger modifications can leak to other subscribers through the same shared mutable state. Any Parse Server deployment using LiveQuery with protected fields or afterEvent triggers is affected when multiple clients subscribe to the same class. This issue has been patched in versions 8.6.65 and 9.7.0-alpha.9. |
2026-03-31 | |
| CVE-2026-34224 | 2.1 | LOW | CWE-367 | 0.0% p13 | 1.47 | Parse Server is an open source backend that can be deployed to any infrastructur...Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.64 and 9.7.0-alpha.8, an attacker who possesses a valid authentication provider token and a single MFA recovery code or SMS one-time password can create multiple authenticated sessions by sending concurrent login requests via the authData login endpoint. This defeats the single-use guarantee of MFA recovery codes and SMS one-time passwords, allowing session persistence even after the legitimate user revokes detected sessions. This issue has been patched in versions 8.6.64 and 9.7.0-alpha.8. |
2026-03-31 | |
| CVE-2026-34214 | 7.7 | HIGH | CWE-212 | 0.0% p3 | 5.39 | Trino is a distributed SQL query engine for big data analytics. From version 439...Trino is a distributed SQL query engine for big data analytics. From version 439 to before version 480, Iceberg connector REST catalog static credentials (access key) or vended credentials (temporary access key) are accessible to users that have write privilege on SQL level. This issue has been patched in version 480. |
2026-03-31 | |
| CVE-2026-34210 | 6.0 | MEDIUM | CWE-697 | 0.0% p13 | 4.20 | mppx is a TypeScript interface for machine payments protocol. Prior to version 0...mppx is a TypeScript interface for machine payments protocol. Prior to version 0.4.11, the stripe/charge payment method did not check Stripe's Idempotent-Replayed response header when creating PaymentIntents. An attacker could replay a valid credential containing the same spt token against a new challenge, and the server would accept the replayed Stripe PaymentIntent as a new successful payment without actually charging the customer again. This allowed an attacker to pay once and consume unlimited resources by replaying the credential. This issue has been patched in version 0.4.11. |
2026-03-31 | |
| CVE-2026-34209 | 7.5 | HIGH | CWE-294 | 0.0% p10 | 5.25 | mppx is a TypeScript interface for machine payments protocol. Prior to version 0...mppx is a TypeScript interface for machine payments protocol. Prior to version 0.4.11, the tempo/session cooperative close handler validated the close voucher amount using "<" instead of "<=" against the on-chain settled amount. An attacker could submit a close voucher exactly equal to the settled amount, which would be accepted without committing any new funds, effectively closing or griefing the channel for free. This issue has been patched in version 0.4.11. |
2026-03-31 | |
| CVE-2026-34202 | 9.2 | CRITICAL | CWE-94 | 0.3% p54 | 6.45 | ZEBRA is a Zcash node written entirely in Rust. Prior to zebrad version 4.3.0 an...ZEBRA is a Zcash node written entirely in Rust. Prior to zebrad version 4.3.0 and zebra-chain version 6.0.1, a vulnerability in Zebra's transaction processing logic allows a remote, unauthenticated attacker to cause a Zebra node to panic (crash). This is triggered by sending a specially crafted V5 transaction that passes initial deserialization but fails during transaction ID calculation. This issue has been patched in zebrad version 4.3.0 and zebra-chain version 6.0.1. |
2026-03-31 | |
| CVE-2026-34200 | 7.7 | HIGH | CWE-306 | 0.1% p20 | 5.39 | Nhost is an open source Firebase alternative with GraphQL. Prior to version 1.41...Nhost is an open source Firebase alternative with GraphQL. Prior to version 1.41.0, The Nhost CLI MCP server, when explicitly configured to listen on a network port, applies no inbound authentication and does not enforce strict CORS. This allows a malicious website visited on the same machine to issue cross-origin requests to the MCP server and invoke privileged tools using the developer's locally configured credentials. This vulnerability requires two explicit, non-default configuration steps to be exploitable. The default nhost mcp start configuration is not affected. This issue has been patched in version 1.41.0. |
2026-03-31 | |
| CVE-2026-34172 | 7.7 | HIGH | CWE-1336 | 0.3% p52 | 5.40 | Giskard is an open-source Python library for testing and evaluating agentic syst...Giskard is an open-source Python library for testing and evaluating agentic systems. Prior to versions 0.3.4 and 1.0.2b1, ChatWorkflow.chat(message) passes its string argument directly as a Jinja2 template source to a non-sandboxed Environment. A developer who passes user input to this method enables full remote code execution via Jinja2 class traversal. The method name chat and parameter name message naturally invite passing user input directly, but the string is silently parsed as a Jinja2 template, not treated as plain text. This issue has been patched in versions 0.3.4 and 1.0.2b1. |
2026-03-31 | |
| CVE-2026-34165 | 5.0 | MEDIUM | CWE-191 | 0.0% p2 | 3.50 | go-git is an extensible git implementation library written in pure Go. From vers...go-git is an extensible git implementation library written in pure Go. From version 5.0.0 to before version 5.17.1, a vulnerability has been identified in which a maliciously crafted .idx file can cause asymmetric memory consumption, potentially exhausting available memory and resulting in a denial-of-service (DoS) condition. Exploitation requires write access to the local repository's .git directory, it order to create or alter existing .idx files. This issue has been patched in version 5.17.1. |
2026-03-31 | |
| CVE-2026-34163 | 7.7 | HIGH | CWE-918 | 0.0% p9 | 5.39 | FastGPT is an AI Agent building platform. Prior to version 4.14.9.5, FastGPT's M...FastGPT is an AI Agent building platform. Prior to version 4.14.9.5, FastGPT's MCP (Model Context Protocol) tools endpoints (/api/core/app/mcpTools/getTools and /api/core/app/mcpTools/runTool) accept a user-supplied URL parameter and make server-side HTTP requests to it without validating whether the URL points to an internal/private network address. Although the application has a dedicated isInternalAddress() function for SSRF protection (used in other endpoints like the HTTP workflow node), the MCP tools endpoints do not call this function. An authenticated attacker can use these endpoints to scan internal networks, access cloud metadata services, and interact with internal services such as MongoDB and Redis. This issue has been patched in version 4.14.9.5. |
2026-03-31 | |
| CVE-2026-34162 | 10.0 | CRITICAL | CWE-306 | 0.2% p36 | 7.00 | FastGPT is an AI Agent building platform. Prior to version 4.14.9.5, the FastGPT...FastGPT is an AI Agent building platform. Prior to version 4.14.9.5, the FastGPT HTTP tools testing endpoint (/api/core/app/httpTools/runTool) is exposed without any authentication. This endpoint acts as a full HTTP proxy — it accepts a user-supplied baseUrl, toolPath, HTTP method, custom headers, and body, then makes a server-side HTTP request and returns the complete response to the caller. This issue has been patched in version 4.14.9.5. |
2026-03-31 | |
| CVE-2026-33762 | 2.8 | LOW | CWE-129 | 0.0% p2 | 1.96 | go-git is an extensible git implementation library written in pure Go. Prior to ...go-git is an extensible git implementation library written in pure Go. Prior to version 5.17.1, go-git’s index decoder for format version 4 fails to validate the path name prefix length before applying it to the previously decoded path name. A maliciously crafted index file can trigger an out-of-bounds slice operation, resulting in a runtime panic during normal index parsing. This issue only affects Git index format version 4. Earlier formats (go-git supports only v2 and v3) are not vulnerable to this issue. This issue has been patched in version 5.17.1. |
2026-03-31 | |
| CVE-2026-33581 | 7.1 | HIGH | CWE-22 | 0.0% p14 | 4.97 | OpenClaw before 2026.3.24 contains a sandbox bypass vulnerability in the message...OpenClaw before 2026.3.24 contains a sandbox bypass vulnerability in the message tool that allows attackers to read arbitrary local files by using mediaUrl and fileUrl alias parameters that bypass localRoots validation. Remote attackers can exploit this by routing file requests through unvalidated alias parameters to access files outside the intended sandbox directory. |
2026-03-31 | |
| CVE-2026-33580 | 6.3 | MEDIUM | CWE-307 | 0.1% p22 | 4.41 | OpenClaw before 2026.3.28 contains a missing rate limiting vulnerability in the ...OpenClaw before 2026.3.28 contains a missing rate limiting vulnerability in the Nextcloud Talk webhook authentication that allows attackers to brute-force weak shared secrets. Attackers who can reach the webhook endpoint can exploit this to forge inbound webhook events by repeatedly attempting authentication without throttling. |
2026-03-31 | |
| CVE-2026-33579 | 9.4 | CRITICAL | CWE-863 | 0.0% p3 | 6.58 | OpenClaw before 2026.3.28 contains a privilege escalation vulnerability in the /...OpenClaw before 2026.3.28 contains a privilege escalation vulnerability in the /pair approve command path that fails to forward caller scopes into the core approval check. A caller with pairing privileges but without admin privileges can approve pending device requests asking for broader scopes including admin access by exploiting the missing scope validation in extensions/device-pair/index.ts and src/infra/device-pairing.ts. |
2026-03-31 | |
| CVE-2026-33578 | 5.3 | MEDIUM | CWE-863 | 0.0% p1 | 3.71 | OpenClaw before 2026.3.28 contains a sender policy bypass vulnerability in the G...OpenClaw before 2026.3.28 contains a sender policy bypass vulnerability in the Google Chat and Zalouser extensions where route-level group allowlist policies silently downgrade to open policy. Attackers can exploit this policy resolution flaw to bypass sender restrictions and interact with bots despite configured allowlist restrictions. |
2026-03-31 | |
| CVE-2026-33577 | 8.6 | HIGH | CWE-863 | 0.0% p1 | 6.02 | OpenClaw before 2026.3.28 contains an insufficient scope validation vulnerabilit...OpenClaw before 2026.3.28 contains an insufficient scope validation vulnerability in the node pairing approval path that allows low-privilege operators to approve nodes with broader scopes. Attackers can exploit missing callerScopes validation in node-pairing.ts to extend privileges onto paired nodes beyond their authorization level. |
2026-03-31 | |
| CVE-2026-33576 | 6.9 | MEDIUM | CWE-863 | 0.0% p15 | 4.83 | OpenClaw before 2026.3.28 downloads and stores inbound media from Zalo channels ...OpenClaw before 2026.3.28 downloads and stores inbound media from Zalo channels before validating sender authorization. Unauthorized senders can force network fetches and disk writes to the media store by sending messages that are subsequently rejected. |
2026-03-31 | |
| CVE-2026-33276 | 8.6 | HIGH | CWE-79 | 0.0% p8 | 6.02 | Stored cross-site scripting (XSS) in Checkmk 2.5.0 (beta) before 2.5.0b2 allows ...Stored cross-site scripting (XSS) in Checkmk 2.5.0 (beta) before 2.5.0b2 allows authenticated users with permission to create hosts or services to execute arbitrary JavaScript in the browsers of other users performing searches in the Unified Search feature. |
2026-03-31 | |
| CVE-2026-30314 | 9.8 | CRITICAL | CWE-78 | 0.7% p71 | 6.88 | Ridvay Code's command auto-approval module contains a critical OS command inject...Ridvay Code's command auto-approval module contains a critical OS command injection vulnerability that renders its whitelist security mechanism completely ineffective. The system relies on fragile regular expressions to parse command structures; while it attempts to intercept dangerous operations, it fails to account for standard Shell command substitution Ridvay Code (specifically$(...)and backticks ...). An attacker can construct a command such as git log --grep="$(malicious_command)", forcing Syntx to misidentify it as a safe git operation and automatically approve it. The underlying Shell prioritizes the execution of the malicious code injected within the arguments, resulting in Remote Code Execution without any user interaction. |
2026-03-31 | |
| CVE-2026-30312 | 9.8 | CRITICAL | CWE-78 | 0.9% p75 | 6.89 | DSAI-Cline's command auto-approval module contains a critical OS command injecti...DSAI-Cline's command auto-approval module contains a critical OS command injection vulnerability that renders its whitelist security mechanism completely ineffective. The system relies on string-based parsing to validate commands; while it intercepts dangerous operators such as ;, &&, ||, |, and command substitution patterns, it fails to account for raw newline characters embedded within the input. An attacker can construct a payload by embedding a literal newline between a whitelisted command and malicious code (e.g., git log malicious_command), forcing DSAI-Cline to misidentify it as a safe operation and automatically approve it. The underlying PowerShell interpreter treats the newline as a command separator, executing both commands sequentially, resulting in Remote Code Execution without any user interaction. |
2026-03-31 | |
| CVE-2026-30311 | 9.8 | CRITICAL | CWE-78 | 0.7% p71 | 6.88 | Ridvay Code's command auto-approval module contains a critical OS command inject...Ridvay Code's command auto-approval module contains a critical OS command injection vulnerability that renders its whitelist security mechanism completely ineffective. The system relies on fragile regular expressions to parse command structures; while it attempts to intercept dangerous operations, it fails to account for standard Shell command substitution Ridvay Code (specifically$(...)and backticks ...). An attacker can construct a command such as git log --grep="$(malicious_command)", forcing Syntx to misidentify it as a safe git operation and automatically approve it. The underlying Shell prioritizes the execution of the malicious code injected within the arguments, resulting in Remote Code Execution without any user interaction. |
2026-03-31 | |
| CVE-2026-30309 | 7.8 | HIGH | CWE-78 | 0.0% p10 | 5.46 | InfCode's terminal auto-execution module contains a critical command filtering v...InfCode's terminal auto-execution module contains a critical command filtering vulnerability that renders its blacklist security mechanism completely ineffective. The predefined blocklist fails to cover native high-risk commands in Windows PowerShell (such as powershell), and the matching algorithm lacks dynamic semantic parsing unable to recognize string concatenation, variable assignment, or double-quote interpolation in Shell syntax. Malicious commands can bypass interception through simple syntax obfuscation. An attacker can construct a file containing malicious instructions for remote code injection. When a user imports and views such a file in the IDE, the Agent executes dangerous PowerShell commands outside the blacklist without user confirmation, resulting in arbitrary command execution or sensitive data leakage. |
2026-03-31 | |
| CVE-2026-29870 | 7.6 | HIGH | CWE-22 | 0.1% p26 | 5.32 | A directory traversal vulnerability in the agentic-context-engine project versio...A directory traversal vulnerability in the agentic-context-engine project versions up to 0.7.1 allows arbitrary file writes via the checkpoint_dir parameter in OfflineACE.run. The save_to_file method in ace/skillbook.py fails to normalize or validate filesystem paths, allowing traversal sequences to escape the intended checkpoint directory. This vulnerability allows attackers to overwrite arbitrary files accessible to the application process, potentially leading to application corruption, privilege escalation, or code execution depending on the deployment context. |
2026-03-31 | |
| CVE-2026-20915 | 8.5 | HIGH | CWE-79 | 0.0% p7 | 5.95 | Stored cross-site scripting (XSS) in Checkmk version 2.5.0 (beta) before 2.5.0b2...Stored cross-site scripting (XSS) in Checkmk version 2.5.0 (beta) before 2.5.0b2 allows authenticated users with permission to create pending changes to inject malicious JavaScript into the Pending Changes sidebar, which will execute in the browsers of other users viewing the sidebar. |
2026-03-31 | |
| CVE-2026-0596 | 7.8 | HIGH | CWE-78 | 0.1% p23 | 5.46 | A command injection vulnerability exists in mlflow/mlflow when serving a model w...A command injection vulnerability exists in mlflow/mlflow when serving a model with `enable_mlserver=True`. The `model_uri` is embedded directly into a shell command executed via `bash -c` without proper sanitization. If the `model_uri` contains shell metacharacters, such as `$()` or backticks, it allows for command substitution and execution of attacker-controlled commands. This vulnerability affects the latest version of mlflow/mlflow and can lead to privilege escalation if a higher-privileged service serves models from a directory writable by lower-privileged users. |
2026-03-31 | |
| CVE-2026-3308 | 7.8 | HIGH | CWE-190 | 0.0% p4 | 5.46 | An integer overflow vulnerability in 'pdf-image.c' in Artifex's MuPDF version 1....An integer overflow vulnerability in 'pdf-image.c' in Artifex's MuPDF version 1.27.0 allows an attacker to maliciously craft a PDF that can trigger an integer overflow within the 'pdf_load_image_imp' function. This allows a heap out-of-bounds write that could be exploited for arbitrary code execution. |
2026-03-31 | |
| CVE-2026-34156 | 9.9 | CRITICAL | CWE-913 | 7.2% p91 | 7.15 | NocoBase is an AI-powered no-code/low-code platform for building business applic...NocoBase is an AI-powered no-code/low-code platform for building business applications and enterprise solutions. Prior to version 2.0.28, NocoBase's Workflow Script Node executes user-supplied JavaScript inside a Node.js vm sandbox with a custom require allowlist (controlled by WORKFLOW_SCRIPT_MODULES env var). However, the console object passed into the sandbox context exposes host-realm WritableWorkerStdio stream objects via console._stdout and console._stderr. An authenticated attacker can traverse the prototype chain to escape the sandbox and achieve Remote Code Execution as root. This issue has been patched in version 2.0.28. |
2026-03-31 | |
| CVE-2026-34155 | 7.2 | HIGH | CWE-196 | 0.0% p3 | 5.04 | RAUC controls the update process on embedded Linux systems. Prior to version 1.1...RAUC controls the update process on embedded Linux systems. Prior to version 1.15.2, RAUC bundles using the 'plain' format exceeding a payload size of 2 GiB cause an integer overflow which results in a signature which covers only the first few bytes of the payload. Given such a bundle with a legitimate signature, an attacker can modify the part of the payload which is not covered by the signature. This issue has been patched in version 1.15.2. |
2026-03-31 | |
| CVE-2026-30310 | 9.8 | CRITICAL | CWE-77 | 0.1% p24 | 6.86 | In its design for automatic terminal command execution, Sixth offers two options...In its design for automatic terminal command execution, Sixth offers two options: Execute safe commands and Execute all commands. The description for the former states that commands determined by the model to be safe will be automatically executed, whereas if the model judges a command to be potentially destructive, it still requires user approval. However, this design is highly susceptible to prompt injection attacks. An attacker can employ a generic template to wrap any malicious command and mislead the model into misclassifying it as a 'safe' command, thereby bypassing the user approval requirement and resulting in arbitrary command execution. |
2026-03-31 | |
| CVE-2026-5198 | 6.9 | MEDIUM | CWE-74 | 0.0% p1 | 4.83 | A vulnerability was determined in code-projects Student Membership System 1.0. T...A vulnerability was determined in code-projects Student Membership System 1.0. The impacted element is an unknown function of the file /admin/index.php of the component Admin Login. This manipulation of the argument username/password causes sql injection. Remote exploitation of the attack is possible. The exploit has been publicly disclosed and may be utilized. |
2026-03-31 | |
| CVE-2026-4267 | 7.2 | HIGH | CWE-79 | 0.1% p25 | 5.04 | The Query Monitor – The developer tools panel for WordPress plugin for WordPress...The Query Monitor – The developer tools panel for WordPress plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘$_SERVER['REQUEST_URI']’ parameter in all versions up to, and including, 3.20.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. |
2026-03-31 | |
| CVE-2026-3191 | 5.4 | MEDIUM | CWE-352 | 0.0% p2 | 3.78 | The Minify HTML plugin for WordPress is vulnerable to Cross-Site Request Forgery...The Minify HTML plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.1.12. This is due to missing or incorrect nonce validation on the 'minify_html_menu_options' function. This makes it possible for unauthenticated attackers to update plugin settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. |
2026-03-31 | |
| CVE-2026-3139 | 4.3 | MEDIUM | CWE-639 | 0.0% p8 | 3.01 | The User Profile Builder – Beautiful User Registration Forms, User Profiles & Us...The User Profile Builder – Beautiful User Registration Forms, User Profiles & User Role Editor plugin for WordPress is vulnerable to Insecure Direct Object Reference in versions up to, and including, 3.15.5 via the wppb_save_avatar_value() function due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with subscriber-level access and above, to reassign ownership of arbitrary posts and attachments by changing 'post_author'. |
2026-03-31 | |
| CVE-2026-34509 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering...Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. |
2026-03-31 | |
| CVE-2026-34508 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering...Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. |
2026-03-31 | |
| CVE-2026-34506 | 2.3 | LOW | CWE-863 | 0.0% p8 | 1.61 | OpenClaw before 2026.3.8 contains a sender allowlist bypass vulnerability in its...OpenClaw before 2026.3.8 contains a sender allowlist bypass vulnerability in its Microsoft Teams plugin that allows unauthorized senders to bypass intended authorization checks. When a team/channel route allowlist is configured with an empty groupAllowFrom parameter, the message handler synthesizes wildcard sender authorization, permitting any sender in the matched team/channel to trigger replies in allowlisted Teams routes. |
2026-03-31 | |
| CVE-2026-34505 | 6.9 | MEDIUM | CWE-307 | 0.1% p22 | 4.83 | OpenClaw before 2026.3.12 applies rate limiting only after successful webhook au...OpenClaw before 2026.3.12 applies rate limiting only after successful webhook authentication, allowing attackers to bypass rate limits and brute-force webhook secrets. Attackers can submit repeated authentication requests with invalid secrets without triggering rate limit responses, enabling systematic secret guessing and subsequent forged webhook submission. |
2026-03-31 | |
| CVE-2026-32988 | 5.8 | MEDIUM | CWE-367 | 0.0% p2 | 4.06 | OpenClaw before 2026.3.11 contains a sandbox boundary bypass vulnerability in fs...OpenClaw before 2026.3.11 contains a sandbox boundary bypass vulnerability in fs-bridge staged writes where temporary file creation and population are not pinned to a verified parent directory. Attackers can exploit a race condition in parent-path alias changes to write attacker-controlled bytes outside the intended validated path before the final guarded replace step executes. |
2026-03-31 | |
| CVE-2026-32982 | 8.7 | HIGH | CWE-532 | 0.0% p12 | 6.09 | OpenClaw before 2026.3.13 contains an information disclosure vulnerability in th...OpenClaw before 2026.3.13 contains an information disclosure vulnerability in the fetchRemoteMedia function that exposes Telegram bot tokens in error messages. When media downloads fail, the original Telegram file URLs containing bot tokens are embedded in MediaFetchError strings and leaked to logs and error surfaces. |
2026-03-31 | |
| CVE-2026-32977 | 5.8 | MEDIUM | CWE-367 | 0.0% p2 | 4.06 | OpenClaw before 2026.3.11 contains a sandbox boundary bypass vulnerability in th...OpenClaw before 2026.3.11 contains a sandbox boundary bypass vulnerability in the fs-bridge writeFile commit step that uses an unanchored container path during the final move operation. An attacker can exploit a time-of-check-time-of-use race condition by modifying parent paths inside the sandbox to redirect committed files outside the validated writable path within the container mount namespace. |
2026-03-31 | |
| CVE-2026-32976 | 7.1 | HIGH | CWE-639 | 0.0% p8 | 4.97 | OpenClaw before 2026.3.11 contains an authorization bypass vulnerability allowin...OpenClaw before 2026.3.11 contains an authorization bypass vulnerability allowing channel commands to mutate protected sibling-account configuration despite configWrites restrictions. Attackers with authorized access on one account can execute channel commands like /config set channels.<provider>.accounts.<id> to modify configuration on target accounts with configWrites: false. |
2026-03-31 | |
| CVE-2026-32971 | 7.3 | HIGH | CWE-451 | 0.0% p3 | 5.11 | OpenClaw before 2026.3.11 contains an approval-integrity vulnerability in node-h...OpenClaw before 2026.3.11 contains an approval-integrity vulnerability in node-host system.run approvals that displays extracted shell payloads instead of the executed argv. Attackers can place wrapper binaries and induce wrapper-shaped commands to execute local code after operators approve misleading command text. |
2026-03-31 | |
| CVE-2026-32970 | 2.0 | LOW | CWE-636 | 0.0% p4 | 1.40 | OpenClaw before 2026.3.11 contains a credential fallback vulnerability where una...OpenClaw before 2026.3.11 contains a credential fallback vulnerability where unavailable local gateway.auth.token and gateway.auth.password SecretRefs are treated as unset, allowing fallback to remote credentials in local mode. Attackers can exploit misconfigured local auth references to cause CLI and helper paths to select incorrect credential sources, potentially bypassing intended local authentication boundaries. |
2026-03-31 | |
| CVE-2026-32921 | 5.3 | MEDIUM | CWE-367 | 0.1% p17 | 3.71 | OpenClaw before 2026.3.8 contains an approval bypass vulnerability in system.run...OpenClaw before 2026.3.8 contains an approval bypass vulnerability in system.run where mutable script operands are not bound across approval and execution phases. Attackers can obtain approval for script execution, modify the approved script file before execution, and execute different content while maintaining the same approved command shape. |
2026-03-31 | |
| CVE-2026-32920 | 8.6 | HIGH | CWE-829 | 0.0% p12 | 6.02 | OpenClaw before 2026.3.12 automatically discovers and loads plugins from .OpenCl...OpenClaw before 2026.3.12 automatically discovers and loads plugins from .OpenClaw/extensions/ without explicit trust verification, allowing arbitrary code execution. Attackers can execute malicious code by including crafted workspace plugins in cloned repositories that execute when users run OpenClaw from the directory. |
2026-03-31 | |
| CVE-2026-32917 | 9.2 | CRITICAL | CWE-78 | 0.6% p69 | 6.46 | OpenClaw before 2026.3.13 contains a remote command injection vulnerability in t...OpenClaw before 2026.3.13 contains a remote command injection vulnerability in the iMessage attachment staging flow that allows attackers to execute arbitrary commands on configured remote hosts. The vulnerability exists because unsanitized remote attachment paths containing shell metacharacters are passed directly to the SCP remote operand without validation, enabling command execution when remote attachment staging is enabled. |
2026-03-31 | |
| CVE-2026-32916 | 9.2 | CRITICAL | CWE-266 | 0.1% p26 | 6.44 | OpenClaw versions 2026.3.7 before 2026.3.11 contain an authorization bypass vuln...OpenClaw versions 2026.3.7 before 2026.3.11 contain an authorization bypass vulnerability where plugin subagent routes execute gateway methods through a synthetic operator client with broad administrative scopes. Remote unauthenticated requests to plugin-owned routes can invoke runtime.subagent methods to perform privileged gateway actions including session deletion and agent execution. |
2026-03-31 | |
| CVE-2026-27854 | 4.8 | MEDIUM | CWE-416 | 0.0% p2 | 3.36 | An attacker might be able to trigger a use-after-free by sending crafted DNS que...An attacker might be able to trigger a use-after-free by sending crafted DNS queries to a DNSdist using the DNSQuestion:getEDNSOptions method in custom Lua code. In some cases DNSQuestion:getEDNSOptions might refer to a version of the DNS packet that has been modified, thus triggering a use-after-free and potentially a crash resulting in denial of service. |
2026-03-31 | |
| CVE-2026-27853 | 5.9 | MEDIUM | CWE-787 | 0.0% p6 | 4.13 | An attacker might be able to trigger an out-of-bounds write by sending crafted D...An attacker might be able to trigger an out-of-bounds write by sending crafted DNS responses to a DNSdist using the DNSQuestion:changeName or DNSResponse:changeName methods in custom Lua code. In some cases the rewritten packet might become larger than the initial response and even exceed 65535 bytes, potentially leading to a crash resulting in denial of service. |
2026-03-31 | |
| CVE-2026-24030 | 5.3 | MEDIUM | CWE-789 | 0.0% p3 | 3.71 | An attacker might be able to trick DNSdist into allocating too much memory while...An attacker might be able to trick DNSdist into allocating too much memory while processing DNS over QUIC or DNS over HTTP/3 payloads, resulting in a denial of service. In setups with a large quantity of memory available this usually results in an exception and the QUIC connection is properly closed, but in some cases the system might enter an out-of-memory state instead and terminate the process. |
2026-03-31 | |
| CVE-2026-24029 | 6.5 | MEDIUM | CWE-863 | 0.0% p0 | 4.55 | When the early_acl_drop (earlyACLDrop in Lua) option is disabled (default is ena...When the early_acl_drop (earlyACLDrop in Lua) option is disabled (default is enabled) on a DNS over HTTPs frontend using the nghttp2 provider, the ACL check is skipped, allowing all clients to send DoH queries regardless of the configured ACL. |
2026-03-31 | |
| CVE-2026-24028 | 5.3 | MEDIUM | CWE-126 | 0.0% p2 | 3.71 | An attacker might be able to trigger an out-of-bounds read by sending a crafted ...An attacker might be able to trigger an out-of-bounds read by sending a crafted DNS response packet, when custom Lua code uses newDNSPacketOverlay to parse DNS packets. The out-of-bounds read might trigger a crash, leading to a denial of service, or access unrelated memory, leading to potential information disclosure. |
2026-03-31 | |
| CVE-2026-0397 | 3.1 | LOW | CWE-942 | 0.0% p1 | 2.17 | When the internal webserver is enabled (default is disabled), an attacker might ...When the internal webserver is enabled (default is disabled), an attacker might be able to trick an administrator logged to the dashboard into visiting a malicious website and extract information about the running configuration from the dashboard. The root cause of the issue is a misconfiguration of the Cross-Origin Resource Sharing (CORS) policy. |
2026-03-31 | |
| CVE-2026-0396 | 3.1 | LOW | CWE-80 | 0.0% p0 | 2.17 | An attacker might be able to inject HTML content into the internal web dashboard...An attacker might be able to inject HTML content into the internal web dashboard by sending crafted DNS queries to a DNSdist instance where domain-based dynamic rules have been enabled via either DynBlockRulesGroup:setSuffixMatchRule or DynBlockRulesGroup:setSuffixMatchRuleFFI. |
2026-03-31 | |
| CVE-2025-14213 | 8.3 | HIGH | CWE-20 | 0.5% p64 | 5.82 | Cato Networks’ Socket versions prior to 25 contain a command injection vulnerabi...Cato Networks’ Socket versions prior to 25 contain a command injection vulnerability that allows an authenticated attacker with access to the Socket web interface (UI) to execute arbitrary operating system commands as the root user on the Socket’s internal system. |
2026-03-31 | |
| CVE-2026-4400 | 7.0 | HIGH | CWE-639 | 0.1% p16 | 4.90 | Insecure Direct Object Reference (IDOR) vulnerability in 1millionbot Millie chat...Insecure Direct Object Reference (IDOR) vulnerability in 1millionbot Millie chat that allows private conversations of other users being viewed by simply changing the conversation ID. The vulnerability is present in the endpoint 'api.1millionbot.com/api/public/conversations/' and, if exploited, could allow a remote attacker to access other users private chatbot conversations, revealing sensitive or confidential data without requiring credentials or impersonating users. In order for the vulnerability to be exploited, the attacker must have the user's conversation ID. |
2026-03-31 | |
| CVE-2026-4399 | 8.7 | HIGH | CWE-77 | 0.1% p16 | 6.09 | Prompt injection vulnerability in 1millionbot Millie chatbot that occurs when a ...Prompt injection vulnerability in 1millionbot Millie chatbot that occurs when a user manages to evade chat restrictions using Boolean prompt injection techniques (formulating a question in such a way that, upon receiving an affirmative response ('true'), the model executes the injected instruction), causing it to return prohibited information and information outside its intended context. Successful exploitation of this vulnerability could allow a malicious remote attacker to abuse the service for purposes other than those originally intended, or even execute out-of-context tasks using 1millionbot's resources and/or OpenAI's API key. This allows the attacker to evade the containment mechanisms implemented during LLM model training and obtain responses or chat behaviors that were originally restricted. |
2026-03-31 | |
| CVE-2026-34887 | 6.5 | MEDIUM | CWE-79 | 0.0% p9 | 4.55 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Extend Themes Kubio AI Page Builder allows Stored XSS.This issue affects Kubio AI Page Builder: from n/a through 2.7.0. |
2026-03-31 | |
| CVE-2026-5197 | 5.3 | MEDIUM | CWE-74 | 0.0% p8 | 3.71 | A vulnerability was found in code-projects Student Membership System 1.0. The af...A vulnerability was found in code-projects Student Membership System 1.0. The affected element is an unknown function of the file /delete_user.php. The manipulation of the argument ID results in sql injection. The attack may be launched remotely. The exploit has been made public and could be used. |
2026-03-31 | |
| CVE-2026-4317 | 9.3 | CRITICAL | CWE-89 | 0.1% p16 | 6.51 | SQL inyection (SQLi) vulnerability in Umami Software web application through an ...SQL inyection (SQLi) vulnerability in Umami Software web application through an improperly sanitized parameter, which could allow an authenticated attacker to execute arbitrary SQL commands in the database.Specifically, they could manipulate the value of the 'timezone' request parameter by including malicious characters and SQL payload. The application would interpolate these values directly into the SQL query without first performing proper filtering or sanitization (e.g., using functions such as 'prisma.rawQuery', 'prisma.$queryRawUnsafe' or raw queries with 'ClickHouse'). The successful explotation of this vulnerability could allow an authenticated attacker to compromiso the data of the database and execute dangerous functions. |
2026-03-31 | |
| CVE-2026-5201 | 7.5 | HIGH | CWE-122 | 0.1% p32 | 5.25 | A flaw was found in the gdk-pixbuf library. This heap-based buffer overflow vuln...A flaw was found in the gdk-pixbuf library. This heap-based buffer overflow vulnerability occurs in the JPEG image loader due to improper validation of color component counts when processing a specially crafted JPEG image. A remote attacker can exploit this flaw without user interaction, for example, via thumbnail generation. Successful exploitation leads to application crashes and denial of service (DoS) conditions. |
2026-03-31 | |
| CVE-2026-5196 | 5.3 | MEDIUM | CWE-74 | 0.0% p8 | 3.71 | A vulnerability has been found in code-projects Student Membership System 1.0. I...A vulnerability has been found in code-projects Student Membership System 1.0. Impacted is an unknown function of the file /delete_member.php. The manipulation of the argument ID leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. |
2026-03-31 | |
| CVE-2026-5195 | 6.9 | MEDIUM | CWE-74 | 0.0% p11 | 4.83 | A flaw has been found in code-projects Student Membership System 1.0. This issue...A flaw has been found in code-projects Student Membership System 1.0. This issue affects some unknown processing of the component User Registration Handler. Executing a manipulation can lead to sql injection. The attack can be launched remotely. |
2026-03-31 | |
| CVE-2026-3107 | 9.3 | CRITICAL | CWE-79 | 0.0% p8 | 6.51 | Stored Cross-Site Scripting (XSS) in Teampass versions prior to 3.1.5.16, affect...Stored Cross-Site Scripting (XSS) in Teampass versions prior to 3.1.5.16, affecting the password manager's password import functionality at the endpoint 'redacted/index.php?page=items'. The application fails to properly sanitize and encode user-input data during the import process, allowing malicious JavaScript payloads to be persistently stored in the database. When other users view the imported passwords, the payload is automatically executed in their browsers, resulting in a stored XSS condition at the endpoint 'redacted/index.php?page=items'. Exploiting this vulnerability allows an attacker to execute arbitrary JavaScript code in the context of multiple users and the administrator, which can lead to session hijacking, credential theft, privilege abuse, and compromise of application integrity. |
2026-03-31 | |
| CVE-2026-3106 | 9.3 | CRITICAL | CWE-79 | 0.0% p9 | 6.51 | Blind Cross-Site Scripting (XSS) in Teampass, versions prior to 3.1.5.16, within...Blind Cross-Site Scripting (XSS) in Teampass, versions prior to 3.1.5.16, within the password manager login functionality in the 'contraseña' parameter of the login form 'redacted/index.php'. During failed authentication attempts, the application does not properly clean or encode the information entered by the user in the username field. As a result, arbitrary JavaScript code is automatically executed in the administrator's browser when viewing failed login entries, resulting in a blind XSS condition. |
2026-03-31 | |
| CVE-2025-10559 | 7.1 | HIGH | CWE-22 | 0.0% p14 | 4.97 | A Path Traversal vulnerability affecting Factory Resource Management in DELMIA F...A Path Traversal vulnerability affecting Factory Resource Management in DELMIA Factory Resource Manager from Release 3DEXPERIENCE R2023x through Release 3DEXPERIENCE R2025x allows an attacker to read or write files in specific directories on the server. |
2026-03-31 | |
| CVE-2025-10553 | 8.7 | HIGH | CWE-79 | 0.0% p9 | 6.09 | A Stored Cross-site Scripting (XSS) vulnerability affecting Factory Resource Man...A Stored Cross-site Scripting (XSS) vulnerability affecting Factory Resource Management in DELMIA Factory Resource Manager from Release 3DEXPERIENCE R2023x through Release 3DEXPERIENCE R2025x allows an attacker to execute arbitrary script code in user's browser session. |
2026-03-31 | |
| CVE-2025-10551 | 8.7 | HIGH | CWE-79 | 0.0% p9 | 6.09 | A Stored Cross-site Scripting (XSS) vulnerability affecting Document Management ...A Stored Cross-site Scripting (XSS) vulnerability affecting Document Management in ENOVIA Collaborative Industry Innovator from Release 3DEXPERIENCE R2023x through Release 3DEXPERIENCE R2025x allows an attacker to execute arbitrary script code in user's browser session. |
2026-03-31 | |
| CVE-2026-5186 | 4.8 | MEDIUM | CWE-119 | 0.0% p2 | 3.36 | A weakness has been identified in Nothings stb up to 2.30. This impacts the func...A weakness has been identified in Nothings stb up to 2.30. This impacts the function stbi__load_gif_main of the file stb_image.h of the component Multi-frame GIF File Handler. This manipulation causes double free. The attack requires local access. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-31 | |
| CVE-2026-5185 | 4.8 | MEDIUM | CWE-119 | 0.0% p2 | 3.36 | A security flaw has been discovered in Nothings stb_image up to 2.30. This affec...A security flaw has been discovered in Nothings stb_image up to 2.30. This affects the function stbi__gif_load_next of the file stb_image.h of the component Multi-frame GIF File Handler. The manipulation results in heap-based buffer overflow. The attack requires a local approach. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-31 | |
| CVE-2026-5184 | 5.3 | MEDIUM | CWE-74 | 1.4% p80 | 3.75 | A vulnerability was identified in TRENDnet TEW-713RE up to 1.02. The impacted el...A vulnerability was identified in TRENDnet TEW-713RE up to 1.02. The impacted element is an unknown function of the file /goform/setSysAdm. The manipulation of the argument admuser leads to command injection. The attack can be initiated remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-31 | |
| CVE-2026-3881 | 5.8 | MEDIUM | CWE-918 | 0.0% p11 | 4.06 | The Performance Monitor WordPress plugin through 1.0.6 does not validate a param...The Performance Monitor WordPress plugin through 1.0.6 does not validate a parameter before making a request to it, which could allow unauthenticated users to perform SSRF attacks |
2026-03-31 | |
| CVE-2026-5183 | 5.3 | MEDIUM | CWE-74 | 1.4% p80 | 3.75 | A vulnerability was determined in TRENDnet TEW-713RE up to 1.02. The affected el...A vulnerability was determined in TRENDnet TEW-713RE up to 1.02. The affected element is the function sub_421494 of the file /goform/addRouting. Executing a manipulation of the argument dest can lead to command injection. It is possible to launch the attack remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-31 | |
| CVE-2026-5182 | 6.9 | MEDIUM | CWE-74 | 0.0% p11 | 4.83 | A vulnerability was found in SourceCodester Teacher Record System 1.0. Impacted ...A vulnerability was found in SourceCodester Teacher Record System 1.0. Impacted is an unknown function of the file Teacher Record System of the component Parameter Handler. Performing a manipulation of the argument searchteacher results in sql injection. It is possible to initiate the attack remotely. The exploit has been made public and could be used. |
2026-03-31 | |
| CVE-2026-34881 | 5.0 | MEDIUM | CWE-918 | 0.0% p8 | 3.50 | OpenStack Glance before 29.1.1, 30.x before 30.1.1, and 31.0.0 is affected by Se...OpenStack Glance before 29.1.1, 30.x before 30.1.1, and 31.0.0 is affected by Server-Side Request Forgery (SSRF). By use of HTTP redirects, an authenticated user can bypass URL validation checks and redirect to internal services. Only glance image import functionality is affected. In particular, the web-download and glance-download import methods are subject to this vulnerability, as is the optional (not enabled by default) ovf_process image import plugin. |
2026-03-31 | |
| CVE-2026-1877 | 6.1 | MEDIUM | CWE-79 | 0.0% p9 | 4.27 | The Auto Post Scheduler plugin for WordPress is vulnerable to Cross-Site Request...The Auto Post Scheduler plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.84. This is due to missing nonce validation on the 'aps_options_page' function. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. |
2026-03-31 | |
| CVE-2026-1834 | 6.4 | MEDIUM | CWE-80 | 0.0% p10 | 4.48 | The Ibtana – WordPress Website Builder plugin for WordPress is vulnerable to Sto...The Ibtana – WordPress Website Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'ive' shortcode in all versions up to, and including, 1.2.5.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-03-31 | |
| CVE-2026-5181 | 5.3 | MEDIUM | CWE-284 | 0.0% p12 | 3.71 | A vulnerability has been found in SourceCodester Simple Doctors Appointment Syst...A vulnerability has been found in SourceCodester Simple Doctors Appointment System up to 1.0. This issue affects some unknown processing of the file /doctors_appointment/admin/ajax.php?action=save_category. Such manipulation of the argument img leads to unrestricted upload. The attack may be performed from remote. The exploit has been disclosed to the public and may be used. |
2026-03-31 | |
| CVE-2026-5180 | 6.9 | MEDIUM | CWE-74 | 0.0% p11 | 4.83 | A flaw has been found in SourceCodester Simple Doctors Appointment System 1.0. T...A flaw has been found in SourceCodester Simple Doctors Appointment System 1.0. This vulnerability affects unknown code of the file /admin/ajax.php?action=login2. This manipulation of the argument email causes sql injection. The attack is possible to be carried out remotely. The exploit has been published and may be used. |
2026-03-31 | |
| CVE-2026-5179 | 6.9 | MEDIUM | CWE-74 | 0.0% p11 | 4.83 | A vulnerability was detected in SourceCodester Simple Doctors Appointment System...A vulnerability was detected in SourceCodester Simple Doctors Appointment System 1.0. This affects an unknown part of the file /admin/login.php. The manipulation of the argument Username results in sql injection. The attack can be executed remotely. The exploit is now public and may be used. |
2026-03-31 | |
| CVE-2026-4146 | 6.1 | MEDIUM | CWE-79 | 0.1% p21 | 4.27 | The Loco Translate plugin for WordPress is vulnerable to Reflected Cross-Site Sc...The Loco Translate plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘update_href’ parameter in all versions up to, and including, 2.8.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. |
2026-03-31 | |
| CVE-2026-1797 | 5.3 | MEDIUM | CWE-862 | 0.0% p11 | 3.71 | The Appointment Booking and Scheduler Plugin – Truebooker plugin for WordPress i...The Appointment Booking and Scheduler Plugin – Truebooker plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.1.4 through views php files. This makes it possible for unauthenticated attackers to view potentially sensitive information contained in the exposed views php files via direct access. |
2026-03-31 | |
| CVE-2026-1710 | 6.5 | MEDIUM | CWE-285 | 0.1% p17 | 4.55 | The WooPayments: Integrated WooCommerce Payments plugin for WordPress is vulnera...The WooPayments: Integrated WooCommerce Payments plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'save_upe_appearance_ajax' function in all versions up to, and including, 10.5.1. This makes it possible for unauthenticated attackers to update plugin settings. |
2026-03-31 | |
| CVE-2026-5178 | 5.3 | MEDIUM | CWE-74 | 0.6% p68 | 3.73 | A security vulnerability has been detected in Totolink A3300R 17.0.0cu.557_b2022...A security vulnerability has been detected in Totolink A3300R 17.0.0cu.557_b20221024. Affected by this issue is the function setIptvCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument vlanPriLan3 leads to command injection. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used. |
2026-03-31 | |
| CVE-2026-5177 | 5.3 | MEDIUM | CWE-74 | 0.6% p68 | 3.73 | A weakness has been identified in Totolink A3300R 17.0.0cu.557_b20221024. Affect...A weakness has been identified in Totolink A3300R 17.0.0cu.557_b20221024. Affected by this vulnerability is the function setWiFiBasicCfg of the file /cgi-bin/cstecgi.cgi. Executing a manipulation of the argument rxRate can lead to command injection. The attack may be launched remotely. The exploit has been made available to the public and could be used for attacks. |
2026-03-31 | |
| CVE-2026-34073 | 1.7 | LOW | CWE-295 | 0.0% p5 | 1.19 | cryptography is a package designed to expose cryptographic primitives and recipe...cryptography is a package designed to expose cryptographic primitives and recipes to Python developers. Prior to version 46.0.6, DNS name constraints were only validated against SANs within child certificates, and not the "peer name" presented during each validation. Consequently, cryptography would allow a peer named bar.example.com to validate against a wildcard leaf certificate for *.example.com, even if the leaf's parent certificate (or upwards) contained an excluded subtree constraint for bar.example.com. This issue has been patched in version 46.0.6. |
2026-03-31 | |
| CVE-2026-34070 | 7.5 | HIGH | CWE-22 | 0.1% p19 | 5.25 | LangChain is a framework for building agents and LLM-powered applications. Prior...LangChain is a framework for building agents and LLM-powered applications. Prior to version 1.2.22, multiple functions in langchain_core.prompts.loading read files from paths embedded in deserialized config dicts without validating against directory traversal or absolute path injection. When an application passes user-influenced prompt configurations to load_prompt() or load_prompt_from_config(), an attacker can read arbitrary files on the host filesystem, constrained only by file-extension checks (.txt for templates, .json/.yaml for examples). This issue has been patched in version 1.2.22. |
2026-03-31 | |
| CVE-2026-34060 | 7.1 | HIGH | CWE-94 | 0.1% p23 | 4.97 | Ruby LSP is an implementation of the language server protocol for Ruby. Prior to...Ruby LSP is an implementation of the language server protocol for Ruby. Prior to Shopify.ruby-lsp version 0.10.2 and ruby-lsp version 0.26.9, the rubyLsp.branch VS Code workspace setting was interpolated without sanitization into a generated Gemfile, allowing arbitrary Ruby code execution when a user opens a project containing a malicious .vscode/settings.json. This issue has been patched in Shopify.ruby-lsp version 0.10.2 and ruby-lsp version 0.26.9. |
2026-03-31 | |
| CVE-2026-34054 | 7.8 | HIGH | CWE-427 | 0.1% p21 | 5.46 | vcpkg is a free and open-source C/C++ package manager. Prior to version 3.6.1#3,...vcpkg is a free and open-source C/C++ package manager. Prior to version 3.6.1#3, vcpkg's Windows builds of OpenSSL set openssldir to a path on the build machine, making that path be attackable later on customer machines. This issue has been patched in version 3.6.1#3. |
2026-03-31 | |
| CVE-2026-34043 | 5.9 | MEDIUM | CWE-400 | 0.1% p16 | 4.13 | Serialize JavaScript to a superset of JSON that includes regular expressions and...Serialize JavaScript to a superset of JSON that includes regular expressions and functions. Prior to version 7.0.5, there is a Denial of Service (DoS) vulnerability caused by CPU exhaustion. When serializing a specially crafted "array-like" object (an object that inherits from Array.prototype but has a very large length property), the process enters an intensive loop that consumes 100% CPU and hangs indefinitely. This issue has been patched in version 7.0.5. |
2026-03-31 | |
| CVE-2026-34042 | 8.2 | HIGH | CWE-862 | 0.1% p17 | 5.74 | act is a project which allows for local running of github actions. Prior to vers...act is a project which allows for local running of github actions. Prior to version 0.2.86, act's built in actions/cache server listens to connections on all interfaces and allows anyone who can connect to it including someone anywhere on the internet to create caches with arbitrary keys and retrieve all existing caches. If they can predict which cache keys will be used by local actions, they can create malicious caches containing whatever files they please most likely allowing arbitrary remote code execution within the docker container. This issue has been patched in version 0.2.86. |
2026-03-31 | |
| CVE-2026-34041 | 7.7 | HIGH | CWE-74 | 0.1% p19 | 5.39 | act is a project which allows for local running of github actions. Prior to vers...act is a project which allows for local running of github actions. Prior to version 0.2.86, act unconditionally processes the deprecated ::set-env:: and ::add-path:: workflow commands, which was disabled due to environment injection risks. When a workflow step echoes untrusted data to stdout, an attacker can inject these commands to set arbitrary environment variables or modify the PATH for all subsequent steps in the job. This issue has been patched in version 0.2.86. |
2026-03-31 | |
| CVE-2026-34040 | 8.8 | HIGH | CWE-288 | 0.0% p2 | 6.16 | Moby is an open source container framework. Prior to version 29.3.1, a security ...Moby is an open source container framework. Prior to version 29.3.1, a security vulnerability has been detected that allows attackers to bypass authorization plugins (AuthZ). This issue has been patched in version 29.3.1. |
2026-03-31 | |
| CVE-2026-34036 | 6.5 | MEDIUM | CWE-98 | 0.0% p9 | 4.55 | Dolibarr is an enterprise resource planning (ERP) and customer relationship mana...Dolibarr is an enterprise resource planning (ERP) and customer relationship management (CRM) software package. In versions 22.0.4 and prior, there is a Local File Inclusion (LFI) vulnerability in the core AJAX endpoint /core/ajax/selectobject.php. By manipulating the objectdesc parameter and exploiting a fail-open logic flaw in the core access control function restrictedArea(), an authenticated user with no specific privileges can read the contents of arbitrary non-PHP files on the server (such as .env, .htaccess, configuration backups, or logs…). At time of publication, there are no publicly available patches. |
2026-03-31 | |
| CVE-2026-33997 | 6.8 | MEDIUM | CWE-193 | 0.0% p1 | 4.76 | Moby is an open source container framework. Prior to version 29.3.1, a security ...Moby is an open source container framework. Prior to version 29.3.1, a security vulnerability has been detected that allows plugins privilege validation to be bypassed during docker plugin install. Due to an error in the daemon's privilege comparison logic, the daemon may incorrectly accept a privilege set that differs from the one approved by the user. Plugins that request exactly one privilege are also affected, because no comparison is performed at all. This issue has been patched in version 29.3.1. |
2026-03-31 | |
| CVE-2026-32727 | 8.1 | HIGH | CWE-22 | 0.0% p14 | 5.67 | SciTokens is a reference library for generating and using SciTokens. Prior to ve...SciTokens is a reference library for generating and using SciTokens. Prior to version 1.9.7, the Enforcer is vulnerable to a path traversal attack where an attacker can use dot-dot (..) in the scope claim of a token to escape the intended directory restriction. This occurs because the library normalizes both the authorized path (from the token) and the requested path (from the application) before comparing them using startswith. This issue has been patched in version 1.9.7. |
2026-03-31 | |
| CVE-2026-32716 | 8.1 | HIGH | CWE-285 | 0.0% p8 | 5.67 | SciTokens is a reference library for generating and using SciTokens. Prior to ve...SciTokens is a reference library for generating and using SciTokens. Prior to version 1.9.6, the Enforcer incorrectly validates scope paths by using a simple prefix match (startswith). This allows a token with access to a specific path (e.g., /john) to also access sibling paths that start with the same prefix (e.g., /johnathan, /johnny), which is an Authorization Bypass. This issue has been patched in version 1.9.6. |
2026-03-31 | |
| CVE-2026-32714 | 9.8 | CRITICAL | CWE-89 | 0.0% p9 | 6.86 | SciTokens is a reference library for generating and using SciTokens. Prior to ve...SciTokens is a reference library for generating and using SciTokens. Prior to version 1.9.6, the KeyCache class in scitokens was vulnerable to SQL Injection because it used Python's str.format() to construct SQL queries with user-supplied data (such as issuer and key_id). This allowed an attacker to execute arbitrary SQL commands against the local SQLite database. This issue has been patched in version 1.9.6. |
2026-03-31 | |
| CVE-2026-5176 | 6.9 | MEDIUM | CWE-74 | 2.0% p83 | 4.89 | A security flaw has been discovered in Totolink A3300R 17.0.0cu.557_b20221024. A...A security flaw has been discovered in Totolink A3300R 17.0.0cu.557_b20221024. Affected is the function setSyslogCfg of the file /cgi-bin/cstecgi.cgi. Performing a manipulation of the argument provided results in command injection. The attack may be initiated remotely. The exploit has been released to the public and may be used for attacks. |
2026-03-31 | |
| CVE-2026-4020 | 7.5 | HIGH | CWE-200 | 6.0% p90 | 5.43 | The Gravity SMTP plugin for WordPress is vulnerable to Sensitive Information Exp...The Gravity SMTP plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.1.4. This is due to a REST API endpoint registered at /wp-json/gravitysmtp/v1/tests/mock-data with a permission_callback that unconditionally returns true, allowing any unauthenticated visitor to access it. When the ?page=gravitysmtp-settings query parameter is appended, the plugin's register_connector_data() method populates internal connector data, causing the endpoint to return approximately 365 KB of JSON containing the full System Report. This makes it possible for unauthenticated attackers to retrieve detailed system configuration data including PHP version, loaded extensions, web server version, document root path, database server type and version, WordPress version, all active plugins with versions, active theme, WordPress configuration details, database table names, and any API keys/tokens configured in the plugin. |
2026-03-31 | |
| CVE-2026-3300 | 9.8 | CRITICAL | CWE-94 | 0.3% p52 | 6.87 | The Everest Forms Pro plugin for WordPress is vulnerable to Remote Code Executio...The Everest Forms Pro plugin for WordPress is vulnerable to Remote Code Execution via PHP Code Injection in all versions up to, and including, 1.9.12. This is due to the Calculation Addon's process_filter() function concatenating user-submitted form field values into a PHP code string without proper escaping before passing it to eval(). The sanitize_text_field() function applied to input does not escape single quotes or other PHP code context characters. This makes it possible for unauthenticated attackers to inject and execute arbitrary PHP code on the server by submitting a crafted value in any string-type form field (text, email, URL, select, radio) when a form uses the "Complex Calculation" feature. |
2026-03-31 | |
| CVE-2026-4794 | 2.1 | LOW | CWE-79 | 0.0% p8 | 1.47 | Multiple cross-site scripting (XSS) vulnerabilities in PaperCut NG/MF before 25....Multiple cross-site scripting (XSS) vulnerabilities in PaperCut NG/MF before 25.0.10 allow authenticated administrator users to inject arbitrary web script or HTML code via different UI fields. This could be used to compromise other admininistrator's sessions or perform unauthorized actions via the administrator's authenticated context (e.g. requires an active login session). |
2026-03-31 | |
| CVE-2026-32734 | 7.1 | HIGH | CWE-79 | 0.0% p9 | 4.97 | baserCMS is a website development framework. Prior to version 5.2.3, baserCMS ha...baserCMS is a website development framework. Prior to version 5.2.3, baserCMS has DOM-based cross-site scripting in tag creation. This issue has been patched in version 5.2.3. |
2026-03-31 | |
| CVE-2026-30940 | 7.2 | HIGH | CWE-22 | 0.3% p49 | 5.05 | baserCMS is a website development framework. Prior to version 5.2.3, a path trav...baserCMS is a website development framework. Prior to version 5.2.3, a path traversal vulnerability exists in the theme file management API (/baser/api/admin/bc-theme-file/theme_files/add.json) that allows arbitrary file write. An authenticated administrator can include ../ sequences in the path parameter to create a PHP file in an arbitrary directory outside the theme directory, which may result in remote code execution (RCE). This issue has been patched in version 5.2.3. |
2026-03-31 | |
| CVE-2026-30880 | 9.2 | CRITICAL | CWE-78 | 0.2% p47 | 6.45 | baserCMS is a website development framework. Prior to version 5.2.3, baserCMS ha...baserCMS is a website development framework. Prior to version 5.2.3, baserCMS has an OS command injection vulnerability in the installer. This issue has been patched in version 5.2.3. |
2026-03-31 | |
| CVE-2026-30879 | 6.9 | MEDIUM | CWE-79 | 0.0% p9 | 4.83 | baserCMS is a website development framework. Prior to version 5.2.3, baserCMS ha...baserCMS is a website development framework. Prior to version 5.2.3, baserCMS has a cross-site scripting vulnerability in blog posts. This issue has been patched in version 5.2.3. |
2026-03-31 | |
| CVE-2026-30878 | 5.3 | MEDIUM | CWE-285 | 0.0% p11 | 3.71 | baserCMS is a website development framework. Prior to version 5.2.3, a public ma...baserCMS is a website development framework. Prior to version 5.2.3, a public mail submission API allows unauthenticated users to submit mail form entries even when the corresponding form is not accepting submissions. This bypasses administrative controls intended to stop form intake and enables spam or abuse via the API. This issue has been patched in version 5.2.3. |
2026-03-31 | |
| CVE-2026-30877 | 9.1 | CRITICAL | CWE-78 | 0.2% p42 | 6.38 | baserCMS is a website development framework. Prior to version 5.2.3, there is an...baserCMS is a website development framework. Prior to version 5.2.3, there is an OS command injection vulnerability in the update functionality. Due to this issue, an authenticated user with administrator privileges in baserCMS can execute arbitrary OS commands on the server with the privileges of the user account running baserCMS. This issue has been patched in version 5.2.3. |
2026-03-31 | |
| CVE-2026-27697 | 6.9 | MEDIUM | CWE-89 | 0.0% p10 | 4.83 | baserCMS is a website development framework. Prior to version 5.2.3, baserCMS ha...baserCMS is a website development framework. Prior to version 5.2.3, baserCMS has a SQL injection vulnerability in blog posts. This issue has been patched in version 5.2.3. |
2026-03-31 | |
| CVE-2026-21861 | 9.1 | CRITICAL | CWE-78 | 0.4% p58 | 6.38 | baserCMS is a website development framework. Prior to version 5.2.3, baserCMS co...baserCMS is a website development framework. Prior to version 5.2.3, baserCMS contains an OS command injection vulnerability in the core update functionality. An authenticated administrator can execute arbitrary OS commands on the server due to improper handling of user-controlled input that is directly passed to exec() without sufficient validation or escaping. This issue has been patched in version 5.2.3. |
2026-03-31 | |
| CVE-2025-32957 | 8.7 | HIGH | CWE-434 | 0.1% p20 | 6.09 | baserCMS is a website development framework. Prior to version 5.2.3, the applica...baserCMS is a website development framework. Prior to version 5.2.3, the application's restore function allows users to upload a .zip file, which is then automatically extracted. A PHP file inside the archive is included using require_once without validating or restricting the filename. An attacker can craft a malicious PHP file within the zip and achieve arbitrary code execution when it is included. This issue has been patched in version 5.2.3. |
2026-03-31 | |
| CVE-2026-5157 | 5.3 | MEDIUM | CWE-79 | 0.0% p10 | 3.71 | A vulnerability was identified in code-projects Online Food Ordering System 1.0....A vulnerability was identified in code-projects Online Food Ordering System 1.0. Affected is an unknown function of the file /form/order.php of the component Order Module. Such manipulation of the argument cust_id leads to cross site scripting. The attack may be performed from remote. The exploit is publicly available and might be used. |
2026-03-31 | |
| CVE-2026-5156 | 7.4 | HIGH | CWE-119 | 0.1% p23 | 5.18 | A vulnerability was determined in Tenda CH22 1.0.0.1. This impacts the function ...A vulnerability was determined in Tenda CH22 1.0.0.1. This impacts the function formQuickIndex of the file /goform/QuickIndex of the component Parameter Handler. This manipulation of the argument mit_linktype causes stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been publicly disclosed and may be utilized. |
2026-03-31 | |
| CVE-2026-5155 | 7.4 | HIGH | CWE-119 | 0.0% p7 | 5.18 | A vulnerability was found in Tenda CH22 1.0.0.1. This affects the function fromA...A vulnerability was found in Tenda CH22 1.0.0.1. This affects the function fromAdvSetWan of the file /goform/AdvSetWan of the component Parameter Handler. The manipulation of the argument wanmode results in stack-based buffer overflow. The attack can be executed remotely. The exploit has been made public and could be used. |
2026-03-30 | |
| CVE-2026-5154 | 7.4 | HIGH | CWE-119 | 0.0% p14 | 5.18 | A vulnerability has been found in Tenda CH22 1.0.0.1/1.If. The impacted element ...A vulnerability has been found in Tenda CH22 1.0.0.1/1.If. The impacted element is the function fromSetCfm of the file /goform/setcfm of the component Parameter Handler. The manipulation of the argument funcname leads to stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used. |
2026-03-30 | |
| CVE-2026-5130 | 8.8 | HIGH | CWE-565 | 0.0% p5 | 6.16 | The Debugger & Troubleshooter plugin for WordPress was vulnerable to Unauthentic...The Debugger & Troubleshooter plugin for WordPress was vulnerable to Unauthenticated Privilege Escalation in versions up to and including 1.3.2. This was due to the plugin accepting the wp_debug_troubleshoot_simulate_user cookie value directly as a user ID without any cryptographic validation or authorization checks. The cookie value was used to override the determine_current_user filter, which allowed unauthenticated attackers to impersonate any user by simply setting the cookie to their target user ID. This made it possible for unauthenticated attackers to gain administrator-level access and perform any privileged actions including creating new administrator accounts, modifying site content, installing plugins, or taking complete control of the WordPress site. The vulnerability was fixed in version 1.4.0 by implementing a cryptographic token-based validation system where only administrators can initiate user simulation, and the cookie contains a random 64-character token that must be validated against database-stored mappings rather than accepting arbitrary user IDs. |
2026-03-30 | |
| CVE-2026-5153 | 5.3 | MEDIUM | CWE-74 | 0.8% p74 | 3.74 | A flaw has been found in Tenda CH22 1.0.0.1. The affected element is the functio...A flaw has been found in Tenda CH22 1.0.0.1. The affected element is the function FormWriteFacMac of the file /goform/WriteFacMac. Executing a manipulation of the argument mac can lead to command injection. The attack may be launched remotely. The exploit has been published and may be used. |
2026-03-30 | |
| CVE-2026-4257 | 9.8 | CRITICAL | CWE-94 | 19.6% p95 | 7.45 | The Contact Form by Supsystic plugin for WordPress is vulnerable to Server-Side ...The Contact Form by Supsystic plugin for WordPress is vulnerable to Server-Side Template Injection (SSTI) leading to Remote Code Execution (RCE) in all versions up to, and including, 1.7.36. This is due to the plugin using the Twig `Twig_Loader_String` template engine without sandboxing, combined with the `cfsPreFill` prefill functionality that allows unauthenticated users to inject arbitrary Twig expressions into form field values via GET parameters. This makes it possible for unauthenticated attackers to execute arbitrary PHP functions and OS commands on the server by leveraging Twig's `registerUndefinedFilterCallback()` method to register arbitrary PHP callbacks. |
2026-03-30 | |
| CVE-2026-33995 | 5.3 | MEDIUM | CWE-415 | 0.1% p21 | 3.71 | FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to versio...FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.24.2, a double-free vulnerability in kerberos_AcceptSecurityContext() and kerberos_InitializeSecurityContextA() (WinPR, winpr/libwinpr/sspi/Kerberos/kerberos.c) can cause a crash in any FreeRDP clients on systems where Kerberos and/or Kerberos U2U is configured (Samba AD member, or krb5 for NFS). The crash is triggered during NLA connection teardown and requires a failed authentication attempt. This issue has been patched in version 3.24.2. |
2026-03-30 | |
| CVE-2026-33987 | 7.1 | HIGH | CWE-122 | 0.0% p2 | 4.97 | FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to versio...FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.24.2, in persistent_cache_read_entry_v3() in libfreerdp/cache/persistent.c, persistent->bmpSize is updated before winpr_aligned_recalloc(). If realloc fails, bmpSize is inflated while bmpData points to the old buffer. This issue has been patched in version 3.24.2. |
2026-03-30 | |
| CVE-2026-33986 | 7.5 | HIGH | CWE-122 | 0.0% p13 | 5.25 | FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to versio...FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.24.2, in yuv_ensure_buffer() in libfreerdp/codec/h264.c, h264->width and h264->height are updated before the reallocation loop. If any winpr_aligned_recalloc() call fails, the function returns FALSE but width/height are already inflated. This issue has been patched in version 3.24.2. |
2026-03-30 | |
| CVE-2026-33985 | 5.9 | MEDIUM | CWE-125 | 0.0% p13 | 4.13 | FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to versio...FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.24.2, pixel data from adjacent heap memory is rendered to screen, potentially leaking sensitive data to the attacker. This issue has been patched in version 3.24.2. |
2026-03-30 | |
| CVE-2026-33984 | 7.5 | HIGH | CWE-122 | 0.0% p13 | 5.25 | FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to versio...FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.24.2, in resize_vbar_entry() in libfreerdp/codec/clear.c, vBarEntry->size is updated to vBarEntry->count before the winpr_aligned_recalloc() call. If realloc fails, size is inflated while pixels still points to the old, smaller buffer. On a subsequent call where count <= size (the inflated value), realloc is skipped. The caller then writes count * bpp bytes of attacker-controlled pixel data into the undersized buffer, causing a heap buffer overflow. This issue has been patched in version 3.24.2. |
2026-03-30 | |
| CVE-2026-33983 | 6.5 | MEDIUM | CWE-190 | 0.0% p14 | 4.55 | FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to versio...FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.24.2, progressive_decompress_tile_upgrade() detects a mismatch via progressive_rfx_quant_cmp_equal() but only emits WLog_WARN, execution continues. The wrapped value (247) is used as a shift exponent, causing undefined behavior and an approximately 80 billion iteration loop (CPU DoS). This issue has been patched in version 3.24.2. |
2026-03-30 | |
| CVE-2026-33982 | 7.1 | HIGH | CWE-125 | 0.0% p8 | 4.97 | FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to versio...FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.24.2, there is a heap-buffer-overflow READ vulnerability at 24 bytes before the allocation, in winpr_aligned_offset_recalloc(). This issue has been patched in version 3.24.2. |
2026-03-30 | |
| CVE-2026-33977 | 6.9 | MEDIUM | CWE-617 | 0.0% p11 | 4.83 | FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to versio...FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.24.2, a malicious RDP server can crash the FreeRDP client by sending audio data in IMA ADPCM format with an invalid initial step index value (>= 89). The unvalidated step index is read directly from the network and used to index into a 89-entry lookup table, triggering a WINPR_ASSERT() failure and process abort via SIGABRT. This affects any FreeRDP client that has audio redirection (RDPSND) enabled, which is the default configuration. This issue has been patched in version 3.24.2. |
2026-03-30 | |
| CVE-2026-33952 | 6.0 | MEDIUM | CWE-617 | 0.1% p17 | 4.20 | FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to versio...FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.24.2, an unvalidated auth_length field read from the network triggers a WINPR_ASSERT() failure in rts_read_auth_verifier_no_checks(), causing any FreeRDP client connecting through a malicious RDP Gateway to crash with SIGABRT. This is a pre-authentication denial of service affecting all FreeRDP clients using RPC-over-HTTP gateway transport. The assertion is active in default release builds (WITH_VERBOSE_WINPR_ASSERT=ON). This issue has been patched in version 3.24.2. |
2026-03-30 | |
| CVE-2026-5152 | 7.4 | HIGH | CWE-119 | 0.1% p23 | 5.18 | A vulnerability was detected in Tenda CH22 1.0.0.1. Impacted is the function for...A vulnerability was detected in Tenda CH22 1.0.0.1. Impacted is the function formCreateFileName of the file /goform/createFileName. Performing a manipulation of the argument fileNameMit results in stack-based buffer overflow. The attack may be initiated remotely. The exploit is now public and may be used. |
2026-03-30 | |
| CVE-2026-4789 | 9.8 | CRITICAL | CWE-918 | 0.0% p5 | 6.86 | Kyverno, versions 1.16.0 and later, are vulnerable to SSRF due to unrestricted C...Kyverno, versions 1.16.0 and later, are vulnerable to SSRF due to unrestricted CEL HTTP functions. |
2026-03-30 | |
| CVE-2026-34558 | 9.1 | CRITICAL | CWE-79 | 0.1% p15 | 6.37 | CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, mo...CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to version 0.31.0.0, the application fails to properly sanitize user-controlled input within the Methods Management functionality when creating or managing application methods/pages. Multiple input fields accept attacker-controlled JavaScript payloads that are stored server-side without sanitization or output encoding. These stored values are later rendered directly into administrative interfaces and global navigation components without proper encoding, resulting in Stored DOM-Based Cross-Site Scripting (XSS). This issue has been patched in version 0.31.0.0. |
2026-03-30 | |
| CVE-2026-34557 | 9.1 | CRITICAL | CWE-79 | 0.1% p15 | 6.37 | CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, mo...CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to version 0.31.0.0, the application fails to properly sanitize user-controlled input within group and role management functionality. Multiple input fields (three distinct group-related fields) can be injected with malicious JavaScript payloads, which are then stored server-side. These stored payloads are later rendered unsafely within privileged administrative views without proper output encoding, leading to stored cross-site scripting (XSS) within the role and permission management context. This issue has been patched in version 0.31.0.0. |
2026-03-30 | |
| CVE-2026-32884 | 5.9 | MEDIUM | CWE-295 | 0.0% p5 | 4.13 | Botan is a C++ cryptography library. Prior to version 3.11.0, during processing ...Botan is a C++ cryptography library. Prior to version 3.11.0, during processing of an X.509 certificate path using name constraints which restrict the set of allowable DNS names, if no subject alternative name is defined in the end-entity certificate Botan would check that the CN was allowed by the DNS name constraints, even though this check is technically not required by RFC 5280. However this check failed to account for the possibility of a mixed-case CN. Thus a certificate with CN=Sub.EVIL.COM and no subject alternative name would bypasses an excludedSubtrees constraint for evil.com because the comparison is case-sensitive. This issue has been patched in version 3.11.0. |
2026-03-30 | |
| CVE-2026-32883 | 5.9 | MEDIUM | CWE-347 | 0.0% p3 | 4.13 | Botan is a C++ cryptography library. From version 3.0.0 to before version 3.11.0...Botan is a C++ cryptography library. From version 3.0.0 to before version 3.11.0, during X509 path validation, OCSP responses were checked for an appropriate status code, but critically omitted verifying the signature of the OCSP response itself. This issue has been patched in version 3.11.0. |
2026-03-30 | |
| CVE-2026-32877 | 8.2 | HIGH | CWE-125 | 0.1% p17 | 5.74 | Botan is a C++ cryptography library. From version 2.3.0 to before version 3.11.0...Botan is a C++ cryptography library. From version 2.3.0 to before version 3.11.0, during SM2 decryption, the code that checked the authentication code value (C3) failed to check that the encoded value was of the expected length prior to comparison. An invalid ciphertext can cause a heap over-read of up to 31 bytes, resulting in a crash or potentially other undefined behavior. This issue has been patched in version 3.11.0. |
2026-03-30 | |
| CVE-2026-32696 | 3.1 | LOW | CWE-476 | 0.0% p5 | 2.17 | NanoMQ MQTT Broker (NanoMQ) is an all-around Edge Messaging Platform. In NanoMQ ...NanoMQ MQTT Broker (NanoMQ) is an all-around Edge Messaging Platform. In NanoMQ version 0.24.6, after enabling auth.http_auth (HTTP authentication), when a client connects to the broker using MQTT CONNECT without providing username/password, and the configuration params uses the placeholders %u / %P (e.g., username="%u", password="%P"), the HTTP request construction phase enters auth_http.c:set_data(). This results in calling strlen() on a NULL pointer, causing a SIGSEGV crash. This crash can be triggered remotely, resulting in a denial of service. This issue has been patched in version 0.24.7. |
2026-03-30 | |
| CVE-2026-31946 | 9.8 | CRITICAL | CWE-287 | 0.0% p7 | 6.86 | OpenOlat is an open source web-based e-learning platform for teaching, learning,...OpenOlat is an open source web-based e-learning platform for teaching, learning, assessment and communication. From version 10.5.4 to before version 20.2.5, OpenOLAT's OpenID Connect implicit flow implementation does not verify JWT signatures. The JSONWebToken.parse() method silently discards the signature segment of the compact JWT (header.payload.signature), and the getAccessToken() methods in both OpenIdConnectApi and OpenIdConnectFullConfigurableApi only validate claim-level fields (issuer, audience, state, nonce) without any cryptographic signature verification against the Identity Provider's JWKS endpoint. This issue has been patched in version 20.2.5. |
2026-03-30 | |
| CVE-2026-30313 | 9.8 | CRITICAL | CWE-94 | 0.9% p75 | 6.89 | DSAI-Cline's command auto-approval module contains a critical OS command injecti...DSAI-Cline's command auto-approval module contains a critical OS command injection vulnerability that renders its whitelist security mechanism completely ineffective. The system relies on string-based parsing to validate commands; while it intercepts dangerous operators such as ;, &&, ||, |, and command substitution patterns, it fails to account for raw newline characters embedded within the input. An attacker can construct a payload by embedding a literal newline between a whitelisted command and malicious code (e.g., git log malicious_command), forcing DSAI-Cline to misidentify it as a safe operation and automatically approve it. The underlying PowerShell interpreter treats the newline as a command separator, executing both commands sequentially, resulting in Remote Code Execution without any user interaction. |
2026-03-30 | |
| CVE-2026-30308 | 9.8 | CRITICAL | CWE-94 | 0.1% p24 | 6.86 | In its design for automatic terminal command execution, HAI Build Code Generator...In its design for automatic terminal command execution, HAI Build Code Generator offers two options: Execute safe commands and Execute all commands. The description for the former states that commands determined by the model to be safe will be automatically executed, whereas if the model judges a command to be potentially destructive, it still requires user approval. However, this design is highly susceptible to prompt injection attacks. An attacker can employ a generic template to wrap any malicious command and mislead the model into misclassifying it as a 'safe' command, thereby bypassing the user approval requirement and resulting in arbitrary command execution. |
2026-03-30 | |
| CVE-2026-30306 | 9.8 | CRITICAL | CWE-94 | 0.0% p8 | 6.86 | In its design for automatic terminal command execution, SakaDev offers two optio...In its design for automatic terminal command execution, SakaDev offers two options: Execute safe commands and execute all commands. The description for the former states that commands determined by the model to be safe will be automatically executed, whereas if the model judges a command to be potentially destructive, it still requires user approval. However, this design is highly susceptible to prompt injection attacks. An attacker can employ a generic template to wrap any malicious command and mislead the model into misclassifying it as a 'safe' command, thereby bypassing the user approval requirement and resulting in arbitrary command execution. |
2026-03-30 | |
| CVE-2026-28228 | 8.8 | HIGH | CWE-1336 | 0.1% p18 | 6.16 | OpenOlat is an open source web-based e-learning platform for teaching, learning,...OpenOlat is an open source web-based e-learning platform for teaching, learning, assessment and communication. Prior to versions 19.1.31, 20.1.18, and 20.2.5, an authenticated user with the Author role can inject Velocity directives into a reminder email template. When the reminder is processed (either triggered manually or via the daily cron job), the injected directives are evaluated server-side. By chaining Velocity's #set directive with Java reflection, an attacker can instantiate arbitrary Java classes such as java.lang.ProcessBuilder and execute operating system commands with the privileges of the Tomcat process (typically root in containerized deployments). This issue has been patched in versions 19.1.31, 20.1.18, and 20.2.5. |
2026-03-30 | |
| CVE-2026-27599 | 4.7 | MEDIUM | CWE-79 | 0.0% p5 | 3.29 | CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, mo...CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to version 0.31.0.0, the application fails to properly sanitize user-controlled input within System Settings – Mail Settings. Several configuration fields, including Mail Server, Mail Port, Email Address, Email Password, Mail Protocol, and TLS settings, accept attacker-controlled input that is stored server-side and later rendered without proper output encoding. This issue has been patched in version 0.31.0.0. |
2026-03-30 | |
| CVE-2026-27018 | 8.8 | HIGH | CWE-22 | 0.0% p5 | 6.16 | Gotenberg is an API for converting document formats. Prior to version 8.29.0, th...Gotenberg is an API for converting document formats. Prior to version 8.29.0, the fix introduced for CVE-2024-21527 can be bypassed using mixed-case or uppercase URL schemes. This issue has been patched in version 8.29.0. |
2026-03-30 | |
| CVE-2026-25627 | 6.5 | MEDIUM | CWE-125 | 0.0% p2 | 4.55 | NanoMQ MQTT Broker (NanoMQ) is an all-around Edge Messaging Platform. Prior to v...NanoMQ MQTT Broker (NanoMQ) is an all-around Edge Messaging Platform. Prior to version 0.24.8, NanoMQ’s MQTT-over-WebSocket transport can be crashed by sending an MQTT packet with a deliberately large Remaining Length in the fixed header while providing a much shorter actual payload. The code path copies Remaining Length bytes without verifying that the current receive buffer contains that many bytes, resulting in an out-of-bounds read (ASAN reports OOB / crash). This is remotely triggerable over the WebSocket listener. This issue has been patched in version 0.24.8. |
2026-03-30 | |
| CVE-2026-5150 | 6.9 | MEDIUM | CWE-74 | 0.0% p11 | 4.83 | A security vulnerability has been detected in code-projects Accounting System 1....A security vulnerability has been detected in code-projects Accounting System 1.0. This issue affects some unknown processing of the file /viewin_costumer.php of the component Parameter Handler. Such manipulation of the argument cos_id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed publicly and may be used. |
2026-03-30 | |
| CVE-2026-5148 | 5.1 | MEDIUM | CWE-74 | 0.0% p10 | 3.57 | A weakness has been identified in YunaiV yudao-cloud up to 2026.01. This vulnera...A weakness has been identified in YunaiV yudao-cloud up to 2026.01. This vulnerability affects unknown code of the file /admin-api/system/mail-log/page. This manipulation of the argument toMail causes sql injection. The attack can be initiated remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-30 | |
| CVE-2026-33026 | 9.4 | CRITICAL | CWE-312 | 0.0% p1 | 6.58 | Nginx UI is a web user interface for the Nginx web server. Prior to version 2.3....Nginx UI is a web user interface for the Nginx web server. Prior to version 2.3.4, the nginx-ui backup restore mechanism allows attackers to tamper with encrypted backup archives and inject malicious configuration during restoration. This issue has been patched in version 2.3.4. |
2026-03-30 | |
| CVE-2026-32275 | 7.4 | HIGH | CWE-79 | 0.1% p17 | 5.18 | Tautulli is a Python based monitoring and tracking tool for Plex Media Server. F...Tautulli is a Python based monitoring and tracking tool for Plex Media Server. From version 1.3.10 to before version 2.17.0, an unsanitized JSONP callback parameter allows cross-origin script injection and API key theft. This issue has been patched in version 2.17.0. |
2026-03-30 | |
| CVE-2026-31831 | 8.7 | HIGH | CWE-23 | 0.1% p22 | 6.09 | Tautulli is a Python based monitoring and tracking tool for Plex Media Server. P...Tautulli is a Python based monitoring and tracking tool for Plex Media Server. Prior to version 2.17.0, the /newsletter/image/images API endpoint is vulnerable to path traversal, allowing unauthenticated attackers to read arbitrary files from the application server's filesystem. This issue has been patched in version 2.17.0. |
2026-03-30 | |
| CVE-2026-31804 | 4.0 | MEDIUM | CWE-918 | 0.1% p15 | 2.80 | Tautulli is a Python based monitoring and tracking tool for Plex Media Server. P...Tautulli is a Python based monitoring and tracking tool for Plex Media Server. Prior to version 2.17.0, the /pms_image_proxy endpoint accepts a user-supplied img parameter and forwards it to Plex Media Server's /photo/:/ transcode transcoder without authentication and without restricting the scheme or host. The endpoint is intentionally excluded from all authentication checks in webstart.py, any value of img beginning with http is passed directly to Plex, this causes the Plex Media Server process, which typically runs on the same host or internal network as Tautulli, with access to RFC-1918 address space, to issue an outbound HTTP request to any attacker-specified URL. This issue has been patched in version 2.17.0. |
2026-03-30 | |
| CVE-2026-31799 | 4.9 | MEDIUM | CWE-20 | 0.0% p9 | 3.43 | Tautulli is a Python based monitoring and tracking tool for Plex Media Server. F...Tautulli is a Python based monitoring and tracking tool for Plex Media Server. From version 2.14.2 to before version 2.17.0 for parameters "before" and "after" and from version 2.1.0-beta to before version 2.17.0 for parameters "section_id" and "user_id", the /api/v2?cmd=get_home_stats endpoint passes the section_id, user_id, before, and after query parameters directly into SQL via Python %-string formatting without parameterization. An attacker who holds the Tautulli admin API key can inject arbitrary SQL and exfiltrate any value from the Tautulli SQLite database via boolean-blind inference. This issue has been patched in version 2.17.0. |
2026-03-30 | |
| CVE-2026-30307 | 9.8 | CRITICAL | CWE-94 | 0.7% p71 | 6.88 | Roo Code's command auto-approval module contains a critical OS command injection...Roo Code's command auto-approval module contains a critical OS command injection vulnerability that renders its whitelist security mechanism completely ineffective. The system relies on fragile regular expressions to parse command structures; while it attempts to intercept dangerous operations, it fails to account for standard Shell command substitution Roo Code (specifically$(...)and backticks ...). An attacker can construct a command such as git log --grep="$(malicious_command)", forcing Syntx to misidentify it as a safe git operation and automatically approve it. The underlying Shell prioritizes the execution of the malicious code injected within the arguments, resulting in Remote Code Execution without any user interaction. |
2026-03-30 | |
| CVE-2026-30305 | 9.8 | CRITICAL | CWE-94 | 0.5% p66 | 6.88 | Syntx's command auto-approval module contains a critical OS command injection vu...Syntx's command auto-approval module contains a critical OS command injection vulnerability that renders its whitelist security mechanism completely ineffective. The system relies on fragile regular expressions to parse command structures; while it attempts to intercept dangerous operations, it fails to account for standard Shell command substitution syntax (specifically $(...)and backticks ...). An attacker can construct a command such as git log --grep="$(malicious_command)", forcing Syntx to misidentify it as a safe git operation and automatically approve it. The underlying Shell prioritizes the execution of the malicious code injected within the arguments, resulting in Remote Code Execution without any user interaction. |
2026-03-30 | |
| CVE-2026-28505 | 7.5 | HIGH | CWE-94 | 0.0% p6 | 5.25 | Tautulli is a Python based monitoring and tracking tool for Plex Media Server. P...Tautulli is a Python based monitoring and tracking tool for Plex Media Server. Prior to version 2.17.0, the str_eval() function in notification_handler.py implements a sandboxed eval() for notification text templates. The sandbox attempts to restrict callable names by inspecting code.co_names of the compiled code object. However, co_names only contains names from the outer code object. When a lambda expression is used, it creates a nested code object whose attribute accesses are stored in code.co_consts, NOT in code.co_names. The sandbox never inspects nested code objects. This issue has been patched in version 2.17.0. |
2026-03-30 | |
| CVE-2026-5147 | 6.9 | MEDIUM | CWE-74 | 0.0% p11 | 4.83 | A security flaw has been discovered in YunaiV yudao-cloud up to 2026.01. This af...A security flaw has been discovered in YunaiV yudao-cloud up to 2026.01. This affects an unknown part of the file /admin-api/system/tenant/get-by-website. The manipulation of the argument Website results in sql injection. It is possible to launch the attack remotely. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-30 | |
| CVE-2026-3991 | 7.8 | HIGH | CWE-829 | 0.0% p2 | 5.46 | Symantec Data Loss Prevention Windows Endpoint, prior to 25.1 MP1, 16.1 MP2, 16....Symantec Data Loss Prevention Windows Endpoint, prior to 25.1 MP1, 16.1 MP2, 16.0 RU2 HF9, 16.0 RU1 MP1 HF12, and 16.0 MP2 HF15, may be susceptible to a Elevation of Privilege vulnerability, which is a type of issue whereby an attacker may attempt to compromise the software application to gain elevated access to resources that are normally protected from an application or user. |
2026-03-30 | |
| CVE-2026-3502 | 7.8 | HIGH | CWE-494 | ✓ | 1.5% p81 | 5.50 | TrueConf Client downloads application update code and applies it without perform...TrueConf Client downloads application update code and applies it without performing verification. An attacker who is able to influence the update delivery path can substitute a tampered update payload. If the payload is executed or installed by the updater, this may result in arbitrary code execution in the context of the updating process or user. |
2026-03-30 |
| CVE-2026-34714 | 9.2 | CRITICAL | CWE-78 | 0.0% p7 | 6.44 | Vim before 9.2.0272 allows code execution that happens immediately upon opening ...Vim before 9.2.0272 allows code execution that happens immediately upon opening a crafted file in the default configuration, because %{expr} injection occurs with tabpanel lacking P_MLE. |
2026-03-30 | |
| CVE-2026-29925 | 7.7 | HIGH | CWE-918 | 0.0% p8 | 5.39 | Invoice Ninja v5.12.46 and v5.12.48 is vulnerable to Server-Side Request Forgery...Invoice Ninja v5.12.46 and v5.12.48 is vulnerable to Server-Side Request Forgery (SSRF) in CheckDatabaseRequest.php. |
2026-03-30 | |
| CVE-2026-29924 | 7.6 | HIGH | CWE-611 | 0.1% p19 | 5.32 | Grav CMS v1.7.x and before is vulnerable to XML External Entity (XXE) through th...Grav CMS v1.7.x and before is vulnerable to XML External Entity (XXE) through the SVG file upload functionality in the admin panel and File Manager plugin. |
2026-03-30 | |
| CVE-2026-5126 | 5.3 | MEDIUM | CWE-918 | 0.0% p2 | 3.71 | A flaw has been found in SourceCodester RSS Feed Parser 1.0. Affected by this is...A flaw has been found in SourceCodester RSS Feed Parser 1.0. Affected by this issue is the function file_get_contents. This manipulation causes server-side request forgery. The attack is possible to be carried out remotely. The exploit has been published and may be used. |
2026-03-30 | |
| CVE-2026-5125 | 4.8 | MEDIUM | CWE-77 | 0.3% p53 | 3.37 | A vulnerability was detected in raine consult-llm-mcp up to 2.5.3. Affected by t...A vulnerability was detected in raine consult-llm-mcp up to 2.5.3. Affected by this vulnerability is the function child_process.execSync of the file src/server.ts. The manipulation of the argument git_diff.base_ref/git_diff.files results in os command injection. The attack is only possible with local access. The exploit is now public and may be used. Upgrading to version 2.5.4 addresses this issue. The patch is identified as 4abf297b34e5e8a9cb364b35f52c5f0ca1d599d3. Upgrading the affected component is recommended. |
2026-03-30 | |
| CVE-2026-33032 | 9.8 | CRITICAL | CWE-306 | 0.1% p18 | 6.86 | Nginx UI is a web user interface for the Nginx web server. In versions 2.3.5 and...Nginx UI is a web user interface for the Nginx web server. In versions 2.3.5 and prior, the nginx-ui MCP (Model Context Protocol) integration exposes two HTTP endpoints: /mcp and /mcp_message. While /mcp requires both IP whitelisting and authentication (AuthRequired() middleware), the /mcp_message endpoint only applies IP whitelisting - and the default IP whitelist is empty, which the middleware treats as "allow all". This means any network attacker can invoke all MCP tools without authentication, including restarting nginx, creating/modifying/deleting nginx configuration files, and triggering automatic config reloads - achieving complete nginx service takeover. At time of publication, there are no publicly available patches. |
2026-03-30 | |
| CVE-2026-33030 | 8.8 | HIGH | CWE-78 | 0.0% p10 | 6.16 | Nginx UI is a web user interface for the Nginx web server. In versions 2.3.3 and...Nginx UI is a web user interface for the Nginx web server. In versions 2.3.3 and prior, Nginx-UI contains an Insecure Direct Object Reference (IDOR) vulnerability that allows any authenticated user to access, modify, and delete resources belonging to other users. The application's base Model struct lacks a user_id field, and all resource endpoints perform queries by ID without verifying user ownership, enabling complete authorization bypass in multi-user environments. At time of publication, there are no publicly available patches. |
2026-03-30 | |
| CVE-2026-33029 | 6.9 | MEDIUM | CWE-20 | 0.1% p18 | 4.83 | Nginx UI is a web user interface for the Nginx web server. Prior to version 2.3....Nginx UI is a web user interface for the Nginx web server. Prior to version 2.3.4, an input validation vulnerability in the logrotate configuration allows an authenticated user to cause a complete Denial of Service (DoS). By submitting a negative integer for the rotation interval, the backend enters an infinite loop or an invalid state, rendering the web interface unresponsive. This issue has been patched in version 2.3.4. |
2026-03-30 | |
| CVE-2026-33028 | 7.1 | HIGH | CWE-362 | 0.1% p23 | 4.97 | Nginx UI is a web user interface for the Nginx web server. Prior to version 2.3....Nginx UI is a web user interface for the Nginx web server. Prior to version 2.3.4, the nginx-ui application is vulnerable to a Race Condition. Due to the complete absence of synchronization mechanisms (Mutex) and non-atomic file writes, concurrent requests lead to the severe corruption of the primary configuration file (app.ini). This vulnerability results in a persistent Denial of Service (DoS) and introduces a non-deterministic path for Remote Code Execution (RCE) through configuration cross-contamination. This issue has been patched in version 2.3.4. |
2026-03-30 | |
| CVE-2026-33027 | 6.9 | MEDIUM | CWE-22 | 0.1% p18 | 4.83 | Nginx UI is a web user interface for the Nginx web server. Prior to version 2.3....Nginx UI is a web user interface for the Nginx web server. Prior to version 2.3.4, the nginx-ui configuration improperly handles URL-encoded traversal sequences. When specially crafted paths are supplied, the backend resolves them to the base Nginx configuration directory and executes the operation on the base directory (/etc/nginx). In particular, this allows an authenticated user to remove the entire /etc/nginx directory, resulting in a partial Denial of Service. This issue has been patched in version 2.3.4. |
2026-03-30 | |
| CVE-2026-30077 | 7.5 | HIGH | CWE-20 | 0.1% p21 | 5.25 | OpenAirInterface V2.2.0 AMF crashes when it fails to decode the message. Not all...OpenAirInterface V2.2.0 AMF crashes when it fails to decode the message. Not all decode failures result in a crash. But the crash is consistent for particular inputs. An example input in hex stream is 80 00 00 0E 00 00 01 00 0F 80 02 02 40 00 58 00 01 88. |
2026-03-30 | |
| CVE-2026-29872 | 8.2 | HIGH | CWE-200 | 0.1% p20 | 5.74 | A cross-session information disclosure vulnerability exists in the awesome-llm-a...A cross-session information disclosure vulnerability exists in the awesome-llm-apps project in commit e46690f99c3f08be80a9877fab52acacf7ab8251 (2026-01-19). The affected Streamlit-based GitHub MCP Agent stores user-supplied API tokens in process-wide environment variables using os.environ without proper session isolation. Because Streamlit serves multiple concurrent users from a single Python process, credentials provided by one user remain accessible to subsequent unauthenticated users. An attacker can exploit this issue to retrieve sensitive information such as GitHub Personal Access Tokens or LLM API keys, potentially leading to unauthorized access to private resources and financial abuse. |
2026-03-30 | |
| CVE-2025-66215 | 3.8 | LOW | CWE-121 | 0.0% p4 | 2.66 | OpenSC is an open source smart card tools and middleware. Prior to version 0.27....OpenSC is an open source smart card tools and middleware. Prior to version 0.27.0, an attacker with physical access to the computer at the time user or administrator uses a token can cause a stack-buffer-overflow WRITE in card-oberthur. The attack requires crafted USB device or smart card that would present the system with specially crafted responses to the APDUs. This issue has been patched in version 0.27.0. |
2026-03-30 | |
| CVE-2025-66038 | 3.9 | LOW | CWE-126 | 0.0% p5 | 2.73 | OpenSC is an open source smart card tools and middleware. Prior to version 0.27....OpenSC is an open source smart card tools and middleware. Prior to version 0.27.0, sc_compacttlv_find_tag searches a compact-TLV buffer for a given tag. In compact-TLV, a single byte encodes the tag (high nibble) and value length (low nibble). With a 1-byte buffer {0x0A}, the encoded element claims tag=0 and length=10 but no value bytes follow. Calling sc_compacttlv_find_tag with search tag 0x00 returns a pointer equal to buf+1 and outlen=10 without verifying that the claimed value length fits within the remaining buffer. In cases where the sc_compacttlv_find_tag is provided untrusted data (such as being read from cards/files), attackers may be able to influence it to return out-of-bounds pointers leading to downstream memory corruption when subsequent code tries to dereference the pointer. This issue has been patched in version 0.27.0. |
2026-03-30 | |
| CVE-2025-66037 | 3.9 | LOW | CWE-125 | 0.0% p0 | 2.73 | OpenSC is an open source smart card tools and middleware. Prior to version 0.27....OpenSC is an open source smart card tools and middleware. Prior to version 0.27.0, feeding a crafted input to the fuzz_pkcs15_reader harness causes OpenSC to perform an out-of-bounds heap read in the X.509/SPKI handling path. Specifically, sc_pkcs15_pubkey_from_spki_fields() allocates a zero-length buffer and then reads one byte past the end of that allocation. This issue has been patched in version 0.27.0. |
2026-03-30 | |
| CVE-2025-49010 | 3.8 | LOW | CWE-121 | 0.0% p3 | 2.66 | OpenSC is an open source smart card tools and middleware. Prior to version 0.27....OpenSC is an open source smart card tools and middleware. Prior to version 0.27.0, an attacker with physical access to the computer at the time user or administrator uses a token can cause a stack-buffer-overflow write in GET RESPONSE. The attack requires crafted USB device or smart card that would present the system with specially crafted responses to the APDUs. This issue has been patched in version 0.27.0. |
2026-03-30 | |
| CVE-2026-5124 | 6.3 | MEDIUM | CWE-266 | 0.1% p16 | 4.41 | A security vulnerability has been detected in osrg GoBGP up to 4.3.0. Affected i...A security vulnerability has been detected in osrg GoBGP up to 4.3.0. Affected is the function BGPHeader.DecodeFromBytes of the file pkg/packet/bgp/bgp.go of the component BGP Header Handler. The manipulation leads to improper access controls. Remote exploitation of the attack is possible. The attack is considered to have high complexity. The exploitability is told to be difficult. The identifier of the patch is f0f24a2a901cbf159260698211ab15c583ced131. To fix this issue, it is recommended to deploy a patch. |
2026-03-30 | |
| CVE-2026-29954 | 7.6 | HIGH | CWE-88 | 0.0% p11 | 5.32 | In KubePlus 4.1.4, the mutating webhook and kubeconfiggenerator components have ...In KubePlus 4.1.4, the mutating webhook and kubeconfiggenerator components have an SSRF vulnerability when processing the chartURL field of ResourceComposition resources. The field is only URL-encoded without validating the target address. More critically, when kubeconfiggenerator uses wget to download charts, the chartURL is directly concatenated into the command, allowing attackers to inject wget's `--header` option to achieve arbitrary HTTP header injection. |
2026-03-30 | |
| CVE-2026-29909 | 5.3 | MEDIUM | CWE-20 | 0.0% p5 | 3.71 | MRCMS V3.1.2 contains an unauthenticated directory enumeration vulnerability in ...MRCMS V3.1.2 contains an unauthenticated directory enumeration vulnerability in the file management module. The /admin/file/list.do endpoint lacks authentication controls and proper input validation, allowing remote attackers to enumerate directory contents on the server without any credentials. |
2026-03-30 | |
| CVE-2026-27508 | 5.1 | MEDIUM | CWE-79 | 0.0% p8 | 3.57 | Smoothwall Express versions prior to 3.1 Update 13 contain a reflected cross-sit...Smoothwall Express versions prior to 3.1 Update 13 contain a reflected cross-site scripting vulnerability in the /redirect.cgi endpoint due to improper sanitation of the url parameter. Attackers can craft malicious URLs with javascript: schemes that execute arbitrary JavaScript in victims' browsers when clicked through the unsanitized link. |
2026-03-30 | |
| CVE-2026-26352 | 5.1 | MEDIUM | CWE-79 | 0.0% p8 | 3.57 | Smoothwall Express versions prior to 3.1 Update 13 contain a stored cross-site s...Smoothwall Express versions prior to 3.1 Update 13 contain a stored cross-site scripting vulnerability in the /cgi-bin/vpnmain.cgi script due to improper sanitation of the VPN_IP parameter. Authenticated attackers can inject arbitrary JavaScript through VPN configuration settings that executes when the affected page is viewed by other users. |
2026-03-30 | |
| CVE-2026-5123 | 6.3 | MEDIUM | CWE-189 | 0.1% p25 | 4.41 | A weakness has been identified in osrg GoBGP up to 4.3.0. This impacts the funct...A weakness has been identified in osrg GoBGP up to 4.3.0. This impacts the function DecodeFromBytes of the file pkg/packet/bgp/bgp.go. Executing a manipulation of the argument data[1] can lead to off-by-one. The attack may be launched remotely. Attacks of this nature are highly complex. The exploitability is said to be difficult. This patch is called 67c059413470df64bc20801c46f64058e88f800f. A patch should be applied to remediate this issue. |
2026-03-30 | |
| CVE-2026-34472 | 7.1 | HIGH | CWE-200 | 0.0% p13 | 4.97 | Unauthenticated credential disclosure in the wizard interface in ZTE ZXHN H188A ...Unauthenticated credential disclosure in the wizard interface in ZTE ZXHN H188A V6.0.10P2_TE and V6.0.10P3N3_TE allows unauthenticated attackers on the local network to retrieve sensitive credentials from the router's web management interface, including the default administrator password, WLAN PSK, and PPPoE credentials. In some observed cases, configuration changes may also be performed without authentication. |
2026-03-30 | |
| CVE-2026-33643 | 7.4 | HIGH | CWE-89 | 0.0% p10 | 5.18 | SQL Injection vulnerability in SchemaHero 0.23.0 via the column parameter to the...SQL Injection vulnerability in SchemaHero 0.23.0 via the column parameter to the mysqlColumnAsInsert function in file plugins/mysql/lib/column.go. |
2026-03-30 | |
| CVE-2026-30562 | 9.3 | CRITICAL | CWE-79 | 0.0% p13 | 6.51 | A Reflected Cross-Site Scripting (XSS) vulnerability exists in SourceCodester Sa...A Reflected Cross-Site Scripting (XSS) vulnerability exists in SourceCodester Sales and Inventory System 1.0. The vulnerability is located in the add_stock.php file via the "msg" parameter. The application fails to sanitize the input, allowing remote attackers to inject arbitrary web script or HTML via a crafted URL. |
2026-03-30 | |
| CVE-2026-30561 | 6.1 | MEDIUM | CWE-79 | 0.0% p11 | 4.27 | A Reflected Cross-Site Scripting (XSS) vulnerability exists in SourceCodester Sa...A Reflected Cross-Site Scripting (XSS) vulnerability exists in SourceCodester Sales and Inventory System 1.0. The vulnerability is located in the add_purchase.php file via the "msg" parameter. The application fails to sanitize the input, allowing remote attackers to inject arbitrary web script or HTML via a crafted URL. |
2026-03-30 | |
| CVE-2026-30560 | 6.1 | MEDIUM | CWE-79 | 0.0% p11 | 4.27 | A Reflected Cross-Site Scripting (XSS) vulnerability exists in SourceCodester Sa...A Reflected Cross-Site Scripting (XSS) vulnerability exists in SourceCodester Sales and Inventory System 1.0. The vulnerability is located in the add_supplier.php file via the "msg" parameter. The application fails to sanitize the input, allowing remote attackers to inject arbitrary web script or HTML via a crafted URL. |
2026-03-30 | |
| CVE-2026-30559 | 6.1 | MEDIUM | CWE-79 | 0.0% p11 | 4.27 | A Reflected Cross-Site Scripting (XSS) vulnerability exists in SourceCodester Sa...A Reflected Cross-Site Scripting (XSS) vulnerability exists in SourceCodester Sales and Inventory System 1.0. The vulnerability is located in the add_sales.php file via the "msg" parameter. The application fails to sanitize the input, allowing remote attackers to inject arbitrary web script or HTML via a crafted URL. |
2026-03-30 | |
| CVE-2026-30558 | 6.1 | MEDIUM | CWE-79 | 0.0% p11 | 4.27 | A Reflected Cross-Site Scripting (XSS) vulnerability exists in SourceCodester Sa...A Reflected Cross-Site Scripting (XSS) vulnerability exists in SourceCodester Sales and Inventory System 1.0. The vulnerability is located in the add_customer.php file via the "msg" parameter. The application fails to sanitize the input, allowing remote attackers to inject arbitrary web script or HTML via a crafted URL. |
2026-03-30 | |
| CVE-2026-30557 | 6.1 | MEDIUM | CWE-79 | 0.0% p11 | 4.27 | A Reflected Cross-Site Scripting (XSS) vulnerability exists in SourceCodester Sa...A Reflected Cross-Site Scripting (XSS) vulnerability exists in SourceCodester Sales and Inventory System 1.0. The vulnerability is located in the add_category.php file via the "msg" parameter. The application fails to sanitize the input, allowing remote attackers to inject arbitrary web script or HTML via a crafted URL. |
2026-03-30 | |
| CVE-2026-30556 | 6.1 | MEDIUM | CWE-79 | 0.0% p11 | 4.27 | A Reflected Cross-Site Scripting (XSS) vulnerability exists in SourceCodester Sa...A Reflected Cross-Site Scripting (XSS) vulnerability exists in SourceCodester Sales and Inventory System 1.0. The vulnerability is located in the index.php file via the "msg" parameter. The application fails to sanitize the input, allowing remote attackers to inject arbitrary web script or HTML via a crafted URL. |
2026-03-30 | |
| CVE-2026-2287 | 9.8 | CRITICAL | CWE-94 | 0.1% p19 | 6.86 | CrewAI does not properly check that Docker is still running during runtime, and ...CrewAI does not properly check that Docker is still running during runtime, and will fall back to a sandbox setting that allows for RCE exploitation. |
2026-03-30 | |
| CVE-2026-2286 | 9.8 | CRITICAL | CWE-918 | 0.1% p16 | 6.86 | CrewAI contains a server-side request forgery vulnerability that enables content...CrewAI contains a server-side request forgery vulnerability that enables content acquisition from internal and cloud services, facilitated by the RAG search tools not properly validating URLs provided at runtime. |
2026-03-30 | |
| CVE-2026-2285 | 7.5 | HIGH | NVD-CWE-noinfo | 0.2% p38 | 5.26 | CrewAI contains a arbitrary local file read vulnerability in the JSON loader too...CrewAI contains a arbitrary local file read vulnerability in the JSON loader tool that reads files without path validation, enabling access to files on the server. |
2026-03-30 | |
| CVE-2026-2275 | 9.6 | CRITICAL | CWE-749 | 0.0% p12 | 6.72 | The CrewAI CodeInterpreter tool falls back to SandboxPython when it cannot reach...The CrewAI CodeInterpreter tool falls back to SandboxPython when it cannot reach Docker, which can enable RCE through arbitrary C function calling. |
2026-03-30 | |
| CVE-2026-29953 | 7.4 | HIGH | CWE-89 | 0.0% p8 | 5.18 | SQL Injection vulnerability in SchemaHero 0.23.0 via the column parameter to the...SQL Injection vulnerability in SchemaHero 0.23.0 via the column parameter to the columnAsInsert function in file plugins/postgres/lib/column.go. |
2026-03-30 | |
| CVE-2026-29597 | 6.5 | MEDIUM | CWE-284 | 0.0% p8 | 4.55 | DDSN Interactive cm3 Acora CMS version 10.7.1 contains an improper access contro...DDSN Interactive cm3 Acora CMS version 10.7.1 contains an improper access control vulnerability. An editor-privileged user can access sensitive configuration files by force browsing the “/Admin/file_manager/file_details.asp” endpoint and manipulating the “file” parameter. By referencing specific files (e.g., cm3.xml), the attacker can retrieve system administrator credentials, SMTP settings, database credentials, and other confidential information. The exposure of this information can lead to full administrative access to the CMS, unauthorized access to email services, compromise of backend databases, lateral movement within the network, and long-term persistence by an attacker. This access control bypass poses a critical risk of account takeover, privilege escalation, and systemic compromise of the affected application and its associated infrastructure. |
2026-03-30 | |
| CVE-2026-21712 | 5.7 | MEDIUM | N/A | 0.0% p2 | 3.99 | A flaw in Node.js URL processing causes an assertion failure in native code when...A flaw in Node.js URL processing causes an assertion failure in native code when `url.format()` is called with a malformed internationalized domain name (IDN) containing invalid characters, crashing the Node.js process. |
2026-03-30 | |
| CVE-2026-5165 | 6.7 | MEDIUM | CWE-825 | 0.0% p2 | 4.69 | A flaw was found in virtio-win, specifically within the VirtIO Block (BLK) devic...A flaw was found in virtio-win, specifically within the VirtIO Block (BLK) device. When the device undergoes a reset, it fails to properly manage memory, resulting in a use-after-free vulnerability. This issue could allow a local attacker to corrupt system memory, potentially leading to system instability or unexpected behavior. |
2026-03-30 | |
| CVE-2026-5164 | 6.7 | MEDIUM | CWE-120 | 0.0% p2 | 4.69 | A flaw was found in virtio-win. The `RhelDoUnMap()` function does not properly v...A flaw was found in virtio-win. The `RhelDoUnMap()` function does not properly validate the number of descriptors provided by a user during an unmap request. A local user could exploit this input validation vulnerability by supplying an excessive number of descriptors, leading to a buffer overrun. This can cause a system crash, resulting in a Denial of Service (DoS). |
2026-03-30 | |
| CVE-2026-5122 | 6.3 | MEDIUM | CWE-266 | 0.1% p16 | 4.41 | A security flaw has been discovered in osrg GoBGP up to 4.3.0. This affects the ...A security flaw has been discovered in osrg GoBGP up to 4.3.0. This affects the function DecodeFromBytes of the file pkg/packet/bgp/bgp.go of the component BGP OPEN Message Handler. Performing a manipulation of the argument domainNameLen results in improper access controls. The attack may be initiated remotely. A high degree of complexity is needed for the attack. The exploitability is reported as difficult. The patch is named 2b09db390a3d455808363c53e409afe6b1b86d2d. It is suggested to install a patch to address this issue. |
2026-03-30 | |
| CVE-2026-33373 | 8.8 | HIGH | CWE-352 | 0.0% p10 | 6.16 | An issue was discovered in Zimbra Collaboration (ZCS) 10.0 and 10.1. A Cross-Sit...An issue was discovered in Zimbra Collaboration (ZCS) 10.0 and 10.1. A Cross-Site Request Forgery (CSRF) vulnerability exists in Zimbra Web Client due to the issuance of authentication tokens without CSRF protection during certain account state transitions. Specifically, tokens generated after operations such as enabling two-factor authentication or changing a password may lack CSRF enforcement. While such a token is active, authenticated SOAP requests that trigger token generation or state changes can be performed without CSRF validation. An attacker could exploit this by inducing a victim to submit crafted requests, potentially allowing sensitive account actions such as disabling two-factor authentication. The issue is mitigated by ensuring CSRF protection is consistently enforced for all issued authentication tokens. |
2026-03-30 | |
| CVE-2026-30566 | 6.1 | MEDIUM | CWE-79 | 0.0% p11 | 4.27 | A Reflected Cross-Site Scripting (XSS) vulnerability exists in SourceCodester Sa...A Reflected Cross-Site Scripting (XSS) vulnerability exists in SourceCodester Sales and Inventory System 1.0. The vulnerability is located in the view_customers.php file via the "limit" parameter. The application fails to sanitize the input, allowing remote attackers to inject arbitrary web script or HTML via a crafted URL. |
2026-03-30 | |
| CVE-2026-30565 | 6.1 | MEDIUM | CWE-79 | 0.0% p11 | 4.27 | A Reflected Cross-Site Scripting (XSS) vulnerability exists in SourceCodester Sa...A Reflected Cross-Site Scripting (XSS) vulnerability exists in SourceCodester Sales and Inventory System 1.0. The vulnerability is located in the view_supplier.php file via the "limit" parameter. The application fails to sanitize the input, allowing remote attackers to inject arbitrary web script or HTML via a crafted URL. |
2026-03-30 | |
| CVE-2026-30564 | 6.1 | MEDIUM | CWE-79 | 0.0% p11 | 4.27 | A Reflected Cross-Site Scripting (XSS) vulnerability exists in SourceCodester Sa...A Reflected Cross-Site Scripting (XSS) vulnerability exists in SourceCodester Sales and Inventory System 1.0. The vulnerability is located in the view_payments.php file via the "limit" parameter. The application fails to sanitize the input, allowing remote attackers to inject arbitrary web script or HTML via a crafted URL. |
2026-03-30 | |
| CVE-2026-30563 | 6.1 | MEDIUM | CWE-79 | 0.0% p8 | 4.27 | A Stored Cross-Site Scripting (XSS) vulnerability exists in SourceCodester Sales...A Stored Cross-Site Scripting (XSS) vulnerability exists in SourceCodester Sales and Inventory System 1.0. The vulnerability is located in the update_details.php file. The application fails to sanitize the "website" parameter provided in a POST request. This allows authenticated attackers to inject arbitrary web script or HTML that is stored in the database and executed whenever the store details page is accessed. |
2026-03-30 | |
| CVE-2026-30082 | 6.1 | MEDIUM | CWE-79 | 0.0% p8 | 4.27 | Multiple stored cross-site scripting (XSS) vulnerabilities in the Edit feature o...Multiple stored cross-site scripting (XSS) vulnerabilities in the Edit feature of the Software Package List page of IngEstate Server v11.14.0 allow attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the About application, What's news, or Release note parameters. |
2026-03-30 | |
| CVE-2026-3321 | 8.7 | HIGH | CWE-639 | 0.1% p24 | 6.09 | A vulnerability of authorization bypass through user-controlled key in the 'cons...A vulnerability of authorization bypass through user-controlled key in the 'console-survey/api/v1/answer/{EVENTID}/{TIMESTAMP}/' endpoint. Exploiting this vulnerability would allow an unauthenticated attacker to enumerate event IDs and obtain the complete Q&A history. This publicly exposed data may include IDs, private URLs, private messages, internal references, or other sensitive information that should only be exposed to authenticated users. In addition, the leaked content could be exploited to facilitate other malicious activities, such as reconnaissance for lateral movement, exploitation of related systems, or unauthorised access to internal applications referenced in the content of chat messages. |
2026-03-30 | |
| CVE-2026-28528 | 2.1 | LOW | CWE-125 | 0.0% p2 | 1.47 | BlueKitchen BTstack versions prior to 1.8.1 contain an out-of-bounds read vulner...BlueKitchen BTstack versions prior to 1.8.1 contain an out-of-bounds read vulnerability in the AVRCP Browsing Target GET_FOLDER_ITEMS handler that fails to validate packet boundaries and attribute count data. An attacker with a paired Bluetooth Classic connection can exploit insufficient bounds checking on the attr_id parameter to cause crashes and corrupt attribute bitmap state. |
2026-03-30 | |
| CVE-2026-28527 | 2.1 | LOW | CWE-125 | 0.0% p4 | 1.47 | BlueKitchen BTstack versions prior to 1.8.1 contain an out-of-bounds read vulner...BlueKitchen BTstack versions prior to 1.8.1 contain an out-of-bounds read vulnerability in the AVRCP Controller GET_PLAYER_APPLICATION_SETTING_ATTRIBUTE_TEXT and GET_PLAYER_APPLICATION_SETTING_VALUE_TEXT handlers that allows nearby attackers to read beyond packet boundaries. Attackers can establish a paired Bluetooth Classic connection and send specially crafted VENDOR_DEPENDENT responses to trigger out-of-bounds reads, causing information disclosure and potential crashes on affected devices. |
2026-03-30 | |
| CVE-2026-28526 | 2.1 | LOW | CWE-125 | 0.0% p3 | 1.47 | BlueKitchen BTstack versions prior to 1.8.1 contain an out-of-bounds read vulner...BlueKitchen BTstack versions prior to 1.8.1 contain an out-of-bounds read vulnerability in the AVRCP Controller LIST_PLAYER_APPLICATION_SETTING_ATTRIBUTES and LIST_PLAYER_APPLICATION_SETTING_VALUES handlers that allows attackers to read beyond buffer boundaries. A nearby attacker with a paired Bluetooth Classic connection can send a specially crafted VENDOR_DEPENDENT response with an attacker-controlled count value to trigger an out-of-bounds read from the L2CAP receive buffer, potentially causing a crash on resource-constrained devices. |
2026-03-30 | |
| CVE-2026-4315 | 7.1 | HIGH | CWE-352 | 0.1% p20 | 4.97 | A Cross-Site Request Forgery (CSRF) vulnerability in the WatchGuard Fireware OS ...A Cross-Site Request Forgery (CSRF) vulnerability in the WatchGuard Fireware OS WebUI could allow a remote attacker to trigger a denial-of-service (DoS) condition in the Fireware Web UI by convincing an authenticated administrator into visiting a malicious web page.This issue affects Fireware OS: 11.8 through 11.12.4+541730, 12.0 through 12.11.8, and 2025.1 through 2026.1.2. |
2026-03-30 | |
| CVE-2026-4425 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: Reserved for EastLink case, but no need for CVE anymoreRejected reason: Reserved for EastLink case, but no need for CVE anymore |
2026-03-30 | |
| CVE-2019-25655 | 6.9 | MEDIUM | CWE-1316 | 0.0% p3 | 4.83 | Device Monitoring Studio 8.10.00.8925 contains a denial of service vulnerability...Device Monitoring Studio 8.10.00.8925 contains a denial of service vulnerability that allows local attackers to crash the application by supplying an excessively long string to the server connection dialog. Attackers can trigger the crash by entering a malformed server name or address containing repeated characters through the Tools menu Connect to New Server interface. |
2026-03-30 | |
| CVE-2019-25654 | 8.7 | HIGH | CWE-787 | 0.1% p15 | 6.09 | Core FTP/SFTP Server 1.2 contains a buffer overflow vulnerability that allows at...Core FTP/SFTP Server 1.2 contains a buffer overflow vulnerability that allows attackers to crash the service by supplying an excessively long string in the User domain field. Attackers can paste a malicious payload containing 7000 bytes of data into the domain configuration to trigger an application crash and deny service. |
2026-03-30 | |
| CVE-2019-25653 | 6.9 | MEDIUM | CWE-620 | 0.0% p2 | 4.83 | Navicat for Oracle 12.1.15 contains a denial of service vulnerability that allow...Navicat for Oracle 12.1.15 contains a denial of service vulnerability that allows local attackers to crash the application by supplying an excessively long string in the password field. Attackers can paste a buffer of 550 repeated characters into the password parameter during Oracle connection configuration to trigger an application crash. |
2026-03-30 | |
| CVE-2018-25235 | 6.9 | MEDIUM | CWE-787 | 0.0% p2 | 4.83 | NetworkActiv Web Server 4.0 contains a buffer overflow vulnerability in the user...NetworkActiv Web Server 4.0 contains a buffer overflow vulnerability in the username field of the Security options that allows local attackers to crash the application by supplying an excessively long string. Attackers can trigger a denial of service by entering a crafted username value exceeding the expected buffer size through the Set username interface. |
2026-03-30 | |
| CVE-2018-25234 | 6.9 | MEDIUM | CWE-466 | 0.0% p2 | 4.83 | SmartFTP Client 9.0.2615.0 contains a denial of service vulnerability that allow...SmartFTP Client 9.0.2615.0 contains a denial of service vulnerability that allows local attackers to crash the application by supplying an excessively long string in the Host field. Attackers can paste a buffer of 300 repeated characters into the Host connection parameter to trigger an application crash. |
2026-03-30 | |
| CVE-2018-25233 | 6.9 | MEDIUM | CWE-233 | 0.0% p2 | 4.83 | WebDrive 18.00.5057 contains a denial of service vulnerability that allows local...WebDrive 18.00.5057 contains a denial of service vulnerability that allows local attackers to crash the application by supplying an excessively long string in the username field during Secure WebDAV connection setup. Attackers can input a buffer-overflow payload of 5000 bytes in the username parameter and trigger a connection test to cause the application to crash. |
2026-03-30 | |
| CVE-2018-25232 | 6.8 | MEDIUM | CWE-1285 | 0.0% p5 | 4.76 | Softros LAN Messenger 9.2 contains a denial of service vulnerability that allows...Softros LAN Messenger 9.2 contains a denial of service vulnerability that allows local attackers to crash the application by supplying an excessively long string to the custom log files location field. Attackers can input a buffer of 2000 characters in the Log Files Location custom path parameter to trigger a crash when the OK button is clicked. |
2026-03-30 | |
| CVE-2018-25231 | 6.9 | MEDIUM | CWE-98 | 0.0% p2 | 4.83 | HeidiSQL 9.5.0.5196 contains a denial of service vulnerability that allows local...HeidiSQL 9.5.0.5196 contains a denial of service vulnerability that allows local attackers to crash the application by supplying an excessively long file path in the logging preferences. Attackers can input a buffer-overflow payload through the SQL log file path field in Preferences > Logging to trigger an application crash. |
2026-03-30 | |
| CVE-2018-25230 | 6.8 | MEDIUM | CWE-787 | 0.0% p6 | 4.76 | Free IP Switcher 3.1 contains a buffer overflow vulnerability that allows local ...Free IP Switcher 3.1 contains a buffer overflow vulnerability that allows local attackers to crash the application by supplying an excessively long string in the Computer Name field. Attackers can paste a malicious payload into the Computer Name input field and click Activate to trigger a denial of service condition that crashes the application. |
2026-03-30 | |
| CVE-2018-25229 | 6.8 | MEDIUM | CWE-1282 | 0.0% p2 | 4.76 | BulletProof FTP Server 2019.0.0.50 contains a denial of service vulnerability in...BulletProof FTP Server 2019.0.0.50 contains a denial of service vulnerability in the SMTP configuration interface that allows local attackers to crash the application by supplying an oversized string. Attackers can input a buffer of 257 'A' characters in the SMTP Server field and trigger a crash by clicking the Test button. |
2026-03-30 | |
| CVE-2018-25228 | 6.9 | MEDIUM | CWE-787 | 0.0% p2 | 4.83 | NetSetMan 4.7.1 contains a buffer overflow vulnerability in the Workgroup featur...NetSetMan 4.7.1 contains a buffer overflow vulnerability in the Workgroup feature that allows local attackers to crash the application by supplying oversized input. Attackers can create a malicious configuration file with excessive data and paste it into the Workgroup field to trigger a denial of service condition. |
2026-03-30 | |
| CVE-2018-25227 | 6.9 | MEDIUM | CWE-466 | 0.0% p2 | 4.83 | Valentina Studio 9.0.4 contains a denial of service vulnerability that allows lo...Valentina Studio 9.0.4 contains a denial of service vulnerability that allows local attackers to crash the application by supplying an excessively long string in the Host field. Attackers can trigger the crash by pasting a 256-byte buffer of repeated characters into the Host parameter during server connection attempts. |
2026-03-30 | |
| CVE-2018-25226 | 6.9 | MEDIUM | CWE-787 | 0.0% p2 | 4.83 | FTPShell Server 6.83 contains a buffer overflow vulnerability that allows local ...FTPShell Server 6.83 contains a buffer overflow vulnerability that allows local attackers to crash the application by supplying an excessively long string in the account name field. Attackers can trigger a denial of service by pasting a 417-byte payload into the 'Account name to ban' parameter within the Manage FTP Accounts interface. |
2026-03-30 | |
| CVE-2026-5128 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering...Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. |
2026-03-30 | |
| CVE-2026-5121 | 7.5 | HIGH | CWE-190 | 0.1% p24 | 5.25 | A flaw was found in libarchive. On 32-bit systems, an integer overflow vulnerabi...A flaw was found in libarchive. On 32-bit systems, an integer overflow vulnerability exists in the zisofs block pointer allocation logic. A remote attacker can exploit this by providing a specially crafted ISO9660 image, which can lead to a heap buffer overflow. This could potentially allow for arbitrary code execution on the affected system. |
2026-03-30 | |
| CVE-2026-4416 | 8.5 | HIGH | CWE-502 | 0.0% p4 | 5.95 | The Performance Library component of Gigabyte Control Center has an Insecure Des...The Performance Library component of Gigabyte Control Center has an Insecure Deserialization vulnerability. Authenticated local attackers can send a malicious serialized payload to the EasyTune Engine service, resulting in privilege escalation. |
2026-03-30 | |
| CVE-2026-4415 | 9.2 | CRITICAL | CWE-23 | 0.5% p67 | 6.46 | Gigabyte Control Center developed by GIGABYTE has an Arbitrary File Write vulner...Gigabyte Control Center developed by GIGABYTE has an Arbitrary File Write vulnerability. When the pairing feature is enabled, unauthenticated remote attackers can write arbitrary files to any location on the underlying operating system, leading to arbitrary code execution or privilege escalation. |
2026-03-30 | |
| CVE-2026-3945 | 8.7 | HIGH | CWE-190 | 0.1% p19 | 6.09 | An integer overflow vulnerability in the HTTP chunked transfer encoding parser i...An integer overflow vulnerability in the HTTP chunked transfer encoding parser in tinyproxy up to and including version 1.11.3 allows an unauthenticated remote attacker to cause a denial of service (DoS). The issue occurs because chunk size values are parsed using strtol() without properly validating overflow conditions (e.g., errno == ERANGE). A crafted chunk size such as 0x7fffffffffffffff (LONG_MAX) bypasses the existing validation check (chunklen < 0), leading to a signed integer overflow during arithmetic operations (chunklen + 2). This results in incorrect size calculations, causing the proxy to attempt reading an extremely large amount of request-body data and holding worker connections open indefinitely. An attacker can exploit this behavior to exhaust all available worker slots, preventing new connections from being accepted and causing complete service unavailability. Upstream addressed this issue in commit bb7edc4; however, the latest stable release (1.11.3) remains affected at the time of publication. |
2026-03-30 | |
| CVE-2026-2328 | 7.5 | HIGH | CWE-790 | 0.0% p9 | 5.25 | An unauthenticated remote attacker can exploit insufficient input validation to ...An unauthenticated remote attacker can exploit insufficient input validation to access backend components beyond their intended scope via path traversal, resulting in exposure of sensitive information. |
2026-03-30 | |
| CVE-2025-3716 | 5.3 | MEDIUM | CWE-204 | 0.0% p5 | 3.71 | User enumeration in ESET Protect (on-prem) via Response Timing.User enumeration in ESET Protect (on-prem) via Response Timing. |
2026-03-30 | |
| CVE-2025-15379 | 10.0 | CRITICAL | CWE-77 | 0.2% p46 | 7.01 | A command injection vulnerability exists in MLflow's model serving container ini...A command injection vulnerability exists in MLflow's model serving container initialization code, specifically in the `_install_model_dependencies_to_env()` function. When deploying a model with `env_manager=LOCAL`, MLflow reads dependency specifications from the model artifact's `python_env.yaml` file and directly interpolates them into a shell command without sanitization. This allows an attacker to supply a malicious model artifact and achieve arbitrary command execution on systems that deploy the model. The vulnerability affects versions 3.8.0 and is fixed in version 3.8.2. |
2026-03-30 | |
| CVE-2026-5119 | 5.9 | MEDIUM | CWE-319 | 0.0% p2 | 4.13 | A flaw was found in libsoup. When establishing HTTPS tunnels through a configure...A flaw was found in libsoup. When establishing HTTPS tunnels through a configured HTTP proxy, sensitive session cookies are transmitted in cleartext within the initial HTTP CONNECT request. A network-positioned attacker or a malicious HTTP proxy can intercept these cookies, leading to potential session hijacking or user impersonation. |
2026-03-30 | |
| CVE-2026-5107 | 2.3 | LOW | CWE-266 | 0.0% p14 | 1.61 | A vulnerability has been found in FRRouting FRR up to 10.5.1. This affects the f...A vulnerability has been found in FRRouting FRR up to 10.5.1. This affects the function process_type2_route of the file bgpd/bgp_evpn.c of the component EVPN Type-2 Route Handler. The manipulation leads to improper access controls. The attack can be initiated remotely. The attack is considered to have high complexity. The exploitability is reported as difficult. The identifier of the patch is 7676cad65114aa23adde583d91d9d29e2debd045. To fix this issue, it is recommended to deploy a patch. |
2026-03-30 | |
| CVE-2026-5106 | 4.8 | MEDIUM | CWE-79 | 0.0% p7 | 3.36 | A flaw has been found in code-projects Exam Form Submission 1.0. The impacted el...A flaw has been found in code-projects Exam Form Submission 1.0. The impacted element is an unknown function of the file /admin/update_fst.php. Executing a manipulation of the argument sname can lead to cross site scripting. It is possible to launch the attack remotely. The exploit has been published and may be used. |
2026-03-30 | |
| CVE-2026-5105 | 5.3 | MEDIUM | CWE-74 | 2.2% p84 | 3.77 | A vulnerability was detected in Totolink A3300R 17.0.0cu.557_b20221024. The affe...A vulnerability was detected in Totolink A3300R 17.0.0cu.557_b20221024. The affected element is the function setVpnPassCfg of the file /cgi-bin/cstecgi.cgi of the component Parameter Handler. Performing a manipulation of the argument pptpPassThru results in command injection. It is possible to initiate the attack remotely. The exploit is now public and may be used. |
2026-03-30 | |
| CVE-2026-5104 | 5.3 | MEDIUM | CWE-74 | 2.2% p84 | 3.77 | A security vulnerability has been detected in Totolink A3300R 17.0.0cu.557_b2022...A security vulnerability has been detected in Totolink A3300R 17.0.0cu.557_b20221024. Impacted is the function setStaticRoute of the file /cgi-bin/cstecgi.cgi. Such manipulation of the argument ip leads to command injection. The attack may be performed from remote. The exploit has been disclosed publicly and may be used. |
2026-03-30 | |
| CVE-2026-5103 | 5.3 | MEDIUM | CWE-74 | 2.2% p84 | 3.77 | A weakness has been identified in Totolink A3300R 17.0.0cu.557_b20221024. This i...A weakness has been identified in Totolink A3300R 17.0.0cu.557_b20221024. This issue affects the function setUPnPCfg of the file /cgi-bin/cstecgi.cgi. This manipulation of the argument enable causes command injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be used for attacks. |
2026-03-30 | |
| CVE-2026-3124 | 7.5 | HIGH | CWE-639 | 0.0% p10 | 5.25 | The Download Monitor plugin for WordPress is vulnerable to Insecure Direct Objec...The Download Monitor plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 5.1.7 via the executePayment() function due to missing validation on a user controlled key. This makes it possible for unauthenticated attackers to complete arbitrary pending orders by exploiting a mismatch between the PayPal transaction token and the local order, allowing theft of paid digital goods by paying a minimal amount for a low-cost item and using that payment token to finalize a high-value order. |
2026-03-30 | |
| CVE-2025-15036 | 9.6 | CRITICAL | CWE-29 | 0.1% p16 | 6.72 | A path traversal vulnerability exists in the `extract_archive_to_dir` function w...A path traversal vulnerability exists in the `extract_archive_to_dir` function within the `mlflow/pyfunc/dbconnect_artifact_cache.py` file of the mlflow/mlflow repository. This vulnerability, present in versions before v3.7.0, arises due to the lack of validation of tar member paths during extraction. An attacker with control over the tar.gz file can exploit this issue to overwrite arbitrary files or gain elevated privileges, potentially escaping the sandbox directory in multi-tenant or shared cluster environments. |
2026-03-30 | |
| CVE-2026-5102 | 5.3 | MEDIUM | CWE-74 | 2.2% p84 | 3.77 | A security flaw has been discovered in Totolink A3300R 17.0.0cu.557_b20221024. T...A security flaw has been discovered in Totolink A3300R 17.0.0cu.557_b20221024. This vulnerability affects the function setSmartQosCfg of the file /cgi-bin/cstecgi.cgi of the component Parameter Handler. The manipulation of the argument qos_up_bw results in command injection. The attack can be executed remotely. The exploit has been released to the public and may be used for attacks. |
2026-03-30 | |
| CVE-2026-2370 | 8.1 | HIGH | CWE-233 | 0.0% p0 | 5.67 | GitLab has remediated an issue in GitLab CE/EE affecting all versions from 14.3 ...GitLab has remediated an issue in GitLab CE/EE affecting all versions from 14.3 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 affecting Jira Connect installations that could have allowed an authenticated user with minimal workspace permissions to obtain installation credentials and impersonate the GitLab app due to improper authorization checks. |
2026-03-30 | |
| CVE-2026-5101 | 5.3 | MEDIUM | CWE-74 | 2.9% p86 | 3.80 | A vulnerability was identified in Totolink A3300R 17.0.0cu.557_b20221024. This a...A vulnerability was identified in Totolink A3300R 17.0.0cu.557_b20221024. This affects the function setLanCfg of the file /cgi-bin/cstecgi.cgi of the component Parameter Handler. The manipulation of the argument lanIp leads to command injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used. |
2026-03-29 | |
| CVE-2026-4946 | 8.8 | HIGH | CWE-78 | 0.0% p14 | 6.16 | Ghidra versions prior to 12.0.3 improperly process annotation directives embedde...Ghidra versions prior to 12.0.3 improperly process annotation directives embedded in automatically extracted binary data, resulting in arbitrary command execution when an analyst interacts with the UI. Specifically, the @execute annotation (which is intended for trusted, user-authored comments) is also parsed in comments generated during auto-analysis (such as CFStrings in Mach-O binaries). This allows a crafted binary to present seemingly benign clickable text which, when clicked, executes attacker-controlled commands on the analyst’s machine. |
2026-03-29 | |
| CVE-2026-0562 | 8.3 | HIGH | CWE-863 | 0.0% p14 | 5.81 | A critical security vulnerability in parisneo/lollms versions up to 2.2.0 allows...A critical security vulnerability in parisneo/lollms versions up to 2.2.0 allows any authenticated user to accept or reject friend requests belonging to other users. The `respond_request()` function in `backend/routers/friends.py` does not implement proper authorization checks, enabling Insecure Direct Object Reference (IDOR) attacks. Specifically, the `/api/friends/requests/{friendship_id}` endpoint fails to verify whether the authenticated user is part of the friendship or the intended recipient of the request. This vulnerability can lead to unauthorized access, privacy violations, and potential social engineering attacks. The issue has been addressed in version 2.2.0. |
2026-03-29 | |
| CVE-2026-0560 | 7.5 | HIGH | CWE-918 | 0.1% p29 | 5.25 | A Server-Side Request Forgery (SSRF) vulnerability exists in parisneo/lollms ver...A Server-Side Request Forgery (SSRF) vulnerability exists in parisneo/lollms versions prior to 2.2.0, specifically in the `/api/files/export-content` endpoint. The `_download_image_to_temp()` function in `backend/routers/files.py` fails to validate user-controlled URLs, allowing attackers to make arbitrary HTTP requests to internal services and cloud metadata endpoints. This vulnerability can lead to internal network access, cloud metadata access, information disclosure, port scanning, and potentially remote code execution. |
2026-03-29 | |
| CVE-2026-0558 | 9.8 | CRITICAL | CWE-287 | 0.3% p54 | 6.87 | A vulnerability in parisneo/lollms, up to and including version 2.2.0, allows un...A vulnerability in parisneo/lollms, up to and including version 2.2.0, allows unauthenticated users to upload and process files through the `/api/files/extract-text` endpoint. This endpoint does not enforce authentication, unlike other file-related endpoints, and lacks the `Depends(get_current_active_user)` dependency. This issue can lead to denial of service (DoS) through resource exhaustion, information disclosure, and violation of the application's documented security policies. |
2026-03-29 | |
| CVE-2026-34005 | 8.8 | HIGH | CWE-78 | 0.1% p27 | 6.16 | In Sofia on Xiongmai DVR/NVR (AHB7008T-MH-V2 and NBD7024H-P) 4.03.R11 devices, r...In Sofia on Xiongmai DVR/NVR (AHB7008T-MH-V2 and NBD7024H-P) 4.03.R11 devices, root OS command injection can occur via shell metacharacters in the HostName value via an authenticated DVRIP protocol (TCP port 34567) request to the NetWork.NetCommon configuration handler, because system() is used. |
2026-03-29 | |
| CVE-2026-5046 | 7.4 | HIGH | CWE-119 | 0.1% p23 | 5.18 | A flaw has been found in Tenda FH1201 1.2.0.14(408). Affected is the function fo...A flaw has been found in Tenda FH1201 1.2.0.14(408). Affected is the function formWrlExtraSet of the file /goform/WrlExtraSet of the component Parameter Handler. Executing a manipulation of the argument GO can lead to stack-based buffer overflow. The attack may be performed from remote. The exploit has been published and may be used. |
2026-03-29 | |
| CVE-2026-5045 | 7.4 | HIGH | CWE-119 | 0.1% p23 | 5.18 | A vulnerability was detected in Tenda FH1201 1.2.0.14(408). This impacts the fun...A vulnerability was detected in Tenda FH1201 1.2.0.14(408). This impacts the function WrlclientSet of the file /goform/WrlclientSet of the component Parameter Handler. Performing a manipulation of the argument GO results in stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit is now public and may be used. |
2026-03-29 | |
| CVE-2026-5044 | 7.4 | HIGH | CWE-119 | 0.1% p26 | 5.18 | A security vulnerability has been detected in Belkin F9K1122 1.00.33. This affec...A security vulnerability has been detected in Belkin F9K1122 1.00.33. This affects the function formSetSystemSettings of the file /goform/formSetSystemSettings of the component Setting Handler. Such manipulation of the argument webpage leads to stack-based buffer overflow. The attack can be executed remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-29 | |
| CVE-2026-33575 | 8.6 | HIGH | CWE-522 | 0.0% p13 | 6.02 | OpenClaw before 2026.3.12 embeds long-lived shared gateway credentials directly ...OpenClaw before 2026.3.12 embeds long-lived shared gateway credentials directly in pairing setup codes generated by /pair endpoint and OpenClaw qr command. Attackers with access to leaked setup codes from chat history, logs, or screenshots can recover and reuse the shared gateway credential outside the intended one-time pairing flow. |
2026-03-29 | |
| CVE-2026-33574 | 5.8 | MEDIUM | CWE-367 | 0.0% p1 | 4.06 | OpenClaw before 2026.3.8 contains a path traversal vulnerability in the skills d...OpenClaw before 2026.3.8 contains a path traversal vulnerability in the skills download installer that validates the tools root lexically but reuses the mutable path during archive download and copy operations. A local attacker can rebind the tools-root path between validation and final write to redirect the installer outside the intended tools directory. |
2026-03-29 | |
| CVE-2026-33573 | 8.7 | HIGH | CWE-668 | 0.1% p15 | 6.09 | OpenClaw before 2026.3.11 contains an authorization bypass vulnerability in the ...OpenClaw before 2026.3.11 contains an authorization bypass vulnerability in the gateway agent RPC that allows authenticated operators with operator.write permission to override workspace boundaries by supplying attacker-controlled spawnedBy and workspaceDir values. Remote operators can escape the configured workspace boundary and execute arbitrary file and exec operations from any process-accessible directory. |
2026-03-29 | |
| CVE-2026-33572 | 6.8 | MEDIUM | CWE-378 | 0.0% p1 | 4.76 | OpenClaw before 2026.2.17 creates session transcript JSONL files with overly bro...OpenClaw before 2026.2.17 creates session transcript JSONL files with overly broad default permissions, allowing local users to read transcript contents. Attackers with local access can read transcript files to extract sensitive information including secrets from tool output. |
2026-03-29 | |
| CVE-2026-32987 | 9.3 | CRITICAL | CWE-294 | 0.1% p17 | 6.51 | OpenClaw before 2026.3.13 allows bootstrap setup codes to be replayed during dev...OpenClaw before 2026.3.13 allows bootstrap setup codes to be replayed during device pairing verification in src/infra/device-bootstrap.ts. Attackers can verify a valid bootstrap code multiple times before approval to escalate pending pairing scopes, including privilege escalation to operator.admin. |
2026-03-29 | |
| CVE-2026-32980 | 8.7 | HIGH | CWE-770 | 0.1% p25 | 6.09 | OpenClaw before 2026.3.13 reads and buffers Telegram webhook request bodies befo...OpenClaw before 2026.3.13 reads and buffers Telegram webhook request bodies before validating the x-telegram-bot-api-secret-token header, allowing unauthenticated attackers to exhaust server resources. Attackers can send POST requests to the webhook endpoint to force memory consumption, socket time, and JSON parsing work before authentication validation occurs. |
2026-03-29 | |
| CVE-2026-32979 | 7.0 | HIGH | CWE-367 | 0.0% p13 | 4.90 | OpenClaw before 2026.3.11 contains an approval integrity vulnerability allowing ...OpenClaw before 2026.3.11 contains an approval integrity vulnerability allowing attackers to execute rewritten local code by modifying scripts between approval and execution when exact file binding cannot occur. Remote attackers can change approved local scripts before execution to achieve unintended code execution as the OpenClaw runtime user. |
2026-03-29 | |
| CVE-2026-32978 | 9.4 | CRITICAL | CWE-863 | 0.0% p12 | 6.58 | OpenClaw before 2026.3.11 contains an approval integrity vulnerability where sys...OpenClaw before 2026.3.11 contains an approval integrity vulnerability where system.run approvals fail to bind mutable file operands for certain script runners like tsx and jiti. Attackers can obtain approval for benign script commands, rewrite referenced scripts on disk, and execute modified code under the approved run context. |
2026-03-29 | |
| CVE-2026-32975 | 6.9 | MEDIUM | CWE-807 | 0.1% p23 | 4.83 | OpenClaw before 2026.3.12 contains a weak authorization vulnerability in Zalouse...OpenClaw before 2026.3.12 contains a weak authorization vulnerability in Zalouser allowlist mode that matches mutable group display names instead of stable group identifiers. Attackers can create groups with identical names to allowlisted groups to bypass channel authorization and route messages from unintended groups to the agent. |
2026-03-29 | |
| CVE-2026-32974 | 8.8 | HIGH | CWE-347 | 0.1% p18 | 6.16 | OpenClaw before 2026.3.12 contains an authentication bypass vulnerability in Fei...OpenClaw before 2026.3.12 contains an authentication bypass vulnerability in Feishu webhook mode when only verificationToken is configured without encryptKey, allowing acceptance of forged events. Unauthenticated network attackers can inject forged Feishu events and trigger downstream tool execution by reaching the webhook endpoint. |
2026-03-29 | |
| CVE-2026-32973 | 8.8 | HIGH | CWE-625 | 0.1% p22 | 6.16 | OpenClaw before 2026.3.11 contains an exec allowlist bypass vulnerability where ...OpenClaw before 2026.3.11 contains an exec allowlist bypass vulnerability where matchesExecAllowlistPattern improperly normalizes patterns with lowercasing and glob matching that overmatches on POSIX paths. Attackers can exploit the ? wildcard matching across path segments to execute commands or paths not intended by operators. |
2026-03-29 | |
| CVE-2026-32972 | 7.1 | HIGH | CWE-863 | 0.0% p12 | 4.97 | OpenClaw before 2026.3.11 contains an authorization bypass vulnerability allowin...OpenClaw before 2026.3.11 contains an authorization bypass vulnerability allowing authenticated operators with only operator.write permission to access admin-only browser profile management routes through browser.request. Attackers can create or modify browser profiles and persist attacker-controlled remote CDP endpoints to disk without holding operator.admin privileges. |
2026-03-29 | |
| CVE-2026-32924 | 6.9 | MEDIUM | CWE-863 | 0.1% p17 | 4.83 | OpenClaw before 2026.3.12 contains an authorization bypass vulnerability where F...OpenClaw before 2026.3.12 contains an authorization bypass vulnerability where Feishu reaction events with omitted chat_type are misclassified as p2p conversations instead of group chats. Attackers can exploit this misclassification to bypass groupAllowFrom and requireMention protections in group chat reaction-derived events. |
2026-03-29 | |
| CVE-2026-32923 | 5.3 | MEDIUM | CWE-863 | 0.0% p8 | 3.71 | OpenClaw before 2026.3.11 contains an authorization bypass vulnerability in Disc...OpenClaw before 2026.3.11 contains an authorization bypass vulnerability in Discord guild reaction ingestion that fails to enforce member users and roles allowlist checks. Non-allowlisted guild members can trigger reaction events accepted as trusted system events, injecting reaction text into downstream session context. |
2026-03-29 | |
| CVE-2026-32922 | 9.4 | CRITICAL | CWE-266 | 0.2% p47 | 6.59 | OpenClaw before 2026.3.11 contains a privilege escalation vulnerability in devic...OpenClaw before 2026.3.11 contains a privilege escalation vulnerability in device.token.rotate that allows callers with operator.pairing scope to mint tokens with broader scopes by failing to constrain newly minted scopes to the caller's current scope set. Attackers can obtain operator.admin tokens for paired devices and achieve remote code execution on connected nodes via system.run or gain unauthorized gateway-admin access. |
2026-03-29 | |
| CVE-2026-32919 | 6.9 | MEDIUM | CWE-863 | 0.0% p2 | 4.83 | OpenClaw before 2026.3.11 contains an authorization bypass vulnerability allowin...OpenClaw before 2026.3.11 contains an authorization bypass vulnerability allowing write-scoped callers to reach admin-only session reset logic. Attackers with operator.write scope can issue agent requests containing /new or /reset slash commands to reset targeted conversation state without holding operator.admin privileges. |
2026-03-29 | |
| CVE-2026-32918 | 9.2 | CRITICAL | CWE-863 | 0.0% p1 | 6.44 | OpenClaw before 2026.3.11 contains a session sandbox escape vulnerability in the...OpenClaw before 2026.3.11 contains a session sandbox escape vulnerability in the session_status tool that allows sandboxed subagents to access parent or sibling session state. Attackers can supply arbitrary sessionKey values to read or modify session data outside their sandbox scope, including persisted model overrides. |
2026-03-29 | |
| CVE-2026-32915 | 9.3 | CRITICAL | CWE-863 | 0.0% p1 | 6.51 | OpenClaw before 2026.3.11 contains a sandbox boundary bypass vulnerability allow...OpenClaw before 2026.3.11 contains a sandbox boundary bypass vulnerability allowing leaf subagents to access the subagents control surface and resolve against parent requester scope instead of their own session tree. A low-privilege sandboxed leaf worker can steer or kill sibling runs and cause execution with broader tool policies by exploiting insufficient authorization checks on subagent control requests. |
2026-03-29 | |
| CVE-2026-32914 | 8.7 | HIGH | CWE-863 | 0.0% p14 | 6.09 | OpenClaw before 2026.3.12 contains an insufficient access control vulnerability ...OpenClaw before 2026.3.12 contains an insufficient access control vulnerability in the /config and /debug command handlers that allows command-authorized non-owners to access owner-only surfaces. Attackers with command authorization can read or modify privileged configuration settings restricted to owners by exploiting missing owner-level permission checks. |
2026-03-29 | |
| CVE-2026-5043 | 7.4 | HIGH | CWE-119 | 0.1% p26 | 5.18 | A weakness has been identified in Belkin F9K1122 1.00.33. The impacted element i...A weakness has been identified in Belkin F9K1122 1.00.33. The impacted element is the function formSetPassword of the file /goform/formSetPassword of the component Parameter Handler. This manipulation of the argument webpage causes stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-29 | |
| CVE-2026-5042 | 7.4 | HIGH | CWE-119 | 0.1% p26 | 5.18 | A security flaw has been discovered in Belkin F9K1122 1.00.33. The affected elem...A security flaw has been discovered in Belkin F9K1122 1.00.33. The affected element is the function formCrossBandSwitch of the file /goform/formCrossBandSwitch of the component Parameter Handler. The manipulation of the argument webpage results in stack-based buffer overflow. The attack may be launched remotely. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-29 | |
| CVE-2026-5041 | 5.1 | MEDIUM | CWE-74 | 0.3% p56 | 3.58 | A vulnerability was identified in code-projects Chamber of Commerce Membership M...A vulnerability was identified in code-projects Chamber of Commerce Membership Management System 1.0. Impacted is the function fwrite of the file admin/pageMail.php. The manipulation of the argument mailSubject/mailMessage leads to command injection. The attack may be initiated remotely. The exploit is publicly available and might be used. |
2026-03-29 | |
| CVE-2026-5037 | 4.8 | MEDIUM | CWE-119 | 0.0% p2 | 3.36 | A vulnerability was determined in mxml up to 4.0.4. This issue affects the funct...A vulnerability was determined in mxml up to 4.0.4. This issue affects the function index_sort of the file mxml-index.c of the component mxmlIndexNew. Executing a manipulation of the argument tempr can lead to stack-based buffer overflow. The attack is restricted to local execution. The exploit has been publicly disclosed and may be utilized. This patch is called 6e27354466092a1ac65601e01ce6708710bb9fa5. A patch should be applied to remediate this issue. |
2026-03-29 | |
| CVE-2026-5036 | 7.4 | HIGH | CWE-119 | 0.0% p13 | 5.18 | A vulnerability was found in Tenda 4G06 04.06.01.29. This vulnerability affects ...A vulnerability was found in Tenda 4G06 04.06.01.29. This vulnerability affects the function fromDhcpListClient of the file /goform/DhcpListClient of the component Endpoint. Performing a manipulation of the argument page results in stack-based buffer overflow. The attack can be initiated remotely. The exploit has been made public and could be used. |
2026-03-29 | |
| CVE-2026-5035 | 6.9 | MEDIUM | CWE-74 | 0.0% p8 | 4.83 | A vulnerability has been found in code-projects Accounting System 1.0. This affe...A vulnerability has been found in code-projects Accounting System 1.0. This affects an unknown part of the file /view_work.php of the component Parameter Handler. Such manipulation of the argument en_id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. |
2026-03-29 | |
| CVE-2026-5034 | 6.9 | MEDIUM | CWE-74 | 0.0% p7 | 4.83 | A flaw has been found in code-projects Accounting System 1.0. Affected by this i...A flaw has been found in code-projects Accounting System 1.0. Affected by this issue is some unknown functionality of the file /edit_costumer.php of the component Parameter Handler. This manipulation of the argument cos_id causes sql injection. It is possible to initiate the attack remotely. The exploit has been published and may be used. |
2026-03-29 | |
| CVE-2026-5033 | 6.9 | MEDIUM | CWE-74 | 0.0% p8 | 4.83 | A vulnerability was detected in code-projects Accounting System 1.0. Affected by...A vulnerability was detected in code-projects Accounting System 1.0. Affected by this vulnerability is an unknown functionality of the file /view_costumer.php of the component Parameter Handler. The manipulation of the argument cos_id results in sql injection. The attack may be performed from remote. The exploit is now public and may be used. |
2026-03-29 | |
| CVE-2026-5031 | 5.3 | MEDIUM | CWE-99 | 0.0% p9 | 3.71 | A vulnerability was found in BichitroGan ISP Billing Software 2025.3.20. Impacte...A vulnerability was found in BichitroGan ISP Billing Software 2025.3.20. Impacted is an unknown function of the file /?_route=settings/users-view/ of the component Endpoint. The manipulation of the argument ID results in improper control of resource identifiers. The attack can be launched remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-29 | |
| CVE-2026-5030 | 5.3 | MEDIUM | CWE-74 | 1.6% p81 | 3.76 | A vulnerability has been found in Totolink NR1800X 9.1.0u.6279_B20210910. This i...A vulnerability has been found in Totolink NR1800X 9.1.0u.6279_B20210910. This issue affects the function NTPSyncWithHost of the file /cgi-bin/cstecgi.cgi of the component Telnet Service. The manipulation of the argument host_time leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. |
2026-03-29 | |
| CVE-2026-5024 | 7.4 | HIGH | CWE-119 | 0.0% p9 | 5.18 | A vulnerability was found in D-Link DIR-513 1.10. This issue affects the functio...A vulnerability was found in D-Link DIR-513 1.10. This issue affects the function formSetEmail of the file /goform/formSetEmail. Performing a manipulation of the argument curTime results in stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been made public and could be used. This vulnerability only affects products that are no longer supported by the maintainer. |
2026-03-29 | |
| CVE-2026-5023 | 4.8 | MEDIUM | CWE-77 | 0.5% p66 | 3.38 | A vulnerability has been found in DeDeveloper23 codebase-mcp up to 3ec749d237dd8...A vulnerability has been found in DeDeveloper23 codebase-mcp up to 3ec749d237dd8eabbeef48657cf917275792fde6. This vulnerability affects the function getCodebase/getRemoteCodebase/saveCodebase of the file src/tools/codebase.ts of the component RepoMix Command Handler. Such manipulation leads to os command injection. The attack needs to be performed locally. The exploit has been disclosed to the public and may be used. This product implements a rolling release for ongoing delivery, which means version information for affected or updated releases is unavailable. The project was informed of the problem early through an issue report but has not responded yet. |
2026-03-29 | |
| CVE-2026-5021 | 7.4 | HIGH | CWE-119 | 0.1% p23 | 5.18 | A flaw has been found in Tenda F453 1.0.0.3. This affects the function fromPPTPU...A flaw has been found in Tenda F453 1.0.0.3. This affects the function fromPPTPUserSetting of the file /goform/PPTPUserSetting of the component httpd. This manipulation of the argument delno causes stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been published and may be used. |
2026-03-29 | |
| CVE-2026-2602 | 6.4 | MEDIUM | CWE-79 | 0.0% p9 | 4.48 | The Twentig plugin for WordPress is vulnerable to Stored Cross-Site Scripting vi...The Twentig plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'featuredImageSizeWidth' parameter in versions up to, and including, 1.9.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-03-29 | |
| CVE-2026-5020 | 5.3 | MEDIUM | CWE-74 | 1.6% p81 | 3.76 | A vulnerability was detected in Totolink A3600R 4.1.2cu.5182_B20201102. Affected...A vulnerability was detected in Totolink A3600R 4.1.2cu.5182_B20201102. Affected by this issue is the function setNoticeCfg of the file /cgi-bin/cstecgi.cgi of the component Parameter Handler. The manipulation of the argument NoticeUrl results in command injection. The attack may be launched remotely. The exploit is now public and may be used. |
2026-03-29 | |
| CVE-2026-5019 | 6.9 | MEDIUM | CWE-74 | 0.0% p10 | 4.83 | A security vulnerability has been detected in code-projects Simple Food Order Sy...A security vulnerability has been detected in code-projects Simple Food Order System 1.0. Affected by this vulnerability is an unknown functionality of the file all-orders.php of the component Parameter Handler. The manipulation of the argument Status leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used. |
2026-03-29 | |
| CVE-2026-5018 | 6.9 | MEDIUM | CWE-74 | 0.0% p10 | 4.83 | A weakness has been identified in code-projects Simple Food Order System 1.0. Af...A weakness has been identified in code-projects Simple Food Order System 1.0. Affected is an unknown function of the file register-router.php of the component Parameter Handler. Executing a manipulation of the argument Name can lead to sql injection. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks. |
2026-03-28 | |
| CVE-2026-5017 | 6.9 | MEDIUM | CWE-74 | 0.0% p10 | 4.83 | A security flaw has been discovered in code-projects Simple Food Order System 1....A security flaw has been discovered in code-projects Simple Food Order System 1.0. This impacts an unknown function of the file /all-tickets.php of the component Parameter Handler. Performing a manipulation of the argument Status results in sql injection. The attack can be initiated remotely. The exploit has been released to the public and may be used for attacks. |
2026-03-28 | |
| CVE-2026-5016 | 6.9 | MEDIUM | CWE-918 | 0.1% p16 | 4.83 | A vulnerability was identified in elecV2 elecV2P up to 3.8.3. This affects the f...A vulnerability was identified in elecV2 elecV2P up to 3.8.3. This affects the function eAxios of the file /mock of the component URL Handler. Such manipulation of the argument req leads to server-side request forgery. It is possible to launch the attack remotely. The exploit is publicly available and might be used. The project was informed of the problem early through an issue report but has not responded yet. |
2026-03-28 | |
| CVE-2026-5015 | 5.3 | MEDIUM | CWE-79 | 0.0% p10 | 3.71 | A vulnerability was determined in elecV2 elecV2P up to 3.8.3. The impacted eleme...A vulnerability was determined in elecV2 elecV2P up to 3.8.3. The impacted element is an unknown function of the file /logs of the component Endpoint. This manipulation of the argument filename causes cross site scripting. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized. The project was informed of the problem early through an issue report but has not responded yet. |
2026-03-28 | |
| CVE-2026-5014 | 5.5 | MEDIUM | CWE-22 | 0.1% p17 | 3.85 | A vulnerability was found in elecV2 elecV2P up to 3.8.3. The affected element is...A vulnerability was found in elecV2 elecV2P up to 3.8.3. The affected element is the function path.join of the file /log/ of the component Wildcard Handler. The manipulation results in path traversal. The attack may be performed from remote. The exploit has been made public and could be used. The project was informed of the problem early through an issue report but has not responded yet. |
2026-03-28 | |
| CVE-2026-5013 | 5.5 | MEDIUM | CWE-22 | 0.0% p3 | 3.85 | A vulnerability has been found in elecV2 elecV2P up to 3.8.3. Impacted is the fu...A vulnerability has been found in elecV2 elecV2P up to 3.8.3. Impacted is the function path.join of the file /store/:key. The manipulation of the argument URL leads to path traversal. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used. The project was informed of the problem early through an issue report but has not responded yet. |
2026-03-28 | |
| CVE-2026-5012 | 6.9 | MEDIUM | CWE-77 | 2.2% p84 | 4.90 | A flaw has been found in elecV2 elecV2P up to 3.8.3. This issue affects the func...A flaw has been found in elecV2 elecV2P up to 3.8.3. This issue affects the function pm2run of the file /rpc. Executing a manipulation can lead to os command injection. The attack can be executed remotely. The exploit has been published and may be used. The project was informed of the problem early through an issue report but has not responded yet. |
2026-03-28 | |
| CVE-2026-5011 | 5.3 | MEDIUM | CWE-74 | 0.0% p14 | 3.71 | A vulnerability was detected in elecV2 elecV2P up to 3.8.3. This vulnerability a...A vulnerability was detected in elecV2 elecV2P up to 3.8.3. This vulnerability affects the function runJSFile of the file /webhook of the component JSON Parser. Performing a manipulation of the argument rawcode results in code injection. Remote exploitation of the attack is possible. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet. |
2026-03-28 | |
| CVE-2026-5007 | 4.8 | MEDIUM | CWE-77 | 0.3% p53 | 3.37 | A vulnerability was identified in kazuph mcp-docs-rag up to 0.5.0. Affected is t...A vulnerability was identified in kazuph mcp-docs-rag up to 0.5.0. Affected is the function cloneRepository of the file src/index.ts of the component add_git_repository/add_text_file. The manipulation leads to os command injection. The attack needs to be performed locally. The exploit is publicly available and might be used. The project was informed of the problem early through an issue report but has not responded yet. |
2026-03-28 | |
| CVE-2026-5004 | 7.4 | HIGH | CWE-119 | 0.1% p23 | 5.18 | A vulnerability was determined in Wavlink WL-WN579X3-C 231124. This impacts the ...A vulnerability was determined in Wavlink WL-WN579X3-C 231124. This impacts the function sub_4019FC of the file /cgi-bin/firewall.cgi of the component UPNP Handler. Executing a manipulation of the argument UpnpEnabled can lead to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-28 | |
| CVE-2026-5003 | 5.5 | MEDIUM | CWE-200 | 0.0% p11 | 3.85 | A vulnerability was found in PromtEngineer localGPT up to 4d41c7d1713b16b216d8e0...A vulnerability was found in PromtEngineer localGPT up to 4d41c7d1713b16b216d8e062e51a5dd88b20b054. This affects the function handle_index of the file rag_system/api_server.py of the component Web Interface. Performing a manipulation results in information disclosure. It is possible to initiate the attack remotely. The exploit has been made public and could be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-28 | |
| CVE-2026-5002 | 6.9 | MEDIUM | CWE-74 | 0.1% p17 | 4.83 | A vulnerability has been found in PromtEngineer localGPT up to 4d41c7d1713b16b21...A vulnerability has been found in PromtEngineer localGPT up to 4d41c7d1713b16b216d8e062e51a5dd88b20b054. The impacted element is the function _route_using_overviews of the file backend/server.py of the component LLM Prompt Handler. Such manipulation leads to injection. The attack may be performed from remote. The exploit has been disclosed to the public and may be used. This product utilizes a rolling release system for continuous delivery, and as such, version information for affected or updated releases is not disclosed. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-28 | |
| CVE-2026-5001 | 6.9 | MEDIUM | CWE-284 | 0.1% p15 | 4.83 | A flaw has been found in PromtEngineer localGPT up to 4d41c7d1713b16b216d8e062e5...A flaw has been found in PromtEngineer localGPT up to 4d41c7d1713b16b216d8e062e51a5dd88b20b054. The affected element is the function do_POST of the file backend/server.py. This manipulation causes unrestricted upload. The attack is possible to be carried out remotely. The exploit has been published and may be used. This product adopts a rolling release strategy to maintain continuous delivery. Therefore, version details for affected or updated releases cannot be specified. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-28 | |
| CVE-2026-5000 | 6.9 | MEDIUM | CWE-287 | 0.1% p26 | 4.83 | A vulnerability was detected in PromtEngineer localGPT up to 4d41c7d1713b16b216d...A vulnerability was detected in PromtEngineer localGPT up to 4d41c7d1713b16b216d8e062e51a5dd88b20b054. Impacted is the function LocalGPTHandler of the file backend/server.py of the component API Endpoint. The manipulation of the argument BaseHTTPRequestHandler results in missing authentication. The attack can be executed remotely. This product implements a rolling release for ongoing delivery, which means version information for affected or updated releases is unavailable. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-28 | |
| CVE-2026-4999 | 5.3 | MEDIUM | CWE-22 | 0.1% p15 | 3.71 | A security vulnerability has been detected in z-9527 admin up to 72aaf2dd05cf4ec...A security vulnerability has been detected in z-9527 admin up to 72aaf2dd05cf4ec2e98f390668b41e128eec5ad2. This issue affects the function uploadFile of the file /server/utils/upload.js of the component isImg Check. The manipulation of the argument fileType leads to path traversal. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used. This product follows a rolling release approach for continuous delivery, so version details for affected or updated releases are not provided. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-28 | |
| CVE-2026-4998 | 6.9 | MEDIUM | CWE-74 | 0.1% p28 | 4.83 | A weakness has been identified in Sinaptik AI PandasAI up to 3.0.0. This vulnera...A weakness has been identified in Sinaptik AI PandasAI up to 3.0.0. This vulnerability affects the function CodeExecutor.execute of the file pandasai/core/code_execution/code_executor.py of the component Chat Message Handler. Executing a manipulation can lead to code injection. The attack may be launched remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-28 | |
| CVE-2026-4997 | 5.5 | MEDIUM | CWE-22 | 0.1% p22 | 3.85 | A security flaw has been discovered in Sinaptik AI PandasAI up to 3.0.0. This af...A security flaw has been discovered in Sinaptik AI PandasAI up to 3.0.0. This affects the function is_sql_query_safe of the file pandasai/helpers/sql_sanitizer.py. Performing a manipulation results in path traversal. The attack may be initiated remotely. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-28 | |
| CVE-2026-4996 | 6.9 | MEDIUM | CWE-74 | 0.0% p10 | 4.83 | A vulnerability was identified in Sinaptik AI PandasAI up to 0.1.4. Affected by ...A vulnerability was identified in Sinaptik AI PandasAI up to 0.1.4. Affected by this issue is the function delete_question_and_answers/delete_docs/update_question_answer/update_docs/get_relevant_question_answers_by_id/get_relevant_docs_by_id of the file extensions/ee/vectorstores/lancedb/pandasai_lancedb/lancedb.py of the component pandasai-lancedb Extension. Such manipulation leads to sql injection. The attack can be launched remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-28 | |
| CVE-2026-2595 | 5.4 | MEDIUM | CWE-79 | 0.0% p8 | 3.78 | The Quads Ads Manager for Google AdSense plugin for WordPress is vulnerable to S...The Quads Ads Manager for Google AdSense plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to, and including, 2.0.98.1 due to insufficient input sanitization and output escaping of multiple ad metadata parameters. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-03-28 | |
| CVE-2018-25225 | 8.6 | HIGH | CWE-306 | 0.0% p7 | 6.02 | SIPP 3.3 contains a stack-based buffer overflow vulnerability that allows local ...SIPP 3.3 contains a stack-based buffer overflow vulnerability that allows local unauthenticated attackers to execute arbitrary code by supplying malicious input in the configuration file. Attackers can craft a configuration file with oversized values that overflow a stack buffer, overwriting the return address and executing arbitrary code through return-oriented programming gadgets. |
2026-03-28 | |
| CVE-2018-25224 | 8.6 | HIGH | CWE-306 | 0.0% p7 | 6.02 | PMS 0.42 contains a stack-based buffer overflow vulnerability that allows local ...PMS 0.42 contains a stack-based buffer overflow vulnerability that allows local unauthenticated attackers to execute arbitrary code by supplying malicious values in the configuration file. Attackers can craft configuration files with oversized input that overflows the stack buffer and execute shell commands via return-oriented programming gadgets. |
2026-03-28 | |
| CVE-2018-25223 | 9.3 | CRITICAL | CWE-787 | 0.3% p49 | 6.52 | Crashmail 1.6 contains a stack-based buffer overflow vulnerability that allows r...Crashmail 1.6 contains a stack-based buffer overflow vulnerability that allows remote attackers to execute arbitrary code by sending malicious input to the application. Attackers can craft payloads with ROP chains to achieve code execution in the application context, with failed attempts potentially causing denial of service. |
2026-03-28 | |
| CVE-2018-25222 | 8.6 | HIGH | CWE-787 | 0.0% p5 | 6.02 | SC v7.16 contains a stack-based buffer overflow vulnerability that allows local ...SC v7.16 contains a stack-based buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying oversized input that exceeds buffer boundaries. Attackers can craft malicious input strings exceeding 1052 bytes to overwrite the instruction pointer and execute shellcode in the application context. |
2026-03-28 | |
| CVE-2018-25221 | 9.3 | CRITICAL | CWE-787 | 0.3% p52 | 6.52 | EChat Server 3.1 contains a buffer overflow vulnerability in the chat.ghp endpoi...EChat Server 3.1 contains a buffer overflow vulnerability in the chat.ghp endpoint that allows remote attackers to execute arbitrary code by supplying an oversized username parameter. Attackers can send a GET request to chat.ghp with a malicious username value containing shellcode and ROP gadgets to achieve code execution in the application context. |
2026-03-28 | |
| CVE-2018-25220 | 9.3 | CRITICAL | CWE-787 | 0.1% p24 | 6.51 | Bochs 2.6-5 contains a stack-based buffer overflow vulnerability that allows att...Bochs 2.6-5 contains a stack-based buffer overflow vulnerability that allows attackers to execute arbitrary code by supplying an oversized input string to the application. Attackers can craft a malicious payload with 1200 bytes of padding followed by a return-oriented programming chain to overwrite the instruction pointer and execute shell commands with application privileges. |
2026-03-28 | |
| CVE-2017-20229 | 9.3 | CRITICAL | CWE-787 | 0.1% p21 | 6.51 | MAWK 1.3.3-17 and prior contains a stack-based buffer overflow vulnerability tha...MAWK 1.3.3-17 and prior contains a stack-based buffer overflow vulnerability that allows attackers to execute arbitrary code by exploiting inadequate boundary checks on user-supplied input. Attackers can craft malicious input that overflows the stack buffer and execute a return-oriented programming chain to spawn a shell with application privileges. |
2026-03-28 | |
| CVE-2017-20228 | 8.6 | HIGH | CWE-787 | 0.0% p4 | 6.02 | Flat Assembler 1.71.21 contains a stack-based buffer overflow vulnerability that...Flat Assembler 1.71.21 contains a stack-based buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying oversized input to the application. Attackers can craft malicious assembly input exceeding 5895 bytes to overwrite the instruction pointer and execute return-oriented programming chains for shell command execution. |
2026-03-28 | |
| CVE-2017-20227 | 9.3 | CRITICAL | CWE-787 | 0.1% p22 | 6.51 | JAD Java Decompiler 1.5.8e-1kali1 and prior contains a stack-based buffer overfl...JAD Java Decompiler 1.5.8e-1kali1 and prior contains a stack-based buffer overflow vulnerability that allows attackers to execute arbitrary code by supplying overly long input that exceeds buffer boundaries. Attackers can craft malicious input passed to the jad command to overflow the stack and execute a return-oriented programming chain that spawns a shell. |
2026-03-28 | |
| CVE-2017-20226 | 8.6 | HIGH | CWE-787 | 0.0% p3 | 6.02 | Mapscrn 2.0.3 contains a stack-based buffer overflow vulnerability that allows l...Mapscrn 2.0.3 contains a stack-based buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying an oversized input buffer. Attackers can craft a malicious buffer with junk data, return address, NOP instructions, and shellcode to overflow the stack and achieve code execution or denial of service. |
2026-03-28 | |
| CVE-2017-20225 | 9.3 | CRITICAL | CWE-787 | 0.1% p22 | 6.51 | TiEmu 2.08 and prior contains a stack-based buffer overflow vulnerability that a...TiEmu 2.08 and prior contains a stack-based buffer overflow vulnerability that allows attackers to execute arbitrary code by exploiting inadequate boundary checks on user-supplied input. Attackers can trigger the overflow through command-line arguments passed to the application, leveraging ROP gadgets to bypass protections and execute shellcode in the application context. |
2026-03-28 | |
| CVE-2016-20049 | 9.3 | CRITICAL | CWE-787 | 0.1% p25 | 6.51 | JAD 1.5.8e-1kali1 and prior contains a stack-based buffer overflow vulnerability...JAD 1.5.8e-1kali1 and prior contains a stack-based buffer overflow vulnerability that allows attackers to execute arbitrary code by supplying oversized input that exceeds buffer boundaries. Attackers can craft malicious input strings exceeding 8150 bytes to overflow the stack, overwrite return addresses, and execute shellcode in the application context. |
2026-03-28 | |
| CVE-2016-20048 | 8.6 | HIGH | CWE-22 | 0.0% p6 | 6.02 | iSelect 1.4.0-2+b1 contains a local buffer overflow vulnerability that allows lo...iSelect 1.4.0-2+b1 contains a local buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying an oversized value to the -k/--key parameter. Attackers can craft a malicious argument containing a NOP sled, shellcode, and return address to overflow a 1024-byte stack buffer and gain code execution with user privileges. |
2026-03-28 | |
| CVE-2016-20047 | 8.6 | HIGH | CWE-787 | 0.0% p4 | 6.02 | EKG Gadu 1.9~pre+r2855-3+b1 contains a local buffer overflow vulnerability in th...EKG Gadu 1.9~pre+r2855-3+b1 contains a local buffer overflow vulnerability in the username handling that allows local attackers to execute arbitrary code by supplying an oversized username string. Attackers can trigger the overflow in the strlcpy function by passing a crafted buffer exceeding 258 bytes to overwrite the instruction pointer and execute shellcode with user privileges. |
2026-03-28 | |
| CVE-2016-20046 | 8.6 | HIGH | CWE-787 | 0.0% p4 | 6.02 | zFTP Client 20061220+dfsg3-4.1 contains a buffer overflow vulnerability in the N...zFTP Client 20061220+dfsg3-4.1 contains a buffer overflow vulnerability in the NAME parameter handling of FTP connections that allows local attackers to crash the application or execute arbitrary code. Attackers can supply an oversized NAME value exceeding the 80-byte buffer allocated in strcpy_chk to overwrite the instruction pointer and execute shellcode with user privileges. |
2026-03-28 | |
| CVE-2016-20045 | 8.6 | HIGH | CWE-787 | 0.0% p3 | 6.02 | HNB Organizer 1.9.18-10 contains a local buffer overflow vulnerability that allo...HNB Organizer 1.9.18-10 contains a local buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying an oversized argument to the -rc command-line parameter. Attackers can craft a malicious input string exceeding 108 bytes containing shellcode and a return address to overwrite the stack and achieve code execution. |
2026-03-28 | |
| CVE-2016-20044 | 8.6 | HIGH | CWE-787 | 0.0% p3 | 6.02 | PInfo 0.6.9-5.1 contains a local buffer overflow vulnerability that allows local...PInfo 0.6.9-5.1 contains a local buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying an oversized argument to the -m parameter. Attackers can craft a malicious input string with 564 bytes of padding followed by a return address to overwrite the instruction pointer and execute shellcode with user privileges. |
2026-03-28 | |
| CVE-2016-20043 | 8.6 | HIGH | CWE-787 | 0.0% p3 | 6.02 | NRSS RSS Reader 0.3.9-1 contains a stack buffer overflow vulnerability that allo...NRSS RSS Reader 0.3.9-1 contains a stack buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying an oversized argument to the -F parameter. Attackers can craft a malicious input with 256 bytes of padding followed by a controlled EIP value to overwrite the return address and achieve code execution. |
2026-03-28 | |
| CVE-2016-20042 | 8.6 | HIGH | CWE-787 | 0.0% p4 | 6.02 | TRN 3.6-23 contains a stack buffer overflow vulnerability that allows local atta...TRN 3.6-23 contains a stack buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying an oversized argument to the application. Attackers can craft a malicious command-line argument with 156 bytes of padding followed by a return address to overwrite the instruction pointer and execute shellcode with user privileges. |
2026-03-28 | |
| CVE-2016-20041 | 8.6 | HIGH | CWE-22 | 0.0% p6 | 6.02 | Yasr 0.6.9-5 contains a buffer overflow vulnerability that allows local attacker...Yasr 0.6.9-5 contains a buffer overflow vulnerability that allows local attackers to crash the application or execute arbitrary code by supplying an oversized argument to the -p parameter. Attackers can invoke yasr with a crafted payload containing junk data, shellcode, and a return address to overwrite the stack and trigger code execution. |
2026-03-28 | |
| CVE-2016-20040 | 8.6 | HIGH | CWE-22 | 0.0% p6 | 6.02 | TiEmu 3.03-nogdb+dfsg-3 contains a buffer overflow vulnerability in the ROM para...TiEmu 3.03-nogdb+dfsg-3 contains a buffer overflow vulnerability in the ROM parameter handling that allows local attackers to crash the application or execute arbitrary code. Attackers can supply an oversized ROM parameter to the tiemu command-line interface to overflow the stack buffer and overwrite the instruction pointer with malicious addresses. |
2026-03-28 | |
| CVE-2016-20039 | 8.6 | HIGH | CWE-787 | 0.0% p4 | 6.02 | Multi Emulator Super System 0.154-3.1 contains a buffer overflow vulnerability i...Multi Emulator Super System 0.154-3.1 contains a buffer overflow vulnerability in the gamma parameter handling that allows local attackers to crash the application or execute arbitrary code. Attackers can supply an oversized gamma parameter value to overflow the stack buffer and overwrite the instruction pointer with a controlled address to achieve code execution. |
2026-03-28 | |
| CVE-2016-20038 | 8.6 | HIGH | CWE-787 | 0.0% p4 | 6.02 | yTree 1.94-1.1 contains a stack-based buffer overflow vulnerability that allows ...yTree 1.94-1.1 contains a stack-based buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying an excessively long argument to the application. Attackers can craft a malicious command-line argument containing shellcode and a return address to overwrite the stack and execute code in the application context. |
2026-03-28 | |
| CVE-2016-20037 | 8.6 | HIGH | CWE-787 | 0.0% p3 | 6.02 | xwpe 1.5.30a-2.1 and prior contains a stack-based buffer overflow vulnerability ...xwpe 1.5.30a-2.1 and prior contains a stack-based buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying overly long input strings that exceed buffer boundaries. Attackers can craft malicious command-line arguments with 262 bytes of junk data followed by shellcode to overwrite the instruction pointer and achieve code execution or denial of service. |
2026-03-28 | |
| CVE-2026-4995 | 5.1 | MEDIUM | CWE-79 | 0.0% p8 | 3.57 | A vulnerability was determined in wandb OpenUI up to 1.0. Affected by this vulne...A vulnerability was determined in wandb OpenUI up to 1.0. Affected by this vulnerability is an unknown functionality of the file frontend/public/annotator/index.html of the component Window Message Event Handler. This manipulation causes cross site scripting. The attack can be initiated remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-28 | |
| CVE-2025-9497 | 5.5 | MEDIUM | CWE-798 | 0.0% p1 | 3.85 | Use of Hard-coded Credentials vulnerability in Microchip Time Provider 4100 allo...Use of Hard-coded Credentials vulnerability in Microchip Time Provider 4100 allows Malicious Manual Software Update.This issue affects Time Provider 4100: before 2.5.0. |
2026-03-28 | |
| CVE-2026-4994 | 5.1 | MEDIUM | CWE-200 | 0.0% p6 | 3.57 | A vulnerability was found in wandb OpenUI up to 1.0/3.5-turb. Affected is the fu...A vulnerability was found in wandb OpenUI up to 1.0/3.5-turb. Affected is the function generic_exception_handler of the file backend/openui/server.py of the component APIStatusError Handler. The manipulation of the argument key results in information exposure through error message. Access to the local network is required for this attack. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-28 | |
| CVE-2026-4993 | 1.9 | LOW | CWE-259 | 0.0% p1 | 1.33 | A vulnerability has been found in wandb OpenUI up to 0.0.0.0/1.0. This impacts a...A vulnerability has been found in wandb OpenUI up to 0.0.0.0/1.0. This impacts an unknown function of the file backend/openui/config.py. The manipulation of the argument LITELLM_MASTER_KEY leads to hard-coded credentials. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-28 | |
| CVE-2026-2442 | 5.3 | MEDIUM | CWE-93 | 0.1% p27 | 3.71 | The Page Builder: Pagelayer – Drag and Drop website builder plugin for WordPress...The Page Builder: Pagelayer – Drag and Drop website builder plugin for WordPress is vulnerable to Improper Neutralization of CRLF Sequences ('CRLF Injection') in all versions up to, and including, 2.0.7. This is due to the contact form handler performing placeholder substitution on attacker-controlled form fields and then passing the resulting values into email headers without removing CR/LF characters. This makes it possible for unauthenticated attackers to inject arbitrary email headers (for example Bcc / Cc) and abuse form email delivery via the 'email' parameter granted they can target a contact form configured to use placeholders in mail template headers. |
2026-03-28 | |
| CVE-2026-1307 | 6.5 | MEDIUM | CWE-200 | 0.0% p9 | 4.55 | The Ninja Forms - The Contact Form Builder That Grows With You plugin for WordPr...The Ninja Forms - The Contact Form Builder That Grows With You plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.14.1 via a callback function for the admin_enqueue_scripts action handler in blocks/bootstrap.php. This makes it possible for authenticated attackers, with Contributor-level access and above, to gain access to an authorization token to view form submissions for arbitrary forms, which could potentially contain sensitive information. |
2026-03-28 | |
| CVE-2025-15445 | 5.4 | MEDIUM | CWE-862 | 0.0% p12 | 3.78 | The Restaurant Cafeteria WordPress theme through 0.4.6 exposes insecure admin-aj...The Restaurant Cafeteria WordPress theme through 0.4.6 exposes insecure admin-ajax actions without nonce or capability checks, allowing any logged-in user, like subscriber, to perform privileged operations. An attacker can install and activate a from a user-supplied URL, leading to arbitrary PHP code execution, and also import demo content that rewrites site configuration, including Restaurant Cafeteria WordPress theme through 0.4.6_mods, pages, menus, and front page settings. |
2026-03-28 | |
| CVE-2025-12886 | 7.2 | HIGH | CWE-918 | 0.1% p15 | 5.04 | The Oxygen Theme theme for WordPress is vulnerable to Server-Side Request Forger...The Oxygen Theme theme for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 6.0.8 via the laborator_calc_route AJAX action. This makes it possible for unauthenticated attackers to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services. |
2026-03-28 | |
| CVE-2026-4987 | 7.5 | HIGH | CWE-20 | 0.1% p24 | 5.25 | The SureForms – Contact Form, Payment Form & Other Custom Form Builder plugin fo...The SureForms – Contact Form, Payment Form & Other Custom Form Builder plugin for WordPress is vulnerable to Payment Amount Bypass in all versions up to, and including, 2.5.2. This is due to the create_payment_intent() function performing a payment validation solely based on the value of a user-controlled parameter. This makes it possible for unauthenticated attackers to bypass configured form payment-amount validation and create underpriced payment/subscription intents by setting form_id to 0. |
2026-03-28 | |
| CVE-2026-1679 | 7.3 | HIGH | CWE-120 | 0.0% p13 | 5.11 | The eswifi socket offload driver copies user-provided payloads into a fixed buff...The eswifi socket offload driver copies user-provided payloads into a fixed buffer without checking available space; oversized sends overflow `eswifi->buf`, corrupting kernel memory (CWE-120). Exploit requires local code that can call the socket send API; no remote attacker can reach it directly. |
2026-03-28 | |
| CVE-2026-4992 | 5.3 | MEDIUM | CWE-79 | 0.0% p9 | 3.71 | A flaw has been found in wandb OpenUI up to 1.0. This affects the function creat...A flaw has been found in wandb OpenUI up to 1.0. This affects the function create_share/get_share of the file backend/openui/server.py of the component HTMLAnnotator Component. Executing a manipulation of the argument ID can lead to HTML injection. The attack may be performed from remote. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-27 | |
| CVE-2026-4991 | 5.1 | MEDIUM | CWE-79 | 0.0% p7 | 3.57 | A vulnerability was detected in QDOCS Smart School Management System up to 7.2. ...A vulnerability was detected in QDOCS Smart School Management System up to 7.2. The impacted element is an unknown function of the file /admin/enquiry of the component Admission Enquiry Module. Performing a manipulation of the argument Note results in cross site scripting. The attack is possible to be carried out remotely. |
2026-03-27 | |
| CVE-2026-4248 | 8.0 | HIGH | CWE-285 | 0.0% p10 | 5.60 | The Ultimate Member plugin for WordPress is vulnerable to Sensitive Information ...The Ultimate Member plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.11.2. This is due to the '{usermeta:password_reset_link}' template tag being processed within post content via the '[um_loggedin]' shortcode, which generates a valid password reset token for the currently logged-in user viewing the page. This makes it possible for authenticated attackers, with Contributor-level access and above, to craft a malicious pending post that, when previewed by an Administrator, generates a password reset token for the Administrator and exfiltrates it to an attacker-controlled server, leading to full account takeover. |
2026-03-27 | |
| CVE-2026-33996 | 5.8 | MEDIUM | CWE-476 | 0.0% p2 | 4.06 | LibJWT is a C JSON Web Token Library. Starting in version 3.0.0 and prior to ver...LibJWT is a C JSON Web Token Library. Starting in version 3.0.0 and prior to version 3.3.0, the JWK parsing for RSA-PSS did not protect against a NULL value when expecting to parse JSON string values. A specially crafted JWK file could exploit this behavior by using integers in places where the code expected a string. This was fixed in v3.3.0. A workaround is available. Users importing keys through a JWK file should not do so from untrusted sources. Use the `jwk2key` tool to check for validity of a JWK file. Likewise, if possible, do not use JWK files with RSA-PSS keys. |
2026-03-27 | |
| CVE-2026-33994 | 6.3 | MEDIUM | CWE-1321 | 0.1% p26 | 4.41 | Locutus brings stdlibs of other programming languages to JavaScript for educatio...Locutus brings stdlibs of other programming languages to JavaScript for educational purposes. Starting in version 2.0.39 and prior to version 3.0.25, a prototype pollution vulnerability exists in the `parse_str` function of the npm package locutus. An attacker can pollute `Object.prototype` by overriding `RegExp.prototype.test` and then passing a crafted query string to `parse_str`, bypassing the prototype pollution guard. This vulnerability stems from an incomplete fix for CVE-2026-25521. The CVE-2026-25521 patch replaced the `String.prototype.includes()`-based guard with a `RegExp.prototype.test()`-based guard. However, `RegExp.prototype.test` is itself a writable prototype method that can be overridden, making the new guard bypassable in the same way as the original — trading one hijackable built-in for another. Version 3.0.25 contains an updated fix. |
2026-03-27 | |
| CVE-2026-33993 | 6.9 | MEDIUM | CWE-1321 | 0.1% p25 | 4.83 | Locutus brings stdlibs of other programming languages to JavaScript for educatio...Locutus brings stdlibs of other programming languages to JavaScript for educational purposes. Prior to version 3.0.25, the `unserialize()` function in `locutus/php/var/unserialize` assigns deserialized keys to plain objects via bracket notation without filtering the `__proto__` key. When a PHP serialized payload contains `__proto__` as an array or object key, JavaScript's `__proto__` setter is invoked, replacing the deserialized object's prototype with attacker-controlled content. This enables property injection, for...in propagation of injected properties, and denial of service via built-in method override. This is distinct from the previously reported prototype pollution in `parse_str` (GHSA-f98m-q3hr-p5wq, GHSA-rxrv-835q-v5mh) — `unserialize` is a different function with no mitigation applied. Version 3.0.25 patches the issue. |
2026-03-27 | |
| CVE-2026-33992 | 9.3 | CRITICAL | CWE-918 | 0.1% p19 | 6.51 | pyLoad is a free and open-source download manager written in Python. Prior to ve...pyLoad is a free and open-source download manager written in Python. Prior to version 0.5.0b3.dev97, PyLoad's download engine accepts arbitrary URLs without validation, enabling Server-Side Request Forgery (SSRF) attacks. An authenticated attacker can exploit this to access internal network services and exfiltrate cloud provider metadata. On DigitalOcean droplets, this exposes sensitive infrastructure data including droplet ID, network configuration, region, authentication keys, and SSH keys configured in user-data/cloud-init. Version 0.5.0b3.dev97 contains a patch. |
2026-03-27 | |
| CVE-2026-33991 | 8.8 | HIGH | CWE-89 | 0.1% p18 | 6.16 | WeGIA is a web manager for charitable institutions. Prior to version 3.6.7, the ...WeGIA is a web manager for charitable institutions. Prior to version 3.6.7, the file `html/socio/sistema/deletar_tag.php` uses `extract($_REQUEST)` on line 14 and directly concatenates the `$id_tag` variable into SQL queries on lines 16-17 without prepared statements or sanitization. Version 3.6.7 patches the vulnerability. |
2026-03-27 | |
| CVE-2026-33936 | 5.3 | MEDIUM | CWE-20 | 0.1% p28 | 3.71 | The `ecdsa` PyPI package is a pure Python implementation of ECC (Elliptic Curve ...The `ecdsa` PyPI package is a pure Python implementation of ECC (Elliptic Curve Cryptography) with support for ECDSA (Elliptic Curve Digital Signature Algorithm), EdDSA (Edwards-curve Digital Signature Algorithm) and ECDH (Elliptic Curve Diffie-Hellman). Prior to version 0.19.2, an issue in the low-level DER parsing functions can cause unexpected exceptions to be raised from the public API functions. `ecdsa.der.remove_octet_string()` accepts truncated DER where the encoded length exceeds the available buffer. For example, an OCTET STRING that declares a length of 4096 bytes but provides only 3 bytes is parsed successfully instead of being rejected. Because of that, a crafted DER input can cause `SigningKey.from_der()` to raise an internal exception (`IndexError: index out of bounds on dimension 1`) rather than cleanly rejecting malformed DER (e.g., raising `UnexpectedDER` or `ValueError`). Applications that parse untrusted DER private keys may crash if they do not handle unexpected exceptions, resulting in a denial of service. Version 0.19.2 patches the issue. |
2026-03-27 | |
| CVE-2026-4990 | 6.9 | MEDIUM | CWE-266 | 0.0% p14 | 4.83 | A security vulnerability has been detected in chatwoot up to 4.11.1. The affecte...A security vulnerability has been detected in chatwoot up to 4.11.1. The affected element is an unknown function of the file /app/login of the component Signup Endpoint. Such manipulation of the argument signupEnabled with the input true leads to improper authorization. The attack can be executed remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-27 | |
| CVE-2026-4988 | 6.3 | MEDIUM | CWE-404 | 0.1% p19 | 4.41 | A security flaw has been discovered in Open5GS 2.7.6. This issue affects the fun...A security flaw has been discovered in Open5GS 2.7.6. This issue affects the function smf_gx_cca_cb/smf_gy_cca_cb/smf_s6b of the component CCA Message Handler. The manipulation results in denial of service. The attack may be launched remotely. Attacks of this nature are highly complex. The exploitability is assessed as difficult. The exploit has been released to the public and may be used for attacks. |
2026-03-27 | |
| CVE-2026-4985 | 5.3 | MEDIUM | CWE-189 | 0.0% p13 | 3.71 | A vulnerability was identified in dloebl CGIF up to 0.5.2. This vulnerability af...A vulnerability was identified in dloebl CGIF up to 0.5.2. This vulnerability affects the function cgif_addframe of the file src/cgif.c of the component GIF Image Handler. The manipulation of the argument width/height leads to integer overflow. The attack may be initiated remotely. The identifier of the patch is b0ba830093f4317a5d1f345715d2fa3cd2dab474. It is suggested to install a patch to address this issue. |
2026-03-27 | |
| CVE-2026-34226 | 7.5 | HIGH | CWE-201 | 0.0% p10 | 5.25 | Happy DOM is a JavaScript implementation of a web browser without its graphical ...Happy DOM is a JavaScript implementation of a web browser without its graphical user interface. Versions prior to 20.8.9 may attach cookies from the current page origin (`window.location`) instead of the request target URL when `fetch(..., { credentials: "include" })` is used. This can leak cookies from origin A to destination B. Version 20.8.9 fixes the issue. |
2026-03-27 | |
| CVE-2026-33989 | 8.1 | HIGH | CWE-22 | 0.0% p10 | 5.67 | Mobile Next is an MCP server for mobile development and automation. Prior to ver...Mobile Next is an MCP server for mobile development and automation. Prior to version 0.0.49, the `@mobilenext/mobile-mcp` server contains a Path Traversal vulnerability in the `mobile_save_screenshot` and `mobile_start_screen_recording` tools. The `saveTo` and `output` parameters were passed directly to filesystem operations without validation, allowing an attacker to write files outside the intended workspace. Version 0.0.49 fixes the issue. |
2026-03-27 | |
| CVE-2026-33981 | 8.3 | HIGH | CWE-200 | 0.0% p2 | 5.81 | changedetection.io is a free open source web page change detection tool. Prior t...changedetection.io is a free open source web page change detection tool. Prior to 0.54.7, the `jq:` and `jqraw:` include filter expressions allow use of the jq `env` builtin, which reads all process environment variables and stores them as the watch snapshot. An authenticated user (or unauthenticated user when no password is set, the default) can leak sensitive environment variables including `SALTED_PASS`, `PLAYWRIGHT_DRIVER_URL`, `HTTP_PROXY`, and any secrets passed as env vars to the container. Version 0.54.7 patches the issue. |
2026-03-27 | |
| CVE-2026-33980 | 8.3 | HIGH | CWE-943 | 0.1% p16 | 5.81 | Azure Data Explorer MCP Server is a Model Context Protocol (MCP) server that ena...Azure Data Explorer MCP Server is a Model Context Protocol (MCP) server that enables AI assistants to execute KQL queries and explore Azure Data Explorer (ADX/Kusto) databases through standardized interfaces. Versions up to and including 0.1.1 contain KQL (Kusto Query Language) injection vulnerabilities in three MCP tool handlers: `get_table_schema`, `sample_table_data`, and `get_table_details`. The `table_name` parameter is interpolated directly into KQL queries via f-strings without any validation or sanitization, allowing an attacker (or a prompt-injected AI agent) to execute arbitrary KQL queries against the Azure Data Explorer cluster. Commit 0abe0ee55279e111281076393e5e966335fffd30 patches the issue. |
2026-03-27 | |
| CVE-2026-33979 | 8.2 | HIGH | CWE-79 | 0.0% p1 | 5.74 | Express XSS Sanitizer is Express 4.x and 5.x middleware which sanitizes user inp...Express XSS Sanitizer is Express 4.x and 5.x middleware which sanitizes user input data (in req.body, req.query, req.headers and req.params) to prevent Cross Site Scripting (XSS) attack. A vulnerability has been identified in versions prior to 2.0.2 where restrictive sanitization configurations are silently ignored. In version 2.0.2, the validation logic has been updated to respect explicitly provided empty configurations. Now, if allowedTags or allowedAttributes are provided (even if empty), they are passed directly to sanitize-html without being overridden. |
2026-03-27 | |
| CVE-2026-33976 | 9.6 | CRITICAL | CWE-79 | 0.1% p34 | 6.72 | Notesnook is a note-taking app. Prior to version 3.3.11 on Web/Desktop and 3.3.1...Notesnook is a note-taking app. Prior to version 3.3.11 on Web/Desktop and 3.3.17 on Android/iOS, a stored XSS in the Web Clipper rendering flow can be escalated to remote code execution in the desktop app. The root cause is that the clipper preserves attacker-controlled attributes from the source page’s root element and stores them inside web-clip HTML. When the clip is later opened, Notesnook renders that HTML into a same-origin, unsandboxed iframe using `contentDocument.write(...)`. Event-handler attributes such as `onload`, `onclick`, or `onmouseover` execute in the Notesnook origin. In the desktop app, this becomes RCE because Electron is configured with `nodeIntegration: true` and `contextIsolation: false`. Version 3.3.11 Web/Desktop and 3.3.17 on Android/iOS patch the issue. |
2026-03-27 | |
| CVE-2026-33955 | 8.6 | HIGH | CWE-79 | 0.1% p15 | 6.02 | Notesnook is a note-taking app. Prior to version 3.3.11 on Web/Desktop, a cross-...Notesnook is a note-taking app. Prior to version 3.3.11 on Web/Desktop, a cross-site scripting vulnerability stored in the note history comparison viewer can escalate to remote code execution in a desktop application. The issue is triggered when an attacker-controlled note header is displayed using `dangerouslySetInnerHTML` without secure handling. When combined with the full backup and restore feature in the desktop application, this becomes remote code execution because Electron is configured with `nodeIntegration: true` and `contextIsolation: false`. Version 3.3.11 patches the issue. |
2026-03-27 | |
| CVE-2026-33954 | 6.5 | MEDIUM | CWE-285 | 0.0% p9 | 4.55 | LinkAce is a self-hosted archive to collect website links. In versions prior to ...LinkAce is a self-hosted archive to collect website links. In versions prior to 2.5.3, a private note attached to a non-private link can be disclosed to a different authenticated user via the web interface. The API appears to correctly enforce note visibility, but the web link detail page renders notes without applying equivalent visibility filtering. As a result, an authenticated user who is allowed to view another user's `internal` or `public` link can read that user's `private` notes attached to the link. Version 2.5.3 patches the issue. |
2026-03-27 | |
| CVE-2026-33953 | 8.5 | HIGH | CWE-918 | 0.0% p9 | 5.95 | LinkAce is a self-hosted archive to collect website links. Versions prior to 2.5...LinkAce is a self-hosted archive to collect website links. Versions prior to 2.5.3 block direct requests to private IP literals, but still performs server-side requests to internal-only resources when those resources are referenced through an internal hostname. This allows an authenticated user to trigger server-side requests to internal services reachable by the LinkAce server but not directly reachable by an external user. Version 2.5.3 patches the issue. |
2026-03-27 | |
| CVE-2026-33946 | 8.2 | HIGH | CWE-384 | 0.0% p12 | 5.74 | MCP Ruby SDK is the official Ruby SDK for Model Context Protocol servers and cli...MCP Ruby SDK is the official Ruby SDK for Model Context Protocol servers and clients. Prior to version 0.9.2, the Ruby SDK's streamable_http_transport.rb implementation contains a session hijacking vulnerability. An attacker who obtains a valid session ID can completely hijack the victim's Server-Sent Events (SSE) stream and intercept all real-time data. Version 0.9.2 contains a patch. |
2026-03-27 | |
| CVE-2026-33943 | 8.8 | HIGH | CWE-94 | 0.1% p18 | 6.16 | Happy DOM is a JavaScript implementation of a web browser without its graphical ...Happy DOM is a JavaScript implementation of a web browser without its graphical user interface. In versions 15.10.0 through 20.8.7, a code injection vulnerability in `ECMAScriptModuleCompiler` allows an attacker to achieve Remote Code Execution (RCE) by injecting arbitrary JavaScript expressions inside `export { }` declarations in ES module scripts processed by happy-dom. The compiler directly interpolates unsanitized content into generated code as an executable expression, and the quote filter does not strip backticks, allowing template literal-based payloads to bypass sanitization. Version 20.8.8 fixes the issue. |
2026-03-27 | |
| CVE-2026-33941 | 8.2 | HIGH | CWE-79 | 0.0% p4 | 5.74 | Handlebars provides the power necessary to let users build semantic templates. I...Handlebars provides the power necessary to let users build semantic templates. In versions 4.0.0 through 4.7.8, the Handlebars CLI precompiler (`bin/handlebars` / `lib/precompiler.js`) concatenates user-controlled strings — template file names and several CLI options — directly into the JavaScript it emits, without any escaping or sanitization. An attacker who can influence template filenames or CLI arguments can inject arbitrary JavaScript that executes when the generated bundle is loaded in Node.js or a browser. Version 4.7.9 fixes the issue. Some workarounds are available. First, validate all CLI inputs before invoking the precompiler. Reject filenames and option values that contain characters with JavaScript string-escaping significance (`"`, `'`, `;`, etc.). Second, use a fixed, trusted namespace string passed via a configuration file rather than command-line arguments in automated pipelines. Third, run the precompiler in a sandboxed environment (container with no write access to sensitive paths) to limit the impact of successful exploitation. Fourth, audit template filenames in any repository or package that is consumed by an automated build pipeline. |
2026-03-27 | |
| CVE-2026-33940 | 8.1 | HIGH | CWE-94 | 0.1% p18 | 5.67 | Handlebars provides the power necessary to let users build semantic templates. I...Handlebars provides the power necessary to let users build semantic templates. In versions 4.0.0 through 4.7.8, a crafted object placed in the template context can bypass all conditional guards in `resolvePartial()` and cause `invokePartial()` to return `undefined`. The Handlebars runtime then treats the unresolved partial as a source that needs to be compiled, passing the crafted object to `env.compile()`. Because the object is a valid Handlebars AST containing injected code, the generated JavaScript executes arbitrary commands on the server. The attack requires the adversary to control a value that can be returned by a dynamic partial lookup. Version 4.7.9 fixes the issue. Some workarounds are available. First, use the runtime-only build (`require('handlebars/runtime')`). Without `compile()`, the fallback compilation path in `invokePartial` is unreachable. Second, sanitize context data before rendering: Ensure no value in the context is a non-primitive object that could be passed to a dynamic partial. Third, avoid dynamic partial lookups (`{{> (lookup ...)}}`) when context data is user-controlled. |
2026-03-27 | |
| CVE-2026-33939 | 7.5 | HIGH | CWE-754 | 0.0% p15 | 5.25 | Handlebars provides the power necessary to let users build semantic templates. I...Handlebars provides the power necessary to let users build semantic templates. In versions 4.0.0 through 4.7.8, when a Handlebars template contains decorator syntax referencing an unregistered decorator (e.g. `{{*n}}`), the compiled template calls `lookupProperty(decorators, "n")`, which returns `undefined`. The runtime then immediately invokes the result as a function, causing an unhandled `TypeError: ... is not a function` that crashes the Node.js process. Any application that compiles user-supplied templates without wrapping the call in a `try/catch` is vulnerable to a single-request Denial of Service. Version 4.7.9 fixes the issue. Some workarounds are available. Wrap compilation and rendering in `try/catch`. Validate template input before passing it to `compile()`; reject templates containing decorator syntax (`{{*...}}`) if decorators are not used in your application. Use the pre-compilation workflow; compile templates at build time and serve only pre-compiled templates; do not call `compile()` at request time. |
2026-03-27 | |
| CVE-2026-27309 | 7.8 | HIGH | CWE-416 | 0.0% p10 | 5.46 | Substance3D - Stager versions 3.1.7 and earlier are affected by a Use After Free...Substance3D - Stager versions 3.1.7 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
2026-03-27 | |
| CVE-2019-25652 | 7.7 | HIGH | CWE-295 | 0.0% p1 | 5.39 | UniFi Network Controller before version 5.10.22 and 5.11.x before 5.11.18 contai...UniFi Network Controller before version 5.10.22 and 5.11.x before 5.11.18 contains an improper certificate verification vulnerability that allows adjacent network attackers to conduct man-in-the-middle attacks by presenting a false SSL certificate during SMTP connections. Attackers can intercept SMTP traffic and obtain credentials by exploiting the insecure SSL host verification mechanism in the SMTP certificate validation process. |
2026-03-27 | |
| CVE-2019-25651 | 8.7 | HIGH | CWE-327 | 0.0% p0 | 6.09 | Ubiquiti UniFi Network Controller prior to 5.10.12 (excluding 5.6.42), UAP FW pr...Ubiquiti UniFi Network Controller prior to 5.10.12 (excluding 5.6.42), UAP FW prior to 4.0.6, UAP-AC, UAP-AC v2, and UAP-AC Outdoor FW prior to 3.8.17, USW FW prior to 4.0.6, USG FW prior to 4.4.34 uses AES-CBC encryption for device-to-controller communication, which contains cryptographic weaknesses that allow attackers to recover encryption keys from captured traffic. Attackers with adjacent network access can capture sufficient encrypted traffic and exploit AES-CBC mode vulnerabilities to derive the encryption keys, enabling unauthorized control and management of network devices. |
2026-03-27 | |
| CVE-2026-4976 | 7.4 | HIGH | CWE-119 | 0.1% p34 | 5.18 | A vulnerability was found in Totolink LR350 9.3.5u.6369_B20220309. This vulnerab...A vulnerability was found in Totolink LR350 9.3.5u.6369_B20220309. This vulnerability affects the function setWiFiGuestCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument ssid results in buffer overflow. The attack can be launched remotely. The exploit has been made public and could be used. |
2026-03-27 | |
| CVE-2026-34046 | 8.7 | HIGH | CWE-639 | 0.1% p24 | 6.09 | Langflow is a tool for building and deploying AI-powered agents and workflows. P...Langflow is a tool for building and deploying AI-powered agents and workflows. Prior to version 1.5.1, the `_read_flow` helper in `src/backend/base/langflow/api/v1/flows.py` branched on the `AUTO_LOGIN` setting to decide whether to filter by `user_id`. When `AUTO_LOGIN` was `False` (i.e., authentication was enabled), neither branch enforced an ownership check — the query returned any flow matching the given UUID regardless of who owned it. This allowed any authenticated user to read any other user's flow, including embedded plaintext API keys; modify the logic of another user's AI agents, and/or delete flows belonging to other users. The vulnerability was introduced by the conditional logic that was meant to accommodate public/example flows (those with `user_id = NULL`) under auto-login mode, but inadvertently left the authenticated path without an ownership filter. The fix in version 1.5.1 removes the `AUTO_LOGIN` conditional entirely and unconditionally scopes the query to the requesting user. |
2026-03-27 | |
| CVE-2026-33938 | 8.1 | HIGH | CWE-94 | 0.1% p24 | 5.67 | Handlebars provides the power necessary to let users build semantic templates. I...Handlebars provides the power necessary to let users build semantic templates. In versions 4.0.0 through 4.7.8, the `@partial-block` special variable is stored in the template data context and is reachable and mutable from within a template via helpers that accept arbitrary objects. When a helper overwrites `@partial-block` with a crafted Handlebars AST, a subsequent invocation of `{{> @partial-block}}` compiles and executes that AST, enabling arbitrary JavaScript execution on the server. Version 4.7.9 fixes the issue. Some workarounds are available. First, use the runtime-only build (`require('handlebars/runtime')`). The `compile()` method is absent, eliminating the vulnerable fallback path. Second, audit registered helpers for any that write arbitrary values to context objects. Helpers should treat context data as read-only. Third, avoid registering helpers from third-party packages (such as `handlebars-helpers`) in contexts where templates or context data can be influenced by untrusted input. |
2026-03-27 | |
| CVE-2026-33937 | 9.8 | CRITICAL | CWE-94 | 0.4% p62 | 6.87 | Handlebars provides the power necessary to let users build semantic templates. I...Handlebars provides the power necessary to let users build semantic templates. In versions 4.0.0 through 4.7.8, `Handlebars.compile()` accepts a pre-parsed AST object in addition to a template string. The `value` field of a `NumberLiteral` AST node is emitted directly into the generated JavaScript without quoting or sanitization. An attacker who can supply a crafted AST to `compile()` can therefore inject and execute arbitrary JavaScript, leading to Remote Code Execution on the server. Version 4.7.9 fixes the issue. Some workarounds are available. Validate input type before calling `Handlebars.compile()`; ensure the argument is always a `string`, never a plain object or JSON-deserialized value. Use the Handlebars runtime-only build (`handlebars/runtime`) on the server if templates are pre-compiled at build time; `compile()` will be unavailable. |
2026-03-27 | |
| CVE-2026-33916 | 4.7 | MEDIUM | CWE-79 | 0.0% p12 | 3.29 | Handlebars provides the power necessary to let users build semantic templates. I...Handlebars provides the power necessary to let users build semantic templates. In versions 4.0.0 through 4.7.8, `resolvePartial()` in the Handlebars runtime resolves partial names via a plain property lookup on `options.partials` without guarding against prototype-chain traversal. When `Object.prototype` has been polluted with a string value whose key matches a partial reference in a template, the polluted string is used as the partial body and rendered without HTML escaping, resulting in reflected or stored XSS. Version 4.7.9 fixes the issue. Some workarounds are available. Apply `Object.freeze(Object.prototype)` early in application startup to prevent prototype pollution. Note: this may break other libraries, and/or use the Handlebars runtime-only build (`handlebars/runtime`), which does not compile templates and reduces the attack surface. |
2026-03-27 | |
| CVE-2026-33907 | 6.5 | MEDIUM | CWE-476 | 0.0% p9 | 4.55 | Ella Core is a 5G core designed for private networks. Versions prior to 1.7.0 pa...Ella Core is a 5G core designed for private networks. Versions prior to 1.7.0 panic when processing Authentication Response and Authentication Failure NAS message missing IEs. An attacker able to send crafted NAS messages to Ella Core can crash the process, causing service disruption for all connected subscribers. No authentication is required. Version 1.7.0 added IE presence verification to NAS message handling. |
2026-03-27 | |
| CVE-2026-33906 | 7.2 | HIGH | CWE-269 | 0.0% p10 | 5.04 | Ella Core is a 5G core designed for private networks. Prior to version 1.7.0, th...Ella Core is a 5G core designed for private networks. Prior to version 1.7.0, the NetworkManager role was granted backup and restore permission. The restore endpoint accepted any valid SQLite file without verifying its contents. A NetworkManager could replace the production database with a tampered copy to escalate to Admin, gaining access to user management, audit logs, debug endpoints, and operator identity configuration that the role was explicitly denied. In version 1.7.0, backup and restore permissions have been removed from the NetworkManager role. |
2026-03-27 | |
| CVE-2026-33904 | 6.5 | MEDIUM | CWE-833 | 0.0% p3 | 4.55 | Ella Core is a 5G core designed for private networks. Prior to version 1.7.0, a ...Ella Core is a 5G core designed for private networks. Prior to version 1.7.0, a deadlock in the AMF's SCTP notification handler causes the entire AMF control plane to hang until the process is restarted. An attacker with access to the N2 interface can cause Ella Core to hang, resulting in a denial of service for all subscribers. Version 1.7.0 adds deferred Radio cleanup in serveConn SCTP server so that every connection exit path removes the radio. Remove the stale-entry scan from SCTP Notification handling. |
2026-03-27 | |
| CVE-2026-33903 | 6.5 | MEDIUM | CWE-476 | 0.0% p5 | 4.55 | Ella Core is a 5G core designed for private networks. Versions prior to 1.7.0 pa...Ella Core is a 5G core designed for private networks. Versions prior to 1.7.0 panic when processing a specially crafted NGAP LocationReport message. An attacker able to send crafted NGAP messages to Ella Core can crash the process, causing service disruption for all connected subscribers. Version 1.7.0 adds guards in NGAP Location Report handler. |
2026-03-27 | |
| CVE-2026-33896 | 7.4 | HIGH | CWE-295 | 0.0% p5 | 5.18 | Forge (also called `node-forge`) is a native implementation of Transport Layer S...Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. Prior to version 1.4.0, `pki.verifyCertificateChain()` does not enforce RFC 5280 basicConstraints requirements when an intermediate certificate lacks both the `basicConstraints` and `keyUsage` extensions. This allows any leaf certificate (without these extensions) to act as a CA and sign other certificates, which node-forge will accept as valid. Version 1.4.0 patches the issue. |
2026-03-27 | |
| CVE-2026-33895 | 7.5 | HIGH | CWE-347 | 0.0% p7 | 5.25 | Forge (also called `node-forge`) is a native implementation of Transport Layer S...Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. Prior to version 1.4.0, Ed25519 signature verification accepts forged non-canonical signatures where the scalar S is not reduced modulo the group order (`S >= L`). A valid signature and its `S + L` variant both verify in forge, while Node.js `crypto.verify` (OpenSSL-backed) rejects the `S + L` variant, as defined by the specification. This class of signature malleability has been exploited in practice to bypass authentication and authorization logic (see CVE-2026-25793, CVE-2022-35961). Applications relying on signature uniqueness (i.e., dedup by signature bytes, replay tracking, signed-object canonicalization checks) may be bypassed. Version 1.4.0 patches the issue. |
2026-03-27 | |
| CVE-2026-33894 | 7.5 | HIGH | CWE-20 | 0.0% p5 | 5.25 | Forge (also called `node-forge`) is a native implementation of Transport Layer S...Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. Prior to version 1.4.0, RSASSA PKCS#1 v1.5 signature verification accepts forged signatures for low public exponent keys (e=3). Attackers can forge signatures by stuffing “garbage” bytes within the ASN structure in order to construct a signature that passes verification, enabling Bleichenbacher style forgery. This issue is similar to CVE-2022-24771, but adds bytes in an addition field within the ASN structure, rather than outside of it. Additionally, forge does not validate that signatures include a minimum of 8 bytes of padding as defined by the specification, providing attackers additional space to construct Bleichenbacher forgeries. Version 1.4.0 patches the issue. |
2026-03-27 | |
| CVE-2026-33891 | 7.5 | HIGH | CWE-835 | 0.1% p16 | 5.25 | Forge (also called `node-forge`) is a native implementation of Transport Layer S...Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. Prior to version 1.4.0, a Denial of Service (DoS) vulnerability exists in the node-forge library due to an infinite loop in the BigInteger.modInverse() function (inherited from the bundled jsbn library). When modInverse() is called with a zero value as input, the internal Extended Euclidean Algorithm enters an unreachable exit condition, causing the process to hang indefinitely and consume 100% CPU. Version 1.4.0 patches the issue. |
2026-03-27 | |
| CVE-2026-33887 | 5.4 | MEDIUM | CWE-862 | 0.0% p6 | 3.78 | Statamic is a Laravel and Git powered content management system (CMS). Prior to ...Statamic is a Laravel and Git powered content management system (CMS). Prior to versions 5.73.16 and 6.7.2, authenticated Control Panel users could view entry revisions for any collection with revisions enabled, regardless of whether they had the required collection permissions. This bypasses the authorization checks that the main entry controllers enforce, exposing entry field values and blueprint data. Users could also create entry revisions without edit permission, though this only snapshots the existing content state and does not affect published content. This has been fixed in 5.73.16 and 6.7.2. |
2026-03-27 | |
| CVE-2026-33886 | 6.5 | MEDIUM | CWE-200 | 0.0% p10 | 4.55 | Statamic is a Laravel and Git powered content management system (CMS). Starting ...Statamic is a Laravel and Git powered content management system (CMS). Starting in version 5.7.12 and prior to versions 5.73.16 and 6.7.2, a control panel user with access to Antlers-enabled fields could access sensitive application configuration values by inserting config variables into their content. This has been fixed in 5.73.16 and 6.7.2. |
2026-03-27 | |
| CVE-2026-33885 | 6.1 | MEDIUM | CWE-601 | 0.0% p12 | 4.27 | Statamic is a Laravel and Git powered content management system (CMS). Prior to ...Statamic is a Laravel and Git powered content management system (CMS). Prior to versions 5.73.16 and 6.7.2, the external URL detection used for redirect validation on unauthenticated endpoints could be bypassed, allowing users to be redirected to external URLs after actions like form submissions and authentication flows. This has been fixed in 5.73.16 and 6.7.2. |
2026-03-27 | |
| CVE-2026-33884 | 4.3 | MEDIUM | CWE-863 | 0.0% p8 | 3.01 | Statamic is a Laravel and Git powered content management system (CMS). Prior to ...Statamic is a Laravel and Git powered content management system (CMS). Prior to versions 5.73.16 and 6.7.2, an authenticated Control Panel user with access to live preview could use a live preview token to access restricted content that the token was not intended for. This has been fixed in 5.73.16 and 6.7.2. |
2026-03-27 | |
| CVE-2026-33883 | 6.1 | MEDIUM | CWE-79 | 0.0% p9 | 4.27 | Statamic is a Laravel and Git powered content management system (CMS). Prior to ...Statamic is a Laravel and Git powered content management system (CMS). Prior to versions 5.73.16 and 6.7.2, the `user:reset_password_form` tag could render user-input directly into HTML without escaping, allowing an attacker to craft a URL that executes arbitrary JavaScript in the victim's browser. This has been fixed in 5.73.16 and 6.7.2. |
2026-03-27 | |
| CVE-2026-33882 | 6.5 | MEDIUM | CWE-20 | 0.1% p18 | 4.55 | Statamic is a Laravel and Git powered content management system (CMS). Prior to ...Statamic is a Laravel and Git powered content management system (CMS). Prior to versions 5.73.16 and 6.7.2, the markdown preview endpoint could be manipulated to return augmented data from arbitrary fieldtypes. With the users fieldtype specifically, an authenticated control panel user could retrieve sensitive user data including email addresses, encrypted passkey data, and encrypted two-factor authentication codes. This has been fixed in 5.73.16 and 6.7.2. |
2026-03-27 | |
| CVE-2026-33881 | 7.3 | HIGH | CWE-94 | 0.1% p18 | 5.11 | Windmill is an open-source developer platform for internal code: APIs, backgroun...Windmill is an open-source developer platform for internal code: APIs, background jobs, workflows and UIs. Workspace environment variable values are interpolated into JavaScript string literals without escaping single quotes in the NativeTS executor. A workspace admin who sets a custom environment variable with a value containing `'` can inject arbitrary JavaScript that executes inside every NativeTS script in that workspace. This is a code injection bug in `worker.rs`, not related to the sandbox/NSJAIL topic. Version 1.664.0 patches the issue. |
2026-03-27 | |
| CVE-2026-33879 | 2.7 | LOW | CWE-307 | 0.1% p18 | 1.89 | Federated Learning and Interoperability Platform (FLIP) is an open-source platfo...Federated Learning and Interoperability Platform (FLIP) is an open-source platform for federated training and evaluation of medical imaging AI models across healthcare institutions. The FLIP login page in versions 0.1.1 and prior has no rate limiting or CAPTCHA, enabling brute-force and credential-stuffing attacks. FLIP users are external to the organization, increasing credential reuse risk. As of time of publication, it is unclear if a patch is available. |
2026-03-27 | |
| CVE-2026-33875 | 9.3 | CRITICAL | CWE-940 | 0.1% p21 | 6.51 | Gematik Authenticator securely authenticates users for login to digital health a...Gematik Authenticator securely authenticates users for login to digital health applications. Versions prior to 4.16.0 are vulnerable to authentication flow hijacking, potentially allowing attackers to authenticate with the identities of victim users who click on a malicious deep link. Update Gematik Authenticator to version 4.16.0 or greater to receive a patch. There are no known workarounds. |
2026-03-27 | |
| CVE-2026-33874 | 7.8 | HIGH | CWE-78 | 0.1% p22 | 5.46 | Gematik Authenticator securely authenticates users for login to digital health a...Gematik Authenticator securely authenticates users for login to digital health applications. Starting in version 4.12.0 and prior to version 4.16.0, the Mac OS version of the Authenticator is vulnerable to remote code execution, triggered when victims open a malicious file. Update the gematik Authenticator to version 4.16.0 or greater to receive a patch. There are no known workarounds. |
2026-03-27 | |
| CVE-2026-33873 | 9.3 | CRITICAL | CWE-94 | 0.1% p29 | 6.51 | Langflow is a tool for building and deploying AI-powered agents and workflows. P...Langflow is a tool for building and deploying AI-powered agents and workflows. Prior to version 1.9.0, the Agentic Assistant feature in Langflow executes LLM-generated Python code during its validation phase. Although this phase appears intended to validate generated component code, the implementation reaches dynamic execution sinks and instantiates the generated class server-side. In deployments where an attacker can access the Agentic Assistant feature and influence the model output, this can result in arbitrary server-side Python execution. Version 1.9.0 fixes the issue. |
2026-03-27 | |
| CVE-2026-32187 | 0.0 | NONE | N/A | 0.0% p12 | 0.00 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering...Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. |
2026-03-27 | |
| CVE-2026-4975 | 7.4 | HIGH | CWE-119 | 0.1% p23 | 5.18 | A vulnerability has been found in Tenda AC15 15.03.05.19. This affects the funct...A vulnerability has been found in Tenda AC15 15.03.05.19. This affects the function formSetCfm of the file /goform/setcfm of the component POST Request Handler. The manipulation of the argument funcpara1 leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. |
2026-03-27 | |
| CVE-2026-4974 | 7.4 | HIGH | CWE-119 | 0.1% p23 | 5.18 | A flaw has been found in Tenda AC7 15.03.06.44. Affected by this issue is the fu...A flaw has been found in Tenda AC7 15.03.06.44. Affected by this issue is the function fromSetSysTime of the file /goform/SetSysTimeCfg of the component POST Request Handler. Executing a manipulation of the argument Time can lead to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been published and may be used. |
2026-03-27 | |
| CVE-2026-4973 | 5.1 | MEDIUM | CWE-79 | 0.0% p8 | 3.57 | A vulnerability was detected in SourceCodester Online Quiz System up to 1.0. Aff...A vulnerability was detected in SourceCodester Online Quiz System up to 1.0. Affected by this vulnerability is an unknown functionality of the file endpoint/add-question.php. Performing a manipulation of the argument quiz_question results in cross site scripting. It is possible to initiate the attack remotely. The exploit is now public and may be used. |
2026-03-27 | |
| CVE-2026-4972 | 4.8 | MEDIUM | CWE-79 | 0.0% p9 | 3.36 | A security vulnerability has been detected in code-projects Online Reviewer Syst...A security vulnerability has been detected in code-projects Online Reviewer System up to 1.0. Affected is an unknown function of the file /system/system/students/assessments/databank/btn_functions.php. Such manipulation of the argument Description leads to cross site scripting. The attack may be performed from remote. The exploit has been disclosed publicly and may be used. |
2026-03-27 | |
| CVE-2026-4971 | 5.3 | MEDIUM | CWE-352 | 0.0% p3 | 3.71 | A weakness has been identified in SourceCodester Note Taking App up to 1.0. This...A weakness has been identified in SourceCodester Note Taking App up to 1.0. This impacts an unknown function. This manipulation causes cross-site request forgery. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be used for attacks. |
2026-03-27 | |
| CVE-2026-34475 | 5.4 | MEDIUM | CWE-180 | 0.0% p13 | 3.78 | Varnish Cache before 8.0.1 and Varnish Enterprise before 6.0.16r12, in certain u...Varnish Cache before 8.0.1 and Varnish Enterprise before 6.0.16r12, in certain unchecked req.url scenarios, mishandle URLs with a path of / for HTTP/1.1, potentially leading to cache poisoning or authentication bypass. |
2026-03-27 | |
| CVE-2026-34391 | 6.6 | MEDIUM | CWE-488 | 0.0% p6 | 4.62 | Fleet is open source device management software. Prior to 4.81.1, a vulnerabilit...Fleet is open source device management software. Prior to 4.81.1, a vulnerability in Fleet's Windows MDM command processing allows a malicious enrolled device to access MDM commands intended for other devices, potentially exposing sensitive configuration data such as WiFi credentials, VPN secrets, and certificate payloads across the entire Windows fleet. Version 4.81.1 patches the issue. |
2026-03-27 | |
| CVE-2026-34389 | 4.9 | MEDIUM | CWE-287 | 0.0% p8 | 3.43 | Fleet is open source device management software. Prior to 4.81.0, Fleet containe...Fleet is open source device management software. Prior to 4.81.0, Fleet contained an issue in the user invitation flow where the email address provided during invite acceptance was not validated against the email address associated with the invite. An attacker who obtained a valid invite token could create an account under an arbitrary email address while inheriting the role granted by the invite, including global admin. Version 4.81.0 patches the issue. |
2026-03-27 | |
| CVE-2026-34388 | 6.6 | MEDIUM | CWE-703 | 0.1% p17 | 4.62 | Fleet is open source device management software. Prior to 4.81.0, a denial-of-se...Fleet is open source device management software. Prior to 4.81.0, a denial-of-service vulnerability in Fleet's gRPC Launcher endpoint allows an authenticated host to crash the entire Fleet server process by sending an unexpected log type value. The server terminates immediately, disrupting all connected hosts, MDM enrollments, and API consumers. Version 4.81.0 patches the issue. |
2026-03-27 | |
| CVE-2026-34205 | 9.6 | CRITICAL | CWE-923 | 0.0% p6 | 6.72 | Home Assistant is open source home automation software that puts local control a...Home Assistant is open source home automation software that puts local control and privacy first. Home Assistant apps (formerly add-ons) configured with host network mode expose unauthenticated endpoints bound to the internal Docker bridge interface to the local network. On Linux, this configuration does not restrict access to the app as intended, allowing any device on the same network to reach these endpoints without authentication. Home Assistant Supervisor 2026.03.02 addresses the issue. |
2026-03-27 | |
| CVE-2026-33872 | 7.1 | HIGH | CWE-362 | 0.1% p28 | 4.97 | elixir-nodejs provides an Elixir API for calling Node.js functions. A vulnerabil...elixir-nodejs provides an Elixir API for calling Node.js functions. A vulnerability in versions prior to 3.1.4 results in Cross-User Data Leakage or Information Disclosure due to a race condition in the worker protocol. The lack of request-response correlation creates a "stale response" vulnerability. Because the worker does not verify which request a response belongs to, it may return the next available data in the buffer to an unrelated caller. In high-throughput environments where the library processes sensitive user data (e.g., PII, authentication tokens, or private records), a timeout or high concurrent load can cause Data A (belonging to User A) to be returned to User B. This may lead to unauthorized information disclosure that is difficult to trace, as the application may not throw an error but instead provide "valid-looking" yet entirely incorrect and private data to the wrong session. The issue is fixed in v3.1.4. |
2026-03-27 | |
| CVE-2026-33871 | 8.7 | HIGH | CWE-770 | 0.1% p23 | 6.09 | Netty is an asynchronous, event-driven network application framework. In version...Netty is an asynchronous, event-driven network application framework. In versions prior to 4.1.132.Final and 4.2.10.Final, a remote user can trigger a Denial of Service (DoS) against a Netty HTTP/2 server by sending a flood of `CONTINUATION` frames. The server's lack of a limit on the number of `CONTINUATION` frames, combined with a bypass of existing size-based mitigations using zero-byte frames, allows an user to cause excessive CPU consumption with minimal bandwidth, rendering the server unresponsive. Versions 4.1.132.Final and 4.2.10.Final fix the issue. |
2026-03-27 | |
| CVE-2026-33870 | 7.5 | HIGH | CWE-444 | 0.0% p12 | 5.25 | Netty is an asynchronous, event-driven network application framework. In version...Netty is an asynchronous, event-driven network application framework. In versions prior to 4.1.132.Final and 4.2.10.Final, Netty incorrectly parses quoted strings in HTTP/1.1 chunked transfer encoding extension values, enabling request smuggling attacks. Versions 4.1.132.Final and 4.2.10.Final fix the issue. |
2026-03-27 | |
| CVE-2026-33869 | 4.8 | MEDIUM | CWE-863 | 0.1% p16 | 3.36 | Mastodon is a free, open-source social network server based on ActivityPub. In v...Mastodon is a free, open-source social network server based on ActivityPub. In versions on the 4.5.x branch prior to 4.5.8 and on the 4.4.x branch prior to 4.4.15, an attacker that knows of a quote before it has reached a server can prevent it from being correctly processed on that server. The vulnerability has been patched in Mastodon 4.5.8 and 4.4.15. Mastodon 4.3 and earlier are not affected because they do not support quotes. |
2026-03-27 | |
| CVE-2026-33868 | 4.3 | MEDIUM | CWE-601 | 0.9% p76 | 3.04 | Mastodon is a free, open-source social network server based on ActivityPub. Prio...Mastodon is a free, open-source social network server based on ActivityPub. Prior to versions 4.5.8, 4.4.15, and 4.3.21, an unauthenticated Open Redirect vulnerability (CWE-601) exists in the `/web/*` route due to improper handling of URL-encoded path segments. An attacker can craft a specially encoded URL that causes the application to redirect users to an arbitrary external domain, enabling phishing attacks and potential OAuth credential theft. The issue occurs because URL-encoded slashes (`%2F`) bypass Rails path normalization and are interpreted as host-relative redirects. Versions 4.5.8, 4.4.15, and 4.3.21 patch the issue. |
2026-03-27 | |
| CVE-2026-33765 | 8.9 | HIGH | CWE-78 | 0.2% p47 | 6.24 | Pi-hole Admin Interface is a web interface for managing Pi-hole, a network-level...Pi-hole Admin Interface is a web interface for managing Pi-hole, a network-level ad and internet tracker blocking application. Versions prior to 6.0 have a critical OS Command Injection vulnerability in the savesettings.php file. The application takes the user-controlled $_POST['webtheme'] parameter and concatenates it directly into a system command executed via PHP's exec() function. Since the input is neither sanitized nor validated before being passed to the shell, an attacker can append arbitrary system commands to the intended pihole command. Furthermore, because the command is executed with sudo privileges, the injected commands will run with elevated (likely root) privileges. Version 6.0 patches the issue. |
2026-03-27 | |
| CVE-2026-33739 | 5.7 | MEDIUM | CWE-79 | 0.0% p8 | 3.99 | FOG is a free open-source cloning/imaging/rescue suite/inventory management syst...FOG is a free open-source cloning/imaging/rescue suite/inventory management system. Prior to 1.5.10.1812, the listing tables on multiple management pages (Host, Storage, Group, Image, Printer, Snapin) are vulnerable to Stored Cross-Site Scripting (XSS), due to insufficient server-side parameter sanitization in record creations/updates and a lack of HTML escaping in listing tables. Version 1.5.10.1812 patches the issue. |
2026-03-27 | |
| CVE-2026-33654 | 8.9 | HIGH | CWE-94 | 0.2% p40 | 6.24 | nanobot is a personal AI assistant. Prior to version 0.1.6, an indirect prompt i...nanobot is a personal AI assistant. Prior to version 0.1.6, an indirect prompt injection vulnerability exists in the email channel processing module (`nanobot/channels/email.py`), allowing a remote, unauthenticated attacker to execute arbitrary LLM instructions (and subsequently, system tools) without any interaction from the bot owner. By sending an email containing malicious prompts to the bot's monitored email address, the bot automatically polls, ingests, and processes the email content as highly trusted input, fully bypassing channel isolation and resulting in a stealthy, zero-click attack. Version 0.1.6 patches the issue. |
2026-03-27 | |
| CVE-2026-33045 | 7.3 | HIGH | CWE-79 | 0.0% p7 | 5.11 | Home Assistant is open source home automation software that puts local control a...Home Assistant is open source home automation software that puts local control and privacy first. Starting in version 2025.02 and prior to version 2026.01 the "remaining charge time"-sensor for mobile phones (imported/included from Android Auto it appears) is vulnerable cross-site scripting, similar to CVE-2025-62172. Version 2026.01 fixes the issue. |
2026-03-27 | |
| CVE-2026-33044 | 7.3 | HIGH | CWE-79 | 0.0% p8 | 5.11 | Home Assistant is open source home automation software that puts local control a...Home Assistant is open source home automation software that puts local control and privacy first. Starting in version 2020.02 and prior to version 2026.01, an authenticated party can add a malicious name to their device entity, allowing for Cross-Site Scripting attacks against anyone who can see a dashboard with a Map-card which includes that entity. It requires that the victim hovers over an information point. Version 2026.01 fixes the issue. |
2026-03-27 | |
| CVE-2026-32241 | 7.5 | HIGH | CWE-77 | 0.2% p41 | 5.26 | Flannel is a network fabric for containers, designed for Kubernetes. The Flannel...Flannel is a network fabric for containers, designed for Kubernetes. The Flannel project includes an experimental Extension backend that allows users to easily prototype new backend types. In versions of Flannel prior to 0.28.2, this Extension backend is vulnerable to a command injection that allows an attacker who can set Kubernetes Node annotations to achieve root-level arbitrary command execution on every flannel node in the cluster. The Extension backend's SubnetAddCommand and SubnetRemoveCommand receive attacker-controlled data via stdin (from the `flannel.alpha.coreos.com/backend-data` Node annotation). The content of this annotation is unmarshalled and piped directly to a shell command without checks. Kubernetes clusters using Flannel with the Extension backend are affected by this vulnerability. Other backends such as vxlan and wireguard are unaffected. The vulnerability is fixed in version v0.28.2. As a workaround, use Flannel with another backend such as vxlan or wireguard. |
2026-03-27 | |
| CVE-2026-31951 | 6.8 | MEDIUM | CWE-200 | 0.0% p9 | 4.76 | LibreChat is a ChatGPT clone with additional features. In versions 0.8.2-rc1 thr...LibreChat is a ChatGPT clone with additional features. In versions 0.8.2-rc1 through 0.8.3-rc1, user-created MCP (Model Context Protocol) servers can include arbitrary HTTP headers that undergo credential placeholder substitution. An attacker can create a malicious MCP server with headers containing `{{LIBRECHAT_OPENID_ACCESS_TOKEN}}` (and others), causing victims who call tools on that server to have their OAuth tokens exfiltrated. Version 0.8.3-rc2 fixes the issue. |
2026-03-27 | |
| CVE-2026-31950 | 5.3 | MEDIUM | CWE-284 | 0.0% p9 | 3.71 | LibreChat is a ChatGPT clone with additional features. In versions 0.8.2-rc2 thr...LibreChat is a ChatGPT clone with additional features. In versions 0.8.2-rc2 through 0.8.2-rc3, the SSE streaming endpoint `/api/agents/chat/stream/:streamId` does not verify that the requesting user owns the stream. Any authenticated user who obtains or guesses a valid stream ID can subscribe and read another user's real-time chat content, including messages, AI responses, and tool invocations. Version 0.8.2 patches the issue. |
2026-03-27 | |
| CVE-2026-31945 | 7.7 | HIGH | CWE-918 | 0.0% p10 | 5.39 | LibreChat is a ChatGPT clone with additional features. Versions 0.8.2-rc2 throug...LibreChat is a ChatGPT clone with additional features. Versions 0.8.2-rc2 through 0.8.2 are vulnerable to a server-side request forgery (SSRF) attack when using agent actions or MCP. Although a previous SSRF vulnerability (https://github.com/danny-avila/LibreChat/security/advisories/GHSA-rgjq-4q58-m3q8) was reported and patched, the fix only introduced hostname validation. It does not verify whether DNS resolution results in a private IP address. As a result, an attacker can still bypass the protection and gain access to internal resources, such as an internal RAG API or cloud instance metadata endpoints. Version 0.8.3-rc1 contains a patch. |
2026-03-27 | |
| CVE-2026-31943 | 8.5 | HIGH | CWE-918 | 0.0% p9 | 5.95 | LibreChat is a ChatGPT clone with additional features. Prior to version 0.8.3, `...LibreChat is a ChatGPT clone with additional features. Prior to version 0.8.3, `isPrivateIP()` in `packages/api/src/auth/domain.ts` fails to detect IPv4-mapped IPv6 addresses in their hex-normalized form, allowing any authenticated user to bypass SSRF protection and make the server issue HTTP requests to internal network resources — including cloud metadata services (e.g., AWS `169.254.169.254`), loopback, and RFC1918 ranges. Version 0.8.3 fixes the issue. |
2026-03-27 | |
| CVE-2026-4970 | 5.3 | MEDIUM | CWE-74 | 0.0% p8 | 3.71 | A security flaw has been discovered in code-projects Social Networking Site 1.0....A security flaw has been discovered in code-projects Social Networking Site 1.0. This affects an unknown function of the file delete_photos.php of the component Endpoint. The manipulation of the argument ID results in sql injection. The attack can be executed remotely. The exploit has been released to the public and may be used for attacks. |
2026-03-27 | |
| CVE-2026-4969 | 5.1 | MEDIUM | CWE-79 | 0.0% p8 | 3.57 | A vulnerability was identified in code-projects Social Networking Site 1.0. The ...A vulnerability was identified in code-projects Social Networking Site 1.0. The impacted element is an unknown function of the file /home.php of the component Alert Handler. The manipulation of the argument content leads to cross site scripting. Remote exploitation of the attack is possible. The exploit is publicly available and might be used. |
2026-03-27 | |
| CVE-2026-34387 | 5.7 | MEDIUM | CWE-78 | 0.1% p32 | 3.99 | Fleet is open source device management software. Prior to 4.81.1, a command inje...Fleet is open source device management software. Prior to 4.81.1, a command injection vulnerability in Fleet's software installer pipeline allows an attacker to achieve arbitrary code execution as root (macOS/Linux) or SYSTEM (Windows) on managed hosts when an uninstall is triggered for a crafted software package. Version 4.81.1 patches the issue. |
2026-03-27 | |
| CVE-2026-34386 | 6.3 | MEDIUM | CWE-89 | 0.0% p9 | 4.41 | Fleet is open source device management software. Prior to 4.81.0, a SQL injectio...Fleet is open source device management software. Prior to 4.81.0, a SQL injection vulnerability in Fleet's MDM bootstrap package configuration allows an authenticated user with Team Admin or Global Admin privileges to modify arbitrary team configurations, exfiltrate sensitive data from the Fleet database, and inject arbitrary content into team configs via direct API calls. Version 4.81.0 patches the issue. |
2026-03-27 | |
| CVE-2026-34385 | 6.2 | MEDIUM | CWE-89 | 0.0% p3 | 4.34 | Fleet is open source device management software. Prior to 4.81.0, a second-order...Fleet is open source device management software. Prior to 4.81.0, a second-order SQL injection vulnerability in Fleet's Apple MDM profile delivery pipeline could allow an attacker with a valid MDM enrollment certificate to exfiltrate or modify the contents of the Fleet database, including user credentials, API tokens, and device enrollment secrets. Version 4.81.0 patches the issue. |
2026-03-27 | |
| CVE-2026-34375 | 8.2 | HIGH | CWE-79 | 0.0% p10 | 5.74 | WWBN AVideo is an open source video platform. In versions up to and including 26...WWBN AVideo is an open source video platform. In versions up to and including 26.0, the YPTWallet Stripe payment confirmation page directly echoes the `$_REQUEST['plugin']` parameter into a JavaScript block without any encoding or sanitization. The `plugin` parameter is not included in any of the framework's input filter lists defined in `security.php`, so it passes through completely raw. An attacker can inject arbitrary JavaScript by crafting a malicious URL and sending it to a victim user. The same script block also outputs the current user's username and password hash via `User::getUserName()` and `User::getUserPass()`, meaning a successful XSS exploitation can immediately exfiltrate these credentials. Commit fa0bc102493a15d79fe03f86c07ab7ca1b5b63e2 fixes the issue. |
2026-03-27 | |
| CVE-2026-34374 | 9.1 | CRITICAL | CWE-89 | 0.0% p10 | 6.37 | WWBN AVideo is an open source video platform. In versions up to and including 26...WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `Live_schedule::keyExists()` method constructs a SQL query by interpolating a stream key directly into the query string without parameterization. This method is called as a fallback from `LiveTransmition::keyExists()` when the initial parameterized lookup returns no results. Although the calling function correctly uses parameterized queries for its own lookup, the fallback path to `Live_schedule::keyExists()` undoes this protection entirely. This vulnerability is distinct from GHSA-pvw4-p2jm-chjm, which covers SQL injection via the `live_schedule_id` parameter in the reminder function. This finding targets the stream key lookup path used during RTMP publish authentication. As of time of publication, no patched versions are available. |
2026-03-27 | |
| CVE-2026-34369 | 5.3 | MEDIUM | CWE-862 | 0.1% p19 | 3.71 | WWBN AVideo is an open source video platform. In versions up to and including 26...WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `get_api_video_file` and `get_api_video` API endpoints in AVideo return full video playback sources (direct MP4 URLs, HLS manifests) for password-protected videos without verifying the video password. While the normal web playback flow enforces password checks via the `CustomizeUser::getModeYouTube()` hook, this enforcement is completely absent from the API code path. An unauthenticated attacker can retrieve direct playback URLs for any password-protected video by calling the API directly. Commit be344206f2f461c034ad2f1c5d8212dd8a52b8c7 fixes the issue. |
2026-03-27 | |
| CVE-2026-29180 | 4.9 | MEDIUM | CWE-862 | 0.0% p14 | 3.43 | Fleet is open source device management software. Prior to 4.81.1, a broken acces...Fleet is open source device management software. Prior to 4.81.1, a broken access control vulnerability in Fleet's host transfer API allows a team maintainer to transfer hosts from any team into their own team, bypassing team isolation boundaries. Once transferred, the attacker gains full control over the stolen hosts, including the ability to execute scripts with root privileges. Version 4.81.1 patches the issue. |
2026-03-27 | |
| CVE-2026-26061 | 8.7 | HIGH | CWE-770 | 0.1% p18 | 6.09 | Fleet is open source device management software. Prior to 4.81.0, Fleet containe...Fleet is open source device management software. Prior to 4.81.0, Fleet contained multiple unauthenticated HTTP endpoints that read request bodies without enforcing a size limit. An unauthenticated attacker could exploit this behavior by sending large or repeated HTTP payloads, causing excessive memory allocation and resulting in a denial-of-service (DoS) condition. Version 4.81.0 patches the issue. |
2026-03-27 | |
| CVE-2026-26060 | 6.0 | MEDIUM | CWE-613 | 0.0% p14 | 4.20 | Fleet is open source device management software. Prior to 4.81.0, a vulnerabilit...Fleet is open source device management software. Prior to 4.81.0, a vulnerability in Fleet’s password management logic could allow previously issued password reset tokens to remain valid after a user changes their password. As a result, a stale password reset token could be reused to reset the account password even after a defensive password change. Version 4.81.0 patches the issue. |
2026-03-27 | |
| CVE-2025-15612 | 6.3 | MEDIUM | CWE-295 | 0.0% p14 | 4.41 | Wazuh provisioning scripts and Dockerfiles contain an insecure transport vulnera...Wazuh provisioning scripts and Dockerfiles contain an insecure transport vulnerability where curl is invoked with the -k/--insecure flag, disabling SSL/TLS certificate validation. Attackers with network access can perform man-in-the-middle attacks to intercept and modify downloaded dependencies or code during the build process, leading to remote code execution and supply chain compromise. |
2026-03-27 | |
| CVE-2026-4968 | 5.3 | MEDIUM | CWE-352 | 0.0% p3 | 3.71 | A vulnerability was determined in SourceCodester Diary App 1.0. The affected ele...A vulnerability was determined in SourceCodester Diary App 1.0. The affected element is an unknown function of the file diary.php. Executing a manipulation can lead to cross-site request forgery. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized. |
2026-03-27 | |
| CVE-2026-4966 | 5.3 | MEDIUM | CWE-74 | 0.0% p8 | 3.71 | A flaw has been found in itsourcecode Free Hotel Reservation System 1.0. Impacte...A flaw has been found in itsourcecode Free Hotel Reservation System 1.0. Impacted is an unknown function of the file /admin/mod_room/index.php?view=edit. Executing a manipulation of the argument ID can lead to sql injection. The attack can be launched remotely. The exploit has been published and may be used. |
2026-03-27 | |
| CVE-2026-4965 | 6.9 | MEDIUM | CWE-94 | 0.0% p4 | 4.83 | A vulnerability was detected in letta-ai letta 0.16.4. This issue affects the fu...A vulnerability was detected in letta-ai letta 0.16.4. This issue affects the function resolve_type of the file letta/functions/ast_parsers.py of the component Incomplete Fix CVE-2025-6101. Performing a manipulation results in improper neutralization of directives in dynamically evaluated code. The attack can be initiated remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-27 | |
| CVE-2026-34368 | 5.3 | MEDIUM | CWE-362 | 0.0% p8 | 3.71 | WWBN AVideo is an open source video platform. In versions up to and including 26...WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `transferBalance()` method in `plugin/YPTWallet/YPTWallet.php` contains a Time-of-Check-Time-of-Use (TOCTOU) race condition. The method reads the sender's wallet balance, checks sufficiency in PHP, then writes the new balance — all without database transactions or row-level locking. An attacker with multiple authenticated sessions can send concurrent transfer requests that all read the same stale balance, each passing the balance check independently, resulting in only one deduction being applied while the recipient is credited multiple times. Commit 34132ad5159784bfc7ba0d7634bb5c79b769202d contains a fix. |
2026-03-27 | |
| CVE-2026-34364 | 5.3 | MEDIUM | CWE-863 | 0.0% p1 | 3.71 | WWBN AVideo is an open source video platform. In versions up to and including 26...WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `categories.json.php` endpoint, which serves the category listing API, fails to enforce user group-based access controls on categories. In the default request path (no `?user=` parameter), user group filtering is entirely skipped, exposing all non-private categories including those restricted to specific user groups. When the `?user=` parameter is supplied, a type confusion bug causes the filter to use the admin user's (user_id=1) group memberships instead of the current user's, rendering the filter ineffective. Commit 6e8a673eed07be5628d0b60fbfabd171f3ce74c9 contains a fix. |
2026-03-27 | |
| CVE-2026-30568 | 4.8 | MEDIUM | CWE-79 | 0.0% p10 | 3.36 | A Reflected Cross-Site Scripting (XSS) vulnerability exists in SourceCodester Sa...A Reflected Cross-Site Scripting (XSS) vulnerability exists in SourceCodester Sales and Inventory System 1.0 in in the view_purchase.php file via the "limit" parameter. The application fails to sanitize the input, allowing remote attackers to inject arbitrary web script or HTML via a crafted URL. |
2026-03-27 | |
| CVE-2026-30567 | 6.1 | MEDIUM | CWE-79 | 0.0% p11 | 4.27 | A Reflected Cross-Site Scripting (XSS) vulnerability exists in SourceCodester Sa...A Reflected Cross-Site Scripting (XSS) vulnerability exists in SourceCodester Sales and Inventory System 1.0 in the view_product.php file via the "limit" parameter. The application fails to sanitize the input, allowing remote attackers to inject arbitrary web script or HTML via a crafted URL. |
2026-03-27 | |
| CVE-2025-15617 | 8.3 | HIGH | CWE-522 | 0.1% p17 | 5.81 | Wazuh version 4.12.0 contains an exposure vulnerability in GitHub Actions workfl...Wazuh version 4.12.0 contains an exposure vulnerability in GitHub Actions workflow artifacts that allows attackers to extract the GITHUB_TOKEN from uploaded artifacts. Attackers can use the exposed token within a limited time window to perform unauthorized actions such as pushing malicious commits or altering release tags. |
2026-03-27 | |
| CVE-2026-4964 | 5.3 | MEDIUM | CWE-918 | 0.0% p1 | 3.71 | A security vulnerability has been detected in letta-ai letta 0.16.4. This vulner...A security vulnerability has been detected in letta-ai letta 0.16.4. This vulnerability affects the function _convert_message_create_to_message of the file letta/helpers/message_helper.py of the component File URL Handler. Such manipulation of the argument ImageContent leads to server-side request forgery. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-27 | |
| CVE-2026-4963 | 5.3 | MEDIUM | CWE-74 | 0.0% p2 | 3.71 | A weakness has been identified in huggingface smolagents 1.25.0.dev0. This affec...A weakness has been identified in huggingface smolagents 1.25.0.dev0. This affects the function evaluate_augassign/evaluate_call/evaluate_with of the file src/smolagents/local_python_executor.py of the component Incomplete Fix CVE-2025-9959. This manipulation causes code injection. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-27 | |
| CVE-2026-4962 | 7.3 | HIGH | CWE-426 | 0.0% p0 | 5.11 | A security flaw has been discovered in UltraVNC up to 1.6.4.0. Affected by this ...A security flaw has been discovered in UltraVNC up to 1.6.4.0. Affected by this issue is some unknown functionality in the library version.dll of the component Service. The manipulation results in uncontrolled search path. The attack needs to be approached locally. This attack is characterized by high complexity. The exploitation is known to be difficult. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-27 | |
| CVE-2026-4961 | 7.4 | HIGH | CWE-119 | 0.1% p23 | 5.18 | A vulnerability was identified in Tenda AC6 15.03.05.16. Affected by this vulner...A vulnerability was identified in Tenda AC6 15.03.05.16. Affected by this vulnerability is the function formQuickIndex of the file /goform/QuickIndex of the component POST Request Handler. The manipulation of the argument PPPOEPassword leads to stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit is publicly available and might be used. |
2026-03-27 | |
| CVE-2026-4960 | 7.4 | HIGH | CWE-119 | 0.1% p23 | 5.18 | A vulnerability was determined in Tenda AC6 15.03.05.16. Affected is the functio...A vulnerability was determined in Tenda AC6 15.03.05.16. Affected is the function fromWizardHandle of the file /goform/WizardHandle of the component POST Request Handler. Executing a manipulation of the argument WANT/WANS can lead to stack-based buffer overflow. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized. |
2026-03-27 | |
| CVE-2026-34411 | 6.9 | MEDIUM | CWE-306 | 0.1% p23 | 4.83 | Appsmith versions prior to 1.98 expose sensitive instance management API endpoin...Appsmith versions prior to 1.98 expose sensitive instance management API endpoints without authentication. Unauthenticated attackers can query endpoints like /api/v1/consolidated-api/view and /api/v1/tenants/current to retrieve configuration metadata, license information, and unsalted SHA-256 hashes of admin email domains for reconnaissance and targeted attack planning. |
2026-03-27 | |
| CVE-2026-34362 | 5.4 | MEDIUM | CWE-613 | 0.0% p8 | 3.78 | WWBN AVideo is an open source video platform. In versions up to and including 26...WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `verifyTokenSocket()` function in `plugin/YPTSocket/functions.php` has its token timeout validation commented out, causing WebSocket tokens to never expire despite being generated with a 12-hour timeout. This allows captured or legitimately obtained tokens to provide permanent WebSocket access, even after user accounts are deleted, banned, or demoted from admin. Admin tokens grant access to real-time connection data for all online users including IP addresses, browser info, and page locations. Commit 5d5237121bf82c24e9e0fdd5bc1699f1157783c5 fixes the issue. |
2026-03-27 | |
| CVE-2026-34247 | 5.4 | MEDIUM | CWE-862 | 0.0% p1 | 3.78 | WWBN AVideo is an open source video platform. In versions up to and including 26...WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `plugin/Live/uploadPoster.php` endpoint allows any authenticated user to overwrite the poster image for any scheduled live stream by supplying an arbitrary `live_schedule_id`. The endpoint only checks `User::isLogged()` but never verifies that the authenticated user owns the targeted schedule. After overwriting the poster, the endpoint broadcasts a `socketLiveOFFCallback` notification containing the victim's broadcast key and user ID to all connected WebSocket clients. Commit 5fcb3bdf59f26d65e203cfbc8a685356ba300b60 fixes the issue. |
2026-03-27 | |
| CVE-2026-34245 | 6.3 | MEDIUM | CWE-862 | 0.0% p12 | 4.41 | WWBN AVideo is an open source video platform. In versions up to and including 26...WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `plugin/PlayLists/View/Playlists_schedules/add.json.php` endpoint allows any authenticated user with streaming permission to create or modify broadcast schedules targeting any playlist on the platform, regardless of ownership. When the schedule executes, the rebroadcast runs under the victim playlist owner's identity, allowing content hijacking and stream disruption. Commit 1e6dc20172de986f60641eb4fdb4090f079ffdce contains a patch. |
2026-03-27 | |
| CVE-2026-33867 | 9.1 | CRITICAL | CWE-312 | 0.0% p2 | 6.37 | WWBN AVideo is an open source video platform. In versions up to and including 26...WWBN AVideo is an open source video platform. In versions up to and including 26.0, AVideo allows content owners to password-protect individual videos. The video password is stored in the database in plaintext — no hashing, salting, or encryption is applied. If an attacker gains read access to the database (via SQL injection, a database backup, or misconfigured access controls), they obtain all video passwords in cleartext. Commit f2d68d2adbf73588ea61be2b781d93120a819e36 contains a patch. |
2026-03-27 | |
| CVE-2026-33770 | 7.1 | HIGH | CWE-89 | 0.1% p17 | 4.97 | WWBN AVideo is an open source video platform. In versions up to and including 26...WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `fixCleanTitle()` static method in `objects/category.php` constructs a SQL SELECT query by directly interpolating both `$clean_title` and `$id` into the query string without using prepared statements or parameterized queries. An attacker who can trigger category creation or renaming with a crafted title value can inject arbitrary SQL. Commit 994cc2b3d802b819e07e6088338e8bf4e484aae4 contains a patch. |
2026-03-27 | |
| CVE-2026-33767 | 7.1 | HIGH | CWE-89 | 0.1% p16 | 4.97 | WWBN AVideo is an open source video platform. In versions up to and including 26...WWBN AVideo is an open source video platform. In versions up to and including 26.0, in `objects/like.php`, the `getLike()` method constructs a SQL query using a prepared statement placeholder (`?`) for `users_id` but directly concatenates `$this->videos_id` into the query string without parameterization. An attacker who can control the `videos_id` value (via a crafted request) can inject arbitrary SQL, bypassing the partial prepared-statement protection. Commit 0215d3c4f1ee748b8880254967b51784b8ac4080 contains a patch. |
2026-03-27 | |
| CVE-2026-30576 | 7.5 | HIGH | CWE-20 | 0.0% p14 | 5.25 | A Business Logic vulnerability exists in SourceCodester Pharmacy Product Managem...A Business Logic vulnerability exists in SourceCodester Pharmacy Product Management System 1.0 in the add-stock.php file. The application fails to validate the "txtprice" and "txttotalcost" parameters during stock entry, allowing negative financial values to be submitted. This leads to corruption of financial records, allowing attackers to manipulate inventory asset values and procurement costs. |
2026-03-27 | |
| CVE-2026-30575 | 7.5 | HIGH | CWE-20 | 0.1% p26 | 5.25 | A Business Logic vulnerability exists in SourceCodester Pharmacy Product Managem...A Business Logic vulnerability exists in SourceCodester Pharmacy Product Management System 1.0 in the add-stock.php file. The application fails to validate the "txtqty" parameter during stock entry, allowing negative values to be processed. This causes the system to decrease the inventory level instead of increasing it, leading to inventory corruption and potential Denial of Service by depleting stock records. |
2026-03-27 | |
| CVE-2026-30574 | 7.5 | HIGH | CWE-841 | 0.0% p10 | 5.25 | A Business Logic vulnerability exists in SourceCodester Pharmacy Product Managem...A Business Logic vulnerability exists in SourceCodester Pharmacy Product Management System 1.0 in the add-sales.php file. The application fails to verify if the requested sales quantity (txtqty) exceeds the available stock level. An attacker can manipulate the request to purchase a quantity that is significantly higher than the actual available stock. |
2026-03-27 | |
| CVE-2026-30571 | 6.1 | MEDIUM | CWE-79 | 0.0% p11 | 4.27 | A Reflected Cross-Site Scripting (XSS) vulnerability exists in SourceCodester Sa...A Reflected Cross-Site Scripting (XSS) vulnerability exists in SourceCodester Sales and Inventory System 1.0 in the view_category.php file via the "limit" parameter. The application fails to sanitize the input, allowing remote attackers to inject arbitrary web script or HTML via a crafted URL. |
2026-03-27 | |
| CVE-2026-30570 | 6.1 | MEDIUM | CWE-79 | 0.0% p11 | 4.27 | A Reflected Cross-Site Scripting (XSS) vulnerability exists in SourceCodester Sa...A Reflected Cross-Site Scripting (XSS) vulnerability exists in SourceCodester Sales and Inventory System 1.0 in the view_sales.php file via the "limit" parameter. The application fails to sanitize the input, allowing remote attackers to inject arbitrary web script or HTML via a crafted URL |
2026-03-27 | |
| CVE-2026-30569 | 6.1 | MEDIUM | CWE-79 | 0.0% p11 | 4.27 | A Reflected Cross-Site Scripting (XSS) vulnerability exists in SourceCodester Sa...A Reflected Cross-Site Scripting (XSS) vulnerability exists in SourceCodester Sales and Inventory System 1.0. The vulnerability is located in the view_stock_availability.php file via the "limit" parameter. The application fails to sanitize the input, allowing remote attackers to inject arbitrary web script or HTML via a crafted URL. |
2026-03-27 | |
| CVE-2026-28369 | 8.7 | HIGH | CWE-444 | 0.1% p35 | 6.09 | A flaw was found in Undertow. When Undertow receives an HTTP request where the f...A flaw was found in Undertow. When Undertow receives an HTTP request where the first header line starts with one or more spaces, it incorrectly processes the request by stripping these leading spaces. This behavior, which violates HTTP standards, can be exploited by a remote attacker to perform request smuggling. Request smuggling allows an attacker to bypass security mechanisms, access restricted information, or manipulate web caches, potentially leading to unauthorized actions or data exposure. |
2026-03-27 | |
| CVE-2026-28368 | 8.7 | HIGH | CWE-444 | 0.1% p29 | 6.09 | A flaw was found in Undertow. This vulnerability allows a remote attacker to con...A flaw was found in Undertow. This vulnerability allows a remote attacker to construct specially crafted requests where header names are parsed differently by Undertow compared to upstream proxies. This discrepancy in header interpretation can be exploited to launch request smuggling attacks, potentially bypassing security controls and accessing unauthorized resources. |
2026-03-27 | |
| CVE-2026-28367 | 8.7 | HIGH | CWE-444 | 0.0% p12 | 6.09 | A flaw was found in Undertow. A remote attacker can exploit this vulnerability b...A flaw was found in Undertow. A remote attacker can exploit this vulnerability by sending `\r\r\r` as a header block terminator. This can be used for request smuggling with certain proxy servers, such as older versions of Apache Traffic Server and Google Cloud Classic Application Load Balancer, potentially leading to unauthorized access or manipulation of web requests. |
2026-03-27 | |
| CVE-2025-15616 | 7.1 | HIGH | CWE-94 | 0.1% p35 | 4.97 | Wazuh wazuh-agent and wazuh-manager versions 2.1.0 before 4.8.0 contain multiple...Wazuh wazuh-agent and wazuh-manager versions 2.1.0 before 4.8.0 contain multiple shell injection and untrusted search path vulnerabilities that allow attackers to execute arbitrary commands through various components including logcollector configuration, maild SMTP server tags, and Kaspersky AR script parameters. Attackers can exploit these vulnerabilities by injecting malicious commands through configuration files, SMTP server settings, and custom flags to achieve remote code execution on affected systems. |
2026-03-27 | |
| CVE-2025-15615 | 6.9 | MEDIUM | CWE-276 | 0.2% p36 | 4.83 | Wazuh Manager authd service in wazuh-manager packages through version 4.7.3 cont...Wazuh Manager authd service in wazuh-manager packages through version 4.7.3 contains an improper restriction of client-initiated SSL/TLS renegotiation vulnerability that allows remote attackers to cause a denial of service by sending excessive renegotiation requests. Attackers can exploit the lack of renegotiation limits to consume CPU resources and render the authd service unavailable. |
2026-03-27 | |
| CVE-2025-15381 | 8.1 | HIGH | CWE-200 | 0.0% p1 | 5.67 | In the latest version of mlflow/mlflow, when the `basic-auth` app is enabled, tr...In the latest version of mlflow/mlflow, when the `basic-auth` app is enabled, tracing and assessment endpoints are not protected by permission validators. This allows any authenticated user, including those with `NO_PERMISSIONS` on the experiment, to read trace information and create assessments for traces they should not have access to. This vulnerability impacts confidentiality by exposing trace metadata and integrity by allowing unauthorized creation of assessments. Deployments using `mlflow server --app-name=basic-auth` are affected. |
2026-03-27 | |
| CVE-2026-4959 | 6.9 | MEDIUM | CWE-287 | 0.1% p22 | 4.83 | A vulnerability was found in OpenBMB XAgent 1.0.0. This impacts the function che...A vulnerability was found in OpenBMB XAgent 1.0.0. This impacts the function check_user of the file XAgentServer/application/websockets/share.py of the component ShareServer WebSocket Endpoint. Performing a manipulation of the argument interaction_id results in missing authentication. Remote exploitation of the attack is possible. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-27 | |
| CVE-2026-4958 | 2.3 | LOW | CWE-285 | 0.0% p7 | 1.61 | A vulnerability has been found in OpenBMB XAgent 1.0.0. This affects the functio...A vulnerability has been found in OpenBMB XAgent 1.0.0. This affects the function ReplayServer.on_connect/ReplayServer.send_data of the file XAgentServer/application/websockets/replayer.py of the component WebSocket Endpoint. Such manipulation of the argument interaction_id leads to authorization bypass. The attack may be launched remotely. Attacks of this nature are highly complex. The exploitability is reported as difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-27 | |
| CVE-2026-32984 | 5.3 | MEDIUM | CWE-125 | 0.1% p20 | 3.71 | Wazuh authd contains a heap-buffer overflow vulnerability that allows attackers ...Wazuh authd contains a heap-buffer overflow vulnerability that allows attackers to cause memory corruption and malformed heap data by sending specially crafted input. Attackers can exploit this vulnerability to trigger a denial of service condition, resulting in low availability impact to the authentication daemon. |
2026-03-27 | |
| CVE-2026-32983 | 6.9 | MEDIUM | CWE-276 | 0.1% p34 | 4.83 | Wazuh Manager authd service in wazuh-manager packages through version 4.7.3 cont...Wazuh Manager authd service in wazuh-manager packages through version 4.7.3 contains an improper restriction of client-initiated SSL/TLS renegotiation vulnerability that allows remote attackers to cause a denial of service by sending excessive renegotiation requests. Attackers can exploit the lack of renegotiation limits to consume CPU resources and render the authd service unavailable. |
2026-03-27 | |
| CVE-2026-30534 | 8.3 | HIGH | CWE-89 | 0.0% p9 | 5.81 | A SQL Injection vulnerability exists in SourceCodester Online Food Ordering Syst...A SQL Injection vulnerability exists in SourceCodester Online Food Ordering System v1.0 in admin/manage_category.php via the "id" parameter. |
2026-03-27 | |
| CVE-2026-30533 | 9.8 | CRITICAL | CWE-89 | 0.0% p11 | 6.86 | A SQL Injection vulnerability exists in SourceCodester Online Food Ordering Syst...A SQL Injection vulnerability exists in SourceCodester Online Food Ordering System v1.0 in the admin/manage_product.php file via the "id" parameter. |
2026-03-27 | |
| CVE-2026-30532 | 9.8 | CRITICAL | CWE-89 | 0.0% p11 | 6.86 | A SQL Injection vulnerability exists in SourceCodester Online Food Ordering Syst...A SQL Injection vulnerability exists in SourceCodester Online Food Ordering System v1.0 in the admin/view_product.php file via the "id" parameter. |
2026-03-27 | |
| CVE-2026-30531 | 8.8 | HIGH | CWE-89 | 0.0% p9 | 6.16 | A SQL Injection vulnerability exists in SourceCodester Online Food Ordering Syst...A SQL Injection vulnerability exists in SourceCodester Online Food Ordering System v1.0 in the Actions.php file (specifically the save_category action). The application fails to properly sanitize user input supplied to the "name" parameter. This allows an authenticated attacker to inject malicious SQL commands. |
2026-03-27 | |
| CVE-2026-30530 | 9.8 | CRITICAL | CWE-89 | 0.0% p2 | 6.86 | A SQL Injection vulnerability exists in SourceCodester Online Food Ordering Syst...A SQL Injection vulnerability exists in SourceCodester Online Food Ordering System v1.0 in the Actions.php file (specifically the save_customer action). The application fails to properly sanitize user input supplied to the "username" parameter. This allows an attacker to inject malicious SQL commands. |
2026-03-27 | |
| CVE-2026-30529 | 8.8 | HIGH | CWE-89 | 0.0% p1 | 6.16 | A SQL Injection vulnerability exists in SourceCodester Online Food Ordering Syst...A SQL Injection vulnerability exists in SourceCodester Online Food Ordering System v1.0 in the Actions.php file (specifically the save_user action). The application fails to properly sanitize user input supplied to the "username" parameter. This allows an authenticated attacker to inject malicious SQL commands. |
2026-03-27 | |
| CVE-2026-30527 | 5.4 | MEDIUM | CWE-79 | 0.0% p7 | 3.78 | A Stored Cross-Site Scripting (XSS) vulnerability exists in SourceCodester Onlin...A Stored Cross-Site Scripting (XSS) vulnerability exists in SourceCodester Online Food Ordering System v1.0 in the Category management module within the admin panel. The application fails to properly sanitize user input supplied to the "Category Name" field when creating or updating a category. When an administrator or user visits the Category list page (or any page where this category is rendered), the injected JavaScript executes immediately in their browser. |
2026-03-27 | |
| CVE-2026-30302 | 10.0 | CRITICAL | CWE-78 | 0.5% p63 | 7.01 | The command auto-approval module in CodeRider-Kilo contains an OS Command Inject...The command auto-approval module in CodeRider-Kilo contains an OS Command Injection vulnerability, rendering its whitelist security mechanism ineffective. The vulnerability stems from the incorrect use of an incompatible command parser (the Unix-based shell-quote library) to analyze commands on the Windows platform, coupled with a failure to correctly handle Windows CMD-specific escape sequences (^). Attackers can exploit this discrepancy between the parsing logic and the execution environment by constructing payloads such as git log ^" & malicious_command ^". The CodeRider-Kilo parser is deceived by the escape characters, misinterpreting the malicious command connector (&) as being within a protected string argument and thus auto-approving the command. However, the underlying Windows CMD interpreter ignores the escaped quotes, parsing and executing the subsequent malicious command directly. This allows attackers to achieve arbitrary Remote Code Execution (RCE) after bypassing what appears to be a legitimate Git whitelist check. |
2026-03-27 | |
| CVE-2023-7340 | 5.3 | MEDIUM | CWE-125 | 0.0% p5 | 3.71 | Wazuh authd contains a heap-buffer overflow vulnerability that allows attackers ...Wazuh authd contains a heap-buffer overflow vulnerability that allows attackers to cause memory corruption and malformed heap data by sending specially crafted input. Attackers can exploit this vulnerability to trigger a denial of service condition, resulting in low availability impact to the authentication daemon. |
2026-03-27 | |
| CVE-2026-5027 | 8.8 | HIGH | CWE-22 | 0.1% p18 | 6.16 | The 'POST /api/v2/files' endpoint does not sanitize the 'filename' parameter fro...The 'POST /api/v2/files' endpoint does not sanitize the 'filename' parameter from the multipart form data, allowing an attacker to write files to arbitrary locations on the filesystem using path traversal sequences ('../'). |
2026-03-27 | |
| CVE-2026-5025 | 6.5 | MEDIUM | CWE-862 | 0.0% p11 | 4.55 | The '/logs' and '/logs-stream' endpoints in the log router allow any authenticat...The '/logs' and '/logs-stream' endpoints in the log router allow any authenticated user to read the full application log buffer. These endpoints only require basic authentication ('get_current_active_user') without any privilege checks (e.g., 'is_superuser'). |
2026-03-27 | |
| CVE-2026-5022 | 6.3 | MEDIUM | CWE-862 | 0.1% p16 | 4.41 | The '/api/v1/files/images/{flow_id}/{file_name}' endpoint does not enforce any a...The '/api/v1/files/images/{flow_id}/{file_name}' endpoint does not enforce any authentication or authorization checks, allowing any unauthenticated user to download images belonging to any flow by knowing (or guessing) the flow ID and file name. |
2026-03-27 | |
| CVE-2026-5010 | 5.1 | MEDIUM | CWE-79 | 0.1% p19 | 3.57 | A reflected Cross-Site Scripting (XSS) vulnerability has been discovered in Clic...A reflected Cross-Site Scripting (XSS) vulnerability has been discovered in Clickedu. This vulnerability allows an attacker to execute JavaScript code in the victim’s browser by sending them a malicious URL using the endpoint “/user.php/”. This vulnerability can be exploited to steal sensitive user data, such as session cookies, or to perform actions on the user’s behalf. |
2026-03-27 | |
| CVE-2026-4980 | 6.3 | MEDIUM | CWE-611 | 0.0% p7 | 4.41 | A local file disclosure vulnerability in the XInclude processing component of In...A local file disclosure vulnerability in the XInclude processing component of Inkscape 1.1 before 1.3 allows a remote attacker to read local files via a crafted SVG file containing malicious xi:include tags. |
2026-03-27 | |
| CVE-2026-4957 | 5.1 | MEDIUM | CWE-200 | 0.0% p10 | 3.57 | A flaw has been found in OpenBMB XAgent 1.0.0. The impacted element is the funct...A flaw has been found in OpenBMB XAgent 1.0.0. The impacted element is the function FunctionHandler.handle_tool_call of the file XAgent/function_handler.py of the component API Key Handler. This manipulation of the argument api_key causes sensitive information in log files. The attack may be initiated remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-27 | |
| CVE-2026-4956 | 6.9 | MEDIUM | CWE-74 | 0.0% p10 | 4.83 | A vulnerability was detected in Shenzhen Ruiming Technology Streamax Crocus 1.3....A vulnerability was detected in Shenzhen Ruiming Technology Streamax Crocus 1.3.44. The affected element is an unknown function of the file /DevicePrint.do?Action=ReadTask of the component Parameter Handler. The manipulation of the argument State results in sql injection. The attack can be launched remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-27 | |
| CVE-2026-4955 | 6.9 | MEDIUM | CWE-74 | 0.0% p11 | 4.83 | A vulnerability was found in Shenzhen Ruiming Technology Streamax Crocus 1.3.44....A vulnerability was found in Shenzhen Ruiming Technology Streamax Crocus 1.3.44. This impacts an unknown function of the file /OperateStatistic.do. The manipulation of the argument VehicleID results in sql injection. The attack can be launched remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-27 | |
| CVE-2026-4954 | 5.3 | MEDIUM | CWE-74 | 0.0% p8 | 3.71 | A security vulnerability has been detected in mingSoft MCMS up to 5.5.0. Impacte...A security vulnerability has been detected in mingSoft MCMS up to 5.5.0. Impacted is the function list of the file net/mingsoft/cms/action/web/ContentAction.java of the component Web Content List Endpoint. The manipulation leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used. |
2026-03-27 | |
| CVE-2026-4953 | 6.9 | MEDIUM | CWE-918 | 0.1% p15 | 4.83 | A weakness has been identified in mingSoft MCMS up to 5.5.0. This issue affects ...A weakness has been identified in mingSoft MCMS up to 5.5.0. This issue affects the function catchImage of the file net/mingsoft/cms/action/BaseAction.java of the component Editor Endpoint. Executing a manipulation of the argument catchimage can lead to server-side request forgery. It is possible to launch the attack remotely. The exploit has been made available to the public and could be used for attacks. |
2026-03-27 | |
| CVE-2026-33766 | 5.3 | MEDIUM | CWE-918 | 0.0% p10 | 3.71 | WWBN AVideo is an open source video platform. In versions up to and including 26...WWBN AVideo is an open source video platform. In versions up to and including 26.0, `isSSRFSafeURL()` validates URLs against private/reserved IP ranges before fetching, but `url_get_contents()` follows HTTP redirects without re-validating the redirect target. An attacker can bypass SSRF protection by redirecting from a public URL to an internal target. Commit 8b7e9dad359d5fac69e0cbbb370250e0b284bc12 contains a patch. |
2026-03-27 | |
| CVE-2026-33764 | 4.3 | MEDIUM | CWE-639 | 0.0% p6 | 3.01 | WWBN AVideo is an open source video platform. In versions up to and including 26...WWBN AVideo is an open source video platform. In versions up to and including 26.0, the AI plugin's `save.json.php` endpoint loads AI response objects using an attacker-controlled `$_REQUEST['id']` parameter without validating that the AI response belongs to the specified video. An authenticated user with AI permissions can reference any AI response ID — including those generated for other users' private videos — and apply the stolen AI-generated content (titles, descriptions, keywords, summaries, or full transcriptions) to their own video, effectively exfiltrating the information. Commit aa2c46a806960a0006105df47765913394eec142 contains a patch. |
2026-03-27 | |
| CVE-2026-33763 | 5.3 | MEDIUM | CWE-307 | 0.1% p22 | 3.71 | WWBN AVideo is an open source video platform. In versions up to and including 26...WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `get_api_video_password_is_correct` API endpoint allows any unauthenticated user to verify whether a given password is correct for any password-protected video. The endpoint returns a boolean `passwordIsCorrect` field with no rate limiting, CAPTCHA, or authentication requirement, enabling efficient offline-speed brute-force attacks against video passwords. Commit 01a0614fedcdaee47832c0d913a0fb86d8c28135 contains a patch. |
2026-03-27 | |
| CVE-2026-33761 | 5.3 | MEDIUM | CWE-200 | 0.1% p22 | 3.71 | WWBN AVideo is an open source video platform. In versions up to and including 26...WWBN AVideo is an open source video platform. In versions up to and including 26.0, three `list.json.php` endpoints in the Scheduler plugin lack any authentication check, while every other endpoint in the same plugin directories (`add.json.php`, `delete.json.php`, `index.php`) requires `User::isAdmin()`. An unauthenticated attacker can retrieve all scheduled tasks (including internal callback URLs and parameters), admin-composed email messages, and user-to-email targeting mappings by sending simple GET requests. Commit 83390ab1fa8dca2de3f8fa76116a126428405431 contains a patch. |
2026-03-27 | |
| CVE-2026-33759 | 5.3 | MEDIUM | CWE-639 | 0.0% p14 | 3.71 | WWBN AVideo is an open source video platform. In versions up to and including 26...WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `objects/playlistsVideos.json.php` endpoint returns the full video contents of any playlist by ID without any authentication or authorization check. Private playlists (including `watch_later` and `favorite` types) are correctly hidden from listing endpoints via `playlistsFromUser.json.php`, but their contents are directly accessible through this endpoint by providing the sequential integer `playlists_id` parameter. Commit bb716fbece656c9fe39784f11e4e822b5867f1ca has a patch for the issue. |
2026-03-27 | |
| CVE-2026-33758 | 9.4 | CRITICAL | CWE-20 | 0.1% p31 | 6.58 | OpenBao is an open source identity-based secrets management system. Prior to ver...OpenBao is an open source identity-based secrets management system. Prior to version 2.5.2, OpenBao installations that have an OIDC/JWT authentication method enabled and a role with `callback_mode=direct` configured are vulnerable to XSS via the `error_description` parameter on the page for a failed authentication. This allows an attacker access to the token used in the Web UI by a victim. The `error_description` parameter has been replaced with a static error message in v2.5.2. The vulnerability can be mitigated by removing any roles with `callback_mode` set to `direct`. |
2026-03-27 | |
| CVE-2026-33757 | 9.6 | CRITICAL | CWE-384 | 0.1% p21 | 6.72 | OpenBao is an open source identity-based secrets management system. Prior to ver...OpenBao is an open source identity-based secrets management system. Prior to version 2.5.2, OpenBao does not prompt for user confirmation when logging in via JWT/OIDC and a role with `callback_mode` set to `direct`. This allows an attacker to start an authentication request and perform "remote phishing" by having the victim visit the URL and automatically log-in to the session of the attacker. Despite being based on the authorization code flow, the `direct` mode calls back directly to the API and allows an attacker to poll for an OpenBao token until it is issued. Version 2.5.2 includes an additional confirmation screen for `direct` type logins that requires manual user interaction in order to finish the authentication. This issue can be worked around either by removing any roles with `callback_mode=direct` or enforcing confirmation for every session on the token issuer side for the Client ID used by OpenBao. |
2026-03-27 | |
| CVE-2026-33755 | 8.8 | HIGH | CWE-89 | 0.0% p9 | 6.16 | Group-Office is an enterprise customer relationship management and groupware too...Group-Office is an enterprise customer relationship management and groupware tool. Prior to versions 6.8.158, 25.0.92, and 26.0.17, an authenticated SQL Injection vulnerability in the JMAP `Contact/query` endpoint allows any authenticated user with basic addressbook access to extract arbitrary data from the database — including active session tokens of other users. This enables full account takeover of any user, including the System Administrator, without knowing their password. Versions 6.8.158, 25.0.92, and 26.0.17 fix the issue. |
2026-03-27 | |
| CVE-2026-33750 | 6.5 | MEDIUM | CWE-400 | 0.1% p18 | 4.55 | The brace-expansion library generates arbitrary strings containing a common pref...The brace-expansion library generates arbitrary strings containing a common prefix and suffix. Prior to versions 5.0.5, 3.0.2, 2.0.3, and 1.1.13, a brace pattern with a zero step value (e.g., `{1..2..0}`) causes the sequence generation loop to run indefinitely, making the process hang for seconds and allocate heaps of memory. Versions 5.0.5, 3.0.2, 2.0.3, and 1.1.13 fix the issue. As a workaround, sanitize strings passed to `expand()` to ensure a step value of `0` is not used. |
2026-03-27 | |
| CVE-2026-33748 | 8.2 | HIGH | CWE-22 | 0.0% p5 | 5.74 | BuildKit is a toolkit for converting source code to build artifacts in an effici...BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. Prior to version 0.28.1, insufficient validation of Git URL fragment subdir components may allow access to files outside the checked-out Git repository root. Possible access is limited to files on the same mounted filesystem. The issue has been fixed in version v0.28.1 The issue affects only builds that use Git URLs with a subpath component. As a workaround, avoid building Dockerfiles from untrusted sources or using the subdir component from an untrusted Git repository where the subdir component could point to a symlink. |
2026-03-27 | |
| CVE-2026-33433 | 5.1 | MEDIUM | CWE-290 | 0.0% p5 | 3.57 | Traefik is an HTTP reverse proxy and load balancer. Prior to versions 2.11.42, 3...Traefik is an HTTP reverse proxy and load balancer. Prior to versions 2.11.42, 3.6.11, and 3.7.0-ea.3, when `headerField` is configured with a non-canonical HTTP header name (e.g., `x-auth-user` instead of `X-Auth-User`), an authenticated attacker can inject their own canonical version of that header to impersonate any identity to the backend. The backend receives two header entries — the attacker-injected canonical one is read first, overriding Traefik's non-canonical write. Versions 2.11.42, 3.6.11, and 3.7.0-ea.3 patch the issue. |
2026-03-27 | |
| CVE-2026-33284 | 1.2 | LOW | CWE-20 | 0.1% p26 | 0.84 | GlobaLeaks is free and open-source whistleblowing software. Prior to version 5.0...GlobaLeaks is free and open-source whistleblowing software. Prior to version 5.0.89, the /api/support endpoint of GlobaLeaks performs minimal validation on user-submitted support requests. As a result, arbitrary URLs can be included in support emails sent to administrators. Version 5.0.89 patches the issue. |
2026-03-27 | |
| CVE-2026-33206 | 8.2 | HIGH | CWE-23 | 0.0% p1 | 5.74 | calibre is a cross-platform e-book manager for viewing, converting, editing, and...calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Prior to version 9.6.0, a path traversal vulnerability exists in Calibre' handling of images in Markdown and other similar text-based files allowing an attacker to include arbitrary files from the file system into the converted book. Additionally, missing authentication and server-side request forgery in the background-image endpoint in the ebook reader web view allow the files to be exfiltrated without additional interaction. Version 9.6.0 contains a fix. |
2026-03-27 | |
| CVE-2026-33205 | 4.8 | MEDIUM | CWE-918 | 0.0% p2 | 3.36 | calibre is a cross-platform e-book manager for viewing, converting, editing, and...calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Prior to version 9.6.0, a Server-Side Request Forgery vulnerability in the background-image endpoint of calibre e-book reader's web view allows an attacker to perform blind GET requests to arbitrary URLs and exfiltrate information out from the ebook sandbox. Version 9.6.0 patches the issue. |
2026-03-27 | |
| CVE-2026-30689 | 7.5 | HIGH | CWE-284 | 0.0% p10 | 5.25 | A blog.admin v.8.0 and before system's getinfobytoken API interface contains an ...A blog.admin v.8.0 and before system's getinfobytoken API interface contains an improper access control which leads to sensitive data exposure. Unauthorized parties can obtain sensitive administrator account information via a valid token, threatening system security. |
2026-03-27 | |
| CVE-2026-30637 | 7.5 | HIGH | CWE-918 | 0.1% p29 | 5.25 | Server-Side Request Forgery (SSRF) vulnerability exists in the AnnounContent of ...Server-Side Request Forgery (SSRF) vulnerability exists in the AnnounContent of the /admin/read.php in OTCMS V7.66 and before. The vulnerability allows remote attackers to craft HTTP requests, without authentication, containing a URL pointing to internal services or any remote server |
2026-03-27 | |
| CVE-2026-30407 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: DO NOT USE THIS CVE RECORD. ConsultIDs: none. Reason: This reco...Rejected reason: DO NOT USE THIS CVE RECORD. ConsultIDs: none. Reason: This record was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none. |
2026-03-27 | |
| CVE-2026-30304 | 9.6 | CRITICAL | CWE-20 | 0.1% p19 | 6.72 | In its design for automatic terminal command execution, AI Code offers two optio...In its design for automatic terminal command execution, AI Code offers two options: Execute safe commands and execute all commands. The description for the former states that commands determined by the model to be safe will be automatically executed, whereas if the model judges a command to be potentially destructive, it still requires user approval. However, this design is highly susceptible to prompt injection attacks. An attacker can employ a generic template to wrap any malicious command and mislead the model into misclassifying it as a 'safe' command, thereby bypassing the user approval requirement and resulting in arbitrary command execution. |
2026-03-27 | |
| CVE-2026-30303 | 9.8 | CRITICAL | CWE-78 | 0.4% p59 | 6.87 | The command auto-approval module in Axon Code contains an OS Command Injection v...The command auto-approval module in Axon Code contains an OS Command Injection vulnerability, rendering its whitelist security mechanism ineffective. The vulnerability stems from the incorrect use of an incompatible command parser (the Unix-based shell-quote library) to analyze commands on the Windows platform, coupled with a failure to correctly handle Windows CMD-specific escape sequences (^). Attackers can exploit this discrepancy between the parsing logic and the execution environment by constructing payloads such as git log ^" & malicious_command ^". The Axon Code parser is deceived by the escape characters, misinterpreting the malicious command connector (&) as being within a protected string argument and thus auto-approving the command. However, the underlying Windows CMD interpreter ignores the escaped quotes, parsing and executing the subsequent malicious command directly. This allows attackers to achieve arbitrary Remote Code Execution (RCE) after bypassing what appears to be a legitimate Git whitelist check. |
2026-03-27 | |
| CVE-2026-29871 | 7.5 | HIGH | CWE-22 | 0.1% p28 | 5.25 | A path traversal vulnerability exists in the awesome-llm-apps project in commit ...A path traversal vulnerability exists in the awesome-llm-apps project in commit e46690f99c3f08be80a9877fab52acacf7ab8251 (2026-01-19) in the Beifong AI News and Podcast Agent backend in FastAPI backend, stream-audio endpoint, in file routers/podcast_router.py, in function stream_audio. The stream-audio endpoint accepts a user-controlled path parameter that is concatenated into a filesystem path without proper validation or restriction. An unauthenticated remote attacker can exploit this vulnerability to read arbitrary files from the server filesystem, potentially disclosing sensitive information such as configuration files and credentials. |
2026-03-27 | |
| CVE-2026-28375 | 6.5 | MEDIUM | CWE-400 | 0.0% p3 | 4.55 | A testdata data-source can be used to trigger out-of-memory crashes in Grafana.A testdata data-source can be used to trigger out-of-memory crashes in Grafana. |
2026-03-27 | |
| CVE-2026-27880 | 7.5 | HIGH | CWE-787 | 0.0% p4 | 5.25 | The OpenFeature feature toggle evaluation endpoint reads unbounded values into m...The OpenFeature feature toggle evaluation endpoint reads unbounded values into memory, which can cause out-of-memory crashes. |
2026-03-27 | |
| CVE-2026-27879 | 6.5 | MEDIUM | CWE-787 | 0.0% p3 | 4.55 | A resample query can be used to trigger out-of-memory crashes in Grafana.A resample query can be used to trigger out-of-memory crashes in Grafana. |
2026-03-27 | |
| CVE-2026-1496 | 9.3 | CRITICAL | CWE-639 | 0.1% p29 | 6.51 | Vulnerable versions of Coverity Connect lack an error handler in the authenticat...Vulnerable versions of Coverity Connect lack an error handler in the authentication logic for command line tooling that makes it vulnerable to an authentication bypass. A malicious actor with access to the /token API endpoint that either knows or guesses a valid username, can use this in a specially crafted HTTP request to bypass authentication. Successful exploitation allows the malicious actor to assume all roles and privileges granted to the valid user’s Coverity Connect account. |
2026-03-27 | |
| CVE-2025-69988 | 6.5 | MEDIUM | CWE-284 | 0.0% p6 | 4.55 | BS Producten Petcam 33.1.0.0818 is vulnerable to Incorrect Access Control. An un...BS Producten Petcam 33.1.0.0818 is vulnerable to Incorrect Access Control. An unauthenticated attacker in physical proximity can associate with this open network. Once connected, the attacker gains access to the camera's private network interface and can retrieve sensitive information, including the live video and audio stream, without providing credentials. |
2026-03-27 | |
| CVE-2025-69986 | 7.2 | HIGH | CWE-20 | 0.2% p37 | 5.04 | A buffer overflow vulnerability exists in the ONVIF GetStreamUri function of LSC...A buffer overflow vulnerability exists in the ONVIF GetStreamUri function of LSC Indoor Camera V7.6.32. The application fails to validate the length of the Protocol parameter inside the Transport element. By sending a specially crafted SOAP request containing an oversized protocol string, an attacker can overflow the stack buffer, overwriting the return instruction pointer (RIP). This vulnerability allows for Denial of Service (DoS) via device crash or Remote Code Execution (RCE) in the context of the ONVIF service. |
2026-03-27 | |
| CVE-2025-61190 | 6.1 | MEDIUM | CWE-79 | 0.0% p11 | 4.27 | A Reflected Cross-Site Scripting (XSS) vulnerability has been identified in DSpa...A Reflected Cross-Site Scripting (XSS) vulnerability has been identified in DSpace JSPUI 6.5 within the search/discover filtering functionality. The vulnerability exists due to improper sanitization of user-supplied input via the filter_type_1 parameter. |
2026-03-27 | |
| CVE-2024-11604 | 7.3 | HIGH | CWE-532 | 0.0% p4 | 5.11 | Insertion of Sensitive Information into Log File vulnerability in the SCIM Drive...Insertion of Sensitive Information into Log File vulnerability in the SCIM Driver module in OpenText IDM Driver and Extensions on Windows, Linux, 64 bit allows authenticated local users to obtain sensitive information via access to log files. This issue affects IDM SCIM Driver: 1.0.0.0000 through 1.0.1.0300 and 1.1.0.0000. |
2026-03-27 | |
| CVE-2026-32859 | 5.1 | MEDIUM | CWE-79 | 0.0% p8 | 3.57 | ByteDance Deer-Flow versions prior to commit 5dbb362 contain a stored cross-site...ByteDance Deer-Flow versions prior to commit 5dbb362 contain a stored cross-site scripting vulnerability in the artifacts API that allows attackers to execute arbitrary scripts by uploading malicious HTML or script content as artifacts. Attackers can store malicious content that executes in the browser context when users view artifacts, leading to session compromise, credential theft, and arbitrary script execution. |
2026-03-27 | |
| CVE-2026-32695 | 6.3 | MEDIUM | CWE-74 | 0.0% p2 | 4.41 | Traefik is an HTTP reverse proxy and load balancer. Prior to versions 3.6.11 and...Traefik is an HTTP reverse proxy and load balancer. Prior to versions 3.6.11 and 3.7.0-ea.2, Traefik's Knative provider builds router rules by interpolating user-controlled values into backtick-delimited rule expressions without escaping. In live cluster validation, Knative `rules[].hosts[]` was exploitable for host restriction bypass (for example `tenant.example.com`) || Host(`attacker.com`), producing a router that serves attacker-controlled hosts. Knative `headers[].exact` also allows rule-syntax injection and proves unsafe rule construction. In multi-tenant clusters, this can route unauthorized traffic to victim services and lead to cross-tenant traffic exposure. Versions 3.6.11 and 3.7.0-ea.2 patch the issue. |
2026-03-27 | |
| CVE-2025-13478 | 8.4 | HIGH | CWE-522 | 0.2% p42 | 5.89 | Cache misconfiguration vulnerability in OpenText Identity Manager on Windows, Li...Cache misconfiguration vulnerability in OpenText Identity Manager on Windows, Linux allows remote authenticated users to obtain another user's session data via insecure application cache handling. This issue affects Identity Manager: 25.2(v4.10.1). |
2026-03-27 | |
| CVE-2026-4340 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This can...Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage. |
2026-03-27 | |
| CVE-2026-4622 | 7.1 | HIGH | CWE-78 | 0.4% p61 | 4.98 | OS Command Injection vulnerability in NEC Platforms, Ltd. Aterm Series allows a ...OS Command Injection vulnerability in NEC Platforms, Ltd. Aterm Series allows a attacker to execute arbitrary OS commands via network. |
2026-03-27 | |
| CVE-2026-4621 | 6.3 | MEDIUM | CWE-912 | 0.1% p18 | 4.41 | Hidden Functionality vulnerability in NEC Platforms, Ltd. Aterm Series allows a ...Hidden Functionality vulnerability in NEC Platforms, Ltd. Aterm Series allows a attacker to enable telnet via network. |
2026-03-27 | |
| CVE-2026-4620 | 7.1 | HIGH | CWE-78 | 0.4% p61 | 4.98 | OS Command Injection vulnerability in NEC Platforms, Ltd. Aterm Series allows a ...OS Command Injection vulnerability in NEC Platforms, Ltd. Aterm Series allows a attacker to execute arbitrary OS commands via network. |
2026-03-27 | |
| CVE-2026-4619 | 6.0 | MEDIUM | CWE-22 | 0.1% p17 | 4.20 | Path Traversal vulnerability in NEC Platforms, Ltd. Aterm Series allows a attack...Path Traversal vulnerability in NEC Platforms, Ltd. Aterm Series allows a attacker to wtite over any file via network. |
2026-03-27 | |
| CVE-2026-4309 | 6.3 | MEDIUM | CWE-862 | 0.1% p16 | 4.41 | Missing Authorization vulnerability in NEC Platforms, Ltd. Aterm Series allows a...Missing Authorization vulnerability in NEC Platforms, Ltd. Aterm Series allows a attacker to get a specific device information and change the settings via network. |
2026-03-27 | |
| CVE-2026-3457 | 7.0 | HIGH | CWE-79 | 0.0% p8 | 4.90 | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site ...Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Thales Sentinel LDK Runtime on Windows allows Stored XSS.This issue affects Sentinel LDK Runtime: before 10.22. |
2026-03-27 | |
| CVE-2026-27860 | 3.7 | LOW | CWE-90 | 0.1% p17 | 2.59 | If auth_username_chars is empty, it is possible to inject arbitrary LDAP filter ...If auth_username_chars is empty, it is possible to inject arbitrary LDAP filter to Dovecot's LDAP authentication. This leads to potentially bypassing restrictions and allows probing of LDAP structure. Do not clear out auth_username_chars, or install fixed version. No publicly available exploits are known. |
2026-03-27 | |
| CVE-2026-27859 | 5.3 | MEDIUM | CWE-400 | 0.1% p15 | 3.71 | A mail message containing excessive amount of RFC 2231 MIME parameters causes LM...A mail message containing excessive amount of RFC 2231 MIME parameters causes LMTP to use too much CPU. A suitably formatted mail message causes mail delivery process to consume large amounts of CPU time. Use MTA capabilities to limit RFC 2231 MIME parameters in mail messages, or upgrade to fixed version where the processing is limited. No publicly available exploits are known. |
2026-03-27 | |
| CVE-2026-27857 | 4.3 | MEDIUM | CWE-400 | 0.0% p13 | 3.01 | Sending "NOOP (((...)))" command with 4000 parenthesis open+close results in ~1M...Sending "NOOP (((...)))" command with 4000 parenthesis open+close results in ~1MB extra memory usage. Longer commands will result in client disconnection. This 1 MB can be left allocated for longer time periods by not sending the command ending LF. So attacker could connect possibly from even a single IP and create 1000 connections to allocate 1 GB of memory, which would likely result in reaching VSZ limit and killing the process and its other proxied connections. Attacker could connect possibly from even a single IP and create 1000 connections to allocate 1 GB of memory, which would likely result in reaching VSZ limit and killing the process and its other proxied connections. Install fixed version, there is no other remediation. No publicly available exploits are known. |
2026-03-27 | |
| CVE-2026-27856 | 7.4 | HIGH | CWE-287 | 0.0% p11 | 5.18 | Doveadm credentials are verified using direct comparison which is susceptible to...Doveadm credentials are verified using direct comparison which is susceptible to timing oracle attack. An attacker can use this to determine the configured credentials. Figuring out the credential will lead into full access to the affected component. Limit access to the doveadm http service port, install fixed version. No publicly available exploits are known. |
2026-03-27 | |
| CVE-2026-27855 | 6.8 | MEDIUM | CWE-294 | 0.0% p12 | 4.76 | Dovecot OTP authentication is vulnerable to replay attack under specific conditi...Dovecot OTP authentication is vulnerable to replay attack under specific conditions. If auth cache is enabled, and username is altered in passdb, then OTP credentials can be cached so that same OTP reply is valid. An attacker able to observe an OTP exchange is able to log in as the user. If authentication happens over unsecure connection, switch to SCRAM protocol. Alternatively ensure the communcations are secured, and if possible switch to OAUTH2 or SCRAM. No publicly available exploits are known. |
2026-03-27 | |
| CVE-2026-24031 | 7.7 | HIGH | CWE-89 | 0.1% p20 | 5.39 | Dovecot SQL based authentication can be bypassed when auth_username_chars is cle...Dovecot SQL based authentication can be bypassed when auth_username_chars is cleared by admin. This vulnerability allows bypassing authentication for any user and user enumeration. Do not clear auth_username_chars. If this is not possible, install latest fixed version. No publicly available exploits are known. |
2026-03-27 | |
| CVE-2026-0394 | 5.3 | MEDIUM | CWE-22 | 0.1% p16 | 3.71 | When dovecot has been configured to use per-domain passwd files, and they are pl...When dovecot has been configured to use per-domain passwd files, and they are placed one path component above /etc, or slash has been added to allowed characters, path traversal can happen if the domain component is directory partial. This allows inadvertently reading /etc/passwd (or some other path which ends with passwd). If this file contains passwords, it can be used to authenticate wrongly, or if this is userdb, it can unexpectly make system users appear valid users. Upgrade to fixed version, or use different authentication scheme that does not rely on paths. Alternatively you can also ensure that the per-domain passwd files are in some other location, such as /etc/dovecot/auth/%d. No publicly available exploits are known. |
2026-03-27 | |
| CVE-2025-59032 | 7.5 | HIGH | CWE-20 | 0.1% p21 | 5.25 | ManageSieve AUTHENTICATE command crashes when using literal as SASL initial resp...ManageSieve AUTHENTICATE command crashes when using literal as SASL initial response. This can be used to crash ManageSieve service repeatedly, making it unavailable for other users. Control access to ManageSieve port, or disable the service if it's not needed. Alternatively upgrade to a fixed version. No publicly available exploits are known. |
2026-03-27 | |
| CVE-2025-59031 | 4.3 | MEDIUM | CWE-200 | 0.0% p8 | 3.01 | Dovecot has provided a script to use for attachment to text conversion. This scr...Dovecot has provided a script to use for attachment to text conversion. This script unsafely handles zip-style attachments. Attacker can use specially crafted OOXML documents to cause unintended files on the system to be indexed and subsequently ending up in FTS indexes. Do not use the provided script, instead, use something else like FTS tika. No publicly available exploits are known. |
2026-03-27 | |
| CVE-2025-59028 | 5.3 | MEDIUM | CWE-20 | 0.1% p27 | 3.71 | When sending invalid base64 SASL data, login process is disconnected from the au...When sending invalid base64 SASL data, login process is disconnected from the auth server, causing all active authentication sessions to fail. Invalid BASE64 data can be used to DoS a vulnerable server to break concurrent logins. Install fixed version or disable concurrency in login processes (heavy perfomance penalty on large deployments). No publicly available exploits are known. |
2026-03-27 | |
| CVE-2026-4948 | 5.5 | MEDIUM | CWE-279 | 0.0% p5 | 3.85 | A flaw was found in firewalld. A local unprivileged user can exploit this vulner...A flaw was found in firewalld. A local unprivileged user can exploit this vulnerability by mis-authorizing two runtime D-Bus (Desktop Bus) setters, setZoneSettings2 and setPolicySettings. This mis-authorization allows the user to modify the runtime firewall state without proper authentication, leading to unauthorized changes in network security configurations. |
2026-03-27 | |
| CVE-2026-34353 | 5.9 | MEDIUM | CWE-190 | 0.0% p3 | 4.13 | In OCaml through 4.14.3, Bigarray.reshape allows an integer overflow, and result...In OCaml through 4.14.3, Bigarray.reshape allows an integer overflow, and resultant reading of arbitrary memory, when untrusted data is processed. |
2026-03-27 | |
| CVE-2026-33559 | 5.1 | MEDIUM | CWE-79 | 0.0% p5 | 3.57 | WordPress Plugin "OpenStreetMap" provided by MiKa contains a cross-site scriptin...WordPress Plugin "OpenStreetMap" provided by MiKa contains a cross-site scripting vulnerability. On the site with the affected version of the plugin enabled, a logged-in user with a page-creating/editing privilege can embed some malicious script with a crafted HTTP request. When a victim user accesses this page, the script may be executed in the user's web browser. |
2026-03-27 | |
| CVE-2026-33366 | 6.9 | MEDIUM | CWE-306 | 0.1% p33 | 4.83 | Missing authentication for critical function vulnerability in BUFFALO Wi-Fi rout...Missing authentication for critical function vulnerability in BUFFALO Wi-Fi router products may allow an attacker to forcibly reboot the product without authentication. |
2026-03-27 | |
| CVE-2026-33280 | 8.6 | HIGH | CWE-912 | 0.1% p25 | 6.02 | Hidden functionality issue exists in BUFFALO Wi-Fi router products, which may al...Hidden functionality issue exists in BUFFALO Wi-Fi router products, which may allow an attacker to gain access to the product’s debugging functionality, resulting in the execution of arbitrary OS commands. |
2026-03-27 | |
| CVE-2026-32678 | 8.7 | HIGH | CWE-288 | 0.1% p25 | 6.09 | Authentication bypass issue exists in BUFFALO Wi-Fi router products, which may a...Authentication bypass issue exists in BUFFALO Wi-Fi router products, which may allow an attacker to alter critical configuration settings without authentication. |
2026-03-27 | |
| CVE-2026-32669 | 8.7 | HIGH | CWE-94 | 0.0% p12 | 6.09 | Code injection vulnerability exists in BUFFALO Wi-Fi router products. If this vu...Code injection vulnerability exists in BUFFALO Wi-Fi router products. If this vulnerability is exploited, an arbitrary code may be executed on the products. |
2026-03-27 | |
| CVE-2026-27650 | 8.6 | HIGH | CWE-78 | 0.1% p22 | 6.02 | OS Command Injection vulnerability exists in BUFFALO Wi-Fi router products. If t...OS Command Injection vulnerability exists in BUFFALO Wi-Fi router products. If this vulnerability is exploited, an arbitrary OS command may be executed on the products. |
2026-03-27 | |
| CVE-2026-22744 | 7.5 | HIGH | N/A | 0.0% p12 | 5.25 | In RedisFilterExpressionConverter of spring-ai-redis-store, when a user-controll...In RedisFilterExpressionConverter of spring-ai-redis-store, when a user-controlled string is passed as a filter value for a TAG field, stringValue() inserts the value directly into the @field:{VALUE} RediSearch TAG block without escaping characters.This issue affects Spring AI: from 1.0.0 before 1.0.5, from 1.1.0 before 1.1.4. |
2026-03-27 | |
| CVE-2026-22743 | 7.5 | HIGH | CWE-89 | 0.1% p17 | 5.25 | Spring AI's spring-ai-neo4j-store contains a Cypher injection vulnerability in N...Spring AI's spring-ai-neo4j-store contains a Cypher injection vulnerability in Neo4jVectorFilterExpressionConverter. When a user-controlled string is passed as a filter expression key in Neo4jVectorFilterExpressionConverter of spring-ai-neo4j-store, doKey() embeds the key into a backtick-delimited Cypher property accessor (node.`metadata.`) after stripping only double quotes, without escaping embedded backticks.This issue affects Spring AI: from 1.0.0 before 1.0.5, from 1.1.0 before 1.1.4. |
2026-03-27 | |
| CVE-2026-4910 | 6.9 | MEDIUM | CWE-74 | 0.0% p10 | 4.83 | A security vulnerability has been detected in Shenzhen Ruiming Technology Stream...A security vulnerability has been detected in Shenzhen Ruiming Technology Streamax Crocus up to 1.3.44. Affected is an unknown function of the file /RemoteFormat.do of the component Endpoint. Such manipulation of the argument State leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-27 | |
| CVE-2026-3098 | 6.5 | MEDIUM | CWE-862 | 0.0% p8 | 4.55 | The Smart Slider 3 plugin for WordPress is vulnerable to Arbitrary File Read in ...The Smart Slider 3 plugin for WordPress is vulnerable to Arbitrary File Read in all versions up to, and including, 3.5.1.33 via the 'actionExportAll' function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information. |
2026-03-27 | |
| CVE-2026-4909 | 4.8 | MEDIUM | CWE-79 | 0.0% p9 | 3.36 | A weakness has been identified in code-projects Exam Form Submission 1.0. This i...A weakness has been identified in code-projects Exam Form Submission 1.0. This impacts an unknown function of the file /admin/update_s7.php. This manipulation of the argument sname causes cross site scripting. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be used for attacks. |
2026-03-27 | |
| CVE-2026-4908 | 6.9 | MEDIUM | CWE-74 | 0.0% p10 | 4.83 | A security flaw has been discovered in code-projects Simple Laundry System 1.0. ...A security flaw has been discovered in code-projects Simple Laundry System 1.0. This affects an unknown function of the file /modstaffinfo.php of the component Parameter Handler. The manipulation of the argument userid results in sql injection. The attack may be performed from remote. The exploit has been released to the public and may be used for attacks. |
2026-03-27 | |
| CVE-2026-4907 | 5.3 | MEDIUM | CWE-918 | 0.0% p11 | 3.71 | A vulnerability was identified in Page-Replica Page Replica up to e4a7f52e75093e...A vulnerability was identified in Page-Replica Page Replica up to e4a7f52e75093ee318b4d5a9a9db6751050d2ad0. The impacted element is the function sitemap.fetch of the file /sitemap of the component Endpoint. The manipulation of the argument url leads to server-side request forgery. The attack is possible to be carried out remotely. The exploit is publicly available and might be used. This product adopts a rolling release strategy to maintain continuous delivery. Therefore, version details for affected or updated releases cannot be specified. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-27 | |
| CVE-2026-4906 | 7.4 | HIGH | CWE-119 | 0.1% p23 | 5.18 | A vulnerability was determined in Tenda AC5 15.03.06.47. The affected element is...A vulnerability was determined in Tenda AC5 15.03.06.47. The affected element is the function decodePwd of the file /goform/WizardHandle of the component POST Request Handler. Executing a manipulation of the argument WANT/WANS can lead to stack-based buffer overflow. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized. |
2026-03-27 | |
| CVE-2026-33935 | 7.7 | HIGH | CWE-307 | 0.4% p59 | 5.40 | MyTube is a self-hosted downloader and player for several video websites Prior t...MyTube is a self-hosted downloader and player for several video websites Prior to version 1.8.72, an unauthenticated attacker can lock out administrator and visitor accounts from password-based authentication by triggering failed login attempts. The application exposes three password verification endpoints, all of which are publicly accessible. All three endpoints share a single file-backed login attempt state stored in `login-attempts.json`. When any endpoint records a failed authentication attempt via `recordFailedAttempt()`, the shared login attempt state is updated, increasing the `failedAttempts` counter and adjusting the associated timestamps and cooldown values. Before verifying a password, each endpoint calls `canAttemptLogin()`. This function checks the shared JSON file to determine whether a cooldown period is active. If the cooldown has not expired, the request is rejected before the password is validated. Because the failed attempt counter and cooldown timer are globally shared, failed authentication attempts against any endpoint affect all other endpoints. An attacker can exploit this by repeatedly sending invalid authentication requests to any of these endpoints, incrementing the shared counter and waiting for the cooldown period between attempts. By doing so, the attacker can progressively increase the lockout duration until it reaches 24 hours, effectively preventing legitimate users from authenticating. Once the maximum lockout is reached, the attacker can maintain the denial of service indefinitely by waiting for the cooldown to expire and sending another failed attempt, which immediately triggers another 24-hour lockout if no successful login occurred in the meantime. Version 1.8.72 fixes the vulnerability. |
2026-03-27 | |
| CVE-2026-33890 | 8.9 | HIGH | CWE-284 | 0.3% p50 | 6.24 | MyTube is a self-hosted downloader and player for several video websites Prior t...MyTube is a self-hosted downloader and player for several video websites Prior to version 1.8.71, an unauthenticated attacker can register an arbitrary passkey and subsequently authenticate with it to obtain a full admin session. The application exposes passkey registration endpoints without requiring prior authentication. Any successfully authenticated passkey is automatically granted an administrator token, allowing full administrative access to the application. This enables a complete compromise of the application without requiring any existing credentials. Version 1.8.71 fixes the issue. |
2026-03-27 | |
| CVE-2026-33747 | 8.4 | HIGH | CWE-22 | 0.1% p17 | 5.88 | BuildKit is a toolkit for converting source code to build artifacts in an effici...BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. Prior to version 0.28.1, when using a custom BuildKit frontend, the frontend can craft an API message that causes files to be written outside of the BuildKit state directory for the execution context. The issue has been fixed in v0.28.1. The vulnerability requires using an untrusted BuildKit frontend set with `#syntax` or `--build-arg BUILDKIT_SYNTAX`. Using these options with a well-known frontend image like `docker/dockerfile` is not affected. |
2026-03-27 | |
| CVE-2026-33745 | 7.4 | HIGH | CWE-200 | 0.0% p12 | 5.18 | cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library...cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library. Prior to 0.39.0, the cpp-httplib HTTP client forwards stored Basic Auth, Bearer Token, and Digest Auth credentials to arbitrary hosts when following cross-origin HTTP redirects (301/302/307/308). A malicious or compromised server can redirect the client to an attacker-controlled host, which then receives the plaintext credentials in the `Authorization` header. Version 0.39.0 fixes the issue. |
2026-03-27 | |
| CVE-2026-33744 | 7.8 | HIGH | CWE-94 | 0.0% p1 | 5.46 | BentoML is a Python library for building online serving systems optimized for AI...BentoML is a Python library for building online serving systems optimized for AI apps and model inference. Prior to 1.4.37, the `docker.system_packages` field in `bentofile.yaml` accepts arbitrary strings that are interpolated directly into Dockerfile `RUN` commands without sanitization. Since `system_packages` is semantically a list of OS package names (data), users do not expect values to be interpreted as shell commands. A malicious `bentofile.yaml` achieves arbitrary command execution during `bentoml containerize` / `docker build`. Version 1.4.37 fixes the issue. |
2026-03-27 | |
| CVE-2026-33735 | 7.4 | HIGH | CWE-285 | 0.0% p13 | 5.18 | MyTube is a self-hosted downloader and player for several video websites Prior t...MyTube is a self-hosted downloader and player for several video websites Prior to version 1.8.69, an authorization bypass in the `/api/settings/import-database` endpoint allows attackers with low-privilege credentials to upload and replace the application's SQLite database entirely, leading to a full compromise of the application. The bypass is relevant for other POST routes as well. Version 1.8.69 fixes the issue. |
2026-03-27 | |
| CVE-2026-33730 | 6.5 | MEDIUM | CWE-639 | 0.0% p9 | 4.55 | Open Source Point of Sale (opensourcepos) is a web based point of sale applicati...Open Source Point of Sale (opensourcepos) is a web based point of sale application written in PHP using CodeIgniter framework. Prior to version 3.4.2, an Insecure Direct Object Reference (IDOR) vulnerability allows an authenticated low-privileged user to access the password change functionality of other users, including administrators, by manipulating the `employee_id` parameter. The application does not verify object ownership or enforce authorization checks. Version 3.4.2 adds object-level authorization checks to validate that the current user owns the employee_id being accessed. |
2026-03-27 | |
| CVE-2026-33729 | 5.8 | MEDIUM | CWE-20 | 0.0% p3 | 4.06 | OpenFGA is a high-performance and flexible authorization/permission engine built...OpenFGA is a high-performance and flexible authorization/permission engine built for developers and inspired by Google Zanzibar. In versions prior to 1.13.1, under specific conditions, models using conditions with caching enabled can result in two different check requests producing the same cache key. This can result in OpenFGA reusing an earlier cached result for a different request. Users are affected if the model has relations which rely on condition evaluation andncaching is enabled. OpenFGA v1.13.1 contains a patch. |
2026-03-27 | |
| CVE-2026-33728 | 9.3 | CRITICAL | CWE-502 | 0.8% p73 | 6.53 | dd-trace-java is a Datadog APM client for Java. In versions of dd-trace-java 0.4...dd-trace-java is a Datadog APM client for Java. In versions of dd-trace-java 0.40.0 through prior to 1.60.2, the RMI instrumentation registered a custom endpoint that deserialized incoming data without applying serialization filters. On JDK version 16 and earlier, an attacker with network access to a JMX or RMI port on an instrumented JVM could exploit this to potentially achieve remote code execution. All three of the following conditions must be true to exploit this vulnerability: First, dd-trace-java is attached as a Java agent (`-javaagent`) on Java 16 or earlier. Second, a JMX/RMI port has been explicitly configured via `-Dcom.sun.management.jmxremote.port` and is network-reachable, Third, a gadget-chain-compatible library is present on the classpath. For JDK >= 17, no action is required, but upgrading is strongly encouraged. For JDK >= 8u121 < JDK 17, upgrade to dd-trace-java version 1.60.3 or later. For JDK < 8u121 and earlier where serialization filters are not available, apply the workaround. The workaround is to set the following environment variable to disable the RMI integration: `DD_INTEGRATION_RMI_ENABLED=false`. |
2026-03-27 | |
| CVE-2026-33726 | 5.4 | MEDIUM | CWE-284 | 0.0% p0 | 3.78 | Cilium is a networking, observability, and security solution with an eBPF-based ...Cilium is a networking, observability, and security solution with an eBPF-based dataplane. Prior to versions 1.17.14, 1.18.8, and 1.19.2, Ingress Network Policies are not enforced for traffic from pods to L7 Services (Envoy, GAMMA) with a local backend on the same node, when Per-Endpoint Routing is enabled and BPF Host Routing is disabled. Per-Endpoint Routing is disabled by default, but is automatically enabled in deployments using cloud IPAM, including Cilium ENI on EKS (`eni.enabled`), AlibabaCloud ENI (`alibabacloud.enabled`), Azure IPAM (`azure.enabled`, but not AKS BYOCNI), and some GKE deployments (`gke.enabled`; managed offerings such as GKE Dataplane V2 may use different defaults). It is typically not enabled in tunneled deployments, and chaining deployments are not affected. In practice, Amazon EKS with Cilium ENI mode is likely the most common affected environment. Versions 1.17.14, 1.18.8, and 1.19.2 contain a patch. There is currently no officially verified or comprehensive workaround for this issue. The only option would be to disable per-endpoint routes, but this will likely cause disruptions to ongoing connections, and potential conflicts if running in cloud providers. |
2026-03-27 | |
| CVE-2026-33725 | 7.2 | HIGH | CWE-502 | 0.3% p57 | 5.05 | Metabase is an open source business intelligence and embedded analytics tool. In...Metabase is an open source business intelligence and embedded analytics tool. In Metabase Enterprise prior to versions 1.54.22, 1.55.22, 1.56.22, 1.57.16, 1.58.10, and 1.59.4, authenticated admins on Metabase Enterprise Edition can achieve Remote Code Execution (RCE) and Arbitrary File Read via the `POST /api/ee/serialization/import` endpoint. A crafted serialization archive injects an `INIT` property into the H2 JDBC spec, which can execute arbitrary SQL during a database sync. We confirmed this was possible on Metabase Cloud. This only affects Metabase Enterprise. Metabase OSS lacks the affected codepaths. All versions of Metabase Enterprise that have serialization, which dates back to at least version 1.47, are affected. Metabase Enterprise versions 1.54.22, 1.55.22, 1.56.22, 1.57.16, 1.58.10, and 1.59.4 patch the issue. As a workaround, disable the serialization import endpoint in their Metabase instance to prevent access to the vulnerable codepaths. |
2026-03-27 | |
| CVE-2026-33721 | 5.3 | MEDIUM | CWE-787 | 0.2% p43 | 3.72 | MapServer is a system for developing web-based GIS applications. Starting in ver...MapServer is a system for developing web-based GIS applications. Starting in version 4.2 and prior to version 8.6.1, a heap-buffer-overflow write in MapServer’s SLD (Styled Layer Descriptor) parser lets a remote, unauthenticated attacker crash the MapServer process by sending a crafted SLD with more than 100 Threshold elements inside a ColorMap/Categorize structure (commonly reachable via WMS GetMap with SLD_BODY). Version 8.6.1 patches the issue. |
2026-03-27 | |
| CVE-2026-33718 | 7.6 | HIGH | CWE-78 | 0.4% p62 | 5.33 | OpenHands is software for AI-driven development. Starting in version 1.5.0, a Co...OpenHands is software for AI-driven development. Starting in version 1.5.0, a Command Injection vulnerability exists in the `get_git_diff()` method at `openhands/runtime/utils/git_handler.py:134`. The `path` parameter from the `/api/conversations/{conversation_id}/git/diff` API endpoint is passed unsanitized to a shell command, allowing authenticated attackers to execute arbitrary commands in the agent sandbox. The user is already allowed to instruct the agent to execute commands, but this bypasses the normal channels. Version 1.5.0 fixes the issue. |
2026-03-27 | |
| CVE-2026-33701 | 9.3 | CRITICAL | CWE-502 | 0.4% p60 | 6.52 | OpenTelemetry Java Instrumentation provides OpenTelemetry auto-instrumentation a...OpenTelemetry Java Instrumentation provides OpenTelemetry auto-instrumentation and instrumentation libraries for Java. In versions prior to 2.26.1, the RMI instrumentation registered a custom endpoint that deserialized incoming data without applying serialization filters. On JDK version 16 and earlier, an attacker with network access to a JMX or RMI port on an instrumented JVM could exploit this to potentially achieve remote code execution. All three of the following conditions must be true to exploit this vulnerability: First, OpenTelemetry Java instrumentation is attached as a Java agent (`-javaagent`) on Java 16 or earlier. Second, JMX/RMI port has been explicitly configured via `-Dcom.sun.management.jmxremote.port` and is network-reachable. Third, gadget-chain-compatible library is present on the classpath. This results in arbitrary remote code execution with the privileges of the user running the instrumented JVM. For JDK >= 17, no action is required, but upgrading is strongly encouraged. For JDK < 17, upgrade to version 2.26.1 or later. As a workaround, set the system property `-Dotel.instrumentation.rmi.enabled=false` to disable the RMI integration. |
2026-03-27 | |
| CVE-2026-33699 | 4.6 | MEDIUM | CWE-835 | 0.0% p14 | 3.22 | pypdf is a free and open-source pure-python PDF library. Versions prior to 6.9.2...pypdf is a free and open-source pure-python PDF library. Versions prior to 6.9.2 have a vulnerability in which an attacker can craft a PDF which leads to an infinite loop. This requires reading a file in non-strict mode. This has been fixed in pypdf 6.9.2. If users cannot upgrade yet, consider applying the changes from the patch manually. |
2026-03-27 | |
| CVE-2026-33693 | 6.5 | MEDIUM | CWE-918 | 0.1% p17 | 4.55 | Lemmy is a link aggregator and forum for the fediverse. Prior to version 0.7.0-b...Lemmy is a link aggregator and forum for the fediverse. Prior to version 0.7.0-beta.9, the `v4_is_invalid()` function in `activitypub-federation-rust` (`src/utils.rs`) does not check for `Ipv4Addr::UNSPECIFIED` (0.0.0.0). An unauthenticated attacker controlling a remote domain can point it to 0.0.0.0, bypass the SSRF protection introduced by the fix for CVE-2025-25194 (GHSA-7723-35v7-qcxw), and reach localhost services on the target server. Version 0.7.0-beta.9 patches the issue. |
2026-03-27 | |
| CVE-2026-4905 | 7.4 | HIGH | CWE-119 | 0.1% p23 | 5.18 | A vulnerability was found in Tenda AC5 15.03.06.47. Impacted is the function for...A vulnerability was found in Tenda AC5 15.03.06.47. Impacted is the function formWifiWpsOOB of the file /goform/WifiWpsOOB of the component POST Request Handler. Performing a manipulation of the argument index results in stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been made public and could be used. |
2026-03-27 | |
| CVE-2026-4904 | 7.4 | HIGH | CWE-119 | 0.1% p23 | 5.18 | A vulnerability has been found in Tenda AC5 15.03.06.47. This issue affects the ...A vulnerability has been found in Tenda AC5 15.03.06.47. This issue affects the function formSetCfm of the file /goform/setcfm of the component POST Request Handler. Such manipulation of the argument funcpara1 leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. |
2026-03-27 | |
| CVE-2026-33945 | 9.9 | CRITICAL | CWE-22 | 0.1% p21 | 6.93 | Incus is a system container and virtual machine manager. Incus instances have an...Incus is a system container and virtual machine manager. Incus instances have an option to provide credentials to systemd in the guest. For containers, this is handled through a shared directory. Prior to version 6.23.0, an attacker can set a configuration key named something like `systemd.credential.../../../../../../root/.bashrc` to cause Incus to write outside of the `credentials` directory associated with the container. This makes use of the fact that the Incus syntax for such credentials is `systemd.credential.XYZ` where `XYZ` can itself contain more periods. While it's not possible to read any data this way, it's possible to write to arbitrary files as root, enabling both privilege escalation and denial of service attacks. Version 6.23.0 fixes the issue. |
2026-03-27 | |
| CVE-2026-33697 | 7.5 | HIGH | CWE-322 | 0.0% p0 | 5.25 | Cocos AI is a confidential computing system for AI. The current implementation o...Cocos AI is a confidential computing system for AI. The current implementation of attested TLS (aTLS) in CoCoS is vulnerable to a relay attack affecting all versions from v0.4.0 through v0.8.2. This vulnerability is present in both the AMD SEV-SNP and Intel TDX deployment targets supported by CoCoS. In the affected design, an attacker may be able to extract the ephemeral TLS private key used during the intra-handshake attestation. Because the attestation evidence is bound to the ephemeral key but not to the TLS channel, possession of that key is sufficient to relay or divert the attested TLS session. A client will accept the connection under false assumptions about the endpoint it is communicating with — the attestation report cannot distinguish the genuine attested service from the attacker's relay. This undermines the intended authentication guarantees of attested TLS. A successful attack may allow an attacker to impersonate an attested CoCoS service and access data or operations that the client intended to send only to the genuine attested endpoint. Exploitation requires the attacker to first extract the ephemeral TLS private key, which is possible through physical access to the server hardware, transient execution attacks, or side-channel attacks. Note that the aTLS implementation was fully redesigned in v0.7.0, but the redesign does not address this vulnerability. The relay attack weakness is architectural and affects all releases in the v0.4.0–v0.8.2 range. This vulnerability class was formally analyzed and demonstrated across multiple attested TLS implementations, including CoCoS, by researchers whose findings were disclosed to the IETF TLS Working Group. Formal verification was conducted using ProVerif. As of time of publication, there is no patch available. No complete workaround is available. The following hardening measures reduce but do not eliminate the risk: Keep TEE firmware and microcode up to date to reduce the key-extraction surface; define strict attestation policies that validate all available report fields, including firmware versions, TCB levels, and platform configuration registers; and/or enable mutual aTLS with CA-signed certificates where deployment architecture permits. |
2026-03-27 | |
| CVE-2026-29071 | 3.1 | LOW | CWE-639 | 0.0% p8 | 2.17 | Open WebUI is a self-hosted artificial intelligence platform designed to operate...Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to version 0.8.6, any authenticated user can read other users' private memories via `/api/v1/retrieval/query/collection`. Version 0.8.6 patches the issue. |
2026-03-27 | |
| CVE-2026-29070 | 5.4 | MEDIUM | CWE-862 | 0.0% p11 | 3.78 | Open WebUI is a self-hosted artificial intelligence platform designed to operate...Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to version 0.8.6, an access control check is missing when deleting a file from a knowledge base. The only check being done is that the user has write access to the knowledge base (or is admin), but NOT that the file actually belongs to this knowledge base. It is thus possible to delete arbitrary files from arbitrary knowledge bases (as long as one knows the file id). Version 0.8.6 patches the issue. |
2026-03-27 | |
| CVE-2026-28788 | 7.1 | HIGH | CWE-639 | 0.0% p12 | 4.97 | Open WebUI is a self-hosted artificial intelligence platform designed to operate...Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to version 0.8.6, any authenticated user can overwrite any file's content by ID through the `POST /api/v1/retrieval/process/files/batch` endpoint. The endpoint performs no ownership check, so a regular user with read access to a shared knowledge base can obtain file UUIDs via `GET /api/v1/knowledge/{id}/files` and then overwrite those files, escalating from read to write. The overwritten content is served to the LLM via RAG, meaning the attacker controls what the model tells other users. Version 0.8.6 patches the issue. |
2026-03-27 | |
| CVE-2026-28786 | 4.3 | MEDIUM | CWE-22 | 0.0% p6 | 3.01 | Open WebUI is a self-hosted artificial intelligence platform designed to operate...Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to version 0.8.6, an unsanitized filename field in the speech-to-text transcription endpoint allows any authenticated non-admin user to trigger a `FileNotFoundError` whose message — including the server's absolute `DATA_DIR` path — is returned verbatim in the HTTP 400 response body, confirming information disclosure on all default deployments. Version 0.8.6 patches the issue. |
2026-03-27 | |
| CVE-2026-27893 | 8.8 | HIGH | CWE-693 | 0.0% p9 | 6.16 | vLLM is an inference and serving engine for large language models (LLMs). Starti...vLLM is an inference and serving engine for large language models (LLMs). Starting in version 0.10.1 and prior to version 0.18.0, two model implementation files hardcode `trust_remote_code=True` when loading sub-components, bypassing the user's explicit `--trust-remote-code=False` security opt-out. This enables remote code execution via malicious model repositories even when the user has explicitly disabled remote code trust. Version 0.18.0 patches the issue. |
2026-03-27 | |
| CVE-2026-4903 | 7.4 | HIGH | CWE-119 | 0.1% p23 | 5.18 | A flaw has been found in Tenda AC5 15.03.06.47. This vulnerability affects the f...A flaw has been found in Tenda AC5 15.03.06.47. This vulnerability affects the function formQuickIndex of the file /goform/QuickIndex of the component POST Request Handler. This manipulation of the argument PPPOEPassword causes stack-based buffer overflow. The attack may be initiated remotely. The exploit has been published and may be used. |
2026-03-26 | |
| CVE-2026-4902 | 7.4 | HIGH | CWE-119 | 0.1% p23 | 5.18 | A vulnerability was detected in Tenda AC5 15.03.06.47. This affects the function...A vulnerability was detected in Tenda AC5 15.03.06.47. This affects the function fromAddressNat of the file /goform/addressNat of the component POST Request Handler. The manipulation of the argument page results in stack-based buffer overflow. The attack can be launched remotely. The exploit is now public and may be used. |
2026-03-26 | |
| CVE-2026-34352 | 8.5 | HIGH | CWE-732 | 0.0% p7 | 5.95 | In TigerVNC before 1.16.2, Image.cxx in x0vncserver allows other users to observ...In TigerVNC before 1.16.2, Image.cxx in x0vncserver allows other users to observe or manipulate the screen contents, or cause an application crash, because of incorrect permissions. |
2026-03-26 | |
| CVE-2026-33897 | 9.9 | CRITICAL | CWE-1336 | 0.1% p17 | 6.93 | Incus is a system container and virtual machine manager. Prior to version 6.23.0...Incus is a system container and virtual machine manager. Prior to version 6.23.0, instance template files can be used to cause arbitrary read or writes as root on the host server. Incus allows for pongo2 templates within instances which can be used at various times in the instance lifecycle to template files inside of the instance. This particular implementation of pongo2 within Incus allowed for file read/write but with the expectation that the pongo2 chroot feature would isolate all such access to the instance's filesystem. This was allowed such that a template could theoretically read a file and then generate a new version of said file. Unfortunately the chroot isolation mechanism is entirely skipped by pongo2 leading to easy access to the entire system's filesystem with root privileges. Version 6.23.0 patches the issue. |
2026-03-26 | |
| CVE-2026-33743 | 6.5 | MEDIUM | CWE-770 | 0.0% p14 | 4.55 | Incus is a system container and virtual machine manager. Prior to version 6.23.0...Incus is a system container and virtual machine manager. Prior to version 6.23.0, a specially crafted storage bucket backup can be used by an user with access to Incus' storage bucket feature to crash the Incus daemon. Repeated use of this attack can be used to keep the server offline causing a denial of service of the control plane API. This does not impact any running workload, existing containers and virtual machines will keep operating. Version 6.23.0 fixes the issue. |
2026-03-26 | |
| CVE-2026-33711 | 4.7 | MEDIUM | CWE-61 | 0.0% p1 | 3.29 | Incus is a system container and virtual machine manager. Incus provides an API t...Incus is a system container and virtual machine manager. Incus provides an API to retrieve VM screenshots. That API relies on the use of a temporary file for QEMU to write the screenshot to which is then picked up and sent to the user prior to deletion. As versions prior to 6.23.0 use predictable paths under /tmp for this, an attacker with local access to the system can abuse this mechanism by creating their own symlinks ahead of time. On the vast majority of Linux systems, this will result in a "Permission denied" error when requesting a screenshot. That's because the Linux kernel has a security feature designed to block such attacks, `protected_symlinks`. On the rare systems with this purposefully disabled, it's then possible to trick Incus intro truncating and altering the mode and permissions of arbitrary files on the filesystem, leading to a potential denial of service or possible local privilege escalation. Version 6.23.0 fixes the issue. |
2026-03-26 | |
| CVE-2026-33542 | 5.7 | MEDIUM | CWE-295 | 0.0% p10 | 3.99 | Incus is a system container and virtual machine manager. Prior to version 6.23.0...Incus is a system container and virtual machine manager. Prior to version 6.23.0, a lack of validation of the image fingerprint when downloading from simplestreams image servers opens the door to image cache poisoning and under very narrow circumstances exposes other tenants to running attacker controlled images rather than the expected one. Version 6.23.0 patches the issue. |
2026-03-26 | |
| CVE-2026-4900 | 5.5 | MEDIUM | CWE-425 | 0.0% p12 | 3.85 | A weakness has been identified in code-projects Online Food Ordering System 1.0....A weakness has been identified in code-projects Online Food Ordering System 1.0. This affects an unknown part of the file /dbfood/localhost.sql. This manipulation causes files or directories accessible. The attack can be initiated remotely. The exploit has been made available to the public and could be used for attacks. It is advisable to modify the configuration settings. |
2026-03-26 | |
| CVE-2026-4899 | 4.8 | MEDIUM | CWE-79 | 0.0% p9 | 3.36 | A security flaw has been discovered in code-projects Online Food Ordering System...A security flaw has been discovered in code-projects Online Food Ordering System 1.0. Affected by this issue is some unknown functionality of the file /dbfood/food.php. The manipulation of the argument cuisines results in cross site scripting. It is possible to launch the attack remotely. The exploit has been released to the public and may be used for attacks. |
2026-03-26 | |
| CVE-2026-4898 | 5.3 | MEDIUM | CWE-79 | 0.0% p10 | 3.71 | A vulnerability was identified in code-projects Online Food Ordering System 1.0....A vulnerability was identified in code-projects Online Food Ordering System 1.0. Affected by this vulnerability is an unknown functionality of the file /dbfood/contact.php. The manipulation of the argument Name leads to cross site scripting. It is possible to initiate the attack remotely. The exploit is publicly available and might be used. |
2026-03-26 | |
| CVE-2026-3650 | 8.7 | HIGH | CWE-401 | 0.1% p19 | 6.09 | A memory leak exists in the Grassroots DICOM library (GDCM). The bug occurs when...A memory leak exists in the Grassroots DICOM library (GDCM). The bug occurs when parsing malformed DICOM files with non-standard VR types in file meta information. The vulnerability leads to vast memory allocations and resource depletion, triggering a denial-of-service condition. A maliciously crafted file can fill the heap in a single read operation without properly releasing it. |
2026-03-26 | |
| CVE-2026-33687 | 8.8 | HIGH | CWE-434 | 0.0% p14 | 6.16 | Sharp is a content management framework built for Laravel as a package. Versions...Sharp is a content management framework built for Laravel as a package. Versions prior to 9.20.0 contain a vulnerability in the file upload endpoint that allows authenticated users to bypass all file type restrictions. The upload endpoint within the `ApiFormUploadController` accepts a client-controlled `validation_rule` parameter. This parameter is directly passed into the Laravel validator without sufficient server-side enforcement. By intercepting the request and sending `validation_rule[]=file`, an attacker can completely bypass all MIME type and file extension restrictions. This issue has been addressed in version 9.20.0 by removing the client-controlled validation rules and strictly defining upload rules server-side. As a workaround, ensure that the storage disk used for Sharp uploads is strictly private. Under default configurations, an attacker cannot directly execute uploaded PHP files unless a public disk configuration is explicitly used. |
2026-03-26 | |
| CVE-2026-33686 | 8.8 | HIGH | CWE-22 | 0.1% p21 | 6.16 | Sharp is a content management framework built for Laravel as a package. Versions...Sharp is a content management framework built for Laravel as a package. Versions prior to 9.20.0 have a path traversal vulnerability in the FileUtil class. The application fails to sanitize file extensions properly, allowing path separators to be passed into the storage layer. In `src/Utils/FileUtil.php`, the `FileUtil::explodeExtension()` function extracts a file's extension by splitting the filename at the last dot. This issue has been patched in version 9.20.0 by properly sanitizing the extension using `pathinfo(PATHINFO_EXTENSION)` instead of `strrpos()`, alongside applying strict regex replacements to both the base name and the extension. |
2026-03-26 | |
| CVE-2026-33682 | 4.7 | MEDIUM | CWE-918 | 0.0% p14 | 3.29 | Streamlit is a data oriented application development framework for python. Strea...Streamlit is a data oriented application development framework for python. Streamlit Open Source versions prior to 1.54.0 running on Windows hosts have an unauthenticated Server-Side Request Forgery (SSRF) vulnerability. The vulnerability arises from improper validation of attacker-supplied filesystem paths. In certain code paths, including within the `ComponentRequestHandler`, filesystem paths are resolved using `os.path.realpath()` or `Path.resolve()` before sufficient validation occurs. On Windows systems, supplying a malicious UNC path (e.g., `\\attacker-controlled-host\share`) can cause the Streamlit server to initiate outbound SMB connections over port 445. When Windows attempts to authenticate to the remote SMB server, NTLMv2 challenge-response credentials of the Windows user running the Streamlit process may be transmitted. This behavior may allow an attacker to perform NTLM relay attacks against other internal services and/or identify internally reachable SMB hosts via timing analysis. The vulnerability has been fixed in Streamlit Open Source version 1.54.0. |
2026-03-26 | |
| CVE-2026-33674 | 2.0 | LOW | CWE-1173 | 0.1% p32 | 1.40 | PrestaShop is an open source e-commerce web application. Versions prior to 8.2.5...PrestaShop is an open source e-commerce web application. Versions prior to 8.2.5 and 9.1.0 improperly use the validation framework. Versions 8.2.5 and 9.1.0 contain a fix. No known workarounds are available. |
2026-03-26 | |
| CVE-2026-33673 | 7.6 | HIGH | CWE-79 | 0.0% p10 | 5.32 | PrestaShop is an open source e-commerce web application. Versions prior to 8.2.5...PrestaShop is an open source e-commerce web application. Versions prior to 8.2.5 and 9.1.0 are vulnerable to stored Cross-Site Scripting (stored XSS) vulnerabilities in the BO. An attacker who can inject data into the database, via limited back-office access or a previously existing vulnerability, can exploit unprotected variables in back-office templates. Versions 8.2.5 and 9.1.0 contain a fix. No known workarounds are available. |
2026-03-26 | |
| CVE-2026-33672 | 5.3 | MEDIUM | CWE-1321 | 0.2% p37 | 3.71 | Picomatch is a glob matcher written JavaScript. Versions prior to 4.0.4, 3.0.2, ...Picomatch is a glob matcher written JavaScript. Versions prior to 4.0.4, 3.0.2, and 2.3.2 are vulnerable to a method injection vulnerability affecting the `POSIX_REGEX_SOURCE` object. Because the object inherits from `Object.prototype`, specially crafted POSIX bracket expressions (e.g., `[[:constructor:]]`) can reference inherited method names. These methods are implicitly converted to strings and injected into the generated regular expression. This leads to incorrect glob matching behavior (integrity impact), where patterns may match unintended filenames. The issue does not enable remote code execution, but it can cause security-relevant logic errors in applications that rely on glob matching for filtering, validation, or access control. All users of affected `picomatch` versions that process untrusted or user-controlled glob patterns are potentially impacted. This issue is fixed in picomatch 4.0.4, 3.0.2 and 2.3.2. Users should upgrade to one of these versions or later, depending on their supported release line. If upgrading is not immediately possible, avoid passing untrusted glob patterns to picomatch. Possible mitigations include sanitizing or rejecting untrusted glob patterns, especially those containing POSIX character classes like `[[:...:]]`; avoiding the use of POSIX bracket expressions if user input is involved; and manually patching the library by modifying `POSIX_REGEX_SOURCE` to use a null prototype. |
2026-03-26 | |
| CVE-2026-33671 | 7.5 | HIGH | CWE-1333 | 0.1% p17 | 5.25 | Picomatch is a glob matcher written JavaScript. Versions prior to 4.0.4, 3.0.2, ...Picomatch is a glob matcher written JavaScript. Versions prior to 4.0.4, 3.0.2, and 2.3.2 are vulnerable to Regular Expression Denial of Service (ReDoS) when processing crafted extglob patterns. Certain patterns using extglob quantifiers such as `+()` and `*()`, especially when combined with overlapping alternatives or nested extglobs, are compiled into regular expressions that can exhibit catastrophic backtracking on non-matching input. Applications are impacted when they allow untrusted users to supply glob patterns that are passed to `picomatch` for compilation or matching. In those cases, an attacker can cause excessive CPU consumption and block the Node.js event loop, resulting in a denial of service. Applications that only use trusted, developer-controlled glob patterns are much less likely to be exposed in a security-relevant way. This issue is fixed in picomatch 4.0.4, 3.0.2 and 2.3.2. Users should upgrade to one of these versions or later, depending on their supported release line. If upgrading is not immediately possible, avoid passing untrusted glob patterns to `picomatch`. Possible mitigations include disabling extglob support for untrusted patterns by using `noextglob: true`, rejecting or sanitizing patterns containing nested extglobs or extglob quantifiers such as `+()` and `*()`, enforcing strict allowlists for accepted pattern syntax, running matching in an isolated worker or separate process with time and resource limits, and applying application-level request throttling and input validation for any endpoint that accepts glob patterns. |
2026-03-26 | |
| CVE-2026-33670 | 9.8 | CRITICAL | CWE-22 | 0.1% p18 | 6.86 | SiYuan is a personal knowledge management system. Prior to version 3.6.2, the /a...SiYuan is a personal knowledge management system. Prior to version 3.6.2, the /api/file/readDir interface was used to traverse and retrieve the file names of all documents under a notebook. Version 3.6.2 patches the issue. |
2026-03-26 | |
| CVE-2026-33669 | 9.8 | CRITICAL | CWE-125 | 0.0% p12 | 6.86 | SiYuan is a personal knowledge management system. Prior to version 3.6.2, docume...SiYuan is a personal knowledge management system. Prior to version 3.6.2, document IDs were retrieved via the /api/file/readDir interface, and then the /api/block/getChildBlocks interface was used to view the content of all documents. Version 3.6.2 patches the issue. |
2026-03-26 | |
| CVE-2026-33664 | 7.3 | HIGH | CWE-79 | 0.0% p14 | 5.11 | Kestra is an open-source, event-driven orchestration platform Versions up to and...Kestra is an open-source, event-driven orchestration platform Versions up to and including 1.3.3 render user-supplied flow YAML metadata fields — description, inputs[].displayName, inputs[].description — through the Markdown.vue component instantiated with html: true. The resulting HTML is injected into the DOM via Vue's v-html without any sanitization. This allows a flow author to embed arbitrary JavaScript that executes in the browser of any user who views or interacts with the flow. This is distinct from GHSA-r36c-83hm-pc8j / CVE-2026-29082, which covers only FilePreview.vue rendering .md files from execution outputs. The present finding affects different components, different data sources, and requires significantly less user interaction (zero-click for input.displayName). As of time of publication, it is unclear if a patch is available. |
2026-03-26 | |
| CVE-2026-33661 | 8.6 | HIGH | CWE-290 | 0.1% p25 | 6.02 | Pay is an open-source payment SDK extension package for various Chinese payment ...Pay is an open-source payment SDK extension package for various Chinese payment services. Prior to version 3.7.20, the `verify_wechat_sign()` function in `src/Functions.php` unconditionally skips all signature verification when the PSR-7 request reports `localhost` as the host. An attacker can exploit this by sending a crafted HTTP request to the WeChat Pay callback endpoint with a `Host: localhost` header, bypassing the RSA signature check entirely. This allows forging fake WeChat Pay payment success notifications, potentially causing applications to mark orders as paid without actual payment. Version 3.7.20 fixes the issue. |
2026-03-26 | |
| CVE-2026-33653 | 4.6 | MEDIUM | CWE-79 | 0.0% p8 | 3.22 | Ulloady is a file uploader script with multi-file upload support. A Stored Cross...Ulloady is a file uploader script with multi-file upload support. A Stored Cross-Site Scripting (XSS) vulnerability exists in versions prior to 3.1.2 due to improper sanitization of filenames during the file upload process. An attacker can upload a file with a malicious filename containing JavaScript code, which is later rendered in the application without proper escaping. When the filename is displayed in the file list or file details page, the malicious script executes in the browser of any user who views the page. Version 3.1.2 fixes the issue. |
2026-03-26 | |
| CVE-2026-1556 | 6.9 | MEDIUM | CWE-200 | 0.0% p10 | 4.83 | Information disclosure in the file URI processing of File (Field) Paths in Drupa...Information disclosure in the file URI processing of File (Field) Paths in Drupal File (Field) Paths 7.x prior to 7.1.3 on Drupal 7.x allows authenticated users to disclose other users’ private files via filename‑collision uploads. This can cause hook_node_insert() consumers (for example, email attachment modules) to receive the wrong file URI, bypassing normal access controls on private files. |
2026-03-26 | |
| CVE-2025-12805 | 8.1 | HIGH | CWE-653 | 0.0% p9 | 5.67 | A flaw was found in Red Hat OpenShift AI (RHOAI) llama-stack-operator. This vuln...A flaw was found in Red Hat OpenShift AI (RHOAI) llama-stack-operator. This vulnerability allows unauthorized access to Llama Stack services deployed in other namespaces via direct network requests, because no NetworkPolicy restricts access to the llama-stack service endpoint. As a result, a user in one namespace can access another user’s Llama Stack instance and potentially view or manipulate sensitive data. |
2026-03-26 | |
| CVE-2026-4933 | 7.5 | HIGH | CWE-863 | 0.0% p13 | 5.25 | Incorrect Authorization vulnerability in Drupal Unpublished Node Permissions all...Incorrect Authorization vulnerability in Drupal Unpublished Node Permissions allows Forceful Browsing.This issue affects Unpublished Node Permissions: from 0.0.0 before 1.7.0. |
2026-03-26 | |
| CVE-2026-4393 | 4.3 | MEDIUM | CWE-352 | 0.0% p4 | 3.01 | Cross-Site Request Forgery (CSRF) vulnerability in Drupal Automated Logout allow...Cross-Site Request Forgery (CSRF) vulnerability in Drupal Automated Logout allows Cross Site Request Forgery.This issue affects Automated Logout: from 0.0.0 before 1.7.0, from 2.0.0 before 2.0.2. |
2026-03-26 | |
| CVE-2026-3573 | 7.5 | HIGH | CWE-863 | 0.1% p18 | 5.25 | Incorrect Authorization vulnerability in Drupal AI (Artificial Intelligence) all...Incorrect Authorization vulnerability in Drupal AI (Artificial Intelligence) allows Resource Injection.This issue affects AI (Artificial Intelligence): from 0.0.0 before 1.1.11, from 1.2.0 before 1.2.12. |
2026-03-26 | |
| CVE-2026-3532 | 4.2 | MEDIUM | CWE-178 | 0.0% p9 | 2.94 | Improper Handling of Case Sensitivity vulnerability in Drupal OpenID Connect / O...Improper Handling of Case Sensitivity vulnerability in Drupal OpenID Connect / OAuth client allows Privilege Escalation.This issue affects OpenID Connect / OAuth client: from 0.0.0 before 1.5.0. |
2026-03-26 | |
| CVE-2026-3531 | 6.5 | MEDIUM | CWE-288 | 0.0% p13 | 4.55 | Authentication Bypass Using an Alternate Path or Channel vulnerability in Drupal...Authentication Bypass Using an Alternate Path or Channel vulnerability in Drupal OpenID Connect / OAuth client allows Authentication Bypass.This issue affects OpenID Connect / OAuth client: from 0.0.0 before 1.5.0. |
2026-03-26 | |
| CVE-2026-3530 | 4.3 | MEDIUM | CWE-918 | 0.0% p8 | 3.01 | Server-Side Request Forgery (SSRF) vulnerability in Drupal OpenID Connect / OAut...Server-Side Request Forgery (SSRF) vulnerability in Drupal OpenID Connect / OAuth client allows Server Side Request Forgery.This issue affects OpenID Connect / OAuth client: from 0.0.0 before 1.5.0. |
2026-03-26 | |
| CVE-2026-3529 | 6.1 | MEDIUM | CWE-79 | 0.0% p9 | 4.27 | Improper Neutralization of Input During Web Page Generation ("Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ("Cross-site Scripting") vulnerability in Drupal Google Analytics GA4 allows Cross-Site Scripting (XSS).This issue affects Google Analytics GA4: from 0.0.0 before 1.1.14. |
2026-03-26 | |
| CVE-2026-3528 | 6.1 | MEDIUM | CWE-79 | 0.0% p9 | 4.27 | Improper Neutralization of Input During Web Page Generation ("Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ("Cross-site Scripting") vulnerability in Drupal Calculation Fields allows Cross-Site Scripting (XSS).This issue affects Calculation Fields: from 0.0.0 before 1.0.4. |
2026-03-26 | |
| CVE-2026-3527 | 6.5 | MEDIUM | CWE-306 | 0.0% p12 | 4.55 | Missing Authentication for Critical Function vulnerability in Drupal AJAX Dashbo...Missing Authentication for Critical Function vulnerability in Drupal AJAX Dashboard allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects AJAX Dashboard: from 0.0.0 before 3.1.0. |
2026-03-26 | |
| CVE-2026-3526 | 5.3 | MEDIUM | CWE-863 | 0.0% p11 | 3.71 | Incorrect Authorization vulnerability in Drupal File Access Fix (deprecated) all...Incorrect Authorization vulnerability in Drupal File Access Fix (deprecated) allows Forceful Browsing.This issue affects File Access Fix (deprecated): from 0.0.0 before 1.2.0. |
2026-03-26 | |
| CVE-2026-3525 | 5.3 | MEDIUM | CWE-863 | 0.0% p11 | 3.71 | Incorrect Authorization vulnerability in Drupal File Access Fix (deprecated) all...Incorrect Authorization vulnerability in Drupal File Access Fix (deprecated) allows Forceful Browsing.This issue affects File Access Fix (deprecated): from 0.0.0 before 1.2.0. |
2026-03-26 | |
| CVE-2026-33742 | 5.4 | MEDIUM | CWE-79 | 0.0% p8 | 3.78 | Invoice Ninja is a source-available invoice, quote, project and time-tracking ap...Invoice Ninja is a source-available invoice, quote, project and time-tracking app built with Laravel. Product notes fields in Invoice Ninja v5.13.0 allow raw HTML via Markdown rendering, enabling stored XSS. The Markdown parser output was not sanitized with `purify::clean()` before being included in invoice templates. This is fixed in v5.13.4 by the vendor by adding `purify::clean()` to sanitize Markdown output. |
2026-03-26 | |
| CVE-2026-33738 | 4.8 | MEDIUM | CWE-79 | 0.1% p18 | 3.36 | Lychee is a free, open-source photo-management tool. Prior to version 7.5.3, the...Lychee is a free, open-source photo-management tool. Prior to version 7.5.3, the photo `description` field is stored without HTML sanitization and rendered using `{!! $item->summary !!}` (Blade unescaped output) in the RSS, Atom, and JSON feed templates. The `/feed` endpoint is publicly accessible without authentication, allowing any RSS reader to execute attacker-controlled JavaScript. Version 7.5.3 fixes the issue. |
2026-03-26 | |
| CVE-2026-33645 | 7.1 | HIGH | CWE-22 | 0.1% p20 | 4.97 | Fireshare facilitates self-hosted media and link sharing. In version 1.5.1, an a...Fireshare facilitates self-hosted media and link sharing. In version 1.5.1, an authenticated path traversal vulnerability in Fireshare’s chunked upload endpoint allows an attacker to write arbitrary files outside the intended upload directory. The `checkSum` multipart field is used directly in filesystem path construction without sanitization or containment checks. This enables unauthorized file writes to attacker-chosen paths writable by the Fireshare process (e.g., container `/tmp`), violating integrity and potentially enabling follow-on attacks depending on deployment. Version 1.5.2 fixes the issue. |
2026-03-26 | |
| CVE-2026-33644 | 2.3 | LOW | CWE-918 | 0.0% p8 | 1.61 | Lychee is a free, open-source photo-management tool. Prior to version 7.5.2, the...Lychee is a free, open-source photo-management tool. Prior to version 7.5.2, the SSRF protection in `PhotoUrlRule.php` can be bypassed using DNS rebinding. The IP validation check (line 86-89) only activates when the hostname is an IP address. When a domain name is used, `filter_var($host, FILTER_VALIDATE_IP)` returns `false`, skipping the entire check. Version 7.5.2 patches the issue. |
2026-03-26 | |
| CVE-2026-33640 | 9.1 | CRITICAL | CWE-307 | 0.1% p17 | 6.37 | Outline is a service that allows for collaborative documentation. Outline implem...Outline is a service that allows for collaborative documentation. Outline implements an Email OTP login flow for users not associated with an Identity Provider. Starting in version 0.86.0 and prior to version 1.6.0, Outline does not invalidate OTP codes based on amount or frequency of invalid submissions, rather it relies on the rate limiter to restrict attempts. Consequently, identified bypasses in the rate limiter permit unrestricted OTP code submissions within the codes lifetime. This allows attackers to perform brute force attacks which enable account takeover. Version 1.6.0 fixes the issue. |
2026-03-26 | |
| CVE-2026-33638 | 5.3 | MEDIUM | CWE-862 | 0.1% p22 | 3.71 | Ech0 is an open-source, self-hosted publishing platform for personal idea sharin...Ech0 is an open-source, self-hosted publishing platform for personal idea sharing. Prior to version 4.2.0, `GET /api/allusers` is mounted as a public endpoint and returns user records without authentication. This allows remote unauthenticated user enumeration and exposure of user profile metadata. A fix is available in v4.2.0. |
2026-03-26 | |
| CVE-2026-33635 | 4.3 | MEDIUM | CWE-93 | 0.0% p10 | 3.01 | iCalendar is a Ruby library for dealing with iCalendar files in the iCalendar fo...iCalendar is a Ruby library for dealing with iCalendar files in the iCalendar format defined by RFC-5545. Starting in version 2.0.0 and prior to version 2.12.2, .ics serialization does not properly sanitize URI property values, enabling ICS injection through attacker-controlled input, adding arbitrary calendar lines to the output. `Icalendar::Values::Uri` falls back to the raw input string when `URI.parse` fails and later serializes it with `value.to_s` without removing or escaping `\r` or `\n` characters. That value is embedded directly into the final ICS line by the normal serializer, so a payload containing CRLF can terminate the original property and create a new ICS property or component. (It looks like you can inject via url, source, image, organizer, attach, attendee, conference, tzurl because of this). Applications that generate `.ics` files from partially untrusted metadata are impacted. As a result, downstream calendar clients or importers may process attacker-supplied content as if it were legitimate event data, such as added attendees, modified URLs, alarms, or other calendar fields. Version 2.12.2 contains a patch for the issue. |
2026-03-26 | |
| CVE-2026-33628 | 5.4 | MEDIUM | CWE-79 | 0.0% p11 | 3.78 | Invoice Ninja is a source-available invoice, quote, project and time-tracking ap...Invoice Ninja is a source-available invoice, quote, project and time-tracking app built with Laravel. Invoice line item descriptions in Invoice Ninja v5.13.0 bypass the XSS denylist filter, allowing stored XSS payloads to execute when invoices are rendered in the PDF preview or client portal. The line item description field was not passed through `purify::clean()` before rendering. This is fixed in v5.13.4 by the vendor by adding `purify::clean()` to sanitize line item descriptions. |
2026-03-26 | |
| CVE-2026-33623 | 6.7 | MEDIUM | CWE-78 | 0.1% p22 | 4.69 | PinchTab is a standalone HTTP server that gives AI agents direct control over a ...PinchTab is a standalone HTTP server that gives AI agents direct control over a Chrome browser. PinchTab `v0.8.4` contains a Windows-only command injection issue in the orphaned Chrome cleanup path. When an instance is stopped, the Windows cleanup routine builds a PowerShell `-Command` string using a `needle` derived from the profile path. In `v0.8.4`, that string interpolation escapes backslashes but does not safely neutralize other PowerShell metacharacters. If an attacker can launch an instance using a crafted profile name and then trigger the cleanup path, they may be able to execute arbitrary PowerShell commands on the Windows host in the security context of the PinchTab process user. This is not an unauthenticated internet RCE. It requires authenticated, administrative-equivalent API access to instance lifecycle endpoints, and the resulting command execution inherits the permissions of the PinchTab OS user rather than bypassing host privilege boundaries. Version 0.8.5 contains a patch for the issue. |
2026-03-26 | |
| CVE-2026-33622 | 6.1 | MEDIUM | CWE-94 | 0.1% p22 | 4.27 | PinchTab is a standalone HTTP server that gives AI agents direct control over a ...PinchTab is a standalone HTTP server that gives AI agents direct control over a Chrome browser. PinchTab `v0.8.3` through `v0.8.5` allow arbitrary JavaScript execution through `POST /wait` and `POST /tabs/{id}/wait` when the request uses `fn` mode, even if `security.allowEvaluate` is disabled. `POST /evaluate` correctly enforces the `security.allowEvaluate` guard, which is disabled by default. However, in the affected releases, `POST /wait` accepted a user-controlled `fn` expression, embedded it directly into executable JavaScript, and evaluated it in the browser context without checking the same policy. This is a security-policy bypass rather than a separate authentication bypass. Exploitation still requires authenticated API access, but a caller with the server token can execute arbitrary JavaScript in a tab context even when the operator explicitly disabled JavaScript evaluation. The current worktree fixes this by applying the same policy boundary to `fn` mode in `/wait` that already exists on `/evaluate`, while preserving the non-code wait modes. As of time of publication, a patched version is not yet available. |
2026-03-26 | |
| CVE-2026-33621 | 4.8 | MEDIUM | CWE-290 | 0.0% p15 | 3.36 | PinchTab is a standalone HTTP server that gives AI agents direct control over a ...PinchTab is a standalone HTTP server that gives AI agents direct control over a Chrome browser. PinchTab `v0.7.7` through `v0.8.4` contain incomplete request-throttling protections for auth-checkable endpoints. In `v0.7.7` through `v0.8.3`, a fully implemented `RateLimitMiddleware` existed in `internal/handlers/middleware.go` but was not inserted into the production HTTP handler chain, so requests were not subject to the intended per-IP throttle. In the same pre-`v0.8.4` range, the original limiter also keyed clients using `X-Forwarded-For`, which would have allowed client-controlled header spoofing if the middleware had been enabled. `v0.8.4` addressed those two issues by wiring the limiter into the live handler chain and switching the key to the immediate peer IP, but it still exempted `/health` and `/metrics` from rate limiting even though `/health` remained an auth-checkable endpoint when a token was configured. This issue weakens defense in depth for deployments where an attacker can reach the API, especially if a weak human-chosen token is used. It is not a direct authentication bypass or token disclosure issue by itself. PinchTab is documented as local-first by default and uses `127.0.0.1` plus a generated random token in the recommended setup. PinchTab's default deployment model is a local-first, user-controlled environment between the user and their agents; wider exposure is an intentional operator choice. This lowers practical risk in the default configuration, even though it does not by itself change the intrinsic base characteristics of the bug. This was fully addressed in `v0.8.5` by applying `RateLimitMiddleware` in the production handler chain, deriving the client address from the immediate peer IP instead of trusting forwarded headers by default, and removing the `/health` and `/metrics` exemption so auth-checkable endpoints are throttled as well. |
2026-03-26 | |
| CVE-2026-33620 | 4.3 | MEDIUM | CWE-598 | 0.1% p17 | 3.01 | PinchTab is a standalone HTTP server that gives AI agents direct control over a ...PinchTab is a standalone HTTP server that gives AI agents direct control over a Chrome browser. PinchTab `v0.7.8` through `v0.8.3` accepted the API token from a `token` URL query parameter in addition to the `Authorization` header. When a valid API credential is sent in the URL, it can be exposed through request URIs recorded by intermediaries or client-side tooling, such as reverse proxy access logs, browser history, shell history, clipboard history, and tracing systems that capture full URLs. This issue is an unsafe credential transport pattern rather than a direct authentication bypass. It only affects deployments where a token is configured and a client actually uses the query-parameter form. PinchTab's security guidance already recommended `Authorization: Bearer <token>`, but `v0.8.3` still accepted `?token=` and included first-party flows that generated and consumed URLs containing the token. This was addressed in v0.8.4 by removing query-string token authentication and requiring safer header- or session-based authentication flows. |
2026-03-26 | |
| CVE-2026-33619 | 4.1 | MEDIUM | CWE-918 | 0.0% p8 | 2.87 | PinchTab is a standalone HTTP server that gives AI agents direct control over a ...PinchTab is a standalone HTTP server that gives AI agents direct control over a Chrome browser. PinchTab v0.8.3 contains a server-side request forgery issue in the optional scheduler's webhook delivery path. When a task is submitted to `POST /tasks` with a user-controlled `callbackUrl`, the v0.8.3 scheduler sends an outbound HTTP `POST` to that URL when the task reaches a terminal state. In that release, the webhook path validated only the URL scheme and did not reject loopback, private, link-local, or other non-public destinations. Because the v0.8.3 implementation also used the default HTTP client behavior, redirects were followed and the destination was not pinned to validated IPs. This allowed blind SSRF from the PinchTab server to attacker-chosen HTTP(S) targets reachable from the server. This issue is narrower than a general unauthenticated internet-facing SSRF. The scheduler is optional and off by default, and in token-protected deployments the attacker must already be able to submit tasks using the server's master API token. In PinchTab's intended deployment model, that token represents administrative control rather than a low-privilege role. Tokenless deployments lower the barrier further, but that is a separate insecure configuration state rather than impact created by the webhook bug itself. PinchTab's default deployment model is local-first and user-controlled, with loopback bind and token-based access in the recommended setup. That lowers practical risk in default use, even though it does not remove the underlying webhook issue when the scheduler is enabled and reachable. This was addressed in v0.8.4 by validating callback targets before dispatch, rejecting non-public IP ranges, pinning delivery to validated IPs, disabling redirect following, and validating `callbackUrl` during task submission. |
2026-03-26 | |
| CVE-2026-33545 | 5.3 | MEDIUM | CWE-89 | 0.0% p9 | 3.71 | MobSF is a mobile application security testing tool used. Prior to version 4.4.6...MobSF is a mobile application security testing tool used. Prior to version 4.4.6, MobSF's `read_sqlite()` function in `mobsf/MobSF/utils.py` (lines 542-566) uses Python string formatting (`%`) to construct SQL queries with table names read from a SQLite database's `sqlite_master` table. When a security analyst uses MobSF to analyze a malicious mobile application containing a crafted SQLite database, attacker-controlled table names are interpolated directly into SQL queries without parameterization or escaping. This allows an attacker to cause denial of service and achieve SQL injection. Version 4.4.6 patches the issue. |
2026-03-26 | |
| CVE-2026-33541 | 6.5 | MEDIUM | CWE-400 | 0.0% p15 | 4.55 | TSPortal is the WikiTide Foundation’s in-house platform used by the Trust and Sa...TSPortal is the WikiTide Foundation’s in-house platform used by the Trust and Safety team to manage reports, investigations, appeals, and transparency work. Prior to version 34, a flaw in TSPortal allowed attackers to create arbitrary user records in the database by abusing validation logic. While validation correctly rejected invalid usernames, a side effect within a validation rule caused user records to be created regardless of whether the request succeeded. This could be exploited to cause uncontrolled database growth, leading to a potential denial of service (DoS). Version 34 contains a fix for the issue. |
2026-03-26 | |
| CVE-2026-33537 | 5.3 | MEDIUM | CWE-918 | 0.0% p8 | 3.71 | Lychee is a free, open-source photo-management tool. The patch introduced for GH...Lychee is a free, open-source photo-management tool. The patch introduced for GHSA-cpgw-wgf3-xc6v (SSRF via `Photo::fromUrl`) contains an incomplete IP validation check that fails to block loopback addresses and link-local addresses. Prior to version 7.5.1, an authenticated user can still reach internal services using direct IP addresses, bypassing all four protection configuration settings even when they are set to their secure defaults. Version 7.5.1 contains a fix for the issue. |
2026-03-26 | |
| CVE-2026-33375 | 6.5 | MEDIUM | CWE-400 | 0.0% p3 | 4.55 | The Grafana MSSQL data source plugin contains a logic flaw that allows a low-pri...The Grafana MSSQL data source plugin contains a logic flaw that allows a low-privileged user (Viewer) to bypass API restrictions and trigger a catastrophic Out-Of-Memory (OOM) memory exhaustion, crashing the host container. |
2026-03-26 | |
| CVE-2026-2272 | 4.3 | MEDIUM | CWE-190 | 0.1% p24 | 3.01 | A flaw was found in GIMP. An integer overflow vulnerability exists when processi...A flaw was found in GIMP. An integer overflow vulnerability exists when processing ICO image files, specifically in the `ico_read_info` and `ico_read_icon` functions. This issue arises because a size calculation for image buffers can wrap around due to a 32-bit integer evaluation, allowing oversized image headers to bypass security checks. A remote attacker could exploit this by providing a specially crafted ICO file, leading to a buffer overflow and memory corruption, which may result in an application level denial of service. |
2026-03-26 | |
| CVE-2026-2271 | 3.3 | LOW | CWE-190 | 0.1% p27 | 2.31 | A flaw was found in GIMP's PSP (Paint Shop Pro) file parser. A remote attacker c...A flaw was found in GIMP's PSP (Paint Shop Pro) file parser. A remote attacker could exploit an integer overflow vulnerability in the read_creator_block() function by providing a specially crafted PSP image file. This vulnerability occurs when a 32-bit length value from the file is used for memory allocation without proper validation, leading to a heap overflow and an out-of-bounds write. Successful exploitation could result in an application level denial of service. |
2026-03-26 | |
| CVE-2026-2239 | 2.8 | LOW | CWE-170 | 0.0% p5 | 1.96 | A flaw was found in GIMP. Heap-buffer-overflow vulnerability exists in the fread...A flaw was found in GIMP. Heap-buffer-overflow vulnerability exists in the fread_pascal_string function when processing a specially crafted PSD (Photoshop Document) file. This occurs because the buffer allocated for a Pascal string is not properly null-terminated, leading to an out-of-bounds read when strlen() is subsequently called. Successfully exploiting this vulnerability can cause the application to crash, resulting in an application level Denial of Service. |
2026-03-26 | |
| CVE-2026-2100 | 5.3 | MEDIUM | CWE-824 | 0.1% p31 | 3.71 | A flaw was found in p11-kit. A remote attacker could exploit this vulnerability ...A flaw was found in p11-kit. A remote attacker could exploit this vulnerability by calling the C_DeriveKey function on a remote token with specific IBM kyber or IBM btc derive mechanism parameters set to NULL. This could lead to the RPC-client attempting to return an uninitialized value, potentially resulting in a NULL dereference or undefined behavior. This issue may cause an application level denial of service or other unpredictable system states. |
2026-03-26 | |
| CVE-2026-21724 | 5.4 | MEDIUM | CWE-285 | 0.0% p8 | 3.78 | A vulnerability has been discovered in Grafana OSS where an authorization bypass...A vulnerability has been discovered in Grafana OSS where an authorization bypass in the provisioning contact points API allows users with Editor role to modify protected webhook URLs without the required alert.notifications.receivers.protected:write permission. |
2026-03-26 | |
| CVE-2026-0968 | 3.1 | LOW | CWE-476 | 0.0% p11 | 2.17 | A flaw was found in libssh in which a malicious SFTP (SSH File Transfer Protocol...A flaw was found in libssh in which a malicious SFTP (SSH File Transfer Protocol) server can exploit this by sending a malformed 'longname' field within an `SSH_FXP_NAME` message during a file listing operation. This missing null check can lead to reading beyond allocated memory on the heap. This can cause unexpected behavior or lead to a denial of service (DoS) due to application crashes. |
2026-03-26 | |
| CVE-2026-0967 | 5.5 | MEDIUM | CWE-1333 | 0.1% p24 | 3.85 | A flaw was found in libssh. A remote attacker, by controlling client configurati...A flaw was found in libssh. A remote attacker, by controlling client configuration files or known_hosts files, could craft specific hostnames that when processed by the `match_pattern()` function can lead to inefficient regular expression backtracking. This can cause timeouts and resource exhaustion, resulting in a Denial of Service (DoS) for the client. |
2026-03-26 | |
| CVE-2026-0965 | 3.3 | LOW | CWE-73 | 0.0% p3 | 2.31 | A flaw was found in libssh where it can attempt to open arbitrary files during c...A flaw was found in libssh where it can attempt to open arbitrary files during configuration parsing. A local attacker can exploit this by providing a malicious configuration file or when the system is misconfigured. This vulnerability could lead to a Denial of Service (DoS) by causing the system to try and access dangerous files, such as block devices or large system files, which can disrupt normal operations. |
2026-03-26 | |
| CVE-2026-33632 | 8.4 | HIGH | CWE-862 | 0.0% p2 | 5.88 | ClearanceKit intercepts file-system access events on macOS and enforces per-proc...ClearanceKit intercepts file-system access events on macOS and enforces per-process access policies. Prior to version 4.2.4, two file operation event types — ES_EVENT_TYPE_AUTH_EXCHANGEDATA and ES_EVENT_TYPE_AUTH_CLONE — were not intercepted by ClearanceKit's opfilter system extension, allowing local processes to bypass file access policies. Commit 6181c4a patches the vulnerability by subscribing to both event types and routing them through the existing policy evaluator. Users must upgrade to v4.2.4 or later and reactivate the system extension. |
2026-03-26 | |
| CVE-2026-33631 | 8.7 | HIGH | CWE-862 | 0.0% p2 | 6.09 | ClearanceKit intercepts file-system access events on macOS and enforces per-proc...ClearanceKit intercepts file-system access events on macOS and enforces per-process access policies. In versions on the 4.1 branch and earlier, the opfilter Endpoint Security system extension enforced file access policy exclusively by intercepting ES_EVENT_TYPE_AUTH_OPEN events. Seven additional file operation event types were not intercepted, allowing any locally running process to bypass the configured FAA policy without triggering a denial. Commit a3d1733 adds subscriptions for all seven event types and routes them through the existing FAA policy evaluator. AUTH_RENAME and AUTH_UNLINK additionally preserve XProtect change detection: events on the XProtect path are allowed and trigger the existing onXProtectChanged callback rather than being evaluated against user policy. All versions on the 4.2 branch contain the fix. No known workarounds are available. |
2026-03-26 | |
| CVE-2026-33536 | 5.1 | MEDIUM | CWE-121 | 0.0% p4 | 3.57 | ImageMagick is free and open-source software used for editing and manipulating d...ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to 7.1.2-18 and 6.9.13-43, due to an incorrect return value on certain platforms a pointer is incremented past the end of a buffer that is on the stack and that could result in an out of bounds write. Versions 7.1.2-18 and 6.9.13-43 patch the issue. |
2026-03-26 | |
| CVE-2026-33535 | 4.0 | MEDIUM | CWE-787 | 0.0% p2 | 2.80 | ImageMagick is free and open-source software used for editing and manipulating d...ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to 7.1.2-18 and 6.9.13-43, an out-of-bounds write of a zero byte exists in the X11 `display` interaction path that could lead to a crash. Versions 7.1.2-18 and 6.9.13-43 patch the issue. |
2026-03-26 | |
| CVE-2026-33532 | 4.3 | MEDIUM | CWE-674 | 0.1% p16 | 3.01 | `yaml` is a YAML parser and serialiser for JavaScript. Parsing a YAML document w...`yaml` is a YAML parser and serialiser for JavaScript. Parsing a YAML document with a version of `yaml` on the 1.x branch prior to 1.10.3 or on the 2.x branch prior to 2.8.3 may throw a RangeError due to a stack overflow. The node resolution/composition phase uses recursive function calls without a depth bound. An attacker who can supply YAML for parsing can trigger a `RangeError: Maximum call stack size exceeded` with a small payload (~2–10 KB). The `RangeError` is not a `YAMLParseError`, so applications that only catch YAML-specific errors will encounter an unexpected exception type. Depending on the host application's exception handling, this can fail requests or terminate the Node.js process. Flow sequences allow deep nesting with minimal bytes (2 bytes per level: one `[` and one `]`). On the default Node.js stack, approximately 1,000–5,000 levels of nesting (2–10 KB input) exhaust the call stack. The exact threshold is environment-dependent (Node.js version, stack size, call stack depth at invocation). Note: the library's `Parser` (CST phase) uses a stack-based iterative approach and is not affected. Only the compose/resolve phase uses actual call-stack recursion. All three public parsing APIs are affected: `YAML.parse()`, `YAML.parseDocument()`, and `YAML.parseAllDocuments()`. Versions 1.10.3 and 2.8.3 contain a patch. |
2026-03-26 | |
| CVE-2026-33531 | 4.9 | MEDIUM | CWE-89 | 0.0% p10 | 3.43 | InvenTree is an Open Source Inventory Management System. Prior to version 1.2.6,...InvenTree is an Open Source Inventory Management System. Prior to version 1.2.6, a path traversal vulnerability in the report template engine allows a staff-level user to read arbitrary files from the server filesystem via crafted template tags. Affected functions: `encode_svg_image()`, `asset()`, and `uploaded_image()` in `src/backend/InvenTree/report/templatetags/report.py`. This requires staff access (to upload / edit templates with maliciously crafted tags). If the InvenTree installation is configured with high access privileges on the host system, this path traversal may allow file access outside of the InvenTree source directory. This issue is patched in version 1.2.6, and 1.3.0 (or above). Users should update to the patched versions. No known workarounds are available. |
2026-03-26 | |
| CVE-2026-33530 | 7.7 | HIGH | CWE-202 | 0.0% p8 | 5.39 | InvenTree is an Open Source Inventory Management System. Prior to version 1.2.6,...InvenTree is an Open Source Inventory Management System. Prior to version 1.2.6, certain API endpoints associated with bulk data operations can be hijacked to exfiltrate sensitive information from the database. The bulk operation API endpoints (e.g. `/api/part/`, `/api/stock/`, `/api/order/so/allocation/`, and others) accept a filters parameter that is passed directly to Django's ORM queryset.filter(**filters) without any field allowlisting. This enables any authenticated user to traverse model relationships using Django's __ lookup syntax and perform blind boolean-based data extraction. This issue is patched in version 1.2.6, and 1.3.0 (or above). Users should update to the patched versions. No known workarounds are available. |
2026-03-26 | |
| CVE-2026-33529 | 3.3 | LOW | CWE-22 | 0.1% p19 | 2.31 | Zoraxy is a general purpose HTTP reverse proxy and forwarding tool. Prior to ver...Zoraxy is a general purpose HTTP reverse proxy and forwarding tool. Prior to version 3.3.2, an authenticated path traversal vulnerability in the configuration import endpoint allows an authenticated user to write arbitrary files outside the config directory, which can lead to RCE by creating a plugin. Version 3.3.2 patches the issue. |
2026-03-26 | |
| CVE-2026-33528 | 6.5 | MEDIUM | CWE-22 | 0.1% p24 | 4.55 | GoDoxy is a reverse proxy and container orchestrator for self-hosters. Prior to ...GoDoxy is a reverse proxy and container orchestrator for self-hosters. Prior to version 0.27.5, the file content API endpoint at `/api/v1/file/content` is vulnerable to path traversal. The `filename` query parameter is passed directly to `path.Join(common.ConfigBasePath, filename)` where `ConfigBasePath = "config"` (a relative path). No sanitization or validation is applied beyond checking that the field is non-empty (`binding:"required"`). An authenticated attacker can use `../` sequences to read or write files outside the intended `config/` directory, including TLS private keys, OAuth refresh tokens, and any file accessible to the container's UID. Version 0.27.5 fixes the issue. |
2026-03-26 | |
| CVE-2026-33525 | 0.5 | LOW | CWE-79 | 0.1% p19 | 0.35 | Authelia is an open-source authentication and authorization server providing two...Authelia is an open-source authentication and authorization server providing two-factor authentication and single sign-on (SSO) for applications via a web portal. In version 4.39.15, an attacker may potentially be able to inject javascript into the Authelia login page if several conditions are met simultaneously. Unless both the `script-src` and `connect-src` directives have been modified it's almost impossible for this to have a meaningful impact. However if both of these are and they are done so without consideration to their potential impact; there is a are situations where this vulnerability could be exploited. This is caused to the lack of neutralization of the `langauge` cookie value when rendering the HTML template. This vulnerability is likely difficult to discover though fingerprinting due to the way Authelia is designed but it should not be considered impossible. The additional requirement to identify the secondary application is however likely to be significantly harder to identify along side this, but also likely easier to fingerprint. Users should upgrade to 4.39.16 or downgrade to 4.39.14 to mitigate the issue. The overwhelming majority of installations will not be affected and no workarounds are necessary. The default value for the Content Security Policy makes exploiting this weakness completely impossible. It's only possible via the deliberate removal of the Content Security Policy or deliberate inclusion of clearly noted unsafe policies. |
2026-03-26 | |
| CVE-2026-32287 | 7.5 | HIGH | N/A | 0.1% p18 | 5.25 | Boolean XPath expressions that evaluate to true can cause an infinite loop in lo...Boolean XPath expressions that evaluate to true can cause an infinite loop in logicalQuery.Select, leading to 100% CPU usage. This can be triggered by top-level selectors such as "1=1" or "true()". |
2026-03-26 | |
| CVE-2026-32286 | 7.5 | HIGH | N/A | 0.1% p18 | 5.25 | The DataRow.Decode function fails to properly validate field lengths. A maliciou...The DataRow.Decode function fails to properly validate field lengths. A malicious or compromised PostgreSQL server can send a DataRow message with a negative field length, causing a slice bounds out of range panic. |
2026-03-26 | |
| CVE-2026-32285 | 7.5 | HIGH | N/A | 0.1% p17 | 5.25 | The Delete function fails to properly validate offsets when processing malformed...The Delete function fails to properly validate offsets when processing malformed JSON input. This can lead to a negative slice index and a runtime panic, allowing a denial of service attack. |
2026-03-26 | |
| CVE-2026-32284 | 7.5 | HIGH | N/A | 0.1% p17 | 5.25 | The msgpack decoder fails to properly validate the input buffer length when proc...The msgpack decoder fails to properly validate the input buffer length when processing truncated fixext data (format codes 0xd4-0xd8). This can lead to an out-of-bounds read and a runtime panic, allowing a denial of service attack. |
2026-03-26 | |
| CVE-2026-2436 | 6.5 | MEDIUM | CWE-825 | 0.1% p32 | 4.55 | A flaw was found in libsoup's SoupServer. A remote attacker could exploit a use-...A flaw was found in libsoup's SoupServer. A remote attacker could exploit a use-after-free vulnerability where the `soup_server_disconnect()` function frees connection objects prematurely, even if a TLS handshake is still pending. If the handshake completes after the connection object has been freed, a dangling pointer is accessed, leading to a server crash and a Denial of Service. |
2026-03-26 | |
| CVE-2023-7338 | 7.7 | HIGH | CWE-78 | 0.3% p48 | 5.40 | Ruckus Unleashed contains a remote code execution vulnerability in the web-based...Ruckus Unleashed contains a remote code execution vulnerability in the web-based management interface that allows authenticated remote attackers to execute arbitrary code on the system when gateway mode is enabled. Attackers can exploit this vulnerability by sending specially crafted requests through the management interface to achieve arbitrary code execution on affected systems. |
2026-03-26 | |
| CVE-2021-4474 | 6.9 | MEDIUM | CWE-552 | 0.1% p15 | 4.83 | Ruckus Access Point products contain an arbitrary file read vulnerability in the...Ruckus Access Point products contain an arbitrary file read vulnerability in the command-line interface that allows authenticated remote attackers with administrative privileges to read arbitrary files from the underlying filesystem. Attackers can exploit this vulnerability to access sensitive information including configuration files, credentials, and system data stored on the device. |
2026-03-26 | |
| CVE-2026-3190 | 4.3 | MEDIUM | CWE-280 | 0.0% p8 | 3.01 | A flaw was found in Keycloak. The User-Managed Access (UMA) 2.0 Protection API e...A flaw was found in Keycloak. The User-Managed Access (UMA) 2.0 Protection API endpoint for permission tickets fails to enforce the `uma_protection` role check. This allows any authenticated user with a token issued for a resource server client, even without the `uma_protection` role, to enumerate all permission tickets in the system. This vulnerability partial leads to information disclosure. |
2026-03-26 | |
| CVE-2026-3121 | 6.5 | MEDIUM | CWE-266 | 0.0% p8 | 4.55 | A flaw was found in Keycloak. An administrator with `manage-clients` permission ...A flaw was found in Keycloak. An administrator with `manage-clients` permission can exploit a misconfiguration where this permission is equivalent to `manage-permissions`. This allows the administrator to escalate privileges and gain control over roles, users, or other administrative functions within the realm. This privilege escalation can occur when admin permissions are enabled at the realm level. |
2026-03-26 | |
| CVE-2026-33506 | 8.8 | HIGH | CWE-87 | 0.1% p22 | 6.16 | Ory Polis, formerly known as BoxyHQ Jackson, bridges or proxies a SAML login flo...Ory Polis, formerly known as BoxyHQ Jackson, bridges or proxies a SAML login flow to OAuth 2.0 or OpenID Connect. Versions prior to 26.2.0 contain a DOM-based Cross-Site Scripting (XSS) vulnerability in Ory Polis's login functionality. The application improperly trusts a URL parameter (`callbackUrl`), which is passed to `router.push`. An attacker can craft a malicious link that, when opened by an authenticated user (or an unauthenticated user that later logs in), performs a client-side redirect and executes arbitrary JavaScript in the context of their browser. This could lead to credential theft, internal network pivoting, and unauthorized actions performed on behalf of the victim. Version 26.2.0 contains a patch for the issue. |
2026-03-26 | |
| CVE-2026-33505 | 7.2 | HIGH | CWE-89 | 0.0% p5 | 5.04 | Ory Keto is am open source authorization server for managing permissions at scal...Ory Keto is am open source authorization server for managing permissions at scale. Prior to version 26.2.0, the GetRelationships API in Ory Keto is vulnerable to SQL injection due to flaws in its pagination implementation. Pagination tokens are encrypted using the secret configured in `secrets.pagination`. An attacker who knows this secret can craft their own tokens, including malicious tokens that lead to SQL injection. If this configuration value is not set, Keto falls back to a hard-coded default pagination encryption secret. Because this default value is publicly known, attackers can generate valid and malicious pagination tokens manually for installations where this secret is not set. This issue can be exploited when GetRelationships API is directly or indirectly accessible to the attacker, the attacker can pass a raw pagination token to the affected API, and the configuration value `secrets.pagination` is not set or known to the attacker. An attacker can execute arbitrary SQL queries through forged pagination tokens. As a first line of defense, immediately configure a custom value for `secrets.pagination` by generating a cryptographically secure random secret. Next, upgrade Keto to a fixed version, 26.2.0 or later, as soon as possible. |
2026-03-26 | |
| CVE-2026-33491 | 7.8 | HIGH | CWE-121 | 0.0% p1 | 5.46 | Zen C is a systems programming language that compiles to human-readable GNU C/C1...Zen C is a systems programming language that compiles to human-readable GNU C/C11. Prior to version 0.4.4, a stack-based buffer overflow vulnerability in the Zen C compiler allows attackers to cause a compiler crash or potentially execute arbitrary code by providing a specially crafted Zen C source file (`.zc`) with excessively long struct, function, or trait identifiers. Users are advised to update to Zen C version v0.4.4 or later to receive a patch. |
2026-03-26 | |
| CVE-2026-33153 | 7.7 | HIGH | CWE-89 | 0.0% p11 | 5.39 | Tandoor Recipes is an application for managing recipes, planning meals, and buil...Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. In versions prior to 2.6.0, the Recipe API endpoint exposes a hidden `?debug=true` query parameter that returns the complete raw SQL query being executed, including all table names, column names, JOIN relationships, WHERE conditions (revealing access control logic), and multi-tenant space IDs. This parameter works even when Django's `DEBUG=False` (production mode) and is accessible to any authenticated user regardless of their privilege level. This allows a low-privilege attacker to map the entire database schema and reverse-engineer the authorization model. Version 2.6.0 patches the issue. |
2026-03-26 | |
| CVE-2026-33152 | 9.1 | CRITICAL | CWE-307 | 0.1% p21 | 6.37 | Tandoor Recipes is an application for managing recipes, planning meals, and buil...Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. In versions prior to 2.6.0, Tandoor Recipes configures Django REST Framework with BasicAuthentication as one of the default authentication backends. The AllAuth rate limiting configuration (ACCOUNT_RATE_LIMITS: login: 5/m/ip) only applies to the HTML-based login endpoint at /accounts/login/. Any API endpoint that accepts authenticated requests can be targeted via Authorization: Basic headers with zero rate limiting, zero account lockout, and unlimited attempts. An attacker can perform high-speed password guessing against any known username. Version 2.6.0 patches the issue. |
2026-03-26 | |
| CVE-2026-33149 | 8.1 | HIGH | CWE-644 | 0.0% p8 | 5.67 | Tandoor Recipes is an application for managing recipes, planning meals, and buil...Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. Versions up to and including 2.5.3 set ALLOWED_HOSTS = '*' by default, which causes Django to accept any value in the HTTP Host header without validation. The application uses request.build_absolute_uri() to generate absolute URLs in multiple contexts, including invite link emails, API pagination, and OpenAPI schema generation. An attacker who can send requests to the application with a crafted Host header can manipulate all server-generated absolute URLs. The most critical impact is invite link poisoning: when an admin creates an invite and the application sends the invite email, the link points to the attacker's server instead of the real application. When the victim clicks the link, the invite token is sent to the attacker, who can then use it at the real application. As of time of publication, it is unknown if a patched version is available. |
2026-03-26 | |
| CVE-2026-33148 | 6.5 | MEDIUM | CWE-74 | 0.1% p15 | 4.55 | Tandoor Recipes is an application for managing recipes, planning meals, and buil...Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. In versions prior to 2.6.0, the FDC (USDA FoodData Central) search endpoint constructs an upstream API URL by directly interpolating the user-supplied `query` parameter into the URL string without URL-encoding. An attacker can inject additional URL parameters by including `&` characters in the query value. This allows overriding the API key, manipulating upstream query behavior, and causing server crashes (HTTP 500) via malformed requests — a Denial of Service condition. Version 2.6.0 patches the issue. |
2026-03-26 | |
| CVE-2026-30463 | 7.7 | HIGH | CWE-89 | 0.0% p10 | 5.39 | Daylight Studio FuelCMS v1.5.2 was discovered to contain a SQL injection vulnera...Daylight Studio FuelCMS v1.5.2 was discovered to contain a SQL injection vulnerability via the /controllers/Login.php component. |
2026-03-26 | |
| CVE-2026-30458 | 9.1 | CRITICAL | CWE-620 | 0.0% p11 | 6.37 | An issue in Daylight Studio FuelCMS v1.5.2 allows attackers to exfiltrate users'...An issue in Daylight Studio FuelCMS v1.5.2 allows attackers to exfiltrate users' password reset tokens via a mail splitting attack. |
2026-03-26 | |
| CVE-2026-30457 | 9.8 | CRITICAL | CWE-94 | 0.1% p26 | 6.86 | An issue in the /parser/dwoo component of Daylight Studio FuelCMS v1.5.2 allows ...An issue in the /parser/dwoo component of Daylight Studio FuelCMS v1.5.2 allows attackers to execute arbitrary code via crafted PHP code. |
2026-03-26 | |
| CVE-2026-29969 | 6.1 | MEDIUM | CWE-79 | 0.0% p4 | 4.27 | A cross-site scripting (XSS) vulnerability in the wff_cols_pref.css.aspx endpoin...A cross-site scripting (XSS) vulnerability in the wff_cols_pref.css.aspx endpoint of staffwiki v7.0.1.19219 allows attackers to execute arbitrary Javascript in the context of the user's browser via a crafted HTTP request. |
2026-03-26 | |
| CVE-2026-29055 | 5.3 | MEDIUM | CWE-1230 | 0.0% p10 | 3.71 | Tandoor Recipes is an application for managing recipes, planning meals, and buil...Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. In versions prior to 2.6.0, the image processing pipeline in Tandoor Recipes explicitly skips EXIF metadata stripping, image rescaling, and size validation for WebP and GIF image formats. A developer TODO comment in the source code acknowledges this as a known issue. As a result, when users upload recipe photos in WebP format (the default format for modern smartphone cameras), their sensitive EXIF data — including GPS coordinates, camera model, timestamps, and software information — is stored and served to all users who can view the recipe. Version 2.6.0 fixes the issue. |
2026-03-26 | |
| CVE-2026-28503 | 5.5 | MEDIUM | CWE-639 | 0.0% p14 | 3.85 | Tandoor Recipes is an application for managing recipes, planning meals, and buil...Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. In versions prior to 2.6.0, the `SyncViewSet.query_synced_folder()` action in `cookbook/views/api.py` (line 903) fetches a Sync object using `get_object_or_404(Sync, pk=pk)` without including `space=request.space` in the filter. This allows an admin user in Space A to trigger sync operations (Dropbox/Nextcloud/Local import) on Sync configurations belonging to Space B, and view the resulting sync logs. Version 2.6.0 patches the issue. |
2026-03-26 | |
| CVE-2026-26213 | 8.7 | HIGH | CWE-78 | 0.2% p38 | 6.10 | thingino-firmware versions up to the firmware-2026-03-16 release contains an una...thingino-firmware versions up to the firmware-2026-03-16 release contains an unauthenticated os command injection vulnerability in the WiFi captive portal CGI script that allows remote attackers to execute arbitrary commands as root by injecting malicious code through unsanitized HTTP parameter names. Attackers can exploit the eval function in parse_query() and parse_post() functions to achieve remote code execution and perform privileged configuration changes including root password reset and SSH authorized_keys modification, resulting in full persistent device compromise. |
2026-03-26 | |
| CVE-2026-33732 | 4.8 | MEDIUM | CWE-706 | 0.0% p13 | 3.36 | srvx is a universal server based on web standards. Prior to version 0.11.13, a p...srvx is a universal server based on web standards. Prior to version 0.11.13, a pathname parsing discrepancy in srvx's `FastURL` allows middleware bypass on the Node.js adapter when a raw HTTP request uses an absolute URI with a non-standard scheme (e.g. `file://`). Starting in version 0.11.13, the `FastURL` constructor now deopts to native `URL` for any string not starting with `/`, ensuring consistent pathname resolution. |
2026-03-26 | |
| CVE-2026-33504 | 7.2 | HIGH | CWE-89 | 0.0% p10 | 5.04 | Ory Hydra is an OAuth 2.0 Server and OpenID Connect Provider. Prior to version 2...Ory Hydra is an OAuth 2.0 Server and OpenID Connect Provider. Prior to version 26.2.0, the listOAuth2Clients, listOAuth2ConsentSessions, and listTrustedOAuth2JwtGrantIssuers Admin APIs in Ory Hydra are vulnerable to SQL injection due to flaws in its pagination implementation. Pagination tokens are encrypted using the secret configured in `secrets.pagination`. If this value is not set, Hydra falls back to using `secrets.system`. An attacker who knows this secret can craft their own tokens, including malicious tokens that lead to SQL injection. This issue can be exploited when one or more admin APIs listed above are directly or indirectly accessible to the attacker; the attacker can pass a raw pagination token to the affected API; and the configuration value `secrets.pagination` is set and known to the attacker, or `secrets.pagination` is not set and `secrets.system` is known to the attacker. An attacker can execute arbitrary SQL queries through forged pagination tokens. As a first line of defense, immediately configure a custom value for `secrets.pagination` by generating a cryptographically secure random secret. Next, upgrade Hydra to the fixed version, 26.2.0 as soon as possible. |
2026-03-26 | |
| CVE-2026-33503 | 7.2 | HIGH | CWE-89 | 0.0% p6 | 5.04 | Ory Kratos is an identity, user management and authentication system for cloud s...Ory Kratos is an identity, user management and authentication system for cloud services. Prior to version 26.2.0, the ListCourierMessages Admin API in Ory Kratos is vulnerable to SQL injection due to flaws in its pagination implementation. Pagination tokens are encrypted using the secret configured in `secrets.pagination`. An attacker who knows this secret can craft their own tokens, including malicious tokens that lead to SQL injection. If this configuration value is not set, Kratos falls back to a default pagination encryption secret. Because this default value is publicly known, attackers can generate valid and malicious pagination tokens manually for installations where this secret is not set. As a first line of defense, immediately configure a custom value for `secrets.pagination` by generating a cryptographically secure random secret. Next, upgrade Kratos** to a fixed version, 26.2.0 or later, as soon as possible. |
2026-03-26 | |
| CVE-2026-33496 | 8.1 | HIGH | CWE-305 | 0.2% p36 | 5.67 | ORY Oathkeeper is an Identity & Access Proxy (IAP) and Access Control Decision A...ORY Oathkeeper is an Identity & Access Proxy (IAP) and Access Control Decision API that authorizes HTTP requests based on sets of Access Rules. Versions prior to 26.2.0 are vulnerable to authentication bypass due to cache key confusion. The `oauth2_introspection` authenticator cache does not distinguish tokens that were validated with different introspection URLs. An attacker can therefore legitimately use a token to prime the cache, and subsequently use the same token for rules that use a different introspection server. Ory Oathkeeper has to be configured with multiple `oauth2_introspection` authenticator servers, each accepting different tokens. The authenticators also must be configured to use caching. An attacker has to have a way to gain a valid token for one of the configured introspection servers. Starting in version 26.2.0, Ory Oathkeeper includes the introspection server URL in the cache key, preventing confusion of tokens. Update to the patched version of Ory Oathkeeper. If that is not immediately possible, disable caching for `oauth2_introspection` authenticators. |
2026-03-26 | |
| CVE-2026-33495 | 6.5 | MEDIUM | CWE-862 | 0.0% p13 | 4.55 | ORY Oathkeeper is an Identity & Access Proxy (IAP) and Access Control Decision A...ORY Oathkeeper is an Identity & Access Proxy (IAP) and Access Control Decision API that authorizes HTTP requests based on sets of Access Rules. Ory Oathkeeper is often deployed behind other components like CDNs, WAFs, or reverse proxies. Depending on the setup, another component might forward the request to the Oathkeeper proxy with a different protocol (http vs. https) than the original request. In order to properly match the request against the configured rules, Oathkeeper considers the `X-Forwarded-Proto` header when evaluating rules. The configuration option `serve.proxy.trust_forwarded_headers` (defaults to false) governs whether this and other `X-Forwarded-*` headers should be trusted. Prior to version 26.2.0, Oathkeeper did not properly respect this configuration, and would always consider the `X-Forwarded-Proto` header. In order for an attacker to abuse this, an installation of Ory Oathkeeper needs to have distinct rules for HTTP and HTTPS requests. Also, the attacker needs to be able to trigger one but not the other rule. In this scenario, the attacker can send the same request but with the `X-Forwarded-Proto` header in order to trigger the other rule. We do not expect many configurations to meet these preconditions. Version 26.2.0 contains a patch. Ory Oathkeeper will correctly respect the `serve.proxy.trust_forwarded_headers` configuration going forward, thereby eliminating the attack scenario. We recommend upgrading to a fixed version even if the preconditions are not met. As an additional mitigation, it is generally recommended to drop any unexpected headers as early as possible when a request is handled, e.g. in the WAF. |
2026-03-26 | |
| CVE-2026-33494 | 10.0 | CRITICAL | CWE-23 | 0.1% p23 | 7.00 | ORY Oathkeeper is an Identity & Access Proxy (IAP) and Access Control Decision A...ORY Oathkeeper is an Identity & Access Proxy (IAP) and Access Control Decision API that authorizes HTTP requests based on sets of Access Rules. Versions prior to 26.2.0 are vulnerable to an authorization bypass via HTTP path traversal. An attacker can craft a URL containing path traversal sequences (e.g. `/public/../admin/secrets`) that resolves to a protected path after normalization, but is matched against a permissive rule because the raw, un-normalized path is used during rule evaluation. Version 26.2.0 contains a patch. |
2026-03-26 | |
| CVE-2026-33490 | 3.7 | LOW | CWE-706 | 0.0% p13 | 2.59 | H3 is a minimal H(TTP) framework. In versions 2.0.0-0 through 2.0.1-rc.16, the `...H3 is a minimal H(TTP) framework. In versions 2.0.0-0 through 2.0.1-rc.16, the `mount()` method in h3 uses a simple `startsWith()` check to determine whether incoming requests fall under a mounted sub-application's path prefix. Because this check does not verify a path segment boundary (i.e., that the next character after the base is `/` or end-of-string), middleware registered on a mount like `/admin` will also execute for unrelated routes such as `/admin-public`, `/administrator`, or `/adminstuff`. This allows an attacker to trigger context-setting middleware on paths it was never intended to cover, potentially polluting request context with unintended privilege flags. Version 2.0.2-rc.17 contains a patch. |
2026-03-26 | |
| CVE-2026-33487 | 7.5 | HIGH | CWE-347 | 0.0% p3 | 5.25 | goxmlsig provides XML Digital Signatures implemented in Go. Prior to version 1.6...goxmlsig provides XML Digital Signatures implemented in Go. Prior to version 1.6.0, the `validateSignature` function in `validate.go` goes through the references in the `SignedInfo` block to find one that matches the signed element's ID. In Go versions before 1.22, or when `go.mod` uses an older version, there is a loop variable capture issue. The code takes the address of the loop variable `_ref` instead of its value. As a result, if more than one reference matches the ID or if the loop logic is incorrect, the `ref` pointer will always end up pointing to the last element in the `SignedInfo.References` slice after the loop. goxmlsig version 1.6.0 contains a patch. |
2026-03-26 | |
| CVE-2026-33486 | 6.8 | MEDIUM | CWE-918 | 0.0% p8 | 4.76 | Roadiz is a polymorphic content management system based on a node system that ca...Roadiz is a polymorphic content management system based on a node system that can handle many types of services. A vulnerability in roadiz/documents prior to versions 2.7.9, 2.6.28, 2.5.44, and 2.3.42 allows an authenticated attacker to read any file on the server's local file system that the web server process has access to, including highly sensitive environment variables, database credentials, and internal configuration files. Versions 2.7.9, 2.6.28, 2.5.44, and 2.3.42 contain a patch. |
2026-03-26 | |
| CVE-2026-33481 | 5.3 | MEDIUM | CWE-460 | 0.0% p13 | 3.71 | Syft is a a CLI tool and Go library for generating a Software Bill of Materials ...Syft is a a CLI tool and Go library for generating a Software Bill of Materials (SBOM) from container images and filesystems. Syft versions before v1.42.3 would not properly cleanup temporary storage if the temporary storage was exhausted during a scan. When scanning archives Syft will unpack those archives into temporary storage then inspect the unpacked contents. Under normal operation Syft will remove the temporary data it writes after completing a scan. This vulnerability would affect users of Syft that were scanning content that could cause Syft to fill the temporary storage that would then cause Syft to raise an error and exit. When the error is triggered Syft would exit without properly removing the temporary files in use. In our testing this was most easily reproduced by scanning very large artifacts or highly compressed artifacts such as a zipbomb. Because Syft would not clean up its temporary files, the result would be filling temporary file storage preventing future runs of Syft or other system utilities that rely on temporary storage being available. The patch has been released in v1.42.3. Syft now cleans up temporary files when an error condition is encountered. There are no workarounds for this vulnerability in Syft. Users that find their temporary storage depleted can manually remove the temporary files. |
2026-03-26 | |
| CVE-2026-33477 | 4.3 | MEDIUM | CWE-863 | 0.0% p8 | 3.01 | FileRise is a self-hosted web-based file manager with multi-file upload, editing...FileRise is a self-hosted web-based file manager with multi-file upload, editing, and batch operations. In versiosn 2.3.7 through 3.10.0, the file snippet endpoint `/api/file/snippet.php` allows an authenticated user with only `read_own` access to a folder to retrieve snippet content from files uploaded by other users in the same folder. This is a server-side authorization flaw in the `read_own` enforcement for hover previews. Version 3.11.0 fixes the issue. |
2026-03-26 | |
| CVE-2026-32857 | 7.8 | HIGH | CWE-918 | 0.0% p11 | 5.46 | Firecrawl version 2.8.0 and prior contain a server-side request forgery (SSRF) p...Firecrawl version 2.8.0 and prior contain a server-side request forgery (SSRF) protection bypass vulnerability in the Playwright scraping service where network policy validation is applied only to the initial user-supplied URL and not to subsequent redirect destinations. Attackers can supply an externally valid URL that passes validation and returns an HTTP redirect to an internal or restricted resource, allowing the browser to follow the redirect and fetch the final destination without revalidation, thereby gaining access to internal network services and sensitive endpoints. This issue is distinct from CVE-2024-56800, which describes redirect-based SSRF generally. This vulnerability specifically arises from a post-redirect enforcement gap in implemented SSRF protections, where validation is applied only to the initial request and not to the final redirected destination. |
2026-03-26 | |
| CVE-2026-3116 | 4.9 | MEDIUM | CWE-400 | 0.0% p14 | 3.43 | Mattermost Plugins versions <=11.4 11.0.4 11.1.3 11.3.2 10.11.11.0 fail to valid...Mattermost Plugins versions <=11.4 11.0.4 11.1.3 11.3.2 10.11.11.0 fail to validate incoming request size which allows an authenticated attacker to cause service disruption via the webhook endpoint. Mattermost Advisory ID: MMSA-2026-00589 |
2026-03-26 | |
| CVE-2026-3115 | 4.3 | MEDIUM | CWE-863 | 0.0% p8 | 3.01 | Mattermost versions 11.2.x <= 11.2.2, 10.11.x <= 10.11.10, 11.4.x <= 11.4.0, 11....Mattermost versions 11.2.x <= 11.2.2, 10.11.x <= 10.11.10, 11.4.x <= 11.4.0, 11.3.x <= 11.3.1 fail to apply view restrictions when retrieving group member IDs, which allows authenticated guest users to enumerate user IDs outside their allowed visibility scope via the group retrieval endpoint.. Mattermost Advisory ID: MMSA-2026-00594 |
2026-03-26 | |
| CVE-2026-3114 | 6.5 | MEDIUM | CWE-409 | 0.0% p11 | 4.55 | Mattermost versions 11.4.x <= 11.4.0, 11.3.x <= 11.3.1, 11.2.x <= 11.2.3, 10.11....Mattermost versions 11.4.x <= 11.4.0, 11.3.x <= 11.3.1, 11.2.x <= 11.2.3, 10.11.x <= 10.11.11 fail to validate decompressed archive entry sizes during file extraction which allows authenticated users with file upload permissions to cause a denial of service via crafted zip archives containing highly compressed entries (zip bombs) that exhaust server memory.. Mattermost Advisory ID: MMSA-2026-00598 |
2026-03-26 | |
| CVE-2026-3113 | 5.0 | MEDIUM | CWE-732 | 0.0% p0 | 3.50 | Mattermost versions 11.4.x <= 11.4.0, 11.3.x <= 11.3.1, 11.2.x <= 11.2.3, 10.11....Mattermost versions 11.4.x <= 11.4.0, 11.3.x <= 11.3.1, 11.2.x <= 11.2.3, 10.11.x <= 10.11.11 fail to set permissions on downloaded bulk export which allows other local users on the server to be able to read contents of the bulk export.. Mattermost Advisory ID: MMSA-2026-00593 |
2026-03-26 | |
| CVE-2026-3112 | 6.8 | MEDIUM | CWE-22 | 0.1% p17 | 4.76 | Mattermost versions 11.4.x <= 11.4.0, 11.3.x <= 11.3.1, 11.2.x <= 11.2.3, 10.11....Mattermost versions 11.4.x <= 11.4.0, 11.3.x <= 11.3.1, 11.2.x <= 11.2.3, 10.11.x <= 10.11.11 fail to validate Advanced Logging file target paths which allows system administrators to read arbitrary host files via malicious AdvancedLoggingJSON configuration in support packet generation. Mattermost Advisory ID: MMSA-2025-00562 |
2026-03-26 | |
| CVE-2026-3109 | 2.2 | LOW | CWE-754 | 0.0% p14 | 1.54 | Mattermost Plugins versions <=11.4 10.11.11.0 fail to validate webhook request t...Mattermost Plugins versions <=11.4 10.11.11.0 fail to validate webhook request timestamps which allows an attacker to corrupt Zoom meeting state in Mattermost via replayed webhook requests. Mattermost Advisory ID: MMSA-2026-00584 |
2026-03-26 | |
| CVE-2026-3108 | 8.0 | HIGH | CWE-150 | 0.0% p12 | 5.60 | Mattermost versions 11.2.x <= 11.2.2, 10.11.x <= 10.11.10, 11.4.x <= 11.4.0, 11....Mattermost versions 11.2.x <= 11.2.2, 10.11.x <= 10.11.10, 11.4.x <= 11.4.0, 11.3.x <= 11.3.1 fail to sanitize user-controlled post content in the mmctl commands terminal output which allows attackers to manipulate administrator terminals via crafted messages containing ANSI and OSC escape sequences that enable screen manipulation, fake prompts, and clipboard hijacking.. Mattermost Advisory ID: MMSA-2026-00599 |
2026-03-26 | |
| CVE-2026-34071 | 5.4 | MEDIUM | CWE-79 | 0.0% p11 | 3.78 | Stirling-PDF is a locally hosted web application that allows you to perform vari...Stirling-PDF is a locally hosted web application that allows you to perform various operations on PDF files. In version 2.7.3, the /api/v1/convert/eml/pdf endpoint with parameter downloadHtml=true returns unsanitized HTML from the email body with Content-Type: text/html. An attacker who sends a malicious email to a Stirling-PDF user can achieve JavaScript execution when that user exports the email using the "Download HTML intermediate file" feature. Version 2.8.0 fixes the issue. |
2026-03-26 | |
| CVE-2026-33636 | 7.6 | HIGH | CWE-125 | 0.0% p9 | 5.32 | LIBPNG is a reference library for use in applications that read, create, and man...LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. In versions 1.6.36 through 1.6.55, an out-of-bounds read and write exists in libpng's ARM/AArch64 Neon-optimized palette expansion path. When expanding 8-bit paletted rows to RGB or RGBA, the Neon loop processes a final partial chunk without verifying that enough input pixels remain. Because the implementation works backward from the end of the row, the final iteration dereferences pointers before the start of the row buffer (OOB read) and writes expanded pixel data to the same underflowed positions (OOB write). This is reachable via normal decoding of attacker-controlled PNG input if Neon is enabled. Version 1.6.56 fixes the issue. |
2026-03-26 | |
| CVE-2026-33470 | 6.5 | MEDIUM | CWE-862 | 0.0% p9 | 4.55 | Frigate is a network video recorder (NVR) with realtime local object detection f...Frigate is a network video recorder (NVR) with realtime local object detection for IP cameras. In version 0.17.0, a low-privilege authenticated user restricted to one camera can access snapshots from other cameras. This is possible through a chain of two authorization problems: `/api/timeline` returns timeline entries for cameras outside the caller's allowed camera set, then `/api/events/{event_id}/snapshot-clean.webp` declares `Depends(require_camera_access)` but never actually validates `event.camera` after looking up the event. Together, this allows a restricted user to enumerate event IDs from unauthorized cameras and then fetch clean snapshots for those events. Version 0.17.1 fixes the issue. |
2026-03-26 | |
| CVE-2026-33469 | 6.5 | MEDIUM | CWE-863 | 0.0% p10 | 4.55 | Frigate is a network video recorder (NVR) with realtime local object detection f...Frigate is a network video recorder (NVR) with realtime local object detection for IP cameras. In version 0.17.0, an authenticated non-admin user can retrieve the full raw Frigate configuration through `/api/config/raw`. This exposes sensitive values that are intentionally redacted from `/api/config`, including camera credentials, go2rtc stream credentials, MQTT passwords, proxy secrets, and any other secrets stored in `config.yml`. This appears to be a broken access control issue introduced by the admin-by-default API refactor: `/api/config/raw_paths` is admin-only, but `/api/config/raw` is still accessible to any authenticated user. Version 0.17.1 contains a patch. |
2026-03-26 | |
| CVE-2026-33468 | 8.1 | HIGH | CWE-89 | 0.1% p20 | 5.67 | Kysely is a type-safe TypeScript SQL query builder. Prior to version 0.28.14, Ky...Kysely is a type-safe TypeScript SQL query builder. Prior to version 0.28.14, Kysely's `DefaultQueryCompiler.sanitizeStringLiteral()` only escapes single quotes by doubling them (`'` → `''`) but does not escape backslashes. When used with the MySQL dialect (where `NO_BACKSLASH_ESCAPES` is OFF by default), an attacker can use a backslash to escape the trailing quote of a string literal, breaking out of the string context and injecting arbitrary SQL. This affects any code path that uses `ImmediateValueTransformer` to inline values — specifically `CreateIndexBuilder.where()` and `CreateViewBuilder.as()`. Version 0.28.14 contains a fix. |
2026-03-26 | |
| CVE-2026-33442 | 8.1 | HIGH | CWE-89 | 0.1% p20 | 5.67 | Kysely is a type-safe TypeScript SQL query builder. In versions 0.28.12 and 0.28...Kysely is a type-safe TypeScript SQL query builder. In versions 0.28.12 and 0.28.13, the `sanitizeStringLiteral` method in Kysely's query compiler escapes single quotes (`'` → `''`) but does not escape backslashes. On MySQL with the default `BACKSLASH_ESCAPES` SQL mode, an attacker can inject a backslash before a single quote to neutralize the escaping, breaking out of the JSON path string literal and injecting arbitrary SQL. Version 0.28.14 fixes the issue. |
2026-03-26 | |
| CVE-2026-33438 | 6.5 | MEDIUM | CWE-770 | 0.0% p14 | 4.55 | Stirling-PDF is a locally hosted web application that allows you to perform vari...Stirling-PDF is a locally hosted web application that allows you to perform various operations on PDF files. Versions starting in 2.1.5 and prior to 2.5.2 have Denial of Service (DoS) vulnerability in the Stirling-PDF watermark functionality (`/api/v1/security/add-watermark` endpoint). The vulnerability allows authenticated users to cause resource exhaustion and server crashes by providing extreme values for the `fontSize` and `widthSpacer` parameters. Version 2.5.2 patches the issue. |
2026-03-26 | |
| CVE-2026-33430 | 7.3 | HIGH | CWE-732 | 0.0% p1 | 5.11 | Briefcase is a tool for converting a Python project into a standalone native app...Briefcase is a tool for converting a Python project into a standalone native application. Starting in version 0.3.0 and prior to version 0.3.26, if a developer uses Briefcase to produce an Windows MSI installer for a project, and that project is installed for All Users (i.e., per-machine scope), the installation process creates an directory that inherits all the permissions of the parent directory. Depending on the location chosen by the installing user, this may allow a low privilege but authenticated user to replace or modify the binaries installed by the application. If an administrator then runs the altered binary, the binary will run with elevated privileges. The problem is caused by the template used to generate the WXS file for Windows projects. It was fixed in the templates used in Briefcase 0.3.26, 0.4.0, and 0.4.1. Re-running `briefcase create` on your Briefcase project will result in the updated templates being used. As a workaround, the patch can be added to any existing Briefcase .wxs file generated by Briefcase 0.3.24 or later. |
2026-03-26 | |
| CVE-2026-33416 | 7.5 | HIGH | CWE-416 | 0.0% p12 | 5.25 | LIBPNG is a reference library for use in applications that read, create, and man...LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. In versions 1.2.1 through 1.6.55, `png_set_tRNS` and `png_set_PLTE` each alias a heap-allocated buffer between `png_struct` and `png_info`, sharing a single allocation across two structs with independent lifetimes. The `trans_alpha` aliasing has been present since at least libpng 1.0, and the `palette` aliasing since at least 1.2.1. Both affect all prior release lines `png_set_tRNS` sets `png_ptr->trans_alpha = info_ptr->trans_alpha` (256-byte buffer) and `png_set_PLTE` sets `info_ptr->palette = png_ptr->palette` (768-byte buffer). In both cases, calling `png_free_data` (with `PNG_FREE_TRNS` or `PNG_FREE_PLTE`) frees the buffer through `info_ptr` while the corresponding `png_ptr` pointer remains dangling. Subsequent row-transform functions dereference and, in some code paths, write to the freed memory. A second call to `png_set_tRNS` or `png_set_PLTE` has the same effect, because both functions call `png_free_data` internally before reallocating the `info_ptr` buffer. Version 1.6.56 fixes the issue. |
2026-03-26 | |
| CVE-2026-33402 | 1.3 | LOW | CWE-79 | 0.0% p9 | 0.91 | Sakai is a Collaboration and Learning Environment (CLE). In versions 23.0 throug...Sakai is a Collaboration and Learning Environment (CLE). In versions 23.0 through 23.4 and 25.0 through 25.1, group titles and description can contain cross-site scripting scripts. The patch is included in releases 25.2 and 23.5. As a workaround, one can check the SAKAI_SITE_GROUP table for titles and descriptions that contain this info. |
2026-03-26 | |
| CVE-2026-33015 | 5.2 | MEDIUM | CWE-863 | 0.0% p5 | 3.64 | EVerest is an EV charging software stack. Prior to version 2026.02.0, even immed...EVerest is an EV charging software stack. Prior to version 2026.02.0, even immediately after CSMS performs a RemoteStop (StopTransaction), the EVSE can return to `PrepareCharging` via the EV's BCB toggle, allowing session restart. This breaks the irreversibility of remote stop and can bypass operational/billing/safety controls. Version 2026.02.0 contains a patch. |
2026-03-26 | |
| CVE-2026-33014 | 5.2 | MEDIUM | CWE-863 | 0.0% p5 | 3.64 | EVerest is an EV charging software stack. Prior to version 2026.02.0, during Rem...EVerest is an EV charging software stack. Prior to version 2026.02.0, during RemoteStop processing, a delayed authorization response restores `authorized` back to true, defeating the `stop_transaction()` call condition on PowerOff events. As a result, the transaction can remain open even after a remote stop. Version 2026.02.0 contains a patch. |
2026-03-26 | |
| CVE-2026-33009 | 8.2 | HIGH | CWE-362 | 0.0% p14 | 5.74 | EVerest is an EV charging software stack. Versions prior to 2026.02.0 have a dat...EVerest is an EV charging software stack. Versions prior to 2026.02.0 have a data race leading to C++ UB (potential memory corruption). This is triggered by an MQTT `everest_external/nodered/{connector}/cmd/switch_three_phases_while_charging` message and results in `Charger::shared_context` / `internal_context` accessed concurrently without lock. Version 2026.02.0 contains a patch. |
2026-03-26 | |
| CVE-2026-32846 | 8.7 | HIGH | CWE-22 | 0.1% p19 | 6.09 | OpenClaw through 2026.3.23 (fixed in commit 4797bbc) contains a path traversal v...OpenClaw through 2026.3.23 (fixed in commit 4797bbc) contains a path traversal vulnerability in media parsing that allows attackers to read arbitrary files by bypassing path validation in the isLikelyLocalPath() and isValidMedia() functions. Attackers can exploit incomplete validation and the allowBareFilename bypass to reference files outside the intended application sandbox, resulting in disclosure of sensitive information including system files, environment files, and SSH keys. |
2026-03-26 | |
| CVE-2026-29905 | 6.5 | MEDIUM | CWE-20 | 0.0% p11 | 4.55 | Kirby CMS through 5.1.4 allows an authenticated user with 'Editor' permissions t...Kirby CMS through 5.1.4 allows an authenticated user with 'Editor' permissions to cause a persistent Denial of Service (DoS) via a malformed image upload. The application fails to properly validate the return value of the PHP getimagesize() function. When the system attempts to process this file for metadata or thumbnail generation, it triggers a fatal TypeError. |
2026-03-26 | |
| CVE-2026-29044 | 5.0 | MEDIUM | CWE-863 | 0.0% p13 | 3.50 | EVerest is an EV charging software stack. Prior to version 2026.02.0, when Withd...EVerest is an EV charging software stack. Prior to version 2026.02.0, when WithdrawAuthorization is processed before the TransactionStarted event, AuthHandler determines `transaction_active=false` and only calls `withdraw_authorization_callback`. This path ultimately calls `Charger::deauthorize()`, but no actual stop (StopTransaction) occurs in the Charging state. As a result, authorization withdrawal can be defeated by timing, allowing charging to continue. Version 2026.02.0 contains a patch. |
2026-03-26 | |
| CVE-2026-27828 | 5.5 | MEDIUM | CWE-416 | 0.0% p12 | 3.85 | EVerest is an EV charging software stack. Prior to version 2026.02.0, ISO15118_c...EVerest is an EV charging software stack. Prior to version 2026.02.0, ISO15118_chargerImpl::handle_session_setup uses v2g_ctx after it has been freed when ISO15118 initialization fails (e.g., no IPv6 link-local address). The EVSE process can be crashed remotely by an attacker with MQTT access who issues a session_setup command while v2g_ctx has been released. Version 2026.02.0 contains a patch. |
2026-03-26 | |
| CVE-2026-27816 | 5.5 | MEDIUM | CWE-787 | 0.0% p12 | 3.85 | EVerest is an EV charging software stack. Prior to versions to 2026.02.0, ISO151...EVerest is an EV charging software stack. Prior to versions to 2026.02.0, ISO15118_chargerImpl::handle_update_energy_transfer_modes copies a variable-length list into a fixed-size array of length 6 without bounds checking. With schema validation disabled by default, oversized MQTT Cmd payloads can trigger out-of-bounds writes and corrupt adjacent EVSE state or crash the process. Version 2026.02.0 contains a patch. |
2026-03-26 | |
| CVE-2026-27815 | 5.5 | MEDIUM | CWE-787 | 0.0% p12 | 3.85 | EVerest is an EV charging software stack. Prior to versions to 2026.02.0, ISO151...EVerest is an EV charging software stack. Prior to versions to 2026.02.0, ISO15118_chargerImpl::handle_session_setup copies a variable-length payment_options list into a fixed-size array of length 2 without bounds checking. With schema validation disabled by default, oversized MQTT Cmd payloads can trigger out-of-bounds writes and corrupt adjacent EVSE state or crash the process. Version 2026.02.0 contains a patch. |
2026-03-26 | |
| CVE-2026-27814 | 4.2 | MEDIUM | CWE-362 | 0.0% p3 | 2.94 | EVerest is an EV charging software stack. Versions prior to 2026.02.0 have a dat...EVerest is an EV charging software stack. Versions prior to 2026.02.0 have a data race (C++ UB) triggered by an A 1-phase ↔ 3-phase switch request (`ac_switch_three_phases_while_charging`) during charging/waiting executes concurrently with the state machine loop. Version 2026.02.0 contains a patch. |
2026-03-26 | |
| CVE-2026-27813 | 5.3 | MEDIUM | CWE-416 | 0.0% p5 | 3.71 | EVerest is an EV charging software stack. Versions prior to 2026.02.0 have a dat...EVerest is an EV charging software stack. Versions prior to 2026.02.0 have a data race leading to use-after-free. This is triggered by EV plug-in/unplug and RFID/RemoteStart/OCPP authorization events (or delayed authorization response). Version 2026.2.0 contains a patch. |
2026-03-26 | |
| CVE-2026-26074 | 7.0 | HIGH | CWE-362 | 0.0% p14 | 4.90 | EVerest is an EV charging software stack. Versions prior to 2026.02.0 have a dat...EVerest is an EV charging software stack. Versions prior to 2026.02.0 have a data race leading to possible `std::map<std::queue>` corruption. The trigger is CSMS GetLog/UpdateFirmware request (network) with an EVSE fault event (physical). This results in TSAN reports concurrent access (data race) to `event_queue`. Version 2026.2.0 contains a patch. |
2026-03-26 | |
| CVE-2026-26073 | 5.9 | MEDIUM | CWE-122 | 0.1% p17 | 4.13 | EVerest is an EV charging software stack. Versions prior to 2026.02.0 have a dat...EVerest is an EV charging software stack. Versions prior to 2026.02.0 have a data race leading to possible `std::queue`/`std::deque` corruption. The trigger is powermeter public key update and EV session/error events (while OCPP not started). This results in a TSAN data race report and an ASAN/UBSAN misaligned address runtime error being observed. Version 2026.02.0 contains a patch. |
2026-03-26 | |
| CVE-2026-4897 | 5.5 | MEDIUM | CWE-770 | 0.0% p2 | 3.85 | A flaw was found in polkit. A local user can exploit this by providing a special...A flaw was found in polkit. A local user can exploit this by providing a specially crafted, excessively long input to the `polkit-agent-helper-1` setuid binary via standard input (stdin). This unbounded input can lead to an out-of-memory (OOM) condition, resulting in a Denial of Service (DoS) for the system. |
2026-03-26 | |
| CVE-2026-33397 | 6.9 | MEDIUM | CWE-601 | 0.1% p15 | 4.83 | The Angular SSR is a server-rise rendering tool for Angular applications. Versio...The Angular SSR is a server-rise rendering tool for Angular applications. Versions on the 22.x branch prior to 22.0.0-next.2, the 21.x branch prior to 21.2.3, and the 20.x branch prior to 20.3.21 have an Open Redirect vulnerability in `@angular/ssr` due to an incomplete fix for CVE-2026-27738. While the original fix successfully blocked multiple leading slashes (e.g., `///`), the internal validation logic fails to account for a single backslash (`\`) bypass. When an Angular SSR application is deployed behind a proxy that passes the `X-Forwarded-Prefix` header, an attacker provides a value starting with a single backslash, the internal validation failed to flag the single backslash as invalid, the application prepends a leading forward slash, resulting in a `Location` header containing the URL, and modern browsers interpret the `/\` sequence as `//`, treating it as a protocol-relative URL and redirecting the user to the attacker-controlled domain. Furthermore, the response lacks the `Vary: X-Forwarded-Prefix` header, allowing the malicious redirect to be stored in intermediate caches (Web Cache Poisoning). Versions 22.0.0-next.2, 21.2.3, and 20.3.21 contain a patch. Until the patch is applied, developers should sanitize the `X-Forwarded-Prefix` header in their `server.ts` before the Angular engine processes the request. |
2026-03-26 | |
| CVE-2026-30162 | 6.1 | MEDIUM | CWE-79 | 0.0% p8 | 4.27 | Cross Site Scripting (xss) vulnerability in Timo 2.0.3 via crafted links in the ...Cross Site Scripting (xss) vulnerability in Timo 2.0.3 via crafted links in the title field. |
2026-03-26 | |
| CVE-2026-29976 | 6.2 | MEDIUM | CWE-120 | 0.0% p2 | 4.34 | Buffer Overflow vulnerability in ZerBea hcxpcapngtool v. 7.0.1-43-g2ee308e allow...Buffer Overflow vulnerability in ZerBea hcxpcapngtool v. 7.0.1-43-g2ee308e allows a local attacker to obtain sensitive information via the getradiotapfield() function |
2026-03-26 | |
| CVE-2026-29934 | 6.1 | MEDIUM | CWE-79 | 0.0% p9 | 4.27 | A reflected cross-site scripting (XSS) vulnerability in the /admin/menus compone...A reflected cross-site scripting (XSS) vulnerability in the /admin/menus component of Lightcms v2.0 allows attackers to execute arbitrary Javascript in the context of the user's browser via modifying the referer value in the request header. |
2026-03-26 | |
| CVE-2026-29933 | 6.1 | MEDIUM | CWE-79 | 0.0% p9 | 4.27 | A reflected cross-site scripting (XSS) vulnerability in the /index/login.html co...A reflected cross-site scripting (XSS) vulnerability in the /index/login.html component of YZMCMS v7.4 allows attackers to execute arbitrary Javascript in the context of the user's browser via modifying the referrer value in the request header. |
2026-03-26 | |
| CVE-2026-28298 | 5.9 | MEDIUM | CWE-79 | 0.1% p16 | 4.13 | SolarWinds Observability Self-Hosted was found to be affected by a stored cross-...SolarWinds Observability Self-Hosted was found to be affected by a stored cross-site scripting vulnerability, which when exploited, can lead to unintended script execution. |
2026-03-26 | |
| CVE-2026-28297 | 6.1 | MEDIUM | CWE-79 | 0.1% p21 | 4.27 | SolarWinds Observability Self-Hosted was found to be affected by a stored cross-...SolarWinds Observability Self-Hosted was found to be affected by a stored cross-site scripting vulnerability, which when exploited, can lead to unintended script execution. |
2026-03-26 | |
| CVE-2026-27664 | 8.7 | HIGH | CWE-787 | 0.1% p15 | 6.09 | A vulnerability has been identified in CPCI85 Central Processing/Communication (...A vulnerability has been identified in CPCI85 Central Processing/Communication (All versions < V26.10), SICORE Base system (All versions < V26.10.0). The affected application contains an out-of-bounds write vulnerability while parsing specially crafted XML inputs. This could allow an unauthenticated attacker to exploit this issue by sending a malicious XML request, which may cause the service to crash, resulting in a denial-of-service condition. |
2026-03-26 | |
| CVE-2026-27663 | 7.1 | HIGH | CWE-770 | 0.0% p5 | 4.97 | A vulnerability has been identified in CPCI85 Central Processing/Communication (...A vulnerability has been identified in CPCI85 Central Processing/Communication (All versions < V26.10), RTUM85 RTU Base (All versions < V26.10). The affected application contains denial-of-service (DoS) vulnerability. The remote operation mode is susceptible to a resource exhaustion condition when subjected to a high volume of requests. Sending multiple requests can exhaust resources, preventing parameterization and requiring a reset or reboot to restore functionality. |
2026-03-26 | |
| CVE-2026-26072 | 4.2 | MEDIUM | CWE-362 | 0.0% p5 | 2.94 | EVerest is an EV charging software stack. Versions prior to 2026.02.0 have a dat...EVerest is an EV charging software stack. Versions prior to 2026.02.0 have a data race leading to `std::map<std::optional>` concurrent access (container/optional corruption possible). The trigger is EV SoC update with powermeter periodic update and unplugging/SessionFinished status. Version 2026.02.0 patches the issue. |
2026-03-26 | |
| CVE-2026-26071 | 4.2 | MEDIUM | CWE-362 | 0.0% p5 | 2.94 | EVerest is an EV charging software stack. Versions prior to 2026.02.0 have a dat...EVerest is an EV charging software stack. Versions prior to 2026.02.0 have a data race leading to `std::string` concurrent access. with heap-use-after-free possible. This is triggered by EVCCID update (EV/ISO15118) and OCPP session/authorization events. Version 2026.02.0 contains a patch. |
2026-03-26 | |
| CVE-2026-26070 | 4.6 | MEDIUM | CWE-362 | 0.0% p5 | 3.22 | EVerest is an EV charging software stack. Versions prior to 2026.02.0 have a dat...EVerest is an EV charging software stack. Versions prior to 2026.02.0 have a data race leading to `std::map<std::optional>` concurrent access (container/optional corruption possible). The trigger is an EV SoC update with powermeter periodic update and unplugging/SessionFinished state. Version 2026.2.0 contains a patch. |
2026-03-26 | |
| CVE-2026-26008 | 7.5 | HIGH | CWE-125 | 0.1% p17 | 5.25 | EVerest is an EV charging software stack. Versions prior to 2026.02.0 have an ou...EVerest is an EV charging software stack. Versions prior to 2026.02.0 have an out-of-bounds access (std::vector) that leads to possible remote crash/memory corruption. This is because the CSMS sends UpdateAllowedEnergyTransferModes over the network. Version 2026.2.0 contains a patch. |
2026-03-26 | |
| CVE-2026-23995 | 8.4 | HIGH | CWE-121 | 0.0% p2 | 5.88 | EVerest is an EV charging software stack. Prior to version 2026.02.0, stack-base...EVerest is an EV charging software stack. Prior to version 2026.02.0, stack-based buffer overflow in CAN interface initialization: passing an interface name longer than IFNAMSIZ (16) to CAN open routines overflows `ifreq.ifr_name`, corrupting adjacent stack data and enabling potential code execution. A malicious or misconfigured interface name can trigger this before any privilege checks. Version 2026.02.0 contains a patch. |
2026-03-26 | |
| CVE-2026-22790 | 8.8 | HIGH | CWE-121 | 0.1% p19 | 6.16 | EVerest is an EV charging software stack. Prior to version 2026.02.0, `HomeplugM...EVerest is an EV charging software stack. Prior to version 2026.02.0, `HomeplugMessage::setup_payload` trusts `len` after an `assert`; in release builds the check is removed, so oversized SLAC payloads are `memcpy`'d into a ~1497-byte stack buffer, corrupting the stack and enabling remote code execution from network-provided frames. Version 2026.02.0 contains a patch. |
2026-03-26 | |
| CVE-2026-22593 | 8.4 | HIGH | CWE-193 | 0.0% p0 | 5.88 | EVerest is an EV charging software stack. Prior to version 2026.02.0, an off-by-...EVerest is an EV charging software stack. Prior to version 2026.02.0, an off-by-one check in IsoMux certificate filename handling causes a stack-based buffer overflow when a filename length equals `MAX_FILE_NAME_LENGTH` (100). A crafted filename in the certificate directory can overflow `file_names[idx]`, corrupting stack state and enabling potential code execution. Version 2026.02.0 contains a patch. |
2026-03-26 | |
| CVE-2026-4877 | 5.3 | MEDIUM | CWE-79 | 0.0% p10 | 3.71 | A security flaw has been discovered in itsourcecode Payroll Management System up...A security flaw has been discovered in itsourcecode Payroll Management System up to 1.0. This affects an unknown function of the file /index.php. Performing a manipulation of the argument page results in cross site scripting. It is possible to initiate the attack remotely. The exploit has been released to the public and may be used for attacks. |
2026-03-26 | |
| CVE-2026-4876 | 5.3 | MEDIUM | CWE-74 | 0.0% p8 | 3.71 | A vulnerability was identified in itsourcecode Free Hotel Reservation System 1.0...A vulnerability was identified in itsourcecode Free Hotel Reservation System 1.0. The impacted element is an unknown function of the file /admin/mod_amenities/index.php?view=editpic. Such manipulation of the argument ID leads to sql injection. The attack may be performed from remote. The exploit is publicly available and might be used. |
2026-03-26 | |
| CVE-2026-33413 | 8.8 | HIGH | CWE-862 | 0.0% p14 | 6.16 | etcd is a distributed key-value store for the data of a distributed system. Prio...etcd is a distributed key-value store for the data of a distributed system. Prior to versions 3.4.42, 3.5.28, and 3.6.9, unauthorized users may bypass authentication or authorization checks and call certain etcd functions in clusters that expose the gRPC API to untrusted or partially trusted clients. In unpatched etcd clusters with etcd auth enabled, unauthorized users are able to call MemberList and learn cluster topology, including member IDs and advertised endpoints; call Alarm, which can be abused for operational disruption or denial of service; use Lease APIs, interfering with TTL-based keys and lease ownership; and/or trigger compaction, permanently removing historical revisions and disrupting watch, audit, and recovery workflows. Kubernetes does not rely on etcd’s built-in authentication and authorization. Instead, the API server handles authentication and authorization itself, so typical Kubernetes deployments are not affected. Versions 3.4.42, 3.5.28, and 3.6.9 contain a patch. If upgrading is not immediately possible, reduce exposure by treating the affected RPCs as unauthenticated in practice. Restrict network access to etcd server ports so only trusted components can connect and/or require strong client identity at the transport layer, such as mTLS with tightly scoped client certificate distribution. |
2026-03-26 | |
| CVE-2026-33396 | 9.9 | CRITICAL | CWE-78 | 0.8% p74 | 6.96 | OneUptime is an open-source monitoring and observability platform. Prior to vers...OneUptime is an open-source monitoring and observability platform. Prior to version 10.0.35, a low-privileged authenticated user (ProjectMember) can achieve remote command execution on the Probe container/host by abusing Synthetic Monitor Playwright script execution. Synthetic monitor code is executed in VMRunner.runCodeInNodeVM with a live Playwright page object in context. The sandbox relies on a denylist of blocked properties/methods, but it is incomplete. Specifically, _browserType and launchServer are not blocked, so attacker code can traverse `page.context().browser()._browserType.launchServer(...)` and spawn arbitrary processes. Version 10.0.35 contains a patch. |
2026-03-26 | |
| CVE-2026-33343 | 0.0 | NONE | CWE-863 | 0.0% p8 | 0.00 | etcd is a distributed key-value store for the data of a distributed system. Prio...etcd is a distributed key-value store for the data of a distributed system. Prior to versions 3.4.42, 3.5.28, and 3.6.9, an authenticated user with RBAC restricted permissions on key ranges can use nested transactions to bypass all key-level authorization. This allows any authenticated user with direct access to etcd to effectively ignore all key range restrictions, accessing the entire etcd data store. Kubernetes does not rely on etcd’s built-in authentication and authorization. Instead, the API server handles authentication and authorization itself, so typical Kubernetes deployments are not affected. Versions 3.4.42, 3.5.28, and 3.6.9 contain a patch. If upgrading is not immediately possible, reduce exposure by treating the affected RPCs as unauthenticated in practice. Restrict network access to etcd server ports so only trusted components can connect and require strong client identity at the transport layer, such as mTLS with tightly scoped client certificate distribution. |
2026-03-26 | |
| CVE-2026-2511 | 7.5 | HIGH | CWE-89 | 0.1% p27 | 5.25 | The JS Help Desk – AI-Powered Support & Ticketing System plugin for WordPress is...The JS Help Desk – AI-Powered Support & Ticketing System plugin for WordPress is vulnerable to SQL Injection via the `multiformid` parameter in the `storeTickets()` function in all versions up to, and including, 3.0.4. This is due to the user-supplied `multiformid` value being passed to `esc_sql()` without enclosing the result in quotes in the SQL query, rendering the escaping ineffective against payloads that do not contain quote characters. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. |
2026-03-26 | |
| CVE-2026-2389 | 4.9 | MEDIUM | CWE-79 | 0.0% p9 | 3.43 | The Complianz – GDPR/CCPA Cookie Consent plugin for WordPress is vulnerable to S...The Complianz – GDPR/CCPA Cookie Consent plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 7.4.4.2. This is due to the `revert_divs_to_summary` function replacing `”` HTML entities with literal double-quote characters (`"`) in post content without subsequent sanitization. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the injected page. The Classic Editor plugin is required to be installed and activated in order to exploit this vulnerability. |
2026-03-26 | |
| CVE-2026-2231 | 7.2 | HIGH | CWE-79 | 0.1% p28 | 5.04 | The Fluent Booking plugin for WordPress is vulnerable to Stored Cross-Site Scrip...The Fluent Booking plugin for WordPress is vulnerable to Stored Cross-Site Scripting via multiple parameters in all versions up to, and including, 2.0.01 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-03-26 | |
| CVE-2026-1032 | 4.3 | MEDIUM | CWE-352 | 0.0% p2 | 3.01 | The Conditional Menus plugin for WordPress is vulnerable to Cross-Site Request F...The Conditional Menus plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.2.6. This is due to missing nonce validation on the 'save_options' function. This makes it possible for unauthenticated attackers to modify conditional menu assignments via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. |
2026-03-26 | |
| CVE-2025-55264 | 5.5 | MEDIUM | CWE-613 | 0.0% p8 | 3.85 | HCL Aftermarket DPC is affected by Failure to Invalidate Session on Password Cha...HCL Aftermarket DPC is affected by Failure to Invalidate Session on Password Change will allow attacker to access to a session, then they can maintain control over the account despite the password change leading to account takeover. |
2026-03-26 | |
| CVE-2025-55263 | 7.3 | HIGH | CWE-798 | 0.0% p10 | 5.11 | HCL Aftermarket DPC is affected by Hardcoded Sensitive Data which allows attacke...HCL Aftermarket DPC is affected by Hardcoded Sensitive Data which allows attacker to gain access to the source code or if it is stored in insecure repositories, they can easily retrieve these hardcoded secrets. |
2026-03-26 | |
| CVE-2025-55262 | 8.3 | HIGH | CWE-798 | 0.0% p8 | 5.81 | HCL Aftermarket DPC is affected by SQL Injection which allows attacker to exploi...HCL Aftermarket DPC is affected by SQL Injection which allows attacker to exploit this vulnerability to retrieve sensitive information from the database. |
2026-03-26 | |
| CVE-2025-55261 | 8.1 | HIGH | CWE-284 | 0.0% p13 | 5.67 | HCL Aftermarket DPC is affected by Missing Functional Level Access Control which...HCL Aftermarket DPC is affected by Missing Functional Level Access Control which will allow attacker to escalate his privileges and may compromise the application and may steal and manipulate the data. |
2026-03-26 | |
| CVE-2019-25650 | 8.6 | HIGH | CWE-787 | 0.0% p4 | 6.02 | River Past CamDo 3.7.6 contains a structured exception handler (SEH) buffer over...River Past CamDo 3.7.6 contains a structured exception handler (SEH) buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying a malicious string in the Lame_enc.dll name field. Attackers can craft a payload with a 280-byte buffer, NSEH jump instruction, and SEH handler address pointing to a pop-pop-ret gadget to trigger code execution and establish a bind shell on port 3110. |
2026-03-26 | |
| CVE-2019-25649 | 6.8 | MEDIUM | CWE-787 | 0.0% p4 | 4.76 | River Past Audio Converter 7.7.16 contains a local buffer overflow vulnerability...River Past Audio Converter 7.7.16 contains a local buffer overflow vulnerability in the activation code field that allows local attackers to crash the application by supplying an oversized input string. Attackers can paste a large payload of repeated characters into the 'E-Mail and Activation Code' field and click 'Activate' to trigger a denial of service condition. |
2026-03-26 | |
| CVE-2019-25648 | 6.9 | MEDIUM | CWE-787 | 0.0% p3 | 4.83 | MyVideoConverter Pro 3.14 contains a local buffer overflow vulnerability that al...MyVideoConverter Pro 3.14 contains a local buffer overflow vulnerability that allows attackers to crash the application by supplying an excessively long string to the registration code input field. Attackers can paste a malicious payload containing 10000 bytes into the 'Copy and Paste Registration Code' field to trigger a denial of service condition. |
2026-03-26 | |
| CVE-2018-25219 | 8.6 | HIGH | CWE-787 | 0.0% p3 | 6.02 | PassFab Excel Password Recovery 8.3.1 contains a structured exception handling b...PassFab Excel Password Recovery 8.3.1 contains a structured exception handling buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying a malicious payload in the registration code field. Attackers can craft a buffer overflow payload with a pop-pop-ret gadget and shellcode that triggers code execution when pasted into the Licensed E-mail and Registration Code field during the registration process. |
2026-03-26 | |
| CVE-2018-25218 | 8.6 | HIGH | CWE-787 | 0.0% p3 | 6.02 | PassFab RAR Password Recovery 9.3.2 contains a structured exception handler (SEH...PassFab RAR Password Recovery 9.3.2 contains a structured exception handler (SEH) buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying a malicious payload. Attackers can craft a payload with a buffer overflow, NSEH jump, and shellcode, then paste it into the 'Licensed E-mail and Registration Code' field during registration to trigger code execution. |
2026-03-26 | |
| CVE-2018-25217 | 8.6 | HIGH | CWE-787 | 0.0% p3 | 6.02 | PDF Explorer 1.5.66.2 contains a structured exception handler (SEH) overflow vul...PDF Explorer 1.5.66.2 contains a structured exception handler (SEH) overflow vulnerability that allows local attackers to execute arbitrary code by overwriting SEH records with malicious data. Attackers can craft a payload with buffer overflow, NSEH jump, and ROP gadget chains that execute when the Custom fields settings dialog processes the malicious input in the Label field. |
2026-03-26 | |
| CVE-2018-25216 | 6.9 | MEDIUM | CWE-787 | 0.0% p2 | 4.83 | AnyBurn 4.3 contains a local buffer overflow vulnerability that allows local att...AnyBurn 4.3 contains a local buffer overflow vulnerability that allows local attackers to crash the application by supplying an excessively long string in the image file name field. Attackers can paste a 10000-byte payload into the 'Image file name' parameter during the 'Copy disk to Image' operation to trigger a denial of service condition. |
2026-03-26 | |
| CVE-2018-25215 | 6.8 | MEDIUM | CWE-787 | 0.0% p2 | 4.76 | Excel Password Recovery Professional 8.2.0.0 contains a local buffer overflow vu...Excel Password Recovery Professional 8.2.0.0 contains a local buffer overflow vulnerability that allows attackers to cause a denial of service by supplying an excessively long string to the 'E-Mail and Registrations Code' field. Attackers can paste a crafted payload containing 5000 bytes of data into the registration field to trigger a crash when the Register button is clicked. |
2026-03-26 | |
| CVE-2018-25214 | 6.9 | MEDIUM | CWE-787 | 0.0% p2 | 4.83 | MegaPing contains a local buffer overflow vulnerability that allows local attack...MegaPing contains a local buffer overflow vulnerability that allows local attackers to crash the application by supplying an oversized payload to the Destination Address List field in the Finger function. Attackers can paste a crafted buffer exceeding expected input limits into the vulnerable field and trigger the Start button to cause a denial of service crash. |
2026-03-26 | |
| CVE-2018-25213 | 8.6 | HIGH | CWE-787 | 0.0% p3 | 6.02 | Nsauditor 3.0.28.0 contains a structured exception handling buffer overflow vuln...Nsauditor 3.0.28.0 contains a structured exception handling buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying malicious input to the DNS Lookup tool. Attackers can craft a payload with SEH chain overwrite and inject shellcode through the DNS Query field to achieve code execution with application privileges. |
2026-03-26 | |
| CVE-2018-25212 | 8.6 | HIGH | CWE-787 | 0.0% p3 | 6.02 | Boxoft wav-wma Converter 1.0 contains a local buffer overflow vulnerability in s...Boxoft wav-wma Converter 1.0 contains a local buffer overflow vulnerability in structured exception handling that allows attackers to execute arbitrary code by crafting malicious WAV files. Attackers can create a specially crafted WAV file with excessive data and ROP gadgets to overwrite the SEH chain and achieve code execution on Windows systems. |
2026-03-26 | |
| CVE-2018-25211 | 8.5 | HIGH | CWE-787 | 0.0% p4 | 5.95 | Allok Video Splitter 3.1.1217 contains a buffer overflow vulnerability that allo...Allok Video Splitter 3.1.1217 contains a buffer overflow vulnerability that allows local attackers to cause a denial of service or execute arbitrary code by supplying an oversized string in the License Name field. Attackers can craft a malicious payload exceeding 780 bytes, paste it into the License Name registration field, and trigger the overflow when the Register button is clicked. |
2026-03-26 | |
| CVE-2026-4887 | 6.1 | MEDIUM | CWE-193 | 0.1% p24 | 4.27 | A flaw was found in GIMP. This issue is a heap buffer over-read in GIMP PCX file...A flaw was found in GIMP. This issue is a heap buffer over-read in GIMP PCX file loader due to an off-by-one error. A remote attacker could exploit this by convincing a user to open a specially crafted PCX image. Successful exploitation could lead to out-of-bounds memory disclosure and a possible application crash, resulting in a Denial of Service (DoS). |
2026-03-26 | |
| CVE-2026-4875 | 5.1 | MEDIUM | CWE-284 | 0.0% p14 | 3.57 | A vulnerability was determined in itsourcecode Free Hotel Reservation System 1.0...A vulnerability was determined in itsourcecode Free Hotel Reservation System 1.0. The affected element is an unknown function of the file /admin/mod_amenities/index.php?view=add. This manipulation of the argument image causes unrestricted upload. The attack is possible to be carried out remotely. The exploit has been publicly disclosed and may be utilized. |
2026-03-26 | |
| CVE-2026-1961 | 8.0 | HIGH | CWE-78 | 0.1% p29 | 5.60 | A flaw was found in Foreman. A remote attacker could exploit a command injection...A flaw was found in Foreman. A remote attacker could exploit a command injection vulnerability in Foreman's WebSocket proxy implementation. This vulnerability arises from the system's use of unsanitized hostname values from compute resource providers when constructing shell commands. By operating a malicious compute resource server, an attacker could achieve remote code execution on the Foreman server when a user accesses VM VNC console functionality. This could lead to the compromise of sensitive credentials and the entire managed infrastructure. |
2026-03-26 | |
| CVE-2025-55277 | 2.6 | LOW | CWE-1104 | 0.1% p16 | 1.82 | HCL Aftermarket DPC is affected by Use of Vulnerable/Outdated Versions vulnerabi...HCL Aftermarket DPC is affected by Use of Vulnerable/Outdated Versions vulnerability using which an attacker may make use of the exploits available across the internet and craft attacks against the application. |
2026-03-26 | |
| CVE-2025-55276 | 3.1 | LOW | CWE-200 | 0.0% p8 | 2.17 | HCL Aftermarket DPC is affected by Internal IP Disclosure vulnerability will giv...HCL Aftermarket DPC is affected by Internal IP Disclosure vulnerability will give attackers a clearer map of the organization’s network layout. |
2026-03-26 | |
| CVE-2025-55275 | 3.7 | LOW | CWE-557 | 0.0% p8 | 2.59 | HCL Aftermarket DPC is affected by Admin Session Concurrency vulnerability using...HCL Aftermarket DPC is affected by Admin Session Concurrency vulnerability using which an attacker can exploit concurrent sessions to hijack or impersonate an admin user. |
2026-03-26 | |
| CVE-2025-55274 | 2.6 | LOW | CWE-942 | 0.0% p9 | 1.82 | HCL Aftermarket DPC is affected by Cross-Origin Resource Sharing vulnerability. ...HCL Aftermarket DPC is affected by Cross-Origin Resource Sharing vulnerability. CORS misconfigurations includes the exposure of sensitive user information to attackers, unauthorized access to APIs, and possible data manipulation or leakage. If an attacker to exploit CORS misconfiguration, they could steal sensitive data, perform actions on behalf of a legitimate user. |
2026-03-26 | |
| CVE-2025-55273 | 4.3 | MEDIUM | CWE-829 | 0.0% p9 | 3.01 | HCL Aftermarket DPC is affected by Cross Domain Script Include vulnerability whe...HCL Aftermarket DPC is affected by Cross Domain Script Include vulnerability where an attacker using external scripts can tamper with the DOM, altering the content or behavior of the application. Malicious scripts can steal cookies or session tokens, leading to session hijacking. |
2026-03-26 | |
| CVE-2025-55272 | 3.1 | LOW | CWE-200 | 0.0% p8 | 2.17 | HCL Aftermarket DPC is affected by Banner Disclosure vulnerability where attacke...HCL Aftermarket DPC is affected by Banner Disclosure vulnerability where attackers gain insights into the system’s software and version details which would allow them to craft software specific attacks. |
2026-03-26 | |
| CVE-2025-55271 | 3.1 | LOW | CWE-113 | 0.0% p12 | 2.17 | HCL Aftermarket DPC is affected by HTTP Response Splitting vulnerability where i...HCL Aftermarket DPC is affected by HTTP Response Splitting vulnerability where in depending on how the web application handles the split response, an attacker may be able to execute arbitrary commands or inject harmful content into the response.. |
2026-03-26 | |
| CVE-2025-55270 | 3.5 | LOW | CWE-20 | 0.1% p22 | 2.45 | HCL Aftermarket DPC is affected by Improper Input Validation which allows an att...HCL Aftermarket DPC is affected by Improper Input Validation which allows an attacker to inject executable code and can carry out attacks such as XSS, SQL Injection, Command Injection etc. |
2026-03-26 | |
| CVE-2025-55269 | 4.2 | MEDIUM | CWE-521 | 0.1% p16 | 2.94 | HCL Aftermarket DPC is affected by Weak Password Policy vulnerability, which mak...HCL Aftermarket DPC is affected by Weak Password Policy vulnerability, which makes it easier for attackers to guess weak passwords or use brute-force techniques to gain unauthorized access to user accounts. |
2026-03-26 | |
| CVE-2025-55268 | 4.3 | MEDIUM | CWE-799 | 0.1% p15 | 3.01 | HCL Aftermarket DPC is affected by Spamming Vulnerability which can allow the ac...HCL Aftermarket DPC is affected by Spamming Vulnerability which can allow the actor to excessive spamming can consume server bandwidth and processing resources which may lead to Denial of Service. |
2026-03-26 | |
| CVE-2025-55267 | 5.7 | MEDIUM | CWE-434 | 0.0% p9 | 3.99 | HCL Aftermarket DPC is affected by Unrestricted File Upload vulnerability, allow...HCL Aftermarket DPC is affected by Unrestricted File Upload vulnerability, allows attacker to upload and execute malicious scripts, gaining full control over the server. |
2026-03-26 | |
| CVE-2025-55266 | 5.9 | MEDIUM | CWE-384 | 0.0% p10 | 4.13 | HCL Aftermarket DPC is affected by Session Fixation which allows attacker to tak...HCL Aftermarket DPC is affected by Session Fixation which allows attacker to takeover the user's session and use it carry out unauthorized transaction behalf of the user. |
2026-03-26 | |
| CVE-2025-55265 | 6.5 | MEDIUM | CWE-200 | 0.0% p10 | 4.55 | HCL Aftermarket DPC is affected by File Discovery which allows attacker could ex...HCL Aftermarket DPC is affected by File Discovery which allows attacker could exploit this issue to read sensitive files present in the system and may use it to craft further attacks. |
2026-03-26 | |
| CVE-2025-41359 | 8.5 | HIGH | CWE-428 | 0.0% p4 | 5.95 | Vulnerability related to an unquoted service path in Small HTTP Server 3.06.36, ...Vulnerability related to an unquoted service path in Small HTTP Server 3.06.36, specifically affecting the executable located at 'C:\Program Files (x86)\shttps_mg\http.exe service'. This misconfiguration allows a local attacker to place a malicious executable with the same name in a higher priority directory, causing the service to execute the malicious file instead of the legitimate one. Exploiting this flaw could allow arbitrary code execution, unauthorized access to the system, or service disruption. To mitigate the risk, the service path must be properly quoted, and systems must be kept up to date with security patches, while restricting physical and network access. |
2026-03-26 | |
| CVE-2025-41027 | 5.1 | MEDIUM | CWE-79 | 0.0% p8 | 3.57 | Reflected Cross Site Scripting (XSS) vulnerabilities in GDTaller. These vulnerab...Reflected Cross Site Scripting (XSS) vulnerabilities in GDTaller. These vulnerabilities allows an attacker execute JavaScript code in the victim's browser by sending a malicious URL in 'site' parameter in 'app_recuperarclave.php'. |
2026-03-26 | |
| CVE-2025-41026 | 5.1 | MEDIUM | CWE-79 | 0.0% p8 | 3.57 | Reflected Cross Site Scripting (XSS) vulnerabilities in GDTaller. These vulnerab...Reflected Cross Site Scripting (XSS) vulnerabilities in GDTaller. These vulnerabilities allows an attacker execute JavaScript code in the victim's browser by sending a malicious URL in 'site' parameter in 'app_login.php'. |
2026-03-26 | |
| CVE-2025-41368 | 8.7 | HIGH | CWE-22 | 0.0% p6 | 6.09 | Problem in the Small HTTP Server v3.06.36 service. An authenticated path travers...Problem in the Small HTTP Server v3.06.36 service. An authenticated path traversal vulnerability in '/' allows remote users to bypass the intended restrictions of SecurityManager and display any file if they have the appropriate permissions outside the document root configured on the server. |
2026-03-26 | |
| CVE-2018-25210 | 8.8 | HIGH | CWE-79 | 0.1% p25 | 6.16 | WebOfisi E-Ticaret 4.0 contains an SQL injection vulnerability in the 'urun' GET...WebOfisi E-Ticaret 4.0 contains an SQL injection vulnerability in the 'urun' GET parameter of the endpoint that allows unauthenticated attackers to manipulate database queries. Attackers can inject SQL payloads through the 'urun' parameter to execute boolean-based blind, error-based, time-based blind, and stacked query attacks against the backend database. |
2026-03-26 | |
| CVE-2018-25209 | 8.8 | HIGH | CWE-89 | 0.3% p50 | 6.17 | OpenBiz Cubi Lite 3.0.8 contains a SQL injection vulnerability in the login form...OpenBiz Cubi Lite 3.0.8 contains a SQL injection vulnerability in the login form that allows unauthenticated attackers to manipulate database queries through the username parameter. Attackers can submit POST requests to /bin/controller.php with malicious SQL code in the username field to extract sensitive database information or bypass authentication. |
2026-03-26 | |
| CVE-2018-25208 | 8.8 | HIGH | CWE-89 | 0.1% p25 | 6.16 | qdPM 9.1 contains an SQL injection vulnerability that allows unauthenticated att...qdPM 9.1 contains an SQL injection vulnerability that allows unauthenticated attackers to extract database information by injecting SQL code through filter_by parameters. Attackers can submit malicious POST requests to the timeReport endpoint with crafted filter_by[CommentCreatedFrom] and filter_by[CommentCreatedTo] parameters to execute arbitrary SQL queries and retrieve sensitive data. |
2026-03-26 | |
| CVE-2018-25207 | 7.1 | HIGH | CWE-89 | 0.1% p28 | 4.97 | Online Quiz Maker 1.0 contains SQL injection vulnerabilities in the catid and us...Online Quiz Maker 1.0 contains SQL injection vulnerabilities in the catid and usern parameters that allow authenticated attackers to execute arbitrary SQL commands. Attackers can submit malicious POST requests to quiz-system.php or add-category.php with crafted SQL payloads in POST parameters to extract sensitive database information or bypass authentication. |
2026-03-26 | |
| CVE-2018-25206 | 8.8 | HIGH | CWE-89 | 0.0% p13 | 6.16 | KomSeo Cart 1.3 contains an SQL injection vulnerability that allows attackers to...KomSeo Cart 1.3 contains an SQL injection vulnerability that allows attackers to inject SQL commands through the 'my_item_search' parameter in edit.php. Attackers can submit POST requests with malicious SQL payloads to extract sensitive database information using boolean-based blind or error-based injection techniques. |
2026-03-26 | |
| CVE-2018-25205 | 8.8 | HIGH | CWE-89 | 0.1% p24 | 6.16 | ASP.NET jVideo Kit 1.0 contains an SQL injection vulnerability that allows unaut...ASP.NET jVideo Kit 1.0 contains an SQL injection vulnerability that allows unauthenticated attackers to inject SQL commands through the 'query' parameter in the search functionality. Attackers can submit malicious SQL payloads via GET or POST requests to the /search endpoint to extract sensitive database information using boolean-based blind or error-based techniques. |
2026-03-26 | |
| CVE-2018-25204 | 8.8 | HIGH | CWE-89 | 0.4% p60 | 6.17 | Library CMS 1.0 contains an SQL injection vulnerability that allows unauthentica...Library CMS 1.0 contains an SQL injection vulnerability that allows unauthenticated attackers to bypass authentication by injecting SQL code through the username parameter. Attackers can send POST requests to the admin login endpoint with boolean-based blind SQL injection payloads in the username field to manipulate database queries and gain unauthorized access. |
2026-03-26 | |
| CVE-2018-25203 | 8.8 | HIGH | CWE-89 | 0.1% p24 | 6.16 | Online Store System CMS 1.0 contains an SQL injection vulnerability that allows ...Online Store System CMS 1.0 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the email parameter. Attackers can send POST requests to index.php with the action=clientaccess parameter using boolean-based blind or time-based blind SQL injection payloads in the email field to extract sensitive database information. |
2026-03-26 | |
| CVE-2018-25202 | 8.8 | HIGH | CWE-89 | 0.0% p13 | 6.16 | SAT CFDI 3.3 contains an SQL injection vulnerability that allows attackers to ma...SAT CFDI 3.3 contains an SQL injection vulnerability that allows attackers to manipulate database queries by injecting SQL code through the 'id' parameter in the signIn endpoint. Attackers can submit POST requests with boolean-based blind, stacked queries, or time-based blind SQL injection payloads to extract sensitive data or compromise the application. |
2026-03-26 | |
| CVE-2018-25201 | 7.1 | HIGH | CWE-89 | 0.1% p30 | 4.97 | School Management System CMS 1.0 contains an SQL injection vulnerability in the ...School Management System CMS 1.0 contains an SQL injection vulnerability in the admin login functionality that allows attackers to bypass authentication by injecting SQL code through the username parameter. Attackers can submit malicious payloads using boolean-based blind SQL injection techniques to the processlogin endpoint to authenticate as administrator without valid credentials. |
2026-03-26 | |
| CVE-2018-25195 | 8.8 | HIGH | CWE-89 | 0.4% p60 | 6.17 | Wecodex Hotel CMS 1.0 contains an SQL injection vulnerability in the admin login...Wecodex Hotel CMS 1.0 contains an SQL injection vulnerability in the admin login functionality that allows unauthenticated attackers to bypass authentication by injecting SQL code. Attackers can submit malicious SQL payloads through the username parameter in POST requests to index.php with action=processlogin to extract sensitive database information or gain unauthorized administrative access. |
2026-03-26 | |
| CVE-2018-25185 | 8.8 | HIGH | CWE-89 | 0.1% p29 | 6.16 | Wecodex Restaurant CMS 1.0 contains an SQL injection vulnerability that allows u...Wecodex Restaurant CMS 1.0 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the username parameter. Attackers can send POST requests to the login endpoint with malicious SQL payloads using boolean-based blind or time-based blind techniques to extract sensitive database information. |
2026-03-26 | |
| CVE-2018-25183 | 8.8 | HIGH | CWE-89 | 0.4% p60 | 6.17 | Shipping System CMS 1.0 contains an SQL injection vulnerability that allows unau...Shipping System CMS 1.0 contains an SQL injection vulnerability that allows unauthenticated attackers to bypass authentication by injecting SQL code through the username parameter. Attackers can submit malicious SQL payloads using boolean-based blind techniques in POST requests to the admin login endpoint to authenticate without valid credentials. |
2026-03-26 | |
| CVE-2026-4809 | 9.3 | CRITICAL | CWE-434 | 0.5% p66 | 6.53 | plank/laravel-mediable through version 6.4.0 can allow upload of a dangerous fil...plank/laravel-mediable through version 6.4.0 can allow upload of a dangerous file type when an application using the package accepts or prefers a client-supplied MIME type during file upload handling. In that configuration, a remote attacker can submit a file containing executable PHP code while declaring a benign image MIME type, resulting in arbitrary file upload. If the uploaded file is stored in a web-accessible and executable location, this may lead to remote code execution. At the time of publication, no patch was available and the vendor had not responded to coordinated disclosure attempts. |
2026-03-26 | |
| CVE-2026-4274 | 5.4 | MEDIUM | CWE-863 | 0.0% p8 | 3.78 | Mattermost versions 11.2.x <= 11.2.2, 10.11.x <= 10.11.10, 11.4.x <= 11.4.0, 11....Mattermost versions 11.2.x <= 11.2.2, 10.11.x <= 10.11.10, 11.4.x <= 11.4.0, 11.3.x <= 11.3.1 fail to restrict team-level access when processing membership sync from a remote cluster, which allows a malicious remote cluster to grant a user access to an entire private team instead of only the shared channel via sending crafted membership sync messages that trigger team membership assignment. Mattermost Advisory ID: MMSA-2026-00574 |
2026-03-26 | |
| CVE-2026-24068 | 8.8 | HIGH | CWE-306 | 0.0% p13 | 6.16 | The VSL privileged helper does utilize NSXPC for IPC. The implementation of the ...The VSL privileged helper does utilize NSXPC for IPC. The implementation of the "shouldAcceptNewConnection" function, which is used by the NSXPC framework to validate if a client should be allowed to connect to the XPC listener, does not validate clients at all. This means that any process can connect to this service using the configured protocol. A malicious process is able to call all the functions defined in the corresponding HelperToolProtocol. No validation is performed in the functions "writeReceiptFile" and “runUninstaller” of the HelperToolProtocol. This allows an attacker to write files to any location with any data as well as execute any file with any arguments. Any process can call these functions because of the missing XPC client validation described before. The abuse of the missing endpoint validation leads to privilege escalation. |
2026-03-26 | |
| CVE-2026-4862 | 7.4 | HIGH | CWE-119 | 0.0% p14 | 5.18 | A security vulnerability has been detected in UTT HiPER 1250GW up to 3.2.7-21090...A security vulnerability has been detected in UTT HiPER 1250GW up to 3.2.7-210907-180535. This issue affects the function strcpy of the file /goform/formConfigDnsFilterGlobal of the component Parameter Handler. Such manipulation of the argument GroupName leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed publicly and may be used. |
2026-03-26 | |
| CVE-2026-4262 | 6.9 | MEDIUM | CWE-863 | 0.1% p16 | 4.83 | Vulnerability of incorrect authorization in HiJiffy Chatbot allows an attacker t...Vulnerability of incorrect authorization in HiJiffy Chatbot allows an attacker to download private messages from other users via the parameter 'ID' in '/api/v1/download/<ID>/'. |
2026-03-26 | |
| CVE-2026-4861 | 7.4 | HIGH | CWE-119 | 0.0% p14 | 5.18 | A weakness has been identified in Wavlink WL-NU516U1 260227. This vulnerability ...A weakness has been identified in Wavlink WL-NU516U1 260227. This vulnerability affects the function ftext of the file /cgi-bin/nas.cgi. This manipulation of the argument Content-Length causes stack-based buffer overflow. The attack can be initiated remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-26 | |
| CVE-2026-4860 | 6.9 | MEDIUM | CWE-20 | 0.0% p13 | 4.83 | A security flaw has been discovered in 648540858 wvp-GB28181-pro up to 2.7.4. Th...A security flaw has been discovered in 648540858 wvp-GB28181-pro up to 2.7.4. This affects the function GenericFastJsonRedisSerializer of the file src/main/java/com/genersoft/iot/vmp/conf/redis/RedisTemplateConfig.java of the component API Endpoint. The manipulation results in deserialization. It is possible to launch the attack remotely. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-26 | |
| CVE-2026-4874 | 3.1 | LOW | CWE-918 | 0.0% p6 | 2.17 | A flaw was found in Keycloak. An authenticated attacker can perform Server-Side ...A flaw was found in Keycloak. An authenticated attacker can perform Server-Side Request Forgery (SSRF) by manipulating the `client_session_host` parameter during refresh token requests. This occurs when a Keycloak client is configured to use the `backchannel.logout.url` with the `application.session.host` placeholder. Successful exploitation allows the attacker to make HTTP requests from the Keycloak server’s network context, potentially probing internal networks or internal APIs, leading to information disclosure. |
2026-03-26 | |
| CVE-2026-4850 | 6.9 | MEDIUM | CWE-74 | 0.0% p10 | 4.83 | A security flaw has been discovered in code-projects Simple Laundry System 1.0. ...A security flaw has been discovered in code-projects Simple Laundry System 1.0. Affected is an unknown function of the file /checkregisitem.php of the component Parameter Handler. The manipulation of the argument Long-arm-shirtVol results in sql injection. The attack may be launched remotely. The exploit has been released to the public and may be used for attacks. |
2026-03-26 | |
| CVE-2026-4849 | 5.3 | MEDIUM | CWE-79 | 0.0% p9 | 3.71 | A vulnerability was identified in code-projects Simple Laundry System 1.0. This ...A vulnerability was identified in code-projects Simple Laundry System 1.0. This impacts an unknown function of the file /modify.php of the component Parameter Handler. The manipulation of the argument firstName leads to cross site scripting. The attack may be initiated remotely. The exploit is publicly available and might be used. |
2026-03-26 | |
| CVE-2026-4848 | 5.3 | MEDIUM | CWE-79 | 0.0% p9 | 3.71 | A vulnerability was determined in dameng100 muucmf 1.9.5.20260309. This affects ...A vulnerability was determined in dameng100 muucmf 1.9.5.20260309. This affects an unknown function of the file /admin/extend/list.html. Executing a manipulation of the argument Name can lead to cross site scripting. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-26 | |
| CVE-2026-4847 | 5.3 | MEDIUM | CWE-79 | 0.0% p9 | 3.71 | A vulnerability was found in dameng100 muucmf 1.9.5.20260309. The impacted eleme...A vulnerability was found in dameng100 muucmf 1.9.5.20260309. The impacted element is an unknown function of the file /admin/config/list.html. Performing a manipulation of the argument Name results in cross site scripting. The attack can be initiated remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-26 | |
| CVE-2026-32680 | 8.5 | HIGH | CWE-276 | 0.0% p2 | 5.95 | The installer of RATOC RAID Monitoring Manager for Windows allows to customize t...The installer of RATOC RAID Monitoring Manager for Windows allows to customize the installation folder. If the installation folder is customized to some non-default one, the folder may be left with un-secure ACLs and non-administrative users can alter contents of that folder. It may allow a non-administrative user to execute an arbitrary code with SYSTEM privilege. |
2026-03-26 | |
| CVE-2026-28760 | 8.4 | HIGH | CWE-427 | 0.0% p3 | 5.88 | The installer of RATOC RAID Monitoring Manager for Windows searches the current ...The installer of RATOC RAID Monitoring Manager for Windows searches the current directory to load certain DLLs. If a user is directed to place a crafted DLL with the installer, an arbitrary code may be executed with the administrator privilege. |
2026-03-26 | |
| CVE-2026-1890 | 5.3 | MEDIUM | N/A | 0.1% p15 | 3.71 | The LeadConnector WordPress plugin before 3.0.22 does not have authorization in ...The LeadConnector WordPress plugin before 3.0.22 does not have authorization in a REST route, allowing unauthenticated users to call it and overwrite existing data |
2026-03-26 | |
| CVE-2026-1430 | 4.8 | MEDIUM | N/A | 0.0% p8 | 3.36 | The WP Lightbox 2 WordPress plugin before 3.0.7 does not sanitise and escape som...The WP Lightbox 2 WordPress plugin before 3.0.7 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). |
2026-03-26 | |
| CVE-2025-15488 | 6.5 | MEDIUM | N/A | 0.1% p27 | 4.55 | The Responsive Plus WordPress plugin before 3.4.3 is vulnerable to arbitrary sh...The Responsive Plus WordPress plugin before 3.4.3 is vulnerable to arbitrary shortcode execution due to the software allowing unauthenticated users to execute the update_responsive_woo_free_shipping_left_shortcode AJAX action that does not properly validate the content_rech_data parameter before processing it as a shortcode. |
2026-03-26 | |
| CVE-2025-15433 | 6.8 | MEDIUM | N/A | 0.1% p16 | 4.76 | The Shared Files WordPress plugin before 1.7.58 allows users with a role as low...The Shared Files WordPress plugin before 1.7.58 allows users with a role as low as Contributor to download any file on the web server (such as wp-config.php) via a path traversal vector |
2026-03-26 | |
| CVE-2026-4846 | 5.3 | MEDIUM | CWE-79 | 0.0% p9 | 3.71 | A vulnerability has been found in dameng100 muucmf 1.9.5.20260309. The affected ...A vulnerability has been found in dameng100 muucmf 1.9.5.20260309. The affected element is an unknown function of the file channel/admin.Account/autoReply.html. Such manipulation of the argument keyword leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-26 | |
| CVE-2026-4845 | 5.3 | MEDIUM | CWE-79 | 0.0% p9 | 3.71 | A flaw has been found in dameng100 muucmf 1.9.5.20260309. Impacted is an unknown...A flaw has been found in dameng100 muucmf 1.9.5.20260309. Impacted is an unknown function of the file /admin/Member/index.html. This manipulation of the argument Search causes cross site scripting. It is possible to initiate the attack remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-26 | |
| CVE-2026-1206 | 4.3 | MEDIUM | CWE-639 | 0.0% p7 | 3.01 | The Elementor Website Builder plugin for WordPress is vulnerable to Incorrect Au...The Elementor Website Builder plugin for WordPress is vulnerable to Incorrect Authorization to Sensitive Information Exposure in all versions up to, and including, 3.35.7. This is due to a logic error in the is_allowed_to_read_template() function permission check that treats non-published templates as readable without verifying edit capabilities. This makes it possible for authenticated attackers, with contributor-level access and above, to read private or draft Elementor template content via the 'template_id' supplied to the 'get_template_data' action of the 'elementor_ajax' endpoint. |
2026-03-26 | |
| CVE-2026-4844 | 6.9 | MEDIUM | CWE-74 | 0.0% p11 | 4.83 | A vulnerability was detected in code-projects Online Food Ordering System 1.0. T...A vulnerability was detected in code-projects Online Food Ordering System 1.0. This issue affects some unknown processing of the file /admin.php of the component Admin Login Module. The manipulation of the argument Username results in sql injection. The attack may be performed from remote. The exploit is now public and may be used. |
2026-03-26 | |
| CVE-2026-4842 | 6.9 | MEDIUM | CWE-74 | 0.0% p11 | 4.83 | A security vulnerability has been detected in itsourcecode Online Enrollment Sys...A security vulnerability has been detected in itsourcecode Online Enrollment System 1.0. This vulnerability affects unknown code of the file /sms/grades/index.php?view=edit&id=1 of the component Parameter Handler. The manipulation of the argument deptid leads to sql injection. The attack is possible to be carried out remotely. The exploit has been disclosed publicly and may be used. |
2026-03-26 | |
| CVE-2026-4841 | 6.9 | MEDIUM | CWE-74 | 0.0% p11 | 4.83 | A weakness has been identified in code-projects Online Food Ordering System 1.0....A weakness has been identified in code-projects Online Food Ordering System 1.0. This affects an unknown part of the file form/cart.php of the component Shopping Cart Module. Executing a manipulation of the argument del can lead to sql injection. The attack can be executed remotely. The exploit has been made available to the public and could be used for attacks. |
2026-03-26 | |
| CVE-2026-4840 | 7.4 | HIGH | CWE-77 | 0.2% p42 | 5.19 | A security flaw has been discovered in Netcore Power 15AX up to 3.0.0.6938. Affe...A security flaw has been discovered in Netcore Power 15AX up to 3.0.0.6938. Affected by this issue is the function setTools of the file /bin/netis.cgi of the component Diagnostic Tool Interface. Performing a manipulation of the argument IpAddr results in os command injection. Remote exploitation of the attack is possible. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-26 | |
| CVE-2026-4389 | 6.4 | MEDIUM | CWE-79 | 0.0% p10 | 4.48 | The DSGVO snippet for Leaflet Map and its Extensions plugin for WordPress is vul...The DSGVO snippet for Leaflet Map and its Extensions plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the `leafext-cookie-time` and `leafext-delete-cookie` shortcodes in all versions up to, and including, 3.1. This is due to insufficient input sanitization and output escaping on user supplied attributes (`unset`, `before`, `after`). This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-03-26 | |
| CVE-2026-4331 | 4.3 | MEDIUM | CWE-862 | 0.0% p13 | 3.01 | The Blog2Social: Social Media Auto Post & Scheduler plugin for WordPress is vuln...The Blog2Social: Social Media Auto Post & Scheduler plugin for WordPress is vulnerable to unauthorized data loss in all versions up to, and including, 8.8.2. This is due to the resetSocialMetaTags() function only verifying that the user has the 'read' capability and a valid b2s_security_nonce, both of which are available to Subscriber-level users, as the plugin grants 'blog2social_access' capability to all roles upon activation, allowing them to access the plugin's admin pages where the nonce is output. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete all _b2s_post_meta records from the wp_postmeta table, permanently removing all custom social media meta tags for every post on the site. |
2026-03-26 | |
| CVE-2026-4329 | 7.2 | HIGH | CWE-79 | 0.2% p36 | 5.04 | The Blackhole for Bad Bots plugin for WordPress is vulnerable to Stored Cross-Si...The Blackhole for Bad Bots plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the User-Agent HTTP header in all versions up to and including 3.8. This is due to insufficient input sanitization and output escaping. The plugin uses sanitize_text_field() when capturing bot data (which strips HTML tags but does not escape HTML entities like double quotes), then stores the data via update_option(). When an administrator views the Bad Bots log page, the stored data is output directly into HTML input value attributes (lines 75-83) without esc_attr() and into HTML span content without esc_html(). This makes it possible for unauthenticated attackers to inject arbitrary web scripts that execute when an administrator views the Blackhole Bad Bots admin page. |
2026-03-26 | |
| CVE-2026-4281 | 5.3 | MEDIUM | CWE-862 | 0.2% p48 | 3.72 | The FormLift for Infusionsoft Web Forms plugin for WordPress is vulnerable to Mi...The FormLift for Infusionsoft Web Forms plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 7.5.21. This is due to missing capability checks on the connect() and listen_for_tokens() methods of the FormLift_Infusionsoft_Manager class, both of which are hooked to 'plugins_loaded' and execute on every page load. The connect() function generates an OAuth connection password and leaks it in the redirect Location header without verifying the requesting user is authenticated or authorized. The listen_for_tokens() function only validates the temporary password but performs no user authentication before calling update_option() to save attacker-controlled OAuth tokens and app domain. This makes it possible for unauthenticated attackers to hijack the site's Infusionsoft connection by first triggering the OAuth flow to obtain the temporary password, then using that password to set arbitrary OAuth tokens and app domain via update_option(), effectively redirecting the plugin's API communication to an attacker-controlled server. |
2026-03-26 | |
| CVE-2026-4278 | 6.4 | MEDIUM | CWE-79 | 0.1% p19 | 4.48 | The Simple Download Counter plugin for WordPress is vulnerable to Stored Cross-S...The Simple Download Counter plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'sdc_menu' shortcode in all versions up to, and including, 2.3. This is due to insufficient input sanitization and output escaping on user-supplied shortcode attributes, specifically the 'text' and 'cat' attributes. The 'text' attribute is output directly into HTML content on line 159 without any escaping (e.g., esc_html()). The 'cat' attribute is used unescaped in HTML class attributes on lines 135 and 157 without esc_attr(). This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-03-26 | |
| CVE-2026-33201 | 7.0 | HIGH | CWE-489 | 0.0% p7 | 4.90 | Digital Photo Frame GH-WDF10A provided by GREEN HOUSE CO., LTD. contains an acti...Digital Photo Frame GH-WDF10A provided by GREEN HOUSE CO., LTD. contains an active debug code vulnerability. If this vulnerability is exploited, files or configurations on the affected device may be read or written, or arbitrary files may be executed with root privileges. |
2026-03-26 | |
| CVE-2026-2931 | 8.8 | HIGH | CWE-269 | 0.0% p13 | 6.16 | The Amelia Booking plugin for WordPress is vulnerable to Insecure Direct Object ...The Amelia Booking plugin for WordPress is vulnerable to Insecure Direct Object References in versions up to, and including, 9.1.2. This is due to the plugin providing user-controlled access to objects, letting a user bypass authorization and access system resources. This makes it possible for authenticated attackers with customer-level permissions or above to change user passwords and potentially take over administrator accounts. The vulnerability is in the pro plugin, which has the same slug. |
2026-03-26 | |
| CVE-2026-4839 | 6.9 | MEDIUM | CWE-74 | 0.0% p11 | 4.83 | A vulnerability has been found in SourceCodester Food Ordering System 1.0. This ...A vulnerability has been found in SourceCodester Food Ordering System 1.0. This affects an unknown function of the file /purchase.php of the component Parameter Handler. The manipulation of the argument custom leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. |
2026-03-26 | |
| CVE-2026-4838 | 6.9 | MEDIUM | CWE-74 | 0.0% p11 | 4.83 | A flaw has been found in SourceCodester Malawi Online Market 1.0. The impacted e...A flaw has been found in SourceCodester Malawi Online Market 1.0. The impacted element is an unknown function of the file /display.php. Executing a manipulation of the argument ID can lead to sql injection. It is possible to launch the attack remotely. The exploit has been published and may be used. |
2026-03-26 | |
| CVE-2026-4335 | 5.4 | MEDIUM | CWE-79 | 0.0% p10 | 3.78 | The ShortPixel Image Optimizer plugin for WordPress is vulnerable to Stored Cros...The ShortPixel Image Optimizer plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the attachment post_title in all versions up to, and including, 6.4.3. This is due to insufficient output escaping in the getEditorPopup() function and its corresponding media-popup.php template. Specifically, the attachment's post_title is retrieved from the database via get_post() in AjaxController.php (line 435) and passed directly to the view template (line 449), where it is rendered into an HTML input element's value attribute without esc_attr() escaping (media-popup.php line 139). Since WordPress allows Authors to set arbitrary attachment titles (including double-quote characters) via the REST API, a malicious author can craft an attachment title that breaks out of the HTML attribute and injects arbitrary JavaScript event handlers. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts that execute whenever a higher-privileged user (such as an administrator) opens the ShortPixel AI editor popup (Background Removal or Image Upscale) for the poisoned attachment. |
2026-03-26 | |
| CVE-2026-4075 | 6.4 | MEDIUM | CWE-79 | 0.0% p14 | 4.48 | The BWL Advanced FAQ Manager Lite plugin for WordPress is vulnerable to Stored C...The BWL Advanced FAQ Manager Lite plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'baf_sbox' shortcode in all versions up to and including 1.1.1. This is due to insufficient input sanitization and output escaping on user-supplied shortcode attributes such as 'sbox_id', 'sbox_class', 'placeholder', 'highlight_color', 'highlight_bg', and 'cont_ext_class'. These attributes are directly interpolated into HTML element attributes without any esc_attr() escaping in the baf_sbox() function. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-03-26 | |
| CVE-2026-3328 | 7.2 | HIGH | CWE-502 | 0.5% p66 | 5.06 | The Frontend Admin by DynamiApps plugin for WordPress is vulnerable to PHP Objec...The Frontend Admin by DynamiApps plugin for WordPress is vulnerable to PHP Object Injection via deserialization of the 'post_content' of admin_form posts in all versions up to, and including, 3.28.31. This is due to the use of WordPress's `maybe_unserialize()` function without class restrictions on user-controllable content stored in admin_form post content. This makes it possible for authenticated attackers, with Editor-level access and above, to inject a PHP Object. The additional presence of a POP chain allows attackers to achieve remote code execution. |
2026-03-26 | |
| CVE-2026-1986 | 6.1 | MEDIUM | CWE-79 | 0.1% p21 | 4.27 | The FloristPress for Woo – Customize your eCommerce store for your Florist plugi...The FloristPress for Woo – Customize your eCommerce store for your Florist plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'noresults' parameter in all versions up to, and including, 7.8.2 due to insufficient input sanitization and output escaping on the user supplied 'noresults' parameter. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. |
2026-03-26 | |
| CVE-2026-4836 | 5.3 | MEDIUM | CWE-74 | 0.0% p8 | 3.71 | A vulnerability was detected in code-projects Accounting System 1.0. The affecte...A vulnerability was detected in code-projects Accounting System 1.0. The affected element is an unknown function of the file /my_account/delete.php. Performing a manipulation of the argument cos_id results in sql injection. It is possible to initiate the attack remotely. The exploit is now public and may be used. |
2026-03-26 | |
| CVE-2026-4835 | 5.1 | MEDIUM | CWE-79 | 0.0% p8 | 3.57 | A security vulnerability has been detected in code-projects Accounting System 1....A security vulnerability has been detected in code-projects Accounting System 1.0. Impacted is an unknown function of the file /my_account/add_costumer.php of the component Web Application Interface. Such manipulation of the argument costumer_name leads to cross site scripting. The attack may be performed from remote. The exploit has been disclosed publicly and may be used. |
2026-03-26 | |
| CVE-2026-4833 | 4.8 | MEDIUM | CWE-404 | 0.0% p2 | 3.36 | A weakness has been identified in Orc discount up to 3.0.1.2. This issue affects...A weakness has been identified in Orc discount up to 3.0.1.2. This issue affects the function compile of the file markdown.c of the component Markdown Handler. This manipulation causes uncontrolled recursion. The attack is restricted to local execution. The exploit has been made available to the public and could be used for attacks. The project maintainer confirms: "[I]f you feed it an infinitely deep blockquote input it will crash. (...) [T]his is a duplicate of an old bug that I've been working on." |
2026-03-26 | |
| CVE-2026-4831 | 6.3 | MEDIUM | CWE-287 | 0.1% p22 | 4.41 | A security flaw has been discovered in kalcaddle kodbox 1.64. Impacted is the fu...A security flaw has been discovered in kalcaddle kodbox 1.64. Impacted is the function can of the file /workspace/source-code/app/controller/explorer/auth.class.php of the component Password-protected Share Handler. Performing a manipulation results in improper authentication. The attack is possible to be carried out remotely. The complexity of an attack is rather high. The exploitability is considered difficult. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-26 | |
| CVE-2026-4484 | 8.8 | HIGH | CWE-862 | 0.0% p12 | 6.16 | The Masteriyo LMS plugin for WordPress is vulnerable to Privilege Escalation in ...The Masteriyo LMS plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 2.1.6. This is due to the plugin allowing a user to update the user role through the 'InstructorsController::prepare_object_for_database' function. This makes it possible for authenticated attackers, with Student-level access and above, to elevate their privileges to that of an administrator. |
2026-03-26 | |
| CVE-2026-4830 | 6.3 | MEDIUM | CWE-284 | 0.1% p15 | 4.41 | A vulnerability was identified in kalcaddle kodbox 1.64. This issue affects the ...A vulnerability was identified in kalcaddle kodbox 1.64. This issue affects the function Add of the file app/controller/explorer/userShare.class.php of the component Public Share Handler. Such manipulation leads to unrestricted upload. The attack can be executed remotely. This attack is characterized by high complexity. The exploitability is assessed as difficult. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-26 | |
| CVE-2026-33942 | 8.1 | HIGH | CWE-502 | 0.4% p62 | 5.68 | Saloon is a PHP library that gives users tools to build API integrations and SDK...Saloon is a PHP library that gives users tools to build API integrations and SDKs. Versions prior to 4.0.0 used PHP's unserialize() in AccessTokenAuthenticator::unserialize() to restore OAuth token state from cache or storage, with allowed_classes => true. An attacker who can control the serialized string (e.g. by overwriting a cached token file or via another injection) can supply a serialized "gadget" object. When unserialize() runs, PHP instantiates that object and runs its magic methods (__wakeup, __destruct, etc.), leading to object injection. In environments with common dependencies (e.g. Monolog), this can be chained to remote code execution (RCE). The fix in version 4.0.0 removes PHP serialization from the AccessTokenAuthenticator class requiring users to store and resolve the authenticator manually. |
2026-03-26 | |
| CVE-2026-33526 | 9.2 | CRITICAL | CWE-416 | 1.7% p82 | 6.49 | Squid is a caching proxy for the Web. Prior to version 7.5, due to heap Use-Afte...Squid is a caching proxy for the Web. Prior to version 7.5, due to heap Use-After-Free, Squid is vulnerable to Denial of Service when handling ICP traffic. This problem allows a remote attacker to perform a reliable and repeatable Denial of Service attack against the Squid service using ICP protocol. This attack is limited to Squid deployments that explicitly enable ICP support (i.e. configure non-zero `icp_port`). This problem _cannot_ be mitigated by denying ICP queries using `icp_access` rules. Version 7.5 contains a patch. |
2026-03-26 | |
| CVE-2026-33515 | 6.9 | MEDIUM | CWE-125 | 0.2% p36 | 4.83 | Squid is a caching proxy for the Web. Prior to version 7.5, due to improper inpu...Squid is a caching proxy for the Web. Prior to version 7.5, due to improper input validation, Squid is vulnerable to out of bounds read when handling ICP traffic. This problem allows a remote attacker to receive small amounts of memory potentially containing sensitive information when responding with errors to invalid ICP requests. This attack is limited to Squid deployments that explicitly enable ICP support (i.e. configure non-zero `icp_port`). This problem cannot be mitigated by denying ICP queries using `icp_access` rules. Version 7.5 contains a patch. |
2026-03-26 | |
| CVE-2026-33287 | 7.5 | HIGH | CWE-20 | 0.1% p26 | 5.25 | LiquidJS is a Shopify / GitHub Pages compatible template engine in pure JavaScri...LiquidJS is a Shopify / GitHub Pages compatible template engine in pure JavaScript. Prior to version 10.25.1, the `replace_first` filter in LiquidJS uses JavaScript's `String.prototype.replace()` which interprets `$&` as a back reference to the matched substring. The filter only charges `memoryLimit` for the input string length, not the amplified output. An attacker can achieve exponential memory amplification (up to 625,000:1) while staying within the `memoryLimit` budget, leading to denial of service. Version 10.25.1 patches the issue. |
2026-03-26 | |
| CVE-2026-33285 | 7.5 | HIGH | CWE-20 | 0.1% p26 | 5.25 | LiquidJS is a Shopify / GitHub Pages compatible template engine in pure JavaScri...LiquidJS is a Shopify / GitHub Pages compatible template engine in pure JavaScript. Prior to version 10.25.1, LiquidJS's `memoryLimit` security mechanism can be completely bypassed by using reverse range expressions (e.g., `(100000000..1)`), allowing an attacker to allocate unlimited memory. Combined with a string flattening operation (e.g., `replace` filter), this causes a V8 Fatal error that crashes the Node.js process, resulting in complete denial of service from a single HTTP request. Version 10.25.1 patches the issue. |
2026-03-26 | |
| CVE-2026-33183 | 8.0 | HIGH | CWE-22 | 0.0% p4 | 5.60 | Saloon is a PHP library that gives users tools to build API integrations and SDK...Saloon is a PHP library that gives users tools to build API integrations and SDKs. Prior to version 4.0.0, fixture names were used to build file paths under the configured fixture directory without validation. A name containing path segments (e.g. ../traversal or ../../etc/passwd) resulted in a path outside that directory. When the application read a fixture (e.g. for mocking) or wrote one (e.g. when recording responses), it could read or write files anywhere the process had access. If the fixture name was derived from user or attacker-controlled input (e.g. request parameters or config), this constituted a path traversal vulnerability and could lead to disclosure of sensitive files or overwriting of critical files. The fix in version 4.0.0 adds validation in the fixture layer (rejecting names with /, \, .., or null bytes, and restricting to a safe character set) and defense-in-depth in the storage layer (ensuring the resolved path remains under the base directory before any read or write). |
2026-03-26 | |
| CVE-2026-33182 | 6.6 | MEDIUM | CWE-522 | 0.0% p7 | 4.62 | Saloon is a PHP library that gives users tools to build API integrations and SDK...Saloon is a PHP library that gives users tools to build API integrations and SDKs. Prior to version 4.0.0, when building the request URL, Saloon combined the connector's base URL with the request endpoint. If the endpoint was a valid absolute URL, the code used that URL as-is and ignored the base URL. The request—and any authentication headers, cookies, or tokens attached by the connector—was then sent to the attacker-controlled host. If the endpoint could be influenced by user input or configuration (e.g. redirect_uri, callback URL), this allowed server-side request forgery (SSRF) and/or credential leakage to a third-party host. The fix in version 4.0.0 is to reject absolute URLs in the endpoint: URLHelper::join() throws InvalidArgumentException when the endpoint is a valid absolute URL, unless explicitly allowed, requiring callers to opt-in to the functionality on a per-connector or per-request basis. |
2026-03-26 | |
| CVE-2026-32748 | 8.7 | HIGH | CWE-413 | 1.3% p79 | 6.13 | Squid is a caching proxy for the Web. Prior to version 7.5, due to premature rel...Squid is a caching proxy for the Web. Prior to version 7.5, due to premature release of resource during expected lifetime and heap Use-After-Free bugs, Squid is vulnerable to Denial of Service when handling ICP traffic. This problem allows a remote attacker to perform a reliable and repeatable Denial of Service attack against the Squid service using ICP protocol. This attack is limited to Squid deployments that explicitly enable ICP support (i.e. configure non-zero `icp_port`). This problem _cannot_ be mitigated by denying ICP queries using `icp_access` rules. This bug is fixed in Squid version 7.5. |
2026-03-26 | |
| CVE-2026-4826 | 5.3 | MEDIUM | CWE-74 | 0.0% p7 | 3.71 | A vulnerability was determined in SourceCodester Sales and Inventory System 1.0....A vulnerability was determined in SourceCodester Sales and Inventory System 1.0. This vulnerability affects unknown code of the file /update_stock.php of the component HTTP GET Parameter Handler. This manipulation of the argument sid causes sql injection. Remote exploitation of the attack is possible. The exploit has been publicly disclosed and may be utilized. |
2026-03-26 | |
| CVE-2026-4758 | 8.8 | HIGH | CWE-22 | 0.3% p51 | 6.17 | The WP Job Portal plugin for WordPress is vulnerable to arbitrary file deletion ...The WP Job Portal plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'WPJOBPORTALcustomfields::removeFileCustom' function in all versions up to, and including, 2.4.9. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php). |
2026-03-26 | |
| CVE-2026-34056 | 7.7 | HIGH | CWE-285 | 0.0% p5 | 5.39 | OpenEMR is a free and open source electronic health records and medical practice...OpenEMR is a free and open source electronic health records and medical practice management application. A Broken Access Control vulnerability in OpenEMR up to and including version 8.0.0.3 allows low-privilege users to view and download Ensora eRx error logs without proper authorization checks. This flaw compromises system confidentiality by exposing sensitive information, potentially leading to unauthorized data disclosure and misuse. As of time of publication, no known patches versions are available. |
2026-03-26 | |
| CVE-2026-34055 | 8.1 | HIGH | CWE-639 | 0.0% p4 | 5.67 | OpenEMR is a free and open source electronic health records and medical practice...OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, the legacy patient notes functions in `library/pnotes.inc.php` perform updates and deletes using `WHERE id = ?` without verifying that the note belongs to a patient the user is authorized to access. Multiple web UI callers pass user-controlled note IDs directly to these functions. This is the same class of vulnerability as CVE-2026-25745 (REST API IDOR), but affects the web UI code paths. Version 8.0.0.3 patches the issue. |
2026-03-26 | |
| CVE-2026-34053 | 7.1 | HIGH | CWE-862 | 0.0% p13 | 4.97 | OpenEMR is a free and open source electronic health records and medical practice...OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, missing authorization in the AJAX deletion endpoint `interface/forms/procedure_order/handle_deletions.php` allows any authenticated user, regardless of role, to irreversibly delete procedure orders, answers, and specimens belonging to any patient in the system. Version 8.0.0.3 patches the issue. |
2026-03-26 | |
| CVE-2026-34051 | 5.4 | MEDIUM | CWE-285 | 0.0% p4 | 3.78 | OpenEMR is a free and open source electronic health records and medical practice...OpenEMR is a free and open source electronic health records and medical practice management application. Versions prior to 8.0.0.3 have an improper access control on the Import/Export functionality, allowing unauthorized users to perform import and export actions through direct request manipulation despite UI restrictions. This can lead to unauthorized data access, bulk data extraction, and manipulation of system data. Version 8.0.0.3 contains a fix. |
2026-03-26 | |
| CVE-2026-33934 | 4.3 | MEDIUM | CWE-639 | 0.0% p12 | 3.01 | OpenEMR is a free and open source electronic health records and medical practice...OpenEMR is a free and open source electronic health records and medical practice management application. Versions prior to 8.0.0.3 have a missing authorization check in `portal/sign/lib/show-signature.php` that allows any authenticated patient portal user to retrieve the drawn signature image of any staff member by supplying an arbitrary `user` value in the POST body. The companion write endpoint (`save-signature.php`) was already hardened against this same issue, but the read endpoint was not updated to match. Version 8.0.0.3 patches the issue. |
2026-03-26 | |
| CVE-2026-33933 | 6.1 | MEDIUM | CWE-79 | 0.0% p6 | 4.27 | OpenEMR is a free and open source electronic health records and medical practice...OpenEMR is a free and open source electronic health records and medical practice management application. Starting in version 7.0.2.1 and prior to version 8.0.0.3, a reflected cross-site scripting (XSS) vulnerability in the custom template editor allows an attacker to execute arbitrary JavaScript in an authenticated staff member's browser session by sending them a crafted URL. The attacker does not need an OpenEMR account. Version 8.0.0.3 patches the issue. |
2026-03-26 | |
| CVE-2026-33932 | 7.6 | HIGH | CWE-79 | 0.0% p8 | 5.32 | OpenEMR is a free and open source electronic health records and medical practice...OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, a stored cross-site scripting vulnerability in the CCDA document preview allows an attacker who can upload or send a CCDA document to execute arbitrary JavaScript in a clinician's browser session when the document is previewed. The XSL stylesheet sanitizes attributes for all other narrative elements but not for `linkHtml`, allowing `href="javascript:..."` and event handler attributes to pass through unchanged. Version 8.0.0.3 patches the issue. |
2026-03-26 | |
| CVE-2026-33931 | 6.5 | MEDIUM | CWE-639 | 0.0% p12 | 4.55 | OpenEMR is a free and open source electronic health records and medical practice...OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, an Insecure Direct Object Reference (IDOR) vulnerability in the patient portal payment page allows any authenticated portal patient to access other patients' payment records — including invoice/billing data (PHI) and payment card metadata — by manipulating the `recid` query parameter in `portal/portal_payment.php`. Version 8.0.0.3 patches the issue. |
2026-03-26 | |
| CVE-2026-33918 | 7.6 | HIGH | CWE-862 | 0.0% p10 | 5.32 | OpenEMR is a free and open source electronic health records and medical practice...OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, the billing file-download endpoint `interface/billing/get_claim_file.php` only verifies that the caller has a valid session and CSRF token, but does not check any ACL permissions. This allows any authenticated OpenEMR user — regardless of whether they have billing privileges — to download and permanently delete electronic claim batch files containing protected health information (PHI). Version 8.0.0.3 patches the issue. |
2026-03-26 | |
| CVE-2026-33917 | 8.8 | HIGH | CWE-89 | 0.0% p0 | 6.16 | OpenEMR is a free and open source electronic health records and medical practice...OpenEMR is a free and open source electronic health records and medical practice management application. Versions prior to 8.0.0.3 contais a SQL injection vulnerability in the ajax_save CAMOS form that can be exploited by authenticated attackers. The vulnerability exists due to insufficient input validation in the ajax_save page in the CAMOS form. Version 8.0.0.3 patches the issue. |
2026-03-26 | |
| CVE-2026-33915 | 5.4 | MEDIUM | CWE-862 | 0.0% p9 | 3.78 | OpenEMR is a free and open source electronic health records and medical practice...OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, five insurance company REST API routes are missing the `RestConfig::request_authorization_check()` call that every other data-modifying route in the standard API uses. This allows any authenticated API user to create and modify insurance company records even if their OpenEMR user account does not have administrative ACL permissions. Version 8.0.0.3 patches the issue. |
2026-03-26 | |
| CVE-2026-33914 | 7.2 | HIGH | CWE-89 | 0.0% p0 | 5.04 | OpenEMR is a free and open source electronic health records and medical practice...OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, the PostCalendar module contains a blind SQL injection vulnerability in the `categoriesUpdate` administrative function. The `dels` POST parameter is read via `pnVarCleanFromInput()`, which only strips HTML tags and performs no SQL escaping. The value is then interpolated directly into a raw SQL `DELETE` statement that is executed unsanitized via Doctrine DBAL's `executeStatement()`. Version 8.0.0.3 patches the issue. |
2026-03-26 | |
| CVE-2026-30892 | 0.0 | NONE | CWE-269 | 0.0% p1 | 0.00 | crun is an open source OCI Container Runtime fully written in C. In versions 1.1...crun is an open source OCI Container Runtime fully written in C. In versions 1.19 through 1.26, the `crun exec` option `-u` (`--user`) is incorrectly parsed. The value `1` is interpreted as UID 0 and GID 0 when it should have been UID 1 and GID 0. The process thus runs with higher privileges than expected. Version 1.27 patches the issue. |
2026-03-26 | |
| CVE-2026-4825 | 5.3 | MEDIUM | CWE-74 | 0.0% p7 | 3.71 | A vulnerability was found in SourceCodester Sales and Inventory System 1.0. This...A vulnerability was found in SourceCodester Sales and Inventory System 1.0. This affects an unknown part of the file /update_sales.php of the component HTTP GET Parameter Handler. The manipulation of the argument sid results in sql injection. The attack may be launched remotely. The exploit has been made public and could be used. |
2026-03-25 | |
| CVE-2026-33913 | 7.7 | HIGH | CWE-611 | 0.1% p16 | 5.39 | OpenEMR is a free and open source electronic health records and medical practice...OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, an authenticated user with access to the Carecoordination module can upload a crafted CCDA document containing `<xi:include href="file:///etc/passwd" parse="text"/>` to read arbitrary files from the server. Version 8.0.0.3 patches the issue. |
2026-03-25 | |
| CVE-2026-33912 | 5.4 | MEDIUM | CWE-79 | 0.0% p8 | 3.78 | OpenEMR is a free and open source electronic health records and medical practice...OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, an authenticated attacker could craft a malicious form that, when submitted by a victim, executes arbitrary JavaScript in the victim's browser session. Version 8.0.0.3 patches the issue. |
2026-03-25 | |
| CVE-2026-33911 | 5.4 | MEDIUM | CWE-79 | 0.0% p7 | 3.78 | OpenEMR is a free and open source electronic health records and medical practice...OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, the POST parameter `title` is reflected back in a JSON response built with `json_encode()`. Because the response is served with a `text/html` Content-Type, the browser interprets injected HTML/script tags rather than treating the output as JSON. An authenticated attacker can craft a request that executes arbitrary JavaScript in a victim's session. Version 8.0.0.3 contains a fix. |
2026-03-25 | |
| CVE-2026-33910 | 7.2 | HIGH | CWE-89 | 0.0% p0 | 5.04 | OpenEMR is a free and open source electronic health records and medical practice...OpenEMR is a free and open source electronic health records and medical practice management application. Versions up to and including 8.0.0.2 contain a SQL injection vulnerability in the patient selection feature that can be exploited by authenticated attackers. The vulnerability exists due to insufficient input validation in the patient selection feature. Version 8.0.0.3 contains a patch. |
2026-03-25 | |
| CVE-2026-33909 | 5.9 | MEDIUM | CWE-89 | 0.0% p0 | 4.13 | OpenEMR is a free and open source electronic health records and medical practice...OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, several variables in the MedEx recall/reminder processing code are concatenated directly into SQL queries without parameterization or type casting, enabling SQL injection. Version 8.0.0.3 contains a patch. |
2026-03-25 | |
| CVE-2026-33348 | 8.7 | HIGH | CWE-79 | 0.1% p21 | 6.09 | OpenEMR is a free and open source electronic health records and medical practice...OpenEMR is a free and open source electronic health records and medical practice management application. Users with the `Notes - my encounters` role can fill Eye Exam forms in patient encounters. The answers to the form are displayed on the encounter page and in the visit history for the users with the same role. Versions prior to 8.0.0.3 have a stored cross-site scripting (XSS) vulnerability in the function to display the form answers, allowing any authenticated attacker with the specific role to insert arbitrary JavaScript into the system by entering malicious payloads to the form answers. The JavaScript code is later executed by any user with the form role when viewing the form answers in the patient encounter pages or visit history. Version 8.0.0.3 contains a patch. |
2026-03-25 | |
| CVE-2026-32120 | 6.5 | MEDIUM | CWE-639 | 0.0% p12 | 4.55 | OpenEMR is a free and open source electronic health records and medical practice...OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, an Insecure Direct Object Reference (IDOR) vulnerability in the fee sheet product save logic (`library/FeeSheet.class.php`) allows any authenticated user with fee sheet ACL access to delete, modify, or read `drug_sales` records belonging to arbitrary patients by manipulating the hidden `prod[][sale_id]` form field. The `save()` method uses the user-supplied `sale_id` in five SQL queries (SELECT, UPDATE, DELETE) without verifying that the record belongs to the current patient and encounter. Version 8.0.0.3 contains a patch. |
2026-03-25 | |
| CVE-2026-29187 | 8.1 | HIGH | CWE-89 | 0.0% p0 | 5.67 | OpenEMR is a free and open source electronic health records and medical practice...OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, a Blind SQL Injection vulnerability exists in the Patient Search functionality (/interface/new/new_search_popup.php). The vulnerability allows an authenticated attacker to execute arbitrary SQL commands by manipulating the HTTP parameter keys rather than the values. Version 8.0.0.3 contains a patch. |
2026-03-25 | |
| CVE-2025-2535 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering...Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. |
2026-03-25 | |
| CVE-2026-4824 | 7.3 | HIGH | CWE-266 | 0.0% p1 | 5.11 | A vulnerability has been found in Enter Software Iperius Backup up to 8.7.3. Aff...A vulnerability has been found in Enter Software Iperius Backup up to 8.7.3. Affected by this issue is some unknown functionality of the component Backup Job Configuration File Handler. The manipulation leads to improper privilege management. The attack must be carried out locally. The attack is considered to have high complexity. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 8.7.4 can resolve this issue. It is advisable to upgrade the affected component. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product. |
2026-03-25 | |
| CVE-2026-4823 | 2.0 | LOW | CWE-200 | 0.0% p1 | 1.40 | A flaw has been found in Enter Software Iperius Backup up to 8.7.3. Affected by ...A flaw has been found in Enter Software Iperius Backup up to 8.7.3. Affected by this vulnerability is an unknown functionality of the component NTLM2 Handler. Executing a manipulation can lead to information disclosure. The attack is restricted to local execution. Attacks of this nature are highly complex. The exploitation appears to be difficult. The exploit has been published and may be used. Upgrading to version 8.7.4 addresses this issue. Upgrading the affected component is advised. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product. |
2026-03-25 | |
| CVE-2025-36187 | 4.4 | MEDIUM | CWE-532 | 0.0% p2 | 3.08 | IBM Knowledge Catalog Standard Cartridge 5.0.0, 5.0.1, 5.0.2, 5.0.3, 5.1, 5.1.1,...IBM Knowledge Catalog Standard Cartridge 5.0.0, 5.0.1, 5.0.2, 5.0.3, 5.1, 5.1.1, 5,1.2, 5.1.3, 5.2.0, 5.2.1 stores potentially sensitive information in log files that could be read by a local privileged user. |
2026-03-25 | |
| CVE-2025-14684 | 4.0 | MEDIUM | CWE-117 | 0.0% p1 | 2.80 | IBM Maximo Application Suite - Monitor Component 9.1, 9.0, 8.11, and 8.10 could ...IBM Maximo Application Suite - Monitor Component 9.1, 9.0, 8.11, and 8.10 could allow an unauthorized user to inject data into log messages due to improper neutralization of special elements when written to log files. |
2026-03-25 | |
| CVE-2026-4822 | 7.3 | HIGH | CWE-377 | 0.0% p1 | 5.11 | A vulnerability was detected in Enter Software Iperius Backup up to 8.7.3. Affec...A vulnerability was detected in Enter Software Iperius Backup up to 8.7.3. Affected is an unknown function of the file C:\ProgramData\IperiusBackup\Jobs\ of the component Backup Service. Performing a manipulation results in creation of temporary file with insecure permissions. The attack is only possible with local access. A high degree of complexity is needed for the attack. The exploitability is told to be difficult. The exploit is now public and may be used. Upgrading to version 8.7.4 is able to address this issue. It is recommended to upgrade the affected component. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product. |
2026-03-25 | |
| CVE-2026-33249 | 4.3 | MEDIUM | CWE-863 | 0.0% p7 | 3.01 | NATS-Server is a High-Performance server for NATS.io, a cloud and edge native me...NATS-Server is a High-Performance server for NATS.io, a cloud and edge native messaging system. Starting in version 2.11.0 and prior to versions 2.11.15 and 2.12.6, a valid client which uses message tracing headers can indicate that the trace messages can be sent to an arbitrary valid subject, including those to which the client does not have publish permission. The payload is a valid trace message and not chosen by the attacker. Versions 2.11.15 and 2.12.6 contain a fix. No known workarounds are available. |
2026-03-25 | |
| CVE-2026-33248 | 4.2 | MEDIUM | CWE-287 | 0.0% p4 | 2.94 | NATS-Server is a High-Performance server for NATS.io, a cloud and edge native me...NATS-Server is a High-Performance server for NATS.io, a cloud and edge native messaging system. Prior to versions 2.11.15 and 2.12.6, when using mTLS for client identity, with `verify_and_map` to derive a NATS identity from the client certificate's Subject DN, certain patterns of RDN would not be correctly enforced, allowing for authentication bypass. This does require a valid certificate from a CA already trusted for client certificates, and `DN` naming patterns which the NATS maintainers consider highly unlikely. So this is an unlikely attack. Nonetheless, administrators who have been very sophisticated in their `DN` construction patterns might conceivably be impacted. Versions 2.11.15 and 2.12.6 contain a fix. As a workaround, developers should review their CA issuing practices. |
2026-03-25 | |
| CVE-2026-33223 | 6.4 | MEDIUM | CWE-290 | 0.0% p7 | 4.48 | NATS-Server is a High-Performance server for NATS.io, a cloud and edge native me...NATS-Server is a High-Performance server for NATS.io, a cloud and edge native messaging system. Prior to versions 2.11.15 and 2.12.6, the NATS message header `Nats-Request-Info:` is supposed to be a guarantee of identity by the NATS server, but the stripping of this header from inbound messages was not fully effective. An attacker with valid credentials for any regular client interface could thus spoof their identity to services which rely upon this header. Versions 2.11.15 and 2.12.6 contain a fix. No known workarounds are available. |
2026-03-25 | |
| CVE-2026-33222 | 4.9 | MEDIUM | CWE-285 | 0.0% p6 | 3.43 | NATS-Server is a High-Performance server for NATS.io, a cloud and edge native me...NATS-Server is a High-Performance server for NATS.io, a cloud and edge native messaging system. Prior to versions 2.11.15 and 2.12.6, users with JetStream admin API access to restore one stream could restore to other stream names, impacting data which should have been protected against them. Versions 2.11.15 and 2.12.6 contain a fix. As a workaround, if developers have configured users to have limited JetStream restore permissions, temporarily remove those permissions. |
2026-03-25 | |
| CVE-2026-30976 | 8.6 | HIGH | CWE-22 | 0.1% p18 | 6.02 | Sonarr is a PVR for Usenet and BitTorrent users. In versions on the 4.x branch p...Sonarr is a PVR for Usenet and BitTorrent users. In versions on the 4.x branch prior to 4.0.17.2950, an unauthenticated remote attacker can potentially read any file readable by the Sonarr process. These include application configuration files (containing API keys and database credentials), Windows system files, and any user-accessible files on the same drive This issue only impacts Windows systems; macOS and Linux are unaffected. Files returned from the API were not limited to the directory on disk they were intended to be served from. This problem has been patched in 4.0.17.2950 in the nightly/develop branch or 4.0.17.2952 for stable/main releases. It's possible to work around the issue by only hosting Sonarr on a secure internal network and accessing it via VPN, Tailscale or similar solution outside that network. |
2026-03-25 | |
| CVE-2026-30975 | 8.1 | HIGH | CWE-290 | 0.1% p20 | 5.67 | Sonarr is a PVR for Usenet and BitTorrent users. Versions prior to 4.0.16.2942 h...Sonarr is a PVR for Usenet and BitTorrent users. Versions prior to 4.0.16.2942 have an authentication bypass that affected users that had disabled authentication for local addresses (Authentication Required set to: `Disabled for Local Addresses`) without a reverse proxy running in front of Sonarr that didn't not pass through the invalid header. Patches are available in version 4.0.16.2942 in the nightly/develop branch and version 4.0.16.2944 for stable/main releases. Some workarounds are available. Make sure Sonarr's Authentication Required setting is set to `Enabled`, run Sonarr behind a reverse proxy, and/or do not expose Sonarr directly to the internet and instead rely on accessing it through a VPN, Tailscale or a similar solution. |
2026-03-25 | |
| CVE-2026-2485 | 4.8 | MEDIUM | CWE-79 | 0.0% p7 | 3.36 | IBM Infosphere Information Server 11.7.0.0 through 11.7.1.6 is vulnerable to sto...IBM Infosphere Information Server 11.7.0.0 through 11.7.1.6 is vulnerable to stored cross-site scripting. This vulnerability allows a privileged user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. |
2026-03-25 | |
| CVE-2026-2484 | 4.3 | MEDIUM | CWE-209 | 0.0% p8 | 3.01 | IBM InfoSphere Information Server 11.7.0.0 through 11.7.1.6 is affected by an in...IBM InfoSphere Information Server 11.7.0.0 through 11.7.1.6 is affected by an information exposure vulnerability caused by overly verbose error messages |
2026-03-25 | |
| CVE-2026-2483 | 5.4 | MEDIUM | CWE-79 | 0.0% p7 | 3.78 | IBM InfoSphere Information Server 11.7.0.0 through 11.7.1.6 is vulnerable to cro...IBM InfoSphere Information Server 11.7.0.0 through 11.7.1.6 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session |
2026-03-25 | |
| CVE-2026-1561 | 5.4 | MEDIUM | CWE-918 | 0.0% p9 | 3.78 | IBM WebSphere Application Server - Liberty 17.0.0.3 through 26.0.0.3 IBM WebSphe...IBM WebSphere Application Server - Liberty 17.0.0.3 through 26.0.0.3 IBM WebSphere Application Server Liberty is vulnerable to server-side request forgery (SSRF). This may allow remote attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks. |
2026-03-25 | |
| CVE-2026-1262 | 4.3 | MEDIUM | CWE-209 | 0.0% p8 | 3.01 | IBM InfoSphere Information Server 11.7.0.0 through 11.7.1.6 is affected by an in...IBM InfoSphere Information Server 11.7.0.0 through 11.7.1.6 is affected by an information disclosure vulnerability. |
2026-03-25 | |
| CVE-2026-1015 | 5.4 | MEDIUM | CWE-918 | 0.0% p7 | 3.78 | IBM InfoSphere Information Server 11.7.0.0 through 11.7.1.6 is vulnerable to ser...IBM InfoSphere Information Server 11.7.0.0 through 11.7.1.6 is vulnerable to server-side request forgery (SSRF). This may allow an authenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks. |
2026-03-25 | |
| CVE-2026-1014 | 6.5 | MEDIUM | CWE-319 | 0.0% p2 | 4.55 | IBM InfoSphere Information Server 11.7.0.0 through 11.7.1.6 is vulnerable to exp...IBM InfoSphere Information Server 11.7.0.0 through 11.7.1.6 is vulnerable to exposure of sensitive information via JSON server response manipulation. |
2026-03-25 | |
| CVE-2025-64648 | 5.9 | MEDIUM | CWE-319 | 0.0% p2 | 4.13 | IBM Concert 1.0.0 through 2.2.0 transmits data in clear text that could allow an...IBM Concert 1.0.0 through 2.2.0 transmits data in clear text that could allow an attacker to obtain sensitive information using man in the middle techniques. |
2026-03-25 | |
| CVE-2025-64647 | 5.9 | MEDIUM | CWE-1240 | 0.0% p3 | 4.13 | IBM Concert 1.0.0 through 2.2.0 uses weaker than expected cryptographic algorith...IBM Concert 1.0.0 through 2.2.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information |
2026-03-25 | |
| CVE-2025-64646 | 6.2 | MEDIUM | CWE-14 | 0.0% p1 | 4.34 | IBM Concert 1.0.0 through 2.2.0 could allow an attacker to access sensitive info...IBM Concert 1.0.0 through 2.2.0 could allow an attacker to access sensitive information in memory due to the buffer not properly clearing resources. |
2026-03-25 | |
| CVE-2025-36440 | 5.1 | MEDIUM | CWE-522 | 0.0% p1 | 3.57 | IBM Concert 1.0.0 through 2.2.0 could allow a local user to obtain sensitive inf...IBM Concert 1.0.0 through 2.2.0 could allow a local user to obtain sensitive information due to missing function level access control. |
2026-03-25 | |
| CVE-2025-36438 | 5.1 | MEDIUM | CWE-923 | 0.0% p1 | 3.57 | IBM Concert 1.0.0 through 2.2.0 could allow a privileged user to perform unautho...IBM Concert 1.0.0 through 2.2.0 could allow a privileged user to perform unauthorized actions due to improper restriction of channel communication to intended endpoints. |
2026-03-25 | |
| CVE-2025-36422 | 4.3 | MEDIUM | CWE-352 | 0.0% p2 | 3.01 | IBM InfoSphere Information Server 11.7.0.0 through 11.7.1.6 IBM InfoSphere DataS...IBM InfoSphere Information Server 11.7.0.0 through 11.7.1.6 IBM InfoSphere DataStage Flow Designer is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. |
2026-03-25 | |
| CVE-2025-36258 | 7.1 | HIGH | CWE-256 | 0.0% p1 | 4.97 | IBM InfoSphere Information Server 11.7.0.0 through 11.7.1.6 product stores user ...IBM InfoSphere Information Server 11.7.0.0 through 11.7.1.6 product stores user credentials and other sensitive information in plain text which can be read by a local user. |
2026-03-25 | |
| CVE-2025-14974 | 5.7 | MEDIUM | CWE-639 | 0.0% p14 | 3.99 | IBM InfoSphere Information Server 11.7.0.0 through 11.7.1.6 is vulnerable due to...IBM InfoSphere Information Server 11.7.0.0 through 11.7.1.6 is vulnerable due to Insecure Direct Object Reference (IDOR). |
2026-03-25 | |
| CVE-2025-14917 | 6.7 | MEDIUM | CWE-1393 | 0.0% p10 | 4.69 | IBM WebSphere Application Server - Liberty 17.0.0.3 through 26.0.0.3 IBM WebSphe...IBM WebSphere Application Server - Liberty 17.0.0.3 through 26.0.0.3 IBM WebSphere Application Server Liberty could provide weaker than expected security when administering security settings. |
2026-03-25 | |
| CVE-2025-14915 | 6.5 | MEDIUM | CWE-200 | 0.0% p10 | 4.55 | IBM WebSphere Application Server - Liberty 17.0.0.3 through 26.0.0.3 IBM WebSphe...IBM WebSphere Application Server - Liberty 17.0.0.3 through 26.0.0.3 IBM WebSphere Application Server Liberty is affected by privilege escalation. A privileged user could gain additional access to the application server. |
2026-03-25 | |
| CVE-2025-14912 | 5.4 | MEDIUM | CWE-918 | 0.0% p7 | 3.78 | IBM InfoSphere Information Server 11.7.0.0 through 11.7.1.6 is vulnerable to ser...IBM InfoSphere Information Server 11.7.0.0 through 11.7.1.6 is vulnerable to server-side request forgery (SSRF). This may allow an authenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks. |
2026-03-25 | |
| CVE-2025-14810 | 6.3 | MEDIUM | CWE-613 | 0.0% p8 | 4.41 | IBM InfoSphere Information Server 11.7.0.0 through 11.7.1.6 does not invalidate ...IBM InfoSphere Information Server 11.7.0.0 through 11.7.1.6 does not invalidate a session after privileges have been modified which could allow an authenticated user to retain access to sensitive information. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L CWE: CWE-613: Insufficient Session Expiration CVSS Source: IBM CVSS Base score: 6.3 CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L) |
2026-03-25 | |
| CVE-2025-14808 | 3.1 | LOW | CWE-598 | 0.0% p8 | 2.17 | IBM InfoSphere Information Server 11.7.0.0 through 11.7.1.6 could allow an attac...IBM InfoSphere Information Server 11.7.0.0 through 11.7.1.6 could allow an attacker to obtain sensitive information from the query string of an HTTP GET method to process a request which could be obtained using man in the middle techniques. |
2026-03-25 | |
| CVE-2025-14807 | 6.5 | MEDIUM | CWE-644 | 0.0% p13 | 4.55 | IBM InfoSphere Information Server 11.7.0.0 through 11.7.1.6 is vulnerable to HTT...IBM InfoSphere Information Server 11.7.0.0 through 11.7.1.6 is vulnerable to HTTP header injection, caused by improper validation of input by the HOST headers. This could allow an attacker to conduct various attacks against the vulnerable system, including cross-site scripting, cache poisoning or session hijacking. |
2026-03-25 | |
| CVE-2026-33247 | 7.4 | HIGH | CWE-215 | 0.0% p9 | 5.18 | NATS-Server is a High-Performance server for NATS.io, a cloud and edge native me...NATS-Server is a High-Performance server for NATS.io, a cloud and edge native messaging system. Prior to versions 2.11.15 and 2.12.6, if a nats-server is run with static credentials for all clients provided via argv (the command-line), then those credentials are visible to any user who can see the monitoring port, if that too is enabled. The `/debug/vars` end-point contains an unredacted copy of argv. Versions 2.11.15 and 2.12.6 contain a fix. As a workaround, configure credentials inside a configuration file instead of via argv, and do not enable the monitoring port if using secrets in argv. Best practice remains to not expose the monitoring port to the Internet, or to untrusted network sources. |
2026-03-25 | |
| CVE-2026-33246 | 6.4 | MEDIUM | CWE-287 | 0.0% p7 | 4.48 | NATS-Server is a High-Performance server for NATS.io, a cloud and edge native me...NATS-Server is a High-Performance server for NATS.io, a cloud and edge native messaging system. The nats-server offers a `Nats-Request-Info:` message header, providing information about a request. This is supposed to provide enough information to allow for account/user identification, such that NATS clients could make their own decisions on how to trust a message, provided that they trust the nats-server as a broker. A leafnode connecting to a nats-server is not fully trusted unless the system account is bridged too. Thus identity claims should not have propagated unchecked. Prior to versions 2.11.15 and 2.12.6, NATS clients relying upon the Nats-Request-Info: header could be spoofed. This does not directly affect the nats-server itself, but the CVSS Confidentiality and Integrity scores are based upon what a hypothetical client might choose to do with this NATS header. Versions 2.11.15 and 2.12.6 contain a fix. No known workarounds are available. |
2026-03-25 | |
| CVE-2026-33219 | 5.3 | MEDIUM | CWE-770 | 0.1% p23 | 3.71 | NATS-Server is a High-Performance server for NATS.io, a cloud and edge native me...NATS-Server is a High-Performance server for NATS.io, a cloud and edge native messaging system. Prior to versions 2.11.15 and 2.12.6, a malicious client which can connect to the WebSockets port can cause unbounded memory use in the nats-server before authentication; this requires sending a corresponding amount of data. This is a milder variant of CVE-2026-27571. That earlier issue was a compression bomb, this vulnerability is not. Attacks against this new issue thus require significant client bandwidth. Versions 2.11.15 and 2.12.6 contain a fix. As a workaround, disable websockets if not required for project deployment. |
2026-03-25 | |
| CVE-2026-33218 | 7.5 | HIGH | CWE-20 | 0.2% p37 | 5.25 | NATS-Server is a High-Performance server for NATS.io, a cloud and edge native me...NATS-Server is a High-Performance server for NATS.io, a cloud and edge native messaging system. Prior to versions 2.11.15 and 2.12.6, a client which can connect to the leafnode port can crash the nats-server with a certain malformed message pre-authentication. Versions 2.11.15 and 2.12.6 contain a fix. As a workaround, disable leafnode support if not needed or restrict network connections to the leafnode port, if plausible without compromising the service offered. |
2026-03-25 | |
| CVE-2026-33217 | 7.1 | HIGH | CWE-863 | 0.0% p7 | 4.97 | NATS-Server is a High-Performance server for NATS.io, a cloud and edge native me...NATS-Server is a High-Performance server for NATS.io, a cloud and edge native messaging system. Prior to versions 2.11.15 and 2.12.6, when using ACLs on message subjects, these ACLs were not applied in the `$MQTT.>` namespace, allowing MQTT clients to bypass ACL checks for MQTT subjects. Versions 2.11.15 and 2.12.6 contain a fix. No known workarounds are available. |
2026-03-25 | |
| CVE-2026-33216 | 8.6 | HIGH | CWE-256 | 0.0% p13 | 6.02 | NATS-Server is a High-Performance server for NATS.io, a cloud and edge native me...NATS-Server is a High-Performance server for NATS.io, a cloud and edge native messaging system. Prior to versions 2.11.15 and 2.12.6, for MQTT deployments using usercodes/passwords: MQTT passwords are incorrectly classified as a non-authenticating identity statement (JWT) and exposed via monitoring endpoints. Versions 2.11.14 and 2.12.6 contain a fix. As a workaround, ensure monitoring end-points are adequately secured. Best practice remains to not expose the monitoring endpoint to the Internet or other untrusted network users. |
2026-03-25 | |
| CVE-2026-29785 | 7.5 | HIGH | CWE-476 | 0.1% p25 | 5.25 | NATS-Server is a High-Performance server for NATS.io, a cloud and edge native me...NATS-Server is a High-Performance server for NATS.io, a cloud and edge native messaging system. Prior to versions 2.11.14 and 2.12.5, if the nats-server has the "leafnode" configuration enabled (not default), then anyone who can connect can crash the nats-server by triggering a panic. This happens pre-authentication and requires that compression be enabled (which it is, by default, when leafnodes are used). Versions 2.11.14 and 2.12.5 contain a fix. As a workaround, disable compression on the leafnode port. |
2026-03-25 | |
| CVE-2026-27889 | 7.5 | HIGH | CWE-190 | 0.1% p24 | 5.25 | NATS-Server is a High-Performance server for NATS.io, a cloud and edge native me...NATS-Server is a High-Performance server for NATS.io, a cloud and edge native messaging system. Starting in version 2.2.0 and prior to versions 2.11.14 and 2.12.5, a missing sanity check on a WebSockets frame could trigger a server panic in the nats-server. This happens before authentication, and so is exposed to anyone who can connect to the websockets port. Versions 2.11.14 and 2.12.5 contains a fix. A workaround is available. The vulnerability only affects deployments which use WebSockets and which expose the network port to untrusted end-points. If one is able to do so, a defense in depth of restricting either of these will mitigate the attack. |
2026-03-25 | |
| CVE-2025-70888 | 9.8 | CRITICAL | CWE-269 | 0.1% p31 | 6.86 | An issue in mtrojnar Osslsigncode affected at v2.10 and before allows a remote a...An issue in mtrojnar Osslsigncode affected at v2.10 and before allows a remote attacker to escalate privileges via the osslsigncode.c component |
2026-03-25 | |
| CVE-2025-14790 | 6.5 | MEDIUM | CWE-522 | 0.0% p8 | 4.55 | IBM InfoSphere Information Server 11.7.0.0 through 11.7.1.6 could allow an attac...IBM InfoSphere Information Server 11.7.0.0 through 11.7.1.6 could allow an attacker to obtain sensitive information due to insufficiently protected credentials. |
2026-03-25 | |
| CVE-2025-12708 | 6.2 | MEDIUM | CWE-798 | 0.0% p1 | 4.34 | IBM Concert 1.0.0 through 2.2.0 contains hard-coded credentials that could be ob...IBM Concert 1.0.0 through 2.2.0 contains hard-coded credentials that could be obtained by a local user. |
2026-03-25 | |
| CVE-2026-33809 | 5.3 | MEDIUM | N/A | 0.0% p10 | 3.71 | A maliciously crafted TIFF file can cause image decoding to attempt to allocate ...A maliciously crafted TIFF file can cause image decoding to attempt to allocate up 4GiB of memory, causing either excessive resource consumption or an out-of-memory error. |
2026-03-25 | |
| CVE-2026-33751 | 6.3 | MEDIUM | CWE-90 | 0.1% p21 | 4.41 | n8n is an open source workflow automation platform. Prior to versions 1.123.27, ...n8n is an open source workflow automation platform. Prior to versions 1.123.27, 2.13.3, and 2.14.1, a flaw in the LDAP node's filter escape logic allowed LDAP metacharacters to pass through unescaped when user-controlled input was interpolated into LDAP search filters. In workflows where external user input is passed via expressions into the LDAP node's search parameters, an attacker could manipulate the constructed filter to retrieve unintended LDAP records or bypass authentication checks implemented in the workflow. Exploitation requires a specific workflow configuration. The LDAP node must be used with user-controlled input passed via expressions (e.g., from a form or webhook). The issue has been fixed in n8n versions 1.123.27, 2.13.3, and 2.14.1. Users should upgrade to one of these versions or later to remediate the vulnerability. If upgrading is not immediately possible, administrators should consider the following temporary mitigations: Limit workflow creation and editing permissions to fully trusted users only, disable the LDAP node by adding `n8n-nodes-base.ldap` to the `NODES_EXCLUDE` environment variable, and/or avoid passing unvalidated external user input into LDAP node search parameters via expressions. These workarounds do not fully remediate the risk and should only be used as short-term mitigation measures. |
2026-03-25 | |
| CVE-2026-33749 | 6.3 | MEDIUM | CWE-79 | 0.0% p11 | 4.41 | n8n is an open source workflow automation platform. Prior to versions 1.123.27, ...n8n is an open source workflow automation platform. Prior to versions 1.123.27, 2.13.3, and 2.14.1, an authenticated user with permission to create or modify workflows could craft a workflow that produces an HTML binary data object without a filename. The `/rest/binary-data` endpoint served such responses inline on the n8n origin without `Content-Disposition` or `Content-Security-Policy` headers, allowing the HTML to render in the browser with full same-origin JavaScript access. By sending the resulting URL to a higher-privileged user, an attacker could execute JavaScript in the victim's authenticated session, enabling exfiltration of workflows and credentials, modification of workflows, or privilege escalation to admin. The issue has been fixed in n8n versions 1.123.27, 2.13.3, and 2.14.1. Users should upgrade to one of these versions or later to remediate the vulnerability. If upgrading is not immediately possible, administrators should consider the following temporary mitigations: Limit workflow creation and editing permissions to fully trusted users only, and/or restrict network access to the n8n instance to prevent untrusted users from accessing binary data URLs. These workarounds do not fully remediate the risk and should only be used as short-term mitigation measures. |
2026-03-25 | |
| CVE-2026-33724 | 6.3 | MEDIUM | CWE-639 | 0.0% p2 | 4.41 | n8n is an open source workflow automation platform. Prior to version 2.5.0, when...n8n is an open source workflow automation platform. Prior to version 2.5.0, when the Source Control feature is configured to use SSH, the SSH command used for git operations explicitly disabled host key verification. A network attacker positioned between the n8n instance and the remote Git server could intercept the connection and present a fraudulent host key, potentially injecting malicious content into workflows or intercepting repository data. This issue only affects instances where the Source Control feature has been explicitly enabled and configured to use SSH (non-default). The issue has been fixed in n8n version 2.5.0. Users should upgrade to this version or later to remediate the vulnerability. If upgrading is not immediately possible, administrators should consider the following temporary mitigations: Disable the Source Control feature if it is not actively required, and/or restrict network access to ensure the n8n instance communicates with the Git server only over trusted, controlled network paths. These workarounds do not fully remediate the risk and should only be used as short-term mitigation measures. |
2026-03-25 | |
| CVE-2026-33722 | 7.3 | HIGH | CWE-863 | 0.0% p2 | 5.11 | n8n is an open source workflow automation platform. Prior to versions 2.6.4 and ...n8n is an open source workflow automation platform. Prior to versions 2.6.4 and 1.123.23, an authenticated user without permission to list external secrets could reference a secret by the external name in a credential and retrieve its plaintext value when saving the credential. This bypassed the `externalSecret:list` permission check and allowed access to secrets stored in connected vaults without admin or owner privileges. This issue requires the instance to have an external secrets vault configured. The attacker must know or be able to guess the name of a target secret. The issue has been fixed in n8n versions 1.123.23 and 2.6.4. Users should upgrade to one of these versions or later to remediate the vulnerability. If upgrading is not immediately possible, administrators should consider the following temporary mitigations: Restrict n8n access to fully trusted users only, and/or disable external secrets integration until the patch can be applied. These workarounds do not fully remediate the risk and should only be used as short-term mitigation measures. |
2026-03-25 | |
| CVE-2026-33720 | 6.3 | MEDIUM | CWE-863 | 0.0% p1 | 4.41 | n8n is an open source workflow automation platform. Prior to version 2.8.0, when...n8n is an open source workflow automation platform. Prior to version 2.8.0, when the `N8N_SKIP_AUTH_ON_OAUTH_CALLBACK` environment variable is set to `true`, the OAuth callback handler skips ownership verification of the OAuth state parameter. This allows an attacker to trick a victim into completing an OAuth flow against a credential object the attacker controls, causing the victim's OAuth tokens to be stored in the attacker's credential. The attacker can then use those tokens to execute workflows in their name. This issue only affects instances where `N8N_SKIP_AUTH_ON_OAUTH_CALLBACK=true` is explicitly configured (non-default). The issue has been fixed in n8n version 2.8.0. Users should upgrade to this version or later to remediate the vulnerability. If upgrading is not immediately possible, administrators should consider the following temporary mitigations: Avoid enabling `N8N_SKIP_AUTH_ON_OAUTH_CALLBACK=true` unless strictly required, and/ or restrict access to the n8n instance to fully trusted users only. These workarounds do not fully remediate the risk and should only be used as short-term mitigation measures. |
2026-03-25 | |
| CVE-2026-27602 | 7.2 | HIGH | CWE-78 | 0.1% p20 | 5.04 | Modoboa is a mail hosting and management platform. Prior to version 2.7.1, `exec...Modoboa is a mail hosting and management platform. Prior to version 2.7.1, `exec_cmd()` in `modoboa/lib/sysutils.py` always runs subprocess calls with `shell=True`. Since domain names flow directly into shell command strings without any sanitization, a Reseller or SuperAdmin can include shell metacharacters in a domain name to run arbitrary OS commands on the server. Version 2.7.1 patches the issue. |
2026-03-25 | |
| CVE-2026-1001 | 4.8 | MEDIUM | CWE-79 | 0.0% p13 | 3.36 | Domoticz versions prior to 2026.1 contain a stored cross-site scripting vulnerab...Domoticz versions prior to 2026.1 contain a stored cross-site scripting vulnerability in the Add Hardware and rename device functionality of the web interface that allows authenticated administrators to execute arbitrary scripts by supplying crafted names containing script or HTML markup. Attackers can inject malicious code that is stored and rendered without proper output encoding, causing script execution in the browsers of users viewing the affected page and enabling unauthorized actions within their session context. |
2026-03-25 | |
| CVE-2025-70952 | 7.5 | HIGH | CWE-22 | 0.3% p52 | 5.26 | pf4j before 20c2f80 has a path traversal vulnerability in the extract() function...pf4j before 20c2f80 has a path traversal vulnerability in the extract() function of Unzip.java, where improper handling of zip entry names can allow directory traversal or Zip Slip attacks, due to a lack of proper path normalization and validation. |
2026-03-25 | |
| CVE-2025-70887 | 8.8 | HIGH | CWE-269 | 0.1% p33 | 6.16 | An issue in ralphje Signify before v.0.9.2 allows a remote attacker to escalate ...An issue in ralphje Signify before v.0.9.2 allows a remote attacker to escalate privileges via the signed_data.py and the context.py components |
2026-03-25 | |
| CVE-2026-33713 | 8.7 | HIGH | CWE-89 | 0.0% p4 | 6.09 | n8n is an open source workflow automation platform. Prior to versions 2.14.1, 2....n8n is an open source workflow automation platform. Prior to versions 2.14.1, 2.13.3, and 1.123.26, an authenticated user with permission to create or modify workflows could exploit a SQL injection vulnerability in the Data Table Get node. On default SQLite DB, single statements can be manipulated and the attack surface is practically limited. On PostgreSQL deployments, multi-statement execution is possible, enabling data modification and deletion. The issue has been fixed in n8n versions 1.123.26, 2.13.3, and 2.14.1. Users should upgrade to one of these versions or later to remediate the vulnerability. If upgrading is not immediately possible, administrators should consider the following temporary mitigations: Limit workflow creation and editing permissions to fully trusted users only, disable the Data Table node by adding `n8n-nodes-base.dataTable` to the `NODES_EXCLUDE` environment variable, and/or review existing workflows for Data Table Get nodes where `orderByColumn` is set to an expression that incorporates external or user-supplied input. These workarounds do not fully remediate the risk and should only be used as short-term mitigation measures. |
2026-03-25 | |
| CVE-2026-33696 | 9.4 | CRITICAL | CWE-1321 | 0.3% p55 | 6.59 | n8n is an open source workflow automation platform. Prior to versions 2.14.1, 2....n8n is an open source workflow automation platform. Prior to versions 2.14.1, 2.13.3, and 1.123.27, an authenticated user with permission to create or modify workflows could exploit a prototype pollution vulnerability in the XML and the GSuiteAdmin nodes. By supplying a crafted parameters as part of node configuration, an attacker could write attacker-controlled values onto `Object.prototype`. An attacker could use this prototype pollution to achieve remote code execution on the n8n instance. The issue has been fixed in n8n versions 2.14.1, 2.13.3, and 1.123.27. Users should upgrade to one of these versions or later to remediate the vulnerability. If upgrading is not immediately possible, administrators should consider the following temporary mitigations: Limit workflow creation and editing permissions to fully trusted users only, and/or disable the XML node by adding `n8n-nodes-base.xml` to the `NODES_EXCLUDE` environment variable. These workarounds do not fully remediate the risk and should only be used as short-term mitigation measures. |
2026-03-25 | |
| CVE-2026-33665 | 8.8 | HIGH | CWE-287 | 0.0% p4 | 6.16 | n8n is an open source workflow automation platform. Prior to versions 2.4.0 and ...n8n is an open source workflow automation platform. Prior to versions 2.4.0 and 1.121.0, when LDAP authentication is enabled, n8n automatically linked an LDAP identity to an existing local account if the LDAP email attribute matched the local account's email. An authenticated LDAP user who could control their own LDAP email attribute could set it to match another user's email — including an administrator's — and upon login gain full access to that account. The account linkage persisted even if the LDAP email was later reverted, resulting in a permanent account takeover. LDAP authentication must be configured and active (non-default). The issue has been fixed in n8n versions 2.4.0 and 1.121.0. Users should upgrade to one of these versions or later to remediate the vulnerability. If upgrading is not immediately possible, administrators should consider the following temporary mitigations: Disable LDAP authentication until the instance can be upgraded, restrict LDAP directory permissions so that users cannot modify their own email attributes, and/or audit existing LDAP-linked accounts for unexpected account associations. These workarounds do not fully remediate the risk and should only be used as short-term mitigation measures. |
2026-03-25 | |
| CVE-2026-33663 | 8.5 | HIGH | CWE-639 | 0.0% p5 | 5.95 | n8n is an open source workflow automation platform. Prior to versions 2.14.1, 2....n8n is an open source workflow automation platform. Prior to versions 2.14.1, 2.13.3, and 1.123.27, an authenticated user with the `global:member` role could exploit chained authorization flaws in n8n's credential pipeline to steal plaintext secrets from generic HTTP credentials (`httpBasicAuth`, `httpHeaderAuth`, `httpQueryAuth`) belonging to other users on the same instance. The attack abuses a name-based credential resolution path that does not enforce ownership or project scope, combined with a bypass in the credentials permission checker that causes generic HTTP credential types to be skipped during pre-execution validation. Together, these flaws allow a member-role user to resolve another user's credential ID and execute a workflow that decrypts and uses that credential without authorization. Native integration credential types (e.g. `slackApi`, `openAiApi`, `postgres`) are not affected by this issue. This vulnerability affects Community Edition only. Enterprise Edition has additional permission gates on workflow creation and execution that independently block this attack chain. The issue has been fixed in n8n versions 1.123.27, 2.13.3, and 2.14.1. Users should upgrade to one of these versions or later to remediate the vulnerability. If upgrading is not immediately possible, administrators should consider the following temporary mitigations: Restrict instance access to fully trusted users only, and/or audit credentials stored on the instance and rotate any generic HTTP credentials (`httpBasicAuth`, `httpHeaderAuth`, `httpQueryAuth`) that may have been exposed. These workarounds do not fully remediate the risk and should only be used as short-term mitigation measures. |
2026-03-25 | |
| CVE-2026-33660 | 9.4 | CRITICAL | CWE-94 | 0.1% p21 | 6.58 | n8n is an open source workflow automation platform. Prior to versions 2.14.1, 2....n8n is an open source workflow automation platform. Prior to versions 2.14.1, 2.13.3, and 1.123.26, an authenticated user with permission to create or modify workflows could use the Merge node's "Combine by SQL" mode to read local files on the n8n host and achieve remote code execution. The AlaSQL sandbox did not sufficiently restrict certain SQL statements, allowing an attacker to access sensitive files on the server or even compromise the instance. The issue has been fixed in n8n versions 2.14.1, 2.13.3, and 1.123.26. Users should upgrade to one of these versions or later to remediate the vulnerability. If upgrading is not immediately possible, administrators should consider the following temporary mitigations: Limit workflow creation and editing permissions to fully trusted users only, and/or disable the Merge node by adding `n8n-nodes-base.merge` to the `NODES_EXCLUDE` environment variable. These workarounds do not fully remediate the risk and should only be used as short-term mitigation measures. |
2026-03-25 | |
| CVE-2026-30587 | 8.7 | HIGH | CWE-79 | 0.0% p15 | 6.09 | Multiple Stored XSS vulnerabilities exist in Seafile Server version 13.0.15,13.0...Multiple Stored XSS vulnerabilities exist in Seafile Server version 13.0.15,13.0.16-pro,12.0.14 and prior and fixed in 13.0.17, 13.0.17-pro, and 12.0.20-pro, via the Seadoc (sdoc) editor. The application fails to properly sanitize WebSocket messages regarding document structure updates. This allows authenticated remote attackers to inject malicious JavaScript payloads via the src attribute of embedded Excalidraw whiteboards or the href attribute of anchor tags |
2026-03-25 | |
| CVE-2026-27496 | 7.1 | HIGH | CWE-908 | 0.0% p8 | 4.97 | n8n is an open source workflow automation platform. Prior to versions 1.123.22, ...n8n is an open source workflow automation platform. Prior to versions 1.123.22, 2.9.3, and 2.10.1, an authenticated user with permission to create or modify workflows could use the JavaScript Task Runner to allocate uninitialized memory buffers. Uninitialized buffers may contain residual data from the same Node.js process — including data from prior requests, tasks, secrets, or tokens — resulting in information disclosure of sensitive in-process data. Task Runners must be enabled using `N8N_RUNNERS_ENABLED=true`. In external runner mode, the impact is limited to data within the external runner process. The issue has been fixed in n8n versions 1.123.22, 2.10.1 , and 2.9.3. Users should upgrade to this version or later to remediate the vulnerability. If upgrading is not immediately possible, administrators should consider the following temporary mitigations: Limit workflow creation and editing permissions to fully trusted users only, and/or use external runner mode (`N8N_RUNNERS_MODE=external`) to isolate the runner process. These workarounds do not fully remediate the risk and should only be used as short-term mitigation measures. |
2026-03-25 | |
| CVE-2025-67030 | 8.8 | HIGH | CWE-22 | 0.2% p48 | 6.17 | Directory Traversal vulnerability in the extractFile method of org.codehaus.plex...Directory Traversal vulnerability in the extractFile method of org.codehaus.plexus.util.Expand in plexus-utils before 6d780b3378829318ba5c2d29547e0012d5b29642. This allows an attacker to execute arbitrary code |
2026-03-25 | |
| CVE-2026-3988 | 7.5 | HIGH | CWE-407 | 0.1% p17 | 5.25 | GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.5 ...GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.5 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 that could have allowed an unauthenticated user to cause a denial of service by making the GitLab instance unresponsive due to improper input validation in GraphQL request processing. |
2026-03-25 | |
| CVE-2026-3857 | 8.1 | HIGH | CWE-352 | 0.0% p1 | 5.67 | GitLab has remediated an issue in GitLab CE/EE affecting all versions from 17.10...GitLab has remediated an issue in GitLab CE/EE affecting all versions from 17.10 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 that could have allowed an unauthenticated user to execute arbitrary GraphQL mutations on behalf of authenticated users due to insufficient CSRF protection. |
2026-03-25 | |
| CVE-2026-34085 | 5.9 | MEDIUM | CWE-193 | 0.0% p1 | 4.13 | fontconfig before 2.17.1 has an off-by-one error in allocation during sfnt capab...fontconfig before 2.17.1 has an off-by-one error in allocation during sfnt capability handling, leading to a one-byte out-of-bounds write, and potentially a crash or code execution. This is in FcFontCapabilities in fcfreetype.c. |
2026-03-25 | |
| CVE-2026-32573 | 9.1 | CRITICAL | CWE-94 | 0.1% p17 | 6.37 | Improper Control of Generation of Code ('Code Injection') vulnerability in Nelio...Improper Control of Generation of Code ('Code Injection') vulnerability in Nelio Software Nelio AB Testing nelio-ab-testing allows Code Injection.This issue affects Nelio AB Testing: from n/a through <= 8.2.7. |
2026-03-25 | |
| CVE-2026-32567 | 6.8 | MEDIUM | CWE-22 | 0.1% p16 | 4.76 | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') v...Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in icopydoc YML for Yandex Market yml-for-yandex-market allows Path Traversal.This issue affects YML for Yandex Market: from n/a through < 5.3.0. |
2026-03-25 | |
| CVE-2026-32562 | 5.4 | MEDIUM | CWE-862 | 0.0% p11 | 3.78 | Missing Authorization vulnerability in WP Folio Team PPWP password-protect-page ...Missing Authorization vulnerability in WP Folio Team PPWP password-protect-page allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects PPWP: from n/a through <= 1.9.15. |
2026-03-25 | |
| CVE-2026-32546 | 7.5 | HIGH | CWE-862 | 0.0% p10 | 5.25 | Missing Authorization vulnerability in StellarWP Restrict Content restrict-conte...Missing Authorization vulnerability in StellarWP Restrict Content restrict-content allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Restrict Content: from n/a through <= 3.2.22. |
2026-03-25 | |
| CVE-2026-32545 | 7.1 | HIGH | CWE-79 | 0.0% p10 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Taboola Taboola Pixel taboola-pixel allows Reflected XSS.This issue affects Taboola Pixel: from n/a through <= 1.1.4. |
2026-03-25 | |
| CVE-2026-32544 | 7.1 | HIGH | CWE-79 | 0.0% p10 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in OOPSpam Team OOPSpam Anti-Spam oopspam-anti-spam allows Stored XSS.This issue affects OOPSpam Anti-Spam: from n/a through <= 1.2.62. |
2026-03-25 | |
| CVE-2026-32542 | 7.1 | HIGH | CWE-79 | 0.0% p10 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ThemeFusion Fusion Builder fusion-builder allows Reflected XSS.This issue affects Fusion Builder: from n/a through < 3.15.0. |
2026-03-25 | |
| CVE-2026-32541 | 6.5 | MEDIUM | CWE-862 | 0.0% p8 | 4.55 | Missing Authorization vulnerability in Premmerce Premmerce Redirect Manager prem...Missing Authorization vulnerability in Premmerce Premmerce Redirect Manager premmerce-redirect-manager allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Premmerce Redirect Manager: from n/a through <= 1.0.12. |
2026-03-25 | |
| CVE-2026-32540 | 7.1 | HIGH | CWE-79 | 0.0% p10 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Bookly Bookly bookly-responsive-appointment-booking-tool allows Reflected XSS.This issue affects Bookly: from n/a through <= 26.7. |
2026-03-25 | |
| CVE-2026-32539 | 9.3 | CRITICAL | CWE-89 | 0.0% p11 | 6.51 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti...Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in PublishPress PublishPress Revisions revisionary allows Blind SQL Injection.This issue affects PublishPress Revisions: from n/a through <= 3.7.23. |
2026-03-25 | |
| CVE-2026-32538 | 7.5 | HIGH | CWE-201 | 0.0% p12 | 5.25 | Insertion of Sensitive Information Into Sent Data vulnerability in Noor Alam SMT...Insertion of Sensitive Information Into Sent Data vulnerability in Noor Alam SMTP Mailer smtp-mailer allows Retrieve Embedded Sensitive Data.This issue affects SMTP Mailer: from n/a through <= 1.1.24. |
2026-03-25 | |
| CVE-2026-32537 | 7.5 | HIGH | CWE-98 | 0.1% p32 | 5.25 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in nK Visual Portfolio, Photo Gallery & Post Grid visual-portfolio allows PHP Local File Inclusion.This issue affects Visual Portfolio, Photo Gallery & Post Grid: from n/a through <= 3.5.1. |
2026-03-25 | |
| CVE-2026-32536 | 9.9 | CRITICAL | CWE-434 | 0.0% p14 | 6.93 | Unrestricted Upload of File with Dangerous Type vulnerability in halfdata Green ...Unrestricted Upload of File with Dangerous Type vulnerability in halfdata Green Downloads halfdata-paypal-green-downloads allows Using Malicious Files.This issue affects Green Downloads: from n/a through <= 2.08. |
2026-03-25 | |
| CVE-2026-32535 | 6.5 | MEDIUM | CWE-639 | 0.0% p10 | 4.55 | Authorization Bypass Through User-Controlled Key vulnerability in JoomSky JS Hel...Authorization Bypass Through User-Controlled Key vulnerability in JoomSky JS Help Desk js-support-ticket allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects JS Help Desk: from n/a through <= 3.0.3. |
2026-03-25 | |
| CVE-2026-32534 | 8.5 | HIGH | CWE-89 | 0.0% p9 | 5.95 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti...Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in JoomSky JS Help Desk js-support-ticket allows Blind SQL Injection.This issue affects JS Help Desk: from n/a through <= 3.0.3. |
2026-03-25 | |
| CVE-2026-32533 | 6.5 | MEDIUM | CWE-639 | 0.0% p10 | 4.55 | Authorization Bypass Through User-Controlled Key vulnerability in LatePoint Late...Authorization Bypass Through User-Controlled Key vulnerability in LatePoint LatePoint latepoint allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects LatePoint: from n/a through <= 5.2.6. |
2026-03-25 | |
| CVE-2026-32532 | 7.1 | HIGH | CWE-79 | 0.0% p10 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ThemeHunk Contact Form & Lead Form Elementor Builder lead-form-builder allows Stored XSS.This issue affects Contact Form & Lead Form Elementor Builder: from n/a through <= 2.0.1. |
2026-03-25 | |
| CVE-2026-32531 | 8.1 | HIGH | CWE-98 | 0.2% p35 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in gavias Kunco kunco allows PHP Local File Inclusion.This issue affects Kunco: from n/a through < 1.4.5. |
2026-03-25 | |
| CVE-2026-32530 | 8.8 | HIGH | CWE-266 | 0.0% p13 | 6.16 | Incorrect Privilege Assignment vulnerability in WPFunnels Creator LMS creatorlms...Incorrect Privilege Assignment vulnerability in WPFunnels Creator LMS creatorlms allows Privilege Escalation.This issue affects Creator LMS: from n/a through <= 1.1.18. |
2026-03-25 | |
| CVE-2026-32529 | 7.1 | HIGH | CWE-79 | 0.0% p10 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in don-themes Molla molla allows Reflected XSS.This issue affects Molla: from n/a through < 1.5.19. |
2026-03-25 | |
| CVE-2026-32528 | 7.1 | HIGH | CWE-79 | 0.0% p10 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in don-themes Riode riode allows Reflected XSS.This issue affects Riode: from n/a through < 1.6.29. |
2026-03-25 | |
| CVE-2026-32527 | 6.5 | MEDIUM | CWE-862 | 0.1% p15 | 4.55 | Missing Authorization vulnerability in CRM Perks WP Insightly for Contact Form 7...Missing Authorization vulnerability in CRM Perks WP Insightly for Contact Form 7, WPForms, Elementor, Formidable and Ninja Forms cf7-insightly allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Insightly for Contact Form 7, WPForms, Elementor, Formidable and Ninja Forms: from n/a through <= 1.1.5. |
2026-03-25 | |
| CVE-2026-32526 | 7.1 | HIGH | CWE-79 | 0.0% p10 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in VillaTheme Abandoned Cart Recovery for WooCommerce woo-abandoned-cart-recovery allows Stored XSS.This issue affects Abandoned Cart Recovery for WooCommerce: from n/a through <= 1.1.10. |
2026-03-25 | |
| CVE-2026-32525 | 9.9 | CRITICAL | CWE-94 | 0.1% p16 | 6.93 | Improper Control of Generation of Code ('Code Injection') vulnerability in jetmo...Improper Control of Generation of Code ('Code Injection') vulnerability in jetmonsters JetFormBuilder jetformbuilder allows Code Injection.This issue affects JetFormBuilder: from n/a through <= 3.5.6.1. |
2026-03-25 | |
| CVE-2026-32524 | 9.1 | CRITICAL | CWE-434 | 0.1% p16 | 6.37 | Unrestricted Upload of File with Dangerous Type vulnerability in Jordy Meow Phot...Unrestricted Upload of File with Dangerous Type vulnerability in Jordy Meow Photo Engine wplr-sync allows Upload a Web Shell to a Web Server.This issue affects Photo Engine: from n/a through <= 6.4.9. |
2026-03-25 | |
| CVE-2026-32523 | 9.9 | CRITICAL | CWE-434 | 0.0% p14 | 6.93 | Unrestricted Upload of File with Dangerous Type vulnerability in denishua WPJAM ...Unrestricted Upload of File with Dangerous Type vulnerability in denishua WPJAM Basic wpjam-basic allows Using Malicious Files.This issue affects WPJAM Basic: from n/a through <= 6.9.2. |
2026-03-25 | |
| CVE-2026-32522 | 8.6 | HIGH | CWE-22 | 0.1% p19 | 6.02 | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') v...Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in vanquish WooCommerce Support Ticket System woocommerce-support-ticket-system allows Path Traversal.This issue affects WooCommerce Support Ticket System: from n/a through < 18.5. |
2026-03-25 | |
| CVE-2026-32521 | 6.5 | MEDIUM | CWE-79 | 0.0% p9 | 4.55 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Northern Beaches Websites WP Custom Admin Interface wp-custom-admin-interface allows DOM-Based XSS.This issue affects WP Custom Admin Interface: from n/a through <= 7.42. |
2026-03-25 | |
| CVE-2026-32520 | 9.8 | CRITICAL | CWE-266 | 0.1% p17 | 6.86 | Incorrect Privilege Assignment vulnerability in Andrew Munro / AffiliateWP Rewar...Incorrect Privilege Assignment vulnerability in Andrew Munro / AffiliateWP RewardsWP rewardswp allows Privilege Escalation.This issue affects RewardsWP: from n/a through <= 1.0.4. |
2026-03-25 | |
| CVE-2026-32519 | 9.0 | CRITICAL | CWE-266 | 0.1% p17 | 6.30 | Incorrect Privilege Assignment vulnerability in Bit Apps Bit SMTP bit-smtp allow...Incorrect Privilege Assignment vulnerability in Bit Apps Bit SMTP bit-smtp allows Privilege Escalation.This issue affects Bit SMTP: from n/a through <= 1.2.2. |
2026-03-25 | |
| CVE-2026-32518 | 7.1 | HIGH | CWE-79 | 0.0% p10 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in imithemes Gaea gaea allows Reflected XSS.This issue affects Gaea: from n/a through < 3.8. |
2026-03-25 | |
| CVE-2026-32517 | 7.1 | HIGH | CWE-79 | 0.0% p10 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Kleor Contact Manager contact-manager allows Reflected XSS.This issue affects Contact Manager: from n/a through <= 9.1. |
2026-03-25 | |
| CVE-2026-32516 | 8.5 | HIGH | CWE-89 | 0.0% p9 | 5.95 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti...Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in kamleshyadav Miraculous Core Plugin miraculouscore allows Blind SQL Injection.This issue affects Miraculous Core Plugin: from n/a through < 2.1.2. |
2026-03-25 | |
| CVE-2026-32515 | 7.5 | HIGH | CWE-862 | 0.0% p12 | 5.25 | Missing Authorization vulnerability in kamleshyadav Miraculous miraculous allows...Missing Authorization vulnerability in kamleshyadav Miraculous miraculous allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Miraculous: from n/a through < 2.1.2. |
2026-03-25 | |
| CVE-2026-32514 | 6.5 | MEDIUM | CWE-862 | 0.0% p8 | 4.55 | Missing Authorization vulnerability in Anton Voytenko Petitioner petitioner allo...Missing Authorization vulnerability in Anton Voytenko Petitioner petitioner allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Petitioner: from n/a through <= 0.7.3. |
2026-03-25 | |
| CVE-2026-32513 | 8.8 | HIGH | CWE-502 | 0.1% p16 | 6.16 | Deserialization of Untrusted Data vulnerability in Miguel Useche JS Archive List...Deserialization of Untrusted Data vulnerability in Miguel Useche JS Archive List jquery-archive-list-widget allows Object Injection.This issue affects JS Archive List: from n/a through <= 6.1.7. |
2026-03-25 | |
| CVE-2026-32512 | 9.8 | CRITICAL | CWE-502 | 0.1% p16 | 6.86 | Deserialization of Untrusted Data vulnerability in Edge-Themes Pelicula pelicula...Deserialization of Untrusted Data vulnerability in Edge-Themes Pelicula pelicula-video-production-and-movie-theme allows Object Injection.This issue affects Pelicula: from n/a through < 1.10. |
2026-03-25 | |
| CVE-2026-32511 | 5.4 | MEDIUM | CWE-502 | 0.1% p17 | 3.78 | Deserialization of Untrusted Data vulnerability in Mikado-Themes Stål stal allow...Deserialization of Untrusted Data vulnerability in Mikado-Themes Stål stal allows Object Injection.This issue affects Stål: from n/a through < 1.7. |
2026-03-25 | |
| CVE-2026-32510 | 5.4 | MEDIUM | CWE-502 | 0.1% p17 | 3.78 | Deserialization of Untrusted Data vulnerability in Edge-Themes Kamperen kamperen...Deserialization of Untrusted Data vulnerability in Edge-Themes Kamperen kamperen allows Object Injection.This issue affects Kamperen: from n/a through < 1.3. |
2026-03-25 | |
| CVE-2026-32509 | 5.4 | MEDIUM | CWE-502 | 0.1% p17 | 3.78 | Deserialization of Untrusted Data vulnerability in Edge-Themes Gracey gracey all...Deserialization of Untrusted Data vulnerability in Edge-Themes Gracey gracey allows Object Injection.This issue affects Gracey: from n/a through < 1.4. |
2026-03-25 | |
| CVE-2026-32508 | 5.4 | MEDIUM | CWE-502 | 0.1% p17 | 3.78 | Deserialization of Untrusted Data vulnerability in Mikado-Themes Halstein halste...Deserialization of Untrusted Data vulnerability in Mikado-Themes Halstein halstein allows Object Injection.This issue affects Halstein: from n/a through < 1.8. |
2026-03-25 | |
| CVE-2026-32507 | 5.4 | MEDIUM | CWE-502 | 0.1% p17 | 3.78 | Deserialization of Untrusted Data vulnerability in Elated-Themes Leroux leroux a...Deserialization of Untrusted Data vulnerability in Elated-Themes Leroux leroux allows Object Injection.This issue affects Leroux: from n/a through < 1.4. |
2026-03-25 | |
| CVE-2026-32506 | 5.4 | MEDIUM | CWE-502 | 0.1% p17 | 3.78 | Deserialization of Untrusted Data vulnerability in Edge-Themes Archicon archicon...Deserialization of Untrusted Data vulnerability in Edge-Themes Archicon archicon allows Object Injection.This issue affects Archicon: from n/a through < 1.7. |
2026-03-25 | |
| CVE-2026-32505 | 8.1 | HIGH | CWE-98 | 0.2% p35 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in CreativeWS Kiddy kiddy allows PHP Local File Inclusion.This issue affects Kiddy: from n/a through <= 2.0.8. |
2026-03-25 | |
| CVE-2026-32504 | 8.1 | HIGH | CWE-98 | 0.2% p35 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in CreativeWS VintWood vintwood allows PHP Local File Inclusion.This issue affects VintWood: from n/a through <= 1.1.8. |
2026-03-25 | |
| CVE-2026-32503 | 8.1 | HIGH | CWE-98 | 0.2% p35 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in CreativeWS Trendustry trendustry allows PHP Local File Inclusion.This issue affects Trendustry: from n/a through <= 1.1.4. |
2026-03-25 | |
| CVE-2026-32502 | 9.8 | CRITICAL | CWE-502 | 0.1% p16 | 6.86 | Deserialization of Untrusted Data vulnerability in Select-Themes Borgholm borgho...Deserialization of Untrusted Data vulnerability in Select-Themes Borgholm borgholm-marketing-agency-theme allows Object Injection.This issue affects Borgholm: from n/a through < 1.6. |
2026-03-25 | |
| CVE-2026-32501 | 7.1 | HIGH | CWE-862 | 0.0% p8 | 4.97 | Missing Authorization vulnerability in wp-configurator WP Configurator Pro wp-co...Missing Authorization vulnerability in wp-configurator WP Configurator Pro wp-configurator-pro allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Configurator Pro: from n/a through <= 3.7.9. |
2026-03-25 | |
| CVE-2026-32500 | 8.1 | HIGH | CWE-98 | 0.2% p35 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in CreativeWS MetaMax metamax allows PHP Local File Inclusion.This issue affects MetaMax: from n/a through <= 1.1.4. |
2026-03-25 | |
| CVE-2026-32499 | 9.3 | CRITICAL | CWE-89 | 0.0% p11 | 6.51 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti...Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in QuantumCloud ChatBot chatbot allows Blind SQL Injection.This issue affects ChatBot: from n/a through <= 7.7.9. |
2026-03-25 | |
| CVE-2026-32498 | 7.5 | HIGH | CWE-862 | 0.0% p12 | 5.25 | Missing Authorization vulnerability in Metagauss RegistrationMagic custom-regist...Missing Authorization vulnerability in Metagauss RegistrationMagic custom-registration-form-builder-with-submission-manager allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects RegistrationMagic: from n/a through <= 6.0.7.6. |
2026-03-25 | |
| CVE-2026-32497 | 5.3 | MEDIUM | CWE-1390 | 0.0% p12 | 3.71 | Weak Authentication vulnerability in PickPlugins User Verification user-verifica...Weak Authentication vulnerability in PickPlugins User Verification user-verification allows Authentication Abuse.This issue affects User Verification: from n/a through <= 2.0.45. |
2026-03-25 | |
| CVE-2026-32496 | 6.7 | MEDIUM | CWE-22 | 0.1% p17 | 4.69 | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') v...Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in NYSL Spam Protect for Contact Form 7 wp-contact-form-7-spam-blocker allows Path Traversal.This issue affects Spam Protect for Contact Form 7: from n/a through <= 1.2.9. |
2026-03-25 | |
| CVE-2026-32495 | 7.5 | HIGH | CWE-862 | 0.0% p12 | 5.25 | Missing Authorization vulnerability in Link Software LLC WP Terms Popup wp-terms...Missing Authorization vulnerability in Link Software LLC WP Terms Popup wp-terms-popup allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Terms Popup: from n/a through <= 2.10.0. |
2026-03-25 | |
| CVE-2026-32494 | 7.1 | HIGH | CWE-79 | 0.0% p10 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Ays Pro Image Slider by Ays ays-slider allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Image Slider by Ays: from n/a through <= 2.7.1. |
2026-03-25 | |
| CVE-2026-32493 | 0.0 | NONE | CWE-79 | 0.0% p11 | 0.00 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in eyecix JobSearch wp-jobsearch allows Reflected XSS.This issue affects JobSearch: from n/a through <= 3.2.0. |
2026-03-25 | |
| CVE-2026-32492 | 5.3 | MEDIUM | CWE-290 | 0.0% p13 | 3.71 | Authentication Bypass by Spoofing vulnerability in Joe Dolson My Tickets my-tick...Authentication Bypass by Spoofing vulnerability in Joe Dolson My Tickets my-tickets allows Identity Spoofing.This issue affects My Tickets: from n/a through <= 2.1.1. |
2026-03-25 | |
| CVE-2026-32491 | 6.5 | MEDIUM | CWE-79 | 0.0% p9 | 4.55 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in jgwhite33 WP Review Slider wp-facebook-reviews allows Stored XSS.This issue affects WP Review Slider: from n/a through <= 13.9. |
2026-03-25 | |
| CVE-2026-32490 | 6.5 | MEDIUM | CWE-79 | 0.0% p9 | 4.55 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in jgwhite33 WP TripAdvisor Review Slider wp-tripadvisor-review-slider allows Stored XSS.This issue affects WP TripAdvisor Review Slider: from n/a through <= 14.1. |
2026-03-25 | |
| CVE-2026-32489 | 6.5 | MEDIUM | CWE-862 | 0.1% p15 | 4.55 | Missing Authorization vulnerability in bPlugins B Blocks b-blocks allows Exploit...Missing Authorization vulnerability in bPlugins B Blocks b-blocks allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects B Blocks: from n/a through < 2.0.30. |
2026-03-25 | |
| CVE-2026-32488 | 8.1 | HIGH | CWE-266 | 0.1% p17 | 5.67 | Incorrect Privilege Assignment vulnerability in wpeverest User Registration user...Incorrect Privilege Assignment vulnerability in wpeverest User Registration user-registration allows Privilege Escalation.This issue affects User Registration: from n/a through <= 4.4.9. |
2026-03-25 | |
| CVE-2026-32485 | 7.5 | HIGH | CWE-862 | 0.0% p12 | 5.25 | Missing Authorization vulnerability in weDevs WP User Frontend wp-user-frontend ...Missing Authorization vulnerability in weDevs WP User Frontend wp-user-frontend allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP User Frontend: from n/a through <= 4.2.8. |
2026-03-25 | |
| CVE-2026-32484 | 8.8 | HIGH | CWE-502 | 0.1% p16 | 6.16 | Deserialization of Untrusted Data vulnerability in BoldGrid weForms weforms allo...Deserialization of Untrusted Data vulnerability in BoldGrid weForms weforms allows Object Injection.This issue affects weForms: from n/a through <= 1.6.26. |
2026-03-25 | |
| CVE-2026-32483 | 6.5 | MEDIUM | CWE-862 | 0.0% p8 | 4.55 | Missing Authorization vulnerability in codepeople Contact Form Email contact-for...Missing Authorization vulnerability in codepeople Contact Form Email contact-form-to-email allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Contact Form Email: from n/a through <= 1.3.63. |
2026-03-25 | |
| CVE-2026-32482 | 9.9 | CRITICAL | CWE-434 | 0.0% p14 | 6.93 | Unrestricted Upload of File with Dangerous Type vulnerability in deothemes Ona o...Unrestricted Upload of File with Dangerous Type vulnerability in deothemes Ona ona allows Upload a Web Shell to a Web Server.This issue affects Ona: from n/a through < 1.24. |
2026-03-25 | |
| CVE-2026-32441 | 7.7 | HIGH | CWE-862 | 0.0% p12 | 5.39 | Missing Authorization vulnerability in WebToffee Comments Import & Export commen...Missing Authorization vulnerability in WebToffee Comments Import & Export comments-import-export-woocommerce allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Comments Import & Export: from n/a through <= 2.4.9. |
2026-03-25 | |
| CVE-2026-31921 | 8.2 | HIGH | CWE-862 | 0.1% p15 | 5.74 | Missing Authorization vulnerability in Devteam HaywoodTech Product Rearrange for...Missing Authorization vulnerability in Devteam HaywoodTech Product Rearrange for WooCommerce products-rearrange-woocommerce allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Product Rearrange for WooCommerce: from n/a through <= 1.2.2. |
2026-03-25 | |
| CVE-2026-31920 | 9.3 | CRITICAL | CWE-89 | 0.0% p11 | 6.51 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti...Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Devteam HaywoodTech Product Rearrange for WooCommerce products-rearrange-woocommerce allows Blind SQL Injection.This issue affects Product Rearrange for WooCommerce: from n/a through <= 1.2.2. |
2026-03-25 | |
| CVE-2026-31914 | 6.5 | MEDIUM | CWE-79 | 0.0% p9 | 4.55 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in hookandhook WP Courses LMS wp-courses allows DOM-Based XSS.This issue affects WP Courses LMS: from n/a through <= 3.2.26. |
2026-03-25 | |
| CVE-2026-31913 | 8.6 | HIGH | CWE-22 | 0.1% p19 | 6.02 | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') v...Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Whitebox-Studio Scape scape allows Path Traversal.This issue affects Scape: from n/a through < 1.5.16. |
2026-03-25 | |
| CVE-2026-2995 | 7.7 | HIGH | CWE-80 | 0.1% p19 | 5.39 | GitLab has remediated an issue in GitLab EE affecting all versions from 15.4 bef...GitLab has remediated an issue in GitLab EE affecting all versions from 15.4 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 that could have allowed an authenticated user to add email addresses to targeted user accounts due to improper sanitization of HTML content. |
2026-03-25 | |
| CVE-2026-2973 | 5.4 | MEDIUM | CWE-79 | 0.0% p8 | 3.78 | GitLab has remediated an issue in GitLab CE/EE affecting all versions from 17.7 ...GitLab has remediated an issue in GitLab CE/EE affecting all versions from 17.7 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 that could have allowed an authenticated user to execute arbitrary JavaScript in a user's browser due to improper sanitization of entity-encoded content in Mermaid diagrams. |
2026-03-25 | |
| CVE-2026-2745 | 6.8 | MEDIUM | CWE-288 | 0.1% p17 | 4.76 | GitLab has remediated an issue in GitLab CE/EE affecting all versions from 7.11 ...GitLab has remediated an issue in GitLab CE/EE affecting all versions from 7.11 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 that could have allowed an unauthenticated user to bypass WebAuthn two-factor authentication and gain unauthorized access to user accounts due to inconsistent input validation in the authentication process. |
2026-03-25 | |
| CVE-2026-2726 | 4.3 | MEDIUM | CWE-863 | 0.0% p2 | 3.01 | GitLab has remediated an issue in GitLab CE/EE affecting all versions from 11.10...GitLab has remediated an issue in GitLab CE/EE affecting all versions from 11.10 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 that could have allowed an authenticated user to perform unauthorized actions on merge requests in other projects due to improper access control during cross-repository operations. |
2026-03-25 | |
| CVE-2026-2414 | 5.6 | MEDIUM | CWE-639 | 0.0% p14 | 3.92 | Authorization bypass through User-Controlled key vulnerability in HYPR Server al...Authorization bypass through User-Controlled key vulnerability in HYPR Server allows Privilege Escalation.This issue affects Server: from 9.5.2 before 10.7.2. |
2026-03-25 | |
| CVE-2026-29092 | 4.9 | MEDIUM | CWE-613 | 0.0% p12 | 3.43 | Kiteworks is a private data network (PDN). Prior to version 9.2.1, a vulnerabili...Kiteworks is a private data network (PDN). Prior to version 9.2.1, a vulnerability in Kiteworks Email Protection Gateway session management allows blocked users to maintain active sessions after their account is disabled. This could allow unauthorized access to continue until the session naturally expires. Upgrade Kiteworks to version 9.2.1 or later to receive a patch. |
2026-03-25 | |
| CVE-2026-27659 | 4.6 | MEDIUM | CWE-352 | 0.0% p6 | 3.22 | Mattermost versions 11.2.x <= 11.2.2, 10.11.x <= 10.11.10, 11.4.x <= 11.4.0, 11....Mattermost versions 11.2.x <= 11.2.2, 10.11.x <= 10.11.10, 11.4.x <= 11.4.0, 11.3.x <= 11.3.1 fail to properly validate CSRF tokens in the /api/v4/access_control_policies/{policy_id}/activate endpoint, which allows an attacker to trick an admin into changing access control policy active status via a crafted request.. Mattermost Advisory ID: MMSA-2026-00578 |
2026-03-25 | |
| CVE-2026-27656 | 5.7 | MEDIUM | CWE-303 | 0.0% p8 | 3.99 | Mattermost versions 11.4.x <= 11.4.0, 11.3.x <= 11.3.1, 11.2.x <= 11.2.3, 10.11....Mattermost versions 11.4.x <= 11.4.0, 11.3.x <= 11.3.1, 11.2.x <= 11.2.3, 10.11.x <= 10.11.11 fail to properly validate user identity in the OpenID {{IsSameUser()}} comparison logic, which allows an attacker to take over arbitrary user accounts via an overly permissive substring matching flaw in the user discovery flow.. Mattermost Advisory ID: MMSA-2026-00590 |
2026-03-25 | |
| CVE-2026-27095 | 9.8 | CRITICAL | CWE-502 | 0.1% p16 | 6.86 | Deserialization of Untrusted Data vulnerability in magepeopleteam Bus Ticket Boo...Deserialization of Untrusted Data vulnerability in magepeopleteam Bus Ticket Booking with Seat Reservation bus-ticket-booking-with-seat-reservation allows Object Injection.This issue affects Bus Ticket Booking with Seat Reservation: from n/a through <= 5.6.0. |
2026-03-25 | |
| CVE-2026-27088 | 7.1 | HIGH | CWE-79 | 0.0% p10 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in G5Theme Darna Framework darna-framework allows Reflected XSS.This issue affects Darna Framework: from n/a through <= 2.9. |
2026-03-25 | |
| CVE-2026-27087 | 7.1 | HIGH | CWE-79 | 0.0% p10 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in G5Theme Wolverine Framework wolverine-framework allows Reflected XSS.This issue affects Wolverine Framework: from n/a through <= 1.9. |
2026-03-25 | |
| CVE-2026-27084 | 9.8 | CRITICAL | CWE-502 | 0.1% p16 | 6.86 | Deserialization of Untrusted Data vulnerability in ThemeREX Buisson buisson allo...Deserialization of Untrusted Data vulnerability in ThemeREX Buisson buisson allows Object Injection.This issue affects Buisson: from n/a through <= 1.1.11. |
2026-03-25 | |
| CVE-2026-27083 | 9.8 | CRITICAL | CWE-502 | 0.1% p16 | 6.86 | Deserialization of Untrusted Data vulnerability in ThemeREX Work & Travel Compan...Deserialization of Untrusted Data vulnerability in ThemeREX Work & Travel Company work-travel-company allows Object Injection.This issue affects Work & Travel Company: from n/a through <= 1.2. |
2026-03-25 | |
| CVE-2026-27082 | 9.8 | CRITICAL | CWE-502 | 0.1% p16 | 6.86 | Deserialization of Untrusted Data vulnerability in ThemeREX Love Story lovestory...Deserialization of Untrusted Data vulnerability in ThemeREX Love Story lovestory allows Object Injection.This issue affects Love Story: from n/a through <= 1.3.12. |
2026-03-25 | |
| CVE-2026-27081 | 8.1 | HIGH | CWE-98 | 0.2% p35 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Mikado-Themes Rosebud rosebud allows PHP Local File Inclusion.This issue affects Rosebud: from n/a through <= 1.4. |
2026-03-25 | |
| CVE-2026-27080 | 8.1 | HIGH | CWE-98 | 0.2% p35 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Mikado-Themes Deston deston allows PHP Local File Inclusion.This issue affects Deston: from n/a through <= 1.0. |
2026-03-25 | |
| CVE-2026-27079 | 8.1 | HIGH | CWE-98 | 0.2% p35 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Mikado-Themes Amfissa amfissa allows PHP Local File Inclusion.This issue affects Amfissa: from n/a through <= 1.1. |
2026-03-25 | |
| CVE-2026-27078 | 8.1 | HIGH | CWE-98 | 0.2% p35 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Mikado-Themes Emaurri emaurri allows PHP Local File Inclusion.This issue affects Emaurri: from n/a through <= 1.0.1. |
2026-03-25 | |
| CVE-2026-27077 | 8.1 | HIGH | CWE-98 | 0.2% p35 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Mikado-Themes MultiOffice multioffice allows PHP Local File Inclusion.This issue affects MultiOffice: from n/a through <= 1.2. |
2026-03-25 | |
| CVE-2026-27076 | 8.1 | HIGH | CWE-98 | 0.2% p35 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Mikado-Themes LuxeDrive luxedrive allows PHP Local File Inclusion.This issue affects LuxeDrive: from n/a through <= 1.0. |
2026-03-25 | |
| CVE-2026-27075 | 8.1 | HIGH | CWE-98 | 0.2% p35 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Mikado-Themes Belfort belfort allows PHP Local File Inclusion.This issue affects Belfort: from n/a through <= 1.0. |
2026-03-25 | |
| CVE-2026-27073 | 7.5 | HIGH | CWE-798 | 0.0% p10 | 5.25 | Use of Hard-coded Credentials vulnerability in Addi Addi – Cuotas que se a...Use of Hard-coded Credentials vulnerability in Addi Addi – Cuotas que se adaptan a ti buy-now-pay-later-addi allows Password Recovery Exploitation.This issue affects Addi – Cuotas que se adaptan a ti: from n/a through <= 2.0.4. |
2026-03-25 | |
| CVE-2026-27071 | 9.1 | CRITICAL | CWE-862 | 0.1% p15 | 6.37 | Missing Authorization vulnerability in Arraytics WPCafe wp-cafe allows Exploitin...Missing Authorization vulnerability in Arraytics WPCafe wp-cafe allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WPCafe: from n/a through <= 3.0.7. |
2026-03-25 | |
| CVE-2026-27054 | 7.1 | HIGH | CWE-79 | 0.0% p10 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in PenciDesign Penci Soledad Data Migrator penci-data-migrator allows Reflected XSS.This issue affects Penci Soledad Data Migrator: from n/a through <= 1.3.1. |
2026-03-25 | |
| CVE-2026-27051 | 9.8 | CRITICAL | CWE-266 | 0.1% p17 | 6.86 | Incorrect Privilege Assignment vulnerability in uxper Golo golo allows Privilege...Incorrect Privilege Assignment vulnerability in uxper Golo golo allows Privilege Escalation.This issue affects Golo: from n/a through <= 1.7.0. |
2026-03-25 | |
| CVE-2026-27049 | 9.8 | CRITICAL | CWE-288 | 0.1% p20 | 6.86 | Authentication Bypass Using an Alternate Path or Channel vulnerability in NooThe...Authentication Bypass Using an Alternate Path or Channel vulnerability in NooTheme Jobica Core jobica-core allows Authentication Abuse.This issue affects Jobica Core: from n/a through <= 1.4.2. |
2026-03-25 | |
| CVE-2026-27048 | 8.1 | HIGH | CWE-98 | 0.2% p35 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Elated-Themes The Aisle Core theaisle-core allows PHP Local File Inclusion.This issue affects The Aisle Core: from n/a through <= 2.0.5. |
2026-03-25 | |
| CVE-2026-27047 | 8.1 | HIGH | CWE-98 | 0.2% p35 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Mikado-Themes Curly Core curly-core allows PHP Local File Inclusion.This issue affects Curly Core: from n/a through <= 2.1.6. |
2026-03-25 | |
| CVE-2026-27046 | 6.5 | MEDIUM | CWE-862 | 0.0% p8 | 4.55 | Missing Authorization vulnerability in Kaira StoreCustomizer woocustomizer allow...Missing Authorization vulnerability in Kaira StoreCustomizer woocustomizer allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects StoreCustomizer: from n/a through <= 2.6.3. |
2026-03-25 | |
| CVE-2026-27045 | 8.8 | HIGH | CWE-502 | 0.1% p16 | 6.16 | Deserialization of Untrusted Data vulnerability in sbthemes WooCommerce Infinite...Deserialization of Untrusted Data vulnerability in sbthemes WooCommerce Infinite Scroll sb-woocommerce-infinite-scroll allows Object Injection.This issue affects WooCommerce Infinite Scroll: from n/a through <= 1.6.2. |
2026-03-25 | |
| CVE-2026-27044 | 9.9 | CRITICAL | CWE-94 | 0.1% p16 | 6.93 | Improper Control of Generation of Code ('Code Injection') vulnerability in Total...Improper Control of Generation of Code ('Code Injection') vulnerability in TotalSuite Total Poll Lite totalpoll-lite allows Remote Code Inclusion.This issue affects Total Poll Lite: from n/a through <= 4.12.0. |
2026-03-25 | |
| CVE-2026-27040 | 8.8 | HIGH | CWE-22 | 0.1% p16 | 6.16 | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') v...Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in AA-Team WZone woozone allows Path Traversal.This issue affects WZone: from n/a through <= 14.0.31. |
2026-03-25 | |
| CVE-2026-27039 | 8.5 | HIGH | CWE-89 | 0.0% p9 | 5.95 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti...Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in AA-Team WZone woozone allows Blind SQL Injection.This issue affects WZone: from n/a through <= 14.0.31. |
2026-03-25 | |
| CVE-2026-26233 | 4.3 | MEDIUM | CWE-400 | 0.1% p25 | 3.01 | Mattermost versions 11.4.x <= 11.4.0, 11.3.x <= 11.3.1, 11.2.x <= 11.2.3, 10.11....Mattermost versions 11.4.x <= 11.4.0, 11.3.x <= 11.3.1, 11.2.x <= 11.2.3, 10.11.x <= 10.11.11 fail to rate limit login requests which allows unauthenticated remote attackers to cause denial of service (server crash and restart) via HTTP/2 single packet attack with 100+ parallel login requests.. Mattermost Advisory ID: MMSA-2025-00566 |
2026-03-25 | |
| CVE-2026-25645 | 4.4 | MEDIUM | CWE-377 | 0.0% p0 | 3.08 | Requests is a HTTP library. Prior to version 2.33.0, the `requests.utils.extract...Requests is a HTTP library. Prior to version 2.33.0, the `requests.utils.extract_zipped_paths()` utility function uses a predictable filename when extracting files from zip archives into the system temporary directory. If the target file already exists, it is reused without validation. A local attacker with write access to the temp directory could pre-create a malicious file that would be loaded in place of the legitimate one. Standard usage of the Requests library is not affected by this vulnerability. Only applications that call `extract_zipped_paths()` directly are impacted. Starting in version 2.33.0, the library extracts files to a non-deterministic location. If developers are unable to upgrade, they can set `TMPDIR` in their environment to a directory with restricted write access. |
2026-03-25 | |
| CVE-2026-25469 | 6.5 | MEDIUM | CWE-862 | 0.1% p15 | 4.55 | Missing Authorization vulnerability in ViaBill for WooCommerce ViaBill – W...Missing Authorization vulnerability in ViaBill for WooCommerce ViaBill – WooCommerce viabill-woocommerce allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects ViaBill – WooCommerce: from n/a through <= 1.1.53. |
2026-03-25 | |
| CVE-2026-25465 | 6.5 | MEDIUM | CWE-79 | 0.0% p9 | 4.55 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in codepeople CP Multi View Event Calendar cp-multi-view-calendar allows Stored XSS.This issue affects CP Multi View Event Calendar : from n/a through <= 1.4.35. |
2026-03-25 | |
| CVE-2026-25464 | 8.1 | HIGH | CWE-98 | 0.2% p35 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in TieLabs Jannah jannah allows PHP Local File Inclusion.This issue affects Jannah: from n/a through <= 7.6.3. |
2026-03-25 | |
| CVE-2026-25462 | 6.5 | MEDIUM | CWE-862 | 0.1% p15 | 4.55 | Missing Authorization vulnerability in avalex avalex avalex allows Exploiting In...Missing Authorization vulnerability in avalex avalex avalex allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects avalex: from n/a through <= 3.1.3. |
2026-03-25 | |
| CVE-2026-25461 | 7.1 | HIGH | CWE-79 | 0.0% p10 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in purethemes Listeo Core listeo-core allows Reflected XSS.This issue affects Listeo Core: from n/a through <= 2.0.21. |
2026-03-25 | |
| CVE-2026-25460 | 6.3 | MEDIUM | CWE-862 | 0.0% p11 | 4.41 | Missing Authorization vulnerability in LiquidThemes Ave Core ave-core allows Exp...Missing Authorization vulnerability in LiquidThemes Ave Core ave-core allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Ave Core: from n/a through <= 2.9.1. |
2026-03-25 | |
| CVE-2026-25458 | 8.1 | HIGH | CWE-98 | 0.2% p35 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Select-Themes Moments moments allows PHP Local File Inclusion.This issue affects Moments: from n/a through <= 2.2. |
2026-03-25 | |
| CVE-2026-25457 | 8.1 | HIGH | CWE-98 | 0.2% p35 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Select-Themes Mixtape mixtape allows PHP Local File Inclusion.This issue affects Mixtape: from n/a through <= 2.1. |
2026-03-25 | |
| CVE-2026-25456 | 7.5 | HIGH | CWE-862 | 0.0% p12 | 5.25 | Missing Authorization vulnerability in Aarsiv Groups Automated FedEx live/manual...Missing Authorization vulnerability in Aarsiv Groups Automated FedEx live/manual rates with shipping labels a2z-fedex-shipping allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Automated FedEx live/manual rates with shipping labels: from n/a through <= 5.1.8. |
2026-03-25 | |
| CVE-2026-25455 | 6.5 | MEDIUM | CWE-862 | 0.0% p8 | 4.55 | Missing Authorization vulnerability in PickPlugins Product Slider for WooCommerc...Missing Authorization vulnerability in PickPlugins Product Slider for WooCommerce woocommerce-products-slider allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Product Slider for WooCommerce: from n/a through <= 1.13.60. |
2026-03-25 | |
| CVE-2026-25454 | 6.5 | MEDIUM | CWE-862 | 0.0% p8 | 4.55 | Missing Authorization vulnerability in MVPThemes The League the-league allows Ex...Missing Authorization vulnerability in MVPThemes The League the-league allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects The League: from n/a through <= 4.4.1. |
2026-03-25 | |
| CVE-2026-25452 | 7.1 | HIGH | CWE-79 | 0.0% p10 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPDO Remoji remoji allows Stored XSS.This issue affects Remoji: from n/a through <= 2.2. |
2026-03-25 | |
| CVE-2026-25447 | 9.1 | CRITICAL | CWE-94 | 0.1% p17 | 6.37 | Improper Control of Generation of Code ('Code Injection') vulnerability in Jonat...Improper Control of Generation of Code ('Code Injection') vulnerability in Jonathan Daggerhart Widget Wrangler widget-wrangler allows Code Injection.This issue affects Widget Wrangler: from n/a through <= 2.3.9. |
2026-03-25 | |
| CVE-2026-25437 | 6.5 | MEDIUM | CWE-862 | 0.1% p15 | 4.55 | Missing Authorization vulnerability in سید محمدامین هاشمی GZSEO gzseo allows Exp...Missing Authorization vulnerability in سید محمدامین هاشمی GZSEO gzseo allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects GZSEO: from n/a through <= 2.0.14. |
2026-03-25 | |
| CVE-2026-25435 | 7.1 | HIGH | CWE-79 | 0.0% p10 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in wpdevart Booking calendar, Appointment Booking System booking-calendar allows Stored XSS.This issue affects Booking calendar, Appointment Booking System: from n/a through <= 3.2.36. |
2026-03-25 | |
| CVE-2026-25430 | 6.5 | MEDIUM | CWE-862 | 0.0% p8 | 4.55 | Missing Authorization vulnerability in CRM Perks Integration for Mailchimp and C...Missing Authorization vulnerability in CRM Perks Integration for Mailchimp and Contact Form 7, WPForms, Elementor, Ninja Forms cf7-mailchimp allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Integration for Mailchimp and Contact Form 7, WPForms, Elementor, Ninja Forms: from n/a through <= 1.2.2. |
2026-03-25 | |
| CVE-2026-25429 | 9.8 | CRITICAL | CWE-502 | 0.1% p16 | 6.86 | Deserialization of Untrusted Data vulnerability in wpdive Nexa Blocks nexa-block...Deserialization of Untrusted Data vulnerability in wpdive Nexa Blocks nexa-blocks allows Object Injection.This issue affects Nexa Blocks: from n/a through <= 1.1.1. |
2026-03-25 | |
| CVE-2026-25417 | 6.5 | MEDIUM | CWE-79 | 0.0% p9 | 4.55 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Metagauss ProfileGrid profilegrid-user-profiles-groups-and-communities allows Stored XSS.This issue affects ProfileGrid : from n/a through <= 5.9.8.1. |
2026-03-25 | |
| CVE-2026-25414 | 8.8 | HIGH | CWE-266 | 0.0% p13 | 6.16 | Incorrect Privilege Assignment vulnerability in iqonicdesign WPBookit Pro wpbook...Incorrect Privilege Assignment vulnerability in iqonicdesign WPBookit Pro wpbookit-pro allows Privilege Escalation.This issue affects WPBookit Pro: from n/a through <= 1.6.18. |
2026-03-25 | |
| CVE-2026-25413 | 9.9 | CRITICAL | CWE-434 | 0.0% p14 | 6.93 | Unrestricted Upload of File with Dangerous Type vulnerability in iqonicdesign WP...Unrestricted Upload of File with Dangerous Type vulnerability in iqonicdesign WPBookit Pro wpbookit-pro allows Using Malicious Files.This issue affects WPBookit Pro: from n/a through <= 1.6.18. |
2026-03-25 | |
| CVE-2026-25406 | 8.8 | HIGH | CWE-288 | 0.1% p17 | 6.16 | Authentication Bypass Using an Alternate Path or Channel vulnerability in Themeu...Authentication Bypass Using an Alternate Path or Channel vulnerability in Themeum Tutor LMS Pro tutor-pro allows Authentication Abuse.This issue affects Tutor LMS Pro: from n/a through <= 3.9.4. |
2026-03-25 | |
| CVE-2026-25401 | 7.5 | HIGH | CWE-862 | 0.0% p12 | 5.25 | Missing Authorization vulnerability in Arni Cinco WPCargo Track & Trace wpcargo ...Missing Authorization vulnerability in Arni Cinco WPCargo Track & Trace wpcargo allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WPCargo Track & Trace: from n/a through <= 8.0.2. |
2026-03-25 | |
| CVE-2026-25400 | 8.8 | HIGH | CWE-502 | 0.1% p16 | 6.16 | Deserialization of Untrusted Data vulnerability in thememount Apicona apicona al...Deserialization of Untrusted Data vulnerability in thememount Apicona apicona allows Object Injection.This issue affects Apicona: from n/a through <= 24.1.0. |
2026-03-25 | |
| CVE-2026-25398 | 6.5 | MEDIUM | CWE-862 | 0.0% p8 | 4.55 | Missing Authorization vulnerability in Webilia Inc. Vertex Addons for Elementor ...Missing Authorization vulnerability in Webilia Inc. Vertex Addons for Elementor addons-for-elementor-builder allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Vertex Addons for Elementor: from n/a through <= 1.6.4. |
2026-03-25 | |
| CVE-2026-25397 | 7.5 | HIGH | CWE-35 | 0.0% p14 | 5.25 | Path Traversal: '.../...//' vulnerability in Snowray Software File Uploader for ...Path Traversal: '.../...//' vulnerability in Snowray Software File Uploader for WooCommerce file-uploader-for-woocommerce allows Path Traversal.This issue affects File Uploader for WooCommerce: from n/a through <= 1.0.4. |
2026-03-25 | |
| CVE-2026-25396 | 7.5 | HIGH | CWE-862 | 0.0% p12 | 5.25 | Missing Authorization vulnerability in CoderPress Commerce Coinbase For WooComme...Missing Authorization vulnerability in CoderPress Commerce Coinbase For WooCommerce commerce-coinbase-for-woocommerce allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Commerce Coinbase For WooCommerce: from n/a through <= 1.6.6. |
2026-03-25 | |
| CVE-2026-25390 | 6.5 | MEDIUM | CWE-862 | 0.0% p8 | 4.55 | Missing Authorization vulnerability in Saad Iqbal New User Approve new-user-appr...Missing Authorization vulnerability in Saad Iqbal New User Approve new-user-approve allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects New User Approve: from n/a through <= 3.2.3. |
2026-03-25 | |
| CVE-2026-25383 | 7.1 | HIGH | CWE-79 | 0.0% p10 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Iqonic Design KiviCare kivicare-clinic-management-system allows Reflected XSS.This issue affects KiviCare: from n/a through <= 3.6.16. |
2026-03-25 | |
| CVE-2026-25382 | 8.1 | HIGH | CWE-98 | 0.2% p35 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in jwsthemes IdealAuto idealauto allows PHP Local File Inclusion.This issue affects IdealAuto: from n/a through < 3.8.6. |
2026-03-25 | |
| CVE-2026-25381 | 8.1 | HIGH | CWE-98 | 0.2% p35 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in jwsthemes LoveDate lovedate allows PHP Local File Inclusion.This issue affects LoveDate: from n/a through < 3.8.6. |
2026-03-25 | |
| CVE-2026-25380 | 8.1 | HIGH | CWE-98 | 0.2% p35 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in jwsthemes Feedy feedy allows PHP Local File Inclusion.This issue affects Feedy: from n/a through < 2.1.5. |
2026-03-25 | |
| CVE-2026-25379 | 8.1 | HIGH | CWE-98 | 0.2% p35 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in jwsthemes StreamVid streamvid allows PHP Local File Inclusion.This issue affects StreamVid: from n/a through < 6.8.6. |
2026-03-25 | |
| CVE-2026-25377 | 9.3 | CRITICAL | CWE-89 | 0.0% p11 | 6.51 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti...Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in eyecix Addon Jobsearch Chat addon-jobsearch-chat allows SQL Injection.This issue affects Addon Jobsearch Chat: from n/a through <= 3.0. |
2026-03-25 | |
| CVE-2026-25376 | 7.1 | HIGH | CWE-79 | 0.0% p10 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in eyecix Addon Jobsearch Chat addon-jobsearch-chat allows Reflected XSS.This issue affects Addon Jobsearch Chat: from n/a through <= 3.0. |
2026-03-25 | |
| CVE-2026-25373 | 7.1 | HIGH | CWE-79 | 0.0% p10 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ProgressionStudios Vayvo vayvo-progression allows Reflected XSS.This issue affects Vayvo: from n/a through < 6.8. |
2026-03-25 | |
| CVE-2026-25371 | 9.3 | CRITICAL | CWE-89 | 0.0% p11 | 6.51 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti...Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in King-Theme Lumise Product Designer lumise allows Blind SQL Injection.This issue affects Lumise Product Designer: from n/a through < 2.0.9. |
2026-03-25 | |
| CVE-2026-25366 | 9.9 | CRITICAL | CWE-94 | 0.1% p16 | 6.93 | Improper Control of Generation of Code ('Code Injection') vulnerability in Theme...Improper Control of Generation of Code ('Code Injection') vulnerability in Themeisle Woody ad snippets insert-php allows Code Injection.This issue affects Woody ad snippets: from n/a through <= 2.7.1. |
2026-03-25 | |
| CVE-2026-25365 | 6.5 | MEDIUM | CWE-862 | 0.0% p8 | 4.55 | Missing Authorization vulnerability in Özgür KARALAR Kargo Takip kargo-takip-tur...Missing Authorization vulnerability in Özgür KARALAR Kargo Takip kargo-takip-turkiye allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Kargo Takip: from n/a through < 0.2.4. |
2026-03-25 | |
| CVE-2026-25361 | 7.1 | HIGH | CWE-79 | 0.0% p10 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in magepeopleteam WpEvently mage-eventpress allows Reflected XSS.This issue affects WpEvently: from n/a through <= 5.1.4. |
2026-03-25 | |
| CVE-2026-25360 | 8.8 | HIGH | CWE-502 | 0.1% p16 | 6.16 | Deserialization of Untrusted Data vulnerability in rascals Vex vex allows Object...Deserialization of Untrusted Data vulnerability in rascals Vex vex allows Object Injection.This issue affects Vex: from n/a through < 1.2.9. |
2026-03-25 | |
| CVE-2026-25359 | 8.8 | HIGH | CWE-502 | 0.1% p16 | 6.16 | Deserialization of Untrusted Data vulnerability in rascals Pendulum pendulum all...Deserialization of Untrusted Data vulnerability in rascals Pendulum pendulum allows Object Injection.This issue affects Pendulum: from n/a through < 3.1.5. |
2026-03-25 | |
| CVE-2026-25358 | 8.8 | HIGH | CWE-502 | 0.1% p16 | 6.16 | Deserialization of Untrusted Data vulnerability in rascals Meloo meloo allows Ob...Deserialization of Untrusted Data vulnerability in rascals Meloo meloo allows Object Injection.This issue affects Meloo: from n/a through < 2.8.2. |
2026-03-25 | |
| CVE-2026-25357 | 8.1 | HIGH | CWE-288 | 0.0% p13 | 5.67 | Authentication Bypass Using an Alternate Path or Channel vulnerability in azzaro...Authentication Bypass Using an Alternate Path or Channel vulnerability in azzaroco Ultimate Membership Pro indeed-membership-pro allows Authentication Abuse.This issue affects Ultimate Membership Pro: from n/a through <= 13.7. |
2026-03-25 | |
| CVE-2026-25356 | 7.1 | HIGH | CWE-79 | 0.0% p10 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in skygroup Yobazar yobazar allows Reflected XSS.This issue affects Yobazar: from n/a through < 1.6.7. |
2026-03-25 | |
| CVE-2026-25355 | 6.5 | MEDIUM | CWE-79 | 0.0% p9 | 4.55 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in skygroup Sanzo sanzo allows Stored XSS.This issue affects Sanzo: from n/a through < 2.4.3. |
2026-03-25 | |
| CVE-2026-25354 | 7.1 | HIGH | CWE-79 | 0.0% p10 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in skygroup Reebox reebox allows Reflected XSS.This issue affects Reebox: from n/a through < 1.4.8. |
2026-03-25 | |
| CVE-2026-25353 | 7.1 | HIGH | CWE-79 | 0.0% p10 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in skygroup Nooni nooni allows Reflected XSS.This issue affects Nooni: from n/a through < 1.5.1. |
2026-03-25 | |
| CVE-2026-25352 | 7.1 | HIGH | CWE-79 | 0.0% p10 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in skygroup MyDecor mydecor allows Reflected XSS.This issue affects MyDecor: from n/a through < 1.5.9. |
2026-03-25 | |
| CVE-2026-25351 | 7.1 | HIGH | CWE-79 | 0.0% p10 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in skygroup MyMedi mymedi allows Reflected XSS.This issue affects MyMedi: from n/a through < 1.7.7. |
2026-03-25 | |
| CVE-2026-25350 | 7.1 | HIGH | CWE-79 | 0.0% p10 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in skygroup Miti miti allows Reflected XSS.This issue affects Miti: from n/a through < 1.5.3. |
2026-03-25 | |
| CVE-2026-25349 | 7.1 | HIGH | CWE-79 | 0.0% p10 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in skygroup Loobek loobek allows Reflected XSS.This issue affects Loobek: from n/a through < 1.5.2. |
2026-03-25 | |
| CVE-2026-25347 | 7.1 | HIGH | CWE-79 | 0.0% p10 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Acato WP REST Cache wp-rest-cache allows Stored XSS.This issue affects WP REST Cache: from n/a through <= 2026.1.0. |
2026-03-25 | |
| CVE-2026-25346 | 7.1 | HIGH | CWE-79 | 0.0% p10 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Ays Pro FAQ Builder AYS faq-builder-ays allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects FAQ Builder AYS: from n/a through <= 1.8.2. |
2026-03-25 | |
| CVE-2026-25345 | 9.9 | CRITICAL | CWE-1284 | 0.1% p21 | 6.93 | Improper Validation of Specified Quantity in Input vulnerability in GalleryCreat...Improper Validation of Specified Quantity in Input vulnerability in GalleryCreator SimpLy Gallery simply-gallery-block allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects SimpLy Gallery: from n/a through <= 3.3.2. |
2026-03-25 | |
| CVE-2026-25344 | 6.5 | MEDIUM | CWE-497 | 0.0% p9 | 4.55 | Exposure of Sensitive System Information to an Unauthorized Control Sphere vulne...Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in RadiusTheme Review Schema review-schema allows Retrieve Embedded Sensitive Data.This issue affects Review Schema: from n/a through <= 2.2.6. |
2026-03-25 | |
| CVE-2026-25342 | 7.1 | HIGH | CWE-79 | 0.0% p10 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in kutethemes Boutique kute-boutique allows Reflected XSS.This issue affects Boutique: from n/a through < 2.4.6. |
2026-03-25 | |
| CVE-2026-25341 | 7.1 | HIGH | CWE-79 | 0.0% p10 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in RSJoomla! RSFirewall! rsfirewall allows Stored XSS.This issue affects RSFirewall!: from n/a through <= 1.1.45. |
2026-03-25 | |
| CVE-2026-25340 | 9.3 | CRITICAL | CWE-89 | 0.0% p11 | 6.51 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti...Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in NooTheme Jobmonster noo-jobmonster allows Blind SQL Injection.This issue affects Jobmonster: from n/a through < 4.8.4. |
2026-03-25 | |
| CVE-2026-25339 | 6.5 | MEDIUM | CWE-201 | 0.0% p9 | 4.55 | Insertion of Sensitive Information Into Sent Data vulnerability in Syed Balkhi C...Insertion of Sensitive Information Into Sent Data vulnerability in Syed Balkhi Contact Form by WPForms wpforms-lite allows Retrieve Embedded Sensitive Data.This issue affects Contact Form by WPForms: from n/a through <= 1.9.8.7. |
2026-03-25 | |
| CVE-2026-25334 | 8.1 | HIGH | CWE-266 | 0.1% p17 | 5.67 | Incorrect Privilege Assignment vulnerability in wordpresschef Salon Booking Syst...Incorrect Privilege Assignment vulnerability in wordpresschef Salon Booking System Pro salon-booking-plugin-pro allows Privilege Escalation.This issue affects Salon Booking System Pro: from n/a through < 10.30.12. |
2026-03-25 | |
| CVE-2026-25328 | 6.8 | MEDIUM | CWE-22 | 0.1% p21 | 4.76 | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') v...Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in add-ons.org Product File Upload for WooCommerce products-file-upload-for-woocommerce allows Path Traversal.This issue affects Product File Upload for WooCommerce: from n/a through <= 2.2.4. |
2026-03-25 | |
| CVE-2026-25327 | 6.5 | MEDIUM | CWE-862 | 0.1% p15 | 4.55 | Missing Authorization vulnerability in Rustaurius Five Star Restaurant Reservati...Missing Authorization vulnerability in Rustaurius Five Star Restaurant Reservations restaurant-reservations allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Five Star Restaurant Reservations: from n/a through <= 2.7.9. |
2026-03-25 | |
| CVE-2026-25317 | 7.5 | HIGH | CWE-862 | 0.1% p16 | 5.25 | Missing Authorization vulnerability in tychesoftwares Print Invoice & Delivery N...Missing Authorization vulnerability in tychesoftwares Print Invoice & Delivery Notes for WooCommerce woocommerce-delivery-notes allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Print Invoice & Delivery Notes for WooCommerce: from n/a through <= 5.9.0. |
2026-03-25 | |
| CVE-2026-25309 | 7.5 | HIGH | CWE-862 | 0.0% p12 | 5.25 | Missing Authorization vulnerability in PublishPress PublishPress Authors publish...Missing Authorization vulnerability in PublishPress PublishPress Authors publishpress-authors allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects PublishPress Authors: from n/a through <= 4.10.1. |
2026-03-25 | |
| CVE-2026-25306 | 7.1 | HIGH | CWE-79 | 0.0% p10 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in 8theme XStore Core et-core-plugin allows Reflected XSS.This issue affects XStore Core: from n/a through <= 5.6.4. |
2026-03-25 | |
| CVE-2026-25304 | 7.1 | HIGH | CWE-79 | 0.0% p10 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in skygroup Jaroti jaroti allows Reflected XSS.This issue affects Jaroti: from n/a through < 1.4.8. |
2026-03-25 | |
| CVE-2026-25035 | 9.8 | CRITICAL | CWE-288 | 0.1% p20 | 6.86 | Authentication Bypass Using an Alternate Path or Channel vulnerability in Wasili...Authentication Bypass Using an Alternate Path or Channel vulnerability in Wasiliy Strecker / ContestGallery developer Contest Gallery contest-gallery allows Authentication Abuse.This issue affects Contest Gallery: from n/a through <= 28.1.2.2. |
2026-03-25 | |
| CVE-2026-25034 | 6.5 | MEDIUM | CWE-862 | 0.1% p15 | 4.55 | Missing Authorization vulnerability in Iqonic Design KiviCare kivicare-clinic-ma...Missing Authorization vulnerability in Iqonic Design KiviCare kivicare-clinic-management-system allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects KiviCare: from n/a through <= 3.6.16. |
2026-03-25 | |
| CVE-2026-25033 | 7.1 | HIGH | CWE-79 | 0.0% p10 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in uixthemes Motta Addons motta-addons allows Reflected XSS.This issue affects Motta Addons: from n/a through < 1.6.1. |
2026-03-25 | |
| CVE-2026-25032 | 9.8 | CRITICAL | CWE-502 | 0.1% p16 | 6.86 | Deserialization of Untrusted Data vulnerability in park_of_ideas Ricky ricky all...Deserialization of Untrusted Data vulnerability in park_of_ideas Ricky ricky allows Object Injection.This issue affects Ricky: from n/a through < 2.31. |
2026-03-25 | |
| CVE-2026-25031 | 9.8 | CRITICAL | CWE-502 | 0.1% p16 | 6.86 | Deserialization of Untrusted Data vulnerability in park_of_ideas Tasty Daily tas...Deserialization of Untrusted Data vulnerability in park_of_ideas Tasty Daily tastydaily allows Object Injection.This issue affects Tasty Daily: from n/a through < 1.27. |
2026-03-25 | |
| CVE-2026-25030 | 9.8 | CRITICAL | CWE-502 | 0.1% p16 | 6.86 | Deserialization of Untrusted Data vulnerability in park_of_ideas Goldish goldish...Deserialization of Untrusted Data vulnerability in park_of_ideas Goldish goldish allows Object Injection.This issue affects Goldish: from n/a through < 3.47. |
2026-03-25 | |
| CVE-2026-25029 | 9.8 | CRITICAL | CWE-502 | 0.1% p16 | 6.86 | Deserialization of Untrusted Data vulnerability in park_of_ideas KIDZ kidz allow...Deserialization of Untrusted Data vulnerability in park_of_ideas KIDZ kidz allows Object Injection.This issue affects KIDZ: from n/a through <= 5.24. |
2026-03-25 | |
| CVE-2026-25026 | 7.5 | HIGH | CWE-862 | 0.0% p12 | 5.25 | Missing Authorization vulnerability in RadiusTheme Team tlp-team allows Exploiti...Missing Authorization vulnerability in RadiusTheme Team tlp-team allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Team: from n/a through <= 5.0.11. |
2026-03-25 | |
| CVE-2026-25025 | 7.1 | HIGH | CWE-79 | 0.0% p10 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in e4jvikwp VikRestaurants vikrestaurants allows Reflected XSS.This issue affects VikRestaurants: from n/a through <= 1.5.2. |
2026-03-25 | |
| CVE-2026-25018 | 7.1 | HIGH | CWE-79 | 0.0% p10 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in stmcan NaturaLife Extensions naturalife-extensions allows Reflected XSS.This issue affects NaturaLife Extensions: from n/a through <= 2.1. |
2026-03-25 | |
| CVE-2026-25017 | 8.1 | HIGH | CWE-98 | 0.2% p35 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in stmcan NaturaLife Extensions naturalife-extensions allows PHP Local File Inclusion.This issue affects NaturaLife Extensions: from n/a through <= 2.1. |
2026-03-25 | |
| CVE-2026-25013 | 7.1 | HIGH | CWE-79 | 0.0% p10 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WHMCSdes Phox Hosting phox-host allows Reflected XSS.This issue affects Phox Hosting: from n/a through <= 2.0.8. |
2026-03-25 | |
| CVE-2026-25009 | 6.5 | MEDIUM | CWE-862 | 0.1% p15 | 4.55 | Missing Authorization vulnerability in raratheme Education Zone education-zone a...Missing Authorization vulnerability in raratheme Education Zone education-zone allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Education Zone: from n/a through <= 1.3.8. |
2026-03-25 | |
| CVE-2026-25007 | 8.5 | HIGH | CWE-89 | 0.0% p9 | 5.95 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti...Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Element Invader ElementInvader Addons for Elementor elementinvader-addons-for-elementor allows Blind SQL Injection.This issue affects ElementInvader Addons for Elementor: from n/a through <= 1.4.2. |
2026-03-25 | |
| CVE-2026-25002 | 7.5 | HIGH | CWE-288 | 0.0% p15 | 5.25 | Authentication Bypass Using an Alternate Path or Channel vulnerability in ThimPr...Authentication Bypass Using an Alternate Path or Channel vulnerability in ThimPress LearnPress – Sepay Payment learnpress-sepay-payment allows Authentication Abuse.This issue affects LearnPress – Sepay Payment: from n/a through <= 4.0.0. |
2026-03-25 | |
| CVE-2026-25001 | 8.5 | HIGH | CWE-94 | 0.1% p16 | 5.95 | Improper Control of Generation of Code ('Code Injection') vulnerability in Saad ...Improper Control of Generation of Code ('Code Injection') vulnerability in Saad Iqbal Post Snippets post-snippets allows Remote Code Inclusion.This issue affects Post Snippets: from n/a through <= 4.0.12. |
2026-03-25 | |
| CVE-2026-24993 | 9.3 | CRITICAL | CWE-89 | 0.0% p11 | 6.51 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti...Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WPFactory Advanced WooCommerce Product Sales Reporting webd-woocommerce-advanced-reporting-statistics allows Blind SQL Injection.This issue affects Advanced WooCommerce Product Sales Reporting: from n/a through <= 4.1.3. |
2026-03-25 | |
| CVE-2026-24989 | 9.8 | CRITICAL | CWE-502 | 0.1% p16 | 6.86 | Deserialization of Untrusted Data vulnerability in FantasticPlugins SUMO Affilia...Deserialization of Untrusted Data vulnerability in FantasticPlugins SUMO Affiliates Pro affs allows Object Injection.This issue affects SUMO Affiliates Pro: from n/a through < 11.4.0. |
2026-03-25 | |
| CVE-2026-24987 | 6.5 | MEDIUM | CWE-862 | 0.0% p8 | 4.55 | Missing Authorization vulnerability in activity-log.com WP System Log winterlock...Missing Authorization vulnerability in activity-log.com WP System Log winterlock allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP System Log: from n/a through <= 1.2.7. |
2026-03-25 | |
| CVE-2026-24983 | 7.1 | HIGH | CWE-79 | 0.0% p10 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in UpSolution UpSolution Core us-core allows Reflected XSS.This issue affects UpSolution Core: from n/a through <= 8.41. |
2026-03-25 | |
| CVE-2026-24981 | 8.8 | HIGH | CWE-502 | 0.1% p16 | 6.16 | Deserialization of Untrusted Data vulnerability in NooTheme Visionary Core noo-v...Deserialization of Untrusted Data vulnerability in NooTheme Visionary Core noo-visionary-core allows Object Injection.This issue affects Visionary Core: from n/a through <= 1.4.9. |
2026-03-25 | |
| CVE-2026-24980 | 7.1 | HIGH | CWE-79 | 0.0% p10 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NooTheme Visionary Core noo-visionary-core allows Reflected XSS.This issue affects Visionary Core: from n/a through <= 1.4.9. |
2026-03-25 | |
| CVE-2026-24979 | 7.1 | HIGH | CWE-79 | 0.0% p10 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NooTheme Jobica Core jobica-core allows Reflected XSS.This issue affects Jobica Core: from n/a through <= 1.4.1. |
2026-03-25 | |
| CVE-2026-24978 | 8.8 | HIGH | CWE-502 | 0.1% p16 | 6.16 | Deserialization of Untrusted Data vulnerability in NooTheme Jobica Core jobica-c...Deserialization of Untrusted Data vulnerability in NooTheme Jobica Core jobica-core allows Object Injection.This issue affects Jobica Core: from n/a through <= 1.4.1. |
2026-03-25 | |
| CVE-2026-24977 | 8.5 | HIGH | CWE-89 | 0.0% p9 | 5.95 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti...Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in NooTheme Organici Library noo-organici-library allows Blind SQL Injection.This issue affects Organici Library: from n/a through <= 2.1.2. |
2026-03-25 | |
| CVE-2026-24976 | 8.8 | HIGH | CWE-502 | 0.1% p16 | 6.16 | Deserialization of Untrusted Data vulnerability in NooTheme Organici Library noo...Deserialization of Untrusted Data vulnerability in NooTheme Organici Library noo-organici-library allows Object Injection.This issue affects Organici Library: from n/a through <= 2.1.2. |
2026-03-25 | |
| CVE-2026-24975 | 7.1 | HIGH | CWE-79 | 0.0% p10 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NooTheme Organici Library noo-organici-library allows Reflected XSS.This issue affects Organici Library: from n/a through <= 2.1.2. |
2026-03-25 | |
| CVE-2026-24974 | 8.8 | HIGH | CWE-502 | 0.1% p16 | 6.16 | Deserialization of Untrusted Data vulnerability in NooTheme CitiLights noo-citil...Deserialization of Untrusted Data vulnerability in NooTheme CitiLights noo-citilights allows Object Injection.This issue affects CitiLights: from n/a through <= 3.7.1. |
2026-03-25 | |
| CVE-2026-24973 | 7.1 | HIGH | CWE-79 | 0.0% p10 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NooTheme CitiLights noo-citilights allows Reflected XSS.This issue affects CitiLights: from n/a through <= 3.7.1. |
2026-03-25 | |
| CVE-2026-24972 | 6.5 | MEDIUM | CWE-862 | 0.0% p8 | 4.55 | Missing Authorization vulnerability in Elated-Themes Elated Listing eltd-listing...Missing Authorization vulnerability in Elated-Themes Elated Listing eltd-listing allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Elated Listing: from n/a through <= 1.4. |
2026-03-25 | |
| CVE-2026-24971 | 9.8 | CRITICAL | CWE-266 | 0.1% p17 | 6.86 | Incorrect Privilege Assignment vulnerability in Elated-Themes Search & Go search...Incorrect Privilege Assignment vulnerability in Elated-Themes Search & Go searchgo allows Privilege Escalation.This issue affects Search & Go: from n/a through <= 2.8. |
2026-03-25 | |
| CVE-2026-24970 | 7.7 | HIGH | CWE-22 | 0.1% p16 | 5.39 | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') v...Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in designingmedia Energox energox allows Path Traversal.This issue affects Energox: from n/a through <= 1.2. |
2026-03-25 | |
| CVE-2026-24969 | 7.7 | HIGH | CWE-22 | 0.0% p12 | 5.39 | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') v...Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in designingmedia Instant VA instantva allows Path Traversal.This issue affects Instant VA: from n/a through <= 1.0.1. |
2026-03-25 | |
| CVE-2026-24968 | 9.8 | CRITICAL | CWE-266 | 0.1% p17 | 6.86 | Incorrect Privilege Assignment vulnerability in Xagio SEO Xagio SEO xagio-seo al...Incorrect Privilege Assignment vulnerability in Xagio SEO Xagio SEO xagio-seo allows Privilege Escalation.This issue affects Xagio SEO: from n/a through <= 7.1.0.30. |
2026-03-25 | |
| CVE-2026-24964 | 6.4 | MEDIUM | CWE-918 | 0.0% p7 | 4.48 | Server-Side Request Forgery (SSRF) vulnerability in Wasiliy Strecker / ContestGa...Server-Side Request Forgery (SSRF) vulnerability in Wasiliy Strecker / ContestGallery developer Contest Gallery contest-gallery allows Server Side Request Forgery.This issue affects Contest Gallery: from n/a through <= 28.1.2.1. |
2026-03-25 | |
| CVE-2026-24391 | 7.1 | HIGH | CWE-79 | 0.0% p10 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ThemeMakers Car Dealer cardealer allows Reflected XSS.This issue affects Car Dealer: from n/a through <= 1.6.7. |
2026-03-25 | |
| CVE-2026-24382 | 7.5 | HIGH | CWE-862 | 0.0% p10 | 5.25 | Missing Authorization vulnerability in wproyal News Magazine X news-magazine-x a...Missing Authorization vulnerability in wproyal News Magazine X news-magazine-x allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects News Magazine X: from n/a through <= 1.2.50. |
2026-03-25 | |
| CVE-2026-24378 | 9.8 | CRITICAL | CWE-502 | 0.1% p16 | 6.86 | Deserialization of Untrusted Data vulnerability in Metagauss EventPrime eventpri...Deserialization of Untrusted Data vulnerability in Metagauss EventPrime eventprime-event-calendar-management allows Object Injection.This issue affects EventPrime: from n/a through <= 4.2.8.0. |
2026-03-25 | |
| CVE-2026-24376 | 6.5 | MEDIUM | CWE-862 | 0.0% p8 | 4.55 | Missing Authorization vulnerability in Javier Casares WPVulnerability wpvulnerab...Missing Authorization vulnerability in Javier Casares WPVulnerability wpvulnerability allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WPVulnerability: from n/a through <= 4.2.1. |
2026-03-25 | |
| CVE-2026-24373 | 8.1 | HIGH | CWE-266 | 0.1% p17 | 5.67 | Incorrect Privilege Assignment vulnerability in Metagauss RegistrationMagic cust...Incorrect Privilege Assignment vulnerability in Metagauss RegistrationMagic custom-registration-form-builder-with-submission-manager allows Privilege Escalation.This issue affects RegistrationMagic: from n/a through <= 6.0.7.1. |
2026-03-25 | |
| CVE-2026-24372 | 7.5 | HIGH | CWE-290 | 0.0% p15 | 5.25 | Authentication Bypass by Spoofing vulnerability in WP Swings Subscriptions for W...Authentication Bypass by Spoofing vulnerability in WP Swings Subscriptions for WooCommerce subscriptions-for-woocommerce allows Input Data Manipulation.This issue affects Subscriptions for WooCommerce: from n/a through <= 1.8.10. |
2026-03-25 | |
| CVE-2026-24370 | 6.5 | MEDIUM | CWE-79 | 0.0% p9 | 4.55 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Theme-one The Grid the-grid allows Stored XSS.This issue affects The Grid: from n/a through < 2.8.0. |
2026-03-25 | |
| CVE-2026-24369 | 7.1 | HIGH | CWE-862 | 0.0% p8 | 4.97 | Missing Authorization vulnerability in Theme-one The Grid the-grid allows Exploi...Missing Authorization vulnerability in Theme-one The Grid the-grid allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects The Grid: from n/a through < 2.8.0. |
2026-03-25 | |
| CVE-2026-24364 | 6.5 | MEDIUM | CWE-862 | 0.0% p8 | 4.55 | Missing Authorization vulnerability in weDevs WP User Frontend wp-user-frontend ...Missing Authorization vulnerability in weDevs WP User Frontend wp-user-frontend allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP User Frontend: from n/a through <= 4.2.5. |
2026-03-25 | |
| CVE-2026-24363 | 7.5 | HIGH | CWE-862 | 0.0% p12 | 5.25 | Missing Authorization vulnerability in loopus WP Cost Estimation & Payment Forms...Missing Authorization vulnerability in loopus WP Cost Estimation & Payment Forms Builder WP_Estimation_Form allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Cost Estimation & Payment Forms Builder: from n/a through < 10.3.0. |
2026-03-25 | |
| CVE-2026-24362 | 6.4 | MEDIUM | CWE-862 | 0.0% p7 | 4.48 | Missing Authorization vulnerability in bdthemes Ultimate Post Kit ultimate-post-...Missing Authorization vulnerability in bdthemes Ultimate Post Kit ultimate-post-kit allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Ultimate Post Kit: from n/a through <= 4.0.21. |
2026-03-25 | |
| CVE-2026-24359 | 8.8 | HIGH | CWE-288 | 0.1% p17 | 6.16 | Authentication Bypass Using an Alternate Path or Channel vulnerability in Dokan,...Authentication Bypass Using an Alternate Path or Channel vulnerability in Dokan, Inc. Dokan dokan-lite allows Authentication Abuse.This issue affects Dokan: from n/a through <= 4.2.4. |
2026-03-25 | |
| CVE-2026-23979 | 7.1 | HIGH | CWE-79 | 0.0% p10 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Softwebmedia Gyan Elements gyan-elements allows Reflected XSS.This issue affects Gyan Elements: from n/a through <= 2.2.1. |
2026-03-25 | |
| CVE-2026-23977 | 7.5 | HIGH | CWE-862 | 0.0% p10 | 5.25 | Missing Authorization vulnerability in WPFactory Helpdesk Support Ticket System ...Missing Authorization vulnerability in WPFactory Helpdesk Support Ticket System for WooCommerce support-ticket-system-for-woocommerce allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Helpdesk Support Ticket System for WooCommerce: from n/a through <= 2.1.2. |
2026-03-25 | |
| CVE-2026-23973 | 7.1 | HIGH | CWE-79 | 0.0% p10 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in uxper Golo golo allows Reflected XSS.This issue affects Golo: from n/a through < 1.7.5. |
2026-03-25 | |
| CVE-2026-23972 | 6.5 | MEDIUM | CWE-862 | 0.0% p8 | 4.55 | Missing Authorization vulnerability in magepeopleteam Booking and Rental Manager...Missing Authorization vulnerability in magepeopleteam Booking and Rental Manager booking-and-rental-manager-for-woocommerce allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Booking and Rental Manager: from n/a through <= 2.6.0. |
2026-03-25 | |
| CVE-2026-23971 | 8.1 | HIGH | CWE-502 | 0.1% p16 | 5.67 | Deserialization of Untrusted Data vulnerability in xtemos WoodMart woodmart allo...Deserialization of Untrusted Data vulnerability in xtemos WoodMart woodmart allows Object Injection.This issue affects WoodMart: from n/a through <= 8.3.8. |
2026-03-25 | |
| CVE-2026-23807 | 7.1 | HIGH | CWE-79 | 0.0% p10 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WP Socio WP Telegram Widget and Join Link wptelegram-widget allows Reflected XSS.This issue affects WP Telegram Widget and Join Link: from n/a through <= 2.2.13. |
2026-03-25 | |
| CVE-2026-23806 | 7.5 | HIGH | CWE-862 | 0.0% p12 | 5.25 | Missing Authorization vulnerability in BlueGlass Interactive AG Jobs for WordPre...Missing Authorization vulnerability in BlueGlass Interactive AG Jobs for WordPress job-postings allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Jobs for WordPress: from n/a through <= 2.8. |
2026-03-25 | |
| CVE-2026-23636 | 5.5 | MEDIUM | CWE-434 | 0.1% p16 | 3.85 | Kiteworks is a private data network (PDN). In Kiteworks Secure Data Forms prior ...Kiteworks is a private data network (PDN). In Kiteworks Secure Data Forms prior to version 9.2.1, the manager of a form could potentially exploit an Unrestricted Upload of File with Dangerous Type due to a missing validation. Upgrade Kiteworks to version 9.2.1 or later to receive a patch. |
2026-03-25 | |
| CVE-2026-23635 | 6.5 | MEDIUM | CWE-523 | 0.0% p12 | 4.55 | Kiteworks is a private data network (PDN). In Kiteworks Secure Data Forms prior ...Kiteworks is a private data network (PDN). In Kiteworks Secure Data Forms prior to version 9.2.1, a misconfiguration of the security attributes could potentially lead to Unprotected Transport of Credentials under certain circumstances. Upgrade Kiteworks to version 9.2.1 or later to receive a patch. |
2026-03-25 | |
| CVE-2026-22524 | 7.1 | HIGH | CWE-79 | 0.0% p10 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in themepassion Legacy Admin legacy-admin allows Reflected XSS.This issue affects Legacy Admin: from n/a through <= 9.5. |
2026-03-25 | |
| CVE-2026-22523 | 7.1 | HIGH | CWE-79 | 0.0% p10 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in themepassion Ultra WordPress Admin ultra-admin allows Reflected XSS.This issue affects Ultra WordPress Admin: from n/a through <= 11.7. |
2026-03-25 | |
| CVE-2026-22520 | 7.1 | HIGH | CWE-79 | 0.0% p10 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in G5Theme Handmade Framework handmade-framework allows Reflected XSS.This issue affects Handmade Framework: from n/a through <= 3.9. |
2026-03-25 | |
| CVE-2026-22516 | 8.1 | HIGH | CWE-98 | 0.2% p35 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Wizor's wizors-investments allows PHP Local File Inclusion.This issue affects Wizor's: from n/a through <= 2.12. |
2026-03-25 | |
| CVE-2026-22515 | 8.1 | HIGH | CWE-98 | 0.2% p35 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes VegaDays vegadays allows PHP Local File Inclusion.This issue affects VegaDays: from n/a through <= 1.2.0. |
2026-03-25 | |
| CVE-2026-22514 | 8.1 | HIGH | CWE-98 | 0.2% p35 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Unica unica allows PHP Local File Inclusion.This issue affects Unica: from n/a through <= 1.4.1. |
2026-03-25 | |
| CVE-2026-22513 | 8.1 | HIGH | CWE-98 | 0.2% p35 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Triompher triompher allows PHP Local File Inclusion.This issue affects Triompher: from n/a through <= 1.1.0. |
2026-03-25 | |
| CVE-2026-22512 | 8.1 | HIGH | CWE-98 | 0.2% p35 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Elated-Themes Roisin roisin allows PHP Local File Inclusion.This issue affects Roisin: from n/a through <= 1.2.1. |
2026-03-25 | |
| CVE-2026-22511 | 8.1 | HIGH | CWE-98 | 0.2% p35 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Elated-Themes NeoBeat neobeat allows PHP Local File Inclusion.This issue affects NeoBeat: from n/a through <= 1.2. |
2026-03-25 | |
| CVE-2026-22510 | 8.1 | HIGH | CWE-502 | 0.1% p16 | 5.67 | Deserialization of Untrusted Data vulnerability in AncoraThemes Melody melodysch...Deserialization of Untrusted Data vulnerability in AncoraThemes Melody melodyschool allows Object Injection.This issue affects Melody: from n/a through <= 1.6.3. |
2026-03-25 | |
| CVE-2026-22509 | 8.1 | HIGH | CWE-98 | 0.2% p35 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Elated-Themes Gioia gioia allows PHP Local File Inclusion.This issue affects Gioia: from n/a through <= 1.4. |
2026-03-25 | |
| CVE-2026-22508 | 8.1 | HIGH | CWE-98 | 0.2% p35 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Dentalux dentalux allows PHP Local File Inclusion.This issue affects Dentalux: from n/a through <= 3.3. |
2026-03-25 | |
| CVE-2026-22507 | 9.8 | CRITICAL | CWE-502 | 0.1% p16 | 6.86 | Deserialization of Untrusted Data vulnerability in AncoraThemes Beelove beelove ...Deserialization of Untrusted Data vulnerability in AncoraThemes Beelove beelove allows Object Injection.This issue affects Beelove: from n/a through <= 1.2.6. |
2026-03-25 | |
| CVE-2026-22506 | 8.1 | HIGH | CWE-98 | 0.2% p35 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Elated-Themes Amoli amoli allows PHP Local File Inclusion.This issue affects Amoli: from n/a through <= 1.0. |
2026-03-25 | |
| CVE-2026-22505 | 8.1 | HIGH | CWE-502 | 0.1% p16 | 5.67 | Deserialization of Untrusted Data vulnerability in AncoraThemes Morning Records ...Deserialization of Untrusted Data vulnerability in AncoraThemes Morning Records morning-records allows Object Injection.This issue affects Morning Records: from n/a through <= 1.2. |
2026-03-25 | |
| CVE-2026-22504 | 8.1 | HIGH | CWE-98 | 0.2% p35 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX ProLingua prolingua allows PHP Local File Inclusion.This issue affects ProLingua: from n/a through <= 1.1.12. |
2026-03-25 | |
| CVE-2026-22503 | 8.1 | HIGH | CWE-98 | 0.2% p35 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Nelson nelson allows PHP Local File Inclusion.This issue affects Nelson: from n/a through <= 1.2.0. |
2026-03-25 | |
| CVE-2026-22502 | 8.1 | HIGH | CWE-98 | 0.2% p35 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Mr. Cobbler mr-cobbler allows PHP Local File Inclusion.This issue affects Mr. Cobbler: from n/a through <= 1.1.9. |
2026-03-25 | |
| CVE-2026-22500 | 9.8 | CRITICAL | CWE-502 | 0.1% p16 | 6.86 | Deserialization of Untrusted Data vulnerability in axiomthemes m2 | Construction...Deserialization of Untrusted Data vulnerability in axiomthemes m2 | Construction and Tools Store m2-ce allows Object Injection.This issue affects m2 | Construction and Tools Store: from n/a through <= 1.1.2. |
2026-03-25 | |
| CVE-2026-22499 | 8.1 | HIGH | CWE-98 | 0.2% p35 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Elated-Themes Lella lella allows PHP Local File Inclusion.This issue affects Lella: from n/a through <= 1.2. |
2026-03-25 | |
| CVE-2026-22498 | 8.1 | HIGH | CWE-98 | 0.2% p35 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Elated-Themes Laurent laurent allows PHP Local File Inclusion.This issue affects Laurent: from n/a through <= 3.1. |
2026-03-25 | |
| CVE-2026-22496 | 8.1 | HIGH | CWE-98 | 0.2% p35 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Hypnotherapy hypnotherapy allows PHP Local File Inclusion.This issue affects Hypnotherapy: from n/a through <= 1.2.10. |
2026-03-25 | |
| CVE-2026-22495 | 8.1 | HIGH | CWE-98 | 0.2% p35 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Greenville greenville allows PHP Local File Inclusion.This issue affects Greenville: from n/a through <= 1.3.2. |
2026-03-25 | |
| CVE-2026-22494 | 8.1 | HIGH | CWE-98 | 0.2% p35 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Good Homes good-homes allows PHP Local File Inclusion.This issue affects Good Homes: from n/a through <= 1.3.13. |
2026-03-25 | |
| CVE-2026-22493 | 8.1 | HIGH | CWE-98 | 0.2% p35 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Elated-Themes Gaspard gaspard allows PHP Local File Inclusion.This issue affects Gaspard: from n/a through <= 1.3. |
2026-03-25 | |
| CVE-2026-22491 | 7.1 | HIGH | CWE-79 | 0.0% p10 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in wphocus My auctions allegro my-auctions-allegro-free-edition allows Reflected XSS.This issue affects My auctions allegro: from n/a through <= 3.6.35. |
2026-03-25 | |
| CVE-2026-22485 | 6.5 | MEDIUM | CWE-862 | 0.0% p8 | 4.55 | Missing Authorization vulnerability in Ruhul Amin My Album Gallery my-album-gall...Missing Authorization vulnerability in Ruhul Amin My Album Gallery my-album-gallery allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects My Album Gallery: from n/a through <= 1.0.4. |
2026-03-25 | |
| CVE-2026-22484 | 9.3 | CRITICAL | CWE-89 | 0.0% p11 | 6.51 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti...Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in pebas Lisfinity Core lisfinity-core allows SQL Injection.This issue affects Lisfinity Core: from n/a through <= 1.5.0. |
2026-03-25 | |
| CVE-2026-22480 | 7.2 | HIGH | CWE-502 | 0.1% p18 | 5.04 | Deserialization of Untrusted Data vulnerability in WebToffee Product Feed for Wo...Deserialization of Untrusted Data vulnerability in WebToffee Product Feed for WooCommerce webtoffee-product-feed allows Object Injection.This issue affects Product Feed for WooCommerce: from n/a through <= 2.3.3. |
2026-03-25 | |
| CVE-2026-22448 | 7.5 | HIGH | CWE-22 | 0.1% p17 | 5.25 | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') v...Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in flexcubed PitchPrint pitchprint allows Path Traversal.This issue affects PitchPrint: from n/a through <= 11.1.2. |
2026-03-25 | |
| CVE-2026-20719 | 4.3 | MEDIUM | CWE-754 | 0.1% p16 | 3.01 | Mattermost versions 11.4.x <= 11.4.0, 11.3.x <= 11.3.1, 11.2.x <= 11.2.3, 10.11....Mattermost versions 11.4.x <= 11.4.0, 11.3.x <= 11.3.1, 11.2.x <= 11.2.3, 10.11.x <= 10.11.11 fail to prevent rendering of external SVGs on link embeds which allows unauthenticated users to crash the Mattermost webapp and desktop app via creating an issue or PR on GitHub.. Mattermost Advisory ID: MMSA-2026-00595 |
2026-03-25 | |
| CVE-2026-1724 | 6.8 | MEDIUM | CWE-306 | 0.0% p6 | 4.76 | GitLab has remediated an issue in GitLab EE affecting all versions from 18.5 bef...GitLab has remediated an issue in GitLab EE affecting all versions from 18.5 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 that could have allowed an unauthenticated user to access API tokens of self-hosted AI models due to improper access control. |
2026-03-25 | |
| CVE-2026-1712 | 5.8 | MEDIUM | CWE-266 | 0.0% p13 | 4.06 | Incorrect privilege assignment vulnerability in HYPR Server allows Privilege Esc...Incorrect privilege assignment vulnerability in HYPR Server allows Privilege Escalation.This issue affects HYPR Server: from 10.5.1 before 10.7. |
2026-03-25 | |
| CVE-2025-69358 | 7.5 | HIGH | CWE-862 | 0.1% p16 | 5.25 | Missing Authorization vulnerability in Metagauss EventPrime eventprime-event-cal...Missing Authorization vulnerability in Metagauss EventPrime eventprime-event-calendar-management allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects EventPrime: from n/a through <= 4.2.6.0. |
2026-03-25 | |
| CVE-2025-69347 | 8.5 | HIGH | CWE-639 | 0.0% p8 | 5.95 | Authorization Bypass Through User-Controlled Key vulnerability in Convers Lab WP...Authorization Bypass Through User-Controlled Key vulnerability in Convers Lab WPSubscription subscription allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WPSubscription: from n/a through <= 1.8.10. |
2026-03-25 | |
| CVE-2025-69096 | 7.1 | HIGH | CWE-79 | 0.0% p10 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in G5Theme Zorka zorka allows Reflected XSS.This issue affects Zorka: from n/a through <= 1.5.7. |
2026-03-25 | |
| CVE-2025-14595 | 4.3 | MEDIUM | CWE-862 | 0.0% p2 | 3.01 | GitLab has remediated an issue in GitLab EE affecting all versions from 18.6 bef...GitLab has remediated an issue in GitLab EE affecting all versions from 18.6 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 that under certain conditions could have allowed an authenticated user with Planner role to view security category metadata and attributes in group security configuration due to improper access control |
2026-03-25 | |
| CVE-2025-13436 | 6.5 | MEDIUM | CWE-770 | 0.0% p12 | 4.55 | GitLab has remediated an issue in GitLab CE/EE affecting all versions from 13.7 ...GitLab has remediated an issue in GitLab CE/EE affecting all versions from 13.7 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 that could have allowed an authenticated user to cause a denial of service due to excessive resource consumption when handling certain CI-related inputs. |
2026-03-25 | |
| CVE-2025-13078 | 6.5 | MEDIUM | CWE-1284 | 0.0% p5 | 4.55 | GitLab has remediated an issue in GitLab CE/EE affecting all versions from 16.10...GitLab has remediated an issue in GitLab CE/EE affecting all versions from 16.10 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 that could have allowed an authenticated user to cause a denial of service due to excessive resource consumption when processing certain webhook configuration inputs. |
2026-03-25 | |
| CVE-2026-3218 | 4.8 | MEDIUM | CWE-79 | 0.0% p8 | 3.36 | Improper Neutralization of Input During Web Page Generation ("Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ("Cross-site Scripting") vulnerability in Drupal Responsive Favicons allows Cross-Site Scripting (XSS).This issue affects Responsive Favicons: from 0.0.0 before 2.0.2. |
2026-03-25 | |
| CVE-2026-3217 | 6.1 | MEDIUM | CWE-79 | 0.0% p9 | 4.27 | Improper Neutralization of Input During Web Page Generation ("Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ("Cross-site Scripting") vulnerability in Drupal SAML SSO - Service Provider allows Cross-Site Scripting (XSS).This issue affects SAML SSO - Service Provider: from 0.0.0 before 3.1.3. |
2026-03-25 | |
| CVE-2026-3216 | 5.0 | MEDIUM | CWE-918 | 0.0% p8 | 3.50 | Server-Side Request Forgery (SSRF) vulnerability in Drupal Drupal Canvas allows ...Server-Side Request Forgery (SSRF) vulnerability in Drupal Drupal Canvas allows Server Side Request Forgery.This issue affects Drupal Canvas: from 0.0.0 before 1.1.1. |
2026-03-25 | |
| CVE-2026-3215 | 5.4 | MEDIUM | CWE-79 | 0.0% p8 | 3.78 | Improper Neutralization of Input During Web Page Generation ("Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ("Cross-site Scripting") vulnerability in Drupal Islandora allows Cross-Site Scripting (XSS).This issue affects Islandora: from 0.0.0 before 2.17.5. |
2026-03-25 | |
| CVE-2026-3214 | 6.5 | MEDIUM | CWE-288 | 0.0% p14 | 4.55 | Authentication Bypass Using an Alternate Path or Channel vulnerability in Drupal...Authentication Bypass Using an Alternate Path or Channel vulnerability in Drupal CAPTCHA allows Functionality Bypass.This issue affects CAPTCHA: from 0.0.0 before 1.17.0, from 2.0.0 before 2.0.10. |
2026-03-25 | |
| CVE-2026-3213 | 4.7 | MEDIUM | CWE-79 | 0.0% p9 | 3.29 | Improper Neutralization of Input During Web Page Generation ("Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ("Cross-site Scripting") vulnerability in Drupal Anti-Spam by CleanTalk allows Cross-Site Scripting (XSS).This issue affects Anti-Spam by CleanTalk: from 0.0.0 before 9.7.0. |
2026-03-25 | |
| CVE-2026-3212 | 5.4 | MEDIUM | CWE-79 | 0.0% p8 | 3.78 | Improper Neutralization of Input During Web Page Generation ("Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ("Cross-site Scripting") vulnerability in Drupal Tagify allows Cross-Site Scripting (XSS).This issue affects Tagify: from 0.0.0 before 1.2.49. |
2026-03-25 | |
| CVE-2026-3211 | 4.3 | MEDIUM | CWE-352 | 0.0% p3 | 3.01 | Cross-Site Request Forgery (CSRF) vulnerability in Drupal Theme Negotiation by R...Cross-Site Request Forgery (CSRF) vulnerability in Drupal Theme Negotiation by Rules allows Cross Site Request Forgery.This issue affects Theme Negotiation by Rules: from 0.0.0 before 1.2.1. |
2026-03-25 | |
| CVE-2026-3210 | 5.3 | MEDIUM | CWE-863 | 0.0% p11 | 3.71 | Incorrect Authorization vulnerability in Drupal Material Icons allows Forceful B...Incorrect Authorization vulnerability in Drupal Material Icons allows Forceful Browsing.This issue affects Material Icons: from 0.0.0 before 2.0.4. |
2026-03-25 | |
| CVE-2026-2349 | 6.1 | MEDIUM | CWE-79 | 0.0% p9 | 4.27 | Improper Neutralization of Input During Web Page Generation ("Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ("Cross-site Scripting") vulnerability in Drupal UI Icons allows Cross-Site Scripting (XSS).This issue affects UI Icons: from 0.0.0 before 1.0.1, from 1.1.0 before 1.1.1. |
2026-03-25 | |
| CVE-2026-2348 | 5.4 | MEDIUM | CWE-79 | 0.0% p8 | 3.78 | Improper Neutralization of Input During Web Page Generation ("Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ("Cross-site Scripting") vulnerability in Drupal Quick Edit allows Cross-Site Scripting (XSS).This issue affects Quick Edit: from 0.0.0 before 1.0.5, from 2.0.0 before 2.0.1. |
2026-03-25 | |
| CVE-2026-26833 | 9.8 | CRITICAL | CWE-78 | 0.4% p62 | 6.87 | thumbler through 1.1.2 allows OS command injection via the input, output, time, ...thumbler through 1.1.2 allows OS command injection via the input, output, time, or size parameter in the thumbnail() function because user input is concatenated into a shell command string passed to child_process.exec() without proper sanitization or escaping. |
2026-03-25 | |
| CVE-2026-26832 | 9.8 | CRITICAL | CWE-78 | 0.3% p50 | 6.87 | node-tesseract-ocr is an npm package that provides a Node.js wrapper for Tessera...node-tesseract-ocr is an npm package that provides a Node.js wrapper for Tesseract OCR. In all versions through 2.2.1, the recognize() function in src/index.js is vulnerable to OS Command Injection. The file path parameter is concatenated into a shell command string and passed to child_process.exec() without proper sanitization |
2026-03-25 | |
| CVE-2026-26831 | 9.8 | CRITICAL | CWE-78 | 0.4% p63 | 6.87 | textract through 2.5.0 is vulnerable to OS Command Injection via the file path p...textract through 2.5.0 is vulnerable to OS Command Injection via the file path parameter in multiple extractors. When processing files with malicious filenames, the filePath is passed directly to child_process.exec() in lib/extractors/doc.js, rtf.js, dxf.js, images.js, and lib/util.js with inadequate sanitization |
2026-03-25 | |
| CVE-2026-24750 | 7.6 | HIGH | CWE-79 | 0.0% p9 | 5.32 | Kiteworks is a private data network (PDN). In Kiteworks Secure Data Forms prior ...Kiteworks is a private data network (PDN). In Kiteworks Secure Data Forms prior to version 9.2.1, an authenticated attacker could exploit an Improper Neutralization of Input During Web Page Generation as Stored XSS when modifying forms. Upgrade Kiteworks to version 9.2.1 or later to receive a patch. |
2026-03-25 | |
| CVE-2026-1917 | 4.3 | MEDIUM | CWE-288 | 0.0% p11 | 3.01 | Authentication Bypass Using an Alternate Path or Channel vulnerability in Drupal...Authentication Bypass Using an Alternate Path or Channel vulnerability in Drupal Login Disable allows Functionality Bypass.This issue affects Login Disable: from 0.0.0 before 2.1.3. |
2026-03-25 | |
| CVE-2024-58341 | 8.8 | HIGH | CWE-89 | 0.1% p26 | 6.16 | OpenCart Core 4.0.2.3 contains a SQL injection vulnerability that allows unauthe...OpenCart Core 4.0.2.3 contains a SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the 'search' parameter. Attackers can send GET requests to the product search endpoint with malicious 'search' values to extract sensitive database information using boolean-based blind or time-based blind SQL injection techniques. |
2026-03-25 | |
| CVE-2026-4363 | 3.7 | LOW | CWE-863 | 0.0% p2 | 2.59 | GitLab has remediated an issue in GitLab EE affecting all versions from 18.1 bef...GitLab has remediated an issue in GitLab EE affecting all versions from 18.1 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 that under certain conditions could have allowed an authenticated user to gain unauthorized access to resources due to improper caching of authorization decisions. |
2026-03-25 | |
| CVE-2026-3126 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering...Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. |
2026-03-25 | |
| CVE-2026-33268 | 6.9 | MEDIUM | CWE-400 | 0.1% p24 | 4.83 | Nanoleaf Lines 12.3.2 does not authenticate firmware file uploads. A remote, una...Nanoleaf Lines 12.3.2 does not authenticate firmware file uploads. A remote, unauthenticated attacker can upload firmware files on the device and consume storage resources. Fixed in 12.3.6. |
2026-03-25 | |
| CVE-2026-26830 | 9.8 | CRITICAL | CWE-94 | 0.8% p73 | 6.88 | pdf-image (npm package) through version 2.0.0 allows OS command injection via th...pdf-image (npm package) through version 2.0.0 allows OS command injection via the pdfFilePath parameter. The constructGetInfoCommand and constructConvertCommandForPage functions use util.format() to interpolate user-controlled file paths into shell command strings that are executed via child_process.exec() |
2026-03-25 | |
| CVE-2026-23514 | 8.8 | HIGH | CWE-282 | 0.0% p9 | 6.16 | Kiteworks is a private data network (PDN). Versions 9.2.0 and 9.2.1 of Kiteworks...Kiteworks is a private data network (PDN). Versions 9.2.0 and 9.2.1 of Kiteworks Core have an access control vulnerability that allows authenticated users to access unauthorized content. Upgrade Kiteworks Core to version 9.2.2 or later to receive a patch. |
2026-03-25 | |
| CVE-2025-59707 | 9.8 | CRITICAL | CWE-290 | 0.3% p51 | 6.87 | In N2W before 4.3.2 and 4.4.x before 4.4.1, there is potential remote code execu...In N2W before 4.3.2 and 4.4.x before 4.4.1, there is potential remote code execution and account credentials theft because of a spoofing vulnerability. |
2026-03-25 | |
| CVE-2025-59706 | 9.8 | CRITICAL | CWE-290 | 0.3% p51 | 6.87 | In N2W before 4.3.2 and 4.4.0 before 4.4.1, improper validation of API request p...In N2W before 4.3.2 and 4.4.0 before 4.4.1, improper validation of API request parameters enables remote code execution. |
2026-03-25 | |
| CVE-2025-32991 | 9.0 | CRITICAL | CWE-362 | 0.3% p50 | 6.31 | In N2WS Backup & Recovery before 4.4.0, a two-step attack against the RESTful AP...In N2WS Backup & Recovery before 4.4.0, a two-step attack against the RESTful API results in remote code execution. |
2026-03-25 | |
| CVE-2026-4816 | 4.8 | MEDIUM | CWE-79 | 0.0% p8 | 3.36 | A Reflected Cross Site Scripting (XSS) vulnerability has been found in Support B...A Reflected Cross Site Scripting (XSS) vulnerability has been found in Support Board v3.7.7. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending the victim a malicious URL using the 'search' parameter in '/supportboard/include/articles.php'. This vulnerability can be exploited to steal sensitive user data, such as session cookies, or to perform actions on behalf of the user. |
2026-03-25 | |
| CVE-2026-4815 | 8.7 | HIGH | CWE-89 | 0.0% p9 | 6.09 | A SQL Injection vulnerability has been found in Support Board v3.7.7. This vulne...A SQL Injection vulnerability has been found in Support Board v3.7.7. This vulnerability allows an attacker to retrieve, create, update and delete database via 'calls[0][message_ids][]' parameter in '/supportboard/include/ajax.php' endpoint. |
2026-03-25 | |
| CVE-2026-28529 | 8.5 | HIGH | CWE-416 | 0.0% p3 | 5.95 | cryptodev-linux version 1.14 and prior contain a page reference handling flaw in...cryptodev-linux version 1.14 and prior contain a page reference handling flaw in the get_userbuf function of the /dev/crypto device driver that allows local users to trigger use-after-free conditions. Attackers with access to the /dev/crypto interface can repeatedly decrement reference counts of controlled pages to achieve local privilege escalation. |
2026-03-25 | |
| CVE-2024-51348 | 8.8 | HIGH | CWE-121 | 0.2% p40 | 6.17 | A stack-based buffer overflow vulnerability in the P2P API service in BS Product...A stack-based buffer overflow vulnerability in the P2P API service in BS Producten Petcam with firmware 33.1.0.0818 allows unauthenticated attackers within network range to overwrite the instruction pointer and achieve Remote Code Execution (RCE) by sending a specially crafted HTTP request. |
2026-03-25 | |
| CVE-2024-51347 | 7.2 | HIGH | CWE-120 | 0.1% p16 | 5.04 | A buffer overflow vulnerability in the dgiot binary in LSC Smart Indoor IP Camer...A buffer overflow vulnerability in the dgiot binary in LSC Smart Indoor IP Camera V7.6.32. The flaw exists in the handling of the Time Zone (TZ) parameter within the ONVIF configuration interface. The time zone (TZ) parameter does not have its length properly validated before being copied into a fixed-size buffer using the insecure strcpy function. |
2026-03-25 | |
| CVE-2024-51346 | 7.7 | HIGH | CWE-330 | 0.0% p2 | 5.39 | An issue in Eufy Homebase 2 version 3.3.4.1h allows a local attacker to obtain s...An issue in Eufy Homebase 2 version 3.3.4.1h allows a local attacker to obtain sensitive information via the cryptographic scheme. |
2026-03-25 | |
| CVE-2026-23333 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering...Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. |
2026-03-25 | |
| CVE-2026-23320 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering...Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. |
2026-03-25 | |
| CVE-2026-32326 | 6.9 | MEDIUM | CWE-306 | 0.1% p16 | 4.83 | SHARP routers do not perform authentication for some web APIs. The device inform...SHARP routers do not perform authentication for some web APIs. The device information may be retrieved without authentication. If the administrative password of the device is left as the initial one, the device may be taken over. |
2026-03-25 | |
| CVE-2026-33253 | 8.4 | HIGH | CWE-428 | 0.0% p4 | 5.88 | SANUPS SOFTWARE provided by SANYO DENKI CO., LTD. registers Windows services wit...SANUPS SOFTWARE provided by SANYO DENKI CO., LTD. registers Windows services with unquoted file paths. A user with the write permission on the root directory of the system drive may execute arbitrary code with SYSTEM privilege. |
2026-03-25 | |
| CVE-2026-2343 | 5.3 | MEDIUM | N/A | 0.0% p10 | 3.71 | The PeproDev Ultimate Invoice WordPress plugin through 2.2.5 has a bulk download...The PeproDev Ultimate Invoice WordPress plugin through 2.2.5 has a bulk download invoices action that generates ZIP archives containing exported invoice PDFs. The ZIP files are named predictably making it possible to brute force and retreive PII. |
2026-03-25 | |
| CVE-2026-26306 | 8.4 | HIGH | CWE-427 | 0.0% p4 | 5.88 | The installer for OM Workspace (Windows Edition) Ver 2.4 and earlier insecurely ...The installer for OM Workspace (Windows Edition) Ver 2.4 and earlier insecurely loads Dynamic Link Libraries (DLLs), which could allow an attacker to execute arbitrary code with the privileges of the user invoking the installer. |
2026-03-25 | |
| CVE-2026-2072 | 8.2 | HIGH | CWE-79 | 0.0% p12 | 5.74 | Cross-Site Scripting vulnerability in Hitachi Infrastructure Analytics Advisor (...Cross-Site Scripting vulnerability in Hitachi Infrastructure Analytics Advisor (Analytics probe component), Hitachi Ops Center Analyzer.This issue affects Hitachi Infrastructure Analytics Advisor:; Hitachi Ops Center Analyzer: from 10.0.0-00 before 11.0.5-00. |
2026-03-25 | |
| CVE-2026-1166 | 4.3 | MEDIUM | CWE-601 | 0.0% p8 | 3.01 | Open Redirect vulnerability in Hitachi Ops Center Administrator.This issue affec...Open Redirect vulnerability in Hitachi Ops Center Administrator.This issue affects Hitachi Ops Center Administrator: from 10.2.0 before 11.0.8. |
2026-03-25 | |
| CVE-2026-4784 | 6.9 | MEDIUM | CWE-74 | 0.0% p10 | 4.83 | A vulnerability was found in code-projects Simple Laundry System 1.0. This affec...A vulnerability was found in code-projects Simple Laundry System 1.0. This affects an unknown function of the file /checkcheckout.php of the component Parameter Handler. The manipulation of the argument serviceId results in sql injection. It is possible to launch the attack remotely. The exploit has been made public and could be used. |
2026-03-25 | |
| CVE-2026-4766 | 6.4 | MEDIUM | CWE-79 | 0.0% p9 | 4.48 | The Easy Image Gallery plugin for WordPress is vulnerable to Stored Cross-Site S...The Easy Image Gallery plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Gallery shortcode post meta field in all versions up to, and including, 1.5.3. This is due to insufficient input sanitization and output escaping on user-supplied gallery shortcode values. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-03-25 | |
| CVE-2026-4783 | 5.3 | MEDIUM | CWE-74 | 0.0% p8 | 3.71 | A vulnerability has been found in itsourcecode College Management System 1.0. Th...A vulnerability has been found in itsourcecode College Management System 1.0. The impacted element is an unknown function of the file /admin/add-single-student-results.php of the component Parameter Handler. The manipulation of the argument course_code leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. |
2026-03-25 | |
| CVE-2026-28895 | 4.6 | MEDIUM | CWE-284 | 0.0% p5 | 3.22 | The issue was addressed with improved checks. This issue is fixed in iOS 26.4 an...The issue was addressed with improved checks. This issue is fixed in iOS 26.4 and iPadOS 26.4. An attacker with physical access to an iOS device with Stolen Device Protection enabled may be able to access biometrics-gated Protected Apps with the passcode. |
2026-03-25 | |
| CVE-2026-28894 | 7.5 | HIGH | CWE-20 | 0.2% p40 | 5.26 | A denial-of-service issue was addressed with improved input validation. This iss...A denial-of-service issue was addressed with improved input validation. This issue is fixed in iOS 26.4 and iPadOS 26.4, macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4. A remote attacker may be able to cause a denial-of-service. |
2026-03-25 | |
| CVE-2026-28893 | 3.3 | LOW | NVD-CWE-noinfo | 0.0% p2 | 2.31 | A privacy issue was addressed with improved handling of temporary files. This is...A privacy issue was addressed with improved handling of temporary files. This issue is fixed in macOS Tahoe 26.4. A document may be written to a temporary file when using print preview. |
2026-03-25 | |
| CVE-2026-28892 | 5.5 | MEDIUM | NVD-CWE-noinfo | 0.0% p0 | 3.85 | A permissions issue was addressed by removing the vulnerable code. This issue is...A permissions issue was addressed by removing the vulnerable code. This issue is fixed in macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4. An app may be able to modify protected parts of the file system. |
2026-03-25 | |
| CVE-2026-28891 | 8.1 | HIGH | CWE-362 | 0.0% p1 | 5.67 | A race condition was addressed with additional validation. This issue is fixed i...A race condition was addressed with additional validation. This issue is fixed in macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4. An app may be able to break out of its sandbox. |
2026-03-25 | |
| CVE-2026-28890 | 5.5 | MEDIUM | CWE-125 | 0.0% p2 | 3.85 | An out-of-bounds read was addressed with improved bounds checking. This issue is...An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in Xcode 26.4. An app may be able to cause unexpected system termination. |
2026-03-25 | |
| CVE-2026-28889 | 6.2 | MEDIUM | CWE-269 | 0.0% p4 | 4.34 | A permissions issue was addressed with additional restrictions. This issue is fi...A permissions issue was addressed with additional restrictions. This issue is fixed in Xcode 26.4. An app may be able to read arbitrary files as root. |
2026-03-25 | |
| CVE-2026-28888 | 5.1 | MEDIUM | CWE-362 | 0.0% p1 | 3.57 | A race condition was addressed with improved state handling. This issue is fixed...A race condition was addressed with improved state handling. This issue is fixed in macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4. An app may be able to gain root privileges. |
2026-03-25 | |
| CVE-2026-28886 | 5.9 | MEDIUM | CWE-476 | 0.1% p19 | 4.13 | A null pointer dereference was addressed with improved input validation. This is...A null pointer dereference was addressed with improved input validation. This issue is fixed in iOS 18.7.7 and iPadOS 18.7.7, iOS 26.4 and iPadOS 26.4, macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4, tvOS 26.4, visionOS 26.4, watchOS 26.4. A user in a privileged network position may be able to cause a denial-of-service. |
2026-03-25 | |
| CVE-2026-28882 | 4.0 | MEDIUM | NVD-CWE-noinfo | 0.0% p2 | 2.80 | This issue was addressed with improved checks. This issue is fixed in iOS 26.4 a...This issue was addressed with improved checks. This issue is fixed in iOS 26.4 and iPadOS 26.4, macOS Tahoe 26.4, tvOS 26.4, visionOS 26.4, watchOS 26.4. An app may be able to enumerate a user's installed apps. |
2026-03-25 | |
| CVE-2026-28881 | 5.5 | MEDIUM | NVD-CWE-noinfo | 0.0% p7 | 3.85 | A privacy issue was addressed by moving sensitive data. This issue is fixed in m...A privacy issue was addressed by moving sensitive data. This issue is fixed in macOS Tahoe 26.4. An app may be able to access sensitive user data. |
2026-03-25 | |
| CVE-2026-28880 | 6.5 | MEDIUM | CWE-284 | 0.1% p15 | 4.55 | A permissions issue was addressed with additional restrictions. This issue is fi...A permissions issue was addressed with additional restrictions. This issue is fixed in iOS 18.7.7 and iPadOS 18.7.7, iOS 26.4 and iPadOS 26.4, macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4, visionOS 26.4. An app may be able to enumerate a user's installed apps. |
2026-03-25 | |
| CVE-2026-28879 | 6.5 | MEDIUM | CWE-416 | 0.0% p12 | 4.55 | A use-after-free issue was addressed with improved memory management. This issue...A use-after-free issue was addressed with improved memory management. This issue is fixed in iOS 18.7.7 and iPadOS 18.7.7, iOS 26.4 and iPadOS 26.4, macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4, tvOS 26.4, visionOS 26.4, watchOS 26.4. Processing maliciously crafted web content may lead to an unexpected process crash. |
2026-03-25 | |
| CVE-2026-28878 | 6.5 | MEDIUM | CWE-200 | 0.1% p20 | 4.55 | A privacy issue was addressed by removing sensitive data. This issue is fixed in...A privacy issue was addressed by removing sensitive data. This issue is fixed in iOS 18.7.7 and iPadOS 18.7.7, iOS 26.4 and iPadOS 26.4, macOS Sonoma 14.8.5, macOS Tahoe 26.4, tvOS 26.4, visionOS 26.4, watchOS 26.4. An app may be able to enumerate a user's installed apps. |
2026-03-25 | |
| CVE-2026-28877 | 5.5 | MEDIUM | NVD-CWE-noinfo | 0.0% p1 | 3.85 | An authorization issue was addressed with improved state management. This issue ...An authorization issue was addressed with improved state management. This issue is fixed in iOS 26.4 and iPadOS 26.4, macOS Sequoia 15.7.5, macOS Tahoe 26.4, visionOS 26.4, watchOS 26.4. An app may be able to access sensitive user data. |
2026-03-25 | |
| CVE-2026-28876 | 7.5 | HIGH | CWE-284 | 0.1% p15 | 5.25 | A parsing issue in the handling of directory paths was addressed with improved p...A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in iOS 18.7.7 and iPadOS 18.7.7, iOS 26.4 and iPadOS 26.4, macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4, visionOS 26.4. An app may be able to access sensitive user data. |
2026-03-25 | |
| CVE-2026-28875 | 7.5 | HIGH | CWE-120 | 0.1% p32 | 5.25 | A buffer overflow was addressed with improved bounds checking. This issue is fix...A buffer overflow was addressed with improved bounds checking. This issue is fixed in iOS 26.4 and iPadOS 26.4. A remote attacker may be able to cause a denial-of-service. |
2026-03-25 | |
| CVE-2026-28874 | 7.5 | HIGH | CWE-400 | 0.1% p34 | 5.25 | The issue was addressed with improved checks. This issue is fixed in iOS 26.4 an...The issue was addressed with improved checks. This issue is fixed in iOS 26.4 and iPadOS 26.4. A remote attacker may cause an unexpected app termination. |
2026-03-25 | |
| CVE-2026-28871 | 4.3 | MEDIUM | CWE-79 | 0.0% p10 | 3.01 | A logic issue was addressed with improved checks. This issue is fixed in Safari ...A logic issue was addressed with improved checks. This issue is fixed in Safari 26.4, iOS 18.7.7 and iPadOS 18.7.7, iOS 26.4 and iPadOS 26.4, macOS Tahoe 26.4. Visiting a maliciously crafted website may lead to a cross-site scripting attack. |
2026-03-25 | |
| CVE-2026-28870 | 5.5 | MEDIUM | NVD-CWE-noinfo | 0.0% p1 | 3.85 | An information leakage was addressed with additional validation. This issue is f...An information leakage was addressed with additional validation. This issue is fixed in iOS 26.4 and iPadOS 26.4, macOS Tahoe 26.4, tvOS 26.4, visionOS 26.4, watchOS 26.4. An app may be able to access sensitive user data. |
2026-03-25 | |
| CVE-2026-28868 | 5.5 | MEDIUM | CWE-532 | 0.0% p1 | 3.85 | A logging issue was addressed with improved data redaction. This issue is fixed ...A logging issue was addressed with improved data redaction. This issue is fixed in iOS 18.7.7 and iPadOS 18.7.7, iOS 26.4 and iPadOS 26.4, macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4, visionOS 26.4, watchOS 26.4. An app may be able to disclose kernel memory. |
2026-03-25 | |
| CVE-2026-28867 | 6.2 | MEDIUM | NVD-CWE-noinfo | 0.0% p6 | 4.34 | This issue was addressed with improved authentication. This issue is fixed in iO...This issue was addressed with improved authentication. This issue is fixed in iOS 18.7.7 and iPadOS 18.7.7, iOS 26.4 and iPadOS 26.4, macOS Sequoia 15.7.5, macOS Tahoe 26.4, tvOS 26.4, visionOS 26.4, watchOS 26.4. An app may be able to leak sensitive kernel state. |
2026-03-25 | |
| CVE-2026-28866 | 6.2 | MEDIUM | CWE-59 | 0.0% p5 | 4.34 | This issue was addressed with improved validation of symlinks. This issue is fix...This issue was addressed with improved validation of symlinks. This issue is fixed in iOS 18.7.7 and iPadOS 18.7.7, iOS 26.4 and iPadOS 26.4, macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4. An app may be able to access sensitive user data. |
2026-03-25 | |
| CVE-2026-28865 | 7.5 | HIGH | CWE-285 | 0.1% p26 | 5.25 | An authentication issue was addressed with improved state management. This issue...An authentication issue was addressed with improved state management. This issue is fixed in iOS 18.7.7 and iPadOS 18.7.7, iOS 26.4 and iPadOS 26.4, macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4, tvOS 26.4, visionOS 26.4, watchOS 26.4. An attacker in a privileged network position may be able to intercept network traffic. |
2026-03-25 | |
| CVE-2026-28864 | 3.3 | LOW | CWE-863 | 0.0% p0 | 2.31 | This issue was addressed with improved permissions checking. This issue is fixed...This issue was addressed with improved permissions checking. This issue is fixed in iOS 18.7.7 and iPadOS 18.7.7, iOS 26.4 and iPadOS 26.4, macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4, visionOS 26.4, watchOS 26.4. A local attacker may gain access to user's Keychain items. |
2026-03-25 | |
| CVE-2026-28863 | 6.5 | MEDIUM | NVD-CWE-noinfo | 0.0% p7 | 4.55 | A permissions issue was addressed with additional restrictions. This issue is fi...A permissions issue was addressed with additional restrictions. This issue is fixed in iOS 26.4 and iPadOS 26.4, tvOS 26.4, visionOS 26.4, watchOS 26.4. An app may be able to fingerprint the user. |
2026-03-25 | |
| CVE-2026-28862 | 5.3 | MEDIUM | CWE-284 | 0.1% p16 | 3.71 | A privacy issue was addressed with improved private data redaction for log entri...A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4. An app may be able to access user-sensitive data. |
2026-03-25 | |
| CVE-2026-28861 | 4.3 | MEDIUM | NVD-CWE-noinfo | 0.0% p10 | 3.01 | A logic issue was addressed with improved state management. This issue is fixed ...A logic issue was addressed with improved state management. This issue is fixed in Safari 26.4, iOS 18.7.7 and iPadOS 18.7.7, iOS 26.4 and iPadOS 26.4, macOS Tahoe 26.4, visionOS 26.4. A malicious website may be able to access script message handlers intended for other origins. |
2026-03-25 | |
| CVE-2026-28859 | 4.3 | MEDIUM | CWE-125 | 0.0% p11 | 3.01 | The issue was addressed with improved memory handling. This issue is fixed in Sa...The issue was addressed with improved memory handling. This issue is fixed in Safari 26.4, iOS 26.4 and iPadOS 26.4, macOS Tahoe 26.4, tvOS 26.4, visionOS 26.4, watchOS 26.4. A malicious website may be able to process restricted web content outside the sandbox. |
2026-03-25 | |
| CVE-2026-28858 | 9.8 | CRITICAL | CWE-120 | 0.1% p33 | 6.86 | A buffer overflow was addressed with improved bounds checking. This issue is fix...A buffer overflow was addressed with improved bounds checking. This issue is fixed in iOS 26.4 and iPadOS 26.4. A remote user may be able to cause unexpected system termination or corrupt kernel memory. |
2026-03-25 | |
| CVE-2026-28857 | 6.5 | MEDIUM | CWE-125 | 0.0% p11 | 4.55 | The issue was addressed with improved memory handling. This issue is fixed in Sa...The issue was addressed with improved memory handling. This issue is fixed in Safari 26.4, iOS 26.4 and iPadOS 26.4, macOS Tahoe 26.4, visionOS 26.4. Processing maliciously crafted web content may lead to an unexpected process crash. |
2026-03-25 | |
| CVE-2026-28856 | 4.6 | MEDIUM | CWE-284 | 0.0% p8 | 3.22 | The issue was addressed with improved authentication. This issue is fixed in iOS...The issue was addressed with improved authentication. This issue is fixed in iOS 26.4 and iPadOS 26.4, visionOS 26.4, watchOS 26.4. An attacker with physical access to a locked device may be able to view sensitive user information. |
2026-03-25 | |
| CVE-2026-28855 | 7.5 | HIGH | CWE-284 | 0.0% p11 | 5.25 | A permissions issue was addressed with additional restrictions. This issue is fi...A permissions issue was addressed with additional restrictions. This issue is fixed in iOS 26.3 and iPadOS 26.3, macOS Tahoe 26.3. An app may be able to access protected user data. |
2026-03-25 | |
| CVE-2026-28852 | 5.5 | MEDIUM | CWE-20 | 0.0% p6 | 3.85 | A stack overflow was addressed with improved input validation. This issue is fix...A stack overflow was addressed with improved input validation. This issue is fixed in iOS 18.7.7 and iPadOS 18.7.7, iOS 26.4 and iPadOS 26.4, macOS Sequoia 15.7.5, macOS Tahoe 26.4, tvOS 26.4, visionOS 26.4, watchOS 26.4. An app may be able to cause a denial-of-service. |
2026-03-25 | |
| CVE-2026-28845 | 5.5 | MEDIUM | CWE-285 | 0.0% p2 | 3.85 | An authorization issue was addressed with improved state management. This issue ...An authorization issue was addressed with improved state management. This issue is fixed in macOS Tahoe 26.4. An app may be able to access protected user data. |
2026-03-25 | |
| CVE-2026-28844 | 6.5 | MEDIUM | NVD-CWE-noinfo | 0.0% p10 | 4.55 | A file access issue was addressed with improved input validation. This issue is ...A file access issue was addressed with improved input validation. This issue is fixed in macOS Tahoe 26.4. An attacker may gain access to protected parts of the file system. |
2026-03-25 | |
| CVE-2026-28842 | 7.5 | HIGH | CWE-122 | 0.1% p17 | 5.25 | The issue was addressed with improved bounds checks. This issue is fixed in macO...The issue was addressed with improved bounds checks. This issue is fixed in macOS Tahoe 26.4. A buffer overflow may result in memory corruption and unexpected app termination. |
2026-03-25 | |
| CVE-2026-28841 | 6.2 | MEDIUM | CWE-120 | 0.0% p5 | 4.34 | A buffer overflow was addressed with improved size validation. This issue is fix...A buffer overflow was addressed with improved size validation. This issue is fixed in macOS Tahoe 26.4. A buffer overflow may result in memory corruption and unexpected app termination. |
2026-03-25 | |
| CVE-2026-28839 | 5.3 | MEDIUM | CWE-285 | 0.0% p11 | 3.71 | The issue was addressed with improved checks. This issue is fixed in macOS Sequo...The issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4. An app may be able to access sensitive user data. |
2026-03-25 | |
| CVE-2026-28838 | 5.3 | MEDIUM | NVD-CWE-noinfo | 0.0% p11 | 3.71 | A permissions issue was addressed with additional sandbox restrictions. This iss...A permissions issue was addressed with additional sandbox restrictions. This issue is fixed in macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4. An app may be able to break out of its sandbox. |
2026-03-25 | |
| CVE-2026-28837 | 7.5 | HIGH | CWE-284 | 0.0% p13 | 5.25 | A logic issue was addressed with improved checks. This issue is fixed in macOS T...A logic issue was addressed with improved checks. This issue is fixed in macOS Tahoe 26.4. An app may be able to access sensitive user data. |
2026-03-25 | |
| CVE-2026-28835 | 6.5 | MEDIUM | CWE-416 | 0.0% p10 | 4.55 | A use-after-free issue was addressed with improved memory management. This issue...A use-after-free issue was addressed with improved memory management. This issue is fixed in macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4. Mounting a maliciously crafted SMB network share may lead to system termination. |
2026-03-25 | |
| CVE-2026-28834 | 5.1 | MEDIUM | CWE-362 | 0.0% p1 | 3.57 | A race condition was addressed with improved state handling. This issue is fixed...A race condition was addressed with improved state handling. This issue is fixed in macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4. An app may be able to cause unexpected system termination. |
2026-03-25 | |
| CVE-2026-28833 | 6.2 | MEDIUM | NVD-CWE-noinfo | 0.0% p2 | 4.34 | A permissions issue was addressed with additional restrictions. This issue is fi...A permissions issue was addressed with additional restrictions. This issue is fixed in iOS 26.4 and iPadOS 26.4, macOS Tahoe 26.4, visionOS 26.4. An app may be able to enumerate a user's installed apps. |
2026-03-25 | |
| CVE-2026-28832 | 8.4 | HIGH | CWE-125 | 0.0% p2 | 5.88 | An out-of-bounds read was addressed with improved bounds checking. This issue is...An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4. An app may be able to disclose kernel memory. |
2026-03-25 | |
| CVE-2026-28831 | 5.5 | MEDIUM | NVD-CWE-noinfo | 0.0% p1 | 3.85 | An authorization issue was addressed with improved state management. This issue ...An authorization issue was addressed with improved state management. This issue is fixed in macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4. An app may be able to access sensitive user data. |
2026-03-25 | |
| CVE-2026-28829 | 5.5 | MEDIUM | CWE-732 | 0.0% p1 | 3.85 | A permissions issue was addressed with additional restrictions. This issue is fi...A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4. An app may be able to modify protected parts of the file system. |
2026-03-25 | |
| CVE-2026-28828 | 5.3 | MEDIUM | CWE-284 | 0.0% p11 | 3.71 | A permissions issue was addressed by removing the vulnerable code. This issue is...A permissions issue was addressed by removing the vulnerable code. This issue is fixed in macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4. An app may be able to access sensitive user data. |
2026-03-25 | |
| CVE-2026-28827 | 9.3 | CRITICAL | CWE-22 | 0.0% p3 | 6.51 | A parsing issue in the handling of directory paths was addressed with improved p...A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4. An app may be able to break out of its sandbox. |
2026-03-25 | |
| CVE-2026-28826 | 4.0 | MEDIUM | NVD-CWE-noinfo | 0.0% p3 | 2.80 | A logic issue was addressed with improved restrictions. This issue is fixed in m...A logic issue was addressed with improved restrictions. This issue is fixed in macOS Tahoe 26.4. A malicious app may be able to break out of its sandbox. |
2026-03-25 | |
| CVE-2026-28825 | 5.5 | MEDIUM | CWE-787 | 0.0% p2 | 3.85 | An out-of-bounds write issue was addressed with improved bounds checking. This i...An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4. An app may be able to modify protected parts of the file system. |
2026-03-25 | |
| CVE-2026-28824 | 5.3 | MEDIUM | CWE-284 | 0.0% p11 | 3.71 | An authorization issue was addressed with improved state management. This issue ...An authorization issue was addressed with improved state management. This issue is fixed in macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4. An app may be able to access sensitive user data. |
2026-03-25 | |
| CVE-2026-28823 | 4.9 | MEDIUM | CWE-284 | 0.0% p10 | 3.43 | A path handling issue was addressed with improved validation. This issue is fixe...A path handling issue was addressed with improved validation. This issue is fixed in macOS Tahoe 26.4. An app with root privileges may be able to delete protected system files. |
2026-03-25 | |
| CVE-2026-28822 | 6.2 | MEDIUM | CWE-843 | 0.0% p2 | 4.34 | A type confusion issue was addressed with improved memory handling. This issue i...A type confusion issue was addressed with improved memory handling. This issue is fixed in iOS 26.4 and iPadOS 26.4, macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4, tvOS 26.4, visionOS 26.4, watchOS 26.4. An attacker may be able to cause unexpected app termination. |
2026-03-25 | |
| CVE-2026-28821 | 8.4 | HIGH | CWE-20 | 0.0% p7 | 5.88 | A validation issue existed in the entitlement verification. This issue was addre...A validation issue existed in the entitlement verification. This issue was addressed with improved validation of the process entitlement. This issue is fixed in macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4. An app may be able to gain elevated privileges. |
2026-03-25 | |
| CVE-2026-28820 | 5.3 | MEDIUM | NVD-CWE-noinfo | 0.0% p7 | 3.71 | This issue was addressed with improved checks. This issue is fixed in macOS Taho...This issue was addressed with improved checks. This issue is fixed in macOS Tahoe 26.4. An app may be able to access sensitive user data. |
2026-03-25 | |
| CVE-2026-28818 | 5.3 | MEDIUM | CWE-284 | 0.0% p11 | 3.71 | A logging issue was addressed with improved data redaction. This issue is fixed ...A logging issue was addressed with improved data redaction. This issue is fixed in macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4. An app may be able to access sensitive user data. |
2026-03-25 | |
| CVE-2026-28817 | 8.1 | HIGH | CWE-362 | 0.0% p1 | 5.67 | A race condition was addressed with improved state handling. This issue is fixed...A race condition was addressed with improved state handling. This issue is fixed in macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4. A sandboxed process may be able to circumvent sandbox restrictions. |
2026-03-25 | |
| CVE-2026-28816 | 4.0 | MEDIUM | CWE-22 | 0.0% p5 | 2.80 | A path handling issue was addressed with improved validation. This issue is fixe...A path handling issue was addressed with improved validation. This issue is fixed in macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4. An app may be able to delete files for which it does not have permission. |
2026-03-25 | |
| CVE-2026-20701 | 7.5 | HIGH | CWE-693 | 0.1% p16 | 5.25 | An access issue was addressed with additional sandbox restrictions. This issue i...An access issue was addressed with additional sandbox restrictions. This issue is fixed in macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4. An app may be able to connect to a network share without user consent. |
2026-03-25 | |
| CVE-2026-20699 | 6.2 | MEDIUM | CWE-347 | 0.0% p0 | 4.34 | A downgrade issue affecting Intel-based Mac computers was addressed with additio...A downgrade issue affecting Intel-based Mac computers was addressed with additional code-signing restrictions. This issue is fixed in macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.3, macOS Tahoe 26.4. An app may be able to access user-sensitive data. |
2026-03-25 | |
| CVE-2026-20698 | 7.8 | HIGH | CWE-787 | 0.0% p1 | 5.46 | The issue was addressed with improved memory handling. This issue is fixed in iO...The issue was addressed with improved memory handling. This issue is fixed in iOS 26.4 and iPadOS 26.4, macOS Tahoe 26.4, tvOS 26.4, visionOS 26.4, watchOS 26.4. An app may be able to cause unexpected system termination or corrupt kernel memory. |
2026-03-25 | |
| CVE-2026-20697 | 5.3 | MEDIUM | CWE-284 | 0.0% p11 | 3.71 | A permissions issue was addressed with additional restrictions. This issue is fi...A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4. An app may be able to access sensitive user data. |
2026-03-25 | |
| CVE-2026-20695 | 6.2 | MEDIUM | NVD-CWE-noinfo | 0.0% p2 | 4.34 | An information disclosure issue was addressed with improved memory management. T...An information disclosure issue was addressed with improved memory management. This issue is fixed in macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4. An app may be able to determine kernel memory layout. |
2026-03-25 | |
| CVE-2026-20694 | 5.5 | MEDIUM | CWE-59 | 0.0% p0 | 3.85 | This issue was addressed with improved handling of symlinks. This issue is fixed...This issue was addressed with improved handling of symlinks. This issue is fixed in iOS 26.3 and iPadOS 26.3, macOS Sequoia 15.7.4, macOS Sequoia 15.7.5, macOS Sonoma 14.8.4, macOS Sonoma 14.8.5, macOS Tahoe 26.3, macOS Tahoe 26.4. An app may be able to access user-sensitive data. |
2026-03-25 | |
| CVE-2026-20693 | 4.9 | MEDIUM | CWE-732 | 0.0% p11 | 3.43 | This issue was addressed through improved state management. This issue is fixed ...This issue was addressed through improved state management. This issue is fixed in macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4. An attacker with root privileges may be able to delete protected system files. |
2026-03-25 | |
| CVE-2026-20692 | 5.3 | MEDIUM | NVD-CWE-noinfo | 0.0% p12 | 3.71 | A privacy issue was addressed with improved handling of user preferences. This i...A privacy issue was addressed with improved handling of user preferences. This issue is fixed in iOS 26.4 and iPadOS 26.4, macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4. "Hide IP Address" and "Block All Remote Content" may not apply to all mail content. |
2026-03-25 | |
| CVE-2026-20691 | 4.3 | MEDIUM | CWE-497 | 0.0% p10 | 3.01 | An authorization issue was addressed with improved state management. This issue ...An authorization issue was addressed with improved state management. This issue is fixed in Safari 26.4, iOS 26.4 and iPadOS 26.4, macOS Tahoe 26.4, visionOS 26.4, watchOS 26.4. A maliciously crafted webpage may be able to fingerprint the user. |
2026-03-25 | |
| CVE-2026-20690 | 6.5 | MEDIUM | CWE-125 | 0.0% p11 | 4.55 | An out-of-bounds access issue was addressed with improved bounds checking. This ...An out-of-bounds access issue was addressed with improved bounds checking. This issue is fixed in iOS 18.7.7 and iPadOS 18.7.7, iOS 26.4 and iPadOS 26.4, macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4, tvOS 26.4, visionOS 26.4, watchOS 26.4. Processing an audio stream in a maliciously crafted media file may terminate the process. |
2026-03-25 | |
| CVE-2026-20688 | 9.3 | CRITICAL | CWE-22 | 0.0% p3 | 6.51 | A path handling issue was addressed with improved validation. This issue is fixe...A path handling issue was addressed with improved validation. This issue is fixed in iOS 26.4 and iPadOS 26.4, macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4, visionOS 26.4. An app may be able to break out of its sandbox. |
2026-03-25 | |
| CVE-2026-20687 | 7.1 | HIGH | CWE-416 | 0.0% p1 | 4.97 | A use after free issue was addressed with improved memory management. This issue...A use after free issue was addressed with improved memory management. This issue is fixed in iOS 18.7.7 and iPadOS 18.7.7, iOS 26.4 and iPadOS 26.4, macOS Sequoia 15.7.5, macOS Tahoe 26.4, tvOS 26.4, watchOS 26.4. An app may be able to cause unexpected system termination or write kernel memory. |
2026-03-25 | |
| CVE-2026-20686 | 5.3 | MEDIUM | CWE-20 | 0.1% p26 | 3.71 | This issue was addressed with improved input validation. This issue is fixed in ...This issue was addressed with improved input validation. This issue is fixed in iOS 26.3 and iPadOS 26.3. An app may be able to access sensitive user data. |
2026-03-25 | |
| CVE-2026-20684 | 3.3 | LOW | NVD-CWE-noinfo | 0.0% p2 | 2.31 | A permissions issue was addressed with additional restrictions. This issue is fi...A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Tahoe 26.4. An app may bypass Gatekeeper checks. |
2026-03-25 | |
| CVE-2026-20670 | 5.5 | MEDIUM | NVD-CWE-noinfo | 0.0% p1 | 3.85 | An authorization issue was addressed with improved state management. This issue ...An authorization issue was addressed with improved state management. This issue is fixed in macOS Sonoma 14.8.4, macOS Tahoe 26.3. An app may be able to access sensitive user data. |
2026-03-25 | |
| CVE-2026-20668 | 5.5 | MEDIUM | CWE-532 | 0.0% p1 | 3.85 | A logging issue was addressed with improved data redaction. This issue is fixed ...A logging issue was addressed with improved data redaction. This issue is fixed in iOS 18.7.7 and iPadOS 18.7.7, iOS 26.3 and iPadOS 26.3, macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.3, visionOS 26.3. An app may be able to access sensitive user data. |
2026-03-25 | |
| CVE-2026-20665 | 6.5 | MEDIUM | CWE-693 | 0.2% p36 | 4.55 | This issue was addressed through improved state management. This issue is fixed ...This issue was addressed through improved state management. This issue is fixed in Safari 26.4, iOS 18.7.7 and iPadOS 18.7.7, iOS 26.4 and iPadOS 26.4, macOS Tahoe 26.4, tvOS 26.4, visionOS 26.4, watchOS 26.4. Processing maliciously crafted web content may prevent Content Security Policy from being enforced. |
2026-03-25 | |
| CVE-2026-20664 | 4.3 | MEDIUM | CWE-787 | 0.0% p11 | 3.01 | The issue was addressed with improved memory handling. This issue is fixed in Sa...The issue was addressed with improved memory handling. This issue is fixed in Safari 26.4, iOS 26.4 and iPadOS 26.4, macOS Tahoe 26.4, visionOS 26.4. Processing maliciously crafted web content may lead to an unexpected process crash. |
2026-03-25 | |
| CVE-2026-20657 | 6.5 | MEDIUM | CWE-119 | 0.0% p14 | 4.55 | The issue was addressed with improved memory handling. This issue is fixed in iO...The issue was addressed with improved memory handling. This issue is fixed in iOS 18.7.7 and iPadOS 18.7.7, macOS Sequoia 15.7.5, macOS Sonoma 14.8.5. Parsing a maliciously crafted file may lead to an unexpected app termination. |
2026-03-25 | |
| CVE-2026-20651 | 6.2 | MEDIUM | CWE-377 | 0.0% p2 | 4.34 | A privacy issue was addressed with improved handling of temporary files. This is...A privacy issue was addressed with improved handling of temporary files. This issue is fixed in macOS Sequoia 15.7.5, macOS Sonoma 14.8.4, macOS Tahoe 26.3. An app may be able to access sensitive user data. |
2026-03-25 | |
| CVE-2026-20639 | 7.5 | HIGH | CWE-190 | 0.1% p16 | 5.25 | An integer overflow was addressed with improved input validation. This issue is ...An integer overflow was addressed with improved input validation. This issue is fixed in macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.3. Processing a maliciously crafted string may lead to heap corruption. |
2026-03-25 | |
| CVE-2026-20637 | 6.2 | MEDIUM | CWE-416 | 0.0% p2 | 4.34 | A use after free issue was addressed with improved memory management. This issue...A use after free issue was addressed with improved memory management. This issue is fixed in iOS 18.7.7 and iPadOS 18.7.7, iOS 26.3 and iPadOS 26.3, macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.3, tvOS 26.3, visionOS 26.3, watchOS 26.3. An app may be able to cause unexpected system termination. |
2026-03-25 | |
| CVE-2026-20633 | 5.5 | MEDIUM | CWE-59 | 0.0% p0 | 3.85 | This issue was addressed with improved handling of symlinks. This issue is fixed...This issue was addressed with improved handling of symlinks. This issue is fixed in macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4. An app may be able to access user-sensitive data. |
2026-03-25 | |
| CVE-2026-20632 | 5.3 | MEDIUM | CWE-284 | 0.0% p11 | 3.71 | A parsing issue in the handling of directory paths was addressed with improved p...A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in macOS Tahoe 26.4. An app may be able to access sensitive user data. |
2026-03-25 | |
| CVE-2026-20631 | 8.8 | HIGH | NVD-CWE-noinfo | 0.0% p10 | 6.16 | A logic issue was addressed with improved checks. This issue is fixed in macOS T...A logic issue was addressed with improved checks. This issue is fixed in macOS Tahoe 26.4. A user may be able to elevate privileges. |
2026-03-25 | |
| CVE-2026-20622 | 7.5 | HIGH | CWE-284 | 0.0% p11 | 5.25 | A privacy issue was addressed with improved handling of temporary files. This is...A privacy issue was addressed with improved handling of temporary files. This issue is fixed in macOS Sequoia 15.7.4, macOS Tahoe 26.3. An app may be able to capture a user's screen. |
2026-03-25 | |
| CVE-2026-20607 | 4.0 | MEDIUM | CWE-269 | 0.0% p2 | 2.80 | A permissions issue was addressed with additional restrictions. This issue is fi...A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4. An app may be able to access protected user data. |
2026-03-25 | |
| CVE-2025-43534 | 6.8 | MEDIUM | CWE-284 | 0.0% p5 | 4.76 | A path handling issue was addressed with improved validation. This issue is fixe...A path handling issue was addressed with improved validation. This issue is fixed in iOS 18.7.7 and iPadOS 18.7.7, iOS 26.2 and iPadOS 26.2. A user with physical access to an iOS device may be able to bypass Activation Lock. |
2026-03-25 | |
| CVE-2026-4781 | 5.3 | MEDIUM | CWE-74 | 0.0% p7 | 3.71 | A flaw has been found in SourceCodester Sales and Inventory System 1.0. The affe...A flaw has been found in SourceCodester Sales and Inventory System 1.0. The affected element is an unknown function of the file update_purchase.php of the component HTTP GET Parameter Handler. Executing a manipulation of the argument sid can lead to sql injection. The attack may be performed from remote. The exploit has been published and may be used. |
2026-03-25 | |
| CVE-2026-4780 | 5.3 | MEDIUM | CWE-74 | 0.0% p7 | 3.71 | A vulnerability was detected in SourceCodester Sales and Inventory System 1.0. I...A vulnerability was detected in SourceCodester Sales and Inventory System 1.0. Impacted is an unknown function of the file update_out_standing.php of the component HTTP GET Parameter Handler. Performing a manipulation of the argument sid results in sql injection. The attack is possible to be carried out remotely. The exploit is now public and may be used. |
2026-03-25 | |
| CVE-2026-4779 | 5.3 | MEDIUM | CWE-74 | 0.0% p7 | 3.71 | A security vulnerability has been detected in SourceCodester Sales and Inventory...A security vulnerability has been detected in SourceCodester Sales and Inventory System 1.0. This issue affects some unknown processing of the file update_customer_details.php of the component HTTP GET Parameter Handler. Such manipulation of the argument sid leads to sql injection. The attack can be executed remotely. The exploit has been disclosed publicly and may be used. |
2026-03-24 | |
| CVE-2026-4778 | 5.3 | MEDIUM | CWE-74 | 0.0% p7 | 3.71 | A weakness has been identified in SourceCodester Sales and Inventory System 1.0....A weakness has been identified in SourceCodester Sales and Inventory System 1.0. This vulnerability affects unknown code of the file update_category.php of the component HTTP GET Parameter Handler. This manipulation of the argument sid causes sql injection. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be used for attacks. |
2026-03-24 | |
| CVE-2026-4777 | 5.3 | MEDIUM | CWE-74 | 0.0% p7 | 3.71 | A security flaw has been discovered in SourceCodester Sales and Inventory System...A security flaw has been discovered in SourceCodester Sales and Inventory System 1.0. This affects an unknown part of the file view_supplier.php of the component POST Parameter Handler. The manipulation of the argument searchtxt results in sql injection. The attack may be launched remotely. The exploit has been released to the public and may be used for attacks. |
2026-03-24 | |
| CVE-2026-4433 | 4.8 | MEDIUM | CWE-16 | 0.0% p14 | 3.36 | An SSH misconfigurations exists in Tenable OT that led to the potential exfiltra...An SSH misconfigurations exists in Tenable OT that led to the potential exfiltration of socket, port, and service information via the ostunnel user and GatewayPorts. This could be used to potentially glean information about the underlying system and give an attacker information that could be used to attempt to compromise the host. |
2026-03-24 | |
| CVE-2026-4371 | 7.4 | HIGH | CWE-126 | 0.1% p17 | 5.18 | A malicious mail server could send malformed strings with negative lengths, caus...A malicious mail server could send malformed strings with negative lengths, causing the parser to read memory outside the buffer. If a mail server or connection to a mail server were compromised, an attacker could cause the parser to malfunction, potentially crashing Thunderbird or leaking sensitive data. This vulnerability was fixed in Thunderbird 149 and Thunderbird 140.9. |
2026-03-24 | |
| CVE-2026-3912 | 8.7 | HIGH | CWE-20 | 0.0% p8 | 6.09 | Injection vulnerabilities due to validation/sanitisation of user-supplied input ...Injection vulnerabilities due to validation/sanitisation of user-supplied input in ActiveMatrix BusinessWorks and Enterprise Administrator allows information disclosure, including exposure of accessible local files and host system details, and may allow manipulation of application behaviour. |
2026-03-24 | |
| CVE-2026-3889 | 6.5 | MEDIUM | CWE-451 | 0.0% p7 | 4.55 | Spoofing issue in Thunderbird. This vulnerability was fixed in Thunderbird 149 a...Spoofing issue in Thunderbird. This vulnerability was fixed in Thunderbird 149 and Thunderbird 140.9. |
2026-03-24 | |
| CVE-2026-33215 | 6.5 | MEDIUM | CWE-287 | 0.0% p2 | 4.55 | NATS-Server is a High-Performance server for NATS.io, a cloud and edge native me...NATS-Server is a High-Performance server for NATS.io, a cloud and edge native messaging system. The nats-server provides an MQTT client interface. Prior to versions 2.11.15 and 2.12.5, Sessions and Messages can by hijacked via MQTT Client ID malfeasance. Versions 2.11.15 and 2.12.5 patch the issue. No known workarounds are available. |
2026-03-24 | |
| CVE-2026-24159 | 7.8 | HIGH | CWE-502 | 0.1% p27 | 5.46 | NVIDIA NeMo Framework contains a vulnerability where an attacker may cause remot...NVIDIA NeMo Framework contains a vulnerability where an attacker may cause remote code execution. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure and data tampering. |
2026-03-24 | |
| CVE-2026-24158 | 7.5 | HIGH | CWE-789 | 0.1% p19 | 5.25 | NVIDIA Triton Inference Server contains a vulnerability in the HTTP endpoint whe...NVIDIA Triton Inference Server contains a vulnerability in the HTTP endpoint where an attacker may cause a denial of service by providing a large compressed payload. A successful exploit of this vulnerability may lead to denial of service. |
2026-03-24 | |
| CVE-2026-24157 | 7.8 | HIGH | CWE-502 | 0.1% p27 | 5.46 | NVIDIA NeMo Framework contains a vulnerability in checkpoint loading where an at...NVIDIA NeMo Framework contains a vulnerability in checkpoint loading where an attacker could cause remote code execution. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure and data tampering. |
2026-03-24 | |
| CVE-2026-24152 | 7.8 | HIGH | CWE-502 | 0.1% p17 | 5.46 | NVIDIA Megatron-LM contains a vulnerability in checkpoint loading where an Attac...NVIDIA Megatron-LM contains a vulnerability in checkpoint loading where an Attacker may cause an RCE by convincing a user to load a maliciously crafted file. A successful exploit of this vulnerability may lead to code execution, escalation of privileges, information disclosure, and data tampering. |
2026-03-24 | |
| CVE-2026-24151 | 7.8 | HIGH | CWE-502 | 0.1% p16 | 5.46 | NVIDIA Megatron-LM contains a vulnerability in inferencing where an Attacker may...NVIDIA Megatron-LM contains a vulnerability in inferencing where an Attacker may cause an RCE by convincing a user to load a maliciously crafted input. A successful exploit of this vulnerability may lead to code execution, escalation of privileges, information disclosure, and data tampering. |
2026-03-24 | |
| CVE-2026-24150 | 7.8 | HIGH | CWE-502 | 0.1% p17 | 5.46 | NVIDIA Megatron-LM contains a vulnerability in checkpoint loading where an Attac...NVIDIA Megatron-LM contains a vulnerability in checkpoint loading where an Attacker may cause an RCE by convincing a user to load a maliciously crafted file. A successful exploit of this vulnerability may lead to code execution, escalation of privileges, information disclosure, and data tampering. |
2026-03-24 | |
| CVE-2026-24141 | 7.8 | HIGH | CWE-502 | 0.1% p20 | 5.46 | NVIDIA Model Optimizer for Windows and Linux contains a vulnerability in the ONN...NVIDIA Model Optimizer for Windows and Linux contains a vulnerability in the ONNX quantization feature, where a user could cause unsafe deserialization by providing a specially crafted input file. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, data tampering, and information disclosure. |
2026-03-24 | |
| CVE-2026-21790 | 6.3 | MEDIUM | CWE-346 | 0.0% p0 | 4.41 | HCL Traveler is susceptible to a weak default HTTP header validation vulnerabili...HCL Traveler is susceptible to a weak default HTTP header validation vulnerability, which could allow an attacker to bypass additional authentication checks. |
2026-03-24 | |
| CVE-2025-33254 | 7.5 | HIGH | CWE-362 | 0.0% p12 | 5.25 | NVIDIA Triton Inference Server contains a vulnerability where an attacker may ca...NVIDIA Triton Inference Server contains a vulnerability where an attacker may cause internal state corruption. A successful exploit of this vulnerability may lead to a denial of service. |
2026-03-24 | |
| CVE-2025-33248 | 7.8 | HIGH | CWE-502 | 0.1% p17 | 5.46 | NVIDIA Megatron-LM contains a vulnerability in the hybrid conversion script wher...NVIDIA Megatron-LM contains a vulnerability in the hybrid conversion script where an Attacker may cause an RCE by convincing a user to load a maliciously crafted file. A successful exploit of this vulnerability may lead to code execution, escalation of privileges, information disclosure, and data tampering. |
2026-03-24 | |
| CVE-2025-33247 | 7.8 | HIGH | CWE-502 | 0.3% p50 | 5.47 | NVIDIA Megatron LM contains a vulnerability in quantization configuration loadin...NVIDIA Megatron LM contains a vulnerability in quantization configuration loading, which could allow remote code execution. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure, and data tampering. |
2026-03-24 | |
| CVE-2025-33244 | 9.0 | CRITICAL | CWE-502 | 0.1% p19 | 6.30 | NVIDIA APEX for Linux contains a vulnerability where an unauthorized attacker co...NVIDIA APEX for Linux contains a vulnerability where an unauthorized attacker could cause a deserialization of untrusted data. This vulnerability affects environments that use PyTorch versions earlier than 2.6. A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges, data tampering, and information disclosure. |
2026-03-24 | |
| CVE-2025-33242 | 5.9 | MEDIUM | CWE-1234 | 0.0% p1 | 4.13 | NVIDIA B300 MCU contains a vulnerability in the CX8 MCU that could allow a malic...NVIDIA B300 MCU contains a vulnerability in the CX8 MCU that could allow a malicious actor to modify unsupported registries, causing a bad state. A successful exploit of this vulnerability might lead to denial of service and data tampering. |
2026-03-24 | |
| CVE-2025-33238 | 7.5 | HIGH | CWE-362 | 0.0% p12 | 5.25 | NVIDIA Triton Inference Server Sagemaker HTTP server contains a vulnerability wh...NVIDIA Triton Inference Server Sagemaker HTTP server contains a vulnerability where an attacker may cause an exception. A successful exploit of this vulnerability may lead to denial of service. |
2026-03-24 | |
| CVE-2025-33216 | 6.8 | MEDIUM | CWE-131 | 0.0% p0 | 4.76 | NVIDIA SNAP-4 Container contains a vulnerability in the configuration interface ...NVIDIA SNAP-4 Container contains a vulnerability in the configuration interface where an attacker on a VM may cause an incorrect calculation of buffer size by sending crafted configurations. A successful exploit of this vulnerability may lead to crash of the SNAP service, causing denial of service of the storage service to the host. |
2026-03-24 | |
| CVE-2025-33215 | 6.8 | MEDIUM | CWE-823 | 0.0% p0 | 4.76 | NVIDIA SNAP-4 Container contains a vulnerability in the VIRTIO-BLK component whe...NVIDIA SNAP-4 Container contains a vulnerability in the VIRTIO-BLK component where a malicious guest VM may cause use of out-of-range pointer offset by sending crafted messages. A successful exploit of this vulnerability may lead to a denial of service of the DPA and impact the availability of storage to other VMs. |
2026-03-24 | |
| CVE-2026-33511 | 8.8 | HIGH | CWE-639 | 0.1% p31 | 6.16 | pyLoad is a free and open-source download manager written in Python. From versio...pyLoad is a free and open-source download manager written in Python. From version 0.4.20 to before version 0.5.0b3.dev97, the local_check decorator in pyLoad's ClickNLoad feature can be bypassed by any remote attacker through HTTP Host header spoofing. This allows unauthenticated remote users to access localhost-restricted endpoints, enabling them to inject arbitrary downloads, write files to the storage directory, and execute JavaScript code. This issue has been patched in version 0.5.0b3.dev97. |
2026-03-24 | |
| CVE-2026-33509 | 7.5 | HIGH | CWE-269 | 0.1% p24 | 5.25 | pyLoad is a free and open-source download manager written in Python. From versio...pyLoad is a free and open-source download manager written in Python. From version 0.4.0 to before version 0.5.0b3.dev97, the set_config_value() API endpoint allows users with the non-admin SETTINGS permission to modify any configuration option without restriction. The reconnect.script config option controls a file path that is passed directly to subprocess.run() in the thread manager's reconnect logic. A SETTINGS user can set this to any executable file on the system, achieving Remote Code Execution. The only validation in set_config_value() is a hardcoded check for general.storage_folder — all other security-critical settings including reconnect.script are writable without any allowlist or path restriction. This issue has been patched in version 0.5.0b3.dev97. |
2026-03-24 | |
| CVE-2026-33419 | 9.1 | CRITICAL | CWE-204 | 0.0% p14 | 6.37 | MinIO is a high-performance object storage system. Prior to RELEASE.2026-03-17T2...MinIO is a high-performance object storage system. Prior to RELEASE.2026-03-17T21-25-16Z, MinIO AIStor's STS (Security Token Service) AssumeRoleWithLDAPIdentity endpoint is vulnerable to LDAP credential brute-forcing due to two combined weaknesses: (1) distinguishable error responses that enable username enumeration, and (2) absence of rate limiting on authentication attempts. An unauthenticated network attacker can enumerate valid LDAP usernames and then perform unlimited password guessing to obtain temporary AWS-style STS credentials, gaining access to the victim's S3 buckets and objects. This issue has been patched in RELEASE.2026-03-17T21-25-16Z. |
2026-03-24 | |
| CVE-2026-33412 | 5.6 | MEDIUM | CWE-78 | 0.0% p0 | 3.92 | Vim is an open source, command line text editor. Prior to version 9.2.0202, a co...Vim is an open source, command line text editor. Prior to version 9.2.0202, a command injection vulnerability exists in Vim's glob() function on Unix-like systems. By including a newline character (\n) in a pattern passed to glob(), an attacker may be able to execute arbitrary shell commands. This vulnerability depends on the user's 'shell' setting. This issue has been patched in version 9.2.0202. |
2026-03-24 | |
| CVE-2026-33353 | 7.1 | HIGH | CWE-200 | 0.0% p1 | 4.97 | Soft Serve is a self-hostable Git server for the command line. From version 0.6....Soft Serve is a self-hostable Git server for the command line. From version 0.6.0 to before version 0.11.6, an authorization flaw in repo import allows any authenticated SSH user to clone a server-local Git repository, including another user's private repo, into a new repository they control. This issue has been patched in version 0.11.6. |
2026-03-24 | |
| CVE-2026-33349 | 5.9 | MEDIUM | CWE-1284 | 0.0% p8 | 4.13 | fast-xml-parser allows users to process XML from JS object without C/C++ based l...fast-xml-parser allows users to process XML from JS object without C/C++ based libraries or callbacks. From version 4.0.0-beta.3 to before version 5.5.7, the DocTypeReader in fast-xml-parser uses JavaScript truthy checks to evaluate maxEntityCount and maxEntitySize configuration limits. When a developer explicitly sets either limit to 0 — intending to disallow all entities or restrict entity size to zero bytes — the falsy nature of 0 in JavaScript causes the guard conditions to short-circuit, completely bypassing the limits. An attacker who can supply XML input to such an application can trigger unbounded entity expansion, leading to memory exhaustion and denial of service. This issue has been patched in version 5.5.7. |
2026-03-24 | |
| CVE-2026-33347 | 6.3 | MEDIUM | CWE-79 | 0.0% p10 | 4.41 | league/commonmark is a PHP Markdown parser. From version 2.3.0 to before version...league/commonmark is a PHP Markdown parser. From version 2.3.0 to before version 2.8.2, the DomainFilteringAdapter in the Embed extension is vulnerable to an allowlist bypass due to a missing hostname boundary assertion in the domain-matching regex. An attacker-controlled domain like youtube.com.evil passes the allowlist check when youtube.com is an allowed domain. This issue has been patched in version 2.8.2. |
2026-03-24 | |
| CVE-2026-33345 | 6.5 | MEDIUM | CWE-639 | 0.0% p1 | 4.55 | solidtime is an open-source time-tracking app. Prior to version 0.11.6, the proj...solidtime is an open-source time-tracking app. Prior to version 0.11.6, the project detail endpoint GET /api/v1/organizations/{org}/projects/{project} allows any authenticated Employee to access any project in the organization by UUID, including private projects they are not a member of. The index() endpoint correctly applies the visibleByEmployee() scope, but show() does not. This issue has been patched in version 0.11.6. |
2026-03-24 | |
| CVE-2026-33344 | 8.1 | HIGH | CWE-22 | 0.0% p6 | 5.67 | Dagu is a workflow engine with a built-in Web user interface. From version 2.0.0...Dagu is a workflow engine with a built-in Web user interface. From version 2.0.0 to before version 2.3.1, the fix for CVE-2026-27598 added ValidateDAGName to CreateNewDAG and rewrote generateFilePath to use filepath.Base. This patched the CREATE path. The remaining API endpoints - GET, DELETE, RENAME, EXECUTE - all pass the {fileName} URL path parameter to locateDAG without calling ValidateDAGName. %2F-encoded forward slashes in the {fileName} segment traverse outside the DAGs directory. This issue has been patched in version 2.3.1. |
2026-03-24 | |
| CVE-2026-33332 | 6.9 | MEDIUM | CWE-20 | 0.0% p12 | 4.83 | NiceGUI is a Python-based UI framework. Prior to version 3.9.0, NiceGUI's app.ad...NiceGUI is a Python-based UI framework. Prior to version 3.9.0, NiceGUI's app.add_media_file() and app.add_media_files() media routes accept a user-controlled query parameter that influences how files are read during streaming. The parameter is passed to the range-response implementation without validation, allowing an attacker to bypass chunked streaming and force the server to load entire files into memory at once. With large media files and concurrent requests, this can lead to excessive memory consumption, degraded performance, or denial of service. This issue has been patched in version 3.9.0. |
2026-03-24 | |
| CVE-2026-33331 | 8.2 | HIGH | CWE-79 | 0.0% p2 | 5.74 | oRPC is an tool that helps build APIs that are end-to-end type-safe and adhere t...oRPC is an tool that helps build APIs that are end-to-end type-safe and adhere to OpenAPI standards. Prior to version 1.13.9, a stored cross-site scripting (XSS) vulnerability exists in the OpenAPI documentation generation of orpc. If an attacker can control any field within the OpenAPI specification (such as info.description), they can break out of the JSON context and execute arbitrary JavaScript when a user views the generated API documentation. This issue has been patched in version 1.13.9. |
2026-03-24 | |
| CVE-2026-33330 | 7.1 | HIGH | CWE-863 | 0.0% p1 | 4.97 | FileRise is a self-hosted web file manager / WebDAV server. Prior to version 3.1...FileRise is a self-hosted web file manager / WebDAV server. Prior to version 3.10.0, a broken access control issue in FileRise's ONLYOFFICE integration allows an authenticated user with read-only access to obtain a signed save callbackUrl for a file and then directly forge the ONLYOFFICE save callback to overwrite that file with attacker-controlled content. This issue has been patched in version 3.10.0. |
2026-03-24 | |
| CVE-2026-33329 | 8.1 | HIGH | CWE-22 | 0.1% p22 | 5.67 | FileRise is a self-hosted web file manager / WebDAV server. From version 1.0.1 t...FileRise is a self-hosted web file manager / WebDAV server. From version 1.0.1 to before version 3.10.0, the resumableIdentifier parameter in the Resumable.js chunked upload handler (UploadModel::handleUpload()) is concatenated directly into filesystem paths without any sanitization. An authenticated user with upload permission can exploit this to write files to arbitrary directories on the server, delete arbitrary directories via the post-assembly cleanup, and probe file/directory existence. This issue has been patched in version 3.10.0. |
2026-03-24 | |
| CVE-2026-33326 | 4.3 | MEDIUM | CWE-863 | 0.0% p0 | 3.01 | Keystone is a content management system for Node.js. Prior to version 6.5.2, {fi...Keystone is a content management system for Node.js. Prior to version 6.5.2, {field}.isFilterable access control can be bypassed in findMany queries by passing a cursor. This can be used to confirm the existence of records by protected field values. The fix for CVE-2025-46720 (field-level isFilterable bypass for update and delete mutations) added checks to the where parameter in update and delete mutations however the cursor parameter in findMany was not patched and accepts the same UniqueWhere input type. This issue has been patched in version 6.5.2. |
2026-03-24 | |
| CVE-2026-33322 | 9.2 | CRITICAL | CWE-287 | 0.0% p6 | 6.44 | MinIO is a high-performance object storage system. From RELEASE.2022-11-08T05-27...MinIO is a high-performance object storage system. From RELEASE.2022-11-08T05-27-07Z to before RELEASE.2026-03-17T21-25-16Z, a JWT algorithm confusion vulnerability in MinIO's OpenID Connect authentication allows an attacker who knows the OIDC ClientSecret to forge arbitrary identity tokens and obtain S3 credentials with any policy, including consoleAdmin. This issue has been patched in RELEASE.2026-03-17T21-25-16Z. |
2026-03-24 | |
| CVE-2026-33314 | 6.5 | MEDIUM | CWE-287 | 0.0% p0 | 4.55 | pyLoad is a free and open-source download manager written in Python. Prior to ve...pyLoad is a free and open-source download manager written in Python. Prior to version 0.5.0b3.dev97, a Host Header Spoofing vulnerability in the @local_check decorator allows unauthenticated external attackers to bypass local-only restrictions. This grants access to the Click'N'Load API endpoints, enabling attackers to remotely queue arbitrary downloads, leading to Server-Side Request Forgery (SSRF) and Denial of Service (DoS). This issue has been patched in version 0.5.0b3.dev97. |
2026-03-24 | |
| CVE-2026-32948 | 6.7 | MEDIUM | CWE-78 | 0.0% p6 | 4.69 | sbt is a build tool for Scala, Java, and others. From version 0.9.5 to before ve...sbt is a build tool for Scala, Java, and others. From version 0.9.5 to before version 1.12.7, on Windows, sbt uses Process("cmd", "/c", ...) to run VCS commands (git, hg, svn). The URI fragment (branch, tag, revision) is user-controlled via the build definition and passed to these commands without validation. Because cmd /c interprets &, |, and ; as command separators, a malicious fragment can execute arbitrary commands. This issue has been patched in version 1.12.7. |
2026-03-24 | |
| CVE-2026-21783 | 4.3 | MEDIUM | CWE-209 | 0.0% p1 | 3.01 | HCL Traveler is affected by sensitive information disclosure. The application g...HCL Traveler is affected by sensitive information disclosure. The application generates some error messages that provide detailed information about errors and failures, such as internal paths, file names, sensitive tokens, credentials, error codes, or stack traces. Attackers could exploit this information to gain insights into the system's architecture and potentially launch targeted attacks. |
2026-03-24 | |
| CVE-2026-33769 | 2.9 | LOW | CWE-20 | 0.1% p25 | 2.03 | Astro is a web framework. From version 2.10.10 to before version 5.18.1, this is...Astro is a web framework. From version 2.10.10 to before version 5.18.1, this issue concerns Astro's remotePatterns path enforcement for remote URLs used by server-side fetchers such as the image optimization endpoint. The path matching logic for /* wildcards is unanchored, so a pathname that contains the allowed prefix later in the path can still match. As a result, an attacker can fetch paths outside the intended allowlisted prefix on an otherwise allowed host. This issue has been patched in version 5.18.1. |
2026-03-24 | |
| CVE-2026-33768 | 6.5 | MEDIUM | CWE-441 | 0.1% p27 | 4.55 | Astro is a web framework. Prior to version 10.0.2, the @astrojs/vercel serverles...Astro is a web framework. Prior to version 10.0.2, the @astrojs/vercel serverless entrypoint reads the x-astro-path header and x_astro_path query parameter to rewrite the internal request path, with no authentication whatsoever. On deployments without Edge Middleware, this lets anyone bypass Vercel's platform-level path restrictions entirely. The override preserves the original HTTP method and body, so this isn't limited to GET. POST, PUT, DELETE all land on the rewritten path. A Firewall rule blocking /admin/* does nothing when the request comes in as POST /api/health?x_astro_path=/admin/delete-user. This issue has been patched in version 10.0.2. |
2026-03-24 | |
| CVE-2026-33627 | 7.1 | HIGH | CWE-200 | 0.1% p18 | 4.97 | Parse Server is an open source backend that can be deployed to any infrastructur...Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.61 and 9.6.0-alpha.55, an authenticated user calling GET /users/me receives unsanitized auth data, including sensitive credentials such as MFA TOTP secrets and recovery codes. The endpoint internally uses master-level authentication for the session query, and the master context leaks through to the user data, bypassing auth adapter sanitization. An attacker who obtains a user's session token can extract MFA secrets to generate valid TOTP codes indefinitely. This issue has been patched in versions 8.6.61 and 9.6.0-alpha.55. |
2026-03-24 | |
| CVE-2026-33624 | 2.1 | LOW | CWE-367 | 0.0% p9 | 1.47 | Parse Server is an open source backend that can be deployed to any infrastructur...Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.60 and 9.6.0-alpha.54, an attacker who obtains a user's password and a single MFA recovery code can reuse that recovery code an unlimited number of times by sending concurrent login requests. This defeats the single-use design of recovery codes. The attack requires the user's password, a valid recovery code, and the ability to send concurrent requests within milliseconds. This issue has been patched in versions 8.6.60 and 9.6.0-alpha.54. |
2026-03-24 | |
| CVE-2026-33539 | 8.6 | HIGH | CWE-89 | 0.1% p18 | 6.02 | Parse Server is an open source backend that can be deployed to any infrastructur...Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.59 and 9.6.0-alpha.53, an attacker with master key access can execute arbitrary SQL statements on the PostgreSQL database by injecting SQL metacharacters into field name parameters of the aggregate $group pipeline stage or the distinct operation. This allows privilege escalation from Parse Server application-level administrator to PostgreSQL database-level access. Only Parse Server deployments using PostgreSQL are affected. MongoDB deployments are not affected. This issue has been patched in versions 8.6.59 and 9.6.0-alpha.53. |
2026-03-24 | |
| CVE-2026-33538 | 8.7 | HIGH | CWE-400 | 0.1% p26 | 6.09 | Parse Server is an open source backend that can be deployed to any infrastructur...Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.58 and 9.6.0-alpha.52, an unauthenticated attacker can cause denial of service by sending authentication requests with arbitrary, unconfigured provider names. The server executes a database query for each unconfigured provider before rejecting the request, and since no database index exists for unconfigured providers, each request triggers a full collection scan on the user database. This can be parallelized to saturate database resources. This issue has been patched in versions 8.6.58 and 9.6.0-alpha.52. |
2026-03-24 | |
| CVE-2026-33527 | 5.3 | MEDIUM | CWE-863 | 0.0% p1 | 3.71 | Parse Server is an open source backend that can be deployed to any infrastructur...Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.57 and 9.6.0-alpha.48, an authenticated user can overwrite server-generated session fields such as expiresAt and createdWith when updating their own session via the REST API. This allows bypassing the server's configured session lifetime policy, making a session effectively permanent. This issue has been patched in versions 8.6.57 and 9.6.0-alpha.48. |
2026-03-24 | |
| CVE-2026-33508 | 8.2 | HIGH | CWE-674 | 0.1% p17 | 5.74 | Parse Server is an open source backend that can be deployed to any infrastructur...Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.56 and 9.6.0-alpha.45, Parse Server's LiveQuery component does not enforce the requestComplexity.queryDepth configuration setting when processing WebSocket subscription requests. An attacker can send a subscription with deeply nested logical operators, causing excessive recursion and CPU consumption that degrades or disrupts service availability. This issue has been patched in versions 8.6.56 and 9.6.0-alpha.45. |
2026-03-24 | |
| CVE-2026-33498 | 8.7 | HIGH | CWE-674 | 0.1% p17 | 6.09 | Parse Server is an open source backend that can be deployed to any infrastructur...Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.55 and 9.6.0-alpha.44, an attacker can send an unauthenticated HTTP request with a deeply nested query containing logical operators to permanently hang the Parse Server process. The server becomes completely unresponsive and must be manually restarted. This is a bypass of the fix for CVE-2026-32944. This issue has been patched in versions 8.6.55 and 9.6.0-alpha.44. |
2026-03-24 | |
| CVE-2026-33429 | 6.3 | MEDIUM | CWE-203 | 0.0% p12 | 4.41 | Parse Server is an open source backend that can be deployed to any infrastructur...Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.54 and 9.6.0-alpha.43, an attacker can subscribe to LiveQuery with a watch parameter targeting a protected field. Although the protected field value is properly stripped from event payloads, the presence or absence of update events reveals whether the protected field changed, creating a binary oracle. For boolean protected fields, the timing of change events is equivalent to knowing the field value. This issue has been patched in versions 8.6.54 and 9.6.0-alpha.43. |
2026-03-24 | |
| CVE-2026-33421 | 7.1 | HIGH | CWE-863 | 0.0% p0 | 4.97 | Parse Server is an open source backend that can be deployed to any infrastructur...Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.53 and 9.6.0-alpha.42, Parse Server's LiveQuery WebSocket interface does not enforce Class-Level Permission (CLP) pointer permissions (readUserFields and pointerFields). Any authenticated user can subscribe to LiveQuery events and receive real-time updates for all objects in classes protected by pointer permissions, regardless of whether the pointer fields on those objects point to the subscribing user. This bypasses the intended read access control, allowing unauthorized access to potentially sensitive data that is correctly restricted via the REST API. This issue has been patched in versions 8.6.53 and 9.6.0-alpha.42. |
2026-03-24 | |
| CVE-2026-33417 | 6.5 | MEDIUM | CWE-613 | 0.0% p9 | 4.55 | Wallos is an open-source, self-hostable personal subscription tracker. Prior to ...Wallos is an open-source, self-hostable personal subscription tracker. Prior to version 4.7.2, password reset tokens in Wallos never expire. The password_resets table includes a created_at timestamp column, but the token validation logic never checks it. A password reset token remains valid indefinitely until it is used, allowing an attacker who intercepts a reset link at any point to use it days, weeks, or months later. This issue has been patched in version 4.7.2. |
2026-03-24 | |
| CVE-2026-33409 | 7.0 | HIGH | CWE-287 | 0.1% p16 | 4.90 | Parse Server is an open source backend that can be deployed to any infrastructur...Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.52 and 9.6.0-alpha.41, an authentication bypass vulnerability allows an attacker to log in as any user who has linked a third-party authentication provider, without knowing the user's credentials. The attacker only needs to know the user's provider ID to gain full access to their account, including a valid session token. This affects Parse Server deployments where the server option allowExpiredAuthDataToken is set to true. The default value is false. This issue has been patched in versions 8.6.52 and 9.6.0-alpha.41. |
2026-03-24 | |
| CVE-2026-33323 | 6.3 | MEDIUM | CWE-204 | 0.0% p13 | 4.41 | Parse Server is an open source backend that can be deployed to any infrastructur...Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.51 and 9.6.0-alpha.40, the Pages route and legacy PublicAPI route for resending email verification links return distinguishable responses depending on whether the provided username exists and has an unverified email. This allows an unauthenticated attacker to enumerate valid usernames by observing different redirect targets. The existing emailVerifySuccessOnInvalidEmail configuration option, which is enabled by default and protects the API route against this, did not apply to these routes. This issue has been patched in versions 8.6.51 and 9.6.0-alpha.40. |
2026-03-24 | |
| CVE-2026-30932 | 8.6 | HIGH | CWE-74 | 0.1% p16 | 6.02 | Froxlor is open source server administration software. Prior to version 2.3.5, t...Froxlor is open source server administration software. Prior to version 2.3.5, the DomainZones.add API endpoint (accessible to customers with DNS enabled) does not validate the content field for several DNS record types (LOC, RP, SSHFP, TLSA). An attacker can inject newlines and BIND zone file directives (e.g. $INCLUDE) into the zone file that gets written to disk when the DNS rebuild cron job runs. This issue has been patched in version 2.3.5. |
2026-03-24 | |
| CVE-2026-2417 | 9.3 | CRITICAL | CWE-306 | 0.1% p31 | 6.51 | A Missing Authentication for Critical Function vulnerability in Pharos Controls ...A Missing Authentication for Critical Function vulnerability in Pharos Controls Mosaic Show Controller firmware version 2.15.3 could allow an unauthenticated attacker to bypass authentication and execute arbitrary commands with root privileges. |
2026-03-24 | |
| CVE-2026-29772 | 5.9 | MEDIUM | CWE-770 | 0.0% p4 | 4.13 | Astro is a web framework. Prior to version 10.0.0, Astro's Server Islands POST h...Astro is a web framework. Prior to version 10.0.0, Astro's Server Islands POST handler buffers and parses the full request body as JSON without enforcing a size limit. Because JSON.parse() allocates a V8 heap object for every element in the input, a crafted payload of many small JSON objects achieves ~15x memory amplification (wire bytes to heap bytes), allowing a single unauthenticated request to exhaust the process heap and crash the server. The /_server-islands/[name] route is registered on all Astro SSR apps regardless of whether any component uses server:defer, and the body is parsed before the island name is validated, so any Astro SSR app with the Node standalone adapter is affected. This issue has been patched in version 10.0.0. |
2026-03-24 | |
| CVE-2026-23924 | 6.1 | MEDIUM | CWE-88 | 0.1% p17 | 4.27 | Zabbix Agent 2 Docker plugin does not properly sanitize the 'docker.container_in...Zabbix Agent 2 Docker plugin does not properly sanitize the 'docker.container_info' parameters when forwarding them to the Docker daemon. An attacker capable of invoking Agent 2 can read arbitrary files from running Docker containers by injecting them via the Docker archive API. |
2026-03-24 | |
| CVE-2026-23923 | 6.9 | MEDIUM | CWE-470 | 0.1% p22 | 4.83 | An unauthenticated attacker can exploit the Frontend 'validate' action to blindl...An unauthenticated attacker can exploit the Frontend 'validate' action to blindly instantiate arbitrary PHP classes. The impact depends on environment setup but appears limited at this time. |
2026-03-24 | |
| CVE-2026-23921 | 8.7 | HIGH | CWE-89 | 0.0% p9 | 6.09 | A low privilege Zabbix user with API access can exploit a blind SQL injection vu...A low privilege Zabbix user with API access can exploit a blind SQL injection vulnerability in include/classes/api/CApiService.php to execute arbitrary SQL selects via the sortfield parameter. Although query results are not returned directly, an attacker can exfiltrate arbitrary database data through time-based techniques, potentially leading to session identifier disclosure and administrator account compromise. |
2026-03-24 | |
| CVE-2026-23920 | 7.7 | HIGH | CWE-78 | 0.1% p16 | 5.39 | Host and event action script input is validated with a regex (set by the adminis...Host and event action script input is validated with a regex (set by the administrator), but the validation runs in multiline mode. If ^ and $ anchors are used in user input validation, an injected newline lets authenticated users bypass the check and inject shell commands. |
2026-03-24 | |
| CVE-2026-23919 | 7.1 | HIGH | CWE-488 | 0.0% p6 | 4.97 | For performance reasons Zabbix Server/Proxy reuses JavaScript (Duktape) contexts...For performance reasons Zabbix Server/Proxy reuses JavaScript (Duktape) contexts (used in script items, JavaScript reprocessing, Webhooks). This can lead to confidentiality loss where a regular (non-super) Zabbix administrator leaks data for hosts they do not have access to. A fix has been released that makes the built in Zabbix JavaScript objects read-only, but please be advised that usage of global JavaScript variables is not recommended because their content could be leaked. More information <a href='https://www.zabbix.com/documentation/7.4/en/manual/installation/known_issues#preprocessing-global-variables-are-unsafe'>in Zabbix documentation</a>. |
2026-03-24 | |
| CVE-2026-1995 | 7.8 | HIGH | N/A | 0.0% p0 | 5.46 | IDrive’s id_service.exe process runs with elevated privileges and regularly read...IDrive’s id_service.exe process runs with elevated privileges and regularly reads from several files under the C:\ProgramData\IDrive\ directory. The UTF16-LE encoded contents of these files are used as arguments for starting a process, but they can be edited by any standard user logged into the system. An attacker can overwrite or edit the files to specify a path to an arbitrary executable, which will then be executed by the id_service.exe process with SYSTEM privileges. |
2026-03-24 | |
| CVE-2026-33407 | 8.3 | HIGH | CWE-918 | 0.1% p17 | 5.81 | Wallos is an open-source, self-hostable personal subscription tracker. Prior to ...Wallos is an open-source, self-hostable personal subscription tracker. Prior to version 4.7.0, Wallos endpoints/logos/search.php accepts HTTP_PROXY and HTTPS_PROXY environment variables without validation, enabling SSRF via proxy hijacking. The server performs DNS resolution on user-supplied search terms, which can be controlled by attackers to trigger outbound requests to arbitrary domains. This issue has been patched in version 4.7.0. |
2026-03-24 | |
| CVE-2026-33401 | 7.1 | HIGH | CWE-918 | 0.0% p8 | 4.97 | Wallos is an open-source, self-hostable personal subscription tracker. Prior to ...Wallos is an open-source, self-hostable personal subscription tracker. Prior to version 4.7.0, the patch introduced in commit e8a513591 (CVE-2026-30840) added SSRF protection to notification test endpoints but left three additional attack surfaces unprotected: the AI Ollama host parameter, the AI recommendations endpoint, and the notification cron job. An authenticated user can reach internal network services, cloud metadata endpoints (AWS IMDSv1, GCP, Azure IMDS), or localhost-bound services by supplying a crafted URL to any of these endpoints. This issue has been patched in version 4.7.0. |
2026-03-24 | |
| CVE-2026-33400 | 5.4 | MEDIUM | CWE-79 | 0.0% p15 | 3.78 | Wallos is an open-source, self-hostable personal subscription tracker. Prior to ...Wallos is an open-source, self-hostable personal subscription tracker. Prior to version 4.7.0, a stored cross-site scripting (XSS) vulnerability in the payment method rename endpoint allows any authenticated user to inject arbitrary JavaScript that executes when any user visits the Settings, Subscriptions, or Statistics pages. Combined with the wallos_login authentication cookie lacking the HttpOnly flag, this enables full session hijacking. This issue has been patched in version 4.7.0. |
2026-03-24 | |
| CVE-2026-33399 | 7.7 | HIGH | CWE-918 | 0.0% p9 | 5.39 | Wallos is an open-source, self-hostable personal subscription tracker. Prior to ...Wallos is an open-source, self-hostable personal subscription tracker. Prior to version 4.7.0, the SSRF fix applied in version 4.6.2 for CVE-2026-30839 and CVE-2026-30840 is incomplete. The validate_webhook_url_for_ssrf() protection was added to the test* notification endpoints but not to the corresponding save* endpoints. An authenticated user can save an internal/private IP address as a notification URL, and when the cron job sendnotifications.php executes, the request is sent to the internal IP without any SSRF validation. This issue has been patched in version 4.7.0. |
2026-03-24 | |
| CVE-2026-33162 | 4.9 | MEDIUM | CWE-285 | 0.0% p8 | 3.43 | Craft CMS is a content management system (CMS). From version 5.3.0 to before ver...Craft CMS is a content management system (CMS). From version 5.3.0 to before version 5.9.14, an authenticated control panel user with only accessCp can move entries across sections via POST /actions/entries/move-to-section, even when they do not have saveEntries:{sectionUid} permission for either source or destination section. This issue has been patched in version 5.9.14. |
2026-03-24 | |
| CVE-2026-33161 | 1.3 | LOW | CWE-200 | 0.0% p8 | 0.91 | Craft CMS is a content management system (CMS). From version 4.0.0-RC1 to before...Craft CMS is a content management system (CMS). From version 4.0.0-RC1 to before version 4.17.8 and from version 5.0.0-RC1 to before version 5.9.14, a low-privileged authenticated user can call assets/image-editor with the ID of a private asset they cannot view and still receive editor response data, including focalPoint. The endpoint returns private editing metadata without per-asset authorization validation. This issue has been patched in versions 4.17.8 and 5.9.14. |
2026-03-24 | |
| CVE-2026-33160 | 2.7 | LOW | CWE-639 | 0.0% p12 | 1.89 | Craft CMS is a content management system (CMS). From version 4.0.0-RC1 to before...Craft CMS is a content management system (CMS). From version 4.0.0-RC1 to before version 4.17.8 and from version 5.0.0-RC1 to before version 5.9.14, an unauthenticated user can call assets/generate-transform with a private assetId, receive a valid transform URL, and fetch transformed image bytes. The endpoint is anonymous and does not enforce per-asset authorization before returning the transform URL. This issue has been patched in versions 4.17.8 and 5.9.14. |
2026-03-24 | |
| CVE-2026-33159 | 6.9 | MEDIUM | CWE-306 | 0.1% p24 | 4.83 | Craft CMS is a content management system (CMS). From version 4.0.0-RC1 to before...Craft CMS is a content management system (CMS). From version 4.0.0-RC1 to before version 4.17.8 and from version 5.0.0-RC1 to before version 5.9.14, guest users can access Config Sync updater index, obtain signed data, and execute state-changing Config Sync actions (regenerate-yaml, apply-yaml-changes) without authentication. This issue has been patched in versions 4.17.8 and 5.9.14. |
2026-03-24 | |
| CVE-2026-33158 | 4.9 | MEDIUM | CWE-639 | 0.0% p1 | 3.43 | Craft CMS is a content management system (CMS). From version 4.0.0-RC1 to before...Craft CMS is a content management system (CMS). From version 4.0.0-RC1 to before version 4.17.8 and from version 5.0.0-RC1 to before version 5.9.14, a low-privileged authenticated user can read private asset content by calling assets/edit-image with an arbitrary assetId that they are not authorized to view. The endpoint returns image bytes (or a preview redirect) without enforcing a per-asset view authorization check, leading to potential unauthorized disclosure of private files. This issue has been patched in versions 4.17.8 and 5.9.14. |
2026-03-24 | |
| CVE-2026-33157 | 8.6 | HIGH | CWE-470 | 0.1% p17 | 6.02 | Craft CMS is a content management system (CMS). From version 5.6.0 to before ver...Craft CMS is a content management system (CMS). From version 5.6.0 to before version 5.9.13, a Remote Code Execution (RCE) vulnerability exists in Craft CMS, it can be exploited by any authenticated user with control panel access. This is a bypass of a previous fix. The existing patches add cleanseConfig() to assembleLayoutFromPost() and various FieldsController actions to strip Yii2 behavior/event injection keys ("as" and "on" prefixed keys). However, the fieldLayouts parameter in ElementIndexesController::actionFilterHud() is passed directly to FieldLayout::createFromConfig() without any sanitization, enabling the same behavior injection attack chain. This issue has been patched in version 5.9.13. |
2026-03-24 | |
| CVE-2026-32854 | 6.3 | MEDIUM | CWE-476 | 1.8% p82 | 4.46 | LibVNCServer versions 0.9.15 and prior (fixed in commit dc78dee) contain null po...LibVNCServer versions 0.9.15 and prior (fixed in commit dc78dee) contain null pointer dereference vulnerabilities in the HTTP proxy handlers within httpProcessInput() in httpd.c that allow remote attackers to cause a denial of service by sending specially crafted HTTP requests. Attackers can exploit missing validation of strchr() return values in the CONNECT and GET proxy handling paths to trigger null pointer dereferences and crash the server when httpd and proxy features are enabled. |
2026-03-24 | |
| CVE-2026-32853 | 6.9 | MEDIUM | CWE-125 | 0.0% p12 | 4.83 | LibVNCServer versions 0.9.15 and prior (fixed in commit 009008e) contain a heap ...LibVNCServer versions 0.9.15 and prior (fixed in commit 009008e) contain a heap out-of-bounds read vulnerability in the UltraZip encoding handler that allows a malicious VNC server to cause information disclosure or application crash. Attackers can exploit improper bounds checking in the HandleUltraZipBPP() function by manipulating subrectangle header counts to read beyond the allocated heap buffer. |
2026-03-24 | |
| CVE-2026-26809 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: DO NOT USE THIS CVE RECORD. ConsultIDs: none. Reason: This reco...Rejected reason: DO NOT USE THIS CVE RECORD. ConsultIDs: none. Reason: This record was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none. |
2026-03-24 | |
| CVE-2026-33340 | 9.1 | CRITICAL | CWE-306 | 16.3% p94 | 6.86 | LoLLMs WEBUI provides the Web user interface for Lord of Large Language and Mult...LoLLMs WEBUI provides the Web user interface for Lord of Large Language and Multi modal Systems. A critical Server-Side Request Forgery (SSRF) vulnerability has been identified in all known existing versions of `lollms-webui`. The `@router.post("/api/proxy")` endpoint allows unauthenticated attackers to force the server into making arbitrary GET requests. This can be exploited to access internal services, scan local networks, or exfiltrate sensitive cloud metadata (e.g., AWS/GCP IAM tokens). As of time of publication, no known patched versions are available. |
2026-03-24 | |
| CVE-2026-33700 | 6.9 | MEDIUM | CWE-639 | 0.0% p12 | 4.83 | Vikunja is an open-source self-hosted task management platform. Prior to version...Vikunja is an open-source self-hosted task management platform. Prior to version 2.2.1, the `DELETE /api/v1/projects/:project/shares/:share` endpoint does not verify that the link share belongs to the project specified in the URL. An attacker with admin access to any project can delete link shares from other projects by providing their own project ID combined with the target share ID. Version 2.2.1 patches the issue. |
2026-03-24 | |
| CVE-2026-33680 | 7.5 | HIGH | CWE-285 | 0.0% p10 | 5.25 | Vikunja is an open-source self-hosted task management platform. Prior to version...Vikunja is an open-source self-hosted task management platform. Prior to version 2.2.2, the `LinkSharing.ReadAll()` method allows link share authenticated users to list all link shares for a project, including their secret hashes. While `LinkSharing.CanRead()` correctly blocks link share users from reading individual shares via `ReadOne`, the `ReadAllWeb` handler bypasses this check by never calling `CanRead()`. An attacker with a read-only link share can retrieve hashes for write or admin link shares on the same project and authenticate with them, escalating to full admin access. Version 2.2.2 patches the issue. |
2026-03-24 | |
| CVE-2026-33679 | 6.4 | MEDIUM | CWE-918 | 0.0% p11 | 4.48 | Vikunja is an open-source self-hosted task management platform. Prior to version...Vikunja is an open-source self-hosted task management platform. Prior to version 2.2.1, the `DownloadImage` function in `pkg/utils/avatar.go` uses a bare `http.Client{}` with no SSRF protection when downloading user avatar images from the OpenID Connect `picture` claim URL. An attacker who controls their OIDC profile picture URL can force the Vikunja server to make HTTP GET requests to arbitrary internal or cloud metadata endpoints. This bypasses the SSRF protections that are correctly applied to the webhook system. Version 2.2.1 patches the issue. |
2026-03-24 | |
| CVE-2026-33678 | 8.1 | HIGH | CWE-639 | 0.0% p9 | 5.67 | Vikunja is an open-source self-hosted task management platform. Prior to version...Vikunja is an open-source self-hosted task management platform. Prior to version 2.2.1, `TaskAttachment.ReadOne()` queries attachments by ID only (`WHERE id = ?`), ignoring the task ID from the URL path. The permission check in `CanRead()` validates access to the task specified in the URL, but `ReadOne()` loads a different attachment that may belong to a task in another project. This allows any authenticated user to download or delete any attachment in the system by providing their own accessible task ID with a target attachment ID. Attachment IDs are sequential integers, making enumeration trivial. Version 2.2.1 patches the issue. |
2026-03-24 | |
| CVE-2026-33677 | 6.5 | MEDIUM | CWE-200 | 0.0% p10 | 4.55 | Vikunja is an open-source self-hosted task management platform. Prior to version...Vikunja is an open-source self-hosted task management platform. Prior to version 2.2.1, the `GET /api/v1/projects/:project/webhooks` endpoint returns webhook BasicAuth credentials (`basic_auth_user` and `basic_auth_password`) in plaintext to any user with read access to the project. While the existing code correctly masks the HMAC `secret` field, the BasicAuth fields added in a later migration were not given the same treatment. This allows read-only collaborators to steal credentials intended for authenticating against external webhook receivers. Version 2.2.1 patches the issue. |
2026-03-24 | |
| CVE-2026-33676 | 6.5 | MEDIUM | CWE-863 | 0.0% p8 | 4.55 | Vikunja is an open-source self-hosted task management platform. Prior to version...Vikunja is an open-source self-hosted task management platform. Prior to version 2.2.1, when the Vikunja API returns tasks, it populates the `related_tasks` field with full task objects for all related tasks without checking whether the requesting user has read permission on those tasks' projects. An authenticated user who can read a task that has cross-project relations will receive full details (title, description, due dates, priority, percent completion, project ID, etc.) of tasks in projects they have no access to. Version 2.2.1 patches the issue. |
2026-03-24 | |
| CVE-2026-33675 | 6.4 | MEDIUM | CWE-918 | 0.0% p11 | 4.48 | Vikunja is an open-source self-hosted task management platform. Prior to version...Vikunja is an open-source self-hosted task management platform. Prior to version 2.2.1, the migration helper functions `DownloadFile` and `DownloadFileWithHeaders` in `pkg/modules/migration/helpers.go` make arbitrary HTTP GET requests without any SSRF protection. When a user triggers a Todoist or Trello migration, file attachment URLs from the third-party API response are passed directly to these functions, allowing an attacker to force the Vikunja server to fetch internal network resources and return the response as a downloadable task attachment. Version 2.2.1 patches the issue. |
2026-03-24 | |
| CVE-2026-33668 | 7.1 | HIGH | CWE-285 | 0.2% p41 | 4.98 | Vikunja is an open-source self-hosted task management platform. Starting in vers...Vikunja is an open-source self-hosted task management platform. Starting in version 0.18.0 and prior to version 2.2.1, when a user account is disabled or locked, the status check is only enforced on the local login and JWT token refresh paths. Three other authentication paths — API tokens, CalDAV basic auth, and OpenID Connect — do not verify user status, allowing disabled or locked users to continue accessing the API and syncing data. Version 2.2.1 patches the issue. |
2026-03-24 | |
| CVE-2026-33474 | 6.5 | MEDIUM | CWE-400 | 0.0% p14 | 4.55 | Vikunja is an open-source self-hosted task management platform. Starting in vers...Vikunja is an open-source self-hosted task management platform. Starting in version 1.0.0-rc0 and prior to version 2.2.0, unbounded image decoding and resizing during preview generation lets an attacker exhaust CPU and memory with highly compressed but extremely large-dimension images. Version 2.2.0 patches the issue. |
2026-03-24 | |
| CVE-2026-33473 | 5.7 | MEDIUM | CWE-287 | 0.0% p8 | 3.99 | Vikunja is an open-source self-hosted task management platform. Starting in vers...Vikunja is an open-source self-hosted task management platform. Starting in version 0.13 and prior to version 2.2.1, any user that has enabled 2FA can have their TOTP reused during the standard 30 second validity window. Version 2.2.1 patches the issue. |
2026-03-24 | |
| CVE-2026-33335 | 6.4 | MEDIUM | CWE-939 | 0.0% p11 | 4.48 | Vikunja is an open-source self-hosted task management platform. Starting in vers...Vikunja is an open-source self-hosted task management platform. Starting in version 0.21.0 and prior to version 2.2.0, the Vikunja Desktop Electron wrapper passes URLs from `window.open()` calls directly to `shell.openExternal()` without any validation or protocol allowlisting. An attacker who can place a link with `target="_blank"` (or that otherwise triggers `window.open`) in user-generated content can cause the victim's operating system to open arbitrary URI schemes, invoking local applications, opening local files, or triggering custom protocol handlers. Version 2.2.0 patches the issue. |
2026-03-24 | |
| CVE-2026-33334 | 6.5 | MEDIUM | CWE-94 | 0.1% p34 | 4.55 | Vikunja is an open-source self-hosted task management platform. Starting in vers...Vikunja is an open-source self-hosted task management platform. Starting in version 0.21.0 and prior to version 2.2.0, the Vikunja Desktop Electron wrapper enables `nodeIntegration` in the renderer process without `contextIsolation` or `sandbox`. This means any cross-site scripting (XSS) vulnerability in the Vikunja web frontend -- present or future -- automatically escalates to full remote code execution on the victim's machine, as injected scripts gain access to Node.js APIs. Version 2.2.0 fixes the issue. |
2026-03-24 | |
| CVE-2026-29840 | 5.4 | MEDIUM | CWE-79 | 0.0% p11 | 3.78 | JiZhiCMS v2.5.6 and before contains a Stored Cross-Site Scripting (XSS) vulnerab...JiZhiCMS v2.5.6 and before contains a Stored Cross-Site Scripting (XSS) vulnerability in the release function within app/home/c/UserController.php. The application attempts to sanitize input by filtering <script> tags but fails to recursively remove dangerous event handlers in other HTML tags (such as onerror in <img> tags). This allows an authenticated remote attacker to inject arbitrary web script or HTML via the body parameter in a POST request to /user/release.html. |
2026-03-24 | |
| CVE-2026-29839 | 8.8 | HIGH | CWE-352 | 0.0% p2 | 6.16 | DedeCMS v5.7.118 was discovered to contain a Cross-Site Request Forgery (CSRF) v...DedeCMS v5.7.118 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability in /sys_task_add.php. |
2026-03-24 | |
| CVE-2025-71275 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: This CVE was rejected due to being a duplicate of CVE-2024-4551...Rejected reason: This CVE was rejected due to being a duplicate of CVE-2024-45519. |
2026-03-24 | |
| CVE-2026-4775 | 7.8 | HIGH | CWE-190 | 0.1% p23 | 5.46 | A flaw was found in the libtiff library. A remote attacker could exploit a signe...A flaw was found in the libtiff library. A remote attacker could exploit a signed integer overflow vulnerability in the putcontig8bitYCbCr44tile function by providing a specially crafted TIFF file. This flaw can lead to an out-of-bounds heap write due to incorrect memory pointer calculations, potentially causing a denial of service (application crash) or arbitrary code execution. |
2026-03-24 | |
| CVE-2026-33554 | 7.5 | HIGH | CWE-121 | 0.1% p17 | 5.25 | ipmi-oem in FreeIPMI before 1.16.17 has exploitable buffer overflows on response...ipmi-oem in FreeIPMI before 1.16.17 has exploitable buffer overflows on response messages. The Intelligent Platform Management Interface (IPMI) specification defines a set of interfaces for platform management. It is implemented by a large number of hardware manufacturers to support system management. It is most commonly used for sensor reading (e.g., CPU temperatures through the ipmi-sensors command within FreeIPMI) and remote power control (the ipmipower command). The ipmi-oem client command implements a set of a IPMI OEM commands for specific hardware vendors. If a user has supported hardware, they may wish to use the ipmi-oem command to send a request to a server to retrieve specific information. Three subcommands were found to have exploitable buffer overflows on response messages. They are: "ipmi-oem dell get-last-post-code - get the last POST code and string describing the error on some Dell servers," "ipmi-oem supermicro extra-firmware-info - get extra firmware info on Supermicro servers," and "ipmi-oem wistron read-proprietary-string - read a proprietary string on Wistron servers." |
2026-03-24 | |
| CVE-2026-33316 | 8.1 | HIGH | CWE-284 | 0.0% p9 | 5.67 | Vikunja is an open-source self-hosted task management platform. Prior to version...Vikunja is an open-source self-hosted task management platform. Prior to version 2.2.0, a flaw in Vikunja’s password reset logic allows disabled users to regain access to their accounts. The `ResetPassword()` function sets the user’s status to `StatusActive` after a successful password reset without verifying whether the account was previously disabled. By requesting a reset token through `/api/v1/user/password/token` and completing the reset via `/api/v1/user/password/reset`, a disabled user can reactivate their account and bypass administrator-imposed account disablement. Version 2.2.0 patches the issue. |
2026-03-24 | |
| CVE-2026-33315 | 6.9 | MEDIUM | CWE-288 | 0.1% p24 | 4.83 | Vikunja is an open-source self-hosted task management platform. Prior to version...Vikunja is an open-source self-hosted task management platform. Prior to version 2.2.0, the Caldav endpoint allows login using Basic Authentication, which in turn allows users to bypass the TOTP on 2FA-enabled accounts. The user can then access standard project information that would normally be protected behind 2FA (if enabled), such as project name, description, etc. Version 2.2.0 patches the issue. |
2026-03-24 | |
| CVE-2026-33313 | 5.3 | MEDIUM | CWE-639 | 0.0% p8 | 3.71 | Vikunja is an open-source self-hosted task management platform. Prior to version...Vikunja is an open-source self-hosted task management platform. Prior to version 2.2.0, an authenticated user can read any task comment by ID, regardless of whether they have access to the task the comment belongs to, by substituting the task ID in the API URL with a task they do have access to. Version 2.2.0 fixes the issue. |
2026-03-24 | |
| CVE-2026-30662 | 6.5 | MEDIUM | CWE-400 | 0.0% p13 | 4.55 | ConcreteCMS v9.4.7 contains a Denial of Service (DoS) vulnerability in the File ...ConcreteCMS v9.4.7 contains a Denial of Service (DoS) vulnerability in the File Manager component. The 'download' method in 'concrete/controllers/backend/file.php' improperly manages memory when creating zip archives. It uses 'ZipArchive::addFromString' combined with 'file_get_contents', which loads the entire content of every selected file into PHP memory. An authenticated attacker can exploit this by requesting a bulk download of large files, triggering an Out-Of-Memory (OOM) condition that causes the PHP-FPM process to terminate (SIGSEGV) and the web server to return a 500 error. |
2026-03-24 | |
| CVE-2026-30661 | 6.1 | MEDIUM | CWE-79 | 0.0% p11 | 4.27 | iCMS v8.0.0 contains a Cross-Site Scripting (XSS) vulnerability in the User Mana...iCMS v8.0.0 contains a Cross-Site Scripting (XSS) vulnerability in the User Management component, specifically within the index.html file. This allows remote attackers to execute arbitrary web script or HTML via the regip or loginip parameters. |
2026-03-24 | |
| CVE-2026-30655 | 6.5 | MEDIUM | CWE-89 | 0.0% p6 | 4.55 | SQL injection in Solicitante::resetaSenha() in esiclivre/esiclivre v0.2.2 and ea...SQL injection in Solicitante::resetaSenha() in esiclivre/esiclivre v0.2.2 and earlier allows unauthenticated remote attackers to gain unauthorized access to sensitive information via the cpfcnpj parameter in /reset/index.php |
2026-03-24 | |
| CVE-2026-30653 | 7.5 | HIGH | NVD-CWE-noinfo | 0.2% p44 | 5.26 | An issue in Free5GC v.4.2.0 and before allows a remote attacker to cause a denia...An issue in Free5GC v.4.2.0 and before allows a remote attacker to cause a denial of service via the function HandleAuthenticationFailure of the component AMF |
2026-03-24 | |
| CVE-2026-28753 | 6.3 | MEDIUM | CWE-93 | 0.0% p6 | 4.41 | NGINX Plus and NGINX Open Source have a vulnerability in the ngx_mail_smtp_modul...NGINX Plus and NGINX Open Source have a vulnerability in the ngx_mail_smtp_module module due to the improper handling of CRLF sequences in DNS responses. This allows an attacker-controlled DNS server to inject arbitrary headers into SMTP upstream requests, leading to potential request manipulation. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. |
2026-03-24 | |
| CVE-2026-27654 | 8.8 | HIGH | CWE-122 | 0.0% p9 | 6.16 | NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_dav_module...NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_dav_module module that might allow an attacker to trigger a buffer overflow to the NGINX worker process; this vulnerability may result in termination of the NGINX worker process or modification of source or destination file names outside the document root. This issue affects NGINX Open Source and NGINX Plus when the configuration file uses DAV module MOVE or COPY methods, prefix location (nonregular expression location configuration), and alias directives. The integrity impact is constrained because the NGINX worker process user has low privileges and does not have access to the entire system. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. |
2026-03-24 | |
| CVE-2026-27651 | 8.7 | HIGH | CWE-476 | 0.0% p12 | 6.09 | When the ngx_mail_auth_http_module module is enabled on NGINX Plus or NGINX Open...When the ngx_mail_auth_http_module module is enabled on NGINX Plus or NGINX Open Source, undisclosed requests can cause worker processes to terminate. This issue may occur when (1) CRAM-MD5 or APOP authentication is enabled, and (2) the authentication server permits retry by returning the Auth-Wait response header. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. |
2026-03-24 | |
| CVE-2026-33497 | 8.7 | HIGH | CWE-22 | 0.0% p4 | 6.09 | Langflow is a tool for building and deploying AI-powered agents and workflows. P...Langflow is a tool for building and deploying AI-powered agents and workflows. Prior to version 1.7.1, in the download_profile_picture function of the /profile_pictures/{folder_name}/{file_name} endpoint, the folder_name and file_name parameters are not strictly filtered, which allows the secret_key to be read across directories. Version 1.7.1 contains a patch. |
2026-03-24 | |
| CVE-2026-33484 | 7.5 | HIGH | CWE-284 | 0.0% p5 | 5.25 | Langflow is a tool for building and deploying AI-powered agents and workflows. I...Langflow is a tool for building and deploying AI-powered agents and workflows. In versions 1.0.0 through 1.8.1, the `/api/v1/files/images/{flow_id}/{file_name}` endpoint serves image files without any authentication or ownership check. Any unauthenticated request with a known flow_id and file_name returns the image with HTTP 200. In a multi-tenant deployment, any attacker who can discover or guess a `flow_id` (UUIDs can be leaked through other API responses) can download any user's uploaded images without credentials. Version 1.9.0 contains a patch. |
2026-03-24 | |
| CVE-2026-33418 | 7.5 | HIGH | CWE-185 | 0.1% p18 | 5.25 | DiceBear is an avatar library for designers and developers. Prior to version 9.4...DiceBear is an avatar library for designers and developers. Prior to version 9.4.2, the `ensureSize()` function in `@dicebear/converter` used a regex-based approach to rewrite SVG `width`/`height` attributes, capping them at 2048px to prevent denial of service. This size capping could be bypassed by crafting SVG input that causes the regex to match a non-functional occurrence of `<svg` before the actual SVG root element. When the SVG is subsequently rendered via `@resvg/resvg-js` on the Node.js code path, it renders at the attacker-specified dimensions, potentially causing out-of-memory crashes. In version 9.4.2, the regex-based approach has been replaced with XML-aware processing using `fast-xml-parser` to correctly identify and modify the SVG root element's attributes. Additionally, a `fitTo` constraint has been added to the `renderAsync` call as defense-in-depth, ensuring the rendered output is always bounded regardless of SVG content. |
2026-03-24 | |
| CVE-2026-33311 | 4.7 | MEDIUM | CWE-79 | 0.0% p9 | 3.29 | DiceBear is an avatar library for designers and developers. Starting in version ...DiceBear is an avatar library for designers and developers. Starting in version 5.0.0 and prior to versions 5.4.4, 6.1.4, 7.1.4, 8.0.3, and 9.4.1, SVG attribute values derived from user-supplied options (`backgroundColor`, `fontFamily`, `textColor`) were not XML-escaped before interpolation into SVG output. This could allow Cross-Site Scripting (XSS) when applications pass untrusted input to `createAvatar()` and serve the resulting SVG inline or with `Content-Type: image/svg+xml`. Starting in versions 5.4.4, 6.1.4, 7.1.4, 8.0.3, and 9.4.1, all affected SVG attribute values are properly escaped using XML entity encoding. Users should upgrade to the listed patched versions. Some mitigating factors limit vulnerability. Applications that validate input against the library's JSON Schema before passing it to `createAvatar()` are not affected. The DiceBear CLI validates input via AJV and was not vulnerable. Exploitation requires that an application passes untrusted, unvalidated external input directly as option values. |
2026-03-24 | |
| CVE-2026-33310 | 8.8 | HIGH | CWE-78 | 0.1% p17 | 6.16 | Intake is a package for finding, investigating, loading and disseminating data. ...Intake is a package for finding, investigating, loading and disseminating data. Prior to version 2.0.9, the shell() syntax within parameter default values appears to be automatically expanded during the catalog parsing process. If a catalog contains a parameter default such as shell(<command>), the command may be executed when the catalog source is accessed. This means that if a user loads a malicious catalog YAML, embedded commands could execute on the host system. Version 2.0.9 mitigates the issue by making getshell False by default everywhere. |
2026-03-24 | |
| CVE-2026-4729 | 9.8 | CRITICAL | CWE-120 | 0.0% p5 | 6.86 | Memory safety bugs present in Firefox 148 and Thunderbird 148. Some of these bug...Memory safety bugs present in Firefox 148 and Thunderbird 148. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability was fixed in Firefox 149 and Thunderbird 149. |
2026-03-24 | |
| CVE-2026-4728 | 6.5 | MEDIUM | CWE-290 | 0.0% p1 | 4.55 | Spoofing issue in the Privacy: Anti-Tracking component. This vulnerability was f...Spoofing issue in the Privacy: Anti-Tracking component. This vulnerability was fixed in Firefox 149 and Thunderbird 149. |
2026-03-24 | |
| CVE-2026-4727 | 7.5 | HIGH | CWE-400 | 0.0% p3 | 5.25 | Denial-of-service in the Libraries component in NSS. This vulnerability was fixe...Denial-of-service in the Libraries component in NSS. This vulnerability was fixed in Firefox 149 and Thunderbird 149. |
2026-03-24 | |
| CVE-2026-4726 | 7.5 | HIGH | CWE-400 | 0.0% p3 | 5.25 | Denial-of-service in the XML component. This vulnerability was fixed in Firefox ...Denial-of-service in the XML component. This vulnerability was fixed in Firefox 149 and Thunderbird 149. |
2026-03-24 | |
| CVE-2026-4725 | 10.0 | CRITICAL | CWE-416 | 0.0% p1 | 7.00 | Sandbox escape due to use-after-free in the Graphics: Canvas2D component. This v...Sandbox escape due to use-after-free in the Graphics: Canvas2D component. This vulnerability was fixed in Firefox 149 and Thunderbird 149. |
2026-03-24 | |
| CVE-2026-4724 | 9.1 | CRITICAL | CWE-758 | 0.0% p2 | 6.37 | Undefined behavior in the Audio/Video component. This vulnerability was fixed in...Undefined behavior in the Audio/Video component. This vulnerability was fixed in Firefox 149 and Thunderbird 149. |
2026-03-24 | |
| CVE-2026-4723 | 9.8 | CRITICAL | CWE-416 | 0.0% p5 | 6.86 | Use-after-free in the JavaScript Engine component. This vulnerability was fixed ...Use-after-free in the JavaScript Engine component. This vulnerability was fixed in Firefox 149 and Thunderbird 149. |
2026-03-24 | |
| CVE-2026-4722 | 8.8 | HIGH | NVD-CWE-noinfo | 0.0% p3 | 6.16 | Privilege escalation in the IPC component. This vulnerability was fixed in Firef...Privilege escalation in the IPC component. This vulnerability was fixed in Firefox 149 and Thunderbird 149. |
2026-03-24 | |
| CVE-2026-4721 | 9.8 | CRITICAL | CWE-120 | 0.0% p6 | 6.86 | Memory safety bugs present in Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird...Memory safety bugs present in Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird ESR 140.8, Firefox 148 and Thunderbird 148. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability was fixed in Firefox 149, Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9. |
2026-03-24 | |
| CVE-2026-4720 | 9.8 | CRITICAL | CWE-120 | 0.0% p6 | 6.86 | Memory safety bugs present in Firefox ESR 140.8, Thunderbird ESR 140.8, Firefox ...Memory safety bugs present in Firefox ESR 140.8, Thunderbird ESR 140.8, Firefox 148 and Thunderbird 148. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability was fixed in Firefox 149, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9. |
2026-03-24 | |
| CVE-2026-4719 | 7.5 | HIGH | CWE-754 | 0.0% p5 | 5.25 | Incorrect boundary conditions in the Graphics: Text component. This vulnerabilit...Incorrect boundary conditions in the Graphics: Text component. This vulnerability was fixed in Firefox 149, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9. |
2026-03-24 | |
| CVE-2026-4718 | 8.1 | HIGH | CWE-758 | 0.0% p1 | 5.67 | Undefined behavior in the WebRTC: Signaling component. This vulnerability was fi...Undefined behavior in the WebRTC: Signaling component. This vulnerability was fixed in Firefox 149, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9. |
2026-03-24 | |
| CVE-2026-4717 | 9.8 | CRITICAL | NVD-CWE-noinfo | 0.0% p6 | 6.86 | Privilege escalation in the Netmonitor component. This vulnerability was fixed i...Privilege escalation in the Netmonitor component. This vulnerability was fixed in Firefox 149, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9. |
2026-03-24 | |
| CVE-2026-4716 | 9.1 | CRITICAL | CWE-908 | 0.0% p6 | 6.37 | Incorrect boundary conditions, uninitialized memory in the JavaScript Engine com...Incorrect boundary conditions, uninitialized memory in the JavaScript Engine component. This vulnerability was fixed in Firefox 149, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9. |
2026-03-24 | |
| CVE-2026-4715 | 9.1 | CRITICAL | CWE-908 | 0.0% p6 | 6.37 | Uninitialized memory in the Graphics: Canvas2D component. This vulnerability was...Uninitialized memory in the Graphics: Canvas2D component. This vulnerability was fixed in Firefox 149, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9. |
2026-03-24 | |
| CVE-2026-4714 | 7.5 | HIGH | CWE-754 | 0.0% p5 | 5.25 | Incorrect boundary conditions in the Audio/Video component. This vulnerability w...Incorrect boundary conditions in the Audio/Video component. This vulnerability was fixed in Firefox 149, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9. |
2026-03-24 | |
| CVE-2026-4713 | 7.5 | HIGH | CWE-754 | 0.0% p5 | 5.25 | Incorrect boundary conditions in the Graphics component. This vulnerability was ...Incorrect boundary conditions in the Graphics component. This vulnerability was fixed in Firefox 149, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9. |
2026-03-24 | |
| CVE-2026-4712 | 7.5 | HIGH | NVD-CWE-noinfo | 0.0% p3 | 5.25 | Information disclosure in the Widget: Cocoa component. This vulnerability was fi...Information disclosure in the Widget: Cocoa component. This vulnerability was fixed in Firefox 149, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9. |
2026-03-24 | |
| CVE-2026-4711 | 9.8 | CRITICAL | CWE-416 | 0.0% p6 | 6.86 | Use-after-free in the Widget: Cocoa component. This vulnerability was fixed in F...Use-after-free in the Widget: Cocoa component. This vulnerability was fixed in Firefox 149, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9. |
2026-03-24 | |
| CVE-2026-4710 | 9.8 | CRITICAL | NVD-CWE-noinfo | 0.0% p6 | 6.86 | Incorrect boundary conditions in the Audio/Video component. This vulnerability w...Incorrect boundary conditions in the Audio/Video component. This vulnerability was fixed in Firefox 149, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9. |
2026-03-24 | |
| CVE-2026-4709 | 7.5 | HIGH | CWE-754 | 0.0% p6 | 5.25 | Incorrect boundary conditions in the Audio/Video: GMP component. This vulnerabil...Incorrect boundary conditions in the Audio/Video: GMP component. This vulnerability was fixed in Firefox 149, Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9. |
2026-03-24 | |
| CVE-2026-4708 | 7.5 | HIGH | CWE-754 | 0.0% p5 | 5.25 | Incorrect boundary conditions in the Graphics component. This vulnerability was ...Incorrect boundary conditions in the Graphics component. This vulnerability was fixed in Firefox 149, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9. |
2026-03-24 | |
| CVE-2026-4707 | 7.5 | HIGH | CWE-754 | 0.0% p6 | 5.25 | Incorrect boundary conditions in the Graphics: Canvas2D component. This vulnerab...Incorrect boundary conditions in the Graphics: Canvas2D component. This vulnerability was fixed in Firefox 149, Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9. |
2026-03-24 | |
| CVE-2026-4706 | 7.5 | HIGH | CWE-754 | 0.0% p6 | 5.25 | Incorrect boundary conditions in the Graphics: Canvas2D component. This vulnerab...Incorrect boundary conditions in the Graphics: Canvas2D component. This vulnerability was fixed in Firefox 149, Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9. |
2026-03-24 | |
| CVE-2026-4705 | 9.8 | CRITICAL | NVD-CWE-noinfo | 0.0% p5 | 6.86 | Undefined behavior in the WebRTC: Signaling component. This vulnerability was fi...Undefined behavior in the WebRTC: Signaling component. This vulnerability was fixed in Firefox 149, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9. |
2026-03-24 | |
| CVE-2026-4704 | 7.5 | HIGH | NVD-CWE-noinfo | 0.0% p5 | 5.25 | Denial-of-service in the WebRTC: Signaling component. This vulnerability was fix...Denial-of-service in the WebRTC: Signaling component. This vulnerability was fixed in Firefox 149, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9. |
2026-03-24 | |
| CVE-2026-4702 | 9.8 | CRITICAL | CWE-843 | 0.0% p6 | 6.86 | JIT miscompilation in the JavaScript Engine component. This vulnerability was fi...JIT miscompilation in the JavaScript Engine component. This vulnerability was fixed in Firefox 149, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9. |
2026-03-24 | |
| CVE-2026-4701 | 9.8 | CRITICAL | CWE-416 | 0.0% p6 | 6.86 | Use-after-free in the JavaScript Engine component. This vulnerability was fixed ...Use-after-free in the JavaScript Engine component. This vulnerability was fixed in Firefox 149, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9. |
2026-03-24 | |
| CVE-2026-4700 | 9.8 | CRITICAL | NVD-CWE-noinfo | 0.0% p5 | 6.86 | Mitigation bypass in the Networking: HTTP component. This vulnerability was fixe...Mitigation bypass in the Networking: HTTP component. This vulnerability was fixed in Firefox 149, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9. |
2026-03-24 | |
| CVE-2026-4699 | 7.5 | HIGH | CWE-754 | 0.0% p6 | 5.25 | Incorrect boundary conditions in the Layout: Text and Fonts component. This vuln...Incorrect boundary conditions in the Layout: Text and Fonts component. This vulnerability was fixed in Firefox 149, Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9. |
2026-03-24 | |
| CVE-2026-4698 | 9.8 | CRITICAL | CWE-843 | 0.0% p7 | 6.86 | JIT miscompilation in the JavaScript Engine: JIT component. This vulnerability w...JIT miscompilation in the JavaScript Engine: JIT component. This vulnerability was fixed in Firefox 149, Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9. |
2026-03-24 | |
| CVE-2026-4697 | 7.5 | HIGH | CWE-754 | 0.0% p5 | 5.25 | Incorrect boundary conditions in the Audio/Video: Web Codecs component. This vul...Incorrect boundary conditions in the Audio/Video: Web Codecs component. This vulnerability was fixed in Firefox 149, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9. |
2026-03-24 | |
| CVE-2026-4696 | 9.8 | CRITICAL | CWE-416 | 0.0% p7 | 6.86 | Use-after-free in the Layout: Text and Fonts component. This vulnerability was f...Use-after-free in the Layout: Text and Fonts component. This vulnerability was fixed in Firefox 149, Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9. |
2026-03-24 | |
| CVE-2026-4695 | 7.5 | HIGH | CWE-754 | 0.0% p5 | 5.25 | Incorrect boundary conditions in the Audio/Video: Web Codecs component. This vul...Incorrect boundary conditions in the Audio/Video: Web Codecs component. This vulnerability was fixed in Firefox 149, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9. |
2026-03-24 | |
| CVE-2026-4694 | 7.5 | HIGH | CWE-190 | 0.0% p5 | 5.25 | Incorrect boundary conditions, integer overflow in the Graphics component. This ...Incorrect boundary conditions, integer overflow in the Graphics component. This vulnerability was fixed in Firefox 149, Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9. |
2026-03-24 | |
| CVE-2026-4693 | 7.5 | HIGH | CWE-754 | 0.0% p6 | 5.25 | Incorrect boundary conditions in the Audio/Video: Playback component. This vulne...Incorrect boundary conditions in the Audio/Video: Playback component. This vulnerability was fixed in Firefox 149, Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9. |
2026-03-24 | |
| CVE-2026-4692 | 10.0 | CRITICAL | NVD-CWE-noinfo | 0.0% p6 | 7.00 | Sandbox escape in the Responsive Design Mode component. This vulnerability was f...Sandbox escape in the Responsive Design Mode component. This vulnerability was fixed in Firefox 149, Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9. |
2026-03-24 | |
| CVE-2026-4691 | 9.8 | CRITICAL | CWE-416 | 0.0% p10 | 6.86 | Use-after-free in the CSS Parsing and Computation component. This vulnerability ...Use-after-free in the CSS Parsing and Computation component. This vulnerability was fixed in Firefox 149, Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9. |
2026-03-24 | |
| CVE-2026-4690 | 8.6 | HIGH | CWE-190 | 0.0% p5 | 6.02 | Sandbox escape due to incorrect boundary conditions, integer overflow in the XPC...Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM component. This vulnerability was fixed in Firefox 149, Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9. |
2026-03-24 | |
| CVE-2026-4689 | 10.0 | CRITICAL | CWE-190 | 0.0% p7 | 7.00 | Sandbox escape due to incorrect boundary conditions, integer overflow in the XPC...Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM component. This vulnerability was fixed in Firefox 149, Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9. |
2026-03-24 | |
| CVE-2026-4688 | 10.0 | CRITICAL | CWE-416 | 0.0% p5 | 7.00 | Sandbox escape due to use-after-free in the Disability Access APIs component. Th...Sandbox escape due to use-after-free in the Disability Access APIs component. This vulnerability was fixed in Firefox 149, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9. |
2026-03-24 | |
| CVE-2026-4687 | 8.6 | HIGH | CWE-754 | 0.0% p6 | 6.02 | Sandbox escape due to incorrect boundary conditions in the Telemetry component. ...Sandbox escape due to incorrect boundary conditions in the Telemetry component. This vulnerability was fixed in Firefox 149, Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9. |
2026-03-24 | |
| CVE-2026-4686 | 7.5 | HIGH | CWE-754 | 0.0% p6 | 5.25 | Incorrect boundary conditions in the Graphics: Canvas2D component. This vulnerab...Incorrect boundary conditions in the Graphics: Canvas2D component. This vulnerability was fixed in Firefox 149, Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9. |
2026-03-24 | |
| CVE-2026-4685 | 7.5 | HIGH | CWE-754 | 0.0% p6 | 5.25 | Incorrect boundary conditions in the Graphics: Canvas2D component. This vulnerab...Incorrect boundary conditions in the Graphics: Canvas2D component. This vulnerability was fixed in Firefox 149, Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9. |
2026-03-24 | |
| CVE-2026-4684 | 7.5 | HIGH | CWE-362 | 0.0% p2 | 5.25 | Race condition, use-after-free in the Graphics: WebRender component. This vulner...Race condition, use-after-free in the Graphics: WebRender component. This vulnerability was fixed in Firefox 149, Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9. |
2026-03-24 | |
| CVE-2026-33309 | 9.9 | CRITICAL | CWE-22 | 0.1% p22 | 6.93 | Langflow is a tool for building and deploying AI-powered agents and workflows. V...Langflow is a tool for building and deploying AI-powered agents and workflows. Versions 1.2.0 through 1.8.1 have a bypass of the patch for CVE-2025-68478 (External Control of File Name), leading to the root architectural issue within `LocalStorageService` remaining unresolved. Because the underlying storage layer lacks boundary containment checks, the system relies entirely on the HTTP-layer `ValidatedFileName` dependency. This defense-in-depth failure leaves the `POST /api/v2/files/` endpoint vulnerable to Arbitrary File Write. The multipart upload filename bypasses the path-parameter guard, allowing authenticated attackers to write files anywhere on the host system, leading to Remote Code Execution (RCE). Version 1.9.0 contains an updated fix. |
2026-03-24 | |
| CVE-2025-64998 | 7.3 | HIGH | CWE-522 | 0.0% p14 | 5.11 | Exposure of session signing secret in Checkmk <2.4.0p23, <2.3.0p45 and 2.2.0 all...Exposure of session signing secret in Checkmk <2.4.0p23, <2.3.0p45 and 2.2.0 allows an administrator of a remote site with config sync enabled to hijack sessions on the central site by forging session cookies. |
2026-03-24 | |
| CVE-2019-25647 | 8.7 | HIGH | CWE-434 | 0.3% p48 | 6.10 | PhreeBooks ERP 5.2.3 contains a remote code execution vulnerability in the image...PhreeBooks ERP 5.2.3 contains a remote code execution vulnerability in the image manager that allows authenticated attackers to upload and execute arbitrary PHP files by bypassing file extension controls. Attackers can upload malicious PHP files through the image manager endpoint and execute them to establish reverse shell connections and execute system commands. |
2026-03-24 | |
| CVE-2019-25646 | 9.3 | CRITICAL | CWE-787 | 0.5% p64 | 6.52 | Tabs Mail Carrier 2.5.1 contains a buffer overflow vulnerability in the MAIL FRO...Tabs Mail Carrier 2.5.1 contains a buffer overflow vulnerability in the MAIL FROM SMTP command that allows remote attackers to execute arbitrary code by sending a crafted MAIL FROM parameter. Attackers can connect to the SMTP service on port 25 and send a malicious MAIL FROM command with an oversized buffer to overwrite the EIP register and execute a bind shell payload. |
2026-03-24 | |
| CVE-2019-25645 | 6.9 | MEDIUM | CWE-226 | 0.0% p3 | 4.83 | WinAVI iPod/3GP/MP4/PSP Converter 4.4.2 contains a denial of service vulnerabili...WinAVI iPod/3GP/MP4/PSP Converter 4.4.2 contains a denial of service vulnerability that allows local attackers to crash the application by processing malformed AVI files. Attackers can create a specially crafted AVI file with an oversized buffer and load it through the Convert to iPhone function to trigger an application crash. |
2026-03-24 | |
| CVE-2019-25644 | 6.9 | MEDIUM | CWE-787 | 0.0% p3 | 4.83 | WinMPG Video Convert 9.3.5 and older versions contain a buffer overflow vulnerab...WinMPG Video Convert 9.3.5 and older versions contain a buffer overflow vulnerability in the registration dialog that allows local attackers to crash the application by supplying oversized input. Attackers can paste a large payload of 6000 bytes into the Name and Registration Code field to trigger a denial of service condition. |
2026-03-24 | |
| CVE-2019-25643 | 8.8 | HIGH | CWE-89 | 0.1% p25 | 6.16 | eNdonesia Portal v8.7 contains multiple SQL injection vulnerabilities that allow...eNdonesia Portal v8.7 contains multiple SQL injection vulnerabilities that allow unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code through the bid parameter. Attackers can send GET requests to banners.php with crafted SQL payloads in the bid parameter to extract sensitive database information from the INFORMATION_SCHEMA tables. |
2026-03-24 | |
| CVE-2019-25642 | 8.8 | HIGH | CWE-89 | 0.1% p23 | 6.16 | Bootstrapy CMS contains multiple SQL injection vulnerabilities that allow unauth...Bootstrapy CMS contains multiple SQL injection vulnerabilities that allow unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code through POST parameters. Attackers can inject SQL payloads into the thread_id parameter of forum-thread.php, the subject parameter of contact-submit.php, the post-id parameter of post-new-submit.php, and the thread-id parameter to extract sensitive database information or cause denial of service. |
2026-03-24 | |
| CVE-2019-25641 | 8.8 | HIGH | CWE-89 | 0.1% p24 | 6.16 | Netartmedia Vlog System contains an SQL injection vulnerability that allows unau...Netartmedia Vlog System contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the email parameter. Attackers can send POST requests to index.php with malicious email values in the forgotten_password module to extract sensitive database information. |
2026-03-24 | |
| CVE-2019-25640 | 8.8 | HIGH | CWE-89 | 0.1% p23 | 6.16 | Inout Article Base CMS contains SQL injection vulnerabilities that allow unauthe...Inout Article Base CMS contains SQL injection vulnerabilities that allow unauthenticated attackers to manipulate database queries through the 'p' and 'u' parameters. Attackers can inject SQL code using XOR-based payloads in GET requests to portalLogin.php to extract sensitive database information or cause denial of service through time-based attacks. |
2026-03-24 | |
| CVE-2019-25639 | 8.8 | HIGH | CWE-89 | 0.1% p25 | 6.16 | Matrimony Website Script M-Plus contains multiple SQL injection vulnerabilities ...Matrimony Website Script M-Plus contains multiple SQL injection vulnerabilities that allow unauthenticated attackers to manipulate database queries by injecting SQL code through various POST parameters. Attackers can inject malicious SQL payloads into parameters like txtGender, religion, Fage, and cboCountry across simplesearch_results.php, advsearch_results.php, specialcase_results.php, locational_results.php, and registration2.php to extract sensitive database information or execute arbitrary SQL commands. |
2026-03-24 | |
| CVE-2019-25638 | 7.1 | HIGH | CWE-89 | 0.1% p20 | 4.97 | Meeplace Business Review Script contains an SQL injection vulnerability that all...Meeplace Business Review Script contains an SQL injection vulnerability that allows unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code through the 'id' parameter. Attackers can send GET requests to the addclick.php endpoint with crafted SQL payloads in the 'id' parameter to extract sensitive database information or cause denial of service. |
2026-03-24 | |
| CVE-2019-25637 | 8.6 | HIGH | CWE-787 | 0.0% p4 | 6.02 | X-NetStat Pro 5.63 contains a local buffer overflow vulnerability that allows lo...X-NetStat Pro 5.63 contains a local buffer overflow vulnerability that allows local attackers to execute arbitrary code by overwriting the EIP register through a 264-byte buffer overflow. Attackers can inject shellcode into memory and use an egg hunter technique to locate and execute the payload when the application processes malicious input through HTTP Client or Rules functionality. |
2026-03-24 | |
| CVE-2019-25636 | 8.8 | HIGH | CWE-89 | 0.1% p24 | 6.16 | Zeeways Jobsite CMS contains an SQL injection vulnerability that allows unauthen...Zeeways Jobsite CMS contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the 'id' GET parameter. Attackers can send crafted requests to news_details.php, jobs_details.php, or job_cmp_details.php with malicious 'id' values using GROUP BY and CASE statements to extract sensitive database information. |
2026-03-24 | |
| CVE-2019-25635 | 8.8 | HIGH | CWE-89 | 0.1% p24 | 6.16 | Zeeways Matrimony CMS contains multiple SQL injection vulnerabilities that allow...Zeeways Matrimony CMS contains multiple SQL injection vulnerabilities that allow unauthenticated attackers to manipulate database queries through the profile_list endpoint. Attackers can inject SQL code via the up_cast, s_mother, and s_religion parameters to extract sensitive database information using time-based or error-based techniques. |
2026-03-24 | |
| CVE-2019-25634 | 8.6 | HIGH | CWE-787 | 0.0% p4 | 6.02 | Base64 Decoder 1.1.2 contains a stack-based buffer overflow vulnerability that a...Base64 Decoder 1.1.2 contains a stack-based buffer overflow vulnerability that allows local attackers to execute arbitrary code by triggering a structured exception handler (SEH) overwrite. Attackers can craft a malicious input file that overflows a buffer, overwrites the SEH chain with a POP-POP-RET gadget address, and uses an egghunter payload to locate and execute shellcode for code execution. |
2026-03-24 | |
| CVE-2019-25633 | 8.6 | HIGH | CWE-787 | 0.0% p2 | 6.02 | AIDA64 Extreme 5.99.4900 contains a structured exception handling buffer overflo...AIDA64 Extreme 5.99.4900 contains a structured exception handling buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying malicious input through the email preferences and report wizard interfaces. Attackers can inject crafted payloads into the Display name field and Load from file parameter to trigger the overflow and execute shellcode with application privileges. |
2026-03-24 | |
| CVE-2019-25632 | 6.9 | MEDIUM | CWE-306 | 0.0% p8 | 4.83 | phpFileManager 1.7.8 contains a local file inclusion vulnerability that allows u...phpFileManager 1.7.8 contains a local file inclusion vulnerability that allows unauthenticated attackers to read arbitrary files by manipulating the action, fm_current_dir, and filename parameters. Attackers can send GET requests to index.php with crafted parameter values to access sensitive files like /etc/passwd from the server. |
2026-03-24 | |
| CVE-2019-25631 | 8.6 | HIGH | CWE-787 | 0.0% p2 | 6.02 | AIDA64 Business 5.99.4900 contains a structured exception handling buffer overfl...AIDA64 Business 5.99.4900 contains a structured exception handling buffer overflow vulnerability that allows local attackers to execute arbitrary code by overwriting SEH pointers with malicious shellcode. Attackers can inject egg hunter shellcode through the SMTP display name field in preferences or report wizard functionality to trigger the overflow and execute code with application privileges. |
2026-03-24 | |
| CVE-2019-25630 | 8.7 | HIGH | CWE-434 | 0.7% p71 | 6.11 | PhreeBooks ERP 5.2.3 contains an arbitrary file upload vulnerability in the Imag...PhreeBooks ERP 5.2.3 contains an arbitrary file upload vulnerability in the Image Manager component that allows authenticated attackers to upload malicious files by submitting requests to the image upload endpoint. Attackers can upload PHP files through the imgFile parameter to the bizuno/image/manager endpoint and execute them via the bizunoFS.php script for remote code execution. |
2026-03-24 | |
| CVE-2019-25629 | 8.6 | HIGH | CWE-787 | 0.0% p2 | 6.02 | AIDA64 Extreme 5.99.4900 contains a structured exception handler buffer overflow...AIDA64 Extreme 5.99.4900 contains a structured exception handler buffer overflow vulnerability in the logging functionality that allows local attackers to execute arbitrary code by supplying a malicious CSV log file path. Attackers can inject shellcode through the Hardware Monitoring logging preferences to overflow the buffer and trigger code execution when the application processes the log file path. |
2026-03-24 | |
| CVE-2019-25628 | 9.3 | CRITICAL | CWE-787 | 0.2% p45 | 6.52 | Download Accelerator Plus DAP 10.0.6.0 contains a structured exception handler b...Download Accelerator Plus DAP 10.0.6.0 contains a structured exception handler buffer overflow vulnerability that allows remote attackers to execute arbitrary code by crafting malicious URLs. Attackers can create specially crafted URLs with overflowing buffer data that overwrites SEH pointers and executes embedded shellcode when imported through the application's web page import functionality. |
2026-03-24 | |
| CVE-2019-25627 | 8.6 | HIGH | CWE-434 | 0.0% p6 | 6.02 | FlexHEX 2.71 contains a local buffer overflow vulnerability in the Stream Name f...FlexHEX 2.71 contains a local buffer overflow vulnerability in the Stream Name field that allows local attackers to execute arbitrary code by triggering a structured exception handler (SEH) overflow. Attackers can craft a malicious text file with carefully aligned shellcode and SEH chain pointers, paste the contents into the Stream Name dialog, and execute arbitrary commands like calc.exe when the exception handler is triggered. |
2026-03-24 | |
| CVE-2019-25626 | 8.6 | HIGH | CWE-434 | 0.0% p4 | 6.02 | River Past Cam Do 3.7.6 contains a local buffer overflow vulnerability in the ac...River Past Cam Do 3.7.6 contains a local buffer overflow vulnerability in the activation code input field that allows local attackers to execute arbitrary code by supplying a malicious activation code string. Attackers can craft a buffer containing 608 bytes of junk data followed by shellcode and SEH chain overwrite values to trigger code execution when the activation dialog processes the input. |
2026-03-24 | |
| CVE-2026-3509 | 7.5 | HIGH | CWE-134 | 0.1% p28 | 5.25 | An unauthenticated remote attacker may be able to control the format string of m...An unauthenticated remote attacker may be able to control the format string of messages processed by the Audit Log of the CODESYS Control runtime system, potentially resulting in a denial‑of‑service (DoS) condition. |
2026-03-24 | |
| CVE-2025-41660 | 8.8 | HIGH | CWE-669 | 0.2% p46 | 6.17 | A low-privileged remote attacker may be able to replace the boot application of ...A low-privileged remote attacker may be able to replace the boot application of the CODESYS Control runtime system, enabling unauthorized code execution. |
2026-03-24 | |
| CVE-2026-4756 | 7.8 | HIGH | CWE-787 | 0.0% p3 | 5.46 | Out-of-bounds Write vulnerability in MolotovCherry Android-ImageMagick7.This iss...Out-of-bounds Write vulnerability in MolotovCherry Android-ImageMagick7.This issue affects Android-ImageMagick7: before 7.1.2-11. |
2026-03-24 | |
| CVE-2026-4755 | 9.8 | CRITICAL | CWE-20 | 0.1% p33 | 6.86 | CWE-20 vulnerability in MolotovCherry Android-ImageMagick7.This issue affects An...CWE-20 vulnerability in MolotovCherry Android-ImageMagick7.This issue affects Android-ImageMagick7: before 7.1.2-11. |
2026-03-24 | |
| CVE-2026-4754 | 6.1 | MEDIUM | CWE-79 | 0.0% p8 | 4.27 | CWE-79 vulnerability in MolotovCherry Android-ImageMagick7.This issue affects An...CWE-79 vulnerability in MolotovCherry Android-ImageMagick7.This issue affects Android-ImageMagick7: before 7.1.2-11. |
2026-03-24 | |
| CVE-2026-33852 | 7.5 | HIGH | CWE-401 | 0.0% p14 | 5.25 | Missing Release of Memory after Effective Lifetime vulnerability in MolotovCherr...Missing Release of Memory after Effective Lifetime vulnerability in MolotovCherry Android-ImageMagick7.This issue affects Android-ImageMagick7: before 7.1.2-11. |
2026-03-24 | |
| CVE-2026-4753 | 9.1 | CRITICAL | CWE-125 | 0.1% p17 | 6.37 | Out-of-bounds Read vulnerability in slajerek RetroDebugger.This issue affects Re...Out-of-bounds Read vulnerability in slajerek RetroDebugger.This issue affects RetroDebugger: before v0.64.72. |
2026-03-24 | |
| CVE-2026-4752 | 6.4 | MEDIUM | CWE-416 | 0.0% p3 | 4.48 | Use After Free vulnerability in No-Chicken Echo-Mate.This issue affects Echo-Mat...Use After Free vulnerability in No-Chicken Echo-Mate.This issue affects Echo-Mate: before V250329. |
2026-03-24 | |
| CVE-2026-4751 | 5.3 | MEDIUM | CWE-476 | 0.1% p15 | 3.71 | NULL Pointer Dereference vulnerability in tmate-io tmate.This issue affects tmat...NULL Pointer Dereference vulnerability in tmate-io tmate.This issue affects tmate: before 2.4.0. |
2026-03-24 | |
| CVE-2026-4750 | 9.1 | CRITICAL | CWE-125 | 0.1% p17 | 6.37 | Out-of-bounds Read vulnerability in fabiangreffrath woof.This issue affects woof...Out-of-bounds Read vulnerability in fabiangreffrath woof.This issue affects woof: before woof_15.3.0. |
2026-03-24 | |
| CVE-2026-4749 | 6.5 | MEDIUM | N/A | 0.0% p4 | 4.55 | NVD-CWE-noinfo vulnerability in albfan miraclecast.This issue affects miraclecas...NVD-CWE-noinfo vulnerability in albfan miraclecast.This issue affects miraclecast: before v1.0. |
2026-03-24 | |
| CVE-2026-33856 | 7.5 | HIGH | CWE-401 | 0.0% p14 | 5.25 | Missing Release of Memory after Effective Lifetime vulnerability in MolotovCherr...Missing Release of Memory after Effective Lifetime vulnerability in MolotovCherry Android-ImageMagick7.This issue affects Android-ImageMagick7: before 7.1.2-11. |
2026-03-24 | |
| CVE-2026-33855 | 5.5 | MEDIUM | CWE-190 | 0.0% p7 | 3.85 | Integer Overflow or Wraparound vulnerability in MolotovCherry Android-ImageMagic...Integer Overflow or Wraparound vulnerability in MolotovCherry Android-ImageMagick7.This issue affects Android-ImageMagick7: before 7.1.2-11. |
2026-03-24 | |
| CVE-2026-33854 | 8.8 | HIGH | CWE-787 | 0.1% p15 | 6.16 | Out-of-bounds Write vulnerability in MolotovCherry Android-ImageMagick7.This iss...Out-of-bounds Write vulnerability in MolotovCherry Android-ImageMagick7.This issue affects Android-ImageMagick7: before 7.1.2-10. |
2026-03-24 | |
| CVE-2026-33853 | 5.5 | MEDIUM | CWE-476 | 0.0% p7 | 3.85 | NULL Pointer Dereference vulnerability in MolotovCherry Android-ImageMagick7.Thi...NULL Pointer Dereference vulnerability in MolotovCherry Android-ImageMagick7.This issue affects Android-ImageMagick7: before 7.1.2-10. |
2026-03-24 | |
| CVE-2026-33851 | 7.8 | HIGH | CWE-119 | 0.0% p2 | 5.46 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerab...Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in joncampbell123 doslib.This issue affects doslib: before doslib-20250729. |
2026-03-24 | |
| CVE-2026-33850 | 7.8 | HIGH | CWE-787 | 0.0% p4 | 5.46 | Out-of-bounds Write vulnerability in WujekFoliarz DualSenseY-v2.This issue affec...Out-of-bounds Write vulnerability in WujekFoliarz DualSenseY-v2.This issue affects DualSenseY-v2: before 54. |
2026-03-24 | |
| CVE-2026-33849 | 8.8 | HIGH | CWE-119 | 0.0% p12 | 6.16 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerab...Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in linkingvision rapidvms.This issue affects rapidvms: before PR#96. |
2026-03-24 | |
| CVE-2026-33848 | 8.8 | HIGH | CWE-119 | 0.0% p12 | 6.16 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerab...Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in linkingvision rapidvms.This issue affects rapidvms: before PR#96. |
2026-03-24 | |
| CVE-2026-33847 | 7.8 | HIGH | CWE-119 | 0.0% p2 | 5.46 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerab...Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in linkingvision rapidvms.This issue affects rapidvms: before PR#96. |
2026-03-24 | |
| CVE-2026-4662 | 7.5 | HIGH | CWE-89 | 0.1% p28 | 5.25 | The JetEngine plugin for WordPress is vulnerable to SQL Injection via the `listi...The JetEngine plugin for WordPress is vulnerable to SQL Injection via the `listing_load_more` AJAX action in all versions up to, and including, 3.8.6.1. This is due to the `filtered_query` parameter being excluded from the HMAC signature validation (allowing attacker-controlled input to bypass security checks) combined with the `prepare_where_clause()` method in the SQL Query Builder not sanitizing the `compare` operator before concatenating it into SQL statements. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database, provided the site has a JetEngine Listing Grid with Load More enabled that uses a SQL Query Builder query. |
2026-03-24 | |
| CVE-2026-4640 | 8.7 | HIGH | CWE-306 | 0.1% p23 | 6.09 | Vitals ESP developed by Galaxy Software Services has a Missing Authentication vu...Vitals ESP developed by Galaxy Software Services has a Missing Authentication vulnerability, allowing unauthenticated remote attackers to execute certain functions to obtain sensitive information. |
2026-03-24 | |
| CVE-2026-4639 | 8.7 | HIGH | CWE-863 | 0.1% p30 | 6.09 | Vitals ESP developed by Galaxy Software Services has a Incorrect Authorization v...Vitals ESP developed by Galaxy Software Services has a Incorrect Authorization vulnerability, allowing authenticated remote attackers to perform certain administrative functions, thereby escalating privileges. |
2026-03-24 | |
| CVE-2026-4632 | 6.9 | MEDIUM | CWE-74 | 0.0% p11 | 4.83 | A weakness has been identified in itsourcecode Online Enrollment System 1.0. Thi...A weakness has been identified in itsourcecode Online Enrollment System 1.0. This vulnerability affects unknown code of the file /sms/user/index.php?view=add of the component Parameter Handler. Executing a manipulation of the argument Name can lead to sql injection. The attack may be performed from remote. The exploit has been made available to the public and could be used for attacks. |
2026-03-24 | |
| CVE-2026-4627 | 8.6 | HIGH | CWE-77 | 0.3% p50 | 6.03 | A vulnerability was found in D-Link DIR-825 and DIR-825R 1.0.5/4.5.1. Affected i...A vulnerability was found in D-Link DIR-825 and DIR-825R 1.0.5/4.5.1. Affected is the function handler_update_system_time of the file libdeuteron_modules.so of the component NTP Service. The manipulation results in os command injection. The attack may be launched remotely. This vulnerability only affects products that are no longer supported by the maintainer. |
2026-03-24 | |
| CVE-2026-4283 | 9.1 | CRITICAL | CWE-862 | 0.1% p33 | 6.37 | The WP DSGVO Tools (GDPR) plugin for WordPress is vulnerable to unauthorized acc...The WP DSGVO Tools (GDPR) plugin for WordPress is vulnerable to unauthorized account destruction in all versions up to, and including, 3.1.38. This is due to the `super-unsubscribe` AJAX action accepting a `process_now` parameter from unauthenticated users, which bypasses the intended email-confirmation flow and immediately triggers irreversible account anonymization. This makes it possible for unauthenticated attackers to permanently destroy any non-administrator user account (password randomized, username/email overwritten, roles stripped, comments anonymized, sensitive usermeta wiped) by submitting the victim's email address with `process_now=1`. The nonce required for the request is publicly available on any page containing the `[unsubscribe_form]` shortcode. |
2026-03-24 | |
| CVE-2026-3260 | 5.9 | MEDIUM | CWE-770 | 0.6% p68 | 4.15 | A flaw was found in Undertow. A remote attacker could exploit this vulnerability...A flaw was found in Undertow. A remote attacker could exploit this vulnerability by sending an HTTP GET request containing multipart/form-data content. If the underlying application processes parameters using methods like `getParameterMap()`, the server prematurely parses and stores this content to disk. This could lead to resource exhaustion, potentially resulting in a Denial of Service (DoS). |
2026-03-24 | |
| CVE-2026-3138 | 6.5 | MEDIUM | CWE-862 | 0.1% p16 | 4.55 | The Product Filter for WooCommerce by WBW plugin for WordPress is vulnerable to ...The Product Filter for WooCommerce by WBW plugin for WordPress is vulnerable to unauthorized data loss due to a missing capability check in all versions up to, and including, 3.1.2. This is due to the plugin's MVC framework dynamically registering unauthenticated AJAX handlers via `wp_ajax_nopriv_` hooks without verifying user capabilities, combined with the base controller's `__call()` magic method forwarding undefined method calls to the model layer, and the `havePermissions()` method defaulting to `true` when no permissions are explicitly defined. This makes it possible for unauthenticated attackers to truncate the plugin's `wp_wpf_filters` database table via a crafted AJAX request with `action=delete`, permanently destroying all filter configurations. |
2026-03-24 | |
| CVE-2026-4739 | 9.4 | CRITICAL | CWE-190 | 0.1% p17 | 6.58 | Integer Overflow or Wraparound vulnerability in InsightSoftwareConsortium ITK (...Integer Overflow or Wraparound vulnerability in InsightSoftwareConsortium ITK (Modules/ThirdParty/Expat/src/expat modules).This issue affects ITK: before 2.7.1. |
2026-03-24 | |
| CVE-2026-4733 | 5.3 | MEDIUM | CWE-200 | 0.1% p15 | 3.71 | Exposure of Sensitive Information to an Unauthorized Actor vulnerability in ixra...Exposure of Sensitive Information to an Unauthorized Actor vulnerability in ixray-team ixray-1.6-stcop.This issue affects ixray-1.6-stcop: before 1.3. |
2026-03-24 | |
| CVE-2026-4626 | 5.1 | MEDIUM | CWE-79 | 0.0% p8 | 3.57 | A vulnerability has been found in projectworlds Lawyer Management System 1.0. Th...A vulnerability has been found in projectworlds Lawyer Management System 1.0. This impacts an unknown function of the file /lawyer_booking.php. The manipulation of the argument Description leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. |
2026-03-24 | |
| CVE-2026-4625 | 6.9 | MEDIUM | CWE-74 | 0.0% p11 | 4.83 | A flaw has been found in SourceCodester Online Admission System 1.0. This affect...A flaw has been found in SourceCodester Online Admission System 1.0. This affects an unknown function of the file /programmes.php. Executing a manipulation of the argument program can lead to sql injection. The attack can be launched remotely. The exploit has been published and may be used. |
2026-03-24 | |
| CVE-2026-4624 | 6.9 | MEDIUM | CWE-74 | 0.0% p11 | 4.83 | A vulnerability was detected in SourceCodester Online Library Management System ...A vulnerability was detected in SourceCodester Online Library Management System 1.0. The impacted element is an unknown function of the file /home.php of the component Parameter Handler. Performing a manipulation of the argument searchField results in sql injection. The attack can be initiated remotely. The exploit is now public and may be used. |
2026-03-24 | |
| CVE-2026-4623 | 6.9 | MEDIUM | CWE-918 | 0.1% p18 | 4.83 | A security vulnerability has been detected in DefaultFuction Jeson-Customer-Rela...A security vulnerability has been detected in DefaultFuction Jeson-Customer-Relationship-Management-System up to 1b4679c4d06b90d31dd521c2b000bfdec5a36e00. This affects an unknown function of the file /api/System.php of the component API Module. The manipulation of the argument url leads to server-side request forgery. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The identifier of the patch is f76e7123fe093b8675f88ec8f71725b0dd186310/98bd4eb07fa19d4f2c5228de6395580013c97476. It is suggested to install a patch to address this issue. |
2026-03-24 | |
| CVE-2026-33308 | 6.8 | MEDIUM | CWE-295 | 0.0% p10 | 4.76 | Mod_gnutls is a TLS module for Apache HTTPD based on GnuTLS. Prior to version 0....Mod_gnutls is a TLS module for Apache HTTPD based on GnuTLS. Prior to version 0.13.0, code for client certificate verification did not check the key purpose as set in the Extended Key Usage extension. An attacker with access to the private key for a valid certificate issued by a CA trusted for TLS client authentication but designated for a different purpose could have used that certificate to improperly access resources requiring TLS client authentication. Server configurations that do not use client certificates (`GnuTLSClientVerify ignore`, the default) are not affected. The problem has been fixed in version 0.13.0 by rewriting certificate verification to use `gnutls_certificate_verify_peers()`, and requiring key purpose id-kp-clientAuth (also known as `tls_www_client` in GnuTLS) by default if the Extended Key Usage extension is present. The new `GnuTLSClientKeyPurpose` option allows overriding the expected key purpose if needed (please see the manual for details). Behavior for certificates without an Extended Key Usage extension is unchanged. If dedicated (sub-)CAs are used for issuing TLS client certificates only (not for any other purposes) the issue has no practical impact. |
2026-03-24 | |
| CVE-2026-3079 | 6.5 | MEDIUM | CWE-89 | 0.0% p9 | 4.55 | The LearnDash LMS plugin for WordPress is vulnerable to blind time-based SQL Inj...The LearnDash LMS plugin for WordPress is vulnerable to blind time-based SQL Injection via the 'filters[orderby_order]' parameter in the 'learndash_propanel_template' AJAX action in all versions up to, and including, 5.0.3. This is due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. |
2026-03-24 | |
| CVE-2026-33307 | 7.5 | HIGH | CWE-121 | 0.0% p12 | 5.25 | Mod_gnutls is a TLS module for Apache HTTPD based on GnuTLS. In versions prior t...Mod_gnutls is a TLS module for Apache HTTPD based on GnuTLS. In versions prior to 0.12.3 and 0.13.0, code for client certificate verification imported the certificate chain sent by the client into a fixed size `gnutls_x509_crt_t x509[]` array without checking the number of certificates is less than or equal to the array size. `gnutls_x509_crt_t` is a `typedef` for a pointer to an opaque GnuTLS structure created using with `gnutls_x509_crt_init()` before importing certificate data into it, so no attacker-controlled data was written into the stack buffer, but writing a pointer after the last array element generally triggered a segfault, and could theoretically cause stack corruption otherwise (not observed in practice). Server configurations that do not use client certificates (`GnuTLSClientVerify ignore`, the default) are not affected. The problem has been fixed in version 0.12.3 by checking the length of the provided certificate chain and rejecting it if it exceeds the buffer length, and in version 0.13.0 by rewriting certificate verification to use `gnutls_certificate_verify_peers()`, removing the need for the buffer entirely. There is no workaround. Version 0.12.3 provides the minimal fix for users of 0.12.x who do not wish to upgrade to 0.13.0 yet. |
2026-03-24 | |
| CVE-2026-4680 | 8.8 | HIGH | CWE-416 | 0.1% p34 | 6.16 | Use after free in FedCM in Google Chrome prior to 146.0.7680.165 allowed a remot...Use after free in FedCM in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High) |
2026-03-24 | |
| CVE-2026-4679 | 8.8 | HIGH | CWE-472 | 0.1% p29 | 6.16 | Integer overflow in Fonts in Google Chrome prior to 146.0.7680.165 allowed a rem...Integer overflow in Fonts in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High) |
2026-03-24 | |
| CVE-2026-4678 | 8.8 | HIGH | CWE-416 | 0.1% p31 | 6.16 | Use after free in WebGPU in Google Chrome prior to 146.0.7680.165 allowed a remo...Use after free in WebGPU in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High) |
2026-03-24 | |
| CVE-2026-4677 | 8.8 | HIGH | CWE-125 | 0.1% p23 | 6.16 | Inappropriate implementation in WebAudio in Google Chrome prior to 146.0.7680.16...Inappropriate implementation in WebAudio in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High) |
2026-03-24 | |
| CVE-2026-4676 | 8.8 | HIGH | CWE-416 | 0.1% p30 | 6.16 | Use after free in Dawn in Google Chrome prior to 146.0.7680.165 allowed a remote...Use after free in Dawn in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High) |
2026-03-24 | |
| CVE-2026-4675 | 8.8 | HIGH | CWE-122 | 0.1% p22 | 6.16 | Heap buffer overflow in WebGL in Google Chrome prior to 146.0.7680.165 allowed a...Heap buffer overflow in WebGL in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High) |
2026-03-24 | |
| CVE-2026-4674 | 8.8 | HIGH | CWE-125 | 0.1% p24 | 6.16 | Out of bounds read in CSS in Google Chrome prior to 146.0.7680.165 allowed a rem...Out of bounds read in CSS in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High) |
2026-03-24 | |
| CVE-2026-4673 | 8.8 | HIGH | CWE-122 | 0.1% p25 | 6.16 | Heap buffer overflow in WebAudio in Google Chrome prior to 146.0.7680.165 allowe...Heap buffer overflow in WebAudio in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High) |
2026-03-24 | |
| CVE-2026-4617 | 6.9 | MEDIUM | CWE-266 | 0.1% p16 | 4.83 | A weakness has been identified in SourceCodester Patients Waiting Area Queue Man...A weakness has been identified in SourceCodester Patients Waiting Area Queue Management System 1.0. The impacted element is the function ValidateToken of the file /php/api_patient_checkin.php of the component Patient Check-In Module. Executing a manipulation can lead to improper authorization. It is possible to launch the attack remotely. The exploit has been made available to the public and could be used for attacks. |
2026-03-24 | |
| CVE-2026-4616 | 4.8 | MEDIUM | CWE-79 | 0.0% p9 | 3.36 | A security flaw has been discovered in bolo-blog up to 2.6.4. The affected eleme...A security flaw has been discovered in bolo-blog up to 2.6.4. The affected element is an unknown function of the file /console/article/ of the component Article Title Handler. Performing a manipulation of the argument articleTitle results in cross site scripting. It is possible to initiate the attack remotely. The exploit has been released to the public and may be used for attacks. The project was informed of the problem early through an issue report but has not responded yet. |
2026-03-24 | |
| CVE-2026-33320 | 6.2 | MEDIUM | CWE-674 | 0.0% p3 | 4.34 | Dasel is a command-line tool and library for querying, modifying, and transformi...Dasel is a command-line tool and library for querying, modifying, and transforming data structures. Starting in version 3.0.0 and prior to version 3.3.1, Dasel's YAML reader allows an attacker who can supply YAML for processing to trigger extreme CPU and memory consumption. The issue is in the library's own `UnmarshalYAML` implementation, which manually resolves alias nodes by recursively following `yaml.Node.Alias` pointers without any expansion budget, bypassing go-yaml v4's built-in alias expansion limit. Version 3.3.2 contains a patch for the issue. |
2026-03-24 | |
| CVE-2026-33306 | 4.5 | MEDIUM | CWE-190 | 0.0% p5 | 3.15 | bcrypt-ruby is a Ruby binding for the OpenBSD bcrypt() password hashing algorith...bcrypt-ruby is a Ruby binding for the OpenBSD bcrypt() password hashing algorithm. Prior to version 3.1.22, an integer overflow in the Java BCrypt implementation for JRuby can cause zero iterations in the strengthening loop. Impacted applications must be setting the cost to 31 to see this happen. The JRuby implementation of bcrypt-ruby (`BCrypt.java`) computes the key-strengthening round count as a signed 32-bit integer. When `cost=31` (the maximum allowed by the gem), signed integer overflow causes the round count to become negative, and the strengthening loop executes **zero iterations**. This collapses bcrypt from 2^31 rounds of exponential key-strengthening to effectively constant-time computation — only the initial EksBlowfish key setup and final 64x encryption phase remain. The resulting hash looks valid (`$2a$31$...`) and verifies correctly via `checkpw`, making the weakness invisible to the application. This issue is triggered only when cost=31 is used or when verifying a `$2a$31$` hash. This problem has been fixed in version 3.1.22. As a workaround, set the cost to something less than 31. |
2026-03-24 | |
| CVE-2026-33298 | 7.8 | HIGH | CWE-122 | 0.0% p13 | 5.46 | llama.cpp is an inference of several LLM models in C/C++. Prior to b7824, an int...llama.cpp is an inference of several LLM models in C/C++. Prior to b7824, an integer overflow vulnerability in the `ggml_nbytes` function allows an attacker to bypass memory validation by crafting a GGUF file with specific tensor dimensions. This causes `ggml_nbytes` to return a significantly smaller size than required (e.g., 4MB instead of Exabytes), leading to a heap-based buffer overflow when the application subsequently processes the tensor. This vulnerability allows potential Remote Code Execution (RCE) via memory corruption. b7824 contains a fix. |
2026-03-24 | |
| CVE-2026-22739 | 8.6 | HIGH | CWE-22 | 13.2% p94 | 6.42 | Vulnerability in Spring Cloud when substituting the profile parameter from a req...Vulnerability in Spring Cloud when substituting the profile parameter from a request made to the Spring Cloud Config Server configured to the native file system as a backend, because it was possible to access files outside of the configured search directories.This issue affects Spring Cloud: from 3.1.X before 3.1.13, from 4.1.X before 4.1.9, from 4.2.X before 4.2.3, from 4.3.X before 4.3.2, from 5.0.X before 5.0.2. |
2026-03-24 | |
| CVE-2026-4615 | 6.9 | MEDIUM | CWE-74 | 0.0% p11 | 4.83 | A vulnerability was identified in SourceCodester Online Catering Reservation 1.0...A vulnerability was identified in SourceCodester Online Catering Reservation 1.0. Impacted is an unknown function of the file /search.php. Such manipulation of the argument rcode leads to sql injection. The attack may be performed from remote. The exploit is publicly available and might be used. |
2026-03-24 | |
| CVE-2026-4614 | 5.3 | MEDIUM | CWE-74 | 0.0% p8 | 3.71 | A vulnerability was determined in itsourcecode sanitize or validate this input 1...A vulnerability was determined in itsourcecode sanitize or validate this input 1.0. This issue affects some unknown processing of the file /admin/subjects.php of the component Parameter Handler. This manipulation of the argument subject_code causes sql injection. The attack is possible to be carried out remotely. The exploit has been publicly disclosed and may be utilized. |
2026-03-24 | |
| CVE-2026-4613 | 6.9 | MEDIUM | CWE-74 | 0.0% p11 | 4.83 | A vulnerability was found in SourceCodester E-Commerce Site 1.0. This vulnerabil...A vulnerability was found in SourceCodester E-Commerce Site 1.0. This vulnerability affects unknown code of the file /products.php. The manipulation of the argument Search results in sql injection. The attack can be executed remotely. The exploit has been made public and could be used. |
2026-03-24 | |
| CVE-2026-4056 | 5.4 | MEDIUM | CWE-862 | 0.0% p6 | 3.78 | The User Registration & Membership plugin for WordPress is vulnerable to unautho...The User Registration & Membership plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the Content Access Rules REST API endpoints in versions 5.0.1 through 5.1.4. This is due to the `check_permissions()` method only checking for `edit_posts` capability instead of an administrator-level capability. This makes it possible for authenticated attackers, with Contributor-level access and above, to list, create, modify, toggle, duplicate, and delete site-wide content restriction rules, potentially exposing restricted content or denying legitimate user access. |
2026-03-24 | |
| CVE-2026-4021 | 8.1 | HIGH | CWE-287 | 0.1% p34 | 5.67 | The Contest Gallery plugin for WordPress is vulnerable to an authentication bypa...The Contest Gallery plugin for WordPress is vulnerable to an authentication bypass leading to admin account takeover in all versions up to, and including, 28.1.5. This is due to the email confirmation handler in `users-registry-check-after-email-or-pin-confirmation.php` using the user's email string in a `WHERE ID = %s` clause instead of the numeric user ID, combined with an unauthenticated key-based login endpoint in `ajax-functions-frontend.php`. When the non-default `RegMailOptional=1` setting is enabled, an attacker can register with a crafted email starting with the target user ID (e.g., `1poc@example.test`), trigger the confirmation flow to overwrite the admin's `user_activation_key` via MySQL integer coercion, and then use the `post_cg1l_login_user_by_key` AJAX action to authenticate as the admin without any credentials. This makes it possible for unauthenticated attackers to take over any WordPress administrator account and gain full site control. |
2026-03-24 | |
| CVE-2026-4001 | 9.8 | CRITICAL | CWE-95 | 0.2% p40 | 6.87 | The Woocommerce Custom Product Addons Pro plugin for WordPress is vulnerable to ...The Woocommerce Custom Product Addons Pro plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 5.4.1 via the custom pricing formula eval() in the process_custom_formula() function within includes/process/price.php. This is due to insufficient sanitization and validation of user-submitted field values before passing them to PHP's eval() function. The sanitize_values() method strips HTML tags but does not escape single quotes or prevent PHP code injection. This makes it possible for unauthenticated attackers to execute arbitrary code on the server by submitting a crafted value to a WCPA text field configured with custom pricing formula (pricingType: "custom" with {this.value}). |
2026-03-24 | |
| CVE-2026-3533 | 8.8 | HIGH | CWE-434 | 0.2% p47 | 6.17 | The Jupiter X Core plugin for WordPress is vulnerable to limited file uploads du...The Jupiter X Core plugin for WordPress is vulnerable to limited file uploads due to missing authorization on import_popup_templates() function as well as insufficient file type validation in the upload_files() function in all versions up to, and including, 4.14.1. This makes it possible for Authenticated attackers with Subscriber-level access and above, to upload files with dangerous types that can lead to Remote Code Execution on servers configured to handle .phar files as executable PHP (e.g., Apache+mod_php), or Stored Cross-Site Scripting via .svg, .dfxp, or .xhtml files upload on any server configuration |
2026-03-24 | |
| CVE-2026-33286 | 9.1 | CRITICAL | CWE-913 | 0.1% p16 | 6.37 | Graphiti is a framework that sits on top of models and exposes them via a JSON:A...Graphiti is a framework that sits on top of models and exposes them via a JSON:API-compliant interface. Versions prior to 1.10.2 have an arbitrary method execution vulnerability that affects Graphiti's JSONAPI write functionality. An attacker can craft a malicious JSONAPI payload with arbitrary relationship names to invoke any public method on the underlying model instance, class or its associations. Any application exposing Graphiti write endpoints (create/update/delete) to untrusted users is affected. The `Graphiti::Util::ValidationResponse#all_valid?` method recursively calls `model.send(name)` using relationship names taken directly from user-supplied JSONAPI payloads, without validating them against the resource's configured sideloads. This allows an attacker to potentially run any public method on a given model instance, on the instance class or associated instances or classes, including destructive operations. This is patched in Graphiti v1.10.2. Users should upgrade as soon as possible. Some workarounds are available. Ensure Graphiti write endpoints (create/update) are not accessible to untrusted users and/or apply strong authentication and authorization checks before any write operation is processed, for example use Rails strong parameters to ensure only valid parameters are processed. |
2026-03-24 | |
| CVE-2026-33283 | 6.5 | MEDIUM | CWE-476 | 0.0% p5 | 4.55 | Ella Core is a 5G core designed for private networks. Versions prior to 1.6.0 pa...Ella Core is a 5G core designed for private networks. Versions prior to 1.6.0 panic when processing malformed UL NAS Transport NAS messages without a Request Type. An attacker able to send crafted NAS messages to Ella Core can crash the process, causing service disruption for all connected subscribers. No authentication is required. Version 1.6.0 adds a guard when receiving an UL NAS Message without a Request Type given no SM Context. |
2026-03-24 | |
| CVE-2026-33282 | 7.5 | HIGH | CWE-476 | 0.0% p5 | 5.25 | Ella Core is a 5G core designed for private networks. Versions prior to 1.6.0 pa...Ella Core is a 5G core designed for private networks. Versions prior to 1.6.0 panic when processing a malformed NGAP LocationReport message with `ue-presence-in-area-of-interest` event type and omitting the optional `UEPresenceInAreaOfInterestList` IE. An attacker able to send crafted NGAP messages to Ella Core can crash the process, causing service disruption for all connected subscribers. No authentication is required. Version 1.6.0 added IE presence verification to NGAP message handling. |
2026-03-24 | |
| CVE-2026-33281 | 6.5 | MEDIUM | CWE-129 | 0.0% p3 | 4.55 | Ella Core is a 5G core designed for private networks. Versions prior to 1.6.0 pa...Ella Core is a 5G core designed for private networks. Versions prior to 1.6.0 panic when processing NGAP messages with invalid PDU Session IDs outside of 1-15. An attacker able to send crafted NGAP messages to Ella Core can crash the process, causing service disruption for all connected subscribers. No authentication is required. Version 1.6.0 added PDU Session ID validations during NGAP message handling. |
2026-03-24 | |
| CVE-2026-33252 | 7.1 | HIGH | CWE-352 | 0.0% p0 | 4.97 | The Go MCP SDK used Go's standard encoding/json. Prior to version 1.4.1, the Go ...The Go MCP SDK used Go's standard encoding/json. Prior to version 1.4.1, the Go SDK's Streamable HTTP transport accepted browser-generated cross-site `POST` requests without validating the `Origin` header and without requiring `Content-Type: application/json`. In deployments without Authorization, especially stateless or sessionless configurations, this allows an arbitrary website to send MCP requests to a local server and potentially trigger tool execution. Version 1.4.1 contains a patch for the issue. |
2026-03-24 | |
| CVE-2026-33250 | 7.5 | HIGH | CWE-20 | 0.2% p45 | 5.26 | Freeciv21 is a free open source, turn-based, empire-building strategy game. Vers...Freeciv21 is a free open source, turn-based, empire-building strategy game. Versions prior to 3.1.1 crash with a stack overflow when receiving specially-crafted packets. A remote attacker can use this to take down any public server. A malicious server can use this to crash the game on the player's machine. Authentication is not needed and, by default, logs do not contain any useful information. All users should upgrade to Freeciv21 version 3.1.1. Running the server behind a firewall can help mitigate the issue for non-public servers. For local games, Freeciv21 restricts connections to the current user and is therefore not affected. |
2026-03-24 | |
| CVE-2026-33242 | 7.5 | HIGH | CWE-22 | 0.0% p3 | 5.25 | Salvo is a Rust web framework. Versions 0.39.0 through 0.89.2 have a Path Traver...Salvo is a Rust web framework. Versions 0.39.0 through 0.89.2 have a Path Traversal and Access Control Bypass vulnerability in the salvo-proxy component. The vulnerability allows an unauthenticated external attacker to bypass proxy routing constraints and access unintended backend paths (e.g., protected endpoints or administrative dashboards). This issue stems from the encode_url_path function, which fails to normalize "../" sequences and inadvertently forwards them verbatim to the upstream server by not re-encoding the "." character. Version 0.89.3 contains a patch. |
2026-03-24 | |
| CVE-2026-33241 | 8.7 | HIGH | CWE-770 | 0.0% p5 | 6.09 | Salvo is a Rust web framework. Prior to version 0.89.3, Salvo's form data parsin...Salvo is a Rust web framework. Prior to version 0.89.3, Salvo's form data parsing implementations (`form_data()` method and `Extractible` macro) do not enforce payload size limits before reading request bodies into memory. This allows attackers to cause Out-of-Memory (OOM) conditions by sending extremely large payloads, leading to service crashes and denial of service. Version 0.89.3 contains a patch. |
2026-03-24 | |
| CVE-2026-33211 | 9.6 | CRITICAL | CWE-22 | 0.0% p6 | 6.72 | Tekton Pipelines project provides k8s-style resources for declaring CI/CD-style ...Tekton Pipelines project provides k8s-style resources for declaring CI/CD-style pipelines. Starting in version 1.0.0 and prior to versions 1.0.1, 1.3.3, 1.6.1, 1.9.2, and 1.10.2, the Tekton Pipelines git resolver is vulnerable to path traversal via the `pathInRepo` parameter. A tenant with permission to create `ResolutionRequests` (e.g. by creating `TaskRuns` or `PipelineRuns` that use the git resolver) can read arbitrary files from the resolver pod's filesystem, including ServiceAccount tokens. The file contents are returned base64-encoded in `resolutionrequest.status.data`. Versions 1.0.1, 1.3.3, 1.6.1, 1.9.2, and 1.10.2 contain a patch. |
2026-03-24 | |
| CVE-2026-33202 | 6.6 | MEDIUM | CWE-74 | 0.0% p7 | 4.62 | Active Storage allows users to attach cloud and local files in Rails application...Active Storage allows users to attach cloud and local files in Rails applications. Prior to versions 8.1.2.1, 8.0.4.1, and 7.2.3.1, Active Storage's `DiskService#delete_prefixed` passes blob keys directly to `Dir.glob` without escaping glob metacharacters. If a blob key contains attacker-controlled input or custom-generated keys with glob metacharacters, it may be possible to delete unintended files from the storage directory. Versions 8.1.2.1, 8.0.4.1, and 7.2.3.1 contain a patch. |
2026-03-24 | |
| CVE-2026-33195 | 8.0 | HIGH | CWE-22 | 0.0% p9 | 5.60 | Active Storage allows users to attach cloud and local files in Rails application...Active Storage allows users to attach cloud and local files in Rails applications. Prior to versions 8.1.2.1, 8.0.4.1, and 7.2.3.1, Active Storage's `DiskService#path_for` does not validate that the resolved filesystem path remains within the storage root directory. If a blob key containing path traversal sequences (e.g. `../`) is used, it could allow reading, writing, or deleting arbitrary files on the server. Blob keys are expected to be trusted strings, but some applications could be passing user input as keys and would be affected. Versions 8.1.2.1, 8.0.4.1, and 7.2.3.1 contain a patch. |
2026-03-24 | |
| CVE-2026-33176 | 6.6 | MEDIUM | CWE-400 | 0.0% p5 | 4.62 | Active Support is a toolkit of support libraries and Ruby core extensions extrac...Active Support is a toolkit of support libraries and Ruby core extensions extracted from the Rails framework. Prior to versions 8.1.2.1, 8.0.4.1, and 7.2.3.1, Active Support number helpers accept strings containing scientific notation (e.g. `1e10000`), which `BigDecimal` expands into extremely large decimal representations. This can cause excessive memory allocation and CPU consumption when the expanded number is formatted, possibly resulting in a DoS vulnerability. Versions 8.1.2.1, 8.0.4.1, and 7.2.3.1 contain a patch. |
2026-03-24 | |
| CVE-2026-33174 | 6.6 | MEDIUM | CWE-789 | 0.0% p5 | 4.62 | Active Storage allows users to attach cloud and local files in Rails application...Active Storage allows users to attach cloud and local files in Rails applications. Prior to versions 8.1.2.1, 8.0.4.1, and 7.2.3.1, when serving files through Active Storage's proxy delivery mode, the proxy controller loads the entire requested byte range into memory before sending it. A request with a large or unbounded Range header (e.g. `bytes=0-`) could cause the server to allocate memory proportional to the file size, possibly resulting in a DoS vulnerability through memory exhaustion. Versions 8.1.2.1, 8.0.4.1, and 7.2.3.1 contain a patch. |
2026-03-24 | |
| CVE-2026-33173 | 5.3 | MEDIUM | CWE-925 | 0.0% p2 | 3.71 | Active Storage allows users to attach cloud and local files in Rails application...Active Storage allows users to attach cloud and local files in Rails applications. Prior to versions 8.1.2.1, 8.0.4.1, and 7.2.3.1, `DirectUploadsController` accepts arbitrary metadata from the client and persists it on the blob. Because internal flags like `identified` and `analyzed` are stored in the same metadata hash, a direct-upload client can set these flags to skip MIME detection and analysis. This allows an attacker to upload arbitrary content while claiming a safe `content_type`, bypassing any validations that rely on Active Storage's automatic content type identification. Versions 8.1.2.1, 8.0.4.1, and 7.2.3.1 contain a patch. |
2026-03-24 | |
| CVE-2026-33170 | 5.3 | MEDIUM | CWE-79 | 0.0% p2 | 3.71 | Active Support is a toolkit of support libraries and Ruby core extensions extrac...Active Support is a toolkit of support libraries and Ruby core extensions extracted from the Rails framework. Prior to versions 8.1.2.1, 8.0.4.1, and 7.2.3.1, `SafeBuffer#%` does not propagate the `@html_unsafe` flag to the newly created buffer. If a `SafeBuffer` is mutated in place (e.g. via `gsub!`) and then formatted with `%` using untrusted arguments, the result incorrectly reports `html_safe? == true`, bypassing ERB auto-escaping and possibly leading to XSS. Versions 8.1.2.1, 8.0.4.1, and 7.2.3.1 contain a patch. |
2026-03-24 | |
| CVE-2026-33169 | 6.9 | MEDIUM | CWE-400 | 0.0% p4 | 4.83 | Active Support is a toolkit of support libraries and Ruby core extensions extrac...Active Support is a toolkit of support libraries and Ruby core extensions extracted from the Rails framework. `NumberToDelimitedConverter` uses a lookahead-based regular expression with `gsub!` to insert thousands delimiters. Prior to versions 8.1.2.1, 8.0.4.1, and 7.2.3.1, the interaction between the repeated lookahead group and `gsub!` can produce quadratic time complexity on long digit strings. Versions 8.1.2.1, 8.0.4.1, and 7.2.3.1 contain a patch. |
2026-03-24 | |
| CVE-2026-4306 | 7.5 | HIGH | CWE-89 | 0.1% p26 | 5.25 | The WP Job Portal plugin for WordPress is vulnerable to SQL Injection via the 'r...The WP Job Portal plugin for WordPress is vulnerable to SQL Injection via the 'radius' parameter in all versions up to, and including, 2.4.8 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. |
2026-03-23 | |
| CVE-2026-4066 | 4.3 | MEDIUM | CWE-862 | 0.0% p8 | 3.01 | The Smart Custom Fields plugin for WordPress is vulnerable to unauthorized acces...The Smart Custom Fields plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the relational_posts_search() function in all versions up to, and including, 5.0.6. This makes it possible for authenticated attackers, with Contributor-level access and above, to read private and draft post content from other authors via the smart-cf-relational-posts-search AJAX action. The function queries posts with post_status=any and returns full WP_Post objects including post_content, but only checks the generic edit_posts capability instead of verifying whether the requesting user has permission to read each individual post. |
2026-03-23 | |
| CVE-2026-3225 | 4.3 | MEDIUM | CWE-862 | 0.0% p9 | 3.01 | The LearnPress – WordPress LMS Plugin plugin for WordPress is vulnerable to unau...The LearnPress – WordPress LMS Plugin plugin for WordPress is vulnerable to unauthorized deletion of quiz question answers due to a missing capability check in the delete_question_answer() function of the EditQuestionAjax class in all versions up to, and including, 4.3.2.8. The AbstractAjax::catch_lp_ajax() dispatcher verifies a wp_rest nonce but performs no current_user_can() check, and the QuestionAnswerModel::delete() method only validates minimum answer counts without checking user capabilities. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete answer options from any quiz question on the site. |
2026-03-23 | |
| CVE-2026-33168 | 2.3 | LOW | CWE-79 | 0.0% p6 | 1.61 | Action View provides conventions and helpers for building web pages with the Rai...Action View provides conventions and helpers for building web pages with the Rails framework. Prior to versions 8.1.2.1, 8.0.4.1, and 7.2.3.1, when a blank string is used as an HTML attribute name in Action View tag helpers, the attribute escaping is bypassed, producing malformed HTML. A carefully crafted attribute value could then be misinterpreted by the browser as a separate attribute name, possibly leading to XSS. Applications that allow users to specify custom HTML attributes are affected. Versions 8.1.2.1, 8.0.4.1, and 7.2.3.1 contain a patch. |
2026-03-23 | |
| CVE-2026-33167 | 1.3 | LOW | CWE-79 | 0.0% p4 | 0.91 | Action Pack is a Rubygem for building web applications on the Rails framework. I...Action Pack is a Rubygem for building web applications on the Rails framework. In versions on the 8.1 branch prior to 8.1.2.1, the debug exceptions page does not properly escape exception messages. A carefully crafted exception message could inject arbitrary HTML and JavaScript into the page, leading to XSS. This affects applications with detailed exception pages enabled (`config.consider_all_requests_local = true`), which is the default in development. Version 8.1.2.1 contains a patch. |
2026-03-23 | |
| CVE-2026-33046 | 7.7 | HIGH | CWE-22 | 0.1% p24 | 5.39 | Indico is an event management system that uses Flask-Multipass, a multi-backend ...Indico is an event management system that uses Flask-Multipass, a multi-backend authentication system for Flask. In versions prior to 3.3.12, due to vulnerabilities in TeXLive and obscure LaTeX syntax that allowed circumventing Indico's LaTeX sanitizer, it is possible to use specially-crafted LaTeX snippets which can read local files or execute code with the privileges of the user running Indico on the server. Note that if server-side LaTeX rendering is not in use (ie `XELATEX_PATH` was not set in `indico.conf`), this vulnerability does not apply. It is recommended to update to Indico 3.3.12 as soon as possible. It is also strongly recommended to enable the containerized LaTeX renderer (using `podman`), which isolates it from the rest of the system. As a workaround, remove the `XELATEX_PATH` setting from `indico.conf` (or comment it out or set it to `None`) and restart the `indico-uwsgi` and `indico-celery` services to disable LaTeX functionality. |
2026-03-23 | |
| CVE-2026-2412 | 6.5 | MEDIUM | CWE-89 | 0.0% p8 | 4.55 | The Quiz and Survey Master (QSM) plugin for WordPress is vulnerable to SQL Injec...The Quiz and Survey Master (QSM) plugin for WordPress is vulnerable to SQL Injection via the 'merged_question' parameter in all versions up to, and including, 10.3.5. This is due to insufficient sanitization of user-supplied input before being used in a SQL query. The sanitize_text_field() function applied to the merged_question parameter does not prevent SQL metacharacters like ), OR, AND, and # from being included in the value, which is then directly concatenated into a SQL IN() clause without using $wpdb->prepare() or casting values to integers. This makes it possible for authenticated attackers, with Contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. |
2026-03-23 | |
| CVE-2026-4612 | 6.9 | MEDIUM | CWE-74 | 0.0% p11 | 4.83 | A vulnerability has been found in itsourcecode Free Hotel Reservation System 1.0...A vulnerability has been found in itsourcecode Free Hotel Reservation System 1.0. This affects an unknown part of the file /hotel/admin/mod_users/index.php?view=edit&id=8 of the component Parameter Handler. The manipulation of the argument account_id leads to sql injection. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used. |
2026-03-23 | |
| CVE-2026-4611 | 8.6 | HIGH | CWE-77 | 1.3% p79 | 6.06 | A flaw has been found in TOTOLINK X6000R 9.4.0cu.1360_B20241207/9.4.0cu.1498_B20...A flaw has been found in TOTOLINK X6000R 9.4.0cu.1360_B20241207/9.4.0cu.1498_B20250826. Affected by this issue is the function setLanCfg of the file /usr/sbin/shttpd. Executing a manipulation of the argument Hostname can lead to os command injection. The attack may be launched remotely. |
2026-03-23 | |
| CVE-2026-33634 | 9.4 | CRITICAL | CWE-506 | ✓ | 21.2% p95 | 7.21 | Trivy is a security scanner. On March 19, 2026, a threat actor used compromised ...Trivy is a security scanner. On March 19, 2026, a threat actor used compromised credentials to publish a malicious Trivy v0.69.4 release, force-push 76 of 77 version tags in `aquasecurity/trivy-action` to credential-stealing malware, and replace all 7 tags in `aquasecurity/setup-trivy` with malicious commits. This incident is a continuation of the supply chain attack that began in late February 2026. Following the initial disclosure on March 1, credential rotation was performed but was not atomic (not all credentials were revoked simultaneously). The attacker could have use a valid token to exfiltrate newly rotated secrets during the rotation window (which lasted a few days). This could have allowed the attacker to retain access and execute the March 19 attack. Affected components include the `aquasecurity/trivy` Go / Container image version 0.69.4, the `aquasecurity/trivy-action` GitHub Action versions 0.0.1 – 0.34.2 (76/77), and the`aquasecurity/setup-trivy` GitHub Action versions 0.2.0 – 0.2.6, prior to the recreation of 0.2.6 with a safe commit. Known safe versions include versions 0.69.2 and 0.69.3 of the Trivy binary, version 0.35.0 of trivy-action, and version 0.2.6 of setup-trivy. Additionally, take other mitigations to ensure the safety of secrets. If there is any possibility that a compromised version ran in one's environment, all secrets accessible to affected pipelines must be treated as exposed and rotated immediately. Check whether one's organization pulled or executed Trivy v0.69.4 from any source. Remove any affected artifacts immediately. Review all workflows using `aquasecurity/trivy-action` or `aquasecurity/setup-trivy`. Those who referenced a version tag rather than a full commit SHA should check workflow run logs from March 19–20, 2026 for signs of compromise. Look for repositories named `tpcp-docs` in one's GitHub organization. The presence of such a repository may indicate that the fallback exfiltration mechanism was triggered and secrets were successfully stolen. Pin GitHub Actions to full, immutable commit SHA hashes, don't use mutable version tags. |
2026-03-23 |
| CVE-2026-32913 | 8.8 | HIGH | CWE-522 | 0.0% p11 | 6.16 | OpenClaw before 2026.3.7 contains an improper header validation vulnerability in...OpenClaw before 2026.3.7 contains an improper header validation vulnerability in fetchWithSsrFGuard that forwards custom authorization headers across cross-origin redirects. Attackers can trigger redirects to different origins to intercept sensitive headers like X-Api-Key and Private-Token intended for the original destination. |
2026-03-23 | |
| CVE-2026-32912 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: This CVE ID has been rejected.Rejected reason: This CVE ID has been rejected. |
2026-03-23 | |
| CVE-2026-32911 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: This CVE ID has been rejected.Rejected reason: This CVE ID has been rejected. |
2026-03-23 | |
| CVE-2026-32910 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: This CVE ID has been rejected.Rejected reason: This CVE ID has been rejected. |
2026-03-23 | |
| CVE-2026-32909 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: This CVE ID has been rejected.Rejected reason: This CVE ID has been rejected. |
2026-03-23 | |
| CVE-2026-32908 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: This CVE ID has been rejected.Rejected reason: This CVE ID has been rejected. |
2026-03-23 | |
| CVE-2026-32907 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: This CVE ID has been rejected.Rejected reason: This CVE ID has been rejected. |
2026-03-23 | |
| CVE-2026-32904 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: This CVE ID has been rejected.Rejected reason: This CVE ID has been rejected. |
2026-03-23 | |
| CVE-2026-32903 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: This CVE ID has been rejected.Rejected reason: This CVE ID has been rejected. |
2026-03-23 | |
| CVE-2026-32902 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: This CVE ID has been rejected.Rejected reason: This CVE ID has been rejected. |
2026-03-23 | |
| CVE-2026-32901 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: This CVE ID has been rejected.Rejected reason: This CVE ID has been rejected. |
2026-03-23 | |
| CVE-2026-32900 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: This CVE ID has been rejected.Rejected reason: This CVE ID has been rejected. |
2026-03-23 | |
| CVE-2026-32300 | 8.1 | HIGH | CWE-285 | 0.0% p9 | 5.67 | Connect-CMS is a content management system. In versions on the 1.x series up to ...Connect-CMS is a content management system. In versions on the 1.x series up to and including 1.41.0 and versions on the 2.x series up to and including 2.41.0, an improper authorization issue in the My Page profile update feature may allow modification of arbitrary user information. Versions 1.41.1 and 2.41.1 contain a patch. |
2026-03-23 | |
| CVE-2026-32299 | 7.5 | HIGH | CWE-284 | 0.0% p12 | 5.25 | Connect-CMS is a content management system. In versions on the 1.x series up to ...Connect-CMS is a content management system. In versions on the 1.x series up to and including 1.41.0 and versions on the 2.x series up to and including 2.41.0, an improper authorization issue in the page content retrieval feature may allow retrieval of non-public information. Versions 1.41.1 and 2.41.1 contain a patch. |
2026-03-23 | |
| CVE-2026-32279 | 6.8 | MEDIUM | CWE-918 | 0.0% p14 | 4.76 | Connect-CMS is a content management system. In versions on the 1.x series up to ...Connect-CMS is a content management system. In versions on the 1.x series up to and including 1.41.0 and versions on the 2.x series up to and including 2.41.0, a Server-Side Request Forgery (SSRF) issue exists in the external page migration feature of the Page Management Plugin. Versions 1.41.1 and 2.41.1 contain a patch. |
2026-03-23 | |
| CVE-2026-32278 | 8.2 | HIGH | CWE-434 | 0.0% p12 | 5.74 | Connect-CMS is a content management system. In versions on the 1.x series up to ...Connect-CMS is a content management system. In versions on the 1.x series up to and including 1.41.0 and versions on the 2.x series up to and including 2.41.0, a Stored Cross-site Scripting (XSS) issue exists in the file field of the Form Plugin. Versions 1.41.1 and 2.41.1 contain a patch. |
2026-03-23 | |
| CVE-2026-32277 | 8.7 | HIGH | CWE-79 | 0.0% p9 | 6.09 | Connect-CMS is a content management system. In versions 1.35.0 through 1.41.0 an...Connect-CMS is a content management system. In versions 1.35.0 through 1.41.0 and 2.35.0 through 2.41.0, a DOM-based Cross-Site Scripting (XSS) issue exists in the Cabinet Plugin list view. Versions 1.41.1 and 2.41.1 contain a patch. |
2026-03-23 | |
| CVE-2026-32276 | 8.8 | HIGH | CWE-94 | 0.1% p23 | 6.16 | Connect-CMS is a content management system. In versions on the 1.x series up to ...Connect-CMS is a content management system. In versions on the 1.x series up to and including 1.41.0 and versions on the 2.x series up to and including 2.41.0, an authenticated user may be able to execute arbitrary code in the Code Study Plugin. Versions 1.41.1 and 2.41.1 contain a patch. |
2026-03-23 | |
| CVE-2026-32066 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: This CVE ID has been rejected.Rejected reason: This CVE ID has been rejected. |
2026-03-23 | |
| CVE-2026-32047 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: This CVE ID has been rejected.Rejected reason: This CVE ID has been rejected. |
2026-03-23 | |
| CVE-2026-32012 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: This CVE ID has been rejected.Rejected reason: This CVE ID has been rejected. |
2026-03-23 | |
| CVE-2026-29111 | 5.5 | MEDIUM | CWE-269 | 0.0% p1 | 3.85 | systemd, a system and service manager, (as PID 1) hits an assert and freezes exe...systemd, a system and service manager, (as PID 1) hits an assert and freezes execution when an unprivileged IPC API call is made with spurious data. On version v249 and older the effect is not an assert, but stack overwriting, with the attacker controlled content. From version v250 and newer this is not possible as the safety check causes an assert instead. This IPC call was added in v239, so versions older than that are not affected. Versions 260-rc1, 259.2, 258.5, and 257.11 contain patches. No known workarounds are available. |
2026-03-23 | |
| CVE-2026-28483 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: This CVE ID has been rejected.Rejected reason: This CVE ID has been rejected. |
2026-03-23 | |
| CVE-2026-28455 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: This CVE ID has been rejected.Rejected reason: This CVE ID has been rejected. |
2026-03-23 | |
| CVE-2026-27646 | 5.8 | MEDIUM | CWE-863 | 0.0% p1 | 4.06 | OpenClaw versions prior to 2026.3.7 contain a sandbox escape vulnerability in th...OpenClaw versions prior to 2026.3.7 contain a sandbox escape vulnerability in the /acp spawn command that allows authorized sandboxed sessions to initialize host-side ACP runtime. Attackers can bypass sandbox restrictions by invoking the /acp spawn slash-command to cross from sandboxed chat context into host-side ACP session initialization when ACP is enabled. |
2026-03-23 | |
| CVE-2026-27183 | 2.1 | LOW | CWE-863 | 0.0% p1 | 1.47 | OpenClaw versions prior to 2026.3.7 contain a shell approval gating bypass vulne...OpenClaw versions prior to 2026.3.7 contain a shell approval gating bypass vulnerability in system.run dispatch-wrapper handling that allows attackers to skip shell wrapper approval requirements. The approval classifier and execution planner apply different depth-boundary rules, permitting exactly four transparent dispatch wrappers like repeated env invocations before /bin/sh -c to bypass security=allowlist approval gating by misaligning classification with execution planning. |
2026-03-23 | |
| CVE-2026-22173 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: This CVE ID has been rejected.Rejected reason: This CVE ID has been rejected. |
2026-03-23 | |
| CVE-2026-1940 | 5.1 | MEDIUM | CWE-125 | 0.0% p4 | 3.57 | An incomplete fix for CVE-2024-47778 allows an out-of-bounds read in gst_wavpars...An incomplete fix for CVE-2024-47778 allows an out-of-bounds read in gst_wavparse_adtl_chunk() function. The patch added a size validation check lsize + 8 > size, but it does not account for the GST_ROUND_UP_2(lsize) used in the actual offset calculation. When lsize is an odd number, the parser advances more bytes than validated, causing OOB read. |
2026-03-23 | |
| CVE-2025-60949 | 9.3 | CRITICAL | CWE-200 | 0.0% p12 | 6.51 | Census CSWeb 8.0.1 allows "app/config" to be reachable via HTTP in some deployme...Census CSWeb 8.0.1 allows "app/config" to be reachable via HTTP in some deployments. A remote, unauthenticated attacker could send requests to configuration files and obtain leaked secrets. Fixed in 8.1.0 alpha. |
2026-03-23 | |
| CVE-2025-60948 | 5.1 | MEDIUM | CWE-79 | 0.0% p12 | 3.57 | Census CSWeb 8.0.1 allows stored cross-site scripting in user supplied fields. A...Census CSWeb 8.0.1 allows stored cross-site scripting in user supplied fields. A remote, authenticated attacker could store malicious javascript that executes in a victim's browser. Fixed in 8.1.0 alpha. |
2026-03-23 | |
| CVE-2025-60947 | 8.7 | HIGH | CWE-434 | 0.3% p50 | 6.10 | Census CSWeb 8.0.1 allows arbitrary file upload. A remote, authenticated attacke...Census CSWeb 8.0.1 allows arbitrary file upload. A remote, authenticated attacker could upload a malicious file, possibly leading to remote code execution. Fixed in 8.1.0 alpha. |
2026-03-23 | |
| CVE-2025-60946 | 8.7 | HIGH | CWE-22 | 0.2% p37 | 6.09 | Census CSWeb 8.0.1 allows arbitrary file path input. A remote, authenticated att...Census CSWeb 8.0.1 allows arbitrary file path input. A remote, authenticated attacker could access unintended file directories. Fixed in 8.1.0 alpha. |
2026-03-23 | |
| CVE-2026-4597 | 5.3 | MEDIUM | CWE-74 | 0.0% p8 | 3.71 | A security flaw has been discovered in 648540858 wvp-GB28181-pro up to 2.7.4. Im...A security flaw has been discovered in 648540858 wvp-GB28181-pro up to 2.7.4. Impacted is the function selectAll of the file src/main/java/com/genersoft/iot/vmp/streamProxy/dao/provider/StreamProxyProvider.java of the component Stream Proxy Query Handler. The manipulation results in sql injection. The attack may be launched remotely. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way. Several companies clearly confirm that VulDB is the primary source for best vulnerability data. |
2026-03-23 | |
| CVE-2026-4368 | 7.7 | HIGH | N/A | 0.0% p4 | 5.39 | Race Condition in NetScaler ADC and NetScaler Gateway when appliance is configur...Race Condition in NetScaler ADC and NetScaler Gateway when appliance is configured as Gateway (SSL VPN, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server leading to User Session Mixup |
2026-03-23 | |
| CVE-2026-3055 | 9.3 | CRITICAL | CWE-125 | ✓ | 53.8% p98 | 8.12 | Insufficient input validation in NetScaler ADC and NetScaler Gateway when config...Insufficient input validation in NetScaler ADC and NetScaler Gateway when configured as a SAML IDP leading to memory overread |
2026-03-23 |
| CVE-2026-23882 | 8.6 | HIGH | CWE-78 | 0.1% p21 | 6.02 | Blinko is an AI-powered card note-taking project. Prior to version 1.8.4, the MC...Blinko is an AI-powered card note-taking project. Prior to version 1.8.4, the MCP (Model Context Protocol) server creation function allows specifying arbitrary commands and arguments, which are executed when testing the connection. This issue has been patched in version 1.8.4. |
2026-03-23 | |
| CVE-2026-23488 | 6.9 | MEDIUM | CWE-639 | 0.0% p12 | 4.83 | Blinko is an AI-powered card note-taking project. Prior to version 1.8.4, the /a...Blinko is an AI-powered card note-taking project. Prior to version 1.8.4, the /api/v1/comment/create endpoint has an unauthorized access vulnerability, allowing attackers to post comments on any note (including private notes) without authorization, even if the note has not been publicly shared. The /api/v1/comment/list endpoint has the same issue, allowing unauthorized viewing of comments on all notes. This issue has been patched in version 1.8.4. |
2026-03-23 | |
| CVE-2026-23487 | 6.0 | MEDIUM | CWE-639 | 0.0% p8 | 4.20 | Blinko is an AI-powered card note-taking project. Prior to version 1.8.4, there ...Blinko is an AI-powered card note-taking project. Prior to version 1.8.4, there is an IDOR vulnerability where user.detail Endpoint Leaks the Superadmin Token. This issue has been patched in version 1.8.4. |
2026-03-23 | |
| CVE-2026-23486 | 6.9 | MEDIUM | CWE-200 | 0.0% p11 | 4.83 | Blinko is an AI-powered card note-taking project. Prior to version 1.8.4, a publ...Blinko is an AI-powered card note-taking project. Prior to version 1.8.4, a publicly accessible endpoint exposes all user information, including usernames, roles, and account creation dates. This issue has been patched in version 1.8.4. |
2026-03-23 | |
| CVE-2026-23485 | 6.9 | MEDIUM | CWE-22 | 0.1% p17 | 4.83 | Blinko is an AI-powered card note-taking project. Prior to version 1.8.4, the fi...Blinko is an AI-powered card note-taking project. Prior to version 1.8.4, the filePath parameter accepts path traversal sequences, allowing enumeration of file existence on the server via different error responses. This issue has been patched in version 1.8.4. |
2026-03-23 | |
| CVE-2026-23484 | 5.3 | MEDIUM | CWE-22 | 0.0% p4 | 3.71 | Blinko is an AI-powered card note-taking project. In versions from 1.8.3 and pri...Blinko is an AI-powered card note-taking project. In versions from 1.8.3 and prior, the fileName parameter is not filtered, allowing path traversal to write files anywhere on the file system. Moreover, this interface only requires authProcedure (normal user), not superAdminAuthMiddleware. At time of publication, there are no publicly available patches. |
2026-03-23 | |
| CVE-2026-23483 | 6.9 | MEDIUM | CWE-22 | 0.0% p3 | 4.83 | Blinko is an AI-powered card note-taking project. In versions from 1.8.3 and pri...Blinko is an AI-powered card note-taking project. In versions from 1.8.3 and prior, the plugin file server endpoint uses join() to concatenate paths but does not verify if the final path is within the plugins directory, leading to path traversal. At time of publication, there are no publicly available patches. |
2026-03-23 | |
| CVE-2026-23482 | 8.2 | HIGH | CWE-22 | 0.0% p4 | 5.74 | Blinko is an AI-powered card note-taking project. Prior to version 1.8.4, the fi...Blinko is an AI-powered card note-taking project. Prior to version 1.8.4, the file server endpoint does not perform permission checks on the temp/ path and does not filter path traversal sequences, allowing unauthorized attackers to read arbitrary files on the server. When scheduled backup tasks are enabled, attackers can read backup files to obtain all user notes and user TOKENS. This issue has been patched in version 1.8.4. |
2026-03-23 | |
| CVE-2026-23481 | 5.3 | MEDIUM | CWE-22 | 0.0% p3 | 3.71 | Blinko is an AI-powered card note-taking project. Prior to version 1.8.4, there ...Blinko is an AI-powered card note-taking project. Prior to version 1.8.4, there is an authenticated arbitrary file write vulnerability in saveAdditionalDevFile. This issue has been patched in version 1.8.4. |
2026-03-23 | |
| CVE-2026-23480 | 5.3 | MEDIUM | CWE-288 | 0.0% p3 | 3.71 | Blinko is an AI-powered card note-taking project. Prior to version 1.8.4, there ...Blinko is an AI-powered card note-taking project. Prior to version 1.8.4, there is a privilege escalation vulnerability. The upsertUser endpoint has 3 issues: it is missing superAdminAuthMiddleware, any logged-in user can call it; the originalPassword is an optional parameter and if not provided password verification is skipped; there is no check for input.id === ctx.id (ownership verification). This could result in any authenticated user modifying other users' passwords, direct escalation to superadmin, and complete account takeover. This issue has been patched in version 1.8.4. |
2026-03-23 | |
| CVE-2026-4596 | 5.1 | MEDIUM | CWE-79 | 0.0% p8 | 3.57 | A vulnerability was identified in projectworlds Lawyer Management System 1.0. Th...A vulnerability was identified in projectworlds Lawyer Management System 1.0. This issue affects some unknown processing of the file /lawyers.php. The manipulation of the argument first_Name leads to cross site scripting. The attack may be initiated remotely. The exploit is publicly available and might be used. |
2026-03-23 | |
| CVE-2026-33548 | 8.6 | HIGH | CWE-79 | 0.0% p10 | 6.02 | Mantis Bug Tracker (MantisBT) is an open source issue tracker. In version 2.28.0...Mantis Bug Tracker (MantisBT) is an open source issue tracker. In version 2.28.0, improper escaping of tag names retrieved from History in Timeline (my_view_page.php) allows an attacker to inject HTML and, if CSP settings permit, achieve execution of arbitrary JavaScript, when displaying a tag that has been renamed or deleted. Version 2.28.1 contains a patch. Workarounds include editing offending History entries (using SQL) and wrapping `$this->tag_name` in a string_html_specialchars() call in IssueTagTimelineEvent::html(). |
2026-03-23 | |
| CVE-2026-33517 | 8.6 | HIGH | CWE-79 | 0.0% p10 | 6.02 | Mantis Bug Tracker (MantisBT) is an open source issue tracker. In version 2.28.0...Mantis Bug Tracker (MantisBT) is an open source issue tracker. In version 2.28.0, when deleting a Tag (tag_delete.php), improper escaping of its name when displaying the confirmation message allows an attacker to inject HTML and, if CSP settings permit, achieve execution of arbitrary JavaScript. Version 2.28.1 fixes the issue. Workarounds include reverting commit d6890320752ecf37bd74d11fe14fe7dc12335be9 and/or manually editing language files to remove the sprintf placeholder `%1$s` from `$s_tag_delete_message` string. |
2026-03-23 | |
| CVE-2026-32879 | 4.9 | MEDIUM | CWE-287 | 0.0% p11 | 3.43 | New API is a large language mode (LLM) gateway and artificial intelligence (AI) ...New API is a large language mode (LLM) gateway and artificial intelligence (AI) asset management system. Starting in version 0.10.0, a logic flaw in the universal secure verification flow allows an authenticated user with a registered passkey to satisfy secure verification without completing a WebAuthn assertion. As of time of publication, no known patched versions are available. Until a patched release is applied, do not rely on passkey as the step-up method for privileged secure-verification actions; require TOTP/2FA for those actions where operationally possible; or temporarily restrict access to affected secure-verification-protected endpoints. |
2026-03-23 | |
| CVE-2026-32852 | 5.1 | MEDIUM | CWE-79 | 0.0% p3 | 3.57 | MailEnable versions prior to 10.55 contain a reflected cross-site scripting vuln...MailEnable versions prior to 10.55 contain a reflected cross-site scripting vulnerability in the webmail interface that allows remote attackers to execute arbitrary JavaScript in a victim's browser by crafting a malicious URL. Attackers can inject malicious code through the StartDate parameter in the FreeBusy.aspx form, which is not properly sanitized before being embedded into dynamically generated JavaScript. |
2026-03-23 | |
| CVE-2026-32851 | 5.1 | MEDIUM | CWE-79 | 0.0% p3 | 3.57 | MailEnable versions prior to 10.55 contain a reflected cross-site scripting vuln...MailEnable versions prior to 10.55 contain a reflected cross-site scripting vulnerability in the webmail interface that allows remote attackers to execute arbitrary JavaScript in a victim's browser by crafting a malicious URL. Attackers can inject malicious code through the Attendees parameter in the FreeBusy.aspx form, which is not properly sanitized before being embedded into dynamically generated JavaScript. |
2026-03-23 | |
| CVE-2026-32850 | 5.1 | MEDIUM | CWE-79 | 0.0% p3 | 3.57 | MailEnable versions prior to 10.55 contain a reflected cross-site scripting vuln...MailEnable versions prior to 10.55 contain a reflected cross-site scripting vulnerability in the webmail interface that allows remote attackers to execute arbitrary JavaScript in a victim's browser by crafting a malicious URL. Attackers can inject malicious code through the SelectedIndex parameter in the ManageShares.aspx form, which is not properly sanitized before being embedded into dynamically generated JavaScript. |
2026-03-23 | |
| CVE-2026-30886 | 6.5 | MEDIUM | CWE-639 | 0.0% p10 | 4.55 | New API is a large language mode (LLM) gateway and artificial intelligence (AI) ...New API is a large language mode (LLM) gateway and artificial intelligence (AI) asset management system. Prior to version 0.11.4-alpha.2, an Insecure Direct Object Reference (IDOR) vulnerability in the video proxy endpoint (`GET /v1/videos/:task_id/content`) allows any authenticated user to access video content belonging to other users and causes the server to authenticate to upstream AI providers (Google Gemini, OpenAI) using credentials derived from tasks they do not own. The missing authorization check is a single function call — `model.GetByOnlyTaskId(taskID)` queries by `task_id` alone with no `user_id` filter, while every other task-lookup in the codebase enforces ownership via `model.GetByTaskId(userId, taskID)`. Version 0.11.4-alpha.2 contains a patch. |
2026-03-23 | |
| CVE-2026-30849 | 9.3 | CRITICAL | CWE-305 | 0.1% p31 | 6.51 | Mantis Bug Tracker (MantisBT) is an open source issue tracker. Versions prior to...Mantis Bug Tracker (MantisBT) is an open source issue tracker. Versions prior to 2.28.1 running on MySQL family databases are affected by an authentication bypass vulnerability in the SOAP API, as a result of an improper type checking on the password parameter. Other database backends are not affected, as they do not perform implicit type conversion from string to integer. Using a crafted SOAP envelope, an attacker knowing the victim's username is able to login to the SOAP API with their account without knowledge of the actual password, and execute any API function they have access to. Version 2.28.1 contains a patch. Disabling the SOAP API significantly reduces the risk, but still allows the attacker to retrieve user account information including email address and real name. |
2026-03-23 | |
| CVE-2026-2298 | 9.4 | CRITICAL | CWE-88 | 0.1% p19 | 6.58 | Improper Neutralization of Argument Delimiters in a Command ('Argument Injection...Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') vulnerability in Salesforce Marketing Cloud Engagement allows Web Services Protocol Manipulation. This issue affects Marketing Cloud Engagement: before January 30th, 2026. |
2026-03-23 | |
| CVE-2026-27131 | 5.5 | MEDIUM | CWE-200 | 0.0% p10 | 3.85 | The Sprig Plugin for Craft CMS is a reactive Twig component framework for Craft ...The Sprig Plugin for Craft CMS is a reactive Twig component framework for Craft CMS. Starting in version 2.0.0 and prior to versions 2.15.2 and 3.15.2, admin users, and users with explicit permission to access the Sprig Playground, could potentially expose the security key, credentials, and other sensitive configuration data, in addition to running the `hashData()` signing function. This issue was mitigated in versions 3.15.2 and 2.15.2 by disabling access to the Sprig Playground entirely when `devMode` is disabled, by default. It is possible to override this behavior using a new `enablePlaygroundWhenDevModeDisabled` that defaults to `false`. |
2026-03-23 | |
| CVE-2025-52204 | 6.1 | MEDIUM | CWE-79 | 0.0% p9 | 4.27 | A Cross-Site Scripting (XSS) vulnerability exists in Znuny::ITSM 6.5.x in the cu...A Cross-Site Scripting (XSS) vulnerability exists in Znuny::ITSM 6.5.x in the customer.pl endpoint via the OTRSCustomerInterface parameter |
2026-03-23 | |
| CVE-2024-46879 | 5.4 | MEDIUM | CWE-79 | 0.0% p8 | 3.78 | A Reflected Cross-Site Scripting (XSS) vulnerability exists in the POST request ...A Reflected Cross-Site Scripting (XSS) vulnerability exists in the POST request data zipPath of tiki-admin_system.php in Tiki version 21.2. This vulnerability allows attackers to execute arbitrary JavaScript code via a crafted payload, leading to potential access to sensitive information or unauthorized actions. |
2026-03-23 | |
| CVE-2024-46878 | 5.4 | MEDIUM | CWE-79 | 0.0% p8 | 3.78 | A Cross-Site Scripting (XSS) vulnerability exists in the page parameter of tiki-...A Cross-Site Scripting (XSS) vulnerability exists in the page parameter of tiki-editpage.php in Tiki version 26.3 and earlier. This vulnerability allows attackers to execute arbitrary JavaScript code via a crafted payload, leading to potential access to sensitive information or unauthorized actions. |
2026-03-23 | |
| CVE-2026-4595 | 4.8 | MEDIUM | CWE-79 | 0.0% p9 | 3.36 | A vulnerability was determined in code-projects Exam Form Submission 1.0. This v...A vulnerability was determined in code-projects Exam Form Submission 1.0. This vulnerability affects unknown code of the file /admin/update_s6.php. Executing a manipulation of the argument sname can lead to cross site scripting. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized. If you want to get the best quality for vulnerability data then you always have to consider VulDB. |
2026-03-23 | |
| CVE-2026-33723 | 7.1 | HIGH | CWE-89 | 0.0% p5 | 4.97 | WWBN AVideo is an open source video platform. In versions up to and including 26...WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `Subscribe::save()` method in `objects/subscribe.php` concatenates the `$this->users_id` property directly into an INSERT SQL query without sanitization or parameterized binding. This property originates from `$_POST['user_id']` in both `subscribe.json.php` and `subscribeNotify.json.php`. An authenticated attacker can inject arbitrary SQL to extract sensitive data from any database table, including password hashes, API keys, and encryption salts. Commit 36dfae22059fbd66fd34bbc5568a838fc0efd66c contains a patch. |
2026-03-23 | |
| CVE-2026-33719 | 8.6 | HIGH | CWE-306 | 0.1% p31 | 6.02 | WWBN AVideo is an open source video platform. In versions up to and including 26...WWBN AVideo is an open source video platform. In versions up to and including 26.0, the CDN plugin endpoints `plugin/CDN/status.json.php` and `plugin/CDN/disable.json.php` use key-based authentication with an empty string default key. When the CDN plugin is enabled but the key has not been configured (the default state), the key validation check is completely bypassed, allowing any unauthenticated attacker to modify the full CDN configuration — including CDN URLs, storage credentials, and the authentication key itself — via mass-assignment through the `par` request parameter. Commit adeff0a31ba04a56f411eef256139fd7ed7d4310 contains a patch. |
2026-03-23 | |
| CVE-2026-33717 | 8.8 | HIGH | CWE-434 | 0.1% p15 | 6.16 | WWBN AVideo is an open source video platform. In versions up to and including 26...WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `downloadVideoFromDownloadURL()` function in `objects/aVideoEncoder.json.php` saves remote content to a web-accessible temporary directory using the original URL's filename and extension (including `.php`). By providing an invalid `resolution` parameter, an attacker triggers an early `die()` via `forbiddenPage()` before the temp file can be moved or cleaned up, leaving an executable PHP file persistently accessible under the web root at `videos/cache/tmpFile/`. Commit 6da79b43484099a0b660d1544a63c07b633ed3a2 contains a patch. |
2026-03-23 | |
| CVE-2026-33716 | 9.4 | CRITICAL | CWE-287 | 0.1% p26 | 6.58 | WWBN AVideo is an open source video platform. In versions up to and including 26...WWBN AVideo is an open source video platform. In versions up to and including 26.0, the standalone live stream control endpoint at `plugin/Live/standAloneFiles/control.json.php` accepts a user-supplied `streamerURL` parameter that overrides where the server sends token verification requests. An attacker can redirect token verification to a server they control that always returns `{"error": false}`, completely bypassing authentication. This grants unauthenticated control over any live stream on the platform, including dropping active publishers, starting/stopping recordings, and probing stream existence. Commit 388fcd57dbd16f6cb3ebcdf1d08cf2b929941128 contains a patch. |
2026-03-23 | |
| CVE-2026-33690 | 5.3 | MEDIUM | CWE-348 | 0.0% p4 | 3.71 | WWBN AVideo is an open source video platform. In versions up to and including 26...WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `getRealIpAddr()` function in `objects/functions.php` trusts user-controlled HTTP headers to determine the client's IP address. An attacker can spoof their IP address by sending forged headers, bypassing any IP-based access controls or audit logging. Commit 1a1df6a9377e5cc67d1d0ac8ef571f7abbffbc6c contains a patch. |
2026-03-23 | |
| CVE-2026-33688 | 5.3 | MEDIUM | CWE-204 | 0.1% p17 | 3.71 | WWBN AVideo is an open source video platform. In versions up to and including 26...WWBN AVideo is an open source video platform. In versions up to and including 26.0, the password recovery endpoint at `objects/userRecoverPass.php` performs user existence and account status checks before validating the captcha. This allows an unauthenticated attacker to enumerate valid usernames and determine whether accounts are active, inactive, or banned — at scale and without solving any captcha — by observing three distinct JSON error responses. Commit e42f54123b460fd1b2ee01f2ce3d4a386e88d157 contains a patch. |
2026-03-23 | |
| CVE-2026-33685 | 5.3 | MEDIUM | CWE-862 | 0.1% p27 | 3.71 | WWBN AVideo is an open source video platform. In versions up to and including 26...WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `plugin/AD_Server/reports.json.php` endpoint performs no authentication or authorization checks, allowing any unauthenticated attacker to extract ad campaign analytics data including video titles, user channel names, user IDs, ad campaign names, and impression/click counts. The HTML counterpart (`reports.php`) and CSV export (`getCSV.php`) both correctly enforce `User::isAdmin()`, but the JSON API was left unprotected. Commit daca4ffb1ce19643eecaa044362c41ac2ce45dde contains a patch. |
2026-03-23 | |
| CVE-2026-33683 | 5.4 | MEDIUM | CWE-79 | 0.0% p8 | 3.78 | WWBN AVideo is an open source video platform. In versions up to and including 26...WWBN AVideo is an open source video platform. In versions up to and including 26.0, a sanitization order-of-operations flaw in the user profile "about" field allows any registered user to inject arbitrary JavaScript that executes when other users visit their channel page. The `xss_esc()` function entity-encodes input before `strip_specific_tags()` can match dangerous HTML tags, and `html_entity_decode()` on output reverses the encoding, restoring the raw malicious HTML. Commit 7cfdc380dae1e56bbb5de581470d9e9957445df0 contains a patch. |
2026-03-23 | |
| CVE-2026-33681 | 7.2 | HIGH | CWE-22 | 0.1% p16 | 5.04 | WWBN AVideo is an open source video platform. In versions up to and including 26...WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `objects/pluginRunDatabaseScript.json.php` endpoint accepts a `name` parameter via POST and passes it to `Plugin::getDatabaseFileName()` without any path traversal sanitization. This allows an authenticated admin (or an attacker via CSRF) to traverse outside the plugin directory and execute the contents of any `install/install.sql` file on the filesystem as raw SQL queries against the application database. Commit 81b591c509835505cb9f298aa1162ac64c4152cb contains a patch. |
2026-03-23 | |
| CVE-2026-33651 | 8.1 | HIGH | CWE-89 | 0.0% p7 | 5.67 | WWBN AVideo is an open source video platform. In versions up to and including 26...WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `remindMe.json.php` endpoint passes `$_REQUEST['live_schedule_id']` through multiple functions without sanitization until it reaches `Scheduler_commands::getAllActiveOrToRepeat()`, which directly concatenates it into a SQL `LIKE` clause. Although intermediate functions (`new Live_schedule()`, `getUsers_idOrCompany()`) apply `intval()` internally, they do so on local copies within `ObjectYPT::getFromDb()`, leaving the original tainted variable unchanged. Any authenticated user can perform time-based blind SQL injection to extract arbitrary database contents. Commit 75d45780728294ededa1e3f842f95295d3e7d144 contains a patch. |
2026-03-23 | |
| CVE-2026-33650 | 7.6 | HIGH | CWE-863 | 0.0% p9 | 5.32 | WWBN AVideo is an open source video platform. In versions up to and including 26...WWBN AVideo is an open source video platform. In versions up to and including 26.0, a user with the "Videos Moderator" permission can escalate privileges to perform full video management operations — including ownership transfer and deletion of any video — despite the permission being documented as only allowing video publicity changes (Active, Inactive, Unlisted). The root cause is that `Permissions::canModerateVideos()` is used as an authorization gate for full video editing in `videoAddNew.json.php`, while `videoDelete.json.php` only checks ownership, creating an asymmetric authorization boundary exploitable via a two-step ownership-transfer-then-delete chain. Commit 838e16818c793779406ecbf34ebaeba9830e33f8 contains a patch. |
2026-03-23 | |
| CVE-2026-33649 | 8.1 | HIGH | CWE-352 | 0.0% p6 | 5.67 | WWBN AVideo is an open source video platform. In versions up to and including 26...WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `plugin/Permissions/setPermission.json.php` endpoint accepts GET parameters for a state-changing operation that modifies user group permissions. The endpoint has no CSRF token validation, and the application explicitly sets `session.cookie_samesite=None` on session cookies. This allows an unauthenticated attacker to craft a page with `<img>` tags that, when visited by an admin, silently grant arbitrary permissions to the attacker's user group — escalating the attacker to near-admin access. As of time of publication, no known patched versions are available. |
2026-03-23 | |
| CVE-2026-33648 | 8.8 | HIGH | CWE-78 | 0.1% p21 | 6.16 | WWBN AVideo is an open source video platform. In versions up to and including 26...WWBN AVideo is an open source video platform. In versions up to and including 26.0, the restreamer endpoint constructs a log file path by embedding user-controlled `users_id` and `liveTransmitionHistory_id` values from the JSON request body without any sanitization. This log file path is then concatenated directly into shell commands passed to `exec()`, allowing an authenticated user to achieve arbitrary command execution on the server via shell metacharacters such as `$()` or backticks. Commit 99b865413172045fef6a98b5e9bfc7b24da11678 contains a patch. |
2026-03-23 | |
| CVE-2026-33647 | 8.8 | HIGH | CWE-434 | 0.3% p52 | 6.17 | WWBN AVideo is an open source video platform. In versions up to and including 26...WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `ImageGallery::saveFile()` method validates uploaded file content using `finfo` MIME type detection but derives the saved filename extension from the user-supplied original filename without an allowlist check. An attacker can upload a polyglot file (valid JPEG magic bytes followed by PHP code) with a `.php` extension. The MIME check passes, but the file is saved as an executable `.php` file in a web-accessible directory, achieving Remote Code Execution. Commit 345a8d3ece0ad1e1b71a704c1579cbf885d8f3ae contains a patch. |
2026-03-23 | |
| CVE-2026-33513 | 8.6 | HIGH | CWE-22 | 0.2% p38 | 6.03 | WWBN AVideo is an open source video platform. In versions up to and including 26...WWBN AVideo is an open source video platform. In versions up to and including 26.0, an unauthenticated API endpoint (`APIName=locale`) concatenates user input into an `include` path with no canonicalization or whitelist. Path traversal is accepted, so arbitrary PHP files under the web root can be included. In our test this yielded confirmed file disclosure and code execution of existing PHP content (e.g., `view/about.php`), and it *can* escalate to RCE if an attacker can place or control a PHP file elsewhere in the tree. As of time of publication, no patched versions are available. |
2026-03-23 | |
| CVE-2026-33512 | 7.5 | HIGH | CWE-287 | 0.0% p6 | 5.25 | WWBN AVideo is an open source video platform. In versions up to and including 26...WWBN AVideo is an open source video platform. In versions up to and including 26.0, the API plugin exposes a `decryptString` action without any authentication. Anyone can submit ciphertext and receive plaintext. Ciphertext is issued publicly (e.g., `view/url2Embed.json.php`), so any user can recover protected tokens/metadata. Commit 3fdeecef37bb88967a02ccc9b9acc8da95de1c13 contains a patch. |
2026-03-23 | |
| CVE-2026-26209 | 7.5 | HIGH | CWE-674 | 0.1% p17 | 5.25 | cbor2 provides encoding and decoding for the Concise Binary Object Representatio...cbor2 provides encoding and decoding for the Concise Binary Object Representation (CBOR) serialization format. Versions prior to 5.9.0 are vulnerable to a Denial of Service (DoS) attack caused by uncontrolled recursion when decoding deeply nested CBOR structures. This vulnerability affects both the pure Python implementation and the C extension `_cbor2`. The C extension relies on Python's internal recursion limits `Py_EnterRecursiveCall` rather than a data-driven depth limit, meaning it still raises `RecursionError` and crashes the worker process when the limit is hit. While the library handles moderate nesting levels, it lacks a hard depth limit. An attacker can supply a crafted CBOR payload containing approximately 100,000 nested arrays `0x81`. When `cbor2.loads()` attempts to parse this, it hits the Python interpreter's maximum recursion depth or exhausts the stack, causing the process to crash with a `RecursionError`. Because the library does not enforce its own limits, it allows an external attacker to exhaust the host application's stack resource. In many web application servers (e.g., Gunicorn, Uvicorn) or task queues (Celery), an unhandled `RecursionError` terminates the worker process immediately. By sending a stream of these small (<100KB) malicious packets, an attacker can repeatedly crash worker processes, resulting in a complete Denial of Service for the application. Version 5.9.0 patches the issue. |
2026-03-23 | |
| CVE-2026-25075 | 8.7 | HIGH | CWE-191 | 0.2% p35 | 6.09 | strongSwan versions 4.5.0 prior to 6.0.5 contain an integer underflow vulnerabil...strongSwan versions 4.5.0 prior to 6.0.5 contain an integer underflow vulnerability in the EAP-TTLS AVP parser that allows unauthenticated remote attackers to cause a denial of service by sending crafted AVP data with invalid length fields during IKEv2 authentication. Attackers can exploit the failure to validate AVP length fields before subtraction to trigger excessive memory allocation or NULL pointer dereference, crashing the charon IKE daemon. |
2026-03-23 | |
| CVE-2026-0898 | 9.0 | CRITICAL | CWE-284 | 0.1% p16 | 6.30 | An arbitrary file-write vulnerability in Pega Browser Extension (PBE) affects Pe...An arbitrary file-write vulnerability in Pega Browser Extension (PBE) affects Pega Robot Studio developers who are automating Google Chrome and Microsoft Edge using either version 22.1 or R25. This vulnerability does not affect Robot Runtime users. A bad actor could create a website that includes malicious code. The vulnerability may be exploited if a Pega Robot Studio developer is deceived into visiting this website during interrogation mode in Robot Studio. |
2026-03-23 | |
| CVE-2025-15606 | 7.1 | HIGH | CWE-20 | 0.1% p24 | 4.97 | A Denial-of-Service (DoS) vulnerability in the httpd component of TP-Link's TD-W...A Denial-of-Service (DoS) vulnerability in the httpd component of TP-Link's TD-W8961N v4.0 due to improper input sanitization, allows crafted requests to trigger a processing error that causes the httpd service to crash. Successful exploitation may allow the attacker to cause service interruption, resulting in a DoS condition. |
2026-03-23 | |
| CVE-2026-4594 | 6.9 | MEDIUM | CWE-89 | 0.0% p10 | 4.83 | A vulnerability has been found in erupts erupt up to 1.13.3. Affected by this is...A vulnerability has been found in erupts erupt up to 1.13.3. Affected by this issue is the function geneEruptHqlOrderBy of the file erupt-data/erupt-jpa/src/main/java/xyz/erupt/jpa/dao/EruptJpaUtils.java. Such manipulation of the argument sort.field leads to sql injection hibernate. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-23 | |
| CVE-2025-15605 | 8.5 | HIGH | CWE-321 | 0.0% p6 | 5.95 | A hardcoded cryptographic key within the configuration mechanism on TP-Link Arch...A hardcoded cryptographic key within the configuration mechanism on TP-Link Archer NX200, NX210, NX500 and NX600 enables decryption and re-encryption of device configuration data. An authenticated attacker may decrypt configuration files, modify them, and re-encrypt them, affecting the confidentiality and integrity of device configuration data. |
2026-03-23 | |
| CVE-2025-15519 | 8.5 | HIGH | CWE-78 | 0.1% p28 | 5.95 | Improper input handling in a modem-management administrative CLI command on TP-L...Improper input handling in a modem-management administrative CLI command on TP-Link Archer NX200, NX210, NX500 and NX600 allows crafted input to be executed as part of an operating system command. An authenticated attacker with administrative privileges may execute arbitrary commands on the operating system, impacting the confidentiality, integrity, and availability of the device. |
2026-03-23 | |
| CVE-2025-15518 | 8.5 | HIGH | CWE-78 | 0.1% p28 | 5.95 | Improper input handling in a wireless-control administrative CLI command on TP-L...Improper input handling in a wireless-control administrative CLI command on TP-Link Archer NX200, NX210, NX500 and NX600 allows crafted input to be executed as part of an operating system command. An authenticated attacker with administrative privileges may execute arbitrary commands on the operating system, impacting the confidentiality, integrity, and availability of the device. |
2026-03-23 | |
| CVE-2025-15517 | 8.6 | HIGH | CWE-306 | 0.1% p17 | 6.02 | A missing authentication check in the HTTP server on TP-Link Archer NX200, NX210...A missing authentication check in the HTTP server on TP-Link Archer NX200, NX210, NX500 and NX600 to certain cgi endpoints allows unauthenticated access intended for authenticated users. An attacker may perform privileged HTTP actions without authentication, including firmware upload and configuration operations. |
2026-03-23 | |
| CVE-2026-4593 | 5.3 | MEDIUM | CWE-89 | 0.0% p8 | 3.71 | A flaw has been found in erupts erupt bis 1.13.3. Affected by this vulnerability...A flaw has been found in erupts erupt bis 1.13.3. Affected by this vulnerability is the function EruptDataQuery of the file erupt-ai/src/main/java/xyz/erupt/ai/call/impl/EruptDataQuery.java of the component MCP Tool Interface. This manipulation causes sql injection hibernate. It is possible to initiate the attack remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-23 | |
| CVE-2026-33507 | 8.8 | HIGH | CWE-352 | 0.1% p18 | 6.16 | WWBN AVideo is an open source video platform. In versions up to and including 26...WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `objects/pluginImport.json.php` endpoint allows admin users to upload and install plugin ZIP files containing executable PHP code, but lacks any CSRF protection. Combined with the application explicitly setting `session.cookie_samesite = 'None'` for HTTPS connections, an unauthenticated attacker can craft a page that, when visited by an authenticated admin, silently uploads a malicious plugin containing a PHP webshell, achieving Remote Code Execution on the server. Commit d1bc1695edd9ad4468a48cea0df6cd943a2635f3 contains a patch. |
2026-03-23 | |
| CVE-2026-33502 | 9.3 | CRITICAL | CWE-918 | 0.1% p16 | 6.51 | WWBN AVideo is an open source video platform. In versions up to and including 26...WWBN AVideo is an open source video platform. In versions up to and including 26.0, an unauthenticated server-side request forgery vulnerability in `plugin/Live/test.php` allows any remote user to make the AVideo server send HTTP requests to arbitrary URLs. This can be used to probe localhost/internal services and, when reachable, access internal HTTP resources or cloud metadata endpoints. Commit 1e6cf03e93b5a5318204b010ea28440b0d9a5ab3 contains a patch. |
2026-03-23 | |
| CVE-2026-33501 | 5.3 | MEDIUM | CWE-862 | 0.1% p35 | 3.71 | WWBN AVideo is an open source video platform. In versions up to and including 26...WWBN AVideo is an open source video platform. In versions up to and including 26.0, the endpoint `plugin/Permissions/View/Users_groups_permissions/list.json.php` lacks any authentication or authorization check, allowing unauthenticated users to retrieve the complete permission matrix mapping user groups to plugins. All sibling endpoints in the same directory (`add.json.php`, `delete.json.php`, `index.php`) properly require `User::isAdmin()`, indicating this is an oversight. Commits dc3c825734628bb32550d0daa125f05bacb6829c and b583acdc9a9d1eab461543caa363e1a104fb4516 contain patches. |
2026-03-23 | |
| CVE-2026-33500 | 5.4 | MEDIUM | CWE-79 | 0.0% p10 | 3.78 | WWBN AVideo is an open source video platform. In versions up to and including 26...WWBN AVideo is an open source video platform. In versions up to and including 26.0, the fix for CVE-2026-27568 (GHSA-rcqw-6466-3mv7) introduced a custom `ParsedownSafeWithLinks` class that sanitizes raw HTML `<a>` and `<img>` tags in comments, but explicitly disables Parsedown's `safeMode`. This creates a bypass: markdown link syntax `[text](javascript:alert(1))` is processed by Parsedown's `inlineLink()` method, which does not go through the custom `sanitizeATag()` sanitization (that only handles raw HTML tags). With `safeMode` disabled, Parsedown's built-in `javascript:` URI filtering (`sanitiseElement()`/`filterUnsafeUrlInAttribute()`) is also inactive. An attacker can inject stored XSS via comment markdown links. Commit 3ae02fa240939dbefc5949d64f05790fd25d728d contains a patch. |
2026-03-23 | |
| CVE-2026-33499 | 6.1 | MEDIUM | CWE-79 | 0.0% p1 | 4.27 | WWBN AVideo is an open source video platform. In versions up to and including 26...WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `view/forbiddenPage.php` and `view/warningPage.php` templates reflect the `$_REQUEST['unlockPassword']` parameter directly into an HTML `<input>` tag's attributes without any output encoding or sanitization. An attacker can craft a URL that breaks out of the `value` attribute and injects arbitrary HTML attributes including JavaScript event handlers, achieving reflected XSS against any visitor who clicks the link. Commit f154167251c9cf183ce09cd018d07e9352310457 contains a patch. |
2026-03-23 | |
| CVE-2026-30007 | 6.2 | MEDIUM | CWE-416 | 0.0% p3 | 4.34 | XnSoft NConvert 7.230 is vulnerable to Use-After-Free via a crafted .tiff fileXnSoft NConvert 7.230 is vulnerable to Use-After-Free via a crafted .tiff file |
2026-03-23 | |
| CVE-2026-30006 | 6.2 | MEDIUM | CWE-120 | 0.0% p3 | 4.34 | XnSoft NConvert 7.230 is vulnerable to Stack Buffer Overrun via a crafted .tiff ...XnSoft NConvert 7.230 is vulnerable to Stack Buffer Overrun via a crafted .tiff file. |
2026-03-23 | |
| CVE-2026-26829 | 7.5 | HIGH | CWE-476 | 1.2% p78 | 5.28 | A NULL pointer dereference in the safe_atou64 function (src/misc.c) of owntone-s...A NULL pointer dereference in the safe_atou64 function (src/misc.c) of owntone-server through commit c4d57aa allows attackers to cause a Denial of Service (DoS) via sending a series of crafted HTTP requests to the server. |
2026-03-23 | |
| CVE-2026-26828 | 7.5 | HIGH | CWE-476 | 0.1% p15 | 5.25 | A NULL pointer dereference in the daap_reply_playlists function (src/httpd_daap....A NULL pointer dereference in the daap_reply_playlists function (src/httpd_daap.c) of owntone-server commit 3d1652d allows attackers to cause a Denial of Service (DoS) via sending a crafted DAAP request to the server |
2026-03-23 | |
| CVE-2026-24516 | 8.8 | HIGH | CWE-94 | 0.3% p53 | 6.17 | A command injection vulnerability exists in DigitalOcean Droplet Agent through 1...A command injection vulnerability exists in DigitalOcean Droplet Agent through 1.3.2. The troubleshooting actioner component (internal/troubleshooting/actioner/actioner.go) processes metadata from the metadata service endpoint and executes commands specified in the TroubleshootingAgent.Requesting array without adequate input validation. While the code validates that artifacts exist in the validInvestigationArtifacts map, it fails to sanitize the actual command content after the "command:" prefix. This allows an attacker who can control metadata responses to inject and execute arbitrary OS commands with root privileges. The attack is triggered by sending a TCP packet with specific sequence numbers to the SSH port, which causes the agent to fetch metadata from http://169.254.169.254/metadata/v1.json. The vulnerability affects the command execution flow in internal/troubleshooting/actioner/actioner.go (insufficient validation), internal/troubleshooting/command/exec.go (direct exec.CommandContext call), and internal/troubleshooting/command/command.go (command parsing without sanitization). This can lead to complete system compromise, data exfiltration, privilege escalation, and potential lateral movement across cloud infrastructure. |
2026-03-23 | |
| CVE-2026-4592 | 6.3 | MEDIUM | CWE-287 | 0.1% p22 | 4.41 | A security vulnerability has been detected in kalcaddle kodbox 1.64. This impact...A security vulnerability has been detected in kalcaddle kodbox 1.64. This impacts the function loginAfter/tfaVerify of the file /workspace/source-code/plugins/client/controller/tfa/index.class.php of the component Password Login. The manipulation leads to improper authentication. The attack is possible to be carried out remotely. The attack is considered to have high complexity. The exploitability is said to be difficult. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-23 | |
| CVE-2026-4591 | 5.1 | MEDIUM | CWE-77 | 0.3% p55 | 3.58 | A weakness has been identified in kalcaddle kodbox 1.64. This affects the functi...A weakness has been identified in kalcaddle kodbox 1.64. This affects the function checkBin of the file /workspace/source-code/plugins/fileThumb/app.php of the component fileThumb Endpoint. Executing a manipulation can lead to os command injection. The attack can be executed remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-23 | |
| CVE-2026-33493 | 7.1 | HIGH | CWE-22 | 0.1% p23 | 4.97 | WWBN AVideo is an open source video platform. In versions up to and including 26...WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `objects/import.json.php` endpoint accepts a user-controlled `fileURI` POST parameter with only a regex check that the value ends in `.mp4`. Unlike `objects/listFiles.json.php`, which was hardened with a `realpath()` + directory prefix check to restrict paths to the `videos/` directory, `import.json.php` performs no directory restriction. This allows an authenticated user with upload permission to: (1) steal any other user's private video files by importing them into their own account, (2) read `.txt`/`.html`/`.htm` files adjacent to any `.mp4` file on the filesystem, and (3) delete `.mp4` and adjacent text files if writable by the web server process. Commit e110ff542acdd7e3b81bdd02b8402b9f6a61ad78 contains a patch. |
2026-03-23 | |
| CVE-2026-33492 | 7.3 | HIGH | CWE-384 | 0.1% p22 | 5.11 | WWBN AVideo is an open source video platform. In versions up to and including 26...WWBN AVideo is an open source video platform. In versions up to and including 26.0, AVideo's `_session_start()` function accepts arbitrary session IDs via the `PHPSESSID` GET parameter and sets them as the active PHP session. A session regeneration bypass exists for specific blacklisted endpoints when the request originates from the same domain. Combined with the explicitly disabled session regeneration in `User::login()`, this allows a classic session fixation attack where an attacker can fix a victim's session ID before authentication and then hijack the authenticated session. Commit 5647a94d79bf69a972a86653fe02144079948785 contains a patch. |
2026-03-23 | |
| CVE-2026-33488 | 7.4 | HIGH | CWE-326 | 0.0% p5 | 5.18 | WWBN AVideo is an open source video platform. In versions up to and including 26...WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `createKeys()` function in the LoginControl plugin's PGP 2FA system generates 512-bit RSA keys, which have been publicly factorable since 1999. An attacker who obtains a target user's public key can factor the 512-bit RSA modulus on commodity hardware in hours, derive the complete private key, and decrypt any PGP 2FA challenge issued by the system — completely bypassing the second authentication factor. Additionally, the `generateKeys.json.php` and `encryptMessage.json.php` endpoints lack any authentication checks, exposing CPU-intensive key generation to anonymous users. Commit 00d979d87f8182095c8150609153a43f834e351e contains a patch. |
2026-03-23 | |
| CVE-2026-32845 | 6.9 | MEDIUM | CWE-190 | 0.0% p3 | 4.83 | cgltf version 1.15 and prior contain an integer overflow vulnerability in the cg...cgltf version 1.15 and prior contain an integer overflow vulnerability in the cgltf_validate() function when validating sparse accessors that allows attackers to trigger out-of-bounds reads by supplying crafted glTF/GLB input files with attacker-controlled size values. Attackers can exploit unchecked arithmetic operations in sparse accessor validation to cause heap buffer over-reads in cgltf_calc_index_bound(), resulting in denial of service crashes and potential memory disclosure. |
2026-03-23 | |
| CVE-2024-51226 | 6.1 | MEDIUM | CWE-79 | 0.0% p10 | 4.27 | A stored cross-site scripting (XSS) vulnerability in the component /admin/search...A stored cross-site scripting (XSS) vulnerability in the component /admin/search-vehicle.php of Phpgurukul Vehicle Record Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the Search parameter. |
2026-03-23 | |
| CVE-2024-51225 | 4.8 | MEDIUM | CWE-79 | 0.0% p9 | 3.36 | A stored cross-site scripting (XSS) vulnerability in the component /admin/add-br...A stored cross-site scripting (XSS) vulnerability in the component /admin/add-brand.php of Phpgurukul Vehicle Record Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the brandname parameter. |
2026-03-23 | |
| CVE-2024-51224 | 4.8 | MEDIUM | CWE-79 | 0.0% p9 | 3.36 | Multiple cross-site scripting (XSS) vulnerabilities in the component /admin/edit...Multiple cross-site scripting (XSS) vulnerabilities in the component /admin/edit-vehicle.php of Phpgurukul Vehicle Record Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the vehiclename, modelnumber, regnumber, vehiclesubtype, chasisnum and enginenumber parameters. |
2026-03-23 | |
| CVE-2024-51223 | 4.8 | MEDIUM | CWE-79 | 0.0% p9 | 3.36 | A stored cross-site scripting (XSS) vulnerability in the component /admin/profil...A stored cross-site scripting (XSS) vulnerability in the component /admin/profile.php of Phpgurukul Vehicle Record Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the Mobile Number parameter. |
2026-03-23 | |
| CVE-2024-51222 | 4.8 | MEDIUM | CWE-79 | 0.0% p9 | 3.36 | A stored cross-site scripting (XSS) vulnerability in the component /admin/profil...A stored cross-site scripting (XSS) vulnerability in the component /admin/profile.php of Phpgurukul Vehicle Record Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the Name parameter. |
2026-03-23 | |
| CVE-2026-4590 | 2.3 | LOW | CWE-352 | 0.0% p3 | 1.61 | A security flaw has been discovered in kalcaddle kodbox 1.64. The impacted eleme...A security flaw has been discovered in kalcaddle kodbox 1.64. The impacted element is an unknown function of the file /workspace/source-code/plugins/oauth/controller/bind/index.class.php of the component loginSubmit API. Performing a manipulation of the argument third results in cross-site request forgery. Remote exploitation of the attack is possible. A high degree of complexity is needed for the attack. The exploitability is regarded as difficult. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-23 | |
| CVE-2026-4404 | 9.4 | CRITICAL | CWE-798 | 0.1% p17 | 6.58 | Use of hard coded credentials in GoHarbor Harbor version 2.15.0 and below, allow...Use of hard coded credentials in GoHarbor Harbor version 2.15.0 and below, allows attackers to use the default password and gain access to the web UI. |
2026-03-23 | |
| CVE-2026-33485 | 7.5 | HIGH | CWE-89 | 0.2% p43 | 5.26 | WWBN AVideo is an open source video platform. In versions up to and including 26...WWBN AVideo is an open source video platform. In versions up to and including 26.0, the RTMP `on_publish` callback at `plugin/Live/on_publish.php` is accessible without authentication. The `$_POST['name']` parameter (stream key) is interpolated directly into SQL queries in two locations — `LiveTransmitionHistory::getLatest()` and `LiveTransmition::keyExists()` — without parameterized binding or escaping. An unauthenticated attacker can exploit time-based blind SQL injection to extract all database contents including user password hashes, email addresses, and other sensitive data. Commit af59eade82de645b20183cc3d74467a7eac76549 contains a patch. |
2026-03-23 | |
| CVE-2026-33483 | 7.5 | HIGH | CWE-770 | 0.4% p60 | 5.26 | WWBN AVideo is an open source video platform. In versions up to and including 26...WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `aVideoEncoderChunk.json.php` endpoint is a completely standalone PHP script with no authentication, no framework includes, and no resource limits. An unauthenticated remote attacker can send arbitrary POST data which is written to persistent temp files in `/tmp/` with no size cap, no rate limiting, and no cleanup mechanism. This allows trivial disk space exhaustion leading to denial of service of the entire server. Commit 33d1bae6c731ef1682fcdc47b428313be073a5d1 contains a patch. |
2026-03-23 | |
| CVE-2026-33482 | 8.1 | HIGH | CWE-78 | 0.1% p25 | 5.67 | WWBN AVideo is an open source video platform. In versions up to and including 26...WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `sanitizeFFmpegCommand()` function in `plugin/API/standAlone/functions.php` is designed to prevent OS command injection in ffmpeg commands by stripping dangerous shell metacharacters (`&&`, `;`, `|`, `` ` ``, `<`, `>`). However, it fails to strip `$()` (bash command substitution syntax). Since the sanitized command is executed inside a double-quoted `sh -c` context in `execAsync()`, an attacker who can craft a valid encrypted payload can achieve arbitrary command execution on the standalone encoder server. Commit 25c8ab90269e3a01fb4cf205b40a373487f022e1 contains a patch. |
2026-03-23 | |
| CVE-2026-33480 | 8.6 | HIGH | CWE-918 | 0.0% p13 | 6.02 | WWBN AVideo is an open source video platform. In versions up to and including 26...WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `isSSRFSafeURL()` function in AVideo can be bypassed using IPv4-mapped IPv6 addresses (`::ffff:x.x.x.x`). The unauthenticated `plugin/LiveLinks/proxy.php` endpoint uses this function to validate URLs before fetching them with curl, but the IPv4-mapped IPv6 prefix passes all checks, allowing an attacker to access cloud metadata services, internal networks, and localhost services. Commit 75ce8a579a58c9d4c7aafe453fbced002cb8f373 contains a patch. |
2026-03-23 | |
| CVE-2026-33479 | 8.8 | HIGH | CWE-94 | 0.1% p34 | 6.16 | WWBN AVideo is an open source video platform. In versions up to and including 26...WWBN AVideo is an open source video platform. In versions up to and including 26.0, the Gallery plugin's `saveSort.json.php` endpoint passes unsanitized user input from `$_REQUEST['sections']` array values directly into PHP's `eval()` function. While the endpoint is gated behind `User::isAdmin()`, it has no CSRF token validation. Combined with AVideo's explicit `SameSite=None` session cookie configuration, an attacker can exploit this via cross-site request forgery to achieve unauthenticated remote code execution — requiring only that an admin visits an attacker-controlled page. Commit 087dab8841f8bdb54be184105ef19b47c5698fcb contains a patch. |
2026-03-23 | |
| CVE-2026-33478 | 10.0 | CRITICAL | CWE-78 | 20.6% p95 | 7.62 | WWBN AVideo is an open source video platform. In versions up to and including 26...WWBN AVideo is an open source video platform. In versions up to and including 26.0, multiple vulnerabilities in AVideo's CloneSite plugin chain together to allow a completely unauthenticated attacker to achieve remote code execution. The `clones.json.php` endpoint exposes clone secret keys without authentication, which can be used to trigger a full database dump via `cloneServer.json.php`. The dump contains admin password hashes stored as MD5, which are trivially crackable. With admin access, the attacker exploits an OS command injection in the rsync command construction in `cloneClient.json.php` to execute arbitrary system commands. Commit c85d076375fab095a14170df7ddb27058134d38c contains a patch. |
2026-03-23 | |
| CVE-2026-33354 | 7.6 | HIGH | CWE-73 | 0.0% p10 | 5.32 | WWBN AVideo is an open source video platform. In versions up to and including 26...WWBN AVideo is an open source video platform. In versions up to and including 26.0, `POST /objects/aVideoEncoder.json.php` accepts a requester-controlled `chunkFile` parameter intended for staged upload chunks. Instead of restricting that path to trusted server-generated chunk locations, the endpoint accepts arbitrary local filesystem paths that pass `isValidURLOrPath()`. That helper allows files under broad server directories including `/var/www/`, the application root, cache, tmp, and `videos`, only rejecting `.php` files. For an authenticated uploader editing their own video, this becomes an arbitrary local file read. The endpoint copies the attacker-chosen local file into the attacker's public video storage path, after which it can be downloaded over HTTP. Commit 59bbd601a3f65a5b18c1d9e4eb11471c0a59214f contains a patch for the issue. |
2026-03-23 | |
| CVE-2026-4647 | 6.1 | MEDIUM | CWE-125 | 0.0% p1 | 4.27 | A flaw was found in the GNU Binutils BFD library, a widely used component for ha...A flaw was found in the GNU Binutils BFD library, a widely used component for handling binary files such as object files and executables. The issue occurs when processing specially crafted XCOFF object files, where a relocation type value is not properly validated before being used. This can cause the program to read memory outside of intended bounds. As a result, affected tools may crash or expose unintended memory contents, leading to denial-of-service or limited information disclosure risks. |
2026-03-23 | |
| CVE-2026-4645 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: Duplicate of CVE-2026-32287Rejected reason: Duplicate of CVE-2026-32287 |
2026-03-23 | |
| CVE-2026-4589 | 5.3 | MEDIUM | CWE-918 | 0.0% p11 | 3.71 | A vulnerability was identified in kalcaddle kodbox 1.64. The affected element is...A vulnerability was identified in kalcaddle kodbox 1.64. The affected element is the function PathDriverUrl of the file /workspace/source-code/app/controller/explorer/editor.class.php of the component fileGet Endpoint. Such manipulation of the argument path leads to server-side request forgery. The attack may be launched remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way. Statistical analysis made it clear that VulDB provides the best quality for vulnerability data. |
2026-03-23 | |
| CVE-2026-33352 | 9.8 | CRITICAL | CWE-89 | 0.0% p11 | 6.86 | WWBN AVideo is an open source video platform. Prior to version 26.0, an unauthen...WWBN AVideo is an open source video platform. Prior to version 26.0, an unauthenticated SQL injection vulnerability exists in `objects/category.php` in the `getAllCategories()` method. The `doNotShowCats` request parameter is sanitized only by stripping single-quote characters (`str_replace("'", '', ...)`), but this is trivially bypassed using a backslash escape technique to shift SQL string boundaries. The parameter is not covered by any of the application's global input filters in `objects/security.php`. Version 26.0 contains a patch for the issue. |
2026-03-23 | |
| CVE-2026-33351 | 9.1 | CRITICAL | CWE-918 | 0.1% p24 | 6.37 | WWBN AVideo is an open source video platform. Prior to version 26.0, a Server-Si...WWBN AVideo is an open source video platform. Prior to version 26.0, a Server-Side Request Forgery (SSRF) vulnerability exists in `plugin/Live/standAloneFiles/saveDVR.json.php`. When the AVideo Live plugin is deployed in standalone mode (the intended configuration for this file), the `$_REQUEST['webSiteRootURL']` parameter is used directly to construct a URL that is fetched server-side via `file_get_contents()`. No authentication, origin validation, or URL allowlisting is performed. Version 26.0 contains a patch for the issue. |
2026-03-23 | |
| CVE-2026-33297 | 5.1 | MEDIUM | CWE-639 | 0.0% p10 | 3.57 | WWBN AVideo is an open source video platform. Prior to version 26.0, the `setPas...WWBN AVideo is an open source video platform. Prior to version 26.0, the `setPassword.json.php` endpoint in the CustomizeUser plugin allows administrators to set a channel password for any user. Due to a logic error in how the submitted password value is processed, any password containing non-numeric characters is silently coerced to the integer zero before being stored. This means that regardless of the intended password, the stored channel password becomes 0, which any visitor can trivially guess to bypass channel-level access control. Version 26.0 contains a patch for the issue. |
2026-03-23 | |
| CVE-2025-41008 | 9.3 | CRITICAL | CWE-89 | 0.0% p11 | 6.51 | SQL injection vulnerability in Sinturno. This vulnerability allows an attacker t...SQL injection vulnerability in Sinturno. This vulnerability allows an attacker to retrieve, create, update, and delete databases through the 'client' parameter in the '/_adm/scripts/modalReport_data.php' endpoint. |
2026-03-23 | |
| CVE-2019-25625 | 6.9 | MEDIUM | CWE-1285 | 0.0% p4 | 4.83 | Blob Studio 2.17 contains a denial of service vulnerability that allows local at...Blob Studio 2.17 contains a denial of service vulnerability that allows local attackers to crash the application by providing malformed input through the key entry mechanism. Attackers can create a text file with a large buffer of repeated characters and trigger the application to read it, causing the application to crash or become unresponsive. |
2026-03-23 | |
| CVE-2019-25624 | 6.9 | MEDIUM | CWE-606 | 0.0% p4 | 4.83 | Liquid Studio 2.17 contains a denial of service vulnerability that allows local ...Liquid Studio 2.17 contains a denial of service vulnerability that allows local attackers to crash the application by providing malformed input through the keyboard interface. Attackers can trigger the vulnerability by entering arbitrary characters during application runtime, causing the application to become unresponsive or terminate abnormally. |
2026-03-23 | |
| CVE-2019-25623 | 6.9 | MEDIUM | CWE-641 | 0.0% p4 | 4.83 | Luminance Studio 2.17 contains a denial of service vulnerability that allows loc...Luminance Studio 2.17 contains a denial of service vulnerability that allows local attackers to crash the application by providing malformed input through the keyboard interface. Attackers can create a text file with arbitrary character sequences and trigger the application to process the input, causing the application to become unresponsive or terminate abnormally. |
2026-03-23 | |
| CVE-2019-25622 | 6.9 | MEDIUM | CWE-1285 | 0.0% p4 | 4.83 | Paint Studio 2.17 contains a denial of service vulnerability that allows local a...Paint Studio 2.17 contains a denial of service vulnerability that allows local attackers to crash the application by providing malformed input through the key entry mechanism. Attackers can create a text file with a large buffer of characters and trigger the application to read it, causing the application to crash and become unavailable. |
2026-03-23 | |
| CVE-2019-25621 | 6.9 | MEDIUM | CWE-807 | 0.0% p5 | 4.83 | Pixel Studio 2.17 contains a denial of service vulnerability that allows local a...Pixel Studio 2.17 contains a denial of service vulnerability that allows local attackers to crash the application by providing malformed input through the keyboard interface. Attackers can trigger the vulnerability by entering arbitrary characters, causing the application to become unresponsive or terminate abnormally. |
2026-03-23 | |
| CVE-2019-25620 | 6.9 | MEDIUM | CWE-168 | 0.0% p3 | 4.83 | Tree Studio 2.17 contains a denial of service vulnerability that allows local at...Tree Studio 2.17 contains a denial of service vulnerability that allows local attackers to crash the application by providing malformed input through the keyboard interface. Attackers can trigger the vulnerability by entering arbitrary characters during application runtime, causing the application to become unresponsive or terminate abnormally. |
2026-03-23 | |
| CVE-2026-4587 | 6.3 | MEDIUM | CWE-287 | 0.0% p6 | 4.41 | A vulnerability was found in HybridAuth up to 3.12.2. This issue affects some un...A vulnerability was found in HybridAuth up to 3.12.2. This issue affects some unknown processing of the file src/HttpClient/Curl.php of the component SSL Handler. The manipulation of the argument curlOptions results in improper certificate validation. The attack can be launched remotely. This attack is characterized by high complexity. The exploitability is assessed as difficult. The project was informed of the problem early through an issue report but has not responded yet. |
2026-03-23 | |
| CVE-2026-4586 | 5.3 | MEDIUM | CWE-284 | 0.0% p11 | 3.71 | A vulnerability was found in CodePhiliaX Chat2DB up to 0.3.7. This affects the f...A vulnerability was found in CodePhiliaX Chat2DB up to 0.3.7. This affects the function Upload of the file chat2db-server/chat2db-server-web/chat2db-server-web-api/src/main/java/ai/chat2db/server/web/api/controller/driver/JdbcDriverController.java of the component JDBC Driver Upload. Performing a manipulation results in unrestricted upload. The attack can be initiated remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-23 | |
| CVE-2026-31851 | 7.7 | HIGH | CWE-307 | 0.0% p7 | 5.39 | Nexxt Solutions Nebula 300+ firmware through version 12.01.01.37 does not implem...Nexxt Solutions Nebula 300+ firmware through version 12.01.01.37 does not implement rate limiting or account lockout mechanisms on authentication interfaces. An attacker can perform unlimited authentication attempts against endpoints that rely on credential validation, enabling brute-force attacks to guess administrative credentials without restriction. |
2026-03-23 | |
| CVE-2026-31850 | 6.8 | MEDIUM | CWE-256 | 0.0% p2 | 4.76 | Nexxt Solutions Nebula 300+ firmware through version 12.01.01.37 stores sensitiv...Nexxt Solutions Nebula 300+ firmware through version 12.01.01.37 stores sensitive information, including administrative credentials and WiFi pre-shared keys, in plaintext within exported configuration backup files. These backup files can be obtained through legitimate functionality or other weaknesses and do not apply encryption or hashing, allowing attackers to directly extract sensitive information. |
2026-03-23 | |
| CVE-2026-31849 | 7.2 | HIGH | CWE-352 | 0.0% p6 | 5.04 | Nexxt Solutions Nebula 300+ firmware through version 12.01.01.37 does not implem...Nexxt Solutions Nebula 300+ firmware through version 12.01.01.37 does not implement CSRF protections on state-changing endpoints such as /goform/setSysTools and other administrative interfaces. As a result, an attacker can craft malicious web requests that are executed in the context of an authenticated administrator’s browser, leading to unauthorized configuration changes, including enabling services or modifying system settings. |
2026-03-23 | |
| CVE-2026-31848 | 8.7 | HIGH | CWE-312 | 0.0% p4 | 6.09 | Nexxt Solutions Nebula 300+ firmware through version 12.01.01.37 uses the ecos_p...Nexxt Solutions Nebula 300+ firmware through version 12.01.01.37 uses the ecos_pw cookie for authentication, which contains Base64-encoded credential data combined with a static suffix. Because the encoding is reversible and lacks integrity protection, an attacker can reconstruct or forge a valid cookie value without proper authentication. This allows unauthorized administrative access to protected endpoints. |
2026-03-23 | |
| CVE-2026-31847 | 8.5 | HIGH | CWE-912 | 0.0% p8 | 5.95 | Hidden functionality in the /goform/setSysTools endpoint in Nexxt Solutions Nebu...Hidden functionality in the /goform/setSysTools endpoint in Nexxt Solutions Nebula 300+ firmware through version 12.01.01.37 allows remote enablement of a Telnet service. By sending a crafted POST request with parameters such as telnetManageEn=true and telnetPwd, an authenticated attacker can activate a Telnet service on port 23. This exposes a privileged diagnostic interface that is not intended for external access and can be used to interact with the underlying system. |
2026-03-23 | |
| CVE-2025-41007 | 9.3 | CRITICAL | CWE-89 | 0.0% p11 | 6.51 | SQL Injection in Cuantis. This vulnerability allows an attacker to retrieve, cre...SQL Injection in Cuantis. This vulnerability allows an attacker to retrieve, create, update and delete databases through the 'search' parameter in the '/search.php' endpoint. |
2026-03-23 | |
| CVE-2026-4585 | 8.9 | HIGH | CWE-77 | 0.2% p44 | 6.24 | A vulnerability has been found in Tiandy Easy7 Integrated Management Platform up...A vulnerability has been found in Tiandy Easy7 Integrated Management Platform up to 7.17.0. This vulnerability affects unknown code of the file /Easy7/apps/WebService/ImportSystemConfiguration.jsp of the component Configuration Handler. The manipulation of the argument File leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-23 | |
| CVE-2026-4584 | 2.3 | LOW | CWE-310 | 0.0% p0 | 1.61 | A flaw has been found in Shenzhen HCC Technology MPOS M6 PLUS 1V.31-N. This affe...A flaw has been found in Shenzhen HCC Technology MPOS M6 PLUS 1V.31-N. This affects an unknown part of the component Cardholder Data Handler. Executing a manipulation can lead to cleartext transmission of sensitive information. The attack requires access to the local network. The attack requires a high level of complexity. It is indicated that the exploitability is difficult. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-23 | |
| CVE-2026-32969 | 7.5 | HIGH | CWE-89 | 0.2% p38 | 5.26 | An unauthenticated remote attacker can exploit a Pre-Auth blind SQL Injection vu...An unauthenticated remote attacker can exploit a Pre-Auth blind SQL Injection vulnerability in the userinfo endpoint’s authentication method due to improper neutralization of special elements in a SQL SELECT command. This can result in a total loss of confidentiality. |
2026-03-23 | |
| CVE-2026-32968 | 9.8 | CRITICAL | CWE-78 | 0.1% p35 | 6.86 | Due to the improper neutralisation of special elements used in an OS command, an...Due to the improper neutralisation of special elements used in an OS command, an unauthenticated remote attacker can exploit an RCE vulnerability in the com_mb24sysapi module, resulting in full system compromise. This vulnerability is a variant attack for CVE-2020-10383. |
2026-03-23 | |
| CVE-2026-31846 | 7.1 | HIGH | CWE-306 | 0.0% p12 | 4.97 | Missing authentication in the /goform/ate endpoint in Nexxt Solutions Nebula 300...Missing authentication in the /goform/ate endpoint in Nexxt Solutions Nebula 300+ firmware through version 12.01.01.37 allows an adjacent unauthenticated attacker to retrieve sensitive device information, including the administrator password. The endpoint returns a raw response containing parameters such as Login_PW, which is Base64-encoded. An attacker can decode this value to obtain valid administrative credentials and authenticate to the device. |
2026-03-23 | |
| CVE-2026-4633 | 3.7 | LOW | CWE-209 | 0.0% p11 | 2.59 | A flaw was found in Keycloak. A remote attacker can exploit differential error m...A flaw was found in Keycloak. A remote attacker can exploit differential error messages during the identity-first login flow when Organizations are enabled. This vulnerability allows an attacker to determine the existence of users, leading to information disclosure through user enumeration. |
2026-03-23 | |
| CVE-2026-4583 | 2.3 | LOW | CWE-287 | 0.0% p12 | 1.61 | A vulnerability was detected in Shenzhen HCC Technology MPOS M6 PLUS 1V.31-N. Af...A vulnerability was detected in Shenzhen HCC Technology MPOS M6 PLUS 1V.31-N. Affected by this issue is some unknown functionality of the component Bluetooth Handler. Performing a manipulation results in authentication bypass by capture-replay. The attack must originate from the local network. The attack is considered to have high complexity. The exploitation is known to be difficult. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-23 | |
| CVE-2026-4582 | 2.3 | LOW | CWE-287 | 0.0% p8 | 1.61 | A security vulnerability has been detected in Shenzhen HCC Technology MPOS M6 PL...A security vulnerability has been detected in Shenzhen HCC Technology MPOS M6 PLUS 1V.31-N. Affected by this vulnerability is an unknown functionality of the component Bluetooth. Such manipulation leads to missing authentication. The attack must be carried out from within the local network. Attacks of this nature are highly complex. The exploitation appears to be difficult. The vendor was contacted early about this disclosure but did not respond in any way. Statistical analysis made it clear that VulDB provides the best quality for vulnerability data. |
2026-03-23 | |
| CVE-2026-4581 | 6.9 | MEDIUM | CWE-74 | 0.0% p10 | 4.83 | A weakness has been identified in code-projects Simple Laundry System 1.0. Affec...A weakness has been identified in code-projects Simple Laundry System 1.0. Affected is an unknown function of the file /checklogin.php of the component Parameters Handler. This manipulation of the argument Username causes sql injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be used for attacks. If you want to get best quality of vulnerability data, you may have to visit VulDB. |
2026-03-23 | |
| CVE-2026-4628 | 4.3 | MEDIUM | CWE-284 | 0.0% p6 | 3.01 | A flaw was found in Keycloak. An improper Access Control vulnerability in Keyclo...A flaw was found in Keycloak. An improper Access Control vulnerability in Keycloak’s User-Managed Access (UMA) resource_set endpoint allows attackers with valid credentials to bypass the allowRemoteResourceManagement=false restriction. This occurs due to incomplete enforcement of access control checks on PUT operations to the resource_set endpoint. This issue enables unauthorized modification of protected resources, impacting data integrity. |
2026-03-23 | |
| CVE-2026-4580 | 6.9 | MEDIUM | CWE-74 | 0.0% p10 | 4.83 | A security flaw has been discovered in code-projects Simple Laundry System 1.0. ...A security flaw has been discovered in code-projects Simple Laundry System 1.0. This impacts an unknown function of the file /checkupdatestatus.php of the component Parameters Handler. The manipulation of the argument serviceId results in sql injection. The attack can be executed remotely. The exploit has been released to the public and may be used for attacks. |
2026-03-23 | |
| CVE-2026-4579 | 6.9 | MEDIUM | CWE-74 | 0.0% p10 | 4.83 | A vulnerability was identified in code-projects Simple Laundry System 1.0. This ...A vulnerability was identified in code-projects Simple Laundry System 1.0. This affects an unknown function of the file /viewdetail.php of the component Parameters Handler. The manipulation of the argument serviceId leads to sql injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used. |
2026-03-23 | |
| CVE-2026-4578 | 4.8 | MEDIUM | CWE-79 | 0.0% p9 | 3.36 | A vulnerability was determined in code-projects Exam Form Submission 1.0. The im...A vulnerability was determined in code-projects Exam Form Submission 1.0. The impacted element is an unknown function of the file /admin/update_s3.php. Executing a manipulation of the argument sname can lead to cross site scripting. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized. |
2026-03-23 | |
| CVE-2026-3587 | 10.0 | CRITICAL | CWE-912 | 0.1% p30 | 7.00 | An unauthenticated remote attacker can exploit a hidden function in the CLI prom...An unauthenticated remote attacker can exploit a hidden function in the CLI prompt to escape the restricted interface, leading to full compromise of the device. |
2026-03-23 | |
| CVE-2026-4577 | 4.8 | MEDIUM | CWE-79 | 0.0% p9 | 3.36 | A vulnerability was found in code-projects Exam Form Submission 1.0. The affecte...A vulnerability was found in code-projects Exam Form Submission 1.0. The affected element is an unknown function of the file /admin/update_s4.php. Performing a manipulation of the argument sname results in cross site scripting. The attack may be initiated remotely. The exploit has been made public and could be used. |
2026-03-23 | |
| CVE-2025-6229 | 6.4 | MEDIUM | CWE-79 | 0.0% p9 | 4.48 | The Sina Extension for Elementor (Header Builder, Footer Builter, Theme Builder,...The Sina Extension for Elementor (Header Builder, Footer Builter, Theme Builder, Slider, Gallery, Form, Modal, Data Table Free Elementor Widgets & Elementor Templates) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the `Fancy Text Widget` And `Countdown Widget` DOM attributes in all versions up to, and including, 3.7.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-03-23 | |
| CVE-2026-4603 | 5.1 | MEDIUM | CWE-369 | 0.0% p0 | 3.57 | Versions of the package jsrsasign before 11.1.1 are vulnerable to Division by ze...Versions of the package jsrsasign before 11.1.1 are vulnerable to Division by zero due to the RSASetPublic/KEYUTIL parsing path in ext/rsa.js and the BigInteger.modPowInt reduction logic in ext/jsbn.js. An attacker can force RSA public-key operations (e.g., verify and encryption) to collapse to deterministic zero outputs and hide “invalid key” errors by supplying a JWK whose modulus decodes to zero. |
2026-03-23 | |
| CVE-2026-4602 | 7.7 | HIGH | CWE-681 | 0.1% p15 | 5.39 | Versions of the package jsrsasign before 11.1.1 are vulnerable to Incorrect Conv...Versions of the package jsrsasign before 11.1.1 are vulnerable to Incorrect Conversion between Numeric Types due to handling negative exponents in ext/jsbn2.js. An attacker can force the computation of incorrect modular inverses and break signature verification by calling modPow with a negative exponent. |
2026-03-23 | |
| CVE-2026-4601 | 9.4 | CRITICAL | CWE-325 | 0.0% p3 | 6.58 | Versions of the package jsrsasign before 11.1.1 are vulnerable to Missing Crypto...Versions of the package jsrsasign before 11.1.1 are vulnerable to Missing Cryptographic Step via the KJUR.crypto.DSA.signWithMessageHash process in the DSA signing implementation. An attacker can recover the private key by forcing r or s to be zero, so the library emits an invalid signature without retrying, and then solves for x from the resulting signature. |
2026-03-23 | |
| CVE-2026-4600 | 9.1 | CRITICAL | CWE-347 | 0.0% p1 | 6.37 | Versions of the package jsrsasign before 11.1.1 are vulnerable to Improper Verif...Versions of the package jsrsasign before 11.1.1 are vulnerable to Improper Verification of Cryptographic Signature via the DSA domain-parameter validation in KJUR.crypto.DSA.setPublic (and the related DSA/X509 verification flow in src/dsa-2.0.js). An attacker can forge DSA signatures or X.509 certificates that X509.verifySignature() accepts by supplying malicious domain parameters such as g=1, y=1, and a fixed r=1, which make the verification equation true for any hash. |
2026-03-23 | |
| CVE-2026-4599 | 9.3 | CRITICAL | CWE-1023 | 0.0% p10 | 6.51 | Versions of the package jsrsasign from 7.0.0 and before 11.1.1 are vulnerable to...Versions of the package jsrsasign from 7.0.0 and before 11.1.1 are vulnerable to Incomplete Comparison with Missing Factors via the getRandomBigIntegerZeroToMax and getRandomBigIntegerMinToMax functions in src/crypto-1.1.js; an attacker can recover the private key by exploiting the incorrect compareTo checks that accept out-of-range candidates and thus bias DSA nonces during signature generation. |
2026-03-23 | |
| CVE-2026-4598 | 7.7 | HIGH | CWE-835 | 0.1% p15 | 5.39 | Versions of the package jsrsasign before 11.1.1 are vulnerable to Infinite loop ...Versions of the package jsrsasign before 11.1.1 are vulnerable to Infinite loop via the bnModInverse function in ext/jsbn2.js when the BigInteger.modInverse implementation receives zero or negative inputs, allowing an attacker to hang the process permanently by supplying such crafted values (e.g., modInverse(0, m) or modInverse(-1, m)). |
2026-03-23 | |
| CVE-2026-4576 | 4.8 | MEDIUM | CWE-79 | 0.0% p9 | 3.36 | A vulnerability has been found in code-projects Exam Form Submission 1.0. Impact...A vulnerability has been found in code-projects Exam Form Submission 1.0. Impacted is an unknown function of the file /admin/update_s5.php. Such manipulation of the argument sname leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. |
2026-03-23 | |
| CVE-2026-4575 | 4.8 | MEDIUM | CWE-79 | 0.0% p9 | 3.36 | A flaw has been found in code-projects Exam Form Submission 1.0. This issue affe...A flaw has been found in code-projects Exam Form Submission 1.0. This issue affects some unknown processing of the file /admin/update_s2.php. This manipulation of the argument sname causes cross site scripting. The attack can be initiated remotely. The exploit has been published and may be used. |
2026-03-23 | |
| CVE-2026-4574 | 5.3 | MEDIUM | CWE-74 | 0.0% p8 | 3.71 | A vulnerability was detected in SourceCodester Simple E-learning System 1.0. Thi...A vulnerability was detected in SourceCodester Simple E-learning System 1.0. This vulnerability affects unknown code of the component User Profile Update Handler. The manipulation of the argument firstName results in sql injection. It is possible to launch the attack remotely. The exploit is now public and may be used. |
2026-03-23 | |
| CVE-2026-4573 | 5.3 | MEDIUM | CWE-74 | 0.0% p8 | 3.71 | A security vulnerability has been detected in SourceCodester Simple E-learning S...A security vulnerability has been detected in SourceCodester Simple E-learning System 1.0. This affects an unknown part of the file /includes/form_handlers/delete_post.php of the component HTTP GET Parameter Handler. The manipulation of the argument post_id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used. |
2026-03-23 | |
| CVE-2026-1969 | 5.3 | MEDIUM | CWE-434 | 0.1% p15 | 3.71 | The trx_addons WordPress plugin before 2.38.5 does not correctly validate file t...The trx_addons WordPress plugin before 2.38.5 does not correctly validate file types in one of its AJAX action, allowing unauthenticated users to upload arbitrary file. This is due to an incorrect fix of CVE-2024-13448 |
2026-03-23 | |
| CVE-2025-10734 | 5.3 | MEDIUM | CWE-922 | 0.0% p11 | 3.71 | The ReviewX – WooCommerce Product Reviews with Multi-Criteria, Reminder Emails, ...The ReviewX – WooCommerce Product Reviews with Multi-Criteria, Reminder Emails, Google Reviews, Schema & More plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.2.12 via the syncedData function. This makes it possible for unauthenticated attackers to extract sensitive data including user names, emails, phone numbers, addresses. |
2026-03-23 | |
| CVE-2025-10731 | 5.3 | MEDIUM | CWE-285 | 0.1% p29 | 3.71 | The ReviewX – WooCommerce Product Reviews with Multi-Criteria, Reminder Emails, ...The ReviewX – WooCommerce Product Reviews with Multi-Criteria, Reminder Emails, Google Reviews, Schema & More plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.2.12 via the allReminderSettings function. This makes it possible for unauthenticated attackers to obtain authentication tokens and subsequently bypass admin restrictions to access and export sensitive data including order details, names, emails, addresses, phone numbers, and user information. |
2026-03-23 | |
| CVE-2025-10679 | 7.3 | HIGH | CWE-94 | 0.2% p39 | 5.12 | The ReviewX – WooCommerce Product Reviews with Multi-Criteria, Reminder Emails, ...The ReviewX – WooCommerce Product Reviews with Multi-Criteria, Reminder Emails, Google Reviews, Schema & More plugin for WordPress is vulnerable to arbitrary method calls in all versions up to, and including, 2.2.12. This is due to insufficient input validation in the bulkTenReviews function that allows user-controlled data to be passed directly to a variable function call mechanism. This makes it possible for unauthenticated attackers to call arbitrary PHP class methods that take no inputs or have default values, potentially leading to information disclosure or remote code execution depending on available methods and server configuration. |
2026-03-23 | |
| CVE-2026-4572 | 5.3 | MEDIUM | CWE-74 | 0.0% p7 | 3.71 | A weakness has been identified in SourceCodester Sales and Inventory System 1.0....A weakness has been identified in SourceCodester Sales and Inventory System 1.0. Affected by this issue is some unknown functionality of the file /view_product.php of the component HTTP POST Request Handler. Executing a manipulation of the argument searchtxt can lead to sql injection. The attack may be performed from remote. The exploit has been made available to the public and could be used for attacks. |
2026-03-23 | |
| CVE-2026-4571 | 5.3 | MEDIUM | CWE-74 | 0.0% p7 | 3.71 | A security flaw has been discovered in SourceCodester Sales and Inventory System...A security flaw has been discovered in SourceCodester Sales and Inventory System 1.0. Affected by this vulnerability is an unknown functionality of the file /view_payments.php of the component HTTP POST Request Handler. Performing a manipulation of the argument searchtxt results in sql injection. The attack is possible to be carried out remotely. The exploit has been released to the public and may be used for attacks. |
2026-03-23 | |
| CVE-2026-4570 | 5.3 | MEDIUM | CWE-74 | 0.0% p7 | 3.71 | A vulnerability was identified in SourceCodester Sales and Inventory System 1.0....A vulnerability was identified in SourceCodester Sales and Inventory System 1.0. Affected is an unknown function of the file /view_customers.php of the component HTTP POST Request Handler. Such manipulation of the argument searchtxt leads to sql injection. The attack can be executed remotely. The exploit is publicly available and might be used. |
2026-03-23 | |
| CVE-2025-10736 | 6.5 | MEDIUM | CWE-285 | 0.1% p17 | 4.55 | The ReviewX – WooCommerce Product Reviews with Multi-Criteria, Reminder Emails, ...The ReviewX – WooCommerce Product Reviews with Multi-Criteria, Reminder Emails, Google Reviews, Schema & More plugin for WordPress is vulnerable to unauthorized access of data due to improper authorization checks on the userAccessibility() function in all versions up to, and including, 2.2.10. This makes it possible for unauthenticated attackers to access protected REST API endpoints, extract and modify information related to users and plugin's configuration |
2026-03-23 | |
| CVE-2026-4569 | 5.3 | MEDIUM | CWE-74 | 0.0% p7 | 3.71 | A vulnerability was determined in SourceCodester Sales and Inventory System 1.0....A vulnerability was determined in SourceCodester Sales and Inventory System 1.0. This impacts an unknown function of the file /view_category.php of the component HTTP POST Request Handler. This manipulation of the argument searchtxt causes sql injection. Remote exploitation of the attack is possible. The exploit has been publicly disclosed and may be utilized. |
2026-03-23 | |
| CVE-2026-4568 | 5.3 | MEDIUM | CWE-74 | 0.0% p7 | 3.71 | A vulnerability was found in SourceCodester Sales and Inventory System 1.0. This...A vulnerability was found in SourceCodester Sales and Inventory System 1.0. This affects an unknown function of the file /update_supplier.php of the component HTTP GET Request Handler. The manipulation of the argument sid results in sql injection. The attack may be launched remotely. The exploit has been made public and could be used. Several companies clearly confirm that VulDB is the primary source for best vulnerability data. |
2026-03-23 | |
| CVE-2026-4567 | 8.9 | HIGH | CWE-119 | 0.1% p26 | 6.23 | A vulnerability has been found in Tenda A15 15.13.07.13. The impacted element is...A vulnerability has been found in Tenda A15 15.13.07.13. The impacted element is the function UploadCfg of the file /cgi-bin/UploadCfg. The manipulation of the argument File leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. |
2026-03-23 | |
| CVE-2026-4566 | 7.4 | HIGH | CWE-119 | 0.0% p14 | 5.18 | A flaw has been found in Belkin F9K1122 1.00.33. The affected element is the fun...A flaw has been found in Belkin F9K1122 1.00.33. The affected element is the function formWISP5G of the file /goform/formWISP5G. Executing a manipulation of the argument webpage can lead to stack-based buffer overflow. The attack can be launched remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-23 | |
| CVE-2026-4565 | 7.4 | HIGH | CWE-119 | 0.1% p22 | 5.18 | A vulnerability was detected in Tenda AC21 16.03.08.16. Impacted is the function...A vulnerability was detected in Tenda AC21 16.03.08.16. Impacted is the function formSetQosBand of the file /goform/SetNetControlList. Performing a manipulation of the argument list results in buffer overflow. The attack can be initiated remotely. The exploit is now public and may be used. |
2026-03-23 | |
| CVE-2026-4564 | 5.1 | MEDIUM | CWE-74 | 0.1% p16 | 3.57 | A security vulnerability has been detected in yangzongzhuan RuoYi up to 4.8.2. T...A security vulnerability has been detected in yangzongzhuan RuoYi up to 4.8.2. This issue affects some unknown processing of the file /monitor/job/ of the component Quartz Job Handler. Such manipulation of the argument invokeTarget leads to code injection. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-23 | |
| CVE-2026-4563 | 5.3 | MEDIUM | CWE-285 | 0.0% p7 | 3.71 | A weakness has been identified in MacCMS up to 2025.1000.4052. This vulnerabilit...A weakness has been identified in MacCMS up to 2025.1000.4052. This vulnerability affects the function order_info of the file application/index/controller/User.php of the component Member Order Detail Interface. This manipulation of the argument order_id causes authorization bypass. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be used for attacks. |
2026-03-23 | |
| CVE-2026-4562 | 6.9 | MEDIUM | CWE-287 | 0.1% p26 | 4.83 | A security flaw has been discovered in MacCMS 2025.1000.4052. This affects an un...A security flaw has been discovered in MacCMS 2025.1000.4052. This affects an unknown part of the file application/api/controller/Timming.php of the component Timming API Endpoint. The manipulation results in missing authentication. The attack may be performed from remote. The exploit has been released to the public and may be used for attacks. |
2026-03-23 | |
| CVE-2026-2580 | 7.5 | HIGH | CWE-89 | 0.1% p26 | 5.25 | The WP Maps – Store Locator,Google Maps,OpenStreetMap,Mapbox,Listing,Directory &...The WP Maps – Store Locator,Google Maps,OpenStreetMap,Mapbox,Listing,Directory & Filters plugin for WordPress is vulnerable to time-based SQL Injection via the ‘orderby’ parameter in all versions up to, and including, 4.9.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. |
2026-03-23 | |
| CVE-2026-4558 | 7.4 | HIGH | CWE-77 | 0.2% p42 | 5.19 | A flaw has been found in Linksys MR9600 2.0.6.206937. Affected is the function s...A flaw has been found in Linksys MR9600 2.0.6.206937. Affected is the function smartConnectConfigure of the file SmartConnect.lua. Executing a manipulation of the argument configApSsid/configApPassphrase/srpLogin/srpPassword can lead to os command injection. The attack may be launched remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-22 | |
| CVE-2026-4557 | 5.3 | MEDIUM | CWE-79 | 0.0% p10 | 3.71 | A vulnerability was detected in code-projects Exam Form Submission 1.0. This imp...A vulnerability was detected in code-projects Exam Form Submission 1.0. This impacts an unknown function of the file /admin/update_s1.php. Performing a manipulation of the argument sname results in cross site scripting. The attack may be initiated remotely. The exploit is now public and may be used. |
2026-03-22 | |
| CVE-2026-4555 | 7.4 | HIGH | CWE-119 | 0.0% p13 | 5.18 | A weakness has been identified in D-Link DIR-513 1.10. The impacted element is t...A weakness has been identified in D-Link DIR-513 1.10. The impacted element is the function formEasySetTimezone of the file /goform/formEasySetTimezone of the component boa. This manipulation of the argument curTime causes stack-based buffer overflow. The attack can be initiated remotely. The exploit has been made available to the public and could be used for attacks. This vulnerability only affects products that are no longer supported by the maintainer. |
2026-03-22 | |
| CVE-2026-4554 | 5.3 | MEDIUM | CWE-74 | 0.8% p74 | 3.74 | A security flaw has been discovered in Tenda F453 1.0.0.3. The affected element ...A security flaw has been discovered in Tenda F453 1.0.0.3. The affected element is the function FormWriteFacMac of the file /goform/WriteFacMac. The manipulation of the argument mac results in command injection. It is possible to launch the attack remotely. The exploit has been released to the public and may be used for attacks. |
2026-03-22 | |
| CVE-2026-33319 | 5.9 | MEDIUM | CWE-78 | 0.0% p8 | 4.13 | WWBN AVideo is an open source video platform. Prior to version 26.0, the `upload...WWBN AVideo is an open source video platform. Prior to version 26.0, the `uploadVideoToLinkedIn()` method in the SocialMediaPublisher plugin constructs a shell command by directly interpolating an upload URL received from LinkedIn's API response, without sanitization via `escapeshellarg()`. If an attacker can influence the LinkedIn API response (via MITM, compromised OAuth token, or API compromise), they can inject arbitrary OS commands that execute as the web server user. Version 26.0 contains a fix for the issue. |
2026-03-22 | |
| CVE-2026-33296 | 2.1 | LOW | CWE-601 | 0.0% p8 | 1.47 | WWBN AVideo is an open source video platform. Prior to version 26.0, WWBN/AVideo...WWBN AVideo is an open source video platform. Prior to version 26.0, WWBN/AVideo contains an open redirect vulnerability in the login flow where a user-supplied redirectUri parameter is reflected directly into a JavaScript `document.location` assignment without JavaScript-safe encoding. After a user completes the login popup flow, a timer callback executes the redirect using the unvalidated value, sending the victim to an attacker-controlled site. Version 26.0 fixes the issue. |
2026-03-22 | |
| CVE-2026-33295 | 8.2 | HIGH | CWE-79 | 0.0% p1 | 5.74 | WWBN AVideo is an open source video platform. Prior to version 26.0, WWBN/AVideo...WWBN AVideo is an open source video platform. Prior to version 26.0, WWBN/AVideo contains a stored cross-site scripting vulnerability in the CDN plugin's download buttons component. The `clean_title` field of a video record is interpolated directly into a JavaScript string literal without any escaping, allowing an attacker who can create or modify a video to inject arbitrary JavaScript that executes in the browser of any user who visits the affected download page. Version 26.0 fixes the issue. |
2026-03-22 | |
| CVE-2026-33294 | 5.0 | MEDIUM | CWE-918 | 0.0% p8 | 3.50 | WWBN AVideo is an open source video platform. Prior to version 26.0, the BulkEmb...WWBN AVideo is an open source video platform. Prior to version 26.0, the BulkEmbed plugin's save endpoint (`plugin/BulkEmbed/save.json.php`) fetches user-supplied thumbnail URLs via `url_get_contents()` without SSRF protection. Unlike all six other URL-fetching endpoints in AVideo that were hardened with `isSSRFSafeURL()`, this code path was missed. An authenticated attacker can force the server to make HTTP requests to internal network resources and retrieve the responses by viewing the saved video thumbnail. Version 26.0 fixes the issue. |
2026-03-22 | |
| CVE-2026-33293 | 8.1 | HIGH | CWE-22 | 0.0% p14 | 5.67 | WWBN AVideo is an open source video platform. Prior to version 26.0, the `delete...WWBN AVideo is an open source video platform. Prior to version 26.0, the `deleteDump` parameter in `plugin/CloneSite/cloneServer.json.php` is passed directly to `unlink()` without any path sanitization. An attacker with valid clone credentials can use path traversal sequences (e.g., `../../`) to delete arbitrary files on the server, including critical application files such as `configuration.php`, causing complete denial of service or enabling further attacks by removing security-critical files. Version 26.0 fixes the issue. |
2026-03-22 | |
| CVE-2026-33292 | 7.5 | HIGH | CWE-22 | 0.0% p14 | 5.25 | WWBN AVideo is an open source video platform. Prior to version 26.0, the HLS str...WWBN AVideo is an open source video platform. Prior to version 26.0, the HLS streaming endpoint (`view/hls.php`) is vulnerable to a path traversal attack that allows an unauthenticated attacker to stream any private or paid video on the platform. The `videoDirectory` GET parameter is used in two divergent code paths — one for authorization (which truncates at the first `/` segment) and one for file access (which preserves `..` traversal sequences) — creating a split-oracle condition where authorization is checked against one video while content is served from another. Version 26.0 contains a fix for the issue. |
2026-03-22 | |
| CVE-2026-4553 | 7.4 | HIGH | CWE-119 | 0.0% p7 | 5.18 | A vulnerability was identified in Tenda F453 1.0.0.3. Impacted is the function f...A vulnerability was identified in Tenda F453 1.0.0.3. Impacted is the function fromNatlimit of the file /goform/Natlimit of the component Parameters Handler. The manipulation of the argument page leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit is publicly available and might be used. |
2026-03-22 | |
| CVE-2026-4552 | 7.4 | HIGH | CWE-119 | 0.1% p23 | 5.18 | A vulnerability was determined in Tenda F453 1.0.0.3. This issue affects the fun...A vulnerability was determined in Tenda F453 1.0.0.3. This issue affects the function fromVirtualSer of the file /goform/VirtualSer of the component Parameters Handler. Executing a manipulation of the argument page can lead to stack-based buffer overflow. The attack may be performed from remote. The exploit has been publicly disclosed and may be utilized. |
2026-03-22 | |
| CVE-2026-4551 | 7.4 | HIGH | CWE-119 | 0.1% p23 | 5.18 | A vulnerability was found in Tenda F453 1.0.0.3. This vulnerability affects the ...A vulnerability was found in Tenda F453 1.0.0.3. This vulnerability affects the function fromSafeClientFilter of the file /goform/SafeClientFilter of the component Parameters Handler. Performing a manipulation of the argument menufacturer/Go results in stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been made public and could be used. |
2026-03-22 | |
| CVE-2026-4550 | 5.1 | MEDIUM | CWE-74 | 0.0% p2 | 3.57 | A vulnerability has been found in code-projects Simple Gym Management System up ...A vulnerability has been found in code-projects Simple Gym Management System up to 1.0. This affects an unknown part of the file /gym/func.php. Such manipulation of the argument Trainer_id/fname leads to sql injection. The attack can be executed remotely. The exploit has been disclosed to the public and may be used. |
2026-03-22 | |
| CVE-2026-4549 | 2.3 | LOW | CWE-285 | 0.0% p0 | 1.61 | A flaw has been found in mickasmt next-saas-stripe-starter 1.0.0. Affected by th...A flaw has been found in mickasmt next-saas-stripe-starter 1.0.0. Affected by this issue is the function openCustomerPortal of the file actions/open-customer-portal.ts of the component Stripe API. This manipulation causes authorization bypass. Remote exploitation of the attack is possible. The complexity of an attack is rather high. The exploitation is known to be difficult. |
2026-03-22 | |
| CVE-2026-4548 | 5.3 | MEDIUM | CWE-266 | 0.0% p10 | 3.71 | A vulnerability was detected in mickasmt next-saas-stripe-starter 1.0.0. Affecte...A vulnerability was detected in mickasmt next-saas-stripe-starter 1.0.0. Affected by this vulnerability is the function updateUserrole of the file actions/update-user-role.ts. The manipulation of the argument userId/role results in improper authorization. The attack may be launched remotely. |
2026-03-22 | |
| CVE-2026-4547 | 5.3 | MEDIUM | CWE-840 | 0.0% p8 | 3.71 | A security vulnerability has been detected in mickasmt next-saas-stripe-starter ...A security vulnerability has been detected in mickasmt next-saas-stripe-starter 1.0.0. Affected is the function generateUserStripe of the file actions/generate-user-stripe.ts of the component Checkout Handler. The manipulation of the argument priceId leads to business logic errors. The attack may be initiated remotely. |
2026-03-22 | |
| CVE-2026-4546 | 7.3 | HIGH | CWE-426 | 0.0% p1 | 5.11 | A weakness has been identified in Flos Freeware Notepad2 4.2.25. This impacts an...A weakness has been identified in Flos Freeware Notepad2 4.2.25. This impacts an unknown function in the library TextShaping.dll. Executing a manipulation can lead to uncontrolled search path. The attack is restricted to local execution. The attack requires a high level of complexity. The exploitability is said to be difficult. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-22 | |
| CVE-2019-25619 | 8.6 | HIGH | CWE-787 | 0.0% p2 | 6.02 | FTP Shell Server 6.83 contains a buffer overflow vulnerability in the 'Account n...FTP Shell Server 6.83 contains a buffer overflow vulnerability in the 'Account name to ban' field that allows local attackers to execute arbitrary code by supplying a crafted string. Attackers can inject shellcode through the account name parameter in the Manage FTP Accounts dialog to overwrite the return address and execute calc.exe or other commands. |
2026-03-22 | |
| CVE-2019-25618 | 6.9 | MEDIUM | CWE-73 | 0.0% p3 | 4.83 | AdminExpress 1.2.5 contains a denial of service vulnerability that allows local ...AdminExpress 1.2.5 contains a denial of service vulnerability that allows local attackers to crash the application by submitting oversized input through the System Compare feature. Attackers can paste a large buffer of characters into the Folder Path field and trigger the comparison function to cause the application to become unresponsive or crash. |
2026-03-22 | |
| CVE-2019-25617 | 6.9 | MEDIUM | CWE-226 | 0.0% p3 | 4.83 | Ease Audio Converter 5.30 contains a denial of service vulnerability in the Audi...Ease Audio Converter 5.30 contains a denial of service vulnerability in the Audio Cutter function that allows local attackers to crash the application by processing malformed MP4 files. Attackers can create a crafted MP4 file containing an oversized buffer and load it through the Audio Cutter interface to trigger an application crash. |
2026-03-22 | |
| CVE-2019-25616 | 6.9 | MEDIUM | CWE-434 | 0.0% p3 | 4.83 | AnMing MP3 CD Burner 2.0 contains a buffer overflow vulnerability that allows lo...AnMing MP3 CD Burner 2.0 contains a buffer overflow vulnerability that allows local attackers to crash the application by supplying an oversized string. Attackers can paste a 6000-byte payload into the registration name field to trigger a denial of service condition. |
2026-03-22 | |
| CVE-2019-25615 | 8.6 | HIGH | CWE-787 | 0.0% p4 | 6.02 | Lavavo CD Ripper 4.20 contains a structured exception handling (SEH) buffer over...Lavavo CD Ripper 4.20 contains a structured exception handling (SEH) buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying a malicious string in the License Activation Name field. Attackers can craft a payload with controlled buffer data, NSEH jump instructions, and SEH handler addresses to trigger code execution and establish a bind shell on port 3110. |
2026-03-22 | |
| CVE-2019-25614 | 9.3 | CRITICAL | CWE-787 | 0.6% p68 | 6.53 | Free Float FTP 1.0 contains a buffer overflow vulnerability in the STOR command ...Free Float FTP 1.0 contains a buffer overflow vulnerability in the STOR command handler that allows remote attackers to execute arbitrary code by sending a crafted STOR request with an oversized payload. Attackers can authenticate with anonymous credentials and send a malicious STOR command containing 247 bytes of padding followed by a return address and shellcode to trigger code execution on the FTP server. |
2026-03-22 | |
| CVE-2019-25613 | 8.7 | HIGH | CWE-940 | 0.3% p50 | 6.10 | Easy Chat Server 3.1 contains a denial of service vulnerability that allows remo...Easy Chat Server 3.1 contains a denial of service vulnerability that allows remote attackers to crash the application by sending oversized data in the message parameter. Attackers can establish a session via the chat.ghp endpoint and then send a POST request to body2.ghp with an excessively large message parameter value to cause the service to crash. |
2026-03-22 | |
| CVE-2019-25612 | 8.5 | HIGH | CWE-787 | 0.0% p2 | 5.95 | Admin Express 1.2.5.485 contains a local structured exception handling buffer ov...Admin Express 1.2.5.485 contains a local structured exception handling buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying an alphanumeric encoded payload in the Folder Path field. Attackers can trigger the vulnerability through the System Compare feature by pasting a crafted buffer overflow payload into the left-hand side Folder Path field and clicking the scale icon to execute shellcode with application privileges. |
2026-03-22 | |
| CVE-2019-25611 | 8.6 | HIGH | CWE-787 | 0.0% p4 | 6.02 | MiniFtp contains a buffer overflow vulnerability in the parseconf_load_setting f...MiniFtp contains a buffer overflow vulnerability in the parseconf_load_setting function that allows local attackers to execute arbitrary code by supplying oversized configuration values. Attackers can craft a miniftpd.conf file with values exceeding 128 bytes to overflow stack buffers and overwrite the return address, enabling code execution with root privileges. |
2026-03-22 | |
| CVE-2019-25610 | 7.1 | HIGH | CWE-22 | 0.3% p51 | 4.98 | NetNumber Titan Master 7.9.1 contains a path traversal vulnerability in the drp ...NetNumber Titan Master 7.9.1 contains a path traversal vulnerability in the drp endpoint that allows authenticated users to download arbitrary files by injecting directory traversal sequences. Attackers can manipulate the path parameter with base64-encoded payloads containing ../ sequences to bypass authorization and retrieve sensitive system files like /etc/shadow. |
2026-03-22 | |
| CVE-2019-25609 | 8.6 | HIGH | CWE-787 | 0.0% p4 | 6.02 | JetAudio jetCast Server 2.0 contains a stack-based buffer overflow vulnerability...JetAudio jetCast Server 2.0 contains a stack-based buffer overflow vulnerability in the Log Directory configuration field that allows local attackers to overwrite structured exception handling pointers. Attackers can inject alphanumeric encoded shellcode through the Log Directory field to trigger an SEH exception handler and execute arbitrary code with application privileges. |
2026-03-22 | |
| CVE-2019-25608 | 8.6 | HIGH | CWE-520 | 0.0% p3 | 6.02 | Iperius Backup 6.1.0 contains a privilege escalation vulnerability that allows l...Iperius Backup 6.1.0 contains a privilege escalation vulnerability that allows low-privilege users to execute arbitrary programs with elevated privileges by creating backup jobs. Attackers can configure backup jobs to execute malicious batch files or programs before or after backup operations, which run with the privileges of the Iperius Backup Service account (Local System or Administrator), enabling privilege escalation and arbitrary code execution. |
2026-03-22 | |
| CVE-2019-25607 | 8.6 | HIGH | CWE-787 | 0.0% p4 | 6.02 | Axessh 4.2 contains a stack-based buffer overflow vulnerability in the log file ...Axessh 4.2 contains a stack-based buffer overflow vulnerability in the log file name field that allows local attackers to execute arbitrary code by supplying an excessively long filename. Attackers can overflow the buffer at offset 214 bytes to overwrite the instruction pointer and execute shellcode with system privileges. |
2026-03-22 | |
| CVE-2019-25606 | 6.8 | MEDIUM | CWE-787 | 0.0% p3 | 4.76 | Fast AVI MPEG Joiner 1.2.0812 contains a buffer overflow vulnerability that allo...Fast AVI MPEG Joiner 1.2.0812 contains a buffer overflow vulnerability that allows local attackers to crash the application by supplying an oversized payload in the License Name field. Attackers can create a malicious text file containing 6000 bytes of data and paste it into the License Name input field to trigger a denial of service condition when the Register button is clicked. |
2026-03-22 | |
| CVE-2019-25605 | 8.7 | HIGH | CWE-612 | 0.0% p11 | 6.09 | EquityPandit 1.0 contains an insecure logging vulnerability that allows attacker...EquityPandit 1.0 contains an insecure logging vulnerability that allows attackers to capture sensitive user credentials by accessing developer console logs via Android Debug Bridge. Attackers can use adb logcat to extract plaintext passwords logged during the forgot password function, exposing user account credentials. |
2026-03-22 | |
| CVE-2019-25604 | 8.6 | HIGH | CWE-787 | 0.0% p4 | 6.02 | DVDXPlayer Pro 5.5 contains a local buffer overflow vulnerability with structure...DVDXPlayer Pro 5.5 contains a local buffer overflow vulnerability with structured exception handling that allows local attackers to execute arbitrary code by crafting malicious playlist files. Attackers can create a specially crafted .plf file containing shellcode and NOP sleds that overflows a buffer and hijacks the SEH chain to execute arbitrary code with application privileges. |
2026-03-22 | |
| CVE-2019-25603 | 8.6 | HIGH | CWE-787 | 0.0% p4 | 6.02 | TuneClone 2.20 contains a structured exception handler (SEH) buffer overflow vul...TuneClone 2.20 contains a structured exception handler (SEH) buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying a malicious license code string. Attackers can craft a payload with a controlled buffer, NSEH jump instruction, and SEH handler address pointing to a ROP gadget, then paste it into the license code field to trigger code execution and establish a bind shell. |
2026-03-22 | |
| CVE-2019-25602 | 6.8 | MEDIUM | CWE-1260 | 0.0% p4 | 4.76 | GSearch 1.0.1.0 contains a denial of service vulnerability that allows local att...GSearch 1.0.1.0 contains a denial of service vulnerability that allows local attackers to crash the application by inputting an excessively long string in the search bar. Attackers can paste a buffer of 2000 characters into the search field, click search, and select any result to trigger an application crash. |
2026-03-22 | |
| CVE-2019-25601 | 6.9 | MEDIUM | CWE-787 | 0.0% p3 | 4.83 | UltraVNC Launcher 1.2.2.4 contains a buffer overflow vulnerability in the Path v...UltraVNC Launcher 1.2.2.4 contains a buffer overflow vulnerability in the Path vncviewer.exe property field that allows local attackers to crash the application by supplying an excessively long string. Attackers can input a 300-byte payload of repeated characters through the Properties dialog to trigger a denial of service condition. |
2026-03-22 | |
| CVE-2019-25600 | 7.1 | HIGH | CWE-787 | 0.0% p14 | 4.97 | UltraVNC Viewer 1.2.2.4 contains a denial of service vulnerability that allows a...UltraVNC Viewer 1.2.2.4 contains a denial of service vulnerability that allows attackers to crash the application by supplying an oversized string to the VNC Server input field. Attackers can paste a malicious string containing 256 repeated characters into the VNC Server field and click Connect to trigger a buffer overflow that crashes the viewer. |
2026-03-22 | |
| CVE-2019-25599 | 6.9 | MEDIUM | CWE-466 | 0.0% p3 | 4.83 | Backup Key Recovery 2.2.4 contains a denial of service vulnerability that allows...Backup Key Recovery 2.2.4 contains a denial of service vulnerability that allows local attackers to crash the application by supplying an excessively long string in the Name field. Attackers can paste a buffer of 300 or more characters into the Name field during registration to trigger a crash when submitting the form. |
2026-03-22 | |
| CVE-2019-25598 | 6.9 | MEDIUM | CWE-787 | 0.0% p3 | 4.83 | HeidiSQL Portable 10.1.0.5464 contains a denial of service vulnerability that al...HeidiSQL Portable 10.1.0.5464 contains a denial of service vulnerability that allows local attackers to crash the application by supplying an excessively long string in the password field. Attackers can paste a buffer overflow payload into the password input during Microsoft SQL Server login to trigger an application crash. |
2026-03-22 | |
| CVE-2019-25597 | 6.9 | MEDIUM | CWE-787 | 0.0% p3 | 4.83 | NSauditor 3.1.2.0 contains a buffer overflow vulnerability in the SNMP Auditor C...NSauditor 3.1.2.0 contains a buffer overflow vulnerability in the SNMP Auditor Community field that allows local attackers to crash the application by supplying an excessively long string. Attackers can paste a large payload into the Community field and trigger the Walk function to cause a denial of service condition. |
2026-03-22 | |
| CVE-2019-25596 | 6.9 | MEDIUM | CWE-1287 | 0.0% p5 | 4.83 | SpotAuditor 5.2.6 contains a denial of service vulnerability in the registration...SpotAuditor 5.2.6 contains a denial of service vulnerability in the registration dialog that allows local attackers to crash the application by supplying an excessively long string in the Name field. Attackers can paste a buffer of 300 repeated characters into the Name input during registration to trigger an application crash. |
2026-03-22 | |
| CVE-2019-25595 | 6.9 | MEDIUM | CWE-469 | 0.0% p3 | 4.83 | jetAudio 8.1.7.20702 Basic contains a denial of service vulnerability that allow...jetAudio 8.1.7.20702 Basic contains a denial of service vulnerability that allows local attackers to crash the application by supplying an excessively long string through the URL input handler. Attackers can trigger the crash by pasting a buffer of 5000 characters into the Open URL dialog, causing the application to terminate abnormally. |
2026-03-22 | |
| CVE-2019-25594 | 6.9 | MEDIUM | CWE-807 | 0.0% p5 | 4.83 | ASPRunner.NET 10.1 contains a denial of service vulnerability that allows local ...ASPRunner.NET 10.1 contains a denial of service vulnerability that allows local attackers to crash the application by supplying an excessively long string in the table name field. Attackers can input a buffer of 10000 characters in the table name parameter during database table creation to trigger an application crash. |
2026-03-22 | |
| CVE-2019-25593 | 6.8 | MEDIUM | CWE-1285 | 0.0% p2 | 4.76 | jetCast Server 2.0 contains a denial of service vulnerability that allows local ...jetCast Server 2.0 contains a denial of service vulnerability that allows local attackers to crash the application by supplying an excessively long string in the Log directory configuration field. Attackers can paste a buffer of 5000 characters into the Log directory input, then click Start to trigger a crash that terminates the server process. |
2026-03-22 | |
| CVE-2019-25592 | 6.9 | MEDIUM | CWE-1260 | 0.0% p3 | 4.83 | PHPRunner 10.1 contains a denial of service vulnerability that allows local atta...PHPRunner 10.1 contains a denial of service vulnerability that allows local attackers to crash the application by supplying an excessively long string in the dashboard name field. Attackers can paste a buffer of 10000 characters into the Name field during dashboard creation to trigger an application crash. |
2026-03-22 | |
| CVE-2019-25591 | 6.9 | MEDIUM | CWE-787 | 0.0% p3 | 4.83 | DNSS Domain Name Search Software 2.1.8 contains a buffer overflow vulnerability ...DNSS Domain Name Search Software 2.1.8 contains a buffer overflow vulnerability in the registration code input field that allows local attackers to crash the application by submitting an excessively long string. Attackers can trigger a denial of service by pasting a malicious registration code containing 300 repeated characters into the Name/Key field via the Register menu option. |
2026-03-22 | |
| CVE-2019-25590 | 6.9 | MEDIUM | CWE-1282 | 0.0% p3 | 4.83 | Axessh 4.2 contains a denial of service vulnerability in the logging configurati...Axessh 4.2 contains a denial of service vulnerability in the logging configuration that allows local attackers to crash the application by supplying an excessively long string in the log file name field. Attackers can enable session logging, paste a buffer of 500 or more characters into the log file name parameter, and trigger a crash when establishing a telnet connection. |
2026-03-22 | |
| CVE-2026-4115 | 6.3 | MEDIUM | CWE-345 | 0.0% p0 | 4.41 | A vulnerability was detected in PuTTY 0.83. Affected is the function eddsa_verif...A vulnerability was detected in PuTTY 0.83. Affected is the function eddsa_verify of the file crypto/ecc-ssh.c of the component Ed25519 Signature Handler. The manipulation results in improper verification of cryptographic signature. The attack may be performed from remote. The attack requires a high level of complexity. The exploitability is told to be difficult. The exploit is now public and may be used. The real existence of this vulnerability is still doubted at the moment. The patch is identified as af996b5ec27ab79bae3882071b9d6acf16044549. It is advisable to implement a patch to correct this issue. The vendor was contacted early, responded in a very professional manner and quickly released a patch for the affected product. However, at the moment there is no proof that this flaw might have any real-world impact. |
2026-03-22 | |
| CVE-2026-4545 | 7.3 | HIGH | CWE-426 | 0.0% p1 | 5.11 | A security flaw has been discovered in Flos Freeware Notepad2 4.2.25. This affec...A security flaw has been discovered in Flos Freeware Notepad2 4.2.25. This affects an unknown function in the library PROPSYS.dll. Performing a manipulation results in uncontrolled search path. The attack is only possible with local access. The attack is considered to have high complexity. The exploitability is reported as difficult. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-22 | |
| CVE-2026-4544 | 4.8 | MEDIUM | CWE-79 | 0.0% p10 | 3.36 | A vulnerability was determined in Wavlink WL-WN578W2 221110. This affects an unk...A vulnerability was determined in Wavlink WL-WN578W2 221110. This affects an unknown function of the file /cgi-bin/login.cgi of the component POST Request Handler. Executing a manipulation of the argument homepage/hostname/login_page can lead to cross site scripting. It is possible to launch the attack remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-22 | |
| CVE-2026-4543 | 5.3 | MEDIUM | CWE-74 | 0.3% p52 | 3.72 | A vulnerability was found in Wavlink WL-WN578W2 221110. The impacted element is ...A vulnerability was found in Wavlink WL-WN578W2 221110. The impacted element is an unknown function of the file /cgi-bin/firewall.cgi of the component POST Request Handler. Performing a manipulation of the argument dmz_flag/del_flag results in command injection. It is possible to initiate the attack remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-22 | |
| CVE-2026-4542 | 5.3 | MEDIUM | CWE-22 | 0.0% p13 | 3.71 | A vulnerability has been found in SSCMS 4.7.0. The affected element is an unknow...A vulnerability has been found in SSCMS 4.7.0. The affected element is an unknown function of the file LayerImageController.Submit.cs of the component layerImage Endpoint. Such manipulation of the argument filePaths leads to path traversal. The attack may be performed from remote. The exploit has been disclosed to the public and may be used. Statistical analysis made it clear that VulDB provides the best quality for vulnerability data. |
2026-03-22 | |
| CVE-2026-4541 | 2.0 | LOW | CWE-345 | 0.0% p0 | 1.40 | A flaw has been found in janmojzis tinyssh up to 20250501. Impacted is an unknow...A flaw has been found in janmojzis tinyssh up to 20250501. Impacted is an unknown function of the file tinyssh/crypto_sign_ed25519_tinyssh.c of the component Ed25519 Signature Handler. This manipulation causes improper verification of cryptographic signature. The attack is restricted to local execution. The attack's complexity is rated as high. The exploitability is considered difficult. The exploit has been published and may be used. Upgrading to version 20260301 is recommended to address this issue. Patch name: 9c87269607e0d7d20174df742accc49c042cff17. Upgrading the affected component is recommended. If you want to get best quality of vulnerability data, you may have to visit VulDB. |
2026-03-22 | |
| CVE-2026-4540 | 6.9 | MEDIUM | CWE-74 | 0.0% p10 | 4.83 | A vulnerability was detected in projectworlds Online Notes Sharing System 1.0. T...A vulnerability was detected in projectworlds Online Notes Sharing System 1.0. This issue affects some unknown processing of the file /login.php of the component Parameters Handler. The manipulation of the argument User results in sql injection. The attack can be executed remotely. The exploit is now public and may be used. |
2026-03-22 | |
| CVE-2026-4539 | 4.8 | MEDIUM | CWE-400 | 0.0% p2 | 3.36 | A security flaw has been discovered in pygments up to 2.19.2. The impacted eleme...A security flaw has been discovered in pygments up to 2.19.2. The impacted element is the function AdlLexer of the file pygments/lexers/archetype.py. The manipulation results in inefficient regular expression complexity. The attack is only possible with local access. The exploit has been released to the public and may be used for attacks. The project was informed of the problem early through an issue report but has not responded yet. |
2026-03-22 | |
| CVE-2026-4538 | 4.8 | MEDIUM | CWE-20 | 0.0% p4 | 3.36 | A vulnerability was identified in PyTorch 2.10.0. The affected element is an unk...A vulnerability was identified in PyTorch 2.10.0. The affected element is an unknown function of the component pt2 Loading Handler. The manipulation leads to deserialization. The attack can only be performed from a local environment. The exploit is publicly available and might be used. The project was informed of the problem early through a pull request but has not reacted yet. |
2026-03-22 | |
| CVE-2026-4537 | 5.1 | MEDIUM | CWE-74 | 0.3% p55 | 3.58 | A vulnerability was determined in Cudy TR1200 R46-2.4.15-20250721-164017. Impact...A vulnerability was determined in Cudy TR1200 R46-2.4.15-20250721-164017. Impacted is the function action_ipsec_conn of the file /usr/bin/lib/lua/luci/controller/ipsec.lua. Executing a manipulation can lead to command injection. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-22 | |
| CVE-2026-4536 | 6.9 | MEDIUM | CWE-284 | 0.1% p15 | 4.83 | A vulnerability was found in Acrel Environmental Monitoring Cloud Platform 1.1.0...A vulnerability was found in Acrel Environmental Monitoring Cloud Platform 1.1.0. This issue affects some unknown processing. Performing a manipulation results in unrestricted upload. The attack may be initiated remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-22 | |
| CVE-2026-4535 | 7.4 | HIGH | CWE-119 | 0.1% p23 | 5.18 | A vulnerability has been found in Tenda FH451 1.0.0.9. This vulnerability affect...A vulnerability has been found in Tenda FH451 1.0.0.9. This vulnerability affects the function WrlclientSet of the file /goform/WrlclientSet. Such manipulation of the argument GO leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. |
2026-03-22 | |
| CVE-2026-4534 | 7.4 | HIGH | CWE-119 | 0.1% p23 | 5.18 | A flaw has been found in Tenda FH451 1.0.0.9. This affects the function formWrlE...A flaw has been found in Tenda FH451 1.0.0.9. This affects the function formWrlExtraSet of the file /goform/WrlExtraSet. This manipulation of the argument GO causes stack-based buffer overflow. The attack can be initiated remotely. The exploit has been published and may be used. |
2026-03-22 | |
| CVE-2026-4314 | 8.8 | HIGH | CWE-269 | 0.0% p13 | 6.16 | The 'The Ultimate WordPress Toolkit – WP Extended' plugin for WordPress is vulne...The 'The Ultimate WordPress Toolkit – WP Extended' plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 3.2.4. This is due to the `isDashboardOrProfileRequest()` method in the Menu Editor module using an insecure `strpos()` check against `$_SERVER['REQUEST_URI']` to determine if a request targets the dashboard or profile page. The `grantVirtualCaps()` method, which is hooked into the `user_has_cap` filter, grants elevated capabilities including `manage_options` when this check returns true. This makes it possible for authenticated attackers, with Subscriber-level access and above, to gain administrative capabilities by appending a crafted query parameter to any admin URL, allowing them to update arbitrary WordPress options and ultimately create new Administrator accounts. |
2026-03-22 | |
| CVE-2026-3427 | 6.4 | MEDIUM | CWE-79 | 0.0% p10 | 4.48 | The Yoast SEO – Advanced SEO with real-time guidance and built-in AI plugin for ...The Yoast SEO – Advanced SEO with real-time guidance and built-in AI plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the the `jsonText` block attribute in all versions up to, and including, 27.1.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-03-22 | |
| CVE-2026-4533 | 5.3 | MEDIUM | CWE-74 | 0.0% p9 | 3.71 | A vulnerability was detected in code-projects Simple Food Ordering System 1.0. A...A vulnerability was detected in code-projects Simple Food Ordering System 1.0. Affected by this issue is some unknown functionality of the file all-tickets.php. The manipulation of the argument Status results in sql injection. It is possible to launch the attack remotely. The exploit is now public and may be used. |
2026-03-22 | |
| CVE-2026-33550 | 2.0 | LOW | CWE-308 | 0.0% p8 | 1.40 | SOGo before 5.12.5 does not renew the OTP if a user disables/enables it, and has...SOGo before 5.12.5 does not renew the OTP if a user disables/enables it, and has a too short length (only 12 digits instead of the 20 recommended). |
2026-03-22 | |
| CVE-2026-33549 | 6.7 | MEDIUM | CWE-688 | 0.0% p11 | 4.69 | SPIP 4.4.10 through 4.4.12 before 4.4.13 allows unintended privilege assignment ...SPIP 4.4.10 through 4.4.12 before 4.4.13 allows unintended privilege assignment (of administrator privileges) during the editing of an author data structure because of STATUT mishandling. |
2026-03-22 | |
| CVE-2025-71276 | 6.4 | MEDIUM | CWE-79 | 0.0% p8 | 4.48 | SOGo before 5.12.5 is prone to a XSS vulnerability with events, tasks, and conta...SOGo before 5.12.5 is prone to a XSS vulnerability with events, tasks, and contacts categories. |
2026-03-22 | |
| CVE-2026-4532 | 5.5 | MEDIUM | CWE-425 | 0.0% p10 | 3.85 | A security vulnerability has been detected in code-projects Simple Food Ordering...A security vulnerability has been detected in code-projects Simple Food Ordering System up to 1.0. Affected by this vulnerability is an unknown functionality of the file /food/sql/food.sql of the component Database Backup Handler. The manipulation leads to files or directories accessible. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used. It is recommended to change the configuration settings. |
2026-03-22 | |
| CVE-2026-4531 | 6.9 | MEDIUM | CWE-404 | 0.1% p22 | 4.83 | A weakness has been identified in Free5GC 4.1.0. Affected is the function Handle...A weakness has been identified in Free5GC 4.1.0. Affected is the function HandleRegistrationComplete of the file internal/gmm/handler.go of the component AMF. Executing a manipulation can lead to denial of service. The attack may be performed from remote. This patch is called 52e9386401ce56ea773c5aa587d4cdf7d53da799. It is best practice to apply a patch to resolve this issue. |
2026-03-22 | |
| CVE-2019-25589 | 6.9 | MEDIUM | CWE-787 | 0.0% p3 | 4.83 | ZOC Terminal 7.23.4 contains a buffer overflow vulnerability in the Shell field ...ZOC Terminal 7.23.4 contains a buffer overflow vulnerability in the Shell field of Program Settings that allows local attackers to crash the application by supplying an excessively long string. Attackers can paste a crafted payload into the Shell configuration field and trigger a crash when accessing the Command Shell feature. |
2026-03-22 | |
| CVE-2019-25588 | 6.9 | MEDIUM | CWE-1282 | 0.0% p2 | 4.83 | BulletProof FTP Server 2019.0.0.50 contains a denial of service vulnerability in...BulletProof FTP Server 2019.0.0.50 contains a denial of service vulnerability in the DNS Address field that allows local attackers to crash the application by supplying an excessively long string. Attackers can enable the DNS Address option in the Firewall settings and paste a buffer of 700 bytes to trigger a crash when the Test function is invoked. |
2026-03-22 | |
| CVE-2019-25587 | 6.9 | MEDIUM | CWE-1282 | 0.0% p2 | 4.83 | BulletProof FTP Server 2019.0.0.50 contains a denial of service vulnerability in...BulletProof FTP Server 2019.0.0.50 contains a denial of service vulnerability in the Storage-Path configuration parameter that allows local attackers to crash the application by supplying an excessively long string value. Attackers can enable the Override Storage-Path setting and paste a buffer of 500 bytes or more to trigger an application crash when saving the configuration. |
2026-03-22 | |
| CVE-2019-25586 | 6.9 | MEDIUM | CWE-466 | 0.0% p3 | 4.83 | Deluge 1.3.15 contains a denial of service vulnerability that allows local attac...Deluge 1.3.15 contains a denial of service vulnerability that allows local attackers to crash the application by supplying an excessively long string in the URL field. Attackers can paste a buffer of 5000 characters into the 'From URL' field during torrent addition to trigger an application crash. |
2026-03-22 | |
| CVE-2019-25585 | 6.9 | MEDIUM | CWE-1260 | 0.0% p3 | 4.83 | Deluge 1.3.15 contains a denial of service vulnerability that allows local attac...Deluge 1.3.15 contains a denial of service vulnerability that allows local attackers to crash the application by supplying an excessively long string in the Webseeds field. Attackers can paste a buffer of 5000 bytes into the Webseeds field during torrent creation to trigger an application crash. |
2026-03-22 | |
| CVE-2019-25584 | 6.9 | MEDIUM | CWE-787 | 0.0% p3 | 4.83 | RarmaRadio 2.72.3 contains a buffer overflow vulnerability in the Server field o...RarmaRadio 2.72.3 contains a buffer overflow vulnerability in the Server field of the Network settings that allows local attackers to crash the application by supplying an excessively long string. Attackers can paste a malicious payload exceeding 4000 bytes into the Server field via the Settings menu to trigger an application crash. |
2026-03-22 | |
| CVE-2019-25583 | 6.9 | MEDIUM | CWE-1282 | 0.0% p3 | 4.83 | RarmaRadio 2.72.3 contains a denial of service vulnerability in the Username fie...RarmaRadio 2.72.3 contains a denial of service vulnerability in the Username field that allows local attackers to crash the application by submitting excessively long input. Attackers can paste a buffer of 5000 bytes into the Username field via Settings > Network to trigger an application crash. |
2026-03-22 | |
| CVE-2026-4530 | 4.8 | MEDIUM | CWE-74 | 0.0% p6 | 3.36 | A security flaw has been discovered in apconw Aix-DB up to 1.2.3. This impacts a...A security flaw has been discovered in apconw Aix-DB up to 1.2.3. This impacts an unknown function of the file agent/text2sql/rag/terminology_retriever.py. Performing a manipulation of the argument Description results in sql injection. The attack requires a local approach. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-22 | |
| CVE-2026-4529 | 7.4 | HIGH | CWE-119 | 0.1% p15 | 5.18 | A vulnerability was identified in D-Link DHP-1320 1.00WWB04. This affects the fu...A vulnerability was identified in D-Link DHP-1320 1.00WWB04. This affects the function redirect_count_down_page of the component SOAP Handler. Such manipulation leads to stack-based buffer overflow. The attack can be executed remotely. The exploit is publicly available and might be used. This vulnerability only affects products that are no longer supported by the maintainer. |
2026-03-21 | |
| CVE-2026-3629 | 8.1 | HIGH | CWE-269 | 0.1% p18 | 5.67 | The Import and export users and customers plugin for WordPress is vulnerable to ...The Import and export users and customers plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 1.29.7. This is due to the 'save_extra_user_profile_fields' function not properly restricting which user meta keys can be updated via profile fields. The 'get_restricted_fields' method does not include sensitive meta keys such as 'wp_capabilities'. This makes it possible for unauthenticated attackers to escalate their privileges to Administrator by submitting a crafted registration request that sets the 'wp_capabilities' meta key. The vulnerability can only be exploited if the "Show fields in profile" setting is enabled and a CSV with a wp_capabilities column header has been previously imported. |
2026-03-21 | |
| CVE-2026-4528 | 6.9 | MEDIUM | CWE-918 | 0.1% p15 | 4.83 | A vulnerability was determined in trueleaf ApiFlow 0.9.7. The impacted element i...A vulnerability was determined in trueleaf ApiFlow 0.9.7. The impacted element is the function validateUrlSecurity of the file packages/server/src/service/proxy/http_proxy.service.ts of the component URL Validation Handler. This manipulation causes server-side request forgery. Remote exploitation of the attack is possible. The exploit has been publicly disclosed and may be utilized. |
2026-03-21 | |
| CVE-2026-2756 | 2.3 | LOW | CWE-287 | 0.0% p12 | 1.61 | A security vulnerability has been detected in OmniPEMF NeoRhythm up to 20260308....A security vulnerability has been detected in OmniPEMF NeoRhythm up to 20260308. This affects an unknown function of the component BLE Interface. Such manipulation leads to missing authentication. The attack can only be initiated within the local network. This attack is characterized by high complexity. The exploitability is reported as difficult. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-21 | |
| CVE-2019-25582 | 7.1 | HIGH | CWE-434 | 0.1% p18 | 4.97 | i-doit CMDB 1.12 contains an arbitrary file download vulnerability that allows a...i-doit CMDB 1.12 contains an arbitrary file download vulnerability that allows authenticated attackers to download sensitive files by manipulating the file parameter in index.php. Attackers can send GET requests to index.php with file_manager=image and supply arbitrary file paths like src/config.inc.php to retrieve configuration files and sensitive system data. |
2026-03-21 | |
| CVE-2019-25581 | 8.8 | HIGH | CWE-89 | 0.2% p41 | 6.17 | i-doit CMDB 1.12 contains an SQL injection vulnerability that allows unauthentic...i-doit CMDB 1.12 contains an SQL injection vulnerability that allows unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code through the objGroupID parameter. Attackers can send GET requests with crafted SQL payloads in the objGroupID parameter to extract sensitive database information including usernames, database names, and version details. |
2026-03-21 | |
| CVE-2019-25580 | 8.8 | HIGH | CWE-434 | 0.1% p17 | 6.16 | ownDMS 4.7 contains an SQL injection vulnerability that allows unauthenticated a...ownDMS 4.7 contains an SQL injection vulnerability that allows unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code through the IMG parameter. Attackers can send GET requests to pdfstream.php, imagestream.php, or anyfilestream.php with crafted SQL payloads in the IMG parameter to extract sensitive database information including version and database names. |
2026-03-21 | |
| CVE-2019-25579 | 8.7 | HIGH | CWE-22 | 3.3% p87 | 6.19 | phpTransformer 2016.9 contains a directory traversal vulnerability that allows u...phpTransformer 2016.9 contains a directory traversal vulnerability that allows unauthenticated attackers to access arbitrary files by manipulating the path parameter. Attackers can send requests to the jQueryFileUploadmaster server endpoint with traversal sequences ../../../../../../ to list and retrieve files outside the intended directory. |
2026-03-21 | |
| CVE-2019-25578 | 8.8 | HIGH | CWE-89 | 0.0% p13 | 6.16 | phpTransformer 2016.9 contains an SQL injection vulnerability that allows remote...phpTransformer 2016.9 contains an SQL injection vulnerability that allows remote attackers to execute arbitrary SQL queries by injecting malicious code through the idnews parameter. Attackers can send crafted GET requests to GeneratePDF.php with SQL payloads in the idnews parameter to extract sensitive database information or manipulate queries. |
2026-03-21 | |
| CVE-2019-25577 | 6.8 | MEDIUM | CWE-22 | 0.0% p7 | 4.76 | SeoToaster Ecommerce 3.0.0 contains a local file inclusion vulnerability that al...SeoToaster Ecommerce 3.0.0 contains a local file inclusion vulnerability that allows authenticated attackers to read arbitrary files by manipulating path parameters in backend theme endpoints. Attackers can send POST requests to /backend/backend_theme/editcss/ or /backend/backend_theme/editjs/ with directory traversal sequences in the getcss or getjs parameters to retrieve file contents. |
2026-03-21 | |
| CVE-2019-25576 | 8.8 | HIGH | CWE-89 | 0.1% p25 | 6.16 | Kepler Wallpaper Script 1.1 contains an SQL injection vulnerability that allows ...Kepler Wallpaper Script 1.1 contains an SQL injection vulnerability that allows unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code into the category parameter. Attackers can send GET requests to the category endpoint with URL-encoded SQL UNION statements to extract database information including usernames, database names, and MySQL version details. |
2026-03-21 | |
| CVE-2019-25575 | 8.8 | HIGH | CWE-89 | 0.1% p25 | 6.16 | SimplePress CMS 1.0.7 contains an SQL injection vulnerability that allows unauth...SimplePress CMS 1.0.7 contains an SQL injection vulnerability that allows unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code through the 'p' and 's' parameters. Attackers can send GET requests with crafted SQL payloads to extract sensitive database information including usernames, database names, and version details. |
2026-03-21 | |
| CVE-2019-25574 | 7.1 | HIGH | CWE-22 | 1.8% p82 | 5.02 | Green CMS 2.x contains a path traversal vulnerability that allows authenticated ...Green CMS 2.x contains a path traversal vulnerability that allows authenticated attackers to download arbitrary files and directories by injecting directory traversal sequences. Attackers can manipulate the theme_name parameter in the themeexporthandle action or supply base64-encoded file paths to the downfile action to retrieve sensitive files outside intended directories. |
2026-03-21 | |
| CVE-2019-25573 | 7.1 | HIGH | CWE-89 | 0.1% p15 | 4.97 | Green CMS 2.x contains an SQL injection vulnerability that allows authenticated ...Green CMS 2.x contains an SQL injection vulnerability that allows authenticated attackers to execute arbitrary SQL queries by injecting malicious code through the cat parameter. Attackers can send GET requests to index.php with m=admin, c=posts, a=index parameters and inject SQL code in the cat parameter to manipulate database queries and extract sensitive information. |
2026-03-21 | |
| CVE-2026-4516 | 5.3 | MEDIUM | CWE-74 | 0.0% p13 | 3.71 | A vulnerability was found in Foundation Agents MetaGPT up to 0.8.1. This vulnera...A vulnerability was found in Foundation Agents MetaGPT up to 0.8.1. This vulnerability affects unknown code of the file metagpt/actions/di/write_analysis_code.py of the component DataInterpreter. The manipulation results in injection. It is possible to launch the attack remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-21 | |
| CVE-2019-25572 | 6.9 | MEDIUM | CWE-1260 | 0.0% p3 | 4.83 | NordVPN 6.19.6 contains a denial of service vulnerability that allows local atta...NordVPN 6.19.6 contains a denial of service vulnerability that allows local attackers to crash the application by submitting an excessively long string in the email input field. Attackers can paste a buffer of 100,000 characters into the email field during login to trigger an application crash. |
2026-03-21 | |
| CVE-2019-25571 | 6.9 | MEDIUM | CWE-226 | 0.0% p3 | 4.83 | MediaMonkey 4.1.23 contains a denial of service vulnerability that allows local ...MediaMonkey 4.1.23 contains a denial of service vulnerability that allows local attackers to crash the application by opening a specially crafted MP3 file containing an excessively long URL string. Attackers can create a malicious MP3 file with a buffer containing 4000 bytes of data appended to a URL, which causes the application to crash when the file is opened through the File > Open URL dialog. |
2026-03-21 | |
| CVE-2019-25570 | 6.8 | MEDIUM | CWE-1260 | 0.0% p8 | 4.76 | RealTerm Serial Terminal 2.0.0.70 contains a denial of service vulnerability tha...RealTerm Serial Terminal 2.0.0.70 contains a denial of service vulnerability that allows local attackers to crash the application by supplying an excessively long string in the Port field. Attackers can paste a buffer of 1000 characters into the Port input field and click the open button to trigger a crash. |
2026-03-21 | |
| CVE-2019-25569 | 6.9 | MEDIUM | CWE-787 | 0.0% p3 | 4.83 | RealTerm Serial Terminal 2.0.0.70 contains a stack-based buffer overflow vulnera...RealTerm Serial Terminal 2.0.0.70 contains a stack-based buffer overflow vulnerability in the Echo Port field that allows local attackers to crash the application by triggering a structured exception handler (SEH) chain corruption. Attackers can craft a malicious input string with 268 bytes of padding followed by SEH overwrite values and paste it into the Port field to cause denial of service. |
2026-03-21 | |
| CVE-2019-25568 | 9.3 | CRITICAL | CWE-306 | 0.1% p17 | 6.51 | Memu Play 6.0.7 contains an insecure file permissions vulnerability that allows ...Memu Play 6.0.7 contains an insecure file permissions vulnerability that allows low-privilege users to escalate privileges by replacing the MemuService.exe executable. Attackers can rename and overwrite MemuService.exe in the installation directory with a malicious executable, which executes with system-level privileges when the service restarts after a computer reboot. |
2026-03-21 | |
| CVE-2019-25567 | 6.9 | MEDIUM | CWE-787 | 0.0% p3 | 4.83 | Valentina Studio 9.0.5 Linux contains a buffer overflow vulnerability in the Hos...Valentina Studio 9.0.5 Linux contains a buffer overflow vulnerability in the Host field of the connection dialog that allows local attackers to crash the application by supplying an oversized input string. Attackers can trigger the vulnerability by pasting a crafted buffer exceeding 264 bytes into the Host field during server connection attempts, causing a denial of service. |
2026-03-21 | |
| CVE-2019-25566 | 6.9 | MEDIUM | CWE-787 | 0.0% p3 | 4.83 | TransMac 12.3 contains a buffer overflow vulnerability in the volume name field ...TransMac 12.3 contains a buffer overflow vulnerability in the volume name field that allows local attackers to crash the application by supplying an excessively long string. Attackers can create a malicious file with 1000 repeated characters, paste the content into the volume name field during disk image creation, and trigger an application crash. |
2026-03-21 | |
| CVE-2019-25565 | 6.9 | MEDIUM | CWE-787 | 0.0% p3 | 4.83 | Magic Iso Maker 5.5 build 281 contains a buffer overflow vulnerability in the Se...Magic Iso Maker 5.5 build 281 contains a buffer overflow vulnerability in the Serial Code registration field that allows local attackers to crash the application by submitting an oversized input. Attackers can generate a file containing 5000 bytes of data, paste it into the Serial Code field during registration, and trigger a denial of service condition that crashes the application. |
2026-03-21 | |
| CVE-2019-25564 | 6.8 | MEDIUM | CWE-787 | 0.0% p4 | 4.76 | PCHelpWareV2 1.0.0.5 contains a denial of service vulnerability that allows loca...PCHelpWareV2 1.0.0.5 contains a denial of service vulnerability that allows local attackers to crash the application by supplying an excessively long string in the Group field. Attackers can paste a buffer overflow payload into the Group property field and click Ok to trigger an application crash. |
2026-03-21 | |
| CVE-2019-25563 | 6.9 | MEDIUM | CWE-226 | 0.0% p3 | 4.83 | PCHelpWareV2 1.0.0.5 contains a denial of service vulnerability that allows loca...PCHelpWareV2 1.0.0.5 contains a denial of service vulnerability that allows local attackers to crash the application by supplying a malformed image file. Attackers can trigger the vulnerability through the Create SC feature by selecting a crafted BMP file with an oversized buffer, causing the application to crash. |
2026-03-21 | |
| CVE-2019-25562 | 6.8 | MEDIUM | CWE-787 | 0.0% p5 | 4.76 | jetAudio 8.1.7 contains a buffer overflow vulnerability in the video converter c...jetAudio 8.1.7 contains a buffer overflow vulnerability in the video converter component that allows local attackers to crash the application by supplying an oversized string in the File Naming field. Attackers can paste a malicious buffer of 512 bytes into the File Naming parameter and trigger the crash by clicking the Preview button, causing a denial of service. |
2026-03-21 | |
| CVE-2019-25561 | 6.9 | MEDIUM | CWE-787 | 0.0% p3 | 4.83 | Lyric Maker 2.0.1.0 contains a buffer overflow vulnerability that allows local a...Lyric Maker 2.0.1.0 contains a buffer overflow vulnerability that allows local attackers to crash the application by supplying an excessively long string in the Title field. Attackers can paste a 5000-byte buffer into the Title input field and save the file to trigger a denial of service condition. |
2026-03-21 | |
| CVE-2019-25560 | 8.7 | HIGH | CWE-226 | 0.1% p17 | 6.09 | Lyric Video Creator 2.1 contains a denial of service vulnerability that allows a...Lyric Video Creator 2.1 contains a denial of service vulnerability that allows attackers to crash the application by processing malformed MP3 files. Attackers can create a crafted MP3 file with an oversized buffer and trigger the crash by opening the file through the Browse song functionality. |
2026-03-21 | |
| CVE-2019-25559 | 6.8 | MEDIUM | CWE-1260 | 0.0% p4 | 4.76 | SpotPaltalk 1.1.5 contains a denial of service vulnerability in the registration...SpotPaltalk 1.1.5 contains a denial of service vulnerability in the registration code input field that allows local attackers to crash the application by submitting an excessively long string. Attackers can paste a buffer of 1000 characters into the Name/Key field during registration to trigger a crash when the OK button is clicked. |
2026-03-21 | |
| CVE-2019-25558 | 6.9 | MEDIUM | CWE-787 | 0.0% p2 | 4.83 | Selfie Studio 2.17 contains a denial of service vulnerability in the Resize Imag...Selfie Studio 2.17 contains a denial of service vulnerability in the Resize Image function that allows local attackers to crash the application by supplying an excessively long buffer. Attackers can paste a large string of characters into the New Width or New Height field to trigger a buffer overflow that crashes the application. |
2026-03-21 | |
| CVE-2019-25557 | 6.9 | MEDIUM | CWE-775 | 0.0% p3 | 4.83 | TwistedBrush Pro Studio 24.06 contains a denial of service vulnerability that al...TwistedBrush Pro Studio 24.06 contains a denial of service vulnerability that allows local attackers to crash the application by importing a malformed .srp script file. Attackers can create a .srp file containing an excessively large buffer and import it through the Script Player interface to trigger an application crash. |
2026-03-21 | |
| CVE-2019-25556 | 6.9 | MEDIUM | CWE-787 | 0.0% p3 | 4.83 | TwistedBrush Pro Studio 24.06 contains a denial of service vulnerability in the ...TwistedBrush Pro Studio 24.06 contains a denial of service vulnerability in the Resize Image function that allows local attackers to crash the application by supplying an excessively long buffer. Attackers can paste a malicious string into the New Width or New Height field to trigger a buffer overflow that causes the application to crash. |
2026-03-21 | |
| CVE-2019-25555 | 6.9 | MEDIUM | CWE-131 | 0.0% p3 | 4.83 | TwistedBrush Pro Studio 24.06 contains a denial of service vulnerability in the ...TwistedBrush Pro Studio 24.06 contains a denial of service vulnerability in the Script Recorder component that allows local attackers to crash the application by supplying an excessively large buffer. Attackers can paste a malicious string containing 500,000 characters into the Description field of the Script Recorder dialog to trigger an application crash. |
2026-03-21 | |
| CVE-2019-25554 | 6.8 | MEDIUM | CWE-787 | 0.0% p4 | 4.76 | Tomabo MP4 Converter 3.25.22 contains a denial of service vulnerability that all...Tomabo MP4 Converter 3.25.22 contains a denial of service vulnerability that allows local attackers to crash the application by supplying an excessively long string in the Name field. Attackers can trigger a buffer overflow by pasting a large payload into the Name parameter when adding a preset in the Video/Audio Formats options, causing the application to crash when Reset All is clicked. |
2026-03-21 | |
| CVE-2019-25553 | 6.9 | MEDIUM | CWE-226 | 0.0% p2 | 4.83 | CEWE PHOTO IMPORTER 6.4.3 contains a denial of service vulnerability that allows...CEWE PHOTO IMPORTER 6.4.3 contains a denial of service vulnerability that allows local attackers to crash the application by importing a specially crafted image file. Attackers can create a malformed JPG file with an oversized buffer and trigger the crash through the import functionality during the image processing workflow. |
2026-03-21 | |
| CVE-2019-25552 | 8.7 | HIGH | CWE-836 | 0.0% p12 | 6.09 | CEWE PHOTO SHOW 6.4.3 contains a denial of service vulnerability that allows att...CEWE PHOTO SHOW 6.4.3 contains a denial of service vulnerability that allows attackers to crash the application by submitting an excessively long buffer to the password field. Attackers can paste a large string of repeated characters into the password input during the upload process to trigger an application crash. |
2026-03-21 | |
| CVE-2019-25551 | 6.9 | MEDIUM | CWE-1282 | 0.0% p3 | 4.83 | Sandboxie 5.30 contains a denial of service vulnerability that allows local atta...Sandboxie 5.30 contains a denial of service vulnerability that allows local attackers to crash the application by supplying an excessively long string in the Program Alerts configuration field. Attackers can paste a buffer of 5000 characters into the 'Select or enter a program' field during program alert configuration to trigger an application crash. |
2026-03-21 | |
| CVE-2019-25550 | 6.9 | MEDIUM | CWE-787 | 0.0% p3 | 4.83 | Encrypt PDF 2.3 contains a buffer overflow vulnerability that allows local attac...Encrypt PDF 2.3 contains a buffer overflow vulnerability that allows local attackers to crash the application by inputting excessively long strings into password fields. Attackers can paste a 1000-byte buffer into the User Password or Master Password field in the Settings dialog to trigger an application crash when importing PDF files. |
2026-03-21 | |
| CVE-2019-25549 | 6.9 | MEDIUM | CWE-787 | 0.0% p1 | 4.83 | VeryPDF PCL Converter 2.7 contains a denial of service vulnerability that allows...VeryPDF PCL Converter 2.7 contains a denial of service vulnerability that allows local attackers to crash the application by supplying an excessively long password string. Attackers can trigger a buffer overflow by entering a 3000-byte password in the PDF Security encryption fields, causing the application to crash when processing PCL files. |
2026-03-21 | |
| CVE-2019-25548 | 6.9 | MEDIUM | CWE-466 | 0.0% p3 | 4.83 | BlueStacks 4.80.0.1060 contains a denial of service vulnerability that allows lo...BlueStacks 4.80.0.1060 contains a denial of service vulnerability that allows local attackers to crash the application by submitting oversized input to the search field. Attackers can paste a buffer of 100,000 'A' characters into the search field and trigger a search operation to cause the application to crash. |
2026-03-21 | |
| CVE-2019-25547 | 6.9 | MEDIUM | CWE-787 | 0.0% p2 | 4.83 | NetAware 1.20 contains a buffer overflow vulnerability in the User Blocking feat...NetAware 1.20 contains a buffer overflow vulnerability in the User Blocking feature that allows local attackers to crash the application by supplying oversized input. Attackers can paste a malicious buffer of 512 bytes into the 'Add a website or keyword to be filtered' field and trigger a crash when removing the created block. |
2026-03-21 | |
| CVE-2019-25546 | 6.9 | MEDIUM | CWE-787 | 0.0% p2 | 4.83 | NetAware 1.20 contains a buffer overflow vulnerability in the Share Name field t...NetAware 1.20 contains a buffer overflow vulnerability in the Share Name field that allows local attackers to crash the application by supplying an excessively long string. Attackers can trigger a denial of service by pasting a 1000-byte buffer into the Share Name parameter when adding a new share through the Manage Shares interface. |
2026-03-21 | |
| CVE-2019-25545 | 6.9 | MEDIUM | CWE-787 | 0.0% p3 | 4.83 | Terminal Services Manager 3.2.1 contains a local buffer overflow vulnerability t...Terminal Services Manager 3.2.1 contains a local buffer overflow vulnerability that allows attackers to crash the application by supplying an excessively long string in the computer name field. Attackers can input a 5000-byte buffer of data into the 'Computer name or IP address' field during computer addition, causing a denial of service when the server entry is accessed. |
2026-03-21 | |
| CVE-2019-25544 | 6.9 | MEDIUM | CWE-807 | 0.0% p5 | 4.83 | Pidgin 2.13.0 contains a denial of service vulnerability that allows local attac...Pidgin 2.13.0 contains a denial of service vulnerability that allows local attackers to crash the application by providing an excessively long username string during account creation. Attackers can input a buffer of 1000 characters in the username field and trigger a crash when joining a chat, causing the application to become unavailable. |
2026-03-21 | |
| CVE-2026-4515 | 5.3 | MEDIUM | CWE-74 | 0.0% p13 | 3.71 | A vulnerability has been found in Foundation Agents MetaGPT up to 0.8.1. This af...A vulnerability has been found in Foundation Agents MetaGPT up to 0.8.1. This affects the function code_generate of the file metagpt/ext/aflow/scripts/operator.py. The manipulation leads to code injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-21 | |
| CVE-2026-4514 | 5.3 | MEDIUM | CWE-266 | 0.0% p11 | 3.71 | A flaw has been found in PbootCMS up to 3.2.12. Affected by this issue is some u...A flaw has been found in PbootCMS up to 3.2.12. Affected by this issue is some unknown functionality of the file apps/admin/controller/system/UserController.php of the component Backend. Executing a manipulation of the argument Field can lead to improper access controls. The attack may be performed from remote. The exploit has been published and may be used. |
2026-03-21 | |
| CVE-2026-4513 | 5.3 | MEDIUM | CWE-74 | 0.0% p8 | 3.71 | A vulnerability was detected in vanna-ai vanna up to 2.0.2. Affected by this vul...A vulnerability was detected in vanna-ai vanna up to 2.0.2. Affected by this vulnerability is the function ask of the file vanna\legacy\base\base.py. Performing a manipulation results in sql injection. The attack is possible to be carried out remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-21 | |
| CVE-2026-4511 | 5.3 | MEDIUM | CWE-74 | 0.0% p13 | 3.71 | A security vulnerability has been detected in vanna-ai vanna up to 2.0.2. Affect...A security vulnerability has been detected in vanna-ai vanna up to 2.0.2. Affected is the function exec of the file /src/vanna/legacy. Such manipulation leads to injection. The attack can be executed remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-21 | |
| CVE-2026-4510 | 5.3 | MEDIUM | CWE-79 | 0.0% p9 | 3.71 | A weakness has been identified in PbootCMS up to 3.2.12. This impacts the functi...A weakness has been identified in PbootCMS up to 3.2.12. This impacts the function alert_location of the file apps/home/controller/MemberController.php of the component Parameter Handler. This manipulation of the argument backurl causes cross site scripting. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be used for attacks. |
2026-03-21 | |
| CVE-2026-4373 | 7.5 | HIGH | CWE-36 | 0.1% p33 | 5.25 | The JetFormBuilder plugin for WordPress is vulnerable to arbitrary file read via...The JetFormBuilder plugin for WordPress is vulnerable to arbitrary file read via path traversal in all versions up to, and including, 3.5.6.2. This is due to the 'Uploaded_File::set_from_array' method accepting user-supplied file paths from the Media Field preset JSON payload without validating that the path belongs to the WordPress uploads directory. Combined with an insufficient same-file check in 'File_Tools::is_same_file' that only compares basenames, this makes it possible for unauthenticated attackers to exfiltrate arbitrary local files as email attachments by submitting a crafted form request when the form is configured with a Media Field and a Send Email action with file attachment. |
2026-03-21 | |
| CVE-2026-4509 | 5.3 | MEDIUM | CWE-183 | 0.1% p16 | 3.71 | A security flaw has been discovered in PbootCMS up to 3.2.12. This affects an un...A security flaw has been discovered in PbootCMS up to 3.2.12. This affects an unknown function of the file core/function/file.php of the component File Upload. The manipulation of the argument black results in incomplete blacklist. The attack may be launched remotely. The exploit has been released to the public and may be used for attacks. |
2026-03-21 | |
| CVE-2026-4261 | 8.8 | HIGH | CWE-862 | 0.0% p13 | 6.16 | The Expire Users plugin for WordPress is vulnerable to Privilege Escalation in a...The Expire Users plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.2.2. This is due to the plugin allowing a user to update the 'on_expire_default_to_role' meta through the 'save_extra_user_profile_fields' function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to elevate their privileges to that of an administrator. |
2026-03-21 | |
| CVE-2026-4161 | 4.4 | MEDIUM | CWE-79 | 0.1% p15 | 3.08 | The Review Map by RevuKangaroo plugin for WordPress is vulnerable to Stored Cros...The Review Map by RevuKangaroo plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin settings in all versions up to, and including, 1.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. |
2026-03-21 | |
| CVE-2026-4143 | 4.3 | MEDIUM | CWE-352 | 0.0% p2 | 3.01 | The Neos Connector for Fakturama plugin for WordPress is vulnerable to Cross-Sit...The Neos Connector for Fakturama plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to and including 0.0.14. This is due to missing nonce validation in the ncff_add_plugin_page() function which handles settings updates. This makes it possible for unauthenticated attackers to modify plugin settings via a forged request, granted they can trick a site administrator into performing an action such as clicking a link. |
2026-03-21 | |
| CVE-2026-4127 | 4.3 | MEDIUM | CWE-862 | 0.0% p9 | 3.01 | The Speedup Optimization plugin for WordPress is vulnerable to Missing Authoriza...The Speedup Optimization plugin for WordPress is vulnerable to Missing Authorization in all versions up to and including 1.5.9. The `speedup01_ajax_enabled()` function, which handles the `wp_ajax_speedup01_enabled` AJAX action, does not perform any capability check via `current_user_can()` and also lacks nonce verification. This is in contrast to other AJAX handlers in the same plugin (e.g., `speedup01_ajax_install_iox` and `speedup01_ajax_delete_cache_file`) which properly check for `install_plugins` and `manage_options` capabilities respectively. This makes it possible for authenticated attackers, with Subscriber-level access and above, to enable or disable the site's optimization module by sending a POST request to admin-ajax. |
2026-03-21 | |
| CVE-2026-4087 | 6.5 | MEDIUM | CWE-89 | 0.0% p9 | 4.55 | The Pre* Party Resource Hints plugin for WordPress is vulnerable to SQL Injectio...The Pre* Party Resource Hints plugin for WordPress is vulnerable to SQL Injection via the 'hint_ids' parameter of the pprh_update_hints AJAX action in all versions up to, and including, 1.8.20. This is due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. |
2026-03-21 | |
| CVE-2026-4086 | 6.4 | MEDIUM | CWE-79 | 0.0% p10 | 4.48 | The WP Random Button plugin for WordPress is vulnerable to Stored Cross-Site Scr...The WP Random Button plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'cat', 'nocat', and 'text' shortcode attributes of the 'wp_random_button' shortcode in all versions up to, and including, 1.0. This is due to insufficient input sanitization and output escaping on user-supplied shortcode attributes. Specifically, the random_button_html() function directly concatenates the 'cat' and 'nocat' parameters into HTML data-attributes without esc_attr(), and the 'text' parameter into HTML content without esc_html(). This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-03-21 | |
| CVE-2026-4084 | 6.4 | MEDIUM | CWE-79 | 0.0% p14 | 4.48 | The fyyd podcast shortcodes plugin for WordPress is vulnerable to Stored Cross-S...The fyyd podcast shortcodes plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'fyyd-podcast', 'fyyd-episode', and 'fyyd' shortcodes in all versions up to, and including, 0.3.1. This is due to insufficient input sanitization and output escaping on user-supplied shortcode attributes such as 'color', 'podcast_id', and 'podcast_slug'. These attributes are directly concatenated into inline JavaScript within single-quoted string arguments without any escaping or sanitization, allowing an attacker to break out of the JavaScript string context. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-03-21 | |
| CVE-2026-4077 | 6.4 | MEDIUM | CWE-79 | 0.0% p12 | 4.48 | The Ecover Builder For Dummies plugin for WordPress is vulnerable to Stored Cros...The Ecover Builder For Dummies plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'id' parameter of the 'ecover' shortcode in all versions up to and including 1.0. This is due to insufficient input sanitization and output escaping on the user-supplied 'id' shortcode attribute. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-03-21 | |
| CVE-2026-4072 | 6.4 | MEDIUM | CWE-79 | 0.0% p10 | 4.48 | The WordPress PayPal Donation plugin for WordPress is vulnerable to Stored Cross...The WordPress PayPal Donation plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'donate' shortcode in all versions up to, and including, 1.01. This is due to insufficient input sanitization and output escaping on user-supplied shortcode attributes such as 'amount', 'email', 'title', 'return_url', 'cancel_url', 'ccode', and 'image'. The wordpress_paypal_donation_create() function uses extract(shortcode_atts(...)) to process shortcode attributes and then directly interpolates these values into HTML output within single-quoted attribute values without any escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-03-21 | |
| CVE-2026-4069 | 6.1 | MEDIUM | CWE-79 | 0.1% p16 | 4.27 | The Alfie – Feed Plugin plugin for WordPress is vulnerable to Stored Cross-Site ...The Alfie – Feed Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'naam' parameter in all versions up to, and including, 1.2.1. This is due to missing nonce validation on the alfie_option_page() function combined with insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject malicious web scripts that will be stored in the plugin's database and execute whenever a user accesses the page displaying the injected data, granted they can trick a site administrator into performing an action such as clicking on a link. |
2026-03-21 | |
| CVE-2026-4067 | 6.4 | MEDIUM | CWE-79 | 0.0% p10 | 4.48 | The Ad Short plugin for WordPress is vulnerable to Stored Cross-Site Scripting v...The Ad Short plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'ad' shortcode's 'client' attribute in all versions up to and including 2.0.1. This is due to insufficient input sanitization and output escaping on the 'client' shortcode attribute. The ad_func() shortcode handler at line 71 accepts a 'client' attribute via shortcode_atts() and directly concatenates it into a double-quoted HTML attribute (data-ad-client) at line 130 without applying esc_attr() or any other sanitization. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-03-21 | |
| CVE-2026-4022 | 6.4 | MEDIUM | CWE-79 | 0.1% p23 | 4.48 | The Show Posts list – Easy designs, filters and more plugin for WordPress is vul...The Show Posts list – Easy designs, filters and more plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'post_type' shortcode attribute in the 'swiftpost-list' shortcode in all versions up to, and including, 1.1.0 due to insufficient input sanitization and output escaping on user-supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-03-21 | |
| CVE-2026-4004 | 6.5 | MEDIUM | CWE-94 | 0.1% p15 | 4.55 | The Task Manager plugin for WordPress is vulnerable to arbitrary shortcode execu...The Task Manager plugin for WordPress is vulnerable to arbitrary shortcode execution via the 'search' AJAX action in all versions up to, and including, 3.0.2. This is due to missing capability checks in the callback_search() function and insufficient input validation that allows shortcode syntax (square brackets) to pass through sanitize_text_field() and be concatenated into a do_shortcode() call. This makes it possible for authenticated attackers, with Subscriber-level access and above, to execute arbitrary shortcodes on the site by injecting shortcode syntax into parameters like 'task_id', 'point_id', 'categories_id', or 'term'. |
2026-03-21 | |
| CVE-2026-3997 | 6.4 | MEDIUM | CWE-79 | 0.1% p19 | 4.48 | The Text Toggle plugin for WordPress is vulnerable to Stored Cross-Site Scriptin...The Text Toggle plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'title' shortcode attribute of the [tt_part] and [tt] shortcodes in all versions up to and including 1.1. This is due to insufficient input sanitization and output escaping on user-supplied shortcode attributes. Specifically, in the avp_texttoggle_part_shortcode() function, the 'title' attribute is extracted from shortcode attributes and concatenated directly into HTML output without any escaping — both within an HTML attribute context (title="...") on line 116 and in HTML content on line 119. While the 'class' attribute is properly validated using ctype_alnum(), the 'title' attribute has no sanitization whatsoever. An attacker can inject double-quote characters to break out of the title attribute and inject arbitrary HTML attributes including event handlers. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-03-21 | |
| CVE-2026-3996 | 6.4 | MEDIUM | CWE-79 | 0.1% p19 | 4.48 | The WP Games Embed plugin for WordPress is vulnerable to Stored Cross-Site Scrip...The WP Games Embed plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the [game] shortcode in all versions up to and including 0.1beta. This is due to insufficient input sanitization and output escaping on user-supplied shortcode attributes such as 'width', 'height', 'src', 'title', 'description', 'game_url', 'main', and 'thumb', which are all directly concatenated into HTML output without any escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-03-21 | |
| CVE-2026-3651 | 5.3 | MEDIUM | CWE-862 | 0.1% p30 | 3.71 | The Build App Online plugin for WordPress is vulnerable to unauthorized access i...The Build App Online plugin for WordPress is vulnerable to unauthorized access in all versions up to, and including, 1.0.23. This is due to the plugin registering the 'build-app-online-update-vendor-product' AJAX action via wp_ajax_nopriv_ without proper authentication checks, capability verification, or nonce validation in the update_vendor_product() function. The function accepts a user-supplied post ID from the request and calls wp_update_post() to modify the post_author field without validating whether the user has permission to modify the specified post. This makes it possible for unauthenticated attackers to modify the post_author of arbitrary posts to 0 (orphaning posts from their legitimate authors), or for authenticated attackers to claim ownership of any post by setting themselves as the author. |
2026-03-21 | |
| CVE-2026-3645 | 5.3 | MEDIUM | CWE-862 | 0.1% p17 | 3.71 | The Punnel – Landing Page Builder plugin for WordPress is vulnerable to Missing ...The Punnel – Landing Page Builder plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 1.3.1. The save_config() function, which handles the 'punnel_save_config' AJAX action, lacks any capability check (current_user_can()) and nonce verification. This makes it possible for authenticated attackers, with Subscriber-level access and above, to overwrite the plugin's entire configuration including the API key via a POST request to admin-ajax.php. Once the API key is known (because the attacker set it), the attacker can use the plugin's public API endpoint (sniff_requests() at /?punnel_api=1) — which only validates requests by comparing a POST token against the stored api_key — to create, update, or delete arbitrary posts, pages, and products on the site. |
2026-03-21 | |
| CVE-2026-3641 | 5.3 | MEDIUM | CWE-20 | 0.1% p25 | 3.71 | The Appmax plugin for WordPress is vulnerable to Improper Input Validation in al...The Appmax plugin for WordPress is vulnerable to Improper Input Validation in all versions up to, and including, 1.0.3. This is due to the plugin registering a public REST API webhook endpoint at /webhook-system without implementing webhook signature validation, secret verification, or any mechanism to authenticate that incoming webhook requests genuinely originate from the legitimate Appmax payment service. The plugin directly processes untrusted attacker-controlled input from the 'event' and 'data' parameters without verifying the webhook's authenticity. This makes it possible for unauthenticated attackers to craft malicious webhook payloads that can modify the status of existing WooCommerce orders (e.g., changing them to processing, refunded, cancelled, or pending), create entirely new WooCommerce orders with arbitrary data, create new WooCommerce products with attacker-controlled names/descriptions/prices, and write arbitrary values to order post metadata by spoofing legitimate webhook events. |
2026-03-21 | |
| CVE-2026-3619 | 6.4 | MEDIUM | CWE-79 | 0.0% p10 | 4.48 | The Sheets2Table plugin for WordPress is vulnerable to Stored Cross-Site Scripti...The Sheets2Table plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'titles' shortcode attribute in the [sheets2table-render-table] shortcode in all versions up to and including 0.4.1. This is due to insufficient input sanitization and output escaping. Specifically, the 'titles' attribute value from the shortcode is passed through S2T_Functions::trim_array_values() (which only trims whitespace) and then echoed directly into HTML via `echo $header` inside a <th> tag in the display_table_header() function without any escaping such as esc_html(). This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-03-21 | |
| CVE-2026-3617 | 6.4 | MEDIUM | CWE-79 | 0.0% p12 | 4.48 | The Paypal Shortcode plugin for WordPress is vulnerable to Stored Cross-Site Scr...The Paypal Shortcode plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'amount' and 'name' shortcode attributes in all versions up to, and including, 0.3. This is due to insufficient input sanitization and output escaping on user-supplied shortcode attributes. The swer_paypal_shortcode() function extracts shortcode attributes using extract() and shortcode_atts() at line 89, then directly concatenates the $name and $amount values into HTML input element value attributes at lines 105-106 without applying esc_attr() or any other escaping function. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-03-21 | |
| CVE-2026-3570 | 5.3 | MEDIUM | CWE-862 | 0.1% p31 | 3.71 | The Smarter Analytics plugin for WordPress is vulnerable to unauthorized access ...The Smarter Analytics plugin for WordPress is vulnerable to unauthorized access in all versions up to, and including, 2.0. This is due to missing authentication and capability checks on the configuration reset functionality in the global scope of smarter-analytics.php. This makes it possible for unauthenticated attackers to reset all plugin configuration and delete all per-page/per-post analytics settings via the 'reset' parameter. |
2026-03-21 | |
| CVE-2026-3554 | 6.4 | MEDIUM | CWE-79 | 0.0% p10 | 4.48 | The Sherk Custom Post Type Displays plugin for WordPress is vulnerable to Stored...The Sherk Custom Post Type Displays plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'title' shortcode attribute in all versions up to, and including, 1.2.1. This is due to insufficient input sanitization and output escaping on the 'title' attribute of the 'sherkcptdisplays' shortcode. Specifically, in the sherkcptdisplays_func() function in includes/SherkCPTDisplaysShortcode.php, the 'title' attribute value is extracted from shortcode_atts() on line 19 and directly concatenated into an HTML <h2> tag on line 31 without any escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-03-21 | |
| CVE-2026-3546 | 5.3 | MEDIUM | CWE-202 | 0.0% p12 | 3.71 | The e-shot form builder plugin for WordPress is vulnerable to Sensitive Informat...The e-shot form builder plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.0.2. The eshot_form_builder_get_account_data() function is registered as a wp_ajax_ AJAX handler accessible to all authenticated users. The function lacks any capability check (e.g., current_user_can('manage_options')) and does not verify a nonce. It directly queries the database for the e-shot API token stored in the eshotformbuilder_control table and returns it along with all subaccount data as a JSON response. This makes it possible for authenticated attackers, with Subscriber-level access and above, to extract the e-shot API token and subaccount information, which could then be used to access the victim's e-shot platform account. |
2026-03-21 | |
| CVE-2026-3506 | 5.3 | MEDIUM | CWE-862 | 0.1% p21 | 3.71 | The WP-Chatbot for Messenger plugin for WordPress is vulnerable to authorization...The WP-Chatbot for Messenger plugin for WordPress is vulnerable to authorization bypass in all versions up to, and including, 4.9. This is due to the plugin not properly verifying that a user is authorized to perform an action. This makes it possible for unauthenticated attackers to overwrite the site's MobileMonkey API token and company ID options, which can be used to hijack chatbot configuration and redirect visitor conversations to an attacker-controlled MobileMonkey account. |
2026-03-21 | |
| CVE-2026-3478 | 7.2 | HIGH | CWE-918 | 0.1% p28 | 5.04 | The Content Syndication Toolkit plugin for WordPress is vulnerable to Server-Sid...The Content Syndication Toolkit plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.3 via the redux_p AJAX action in the bundled ReduxFramework library. The plugin registers a proxy endpoint (wp_ajax_nopriv_redux_p) that is accessible to unauthenticated users. The proxy() method in the Redux_P class takes a URL directly from $_GET['url'] without any validation (the regex is set to /.*/ which matches all URLs) and passes it to wp_remote_request(), which does not have built-in SSRF protection like wp_safe_remote_request(). There is no authentication check, no nonce verification, and no URL restriction. The response from the requested URL is then returned to the attacker, making this a full-read SSRF. This makes it possible for unauthenticated attackers to make web requests to arbitrary locations originating from the web application, which can be used to query and modify information from internal services, scan internal network ports, or interact with cloud metadata endpoints. |
2026-03-21 | |
| CVE-2026-3460 | 5.3 | MEDIUM | CWE-20 | 0.0% p13 | 3.71 | The REST API TO MiniProgram plugin for WordPress is vulnerable to Insecure Direc...The REST API TO MiniProgram plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 5.1.2. This is due to the permission callback (update_user_wechatshop_info_permissions_check) only validating that the supplied 'openid' parameter corresponds to an existing WordPress user, while the callback function (update_user_wechatshop_info) uses a separate, attacker-controlled 'userid' parameter to determine which user's metadata gets modified, with no verification that the 'openid' and 'userid' belong to the same user. This makes it possible for authenticated attackers, with Subscriber-level access and above, to modify arbitrary users' store-related metadata (storeinfo, storeappid, storename) via the 'userid' REST API parameter. |
2026-03-21 | |
| CVE-2026-3354 | 4.4 | MEDIUM | CWE-79 | 0.0% p10 | 3.08 | The Wikilookup plugin for WordPress is vulnerable to Stored Cross-Site Scripting...The Wikilookup plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'Popup Width' setting in all versions up to, and including, 1.1.5. This is due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Administrator-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. |
2026-03-21 | |
| CVE-2026-3353 | 4.4 | MEDIUM | CWE-79 | 0.0% p10 | 3.08 | The Comment SPAM Wiper plugin for WordPress is vulnerable to Stored Cross-Site S...The Comment SPAM Wiper plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'API Key' setting in all versions up to, and including, 1.2.1. This is due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Administrator-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. |
2026-03-21 | |
| CVE-2026-3347 | 5.5 | MEDIUM | CWE-79 | 0.0% p11 | 3.85 | The Multi Functional Flexi Lightbox plugin for WordPress is vulnerable to Stored...The Multi Functional Flexi Lightbox plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the `arv_lb[message]` parameter in all versions up to, and including, 1.2 due to insufficient input sanitization and output escaping. This is due to the `arv_lb_options_val()` sanitize callback returning user input without any sanitization, and the stored `message` value being output in the `genLB()` function without escaping. This makes it possible for authenticated attackers, with Administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses a page or post with the lightbox enabled. |
2026-03-21 | |
| CVE-2026-3335 | 5.3 | MEDIUM | CWE-862 | 0.2% p36 | 3.71 | The Canto plugin for WordPress is vulnerable to Missing Authorization in all ver...The Canto plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 3.1.1 via the `/wp-content/plugins/canto/includes/lib/copy-media.php` file. This is due to the file being directly accessible without any authentication, authorization, or nonce checks, and the `fbc_flight_domain` and `fbc_app_api` URL components being accepted as user-supplied POST parameters rather than read from admin-configured options. Since the attacker controls both the destination server and the `fbc_app_token` value, the entire fetch-and-upload chain is attacker-controlled — the server never contacts Canto's legitimate API, and the uploaded file originates entirely from the attacker's infrastructure. This makes it possible for unauthenticated attackers to upload arbitrary files (constrained to WordPress-allowed MIME types) to the WordPress uploads directory. Additional endpoints (`detail.php`, `download.php`, `get.php`, `tree.php`) are also directly accessible without authentication and make requests using a user-supplied `app_api` parameter combined with an admin-configured subdomain. |
2026-03-21 | |
| CVE-2026-3334 | 8.8 | HIGH | CWE-89 | 0.0% p9 | 6.16 | The CMS Commander plugin for WordPress is vulnerable to SQL Injection via the 'o...The CMS Commander plugin for WordPress is vulnerable to SQL Injection via the 'or_blogname', 'or_blogdescription', and 'or_admin_email' parameters in all versions up to, and including, 2.288. This is due to insufficient escaping on the user supplied parameters and lack of sufficient preparation on the existing SQL queries in the restore workflow. This makes it possible for authenticated attackers, with CMS Commander API key access, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. |
2026-03-21 | |
| CVE-2026-3333 | 6.4 | MEDIUM | CWE-79 | 0.0% p9 | 4.48 | The MinhNhut Link Gateway plugin for WordPress is vulnerable to Stored Cross-Sit...The MinhNhut Link Gateway plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'linkgate' shortcode in all versions up to, and including, 3.6.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-03-21 | |
| CVE-2026-3332 | 4.3 | MEDIUM | CWE-352 | 0.0% p1 | 3.01 | The Xhanch - My Advanced Settings plugin for WordPress is vulnerable to Cross-Si...The Xhanch - My Advanced Settings plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.1.2. This is due to missing nonce validation in the `xms_setting()` function on the settings update handler. This makes it possible for unauthenticated attackers to modify plugin settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. Settings that can be modified include favicon URL, Google Analytics account ID, and various WordPress behavior toggles. The `favicon_url` and `ga_acc_id` values are output on the front-end without escaping, enabling a CSRF to Stored XSS chain. |
2026-03-21 | |
| CVE-2026-3331 | 4.3 | MEDIUM | CWE-352 | 0.0% p1 | 3.01 | The Lobot Slider Administrator plugin for WordPress is vulnerable to Cross-Site ...The Lobot Slider Administrator plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 0.6.0. This is due to missing or incorrect nonce validation on the fourty_slider_options_page function. This makes it possible for unauthenticated attackers to modify plugin slider-page configuration via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. |
2026-03-21 | |
| CVE-2026-3003 | 7.2 | HIGH | CWE-79 | 0.1% p23 | 5.04 | The Vagaro Booking Widget plugin for WordPress is vulnerable to Stored Cross-Sit...The Vagaro Booking Widget plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘vagaro_code’ parameter in all versions up to, and including, 0.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-03-21 | |
| CVE-2026-2941 | 8.8 | HIGH | CWE-862 | 0.0% p13 | 6.16 | The Linksy Search and Replace plugin for WordPress is vulnerable to unauthorized...The Linksy Search and Replace plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'linksy_search_and_replace_item_details' function in all versions up to, and including, 1.0.4. This makes it possible for authenticated attackers, with subscriber-level access and above, to update any database table, any value, including the wp_capabilities database field, which allows attackers to change their own role to administrator, which leads to privilege escalation. |
2026-03-21 | |
| CVE-2026-2837 | 4.4 | MEDIUM | CWE-79 | 0.0% p8 | 3.08 | The Ricerca – advanced search plugin for WordPress is vulnerable to Stored Cross...The Ricerca – advanced search plugin for WordPress is vulnerable to Stored Cross-Site Scripting via plugin's settings in all versions up to, and including, 1.1.12 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. |
2026-03-21 | |
| CVE-2026-2723 | 6.1 | MEDIUM | CWE-352 | 0.0% p3 | 4.27 | The Post Snippits plugin for WordPress is vulnerable to Cross-Site Request Forge...The Post Snippits plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0. This is due to missing nonce validation on the settings page handlers for saving, adding, and deleting snippets. This makes it possible for unauthenticated attackers to modify plugin settings and inject malicious scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. |
2026-03-21 | |
| CVE-2026-2720 | 6.5 | MEDIUM | CWE-862 | 0.0% p9 | 4.55 | The Hr Press Lite plugin for WordPress is vulnerable to unauthorized access of s...The Hr Press Lite plugin for WordPress is vulnerable to unauthorized access of sensitive employee data due to a missing capability check on the `hrp-fetch-employees` AJAX action in all versions up to, and including, 1.0.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to retrieve sensitive employee information including names, email addresses, phone numbers, salary/pay rates, employment dates, and employment status. |
2026-03-21 | |
| CVE-2026-2503 | 6.5 | MEDIUM | CWE-89 | 0.0% p8 | 4.55 | The ElementCamp plugin for WordPress is vulnerable to time-based SQL Injection v...The ElementCamp plugin for WordPress is vulnerable to time-based SQL Injection via the 'meta_query[compare]' parameter in the 'tcg_select2_search_post' AJAX action in all versions up to, and including, 2.3.6. This is due to the user-supplied compare value being placed as an SQL operator in the query without validation against an allowlist of comparison operators. The value is passed through esc_sql(), but since the payload operates as an operator (not inside quotes), esc_sql() has no effect on payloads that don't contain quote characters. This makes it possible for authenticated attackers, with Author-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. |
2026-03-21 | |
| CVE-2026-2501 | 6.4 | MEDIUM | CWE-79 | 0.0% p9 | 4.48 | The Ed's Social Share plugin for WordPress is vulnerable to Stored Cross-Site Sc...The Ed's Social Share plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's `social_share` shortcode in all versions up to, and including, 2.0. This is due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-03-21 | |
| CVE-2026-2496 | 6.4 | MEDIUM | CWE-79 | 0.0% p9 | 4.48 | The Ed's Font Awesome plugin for WordPress is vulnerable to Stored Cross-Site Sc...The Ed's Font Awesome plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's `eds_font_awesome` shortcode in all versions up to, and including, 2.0. This is due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-03-21 | |
| CVE-2026-2468 | 7.5 | HIGH | CWE-89 | 0.1% p25 | 5.25 | The Quentn WP plugin for WordPress is vulnerable to SQL Injection via the 'qntn_...The Quentn WP plugin for WordPress is vulnerable to SQL Injection via the 'qntn_wp_access' cookie in all versions up to, and including, 1.2.12. This is due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query in the `get_user_access()` method. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. |
2026-03-21 | |
| CVE-2026-2440 | 7.2 | HIGH | CWE-79 | 0.1% p22 | 5.04 | The SurveyJS plugin for WordPress is vulnerable to Stored Cross-Site Scripting i...The SurveyJS plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 2.5.3 via survey result submissions. This is due to insufficient input sanitization and output escaping. The public survey page exposes the nonce required for submission, allowing unauthenticated attackers to submit HTML-encoded payloads that are decoded and rendered as executable HTML when an administrator views survey results, leading to stored XSS in the admin context. |
2026-03-21 | |
| CVE-2026-2427 | 6.1 | MEDIUM | CWE-79 | 0.1% p20 | 4.27 | The itsukaita plugin for WordPress is vulnerable to Reflected Cross-Site Scripti...The itsukaita plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'day_from' and 'day_to' parameters in all versions up to, and including, 0.1.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick an administrator into performing an action such as clicking on a link. |
2026-03-21 | |
| CVE-2026-2424 | 4.4 | MEDIUM | CWE-79 | 0.0% p11 | 3.08 | The Reward Video Ad for WordPress plugin for WordPress is vulnerable to Stored C...The Reward Video Ad for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.6. This is due to insufficient input sanitization and output escaping on plugin settings such as the 'Account ID', 'Message before the video', and color fields. This makes it possible for authenticated attackers, with Administrator-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-03-21 | |
| CVE-2026-2375 | 6.5 | MEDIUM | CWE-269 | 0.1% p17 | 4.55 | The App Builder – Create Native Android & iOS Apps On The Flight plugin for Word...The App Builder – Create Native Android & iOS Apps On The Flight plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 5.5.10. This is due to the `verify_role()` function in `AuthTrails.php` explicitly whitelisting the `wcfm_vendor` role alongside `subscriber` and `customer`, and assigning it directly via `wp_insert_user()` without integrating with WCFM Marketplace's vendor approval workflow. This makes it possible for unauthenticated attackers to register an account with the `wcfm_vendor` role by supplying the `role` parameter in the `/wp-json/app-builder/v1/register` REST API endpoint, bypassing the standard WCFM vendor approval process and immediately gaining vendor-level privileges (product management, order access, store management) on sites where WCFM Marketplace is active. |
2026-03-21 | |
| CVE-2026-2351 | 6.5 | MEDIUM | CWE-73 | 0.0% p9 | 4.55 | The Task Manager plugin for WordPress is vulnerable to Arbitrary File Read in al...The Task Manager plugin for WordPress is vulnerable to Arbitrary File Read in all versions up to, and including, 3.0.2 via the callback_get_text_from_url() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information. |
2026-03-21 | |
| CVE-2026-2294 | 4.3 | MEDIUM | CWE-285 | 0.0% p8 | 3.01 | The UiPress lite | Effortless custom dashboards, admin themes and pages plugin f...The UiPress lite | Effortless custom dashboards, admin themes and pages plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'uip_save_global_settings' function in all versions up to, and including, 3.5.09. This makes it possible for authenticated attackers, with Subscriber-level access and above, to change arbitrary plugin settings. |
2026-03-21 | |
| CVE-2026-2290 | 3.8 | LOW | CWE-918 | 0.0% p8 | 2.66 | The Post Affiliate Pro plugin for WordPress is vulnerable to Server-Side Request...The Post Affiliate Pro plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.28.0. This makes it possible for authenticated attackers, with Administrator-level access, to make web requests to initiate arbitrary outbound requests from the application and read the returned response content. Successful exploitation was confirmed by receiving and observing response data from an external Collaborator endpoint. |
2026-03-21 | |
| CVE-2026-2279 | 7.2 | HIGH | CWE-89 | 0.0% p11 | 5.04 | The myLinksDump plugin for WordPress is vulnerable to SQL Injection via the 'sor...The myLinksDump plugin for WordPress is vulnerable to SQL Injection via the 'sort_by' and 'sort_order' parameters in all versions up to, and including, 1.6 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. |
2026-03-21 | |
| CVE-2026-2277 | 6.1 | MEDIUM | CWE-79 | 0.1% p22 | 4.27 | The rexCrawler plugin for WordPress is vulnerable to Reflected Cross-Site Script...The rexCrawler plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'url' and 'regex' parameters in the search-pattern tester page in all versions up to, and including, 1.0.15 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick an administrator into performing an action such as clicking on a link. This only affects multi-site installations and installations where unfiltered_html has been disabled. |
2026-03-21 | |
| CVE-2026-2121 | 4.4 | MEDIUM | CWE-79 | 0.0% p13 | 3.08 | The Weaver Show Posts plugin for WordPress is vulnerable to Stored Cross-Site Sc...The Weaver Show Posts plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'add_class' parameter in all versions up to, and including, 1.8.1. This is due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with Administrator-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This primarily affects multisite installations where Administrators do not have the unfiltered_html capability. |
2026-03-21 | |
| CVE-2026-1935 | 4.3 | MEDIUM | CWE-862 | 0.0% p7 | 3.01 | The Company Posts for LinkedIn plugin for WordPress is vulnerable to Missing Aut...The Company Posts for LinkedIn plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 1.0.0. This is due to a missing capability check on the `linkedin_company_post_reset_handler()` function hooked to `admin_post_reset_linkedin_company_post`. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete LinkedIn post data stored in the site's options table. |
2026-03-21 | |
| CVE-2026-1914 | 6.4 | MEDIUM | CWE-79 | 0.0% p9 | 4.48 | The FuseDesk plugin for WordPress is vulnerable to Stored Cross-Site Scripting v...The FuseDesk plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's fusedesk_newcase shortcode in all versions up to, and including, 6.8 due to insufficient input sanitization and output escaping on the 'emailtext' attribute. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-03-21 | |
| CVE-2026-1911 | 6.4 | MEDIUM | CWE-79 | 0.0% p9 | 4.48 | The Twitter Feeds plugin for WordPress is vulnerable to Stored Cross-Site Script...The Twitter Feeds plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'tweet_title' parameter in the 'TwitterFeeds' shortcode in all versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-03-21 | |
| CVE-2026-1908 | 6.4 | MEDIUM | CWE-79 | 0.0% p9 | 4.48 | The Integration with Hubspot Forms plugin for WordPress is vulnerable to Stored ...The Integration with Hubspot Forms plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'hubspotform' shortcode in all versions up to, and including, 1.2.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-03-21 | |
| CVE-2026-1899 | 6.4 | MEDIUM | CWE-79 | 0.0% p9 | 4.48 | The Any Post Slider plugin for WordPress is vulnerable to Stored Cross-Site Scri...The Any Post Slider plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's aps_slider shortcode in all versions up to, and including, 1.0.4 due to insufficient input sanitization and output escaping on the 'post_type' attribute. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-03-21 | |
| CVE-2026-1891 | 6.4 | MEDIUM | CWE-79 | 0.0% p9 | 4.48 | The Simple Football Scoreboard plugin for WordPress is vulnerable to Stored Cros...The Simple Football Scoreboard plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'ytmr_fb_scoreboard' shortcode in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-03-21 | |
| CVE-2026-1889 | 6.4 | MEDIUM | CWE-79 | 0.0% p9 | 4.48 | The Outgrow plugin for WordPress is vulnerable to Stored Cross-Site Scripting vi...The Outgrow plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'id' attribute of the 'outgrow' shortcode in all versions up to, and including, 2.1. This is due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-03-21 | |
| CVE-2026-1886 | 6.4 | MEDIUM | CWE-79 | 0.0% p10 | 4.48 | The Go Night Pro | WordPress Dark Mode Plugin for WordPress is vulnerable to Sto...The Go Night Pro | WordPress Dark Mode Plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'go-night-pro-shortcode' shortcode in all versions up to, and including, 1.1.0 due to insufficient input sanitization and output escaping on the user-supplied 'margin' attribute. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-03-21 | |
| CVE-2026-1854 | 6.4 | MEDIUM | CWE-79 | 0.0% p9 | 4.48 | The Post Flagger plugin for WordPress is vulnerable to Stored Cross-Site Scripti...The Post Flagger plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'flag' shortcode in all versions up to, and including, 1.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-03-21 | |
| CVE-2026-1851 | 6.4 | MEDIUM | CWE-79 | 0.0% p9 | 4.48 | The iVysilani Shortcode plugin for WordPress is vulnerable to Stored Cross-Site ...The iVysilani Shortcode plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'width' shortcode attribute in all versions up to, and including, 3.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-03-21 | |
| CVE-2026-1822 | 6.4 | MEDIUM | CWE-79 | 0.0% p9 | 4.48 | The WP NG Weather plugin for WordPress is vulnerable to Stored Cross-Site Script...The WP NG Weather plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'ng-weather' shortcode in all versions up to, and including, 1.0.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-03-21 | |
| CVE-2026-1806 | 6.4 | MEDIUM | CWE-79 | 0.0% p9 | 4.48 | The Tour & Activity Operator Plugin for TourCMS plugin for WordPress is vulnerab...The Tour & Activity Operator Plugin for TourCMS plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'target' parameter of the tourcms_doc_link shortcode in all versions up to, and including, 1.7.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-03-21 | |
| CVE-2026-1800 | 7.5 | HIGH | CWE-89 | 0.1% p27 | 5.25 | The Fonts Manager | Custom Fonts plugin for WordPress is vulnerable to time-base...The Fonts Manager | Custom Fonts plugin for WordPress is vulnerable to time-based SQL Injection via the ‘fmcfIdSelectedFnt’ parameter in all versions up to, and including, 1.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. |
2026-03-21 | |
| CVE-2026-1648 | 7.2 | HIGH | CWE-918 | 0.1% p15 | 5.04 | The Performance Monitor plugin for WordPress is vulnerable to Server-Side Reques...The Performance Monitor plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.0.6. This is due to insufficient validation of the 'url' parameter in the '/wp-json/performance-monitor/v1/curl_data' REST API endpoint. This makes it possible for unauthenticated attackers to make web requests to arbitrary locations, including internal services, via the Gopher protocol and other dangerous protocols. This can be exploited to achieve Remote Code Execution by chaining with services like Redis. |
2026-03-21 | |
| CVE-2026-1647 | 6.1 | MEDIUM | CWE-79 | 0.1% p21 | 4.27 | The Comment Genius plugin for WordPress is vulnerable to Reflected Cross-Site Sc...The Comment Genius plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the `$_SERVER['PHP_SELF']` parameter in all versions up to, and including, 1.2.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. |
2026-03-21 | |
| CVE-2026-1575 | 6.4 | MEDIUM | CWE-79 | 0.0% p9 | 4.48 | The Schema Shortcode plugin for WordPress is vulnerable to Stored Cross-Site Scr...The Schema Shortcode plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's `itemscope` shortcode in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-03-21 | |
| CVE-2026-1503 | 4.3 | MEDIUM | CWE-352 | 0.0% p2 | 3.01 | The login_register plugin for WordPress is vulnerable to Cross-Site Request Forg...The login_register plugin for WordPress is vulnerable to Cross-Site Request Forgery to Stored Cross-Site Scripting in all versions up to, and including, 1.2.0. This is due to missing nonce validation on the settings page and insufficient input sanitization and output escaping on the 'login_register_login_post' parameter. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page via a forged request granted they can trick an administrator into performing an action such as clicking on a link. |
2026-03-21 | |
| CVE-2026-1397 | 6.4 | MEDIUM | CWE-79 | 0.0% p10 | 4.48 | The PQ Addons – Creative Elementor Widgets plugin for WordPress is vulnerable to...The PQ Addons – Creative Elementor Widgets plugin for WordPress is vulnerable to Stored Cross-Site Scripting via widget attributes in all versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping on the html_tag parameter in the PQ Section Title widget. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-03-21 | |
| CVE-2026-1393 | 4.3 | MEDIUM | CWE-352 | 0.0% p1 | 3.01 | The Add Google Social Profiles to Knowledge Graph Box plugin for WordPress is vu...The Add Google Social Profiles to Knowledge Graph Box plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0. This is due to missing nonce validation on the settings update functionality. This makes it possible for unauthenticated attackers to update the plugin's Knowledge Graph settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. |
2026-03-21 | |
| CVE-2026-1392 | 4.3 | MEDIUM | CWE-352 | 0.0% p1 | 3.01 | The SR WP Minify HTML plugin for WordPress is vulnerable to Cross-Site Request F...The SR WP Minify HTML plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.1. This is due to missing nonce validation on the sr_minify_html_theme() function. This makes it possible for unauthenticated attackers to update plugin settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. |
2026-03-21 | |
| CVE-2026-1390 | 4.3 | MEDIUM | CWE-352 | 0.0% p1 | 3.01 | The Redirect countdown plugin for WordPress is vulnerable to Cross-Site Request ...The Redirect countdown plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0. This is due to missing nonce validation on the `countdown_settings_content()` function. This makes it possible for unauthenticated attackers to update the plugin settings including the countdown timeout, redirect URL, and custom text, via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. |
2026-03-21 | |
| CVE-2026-1378 | 4.3 | MEDIUM | CWE-352 | 0.0% p1 | 3.01 | The WP Posts Re-order plugin for WordPress is vulnerable to Cross-Site Request F...The WP Posts Re-order plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0. This is due to missing nonce validation on the `cpt_plugin_options()` function. This makes it possible for unauthenticated attackers to update the plugin settings including capability, autosort, and adminsort settings, via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. |
2026-03-21 | |
| CVE-2026-1313 | 8.3 | HIGH | CWE-918 | 0.0% p14 | 5.81 | The MimeTypes Link Icons plugin for WordPress is vulnerable to Server-Side Reque...The MimeTypes Link Icons plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 3.2.20. This is due to the plugin making outbound HTTP requests to user-controlled URLs without proper validation when the "Show file size" option is enabled. This makes it possible for authenticated attackers, with Contributor-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services via crafted links in post content. |
2026-03-21 | |
| CVE-2026-1278 | 4.4 | MEDIUM | CWE-79 | 0.0% p8 | 3.08 | The Mandatory Field plugin for WordPress is vulnerable to Stored Cross-Site Scri...The Mandatory Field plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.6.8 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. |
2026-03-21 | |
| CVE-2026-1275 | 6.4 | MEDIUM | CWE-79 | 0.0% p9 | 4.48 | The Multi Post Carousel by Category plugin for WordPress is vulnerable to Stored...The Multi Post Carousel by Category plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'slides' shortcode attribute in all versions up to, and including, 1.4. This is due to insufficient input sanitization and output escaping on the user-supplied 'slides' parameter in the post_slides_shortcode function. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-03-21 | |
| CVE-2026-1253 | 4.3 | MEDIUM | CWE-862 | 0.1% p19 | 3.01 | The Group Chat & Video Chat by AtomChat plugin for WordPress is vulnerable to un...The Group Chat & Video Chat by AtomChat plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'atomchat_update_auth_ajax' and 'atomchat_update_layout_ajax' functions in all versions up to, and including, 1.1.7. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update plugin options, including critical settings such as API keys, authentication keys, and layout configurations. |
2026-03-21 | |
| CVE-2026-1247 | 4.4 | MEDIUM | CWE-79 | 0.0% p8 | 3.08 | The Survey plugin for WordPress is vulnerable to Stored Cross-Site Scripting via...The Survey plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. |
2026-03-21 | |
| CVE-2026-1093 | 6.4 | MEDIUM | CWE-79 | 0.0% p9 | 4.48 | The WPFAQBlock– FAQ & Accordion Plugin For Gutenberg plugin for WordPress is vul...The WPFAQBlock– FAQ & Accordion Plugin For Gutenberg plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'class' parameter of the 'wpfaqblock' shortcode in all versions up to, and including, 1.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-03-21 | |
| CVE-2026-0609 | 6.4 | MEDIUM | CWE-79 | 0.0% p9 | 4.48 | The Logo Slider – Logo Carousel, Logo Showcase & Client Logo Slider Plugin plugi...The Logo Slider – Logo Carousel, Logo Showcase & Client Logo Slider Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the image alt text in all versions up to, and including, 4.9.0 due to insufficient input sanitization and output escaping in the 'logo-slider' shortcode. This makes it possible for authenticated attackers, with author level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-03-21 | |
| CVE-2025-14037 | 8.1 | HIGH | CWE-352 | 0.0% p11 | 5.67 | The Invelity Product Feeds plugin for WordPress is vulnerable to arbitrary file ...The Invelity Product Feeds plugin for WordPress is vulnerable to arbitrary file deletion via path traversal in all versions up to, and including, 1.2.6. This is due to missing validation and sanitization in the 'createManageFeedPage' function. This makes it possible for authenticated administrator-level attackers to delete arbitrary files on the server via specially crafted requests that include path traversal sequences, granted they can trick an admin into clicking a malicious link. |
2026-03-21 | |
| CVE-2025-13910 | 6.1 | MEDIUM | CWE-79 | 0.1% p21 | 4.27 | The WP-WebAuthn plugin for WordPress is vulnerable to Unauthenticated Stored Cro...The WP-WebAuthn plugin for WordPress is vulnerable to Unauthenticated Stored Cross-Site Scripting via the `wwa_auth` AJAX endpoint in all versions up to, and including, 1.3.4 due to insufficient input sanitization and output escaping on user supplied attributes logged by the plugin. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses the plugin's log page, provided that the logging option is enabled in the plugin settings. |
2026-03-21 | |
| CVE-2024-13785 | 5.6 | MEDIUM | CWE-94 | 0.1% p28 | 3.92 | The The Contact Form, Survey, Quiz & Popup Form Builder – ARForms plugin for Wor...The The Contact Form, Survey, Quiz & Popup Form Builder – ARForms plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 1.7.2. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes. |
2026-03-21 | |
| CVE-2026-4302 | 7.2 | HIGH | CWE-918 | 0.1% p19 | 5.04 | The WowOptin: Next-Gen Popup Maker plugin for WordPress is vulnerable to Server-...The WowOptin: Next-Gen Popup Maker plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.4.29. This is due to the plugin exposing a publicly accessible REST API endpoint (optn/v1/integration-action) with a permission_callback of __return_true that passes user-supplied URLs directly to wp_remote_get() and wp_remote_post() in the Webhook::add_subscriber() method without any URL validation or restriction. The plugin does not use wp_safe_remote_get/post which provide built-in SSRF protection. This makes it possible for unauthenticated attackers to make web requests to arbitrary locations originating from the web application, which can be used to query and modify information from internal services. |
2026-03-21 | |
| CVE-2026-32899 | 5.3 | MEDIUM | CWE-863 | 0.0% p8 | 3.71 | OpenClaw versions prior to 2026.2.25 fail to consistently apply sender-policy ch...OpenClaw versions prior to 2026.2.25 fail to consistently apply sender-policy checks to reaction_* and pin_* non-message events before adding them to system-event context. Attackers can bypass configured DM policies and channel user allowlists to inject unauthorized reaction and pin events from restricted senders. |
2026-03-21 | |
| CVE-2026-32898 | 5.3 | MEDIUM | CWE-807 | 0.1% p15 | 3.71 | OpenClaw versions prior to 2026.2.23 contain an authorization bypass vulnerabili...OpenClaw versions prior to 2026.2.23 contain an authorization bypass vulnerability in the ACP client that auto-approves tool calls based on untrusted toolCall.kind metadata and permissive name heuristics. Attackers can bypass interactive approval prompts for read-class operations by spoofing tool metadata or using non-core read-like names to reach auto-approve paths. |
2026-03-21 | |
| CVE-2026-32897 | 6.3 | MEDIUM | CWE-320 | 0.1% p21 | 4.41 | OpenClaw versions prior to 2026.2.22 reuse gateway.auth.token as a fallback hash...OpenClaw versions prior to 2026.2.22 reuse gateway.auth.token as a fallback hash secret for owner-ID prompt obfuscation when commands.ownerDisplay is set to hash and commands.ownerDisplaySecret is unset, creating dual-use of authentication secrets across security domains. Attackers with access to system prompts sent to third-party model providers can derive the gateway authentication token from the hash outputs, compromising gateway authentication security. |
2026-03-21 | |
| CVE-2026-32896 | 6.3 | MEDIUM | CWE-306 | 0.1% p22 | 4.41 | OpenClaw versions prior to 2026.2.21 BlueBubbles webhook handler contains a pass...OpenClaw versions prior to 2026.2.21 BlueBubbles webhook handler contains a passwordless fallback authentication path that allows unauthenticated webhook events in certain reverse-proxy or local routing configurations. Attackers can bypass webhook authentication by exploiting the loopback/proxy heuristics to send unauthenticated webhook events to the BlueBubbles plugin. |
2026-03-21 | |
| CVE-2026-32895 | 5.3 | MEDIUM | CWE-863 | 0.0% p8 | 3.71 | OpenClaw versions prior to 2026.2.26 fail to enforce sender authorization in mem...OpenClaw versions prior to 2026.2.26 fail to enforce sender authorization in member and message subtype system event handlers, allowing unauthorized events to be enqueued. Attackers can bypass Slack DM allowlists and per-channel user allowlists by sending system events from non-allowlisted senders through message_changed, message_deleted, and thread_broadcast events. |
2026-03-21 | |
| CVE-2026-32067 | 2.0 | LOW | CWE-863 | 0.0% p8 | 1.40 | OpenClaw versions prior to 2026.2.26 contains an authorization bypass vulnerabil...OpenClaw versions prior to 2026.2.26 contains an authorization bypass vulnerability in the pairing-store access control for direct message pairing policy that allows attackers to reuse pairing approvals across multiple accounts. An attacker approved as a sender in one account can be automatically accepted in another account in multi-account deployments without explicit approval, bypassing authorization boundaries. |
2026-03-21 | |
| CVE-2026-32065 | 5.7 | MEDIUM | CWE-436 | 0.0% p10 | 3.99 | OpenClaw versions prior to 2026.2.25 contain an approval-integrity bypass vulner...OpenClaw versions prior to 2026.2.25 contain an approval-integrity bypass vulnerability in system.run where rendered command text is used as approval identity while trimming argv token whitespace, but runtime execution uses raw argv. An attacker can craft a trailing-space executable token to execute a different binary than what the approver displayed, allowing unexpected command execution under the OpenClaw runtime user when they can influence command argv and reuse an approval context. |
2026-03-21 | |
| CVE-2026-32064 | 8.5 | HIGH | CWE-306 | 0.1% p25 | 5.95 | OpenClaw versions prior to 2026.2.21 sandbox browser entrypoint launches x11vnc ...OpenClaw versions prior to 2026.2.21 sandbox browser entrypoint launches x11vnc without authentication for noVNC observer sessions, allowing unauthenticated access to the VNC interface. Remote attackers on the host loopback interface can connect to the exposed noVNC port to observe or interact with the sandbox browser without credentials. |
2026-03-21 | |
| CVE-2026-32058 | 2.0 | LOW | CWE-863 | 0.0% p7 | 1.40 | OpenClaw versions prior to 2026.2.26 contain an approval context-binding weaknes...OpenClaw versions prior to 2026.2.26 contain an approval context-binding weakness in system.run execution flows with host=node that allows reuse of previously approved requests with modified environment variables. Attackers with access to an approval id can exploit this by reusing an approval with changed env input, bypassing execution-integrity controls in approval-enabled workflows. |
2026-03-21 | |
| CVE-2026-32057 | 6.0 | MEDIUM | CWE-807 | 0.1% p26 | 4.20 | OpenClaw versions prior to 2026.2.25 contain an authentication bypass vulnerabil...OpenClaw versions prior to 2026.2.25 contain an authentication bypass vulnerability in the trusted-proxy Control UI pairing mechanism that accepts client.id=control-ui without proper device identity verification. An authenticated node role websocket client can exploit this by using the control-ui client identifier to skip pairing requirements and gain unauthorized access to node event execution flows. |
2026-03-21 | |
| CVE-2026-32056 | 7.7 | HIGH | CWE-78 | 0.1% p34 | 5.39 | OpenClaw versions prior to 2026.2.22 fail to sanitize shell startup environment ...OpenClaw versions prior to 2026.2.22 fail to sanitize shell startup environment variables HOME and ZDOTDIR in the system.run function, allowing attackers to bypass command allowlist protections. Remote attackers can inject malicious startup files such as .bash_profile or .zshenv to achieve arbitrary code execution before allowlist-evaluated commands are executed. |
2026-03-21 | |
| CVE-2026-32055 | 7.2 | HIGH | CWE-22 | 0.1% p21 | 5.04 | OpenClaw versions prior to 2026.2.26 contain a path traversal vulnerability in w...OpenClaw versions prior to 2026.2.26 contain a path traversal vulnerability in workspace boundary validation that allows attackers to write files outside the workspace through in-workspace symlinks pointing to non-existent out-of-root targets. The vulnerability exists because the boundary check improperly resolves aliases, permitting the first write operation to escape the workspace boundary and create files in arbitrary locations. |
2026-03-21 | |
| CVE-2026-32054 | 5.9 | MEDIUM | CWE-59 | 0.0% p1 | 4.13 | OpenClaw versions prior to 2026.2.25 contain a symlink traversal vulnerability i...OpenClaw versions prior to 2026.2.25 contain a symlink traversal vulnerability in browser trace and download output path handling that allows local attackers to escape the managed temp root directory. An attacker with local access can create symlinks to route file writes outside the intended temp directory, enabling arbitrary file overwrite on the affected system. |
2026-03-21 | |
| CVE-2026-32053 | 6.9 | MEDIUM | CWE-294 | 0.1% p17 | 4.83 | OpenClaw versions prior to 2026.2.23 contain a vulnerability in Twilio webhook e...OpenClaw versions prior to 2026.2.23 contain a vulnerability in Twilio webhook event deduplication where normalized event IDs are randomized per parse, allowing replay events to bypass manager dedupe checks. Attackers can replay Twilio webhook events to trigger duplicate or stale call-state transitions, potentially causing incorrect call handling and state corruption. |
2026-03-21 | |
| CVE-2026-32052 | 5.8 | MEDIUM | CWE-436 | 0.1% p25 | 4.06 | OpenClaw versions prior to 2026.2.24 contain a command injection vulnerability i...OpenClaw versions prior to 2026.2.24 contain a command injection vulnerability in the system.run shell-wrapper that allows attackers to execute hidden commands by injecting positional argv carriers after inline shell payloads. Attackers can craft misleading approval text while executing arbitrary commands through trailing positional arguments that bypass display context validation. |
2026-03-21 | |
| CVE-2026-32051 | 8.7 | HIGH | CWE-863 | 0.1% p21 | 6.09 | OpenClaw versions prior to 2026.3.1 contain an authorization mismatch vulnerabil...OpenClaw versions prior to 2026.3.1 contain an authorization mismatch vulnerability that allows authenticated callers with operator.write scope to invoke owner-only tool surfaces including gateway and cron through agent runs in scoped-token deployments. Attackers with write-scope access can perform control-plane actions beyond their intended authorization level by exploiting inconsistent owner-only gating during agent execution. |
2026-03-21 | |
| CVE-2026-32050 | 6.3 | MEDIUM | CWE-863 | 0.0% p10 | 4.41 | OpenClaw versions prior to 2026.2.25 contain an access control vulnerability in ...OpenClaw versions prior to 2026.2.25 contain an access control vulnerability in signal reaction notification handling that allows unauthorized senders to enqueue status events before authorization checks are applied. Attackers can exploit the reaction-only event path in event-handler.ts to queue signal reaction status lines for sessions without proper DM or group access validation. |
2026-03-21 | |
| CVE-2026-32049 | 8.7 | HIGH | CWE-770 | 0.2% p36 | 6.09 | OpenClaw versions prior to 2026.2.22 fail to consistently enforce configured inb...OpenClaw versions prior to 2026.2.22 fail to consistently enforce configured inbound media byte limits before buffering remote media across multiple channel ingestion paths. Remote attackers can send oversized media payloads to trigger elevated memory usage and potential process instability. |
2026-03-21 | |
| CVE-2026-32048 | 7.7 | HIGH | CWE-732 | 0.0% p14 | 5.39 | OpenClaw versions prior to 2026.3.1 fail to enforce sandbox inheritance during c...OpenClaw versions prior to 2026.3.1 fail to enforce sandbox inheritance during cross-agent sessions_spawn operations, allowing sandboxed sessions to create child processes under unsandboxed agents. An attacker with a sandboxed session can exploit this to spawn child runtimes with sandbox.mode set to off, bypassing runtime confinement restrictions. |
2026-03-21 | |
| CVE-2026-32046 | 4.8 | MEDIUM | CWE-1188 | 0.1% p15 | 3.36 | OpenClaw versions prior to 2026.2.21 contain an improper sandbox configuration v...OpenClaw versions prior to 2026.2.21 contain an improper sandbox configuration vulnerability that allows attackers to execute arbitrary code by exploiting renderer-side vulnerabilities without requiring a sandbox escape. Attackers can leverage the disabled OS-level sandbox protections in the Chromium browser container to achieve code execution on the host system. |
2026-03-21 | |
| CVE-2026-32045 | 8.2 | HIGH | CWE-290 | 0.1% p23 | 5.74 | OpenClaw versions prior to 2026.2.21 incorrectly apply tokenless Tailscale heade...OpenClaw versions prior to 2026.2.21 incorrectly apply tokenless Tailscale header authentication to HTTP gateway routes, allowing bypass of token and password requirements. Attackers on trusted networks can exploit this misconfiguration to access HTTP gateway routes without proper authentication credentials. |
2026-03-21 | |
| CVE-2026-32044 | 6.7 | MEDIUM | CWE-409 | 0.0% p4 | 4.69 | OpenClaw versions prior to 2026.3.2 contain an archive extraction vulnerability ...OpenClaw versions prior to 2026.3.2 contain an archive extraction vulnerability in the tar.bz2 installer path that bypasses safety checks enforced on other archive formats. Attackers can craft malicious tar.bz2 skill archives to bypass special-entry blocking and extracted-size guardrails, causing local denial of service during skill installation. |
2026-03-21 | |
| CVE-2026-32043 | 5.9 | MEDIUM | CWE-367 | 0.0% p0 | 4.13 | OpenClaw versions prior to 2026.2.25 contain a time-of-check-time-of-use vulnera...OpenClaw versions prior to 2026.2.25 contain a time-of-check-time-of-use vulnerability in approval-bound system.run execution where the cwd parameter is validated at approval time but resolved at execution time. Attackers can retarget a symlinked cwd between approval and execution to bypass command execution restrictions and execute arbitrary commands on node hosts. |
2026-03-21 | |
| CVE-2026-32042 | 8.7 | HIGH | CWE-863 | 0.1% p29 | 6.09 | OpenClaw versions 2026.2.22 prior to 2026.2.25 contain a privilege escalation vu...OpenClaw versions 2026.2.22 prior to 2026.2.25 contain a privilege escalation vulnerability allowing unpaired device identities to bypass operator pairing requirements and self-assign elevated operator scopes including operator.admin. Attackers with valid shared gateway authentication can present a self-signed unpaired device identity to request and obtain higher operator scopes before pairing approval is granted. |
2026-03-21 | |
| CVE-2026-4083 | 6.4 | MEDIUM | CWE-79 | 0.0% p14 | 4.48 | The Scoreboard for HTML5 Games Lite plugin for WordPress is vulnerable to Stored...The Scoreboard for HTML5 Games Lite plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'scoreboard' shortcode in all versions up to, and including, 1.2. The shortcode function sfhg_shortcode() allows arbitrary HTML attributes to be added to the rendered <iframe> element, with only a small blacklist of four attribute names (same_height_as, onload, onpageshow, onclick) being blocked. While the attribute names are passed through esc_html() and values through esc_attr(), this does not prevent injection of JavaScript event handler attributes like onfocus, onmouseover, onmouseenter, etc., because these attribute names and simple JavaScript payloads contain no characters that would be modified by these escaping functions. The shortcode text is stored in post_content and is only expanded to HTML at render time, after WordPress's kses filtering has already been applied to the raw post content. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-03-21 | |
| CVE-2026-3577 | 4.4 | MEDIUM | CWE-79 | 0.0% p13 | 3.08 | The Keep Backup Daily plugin for WordPress is vulnerable to Stored Cross-Site Sc...The Keep Backup Daily plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the backup title alias (`val` parameter) in the `update_kbd_bkup_alias` AJAX action in all versions up to, and including, 2.1.2. This is due to insufficient input sanitization and output escaping. While `sanitize_text_field()` strips HTML tags on save, it does not encode double quotes. The backup titles are output in HTML attribute contexts without `esc_attr()`. This makes it possible for authenticated attackers, with Administrator-level access and above, to inject arbitrary web scripts via attribute injection that will execute whenever another administrator views the backup list page. |
2026-03-21 | |
| CVE-2026-3572 | 6.1 | MEDIUM | CWE-79 | 0.1% p24 | 4.27 | The iTracker360 plugin for WordPress is vulnerable to Cross-Site Request Forgery...The iTracker360 plugin for WordPress is vulnerable to Cross-Site Request Forgery leading to Stored Cross-Site Scripting in all versions up to and including 2.2.0. This is due to missing nonce verification on the settings form submission and insufficient input sanitization combined with missing output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts via a forged request granted they can trick an administrator into performing an action such as clicking on a link. |
2026-03-21 | |
| CVE-2026-3567 | 5.3 | MEDIUM | CWE-862 | 0.0% p13 | 3.71 | The RepairBuddy – Repair Shop CRM & Booking Plugin for WordPress is vulnerable t...The RepairBuddy – Repair Shop CRM & Booking Plugin for WordPress is vulnerable to unauthorized access in all versions up to, and including, 4.1132. The plugin exposes two AJAX handlers that, when combined, allow any authenticated user to modify admin-level plugin settings. First, the wc_rb_get_fresh_nonce() function (registered via wp_ajax and wp_ajax_nopriv hooks) allows any user to generate a valid WordPress nonce for any arbitrary action name by simply providing the nonce_name parameter, with no capability checks. Second, the wc_rep_shop_settings_submission() function only verifies the nonce (wcrb_main_setting_nonce) but performs no current_user_can() capability check before updating 15+ plugin options via update_option(). This makes it possible for authenticated attackers, with subscriber-level access and above, to modify all plugin configuration settings including business name, email, logo, menu label, GDPR settings, and more by first minting a valid nonce via the wc_rb_get_fresh_nonce endpoint and then calling the settings submission handler. |
2026-03-21 | |
| CVE-2026-3516 | 6.4 | MEDIUM | CWE-79 | 0.0% p14 | 4.48 | The Contact List plugin for WordPress is vulnerable to Stored Cross-Site Scripti...The Contact List plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the '_cl_map_iframe' parameter in all versions up to, and including, 3.0.18. This is due to insufficient input sanitization and output escaping when handling the Google Maps iframe custom field. The saveCustomFields() function in class-contact-list-custom-fields.php uses a regex to extract <iframe> tags from user input but does not validate or sanitize the iframe's attributes, allowing event handlers like 'onload' to be included. The extracted iframe HTML is stored via update_post_meta() and later rendered on the front-end in class-cl-public-card.php without any escaping or wp_kses filtering. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-03-21 | |
| CVE-2026-3474 | 4.9 | MEDIUM | CWE-22 | 0.1% p20 | 3.43 | The EmailKit – Email Customizer for WooCommerce & WP plugin for WordPress is vul...The EmailKit – Email Customizer for WooCommerce & WP plugin for WordPress is vulnerable to arbitrary file read via path traversal in all versions up to, and including, 1.6.3. This is due to the action() function in the TemplateData class passing user-supplied input from the 'emailkit-editor-template' REST API parameter directly to file_get_contents() without any path validation, sanitization, or restriction to an allowed directory. This makes it possible for authenticated attackers, with Administrator-level access, to read arbitrary files on the server (such as /etc/passwd or wp-config.php) by supplying a traversal path. The file contents are stored as post meta and can subsequently be retrieved via the fetch-data REST API endpoint. Notably, the CheckForm class in the same plugin implements proper path validation using realpath() and directory restriction, demonstrating that the developer was aware of the risk but failed to apply the same protections to the TemplateData endpoint. |
2026-03-21 | |
| CVE-2026-3368 | 7.2 | HIGH | CWE-79 | 0.2% p44 | 5.05 | The Injection Guard plugin for WordPress is vulnerable to Stored Cross-Site Scri...The Injection Guard plugin for WordPress is vulnerable to Stored Cross-Site Scripting via malicious query parameter names in all versions up to and including 1.2.9. This is due to insufficient input sanitization in the sanitize_ig_data() function which only sanitizes array values but not array keys, combined with missing output escaping in the ig_settings.php template where stored parameter keys are echoed directly into HTML. When a request is made to the site, the plugin captures the query string via $_SERVER['QUERY_STRING'], applies esc_url_raw() (which preserves URL-encoded special characters like %22, %3E, %3C), then passes it to parse_str() which URL-decodes the string, resulting in decoded HTML/JavaScript in the array keys. These keys are stored via update_option('ig_requests_log') and later rendered without esc_html() or esc_attr() on the admin log page. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in the admin log page that execute whenever an administrator views the Injection Guard log interface. |
2026-03-21 | |
| CVE-2026-3350 | 6.4 | MEDIUM | CWE-79 | 0.0% p9 | 4.48 | The Image Alt Text Manager plugin for WordPress is vulnerable to Stored Cross-Si...The Image Alt Text Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the post title in all versions up to, and including, 1.8.2. This is due to insufficient input sanitization and output escaping when dynamically generating image alt and title attributes using a DOM parser. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-03-21 | |
| CVE-2026-3339 | 2.7 | LOW | CWE-22 | 0.1% p18 | 1.89 | The Keep Backup Daily plugin for WordPress is vulnerable to Limited Path Travers...The Keep Backup Daily plugin for WordPress is vulnerable to Limited Path Traversal in all versions up to, and including, 2.1.1 via the `kbd_open_upload_dir` AJAX action. This is due to insufficient validation of the `kbd_path` parameter, which is only sanitized with `sanitize_text_field()` - a function that does not strip path traversal sequences. This makes it possible for authenticated attackers, with Administrator-level access and above, to list the contents of arbitrary directories on the server outside of the intended uploads directory. |
2026-03-21 | |
| CVE-2026-33428 | 4.9 | MEDIUM | CWE-863 | 0.0% p9 | 3.43 | Discourse is an open-source discussion platform. Prior to versions 2026.3.0-late...Discourse is an open-source discussion platform. Prior to versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2, a non-staff user with elevated group membership could access deleted posts belonging to any user due to an overly broad authorization check on the deleted posts index endpoint. Versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2 contain a patch. No known workarounds are available. |
2026-03-21 | |
| CVE-2026-33427 | 2.7 | LOW | CWE-862 | 0.1% p19 | 1.89 | Discourse is an open-source discussion platform. Prior to versions 2026.3.0-late...Discourse is an open-source discussion platform. Prior to versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2, an unauthenticated attacker can cause a legitimate Discourse authorization page to display an attacker-controlled domain, facilitating social engineering attacks against users. Versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2 contain a patch. No known workarounds are available. |
2026-03-21 | |
| CVE-2026-33426 | 3.5 | LOW | CWE-862 | 0.0% p5 | 2.45 | Discourse is an open-source discussion platform. Prior to versions 2026.3.0-late...Discourse is an open-source discussion platform. Prior to versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2, users with tag-editing permissions could edit and create synonyms for tags hidden in restricted tag groups, even if they lacked visibility into those tags. Versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2 contain a patch. No known workarounds are available. |
2026-03-21 | |
| CVE-2026-33425 | 6.9 | MEDIUM | CWE-203 | 0.1% p16 | 4.83 | Discourse is an open-source discussion platform. Prior to versions 2026.3.0-late...Discourse is an open-source discussion platform. Prior to versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2, unauthenticated users can determine whether a specific user is a member of a private group by observing changes in directory results when using the `exclude_groups` parameter. Versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2 contain a patch. As a workaround, disable public access to the user directory via Admin → Settings → hide user profiles from public. |
2026-03-21 | |
| CVE-2026-33424 | 5.9 | MEDIUM | CWE-863 | 0.0% p12 | 4.13 | Discourse is an open-source discussion platform. Prior to versions 2026.3.0-late...Discourse is an open-source discussion platform. Prior to versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2, an attacker can grant access to a private message topic through invites even after they lose access to that PM. Versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2 contain a patch. No known workarounds are available. |
2026-03-21 | |
| CVE-2026-33238 | 4.3 | MEDIUM | CWE-22 | 0.0% p14 | 3.01 | WWBN AVideo is an open source video platform. Prior to version 26.0, the `listFi...WWBN AVideo is an open source video platform. Prior to version 26.0, the `listFiles.json.php` endpoint accepts a `path` POST parameter and passes it directly to `glob()` without restricting the path to an allowed base directory. An authenticated uploader can traverse the entire server filesystem by supplying arbitrary absolute paths, enumerating `.mp4` filenames and their full absolute filesystem paths wherever they exist on the server — including locations outside the web root, such as private or premium media directories. Version 26.0 contains a patch for the issue. |
2026-03-21 | |
| CVE-2026-33237 | 5.5 | MEDIUM | CWE-918 | 0.0% p11 | 3.85 | WWBN AVideo is an open source video platform. Prior to version 26.0, the Schedul...WWBN AVideo is an open source video platform. Prior to version 26.0, the Scheduler plugin's `run()` function in `plugin/Scheduler/Scheduler.php` calls `url_get_contents()` with an admin-configurable `callbackURL` that is validated only by `isValidURL()` (URL format check). Unlike other AVideo endpoints that were recently patched for SSRF (GHSA-9x67-f2v7-63rw, GHSA-h39h-7cvg-q7j6), the Scheduler's callback URL is never passed through `isSSRFSafeURL()`, which blocks requests to RFC-1918 private addresses, loopback, and cloud metadata endpoints. An admin can configure a scheduled task with an internal network `callbackURL` to perform SSRF against cloud infrastructure metadata services or internal APIs not otherwise reachable from the internet. Version 26.0 contains a patch for the issue. |
2026-03-21 | |
| CVE-2026-2430 | 6.4 | MEDIUM | CWE-79 | 0.0% p10 | 4.48 | The Autoptimize plugin for WordPress is vulnerable to Stored Cross-Site Scriptin...The Autoptimize plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the lazy-loading image processing in all versions up to, and including, 3.1.14. This is due to the use of an overly permissive regular expression in the `add_lazyload` function that replaces all occurrences of `\ssrc=` in image tags without limiting to the actual attribute. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page by crafting an image tag where the `src` URL contains a space followed by `src=`, causing the regex to break the HTML structure and promote text inside attribute values into executable HTML attributes. |
2026-03-21 | |
| CVE-2026-2352 | 6.4 | MEDIUM | CWE-79 | 0.0% p14 | 4.48 | The Autoptimize plugin for WordPress is vulnerable to Stored Cross-Site Scriptin...The Autoptimize plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'ao_post_preload' meta value in all versions up to, and including, 3.1.14. This is due to insufficient input sanitization in the `ao_metabox_save()` function and missing output escaping when the value is rendered into a `<link>` tag in `autoptimizeImages.php`. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page, granted the "Image optimization" or "Lazy-load images" setting is enabled in the plugin configuration. |
2026-03-21 | |
| CVE-2026-4508 | 6.9 | MEDIUM | CWE-74 | 0.0% p10 | 4.83 | A vulnerability was identified in PbootCMS up to 3.2.12. The impacted element is...A vulnerability was identified in PbootCMS up to 3.2.12. The impacted element is the function checkUsername of the file apps/home/controller/MemberController.php of the component Member Login. The manipulation of the argument Username leads to sql injection. The attack may be initiated remotely. The exploit is publicly available and might be used. |
2026-03-20 | |
| CVE-2026-3864 | 6.5 | MEDIUM | CWE-22 | 0.1% p27 | 4.55 | A vulnerability was discovered in the Kubernetes CSI Driver for NFS where the su...A vulnerability was discovered in the Kubernetes CSI Driver for NFS where the subDir parameter in volume identifiers was insufficiently validated. Attackers with the ability to create PersistentVolumes referencing the NFS CSI driver could craft volume identifiers containing path traversal sequences (../). During volume deletion or cleanup operations, the driver could operate on unintended directories outside the intended managed path within the NFS export. This may lead to deletion or modification of directories on the NFS server. |
2026-03-20 | |
| CVE-2026-33476 | 7.5 | HIGH | CWE-22 | 0.7% p72 | 5.27 | SiYuan is a personal knowledge management system. Prior to version 3.6.2, the Si...SiYuan is a personal knowledge management system. Prior to version 3.6.2, the Siyuan kernel exposes an unauthenticated file-serving endpoint under `/appearance/*filepath.` Due to improper path sanitization, attackers can perform directory traversal and read arbitrary files accessible to the server process. Authentication checks explicitly exclude this endpoint, allowing exploitation without valid credentials. Version 3.6.2 fixes this issue. |
2026-03-20 | |
| CVE-2026-33423 | 1.3 | LOW | CWE-862 | 0.0% p8 | 0.91 | Discourse is an open-source discussion platform. Prior to versions 2026.3.0-late...Discourse is an open-source discussion platform. Prior to versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2, staff can modify any user's group notification level. Versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2 contain a patch. No known workarounds are available. |
2026-03-20 | |
| CVE-2026-33422 | 3.5 | LOW | CWE-200 | 0.0% p8 | 2.45 | Discourse is an open-source discussion platform. Prior to versions 2026.3.0-late...Discourse is an open-source discussion platform. Prior to versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2, the `ip_address` of a flagged user is exposed to any user who can access the review queue, including users who should not be able to see IP addresses. Versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2 contain a patch. No known workarounds are available. |
2026-03-20 | |
| CVE-2026-33411 | 5.4 | MEDIUM | CWE-79 | 0.0% p10 | 3.78 | Discourse is an open-source discussion platform. Versions prior to 2026.3.0-late...Discourse is an open-source discussion platform. Versions prior to 2026.3.0-latest.1, 2026.2.1, and 2026.1.2 have a potential stored XSS in topic titles for the solved posts stream. Versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2 contain a patch. As a workaround, ensure that the Content Security Policy is enabled, and has not been modified in a way which would make it more vulnerable to XSS attacks. |
2026-03-20 | |
| CVE-2026-33291 | 5.1 | MEDIUM | CWE-863 | 0.0% p8 | 3.57 | Discourse is an open-source discussion platform. Prior to versions 2026.3.0-late...Discourse is an open-source discussion platform. Prior to versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2, moderators can create Zendesk tickets for topics they do not have access to view. This affects all forums that use the Zendesk plugin. Versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2 contain a patch. No known workarounds are available. |
2026-03-20 | |
| CVE-2026-33251 | 5.4 | MEDIUM | CWE-863 | 0.0% p10 | 3.78 | Discourse is an open-source discussion platform. Prior to versions 2026.3.0-late...Discourse is an open-source discussion platform. Prior to versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2, an authorization bypass vulnerability in hidden Solved topics may allow unauthorized users to accept or unaccept solutions. Versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2 contain a patch. As a workaround, ensure only trusted users are part of the Site Setting for accept_all_solutions_allowed_groups. |
2026-03-20 | |
| CVE-2026-33243 | 8.2 | HIGH | CWE-345 | 0.0% p0 | 5.74 | barebox is a bootloader. In barebox from version 2016.03.0 to before version 202...barebox is a bootloader. In barebox from version 2016.03.0 to before version 2026.03.1 (and the corresponding backport to 2025.09.3), an attacker could exploit a FIT signature verification vulnerability to trick the bootloader into booting different images than those that were verified as part of a signed configuration. mkimage(1) sets the hashed-nodes property of the FIT signature node to list which nodes of the FIT were hashed as part of the signing process as these will need to be verified later on by the bootloader. However, hashed-nodes itself is not part of the hash and could therefore be modified to allow booting different images than those that have been verified. This issue has been patched in barebox versions 2026.03.1 and backported to 2025.09.3. |
2026-03-20 | |
| CVE-2026-33236 | 8.1 | HIGH | CWE-22 | 0.0% p13 | 5.67 | NLTK (Natural Language Toolkit) is a suite of open source Python modules, data s...NLTK (Natural Language Toolkit) is a suite of open source Python modules, data sets, and tutorials supporting research and development in Natural Language Processing. In versions 3.9.3 and prior, the NLTK downloader does not validate the `subdir` and `id` attributes when processing remote XML index files. Attackers can control a remote XML index server to provide malicious values containing path traversal sequences (such as `../`), which can lead to arbitrary directory creation, arbitrary file creation, and arbitrary file overwrite. Commit 89fe2ec2c6bae6e2e7a46dad65cc34231976ed8a patches the issue. |
2026-03-20 | |
| CVE-2026-33231 | 7.5 | HIGH | CWE-306 | 0.1% p16 | 5.25 | NLTK (Natural Language Toolkit) is a suite of open source Python modules, data s...NLTK (Natural Language Toolkit) is a suite of open source Python modules, data sets, and tutorials supporting research and development in Natural Language Processing. In versions 3.9.3 and prior, `nltk.app.wordnet_app` allows unauthenticated remote shutdown of the local WordNet Browser HTTP server when it is started in its default mode. A simple `GET /SHUTDOWN%20THE%20SERVER` request causes the process to terminate immediately via `os._exit(0)`, resulting in a denial of service. Commit bbaae83db86a0f49e00f5b0db44a7254c268de9b patches the issue. |
2026-03-20 | |
| CVE-2026-33230 | 6.1 | MEDIUM | CWE-79 | 0.0% p10 | 4.27 | NLTK (Natural Language Toolkit) is a suite of open source Python modules, data s...NLTK (Natural Language Toolkit) is a suite of open source Python modules, data sets, and tutorials supporting research and development in Natural Language Processing. In versions 3.9.3 and prior, `nltk.app.wordnet_app` contains a reflected cross-site scripting issue in the `lookup_...` route. A crafted `lookup_<payload>` URL can inject arbitrary HTML/JavaScript into the response page because attacker-controlled `word` data is reflected into HTML without escaping. This impacts users running the local WordNet Browser server and can lead to script execution in the browser origin of that application. Commit 1c3f799607eeb088cab2491dcf806ae83c29ad8f fixes the issue. |
2026-03-20 | |
| CVE-2026-33228 | 8.9 | HIGH | CWE-1321 | 0.0% p13 | 6.23 | flatted is a circular JSON parser. Prior to version 3.4.2, the parse() function ...flatted is a circular JSON parser. Prior to version 3.4.2, the parse() function in flatted can use attacker-controlled string values from the parsed JSON as direct array index keys, without validating that they are numeric. Since the internal input buffer is a JavaScript Array, accessing it with the key "__proto__" returns Array.prototype via the inherited getter. This object is then treated as a legitimate parsed value and assigned as a property of the output object, effectively leaking a live reference to Array.prototype to the consumer. Any code that subsequently writes to that property will pollute the global prototype. This issue has been patched in version 3.4.2. |
2026-03-20 | |
| CVE-2026-33226 | 8.7 | HIGH | CWE-918 | 0.0% p1 | 6.09 | Budibase is a low code platform for creating internal tools, workflows, and admi...Budibase is a low code platform for creating internal tools, workflows, and admin panels. In versions from 3.30.6 and prior, the REST datasource query preview endpoint (POST /api/queries/preview) makes server-side HTTP requests to any URL supplied by the user in fields.path with no validation. An authenticated admin can reach internal services that are not exposed to the internet — including cloud metadata endpoints (AWS/GCP/Azure), internal databases, Kubernetes APIs, and other pods on the internal network. On GCP this leads to OAuth2 token theft with cloud-platform scope (full GCP access). On any deployment it enables full internal network enumeration. At time of publication, there are no publicly available patches. |
2026-03-20 | |
| CVE-2026-33221 | 2.1 | LOW | CWE-343 | 0.0% p0 | 1.47 | Nhost is an open source Firebase alternative with GraphQL. Prior to version 0.12...Nhost is an open source Firebase alternative with GraphQL. Prior to version 0.12.0, the storage service's file upload handler trusts the client-provided Content-Type header without performing server-side MIME type detection. This allows an attacker to upload files with an arbitrary MIME type, bypassing any MIME-type-based restrictions configured on storage buckets. This issue has been patched in version 0.12.0. |
2026-03-20 | |
| CVE-2026-33210 | 8.3 | HIGH | CWE-134 | 0.0% p7 | 5.81 | Ruby JSON is a JSON implementation for Ruby. From version 2.14.0 to before versi...Ruby JSON is a JSON implementation for Ruby. From version 2.14.0 to before versions 2.15.2.1, 2.17.1.2, and 2.19.2, a format string injection vulnerability can lead to denial of service attacks or information disclosure, when the allow_duplicate_key: false parsing option is used to parse user supplied documents. This issue has been patched in versions 2.15.2.1, 2.17.1.2, and 2.19.2. |
2026-03-20 | |
| CVE-2026-33209 | 5.3 | MEDIUM | CWE-79 | 0.0% p9 | 3.71 | Avo is a framework to create admin panels for Ruby on Rails apps. Prior to versi...Avo is a framework to create admin panels for Ruby on Rails apps. Prior to version 3.30.3, a reflected cross-site scripting (XSS) vulnerability exists in the return_to query parameter used in the avo interface. An attacker can craft a malicious URL that injects arbitrary JavaScript, which is executed when he clicks a dynamically generated navigation button. This issue has been patched in version 3.30.3. |
2026-03-20 | |
| CVE-2026-33204 | 7.5 | HIGH | CWE-400 | 0.1% p30 | 5.25 | SimpleJWT is a simple JSON web token library written in PHP. Prior to version 1....SimpleJWT is a simple JSON web token library written in PHP. Prior to version 1.1.1, an unauthenticated attacker can perform a Denial of Service via JWE header tampering when PBES2 algorithms are used. Applications that call JWE::decrypt() on attacker-controlled JWEs using PBES2 algorithms are affected. This issue has been patched in version 1.1.1. |
2026-03-20 | |
| CVE-2026-33203 | 7.5 | HIGH | CWE-248 | 0.1% p34 | 5.25 | SiYuan is a personal knowledge management system. Prior to version 3.6.2, the Si...SiYuan is a personal knowledge management system. Prior to version 3.6.2, the SiYuan kernel WebSocket server accepts unauthenticated connections when a specific "auth keepalive" query parameter is present. After connection, incoming messages are parsed using unchecked type assertions on attacker-controlled JSON. A remote attacker can send malformed messages that trigger a runtime panic, potentially crashing the kernel process and causing denial of service. Version 3.6.2 fixes the issue. |
2026-03-20 | |
| CVE-2026-33194 | 6.8 | MEDIUM | CWE-22 | 0.1% p18 | 4.76 | SiYuan is a personal knowledge management system. Prior to version 3.6.2, the `I...SiYuan is a personal knowledge management system. Prior to version 3.6.2, the `IsSensitivePath()` function in `kernel/util/path.go` uses a denylist approach that was recently expanded (GHSA-h5vh-m7fg-w5h6, commit 9914fd1) but remains incomplete. Multiple security-relevant Linux directories are not blocked, including `/opt` (application data), `/usr` (local configs/binaries), `/home` (other users), `/mnt` and `/media` (mounted volumes). The `globalCopyFiles` and `importStdMd` endpoints rely on `IsSensitivePath` as their primary defense against reading files outside the workspace. Version 3.6.2 contains an updated fix. |
2026-03-20 | |
| CVE-2026-33186 | 9.1 | CRITICAL | CWE-285 | 0.0% p3 | 6.37 | gRPC-Go is the Go language implementation of gRPC. Versions prior to 1.79.3 have...gRPC-Go is the Go language implementation of gRPC. Versions prior to 1.79.3 have an authorization bypass resulting from improper input validation of the HTTP/2 `:path` pseudo-header. The gRPC-Go server was too lenient in its routing logic, accepting requests where the `:path` omitted the mandatory leading slash (e.g., `Service/Method` instead of `/Service/Method`). While the server successfully routed these requests to the correct handler, authorization interceptors (including the official `grpc/authz` package) evaluated the raw, non-canonical path string. Consequently, "deny" rules defined using canonical paths (starting with `/`) failed to match the incoming request, allowing it to bypass the policy if a fallback "allow" rule was present. This affects gRPC-Go servers that use path-based authorization interceptors, such as the official RBAC implementation in `google.golang.org/grpc/authz` or custom interceptors relying on `info.FullMethod` or `grpc.Method(ctx)`; AND that have a security policy contains specific "deny" rules for canonical paths but allows other requests by default (a fallback "allow" rule). The vulnerability is exploitable by an attacker who can send raw HTTP/2 frames with malformed `:path` headers directly to the gRPC server. The fix in version 1.79.3 ensures that any request with a `:path` that does not start with a leading slash is immediately rejected with a `codes.Unimplemented` error, preventing it from reaching authorization interceptors or handlers with a non-canonical path string. While upgrading is the most secure and recommended path, users can mitigate the vulnerability using one of the following methods: Use a validating interceptor (recommended mitigation); infrastructure-level normalization; and/or policy hardening. |
2026-03-20 | |
| CVE-2026-33180 | 7.5 | HIGH | CWE-200 | 0.0% p12 | 5.25 | HAPI FHIR is a complete implementation of the HL7 FHIR standard for healthcare i...HAPI FHIR is a complete implementation of the HL7 FHIR standard for healthcare interoperability in Java. Prior to version 6.9.0, when setting headers in HTTP requests, the internal HTTP client sends headers first to the host in the initial URL but also, if asked to follow redirects and a 30X HTTP response code is returned, to the host mentioned in URL in the Location: response header value. Sending the same set of headers to subsequent hosts is a problem as this header often contains privacy sensitive information or data that could allow others to impersonate the client's request. This issue has been patched in release 6.9.0. No known workarounds are available. |
2026-03-20 | |
| CVE-2026-32810 | 4.8 | MEDIUM | CWE-732 | 0.0% p1 | 3.36 | Halloy is an IRC application written in Rust. In versions on \*nix and macOS pri...Halloy is an IRC application written in Rust. In versions on \*nix and macOS prior to commit f180e41061db393acf65bc99f5c5e7397586d9cb, halloy creates its config directory and files using default umask permissions, which typically results in `0644` on files and `0755` on directories. This allows any local user on the system to read plaintext credentials stored in `config.toml` or referenced `password_file` paths. Commit f180e41061db393acf65bc99f5c5e7397586d9cb patches the issue. |
2026-03-20 | |
| CVE-2026-32733 | 8.7 | HIGH | CWE-22 | 0.0% p13 | 6.09 | Halloy is an IRC application written in Rust. Prior to commit 0f77b2cfc5f822517a...Halloy is an IRC application written in Rust. Prior to commit 0f77b2cfc5f822517a256ea5a4b94bad8bfe38b6, the DCC receive flow did not sanitize filenames from incoming `DCC SEND` requests. A remote IRC user could send a filename with path traversal sequences like `../../.ssh/authorized_keys` and the file would be written outside the user's configured `save_directory`. With auto-accept enabled this required zero interaction from the victim. Starting with commit 0f77b2cfc5f822517a256ea5a4b94bad8bfe38b6, all identified code paths sanitize filenames through a shared `sanitize_filename` function. |
2026-03-20 | |
| CVE-2026-32663 | 6.9 | MEDIUM | CWE-613 | 0.0% p14 | 4.83 | The WebSocket backend uses charging station identifiers to uniquely associate se...The WebSocket backend uses charging station identifiers to uniquely associate sessions but allows multiple endpoints to connect using the same session identifier. This implementation results in predictable session identifiers and enables session hijacking or shadowing, where the most recent connection displaces the legitimate charging station and receives backend commands intended for that station. This vulnerability may allow unauthorized users to authenticate as other users or enable a malicious actor to cause a denial-of-service condition by overwhelming the backend with valid session requests. |
2026-03-20 | |
| CVE-2026-31926 | 6.9 | MEDIUM | CWE-522 | 0.1% p18 | 4.83 | Charging station authentication identifiers are publicly accessible via web-base...Charging station authentication identifiers are publicly accessible via web-based mapping platforms. |
2026-03-20 | |
| CVE-2026-31904 | 8.7 | HIGH | CWE-307 | 0.1% p25 | 6.09 | The WebSocket Application Programming Interface lacks restrictions on the number...The WebSocket Application Programming Interface lacks restrictions on the number of authentication requests. This absence of rate limiting may allow an attacker to conduct denial-of-service attacks by suppressing or mis-routing legitimate charger telemetry, or conduct brute-force attacks to gain unauthorized access. |
2026-03-20 | |
| CVE-2026-31903 | 8.7 | HIGH | CWE-307 | 0.1% p24 | 6.09 | The WebSocket Application Programming Interface lacks restrictions on the number...The WebSocket Application Programming Interface lacks restrictions on the number of authentication requests. This absence of rate limiting may allow an attacker to conduct denial-of-service attacks by suppressing or mis-routing legitimate charger telemetry, or conduct brute-force attacks to gain unauthorized access. |
2026-03-20 | |
| CVE-2026-2598 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering...Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. |
2026-03-20 | |
| CVE-2026-29796 | 9.3 | CRITICAL | CWE-306 | 0.1% p30 | 6.51 | WebSocket endpoints lack proper authentication mechanisms, enabling attackers to...WebSocket endpoints lack proper authentication mechanisms, enabling attackers to perform unauthorized station impersonation and manipulate data sent to the backend. An unauthenticated attacker can connect to the OCPP WebSocket endpoint using a known or discovered charging station identifier, then issue or receive OCPP commands as a legitimate charger. Given that no authentication is required, this can lead to privilege escalation, unauthorized control of charging infrastructure, and corruption of charging network data reported to the backend. |
2026-03-20 | |
| CVE-2026-28204 | 6.9 | MEDIUM | CWE-522 | 0.1% p20 | 4.83 | Charging station authentication identifiers are publicly accessible via web-base...Charging station authentication identifiers are publicly accessible via web-based mapping platforms. |
2026-03-20 | |
| CVE-2026-27649 | 6.9 | MEDIUM | CWE-613 | 0.0% p14 | 4.83 | The WebSocket backend uses charging station identifiers to uniquely associate se...The WebSocket backend uses charging station identifiers to uniquely associate sessions but allows multiple endpoints to connect using the same session identifier. This implementation results in predictable session identifiers and enables session hijacking or shadowing, where the most recent connection displaces the legitimate charging station and receives backend commands intended for that station. This vulnerability may allow unauthorized users to authenticate as other users or enable a malicious actor to cause a denial-of-service condition by overwhelming the backend with valid session requests. |
2026-03-20 | |
| CVE-2026-4507 | 5.3 | MEDIUM | CWE-74 | 0.0% p8 | 3.71 | A vulnerability was determined in Mindinventory MindSQL up to 0.2.1. The affecte...A vulnerability was determined in Mindinventory MindSQL up to 0.2.1. The affected element is the function ask_db of the file mindsql/core/mindsql_core.py. Executing a manipulation can lead to sql injection. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-20 | |
| CVE-2026-4506 | 5.3 | MEDIUM | CWE-74 | 0.0% p13 | 3.71 | A vulnerability was found in Mindinventory MindSQL up to 0.2.1. Impacted is the ...A vulnerability was found in Mindinventory MindSQL up to 0.2.1. Impacted is the function ask_db of the file mindsql/core/mindsql_core.py. Performing a manipulation results in code injection. The attack can be initiated remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-20 | |
| CVE-2026-3584 | 9.8 | CRITICAL | CWE-94 | 17.1% p95 | 7.37 | The Kali Forms plugin for WordPress is vulnerable to Remote Code Execution in al...The Kali Forms plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 2.4.9 via the 'form_process' function. This is due to the 'prepare_post_data' function mapping user-supplied keys directly into internal placeholder storage, combined with the use of 'call_user_func' on these placeholder values. This makes it possible for unauthenticated attackers to execute code on the server. |
2026-03-20 | |
| CVE-2026-33177 | 4.3 | MEDIUM | CWE-862 | 0.0% p1 | 3.01 | Statamic is a Laravel and Git powered content management system (CMS). Prior to ...Statamic is a Laravel and Git powered content management system (CMS). Prior to versions 5.73.14 and 6.7.0, low-privileged Control Panel users could create taxonomy terms by submitting requests to the field action processing endpoint with attacker-controlled field definitions. This bypasses the authorization checks enforced on the standard taxonomy term creation endpoint. This has been fixed in 5.73.14 and 6.7.0. |
2026-03-20 | |
| CVE-2026-33172 | 8.7 | HIGH | CWE-79 | 0.0% p1 | 6.09 | Statamic is a Laravel and Git powered content management system (CMS). Prior to ...Statamic is a Laravel and Git powered content management system (CMS). Prior to versions 5.73.14 and 6.7.0, a stored XSS vulnerability in SVG asset reuploads allows authenticated users with asset upload permissions to bypass SVG sanitization and inject malicious JavaScript that executes when the asset is viewed. This has been fixed in 5.73.14 and 6.7.0. |
2026-03-20 | |
| CVE-2026-33171 | 4.3 | MEDIUM | CWE-22 | 0.0% p1 | 3.01 | Statamic is a Laravel and Git powered content management system (CMS). Prior to ...Statamic is a Laravel and Git powered content management system (CMS). Prior to versions 5.73.14 and 6.7.0, authenticated Control Panel users could read arbitrary `.json`, `.yaml`, and `.csv` files from the server by manipulating the file dictionary's `filename` configuration parameter in the fieldtype's endpoint. This has been fixed in 5.73.14 and 6.7.0. |
2026-03-20 | |
| CVE-2026-33166 | 8.6 | HIGH | CWE-22 | 0.0% p4 | 6.02 | Allure 2 is the version 2.x branch of Allure Report, a multi-language test repor...Allure 2 is the version 2.x branch of Allure Report, a multi-language test reporting tool. The Allure report generator prior to version 2.38.0 is vulnerable to an arbitrary file read via path traversal when processing test results. An attacker can craft a malicious result file (-result.json, -container.json, or .plist) that points an attachment source to a sensitive file on the host system. During report generation, Allure will resolve these paths and include the sensitive files in the final report. Version 2.38.0 fixes the issue. |
2026-03-20 | |
| CVE-2026-32887 | 7.4 | HIGH | CWE-362 | 0.0% p1 | 5.18 | Effect is a TypeScript framework that consists of several packages that work tog...Effect is a TypeScript framework that consists of several packages that work together to help build TypeScript applications. Prior to version 3.20.0, when using `RpcServer.toWebHandler` (or `HttpApp.toWebHandlerRuntime`) inside a Next.js App Router route handler, any Node.js `AsyncLocalStorage`-dependent API called from within an Effect fiber can read another concurrent request's context — or no context at all. Under production traffic, `auth()` from `@clerk/nextjs/server` returns a different user's session. Version 3.20.0 contains a fix for the issue. |
2026-03-20 | |
| CVE-2026-2378 | 7.4 | HIGH | CWE-1021 | 0.0% p8 | 5.18 | ArcSearch for Android versions prior to 1.12.7 could display a different domain ...ArcSearch for Android versions prior to 1.12.7 could display a different domain in the address bar than the content being shown, enabling address bar spoofing after user interaction via crafted web content. |
2026-03-20 | |
| CVE-2026-23536 | 7.5 | HIGH | CWE-22 | 0.1% p25 | 5.25 | A security issue was discovered in the Feast Feature Server's `/read-document` e...A security issue was discovered in the Feast Feature Server's `/read-document` endpoint that allows an unauthenticated remote attacker to read any file accessible to the server process. By sending a specially crafted HTTP POST request, an attacker can bypass intended access restrictions to potentially retrieve sensitive system files, application configurations, and credentials. |
2026-03-20 | |
| CVE-2026-33179 | 5.5 | MEDIUM | CWE-476 | 0.0% p1 | 3.85 | libfuse is the reference implementation of the Linux FUSE. From version 3.18.0 t...libfuse is the reference implementation of the Linux FUSE. From version 3.18.0 to before version 3.18.2, a NULL pointer dereference and memory leak in fuse_uring_init_queue allows a local user to crash the FUSE daemon or cause resource exhaustion. When numa_alloc_local fails during io_uring queue entry setup, the code proceeds with NULL pointers. When fuse_uring_register_queue fails, NUMA allocations are leaked and the function incorrectly returns success. Only the io_uring transport is affected; the traditional /dev/fuse path is not affected. PoC confirmed with AddressSanitizer/LeakSanitizer. This issue has been patched in version 3.18.2. |
2026-03-20 | |
| CVE-2026-33165 | 5.5 | MEDIUM | CWE-787 | 0.0% p1 | 3.85 | libde265 is an open source implementation of the h.265 video codec. Prior to ver...libde265 is an open source implementation of the h.265 video codec. Prior to version 1.0.17, a crafted HEVC bitstream causes an out-of-bounds heap write confirmed by AddressSanitizer. The trigger is a stale ctb_info.log2unitSize after an SPS change where PicWidthInCtbsY and PicHeightInCtbsY stay constant but Log2CtbSizeY changes, causing set_SliceHeaderIndex to index past the allocated image metadata array and write 2 bytes past the end of a heap allocation. This issue has been patched in version 1.0.17. |
2026-03-20 | |
| CVE-2026-33164 | 8.7 | HIGH | CWE-122 | 0.1% p18 | 6.09 | libde265 is an open source implementation of the h.265 video codec. Prior to ver...libde265 is an open source implementation of the h.265 video codec. Prior to version 1.0.17, a malformed H.265 PPS NAL unit causes a segmentation fault in pic_parameter_set::set_derived_values(). This issue has been patched in version 1.0.17. |
2026-03-20 | |
| CVE-2026-33156 | 7.8 | HIGH | CWE-426 | 0.0% p1 | 5.46 | ScreenToGif is a screen recording tool. In versions from 2.42.1 and prior, Scree...ScreenToGif is a screen recording tool. In versions from 2.42.1 and prior, ScreenToGif is vulnerable to DLL sideloading via version.dll . When the portable executable is run from a user-writable directory, it loads version.dll from the application directory instead of the Windows System32 directory, allowing arbitrary code execution in the user's context. This is especially impactful because ScreenToGif is primarily distributed as a portable application intended to be run from user-writable locations. At time of publication, there are no publicly available patches. |
2026-03-20 | |
| CVE-2026-33155 | 8.7 | HIGH | CWE-400 | 0.1% p16 | 6.09 | DeepDiff is a project focused on Deep Difference and search of any Python data. ...DeepDiff is a project focused on Deep Difference and search of any Python data. From version 5.0.0 to before version 8.6.2, the pickle unpickler _RestrictedUnpickler validates which classes can be loaded but does not limit their constructor arguments. A few of the types in SAFE_TO_IMPORT have constructors that allocate memory proportional to their input (builtins.bytes, builtins.list, builtins.range). A 40-byte pickle payload can force 10+ GB of memory, which crashes applications that load delta objects or call pickle_load with untrusted data. This issue has been patched in version 8.6.2. |
2026-03-20 | |
| CVE-2026-33154 | 7.5 | HIGH | CWE-94 | 0.1% p16 | 5.25 | dynaconf is a configuration management tool for Python. Prior to version 3.2.13,...dynaconf is a configuration management tool for Python. Prior to version 3.2.13, Dynaconf is vulnerable to Server-Side Template Injection (SSTI) due to unsafe template evaluation in the @Jinja resolver. When the jinja2 package is installed, Dynaconf evaluates template expressions embedded in configuration values without a sandboxed environment. This issue has been patched in version 3.2.13. |
2026-03-20 | |
| CVE-2026-33151 | 8.7 | HIGH | CWE-20 | 0.2% p38 | 6.10 | Socket.IO is an open source, real-time, bidirectional, event-based, communicatio...Socket.IO is an open source, real-time, bidirectional, event-based, communication framework. Prior to versions 3.3.5, 3.4.4, and 4.2.6, a specially crafted Socket.IO packet can make the server wait for a large number of binary attachments and buffer them, which can be exploited to make the server run out of memory. This issue has been patched in versions 3.3.5, 3.4.4, and 4.2.6. |
2026-03-20 | |
| CVE-2026-33150 | 7.8 | HIGH | CWE-416 | 0.0% p4 | 5.46 | libfuse is the reference implementation of the Linux FUSE. From version 3.18.0 t...libfuse is the reference implementation of the Linux FUSE. From version 3.18.0 to before version 3.18.2, a use-after-free vulnerability in the io_uring subsystem of libfuse allows a local attacker to crash FUSE filesystem processes and potentially execute arbitrary code. When io_uring thread creation fails due to resource exhaustion (e.g., cgroup pids.max), fuse_uring_start() frees the ring pool structure but stores the dangling pointer in the session state, leading to a use-after-free when the session shuts down. The trigger is reliable in containerized environments where cgroup pids.max limits naturally constrain thread creation. This issue has been patched in version 3.18.2. |
2026-03-20 | |
| CVE-2026-33147 | 7.3 | HIGH | CWE-121 | 0.0% p1 | 5.11 | GMT is an open source collection of command-line tools for manipulating geograph...GMT is an open source collection of command-line tools for manipulating geographic and Cartesian data sets. In versions from 6.6.0 and prior, a stack-based buffer overflow vulnerability was identified in the gmt_remote_dataset_id function within src/gmt_remote.c. This issue occurs when a specially crafted long string is passed as a dataset identifier (e.g., via the which module), leading to a crash or potential arbitrary code execution. This issue has been patched via commit 0ad2b49. |
2026-03-20 | |
| CVE-2026-33144 | 5.8 | MEDIUM | CWE-787 | 0.0% p3 | 4.06 | GPAC is an open-source multimedia framework. Prior to commit 86b0e36, a heap-bas...GPAC is an open-source multimedia framework. Prior to commit 86b0e36, a heap-based buffer overflow (write) vulnerability was discovered in GPAC MP4Box. The vulnerability exists in the gf_xml_parse_bit_sequence_bs function in utils/xml_bin_custom.c when processing a crafted NHML file containing malicious <BS> (BitSequence) elements. An attacker can exploit this by providing a specially crafted NHML file, causing an out-of-bounds write on the heap. This issue has been via commit 86b0e36. |
2026-03-20 | |
| CVE-2026-33143 | 8.7 | HIGH | CWE-345 | 0.0% p8 | 6.09 | OneUptime is a solution for monitoring and managing online services. Prior to ve...OneUptime is a solution for monitoring and managing online services. Prior to version 10.0.34, the WhatsApp POST webhook handler (/notification/whatsapp/webhook) processes incoming status update events without verifying the Meta/WhatsApp X-Hub-Signature-256 HMAC signature, allowing any unauthenticated attacker to send forged webhook payloads that manipulate notification delivery status records, suppress alerts, and corrupt audit trails. The codebase already implements proper signature verification for Slack webhooks. This issue has been patched in version 10.0.34. |
2026-03-20 | |
| CVE-2026-33142 | 8.1 | HIGH | CWE-89 | 0.0% p8 | 5.67 | OneUptime is a solution for monitoring and managing online services. Prior to ve...OneUptime is a solution for monitoring and managing online services. Prior to version 10.0.34, the fix for CVE-2026-32306 (ClickHouse SQL injection via aggregate query parameters) added column name validation to the _aggregateBy method but did not apply the same validation to three other query construction paths in StatementGenerator. The toSortStatement, toSelectStatement, and toGroupByStatement methods accept user-controlled object keys from API request bodies and interpolate them as ClickHouse Identifier parameters without verifying they correspond to actual model columns. ClickHouse Identifier parameters are substituted directly into queries without escaping, so an attacker who can reach any analytics list or aggregate endpoint can inject arbitrary SQL through crafted sort, select, or groupBy keys. This issue has been patched in version 10.0.34. |
2026-03-20 | |
| CVE-2025-63261 | 7.8 | HIGH | CWE-78 | 0.1% p20 | 5.46 | AWStats 8.0 is vulnerable to Command Injection via the open functionAWStats 8.0 is vulnerable to Command Injection via the open function |
2026-03-20 | |
| CVE-2025-55988 | 7.2 | HIGH | CWE-22 | 0.1% p30 | 5.04 | An issue in the component /Controllers/RestController.php of DreamFactory Core v...An issue in the component /Controllers/RestController.php of DreamFactory Core v1.0.3 allows attackers to execute a directory traversal via an unsanitized URI path. |
2026-03-20 | |
| CVE-2026-4505 | 5.3 | MEDIUM | CWE-284 | 0.0% p11 | 3.71 | A vulnerability has been found in eosphoros-ai DB-GPT up to 0.7.5. This issue af...A vulnerability has been found in eosphoros-ai DB-GPT up to 0.7.5. This issue affects the function module_plugin.refresh_plugins of the file packages/dbgpt-serve/src/dbgpt_serve/agent/hub/controller.py of the component FastAPI Endpoint. Such manipulation leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-20 | |
| CVE-2026-4504 | 6.9 | MEDIUM | CWE-74 | 0.0% p10 | 4.83 | A flaw has been found in eosphoros-ai db-gpt up to 0.7.5. This vulnerability aff...A flaw has been found in eosphoros-ai db-gpt up to 0.7.5. This vulnerability affects unknown code of the file /api/v1/editor/ of the component Incomplete Fix. This manipulation causes sql injection. It is possible to initiate the attack remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-20 | |
| CVE-2026-4500 | 5.3 | MEDIUM | CWE-74 | 0.1% p19 | 3.71 | A vulnerability was identified in bagofwords1 bagofwords up to 0.0.297. This imp...A vulnerability was identified in bagofwords1 bagofwords up to 0.0.297. This impacts the function generate_df of the file backend/app/ai/code_execution/code_execution.py. Such manipulation leads to injection. The attack may be launched remotely. The exploit is publicly available and might be used. Upgrading to version 0.0.298 will fix this issue. The name of the patch is 47b20bcda31264635faff7f6b1c8095abe1861c6. It is recommended to upgrade the affected component. |
2026-03-20 | |
| CVE-2026-4499 | 6.9 | MEDIUM | CWE-77 | 0.3% p49 | 4.84 | A vulnerability was determined in D-Link DIR-820LW 2.03. Affected is the functio...A vulnerability was determined in D-Link DIR-820LW 2.03. Affected is the function ssdpcgi_main of the component SSDP. Executing a manipulation can lead to os command injection. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized. |
2026-03-20 | |
| CVE-2026-4438 | 5.4 | MEDIUM | CWE-20 | 0.0% p8 | 3.78 | Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that sp...Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend in the GNU C library version 2.34 to version 2.43 could result in an invalid DNS hostname being returned to the caller in violation of the DNS specification. |
2026-03-20 | |
| CVE-2026-4437 | 7.5 | HIGH | CWE-125 | 0.0% p14 | 5.25 | Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that sp...Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend in the GNU C Library version 2.34 to version 2.43 could, with a crafted response from the configured DNS server, result in a violation of the DNS specification that causes the application to treat a non-answer section of the DNS response as a valid answer. |
2026-03-20 | |
| CVE-2026-33140 | 5.3 | MEDIUM | CWE-79 | 0.0% p1 | 3.71 | PySpector is a static analysis security testing (SAST) Framework engineered for ...PySpector is a static analysis security testing (SAST) Framework engineered for modern Python development workflows. PySpector versions 0.1.6 and prior are affected by a stored Cross-Site Scripting (XSS) vulnerability in the HTML report generator. When PySpector scans a Python file containing JavaScript payloads (i.e. inside a string passed to eval() ), the flagged code snippet is interpolated into the HTML report without sanitization. Opening the generated report in a browser causes the embedded JavaScript to execute in the browser's local file context. This issue has been patched in version 0.1.7. |
2026-03-20 | |
| CVE-2026-33139 | 8.3 | HIGH | CWE-184 | 0.0% p6 | 5.81 | PySpector is a static analysis security testing (SAST) Framework engineered for ...PySpector is a static analysis security testing (SAST) Framework engineered for modern Python development workflows. PySpector versions 0.1.6 and prior are affected by a security validation bypass in the plugin system. The validate_plugin_code() function in plugin_system.py, performs static AST analysis to block dangerous API calls before a plugin is trusted and executed. However, the internal resolve_name() helper only handles ast.Name and ast.Attribute node types, returning None for all others. When a plugin uses indirect function calls via getattr() (such as getattr(os, 'system')) the outer call's func node is of type ast.Call, causing resolve_name() to return None, and the security check to be silently skipped. The plugin incorrectly passes the trust workflow, and executes arbitrary system commands on the user's machine when loaded. This issue has been patched in version 0.1.7. |
2026-03-20 | |
| CVE-2026-33126 | 5.0 | MEDIUM | CWE-918 | 0.0% p10 | 3.50 | Frigate is a network video recorder (NVR) with realtime local object detection f...Frigate is a network video recorder (NVR) with realtime local object detection for IP cameras. Prior to version 0.16.3, the /ffprobe endpoint accepts arbitrary user-controlled URLs without proper validation, allowing Server-Side Request Forgery (SSRF) attacks. An attacker can use the Frigate server to make HTTP requests to internal network resources, cloud metadata services, or perform port scanning. This issue has been patched in version 0.16.3. |
2026-03-20 | |
| CVE-2025-63260 | 5.4 | MEDIUM | CWE-79 | 0.0% p8 | 3.78 | SyncFusion 30.1.37 is vulnerable to Cross Site Scripting (XSS) via the Document-...SyncFusion 30.1.37 is vulnerable to Cross Site Scripting (XSS) via the Document-Editor reply to comment field and Chat-UI Chat message. |
2026-03-20 | |
| CVE-2026-4497 | 6.9 | MEDIUM | CWE-77 | 2.6% p85 | 4.91 | A vulnerability was determined in Totolink WA300 5.2cu.7112_B20190227. Affected ...A vulnerability was determined in Totolink WA300 5.2cu.7112_B20190227. Affected by this issue is the function recvUpgradeNewFw of the file /cgi-bin/cstecgi.cgi. This manipulation causes os command injection. Remote exploitation of the attack is possible. The exploit has been publicly disclosed and may be utilized. |
2026-03-20 | |
| CVE-2026-4496 | 4.8 | MEDIUM | CWE-77 | 0.3% p53 | 3.37 | A vulnerability was found in sigmade Git-MCP-Server up to 785aa159f262a02d5791a5...A vulnerability was found in sigmade Git-MCP-Server up to 785aa159f262a02d5791a5d8a8e13c507ac42880. Affected by this vulnerability is the function child_process.exec of the file src/gitUtils.ts of the component show_merge_diff/quick_merge_summary/show_file_diff. The manipulation results in os command injection. The attack must be initiated from a local position. The exploit has been made public and could be used. This product operates on a rolling release basis, ensuring continuous delivery. Consequently, there are no version details for either affected or updated releases. It is advisable to implement a patch to correct this issue. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-20 | |
| CVE-2026-33010 | 8.1 | HIGH | CWE-942 | 0.0% p9 | 5.67 | mcp-memory-service is an open-source memory backend for multi-agent systems. Pri...mcp-memory-service is an open-source memory backend for multi-agent systems. Prior to version 10.25.1, when the HTTP server is enabled (MCP_HTTP_ENABLED=true), the application configures FastAPI's CORSMiddleware with allow_origins=['*'], allow_credentials=True, allow_methods=["*"], and allow_headers=["*"]. The wildcard Access-Control-Allow-Origin: * header permits any website to read API responses cross-origin. When combined with anonymous access (MCP_ALLOW_ANONYMOUS_ACCESS=true) - the simplest way to get the HTTP dashboard working without OAuth - no credentials are needed, so any malicious website can silently read, modify, and delete all stored memories. This issue has been patched in version 10.25.1. |
2026-03-20 | |
| CVE-2026-32710 | 8.5 | HIGH | CWE-122 | 0.2% p43 | 5.96 | MariaDB server is a community developed fork of MySQL server. An authenticated u...MariaDB server is a community developed fork of MySQL server. An authenticated user can crash MariaDB versions 11.4 before 11.4.10 and 11.8 before 11.8.6 via a bug in JSON_SCHEMA_VALID() function. Under certain conditions it might be possible to turn the crash into a remote code execution. These conditions require tight control over memory layout which is generally only attainable in a lab environment. This issue is fixed in MariaDB 11.4.10, MariaDB 11.8.6, and MariaDB 12.2.2. |
2026-03-20 | |
| CVE-2026-32318 | 7.6 | HIGH | CWE-346 | 0.0% p1 | 5.32 | Cryptomator for IOS offers multi-platform transparent client-side encryption for...Cryptomator for IOS offers multi-platform transparent client-side encryption for files in the cloud. Prior to version 2.8.3, an integrity check vulnerability allows an attacker tamper with the vault configuration file leading to a man-in-the-middle vulnerability in Hub key loading mechanism. Before this fix, the client trusted endpoints from the vault config without host authenticity checks, which could allow token exfiltration by mixing a legitimate auth endpoint with a malicious API endpoint. Impacted are users unlocking Hub-backed vaults with affected client versions in environments where an attacker can alter the vault.cryptomator file. This issue has been patched in version 2.8.3. |
2026-03-20 | |
| CVE-2026-32317 | 7.6 | HIGH | CWE-346 | 0.0% p1 | 5.32 | Cryptomator for Android offers multi-platform transparent client-side encryption...Cryptomator for Android offers multi-platform transparent client-side encryption for files in the cloud. Prior to version 1.12.3, an integrity check vulnerability allows an attacker tamper with the vault configuration file leading to a man-in-the-middle vulnerability in Hub key loading mechanism. Before this fix, the client trusted endpoints from the vault config without host authenticity checks, which could allow token exfiltration by mixing a legitimate auth endpoint with a malicious API endpoint. Impacted are users unlocking Hub-backed vaults with affected client versions in environments where an attacker can alter the vault.cryptomator file. This issue has been patched in version 1.12.3. |
2026-03-20 | |
| CVE-2026-32310 | 4.1 | MEDIUM | CWE-22 | 0.0% p7 | 2.87 | Cryptomator encrypts data being stored on cloud infrastructure. From version 1.6...Cryptomator encrypts data being stored on cloud infrastructure. From version 1.6.0 to before version 1.19.1, vault configuration is parsed before its integrity is verified, and the masterkeyfile loader uses the unverified keyId as a filesystem path. The loader resolves keyId.getSchemeSpecificPart() directly against the vault path and immediately calls Files.exists(...). This allows a malicious vault config to supply parent-directory escapes, absolute local paths, or UNC paths (e.g., masterkeyfile://attacker/share/masterkey.cryptomator). On Windows, the UNC variant is especially dangerous because Path.resolve("//attacker/share/...") becomes \\attacker\share\..., so the existence check can trigger outbound SMB access before the user even enters a passphrase. This issue has been patched in version 1.19.1. |
2026-03-20 | |
| CVE-2026-32309 | 8.7 | HIGH | CWE-319 | 0.0% p4 | 6.09 | Cryptomator encrypts data being stored on cloud infrastructure. Prior to version...Cryptomator encrypts data being stored on cloud infrastructure. Prior to version 1.19.1, the Hub-based unlock flow explicitly supports hub+http and consumes Hub endpoints from vault metadata without enforcing HTTPS. As a result, a vault configuration can drive OAuth and key-loading traffic over plaintext HTTP or other insecure endpoint combinations. An active network attacker can tamper with or observe this traffic. Even when the vault key is encrypted for the device, bearer tokens and endpoint-level trust decisions are still exposed to downgrade and interception. This issue has been patched in version 1.19.1. |
2026-03-20 | |
| CVE-2026-4495 | 5.1 | MEDIUM | CWE-79 | 0.0% p8 | 3.57 | A security flaw has been discovered in atjiu pybbs 6.0.0. This impacts the funct...A security flaw has been discovered in atjiu pybbs 6.0.0. This impacts the function create of the file src/main/java/co/yiiu/pybbs/controller/api/CommentApiController.java. The manipulation results in cross site scripting. It is possible to launch the attack remotely. The exploit has been released to the public and may be used for attacks. |
2026-03-20 | |
| CVE-2026-4494 | 5.1 | MEDIUM | CWE-79 | 0.0% p8 | 3.57 | A vulnerability was identified in atjiu pybbs 6.0.0. This affects the function c...A vulnerability was identified in atjiu pybbs 6.0.0. This affects the function create of the file src/main/java/co/yiiu/pybbs/controller/api/TopicApiController.java. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit is publicly available and might be used. |
2026-03-20 | |
| CVE-2026-4493 | 7.4 | HIGH | CWE-119 | 0.0% p14 | 5.18 | A vulnerability was determined in Tenda A18 Pro 02.03.02.28. The impacted elemen...A vulnerability was determined in Tenda A18 Pro 02.03.02.28. The impacted element is the function sub_423B50 of the file /goform/setMacFilterCfg of the component MAC Filtering Configuration Endpoint. Executing a manipulation of the argument deviceList can lead to stack-based buffer overflow. The attack may be performed from remote. The exploit has been publicly disclosed and may be utilized. |
2026-03-20 | |
| CVE-2026-4492 | 7.4 | HIGH | CWE-119 | 0.0% p14 | 5.18 | A vulnerability was found in Tenda A18 Pro 02.03.02.28. The affected element is ...A vulnerability was found in Tenda A18 Pro 02.03.02.28. The affected element is the function set_qosMib_list of the file /goform/formSetQosBand. Performing a manipulation of the argument list results in stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been made public and could be used. |
2026-03-20 | |
| CVE-2026-32844 | 5.1 | MEDIUM | CWE-79 | 0.0% p10 | 3.57 | XinLiangCoder php_api_doc through commit 1ce5bbf contains a reflected cross-site...XinLiangCoder php_api_doc through commit 1ce5bbf contains a reflected cross-site scripting vulnerability in list_method.php that allows remote attackers to execute arbitrary JavaScript in a victim's browser by injecting malicious code through the f parameter. Attackers can craft a malicious URL with unsanitized input in the GET request parameter that is output directly to the page without proper neutralization, enabling session hijacking, credential theft, or malware distribution within the application context. |
2026-03-20 | |
| CVE-2026-32303 | 7.6 | HIGH | CWE-346 | 0.0% p3 | 5.32 | Cryptomator encrypts data being stored on cloud infrastructure. Prior to version...Cryptomator encrypts data being stored on cloud infrastructure. Prior to version 1.19.1, an integrity check vulnerability allows an attacker to tamper with the vault configuration file leading to a man-in-the-middle vulnerability in Hub key loading mechanism. Before this fix, the client trusted endpoints from the vault config without host authenticity checks, which could allow token exfiltration by mixing a legitimate auth endpoint with a malicious API endpoint. Impacted are users unlocking Hub-backed vaults with affected client versions in environments where an attacker can alter the vault.cryptomator file. This issue has been patched in version 1.19.1. |
2026-03-20 | |
| CVE-2026-31836 | 8.1 | HIGH | CWE-269 | 0.0% p9 | 5.67 | Checkmate is an open-source, self-hosted tool designed to track and monitor serv...Checkmate is an open-source, self-hosted tool designed to track and monitor server hardware, uptime, response times, and incidents in real-time with beautiful visualizations. In versions from 3.5.1 and prior, a mass assignment vulnerability in Checkmate's user profile update endpoint allows any authenticated user to escalate their privileges to superadmin, bypassing all role-based access controls. An attacker can modify their user role to gain complete administrative access to the application, including the ability to view all users, modify critical configurations, and access sensitive system data. At time of publication, there are no publicly available patches. |
2026-03-20 | |
| CVE-2026-30580 | 4.3 | MEDIUM | CWE-22 | 0.1% p20 | 3.01 | File Thingie 2.5.7 is vulnerable to Directory Traversal. A malicious user can le...File Thingie 2.5.7 is vulnerable to Directory Traversal. A malicious user can leverage the "create folder from url" functionality of the application to read arbitrary files on the target system. |
2026-03-20 | |
| CVE-2026-30579 | 6.5 | MEDIUM | CWE-79 | 0.0% p9 | 4.55 | File Thingie 2.5.7 is vulnerable to Cross Site Scripting (XSS). A malicious user...File Thingie 2.5.7 is vulnerable to Cross Site Scripting (XSS). A malicious user can leverage the "upload file" functionality to upload a file with a crafted file name used to trigger a Javascript payload. |
2026-03-20 | |
| CVE-2026-30578 | 6.5 | MEDIUM | CWE-79 | 0.0% p9 | 4.55 | File Thinghie 2.5.7 is vulnerable to Cross Site Scripting (XSS). A malicious use...File Thinghie 2.5.7 is vulnerable to Cross Site Scripting (XSS). A malicious user can leverage the "dir" parameter of the GET request to invoke arbitrary javascript code. |
2026-03-20 | |
| CVE-2026-4491 | 7.4 | HIGH | CWE-119 | 0.0% p14 | 5.18 | A vulnerability has been found in Tenda A18 Pro 02.03.02.28. Impacted is the fun...A vulnerability has been found in Tenda A18 Pro 02.03.02.28. Impacted is the function fromSetIpMacBind of the file /goform/SetIpMacBind. Such manipulation of the argument list leads to stack-based buffer overflow. The attack can be executed remotely. The exploit has been disclosed to the public and may be used. |
2026-03-20 | |
| CVE-2026-4490 | 7.4 | HIGH | CWE-119 | 0.0% p14 | 5.18 | A flaw has been found in Tenda A18 Pro 02.03.02.28. This issue affects the funct...A flaw has been found in Tenda A18 Pro 02.03.02.28. This issue affects the function setSchedWifi of the file /goform/openSchedWifi. This manipulation causes stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been published and may be used. |
2026-03-20 | |
| CVE-2026-29828 | 6.1 | MEDIUM | CWE-79 | 0.0% p8 | 4.27 | DooTask v1.6.27 has a Cross-Site Scripting (XSS) vulnerability in the /manage/pr...DooTask v1.6.27 has a Cross-Site Scripting (XSS) vulnerability in the /manage/project/<id> page via the input field projectDesc. |
2026-03-20 | |
| CVE-2025-15607 | 7.3 | HIGH | CWE-77 | 0.5% p67 | 5.13 | A command injection vulnerability on AX53 v1 occurs in mscd debug functionality ...A command injection vulnerability on AX53 v1 occurs in mscd debug functionality due to insufficient input handling, allowing log redirection to arbitrary files and concatenation of unvalidated file content into shell commands, enabling authenticated attackers to inject and execute arbitrary commands. Successful exploitation may allow execution of malicious commands and ultimately full control of the device. |
2026-03-20 | |
| CVE-2026-4489 | 7.4 | HIGH | CWE-119 | 0.0% p14 | 5.18 | A vulnerability was detected in Tenda A18 Pro 02.03.02.28. This vulnerability af...A vulnerability was detected in Tenda A18 Pro 02.03.02.28. This vulnerability affects the function form_fast_setting_wifi_set of the file /goform/fast_setting_wifi_set. The manipulation results in stack-based buffer overflow. The attack may be launched remotely. The exploit is now public and may be used. |
2026-03-20 | |
| CVE-2026-4488 | 7.4 | HIGH | CWE-119 | 0.0% p14 | 5.18 | A vulnerability was identified in UTT HiPER 1250GW up to 3.2.7-210907-180535. Af...A vulnerability was identified in UTT HiPER 1250GW up to 3.2.7-210907-180535. Affected is the function strcpy of the file /goform/setSysAdm. Such manipulation of the argument GroupName leads to buffer overflow. It is possible to launch the attack remotely. The exploit is publicly available and might be used. |
2026-03-20 | |
| CVE-2026-32989 | 8.6 | HIGH | CWE-352 | 0.0% p11 | 6.02 | Precurio Intranet Portal 4.4 contains a cross-site request forgery vulnerability...Precurio Intranet Portal 4.4 contains a cross-site request forgery vulnerability that allows attackers to induce authenticated users to submit crafted requests to a profile update endpoint handling file uploads. Attackers can exploit this to upload executable files to web-accessible locations, leading to arbitrary code execution in the context of the web server. |
2026-03-20 | |
| CVE-2026-32986 | 5.1 | MEDIUM | CWE-79 | 0.0% p8 | 3.57 | Textpattern CMS version 4.9.0 contains a second-order cross-site scripting vulne...Textpattern CMS version 4.9.0 contains a second-order cross-site scripting vulnerability that allows attackers to inject malicious scripts by exploiting improper sanitization of user-supplied input in Atom feed XML elements. Attackers can embed unescaped payloads in parameters such as category that are reflected into Atom fields like and , which execute as JavaScript when feed readers or CMS aggregators consume the feed and insert content into the DOM using unsafe methods. |
2026-03-20 | |
| CVE-2025-67260 | 8.8 | HIGH | CWE-434 | 0.1% p20 | 6.16 | The Terrapack software, from ASTER TEC / ASTER S.p.A., with the indicated compon...The Terrapack software, from ASTER TEC / ASTER S.p.A., with the indicated components and versions has a file upload vulnerability that may allow attackers to execute arbitrary code. Vulnerable components include Terrapack TkWebCoreNG:: 1.0.20200914, Terrapack TKServerCGI 2.5.4.150, and Terrapack TpkWebGIS Client 1.0.0. |
2026-03-20 | |
| CVE-2025-46597 | 7.5 | HIGH | CWE-190 | 0.0% p12 | 5.25 | Bitcoin Core 0.13.0 through 29.x has an integer overflow.Bitcoin Core 0.13.0 through 29.x has an integer overflow. |
2026-03-20 | |
| CVE-2026-4487 | 7.4 | HIGH | CWE-119 | 0.0% p14 | 5.18 | A vulnerability was determined in UTT HiPER 1200GW up to 2.5.3-170306. This impa...A vulnerability was determined in UTT HiPER 1200GW up to 2.5.3-170306. This impacts the function strcpy of the file /goform/websHostFilter. This manipulation causes buffer overflow. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized. |
2026-03-20 | |
| CVE-2026-33312 | 5.3 | MEDIUM | CWE-863 | 0.0% p12 | 3.71 | Vikunja is an open-source self-hosted task management platform. Starting in vers...Vikunja is an open-source self-hosted task management platform. Starting in version 0.20.2 and prior to version 2.2.0, the `DELETE /api/v1/projects/:project/background` endpoint checks `CanRead` permission instead of `CanUpdate`, allowing any user with read-only access to a project to permanently delete its background image. Version 2.2.0 fixes the issue. |
2026-03-20 | |
| CVE-2026-29794 | 5.3 | MEDIUM | CWE-807 | 0.1% p23 | 3.71 | Vikunja is an open-source self-hosted task management platform. Starting in vers...Vikunja is an open-source self-hosted task management platform. Starting in version 0.8 and prior to version 2.2.0, unauthenticated users are able to bypass the application's built-in rate-limits by spoofing the `X-Forwarded-For` or `X-Real-IP` headers due to the rate-limit relying on the value of `(echo.Context).RealIP`. Unauthenticated users can abuse endpoints available to them for different potential impacts. The immediate concern would be brute-forcing usernames or specific accounts' passwords. This bypass allows unlimited requests against unauthenticated endpoints. Version 2.2.0 patches the issue. |
2026-03-20 | |
| CVE-2026-22172 | 9.4 | CRITICAL | CWE-862 | 0.0% p3 | 6.58 | OpenClaw versions prior to 2026.3.12 contain an authorization bypass vulnerabili...OpenClaw versions prior to 2026.3.12 contain an authorization bypass vulnerability in the WebSocket connect path that allows shared-token or password-authenticated connections to self-declare elevated scopes without server-side binding. Attackers can exploit this logic flaw to present unauthorized scopes such as operator.admin and perform admin-only gateway operations. |
2026-03-20 | |
| CVE-2025-46598 | 5.3 | MEDIUM | CWE-405 | 0.0% p1 | 3.71 | Bitcoin Core through 29.0 allows a denial of service via a crafted transaction.Bitcoin Core through 29.0 allows a denial of service via a crafted transaction. |
2026-03-20 | |
| CVE-2026-4486 | 7.4 | HIGH | CWE-119 | 0.1% p20 | 5.18 | A vulnerability was found in D-Link DIR-513 1.10. This affects the function form...A vulnerability was found in D-Link DIR-513 1.10. This affects the function formEasySetPassword of the file /goform/formEasySetPassword of the component Web Service. The manipulation of the argument curTime results in stack-based buffer overflow. The attack may be performed from remote. The exploit has been made public and could be used. This vulnerability only affects products that are no longer supported by the maintainer. |
2026-03-20 | |
| CVE-2026-4485 | 5.3 | MEDIUM | CWE-74 | 0.0% p8 | 3.71 | A vulnerability has been found in itsourcecode College Management System 1.0. Th...A vulnerability has been found in itsourcecode College Management System 1.0. The impacted element is an unknown function of the file /admin/search_student.php. The manipulation of the argument Search leads to sql injection. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used. |
2026-03-20 | |
| CVE-2026-33372 | 5.4 | MEDIUM | CWE-352 | 0.0% p7 | 3.78 | An issue was discovered in Zimbra Collaboration (ZCS) 10.0 and 10.1. A cross-sit...An issue was discovered in Zimbra Collaboration (ZCS) 10.0 and 10.1. A cross-site request forgery (CSRF) vulnerability exists in Zimbra Webmail due to improper validation of CSRF tokens. The application accepts CSRF tokens supplied within the request body instead of requiring them through the expected request header. An attacker can exploit this issue by tricking an authenticated user into submitting a crafted request. This may allow unauthorized actions to be performed on behalf of the victim. |
2026-03-20 | |
| CVE-2026-33371 | 4.3 | MEDIUM | CWE-611 | 0.0% p14 | 3.01 | An issue was discovered in Zimbra Collaboration (ZCS) 10.0 and 10.1. An XML Exte...An issue was discovered in Zimbra Collaboration (ZCS) 10.0 and 10.1. An XML External Entity (XXE) vulnerability exists in the Zimbra Exchange Web Services (EWS) SOAP interface due to improper handling of XML input. An authenticated attacker can submit crafted XML data that is processed by an XML parser with external entity resolution enabled. Successful exploitation may allow disclosure of sensitive local files from the server. |
2026-03-20 | |
| CVE-2026-33370 | 6.1 | MEDIUM | CWE-79 | 0.0% p10 | 4.27 | An issue was discovered in Zimbra Collaboration (ZCS) 10.0 and 10.1. A stored cr...An issue was discovered in Zimbra Collaboration (ZCS) 10.0 and 10.1. A stored cross-site scripting (XSS) vulnerability exists in the Zimbra Briefcase feature due to insufficient sanitization of specific uploaded file types. When a user opens a publicly shared Briefcase file containing malicious scripts, the embedded JavaScript executes in the context of the user's session. This allows an attacker to run arbitrary scripts, potentially leading to data exfiltration or other unauthorized actions on behalf of the victim user. |
2026-03-20 | |
| CVE-2026-33369 | 4.3 | MEDIUM | CWE-20 | 0.1% p15 | 3.01 | Zimbra Collaboration (ZCS) 10.0 and 10.1 contains an LDAP injection vulnerabilit...Zimbra Collaboration (ZCS) 10.0 and 10.1 contains an LDAP injection vulnerability in the Mailbox SOAP service within a FolderAction operation. The application fails to properly sanitize user-supplied input before incorporating it into an LDAP search filter. An authenticated attacker can exploit this issue by sending a crafted SOAP request that manipulates the LDAP query, allowing retrieval of sensitive directory attributes. |
2026-03-20 | |
| CVE-2026-33368 | 6.1 | MEDIUM | CWE-79 | 0.1% p22 | 4.27 | Zimbra Collaboration Suite (ZCS) 10.0 and 10.1 contains a reflected cross-site s...Zimbra Collaboration Suite (ZCS) 10.0 and 10.1 contains a reflected cross-site scripting (XSS) vulnerability in the Classic Webmail REST interface (/h/rest). The application fails to properly sanitize user-supplied input, allowing an unauthenticated attacker to inject malicious JavaScript into a crafted URL. When a victim user accesses the link, the injected script executes in the context of the Zimbra webmail application, which could allow the attacker to perform actions on behalf of the victim. |
2026-03-20 | |
| CVE-2026-31382 | 6.1 | MEDIUM | CWE-79 | 0.0% p1 | 4.27 | The error_description parameter is vulnerable to Reflected XSS. An attacker can ...The error_description parameter is vulnerable to Reflected XSS. An attacker can bypass the domain's WAF using a Safari-specific onpagereveal payload. |
2026-03-20 | |
| CVE-2026-31381 | 5.3 | MEDIUM | CWE-598 | 0.0% p1 | 3.71 | An attacker can extract user email addresses (PII) exposed in base64 encoding vi...An attacker can extract user email addresses (PII) exposed in base64 encoding via the state parameter in the OAuth callback URL. |
2026-03-20 | |
| CVE-2024-44722 | 9.8 | CRITICAL | CWE-94 | 0.1% p24 | 6.86 | SysAK v2.0 and before is vulnerable to command execution via aaa;cat /etc/passwd...SysAK v2.0 and before is vulnerable to command execution via aaa;cat /etc/passwd. |
2026-03-20 | |
| CVE-2026-33136 | 9.3 | CRITICAL | CWE-79 | 0.0% p9 | 6.51 | WeGIA is a web manager for charitable institutions. Versions 3.6.6 and below hav...WeGIA is a web manager for charitable institutions. Versions 3.6.6 and below have a Reflected Cross-Site Scripting (XSS) vulnerability in the listar_memorandos_ativos.php endpoint. An attacker can inject arbitrary JavaScript or HTML tags into the sccd GET parameter, which is then directly echoed into the HTML response without any sanitization or encoding. The script /html/memorando/listar_memorandos_ativos.php handles dynamic success messages to users using query string parameters. Similar to other endpoints in the Memorando module, it checks if $_GET['msg'] equals 'success'. If this condition is met, it directly concatenates and reflects $_GET['sccd'] into an HTML alert <div>. This issue is resolved in version 3.6.7. |
2026-03-20 | |
| CVE-2026-33135 | 9.3 | CRITICAL | CWE-79 | 0.0% p8 | 6.51 | WeGIA is a web manager for charitable institutions. Versions 3.6.6 and below hav...WeGIA is a web manager for charitable institutions. Versions 3.6.6 and below have a Reflected Cross-Site Scripting (XSS) vulnerability in the novo_memorandoo.php endpoint. An attacker can inject arbitrary JavaScript into the sccs GET parameter, which is directly echoed into the HTML response without any sanitization or encoding. The script /html/memorando/novo_memorandoo.php reads HTTP GET parameters to display dynamic success messages to the user. At approximately line 273, the code checks if $_GET['msg'] equals 'success'. If true, it directly concatenates $_GET['sccs'] into an HTML alert <div> and outputs it to the browser. This issue has been fixed in version 3.6.7. |
2026-03-20 | |
| CVE-2026-33134 | 9.3 | CRITICAL | CWE-89 | 0.0% p9 | 6.51 | WeGIA is a web manager for charitable institutions. Versions 3.6.5 and below con...WeGIA is a web manager for charitable institutions. Versions 3.6.5 and below contain an authenticated SQL Injection vulnerability in the html/matPat/restaurar_produto.php endpoint. The vulnerability allows an authenticated attacker to inject arbitrary SQL commands via the id_produto GET parameter, leading to full database compromise. In the script /html/matPat/restaurar_produto.php, the application retrieves the id_produto parameter directly from the $_GET global array and interpolates it directly into two SQL query strings without any sanitization, type-casting (e.g., (int)), or using parameterized (prepare/execute) statements. This issue has been fixed in version 3.6.6. |
2026-03-20 | |
| CVE-2026-33133 | 8.6 | HIGH | CWE-89 | 0.1% p19 | 6.02 | WeGIA is a web manager for charitable institutions. In versions 3.6.5 and 3.6.6,...WeGIA is a web manager for charitable institutions. In versions 3.6.5 and 3.6.6, the loadBackupDB() function imports SQL files from uploaded backup archives without any content validation. An attacker can craft a backup archive containing arbitrary SQL statements that create rogue administrator accounts, modify existing passwords, or execute any database operation. This was introduced in commit 370104c. This issue was patched in version 3.6.7. |
2026-03-20 | |
| CVE-2026-33131 | 7.4 | HIGH | CWE-290 | 0.0% p4 | 5.18 | H3 is a minimal H(TTP) framework. Versions 2.0.0-0 through 2.0.1-rc.14 contain a...H3 is a minimal H(TTP) framework. Versions 2.0.0-0 through 2.0.1-rc.14 contain a Host header spoofing vulnerability in the NodeRequestUrl (which extends FastURL) which allows middleware bypass. When event.url, event.url.hostname, or event.url._url is accessed, such as in a logging middleware, the _url getter constructs a URL from untrusted data, including the user-controlled Host header. Because H3's router resolves the route handler before middleware runs, an attacker can supply a crafted Host header (e.g., Host: localhost:3000/abchehe?) to make the middleware path check fail while the route handler still matches, effectively bypassing authentication or authorization middleware. This affects any application built on H3 (including Nitro/Nuxt) that accesses event.url properties in middleware guarding sensitive routes. The issue requires an immediate fix to prevent FastURL.href from being constructed with unsanitized, attacker-controlled input. Version 2.0.1-rc.15 contains a patch for this issue. |
2026-03-20 | |
| CVE-2026-32595 | 6.3 | MEDIUM | CWE-208 | 0.0% p2 | 4.41 | Traefik is an HTTP reverse proxy and load balancer. Versions 2.11.40 and below, ...Traefik is an HTTP reverse proxy and load balancer. Versions 2.11.40 and below, 3.0.0-beta1 through 3.6.11, and 3.7.0-ea.1 comtain BasicAuth middleware that allows username enumeration via a timing attack. When a submitted username exists, the middleware performs a bcrypt password comparison taking ~166ms. When the username does not exist, the response returns immediately in ~0.6ms. This ~298x timing difference is observable over the network and allows an unauthenticated attacker to reliably distinguish valid from invalid usernames. This issue is patched in versions 2.11.41, 3.6.11 and 3.7.0-ea.2. |
2026-03-20 | |
| CVE-2026-32305 | 7.8 | HIGH | CWE-287 | 0.0% p4 | 5.46 | Traefik is an HTTP reverse proxy and load balancer. Versions 2.11.40 and below, ...Traefik is an HTTP reverse proxy and load balancer. Versions 2.11.40 and below, 3.0.0-beta1 through 3.6.11, and 3.7.0-ea.1 are vulnerable to mTLS bypass through the TLS SNI pre-sniffing logic related to fragmented ClientHello packets. When a TLS ClientHello is fragmented across multiple records, Traefik's SNI extraction may fail with an EOF and return an empty SNI. The TCP router then falls back to the default TLS configuration, which does not require client certificates by default. This allows an attacker to bypass route-level mTLS enforcement and access services that should require mutual TLS authentication. This issue is patched in versions 2.11.41, 3.6.11 and 3.7.0-ea.2. |
2026-03-20 | |
| CVE-2026-25792 | 6.5 | MEDIUM | CWE-426 | 0.0% p1 | 4.55 | Greenshot is an open source Windows screenshot utility. Versions 1.3.312 and bel...Greenshot is an open source Windows screenshot utility. Versions 1.3.312 and below have untrusted executable search path / binary hijacking vulnerability that allows a local attacker to execute arbitrary code when the affected Windows application launches explorer.exe without using an absolute path. The vulnerable behavior is triggered when the user double-clicks the application’s tray icon, which opens the directory containing the most recent screenshot captured by the application. By placing a malicious executable with the same name in a location searched prior to the legitimate Windows binary, an attacker can gain code execution in the context of the application. This issue did not have a patch at the time of publication. |
2026-03-20 | |
| CVE-2026-33130 | 6.5 | MEDIUM | CWE-98 | 0.0% p10 | 4.55 | Uptime Kuma is an open source, self-hosted monitoring tool. In versions 1.23.0 t...Uptime Kuma is an open source, self-hosted monitoring tool. In versions 1.23.0 through 2.2.0, the fix from GHSA-vffh-c9pq-4crh doesn't fully work to preventServer-side Template Injection (SSTI). The three mitigations added to the Liquid engine (root, relativeReference, dynamicPartials) only block quoted paths. If a project uses an unquoted absolute path, attackers can still read any file on the server. The original fix in notification-provider.js only constrains the first two steps of LiquidJS's file resolution (via root, relativeReference, and dynamicPartials options), but the third step, the require.resolve() fallback in liquid.node.js has no containment check, allowing unquoted absolute paths like /etc/passwd to resolve successfully. Quoted paths happen to be blocked only because the literal quote characters cause require.resolve('"/etc/passwd"') to throw a MODULE_NOT_FOUND error, not because of any intentional security measure. This issue has been fixed in version 2.2.1. |
2026-03-20 | |
| CVE-2026-33129 | 5.9 | MEDIUM | CWE-208 | 0.0% p10 | 4.13 | H3 is a minimal H(TTP) framework. Versions 2.0.1-beta.0 through 2.0.0-rc.8 conta...H3 is a minimal H(TTP) framework. Versions 2.0.1-beta.0 through 2.0.0-rc.8 contain a Timing Side-Channel vulnerability in the requireBasicAuth function due to the use of unsafe string comparison (!==). This allows an attacker to deduce the valid password character-by-character by measuring the server's response time, effectively bypassing password complexity protections. This issue is fixed in version 2.0.1-rc.9. |
2026-03-20 | |
| CVE-2026-33128 | 7.5 | HIGH | CWE-93 | 0.0% p5 | 5.25 | H3 is a minimal H(TTP) framework. In versions prior to 1.15.6 and between 2.0.0 ...H3 is a minimal H(TTP) framework. In versions prior to 1.15.6 and between 2.0.0 through 2.0.1-rc.14, createEventStream is vulnerable to Server-Sent Events (SSE) injection due to missing newline sanitization in formatEventStreamMessage() and formatEventStreamComment(). An attacker who controls any part of an SSE message field (id, event, data, or comment) can inject arbitrary SSE events to connected clients. This issue is fixed in versions 1.15.6 and 2.0.1-rc.15. |
2026-03-20 | |
| CVE-2026-33125 | 7.1 | HIGH | CWE-285 | 0.0% p13 | 4.97 | Frigate is a network video recorder (NVR) with realtime local object detection f...Frigate is a network video recorder (NVR) with realtime local object detection for IP cameras. In versions 0.16.2 and below, users with the viewer role can delete admin and low-privileged user accounts. Exploitation can lead to DoS and affect data integrity. This issue has been patched in version 0.16.3. |
2026-03-20 | |
| CVE-2026-33124 | 8.6 | HIGH | CWE-287 | 0.0% p14 | 6.02 | Frigate is a network video recorder (NVR) with realtime local object detection f...Frigate is a network video recorder (NVR) with realtime local object detection for IP cameras. Versions prior to 0.17.0-beta1 allow any authenticated user to change their own password without verifying the current password through the /users/{username}/password endpoint. Changing a password does not invalidate existing JWT tokens, and there is no validation of password strength. If an attacker obtains a valid session token (e.g., via accidentally exposed JWT, stolen cookie, XSS, compromised device, or sniffing over HTTP), they can change the victim’s password and gain permanent control of the account. Since password changes do not invalidate existing JWT tokens, session hijacks persist even after a password reset. Additionally, the lack of password strength validation exposes accounts to brute-force attacks. This issue has been resolved in version 0.17.0-beta1. |
2026-03-20 | |
| CVE-2026-33123 | 5.1 | MEDIUM | CWE-400 | 0.0% p0 | 3.57 | pypdf is a free and open-source pure-python PDF library. Versions prior to 6.9.1...pypdf is a free and open-source pure-python PDF library. Versions prior to 6.9.1 allow an attacker to craft a malicious PDF which leads to long runtimes and/or large memory usage. Exploitation requires accessing an array-based stream with many entries. This issue has been fixed in version 6.9.1. |
2026-03-20 | |
| CVE-2026-33081 | 5.8 | MEDIUM | CWE-918 | 0.0% p12 | 4.06 | PinchTab is a standalone HTTP server that gives AI agents direct control over a ...PinchTab is a standalone HTTP server that gives AI agents direct control over a Chrome browser. Versions 0.8.2 and below have a Blind SSRF vulnerability in the /download endpoint. The validateDownloadURL() function only checks the initial user-supplied URL, but the embedded Chromium browser can follow attacker-controlled redirects/navigations to internal network addresses after validation. Exploitation requires security.allowDownload=true (disabled by default), limiting real-world impact. An attacker-controlled page can use JavaScript redirects or resource requests to make the browser reach internal services from the PinchTab host, resulting in a blind Server-Side Request Forgery (SSRF) condition against internal-only services. The issue has been patched in version 0.8.3. |
2026-03-20 | |
| CVE-2026-22324 | 8.1 | HIGH | CWE-98 | 0.2% p35 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Melania allows PHP Local File Inclusion.This issue affects Melania: from n/a through 2.5.0. |
2026-03-20 | |
| CVE-2026-0677 | 0.0 | NONE | CWE-502 | 0.0% p8 | 0.00 | Deserialization of Untrusted Data vulnerability in TotalSuite TotalContest Lite ...Deserialization of Untrusted Data vulnerability in TotalSuite TotalContest Lite totalcontest-lite allows Object Injection.This issue affects TotalContest Lite: from n/a through <= 2.9.1. |
2026-03-20 | |
| CVE-2024-32537 | 7.1 | HIGH | CWE-352 | 0.0% p7 | 4.97 | Cross-Site request forgery (CSRF) vulnerability in joshuae1974 Flash Video Playe...Cross-Site request forgery (CSRF) vulnerability in joshuae1974 Flash Video Player allows Cross Site Request Forgery.This issue affects Flash Video Player: from n/a through 5.0.4. |
2026-03-20 | |
| CVE-2024-31119 | 5.9 | MEDIUM | CWE-79 | 0.1% p27 | 4.13 | Improper neutralization of input during web page generation ('cross-site scripti...Improper neutralization of input during web page generation ('cross-site scripting') vulnerability in Vasilis Triantafyllou Special Box for Content allows DOM-Based XSS.This issue affects Special Box for Content: from n/a through 1. |
2026-03-20 | |
| CVE-2026-3550 | 5.3 | MEDIUM | CWE-862 | 0.1% p16 | 3.71 | The RockPress plugin for WordPress is vulnerable to Missing Authorization in all...The RockPress plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 1.0.17. This is due to missing capability checks on multiple AJAX actions (rockpress_import, rockpress_import_status, rockpress_last_import, rockpress_reset_import, and rockpress_check_services) combined with the plugin's nonce being exposed to all authenticated users via an unconditionally enqueued admin script. The plugin enqueues the 'rockpress-admin' script on all admin pages (including profile.php) without any page or capability restrictions, and the nonce for the 'rockpress-nonce' action is passed to this script via wp_localize_script. Since the AJAX handlers only verify this nonce and do not check current_user_can(), any authenticated user, including Subscribers, can extract the nonce from any admin page's HTML source and use it to trigger imports, reset import data (deleting options), check service connectivity, and read import status information. This makes it possible for authenticated attackers, with Subscriber-level access and above, to trigger resource-intensive import operations, reset import tracking data, and perform system connection checks that should be restricted to administrators. |
2026-03-20 | |
| CVE-2026-33192 | 8.7 | HIGH | CWE-209 | 0.0% p1 | 6.09 | Free5GC is an open-source Linux Foundation project for 5th generation (5G) mobil...Free5GC is an open-source Linux Foundation project for 5th generation (5G) mobile core networks. In versions prior to 1.4.2, the UDM incorrectly converts a downstream 400 Bad Request (from UDR) into a 500 Internal Server Error when handling PATCH requests with an empty supi path parameter. Additionally, the UDM incorrectly translates the PATCH method to PUT when forwarding to UDR, indicating a deeper architectural issue. This leaks internal error handling behavior, making it difficult for clients to distinguish between client-side errors and server-side failures. The issue has been patched in version 1.4.2. |
2026-03-20 | |
| CVE-2026-33080 | 7.3 | HIGH | CWE-79 | 0.0% p3 | 5.11 | Filament is a collection of full-stack components for accelerated Laravel develo...Filament is a collection of full-stack components for accelerated Laravel development. Versions 4.0.0 through 4.8.4 and 5.0.0 through 5.3.4 have two Filament Table summarizers (Range, Values) that render raw database values without escaping HTML. If there is a lack of validation for the data in the columns that use these summarizers, an attacker could plant malicious HTML / JavaScript and achieve stored XSS that executes for users who view the table with those summarizers. This issue has been patched in versions 4.8.5 and 5.3.5. |
2026-03-20 | |
| CVE-2026-33075 | 9.4 | CRITICAL | CWE-494 | 0.0% p11 | 6.58 | FastGPT is an AI Agent building platform. In versions 4.14.8.3 and below, the fa...FastGPT is an AI Agent building platform. In versions 4.14.8.3 and below, the fastgpt-preview-image.yml workflow is vulnerable to arbitrary code execution and secret exfiltration by any external contributor. It uses pull_request_target (which runs with access to repository secrets) but checks out code from the pull request author's fork, then builds and pushes Docker images using attacker-controlled Dockerfiles. This also enables a supply chain attack via the production container registry. A patch was not available at the time of publication. |
2026-03-20 | |
| CVE-2026-33072 | 8.2 | HIGH | CWE-798 | 0.0% p1 | 5.74 | FileRise is a self-hosted web file manager / WebDAV server. In versions prior to...FileRise is a self-hosted web file manager / WebDAV server. In versions prior to 3.9.0, a hardcoded default encryption key (default_please_change_this_key) is used for all cryptographic operations — HMAC token generation, AES config encryption, and session tokens — allowing any unauthenticated attacker to forge upload tokens for arbitrary file upload to shared folders, and to decrypt admin configuration secrets including OIDC client secrets and SMTP passwords. FileRise uses a single key (PERSISTENT_TOKENS_KEY) for all crypto operations. The default value default_please_change_this_key is hardcoded in two places and used unless the deployer explicitly overrides the environment variable. This issue is fixed in version 3.9.0. |
2026-03-20 | |
| CVE-2026-33071 | 4.3 | MEDIUM | CWE-434 | 0.2% p37 | 3.02 | FileRise is a self-hosted web file manager / WebDAV server. In versions prior to...FileRise is a self-hosted web file manager / WebDAV server. In versions prior to 3.8.0, the WebDAV upload endpoint accepts any file extension including .phtml, .php5, .htaccess, and other server-side executable types, bypassing the filename validation enforced by the regular upload path. In non-default deployments lacking Apache's LocationMatch protection, this leads to remote code execution. When files are uploaded via WebDAV, the createFile() method in FileRiseDirectory.php and the put() method in FileRiseFile.php accept the filename directly from the WebDAV client without any validation. In contrast, the regular upload endpoint in UploadModel::upload() validates filenames against REGEX_FILE_NAME. This issue is fixed in version 3.8.0. |
2026-03-20 | |
| CVE-2026-33070 | 3.7 | LOW | CWE-306 | 0.1% p17 | 2.59 | FileRise is a self-hosted web file manager / WebDAV server. In versions prior to...FileRise is a self-hosted web file manager / WebDAV server. In versions prior to 3.8.0, a missing-authentication vulnerability in the deleteShareLink endpoint allows any unauthenticated user to delete arbitrary file share links by providing only the share token, causing denial of service to shared file access. The POST /api/file/deleteShareLink.php endpoint calls FileController::deleteShareLink() which performs no authentication, authorization, or CSRF validation before deleting a share link. Any anonymous HTTP client can destroy share links. This issue is fixed in version 3.8.0. |
2026-03-20 | |
| CVE-2026-33069 | 6.9 | MEDIUM | CWE-125 | 0.0% p12 | 4.83 | PJSIP is a free and open source multimedia communication library written in C. V...PJSIP is a free and open source multimedia communication library written in C. Versions 2.16 and below have a cascading out-of-bounds heap read in pjsip_multipart_parse(). After boundary string matching, curptr is advanced past the delimiter without verifying it has not reached the buffer end. This allows 1-2 bytes of adjacent heap memory to be read. All applications that process incoming SIP messages with multipart bodies or SDP content are potentially affected. This issue is resolved in version 2.17. |
2026-03-20 | |
| CVE-2026-33068 | 7.7 | HIGH | CWE-807 | 0.1% p29 | 5.39 | Claude Code is an agentic coding tool. Versions prior to 2.1.53 resolved the per...Claude Code is an agentic coding tool. Versions prior to 2.1.53 resolved the permission mode from settings files, including the repo-controlled .claude/settings.json, before determining whether to display the workspace trust confirmation dialog. A malicious repository could set permissions.defaultMode to bypassPermissions in its committed .claude/settings.json, causing the trust dialog to be silently skipped on first open. This allowed a user to be placed into a permissive mode without seeing the trust confirmation prompt, making it easier for an attacker-controlled repository to gain tool execution without explicit user consent. This issue has been patched in version 2.1.53. |
2026-03-20 | |
| CVE-2026-33067 | 5.3 | MEDIUM | CWE-79 | 0.1% p22 | 3.71 | SiYuan is a personal knowledge management system. Versions 3.6.0 and below rende...SiYuan is a personal knowledge management system. Versions 3.6.0 and below render package metadata fields (displayName, description) using template literals without HTML escaping. A malicious package author can inject arbitrary HTML/JavaScript into these fields, which executes automatically when any user browses the Bazaar page. Because SiYuan's Electron configuration enables nodeIntegration: true with contextIsolation: false, this XSS escalates directly to full Remote Code Execution on the victim's operating system — with zero user interaction beyond opening the marketplace tab. This issue has been fixed in version 3.6.1. |
2026-03-20 | |
| CVE-2026-33066 | 5.3 | MEDIUM | CWE-79 | 0.2% p44 | 3.72 | SiYuan is a personal knowledge management system. In versions 3.6.0 and below, t...SiYuan is a personal knowledge management system. In versions 3.6.0 and below, the backend renderREADME function uses lute.New() without calling SetSanitize(true), allowing raw HTML embedded in Markdown to pass through unmodified. The frontend then assigns the rendered HTML to innerHTML without any additional sanitization. A malicious package author can embed arbitrary JavaScript in their README that executes when a user clicks to view the package details. Because SiYuan's Electron configuration enables nodeIntegration: true with contextIsolation: false, this XSS escalates directly to full Remote Code Execution. The issue was patched in version 3.6.1. |
2026-03-20 | |
| CVE-2026-32701 | 7.5 | HIGH | CWE-843 | 0.0% p12 | 5.25 | Qwik is a performance-focused JavaScript framework. Versions prior to 1.19.2 imp...Qwik is a performance-focused JavaScript framework. Versions prior to 1.19.2 improperly inferred arrays from dotted form field names during FormData parsing. By submitting mixed array-index and object-property keys for the same path, an attacker could cause user-controlled properties to be written onto values that application code expected to be arrays. When processing application/x-www-form-urlencoded or multipart/form-data requests, Qwik City converted dotted field names (e.g., items.0, items.1) into nested structures. If a path was interpreted as an array, additional attacker-supplied keys on that path—such as items.toString, items.push, items.valueOf, or items.length—could alter the resulting server-side value in unexpected ways, potentially leading to request handling failures, denial of service through malformed array state or oversized lengths, and type confusion in downstream code. This issue was fixed in version 1.19.2. |
2026-03-20 | |
| CVE-2026-2432 | 4.4 | MEDIUM | CWE-79 | 0.0% p7 | 3.08 | The CM Custom Reports – Flexible reporting to track what matters most plugin for...The CM Custom Reports – Flexible reporting to track what matters most plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.2.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. |
2026-03-20 | |
| CVE-2026-2421 | 6.5 | MEDIUM | CWE-22 | 0.5% p67 | 4.57 | The ilGhera Carta Docente for WooCommerce plugin for WordPress is vulnerable to ...The ilGhera Carta Docente for WooCommerce plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.5.0 via the 'cert' parameter of the 'wccd-delete-certificate' AJAX action. This is due to insufficient file path validation before performing a file deletion. This makes it possible for authenticated attackers, with Administrator-level access and above, to delete arbitrary files on the server, such as wp-config.php, which can make site takeover and remote code execution possible. |
2026-03-20 | |
| CVE-2026-27625 | 8.1 | HIGH | CWE-22 | 0.1% p17 | 5.67 | Stirling-PDF is a locally hosted web application that performs various operation...Stirling-PDF is a locally hosted web application that performs various operations on PDF files. In versions prior to 2.5.2, the /api/v1/convert/markdown/pdf endpoint extracts user-supplied ZIP entries without path checks. Any authenticated user can write files outside the intended temporary working directory, leading to arbitrary file write with the privileges of the Stirling-PDF process user (stirlingpdfuser). This can overwrite writable files and compromise data integrity, with further impact depending on writable paths. The issue was fixed in version 2.5.2. |
2026-03-20 | |
| CVE-2026-33065 | 6.9 | MEDIUM | CWE-209 | 0.0% p8 | 4.83 | Free5GC is an open-source Linux Foundation project for 5th generation (5G) mobil...Free5GC is an open-source Linux Foundation project for 5th generation (5G) mobile core networks. In versions prior to 1.4.2, the UDM incorrectly converts a downstream 400 Bad Request (from UDR) into a 500 Internal Server Error when handling DELETE requests with an empty supi path parameter. This leaks internal error handling behavior and makes it difficult for clients to distinguish between client-side errors and server-side failures. When a client sends a DELETE request with an empty supi (e.g., double slashes // in URL path), the UDM forwards the malformed request to UDR, which correctly returns 400. However, UDM propagates this as 500 SYSTEM_FAILURE instead of returning the appropriate 400 error to the client. This violates REST API best practices for DELETE operations. The issue has been patched in version 1.4.2. |
2026-03-20 | |
| CVE-2026-33064 | 8.7 | HIGH | CWE-478 | 0.2% p42 | 6.10 | Free5GC is an open-source Linux Foundation project for 5th generation (5G) mobil...Free5GC is an open-source Linux Foundation project for 5th generation (5G) mobile core networks. Versions prior to 1.4.2 are vulnerable to procedure panic caused by Nil Pointer Dereference in the /sdm-subscriptions endpoint. A remote attacker can cause the UDM service to panic and crash by sending a crafted POST request to the /sdm-subscriptions endpoint with a malformed URL path containing path traversal sequences (../) and a large JSON payload. The DataChangeNotificationProcedure function in notifier.go attempts to access a nil pointer without proper validation, causing a complete service crash with "runtime error: invalid memory address or nil pointer dereference". Exploitation would result in UDM functionality disruption until recovery by restart. This issue has been fixed in version 1.4.2. |
2026-03-20 | |
| CVE-2026-33061 | 5.8 | MEDIUM | CWE-79 | 0.0% p6 | 4.06 | Jexactyl is a customisable game management panel and billing system. Commits aft...Jexactyl is a customisable game management panel and billing system. Commits after 025e8dbb0daaa04054276bda814d922cf4af58da and before e28edb204e80efab628d1241198ea4f079779cfd inject server-side objects into client-side JavaScript through resources/views/templates/wrapper.blade.php. Using unescaped {!! json_encode(...) !!} without safe encoding flags allows string values to break out of the JavaScript context and be interpreted as HTML/JS by the browser. If any serialized fields contain attacker-controlled content, such as a username, display name, or site config value, a malicious payload will execute arbitrary script for any user viewing the page (stored DOM XSS). This issue has been patched by commit e28edb204e80efab628d1241198ea4f079779cfd. |
2026-03-20 | |
| CVE-2026-33060 | 5.3 | MEDIUM | CWE-918 | 0.0% p1 | 3.71 | CKAN MCP Server is a tool for querying CKAN open data portals. Versions prior to...CKAN MCP Server is a tool for querying CKAN open data portals. Versions prior to 0.4.85 provide tools including ckan_package_search and sparql_query that accept a base_url parameter, making HTTP requests to arbitrary endpoints without restriction. A CKAN portal client has no legitimate reason to contact cloud metadata or internal network services. There is no URL validation on base_url parameter. No private IP blocking (RFC 1918, link-local 169.254.x.x), no cloud metadata blocking. The sparql_query and ckan_datastore_search_sql tools also accept arbitrary base URLs and expose injection surfaces. An attack can lead to internal network scanning, cloud metadata theft (IAM credentials via IMDS at 169.254.169.254), potential SQL/SPARQL injection via unsanitized query parameters. Attack requires prompt injection to control the base_url parameter. This issue has been fixed in version 0.4.85. |
2026-03-20 | |
| CVE-2026-33057 | 9.8 | CRITICAL | CWE-94 | 0.1% p33 | 6.86 | Mesop is a Python-based UI framework that allows users to build web applications...Mesop is a Python-based UI framework that allows users to build web applications. In versions 1.2.2 and below, an explicit web endpoint inside the ai/ testing module infrastructure directly ingests untrusted Python code strings unconditionally without authentication measures, yielding standard Unrestricted Remote Code Execution. Any individual capable of routing HTTP logic to this server block will gain explicit host-machine command rights. The AI codebase package includes a lightweight debugging Flask server inside ai/sandbox/wsgi_app.py. The /exec-py route accepts base_64 encoded raw string payloads inside the code parameter natively evaluated by a basic POST web request. It saves it rapidly to the operating system logic path and injects it recursively using execute_module(module_path...). This issue has been fixed in version 1.2.3. |
2026-03-20 | |
| CVE-2026-33056 | 5.1 | MEDIUM | CWE-61 | 0.0% p1 | 3.57 | tar-rs is a tar archive reading/writing library for Rust. In versions 0.4.44 and...tar-rs is a tar archive reading/writing library for Rust. In versions 0.4.44 and below, when unpacking a tar archive, the tar crate's unpack_dir function uses fs::metadata() to check whether a path that already exists is a directory. Because fs::metadata() follows symbolic links, a crafted tarball containing a symlink entry followed by a directory entry with the same name causes the crate to treat the symlink target as a valid existing directory — and subsequently apply chmod to it. This allows an attacker to modify the permissions of arbitrary directories outside the extraction root. This issue has been fixed in version 0.4.45. |
2026-03-20 | |
| CVE-2026-33022 | 6.5 | MEDIUM | CWE-129 | 0.0% p3 | 4.55 | Tekton Pipelines project provides k8s-style resources for declaring CI/CD-style ...Tekton Pipelines project provides k8s-style resources for declaring CI/CD-style pipelines. Versions 0.60.0 through 1.0.0, 1.1.0 through 1.3.2, 1.4.0 through 1.6.0, 1.7.0 through 1.9.0, 1.10.0, and 1.10.1 have a denial-of-service vulnerability in that allows any user who can create a TaskRun or PipelineRun to crash the controller cluster-wide by setting .spec.taskRef.resolver (or .spec.pipelineRef.resolver) to a string of 31+ characters. The crash occurs because GenerateDeterministicNameFromSpec produces a name exceeding the 63-character DNS-1123 label limit, and its truncation logic panics on a [-1] slice bound since the generated name contains no spaces. Once crashed, the controller enters a CrashLoopBackOff on restart (as it re-reconciles the offending resource), blocking all CI/CD reconciliation until the resource is manually deleted. Built-in resolvers (git, cluster, bundles, hub) are unaffected due to their short names, but any custom resolver name triggers the bug. The fix truncates the resolver-name prefix instead of the full string, preserving the hash suffix for determinism and uniqueness. This issue has been patched in versions 1.0.1, 1.3.3, 1.6.1, 1.9.2 and 1.10.2. |
2026-03-20 | |
| CVE-2026-4478 | 8.2 | HIGH | CWE-345 | 0.0% p1 | 5.74 | A vulnerability was identified in Yi Technology YI Home Camera 2 2.1.1_201710241...A vulnerability was identified in Yi Technology YI Home Camera 2 2.1.1_20171024151200. This impacts an unknown function of the file home/web/ipc of the component HTTP Firmware Update Handler. The manipulation leads to improper verification of cryptographic signature. The attack is possible to be carried out remotely. The complexity of an attack is rather high. The exploitability is said to be difficult. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-20 | |
| CVE-2026-4476 | 5.3 | MEDIUM | CWE-287 | 0.0% p3 | 3.71 | A vulnerability was found in Yi Technology YI Home Camera 2 2.1.1_20171024151200...A vulnerability was found in Yi Technology YI Home Camera 2 2.1.1_20171024151200. The impacted element is an unknown function of the file home/web/ipc of the component CGI Endpoint. Performing a manipulation results in missing authentication. Access to the local network is required for this attack. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-20 | |
| CVE-2026-4475 | 8.7 | HIGH | CWE-259 | 0.0% p8 | 6.09 | A vulnerability has been found in Yi Technology YI Home Camera 2 2.1.1_201710241...A vulnerability has been found in Yi Technology YI Home Camera 2 2.1.1_20171024151200. The affected element is an unknown function of the file home/web/ipc. Such manipulation leads to hard-coded credentials. Access to the local network is required for this attack to succeed. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-20 | |
| CVE-2026-4474 | 4.8 | MEDIUM | CWE-79 | 0.0% p8 | 3.36 | A flaw has been found in itsourcecode University Management System 1.0. Impacted...A flaw has been found in itsourcecode University Management System 1.0. Impacted is an unknown function of the file /admin_single_student_update.php. This manipulation of the argument st_name causes cross site scripting. The attack may be initiated remotely. The exploit has been published and may be used. |
2026-03-20 | |
| CVE-2026-33055 | 5.1 | MEDIUM | CWE-843 | 0.0% p1 | 3.57 | tar-rs is a tar archive reading/writing library for Rust. Versions 0.4.44 and be...tar-rs is a tar archive reading/writing library for Rust. Versions 0.4.44 and below have conditional logic that skips the PAX size header in cases where the base header size is nonzero. As part of CVE-2025-62518, the astral-tokio-tar project was changed to correctly honor PAX size headers in the case where it was different from the base header. This is almost the inverse of the astral-tokio-tar issue. Any discrepancy in how tar parsers honor file size can be used to create archives that appear differently when unpacked by different archivers. In this case, the tar-rs (Rust tar) crate is an outlier in checking for the header size - other tar parsers (including e.g. Go archive/tar) unconditionally use the PAX size override. This can affect anything that uses the tar crate to parse archives and expects to have a consistent view with other parsers. This issue has been fixed in version 0.4.45. |
2026-03-20 | |
| CVE-2026-33054 | 10.0 | CRITICAL | CWE-22 | 0.0% p5 | 7.00 | Mesop is a Python-based UI framework that allows users to build web applications...Mesop is a Python-based UI framework that allows users to build web applications. Versions 1.2.2 and below contain a Path Traversal vulnerability that allows any user supplying an untrusted state_token through the UI stream payload to arbitrarily target files on the disk under the standard file-based runtime backend. This can result in application denial of service (via crash loops when reading non-msgpack target files as configurations), or arbitrary file manipulation. This vulnerability heavily exposes systems hosted utilizing FileStateSessionBackend. Unauthorized malicious actors could interact with arbitrary payloads overwriting or explicitly removing underlying service resources natively outside the application bounds. This issue has been fixed in version 1.2.3. |
2026-03-20 | |
| CVE-2026-33053 | 6.1 | MEDIUM | CWE-639 | 0.0% p5 | 4.27 | Langflow is a tool for building and deploying AI-powered agents and workflows. I...Langflow is a tool for building and deploying AI-powered agents and workflows. In versions prior to 1.9.0, the delete_api_key_route() endpoint accepts an api_key_id path parameter and deletes it with only a generic authentication check (get_current_active_user dependency). However, the delete_api_key() CRUD function does NOT verify that the API key belongs to the current user before deletion. |
2026-03-20 | |
| CVE-2026-4473 | 5.1 | MEDIUM | CWE-74 | 0.0% p7 | 3.57 | A vulnerability was detected in itsourcecode Online Doctor Appointment System 1....A vulnerability was detected in itsourcecode Online Doctor Appointment System 1.0. This issue affects some unknown processing of the file /admin/appointment_action.php. The manipulation of the argument appointment_id results in sql injection. The attack can be launched remotely. The exploit is now public and may be used. |
2026-03-20 | |
| CVE-2026-33051 | 5.3 | MEDIUM | CWE-79 | 0.0% p8 | 3.71 | Craft CMS is a content management system (CMS). In versions 5.9.0-beta.1 through...Craft CMS is a content management system (CMS). In versions 5.9.0-beta.1 through 5.9.10, the revision/draft context menu in the element editor renders the creator’s fullName as raw HTML due to the use of Template::raw() combined with Craft::t() string interpolation. A low-privileged control panel user (e.g., Author) can set their fullName to an XSS payload via the profile editor, then create an entry with two saves. If an administrator is logged in and executes a specifically crafted payload while an elevated session is active, the attacker’s account can be elevated to administrator. This issue has been fixed in version 5.9.11. |
2026-03-20 | |
| CVE-2026-33043 | 8.1 | HIGH | CWE-942 | 0.0% p9 | 5.67 | WWBN AVideo is an open source video platform. In versions 25.0 and below, /objec...WWBN AVideo is an open source video platform. In versions 25.0 and below, /objects/phpsessionid.json.php exposes the current PHP session ID to any unauthenticated request. The allowOrigin() function reflects any Origin header back in Access-Control-Allow-Origin with Access-Control-Allow-Credentials: true, enabling cross-origin session theft and full account takeover. This issue has been fixed in version 26.0. |
2026-03-20 | |
| CVE-2026-33041 | 5.3 | MEDIUM | CWE-200 | 0.1% p18 | 3.71 | WWBN AVideo is an open source video platform. In versions 25.0 and below, /objec...WWBN AVideo is an open source video platform. In versions 25.0 and below, /objects/encryptPass.json.php exposes the application's password hashing algorithm to any unauthenticated user. An attacker can submit arbitrary passwords and receive their hashed equivalents, enabling offline password cracking against leaked database hashes. If an attacker obtains password hashes from the database (via SQL injection, backup exposure, etc.), they can instantly crack them by comparing against pre-computed hashes from this endpoint. This endpoint eliminates the need for an attacker to reverse-engineer the hashing algorithm. Combined with the weak hash chain (md5+whirlpool+sha1, no salt by default), an attacker with access to database hashes can crack passwords extremely quickly. This issue was fixed in version 26.0. |
2026-03-20 | |
| CVE-2026-33040 | 8.7 | HIGH | CWE-190 | 0.1% p19 | 6.09 | libp2p-rust is the official rust language Implementation of the libp2p networkin...libp2p-rust is the official rust language Implementation of the libp2p networking stack. In versions prior to 0.49.3, the Gossipsub implementation accepts attacker-controlled PRUNE backoff values and may perform unchecked time arithmetic when storing backoff state. A specially crafted PRUNE control message with an extremely large backoff (e.g. u64::MAX) can lead to Duration/Instant overflow during backoff update logic, triggering a panic in the networking state machine. This is remotely reachable over a normal libp2p connection and does not require authentication. Any application exposing a libp2p Gossipsub listener and using the affected backoff-handling path can be crashed by a network attacker that can reach the service port. The attack can be repeated by reconnecting and replaying the crafted control message. This issue has been fixed in version 0.49.3. |
2026-03-20 | |
| CVE-2026-33039 | 8.6 | HIGH | CWE-918 | 0.0% p2 | 6.02 | WWBN AVideo is an open source video platform. In versions 25.0 and below, the pl...WWBN AVideo is an open source video platform. In versions 25.0 and below, the plugin/LiveLinks/proxy.php endpoint validates user-supplied URLs against internal/private networks using isSSRFSafeURL(), but only checks the initial URL. When the initial URL responds with an HTTP redirect (Location header), the redirect target is fetched via fakeBrowser() without re-validation, allowing an attacker to reach internal services (cloud metadata, RFC1918 addresses) through an attacker-controlled redirect. This issue is fixed in version 26.0. |
2026-03-20 | |
| CVE-2026-33038 | 8.1 | HIGH | CWE-306 | 0.1% p16 | 5.67 | WWBN AVideo is an open source video platform. Versions 25.0 and below are vulner...WWBN AVideo is an open source video platform. Versions 25.0 and below are vulnerable to unauthenticated application takeover through the install/checkConfiguration.php endpoint. install/checkConfiguration.php performs full application initialization: database setup, admin account creation, and configuration file write, all from an unauthenticated POST input. The only guard is checking whether videos/configuration.php already exists. On uninitialized deployments, any remote attacker can complete the installation with attacker-controlled credentials and an attacker-controlled database, gaining full administrative access. This issue has been fixed in version 26.0. |
2026-03-20 | |
| CVE-2026-33037 | 8.1 | HIGH | CWE-1188 | 0.3% p55 | 5.68 | WWBN AVideo is an open source video platform. In versions 25.0 and below, the of...WWBN AVideo is an open source video platform. In versions 25.0 and below, the official Docker deployment files (docker-compose.yml, env.example) ship with the admin password set to "password", which is automatically used to seed the admin account during installation, meaning any instance deployed without overriding SYSTEM_ADMIN_PASSWORD is immediately vulnerable to trivial administrative takeover. No compensating controls exist: there is no forced password change on first login, no complexity validation, no default-password detection, and the password is hashed with weak MD5. Full admin access enables user data exposure, content manipulation, and potential remote code execution via file uploads and plugin management. The same insecure-default pattern extends to database credentials (avideo/avideo), compounding the risk. Exploitation depends on operators failing to change the default, a condition likely met in quick-start, demo, and automated deployments. This issue has been fixed in version 26.0. |
2026-03-20 | |
| CVE-2026-33036 | 7.5 | HIGH | CWE-776 | 0.1% p16 | 5.25 | fast-xml-parser allows users to process XML from JS object without C/C++ based l...fast-xml-parser allows users to process XML from JS object without C/C++ based libraries or callbacks. Versions 4.0.0-beta.3 through 5.5.5 contain a bypass vulnerability where numeric character references (&#NNN;, &#xHH;) and standard XML entities completely evade the entity expansion limits (e.g., maxTotalExpansions, maxExpandedLength) added to fix CVE-2026-26278, enabling XML entity expansion Denial of Service. The root cause is that replaceEntitiesValue() in OrderedObjParser.js only enforces expansion counting on DOCTYPE-defined entities while the lastEntities loop handling numeric/standard entities performs no counting at all. An attacker supplying 1M numeric entity references like A can force ~147MB of memory allocation and heavy CPU usage, potentially crashing the process—even when developers have configured strict limits. This issue has been fixed in version 5.5.6. |
2026-03-20 | |
| CVE-2026-32768 | 7.9 | HIGH | CWE-284 | 0.0% p14 | 5.53 | Chall-Manager is a platform-agnostic system able to start Challenges on Demand o...Chall-Manager is a platform-agnostic system able to start Challenges on Demand of a player. In versions prior to 0.6.5, due to a miswritten NetworkPolicy, a malicious actor can pivot from an instance to any Pod out of the origin namespace. This breaks the security-by-default property expected as part of the deployment program, leading to a potential lateral movement. In the specific case of sdk/kubernetes.Kompose it does not isolate the instances. This issue has been fixed in version 0.6.5. |
2026-03-20 | |
| CVE-2026-4472 | 5.3 | MEDIUM | CWE-74 | 0.0% p9 | 3.71 | A security vulnerability has been detected in itsourcecode Online Frozen Foods O...A security vulnerability has been detected in itsourcecode Online Frozen Foods Ordering System 1.0. This vulnerability affects unknown code of the file /admin/admin_edit_supplier.php. The manipulation of the argument Supplier_Name leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used. |
2026-03-20 | |
| CVE-2026-4471 | 5.1 | MEDIUM | CWE-74 | 0.0% p9 | 3.57 | A weakness has been identified in itsourcecode Online Frozen Foods Ordering Syst...A weakness has been identified in itsourcecode Online Frozen Foods Ordering System 1.0. This affects an unknown part of the file /admin/admin_edit_employee.php. Executing a manipulation of the argument First_Name can lead to sql injection. It is possible to launch the attack remotely. The exploit has been made available to the public and could be used for attacks. |
2026-03-20 | |
| CVE-2026-4470 | 5.1 | MEDIUM | CWE-74 | 0.0% p9 | 3.57 | A security flaw has been discovered in itsourcecode Online Frozen Foods Ordering...A security flaw has been discovered in itsourcecode Online Frozen Foods Ordering System 1.0. Affected by this issue is some unknown functionality of the file /admin/admin_edit_menu.php. Performing a manipulation of the argument product_name results in sql injection. It is possible to initiate the attack remotely. The exploit has been released to the public and may be used for attacks. |
2026-03-20 | |
| CVE-2026-4469 | 5.1 | MEDIUM | CWE-74 | 0.0% p9 | 3.57 | A vulnerability was identified in itsourcecode Online Frozen Foods Ordering Syst...A vulnerability was identified in itsourcecode Online Frozen Foods Ordering System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/admin_edit_menu_action.php. Such manipulation of the argument product_name leads to sql injection. The attack may be performed from remote. The exploit is publicly available and might be used. |
2026-03-20 | |
| CVE-2026-33035 | 5.3 | MEDIUM | CWE-79 | 0.1% p21 | 3.71 | WWBN AVideo is an open source video platform. In versions 25.0 and below, there ...WWBN AVideo is an open source video platform. In versions 25.0 and below, there is a reflected XSS vulnerability that allows unauthenticated attackers to execute arbitrary JavaScript in a victim's browser. User input from a URL parameter flows through PHP's json_encode() into a JavaScript function that renders it via innerHTML, bypassing encoding and achieving full script execution. The vulnerability is caused by two issues working together: unescaped user input passed to JavaScript (videoNotFound.php), and innerHTML rendering HTML tags as executable DOM (script.js). The attack can be escalated to steal session cookies, take over accounts, phish credentials via injected login forms, spread self-propagating payloads, and compromise admin accounts — all by exploiting the lack of proper input sanitization and cookie security (e.g., missing HttpOnly flag on PHPSESSID). The issue has been fixed in version 26.0. |
2026-03-20 | |
| CVE-2026-33025 | 8.6 | HIGH | CWE-89 | 0.0% p9 | 6.02 | AVideo is a video-sharing Platform. Versions prior to 8.0 contain a SQL Injectio...AVideo is a video-sharing Platform. Versions prior to 8.0 contain a SQL Injection vulnerability in the getSqlFromPost() method of Object.php. The $_POST['sort'] array keys are used directly as SQL column identifiers inside an ORDER BY clause. Although real_escape_string() was applied, it only escapes string-context characters (quotes, null bytes) and provides no protection for SQL identifiers — making it entirely ineffective here. This issue has been fixed in version 8.0. To workaround this issue without upgrading, operators can apply a WAF rule to block POST requests where any sort[*] key contains characters outside [A-Za-z0-9_]. Alternatively, restrict access to the queue view (queue.json.php, index.php) to trusted IP ranges only. |
2026-03-20 | |
| CVE-2026-33024 | 9.3 | CRITICAL | CWE-918 | 0.1% p24 | 6.51 | AVideo is a video-sharing Platform. Versions prior to 8.0 contain a Server-Side ...AVideo is a video-sharing Platform. Versions prior to 8.0 contain a Server-Side Request Forgery vulnerability (CWE-918) in the public thumbnail endpoints getImage.php and getImageMP4.php. Both endpoints accept a base64Url GET parameter, base64-decode it, and pass the resulting URL to ffmpeg as an input source without any authentication requirement. The prior validation only checked that the URL was syntactically valid (FILTER_VALIDATE_URL) and started with http(s)://. This is insufficient: an attacker can supply URLs such as http://169.254.169.254/latest/meta-data/ (AWS/cloud instance metadata), http://192.168.x.x/, or http://127.0.0.1/ to make the server reach internal network resources. The response is not directly returned (blind), but timing differences and error logs can be used to infer results. The issue has been fixed in version 8.0. |
2026-03-20 | |
| CVE-2026-33017 | 9.3 | CRITICAL | CWE-94 | ✓ | 5.7% p90 | 6.68 | Langflow is a tool for building and deploying AI-powered agents and workflows. I...Langflow is a tool for building and deploying AI-powered agents and workflows. In versions prior to 1.9.0, the POST /api/v1/build_public_tmp/{flow_id}/flow endpoint allows building public flows without requiring authentication. When the optional data parameter is supplied, the endpoint uses attacker-controlled flow data (containing arbitrary Python code in node definitions) instead of the stored flow data from the database. This code is passed to exec() with zero sandboxing, resulting in unauthenticated remote code execution. This is distinct from CVE-2025-3248, which fixed /api/v1/validate/code by adding authentication. The build_public_tmp endpoint is designed to be unauthenticated (for public flows) but incorrectly accepts attacker-supplied flow data containing arbitrary executable code. This issue has been fixed in version 1.9.0. |
2026-03-20 |
| CVE-2026-33013 | 8.2 | HIGH | CWE-835 | 0.2% p40 | 5.75 | Micronaut Framework is a JVM-based full stack Java framework designed for buildi...Micronaut Framework is a JVM-based full stack Java framework designed for building modular, easily testable JVM applications. Versions prior to both 4.10.16 and 3.10.5 do not correctly handle descending array index order during form-urlencoded body binding in theJsonBeanPropertyBinder::expandArrayToThreshold, which allows remote attackers to cause a DoS (non-terminating loop, CPU exhaustion, and OutOfMemoryError) via crafted indexed form parameters (e.g., authors[1].name followed by authors[0].name). This issue has been fixed in versions 4.10.16 and 3.10.5. |
2026-03-20 | |
| CVE-2026-33012 | 7.5 | HIGH | CWE-770 | 0.2% p36 | 5.25 | Micronaut Framework is a JVM-based full stack Java framework designed for buildi...Micronaut Framework is a JVM-based full stack Java framework designed for building modular, easily testable JVM applications. Versions 4.7.0 through 4.10.16 used an unbounded ConcurrentHashMap cache with no eviction policy in its DefaultHtmlErrorResponseBodyProvider. If the application throws an exception whose message may be influenced by an attacker, (for example, including request query value parameters) it could be used by remote attackers to cause an unbounded heap growth and OutOfMemoryError, leading to DoS. This issue has been fixed in version 4.10.7. |
2026-03-20 | |
| CVE-2026-33011 | 8.7 | HIGH | CWE-670 | 0.0% p11 | 6.09 | Nest is a framework for building scalable Node.js server-side applications. In v...Nest is a framework for building scalable Node.js server-side applications. In versions 11.1.15 and below, a NestJS application using @nestjs/platform-fastify GET middleware can be bypassed because Fastify automatically redirects HEAD requests to the corresponding GET handlers (if they exist). As a result: middleware will be completely skipped, the HTTP response won't include a body (since the response is truncated when redirecting a HEAD request to a GET handler), and the actual handler will still be executed. This issue is fixed in version 11.1.16. |
2026-03-20 | |
| CVE-2026-32954 | 7.1 | HIGH | CWE-89 | 0.0% p10 | 4.97 | ERP is a free and open source Enterprise Resource Planning tool. In versions pri...ERP is a free and open source Enterprise Resource Planning tool. In versions prior to 16.8.0 and 15.100.0, certain endpoints were vulnerable to time-based and boolean-based blind SQL injection due to insufficient parameter validation, allowing attackers to infer database information. This issue has been fixed in versions 15.100.0 and 16.8.0. |
2026-03-20 | |
| CVE-2026-32953 | 4.7 | MEDIUM | CWE-303 | 0.0% p0 | 3.29 | Tillitis TKey Client package is a Go package for a TKey client. Versions 1.2.0 a...Tillitis TKey Client package is a Go package for a TKey client. Versions 1.2.0 and below contain a critical bug in the tkeyclient Go module which causes 1 out of every 256 User Supplied Secrets (USS) to be silently ignored, producing the same Compound Device Identifier (CDI)—and thus the same key material—as if no USS is provided. This happens because a buffer index error overwrites the USS-enabled boolean with the first byte of the USS digest, so any USS whose hash starts with 0x00 is effectively discarded. This issue has been fixed in version 1.3.0. Users unable to upgrade immediately should switch to a USS whose hash does not begin with a zero byte. |
2026-03-20 | |
| CVE-2026-32950 | 8.6 | HIGH | CWE-78 | 0.2% p39 | 6.03 | SQLBot is an intelligent data query system based on a large language model and R...SQLBot is an intelligent data query system based on a large language model and RAG. Versions prior to 1.7.0 contain a critical SQL Injection vulnerability in the /api/v1/datasource/uploadExcel endpoint that enables Remote Code Execution (RCE), allowing any authenticated user (even the lowest-privileged) to fully compromise the backend server. The root cause is twofold: Excel Sheet names are concatenated directly into PostgreSQL table names without sanitization (datasource.py#L351), and those table names are embedded into COPY SQL statements via f-strings instead of parameterized queries (datasource.py#L385-L388). An attacker can bypass the 31-character Sheet name limit using a two-stage technique—first uploading a normal file whose data rows contain shell commands, then uploading an XML-tampered file whose Sheet name injects a TO PROGRAM 'sh' clause into the SQL. Confirmed impacts include arbitrary command execution as the postgres user (uid=999), sensitive file exfiltration (e.g., /etc/passwd, /etc/shadow), and complete PostgreSQL database takeover. This issue has been fixed in version 1.7.0. |
2026-03-20 | |
| CVE-2026-32949 | 8.7 | HIGH | CWE-73 | 0.0% p11 | 6.09 | SQLBot is an intelligent data query system based on a large language model and R...SQLBot is an intelligent data query system based on a large language model and RAG. Versions prior to 1.7.0 contain a Server-Side Request Forgery (SSRF) vulnerability that allows an attacker to retrieve arbitrary system and application files from the server. An attacker can exploit the /api/v1/datasource/check endpoint by configuring a forged MySQL data source with a malicious parameter extraJdbc="local_infile=1". When the SQLBot backend attempts to verify the connectivity of this data source, an attacker-controlled Rogue MySQL server issues a malicious LOAD DATA LOCAL INFILE command during the MySQL handshake. This forces the target server to read arbitrary files from its local filesystem (such as /etc/passwd or configuration files) and transmit the contents back to the attacker. This issue was fixed in version 1.7.0. |
2026-03-20 | |
| CVE-2026-32947 | 4.6 | MEDIUM | CWE-693 | 0.1% p26 | 3.22 | Harden-Runner is a CI/CD security agent that works like an EDR for GitHub Action...Harden-Runner is a CI/CD security agent that works like an EDR for GitHub Actions runners. In versions 2.15.1 and below, a DNS over HTTPS (DoH) vulnerability allows attackers to bypass egress-policy: block network restrictions by tunneling exfiltrated data through permitted HTTPS endpoints like dns.google. The attack works by encoding sensitive data (e.g., the runner's hostname) as subdomains in DoH queries, which appear as legitimate HTTPS traffic to Harden-Runner's domain-based filtering but are ultimately forwarded to an attacker-controlled domain. This effectively enables data exfiltration without directly connecting to any blocked destination. Exploitation requires the attacker to already have code execution within the GitHub Actions workflow. The issue was fixed in version 2.16.0. |
2026-03-20 | |
| CVE-2026-4468 | 5.1 | MEDIUM | CWE-74 | 0.3% p55 | 3.58 | A vulnerability was determined in Comfast CF-AC100 2.6.0.8. Affected is an unkno...A vulnerability was determined in Comfast CF-AC100 2.6.0.8. Affected is an unknown function of the file /cgi-bin/mbox-config?method=SET§ion=update_interface_png. This manipulation causes command injection. The attack is possible to be carried out remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-20 | |
| CVE-2026-4136 | 4.3 | MEDIUM | CWE-640 | 0.0% p7 | 3.01 | The Membership Plugin – Restrict Content plugin for WordPress is vulnerable to U...The Membership Plugin – Restrict Content plugin for WordPress is vulnerable to Unvalidated Redirect in all versions up to, and including, 3.2.24. This is due to insufficient validation on the redirect url supplied via the 'rcp_redirect' parameter. This makes it possible for unauthenticated attackers to redirect users with the password reset email to potentially malicious sites if they can successfully trick them into performing an action. |
2026-03-20 | |
| CVE-2026-4038 | 9.8 | CRITICAL | CWE-862 | 0.1% p22 | 6.86 | The Aimogen Pro plugin for WordPress is vulnerable to Arbitrary Function Call th...The Aimogen Pro plugin for WordPress is vulnerable to Arbitrary Function Call that can lead to privilege escalation due to a missing capability check on the 'aiomatic_call_ai_function_realtime' function in all versions up to, and including, 2.7.5. This makes it possible for unauthenticated attackers to call arbitrary WordPress functions such as 'update_option' to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site. |
2026-03-20 | |
| CVE-2026-32946 | 4.6 | MEDIUM | CWE-693 | 0.1% p24 | 3.22 | Harden-Runner is a CI/CD security agent that works like an EDR for GitHub Action...Harden-Runner is a CI/CD security agent that works like an EDR for GitHub Actions runners. In versions 2.15.1 and below, the Harden-Runner that allows bypass of the egress-policy: block network restriction using DNS queries over TCP. Egress policies are enforced on GitHub runners by filtering outbound connections at the network layer. When egress-policy: block is enabled with a restrictive allowed-endpoints list (e.g., only github.com:443), all non-compliant traffic should be denied. However, DNS queries over TCP, commonly used for large responses or fallback from UDP, are not adequately restricted. Tools like dig can explicitly initiate TCP-based DNS queries (+tcp flag) without being blocked. This vulnerability requires the attacker to already have code execution capabilities within the GitHub Actions workflow. The issue has been fixed in version 2.16.0. |
2026-03-20 | |
| CVE-2026-32945 | 8.4 | HIGH | CWE-122 | 0.1% p19 | 5.88 | PJSIP is a free and open source multimedia communication library written in C. V...PJSIP is a free and open source multimedia communication library written in C. Versions 2.16 and below have a Heap-based Buffer Overflowvulnerability in the DNS parser's name length handler. Thisimpacts applications using PJSIP's built-in DNS resolver, such as those configured with pjsua_config.nameserver or UaConfig.nameserver in PJSUA/PJSUA2. It does not affect users who rely on the OS resolver (e.g., getaddrinfo()) by not configuring a nameserver, or those using an external resolver via pjsip_resolver_set_ext_resolver(). This issue is fixed in version 2.17. For users unable to upgrade, a workaround is to disable DNS resolution in the PJSIP config (by setting nameserver_count to zero) or to use an external resolver implementation instead. |
2026-03-20 | |
| CVE-2026-32942 | 8.0 | HIGH | CWE-416 | 0.1% p16 | 5.60 | PJSIP is a free and open source multimedia communication library written in C. V...PJSIP is a free and open source multimedia communication library written in C. Versions 2.16 and below contain a heap use-after-free vulnerability in the ICE session that occurs when there are race conditions between session destruction and the callbacks. This issue has been fixed in version 2.17. |
2026-03-20 | |
| CVE-2026-32941 | 7.1 | HIGH | CWE-770 | 0.0% p14 | 4.97 | Sliver is a command and control framework that uses a custom Wireguard netstack....Sliver is a command and control framework that uses a custom Wireguard netstack. Versions 1.7.3 and below contain a Remote OOM (Out-of-Memory) vulnerability in the Sliver C2 server's mTLS and WireGuard C2 transport layer. The socketReadEnvelope and socketWGReadEnvelope functions trust an attacker-controlled 4-byte length prefix to allocate memory, with ServerMaxMessageSize allowing single allocations of up to ~2 GiB. A compromised implant or an attacker with valid credentials can exploit this by sending fabricated length prefixes over concurrent yamux streams (up to 128 per connection), forcing the server to attempt allocating ~256 GiB of memory and triggering an OS OOM kill. This crashes the Sliver server, disrupts all active implant sessions, and may degrade or kill other processes sharing the same host. The same pattern also affects all implant-side readers, which have no upper-bound check at all. The issue was not fixed at the the time of publication. |
2026-03-20 | |
| CVE-2026-32940 | 9.3 | CRITICAL | CWE-79 | 0.1% p18 | 6.51 | SiYuan is a personal knowledge management system. In versions 3.6.0 and below, S...SiYuan is a personal knowledge management system. In versions 3.6.0 and below, SanitizeSVG has an incomplete blocklist — it blocks data:text/html and data:image/svg+xml in href attributes but misses data:text/xml and data:application/xml, both of which can render SVG with JavaScript execution. The unauthenticated /api/icon/getDynamicIcon endpoint serves user-controlled input (via the content parameter) directly into SVG markup using fmt.Sprintf with no escaping, served as Content-Type: image/svg+xml. This creates a click-through XSS: a victim navigates to a crafted URL, sees an SVG with an injected link, and clicking it triggers JavaScript via the bypassed MIME types. The attack requires direct navigation to the endpoint or <object>/<embed> embedding, since <img> tag rendering in the frontend doesn't allow interactive links. This issue has been fixed in version 3.6.1. |
2026-03-20 | |
| CVE-2026-32939 | 7.7 | HIGH | CWE-178 | 0.1% p19 | 5.39 | DataEase is an open source data visualization analysis tool. Versions 2.10.19 an...DataEase is an open source data visualization analysis tool. Versions 2.10.19 and below have inconsistent Locale handling between the JDBC URL validation logic and the H2 JDBC engine's internal parsing. DataEase uses String.toUpperCase() without specifying an explicit Locale, causing its security checks to rely on the JVM's default runtime locale, while H2 JDBC always normalizes URLs using Locale.ENGLISH. In Turkish locale environments (tr_TR), Java converts the lowercase letter i to İ (dotted capital I) instead of the standard I, so a malicious parameter like iNIT becomes İNIT in DataEase's filter (bypassing its blacklist) while H2 still correctly interprets it as INIT. This discrepancy allows attackers to smuggle dangerous JDBC parameters past DataEase's security validation, and the issue has been confirmed as exploitable in real DataEase deployment scenarios running under affected regional settings. The issue has been fixed in version 2.10.20. |
2026-03-20 | |
| CVE-2026-32938 | 9.9 | CRITICAL | CWE-22 | 0.2% p44 | 6.94 | SiYuan is a personal knowledge management system. In versions 3.6.0 and below, t...SiYuan is a personal knowledge management system. In versions 3.6.0 and below, the /api/lute/html2BlockDOM on the desktop copies local files pointed to by file:// links in pasted HTML into the workspace assets directory without validating paths against a sensitive-path list. Together with GET /assets/*path, which only requires authentication, a publish-service visitor can cause the desktop kernel to copy any readable sensitive file and then read it via GET, leading to exfiltration of sensitive files. This issue has been fixed in version 3.6.1. |
2026-03-20 | |
| CVE-2026-32114 | 5.3 | MEDIUM | CWE-639 | 0.0% p8 | 3.71 | Discourse is an open-source discussion platform. Prior to versions 2026.3.0-late...Discourse is an open-source discussion platform. Prior to versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2, there is an Insecure Direct Object Reference (IDOR) vulnerability that allows any authenticated user to access metadata about AI personas, features, and LLM models by providing their identifiers. This information includes credit allocations and usage statistics which are not intended to be public. The attack is performed over the network, requires low privileges (any logged-in user), and results in a low impact on confidentiality with no impact on integrity or availability. Versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2 contain a patch. To work around this issue, disable AI plugin or upgrade to a patched version. |
2026-03-20 | |
| CVE-2026-4467 | 5.1 | MEDIUM | CWE-74 | 0.3% p55 | 3.58 | A vulnerability was found in Comfast CF-AC100 2.6.0.8. This impacts an unknown f...A vulnerability was found in Comfast CF-AC100 2.6.0.8. This impacts an unknown function of the file /cgi-bin/mbox-config?method=SET§ion=wireless_device_dissoc. The manipulation results in command injection. The attack can be executed remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-20 | |
| CVE-2026-33063 | 8.7 | HIGH | CWE-476 | 0.1% p31 | 6.09 | free5GC is an open source 5G core network. free5GC AUSF prior to version 1.4.2 h...free5GC is an open source 5G core network. free5GC AUSF prior to version 1.4.2 has is an Improper Null Check vulnerability leading to Denial of Service. All deployments of free5GC v4.0.1 using the AUSF UE authentication service (`/nausf-auth/v1/ue-authentications` endpoint) are affected. A remote attacker can cause the AUSF service to panic and crash by sending a crafted UE authentication request that triggers a nil interface conversion in the `GetSupiFromSuciSupiMap` function. This results in complete denial of service for the AUSF authentication service. The `GetSupiFromSuciSupiMap` function attempts to perform an interface conversion from `interface{}` to `*context.SuciSupiMap` without checking if the underlying value is nil. When `SuciSupiMap` is nil, the code panics with "interface conversion: interface {} is nil, not *context.SuciSupiMap". free5GC AUSF version 1.4.2 patches the issue. There is no direct workaround at the application level. The recommendation is to apply the provided patch or restrict access to the AUSF API to trusted sources only. |
2026-03-20 | |
| CVE-2026-33062 | 8.7 | HIGH | CWE-284 | 0.1% p16 | 6.09 | free5GC is an open source 5G core network. free5GC NRF prior to version 1.4.2 ha...free5GC is an open source 5G core network. free5GC NRF prior to version 1.4.2 has an Improper Input Validation vulnerability leading to Denial of Service. All deployments of free5GC using the NRF discovery service are affected. The `EncodeGroupId` function attempts to access array indices [0], [1], [2] without validating the length of the split data. When the parameter contains insufficient separator characters, the code panics with "index out of range". A remote attacker can cause the NRF service to panic and crash by sending a crafted HTTP GET request with a malformed `group-id-list` parameter. This results in complete denial of service for the NRF discovery service. free5GC NRF version 1.4.2 fixes the issue. There is no direct workaround at the application level. The recommendation is to apply the provided patch or restrict access to the NRF API to trusted sources only. |
2026-03-20 | |
| CVE-2026-32937 | 7.1 | HIGH | CWE-129 | 0.0% p13 | 4.97 | free5GC is an open source 5G core network. free5GC CHF prior to version 1.2.2 ha...free5GC is an open source 5G core network. free5GC CHF prior to version 1.2.2 has an out-of-bounds slice access vulnerability in the CHF `nchf-convergedcharging` service. A valid authenticated request to PUT `/nchf-convergedcharging/v3/recharging/:ueId?ratingGroup=...` can trigger a server-side panic in `github.com/free5gc/chf/internal/sbi.(*Server).RechargePut(...)` due to an out-of-range slice access. In the reported runtime, Gin recovery converts the panic into HTTP 500, but the recharge path remains remotely panic-triggerable and can be abused repeatedly to degrade recharge functionality and flood logs. In deployments without equivalent recovery handling, this panic may cause more severe service disruption. free5GC CHF patches the issue. Some workarounds are available: Restrict access to the `nchf-convergedcharging` recharge endpoint to strictly trusted NF callers only; apply rate limiting or network ACLs in front of the CHF SBI interface to reduce repeated panic-trigger attempts; if the recharge API is not required, temporarily disable or block external reachability to this route; and/or ensure panic recovery, monitoring, and alerting are enabled. |
2026-03-20 | |
| CVE-2026-32935 | 8.2 | HIGH | CWE-208 | 0.0% p2 | 5.74 | phpseclib is a PHP secure communications library. Projects using versions 1.0.26...phpseclib is a PHP secure communications library. Projects using versions 1.0.26 and below, 2.0.0 through 2.0.51, and 3.0.0 through 3.0.49 are vulnerable to a to padding oracle timing attack when using AES in CBC mode. This issue has been fixed in versions 1.0.27, 2.0.52 and 3.0.50. |
2026-03-20 | |
| CVE-2026-32933 | 7.5 | HIGH | CWE-674 | 0.1% p16 | 5.25 | AutoMapper is a convention-based object-object mapper in .NET. Versions prior to...AutoMapper is a convention-based object-object mapper in .NET. Versions prior to 15.1.1 and 16.1.1 are vulnerable to a Denial of Service (DoS) attack. When mapping deeply nested object graphs, the library uses recursive method calls without enforcing a default maximum depth limit. This allows an attacker to provide a specially crafted object graph that exhausts the thread's stack memory, triggering a `StackOverflowException` and causing the entire application process to terminate. Versions 15.1.1 and 16.1.1 fix the issue. |
2026-03-20 | |
| CVE-2026-32891 | 9.0 | CRITICAL | CWE-80 | 0.0% p4 | 6.30 | Anchorr is a Discord bot for requesting movies and TV shows and receiving notifi...Anchorr is a Discord bot for requesting movies and TV shows and receiving notifications when items are added to a media server. Versions 1.4.1 and below contain a stored XSS vulnerability in the Jellyseerr user selector. Jellyseerr allows any account holder to execute arbitrary JavaScript in the Anchorr admin's browser session. The injected script calls the authenticated /api/config endpoint - which returns the full application configuration in plaintext. This allows the attacker to forge a valid Anchorr session token and gain full admin access to the dashboard with no knowledge of the admin password. The same response also exposes the API keys and tokens for every integrated service, resulting in simultaneous account takeover of the Jellyfin media server (via JELLYFIN_API_KEY), the Jellyseerr request manager (via JELLYSEERR_API_KEY), and the Discord bot (via DISCORD_TOKEN). This issue has been fixed in version 1.4.2. |
2026-03-20 | |
| CVE-2026-32890 | 9.6 | CRITICAL | CWE-79 | 0.1% p23 | 6.72 | Anchorr is a Discord bot for requesting movies and TV shows and receiving notifi...Anchorr is a Discord bot for requesting movies and TV shows and receiving notifications when items are added to a media server. In versions 1.4.1 and below, a stored Cross-site Scripting (XSS) vulnerability in the web dashboard's User Mapping dropdown allows any unprivileged Discord user in the configured guild to execute arbitrary JavaScript in the Anchorr admin's browser. By chaining this with the GET /api/config endpoint (which returns all secrets in plaintext), an attacker can exfiltrate every credential stored in Anchorr which includes DISCORD_TOKEN, JELLYFIN_API_KEY, JELLYSEERR_API_KEY, JWT_SECRET, WEBHOOK_SECRET, and bcrypt password hashes without any authentication to Anchorr itself. This issue has been fixed in version 1.4.2. |
2026-03-20 | |
| CVE-2026-32889 | 6.5 | MEDIUM | CWE-835 | 0.0% p2 | 4.55 | tinytag is a Python library for reading audio file metadata. Version 2.2.0 allow...tinytag is a Python library for reading audio file metadata. Version 2.2.0 allows an attacker who can supply MP3 files for parsing to trigger a non-terminating loop while the library parses an ID3v2 SYLT (synchronized lyrics) frame. In server-side deployments that automatically parse attacker-supplied files, a single 498-byte MP3 can cause the parsing operation to stop making progress and remain busy until the worker or process is terminated. The root cause is that _parse_synced_lyrics assumes _find_string_end_pos always returns a position greater than the current offset. That assumption is false when no string terminator is present in the remaining frame content. This issue has been fixed in version 2.2.1. |
2026-03-20 | |
| CVE-2026-32888 | 8.8 | HIGH | CWE-89 | 0.0% p7 | 6.16 | Open Source Point of Sale is a web based point-of-sale application written in PH...Open Source Point of Sale is a web based point-of-sale application written in PHP using CodeIgniter framework. Versions contain an SQL Injection in the Items search functionality. When the custom attribute search feature is enabled (search_custom filter), user-supplied input from the search GET parameter is interpolated directly into a HAVING clause without parameterization or sanitization. This allows an authenticated attacker with basic item search permissions to execute arbitrary SQL queries. A patch did not exist at the time of publication. |
2026-03-20 | |
| CVE-2026-31869 | 5.3 | MEDIUM | CWE-200 | 0.0% p8 | 3.71 | Discourse is an open-source discussion platform. Prior to versions 2026.3.0-late...Discourse is an open-source discussion platform. Prior to versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2, the ComposerController#mentions endpoint reveals hidden group membership to any authenticated user who can message the group. By supplying allowed_names referencing a hidden-membership group and probing arbitrary usernames, an attacker can infer membership based on whether user_reasons returns "private" for a given user. This bypasses group member-visibility controls. Versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2 contain a patch. To work around this issue, restrict the messageable policy of any hidden-membership group to staff or group members only, so untrusted users cannot reach the vulnerable code path. |
2026-03-20 | |
| CVE-2026-31805 | 5.3 | MEDIUM | CWE-20 | 0.1% p26 | 3.71 | Discourse is an open-source discussion platform. Prior to versions 2026.3.0-late...Discourse is an open-source discussion platform. Prior to versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2, an authorization bypass in the poll plugin allowed authenticated users to vote on, remove votes from, or toggle the open/closed status of polls they did not have access to. By passing post_id as an array (e.g. post_id[]=&post_id[]=), the authorization check resolves to the accessible post while the poll lookup resolves to a different post's poll. This affects the vote, remove_vote, and toggle_status endpoints in DiscoursePoll::PollsController. Versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2 contain a patch. |
2026-03-20 | |
| CVE-2026-30891 | 5.3 | MEDIUM | CWE-200 | 0.0% p10 | 3.71 | Discourse is an open-source discussion platform. Prior to versions 2026.3.0-late...Discourse is an open-source discussion platform. Prior to versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2, a user could access another user's private activity due to insufficient authorization checks in the user actions endpoint. Versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2 contain a patch. |
2026-03-20 | |
| CVE-2026-30889 | 5.3 | MEDIUM | CWE-862 | 0.0% p8 | 3.71 | Discourse is an open-source discussion platform. Prior to versions 2026.3.0-late...Discourse is an open-source discussion platform. Prior to versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2, a moderator could exploit insufficient authorization checks to access metadata of posts they should not have permission to view. Versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2 contain a patch. |
2026-03-20 | |
| CVE-2026-30888 | 2.2 | LOW | CWE-269 | 0.0% p9 | 1.54 | Discourse is an open-source discussion platform. Versions prior to 2026.3.0-late...Discourse is an open-source discussion platform. Versions prior to 2026.3.0-latest.1, 2026.2.1, and 2026.1.2 allow a moderator to edit site policy documents (ToS, guidelines, privacy policy) that they are explicitly prohibited from modifying. Versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2 contain a patch. No known workarounds are available. |
2026-03-20 | |
| CVE-2026-21992 | 9.8 | CRITICAL | CWE-306 | 0.1% p18 | 6.86 | Vulnerability in the Oracle Identity Manager product of Oracle Fusion Middleware...Vulnerability in the Oracle Identity Manager product of Oracle Fusion Middleware (component: REST WebServices) and Oracle Web Services Manager product of Oracle Fusion Middleware (component: Web Services Security). Supported versions that are affected are 12.2.1.4.0 and 14.1.2.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Identity Manager and Oracle Web Services Manager. Successful attacks of this vulnerability can result in takeover of Oracle Identity Manager and Oracle Web Services Manager. Note: Oracle Web Services Manager is installed with an Oracle Fusion Middleware Infrastructure. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). |
2026-03-20 | |
| CVE-2026-4466 | 5.1 | MEDIUM | CWE-74 | 0.3% p55 | 3.58 | A vulnerability has been found in Comfast CF-AC100 2.6.0.8. This affects an unkn...A vulnerability has been found in Comfast CF-AC100 2.6.0.8. This affects an unknown function of the file /cgi-bin/mbox-config?method=SET§ion=ntp_timezone. The manipulation leads to command injection. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-20 | |
| CVE-2026-4465 | 5.3 | MEDIUM | CWE-77 | 0.1% p25 | 3.71 | A flaw has been found in D-Link DIR-513 1.10. The impacted element is an unknown...A flaw has been found in D-Link DIR-513 1.10. The impacted element is an unknown function of the file /goform/formSysCmd. Executing a manipulation of the argument sysCmd can lead to os command injection. The attack may be launched remotely. The exploit has been published and may be used. This vulnerability only affects products that are no longer supported by the maintainer. |
2026-03-20 | |
| CVE-2026-4464 | 8.8 | HIGH | CWE-472 | 0.1% p23 | 6.16 | Integer overflow in ANGLE in Google Chrome prior to 146.0.7680.153 allowed a rem...Integer overflow in ANGLE in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium) |
2026-03-20 | |
| CVE-2026-4463 | 8.8 | HIGH | CWE-122 | 0.1% p20 | 6.16 | Heap buffer overflow in WebRTC in Google Chrome prior to 146.0.7680.153 allowed ...Heap buffer overflow in WebRTC in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) |
2026-03-20 | |
| CVE-2026-4462 | 8.8 | HIGH | CWE-125 | 0.1% p23 | 6.16 | Out of bounds read in Blink in Google Chrome prior to 146.0.7680.153 allowed a r...Out of bounds read in Blink in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High) |
2026-03-20 | |
| CVE-2026-4461 | 8.8 | HIGH | NVD-CWE-noinfo | 0.1% p23 | 6.16 | Inappropriate implementation in V8 in Google Chrome prior to 146.0.7680.153 allo...Inappropriate implementation in V8 in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) |
2026-03-20 | |
| CVE-2026-4460 | 8.8 | HIGH | CWE-125 | 0.1% p23 | 6.16 | Out of bounds read in Skia in Google Chrome prior to 146.0.7680.153 allowed a re...Out of bounds read in Skia in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High) |
2026-03-20 | |
| CVE-2026-4459 | 8.8 | HIGH | CWE-125 | 0.1% p22 | 6.16 | Out of bounds read and write in WebAudio in Google Chrome prior to 146.0.7680.15...Out of bounds read and write in WebAudio in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) |
2026-03-20 | |
| CVE-2026-4458 | 8.8 | HIGH | CWE-416 | 0.0% p8 | 6.16 | Use after free in Extensions in Google Chrome prior to 146.0.7680.153 allowed an...Use after free in Extensions in Google Chrome prior to 146.0.7680.153 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension. (Chromium security severity: High) |
2026-03-20 | |
| CVE-2026-4457 | 8.8 | HIGH | CWE-843 | 0.1% p24 | 6.16 | Type Confusion in V8 in Google Chrome prior to 146.0.7680.153 allowed a remote a...Type Confusion in V8 in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) |
2026-03-20 | |
| CVE-2026-4456 | 8.8 | HIGH | CWE-416 | 0.1% p29 | 6.16 | Use after free in Digital Credentials API in Google Chrome prior to 146.0.7680.1...Use after free in Digital Credentials API in Google Chrome prior to 146.0.7680.153 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High) |
2026-03-20 | |
| CVE-2026-4455 | 8.8 | HIGH | CWE-122 | 0.1% p22 | 6.16 | Heap buffer overflow in PDFium in Google Chrome prior to 146.0.7680.153 allowed ...Heap buffer overflow in PDFium in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: High) |
2026-03-20 | |
| CVE-2026-4454 | 8.8 | HIGH | CWE-416 | 0.1% p29 | 6.16 | Use after free in Network in Google Chrome prior to 146.0.7680.153 allowed a rem...Use after free in Network in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) |
2026-03-20 | |
| CVE-2026-4453 | 4.3 | MEDIUM | CWE-472 | 0.0% p8 | 3.01 | Integer overflow in Dawn in Google Chrome on Mac prior to 146.0.7680.153 allowed...Integer overflow in Dawn in Google Chrome on Mac prior to 146.0.7680.153 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: High) |
2026-03-20 | |
| CVE-2026-4452 | 8.8 | HIGH | CWE-472 | 0.1% p23 | 6.16 | Integer overflow in ANGLE in Google Chrome on Windows prior to 146.0.7680.153 al...Integer overflow in ANGLE in Google Chrome on Windows prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) |
2026-03-20 | |
| CVE-2026-4451 | 8.8 | HIGH | CWE-20 | 0.1% p30 | 6.16 | Insufficient validation of untrusted input in Navigation in Google Chrome prior ...Insufficient validation of untrusted input in Navigation in Google Chrome prior to 146.0.7680.153 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High) |
2026-03-20 | |
| CVE-2026-4450 | 8.8 | HIGH | CWE-787 | 0.1% p27 | 6.16 | Out of bounds write in V8 in Google Chrome prior to 146.0.7680.153 allowed a rem...Out of bounds write in V8 in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) |
2026-03-20 | |
| CVE-2026-4449 | 8.8 | HIGH | CWE-416 | 0.1% p29 | 6.16 | Use after free in Blink in Google Chrome prior to 146.0.7680.153 allowed a remot...Use after free in Blink in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) |
2026-03-20 | |
| CVE-2026-4448 | 8.8 | HIGH | CWE-122 | 0.1% p22 | 6.16 | Heap buffer overflow in ANGLE in Google Chrome prior to 146.0.7680.153 allowed a...Heap buffer overflow in ANGLE in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) |
2026-03-20 | |
| CVE-2026-4447 | 8.8 | HIGH | NVD-CWE-noinfo | 0.1% p26 | 6.16 | Inappropriate implementation in V8 in Google Chrome prior to 146.0.7680.153 allo...Inappropriate implementation in V8 in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High) |
2026-03-20 | |
| CVE-2026-4446 | 8.8 | HIGH | CWE-416 | 0.1% p27 | 6.16 | Use after free in WebRTC in Google Chrome prior to 146.0.7680.153 allowed a remo...Use after free in WebRTC in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) |
2026-03-20 | |
| CVE-2026-4445 | 8.8 | HIGH | CWE-416 | 0.1% p27 | 6.16 | Use after free in WebRTC in Google Chrome prior to 146.0.7680.153 allowed a remo...Use after free in WebRTC in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) |
2026-03-20 | |
| CVE-2026-4444 | 8.8 | HIGH | CWE-121 | 0.1% p20 | 6.16 | Stack buffer overflow in WebRTC in Google Chrome prior to 146.0.7680.153 allowed...Stack buffer overflow in WebRTC in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit stack corruption via a crafted HTML page. (Chromium security severity: High) |
2026-03-20 | |
| CVE-2026-4443 | 8.8 | HIGH | CWE-122 | 0.1% p22 | 6.16 | Heap buffer overflow in WebAudio in Google Chrome prior to 146.0.7680.153 allowe...Heap buffer overflow in WebAudio in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High) |
2026-03-20 | |
| CVE-2026-4442 | 8.8 | HIGH | CWE-122 | 0.1% p22 | 6.16 | Heap buffer overflow in CSS in Google Chrome prior to 146.0.7680.153 allowed a r...Heap buffer overflow in CSS in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) |
2026-03-20 | |
| CVE-2026-4441 | 8.8 | HIGH | CWE-416 | 0.1% p29 | 6.16 | Use after free in Base in Google Chrome prior to 146.0.7680.153 allowed a remote...Use after free in Base in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical) |
2026-03-20 | |
| CVE-2026-4440 | 8.8 | HIGH | CWE-125 | 0.1% p22 | 6.16 | Out of bounds read and write in WebGL in Google Chrome prior to 146.0.7680.153 a...Out of bounds read and write in WebGL in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: Critical) |
2026-03-20 | |
| CVE-2026-4439 | 8.8 | HIGH | CWE-125 | 0.1% p22 | 6.16 | Out of bounds memory access in WebGL in Google Chrome on Android prior to 146.0....Out of bounds memory access in WebGL in Google Chrome on Android prior to 146.0.7680.153 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical) |
2026-03-20 | |
| CVE-2026-32881 | 5.3 | MEDIUM | CWE-183 | 0.2% p40 | 3.72 | ewe is a Gleam web server. ewe is a Gleam web server. Versions 0.6.0 through 3.0...ewe is a Gleam web server. ewe is a Gleam web server. Versions 0.6.0 through 3.0.4 are vulnerable to authentication bypass or spoofed proxy-trust headers. Chunked transfer encoding trailer handling merges declared trailer fields into req.headers after body parsing, but the denylist only blocks 9 header names. A malicious client can exploit this by declaring these headers in the Trailer field and appending them after the final chunk, causing request.set_header to overwrite legitimate values (e.g., those set by a reverse proxy). This enables attackers to forge authentication credentials, hijack sessions, bypass IP-based rate limiting, or spoof proxy-trust headers in any downstream middleware that reads headers after ewe.read_body is called. This issue has been fixed in version 3.0.5. |
2026-03-20 | |
| CVE-2026-32880 | 6.4 | MEDIUM | CWE-79 | 0.0% p12 | 4.48 | ChurchCRM is an open-source church management system. Versions prior to 7.0.2 al...ChurchCRM is an open-source church management system. Versions prior to 7.0.2 allow an admin user to edit JSON type system settings to store a JavaScript payload that can execute when any admin views the system settings. The JSON input is left unescaped/unsanitized in SystemSettings.php, leading to XSS. This issue has been fixed in version 7.0.2. |
2026-03-20 | |
| CVE-2026-32875 | 7.5 | HIGH | CWE-190 | 0.0% p14 | 5.25 | UltraJSON is a fast JSON encoder and decoder written in pure C with bindings for...UltraJSON is a fast JSON encoder and decoder written in pure C with bindings for Python 3.7+. Versions 5.10 through 5.11.0 are vulnerable to buffer overflow or infinite loop through large indent handling. ujson.dumps() crashes the Python interpreter (segmentation fault) when the product of the indent parameter and the nested depth of the input exceeds INT32_MAX. It can also get stuck in an infinite loop if the indent is a large negative number. Both are caused by an integer overflow/underflow whilst calculating how much memory to reserve for indentation. And both can be used to achieve denial of service. To be vulnerable, a service must call ujson.dump()/ujson.dumps()/ujson.encode() whilst giving untrusted users control over the indent parameter and not restrict that indentation to reasonably small non-negative values. A service may also be vulnerable to the infinite loop if it uses a fixed negative indent. An underflow always occurs for any negative indent when the input data is at least one level nested but, for small negative indents, the underflow is usually accidentally rectified by another overflow. This issue has been fixed in version 5.12.0. |
2026-03-20 | |
| CVE-2026-32874 | 7.5 | HIGH | CWE-401 | 0.1% p20 | 5.25 | UltraJSON is a fast JSON encoder and decoder written in pure C with bindings for...UltraJSON is a fast JSON encoder and decoder written in pure C with bindings for Python 3.7+. Versions 5.4.0 through 5.11.0 contain an accumulating memory leak in JSON parsing large (outside of the range [-2^63, 2^64 - 1]) integers. The leaked memory is a copy of the string form of the integer plus an additional NULL byte. The leak occurs irrespective of whether the integer parses successfully or is rejected due to having more than sys.get_int_max_str_digits() digits, meaning that any sized leak per malicious JSON can be achieved provided that there is no limit on the overall size of the payload. Any service that calls ujson.load()/ujson.loads()/ujson.decode() on untrusted inputs is affected and vulnerable to denial of service attacks. This issue has been fixed in version 5.12.0. |
2026-03-20 | |
| CVE-2026-32873 | 7.5 | HIGH | CWE-825 | 0.0% p3 | 5.25 | ewe is a Gleam web server. Versions 0.8.0 through 3.0.4 contain a bug in the han...ewe is a Gleam web server. Versions 0.8.0 through 3.0.4 contain a bug in the handle_trailers function where rejected trailer headers (forbidden or undeclared) cause an infinite loop. When handle_trailers encounters such a trailer, three code paths (lines 520, 523, 526) recurse with the original buffer (rest) instead of advancing past the rejected header (Buffer(header_rest, 0)), causing decoder.decode_packet to re-parse the same header on every iteration. The resulting loop has no timeout or escape — the BEAM process permanently wedges at 100% CPU. Any application that calls ewe.read_body on chunked requests is affected, and this is exploitable by any unauthenticated remote client before control returns to application code, making an application-level workaround impossible. This issue is fixed in version 3.0.5. |
2026-03-20 | |
| CVE-2026-32817 | 9.1 | CRITICAL | CWE-862 | 0.1% p32 | 6.37 | Admidio is an open-source user management solution. In versions 5.0.0 through 5....Admidio is an open-source user management solution. In versions 5.0.0 through 5.0.6, the documents and files module does not verify whether the current user has permission to delete folders or files. The folder_delete and file_delete action handlers in modules/documents-files.php only perform a VIEW authorization check (getFolderForDownload / getFileForDownload) before calling delete(), and they never validate a CSRF token. Because the target UUIDs are read from $_GET, deletion can be triggered by a plain HTTP GET request. When the module is in public mode (documents_files_module_enabled = 1) and a folder is marked public (fol_public = true), an unauthenticated attacker can permanently destroy the entire document library. Even when the module requires login, any user with view-only access can delete content they are only permitted to read. This issue has been fixed in version 5.0.7. |
2026-03-20 | |
| CVE-2026-32813 | 8.0 | HIGH | CWE-89 | 0.0% p8 | 5.60 | Admidio is an open-source user management solution. Versions 5.0.6 and below are...Admidio is an open-source user management solution. Versions 5.0.6 and below are vulnerable to arbitrary SQL Injection through the MyList configuration feature. The MyList configuration feature lets authenticated users define custom list column layouts, storing user-supplied column names, sort directions, and filter conditions in the adm_list_columns table via prepared statements. However, these stored values are later read back and interpolated directly into dynamically constructed SQL queries without sanitization or parameterization, creating a classic second-order SQL injection vulnerability (safe write, unsafe read). An attacker can exploit this to inject arbitrary SQL, potentially reading, modifying, or deleting any data in the database and achieving full database compromise. This issue has been fixed in version 5.0.7. |
2026-03-20 | |
| CVE-2026-32812 | 6.8 | MEDIUM | CWE-918 | 0.0% p12 | 4.76 | Admidio is an open-source user management solution. In versions 5.0.0 through 5....Admidio is an open-source user management solution. In versions 5.0.0 through 5.0.6, unrestricted URL fetch in the SSO Metadata API can result in SSRF and local file reads. The SSO Metadata fetch endpoint at modules/sso/fetch_metadata.php accepts an arbitrary URL via $_GET['url'], validates it only with PHP's FILTER_VALIDATE_URL, and passes it directly to file_get_contents(). FILTER_VALIDATE_URL accepts file://, http://, ftp://, data://, and php:// scheme URIs. An authenticated administrator can use this endpoint to read arbitrary local files via the file:// wrapper (Local File Read), reach internal services via http:// (SSRF), or fetch cloud instance metadata. The full response body is returned verbatim to the caller. This issue has been fixed in version 5.0.7. |
2026-03-20 | |
| CVE-2026-32811 | 8.2 | HIGH | CWE-116 | 0.0% p8 | 5.74 | Heimdall is a cloud native Identity Aware Proxy and Access Control Decision serv...Heimdall is a cloud native Identity Aware Proxy and Access Control Decision service. When using Heimdall in envoy gRPC decision API mode with versions 0.7.0-alpha through 0.17.10, wrong encoding of the query URL string allows rules with non-wildcard path expressions to be bypassed. Envoy splits the requested URL into parts, and sends the parts individually to Heimdall. Although query and path are present in the API, the query field is documented to be always empty and the URL query is included in the path field. The implementation uses go's url library to reconstruct the url which automatically encodes special characters in the path. As a consequence, a parameter like /mypath?foo=bar to Path is escaped into /mypath%3Ffoo=bar. Subsequently, a rule matching /mypath no longer matches and is bypassed. The issue can only lead to unintended access if Heimdall is configured with an "allow all" default rule. Since v0.16.0, Heimdall enforces secure defaults and refuses to start with such a configuration unless this enforcement is explicitly disabled, e.g. via --insecure-skip-secure-default-rule-enforcement or the broader --insecure flag. This issue has been fixed in version 0.17.11. |
2026-03-20 | |
| CVE-2026-32808 | 8.1 | HIGH | CWE-22 | 0.1% p25 | 5.67 | pyLoad is a free and open-source download manager written in Python. Versions be...pyLoad is a free and open-source download manager written in Python. Versions before 0.5.0b3.dev97 are vulnerable to path traversal during password verification of certain encrypted 7z archives (encrypted files with non-encrypted headers), causing arbitrary file deletion outside of the extraction directory. During password verification, pyLoad derives an archive entry name from 7z listing output and treats it as a filesystem path without constraining it to the extraction directory. This issue has been fixed in version 0.5.0b3.dev97. |
2026-03-20 | |
| CVE-2026-32711 | 7.8 | HIGH | CWE-22 | 0.0% p0 | 5.46 | pydicom is a pure Python package for working with DICOM files. Versions 2.0.0-rc...pydicom is a pure Python package for working with DICOM files. Versions 2.0.0-rc.1 through 3.0.1 are vulnerable to Path Traversal through a maliciously crafted DICOMDIR ReferencedFileID when it is set to a path outside the File-set root. pydicom resolves the path only to confirm that it exists, but does not verify that the resolved path remains under the File-set root. Subsequent public FileSet operations such as copy(), write(), and remove()+write(use_existing=True) use that unchecked path in file I/O operations. This allows arbitrary file read/copy and, in some flows, move/delete outside the File-set root. This issue has been fixed in version 3.0.2. |
2026-03-20 | |
| CVE-2026-32829 | 8.2 | HIGH | CWE-201 | 0.0% p2 | 5.74 | lz4_flex is a pure Rust implementation of LZ4 compression/decompression. In vers...lz4_flex is a pure Rust implementation of LZ4 compression/decompression. In versions 0.11.5 and below, and 0.12.0, decompressing invalid LZ4 data can leak sensitive information from uninitialized memory or from previous decompression operations. The library fails to properly validate offset values during LZ4 "match copy operations," allowing out-of-bounds reads from the output buffer. The block-based API functions (`decompress_into`, `decompress_into_with_dict`, and others when `safe-decode` is disabled) are affected, while all frame APIs are unaffected. The impact is potential exposure of sensitive data and secrets through crafted or malformed LZ4 input. This issue has been fixed in versions 0.11.6 and 0.12.1. |
2026-03-20 | |
| CVE-2026-32828 | 2.0 | LOW | CWE-918 | 0.0% p8 | 1.40 | Kargo manages and automates the promotion of software artifacts. In versions 1.4...Kargo manages and automates the promotion of software artifacts. In versions 1.4.0 through 1.6.3, 1.7.0-rc.1 through 1.7.8, 1.8.0-rc.1 through 1.8.11, and 1.9.0-rc.1 through 1.9.4, the http and http-download promotion steps allow Server-Side Request Forgery (SSRF) against link-local addresses, most critically the cloud instance metadata endpoint (169.254.169.254), enabling exfiltration of sensitive data such as IAM credentials. These steps provide full control over request headers and methods, rendering cloud provider header-based SSRF mitigations ineffective. An authenticated attacker with permissions to create/update Stages or craft Promotion resources can exploit this by submitting a malicious Promotion manifest, with response data retrievable via Promotion status fields, Git repositories, or a second http step. This issue has been fixed in versions 1.6.4, 1.7.9, 1.8.12 and 1.9.5. |
2026-03-20 | |
| CVE-2026-32771 | 8.8 | HIGH | CWE-22 | 0.0% p5 | 6.16 | The CTFer.io Monitoring component is in charge of the collection, process and st...The CTFer.io Monitoring component is in charge of the collection, process and storage of various signals (i.e. logs, metrics and distributed traces). In versions prior to 0.2.2, the sanitizeArchivePath function in pkg/extract/extract.go (lines 248–254) is vulnerable to Path Traversal due to a missing trailing path separator in the strings.HasPrefix check. The extractor allows arbitrary file writes (e.g., overwriting shell configs, SSH keys, kubeconfig, or crontabs), enabling RCE and persistent backdoors. The attack surface is further amplified by the default ReadWriteMany PVC access mode, which lets any pod in the cluster inject a malicious payload. This issue has been fixed in version 0.2.2. |
2026-03-20 | |
| CVE-2026-32769 | 7.1 | HIGH | CWE-284 | 0.1% p15 | 4.97 | Fullchain is an umbrella project for deploying a ready-to-use CTF platform. In v...Fullchain is an umbrella project for deploying a ready-to-use CTF platform. In versions prior to 0.1.1, due to a mis-written NetworkPolicy, a malicious actor can pivot from a subverted application to any Pod out of the origin namespace. The flawed inter-ns NetworkPolicy breaks the security-by-default property expected as part of the deployment program, leading to a potential lateral movement. This issue has been fixed in version 0.1.1. To workaround, delete the failing network policy that should be prefixed by inter-ns- in the target namespace. |
2026-03-20 | |
| CVE-2026-32767 | 9.8 | CRITICAL | CWE-89 | 0.0% p5 | 6.86 | SiYuan is a personal knowledge management system. Versions 3.6.0 and below conta...SiYuan is a personal knowledge management system. Versions 3.6.0 and below contain an authorization bypass vulnerability in the /api/search/fullTextSearchBlock endpoint. When the method parameter is set to 2, the endpoint passes user-supplied input directly as a raw SQL statement to the underlying SQLite database without any authorization or read-only checks. This allows any authenticated user — including those with the Reader role — to execute arbitrary SQL statements (SELECT, DELETE, UPDATE, DROP TABLE, etc.) against the application's database. This is inconsistent with the application's own security model: the dedicated SQL endpoint (/api/query/sql) correctly requires both CheckAdminRole and CheckReadonly middleware, but the search endpoint bypasses these controls entirely. This issue has been fixed in version 3.6.1. |
2026-03-20 | |
| CVE-2026-33289 | 8.8 | HIGH | CWE-90 | 0.2% p45 | 6.17 | SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (C...SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (CRM) software application. Prior to versions 7.15.1 and 8.9.3, an LDAP Injection vulnerability exists in the SuiteCRM authentication flow. The application fails to properly sanitize user-supplied input before embedding it into the LDAP search filter. By injecting LDAP control characters, an unauthenticated attacker can manipulate the query logic, which can lead to authentication bypass or information disclosure. Versions 7.15.1 and 8.9.3 patch the issue. |
2026-03-20 | |
| CVE-2026-33288 | 8.8 | HIGH | CWE-89 | 0.1% p15 | 6.16 | SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (C...SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (CRM) software application. Prior to versions 7.15.1 and 8.9.3, a SQL Injection vulnerability exists in the SuiteCRM authentication mechanisms when directory support is enabled. The application fails to properly sanitize the user-supplied username before using it in a local database query. An attacker with valid, low-privilege directory credentials can exploit this to execute arbitrary SQL commands, leading to complete privilege escalation (e.g., logging in as the CRM Administrator). Versions 7.15.1 and 8.9.3 patch the issue. |
2026-03-20 | |
| CVE-2026-32985 | 9.3 | CRITICAL | CWE-306 | 0.8% p73 | 6.53 | Xerte Online Toolkits versions 3.14 and earlier contain an unauthenticated arbit...Xerte Online Toolkits versions 3.14 and earlier contain an unauthenticated arbitrary file upload vulnerability in the template import functionality that allows remote attackers to execute arbitrary code by uploading a crafted ZIP archive containing malicious PHP payloads. Attackers can bypass authentication checks in the import.php file to upload a template archive with PHP code in the media directory, which gets extracted to a web-accessible path where the malicious PHP can be directly accessed and executed under the web server context. |
2026-03-20 | |
| CVE-2026-32766 | 1.7 | LOW | CWE-436 | 0.0% p5 | 1.19 | astral-tokio-tar is a tar archive reading/writing library for async Rust. In ver...astral-tokio-tar is a tar archive reading/writing library for async Rust. In versions 0.5.6 and earlier, malformed PAX extensions were silently skipped when parsing tar archives. This silent skipping (rather than rejection) of invalid PAX extensions could be used as a building block for a parser differential, for example by silently skipping a malformed GNU “long link” extension so that a subsequent parser would misinterpret the extension. In practice, exploiting this behavior in astral-tokio-tar requires a secondary misbehaving tar parser, i.e. one that insufficiently validates malformed PAX extensions and interprets them rather than skipping or erroring on them. This vulnerability is considered low-severity as it requires a separate vulnerability against any unrelated tar parser. This issue has been fixed in version 0.6.0. |
2026-03-20 | |
| CVE-2026-32765 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: This repository is no longer public.Rejected reason: This repository is no longer public. |
2026-03-20 | |
| CVE-2026-32764 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: This repository is no longer public.Rejected reason: This repository is no longer public. |
2026-03-20 | |
| CVE-2026-32763 | 8.2 | HIGH | CWE-89 | 0.0% p3 | 5.74 | Kysely is a type-safe TypeScript SQL query builder. Versions up to and including...Kysely is a type-safe TypeScript SQL query builder. Versions up to and including 0.28.11 has a SQL injection vulnerability in JSON path compilation for MySQL and SQLite dialects. The `visitJSONPathLeg()` function appends user-controlled values from `.key()` and `.at()` directly into single-quoted JSON path string literals (`'$.key'`) without escaping single quotes. An attacker can break out of the JSON path string context and inject arbitrary SQL. This is inconsistent with `sanitizeIdentifier()`, which properly doubles delimiter characters for identifiers — both are non-parameterizable SQL constructs requiring manual escaping, but only identifiers are protected. Version 0.28.12 fixes the issue. |
2026-03-20 | |
| CVE-2026-32761 | 6.5 | MEDIUM | CWE-284 | 0.0% p1 | 4.55 | File Browser is a file managing interface for uploading, deleting, previewing, r...File Browser is a file managing interface for uploading, deleting, previewing, renaming, and editing files within a specified directory. Versions 2.61.0 and below contain a permission enforcement bypass which allows users who are denied download privileges (perm.download = false) but granted share privileges (perm.share = true) to exfiltrate file content by creating public share links. While the direct raw download endpoint (/api/raw/) correctly enforces the download permission, the share creation endpoint only checks Perm.Share, and the public download handler (/api/public/dl/<hash>) serves file content without verifying that the original file owner has download permission. This means any authenticated user with share access can circumvent download restrictions by sharing a file and then retrieving it via the unauthenticated public download URL. The vulnerability undermines data-loss prevention and role-separation policies, as restricted users can publicly distribute files they are explicitly blocked from downloading directly. This issue has been fixed in version 2.62.0. |
2026-03-20 | |
| CVE-2026-32760 | 10.0 | CRITICAL | CWE-269 | 0.0% p4 | 7.00 | File Browser is a file managing interface for uploading, deleting, previewing, r...File Browser is a file managing interface for uploading, deleting, previewing, renaming, and editing files within a specified directory. In versions 2.61.2 and below, any unauthenticated visitor can register a full administrator account when self-registration (signup = true) is enabled and the default user permissions have perm.admin = true. The signup handler blindly applies all default settings (including Perm.Admin) to the new user without any server-side guard that strips admin from self-registered accounts. The signupHandler is supposed to create unprivileged accounts for new visitors. It contains no explicit user.Perm.Admin = false reset after applying defaults. If an administrator (intentionally or accidentally) configures defaults.perm.admin = true and also enables signup, every account created via the public registration endpoint is an administrator with full control over all files, users, and server settings. This issue has been resolved in version 2.62.0. |
2026-03-20 | |
| CVE-2026-32759 | 5.3 | MEDIUM | CWE-190 | 0.2% p40 | 3.72 | File Browser is a file managing interface for uploading, deleting, previewing, r...File Browser is a file managing interface for uploading, deleting, previewing, renaming, and editing files within a specified directory. In versions 2.61.2 and below, the TUS resumable upload handler parses the Upload-Length header as a signed 64-bit integer without validating that the value is non-negative, allowing an authenticated user to supply a negative value that instantly satisfies the upload completion condition upon the first PATCH request. This causes the server to fire after_upload exec hooks with empty or partial files, enabling an attacker to repeatedly trigger any configured hook with arbitrary filenames and zero bytes written. The impact ranges from DoS through expensive processing hooks, to command injection amplification when combined with malicious filenames, to abuse of upload-driven workflows like S3 ingestion or database inserts. Even without exec hooks enabled, the negative Upload-Length creates inconsistent cache entries where files are marked complete but contain no data. All deployments using the TUS upload endpoint (/api/tus) are affected, with the enableExec flag escalating the impact from cache inconsistency to remote command execution. At the time of publication, no patch or mitigation was available to address this issue. |
2026-03-20 | |
| CVE-2026-32758 | 6.5 | MEDIUM | CWE-22 | 0.0% p2 | 4.55 | File Browser is a file managing interface for uploading, deleting, previewing, r...File Browser is a file managing interface for uploading, deleting, previewing, renaming, and editing files within a specified directory. Versions 2.61.2 and below are vulnerable to Path Traversal through the resourcePatchHandler (http/resource.go). The destination path in resourcePatchHandler is validated against access rules before being cleaned/normalized, while the actual file operation calls path.Clean() afterward—resolving .. sequences into a different effective path. This allows an authenticated user with Create or Rename permissions to bypass administrator-configured deny rules (both prefix-based and regex-based) by injecting .. sequences in the destination parameter of a PATCH request. As a result, the user can write or move files into any deny-rule-protected path within their scope. However, this cannot be used to escape the user's BasePathFs scope or read from restricted paths. This issue has been fixed in version 2.62.0. |
2026-03-20 | |
| CVE-2026-32757 | 5.4 | MEDIUM | CWE-79 | 0.0% p1 | 3.78 | Admidio is an open-source user management solution. In versions 5.0.6 and below,...Admidio is an open-source user management solution. In versions 5.0.6 and below, the eCard send handler uses a raw $_POST['ecard_message'] value instead of the HTMLPurifier-sanitized $formValues['ecard_message'] when constructing the greeting card HTML. This allows an authenticated attacker to inject arbitrary HTML and JavaScript into greeting card emails sent to other members, bypassing the server-side HTMLPurifier sanitization that is properly applied to the ecard_message field during form validation. An attack can result in any member or role receiving phishing content that appears legitimate, crossing from the web application into recipients' email clients. This issue has been fixed in version 5.0.7. |
2026-03-20 | |
| CVE-2026-32756 | 8.8 | HIGH | CWE-434 | 0.0% p10 | 6.16 | Admidio is an open-source user management solution. Versions 5.0.6 and below con...Admidio is an open-source user management solution. Versions 5.0.6 and below contain a critical unrestricted file upload vulnerability in the Documents & Files module. Due to a design flaw in how CSRF token validation and file extension verification interact within UploadHandlerFile.php, an authenticated user with upload permissions can bypass file extension restrictions by intentionally submitting an invalid CSRF token. This allows the upload of arbitrary file types, including PHP scripts, which may lead to Remote Code Execution on the server, resulting in full server compromise, data exfiltration, and lateral movement. This issue has been fixed in version 5.0.7. |
2026-03-20 | |
| CVE-2026-32697 | 6.5 | MEDIUM | CWE-639 | 0.0% p9 | 4.55 | SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (C...SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (CRM) software application. Prior to versions 8.9.3, the `RecordHandler::getRecord()` method retrieves any record by module and ID without checking the current user's ACL view permission. The companion `saveRecord()` method correctly checks `$bean->ACLAccess('save')`, but `getRecord()` skips the equivalent `ACLAccess('view')` check. Version 8.9.3 patches the issue. |
2026-03-20 | |
| CVE-2026-29189 | 8.1 | HIGH | CWE-639 | 0.0% p9 | 5.67 | SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (C...SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (CRM) software application. Prior to versions 7.15.1 and 8.9.3, the SuiteCRM REST API V8 has missing ACL (Access Control List) checks on several endpoints, allowing authenticated users to access and manipulate data they should not have permission to interact with. Versions 7.15.1 and 8.9.3 patch the issue. |
2026-03-20 | |
| CVE-2026-29109 | 8.6 | HIGH | CWE-502 | 0.1% p25 | 6.02 | SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (C...SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (CRM) software application. Versions up to and including 8.9.2 contain an unsafe deserialization vulnerability in the SavedSearch filter processing component that allows an authenticated administrator to execute arbitrary system commands on the server. `FilterDefinitionProvider.php` calls `unserialize()` on user-controlled data from the `saved_search.contents` database column without restricting instantiable classes. Version 8.9.3 patches the issue. |
2026-03-20 | |
| CVE-2026-29108 | 6.5 | MEDIUM | CWE-200 | 0.0% p10 | 4.55 | SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (C...SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (CRM) software application. Prior to versions 8.9.3, an authenticated API endpoint allows any user to retrieve detailed information about any other user, including their password hash, username, and MFA configuration. As any authenticated user can query this endpoint, it's possible to retrieve and potentially crack the passwords of administrative users. Version 8.9.3 patches the issue. |
2026-03-20 | |
| CVE-2026-22737 | 5.9 | MEDIUM | CWE-22 | 0.1% p19 | 4.13 | Use of Java scripting engine enabled (e.g. JRuby, Jython) template views in Spri...Use of Java scripting engine enabled (e.g. JRuby, Jython) template views in Spring MVC and Spring WebFlux applications can result in disclosure of content from files outside the configured locations for script template views. This issue affects Spring Framework: from 7.0.0 through 7.0.5, from 6.2.0 through 6.2.16, from 6.1.0 through 6.1.25, from 5.3.0 through 5.3.46. |
2026-03-20 | |
| CVE-2026-22735 | 2.6 | LOW | CWE-667 | 0.0% p7 | 1.82 | Spring MVC and WebFlux applications are vulnerable to stream corruption when usi...Spring MVC and WebFlux applications are vulnerable to stream corruption when using Server-Sent Events (SSE). This issue affects Spring Foundation: from 7.0.0 through 7.0.5, from 6.2.0 through 6.2.16, from 6.1.0 through 6.1.25, from 5.3.0 through 5.3.46. |
2026-03-20 | |
| CVE-2026-22733 | 8.2 | HIGH | CWE-288 | 0.1% p16 | 5.74 | Spring Boot applications with Actuator can be vulnerable to an "Authentication B...Spring Boot applications with Actuator can be vulnerable to an "Authentication Bypass" vulnerability when an application endpoint that requires authentication is declared under the path used by the CloudFoundry Actuator endpoints. This issue affects Spring Security: from 4.0.0 through 4.0.3, from 3.5.0 through 3.5.11, from 3.4.0 through 3.4.14, from 3.3.0 through 3.3.17, from 2.7.0 through 2.7.31. |
2026-03-20 | |
| CVE-2026-3948 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering...Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. |
2026-03-19 | |
| CVE-2026-33408 | 2.2 | LOW | CWE-862 | 0.0% p8 | 1.54 | Discourse is an open-source discussion platform. Prior to versions 2026.3.0-late...Discourse is an open-source discussion platform. Prior to versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2, moderators were able to see the first 40 characters of post edits in PMs and private categories. Versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2 contain a patch. No known workarounds are available. |
2026-03-19 | |
| CVE-2026-33395 | 4.4 | MEDIUM | CWE-79 | 0.0% p11 | 3.08 | Discourse is an open-source discussion platform. Prior to versions 2026.3.0-late...Discourse is an open-source discussion platform. Prior to versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2, the discourse-graphviz plugin contains a stored cross-site scripting (XSS) vulnerability that allows authenticated users to inject malicious JavaScript code through DOT graph definitions. For instances with CSP disabled only. Versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2 contain a patch. As a workaround, disable the graphviz plugin, upgrade to a patched version, or enable a content security policy. |
2026-03-19 | |
| CVE-2026-32818 | 6.5 | MEDIUM | CWE-862 | 0.0% p9 | 4.55 | Admidio is an open-source user management solution. In versions 5.0.0 through 5....Admidio is an open-source user management solution. In versions 5.0.0 through 5.0.6, the forum module in Admidio does not verify whether the current user has permission to delete forum topics or posts. Both the topic_delete and post_delete actions in forum.php only validate the CSRF token but perform no authorization check before calling delete(). Any authenticated user with forum access can delete any topic (with all its posts) or any individual post by providing its UUID. This is inconsistent with the save/edit operations, which properly check isAdministratorForum() and ownership before allowing modifications. Any logged-in user can permanently and irreversibly delete any forum topic (including all its posts) or any individual post by simply knowing its UUID (which is publicly visible in URLs), completely bypassing authorization checks. This issue has been fixed in version 5.0.7. |
2026-03-19 | |
| CVE-2026-32816 | 5.7 | MEDIUM | CWE-352 | 0.0% p3 | 3.99 | Admidio is an open-source user management solution. In versions 5.0.0 through 5....Admidio is an open-source user management solution. In versions 5.0.0 through 5.0.6, the delete, activate, and deactivate modes in modules/groups-roles/groups_roles.php perform destructive state changes on organizational roles but never validate an anti-CSRF token. The client-side UI passes a CSRF token to callUrlHideElement(), which includes it in the POST body, but the server-side handlers ignore $_POST["adm_csrf_token"] entirely for these three modes. An attacker who can discover a role UUID (visible in the public cards view when the module is publicly accessible) can embed a forged POST form on any external page and trick any user with the rol_assign_roles right into deleting or toggling roles for the organization. Role deletion is permanent and cascades to all memberships, event associations, and rights data. If exploited, an attacker can trick any user with delegated role-assignment rights into permanently deleting roles, mass-revoking all associated memberships and access to events, documents, and mailing lists, or silently activating or deactivating entire groups, with target role UUIDs trivially harvested from the unauthenticated public cards view and no undo path short of a database restore. This issue has been fixed in version 5.0.7. |
2026-03-19 | |
| CVE-2026-32755 | 5.7 | MEDIUM | CWE-352 | 0.0% p5 | 3.99 | Admidio is an open-source user management solution. In versions 5.0.6 and below,...Admidio is an open-source user management solution. In versions 5.0.6 and below, the save_membership action in modules/profile/profile_function.php saves changes to a member's role membership start and end dates but does not validate the CSRF token. The handler checks stop_membership and remove_former_membership against the CSRF token but omits save_membership from that check. Because membership UUIDs appear in the HTML source visible to authenticated users, an attacker can embed a crafted POST form on any external page and trick a role leader into submitting it, silently altering membership dates for any member of roles the victim leads. A role leader's session can be silently exploited via CSRF to manipulate any member's membership dates, terminating access by backdating, covertly extending unauthorized access, or revoking role-restricted features, all without confirmation, notification, or administrative approval. This issue has been fixed in version 5.0.7. |
2026-03-19 | |
| CVE-2026-32721 | 8.6 | HIGH | CWE-79 | 0.0% p0 | 6.02 | LuCI is the OpenWrt Configuration Interface. Versions prior to both 24.10.5 and ...LuCI is the OpenWrt Configuration Interface. Versions prior to both 24.10.5 and 25.12.0, contain a stored XSS vulnerability in the wireless scan modal, where SSID values from scan results are rendered as raw HTML without any sanitization. The wireless.js file in the luci-mod-network package passes SSIDs via a template literal to dom.append(), which processes them through innerHTML, allowing an attacker to craft a malicious SSID containing arbitrary HTML/JavaScript. Exploitation requires the user to actively open the wireless scan modal (e.g., to connect to a Wi-Fi access point or survey nearby channels), and only affects OpenWrt versions newer than 23.05/22.03 up to the patched releases (24.10.6 and 25.12.1). The issue has been fixed in version LuCI 26.072.65753~068150b. |
2026-03-19 | |
| CVE-2026-30874 | 1.8 | LOW | CWE-74 | 0.0% p1 | 1.26 | OpenWrt Project is a Linux operating system targeting embedded devices. In versi...OpenWrt Project is a Linux operating system targeting embedded devices. In versions prior to 24.10.6, a vulnerability in the hotplug_call function allows an attacker to bypass environment variable filtering and inject an arbitrary PATH variable, potentially leading to privilege escalation. The function is intended to filter out sensitive environment variables like PATH when executing hotplug scripts in /etc/hotplug.d, but a bug using strcmp instead of strncmp causes the filter to compare the full environment string (e.g., PATH=/some/value) against the literal "PATH", so the match always fails. As a result, the PATH variable is never excluded, enabling an attacker to control which binaries are executed by procd-invoked scripts running with elevated privileges. This issue has been fixed in version 24.10.6. |
2026-03-19 | |
| CVE-2026-29107 | 5.0 | MEDIUM | CWE-918 | 0.0% p9 | 3.50 | SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (C...SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (CRM) software application. Prior to versions 7.15.1 and 8.9.3, it is possible to create PDF templates with `<img>` tags. When a PDF is exported using this template, the content (for example, `<img src=http://{burp_collaborator_url}>` is rendered server side, and thus a request is issued from the server, resulting in Server-Side Request Forgery. Versions 7.15.1 and 8.9.3 patch the issue. |
2026-03-19 | |
| CVE-2026-29106 | 5.9 | MEDIUM | CWE-79 | 0.0% p10 | 4.13 | SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (C...SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (CRM) software application. Prior to versions 7.15.1 and 8.9.3, the value of the return_id request parameter is copied into the value of an HTML tag attribute which is an event handler and is encapsulated in double quotation marks. Versions 7.15.1 and 8.9.3 patch the issue. Users should also use a Content Security Policy (CSP) header to completely mitigate XSS. |
2026-03-19 | |
| CVE-2026-29105 | 5.4 | MEDIUM | CWE-601 | 0.0% p8 | 3.78 | SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (C...SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (CRM) software application. Prior to versions 7.15.1 and 8.9.3, SuiteCRM contains an unauthenticated open redirect vulnerability in the WebToLead capture functionality. A user-supplied POST parameter is used as a redirect destination without validation, allowing attackers to redirect victims to arbitrary external websites. This vulnerability allows attackers to abuse the trusted SuiteCRM domain for phishing and social engineering attacks by redirecting users to malicious external websites. Versions 7.15.1 and 8.9.3 patch the issue. |
2026-03-19 | |
| CVE-2026-29104 | 2.7 | LOW | CWE-434 | 0.0% p13 | 1.89 | SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (C...SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (CRM) software application. Prior to versions 7.15.1 and 8.9.3, SuiteCRM contains an authenticated arbitrary file upload vulnerability in the Configurator module. An authenticated administrator can bypass intended file type restrictions when uploading PDF font files, allowing arbitrary files with attacker‑controlled filenames to be written to the server. Although the upload directory is not directly web‑accessible by default, this behavior breaks security boundaries and may enable further attacks when combined with other vulnerabilities or in certain deployment configurations. Versions 7.15.1 and 8.9.3 patch the issue. |
2026-03-19 | |
| CVE-2026-29103 | 9.1 | CRITICAL | CWE-94 | 0.3% p55 | 6.38 | SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (C...SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (CRM) software application. A Critical Remote Code Execution (RCE) vulnerability exists in SuiteCRM 7.15.0 and 8.9.2, allowing authenticated administrators to execute arbitrary system commands. This vulnerability is a direct Patch Bypass of CVE-2024-49774. Although the vendor attempted to fix the issue in version 7.14.5, the underlying flaw in ModuleScanner.php regarding PHP token parsing remains. The scanner incorrectly resets its internal state ($checkFunction flag) when encountering any single-character token (such as =, ., or ;). This allows attackers to hide dangerous function calls (e.g., system(), exec()) using variable assignments or string concatenation, completely evading the MLP security controls. Versions 7.15.1 and 8.9.3 patch the issue. |
2026-03-19 | |
| CVE-2026-29102 | 7.2 | HIGH | CWE-94 | 0.3% p55 | 5.05 | SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (C...SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (CRM) software application. Prior to versions 7.15.1 and 8.9.3, an Authenticated Remote Code Execution (RCE) vulnerability exists in SuiteCRM modules. Versions 7.15.1 and 8.9.3 patch the issue. |
2026-03-19 | |
| CVE-2026-29101 | 4.9 | MEDIUM | CWE-23 | 0.1% p22 | 3.43 | SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (C...SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (CRM) software application. Prior to versions 7.15.1 and 8.9.3, a Denial-of-Service (DoS) vulnerability exists in SuiteCRM modules. Versions 7.15.1 and 8.9.3 patch the issue. |
2026-03-19 | |
| CVE-2026-29100 | 7.1 | HIGH | CWE-79 | 0.0% p10 | 4.97 | SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (C...SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (CRM) software application. SuiteCRM 7.15.0 contains a reflected HTML injection vulnerability in the login page that allows attackers to inject arbitrary HTML content, enabling phishing attacks and page defacement. Version 7.15.1 patches the issue. |
2026-03-19 | |
| CVE-2026-29099 | 8.8 | HIGH | CWE-89 | 0.0% p9 | 6.16 | SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (C...SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (CRM) software application. Prior to versions 7.15.1 and 8.9.3, the `retrieve()` function in `include/OutboundEmail/OutboundEmail.php` fails to properly neutralize the user controlled `$id` parameter. It is assumed that the function calling `retrieve()` will appropriately quote and sanitize the user input. However, two locations have been identified that can be reached through the `EmailUIAjax` action on the `Email()` module where this is not the case. As such, it is possible for an authenticated user to perform SQL injection through the `retrieve()` function. This affects the latest major versions 7.15 and 8.9. As there do not appear to be restrictions on which tables can be called, it would be possible for an attacker to retrieve arbitrary information from the database, including user information and password hashes. Versions 7.15.1 and 8.9.3 patch the issue. |
2026-03-19 | |
| CVE-2026-29098 | 4.9 | MEDIUM | CWE-23 | 0.1% p20 | 3.43 | SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (C...SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (CRM) software application. Prior to versions 7.15.1 and 8.9.3, the `action_exportCustom` function in `modules/ModuleBuilder/controller.php` fails to properly neutralize path traversal sequences in the `$modules` and `$name` parameters. Both parameters later reach the `exportCustom` function in `modules/ModuleBuilder/MB/MBPackage.php` where they are both utilized in constructing s paths for file reading and writing. As such, it is possible for a user with access to the ModuleBuilder module, generally an administrator, to craft a request that can copy the content of any readable directory on the underlying host into the web root, making them readable. As the `ModuleBuilder` module is part of both major versions 7 and 8, both current major versions are affected. This vulnerability allows an attacker to copy any readable directory into the web root. This includes system files like the content of `/etc, or the root directory of the web server, potentially exposing secrets and environment variables. Versions 7.15.1 and 8.9.3 patch the issue. |
2026-03-19 | |
| CVE-2026-29097 | 7.1 | HIGH | CWE-918 | 0.0% p14 | 4.97 | SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (C...SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (CRM) software application. Versions prior to 7.15.1 and 8.9.3 contain a Server-Side Request Forgery (SSRF) vulnerability combined with a Denial of Service (DoS) condition in the RSS Feed Dashlet component. Versions 7.15.1 and 8.9.3 patch the issue. |
2026-03-19 | |
| CVE-2026-29096 | 8.1 | HIGH | CWE-89 | 0.0% p7 | 5.67 | SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (C...SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (CRM) software application. Prior to versions 7.15.1 and 8.9.3, when creating or editing a report (AOR_Reports module), the `field_function` parameter from POST data is saved directly into the `aor_fields` table without any validation. Later, when the report is executed/viewed, this value is concatenated directly into a SQL SELECT query without sanitization, enabling second-order SQL injection. Any authenticated user with Reports access can extract arbitrary database contents (password hashes, API tokens, config values). On MySQL with FILE privilege, this could lead to RCE via SELECT INTO OUTFILE. Versions 7.15.1 and 8.9.3 patch the issue. |
2026-03-19 | |
| CVE-2026-4342 | 8.8 | HIGH | CWE-20 | 0.0% p11 | 6.16 | A security issue was discovered in ingress-nginx where a combination of Ingress ...A security issue was discovered in ingress-nginx where a combination of Ingress annotations can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.) |
2026-03-19 | |
| CVE-2026-4159 | 1.2 | LOW | CWE-125 | 0.0% p4 | 0.84 | 1-byte OOB heap read in wc_PKCS7_DecodeEnvelopedData via zero-length encrypted c...1-byte OOB heap read in wc_PKCS7_DecodeEnvelopedData via zero-length encrypted content. A vulnerability existed in wolfSSL 5.8.4 and earlier, where a 1-byte out-of-bounds heap read in wc_PKCS7_DecodeEnvelopedData could be triggered by a crafted CMS EnvelopedData message with zero-length encrypted content. Note that PKCS7 support is disabled by default. |
2026-03-19 | |
| CVE-2026-33410 | 5.4 | MEDIUM | CWE-863 | 0.0% p8 | 3.78 | Discourse is an open-source discussion platform. Versions prior to 2026.3.0-late...Discourse is an open-source discussion platform. Versions prior to 2026.3.0-latest.1, 2026.2.1, and 2026.1.2 have two authorization issues in the chat direct message API. First, when creating a direct message channel or adding users to an existing one, the `target_groups` parameter was passed directly to the user resolution query without checking group or member visibility for the acting user. An authenticated chat user could craft an API request with a known private/hidden group name and receive a channel containing that group's members, leaking their identities. Second, `can_chat?` only checked group membership, not the `chat_enabled` user preference. A chat-disabled user could create or query DM channels between other users via the direct messages API, potentially exposing private `last_message` content from the serialized channel response. Versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2 contain a patch. No known workarounds are available. |
2026-03-19 | |
| CVE-2026-33394 | 2.7 | LOW | CWE-200 | 0.0% p9 | 1.89 | Discourse is an open-source discussion platform. Prior to versions 2026.3.0-late...Discourse is an open-source discussion platform. Prior to versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2, the Post Edits admin report (/admin/reports/post_edits) leaked the first 40 characters of raw post content from private messages and secure categories to moderators who shouldn't have access. Versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2 contain a patch. No known workarounds are available. |
2026-03-19 | |
| CVE-2026-33393 | 4.3 | MEDIUM | CWE-284 | 0.0% p7 | 3.01 | Discourse is an open-source discussion platform. Prior to versions 2026.3.0-late...Discourse is an open-source discussion platform. Prior to versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2, the `allowed_spam_host_domains` check used `String#end_with?` without domain boundary validation, allowing domains like `attacker-example.com` to bypass spam protection when `example.com` was allowlisted. Versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2 require exact match or proper subdomain match (preceded by `.`) to prevent suffix-based bypass of `newuser_spam_host_threshold`. No known workarounds are available. |
2026-03-19 | |
| CVE-2026-33355 | 6.5 | MEDIUM | CWE-200 | 0.0% p1 | 4.55 | Discourse is an open-source discussion platform. Prior to versions 2026.3.0-late...Discourse is an open-source discussion platform. Prior to versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2, the `/private-posts` endpoint did not apply post-type visibility filtering, allowing regular PM participants to see whisper posts in PM topics they had access to. Versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2 contain a patch. No known workarounds are available. |
2026-03-19 | |
| CVE-2026-32815 | 5.3 | MEDIUM | CWE-287 | 0.0% p12 | 3.71 | SiYuan is a personal knowledge management system. In versions 3.6.0 and below, t...SiYuan is a personal knowledge management system. In versions 3.6.0 and below, the WebSocket endpoint (/ws) allows unauthenticated connections when specific URL parameters are provided (?app=siyuan&id=auth&type=auth). This bypass, intended for the login page to keep the kernel alive, allows any external client — including malicious websites via cross-origin WebSocket — to connect and receive all server push events in real-time. These events leak sensitive document metadata including document titles, notebook names, file paths, and all CRUD operations performed by authenticated users. Combined with the absence of Origin header validation, a malicious website can silently connect to a victim's local SiYuan instance and monitor their note-taking activity. This issue has been fixed in version 3.6.1. |
2026-03-19 | |
| CVE-2026-32754 | 9.3 | CRITICAL | CWE-79 | 0.1% p19 | 6.51 | FreeScout is a free help desk and shared inbox built with PHP's Laravel framewor...FreeScout is a free help desk and shared inbox built with PHP's Laravel framework. Versions 1.8.208 and below are vulnerable to Stored Cross-Site Scripting (XSS) through FreeScout's email notification templates. Incoming email bodies are stored in the database without sanitization and rendered unescaped in outgoing email notifications using Blade's raw output syntax {!! $thread->body !!}. An unauthenticated attacker can exploit this vulnerability by simply sending an email, and when opened by any subscribed agent or admin as part of their normal workflow, enabling universal HTML injection (phishing, tracking) and, in vulnerable email clients, JavaScript execution (session hijacking, credential theft, account takeover) affecting all recipients simultaneously. This issue has been fixed in version 1.8.209. |
2026-03-19 | |
| CVE-2026-32753 | 8.5 | HIGH | CWE-80 | 0.0% p8 | 5.95 | FreeScout is a free help desk and shared inbox built with PHP's Laravel framewor...FreeScout is a free help desk and shared inbox built with PHP's Laravel framework. In versions 1.8.208 and below, bypasses of the attachment view logic and SVG sanitizer make it possible to upload and render an SVG that runs malicious JavaScript. An extension of .png with content type of image/svg+xml is allowed, and a fallback mechanism on invalid XML leads to unsafe sanitization. The application restricts which uploaded files are rendered inline: only files considered "safe" are displayed in the browser; others are served with Content-Disposition: attachment. This decision is based on two checks: the file extension (e.g. .png is allowed, while .svg may not be) and the declared Content-Type (e.g. image/* is allowed). By using a filename with an allowed extension (e.g. xss.png) and a Content-Type of image/svg+xml, an attacker can satisfy both checks and cause the server to treat the upload as a safe image and render it inline, even though the body is SVG and can contain scripted behavior. Any authenticated user can set up a specific URL, and whenever another user or administrator visits it, XSS can perform any action on their behalf. This issue has been fixed in version 1.8.209. |
2026-03-19 | |
| CVE-2026-32752 | 0.0 | NONE | CWE-284 | 0.0% p10 | 0.00 | FreeScout is a free help desk and shared inbox built with PHP's Laravel framewor...FreeScout is a free help desk and shared inbox built with PHP's Laravel framework. In versions 1.8.208 and below, the ThreadPolicy::edit() method contains a broken access control vulnerability that allows any authenticated user (regardless of role or mailbox access) to read and modify all customer-created thread messages across all mailboxes. This flaw enables silent modification of customer messages (evidence tampering), bypasses the entire mailbox permission model, and constitutes a GDPR/compliance violation. The issue has been fixed in version 1.8.209. |
2026-03-19 | |
| CVE-2026-32751 | 5.1 | MEDIUM | CWE-79 | 0.2% p41 | 3.58 | SiYuan is a personal knowledge management system. In versions 3.6.0 and below, t...SiYuan is a personal knowledge management system. In versions 3.6.0 and below, the mobile file tree (MobileFiles.ts) renders notebook names via innerHTML without HTML escaping when processing renamenotebook WebSocket events. The desktop version (Files.ts) properly uses escapeHtml() for the same operation. An authenticated user who can rename notebooks can inject arbitrary HTML/JavaScript that executes on any mobile client viewing the file tree. Since Electron is configured with nodeIntegration: true and contextIsolation: false, the injected JavaScript has full Node.js access, escalating stored XSS to full remote code execution. The mobile layout is also used in the Electron desktop app when the window is narrow, making this exploitable on desktop as well. This issue has been fixed in version 3.6.1. |
2026-03-19 | |
| CVE-2026-32750 | 6.8 | MEDIUM | CWE-22 | 0.0% p14 | 4.76 | SiYuan is a personal knowledge management system. In versions 3.6.0 and below, P...SiYuan is a personal knowledge management system. In versions 3.6.0 and below, POST /api/import/importStdMd passes the localPath parameter directly to model.ImportFromLocalPath with zero path validation. The function recursively reads every file under the given path and permanently stores their content as SiYuan note documents in the workspace database, making them searchable and accessible to all workspace users. Data persists in the workspace database across restarts and is accessible to Publish Service Reader accounts. Combined with the renderSprig SQL injection ( separate advisory ), a non-admin user can then read all imported secrets without any additional privileges. This issue has been fixed in version 3.6.1. |
2026-03-19 | |
| CVE-2026-32194 | 9.8 | CRITICAL | CWE-77 | 0.1% p28 | 6.86 | Improper neutralization of special elements used in a command ('command injectio...Improper neutralization of special elements used in a command ('command injection') in Microsoft Bing Images allows an unauthorized attacker to execute code over a network. |
2026-03-19 | |
| CVE-2026-32099 | 4.3 | MEDIUM | CWE-200 | 0.0% p1 | 3.01 | Discourse is an open-source discussion platform. Prior to versions 2026.3.0-late...Discourse is an open-source discussion platform. Prior to versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2, when a user has `hide_profile` enabled, their bio, location, and website were still exposed through the user onebox preview. An authenticated user could request a onebox for a hidden user's profile URL and receive their hidden profile fields (bio, location, website) in the response. Versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2 contain a patch. No known workarounds are available. |
2026-03-19 | |
| CVE-2026-32041 | 7.5 | HIGH | CWE-306 | 0.0% p3 | 5.25 | OpenClaw versions prior to 2026.3.1 fail to properly handle authentication boots...OpenClaw versions prior to 2026.3.1 fail to properly handle authentication bootstrap errors during startup, allowing browser-control routes to remain accessible without authentication. Local processes or loopback-reachable SSRF paths can exploit this to access browser-control routes including evaluate-capable actions without valid credentials. |
2026-03-19 | |
| CVE-2026-32040 | 2.4 | LOW | CWE-79 | 0.0% p6 | 1.68 | OpenClaw versions prior to 2026.2.23 contain an html injection vulnerability in ...OpenClaw versions prior to 2026.2.23 contain an html injection vulnerability in the HTML session exporter that allows attackers to execute arbitrary javascript by injecting malicious mimeType values in image content blocks. Attackers can craft session entries with specially crafted mimeType attributes that break out of the img src data-URL context to achieve cross-site scripting when exported HTML is opened. |
2026-03-19 | |
| CVE-2026-32039 | 6.0 | MEDIUM | CWE-639 | 0.0% p6 | 4.20 | OpenClaw versions prior to 2026.2.22 contain an authorization bypass vulnerabili...OpenClaw versions prior to 2026.2.22 contain an authorization bypass vulnerability in the toolsBySender group policy matching that allows attackers to inherit elevated tool permissions through identifier collision attacks. Attackers can exploit untyped sender keys by forcing collisions with mutable identity values such as senderName or senderUsername to bypass sender-authorization policies and gain unauthorized access to privileged tools. |
2026-03-19 | |
| CVE-2026-32038 | 9.3 | CRITICAL | CWE-284 | 0.1% p17 | 6.51 | OpenClaw before 2026.2.24 contains a sandbox network isolation bypass vulnerabil...OpenClaw before 2026.2.24 contains a sandbox network isolation bypass vulnerability that allows trusted operators to join another container's network namespace. Attackers can configure the docker.network parameter with container:<id> values to reach services in target container namespaces and bypass network hardening controls. |
2026-03-19 | |
| CVE-2026-32037 | 2.3 | LOW | CWE-918 | 0.0% p8 | 1.61 | OpenClaw versions prior to 2026.2.22 fail to consistently validate redirect chai...OpenClaw versions prior to 2026.2.22 fail to consistently validate redirect chains against configured mediaAllowHosts allowlists during MSTeams media downloads. Attackers can supply or influence attachment URLs to force redirects to non-allowlisted targets, bypassing SSRF boundary controls. |
2026-03-19 | |
| CVE-2026-32036 | 8.3 | HIGH | CWE-289 | 0.1% p28 | 5.81 | OpenClaw gateway plugin versions prior to 2026.2.26 contain a path traversal vul...OpenClaw gateway plugin versions prior to 2026.2.26 contain a path traversal vulnerability that allows remote attackers to bypass route authentication checks by manipulating /api/channels paths with encoded dot-segment traversal sequences. Attackers can craft alternate paths using encoded traversal patterns to access protected plugin channel routes when handlers normalize the incoming path, circumventing security controls. |
2026-03-19 | |
| CVE-2026-32035 | 5.8 | MEDIUM | CWE-863 | 0.0% p8 | 4.06 | OpenClaw versions prior to 2026.3.2 fail to pass the senderIsOwner flag when pro...OpenClaw versions prior to 2026.3.2 fail to pass the senderIsOwner flag when processing Discord voice transcripts in agentCommand, causing the flag to default to true. Non-owner voice participants can exploit this omission to access owner-only tools including gateway and cron functionality in mixed-trust channels. |
2026-03-19 | |
| CVE-2026-32034 | 6.1 | MEDIUM | CWE-78 | 0.1% p24 | 4.27 | OpenClaw versions prior to 2026.2.21 contain an authentication bypass vulnerabil...OpenClaw versions prior to 2026.2.21 contain an authentication bypass vulnerability in the Control UI when allowInsecureAuth is explicitly enabled and the gateway is exposed over plaintext HTTP, allowing attackers to bypass device identity and pairing verification. An attacker with leaked or intercepted credentials can obtain high-privilege Control UI access by exploiting the lack of secure authentication enforcement over unencrypted HTTP connections. |
2026-03-19 | |
| CVE-2026-32033 | 6.0 | MEDIUM | CWE-22 | 0.1% p16 | 4.20 | OpenClaw versions prior to 2026.2.24 contain a path traversal vulnerability wher...OpenClaw versions prior to 2026.2.24 contain a path traversal vulnerability where @-prefixed absolute paths bypass workspace-only file-system boundary validation due to canonicalization mismatch. Attackers can exploit this by crafting @-prefixed paths like @/etc/passwd to read files outside the intended workspace boundary when tools.fs.workspaceOnly is enabled. |
2026-03-19 | |
| CVE-2026-32032 | 7.3 | HIGH | CWE-426 | 0.0% p3 | 5.11 | OpenClaw versions prior to 2026.2.22 contain an arbitrary shell execution vulner...OpenClaw versions prior to 2026.2.22 contain an arbitrary shell execution vulnerability in shell environment fallback that trusts the unvalidated SHELL path from the host environment. An attacker with local environment access can inject a malicious SHELL variable to execute arbitrary commands with the privileges of the OpenClaw process. |
2026-03-19 | |
| CVE-2026-32031 | 6.3 | MEDIUM | CWE-288 | 0.1% p20 | 4.41 | OpenClaw versions prior to 2026.2.26 server-http contains an authentication bypa...OpenClaw versions prior to 2026.2.26 server-http contains an authentication bypass vulnerability in gateway authentication for plugin channel endpoints due to path canonicalization mismatch between the gateway guard and plugin handler routing. Attackers can bypass authentication by sending requests with alternative path encodings to access protected plugin channel APIs without proper gateway authentication. |
2026-03-19 | |
| CVE-2026-32030 | 8.2 | HIGH | CWE-22 | 0.1% p20 | 5.74 | OpenClaw versions prior to 2026.2.19 contain a path traversal vulnerability in t...OpenClaw versions prior to 2026.2.19 contain a path traversal vulnerability in the stageSandboxMedia function that accepts arbitrary absolute paths when iMessage remote attachment fetching is enabled. An attacker who can tamper with attachment path metadata can disclose files readable by the OpenClaw process on the configured remote host via SCP. |
2026-03-19 | |
| CVE-2026-32029 | 6.3 | MEDIUM | CWE-345 | 0.0% p9 | 4.41 | OpenClaw versions prior to 2026.2.21 improperly parse the left-most X-Forwarded-...OpenClaw versions prior to 2026.2.21 improperly parse the left-most X-Forwarded-For header value when requests originate from configured trusted proxies, allowing attackers to spoof client IP addresses. In proxy chains that append or preserve header values, attackers can inject malicious header content to influence security decisions including authentication rate-limiting and IP-based access controls. |
2026-03-19 | |
| CVE-2026-32028 | 6.3 | MEDIUM | CWE-863 | 0.0% p8 | 4.41 | OpenClaw versions prior to 2026.2.25 fail to enforce dmPolicy and allowFrom auth...OpenClaw versions prior to 2026.2.25 fail to enforce dmPolicy and allowFrom authorization checks on Discord direct-message reaction notifications, allowing non-allowlisted users to enqueue reaction-derived system events. Attackers can exploit this inconsistency by reacting to bot-authored DM messages to bypass DM authorization restrictions and trigger downstream automation or tool policies. |
2026-03-19 | |
| CVE-2026-32027 | 7.1 | HIGH | CWE-863 | 0.0% p9 | 4.97 | OpenClaw versions prior to 2026.2.26 contain an authorization bypass vulnerabili...OpenClaw versions prior to 2026.2.26 contain an authorization bypass vulnerability where DM pairing-store identities are incorrectly eligible for group allowlist authorization checks. Attackers can exploit this cross-context authorization flaw by using a sender approved via DM pairing to satisfy group sender allowlist checks without explicit presence in groupAllowFrom, bypassing group message access controls. |
2026-03-19 | |
| CVE-2026-32026 | 7.1 | HIGH | CWE-22 | 0.1% p18 | 4.97 | OpenClaw versions prior to 2026.2.24 contain an improper path validation vulnera...OpenClaw versions prior to 2026.2.24 contain an improper path validation vulnerability in sandbox media handling that allows absolute paths under the host temporary directory outside the active sandbox root. Attackers can exploit this by providing malicious media references to read and exfiltrate arbitrary files from the host temporary directory through attachment delivery mechanisms. |
2026-03-19 | |
| CVE-2026-32025 | 7.5 | HIGH | CWE-307 | 0.1% p24 | 5.25 | OpenClaw versions prior to 2026.2.25 contain an authentication hardening gap in ...OpenClaw versions prior to 2026.2.25 contain an authentication hardening gap in browser-origin WebSocket clients that allows attackers to bypass origin checks and auth throttling on loopback deployments. An attacker can trick a user into opening a malicious webpage and perform password brute-force attacks against the gateway to establish an authenticated operator session and invoke control-plane methods. |
2026-03-19 | |
| CVE-2026-32024 | 6.8 | MEDIUM | CWE-59 | 0.0% p13 | 4.76 | OpenClaw versions prior to 2026.2.22 contain a symlink traversal vulnerability i...OpenClaw versions prior to 2026.2.22 contain a symlink traversal vulnerability in avatar handling that allows attackers to read arbitrary files outside the configured workspace boundary. Remote attackers can exploit this by requesting avatar resources through gateway surfaces to disclose local files accessible to the OpenClaw process. |
2026-03-19 | |
| CVE-2026-32023 | 6.0 | MEDIUM | CWE-863 | 0.0% p13 | 4.20 | OpenClaw versions prior to 2026.2.24 contain an approval gating bypass vulnerabi...OpenClaw versions prior to 2026.2.24 contain an approval gating bypass vulnerability in system.run allowlist mode where nested transparent dispatch wrappers can suppress shell-wrapper detection. Attackers can exploit this by chaining multiple dispatch wrappers like /usr/bin/env to execute /bin/sh -c commands without triggering the expected approval prompt in allowlist plus ask=on-miss configurations. |
2026-03-19 | |
| CVE-2026-32022 | 6.0 | MEDIUM | CWE-184 | 0.1% p18 | 4.20 | OpenClaw versions prior to 2026.2.21 contain a stdin-only policy bypass vulnerab...OpenClaw versions prior to 2026.2.21 contain a stdin-only policy bypass vulnerability in the grep tool within tools.exec.safeBins that allows attackers to read arbitrary files by supplying a pattern via the -e flag parameter. Attackers can include a positional filename operand to bypass file access restrictions and read sensitive files .env from the working directory. |
2026-03-19 | |
| CVE-2026-32021 | 6.3 | MEDIUM | CWE-863 | 0.0% p10 | 4.41 | OpenClaw versions prior to 2026.2.22 contain an authorization bypass vulnerabili...OpenClaw versions prior to 2026.2.22 contain an authorization bypass vulnerability in the Feishu allowFrom allowlist implementation that accepts mutable sender display names instead of enforcing ID-only matching. An attacker can set a display name equal to an allowlisted ID string to bypass authorization checks and gain unauthorized access. |
2026-03-19 | |
| CVE-2026-32020 | 4.8 | MEDIUM | CWE-59 | 0.0% p3 | 3.36 | OpenClaw versions prior to 2026.2.22 contain a path traversal vulnerability in t...OpenClaw versions prior to 2026.2.22 contain a path traversal vulnerability in the static file handler that follows symbolic links, allowing out-of-root file reads. Attackers can place symlinks under the Control UI root directory to bypass directory confinement checks and read arbitrary files outside the intended root. |
2026-03-19 | |
| CVE-2026-32019 | 2.3 | LOW | CWE-918 | 0.0% p14 | 1.61 | OpenClaw versions prior to 2026.2.22 contain incomplete IPv4 special-use range v...OpenClaw versions prior to 2026.2.22 contain incomplete IPv4 special-use range validation in the isPrivateIpv4() function, allowing requests to RFC-reserved ranges to bypass SSRF policy checks. Attackers with network reachability to special-use IPv4 ranges can exploit web_fetch functionality to access blocked addresses such as 198.18.0.0/15 and other non-global ranges. |
2026-03-19 | |
| CVE-2026-32018 | 2.0 | LOW | CWE-362 | 0.0% p1 | 1.40 | OpenClaw versions prior to 2026.2.19 contain a race condition vulnerability in c...OpenClaw versions prior to 2026.2.19 contain a race condition vulnerability in concurrent updateRegistry and removeRegistryEntry operations for sandbox containers and browsers. Attackers can exploit unsynchronized read-modify-write operations without locking to cause registry updates to lose data, resurrect removed entries, or corrupt sandbox state affecting list, prune, and recreate operations. |
2026-03-19 | |
| CVE-2026-32017 | 6.0 | MEDIUM | CWE-184 | 0.0% p12 | 4.20 | OpenClaw versions prior to 2026.2.19 contain an allowlist bypass vulnerability i...OpenClaw versions prior to 2026.2.19 contain an allowlist bypass vulnerability in the exec safeBins policy that allows attackers to write arbitrary files using short-option payloads. Attackers can bypass argument validation by attaching short options like -o to whitelisted binaries, enabling unauthorized file-write operations that should be denied by safeBins checks. |
2026-03-19 | |
| CVE-2026-32016 | 7.3 | HIGH | CWE-426 | 0.0% p2 | 5.11 | OpenClaw versions prior to 2026.2.22 on macOS contain a path validation bypass v...OpenClaw versions prior to 2026.2.22 on macOS contain a path validation bypass vulnerability in the exec-approval allowlist mode that allows local attackers to execute unauthorized binaries by exploiting basename-only allowlist entries. Attackers can execute same-name local binaries ./echo without approval when security=allowlist and ask=on-miss are configured, bypassing intended path-based policy restrictions. |
2026-03-19 | |
| CVE-2026-32015 | 7.3 | HIGH | CWE-426 | 0.0% p2 | 5.11 | OpenClaw versions 2026.1.21 prior to 2026.2.19 contain a path hijacking vulnerab...OpenClaw versions 2026.1.21 prior to 2026.2.19 contain a path hijacking vulnerability in tools.exec.safeBins that allows attackers to bypass allowlist checks by controlling process PATH resolution. Attackers who can influence the gateway process PATH or launch environment can execute trojan binaries with allowlisted names, such as jq, circumventing executable validation controls. |
2026-03-19 | |
| CVE-2026-32014 | 8.6 | HIGH | CWE-290 | 0.0% p9 | 6.02 | OpenClaw versions prior to 2026.2.26 contain a metadata spoofing vulnerability w...OpenClaw versions prior to 2026.2.26 contain a metadata spoofing vulnerability where reconnect platform and deviceFamily fields are accepted from the client without being bound into the device-auth signature. An attacker with a paired node identity on the trusted network can spoof reconnect metadata to bypass platform-based node command policies and gain access to restricted commands. |
2026-03-19 | |
| CVE-2026-32013 | 8.7 | HIGH | CWE-59 | 0.1% p29 | 6.09 | OpenClaw versions prior to 2026.2.25 contain a symlink traversal vulnerability i...OpenClaw versions prior to 2026.2.25 contain a symlink traversal vulnerability in the agents.files.get and agents.files.set methods that allows reading and writing files outside the agent workspace. Attackers can exploit symlinked allowlisted files to access arbitrary host files within gateway process permissions, potentially enabling code execution through file overwrite attacks. |
2026-03-19 | |
| CVE-2026-32011 | 8.7 | HIGH | CWE-770 | 0.1% p23 | 6.09 | OpenClaw versions prior to 2026.3.2 contain a denial of service vulnerability in...OpenClaw versions prior to 2026.3.2 contain a denial of service vulnerability in webhook handlers for BlueBubbles and Google Chat that parse request bodies before performing authentication and signature validation. Unauthenticated attackers can exploit this by sending slow or oversized request bodies to exhaust parser resources and degrade service availability. |
2026-03-19 | |
| CVE-2026-32010 | 5.8 | MEDIUM | CWE-78 | 0.0% p10 | 4.06 | OpenClaw versions prior to 2026.2.22 contain an allowlist bypass vulnerability i...OpenClaw versions prior to 2026.2.22 contain an allowlist bypass vulnerability in the safe-bin configuration when sort is manually added to tools.exec.safeBins. Attackers can invoke sort with the --compress-program flag to execute arbitrary external programs without operator approval in allowlist mode with ask=on-miss enabled. |
2026-03-19 | |
| CVE-2026-32009 | 7.0 | HIGH | CWE-426 | 0.0% p2 | 4.90 | OpenClaw versions prior to 2026.2.24 contain a policy bypass vulnerability in th...OpenClaw versions prior to 2026.2.24 contain a policy bypass vulnerability in the safeBins allowlist evaluation that trusts static default directories including writable package-manager paths like /opt/homebrew/bin and /usr/local/bin. An attacker with write access to these trusted directories can place a malicious binary with the same name as an allowed executable to achieve arbitrary command execution within the OpenClaw runtime context. |
2026-03-19 | |
| CVE-2026-32008 | 7.1 | HIGH | CWE-610 | 0.0% p10 | 4.97 | OpenClaw versions prior to 2026.2.21 contain an improper URL scheme validation v...OpenClaw versions prior to 2026.2.21 contain an improper URL scheme validation vulnerability in the assertBrowserNavigationAllowed() function that allows authenticated users with browser-tool access to navigate to file:// URLs. Attackers can exploit this by accessing local files readable by the OpenClaw process user through browser snapshot and extraction actions to exfiltrate sensitive data. |
2026-03-19 | |
| CVE-2026-32007 | 7.6 | HIGH | CWE-22 | 0.0% p13 | 5.32 | OpenClaw versions prior to 2026.2.23 contain a path traversal vulnerability in t...OpenClaw versions prior to 2026.2.23 contain a path traversal vulnerability in the experimental apply_patch tool that allows attackers with sandbox access to modify files outside the workspace directory by exploiting inconsistent enforcement of workspace-only checks on mounted paths. Attackers can use apply_patch operations on writable mounts outside the workspace root to access and modify arbitrary files on the system. |
2026-03-19 | |
| CVE-2026-32006 | 2.3 | LOW | CWE-863 | 0.0% p12 | 1.61 | OpenClaw versions prior to 2026.2.26 contain an authorization bypass vulnerabili...OpenClaw versions prior to 2026.2.26 contain an authorization bypass vulnerability where DM pairing-store identities are incorrectly treated as group allowlist identities when dmPolicy=pairing and groupPolicy=allowlist. Remote attackers can send messages and reactions as DM-paired identities without explicit groupAllowFrom membership to bypass group sender authorization checks. |
2026-03-19 | |
| CVE-2026-32005 | 7.6 | HIGH | CWE-863 | 0.0% p8 | 5.32 | OpenClaw versions prior to 2026.2.25 fail to enforce sender authorization checks...OpenClaw versions prior to 2026.2.25 fail to enforce sender authorization checks for interactive callbacks including block_action, view_submission, and view_closed in shared workspace deployments. Unauthorized workspace members can bypass allowFrom restrictions and channel user allowlists to enqueue system-event text into active sessions. |
2026-03-19 | |
| CVE-2026-32004 | 8.3 | HIGH | CWE-288 | 0.1% p25 | 5.81 | OpenClaw versions prior to 2026.3.2 contain an authentication bypass vulnerabili...OpenClaw versions prior to 2026.3.2 contain an authentication bypass vulnerability in the /api/channels route classification due to canonicalization depth mismatch between auth-path classification and route-path canonicalization. Attackers can bypass plugin route authentication checks by submitting deeply encoded slash variants such as multi-encoded %2f to access protected /api/channels endpoints. |
2026-03-19 | |
| CVE-2026-32003 | 7.5 | HIGH | CWE-78 | 0.1% p21 | 5.25 | OpenClaw versions prior to 2026.2.22 contain an environment variable injection v...OpenClaw versions prior to 2026.2.22 contain an environment variable injection vulnerability in the system.run function that allows attackers to bypass command allowlist restrictions via SHELLOPTS and PS4 environment variables. An attacker who can invoke system.run with request-scoped environment variables can execute arbitrary shell commands outside the intended allowlisted command body through bash xtrace expansion. |
2026-03-19 | |
| CVE-2026-32002 | 6.0 | MEDIUM | CWE-200 | 0.0% p9 | 4.20 | OpenClaw versions prior to 2026.2.23 contain a sandbox bypass vulnerability in t...OpenClaw versions prior to 2026.2.23 contain a sandbox bypass vulnerability in the sandboxed image tool that fails to enforce tools.fs.workspaceOnly restrictions on mounted sandbox paths, allowing attackers to read out-of-workspace files. Attackers can load restricted mounted images and exfiltrate them through vision model provider requests to bypass sandbox confidentiality controls. |
2026-03-19 | |
| CVE-2026-32001 | 5.3 | MEDIUM | CWE-863 | 0.1% p21 | 3.71 | OpenClaw versions prior to 2026.2.22 contain an authentication bypass vulnerabil...OpenClaw versions prior to 2026.2.22 contain an authentication bypass vulnerability that allows clients authenticated with a shared gateway token to connect as role=node without device identity verification. Attackers can exploit this by claiming the node role during WebSocket handshake to inject unauthorized node.event calls, triggering agent.request and voice.transcript flows without proper device pairing. |
2026-03-19 | |
| CVE-2026-30873 | 2.4 | LOW | CWE-401 | 0.0% p5 | 1.68 | OpenWrt Project is a Linux operating system targeting embedded devices. In versi...OpenWrt Project is a Linux operating system targeting embedded devices. In versions prior to both 24.10.6 and 25.12.1, the jp_get_token function, which performs lexical analysis by breaking input expressions into tokens, contains a memory leak vulnerability when extracting string literals, field labels, and regular expressions using dynamic memory allocation. These extracted results are stored in a jp_opcode struct, which is later copied to a newly allocated jp_opcode object via jp_alloc_op. During this transfer, if a string was previously extracted and stored in the initial jp_opcode, it is copied to the new allocation but the original memory is never freed, resulting in a memory leak. This issue has been fixed in versions 24.10.6 and 25.12.1. |
2026-03-19 | |
| CVE-2026-30872 | 9.5 | CRITICAL | CWE-121 | 0.1% p23 | 6.65 | OpenWrt Project is a Linux operating system targeting embedded devices. In versi...OpenWrt Project is a Linux operating system targeting embedded devices. In versions prior to 24.10.6 and 25.12.1, the mdns daemon has a Stack-based Buffer Overflow vulnerability in the match_ipv6_addresses function, triggered when processing PTR queries for IPv6 reverse DNS domains (.ip6.arpa) received via multicast DNS on UDP port 5353. During processing, the domain name from name_buffer is copied via strcpy into a fixed 256-byte stack buffer, and then the reverse IPv6 request is extracted into a buffer of only 46 bytes (INET6_ADDRSTRLEN). Because the length of the data is never validated before this extraction, an attacker can supply input larger than 46 bytes, causing an out-of-bounds write. This allows a specially crafted DNS query to overflow the stack buffer in match_ipv6_addresses, potentially enabling remote code execution. This issue has been fixed in versions 24.10.6 and 25.12.1. |
2026-03-19 | |
| CVE-2026-30871 | 9.5 | CRITICAL | CWE-121 | 0.0% p5 | 6.65 | OpenWrt Project is a Linux operating system targeting embedded devices. In versi...OpenWrt Project is a Linux operating system targeting embedded devices. In versions prior to 24.10.6 and 25.12.1, the mdns daemon has a Stack-based Buffer Overflow vulnerability in the parse_question function. The issue is triggered by PTR queries for reverse DNS domains (.in-addr.arpa and .ip6.arpa). DNS packets received on UDP port 5353 are expanded by dn_expand into an 8096-byte global buffer (name_buffer), which is then copied via an unbounded strcpy into a fixed 256-byte stack buffer when handling TYPE_PTR queries. The overflow is possible because dn_expand converts non-printable ASCII bytes (e.g., 0x01) into multi-character octal representations (e.g., \001), significantly inflating the expanded name beyond the stack buffer's capacity. A crafted DNS packet can exploit this expansion behavior to overflow the stack buffer, making the vulnerability reachable through normal multicast DNS packet processing. This issue has been fixed in versions 24.10.6 and 25.12.1. |
2026-03-19 | |
| CVE-2026-29072 | 8.2 | HIGH | CWE-862 | 0.0% p1 | 5.74 | Discourse is an open-source discussion platform. Prior to versions 2026.3.0-late...Discourse is an open-source discussion platform. Prior to versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2, users who do not belong to the allowed policy creation groups can create functional policy acceptance widgets in posts under the right conditions. Versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2 contain a patch. As a workaround, disable the discourse-policy plugin by disabling the `policy_enabled` site setting. |
2026-03-19 | |
| CVE-2026-28282 | 2.3 | LOW | CWE-863 | 0.0% p1 | 1.61 | Discourse is an open-source discussion platform. Versions prior to 2026.3.0-late...Discourse is an open-source discussion platform. Versions prior to 2026.3.0-latest.1, 2026.2.1, and 2026.1.2 have a security flaw in the discourse-policy plugin which allowed a user with policy creation permission to gain membership access to any private/restricted groups. Once membership to a private/restricted group has been obtained, the user will be able to read private topics that only the group has access to. Versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2 contain a patch. As a workaround, review all policies for the use of `add-users-to-group` and temporarily remove the attribute from the policy. Alternatively, disable the discourse-policy plugin by disabling the `policy_enabled` site setting. |
2026-03-19 | |
| CVE-2026-27936 | 6.9 | MEDIUM | CWE-863 | 0.0% p3 | 4.83 | Discourse is an open-source discussion platform. Prior to versions 2026.3.0-late...Discourse is an open-source discussion platform. Prior to versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2, a restriction bypass allows restricted post action counts to be disclosed to non-privileged users through a carefully crafted request. Versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2 contain a patch. No known workarounds are available. |
2026-03-19 | |
| CVE-2026-27935 | 6.9 | MEDIUM | CWE-201 | 0.0% p8 | 4.83 | Discourse is an open-source discussion platform. Versions prior to 2026.3.0-late...Discourse is an open-source discussion platform. Versions prior to 2026.3.0-latest.1, 2026.2.1, and 2026.1.2 have a vulnerability in an API endpoint that discloses private topic metadata of admin users to moderator users even if the moderators do not have access to the private topics. Versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2 contain a patch. No known workarounds are available. |
2026-03-19 | |
| CVE-2026-27934 | 8.7 | HIGH | CWE-201 | 0.0% p12 | 6.09 | Discourse is an open-source discussion platform. Versions prior to 2026.3.0-late...Discourse is an open-source discussion platform. Versions prior to 2026.3.0-latest.1, 2026.2.1, and 2026.1.2 have a lack of visibility checks with a user action API endpoint that results in disclosure of the title and post excerpt to unauthorized users, leading to information disclosure. Versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2 contain a patch. No known workarounds are available. |
2026-03-19 | |
| CVE-2026-4395 | 1.3 | LOW | CWE-122 | 0.1% p31 | 0.91 | Heap-based buffer overflow in the KCAPI ECC code path of wc_ecc_import_x963_ex()...Heap-based buffer overflow in the KCAPI ECC code path of wc_ecc_import_x963_ex() in wolfSSL wolfcrypt allows a remote attacker to write attacker-controlled data past the bounds of the pubkey_raw buffer via a crafted oversized EC public key point. The WOLFSSL_KCAPI_ECC code path copies the input to key->pubkey_raw (132 bytes) using XMEMCPY without a bounds check, unlike the ATECC code path which includes a length validation. This can be triggered during TLS key exchange when a malicious peer sends a crafted ECPoint in ServerKeyExchange. |
2026-03-19 | |
| CVE-2026-3849 | 6.9 | MEDIUM | CWE-787 | 0.2% p42 | 4.84 | Stack Buffer Overflow in wc_HpkeLabeledExtract via Oversized ECH Config. A vulne...Stack Buffer Overflow in wc_HpkeLabeledExtract via Oversized ECH Config. A vulnerability existed in wolfSSL 5.8.4 ECH (Encrypted Client Hello) support, where a maliciously crafted ECH config could cause a stack buffer overflow on the client side, leading to potential remote execution and client program crash. This could be exploited by a malicious TLS server supporting ECH. Note that ECH is off by default, and is only enabled with enable-ech. |
2026-03-19 | |
| CVE-2026-3549 | 8.3 | HIGH | CWE-122 | 0.1% p20 | 5.81 | Heap Overflow in TLS 1.3 ECH parsing. An integer underflow existed in ECH extens...Heap Overflow in TLS 1.3 ECH parsing. An integer underflow existed in ECH extension parsing logic when calculating a buffer length, which resulted in writing beyond the bounds of an allocated buffer. Note that in wolfSSL, ECH is off by default, and the ECH standard is still evolving. |
2026-03-19 | |
| CVE-2026-3547 | 7.5 | HIGH | CWE-125 | 0.0% p14 | 5.25 | Out-of-bounds read in ALPN parsing due to incomplete validation. wolfSSL 5.8.4 a...Out-of-bounds read in ALPN parsing due to incomplete validation. wolfSSL 5.8.4 and earlier contained an out-of-bounds read in ALPN handling when built with ALPN enabled (HAVE_ALPN / --enable-alpn). A crafted ALPN protocol list could trigger an out-of-bounds read, leading to a potential process crash (denial of service). Note that ALPN is disabled by default, but is enabled for these 3rd party compatibility features: enable-apachehttpd, enable-bind, enable-curl, enable-haproxy, enable-hitch, enable-lighty, enable-jni, enable-nginx, enable-quic. |
2026-03-19 | |
| CVE-2026-3230 | 1.2 | LOW | CWE-20 | 0.1% p20 | 0.84 | Missing required cryptographic step in the TLS 1.3 client HelloRetryRequest hand...Missing required cryptographic step in the TLS 1.3 client HelloRetryRequest handshake logic in wolfSSL could lead to a compromise in the confidentiality of TLS-protected communications via a crafted HelloRetryRequest followed by a ServerHello message that omits the required key_share extension, resulting in derivation of predictable traffic secrets from (EC)DHE shared secret. This issue does not affect the client's authentication of the server during TLS handshakes. |
2026-03-19 | |
| CVE-2026-3229 | 1.2 | LOW | CWE-122 | 0.0% p2 | 0.84 | An integer overflow vulnerability existed in the static function wolfssl_add_to_...An integer overflow vulnerability existed in the static function wolfssl_add_to_chain, that caused heap corruption when certificate data was written out of bounds of an insufficiently sized certificate buffer. wolfssl_add_to_chain is called by these API: wolfSSL_CTX_add_extra_chain_cert, wolfSSL_CTX_add1_chain_cert, wolfSSL_add0_chain_cert. These API are enabled for 3rd party compatibility features: enable-opensslall, enable-opensslextra, enable-lighty, enable-stunnel, enable-nginx, enable-haproxy. This issue is not remotely exploitable, and would require that the application context loading certificates is compromised. |
2026-03-19 | |
| CVE-2026-33346 | 8.7 | HIGH | CWE-79 | 0.0% p13 | 6.09 | OpenEMR is a free and open source electronic health records and medical practice...OpenEMR is a free and open source electronic health records and medical practice management application. Prior to 8.0.0.2, a stored cross-site scripting (XSS) vulnerability in the patient portal payment flow allows a patient portal user to persist arbitrary JavaScript that executes in the browser of a staff member who reviews the payment submission. The payload is stored via `portal/lib/paylib.php` and rendered without escaping in `portal/portal_payment.php`. Version 8.0.0.2 fixes the issue. |
2026-03-19 | |
| CVE-2026-33321 | 7.2 | HIGH | CWE-918 | 0.1% p28 | 5.04 | OpenEMR is a free and open source electronic health records and medical practice...OpenEMR is a free and open source electronic health records and medical practice management application. Prior to 8.0.0.2, users with the `Notes - my encounters` role can fill Eye Exam forms in patient encounters. The answers to the form can be printed out in PDF form. An Out-of-Band Server-Side Request Forgery (OOB SSRF) vulnerability was identified in the PDF creation function where the form answers are parsed as unescaped HTML, allowing an attacker to forge requests from the server made to external or internal resources. Version 8.0.0.2 fixes the issue. |
2026-03-19 | |
| CVE-2026-33305 | 5.4 | MEDIUM | CWE-696 | 0.1% p18 | 3.78 | OpenEMR is a free and open source electronic health records and medical practice...OpenEMR is a free and open source electronic health records and medical practice management application. Prior to 8.0.0.2, an authorization bypass in the optional FaxSMS module (`oe-module-faxsms`) allows any authenticated OpenEMR user to invoke controller methods — including `getNotificationLog()`, which returns patient appointment data (PHI) — regardless of whether they hold the required ACL permissions. The `AppDispatch` constructor dispatches user-controlled actions and exits the process before any calling code can enforce ACL checks. Version 8.0.0.2 fixes the issue. |
2026-03-19 | |
| CVE-2026-33304 | 6.5 | MEDIUM | CWE-639 | 0.1% p22 | 4.55 | OpenEMR is a free and open source electronic health records and medical practice...OpenEMR is a free and open source electronic health records and medical practice management application. Prior to 8.0.0.2, an authorization bypass in the dated reminders log allows any authenticated non-admin user to view reminder messages belonging to other users, including associated patient names and free-text message content, by crafting a GET request with arbitrary user IDs in the `sentTo[]` or `sentBy[]` parameters. Version 8.0.0.2 fixes the issue. |
2026-03-19 | |
| CVE-2026-33303 | 5.4 | MEDIUM | CWE-79 | 0.0% p11 | 3.78 | OpenEMR is a free and open source electronic health records and medical practice...OpenEMR is a free and open source electronic health records and medical practice management application. Versions prior to 8.0.0.2 are vulnerable to stored cross-site scripting (XSS) via unescaped `portal_login_username` in the portal credential print view. A patient portal user can set their login username to an XSS payload, which then executes in a clinic staff member's browser when they open the "Create Portal Login" page for that patient. This crosses from the patient session context into the staff/admin session context. Version 8.0.0.2 fixes the issue. |
2026-03-19 | |
| CVE-2026-33302 | 7.3 | HIGH | CWE-863 | 0.1% p27 | 5.11 | OpenEMR is a free and open source electronic health records and medical practice...OpenEMR is a free and open source electronic health records and medical practice management application. Prior to 8.0.0.2, the module ACL function `AclMain::zhAclCheck()` only checks for the presence of any "allow" (user or group). It never checks for explicit "deny" (allowed=0). As a result, administrators cannot revoke access by setting a user or group to "deny"; if the user is in a group that has "allow," access is granted regardless of explicit denies. Version 8.0.0.2 fixes the issue. |
2026-03-19 | |
| CVE-2026-33301 | 7.1 | HIGH | CWE-116 | 0.1% p28 | 4.97 | OpenEMR is a free and open source electronic health records and medical practice...OpenEMR is a free and open source electronic health records and medical practice management application. Prior to 8.0.0.2, users with the `Notes - my encounters` role can fill Eye Exam forms in patient encounters. The answers to the form can be printed out in PDF form. An arbitrary file read vulnerability was identified in the PDF creation function where the form answers are parsed as unescaped HTML, allowing an attacker to include arbitrary image files from the server in the generated PDF. Version 8.0.0.2 fixes the issue. |
2026-03-19 | |
| CVE-2026-33299 | 8.5 | HIGH | CWE-79 | 0.2% p38 | 5.96 | OpenEMR is a free and open source electronic health records and medical practice...OpenEMR is a free and open source electronic health records and medical practice management application. Prior to 8.0.0.2, users with the `Notes - my encounters` role can fill **Eye Exam** forms in patient encounters. The answers to the form are displayed on the encounter page and in the visit history for the users with the same role. There exists a stored cross-site scripting (XSS) vulnerability in the function to display the form answers, allowing any authenticated attacker with the specific role to insert arbitrary JavaScript into the system by entering malicious payloads to the form answers. The JavaScript code is later executed by any user with the form role when viewing the form answers in the patient encounter pages or visit history. Version 8.0.0.2 fixes the issue. |
2026-03-19 | |
| CVE-2026-32749 | 7.6 | HIGH | CWE-22 | 0.1% p23 | 5.32 | SiYuan is a personal knowledge management system. In versions 3.6.0 and below, P...SiYuan is a personal knowledge management system. In versions 3.6.0 and below, POST /api/import/importSY and POST /api/import/importZipMd write uploaded archives to a path derived from the multipart filename field without sanitization, allowing an admin to write files to arbitrary locations outside the temp directory - including system paths that enable RCE. This can lead to aata destruction by overwriting workspace or application files, and for Docker containers running as root (common default), this grants full container compromise. This issue has been fixed in version 3.6.1. |
2026-03-19 | |
| CVE-2026-32747 | 6.8 | MEDIUM | CWE-22 | 0.1% p19 | 4.76 | SiYuan is a personal knowledge management system. In versions 3.6.0 and below, t...SiYuan is a personal knowledge management system. In versions 3.6.0 and below, the globalCopyFiles API eads source files using filepath.Abs() with no workspace boundary check, relying solely on util.IsSensitivePath() whose blocklist omits /proc/, /run/secrets/, and home directory dotfiles. An admin can copy /proc/1/environ or Docker secrets into the workspace and read them via the standard file API. An admin can exfiltrate any file readable by the SiYuan process that falls outside the incomplete blocklist. In containerized deployments this includes all injected secrets and environment variables - a common pattern for passing credentials to containers. The exfiltrated files are then accessible via the standard workspace file API and persist until manually deleted. This issue has been fixed in version 3.6.1. |
2026-03-19 | |
| CVE-2026-32622 | 8.6 | HIGH | CWE-20 | 0.3% p56 | 6.03 | SQLBot is an intelligent data query system based on a large language model and R...SQLBot is an intelligent data query system based on a large language model and RAG. Versions 1.5.0 and below contain a Stored Prompt Injection vulnerability that chains three flaws: a missing permission check on the Excel upload API allowing any authenticated user to upload malicious terminology, unsanitized storage of terminology descriptions containing dangerous payloads, and a lack of semantic fencing when injecting terminology into the LLM's system prompt. Together, these flaws allow an attacker to hijack the LLM's reasoning to generate malicious PostgreSQL commands (e.g., COPY ... TO PROGRAM), ultimately achieving Remote Code Execution on the database or application server with postgres user privileges. The issue is fixed in v1.6.0. |
2026-03-19 | |
| CVE-2026-32191 | 9.8 | CRITICAL | CWE-78 | 0.1% p28 | 6.86 | Improper neutralization of special elements used in an os command ('os command i...Improper neutralization of special elements used in an os command ('os command injection') in Microsoft Bing Images allows an unauthorized attacker to execute code over a network. |
2026-03-19 | |
| CVE-2026-32169 | 10.0 | CRITICAL | CWE-918 | 0.1% p26 | 7.00 | Server-side request forgery (ssrf) in Azure Cloud Shell allows an unauthorized a...Server-side request forgery (ssrf) in Azure Cloud Shell allows an unauthorized attacker to elevate privileges over a network. |
2026-03-19 | |
| CVE-2026-30924 | 9.0 | CRITICAL | CWE-942 | 0.0% p13 | 6.30 | qui is a web interface for managing qBittorrent instances. Versions 1.14.1 and b...qui is a web interface for managing qBittorrent instances. Versions 1.14.1 and below use a permissive CORS policy that reflects arbitrary origins while also returning Access-Control-Allow-Credentials: true, effectively allowing any external webpage to make authenticated requests on behalf of a logged-in user. An attacker can exploit this by tricking a victim into loading a malicious webpage, which silently interacts with the application using the victim's session and potentially exfiltrating sensitive data such as API keys and account credentials, or even achieving full system compromise through the built-in External Programs manager. Exploitation requires that the victim access the application via a non-localhost hostname and load an attacker-controlled webpage, making highly targeted social-engineering attacks the most likely real-world scenario. This issue was not fixed at the time of publication. |
2026-03-19 | |
| CVE-2026-30836 | 10.0 | CRITICAL | CWE-287 | 0.0% p0 | 7.00 | Step CA is an online certificate authority for secure, automated certificate man...Step CA is an online certificate authority for secure, automated certificate management for DevOps. Versions 0.30.0-rc6 and below do not safeguard against unauthenticated certificate issuance through the SCEP UpdateReq. This issue has been fixed in version 0.30.0. |
2026-03-19 | |
| CVE-2026-27953 | 7.1 | HIGH | CWE-20 | 0.2% p48 | 4.98 | ormar is a async mini ORM for Python. Versions 0.23.0 and below are vulnerable t...ormar is a async mini ORM for Python. Versions 0.23.0 and below are vulnerable to Pydantic validation bypass through the model constructor, allowing any unauthenticated user to skip all field validation by injecting "__pk_only__": true into a JSON request body. By injecting "__pk_only__": true into a JSON request body, an unauthenticated attacker can skip all field validation and persist unvalidated data directly to the database. A secondary __excluded__ parameter injection uses the same pattern to selectively nullify arbitrary model fields (e.g., email or role) during construction. This affects ormar's canonical FastAPI integration pattern recommended in its official documentation, enabling privilege escalation, data integrity violations, and business logic bypass in any application using ormar.Model directly as a request body parameter. This issue has been fixed in version 0.23.1. |
2026-03-19 | |
| CVE-2026-27740 | 5.1 | MEDIUM | CWE-79 | 0.0% p8 | 3.57 | Discourse is an open-source discussion platform. Versions prior to 2026.3.0-late...Discourse is an open-source discussion platform. Versions prior to 2026.3.0-latest.1, 2026.2.1, and 2026.1.2 have a cross-site scripting vulnerability that arises because the system trusts the raw output from an AI Large Language Model (LLM) and renders it using htmlSafe in the Review Queue interface without adequate sanitization. A malicious attacker can use valid Prompt Injection techniques to force the AI to return a malicious payload (e.g., tags). When a Staff member (Admin/Moderator) views the flagged post in the Review Queue, the payload executes. Versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2 contain a patch. As a workaround, temporarily disable AI triage automation scripts. |
2026-03-19 | |
| CVE-2026-27570 | 5.1 | MEDIUM | CWE-79 | 0.0% p1 | 3.57 | Discourse is an open-source discussion platform. Prior to versions 2026.3.0-late...Discourse is an open-source discussion platform. Prior to versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2, the onebox method in the SharedAiConversation model renders the conversation title directly into HTML without proper sanitization. Versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2 contain a patch. As a workaround, tighten access by changing the `ai_bot_public_sharing_allowed_groups` site setting. |
2026-03-19 | |
| CVE-2026-27491 | 6.9 | MEDIUM | CWE-862 | 0.0% p7 | 4.83 | Discourse is an open-source discussion platform. Prior to versions 2026.3.0-late...Discourse is an open-source discussion platform. Prior to versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2, a type coercion issue in a post actions API endpoint allowed non-staff users to issue warnings to other users. Warnings are a staff-only moderation feature. The vulnerability required the attacker to be a logged-in user and to send a specifically crafted request. No data exposure or privilege escalation beyond the ability to create unauthorized user warnings was possible. Versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2 contain a patch. No known workarounds are available. |
2026-03-19 | |
| CVE-2026-27454 | 5.3 | MEDIUM | CWE-862 | 0.0% p10 | 3.71 | Discourse is an open-source discussion platform. Prior to versions 2026.3.0-late...Discourse is an open-source discussion platform. Prior to versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2, requesting /posts/:id.json?version=X bypassed authorization checks on post revisions. The display_post method called post.revert_to directly without verifying whether the revision was hidden or if the user had permission to view edit history. This meant hidden revisions (intentionally concealed by staff) could be read by any user by simply enumerating version numbers. Starting in versions 2026.3.0-latest.1, 2026.2.1, and 2026.1.2, Discourse looks up the PostRevision and call guardian.ensure_can_see! before reverting, consistent with how the /posts/:id/revisions/:revision endpoint already authorizes access. No known workarounds are available. |
2026-03-19 | |
| CVE-2026-27166 | 4.1 | MEDIUM | CWE-80 | 0.0% p8 | 2.87 | Discourse is an open source discussion platform. Prior to versions 2026.3.0-late...Discourse is an open source discussion platform. Prior to versions 2026.3.0-latest.1, 2026.2.1 and 2026.1.2, insufficient cleanup in the default Codepen allowed iframes value allows an attacker to trick a user into changing the URL of the main page. This issue has been fixed in versions 2026.3.0-latest.1, 2026.2.1 and 2026.1.2. To workaround this issue, remove Codepen from the list of allowed iframes. |
2026-03-19 | |
| CVE-2026-26139 | 8.6 | HIGH | CWE-918 | 0.1% p25 | 6.02 | Server-side request forgery (ssrf) in Microsoft Purview allows an unauthorized a...Server-side request forgery (ssrf) in Microsoft Purview allows an unauthorized attacker to elevate privileges over a network. |
2026-03-19 | |
| CVE-2026-26138 | 8.6 | HIGH | CWE-918 | 0.1% p25 | 6.02 | Server-side request forgery (ssrf) in Microsoft Purview allows an unauthorized a...Server-side request forgery (ssrf) in Microsoft Purview allows an unauthorized attacker to elevate privileges over a network. |
2026-03-19 | |
| CVE-2026-26137 | 9.9 | CRITICAL | CWE-918 | 0.0% p12 | 6.93 | Server-side request forgery (ssrf) in Microsoft Exchange allows an authorized at...Server-side request forgery (ssrf) in Microsoft Exchange allows an authorized attacker to elevate privileges over a network. |
2026-03-19 | |
| CVE-2026-26136 | 6.5 | MEDIUM | CWE-77 | 0.1% p21 | 4.55 | Improper neutralization of special elements used in a command ('command injectio...Improper neutralization of special elements used in a command ('command injection') in Microsoft Copilot allows an unauthorized attacker to disclose information over a network. |
2026-03-19 | |
| CVE-2026-26120 | 6.5 | MEDIUM | CWE-918 | 0.1% p23 | 4.55 | Server-side request forgery (ssrf) in Microsoft Bing allows an unauthorized atta...Server-side request forgery (ssrf) in Microsoft Bing allows an unauthorized attacker to perform tampering over a network. |
2026-03-19 | |
| CVE-2026-24299 | 5.3 | MEDIUM | CWE-77 | 0.0% p10 | 3.71 | Improper neutralization of special elements used in a command ('command injectio...Improper neutralization of special elements used in a command ('command injection') in M365 Copilot allows an unauthorized attacker to disclose information over a network. |
2026-03-19 | |
| CVE-2026-23659 | 8.6 | HIGH | CWE-200 | 0.1% p24 | 6.02 | Exposure of sensitive information to an unauthorized actor in Azure Data Factory...Exposure of sensitive information to an unauthorized actor in Azure Data Factory allows an unauthorized attacker to disclose information over a network. |
2026-03-19 | |
| CVE-2026-23658 | 8.6 | HIGH | CWE-522 | 0.1% p25 | 6.02 | Insufficiently protected credentials in Azure DevOps allows an unauthorized atta...Insufficiently protected credentials in Azure DevOps allows an unauthorized attacker to elevate privileges over a network. |
2026-03-19 | |
| CVE-2026-3580 | 2.1 | LOW | CWE-203 | 0.0% p2 | 1.47 | In wolfSSL 5.8.4, constant-time masking logic in sp_256_get_entry_256_9 is optim...In wolfSSL 5.8.4, constant-time masking logic in sp_256_get_entry_256_9 is optimized into conditional branches (bnez) by GCC when targeting RISC-V RV32I with -O3. This transformation breaks the side-channel resistance of ECC scalar multiplication, potentially allowing a local attacker to recover secret keys via timing analysis. |
2026-03-19 | |
| CVE-2026-3579 | 2.1 | LOW | CWE-203 | 0.0% p8 | 1.47 | wolfSSL 5.8.4 on RISC-V RV32I architectures lacks a constant-time software imple...wolfSSL 5.8.4 on RISC-V RV32I architectures lacks a constant-time software implementation for 64-bit multiplication. The compiler-inserted __muldi3 subroutine executes in variable time based on operand values. This affects multiple SP math functions (sp_256_mul_9, sp_256_sqr_9, etc.), leading to a timing side-channel that may expose sensitive cryptographic data. |
2026-03-19 | |
| CVE-2026-32238 | 9.1 | CRITICAL | CWE-78 | 0.4% p61 | 6.38 | OpenEMR is a free and open source electronic health records and medical practice...OpenEMR is a free and open source electronic health records and medical practice management application. Versions prior to 8.0.0.2 contain a Command injection vulnerability in the backup functionality that can be exploited by authenticated attackers. The vulnerability exists due to insufficient input validation in the backup functionality. Version 8.0.0.2 fixes the issue. |
2026-03-19 | |
| CVE-2026-32119 | 4.4 | MEDIUM | CWE-79 | 0.0% p1 | 3.08 | OpenEMR is a free and open source electronic health records and medical practice...OpenEMR is a free and open source electronic health records and medical practice management application. Prior to 8.0.0.2, DOM-based stored XSS in the jQuery SearchHighlight plugin (`library/js/SearchHighlight.js`) allows an authenticated user with encounter form write access to inject arbitrary JavaScript that executes in another clinician's browser session when they use the search/find feature on the Custom Report page. The plugin reverses server-side HTML entity encoding by reading decoded text from DOM text nodes, concatenating it into a raw HTML string, and passing it to jQuery's `$()` constructor for HTML parsing. Version 8.0.0.2 fixes the issue. |
2026-03-19 | |
| CVE-2026-25928 | 6.5 | MEDIUM | CWE-22 | 0.0% p4 | 4.55 | OpenEMR is a free and open source electronic health records and medical practice...OpenEMR is a free and open source electronic health records and medical practice management application. Prior to 8.0.0.2, the DICOM zip/export feature uses a user-supplied destination or path component when creating the zip file, without sanitizing path traversal sequences (e.g. `../`). An attacker with DICOM upload/export permission can write files outside the intended directory, potentially under the web root, leading to arbitrary file write and possibly remote code execution if PHP or other executable files can be written. Version 8.0.0.2 fixes the issue. |
2026-03-19 | |
| CVE-2026-25744 | 6.5 | MEDIUM | CWE-639 | 0.1% p27 | 4.55 | OpenEMR is a free and open source electronic health records and medical practice...OpenEMR is a free and open source electronic health records and medical practice management application. Prior to 8.0.0.2, the encounter vitals API accepts an `id` in the request body and treats it as an UPDATE. There is no verification that the vital belongs to the current patient or encounter. An authenticated user with encounters/notes permission can overwrite any patient's vitals by supplying another patient's vital `id`, leading to medical record tampering. Version 8.0.0.2 fixes the issue. |
2026-03-19 | |
| CVE-2026-25667 | 7.5 | HIGH | CWE-400 | 2.4% p85 | 5.32 | ASP.NET Core Kestrel in Microsoft .NET 8.0 before 8.0.22 and .NET 9.0 before 9.0...ASP.NET Core Kestrel in Microsoft .NET 8.0 before 8.0.22 and .NET 9.0 before 9.0.11 allows a remote attacker to cause excessive CPU consumption by sending a crafted QUIC packet, because of an incorrect exit condition for HTTP/3 Encoder/Decoder stream processing. |
2026-03-19 | |
| CVE-2026-3548 | 7.2 | HIGH | CWE-122 | 0.0% p5 | 5.04 | Two buffer overflow vulnerabilities existed in the wolfSSL CRL parser when parsi...Two buffer overflow vulnerabilities existed in the wolfSSL CRL parser when parsing CRL numbers: a heap-based buffer overflow could occur when improperly storing the CRL number as a hexadecimal string, and a stack-based overflow for sufficiently sized CRL numbers. With appropriately crafted CRLs, either of these out of bound writes could be triggered. Note this only affects builds that specifically enable CRL support, and the user would need to load a CRL from an untrusted source. |
2026-03-19 | |
| CVE-2026-30694 | 9.8 | CRITICAL | CWE-94 | 0.3% p51 | 6.87 | An issue in DedeCMS v.5.7.118 and before allows a remote attacker to execute arb...An issue in DedeCMS v.5.7.118 and before allows a remote attacker to execute arbitrary code via the array_filter component |
2026-03-19 | |
| CVE-2026-2646 | 5.0 | MEDIUM | CWE-122 | 0.0% p2 | 3.50 | A heap-buffer-overflow vulnerability exists in wolfSSL's wolfSSL_d2i_SSL_SESSION...A heap-buffer-overflow vulnerability exists in wolfSSL's wolfSSL_d2i_SSL_SESSION() function. When deserializing session data with SESSION_CERTS enabled, certificate and session id lengths are read from an untrusted input without bounds validation, allowing an attacker to overflow fixed-size buffers and corrupt heap memory. A maliciously crafted session would need to be loaded from an external source to trigger this vulnerability. Internal sessions were not vulnerable. |
2026-03-19 | |
| CVE-2026-2645 | 5.5 | MEDIUM | CWE-358 | 0.0% p8 | 3.85 | In wolfSSL 5.8.2 and earlier, a logic flaw existed in the TLS 1.2 server state m...In wolfSSL 5.8.2 and earlier, a logic flaw existed in the TLS 1.2 server state machine implementation. The server could incorrectly accept the CertificateVerify message before the ClientKeyExchange message had been received. This issue affects wolfSSL before 5.8.4 (wolfSSL 5.8.2 and earlier is vulnerable, 5.8.4 is not vulnerable). In 5.8.4 wolfSSL would detect the issue later in the handshake. 5.9.0 was further hardened to catch the issue earlier in the handshake. |
2026-03-19 | |
| CVE-2026-26940 | 6.5 | MEDIUM | CWE-1284 | 0.1% p17 | 4.55 | Improper Validation of Specified Quantity in Input (CWE-1284) in the Timelion vi...Improper Validation of Specified Quantity in Input (CWE-1284) in the Timelion visualization plugin in Kibana can lead Denial of Service via Excessive Allocation (CAPEC-130). The vulnerability allows an authenticated user to send a specially crafted Timelion expression that overwrites internal series data properties with an excessively large quantity value. |
2026-03-19 | |
| CVE-2026-26939 | 6.5 | MEDIUM | CWE-862 | 0.0% p8 | 4.55 | Missing Authorization (CWE-862) in Kibana’s server-side Detection Rule Managemen...Missing Authorization (CWE-862) in Kibana’s server-side Detection Rule Management can lead to Unauthorized Endpoint Response Action Configuration (host isolation, process termination, and process suspension) via CAPEC-1 (Accessing Functionality Not Properly Constrained by ACLs). This requires an authenticated attacker with rule management privileges. |
2026-03-19 | |
| CVE-2026-26933 | 5.7 | MEDIUM | CWE-129 | 0.0% p0 | 3.99 | Improper Validation of Array Index (CWE-129) in multiple protocol parser compone...Improper Validation of Array Index (CWE-129) in multiple protocol parser components in Packetbeat can lead Denial of Service via Input Data Manipulation (CAPEC-153). An attacker with the ability to send specially crafted, malformed network packets to a monitored network interface can trigger out-of-bounds read operations, resulting in application crashes or resource exhaustion. This requires the attacker to be positioned on the same network segment as the Packetbeat deployment or to control traffic routed to monitored interfaces. |
2026-03-19 | |
| CVE-2025-67115 | 6.5 | MEDIUM | CWE-22 | 0.0% p14 | 4.55 | A path traversal vulnerability in /ftl/web/setup.cgi in Small Cell Sercomm SCE42...A path traversal vulnerability in /ftl/web/setup.cgi in Small Cell Sercomm SCE4255W (FreedomFi Englewood) firmware before DG3934v3@2308041842 allows remote authenticated users to read arbitrary files from the filesystem via crafted values in the log_type parameter to /logsave.htm. |
2026-03-19 | |
| CVE-2025-67114 | 9.8 | CRITICAL | CWE-1391 | 0.4% p62 | 6.87 | Use of a deterministic credential generation algorithm in /ftl/bin/calc_f2 in Sm...Use of a deterministic credential generation algorithm in /ftl/bin/calc_f2 in Small Cell Sercomm SCE4255W (FreedomFi Englewood) firmware before DG3934v3@2308041842 allows remote attackers to derive valid administrative/root credentials from the device's MAC address, enabling authentication bypass and full device access. |
2026-03-19 | |
| CVE-2025-67113 | 9.8 | CRITICAL | CWE-94 | 0.5% p64 | 6.87 | OS command injection in the CWMP client (/ftl/bin/cwmp) of Small Cell Sercomm SC...OS command injection in the CWMP client (/ftl/bin/cwmp) of Small Cell Sercomm SCE4255W (FreedomFi Englewood) firmware before DG3934v3@2308041842 allows remote attackers controlling the ACS endpoint to execute arbitrary commands as root via a crafted TR-069 Download URL that is passed unescaped into the firmware upgrade pipeline. |
2026-03-19 | |
| CVE-2025-67112 | 9.8 | CRITICAL | CWE-321 | 0.1% p33 | 6.86 | Use of a hard-coded AES-256-CBC key in the configuration backup/restore implemen...Use of a hard-coded AES-256-CBC key in the configuration backup/restore implementation of Small Cell Sercomm SCE4255W (FreedomFi Englewood) firmware before DG3934v3@2308041842 allows remote authenticated users to decrypt, modify, and re-encrypt device configurations, enabling credential manipulation and privilege escalation via the GUI import/export functions. |
2026-03-19 | |
| CVE-2026-30403 | 7.5 | HIGH | CWE-22 | 0.1% p15 | 5.25 | There is an arbitrary file read vulnerability in the test connection function of...There is an arbitrary file read vulnerability in the test connection function of backend database management in wgcloud v3.6.3 and before, which can be used to read any file on the victim's server. |
2026-03-19 | |
| CVE-2026-26931 | 5.7 | MEDIUM | CWE-789 | 0.0% p4 | 3.99 | Memory Allocation with Excessive Size Value (CWE-789) in the Prometheus remote_w...Memory Allocation with Excessive Size Value (CWE-789) in the Prometheus remote_write HTTP handler in Metricbeat can lead Denial of Service via Excessive Allocation (CAPEC-130). |
2026-03-19 | |
| CVE-2026-1005 | 2.1 | LOW | CWE-191 | 0.1% p19 | 1.47 | Integer underflow in wolfSSL packet sniffer <= 5.8.4 allows an attacker to cause...Integer underflow in wolfSSL packet sniffer <= 5.8.4 allows an attacker to cause a buffer overflow in the AEAD decryption path by injecting a TLS record shorter than the explicit IV plus authentication tag into traffic inspected by ssl_DecodePacket. The underflow wraps a 16-bit length to a large value that is passed to AEAD decryption routines, causing heap buffer overflow and a crash. An unauthenticated attacker can trigger this remotely via malformed TLS Application Data records. |
2026-03-19 | |
| CVE-2026-0819 | 2.2 | LOW | CWE-121 | 0.0% p5 | 1.54 | A stack buffer overflow vulnerability exists in wolfSSL's PKCS7 SignedData encod...A stack buffer overflow vulnerability exists in wolfSSL's PKCS7 SignedData encoding functionality. In wc_PKCS7_BuildSignedAttributes(), when adding custom signed attributes, the code passes an incorrect capacity value (esd->signedAttribsCount) to EncodeAttributes() instead of the remaining available space in the fixed-size signedAttribs[7] array. When an application sets pkcs7->signedAttribsSz to a value greater than MAX_SIGNED_ATTRIBS_SZ (default 7) minus the number of default attributes already added, EncodeAttributes() writes beyond the array bounds, causing stack memory corruption. In WOLFSSL_SMALL_STACK builds, this becomes heap corruption. Exploitation requires an application that allows untrusted input to control the signedAttribs array size when calling wc_PKCS7_EncodeSignedData() or related signing functions. |
2026-03-19 | |
| CVE-2026-3029 | 7.5 | HIGH | N/A | 0.1% p18 | 5.25 | A path traversal and arbitrary file write vulnerability exist in the embedded ge...A path traversal and arbitrary file write vulnerability exist in the embedded get function in '_main_.py' in PyMuPDF version, 1.26.5. |
2026-03-19 | |
| CVE-2026-32869 | 5.1 | MEDIUM | CWE-79 | 0.0% p8 | 3.57 | OPEXUS eComplaint and eCASE before 10.2.0.0 do not correctly sanitize the conten...OPEXUS eComplaint and eCASE before 10.2.0.0 do not correctly sanitize the contents of the "Name of Organization" field when filling out case information. An authenticated attacker can inject an XSS payload which is executed in the context of a victim's session when they visit the case information page. |
2026-03-19 | |
| CVE-2026-32868 | 5.1 | MEDIUM | CWE-79 | 0.0% p8 | 3.57 | OPEXUS eComplaint and eCASE before 10.2.0.0 do not correctly sanitize the conten...OPEXUS eComplaint and eCASE before 10.2.0.0 do not correctly sanitize the contents of first and last name fields in the 'My Information' screen. An authenticated attacker can inject parts of an XSS payload in the first and last name fields. The payload is executed when the full name is rendered. The attacker can run script in the context of a victim's session. |
2026-03-19 | |
| CVE-2026-32867 | 5.3 | MEDIUM | CWE-425 | 0.1% p17 | 3.71 | OPEXUS eComplaint before version 10.1.0.0 allows an unauthenticated attacker to ...OPEXUS eComplaint before version 10.1.0.0 allows an unauthenticated attacker to obtain or guess an existing case number and upload arbitrary files via 'Portal/EEOC/DocumentUploadPub.aspx'. Users would see these unexpected files in cases. Uploading a large number of files could consume storage. |
2026-03-19 | |
| CVE-2026-32866 | 5.1 | MEDIUM | CWE-79 | 0.0% p8 | 3.57 | OPEXUS eComplaint and eCASE before 10.2.0.0 do not correctly sanitize the conten...OPEXUS eComplaint and eCASE before 10.2.0.0 do not correctly sanitize the contents of first and last name fields in a user profile. An authenticated attacker can inject parts of an XSS payload in their first and last name fields. The payload is executed when the user's full name is rendered. The attacker can run script in the context of a victim's session. |
2026-03-19 | |
| CVE-2026-32865 | 9.2 | CRITICAL | CWE-200 | 0.1% p17 | 6.44 | OPEXUS eComplaint and eCASE before version 10.1.0.0 include the secret verificat...OPEXUS eComplaint and eCASE before version 10.1.0.0 include the secret verification code in the HTTP response when requesting a password reset via 'ForcePasswordReset.aspx'. An attacker who knows an existing user's email address can reset the user's password and security questions. Existing security questions are not asked during the process. |
2026-03-19 | |
| CVE-2026-30404 | 7.5 | HIGH | CWE-918 | 0.0% p10 | 5.25 | The backend database management connection test feature in wgcloud v3.6.3 has a ...The backend database management connection test feature in wgcloud v3.6.3 has a server-side request forgery (SSRF) vulnerability. This issue can be exploited to make the server send requests to probe the internal network, remotely download malicious files, and perform other dangerous operations. |
2026-03-19 | |
| CVE-2026-4427 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: Duplicate of CVE-2026-32286Rejected reason: Duplicate of CVE-2026-32286 |
2026-03-19 | |
| CVE-2026-4426 | 6.5 | MEDIUM | CWE-1335 | 0.1% p31 | 4.55 | A flaw was found in libarchive. An Undefined Behavior vulnerability exists in th...A flaw was found in libarchive. An Undefined Behavior vulnerability exists in the zisofs decompression logic, caused by improper validation of a field (`pz_log2_bs`) read from ISO9660 Rock Ridge extensions. A remote attacker can exploit this by supplying a specially crafted ISO file. This can lead to incorrect memory allocation and potential application crashes, resulting in a denial-of-service (DoS) condition. |
2026-03-19 | |
| CVE-2026-4424 | 7.5 | HIGH | CWE-125 | 0.2% p38 | 5.26 | A flaw was found in libarchive. This heap out-of-bounds read vulnerability exist...A flaw was found in libarchive. This heap out-of-bounds read vulnerability exists in the RAR archive processing logic due to improper validation of the LZSS sliding window size after transitions between compression methods. A remote attacker can exploit this by providing a specially crafted RAR archive, leading to the disclosure of sensitive heap memory information without requiring authentication or user interaction. |
2026-03-19 | |
| CVE-2026-32843 | 5.1 | MEDIUM | CWE-79 | 0.3% p50 | 3.58 | Location Aware Sensor System by Linkit ONE, up to commit f06bd20 (2023-04-26), c...Location Aware Sensor System by Linkit ONE, up to commit f06bd20 (2023-04-26), contains a reflected cross-site scripting vulnerability in the PM25.php file that allows remote attackers to execute arbitrary JavaScript by injecting malicious code into GET parameters. Attackers can craft a malicious URL containing unencoded payloads in the site, city, district, channel, or apikey parameters to execute scripts in victims' browsers when they visit the page. |
2026-03-19 | |
| CVE-2026-30711 | 8.8 | HIGH | CWE-89 | 0.0% p9 | 6.16 | Devome GRR v4.5.0 was discovered to contain multiple authenticated SQL injection...Devome GRR v4.5.0 was discovered to contain multiple authenticated SQL injection vulnerabilities in the include/session.inc.php file via the referer and user-agent. |
2026-03-19 | |
| CVE-2026-30402 | 9.8 | CRITICAL | CWE-94 | 0.4% p59 | 6.87 | An issue in wgcloud v.2.3.7 and before allows a remote attacker to execute arbit...An issue in wgcloud v.2.3.7 and before allows a remote attacker to execute arbitrary code via the test connection function |
2026-03-19 | |
| CVE-2026-2369 | 6.5 | MEDIUM | CWE-191 | 0.0% p14 | 4.55 | A flaw was found in libsoup. An integer underflow vulnerability occurs when proc...A flaw was found in libsoup. An integer underflow vulnerability occurs when processing content with a zero-length resource, leading to a buffer overread. This can allow an attacker to potentially access sensitive information or cause an application level denial of service. |
2026-03-19 | |
| CVE-2026-27043 | 7.2 | HIGH | CWE-434 | 0.1% p16 | 5.04 | Unrestricted Upload of File with Dangerous Type vulnerability in ThemeGoods Phot...Unrestricted Upload of File with Dangerous Type vulnerability in ThemeGoods Photography allows Path Traversal.This issue affects Photography: from n/a before 7.7.6. |
2026-03-19 | |
| CVE-2026-22558 | 7.7 | HIGH | CWE-943 | 0.0% p1 | 5.39 | An Authenticated NoSQL Injection vulnerability found in UniFi Network Applicatio...An Authenticated NoSQL Injection vulnerability found in UniFi Network Application could allow a malicious actor with authenticated access to the network to escalate privileges. |
2026-03-19 | |
| CVE-2026-22557 | 10.0 | CRITICAL | CWE-22 | 0.0% p9 | 7.00 | A malicious actor with access to the network could exploit a Path Traversal vuln...A malicious actor with access to the network could exploit a Path Traversal vulnerability found in the UniFi Network Application to access files on the underlying system that could be manipulated to access an underlying account. |
2026-03-19 | |
| CVE-2025-69720 | 7.3 | HIGH | CWE-121 | 0.0% p5 | 5.11 | The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based b...The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c. |
2026-03-19 | |
| CVE-2025-71260 | 8.7 | HIGH | CWE-502 | 11.3% p93 | 6.43 | BMC FootPrints ITSM versions 20.20.02 through 20.24.01.001 contain a deserializa...BMC FootPrints ITSM versions 20.20.02 through 20.24.01.001 contain a deserialization of untrusted data vulnerability in the ASP.NET servlet's VIEWSTATE handling that allows authenticated attackers to execute arbitrary code. Attackers can supply crafted serialized objects to the VIEWSTATE parameter to achieve remote code execution and fully compromise the application. The following hotfixes remediate the vulnerability: 20.20.02, 20.20.03.002, 20.21.01.001, 20.21.02.002, 20.22.01, 20.22.01.001, 20.23.01, 20.23.01.002, and 20.24.01. |
2026-03-19 | |
| CVE-2025-71259 | 5.3 | MEDIUM | CWE-918 | 2.7% p85 | 3.79 | BMC FootPrints ITSM versions 20.20.02 through 20.24.01.001 contain a blind serve...BMC FootPrints ITSM versions 20.20.02 through 20.24.01.001 contain a blind server-side request forgery vulnerability in the externalfeed/RSS API component that allows authenticated attackers to trigger arbitrary outbound requests from the server. Attackers can exploit insufficient validation of externally supplied resource references to interact with internal services or cause resource exhaustion impacting availability. The following hotfixes remediate the vulnerability: 20.20.02, 20.20.03.002, 20.21.01.001, 20.21.02.002, 20.22.01, 20.22.01.001, 20.23.01, 20.23.01.002, and 20.24.01. |
2026-03-19 | |
| CVE-2025-71258 | 5.3 | MEDIUM | CWE-918 | 2.6% p85 | 3.79 | BMC FootPrints ITSM versions 20.20.02 through 20.24.01.001 contain a blind serve...BMC FootPrints ITSM versions 20.20.02 through 20.24.01.001 contain a blind server-side request forgery vulnerability in the searchWeb API component that allows authenticated attackers to cause the server to initiate arbitrary outbound requests. Attackers can exploit improper URL validation to perform internal network scanning or interact with internal services, impacting system availability. The following hotfixes remediate the vulnerability: 20.20.02, 20.20.03.002, 20.21.01.001, 20.21.02.002, 20.22.01, 20.22.01.001, 20.23.01, 20.23.01.002, and 20.24.01. |
2026-03-19 | |
| CVE-2025-71257 | 6.9 | MEDIUM | CWE-306 | 5.3% p90 | 4.99 | BMC FootPrints ITSM versions 20.20.02 through 20.24.01.001 contain an authentica...BMC FootPrints ITSM versions 20.20.02 through 20.24.01.001 contain an authentication bypass vulnerability due to improper enforcement of security filters on restricted REST API endpoints and servlets. Unauthenticated remote attackers can bypass access controls to invoke restricted functionality and gain unauthorized access to application data and modify system resources. The following hotfixes remediate the vulnerability: 20.20.02, 20.20.03.002, 20.21.01.001, 20.21.02.002, 20.22.01, 20.22.01.001, 20.23.01, 20.23.01.002, and 20.24.01. |
2026-03-19 | |
| CVE-2026-3658 | 7.5 | HIGH | CWE-89 | 0.1% p27 | 5.25 | The Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin p...The Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin plugin for WordPress is vulnerable to SQL Injection via the 'fields' parameter in all versions up to, and including, 1.6.10.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database, including usernames, email addresses, and password hashes. |
2026-03-19 | |
| CVE-2026-3511 | 8.6 | HIGH | CWE-611 | 0.1% p18 | 6.02 | Improper Restriction of XML External Entity Reference vulnerability in XMLUtils....Improper Restriction of XML External Entity Reference vulnerability in XMLUtils.java in Slovensko.Digital Autogram allows remote unauthenticated attacker to conduct SSRF (Server Side Request Forgery) attacks and obtain unauthorized access to local files on filesystems running the vulnerable application. Successful exploitation requires the victim to visit a specially crafted website that sends request containing a specially crafted XML document to /sign endpoint of the local HTTP server run by the application. |
2026-03-19 | |
| CVE-2025-14716 | 6.5 | MEDIUM | CWE-287 | 0.0% p13 | 4.55 | Improper Authentication vulnerability in Secomea GateManager (webserver modules)...Improper Authentication vulnerability in Secomea GateManager (webserver modules) allows Authentication Bypass.This issue affects GateManager: 11.4;0. |
2026-03-19 | |
| CVE-2026-27070 | 7.1 | HIGH | CWE-79 | 0.0% p10 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPEverest Everest Forms Pro allows Stored XSS.This issue affects Everest Forms Pro: from n/a through 1.9.10. |
2026-03-19 | |
| CVE-2026-27068 | 0.0 | NONE | CWE-79 | 0.0% p11 | 0.00 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Ryan Howard Website LLMs.txt website-llms-txt allows Reflected XSS.This issue affects Website LLMs.txt: from n/a through <= 8.2.6. |
2026-03-19 | |
| CVE-2026-27067 | 0.0 | NONE | CWE-434 | 0.0% p6 | 0.00 | Unrestricted Upload of File with Dangerous Type vulnerability in Syarif Mobile A...Unrestricted Upload of File with Dangerous Type vulnerability in Syarif Mobile App Editor mobile-app-editor allows Upload a Web Shell to a Web Server.This issue affects Mobile App Editor: from n/a through <= 1.3.1. |
2026-03-19 | |
| CVE-2026-27065 | 0.0 | NONE | CWE-98 | 0.1% p21 | 0.00 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThimPress BuilderPress builderpress allows PHP Local File Inclusion.This issue affects BuilderPress: from n/a through <= 2.0.1. |
2026-03-19 | |
| CVE-2026-25445 | 8.8 | HIGH | CWE-502 | 0.1% p16 | 6.16 | Deserialization of Untrusted Data vulnerability in Membership Software WishList ...Deserialization of Untrusted Data vulnerability in Membership Software WishList Member X allows Object Injection.This issue affects WishList Member X: from n/a through 3.29.0. |
2026-03-19 | |
| CVE-2026-25443 | 0.0 | NONE | CWE-862 | 0.0% p5 | 0.00 | Missing Authorization vulnerability in Dotstore Fraud Prevention For Woocommerce...Missing Authorization vulnerability in Dotstore Fraud Prevention For Woocommerce woo-blocker-lite-prevent-fake-orders-and-blacklist-fraud-customers allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Fraud Prevention For Woocommerce: from n/a through <= 2.3.3. |
2026-03-19 | |
| CVE-2026-25442 | 0.0 | NONE | CWE-79 | 0.0% p11 | 0.00 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in QantumThemes Kentha kentha allows Reflected XSS.This issue affects Kentha: from n/a through <= 4.7.2. |
2026-03-19 | |
| CVE-2026-25438 | 0.0 | NONE | CWE-79 | 0.0% p11 | 0.00 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ThemeHunk Gutenberg Blocks unlimited-blocks allows Reflected XSS.This issue affects Gutenberg Blocks: from n/a through <= 1.2.8. |
2026-03-19 | |
| CVE-2026-21788 | 5.4 | MEDIUM | CWE-79 | 0.0% p12 | 3.78 | HCL Connections is vulnerable to a cross-site scripting attack where an attacker...HCL Connections is vulnerable to a cross-site scripting attack where an attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user which leads to executing malicious script code. This may allow the attacker steal cookie-based authentication credentials and comprise user's account then launch other attacks. |
2026-03-19 | |
| CVE-2025-68836 | 7.1 | HIGH | CWE-79 | 0.0% p10 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Markbeljaars Table of Contents Creator allows Reflected XSS.This issue affects Table of Contents Creator: from n/a through 1.6.4.1. |
2026-03-19 | |
| CVE-2025-67618 | 7.1 | HIGH | CWE-79 | 0.0% p10 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ArtstudioWorks Brookside allows Reflected XSS.This issue affects Brookside: from n/a through 1.4. |
2026-03-19 | |
| CVE-2025-62043 | 6.5 | MEDIUM | CWE-79 | 0.0% p3 | 4.55 | Improper neutralization of input during web page generation ('cross-site scripti...Improper neutralization of input during web page generation ('cross-site scripting') vulnerability in WPSight WPCasa allows DOM-Based XSS.This issue affects WPCasa: from n/a through 1.4.1. |
2026-03-19 | |
| CVE-2025-60237 | 9.8 | CRITICAL | CWE-502 | 0.1% p16 | 6.86 | Deserialization of Untrusted Data vulnerability in Themeton Finag allows Object ...Deserialization of Untrusted Data vulnerability in Themeton Finag allows Object Injection.This issue affects Finag: from n/a through 1.5.0. |
2026-03-19 | |
| CVE-2025-60233 | 9.8 | CRITICAL | CWE-502 | 0.1% p16 | 6.86 | Deserialization of Untrusted Data vulnerability in Themeton Zuut allows Object I...Deserialization of Untrusted Data vulnerability in Themeton Zuut allows Object Injection.This issue affects Zuut: from n/a through 1.4.2. |
2026-03-19 | |
| CVE-2025-53222 | 0.0 | NONE | CWE-79 | 0.0% p11 | 0.00 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in tagDiv tagDiv Opt-In Builder td-subscription allows Reflected XSS.This issue affects tagDiv Opt-In Builder: from n/a through <= 1.7.3. |
2026-03-19 | |
| CVE-2025-50001 | 0.0 | NONE | CWE-79 | 0.0% p11 | 0.00 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in tagDiv tagDiv Composer td-composer allows Reflected XSS.This issue affects tagDiv Composer: from n/a through <= 5.4.2. |
2026-03-19 | |
| CVE-2025-32223 | 0.0 | NONE | CWE-639 | 0.0% p5 | 0.00 | Authorization Bypass Through User-Controlled Key vulnerability in Themeum Tutor ...Authorization Bypass Through User-Controlled Key vulnerability in Themeum Tutor LMS tutor allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Tutor LMS: from n/a through <= 3.9.4. |
2026-03-19 | |
| CVE-2026-3475 | 5.3 | MEDIUM | CWE-862 | 0.1% p18 | 3.71 | The Instant Popup Builder plugin for WordPress is vulnerable to Unauthenticated ...The Instant Popup Builder plugin for WordPress is vulnerable to Unauthenticated Arbitrary Shortcode Execution in all versions up to and including 1.1.7. This is due to the handle_email_verification_page() function constructing a shortcode string from user-supplied GET parameters (token, email) and passing it to do_shortcode() without properly sanitizing square bracket characters, combined with missing authorization checks on the init hook. While sanitize_text_field() and esc_attr() are applied, neither function strips or escapes square bracket characters ([ and ]). WordPress's shortcode regex uses [^\]\/]* to match content inside shortcode tags, meaning a ] character in the token value prematurely closes the shortcode tag. This makes it possible for unauthenticated attackers to inject and execute arbitrary registered shortcodes by crafting a malicious token parameter containing ] followed by arbitrary shortcode syntax. |
2026-03-19 | |
| CVE-2026-25471 | 0.0 | NONE | CWE-288 | 0.0% p8 | 0.00 | Authentication Bypass Using an Alternate Path or Channel vulnerability in Themep...Authentication Bypass Using an Alternate Path or Channel vulnerability in Themepaste Admin Safety Guard admin-safety-guard allows Password Recovery Exploitation.This issue affects Admin Safety Guard: from n/a through <= 1.2.6. |
2026-03-19 | |
| CVE-2026-25312 | 0.0 | NONE | CWE-862 | 0.0% p5 | 0.00 | Missing Authorization vulnerability in Metagauss EventPrime eventprime-event-cal...Missing Authorization vulnerability in Metagauss EventPrime eventprime-event-calendar-management allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects EventPrime: from n/a through <= 4.2.8.3. |
2026-03-19 | |
| CVE-2024-42210 | 7.6 | HIGH | CWE-79 | 0.0% p8 | 5.32 | A Stored cross-site scripting (XSS) vulnerability affects HCL Unica Marketing Op...A Stored cross-site scripting (XSS) vulnerability affects HCL Unica Marketing Operations v12.1.8 and lower. Stored cross-site scripting (also known as second-order or persistent XSS) arises when an application receives data from an untrusted source and includes that data within its later HTTP responses in an unsafe way. |
2026-03-19 | |
| CVE-2026-4120 | 6.4 | MEDIUM | CWE-79 | 0.0% p14 | 4.48 | The Info Cards – Add Text and Media in Card Layouts plugin for WordPress is vuln...The Info Cards – Add Text and Media in Card Layouts plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'btnUrl' parameter within the Info Cards block in all versions up to, and including, 2.0.7. This is due to insufficient input validation on URL schemes, specifically the lack of javascript: protocol filtering. The block's render.php passes all attributes as JSON to the frontend via a data-attributes HTML attribute using esc_attr(wp_json_encode()), which prevents HTML attribute injection but does not validate URL protocols within the JSON data. The client-side view.js then renders the btnUrl value directly as an href attribute on anchor elements without any protocol sanitization. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject javascript: URLs that execute arbitrary web scripts when a user clicks the rendered button link. |
2026-03-19 | |
| CVE-2026-4068 | 4.3 | MEDIUM | CWE-352 | 0.0% p3 | 3.01 | The Add Custom Fields to Media plugin for WordPress is vulnerable to Cross-Site ...The Add Custom Fields to Media plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.0.3. This is due to missing nonce validation on the field deletion functionality in the admin display template. The plugin properly validates a nonce for the 'add field' operation (line 24-36), but the 'delete field' operation (lines 38-49) processes the $_GET['delete'] parameter and calls update_option() without any nonce verification. This makes it possible for unauthenticated attackers to delete arbitrary custom media fields via a forged request, granted they can trick a site administrator into performing an action such as clicking on a link. |
2026-03-19 | |
| CVE-2026-4006 | 6.4 | MEDIUM | CWE-79 | 0.0% p12 | 4.48 | The Simple Draft List plugin for WordPress is vulnerable to Stored Cross-Site Sc...The Simple Draft List plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'display_name' post meta (Custom Field) in all versions up to and including 2.6.2. This is due to insufficient input sanitization and output escaping on the author display name when no author URL is present. The plugin accesses `$draft_data->display_name` which, because `display_name` is not a native WP_Post property, triggers WP_Post::__get() and resolves to `get_post_meta($post_id, 'display_name', true)`. When the `user_url` meta field is empty, the `$author` value is assigned to `$author_link` on line 383 without any escaping (unlike line 378 which uses `esc_html()` for the `{{author}}` tag, and line 381 which uses `esc_html()` when a URL is present). This unescaped value is then inserted into the shortcode output via `str_replace()`. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses a page containing the `[drafts]` shortcode with the `{{author+link}}` template tag. |
2026-03-19 | |
| CVE-2026-2571 | 4.3 | MEDIUM | CWE-200 | 0.0% p10 | 3.01 | The Download Manager plugin for WordPress is vulnerable to unauthorized access o...The Download Manager plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'reviewUserStatus' function in all versions up to, and including, 3.3.49. This makes it possible for authenticated attackers, with Subscriber-level access and above, to retrieve sensitive information for any user on the site including email addresses, display names, and registration dates. |
2026-03-19 | |
| CVE-2026-27093 | 0.0 | NONE | CWE-98 | 0.1% p21 | 0.00 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ovatheme Tripgo tripgo allows PHP Local File Inclusion.This issue affects Tripgo: from n/a through < 1.5.6. |
2026-03-19 | |
| CVE-2026-27091 | 0.0 | NONE | CWE-862 | 0.0% p5 | 0.00 | Missing Authorization vulnerability in UiPress UiPress lite uipress-lite allows ...Missing Authorization vulnerability in UiPress UiPress lite uipress-lite allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects UiPress lite: from n/a through <= 3.5.09. |
2026-03-19 | |
| CVE-2026-28073 | 7.1 | HIGH | CWE-79 | 0.0% p10 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Tips and Tricks HQ WP eMember allows Reflected XSS.This issue affects WP eMember: from n/a through v10.2.2. |
2026-03-19 | |
| CVE-2026-28070 | 5.3 | MEDIUM | CWE-862 | 0.0% p10 | 3.71 | Missing Authorization vulnerability in Tips and Tricks HQ WP eMember allows Expl...Missing Authorization vulnerability in Tips and Tricks HQ WP eMember allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP eMember: from n/a through v10.2.2. |
2026-03-19 | |
| CVE-2026-28044 | 5.9 | MEDIUM | CWE-79 | 0.0% p9 | 4.13 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WP Media WP Rocket allows Stored XSS.This issue affects WP Rocket: from n/a through 3.19.4. |
2026-03-19 | |
| CVE-2026-27542 | 9.8 | CRITICAL | CWE-266 | 0.0% p4 | 6.86 | Incorrect Privilege Assignment vulnerability in Rymera Web Co Pty Ltd. Woocommer...Incorrect Privilege Assignment vulnerability in Rymera Web Co Pty Ltd. Woocommerce Wholesale Lead Capture allows Privilege Escalation.This issue affects Woocommerce Wholesale Lead Capture: from n/a through 2.0.3.1. |
2026-03-19 | |
| CVE-2026-27540 | 9.0 | CRITICAL | CWE-434 | 0.0% p3 | 6.30 | Unrestricted Upload of File with Dangerous Type vulnerability in Rymera Web Co P...Unrestricted Upload of File with Dangerous Type vulnerability in Rymera Web Co Pty Ltd. Woocommerce Wholesale Lead Capture allows Using Malicious Files.This issue affects Woocommerce Wholesale Lead Capture: from n/a through 2.0.3.1. |
2026-03-19 | |
| CVE-2026-27413 | 9.3 | CRITICAL | CWE-89 | 0.0% p11 | 6.51 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti...Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Cozmoslabs Profile Builder Pro allows Blind SQL Injection.This issue affects Profile Builder Pro: from n/a before 3.14.0. |
2026-03-19 | |
| CVE-2026-27397 | 6.5 | MEDIUM | CWE-639 | 0.1% p15 | 4.55 | Authorization Bypass Through User-Controlled Key vulnerability in Really Simple ...Authorization Bypass Through User-Controlled Key vulnerability in Really Simple Plugins B.V. Really Simple Security Pro allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Really Simple Security Pro: from n/a through 9.5.4.0. |
2026-03-19 | |
| CVE-2026-27096 | 8.1 | HIGH | CWE-502 | 0.1% p16 | 5.67 | Deserialization of Untrusted Data vulnerability in BuddhaThemes ColorFolio - Fre...Deserialization of Untrusted Data vulnerability in BuddhaThemes ColorFolio - Freelance Designer WordPress Theme allows Object Injection.This issue affects ColorFolio - Freelance Designer WordPress Theme: from n/a through 1.3. |
2026-03-19 | |
| CVE-2026-1238 | 7.2 | HIGH | CWE-79 | 0.1% p24 | 5.04 | The SlimStat Analytics plugin for WordPress is vulnerable to Stored Cross-Site S...The SlimStat Analytics plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'fh' (fingerprint) parameter in all versions up to, and including, 5.3.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-03-19 | |
| CVE-2026-1276 | 5.4 | MEDIUM | CWE-79 | 0.0% p7 | 3.78 | IBM QRadar SIEM 7.5.0 through 7.5.0 Update Package 14 is vulnerable to cross-sit...IBM QRadar SIEM 7.5.0 through 7.5.0 Update Package 14 is vulnerable to cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. |
2026-03-19 | |
| CVE-2025-36051 | 6.2 | MEDIUM | CWE-538 | 0.0% p1 | 4.34 | IBM QRadar SIEM 7.5.0 through 7.5.0 Update Package 14 stores potentially sensiti...IBM QRadar SIEM 7.5.0 through 7.5.0 Update Package 14 stores potentially sensitive information in configuration files that could be read by a local user. |
2026-03-19 | |
| CVE-2025-15051 | 5.4 | MEDIUM | CWE-79 | 0.0% p7 | 3.78 | IBM QRadar SIEM 7.5.0 through 7.5.0 Update Package 14 is vulnerable to cross-sit...IBM QRadar SIEM 7.5.0 through 7.5.0 Update Package 14 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality. |
2026-03-19 | |
| CVE-2025-13995 | 5.0 | MEDIUM | CWE-1286 | 0.0% p13 | 3.50 | IBM QRadar SIEM 7.5.0 through 7.5.0 Update Package 14 could allow an attacker wi...IBM QRadar SIEM 7.5.0 through 7.5.0 Update Package 14 could allow an attacker with access to one tenant to access hostname data from another tenant's account. |
2026-03-19 | |
| CVE-2026-32000 | 5.8 | MEDIUM | CWE-78 | 0.0% p15 | 4.06 | OpenClaw versions prior to 2026.2.19 contain a command injection vulnerability i...OpenClaw versions prior to 2026.2.19 contain a command injection vulnerability in the Lobster extension tool execution that uses Windows shell fallback with shell: true after spawn failures. Attackers can inject shell metacharacters in command arguments to execute arbitrary commands when subprocess launch fails with EINVAL or ENOENT errors. |
2026-03-19 | |
| CVE-2026-31999 | 5.8 | MEDIUM | CWE-78 | 0.1% p21 | 4.06 | OpenClaw versions 2026.2.26 prior to 2026.3.1 on Windows contain a current worki...OpenClaw versions 2026.2.26 prior to 2026.3.1 on Windows contain a current working directory injection vulnerability in wrapper resolution for .cmd/.bat files that allows attackers to influence execution behavior through cwd manipulation. Remote attackers can exploit improper shell execution fallback mechanisms to achieve command execution integrity loss by controlling the current working directory during wrapper resolution. |
2026-03-19 | |
| CVE-2026-31998 | 8.3 | HIGH | CWE-863 | 0.1% p19 | 5.81 | OpenClaw versions 2026.2.22 and 2026.2.23 contain an authorization bypass vulner...OpenClaw versions 2026.2.22 and 2026.2.23 contain an authorization bypass vulnerability in the synology-chat channel plugin where dmPolicy set to allowlist with empty allowedUserIds fails open. Attackers with Synology sender access can bypass authorization checks and trigger unauthorized agent dispatch and downstream tool actions. |
2026-03-19 | |
| CVE-2026-31997 | 4.4 | MEDIUM | CWE-367 | 0.0% p0 | 3.08 | OpenClaw versions prior to 2026.3.1 fail to pin executable identity for non-path...OpenClaw versions prior to 2026.3.1 fail to pin executable identity for non-path-like argv[0] tokens in system.run approvals, allowing post-approval executable rebind attacks. Attackers can modify PATH resolution after approval to execute a different binary than the operator approved, enabling arbitrary command execution. |
2026-03-19 | |
| CVE-2026-31996 | 2.0 | LOW | CWE-78 | 0.0% p2 | 1.40 | OpenClaw versions prior to 2026.2.19 tools.exec.safeBins contains an input valid...OpenClaw versions prior to 2026.2.19 tools.exec.safeBins contains an input validation bypass vulnerability that allows attackers to execute unintended filesystem operations through sort output flags or recursive grep flags. Attackers with command execution access can leverage sort -o flag for arbitrary file writes or grep -R flag for recursive file reads, circumventing intended stdin-only restrictions. |
2026-03-19 | |
| CVE-2026-31995 | 5.8 | MEDIUM | CWE-78 | 0.0% p10 | 4.06 | OpenClaw versions 2026.1.21 prior to 2026.2.19 contain a command injection vulne...OpenClaw versions 2026.1.21 prior to 2026.2.19 contain a command injection vulnerability in the Lobster extension's Windows shell fallback mechanism that allows attackers to inject arbitrary commands through tool-provided arguments. When spawn failures trigger shell fallback with shell: true, attackers can exploit cmd.exe command interpretation to execute malicious commands by controlling workflow arguments. |
2026-03-19 | |
| CVE-2026-31994 | 6.9 | MEDIUM | CWE-78 | 0.1% p15 | 4.83 | OpenClaw versions prior to 2026.2.19 contain a local command injection vulnerabi...OpenClaw versions prior to 2026.2.19 contain a local command injection vulnerability in Windows scheduled task script generation due to unsafe handling of cmd metacharacters and expansion-sensitive characters in gateway.cmd files. Local attackers with control over service script generation arguments can inject arbitrary commands by providing metacharacter-only values or CR/LF sequences that execute unintended code in the scheduled task context. |
2026-03-19 | |
| CVE-2026-31993 | 5.6 | MEDIUM | CWE-184 | 0.1% p20 | 3.92 | OpenClaw versions prior to 2026.2.22 contain an allowlist parsing mismatch vulne...OpenClaw versions prior to 2026.2.22 contain an allowlist parsing mismatch vulnerability in the macOS companion app that allows authenticated operators to bypass exec approval checks. Attackers with operator.write privileges and a paired macOS beta node can craft shell-chain payloads that pass incomplete allowlist validation and execute arbitrary commands on the paired host. |
2026-03-19 | |
| CVE-2026-31992 | 7.1 | HIGH | CWE-184 | 0.1% p21 | 4.97 | OpenClaw versions prior to 2026.2.23 contain an allowlist bypass vulnerability i...OpenClaw versions prior to 2026.2.23 contain an allowlist bypass vulnerability in system.run guardrails that allows authenticated operators to execute unintended commands. When /usr/bin/env is allowlisted, attackers can use env -S to bypass policy analysis and execute shell wrapper payloads at runtime. |
2026-03-19 | |
| CVE-2026-31991 | 2.0 | LOW | CWE-863 | 0.0% p9 | 1.40 | OpenClaw versions prior to 2026.2.26 contain an authorization bypass vulnerabili...OpenClaw versions prior to 2026.2.26 contain an authorization bypass vulnerability where Signal group allowlist policy incorrectly accepts sender identities from DM pairing-store approvals. Attackers can exploit this boundary weakness by obtaining DM pairing approval to bypass group allowlist checks and gain unauthorized group access. |
2026-03-19 | |
| CVE-2026-31990 | 6.9 | MEDIUM | CWE-59 | 0.0% p8 | 4.83 | OpenClaw versions prior to 2026.3.2 contain a vulnerability in the stageSandboxM...OpenClaw versions prior to 2026.3.2 contain a vulnerability in the stageSandboxMedia function in which it fails to validate destination symlinks during media staging, allowing writes to follow symlinks outside the sandbox workspace. Attackers can exploit this by placing symlinks in the media/inbound directory to overwrite arbitrary files on the host system outside sandbox boundaries. |
2026-03-19 | |
| CVE-2026-31989 | 5.3 | MEDIUM | CWE-918 | 0.0% p14 | 3.71 | OpenClaw versions prior to 2026.3.1 contain a server-side request forgery vulner...OpenClaw versions prior to 2026.3.1 contain a server-side request forgery vulnerability in web_search citation redirect resolution that uses a private-network-allowing SSRF policy. An attacker who can influence citation redirect targets can trigger internal-network requests from the OpenClaw host to loopback, private, or internal destinations. |
2026-03-19 | |
| CVE-2026-29608 | 5.4 | MEDIUM | CWE-88 | 0.0% p4 | 3.78 | OpenClaw 2026.3.1 contains an approval integrity vulnerability in system.run nod...OpenClaw 2026.3.1 contains an approval integrity vulnerability in system.run node-host execution where argv rewriting changes command semantics. Attackers can place malicious local scripts in the working directory to execute unintended code despite operator approval of different command text. |
2026-03-19 | |
| CVE-2026-29607 | 7.1 | HIGH | CWE-78 | 0.1% p22 | 4.97 | OpenClaw versions prior to 2026.2.22 contain an authorization bypass vulnerabili...OpenClaw versions prior to 2026.2.22 contain an authorization bypass vulnerability in allow-always wrapper persistence that allows attackers to bypass approval checks by persisting wrapper-level allowlist entries instead of validating inner executable intent. Remote attackers can approve benign wrapped system.run commands and subsequently execute different payloads without approval, enabling remote code execution on gateway and node-host execution flows. |
2026-03-19 | |
| CVE-2026-28461 | 8.7 | HIGH | CWE-770 | 0.1% p25 | 6.09 | OpenClaw versions prior to 2026.3.1 contain an unbounded memory growth vulnerabi...OpenClaw versions prior to 2026.3.1 contain an unbounded memory growth vulnerability in the Zalo webhook endpoint that allows unauthenticated attackers to trigger in-memory key accumulation by varying query strings. Remote attackers can exploit this by sending repeated requests with different query parameters to cause memory pressure, process instability, or out-of-memory conditions that degrade service availability. |
2026-03-19 | |
| CVE-2026-28460 | 6.0 | MEDIUM | CWE-78 | 0.0% p5 | 4.20 | OpenClaw versions prior to 2026.2.22 contain an allowlist bypass vulnerability i...OpenClaw versions prior to 2026.2.22 contain an allowlist bypass vulnerability in system.run that allows attackers to execute non-allowlisted commands by splitting command substitution using shell line-continuation characters. Attackers can bypass security analysis by injecting $\\ followed by a newline and opening parenthesis inside double quotes, causing the shell to fold the line continuation into executable command substitution that circumvents approval boundaries. |
2026-03-19 | |
| CVE-2026-28449 | 6.3 | MEDIUM | CWE-294 | 0.1% p17 | 4.41 | OpenClaw versions prior to 2026.2.25 lack durable replay state for Nextcloud Tal...OpenClaw versions prior to 2026.2.25 lack durable replay state for Nextcloud Talk webhook events, allowing valid signed webhook requests to be replayed without suppression. Attackers can capture and replay previously valid signed webhook requests to trigger duplicate inbound message processing and cause integrity or availability issues. |
2026-03-19 | |
| CVE-2026-27670 | 5.8 | MEDIUM | CWE-367 | 0.0% p1 | 4.06 | OpenClaw versions prior to 2026.3.2 contain a race condition vulnerability in ZI...OpenClaw versions prior to 2026.3.2 contain a race condition vulnerability in ZIP extraction that allows local attackers to write files outside the intended destination directory. Attackers can exploit a time-of-check-time-of-use race between path validation and file write operations by rebinding parent directory symlinks to redirect writes outside the extraction root. |
2026-03-19 | |
| CVE-2026-27566 | 7.1 | HIGH | CWE-78 | 0.1% p22 | 4.97 | OpenClaw versions prior to 2026.2.22 contain an allowlist bypass vulnerability i...OpenClaw versions prior to 2026.2.22 contain an allowlist bypass vulnerability in system.run exec analysis that fails to unwrap env and shell-dispatch wrapper chains. Attackers can route execution through wrapper binaries like env bash to smuggle payloads that satisfy allowlist entries while executing non-allowlisted commands. |
2026-03-19 | |
| CVE-2026-22176 | 6.9 | MEDIUM | CWE-78 | 0.0% p15 | 4.83 | OpenClaw versions prior to 2026.2.19 contain a command injection vulnerability i...OpenClaw versions prior to 2026.2.19 contain a command injection vulnerability in Windows Scheduled Task script generation where environment variables are written to gateway.cmd using unquoted set KEY=VALUE assignments, allowing shell metacharacters to break out of assignment context. Attackers can inject arbitrary commands through environment variable values containing metacharacters like &, |, ^, %, or ! to achieve command execution when the scheduled task script is generated and executed. |
2026-03-19 | |
| CVE-2026-32743 | 6.5 | MEDIUM | CWE-121 | 0.0% p5 | 4.55 | PX4 is an open-source autopilot stack for drones and unmanned vehicles. Versions...PX4 is an open-source autopilot stack for drones and unmanned vehicles. Versions 1.17.0-rc2 and below are vulnerable to Stack-based Buffer Overflow through the MavlinkLogHandler, and are triggered via MAVLink log request. The LogEntry.filepath buffer is 60 bytes, but the sscanf function parses paths from the log list file with no width specifier, allowing a path longer than 60 characters to overflow the buffer. An attacker with MAVLink link access can trigger this by first creating deeply nested directories via MAVLink FTP, then requesting the log list. The flight controller MAVLink task crashes, losing telemetry and command capability and causing DoS. This issue has been fixed in this commit: https://github.com/PX4/PX4-Autopilot/commit/616b25a280e229c24d5cf12a03dbf248df89c474. |
2026-03-19 | |
| CVE-2026-32255 | 8.6 | HIGH | CWE-918 | 0.1% p16 | 6.02 | Kan is an open-source project management tool. In versions 0.5.4 and below, the ...Kan is an open-source project management tool. In versions 0.5.4 and below, the /api/download/attatchment endpoint has no authentication and no URL validation. The Attachment Download endpoint accepts a user-supplied URL query parameter and passes it directly to fetch() server-side, and returns the full response body. An unauthenticated attacker can use this to make HTTP requests from the server to internal services, cloud metadata endpoints, or private network resources. This issue has been fixed in version 0.5.5. To workaround this issue, block or restrict access to /api/download/attatchment at the reverse proxy level (nginx, Cloudflare, etc.). |
2026-03-19 | |
| CVE-2026-3181 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering...Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. |
2026-03-18 | |
| CVE-2026-32805 | 8.3 | HIGH | CWE-22 | 0.1% p18 | 5.81 | Romeo gives the capability to reach high code coverage of Go ≥1.20 apps by helpi...Romeo gives the capability to reach high code coverage of Go ≥1.20 apps by helping to measure code coverage for functional and integration tests within GitHub Actions. Prior to version 0.2.2, the `sanitizeArchivePath` function in `webserver/api/v1/decoder.go` (lines 80-88) is vulnerable to a path traversal bypass due to a missing trailing path separator in the `strings.HasPrefix` check. A crafted tar archive can write files outside the intended destination directory. Version 0.2.2 fixes the issue. |
2026-03-18 | |
| CVE-2026-32737 | 7.9 | HIGH | CWE-284 | 0.0% p5 | 5.53 | Romeo gives the capability to reach high code coverage of Go ≥1.20 apps by helpi...Romeo gives the capability to reach high code coverage of Go ≥1.20 apps by helping to measure code coverage for functional and integration tests within GitHub Actions. Prior to version 0.2.1, due to a mis-written NetworkPolicy, a malicious actor can pivot from the "hardened" namespace to any Pod out of it. This breaks the security-by-default property expected as part of the deployment program, leading to a potential lateral movement. Removing the `inter-ns` NetworkPolicy patches the vulnerability in version 0.2.1. If updates are not possible in production environments, manually delete `inter-ns` and update as soon as possible. Given one's context, delete the failing network policy that should be prefixed by `inter-ns-` in the target namespace. |
2026-03-18 | |
| CVE-2026-32736 | 4.3 | MEDIUM | CWE-862 | 0.0% p7 | 3.01 | The Hytale Modding Wiki is a free service for Hytale mods to host their document...The Hytale Modding Wiki is a free service for Hytale mods to host their documentation & wikis. An Insecure Direct Object Reference (IDOR) vulnerability in versions of the wiki prior to 1.0.0 exposes mod authors' personal information - including full names and email addresses - to any authenticated user who visits a mod page. Any user who creates an account can access sensitive author details by simply navigating to a mod's page via its slug. Version 1.0.0 fixes the issue. |
2026-03-18 | |
| CVE-2026-32735 | 2.3 | LOW | CWE-20 | 0.1% p28 | 1.61 | openapi-to-java-records-mustache-templates allows users to generate Java Records...openapi-to-java-records-mustache-templates allows users to generate Java Records from OpenAPI specifications. Starting in version 5.1.1 and prior to version 5.5.1, the parent POM file of this project (`openapi-to-java-records-mustache-templates-parent`), which is used to centralize plugin configurations for multiple unit-test modules, uses `maven-dependency-plugin` to unpack arbitrary `.mustache` files from the `openapi-to-java-records-mustache-templates` artifact (of the same version). While this parent POM file is not intended for external use, it is published, and could be used by anyone, and does not follow the best security practices. The risk, is that if `openapi-to-java-records-mustache-templates` would be compromised, and malicious `.mustache` files were to be included in the resulting JAR/artifact, users would unpack these files automatically during a dependency update. This is addressed in the v3.5.1 release of `openapi-to-java-records-mustache-templates-parent`. It is strongly recommended NOT to use the parent POM for external use. The `openapi-to-java-records-mustache-templates` module is the center of this project, and surrounding modules and configurations are not intended for production-use. These only exist for testing purposes and maintainability. |
2026-03-18 | |
| CVE-2026-32730 | 8.1 | HIGH | CWE-287 | 0.1% p20 | 5.67 | ApostropheCMS is an open-source content management framework. Prior to version 4...ApostropheCMS is an open-source content management framework. Prior to version 4.28.0, the bearer token authentication middleware in `@apostrophecms/express/index.js` (lines 386-389) contains an incorrect MongoDB query that allows incomplete login tokens — where the password was verified but TOTP/MFA requirements were NOT — to be used as fully authenticated bearer tokens. This completely bypasses multi-factor authentication for any ApostropheCMS deployment using `@apostrophecms/login-totp` or any custom `afterPasswordVerified` login requirement. Version 4.28.0 fixes the issue. |
2026-03-18 | |
| CVE-2025-15031 | 9.1 | CRITICAL | CWE-22 | 0.1% p33 | 6.37 | A vulnerability in MLflow's pyfunc extraction process allows for arbitrary file ...A vulnerability in MLflow's pyfunc extraction process allows for arbitrary file writes due to improper handling of tar archive entries. Specifically, the use of `tarfile.extractall` without path validation enables crafted tar.gz files containing `..` or absolute paths to escape the intended extraction directory. This issue affects the latest version of MLflow and poses a high/critical risk in scenarios involving multi-tenant environments or ingestion of untrusted artifacts, as it can lead to arbitrary file overwrites and potential remote code execution. |
2026-03-18 | |
| CVE-2026-4407 | 2.1 | LOW | CWE-20 | 0.0% p9 | 1.47 | Out-of-bounds array write in Xpdf 4.06 and earlier, due to incorrect validation ...Out-of-bounds array write in Xpdf 4.06 and earlier, due to incorrect validation of the "N" field in ICCBased color spaces. |
2026-03-18 | |
| CVE-2026-33163 | 8.2 | HIGH | CWE-200 | 0.0% p7 | 5.74 | Parse Server is an open source backend that can be deployed to any infrastructur...Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.6.0-alpha.35 and 8.6.50, when a `Parse.Cloud.afterLiveQueryEvent` trigger is registered for a class, the LiveQuery server leaks protected fields and `authData` to all subscribers of that class. Fields configured as protected via Class-Level Permissions (`protectedFields`) are included in LiveQuery event payloads for all event types (create, update, delete, enter, leave). Any user with sufficient CLP permissions to subscribe to the affected class can receive protected field data of other users, including sensitive personal information and OAuth tokens from third-party authentication providers. The vulnerability was caused by a reference detachment bug. When an `afterEvent` trigger is registered, the LiveQuery server converts the event object to a `Parse.Object` for the trigger, then creates a new JSON copy via `toJSONwithObjects()`. The sensitive data filter was applied to the `Parse.Object` reference, but the unfiltered JSON copy was sent to clients. The fix in versions 9.6.0-alpha.35 and 8.6.50 ensures that the JSON copy is assigned back to the response object before filtering, so the filter operates on the actual data sent to clients. As a workaround, remove all `Parse.Cloud.afterLiveQueryEvent` trigger registrations. Without an `afterEvent` trigger, the reference detachment does not occur and protected fields are correctly filtered. |
2026-03-18 | |
| CVE-2026-33042 | 6.9 | MEDIUM | CWE-287 | 0.0% p1 | 4.83 | Parse Server is an open source backend that can be deployed to any infrastructur...Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.6.0-alpha.29 and 8.6.49, a user can sign up without providing credentials by sending an empty `authData` object, bypassing the username and password requirement. This allows the creation of authenticated sessions without proper credentials, even when anonymous users are disabled. The fix in 9.6.0-alpha.29 and 8.6.49 ensures that empty or non-actionable `authData` is treated the same as absent `authData` for the purpose of credential validation on new user creation. Username and password are now required when no valid auth provider data is present. As a workaround, use a Cloud Code `beforeSave` trigger on the `_User` class to reject signups where `authData` is empty and no username/password is provided. |
2026-03-18 | |
| CVE-2026-32944 | 8.7 | HIGH | CWE-674 | 0.0% p4 | 6.09 | Parse Server is an open source backend that can be deployed to any infrastructur...Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.6.0-alpha.21 and 8.6.45, an unauthenticated attacker can crash the Parse Server process by sending a single request with deeply nested query condition operators. This terminates the server and denies service to all connected clients. Starting in version 9.6.0-alpha.21 and 8.6.45, a depth limit for query condition operator nesting has been added via the `requestComplexity.queryDepth` server option. The option is disabled by default to avoid a breaking change. To mitigate, upgrade and set the option to a value appropriate for your app. No known workarounds are available. |
2026-03-18 | |
| CVE-2026-32943 | 2.3 | LOW | CWE-367 | 0.0% p7 | 1.61 | Parse Server is an open source backend that can be deployed to any infrastructur...Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.6.0-alpha.28 and 8.6.48, the password reset mechanism does not enforce single-use guarantees for reset tokens. When a user requests a password reset, the generated token can be consumed by multiple concurrent requests within a short time window. An attacker who has intercepted a password reset token can race the legitimate user's password reset request, causing both requests to succeed. This may result in the legitimate user believing their password was changed successfully while the attacker's password takes effect instead. All Parse Server deployments that use the password reset feature are affected. Starting in versions 9.6.0-alpha.28 and 8.6.48, the password reset token is now atomically validated and consumed as part of the password update operation. The database query that updates the password includes the reset token as a condition, ensuring that only one concurrent request can successfully consume the token. Subsequent requests using the same token will fail because the token has already been cleared. There is no known workaround other than upgrading. |
2026-03-18 | |
| CVE-2026-32886 | 8.2 | HIGH | CWE-1321 | 0.0% p7 | 5.74 | Parse Server is an open source backend that can be deployed to any infrastructur...Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.6.0-alpha.24 and 8.6.47, remote clients can crash the Parse Server process by calling a cloud function endpoint with a crafted function name that traverses the JavaScript prototype chain of a registered cloud function handler, causing a stack overflow. The fix in versions 9.6.0-alpha.24 and 8.6.47 restricts property lookups during cloud function name resolution to own properties only, preventing prototype chain traversal from stored function handlers. There is no known workaround. |
2026-03-18 | |
| CVE-2026-32878 | 5.3 | MEDIUM | CWE-1321 | 0.0% p1 | 3.71 | Parse Server is an open source backend that can be deployed to any infrastructur...Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.6.0-alpha.20 and 8.6.44, an attacker can bypass the default request keyword denylist protection and the class-level permission for adding fields by sending a crafted request that exploits prototype pollution in the deep copy mechanism. This allows injecting fields into class schemas that have field addition locked down, and can cause permanent schema type conflicts that cannot be resolved even with the master key. In 9.6.0-alpha.20 and 8.6.44, the vulnerable third-party deep copy library has been replaced with a built-in deep clone mechanism that handles prototype properties safely, allowing the existing denylist check to correctly detect and reject the prohibited keyword. No known workarounds are available. |
2026-03-18 | |
| CVE-2026-32770 | 5.9 | MEDIUM | CWE-248 | 0.0% p10 | 4.13 | Parse Server is an open source backend that can be deployed to any infrastructur...Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.6.0-alpha.19 and 8.6.43, a remote attacker can crash the Parse Server by subscribing to a LiveQuery with an invalid regular expression pattern. The server process terminates when the invalid pattern reaches the regex engine during subscription matching, causing denial of service for all connected clients. The fix in 9.6.0-alpha.19 and 8.6.43 validates regular expression patterns at subscription time, rejecting invalid patterns before they are stored. Additionally, a defense-in-depth try-catch prevents any subscription matching error from crashing the server process. As a workaround, disable LiveQuery if it is not needed. |
2026-03-18 | |
| CVE-2026-32742 | 4.3 | MEDIUM | CWE-915 | 0.0% p3 | 3.01 | Parse Server is an open source backend that can be deployed to any infrastructur...Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.6.0-alpha.17 and 8.6.42, an authenticated user can overwrite server-generated session fields (`sessionToken`, `expiresAt`, `createdWith`) when creating a session object via `POST /classes/_Session`. This allows bypassing the server's session expiration policy by setting an arbitrary far-future expiration date. It also allows setting a predictable session token value. Starting in version 9.6.0-alpha.17 and 8.6.42, the session creation endpoint filters out server-generated fields from user-supplied data, preventing them from being overwritten. As a workaround, add a `beforeSave` trigger on the `_Session` class to validate and reject or strip any user-supplied values for `sessionToken`, `expiresAt`, and `createdWith`. |
2026-03-18 | |
| CVE-2026-32728 | 8.3 | HIGH | CWE-79 | 0.0% p1 | 5.81 | Parse Server is an open source backend that can be deployed to any infrastructur...Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.6.0-alpha.15 and 8.6.41, an attacker who is allowed to upload files can bypass the file extension filter by appending a MIME parameter (e.g. `;charset=utf-8`) to the `Content-Type` header. This causes the extension validation to fail matching against the blocklist, allowing active content to be stored and served under the application's domain. In addition, certain XML-based file extensions that can render scripts in web browsers are not included in the default blocklist. This can lead to stored XSS attacks, compromising session tokens, user credentials, or other sensitive data accessible via the browser's local storage. The fix in versions 9.6.0-alpha.15 and 8.6.41 strips MIME parameters from the `Content-Type` header before validating the file extension against the blocklist. The default blocklist has also been extended to include additional XML-based extensions (`xsd`, `rng`, `rdf`, `rdf+xml`, `owl`, `mathml`, `mathml+xml`) that can render active content in web browsers. Note that the `fileUpload.fileExtensions` option is intended to be configured as an allowlist of file extensions that are valid for a specific application, not as a denylist. The default denylist is provided only as a basic default that covers most common problematic extensions. It is not intended to be an exhaustive list of all potentially dangerous extensions. Developers should not rely on the default value, as new extensions that can render active content in browsers might emerge in the future. As a workaround, configure the `fileUpload.fileExtensions` option to use an allowlist of only the file extensions that your application needs, rather than relying on the default blocklist. |
2026-03-18 | |
| CVE-2026-32723 | 4.8 | MEDIUM | CWE-362 | 0.0% p0 | 3.36 | SandboxJS is a JavaScript sandboxing library. Prior to 0.8.35, SandboxJS timers ...SandboxJS is a JavaScript sandboxing library. Prior to 0.8.35, SandboxJS timers have an execution-quota bypass. A global tick state (`currentTicks.current`) is shared between sandboxes. Timer string handlers are compiled at execution time using that global tick state rather than the scheduling sandbox's tick object. In multi-tenant / concurrent sandbox scenarios, another sandbox can overwrite `currentTicks.current` between scheduling and execution, causing the timer callback to run under a different sandbox's tick budget and bypass the original sandbox's execution quota/watchdog. Version 0.8.35 fixes this issue. |
2026-03-18 | |
| CVE-2026-32722 | 3.6 | LOW | CWE-79 | 0.0% p1 | 2.52 | Memray is a memory profiler for Python. Prior to Memray 1.19.2, Memray rendered ...Memray is a memory profiler for Python. Prior to Memray 1.19.2, Memray rendered the command line of the tracked process directly into generated HTML reports without escaping. Because there was no escaping, attacker-controlled command line arguments were inserted as raw HTML into the generated report. This allowed JavaScript execution when a victim opened the generated report in a browser. Version 1.19.2 fixes the issue. |
2026-03-18 | |
| CVE-2026-32703 | 9.0 | CRITICAL | CWE-79 | 0.0% p9 | 6.30 | OpenProject is an open-source, web-based project management software. In version...OpenProject is an open-source, web-based project management software. In versions prior to 16.6.9, 17.0.6, 17.1.3, and 17.2.1, the Repositories module did not properly escape filenames displayed from repositories. This allowed an attacker with push access into the repository to create commits with filenames that included HTML code that was injected in the page without proper sanitation. This allowed a persisted XSS attack against all members of this project that accessed the repositories page to display a changeset where the maliciously crafted file was deleted. Versions 16.6.9, 17.0.6, 17.1.3, and 17.2.1 fix the issue. |
2026-03-18 | |
| CVE-2026-32698 | 9.1 | CRITICAL | CWE-89 | 0.0% p10 | 6.37 | OpenProject is an open-source, web-based project management software. Versions p...OpenProject is an open-source, web-based project management software. Versions prior to 16.6.9, 17.0.6, 17.1.3, and 17.2.1 are vulnerable to an SQL injection attack via a custom field's name. When that custom field was used in a Cost Report, the custom field's name was injected into the SQL query without proper sanitation. This allowed an attacker to execute arbitrary SQL commands during the generation of a Cost Report. As custom fields can only be generated by users with full administrator privileges, the attack surface is somewhat reduced. Together with another bug in the Repositories_module, that used the project identifier without sanitation to generate the checkout path for a git repository in the filesystem, this allowed an attacker to checkout a git repository to an arbitrarily chosen path on the server. If the checkout is done within certain paths within the OpenProject application, upon the next restart of the application, this allows the attacker to inject ruby code into the application. As the project identifier cannot be manually edited to any string containing special characters like dots or slashes, this needs to be changed via the SQL injection described above. Versions 16.6.9, 17.0.6, 17.1.3, and 17.2.1 fix the issue. |
2026-03-18 | |
| CVE-2026-32700 | 6.0 | MEDIUM | CWE-362 | 0.0% p3 | 4.20 | Devise is an authentication solution for Rails based on Warden. Prior to version...Devise is an authentication solution for Rails based on Warden. Prior to version 5.0.3, a race condition in Devise's Confirmable module allows an attacker to confirm an email address they do not own. This affects any Devise application using the `reconfirmable` option (the default when using Confirmable with email changes). By sending two concurrent email change requests, an attacker can desynchronize the `confirmation_token` and `unconfirmed_email` fields. The confirmation token is sent to an email the attacker controls, but the `unconfirmed_email` in the database points to a victim's email address. When the attacker uses the token, the victim's email is confirmed on the attacker's account. This is patched in Devise v5.0.3. Users should upgrade as soon as possible. As a workaround, applications can override a specific method from Devise models to force `unconfirmed_email` to be persisted when unchanged. Note that Mongoid does not seem to respect that `will_change!` should force the attribute to be persisted, even if it did not really change, so the user might have to implement a workaround similar to Devise by setting `changed_attributes["unconfirmed_email"] = nil` as well. |
2026-03-18 | |
| CVE-2026-32638 | 2.7 | LOW | CWE-639 | 0.0% p1 | 1.89 | StudioCMS is a server-side-rendered, Astro native, headless content management s...StudioCMS is a server-side-rendered, Astro native, headless content management system. Prior to 0.4.4, the REST API `getUsers` endpoint in StudioCMS uses the attacker-controlled `rank` query parameter to decide whether owner accounts should be filtered from the result set. As a result, an admin token can request `rank=owner` and receive owner account records, including IDs, usernames, display names, and email addresses, even though the adjacent `getUser` endpoint correctly blocks admins from viewing owner users. This is an authorization inconsistency inside the same user-management surface. Version 0.4.4 fixes the issue. |
2026-03-18 | |
| CVE-2026-32636 | 5.3 | MEDIUM | CWE-787 | 0.0% p4 | 3.71 | ImageMagick is free and open-source software used for editing and manipulating d...ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to 7.1.2-17 and 6.9.13-42, the NewXMLTree method contains a bug that could result in a crash due to an out of write bounds of a single zero byte. Versions 7.1.2-17 and 6.9.13-42 fix the issue. |
2026-03-18 | |
| CVE-2026-32321 | 8.8 | HIGH | CWE-89 | 0.0% p1 | 6.16 | ClipBucket v5 is an open source video sharing platform. An authenticated time-ba...ClipBucket v5 is an open source video sharing platform. An authenticated time-based blind SQL injection vulnerability exists in ClipBucket prior to 5.5.3 #80 within the `actions/ajax.php` endpoint. Due to insufficient input sanitization of the `userid` parameter, an authenticated attacker can execute arbitrary SQL queries, leading to full database disclosure and potential administrative account takeover. Version 5.5.3 #80 fixes the issue. |
2026-03-18 | |
| CVE-2026-31973 | 6.9 | MEDIUM | CWE-476 | 0.0% p4 | 4.83 | SAMtools is a program for reading, manipulating and writing bioinformatics file ...SAMtools is a program for reading, manipulating and writing bioinformatics file formats. Starting in version 1.17, in the cram-size command, used to write information about how well CRAM files are compressed, a check to see if the `cram_decode_compression_header()` was missing. If the function returned an error, this could lead to a NULL pointer dereference. Exploiting this bug causes a NULL pointer dereference. Typically this will cause the program to crash. Versions 1.23.1, 1.22.2 and 1.21.1 include fixes for this issue. There is no workaround for this issue. |
2026-03-18 | |
| CVE-2026-31972 | 6.9 | MEDIUM | CWE-416 | 0.0% p5 | 4.83 | SAMtools is a program for reading, manipulating and writing bioinformatics file ...SAMtools is a program for reading, manipulating and writing bioinformatics file formats. The `mpileup` command outputs DNA sequences that have been aligned against a known reference. On each output line it writes the reference position, optionally the reference DNA base at that position (obtained from a separate file) and all of the DNA bases that aligned to that position. As the output is ordered by position, reference data that is no longer needed is discarded once it has been printed out. Under certain conditions the data could be discarded too early, leading to an attempt to read from a pointer to freed memory. This bug may allow information about program state to be leaked. It may also cause a program crash through an attempt to access invalid memory. This bug is fixed in versions 1.21.1 and 1.22. There is no workaround for this issue. |
2026-03-18 | |
| CVE-2026-25873 | 9.3 | CRITICAL | CWE-502 | 0.2% p38 | 6.52 | OmniGen2-RL contains an unauthenticated remote code execution vulnerability in t...OmniGen2-RL contains an unauthenticated remote code execution vulnerability in the reward server component that allows remote attackers to execute arbitrary commands by sending malicious HTTP POST requests. Attackers can exploit insecure pickle deserialization of request bodies to achieve code execution on the host system running the exposed service. |
2026-03-18 | |
| CVE-2026-25745 | 6.5 | MEDIUM | CWE-639 | 0.0% p5 | 4.55 | OpenEMR is a free and open source electronic health records and medical practice...OpenEMR is a free and open source electronic health records and medical practice management application. In versions up to and including 8.0.0, the message/note update endpoint (e.g. PUT or POST) updates by message/note ID only and does not verify that the message belongs to the current patient (or that the user is allowed to edit that patient’s notes). An authenticated user with notes permission can modify any patient’s messages by supplying another message ID. Commit 92a2ff9eaaa80674b3a934a6556e35e7aded5a41 contains a fix for the issue. |
2026-03-18 | |
| CVE-2026-31971 | 7.1 | HIGH | CWE-121 | 0.1% p32 | 4.97 | HTSlib is a library for reading and writing bioinformatics file formats. CRAM is...HTSlib is a library for reading and writing bioinformatics file formats. CRAM is a compressed format which stores DNA sequence alignment data using a variety of encodings and compression methods. When reading data encoded using the `BYTE_ARRAY_LEN` method, the `cram_byte_array_len_decode()` failed to validate that the amount of data being unpacked matched the size of the output buffer where it was to be stored. Depending on the data series being read, this could result either in a heap or a stack overflow with attacker-controlled bytes. Depending on the data stream this could result either in a heap buffer overflow or a stack overflow. If a user opens a file crafted to exploit this issue it could lead to the program crashing, overwriting of data structures on the heap or stack in ways not expected by the program, or changing the control flow of the program. It may be possible to use this to obtain arbitrary code execution. Versions 1.23.1, 1.22.2 and 1.21.1 include fixes for this issue. There is no workaround for this issue. |
2026-03-18 | |
| CVE-2026-31970 | 7.1 | HIGH | CWE-122 | 0.1% p16 | 4.97 | HTSlib is a library for reading and writing bioinformatics file formats. GZI fil...HTSlib is a library for reading and writing bioinformatics file formats. GZI files are used to index block-compressed GZIP [BGZF] files. In the GZI loading function, `bgzf_index_load_hfile()`, it was possible to trigger an integer overflow, leading to an under- or zero-sized buffer being allocated to store the index. Sixteen zero bytes would then be written to this buffer, and, depending on the result of the overflow the rest of the file may also be loaded into the buffer as well. If the function did attempt to load the data, it would eventually fail due to not reading the expected number of records, and then try to free the overflowed heap buffer. Exploiting this bug causes a heap buffer overflow. If a user opens a file crafted to exploit this issue, it could lead to the program crashing, or overwriting of data and heap structures in ways not expected by the program. It may be possible to use this to obtain arbitrary code execution. Versions 1.23.1, 1.22.2 and 1.21.1 include fixes for this issue. The easiest work-around is to discard any `.gzi` index files from untrusted sources, and use the `bgzip -r` option to recreate them. |
2026-03-18 | |
| CVE-2026-31969 | 7.1 | HIGH | CWE-122 | 0.0% p14 | 4.97 | HTSlib is a library for reading and writing bioinformatics file formats. CRAM is...HTSlib is a library for reading and writing bioinformatics file formats. CRAM is a compressed format which stores DNA sequence alignment data using a variety of encodings and compression methods. When reading data encoded using the `BYTE_ARRAY_STOP` method, an out-by-one error in the `cram_byte_array_stop_decode_char()` function check for a full output buffer could result in a single attacker-controlled byte being written beyond the end of a heap allocation. Exploiting this bug causes a heap buffer overflow. If a user opens a file crafted to exploit this issue, it could lead to the program crashing, or overwriting of data and heap structures in ways not expected by the program. It may be possible to use this to obtain arbitrary code execution. Versions 1.23.1, 1.22.2 and 1.21.1 include fixes for this issue. There is no workaround for this issue. |
2026-03-18 | |
| CVE-2026-31968 | 8.8 | HIGH | CWE-121 | 0.0% p3 | 6.16 | HTSlib is a library for reading and writing bioinformatics file formats. CRAM is...HTSlib is a library for reading and writing bioinformatics file formats. CRAM is a compressed format which stores DNA sequence alignment data using a variety of encodings and compression methods. For the `VARINT` and `CONST` encodings, incomplete validation of the context in which the encodings were used could result in up to eight bytes being written beyond the end of a heap allocation, or up to eight bytes being written to the location of a one byte variable on the stack, possibly causing the values to adjacent variables to change unexpectedly. Depending on the data stream this could result either in a heap buffer overflow or a stack overflow. If a user opens a file crafted to exploit this issue it could lead to the program crashing, overwriting of data structures on the heap or stack in ways not expected by the program, or changing the control flow of the program. It may be possible to use this to obtain arbitrary code execution. Versions 1.23.1, 1.22.2 and 1.21.1 include fixes for this issue. There is no workaround for this issue. |
2026-03-18 | |
| CVE-2026-31967 | 6.9 | MEDIUM | CWE-125 | 0.0% p5 | 4.83 | HTSlib is a library for reading and writing bioinformatics file formats. CRAM is...HTSlib is a library for reading and writing bioinformatics file formats. CRAM is a compressed format which stores DNA sequence alignment data. In the `cram_decode_slice()` function called while reading CRAM records, the value of the mate reference id field was not validated. Later use of this value, for example when converting the data to SAM format, could result in the out of bounds array reads when looking up the corresponding reference name. If the array value obtained also happened to be a valid pointer, it would be interpreted as a string and an attempt would be made to write the data as part of the SAM record. This bug may allow information about program state to be leaked. It may also cause a program crash through an attempt to access invalid memory. Versions 1.23.1, 1.22.2 and 1.21.1 include fixes for this issue. There is no workaround for this issue. |
2026-03-18 | |
| CVE-2026-31966 | 6.9 | MEDIUM | CWE-125 | 0.0% p5 | 4.83 | HTSlib is a library for reading and writing bioinformatics file formats. CRAM is...HTSlib is a library for reading and writing bioinformatics file formats. CRAM is a compressed format which stores DNA sequence alignment data. As one method of removing redundant data, CRAM uses reference-based compression so that instead of storing the full sequence for each alignment record it stores a location in an external reference sequence along with a list of differences to the reference at that location as a sequence of "features". When decoding CRAM records, the reference data is stored in a char array, and parts matching the alignment record sequence are copied over as necessary. Due to insufficient validation of the feature data series, it was possible to make the `cram_decode_seq()` function copy data from either before the start, or after the end of the stored reference either into the buffer used to store the output sequence for the cram record, or into the buffer used to build the SAM `MD` tag. This allowed arbitrary data to be leaked to the calling function. This bug may allow information about program state to be leaked. It may also cause a program crash through an attempt to access invalid memory. Versions 1.23.1, 1.22.2 and 1.21.1 include fixes for this issue. There is no workaround for this issue. |
2026-03-18 | |
| CVE-2026-0866 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: After the publication of the PoC by the researcher and further ...Rejected reason: After the publication of the PoC by the researcher and further analysis, we have determined that this issue does not constitute a valid vulnerability. The technique described is an obfuscation method and does not bypass or impact any implicit or explicit security controls. |
2026-03-18 | |
| CVE-2026-31965 | 6.9 | MEDIUM | CWE-125 | 0.1% p16 | 4.83 | HTSlib is a library for reading and writing bioinformatics file formats. CRAM is...HTSlib is a library for reading and writing bioinformatics file formats. CRAM is a compressed format which stores DNA sequence alignment data. In the `cram_decode_slice()` function called while reading CRAM records, validation of the reference id field occurred too late, allowing two out of bounds reads to occur before the invalid data was detected. The bug does allow two values to be leaked to the caller, however as the function reports an error it may be difficult to exploit them. It is also possible that the program will crash due to trying to access invalid memory. Versions 1.23.1, 1.22.2 and 1.21.1 include fixes for this issue. There is no workaround for this issue. |
2026-03-18 | |
| CVE-2026-31964 | 6.9 | MEDIUM | CWE-476 | 0.1% p17 | 4.83 | HTSlib is a library for reading and writing bioinformatics file formats. CRAM is...HTSlib is a library for reading and writing bioinformatics file formats. CRAM is a compressed format which stores DNA sequence alignment data using a variety of encodings and compression methods. While most alignment records store DNA sequence and quality values, the format also allows them to omit this data in certain cases to save space. Due to some quirks of the CRAM format, it is necessary to handle these records carefully as they will actually store data that needs to be consumed and then discarded. Unfortunately the `CONST`, `XPACK` and `XRLE` encodings did not properly implement the interface needed to do this. Trying to decode records with omitted sequence or quality data using these encodings would result in an attempt to write to a NULL pointer. Exploiting this bug causes a NULL pointer dereference. Typically this will cause the program to crash. Versions 1.23.1, 1.22.2 and 1.21.1 include fixes for this issue. There is no workaround for this issue. |
2026-03-18 | |
| CVE-2026-31963 | 8.8 | HIGH | CWE-122 | 0.0% p14 | 6.16 | HTSlib is a library for reading and writing bioinformatics file formats. CRAM is...HTSlib is a library for reading and writing bioinformatics file formats. CRAM is a compressed format which stores DNA sequence alignment data. As one method of removing redundant data, CRAM uses reference-based compression so that instead of storing the full sequence for each alignment record it stores a location in an external reference sequence along with a list of differences to the reference at that location as a sequence of "features". When decoding these features, an out-by-one error in a test for CRAM features that appear beyond the extent of the CRAM record sequence could result in an invalid write of one attacker-controlled byte beyond the end of a heap buffer. Exploiting this bug causes a heap buffer overflow. If a user opens a file crafted to exploit this issue, it could lead to the program crashing, or overwriting of data and heap structures in ways not expected by the program. It may be possible to use this to obtain arbitrary code execution. Versions 1.23.1, 1.22.2 and 1.21.1 include fixes for this issue. There is no workaround for this issue. |
2026-03-18 | |
| CVE-2025-58112 | 8.8 | HIGH | CWE-89 | 0.1% p22 | 6.16 | Microsoft Dynamics 365 Customer Engagement (on-premises) 1612 (9.0.2.3034) allow...Microsoft Dynamics 365 Customer Engagement (on-premises) 1612 (9.0.2.3034) allows the generation of customized reports via raw SQL queries in an upload of a .rdl (Report Definition Language) file; this is then processed by the SQL Server Reporting Service. An account with the privilege Add Reporting Services Reports can upload a malicious rdl file. If the malicious rdl file is already loaded and it is executable by the user, the Add Reporting Services Reports privilege is not required. A malicious actor can trigger the generation of the report, causing the execution of arbitrary SQL commands in the underlying database. Depending on the permissions of the account running SQL Server Reporting Services, the attacker may be able to perform additional actions, such as accessing linked servers or executing operating system commands. |
2026-03-18 | |
| CVE-2026-32634 | 8.1 | HIGH | CWE-346 | 0.0% p2 | 5.67 | Glances is an open-source system cross-platform monitoring tool. Prior to versio...Glances is an open-source system cross-platform monitoring tool. Prior to version 4.5.2, in Central Browser mode, Glances stores both the Zeroconf-advertised server name and the discovered IP address for dynamic servers, but later builds connection URIs from the untrusted advertised name instead of the discovered IP. When a dynamic server reports itself as protected, Glances also uses that same untrusted name as the lookup key for saved passwords and the global `[passwords] default` credential. An attacker on the same local network can advertise a fake Glances service over Zeroconf and cause the browser to automatically send a reusable Glances authentication secret to an attacker-controlled host. This affects the background polling path and the REST/WebUI click-through path in Central Browser mode. Version 4.5.2 fixes the issue. |
2026-03-18 | |
| CVE-2026-32633 | 9.1 | CRITICAL | CWE-200 | 0.1% p20 | 6.37 | Glances is an open-source system cross-platform monitoring tool. Prior to versio...Glances is an open-source system cross-platform monitoring tool. Prior to version 4.5.2, in Central Browser mode, the `/api/4/serverslist` endpoint returns raw server objects from `GlancesServersList.get_servers_list()`. Those objects are mutated in-place during background polling and can contain a `uri` field with embedded HTTP Basic credentials for downstream Glances servers, using the reusable pbkdf2-derived Glances authentication secret. If the front Glances Browser/API instance is started without `--password`, which is supported and common for internal network deployments, `/api/4/serverslist` is completely unauthenticated. Any network user who can reach the Browser API can retrieve reusable credentials for protected downstream Glances servers once they have been polled by the browser instance. Version 4.5.2 fixes the issue. |
2026-03-18 | |
| CVE-2026-32632 | 5.9 | MEDIUM | CWE-346 | 0.0% p3 | 4.13 | Glances is an open-source system cross-platform monitoring tool. Glances recentl...Glances is an open-source system cross-platform monitoring tool. Glances recently added DNS rebinding protection for the MCP endpoint, but prior to version 4.5.2, the main REST/WebUI FastAPI application still accepts arbitrary `Host` headers and does not apply `TrustedHostMiddleware` or an equivalent host allowlist. As a result, the REST API, WebUI, and token endpoint remain reachable through attacker-controlled domains in classic DNS rebinding scenarios. Once the victim browser has rebound the attacker domain to the Glances service, same-origin policy no longer protects the API because the browser considers the rebinding domain to be the origin. This is a distinct issue from the previously reported default CORS weakness. CORS is not required for exploitation here because DNS rebinding causes the victim browser to treat the malicious domain as same-origin with the rebinding target. Version 4.5.2 contains a patch for the issue. |
2026-03-18 | |
| CVE-2026-32611 | 7.0 | HIGH | CWE-89 | 0.0% p2 | 4.90 | Glances is an open-source system cross-platform monitoring tool. The GHSA-x46r f...Glances is an open-source system cross-platform monitoring tool. The GHSA-x46r fix (commit 39161f0) addressed SQL injection in the TimescaleDB export module by converting all SQL operations to use parameterized queries and `psycopg.sql` composable objects. However, the DuckDB export module (`glances/exports/glances_duckdb/__init__.py`) was not included in this fix and contains the same class of vulnerability: table names and column names derived from monitoring statistics are directly interpolated into SQL statements via f-strings. While DuckDB INSERT values already use parameterized queries (`?` placeholders), the DDL construction and table name references do not escape or parameterize identifier names. Version 4.5.3 provides a more complete fix. |
2026-03-18 | |
| CVE-2026-31962 | 8.8 | HIGH | CWE-122 | 0.1% p17 | 6.16 | HTSlib is a library for reading and writing bioinformatics file formats. CRAM is...HTSlib is a library for reading and writing bioinformatics file formats. CRAM is a compressed format which stores DNA sequence alignment data. While most alignment records store DNA sequence and quality values, the format also allows them to omit this data in certain cases to save space. Due to some quirks of the CRAM format, it is necessary to handle these records carefully as they will actually store data that needs to be consumed and then discarded. Unfortunately the `cram_decode_seq()` did not handle this correctly in some cases. Where this happened it could result in reading a single byte from beyond the end of a heap allocation, followed by writing a single attacker-controlled byte to the same location. Exploiting this bug causes a heap buffer overflow. If a user opens a file crafted to exploit this issue, it could lead to the program crashing, or overwriting of data and heap structures in ways not expected by the program. It may be possible to use this to obtain arbitrary code execution. Versions 1.23.1, 1.22.2 and 1.21.1 include fixes for this issue. There is no workaround for this issue. |
2026-03-18 | |
| CVE-2026-30704 | 9.1 | CRITICAL | CWE-912 | 0.1% p18 | 6.37 | The WiFi Extender WDR201A (HW V2.1, FW LFMZX28040922V1.02) exposes an unprotecte...The WiFi Extender WDR201A (HW V2.1, FW LFMZX28040922V1.02) exposes an unprotected UART interface through accessible hardware pads on the PCB |
2026-03-18 | |
| CVE-2026-30703 | 9.8 | CRITICAL | CWE-78 | 0.4% p61 | 6.87 | A command injection vulnerability exists in the web management interface of the ...A command injection vulnerability exists in the web management interface of the WiFi Extender WDR201A (HW V2.1, FW LFMZX28040922V1.02). The adm.cgi endpoint improperly sanitizes user-supplied input provided to a command-related parameter in the sysCMD functionality. |
2026-03-18 | |
| CVE-2026-30702 | 9.8 | CRITICAL | CWE-285 | 0.1% p27 | 6.86 | The WiFi Extender WDR201A (HW V2.1, FW LFMZX28040922V1.02) implements a broken a...The WiFi Extender WDR201A (HW V2.1, FW LFMZX28040922V1.02) implements a broken authentication mechanism in its web management interface. The login page does not properly enforce session validation, allowing attackers to bypass authentication by directly accessing restricted web application endpoints through forced browsing |
2026-03-18 | |
| CVE-2026-30701 | 9.1 | CRITICAL | CWE-798 | 0.1% p26 | 6.37 | The web interface of the WiFi Extender WDR201A (HW V2.1, FW LFMZX28040922V1.02) ...The web interface of the WiFi Extender WDR201A (HW V2.1, FW LFMZX28040922V1.02) contains hardcoded credential disclosure mechanisms (in the form of Server Side Include) within multiple server-side web pages, including login.shtml and settings.shtml. These pages embed server-side execution directives that dynamically retrieve and expose the web administration password from non-volatile memory at runtime. |
2026-03-18 | |
| CVE-2026-30048 | 5.4 | MEDIUM | CWE-79 | 0.0% p8 | 3.78 | A stored cross-site scripting (XSS) vulnerability exists in the NotChatbot WebCh...A stored cross-site scripting (XSS) vulnerability exists in the NotChatbot WebChat widget thru 1.4.4. User-supplied input is not properly sanitized before being stored and rendered in the chat conversation history. This allows an attacker to inject arbitrary JavaScript code which is executed when the chat history is reloaded. The issue is reproducible across multiple independent implementations of the widget, indicating that the vulnerability resides in the product itself rather than in a specific website configuration. |
2026-03-18 | |
| CVE-2026-29859 | 9.8 | CRITICAL | CWE-79 | 0.1% p26 | 6.86 | An arbitrary file upload vulnerability in aaPanel v7.57.0 allows attackers to ex...An arbitrary file upload vulnerability in aaPanel v7.57.0 allows attackers to execute arbitrary code via uploading a crafted file. |
2026-03-18 | |
| CVE-2026-29858 | 7.5 | HIGH | CWE-98 | 0.0% p11 | 5.25 | A lack of path validation in aaPanel v7.57.0 allows attackers to execute a local...A lack of path validation in aaPanel v7.57.0 allows attackers to execute a local file inclusion (LFI), leadingot sensitive information exposure. |
2026-03-18 | |
| CVE-2026-29856 | 7.5 | HIGH | CWE-400 | 0.0% p15 | 5.25 | An issue in the VirtualHost configuration handling/parser component of aaPanel v...An issue in the VirtualHost configuration handling/parser component of aaPanel v7.57.0 allows attackers to cause a Regular Expression Denial of Service (ReDoS) via a crafted input. |
2026-03-18 | |
| CVE-2026-27135 | 7.5 | HIGH | CWE-617 | 0.0% p3 | 5.25 | nghttp2 is an implementation of the Hypertext Transfer Protocol version 2 in C. ...nghttp2 is an implementation of the Hypertext Transfer Protocol version 2 in C. Prior to version 1.68.1, the nghttp2 library stops reading the incoming data when user facing public API `nghttp2_session_terminate_session` or `nghttp2_session_terminate_session2` is called by the application. They might be called internally by the library when it detects the situation that is subject to connection error. Due to the missing internal state validation, the library keeps reading the rest of the data after one of those APIs is called. Then receiving a malformed frame that causes FRAME_SIZE_ERROR causes assertion failure. nghttp2 v1.68.1 adds missing state validation to avoid assertion failure. No known workarounds are available. |
2026-03-18 | |
| CVE-2026-26948 | 4.9 | MEDIUM | CWE-1258 | 0.1% p16 | 3.43 | Dell Integrated Dell Remote Access Controller 9, 14G versions prior to 7.00.00.1...Dell Integrated Dell Remote Access Controller 9, 14G versions prior to 7.00.00.174, 15G and 16G versions prior to 7.10.90.00, contain an Exposure of Sensitive System Information Due to Uncleared Debug Information vulnerability. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to information disclosure. |
2026-03-18 | |
| CVE-2026-26945 | 5.3 | MEDIUM | CWE-114 | 0.1% p18 | 3.71 | Dell Integrated Dell Remote Access Controller 9, 14G versions prior to 7.00.00.1...Dell Integrated Dell Remote Access Controller 9, 14G versions prior to 7.00.00.181, 15G and 16G versions prior to 7.20.10.50 and Dell Integrated Dell Remote Access Controller 10, 17G versions prior to 1.20.25.00, contain a Process Control vulnerability. A high privileged attacker with adjacent network access could potentially exploit this vulnerability, leading to code execution. |
2026-03-18 | |
| CVE-2026-26740 | 8.2 | HIGH | CWE-787 | 0.1% p34 | 5.74 | Buffer Overflow vulnerability in giflib v.5.2.2 allows a remote attacker to caus...Buffer Overflow vulnerability in giflib v.5.2.2 allows a remote attacker to cause a denial of service via the EGifGCBToExtension overwriting an existing Graphic Control Extension block without validating its allocated size. |
2026-03-18 | |
| CVE-2026-32610 | 8.1 | HIGH | CWE-942 | 0.0% p9 | 5.67 | Glances is an open-source system cross-platform monitoring tool. Prior to versio...Glances is an open-source system cross-platform monitoring tool. Prior to version 4.5.2, the Glances REST API web server ships with a default CORS configuration that sets `allow_origins=["*"]` combined with `allow_credentials=True`. When both of these options are enabled together, Starlette's `CORSMiddleware` reflects the requesting `Origin` header value in the `Access-Control-Allow-Origin` response header instead of returning the literal `*` wildcard. This effectively grants any website the ability to make credentialed cross-origin API requests to the Glances server, enabling cross-site data theft of system monitoring information, configuration secrets, and command line arguments from any user who has an active browser session with a Glances instance. Version 4.5.2 fixes the issue. |
2026-03-18 | |
| CVE-2026-30695 | 6.1 | MEDIUM | CWE-79 | 0.0% p8 | 4.27 | A Cross-Site Scripting (XSS) vulnerability exists in the web-based configuration...A Cross-Site Scripting (XSS) vulnerability exists in the web-based configuration interface of Zucchetti Axess access control devices, including XA4, X3/X3BIO, X4, X7, and XIO / i-door / i-door+. The vulnerability is caused by improper sanitization of user-supplied input in the dirBrowse parameter of the /file_manager.cgi endpoint. |
2026-03-18 | |
| CVE-2026-30345 | 7.5 | HIGH | CWE-23 | 0.0% p15 | 5.25 | A zip slip vulnerability in the Admin import functionality of CTFd v3.8.1-18-gdb...A zip slip vulnerability in the Admin import functionality of CTFd v3.8.1-18-gdb5a18c4 allows attackers to write arbitrary files outside the intended directories via supplying a crafted import. |
2026-03-18 | |
| CVE-2026-1463 | 8.8 | HIGH | CWE-98 | 0.1% p30 | 6.16 | The Photo Gallery, Sliders, Proofing and Themes – NextGEN Gallery plugin for Wor...The Photo Gallery, Sliders, Proofing and Themes – NextGEN Gallery plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 4.0.3 via the 'template' parameter in gallery shortcodes. This makes it possible for authenticated attackers, with Author-level access and above, to include and execute arbitrary .php files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where .php file types can be uploaded and included. |
2026-03-18 | |
| CVE-2025-67830 | 9.8 | CRITICAL | CWE-89 | 0.0% p12 | 6.86 | Mura before 10.1.14 allows beanFeed.cfc getQuery sortby SQL injection.Mura before 10.1.14 allows beanFeed.cfc getQuery sortby SQL injection. |
2026-03-18 | |
| CVE-2026-3090 | 7.2 | HIGH | CWE-79 | 0.1% p23 | 5.04 | The Post SMTP – Complete Email Deliverability and SMTP Solution with Email Logs,...The Post SMTP – Complete Email Deliverability and SMTP Solution with Email Logs, Alerts, Backup SMTP & Mobile App plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘event_type’ parameter in all versions up to, and including, 3.8.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. The vulnerability is only exploitable when the Post SMTP Pro plugin is also installed and its Reporting and Tracking extension is enabled. |
2026-03-18 | |
| CVE-2026-33004 | 4.3 | MEDIUM | CWE-200 | 0.0% p8 | 3.01 | Jenkins LoadNinja Plugin 2.1 and earlier does not mask LoadNinja API keys displa...Jenkins LoadNinja Plugin 2.1 and earlier does not mask LoadNinja API keys displayed on the job configuration form, increasing the potential for attackers to observe and capture them. |
2026-03-18 | |
| CVE-2026-33003 | 4.3 | MEDIUM | CWE-312 | 0.0% p8 | 3.01 | Jenkins LoadNinja Plugin 2.1 and earlier stores LoadNinja API keys unencrypted i...Jenkins LoadNinja Plugin 2.1 and earlier stores LoadNinja API keys unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system. |
2026-03-18 | |
| CVE-2026-33002 | 7.5 | HIGH | CWE-350 | 0.0% p14 | 5.25 | Jenkins 2.442 through 2.554 (both inclusive), LTS 2.426.3 through LTS 2.541.2 (b...Jenkins 2.442 through 2.554 (both inclusive), LTS 2.426.3 through LTS 2.541.2 (both inclusive) performs origin validation of requests made through the CLI WebSocket endpoint by computing the expected origin for comparison using the Host or X-Forwarded-Host HTTP request headers, making it vulnerable to DNS rebinding attacks that allow bypassing origin validation. |
2026-03-18 | |
| CVE-2026-2992 | 8.2 | HIGH | CWE-862 | 0.0% p14 | 5.74 | The KiviCare – Clinic & Patient Management System (EHR) plugin for WordPress is ...The KiviCare – Clinic & Patient Management System (EHR) plugin for WordPress is vulnerable to Privilege Escalation due to missing authorization on the `/wp-json/kivicare/v1/setup-wizard/clinic` REST API endpoint in all versions up to, and including, 4.1.2. This makes it possible for unauthenticated attackers to create a new clinic and a WordPress user with clinic admin privileges. |
2026-03-18 | |
| CVE-2026-2991 | 7.3 | HIGH | CWE-287 | 0.2% p45 | 5.12 | The KiviCare – Clinic & Patient Management System (EHR) plugin for WordPress is ...The KiviCare – Clinic & Patient Management System (EHR) plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 4.1.2. This is due to the `patientSocialLogin()` function not verifying the social provider access token before authenticating a user. This makes it possible for unauthenticated attackers to log in as any patient registered on the system by providing only their email address and an arbitrary value for the access token, bypassing all credential verification. The attacker gains access to sensitive medical records, appointments, prescriptions, and billing information (PII/PHI breach). Additionally, authentication cookies are set before the role check, meaning the auth cookies for non-patient users (including administrators) are also set in the HTTP response headers, even though a 403 response is returned. |
2026-03-18 | |
| CVE-2026-2559 | 5.3 | MEDIUM | CWE-862 | 0.0% p8 | 3.71 | The Post SMTP plugin for WordPress is vulnerable to unauthorized modification of...The Post SMTP plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the `handle_office365_oauth_redirect()` function in all versions up to, and including, 3.8.0. This is due to the function being hooked to `admin_init` without any `current_user_can()` check or nonce verification. This makes it possible for authenticated attackers, with Subscriber-level access and above, to overwrite the site's Office 365 OAuth mail configuration (access token, refresh token, and user email) via a crafted URL. The configuration option is used during wizard setup of Microsoft365 SMTP, only available in the Pro option of the plugin. This could cause an Administrator to believe an attacker-controlled Azure app is their own, and lead them to connect the plugin to the attacker's account during configuration after upgrading to Pro. |
2026-03-18 | |
| CVE-2026-2512 | 6.4 | MEDIUM | CWE-79 | 0.0% p10 | 4.48 | The Code Embed plugin for WordPress is vulnerable to Stored Cross-Site Scripting...The Code Embed plugin for WordPress is vulnerable to Stored Cross-Site Scripting via custom field meta values in all versions up to, and including, 2.5.1. This is due to the plugin's sanitization function `sec_check_post_fields()` only running on the `save_post` hook, while WordPress allows custom fields to be added via the `wp_ajax_add_meta` AJAX endpoint without triggering `save_post`. The `ce_filter()` function then outputs these unsanitized meta values directly into page content without escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-03-18 | |
| CVE-2026-24063 | 8.2 | HIGH | CWE-276 | 0.0% p1 | 5.74 | When a plugin is installed using the Arturia Software Center (MacOS), it also in...When a plugin is installed using the Arturia Software Center (MacOS), it also installs an uninstall.sh bash script in a root owned path. This script is written to disk with the file permissions 777, meaning it is writable by any user. When uninstalling a plugin via the Arturia Software Center the Privileged Helper gets instructed to execute this script. When the bash script is manipulated by an attacker this scenario will lead to privilege escalation. |
2026-03-18 | |
| CVE-2026-24062 | 7.8 | HIGH | CWE-306 | 0.0% p2 | 5.46 | The "Privileged Helper" component of the Arturia Software Center (MacOS) does no...The "Privileged Helper" component of the Arturia Software Center (MacOS) does not perform sufficient client code signature validation when a client connects. This leads to an attacker being able to connect to the helper and execute privileged actions leading to local privilege escalation. |
2026-03-18 | |
| CVE-2025-67829 | 9.8 | CRITICAL | CWE-89 | 0.0% p12 | 6.86 | Mura before 10.1.14 allows beanFeed.cfc getQuery sortDirection SQL injection.Mura before 10.1.14 allows beanFeed.cfc getQuery sortDirection SQL injection. |
2026-03-18 | |
| CVE-2025-55046 | 8.1 | HIGH | CWE-352 | 0.0% p3 | 5.67 | MuraCMS through 10.1.10 contains a CSRF vulnerability that allows attackers to p...MuraCMS through 10.1.10 contains a CSRF vulnerability that allows attackers to permanently destroy all deleted content stored in the trash system through a simple CSRF attack. The vulnerable cTrash.empty function lacks CSRF token validation, enabling malicious websites to forge requests that irreversibly delete all trashed content when an authenticated administrator visits a crated webpage. Successful exploitation of the CSRF vulnerability results in potentially catastrophic data loss within the MuraCMS system. When an authenticated administrator visits a malicious page containing the CSRF exploit, their browser automatically submits a hidden form that permanently empties the entire trash system without any validation, confirmation dialog, or user consent. |
2026-03-18 | |
| CVE-2025-55045 | 7.1 | HIGH | CWE-352 | 0.0% p2 | 4.97 | The update address CSRF vulnerability in MuraCMS through 10.1.10 allows attacker...The update address CSRF vulnerability in MuraCMS through 10.1.10 allows attackers to manipulate user address information through CSRF. The vulnerable cUsers.updateAddress function lacks CSRF token validation, enabling malicious websites to forge requests that add, modify, or delete user addresses when an authenticated administrator visits a crafted webpage. Successful exploitation of the update address CSRF vulnerability results in unauthorized manipulation of user address information within the MuraCMS system, potentially compromising user data integrity and organizational communications. When an authenticated administrator visits a malicious webpage containing the CSRF exploit, their browser automatically submits a hidden form that can add malicious addresses with attacker-controlled email addresses and phone numbers, update existing addresses to redirect communications to attacker-controlled locations or deleted legitimate address records to disrupt business operations. This can lead to misdirected sensitive communications, compromise of user privacy through injection of attacker contact information, disruption of legitimate business correspondence, and potential social engineering attacks via the corrupted address data. |
2026-03-18 | |
| CVE-2025-55044 | 8.8 | HIGH | CWE-352 | 0.0% p4 | 6.16 | The Trash Restore CSRF vulnerability in MuraCMS through 10.1.10 allows attackers...The Trash Restore CSRF vulnerability in MuraCMS through 10.1.10 allows attackers to restore deleted content from the trash to unauthorized locations through CSRF. The vulnerable cTrash.restore function lacks CSRF token validation, enabling malicious websites to forge requests that restore content to arbitrary parent locations when an authenticated administrator visits a crafted webpage. Successful exploitation of the Trash Restore CSRF vulnerability results in unauthorized restoration of deleted content to potentially inappropriate or malicious locations within the MuraCMS website structure. When an authenticated administrator visits a malicious webpage containing the CSRF exploit, their browser automatically submits a hidden form that restores specified content from the trash to a location determined by the attacker through the parentid parameter. This can lead to restoration of previously deleted malicious content, placement of sensitive documents in public areas, manipulation of website navigation structure, or restoration of outdated content that was intentionally removed for security or compliance reasons. |
2026-03-18 | |
| CVE-2025-55043 | 6.5 | MEDIUM | CWE-352 | 0.0% p8 | 4.55 | MuraCMS through 10.1.10 contains a CSRF vulnerability in the bundle creation fun...MuraCMS through 10.1.10 contains a CSRF vulnerability in the bundle creation functionality (csettings.cfc createBundle method) that allows unauthenticated attackers to force administrators to create and save site bundles containing sensitive data to publicly accessible directories. This vulnerability enables complete data exfiltration including user accounts, password hashes, form submissions, email lists, plugins, and site content without administrator knowledge. This CSRF vulnerability enables complete data exfiltration from MuraCMS installations without requiring authentication. Attackers can force administrators to unknowingly create site bundles containing sensitive data, which are saved to publicly accessible web directories. The attack executes silently, leaving administrators unaware that confidential information has been compromised and is available for unauthorized download. |
2026-03-18 | |
| CVE-2025-55041 | 8.0 | HIGH | CWE-352 | 0.0% p4 | 5.60 | MuraCMS through 10.1.10 contains a CSRF vulnerability in the Add To Group functi...MuraCMS through 10.1.10 contains a CSRF vulnerability in the Add To Group functionality for user management (cUsers.cfc addToGroup method) that allows attackers to escalate privileges by adding any user to any group without proper authorization checks. The vulnerable function lacks CSRF token validation and directly processes user-supplied userId and groupId parameters via getUserManager().createUserInGorup(), enabling malicious websites to forge requests that automatically execute when an authenticated administrator visits a crafted page. Adding a user to the Super Admins group (s2 user) is not possible. Successful exploitation results in the attacker gaining privilege escalation both horizontally to other groups and vertically to the admin group. Escalation to the s2 User group is not possible. |
2026-03-18 | |
| CVE-2025-55040 | 8.8 | HIGH | CWE-352 | 0.0% p4 | 6.16 | The import form CSRF vulnerability in MuraCMS through 10.1.10 allows attackers t...The import form CSRF vulnerability in MuraCMS through 10.1.10 allows attackers to upload and install malicious form definitions through a CSRF attack. The vulnerable cForm.importform function lacks CSRF token validation, enabling malicious websites to forge file upload requests that install attacker-controlled forms when an authenticated administrator visits a crafted webpage. Full exploitation of this vulnerability would require the victim to select a malicious ZIP file containing form definitions, which can be automatically generated by the exploit page and used to create data collection forms that steal sensitive information. Successful exploitation of the import form CSRF vulnerability could result in the installation of malicious data collection forms on the target MuraCMS website that can steal sensitive user information. When an authenticated administrator visits a malicious webpage containing the CSRF exploit and selects the attacker-generated ZIP file, their browser uploads and installs form definitions that create legitimate forms that could be designed with malicious content. |
2026-03-18 | |
| CVE-2026-32609 | 7.5 | HIGH | CWE-200 | 0.1% p35 | 5.25 | Glances is an open-source system cross-platform monitoring tool. The GHSA-gh4x f...Glances is an open-source system cross-platform monitoring tool. The GHSA-gh4x fix (commit 5d3de60) addressed unauthenticated configuration secrets exposure on the `/api/v4/config` endpoints by introducing `as_dict_secure()` redaction. However, the `/api/v4/args` and `/api/v4/args/{item}` endpoints were not addressed by this fix. These endpoints return the complete command-line arguments namespace via `vars(self.args)`, which includes the password hash (salt + pbkdf2_hmac), SNMP community strings, SNMP authentication keys, and the configuration file path. When Glances runs without `--password` (the default), these endpoints are accessible without any authentication. Version 4.5.2 provides a more complete fix. |
2026-03-18 | |
| CVE-2026-3278 | 7.4 | HIGH | CWE-79 | 0.0% p8 | 5.18 | Improper neutralization of input during web page generation ('cross-site scripti...Improper neutralization of input during web page generation ('cross-site scripting') vulnerability in OpenText™ ZENworks Service Desk allows Cross-Site Scripting (XSS). The vulnerability could allow an attacker to execute arbitrary JavaScript leading to unauthorized actions on behalf of the user.This issue affects ZENworks Service Desk: 25.2, 25.3. |
2026-03-18 | |
| CVE-2026-32694 | 6.6 | MEDIUM | CWE-343 | 0.0% p11 | 4.62 | In Juju from version 3.0.0 through 3.6.18, when a secret owner grants permission...In Juju from version 3.0.0 through 3.6.18, when a secret owner grants permissions to a secret to a grantee, the secret owner relies exclusively on a predictable XID of the secret to verify ownership. This allows a malicious grantee which can request secrets to predict past secrets granted by the same secret owner to different grantees, allowing them to use the resources granted by those past secrets. Successful exploitation relies on a very specific configuration, specific data semantic, and the administrator having the need to deploy at least two different applications, one of them controlled by the attacker. |
2026-03-18 | |
| CVE-2026-25449 | 0.0 | NONE | CWE-502 | 0.0% p8 | 0.00 | Deserialization of Untrusted Data vulnerability in shinetheme Traveler traveler ...Deserialization of Untrusted Data vulnerability in shinetheme Traveler traveler allows Object Injection.This issue affects Traveler: from n/a through < 3.2.8.1. |
2026-03-18 | |
| CVE-2026-32693 | 8.8 | HIGH | CWE-284 | 0.1% p18 | 6.16 | In Juju from version 3.0.0 through 3.6.18, the authorization of the "secret-set"...In Juju from version 3.0.0 through 3.6.18, the authorization of the "secret-set" tool is not performed correctly, which allows a grantee to update the secret content, and can lead to reading or updating other secrets. When the "secret-set" tool logs an error in an exploitation attempt, the secret is still updated contrary to expectations, and the new value is visible to both the owner and the grantee. |
2026-03-18 | |
| CVE-2026-32692 | 7.6 | HIGH | CWE-285 | 0.0% p8 | 5.32 | An authorization bypass vulnerability in the Vault secrets back-end implementati...An authorization bypass vulnerability in the Vault secrets back-end implementation of Juju versions 3.1.6 through 3.6.18 allows an authenticated unit agent to perform unauthorized updates to secret revisions. With sufficient information, an attacker can poison any existing secret revision within the scope of that Vault secret back-end. |
2026-03-18 | |
| CVE-2026-32691 | 5.3 | MEDIUM | CWE-708 | 0.0% p1 | 3.71 | A race condition in the secrets management subsystem of Juju versions 3.0.0 thro...A race condition in the secrets management subsystem of Juju versions 3.0.0 through 3.6.18 allows an authenticated unit agent to claim ownership of a newly initialized secret. Between generating a Juju Secret ID and creating the secret's first revision, an attacker authenticated as another unit agent can claim ownership of a known secret. This leads to the attacking unit being able to read the content of the initial secret revision. |
2026-03-18 | |
| CVE-2026-33265 | 6.3 | MEDIUM | CWE-669 | 0.1% p17 | 4.41 | In LibreChat 0.8.1-rc2, a logged-in user obtains a JWT for both the LibreChat AP...In LibreChat 0.8.1-rc2, a logged-in user obtains a JWT for both the LibreChat API and the RAG API. |
2026-03-18 | |
| CVE-2025-41258 | 8.0 | HIGH | CWE-284 | 0.1% p18 | 5.60 | LibreChat version 0.8.1-rc2 uses the same JWT secret for the user session mechan...LibreChat version 0.8.1-rc2 uses the same JWT secret for the user session mechanism and RAG API which compromises the service-level authentication of the RAG API. |
2026-03-18 | |
| CVE-2026-32565 | 0.0 | NONE | CWE-862 | 0.0% p5 | 0.00 | Missing Authorization vulnerability in Ajay Contextual Related Posts contextual-...Missing Authorization vulnerability in Ajay Contextual Related Posts contextual-related-posts allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Contextual Related Posts: from n/a through < 4.2.2. |
2026-03-18 | |
| CVE-2026-1217 | 5.4 | MEDIUM | CWE-862 | 0.0% p7 | 3.78 | The Yoast Duplicate Post plugin for WordPress is vulnerable to unauthorized modi...The Yoast Duplicate Post plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the clone_bulk_action_handler() and republish_request() functions in all versions up to, and including, 4.5. This makes it possible for authenticated attackers, with Contributor-level access and above, to duplicate any post on the site including private, draft, and trashed posts they shouldn't have access to. Additionally, attackers with Author-level access and above can use the Rewrite & Republish feature to overwrite any published post with their own content. |
2026-03-18 | |
| CVE-2026-22323 | 7.1 | HIGH | CWE-352 | 0.0% p11 | 4.97 | A CSRF vulnerability in the Link Aggregation configuration interface allows an u...A CSRF vulnerability in the Link Aggregation configuration interface allows an unauthenticated remote attacker to trick authenticated users into sending unauthorized POST requests to the device by luring them to a malicious webpage. This can silently alter the device’s configuration without the victim’s knowledge or consent. Availability impact was set to low because after a successful attack the device will automatically recover without external intervention. |
2026-03-18 | |
| CVE-2026-22322 | 7.1 | HIGH | CWE-79 | 0.1% p25 | 4.97 | A stored cross‑site scripting (XSS) vulnerability in the Link Aggregation config...A stored cross‑site scripting (XSS) vulnerability in the Link Aggregation configuration interface allows an unauthenticated remote attacker to create a trunk entry containing malicious HTML/JavaScript code. When the affected page is viewed, the injected script executes in the context of the victim’s browser, enabling unauthorized actions such as interface manipulation. The session cookie is secured by the httpOnly Flag. Therefore an attacker is not able to take over the session of an authenticated user. |
2026-03-18 | |
| CVE-2026-22321 | 5.3 | MEDIUM | CWE-121 | 0.0% p14 | 3.71 | A stack-based buffer overflow in the device's Telnet/SSH CLI login routine occur...A stack-based buffer overflow in the device's Telnet/SSH CLI login routine occurs when a unauthenticated attacker send an oversized or unexpected username input. An overflow condition crashes the thread handling the login attempt, forcing the session to close. Because other CLI sessions remain unaffected, the impact is limited to a low‑severity availability disruption. |
2026-03-18 | |
| CVE-2026-22320 | 6.5 | MEDIUM | CWE-121 | 0.0% p13 | 4.55 | A stack-based buffer overflow in the CLI's TFTP file‑transfer command handling a...A stack-based buffer overflow in the CLI's TFTP file‑transfer command handling allows a low-privileged attacker with Telnet/SSH access to trigger memory corruption by supplying unexpected or oversized filename input. Exploitation results in the corruption of the internal buffer, causing the CLI and web dashboard to become unavailable and leading to a denial of service. |
2026-03-18 | |
| CVE-2026-22319 | 4.9 | MEDIUM | CWE-121 | 0.0% p14 | 3.43 | A stack-based buffer overflow in the device's file installation workflow allows ...A stack-based buffer overflow in the device's file installation workflow allows a high-privileged attacker to send oversized POST parameters that overflow a fixed-size stack buffer within an internal process, resulting in a DoS attack. |
2026-03-18 | |
| CVE-2026-22318 | 4.9 | MEDIUM | CWE-121 | 0.0% p14 | 3.43 | A stack-based buffer overflow vulnerability in the device's file transfer parame...A stack-based buffer overflow vulnerability in the device's file transfer parameter workflow allows a high-privileged attacker to send oversized POST parameters, causing memory corruption in an internal process, resulting in a DoS attack. |
2026-03-18 | |
| CVE-2026-22317 | 7.2 | HIGH | CWE-77 | 0.1% p23 | 5.04 | A command injection vulnerability in the device’s Root CA certificate transfer w...A command injection vulnerability in the device’s Root CA certificate transfer workflow allows a high-privileged attacker to send crafted HTTP POST requests that result in arbitrary command execution on the underlying Linux OS with root privileges. |
2026-03-18 | |
| CVE-2026-22316 | 6.5 | MEDIUM | CWE-121 | 0.1% p27 | 4.55 | A remote attacker with user privileges for the webUI can use the setting of the ...A remote attacker with user privileges for the webUI can use the setting of the TFTP Filename with a POST Request to trigger a stack-based Buffer Overflow, resulting in a DoS attack. |
2026-03-18 | |
| CVE-2025-31703 | 2.4 | LOW | CWE-305 | 0.0% p8 | 1.68 | A vulnerability found in Dahua NVR/XVR device. A third-party malicious attacker ...A vulnerability found in Dahua NVR/XVR device. A third-party malicious attacker with physical access to the device may gain access to a restricted shell via the serial port, and bypasses the shell's authentication mechanism to escalate privileges. |
2026-03-18 | |
| CVE-2026-3512 | 6.1 | MEDIUM | CWE-79 | 0.0% p7 | 4.27 | The Writeprint Stylometry plugin for WordPress is vulnerable to Reflected Cross-...The Writeprint Stylometry plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'p' GET parameter in all versions up to and including 0.1. This is due to insufficient input sanitization and output escaping in the bjl_wprintstylo_comments_nav() function. The function directly outputs the $_GET['p'] parameter into an HTML href attribute without any escaping. This makes it possible for authenticated attackers with Contributor-level permissions or higher to inject arbitrary web scripts in pages that execute if they can successfully trick another user into performing an action such as clicking on a link. |
2026-03-18 | |
| CVE-2026-32608 | 7.0 | HIGH | CWE-78 | 0.0% p0 | 4.90 | Glances is an open-source system cross-platform monitoring tool. The Glances act...Glances is an open-source system cross-platform monitoring tool. The Glances action system allows administrators to configure shell commands that execute when monitoring thresholds are exceeded. These commands support Mustache template variables (e.g., `{{name}}`, `{{key}}`) that are populated with runtime monitoring data. The `secure_popen()` function, which executes these commands, implements its own pipe, redirect, and chain operator handling by splitting the command string before passing each segment to `subprocess.Popen(shell=False)`. Prior to 4.5.2, when a Mustache-rendered value (such as a process name, filesystem mount point, or container name) contains pipe, redirect, or chain metacharacters, the rendered command is split in unintended ways, allowing an attacker who controls a process name or container name to inject arbitrary commands. Version 4.5.2 fixes the issue. |
2026-03-18 | |
| CVE-2025-15363 | 5.9 | MEDIUM | CWE-79 | 0.0% p9 | 4.13 | The Get Use APIs WordPress plugin before 2.0.10 executes imported JSON, which c...The Get Use APIs WordPress plugin before 2.0.10 executes imported JSON, which could allow users with a role as low as contributor to perform Cross-Site Scripting attacks under certain server configurations. |
2026-03-18 | |
| CVE-2026-32606 | 7.6 | HIGH | CWE-522 | 0.0% p0 | 5.32 | IncusOS is an immutable OS image dedicated to running Incus. Prior to 2026031420...IncusOS is an immutable OS image dedicated to running Incus. Prior to 202603142010, the default configuration of systemd-cryptenroll as used by IncusOS through mkosi allows for an attacker with physical access to the machine to access the encrypted data without requiring any interaction by the system's owner or any tampering of Secure Boot state or kernel (UKI) boot image. That's because in this configuration, the LUKS key is made available by the TPM so long as the system has the expected PCR7 value and the PCR11 policy matches. That default PCR11 policy importantly allows for the TPM to release the key to the booted system rather than just from the initrd part of the signed kernel image (UKI). The attack relies on the attacker being able to substitute the original encrypted root partition for one that they control. By doing so, the system will prompt for a recovery key on boot, which the attacker has defined and can provide, before booting the system using the attacker's root partition rather than the system's original one. The attacker only needs to put a systemd unit starting on system boot within their root partition to have the system run that logic on boot. That unit will then run in an environment where the TPM will allow for the retrieval of the encryption key of the real root disk, allowing the attacker to steal the LUKS volume key (immutable master key) and then use it against the real root disk, altering it or getting data out before putting the disk back the way it was and returning the system without a trace of this attack having happened. This is all possible because the system will have still booted with Secure Boot enabled, will have measured and ran the expected bootloader and kernel image (UKI). The initrd selects the root disk based on GPT partition identifiers making it possible to easily substitute the real root disk for an attacker controlled one. This doesn't lead to any change in the TPM state and therefore allows for retrieval of the LUKS key by the attacker through a boot time systemd unit on their alternative root partition. IncusOS version 202603142010 (2026/03/14 20:10 UTC) includes the new PCR15 logic and will automatically update the TPM policy on boot. Anyone suspecting that their system may have been physically accessed while shut down should perform a full system wipe and reinstallation as only that will rotate the LUKS volume key and prevent subsequent access to the encrypted data should the system have been previously compromised. There are no known workarounds other than updating to a version with corrected logic which will automatically rebind the LUKS keys to the new set of TPM registers and prevent this from being exploited. |
2026-03-18 | |
| CVE-2026-32596 | 8.7 | HIGH | CWE-200 | 3.6% p87 | 6.20 | Glances is an open-source system cross-platform monitoring tool. Prior to 4.5.2,...Glances is an open-source system cross-platform monitoring tool. Prior to 4.5.2, Glances web server runs without authentication by default when started with `glances -w`, exposing REST API with sensitive system information including process command-lines containing credentials (passwords, API keys, tokens) to any network client. Version 4.5.2 fixes the issue. |
2026-03-18 | |
| CVE-2026-32268 | 8.7 | HIGH | CWE-862 | 0.0% p5 | 6.09 | The Azure Blob Storage for Craft CMS plugin provides an Azure Blob Storage integ...The Azure Blob Storage for Craft CMS plugin provides an Azure Blob Storage integration for Craft CMS. In versions on the 2.x branch prior to 2.1.1, unauthenticated users can view a list of buckets the plugin has access to. The `DefaultController->actionLoadContainerData()` endpoint allows unauthenticated users with a valid CSRF token to view a list of buckets that the plugin is allowed to see. Because Azure can return sensitive data in error messages, additional attack vectors are also exposed. Users should update to version 2.1.1 of the plugin to mitigate the issue. |
2026-03-18 | |
| CVE-2026-4366 | 5.8 | MEDIUM | CWE-918 | 0.0% p8 | 4.06 | A flaw was identified in Keycloak, an identity and access management solution, w...A flaw was identified in Keycloak, an identity and access management solution, where it improperly follows HTTP redirects when processing certain client configuration requests. This behavior allows an attacker to trick the server into making unintended requests to internal or restricted resources. As a result, sensitive internal services such as cloud metadata endpoints could be accessed. This issue may lead to information disclosure and enable attackers to map internal network infrastructure. |
2026-03-18 | |
| CVE-2026-33189 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: Further research determined the issue originates from a differe...Rejected reason: Further research determined the issue originates from a different product. |
2026-03-18 | |
| CVE-2026-33188 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: Further research determined the issue originates from a differe...Rejected reason: Further research determined the issue originates from a different product. |
2026-03-18 | |
| CVE-2026-33187 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: Further research determined the issue originates from a differe...Rejected reason: Further research determined the issue originates from a different product. |
2026-03-18 | |
| CVE-2026-33058 | 8.4 | HIGH | CWE-89 | 0.0% p7 | 5.88 | Kanboard is project management software focused on Kanban methodology. Versions ...Kanboard is project management software focused on Kanban methodology. Versions prior to 1.2.51 have an authenticated SQL injection vulnerability. Attackers with the permission to add users to a project can leverage this vulnerability to dump the entirety of the kanboard database. Version 1.2.51 fixes the issue. |
2026-03-18 | |
| CVE-2026-32266 | 2.4 | LOW | CWE-200 | 0.0% p6 | 1.68 | The Google Cloud Storage for Craft CMS plugin provides a Google Cloud Storage in...The Google Cloud Storage for Craft CMS plugin provides a Google Cloud Storage integration for Craft CMS. In versions on the 2.x branch prior to 2.2.1, the `DefaultController->actionLoadBucketData()` endpoint allows unauthenticated users with a valid CSRF token to view a list of buckets that the plugin is allowed to see. Users should update to version 2.2.1 of the plugin to mitigate the issue. |
2026-03-18 | |
| CVE-2026-32265 | 6.9 | MEDIUM | CWE-200 | 0.0% p6 | 4.83 | The Amazon S3 for Craft CMS plugin provides an Amazon S3 integration for Craft C...The Amazon S3 for Craft CMS plugin provides an Amazon S3 integration for Craft CMS. In versions 2.0.2 through 2.2.4, unauthenticated users can view a list of buckets the plugin has access to. The `BucketsController->actionLoadBucketData()` endpoint allows unauthenticated users with a valid CSRF token to view a list of buckets that the plugin is allowed to see. Users should update to version 2.2.5 of the plugin to mitigate the issue. |
2026-03-18 | |
| CVE-2026-32256 | 7.5 | HIGH | CWE-835 | 0.0% p4 | 5.25 | music-metadata is a metadata parser for audio and video media files. Prior to ve...music-metadata is a metadata parser for audio and video media files. Prior to version 11.12.3, music-metadata's ASF parser (`parseExtensionObject()` in `lib/asf/AsfParser.ts:112-158`) enters an infinite loop when a sub-object inside the ASF Header Extension Object has `objectSize = 0`. Version 11.12.3 fixes the issue. |
2026-03-18 | |
| CVE-2026-32254 | 7.1 | HIGH | CWE-284 | 0.0% p14 | 4.97 | Kube-router is a turnkey solution for Kubernetes networking. Prior to version 2....Kube-router is a turnkey solution for Kubernetes networking. Prior to version 2.8.0, Kube-router's proxy module does not validate externalIPs or loadBalancer IPs before programming them into the node's network configuration. Version 2.8.0 contains a patch for the issue. Available workarounds include enabling DenyServiceExternalIPs feature gate, deploying admission policy, restricting service creation RBAC, monitoring service changes, and applying BGP prefix filtering. |
2026-03-18 | |
| CVE-2026-31938 | 9.6 | CRITICAL | CWE-79 | 0.0% p12 | 6.72 | jsPDF is a library to generate PDFs in JavaScript. Prior to version 4.2.1, user ...jsPDF is a library to generate PDFs in JavaScript. Prior to version 4.2.1, user control of the `options` argument of the `output` function allows attackers to inject arbitrary HTML (such as scripts) into the browser context the created PDF is opened in. The vulnerability can be exploited in the following scenario: the attacker provides values for the output options, for example via a web interface. These values are then passed unsanitized (automatically or semi-automatically) to the attack victim. The victim creates and opens a PDF with the attack vector using one of the vulnerable method overloads inside their browser. The attacker can thus inject scripts that run in the victims browser context and can extract or modify secrets from this context. The vulnerability has been fixed in jspdf@4.2.1. As a workaround, sanitize user input before passing it to the output method. |
2026-03-18 | |
| CVE-2026-31898 | 8.1 | HIGH | CWE-116 | 0.0% p10 | 5.67 | jsPDF is a library to generate PDFs in JavaScript. Prior to version 4.2.1, user ...jsPDF is a library to generate PDFs in JavaScript. Prior to version 4.2.1, user control of arguments of the `createAnnotation` method allows users to inject arbitrary PDF objects, such as JavaScript actions. If given the possibility to pass unsanitized input to the following method, a user can inject arbitrary PDF objects, such as JavaScript actions, which might trigger when the PDF is opened or interacted with the `createAnnotation`: `color` parameter. The vulnerability has been fixed in jsPDF@4.2.1. As a workaround, sanitize user input before passing it to the vulnerable API members. |
2026-03-18 | |
| CVE-2026-31891 | 7.7 | HIGH | CWE-89 | 0.0% p1 | 5.39 | Cockpit is a headless content management system. Any Cockpit CMS instance runnin...Cockpit is a headless content management system. Any Cockpit CMS instance running version 2.13.4 or earlier with API access enabled is potentially affected by a a SQL Injection vulnerability in the MongoLite Aggregation Optimizer. Any deployment where the `/api/content/aggregate/{model}` endpoint is publicly accessible or reachable by untrusted users may be vulnerable, and attackers in possession of a valid read-only API key (the lowest privilege level) can exploit this vulnerability — no admin access is required. An attacker can inject arbitrary SQL via unsanitized field names in aggregation queries, bypass the `_state=1` published-content filter to access unpublished or restricted content, and extract unauthorized data from the underlying SQLite content database. This vulnerability has been patched in version 2.13.5. The fix applies the same field-name sanitization introduced in v2.13.3 for `toJsonPath()` to the `toJsonExtractRaw()` method in `lib/MongoLite/Aggregation/Optimizer.php`, closing the injection vector in the Aggregation Optimizer. |
2026-03-18 | |
| CVE-2026-31865 | 6.5 | MEDIUM | CWE-1321 | 0.0% p4 | 4.55 | Elysia is a Typescript framework for request validation, type inference, OpenAPI...Elysia is a Typescript framework for request validation, type inference, OpenAPI documentation, and client-server communication. Prior to version 1.4.27, an Elysia cookie can be overridden by prototype pollution , eg. `__proto__`. This issue is patched in 1.4.27. As a workaround, use t.Cookie validation to enforce validation value and/or prevent iterable over cookie if possible. |
2026-03-18 | |
| CVE-2026-30922 | 7.5 | HIGH | CWE-674 | 0.0% p15 | 5.25 | pyasn1 is a generic ASN.1 library for Python. Prior to 0.6.3, the `pyasn1` libra...pyasn1 is a generic ASN.1 library for Python. Prior to 0.6.3, the `pyasn1` library is vulnerable to a Denial of Service (DoS) attack caused by uncontrolled recursion when decoding ASN.1 data with deeply nested structures. An attacker can supply a crafted payload containing thousands of nested `SEQUENCE` (`0x30`) or `SET` (`0x31`) tags with "Indefinite Length" (`0x80`) markers. This forces the decoder to recursively call itself until the Python interpreter crashes with a `RecursionError` or consumes all available memory (OOM), crashing the host application. This is a distinct vulnerability from CVE-2026-23490 (which addressed integer overflows in OID decoding). The fix for CVE-2026-23490 (`MAX_OID_ARC_CONTINUATION_OCTETS`) does not mitigate this recursion issue. Version 0.6.3 fixes this specific issue. |
2026-03-18 | |
| CVE-2026-30884 | 9.6 | CRITICAL | CWE-639 | 0.0% p4 | 6.72 | mdjnelson/moodle-mod_customcert is a Moodle plugin for creating dynamically gene...mdjnelson/moodle-mod_customcert is a Moodle plugin for creating dynamically generated certificates with complete customization via the web browser. Prior to versions 4.4.9 and 5.0.3, a teacher who holds `mod/customcert:manage` in any single course can read and silently overwrite certificate elements belonging to any other course in the Moodle installation. The `core_get_fragment` callback `editelement` and the `mod_customcert_save_element` web service both fail to verify that the supplied `elementid` belongs to the authorized context, enabling cross-course information disclosure and data tampering. Versions 4.4.9 and 5.0.3 fix the issue. |
2026-03-18 | |
| CVE-2026-2575 | 5.3 | MEDIUM | CWE-409 | 0.0% p8 | 3.71 | A flaw was found in Keycloak. An unauthenticated remote attacker can trigger an ...A flaw was found in Keycloak. An unauthenticated remote attacker can trigger an application level Denial of Service (DoS) by sending a highly compressed SAMLRequest through the SAML Redirect Binding. The server fails to enforce size limits during DEFLATE decompression, leading to an OutOfMemoryError (OOM) and subsequent process termination. This vulnerability allows an attacker to disrupt the availability of the service. |
2026-03-18 | |
| CVE-2026-29112 | 7.5 | HIGH | CWE-770 | 0.1% p17 | 5.25 | DiceBear is an avatar library for designers and developers. Prior to version 9.4...DiceBear is an avatar library for designers and developers. Prior to version 9.4.0, the `ensureSize()` function in `@dicebear/converter` read the `width` and `height` attributes from the input SVG to determine the output canvas size for rasterization (PNG, JPEG, WebP, AVIF). An attacker who can supply a crafted SVG with extremely large dimensions (e.g. `width="999999999"`) could force the server to allocate excessive memory, leading to denial of service. This primarily affects server-side applications that pass untrusted or user-supplied SVGs to the converter's `toPng()`, `toJpeg()`, `toWebp()`, or `toAvif()` functions. Applications that only convert self-generated DiceBear avatars are not practically exploitable, but are still recommended to upgrade. This is fixed in version 9.4.0. The `ensureSize()` function no longer reads SVG attributes to determine output size. Instead, a new `size` option (default: 512, max: 2048) controls the output dimensions. Invalid values (NaN, negative, zero, Infinity) fall back to the default. If upgrading is not immediately possible, validate and sanitize the `width` and `height` attributes of any untrusted SVG input before passing it to the converter. |
2026-03-18 | |
| CVE-2026-1926 | 5.3 | MEDIUM | CWE-862 | 0.2% p36 | 3.71 | The Subscriptions for WooCommerce plugin for WordPress is vulnerable to unauthor...The Subscriptions for WooCommerce plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the `wps_sfw_admin_cancel_susbcription()` function in all versions up to, and including, 1.9.2. This is due to the function being hooked to the `init` action without any authentication or authorization checks, and only performing a non-empty check on the nonce parameter without actually validating it via `wp_verify_nonce()`. This makes it possible for unauthenticated attackers to cancel any active WooCommerce subscription by sending a crafted GET request with an arbitrary nonce value via the `wps_subscription_id` parameter. |
2026-03-18 | |
| CVE-2026-1780 | 6.1 | MEDIUM | CWE-79 | 0.1% p18 | 4.27 | The [CR]Paid Link Manager plugin for WordPress is vulnerable to Reflected Cross-...The [CR]Paid Link Manager plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the URL path in all versions up to, and including, 0.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. |
2026-03-18 | |
| CVE-2026-4356 | 4.8 | MEDIUM | CWE-79 | 0.0% p9 | 3.36 | A flaw has been found in itsourcecode University Management System 1.0. Affected...A flaw has been found in itsourcecode University Management System 1.0. Affected is an unknown function of the file /add_result.php. Executing a manipulation of the argument vr can lead to cross site scripting. The attack may be launched remotely. The exploit has been published and may be used. |
2026-03-18 | |
| CVE-2026-4268 | 6.4 | MEDIUM | CWE-79 | 0.0% p9 | 4.48 | The WP Go Maps (formerly WP Google Maps) plugin for WordPress is vulnerable to S...The WP Go Maps (formerly WP Google Maps) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘wpgmza_custom_js’ parameter in all versions up to, and including, 10.0.05 due to insufficient input sanitization and output escaping and missing capability check in the 'admin_post_wpgmza_save_settings' hook anonymous function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-03-18 | |
| CVE-2026-2603 | 8.1 | HIGH | CWE-306 | 0.2% p45 | 5.68 | A flaw was found in Keycloak. A remote attacker could bypass security controls b...A flaw was found in Keycloak. A remote attacker could bypass security controls by sending a valid SAML response from an external Identity Provider (IdP) to the Keycloak SAML endpoint for IdP-initiated broker logins. This allows the attacker to complete broker logins even when the SAML Identity Provider is disabled, leading to unauthorized authentication. |
2026-03-18 | |
| CVE-2026-2092 | 7.7 | HIGH | CWE-1287 | 0.1% p23 | 5.39 | A flaw was found in Keycloak. Keycloak's Security Assertion Markup Language (SAM...A flaw was found in Keycloak. Keycloak's Security Assertion Markup Language (SAML) broker endpoint does not properly validate encrypted assertions when the overall SAML response is not signed. An attacker with a valid signed SAML assertion can exploit this by crafting a malicious SAML response. This allows the attacker to inject an encrypted assertion for an arbitrary principal, leading to unauthorized access and potential information disclosure. |
2026-03-18 | |
| CVE-2026-29056 | 7.0 | HIGH | CWE-915 | 0.2% p42 | 4.91 | Kanboard is project management software focused on Kanban methodology. Prior to ...Kanboard is project management software focused on Kanban methodology. Prior to 1.2.51, Kanboard's user invite registration endpoint (`UserInviteController::register()`) accepts all POST parameters and passes them to `UserModel::create()` without filtering out the `role` field. An attacker who receives an invite link can inject `role=app-admin` in the registration form to create an administrator account. Version 1.2.51 fixes the issue. |
2026-03-18 | |
| CVE-2026-28500 | 8.6 | HIGH | CWE-345 | 0.0% p1 | 6.02 | Open Neural Network Exchange (ONNX) is an open standard for machine learning int...Open Neural Network Exchange (ONNX) is an open standard for machine learning interoperability. In versions up to and including 1.20.1, a security control bypass exists in onnx.hub.load() due to improper logic in the repository trust verification mechanism. While the function is designed to warn users when loading models from non-official sources, the use of the silent=True parameter completely suppresses all security warnings and confirmation prompts. This vulnerability transforms a standard model-loading function into a vector for Zero-Interaction Supply-Chain Attacks. When chained with file-system vulnerabilities, an attacker can silently exfiltrate sensitive files (SSH keys, cloud credentials) from the victim's machine the moment the model is loaded. As of time of publication, no known patched versions are available. |
2026-03-18 | |
| CVE-2026-28499 | 6.9 | MEDIUM | CWE-79 | 0.0% p1 | 4.83 | LeafKit is a templating language with Swift-inspired syntax. Prior to version 1....LeafKit is a templating language with Swift-inspired syntax. Prior to version 1.14.2, HTML escaping doesn't work correctly when a template prints a collection (Array / Dictionary) via `#(value)`. This can result in XSS, allowing potentially untrusted input to be rendered unescaped. Version 1.14.2 fixes the issue. |
2026-03-18 | |
| CVE-2026-27545 | 6.9 | MEDIUM | CWE-367 | 0.0% p6 | 4.83 | OpenClaw versions prior to 2026.2.26 contain an approval bypass vulnerability in...OpenClaw versions prior to 2026.2.26 contain an approval bypass vulnerability in system.run execution that allows attackers to execute commands from unintended filesystem locations by rebinding writable parent symlinks in the current working directory after approval. An attacker can modify mutable parent symlink path components between approval and execution time to redirect command execution to a different location while preserving the visible working directory string. |
2026-03-18 | |
| CVE-2026-27524 | 2.3 | LOW | CWE-1321 | 0.0% p10 | 1.61 | OpenClaw versions prior to 2026.2.21 accept prototype-reserved keys in runtime /...OpenClaw versions prior to 2026.2.21 accept prototype-reserved keys in runtime /debug set override object values, allowing prototype pollution attacks. Authorized /debug set callers can inject __proto__, constructor, or prototype keys to manipulate object prototypes and bypass command gate restrictions. |
2026-03-18 | |
| CVE-2026-27523 | 6.9 | MEDIUM | CWE-22 | 0.1% p15 | 4.83 | OpenClaw versions prior to 2026.2.24 contain a sandbox bind validation vulnerabi...OpenClaw versions prior to 2026.2.24 contain a sandbox bind validation vulnerability allowing attackers to bypass allowed-root and blocked-path checks via symlinked parent directories with non-existent leaf paths. Attackers can craft bind source paths that appear within allowed roots but resolve outside sandbox boundaries once missing leaf components are created, weakening bind-source isolation enforcement. |
2026-03-18 | |
| CVE-2026-27522 | 7.1 | HIGH | CWE-22 | 0.0% p10 | 4.97 | OpenClaw versions prior to 2026.2.24 contain a local media root bypass vulnerabi...OpenClaw versions prior to 2026.2.24 contain a local media root bypass vulnerability in sendAttachment and setGroupIcon message actions when sandboxRoot is unset. Attackers can hydrate media from local absolute paths to read arbitrary host files accessible by the runtime user. |
2026-03-18 | |
| CVE-2026-22217 | 5.8 | MEDIUM | CWE-829 | 0.0% p2 | 4.06 | OpenClaw version 2026.2.22 prior to 2026.2.23 contain an arbitrary code executio...OpenClaw version 2026.2.22 prior to 2026.2.23 contain an arbitrary code execution vulnerability in shell-env that allows attackers to execute attacker-controlled binaries by exploiting trusted-prefix fallback logic for the $SHELL variable. An attacker can influence the $SHELL environment variable on systems with writable trusted-prefix directories such as /opt/homebrew/bin to execute arbitrary binaries in the OpenClaw process context. |
2026-03-18 | |
| CVE-2026-22181 | 6.1 | MEDIUM | CWE-918 | 0.0% p15 | 4.27 | OpenClaw versions prior to 2026.3.2 contain a DNS pinning bypass vulnerability i...OpenClaw versions prior to 2026.3.2 contain a DNS pinning bypass vulnerability in strict URL fetch paths that allows attackers to circumvent SSRF guards when environment proxy variables are configured. When HTTP_PROXY, HTTPS_PROXY, or ALL_PROXY environment variables are present, attacker-influenced URLs can be routed through proxy behavior instead of pinned-destination routing, enabling access to internal targets reachable from the proxy environment. |
2026-03-18 | |
| CVE-2026-22180 | 4.8 | MEDIUM | CWE-59 | 0.0% p1 | 3.36 | OpenClaw versions prior to 2026.3.2 contain a path-confinement bypass vulnerabil...OpenClaw versions prior to 2026.3.2 contain a path-confinement bypass vulnerability in browser output handling that allows writes outside intended root directories. Attackers can exploit insufficient canonical path-boundary validation in file write operations to escape root-bound restrictions and write files to arbitrary locations. |
2026-03-18 | |
| CVE-2026-22179 | 7.5 | HIGH | CWE-78 | 0.3% p54 | 5.26 | OpenClaw versions prior to 2026.2.22 in macOS node-host system.run contain an al...OpenClaw versions prior to 2026.2.22 in macOS node-host system.run contain an allowlist bypass vulnerability that allows remote attackers to execute non-allowlisted commands by exploiting improper parsing of command substitution tokens. Attackers can craft shell payloads with command substitution syntax within double-quoted text to bypass security restrictions and execute arbitrary commands on the system. |
2026-03-18 | |
| CVE-2026-22178 | 6.9 | MEDIUM | CWE-1333 | 0.1% p17 | 4.83 | OpenClaw versions prior to 2026.2.19 construct RegExp objects directly from unes...OpenClaw versions prior to 2026.2.19 construct RegExp objects directly from unescaped Feishu mention metadata in the stripBotMention function, allowing regex injection and denial of service. Attackers can craft nested-quantifier patterns or metacharacters in mention metadata to trigger catastrophic backtracking, block message processing, or remove unintended content before model processing. |
2026-03-18 | |
| CVE-2026-22177 | 6.9 | MEDIUM | CWE-15 | 0.1% p15 | 4.83 | OpenClaw versions prior to 2026.2.21 fail to filter dangerous process-control en...OpenClaw versions prior to 2026.2.21 fail to filter dangerous process-control environment variables from config env.vars, allowing startup-time code execution. Attackers can inject variables like NODE_OPTIONS or LD_* through configuration to execute arbitrary code in the OpenClaw gateway service runtime context. |
2026-03-18 | |
| CVE-2026-22175 | 7.1 | HIGH | CWE-184 | 0.1% p18 | 4.97 | OpenClaw versions prior to 2026.2.23 contain an exec approval bypass vulnerabili...OpenClaw versions prior to 2026.2.23 contain an exec approval bypass vulnerability in allowlist mode where allow-always grants could be circumvented through unrecognized multiplexer shell wrappers like busybox and toybox sh -c commands. Attackers can exploit this by invoking arbitrary payloads under the same multiplexer wrapper to satisfy stored allowlist rules, bypassing intended execution restrictions. |
2026-03-18 | |
| CVE-2026-22174 | 5.9 | MEDIUM | CWE-306 | 0.0% p5 | 4.13 | OpenClaw versions prior to 2026.2.22 inject the x-OpenClaw-relay-token header in...OpenClaw versions prior to 2026.2.22 inject the x-OpenClaw-relay-token header into Chrome CDP probe traffic on loopback interfaces, allowing local processes to capture the Gateway authentication token. An attacker controlling a loopback port can intercept CDP reachability probes to the /json/version endpoint and reuse the leaked token as Gateway bearer authentication. |
2026-03-18 | |
| CVE-2026-22171 | 8.8 | HIGH | CWE-22 | 0.1% p16 | 6.16 | OpenClaw versions prior to 2026.2.19 contain a path traversal vulnerability in t...OpenClaw versions prior to 2026.2.19 contain a path traversal vulnerability in the Feishu media download flow where untrusted media keys are interpolated directly into temporary file paths in extensions/feishu/src/media.ts. An attacker who can control Feishu media key values returned to the client can use traversal segments to escape os.tmpdir() and write arbitrary files within the OpenClaw process permissions. |
2026-03-18 | |
| CVE-2026-22170 | 6.3 | MEDIUM | CWE-863 | 0.1% p20 | 4.41 | OpenClaw versions prior to 2026.2.22 with the optional BlueBubbles plugin contai...OpenClaw versions prior to 2026.2.22 with the optional BlueBubbles plugin contain an access control bypass vulnerability where empty allowFrom configuration causes dmPolicy pairing and allowlist restrictions to be ineffective. Remote attackers can send direct messages to BlueBubbles accounts by exploiting the misconfigured allowlist validation logic to bypass intended sender authorization checks. |
2026-03-18 | |
| CVE-2026-22169 | 7.1 | HIGH | CWE-78 | 0.0% p9 | 4.97 | OpenClaw versions prior to 2026.2.22 contain an allowlist bypass vulnerability i...OpenClaw versions prior to 2026.2.22 contain an allowlist bypass vulnerability in the safeBins configuration that allows attackers to invoke external helpers through the compress-program option. When sort is explicitly added to tools.exec.safeBins, remote attackers can bypass intended safe-bin approval constraints by leveraging the compress-program parameter to execute unauthorized external programs. |
2026-03-18 | |
| CVE-2026-22168 | 7.1 | HIGH | CWE-88 | 0.1% p18 | 4.97 | OpenClaw versions prior to 2026.2.21 contain an approval-integrity mismatch vuln...OpenClaw versions prior to 2026.2.21 contain an approval-integrity mismatch vulnerability in system.run that allows authenticated operators to execute arbitrary trailing arguments after cmd.exe /c while approval text reflects only a benign command. Attackers can smuggle malicious arguments through cmd.exe /c to achieve local command execution on trusted Windows nodes with mismatched audit logs. |
2026-03-18 | |
| CVE-2026-29057 | 6.3 | MEDIUM | CWE-444 | 0.1% p24 | 4.41 | Next.js is a React framework for building full-stack web applications. Starting ...Next.js is a React framework for building full-stack web applications. Starting in version 9.5.0 and prior to versions 15.5.13 and 16.1.7, when Next.js rewrites proxy traffic to an external backend, a crafted `DELETE`/`OPTIONS` request using `Transfer-Encoding: chunked` could trigger request boundary disagreement between the proxy and backend. This could allow request smuggling through rewritten routes. An attacker could smuggle a second request to unintended backend routes (for example, internal/admin endpoints), bypassing assumptions that only the configured rewrite destination/path is reachable. This does not impact applications hosted on providers that handle rewrites at the CDN level, such as Vercel. The vulnerability originated in an upstream library vendored by Next.js. It is fixed in Next.js 15.5.13 and 16.1.7 by updating that dependency’s behavior so `content-length: 0` is added only when both `content-length` and `transfer-encoding` are absent, and `transfer-encoding` is no longer removed in that code path. If upgrading is not immediately possible, block chunked `DELETE`/`OPTIONS` requests on rewritten routes at the edge/proxy, and/or enforce authentication/authorization on backend routes. |
2026-03-18 | |
| CVE-2026-28674 | 7.2 | HIGH | CWE-434 | 0.0% p14 | 5.04 | xiaoheiFS is a self-hosted financial and operational system for cloud service bu...xiaoheiFS is a self-hosted financial and operational system for cloud service businesses. In versions up to and including 0.3.15, the `AdminPaymentPluginUpload` endpoint lets admins upload any file to `plugins/payment/`. It only checks a hardcoded password (`qweasd123456`) and ignores file content. A background watcher (`StartWatcher`) then scans this folder every 5 seconds. If it finds a new executable, it runs it immediately, resulting in RCE. Version 4.0.0 fixes the issue. |
2026-03-18 | |
| CVE-2026-28673 | 7.2 | HIGH | CWE-78 | 0.3% p56 | 5.05 | xiaoheiFS is a self-hosted financial and operational system for cloud service bu...xiaoheiFS is a self-hosted financial and operational system for cloud service businesses. In versions up to and including 0.3.15, the standard plugin system allows admins to upload a ZIP file containing a binary and a `manifest.json`. The server trusts the `binaries` field in the manifest and executes the specified file without any validation of its contents or behavior, leading to Remote Code Execution (RCE). Version 0.4.0 fixes the issue. |
2026-03-18 | |
| CVE-2026-27980 | 6.9 | MEDIUM | CWE-400 | 0.0% p5 | 4.83 | Next.js is a React framework for building full-stack web applications. Starting ...Next.js is a React framework for building full-stack web applications. Starting in version 10.0.0 and prior to version 16.1.7, the default Next.js image optimization disk cache (`/_next/image`) did not have a configurable upper bound, allowing unbounded cache growth. An attacker could generate many unique image-optimization variants and exhaust disk space, causing denial of service. This is fixed in version 16.1.7 by adding an LRU-backed disk cache with `images.maximumDiskCacheSize`, including eviction of least-recently-used entries when the limit is exceeded. Setting `maximumDiskCacheSize: 0` disables disk caching. If upgrading is not immediately possible, periodically clean `.next/cache/images` and/or reduce variant cardinality (e.g., tighten values for `images.localPatterns`, `images.remotePatterns`, and `images.qualities`). |
2026-03-18 | |
| CVE-2026-27979 | 6.9 | MEDIUM | CWE-770 | 0.0% p4 | 4.83 | Next.js is a React framework for building full-stack web applications. Starting ...Next.js is a React framework for building full-stack web applications. Starting in version 16.0.1 and prior to version 16.1.7, a request containing the `next-resume: 1` header (corresponding with a PPR resume request) would buffer request bodies without consistently enforcing `maxPostponedStateSize` in certain setups. The previous mitigation protected minimal-mode deployments, but equivalent non-minimal deployments remained vulnerable to the same unbounded postponed resume-body buffering behavior. In applications using the App Router with Partial Prerendering capability enabled (via `experimental.ppr` or `cacheComponents`), an attacker could send oversized `next-resume` POST payloads that were buffered without consistent size enforcement in non-minimal deployments, causing excessive memory usage and potential denial of service. This is fixed in version 16.1.7 by enforcing size limits across all postponed-body buffering paths and erroring when limits are exceeded. If upgrading is not immediately possible, block requests containing the `next-resume` header, as this is never valid to be sent from an untrusted client. |
2026-03-18 | |
| CVE-2026-4355 | 5.1 | MEDIUM | CWE-79 | 0.0% p8 | 3.57 | A vulnerability was detected in Portabilis i-Educar 2.11. This impacts an unknow...A vulnerability was detected in Portabilis i-Educar 2.11. This impacts an unknown function of the file /intranet/educar_servidor_curso_lst.php of the component Endpoint. Performing a manipulation of the argument Name results in cross site scripting. The attack may be initiated remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-18 | |
| CVE-2026-4354 | 5.1 | MEDIUM | CWE-79 | 0.0% p8 | 3.57 | A vulnerability was identified in TRENDnet TEW-824DRU 1.010B01/1.04B01. The impa...A vulnerability was identified in TRENDnet TEW-824DRU 1.010B01/1.04B01. The impacted element is the function sub_420A78 of the file apply_sec.cgi of the component Web Interface. Such manipulation of the argument Language leads to cross site scripting. It is possible to launch the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-18 | |
| CVE-2026-27978 | 5.3 | MEDIUM | CWE-352 | 0.0% p0 | 3.71 | Next.js is a React framework for building full-stack web applications. Starting ...Next.js is a React framework for building full-stack web applications. Starting in version 16.0.1 and prior to version 16.1.7, `origin: null` was treated as a "missing" origin during Server Action CSRF validation. As a result, requests from opaque contexts (such as sandboxed iframes) could bypass origin verification instead of being validated as cross-origin requests. An attacker could induce a victim browser to submit Server Actions from a sandboxed context, potentially executing state-changing actions with victim credentials (CSRF). This is fixed in version 16.1.7 by treating `'null'` as an explicit origin value and enforcing host/origin checks unless `'null'` is explicitly allowlisted in `experimental.serverActions.allowedOrigins`. If upgrading is not immediately possible, add CSRF tokens for sensitive Server Actions, prefer `SameSite=Strict` on sensitive auth cookies, and/or do not allow `'null'` in `serverActions.allowedOrigins` unless intentionally required and additionally protected. |
2026-03-18 | |
| CVE-2026-27977 | 2.3 | LOW | CWE-1385 | 0.0% p0 | 1.61 | Next.js is a React framework for building full-stack web applications. Starting ...Next.js is a React framework for building full-stack web applications. Starting in version 16.0.1 and prior to version 16.1.7, in `next dev`, cross-site protection for internal websocket endpoints could treat `Origin: null` as a bypass case even if `allowedDevOrigins` is configured, allowing privacy-sensitive/opaque contexts (for example sandboxed documents) to connect unexpectedly. If a dev server is reachable from attacker-controlled content, an attacker may be able to connect to the HMR websocket channel and interact with dev websocket traffic. This affects development mode only. Apps without a configured `allowedDevOrigins` still allow connections from any origin. The issue is fixed in version 16.1.7 by validating `Origin: null` through the same cross-site origin-allowance checks used for other origins. If upgrading is not immediately possible, do not expose `next dev` to untrusted networks and/or block websocket upgrades to `/_next/webpack-hmr` when `Origin` is `null` at the proxy. |
2026-03-18 | |
| CVE-2026-27895 | 4.3 | MEDIUM | CWE-185 | 0.1% p22 | 3.01 | LDAP Account Manager (LAM) is a webfrontend for managing entries (e.g. users, gr...LDAP Account Manager (LAM) is a webfrontend for managing entries (e.g. users, groups, DHCP settings) stored in an LDAP directory. Prior to version 9.5, the PDF export component does not correctly validate uploaded file extensions. This way any file type (including .php files) can be uploaded. With GHSA-w7xq-vjr3-p9cf, an attacker can achieve remote code execution as the web server user. Version 9.5 fixes the issue. Although upgrading is recommended, a workaround would be to make /var/lib/ldap-account-manager/config read-only for the web-server user. |
2026-03-18 | |
| CVE-2026-27894 | 8.8 | HIGH | CWE-98 | 0.1% p20 | 6.16 | LDAP Account Manager (LAM) is a webfrontend for managing entries (e.g. users, gr...LDAP Account Manager (LAM) is a webfrontend for managing entries (e.g. users, groups, DHCP settings) stored in an LDAP directory. Prior to version 9.5, a local file inclusion was detected in the PDF export that allows users to include local PHP files and this way execute code. In combination with GHSA-88hf-2cjm-m9g8 this allows to execute arbitrary code. Users need to login to LAM to exploit this vulnerability. Version 9.5 fixes the issue. Although upgrading is recommended, a workaround would be to make /var/lib/ldap-account-manager/config read-only for the web-server user and delete the PDF profile files (making PDF exports impossible). |
2026-03-18 | |
| CVE-2026-27811 | 8.8 | HIGH | CWE-77 | 1.0% p77 | 6.19 | Roxy-WI is a web interface for managing Haproxy, Nginx, Apache and Keepalived se...Roxy-WI is a web interface for managing Haproxy, Nginx, Apache and Keepalived servers. Prior to version 8.2.6.3, a command injection vulnerability exists in the `/config/compare/<service>/<server_ip>/show` endpoint, allowed authenticated users to execute arbitrary system commands on the app host. The vulnerability exists in `app/modules/config/config.py` on line 362, where user input is directly formatted in the template string that is eventually executed. Version 8.2.6.3 fixes the issue. |
2026-03-18 | |
| CVE-2026-27459 | 7.2 | HIGH | CWE-120 | 0.0% p5 | 5.04 | pyOpenSSL is a Python wrapper around the OpenSSL library. Starting in version 22...pyOpenSSL is a Python wrapper around the OpenSSL library. Starting in version 22.0.0 and prior to version 26.0.0, if a user provided callback to `set_cookie_generate_callback` returned a cookie value greater than 256 bytes, pyOpenSSL would overflow an OpenSSL provided buffer. Starting in version 26.0.0, cookie values that are too long are now rejected. |
2026-03-18 | |
| CVE-2026-27448 | 1.7 | LOW | CWE-636 | 0.0% p11 | 1.19 | pyOpenSSL is a Python wrapper around the OpenSSL library. Starting in version 0....pyOpenSSL is a Python wrapper around the OpenSSL library. Starting in version 0.14.0 and prior to version 26.0.0, if a user provided callback to `set_tlsext_servername_callback` raised an unhandled exception, this would result in a connection being accepted. If a user was relying on this callback for any security-sensitive behavior, this could allow bypassing it. Starting in version 26.0.0, unhandled exceptions now result in rejecting the connection. |
2026-03-18 | |
| CVE-2026-26004 | 5.7 | MEDIUM | CWE-639 | 0.0% p7 | 3.99 | Sentry is a developer-first error tracking and performance monitoring tool. Vers...Sentry is a developer-first error tracking and performance monitoring tool. Versions prior to 26.1.0 have a cross-organization Insecure Direct Object Reference (IDOR) vulnerability in Sentry's GroupEventJsonView endpoint. Version 26.1.0 patches the issue. |
2026-03-18 | |
| CVE-2026-26001 | 7.1 | HIGH | CWE-89 | 0.0% p11 | 4.97 | The GLPI Inventory Plugin handles network discovery, inventory, software deploym...The GLPI Inventory Plugin handles network discovery, inventory, software deployment, and data collection for GLPI agents. Prior to 1.6.6, non sanitized user input can lend to an SQL injection from reports, with adequate rights. This vulnerability is fixed in 1.6.6. |
2026-03-18 | |
| CVE-2026-25937 | 6.5 | MEDIUM | CWE-287 | 0.0% p2 | 4.55 | GLPI is a free Asset and IT management software package. Starting in version 11....GLPI is a free Asset and IT management software package. Starting in version 11.0.0 and prior to version 11.0.6, a malicious actor with knowledge of a user's credentials can bypass MFA and steal their account. Version 11.0.6 fixes the issue. |
2026-03-18 | |
| CVE-2026-3856 | 5.3 | MEDIUM | CWE-353 | 0.0% p0 | 3.71 | IBM Db2 Recovery Expert for Linux, UNIX and Windows 5.5 IF 2 could allow an atta...IBM Db2 Recovery Expert for Linux, UNIX and Windows 5.5 IF 2 could allow an attacker to modify or corrupt data due to an insecure mechanism used for verifying the integrity of the data during transmission. |
2026-03-17 | |
| CVE-2026-22727 | 7.5 | HIGH | CWE-306 | 0.0% p0 | 5.25 | Unprotected internal endpoints in Cloud Foundry Capi Release 1.226.0 and below, ...Unprotected internal endpoints in Cloud Foundry Capi Release 1.226.0 and below, and CF Deployment v54.9.0 and below on all platforms allows any user who has bypassed the firewall to potentially replace droplets and therefore applications allowing them to access secure application information. |
2026-03-17 | |
| CVE-2026-21994 | 9.8 | CRITICAL | CWE-284 | 0.1% p30 | 6.86 | Vulnerability in the Oracle Edge Cloud Infrastructure Designer and Visualisation...Vulnerability in the Oracle Edge Cloud Infrastructure Designer and Visualisation Toolkit product of Oracle Open Source Projects (component: Desktop). The supported version that is affected is 0.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Edge Cloud Infrastructure Designer and Visualisation Toolkit. Successful attacks of this vulnerability can result in takeover of Oracle Edge Cloud Infrastructure Designer and Visualisation Toolkit. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). |
2026-03-17 | |
| CVE-2026-20643 | 5.4 | MEDIUM | CWE-20 | 0.0% p9 | 3.78 | A cross-origin issue in the Navigation API was addressed with improved input val...A cross-origin issue in the Navigation API was addressed with improved input validation. This issue is fixed in Background Security Improvements for iOS, iPadOS, and macOS, Safari 26.4, iOS 18.7.7 and iPadOS 18.7.7, iOS 26.4 and iPadOS 26.4, macOS Tahoe 26.4, visionOS 26.4. Processing maliciously crafted web content may bypass Same Origin Policy. |
2026-03-17 | |
| CVE-2026-1264 | 7.1 | HIGH | CWE-306 | 0.0% p9 | 4.97 | IBM Sterling B2B Integrator and IBM Sterling File Gateway 6.1.0.0 through 6.1.2....IBM Sterling B2B Integrator and IBM Sterling File Gateway 6.1.0.0 through 6.1.2.7_2, 6.2.0.0 through 6.2.0.5_1, 6.2.1.0 through 6.2.1.1_1, and 6.2.2.0 allows a remote unauthenticated attacker to view and delete the partners of a community and to delete the communities. |
2026-03-17 | |
| CVE-2025-14031 | 7.5 | HIGH | CWE-77 | 0.1% p26 | 5.25 | IBM Sterling B2B Integrator and and IBM Sterling File Gateway 6.1.0.0 through 6....IBM Sterling B2B Integrator and and IBM Sterling File Gateway 6.1.0.0 through 6.1.2.7_2, 6.2.0.0 through 6.2.0.5_1, 6.2.1.0 through 6.2.1.1_1, and 6.2.2.0 could allow an unauthenticated attacker to send a specially crafted request that causes the application to crash. |
2026-03-17 | |
| CVE-2026-4349 | 6.3 | MEDIUM | CWE-287 | 0.1% p25 | 4.41 | A vulnerability was determined in Duende IdentityServer4 up to 4.1.2. The affect...A vulnerability was determined in Duende IdentityServer4 up to 4.1.2. The affected element is an unknown function of the file /connect/authorize of the component Token Renewal Endpoint. This manipulation of the argument id_token_hint causes improper authentication. It is possible to initiate the attack remotely. The attack is considered to have high complexity. The exploitability is described as difficult. This vulnerability only affects products that are no longer supported by the maintainer. |
2026-03-17 | |
| CVE-2026-32842 | 7.1 | HIGH | CWE-312 | 0.0% p2 | 4.97 | Edimax GS-5008PL firmware version 1.00.54 and prior contain an insecure credenti...Edimax GS-5008PL firmware version 1.00.54 and prior contain an insecure credential storage vulnerability that allows attackers to obtain administrator credentials by accessing configuration backup files. Attackers can download the config.bin file through fupload.cgi to extract plaintext username and password fields for unauthorized administrative access. |
2026-03-17 | |
| CVE-2026-32841 | 9.2 | CRITICAL | CWE-1108 | 0.0% p13 | 6.44 | Edimax GS-5008PL firmware version 1.00.54 and prior contain an authentication by...Edimax GS-5008PL firmware version 1.00.54 and prior contain an authentication bypass vulnerability that allows unauthenticated attackers to access the management interface. Attackers can exploit the global authentication flag mechanism to gain administrative access without credentials after any user authenticates, enabling unauthorized password changes, firmware uploads, and configuration modifications. |
2026-03-17 | |
| CVE-2026-32840 | 5.1 | MEDIUM | CWE-79 | 0.0% p11 | 3.57 | Edimax GS-5008PL firmware version 1.00.54 and prior contain a stored cross-site ...Edimax GS-5008PL firmware version 1.00.54 and prior contain a stored cross-site scripting vulnerability in the system_name_set.cgi script that allows attackers to inject arbitrary script code by manipulating the sysName parameter. Attackers can send a crafted POST request with malicious script payload that executes when management pages including system_data.js are viewed by administrators. |
2026-03-17 | |
| CVE-2026-32839 | 5.1 | MEDIUM | CWE-352 | 0.0% p7 | 3.57 | Edimax GS-5008PL firmware version 1.00.54 and prior contain a cross-site request...Edimax GS-5008PL firmware version 1.00.54 and prior contain a cross-site request forgery vulnerability that allows remote attackers to perform unauthorized administrative actions by inducing logged-in administrators to visit malicious pages. Attackers can exploit the lack of anti-CSRF tokens and request validation to change passwords, upload firmware, reboot the device, perform factory resets, or modify network configurations. |
2026-03-17 | |
| CVE-2026-32838 | 8.7 | HIGH | CWE-319 | 0.0% p0 | 6.09 | Edimax GS-5008PL firmware version 1.00.54 and prior use cleartext HTTP for the w...Edimax GS-5008PL firmware version 1.00.54 and prior use cleartext HTTP for the web management interface without implementing TLS or SSL encryption. Attackers on the same network can intercept management traffic to capture administrator credentials and sensitive configuration data. |
2026-03-17 | |
| CVE-2026-1376 | 7.5 | HIGH | CWE-770 | 0.1% p20 | 5.25 | IBM i 7.6 could allow a remote attacker to cause a denial of service using faile...IBM i 7.6 could allow a remote attacker to cause a denial of service using failed authentication connections due to improper allocation of resources. |
2026-03-17 | |
| CVE-2026-1267 | 6.5 | MEDIUM | CWE-200 | 0.0% p11 | 4.55 | IBM Planning Analytics Local 2.1.0 through 2.1.17 could allow an unauthorized ac...IBM Planning Analytics Local 2.1.0 through 2.1.17 could allow an unauthorized access to sensitive application data and administrative functionalities due to lack of proper access controls. |
2026-03-17 | |
| CVE-2025-14806 | 5.7 | MEDIUM | CWE-524 | 0.0% p8 | 3.99 | IBM Planning Analytics Local 2.1.0 through 2.1.17 could allow an attacker to tri...IBM Planning Analytics Local 2.1.0 through 2.1.17 could allow an attacker to trick the caching mechanism into storing and serving sensitive, user-specific responses as publicly cacheable resources. |
2026-03-17 | |
| CVE-2026-2809 | 6.7 | MEDIUM | CWE-190 | 0.0% p4 | 4.69 | Netskope was notified about a potential gap in its Endpoint DLP Module for Netsk...Netskope was notified about a potential gap in its Endpoint DLP Module for Netskope Client on Windows systems. The successful exploitation of the gap can potentially allow a privileged user to trigger an integer overflow within the DLL Injector, leading to a Blue-Screen-of-Death (BSOD). Successful exploitation would require the Endpoint DLP module to be enabled in the client configuration. A successful exploit can potentially result in a denial-of-service for the local machine. |
2026-03-17 | |
| CVE-2026-4359 | 2.0 | LOW | CWE-158 | 0.0% p10 | 1.40 | A compromised third party cloud server or man-in-the-middle attacker could send ...A compromised third party cloud server or man-in-the-middle attacker could send a malformed HTTP response and cause a crash in applications using the MongoDB C driver. |
2026-03-17 | |
| CVE-2026-4358 | 6.1 | MEDIUM | CWE-415 | 0.1% p23 | 4.27 | A specially crafted aggregation query with $lookup by an authenticated user with...A specially crafted aggregation query with $lookup by an authenticated user with write privileges can cause a double-free or use-after-free memory issue in the slot-based execution (SBE) engine when an in-memory hash table is spilled to disk. |
2026-03-17 | |
| CVE-2026-4064 | 8.3 | HIGH | CWE-862 | 0.0% p13 | 5.81 | Missing authorization checks on multiple gRPC service endpoints in PowerShell Un...Missing authorization checks on multiple gRPC service endpoints in PowerShell Universal before 2026.1.4 allows an authenticated user with any valid token to bypass role-based access controls and perform privileged operations — including reading sensitive data, creating or deleting resources, and disrupting service operations — via crafted gRPC requests. |
2026-03-17 | |
| CVE-2026-3563 | 5.5 | MEDIUM | CWE-1289 | 0.1% p17 | 3.85 | Improper input validation in the apps and endpoints configuration in PowerShell ...Improper input validation in the apps and endpoints configuration in PowerShell Universal before 2026.1.4 allows an authenticated user with permissions to create or modify Apps or Endpoints to override existing application or system routes, resulting in unintended request routing and denial of service via a conflicting URL path. |
2026-03-17 | |
| CVE-2026-32981 | 8.7 | HIGH | CWE-22 | 0.1% p23 | 6.09 | A path traversal vulnerability was identified in Ray Dashboard (default port 826...A path traversal vulnerability was identified in Ray Dashboard (default port 8265) in Ray versions prior to 2.8.1. Due to improper validation and sanitization of user-supplied paths in the static file handling mechanism, an attacker can use traversal sequences (e.g., ../) to access files outside the intended static directory, resulting in local file disclosure. |
2026-03-17 | |
| CVE-2026-32837 | 5.1 | MEDIUM | CWE-170 | 0.0% p2 | 3.57 | miniaudio version 0.11.25 and earlier contain a heap out-of-bounds read vulnerab...miniaudio version 0.11.25 and earlier contain a heap out-of-bounds read vulnerability in the WAV BEXT metadata parser that allows attackers to trigger memory access violations by processing crafted WAV files. Attackers can exploit improper null-termination handling in the coding history field to cause out-of-bounds reads past the allocated metadata pool, resulting in application crashes or denial of service. |
2026-03-17 | |
| CVE-2026-32836 | 6.9 | MEDIUM | CWE-789 | 0.0% p2 | 4.83 | dr_libs dr_flac.h version 0.13.3 and earlier contain an uncontrolled memory allo...dr_libs dr_flac.h version 0.13.3 and earlier contain an uncontrolled memory allocation vulnerability in drflac__read_and_decode_metadata() that allows attackers to trigger excessive memory allocation by supplying crafted PICTURE metadata blocks. Attackers can exploit attacker-controlled mimeLength and descriptionLength fields to cause denial of service through memory exhaustion when processing FLAC streams with metadata callbacks. |
2026-03-17 | |
| CVE-2026-30707 | 8.1 | HIGH | CWE-284 | 0.0% p8 | 5.67 | An issue was discovered in SpeedExam Online Examination System (SaaS) after v.FE...An issue was discovered in SpeedExam Online Examination System (SaaS) after v.FEV2026. It allows Broken Access Control via the ReviewAnswerDetails ASP.NET PageMethod. Authenticated attackers can bypass client-side restrictions and invoke this method directly to retrieve the full answer key. The provider states that this issue is "Fixed in [02/2026] backend service update." |
2026-03-17 | |
| CVE-2026-25936 | 6.5 | MEDIUM | CWE-89 | 0.0% p11 | 4.55 | GLPI is a free Asset and IT management software package. Starting in version 11....GLPI is a free Asset and IT management software package. Starting in version 11.0.0 and prior to version 11.0.6, an authenticated user can perfom a SQL injection. Version 11.0.6 fixes the issue. |
2026-03-17 | |
| CVE-2025-15584 | 6.8 | MEDIUM | CWE-190 | 0.0% p3 | 4.76 | Netskope was notified about a potential gap in its Endpoint DLP Module for Netsk...Netskope was notified about a potential gap in its Endpoint DLP Module for Netskope Client on Windows systems. The successful exploitation of the gap can potentially allow an unprivileged user to trigger an integer overflow within the filter communication port, leading to a Blue-Screen-of-Death (BSOD). Successful exploitation would require the Endpoint DLP module to be enabled in the client configuration. A successful exploit can potentially result in a denial-of-service for the local machine. |
2026-03-17 | |
| CVE-2026-3207 | 8.7 | HIGH | CWE-306 | 0.1% p16 | 6.09 | Configuration issue in Java Management Extensions (JMX) in TIBCO BPM Enterprise ...Configuration issue in Java Management Extensions (JMX) in TIBCO BPM Enterprise version 4.x allows unauthorised access. |
2026-03-17 | |
| CVE-2026-25790 | 4.9 | MEDIUM | CWE-121 | 0.1% p30 | 3.43 | Wazuh is a free and open source platform used for threat prevention, detection, ...Wazuh is a free and open source platform used for threat prevention, detection, and response. Starting in version 3.9.0 and prior to version 4.14.3, multiple stack-based buffer overflows exist in the Security Configuration Assessment (SCA) decoder (`wazuh-analysisd`). The use of `sprintf` with a floating-point (`%lf`) format specifier on a fixed-size 128-byte buffer allows a remote attacker to overflow the stack. A specially crafted JSON event can trigger this overflow, leading to a denial of service (crash) or potential RCE on the Wazuh manager. The vulnerability is located in `/src/analysisd/decoders/security_configuration_assessment.c`, within the `FillScanInfo` and `FillCheckEventInfo` functions. In multiple locations, a 128-byte buffer (`char value[OS_SIZE_128];`) is allocated on the stack to hold the string representation of a number from a JSON event. The code checks if the number is an integer or a double. If it's a double, it uses `sprintf(value, "%lf", ...)` to perform the conversion. This `sprintf` call is unbounded. If a floating-point number with a large exponent (e.g., `1.0e150`) is provided, `sprintf` will attempt to write its full string representation (a "1" followed by 150 zeros), which is larger than the 128-byte buffer, corrupting the stack. Version 4.14.3 patches the issue. |
2026-03-17 | |
| CVE-2026-25772 | 4.9 | MEDIUM | CWE-121 | 0.1% p16 | 3.43 | Wazuh is a free and open source platform used for threat prevention, detection, ...Wazuh is a free and open source platform used for threat prevention, detection, and response. Starting in version 4.4.0 and prior to version 4.14.3, a stack-based buffer overflow vulnerability exists in the Wazuh Database synchronization module (`wdb_delta_event.c`). The SQL query construction logic allows for an integer underflow when calculating the remaining buffer size. This occurs because the code incorrectly aggregates the return value of `snprintf`. If a specific database synchronization payload exceeds the size of the query buffer (2048 bytes), the size calculation wraps around to a massive integer, effectively removing bounds checking for subsequent writes. This allows an attacker to corrupt the stack, leading to a Denial of Service (DoS) or potentially RCE. Version 4.14.3 fixes the issue. |
2026-03-17 | |
| CVE-2026-25771 | 5.3 | MEDIUM | CWE-400 | 0.2% p48 | 3.72 | Wazuh is a free and open source platform used for threat prevention, detection, ...Wazuh is a free and open source platform used for threat prevention, detection, and response. Starting in version 4.3.0 and prior to version 4.14.3, a Denial of Service (DoS) vulnerability exists in the Wazuh API authentication middleware (`middlewares.py`). The application uses an asynchronous event loop (Starlette/Asyncio) to call a synchronous function (`generate_keypair`) that performs blocking disk I/O on every request containing a Bearer token. An unauthenticated remote attacker can exploit this by flooding the API with requests containing invalid Bearer tokens. This forces the single-threaded event loop to pause for file read operations repeatedly, starving the application of CPU resources and potentially preventing it from accepting or processing legitimate connections. Version 4.14.3 fixes the issue. |
2026-03-17 | |
| CVE-2026-22882 | 6.1 | MEDIUM | CWE-125 | 0.0% p4 | 4.27 | An out-of-bounds read vulnerability exists in the EMF functionality of Canva Aff...An out-of-bounds read vulnerability exists in the EMF functionality of Canva Affinity. By using a specially crafted EMF file, an attacker could exploit this vulnerability to perform an out-of-bounds read, potentially leading to the disclosure of sensitive information. |
2026-03-17 | |
| CVE-2026-20726 | 6.1 | MEDIUM | CWE-125 | 0.0% p4 | 4.27 | An out-of-bounds read vulnerability exists in the EMF functionality of Canva Aff...An out-of-bounds read vulnerability exists in the EMF functionality of Canva Affinity. By using a specially crafted EMF file, an attacker could exploit this vulnerability to perform an out-of-bounds read, potentially leading to the disclosure of sensitive information. |
2026-03-17 | |
| CVE-2025-66633 | 6.1 | MEDIUM | CWE-125 | 0.0% p4 | 4.27 | An out-of-bounds read vulnerability exists in the EMF functionality of Canva Aff...An out-of-bounds read vulnerability exists in the EMF functionality of Canva Affinity. By using a specially crafted EMF file, an attacker could exploit this vulnerability to perform an out-of-bounds read, potentially leading to the disclosure of sensitive information. |
2026-03-17 | |
| CVE-2025-66617 | 6.1 | MEDIUM | CWE-125 | 0.0% p4 | 4.27 | An out-of-bounds read vulnerability exists in the EMF functionality of Canva Aff...An out-of-bounds read vulnerability exists in the EMF functionality of Canva Affinity. By using a specially crafted EMF file, an attacker could exploit this vulnerability to perform an out-of-bounds read, potentially leading to the disclosure of sensitive information. |
2026-03-17 | |
| CVE-2025-66503 | 6.1 | MEDIUM | CWE-125 | 0.0% p4 | 4.27 | An out-of-bounds read vulnerability exists in the EMF functionality of Canva Aff...An out-of-bounds read vulnerability exists in the EMF functionality of Canva Affinity. By using a specially crafted EMF file, an attacker could exploit this vulnerability to perform an out-of-bounds read, potentially leading to the disclosure of sensitive information. |
2026-03-17 | |
| CVE-2025-66342 | 7.8 | HIGH | CWE-843 | 0.0% p4 | 5.46 | A type confusion vulnerability exists in the EMF functionality of Canva Affinity...A type confusion vulnerability exists in the EMF functionality of Canva Affinity. A specially crafted EMF file can trigger this vulnerability, which can lead to memory corruption and result in arbitrary code execution. |
2026-03-17 | |
| CVE-2025-66042 | 6.1 | MEDIUM | CWE-125 | 0.0% p4 | 4.27 | An out-of-bounds read vulnerability exists in the EMF functionality of Canva Aff...An out-of-bounds read vulnerability exists in the EMF functionality of Canva Affinity. By using a specially crafted EMF file, an attacker could exploit this vulnerability to perform an out-of-bounds read, potentially leading to the disclosure of sensitive information. |
2026-03-17 | |
| CVE-2025-66000 | 6.1 | MEDIUM | CWE-125 | 0.0% p4 | 4.27 | An out-of-bounds read vulnerability exists in the EMF functionality of Canva Aff...An out-of-bounds read vulnerability exists in the EMF functionality of Canva Affinity. By using a specially crafted EMF file, an attacker could exploit this vulnerability to perform an out-of-bounds read, potentially leading to the disclosure of sensitive information. |
2026-03-17 | |
| CVE-2025-65119 | 6.1 | MEDIUM | CWE-125 | 0.0% p4 | 4.27 | An out-of-bounds read vulnerability exists in the EMF functionality of Canva Aff...An out-of-bounds read vulnerability exists in the EMF functionality of Canva Affinity. By using a specially crafted EMF file, an attacker could exploit this vulnerability to perform an out-of-bounds read, potentially leading to the disclosure of sensitive information. |
2026-03-17 | |
| CVE-2025-64776 | 6.1 | MEDIUM | CWE-125 | 0.0% p4 | 4.27 | An out-of-bounds read vulnerability exists in the EMF functionality of Canva Aff...An out-of-bounds read vulnerability exists in the EMF functionality of Canva Affinity. By using a specially crafted EMF file, an attacker could exploit this vulnerability to perform an out-of-bounds read, potentially leading to the disclosure of sensitive information. |
2026-03-17 | |
| CVE-2025-64735 | 6.1 | MEDIUM | CWE-125 | 0.0% p4 | 4.27 | An out-of-bounds read vulnerability exists in the EMF functionality of Canva Aff...An out-of-bounds read vulnerability exists in the EMF functionality of Canva Affinity. By using a specially crafted EMF file, an attacker could exploit this vulnerability to perform an out-of-bounds read, potentially leading to the disclosure of sensitive information. |
2026-03-17 | |
| CVE-2025-64733 | 6.1 | MEDIUM | CWE-125 | 0.0% p4 | 4.27 | An out-of-bounds read vulnerability exists in the EMF functionality of Canva Aff...An out-of-bounds read vulnerability exists in the EMF functionality of Canva Affinity. By using a specially crafted EMF file, an attacker could exploit this vulnerability to perform an out-of-bounds read, potentially leading to the disclosure of sensitive information. |
2026-03-17 | |
| CVE-2025-64301 | 7.8 | HIGH | CWE-787 | 0.0% p5 | 5.46 | An out‑of‑bounds write vulnerability exists in the EMF functionality of Canva Af...An out‑of‑bounds write vulnerability exists in the EMF functionality of Canva Affinity. By using a specially crafted EMF file, an attacker could exploit this vulnerability to perform an out‑of‑bounds write, potentially leading to code execution. |
2026-03-17 | |
| CVE-2025-62500 | 6.1 | MEDIUM | CWE-125 | 0.0% p4 | 4.27 | An out-of-bounds read vulnerability exists in the EMF functionality of Canva Aff...An out-of-bounds read vulnerability exists in the EMF functionality of Canva Affinity. By using a specially crafted EMF file, an attacker could exploit this vulnerability to perform an out-of-bounds read, potentially leading to the disclosure of sensitive information. |
2026-03-17 | |
| CVE-2025-62403 | 6.1 | MEDIUM | CWE-125 | 0.0% p4 | 4.27 | An out-of-bounds read vulnerability exists in the EMF functionality of Canva Aff...An out-of-bounds read vulnerability exists in the EMF functionality of Canva Affinity. By using a specially crafted EMF file, an attacker could exploit this vulnerability to perform an out-of-bounds read, potentially leading to the disclosure of sensitive information. |
2026-03-17 | |
| CVE-2025-61979 | 6.1 | MEDIUM | CWE-125 | 0.0% p4 | 4.27 | An out-of-bounds read vulnerability exists in the EMF functionality of Canva Aff...An out-of-bounds read vulnerability exists in the EMF functionality of Canva Affinity. By using a specially crafted EMF file, an attacker could exploit this vulnerability to perform an out-of-bounds read, potentially leading to the disclosure of sensitive information. |
2026-03-17 | |
| CVE-2025-61952 | 6.1 | MEDIUM | CWE-125 | 0.0% p4 | 4.27 | An out-of-bounds read vulnerability exists in the EMF functionality of Canva Aff...An out-of-bounds read vulnerability exists in the EMF functionality of Canva Affinity. By using a specially crafted EMF file, an attacker could exploit this vulnerability to perform an out-of-bounds read, potentially leading to the disclosure of sensitive information. |
2026-03-17 | |
| CVE-2025-58427 | 6.1 | MEDIUM | CWE-125 | 0.0% p4 | 4.27 | An out-of-bounds read vulnerability exists in the EMF functionality of Canva Aff...An out-of-bounds read vulnerability exists in the EMF functionality of Canva Affinity. By using a specially crafted EMF file, an attacker could exploit this vulnerability to perform an out-of-bounds read, potentially leading to the disclosure of sensitive information. |
2026-03-17 | |
| CVE-2025-47873 | 6.1 | MEDIUM | CWE-125 | 0.0% p4 | 4.27 | An out-of-bounds read vulnerability exists in the EMF functionality of Canva Aff...An out-of-bounds read vulnerability exists in the EMF functionality of Canva Affinity. By using a specially crafted EMF file, an attacker could exploit this vulnerability to perform an out-of-bounds read, potentially leading to the disclosure of sensitive information. |
2026-03-17 | |
| CVE-2026-4319 | 6.9 | MEDIUM | CWE-74 | 0.0% p10 | 4.83 | A vulnerability was identified in code-projects Simple Food Order System 1.0. Af...A vulnerability was identified in code-projects Simple Food Order System 1.0. Affected by this vulnerability is an unknown functionality of the file /routers/add-item.php. Such manipulation of the argument price leads to sql injection. The attack can be launched remotely. The exploit is publicly available and might be used. |
2026-03-17 | |
| CVE-2026-32298 | 8.5 | HIGH | CWE-78 | 0.1% p16 | 5.95 | The Angeet ES3 KVM does not properly sanitize user-supplied variables parsed by ...The Angeet ES3 KVM does not properly sanitize user-supplied variables parsed by the 'cfg.lua' script, allowing an authenticated attacker to execute OS-level commands. |
2026-03-17 | |
| CVE-2026-32297 | 9.3 | CRITICAL | CWE-306 | 0.0% p10 | 6.51 | The Angeet ES3 KVM allows a remote, unauthenticated attacker to write arbitrary ...The Angeet ES3 KVM allows a remote, unauthenticated attacker to write arbitrary files, including configuration files or system binaries. Modified configuration files or system binaries could allow an attacker to take complete control of a vulnerable system. |
2026-03-17 | |
| CVE-2026-32296 | 8.8 | HIGH | CWE-306 | 0.1% p21 | 6.16 | Sipeed NanoKVM before 2.3.1 exposes a Wi-Fi configuration endpoint without prope...Sipeed NanoKVM before 2.3.1 exposes a Wi-Fi configuration endpoint without proper security checks, allowing an unauthenticated attacker with network access to change the saved configured Wi-Fi network to one of the attacker's choosing, or craft a request to exhaust the system memory and terminate the KVM process. |
2026-03-17 | |
| CVE-2026-32295 | 9.3 | CRITICAL | CWE-307 | 0.0% p12 | 6.51 | JetKVM before 0.5.4 does not rate limit login requests, enabling brute-force att...JetKVM before 0.5.4 does not rate limit login requests, enabling brute-force attempts to guess credentials. |
2026-03-17 | |
| CVE-2026-32294 | 7.0 | HIGH | CWE-345 | 0.0% p0 | 4.90 | JetKVM prior to 0.5.4 does not verify the authenticity of downloaded firmware fi...JetKVM prior to 0.5.4 does not verify the authenticity of downloaded firmware files. An attacker-in-the-middle or a compromised update server could modify the firmware and the corresponding SHA256 hash to pass verification. |
2026-03-17 | |
| CVE-2026-32293 | 6.3 | MEDIUM | CWE-295 | 0.0% p8 | 4.41 | The GL-iNet Comet (GL-RM1) KVM connects to a GL-iNet site during boot-up to prov...The GL-iNet Comet (GL-RM1) KVM connects to a GL-iNet site during boot-up to provision client and CA certificates. The GL-RM1 does not verify certificates used for this connection, allowing an attacker-in-the-middle to serve invalid client and CA certificates. The GL-RM1 will attempt to use the invalid certificates and fail to connect to the legitimate GL-iNet KVM cloud service. |
2026-03-17 | |
| CVE-2026-32292 | 9.3 | CRITICAL | CWE-307 | 0.0% p12 | 6.51 | The GL-iNet Comet (GL-RM1) KVM web interface does not limit login requests, enab...The GL-iNet Comet (GL-RM1) KVM web interface does not limit login requests, enabling brute-force attempts to guess credentials. |
2026-03-17 | |
| CVE-2026-32291 | 7.0 | HIGH | CWE-306 | 0.0% p14 | 4.90 | The GL-iNet Comet (GL-RM1) KVM before 1.8.2 does not require authentication on t...The GL-iNet Comet (GL-RM1) KVM before 1.8.2 does not require authentication on the UART serial console. This attack requires physically opening the device and connecting to the UART pins. |
2026-03-17 | |
| CVE-2026-32290 | 7.0 | HIGH | CWE-345 | 0.0% p0 | 4.90 | The GL-iNet Comet (GL-RM1) KVM before version 1.8.2 does not sufficiently verify...The GL-iNet Comet (GL-RM1) KVM before version 1.8.2 does not sufficiently verify the authenticity of uploaded firmware files. An attacker-in-the-middle or a compromised update server could modify the firmware and the corresponding MD5 hash to pass verification. |
2026-03-17 | |
| CVE-2026-25770 | 9.1 | CRITICAL | CWE-22 | 0.0% p14 | 6.37 | Wazuh is a free and open source platform used for threat prevention, detection, ...Wazuh is a free and open source platform used for threat prevention, detection, and response. Starting in version 3.9.0 and prior to version 4.14.3, a privilege escalation vulnerability exists in the Wazuh Manager's cluster synchronization protocol. The `wazuh-clusterd` service allows authenticated nodes to write arbitrary files to the manager’s file system with the permissions of the `wazuh` system user. Due to insecure default permissions, the `wazuh` user has write access to the manager's main configuration file (`/var/ossec/etc/ossec.conf`). By leveraging the cluster protocol to overwrite `ossec.conf`, an attacker can inject a malicious `<localfile>` command block. The `wazuh-logcollector` service, which runs as root, parses this configuration and executes the injected command. This chain allows an attacker with cluster credentials to gain full Root Remote Code Execution, violating the principle of least privilege and bypassing the intended security model. Version 4.14.3 fixes the issue. |
2026-03-17 | |
| CVE-2026-25769 | 9.1 | CRITICAL | CWE-502 | 0.2% p47 | 6.38 | Wazuh is a free and open source platform used for threat prevention, detection, ...Wazuh is a free and open source platform used for threat prevention, detection, and response. Versions 4.0.0 through 4.14.2 have a Remote Code Execution (RCE) vulnerability due to Deserialization of Untrusted Data). All Wazuh deployments using cluster mode (master/worker architecture) and any organization with a compromised worker node (e.g., through initial access, insider threat, or supply chain attack) are impacted. An attacker who gains access to a worker node (through any means) can achieve full RCE on the master node with root privileges. Version 4.14.3 fixes the issue. |
2026-03-17 | |
| CVE-2026-4148 | 8.7 | HIGH | CWE-416 | 0.1% p15 | 6.09 | A use-after-free vulnerability can be triggered in sharded clusters by an authen...A use-after-free vulnerability can be triggered in sharded clusters by an authenticated user with the read role who issues a specially crafted $lookup or $graphLookup aggregation pipeline. |
2026-03-17 | |
| CVE-2026-4147 | 7.1 | HIGH | CWE-457 | 0.0% p10 | 4.97 | An authenticated user with the read role may read limited amounts of uninitializ...An authenticated user with the read role may read limited amounts of uninitialized stack memory via specially-crafted issuances of the filemd5 command. |
2026-03-17 | |
| CVE-2026-28506 | 4.3 | MEDIUM | CWE-200 | 0.0% p7 | 3.01 | Outline is a service that allows for collaborative documentation. Prior to 1.5.0...Outline is a service that allows for collaborative documentation. Prior to 1.5.0, the events.list API endpoint, used for retrieving activity logs, contains a logic flaw in its filtering mechanism. It allows any authenticated user to retrieve activity events associated with documents that have no collection (e.g., Private Drafts, Deleted Documents), regardless of the user's actual permissions on those documents. While the document content is not directly exposed, this vulnerability leaks sensitive metadata (such as Document IDs, user activity timestamps, and in some specific cases like the Document Title of Permanent Delete). Crucially, leaking valid Document IDs of deleted drafts removes the protection of UUID randomness, making High-severity IDOR attacks (such as the one identified in documents.restore) trivially exploitable by lowering the attack complexity. Version 1.5.0 fixes the issue. |
2026-03-17 | |
| CVE-2026-24901 | 8.1 | HIGH | CWE-639 | 0.0% p10 | 5.67 | Outline is a service that allows for collaborative documentation. Prior to 1.4.0...Outline is a service that allows for collaborative documentation. Prior to 1.4.0, an Insecure Direct Object Reference (IDOR) vulnerability in the document restoration logic allows any team member to unauthorizedly restore, view, and seize ownership of deleted drafts belonging to other users, including administrators. By bypassing ownership validation during the restore process, an attacker can access sensitive private information and effectively lock the original owner out of their own content. Version 1.4.0 fixes the issue. |
2026-03-17 | |
| CVE-2026-23759 | 8.6 | HIGH | CWE-78 | 0.2% p42 | 6.03 | Perle IOLAN STS/SCS terminal server models with firmware versions prior to 6.0 a...Perle IOLAN STS/SCS terminal server models with firmware versions prior to 6.0 allow authenticated OS command injection via the restricted shell accessed over Telnet or SSH. The shell 'ps' command does not perform proper argument sanitization and passes user-supplied parameters into an 'sh -c' invocation running as root. An authenticated attacker who can log in to the device can inject shell metacharacters after the 'ps' subcommand to execute arbitrary OS commands with root privileges, leading to full compromise of the underlying operating system. |
2026-03-17 | |
| CVE-2026-21886 | 6.5 | MEDIUM | CWE-285 | 0.1% p31 | 4.55 | OpenCTI is an open source platform for managing cyber threat intelligence knowle...OpenCTI is an open source platform for managing cyber threat intelligence knowledge and observables. Prior to version 6.9.1, the GraphQL mutations "IndividualDeletionDeleteMutation" is intended to allow users to delete individual entity objects respectively. However, it was observed that this mutation can be misused to delete unrelated and sensitive objects such as analyses reports etc. This behavior stems from the lack of validation in the API to ensure that the targeted object is contextually related to the mutation being executed. Version 6.9.1 fixes the issue. |
2026-03-17 | |
| CVE-2026-4318 | 7.4 | HIGH | CWE-119 | 0.0% p14 | 5.18 | A vulnerability was determined in UTT HiPER 810G up to 1.7.7-171114. Affected is...A vulnerability was determined in UTT HiPER 810G up to 1.7.7-171114. Affected is the function strcpy of the file /goform/formApLbConfig. This manipulation of the argument loadBalanceNameOld causes buffer overflow. The attack can be initiated remotely. The exploit has been publicly disclosed and may be utilized. |
2026-03-17 | |
| CVE-2026-3564 | 9.0 | CRITICAL | CWE-347 | 0.0% p7 | 6.30 | A condition in ScreenConnect may allow an actor with access to server-level cryp...A condition in ScreenConnect may allow an actor with access to server-level cryptographic material used for authentication to obtain unauthorized access, including elevated privileges, in certain scenarios. |
2026-03-17 | |
| CVE-2025-13406 | 6.8 | MEDIUM | CWE-476 | 0.1% p16 | 4.76 | NULL Pointer Dereference vulnerability in Softing Industrial Automation GmbH sma...NULL Pointer Dereference vulnerability in Softing Industrial Automation GmbH smartLink SW-HT (Webserver modules) allows HTTP DoS.This issue affects smartLink SW-HT: 1.43. |
2026-03-17 | |
| CVE-2026-4324 | 5.4 | MEDIUM | CWE-89 | 0.1% p23 | 3.78 | A flaw was found in the Katello plugin for Red Hat Satellite. This vulnerability...A flaw was found in the Katello plugin for Red Hat Satellite. This vulnerability, caused by improper sanitization of user-provided input, allows a remote attacker to inject arbitrary SQL commands into the sort_by parameter of the /api/hosts/bootc_images API endpoint. This can lead to a Denial of Service (DoS) by triggering database errors, and potentially enable Boolean-based Blind SQL injection, which could allow an attacker to extract sensitive information from the database. |
2026-03-17 | |
| CVE-2026-3888 | 7.8 | HIGH | CWE-268 | 0.0% p0 | 5.46 | Local privilege escalation in snapd on Linux allows local attackers to get root ...Local privilege escalation in snapd on Linux allows local attackers to get root privilege by re-creating snap's private /tmp directory when systemd-tmpfiles is configured to automatically clean up this directory. This issue affects Ubuntu 16.04 LTS, 18.04 LTS, 20.04 LTS, 22.04 LTS, and 24.04 LTS. |
2026-03-17 | |
| CVE-2025-62320 | 4.7 | MEDIUM | CWE-79 | 0.0% p8 | 3.29 | HTML Injection can be carried out in Product when a web application does not pro...HTML Injection can be carried out in Product when a web application does not properly check or clean user input before showing it on a webpage. Because of this, an attacker may insert unwanted HTML code into the page. When the browser loads the page, it may automatically interact with external resources included in that HTML, which can cause unexpected requests from the user’s browser. |
2026-03-17 | |
| CVE-2026-4271 | 5.3 | MEDIUM | CWE-416 | 1.5% p81 | 3.76 | A flaw was found in libsoup, a library for handling HTTP requests. This vulnerab...A flaw was found in libsoup, a library for handling HTTP requests. This vulnerability, known as a Use-After-Free, occurs in the HTTP/2 server implementation. A remote attacker can exploit this by sending specially crafted HTTP/2 requests that cause authentication failures. This can lead to the application attempting to access memory that has already been freed, potentially causing application instability or crashes, resulting in a Denial of Service (DoS). |
2026-03-17 | |
| CVE-2025-31966 | 2.7 | LOW | CWE-20 | 0.1% p20 | 1.89 | HCL Sametime is vulnerable to broken server-side validation. While the applicati...HCL Sametime is vulnerable to broken server-side validation. While the application performs client-side input checks, these are not enforced by the web server. An attacker can bypass these restrictions by sending manipulated HTTP requests directly to the server. |
2026-03-17 | |
| CVE-2026-3634 | 3.9 | LOW | CWE-93 | 0.0% p7 | 2.73 | A flaw was found in libsoup. An attacker controlling the value used to set the C...A flaw was found in libsoup. An attacker controlling the value used to set the Content-Type header can inject a Carriage Return Line Feed (CRLF) sequence due to improper input sanitization in the `soup_message_headers_set_content_type()` function. This vulnerability allows for the injection of arbitrary header-value pairs, potentially leading to HTTP header injection and response splitting attacks. |
2026-03-17 | |
| CVE-2026-3633 | 3.9 | LOW | CWE-93 | 0.0% p9 | 2.73 | A flaw was found in libsoup. A remote attacker, by controlling the method parame...A flaw was found in libsoup. A remote attacker, by controlling the method parameter of the `soup_message_new()` function, could inject arbitrary headers and additional request data. This vulnerability, known as CRLF (Carriage Return Line Feed) injection, occurs because the method value is not properly escaped during request line construction, potentially leading to HTTP request injection. |
2026-03-17 | |
| CVE-2026-3632 | 3.9 | LOW | CWE-1286 | 0.1% p26 | 2.73 | A flaw was found in libsoup, a library used by applications to send network requ...A flaw was found in libsoup, a library used by applications to send network requests. This vulnerability occurs because libsoup does not properly validate hostnames, allowing special characters to be injected into HTTP headers. A remote attacker could exploit this to perform HTTP smuggling, where they can send hidden, malicious requests alongside legitimate ones. In certain situations, this could lead to Server-Side Request Forgery (SSRF), enabling an attacker to force the server to make unauthorized requests to other internal or external systems. The impact is low, as SoupServer is not actually used in internet infrastructure. |
2026-03-17 | |
| CVE-2026-4208 | 7.7 | HIGH | CWE-639 | 0.1% p18 | 5.39 | The extension fails to properly reset the generated MFA code after successful au...The extension fails to properly reset the generated MFA code after successful authentication. This leads to a possible MFA bypass for future login attempts by providing an empty string as MFA code to the extensions MFA provider. |
2026-03-17 | |
| CVE-2026-4202 | 2.3 | LOW | CWE-200 | 0.0% p10 | 1.61 | The extension fails to verify, if an authenticated user has permissions to acces...The extension fails to verify, if an authenticated user has permissions to access to redirects resulting in exposure of redirect records when editing a page. |
2026-03-17 | |
| CVE-2026-32586 | 0.0 | NONE | CWE-862 | 0.0% p5 | 0.00 | Missing Authorization vulnerability in Pluggabl Booster for WooCommerce woocomme...Missing Authorization vulnerability in Pluggabl Booster for WooCommerce woocommerce-jetpack allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Booster for WooCommerce: from n/a through < 7.11.3. |
2026-03-17 | |
| CVE-2026-1323 | 5.2 | MEDIUM | CWE-502 | 0.0% p5 | 3.64 | The extension fails to properly define allowed classes used when deserializing t...The extension fails to properly define allowed classes used when deserializing transport failure metadata. An attacker may exploit this to execute untrusted serialized code. Note that an active exploit requires write access to the directory configured at $GLOBALS['TYPO3_CONF_VARS']['MAIL']['transport_spool_filepath']. |
2026-03-17 | |
| CVE-2026-4312 | 9.3 | CRITICAL | CWE-306 | 0.2% p42 | 6.52 | GCB/FCB Audit Software developed by DrangSoft has a Missing Authentication vulne...GCB/FCB Audit Software developed by DrangSoft has a Missing Authentication vulnerability, allowing unauthenticated remote attackers to directly access certain APIs to create a new administrative account. |
2026-03-17 | |
| CVE-2026-3237 | 2.3 | LOW | CWE-285 | 0.0% p8 | 1.61 | In affected versions of Octopus Server it was possible for a low privileged user...In affected versions of Octopus Server it was possible for a low privileged user to manipulate an API request to change the signing key expiration and revocation time frames via an API endpoint that had incorrect permission validation. It was not possible to expose the signing keys using this vulnerability. |
2026-03-17 | |
| CVE-2026-4258 | 7.7 | HIGH | CWE-347 | 0.0% p3 | 5.39 | All versions of the package sjcl are vulnerable to Improper Verification of Cryp...All versions of the package sjcl are vulnerable to Improper Verification of Cryptographic Signature due to missing point-on-curve validation in sjcl.ecc.basicKey.publicKey(). An attacker can recover a victim's ECDH private key by sending crafted off-curve public keys and observing ECDH outputs. The dhJavaEc() function directly returns the raw x-coordinate of the scalar multiplication result (no hashing), providing a plaintext oracle without requiring any decryption feedback. |
2026-03-17 | |
| CVE-2026-4308 | 5.3 | MEDIUM | CWE-918 | 0.0% p12 | 3.71 | A weakness has been identified in frdel/agent0ai agent-zero 0.9.7. This affects ...A weakness has been identified in frdel/agent0ai agent-zero 0.9.7. This affects the function handle_pdf_document of the file python/helpers/document_query.py. This manipulation causes server-side request forgery. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-17 | |
| CVE-2026-4307 | 5.3 | MEDIUM | CWE-22 | 0.0% p13 | 3.71 | A security flaw has been discovered in frdel/agent0ai agent-zero 0.9.7-10. The i...A security flaw has been discovered in frdel/agent0ai agent-zero 0.9.7-10. The impacted element is the function get_abs_path of the file python/helpers/files.py. The manipulation results in path traversal. The attack can be executed remotely. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-17 | |
| CVE-2026-2373 | 5.3 | MEDIUM | CWE-862 | 0.0% p11 | 3.71 | The Royal Addons for Elementor – Addons and Templates Kit for Elementor plugin f...The Royal Addons for Elementor – Addons and Templates Kit for Elementor plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.7.1049 via the get_main_query_args() function due to insufficient restrictions on which posts can be included. This makes it possible for unauthenticated attackers to extract contents of non-public custom post types, such as Contact Form 7 submissions or WooCommerce coupons. |
2026-03-17 | |
| CVE-2026-0708 | 8.3 | HIGH | CWE-125 | 0.1% p23 | 5.81 | A flaw was found in libucl. A remote attacker could exploit this by providing a ...A flaw was found in libucl. A remote attacker could exploit this by providing a specially crafted Universal Configuration Language (UCL) input that contains a key with an embedded null byte. This can cause a segmentation fault (SEGV fault) in the `ucl_object_emit` function when parsing and emitting the object, leading to a Denial of Service (DoS) for the affected system. |
2026-03-17 | |
| CVE-2026-2579 | 7.5 | HIGH | CWE-89 | 0.1% p26 | 5.25 | The WowStore – Store Builder & Product Blocks for WooCommerce plugin for WordPre...The WowStore – Store Builder & Product Blocks for WooCommerce plugin for WordPress is vulnerable to SQL Injection via the ‘search’ parameter in all versions up to, and including, 4.4.3 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. |
2026-03-17 | |
| CVE-2026-4289 | 6.9 | MEDIUM | CWE-74 | 0.0% p10 | 4.83 | A security vulnerability has been detected in Tiandy Easy7 Integrated Management...A security vulnerability has been detected in Tiandy Easy7 Integrated Management Platform up to 7.17.0. This affects an unknown function of the file /rest/preSetTemplate/getRecByTemplateId. The manipulation of the argument ID leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-17 | |
| CVE-2026-4288 | 6.9 | MEDIUM | CWE-74 | 0.0% p10 | 4.83 | A weakness has been identified in Tiandy Easy7 Integrated Management Platform 7....A weakness has been identified in Tiandy Easy7 Integrated Management Platform 7.17.0. The impacted element is an unknown function of the file /rest/devStatus/getDevDetailedInfo of the component Endpoint. Executing a manipulation of the argument ID can lead to sql injection. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-17 | |
| CVE-2026-4287 | 6.9 | MEDIUM | CWE-74 | 0.0% p10 | 4.83 | A security flaw has been discovered in Tiandy Easy7 Integrated Management Platfo...A security flaw has been discovered in Tiandy Easy7 Integrated Management Platform 7.17.0. The affected element is an unknown function of the file /rest/devStatus/queryResources of the component Endpoint. Performing a manipulation of the argument areaId results in sql injection. The attack can be initiated remotely. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-17 | |
| CVE-2026-4285 | 5.1 | MEDIUM | CWE-22 | 0.1% p20 | 3.57 | A vulnerability was identified in taoofagi easegen-admin up to 8f87936ac774065b9...A vulnerability was identified in taoofagi easegen-admin up to 8f87936ac774065b92fb20aab55b274a6ea76433. Impacted is the function recognizeMarkdown of the file yudao-module-digitalcourse/yudao-module-digitalcourse-biz/src/main/java/cn/iocoder/yudao/module/digitalcourse/util/Pdf2MdUtil.java. Such manipulation of the argument fileUrl leads to path traversal. It is possible to launch the attack remotely. The exploit is publicly available and might be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-17 | |
| CVE-2026-4284 | 5.1 | MEDIUM | CWE-918 | 0.0% p13 | 3.57 | A vulnerability was determined in taoofagi easegen-admin up to 8f87936ac774065b9...A vulnerability was determined in taoofagi easegen-admin up to 8f87936ac774065b92fb20aab55b274a6ea76433. This issue affects the function downloadFile of the file - yudao-module-digitalcourse/yudao-module-digitalcourse-biz/src/main/java/cn/iocoder/yudao/module/digitalcourse/util/PPTUtil.java of the component PPT File Handler. This manipulation of the argument url causes server-side request forgery. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-16 | |
| CVE-2026-21991 | 5.5 | MEDIUM | CWE-22 | 0.0% p1 | 3.85 | A DTrace component, dtprobed, allows arbitrary file creation through crafted USD...A DTrace component, dtprobed, allows arbitrary file creation through crafted USDT provider names. |
2026-03-16 | |
| CVE-2026-2454 | 5.8 | MEDIUM | CWE-1287 | 0.1% p33 | 4.06 | Mattermost versions 11.3.x <= 11.3.0, 11.2.x <= 11.2.2, 10.11.x <= 10.11.10 fail...Mattermost versions 11.3.x <= 11.3.0, 11.2.x <= 11.2.2, 10.11.x <= 10.11.10 fail to handle incorrectly reported array lengths which allows malicious user to cause OOM errors and crash the server via sending corrupted msgpack frames within websocket messages to calls plugin. Mattermost Advisory ID: MMSA-2025-00537 |
2026-03-16 | |
| CVE-2026-29522 | 8.7 | HIGH | CWE-22 | 0.1% p22 | 6.09 | ZwickRoell Test Data Management versions prior to 3.0.8 contain a local file inc...ZwickRoell Test Data Management versions prior to 3.0.8 contain a local file inclusion (LFI) vulnerability in the /server/node_upgrade_srv.js endpoint. An unauthenticated attacker can supply directory traversal sequences via the firmware parameter to access arbitrary files on the server, leading to information disclosure of sensitive system files. |
2026-03-16 | |
| CVE-2026-26230 | 3.8 | LOW | CWE-863 | 0.0% p9 | 2.66 | Mattermost versions 10.11.x <= 10.11.10 fail to properly validate permission req...Mattermost versions 10.11.x <= 10.11.10 fail to properly validate permission requirements in the team member roles API endpoint which allows team administrators to demote members to guest role. Mattermost Advisory ID: MMSA-2025-00531 |
2026-03-16 | |
| CVE-2026-1629 | 4.3 | MEDIUM | CWE-672 | 0.1% p21 | 3.01 | Mattermost versions 10.11.x <= 10.11.10 Fail to invalidate cached permalink prev...Mattermost versions 10.11.x <= 10.11.10 Fail to invalidate cached permalink preview data when a user loses channel access which allows the user to continue viewing private channel content via previously cached permalink previews until cache reset or relogin.. Mattermost Advisory ID: MMSA-2026-00580 |
2026-03-16 | |
| CVE-2025-69902 | 9.8 | CRITICAL | CWE-94 | 0.4% p58 | 6.87 | A command injection vulnerability in the minimal_wrapper.py component of kubectl...A command injection vulnerability in the minimal_wrapper.py component of kubectl-mcp-server v1.2.0 allows attackers to execute arbitrary commands via injecting arbitrary shell metacharacters. |
2026-03-16 | |
| CVE-2025-50881 | 8.8 | HIGH | CWE-94 | 0.2% p44 | 6.17 | The `flow/admin/moniteur.php` script in Use It Flow administration website befor...The `flow/admin/moniteur.php` script in Use It Flow administration website before 10.0.0 is vulnerable to Remote Code Execution. When handling GET requests, the script takes user-supplied input from the `action` URL parameter, performs insufficient validation, and incorporates this input into a string that is subsequently executed by the `eval()` function. Although a `method_exists()` check is performed, it only validates the part of the user input *before* the first parenthesis `(`, allowing an attacker to append arbitrary PHP code after a valid method call structure. Successful exploitation allows an unauthenticated or trivially authenticated attacker to execute arbitrary PHP code on the server with the privileges of the web server process. |
2026-03-16 | |
| CVE-2026-32267 | 7.7 | HIGH | CWE-863 | 0.0% p10 | 5.39 | Craft CMS is a content management system (CMS). From version 4.0.0-RC1 to before...Craft CMS is a content management system (CMS). From version 4.0.0-RC1 to before version 4.17.6 and from version 5.0.0-RC1 to before version 5.9.12, a low-privilege user (or an unauthenticated user who has been sent a shared URL) can escalate their privileges to admin by abusing UsersController->actionImpersonateWithToken. This issue has been patched in versions 4.17.6 and 5.9.12. |
2026-03-16 | |
| CVE-2026-32264 | 8.6 | HIGH | CWE-470 | 0.0% p12 | 6.02 | Craft CMS is a content management system (CMS). From version 4.0.0-RC1 to before...Craft CMS is a content management system (CMS). From version 4.0.0-RC1 to before version 4.17.5 and from version 5.0.0-RC1 to before version 5.9.11, there is a Behavior injection RCE vulnerability in ElementIndexesController and FieldsController. Craft control panel administrator permissions and allowAdminChanges must be enabled for this to work. This issue has been patched in versions 4.17.5 and 5.9.11. |
2026-03-16 | |
| CVE-2026-32263 | 8.6 | HIGH | CWE-470 | 0.0% p12 | 6.02 | Craft CMS is a content management system (CMS). From version 5.6.0 to before ver...Craft CMS is a content management system (CMS). From version 5.6.0 to before version 5.9.11, in src/controllers/EntryTypesController.php, the $settings array from parse_str is passed directly to Craft::configure() without Component::cleanseConfig(). This allows injecting Yii2 behavior/event handlers via "as" or "on" prefixed keys, the same attack vector as the original advisory. Craft control panel administrator permissions and allowAdminChanges must be enabled for this to work. This issue has been patched in version 5.9.11. |
2026-03-16 | |
| CVE-2026-32262 | 5.3 | MEDIUM | CWE-22 | 0.0% p8 | 3.71 | Craft CMS is a content management system (CMS). From version 4.0.0-RC1 to before...Craft CMS is a content management system (CMS). From version 4.0.0-RC1 to before version 4.17.5 and from version 5.0.0-RC1 to before version 5.9.11, the AssetsController->replaceFile() method has a targetFilename body parameter that is used unsanitized in a deleteFile() call before Assets::prepareAssetName() is applied on save. This allows an authenticated user with replaceFiles permission to delete arbitrary files within the same filesystem root by injecting ../ path traversal sequences into the filename. This could allow an authenticated user with replaceFiles permission on one volume to delete files in other folders/volumes that share the same filesystem root. This only affects local filesystems. This issue has been patched in versions 4.17.5 and 5.9.11. |
2026-03-16 | |
| CVE-2026-30882 | 6.1 | MEDIUM | CWE-79 | 0.0% p1 | 4.27 | Chamilo LMS is a learning management system. Chamilo LMS version 1.11.34 and pri...Chamilo LMS is a learning management system. Chamilo LMS version 1.11.34 and prior contains a Reflected Cross-Site Scripting (XSS) vulnerability in the session category listing page. The keyword parameter from $_REQUEST is echoed directly into an HTML href attribute without any encoding or sanitization. An attacker can inject arbitrary HTML/JavaScript by breaking out of the attribute context using ">followed by a malicious payload. The vulnerability is triggered when the pagination controls are rendered — which occurs when the number of session categories exceeds 20 (the page limit). This issue has been patched in version 1.11.36. |
2026-03-16 | |
| CVE-2026-30881 | 8.8 | HIGH | CWE-89 | 0.0% p9 | 6.16 | Chamilo LMS is a learning management system. Version 1.11.34 and prior contains ...Chamilo LMS is a learning management system. Version 1.11.34 and prior contains a SQL Injection vulnerability in the statistics AJAX endpoint. The parameters date_start and date_end from $_REQUEST are embedded directly into a raw SQL string without proper sanitization. Although Database::escape_string() is called downstream, its output is immediately neutralized by str_replace("\'", "'", ...), which restores any injected single quotes — effectively bypassing the escaping mechanism entirely. This allows an authenticated attacker to inject arbitrary SQL statements into the database query, enabling blind time-based and conditional data extraction. This issue has been patched in version 1.11.36. |
2026-03-16 | |
| CVE-2026-30876 | 6.3 | MEDIUM | CWE-204 | 0.0% p11 | 4.41 | Chamilo LMS is a learning management system. Prior to version 1.11.36, Chamilo i...Chamilo LMS is a learning management system. Prior to version 1.11.36, Chamilo is vulnerable to user enumeration with valid/invalid username. This issue has been patched in version 1.11.36. |
2026-03-16 | |
| CVE-2026-30875 | 8.8 | HIGH | CWE-94 | 0.2% p38 | 6.17 | Chamilo LMS is a learning management system. Prior to version 1.11.36, an arbitr...Chamilo LMS is a learning management system. Prior to version 1.11.36, an arbitrary file upload vulnerability in the H5P Import feature allows authenticated users with Teacher role to achieve Remote Code Execution (RCE). The H5P package validation only checks if h5p.json exists but doesn't block .htaccess or PHP files with alternative extensions. An attacker uploads a crafted H5P package containing a webshell and .htaccess that enables PHP execution for .txt files, bypassing security control. This issue has been patched in version 1.11.36. |
2026-03-16 | |
| CVE-2026-29516 | 6.9 | MEDIUM | CWE-732 | 0.0% p0 | 4.83 | Buffalo TeraStation NAS TS5400R firmware version 4.02-0.06 and prior contain an ...Buffalo TeraStation NAS TS5400R firmware version 4.02-0.06 and prior contain an excessive file permissions vulnerability that allows authenticated attackers to read the /etc/shadow file by uploading and executing a PHP file through the webserver. Attackers can exploit world-readable permissions on /etc/shadow to retrieve hashed passwords for all configured accounts including root. |
2026-03-16 | |
| CVE-2026-28430 | 9.3 | CRITICAL | CWE-89 | 0.1% p28 | 6.51 | Chamilo LMS is a learning management system. Prior to version 1.11.34, there is ...Chamilo LMS is a learning management system. Prior to version 1.11.34, there is an unauthenticated SQL injection vulnerability which allows remote attackers to execute arbitrary SQL commands via the custom_dates parameter. By chaining this with a predictable legacy password reset mechanism, an attacker can achieve full administrative account takeover without any prior credentials. The vulnerability also exposes the entire database, including PII and system configurations. This issue has been patched in version 1.11.34. |
2026-03-16 | |
| CVE-2026-26304 | 4.3 | MEDIUM | CWE-863 | 0.0% p8 | 3.01 | Mattermost versions 11.3.x <= 11.3.0, 11.2.x <= 11.2.2 fail to verify run_create...Mattermost versions 11.3.x <= 11.3.0, 11.2.x <= 11.2.2 fail to verify run_create permission for empty playbookId, which allows team members to create unauthorized runs via the playbook run API. Mattermost Advisory ID: MMSA-2025-00542 |
2026-03-16 | |
| CVE-2025-69693 | 5.4 | MEDIUM | CWE-125 | 0.0% p2 | 3.78 | Out-of-bounds read in FFmpeg 8.0 and 8.0.1 RV60 video decoder (libavcodec/rv60de...Out-of-bounds read in FFmpeg 8.0 and 8.0.1 RV60 video decoder (libavcodec/rv60dec.c). The quantization parameter (qp) validation at line 2267 only checks the lower bound (qp < 0) but is missing upper bound validation. The qp value can reach 65 (base value 63 from 6-bit frame header + offset +2 from read_qp_offset) while the rv60_qp_to_idx array has size 64 (valid indices 0-63). This results in out-of-bounds array access at lines 1554 (decode_cbp8), 1655 (decode_cbp16), and 1419/1421 (get_c4x4_set), potentially leading to memory disclosure or crash. A previous fix in commit 61cbcaf93f added validation only for intra frames. This vulnerability affects the released versions 8.0 (released 2025-08-22) and 8.0.1 (released 2025-11-20) and is fixed in git master commit 8abeb879df which will be included in FFmpeg 8.1. |
2026-03-16 | |
| CVE-2025-68971 | 6.5 | MEDIUM | CWE-400 | 0.0% p13 | 4.55 | In Forgejo through 13.0.3, the attachment component allows a denial of service b...In Forgejo through 13.0.3, the attachment component allows a denial of service by uploading a multi-gigabyte file attachment (e.g., to be associated with an issue or a release). |
2026-03-16 | |
| CVE-2026-32261 | 8.5 | HIGH | CWE-1336 | 0.0% p3 | 5.95 | Webhooks for Craft CMS plugin adds the ability to manage “webhooks” in Craft CMS...Webhooks for Craft CMS plugin adds the ability to manage “webhooks” in Craft CMS, which will send GET or POST requests when certain events occur. From version 3.0.0 to before version 3.2.0, the Webhooks plugin renders user-supplied template content through Twig’s renderString() function without sandbox protection. This allows an authenticated user with access to the Craft control panel and permissions to access the Webhooks plugin to inject Twig template code that calls arbitrary PHP functions. This is possible even if allowAdminChanges is set to false. This issue has been patched in version 3.2.0. |
2026-03-16 | |
| CVE-2025-69809 | 9.8 | CRITICAL | CWE-123 | 0.0% p14 | 6.86 | A write-what-where condition in p2r3 Bareiron commit 8e4d40 allows unauthenticat...A write-what-where condition in p2r3 Bareiron commit 8e4d40 allows unauthenticated attackers to write arbitrary values to memory, enabling arbitrary code execution via a crafted packet. |
2026-03-16 | |
| CVE-2025-69808 | 9.1 | CRITICAL | CWE-125 | 0.1% p24 | 6.37 | An out-of-bounds memory access (OOB) in p2r3 Bareiron commit 8e4d40 allows unaut...An out-of-bounds memory access (OOB) in p2r3 Bareiron commit 8e4d40 allows unauthenticated attackers to access sensitive information and cause a Denial of Service (DoS) via supplying a crafted packet. |
2026-03-16 | |
| CVE-2025-69727 | 5.3 | MEDIUM | CWE-284 | 0.0% p10 | 3.71 | An Incorrect Access Control vulnerability exists in INDEX-EDUCATION PRONOTE prio...An Incorrect Access Control vulnerability exists in INDEX-EDUCATION PRONOTE prior to 2025.2.8. The affected components (index.js and composeUrlImgPhotoIndividu) allow the construction of direct URLs to user profile images based solely on predictable identifiers such as user IDs and names. Due to missing authorization checks and lack of rate-limiting when generating or accessing these URLs, an unauthenticated or unauthorized actor may retrieve profile pictures of users by crafting requests with guessed or known identifiers. |
2026-03-16 | |
| CVE-2025-69196 | 7.4 | HIGH | CWE-863 | 0.0% p2 | 5.18 | FastMCP is the standard framework for building MCP applications. Prior to versio...FastMCP is the standard framework for building MCP applications. Prior to version 2.14.2, the server does not properly respect the resource parameter submitted by the client in the authorization and token request. Instead of issuing the token explicitly for the MCP server, the token is issued for the base_url passed to the OAuthProxy during initialization. This issue has been patched 2.14.2. |
2026-03-16 | |
| CVE-2026-4254 | 8.9 | HIGH | CWE-119 | 0.2% p36 | 6.23 | A weakness has been identified in Tenda AC8 up to 16.03.50.11. This vulnerabilit...A weakness has been identified in Tenda AC8 up to 16.03.50.11. This vulnerability affects the function doSystemCmd of the file /goform/SysToolChangePwd of the component HTTP Endpoint. This manipulation of the argument local_2c causes stack-based buffer overflow. The attack can be initiated remotely. The exploit has been made available to the public and could be used for attacks. |
2026-03-16 | |
| CVE-2026-4253 | 5.1 | MEDIUM | CWE-77 | 0.4% p59 | 3.58 | A security flaw has been discovered in Tenda AC8 16.03.50.11. This affects the f...A security flaw has been discovered in Tenda AC8 16.03.50.11. This affects the function route_set_user_policy_rule of the file /cgi-bin/UploadCfg of the component Web Interface. The manipulation of the argument wans.policy.list1 results in os command injection. It is possible to launch the attack remotely. The exploit has been released to the public and may be used for attacks. |
2026-03-16 | |
| CVE-2026-3644 | 6.0 | MEDIUM | CWE-20 | 0.1% p29 | 4.20 | The fix for CVE-2026-0672, which rejected control characters in http.cookies.Mor...The fix for CVE-2026-0672, which rejected control characters in http.cookies.Morsel, was incomplete. The Morsel.update(), |= operator, and unpickling paths were not patched, allowing control characters to bypass input validation. Additionally, BaseCookie.js_output() lacked the output validation applied to BaseCookie.output(). |
2026-03-16 | |
| CVE-2026-29521 | 5.1 | MEDIUM | CWE-352 | 0.0% p6 | 3.57 | Hereta ETH-IMC408M firmware version 1.0.15 and prior contain a cross-site reques...Hereta ETH-IMC408M firmware version 1.0.15 and prior contain a cross-site request forgery vulnerability that allows attackers to modify device configuration by exploiting missing CSRF protections in setup.cgi. Attackers can host malicious pages that submit forged requests using automatically-included HTTP Basic Authentication credentials to add RADIUS accounts, alter network settings, or trigger diagnostics. |
2026-03-16 | |
| CVE-2026-29520 | 5.1 | MEDIUM | CWE-79 | 0.0% p8 | 3.57 | Hereta ETH-IMC408M firmware version 1.0.15 and prior contain a reflected cross-s...Hereta ETH-IMC408M firmware version 1.0.15 and prior contain a reflected cross-site scripting vulnerability in the Network Diagnosis ping function that allows attackers to execute arbitrary JavaScript. Attackers can craft malicious links with injected script payloads in the ping_ipaddr parameter to compromise authenticated administrator sessions when the links are visited. |
2026-03-16 | |
| CVE-2026-29513 | 5.1 | MEDIUM | CWE-79 | 0.0% p8 | 3.57 | Hereta ETH-IMC408M firmware version 1.0.15 and prior contain a stored cross-site...Hereta ETH-IMC408M firmware version 1.0.15 and prior contain a stored cross-site scripting vulnerability that allows authenticated attackers to inject arbitrary JavaScript by manipulating the Device Location field. Attackers can inject malicious scripts through the System Status interface that execute in browsers of users viewing the status page without input sanitation. |
2026-03-16 | |
| CVE-2026-29510 | 5.1 | MEDIUM | CWE-79 | 0.0% p8 | 3.57 | Hereta ETH-IMC408M firmware version 1.0.15 and prior contain a stored cross-site...Hereta ETH-IMC408M firmware version 1.0.15 and prior contain a stored cross-site scripting vulnerability that allows authenticated attackers to inject arbitrary JavaScript by manipulating the Device Name field. Attackers can inject malicious scripts through the System Status interface that execute in browsers of users viewing the status page without input sanitation. |
2026-03-16 | |
| CVE-2026-28498 | 8.2 | HIGH | CWE-354 | 0.0% p3 | 5.74 | Authlib is a Python library which builds OAuth and OpenID Connect servers. Prior...Authlib is a Python library which builds OAuth and OpenID Connect servers. Prior to version 1.6.9, a library-level vulnerability was identified in the Authlib Python library concerning the validation of OpenID Connect (OIDC) ID Tokens. Specifically, the internal hash verification logic (_verify_hash) responsible for validating the at_hash (Access Token Hash) and c_hash (Authorization Code Hash) claims exhibits a fail-open behavior when encountering an unsupported or unknown cryptographic algorithm. This flaw allows an attacker to bypass mandatory integrity protections by supplying a forged ID Token with a deliberately unrecognized alg header parameter. The library intercepts the unsupported state and silently returns True (validation passed), inherently violating fundamental cryptographic design principles and direct OIDC specifications. This issue has been patched in version 1.6.9. |
2026-03-16 | |
| CVE-2026-28490 | 8.3 | HIGH | CWE-203 | 0.0% p1 | 5.81 | Authlib is a Python library which builds OAuth and OpenID Connect servers. Prior...Authlib is a Python library which builds OAuth and OpenID Connect servers. Prior to version 1.6.9, a cryptographic padding oracle vulnerability was identified in the Authlib Python library concerning the implementation of the JSON Web Encryption (JWE) RSA1_5 key management algorithm. Authlib registers RSA1_5 in its default algorithm registry without requiring explicit opt-in, and actively destroys the constant-time Bleichenbacher mitigation that the underlying cryptography library implements correctly. This issue has been patched in version 1.6.9. |
2026-03-16 | |
| CVE-2026-27962 | 9.1 | CRITICAL | CWE-347 | 0.1% p16 | 6.37 | Authlib is a Python library which builds OAuth and OpenID Connect servers. Prior...Authlib is a Python library which builds OAuth and OpenID Connect servers. Prior to version 1.6.9, a JWK Header Injection vulnerability in authlib's JWS implementation allows an unauthenticated attacker to forge arbitrary JWT tokens that pass signature verification. When key=None is passed to any JWS deserialization function, the library extracts and uses the cryptographic key embedded in the attacker-controlled JWT jwk header field. An attacker can sign a token with their own private key, embed the matching public key in the header, and have the server accept the forged token as cryptographically valid — bypassing authentication and authorization entirely. This issue has been patched in version 1.6.9. |
2026-03-16 | |
| CVE-2026-23862 | 7.8 | HIGH | CWE-77 | 0.1% p19 | 5.46 | Dell ThinOS 10 versions prior to ThinOS 2602_10.0573, contain an Improper Neutra...Dell ThinOS 10 versions prior to ThinOS 2602_10.0573, contain an Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of Privileges. |
2026-03-16 | |
| CVE-2026-23489 | 9.1 | CRITICAL | CWE-20 | 0.1% p31 | 6.37 | Fields is a GLPI plugin that allows users to add custom fields on GLPI items for...Fields is a GLPI plugin that allows users to add custom fields on GLPI items forms. Prior to version 1.23.3, it is possible to execute arbitrary PHP code from users that are allowed to create dropdowns. This issue has been patched in version 1.23.3. |
2026-03-16 | |
| CVE-2025-69768 | 7.5 | HIGH | CWE-89 | 0.0% p13 | 5.25 | SQL Injection vulnerability in Chyrp v.2.5.2 and before allows a remote attacker...SQL Injection vulnerability in Chyrp v.2.5.2 and before allows a remote attacker to obtain sensitive information via the Admin.php component |
2026-03-16 | |
| CVE-2025-66687 | 7.5 | HIGH | CWE-22 | 0.5% p64 | 5.26 | Doom Launcher 3.8.1.0 is vulnerable to Directory Traversal due to missing file p...Doom Launcher 3.8.1.0 is vulnerable to Directory Traversal due to missing file path validation during the extraction of game files |
2026-03-16 | |
| CVE-2026-4252 | 8.9 | HIGH | CWE-287 | 0.2% p48 | 6.24 | A vulnerability was identified in Tenda AC8 16.03.50.11. Affected by this issue ...A vulnerability was identified in Tenda AC8 16.03.50.11. Affected by this issue is the function check_is_ipv6 of the component IPv6 Handler. The manipulation leads to reliance on ip address for authentication. It is possible to initiate the attack remotely. The exploit is publicly available and might be used. |
2026-03-16 | |
| CVE-2026-4251 | 2.0 | LOW | CWE-255 | 0.0% p1 | 1.40 | A vulnerability was determined in CityData CityChat up to 0.12.6 on Android. Aff...A vulnerability was determined in CityData CityChat up to 0.12.6 on Android. Affected by this vulnerability is an unknown functionality of the file resources/assets/flutter_assets/assets/credentials.json of the component ai.citydata.citychat. Executing a manipulation can lead to unprotected storage of credentials. The attack requires local access. A high complexity level is associated with this attack. The exploitation appears to be difficult. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-16 | |
| CVE-2026-30405 | 7.5 | HIGH | CWE-400 | 0.1% p34 | 5.25 | An issue in GoBGP gobgpd v.4.2.0 allows a remote attacker to cause a denial of s...An issue in GoBGP gobgpd v.4.2.0 allows a remote attacker to cause a denial of service via the NEXT_HOP path attribute |
2026-03-16 | |
| CVE-2025-65734 | 5.4 | MEDIUM | CWE-79 | 0.0% p9 | 3.78 | An authenticated arbitrary file upload vulnerability in the Courses/Work Assignm...An authenticated arbitrary file upload vulnerability in the Courses/Work Assignments module of gunet Open eClass v3.11, and fixed in v3.13, allows attackers to execute arbitrary code via uploading a crafted SVG file. |
2026-03-16 | |
| CVE-2025-54758 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none...Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2025. Notes: none. |
2026-03-16 | |
| CVE-2025-53815 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none...Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2025. Notes: none. |
2026-03-16 | |
| CVE-2025-53517 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none...Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2025. Notes: none. |
2026-03-16 | |
| CVE-2026-4276 | 7.5 | HIGH | N/A | 0.1% p20 | 5.25 | LibreChat RAG API, version 0.7.0, contains a log-injection vulnerability that al...LibreChat RAG API, version 0.7.0, contains a log-injection vulnerability that allows attackers to forge log entries. |
2026-03-16 | |
| CVE-2026-4250 | 2.0 | LOW | CWE-255 | 0.0% p1 | 1.40 | A vulnerability was found in Albert Sağlık Hizmetleri ve Ticaret Albert Health u...A vulnerability was found in Albert Sağlık Hizmetleri ve Ticaret Albert Health up to 1.7.3 on Android. Affected is an unknown function of the file resources/assets/service-account.json of the component Google Cloud Service Account Key Handler. Performing a manipulation results in unprotected storage of credentials. The attack requires a local approach. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-16 | |
| CVE-2026-32587 | 0.0 | NONE | CWE-862 | 0.0% p5 | 0.00 | Missing Authorization vulnerability in Saad Iqbal WP EasyPay wp-easy-pay allows ...Missing Authorization vulnerability in Saad Iqbal WP EasyPay wp-easy-pay allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP EasyPay: from n/a through <= 4.2.11. |
2026-03-16 | |
| CVE-2026-32583 | 5.3 | MEDIUM | CWE-862 | 2.7% p85 | 3.79 | Missing Authorization vulnerability in Webnus Inc. Modern Events Calendar allows...Missing Authorization vulnerability in Webnus Inc. Modern Events Calendar allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Modern Events Calendar: from n/a through 7.29.0. |
2026-03-16 | |
| CVE-2025-69784 | 8.8 | HIGH | CWE-427 | 0.0% p4 | 6.16 | A local, non-privileged attacker can abuse a vulnerable IOCTL interface exposed ...A local, non-privileged attacker can abuse a vulnerable IOCTL interface exposed by the OpenEDR 2.5.1.0 kernel driver to modify the DLL injection path used by the product. By redirecting this path to a user-writable location, an attacker can cause OpenEDR to load an attacker-controlled DLL into high-privilege processes. This results in arbitrary code execution with SYSTEM privileges, leading to full compromise of the affected system. |
2026-03-16 | |
| CVE-2025-69783 | 7.8 | HIGH | CWE-250 | 0.0% p2 | 5.46 | A local attacker can bypass OpenEDR's 2.5.1.0 self-defense mechanism by renaming...A local attacker can bypass OpenEDR's 2.5.1.0 self-defense mechanism by renaming a malicious executable to match a trusted process name (e.g., csrss.exe, edrsvc.exe, edrcon.exe). This allows unauthorized interaction with the OpenEDR kernel driver, granting access to privileged functionality such as configuration changes, process monitoring, and IOCTL communication that should be restricted to trusted components. While this issue alone does not directly grant SYSTEM privileges, it breaks OpenEDR's trust model and enables further exploitation leading to full local privilege escalation. |
2026-03-16 | |
| CVE-2025-62319 | 9.8 | CRITICAL | CWE-89 | 0.0% p12 | 6.86 | Boolean-Based SQL Injection is a type of blind SQL injection where an attacker m...Boolean-Based SQL Injection is a type of blind SQL injection where an attacker manipulates SQL queries by injecting Boolean conditions (TRUE or FALSE) into application input fields. Instead of returning database errors or visible data, the application responds differently depending on whether the injected condition evaluates to true or false. This allows an attacker to inject arbitrary SQL into backend configuration queries executed within the application. |
2026-03-16 | |
| CVE-2025-57543 | 6.1 | MEDIUM | CWE-79 | 0.0% p8 | 4.27 | Cross Site scripting vulnerability (XSS) in NetBox 4.3.5 "comment" field on obje...Cross Site scripting vulnerability (XSS) in NetBox 4.3.5 "comment" field on object forms. An attacker can inject arbitrary HTML, which will be rendered in the web UI when viewed by other users. This could potentially lead to user interface redress attacks or be escalated to XSS in certain contexts. |
2026-03-16 | |
| CVE-2026-4243 | 2.0 | LOW | CWE-255 | 0.0% p1 | 1.40 | A weakness has been identified in La Nacion App 10.2.25 on Android. This impacts...A weakness has been identified in La Nacion App 10.2.25 on Android. This impacts an unknown function of the file source/app/lanacion/clublanacion/BuildConfig.java of the component app.lanacion.activity. Executing a manipulation of the argument API_KEY_WEBSOCKET_CV can lead to unprotected storage of credentials. The attack can only be executed locally. A high complexity level is associated with this attack. The exploitability is said to be difficult. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-16 | |
| CVE-2026-4242 | 2.0 | LOW | CWE-255 | 0.0% p1 | 1.40 | A security flaw has been discovered in BabyChakra Pregnancy & Parenting App up t...A security flaw has been discovered in BabyChakra Pregnancy & Parenting App up to 5.4.3.0 on Android. This affects an unknown function of the file file app/babychakra/babychakra/Configuration.java of the component app.babychakra.babychakra. Performing a manipulation of the argument SEGMENT_WRITE_KEY results in unprotected storage of credentials. The attack needs to be approached locally. The complexity of an attack is rather high. The exploitability is reported as difficult. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-16 | |
| CVE-2026-2455 | 4.3 | MEDIUM | CWE-918 | 0.0% p8 | 3.01 | Mattermost versions 11.3.x <= 11.3.0, 11.2.x <= 11.2.2, 10.11.x <= 10.11.10 fail...Mattermost versions 11.3.x <= 11.3.0, 11.2.x <= 11.2.2, 10.11.x <= 10.11.10 fail to canonicalize IPv4-mapped IPv6 addresses before reserved IP validation which allows an attacker to perform SSRF attacks against internal services via IPv4-mapped IPv6 literals (e.g., [::ffff:127.0.0.1]).. Mattermost Advisory ID: MMSA-2026-00585 |
2026-03-16 | |
| CVE-2026-25369 | 0.0 | NONE | CWE-79 | 0.0% p11 | 0.00 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in flexmls Flexmls® IDX flexmls-idx allows Reflected XSS.This issue affects Flexmls® IDX: from n/a through <= 3.15.9. |
2026-03-16 | |
| CVE-2026-24692 | 4.3 | MEDIUM | CWE-863 | 0.0% p6 | 3.01 | Mattermost versions 11.3.x <= 11.3.0, 11.2.x <= 11.2.2, 10.11.x <= 10.11.10 fail...Mattermost versions 11.3.x <= 11.3.0, 11.2.x <= 11.2.2, 10.11.x <= 10.11.10 fail to properly enforce read permissions in search API endpoints which allows guest users without read permissions to access posts and files in channels via search API requests. Mattermost Advisory ID: MMSA-2025-00554 |
2026-03-16 | |
| CVE-2026-22545 | 3.1 | LOW | CWE-863 | 0.0% p11 | 2.17 | Mattermost versions 10.11.x <= 10.11.10 fail to validate user's authentication m...Mattermost versions 10.11.x <= 10.11.10 fail to validate user's authentication method when processing account auth type switch which allows an authenticated attacker to change account password without confirmation via falsely claiming a different auth provider.. Mattermost Advisory ID: MMSA-2026-00583 |
2026-03-16 | |
| CVE-2026-21386 | 4.3 | MEDIUM | CWE-203 | 0.0% p9 | 3.01 | Mattermost versions 11.3.x <= 11.3.0, 11.2.x <= 11.2.2, 10.11.x <= 10.11.10 fail...Mattermost versions 11.3.x <= 11.3.0, 11.2.x <= 11.2.2, 10.11.x <= 10.11.10 fail to use consistent error responses when handling the /mute command which allows an authenticated team member to enumerate private channels they are not authorized to know about via differing error messages for nonexistent versus private channels. Mattermost Advisory ID: MMSA-2026-00588 |
2026-03-16 | |
| CVE-2025-52649 | 1.8 | LOW | CWE-200 | 0.0% p6 | 1.26 | HCL AION is affected by a vulnerability where certain identifiers may be predict...HCL AION is affected by a vulnerability where certain identifiers may be predictable in nature. Predictable identifiers may allow an attacker to infer or guess system-generated values, potentially leading to limited information disclosure or unintended access under specific conditions. |
2026-03-16 | |
| CVE-2025-52646 | 2.2 | LOW | CWE-89 | 0.0% p8 | 1.54 | HCL AION is affected by a vulnerability where certain offering configurations ma...HCL AION is affected by a vulnerability where certain offering configurations may permit execution of potentially harmful SQL queries. Improper validation or restrictions on query execution could expose the system to unintended database interactions or limited information exposure under specific conditions. |
2026-03-16 | |
| CVE-2025-52645 | 1.9 | LOW | CWE-345 | 0.0% p3 | 1.33 | HCL AION is affected by a vulnerability where model packaging and distribution m...HCL AION is affected by a vulnerability where model packaging and distribution mechanisms may not include sufficient authenticity verification. This may allow the possibility of unverified or modified model artifacts being used, potentially leading to integrity concerns or unintended behaviour. |
2026-03-16 | |
| CVE-2025-52644 | 5.8 | MEDIUM | CWE-778 | 0.0% p10 | 4.06 | HCL AION is affected by a vulnerability where certain user actions are not adequ...HCL AION is affected by a vulnerability where certain user actions are not adequately audited or logged. The absence of proper auditing mechanisms may reduce traceability of user activities and could potentially impact monitoring, accountability, or incident investigation processes. |
2026-03-16 | |
| CVE-2025-52643 | 4.7 | MEDIUM | CWE-693 | 0.0% p3 | 3.29 | HCL AION is affected by a vulnerability where untrusted file parsing operations ...HCL AION is affected by a vulnerability where untrusted file parsing operations are not executed within a properly isolated sandbox environment. This may expose the application to potential security risks, including unintended behaviour or integrity impact when processing specially crafted files. |
2026-03-16 | |
| CVE-2025-52642 | 3.3 | LOW | CWE-538 | 0.0% p6 | 2.31 | HCL AION is affected by a vulnerability where internal filesystem paths may be e...HCL AION is affected by a vulnerability where internal filesystem paths may be exposed through application responses or system behaviour. Exposure of internal paths may reveal environment structure details which could potentially aid in further targeted attacks or information disclosure. |
2026-03-16 | |
| CVE-2025-52636 | 1.8 | LOW | CWE-400 | 0.0% p7 | 1.26 | HCL AION is affected by a vulnerability related to the handling of upload size l...HCL AION is affected by a vulnerability related to the handling of upload size limits. Improper control or validation of upload sizes may allow excessive resource consumption, which could potentially lead to service degradation or denial-of-service conditions under certain scenarios. |
2026-03-16 | |
| CVE-2025-2274 | 4.8 | MEDIUM | CWE-79 | 0.0% p12 | 3.36 | Improper Neutralization of Input During Web Page Generation in Forcepoint Web Se...Improper Neutralization of Input During Web Page Generation in Forcepoint Web Security (On-Prem) on Windows allows Stored XSS.This issue affects Web Security through 8.5.6. |
2026-03-16 | |
| CVE-2026-4265 | 4.3 | MEDIUM | CWE-863 | 0.0% p7 | 3.01 | Mattermost versions 11.3.x <= 11.3.0, 11.2.x <= 11.2.2, 10.11.x <= 10.11.10 fail...Mattermost versions 11.3.x <= 11.3.0, 11.2.x <= 11.2.2, 10.11.x <= 10.11.10 fail to validate team-specific upload_file permissions which allows a guest user to post files in channels where they lack upload_file permission via uploading files in a team where they have permission and reusing the file metadata in a POST request to a different team. Mattermost Advisory ID: MMSA-2025-00553 |
2026-03-16 | |
| CVE-2026-4255 | 8.4 | HIGH | CWE-829 | 0.0% p0 | 5.88 | A DLL search order hijacking vulnerability in Thermalright TR-VISION HOME on Win...A DLL search order hijacking vulnerability in Thermalright TR-VISION HOME on Windows (64-bit) allows a local attacker to escalate privileges via DLL side-loading. The application loads certain dynamic-link library (DLL) dependencies using the default Windows search order, which includes directories that may be writable by non-privileged users.\n\n\n\nBecause these directories can be modified by unprivileged users, an attacker can place a malicious DLL with the same name as a legitimate dependency in a directory that is searched before trusted system locations. When the application is executed, which is always with administrative privileges, the malicious DLL is loaded instead of the legitimate library.\n\n\n\nThe application does not enforce restrictions on DLL loading locations and does not verify the integrity or digital signature of loaded libraries. As a result, attacker-controlled code may be executed within the security context of the application, allowing arbitrary code execution with elevated privileges.\n\n\n\nSuccessful exploitation requires that an attacker place a crafted malicious DLL in a user-writable directory that is included in the application's DLL search path and then cause the affected application to be executed. Once loaded, the malicious DLL runs with the same privileges as the application.\n\n\n\nThis issue affects \nTR-VISION HOME versions up to and including 2.0.5. |
2026-03-16 | |
| CVE-2026-4241 | 5.3 | MEDIUM | CWE-74 | 0.0% p8 | 3.71 | A vulnerability was identified in itsourcecode College Management System 1.0. Th...A vulnerability was identified in itsourcecode College Management System 1.0. The impacted element is an unknown function of the file /admin/time-table.php. Such manipulation of the argument course_code leads to sql injection. The attack can be launched remotely. The exploit is publicly available and might be used. |
2026-03-16 | |
| CVE-2026-4240 | 5.5 | MEDIUM | CWE-404 | 0.1% p20 | 3.85 | A vulnerability was determined in Open5GS up to 2.7.6. The affected element is t...A vulnerability was determined in Open5GS up to 2.7.6. The affected element is the function smf_gx_cca_cb/smf_gy_cca_cb/smf_s6b_aaa_cb/smf_s6b_sta_cb of the component CCA Handler. This manipulation causes denial of service. The attack can be initiated remotely. The exploit has been publicly disclosed and may be utilized. Upgrading to version 2.7.7 is sufficient to fix this issue. Patch name: 80eb484a6ab32968e755e628b70d1a9c64f012ec. Upgrading the affected component is recommended. |
2026-03-16 | |
| CVE-2026-4239 | 5.1 | MEDIUM | CWE-94 | 0.0% p11 | 3.57 | A vulnerability was found in Lagom WHMCS Template up to 2.3.7. Impacted is an un...A vulnerability was found in Lagom WHMCS Template up to 2.3.7. Impacted is an unknown function of the component Datatables. The manipulation results in improperly controlled modification of object prototype attributes. It is possible to launch the attack remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-16 | |
| CVE-2026-4238 | 5.1 | MEDIUM | CWE-74 | 0.0% p10 | 3.57 | A vulnerability has been found in itsourcecode College Management System 1.0. Th...A vulnerability has been found in itsourcecode College Management System 1.0. This issue affects some unknown processing of the file /admin/courses.php. The manipulation of the argument course_code leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. |
2026-03-16 | |
| CVE-2026-4237 | 6.9 | MEDIUM | CWE-74 | 0.0% p11 | 4.83 | A flaw has been found in itsourcecode Free Hotel Reservation System 1.0. This vu...A flaw has been found in itsourcecode Free Hotel Reservation System 1.0. This vulnerability affects unknown code of the file /hotel/admin/mod_reports/index.php. Executing a manipulation of the argument Home can lead to sql injection. The attack may be performed from remote. The exploit has been published and may be used. |
2026-03-16 | |
| CVE-2026-4236 | 6.9 | MEDIUM | CWE-74 | 0.0% p14 | 4.83 | A security vulnerability has been detected in itsourcecode Online Enrollment Sys...A security vulnerability has been detected in itsourcecode Online Enrollment System 1.0. Impacted is an unknown function of the file /enrollment/index.php?view=add. Such manipulation of the argument txtsearch/deptname/name leads to sql injection. The attack may be performed from remote. The exploit has been disclosed publicly and may be used. |
2026-03-16 | |
| CVE-2026-4235 | 6.9 | MEDIUM | CWE-74 | 0.0% p11 | 4.83 | A weakness has been identified in itsourcecode Online Enrollment System 1.0. Thi...A weakness has been identified in itsourcecode Online Enrollment System 1.0. This issue affects some unknown processing of the file /sms/login.php. This manipulation of the argument user_email causes sql injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be used for attacks. |
2026-03-16 | |
| CVE-2026-4234 | 5.3 | MEDIUM | CWE-74 | 0.0% p8 | 3.71 | A security flaw has been discovered in SSCMS 7.4.0. This vulnerability affects u...A security flaw has been discovered in SSCMS 7.4.0. This vulnerability affects unknown code of the file SitesAddController.Submit.cs of the component DDL Handler. The manipulation of the argument tableHandWrite results in sql injection. The attack can be executed remotely. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-16 | |
| CVE-2026-4233 | 5.3 | MEDIUM | CWE-22 | 0.0% p13 | 3.71 | A vulnerability was identified in ThingsGateway 12. This affects an unknown part...A vulnerability was identified in ThingsGateway 12. This affects an unknown part of the file /api/file/download. The manipulation of the argument fileName leads to path traversal. Remote exploitation of the attack is possible. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-16 | |
| CVE-2026-4232 | 6.9 | MEDIUM | CWE-74 | 0.0% p10 | 4.83 | A vulnerability was determined in Tiandy Integrated Management Platform 7.17.0. ...A vulnerability was determined in Tiandy Integrated Management Platform 7.17.0. Affected by this issue is some unknown functionality of the file /rest/user/getAuthorityByUserId. Executing a manipulation of the argument userId can lead to sql injection. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-16 | |
| CVE-2026-4231 | 6.9 | MEDIUM | CWE-918 | 0.1% p15 | 4.83 | A vulnerability was found in vanna-ai vanna up to 2.0.2. Affected by this vulner...A vulnerability was found in vanna-ai vanna up to 2.0.2. Affected by this vulnerability is the function update_sql/run_sql of the file src/vanna/legacy/flask/__init__.py of the component Endpoint. Performing a manipulation results in server-side request forgery. The attack may be initiated remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-16 | |
| CVE-2026-4230 | 5.3 | MEDIUM | CWE-74 | 0.0% p8 | 3.71 | A vulnerability has been found in vanna-ai vanna up to 2.0.2. Affected is the fu...A vulnerability has been found in vanna-ai vanna up to 2.0.2. Affected is the function update_sql of the file src/vanna/legacy/flask/__init__.py of the component Endpoint. Such manipulation leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-16 | |
| CVE-2026-4229 | 6.9 | MEDIUM | CWE-74 | 0.0% p10 | 4.83 | A flaw has been found in vanna-ai vanna up to 2.0.2. This impacts the function r...A flaw has been found in vanna-ai vanna up to 2.0.2. This impacts the function remove_training_data of the file src/vanna/legacy/google/bigquery_vector.py. This manipulation of the argument ID causes sql injection. The attack can be initiated remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-16 | |
| CVE-2026-4228 | 5.3 | MEDIUM | CWE-74 | 0.4% p59 | 3.72 | A vulnerability was detected in LB-LINK BL-WR9000 2.4.9. This affects the functi...A vulnerability was detected in LB-LINK BL-WR9000 2.4.9. This affects the function sub_458754 of the file /goform/set_wifi. The manipulation results in command injection. It is possible to launch the attack remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-16 | |
| CVE-2026-4227 | 7.4 | HIGH | CWE-119 | 0.1% p30 | 5.18 | A security vulnerability has been detected in LB-LINK BL-WR9000 2.4.9. The impac...A security vulnerability has been detected in LB-LINK BL-WR9000 2.4.9. The impacted element is the function sub_44D844 of the file /goform/get_hidessid_cfg. The manipulation leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-16 | |
| CVE-2026-4226 | 7.4 | HIGH | CWE-119 | 0.1% p30 | 5.18 | A weakness has been identified in LB-LINK BL-WR9000 2.4.9. The affected element ...A weakness has been identified in LB-LINK BL-WR9000 2.4.9. The affected element is the function sub_44E8D0 of the file /goform/get_virtual_cfg. Executing a manipulation can lead to stack-based buffer overflow. The attack may be performed from remote. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-16 | |
| CVE-2026-4225 | 4.8 | MEDIUM | CWE-79 | 0.0% p8 | 3.36 | A security flaw has been discovered in CMS Made Simple up to 2.2.21. Impacted is...A security flaw has been discovered in CMS Made Simple up to 2.2.21. Impacted is an unknown function of the file admin/listusers.php of the component User Management Module. Performing a manipulation of the argument Message results in cross site scripting. The attack is possible to be carried out remotely. The exploit has been released to the public and may be used for attacks. |
2026-03-16 | |
| CVE-2026-4223 | 6.9 | MEDIUM | CWE-74 | 0.0% p8 | 4.83 | A vulnerability was identified in itsourcecode Payroll Management System 1.0. Th...A vulnerability was identified in itsourcecode Payroll Management System 1.0. This issue affects some unknown processing of the file /manage_employee.php. Such manipulation of the argument ID leads to sql injection. The attack can be executed remotely. The exploit is publicly available and might be used. |
2026-03-16 | |
| CVE-2026-4222 | 5.1 | MEDIUM | CWE-22 | 0.1% p23 | 3.57 | A vulnerability was determined in SSCMS up to 7.4.0. This vulnerability affects ...A vulnerability was determined in SSCMS up to 7.4.0. This vulnerability affects the function PathUtils.RemoveParentPath of the file /api/admin/plugins/install/actions/download. This manipulation of the argument path causes path traversal. Remote exploitation of the attack is possible. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-16 | |
| CVE-2026-4221 | 6.9 | MEDIUM | CWE-284 | 0.1% p15 | 4.83 | A vulnerability was found in Tiandy Easy7 Integrated Management Platform 7.17.0....A vulnerability was found in Tiandy Easy7 Integrated Management Platform 7.17.0. This affects an unknown part of the file /rest/file/uploadLedImage of the component Endpoint. The manipulation of the argument File results in unrestricted upload. The attack may be launched remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-16 | |
| CVE-2026-4220 | 6.9 | MEDIUM | CWE-284 | 0.1% p15 | 4.83 | A vulnerability has been found in Technologies Integrated Management Platform 7....A vulnerability has been found in Technologies Integrated Management Platform 7.17.0. Affected by this issue is some unknown functionality of the file /SetWebpagePic.jsp. The manipulation of the argument targetPath/Suffix leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-16 | |
| CVE-2026-4219 | 1.9 | LOW | CWE-259 | 0.0% p1 | 1.33 | A flaw has been found in INDEX Conferences & Exhibitions Organization YWF BPOF A...A flaw has been found in INDEX Conferences & Exhibitions Organization YWF BPOF APGCS App up to 1.0.2 on Android. Affected by this vulnerability is an unknown functionality of the file com/index/event/BuildConfig.java of the component ae.index.apgcs. Executing a manipulation of the argument ACCESS_KEY/HASH_KEY can lead to hard-coded credentials. The attack is restricted to local execution. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-16 | |
| CVE-2026-4218 | 2.0 | LOW | CWE-200 | 0.0% p1 | 1.40 | A vulnerability was detected in myAEDES App up to 1.18.4 on Android. Affected is...A vulnerability was detected in myAEDES App up to 1.18.4 on Android. Affected is an unknown function of the file aedes/me/beta/utils/EngageBayUtils.java of the component aedes.me.beta. Performing a manipulation of the argument AUTH_KEY results in information disclosure. The attack is only possible with local access. The attack's complexity is rated as high. The exploitability is told to be difficult. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-16 | |
| CVE-2026-4217 | 2.0 | LOW | CWE-255 | 0.0% p1 | 1.40 | A security vulnerability has been detected in XREAL Nebula App up to 3.2.1 on An...A security vulnerability has been detected in XREAL Nebula App up to 3.2.1 on Android. This impacts an unknown function of the file in ai/nreal/nebula/flutterPlugin/CloudStoragePlugin.java of the component ai.nreal.nebula.universal. Such manipulation of the argument accessKey/secretAccessKey/securityToken leads to unprotected storage of credentials. The attack can only be performed from a local environment. The attack requires a high level of complexity. The exploitability is said to be difficult. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-16 | |
| CVE-2026-4216 | 4.8 | MEDIUM | CWE-259 | 0.0% p2 | 3.36 | A weakness has been identified in i-SENS SmartLog App up to 2.6.8 on Android. Th...A weakness has been identified in i-SENS SmartLog App up to 2.6.8 on Android. This affects an unknown function of the component air.SmartLog.android. This manipulation causes hard-coded credentials. The attack can only be executed locally. The exploit has been made available to the public and could be used for attacks. The vendor explains: "The function referenced in the report currently exists in our deployed system. It is related to a developer mode used during the configuration process for Bluetooth pairing between the blood glucose meter and the SmartLog application. This function is intended for configuration purposes related to device integration and testing. (...) [I]n a future application update, we plan to review measures to either remove the developer mode function or restrict access to it." |
2026-03-16 | |
| CVE-2026-4215 | 5.3 | MEDIUM | CWE-918 | 0.0% p11 | 3.71 | A security flaw has been discovered in FlowCI flow-core-x up to 1.23.01. The imp...A security flaw has been discovered in FlowCI flow-core-x up to 1.23.01. The impacted element is the function Save of the file core/src/main/java/com/flowci/core/config/service/ConfigServiceImpl.java of the component SMTP Host Handler. The manipulation results in server-side request forgery. The attack may be performed from remote. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-16 | |
| CVE-2026-4214 | 7.4 | HIGH | CWE-119 | 0.0% p15 | 5.18 | A flaw has been found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, ...A flaw has been found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205. This issue affects the function UPnP_AV_Server_Path_Setting of the file /cgi-bin/app_mgr.cgi. Executing a manipulation can lead to stack-based buffer overflow. The attack may be launched remotely. The exploit has been published and may be used. |
2026-03-16 | |
| CVE-2026-4213 | 7.4 | HIGH | CWE-119 | 0.1% p20 | 5.18 | A vulnerability was detected in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS...A vulnerability was detected in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205. This vulnerability affects the function cgi_myfavorite_del_user/cgi_myfavorite_verify of the file /cgi-bin/gui_mgr.cgi. Performing a manipulation results in stack-based buffer overflow. The attack may be initiated remotely. The exploit is now public and may be used. |
2026-03-16 | |
| CVE-2026-4212 | 7.4 | HIGH | CWE-119 | 0.0% p15 | 5.18 | A security vulnerability has been detected in D-Link DNS-120, DNR-202L, DNS-315L...A security vulnerability has been detected in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205. This affects the function Downloads_Schedule_Info of the file /cgi-bin/download_mgr.cgi. Such manipulation leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed publicly and may be used. |
2026-03-16 | |
| CVE-2026-4211 | 7.4 | HIGH | CWE-119 | 0.0% p15 | 5.18 | A weakness has been identified in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, D...A weakness has been identified in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205. Affected by this issue is the function Local_Backup_Info of the file /cgi-bin/local_backup_mgr.cgi. This manipulation of the argument f_idx causes stack-based buffer overflow. The attack can be initiated remotely. The exploit has been made available to the public and could be used for attacks. |
2026-03-16 | |
| CVE-2026-4210 | 5.3 | MEDIUM | CWE-74 | 0.1% p26 | 3.71 | A security flaw has been discovered in D-Link DNS-120, DNR-202L, DNS-315L, DNS-3...A security flaw has been discovered in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205. Affected by this vulnerability is the function cgi_tm_set_share of the file /cgi-bin/time_machine.cgi. The manipulation of the argument Name results in command injection. It is possible to launch the attack remotely. The exploit has been released to the public and may be used for attacks. |
2026-03-16 | |
| CVE-2026-4209 | 5.3 | MEDIUM | CWE-74 | 0.1% p30 | 3.71 | A vulnerability was identified in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, D...A vulnerability was identified in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205. Affected is the function cgi_create_import_users/cgi_user_batch_create/cgi_user_set_quota/cgi_user_del/cgi_user_modify/cgi_group_set_quota/cgi_group_modify/cgi_group_add/cgi_user_add/cgi_get_modify_group_info/cgi_chg_admin_pw of the file /cgi-bin/account_mgr.cgi. The manipulation leads to command injection. It is possible to initiate the attack remotely. The exploit is publicly available and might be used. |
2026-03-16 | |
| CVE-2026-4207 | 5.3 | MEDIUM | CWE-74 | 0.1% p29 | 3.71 | A vulnerability was determined in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, D...A vulnerability was determined in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205. This impacts the function cgi_device/cgi_sms_test/cgi_firmware_upload/cgi_ntp_time of the file /cgi-bin/system_mgr.cgi. Executing a manipulation can lead to command injection. The attack may be performed from remote. The exploit has been publicly disclosed and may be utilized. |
2026-03-16 | |
| CVE-2026-4206 | 5.3 | MEDIUM | CWE-74 | 0.2% p37 | 3.72 | A vulnerability was found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-32...A vulnerability was found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205. This affects the function FMT_rebuild_diskmgr/FMT_create_diskmgr/ScanDisk_run_e2fsck of the file /cgi-bin/dsk_mgr.cgi. Performing a manipulation results in command injection. The attack is possible to be carried out remotely. The exploit has been made public and could be used. |
2026-03-16 | |
| CVE-2026-4205 | 5.3 | MEDIUM | CWE-74 | 0.2% p37 | 3.72 | A vulnerability has been found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, D...A vulnerability has been found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205. The impacted element is the function cgi_refresh_db/FTP_Server_BlockIP_Add/FTP_Server_BlockIP_Del of the file /cgi-bin/app_mgr.cgi. Such manipulation leads to command injection. The attack can be executed remotely. The exploit has been disclosed to the public and may be used. |
2026-03-16 | |
| CVE-2026-4204 | 5.3 | MEDIUM | CWE-74 | 0.1% p26 | 3.71 | A flaw has been found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, ...A flaw has been found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205. The affected element is the function cgi_myfavorite_add/cgi_myfavorite_set/cgi_myfavorite_del/cgi_myfavorite_set_sort_info/cgi_myfavorite_remove_apkg/cgi_myfavorite_compare_apkg/cgi_mycloud_auto_downlaod of the file /cgi-bin/gui_mgr.cgi. This manipulation of the argument f_user causes command injection. Remote exploitation of the attack is possible. The exploit has been published and may be used. |
2026-03-16 | |
| CVE-2026-4203 | 5.3 | MEDIUM | CWE-74 | 0.1% p23 | 3.71 | A vulnerability was detected in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS...A vulnerability was detected in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205. Impacted is the function cgi_portforwarding_add/cgi_portforwarding_del/cgi_portforwarding_modify/cgi_portforwarding_add_scan/cgi_dhcpd_lease/cgi_ddns/cgi_ip/cgi_dhcpd of the file /cgi-bin/network_mgr.cgi. The manipulation results in command injection. The attack may be launched remotely. The exploit is now public and may be used. |
2026-03-16 | |
| CVE-2026-4201 | 6.9 | MEDIUM | CWE-284 | 0.1% p15 | 4.83 | A weakness has been identified in glowxq glowxq-oj up to 6f7c723090472057252040f...A weakness has been identified in glowxq glowxq-oj up to 6f7c723090472057252040fd2bbbdaa1b5ed2393. This vulnerability affects the function Upload of the file business/business-system/src/main/java/com/glowxq/system/admin/controller/SysFileController.java. Executing a manipulation can lead to unrestricted upload. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-16 | |
| CVE-2026-4200 | 6.9 | MEDIUM | CWE-918 | 0.1% p15 | 4.83 | A security flaw has been discovered in glowxq glowxq-oj up to 6f7c72309047205725...A security flaw has been discovered in glowxq glowxq-oj up to 6f7c723090472057252040fd2bbbdaa1b5ed2393. This affects the function uploadTestcaseZipUrl of the file business/business-oj/src/main/java/com/glowxq/oj/problem/controller/ProblemCaseController.java. Performing a manipulation results in server-side request forgery. The attack can be initiated remotely. The exploit has been released to the public and may be used for attacks. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-16 | |
| CVE-2026-4199 | 4.8 | MEDIUM | CWE-74 | 0.3% p53 | 3.37 | A vulnerability was identified in bazinga012 mcp_code_executor up to 0.3.0. Affe...A vulnerability was identified in bazinga012 mcp_code_executor up to 0.3.0. Affected by this issue is the function installDependencies of the file src/index.ts. Such manipulation leads to command injection. The attack can only be performed from a local environment. The exploit is publicly available and might be used. It is best practice to apply a patch to resolve this issue. The project was informed of the problem early through an issue report but has not responded yet. |
2026-03-16 | |
| CVE-2026-4198 | 4.8 | MEDIUM | CWE-74 | 0.3% p53 | 3.37 | A vulnerability was determined in hypermodel-labs mcp-server-auto-commit 1.0.0. ...A vulnerability was determined in hypermodel-labs mcp-server-auto-commit 1.0.0. Affected by this vulnerability is the function getGitChanges of the file index.ts. This manipulation causes command injection. The attack can only be executed locally. The exploit has been publicly disclosed and may be utilized. Patch name: f7d992c830c5f2ec5749852e66c0195e3ed7fe30. Applying a patch is the recommended action to fix this issue. The project was informed of the problem early through an issue report but has not responded yet. |
2026-03-16 | |
| CVE-2026-4197 | 5.3 | MEDIUM | CWE-74 | 0.1% p30 | 3.71 | A vulnerability was found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-32...A vulnerability was found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205. Affected is the function RSS_Get_Update_Status/RSS_Update/RSS_Channel_AutoDownlaod/RSS_Add/RSS_Channel_Item_Downlaod/RSS_History_Item_List/RSS_Item_List of the file /cgi-bin/download_mgr.cgi. The manipulation results in command injection. The attack may be performed from remote. The exploit has been made public and could be used. |
2026-03-16 | |
| CVE-2026-4196 | 5.3 | MEDIUM | CWE-74 | 0.1% p29 | 3.71 | A vulnerability has been found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, D...A vulnerability has been found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205. This impacts the function cgi_recovery/cgi_backup_now/cgi_set_schedule/cgi_set_rsync_server of the file /cgi-bin/remote_backup.cgi. The manipulation leads to command injection. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used. |
2026-03-16 | |
| CVE-2026-4195 | 5.3 | MEDIUM | CWE-74 | 0.1% p26 | 3.71 | A flaw has been found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, ...A flaw has been found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205. This affects an unknown function of the file /cgi-bin/wizard_mgr.cgi. Executing a manipulation can lead to command injection. The attack can be executed remotely. The exploit has been published and may be used. |
2026-03-16 | |
| CVE-2026-4194 | 6.9 | MEDIUM | CWE-266 | 0.1% p16 | 4.83 | A vulnerability was detected in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS...A vulnerability was detected in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205. The impacted element is the function cgi_set_wto of the file /cgi-bin/system_mgr.cgi. Performing a manipulation results in improper access controls. Remote exploitation of the attack is possible. The exploit is now public and may be used. |
2026-03-16 | |
| CVE-2026-4193 | 6.9 | MEDIUM | CWE-266 | 0.1% p24 | 4.83 | A security vulnerability has been detected in D-Link DIR-823G 1.0.2B05. The affe...A security vulnerability has been detected in D-Link DIR-823G 1.0.2B05. The affected element is the function GetDDNSSettings/GetDeviceDomainName/GetDeviceSettings/GetDMZSettings/GetFirewallSettings/GetGuestNetworkSettings/GetLanWanConflictInfo/GetLocalMacAddress/GetNetworkSettings/GetQoSSettings/GetRouterInformationSettings/GetRouterLanSettings/GetWanSettings/SetAccessCtlList/SetAccessCtlSwitch/SetDeviceSettings/SetGuestWLanSettings/SetIPv4FirewallSettings/SetNetworkSettings/SetNetworkTomographySettings/SetNTPServerSettings/SetRouterLanSettings/SetStaticClientInfo/SetStaticRouteSettings/SetWLanRadioSecurity/SetWPSSettings/UpdateClientInfo of the component goahead. Such manipulation leads to improper access controls. The attack may be launched remotely. The exploit has been disclosed publicly and may be used. This vulnerability only affects products that are no longer supported by the maintainer. |
2026-03-16 | |
| CVE-2026-4192 | 5.3 | MEDIUM | CWE-74 | 0.3% p52 | 3.72 | A vulnerability has been found in AvinashBole quip-mcp-server 1.0.0. Affected by...A vulnerability has been found in AvinashBole quip-mcp-server 1.0.0. Affected by this vulnerability is the function setupToolHandlers of the file src/index.ts. Such manipulation leads to command injection. The attack may be performed from remote. The exploit has been disclosed to the public and may be used. The project was informed of the problem early through an issue report but has not responded yet. |
2026-03-16 | |
| CVE-2026-4191 | 6.9 | MEDIUM | CWE-284 | 0.0% p3 | 4.83 | A flaw has been found in JawherKl node-api-postgres up to 2.5. Affected is the f...A flaw has been found in JawherKl node-api-postgres up to 2.5. Affected is the function path.extname of the file index.js of the component Profile Picture Handler. This manipulation causes unrestricted upload. The attack is possible to be carried out remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-16 | |
| CVE-2026-4190 | 6.9 | MEDIUM | CWE-74 | 0.0% p10 | 4.83 | A vulnerability was detected in JawherKl node-api-postgres up to 2.5. This impac...A vulnerability was detected in JawherKl node-api-postgres up to 2.5. This impacts the function User.getAll of the file models/user.js. The manipulation of the argument sort results in sql injection. The attack can be executed remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-16 | |
| CVE-2026-4189 | 5.1 | MEDIUM | CWE-74 | 0.0% p1 | 3.57 | A weakness has been identified in phpipam up to 1.7.4. The impacted element is a...A weakness has been identified in phpipam up to 1.7.4. The impacted element is an unknown function of the file app/admin/sections/edit-result.php of the component Section Handler. Executing a manipulation of the argument subnetOrdering can lead to sql injection. The attack may be launched remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-16 | |
| CVE-2026-4188 | 7.4 | HIGH | CWE-119 | 0.1% p15 | 5.18 | A security flaw has been discovered in D-Link DIR-619L 2.06B01. The affected ele...A security flaw has been discovered in D-Link DIR-619L 2.06B01. The affected element is the function formSchedule of the file /goform/formSchedule of the component boa. Performing a manipulation of the argument curTime results in stack-based buffer overflow. The attack may be initiated remotely. The exploit has been released to the public and may be used for attacks. This vulnerability only affects products that are no longer supported by the maintainer. |
2026-03-16 | |
| CVE-2026-4187 | 5.5 | MEDIUM | CWE-287 | 0.0% p6 | 3.85 | A vulnerability was identified in Tiandy Easy7 Integrated Management Platform 7....A vulnerability was identified in Tiandy Easy7 Integrated Management Platform 7.17.0. Impacted is an unknown function of the file /WebService/UpdateLocalDevInfo.jsp of the component Device Identifier Handler. Such manipulation of the argument username/password leads to missing authentication. The attack can be launched remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-16 | |
| CVE-2026-4186 | 5.1 | MEDIUM | CWE-79 | 0.0% p8 | 3.57 | A vulnerability was determined in UEditor up to 1.4.3.2. This issue affects some...A vulnerability was determined in UEditor up to 1.4.3.2. This issue affects some unknown processing of the file php/controller.php?action=uploadimage of the component JSONP Callback Handler. This manipulation of the argument callback causes cross site scripting. The attack can be initiated remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way. This vulnerability only affects products that are no longer supported by the maintainer. |
2026-03-16 | |
| CVE-2026-4185 | 5.3 | MEDIUM | CWE-119 | 0.1% p21 | 3.71 | A vulnerability was found in GPAC up to 2.5-DEV-rev2167-gcc9d617c0-master. This ...A vulnerability was found in GPAC up to 2.5-DEV-rev2167-gcc9d617c0-master. This vulnerability affects the function swf_def_bits_jpeg of the file src/scene_manager/swf_parse.c of the component MP4Box. The manipulation of the argument szName results in stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been made public and could be used. The patch is identified as 8961c74f87ae3fe2d3352e622f7730ca96d50cf1. A patch should be applied to remediate this issue. |
2026-03-16 | |
| CVE-2026-4184 | 8.9 | HIGH | CWE-119 | 0.1% p32 | 6.23 | A vulnerability was detected in D-Link DIR-816 1.10CNB05. Affected by this vulne...A vulnerability was detected in D-Link DIR-816 1.10CNB05. Affected by this vulnerability is an unknown functionality of the file /goform/form2Wl5BasicSetup.cgi of the component goahead. Performing a manipulation of the argument pskValue results in stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit is now public and may be used. This vulnerability only affects products that are no longer supported by the maintainer. |
2026-03-16 | |
| CVE-2026-4183 | 8.9 | HIGH | CWE-119 | 0.1% p26 | 6.23 | A security vulnerability has been detected in D-Link DIR-816 1.10CNB05. Affected...A security vulnerability has been detected in D-Link DIR-816 1.10CNB05. Affected is an unknown function of the file /goform/form2WlanBasicSetup.cgi of the component goahead. Such manipulation of the argument pskValue leads to stack-based buffer overflow. The attack can be executed remotely. The exploit has been disclosed publicly and may be used. This vulnerability only affects products that are no longer supported by the maintainer. |
2026-03-16 | |
| CVE-2026-4182 | 8.9 | HIGH | CWE-119 | 0.1% p26 | 6.23 | A weakness has been identified in D-Link DIR-816 1.10CNB05. This impacts an unkn...A weakness has been identified in D-Link DIR-816 1.10CNB05. This impacts an unknown function of the file /goform/form2Wl5RepeaterStep2.cgi of the component goahead. This manipulation of the argument key1/key2/key3/key4/pskValue causes stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be used for attacks. This vulnerability only affects products that are no longer supported by the maintainer. |
2026-03-16 | |
| CVE-2026-4181 | 8.9 | HIGH | CWE-119 | 0.1% p26 | 6.23 | A security flaw has been discovered in D-Link DIR-816 1.10CNB05. This affects an...A security flaw has been discovered in D-Link DIR-816 1.10CNB05. This affects an unknown function of the file /goform/form2RepeaterStep2.cgi of the component goahead. The manipulation of the argument key1/key2/key3/key4/pskValue results in stack-based buffer overflow. The attack may be launched remotely. The exploit has been released to the public and may be used for attacks. This vulnerability only affects products that are no longer supported by the maintainer. |
2026-03-16 | |
| CVE-2026-4180 | 6.9 | MEDIUM | CWE-266 | 0.1% p16 | 4.83 | A vulnerability was identified in D-Link DIR-816 1.10CNB05. The impacted element...A vulnerability was identified in D-Link DIR-816 1.10CNB05. The impacted element is an unknown function of the file redirect.asp of the component goahead. The manipulation of the argument token_id leads to improper access controls. The attack may be initiated remotely. The exploit is publicly available and might be used. This vulnerability only affects products that are no longer supported by the maintainer. |
2026-03-16 | |
| CVE-2026-4179 | 6.1 | MEDIUM | CWE-835 | 0.0% p0 | 4.27 | Issues in stm32 USB device driver (drivers/usb/device/usb_dc_stm32.c) can lead t...Issues in stm32 USB device driver (drivers/usb/device/usb_dc_stm32.c) can lead to an infinite while loop. |
2026-03-16 | |
| CVE-2026-4175 | 5.1 | MEDIUM | CWE-79 | 0.0% p10 | 3.57 | A vulnerability was determined in Aureus ERP up to 1.3.0-BETA2. The affected ele...A vulnerability was determined in Aureus ERP up to 1.3.0-BETA2. The affected element is an unknown function of the file plugins/webkul/chatter/resources/views/filament/infolists/components/messages/content-text-entry.blade.php of the component Chatter Message Handler. Executing a manipulation of the argument subject/body can lead to cross site scripting. The attack can be launched remotely. Upgrading to version 1.3.0-BETA1 is sufficient to fix this issue. This patch is called 2135ee7efff4090e70050b63015ab5e268760ec8. It is suggested to upgrade the affected component. |
2026-03-16 | |
| CVE-2026-4174 | 4.8 | MEDIUM | CWE-400 | 0.0% p2 | 3.36 | A vulnerability has been found in Radare2 5.9.9. This issue affects the function...A vulnerability has been found in Radare2 5.9.9. This issue affects the function walk_exports_trie of the file libr/bin/format/mach0/mach0.c of the component Mach-O File Parser. Such manipulation leads to resource consumption. The attack can only be performed from a local environment. The exploit has been disclosed to the public and may be used. The existence of this vulnerability is still disputed at present. Upgrading to version 6.1.2 is capable of addressing this issue. The name of the patch is 4371ae84c99c46b48cb21badbbef06b30757aba0. You should upgrade the affected component. The code maintainer states that, "[he] wont consider this bug a DoS". |
2026-03-16 | |
| CVE-2026-4173 | 5.3 | MEDIUM | CWE-74 | 0.0% p8 | 3.71 | A flaw has been found in CodePhiliaX Chat2DB up to 0.3.7. This vulnerability aff...A flaw has been found in CodePhiliaX Chat2DB up to 0.3.7. This vulnerability affects the function exportTable/exportTableColumnComment/exportView/exportProcedure/exportTriggers/exportTrigger/updateProcedure of the file DMDBManage.java of the component Database Export Handler. This manipulation causes sql injection. It is possible to initiate the attack remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-16 | |
| CVE-2026-4172 | 7.3 | HIGH | CWE-119 | 0.1% p15 | 5.11 | A vulnerability was detected in TRENDnet TEW-632BRP 1.010B32. This affects an un...A vulnerability was detected in TRENDnet TEW-632BRP 1.010B32. This affects an unknown part of the file /ping_response.cgi of the component HTTP POST Request Handler. The manipulation of the argument ping_ipaddr results in stack-based buffer overflow. The attack may be performed from remote. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-16 | |
| CVE-2026-4171 | 5.3 | MEDIUM | CWE-285 | 0.0% p12 | 3.71 | A security vulnerability has been detected in CodeGenieApp serverless-express up...A security vulnerability has been detected in CodeGenieApp serverless-express up to 4.17.1. Affected by this issue is some unknown functionality of the file examples/lambda-function-url/packages/api/models/TodoList.ts of the component API Endpoint. The manipulation of the argument userId leads to authorization bypass. The attack is possible to be carried out remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-16 | |
| CVE-2026-4170 | 8.9 | HIGH | CWE-77 | 0.2% p44 | 6.24 | A weakness has been identified in Topsec TopACM 3.0. Affected by this vulnerabil...A weakness has been identified in Topsec TopACM 3.0. Affected by this vulnerability is an unknown functionality of the file /view/systemConfig/management/nmc_sync.php of the component HTTP Request Handler. Executing a manipulation of the argument template_path can lead to os command injection. The attack can be executed remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-16 | |
| CVE-2026-4169 | 4.8 | MEDIUM | CWE-79 | 0.0% p8 | 3.36 | A security flaw has been discovered in Tecnick TCExam up to 16.6.0. Affected is ...A security flaw has been discovered in Tecnick TCExam up to 16.6.0. Affected is the function F_xml_export_users of the file admin/code/tce_xml_users.php of the component XML Export. Performing a manipulation results in cross site scripting. Remote exploitation of the attack is possible. There are still doubts about whether this vulnerability truly exists. Upgrading to version 16.6.1 is able to address this issue. The patch is named 899b5b2fa09edfe16043f07265e44fe2022b7f12. It is suggested to upgrade the affected component. When the vendor was informed about another security issue, he identified and fixed this flaw during analysis. He doubts the impact of this: "However, this is difficult to justify as security issue. It requires to be administrator to both create and consume the exploit. Administrators can do pretty much anything in the platform, so I don't see the point of this from a security perspective." This is reflected by the CVSS vector. |
2026-03-16 | |
| CVE-2026-4168 | 4.8 | MEDIUM | CWE-79 | 0.0% p9 | 3.36 | A vulnerability was identified in Tecnick TCExam 16.5.0. This impacts an unknown...A vulnerability was identified in Tecnick TCExam 16.5.0. This impacts an unknown function of the file /admin/code/tce_edit_group.php of the component Group Handler. Such manipulation of the argument Name leads to cross site scripting. The attack may be launched remotely. The exploit is publicly available and might be used. The presence of this vulnerability remains uncertain at this time. The affected component should be upgraded. The vendor explained: "I was not able to reproduce the same exploit as the TCExam version was already advanced in the meanwhile." Therefore, it can be assumed that this issue got fixed in a later release. |
2026-03-16 | |
| CVE-2026-4167 | 7.4 | HIGH | CWE-119 | 0.0% p14 | 5.18 | A vulnerability was determined in Belkin F9K1122 1.00.33. This affects the funct...A vulnerability was determined in Belkin F9K1122 1.00.33. This affects the function formReboot of the file /goform/formReboot. This manipulation of the argument webpage causes stack-based buffer overflow. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-16 | |
| CVE-2026-4166 | 5.1 | MEDIUM | CWE-79 | 0.0% p10 | 3.57 | A vulnerability was found in Wavlink WL-NU516U1 240425. The impacted element is ...A vulnerability was found in Wavlink WL-NU516U1 240425. The impacted element is the function sub_404F68 of the file /cgi-bin/login.cgi. The manipulation of the argument homepage/hostname results in cross site scripting. The attack can be launched remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure. |
2026-03-16 | |
| CVE-2026-4165 | 4.8 | MEDIUM | CWE-79 | 0.0% p8 | 3.36 | A vulnerability has been found in Worksuite HR, CRM and Project Management up to...A vulnerability has been found in Worksuite HR, CRM and Project Management up to 5.5.25. The affected element is an unknown function of the file /account/orders/create. The manipulation of the argument Client Note leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. |
2026-03-16 | |
| CVE-2026-4164 | 8.9 | HIGH | CWE-74 | 0.2% p46 | 6.24 | A flaw has been found in Wavlink WL-WN578W2 221110. Impacted is the function Del...A flaw has been found in Wavlink WL-WN578W2 221110. Impacted is the function Delete_Mac_list/SetName/GuestWifi of the file /cgi-bin/wireless.cgi of the component POST Request Handler. Executing a manipulation can lead to command injection. It is possible to launch the attack remotely. The exploit has been published and may be used. It is recommended to upgrade the affected component. |
2026-03-16 | |
| CVE-2026-4163 | 8.9 | HIGH | CWE-74 | 0.2% p44 | 6.24 | A vulnerability was detected in Wavlink WL-WN579A3 220323. This issue affects th...A vulnerability was detected in Wavlink WL-WN579A3 220323. This issue affects the function SetName/GuestWifi of the file /cgi-bin/wireless.cgi of the component POST Request Handler. Performing a manipulation results in command injection. It is possible to initiate the attack remotely. The exploit is now public and may be used. Upgrading the affected component is recommended. |
2026-03-16 | |
| CVE-2026-3476 | 7.8 | HIGH | CWE-94 | 0.0% p6 | 5.46 | A Code Injection vulnerability affecting SOLIDWORKS Desktop from Release 2025 th...A Code Injection vulnerability affecting SOLIDWORKS Desktop from Release 2025 through Release 2026 could allow an attacker to execute arbitrary code on the user's machine while opening a specially crafted file. |
2026-03-16 | |
| CVE-2026-3442 | 6.1 | MEDIUM | CWE-125 | 0.0% p0 | 4.27 | A flaw was found in GNU Binutils. This vulnerability, a heap-based buffer overfl...A flaw was found in GNU Binutils. This vulnerability, a heap-based buffer overflow, specifically an out-of-bounds read, exists in the bfd linker component. An attacker could exploit this by convincing a user to process a specially crafted malicious XCOFF object file. Successful exploitation may lead to the disclosure of sensitive information or cause the application to crash, resulting in an application level denial of service. |
2026-03-16 | |
| CVE-2026-3441 | 6.1 | MEDIUM | CWE-125 | 0.0% p0 | 4.27 | A flaw was found in GNU Binutils. This heap-based buffer overflow vulnerability,...A flaw was found in GNU Binutils. This heap-based buffer overflow vulnerability, specifically an out-of-bounds read in the bfd linker, allows an attacker to gain access to sensitive information. By convincing a user to process a specially crafted XCOFF object file, an attacker can trigger this flaw, potentially leading to information disclosure or an application level denial of service. |
2026-03-16 | |
| CVE-2026-3111 | 6.9 | MEDIUM | CWE-284 | 0.1% p20 | 4.83 | Insecure Direct Object Reference (IDOR) vulnerability in Campus Educativa specif...Insecure Direct Object Reference (IDOR) vulnerability in Campus Educativa specifically at the endpoint '/archivos/usuarios/[ID]/[username]/thumb_AAxAA.jpg' (translated as 80x90 and 40x45). Successful exploitation of this vulnerability could allow an unauthenticated attacker to access the profile photos of all users via a manipulated URL, enabling them to collect user photos en masse. This could lead to these photos being used maliciously to impersonate identities, perform social engineering, link identities across platforms using facial recognition, or even carry out doxxing. |
2026-03-16 | |
| CVE-2026-3110 | 8.7 | HIGH | CWE-284 | 0.1% p20 | 6.09 | Insecure Direct Object Reference (IDOR) vulnerability in Campus Educativa specif...Insecure Direct Object Reference (IDOR) vulnerability in Campus Educativa specifically at the endpoint '/administracion/admin_usuarios.cgi?filtro_estado=T&wAccion=listado_xlsx&wBuscar=&wFiltrar=&wOrden=alta_usuario&wid_cursoActual=[ID]' where the data of users enrolled in the course is exported. Successful exploitation of this vulnerability could allow an unauthenticated attacker to access user data (e.g., usernames, first and last names, email addresses, and phone numbers) and retrieve the data of all users enrolled in courses by performing a brute-force attack on the course ID via a manipulated URL. |
2026-03-16 | |
| CVE-2026-3024 | 4.8 | MEDIUM | CWE-79 | 0.0% p8 | 3.36 | Stored Cross-Site Scripting (XSS) vulnerability in the Wakyma web application, s...Stored Cross-Site Scripting (XSS) vulnerability in the Wakyma web application, specifically in the endpoint 'vets.wakyma.com/configuracion/agenda/modelo-formulario-evento'. A user with permission to create personalized accounts could exploit this vulnerability simply by creating a malicious survey that would harm the entire veterinary team. At the same time, a user with low privileges could exploit this vulnerability to access unauthorized data and perform actions with elevated privileges. |
2026-03-16 | |
| CVE-2026-3023 | 5.3 | MEDIUM | CWE-943 | 0.0% p9 | 3.71 | Non-relational SQL injection vulnerability (NoSQLi) in the Wakyma web applicatio...Non-relational SQL injection vulnerability (NoSQLi) in the Wakyma web application, specifically in the endpoint 'vets.wakyma.com/pets/print-tags'. This vulnerability could allow an authenticated user to alter a POST request to the affected endpoint for the purpose of injecting NoSQL commands, allowing them to list both pets and owner names. |
2026-03-16 | |
| CVE-2026-3022 | 7.1 | HIGH | CWE-943 | 0.0% p8 | 4.97 | Non-relational SQL injection vulnerability (NoSQLi) in the Wakyma web applicatio...Non-relational SQL injection vulnerability (NoSQLi) in the Wakyma web application, specifically in the endpoint 'vets.wakyma.com/hospitalization/generate-hospitalization-summary'. This vulnerability could allow an authenticated user to alter a POST request to the affected endpoint for the purpose of injecting special NoSQL commands, resulting in the attacker being able to obtain customer reports. |
2026-03-16 | |
| CVE-2026-3021 | 7.1 | HIGH | CWE-943 | 0.0% p8 | 4.97 | Non-relational SQL injection vulnerability (NoSQLi) in the Wakyma web applicatio...Non-relational SQL injection vulnerability (NoSQLi) in the Wakyma web application, specifically in the endpoint 'vets.wakyma.com/centro/equipo/empleado'. This vulnerability could allow an authenticated user to alter a GET request to the affected endpoint for the purpose of injecting special NoSQL commands. This would lead to the enumeration of sensitive employee data. |
2026-03-16 | |
| CVE-2026-3020 | 8.6 | HIGH | CWE-639 | 0.0% p13 | 6.02 | Identity based authorization bypass vulnerability (IDOR) that allows an attacker...Identity based authorization bypass vulnerability (IDOR) that allows an attacker to modify the data of a legitimate user account, such as changing the victim's email address, validating the new email address, and requesting a new password. This could allow them to take complete control of other users' legitimate accounts |
2026-03-16 | |
| CVE-2026-32778 | 2.9 | LOW | CWE-476 | 0.0% p2 | 2.03 | libexpat before 2.7.5 allows a NULL pointer dereference in the function setConte...libexpat before 2.7.5 allows a NULL pointer dereference in the function setContext on retry after an earlier ouf-of-memory condition. |
2026-03-16 | |
| CVE-2026-32777 | 4.0 | MEDIUM | CWE-835 | 0.0% p1 | 2.80 | libexpat before 2.7.5 allows an infinite loop while parsing DTD content.libexpat before 2.7.5 allows an infinite loop while parsing DTD content. |
2026-03-16 | |
| CVE-2026-32776 | 4.0 | MEDIUM | CWE-476 | 0.0% p2 | 2.80 | libexpat before 2.7.5 allows a NULL pointer dereference with empty external para...libexpat before 2.7.5 allows a NULL pointer dereference with empty external parameter entity content. |
2026-03-16 | |
| CVE-2026-32775 | 7.4 | HIGH | CWE-191 | 0.0% p4 | 5.18 | libexif through 0.6.25 has a flaw in decoding MakerNotes. If the exif_mnote_data...libexif through 0.6.25 has a flaw in decoding MakerNotes. If the exif_mnote_data_get_value function gets passed in a 0 size, the passed in-buffer would be overwritten due to an integer underflow. |
2026-03-16 | |
| CVE-2026-32774 | 5.3 | MEDIUM | CWE-79 | 0.0% p2 | 3.71 | Vulnogram 1.0.0 contains a stored cross-site scripting vulnerability in comment ...Vulnogram 1.0.0 contains a stored cross-site scripting vulnerability in comment hypertext handling that allows attackers to inject malicious scripts. Remote attackers can inject XSS payloads through comments to execute arbitrary JavaScript in victims' browsers. |
2026-03-16 | |
| CVE-2026-32772 | 3.4 | LOW | CWE-669 | 0.0% p9 | 2.38 | telnet in GNU inetutils through 2.7 allows servers to read arbitrary environment...telnet in GNU inetutils through 2.7 allows servers to read arbitrary environment variables from clients via NEW_ENVIRON SEND USERVAR. |
2026-03-16 | |
| CVE-2026-32732 | 0.0 | NONE | CWE-80 | 0.1% p19 | 0.00 | Lean 4 VS Code Extension is a Visual Studio Code extension for the Lean 4 proof ...Lean 4 VS Code Extension is a Visual Studio Code extension for the Lean 4 proof assistant. Projects that use @leanprover/unicode-input-component are vulnerable to an XSS exploit in 0.1.9 of the package and lower. The component re-inserted text in the input element back into the input element as unescaped HTML. The issue has been resolved in 0.2.0. |
2026-03-16 | |
| CVE-2026-32729 | 8.1 | HIGH | CWE-307 | 0.1% p17 | 5.67 | Runtipi is a personal homeserver orchestrator. Prior to 4.8.1, The Runtipi /api/...Runtipi is a personal homeserver orchestrator. Prior to 4.8.1, The Runtipi /api/auth/verify-totp endpoint does not enforce any rate limiting, attempt counting, or account lockout mechanism. An attacker who has obtained a user's valid credentials (via phishing, credential stuffing, or data breach) can brute-force the 6-digit TOTP code to completely bypass two-factor authentication. The TOTP verification session persists for 24 hours (default cache TTL), providing an excessive window during which the full 1,000,000-code keyspace (000000–999999) can be exhausted. At practical request rates (~500 req/s), the attack completes in approximately 33 minutes in the worst case. This vulnerability is fixed in 4.8.1. |
2026-03-16 | |
| CVE-2026-32724 | 5.3 | MEDIUM | CWE-416 | 0.0% p4 | 3.71 | PX4 autopilot is a flight control solution for drones. Prior to 1.17.0-rc1, a he...PX4 autopilot is a flight control solution for drones. Prior to 1.17.0-rc1, a heap-use-after-free is detected in the MavlinkShell::available() function. The issue is caused by a race condition between the MAVLink receiver thread (which handles shell creation/destruction) and the telemetry sender thread (which polls the shell for available output). The issue is remotely triggerable via MAVLink SERIAL_CONTROL messages (ID 126), which can be sent by an external ground station or automated script. This vulnerability is fixed in 1.17.0-rc1. |
2026-03-16 | |
| CVE-2026-32720 | 7.1 | HIGH | CWE-284 | 0.1% p18 | 4.97 | The CTFer.io Monitoring component is in charge of the collection, process and st...The CTFer.io Monitoring component is in charge of the collection, process and storage of various signals (i.e. logs, metrics and distributed traces). Prior to 0.2.1, due to a mis-written NetworkPolicy, a malicious actor can pivot from a component to any other namespace. This breaks the security-by-default property expected as part of the deployment program, leading to a potential lateral movement. This vulnerability is fixed in 0.2.1. |
2026-03-16 | |
| CVE-2026-32719 | 4.2 | MEDIUM | CWE-22 | 0.0% p12 | 2.94 | AnythingLLM is an application that turns pieces of content into context that any...AnythingLLM is an application that turns pieces of content into context that any LLM can use as references during chatting. In 1.11.1 and earlier, The ImportedPlugin.importCommunityItemFromUrl() function in server/utils/agents/imported.js downloads a ZIP file from a community hub URL and extracts it using AdmZip.extractAllTo() without validating file paths within the archive. This enables a Zip Slip path traversal attack that can lead to arbitrary code execution. |
2026-03-16 | |
| CVE-2026-32717 | 2.7 | LOW | CWE-863 | 0.0% p10 | 1.89 | AnythingLLM is an application that turns pieces of content into context that any...AnythingLLM is an application that turns pieces of content into context that any LLM can use as references during chatting. In 1.11.1 and earlier, in multi-user mode, AnythingLLM blocks suspended users on the normal JWT-backed session path, but it does not block them on the browser extension API key path. If a user already has a valid brx-... browser extension API key, that key continues to work after suspension. As a result, a suspended user can still access browser extension endpoints, read reachable workspace metadata, and continue upload or embed operations even though normal authenticated requests are rejected. |
2026-03-16 | |
| CVE-2026-32715 | 3.8 | LOW | CWE-863 | 0.0% p9 | 2.66 | AnythingLLM is an application that turns pieces of content into context that any...AnythingLLM is an application that turns pieces of content into context that any LLM can use as references during chatting. In 1.11.1 and earlier, The two generic system-preferences endpoints allow manager role access, while every other surface that touches the same settings is restricted to admin only. Because of this inconsistency, a manager can call the generic endpoints directly to read plaintext SQL database credentials and overwrite admin-only global settings such as the default system prompt and the Community Hub API key. |
2026-03-16 | |
| CVE-2026-32713 | 4.3 | MEDIUM | CWE-670 | 0.1% p24 | 3.01 | PX4 autopilot is a flight control solution for drones. Prior to 1.17.0-rc2, A lo...PX4 autopilot is a flight control solution for drones. Prior to 1.17.0-rc2, A logic error in the PX4 Autopilot MAVLink FTP session validation uses incorrect boolean logic (&& instead of ||), allowing BurstReadFile and WriteFile operations to proceed with invalid sessions or closed file descriptors. This enables an unauthenticated attacker to put the FTP subsystem into an inconsistent state, trigger operations on invalid file descriptors, and bypass session isolation checks. This vulnerability is fixed in 1.17.0-rc2. |
2026-03-16 | |
| CVE-2026-32709 | 5.4 | MEDIUM | CWE-22 | 0.0% p8 | 3.78 | PX4 autopilot is a flight control solution for drones. Prior to 1.17.0-rc2, An u...PX4 autopilot is a flight control solution for drones. Prior to 1.17.0-rc2, An unauthenticated path traversal vulnerability in the PX4 Autopilot MAVLink FTP implementation allows any MAVLink peer to read, write, create, delete, and rename arbitrary files on the flight controller filesystem without authentication. On NuttX targets, the FTP root directory is an empty string, meaning attacker-supplied paths are passed directly to filesystem syscalls with no prefix or sanitization for read operations. On POSIX targets (Linux companion computers, SITL), the write-path validation function unconditionally returns true, providing no protection. A TOCTOU race condition in the write validation on NuttX further allows bypassing the only existing guard. This vulnerability is fixed in 1.17.0-rc2. |
2026-03-16 | |
| CVE-2026-32708 | 7.8 | HIGH | CWE-121 | 0.0% p5 | 5.46 | PX4 autopilot is a flight control solution for drones. Prior to 1.17.0-rc2, the ...PX4 autopilot is a flight control solution for drones. Prior to 1.17.0-rc2, the Zenoh uORB subscriber allocates a stack VLA directly from the incoming payload length without bounds. A remote Zenoh publisher can send an oversized fragmented message to force an unbounded stack allocation and copy, causing a stack overflow and crash of the Zenoh bridge task. This vulnerability is fixed in 1.17.0-rc2. |
2026-03-16 | |
| CVE-2026-32707 | 5.2 | MEDIUM | CWE-121 | 0.0% p6 | 3.64 | PX4 autopilot is a flight control solution for drones. Prior to 1.17.0-rc2, tatt...PX4 autopilot is a flight control solution for drones. Prior to 1.17.0-rc2, tattu_can contains an unbounded memcpy in its multi-frame assembly loop, allowing stack memory overwrite when crafted CAN frames are processed. In deployments where tattu_can is enabled and running, a CAN-injection-capable attacker can trigger a crash (DoS) and memory corruption. This vulnerability is fixed in 1.17.0-rc2. |
2026-03-16 | |
| CVE-2026-32706 | 7.1 | HIGH | CWE-120 | 0.0% p4 | 4.97 | PX4 autopilot is a flight control solution for drones. Prior to 1.17.0-rc2, The ...PX4 autopilot is a flight control solution for drones. Prior to 1.17.0-rc2, The crsf_rc parser accepts an oversized variable-length known packet and copies it into a fixed 64-byte global buffer without a bounds check. In deployments where crsf_rc is enabled on a CRSF serial port, an adjacent/raw-serial attacker can trigger memory corruption and crash PX4. This vulnerability is fixed in 1.17.0-rc2. |
2026-03-16 | |
| CVE-2026-32705 | 6.8 | MEDIUM | CWE-121 | 0.0% p6 | 4.76 | PX4 autopilot is a flight control solution for drones. Prior to 1.17.0-rc2, the ...PX4 autopilot is a flight control solution for drones. Prior to 1.17.0-rc2, the BST telemetry probe writes a string terminator using a device-provided length without bounds. A malicious BST device can report an oversized dev_name_len, causing a stack overflow in the driver and crashing the task (or enabling code execution). This vulnerability is fixed in 1.17.0-rc2. |
2026-03-16 | |
| CVE-2026-32704 | 6.5 | MEDIUM | CWE-285 | 0.0% p11 | 4.55 | SiYuan is a personal knowledge management system. Prior to 3.6.1, POST /api/temp...SiYuan is a personal knowledge management system. Prior to 3.6.1, POST /api/template/renderSprig lacks model.CheckAdminRole, allowing any authenticated user to execute arbitrary SQL queries against the SiYuan workspace database and exfiltrate all note content, metadata, and custom attributes. This vulnerability is fixed in 3.6.1. |
2026-03-16 | |
| CVE-2026-32702 | 6.9 | MEDIUM | CWE-208 | 0.1% p17 | 4.83 | Cleanuparr is a tool for automating the cleanup of unwanted or blocked files in ...Cleanuparr is a tool for automating the cleanup of unwanted or blocked files in Sonarr, Radarr, and supported download clients like qBittorrent. From 2.7.0 to 2.8.0, the /api/auth/login endpoint contains a logic flaw that allows unauthenticated remote attackers to enumerate valid usernames by measuring the application's response time. It appears that the hashing function, which is the most time-consuming part of the process by design, occurs as part of the VerifyPassword function. With the short circuits occurring before the hashing function, a timing differential is introduced that exposes validity to the actor. This vulnerability is fixed in 2.8.1. |
2026-03-16 | |
| CVE-2026-32640 | 8.7 | HIGH | CWE-94 | 0.2% p41 | 6.10 | SimpleEval is a library for adding evaluatable expressions into python projects....SimpleEval is a library for adding evaluatable expressions into python projects. Prior to 1.0.5, objects (including modules) can leak dangerous modules through to direct access inside the sandbox. If the objects you've passed in as names to SimpleEval have modules or other disallowed / dangerous objects available as attrs. Additionally, dangerous functions or modules could be accessed by passing them as callbacks to other safe functions to call. The latest version 1.0.5 has this issue fixed. This vulnerability is fixed in 1.0.5. |
2026-03-16 | |
| CVE-2026-32635 | 8.6 | HIGH | CWE-79 | 0.1% p17 | 6.02 | Angular is a development platform for building mobile and desktop web applicatio...Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to 22.0.0-next.3, 21.2.4, 20.3.18, and 19.2.20, a Cross-Site Scripting (XSS) vulnerability has been identified in the Angular runtime and compiler. It occurs when the application uses a security-sensitive attribute (for example href on an anchor tag) together with Angular's ability to internationalize attributes. Enabling internationalization for the sensitive attribute by adding i18n-<attribute> name bypasses Angular's built-in sanitization mechanism, which when combined with a data binding to untrusted user-generated data can allow an attacker to inject a malicious script. This vulnerability is fixed in 22.0.0-next.3, 21.2.4, 20.3.18, and 19.2.20. |
2026-03-16 | |
| CVE-2026-32630 | 5.3 | MEDIUM | CWE-409 | 0.1% p17 | 3.71 | file-type detects the file type of a file, stream, or data. From 20.0.0 to 21.3....file-type detects the file type of a file, stream, or data. From 20.0.0 to 21.3.1, a crafted ZIP file can trigger excessive memory growth during type detection in file-type when using fileTypeFromBuffer(), fileTypeFromBlob(), or fileTypeFromFile(). The ZIP inflate output limit is enforced for stream-based detection, but not for known-size inputs. As a result, a small compressed ZIP can cause file-type to inflate and process a much larger payload while probing ZIP-based formats such as OOXML. This vulnerability is fixed in 21.3.2. |
2026-03-16 | |
| CVE-2026-32628 | 7.7 | HIGH | CWE-89 | 0.0% p11 | 5.39 | AnythingLLM is an application that turns pieces of content into context that any...AnythingLLM is an application that turns pieces of content into context that any LLM can use as references during chatting. In 1.11.1 and earlier, a SQL injection vulnerability in the built-in SQL Agent plugin allows any user who can invoke the agent to execute arbitrary SQL commands on connected databases. The getTableSchemaSql() method in all three database connectors (MySQL, PostgreSQL, MSSQL) constructs SQL queries using direct string concatenation of the table_name parameter without sanitization or parameterization. |
2026-03-16 | |
| CVE-2026-32627 | 8.7 | HIGH | CWE-295 | 0.0% p6 | 6.09 | cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library...cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library. Prior to 0.37.2, when a cpp-httplib client is configured with a proxy and set_follow_location(true), any HTTPS redirect it follows will have TLS certificate and hostname verification silently disabled on the new connection. The client will accept any certificate presented by the redirect target — expired, self-signed, or forged — without raising an error or notifying the application. A network attacker in a position to return a redirect response can fully intercept the follow-up HTTPS connection, including any credentials or session tokens in flight. This vulnerability is fixed in 0.37.2. |
2026-03-16 | |
| CVE-2026-32626 | 9.6 | CRITICAL | CWE-79 | 0.1% p18 | 6.72 | AnythingLLM is an application that turns pieces of content into context that any...AnythingLLM is an application that turns pieces of content into context that any LLM can use as references during chatting. In 1.11.1 and earlier, AnythingLLM Desktop contains a Streaming Phase XSS vulnerability in the chat rendering pipeline that escalates to Remote Code Execution on the host OS due to insecure Electron configuration. This works with default settings and requires no user interaction beyond normal chat usage. The custom markdown-it image renderer in frontend/src/utils/chat/markdown.js interpolates token.content directly into the alt attribute without HTML entity escaping. The PromptReply component renders this output via dangerouslySetInnerHTML without DOMPurify sanitization — unlike HistoricalMessage which correctly applies DOMPurify.sanitize(). |
2026-03-16 | |
| CVE-2026-32621 | 9.9 | CRITICAL | CWE-1321 | 0.0% p10 | 6.93 | Apollo Federation is an architecture for declaratively composing APIs into a uni...Apollo Federation is an architecture for declaratively composing APIs into a unified graph. Prior to 2.9.6, 2.10.5, 2.11.6, 2.12.3, and 2.13.2, a vulnerability exists in query plan execution within the gateway that may allow pollution of Object.prototype in certain scenarios. A malicious client may be able to pollute Object.prototype in gateway directly by crafting operations with field aliases and/or variable names that target prototype-inheritable properties. Alternatively, if a subgraph were to be compromised by a malicious actor, they may be able to pollute Object.prototype in gateway by crafting JSON response payloads that target prototype-inheritable properties. This vulnerability is fixed in 2.9.6, 2.10.5, 2.11.6, 2.12.3, and 2.13.2. |
2026-03-16 | |
| CVE-2026-32617 | 7.1 | HIGH | CWE-942 | 0.0% p3 | 4.97 | AnythingLLM is an application that turns pieces of content into context that any...AnythingLLM is an application that turns pieces of content into context that any LLM can use as references during chatting. In 1.11.1 and earlier, On default installations where no password or API key has been configured, all HTTP endpoints and the agent WebSocket lack authentication, and the server's CORS policy accepts any origin. AnythingLLM Desktop binds to 127.0.0.1 (loopback) by default. Modern browsers (Chrome, Edge, Firefox) implement Private Network Access (PNA). This explicitly blocks public websites from making requests to local IP addresses. Exploitation is only viable from within the same local network (LAN) due to browser-level blocking of public-to-private requests. |
2026-03-16 | |
| CVE-2026-32616 | 8.2 | HIGH | CWE-74 | 0.0% p11 | 5.74 | Pigeon is a message board/notepad/social system/blog. Prior to 1.0.201, the appl...Pigeon is a message board/notepad/social system/blog. Prior to 1.0.201, the application uses $_SERVER['HTTP_HOST'] without validation to construct email verification URLs in the register and resendmail flows. An attacker can manipulate the Host header in the HTTP request, causing the verification link sent to the user's email to point to an attacker-controlled domain. This can lead to account takeover by stealing the email verification token. This vulnerability is fixed in 1.0.201. |
2026-03-16 | |
| CVE-2026-32614 | 7.5 | HIGH | CWE-347 | 0.0% p0 | 5.25 | Go ShangMi (Commercial Cryptography) Library (GMSM) is a cryptographic library t...Go ShangMi (Commercial Cryptography) Library (GMSM) is a cryptographic library that covers the Chinese commercial cryptographic public algorithms SM2/SM3/SM4/SM9/ZUC. Prior to 0.41.1, the current SM9 decryption implementation contains an infinity-point ciphertext forgery vulnerability. The root cause is that, during decryption, the elliptic-curve point C1 in the ciphertext is only deserialized and checked to be on the curve, but the implementation does not explicitly reject the point at infinity. In the current implementation, an attacker can construct C1 as the point at infinity, causing the bilinear pairing result to degenerate into the identity element in the GT group. As a result, a critical part of the key derivation input becomes a predictable constant. An attacker who only knows the target user's UID can derive the decryption key material and then forge a ciphertext that passes the integrity check. This vulnerability is fixed in 0.41.1. |
2026-03-16 | |
| CVE-2026-32600 | 8.2 | HIGH | CWE-354 | 0.0% p3 | 5.74 | xml-security is a library that implements XML signatures and encryption. Prior t...xml-security is a library that implements XML signatures and encryption. Prior to versions 2.3.1 and 1.13.9, XML nodes encrypted with either aes-128-gcm, aes-192-gcm, or aes-256-gcm lack validation of the authentication tag length. An attacker can use this to brute-force an authentication tag, recover the GHASH key, and decrypt the encrypted nodes. It also allows to forge arbitrary ciphertexts without knowing the encryption key. This vulnerability is fixed in 2.3.1 and 1.13.9. |
2026-03-16 | |
| CVE-2026-32594 | 6.9 | MEDIUM | CWE-306 | 0.1% p29 | 4.83 | Parse Server is an open source backend that can be deployed to any infrastructur...Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 8.6.40 and 9.6.0-alpha.14, the GraphQL WebSocket endpoint for subscriptions does not pass requests through the Express middleware chain that enforces authentication, introspection control, and query complexity limits. An attacker can connect to the WebSocket endpoint and execute GraphQL operations without providing a valid application or API key, access the GraphQL schema via introspection even when public introspection is disabled, and send arbitrarily complex queries that bypass configured complexity limits. This vulnerability is fixed in 8.6.40 and 9.6.0-alpha.14. |
2026-03-16 | |
| CVE-2026-32314 | 8.7 | HIGH | CWE-248 | 0.1% p19 | 6.09 | Yamux is a stream multiplexer over reliable, ordered connections such as TCP/IP....Yamux is a stream multiplexer over reliable, ordered connections such as TCP/IP. Prior to 0.13.10, the Rust implementation of Yamux can panic when processing a crafted inbound Data frame that sets SYN and uses a body length greater than DEFAULT_CREDIT (e.g. 262145). On the first packet of a new inbound stream, stream state is created and a receiver is queued before oversized-body validation completes. When validation fails, the temporary stream is dropped and cleanup may call remove(...).expect("stream not found"), triggering a panic in the connection state machine. This is remotely reachable over a normal Yamux session and does not require authentication. This vulnerability is fixed in 0.13.10. |
2026-03-16 | |
| CVE-2026-32313 | 8.2 | HIGH | CWE-354 | 0.0% p10 | 5.74 | xmlseclibs is a library written in PHP for working with XML Encryption and Signa...xmlseclibs is a library written in PHP for working with XML Encryption and Signatures. Prior to 3.1.5, XML nodes encrypted with either aes-128-gcm, aes-192-gcm, or aes-256-gcm lack validation of the authentication tag length. An attacker can use this to brute-force an authentication tag, recover the GHASH key, and decrypt the encrypted nodes. It also allows to forge arbitrary ciphertexts without knowing the encryption key. This vulnerability is fixed in 3.1.5. |
2026-03-16 | |
| CVE-2026-31386 | 8.6 | HIGH | CWE-78 | 0.2% p45 | 6.03 | OpenLiteSpeed and LSWS Enterprise provided by LiteSpeed Technologies contain an ...OpenLiteSpeed and LSWS Enterprise provided by LiteSpeed Technologies contain an OS command injection vulnerability. An arbitrary OS command may be executed by an attacker with the administrative privilege. |
2026-03-16 | |
| CVE-2026-2578 | 4.3 | MEDIUM | CWE-201 | 0.0% p9 | 3.01 | Mattermost versions 11.3.x <= 11.3.0 fail to preserve the redacted state of burn...Mattermost versions 11.3.x <= 11.3.0 fail to preserve the redacted state of burn-on-read posts during deletion which allows channel members to access unrevealed burn-on-read message contents via the WebSocket post deletion event.. Mattermost Advisory ID: MMSA-2026-00579 |
2026-03-16 | |
| CVE-2026-2476 | 7.6 | HIGH | CWE-200 | 0.0% p8 | 5.32 | Mattermost Plugins versions <=2.0.3.0 fail to properly mask sensitive configurat...Mattermost Plugins versions <=2.0.3.0 fail to properly mask sensitive configuration values which allows an attacker with access to support packets to obtain original plugin settings via exported configuration data. Mattermost Advisory ID: MMSA-2026-00606 |
2026-03-16 | |
| CVE-2026-2463 | 4.3 | MEDIUM | CWE-862 | 0.0% p6 | 3.01 | Mattermost versions 11.3.x <= 11.3.0, 11.2.x <= 11.2.2, 10.11.x <= 10.11.10 fail...Mattermost versions 11.3.x <= 11.3.0, 11.2.x <= 11.2.2, 10.11.x <= 10.11.10 fail to filter invite IDs based on user permissions, which allows regular users to bypass access control restrictions and register unauthorized accounts via leaked invite IDs during team creation.. Mattermost Advisory ID: MMSA-2025-00565 |
2026-03-16 | |
| CVE-2026-2462 | 6.6 | MEDIUM | CWE-863 | 0.2% p39 | 4.63 | Mattermost versions 11.3.x <= 11.3.0, 11.2.x <= 11.2.2, 10.11.x <= 10.11.10 fail...Mattermost versions 11.3.x <= 11.3.0, 11.2.x <= 11.2.2, 10.11.x <= 10.11.10 fail to restrict plugin installation on CI test instances with default admin credentials which allows an unauthenticated attacker to achieve remote code execution and exfiltrate sensitive configuration data including AWS and SMTP credentials via uploading a malicious plugin after changing the import directory. Mattermost Advisory ID: MMSA-2025-00528 |
2026-03-16 | |
| CVE-2026-2461 | 4.3 | MEDIUM | CWE-639 | 0.0% p8 | 3.01 | Mattermost Plugins versions <=11.3 11.0.3 11.2.2 10.10.11.0 fail to implement au...Mattermost Plugins versions <=11.3 11.0.3 11.2.2 10.10.11.0 fail to implement authorisation checks on comment block modifications, which allows an authorised attacker with editor permission to modify comments created by other board members. Mattermost Advisory ID: MMSA-2025-00559 |
2026-03-16 | |
| CVE-2026-2458 | 4.3 | MEDIUM | CWE-862 | 0.0% p8 | 3.01 | Mattermost versions 11.3.x <= 11.3.0, 11.2.x <= 11.2.2, 10.11.x <= 10.11.10 fail...Mattermost versions 11.3.x <= 11.3.0, 11.2.x <= 11.2.2, 10.11.x <= 10.11.10 fail to properly validate team membership when searching channels which allows a removed team member to enumerate all public channels within a private team via the channel search API endpoint.. Mattermost Advisory ID: MMSA-2025-00568 |
2026-03-16 | |
| CVE-2026-2457 | 4.3 | MEDIUM | CWE-346 | 0.0% p3 | 3.01 | Mattermost versions 11.3.x <= 11.3.0, 11.2.x <= 11.2.2, 10.11.x <= 10.11.10 fail...Mattermost versions 11.3.x <= 11.3.0, 11.2.x <= 11.2.2, 10.11.x <= 10.11.10 fail to sanitize client-supplied post metadata which allows an authenticated attacker to spoof permalink embeds impersonating other users via crafted PUT requests to the post update API endpoint.. Mattermost Advisory ID: MMSA-2025-00569 |
2026-03-16 | |
| CVE-2026-2456 | 5.3 | MEDIUM | CWE-789 | 0.0% p10 | 3.71 | Mattermost versions 11.3.x <= 11.3.0, 11.2.x <= 11.2.2, 10.11.x <= 10.11.10 Matt...Mattermost versions 11.3.x <= 11.3.0, 11.2.x <= 11.2.2, 10.11.x <= 10.11.10 Mattermost fails to limit the size of responses from integration action endpoints, which allows an authenticated attacker to cause server memory exhaustion and denial of service via a malicious integration server that returns an arbitrarily large response when a user clicks an interactive message button.. Mattermost Advisory ID: MMSA-2026-00571 |
2026-03-16 | |
| CVE-2026-2326 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This can...Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage. |
2026-03-16 | |
| CVE-2026-2233 | 5.3 | MEDIUM | CWE-862 | 0.1% p15 | 3.71 | The User Frontend: AI Powered Frontend Posting, User Directory, Profile, Members...The User Frontend: AI Powered Frontend Posting, User Directory, Profile, Membership & User Registration plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the draft_post() function in all versions up to, and including, 4.2.8. This makes it possible for unauthenticated attackers to modify arbitrary posts (e.g. unpublish published posts and overwrite the contents) via the 'post_id' parameter. |
2026-03-16 | |
| CVE-2026-28522 | 7.1 | HIGH | CWE-476 | 0.0% p0 | 4.97 | arduino-TuyaOpen before version 1.2.1 contains a null pointer dereference vulner...arduino-TuyaOpen before version 1.2.1 contains a null pointer dereference vulnerability in the WiFiUDP component. An attacker on the same local area network can send a large volume of malicious UDP packets to cause memory exhaustion on the device, triggering a null pointer dereference and resulting in a denial-of-service condition. |
2026-03-16 | |
| CVE-2026-28521 | 7.0 | HIGH | CWE-125 | 0.0% p0 | 4.90 | arduino-TuyaOpen before version 1.2.1 contains an out-of-bounds memory read vuln...arduino-TuyaOpen before version 1.2.1 contains an out-of-bounds memory read vulnerability in the TuyaIoT component. An attacker who hijacks or controls the Tuya cloud service can issue malicious DP event data to victim devices, causing out-of-bounds memory access that may result in information disclosure or a denial-of-service condition. |
2026-03-16 | |
| CVE-2026-28520 | 8.6 | HIGH | CWE-193 | 0.0% p0 | 6.02 | arduino-TuyaOpen before version 1.2.1 contains a single-byte buffer overflow vul...arduino-TuyaOpen before version 1.2.1 contains a single-byte buffer overflow vulnerability in the WiFiMulti component. When the victim's smart hardware connects to an attacker-controlled AP hotspot, the attacker can exploit the overflow to execute arbitrary code on the affected embedded device. |
2026-03-16 | |
| CVE-2026-28519 | 8.7 | HIGH | CWE-122 | 0.0% p0 | 6.09 | arduino-TuyaOpen before version 1.2.1 contains a heap-based buffer overflow vuln...arduino-TuyaOpen before version 1.2.1 contains a heap-based buffer overflow vulnerability in the DnsServer component. An attacker on the same local area network who controls the LAN DNS server can send malicious DNS responses to overflow the heap buffer, potentially allowing execution of arbitrary code on affected embedded devices. |
2026-03-16 | |
| CVE-2026-26246 | 4.3 | MEDIUM | CWE-789 | 0.0% p13 | 3.01 | Mattermost versions 11.3.x <= 11.3.0, 11.2.x <= 11.2.2, 10.11.x <= 10.11.10 fail...Mattermost versions 11.3.x <= 11.3.0, 11.2.x <= 11.2.2, 10.11.x <= 10.11.10 fail to bound memory allocation when processing PSD image files which allows an authenticated attacker to cause server memory exhaustion and denial of service via uploading a specially crafted PSD file. Mattermost Advisory ID: MMSA-2026-00572 |
2026-03-16 | |
| CVE-2026-26133 | 7.1 | HIGH | CWE-77 | 0.1% p18 | 4.97 | AI command injection in M365 Copilot allows an unauthorized attacker to disclose...AI command injection in M365 Copilot allows an unauthorized attacker to disclose information over a network. |
2026-03-16 | |
| CVE-2026-25783 | 4.3 | MEDIUM | CWE-1287 | 0.1% p21 | 3.01 | Mattermost versions 11.3.x <= 11.3.0, 11.2.x <= 11.2.2, 10.11.x <= 10.11.10 fail...Mattermost versions 11.3.x <= 11.3.0, 11.2.x <= 11.2.2, 10.11.x <= 10.11.10 fail to properly validate User-Agent header tokens which allows an authenticated attacker to cause a request panic via a specially crafted User-Agent header. Mattermost Advisory ID: MMSA-2026-00586 |
2026-03-16 | |
| CVE-2026-25780 | 4.3 | MEDIUM | CWE-789 | 0.0% p13 | 3.01 | Mattermost versions 11.3.x <= 11.3.0, 11.2.x <= 11.2.2, 10.11.x <= 10.11.10 fail...Mattermost versions 11.3.x <= 11.3.0, 11.2.x <= 11.2.2, 10.11.x <= 10.11.10 fail to bound memory allocation when processing DOC files which allows an authenticated attacker to cause server memory exhaustion and denial of service via uploading a specially crafted DOC file.. Mattermost Advisory ID: MMSA-2026-00581 |
2026-03-16 | |
| CVE-2026-25083 | 8.7 | HIGH | CWE-862 | 0.0% p14 | 6.09 | GROWI OpenAI thread/message API endpoints do not perform authorization. Affected...GROWI OpenAI thread/message API endpoints do not perform authorization. Affected are v7.4.5 and earlier versions. A logged-in user who knows a shared AI assistant's identifier may view and/or tamper the other user's threads/messages. |
2026-03-16 | |
| CVE-2026-24458 | 7.5 | HIGH | CWE-770 | 0.1% p17 | 5.25 | Mattermost versions 11.3.x <= 11.3.0, 11.2.x <= 11.2.2, 10.11.x <= 10.11.10 fail...Mattermost versions 11.3.x <= 11.3.0, 11.2.x <= 11.2.2, 10.11.x <= 10.11.10 fail to properly handle very long passwords, which allows an attacker to overload the server CPU and memory via executing login attempts with multi-megabyte passwords. Mattermost Advisory ID: MMSA-2026-00587 |
2026-03-16 | |
| CVE-2026-21005 | 7.1 | HIGH | CWE-22 | 0.0% p7 | 4.97 | Path traversal in Smart Switch prior to version 3.7.69.15 allows adjacent attack...Path traversal in Smart Switch prior to version 3.7.69.15 allows adjacent attackers to overwrite arbitrary files with Smart Switch privilege. |
2026-03-16 | |
| CVE-2026-21004 | 6.9 | MEDIUM | CWE-287 | 0.1% p16 | 4.83 | Improper authentication in Smart Switch prior to version 3.7.69.15 allows adjace...Improper authentication in Smart Switch prior to version 3.7.69.15 allows adjacent attackers to trigger a denial of service. |
2026-03-16 | |
| CVE-2026-21002 | 5.9 | MEDIUM | CWE-347 | 0.0% p0 | 4.13 | Improper verification of cryptographic signature in Galaxy Store prior to versio...Improper verification of cryptographic signature in Galaxy Store prior to version 4.6.03.8 allows local attacker to install arbitrary application. |
2026-03-16 | |
| CVE-2026-21001 | 5.9 | MEDIUM | CWE-22 | 0.0% p5 | 4.13 | Path traversal in Galaxy Store prior to version 4.6.03.8 allows local attacker t...Path traversal in Galaxy Store prior to version 4.6.03.8 allows local attacker to create file with Galaxy Store privilege. |
2026-03-16 | |
| CVE-2026-21000 | 7.0 | HIGH | CWE-22 | 0.0% p5 | 4.90 | Improper access control in Galaxy Store prior to version 4.6.03.8 allows local a...Improper access control in Galaxy Store prior to version 4.6.03.8 allows local attacker to create file with Galaxy Store privilege. |
2026-03-16 | |
| CVE-2026-20999 | 7.1 | HIGH | CWE-294 | 0.1% p35 | 4.97 | Authentication bypass by replay in Smart Switch prior to version 3.7.69.15 allow...Authentication bypass by replay in Smart Switch prior to version 3.7.69.15 allows remote attackers to trigger privileged functions. |
2026-03-16 | |
| CVE-2026-20998 | 7.1 | HIGH | NVD-CWE-noinfo | 0.3% p48 | 4.98 | Improper authentication in Smart Switch prior to version 3.7.69.15 allows remote...Improper authentication in Smart Switch prior to version 3.7.69.15 allows remote attackers to bypass authentication. |
2026-03-16 | |
| CVE-2026-20997 | 5.3 | MEDIUM | CWE-347 | 0.1% p28 | 3.71 | Improper verification of cryptographic signature in Smart Switch prior to versio...Improper verification of cryptographic signature in Smart Switch prior to version 3.7.69.15 allows remote attackers to potentially bypass authentication. |
2026-03-16 | |
| CVE-2026-20996 | 7.1 | HIGH | CWE-327 | 0.0% p10 | 4.97 | Use of a broken or risky cryptographic algorithm in Smart Switch prior to versio...Use of a broken or risky cryptographic algorithm in Smart Switch prior to version 3.7.69.15 allows remote attackers to configure a downgraded scheme for authentication. |
2026-03-16 | |
| CVE-2026-20995 | 5.3 | MEDIUM | CWE-306 | 0.1% p18 | 3.71 | Exposure of sensitive functionality to an unauthorized actor in Smart Switch pri...Exposure of sensitive functionality to an unauthorized actor in Smart Switch prior to version 3.7.69.15 allows remote attackers to set a specific configuration. |
2026-03-16 | |
| CVE-2026-20994 | 7.0 | HIGH | N/A | 0.3% p49 | 4.91 | URL redirection in Samsung Account prior to version 15.5.01.1 allows remote atta...URL redirection in Samsung Account prior to version 15.5.01.1 allows remote attackers to potentially get access token. |
2026-03-16 | |
| CVE-2026-20993 | 4.8 | MEDIUM | NVD-CWE-Other | 0.0% p1 | 3.36 | Improper export of android application components in Samsung Assistant prior to ...Improper export of android application components in Samsung Assistant prior to version 9.3.10.7 allows local attacker to access saved information. |
2026-03-16 | |
| CVE-2026-20992 | 4.8 | MEDIUM | CWE-863 | 0.0% p3 | 3.36 | Improper authorization in Settings prior to SMR Mar-2026 Release 1 allows local ...Improper authorization in Settings prior to SMR Mar-2026 Release 1 allows local attacker to disable configuring the background data usage of application. |
2026-03-16 | |
| CVE-2026-20991 | 6.7 | MEDIUM | NVD-CWE-noinfo | 0.0% p3 | 4.69 | Improper privilege management in ThemeManager prior to SMR Mar-2026 Release 1 al...Improper privilege management in ThemeManager prior to SMR Mar-2026 Release 1 allows local privileged attackers to reuse trial contents. |
2026-03-16 | |
| CVE-2026-20990 | 8.4 | HIGH | NVD-CWE-Other | 0.0% p7 | 5.88 | Improper export of android application components in Secure Folder prior to SMR ...Improper export of android application components in Secure Folder prior to SMR Mar-2026 Release 1 allows local attackers to launch arbitrary activity with Secure Folder privilege. |
2026-03-16 | |
| CVE-2026-20989 | 5.1 | MEDIUM | CWE-347 | 0.0% p0 | 3.57 | Improper verification of cryptographic signature in Font Settings prior to SMR M...Improper verification of cryptographic signature in Font Settings prior to SMR Mar-2026 Release 1 allows physical attackers to use custom font. |
2026-03-16 | |
| CVE-2026-20988 | 6.8 | MEDIUM | NVD-CWE-Other | 0.0% p2 | 4.76 | Improper verification of intent by broadcast receiver in Settings prior to SMR M...Improper verification of intent by broadcast receiver in Settings prior to SMR Mar-2026 Release 1 allows local attacker to launch arbitrary activity with Settings privilege. User interaction is required for triggering this vulnerability. |
2026-03-16 | |
| CVE-2026-1948 | 4.3 | MEDIUM | CWE-862 | 0.0% p9 | 3.01 | The NEX-Forms – Ultimate Forms Plugin for WordPress plugin for WordPress is vuln...The NEX-Forms – Ultimate Forms Plugin for WordPress plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the deactivate_license() function in all versions up to, and including, 9.1.9. This makes it possible for authenticated attackers, with Subscriber-level access and above, to to deactivate the plugin license. |
2026-03-16 | |
| CVE-2026-1947 | 7.5 | HIGH | CWE-639 | 0.0% p2 | 5.25 | The NEX-Forms – Ultimate Forms Plugin for WordPress plugin for WordPress is vuln...The NEX-Forms – Ultimate Forms Plugin for WordPress plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 9.1.9 via the submit_nex_form() function due to missing validation on a user controlled key. This makes it possible for unauthenticated attackers to to overwrite arbitrary form entries via the 'nf_set_entry_update_id' parameter. |
2026-03-16 | |
| CVE-2026-1883 | 4.3 | MEDIUM | CWE-639 | 0.0% p1 | 3.01 | The Wicked Folders – Folder Organizer for Pages, Posts, and Custom Post Types pl...The Wicked Folders – Folder Organizer for Pages, Posts, and Custom Post Types plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 4.1.0 via the delete_folders() function due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Contributor-level access and above, to delete arbitrary folders created by other users. |
2026-03-16 | |
| CVE-2026-1870 | 5.3 | MEDIUM | CWE-862 | 0.0% p10 | 3.71 | The Thim Kit for Elementor – Pre-built Templates & Widgets for Elementor plugin ...The Thim Kit for Elementor – Pre-built Templates & Widgets for Elementor plugin for WordPress is vulnerable to unauthorized access of data due to a missing validation checks on the 'thim-ekit/archive-course/get-courses' REST endpoint callback function in all versions up to, and including, 1.3.7. This makes it possible for unauthenticated attackers to disclose private or draft LearnPress course content by supplying post_status in the params_url payload. |
2026-03-16 | |
| CVE-2026-0977 | 5.1 | MEDIUM | CWE-284 | 0.0% p1 | 3.57 | IBM CICS Transaction Gateway for Multiplatforms 9.3 and 10.1 could allow a user ...IBM CICS Transaction Gateway for Multiplatforms 9.3 and 10.1 could allow a user to transfer or view files due to improper access controls. |
2026-03-16 | |
| CVE-2026-0849 | 3.8 | LOW | CWE-120 | 0.0% p5 | 2.66 | Malformed ATAES132A responses with an oversized length field overflow a 52-byte ...Malformed ATAES132A responses with an oversized length field overflow a 52-byte stack buffer in the Zephyr crypto driver, allowing a compromised device or bus attacker to corrupt kernel memory and potentially hijack execution. |
2026-03-16 | |
| CVE-2026-0639 | 3.3 | LOW | CWE-401 | 0.0% p2 | 2.31 | in OpenHarmony v6.0 and prior versions allow a local attacker case DOS through m...in OpenHarmony v6.0 and prior versions allow a local attacker case DOS through missing release of memory. |
2026-03-16 | |
| CVE-2026-0385 | 5.0 | MEDIUM | CWE-451 | 0.1% p15 | 3.50 | Microsoft Edge (Chromium-based) for Android Spoofing VulnerabilityMicrosoft Edge (Chromium-based) for Android Spoofing Vulnerability |
2026-03-16 | |
| CVE-2025-71264 | 3.7 | LOW | CWE-125 | 0.0% p13 | 2.59 | Mumble before 1.6.870 is prone to an out-of-bounds array access, which may resul...Mumble before 1.6.870 is prone to an out-of-bounds array access, which may result in denial of service (client crash). |
2026-03-16 | |
| CVE-2025-6969 | 5.0 | MEDIUM | CWE-20 | 0.0% p5 | 3.50 | in OpenHarmony v5.1.0 and prior versions allow a local attacker cause DOS throug...in OpenHarmony v5.1.0 and prior versions allow a local attacker cause DOS through improper input. |
2026-03-16 | |
| CVE-2025-52648 | 4.8 | MEDIUM | CWE-347 | 0.0% p1 | 3.36 | HCL AION is affected by a vulnerability where offering images are not digitally ...HCL AION is affected by a vulnerability where offering images are not digitally signed. Lack of image signing may allow the use of unverified or tampered images, potentially leading to security risks such as integrity compromise or unintended behavior in the system |
2026-03-16 | |
| CVE-2025-52638 | 5.6 | MEDIUM | CWE-345 | 0.0% p3 | 3.92 | HCL AION is affected by a vulnerability where generated containers may execute b...HCL AION is affected by a vulnerability where generated containers may execute binaries with root-level privileges. Running containers with root privileges may increase the potential security risk, as it grants elevated permissions within the container environment. Aligning container configurations with security best practices requires minimizing privileges and avoiding root-level execution wherever possible. |
2026-03-16 | |
| CVE-2025-52637 | 4.5 | MEDIUM | CWE-89 | 0.1% p18 | 3.15 | HCL AION is affected by a vulnerability where certain offering configurations ma...HCL AION is affected by a vulnerability where certain offering configurations may permit execution of potentially harmful SQL queries. Improper validation or restrictions on query execution could expose the system to unintended database interactions or limited information exposure under specific conditions. |
2026-03-16 | |
| CVE-2025-52458 | 5.5 | MEDIUM | CWE-787 | 0.0% p2 | 3.85 | in OpenHarmony v5.1.0 and prior versions allow a local attacker arbitrary code e...in OpenHarmony v5.1.0 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write. This vulnerability can be exploited only in restricted scenarios. |
2026-03-16 | |
| CVE-2025-41432 | 5.5 | MEDIUM | CWE-787 | 0.0% p2 | 3.85 | in OpenHarmony v5.1.0 and prior versions allow a local attacker arbitrary code e...in OpenHarmony v5.1.0 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write. This vulnerability can be exploited only in restricted scenarios. |
2026-03-16 | |
| CVE-2025-26474 | 3.3 | LOW | CWE-20 | 0.0% p5 | 2.31 | in OpenHarmony v5.0.3 and prior versions allow a local attacker cause informatio...in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information improper input. This vulnerability can be exploited only in restricted scenarios. |
2026-03-16 | |
| CVE-2025-25277 | 6.3 | MEDIUM | CWE-843 | 0.0% p2 | 4.41 | in OpenHarmony v5.1.0 and prior versions allow a local attacker arbitrary code e...in OpenHarmony v5.1.0 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through using incompatible type. This vulnerability can be exploited only in restricted scenarios. |
2026-03-16 | |
| CVE-2025-15554 | 6.0 | MEDIUM | CWE-525 | 0.0% p2 | 4.20 | Browser caching of LAPS passwords in Truesec’s LAPSWebUI before version 2.4 allo...Browser caching of LAPS passwords in Truesec’s LAPSWebUI before version 2.4 allows an attacker with access to a workstation to escalate their privileges via disclosure of local admin passwords. |
2026-03-16 | |
| CVE-2025-15553 | 6.0 | MEDIUM | CWE-613 | 0.0% p2 | 4.20 | Non-working logout functionality in Truesec’s LAPSWebUI before version 2.4 allow...Non-working logout functionality in Truesec’s LAPSWebUI before version 2.4 allows an attacker with access to a workstation to escalate their privileges via disclosure of local admin password. |
2026-03-16 | |
| CVE-2025-15552 | 6.0 | MEDIUM | CWE-613 | 0.0% p2 | 4.20 | Insufficient Session Expiration in Truesec’s LAPSWebUI before version 2.4 allows...Insufficient Session Expiration in Truesec’s LAPSWebUI before version 2.4 allows an attacker with access to a workstation to escalate their privileges via disclosure of local admin password. |
2026-03-16 | |
| CVE-2025-14287 | 8.8 | HIGH | CWE-94 | 0.3% p50 | 6.17 | A command injection vulnerability exists in mlflow/mlflow versions before v3.7.0...A command injection vulnerability exists in mlflow/mlflow versions before v3.7.0, specifically in the `mlflow/sagemaker/__init__.py` file at lines 161-167. The vulnerability arises from the direct interpolation of user-supplied container image names into shell commands without proper sanitization, which are then executed using `os.system()`. This allows attackers to execute arbitrary commands by supplying malicious input through the `--container` parameter of the CLI. The issue affects environments where MLflow is used, including development setups, CI/CD pipelines, and cloud deployments. |
2026-03-16 | |
| CVE-2025-13460 | 5.3 | MEDIUM | CWE-204 | 0.0% p11 | 3.71 | IBM Aspera Console 3.3.0 through 3.4.8 could allow an attacker to enumerate user...IBM Aspera Console 3.3.0 through 3.4.8 could allow an attacker to enumerate usernames due to an observable response discrepancy. |
2026-03-16 | |
| CVE-2025-13459 | 2.7 | LOW | CWE-841 | 0.1% p17 | 1.89 | IBM Aspera Console 3.3.0 through 3.4.8 could allow a privileged user to cause a ...IBM Aspera Console 3.3.0 through 3.4.8 could allow a privileged user to cause a denial of service due to improper enforcement of behavioral workflow. |
2026-03-16 | |
| CVE-2025-13212 | 5.3 | MEDIUM | CWE-799 | 0.1% p16 | 3.71 | IBM Aspera Console 3.3.0 through 3.4.8 could allow an authenticated user to caus...IBM Aspera Console 3.3.0 through 3.4.8 could allow an authenticated user to cause a denial of service in the email service due to improper control of interaction frequency. |
2026-03-16 | |
| CVE-2025-12736 | 6.5 | MEDIUM | CWE-908 | 0.0% p2 | 4.55 | in OpenHarmony v5.0.3 and prior versions allow a local attacker case sensitive i...in OpenHarmony v5.0.3 and prior versions allow a local attacker case sensitive information leak through use of uninitialized resource. |
2026-03-16 | |
| CVE-2017-20224 | 9.3 | CRITICAL | CWE-434 | 0.4% p58 | 6.52 | Telesquare SKT LTE Router SDT-CS3B1 version 1.2.0 contains an arbitrary file upl...Telesquare SKT LTE Router SDT-CS3B1 version 1.2.0 contains an arbitrary file upload vulnerability that allows unauthenticated attackers to upload malicious content by exploiting enabled WebDAV HTTP methods. Attackers can use PUT, DELETE, MKCOL, MOVE, COPY, and PROPPATCH methods to upload executable code, delete files, or manipulate server content for remote code execution or denial of service. |
2026-03-16 | |
| CVE-2017-20223 | 9.3 | CRITICAL | CWE-639 | 0.1% p22 | 6.51 | Telesquare SKT LTE Router SDT-CS3B1 firmware version 1.2.0 contains an insecure ...Telesquare SKT LTE Router SDT-CS3B1 firmware version 1.2.0 contains an insecure direct object reference vulnerability that allows attackers to bypass authorization and access resources by manipulating user-supplied input parameters. Attackers can directly reference objects in the system to retrieve sensitive information and access functionalities without proper access controls. |
2026-03-16 | |
| CVE-2017-20222 | 8.7 | HIGH | CWE-306 | 0.2% p40 | 6.10 | Telesquare SKT LTE Router SDT-CS3B1 software version 1.2.0 contains an unauthent...Telesquare SKT LTE Router SDT-CS3B1 software version 1.2.0 contains an unauthenticated remote reboot vulnerability that allows attackers to trigger device reboot without authentication. Attackers can send POST requests to the lte.cgi endpoint with the Command=Reboot parameter to cause denial of service by forcing the router to restart. |
2026-03-16 | |
| CVE-2017-20221 | 5.3 | MEDIUM | CWE-352 | 0.0% p7 | 3.71 | Telesquare SKT LTE Router SDT-CS3B1 version 1.2.0 contains a cross-site request ...Telesquare SKT LTE Router SDT-CS3B1 version 1.2.0 contains a cross-site request forgery vulnerability that allows authenticated attackers to execute arbitrary system commands by exploiting missing request validation. Attackers can craft malicious web pages that perform administrative actions when visited by logged-in users, enabling command execution with router privileges. |
2026-03-16 | |
| CVE-2017-20220 | 8.7 | HIGH | CWE-306 | 0.2% p44 | 6.10 | Serviio PRO 1.8 contains an improper access control vulnerability in the Configu...Serviio PRO 1.8 contains an improper access control vulnerability in the Configuration REST API that allows unauthenticated attackers to change the mediabrowser login password. Attackers can send specially crafted requests to the REST API endpoints to modify credentials without authentication. |
2026-03-16 | |
| CVE-2017-20219 | 5.1 | MEDIUM | CWE-79 | 0.0% p10 | 3.57 | Serviio PRO 1.8 DLNA Media Streaming Server contains a DOM-based cross-site scri...Serviio PRO 1.8 DLNA Media Streaming Server contains a DOM-based cross-site scripting vulnerability that allows attackers to execute arbitrary HTML and script code by injecting malicious payloads. Attackers can craft URLs with malicious input that is read from document.location and passed to document.write() in the mediabrowser component to execute code in a user's browser context. |
2026-03-16 | |
| CVE-2017-20218 | 8.5 | HIGH | CWE-428 | 0.0% p2 | 5.95 | Serviio PRO 1.8 contains an unquoted search path vulnerability in the Windows se...Serviio PRO 1.8 contains an unquoted search path vulnerability in the Windows service that allows local users to execute arbitrary code with elevated privileges by placing malicious executables in the system root path. Additionally, improper directory permissions with full access for the Users group allow authenticated users to replace the executable file with arbitrary binaries, enabling privilege escalation during service startup or system reboot. |
2026-03-16 | |
| CVE-2017-20217 | 8.7 | HIGH | CWE-306 | 0.1% p30 | 6.09 | Serviio PRO 1.8 contains an information disclosure vulnerability due to improper...Serviio PRO 1.8 contains an information disclosure vulnerability due to improper access control enforcement in the Configuration REST API that allows unauthenticated attackers to access sensitive information. Remote attackers can send specially crafted requests to the REST API endpoints to retrieve potentially sensitive configuration data without authentication. |
2026-03-16 | |
| CVE-2016-20036 | 5.1 | MEDIUM | CWE-79 | 0.0% p8 | 3.57 | Wowza Streaming Engine 4.5.0 contains multiple reflected cross-site scripting vu...Wowza Streaming Engine 4.5.0 contains multiple reflected cross-site scripting vulnerabilities in the enginemanager interface where input passed through various parameters is not properly sanitized before being returned to users. Attackers can inject malicious script code through parameters like appName, vhost, uiAppType, and wowzaCloudDestinationType in multiple endpoints to execute arbitrary HTML and JavaScript in a user's browser session. |
2026-03-16 | |
| CVE-2016-20035 | 6.9 | MEDIUM | CWE-352 | 0.0% p10 | 4.83 | Wowza Streaming Engine 4.5.0 contains a cross-site request forgery vulnerability...Wowza Streaming Engine 4.5.0 contains a cross-site request forgery vulnerability that allows attackers to perform administrative actions by crafting malicious web pages. Attackers can trick logged-in administrators into visiting a malicious site that submits POST requests to the user edit endpoint to create new admin accounts with arbitrary credentials. |
2026-03-16 | |
| CVE-2016-20034 | 8.7 | HIGH | CWE-352 | 0.0% p8 | 6.09 | Wowza Streaming Engine 4.5.0 contains a privilege escalation vulnerability that ...Wowza Streaming Engine 4.5.0 contains a privilege escalation vulnerability that allows authenticated read-only users to elevate privileges to administrator by manipulating POST parameters. Attackers can send POST requests to the user edit endpoint with accessLevel set to 'admin' and advUser parameters set to 'true' and 'on' to gain administrative access. |
2026-03-16 | |
| CVE-2016-20033 | 8.5 | HIGH | CWE-639 | 0.0% p4 | 5.95 | Wowza Streaming Engine 4.5.0 contains a local privilege escalation vulnerability...Wowza Streaming Engine 4.5.0 contains a local privilege escalation vulnerability that allows authenticated users to escalate privileges by replacing executable files due to improper file permissions granting full access to the Everyone group. Attackers can replace the nssm_x64.exe binary in the manager and engine service directories with malicious executables to execute code with LocalSystem privileges when services restart. |
2026-03-16 | |
| CVE-2016-20032 | 5.1 | MEDIUM | CWE-79 | 0.0% p1 | 3.57 | ZKTeco ZKAccess Security System 5.3.1 contains a stored cross-site scripting vul...ZKTeco ZKAccess Security System 5.3.1 contains a stored cross-site scripting vulnerability that allows attackers to execute arbitrary HTML and script code by injecting malicious payloads through the 'holiday_name' and 'memo' POST parameters. Attackers can submit crafted requests with script code in these parameters to compromise user browser sessions and steal sensitive information. |
2026-03-16 | |
| CVE-2016-20031 | 6.8 | MEDIUM | CWE-798 | 0.0% p0 | 4.76 | ZKTeco ZKBioSecurity 3.0 contains a local authorization bypass vulnerability in ...ZKTeco ZKBioSecurity 3.0 contains a local authorization bypass vulnerability in visLogin.jsp that allows attackers to authenticate without valid credentials by spoofing localhost requests. Attackers can exploit the EnvironmentUtil.getClientIp() method which treats IPv6 loopback address 0:0:0:0:0:0:0:1 as 127.0.0.1 and authenticates using the IP as username with hardcoded password 123456 to access sensitive information and perform unauthorized actions. |
2026-03-16 | |
| CVE-2016-20030 | 9.3 | CRITICAL | CWE-551 | 0.0% p7 | 6.51 | ZKTeco ZKBioSecurity 3.0 contains a user enumeration vulnerability that allows u...ZKTeco ZKBioSecurity 3.0 contains a user enumeration vulnerability that allows unauthenticated attackers to discover valid usernames by submitting partial characters via the username parameter. Attackers can send requests to the authLoginAction!login.do script with varying username inputs to enumerate valid user accounts based on application responses. |
2026-03-16 | |
| CVE-2016-20029 | 6.9 | MEDIUM | CWE-276 | 0.0% p1 | 4.83 | ZKTeco ZKBioSecurity 3.0 contains a file path manipulation vulnerability that al...ZKTeco ZKBioSecurity 3.0 contains a file path manipulation vulnerability that allows attackers to access arbitrary files by modifying file paths used to retrieve local resources. Attackers can manipulate path parameters to bypass access controls and retrieve sensitive information including configuration files, source code, and protected application resources. |
2026-03-16 | |
| CVE-2016-20028 | 5.3 | MEDIUM | CWE-352 | 0.0% p0 | 3.71 | ZKTeco ZKBioSecurity 3.0 contains a cross-site request forgery vulnerability tha...ZKTeco ZKBioSecurity 3.0 contains a cross-site request forgery vulnerability that allows attackers to perform administrative actions by tricking logged-in users into visiting malicious websites. Attackers can craft HTTP requests that add superadmin accounts without validity checks, enabling unauthorized administrative access when authenticated users visit attacker-controlled pages. |
2026-03-16 | |
| CVE-2016-20027 | 5.1 | MEDIUM | CWE-79 | 0.0% p1 | 3.57 | ZKTeco ZKBioSecurity 3.0 contains multiple reflected cross-site scripting vulner...ZKTeco ZKBioSecurity 3.0 contains multiple reflected cross-site scripting vulnerabilities that allow attackers to execute arbitrary HTML and script code by injecting malicious payloads through unsanitized parameters in multiple scripts. Attackers can craft malicious URLs with XSS payloads in vulnerable parameters to execute scripts in a user's browser session within the context of the affected application. |
2026-03-16 | |
| CVE-2016-20026 | 9.3 | CRITICAL | CWE-798 | 0.0% p15 | 6.51 | ZKTeco ZKBioSecurity 3.0 contains hardcoded credentials in the bundled Apache To...ZKTeco ZKBioSecurity 3.0 contains hardcoded credentials in the bundled Apache Tomcat server that allow unauthenticated attackers to access the manager application. Attackers can authenticate with hardcoded credentials stored in tomcat-users.xml to upload malicious WAR archives containing JSP applications and execute arbitrary code with SYSTEM privileges. |
2026-03-16 | |
| CVE-2016-20025 | 8.7 | HIGH | CWE-552 | 0.0% p6 | 6.09 | ZKTeco ZKAccess Professional 3.5.3 contains an insecure file permissions vulnera...ZKTeco ZKAccess Professional 3.5.3 contains an insecure file permissions vulnerability that allows authenticated users to escalate privileges by modifying executable files. Attackers can leverage the Modify permission granted to the Authenticated Users group to replace executable binaries with malicious code for privilege escalation. |
2026-03-16 | |
| CVE-2016-20024 | 9.3 | CRITICAL | CWE-538 | 0.0% p7 | 6.51 | ZKTeco ZKTime.Net 3.0.1.6 contains an insecure file permissions vulnerability th...ZKTeco ZKTime.Net 3.0.1.6 contains an insecure file permissions vulnerability that allows unprivileged users to escalate privileges by modifying executable files. Attackers can exploit world-writable permissions on the ZKTimeNet3.0 directory and its contents to replace executable files with malicious binaries for privilege escalation. |
2026-03-16 | |
| CVE-2015-20121 | 8.8 | HIGH | CWE-89 | 0.2% p43 | 6.17 | Next Click Ventures RealtyScript 4.0.2 contains SQL injection vulnerabilities th...Next Click Ventures RealtyScript 4.0.2 contains SQL injection vulnerabilities that allow unauthenticated attackers to manipulate database queries by injecting arbitrary SQL code through the GET parameter 'u_id' in /admin/users.php and the POST parameter 'agent[]' in /admin/mailer.php. Attackers can exploit time-based blind SQL injection techniques to extract sensitive database information or cause denial of service through sleep-based payloads. |
2026-03-16 | |
| CVE-2015-20120 | 8.8 | HIGH | CWE-89 | 0.4% p59 | 6.17 | Next Click Ventures RealtyScript 4.0.2 contains multiple time-based blind SQL in...Next Click Ventures RealtyScript 4.0.2 contains multiple time-based blind SQL injection vulnerabilities that allow unauthenticated attackers to extract database information by injecting SQL code into application parameters. Attackers can craft requests with time-delay payloads to infer database contents character by character based on response timing differences. |
2026-03-16 | |
| CVE-2015-20119 | 5.1 | MEDIUM | CWE-79 | 0.0% p8 | 3.57 | Next Click Ventures RealtyScript 4.0.2 contains a stored cross-site scripting vu...Next Click Ventures RealtyScript 4.0.2 contains a stored cross-site scripting vulnerability that allows authenticated attackers to inject malicious HTML and iframe elements through the text parameter in the pages.php admin interface. Attackers can submit POST requests to the add page action with crafted iframe payloads in the text parameter to store malicious content that executes in the browsers of users viewing the affected pages. |
2026-03-16 | |
| CVE-2015-20118 | 5.1 | MEDIUM | CWE-79 | 0.0% p9 | 3.57 | Next Click Ventures RealtyScript 4.0.2 contains a stored cross-site scripting vu...Next Click Ventures RealtyScript 4.0.2 contains a stored cross-site scripting vulnerability in the location_name parameter of the admin locations interface. Attackers can submit POST requests to the locations.php endpoint with JavaScript payloads in the location_name field to execute arbitrary code in administrator browsers. |
2026-03-16 | |
| CVE-2015-20117 | 6.9 | MEDIUM | CWE-352 | 0.1% p25 | 4.83 | Next Click Ventures RealtyScript 4.0.2 contains a cross-site request forgery vul...Next Click Ventures RealtyScript 4.0.2 contains a cross-site request forgery vulnerability that allows unauthenticated attackers to create unauthorized user accounts and administrative users by crafting malicious forms. Attackers can submit hidden form data to /admin/addusers.php and /admin/editadmins.php endpoints to register new users with arbitrary credentials and escalate privileges to SUPERUSER level. |
2026-03-16 | |
| CVE-2015-20116 | 5.1 | MEDIUM | CWE-79 | 0.0% p8 | 3.57 | Next Click Ventures RealtyScript 4.0.2 fails to properly sanitize CSV file uploa...Next Click Ventures RealtyScript 4.0.2 fails to properly sanitize CSV file uploads, allowing attackers to inject malicious scripts through filename parameters in multipart form data. Attackers can upload files with XSS payloads in the filename field to execute arbitrary JavaScript in users' browsers when the file is processed or displayed. |
2026-03-16 | |
| CVE-2015-20115 | 5.1 | MEDIUM | CWE-79 | 0.0% p7 | 3.57 | Next Click Ventures RealtyScript 4.0.2 fails to properly sanitize file uploads, ...Next Click Ventures RealtyScript 4.0.2 fails to properly sanitize file uploads, allowing attackers to store malicious scripts through the file POST parameter in admin/tools.php. Attackers can upload files containing JavaScript code that executes in the context of admin/tools.php when accessed by other users. |
2026-03-16 | |
| CVE-2015-20114 | 5.1 | MEDIUM | CWE-79 | 0.0% p9 | 3.57 | Next Click Ventures RealtyScript 4.0.2 contains a cross-site scripting vulnerabi...Next Click Ventures RealtyScript 4.0.2 contains a cross-site scripting vulnerability that allows attackers to execute arbitrary HTML and script code by injecting malicious input through multiple parameters that are not properly sanitized. Attackers can craft requests with injected script payloads in vulnerable parameters to execute code in users' browser sessions within the context of the affected application. |
2026-03-16 | |
| CVE-2015-20113 | 6.9 | MEDIUM | CWE-352 | 0.0% p6 | 4.83 | Next Click Ventures RealtyScript 4.0.2 contains cross-site request forgery and p...Next Click Ventures RealtyScript 4.0.2 contains cross-site request forgery and persistent cross-site scripting vulnerabilities that allow attackers to perform administrative actions and inject malicious scripts. Attackers can craft malicious web pages that execute unauthorized actions when logged-in users visit them, or inject persistent scripts that execute in the application context. |
2026-03-16 | |
| CVE-2013-20006 | 8.7 | HIGH | CWE-79 | 0.1% p19 | 6.09 | Qool CMS contains multiple persistent cross-site scripting vulnerabilities in se...Qool CMS contains multiple persistent cross-site scripting vulnerabilities in several administrative scripts where POST parameters are not properly sanitized before being stored and returned to users. Attackers can inject malicious JavaScript code through parameters like 'title', 'name', 'email', 'username', 'link', and 'task' in endpoints such as addnewtype, addnewdatafield, addmenu, addusergroup, addnewuserfield, adduser, addgeneraldata, and addcontentitem to execute arbitrary scripts in administrator browsers. |
2026-03-16 | |
| CVE-2013-20005 | 6.9 | MEDIUM | CWE-79 | 0.0% p11 | 4.83 | Qool CMS 2.0 RC2 contains a cross-site request forgery vulnerability that allows...Qool CMS 2.0 RC2 contains a cross-site request forgery vulnerability that allows attackers to perform administrative actions by tricking logged-in users into visiting malicious web pages. Attackers can forge POST requests to the /admin/adduser endpoint with parameters like username, password, email, and level to create root-level user accounts without user consent. |
2026-03-16 | |
| CVE-2026-4111 | 7.5 | HIGH | CWE-835 | 0.0% p11 | 5.25 | A flaw was identified in the RAR5 archive decompression logic of the libarchive ...A flaw was identified in the RAR5 archive decompression logic of the libarchive library, specifically within the archive_read_data() processing path. When a specially crafted RAR5 archive is processed, the decompression routine may enter a state where internal logic prevents forward progress. This condition results in an infinite loop that continuously consumes CPU resources. Because the archive passes checksum validation and appears structurally valid, affected applications cannot detect the issue before processing. This can allow attackers to cause persistent denial-of-service conditions in services that automatically process archives. |
2026-03-13 | |
| CVE-2026-4105 | 6.7 | MEDIUM | CWE-284 | 0.0% p5 | 4.69 | A flaw was found in systemd. The systemd-machined service contains an Improper A...A flaw was found in systemd. The systemd-machined service contains an Improper Access Control vulnerability due to insufficient validation of the class parameter in the RegisterMachine D-Bus (Desktop Bus) method. A local unprivileged user can exploit this by attempting to register a machine with a specific class value, which may leave behind a usable, attacker-controlled machine object. This allows the attacker to invoke methods on the privileged object, leading to the execution of arbitrary commands with root privileges on the host system. |
2026-03-13 | |
| CVE-2026-4092 | 8.7 | HIGH | CWE-22 | 0.3% p54 | 6.10 | Path Traversal in Clasp impacting versions < 3.2.0 allows a remote attacker to p...Path Traversal in Clasp impacting versions < 3.2.0 allows a remote attacker to perform remote code execution via a malicious Google Apps Script project containing specially crafted filenames with directory traversal sequences. |
2026-03-13 | |
| CVE-2026-4063 | 4.3 | MEDIUM | CWE-862 | 0.0% p10 | 3.01 | The Social Icons Widget & Block by WPZOOM plugin for WordPress is vulnerable to ...The Social Icons Widget & Block by WPZOOM plugin for WordPress is vulnerable to unauthorized data modification due to a missing capability check in the add_menu_item() method hooked to admin_menu in all versions up to, and including, 4.5.8. This is due to the method performing wp_insert_post() and update_post_meta() calls to create a sharing configuration without verifying the current user has administrator-level capabilities. This makes it possible for authenticated attackers, with Subscriber-level access and above, to trigger the creation of a published wpzoom-sharing configuration post with default sharing button settings, which causes social sharing buttons to be automatically injected into all post content on the frontend via the the_content filter. |
2026-03-13 | |
| CVE-2026-3986 | 6.4 | MEDIUM | CWE-79 | 0.0% p12 | 4.48 | The Calculated Fields Form plugin for WordPress is vulnerable to Stored Cross-Si...The Calculated Fields Form plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the form settings in all versions up to, and including, 5.4.5.0. This is due to insufficient capability checks on the form settings save handler and insufficient input sanitization of the `fcontent` field in `fhtml` field types. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-03-13 | |
| CVE-2026-3910 | 8.8 | HIGH | CWE-94 | ✓ | 0.7% p71 | 6.18 | Inappropriate implementation in V8 in Google Chrome prior to 146.0.7680.75 allow...Inappropriate implementation in V8 in Google Chrome prior to 146.0.7680.75 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High) |
2026-03-13 |
| CVE-2026-3909 | 8.8 | HIGH | CWE-787 | ✓ | 0.3% p52 | 6.17 | Out of bounds write in Skia in Google Chrome prior to 146.0.7680.75 allowed a re...Out of bounds write in Skia in Google Chrome prior to 146.0.7680.75 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High) |
2026-03-13 |
| CVE-2026-3891 | 9.8 | CRITICAL | CWE-434 | 0.1% p23 | 6.86 | The Pix for WooCommerce plugin for WordPress is vulnerable to arbitrary file upl...The Pix for WooCommerce plugin for WordPress is vulnerable to arbitrary file uploads due to missing capability check and missing file type validation in the 'lkn_pix_for_woocommerce_c6_save_settings' function in all versions up to, and including, 1.5.0. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. |
2026-03-13 | |
| CVE-2026-3045 | 7.5 | HIGH | CWE-862 | 0.0% p14 | 5.25 | The Appointment Booking Calendar — Simply Schedule Appointments plugin for WordP...The Appointment Booking Calendar — Simply Schedule Appointments plugin for WordPress is vulnerable to unauthorized access of sensitive data in all versions up to and including 1.6.9.29. This is due to two compounding weaknesses: (1) a non-user-bound `public_nonce` is exposed to unauthenticated users through the public `/wp-json/ssa/v1/embed-inner` REST endpoint, and (2) the `get_item()` method in `SSA_Settings_Api` relies on `nonce_permissions_check()` for authorization (which accepts the public nonce) but does not call `remove_unauthorized_settings_for_current_user()` to filter restricted fields. This makes it possible for unauthenticated attackers to access admin-only plugin settings including the administrator email, phone number, internal access tokens, notification configurations, and developer settings via the `/wp-json/ssa/v1/settings/{section}` endpoint. The exposure of appointment tokens also allows an attacker to modify or cancel appointments. |
2026-03-13 | |
| CVE-2026-32746 | 9.8 | CRITICAL | CWE-120 | 0.0% p8 | 6.86 | telnetd in GNU inetutils through 2.7 allows an out-of-bounds write in the LINEMO...telnetd in GNU inetutils through 2.7 allows an out-of-bounds write in the LINEMODE SLC (Set Local Characters) suboption handler because add_slc does not check whether the buffer is full. |
2026-03-13 | |
| CVE-2026-32745 | 6.3 | MEDIUM | CWE-614 | 0.0% p0 | 4.41 | In JetBrains Datalore before 2026.1 session hijacking was possible due to missin...In JetBrains Datalore before 2026.1 session hijacking was possible due to missing secure attribute for cookie settings |
2026-03-13 | |
| CVE-2026-32612 | 5.4 | MEDIUM | CWE-79 | 0.0% p2 | 3.78 | Statamic is a Laravel and Git powered content management system (CMS). Prior to ...Statamic is a Laravel and Git powered content management system (CMS). Prior to 6.6.2, stored XSS in the control panel color mode preference allows authenticated users with control panel access to inject malicious JavaScript that executes when a higher-privileged user impersonates their account. This has been fixed in 6.6.2. |
2026-03-13 | |
| CVE-2026-32598 | 6.9 | MEDIUM | CWE-532 | 0.0% p9 | 4.83 | OneUptime is a solution for monitoring and managing online services. Prior to 10...OneUptime is a solution for monitoring and managing online services. Prior to 10.0.24, the password reset flow logs the complete password reset URL — containing the plaintext reset token — at INFO log level, which is enabled by default in production. Anyone with access to application logs (log aggregation, Docker logs, Kubernetes pod logs) can intercept reset tokens and perform account takeover on any user. This vulnerability is fixed in 10.0.24. |
2026-03-13 | |
| CVE-2026-32597 | 7.5 | HIGH | CWE-345 | 0.0% p1 | 5.25 | PyJWT is a JSON Web Token implementation in Python. Prior to 2.12.0, PyJWT does ...PyJWT is a JSON Web Token implementation in Python. Prior to 2.12.0, PyJWT does not validate the crit (Critical) Header Parameter defined in RFC 7515 §4.1.11. When a JWS token contains a crit array listing extensions that PyJWT does not understand, the library accepts the token instead of rejecting it. This violates the MUST requirement in the RFC. This vulnerability is fixed in 2.12.0. |
2026-03-13 | |
| CVE-2026-32543 | 5.3 | MEDIUM | CWE-862 | 0.0% p12 | 3.71 | Missing Authorization vulnerability in CyberChimps Responsive Blocks responsive-...Missing Authorization vulnerability in CyberChimps Responsive Blocks responsive-block-editor-addons allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Responsive Blocks: from n/a through <= 2.2.0. |
2026-03-13 | |
| CVE-2026-32487 | 5.3 | MEDIUM | CWE-862 | 0.0% p12 | 3.71 | Missing Authorization vulnerability in raratheme Lawyer Landing Page lawyer-land...Missing Authorization vulnerability in raratheme Lawyer Landing Page lawyer-landing-page allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Lawyer Landing Page: from n/a through <= 1.2.7. |
2026-03-13 | |
| CVE-2026-32486 | 5.3 | MEDIUM | CWE-862 | 0.0% p12 | 3.71 | Missing Authorization vulnerability in wptravelengine Travel Booking travel-book...Missing Authorization vulnerability in wptravelengine Travel Booking travel-booking allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Travel Booking: from n/a through <= 1.3.9. |
2026-03-13 | |
| CVE-2026-32462 | 5.9 | MEDIUM | CWE-79 | 0.0% p1 | 4.13 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Liton Arefin Master Addons for Elementor master-addons allows DOM-Based XSS.This issue affects Master Addons for Elementor: from n/a through <= 2.1.3. |
2026-03-13 | |
| CVE-2026-32461 | 5.3 | MEDIUM | CWE-862 | 0.0% p12 | 3.71 | Missing Authorization vulnerability in Really Simple Plugins Really Simple SSL r...Missing Authorization vulnerability in Really Simple Plugins Really Simple SSL really-simple-ssl allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Really Simple SSL: from n/a through <= 9.5.7. |
2026-03-13 | |
| CVE-2026-32460 | 6.5 | MEDIUM | CWE-79 | 0.0% p11 | 4.55 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Themefic Ultimate Addons for Contact Form 7 ultimate-addons-for-contact-form-7 allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Ultimate Addons for Contact Form 7: from n/a through <= 3.5.36. |
2026-03-13 | |
| CVE-2026-32459 | 8.5 | HIGH | CWE-89 | 0.0% p11 | 5.95 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti...Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in flycart UpsellWP checkout-upsell-and-order-bumps allows Blind SQL Injection.This issue affects UpsellWP: from n/a through <= 2.2.4. |
2026-03-13 | |
| CVE-2026-32458 | 7.6 | HIGH | CWE-89 | 0.0% p11 | 5.32 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti...Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in RealMag777 WOLF bulk-editor allows Blind SQL Injection.This issue affects WOLF: from n/a through <= 1.0.8.7. |
2026-03-13 | |
| CVE-2026-32457 | 5.3 | MEDIUM | CWE-862 | 0.0% p12 | 3.71 | Missing Authorization vulnerability in Wombat Plugins Advanced Product Fields (P...Missing Authorization vulnerability in Wombat Plugins Advanced Product Fields (Product Addons) for WooCommerce advanced-product-fields-for-woocommerce allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Advanced Product Fields (Product Addons) for WooCommerce: from n/a through <= 1.6.18. |
2026-03-13 | |
| CVE-2026-32456 | 4.3 | MEDIUM | CWE-352 | 0.0% p4 | 3.01 | Cross-Site Request Forgery (CSRF) vulnerability in Janis Elsts Admin Menu Editor...Cross-Site Request Forgery (CSRF) vulnerability in Janis Elsts Admin Menu Editor admin-menu-editor allows Cross Site Request Forgery.This issue affects Admin Menu Editor: from n/a through <= 1.14.1. |
2026-03-13 | |
| CVE-2026-32455 | 6.5 | MEDIUM | CWE-79 | 0.0% p11 | 4.55 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in RealMag777 MDTF wp-meta-data-filter-and-taxonomy-filter allows DOM-Based XSS.This issue affects MDTF: from n/a through <= 1.3.5. |
2026-03-13 | |
| CVE-2026-32454 | 6.5 | MEDIUM | CWE-79 | 0.0% p11 | 4.55 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ThemeFusion Avada Core fusion-core allows DOM-Based XSS.This issue affects Avada Core: from n/a through < 5.15.0. |
2026-03-13 | |
| CVE-2026-32453 | 5.3 | MEDIUM | CWE-862 | 0.0% p12 | 3.71 | Missing Authorization vulnerability in ThemeFusion Avada Core fusion-core allows...Missing Authorization vulnerability in ThemeFusion Avada Core fusion-core allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Avada Core: from n/a through < 5.15.0. |
2026-03-13 | |
| CVE-2026-32452 | 5.3 | MEDIUM | CWE-862 | 0.0% p12 | 3.71 | Missing Authorization vulnerability in ThemeFusion Fusion Builder fusion-builder...Missing Authorization vulnerability in ThemeFusion Fusion Builder fusion-builder allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Fusion Builder: from n/a through < 3.15.0. |
2026-03-13 | |
| CVE-2026-32451 | 6.3 | MEDIUM | CWE-862 | 0.0% p13 | 4.41 | Missing Authorization vulnerability in ThemeFusion Fusion Builder fusion-builder...Missing Authorization vulnerability in ThemeFusion Fusion Builder fusion-builder allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Fusion Builder: from n/a through < 3.15.0. |
2026-03-13 | |
| CVE-2026-32450 | 6.5 | MEDIUM | CWE-79 | 0.0% p11 | 4.55 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in RealMag777 Active Products Tables for WooCommerce profit-products-tables-for-woocommerce allows DOM-Based XSS.This issue affects Active Products Tables for WooCommerce: from n/a through <= 1.0.7. |
2026-03-13 | |
| CVE-2026-32449 | 6.5 | MEDIUM | CWE-79 | 0.0% p11 | 4.55 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in themifyme Themify Event Post themify-event-post allows Stored XSS.This issue affects Themify Event Post: from n/a through <= 1.3.4. |
2026-03-13 | |
| CVE-2026-32448 | 6.5 | MEDIUM | CWE-79 | 0.0% p11 | 4.55 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Eric Teubert Podlove Podcast Publisher podlove-podcasting-plugin-for-wordpress allows Stored XSS.This issue affects Podlove Podcast Publisher: from n/a through <= 4.3.3. |
2026-03-13 | |
| CVE-2026-32447 | 4.3 | MEDIUM | CWE-862 | 0.0% p9 | 3.01 | Missing Authorization vulnerability in Vito Peleg Atarim atarim-visual-collabora...Missing Authorization vulnerability in Vito Peleg Atarim atarim-visual-collaboration allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Atarim: from n/a through <= 4.3.2. |
2026-03-13 | |
| CVE-2026-32446 | 4.3 | MEDIUM | CWE-862 | 0.0% p9 | 3.01 | Missing Authorization vulnerability in Syed Balkhi Contact Form by WPForms wpfor...Missing Authorization vulnerability in Syed Balkhi Contact Form by WPForms wpforms-lite allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Contact Form by WPForms: from n/a through <= 1.9.9.3. |
2026-03-13 | |
| CVE-2026-32445 | 2.7 | LOW | CWE-862 | 0.0% p10 | 1.89 | Missing Authorization vulnerability in Elementor Elementor Website Builder eleme...Missing Authorization vulnerability in Elementor Elementor Website Builder elementor allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Elementor Website Builder: from n/a through <= 3.35.5. |
2026-03-13 | |
| CVE-2026-32443 | 6.5 | MEDIUM | CWE-352 | 0.0% p4 | 4.55 | Cross-Site Request Forgery (CSRF) vulnerability in Josh Kohlbach Product Feed PR...Cross-Site Request Forgery (CSRF) vulnerability in Josh Kohlbach Product Feed PRO for WooCommerce woo-product-feed-pro allows Cross Site Request Forgery.This issue affects Product Feed PRO for WooCommerce: from n/a through <= 13.5.2. |
2026-03-13 | |
| CVE-2026-32442 | 4.3 | MEDIUM | CWE-862 | 0.0% p9 | 3.01 | Missing Authorization vulnerability in E2Pdf e2pdf e2pdf allows Exploiting Incor...Missing Authorization vulnerability in E2Pdf e2pdf e2pdf allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects e2pdf: from n/a through <= 1.28.15. |
2026-03-13 | |
| CVE-2026-32440 | 5.3 | MEDIUM | CWE-862 | 0.0% p12 | 3.71 | Missing Authorization vulnerability in Ex-Themes WP Food wp-food allows Exploiti...Missing Authorization vulnerability in Ex-Themes WP Food wp-food allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Food: from n/a through < 2.7.1. |
2026-03-13 | |
| CVE-2026-32439 | 5.3 | MEDIUM | CWE-862 | 0.0% p12 | 3.71 | Missing Authorization vulnerability in WebGeniusLab BigHearts bighearts allows E...Missing Authorization vulnerability in WebGeniusLab BigHearts bighearts allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects BigHearts: from n/a through <= 3.1.14. |
2026-03-13 | |
| CVE-2026-32438 | 5.3 | MEDIUM | CWE-862 | 0.0% p12 | 3.71 | Missing Authorization vulnerability in vowelweb VW School Education vw-school-ed...Missing Authorization vulnerability in vowelweb VW School Education vw-school-education allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects VW School Education: from n/a through <= 1.4.6. |
2026-03-13 | |
| CVE-2026-32437 | 5.3 | MEDIUM | CWE-862 | 0.0% p12 | 3.71 | Missing Authorization vulnerability in vowelweb VW Portfolio vw-portfolio allows...Missing Authorization vulnerability in vowelweb VW Portfolio vw-portfolio allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects VW Portfolio: from n/a through <= 1.3.3. |
2026-03-13 | |
| CVE-2026-32436 | 5.3 | MEDIUM | CWE-862 | 0.0% p12 | 3.71 | Missing Authorization vulnerability in vowelweb VW Photography vw-photography al...Missing Authorization vulnerability in vowelweb VW Photography vw-photography allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects VW Photography: from n/a through <= 1.3.8. |
2026-03-13 | |
| CVE-2026-32435 | 5.3 | MEDIUM | CWE-862 | 0.0% p12 | 3.71 | Missing Authorization vulnerability in vowelweb VW Pet Shop vw-pet-shop allows E...Missing Authorization vulnerability in vowelweb VW Pet Shop vw-pet-shop allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects VW Pet Shop: from n/a through <= 1.4.7. |
2026-03-13 | |
| CVE-2026-32434 | 5.3 | MEDIUM | CWE-862 | 0.0% p12 | 3.71 | Missing Authorization vulnerability in vowelweb VW Fitness vw-fitness allows Exp...Missing Authorization vulnerability in vowelweb VW Fitness vw-fitness allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects VW Fitness: from n/a through <= 4.3.4. |
2026-03-13 | |
| CVE-2026-32433 | 8.5 | HIGH | CWE-89 | 0.0% p11 | 5.95 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti...Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in codepeople CP Contact Form with Paypal cp-contact-form-with-paypal allows Blind SQL Injection.This issue affects CP Contact Form with Paypal: from n/a through <= 1.3.61. |
2026-03-13 | |
| CVE-2026-32432 | 5.3 | MEDIUM | CWE-862 | 0.0% p12 | 3.71 | Missing Authorization vulnerability in codepeople WP Time Slots Booking Form wp-...Missing Authorization vulnerability in codepeople WP Time Slots Booking Form wp-time-slots-booking-form allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Time Slots Booking Form: from n/a through <= 1.2.42. |
2026-03-13 | |
| CVE-2026-32431 | 6.5 | MEDIUM | CWE-79 | 0.0% p11 | 4.55 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Brainstorm Force Astra Bulk Edit astra-bulk-edit allows DOM-Based XSS.This issue affects Astra Bulk Edit: from n/a through <= 1.2.10. |
2026-03-13 | |
| CVE-2026-32430 | 6.5 | MEDIUM | CWE-79 | 0.0% p11 | 4.55 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in IdeaBox Creations PowerPack Addons for Elementor powerpack-lite-for-elementor allows Stored XSS.This issue affects PowerPack Addons for Elementor: from n/a through <= 2.9.9. |
2026-03-13 | |
| CVE-2026-32429 | 6.5 | MEDIUM | CWE-79 | 0.0% p11 | 4.55 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Noor Alam Magical Addons For Elementor magical-addons-for-elementor allows Stored XSS.This issue affects Magical Addons For Elementor: from n/a through <= 1.4.1. |
2026-03-13 | |
| CVE-2026-32428 | 5.3 | MEDIUM | CWE-862 | 0.0% p12 | 3.71 | Missing Authorization vulnerability in Ays Pro Popup Like box ays-facebook-popup...Missing Authorization vulnerability in Ays Pro Popup Like box ays-facebook-popup-likebox allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Popup Like box: from n/a through <= 3.7.7. |
2026-03-13 | |
| CVE-2026-32427 | 5.3 | MEDIUM | CWE-862 | 0.0% p12 | 3.71 | Missing Authorization vulnerability in vowelweb VW Education Lite vw-education-l...Missing Authorization vulnerability in vowelweb VW Education Lite vw-education-lite allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects VW Education Lite: from n/a through <= 2.2.0. |
2026-03-13 | |
| CVE-2026-32426 | 7.5 | HIGH | CWE-98 | 0.1% p35 | 5.25 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in themelexus Medilazar Core medilazar-core allows PHP Local File Inclusion.This issue affects Medilazar Core: from n/a through < 1.4.7. |
2026-03-13 | |
| CVE-2026-32425 | 5.3 | MEDIUM | CWE-862 | 0.0% p12 | 3.71 | Missing Authorization vulnerability in linknacional Payment Gateway Pix For Give...Missing Authorization vulnerability in linknacional Payment Gateway Pix For GiveWP payment-gateway-pix-for-givewp allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Payment Gateway Pix For GiveWP: from n/a through <= 2.2.3. |
2026-03-13 | |
| CVE-2026-32424 | 6.5 | MEDIUM | CWE-79 | 0.0% p11 | 4.55 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in BoldGrid Sprout Clients sprout-clients allows Stored XSS.This issue affects Sprout Clients: from n/a through <= 3.2.2. |
2026-03-13 | |
| CVE-2026-32423 | 5.4 | MEDIUM | CWE-862 | 0.0% p9 | 3.78 | Missing Authorization vulnerability in Bowo Admin and Site Enhancements (ASE) ad...Missing Authorization vulnerability in Bowo Admin and Site Enhancements (ASE) admin-site-enhancements allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Admin and Site Enhancements (ASE): from n/a through <= 8.4.0. |
2026-03-13 | |
| CVE-2026-32422 | 8.5 | HIGH | CWE-89 | 0.0% p11 | 5.95 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti...Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in levelfourdevelopment WP EasyCart wp-easycart allows Blind SQL Injection.This issue affects WP EasyCart: from n/a through <= 5.8.13. |
2026-03-13 | |
| CVE-2026-32421 | 5.3 | MEDIUM | CWE-862 | 0.0% p12 | 3.71 | Missing Authorization vulnerability in Agile Logix Post Timeline post-timeline a...Missing Authorization vulnerability in Agile Logix Post Timeline post-timeline allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Post Timeline: from n/a through <= 2.4.1. |
2026-03-13 | |
| CVE-2026-32420 | 5.4 | MEDIUM | CWE-352 | 0.0% p4 | 3.78 | Cross-Site Request Forgery (CSRF) vulnerability in Ruben Garcia GamiPress gamipr...Cross-Site Request Forgery (CSRF) vulnerability in Ruben Garcia GamiPress gamipress allows Cross Site Request Forgery.This issue affects GamiPress: from n/a through <= 7.6.6. |
2026-03-13 | |
| CVE-2026-32419 | 5.9 | MEDIUM | CWE-79 | 0.0% p10 | 4.13 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Fernando Briano List category posts list-category-posts allows DOM-Based XSS.This issue affects List category posts: from n/a through <= 0.93.1. |
2026-03-13 | |
| CVE-2026-32418 | 7.6 | HIGH | CWE-89 | 0.0% p11 | 5.32 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti...Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Jordy Meow Meow Gallery meow-gallery allows Blind SQL Injection.This issue affects Meow Gallery: from n/a through <= 5.4.4. |
2026-03-13 | |
| CVE-2026-32417 | 5.4 | MEDIUM | CWE-862 | 0.0% p9 | 3.78 | Missing Authorization vulnerability in wppochipp Pochipp pochipp allows Exploiti...Missing Authorization vulnerability in wppochipp Pochipp pochipp allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Pochipp: from n/a through < 1.18.9. |
2026-03-13 | |
| CVE-2026-32416 | 5.4 | MEDIUM | CWE-862 | 0.0% p13 | 3.78 | Missing Authorization vulnerability in bPlugins PDF Poster pdf-poster allows Exp...Missing Authorization vulnerability in bPlugins PDF Poster pdf-poster allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects PDF Poster: from n/a through <= 2.4.0. |
2026-03-13 | |
| CVE-2026-32415 | 5.0 | MEDIUM | CWE-35 | 0.0% p15 | 3.50 | Path Traversal: '.../...//' vulnerability in Bogdan Bendziukov Squeeze squeeze a...Path Traversal: '.../...//' vulnerability in Bogdan Bendziukov Squeeze squeeze allows Path Traversal.This issue affects Squeeze: from n/a through <= 1.7.7. |
2026-03-13 | |
| CVE-2026-32414 | 7.2 | HIGH | CWE-94 | 0.1% p19 | 5.04 | Improper Control of Generation of Code ('Code Injection') vulnerability in ILLID...Improper Control of Generation of Code ('Code Injection') vulnerability in ILLID Advanced Woo Labels advanced-woo-labels allows Remote Code Inclusion.This issue affects Advanced Woo Labels: from n/a through <= 2.36. |
2026-03-13 | |
| CVE-2026-32413 | 5.3 | MEDIUM | CWE-862 | 0.0% p12 | 3.71 | Missing Authorization vulnerability in Maciej Bis Permalink Manager Lite permali...Missing Authorization vulnerability in Maciej Bis Permalink Manager Lite permalink-manager allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Permalink Manager Lite: from n/a through < 2.5.3. |
2026-03-13 | |
| CVE-2026-32412 | 5.4 | MEDIUM | CWE-918 | 0.0% p11 | 3.78 | Server-Side Request Forgery (SSRF) vulnerability in Gift Up! Gift Up Gift Cards ...Server-Side Request Forgery (SSRF) vulnerability in Gift Up! Gift Up Gift Cards for WordPress and WooCommerce gift-up allows Server Side Request Forgery.This issue affects Gift Up Gift Cards for WordPress and WooCommerce: from n/a through <= 3.1.7. |
2026-03-13 | |
| CVE-2026-32411 | 6.5 | MEDIUM | CWE-79 | 0.0% p11 | 4.55 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Simpma Embed Calendly embed-calendly-scheduling allows Stored XSS.This issue affects Embed Calendly: from n/a through <= 4.4. |
2026-03-13 | |
| CVE-2026-32410 | 5.3 | MEDIUM | CWE-862 | 0.0% p12 | 3.71 | Missing Authorization vulnerability in WBW Plugins WBW Currency Switcher for Woo...Missing Authorization vulnerability in WBW Plugins WBW Currency Switcher for WooCommerce woo-currency allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WBW Currency Switcher for WooCommerce: from n/a through <= 2.2.5. |
2026-03-13 | |
| CVE-2026-32409 | 5.3 | MEDIUM | CWE-862 | 0.0% p12 | 3.71 | Missing Authorization vulnerability in WPMU DEV - Your All-in-One WordPress Plat...Missing Authorization vulnerability in WPMU DEV - Your All-in-One WordPress Platform Forminator forminator allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Forminator: from n/a through <= 1.50.2. |
2026-03-13 | |
| CVE-2026-32408 | 4.3 | MEDIUM | CWE-862 | 0.0% p9 | 3.01 | Missing Authorization vulnerability in themefusecom Brizy brizy allows Exploitin...Missing Authorization vulnerability in themefusecom Brizy brizy allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Brizy: from n/a through <= 2.7.23. |
2026-03-13 | |
| CVE-2026-32407 | 4.3 | MEDIUM | CWE-862 | 0.0% p9 | 3.01 | Missing Authorization vulnerability in WPClever WPC Smart Wishlist for WooCommer...Missing Authorization vulnerability in WPClever WPC Smart Wishlist for WooCommerce woo-smart-wishlist allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WPC Smart Wishlist for WooCommerce: from n/a through <= 5.0.8. |
2026-03-13 | |
| CVE-2026-32406 | 4.3 | MEDIUM | CWE-862 | 0.0% p9 | 3.01 | Missing Authorization vulnerability in WPClever WPC Product Bundles for WooComme...Missing Authorization vulnerability in WPClever WPC Product Bundles for WooCommerce woo-product-bundle allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WPC Product Bundles for WooCommerce: from n/a through <= 8.4.5. |
2026-03-13 | |
| CVE-2026-32405 | 5.3 | MEDIUM | CWE-497 | 0.0% p11 | 3.71 | Exposure of Sensitive System Information to an Unauthorized Control Sphere vulne...Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in xtemos WoodMart woodmart allows Retrieve Embedded Sensitive Data.This issue affects WoodMart: from n/a through <= 8.3.9. |
2026-03-13 | |
| CVE-2026-32404 | 5.3 | MEDIUM | CWE-862 | 0.0% p12 | 3.71 | Missing Authorization vulnerability in Studio99 Studio99 WP Monitor studio99-wp-...Missing Authorization vulnerability in Studio99 Studio99 WP Monitor studio99-wp-monitor allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Studio99 WP Monitor: from n/a through <= 1.0.3. |
2026-03-13 | |
| CVE-2026-32403 | 6.5 | MEDIUM | CWE-79 | 0.0% p11 | 4.55 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in toocheke Toocheke Companion toocheke-companion allows DOM-Based XSS.This issue affects Toocheke Companion: from n/a through <= 1.194. |
2026-03-13 | |
| CVE-2026-32402 | 5.3 | MEDIUM | CWE-862 | 0.0% p12 | 3.71 | Missing Authorization vulnerability in Ays Pro Image Slider by Ays ays-slider al...Missing Authorization vulnerability in Ays Pro Image Slider by Ays ays-slider allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Image Slider by Ays: from n/a through <= 2.7.1. |
2026-03-13 | |
| CVE-2026-32401 | 7.2 | HIGH | CWE-98 | 0.2% p35 | 5.04 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in BoldGrid Client Invoicing by Sprout Invoices sprout-invoices allows PHP Local File Inclusion.This issue affects Client Invoicing by Sprout Invoices: from n/a through <= 20.8.9. |
2026-03-13 | |
| CVE-2026-32400 | 7.5 | HIGH | CWE-98 | 0.1% p35 | 5.25 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemetechMount Boldman boldman allows PHP Local File Inclusion.This issue affects Boldman: from n/a through <= 7.7. |
2026-03-13 | |
| CVE-2026-32399 | 8.5 | HIGH | CWE-89 | 0.0% p11 | 5.95 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti...Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in David Lingren Media LIbrary Assistant media-library-assistant allows Blind SQL Injection.This issue affects Media LIbrary Assistant: from n/a through <= 3.32. |
2026-03-13 | |
| CVE-2026-32398 | 5.3 | MEDIUM | CWE-362 | 0.1% p15 | 3.71 | Concurrent Execution using Shared Resource with Improper Synchronization ('Race ...Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') vulnerability in Subrata Mal TeraWallet – For WooCommerce woo-wallet allows Leveraging Race Conditions.This issue affects TeraWallet – For WooCommerce: from n/a through <= 1.5.15. |
2026-03-13 | |
| CVE-2026-32397 | 5.3 | MEDIUM | CWE-862 | 0.0% p12 | 3.71 | Missing Authorization vulnerability in YMC Filter & Grids ymc-smart-filter allow...Missing Authorization vulnerability in YMC Filter & Grids ymc-smart-filter allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Filter & Grids: from n/a through <= 3.5.1. |
2026-03-13 | |
| CVE-2026-32396 | 5.3 | MEDIUM | CWE-862 | 0.0% p12 | 3.71 | Missing Authorization vulnerability in RadiusTheme Team tlp-team allows Exploiti...Missing Authorization vulnerability in RadiusTheme Team tlp-team allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Team: from n/a through <= 5.0.13. |
2026-03-13 | |
| CVE-2026-32395 | 5.3 | MEDIUM | CWE-862 | 0.0% p12 | 3.71 | Missing Authorization vulnerability in Xpro Xpro Addons For Beaver Builder ̵...Missing Authorization vulnerability in Xpro Xpro Addons For Beaver Builder – Lite xpro-addons-beaver-builder-elementor allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Xpro Addons For Beaver Builder – Lite: from n/a through <= 1.5.6. |
2026-03-13 | |
| CVE-2026-32394 | 4.3 | MEDIUM | CWE-862 | 0.0% p9 | 3.01 | Missing Authorization vulnerability in PublishPress PublishPress Capabilities ca...Missing Authorization vulnerability in PublishPress PublishPress Capabilities capability-manager-enhanced allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects PublishPress Capabilities: from n/a through <= 2.31.0. |
2026-03-13 | |
| CVE-2026-32393 | 7.5 | HIGH | CWE-98 | 0.1% p35 | 5.25 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Creatives_Planet Greenly Theme Addons greenly-addons allows PHP Local File Inclusion.This issue affects Greenly Theme Addons: from n/a through < 8.2. |
2026-03-13 | |
| CVE-2026-32392 | 7.5 | HIGH | CWE-98 | 0.1% p35 | 5.25 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Creatives_Planet Greenly greenly allows PHP Local File Inclusion.This issue affects Greenly: from n/a through <= 8.1. |
2026-03-13 | |
| CVE-2026-32391 | 5.4 | MEDIUM | CWE-862 | 0.0% p9 | 3.78 | Missing Authorization vulnerability in linethemes SmartFix smartfix allows Explo...Missing Authorization vulnerability in linethemes SmartFix smartfix allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects SmartFix: from n/a through < 1.2.4. |
2026-03-13 | |
| CVE-2026-32390 | 5.4 | MEDIUM | CWE-862 | 0.0% p13 | 3.78 | Missing Authorization vulnerability in linethemes Nanosoft nanosoft allows Explo...Missing Authorization vulnerability in linethemes Nanosoft nanosoft allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Nanosoft: from n/a through < 1.3.2. |
2026-03-13 | |
| CVE-2026-32388 | 5.4 | MEDIUM | CWE-862 | 0.0% p9 | 3.78 | Missing Authorization vulnerability in linethemes GLB glb allows Exploiting Inco...Missing Authorization vulnerability in linethemes GLB glb allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects GLB: from n/a through <= 1.2.2. |
2026-03-13 | |
| CVE-2026-32387 | 5.3 | MEDIUM | CWE-862 | 0.0% p12 | 3.71 | Missing Authorization vulnerability in Noor Alam Checkout for PayPal checkout-fo...Missing Authorization vulnerability in Noor Alam Checkout for PayPal checkout-for-paypal allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Checkout for PayPal: from n/a through <= 1.0.46. |
2026-03-13 | |
| CVE-2026-32386 | 5.4 | MEDIUM | CWE-862 | 0.0% p9 | 3.78 | Missing Authorization vulnerability in EnvoThemes Envo Extra envo-extra allows E...Missing Authorization vulnerability in EnvoThemes Envo Extra envo-extra allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Envo Extra: from n/a through <= 1.9.13. |
2026-03-13 | |
| CVE-2026-32385 | 5.4 | MEDIUM | CWE-862 | 0.0% p13 | 3.78 | Missing Authorization vulnerability in Metagauss RegistrationMagic custom-regist...Missing Authorization vulnerability in Metagauss RegistrationMagic custom-registration-form-builder-with-submission-manager allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects RegistrationMagic: from n/a through <= 6.0.7.6. |
2026-03-13 | |
| CVE-2026-32384 | 7.5 | HIGH | CWE-98 | 0.1% p35 | 5.25 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in magepeopleteam WpBookingly service-booking-manager allows PHP Local File Inclusion.This issue affects WpBookingly: from n/a through <= 1.2.9. |
2026-03-13 | |
| CVE-2026-32383 | 5.3 | MEDIUM | CWE-862 | 0.0% p12 | 3.71 | Missing Authorization vulnerability in raratheme Ridhi ridhi allows Exploiting I...Missing Authorization vulnerability in raratheme Ridhi ridhi allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Ridhi: from n/a through <= 1.1.2. |
2026-03-13 | |
| CVE-2026-32382 | 5.3 | MEDIUM | CWE-862 | 0.0% p12 | 3.71 | Missing Authorization vulnerability in raratheme Digital Download digital-downlo...Missing Authorization vulnerability in raratheme Digital Download digital-download allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Digital Download: from n/a through <= 1.1.4. |
2026-03-13 | |
| CVE-2026-32381 | 5.3 | MEDIUM | CWE-862 | 0.0% p12 | 3.71 | Missing Authorization vulnerability in raratheme App Landing Page app-landing-pa...Missing Authorization vulnerability in raratheme App Landing Page app-landing-page allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects App Landing Page: from n/a through <= 1.2.2. |
2026-03-13 | |
| CVE-2026-32380 | 5.3 | MEDIUM | CWE-862 | 0.0% p12 | 3.71 | Missing Authorization vulnerability in raratheme Numinous numinous allows Exploi...Missing Authorization vulnerability in raratheme Numinous numinous allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Numinous: from n/a through <= 1.3.0. |
2026-03-13 | |
| CVE-2026-32379 | 5.3 | MEDIUM | CWE-862 | 0.0% p12 | 3.71 | Missing Authorization vulnerability in raratheme Rara Academic rara-academic all...Missing Authorization vulnerability in raratheme Rara Academic rara-academic allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Rara Academic: from n/a through <= 1.2.2. |
2026-03-13 | |
| CVE-2026-32378 | 5.3 | MEDIUM | CWE-862 | 0.0% p12 | 3.71 | Missing Authorization vulnerability in raratheme Book Landing Page book-landing-...Missing Authorization vulnerability in raratheme Book Landing Page book-landing-page allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Book Landing Page: from n/a through <= 1.2.7. |
2026-03-13 | |
| CVE-2026-32377 | 5.3 | MEDIUM | CWE-862 | 0.0% p12 | 3.71 | Missing Authorization vulnerability in raratheme Pranayama Yoga pranayama-yoga a...Missing Authorization vulnerability in raratheme Pranayama Yoga pranayama-yoga allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Pranayama Yoga: from n/a through <= 1.2.2. |
2026-03-13 | |
| CVE-2026-32376 | 5.3 | MEDIUM | CWE-862 | 0.0% p12 | 3.71 | Missing Authorization vulnerability in raratheme Kalon kalon allows Exploiting I...Missing Authorization vulnerability in raratheme Kalon kalon allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Kalon: from n/a through <= 1.2.9. |
2026-03-13 | |
| CVE-2026-32375 | 5.3 | MEDIUM | CWE-862 | 0.0% p12 | 3.71 | Missing Authorization vulnerability in raratheme Travel Diaries travel-diaries a...Missing Authorization vulnerability in raratheme Travel Diaries travel-diaries allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Travel Diaries: from n/a through <= 1.2.4. |
2026-03-13 | |
| CVE-2026-32374 | 5.3 | MEDIUM | CWE-862 | 0.0% p12 | 3.71 | Missing Authorization vulnerability in raratheme The Minimal the-minimal allows ...Missing Authorization vulnerability in raratheme The Minimal the-minimal allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects The Minimal: from n/a through <= 1.2.9. |
2026-03-13 | |
| CVE-2026-32373 | 5.4 | MEDIUM | CWE-862 | 0.0% p13 | 3.78 | Missing Authorization vulnerability in Cozy Vision SMS Alert Order Notifications...Missing Authorization vulnerability in Cozy Vision SMS Alert Order Notifications sms-alert allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects SMS Alert Order Notifications: from n/a through <= 3.9.0. |
2026-03-13 | |
| CVE-2026-32372 | 5.3 | MEDIUM | CWE-497 | 0.0% p11 | 3.71 | Exposure of Sensitive System Information to an Unauthorized Control Sphere vulne...Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in RadiusTheme ShopBuilder – Elementor WooCommerce Builder Addons shopbuilder allows Retrieve Embedded Sensitive Data.This issue affects ShopBuilder – Elementor WooCommerce Builder Addons: from n/a through <= 3.2.4. |
2026-03-13 | |
| CVE-2026-32371 | 5.3 | MEDIUM | CWE-862 | 0.0% p12 | 3.71 | Missing Authorization vulnerability in raratheme Elegant Pink elegant-pink allow...Missing Authorization vulnerability in raratheme Elegant Pink elegant-pink allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Elegant Pink: from n/a through <= 1.3.3. |
2026-03-13 | |
| CVE-2026-32370 | 5.3 | MEDIUM | CWE-862 | 0.0% p12 | 3.71 | Missing Authorization vulnerability in raratheme Influencer influencer allows Ex...Missing Authorization vulnerability in raratheme Influencer influencer allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Influencer: from n/a through <= 1.1.7. |
2026-03-13 | |
| CVE-2026-32369 | 7.5 | HIGH | CWE-98 | 0.1% p35 | 5.25 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in RadiusTheme Medilink-Core medilink-core allows PHP Local File Inclusion.This issue affects Medilink-Core: from n/a through < 2.0.7. |
2026-03-13 | |
| CVE-2026-32368 | 8.5 | HIGH | CWE-89 | 0.0% p11 | 5.95 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti...Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in delphiknight Geo to Lat geo-to-lat allows Blind SQL Injection.This issue affects Geo to Lat: from n/a through <= 1.0.19. |
2026-03-13 | |
| CVE-2026-32367 | 9.1 | CRITICAL | CWE-94 | 0.1% p19 | 6.37 | Improper Control of Generation of Code ('Code Injection') vulnerability in Yanni...Improper Control of Generation of Code ('Code Injection') vulnerability in Yannick Lefebvre Modal Dialog modal-dialog allows Remote Code Inclusion.This issue affects Modal Dialog: from n/a through <= 3.5.16. |
2026-03-13 | |
| CVE-2026-32366 | 8.5 | HIGH | CWE-89 | 0.0% p11 | 5.95 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti...Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in robfelty Collapsing Categories collapsing-categories allows Blind SQL Injection.This issue affects Collapsing Categories: from n/a through <= 3.0.9. |
2026-03-13 | |
| CVE-2026-32365 | 8.5 | HIGH | CWE-89 | 0.0% p11 | 5.95 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti...Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in robfelty Collapsing Archives collapsing-archives allows Blind SQL Injection.This issue affects Collapsing Archives: from n/a through <= 3.0.7. |
2026-03-13 | |
| CVE-2026-32364 | 7.5 | HIGH | CWE-98 | 0.1% p35 | 5.25 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in redqteam Turbo Manager turbo-manager allows PHP Local File Inclusion.This issue affects Turbo Manager: from n/a through < 4.0.8. |
2026-03-13 | |
| CVE-2026-32363 | 5.3 | MEDIUM | CWE-862 | 0.0% p12 | 3.71 | Missing Authorization vulnerability in Funlus Oy WPLifeCycle free-php-version-in...Missing Authorization vulnerability in Funlus Oy WPLifeCycle free-php-version-info allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WPLifeCycle: from n/a through <= 3.3.1. |
2026-03-13 | |
| CVE-2026-32362 | 5.3 | MEDIUM | CWE-862 | 0.0% p12 | 3.71 | Missing Authorization vulnerability in activity-log.com WP Sessions Time Monitor...Missing Authorization vulnerability in activity-log.com WP Sessions Time Monitoring Full Automatic activitytime allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Sessions Time Monitoring Full Automatic: from n/a through <= 1.1.3. |
2026-03-13 | |
| CVE-2026-32361 | 6.5 | MEDIUM | CWE-79 | 0.0% p11 | 4.55 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Marketing Fire Editorial Calendar editorial-calendar allows DOM-Based XSS.This issue affects Editorial Calendar: from n/a through <= 3.9.0. |
2026-03-13 | |
| CVE-2026-32360 | 5.9 | MEDIUM | CWE-79 | 0.0% p10 | 4.13 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in richplugins Rich Showcase for Google Reviews widget-google-reviews allows Stored XSS.This issue affects Rich Showcase for Google Reviews: from n/a through <= 6.9.4.3. |
2026-03-13 | |
| CVE-2026-32359 | 6.5 | MEDIUM | CWE-79 | 0.0% p11 | 4.55 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in bPlugins Icon List Block icon-list-block allows Stored XSS.This issue affects Icon List Block: from n/a through <= 1.2.3. |
2026-03-13 | |
| CVE-2026-32358 | 7.6 | HIGH | CWE-89 | 0.0% p11 | 5.32 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti...Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in wpdevelop Booking Calendar booking allows Blind SQL Injection.This issue affects Booking Calendar: from n/a through <= 10.14.15. |
2026-03-13 | |
| CVE-2026-32357 | 6.4 | MEDIUM | CWE-918 | 0.0% p9 | 4.48 | Server-Side Request Forgery (SSRF) vulnerability in Katsushi Kawamori Simple Blo...Server-Side Request Forgery (SSRF) vulnerability in Katsushi Kawamori Simple Blog Card simple-blog-card allows Server Side Request Forgery.This issue affects Simple Blog Card: from n/a through <= 2.37. |
2026-03-13 | |
| CVE-2026-32356 | 6.5 | MEDIUM | CWE-79 | 0.0% p11 | 4.55 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in robosoft Robo Gallery robo-gallery allows DOM-Based XSS.This issue affects Robo Gallery: from n/a through <= 5.1.2. |
2026-03-13 | |
| CVE-2026-32355 | 8.8 | HIGH | CWE-502 | 0.1% p19 | 6.16 | Deserialization of Untrusted Data vulnerability in Crocoblock JetEngine jet-engi...Deserialization of Untrusted Data vulnerability in Crocoblock JetEngine jet-engine allows Object Injection.This issue affects JetEngine: from n/a through < 3.8.4.1. |
2026-03-13 | |
| CVE-2026-32354 | 5.3 | MEDIUM | CWE-201 | 0.0% p11 | 3.71 | Insertion of Sensitive Information Into Sent Data vulnerability in magepeopletea...Insertion of Sensitive Information Into Sent Data vulnerability in magepeopleteam WpEvently mage-eventpress allows Retrieve Embedded Sensitive Data.This issue affects WpEvently: from n/a through < 5.1.9. |
2026-03-13 | |
| CVE-2026-32353 | 6.4 | MEDIUM | CWE-918 | 0.0% p9 | 4.48 | Server-Side Request Forgery (SSRF) vulnerability in MailerPress Team MailerPress...Server-Side Request Forgery (SSRF) vulnerability in MailerPress Team MailerPress mailerpress allows Server Side Request Forgery.This issue affects MailerPress: from n/a through <= 1.4.2. |
2026-03-13 | |
| CVE-2026-32352 | 6.5 | MEDIUM | CWE-79 | 0.0% p11 | 4.55 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Elementor Elementor Website Builder elementor allows DOM-Based XSS.This issue affects Elementor Website Builder: from n/a through <= 3.35.5. |
2026-03-13 | |
| CVE-2026-32351 | 5.9 | MEDIUM | CWE-79 | 0.0% p10 | 4.13 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in blubrry PowerPress Podcasting powerpress allows Stored XSS.This issue affects PowerPress Podcasting: from n/a through <= 11.15.13. |
2026-03-13 | |
| CVE-2026-32350 | 5.3 | MEDIUM | CWE-862 | 0.0% p12 | 3.71 | Missing Authorization vulnerability in wpradiant Chocolate House chocolate-house...Missing Authorization vulnerability in wpradiant Chocolate House chocolate-house allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Chocolate House: from n/a through <= 1.1.5. |
2026-03-13 | |
| CVE-2026-32349 | 4.9 | MEDIUM | CWE-918 | 0.0% p9 | 3.43 | Server-Side Request Forgery (SSRF) vulnerability in Andy Fragen Embed PDF Viewer...Server-Side Request Forgery (SSRF) vulnerability in Andy Fragen Embed PDF Viewer embed-pdf-viewer allows Server Side Request Forgery.This issue affects Embed PDF Viewer: from n/a through <= 2.4.7. |
2026-03-13 | |
| CVE-2026-32348 | 5.3 | MEDIUM | CWE-862 | 0.0% p12 | 3.71 | Missing Authorization vulnerability in MadrasThemes MAS Videos masvideos allows ...Missing Authorization vulnerability in MadrasThemes MAS Videos masvideos allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects MAS Videos: from n/a through <= 1.3.2. |
2026-03-13 | |
| CVE-2026-32347 | 5.3 | MEDIUM | CWE-862 | 0.0% p12 | 3.71 | Missing Authorization vulnerability in raratheme Restaurant and Cafe restaurant-...Missing Authorization vulnerability in raratheme Restaurant and Cafe restaurant-and-cafe allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Restaurant and Cafe: from n/a through <= 1.2.5. |
2026-03-13 | |
| CVE-2026-32346 | 5.3 | MEDIUM | CWE-862 | 0.0% p12 | 3.71 | Missing Authorization vulnerability in raratheme Travel Agency travel-agency all...Missing Authorization vulnerability in raratheme Travel Agency travel-agency allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Travel Agency: from n/a through <= 1.5.5. |
2026-03-13 | |
| CVE-2026-32345 | 5.3 | MEDIUM | CWE-862 | 0.0% p12 | 3.71 | Missing Authorization vulnerability in raratheme Perfect Portfolio perfect-portf...Missing Authorization vulnerability in raratheme Perfect Portfolio perfect-portfolio allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Perfect Portfolio: from n/a through <= 1.2.4. |
2026-03-13 | |
| CVE-2026-32344 | 4.3 | MEDIUM | CWE-352 | 0.0% p4 | 3.01 | Cross-Site Request Forgery (CSRF) vulnerability in desertthemes Corpiva corpiva ...Cross-Site Request Forgery (CSRF) vulnerability in desertthemes Corpiva corpiva allows Cross Site Request Forgery.This issue affects Corpiva: from n/a through <= 1.0.96. |
2026-03-13 | |
| CVE-2026-32343 | 4.3 | MEDIUM | CWE-352 | 0.0% p4 | 3.01 | Cross-Site Request Forgery (CSRF) vulnerability in Magazine3 Easy Table of Conte...Cross-Site Request Forgery (CSRF) vulnerability in Magazine3 Easy Table of Contents easy-table-of-contents allows Cross Site Request Forgery.This issue affects Easy Table of Contents: from n/a through <= 2.0.80. |
2026-03-13 | |
| CVE-2026-32342 | 4.3 | MEDIUM | CWE-352 | 0.0% p4 | 3.01 | Cross-Site Request Forgery (CSRF) vulnerability in Ays Pro Quiz Maker quiz-maker...Cross-Site Request Forgery (CSRF) vulnerability in Ays Pro Quiz Maker quiz-maker allows Cross Site Request Forgery.This issue affects Quiz Maker: from n/a through <= 6.7.1.2. |
2026-03-13 | |
| CVE-2026-32341 | 5.3 | MEDIUM | CWE-862 | 0.0% p12 | 3.71 | Missing Authorization vulnerability in raratheme Benevolent benevolent allows Ex...Missing Authorization vulnerability in raratheme Benevolent benevolent allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Benevolent: from n/a through <= 1.3.9. |
2026-03-13 | |
| CVE-2026-32340 | 5.3 | MEDIUM | CWE-862 | 0.0% p12 | 3.71 | Missing Authorization vulnerability in raratheme Business One Page business-one-...Missing Authorization vulnerability in raratheme Business One Page business-one-page allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Business One Page: from n/a through <= 1.3.2. |
2026-03-13 | |
| CVE-2026-32339 | 5.3 | MEDIUM | CWE-862 | 0.0% p12 | 3.71 | Missing Authorization vulnerability in raratheme Bakes And Cakes bakes-and-cakes...Missing Authorization vulnerability in raratheme Bakes And Cakes bakes-and-cakes allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Bakes And Cakes: from n/a through <= 1.2.9. |
2026-03-13 | |
| CVE-2026-32338 | 5.3 | MEDIUM | CWE-862 | 0.0% p12 | 3.71 | Missing Authorization vulnerability in raratheme Construction Landing Page const...Missing Authorization vulnerability in raratheme Construction Landing Page construction-landing-page allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Construction Landing Page: from n/a through <= 1.4.1. |
2026-03-13 | |
| CVE-2026-32337 | 5.3 | MEDIUM | CWE-862 | 0.0% p12 | 3.71 | Missing Authorization vulnerability in raratheme Preschool and Kindergarten pres...Missing Authorization vulnerability in raratheme Preschool and Kindergarten preschool-and-kindergarten allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Preschool and Kindergarten: from n/a through <= 1.2.5. |
2026-03-13 | |
| CVE-2026-32336 | 5.3 | MEDIUM | CWE-862 | 0.0% p12 | 3.71 | Missing Authorization vulnerability in raratheme Rara Business rara-business all...Missing Authorization vulnerability in raratheme Rara Business rara-business allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Rara Business: from n/a through <= 1.3.0. |
2026-03-13 | |
| CVE-2026-32335 | 5.3 | MEDIUM | CWE-862 | 0.0% p12 | 3.71 | Missing Authorization vulnerability in raratheme The Conference the-conference a...Missing Authorization vulnerability in raratheme The Conference the-conference allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects The Conference: from n/a through <= 1.2.5. |
2026-03-13 | |
| CVE-2026-32334 | 5.3 | MEDIUM | CWE-862 | 0.0% p12 | 3.71 | Missing Authorization vulnerability in raratheme JobScout jobscout allows Exploi...Missing Authorization vulnerability in raratheme JobScout jobscout allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects JobScout: from n/a through <= 1.1.7. |
2026-03-13 | |
| CVE-2026-32332 | 5.3 | MEDIUM | CWE-862 | 0.0% p12 | 3.71 | Missing Authorization vulnerability in Ays Pro Easy Form easy-form allows Exploi...Missing Authorization vulnerability in Ays Pro Easy Form easy-form allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Easy Form: from n/a through <= 2.7.9. |
2026-03-13 | |
| CVE-2026-32331 | 4.3 | MEDIUM | CWE-862 | 0.0% p9 | 3.01 | Missing Authorization vulnerability in Israpil Textmetrics webtexttool allows Ex...Missing Authorization vulnerability in Israpil Textmetrics webtexttool allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Textmetrics: from n/a through <= 3.6.4. |
2026-03-13 | |
| CVE-2026-32330 | 4.3 | MEDIUM | CWE-352 | 0.0% p4 | 3.01 | Cross-Site Request Forgery (CSRF) vulnerability in 10Web Photo Gallery by 10Web ...Cross-Site Request Forgery (CSRF) vulnerability in 10Web Photo Gallery by 10Web photo-gallery allows Cross Site Request Forgery.This issue affects Photo Gallery by 10Web: from n/a through <= 1.8.37. |
2026-03-13 | |
| CVE-2026-32329 | 5.3 | MEDIUM | CWE-862 | 0.0% p12 | 3.71 | Missing Authorization vulnerability in Ays Pro Advanced Related Posts advanced-r...Missing Authorization vulnerability in Ays Pro Advanced Related Posts advanced-related-posts allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Advanced Related Posts: from n/a through <= 1.9.1. |
2026-03-13 | |
| CVE-2026-32328 | 5.4 | MEDIUM | CWE-352 | 0.0% p4 | 3.78 | Cross-Site Request Forgery (CSRF) vulnerability in shufflehound Lemmony lemmony ...Cross-Site Request Forgery (CSRF) vulnerability in shufflehound Lemmony lemmony allows Cross Site Request Forgery.This issue affects Lemmony: from n/a through < 1.7.1. |
2026-03-13 | |
| CVE-2026-32322 | 5.3 | MEDIUM | CWE-697 | 0.0% p3 | 3.71 | soroban-sdk is a Rust SDK for Soroban contracts. Prior to 22.0.11, 23.5.3, and 2...soroban-sdk is a Rust SDK for Soroban contracts. Prior to 22.0.11, 23.5.3, and 25.3.0, The Fr (scalar field) types for BN254 and BLS12-381 in soroban-sdk compared values using their raw U256 representation without first reducing modulo the field modulus r. This caused mathematically equal field elements to compare as not-equal when one or both values were unreduced (i.e., >= r). The vulnerability requires an attacker to supply crafted Fr values through contract inputs, and compare them directly without going through host-side arithmetic operations. Smart contracts that rely on Fr equality checks for security-critical logic could produce incorrect results. The impact depends on how the affected contract uses Fr equality comparisons, but can result in incorrect authorization decisions or validation bypasses in contracts that perform equality checks on user-supplied scalar values. This vulnerability is fixed in 22.0.11, 23.5.3, and 25.3.0. |
2026-03-13 | |
| CVE-2026-32320 | 6.5 | MEDIUM | CWE-125 | 0.1% p17 | 4.55 | Ella Core is a 5G core designed for private networks. Prior to 1.5.1, Ella Core ...Ella Core is a 5G core designed for private networks. Prior to 1.5.1, Ella Core panics when processing a PathSwitchRequest containing UE Security Capabilities with zero-length NR encryption or integrity protection algorithm bitstrings, resulting in a denial of service. An attacker able to send crafted NGAP messages to Ella Core can crash the process, causing service disruption for all connected subscribers. No authentication is required. This vulnerability is fixed in 1.5.1. |
2026-03-13 | |
| CVE-2026-32319 | 7.5 | HIGH | CWE-125 | 0.1% p20 | 5.25 | Ella Core is a 5G core designed for private networks. Prior to 1.5.1, Ella Core ...Ella Core is a 5G core designed for private networks. Prior to 1.5.1, Ella Core panics when processing a malformed integrity protected NGAP/NAS message with a length under 7 bytes. An attacker able to send crafted NAS messages to Ella Core can crash the process, causing service disruption for all connected subscribers. No authentication is required. This vulnerability is fixed in 1.5.1. |
2026-03-13 | |
| CVE-2026-32308 | 7.6 | HIGH | CWE-79 | 0.0% p13 | 5.32 | OneUptime is a solution for monitoring and managing online services. Prior to 10...OneUptime is a solution for monitoring and managing online services. Prior to 10.0.23, the Markdown viewer component renders Mermaid diagrams with securityLevel: "loose" and injects the SVG output via innerHTML. This configuration explicitly allows interactive event bindings in Mermaid diagrams, enabling XSS through Mermaid's click directive which can execute arbitrary JavaScript. Any field that renders markdown (incident descriptions, status page announcements, monitor notes) is vulnerable. This vulnerability is fixed in 10.0.23. |
2026-03-13 | |
| CVE-2026-32306 | 9.9 | CRITICAL | CWE-89 | 0.5% p63 | 6.94 | OneUptime is a solution for monitoring and managing online services. Prior to 10...OneUptime is a solution for monitoring and managing online services. Prior to 10.0.23, the telemetry aggregation API accepts user-controlled aggregationType, aggregateColumnName, and aggregationTimestampColumnName parameters and interpolates them directly into ClickHouse SQL queries via the .append() method (documented as "trusted SQL"). There is no allowlist, no parameterized query binding, and no input validation. An authenticated user can inject arbitrary SQL into ClickHouse, enabling full database read (including telemetry data from all tenants), data modification, and potential remote code execution via ClickHouse table functions. This vulnerability is fixed in 10.0.23. |
2026-03-13 | |
| CVE-2026-32304 | 9.8 | CRITICAL | CWE-94 | 0.1% p29 | 6.86 | Locutus brings stdlibs of other programming languages to JavaScript for educatio...Locutus brings stdlibs of other programming languages to JavaScript for educational purposes. Prior to 3.0.14, the create_function(args, code) function passes both parameters directly to the Function constructor without any sanitization, allowing arbitrary code execution. This is distinct from CVE-2026-29091 which was call_user_func_array using eval() in v2.x. This finding affects create_function using new Function() in v3.x. This vulnerability is fixed in 3.0.14. |
2026-03-13 | |
| CVE-2026-32302 | 8.1 | HIGH | CWE-346 | 0.0% p4 | 5.67 | OpenClaw is a personal AI assistant. Prior to 2026.3.11, browser-originated WebS...OpenClaw is a personal AI assistant. Prior to 2026.3.11, browser-originated WebSocket connections could bypass origin validation when gateway.auth.mode was set to trusted-proxy and the request arrived with proxy headers. A page served from an untrusted origin could connect through a trusted reverse proxy, inherit proxy-authenticated identity, and establish a privileged operator session. This vulnerability is fixed in 2026.3.11. |
2026-03-13 | |
| CVE-2026-32301 | 9.3 | CRITICAL | CWE-918 | 0.1% p22 | 6.51 | Centrifugo is an open-source scalable real-time messaging server. Prior to 6.7.0...Centrifugo is an open-source scalable real-time messaging server. Prior to 6.7.0, Centrifugo is vulnerable to Server-Side Request Forgery (SSRF) when configured with a dynamic JWKS endpoint URL using template variables (e.g. {{tenant}}). An unauthenticated attacker can craft a JWT with a malicious iss or aud claim value that gets interpolated into the JWKS fetch URL before the token signature is verified, causing Centrifugo to make an outbound HTTP request to an attacker-controlled destination. This vulnerability is fixed in 6.7.0. |
2026-03-13 | |
| CVE-2026-31949 | 6.5 | MEDIUM | CWE-248 | 0.1% p17 | 4.55 | LibreChat is a ChatGPT clone with additional features. Prior to 0.8.3-rc1, a Den...LibreChat is a ChatGPT clone with additional features. Prior to 0.8.3-rc1, a Denial of Service (DoS) vulnerability exists in the DELETE /api/convos endpoint that allows an authenticated attacker to crash the Node.js server process by sending malformed requests. The DELETE /api/convos route handler attempts to destructure req.body.arg without validating that it exists. The server crashes due to an unhandled TypeError that bypasses Express error handling middleware and triggers process.exit(1). This vulnerability is fixed in 0.8.3-rc1. |
2026-03-13 | |
| CVE-2026-31944 | 7.6 | HIGH | CWE-306 | 0.0% p10 | 5.32 | LibreChat is a ChatGPT clone with additional features. From 0.8.2 to 0.8.2-rc3, ...LibreChat is a ChatGPT clone with additional features. From 0.8.2 to 0.8.2-rc3, The MCP (Model Context Protocol) OAuth callback endpoint accepts the redirect from the identity provider and stores OAuth tokens for the user who initiated the flow, without verifying that the browser hitting the redirect URL is logged in or that the logged-in user matches the initiator. An attacker can send the authorization URL to a victim; when the victim completes the flow, the victim’s OAuth tokens are stored on the attacker’s LibreChat account, enabling account takeover of the victim’s MCP-linked services (e.g. Atlassian, Outlook). This vulnerability is fixed in 0.8.3-rc1. |
2026-03-13 | |
| CVE-2026-31922 | 8.5 | HIGH | CWE-89 | 0.0% p11 | 5.95 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti...Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Ays Pro Fox LMS fox-lms allows Blind SQL Injection.This issue affects Fox LMS: from n/a through <= 1.0.6.3. |
2026-03-13 | |
| CVE-2026-31919 | 4.3 | MEDIUM | CWE-862 | 0.0% p1 | 3.01 | Missing Authorization vulnerability in Josh Kohlbach Advanced Coupons for WooCom...Missing Authorization vulnerability in Josh Kohlbach Advanced Coupons for WooCommerce Coupons advanced-coupons-for-woocommerce-free allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Advanced Coupons for WooCommerce Coupons: from n/a through <= 4.7.1. |
2026-03-13 | |
| CVE-2026-31918 | 6.5 | MEDIUM | CWE-79 | 0.0% p11 | 4.55 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in immonex immonex Kickstart immonex-kickstart allows Stored XSS.This issue affects immonex Kickstart: from n/a through <= 1.13.0. |
2026-03-13 | |
| CVE-2026-31917 | 8.5 | HIGH | CWE-89 | 0.0% p11 | 5.95 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti...Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in weDevs WP ERP erp allows SQL Injection.This issue affects WP ERP: from n/a through <= 1.16.10. |
2026-03-13 | |
| CVE-2026-31916 | 5.3 | MEDIUM | CWE-862 | 0.0% p12 | 3.71 | Missing Authorization vulnerability in Iulia Cazan Latest Post Shortcode latest-...Missing Authorization vulnerability in Iulia Cazan Latest Post Shortcode latest-post-shortcode allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Latest Post Shortcode: from n/a through <= 14.2.1. |
2026-03-13 | |
| CVE-2026-31915 | 5.3 | MEDIUM | CWE-862 | 0.0% p12 | 3.71 | Missing Authorization vulnerability in UX-themes Flatsome flatsome allows Exploi...Missing Authorization vulnerability in UX-themes Flatsome flatsome allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Flatsome: from n/a through <= 3.19.6. |
2026-03-13 | |
| CVE-2026-31899 | 7.5 | HIGH | CWE-674 | 0.1% p18 | 5.25 | CairoSVG is an SVG converter based on Cairo, a 2D graphics library. Prior to Koz...CairoSVG is an SVG converter based on Cairo, a 2D graphics library. Prior to Kozea/CairoSVG has exponential denial of service via recursive <use> element amplification in cairosvg/defs.py. This causes CPU exhaustion from a small input. |
2026-03-13 | |
| CVE-2026-31897 | 0.0 | NONE | CWE-125 | 0.0% p11 | 0.00 | FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.24.0...FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.24.0, there is an out-of-bounds read in freerdp_bitmap_decompress_planar when SrcSize is 0. The function dereferences *srcp (which points to pSrcData) without first verifying that SrcSize >= 1. When SrcSize is 0 and pSrcData is non-NULL, this reads one byte past the end of the source buffer. This vulnerability is fixed in 3.24.0. |
2026-03-13 | |
| CVE-2026-31886 | 9.1 | CRITICAL | CWE-22 | 0.2% p38 | 6.38 | Dagu is a workflow engine with a built-in Web user interface. Prior to 2.2.4, th...Dagu is a workflow engine with a built-in Web user interface. Prior to 2.2.4, the dagRunId request field accepted by the inline DAG execution endpoints is passed directly into filepath.Join to construct a temporary directory path without any format validation. Go's filepath.Join resolves .. segments lexically, so a caller can supply a value such as ".." to redirect the computed directory outside the intended /tmp/<name>/<id> path. A deferred cleanup function that calls os.RemoveAll on that directory then runs unconditionally when the HTTP handler returns, deleting whatever directory the traversal resolved to. With dagRunId set to "..", the resolved directory is the system temporary directory (/tmp on Linux). On non-root deployments, os.RemoveAll("/tmp") removes all files in /tmp owned by the dagu process user, disrupting every concurrent dagu run that has live temp files. On root or Docker deployments, the call removes the entire contents of /tmp, causing a system-wide denial of service. This vulnerability is fixed in 2.2.4. |
2026-03-13 | |
| CVE-2026-31885 | 6.5 | MEDIUM | CWE-125 | 0.0% p11 | 4.55 | FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.24.0...FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.24.0, there is an out-of-bounds read in MS-ADPCM and IMA-ADPCM decoders due to unchecked predictor and step_index values from input data. This vulnerability is fixed in 3.24.0. |
2026-03-13 | |
| CVE-2026-31884 | 6.5 | MEDIUM | CWE-369 | 0.0% p9 | 4.55 | FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.24.0...FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.24.0, division by zero in MS-ADPCM and IMA-ADPCM decoders when nBlockAlign is 0, leading to a crash. In libfreerdp/codec/dsp.c, both ADPCM decoders use size % block_size where block_size = context->common.format.nBlockAlign. The nBlockAlign value comes from the Server Audio Formats PDU on the RDPSND channel. The value 0 is not validated anywhere before reaching the decoder. When nBlockAlign = 0, the modulo operation causes a SIGFPE (floating point exception) crash. This vulnerability is fixed in 3.24.0. |
2026-03-13 | |
| CVE-2026-31883 | 6.5 | MEDIUM | CWE-122 | 0.0% p14 | 4.55 | FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.24.0...FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.24.0, a size_t underflow in the IMA-ADPCM and MS-ADPCM audio decoders leads to heap-buffer-overflow write via the RDPSND audio channel. In libfreerdp/codec/dsp.c, the IMA-ADPCM and MS-ADPCM decoders subtract block header sizes from a size_t variable without checking for underflow. When nBlockAlign (received from the server) is set such that size % block_size == 0 triggers the header parsing at a point where size is smaller than the header (4 or 8 bytes), the subtraction wraps size to ~SIZE_MAX. The while (size > 0) loop then continues for an astronomical number of iterations. This vulnerability is fixed in 3.24.0. |
2026-03-13 | |
| CVE-2026-31882 | 7.5 | HIGH | CWE-306 | 0.3% p50 | 5.26 | Dagu is a workflow engine with a built-in Web user interface. Prior to 2.2.4, wh...Dagu is a workflow engine with a built-in Web user interface. Prior to 2.2.4, when Dagu is configured with HTTP Basic authentication (DAGU_AUTH_MODE=basic), all Server-Sent Events (SSE) endpoints are accessible without any credentials. This allows unauthenticated attackers to access real-time DAG execution data, workflow configurations, execution logs, and queue status — bypassing the authentication that protects the REST API. The buildStreamAuthOptions() function builds authentication options for SSE/streaming endpoints. When the auth mode is basic, it returns an auth.Options struct with BasicAuthEnabled: true but AuthRequired defaults to false (Go zero value). The authentication middleware at internal/service/frontend/auth/middleware.go allows unauthenticated requests when AuthRequired is false. This vulnerability is fixed in 2.2.4. |
2026-03-13 | |
| CVE-2026-31864 | 6.8 | MEDIUM | CWE-1336 | 0.1% p15 | 4.76 | JumpServer is an open source bastion host and an operation and maintenance secur...JumpServer is an open source bastion host and an operation and maintenance security audit system. a Server-Side Template Injection (SSTI) vulnerability exists in JumpServer's Applet and VirtualApp upload functionality. This vulnerability can only be exploited by users with administrative privileges (Application Applet Management or Virtual Application Management permissions). Attackers can exploit this vulnerability to execute arbitrary code within the JumpServer Core container. The vulnerability arises from unsafe use of Jinja2 template rendering when processing user-uploaded YAML configuration files. When a user uploads an Applet or VirtualApp ZIP package, the manifest.yml file is rendered through Jinja2 without sandbox restrictions, allowing template injection attacks. |
2026-03-13 | |
| CVE-2026-31814 | 8.7 | HIGH | CWE-190 | 0.1% p19 | 6.09 | Yamux is a stream multiplexer over reliable, ordered connections such as TCP/IP....Yamux is a stream multiplexer over reliable, ordered connections such as TCP/IP. From 0.13.0 to before 0.13.9, a specially crafted WindowUpdate can cause arithmetic overflow in send-window accounting, which triggers a panic in the connection state machine. This is remotely reachable over a normal network connection and does not require authentication. This vulnerability is fixed in 0.13.9. |
2026-03-13 | |
| CVE-2026-31806 | 9.3 | CRITICAL | CWE-122 | 0.0% p5 | 6.51 | FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.24.0...FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.24.0, the gdi_surface_bits() function processes SURFACE_BITS_COMMAND messages sent by the RDP server. When the command is handled using NSCodec, the bmp.width and bmp.height values provided by the server are not properly validated against the actual desktop dimensions. A malicious RDP server can supply crafted bmp.width and bmp.height values that exceed the expected surface size. Because these values are used during bitmap decoding and memory operations without proper bounds checking, this can lead to a heap buffer overflow. Since the attacker can also control the associated pixel data transmitted by the server, the overflow may be exploitable to overwrite adjacent heap memory. This vulnerability is fixed in 3.24.0. |
2026-03-13 | |
| CVE-2026-31798 | 5.0 | MEDIUM | CWE-295 | 0.0% p5 | 3.50 | JumpServer is an open source bastion host and an operation and maintenance secur...JumpServer is an open source bastion host and an operation and maintenance security audit system. Prior to v4.10.16-lts, JumpServer improperly validates certificates in the Custom SMS API Client. When JumpServer sends MFA/OTP codes via Custom SMS API, an attacker can intercept the request and capture the verification code BEFORE it reaches the user's phone. This vulnerability is fixed in v4.10.16-lts. |
2026-03-13 | |
| CVE-2026-30961 | 4.3 | MEDIUM | CWE-770 | 0.0% p8 | 3.01 | Gokapi is a self-hosted file sharing server with automatic expiration and encryp...Gokapi is a self-hosted file sharing server with automatic expiration and encryption support. Prior to 2.2.4, the chunked upload completion path for file requests does not validate the total file size against the per-request MaxSize limit. An attacker with a public file request link can split an oversized file into chunks each under MaxSize and upload them sequentially, bypassing the size restriction entirely. Files up to the server's global MaxFileSizeMB are accepted regardless of the file request's configured limit. This vulnerability is fixed in 2.2.4. |
2026-03-13 | |
| CVE-2026-30955 | 6.5 | MEDIUM | CWE-400 | 0.0% p8 | 4.55 | Gokapi is a self-hosted file sharing server with automatic expiration and encryp...Gokapi is a self-hosted file sharing server with automatic expiration and encryption support. Prior to 2.2.4, An API endpoint accepts unbounded request bodies without any size limit. An authenticated user can cause an OOM kill and complete service disruption for all users. This vulnerability is fixed in 2.2.4. |
2026-03-13 | |
| CVE-2026-30943 | 4.1 | MEDIUM | CWE-863 | 0.0% p1 | 2.87 | Gokapi is a self-hosted file sharing server with automatic expiration and encryp...Gokapi is a self-hosted file sharing server with automatic expiration and encryption support. Prior to 2.2.4, An insufficient authorization check in the file replace API allows a user with only list visibility permission (UserPermListOtherUploads) to delete another user's file by abusing the deleteNewFile flag, bypassing the requirement for UserPermDeleteOtherUploads. This vulnerability is fixed in 2.2.4. |
2026-03-13 | |
| CVE-2026-30915 | 5.3 | MEDIUM | CWE-22 | 0.1% p20 | 3.71 | SFTPGo is an open source, event-driven file transfer solution. SFTPGo versions b...SFTPGo is an open source, event-driven file transfer solution. SFTPGo versions before v2.7.1 contain an input validation issue in the handling of dynamic group paths, for example, home directories or key prefixes. When a group is configured with a dynamic home directory or key prefix using placeholders like %username%, the value replacing the placeholder is not strictly sanitized against relative path components. Consequently, if a user is created with a specially crafted username the resulting path may resolve to a parent directory instead of the intended sub-directory. This issue is fixed in version v2.7.1 |
2026-03-13 | |
| CVE-2026-30914 | 5.3 | MEDIUM | CWE-22 | 0.0% p6 | 3.71 | SFTPGo is an open source, event-driven file transfer solution. In SFTPGo version...SFTPGo is an open source, event-driven file transfer solution. In SFTPGo versions prior to 2.7.1, a path normalization discrepancy between the protocol handlers and the internal Virtual Filesystem routing can lead to an authorization bypass. An authenticated attacker can craft specific file paths to bypass folder-level permissions or escape the boundaries of a configured Virtual Folder. This vulnerability is fixed in 2.7.1. |
2026-03-13 | |
| CVE-2026-30853 | 5.0 | MEDIUM | CWE-22 | 0.0% p2 | 3.50 | calibre is a cross-platform e-book manager for viewing, converting, editing, and...calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Prior to 9.5.0, a path traversal vulnerability in the RocketBook (.rb) input plugin (src/calibre/ebooks/rb/reader.py) allows an attacker to write arbitrary files to any path writable by the calibre process when a user opens or converts a crafted .rb file. This is the same bug class fixed in CVE-2026-26065 for the PDB readers, but the fix was never applied to the RB reader. This vulnerability is fixed in 9.5.0. |
2026-03-13 | |
| CVE-2026-2890 | 7.5 | HIGH | CWE-862 | 0.1% p25 | 5.25 | The Formidable Forms plugin for WordPress is vulnerable to a payment integrity b...The Formidable Forms plugin for WordPress is vulnerable to a payment integrity bypass in all versions up to, and including, 6.28. This is due to the Stripe Link return handler (`handle_one_time_stripe_link_return_url`) marking payment records as complete based solely on the Stripe PaymentIntent status without comparing the intent's charged amount against the expected payment amount, and the `verify_intent()` function validating only client secret ownership without binding intents to specific forms or actions. This makes it possible for unauthenticated attackers to reuse a PaymentIntent from a completed low-value payment to mark a high-value payment as complete, effectively bypassing payment for goods or services. |
2026-03-13 | |
| CVE-2026-2888 | 5.3 | MEDIUM | CWE-639 | 0.1% p26 | 3.71 | The Formidable Forms plugin for WordPress is vulnerable to an authorization bypa...The Formidable Forms plugin for WordPress is vulnerable to an authorization bypass through user-controlled key in all versions up to, and including, 6.28. This is due to the `frm_strp_amount` AJAX handler (`update_intent_ajax`) overwriting the global `$_POST` data with attacker-controlled JSON input and then using those values to recalculate payment amounts via field shortcode resolution in `generate_false_entry()`. The handler relies on a nonce that is publicly exposed in the page's JavaScript (`frm_stripe_vars.nonce`), which provides CSRF protection but not authorization. This makes it possible for unauthenticated attackers to manipulate PaymentIntent amounts before payment completion on forms using dynamic pricing with field shortcodes, effectively paying a reduced amount for goods or services. |
2026-03-13 | |
| CVE-2026-2879 | 5.4 | MEDIUM | CWE-639 | 0.0% p13 | 3.78 | The GetGenie plugin for WordPress is vulnerable to Insecure Direct Object Refere...The GetGenie plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 4.3.2. This is due to missing validation on the `id` parameter in the `create()` method of the `GetGenieChat` REST API endpoint. The method accepts a user-controlled post ID and, when a post with that ID exists, calls `wp_update_post()` without verifying that the current user owns the post or that the post is of the expected `getgenie_chat` type. This makes it possible for authenticated attackers, with Author-level access and above, to overwrite arbitrary posts owned by any user — including Administrators — effectively destroying the original content by changing its `post_type` to `getgenie_chat` and reassigning `post_author` to the attacker. |
2026-03-13 | |
| CVE-2026-2859 | 6.3 | MEDIUM | CWE-204 | 0.0% p14 | 4.41 | Improper permission enforcement in Checkmk versions 2.4.0 before 2.4.0p23, 2.3.0...Improper permission enforcement in Checkmk versions 2.4.0 before 2.4.0p23, 2.3.0 before 2.3.0p43, and 2.2.0 (EOL) allows unauthenticated users to enumerate existing hosts by observing different HTTP response codes in deploy_agent endpoint, which could lead to information disclosure. |
2026-03-13 | |
| CVE-2026-2257 | 6.4 | MEDIUM | CWE-639 | 0.0% p9 | 4.48 | The GetGenie plugin for WordPress is vulnerable to Insecure Direct Object Refere...The GetGenie plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 4.3.2 due to missing validation on a user controlled key in the `action` function. This makes it possible for authenticated attackers, with Author-level access and above, to update post metadata for arbitrary posts. Combined with a lack of input sanitization, this leads to Stored Cross-Site Scripting when a higher-privileged user (such as an Administrator) views the affected post's "Competitor" tab in the GetGenie sidebar. |
2026-03-13 | |
| CVE-2026-29776 | 3.1 | LOW | CWE-190 | 0.0% p12 | 2.17 | FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.24.0...FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.24.0, Integer Underflow in update_read_cache_bitmap_order Function of FreeRDP's Core Library This vulnerability is fixed in 3.24.0. |
2026-03-13 | |
| CVE-2026-29775 | 5.3 | MEDIUM | CWE-787 | 0.1% p17 | 3.71 | FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.24.0...FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.24.0, a client-side heap out-of-bounds read/write occurs in FreeRDP's bitmap cache subsystem due to an off-by-one boundary check in bitmap_cache_put. A malicious server can send a CACHE_BITMAP_ORDER (Rev1) with cacheId equal to maxCells, bypassing the guard and accessing cells[] one element past the allocated array. This vulnerability is fixed in 3.24.0. |
2026-03-13 | |
| CVE-2026-29774 | 5.3 | MEDIUM | CWE-787 | 0.1% p18 | 3.71 | FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.24.0...FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.24.0, a client-side heap buffer overflow occurs in the FreeRDP client's AVC420/AVC444 YUV-to-RGB conversion path due to missing horizontal bounds validation of H.264 metablock regionRects coordinates. In yuv.c, the clamp() function (line 347) only validates top/bottom against the surface/YUV height, but never checks left/right against the surface width. When avc420_yuv_to_rgb (line 67) computes destination and source pointers using rect->left, it performs unchecked pointer arithmetic that can reach far beyond the allocated surface buffer. A malicious server sends a WIRE_TO_SURFACE_PDU_1 with AVC420 codec containing a regionRects entry where left greatly exceeds the surface width (e.g., left=60000 on a 128px surface). The H.264 bitstream decodes successfully, then yuv420_process_work_callback calls avc420_yuv_to_rgb which computes pDstPoint = pDstData + rect->top * nDstStep + rect->left * 4, writing 16-byte SSE vectors 1888+ bytes past the allocated heap region. This vulnerability is fixed in 3.24.0. |
2026-03-13 | |
| CVE-2026-29079 | 8.2 | HIGH | CWE-843 | 0.1% p18 | 5.74 | Lexbor is a web browser engine library. Prior to 2.7.0, a type‑confusion vulnera...Lexbor is a web browser engine library. Prior to 2.7.0, a type‑confusion vulnerability exists in Lexbor’s HTML fragment parser. When ns = UNDEF, a comment is created using the “unknown element” constructor. The comment’s data are written into the element’s fields via an unsafe cast, corrupting the qualified_name field. That corrupted value is later used as a pointer and dereferenced near the zero page. This vulnerability is fixed in 2.7.0. |
2026-03-13 | |
| CVE-2026-29078 | 8.2 | HIGH | CWE-191 | 0.1% p18 | 5.74 | Lexbor is a web browser engine library. Prior to 2.7.0, the ISO‑2022‑JP encoder ...Lexbor is a web browser engine library. Prior to 2.7.0, the ISO‑2022‑JP encoder in Lexbor fails to reset the temporary size variable between iterations. The statement ctx->buffer_used -= size with a stale size = 3 causes an integer underflow that wraps to SIZE_MAX. Afterwards, memcpy is called with a negative length, leading to an out‑of‑bounds read from the stack and an out‑of‑bounds write to the heap. The source data is partially controllable via the contents of the DOM tree. This vulnerability is fixed in 2.7.0. |
2026-03-13 | |
| CVE-2026-26954 | 10.0 | CRITICAL | CWE-94 | 0.1% p20 | 7.00 | SandboxJS is a JavaScript sandboxing library. Prior to 0.8.34, it is possible to...SandboxJS is a JavaScript sandboxing library. Prior to 0.8.34, it is possible to obtain arrays containing Function, which allows escaping the sandbox. Given an array containing Function, and Object.fromEntries, it is possible to construct {[p]: Function} where p is any constructible property. This vulnerability is fixed in 0.8.34. |
2026-03-13 | |
| CVE-2026-25823 | 9.8 | CRITICAL | CWE-121 | 0.3% p51 | 6.87 | HMS Networks Ewon Flexy with firmware before 15.0s4, Cosy+ with firmware 22.xx b...HMS Networks Ewon Flexy with firmware before 15.0s4, Cosy+ with firmware 22.xx before 22.1s6, and Cosy+ with firmware 23.xx before 23.0s3 have a stack buffer overflow that leads to a Denial of Service, which can also be exploited to achieve Unauthenticated Remote Code Execution. |
2026-03-13 | |
| CVE-2026-25819 | 7.5 | HIGH | CWE-400 | 0.3% p55 | 5.26 | HMS Networks Ewon Flexy with firmware before 15.0s4, Cosy+ with firmware 22.xx b...HMS Networks Ewon Flexy with firmware before 15.0s4, Cosy+ with firmware 22.xx before 22.1s6, and Cosy+ with firmware 23.xx before 23.0s3 allows unauthenticated attackers to cause a Denial of Service by using a specially crafted HTTP request that leads to a reboot of the device, provided they have access to the device's GUI. |
2026-03-13 | |
| CVE-2026-25818 | 9.1 | CRITICAL | CWE-315 | 0.0% p4 | 6.37 | HMS Networks Ewon Flexy with firmware before 15.0s4, Cosy+ with firmware 22.xx b...HMS Networks Ewon Flexy with firmware before 15.0s4, Cosy+ with firmware 22.xx before 22.1s6, and Cosy+ with firmware 23.xx before 23.0s3 have weak entropy for authentication cookies, allowing an attacker with a stolen session cookie to find the user password by brute-forcing an encryption parameter. |
2026-03-13 | |
| CVE-2026-25817 | 8.8 | HIGH | CWE-94 | 0.3% p56 | 6.17 | HMS Networks Ewon Flexy with firmware before 15.0s4, Cosy+ with firmware 22.xx b...HMS Networks Ewon Flexy with firmware before 15.0s4, Cosy+ with firmware 22.xx before 22.1s6, and Cosy+ with firmware 23.xx before 23.0s3 have improper neutralization of special elements used in an OS command allowing remote code execution by attackers with low privilege access on the gateway, provided the attacker has credentials. |
2026-03-13 | |
| CVE-2026-25076 | 8.5 | HIGH | CWE-89 | 0.1% p16 | 5.95 | Anchore Enterprise versions before 5.25.1 contain an SQL injection vulnerability...Anchore Enterprise versions before 5.25.1 contain an SQL injection vulnerability in the GraphQL Reports API. An authenticated attacker that is able to access the GraphQL API could execute arbitrary SQL instructions resulting in modifications to the data contained in the Anchore Enterprise database. |
2026-03-13 | |
| CVE-2026-24097 | 5.3 | MEDIUM | CWE-204 | 0.0% p10 | 3.71 | Improper permission enforcement in Checkmk versions 2.4.0 before 2.4.0p23, 2.3.0...Improper permission enforcement in Checkmk versions 2.4.0 before 2.4.0p23, 2.3.0 before 2.3.0p43, and 2.2.0 (EOL) allows authenticated users to enumerate existing hosts by observing different HTTP response codes in agent-receiver/register_existing endpoint, which could lead to information disclosure. |
2026-03-13 | |
| CVE-2026-22216 | 6.9 | MEDIUM | CWE-799 | 0.1% p20 | 4.83 | wpDiscuz before 7.6.47 contains a missing rate limiting vulnerability that allow...wpDiscuz before 7.6.47 contains a missing rate limiting vulnerability that allows unauthenticated attackers to subscribe arbitrary email addresses to post notifications by sending POST requests to the wpdAddSubscription handler in class.WpdiscuzHelperAjax.php. Attackers can exploit LIKE wildcard characters in the subscription query to match multiple email addresses and generate unwanted notification emails to victim accounts. |
2026-03-13 | |
| CVE-2026-22215 | 5.3 | MEDIUM | CWE-352 | 0.0% p5 | 3.71 | wpDiscuz before 7.6.47 contains a cross-site request forgery vulnerability in th...wpDiscuz before 7.6.47 contains a cross-site request forgery vulnerability in the getFollowsPage() function that allows attackers to trigger unauthorized actions without nonce validation. Attackers can craft malicious requests to enumerate follow relationships and manipulate user follow data by exploiting the missing CSRF protection in the follows page handler. |
2026-03-13 | |
| CVE-2026-22210 | 2.1 | LOW | CWE-79 | 0.0% p13 | 1.47 | wpDiscuz before 7.6.47 contains a cross-site scripting vulnerability that allows...wpDiscuz before 7.6.47 contains a cross-site scripting vulnerability that allows attackers to inject malicious code through unescaped attachment URLs in HTML output by exploiting the WpdiscuzHelperUpload class. Attackers can craft malicious attachment records or filter hooks to inject arbitrary JavaScript into img and anchor tag attributes, executing code in the context of WordPress users viewing comments. |
2026-03-13 | |
| CVE-2026-22209 | 5.1 | MEDIUM | CWE-79 | 0.0% p8 | 3.57 | wpDiscuz before 7.6.47 contains a cross-site scripting vulnerability in the cust...wpDiscuz before 7.6.47 contains a cross-site scripting vulnerability in the customCss field that allows administrators to inject malicious scripts by breaking out of style tags. Attackers with admin access can inject payloads like </style><script>alert(1)</script> in the custom CSS setting to execute arbitrary JavaScript in user browsers. |
2026-03-13 | |
| CVE-2026-22204 | 6.3 | MEDIUM | CWE-20 | 0.1% p16 | 4.41 | wpDiscuz before 7.6.47 contains an email header injection vulnerability that all...wpDiscuz before 7.6.47 contains an email header injection vulnerability that allows attackers to manipulate mail recipients by injecting malicious data into the comment_author_email cookie. Attackers can craft a malicious cookie value that, when processed through urldecode() and passed to wp_mail() functions, enables header injection to alter email recipients or inject additional headers. |
2026-03-13 | |
| CVE-2026-22203 | 6.9 | MEDIUM | CWE-200 | 0.0% p14 | 4.83 | wpDiscuz before 7.6.47 contains an information disclosure vulnerability that all...wpDiscuz before 7.6.47 contains an information disclosure vulnerability that allows administrators to inadvertently expose OAuth secrets by exporting plugin options as JSON. Attackers can obtain exported files containing plaintext API secrets like fbAppSecret, googleClientSecret, twitterAppSecret, and other social login credentials from support tickets, backups, or version control repositories. |
2026-03-13 | |
| CVE-2026-22202 | 6.1 | MEDIUM | CWE-352 | 0.0% p5 | 4.27 | wpDiscuz before 7.6.47 contains a cross-site request forgery vulnerability that ...wpDiscuz before 7.6.47 contains a cross-site request forgery vulnerability that allows attackers to delete all comments associated with an email address by crafting a malicious GET request with a valid HMAC key. Attackers can embed the deletecomments action URL in image tags or other resources to trigger permanent deletion of comments without user confirmation or POST-based CSRF protection. |
2026-03-13 | |
| CVE-2026-22201 | 6.9 | MEDIUM | CWE-348 | 0.0% p5 | 4.83 | wpDiscuz before 7.6.47 contains an IP spoofing vulnerability in the getIP() func...wpDiscuz before 7.6.47 contains an IP spoofing vulnerability in the getIP() function that allows attackers to bypass IP-based rate limiting and ban enforcement by trusting untrusted HTTP headers. Attackers can set HTTP_CLIENT_IP or HTTP_X_FORWARDED_FOR headers to spoof their IP address and circumvent security controls. |
2026-03-13 | |
| CVE-2026-22199 | 6.9 | MEDIUM | CWE-290 | 0.0% p11 | 4.83 | wpDiscuz before 7.6.47 contains a vote manipulation vulnerability that allows at...wpDiscuz before 7.6.47 contains a vote manipulation vulnerability that allows attackers to manipulate comment votes by obtaining fresh nonces and bypassing rate limiting through client-controlled headers. Attackers can vary User-Agent headers to reset rate limits, request nonces from the unauthenticated wpdGetNonce endpoint, and vote multiple times using IP rotation or reverse proxy header manipulation. |
2026-03-13 | |
| CVE-2026-22193 | 9.2 | CRITICAL | CWE-89 | 0.0% p11 | 6.44 | wpDiscuz before 7.6.47 contains an SQL injection vulnerability in the getAllSubs...wpDiscuz before 7.6.47 contains an SQL injection vulnerability in the getAllSubscriptions() function where string parameters lack proper quote escaping in SQL queries. Attackers can inject malicious SQL code through email, activation_key, subscription_date, and imported_from parameters to manipulate database queries and extract sensitive information. |
2026-03-13 | |
| CVE-2026-22192 | 6.3 | MEDIUM | CWE-79 | 0.0% p13 | 4.41 | wpDiscuz before 7.6.47 contains a stored cross-site scripting vulnerability that...wpDiscuz before 7.6.47 contains a stored cross-site scripting vulnerability that allows authenticated attackers to inject malicious JavaScript by importing a crafted options file with unescaped customCss field values. Attackers can supply a malicious JSON import file containing script payloads in the customCss parameter that execute on every page when rendered through the options handler without proper sanitization. |
2026-03-13 | |
| CVE-2026-22191 | 6.9 | MEDIUM | CWE-94 | 0.0% p12 | 4.83 | wpDiscuz before 7.6.47 contains a shortcode injection vulnerability that allows ...wpDiscuz before 7.6.47 contains a shortcode injection vulnerability that allows attackers to execute arbitrary shortcodes by including them in comment content sent via email notifications. Attackers can inject shortcodes like [contact-form-7] or [user_meta] in comments, which are executed server-side when the WpdiscuzHelperEmail class processes notifications through do_shortcode() before wp_mail(). |
2026-03-13 | |
| CVE-2026-22183 | 5.3 | MEDIUM | CWE-79 | 0.0% p13 | 3.71 | wpDiscuz before 7.6.47 contains a stored cross-site scripting vulnerability in t...wpDiscuz before 7.6.47 contains a stored cross-site scripting vulnerability in the inline comment preview functionality that allows authenticated users to inject malicious scripts by submitting comments with unescaped content. Attackers with unfiltered_html capabilities can inject JavaScript directly through comment content rendered in the AJAX response from the getLastInlineComments() function in class.WpdiscuzHelperAjax.php without proper HTML escaping. |
2026-03-13 | |
| CVE-2026-22182 | 8.7 | HIGH | CWE-862 | 0.0% p13 | 6.09 | wpDiscuz before 7.6.47 contains an unauthenticated denial of service vulnerabili...wpDiscuz before 7.6.47 contains an unauthenticated denial of service vulnerability that allows anonymous users to trigger mass notification emails by exploiting the checkNotificationType() function. Attackers can repeatedly call the wpdiscuz-ajax.php endpoint with arbitrary postId and comment_id parameters to flood subscribers with notifications, as the handler lacks nonce verification, authentication checks, and rate limiting. |
2026-03-13 | |
| CVE-2026-1704 | 4.3 | MEDIUM | CWE-639 | 0.0% p8 | 3.01 | The Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin p...The Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.6.9.29. This is due to the `get_item_permissions_check` method granting access to users with the `ssa_manage_appointments` capability without validating staff ownership of the requested appointment. This makes it possible for authenticated attackers, with custom-level access and above (users granted the ssa_manage_appointments capability, such as Team Members), to view appointment records belonging to other staff members and access sensitive customer personally identifiable information via the appointment ID parameter. |
2026-03-13 | |
| CVE-2026-1668 | 7.7 | HIGH | CWE-20 | 0.4% p60 | 5.40 | The web interface on multiple Omada switches does not adequately validate certai...The web interface on multiple Omada switches does not adequately validate certain external inputs, which may lead to out-of-bound memory access when processing crafted requests. Under specific conditions, this flaw may result in unintended command execution.<br>An unauthenticated attacker with network access to the affected interface may cause memory corruption, service instability, or information disclosure. Successful exploitation may allow remote code execution or denial-of-service. |
2026-03-13 | |
| CVE-2026-0957 | 8.5 | HIGH | CWE-787 | 0.0% p5 | 5.95 | There is a memory corruption vulnerability due to an out-of-bounds write when lo...There is a memory corruption vulnerability due to an out-of-bounds write when loading a corrupted file in Digilent DASYLab. This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted file. This vulnerability affects all versions of Digilent DASYLab. |
2026-03-13 | |
| CVE-2026-0956 | 8.5 | HIGH | CWE-125 | 0.0% p4 | 5.95 | There is a memory corruption vulnerability due to an out-of-bounds read when loa...There is a memory corruption vulnerability due to an out-of-bounds read when loading a corrupted file in Digilent DASYLab. This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted file. This vulnerability affects all versions of Digilent DASYLab. |
2026-03-13 | |
| CVE-2026-0955 | 8.5 | HIGH | CWE-125 | 0.0% p4 | 5.95 | There is a memory corruption vulnerability due to an out-of-bounds read when loa...There is a memory corruption vulnerability due to an out-of-bounds read when loading a corrupted file in Digilent DASYLab. This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted file. This vulnerability affects all versions of Digilent DASYLab. |
2026-03-13 | |
| CVE-2026-0954 | 8.5 | HIGH | CWE-787 | 0.0% p5 | 5.95 | There is a memory corruption vulnerability due to an out-of-bounds write when lo...There is a memory corruption vulnerability due to an out-of-bounds write when loading a corrupted DSB file in Digilent DASYLab. This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted .DSB file. This vulnerability affects all versions of Digilent DASYLab. |
2026-03-13 | |
| CVE-2026-0835 | 5.4 | MEDIUM | CWE-79 | 0.0% p8 | 3.78 | IBM Sterling B2B Integrator and IBM Sterling File Gateway 6.1.0.0 through 6.1.2....IBM Sterling B2B Integrator and IBM Sterling File Gateway 6.1.0.0 through 6.1.2.7_2, 6.2.0.0 through 6.2.0.5_1, 6.2.1.0 through 6.2.1.1_1, and 6.2.2.0 are vulnerable to cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. |
2026-03-13 | |
| CVE-2025-8766 | 6.4 | MEDIUM | CWE-276 | 0.0% p0 | 4.48 | A container privilege escalation flaw was found in certain Multi-Cloud Object Ga...A container privilege escalation flaw was found in certain Multi-Cloud Object Gateway Core images. This issue stems from the /etc/passwd file being created with group-writable permissions during build time. In certain conditions, an attacker who can execute commands within an affected container, even as a non-root user, can leverage their membership in the root group to modify the /etc/passwd file. This could allow the attacker to add a new user with any arbitrary UID, including UID 0, leading to full root privileges within the container |
2026-03-13 | |
| CVE-2025-71263 | 7.4 | HIGH | CWE-120 | 0.0% p4 | 5.18 | In UNIX Fourth Research Edition (v4), the su command is vulnerable to a buffer o...In UNIX Fourth Research Edition (v4), the su command is vulnerable to a buffer overflow due to the 'password' variable having a fixed size of 100 bytes. A local user can exploit this to gain root privileges. It is unlikely that UNIX v4 is running anywhere outside of a very small number of lab environments. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. |
2026-03-13 | |
| CVE-2025-57849 | 6.4 | MEDIUM | CWE-276 | 0.0% p0 | 4.48 | A container privilege escalation flaw was found in certain Fuse images. This iss...A container privilege escalation flaw was found in certain Fuse images. This issue stems from the /etc/passwd file being created with group-writable permissions during build time. In certain conditions, an attacker who can execute commands within an affected container, even as a non-root user, can leverage their membership in the root group to modify the /etc/passwd file. This could allow the attacker to add a new user with any arbitrary UID, including UID 0, leading to full root privileges within the container. |
2026-03-13 | |
| CVE-2025-36368 | 6.5 | MEDIUM | CWE-89 | 0.0% p8 | 4.55 | IBM Sterling B2B Integrator and IBM Sterling File Gateway 6.1.0.0 through 6.1.2....IBM Sterling B2B Integrator and IBM Sterling File Gateway 6.1.0.0 through 6.1.2.7_2, 6.2.0.0 through 6.2.0.5_1, and 6.2.1.0 through 6.2.1.1_1 are vulnerable to SQL injection. An administrative user could send specially crafted SQL statements, which could allow the attacker to view, add, modify, or delete information in the back-end database. |
2026-03-13 | |
| CVE-2025-15515 | 6.9 | MEDIUM | CWE-306 | 0.0% p11 | 4.83 | The authentication mechanism for a specific feature in the EasyShare module cont...The authentication mechanism for a specific feature in the EasyShare module contains a vulnerability. If specific conditions are met on a local network, it can cause data leakage |
2026-03-13 | |
| CVE-2025-14811 | 3.1 | LOW | CWE-598 | 0.0% p8 | 2.17 | IBM Sterling Partner Engagement Manager 6.2.3.0 through 6.2.3.5 and 6.2.4.0 thro...IBM Sterling Partner Engagement Manager 6.2.3.0 through 6.2.3.5 and 6.2.4.0 through 6.2.4.2 could allow an attacker to obtain sensitive information from the query string of an HTTP GET method to process a request which could be obtained using man in the middle techniques. |
2026-03-13 | |
| CVE-2025-14504 | 5.4 | MEDIUM | CWE-79 | 0.0% p8 | 3.78 | IBM Sterling B2B Integrator and IBM Sterling File Gateway 6.1.0.0 through 6.1.2....IBM Sterling B2B Integrator and IBM Sterling File Gateway 6.1.0.0 through 6.1.2.7_2, 6.2.0.0 through 6.2.0.5_1, 6.2.1.0 through 6.2.1.1_1, and 6.2.2.0 is vulnerable to cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. |
2026-03-13 | |
| CVE-2025-14483 | 4.3 | MEDIUM | CWE-201 | 0.0% p10 | 3.01 | IBM Sterling B2B Integrator and IBM Sterling File Gateway 6.1.0.0 through 6.1.2....IBM Sterling B2B Integrator and IBM Sterling File Gateway 6.1.0.0 through 6.1.2.7_2, 6.2.0.0 through 6.2.0.5_1, 6.2.1.0 through 6.2.1.1_1, and 6.2.2.0 could disclose sensitive host information to authenticated users in responses that could be used in further attacks against the system. |
2026-03-13 | |
| CVE-2025-13779 | 7.2 | HIGH | CWE-306 | 0.0% p11 | 5.04 | Missing authentication for critical function vulnerability in ABB AWIN GW100 rev...Missing authentication for critical function vulnerability in ABB AWIN GW100 rev.2, ABB AWIN GW120.This issue affects AWIN GW100 rev.2: 2.0-0, 2.0-1; AWIN GW120: 1.2-0, 1.2-1. |
2026-03-13 | |
| CVE-2025-13778 | 7.1 | HIGH | CWE-306 | 0.0% p14 | 4.97 | Missing authentication for critical function vulnerability in ABB AWIN GW100 rev...Missing authentication for critical function vulnerability in ABB AWIN GW100 rev.2, ABB AWIN GW120.This issue affects AWIN GW100 rev.2: 2.0-0, 2.0-1; AWIN GW120: 1.2-0, 1.2-1. |
2026-03-13 | |
| CVE-2025-13777 | 7.2 | HIGH | CWE-294 | 0.0% p12 | 5.04 | Authentication bypass by capture-replay vulnerability in ABB AWIN GW100 rev.2, A...Authentication bypass by capture-replay vulnerability in ABB AWIN GW100 rev.2, ABB AWIN GW120.This issue affects AWIN GW100 rev.2: 2.0-0, 2.0-1; AWIN GW120: 1.2-0, 1.2-1. |
2026-03-13 | |
| CVE-2025-13726 | 5.3 | MEDIUM | CWE-209 | 0.1% p16 | 3.71 | IBM Sterling Partner Engagement Manager 6.2.3.0 through 6.2.3.5 and 6.2.4.0 thro...IBM Sterling Partner Engagement Manager 6.2.3.0 through 6.2.3.5 and 6.2.4.0 through 6.2.4.2 could allow a remote attacker to obtain sensitive information when detailed technical error messages are returned. This information could be used in further attacks against the system. |
2026-03-13 | |
| CVE-2025-13723 | 5.3 | MEDIUM | CWE-324 | 0.0% p3 | 3.71 | IBM Sterling Partner Engagement Manager 6.2.3.0 through 6.2.3.5 and 6.2.4.0 thro...IBM Sterling Partner Engagement Manager 6.2.3.0 through 6.2.3.5 and 6.2.4.0 through 6.2.4.2 could allow an attacker to obtain sensitive user information using an expired access token |
2026-03-13 | |
| CVE-2025-13718 | 3.7 | LOW | CWE-319 | 0.0% p5 | 2.59 | IBM Sterling Partner Engagement Manager 6.2.3.0 through 6.2.3.5 and 6.2.4.0 thro...IBM Sterling Partner Engagement Manager 6.2.3.0 through 6.2.3.5 and 6.2.4.0 through 6.2.4.2 could allow a remote attacker to obtain sensitive information in cleartext in a communication channel that can be sniffed by unauthorized actors. |
2026-03-13 | |
| CVE-2025-13702 | 6.1 | MEDIUM | CWE-79 | 0.0% p8 | 4.27 | IBM Sterling Partner Engagement Manager 6.2.3.0 through 6.2.3.5 and 6.2.4.0 thro...IBM Sterling Partner Engagement Manager 6.2.3.0 through 6.2.3.5 and 6.2.4.0 through 6.2.4.2 is vulnerable to cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. |
2026-03-13 | |
| CVE-2025-13337 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering...Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. |
2026-03-13 | |
| CVE-2023-40693 | 5.4 | MEDIUM | CWE-79 | 0.0% p8 | 3.78 | IBM Sterling B2B Integrator and IBM Sterling File Gateway 6.1.0.0 through 6.1.2....IBM Sterling B2B Integrator and IBM Sterling File Gateway 6.1.0.0 through 6.1.2.7_2, and 6.2.0.0 through 6.2.0.5_1, 6.2.1.0 through 6.2.1.1_1 are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. |
2026-03-13 | |
| CVE-2026-3611 | 10.0 | CRITICAL | CWE-306 | 0.2% p45 | 7.01 | The Honeywell IQ4x building management controller, exposes its full web-based HM...The Honeywell IQ4x building management controller, exposes its full web-based HMI without authentication in its factory-default configuration. With no user module configured, security is disabled by design and the system operates under a System Guest (level 100) context, granting read/write privileges to any party able to reach the HTTP interface. Authentication controls are only enforced after a web user is created via U.htm, which dynamically enables the user module. Because this function is accessible prior to authentication, a remote user can create a new account with administrative read/write permissions enabling the user module and imposing authentication under attacker-controlled credentials. This action can effectively lock legitimate operators out of local and web-based configuration and administration. |
2026-03-12 | |
| CVE-2026-32274 | 8.7 | HIGH | CWE-22 | 0.0% p5 | 6.09 | Black is the uncompromising Python code formatter. Prior to 26.3.1, Black writes...Black is the uncompromising Python code formatter. Prior to 26.3.1, Black writes a cache file, the name of which is computed from various formatting options. The value of the --python-cell-magics option was placed in the filename without sanitization, which allowed an attacker who controls the value of this argument to write cache files to arbitrary file system locations. Fixed in Black 26.3.1. |
2026-03-12 | |
| CVE-2026-32269 | 6.3 | MEDIUM | CWE-683 | 0.0% p6 | 4.41 | Parse Server is an open source backend that can be deployed to any infrastructur...Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.6.0-alpha.13 and 8.6.39, the OAuth2 authentication adapter does not correctly validate app IDs when appidField and appIds are configured. During app ID validation, a malformed value is sent to the token introspection endpoint instead of the user's actual access token. Depending on the introspection endpoint's behavior, this could either cause all OAuth2 logins to fail, or allow authentication from disallowed app contexts if the endpoint returns valid-looking data for the malformed request. Deployments using the OAuth2 adapter with appidField and appIds configured are affected. This vulnerability is fixed in 9.6.0-alpha.13 and 8.6.39. |
2026-03-12 | |
| CVE-2026-32260 | 8.1 | HIGH | CWE-78 | 0.1% p27 | 5.67 | Deno is a JavaScript, TypeScript, and WebAssembly runtime. From 2.7.0 to 2.7.1, ...Deno is a JavaScript, TypeScript, and WebAssembly runtime. From 2.7.0 to 2.7.1, A command injection vulnerability exists in Deno's node:child_process polyfill (shell: true mode) that bypasses the fix for CVE-2026-27190. The two-stage argument sanitization in transformDenoShellCommand (ext/node/polyfills/internal/child_process.ts) has a priority bug: when an argument contains a $VAR pattern, it is wrapped in double quotes (L1290) instead of single quotes. Double quotes in POSIX sh do not suppress backtick command substitution, allowing injected commands to execute. An attacker who controls arguments passed to spawnSync or spawn with shell: true can execute arbitrary OS commands, bypassing Deno's permission system. This vulnerability is fixed in 2.7.2. |
2026-03-12 | |
| CVE-2026-32259 | 6.7 | MEDIUM | CWE-121 | 0.0% p4 | 4.69 | ImageMagick is free and open-source software used for editing and manipulating d...ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to 7.1.2-16 and 6.9.13-41, when a memory allocation fails in the sixel encoder it would be possible to write past the end of a buffer on the stack. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41. |
2026-03-12 | |
| CVE-2026-32251 | 9.3 | CRITICAL | CWE-611 | 0.0% p12 | 6.51 | Tolgee is an open-source localization platform. Prior to 3.166.3, the XML parser...Tolgee is an open-source localization platform. Prior to 3.166.3, the XML parsers used for importing Android XML resources (.xml) and .resx files don't disable external entity processing. An authenticated user who can import translation files into a project can exploit this to read arbitrary files from the server and make server-side requests to internal services. This vulnerability is fixed in 3.166.3. |
2026-03-12 | |
| CVE-2026-32249 | 5.3 | MEDIUM | CWE-476 | 0.0% p2 | 3.71 | Vim is an open source, command line text editor. From 9.1.0011 to before 9.2.013...Vim is an open source, command line text editor. From 9.1.0011 to before 9.2.0137, Vim's NFA regex compiler, when encountering a collection containing a combining character as the endpoint of a character range (e.g. [0-0\u05bb]), incorrectly emits the composing bytes of that character as separate NFA states. This corrupts the NFA postfix stack, resulting in NFA_START_COLL having a NULL out1 pointer. When nfa_max_width() subsequently traverses the compiled NFA to estimate match width for the look-behind assertion, it dereferences state->out1->out without a NULL check, causing a segmentation fault. This vulnerability is fixed in 9.2.0137. |
2026-03-12 | |
| CVE-2026-32248 | 9.3 | CRITICAL | CWE-943 | 0.1% p26 | 6.51 | Parse Server is an open source backend that can be deployed to any infrastructur...Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.6.0-alpha.12 and 8.6.38, an unauthenticated attacker can take over any user account that was created with an authentication provider that does not validate the format of the user identifier (e.g. anonymous authentication). By sending a crafted login request, the attacker can cause the server to perform a pattern-matching query instead of an exact-match lookup, allowing the attacker to match an existing user and obtain a valid session token for that user's account. Both MongoDB and PostgreSQL database backends are affected. Any Parse Server deployment that allows anonymous authentication (enabled by default) is vulnerable. This vulnerability is fixed in 9.6.0-alpha.12 and 8.6.38. |
2026-03-12 | |
| CVE-2026-32240 | 6.3 | MEDIUM | CWE-197 | 0.1% p24 | 4.41 | Cap'n Proto is a data interchange format and capability-based RPC system. Prior ...Cap'n Proto is a data interchange format and capability-based RPC system. Prior to 1.4.0, when using Transfer-Encoding: chunked, if a chunk's size parsed to a value of 2^64 or larger, it would be truncated to a 64-bit integer. In theory, this bug could enable HTTP request/response smuggling. This vulnerability is fixed in 1.4.0. |
2026-03-12 | |
| CVE-2026-32239 | 6.3 | MEDIUM | CWE-190 | 0.1% p24 | 4.41 | Cap'n Proto is a data interchange format and capability-based RPC system. Prior ...Cap'n Proto is a data interchange format and capability-based RPC system. Prior to 1.4.0, a negative Content-Length value was converted to unsigned, treating it as an impossibly large length instead. In theory, this bug could enable HTTP request/response smuggling. This vulnerability is fixed in 1.4.0. |
2026-03-12 | |
| CVE-2026-3497 | 6.9 | MEDIUM | CWE-908 | 0.0% p10 | 4.83 | Vulnerability in the OpenSSH GSSAPI delta included in various Linux distribution...Vulnerability in the OpenSSH GSSAPI delta included in various Linux distributions. This vulnerability affects the GSSAPI patches added by various Linux distributions and does not affect the OpenSSH upstream project itself. The usage of sshpkt_disconnect() on an error, which does not terminate the process, allows an attacker to send an unexpected GSSAPI message type during the GSSAPI key exchange to the server, which will call the underlying function and continue the execution of the program without setting the related connection variables. As the variables are not initialized to NULL the code later accesses those uninitialized variables, accessing random memory, which could lead to undefined behavior. The recommended workaround is to use ssh_packet_disconnect() instead, which does terminate the process. The impact of the vulnerability depends heavily on the compiler flag hardening configuration. |
2026-03-12 | |
| CVE-2026-32247 | 8.1 | HIGH | CWE-943 | 0.0% p12 | 5.67 | Graphiti is a framework for building and querying temporal context graphs for AI...Graphiti is a framework for building and querying temporal context graphs for AI agents. Graphiti versions before 0.28.2 contained a Cypher injection vulnerability in shared search-filter construction for non-Kuzu backends. Attacker-controlled label values supplied through SearchFilters.node_labels were concatenated directly into Cypher label expressions without validation. In MCP deployments, this was exploitable not only through direct untrusted access to the Graphiti MCP server, but also through prompt injection against an LLM client that could be induced to call search_nodes with attacker-controlled entity_types values. The MCP server mapped entity_types to SearchFilters.node_labels, which then reached the vulnerable Cypher construction path. Affected backends included Neo4j, FalkorDB, and Neptune. Kuzu was not affected by the label-injection issue because it used parameterized label handling rather than string-interpolated Cypher labels. This issue was mitigated in 0.28.2. |
2026-03-12 | |
| CVE-2026-32246 | 8.5 | HIGH | CWE-287 | 0.0% p13 | 5.95 | Tinyauth is an authentication and authorization server. Prior to 5.0.3, the OIDC...Tinyauth is an authentication and authorization server. Prior to 5.0.3, the OIDC authorization endpoint allows users with a TOTP-pending session (password verified, TOTP not yet completed) to obtain authorization codes. An attacker who knows a user's password but not their TOTP secret can obtain valid OIDC tokens, completely bypassing the second factor. This vulnerability is fixed in 5.0.3. |
2026-03-12 | |
| CVE-2026-32245 | 6.5 | MEDIUM | CWE-863 | 0.1% p19 | 4.55 | Tinyauth is an authentication and authorization server. Prior to 5.0.3, the OIDC...Tinyauth is an authentication and authorization server. Prior to 5.0.3, the OIDC token endpoint does not verify that the client exchanging an authorization code is the same client the code was issued to. A malicious OIDC client operator can exchange another client's authorization code using their own client credentials, obtaining tokens for users who never authorized their application. This violates RFC 6749 Section 4.1.3. This vulnerability is fixed in 5.0.3. |
2026-03-12 | |
| CVE-2026-32242 | 9.1 | CRITICAL | CWE-362 | 0.1% p22 | 6.37 | Parse Server is an open source backend that can be deployed to any infrastructur...Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.6.0-alpha.11 and 8.6.37, Parse Server's built-in OAuth2 auth adapter exports a singleton instance that is reused directly across all OAuth2 provider configurations. Under concurrent authentication requests for different OAuth2 providers, one provider's token validation may execute using another provider's configuration, potentially allowing a token that should be rejected by one provider to be accepted because it is validated against a different provider's policy. Deployments that configure multiple OAuth2 providers via the oauth2: true flag are affected. This vulnerability is fixed in 9.6.0-alpha.11 and 8.6.37. |
2026-03-12 | |
| CVE-2026-32237 | 4.4 | MEDIUM | CWE-200 | 0.0% p8 | 3.08 | Backstage is an open framework for building developer portals. Prior to 3.1.5, a...Backstage is an open framework for building developer portals. Prior to 3.1.5, authenticated users with permission to execute scaffolder dry-runs can gain access to server-configured environment secrets through the dry-run API response. Secrets are properly redacted in log output but not in all parts of the response payload. Deployments that have configured scaffolder.defaultEnvironment.secrets are affected. This is patched in @backstage/plugin-scaffolder-backend version 3.1.5. |
2026-03-12 | |
| CVE-2026-32236 | 1.7 | LOW | CWE-918 | 0.0% p14 | 1.19 | Backstage is an open framework for building developer portals. Prior to 0.27.1, ...Backstage is an open framework for building developer portals. Prior to 0.27.1, a Server-Side Request Forgery (SSRF) vulnerability exists in @backstage/plugin-auth-backend when auth.experimentalClientIdMetadataDocuments.enabled is set to true. The CIMD metadata fetch validates the initial client_id hostname against private IP ranges but does not apply the same validation after HTTP redirects. The practical impact is limited. The attacker cannot read the response body from the internal request, cannot control request headers or method, and the feature must be explicitly enabled via an experimental flag that is off by default. Deployments that restrict allowedClientIdPatterns to specific trusted domains are not affected. Patched in @backstage/plugin-auth-backend version 0.27.1. |
2026-03-12 | |
| CVE-2026-32235 | 5.9 | MEDIUM | CWE-601 | 0.0% p8 | 4.13 | Backstage is an open framework for building developer portals. Prior to 0.27.1, ...Backstage is an open framework for building developer portals. Prior to 0.27.1, the experimental OIDC provider in @backstage/plugin-auth-backend is vulnerable to a redirect URI allowlist bypass. Instances that have enabled experimental Dynamic Client Registration or Client ID Metadata Documents and configured allowedRedirectUriPatterns are affected. A specially crafted redirect URI can pass the allowlist validation while resolving to an attacker-controlled host. If a victim approves the resulting OAuth consent request, their authorization code is sent to the attacker, who can exchange it for a valid access token. This requires victim interaction and that one of the experimental features is explicitly enabled, which is not the default. This vulnerability is fixed in 0.27.1. |
2026-03-12 | |
| CVE-2026-32232 | 8.8 | HIGH | CWE-22 | 0.1% p23 | 6.16 | ZeptoClaw is a personal AI assistant. Prior to 0.7.6, there is a Dangling Symlin...ZeptoClaw is a personal AI assistant. Prior to 0.7.6, there is a Dangling Symlink Component Bypass, TOCTOU Between Validation and Use, and Hardlink Alias Bypass. This vulnerability is fixed in 0.7.6. |
2026-03-12 | |
| CVE-2026-32231 | 8.2 | HIGH | CWE-306 | 0.0% p14 | 5.74 | ZeptoClaw is a personal AI assistant. Prior to 0.7.6, the generic webhook channe...ZeptoClaw is a personal AI assistant. Prior to 0.7.6, the generic webhook channel trusts caller-supplied identity fields (sender, chat_id) from the request body and applies authorization checks to those untrusted values. Because authentication is optional and defaults to disabled (auth_token: None), an attacker who can reach POST /webhook can spoof an allowlisted sender and choose arbitrary chat_id values, enabling high-risk message spoofing and potential IDOR-style session/chat routing abuse. This vulnerability is fixed in 0.7.6. |
2026-03-12 | |
| CVE-2026-32230 | 5.3 | MEDIUM | CWE-862 | 0.0% p11 | 3.71 | Uptime Kuma is an open source, self-hosted monitoring tool. From 2.0.0 to 2.1.3 ...Uptime Kuma is an open source, self-hosted monitoring tool. From 2.0.0 to 2.1.3 , the GET /api/badge/:id/ping/:duration? endpoint in server/routers/api-router.js does not verify that the requested monitor belongs to a public group. All other badge endpoints check AND public = 1 in their SQL query before returning data. The ping endpoint skips this check entirely, allowing unauthenticated users to extract average ping/response time data for private monitors. This vulnerability is fixed in 2.2.0. |
2026-03-12 | |
| CVE-2026-32142 | 5.3 | MEDIUM | CWE-200 | 0.0% p11 | 3.71 | Shopware is an open commerce platform. /api/_info/config route exposes informati...Shopware is an open commerce platform. /api/_info/config route exposes information about licenses. This vulnerability is fixed in 7.8.1 and 6.10.15. |
2026-03-12 | |
| CVE-2026-32138 | 8.2 | HIGH | CWE-284 | 0.1% p22 | 5.74 | NEXULEAN is a cybersecurity portfolio & service platform for an Ethical Hacker, ...NEXULEAN is a cybersecurity portfolio & service platform for an Ethical Hacker, AI Enthusiast, and Penetration Tester. Prior to 2.0.0, a security vulnerability was identified where Firebase and Web3Forms API keys were exposed. An attacker could use these keys to interact with backend services without authentication, potentially leading to unauthorized access to application resources and user data. This vulnerability is fixed in 2.0.0. |
2026-03-12 | |
| CVE-2026-26793 | 9.8 | CRITICAL | CWE-77 | 0.9% p76 | 6.89 | GL-iNet GL-AR300M16 v4.3.11 was discovered to contain a command injection vulner...GL-iNet GL-AR300M16 v4.3.11 was discovered to contain a command injection vulnerability via the set_config function. This vulnerability allows attackers to execute arbitrary commands via a crafted input. |
2026-03-12 | |
| CVE-2025-70873 | 7.5 | HIGH | CWE-244 | 0.0% p12 | 5.25 | An information disclosure issue in the zipfileInflate function in the zipfile ex...An information disclosure issue in the zipfileInflate function in the zipfile extension in SQLite v3.51.1 and earlier allows attackers to obtain heap memory via supplying a crafted ZIP file. |
2026-03-12 | |
| CVE-2025-70245 | 9.8 | CRITICAL | CWE-787 | 0.1% p21 | 6.86 | Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime para...Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSetWizardSelectMode. |
2026-03-12 | |
| CVE-2025-66955 | 6.5 | MEDIUM | N/A | 0.1% p15 | 4.55 | Local File Inclusion in Contact Plan, E-Mail, SMS and Fax components in Asseco S...Local File Inclusion in Contact Plan, E-Mail, SMS and Fax components in Asseco SEE Live 2.0 allows remote authenticated users to access files on the host via "path" parameter in the downloadAttachment and downloadAttachmentFromPath API calls. |
2026-03-12 | |
| CVE-2025-61154 | 6.5 | MEDIUM | CWE-122 | 0.1% p16 | 4.55 | Heap buffer overflow vulnerability in LibreDWG versions v0.13.3.7571 up to v0.13...Heap buffer overflow vulnerability in LibreDWG versions v0.13.3.7571 up to v0.13.3.7835 allows a crafted DWG file to cause a Denial of Service (DoS) via the function decompress_R2004_section at decode.c. |
2026-03-12 | |
| CVE-2025-13913 | 5.4 | MEDIUM | CWE-502 | 0.0% p5 | 3.78 | A privileged Ignition user, intentionally or otherwise, imports an external file...A privileged Ignition user, intentionally or otherwise, imports an external file with a specially crafted payload, which executes embedded malicious code. |
2026-03-12 | |
| CVE-2026-3841 | 8.5 | HIGH | CWE-78 | 1.0% p77 | 5.98 | A command injection vulnerability has been identified in the Telnet command-line...A command injection vulnerability has been identified in the Telnet command-line interface (CLI) of TP-Link TL-MR6400 v5.3. This issue is caused by insufficient sanitization of data processed during specific CLI operations. An authenticated attacker with elevated privileges may be able to execute arbitrary system commands. Successful exploitation may lead to full device compromise, including potential loss of confidentiality, integrity, and availability. |
2026-03-12 | |
| CVE-2026-32141 | 7.5 | HIGH | CWE-674 | 0.0% p3 | 5.25 | flatted is a circular JSON parser. Prior to 3.4.0, flatted's parse() function us...flatted is a circular JSON parser. Prior to 3.4.0, flatted's parse() function uses a recursive revive() phase to resolve circular references in deserialized JSON. When given a crafted payload with deeply nested or self-referential $ indices, the recursion depth is unbounded, causing a stack overflow that crashes the Node.js process. This vulnerability is fixed in 3.4.0. |
2026-03-12 | |
| CVE-2026-32140 | 9.3 | CRITICAL | CWE-22 | 0.4% p60 | 6.52 | Dataease is an open source data visualization analysis tool. Prior to 2.10.20, B...Dataease is an open source data visualization analysis tool. Prior to 2.10.20, By controlling the IniFile parameter, an attacker can force the JDBC driver to load an attacker-controlled configuration file. This configuration file can inject dangerous JDBC properties, leading to remote code execution. The Redshift JDBC driver execution flow reaches a method named getJdbcIniFile. The getJdbcIniFile method implements an aggressive automatic configuration file discovery mechanism. If not explicitly restricted, it searches for a file named rsjdbc.ini. In a JDBC URL context, users can explicitly specify the configuration file via URL parameters, which allows arbitrary files on the server to be loaded as JDBC configuration files. Within the Redshift JDBC driver properties, the parameter IniFile is explicitly supported and used to load an external configuration file. This vulnerability is fixed in 2.10.20. |
2026-03-12 | |
| CVE-2026-32139 | 5.3 | MEDIUM | CWE-79 | 0.0% p13 | 3.71 | Dataease is an open source data visualization analysis tool. In DataEase 2.10.19...Dataease is an open source data visualization analysis tool. In DataEase 2.10.19 and earlier, the static resource upload interface allows SVG uploads. However, backend validation only checks whether the XML is parseable and whether the root node is svg. It does not sanitize active content such as onload/onerror event handlers or script-capable attributes. As a result, an attacker can upload a malicious SVG and then trigger script execution in a browser by visiting the exposed static resource URL, forming a full stored XSS exploitation chain. This vulnerability is fixed in 2.10.20. |
2026-03-12 | |
| CVE-2026-32137 | 9.3 | CRITICAL | CWE-89 | 0.1% p19 | 6.51 | Dataease is an open source data visualization analysis tool. Prior to 2.10.20, T...Dataease is an open source data visualization analysis tool. Prior to 2.10.20, The table parameter for /de2api/datasource/previewData is directly concatenated into the SQL statement without any filtering or parameterization. Since tableName is a user-controllable string, attackers can inject malicious SQL statements by constructing malicious table names. This vulnerability is fixed in 2.10.20. |
2026-03-12 | |
| CVE-2026-32129 | 8.7 | HIGH | CWE-328 | 0.0% p6 | 6.09 | soroban-poseidon provides Poseidon and Poseidon2 cryptographic hash functions fo...soroban-poseidon provides Poseidon and Poseidon2 cryptographic hash functions for Soroban smart contracts. Poseidon V1 (PoseidonSponge) accepts variable-length inputs without injective padding. When a caller provides fewer inputs than the sponge rate (inputs.len() < T - 1), unused rate positions are implicitly zero-filled. This allows trivial hash collisions: for any input vector [m1, ..., mk] hashed with a sponge of rate > k, hash([m1, ..., mk]) equals hash([m1, ..., mk, 0]) because both produce identical pre-permutation states. This affects any use of PoseidonSponge or poseidon_hash where the number of inputs is less than T - 1 (e.g., hashing 1 input with T=3). Poseidon2 (Poseidon2Sponge) is not affected. |
2026-03-12 | |
| CVE-2026-32116 | 8.2 | HIGH | CWE-22 | 0.1% p26 | 5.74 | Magic Wormhole makes it possible to get arbitrary-sized files and directories fr...Magic Wormhole makes it possible to get arbitrary-sized files and directories from one computer to another. From 0.21.0 to before 0.23.0, receiving a file (wormhole receive) from a malicious party could result in overwriting critical local files, including ~/.ssh/authorized_keys and .bashrc. This could be used to compromise the receiver's computer. Only the sender of the file (the party who runs wormhole send) can mount the attack. Other parties (including the transit/relay servers) are excluded by the wormhole protocol. This vulnerability is fixed in 0.23.0. |
2026-03-12 | |
| CVE-2026-32100 | 5.3 | MEDIUM | CWE-200 | 0.0% p11 | 3.71 | Shopware is an open commerce platform. /api/_info/config route exposes informati...Shopware is an open commerce platform. /api/_info/config route exposes information about active security fixes. This vulnerability is fixed in 2.0.16, 3.0.12, and 4.0.7. |
2026-03-12 | |
| CVE-2026-31890 | 4.8 | MEDIUM | CWE-223 | 0.0% p5 | 3.36 | Inspektor Gadget is a set of tools and framework for data collection and system ...Inspektor Gadget is a set of tools and framework for data collection and system inspection on Kubernetes clusters and Linux hosts using eBPF. Prior to 0.50.1, in a situation where the ring-buffer of a gadget is – incidentally or maliciously – already full, the gadget will silently drop events. The include/gadget/buffer.h file contains definitions for the Buffer API that gadgets can use to, among the other things, transfer data from eBPF programs to userspace. For hosts running a modern enough Linux kernel (>= 5.8), this transfer mechanism is based on ring-buffers. The size of the ring-buffer for the gadgets is hard-coded to 256KB. When a gadget_reserve_buf fails because of insufficient space, the gadget silently cleans up without producing an alert. The lost count reported by the eBPF operator, when using ring-buffers – the modern choice – is hardcoded to zero. The vulnerability can be used by a malicious event source (e.g. a compromised container) to cause a Denial Of Service, forcing the system to drop events coming from other containers (or the same container). This vulnerability is fixed in 0.50.1. |
2026-03-12 | |
| CVE-2026-31873 | 0.0 | NONE | CWE-79 | 0.0% p1 | 0.00 | Unhead is a document head and template manager. Prior to 2.1.11, The link.href c...Unhead is a document head and template manager. Prior to 2.1.11, The link.href check in makeTagSafe (safe.ts) uses String.includes(), which is case-sensitive. Browsers treat URI schemes case-insensitively. DATA:text/css,... is the same as data:text/css,... to the browser, but 'DATA:...'.includes('data:') returns false. An attacker can inject arbitrary CSS for UI redressing or data exfiltration via CSS attribute selectors with background-image callbacks. This vulnerability is fixed in 2.1.11. |
2026-03-12 | |
| CVE-2026-31860 | 5.3 | MEDIUM | CWE-79 | 0.0% p1 | 3.71 | Unhead is a document head and template manager. Prior to 2.1.11, useHeadSafe() c...Unhead is a document head and template manager. Prior to 2.1.11, useHeadSafe() can be bypassed to inject arbitrary HTML attributes, including event handlers, into SSR-rendered <head> tags. This is the composable that Nuxt docs recommend for safely handling user-generated content. The acceptDataAttrs function (safe.ts, line 16-20) allows any property key starting with data- through to the final HTML. It only checks the prefix, not whether the key contains spaces or other characters that break HTML attribute parsing. This vulnerability is fixed in 2.1.11. |
2026-03-12 | |
| CVE-2026-28256 | 6.9 | MEDIUM | CWE-547 | 0.1% p16 | 4.83 | A Use of Hard-coded, Security-relevant Constants vulnerability in Trane Tracer S...A Use of Hard-coded, Security-relevant Constants vulnerability in Trane Tracer SC, Tracer SC+, and Tracer Concierge could allow an attacker to disclose sensitive information and take over accounts. |
2026-03-12 | |
| CVE-2026-28255 | 8.2 | HIGH | CWE-798 | 0.0% p14 | 5.74 | A Use of Hard-coded Credentials vulnerability in Trane Tracer SC, Tracer SC+, an...A Use of Hard-coded Credentials vulnerability in Trane Tracer SC, Tracer SC+, and Tracer Concierge could allow an attacker to disclose sensitive information and take over accounts. |
2026-03-12 | |
| CVE-2026-28254 | 6.9 | MEDIUM | CWE-862 | 0.0% p12 | 4.83 | A Missing Authorization vulnerability in Trane Tracer SC, Tracer SC+, and Tracer...A Missing Authorization vulnerability in Trane Tracer SC, Tracer SC+, and Tracer Concierge could allow an unauthenticated attacker to access sensitive information through unprotected APIs. |
2026-03-12 | |
| CVE-2026-28253 | 8.7 | HIGH | CWE-789 | 0.1% p21 | 6.09 | A Memory Allocation with Excessive Size Value vulnerability in Trane Tracer SC, ...A Memory Allocation with Excessive Size Value vulnerability in Trane Tracer SC, Tracer SC+, and Tracer Concierge could allow an unauthenticated attacker to cause a denial-of-service condition |
2026-03-12 | |
| CVE-2026-28252 | 9.2 | CRITICAL | CWE-327 | 0.0% p8 | 6.44 | A Use of a Broken or Risky Cryptographic Algorithm vulnerability in Trane Tracer...A Use of a Broken or Risky Cryptographic Algorithm vulnerability in Trane Tracer SC, Tracer SC+, and Tracer Concierge could allow an attacker to bypass authentication and gain root-level access to the device. |
2026-03-12 | |
| CVE-2026-26795 | 9.8 | CRITICAL | CWE-77 | 0.9% p76 | 6.89 | GL-iNet GL-AR300M16 v4.3.11 was discovered to contain a command injection vulner...GL-iNet GL-AR300M16 v4.3.11 was discovered to contain a command injection vulnerability via the module parameter in the M.get_system_log function. This vulnerability allows attackers to execute arbitrary commands via a crafted input. |
2026-03-12 | |
| CVE-2026-26794 | 8.8 | HIGH | CWE-89 | 0.3% p48 | 6.17 | GL-iNet GL-AR300M16 v4.3.11 was discovered to contain a SQL injection vulnerabil...GL-iNet GL-AR300M16 v4.3.11 was discovered to contain a SQL injection vulnerability via the add_group() function. This vulnerability allows attackers to execute arbitrary SQL database operations via a crafted HTTP request. |
2026-03-12 | |
| CVE-2026-26792 | 9.8 | CRITICAL | CWE-77 | 0.9% p76 | 6.89 | GL-iNet GL-AR300M16 v4.3.11 was discovered to contain multiple command injection...GL-iNet GL-AR300M16 v4.3.11 was discovered to contain multiple command injection vulnerabilities in the set_upgrade function via the modem_url, target_version, current_version, firmware_upload, hash_type, hash_value, and upgrade_type parameters. These vulnerabilities allow attackers to execute arbitrary commands via a crafted input. |
2026-03-12 | |
| CVE-2026-26791 | 9.8 | CRITICAL | CWE-77 | 0.9% p76 | 6.89 | GL-iNet GL-AR300M16 v4.3.11 was discovered to contain a command injection vulner...GL-iNet GL-AR300M16 v4.3.11 was discovered to contain a command injection vulnerability via the string port parameter in the enable_echo_server function. This vulnerability allows attackers to execute arbitrary commands via a crafted input. |
2026-03-12 | |
| CVE-2025-13462 | 2.0 | LOW | CWE-20 | 0.0% p2 | 1.40 | The "tarfile" module would still apply normalization of AREGTYPE (\x00) blocks t...The "tarfile" module would still apply normalization of AREGTYPE (\x00) blocks to DIRTYPE, even while processing a multi-block member such as GNUTYPE_LONGNAME or GNUTYPE_LONGLINK. This could result in a crafted tar archive being misinterpreted by the tarfile module compared to other implementations. |
2026-03-12 | |
| CVE-2026-4045 | 6.3 | MEDIUM | CWE-203 | 0.0% p12 | 4.41 | A flaw has been found in projectsend up to r1945. This impacts an unknown functi...A flaw has been found in projectsend up to r1945. This impacts an unknown function of the file includes/Classes/Auth.php. Executing a manipulation of the argument ldap_email can lead to observable response discrepancy. The attack can be executed remotely. A high complexity level is associated with this attack. The exploitability is said to be difficult. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-12 | |
| CVE-2026-31841 | 6.5 | MEDIUM | CWE-433 | 0.0% p12 | 4.55 | Hyperterse is a tool-first MCP framework for building AI-ready backend surfaces ...Hyperterse is a tool-first MCP framework for building AI-ready backend surfaces from declarative config. Prior to v2.2.0, the search tool allows LLMs to search for tools using natural language. While returning results, Hyperterse also returned the raw SQL queries, exposing statements which were supposed to be executed under the hood, and protected from being displayed publicly. This issue has been fixed as of v2.2.0. |
2026-03-12 | |
| CVE-2026-29066 | 6.2 | MEDIUM | CWE-200 | 3.4% p87 | 4.44 | Tina is a headless content management system. Prior to 2.1.8, the TinaCMS CLI de...Tina is a headless content management system. Prior to 2.1.8, the TinaCMS CLI dev server configures Vite with server.fs.strict: false, which disables Vite's built-in filesystem access restriction. This allows any unauthenticated attacker who can reach the dev server to read arbitrary files on the host system. This vulnerability is fixed in 2.1.8. |
2026-03-12 | |
| CVE-2026-28793 | 8.4 | HIGH | CWE-22 | 0.0% p6 | 5.88 | Tina is a headless content management system. Prior to 2.1.8, the TinaCMS CLI de...Tina is a headless content management system. Prior to 2.1.8, the TinaCMS CLI development server exposes media endpoints that are vulnerable to path traversal, allowing attackers to read and write arbitrary files on the filesystem outside the intended media directory. When running tinacms dev, the CLI starts a local HTTP server (default port 4001) exposing endpoints such as /media/list/*, /media/upload/*, and /media/*. These endpoints process user-controlled path segments using decodeURI() and path.join() without validating that the resolved path remains within the configured media directory. This vulnerability is fixed in 2.1.8. |
2026-03-12 | |
| CVE-2026-28792 | 9.6 | CRITICAL | CWE-22 | 0.3% p54 | 6.73 | Tina is a headless content management system. Prior to 2.1.8 , the TinaCMS CLI d...Tina is a headless content management system. Prior to 2.1.8 , the TinaCMS CLI dev server combines a permissive CORS configuration (Access-Control-Allow-Origin: *) with the path traversal vulnerability (previously reported) to enable a browser-based drive-by attack. A remote attacker can enumerate the filesystem, write arbitrary files, and delete arbitrary files on developer's machines by simply tricking them into visiting a malicious website while tinacms dev is running. This vulnerability is fixed in 2.1.8. |
2026-03-12 | |
| CVE-2026-28791 | 7.4 | HIGH | CWE-22 | 0.1% p24 | 5.18 | Tina is a headless content management system. Prior to 2.1.7, a path traversal v...Tina is a headless content management system. Prior to 2.1.7, a path traversal vulnerability exists in the TinaCMS development server's media upload handler. The code at media.ts joins user-controlled path segments using path.join() without validating that the resulting path stays within the intended media directory. This allows writing files to arbitrary locations on the filesystem. This vulnerability is fixed in 2.1.7. |
2026-03-12 | |
| CVE-2026-28356 | 7.5 | HIGH | CWE-1333 | 0.8% p74 | 5.27 | multipart is a fast multipart/form-data parser for python. Prior to 1.2.2, 1.3.1...multipart is a fast multipart/form-data parser for python. Prior to 1.2.2, 1.3.1 and 1.4.0-dev, the parse_options_header() function in multipart.py uses a regular expression with an ambiguous alternation, which can cause exponential backtracking (ReDoS) when parsing maliciously crafted HTTP or multipart segment headers. This can be abused for denial of service (DoS) attacks against web applications using this library to parse request headers or multipart/form-data streams. The issue is fixed in 1.2.2, 1.3.1 and 1.4.0-dev. |
2026-03-12 | |
| CVE-2026-27940 | 7.8 | HIGH | CWE-122 | 0.0% p3 | 5.46 | llama.cpp is an inference of several LLM models in C/C++. Prior to b8146, the gg...llama.cpp is an inference of several LLM models in C/C++. Prior to b8146, the gguf_init_from_file_impl() in gguf.cpp is vulnerable to an Integer overflow, leading to an undersized heap allocation. Using the subsequent fread() writes 528+ bytes of attacker-controlled data past the buffer boundary. This is a bypass of a similar bug in the same file - CVE-2025-53630, but the fix overlooked some areas. This vulnerability is fixed in b8146. |
2026-03-12 | |
| CVE-2026-25529 | 8.1 | HIGH | CWE-79 | 0.0% p13 | 5.67 | Postal is an open source SMTP server. Postal versions less than 3.3.5 had a HTML...Postal is an open source SMTP server. Postal versions less than 3.3.5 had a HTML injection vulnerability that allowed unescaped data to be included in the admin interface. The primary way for unescaped data to be added is via the API's "send/raw" method. This could allow arbitrary HTML to be injected in to the page which may modify the page in a misleading way or allow for unauthorised javascript to be executed. Fixed in 3.3.5 and higher. |
2026-03-12 | |
| CVE-2026-24125 | 6.3 | MEDIUM | CWE-22 | 0.1% p23 | 4.41 | Tina is a headless content management system. Prior to 2.1.2, TinaCMS allows use...Tina is a headless content management system. Prior to 2.1.2, TinaCMS allows users to create, update, and delete content documents using relative file paths (relativePath, newRelativePath) via GraphQL mutations. Under certain conditions, these paths are combined with the collection path using path.join() without validating that the resolved path remains within the collection root directory. Because path.join() does not prevent directory traversal, paths containing ../ sequences can escape the intended directory boundary. This vulnerability is fixed in 2.1.2. |
2026-03-12 | |
| CVE-2026-21887 | 7.7 | HIGH | CWE-918 | 0.0% p11 | 5.39 | OpenCTI is an open source platform for managing cyber threat intelligence knowle...OpenCTI is an open source platform for managing cyber threat intelligence knowledge and observables. Prior to 6.8.16, the OpenCTI platform’s data ingestion feature accepts user-supplied URLs without validation and uses the Axios HTTP client with its default configuration (allowAbsoluteUrls: true). This allows attackers to craft requests to arbitrary endpoints, including internal services, because Axios will accept and process absolute URLs. This results in a semi-blind SSRF, as responses may not be fully visible but can still impact internal systems. This vulnerability is fixed in 6.8.16. |
2026-03-12 | |
| CVE-2026-21708 | 9.9 | CRITICAL | N/A | 1.3% p79 | 6.97 | A vulnerability allowing a Backup Viewer to perform remote code execution (RCE) ...A vulnerability allowing a Backup Viewer to perform remote code execution (RCE) as the postgres user. |
2026-03-12 | |
| CVE-2026-21672 | 8.8 | HIGH | N/A | 0.0% p14 | 6.16 | A vulnerability allowing local privilege escalation on Windows-based Veeam Backu...A vulnerability allowing local privilege escalation on Windows-based Veeam Backup & Replication servers. |
2026-03-12 | |
| CVE-2026-4044 | 5.1 | MEDIUM | CWE-22 | 0.1% p24 | 3.57 | A vulnerability was detected in projectsend up to r1945. This affects the functi...A vulnerability was detected in projectsend up to r1945. This affects the function realpath of the file /import-orphans.php of the component Delete Handler. Performing a manipulation of the argument files[] results in path traversal. Remote exploitation of the attack is possible. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-12 | |
| CVE-2026-4043 | 7.4 | HIGH | CWE-119 | 0.1% p25 | 5.18 | A security vulnerability has been detected in Tenda i12 1.0.0.6(2204). The impac...A security vulnerability has been detected in Tenda i12 1.0.0.6(2204). The impacted element is the function formwrlSSIDget of the file /goform/wifiSSIDget. Such manipulation of the argument index leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed publicly and may be used. |
2026-03-12 | |
| CVE-2019-25543 | 8.8 | HIGH | CWE-89 | 0.2% p44 | 6.17 | Netartmedia Real Estate Portal 5.0 contains an SQL injection vulnerability that ...Netartmedia Real Estate Portal 5.0 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the page parameter. Attackers can submit POST requests to index.php with malicious SQL payloads in the page field to bypass authentication, extract sensitive data, or modify database contents. |
2026-03-12 | |
| CVE-2019-25542 | 8.8 | HIGH | CWE-89 | 0.2% p44 | 6.17 | Netartmedia Real Estate Portal 5.0 contains a SQL injection vulnerability that a...Netartmedia Real Estate Portal 5.0 contains a SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the user_email parameter. Attackers can send POST requests to index.php with malicious payloads in the user_email field to bypass authentication, extract sensitive data, or modify database contents. |
2026-03-12 | |
| CVE-2019-25541 | 8.8 | HIGH | CWE-89 | 0.1% p35 | 6.16 | Netartmedia PHP Mall 4.1 contains multiple SQL injection vulnerabilities that al...Netartmedia PHP Mall 4.1 contains multiple SQL injection vulnerabilities that allow unauthenticated attackers to manipulate database queries through unvalidated parameters. Attackers can inject time-based blind SQL payloads via the 'id' parameter in index.php or the 'Email' parameter in loginaction.php to extract sensitive database information. |
2026-03-12 | |
| CVE-2019-25540 | 8.8 | HIGH | CWE-89 | 0.1% p23 | 6.16 | Netartmedia PHP Mall 4.1 contains multiple SQL injection vulnerabilities that al...Netartmedia PHP Mall 4.1 contains multiple SQL injection vulnerabilities that allow unauthenticated attackers to manipulate database queries by injecting SQL code through various parameters. Attackers can craft malicious requests with SQL payloads to extract sensitive database information including user credentials and system data. |
2026-03-12 | |
| CVE-2019-25539 | 8.8 | HIGH | CWE-89 | 0.2% p41 | 6.17 | 202CMS v10 beta contains a blind SQL injection vulnerability that allows unauthe...202CMS v10 beta contains a blind SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the log_user parameter. Attackers can send POST requests to index.php with crafted SQL payloads using time-based blind injection techniques to extract sensitive database information. |
2026-03-12 | |
| CVE-2019-25538 | 8.8 | HIGH | CWE-89 | 0.2% p40 | 6.17 | 202CMS v10 beta contains an SQL injection vulnerability that allows unauthentica...202CMS v10 beta contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the log_user parameter. Attackers can send crafted requests with malicious SQL statements in the log_user field to extract sensitive database information or modify database contents. |
2026-03-12 | |
| CVE-2019-25537 | 8.8 | HIGH | CWE-89 | 0.1% p30 | 6.16 | Netartmedia Event Portal 2.0 contains a time-based blind SQL injection vulnerabi...Netartmedia Event Portal 2.0 contains a time-based blind SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the Email parameter. Attackers can send POST requests to loginaction.php with malicious SQL payloads in the Email field to extract sensitive database information. |
2026-03-12 | |
| CVE-2019-25536 | 8.8 | HIGH | CWE-89 | 0.1% p23 | 6.16 | Netartmedia PHP Real Estate Agency 4.0 contains an SQL injection vulnerability t...Netartmedia PHP Real Estate Agency 4.0 contains an SQL injection vulnerability that allows unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code through the features[] parameter. Attackers can send POST requests to index.php with crafted SQL payloads in the features[] parameter to extract sensitive database information or manipulate database queries. |
2026-03-12 | |
| CVE-2019-25535 | 8.8 | HIGH | CWE-89 | 0.1% p30 | 6.16 | Netartmedia PHP Dating Site contains a SQL injection vulnerability that allows u...Netartmedia PHP Dating Site contains a SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the Email parameter. Attackers can send POST requests to loginaction.php with time-based SQL injection payloads in the Email field to extract sensitive database information. |
2026-03-12 | |
| CVE-2019-25534 | 8.8 | HIGH | CWE-89 | 0.1% p30 | 6.16 | Netartmedia PHP Car Dealer contains an SQL injection vulnerability that allows u...Netartmedia PHP Car Dealer contains an SQL injection vulnerability that allows unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code through the features[] parameter. Attackers can submit POST requests to index.php with crafted SQL payloads in the features[] parameter to extract sensitive database information or manipulate database queries. |
2026-03-12 | |
| CVE-2019-25533 | 8.8 | HIGH | CWE-89 | 0.3% p53 | 6.17 | Netartmedia PHP Business Directory 4.2 contains an SQL injection vulnerability t...Netartmedia PHP Business Directory 4.2 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the Email parameter. Attackers can send POST requests to the loginaction.php endpoint with crafted SQL payloads in the Email field to extract sensitive database information or bypass authentication. |
2026-03-12 | |
| CVE-2019-25532 | 8.8 | HIGH | CWE-89 | 0.3% p53 | 6.17 | Netartmedia Jobs Portal 6.1 contains an SQL injection vulnerability that allows ...Netartmedia Jobs Portal 6.1 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the Email parameter. Attackers can send POST requests to loginaction.php with crafted SQL payloads in the Email field to extract sensitive database information or bypass authentication. |
2026-03-12 | |
| CVE-2019-25531 | 8.8 | HIGH | CWE-89 | 0.3% p53 | 6.17 | Netartmedia Deals Portal contains an SQL injection vulnerability in the Email pa...Netartmedia Deals Portal contains an SQL injection vulnerability in the Email parameter of loginaction.php that allows unauthenticated attackers to manipulate database queries. Attackers can submit crafted SQL payloads through POST requests to extract sensitive information or bypass authentication mechanisms. |
2026-03-12 | |
| CVE-2019-25530 | 8.8 | HIGH | CWE-89 | 0.1% p29 | 6.16 | uHotelBooking System contains an SQL injection vulnerability that allows unauthe...uHotelBooking System contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the system_page GET parameter. Attackers can send crafted requests to index.php with malicious system_page values using time-based blind SQL injection techniques to extract sensitive database information. |
2026-03-12 | |
| CVE-2019-25529 | 7.1 | HIGH | CWE-89 | 0.0% p9 | 4.97 | Placeto CMS Alpha rv.4 contains an SQL injection vulnerability that allows authe...Placeto CMS Alpha rv.4 contains an SQL injection vulnerability that allows authenticated attackers to manipulate database queries by injecting SQL code through the 'page' parameter. Attackers can send GET requests to the admin/edit.php endpoint with malicious 'page' values using boolean-based blind, time-based blind, or union-based techniques to extract sensitive database information. |
2026-03-12 | |
| CVE-2019-25528 | 8.8 | HIGH | CWE-89 | 0.1% p35 | 6.16 | Inout EasyRooms Ultimate Edition v1.0 contains an SQL injection vulnerability th...Inout EasyRooms Ultimate Edition v1.0 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the property1 parameter. Attackers can send POST requests to the search/searchdetailed endpoint with malicious SQL payloads to extract sensitive data or modify database contents. |
2026-03-12 | |
| CVE-2019-25527 | 8.8 | HIGH | CWE-89 | 0.2% p44 | 6.17 | Inout EasyRooms Ultimate Edition v1.0 contains an SQL injection vulnerability th...Inout EasyRooms Ultimate Edition v1.0 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the numguest parameter. Attackers can send POST requests to the search/searchdetailed endpoint with malicious SQL payloads to bypass authentication, extract sensitive data, or modify database contents. |
2026-03-12 | |
| CVE-2019-25526 | 8.8 | HIGH | CWE-89 | 0.1% p35 | 6.16 | Inout EasyRooms Ultimate Edition v1.0 contains an SQL injection vulnerability th...Inout EasyRooms Ultimate Edition v1.0 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the location parameter. Attackers can send POST requests to the search/searchdetailed endpoint with malicious SQL payloads in the location field to extract sensitive data or modify database contents. |
2026-03-12 | |
| CVE-2019-25525 | 8.8 | HIGH | CWE-89 | 0.2% p44 | 6.17 | Inout EasyRooms Ultimate Edition v1.0 contains an SQL injection vulnerability th...Inout EasyRooms Ultimate Edition v1.0 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the guests parameter. Attackers can send POST requests to the search/rentals endpoint with malicious SQL payloads to bypass authentication, extract sensitive data, or modify database contents. |
2026-03-12 | |
| CVE-2019-25524 | 8.8 | HIGH | CWE-89 | 0.2% p44 | 6.17 | XooGallery Latest contains an SQL injection vulnerability that allows unauthenti...XooGallery Latest contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the 'p' parameter. Attackers can send GET requests to results.php with malicious 'p' values to bypass authentication, extract sensitive data, or modify database contents. |
2026-03-12 | |
| CVE-2019-25523 | 8.8 | HIGH | CWE-89 | 0.2% p44 | 6.17 | XooGallery Latest contains an SQL injection vulnerability that allows unauthenti...XooGallery Latest contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the cat_id parameter. Attackers can send GET requests to cat.php with malicious cat_id values to bypass authentication, extract sensitive data, or modify database contents. |
2026-03-12 | |
| CVE-2019-25522 | 8.8 | HIGH | CWE-89 | 0.2% p44 | 6.17 | XooGallery Latest contains multiple SQL injection vulnerabilities that allow una...XooGallery Latest contains multiple SQL injection vulnerabilities that allow unauthenticated attackers to manipulate database queries by injecting SQL code through the photo_id parameter. Attackers can send GET requests to photo.php with malicious photo_id values to extract sensitive data, bypass authentication, or modify database contents. |
2026-03-12 | |
| CVE-2019-25521 | 8.8 | HIGH | CWE-89 | 0.1% p23 | 6.16 | XooGallery Latest contains an SQL injection vulnerability that allows unauthenti...XooGallery Latest contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the gal_id parameter. Attackers can send GET requests to gal.php with malicious gal_id values to extract sensitive database information or modify database contents. |
2026-03-12 | |
| CVE-2019-25520 | 8.8 | HIGH | CWE-89 | 0.2% p37 | 6.17 | Jettweb PHP Hazir Haber Sitesi Scripti V1 contains an authentication bypass vuln...Jettweb PHP Hazir Haber Sitesi Scripti V1 contains an authentication bypass vulnerability in the administration panel that allows unauthenticated attackers to gain administrative access by exploiting improper SQL query validation. Attackers can submit SQL injection payloads in the username and password fields of the admingiris.php login form to bypass authentication and access the administrative interface. |
2026-03-12 | |
| CVE-2019-25519 | 8.8 | HIGH | CWE-89 | 0.0% p10 | 6.16 | Jettweb PHP Hazir Haber Sitesi Scripti V1 contains an SQL injection vulnerabilit...Jettweb PHP Hazir Haber Sitesi Scripti V1 contains an SQL injection vulnerability that allows attackers to manipulate database queries by injecting malicious SQL code through the option parameter. Attackers can send POST requests to uyelik.php with crafted payloads in the option parameter to execute time-based SQL injection attacks and extract sensitive database information. |
2026-03-12 | |
| CVE-2019-25518 | 8.8 | HIGH | CWE-89 | 0.1% p24 | 6.16 | Jettweb PHP Hazir Haber Sitesi Scripti V1 contains an SQL injection vulnerabilit...Jettweb PHP Hazir Haber Sitesi Scripti V1 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the poll parameter. Attackers can send POST requests to arama.php with malicious SQL payloads in the poll parameter to extract sensitive data or modify database contents. |
2026-03-12 | |
| CVE-2019-25517 | 8.8 | HIGH | CWE-89 | 0.1% p24 | 6.16 | Jettweb PHP Hazir Haber Sitesi Scripti V1 contains an SQL injection vulnerabilit...Jettweb PHP Hazir Haber Sitesi Scripti V1 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the cid parameter. Attackers can send requests to haberarsiv.php with malicious cid values using UNION-based injection to extract sensitive database information or modify database contents. |
2026-03-12 | |
| CVE-2019-25516 | 8.8 | HIGH | CWE-89 | 0.1% p24 | 6.16 | Jettweb PHP Hazir Haber Sitesi Scripti V1 contains an SQL injection vulnerabilit...Jettweb PHP Hazir Haber Sitesi Scripti V1 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the gallery_id parameter. Attackers can send GET requests to gallery.php with malicious gallery_id values using UNION-based SQL injection to extract sensitive database information. |
2026-03-12 | |
| CVE-2019-25515 | 8.7 | HIGH | CWE-89 | 0.7% p71 | 6.11 | Jettweb PHP Hazir Haber Sitesi Scripti V3 contains an authentication bypass vuln...Jettweb PHP Hazir Haber Sitesi Scripti V3 contains an authentication bypass vulnerability in the login.php administration panel that allows unauthenticated attackers to gain administrative access by submitting crafted SQL syntax. Attackers can bypass authentication by submitting equals signs and 'or' operators as username and password parameters to access the administration panel without valid credentials. |
2026-03-12 | |
| CVE-2019-25514 | 8.8 | HIGH | CWE-89 | 0.1% p28 | 6.16 | Jettweb PHP Hazir Haber Sitesi Scripti V3 contains an SQL injection vulnerabilit...Jettweb PHP Hazir Haber Sitesi Scripti V3 contains an SQL injection vulnerability that allows attackers to inject malicious SQL commands through the kelime parameter in POST requests. Attackers can manipulate the kelime parameter with UNION-based SQL injection payloads to extract sensitive data from the database or bypass authentication controls. |
2026-03-12 | |
| CVE-2019-25513 | 8.8 | HIGH | CWE-89 | 0.3% p56 | 6.17 | Jettweb PHP Hazir Haber Sitesi Scripti V3 contains an SQL injection vulnerabilit...Jettweb PHP Hazir Haber Sitesi Scripti V3 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the 'q' parameter. Attackers can send GET requests to datagetir.php with malicious 'q' values using time-based blind SQL injection techniques to extract sensitive database information or bypass authentication. |
2026-03-12 | |
| CVE-2019-25512 | 8.8 | HIGH | CWE-89 | 0.0% p10 | 6.16 | Jettweb PHP Hazir Haber Sitesi Scripti V3 contains an SQL injection vulnerabilit...Jettweb PHP Hazir Haber Sitesi Scripti V3 contains an SQL injection vulnerability that allows attackers to inject malicious SQL commands through the kelime parameter in POST requests. Attackers can manipulate the kelime parameter with UNION-based SQL injection payloads to extract sensitive database information or modify database contents. |
2026-03-12 | |
| CVE-2019-25511 | 8.8 | HIGH | CWE-89 | 0.1% p24 | 6.16 | Jettweb PHP Hazir Haber Sitesi Scripti V3 contains an SQL injection vulnerabilit...Jettweb PHP Hazir Haber Sitesi Scripti V3 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the videoid parameter. Attackers can send GET requests to fonksiyonlar.php with malicious videoid values using UNION-based injection to extract sensitive database information. |
2026-03-12 | |
| CVE-2019-25510 | 8.8 | HIGH | CWE-89 | 0.2% p37 | 6.17 | Jettweb PHP Hazir Haber Sitesi Scripti V2 contains an authentication bypass vuln...Jettweb PHP Hazir Haber Sitesi Scripti V2 contains an authentication bypass vulnerability in the administration panel that allows unauthenticated attackers to gain administrative access by exploiting improper SQL query validation. Attackers can submit SQL injection payloads in the username and password fields of the admingiris.php login form to bypass authentication and access the administrative interface. |
2026-03-12 | |
| CVE-2019-25509 | 8.8 | HIGH | CWE-89 | 0.1% p30 | 6.16 | XooDigital Latest contains an SQL injection vulnerability that allows unauthenti...XooDigital Latest contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the 'p' parameter. Attackers can send GET requests to results.php with malicious 'p' values to extract sensitive database information. |
2026-03-12 | |
| CVE-2019-25508 | 8.8 | HIGH | CWE-89 | 0.1% p24 | 6.16 | Jettweb Php Hazir Ilan Sitesi Scripti V2 contains an SQL injection vulnerability...Jettweb Php Hazir Ilan Sitesi Scripti V2 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the 'kat' parameter. Attackers can send GET requests to the katgetir.php endpoint with malicious 'kat' values to extract sensitive database information. |
2026-03-12 | |
| CVE-2019-25488 | 8.8 | HIGH | CWE-89 | 0.1% p28 | 6.16 | Jettweb Hazir Rent A Car Scripti V4 contains multiple SQL injection vulnerabilit...Jettweb Hazir Rent A Car Scripti V4 contains multiple SQL injection vulnerabilities in the admin panel that allow unauthenticated attackers to manipulate database queries through GET parameters. Attackers can inject SQL code into the 'tur', 'id', and 'ozellikdil' parameters of the admin/index.php endpoint to extract sensitive database information or cause denial of service. |
2026-03-12 | |
| CVE-2019-25482 | 8.8 | HIGH | CWE-89 | 0.1% p24 | 6.16 | Jettweb PHP Hazir Rent A Car Sitesi Scripti V2 contains an SQL injection vulnera...Jettweb PHP Hazir Rent A Car Sitesi Scripti V2 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the arac_kategori_id parameter. Attackers can send POST requests to the endpoint with malicious SQL payloads to extract sensitive database information. |
2026-03-12 | |
| CVE-2019-25481 | 8.8 | HIGH | CWE-89 | 0.1% p30 | 6.16 | iScripts ReserveLogic contains an SQL injection vulnerability that allows unauth...iScripts ReserveLogic contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the jqSearchDestination parameter. Attackers can send POST requests to the search endpoint with crafted SQL payloads to extract sensitive database information. |
2026-03-12 | |
| CVE-2019-25479 | 8.8 | HIGH | CWE-89 | 0.1% p30 | 6.16 | Inout RealEstate contains an SQL injection vulnerability that allows unauthentic...Inout RealEstate contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the city parameter. Attackers can send POST requests to the agents/agentlistdetails endpoint with malicious SQL payloads in the city parameter to extract sensitive database information. |
2026-03-12 | |
| CVE-2019-25473 | 7.1 | HIGH | CWE-89 | 0.0% p9 | 4.97 | Clinic Pro contains a SQL injection vulnerability that allows authenticated atta...Clinic Pro contains a SQL injection vulnerability that allows authenticated attackers to manipulate database queries by injecting SQL code through the month parameter. Attackers can send POST requests to the monthly_expense_overview endpoint with crafted month values using boolean-based blind, time-based blind, or error-based SQL injection techniques to extract sensitive database information. |
2026-03-12 | |
| CVE-2026-4042 | 7.4 | HIGH | CWE-119 | 0.1% p25 | 5.18 | A weakness has been identified in Tenda i12 1.0.0.6(2204). The affected element ...A weakness has been identified in Tenda i12 1.0.0.6(2204). The affected element is the function formWifiMacFilterGet of the file /goform/WifiMacFilterGet. This manipulation of the argument index causes stack-based buffer overflow. The attack may be initiated remotely. The exploit has been made available to the public and could be used for attacks. |
2026-03-12 | |
| CVE-2026-4041 | 7.4 | HIGH | CWE-119 | 0.1% p25 | 5.18 | A security flaw has been discovered in Tenda i12 1.0.0.6(2204). Impacted is the ...A security flaw has been discovered in Tenda i12 1.0.0.6(2204). Impacted is the function vos_strcpy of the file /goform/exeCommand. The manipulation of the argument cmdinput results in stack-based buffer overflow. The attack can be launched remotely. The exploit has been released to the public and may be used for attacks. |
2026-03-12 | |
| CVE-2026-28384 | 9.4 | CRITICAL | CWE-78 | 0.1% p35 | 6.58 | An improper sanitization of the compression_algorithm parameter in Canonical LXD...An improper sanitization of the compression_algorithm parameter in Canonical LXD allows an authenticated, unprivileged user to execute commands as the LXD daemon on the LXD server via API calls to the image and backup endpoints. This issue affected LXD from 4.12 through 6.6 and was fixed in the snap versions 5.0.6-e49d9f4 (channel 5.0/stable), 5.21.4-1374f39 (channel 5.21/stable), and 6.7-1f11451 (channel 6.0 stable). The channel 4.0/stable is not affected as it contains version 4.0.10. |
2026-03-12 | |
| CVE-2026-21671 | 9.1 | CRITICAL | CWE-94 | 0.3% p56 | 6.38 | A vulnerability allowing an authenticated user with the Backup Administrator rol...A vulnerability allowing an authenticated user with the Backup Administrator role to perform remote code execution (RCE) in high availability (HA) deployments of Veeam Backup & Replication. |
2026-03-12 | |
| CVE-2026-21670 | 7.7 | HIGH | CWE-522 | 0.0% p11 | 5.39 | A vulnerability allowing a low-privileged user to extract saved SSH credentials.A vulnerability allowing a low-privileged user to extract saved SSH credentials. |
2026-03-12 | |
| CVE-2026-21669 | 9.9 | CRITICAL | CWE-94 | 0.3% p52 | 6.94 | A vulnerability allowing an authenticated domain user to perform remote code exe...A vulnerability allowing an authenticated domain user to perform remote code execution (RCE) on the Backup Server. |
2026-03-12 | |
| CVE-2026-21668 | 8.8 | HIGH | CWE-862 | 0.0% p8 | 6.16 | A vulnerability allowing an authenticated domain user to bypass restrictions and...A vulnerability allowing an authenticated domain user to bypass restrictions and manipulate arbitrary files on a Backup Repository. |
2026-03-12 | |
| CVE-2026-21667 | 9.9 | CRITICAL | CWE-284 | 0.3% p57 | 6.94 | A vulnerability allowing an authenticated domain user to perform remote code exe...A vulnerability allowing an authenticated domain user to perform remote code execution (RCE) on the Backup Server. |
2026-03-12 | |
| CVE-2026-21666 | 9.9 | CRITICAL | CWE-284 | 0.3% p57 | 6.94 | A vulnerability allowing an authenticated domain user to perform remote code exe...A vulnerability allowing an authenticated domain user to perform remote code execution (RCE) on the Backup Server. |
2026-03-12 | |
| CVE-2026-3099 | 5.8 | MEDIUM | CWE-323 | 0.4% p60 | 4.07 | A flaw was found in Libsoup. The server-side digest authentication implementatio...A flaw was found in Libsoup. The server-side digest authentication implementation in the SoupAuthDomainDigest class does not properly track issued nonces or enforce the required incrementing nonce-count (nc) attribute. This vulnerability allows a remote attacker to capture a single valid authentication header and replay it repeatedly. Consequently, the attacker can bypass authentication and gain unauthorized access to protected resources, impersonating the legitimate user. |
2026-03-12 | |
| CVE-2026-2987 | 6.1 | MEDIUM | CWE-79 | 0.1% p24 | 4.27 | The Simple Ajax Chat plugin for WordPress is vulnerable to Stored Cross-Site Scr...The Simple Ajax Chat plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'c' parameter in versions up to, and including, 20260217 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-03-12 | |
| CVE-2026-2514 | 8.6 | HIGH | CWE-79 | 0.0% p14 | 6.02 | In Progress Flowmon ADS versions prior to 12.5.5 and 13.0.3, a vulnerability exi...In Progress Flowmon ADS versions prior to 12.5.5 and 13.0.3, a vulnerability exists whereby an adversary with access to Flowmon monitoring ports may craft malicious network data that, when processed by Flowmon ADS and viewed by an authenticated user, could result in unintended actions being executed in the user's browser context. |
2026-03-12 | |
| CVE-2026-2513 | 8.6 | HIGH | CWE-79 | 0.1% p20 | 6.02 | A vulnerability exists in Progress Flowmon ADS versions prior to 12.5.5 and 13.0...A vulnerability exists in Progress Flowmon ADS versions prior to 12.5.5 and 13.0.3, whereby an administrator who clicks a malicious link provided by an attacker may inadvertently trigger unintended actions within their authenticated web session. |
2026-03-12 | |
| CVE-2026-4040 | 4.8 | MEDIUM | CWE-200 | 0.0% p3 | 3.36 | A vulnerability was identified in OpenClaw up to 2026.2.17. This issue affects t...A vulnerability was identified in OpenClaw up to 2026.2.17. This issue affects the function tools.exec.safeBins of the component File Existence Handler. The manipulation leads to information exposure through discrepancy. The attack needs to be performed locally. Upgrading to version 2026.2.19-beta.1 is capable of addressing this issue. The identifier of the patch is bafdbb6f112409a65decd3d4e7350fbd637c7754. Upgrading the affected component is advised. |
2026-03-12 | |
| CVE-2026-4039 | 5.3 | MEDIUM | CWE-74 | 0.1% p27 | 3.71 | A vulnerability was determined in OpenClaw 2026.2.19-2. This vulnerability affec...A vulnerability was determined in OpenClaw 2026.2.19-2. This vulnerability affects the function applySkillConfigenvOverrides of the component Skill Env Handler. Executing a manipulation can lead to code injection. It is possible to launch the attack remotely. Upgrading to version 2026.2.21-beta.1 is able to resolve this issue. This patch is called 8c9f35cdb51692b650ddf05b259ccdd75cc9a83c. It is recommended to upgrade the affected component. |
2026-03-12 | |
| CVE-2026-3989 | 7.8 | HIGH | N/A | 0.0% p3 | 5.46 | SGLangs `replay_request_dump.py` contains an insecure pickle.load() without vali...SGLangs `replay_request_dump.py` contains an insecure pickle.load() without validation and proper deserialization. An attacker can take advantage of this by providing a malicious .pkl file, which will execute the attackers code on the device running the script. |
2026-03-12 | |
| CVE-2026-3060 | 9.8 | CRITICAL | CWE-502 | 1.4% p80 | 6.90 | SGLang' encoder parallel disaggregation system is vulnerable to unauthenticated ...SGLang' encoder parallel disaggregation system is vulnerable to unauthenticated remote code execution through the disaggregation module, which deserializes untrusted data using pickle.loads() without authentication. |
2026-03-12 | |
| CVE-2026-3059 | 9.8 | CRITICAL | CWE-502 | 1.4% p80 | 6.90 | SGLang's multimodal generation module is vulnerable to unauthenticated remote co...SGLang's multimodal generation module is vulnerable to unauthenticated remote code execution through the ZMQ broker, which deserializes untrusted data using pickle.loads() without authentication. |
2026-03-12 | |
| CVE-2026-3234 | 4.3 | MEDIUM | CWE-93 | 0.2% p38 | 3.02 | A flaw was found in mod_proxy_cluster. This vulnerability, a Carriage Return Li...A flaw was found in mod_proxy_cluster. This vulnerability, a Carriage Return Line Feed (CRLF) injection in the decodeenc() function, allows a remote attacker to bypass input validation. By injecting CRLF sequences into the cluster configuration, an attacker can corrupt the response body of INFO endpoint responses. Exploitation requires network access to the MCMP protocol port, but no authentication is needed. |
2026-03-12 | |
| CVE-2026-2366 | 3.1 | LOW | CWE-639 | 0.0% p9 | 2.17 | A flaw was found in Keycloak. An authorization bypass vulnerability in the Keycl...A flaw was found in Keycloak. An authorization bypass vulnerability in the Keycloak Admin API allows any authenticated user, even those without administrative privileges, to enumerate the organization memberships of other users. This information disclosure occurs if the attacker knows the victim's unique identifier (UUID) and the Organizations feature is enabled. |
2026-03-12 | |
| CVE-2026-4016 | 4.8 | MEDIUM | CWE-119 | 0.0% p3 | 3.36 | A security vulnerability has been detected in GPAC 26.03-DEV. Affected by this v...A security vulnerability has been detected in GPAC 26.03-DEV. Affected by this vulnerability is the function svgin_process of the file src/filters/load_svg.c of the component SVG Parser. The manipulation leads to out-of-bounds write. Local access is required to approach this attack. The exploit has been disclosed publicly and may be used. The identifier of the patch is 7618d7206cdeb3c28961dc97ab0ecabaff0c8af2. It is suggested to install a patch to address this issue. |
2026-03-12 | |
| CVE-2026-4015 | 4.8 | MEDIUM | CWE-119 | 0.0% p3 | 3.36 | A weakness has been identified in GPAC 26.03-DEV. Affected is the function txtin...A weakness has been identified in GPAC 26.03-DEV. Affected is the function txtin_process_texml of the file src/filters/load_text.c of the component TeXML File Parser. Executing a manipulation can lead to stack-based buffer overflow. It is possible to launch the attack on the local host. The exploit has been made available to the public and could be used for attacks. This patch is called d29f6f1ada5cc284cdfa783b6f532c7d8bd049a5. Applying a patch is advised to resolve this issue. |
2026-03-12 | |
| CVE-2026-4014 | 6.9 | MEDIUM | CWE-74 | 0.0% p9 | 4.83 | A security flaw has been discovered in itsourcecode Cafe Reservation System 1.0....A security flaw has been discovered in itsourcecode Cafe Reservation System 1.0. This impacts an unknown function of the file /curvus2/signup.php of the component Registration. Performing a manipulation of the argument Username results in sql injection. Remote exploitation of the attack is possible. The exploit has been released to the public and may be used for attacks. |
2026-03-12 | |
| CVE-2026-4013 | 5.3 | MEDIUM | CWE-266 | 0.0% p13 | 3.71 | A vulnerability was identified in SourceCodester Web-based Pharmacy Product Mana...A vulnerability was identified in SourceCodester Web-based Pharmacy Product Management System 1.0. This affects an unknown function of the file add_admin.php. Such manipulation leads to improper authorization. The attack may be launched remotely. |
2026-03-12 | |
| CVE-2026-4012 | 1.9 | LOW | CWE-119 | 0.0% p3 | 1.33 | A vulnerability was determined in rxi fe up to ed4cda96bd582cbb08520964ba627efb4...A vulnerability was determined in rxi fe up to ed4cda96bd582cbb08520964ba627efb40f3dd91. The impacted element is the function read_ of the file src/fe.c. This manipulation with the input 1 causes out-of-bounds read. The attack requires local access. The exploit has been publicly disclosed and may be utilized. This product uses a rolling release model to deliver continuous updates. As a result, specific version information for affected or updated releases is not available. The project was informed of the problem early through an issue report but has not responded yet. |
2026-03-12 | |
| CVE-2026-4010 | 4.8 | MEDIUM | CWE-119 | 0.0% p5 | 3.36 | A vulnerability was found in ThakeeNathees pocketlang up to cc73ca61b113d48ee130...A vulnerability was found in ThakeeNathees pocketlang up to cc73ca61b113d48ee130d837a7a8b145e41de5ce. The affected element is the function pkByteBufferAddString. The manipulation of the argument length with the input 4294967290 results in memory corruption. The attack requires a local approach. The exploit has been made public and could be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The project was informed of the problem early through an issue report but has not responded yet. |
2026-03-12 | |
| CVE-2026-4009 | 4.8 | MEDIUM | CWE-119 | 0.0% p3 | 3.36 | A vulnerability has been found in jarikomppa soloud up to 20200207. Impacted is ...A vulnerability has been found in jarikomppa soloud up to 20200207. Impacted is the function drwav_read_pcm_frames_s16__msadpcm in the library src/audiosource/wav/dr_wav.h of the component WAV File Parser. The manipulation leads to out-of-bounds read. The attack needs to be performed locally. The exploit has been disclosed to the public and may be used. Upgrading to version 20200207 is recommended to address this issue. It is recommended to upgrade the affected component. The project was informed of the problem early through an issue report but has not responded yet. |
2026-03-12 | |
| CVE-2026-4008 | 7.4 | HIGH | CWE-119 | 0.1% p26 | 5.18 | A flaw has been found in Tenda W3 1.0.0.3(2204). This issue affects some unknown...A flaw has been found in Tenda W3 1.0.0.3(2204). This issue affects some unknown processing of the file /goform/wifiSSIDset of the component POST Parameter Handler. Executing a manipulation of the argument index/GO can lead to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been published and may be used. |
2026-03-12 | |
| CVE-2026-4007 | 7.4 | HIGH | CWE-119 | 0.1% p25 | 5.18 | A vulnerability was detected in Tenda W3 1.0.0.3(2204). This vulnerability affec...A vulnerability was detected in Tenda W3 1.0.0.3(2204). This vulnerability affects unknown code of the file /goform/wifiSSIDget of the component POST Parameter Handler. Performing a manipulation of the argument index results in stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit is now public and may be used. |
2026-03-12 | |
| CVE-2026-3994 | 4.8 | MEDIUM | CWE-119 | 0.0% p3 | 3.36 | A vulnerability was detected in rui314 mold up to 2.40.4. This issue affects the...A vulnerability was detected in rui314 mold up to 2.40.4. This issue affects the function mold::ObjectFilemold::X86_64::initialize_sections of the file src/input-files.cc of the component Object File Handler. Performing a manipulation results in heap-based buffer overflow. Attacking locally is a requirement. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet. |
2026-03-12 | |
| CVE-2026-3993 | 5.3 | MEDIUM | CWE-79 | 0.0% p11 | 3.71 | A security vulnerability has been detected in itsourcecode Payroll Management Sy...A security vulnerability has been detected in itsourcecode Payroll Management System 1.0. This vulnerability affects unknown code of the file /manage_employee_deductions.php. Such manipulation of the argument ID leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed publicly and may be used. |
2026-03-12 | |
| CVE-2026-3992 | 5.3 | MEDIUM | CWE-74 | 0.1% p16 | 3.71 | A weakness has been identified in CodeGenieApp serverless-express up to 4.17.1. ...A weakness has been identified in CodeGenieApp serverless-express up to 4.17.1. This affects an unknown part of the file utils/dynamodb.ts of the component Users Endpoint. This manipulation of the argument filter causes injection. The attack may be initiated remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-12 | |
| CVE-2026-3990 | 5.3 | MEDIUM | CWE-79 | 0.0% p10 | 3.71 | A security flaw has been discovered in CesiumGS CesiumJS up to 1.137.0. Affected...A security flaw has been discovered in CesiumGS CesiumJS up to 1.137.0. Affected by this issue is some unknown functionality of the file Apps/Sandcastle/standalone.html. The manipulation of the argument c results in cross site scripting. The attack can be launched remotely. The exploit has been released to the public and may be used for attacks. The presence of this vulnerability remains uncertain at this time. The vendor was contacted early about this disclosure but did not respond in any way. According to CVE-2023-48094, "the vendor's position is that Apps/Sandcastle/standalone.html is part of the CesiumGS/cesium GitHub repository, but is demo code that is not part of the CesiumJS JavaScript library product." |
2026-03-12 | |
| CVE-2026-3984 | 5.1 | MEDIUM | CWE-79 | 0.0% p10 | 3.57 | A weakness has been identified in Campcodes Division Regional Athletic Meet Game...A weakness has been identified in Campcodes Division Regional Athletic Meet Game Result Matrix System 2.1. This vulnerability affects unknown code of the file save_up_athlete.php. This manipulation of the argument a_name causes cross site scripting. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be used for attacks. |
2026-03-12 | |
| CVE-2026-3983 | 5.1 | MEDIUM | CWE-79 | 0.0% p10 | 3.57 | A security flaw has been discovered in Campcodes Division Regional Athletic Meet...A security flaw has been discovered in Campcodes Division Regional Athletic Meet Game Result Matrix System 2.1. This affects an unknown part of the file save-games.php. The manipulation of the argument game_name results in cross site scripting. The attack may be performed from remote. The exploit has been released to the public and may be used for attacks. |
2026-03-12 | |
| CVE-2026-2687 | 4.3 | MEDIUM | CWE-79 | 0.0% p10 | 3.01 | The Reading progressbar WordPress plugin before 1.3.1 does not sanitise and esca...The Reading progressbar WordPress plugin before 1.3.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). |
2026-03-12 | |
| CVE-2025-15473 | 4.3 | MEDIUM | CWE-862 | 0.1% p18 | 3.01 | The Timetics WordPress plugin before 1.0.52 does not have authorization in a RE...The Timetics WordPress plugin before 1.0.52 does not have authorization in a REST endpoint, allowing unauthenticated users to arbitrarily change a booking's payment status and post status for the "timetics-booking" custom post type. |
2026-03-12 | |
| CVE-2026-3982 | 5.3 | MEDIUM | CWE-79 | 0.0% p11 | 3.71 | A vulnerability was determined in itsourcecode University Management System 1.0....A vulnerability was determined in itsourcecode University Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /view_result.php. Executing a manipulation of the argument vr can lead to cross site scripting. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized. |
2026-03-12 | |
| CVE-2026-3981 | 6.9 | MEDIUM | CWE-74 | 0.0% p9 | 4.83 | A vulnerability was found in itsourcecode Online Doctor Appointment System 1.0. ...A vulnerability was found in itsourcecode Online Doctor Appointment System 1.0. Affected is an unknown function of the file /admin/doctor_action.php. Performing a manipulation of the argument ID results in sql injection. Remote exploitation of the attack is possible. The exploit has been made public and could be used. |
2026-03-12 | |
| CVE-2026-3980 | 6.9 | MEDIUM | CWE-74 | 0.0% p9 | 4.83 | A vulnerability has been found in itsourcecode Online Doctor Appointment System ...A vulnerability has been found in itsourcecode Online Doctor Appointment System 1.0. This impacts an unknown function of the file /admin/patient_action.php. Such manipulation of the argument patient_id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. |
2026-03-12 | |
| CVE-2026-3979 | 4.8 | MEDIUM | CWE-119 | 0.0% p3 | 3.36 | A flaw has been found in quickjs-ng quickjs up to 0.12.1. This affects the funct...A flaw has been found in quickjs-ng quickjs up to 0.12.1. This affects the function js_iterator_concat_return of the file quickjs.c. This manipulation causes use after free. The attack requires local access. The exploit has been published and may be used. Patch name: daab4ad4bae4ef071ed0294618d6244e92def4cd. Applying a patch is the recommended action to fix this issue. |
2026-03-12 | |
| CVE-2026-3978 | 7.4 | HIGH | CWE-119 | 0.1% p16 | 5.18 | A vulnerability was detected in D-Link DIR-513 1.10. The impacted element is an ...A vulnerability was detected in D-Link DIR-513 1.10. The impacted element is an unknown function of the file /goform/formEasySetupWizard3. The manipulation of the argument wan_connected results in stack-based buffer overflow. The attack can be launched remotely. The exploit is now public and may be used. |
2026-03-12 | |
| CVE-2026-3977 | 5.3 | MEDIUM | CWE-862 | 0.1% p17 | 3.71 | A security vulnerability has been detected in projectsend up to r1945. The affec...A security vulnerability has been detected in projectsend up to r1945. The affected element is an unknown function of the component AJAX Endpoints. The manipulation leads to missing authorization. The attack can be initiated remotely. The identifier of the patch is 35dfd6f08f7d517709c77ee73e57367141107e6b. To fix this issue, it is recommended to deploy a patch. |
2026-03-12 | |
| CVE-2026-3976 | 7.4 | HIGH | CWE-119 | 0.1% p26 | 5.18 | A weakness has been identified in Tenda W3 1.0.0.3(2204). Impacted is the functi...A weakness has been identified in Tenda W3 1.0.0.3(2204). Impacted is the function formWifiMacFilterSet of the file /goform/WifiMacFilterSet of the component POST Parameter Handler. Executing a manipulation of the argument index/GO can lead to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been made available to the public and could be used for attacks. |
2026-03-12 | |
| CVE-2026-3975 | 7.4 | HIGH | CWE-119 | 0.1% p25 | 5.18 | A security flaw has been discovered in Tenda W3 1.0.0.3(2204). This issue affect...A security flaw has been discovered in Tenda W3 1.0.0.3(2204). This issue affects the function formWifiMacFilterGet of the file /goform/WifiMacFilterGet of the component POST Parameter Handler. Performing a manipulation of the argument wl_radio results in stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been released to the public and may be used for attacks. |
2026-03-12 | |
| CVE-2026-3974 | 7.4 | HIGH | CWE-119 | 0.1% p25 | 5.18 | A vulnerability was identified in Tenda W3 1.0.0.3(2204). This vulnerability aff...A vulnerability was identified in Tenda W3 1.0.0.3(2204). This vulnerability affects the function formexeCommand of the file /goform/exeCommand of the component HTTP Handler. Such manipulation of the argument cmdinput leads to stack-based buffer overflow. The attack may be performed from remote. The exploit is publicly available and might be used. |
2026-03-12 | |
| CVE-2026-3657 | 7.5 | HIGH | CWE-89 | 0.2% p39 | 5.26 | The My Sticky Bar plugin for WordPress is vulnerable to SQL injection via the `s...The My Sticky Bar plugin for WordPress is vulnerable to SQL injection via the `stickymenu_contact_lead_form` AJAX action in all versions up to, and including, 2.8.6. This is due to the handler using attacker-controlled POST parameter names directly as SQL column identifiers in `$wpdb->insert()`. While parameter values are sanitized with `esc_sql()` and `sanitize_text_field()`, the parameter keys are used as-is to build the column list in the INSERT statement. This makes it possible for unauthenticated attackers to inject SQL via crafted parameter names, enabling blind time-based data extraction from the database. |
2026-03-12 | |
| CVE-2026-3226 | 4.3 | MEDIUM | CWE-862 | 0.0% p10 | 3.01 | The LearnPress – WordPress LMS Plugin plugin for WordPress is vulnerable to unau...The LearnPress – WordPress LMS Plugin plugin for WordPress is vulnerable to unauthorized email notification triggering due to missing capability checks on all 10 functions in the SendEmailAjax class in all versions up to, and including, 4.3.2.8. The AbstractAjax::catch_lp_ajax() dispatcher verifies a wp_rest nonce but performs no current_user_can() check before dispatching to handler functions. The wp_rest nonce is embedded in the frontend JavaScript for all authenticated users. This makes it possible for authenticated attackers, with Subscriber-level access and above, to trigger arbitrary email notifications to admins, instructors, and users, enabling email flooding, social engineering, and impersonation of admin decisions regarding instructor requests. |
2026-03-12 | |
| CVE-2026-1878 | 5.4 | MEDIUM | CWE-494 | 0.0% p0 | 3.78 | An Insufficient Integrity Verification vulnerability in the ASUS ROG peripheral ...An Insufficient Integrity Verification vulnerability in the ASUS ROG peripheral driver installation process allows privilege escalation to SYSTEM. The vulnerability is due to improper access control on the installation directory, which enables the exploitation of a race condition where the legitimate installer is substituted with an unexpected payload immediately after download, resulting in arbitrary code execution. Refer to the "Security Update for ASUS ROG peripheral driver" section on the ASUS Security Advisory for more information. |
2026-03-12 | |
| CVE-2026-3973 | 7.4 | HIGH | CWE-119 | 0.1% p26 | 5.18 | A vulnerability was determined in Tenda W3 1.0.0.3(2204). This affects the funct...A vulnerability was determined in Tenda W3 1.0.0.3(2204). This affects the function formSetAutoPing of the file /goform/setAutoPing of the component POST Parameter Handler. This manipulation of the argument ping1/ping2 causes stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been publicly disclosed and may be utilized. |
2026-03-12 | |
| CVE-2026-3972 | 8.7 | HIGH | CWE-119 | 0.1% p32 | 6.09 | A vulnerability was found in Tenda W3 1.0.0.3(2204). Affected by this issue is t...A vulnerability was found in Tenda W3 1.0.0.3(2204). Affected by this issue is the function formSetCfm of the file /goform/setcfm of the component HTTP Handler. The manipulation of the argument funcpara1 results in stack-based buffer overflow. The attack can only be performed from the local network. The exploit has been made public and could be used. |
2026-03-12 | |
| CVE-2026-1182 | 4.3 | MEDIUM | CWE-212 | 0.0% p6 | 3.01 | GitLab has remediated an issue in GitLab CE/EE affecting all versions from 8.14 ...GitLab has remediated an issue in GitLab CE/EE affecting all versions from 8.14 before 18.7.6, 18.8 before 18.8.6, and 18.9 before 18.9.2 that could have allowed an authenticated user to gain unauthorized access to confidential issue title created in public projects under certain circumstances. |
2026-03-12 | |
| CVE-2026-3971 | 7.4 | HIGH | CWE-119 | 0.1% p26 | 5.18 | A vulnerability has been found in Tenda i3 1.0.0.6(2204). Affected by this vulne...A vulnerability has been found in Tenda i3 1.0.0.6(2204). Affected by this vulnerability is the function formwrlSSIDset of the file /goform/wifiSSIDset. The manipulation of the argument index/GO leads to stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used. |
2026-03-12 | |
| CVE-2026-3970 | 7.4 | HIGH | CWE-119 | 0.1% p25 | 5.18 | A flaw has been found in Tenda i3 1.0.0.6(2204). Affected is the function formwr...A flaw has been found in Tenda i3 1.0.0.6(2204). Affected is the function formwrlSSIDget of the file /goform/wifiSSIDget. Executing a manipulation of the argument index can lead to stack-based buffer overflow. The attack may be launched remotely. The exploit has been published and may be used. |
2026-03-12 | |
| CVE-2026-3969 | 6.9 | MEDIUM | CWE-74 | 0.0% p12 | 4.83 | A vulnerability was detected in FeMiner wms up to 1.0. This impacts an unknown f...A vulnerability was detected in FeMiner wms up to 1.0. This impacts an unknown function of the file /wms-master/src/basic/depart/depart_add_bg.php of the component Basic Organizational Structure Module. Performing a manipulation of the argument Name results in sql injection. The attack may be initiated remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-12 | |
| CVE-2026-3968 | 5.3 | MEDIUM | CWE-74 | 0.1% p16 | 3.71 | A vulnerability has been found in AutohomeCorp frostmourne up to 1.0. This affec...A vulnerability has been found in AutohomeCorp frostmourne up to 1.0. This affects the function scriptEngine.eval of the file ExpressionRule.java of the component Oracle Nashorn JavaScript Engine. Such manipulation of the argument EXPRESSION leads to code injection. The attack can be executed remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-12 | |
| CVE-2023-43010 | 8.8 | HIGH | CWE-787 | 0.1% p15 | 6.16 | The issue was addressed with improved memory handling. This issue is fixed in iO...The issue was addressed with improved memory handling. This issue is fixed in iOS 17.2 and iPadOS 17.2, macOS Sonoma 14.2, Safari 17.2, iOS 16.7.15 and iPadOS 16.7.15, iOS 15.8.7 and iPadOS 15.8.7. Processing maliciously crafted web content may lead to memory corruption. |
2026-03-12 | |
| CVE-2026-3967 | 5.3 | MEDIUM | CWE-20 | 0.1% p16 | 3.71 | A flaw has been found in Alfresco Activiti up to 7.19/8.8.0. Affected by this is...A flaw has been found in Alfresco Activiti up to 7.19/8.8.0. Affected by this issue is the function deserialize/createObjectInputStream of the file activiti-core/activiti-engine/src/main/java/org/activiti/engine/impl/variable/SerializableType.java of the component Process Variable Serialization System. This manipulation causes deserialization. Remote exploitation of the attack is possible. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-12 | |
| CVE-2026-3966 | 5.3 | MEDIUM | CWE-918 | 0.0% p13 | 3.71 | A vulnerability was detected in 648540858 wvp-GB28181-pro up to 2.7.4-20260107. ...A vulnerability was detected in 648540858 wvp-GB28181-pro up to 2.7.4-20260107. Affected by this vulnerability is the function getDownloadFilePath of the file /src/main/java/com/genersoft/iot/vmp/media/abl/ABLMediaNodeServerService.java of the component IP Address Handler. The manipulation of the argument MediaServer.streamIp results in server-side request forgery. The attack may be launched remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-12 | |
| CVE-2026-3965 | 5.3 | MEDIUM | CWE-693 | 0.1% p28 | 3.71 | A security vulnerability has been detected in whyour qinglong up to 2.20.1. Affe...A security vulnerability has been detected in whyour qinglong up to 2.20.1. Affected is an unknown function of the file back/loaders/express.ts of the component API Interface. The manipulation of the argument command leads to protection mechanism failure. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used. Upgrading to version 2.20.2 is able to address this issue. The identifier of the patch is 6bec52dca158481258315ba0fc2f11206df7b719. It is advisable to upgrade the affected component. The code maintainer was informed beforehand about the issues. He reacted very fast and highly professional. |
2026-03-12 | |
| CVE-2026-2808 | 6.8 | MEDIUM | CWE-59 | 0.0% p7 | 4.76 | HashiCorp Consul and Consul Enterprise 1.18.20 up to 1.21.10 and 1.22.4 are vuln...HashiCorp Consul and Consul Enterprise 1.18.20 up to 1.21.10 and 1.22.4 are vulnerable to arbitrary file read when configured with Kubernetes authentication. This vulnerability, CVE-2026-2808, is fixed in Consul 1.18.21, 1.21.11 and 1.22.5. |
2026-03-12 | |
| CVE-2026-3964 | 4.8 | MEDIUM | CWE-77 | 0.4% p63 | 3.37 | A weakness has been identified in OpenAkita up to 1.24.3. This impacts the funct...A weakness has been identified in OpenAkita up to 1.24.3. This impacts the function run of the file src/openakita/tools/shell.py of the component Chat API Endpoint. Executing a manipulation of the argument Message can lead to os command injection. The attack is restricted to local execution. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-11 | |
| CVE-2026-3962 | 5.3 | MEDIUM | CWE-79 | 0.0% p13 | 3.71 | A vulnerability was identified in Jcharis Machine-Learning-Web-Apps up to a6996b...A vulnerability was identified in Jcharis Machine-Learning-Web-Apps up to a6996b634d98ccec4701ac8934016e8175b60eb5. The impacted element is the function render_template of the file Machine-Learning-Web-Apps-master/Build-n-Deploy-Flask-App-with-Waypoint/app/app.py of the component Jinja2 Template Handler. Such manipulation leads to cross site scripting. It is possible to launch the attack remotely. The exploit is publicly available and might be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The project was informed of the problem early through an issue report but has not responded yet. |
2026-03-11 | |
| CVE-2026-31988 | 6.9 | MEDIUM | CWE-193 | 0.1% p34 | 4.83 | yauzl (aka Yet Another Unzip Library) version 3.2.0 for Node.js contains an off-...yauzl (aka Yet Another Unzip Library) version 3.2.0 for Node.js contains an off-by-one error in the NTFS extended timestamp extra field parser within the getLastModDate() function. The while loop condition checks cursor < data.length + 4 instead of cursor + 4 <= data.length, allowing readUInt16LE() to read past the buffer boundary. A remote attacker can cause a denial of service (process crash via ERR_OUT_OF_RANGE exception) by sending a crafted zip file with a malformed NTFS extra field. This affects any Node.js application that processes zip file uploads and calls entry.getLastModDate() on parsed entries. Fixed in version 3.2.1. |
2026-03-11 | |
| CVE-2026-3961 | 5.3 | MEDIUM | CWE-918 | 0.1% p21 | 3.71 | A vulnerability was determined in zyddnys manga-image-translator up to beta-0.3....A vulnerability was determined in zyddnys manga-image-translator up to beta-0.3. The affected element is the function to_pil_image of the file manga-image-translator-main/server/request_extraction.py of the component Translate Endpoints. This manipulation causes server-side request forgery. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized. The project was informed of the problem early through an issue report but has not responded yet. |
2026-03-11 | |
| CVE-2026-3959 | 4.8 | MEDIUM | CWE-77 | 0.4% p58 | 3.37 | A vulnerability was found in 0xKoda WireMCP up to 7f45f8b2b4adeb76be8c6227eefb38...A vulnerability was found in 0xKoda WireMCP up to 7f45f8b2b4adeb76be8c6227eefb38533fdd6b1e. Impacted is the function server.tool of the file index.js of the component Tshark CLI Command Handler. The manipulation results in os command injection. The attack needs to be approached locally. The exploit has been made public and could be used. This product utilizes a rolling release system for continuous delivery, and as such, version information for affected or updated releases is not disclosed. The project was informed of the problem early through an issue report but has not responded yet. |
2026-03-11 | |
| CVE-2026-3958 | 5.3 | MEDIUM | CWE-918 | 0.0% p14 | 3.71 | A vulnerability has been found in Woahai321 ListSync up to 0.6.6. This issue aff...A vulnerability has been found in Woahai321 ListSync up to 0.6.6. This issue affects the function requests.post of the file list-sync-main/api_server.py of the component JSON Handler. The manipulation leads to server-side request forgery. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used. The project was informed of the problem early through an issue report but has not responded yet. |
2026-03-11 | |
| CVE-2026-3942 | 4.3 | MEDIUM | CWE-451 | 0.0% p8 | 3.01 | Incorrect security UI in PictureInPicture in Google Chrome prior to 146.0.7680.7...Incorrect security UI in PictureInPicture in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low) |
2026-03-11 | |
| CVE-2026-3941 | 4.3 | MEDIUM | CWE-602 | 0.0% p10 | 3.01 | Insufficient policy enforcement in DevTools in Google Chrome prior to 146.0.7680...Insufficient policy enforcement in DevTools in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Low) |
2026-03-11 | |
| CVE-2026-3940 | 5.3 | MEDIUM | NVD-CWE-noinfo | 0.0% p7 | 3.71 | Insufficient policy enforcement in DevTools in Google Chrome prior to 146.0.7680...Insufficient policy enforcement in DevTools in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Low) |
2026-03-11 | |
| CVE-2026-3939 | 5.3 | MEDIUM | NVD-CWE-noinfo | 0.0% p7 | 3.71 | Insufficient policy enforcement in PDF in Google Chrome prior to 146.0.7680.71 a...Insufficient policy enforcement in PDF in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to bypass navigation restrictions via a crafted PDF file. (Chromium security severity: Low) |
2026-03-11 | |
| CVE-2026-3938 | 4.3 | MEDIUM | NVD-CWE-noinfo | 0.0% p10 | 3.01 | Insufficient policy enforcement in Clipboard in Google Chrome prior to 146.0.768...Insufficient policy enforcement in Clipboard in Google Chrome prior to 146.0.7680.71 allowed a remote attacker who had compromised the renderer process to leak cross-origin data via a crafted HTML page. (Chromium security severity: Low) |
2026-03-11 | |
| CVE-2026-3937 | 6.5 | MEDIUM | NVD-CWE-noinfo | 0.0% p8 | 4.55 | Incorrect security UI in Downloads in Google Chrome on Android prior to 146.0.76...Incorrect security UI in Downloads in Google Chrome on Android prior to 146.0.7680.71 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low) |
2026-03-11 | |
| CVE-2026-3936 | 8.8 | HIGH | CWE-416 | 0.1% p30 | 6.16 | Use after free in WebView in Google Chrome on Android prior to 146.0.7680.71 all...Use after free in WebView in Google Chrome on Android prior to 146.0.7680.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium) |
2026-03-11 | |
| CVE-2026-3935 | 6.5 | MEDIUM | NVD-CWE-noinfo | 0.0% p7 | 4.55 | Incorrect security UI in WebAppInstalls in Google Chrome prior to 146.0.7680.71 ...Incorrect security UI in WebAppInstalls in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium) |
2026-03-11 | |
| CVE-2026-3934 | 6.5 | MEDIUM | NVD-CWE-noinfo | 0.0% p7 | 4.55 | Insufficient policy enforcement in ChromeDriver in Google Chrome prior to 146.0....Insufficient policy enforcement in ChromeDriver in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to bypass same origin policy via a crafted HTML page. (Chromium security severity: Medium) |
2026-03-11 | |
| CVE-2026-3932 | 7.5 | HIGH | NVD-CWE-noinfo | 0.0% p7 | 5.25 | Insufficient policy enforcement in PDF in Google Chrome on Android prior to 146....Insufficient policy enforcement in PDF in Google Chrome on Android prior to 146.0.7680.71 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Medium) |
2026-03-11 | |
| CVE-2026-3931 | 8.8 | HIGH | CWE-122 | 0.1% p24 | 6.16 | Heap buffer overflow in Skia in Google Chrome prior to 146.0.7680.71 allowed a r...Heap buffer overflow in Skia in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: Medium) |
2026-03-11 | |
| CVE-2026-3930 | 5.3 | MEDIUM | NVD-CWE-noinfo | 0.0% p7 | 3.71 | Unsafe navigation in Navigation in Google Chrome on iOS prior to 146.0.7680.71 a...Unsafe navigation in Navigation in Google Chrome on iOS prior to 146.0.7680.71 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Medium) |
2026-03-11 | |
| CVE-2026-3929 | 3.1 | LOW | CWE-1300 | 0.0% p9 | 2.17 | Side-channel information leakage in ResourceTiming in Google Chrome prior to 146...Side-channel information leakage in ResourceTiming in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium) |
2026-03-11 | |
| CVE-2026-3928 | 4.3 | MEDIUM | CWE-451 | 0.0% p3 | 3.01 | Insufficient policy enforcement in Extensions in Google Chrome prior to 146.0.76...Insufficient policy enforcement in Extensions in Google Chrome prior to 146.0.7680.71 allowed an attacker who convinced a user to install a malicious extension to perform UI spoofing via a crafted Chrome Extension. (Chromium security severity: Medium) |
2026-03-11 | |
| CVE-2026-3927 | 4.3 | MEDIUM | CWE-451 | 0.0% p8 | 3.01 | Incorrect security UI in PictureInPicture in Google Chrome prior to 146.0.7680.7...Incorrect security UI in PictureInPicture in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium) |
2026-03-11 | |
| CVE-2026-3926 | 8.8 | HIGH | CWE-125 | 0.1% p26 | 6.16 | Out of bounds read in V8 in Google Chrome prior to 146.0.7680.71 allowed a remot...Out of bounds read in V8 in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: Medium) |
2026-03-11 | |
| CVE-2026-3925 | 4.3 | MEDIUM | CWE-451 | 0.0% p7 | 3.01 | Incorrect security UI in LookalikeChecks in Google Chrome on Android prior to 14...Incorrect security UI in LookalikeChecks in Google Chrome on Android prior to 146.0.7680.71 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium) |
2026-03-11 | |
| CVE-2026-3924 | 7.5 | HIGH | CWE-416 | 0.1% p32 | 5.25 | use after free in WindowDialog in Google Chrome prior to 146.0.7680.71 allowed a...use after free in WindowDialog in Google Chrome prior to 146.0.7680.71 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High) |
2026-03-11 | |
| CVE-2026-3923 | 8.8 | HIGH | CWE-416 | 0.1% p30 | 6.16 | Use after free in WebMIDI in Google Chrome prior to 146.0.7680.71 allowed a remo...Use after free in WebMIDI in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) |
2026-03-11 | |
| CVE-2026-3922 | 8.8 | HIGH | CWE-416 | 0.1% p32 | 6.16 | Use after free in MediaStream in Google Chrome prior to 146.0.7680.71 allowed a ...Use after free in MediaStream in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) |
2026-03-11 | |
| CVE-2026-3921 | 8.8 | HIGH | CWE-416 | 0.1% p32 | 6.16 | Use after free in TextEncoding in Google Chrome prior to 146.0.7680.71 allowed a...Use after free in TextEncoding in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) |
2026-03-11 | |
| CVE-2026-3920 | 8.8 | HIGH | CWE-125 | 0.1% p24 | 6.16 | Out of bounds memory access in WebML in Google Chrome prior to 146.0.7680.71 all...Out of bounds memory access in WebML in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) |
2026-03-11 | |
| CVE-2026-3919 | 8.8 | HIGH | CWE-416 | 0.0% p9 | 6.16 | Use after free in Extensions in Google Chrome prior to 146.0.7680.71 allowed an ...Use after free in Extensions in Google Chrome prior to 146.0.7680.71 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) |
2026-03-11 | |
| CVE-2026-3918 | 8.8 | HIGH | CWE-416 | 0.1% p30 | 6.16 | Use after free in WebMCP in Google Chrome prior to 146.0.7680.71 allowed a remot...Use after free in WebMCP in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) |
2026-03-11 | |
| CVE-2026-3917 | 8.8 | HIGH | CWE-416 | 0.1% p32 | 6.16 | Use after free in Agents in Google Chrome prior to 146.0.7680.71 allowed a remot...Use after free in Agents in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) |
2026-03-11 | |
| CVE-2026-3916 | 9.6 | CRITICAL | CWE-125 | 0.1% p24 | 6.72 | Out of bounds read in Web Speech in Google Chrome prior to 146.0.7680.71 allowed...Out of bounds read in Web Speech in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High) |
2026-03-11 | |
| CVE-2026-3915 | 8.8 | HIGH | CWE-122 | 0.1% p23 | 6.16 | Heap buffer overflow in WebML in Google Chrome prior to 146.0.7680.71 allowed a ...Heap buffer overflow in WebML in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High) |
2026-03-11 | |
| CVE-2026-3914 | 8.8 | HIGH | CWE-472 | 0.1% p24 | 6.16 | Integer overflow in WebML in Google Chrome prior to 146.0.7680.71 allowed a remo...Integer overflow in WebML in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) |
2026-03-11 | |
| CVE-2026-3913 | 8.8 | HIGH | CWE-122 | 0.1% p23 | 6.16 | Heap buffer overflow in WebML in Google Chrome prior to 146.0.7680.71 allowed a ...Heap buffer overflow in WebML in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical) |
2026-03-11 | |
| CVE-2026-32136 | 9.8 | CRITICAL | CWE-287 | 0.7% p71 | 6.88 | AdGuard Home is a network-wide software for blocking ads and tracking. Prior to ...AdGuard Home is a network-wide software for blocking ads and tracking. Prior to 0.107.73, an unauthenticated remote attacker can bypass all authentication in AdGuardHome by sending an HTTP/1.1 request that requests an upgrade to HTTP/2 cleartext (h2c). Once the upgrade is accepted, the resulting HTTP/2 connection is handled by the inner mux, which has no authentication middleware attached. All subsequent HTTP/2 requests on that connection are processed as fully authenticated, regardless of whether any credentials were provided. This vulnerability is fixed in 0.107.73. |
2026-03-11 | |
| CVE-2026-32133 | 7.8 | HIGH | CWE-918 | 0.0% p15 | 5.46 | 2FAuth is a web app to manage Two-Factor Authentication (2FA) accounts and gener...2FAuth is a web app to manage Two-Factor Authentication (2FA) accounts and generate their security codes. Prior to 6.1.0, a blind SSRF vulnerability exists in 2FAuth that allows authenticated users to make arbitrary HTTP requests from the server to internal networks and cloud metadata endpoints. The image parameter in OTP URL is not properly validated for internal / private IP addresses before making HTTP requests. While the previous fix added response validation to ensure only valid images are stored but HTTP request is still made to arbitrary URLs before this validation occurs. This vulnerability is fixed in 6.1.0. |
2026-03-11 | |
| CVE-2026-32132 | 7.4 | HIGH | CWE-613 | 0.0% p13 | 5.18 | ZITADEL is an open source identity management platform. Prior to 3.4.8 and 4.12....ZITADEL is an open source identity management platform. Prior to 3.4.8 and 4.12.2, a potential vulnerability exists in Zitadel's passkey registration endpoints. This endpoint allows registering a new passkey using a previously retrieved code. An improper expiration check of the code, could allow an attacker to potentially register their own passkey and gain access to the victim's account. This vulnerability is fixed in 3.4.8 and 4.12.2. |
2026-03-11 | |
| CVE-2026-32131 | 7.7 | HIGH | CWE-639 | 0.0% p11 | 5.39 | ZITADEL is an open source identity management platform. Prior to 3.4.8 and 4.12....ZITADEL is an open source identity management platform. Prior to 3.4.8 and 4.12.2, a vulnerability in Zitadel's Management API has been reported, which allowed authenticated users holding a valid low-privilege token (e.g., project.read, project.grant.read, or project.app.read) to retrieve management-plane information belonging to other organizations by specifying a different tenant’s project_id, grant_id, or app_id. This vulnerability is fixed in 3.4.8 and 4.12.2. |
2026-03-11 | |
| CVE-2026-32130 | 7.5 | HIGH | CWE-288 | 0.2% p47 | 5.26 | ZITADEL is an open source identity management platform. From 2.68.0 to before 3....ZITADEL is an open source identity management platform. From 2.68.0 to before 3.4.8 and 4.12.2, Zitadel provides a System for Cross-domain Identity Management (SCIM) API to provision users from external providers into Zitadel. Request to the API with URL-encoded path values were correctly routed but would bypass necessary authentication and permission checks. This allowed unauthenticated attackers to retrieve sensitive information such as names, email addresses, phone numbers, addresses, external IDs, and roles. Note that due to additional checks when manipulating data, an attacker could not modify or delete any user data. This vulnerability is fixed in 3.4.8 and 4.12.2. |
2026-03-11 | |
| CVE-2026-32128 | 6.3 | MEDIUM | CWE-184 | 0.1% p22 | 4.41 | FastGPT is an AI Agent building platform. In 4.14.7 and earlier, FastGPT's Pytho...FastGPT is an AI Agent building platform. In 4.14.7 and earlier, FastGPT's Python Sandbox (fastgpt-sandbox) includes guardrails intended to prevent file writes (static detection + seccomp). These guardrails are bypassable by remapping stdout (fd 1) to an arbitrary writable file descriptor using fcntl. After remapping, writing via sys.stdout.write() still satisfies the seccomp rule write(fd==1), enabling arbitrary file creation/overwrite inside the sandbox container despite the intended no file writes restriction. |
2026-03-11 | |
| CVE-2026-32117 | 7.6 | HIGH | CWE-79 | 0.0% p2 | 5.32 | The grafanacubism-panel plugin allows use of cubism.js in Grafana. In 0.1.2 and ...The grafanacubism-panel plugin allows use of cubism.js in Grafana. In 0.1.2 and earlier, the panel's zoom-link handler passes a dashboard-editor-supplied URL directly to window.location.assign() / window.open() with no scheme validation. An attacker with dashboard Editor privileges can set the link to a javascript: URI; when any Viewer drag-zooms on the panel, the payload executes in the Grafana origin. |
2026-03-11 | |
| CVE-2026-27591 | 9.9 | CRITICAL | CWE-284 | 0.1% p25 | 6.93 | Winter is a free, open-source content management system (CMS) based on the Larav...Winter is a free, open-source content management system (CMS) based on the Laravel PHP framework. Prior to 1.0.477, 1.1.12, and 1.2.12, Winter CMS allowed authenticated backend users to escalate their accounts level of access to the system by modifying the roles / permissions assigned to their account through specially crafted requests to the backend while logged in. To actively exploit this security issue, an attacker would need access to the Backend with a user account with any level of access. This vulnerability is fixed in 1.0.477, 1.1.12, and 1.2.12. |
2026-03-11 | |
| CVE-2025-62328 | 3.7 | LOW | CWE-1021 | 0.0% p12 | 2.59 | HCL Nomad server on Domino did not configure the frame-ancestors directive in th...HCL Nomad server on Domino did not configure the frame-ancestors directive in the Content-Security-Policy header by default which could allow an attacker to obtain sensitive information via unspecified vectors. |
2026-03-11 | |
| CVE-2026-3957 | 5.1 | MEDIUM | CWE-74 | 0.0% p14 | 3.57 | A flaw has been found in xierongwkhd weimai-wetapp up to 5fe9e8225be4f73f2c5087f...A flaw has been found in xierongwkhd weimai-wetapp up to 5fe9e8225be4f73f2c5087f134aff657bdf1c6f2. This vulnerability affects the function getLikeMovieList of the file source-code/src/main/java/com/moke/wp/wx_weimai/controller/HomeController.java of the component Endpoint. Executing a manipulation of the argument cat can lead to sql injection. The attack can be executed remotely. The exploit has been published and may be used. This product implements a rolling release for ongoing delivery, which means version information for affected or updated releases is unavailable. The project was informed of the problem early through an issue report but has not responded yet. |
2026-03-11 | |
| CVE-2026-3956 | 5.1 | MEDIUM | CWE-74 | 0.0% p11 | 3.57 | A vulnerability was detected in xierongwkhd weimai-wetapp up to 5fe9e8225be4f73f...A vulnerability was detected in xierongwkhd weimai-wetapp up to 5fe9e8225be4f73f2c5087f134aff657bdf1c6f2. This affects the function getAdmins of the file source-code/src/main/java/com/moke/wp/wx_weimai/controller/admin/Admin_AdminUserController.java. Performing a manipulation of the argument keyword results in sql injection. Remote exploitation of the attack is possible. The exploit is now public and may be used. This product follows a rolling release approach for continuous delivery, so version details for affected or updated releases are not provided. The project was informed of the problem early through an issue report but has not responded yet. |
2026-03-11 | |
| CVE-2026-3955 | 5.3 | MEDIUM | CWE-74 | 0.1% p17 | 3.71 | A security vulnerability has been detected in elecV2P up to 3.8.3. Affected by t...A security vulnerability has been detected in elecV2P up to 3.8.3. Affected by this issue is the function runJSFile of the file source-code/elecV2P-master/webser/wbjs.js of the component jsfile Endpoint. Such manipulation leads to code injection. The attack may be launched remotely. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report but has not responded yet. |
2026-03-11 | |
| CVE-2026-32127 | 8.8 | HIGH | CWE-89 | 0.0% p0 | 6.16 | OpenEMR is a free and open source electronic health records and medical practice...OpenEMR is a free and open source electronic health records and medical practice management application. Prior to 8.0.0.1, OpenEMR contains a SQL injection vulnerability in the ajax graphs library that can be exploited by authenticated attackers. The vulnerability exists due to insufficient input validation in the ajax graphs library. This vulnerability is fixed in 8.0.0.1. |
2026-03-11 | |
| CVE-2026-32126 | 7.1 | HIGH | CWE-862 | 0.1% p32 | 4.97 | OpenEMR is a free and open source electronic health records and medical practice...OpenEMR is a free and open source electronic health records and medical practice management application. Prior to 8.0.0.1, an inverted boolean condition in ControllerRouter::route() causes the admin/super ACL check to be enforced only for controllers that already have their own internal authorization (review, log), while leaving all other CDR controllers — alerts, ajax, edit, add, detail, browse — accessible to any authenticated user. This allows any logged-in user to suppress clinical decision support alerts system-wide, delete or modify clinical plans, and edit rule configurations — all operations intended to require administrator privileges. This vulnerability is fixed in 8.0.0.1. |
2026-03-11 | |
| CVE-2026-32125 | 5.4 | MEDIUM | CWE-79 | 0.2% p42 | 3.79 | OpenEMR is a free and open source electronic health records and medical practice...OpenEMR is a free and open source electronic health records and medical practice management application. Prior to 8.0.0.1, track/item names from the Track Anything feature are stored from user input (POST) and later rendered in Dygraph charts (titles/labels) using innerHTML or equivalent without escaping. A user who can create or edit Track Anything items can inject script that runs when any user views the corresponding graph. This vulnerability is fixed in 8.0.0.1. |
2026-03-11 | |
| CVE-2026-32124 | 5.4 | MEDIUM | CWE-79 | 0.0% p13 | 3.78 | OpenEMR is a free and open source electronic health records and medical practice...OpenEMR is a free and open source electronic health records and medical practice management application. Prior to 8.0.0.1, the dynamic code picker AJAX endpoint returns code descriptions (code_text) that are rendered in the front end (e.g. DataTables) without HTML escaping. If an administrator (or user with code management rights) creates or edits a code with a malicious description containing script, that script runs in the browser of every user who uses the picker. This vulnerability is fixed in 8.0.0.1. |
2026-03-11 | |
| CVE-2026-32123 | 7.7 | HIGH | CWE-863 | 0.1% p29 | 5.39 | OpenEMR is a free and open source electronic health records and medical practice...OpenEMR is a free and open source electronic health records and medical practice management application. Prior to 8.0.0.1, sensitivity checks for group encounters are broken because the code only consults form_encounter for sensitivity, while group encounters store sensitivity in form_groups_encounter. As a result, sensitivity is never correctly applied to group encounters, and users who should be restricted from viewing sensitive (e.g. mental health) encounters can view them. This vulnerability is fixed in 8.0.0.1. |
2026-03-11 | |
| CVE-2026-32122 | 4.3 | MEDIUM | CWE-862 | 0.1% p25 | 3.01 | OpenEMR is a free and open source electronic health records and medical practice...OpenEMR is a free and open source electronic health records and medical practice management application. Prior to 8.0.0.1, the Claim File Tracker feature exposes an AJAX endpoint that returns billing claim metadata (claim IDs, payer info, transmission logs). The endpoint does not enforce the same ACL as the main billing/claims workflow, so authenticated users without appropriate billing permissions can access this data. This vulnerability is fixed in 8.0.0.1. |
2026-03-11 | |
| CVE-2026-32121 | 7.7 | HIGH | CWE-79 | 0.2% p41 | 5.40 | OpenEMR is a free and open source electronic health records and medical practice...OpenEMR is a free and open source electronic health records and medical practice management application. Prior to 8.0.0.1, Stored XSS in prescription CSS/HTML print view via patient demographics. That finding involves server-side rendering of patient names via raw PHP echo. This finding involves client-side DOM-based rendering via jQuery .html() in a completely different component (portal/sign/assets/signer_api.js). The two share the same root cause (unsanitized patient names in patient_data), but they have different sinks, different affected components, different trigger actions, and require independent fixes. This vulnerability is fixed in 8.0.0.1. |
2026-03-11 | |
| CVE-2026-32118 | 5.4 | MEDIUM | CWE-79 | 0.1% p15 | 3.78 | OpenEMR is a free and open source electronic health records and medical practice...OpenEMR is a free and open source electronic health records and medical practice management application. Prior to 8.0.0.1, stored cross-site scripting (XSS) in the Graphical Pain Map ("clickmap") form allows any authenticated clinician to inject arbitrary JavaScript that executes in the browser of every subsequent user who views the affected encounter form. Because session cookies are not marked HttpOnly, this enables full session hijacking of other users, including administrators. This vulnerability is fixed in 8.0.0.1. |
2026-03-11 | |
| CVE-2026-32112 | 6.8 | MEDIUM | CWE-79 | 0.0% p9 | 4.76 | ha-mcp is a Home Assistant MCP Server. Prior to 7.0.0, the ha-mcp OAuth consent ...ha-mcp is a Home Assistant MCP Server. Prior to 7.0.0, the ha-mcp OAuth consent form renders user-controlled parameters via Python f-strings with no HTML escaping. An attacker who can reach the OAuth endpoint and convince the server operator to follow a crafted authorization URL could execute JavaScript in the operator's browser. This affects only users running the beta OAuth mode (ha-mcp-oauth), which is not part of the standard setup and requires explicit configuration. This vulnerability is fixed in 7.0.0. |
2026-03-11 | |
| CVE-2026-32111 | 5.3 | MEDIUM | CWE-918 | 0.0% p12 | 3.71 | ha-mcp is a Home Assistant MCP Server. Prior to 7.0.0, the ha-mcp OAuth consent ...ha-mcp is a Home Assistant MCP Server. Prior to 7.0.0, the ha-mcp OAuth consent form (beta feature) accepts a user-supplied ha_url and makes a server-side HTTP request to {ha_url}/api/config with no URL validation. An unauthenticated attacker can submit arbitrary URLs to perform internal network reconnaissance via an error oracle. Two additional code paths in OAuth tool calls (REST and WebSocket) are affected by the same primitive. The primary deployment method (private URL with pre-configured HOMEASSISTANT_TOKEN) is not affected. This vulnerability is fixed in 7.0.0. |
2026-03-11 | |
| CVE-2026-32110 | 8.3 | HIGH | CWE-918 | 0.1% p16 | 5.81 | SiYuan is a personal knowledge management system. Prior to 3.6.0, the /api/netwo...SiYuan is a personal knowledge management system. Prior to 3.6.0, the /api/network/forwardProxy endpoint allows authenticated users to make arbitrary HTTP requests from the server. The endpoint accepts a user-controlled URL and makes HTTP requests to it, returning the full response body and headers. There is no URL validation to prevent requests to internal networks, localhost, or cloud metadata services. This vulnerability is fixed in 3.6.0. |
2026-03-11 | |
| CVE-2026-32109 | 3.7 | LOW | CWE-79 | 0.0% p0 | 2.59 | Copyparty is a portable file server. Prior to 1.20.12, if an attacker has been g...Copyparty is a portable file server. Prior to 1.20.12, if an attacker has been given both read- and write-permissions to the server, they can upload a malicious file with the filename .prologue.html and then craft a link to potentially execute arbitrary JavaScript in the victim's context. Note that it is intended behavior that the JavaScript would execute if the target clicks a link to the HTML file itself; "https://example.com/foo/.prologue.html". The vulnerability is that "https://example.com/foo/?b" would also evaluate the file, making the behavior unexpected. There are existing preventative measures (strict SameSite cookies) which makes it harder to leverage this vulnerability in an attack; in order to gain control of the target's authenticated session, the link must be clicked from a page served by the server itself -- most likely by editing an existing resource, which would require additional access permissions. Finally, for this attack to be successful, the attacker's target must click the specific crafted link given by the attacker. This vulnerability is not activated by normally browsing the web-UI on the server. This vulnerability is fixed in 1.20.12. |
2026-03-11 | |
| CVE-2026-32108 | 2.3 | LOW | CWE-863 | 0.0% p2 | 1.61 | Copyparty is a portable file server. Prior to 1.20.12, there was a missing permi...Copyparty is a portable file server. Prior to 1.20.12, there was a missing permission-check in the shares feature (the shr global-option). This vulnerability only applies when the shares feature is used for the specific purpose of creating a share of just a single file inside a folder or either the FTP or SFTP server is enabled, and also made publicly accessible. Given these conditions, when a user is browsing a share through either FTP or SFTP (not http or https), they can gain read-access to the remaining files inside the shared folder by guessing/bruteforcing the filenames. It was not possible to descend into subdirectories in this manner; only the sibling files were accessible. This vulnerability is similar to CVE-2025-58753 which was previously fixed for HTTP and HTTPS, but not for FTP. The FTPS server did not yet exist at that time. This vulnerability is fixed in 1.20.12. |
2026-03-11 | |
| CVE-2026-32106 | 4.7 | MEDIUM | CWE-269 | 0.0% p4 | 3.29 | StudioCMS is a server-side-rendered, Astro native, headless content management s...StudioCMS is a server-side-rendered, Astro native, headless content management system. Prior to 0.4.3, the REST API createUser endpoint uses string-based rank checks that only block creating owner accounts, while the Dashboard API uses indexOf-based rank comparison that prevents creating users at or above your own rank. This inconsistency allows an admin to create additional admin accounts via the REST API, enabling privilege proliferation and persistence. This vulnerability is fixed in 0.4.3. |
2026-03-11 | |
| CVE-2026-32104 | 5.4 | MEDIUM | CWE-639 | 0.0% p3 | 3.78 | StudioCMS is a server-side-rendered, Astro native, headless content management s...StudioCMS is a server-side-rendered, Astro native, headless content management system. Prior to 0.4.3, the updateUserNotifications endpoint accepts a user ID from the request payload and uses it to update that user's notification preferences. It checks that the caller is logged in but never verifies that the caller owns the target account (id !== userData.user.id). Any authenticated visitor can modify notification preferences for any user, including disabling admin notifications to suppress detection of malicious activity. This vulnerability is fixed in 0.4.3. |
2026-03-11 | |
| CVE-2026-32103 | 6.8 | MEDIUM | CWE-639 | 0.0% p2 | 4.76 | StudioCMS is a server-side-rendered, Astro native, headless content management s...StudioCMS is a server-side-rendered, Astro native, headless content management system. Prior to 0.4.3, the POST /studiocms_api/dashboard/create-reset-link endpoint allows any authenticated user with admin privileges to generate a password reset token for any other user, including the owner account. The handler verifies that the caller is an admin but does not enforce role hierarchy, nor does it validate that the target userId matches the caller's identity. Combined with the POST /studiocms_api/dashboard/reset-password endpoint, this allows a complete account takeover of the highest-privileged account in the system. This vulnerability is fixed in 0.4.3. |
2026-03-11 | |
| CVE-2026-32102 | 7.1 | HIGH | CWE-284 | 0.0% p5 | 4.97 | OliveTin gives access to predefined shell commands from a web interface. In 3000...OliveTin gives access to predefined shell commands from a web interface. In 3000.10.2 and earlier, OliveTin’s live EventStream broadcasts execution events and action output to authenticated dashboard subscribers without enforcing per-action authorization. A low-privileged authenticated user can receive output from actions they are not allowed to view, resulting in broken access control and sensitive information disclosure. |
2026-03-11 | |
| CVE-2026-32101 | 7.6 | HIGH | CWE-863 | 0.0% p14 | 5.32 | StudioCMS is a server-side-rendered, Astro native, headless content management s...StudioCMS is a server-side-rendered, Astro native, headless content management system. Prior to 0.3.1, the S3 storage manager's isAuthorized() function is declared async (returns Promise<boolean>) but is called without await in both the POST and PUT handlers. Since a Promise object is always truthy in JavaScript, !isAuthorized(type) always evaluates to false, completely bypassing the authorization check. Any authenticated user with the lowest visitor role can upload, delete, rename, and list all files in the S3 bucket. This vulnerability is fixed in 0.3.1. |
2026-03-11 | |
| CVE-2026-2640 | 6.8 | MEDIUM | CWE-269 | 0.0% p3 | 4.76 | During an internal security assessment, a potential vulnerability was discovered...During an internal security assessment, a potential vulnerability was discovered in Lenovo PC Manager that could allow a local authenticated user to terminate privileged processes. |
2026-03-11 | |
| CVE-2026-2368 | 7.5 | HIGH | CWE-295 | 0.0% p1 | 5.25 | An improper certificate validation vulnerability was reported in the Lenovo File...An improper certificate validation vulnerability was reported in the Lenovo Filez application that could allow a user capable of intercepting network traffic to execute arbitrary code. |
2026-03-11 | |
| CVE-2026-1717 | 6.8 | MEDIUM | CWE-88 | 0.0% p6 | 4.76 | An input validation vulnerability was reported in the LenovoProductivitySystemAd...An input validation vulnerability was reported in the LenovoProductivitySystemAddin used in Lenovo Vantage and Lenovo Baiying that could allow a local authenticated user to terminate arbitrary processes with elevated privileges. |
2026-03-11 | |
| CVE-2026-1716 | 6.9 | MEDIUM | CWE-88 | 0.0% p6 | 4.83 | An input validation vulnerability was reported in the DeviceSettingsSystemAddin ...An input validation vulnerability was reported in the DeviceSettingsSystemAddin used in Lenovo Vantage and Lenovo Baiying that could allow a local authenticated user to delete arbitrary registry keys with elevated privileges. |
2026-03-11 | |
| CVE-2026-1715 | 6.9 | MEDIUM | CWE-88 | 0.0% p6 | 4.83 | An input validation vulnerability was reported in the DeviceSettingsSystemAddin ...An input validation vulnerability was reported in the DeviceSettingsSystemAddin used in Lenovo Vantage and Lenovo Baiying that could allow a local authenticated user to modify arbitrary registry keys with elevated privileges. |
2026-03-11 | |
| CVE-2026-1653 | 6.8 | MEDIUM | CWE-369 | 0.0% p3 | 4.76 | A potential divide by zero vulnerability was reported in the Lenovo Virtual Bus ...A potential divide by zero vulnerability was reported in the Lenovo Virtual Bus driver used in Smart Connect that could allow a local authenticated user to cause a Windows blue screen error. |
2026-03-11 | |
| CVE-2026-1652 | 6.9 | MEDIUM | CWE-122 | 0.0% p5 | 4.83 | A potential buffer overflow vulnerability was reported in the Lenovo Virtual Bus...A potential buffer overflow vulnerability was reported in the Lenovo Virtual Bus driver used in Smart Connect that could allow a local authenticated user to corrupt memory and cause a Windows blue screen error. |
2026-03-11 | |
| CVE-2026-1068 | 6.0 | MEDIUM | CWE-295 | 0.0% p3 | 4.20 | An improper certificate validation vulnerability was reported in the Lenovo File...An improper certificate validation vulnerability was reported in the Lenovo Filez application that could allow a user capable of intercepting network traffic to obtain sensitive user data from the application. |
2026-03-11 | |
| CVE-2026-0940 | 8.4 | HIGH | CWE-665 | 0.0% p5 | 5.88 | A potential improper initialization vulnerability was reported in the BIOS of so...A potential improper initialization vulnerability was reported in the BIOS of some ThinkPads that could allow a local privileged user to modify data and execute arbitrary code. |
2026-03-11 | |
| CVE-2026-0520 | 2.4 | LOW | CWE-532 | 0.0% p2 | 1.68 | A potential vulnerability was reported in the Lenovo FileZ Android application t...A potential vulnerability was reported in the Lenovo FileZ Android application that, under certain conditions, could allow a local authenticated user to retrieve some sensitive data stored in a log file. |
2026-03-11 | |
| CVE-2025-70041 | 9.8 | CRITICAL | N/A | 0.1% p18 | 6.86 | An issue pertaining to CWE-259: Use of Hard-coded Password was discovered in osl...An issue pertaining to CWE-259: Use of Hard-coded Password was discovered in oslabs-beta ThermaKube master. |
2026-03-11 | |
| CVE-2025-70024 | 9.8 | CRITICAL | CWE-89 | 0.1% p20 | 6.86 | An issue pertaining to CWE-89: Improper Neutralization of Special Elements used ...An issue pertaining to CWE-89: Improper Neutralization of Special Elements used in an SQL Command was discovered in benkeen generatedata 4.0.14. |
2026-03-11 | |
| CVE-2025-66956 | 9.9 | CRITICAL | CWE-284 | 0.1% p31 | 6.93 | Insecure Access Control in Contact Plan, E-Mail, SMS and Fax components in Assec...Insecure Access Control in Contact Plan, E-Mail, SMS and Fax components in Asseco SEE Live 2.0 allows remote attackers to access and execute attachments via a computable URL. |
2026-03-11 | |
| CVE-2026-3954 | 6.9 | MEDIUM | CWE-22 | 0.1% p22 | 4.83 | A weakness has been identified in OpenBMB XAgent 1.0.0. Affected by this vulnera...A weakness has been identified in OpenBMB XAgent 1.0.0. Affected by this vulnerability is the function workspace of the file XAgentServer/application/routers/workspace.py. This manipulation of the argument file_name causes path traversal. The attack may be initiated remotely. The exploit has been made available to the public and could be used for attacks. The project was informed of the problem early through an issue report but has not responded yet. |
2026-03-11 | |
| CVE-2026-3951 | 5.3 | MEDIUM | CWE-79 | 0.0% p13 | 3.71 | A security flaw has been discovered in LockerProject Locker 0.0.0/0.0.1/0.1.0. A...A security flaw has been discovered in LockerProject Locker 0.0.0/0.0.1/0.1.0. Affected is the function authIsAwesome of the file source-code/Locker-master/Ops/registry.js of the component Error Response Handler. The manipulation of the argument ID results in cross site scripting. The attack can be launched remotely. The exploit has been released to the public and may be used for attacks. The project was informed of the problem early through an issue report but has not responded yet. |
2026-03-11 | |
| CVE-2026-3950 | 4.8 | MEDIUM | CWE-119 | 0.0% p3 | 3.36 | A vulnerability was identified in strukturag libheif up to 1.21.2. This impacts ...A vulnerability was identified in strukturag libheif up to 1.21.2. This impacts the function Track::load of the file libheif/sequences/track.cc of the component stsz/stts. The manipulation leads to out-of-bounds read. The attack needs to be performed locally. The exploit is publicly available and might be used. Applying a patch is the recommended action to fix this issue. The patch available is inofficial and not approved yet. |
2026-03-11 | |
| CVE-2026-32234 | 5.1 | MEDIUM | CWE-89 | 0.0% p12 | 3.57 | Parse Server is an open source backend that can be deployed to any infrastructur...Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.6.0-alpha.10 and 8.6.36, an attacker with access to the master key can inject malicious SQL via crafted field names used in query constraints when Parse Server is configured with PostgreSQL as the database. The field name in a $regex query operator is passed to PostgreSQL using unparameterized string interpolation, allowing the attacker to manipulate the SQL query. While the master key controls what can be done through the Parse Server abstraction layer, this SQL injection bypasses Parse Server entirely and operates at the database level. This vulnerability only affects Parse Server deployments using PostgreSQL. This vulnerability is fixed in 9.6.0-alpha.10 and 8.6.36. |
2026-03-11 | |
| CVE-2026-32098 | 6.9 | MEDIUM | CWE-200 | 0.0% p15 | 4.83 | Parse Server is an open source backend that can be deployed to any infrastructur...Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.6.0-alpha.9 and 8.6.35, an attacker can exploit LiveQuery subscriptions to infer the values of protected fields without directly receiving them. By subscribing with a WHERE clause that references a protected field (including via dot-notation or $regex), the attacker can observe whether LiveQuery events are delivered for matching objects. This creates a boolean oracle that leaks protected field values. The attack affects any class that has both protectedFields configured in Class-Level Permissions and LiveQuery enabled. This vulnerability is fixed in 9.6.0-alpha.9 and 8.6.35. |
2026-03-11 | |
| CVE-2026-32097 | 8.6 | HIGH | CWE-639 | 0.1% p19 | 6.02 | PingPong is a platform for using large language models (LLMs) for teaching and l...PingPong is a platform for using large language models (LLMs) for teaching and learning. Prior to 7.27.2, an authenticated user may be able to retrieve or delete files outside the intended authorization scope. This issue could result in retrieval or deletion of private files, including user-uploaded files and model-generated output files. Exploitation required authentication and permission to view at least one thread for retrieval, and authentication and permission to participate in at least one thread for deletion. This vulnerability is fixed in 7.27.2. |
2026-03-11 | |
| CVE-2026-32096 | 9.3 | CRITICAL | CWE-918 | 0.1% p24 | 6.51 | Plunk is an open-source email platform built on top of AWS SES. Prior to 0.7.0, ...Plunk is an open-source email platform built on top of AWS SES. Prior to 0.7.0, a Server-Side Request Forgery (SSRF) vulnerability existed in the SNS webhook handler. An unauthenticated attacker could send a crafted request that caused the server to make an arbitrary outbound HTTP GET request to any host accessible from the server. This vulnerability is fixed in 0.7.0. |
2026-03-11 | |
| CVE-2026-32095 | 5.4 | MEDIUM | CWE-79 | 0.0% p10 | 3.78 | Plunk is an open-source email platform built on top of AWS SES. Prior to 0.7.1, ...Plunk is an open-source email platform built on top of AWS SES. Prior to 0.7.1, Plunk's image upload endpoint accepted SVG files, which browsers treat as active documents capable of executing embedded JavaScript, creating a stored XSS vulnerability. This vulnerability is fixed in 0.7.1. |
2026-03-11 | |
| CVE-2026-32094 | 6.9 | MEDIUM | CWE-200 | 0.0% p11 | 4.83 | Shescape is a simple shell escape library for JavaScript. Prior to 2.1.10, Shesc...Shescape is a simple shell escape library for JavaScript. Prior to 2.1.10, Shescape#escape() does not escape square-bracket glob syntax for Bash, BusyBox sh, and Dash. Applications that interpolate the return value directly into a shell command string can cause an attacker-controlled value like secret[12] to expand into multiple filesystem matches instead of a single literal argument, turning one argument into multiple trusted-pathname matches. This vulnerability is fixed in 2.1.10. |
2026-03-11 | |
| CVE-2026-31979 | 8.8 | HIGH | CWE-59 | 0.0% p5 | 6.16 | Himmelblau is an interoperability suite for Microsoft Azure Entra ID and Intune....Himmelblau is an interoperability suite for Microsoft Azure Entra ID and Intune. Prior to 3.1.0 and 2.3.8, the himmelblaud-tasks daemon, running as root, writes Kerberos cache files under /tmp/krb5cc_<uid> without symlink protections. Since commit 87a51ee, PrivateTmp is explicitly removed from the tasks daemon's systemd hardening, exposing it to the host /tmp. A local user can exploit this via symlink attacks to chown or overwrite arbitrary files, achieving local privilege escalation. This vulnerability is fixed in 3.1.0 and 2.3.8. |
2026-03-11 | |
| CVE-2026-31976 | 9.3 | CRITICAL | CWE-506 | 0.1% p24 | 6.51 | xygeni-action is the GitHub Action for Xygeni Scanner. On March 3, 2026, an atta...xygeni-action is the GitHub Action for Xygeni Scanner. On March 3, 2026, an attacker with access to compromised credentials created a series of pull requests (#46, #47, #48) injecting obfuscated shell code into action.yml. The PRs were blocked by branch protection rules and never merged into the main branch. However, the attacker used the compromised GitHub App credentials to move the mutable v5 tag to point at the malicious commit (4bf1d4e19ad81a3e8d4063755ae0f482dd3baf12) from one of the unmerged PRs. This commit remained in the repository's git object store, and any workflow referencing @v5 would fetch and execute it. This is a supply chain compromise via tag poisoning. Any GitHub Actions workflow referencing xygeni/xygeni-action@v5 during the affected window (approximately March 3–10, 2026) executed a C2 implant that granted the attacker arbitrary command execution on the CI runner for up to 180 seconds per workflow run. |
2026-03-11 | |
| CVE-2026-31974 | 3.0 | LOW | CWE-918 | 0.0% p8 | 2.10 | OpenProject is an open-source, web-based project management software. Prior to 1...OpenProject is an open-source, web-based project management software. Prior to 17.2.0, OpenProject SMTP test endpoint (POST /admin/settings/mail_notifications) accepts arbitrary host and port values and exhibits measurable differences in response behaviour depending on whether the target IP exists and whether the port is open. An attacker with access can use these timing and error distinctions to map internal hosts and identify which services/ports are reachable. Similarly, you can create webhooks in OpenProject and point them to arbitrary IPs, resulting in the same kind of SSRF issue which allows attackers to scan the internal network. This vulnerability is fixed in 17.2.0. |
2026-03-11 | |
| CVE-2026-31961 | 5.5 | MEDIUM | CWE-770 | 0.0% p3 | 3.85 | Quill provides simple mac binary signing and notarization from any platform. Qui...Quill provides simple mac binary signing and notarization from any platform. Quill before version v0.7.1 contains an unbounded memory allocation vulnerability when parsing Mach-O binaries. Exploitation requires that Quill processes an attacker-supplied Mach-O binary, which is most likely in environments such as CI/CD pipelines, shared signing services, or any workflow where externally-submitted binaries are accepted for signing. When parsing a Mach-O binary, Quill reads several size and count fields from the LC_CODE_SIGNATURE load command and embedded code signing structures (SuperBlob, BlobIndex) and uses them to allocate memory buffers without validating that the values are reasonable or consistent with the actual file size. Affected fields include DataSize, DataOffset, and Size from the load command, Count from the SuperBlob header, and Length from individual blob headers. An attacker can craft a minimal (~4KB) malicious Mach-O binary with extremely large values in these fields, causing Quill to attempt to allocate excessive memory. This leads to memory exhaustion and denial of service, potentially crashing the host process. Both the Quill CLI and Go library are affected when used to parse untrusted Mach-O files. This vulnerability is fixed in 0.7.1. |
2026-03-11 | |
| CVE-2026-31960 | 5.3 | MEDIUM | CWE-770 | 0.0% p3 | 3.71 | Quill provides simple mac binary signing and notarization from any platform. Qui...Quill provides simple mac binary signing and notarization from any platform. Quill before version v0.7.1 has unbounded reads of HTTP response bodies during the Apple notarization process. Exploitation requires the ability to modify API responses from Apple's notarization service, which is not possible under standard network conditions due to HTTPS with proper TLS certificate validation; however, environments with TLS-intercepting proxies (common in corporate networks), compromised certificate authorities, or other trust boundary violations are at risk. When processing HTTP responses during notarization, Quill reads the entire response body into memory without any size limit. An attacker who can control or modify the response content can return an arbitrarily large payload, causing the Quill client to run out of memory and crash. The impact is limited to availability; there is no effect on confidentiality or integrity. Both the Quill CLI and library are affected when used to perform notarization operations. This vulnerability is fixed in 0.7.1. |
2026-03-11 | |
| CVE-2026-31959 | 5.3 | MEDIUM | CWE-918 | 0.0% p4 | 3.71 | Quill provides simple mac binary signing and notarization from any platform. Qui...Quill provides simple mac binary signing and notarization from any platform. Quill before version v0.7.1 contains a Server-Side Request Forgery (SSRF) vulnerability when attempting to fetch the Apple notarization submission logs. Exploitation requires the ability to modify API responses from Apple's notarization service, which is not possible under standard network conditions due to HTTPS with proper TLS certificate validation; however, environments with TLS-intercepting proxies (common in corporate networks), compromised certificate authorities, or other trust boundary violations are at risk. When retrieving submission logs, Quill fetches a URL provided in the API response without validating that the scheme is https or that the host does not point to a local or multicast IP address. An attacker who can tamper with the response can supply an arbitrary URL, causing the Quill client to issue HTTP or HTTPS requests to attacker-controlled or internal network destinations. This could lead to exfiltration of sensitive data such as cloud provider credentials or internal service responses. Both the Quill CLI and library are affected when used to retrieve notarization submission logs. This vulnerability is fixed in 0.7.1. |
2026-03-11 | |
| CVE-2026-31958 | 8.7 | HIGH | CWE-400 | 0.0% p9 | 6.09 | Tornado is a Python web framework and asynchronous networking library. In versio...Tornado is a Python web framework and asynchronous networking library. In versions of Tornado prior to 6.5.5, the only limit on the number of parts in multipart/form-data is the max_body_size setting (default 100MB). Since parsing occurs synchronously on the main thread, this creates the possibility of denial-of-service due to the cost of parsing very large multipart bodies with many parts. This vulnerability is fixed in 6.5.5. |
2026-03-11 | |
| CVE-2026-31957 | 10.0 | CRITICAL | CWE-1188 | 0.3% p50 | 7.01 | Himmelblau is an interoperability suite for Microsoft Azure Entra ID and Intune....Himmelblau is an interoperability suite for Microsoft Azure Entra ID and Intune. From 3.0.0 to before 3.1.0, if Himmelblau is deployed without a configured tenant domain in himmelblau.conf, authentication is not tenant-scoped. In this mode, Himmelblau can accept authentication attempts for arbitrary Entra ID domains by dynamically registering providers at runtime. This behavior is intended for initial/local bootstrap scenarios, but it can create risk in remote authentication environments. This vulnerability is fixed in 3.1.0. |
2026-03-11 | |
| CVE-2026-31954 | 0.0 | NONE | CWE-352 | 0.0% p4 | 0.00 | Emlog is an open source website building system. In 2.6.6 and earlier, the delet...Emlog is an open source website building system. In 2.6.6 and earlier, the delete_async action (asynchronous delete) lacks a call to LoginAuth::checkToken(), enabling CSRF attacks. |
2026-03-11 | |
| CVE-2026-31901 | 6.3 | MEDIUM | CWE-204 | 0.0% p12 | 4.41 | Parse Server is an open source backend that can be deployed to any infrastructur...Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 8.6.34 and 9.6.0-alpha.8, the email verification endpoint (/verificationEmailRequest) returns distinct error responses depending on whether an email address belongs to an existing user, is already verified, or does not exist. An attacker can send requests with different email addresses and observe the error codes to determine which email addresses are registered in the application. This is a user enumeration vulnerability that affects any Parse Server deployment with email verification enabled (verifyUserEmails: true). This vulnerability is fixed in 8.6.34 and 9.6.0-alpha.8. |
2026-03-11 | |
| CVE-2026-31900 | 8.7 | HIGH | CWE-20 | 0.2% p43 | 6.10 | Black is the uncompromising Python code formatter. Black provides a GitHub actio...Black is the uncompromising Python code formatter. Black provides a GitHub action for formatting code. This action supports an option, use_pyproject: true, for reading the version of Black to use from the repository pyproject.toml. A malicious pull request could edit pyproject.toml to use a direct URL reference to a malicious repository. This could lead to arbitrary code execution in the context of the GitHub Action. Attackers could then gain access to secrets or permissions available in the context of the action. Version 26.3.0 fixes this vulnerability. |
2026-03-11 | |
| CVE-2026-31896 | 9.8 | CRITICAL | CWE-89 | 0.0% p10 | 6.86 | WeGIA is a web manager for charitable institutions. Prior to version 3.6.6, a cr...WeGIA is a web manager for charitable institutions. Prior to version 3.6.6, a critical SQL injection vulnerability exists in the WeGIA application. The remover_produto_ocultar.php script uses extract($_REQUEST) to populate local variables and then directly concatenates these variables into a SQL query executed via PDO::query. This allows an authenticated (or auth-bypassed) attacker to execute arbitrary SQL commands. This can be used to exfiltrate sensitive data from the database or, as demonstrated in this PoC, cause a time-based delay (denial of service). This vulnerability is fixed in 3.6.6. |
2026-03-11 | |
| CVE-2026-31895 | 8.8 | HIGH | CWE-89 | 0.0% p11 | 6.16 | WeGIA is a web manager for charitable institutions. Prior to version 3.6.6, WeGI...WeGIA is a web manager for charitable institutions. Prior to version 3.6.6, WeGIA (Web gerenciador para instituições assistenciais) contains a SQL injection vulnerability in html/matPat/restaurar_produto.php. The id_produto parameter from $_GET is directly interpolated into SQL queries without parameterization or sanitization. This vulnerability is fixed in 3.6.6. |
2026-03-11 | |
| CVE-2026-31894 | 6.9 | MEDIUM | CWE-59 | 0.1% p20 | 4.83 | WeGIA is a web manager for charitable institutions. In 3.6.5, The patched loadBa...WeGIA is a web manager for charitable institutions. In 3.6.5, The patched loadBackupDB() extracts tar.gz archives to a temporary directory using PHP's PharData class, then uses glob() and file_get_contents() to read SQL files from the extracted contents. Neither the extraction nor the file reading validates whether archive members are symbolic links. This vulnerability is fixed in 3.6.6. |
2026-03-11 | |
| CVE-2026-31889 | 8.9 | HIGH | CWE-290 | 0.1% p21 | 6.23 | Shopware is an open commerce platform. Prior to 6.6.10.15 and 6.7.8.1, a vulnera...Shopware is an open commerce platform. Prior to 6.6.10.15 and 6.7.8.1, a vulnerability in the Shopware app registration flow that could, under specific conditions, allow attackers to take over the communication channel between a shop and an app. The legacy app registration flow used HMAC‑based authentication without sufficiently binding a shop installation to its original domain. During re‑registration, the shop-url could be updated without proving control over the previously registered shop or domain. This made targeted hijacking of app communication feasible if an attacker possessed the relevant app‑side secret. By abusing app re‑registration, an attacker could redirect app traffic to an attacker‑controlled domain and potentially obtain API credentials intended for the legitimate shop. This vulnerability is fixed in 6.6.10.15 and 6.7.8.1. |
2026-03-11 | |
| CVE-2026-27703 | 7.5 | HIGH | CWE-787 | 0.1% p21 | 5.25 | RIOT is an open-source microcontroller operating system, designed to match the r...RIOT is an open-source microcontroller operating system, designed to match the requirements of Internet of Things (IoT) devices and other embedded devices. In 2026.01 and earlier, the default handler for the well_known_core resource coap_well_known_core_default_handler writes user-provided option data and other data into a fixed size buffer without validating the buffer is large enough to contain the response. This vulnerability allows an attacker to corrupt neighboring stack location, including security-sensitive addresses like the return address, leading to denial of service or arbitrary code execution. |
2026-03-11 | |
| CVE-2026-27478 | 9.1 | CRITICAL | CWE-290 | 0.0% p6 | 6.37 | Unity Catalog is an open, multi-modal Catalog for data and AI. In 0.4.0 and earl...Unity Catalog is an open, multi-modal Catalog for data and AI. In 0.4.0 and earlier, a critical authentication bypass vulnerability exists in the Unity Catalog token exchange endpoint (/api/1.0/unity-control/auth/tokens). The endpoint extracts the issuer (iss) claim from incoming JWTs and uses it to dynamically fetch the JWKS endpoint for signature validation without validating that the issuer is a trusted identity provider. |
2026-03-11 | |
| CVE-2026-24510 | 6.7 | MEDIUM | CWE-269 | 0.0% p2 | 4.69 | Dell Alienware Command Center (AWCC), versions prior to 6.12.24.0, contain an Im...Dell Alienware Command Center (AWCC), versions prior to 6.12.24.0, contain an Improper Privilege Management vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of Privileges. |
2026-03-11 | |
| CVE-2026-24508 | 2.5 | LOW | CWE-295 | 0.0% p0 | 1.75 | Dell Alienware Command Center (AWCC), versions prior to 6.12.24.0, contain an Im...Dell Alienware Command Center (AWCC), versions prior to 6.12.24.0, contain an Improper Certificate Validation vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Information exposure. |
2026-03-11 | |
| CVE-2026-3949 | 4.8 | MEDIUM | CWE-119 | 0.0% p3 | 3.36 | A vulnerability was determined in strukturag libheif up to 1.21.2. This affects ...A vulnerability was determined in strukturag libheif up to 1.21.2. This affects the function vvdec_push_data2 of the file libheif/plugins/decoder_vvdec.cc of the component HEIF File Parser. Executing a manipulation of the argument size can lead to out-of-bounds read. The attack needs to be launched locally. The exploit has been publicly disclosed and may be utilized. This patch is called b97c8b5f198b27f375127cd597a35f2113544d03. It is advisable to implement a patch to correct this issue. |
2026-03-11 | |
| CVE-2026-31888 | 5.3 | MEDIUM | CWE-204 | 0.1% p16 | 3.71 | Shopware is an open commerce platform. Prior to 6.7.8.1 and 6.6.10.15, the Store...Shopware is an open commerce platform. Prior to 6.7.8.1 and 6.6.10.15, the Store API login endpoint (POST /store-api/account/login) returns different error codes depending on whether the submitted email address belongs to a registered customer (CHECKOUT__CUSTOMER_AUTH_BAD_CREDENTIALS) or is unknown (CHECKOUT__CUSTOMER_NOT_FOUND). The "not found" response also echoes the probed email address. This allows an unauthenticated attacker to enumerate valid customer accounts. The storefront login controller correctly unifies both error paths, but the Store API does not — indicating an inconsistent defense. This vulnerability is fixed in 6.7.8.1 and 6.6.10.15. |
2026-03-11 | |
| CVE-2026-31887 | 8.9 | HIGH | CWE-863 | 0.0% p14 | 6.23 | Shopware is an open commerce platform. Prior to 6.7.8.1 and 6.6.10.15, an insuff...Shopware is an open commerce platform. Prior to 6.7.8.1 and 6.6.10.15, an insufficient check on the filter types for unauthenticated customers allows access to orders of other customers. This is part of the deepLinkCode support on the store-api.order endpoint. This vulnerability is fixed in 6.7.8.1 and 6.6.10.15. |
2026-03-11 | |
| CVE-2026-31881 | 7.7 | HIGH | CWE-306 | 0.3% p56 | 5.40 | Runtipi is a personal homeserver orchestrator. Prior to 4.8.0, an unauthenticate...Runtipi is a personal homeserver orchestrator. Prior to 4.8.0, an unauthenticated attacker can reset the operator (admin) password when a password-reset request is active, resulting in full account takeover. The endpoint POST /api/auth/reset-password is exposed without authentication/authorization checks. During the 15-minute reset window, any remote user can set a new operator password and log in as admin. This vulnerability is fixed in 4.8.0. |
2026-03-11 | |
| CVE-2026-31879 | 5.1 | MEDIUM | CWE-79 | 0.0% p9 | 3.57 | Frappe is a full-stack web application framework. Prior to 14.100.2, 15.101.0, a...Frappe is a full-stack web application framework. Prior to 14.100.2, 15.101.0, and 16.10.0, due to a lack of validation and improper permission checks, users could modify other user's private workspaces. Specially crafted requests could lead to stored XSS here. This vulnerability is fixed in 14.100.2, 15.101.0, and 16.10.0. |
2026-03-11 | |
| CVE-2026-31878 | 5.0 | MEDIUM | CWE-918 | 0.0% p9 | 3.50 | Frappe is a full-stack web application framework. Prior to 14.100.1, 15.100.0, a...Frappe is a full-stack web application framework. Prior to 14.100.1, 15.100.0, and 16.6.0, a malicious user could send a crafted request to an endpoint which would lead to the server making an HTTP call to a service of the user's choice. This vulnerability is fixed in 14.100.1, 15.100.0, and 16.6.0. |
2026-03-11 | |
| CVE-2026-31877 | 9.3 | CRITICAL | CWE-89 | 0.1% p22 | 6.51 | Frappe is a full-stack web application framework. Prior to 15.84.0 and 14.99.0, ...Frappe is a full-stack web application framework. Prior to 15.84.0 and 14.99.0, a specially crafted request made to a certain endpoint could result in SQL injection, allowing an attacker to extract information they wouldn't otherwise be able to. This vulnerability is fixed in 15.84.0 and 14.99.0. |
2026-03-11 | |
| CVE-2026-31876 | 5.4 | MEDIUM | CWE-79 | 0.0% p10 | 3.78 | Notesnook is a note-taking app focused on user privacy & ease of use. Prior to 3...Notesnook is a note-taking app focused on user privacy & ease of use. Prior to 3.3.9, a Stored Cross-Site Scripting (XSS) vulnerability existed in Notesnook's editor embed component when rendering Twitter/X embed URLs. The tweetToEmbed() function in component.tsx interpolated the user-supplied URL directly into an HTML string without escaping, which was then assigned to the srcdoc attribute of an <iframe>. This vulnerability is fixed in 3.3.9. |
2026-03-11 | |
| CVE-2026-31874 | 9.8 | CRITICAL | CWE-284 | 0.2% p38 | 6.87 | Taskosaur is an open source project management platform with conversational AI f...Taskosaur is an open source project management platform with conversational AI for task execution in-app. In 1.0.0, the application does not properly validate or restrict the role parameter during the user registration process. An attacker can manually modify the request payload and assign themselves elevated privileges. Because the backend does not enforce role assignment restrictions or ignore client-supplied role parameters, the server accepts the manipulated value and creates the account with SUPER_ADMIN privileges. This allows any unauthenticated attacker to register a fully privileged administrative account. |
2026-03-11 | |
| CVE-2026-24509 | 3.6 | LOW | CWE-284 | 0.0% p3 | 2.52 | Dell Alienware Command Center (AWCC), versions prior to 6.12.24.0, contain an Im...Dell Alienware Command Center (AWCC), versions prior to 6.12.24.0, contain an Improper Access Control vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Denial of service. |
2026-03-11 | |
| CVE-2019-25487 | 9.3 | CRITICAL | CWE-639 | 0.2% p44 | 6.52 | SAPIDO RB-1732 V2.0.43 contains a remote command execution vulnerability that al...SAPIDO RB-1732 V2.0.43 contains a remote command execution vulnerability that allows unauthenticated attackers to execute arbitrary system commands by submitting malicious input to the formSysCmd endpoint. Attackers can send POST requests with the sysCmd parameter containing shell commands to execute code on the device with router privileges. |
2026-03-11 | |
| CVE-2019-25486 | 8.8 | HIGH | CWE-89 | 0.4% p58 | 6.17 | Varient 1.6.1 contains an SQL injection vulnerability that allows unauthenticate...Varient 1.6.1 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the user_id parameter. Attackers can submit POST requests with crafted SQL payloads in the user_id field to bypass authentication and extract sensitive database information. |
2026-03-11 | |
| CVE-2019-25485 | 6.9 | MEDIUM | CWE-787 | 0.0% p4 | 4.83 | R 3.4.4 on Windows x64 contains a buffer overflow vulnerability in the GUI Prefe...R 3.4.4 on Windows x64 contains a buffer overflow vulnerability in the GUI Preferences language menu field that allows local attackers to bypass DEP and ASLR protections. Attackers can inject a crafted payload through the Language for menus preference to trigger a structured exception handler chain pivot and execute arbitrary shellcode with application privileges. |
2026-03-11 | |
| CVE-2019-25484 | 6.9 | MEDIUM | CWE-787 | 0.0% p4 | 4.83 | WinMPG iPod Convert 3.0 contains a buffer overflow vulnerability in the Register...WinMPG iPod Convert 3.0 contains a buffer overflow vulnerability in the Register dialog that allows local attackers to crash the application by supplying an oversized payload. Attackers can paste a large string of characters into the User Name and User Code field to trigger a denial of service condition. |
2026-03-11 | |
| CVE-2019-25483 | 8.6 | HIGH | CWE-306 | 0.0% p4 | 6.02 | Comtrend AR-5310 GE31-412SSG-C01_R10.A2pG039u.d24k contains a restricted shell e...Comtrend AR-5310 GE31-412SSG-C01_R10.A2pG039u.d24k contains a restricted shell escape vulnerability that allows local users to bypass command restrictions by using the command substitution operator $( ). Attackers can inject arbitrary commands through the $( ) syntax when passed as arguments to allowed commands like ping to execute unrestricted shell access. |
2026-03-11 | |
| CVE-2019-25480 | 8.7 | HIGH | CWE-22 | 0.2% p42 | 6.10 | ARMBot contains an unrestricted file upload vulnerability in upload.php that all...ARMBot contains an unrestricted file upload vulnerability in upload.php that allows unauthenticated attackers to upload arbitrary files by manipulating the file parameter with path traversal sequences. Attackers can upload PHP files with traversal payloads ../public_html/ to write executable code to the web root and achieve remote code execution. |
2026-03-11 | |
| CVE-2019-25478 | 8.7 | HIGH | CWE-787 | 0.1% p32 | 6.09 | GetGo Download Manager 6.2.2.3300 contains a buffer overflow vulnerability that ...GetGo Download Manager 6.2.2.3300 contains a buffer overflow vulnerability that allows remote attackers to cause denial of service by sending HTTP responses with excessively long headers. Attackers can craft malicious HTTP responses with oversized header values to crash the application and make it unavailable. |
2026-03-11 | |
| CVE-2019-25477 | 6.9 | MEDIUM | CWE-787 | 0.0% p4 | 4.83 | RAR Password Recovery 1.80 contains a buffer overflow vulnerability that allows ...RAR Password Recovery 1.80 contains a buffer overflow vulnerability that allows local attackers to crash the application by supplying an oversized payload in the registration dialog. Attackers can craft a malicious input string exceeding 6000 bytes and paste it into the User Name and Registration Code field to trigger an application crash. |
2026-03-11 | |
| CVE-2019-25476 | 6.9 | MEDIUM | CWE-787 | 0.0% p4 | 4.83 | Outlook Password Recovery 2.10 contains a buffer overflow vulnerability that all...Outlook Password Recovery 2.10 contains a buffer overflow vulnerability that allows local attackers to crash the application by supplying an oversized payload. Attackers can create a malicious text file containing 6000 bytes of data and paste it into the User Name and Registration Code field to trigger a denial of service condition. |
2026-03-11 | |
| CVE-2019-25475 | 6.9 | MEDIUM | CWE-787 | 0.0% p4 | 4.83 | SQL Server Password Changer 1.90 contains a buffer overflow vulnerability that a...SQL Server Password Changer 1.90 contains a buffer overflow vulnerability that allows local attackers to crash the application by supplying an oversized payload. Attackers can inject 6000 bytes of data into the User Name and Registration Code field to trigger a denial of service condition. |
2026-03-11 | |
| CVE-2019-25474 | 6.9 | MEDIUM | CWE-787 | 0.0% p3 | 4.83 | Easy MP3 Downloader 4.7.8.8 contains a buffer overflow vulnerability that allows...Easy MP3 Downloader 4.7.8.8 contains a buffer overflow vulnerability that allows local attackers to crash the application by supplying an excessively long unlock code. Attackers can generate a file containing 6000 'A' characters and paste the contents into the Unlock Code field during application startup to trigger a denial of service condition. |
2026-03-11 | |
| CVE-2019-25472 | 8.7 | HIGH | CWE-73 | 0.0% p12 | 6.09 | IntelBras Telefone IP TIP200 and 200 LITE contain an unauthenticated arbitrary f...IntelBras Telefone IP TIP200 and 200 LITE contain an unauthenticated arbitrary file read vulnerability in the dumpConfigFile function accessible via the cgiServer.exx endpoint. Attackers can send GET requests to /cgi-bin/cgiServer.exx with the command parameter containing dumpConfigFile() to read sensitive files including /etc/shadow and configuration files without proper authorization. |
2026-03-11 | |
| CVE-2019-25471 | 9.3 | CRITICAL | CWE-22 | 0.6% p70 | 6.53 | FileThingie 2.5.7 contains an arbitrary file upload vulnerability that allows at...FileThingie 2.5.7 contains an arbitrary file upload vulnerability that allows attackers to upload malicious files by sending ZIP archives through the ft2.php endpoint. Attackers can upload ZIP files containing PHP shells, use the unzip functionality to extract them into accessible directories, and execute arbitrary commands through the extracted PHP files. |
2026-03-11 | |
| CVE-2019-25470 | 8.7 | HIGH | CWE-798 | 0.1% p26 | 6.09 | eWON Firmware versions 12.2 to 13.0 contain an authentication bypass vulnerabili...eWON Firmware versions 12.2 to 13.0 contain an authentication bypass vulnerability that allows attackers with minimal privileges to retrieve sensitive user data by exploiting the wsdReadForm endpoint. Attackers can send POST requests to /wrcgi.bin/wsdReadForm with base64-encoded partial credentials and a crafted wsdList parameter to extract encrypted passwords for all users, which can be decrypted using a hardcoded XOR key. |
2026-03-11 | |
| CVE-2019-25469 | 6.9 | MEDIUM | CWE-787 | 0.0% p4 | 4.83 | Folder Lock 7.7.9 contains a buffer overflow vulnerability in the serial number ...Folder Lock 7.7.9 contains a buffer overflow vulnerability in the serial number registration field that allows local attackers to crash the application by submitting an oversized payload. Attackers can paste a 6000-byte buffer of arbitrary data into the 'Serial Number and Registration Key' field to trigger a denial of service condition. |
2026-03-11 | |
| CVE-2019-25468 | 9.3 | CRITICAL | CWE-94 | 0.3% p54 | 6.52 | NetGain EM Plus 10.1.68 contains a remote code execution vulnerability that allo...NetGain EM Plus 10.1.68 contains a remote code execution vulnerability that allows unauthenticated attackers to execute arbitrary system commands by submitting malicious parameters to the script_test.jsp endpoint. Attackers can send POST requests with shell commands embedded in the 'content' parameter to execute code and retrieve command output. |
2026-03-11 | |
| CVE-2019-25467 | 8.6 | HIGH | CWE-787 | 0.0% p1 | 6.02 | Verypdf docPrint Pro 8.0 contains a structured exception handling buffer overflo...Verypdf docPrint Pro 8.0 contains a structured exception handling buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying an oversized alphanumeric encoded payload in the User Password or Master Password fields. Attackers can craft a malicious payload with encoded shellcode and SEH chain manipulation to bypass protections and execute a MessageBox proof-of-concept when the password fields are processed during PDF encryption. |
2026-03-11 | |
| CVE-2019-25466 | 8.6 | HIGH | CWE-787 | 0.0% p5 | 6.02 | Easy File Sharing Web Server 7.2 contains a local structured exception handling ...Easy File Sharing Web Server 7.2 contains a local structured exception handling buffer overflow vulnerability that allows local attackers to execute arbitrary code by creating a malicious username. Attackers can craft a username with a payload containing 4059 bytes of padding followed by a nseh value and seh pointer to trigger the overflow when adding a new user account. |
2026-03-11 | |
| CVE-2019-25465 | 8.7 | HIGH | CWE-260 | 0.3% p52 | 6.10 | Hisilicon HiIpcam V100R003 contains a directory traversal vulnerability that all...Hisilicon HiIpcam V100R003 contains a directory traversal vulnerability that allows unauthenticated attackers to access sensitive configuration files by exploiting directory listing in the cgi-bin directory. Attackers can request the getadslattr.cgi endpoint to retrieve ADSL credentials and network configuration parameters including usernames, passwords, and DNS settings. |
2026-03-11 | |
| CVE-2019-25464 | 6.7 | MEDIUM | CWE-770 | 0.0% p0 | 4.69 | InputMapper 1.6.10 contains a buffer overflow vulnerability in the username fiel...InputMapper 1.6.10 contains a buffer overflow vulnerability in the username field that allows local attackers to crash the application by entering an excessively long string. Attackers can trigger a denial of service by copying a large payload into the username field and double-clicking to process it, causing the application to crash. |
2026-03-11 | |
| CVE-2019-25463 | 6.9 | MEDIUM | CWE-787 | 0.0% p4 | 4.83 | SpotIE Internet Explorer Password Recovery 2.9.5 contains a denial of service vu...SpotIE Internet Explorer Password Recovery 2.9.5 contains a denial of service vulnerability in the registration key input field that allows local attackers to crash the application by supplying an excessively long string. Attackers can paste a 256-character payload into the Key field during registration to trigger a buffer overflow and crash the application. |
2026-03-11 | |
| CVE-2018-25159 | 9.3 | CRITICAL | CWE-1334 | 0.1% p30 | 6.51 | Epross AVCON6 systems management platform contains an object-graph navigation la...Epross AVCON6 systems management platform contains an object-graph navigation language (OGNL) injection vulnerability that allows unauthenticated attackers to execute arbitrary commands by injecting malicious OGNL expressions. Attackers can send crafted requests to the login.action endpoint with OGNL payloads in the redirect parameter to instantiate ProcessBuilder objects and execute system commands with root privileges. |
2026-03-11 | |
| CVE-2026-31975 | 8.7 | HIGH | CWE-78 | 0.6% p69 | 6.11 | Cloud CLI (aka Claude Code UI) is a desktop and mobile UI for Claude Code, Curso...Cloud CLI (aka Claude Code UI) is a desktop and mobile UI for Claude Code, Cursor CLI, Codex, and Gemini-CLI. Prior to 1.25.0, OS Command Injection via WebSocket Shell. Both projectPath and initialCommand in server/index.js are taken directly from the WebSocket message payload and interpolated into a bash command string without any sanitization, enabling arbitrary OS command execution. A secondary injection vector exists via unsanitized sessionId. This vulnerability is fixed in 1.25.0. |
2026-03-11 | |
| CVE-2026-31875 | 8.2 | HIGH | CWE-672 | 0.1% p32 | 5.74 | Parse Server is an open source backend that can be deployed to any infrastructur...Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.6.0-alpha.7 and 8.6.33, when multi-factor authentication (MFA) via TOTP is enabled for a user account, Parse Server generates two single-use recovery codes. These codes are intended as a fallback when the user cannot provide a TOTP token. However, recovery codes are not consumed after use, allowing the same recovery code to be used an unlimited number of times. This defeats the single-use design of recovery codes and weakens the security of MFA-protected accounts. An attacker who obtains a single recovery code can repeatedly authenticate as the affected user without the code ever being invalidated. This vulnerability is fixed in 9.6.0-alpha.7 and 8.6.33. |
2026-03-11 | |
| CVE-2026-31872 | 8.7 | HIGH | CWE-284 | 0.0% p14 | 6.09 | Parse Server is an open source backend that can be deployed to any infrastructur...Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.6.0-alpha.6 and 8.6.32, the protectedFields class-level permission (CLP) can be bypassed using dot-notation in query WHERE clauses and sort parameters. An attacker can use dot-notation to query or sort by sub-fields of a protected field, enabling a binary oracle attack to enumerate protected field values. This affects both MongoDB and PostgreSQL deployments. This vulnerability is fixed in 9.6.0-alpha.6 and 8.6.32. |
2026-03-11 | |
| CVE-2026-31871 | 9.3 | CRITICAL | CWE-89 | 0.0% p12 | 6.51 | Parse Server is an open source backend that can be deployed to any infrastructur...Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.6.0-alpha.5 and 8.6.31, a SQL injection vulnerability exists in the PostgreSQL storage adapter when processing Increment operations on nested object fields using dot notation (e.g., stats.counter). The sub-key name is interpolated directly into SQL string literals without escaping. An attacker who can send write requests to the Parse Server REST API can inject arbitrary SQL via a crafted sub-key name containing single quotes, potentially executing commands or reading data from the database, bypassing CLPs and ACLs. Only Postgres deployments are affected. This vulnerability is fixed in 9.6.0-alpha.5 and 8.6.31. |
2026-03-11 | |
| CVE-2026-31870 | 7.5 | HIGH | CWE-248 | 0.1% p20 | 5.25 | cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library...cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library. Prior to 0.37.1, when a cpp-httplib client uses the streaming API (httplib::stream::Get, httplib::stream::Post, etc.), the library calls std::stoull() directly on the Content-Length header value received from the server with no input validation and no exception handling. std::stoull throws std::invalid_argument for non-numeric strings and std::out_of_range for values exceeding ULLONG_MAX. Since nothing catches these exceptions, the C++ runtime calls std::terminate(), which kills the process with SIGABRT. Any server the client connects to — including servers reached via HTTP redirects, third-party APIs, or man-in-the-middle positions can crash the client application with a single HTTP response. No authentication is required. No interaction from the end user is required. The crash is deterministic and immediate. This vulnerability is fixed in 0.37.1. |
2026-03-11 | |
| CVE-2026-31868 | 6.3 | MEDIUM | CWE-79 | 0.1% p17 | 4.41 | Parse Server is an open source backend that can be deployed to any infrastructur...Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.6.0-alpha.4 and 8.6.30, an attacker can upload a file with a file extension or content type that is not blocked by the default configuration of the Parse Server fileUpload.fileExtensions option. The file can contain malicious code, for example JavaScript in an SVG or XHTML file. When the file is accessed via its URL, the browser renders the file and executes the malicious code in the context of the Parse Server domain. This is a stored Cross-Site Scripting (XSS) vulnerability that can be exploited to steal session tokens, redirect users, or perform actions on behalf of other users. Affected file extensions and content types include .svgz, .xht, .xml, .xsl, .xslt, and content types application/xhtml+xml and application/xslt+xml for extensionless uploads. Uploading of .html, .htm, .shtml, .xhtml, and .svg files was already blocked. This vulnerability is fixed in 9.6.0-alpha.4 and 8.6.30. |
2026-03-11 | |
| CVE-2026-31867 | 6.3 | MEDIUM | CWE-639 | 0.1% p15 | 4.41 | Craft Commerce is an ecommerce platform for Craft CMS. Prior to 4.11.0 and 5.6.0...Craft Commerce is an ecommerce platform for Craft CMS. Prior to 4.11.0 and 5.6.0, An Insecure Direct Object Reference (IDOR) vulnerability exists in Craft Commerce’s cart functionality that allows users to hijack any shopping cart by knowing or guessing its 32-character number. The CartController accepts a user-supplied number parameter to load and modify shopping carts. No ownership validation is performed - the code only checks if the order exists and is incomplete, not whether the requester has authorization to access it. This vulnerability enables the takeover of shopping sessions and potential exposure of PII. This vulnerability is fixed in 4.11.0 and 5.6.0. |
2026-03-11 | |
| CVE-2026-31866 | 7.5 | HIGH | CWE-770 | 0.1% p28 | 5.25 | flagd is a feature flag daemon with a Unix philosophy. Prior to 0.14.2, flagd ex...flagd is a feature flag daemon with a Unix philosophy. Prior to 0.14.2, flagd exposes OFREP (/ofrep/v1/evaluate/...) and gRPC (evaluation.v1, evaluation.v2) endpoints for feature flag evaluation. These endpoints are designed to be publicly accessible by client applications. The evaluation context included in request payloads is read into memory without any size restriction. An attacker can send a single HTTP request with an arbitrarily large body, causing flagd to allocate a corresponding amount of memory. This leads to immediate memory exhaustion and process termination (e.g., OOMKill in Kubernetes environments). flagd does not natively enforce authentication on its evaluation endpoints. While operators may deploy flagd behind an authenticating reverse proxy or similar infrastructure, the endpoints themselves impose no access control by default. This vulnerability is fixed in 0.14.2. |
2026-03-11 | |
| CVE-2026-31863 | 3.6 | LOW | CWE-307 | 0.0% p4 | 2.52 | Anytype Heart is the middleware library for Anytype. The challenge-based authent...Anytype Heart is the middleware library for Anytype. The challenge-based authentication for the local gRPC client API can be bypassed, allowing an attacker to gain access without the 4-digit code. This vulnerability is fixed in anytype-heart 0.48.4, anytype-cli 0.1.11, and Anytype Desktop 0.54.5. |
2026-03-11 | |
| CVE-2026-31862 | 9.1 | CRITICAL | CWE-78 | 0.1% p21 | 6.37 | Cloud CLI (aka Claude Code UI) is a desktop and mobile UI for Claude Code, Curso...Cloud CLI (aka Claude Code UI) is a desktop and mobile UI for Claude Code, Cursor CLI, Codex, and Gemini-CLI. Prior to 1.24.0, multiple Git-related API endpoints use execAsync() with string interpolation of user-controlled parameters (file, branch, message, commit), allowing authenticated attackers to execute arbitrary OS commands. This vulnerability is fixed in 1.24.0. |
2026-03-11 | |
| CVE-2026-31861 | 8.7 | HIGH | CWE-94 | 0.1% p18 | 6.09 | Cloud CLI (aka Claude Code UI) is a desktop and mobile UI for Claude Code, Curso...Cloud CLI (aka Claude Code UI) is a desktop and mobile UI for Claude Code, Cursor CLI, Codex, and Gemini-CLI. Prior to 1.24.0, The /api/user/git-config endpoint constructs shell commands by interpolating user-supplied gitName and gitEmail values into command strings passed to child_process.exec(). The input is placed within double quotes and only " is escaped, but backticks (`), $() command substitution, and \ sequences are all interpreted within double-quoted strings in bash. This allows authenticated attackers to execute arbitrary OS commands via the git configuration endpoint. This vulnerability is fixed in 1.24.0. |
2026-03-11 | |
| CVE-2026-31859 | 6.9 | MEDIUM | CWE-79 | 0.0% p10 | 4.83 | Craft is a content management system (CMS). The fix for CVE-2025-35939 in craftc...Craft is a content management system (CMS). The fix for CVE-2025-35939 in craftcms/cms introduced a strip_tags() call in src/web/User.php to sanitize return URLs before they are stored in the session. However, strip_tags() only removes HTML tags (angle brackets) -- it does not inspect or filter URL schemes. Payloads like javascript:alert(document.cookie) contain no HTML tags and pass through strip_tags() completely unmodified, enabling reflected XSS when the return URL is rendered in an href attribute. This vulnerability is fixed in 5.9.7 and 4.17.3. |
2026-03-11 | |
| CVE-2026-31858 | 8.7 | HIGH | CWE-89 | 0.0% p10 | 6.09 | Craft is a content management system (CMS). The ElementSearchController::actionS...Craft is a content management system (CMS). The ElementSearchController::actionSearch() endpoint is missing the unset() protection that was added to ElementIndexesController in CVE-2026-25495. The exact same SQL injection vulnerability (including criteria[orderBy], the original advisory vector) works on this controller because the fix was never applied to it. Any authenticated control panel user (no admin required) can inject arbitrary SQL via criteria[where], criteria[orderBy], or other query properties, and extract the full database contents via boolean-based blind injection. Users should update to the patched 5.9.9 release to mitigate the issue. |
2026-03-11 | |
| CVE-2026-31857 | 8.1 | HIGH | CWE-94 | 0.1% p30 | 5.67 | Craft is a content management system (CMS). Prior to 5.9.9 and 4.17.4, a Remote ...Craft is a content management system (CMS). Prior to 5.9.9 and 4.17.4, a Remote Code Execution vulnerability exists in the Craft CMS 5 conditions system. The BaseElementSelectConditionRule::getElementIds() method passes user-controlled string input through renderObjectTemplate() -- an unsandboxed Twig rendering function with escaping disabled. Any authenticated Control Panel user (including non-admin roles such as Author or Editor) can achieve full RCE by sending a crafted condition rule via standard element listing endpoints. This vulnerability requires no admin privileges, no special permissions beyond basic control panel access, and bypasses all production hardening settings (allowAdminChanges: false, devMode: false, enableTwigSandbox: true). Users should update to the patched 5.9.9 or 4.17.4 release to mitigate the issue. |
2026-03-11 | |
| CVE-2026-31856 | 9.3 | CRITICAL | CWE-89 | 0.0% p12 | 6.51 | Parse Server is an open source backend that can be deployed to any infrastructur...Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. A SQL injection vulnerability exists in the PostgreSQL storage adapter when processing Increment operations on nested object fields using dot notation (e.g., stats.counter). The amount value is interpolated directly into the SQL query without parameterization or type validation. An attacker who can send write requests to the Parse Server REST API can inject arbitrary SQL subqueries to read any data from the database, bypassing CLPs and ACLs. MongoDB deployments are not affected. This vulnerability is fixed in 9.6.0-alpha.3 and 8.6.29. |
2026-03-11 | |
| CVE-2026-30226 | 6.3 | MEDIUM | CWE-1321 | 0.1% p33 | 4.41 | Svelte devalue is a JavaScript library that serializes values into strings when ...Svelte devalue is a JavaScript library that serializes values into strings when JSON.stringify isn't sufficient for the job. In devalue v5.6.3 and earlier, devalue.parse and devalue.unflatten were susceptible to prototype pollution via maliciously crafted payloads. Successful exploitation could lead to Denial of Service (DoS) or type confusion. This vulnerability is fixed in 5.6.4. |
2026-03-11 | |
| CVE-2026-0230 | 4.0 | MEDIUM | CWE-754 | 0.0% p4 | 2.80 | A problem with a protection mechanism in the Palo Alto Networks Cortex XDR agent...A problem with a protection mechanism in the Palo Alto Networks Cortex XDR agent on macOS allows a local administrator to disable the agent. This issue could be leveraged by malware to perform malicious activity without detection. |
2026-03-11 | |
| CVE-2026-3429 | 4.2 | MEDIUM | CWE-284 | 0.1% p19 | 2.94 | A flaw was identified in the Account REST API of Keycloak that allows a user aut...A flaw was identified in the Account REST API of Keycloak that allows a user authenticated at a lower security level to perform sensitive actions intended only for higher-assurance sessions. Specifically, an attacker who has already obtained a victim’s password can delete the victim’s registered MFA/OTP credential without first proving possession of that factor. The attacker can then register their own MFA device, effectively taking full control of the account. This weakness undermines the intended protection provided by multi-factor authentication. |
2026-03-11 | |
| CVE-2026-31854 | 8.7 | HIGH | CWE-78 | 0.1% p15 | 6.09 | Cursor is a code editor built for programming with AI. Prior to 2.0 ,if a visite...Cursor is a code editor built for programming with AI. Prior to 2.0 ,if a visited website contains maliciously crafted instructions, the model may attempt to follow them in order to “assist” the user. When combined with a bypass of the command whitelist mechanism, such indirect prompt injections could result in commands being executed automatically, without the user’s explicit intent, thereby posing a significant security risk. This vulnerability is fixed in 2.0. |
2026-03-11 | |
| CVE-2026-31853 | 5.7 | MEDIUM | CWE-122 | 0.0% p3 | 3.99 | ImageMagick is free and open-source software used for editing and manipulating d...ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to 7.1.2-16 and 6.9.13-41, an overflow on 32-bit systems can cause a crash in the SFW decoder when processing extremely large images. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41. |
2026-03-11 | |
| CVE-2026-31852 | 10.0 | CRITICAL | CWE-269 | 0.1% p30 | 7.00 | Jellyfin is an open-source media system. The code-quality.yml GitHub Actions wor...Jellyfin is an open-source media system. The code-quality.yml GitHub Actions workflow in jellyfin/jellyfin-ios is vulnerable to arbitrary code execution via pull requests from forked repositories. Due to the workflow's elevated permissions (nearly all write permissions), this vulnerability enables full repository takeover of jellyfin/jellyfin-ios, exfiltration of highly privileged secrets, Apple App Store supply chain attack, GitHub Container Registry (ghcr.io) package poisoning, and full jellyfin organization compromise via cross-repository token usage. Note: This is not a code vulnerability, but a vulnerability in the GitHub Actions workflows. No new version is required for this GHSA and end users do not need to take any actions. |
2026-03-11 | |
| CVE-2026-31840 | 9.3 | CRITICAL | CWE-89 | 0.1% p21 | 6.51 | Parse Server is an open source backend that can be deployed to any infrastructur...Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.6.0-alpha.2 and 8.6.28, an attacker can use a dot-notation field name in combination with the sort query parameter to inject SQL into the PostgreSQL database through an improper escaping of sub-field values in dot-notation queries. The vulnerability may also affect queries that use dot-notation field names with the distinct and where query parameters. This vulnerability only affects deployments using a PostgreSQL database. This vulnerability is fixed in 9.6.0-alpha.2 and 8.6.28. |
2026-03-11 | |
| CVE-2026-31839 | 8.2 | HIGH | CWE-354 | 0.0% p3 | 5.74 | Striae is a firearms examiner's comparison companion. A high-severity integrity ...Striae is a firearms examiner's comparison companion. A high-severity integrity bypass vulnerability existed in Striae's digital confirmation workflow prior to v3.0.0. Hash-only validation trusted manifest hash fields that could be modified together with package content, allowing tampered confirmation packages to pass integrity checks. This vulnerability is fixed in 3.0.0. |
2026-03-11 | |
| CVE-2026-31813 | 4.8 | MEDIUM | CWE-290 | 0.0% p12 | 3.36 | Supabase Auth is a JWT based API for managing users and issuing JWT tokens. Prio...Supabase Auth is a JWT based API for managing users and issuing JWT tokens. Prior to 2.185.0, a vulnerability has been identified that allows an attacker to issue sessions for arbitrary users using specially crafted ID tokens when the Apple or Azure providers are enabled. The attacker issues a valid, asymmetrically signed ID token from their issuer for each victim email address, which then is sent to the Supabase Auth token endpoint using the ID token flow. If the ID token is OIDC compliant, the Auth server would validate it against the attacker-controlled issuer and link the existing OIDC identity (Apple or Azure) of the victim to an additional OIDC identity based on the ID token contents. The Auth server would then issue a valid user session (access and refresh tokens) at the AAL1 level to the attacker. This vulnerability is fixed in 2.185.0. |
2026-03-11 | |
| CVE-2026-30868 | 6.3 | MEDIUM | CWE-352 | 0.0% p5 | 4.41 | OPNsense is a FreeBSD based firewall and routing platform. Prior to 26.1.4, mult...OPNsense is a FreeBSD based firewall and routing platform. Prior to 26.1.4, multiple OPNsense MVC API endpoints perform state‑changing operations but are accessible via HTTP GET requests without CSRF protection. The framework CSRF validation in ApiControllerBase only applies to POST/PUT/DELETE methods, allowing authenticated GET requests to bypass CSRF verification. As a result, a malicious website can trigger privileged backend actions when visited by an authenticated user, causing unintended service reloads and configuration changes through configd. This results in an authenticated Cross‑Site Request Forgery vulnerability allowing unauthorized system state changes. This vulnerability is fixed in 26.1.4. |
2026-03-11 | |
| CVE-2026-30239 | 6.5 | MEDIUM | CWE-863 | 0.0% p10 | 4.55 | OpenProject is an open-source, web-based project management software. Prior to 1...OpenProject is an open-source, web-based project management software. Prior to 17.2.0, when budgets are deleted, the work packages that were assigned to this budget need to be moved to a different budget. This action was performed before the permission check on the delete action was executed. This allowed all users in the application to delete work package budget assignments. This vulnerability is fixed in 17.2.0. |
2026-03-11 | |
| CVE-2026-30236 | 4.3 | MEDIUM | CWE-863 | 0.0% p9 | 3.01 | OpenProject is an open-source, web-based project management software. Prior to 1...OpenProject is an open-source, web-based project management software. Prior to 17.2.0, when editing a project budget and planning the labor cost, it was not checked that the user that was planned in the budget is actually a project member. This exposed the user's default rate (if one was set up) to users that should only see that information for project members. Also, the endpoint that handles the pre-calculation for the frontend to display a preview of the costs, while it was being entered, did not properly validate the membership of the user as well. This also allowed to calculate costs with the default rate of non-members. This vulnerability is fixed in 17.2.0. |
2026-03-11 | |
| CVE-2026-30235 | 6.5 | MEDIUM | CWE-79 | 0.1% p25 | 4.55 | OpenProject is an open-source, web-based project management software. Prior to 1...OpenProject is an open-source, web-based project management software. Prior to 17.2.0, this vulnerability occurs due to improper validation of OpenProject’s Markdown rendering, specifically in the hyperlink handling. This allows an attacker to inject malicious hyperlink payloads that perform DOM clobbering. DOM clobbering can crash or blank the entire page by overwriting native DOM functions with HTML elements, causing critical JavaScript calls to throw runtime errors during application initialization and halt further execution. This vulnerability is fixed in 17.2.0. |
2026-03-11 | |
| CVE-2026-20165 | 6.3 | MEDIUM | CWE-532 | 0.0% p11 | 4.41 | In Splunk Enterprise versions below 10.2.1, 10.0.4, 9.4.9, and 9.3.10, and Splun...In Splunk Enterprise versions below 10.2.1, 10.0.4, 9.4.9, and 9.3.10, and Splunk Cloud Platform versions below 10.2.2510.7, 10.1.2507.17, 10.0.2503.12, and 9.3.2411.124, a low-privileged user that does not hold the "admin" or "power" Splunk roles could retrieve sensitive information by inspecting the job's search log due to improper access control in the MongoClient logging channel. |
2026-03-11 | |
| CVE-2026-20164 | 6.5 | MEDIUM | CWE-200 | 0.0% p12 | 4.55 | In Splunk Enterprise versions below 10.2.0, 10.0.3, 9.4.9, and 9.3.10, and Splun...In Splunk Enterprise versions below 10.2.0, 10.0.3, 9.4.9, and 9.3.10, and Splunk Cloud Platform versions below 10.2.2510.5, 10.1.2507.16, 10.0.2503.11, and 9.3.2411.123, a low-privileged user that does not hold the "admin" or "power" Splunk roles could access the `/splunkd/__raw/servicesNS/-/-/configs/conf-passwords` REST API endpoint, which exposes the hashed or plaintext password values that are stored in the passwords.conf configuration file due to improper access control. This vulnerability could allow for the unauthorized disclosure of sensitive credentials. |
2026-03-11 | |
| CVE-2026-20163 | 7.2 | HIGH | CWE-77 | 0.1% p24 | 5.04 | In Splunk Enterprise versions below 10.2.0, 10.0.4, 9.4.9, and 9.3.10, and Splun...In Splunk Enterprise versions below 10.2.0, 10.0.4, 9.4.9, and 9.3.10, and Splunk Cloud Platform versions below 10.2.2510.5, 10.0.2503.12, 10.1.2507.16, and 9.3.2411.124, a user who holds a role that contains the high-privilege capability `edit_cmd` could execute arbitrary shell commands using the `unarchive_cmd` parameter for the `/splunkd/__upload/indexing/preview` REST endpoint. |
2026-03-11 | |
| CVE-2025-70082 | 9.8 | CRITICAL | CWE-78 | 0.1% p24 | 6.86 | An issue in Lantronix EDS3000PS v.3.1.0.0R2 allows an attacker to execute arbitr...An issue in Lantronix EDS3000PS v.3.1.0.0R2 allows an attacker to execute arbitrary code and obtain sensitive information via the ltrx_evo component |
2026-03-11 | |
| CVE-2025-68623 | 8.8 | HIGH | CWE-284 | 0.0% p2 | 6.16 | In Microsoft DirectX End-User Runtime Web Installer 9.29.1974.0, a low-privilege...In Microsoft DirectX End-User Runtime Web Installer 9.29.1974.0, a low-privilege user can replace an executable file during the installation process, which may result in unintended elevation of privileges. During installation, the installer runs with HIGH integrity and downloads executables and DLLs to the %TEMP% folder - writable by standard users. Subsequently, the installer executes the downloaded executable with HIGH integrity to complete the application installation. However, an attacker can replace the downloaded executable with a malicious, user-controlled executable. When the installer executes this replaced file, it runs the attacker's code with HIGH integrity. Since code running at HIGH integrity can escalate to SYSTEM level by registering and executing a service, this creates a complete privilege escalation chain from standard user to SYSTEM. NOTE: The Supplier disputes this record stating that they have determined this to be the behavior as designed. |
2026-03-11 | |
| CVE-2025-67041 | 9.8 | CRITICAL | CWE-78 | 0.1% p17 | 6.86 | An issue was discovered in Lantronix EDS3000PS 3.1.0.0R2. The host parameter of ...An issue was discovered in Lantronix EDS3000PS 3.1.0.0R2. The host parameter of the TFTP client in the Filesystem Browser page is not properly sanitized. This can be exploited to escape from the original command and execute an arbitrary one with root privileges. |
2026-03-11 | |
| CVE-2025-67039 | 9.1 | CRITICAL | CWE-288 | 0.1% p25 | 6.37 | An issue was discovered in Lantronix EDS3000PS 3.1.0.0R2. The authentication on ...An issue was discovered in Lantronix EDS3000PS 3.1.0.0R2. The authentication on management pages can be bypassed by appending a specific suffix to the URL and by sending an Authorization header that uses "admin" as the username. |
2026-03-11 | |
| CVE-2025-67038 | 9.8 | CRITICAL | CWE-94 | 0.1% p22 | 6.86 | An issue was discovered in Lantronix EDS5000 2.1.0.0R3. The HTTP RPC module exec...An issue was discovered in Lantronix EDS5000 2.1.0.0R3. The HTTP RPC module executes a shell command to write logs when user's authantication fails. The username is directly concatenated with the command without any sanitization. This allow attackers to inject arbitrary OS commands into the username parameter. Injected commands are executed with root privileges. |
2026-03-11 | |
| CVE-2025-67037 | 8.8 | HIGH | CWE-94 | 0.1% p16 | 6.16 | An issue was discovered in Lantronix EDS5000 2.1.0.0R3. An authenticated attacke...An issue was discovered in Lantronix EDS5000 2.1.0.0R3. An authenticated attacker can inject OS commands into the "tunnel" parameter when killing a tunnel connection. Injected commands are executed with root privileges. |
2026-03-11 | |
| CVE-2025-67036 | 8.8 | HIGH | CWE-94 | 0.1% p16 | 6.16 | An issue was discovered in Lantronix EDS5000 2.1.0.0R3. The Log Info page allows...An issue was discovered in Lantronix EDS5000 2.1.0.0R3. The Log Info page allows users to see log files by specifying their names. Due to a missing sanitization in the file name parameter, an authenticated attacker can inject arbitrary OS commands that are executed with root privileges. |
2026-03-11 | |
| CVE-2025-67035 | 9.8 | CRITICAL | CWE-94 | 0.1% p18 | 6.86 | An issue was discovered in Lantronix EDS5000 2.1.0.0R3. The SSH Client and SSH S...An issue was discovered in Lantronix EDS5000 2.1.0.0R3. The SSH Client and SSH Server pages are affected by multiple OS injection vulnerabilities due to missing sanitization of input parameters. An attacker can inject arbitrary commands in delete actions of various objects, such as server keys, users, and known hosts. Commands are executed with root privileges. |
2026-03-11 | |
| CVE-2025-67034 | 8.8 | HIGH | CWE-94 | 0.1% p16 | 6.16 | An issue was discovered in Lantronix EDS5000 2.1.0.0R3. An authenticated attacke...An issue was discovered in Lantronix EDS5000 2.1.0.0R3. An authenticated attacker can inject OS commands into the "name" parameter when deleting SSL credentials through the management interface. Injected commands are executed with root privileges. |
2026-03-11 | |
| CVE-2025-12555 | 4.3 | MEDIUM | CWE-863 | 0.0% p3 | 3.01 | GitLab has remediated an issue in GitLab CE/EE affecting all versions from 15.1 ...GitLab has remediated an issue in GitLab CE/EE affecting all versions from 15.1 before 18.7.6, 18.8 before 18.8.6, and 18.9 before 18.9.2 that, under certain conditions, could have allowed an authenticated user to access previous pipeline job information on projects with repository and CI/CD disabled due to improper authorization checks. |
2026-03-11 | |
| CVE-2026-3848 | 5.0 | MEDIUM | CWE-93 | 0.0% p5 | 3.50 | GitLab has remediated an issue in GitLab CE/EE affecting all versions from 8.11 ...GitLab has remediated an issue in GitLab CE/EE affecting all versions from 8.11 before 18.7.6, 18.8 before 18.8.6, and 18.9 before 18.9.2 that could have allowed an authenticated user to make unintended internal requests through proxy environments under certain conditions due to improper input validation in import functionality. |
2026-03-11 | |
| CVE-2026-31892 | 8.9 | HIGH | CWE-863 | 0.0% p12 | 6.23 | Argo Workflows is an open source container-native workflow engine for orchestrat...Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes. From 2.9.0 to before 4.0.2 and 3.7.11, A user who can submit Workflows can completely bypass all security settings defined in a WorkflowTemplate by including a podSpecPatch field in their Workflow submission. This works even when the controller is configured with templateReferencing: Strict, which is specifically documented as a mechanism to restrict users to admin-approved templates. The podSpecPatch field on a submitted Workflow takes precedence over the referenced WorkflowTemplate during spec merging and is applied directly to the pod spec at creation time with no security validation. This vulnerability is fixed in 4.0.2 and 3.7.11. |
2026-03-11 | |
| CVE-2026-30741 | 9.8 | CRITICAL | CWE-94 | 0.4% p59 | 6.87 | A remote code execution (RCE) vulnerability in OpenClaw Agent Platform v2026.2.6...A remote code execution (RCE) vulnerability in OpenClaw Agent Platform v2026.2.6 allows attackers to execute arbitrary code via a Request-Side prompt injection attack. |
2026-03-11 | |
| CVE-2026-30234 | 6.5 | MEDIUM | CWE-22 | 0.0% p13 | 4.55 | OpenProject is an open-source, web-based project management software. Prior to 1...OpenProject is an open-source, web-based project management software. Prior to 17.2.0, an authenticated project member with BCF import permissions can upload a crafted .bcf archive where the <Snapshot> value in markup.bcf is manipulated to contain an absolute or traversal local path (for example: /etc/passwd or ../../../../etc/passwd). During import, this untrusted <Snapshot> value is used as file.path during attachment processing. As a result, local filesystem content can be read outside the intended ZIP scope. This results in an Arbitrary File Read (AFR) within the read permissions of the OpenProject application user. This vulnerability is fixed in 17.2.0. |
2026-03-11 | |
| CVE-2026-29777 | 6.1 | MEDIUM | CWE-74 | 0.0% p2 | 4.27 | Traefik is an HTTP reverse proxy and load balancer. Prior to 3.6.10, A tenant wi...Traefik is an HTTP reverse proxy and load balancer. Prior to 3.6.10, A tenant with write access to an HTTPRoute resource can inject backtick-delimited rule tokens into Traefik's router rule language via unsanitized header or query parameter match values. In shared gateway deployments, this can bypass listener hostname constraints and redirect traffic for victim hostnames to attacker-controlled backends. This vulnerability is fixed in 3.6.10. |
2026-03-11 | |
| CVE-2026-28803 | 6.5 | MEDIUM | CWE-284 | 0.0% p12 | 4.55 | Open Forms allows users create and publish smart forms. Prior to 3.3.13 and 3.4....Open Forms allows users create and publish smart forms. Prior to 3.3.13 and 3.4.5, to be able to cosign, the cosigner receives an e-mail with instructions or a deep-link to start the cosign flow. The submission reference is communicated so that the user can retrieve the submission to be cosigned. Attackers can guess a code or modify the received code to look up arbitrary submissions, after logging in (with DigiD/eHerkenning/... depending on form configuration). This vulnerability is fixed in 3.3.13 and 3.4.5. |
2026-03-11 | |
| CVE-2026-28229 | 9.8 | CRITICAL | CWE-863 | 0.0% p14 | 6.86 | Argo Workflows is an open source container-native workflow engine for orchestrat...Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes. Prior to 4.0.2 and 3.7.11, Workflow templates endpoints allow any client to retrieve WorkflowTemplates (and ClusterWorkflowTemplates). Any request with a Authorization: Bearer nothing token can leak sensitive template content, including embedded Secret manifests. This vulnerability is fixed in 4.0.2 and 3.7.11. |
2026-03-11 | |
| CVE-2026-27897 | 10.0 | CRITICAL | CWE-22 | 0.1% p21 | 7.00 | Vociferous provides cross-platform, offline speech-to-text with local AI refinem...Vociferous provides cross-platform, offline speech-to-text with local AI refinement. Prior to 4.4.2, the vulnerability exists in src/api/system.py within the export_file route. The application accepts a JSON payload containing a filename and content. While the developer intended for a native UI dialog to handle the file path, the API does not validate the filename string before it is processed by the backends filesystem logic. Because the API is unauthenticated and the CORS configuration in app.py is overly permissive (allow_origins=["*"] or allowing localhost), an external attacker can bypass the UI entirely. By using directory traversal sequences (../), an attacker can force the app to write arbitrary data to any location accessible by the current user's permissions. This vulnerability is fixed in 4.4.2. |
2026-03-11 | |
| CVE-2026-22248 | 8.0 | HIGH | CWE-502 | 0.2% p45 | 5.61 | GLPI is an open-source asset and IT management software package that provides IT...GLPI is an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking and software auditing. From 11.0.0 to before 11.0.5, an authenticated technician user can upload a malicious file and trigger its execution through an unsafe PHP instantiation. This vulnerability is fixed in 11.0.5. |
2026-03-11 | |
| CVE-2026-21888 | 7.5 | HIGH | CWE-125 | 0.1% p21 | 5.25 | NanoMQ MQTT Broker (NanoMQ) is an all-around Edge Messaging Platform. MQTT v5 Va...NanoMQ MQTT Broker (NanoMQ) is an all-around Edge Messaging Platform. MQTT v5 Variable Byte Integer parsing out-of-bounds: get_var_integer() accepts 5-byte varints without bounds checks; reliably triggers OOB read / crash when built with ASan. This affects 0.24.6 and earlier. |
2026-03-11 | |
| CVE-2026-1732 | 4.3 | MEDIUM | CWE-212 | 0.0% p6 | 3.01 | GitLab has remediated an issue in GitLab CE/EE affecting all versions from 12.6 ...GitLab has remediated an issue in GitLab CE/EE affecting all versions from 12.6 before 18.7.6, 18.8 before 18.8.6, and 18.9 before 18.9.2 that could have allowed an authenticated user to disclose confidential issue titles due to improper filtering under certain circumstances. |
2026-03-11 | |
| CVE-2026-1663 | 4.3 | MEDIUM | CWE-862 | 0.0% p2 | 3.01 | GitLab has remediated an issue in GitLab CE/EE affecting all versions from 14.4 ...GitLab has remediated an issue in GitLab CE/EE affecting all versions from 14.4 before 18.7.6, 18.8 before 18.8.6, and 18.9 before 18.9.2 that could have allowed an authenticated user with group import permissions to create labels in private projects due to improper authorization validation in the group import process under certain circumstances. |
2026-03-11 | |
| CVE-2026-1230 | 4.1 | MEDIUM | CWE-706 | 0.1% p15 | 2.87 | GitLab has remediated an issue in GitLab CE/EE affecting all versions from 1.0 b...GitLab has remediated an issue in GitLab CE/EE affecting all versions from 1.0 before 18.7.6, 18.8 before 18.8.6, and 18.9 before 18.9.2 that could have allowed an authenticated user to cause repository downloads to contain different code than displayed in the web interface due to incorrect validation of branch references under certain circumstances. |
2026-03-11 | |
| CVE-2026-1090 | 8.7 | HIGH | CWE-79 | 0.1% p22 | 6.09 | GitLab has remediated an issue in GitLab CE/EE affecting all versions from 10.6 ...GitLab has remediated an issue in GitLab CE/EE affecting all versions from 10.6 before 18.7.6, 18.8 before 18.8.6, and 18.9 before 18.9.2 that could have allowed an authenticated user, when the `markdown_placeholders` feature flag was enabled, to inject JavaScript in a browser due to improper sanitization of placeholder content in markdown processing. |
2026-03-11 | |
| CVE-2026-1069 | 7.5 | HIGH | CWE-674 | 0.0% p8 | 5.25 | GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.9 ...GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.9 before 18.9.2 that could have allowed an unauthenticated user to cause a denial of service by sending specially crafted GraphQL requests due to uncontrolled recursion under certain circumstances. |
2026-03-11 | |
| CVE-2026-0602 | 4.3 | MEDIUM | CWE-288 | 0.0% p3 | 3.01 | GitLab has remediated an issue in GitLab CE/EE affecting all versions from 15.6 ...GitLab has remediated an issue in GitLab CE/EE affecting all versions from 15.6 before 18.7.6, 18.8 before 18.8.6, and 18.9 before 18.9.2 that could have allowed an authenticated user to disclose metadata from private issues, merge requests, epics, milestones, or commits due to improper filtering in the snippet rendering process under certain circumstances. |
2026-03-11 | |
| CVE-2025-14513 | 7.5 | HIGH | CWE-1284 | 0.0% p12 | 5.25 | GitLab has remediated an issue in GitLab CE/EE affecting all versions from 16.11...GitLab has remediated an issue in GitLab CE/EE affecting all versions from 16.11 before 18.7.6, 18.8 before 18.8.6, and 18.9 before 18.9.2 that could have allowed an unauthenticated user to cause a denial of service condition due to improper input validation when processing specially crafted JSON payloads in the protected branches API. |
2026-03-11 | |
| CVE-2025-13929 | 7.5 | HIGH | CWE-770 | 0.1% p16 | 5.25 | GitLab has remediated an issue in GitLab CE/EE affecting all versions from 10.0 ...GitLab has remediated an issue in GitLab CE/EE affecting all versions from 10.0 before 18.7.6, 18.8 before 18.8.6, and 18.9 before 18.9.2 that could have allowed an unauthenticated user to cause a denial of service by issuing specially crafted requests to repository archive endpoints under certain conditions. |
2026-03-11 | |
| CVE-2025-13690 | 6.5 | MEDIUM | CWE-770 | 0.1% p23 | 4.55 | GitLab has remediated an issue in GitLab CE/EE affecting all versions from 16.11...GitLab has remediated an issue in GitLab CE/EE affecting all versions from 16.11 before 18.7.6, 18.8 before 18.8.6, and 18.9 before 18.9.2 that could have allowed an authenticated user to cause a denial of service condition due to improper input validation on webhook custom header names under certain conditions. |
2026-03-11 | |
| CVE-2025-12704 | 3.5 | LOW | CWE-862 | 0.0% p3 | 2.45 | GitLab has remediated an issue in GitLab EE affecting all versions from 18.2 bef...GitLab has remediated an issue in GitLab EE affecting all versions from 18.2 before 18.7.6, 18.8 before 18.8.6, and 18.9 before 18.9.2 that could have allowed an authenticated user to access Virtual Registry data in groups where they are not members due to improper authorization under certain conditions. |
2026-03-11 | |
| CVE-2025-12697 | 2.2 | LOW | CWE-116 | 0.0% p2 | 1.54 | GitLab has remediated an issue in GitLab CE/EE affecting all versions from 15.5 ...GitLab has remediated an issue in GitLab CE/EE affecting all versions from 15.5 before 18.7.6, 18.8 before 18.8.6, and 18.9 before 18.9.2 that could have allowed an authenticated user with maintainer-role permissions to reveal Datadog API credentials under certain conditions. |
2026-03-11 | |
| CVE-2025-12690 | 7.3 | HIGH | CWE-250 | 0.0% p4 | 5.11 | Execution with unnecessary privileges in Forcepoint NGFW Engine allows local pri...Execution with unnecessary privileges in Forcepoint NGFW Engine allows local privilege escalation.This issue affects NGFW Engine through 6.10.19, through 7.3.0, through 7.2.4, through 7.1.10. |
2026-03-11 | |
| CVE-2025-12576 | 6.5 | MEDIUM | CWE-770 | 0.0% p14 | 4.55 | GitLab has remediated an issue in GitLab CE/EE affecting all versions from 9.3 b...GitLab has remediated an issue in GitLab CE/EE affecting all versions from 9.3 before 18.7.6, 18.8 before 18.8.6, and 18.9 before 18.9.2 that under certain conditions could have allowed an authenticated user to cause a denial of service due to improper handling of webhook response data. |
2026-03-11 | |
| CVE-2026-3946 | 5.1 | MEDIUM | CWE-79 | 0.0% p10 | 3.57 | A vulnerability was detected in PHPEMS 11.0. The affected element is an unknown ...A vulnerability was detected in PHPEMS 11.0. The affected element is an unknown function of the file /index.php?ask=app-ask. Performing a manipulation of the argument askcontent results in cross site scripting. The attack is possible to be carried out remotely. The exploit is now public and may be used. |
2026-03-11 | |
| CVE-2026-3013 | 8.7 | HIGH | CWE-22 | 0.4% p60 | 6.10 | Coppermine Photo Gallery in versions 1.6.09 through 1.6.27 is vulnerable to path...Coppermine Photo Gallery in versions 1.6.09 through 1.6.27 is vulnerable to path traversal. Unauthenticated remote attacker is able to exploit a vulnerable endpoint and construct payloads that allow to read content of any file accessible by the the web server process.This issue was fixed in version 1.6.28. |
2026-03-11 | |
| CVE-2026-32229 | 6.8 | MEDIUM | CWE-290 | 0.0% p0 | 4.76 | In JetBrains Hub before 2026.1 possible on sign-in account mismatch with non-SSO...In JetBrains Hub before 2026.1 possible on sign-in account mismatch with non-SSO auth and 2FA disabled |
2026-03-11 | |
| CVE-2026-30903 | 9.6 | CRITICAL | CWE-73 | 0.1% p23 | 6.72 | External Control of File Name or Path in the Mail feature of Zoom Workplace for ...External Control of File Name or Path in the Mail feature of Zoom Workplace for Windows before 6.6.0 may allow an unauthenticated user to conduct an escalation of privilege via network access. |
2026-03-11 | |
| CVE-2026-30902 | 7.8 | HIGH | CWE-269 | 0.0% p3 | 5.46 | Improper Privilege Management in certain Zoom Clients for Windows may allow an a...Improper Privilege Management in certain Zoom Clients for Windows may allow an authenticated user to conduct an escalation of privilege via local access. |
2026-03-11 | |
| CVE-2026-30901 | 7.0 | HIGH | CWE-20 | 0.0% p6 | 4.90 | Improper Input Validation in Zoom Rooms for Windows before 6.6.5 in Kiosk Mode m...Improper Input Validation in Zoom Rooms for Windows before 6.6.5 in Kiosk Mode may allow an authenticated user to conduct an escalation of privilege via local access. |
2026-03-11 | |
| CVE-2026-30900 | 7.8 | HIGH | CWE-754 | 0.0% p3 | 5.46 | Improper Check of minimum version in update functionality of certain Zoom Client...Improper Check of minimum version in update functionality of certain Zoom Clients for Windows may allow an authenticated user to conduct an escalation of privilege via local access. |
2026-03-11 | |
| CVE-2025-70330 | 3.3 | LOW | CWE-125 | 0.0% p2 | 2.31 | Easy Grade Pro 4.1.0.2 contains a file parsing logic flaw in the handling of pro...Easy Grade Pro 4.1.0.2 contains a file parsing logic flaw in the handling of proprietary .EGP gradebook files. By modifying specific fields at precise offsets within an otherwise valid .EGP file, an attacker can trigger an out-of-bounds memory read during parsing. This results in an unhandled access violation and application crash, leading to a local denial-of-service condition when the crafted file is opened by a user. |
2026-03-11 | |
| CVE-2025-70027 | 7.5 | HIGH | CWE-918 | 0.0% p13 | 5.25 | An issue pertaining to CWE-918: Server-Side Request Forgery was discovered in Su...An issue pertaining to CWE-918: Server-Side Request Forgery was discovered in Sunbird-Ed SunbirdEd-portal v1.13.4. This allows attackers to obtain sensitive information |
2026-03-11 | |
| CVE-2025-67298 | 8.1 | HIGH | CWE-290 | 0.1% p23 | 5.67 | An issue in ClasroomIO before v.0.2.6 allows a remote attacker to escalate privi...An issue in ClasroomIO before v.0.2.6 allows a remote attacker to escalate privileges via the endpoints /api/verify and /rest/v1/profile |
2026-03-11 | |
| CVE-2026-3496 | 7.5 | HIGH | CWE-89 | 0.1% p25 | 5.25 | The JetBooking plugin for WordPress is vulnerable to SQL Injection via the 'chec...The JetBooking plugin for WordPress is vulnerable to SQL Injection via the 'check_in_date' parameter in all versions up to, and including, 4.0.3. This is due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. |
2026-03-11 | |
| CVE-2026-32063 | 6.9 | MEDIUM | CWE-77 | 0.1% p28 | 4.83 | OpenClaw version 2026.2.19-2 prior to 2026.2.21 contains a command injection vul...OpenClaw version 2026.2.19-2 prior to 2026.2.21 contains a command injection vulnerability in systemd unit file generation where attacker-controlled environment values are not validated for CR/LF characters, allowing newline injection to break out of Environment= lines and inject arbitrary systemd directives. An attacker who can influence config.env.vars and trigger service install or restart can execute arbitrary commands with the privileges of the OpenClaw gateway service user. |
2026-03-11 | |
| CVE-2026-32062 | 8.7 | HIGH | CWE-770 | 0.1% p33 | 6.09 | OpenClaw versions2026.2.21-2 prior to 2026.2.22 and @openclaw/voice-call version...OpenClaw versions2026.2.21-2 prior to 2026.2.22 and @openclaw/voice-call versions 2026.2.21 prior to 2026.2.22 accept media-stream WebSocket upgrades before stream validation, allowing unauthenticated clients to establish connections. Remote attackers can hold idle pre-authenticated sockets open to consume connection resources and degrade service availability for legitimate streams. |
2026-03-11 | |
| CVE-2026-32061 | 6.7 | MEDIUM | CWE-22 | 0.0% p5 | 4.69 | OpenClaw versions prior to 2026.2.17 contain a path traversal vulnerability in t...OpenClaw versions prior to 2026.2.17 contain a path traversal vulnerability in the $include directive resolution that allows reading arbitrary local files outside the config directory boundary. Attackers with config modification capabilities can exploit this by specifying absolute paths, traversal sequences, or symlinks to access sensitive files readable by the OpenClaw process user, including API keys and credentials. |
2026-03-11 | |
| CVE-2026-32060 | 8.7 | HIGH | CWE-22 | 0.4% p61 | 6.10 | OpenClaw versions prior to 2026.2.14 contain a path traversal vulnerability in a...OpenClaw versions prior to 2026.2.14 contain a path traversal vulnerability in apply_patch that allows attackers to write or delete files outside the configured workspace directory. When apply_patch is enabled without filesystem sandbox containment, attackers can exploit crafted paths including directory traversal sequences or absolute paths to escape workspace boundaries and modify arbitrary files. |
2026-03-11 | |
| CVE-2026-32059 | 8.7 | HIGH | CWE-863 | 0.1% p22 | 6.09 | OpenClaw version 2026.2.22-2 prior to 2026.2.23 tools.exec.safeBins validation f...OpenClaw version 2026.2.22-2 prior to 2026.2.23 tools.exec.safeBins validation for sort command fails to properly validate GNU long-option abbreviations, allowing attackers to bypass denied-flag checks via abbreviated options. Remote attackers can execute sort commands with abbreviated long options to skip approval requirements in allowlist mode. |
2026-03-11 | |
| CVE-2026-3944 | 6.9 | MEDIUM | CWE-74 | 0.0% p9 | 4.83 | A vulnerability was determined in itsourcecode University Management System 1.0....A vulnerability was determined in itsourcecode University Management System 1.0. This vulnerability affects unknown code of the file /att_add.php. This manipulation of the argument Name causes sql injection. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized. |
2026-03-11 | |
| CVE-2026-3943 | 6.9 | MEDIUM | CWE-74 | 0.7% p72 | 4.85 | A vulnerability was found in H3C ACG1000-AK230 up to 20260227. This affects an u...A vulnerability was found in H3C ACG1000-AK230 up to 20260227. This affects an unknown part of the file /webui/?aaa_portal_auth_local_submit. The manipulation of the argument suffix results in command injection. The attack can be launched remotely. The exploit has been made public and could be used. The vendor is investigating and remediating this issue. |
2026-03-11 | |
| CVE-2026-3178 | 7.2 | HIGH | CWE-79 | 0.1% p32 | 5.04 | The Name Directory plugin for WordPress is vulnerable to Stored Cross-Site Scrip...The Name Directory plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'name_directory_name' parameter in all versions up to, and including, 1.32.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. The vulnerability was partially patched in versions 1.30.3 and 1.32.1. |
2026-03-11 | |
| CVE-2026-3906 | 4.3 | MEDIUM | CWE-862 | 0.0% p7 | 3.01 | WordPress core is vulnerable to unauthorized access in versions 6.9 through 6.9....WordPress core is vulnerable to unauthorized access in versions 6.9 through 6.9.1. The Notes feature (block-level collaboration annotations) was introduced in WordPress 6.9 to allow editorial comments directly on posts in the block editor. However, the REST API `create_item_permissions_check()` method in the comments controller did not verify that the authenticated user has `edit_post` permission on the target post when creating a note. This makes it possible for authenticated attackers with Subscriber-level access to create notes on any post, including posts authored by other users, private posts, and posts in any status. |
2026-03-11 | |
| CVE-2026-3492 | 6.4 | MEDIUM | CWE-79 | 0.0% p10 | 4.48 | The Gravity Forms plugin for WordPress is vulnerable to Stored Cross-Site Script...The Gravity Forms plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 2.9.28.1. This is due to a compound failure involving missing authorization on the `create_from_template` AJAX endpoint (allowing any authenticated user to create forms), insufficient input sanitization (`sanitize_text_field()` preserves single quotes), and missing output escaping when the form title is rendered in the Form Switcher dropdown (`title` attribute constructed without `esc_attr()`, and JavaScript `saferHtml` utility only escapes `&`, `<`, `>` but not quotes). This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject arbitrary JavaScript that executes when an Administrator searches in the Form Switcher dropdown in the Form Editor. |
2026-03-11 | |
| CVE-2026-3231 | 7.2 | HIGH | CWE-79 | 0.1% p35 | 5.04 | The Checkout Field Editor (Checkout Manager) for WooCommerce plugin for WordPres...The Checkout Field Editor (Checkout Manager) for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via custom radio and checkboxgroup field values submitted through the WooCommerce Block Checkout Store API in all versions up to, and including, 2.1.7. This is due to the `prepare_single_field_data()` method in `class-thwcfd-block-order-data.php` first escaping values with `esc_html()` then immediately reversing the escaping with `html_entity_decode()` for radio and checkboxgroup field types, combined with a permissive `wp_kses()` allowlist in `get_allowed_html()` that explicitly permits the `<select>` element with the `onchange` event handler attribute. This makes it possible for unauthenticated attackers to inject arbitrary web scripts via the Store API checkout endpoint that execute when an administrator views the order details page. |
2026-03-11 | |
| CVE-2026-1993 | 8.8 | HIGH | CWE-269 | 0.1% p16 | 6.16 | The ExactMetrics – Google Analytics Dashboard for WordPress plugin is vulnerable...The ExactMetrics – Google Analytics Dashboard for WordPress plugin is vulnerable to Improper Privilege Management in versions 7.1.0 through 9.0.2. This is due to the `update_settings()` function accepting arbitrary plugin setting names without a whitelist of allowed settings. This makes it possible for authenticated attackers with the `exactmetrics_save_settings` capability to modify any plugin setting, including the `save_settings` option that controls which user roles have access to plugin functionality. The admin intended to delegate configuration access to a trusted user, not enable that user to delegate access to everyone. By setting `save_settings` to include `subscriber`, an attacker can grant plugin administrative access to all subscribers on the site. |
2026-03-11 | |
| CVE-2026-1992 | 8.8 | HIGH | CWE-639 | 0.1% p24 | 6.16 | The ExactMetrics – Google Analytics Dashboard for WordPress plugin is vulnerable...The ExactMetrics – Google Analytics Dashboard for WordPress plugin is vulnerable to Insecure Direct Object Reference in versions 8.6.0 through 9.0.2. This is due to the `store_settings()` method in the `ExactMetrics_Onboarding` class accepting a user-supplied `triggered_by` parameter that is used instead of the current user's ID to check permissions. This makes it possible for authenticated attackers with the `exactmetrics_save_settings` capability to bypass the `install_plugins` capability check by specifying an administrator's user ID in the `triggered_by` parameter, allowing them to install arbitrary plugins and achieve Remote Code Execution. This vulnerability only affects sites on which administrator has given other user types the permission to view reports and can only be exploited by users of that type. |
2026-03-11 | |
| CVE-2026-1454 | 7.2 | HIGH | CWE-79 | 0.1% p31 | 5.04 | The Responsive Contact Form Builder & Lead Generation Plugin plugin for WordPres...The Responsive Contact Form Builder & Lead Generation Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 2.0.1 via form field submissions. This is due to insufficient input sanitization in the lfb_lead_sanitize() function which omits certain field types from its sanitization whitelist, combined with an overly permissive wp_kses() filter at output time that allows onclick attributes on anchor tags. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever an administrator views the lead entries in the WordPress dashboard. |
2026-03-11 | |
| CVE-2026-3903 | 4.3 | MEDIUM | CWE-352 | 0.0% p3 | 3.01 | The Modular DS: Monitor, update, and backup multiple websites plugin for WordPre...The Modular DS: Monitor, update, and backup multiple websites plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.5.1. This is due to missing nonce validation on the postConfirmOauth() function. This makes it possible for unauthenticated attackers to disconnect the plugin's OAuth/SSO connection via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. |
2026-03-11 | |
| CVE-2026-2918 | 6.4 | MEDIUM | CWE-639 | 0.0% p12 | 4.48 | The Happy Addons for Elementor plugin for WordPress is vulnerable to Insecure Di...The Happy Addons for Elementor plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 3.21.0 via the `ha_condition_update` AJAX action. This is due to the `validate_reqeust()` method using `current_user_can('edit_posts', $template_id)` instead of `current_user_can('edit_post', $template_id)` — failing to perform object-level authorization. Additionally, the `ha_get_current_condition` AJAX action lacks a capability check. This makes it possible for authenticated attackers, with Contributor-level access and above, to modify the display conditions of any published `ha_library` template. Because the `cond_to_html()` renderer outputs condition values into HTML attributes without proper escaping (using string concatenation instead of `esc_attr()`), an attacker can inject event handler attributes (e.g., `onmouseover`) that execute JavaScript when an administrator views the Template Conditions panel, resulting in Stored Cross-Site Scripting. |
2026-03-11 | |
| CVE-2026-2917 | 5.4 | MEDIUM | CWE-639 | 0.0% p12 | 3.78 | The Happy Addons for Elementor plugin for WordPress is vulnerable to Insecure Di...The Happy Addons for Elementor plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 3.21.0 via the `ha_duplicate_thing` admin action handler. This is due to the `can_clone()` method only checking `current_user_can('edit_posts')` (a general capability) without performing object-level authorization such as `current_user_can('edit_post', $post_id)`, and the nonce being tied to the generic action name `ha_duplicate_thing` rather than to a specific post ID. This makes it possible for authenticated attackers, with Contributor-level access and above, to clone any published post, page, or custom post type by obtaining a valid clone nonce from their own posts and changing the `post_id` parameter to target other users' content. The clone operation copies the full post content, all post metadata (including potentially sensitive widget configurations and API tokens), and taxonomies into a new draft owned by the attacker. |
2026-03-11 | |
| CVE-2026-1708 | 7.5 | HIGH | CWE-89 | 0.2% p38 | 5.26 | The Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin p...The Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin plugin for WordPress is vulnerable to blind SQL Injection in all versions up to, and including, 1.6.9.27. This is due to the `db_where_conditions` method in the `TD_DB_Model` class failing to prevent the `append_where_sql` parameter from being passed through JSON request bodies, while only checking for its presence in the `$_REQUEST` superglobal. This makes it possible for unauthenticated attackers to append arbitrary SQL commands to queries and extract sensitive information from the database via the `append_where_sql` parameter in JSON payloads granted they have obtained a valid `public_token` that is inadvertently exposed during the booking flow. |
2026-03-11 | |
| CVE-2026-3826 | 9.3 | CRITICAL | CWE-98 | 0.3% p52 | 6.52 | IFTOP developed by WellChoose has a Local File Inclusion vulnerability, allowing...IFTOP developed by WellChoose has a Local File Inclusion vulnerability, allowing unauthenticated remote attackers to execute arbitrary code on the server. |
2026-03-11 | |
| CVE-2026-3825 | 5.1 | MEDIUM | CWE-79 | 0.0% p14 | 3.57 | IFTOP developed by WellChoose has a Reflected Cross-site Scripting vulnerability...IFTOP developed by WellChoose has a Reflected Cross-site Scripting vulnerability, allowing authenticated remote attackers to execute arbitrary JavaScript codes in user's browser through phishing attacks. |
2026-03-11 | |
| CVE-2026-3824 | 5.1 | MEDIUM | CWE-601 | 0.0% p12 | 3.57 | IFTOP developed by WellChoose has an Open redirect vulnerability, allowing authe...IFTOP developed by WellChoose has an Open redirect vulnerability, allowing authenticated remote attackers to craft a URL that tricks users into visiting malicious website. |
2026-03-11 | |
| CVE-2026-3534 | 6.4 | MEDIUM | CWE-79 | 0.0% p14 | 4.48 | The Astra theme for WordPress is vulnerable to Stored Cross-Site Scripting via t...The Astra theme for WordPress is vulnerable to Stored Cross-Site Scripting via the `ast-page-background-meta` and `ast-content-background-meta` post meta fields in all versions up to, and including, 4.12.3. This is due to insufficient input sanitization on meta registration and missing output escaping in the `astra_get_responsive_background_obj()` function for four CSS-context sub-properties (`background-color`, `background-image`, `overlay-color`, `overlay-gradient`). This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-03-11 | |
| CVE-2026-31844 | 8.7 | HIGH | CWE-89 | 0.1% p16 | 6.09 | An authenticated SQL Injection vulnerability (CWE-89) exists in the Koha staff i...An authenticated SQL Injection vulnerability (CWE-89) exists in the Koha staff interface in the /cgi-bin/koha/suggestion/suggestion.pl endpoint due to improper validation of the displayby parameter used by the GetDistinctValues functionality. A low-privileged staff user can inject arbitrary SQL queries via crafted requests to this parameter, allowing execution of unintended SQL statements and exposure of sensitive database information. Successful exploitation may lead to full compromise of the backend database, including disclosure or modification of stored data. |
2026-03-11 | |
| CVE-2026-3911 | 2.7 | LOW | CWE-359 | 0.0% p1 | 1.89 | A flaw was found in Keycloak. An authenticated user with the view-users role cou...A flaw was found in Keycloak. An authenticated user with the view-users role could exploit a vulnerability in the UserResource component. By accessing a specific administrative endpoint, this user could improperly retrieve user attributes that were configured to be hidden. This unauthorized information disclosure could expose sensitive user data. |
2026-03-11 | |
| CVE-2026-3884 | 2.0 | LOW | CWE-79 | 0.0% p10 | 1.40 | Versions of the package spin.js before 3.0.0 are vulnerable to Cross-site Script...Versions of the package spin.js before 3.0.0 are vulnerable to Cross-site Scripting (XSS) via the spin() function that allows a creation of more than 1 alert for each 'target' element. An attacker would need to set an arbitrary key-value pair on Object.prototype through a crafted URL achieving a prototype pollution first, before being able to execute arbitrary JavaScript in the context of the user's browser. |
2026-03-11 | |
| CVE-2026-3222 | 7.5 | HIGH | CWE-89 | 0.2% p45 | 5.26 | The WP Maps plugin for WordPress is vulnerable to time-based blind SQL Injection...The WP Maps plugin for WordPress is vulnerable to time-based blind SQL Injection via the 'location_id' parameter in all versions up to, and including, 4.9.1. This is due to the plugin's database abstraction layer (`FlipperCode_Model_Base::is_column()`) treating user input wrapped in backticks as column names, bypassing the `esc_sql()` escaping function. Additionally, the `wpgmp_ajax_call` AJAX handler (registered for unauthenticated users via `wp_ajax_nopriv`) allows calling arbitrary class methods including `wpgmp_return_final_capability`, which passes the unsanitized `location_id` GET parameter directly to a database query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. |
2026-03-11 | |
| CVE-2026-2707 | 6.4 | MEDIUM | CWE-79 | 0.0% p14 | 4.48 | The weForms plugin for WordPress is vulnerable to Stored Cross-Site Scripting vi...The weForms plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the REST API entry submission endpoint in all versions up to, and including, 1.6.27. This is due to inconsistent input sanitization between the frontend AJAX handler and the REST API endpoint. When entries are submitted via the REST API (`/wp-json/weforms/v1/forms/{id}/entries/`), the `prepare_entry()` method in `class-abstract-fields.php` receives the WP_REST_Request object as `$args`, bypassing the `weforms_clean()` fallback that sanitizes `$_POST` data for frontend submissions. The base field handler only applies `trim()` to the value. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject arbitrary web scripts into form entry hidden field values via the REST API that execute when an administrator views the form entries page, where data is rendered using a Vue.js `v-html` directive without escaping. |
2026-03-11 | |
| CVE-2026-2631 | 9.8 | CRITICAL | CWE-269 | 0.1% p19 | 6.86 | The Datalogics Ecommerce Delivery WordPress plugin before 2.6.60 exposes an una...The Datalogics Ecommerce Delivery WordPress plugin before 2.6.60 exposes an unauthenticated REST endpoint that allows any remote user to modify the option `datalogics_token` without verification. This token is subsequently used for authentication in a protected endpoint that allows users to perform arbitrary WordPress `update_option()` operations. Attackers can use this to enable registartion and to set the default role as Administrator. |
2026-03-11 | |
| CVE-2026-2626 | 8.1 | HIGH | CWE-352 | 0.0% p11 | 5.67 | The divi-booster WordPress plugin before 5.0.2 does not have authorization and C...The divi-booster WordPress plugin before 5.0.2 does not have authorization and CSRF checks in one of its fixing function, allowing unauthenticated users to modify stored divi-booster WordPress plugin before 5.0.2 options. Furthermore, due to the use of unserialize() on the data, this could be further exploited when combined with a PHP gadget chain to achieve PHP Object Injection |
2026-03-11 | |
| CVE-2026-2466 | 7.1 | HIGH | CWE-79 | 0.0% p11 | 4.97 | The DukaPress WordPress plugin through 3.2.4 does not sanitise and escape a para...The DukaPress WordPress plugin through 3.2.4 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin. |
2026-03-11 | |
| CVE-2026-2358 | 6.4 | MEDIUM | CWE-79 | 0.0% p14 | 4.48 | The WP ULike plugin for WordPress is vulnerable to Stored Cross-Site Scripting v...The WP ULike plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the `[wp_ulike_likers_box]` shortcode `template` attribute in all versions up to, and including, 5.0.1. This is due to the use of `html_entity_decode()` on shortcode attributes without subsequent output sanitization, which effectively bypasses WordPress's `wp_kses_post()` content filtering. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. The post must have at least one like for the XSS to render. |
2026-03-11 | |
| CVE-2026-27842 | 9.3 | CRITICAL | CWE-288 | 0.1% p32 | 6.51 | Authentication bypass issue exists in MR-GM5L-S1 and MR-GM5A-L1, which may allow...Authentication bypass issue exists in MR-GM5L-S1 and MR-GM5A-L1, which may allow an attacker to bypass authentication and change the device configuration. |
2026-03-11 | |
| CVE-2026-24448 | 9.3 | CRITICAL | CWE-798 | 0.1% p19 | 6.51 | Use of hard-coded credentials issue exists in MR-GM5L-S1 and MR-GM5A-L1, which m...Use of hard-coded credentials issue exists in MR-GM5L-S1 and MR-GM5A-L1, which may allow an attacker to obtain administrative access. |
2026-03-11 | |
| CVE-2026-20892 | 8.6 | HIGH | CWE-94 | 0.1% p22 | 6.02 | Code injection vulnerability exists in MR-GM5L-S1 and MR-GM5A-L1, which may allo...Code injection vulnerability exists in MR-GM5L-S1 and MR-GM5A-L1, which may allow an attacker with administrative privileges to execute arbitrary commands. |
2026-03-11 | |
| CVE-2026-1867 | 5.9 | MEDIUM | CWE-200 | 0.1% p19 | 4.13 | The Guest posting / Frontend Posting / Front Editor WordPress plugin before 5.0...The Guest posting / Frontend Posting / Front Editor WordPress plugin before 5.0.6 allows passing a URL parameter to regenerate a .json file based on demo data that it initially creates. If an administrator modifies the demo form and enables admin notifications in the Guest posting / Frontend Posting / Front Editor WordPress plugin before 5.0.6's settings, it is possible for an unauthenticated attacker to export and download all of the form data/settings, including the administrator's email address. |
2026-03-11 | |
| CVE-2026-1753 | 6.8 | MEDIUM | CWE-639 | 0.0% p10 | 4.76 | The Gutena Forms WordPress plugin before 1.6.1 does not validate option to be u...The Gutena Forms WordPress plugin before 1.6.1 does not validate option to be updated, which could allow contributors and above role to update arbitrary boolean and array options (such as users_can_register). |
2026-03-11 | |
| CVE-2023-27573 | 9.0 | CRITICAL | CWE-1392 | 0.1% p17 | 6.30 | netbox-docker before 2.5.0 has a superuser account with default credentials (adm...netbox-docker before 2.5.0 has a superuser account with default credentials (admin password for the admin account, and 0123456789abcdef0123456789abcdef01234567 value for SUPERUSER_API_TOKEN). In practice on the public Internet, almost all users changed the password but only about 90% changed the token. Having a default token value was intentional and was valuable for the main intended use case of the netbox-docker product (isolated development networks). Some users engaged in an effort to repurpose netbox-docker for production. The documentation for this effort stated that the defaults must not be used. However, installation did not ensure non-default values. The Supplier was aware of the CVE ID assignment and did not object to the assignment. |
2026-03-11 | |
| CVE-2026-2413 | 7.5 | HIGH | CWE-89 | 26.5% p96 | 6.04 | The Ally – Web Accessibility & Usability plugin for WordPress is vulnerable to S...The Ally – Web Accessibility & Usability plugin for WordPress is vulnerable to SQL Injection via the URL path in all versions up to, and including, 4.0.3. This is due to insufficient escaping on the user-supplied URL parameter in the `get_global_remediations()` method, where it is directly concatenated into an SQL JOIN clause without proper sanitization for SQL context. While `esc_url_raw()` is applied for URL safety, it does not prevent SQL metacharacters (single quotes, parentheses) from being injected. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database via time-based blind SQL injection techniques. The Remediation module must be active, which requires the plugin to be connected to an Elementor account. |
2026-03-11 | |
| CVE-2025-13067 | 8.8 | HIGH | CWE-434 | 0.1% p32 | 6.16 | The Royal Addons for Elementor plugin for WordPress is vulnerable to arbitrary f...The Royal Addons for Elementor plugin for WordPress is vulnerable to arbitrary file upload in all versions up to, and including, 1.7.1049. This is due to insufficient file type validation detecting files named main.php, allowing a file with such a name to bypass sanitization. This makes it possible for authenticated attackers, with author-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. |
2026-03-11 | |
| CVE-2026-29515 | 9.3 | CRITICAL | CWE-303 | 0.1% p30 | 6.51 | MiCode FileExplorer contains an authentication bypass vulnerability in the embed...MiCode FileExplorer contains an authentication bypass vulnerability in the embedded SwiFTP FTP server component that allows network attackers to log in without valid credentials. Attackers can send arbitrary username and password combinations to the PASS command handler, which unconditionally grants access and allows listing, reading, writing, and deleting files exposed by the FTP server. The MiCode/Explorer open source project has reached end-of-life status. |
2026-03-11 | |
| CVE-2026-23817 | 6.5 | MEDIUM | CWE-601 | 0.0% p10 | 4.55 | A vulnerability in the web-based management interface of AOS-CX Switches could a...A vulnerability in the web-based management interface of AOS-CX Switches could allow an unauthenticated remote attacker to redirect users to an arbitrary URL. |
2026-03-11 | |
| CVE-2026-23816 | 7.2 | HIGH | CWE-78 | 0.2% p39 | 5.05 | A vulnerability in the command line interface of AOS-CX Switches could allow an ...A vulnerability in the command line interface of AOS-CX Switches could allow an authenticated remote attacker to execute arbitrary commands on the underlying operating system. |
2026-03-11 | |
| CVE-2026-23815 | 7.2 | HIGH | CWE-77 | 0.4% p58 | 5.05 | A vulnerability in a custom binary used in AOS-CX Switches' CLI could allow an a...A vulnerability in a custom binary used in AOS-CX Switches' CLI could allow an authenticated remote attacker with high privileges to perform command injection. Successful exploitation could allow an attacker to execute unauthorized commands. |
2026-03-11 | |
| CVE-2026-23814 | 8.8 | HIGH | CWE-77 | 0.2% p37 | 6.16 | A vulnerability in the command parameters of a certain AOS-CX CLI command could ...A vulnerability in the command parameters of a certain AOS-CX CLI command could allow a low-privilege authenticated remote attacker to inject malicious commands resulting in unwanted behavior. |
2026-03-11 | |
| CVE-2026-23813 | 9.8 | CRITICAL | CWE-287 | 0.1% p21 | 6.86 | A vulnerability has been identified in the web-based management interface of AOS...A vulnerability has been identified in the web-based management interface of AOS-CX switches that could potentially allow an unauthenticated remote actor to circumvent existing authentication controls. In some cases this could enable resetting the admin password. |
2026-03-11 | |
| CVE-2026-3453 | 8.1 | HIGH | CWE-639 | 0.1% p16 | 5.67 | The ProfilePress plugin for WordPress is vulnerable to Insecure Direct Object Re...The ProfilePress plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 4.16.11. This is due to missing ownership validation on the change_plan_sub_id parameter in the process_checkout() function. The ppress_process_checkout AJAX handler accepts a user-controlled subscription ID intended for plan upgrades, loads the subscription record, and cancels/expires it without verifying the subscription belongs to the requesting user. This makes it possible for authenticated attackers, with Subscriber-level access and above, to cancel and expire any other user's active subscription via the change_plan_sub_id parameter during checkout, causing immediate loss of paid access for victims. |
2026-03-11 | |
| CVE-2026-21361 | 8.1 | HIGH | CWE-79 | 0.1% p29 | 5.67 | Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15, ...Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15, 2.4.4-p16 and earlier are affected by a stored Cross-Site Scripting (XSS) vvulnerability that could be abused by a high-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. A successful attacker can abuse this to achieve session takeover, increasing the confidentiality, and integrity impact to high. Exploitation of this issue requires user interaction in that a victim must browse to the page containing the vulnerable field. |
2026-03-11 | |
| CVE-2026-21360 | 6.8 | MEDIUM | CWE-22 | 0.2% p45 | 4.77 | Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15, ...Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15, 2.4.4-p16 and earlier are affected by an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability that could result in a security feature bypass. A high-privileged attacker could leverage this vulnerability to access unauthorized files or directories outside the intended restricted path. Exploitation of this issue does not require user interaction. |
2026-03-11 | |
| CVE-2026-21359 | 4.7 | MEDIUM | CWE-863 | 0.1% p22 | 3.29 | Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15, ...Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15, 2.4.4-p16 and earlier are affected by an Incorrect Authorization vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to bypass security measures and have limited impact to the integrity and availability of data. The exploit depends on conditions beyond the attacker's control. Exploitation of this issue does not require user interaction. |
2026-03-11 | |
| CVE-2026-21311 | 8.0 | HIGH | CWE-79 | 0.1% p30 | 5.60 | Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15, ...Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15, 2.4.4-p16 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a high-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. A successful attacker can abuse this to achieve session takeover, increasing the confidentiality, and integrity impact to high. Exploitation of this issue requires user interaction in that a victim must browse to the page containing the vulnerable field. |
2026-03-11 | |
| CVE-2026-21310 | 5.3 | MEDIUM | CWE-20 | 0.5% p64 | 3.72 | Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15, ...Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15, 2.4.4-p16 and earlier are affected by an Improper Input Validation vulnerability that could result in a security feature bypass, with limited impact to integrity. Exploitation of this issue does not require user interaction. |
2026-03-11 | |
| CVE-2026-21309 | 7.5 | HIGH | CWE-863 | 0.1% p34 | 5.25 | Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15, ...Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15, 2.4.4-p16 and earlier are affected by an Incorrect Authorization vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized view access of data. Exploitation of this issue does not require user interaction. |
2026-03-11 | |
| CVE-2026-21297 | 4.3 | MEDIUM | CWE-863 | 0.1% p17 | 3.01 | Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15, ...Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15, 2.4.4-p16 and earlier are affected by an Incorrect Authorization vulnerability that could result in a Security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass security measures and gain limited unauthorized access to a feature. Exploitation of this issue does not require user interaction. |
2026-03-11 | |
| CVE-2026-21296 | 4.3 | MEDIUM | CWE-863 | 0.1% p15 | 3.01 | Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15, ...Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15, 2.4.4-p16 and earlier are affected by an Incorrect Authorization vulnerability that could result in a Security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass security measures and gain limited unauthorized view access of data. Exploitation of this issue does not require user interaction. |
2026-03-11 | |
| CVE-2026-21295 | 3.1 | LOW | CWE-601 | 0.0% p14 | 2.17 | Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15, ...Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15, 2.4.4-p16 and earlier are affected by a URL Redirection to Untrusted Site ('Open Redirect') vulnerability. An attacker could leverage this vulnerability to redirect users to malicious websites. Exploitation of this issue requires user interaction. |
2026-03-11 | |
| CVE-2026-21294 | 5.5 | MEDIUM | CWE-918 | 0.1% p19 | 3.85 | Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15, ...Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15, 2.4.4-p16 and earlier are affected by a Server-Side Request Forgery (SSRF) vulnerability that could result in a Security feature bypass. A high-privileged attacker could exploit this vulnerability to manipulate server-side requests and bypass security controls. Exploitation of this issue does not require user interaction. |
2026-03-11 | |
| CVE-2026-21293 | 5.5 | MEDIUM | CWE-918 | 0.1% p19 | 3.85 | Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15, ...Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15, 2.4.4-p16 and earlier are affected by a Server-Side Request Forgery (SSRF) vulnerability that could result in a Security feature bypass. A high-privileged attacker could exploit this vulnerability to manipulate server-side requests and access unauthorized resources. Exploitation of this issue does not require user interaction. |
2026-03-11 | |
| CVE-2026-21292 | 5.4 | MEDIUM | CWE-79 | 0.0% p10 | 3.78 | Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15, ...Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15, 2.4.4-p16 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker attacker to inject malicious scripts into vulnerable form fields. Exploitation of this issue requires user interaction in that a victim must browse to the page containing the vulnerable field. |
2026-03-11 | |
| CVE-2026-21291 | 4.8 | MEDIUM | CWE-79 | 0.1% p23 | 3.36 | Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15, ...Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15, 2.4.4-p16 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a high-privileged attacker to inject malicious scripts into vulnerable form fields. Exploitation of this issue requires user interaction in that a victim must browse to the page containing the vulnerable field. |
2026-03-11 | |
| CVE-2026-21290 | 8.7 | HIGH | CWE-79 | 0.0% p15 | 6.09 | Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15, ...Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15, 2.4.4-p16 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. A successful attacker can abuse this to achieve session takeover, increasing the confidentiality, and integrity impact to high. Exploitation of this issue requires user interaction in that a victim must browse to the page containing the vulnerable field. |
2026-03-11 | |
| CVE-2026-21289 | 7.5 | HIGH | CWE-863 | 0.1% p34 | 5.25 | Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15, ...Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15, 2.4.4-p16 and earlier are affected by an Incorrect Authorization vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized view access of data. Exploitation of this issue does not require user interaction. |
2026-03-11 | |
| CVE-2026-21286 | 5.3 | MEDIUM | CWE-863 | 0.1% p22 | 3.71 | Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15, ...Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15, 2.4.4-p16 and earlier are affected by an Incorrect Authorization vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to bypass security measures and gain limited unauthorized view access of data. Exploitation of this issue does not require user interaction. |
2026-03-11 | |
| CVE-2026-21285 | 4.3 | MEDIUM | CWE-863 | 0.1% p17 | 3.01 | Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15, ...Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15, 2.4.4-p16 and earlier are affected by an Incorrect Authorization vulnerability that could result in a Security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass security measures and gain limited unauthorized access to a feature. Exploitation of this issue does not require user interaction. |
2026-03-11 | |
| CVE-2026-21284 | 8.1 | HIGH | CWE-79 | 0.1% p29 | 5.67 | Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15, ...Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15, 2.4.4-p16 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a high-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. A successful attacker can abuse this to achieve session takeover, increasing the confidentiality, and integrity impact to high. Exploitation of this issue requires user interaction in that a victim must browse to the page containing the vulnerable field. |
2026-03-11 | |
| CVE-2026-21282 | 5.3 | MEDIUM | CWE-20 | 0.3% p51 | 3.72 | Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15, ...Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15, 2.4.4-p16 and earlier are affected by an Improper Input Validation vulnerability that could lead to application denial-of-service. An attacker could exploit this vulnerability by providing specially crafted input, causing limited impact to application availability. Exploitation of this issue does not require user interaction. |
2026-03-11 | |
| CVE-2026-2324 | 6.1 | MEDIUM | CWE-352 | 0.0% p2 | 4.27 | The LatePoint – Calendar Booking Plugin for Appointments and Events plugin for W...The LatePoint – Calendar Booking Plugin for Appointments and Events plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 5.2.7. This is due to missing or incorrect nonce validation on the reload_preview() function. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. |
2026-03-11 | |
| CVE-2026-1781 | 6.5 | MEDIUM | CWE-862 | 0.1% p22 | 4.55 | The MC4WP: Mailchimp for WordPress plugin for WordPress is vulnerable to Missing...The MC4WP: Mailchimp for WordPress plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 4.11.1. This is due to the plugin trusting the `_mc4wp_action` POST parameter without validation, allowing unauthenticated attackers to force the form to process unsubscribe actions instead of subscribe actions. This makes it possible for unauthenticated attackers to arbitrarily unsubscribe any email address from the connected Mailchimp audience via the `_mc4wp_action` parameter, granted they can obtain the form ID (which is publicly exposed in the HTML source). |
2026-03-11 | |
| CVE-2025-12473 | 6.1 | MEDIUM | CWE-79 | 0.1% p28 | 4.27 | The RTMKit plugin for WordPress is vulnerable to Reflected Cross-Site Scripting ...The RTMKit plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'themebuilder' parameter in all versions up to, and including, 1.6.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a site administrator into performing an action such as clicking on a link. |
2026-03-11 | |
| CVE-2026-27266 | 5.4 | MEDIUM | CWE-79 | 0.0% p10 | 3.78 | Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cr...Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. |
2026-03-11 | |
| CVE-2026-27265 | 5.4 | MEDIUM | CWE-79 | 0.0% p10 | 3.78 | Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cr...Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. |
2026-03-11 | |
| CVE-2026-27264 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: This CVE ID was issued in error by its CVE Numbering Authority.Rejected reason: This CVE ID was issued in error by its CVE Numbering Authority. |
2026-03-11 | |
| CVE-2026-27263 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: This CVE ID was issued in error by its CVE Numbering Authority.Rejected reason: This CVE ID was issued in error by its CVE Numbering Authority. |
2026-03-11 | |
| CVE-2026-27262 | 5.4 | MEDIUM | CWE-79 | 0.0% p10 | 3.78 | Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cr...Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. |
2026-03-11 | |
| CVE-2026-27261 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: This CVE ID was issued in error by its CVE Numbering Authority.Rejected reason: This CVE ID was issued in error by its CVE Numbering Authority. |
2026-03-11 | |
| CVE-2026-27260 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: This CVE ID was issued in error by its CVE Numbering Authority.Rejected reason: This CVE ID was issued in error by its CVE Numbering Authority. |
2026-03-11 | |
| CVE-2026-27259 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: This CVE ID was issued in error by its CVE Numbering Authority.Rejected reason: This CVE ID was issued in error by its CVE Numbering Authority. |
2026-03-11 | |
| CVE-2026-27257 | 5.4 | MEDIUM | CWE-79 | 0.0% p10 | 3.78 | Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cr...Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. |
2026-03-11 | |
| CVE-2026-27256 | 5.4 | MEDIUM | CWE-79 | 0.0% p10 | 3.78 | Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cr...Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. |
2026-03-11 | |
| CVE-2026-27255 | 5.4 | MEDIUM | CWE-79 | 0.0% p10 | 3.78 | Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cr...Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. |
2026-03-11 | |
| CVE-2026-27254 | 5.4 | MEDIUM | CWE-79 | 0.0% p10 | 3.78 | Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cr...Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. |
2026-03-11 | |
| CVE-2026-27253 | 5.4 | MEDIUM | CWE-79 | 0.0% p10 | 3.78 | Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cr...Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. |
2026-03-11 | |
| CVE-2026-27252 | 5.4 | MEDIUM | CWE-79 | 0.0% p10 | 3.78 | Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cr...Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. |
2026-03-11 | |
| CVE-2026-27251 | 5.4 | MEDIUM | CWE-79 | 0.0% p10 | 3.78 | Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cr...Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. |
2026-03-11 | |
| CVE-2026-27250 | 5.4 | MEDIUM | CWE-79 | 0.0% p10 | 3.78 | Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cr...Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. |
2026-03-11 | |
| CVE-2026-27249 | 5.4 | MEDIUM | CWE-79 | 0.0% p10 | 3.78 | Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cr...Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. |
2026-03-11 | |
| CVE-2026-27248 | 5.4 | MEDIUM | CWE-79 | 0.0% p10 | 3.78 | Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cr...Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. |
2026-03-11 | |
| CVE-2026-27247 | 5.4 | MEDIUM | CWE-79 | 0.0% p10 | 3.78 | Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cr...Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. |
2026-03-11 | |
| CVE-2026-27244 | 5.4 | MEDIUM | CWE-79 | 0.0% p10 | 3.78 | Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cr...Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. |
2026-03-11 | |
| CVE-2026-27242 | 5.4 | MEDIUM | CWE-79 | 0.0% p10 | 3.78 | Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cr...Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. |
2026-03-11 | |
| CVE-2026-27241 | 5.4 | MEDIUM | CWE-79 | 0.0% p10 | 3.78 | Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cr...Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. |
2026-03-11 | |
| CVE-2026-27240 | 5.4 | MEDIUM | CWE-79 | 0.0% p10 | 3.78 | Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cr...Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. |
2026-03-11 | |
| CVE-2026-27239 | 5.4 | MEDIUM | CWE-79 | 0.0% p10 | 3.78 | Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cr...Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. |
2026-03-11 | |
| CVE-2026-27237 | 5.4 | MEDIUM | CWE-79 | 0.0% p10 | 3.78 | Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cr...Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. |
2026-03-11 | |
| CVE-2026-27236 | 5.4 | MEDIUM | CWE-79 | 0.0% p10 | 3.78 | Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cr...Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. |
2026-03-11 | |
| CVE-2026-27235 | 5.4 | MEDIUM | CWE-79 | 0.0% p10 | 3.78 | Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cr...Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. |
2026-03-11 | |
| CVE-2026-27234 | 5.4 | MEDIUM | CWE-79 | 0.0% p10 | 3.78 | Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cr...Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. |
2026-03-11 | |
| CVE-2026-27233 | 5.4 | MEDIUM | CWE-79 | 0.0% p10 | 3.78 | Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cr...Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. |
2026-03-11 | |
| CVE-2026-27232 | 5.4 | MEDIUM | CWE-79 | 0.0% p10 | 3.78 | Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cr...Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. |
2026-03-11 | |
| CVE-2026-27231 | 5.4 | MEDIUM | CWE-79 | 0.0% p10 | 3.78 | Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cr...Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. |
2026-03-11 | |
| CVE-2026-27230 | 5.4 | MEDIUM | CWE-79 | 0.0% p10 | 3.78 | Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cr...Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. |
2026-03-11 | |
| CVE-2026-27229 | 5.4 | MEDIUM | CWE-79 | 0.0% p10 | 3.78 | Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cr...Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. |
2026-03-11 | |
| CVE-2026-27228 | 5.4 | MEDIUM | CWE-79 | 0.0% p10 | 3.78 | Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cr...Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. |
2026-03-11 | |
| CVE-2026-27226 | 5.4 | MEDIUM | CWE-79 | 0.0% p10 | 3.78 | Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cr...Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. |
2026-03-11 | |
| CVE-2026-27225 | 5.4 | MEDIUM | CWE-79 | 0.0% p10 | 3.78 | Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cr...Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. |
2026-03-11 | |
| CVE-2026-27224 | 5.4 | MEDIUM | CWE-79 | 0.0% p10 | 3.78 | Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cr...Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. |
2026-03-11 | |
| CVE-2026-27223 | 5.4 | MEDIUM | CWE-79 | 0.0% p10 | 3.78 | Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cr...Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. |
2026-03-11 | |
| CVE-2026-2569 | 6.4 | MEDIUM | CWE-79 | 0.0% p10 | 4.48 | The Dear Flipbook – PDF Flipbook, 3D Flipbook, PDF embed, PDF viewer plugin for ...The Dear Flipbook – PDF Flipbook, 3D Flipbook, PDF embed, PDF viewer plugin for WordPress is vulnerable to Stored Cross-Site Scripting via PDF page labels in all versions up to, and including, 2.4.20 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-03-11 | |
| CVE-2026-27272 | 7.8 | HIGH | CWE-787 | 0.0% p10 | 5.46 | Illustrator versions 29.8.4, 30.1 and earlier are affected by an out-of-bounds w...Illustrator versions 29.8.4, 30.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
2026-03-10 | |
| CVE-2026-27271 | 7.8 | HIGH | CWE-122 | 0.0% p8 | 5.46 | Illustrator versions 29.8.4, 30.1 and earlier are affected by a Heap-based Buffe...Illustrator versions 29.8.4, 30.1 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
2026-03-10 | |
| CVE-2026-27270 | 5.5 | MEDIUM | CWE-125 | 0.0% p6 | 3.85 | Illustrator versions 29.8.4, 30.1 and earlier are affected by an Out-of-bounds R...Illustrator versions 29.8.4, 30.1 and earlier are affected by an Out-of-bounds Read vulnerability that could lead to memory exposure. An attacker could leverage this vulnerability to access sensitive information stored in memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
2026-03-10 | |
| CVE-2026-27268 | 5.5 | MEDIUM | CWE-125 | 0.0% p6 | 3.85 | Illustrator versions 29.8.4, 30.1 and earlier are affected by an Out-of-bounds R...Illustrator versions 29.8.4, 30.1 and earlier are affected by an Out-of-bounds Read vulnerability that could lead to memory exposure. An attacker could leverage this vulnerability to access sensitive information stored in memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
2026-03-10 | |
| CVE-2026-27267 | 7.8 | HIGH | CWE-121 | 0.0% p8 | 5.46 | Illustrator versions 29.8.4, 30.1 and earlier are affected by a Stack-based Buff...Illustrator versions 29.8.4, 30.1 and earlier are affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
2026-03-10 | |
| CVE-2026-21362 | 7.8 | HIGH | CWE-787 | 0.0% p10 | 5.46 | Illustrator versions 29.8.4, 30.1 and earlier are affected by an out-of-bounds w...Illustrator versions 29.8.4, 30.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
2026-03-10 | |
| CVE-2026-21333 | 8.6 | HIGH | CWE-426 | 0.0% p8 | 6.02 | Illustrator versions 29.8.4, 30.1 and earlier are affected by an Untrusted Searc...Illustrator versions 29.8.4, 30.1 and earlier are affected by an Untrusted Search Path vulnerability that might allow attackers to execute arbitrary code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
2026-03-10 | |
| CVE-2025-22850 | 5.6 | MEDIUM | CWE-367 | 0.0% p4 | 3.92 | Time-of-check time-of-use race condition in the UEFI PdaSmm module for some Inte...Time-of-check time-of-use race condition in the UEFI PdaSmm module for some Intel(R) reference platforms may allow an information disclosure. System software adversary with a privileged user combined with a high complexity attack may enable data exposure. This result may potentially occur via local access when attack requirements are not present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (high), integrity (none) and availability (none) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts. |
2026-03-10 | |
| CVE-2025-22444 | 5.6 | MEDIUM | CWE-668 | 0.0% p4 | 3.92 | Exposure of resource to wrong sphere in the UEFI PdaSmm module for some Intel(R)...Exposure of resource to wrong sphere in the UEFI PdaSmm module for some Intel(R) reference platforms may allow an information disclosure. System software adversary with a privileged user combined with a high complexity attack may enable data exposure. This result may potentially occur via local access when attack requirements are not present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (high), integrity (none) and availability (none) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts. |
2026-03-10 | |
| CVE-2025-20105 | 8.7 | HIGH | CWE-20 | 0.0% p11 | 6.09 | Improper input validation in some UEFI firmware SMM module for the Intel(R) refe...Improper input validation in some UEFI firmware SMM module for the Intel(R) reference platforms may allow an escalation of privilege. System software adversary with a privileged user combined with a low complexity attack may enable local code execution. This result may potentially occur via local access when attack requirements are present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (high), integrity (high) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (high), integrity (high) and availability (high) impacts. |
2026-03-10 | |
| CVE-2025-20096 | 5.9 | MEDIUM | CWE-20 | 0.0% p1 | 4.13 | Improper input validation in the UEFI firmware for some Intel Reference Platform...Improper input validation in the UEFI firmware for some Intel Reference Platforms may allow an escalation of privilege. System software adversary with a privileged user combined with a high complexity attack may enable data manipulation. This result may potentially occur via local access when attack requirements are present without special internal knowledge and requires active user interaction. The potential vulnerability may impact the confidentiality (none), integrity (high) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (high) and availability (high) impacts. |
2026-03-10 | |
| CVE-2025-20073 | 1.8 | LOW | CWE-119 | 0.0% p4 | 1.26 | Improper buffer restrictions in the UEFI DXE module for some Intel(R) Reference ...Improper buffer restrictions in the UEFI DXE module for some Intel(R) Reference Platforms within UEFI may allow an information disclosure. System software adversary with a privileged user combined with a high complexity attack may enable data exposure. This result may potentially occur via local access when attack requirements are not present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (low), integrity (none) and availability (none) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts. |
2026-03-10 | |
| CVE-2025-20068 | 7.1 | HIGH | CWE-20 | 0.0% p9 | 4.97 | Improper input validation in the UEFI ImcErrorHandler module for some Intel(R) r...Improper input validation in the UEFI ImcErrorHandler module for some Intel(R) reference platforms may allow an escalation of privilege. System software adversary with a privileged user combined with a high complexity attack may enable escalation of privilege. This result may potentially occur via local access when attack requirements are present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (high), integrity (high) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts. |
2026-03-10 | |
| CVE-2025-20064 | 8.7 | HIGH | CWE-20 | 0.0% p6 | 6.09 | Improper input validation in the UEFI FlashUcAcmSmm module for some Intel(R) ref...Improper input validation in the UEFI FlashUcAcmSmm module for some Intel(R) reference platforms may allow an escalation of privilege. System software adversary with a privileged user combined with a high complexity attack may enable local code execution. This result may potentially occur via local access when attack requirements are not present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (high), integrity (high) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (high), integrity (high) and availability (high) impacts. |
2026-03-10 | |
| CVE-2025-20028 | 7.1 | HIGH | CWE-367 | 0.0% p4 | 4.97 | Time-of-check time-of-use race condition in the WheaERST SMM module for some Int...Time-of-check time-of-use race condition in the WheaERST SMM module for some Intel(R) reference platforms may allow an escalation of privilege. System software adversary with a privileged user combined with a high complexity attack may enable escalation of privilege. This result may potentially occur via local access when attack requirements are present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (high), integrity (high) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts. |
2026-03-10 | |
| CVE-2025-20027 | 7.1 | HIGH | CWE-20 | 0.0% p9 | 4.97 | Improper input validation in the UEFI WheaERST module for some Intel(R) referenc...Improper input validation in the UEFI WheaERST module for some Intel(R) reference platforms may allow an escalation of privilege. System software adversary with a privileged user combined with a high complexity attack may enable escalation of privilege. This result may potentially occur via local access when attack requirements are present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (high), integrity (high) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts. |
2026-03-10 | |
| CVE-2025-20005 | 5.6 | MEDIUM | CWE-119 | 0.0% p4 | 3.92 | Improper buffer restrictions in some UEFI firmware for some Intel(R) reference p...Improper buffer restrictions in some UEFI firmware for some Intel(R) reference platforms may allow an escalation of privilege. System software adversary with a privileged user combined with a high complexity attack may enable data manipulation. This result may potentially occur via local access when attack requirements are not present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (none), integrity (high) and availability (low) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts. |
2026-03-10 | |
| CVE-2026-31838 | 6.9 | MEDIUM | CWE-863 | 0.0% p10 | 4.83 | Istio is an open platform to connect, manage, and secure microservices. Prior to...Istio is an open platform to connect, manage, and secure microservices. Prior to 1.29.1, 1.28.5, and 1.27.8, a vulnerability in Envoy RBAC header matching could allow authorization policy bypass when policies rely on HTTP headers that may contain multiple values. An attacker could craft requests with multiple header values in a way that causes Envoy to evaluate the header differently than intended, potentially bypassing authorization checks. This may allow unauthorized requests to reach protected services when policies depend on such header-based matching conditions. This vulnerability is fixed in 1.29.1, 1.28.5, and 1.27.8. |
2026-03-10 | |
| CVE-2026-31837 | 8.7 | HIGH | CWE-200 | 0.1% p17 | 6.09 | Istio is an open platform to connect, manage, and secure microservices. Prior to...Istio is an open platform to connect, manage, and secure microservices. Prior to 1.29.1, 1.28.5, and 1.27.8, a user of Istio is impacted if the JWKS resolver becomes unavailable or the fetch fails, exposing hardcoded defaults regardless of use of the RequestAuthentication resource. This vulnerability is fixed in 1.29.1, 1.28.5, and 1.27.8. |
2026-03-10 | |
| CVE-2026-31834 | 7.2 | HIGH | CWE-269 | 0.1% p17 | 5.04 | Umbraco is an ASP.NET CMS. From 15.3.1 to before 16.5.1 and 17.2.2, A privilege ...Umbraco is an ASP.NET CMS. From 15.3.1 to before 16.5.1 and 17.2.2, A privilege escalation vulnerability has been identified in Umbraco CMS. Under certain conditions, authenticated backoffice users with permission to manage users, may be able to elevate their privileges due to insufficient authorization enforcement when modifying user group memberships. The affected functionality does not properly validate whether a user has sufficient privileges to assign highly privileged roles. This vulnerability is fixed in 16.5.1 and 17.2.2. |
2026-03-10 | |
| CVE-2026-31833 | 6.7 | MEDIUM | CWE-79 | 0.1% p19 | 4.69 | Umbraco is an ASP.NET CMS. From 16.2.0 to before 16.5.1 and 17.2.2, An authentic...Umbraco is an ASP.NET CMS. From 16.2.0 to before 16.5.1 and 17.2.2, An authenticated backoffice user with access to Settings can inject malicious HTML into property type descriptions. Due to an overly permissive attributeNameCheck configuration (/.+/) in the UFM DOMPurify instance, event handler attributes such as onclick and onload, when used within Umbraco web components (umb-*, uui-*, ufm-*) were not filtered. This vulnerability is fixed in 16.5.1 and 17.2.2. |
2026-03-10 | |
| CVE-2026-31832 | 5.4 | MEDIUM | CWE-639 | 0.0% p14 | 3.78 | Umbraco is an ASP.NET CMS. From 14.0.0 to before 16.5.1 and 17.2.2, A broken obj...Umbraco is an ASP.NET CMS. From 14.0.0 to before 16.5.1 and 17.2.2, A broken object-level authorization vulnerability exists in a backoffice API endpoint that allows authenticated users to assign domain-related data to content nodes without proper authorization checks. The issue is caused by insufficient authorization enforcement on the affected API endpoint, whereby via an API call, domains can be set on content nodes that the editor does not have permission to access (either via user group privileges or start nodes). This vulnerability is fixed in 16.5.1 and 17.2.2. |
2026-03-10 | |
| CVE-2026-31830 | 7.5 | HIGH | CWE-252 | 0.0% p13 | 5.25 | sigstore-ruby is a pure Ruby implementation of the sigstore verify command from ...sigstore-ruby is a pure Ruby implementation of the sigstore verify command from the sigstore/cosign project. Prior to 0.2.3, Sigstore::Verifier#verify does not propagate the VerificationFailure returned by verify_in_toto when the artifact digest does not match the digest in the in-toto attestation subject. As a result, verification of DSSE bundles containing in-toto statements returns VerificationSuccess regardless of whether the artifact matches the attested subject. This vulnerability is fixed in 0.2.3. |
2026-03-10 | |
| CVE-2026-31829 | 7.1 | HIGH | CWE-918 | 0.1% p17 | 4.97 | Flowise is a drag & drop user interface to build a customized large language mod...Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.0.13, Flowise exposes an HTTP Node in AgentFlow and Chatflow that performs server-side HTTP requests using user-controlled URLs. By default, there are no restrictions on target hosts, including private/internal IP ranges (RFC 1918), localhost, or cloud metadata endpoints. This enables Server-Side Request Forgery (SSRF), allowing any user interacting with a publicly exposed chatflow to force the Flowise server to make requests to internal network resources that are inaccessible from the public internet. This vulnerability is fixed in 3.0.13. |
2026-03-10 | |
| CVE-2026-31828 | 6.0 | MEDIUM | CWE-90 | 0.1% p34 | 4.20 | Parse Server is an open source backend that can be deployed to any infrastructur...Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.5.2-alpha.13 and 8.6.26, the LDAP authentication adapter is vulnerable to LDAP injection. User-supplied input (authData.id) is interpolated directly into LDAP Distinguished Names (DN) and group search filters without escaping special characters. This allows an attacker with valid LDAP credentials to manipulate the bind DN structure and to bypass group membership checks. This enables privilege escalation from any authenticated LDAP user to a member of any restricted group. The vulnerability affects Parse Server deployments that use the LDAP authentication adapter with group-based access control. This vulnerability is fixed in 9.5.2-alpha.13 and 8.6.26. |
2026-03-10 | |
| CVE-2026-31827 | 7.1 | HIGH | CWE-362 | 0.0% p14 | 4.97 | Alienbin is an anonymous code and text sharing web service. In 1.0.0 and earlier...Alienbin is an anonymous code and text sharing web service. In 1.0.0 and earlier, the /save endpoint in server.js drops and recreates the MongoDB TTL index on the entire post collection for every new paste submission. When User B submits a paste with a short TTL (e.g., 30 seconds), the TTL index is recreated with expireAfterSeconds: 30 for all documents in the collection. This causes User A's paste (originally set to 7 days) to be deleted after 30 seconds. An attacker can intentionally delete all existing pastes by repeatedly submitting pastes with ttlOption=30s. |
2026-03-10 | |
| CVE-2026-31826 | 6.8 | MEDIUM | CWE-770 | 0.0% p2 | 4.76 | pypdf is a free and open-source pure-python PDF library. Prior to 6.8.0, an atta...pypdf is a free and open-source pure-python PDF library. Prior to 6.8.0, an attacker who uses this vulnerability can craft a PDF which leads to large memory usage. This requires parsing a content stream with a rather large /Length value, regardless of the actual data length inside the stream. This vulnerability is fixed in 6.8.0. |
2026-03-10 | |
| CVE-2026-31825 | 5.3 | MEDIUM | CWE-89 | 0.0% p13 | 3.71 | Sylius is an Open Source eCommerce Framework on Symfony. Sylius API filters Prod...Sylius is an Open Source eCommerce Framework on Symfony. Sylius API filters ProductPriceOrderFilter and TranslationOrderNameAndLocaleFilter pass user-supplied order direction values directly to Doctrine's orderBy() without validation. An attacker can inject arbitrary DQL. The issue is fixed in versions: 1.9.12, 1.10.16, 1.11.17, 1.12.23, 1.13.15, 1.14.18, 2.0.16, 2.1.12, 2.2.3 and above. |
2026-03-10 | |
| CVE-2026-31824 | 8.2 | HIGH | CWE-362 | 0.1% p18 | 5.74 | Sylius is an Open Source eCommerce Framework on Symfony. A Time-of-Check To Time...Sylius is an Open Source eCommerce Framework on Symfony. A Time-of-Check To Time-of-Use (TOCTOU) race condition was discovered in the promotion usage limit enforcement. The same class of vulnerability affects the promotion usage limit (the global used counter on Promotion entities), coupon usage limit (the global used counter on PromotionCoupon entities), and coupon per-customer usage limit (the per-customer redemption count on PromotionCoupon entities). In all three cases, the eligibility check reads the used counter (or order count) from an in-memory Doctrine entity during validation, while the actual usage increment in OrderPromotionsUsageModifier happens later during order completion — with no database-level locking or atomic operations between the two phases. Because Doctrine flushes an absolute value (SET used = 1) rather than an atomic increment (SET used = used + 1), and because the affected entities lack optimistic locking, concurrent requests all read the same stale usage counts and pass the eligibility checks simultaneously. An attacker can exploit this by preparing multiple carts with the same limited-use promotion or coupon and firing simultaneous PATCH /api/v2/shop/orders/{token}/complete requests. All requests pass the usage limit checks and complete successfully, allowing a single-use promotion or coupon to be redeemed an arbitrary number of times. The per-customer limit can be bypassed in the same way by a single customer completing multiple orders concurrently. No authentication is required to exploit this vulnerability. This may lead to direct financial loss through unlimited redemption of limited-use promotions and discount coupons. The issue is fixed in versions: 1.9.12, 1.10.16, 1.11.17, 1.12.23, 1.13.15, 1.14.18, 2.0.16, 2.1.12, 2.2.3 and above. |
2026-03-10 | |
| CVE-2026-31823 | 4.8 | MEDIUM | CWE-79 | 0.0% p11 | 3.36 | Sylius is an Open Source eCommerce Framework on Symfony. An authenticated stored...Sylius is an Open Source eCommerce Framework on Symfony. An authenticated stored cross-site scripting (XSS) vulnerability exists in multiple places across the shop frontend and admin panel due to unsanitized entity names being rendered as raw HTML. Shop breadcrumbs (shared/breadcrumbs.html.twig): The breadcrumbs macro uses the Twig |raw filter on label values. Since taxon names, product names, and ancestor names flow directly into these labels, a malicious taxon name like <img src=x onerror=alert('XSS')> is rendered and executed as JavaScript on the storefront. Admin product taxon picker (ProductTaxonTreeController.js): The rowRenderer method interpolates ${name} directly into a template literal building HTML, allowing script injection through taxon names in the admin panel. Admin autocomplete fields (Tom Select): Dropdown items and options render entity names as raw HTML without escaping, allowing XSS through any autocomplete field displaying entity names. An authenticated administrator can inject arbitrary HTML or JavaScript via entity names (e.g. taxon name) that is persistently rendered for all users. The issue is fixed in versions: 1.9.12, 1.10.16, 1.11.17, 1.12.23, 1.13.15, 1.14.18, 2.0.16, 2.1.12, 2.2.3 and above. |
2026-03-10 | |
| CVE-2026-31822 | 5.3 | MEDIUM | CWE-79 | 0.0% p14 | 3.71 | Sylius is an Open Source eCommerce Framework on Symfony. A cross-site scripting ...Sylius is an Open Source eCommerce Framework on Symfony. A cross-site scripting (XSS) vulnerability exists in the shop checkout login form handled by the ApiLoginController Stimulus controller. When a login attempt fails, AuthenticationFailureHandler returns a JSON response whose message field is rendered into the DOM using innerHTML, allowing any HTML or JavaScript in that value to be parsed and executed by the browser. The issue is fixed in versions: 2.0.16, 2.1.12, 2.2.3 and above. |
2026-03-10 | |
| CVE-2026-31821 | 6.9 | MEDIUM | CWE-862 | 0.1% p29 | 4.83 | Sylius is an Open Source eCommerce Framework on Symfony. The POST /api/v2/shop/o...Sylius is an Open Source eCommerce Framework on Symfony. The POST /api/v2/shop/orders/{tokenValue}/items endpoint does not verify cart ownership. An unauthenticated attacker can add items to other registered customers' carts by knowing the cart tokenValue. An attacker who obtains a cart tokenValue can add arbitrary items to another customer's cart. The endpoint returns the full cart representation in the response (HTTP 201). The issue is fixed in versions: 2.0.16, 2.1.12, 2.2.3 and above. |
2026-03-10 | |
| CVE-2026-31820 | 7.1 | HIGH | CWE-639 | 0.0% p4 | 4.97 | Sylius is an Open Source eCommerce Framework on Symfony. An authenticated Insecu...Sylius is an Open Source eCommerce Framework on Symfony. An authenticated Insecure Direct Object Reference (IDOR) vulnerability exists in multiple shop LiveComponents due to unvalidated resource IDs accepted via #[LiveArg] parameters. Unlike props, which are protected by LiveComponent's @checksum, args are fully user-controlled - any action that accepts a resource ID via #[LiveArg] and loads it with ->find() without ownership validation is vulnerable. Checkout address FormComponent (addressFieldUpdated action): Accepts an addressId via #[LiveArg] and loads it without verifying ownership, exposing another user's first name, last name, company, phone number, street, city, postcode, and country. Cart WidgetComponent (refreshCart action): Accepts a cartId via #[LiveArg] and loads any order directly from the repository, exposing order total and item count. Cart SummaryComponent (refreshCart action): Accepts a cartId via #[LiveArg] and loads any order directly from the repository, exposing subtotal, discount, shipping cost, taxes (excluded and included), and order total. Since sylius_order contains both active carts (state=cart) and completed orders (state=new/fulfilled) in the same ID space, the cart IDOR exposes data from all orders, not just active carts. The issue is fixed in versions: 2.0.16, 2.1.12, 2.2.3 and above. |
2026-03-10 | |
| CVE-2026-31819 | 6.9 | MEDIUM | CWE-601 | 0.1% p15 | 4.83 | Sylius is an Open Source eCommerce Framework on Symfony. CurrencySwitchControlle...Sylius is an Open Source eCommerce Framework on Symfony. CurrencySwitchController::switchAction(), ImpersonateUserController::impersonateAction() and StorageBasedLocaleSwitcher::handle() use the HTTP Referer header directly when redirecting. The attack requires the victim to click a legitimate application link placed on an attacker-controlled page. The browser automatically sends the attacker's site as the Referer, and the application redirects back to it. This can be used for phishing or credential theft, as the redirect originates from a trusted domain. The severity varies by endpoint; public endpoints require no authentication and are trivially exploitable, while admin-only endpoints require an authenticated session but remain vulnerable if an admin follows a link from an external source such as email or chat. The issue is fixed in versions: 1.9.12, 1.10.16, 1.11.17, 1.12.23, 1.13.15, 1.14.18, 2.0.16, 2.1.12, 2.2.3 and above. |
2026-03-10 | |
| CVE-2026-31817 | 8.5 | HIGH | CWE-22 | 0.3% p52 | 5.96 | OliveTin gives access to predefined shell commands from a web interface. Prior t...OliveTin gives access to predefined shell commands from a web interface. Prior to 3000.11.2, when the saveLogs feature is enabled, OliveTin persists execution log entries to disk. The filename used for these log files is constructed in part from the user-supplied UniqueTrackingId field in the StartAction API request. This value is not validated or sanitized before being used in a file path, allowing an attacker to use directory traversal sequences (e.g., ../../../) to write files to arbitrary locations on the filesystem. This vulnerability is fixed in 3000.11.2. |
2026-03-10 | |
| CVE-2026-31815 | 5.3 | MEDIUM | CWE-284 | 0.1% p22 | 3.71 | Unicorn adds modern reactive component functionality to your Django templates. P...Unicorn adds modern reactive component functionality to your Django templates. Prior to 0.67.0, component state manipulation is possible in django-unicorn due to missing access control checks during property updates and method calls. An attacker can bypass the intended _is_public protection to modify internal attributes such as template_name or trigger protected methods. This vulnerability is fixed in 0.67.0. |
2026-03-10 | |
| CVE-2026-31812 | 8.7 | HIGH | CWE-248 | 0.2% p39 | 6.10 | Quinn is a pure-Rust, async-compatible implementation of the IETF QUIC transport...Quinn is a pure-Rust, async-compatible implementation of the IETF QUIC transport protocol. Prior to 0.11.14, a remote, unauthenticated attacker can trigger a denial of service in applications using vulnerable quinn versions by sending a crafted QUIC Initial packet containing malformed quic_transport_parameters. In quinn-proto parsing logic, attacker-controlled varints are decoded with unwrap(), so truncated encodings cause Err(UnexpectedEnd) and panic. This is reachable over the network with a single packet and no prior trust or authentication. This vulnerability is fixed in 0.11.14. |
2026-03-10 | |
| CVE-2026-27278 | 7.8 | HIGH | CWE-416 | 0.0% p11 | 5.46 | Acrobat Reader versions 24.001.30307, 24.001.30308, 25.001.21265 and earlier are...Acrobat Reader versions 24.001.30307, 24.001.30308, 25.001.21265 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
2026-03-10 | |
| CVE-2026-27221 | 5.5 | MEDIUM | CWE-295 | 0.0% p7 | 3.85 | Acrobat Reader versions 24.001.30307, 24.001.30308, 25.001.21265 and earlier are...Acrobat Reader versions 24.001.30307, 24.001.30308, 25.001.21265 and earlier are affected by an Improper Certificate Validation vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to spoof the identity of a signer. Exploitation of this issue requires user interaction. |
2026-03-10 | |
| CVE-2026-27220 | 7.8 | HIGH | CWE-416 | 0.0% p11 | 5.46 | Acrobat Reader versions 24.001.30307, 24.001.30308, 25.001.21265 and earlier are...Acrobat Reader versions 24.001.30307, 24.001.30308, 25.001.21265 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
2026-03-10 | |
| CVE-2026-31809 | 6.4 | MEDIUM | CWE-79 | 0.8% p74 | 4.50 | SiYuan is a personal knowledge management system. Prior to 3.5.10, SiYuan's SVG ...SiYuan is a personal knowledge management system. Prior to 3.5.10, SiYuan's SVG sanitizer (SanitizeSVG) checks href attributes for the javascript: prefix using strings.HasPrefix(). However, inserting ASCII tab (	), newline ( ), or carriage return ( ) characters inside the javascript: string bypasses this prefix check. Browsers strip these characters per the WHATWG URL specification before parsing the URL scheme, so the JavaScript still executes. This allows an attacker to inject executable JavaScript into the unauthenticated /api/icon/getDynamicIcon endpoint, creating a reflected XSS. This is a second bypass of the fix for CVE-2026-29183 (fixed in v3.5.9). This vulnerability is fixed in 3.5.10. |
2026-03-10 | |
| CVE-2026-31808 | 5.3 | MEDIUM | CWE-835 | 0.0% p8 | 3.71 | file-type detects the file type of a file, stream, or data. Prior to 21.3.1, a d...file-type detects the file type of a file, stream, or data. Prior to 21.3.1, a denial of service vulnerability exists in the ASF (WMV/WMA) file type detection parser. When parsing a crafted input where an ASF sub-header has a size field of zero, the parser enters an infinite loop. The payload value becomes negative (-24), causing tokenizer.ignore(payload) to move the read position backwards, so the same sub-header is read repeatedly forever. Any application that uses file-type to detect the type of untrusted/attacker-controlled input is affected. An attacker can stall the Node.js event loop with a 55-byte payload. Fixed in version 21.3.1. |
2026-03-10 | |
| CVE-2026-31807 | 6.4 | MEDIUM | CWE-79 | 0.7% p71 | 4.50 | SiYuan is a personal knowledge management system. Prior to 3.5.10, SiYuan's SVG ...SiYuan is a personal knowledge management system. Prior to 3.5.10, SiYuan's SVG sanitizer (SanitizeSVG) blocks dangerous elements (<script>, <iframe>, <foreignobject>) and removes on* event handlers and javascript: in href attributes. However, it does NOT block SVG animation elements (<animate>, <set>) which can dynamically set attributes to dangerous values at runtime, bypassing the static sanitization. This allows an attacker to inject executable JavaScript into the unauthenticated /api/icon/getDynamicIcon endpoint (type=8), creating a reflected XSS. This is a bypass of the fix for CVE-2026-29183 (fixed in v3.5.9). This vulnerability is fixed in v3.5.10. |
2026-03-10 | |
| CVE-2026-31801 | 7.7 | HIGH | CWE-863 | 0.0% p11 | 5.39 | zot is ancontainer image/artifact registry based on the Open Container Initiativ...zot is ancontainer image/artifact registry based on the Open Container Initiative Distribution Specification. From 1.3.0 to 2.1.14, zot’s dist-spec authorization middleware infers the required action for PUT /v2/{name}/manifests/{reference} as create by default, and only switches to update when the tag already exists and reference != "latest". As a result, when latest already exists, a user who is allowed to create (but not allowed to update) can still pass the authorization check for an overwrite attempt of latest. This vulnerability is fixed in 2.1.15. |
2026-03-10 | |
| CVE-2026-31800 | 8.8 | HIGH | CWE-862 | 0.1% p27 | 6.16 | Parse Server is an open source backend that can be deployed to any infrastructur...Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.5.2-alpha.12 and 8.6.25, the _GraphQLConfig and _Audience internal classes can be read, modified, and deleted via the generic /classes/_GraphQLConfig and /classes/_Audience REST API routes without master key authentication. This bypasses the master key enforcement that exists on the dedicated /graphql-config and /push_audiences endpoints. An attacker can read, modify and delete GraphQL configuration and push audience data. This vulnerability is fixed in 9.5.2-alpha.12 and 8.6.25. |
2026-03-10 | |
| CVE-2026-30972 | 6.9 | MEDIUM | CWE-799 | 0.1% p18 | 4.83 | Parse Server is an open source backend that can be deployed to any infrastructur...Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior o 9.5.2-alpha.10 and 8.6.23, Parse Server's rate limiting middleware is applied at the Express middleware layer, but the batch request endpoint (/batch) processes sub-requests internally by routing them directly through the Promise router, bypassing Express middleware including rate limiting. An attacker can bundle multiple requests targeting a rate-limited endpoint into a single batch request to circumvent the configured rate limit. Any Parse Server deployment that relies on the built-in rate limiting feature is affected. This vulnerability is fixed in 9.5.2-alpha.10 and 8.6.23. |
2026-03-10 | |
| CVE-2026-30967 | 7.6 | HIGH | CWE-287 | 0.1% p29 | 5.32 | Parse Server is an open source backend that can be deployed to any infrastructur...Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.5.2-alpha.9. and 8.6.22, the OAuth2 authentication adapter, when configured without the useridField option, only verifies that a token is active via the provider's token introspection endpoint, but does not verify that the token belongs to the user identified by authData.id. An attacker with any valid OAuth2 token from the same provider can authenticate as any other user. This affects any Parse Server deployment that uses the generic OAuth2 authentication adapter (configured with oauth2: true) without setting the useridField option. This vulnerability is fixed in 9.5.2-alpha.9. and 8.6.22. |
2026-03-10 | |
| CVE-2026-30966 | 10.0 | CRITICAL | CWE-284 | 0.1% p19 | 7.00 | Parse Server is an open source backend that can be deployed to any infrastructur...Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.5.2-alpha.7 and 8.6.20, Parse Server's internal tables, which store Relation field mappings such as role memberships, can be directly accessed via the REST API or GraphQL API by any client using only the application key. No master key is required. An attacker can create, read, update, or delete records in any internal relationship table. Exploiting this allows the attacker to inject themselves into any Parse Role, gaining all permissions associated with that role, including full read, write, and delete access to classes protected by role-based Class-Level Permissions (CLP). Similarly, writing to any such table that backs a Relation field used in a pointerFields CLP bypasses that access control. This vulnerability is fixed in 9.5.2-alpha.7 and 8.6.20. |
2026-03-10 | |
| CVE-2026-30965 | 9.9 | CRITICAL | CWE-863 | 0.1% p24 | 6.93 | Parse Server is an open source backend that can be deployed to any infrastructur...Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.5.2-alpha.8 and 8.6.21, a vulnerability in Parse Server's query handling allows an authenticated or unauthenticated attacker to exfiltrate session tokens of other users by exploiting the redirectClassNameForKey query parameter. Exfiltrated session tokens can be used to take over user accounts. The vulnerability requires the attacker to be able to create or update an object with a new relation field, which depends on the Class-Level Permissions of at least one class. This vulnerability is fixed in 9.5.2-alpha.8 and 8.6.21. |
2026-03-10 | |
| CVE-2026-30962 | 7.1 | HIGH | CWE-284 | 0.0% p11 | 4.97 | Parse Server is an open source backend that can be deployed to any infrastructur...Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.5.2-alpha.6 and 8.6.19, the validation for protected fields only checks top-level query keys. By wrapping a query constraint on a protected field inside a logical operator, the check is bypassed entirely. This allows any authenticated user to query on protected fields to extract field values. All Parse Server deployments have default protected fields and are vulnerable. This vulnerability is fixed in 9.5.2-alpha.6 and 8.6.19. |
2026-03-10 | |
| CVE-2026-30954 | 5.3 | MEDIUM | CWE-639 | 0.0% p12 | 3.71 | LinkAce is a self-hosted archive to collect website links. In 2.1.0 and earlier,...LinkAce is a self-hosted archive to collect website links. In 2.1.0 and earlier, the processTaxonomy() method in LinkRepository.php allows authenticated users to attach other users' private tags and lists to their own links by passing integer IDs. |
2026-03-10 | |
| CVE-2026-30953 | 7.7 | HIGH | CWE-918 | 0.0% p12 | 5.39 | LinkAce is a self-hosted archive to collect website links. When a user creates a...LinkAce is a self-hosted archive to collect website links. When a user creates a link via POST /links, the server fetches HTML metadata from the provided URL (LinkRepository::create() calls HtmlMeta::getFromUrl()). The LinkStoreRequest validation rules do not include NoPrivateIpRule, allowing server-side requests to internal network addresses, Docker service hostnames, and cloud metadata endpoints. The project already has a NoPrivateIpRule class (app/Rules/NoPrivateIpRule.php) but it is only applied in FetchController.php (line 99), not in the primary link creation path. |
2026-03-10 | |
| CVE-2026-30952 | 8.7 | HIGH | CWE-22 | 0.0% p5 | 6.09 | liquidjs is a Shopify / GitHub Pages compatible template engine in pure JavaScri...liquidjs is a Shopify / GitHub Pages compatible template engine in pure JavaScript. Prior to 10.25.0, the layout, render, and include tags allow arbitrary file access via absolute paths (either as string literals or through Liquid variables, the latter require dynamicPartials: true, which is the default). This poses a security risk when malicious users are allowed to control the template content or specify the filepath to be included as a Liquid variable. This vulnerability is fixed in 10.25.0. |
2026-03-10 | |
| CVE-2026-30951 | 7.5 | HIGH | CWE-89 | 0.0% p14 | 5.25 | Sequelize is a Node.js ORM tool. Prior to 6.37.8, there is SQL injection via une...Sequelize is a Node.js ORM tool. Prior to 6.37.8, there is SQL injection via unescaped cast type in JSON/JSONB where clause processing. The _traverseJSON() function splits JSON path keys on :: to extract a cast type, which is interpolated raw into CAST(... AS <type>) SQL. An attacker who controls JSON object keys can inject arbitrary SQL and exfiltrate data from any table. This vulnerability is fixed in 6.37.8. |
2026-03-10 | |
| CVE-2026-30949 | 7.6 | HIGH | CWE-287 | 0.0% p11 | 5.32 | Parse Server is an open source backend that can be deployed to any infrastructur...Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.5.2-alpha.5 and 8.6.18, the Keycloak authentication adapter does not validate the azp (authorized party) claim of Keycloak access tokens against the configured client-id. A valid access token issued by the same Keycloak realm for a different client application can be used to authenticate as any user on the Parse Server that uses the Keycloak adapter. This enables cross-application account takeover in multi-client Keycloak realms. All Parse Server deployments that use the Keycloak authentication adapter with a Keycloak realm that has multiple client applications are affected. This vulnerability is fixed in 9.5.2-alpha.5 and 8.6.18. |
2026-03-10 | |
| CVE-2026-30948 | 8.3 | HIGH | CWE-79 | 0.0% p4 | 5.81 | Parse Server is an open source backend that can be deployed to any infrastructur...Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.5.2-alpha.4 and 8.6.17, a stored cross-site scripting (XSS) vulnerability allows any authenticated user to upload an SVG file containing JavaScript. The file is served inline with Content-Type: image/svg+xml and without protective headers, causing the browser to execute embedded scripts in the Parse Server origin. This can be exploited to steal session tokens from localStorage and achieve account takeover. The default fileExtensions option blocks HTML file extensions but does not block SVG, which is a well-known XSS vector. All Parse Server deployments where file upload is enabled for authenticated users (the default) are affected. This vulnerability is fixed in 9.5.2-alpha.4 and 8.6.17. |
2026-03-10 | |
| CVE-2026-30947 | 8.7 | HIGH | CWE-863 | 0.0% p4 | 6.09 | Parse Server is an open source backend that can be deployed to any infrastructur...Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.5.2-alpha.3 and 8.6.16, class-level permissions (CLP) are not enforced for LiveQuery subscriptions. An unauthenticated or unauthorized client can subscribe to any LiveQuery-enabled class and receive real-time events for all objects, regardless of CLP restrictions. All Parse Server deployments that use LiveQuery with class-level permissions are affected. Data intended to be restricted by CLP is leaked to unauthorized subscribers in real time. This vulnerability is fixed in 9.5.2-alpha.3 and 8.6.16. |
2026-03-10 | |
| CVE-2026-30946 | 8.7 | HIGH | CWE-770 | 0.0% p5 | 6.09 | Parse Server is an open source backend that can be deployed to any infrastructur...Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior 9.5.2-alpha.2 and 8.6.15, an unauthenticated attacker can exhaust Parse Server resources (CPU, memory, database connections) through crafted queries that exploit the lack of complexity limits in the REST and GraphQL APIs. All Parse Server deployments using the REST or GraphQL API are affected. This vulnerability is fixed in 9.5.2-alpha.2 and 8.6.15. |
2026-03-10 | |
| CVE-2026-30837 | 7.5 | HIGH | CWE-1333 | 0.0% p5 | 5.25 | Elysia is a Typescript framework for request validation, type inference, OpenAPI...Elysia is a Typescript framework for request validation, type inference, OpenAPI documentation and client-server communication. Prior to 1.4.26 , t.String({ format: 'url' }) is vulnerable to ReDoS. Repeating a partial url format (protocol and hostname) multiple times cause regex to slow down significantly. This vulnerability is fixed in 1.4.26. |
2026-03-10 | |
| CVE-2026-0124 | 10.0 | CRITICAL | CWE-787 | 0.0% p5 | 7.00 | There is a possible out of bounds write due to a missing bounds check. This coul...There is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. |
2026-03-10 | |
| CVE-2026-0123 | 8.4 | HIGH | CWE-787 | 0.0% p0 | 5.88 | In EfwApTransport::ProcessRxRing of efw_ap_transport.cc, there is a possible out...In EfwApTransport::ProcessRxRing of efw_ap_transport.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. |
2026-03-10 | |
| CVE-2026-0122 | 8.4 | HIGH | CWE-787 | 0.0% p9 | 5.88 | In multiple places, there is a possible out of bounds write due to memory corrup...In multiple places, there is a possible out of bounds write due to memory corruption. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. |
2026-03-10 | |
| CVE-2026-0121 | 2.9 | LOW | CWE-362 | 0.0% p0 | 2.03 | In VPU, there is a possible use-after-free read due to a race condition. This co...In VPU, there is a possible use-after-free read due to a race condition. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. |
2026-03-10 | |
| CVE-2026-0120 | 9.8 | CRITICAL | CWE-787 | 0.2% p45 | 6.87 | In modem, there is a possible out of bounds write due to an incorrect bounds che...In modem, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. |
2026-03-10 | |
| CVE-2026-0119 | 6.8 | MEDIUM | CWE-787 | 0.0% p1 | 4.76 | In usim_SendMCCMNCIndMsg of usim_Registration.c, there is a possible out of boun...In usim_SendMCCMNCIndMsg of usim_Registration.c, there is a possible out of bounds write due to memory corruption. This could lead to physical escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. |
2026-03-10 | |
| CVE-2026-0118 | 8.4 | HIGH | CWE-693 | 0.0% p1 | 5.88 | In oobconfig, there is a possible bypass of carrier restrictions due to a logic ...In oobconfig, there is a possible bypass of carrier restrictions due to a logic error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. |
2026-03-10 | |
| CVE-2026-0117 | 8.4 | HIGH | CWE-787 | 0.0% p0 | 5.88 | In mfc_dec_dqbuf of mfc_dec_v4l2.c, there is a possible out of bounds write due ...In mfc_dec_dqbuf of mfc_dec_v4l2.c, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. |
2026-03-10 | |
| CVE-2026-0116 | 9.8 | CRITICAL | CWE-787 | 0.2% p45 | 6.87 | In __mfc_handle_released_buf of mfc_core_isr.c, there is a possible out of bound...In __mfc_handle_released_buf of mfc_core_isr.c, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. |
2026-03-10 | |
| CVE-2026-0115 | 2.1 | LOW | CWE-1300 | 0.0% p0 | 1.47 | In Trusted Execution Environment, there is a possible key leak due to side chann...In Trusted Execution Environment, there is a possible key leak due to side channel information disclosure. This could lead to physical information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. |
2026-03-10 | |
| CVE-2026-0114 | 9.8 | CRITICAL | CWE-787 | 0.2% p45 | 6.87 | In Modem, there is a possible out of bounds write due to an incorrect bounds che...In Modem, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. |
2026-03-10 | |
| CVE-2026-0113 | 9.8 | CRITICAL | CWE-787 | 0.2% p45 | 6.87 | In ns_GetUserData of ns_SmscbUtilities.c, there is a possible out of bounds writ...In ns_GetUserData of ns_SmscbUtilities.c, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. |
2026-03-10 | |
| CVE-2026-0112 | 7.4 | HIGH | CWE-362 | 0.0% p0 | 5.18 | In vpu_open_inst of vpu_ioctl.c, there is a possible use after free due to a rac...In vpu_open_inst of vpu_ioctl.c, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. |
2026-03-10 | |
| CVE-2026-0111 | 9.8 | CRITICAL | CWE-787 | 0.2% p45 | 6.87 | In ns_GetUserData of ns_SmscbUtilities.c, there is a possible out of bounds writ...In ns_GetUserData of ns_SmscbUtilities.c, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. |
2026-03-10 | |
| CVE-2026-0110 | 9.8 | CRITICAL | CWE-120 | 0.2% p45 | 6.87 | In MM_DATA_IND of cn_NrSmMsgHdlrFromMM.cpp, there is a possible EoP due to memor...In MM_DATA_IND of cn_NrSmMsgHdlrFromMM.cpp, there is a possible EoP due to memory corruption. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. |
2026-03-10 | |
| CVE-2026-0109 | 7.5 | HIGH | CWE-754 | 0.2% p41 | 5.26 | In dhd_tcpdata_info_get of dhd_ip.c, there is a possible Denial of Service due t...In dhd_tcpdata_info_get of dhd_ip.c, there is a possible Denial of Service due to a precondition check failure. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. |
2026-03-10 | |
| CVE-2026-0108 | 4.0 | MEDIUM | CWE-284 | 0.0% p0 | 2.80 | The register protection of the PowerVR GPU is incorrectly configured. This could...The register protection of the PowerVR GPU is incorrectly configured. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. |
2026-03-10 | |
| CVE-2026-0107 | 8.4 | HIGH | CWE-441 | 0.0% p0 | 5.88 | In gmc_ddr_handle_mba_mr_req of gmc_mba_ddr.c, there is a possible escalation of...In gmc_ddr_handle_mba_mr_req of gmc_mba_ddr.c, there is a possible escalation of privileges due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. |
2026-03-10 | |
| CVE-2025-70802 | 8.4 | HIGH | CWE-259 | 0.0% p4 | 5.88 | Tenda G1V3.1si V16.01.7.8 Firmware V16.01.7.8 was discovered to contain a hardco...Tenda G1V3.1si V16.01.7.8 Firmware V16.01.7.8 was discovered to contain a hardcoded password vulnerability in /etc_ro/shadow, which allows attackers to log in as root. |
2026-03-10 | |
| CVE-2025-70798 | 8.4 | HIGH | CWE-259 | 0.0% p4 | 5.88 | Tenda i24V3.0si V3.0.0.5 Firmware V3.0.0.5 was discovered to contain a hardcoded...Tenda i24V3.0si V3.0.0.5 Firmware V3.0.0.5 was discovered to contain a hardcoded password vulnerability in /etc_ro/shadow, which allows attackers to log in as root. |
2026-03-10 | |
| CVE-2025-70244 | 7.5 | HIGH | CWE-121 | 0.0% p9 | 5.25 | Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the webPage para...Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the webPage parameter to goform/formWlanSetup. |
2026-03-10 | |
| CVE-2025-66413 | 7.4 | HIGH | CWE-200 | 0.0% p10 | 5.18 | Git for Windows is the Windows port of Git. Prior to 2.53.0(2), it is possible t...Git for Windows is the Windows port of Git. Prior to 2.53.0(2), it is possible to obtain a user's NTLM hash by tricking them into cloning from a malicious server. Since NTLM hashing is weak, it is possible for the attacker to brute-force the user's account name and password. This vulnerability is fixed in 2.53.0(2). |
2026-03-10 | |
| CVE-2025-36920 | 8.4 | HIGH | CWE-20 | 0.0% p2 | 5.88 | In hyp_alloc of arch/arm64/kvm/hyp/nvhe/alloc.c, there is a possible out of boun...In hyp_alloc of arch/arm64/kvm/hyp/nvhe/alloc.c, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. |
2026-03-10 | |
| CVE-2025-13213 | 5.4 | MEDIUM | CWE-644 | 0.0% p8 | 3.78 | IBM Aspera Orchestrator 3.0.0 through 4.1.2 is vulnerable to HTTP header injecti...IBM Aspera Orchestrator 3.0.0 through 4.1.2 is vulnerable to HTTP header injection, caused by improper validation of input by the HOST headers. This could allow an attacker to conduct various attacks against the vulnerable system, including cross-site scripting, cache poisoning or session hijacking |
2026-03-10 | |
| CVE-2026-3582 | 5.3 | MEDIUM | CWE-862 | 0.0% p5 | 3.71 | An Incorrect Authorization vulnerability was identified in GitHub Enterprise Ser...An Incorrect Authorization vulnerability was identified in GitHub Enterprise Server that allowed an authenticated user with a classic personal access token (PAT) lacking the repo scope to retrieve issues and commits from private and internal repositories via the search REST API endpoints. The user must have had existing access to the repository through organization membership or as a collaborator for the vulnerability to be exploitable. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.20 and was fixed in versions 3.16.15, 3.17.12, 3.18.6 and 3.19.3. This vulnerability was reported via the GitHub Bug Bounty program. |
2026-03-10 | |
| CVE-2026-2713 | 7.4 | HIGH | CWE-427 | 0.0% p3 | 5.18 | IBM Trusteer Rapport installer 3.5.2309.290 IBM Trusteer Rapport could allow a l...IBM Trusteer Rapport installer 3.5.2309.290 IBM Trusteer Rapport could allow a local attacker to execute arbitrary code on the system, caused by DLL uncontrolled search path element vulnerability. By placing a specially crafted file in a compromised folder, an attacker could exploit this vulnerability to execute arbitrary code on the system. |
2026-03-10 | |
| CVE-2026-2266 | 7.4 | HIGH | CWE-79 | 0.0% p11 | 5.18 | An improper neutralization of input vulnerability was identified in GitHub Enter...An improper neutralization of input vulnerability was identified in GitHub Enterprise Server that allowed DOM-based cross-site scripting via task list content. The task list content extraction logic did not properly re-encode browser-decoded text nodes before rendering, allowing user-supplied HTML to be injected into the page. An authenticated attacker could craft malicious task list items in issues or pull requests to execute arbitrary scripts in the context of another user's browser session. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.20 and was fixed in versions 3.18.6 and 3.19.3. This vulnerability was reported via the GitHub Bug Bounty program. |
2026-03-10 | |
| CVE-2026-29793 | 9.3 | CRITICAL | CWE-943 | 0.0% p6 | 6.51 | Feathersjs is a framework for creating web APIs and real-time applications with ...Feathersjs is a framework for creating web APIs and real-time applications with TypeScript or JavaScript. From 5.0.0 to before 5.0.42, Socket.IO clients can send arbitrary JavaScript objects as the id argument to any service method (get, patch, update, remove). The transport layer performs no type checking on this argument. When the service uses the MongoDB adapter, these objects pass through getObjectId() and land directly in the MongoDB query as operators. Sending {$ne: null} as the id matches every document in the collection. This vulnerability is fixed in 5.0.42. |
2026-03-10 | |
| CVE-2026-29792 | 9.3 | CRITICAL | CWE-287 | 0.1% p18 | 6.51 | Feathersjs is a framework for creating web APIs and real-time applications with ...Feathersjs is a framework for creating web APIs and real-time applications with TypeScript or JavaScript. From 5.0.0 to before 5.0.42, an unauthenticated attacker can send a crafted GET request directly to /oauth/:provider/callback with a forged profile in the query string. The OAuth service's authentication payload has a fallback chain that reaches params.query (the raw request query) when Grant's session/state responses are empty. Since the attacker never initiated an OAuth authorize flow, Grant has no session to work with and produces no response, so the fallback fires. The forged profile then drives entity lookup and JWT minting. The attacker gets a valid access token for an existing user without ever contacting the OAuth provider. This vulnerability is fixed in 5.0.42. |
2026-03-10 | |
| CVE-2026-29177 | 1.9 | LOW | CWE-79 | 0.0% p1 | 1.33 | Craft Commerce is an ecommerce platform for Craft CMS. Prior to 4.10.2 and 5.5.3...Craft Commerce is an ecommerce platform for Craft CMS. Prior to 4.10.2 and 5.5.3, a Stored Cross-Site Scripting (XSS) vulnerability exists in the Craft Commerce Order details. Malicious JavaScript can be injected via the Shipping Method Name, Order Reference, or Site Name. When a user opens the order details slideout via a double-click on the order index page, the injected payload executes. This vulnerability is fixed in 4.10.2 and 5.5.3. |
2026-03-10 | |
| CVE-2026-29176 | 4.8 | MEDIUM | CWE-79 | 0.0% p0 | 3.36 | Craft Commerce is an ecommerce platform for Craft CMS. Prior to 5.5.3, A stored ...Craft Commerce is an ecommerce platform for Craft CMS. Prior to 5.5.3, A stored XSS vulnerability exists in the Commerce Settings - Inventory Locations page. The Name field is rendered without proper HTML escaping, allowing an attacker to execute arbitrary JavaScript. This XSS triggers when an administrator (or user with product editing permissions) creates or edits a variant product. This vulnerability is fixed in 5.5.3. |
2026-03-10 | |
| CVE-2026-29175 | 8.6 | HIGH | CWE-79 | 0.0% p10 | 6.02 | Craft Commerce is an ecommerce platform for Craft CMS. Prior to 5.5.3, Stored XS...Craft Commerce is an ecommerce platform for Craft CMS. Prior to 5.5.3, Stored XSS vulnerabilities exist in the Commerce Inventory page. The Product Title, Variant Title, and Variant SKU fields are rendered without proper HTML escaping, allowing an attacker to execute arbitrary JavaScript when any user (including administrators) views the inventory management page. This vulnerability is fixed in 5.5.3. |
2026-03-10 | |
| CVE-2026-29174 | 8.7 | HIGH | CWE-89 | 0.0% p2 | 6.09 | Craft Commerce is an ecommerce platform for Craft CMS. Prior to 5.5.3, Craft Com...Craft Commerce is an ecommerce platform for Craft CMS. Prior to 5.5.3, Craft Commerce is vulnerable to SQL Injection in the inventory levels table data endpoint. The sort[0][direction] and sort[0][sortField] parameters are concatenated directly into an addOrderBy() clause without any validation or sanitization. An authenticated attacker with access to the Commerce Inventory section can inject arbitrary SQL queries, potentially leading to a full database compromise. This vulnerability is fixed in 5.5.3. |
2026-03-10 | |
| CVE-2026-29173 | 1.9 | LOW | CWE-79 | 0.0% p1 | 1.33 | Craft Commerce is an ecommerce platform for Craft CMS. Prior to 4.10.2 and 5.5.3...Craft Commerce is an ecommerce platform for Craft CMS. Prior to 4.10.2 and 5.5.3, a stored XSS vulnerability exists when a user tries to update the Order Status from the Commerce Orders Table. The Order Status Name is rendered without proper escaping, allowing script execution to occur. This vulnerability is fixed in 4.10.2 and 5.5.3. |
2026-03-10 | |
| CVE-2026-29172 | 8.7 | HIGH | CWE-89 | 0.0% p10 | 6.09 | Craft Commerce is an ecommerce platform for Craft CMS. Prior to 4.10.2 and 5.5.3...Craft Commerce is an ecommerce platform for Craft CMS. Prior to 4.10.2 and 5.5.3, Craft Commerce is vulnerable to SQL Injection in the purchasables table endpoint. The sort parameter is split by | and the first part (column name) is passed directly as an array key to orderBy() without whitelist validation. Yii2's query builder does NOT escape array keys, allowing an authenticated attacker to inject arbitrary SQL into the ORDER BY clause. This vulnerability is fixed in 4.10.2 and 5.5.3. |
2026-03-10 | |
| CVE-2026-29113 | 2.3 | LOW | CWE-352 | 0.0% p0 | 1.61 | Craft is a content management system (CMS). Prior to 4.17.4 and 5.9.7, Craft CMS...Craft is a content management system (CMS). Prior to 4.17.4 and 5.9.7, Craft CMS has a CSRF issue in the preview token endpoint at /actions/preview/create-token. The endpoint accepts an attacker-supplied previewToken. Because the action does not require POST and does not enforce a CSRF token, an attacker can force a logged-in victim editor to mint a preview token chosen by the attacker. That token can then be used by the attacker (without authentication) to access previewed/unpublished content tied to the victim’s authorized preview scope. This vulnerability is fixed in 4.17.4 and 5.9.7. |
2026-03-10 | |
| CVE-2026-28495 | 9.6 | CRITICAL | CWE-352 | 0.1% p21 | 6.72 | GetSimple CMS is a content management system. The massiveAdmin plugin (v6.0.3) b...GetSimple CMS is a content management system. The massiveAdmin plugin (v6.0.3) bundled with GetSimpleCMS-CE v3.3.22 allows an authenticated administrator to overwrite the gsconfig.php configuration file with arbitrary PHP code via the gsconfig editor module. The form lacks CSRF protection, enabling a remote unauthenticated attacker to exploit this via Cross-Site Request Forgery against a logged-in admin, achieving Remote Code Execution (RCE) on the web server. |
2026-03-10 | |
| CVE-2026-27825 | 9.0 | CRITICAL | CWE-22 | 0.0% p14 | 6.30 | MCP Atlassian is a Model Context Protocol (MCP) server for Atlassian products (C...MCP Atlassian is a Model Context Protocol (MCP) server for Atlassian products (Confluence and Jira). Prior to version 0.17.0, the `confluence_download_attachment` MCP tool accepts a `download_path` parameter that is written to without any directory boundary enforcement. An attacker who can call this tool and supply or access a Confluence attachment with malicious content can write arbitrary content to any path the server process has write access to. Because the attacker controls both the write destination and the written content (via an uploaded Confluence attachment), this constitutes for arbitrary code execution (for example, writing a valid cron entry to `/etc/cron.d/` achieves code execution within one scheduler cycle with no server restart required). Version 0.17.0 fixes the issue. |
2026-03-10 | |
| CVE-2026-26330 | 5.3 | MEDIUM | CWE-416 | 0.0% p0 | 3.71 | Envoy is a high-performance edge/middle/service proxy. Prior to 1.37.1, 1.36.5, ...Envoy is a high-performance edge/middle/service proxy. Prior to 1.37.1, 1.36.5, 1.35.8, and 1.34.13, At the rate limit filter, if the response phase limit with apply_on_stream_done in the rate limit configuration is enabled and the response phase limit request fails directly, it may crash Envoy. When both the request phase limit and response phase limit are enabled, the safe gRPC client instance will be re-used for both the request phase request and response phase request. But after the request phase request is done, the inner state of the request phase limit request in gRPC client is not cleaned up. When a second limit request is sent at response phase, and the second limit request fails directly, the previous request's inner state may be accessed and result in crash. This vulnerability is fixed in 1.37.1, 1.36.5, 1.35.8, and 1.34.13. |
2026-03-10 | |
| CVE-2026-26311 | 5.9 | MEDIUM | CWE-416 | 0.0% p2 | 4.13 | Envoy is a high-performance edge/middle/service proxy. Prior to 1.37.1, 1.36.5, ...Envoy is a high-performance edge/middle/service proxy. Prior to 1.37.1, 1.36.5, 1.35.8, and 1.34.13, a logic vulnerability in Envoy's HTTP connection manager (FilterManager) that allows for Zombie Stream Filter Execution. This issue creates a "Use-After-Free" (UAF) or state-corruption window where filter callbacks are invoked on an HTTP stream that has already been logically reset and cleaned up. The vulnerability resides in source/common/http/filter_manager.cc within the FilterManager::decodeData method. The ActiveStream object remains valid in memory during the deferred deletion window. If a DATA frame arrives on this stream immediately after the reset (e.g., in the same packet processing cycle), the HTTP/2 codec invokes ActiveStream::decodeData, which cascades to FilterManager::decodeData. FilterManager::decodeData fails to check the saw_downstream_reset_ flag. It iterates over the decoder_filters_ list and invokes decodeData() on filters that have already received onDestroy(). This vulnerability is fixed in 1.37.1, 1.36.5, 1.35.8, and 1.34.13. |
2026-03-10 | |
| CVE-2026-26310 | 5.9 | MEDIUM | CWE-20 | 0.0% p0 | 4.13 | Envoy is a high-performance edge/middle/service proxy. Prior to 1.37.1, 1.36.5, ...Envoy is a high-performance edge/middle/service proxy. Prior to 1.37.1, 1.36.5, 1.35.8, and 1.34.13, calling Utility::getAddressWithPort with a scoped IPv6 addresses causes a crash. This utility is called in the data plane from the original_src filter and the dns filter. This vulnerability is fixed in 1.37.1, 1.36.5, 1.35.8, and 1.34.13. |
2026-03-10 | |
| CVE-2026-26309 | 5.3 | MEDIUM | CWE-193 | 0.0% p0 | 3.71 | Envoy is a high-performance edge/middle/service proxy. Prior to 1.37.1, 1.36.5, ...Envoy is a high-performance edge/middle/service proxy. Prior to 1.37.1, 1.36.5, 1.35.8, and 1.34.13, an off-by-one write in Envoy::JsonEscaper::escapeString() can corrupt std::string null-termination, causing undefined behavior and potentially leading to crashes or out-of-bounds reads when the resulting string is later treated as a C-string. This vulnerability is fixed in 1.37.1, 1.36.5, 1.35.8, and 1.34.13. |
2026-03-10 | |
| CVE-2026-26308 | 7.5 | HIGH | CWE-863 | 0.0% p0 | 5.25 | Envoy is a high-performance edge/middle/service proxy. Prior to 1.37.1, 1.36.5, ...Envoy is a high-performance edge/middle/service proxy. Prior to 1.37.1, 1.36.5, 1.35.8, and 1.34.13, the Envoy RBAC (Role-Based Access Control) filter contains a logic vulnerability in how it validates HTTP headers when multiple values are present for the same header name. Instead of validating each header value individually, Envoy concatenates all values into a single comma-separated string. This behavior allows attackers to bypass RBAC policies—specifically "Deny" rules—by sending duplicate headers, effectively obscuring the malicious value from exact-match mechanisms. This vulnerability is fixed in 1.37.1, 1.36.5, 1.35.8, and 1.34.13. |
2026-03-10 | |
| CVE-2026-26123 | 5.5 | MEDIUM | CWE-939 | 0.0% p11 | 3.85 | Cwe is not in rca categories in Microsoft Authenticator allows an unauthorized a...Cwe is not in rca categories in Microsoft Authenticator allows an unauthorized attacker to disclose information locally. |
2026-03-10 | |
| CVE-2026-23868 | 5.1 | MEDIUM | CWE-415 | 0.0% p4 | 3.57 | Giflib contains a double-free vulnerability that is the result of a shallow copy...Giflib contains a double-free vulnerability that is the result of a shallow copy in GifMakeSavedImage and incorrect error handling. The conditions needed to trigger this vulnerability are difficult but may be possible. |
2026-03-10 | |
| CVE-2025-70251 | 7.5 | HIGH | CWE-121 | 0.0% p9 | 5.25 | Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the webPage para...Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the webPage parameter to goform/formWlanGuestSetup. |
2026-03-10 | |
| CVE-2025-70249 | 7.5 | HIGH | CWE-121 | 0.1% p20 | 5.25 | Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime para...Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSetWizard2. |
2026-03-10 | |
| CVE-2025-70247 | 7.5 | HIGH | CWE-121 | 0.1% p20 | 5.25 | Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime para...Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSetWizard1. |
2026-03-10 | |
| CVE-2025-70246 | 7.5 | HIGH | CWE-121 | 0.1% p20 | 5.25 | Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime para...Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formVirtualServ. |
2026-03-10 | |
| CVE-2025-70242 | 7.5 | HIGH | CWE-121 | 0.0% p9 | 5.25 | Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the webPage para...Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the webPage parameter to goform/formSetWanPPTP. |
2026-03-10 | |
| CVE-2025-70227 | 7.5 | HIGH | CWE-121 | 0.1% p20 | 5.25 | Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the nextPage par...Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the nextPage parameter to goform/formLanguageChange. |
2026-03-10 | |
| CVE-2025-70129 | 5.3 | MEDIUM | CWE-804 | 0.0% p11 | 3.71 | If the anti spam-captcha functionality in PluXml versions 5.8.22 and earlier is ...If the anti spam-captcha functionality in PluXml versions 5.8.22 and earlier is enabled, a captcha challenge is generated with a format that can be automatically recognized for articles, such that an automated script is able to solve this anti-spam mechanism trivially and publish spam comments. The details of captcha challenge are exposed within document body of articles with comments & anti spam-captcha functionalities enabled, including "capcha-letter", "capcha-word" and "capcha-token" which can be used to construct a valid post request to publish a comment. As such, attackers can flood articles with automated spam comments, especially if there are no other web defenses available. |
2026-03-10 | |
| CVE-2025-70128 | 6.1 | MEDIUM | CWE-79 | 0.0% p9 | 4.27 | A Stored Cross-Site Scripting (XSS) vulnerability exists in the PluXml article c...A Stored Cross-Site Scripting (XSS) vulnerability exists in the PluXml article comments feature for PluXml versions 5.8.22 and earlier. The application fails to properly sanitize or validate user-supplied input in the "link" field of a comment. An attacker can inject arbitrary JavaScript code using a <script> element. The injected payload is stored in the database and subsequently rendered in the Administration panel's "Comments" section when administrators review submitted comments. Importantly, the malicious script is not reflected in the public-facing comments interface, but only within the backend administration view. Alternatively, users of Administrator, Moderator, Manager roles can also directly input crafted payloads into existing comments. This makes the vulnerability a persistent XSS issue targeting administrative users. This affects /core/admin/comments.php, while CVE-2022-24585 affects /core/admin/comment.php, a uniquely distinct vulnerability. |
2026-03-10 | |
| CVE-2025-48611 | 10.0 | CRITICAL | CWE-120 | 0.0% p5 | 7.00 | In DeviceId of DeviceId.java, there is a possible desync in persistence due to a...In DeviceId of DeviceId.java, there is a possible desync in persistence due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. |
2026-03-10 | |
| CVE-2025-36227 | 5.4 | MEDIUM | CWE-644 | 0.0% p8 | 3.78 | IBM Aspera Faspex 5 5.0.0 through 5.0.14.3 is vulnerable to HTTP header injectio...IBM Aspera Faspex 5 5.0.0 through 5.0.14.3 is vulnerable to HTTP header injection, caused by improper validation of input by the HOST headers. This could allow an attacker to conduct various attacks against the vulnerable system, including cross-site scripting, cache poisoning or session hijacking. |
2026-03-10 | |
| CVE-2025-36226 | 5.4 | MEDIUM | CWE-79 | 0.0% p8 | 3.78 | IBM Aspera Faspex 5 5.0.0 through 5.0.14.3 is vulnerable to cross-site scripting...IBM Aspera Faspex 5 5.0.0 through 5.0.14.3 is vulnerable to cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. |
2026-03-10 | |
| CVE-2025-13219 | 5.9 | MEDIUM | CWE-598 | 0.0% p12 | 4.13 | IBM Aspera Orchestrator 3.0.0 through 4.1.2 stores sensitive information in URL ...IBM Aspera Orchestrator 3.0.0 through 4.1.2 stores sensitive information in URL parameters. This may lead to information disclosure if unauthorized parties have access to the URLs via server logs, referrer header or browser history. |
2026-03-10 | |
| CVE-2026-3370 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This can...Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage. |
2026-03-10 | |
| CVE-2026-28292 | 9.8 | CRITICAL | CWE-78 | 0.1% p28 | 6.86 | `simple-git`, an interface for running git commands in any node.js application, ...`simple-git`, an interface for running git commands in any node.js application, has an issue in versions 3.15.0 through 3.32.2 that allows an attacker to bypass two prior CVE fixes (CVE-2022-25860 and CVE-2022-25912) and achieve full remote code execution on the host machine. Version 3.23.0 contains an updated fix for the vulnerability. |
2026-03-10 | |
| CVE-2026-27826 | 8.2 | HIGH | CWE-918 | 0.1% p22 | 5.74 | MCP Atlassian is a Model Context Protocol (MCP) server for Atlassian products (C...MCP Atlassian is a Model Context Protocol (MCP) server for Atlassian products (Confluence and Jira). Prior to version 0.17.0, an unauthenticated attacker who can reach the mcp-atlassian HTTP endpoint can force the server process to make outbound HTTP requests to an arbitrary attacker-controlled URL by supplying two custom HTTP headers without an `Authorization` header. No authentication is required. The vulnerability exists in the HTTP middleware and dependency injection layer — not in any MCP tool handler - making it invisible to tool-level code analysis. In cloud deployments, this could enable theft of IAM role credentials via the instance metadata endpoint (`169[.]254[.]169[.]254`). In any HTTP deployment it enables internal network reconnaissance and injection of attacker-controlled content into LLM tool results. Version 0.17.0 fixes the issue. |
2026-03-10 | |
| CVE-2026-27281 | 5.5 | MEDIUM | CWE-190 | 0.0% p5 | 3.85 | DNG SDK versions 1.7.1 2471 and earlier are affected by an Integer Overflow or W...DNG SDK versions 1.7.1 2471 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could lead to application denial-of-service. An attacker could exploit this vulnerability to cause the application to crash or become unresponsive. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
2026-03-10 | |
| CVE-2026-27280 | 7.8 | HIGH | CWE-787 | 0.0% p10 | 5.46 | DNG SDK versions 1.7.1 2471 and earlier are affected by an out-of-bounds write v...DNG SDK versions 1.7.1 2471 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
2026-03-10 | |
| CVE-2026-27279 | 7.8 | HIGH | CWE-787 | 0.0% p10 | 5.46 | Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds...Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
2026-03-10 | |
| CVE-2026-27277 | 7.8 | HIGH | CWE-416 | 0.0% p11 | 5.46 | Substance3D - Stager versions 3.1.7 and earlier are affected by a Use After Free...Substance3D - Stager versions 3.1.7 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
2026-03-10 | |
| CVE-2026-27276 | 7.8 | HIGH | CWE-416 | 0.0% p11 | 5.46 | Substance3D - Stager versions 3.1.7 and earlier are affected by a Use After Free...Substance3D - Stager versions 3.1.7 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
2026-03-10 | |
| CVE-2026-27275 | 7.8 | HIGH | CWE-787 | 0.0% p10 | 5.46 | Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds...Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
2026-03-10 | |
| CVE-2026-27274 | 7.8 | HIGH | CWE-787 | 0.0% p10 | 5.46 | Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds...Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
2026-03-10 | |
| CVE-2026-27273 | 7.8 | HIGH | CWE-787 | 0.0% p10 | 5.46 | Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds...Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
2026-03-10 | |
| CVE-2026-27269 | 7.8 | HIGH | CWE-125 | 0.0% p8 | 5.46 | Premiere Pro versions 25.5 and earlier are affected by an out-of-bounds read vul...Premiere Pro versions 25.5 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
2026-03-10 | |
| CVE-2026-27219 | 5.5 | MEDIUM | CWE-125 | 0.0% p6 | 3.85 | Substance3D - Painter versions 11.1.2 and earlier are affected by an Out-of-boun...Substance3D - Painter versions 11.1.2 and earlier are affected by an Out-of-bounds Read vulnerability that could lead to memory exposure. An attacker could leverage this vulnerability to access sensitive information stored in memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
2026-03-10 | |
| CVE-2026-27218 | 5.5 | MEDIUM | CWE-476 | 0.0% p5 | 3.85 | Substance3D - Painter versions 11.1.2 and earlier are affected by a NULL Pointer...Substance3D - Painter versions 11.1.2 and earlier are affected by a NULL Pointer Dereference vulnerability that could lead to application denial-of-service. An attacker could exploit this vulnerability to crash the application, causing disruption to services. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
2026-03-10 | |
| CVE-2026-27217 | 5.5 | MEDIUM | CWE-476 | 0.0% p5 | 3.85 | Substance3D - Painter versions 11.1.2 and earlier are affected by a NULL Pointer...Substance3D - Painter versions 11.1.2 and earlier are affected by a NULL Pointer Dereference vulnerability that could lead to application denial-of-service. An attacker could exploit this vulnerability to crash the application, causing disruption to its availability. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
2026-03-10 | |
| CVE-2026-27216 | 5.5 | MEDIUM | CWE-125 | 0.0% p6 | 3.85 | Substance3D - Painter versions 11.1.2 and earlier are affected by an out-of-boun...Substance3D - Painter versions 11.1.2 and earlier are affected by an out-of-bounds read vulnerability that could lead to memory exposure. An attacker could leverage this vulnerability to access sensitive information stored in memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
2026-03-10 | |
| CVE-2026-27215 | 5.5 | MEDIUM | CWE-476 | 0.0% p5 | 3.85 | Substance3D - Painter versions 11.1.2 and earlier are affected by a NULL Pointer...Substance3D - Painter versions 11.1.2 and earlier are affected by a NULL Pointer Dereference vulnerability that could lead to application denial-of-service. An attacker could exploit this vulnerability to crash the application, causing disruption to its availability. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
2026-03-10 | |
| CVE-2026-27214 | 5.5 | MEDIUM | CWE-476 | 0.0% p5 | 3.85 | Substance3D - Painter versions 11.1.2 and earlier are affected by a NULL Pointer...Substance3D - Painter versions 11.1.2 and earlier are affected by a NULL Pointer Dereference vulnerability that could lead to application denial-of-service. An attacker could exploit this vulnerability to crash the application, causing disruption to services. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
2026-03-10 | |
| CVE-2026-26801 | 7.5 | HIGH | CWE-918 | 0.0% p5 | 5.25 | Server-Side Request Forgery (SSRF) vulnerability in pdfmake versions 0.3.0-beta....Server-Side Request Forgery (SSRF) vulnerability in pdfmake versions 0.3.0-beta.2 through 0.3.5 allows a remote attacker to obtain sensitive information via the src/URLResolver.js component. The fix was released in version 0.3.6 which introduces the setUrlAccessPolicy() method allowing server operators to define URL access rules. A warning is now logged when pdfmake is used server-side without a policy configured. |
2026-03-10 | |
| CVE-2026-26742 | 8.1 | HIGH | CWE-862 | 0.0% p12 | 5.67 | PX4 Autopilot versions 1.12.x through 1.15.x contain a protection mechanism fail...PX4 Autopilot versions 1.12.x through 1.15.x contain a protection mechanism failure in the "Re-arm Grace Period" logic. The system incorrectly applies the in-air emergency re-arm logic to ground scenarios. If a pilot switches to Manual mode and re-arms within 5 seconds (default configuration) of an automatic landing, the system bypasses all pre-flight safety checks, including the throttle threshold check. This allows for an immediate high-thrust takeoff if the throttle stick is raised, leading to loss of control. |
2026-03-10 | |
| CVE-2026-26741 | 8.1 | HIGH | CWE-862 | 0.0% p12 | 5.67 | PX4 Autopilot versions 1.12.x through 1.15.x contain a logic flaw in the mode sw...PX4 Autopilot versions 1.12.x through 1.15.x contain a logic flaw in the mode switching mechanism. When switching from Auto mode to Manual mode while the drone is in the "ARMED" state (after landing and before the automatic disarm triggered by the COM_DISARM_LAND parameter), the system lacks a throttle threshold safety check for the physical throttle stick. This flaw can directly cause the drone to lose control, experience rapid uncontrolled ascent (flyaway), and result in property damage |
2026-03-10 | |
| CVE-2026-21365 | 5.5 | MEDIUM | CWE-125 | 0.0% p6 | 3.85 | Substance3D - Painter versions 11.1.2 and earlier are affected by an out-of-boun...Substance3D - Painter versions 11.1.2 and earlier are affected by an out-of-bounds read vulnerability that could lead to memory exposure. An attacker could leverage this vulnerability to access sensitive information stored in memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
2026-03-10 | |
| CVE-2026-21364 | 5.5 | MEDIUM | CWE-476 | 0.0% p5 | 3.85 | Substance3D - Painter versions 11.1.2 and earlier are affected by a NULL Pointer...Substance3D - Painter versions 11.1.2 and earlier are affected by a NULL Pointer Dereference vulnerability that could lead to application denial-of-service. An attacker could exploit this vulnerability to crash the application, causing disruption to services. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
2026-03-10 | |
| CVE-2026-21363 | 5.5 | MEDIUM | CWE-476 | 0.0% p5 | 3.85 | Substance3D - Painter versions 11.1.2 and earlier are affected by a NULL Pointer...Substance3D - Painter versions 11.1.2 and earlier are affected by a NULL Pointer Dereference vulnerability that could lead to application denial-of-service. An attacker could exploit this vulnerability to crash the application, causing disruption to services. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
2026-03-10 | |
| CVE-2026-3862 | 4.6 | MEDIUM | CWE-79 | 0.1% p19 | 3.22 | Cross-site Scripting (XSS) allows an attacker to submit specially crafted data t...Cross-site Scripting (XSS) allows an attacker to submit specially crafted data to the application which is returned unaltered in the resulting web page. |
2026-03-10 | |
| CVE-2026-3854 | 8.7 | HIGH | CWE-77 | 0.4% p60 | 6.10 | An improper neutralization of special elements vulnerability was identified in G...An improper neutralization of special elements vulnerability was identified in GitHub Enterprise Server that allowed an attacker with push access to a repository to achieve remote code execution on the instance. During a git push operation, user-supplied push option values were not properly sanitized before being included in internal service headers. Because the internal header format used a delimiter character that could also appear in user input, an attacker could inject additional metadata fields through crafted push option values. This vulnerability was reported via the GitHub Bug Bounty program and has been fixed in GitHub Enterprise Server versions 3.14.24, 3.15.19, 3.16.15, 3.17.12, 3.18.6 and 3.19.3. |
2026-03-10 | |
| CVE-2026-3847 | 8.8 | HIGH | CWE-119 | 0.0% p14 | 6.16 | Memory safety bugs present in Firefox 148.0.2. Some of these bugs showed evidenc...Memory safety bugs present in Firefox 148.0.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability was fixed in Firefox 148.0.2. |
2026-03-10 | |
| CVE-2026-3846 | 6.5 | MEDIUM | CWE-346 | 0.0% p4 | 4.55 | Same-origin policy bypass in the CSS Parsing and Computation component. This vul...Same-origin policy bypass in the CSS Parsing and Computation component. This vulnerability was fixed in Firefox 148.0.2. |
2026-03-10 | |
| CVE-2026-3845 | 8.8 | HIGH | CWE-122 | 0.0% p14 | 6.16 | Heap buffer overflow in the Audio/Video: Playback component in Firefox for Andro...Heap buffer overflow in the Audio/Video: Playback component in Firefox for Android. This vulnerability was fixed in Firefox 148.0.2. |
2026-03-10 | |
| CVE-2026-3843 | 9.3 | CRITICAL | CWE-89 | 0.7% p71 | 6.53 | Nefteprodukttekhnika BUK TS-G Gas Station Automation System 2.9.1 on Linux conta...Nefteprodukttekhnika BUK TS-G Gas Station Automation System 2.9.1 on Linux contains a SQL Injection vulnerability (CWE-89) in the system configuration module. A remote attacker can send specially crafted HTTP POST requests to the /php/request.php endpoint via the sql parameter in application/x-www-form-urlencoded data (e.g., action=do&sql=<query_here>&reload_driver=0) to execute arbitrary SQL commands and potentially achieve remote code execution. |
2026-03-10 | |
| CVE-2026-3483 | 7.8 | HIGH | CWE-749 | 0.0% p11 | 5.46 | An exposed dangerous method in Ivanti DSM before version 2026.1.1 allows a local...An exposed dangerous method in Ivanti DSM before version 2026.1.1 allows a local authenticated attacker to escalate their privileges. |
2026-03-10 | |
| CVE-2026-3315 | 5.8 | MEDIUM | CWE-250 | 0.0% p2 | 4.06 | Incorrect Default Permissions, : Execution with Unnecessary Privileges, : Incorr...Incorrect Default Permissions, : Execution with Unnecessary Privileges, : Incorrect Permission Assignment for Critical Resource vulnerability in ASSA ABLOY Visionline on Windows allows Configuration/Environment Manipulation.This issue affects Visionline: from 1.0 before 1.33. |
2026-03-10 | |
| CVE-2026-3306 | 5.3 | MEDIUM | CWE-639 | 0.0% p7 | 3.71 | An improper authorization vulnerability was identified in GitHub Enterprise Serv...An improper authorization vulnerability was identified in GitHub Enterprise Server that allowed a user with read access to a repository and write access to a project to modify issue and pull request metadata through the project. When adding an item to a project that already existed, column value updates were applied without verifying the actor's repository write permissions. This vulnerability was reported via the GitHub Bug Bounty program and has been fixed in GitHub Enterprise Server versions 3.14.24, 3.15.19, 3.16.15, 3.17.12, 3.18.6 and 3.19.3. |
2026-03-10 | |
| CVE-2026-3228 | 6.4 | MEDIUM | CWE-79 | 0.0% p11 | 4.48 | The NextScripts: Social Networks Auto-Poster plugin for WordPress is vulnerable ...The NextScripts: Social Networks Auto-Poster plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the `[nxs_fbembed]` shortcode in all versions up to, and including, 4.4.6. This is due to insufficient input sanitization and output escaping on the `snapFB` post meta value. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-03-10 | |
| CVE-2026-31797 | 6.1 | MEDIUM | CWE-125 | 0.0% p1 | 4.27 | iccDEV provides a set of libraries and tools for working with ICC color manageme...iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to 2.3.1.5, there is a heap out-of-bounds read in CTiffImg::ReadLine() when iccApplyProfiles processes a crafted TIFF image, causing memory disclosure or crash. This vulnerability is fixed in 2.3.1.5. |
2026-03-10 | |
| CVE-2026-31796 | 7.8 | HIGH | CWE-122 | 0.0% p3 | 5.46 | iccDEV provides a set of libraries and tools for working with ICC color manageme...iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to 2.3.1.5, there is a heap-based buffer overflow in icCurvesFromXml() causing heap memory corruption or crash. This vulnerability is fixed in 2.3.1.5. |
2026-03-10 | |
| CVE-2026-31795 | 7.8 | HIGH | CWE-120 | 0.0% p2 | 5.46 | iccDEV provides a set of libraries and tools for working with ICC color manageme...iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to 2.3.1.5, there is a stack buffer overflow write in CIccXform3DLut::Apply() corrupting stack memory or crash. This vulnerability is fixed in 2.3.1.5. |
2026-03-10 | |
| CVE-2026-31794 | 5.5 | MEDIUM | CWE-125 | 0.0% p4 | 3.85 | iccDEV provides a set of libraries and tools for working with ICC color manageme...iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to 2.3.1.5, there is a segmentation fault from invalid/wild pointer read in CIccCLUT::Interp3d() causing a denial of service. This vulnerability is fixed in 2.3.1.5. |
2026-03-10 | |
| CVE-2026-31793 | 5.5 | MEDIUM | CWE-125 | 0.0% p4 | 3.85 | iccDEV provides a set of libraries and tools for working with ICC color manageme...iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to 2.3.1.5, there is a segmentation fault due to invalid/wild pointer read in CIccCalculatorFunc::ApplySequence() causing denial of service. This vulnerability is fixed in 2.3.1.5. |
2026-03-10 | |
| CVE-2026-31792 | 7.8 | HIGH | CWE-476 | 0.0% p3 | 5.46 | iccDEV provides a set of libraries and tools for working with ICC color manageme...iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to 2.3.1.5, there is a null pointer dereference in CIccTagXmlStruct::ParseTag() causing a segmentation fault or denial of service. This vulnerability is fixed in 2.3.1.5. |
2026-03-10 | |
| CVE-2026-30987 | 7.8 | HIGH | CWE-120 | 0.0% p3 | 5.46 | iccDEV provides a set of libraries and tools for working with ICC color manageme...iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to 2.3.1.5, there is a stack buffer overflow in CIccTagNum<>::GetValues() causing stack memory corruption or crash. This vulnerability is fixed in 2.3.1.5. |
2026-03-10 | |
| CVE-2026-30986 | 5.5 | MEDIUM | CWE-125 | 0.0% p3 | 3.85 | iccDEV provides a set of libraries and tools for working with ICC color manageme...iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to 2.3.1.5, there is a heap-based buffer overflow write in CIccMatrixMath::SetRange() causing memory corruption or crash. This vulnerability is fixed in 2.3.1.5. |
2026-03-10 | |
| CVE-2026-30985 | 7.8 | HIGH | CWE-120 | 0.0% p3 | 5.46 | iccDEV provides a set of libraries and tools for working with ICC color manageme...iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to 2.3.1.5, there is a heap-based buffer overflow write in CIccMatrixMath::SetRange() causing memory corruption or crash. This vulnerability is fixed in 2.3.1.5. |
2026-03-10 | |
| CVE-2026-30984 | 6.1 | MEDIUM | CWE-125 | 0.0% p1 | 4.27 | iccDEV provides a set of libraries and tools for working with ICC color manageme...iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to 2.3.1.5, there is a heap out-of-bounds read in CIccCalculatorFunc::ApplySequence() causing an application crash. This vulnerability is fixed in 2.3.1.5. |
2026-03-10 | |
| CVE-2026-30983 | 7.8 | HIGH | CWE-120 | 0.0% p3 | 5.46 | iccDEV provides a set of libraries and tools for working with ICC color manageme...iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to 2.3.1.5, there is a stack buffer overflow in icFixXml() (strcpy) causing stack memory corruption or crash. This vulnerability is fixed in 2.3.1.5. |
2026-03-10 | |
| CVE-2026-30982 | 6.1 | MEDIUM | CWE-122 | 0.0% p1 | 4.27 | iccDEV provides a set of libraries and tools for working with ICC color manageme...iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to 2.3.1.5, there is a heap out-of-bounds read in CIccPcsXform::pushXYZConvert() causing crash and potentially leaking memory contents. This vulnerability is fixed in 2.3.1.5. |
2026-03-10 | |
| CVE-2026-30981 | 6.1 | MEDIUM | CWE-120 | 0.0% p1 | 4.27 | iccDEV provides a set of libraries and tools for working with ICC color manageme...iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to 2.3.1.5, there is a heap-buffer-overflow read in CIccXmlArrayType<>::DumpArray() causing out-of-bounds read and/or crash. This vulnerability is fixed in 2.3.1.5. |
2026-03-10 | |
| CVE-2026-30980 | 5.5 | MEDIUM | CWE-121 | 0.0% p1 | 3.85 | iccDEV provides a set of libraries and tools for working with ICC color manageme...iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to 2.3.1.5, there is a stack overflow in CIccBasicStructFactory::CreateStruct() causing uncontrolled recursion/stack exhaustion and crash. This vulnerability is fixed in 2.3.1.5. |
2026-03-10 | |
| CVE-2026-30979 | 7.8 | HIGH | CWE-120 | 0.0% p3 | 5.46 | iccDEV provides a set of libraries and tools for working with ICC color manageme...iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to 2.3.1.5, there is a heap-based buffer overflow in CIccCalculatorFunc::InitSelectOp() triggered with local user interaction causing memory corruption/crash. This vulnerability is fixed in 2.3.1.5. |
2026-03-10 | |
| CVE-2026-30978 | 7.8 | HIGH | CWE-416 | 0.0% p4 | 5.46 | iccDEV provides a set of libraries and tools for working with ICC color manageme...iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to 2.3.1.5, there is a heap-use-after-free in CIccCmm::AddXform() causing invalid vptr dereference and crash. This vulnerability is fixed in 2.3.1.5. |
2026-03-10 | |
| CVE-2026-30977 | 2.0 | LOW | CWE-79 | 0.1% p18 | 1.40 | RenderBlocking is a MediaWiki extension that allows interface administrators to ...RenderBlocking is a MediaWiki extension that allows interface administrators to specify render-blocking CSS and JavaScript. Prior to 0.1.1, there is Stored XSS in renderblocking-css with Inline Assets mode. $wgRenderBlockingInlineAssets = true and editsitecss user rights are required. This vulnerability is fixed in 0.1.1. |
2026-03-10 | |
| CVE-2026-30974 | 4.6 | MEDIUM | CWE-79 | 0.0% p10 | 3.22 | Copyparty is a portable file server. Prior to v1.20.11., the nohtml config optio...Copyparty is a portable file server. Prior to v1.20.11., the nohtml config option, intended to prevent execution of JavaScript in user-uploaded HTML files, did not apply to SVG images. A user with write-permission could upload an SVG containing embedded JavaScript, which would execute in the context of whichever user opens it. This has been fixed in v1.20.11. |
2026-03-10 | |
| CVE-2026-30973 | 6.5 | MEDIUM | CWE-22 | 0.0% p12 | 4.55 | Appium is an automation framework that provides WebDriver-based automation possi...Appium is an automation framework that provides WebDriver-based automation possibilities for a wide range platforms. Prior to 7.0.6, @appium/support contains a ZIP extraction implementation (extractAllTo() via ZipExtractor.extract()) with a path traversal (Zip Slip) check that is non-functional. The check at line 88 of packages/support/lib/zip.js creates an Error object but never throws it, allowing malicious ZIP entries with ../ path components to write files outside the intended destination directory. This affects all JS-based extractions (the default code path), not only those using the fileNamesEncoding option. This vulnerability is fixed in 7.0.6. |
2026-03-10 | |
| CVE-2026-30970 | 8.8 | HIGH | CWE-862 | 0.1% p28 | 6.16 | Coral Server is open collaboration infrastructure that enables communication, co...Coral Server is open collaboration infrastructure that enables communication, coordination, trust and payments for The Internet of Agents. Prior to 1.1.0, Coral Server allowed the creation of agent sessions through the /api/v1/sessions endpoint without strong authentication. This endpoint performs resource-intensive initialization operations including container spawning and memory context creation. An attacker capable of accessing the endpoint could create sessions or consume system resources without proper authorization. This vulnerability is fixed in 1.1.0. |
2026-03-10 | |
| CVE-2026-30969 | 7.6 | HIGH | CWE-639 | 0.1% p18 | 5.32 | Coral Server is open collaboration infrastructure that enables communication, co...Coral Server is open collaboration infrastructure that enables communication, coordination, trust and payments for The Internet of Agents. Prior to 1.1.0, Coral Server did not enforce strong authentication between agents and the server within an active session. This could allow an attacker who obtained or predicted a session identifier to impersonate an agent or join an existing session. This vulnerability is fixed in 1.1.0. |
2026-03-10 | |
| CVE-2026-30968 | 8.6 | HIGH | CWE-862 | 0.1% p17 | 6.02 | Coral Server is open collaboration infrastructure that enables communication, co...Coral Server is open collaboration infrastructure that enables communication, coordination, trust and payments for The Internet of Agents. Prior to 1.1.0, the SSE endpoint (/sse/v1/...) in Coral Server did not strongly validate that a connecting agent was a legitimate participant in the session. This could theoretically allow unauthorized message injection or observation. This vulnerability is fixed in 1.1.0. |
2026-03-10 | |
| CVE-2026-30964 | 5.4 | MEDIUM | CWE-346 | 0.0% p0 | 3.78 | web-auth/webauthn-lib is an open source set of PHP libraries and a Symfony bundl...web-auth/webauthn-lib is an open source set of PHP libraries and a Symfony bundle to allow developers to integrate that authentication mechanism into their web applications. Prior to 5.2.4, when allowed_origins is configured, CheckAllowedOrigins reduces URL-like values to their host component and accepts on host match alone. This makes exact origin policies impossible to express: scheme and port differences are silently ignored. This vulnerability is fixed in 5.2.4. |
2026-03-10 | |
| CVE-2026-30960 | 9.4 | CRITICAL | CWE-94 | 0.0% p0 | 6.58 | rssn is a scientific computing library for Rust, combining a high-performance sy...rssn is a scientific computing library for Rust, combining a high-performance symbolic computation engine with numerical methods support and physics simulations functionalities. The vulnerability exists in the JIT (Just-In-Time) compilation engine, which is fully exposed via the CFFI (Foreign Function Interface). Due to Improper Input Validation and External Control of Code Generation, an attacker can supply malicious parameters or instruction sequences through the CFFI layer. Since the library often operates with elevated privileges or within high-performance computing contexts, this allows for Arbitrary Code Execution (ACE) at the privilege level of the host process. |
2026-03-10 | |
| CVE-2026-30959 | 5.3 | MEDIUM | CWE-285 | 0.0% p3 | 3.71 | OneUptime is a solution for monitoring and managing online services. The resend-...OneUptime is a solution for monitoring and managing online services. The resend-verification-code endpoint allows any authenticated user to trigger a verification code resend for any UserWhatsApp record by ID. Ownership is not validated (unlike the verify endpoint). This affects the UserWhatsAppAPI.ts endpoint and the UserWhatsAppService.ts service. |
2026-03-10 | |
| CVE-2026-30958 | 7.2 | HIGH | CWE-22 | 0.2% p36 | 5.04 | OneUptime is a solution for monitoring and managing online services. Prior to 10...OneUptime is a solution for monitoring and managing online services. Prior to 10.0.21, an unauthenticated path traversal in the /workflow/docs/:componentName endpoint allows reading arbitrary files from the server filesystem. The componentName route parameter is concatenated directly into a file path passed to res.sendFile() in orker/FeatureSet/Workflow/Index.ts with no sanitization or authentication middleware. This vulnerability is fixed in 10.0.21. |
2026-03-10 | |
| CVE-2026-30957 | 9.9 | CRITICAL | CWE-749 | 0.3% p50 | 6.94 | OneUptime is a solution for monitoring and managing online services. Prior to 10...OneUptime is a solution for monitoring and managing online services. Prior to 10.0.21, OneUptime Synthetic Monitors allow a low-privileged authenticated project user to execute arbitrary commands on the oneuptime-probe server/container. The root cause is that untrusted Synthetic Monitor code is executed inside Node's vm while live host-realm Playwright browser and page objects are exposed to it. A malicious user can call Playwright APIs on the injected browser object and cause the probe to spawn an attacker-controlled executable. This is a server-side remote code execution issue. It does not require a separate vm sandbox escape. This vulnerability is fixed in 10.0.21. |
2026-03-10 | |
| CVE-2026-30956 | 9.9 | CRITICAL | CWE-285 | 0.1% p16 | 6.93 | OneUptime is a solution for monitoring and managing online services. Prior to 10...OneUptime is a solution for monitoring and managing online services. Prior to 10.0.21, a low‑privileged user can bypass authorization and tenant isolation in OneUptime v10.0.20 and earlier by sending a forged is-multi-tenant-query header together with a controlled projectid header. Because the server trusts this client-supplied header, internal permission checks in BasePermission are skipped and tenant scoping is disabled. This allows attackers to access project data belonging to other tenants, read sensitive User fields via nested relations, leak plaintext resetPasswordToken, and reset the victim’s password and fully take over the account. This results in cross‑tenant data exposure and full account takeover. This vulnerability is fixed in 10.0.21. |
2026-03-10 | |
| CVE-2026-30945 | 7.1 | HIGH | CWE-639 | 0.0% p14 | 4.97 | StudioCMS is a server-side-rendered, Astro native, headless content management s...StudioCMS is a server-side-rendered, Astro native, headless content management system. Prior to 0.4.0, the DELETE /studiocms_api/dashboard/api-tokens endpoint allows any authenticated user with editor privileges or above to revoke API tokens belonging to any other user, including admin and owner accounts. The handler accepts tokenID and userID directly from the request payload without verifying token ownership, caller identity, or role hierarchy. This enables targeted denial of service against critical integrations and automations. This vulnerability is fixed in 0.4.0. |
2026-03-10 | |
| CVE-2026-30944 | 8.8 | HIGH | CWE-639 | 0.1% p15 | 6.16 | StudioCMS is a server-side-rendered, Astro native, headless content management s...StudioCMS is a server-side-rendered, Astro native, headless content management system. Prior to 0.4.0, the /studiocms_api/dashboard/api-tokens endpoint allows any authenticated user (at least Editor) to generate API tokens for any other user, including owner and admin accounts. The endpoint fails to validate whether the requesting user is authorized to create tokens on behalf of the target user ID, resulting in a full privilege escalation. This vulnerability is fixed in 0.4.0. |
2026-03-10 | |
| CVE-2026-30942 | 8.3 | HIGH | CWE-22 | 0.2% p42 | 5.82 | Flare is a Next.js-based, self-hostable file sharing platform that integrates wi...Flare is a Next.js-based, self-hostable file sharing platform that integrates with screenshot tools. Prior to 1.7.3, an authenticated path traversal vulnerability in /api/avatars/[filename] allows any logged-in user to read arbitrary files from within the application container. The filename URL parameter is passed to path.join() without sanitization, and getFileStream() performs no path validation, enabling %2F-encoded ../ sequences to escape the uploads/avatars/ directory and read any file accessible to the nextjs process under /app/. Authentication is enforced by Next.js middleware. However, on instances with open registration enabled (the default), any attacker can self-register and immediately exploit this. This vulnerability is fixed in 1.7.3. |
2026-03-10 | |
| CVE-2026-30941 | 8.7 | HIGH | CWE-943 | 0.1% p17 | 6.09 | Parse Server is an open source backend that can be deployed to any infrastructur...Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 8.6.14 and 9.5.2-alpha.1, NoSQL injection vulnerability allows an unauthenticated attacker to inject MongoDB query operators via the token field in the password reset and email verification resend endpoints. The token value is passed to database queries without type validation and can be used to extract password reset and email verification tokens. Any Parse Server deployment using MongoDB with email verification or password reset enabled is affected. When emailVerifyTokenReuseIfValid is configured, the email verification token can be fully extracted and used to verify a user's email address without inbox access. This vulnerability is fixed in 8.6.14 and 9.5.2-alpha.1. |
2026-03-10 | |
| CVE-2026-30939 | 8.8 | HIGH | CWE-1321 | 0.2% p38 | 6.17 | Parse Server is an open source backend that can be deployed to any infrastructur...Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 8.6.13 and 9.5.1-alpha.2, an unauthenticated attacker can crash the Parse Server process by calling a Cloud Function endpoint with a prototype property name as the function name. The server recurses infinitely, causing a call stack size error that terminates the process. Other prototype property names bypass Cloud Function dispatch validation and return HTTP 200 responses, even though no such Cloud Functions are defined. The same applies to dot-notation traversal. All Parse Server deployments that expose the Cloud Function endpoint are affected. This vulnerability is fixed in 8.6.13 and 9.5.1-alpha.2. |
2026-03-10 | |
| CVE-2026-30938 | 6.9 | MEDIUM | CWE-693 | 0.1% p19 | 4.83 | Parse Server is an open source backend that can be deployed to any infrastructur...Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 8.6.12 and 9.5.1-alpha.1, the requestKeywordDenylist security control can be bypassed by placing any nested object or array before a prohibited keyword in the request payload. This is caused by a logic bug that stops scanning sibling keys after encountering the first nested value. Any custom requestKeywordDenylist entries configured by the developer are equally by-passable using the same technique. All Parse Server deployments are affected. The requestKeywordDenylist is enabled by default. This vulnerability is fixed in 8.6.12 and 9.5.1-alpha.1. Use a Cloud Code beforeSave trigger to validate incoming data for prohibited keywords across all classes. |
2026-03-10 | |
| CVE-2026-30934 | 8.9 | HIGH | CWE-79 | 0.0% p10 | 6.23 | FileBrowser Quantum is a free, self-hosted, web-based file manager. Prior to 1.3...FileBrowser Quantum is a free, self-hosted, web-based file manager. Prior to 1.3.1-beta and 1.2.2-stable, Stored XSS is possible via share metadata fields (e.g., title, description) that are rendered into HTML for /public/share/<hash> without context-aware escaping. The server uses text/template instead of html/template, allowing injected scripts to execute when victims visit the share URL. This vulnerability is fixed in 1.3.1-beta and 1.2.2-stable. |
2026-03-10 | |
| CVE-2026-30933 | 7.5 | HIGH | CWE-200 | 0.1% p22 | 5.25 | FileBrowser Quantum is a free, self-hosted, web-based file manager. Prior to 1.3...FileBrowser Quantum is a free, self-hosted, web-based file manager. Prior to 1.3.1-beta and 1.2.2-stable, the remediation for CVE-2026-27611 is incomplete. Password protected shares still disclose tokenized downloadURL via /public/api/share/info. This vulnerability is fixed in 1.3.1-beta and 1.2.2-stable. |
2026-03-10 | |
| CVE-2026-30930 | 8.6 | HIGH | CWE-89 | 0.0% p8 | 6.02 | Glances is an open-source system cross-platform monitoring tool. Prior to 4.5.1,...Glances is an open-source system cross-platform monitoring tool. Prior to 4.5.1, The TimescaleDB export module constructs SQL queries using string concatenation with unsanitized system monitoring data. The normalize() method wraps string values in single quotes but does not escape embedded single quotes, making SQL injection trivial via attacker-controlled data such as process names, filesystem mount points, network interface names, or container names. This vulnerability is fixed in 4.5.1. |
2026-03-10 | |
| CVE-2026-30928 | 8.7 | HIGH | CWE-200 | 3.7% p87 | 6.20 | Glances is an open-source system cross-platform monitoring tool. Prior to 4.5.1,...Glances is an open-source system cross-platform monitoring tool. Prior to 4.5.1, the /api/4/config REST API endpoint returns the entire parsed Glances configuration file (glances.conf) via self.config.as_dict() with no filtering of sensitive values. The configuration file contains credentials for all configured backend services including database passwords, API tokens, JWT signing keys, and SSL key passwords. This vulnerability is fixed in 4.5.1. |
2026-03-10 | |
| CVE-2026-30897 | 6.6 | MEDIUM | CWE-121 | 0.0% p14 | 4.62 | A stack-based buffer overflow vulnerability in Fortinet FortiWeb 8.0.0 through 8...A stack-based buffer overflow vulnerability in Fortinet FortiWeb 8.0.0 through 8.0.3, FortiWeb 7.6.0 through 7.6.6, FortiWeb 7.4.0 through 7.4.11, FortiWeb 7.2 all versions, FortiWeb 7.0 all versions may allow a remote authenticated attacker who can bypass stack protection and ASLR to execute arbitrary code or commands via crafted HTTP requests. |
2026-03-10 | |
| CVE-2026-2724 | 7.2 | HIGH | CWE-79 | 0.1% p35 | 5.04 | The Unlimited Elements for Elementor plugin for WordPress is vulnerable to Store...The Unlimited Elements for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the form entry fields in all versions up to, and including, 2.0.5. This is due to insufficient input sanitization and output escaping on form submission data displayed in the admin Form Entries Trash view. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever an administrator views the trashed form entries. |
2026-03-10 | |
| CVE-2026-2339 | 7.5 | HIGH | CWE-306 | 0.2% p41 | 5.26 | Missing Authentication for Critical Function vulnerability in TUBITAK BILGEM Sof...Missing Authentication for Critical Function vulnerability in TUBITAK BILGEM Software Technologies Research Institute Liderahenk allows Remote Code Inclusion, Privilege Abuse, Command Injection.This issue affects Liderahenk: before 3.5.1. |
2026-03-10 | |
| CVE-2026-2273 | 7.2 | HIGH | CWE-94 | 0.0% p8 | 5.04 | CWE-94: Improper Control of Generation of Code ('Code Injection') vulnerability ...CWE-94: Improper Control of Generation of Code ('Code Injection') vulnerability exist that could cause execution of untrusted commands on the engineering workstation which could result in a limited compromise of the workstation and a potential loss of Confidentiality, Integrity and Availability of the subsequent system when an authenticated user opens a malicious project file. |
2026-03-10 | |
| CVE-2026-27661 | 5.3 | MEDIUM | CWE-1230 | 0.0% p9 | 3.71 | A vulnerability has been identified in SINEC Security Monitor (All versions < V4...A vulnerability has been identified in SINEC Security Monitor (All versions < V4.9.0). The affected application leaks confidential information in metadata, and files such as information on contributors and email address, on `SSM Server`. |
2026-03-10 | |
| CVE-2026-26738 | 7.8 | HIGH | CWE-121 | 0.1% p22 | 5.46 | Buffer Overflow vulnerability in Uderzo Software SpaceSniffer v.2.0.5.18 allows ...Buffer Overflow vulnerability in Uderzo Software SpaceSniffer v.2.0.5.18 allows a remote attacker to execute arbitrary code via a crafted .sns snapshot file. |
2026-03-10 | |
| CVE-2026-26148 | 8.1 | HIGH | CWE-454 | 0.1% p29 | 5.67 | External initialization of trusted variables or data stores in Azure Entra ID al...External initialization of trusted variables or data stores in Azure Entra ID allows an unauthorized attacker to elevate privileges locally. |
2026-03-10 | |
| CVE-2026-26144 | 7.5 | HIGH | CWE-79 | 0.1% p28 | 5.25 | Improper neutralization of input during web page generation ('cross-site scripti...Improper neutralization of input during web page generation ('cross-site scripting') in Microsoft Office Excel allows an unauthorized attacker to disclose information over a network. |
2026-03-10 | |
| CVE-2026-26141 | 7.8 | HIGH | CWE-287 | 0.1% p16 | 5.46 | Improper authentication in Azure Arc allows an authorized attacker to elevate pr...Improper authentication in Azure Arc allows an authorized attacker to elevate privileges locally. |
2026-03-10 | |
| CVE-2026-26134 | 7.8 | HIGH | CWE-190 | 0.1% p23 | 5.46 | Integer overflow or wraparound in Microsoft Office allows an authorized attacker...Integer overflow or wraparound in Microsoft Office allows an authorized attacker to elevate privileges locally. |
2026-03-10 | |
| CVE-2026-26132 | 7.8 | HIGH | CWE-416 | 0.1% p22 | 5.46 | Use after free in Windows Kernel allows an authorized attacker to elevate privil...Use after free in Windows Kernel allows an authorized attacker to elevate privileges locally. |
2026-03-10 | |
| CVE-2026-26131 | 7.8 | HIGH | CWE-276 | 0.0% p4 | 5.46 | Incorrect default permissions in .NET allows an authorized attacker to elevate p...Incorrect default permissions in .NET allows an authorized attacker to elevate privileges locally. |
2026-03-10 | |
| CVE-2026-26130 | 7.5 | HIGH | CWE-770 | 0.7% p71 | 5.27 | Allocation of resources without limits or throttling in ASP.NET Core allows an u...Allocation of resources without limits or throttling in ASP.NET Core allows an unauthorized attacker to deny service over a network. |
2026-03-10 | |
| CVE-2026-26128 | 7.8 | HIGH | CWE-287 | 0.1% p16 | 5.46 | Improper authentication in Windows SMB Server allows an authorized attacker to e...Improper authentication in Windows SMB Server allows an authorized attacker to elevate privileges locally. |
2026-03-10 | |
| CVE-2026-26127 | 7.5 | HIGH | CWE-125 | 0.1% p30 | 5.25 | Out-of-bounds read in .NET allows an unauthorized attacker to deny service over ...Out-of-bounds read in .NET allows an unauthorized attacker to deny service over a network. |
2026-03-10 | |
| CVE-2026-26121 | 7.5 | HIGH | CWE-20 | 0.2% p47 | 5.26 | Server-side request forgery (ssrf) in Azure IoT Explorer allows an unauthorized ...Server-side request forgery (ssrf) in Azure IoT Explorer allows an unauthorized attacker to perform spoofing over a network. |
2026-03-10 | |
| CVE-2026-26118 | 8.8 | HIGH | CWE-918 | 0.1% p24 | 6.16 | Server-side request forgery (ssrf) in Azure MCP Server allows an authorized atta...Server-side request forgery (ssrf) in Azure MCP Server allows an authorized attacker to elevate privileges over a network. |
2026-03-10 | |
| CVE-2026-26117 | 7.8 | HIGH | CWE-288 | 0.1% p16 | 5.46 | Authentication bypass using an alternate path or channel in Azure Windows Virtua...Authentication bypass using an alternate path or channel in Azure Windows Virtual Machine Agent allows an authorized attacker to elevate privileges locally. |
2026-03-10 | |
| CVE-2026-26116 | 8.8 | HIGH | CWE-89 | 0.1% p26 | 6.16 | Improper neutralization of special elements used in an sql command ('sql injecti...Improper neutralization of special elements used in an sql command ('sql injection') in SQL Server allows an authorized attacker to elevate privileges over a network. |
2026-03-10 | |
| CVE-2026-26115 | 8.8 | HIGH | CWE-1287 | 0.1% p30 | 6.16 | Improper validation of specified type of input in SQL Server allows an authorize...Improper validation of specified type of input in SQL Server allows an authorized attacker to elevate privileges over a network. |
2026-03-10 | |
| CVE-2026-26114 | 8.8 | HIGH | CWE-502 | 1.6% p81 | 6.21 | Deserialization of untrusted data in Microsoft Office SharePoint allows an autho...Deserialization of untrusted data in Microsoft Office SharePoint allows an authorized attacker to execute code over a network. |
2026-03-10 | |
| CVE-2026-26113 | 8.4 | HIGH | CWE-822 | 0.1% p17 | 5.88 | Untrusted pointer dereference in Microsoft Office allows an unauthorized attacke...Untrusted pointer dereference in Microsoft Office allows an unauthorized attacker to execute code locally. |
2026-03-10 | |
| CVE-2026-26112 | 7.8 | HIGH | CWE-822 | 0.1% p21 | 5.46 | Untrusted pointer dereference in Microsoft Office Excel allows an unauthorized a...Untrusted pointer dereference in Microsoft Office Excel allows an unauthorized attacker to execute code locally. |
2026-03-10 | |
| CVE-2026-26111 | 8.0 | HIGH | CWE-122 | 0.1% p23 | 5.60 | Integer overflow or wraparound in Windows Routing and Remote Access Service (RRA...Integer overflow or wraparound in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to execute code over a network. |
2026-03-10 | |
| CVE-2026-26110 | 8.4 | HIGH | CWE-843 | 0.1% p34 | 5.88 | Access of resource using incompatible type ('type confusion') in Microsoft Offic...Access of resource using incompatible type ('type confusion') in Microsoft Office allows an unauthorized attacker to execute code locally. |
2026-03-10 | |
| CVE-2026-26109 | 8.4 | HIGH | CWE-125 | 0.1% p17 | 5.88 | Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to ...Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to execute code locally. |
2026-03-10 | |
| CVE-2026-26108 | 7.8 | HIGH | CWE-122 | 0.1% p21 | 5.46 | Heap-based buffer overflow in Microsoft Office Excel allows an unauthorized atta...Heap-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally. |
2026-03-10 | |
| CVE-2026-26107 | 7.8 | HIGH | CWE-416 | 0.1% p21 | 5.46 | Use after free in Microsoft Office Excel allows an unauthorized attacker to exec...Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally. |
2026-03-10 | |
| CVE-2026-26106 | 8.8 | HIGH | CWE-20 | 0.1% p30 | 6.16 | Improper input validation in Microsoft Office SharePoint allows an authorized at...Improper input validation in Microsoft Office SharePoint allows an authorized attacker to execute code over a network. |
2026-03-10 | |
| CVE-2026-26105 | 8.1 | HIGH | CWE-79 | 0.1% p18 | 5.67 | Improper neutralization of input during web page generation ('cross-site scripti...Improper neutralization of input during web page generation ('cross-site scripting') in Microsoft Office SharePoint allows an unauthorized attacker to perform spoofing over a network. |
2026-03-10 | |
| CVE-2026-25972 | 4.3 | MEDIUM | CWE-79 | 0.1% p15 | 3.01 | An improper neutralization of input during web page generation ('cross-site scri...An improper neutralization of input during web page generation ('cross-site scripting') vulnerability in Fortinet FortiSIEM 7.4.0, FortiSIEM 7.3.0 through 7.3.4 may allow a remote unauthenticated attacker to provide arbitrary data enabling a social engineering attack via spoofed URL parameters. |
2026-03-10 | |
| CVE-2026-25836 | 7.2 | HIGH | CWE-78 | 0.1% p17 | 5.04 | An improper neutralization of special elements used in an os command ('os comman...An improper neutralization of special elements used in an os command ('os command injection') vulnerability in Fortinet FortiSandbox Cloud 5.0.4 may allow a privileged attacker with super-admin profile and CLI access to execute unauthorized code or commands via crafted HTTP requests. |
2026-03-10 | |
| CVE-2026-25689 | 6.5 | MEDIUM | CWE-88 | 0.1% p18 | 4.55 | An improper neutralization of argument delimiters in a command ('argument inject...An improper neutralization of argument delimiters in a command ('argument injection') vulnerability in Fortinet FortiDeceptor 6.2.0, FortiDeceptor 6.0 all versions, FortiDeceptor 5.3 all versions, FortiDeceptor 5.2 all versions, FortiDeceptor 5.1 all versions, FortiDeceptor 5.0 all versions, FortiDeceptor 4.3 all versions, FortiDeceptor 4.2 all versions, FortiDeceptor 4.1 all versions, FortiDeceptor 4.0 all versions may allow a privileged attacker with super-admin profile and CLI access to delete sensitive files via crafted HTTP requests. |
2026-03-10 | |
| CVE-2026-25605 | 5.9 | MEDIUM | CWE-73 | 0.0% p4 | 4.13 | A vulnerability has been identified in SICAM SIAPP SDK (All versions < V2.1.7). ...A vulnerability has been identified in SICAM SIAPP SDK (All versions < V2.1.7). The affected application performs file deletion without properly validating the file path or target. An attacker could delete files or sockets that the affected process has permission to remove, potentially resulting in denial of service or service disruption. |
2026-03-10 | |
| CVE-2026-25573 | 8.6 | HIGH | CWE-73 | 0.0% p7 | 6.02 | A vulnerability has been identified in SICAM SIAPP SDK (All versions < V2.1.7). ...A vulnerability has been identified in SICAM SIAPP SDK (All versions < V2.1.7). The affected application builds shell commands with caller-provided strings and executes them. An attacker could influence the executed command, potentially resulting in command injection and full system compromise. |
2026-03-10 | |
| CVE-2026-25572 | 5.9 | MEDIUM | CWE-130 | 0.0% p3 | 4.13 | A vulnerability has been identified in SICAM SIAPP SDK (All versions < V2.1.7). ...A vulnerability has been identified in SICAM SIAPP SDK (All versions < V2.1.7). The SICAM SIAPP SDK server component does not enforce maximum length checks on certain variables before use. This could allow an attacker to send an oversized input that could trigger a stack overflow crashing the process and potentially causing denial of service. |
2026-03-10 | |
| CVE-2026-25571 | 5.9 | MEDIUM | CWE-130 | 0.0% p3 | 4.13 | A vulnerability has been identified in SICAM SIAPP SDK (All versions < V2.1.7). ...A vulnerability has been identified in SICAM SIAPP SDK (All versions < V2.1.7). The SICAM SIAPP SDK client component does not enforce maximum length checks on certain variables before use. This could allow an attacker to send an oversized input that could trigger a stack overflow crashing the process and potentially causing denial of service. |
2026-03-10 | |
| CVE-2026-25570 | 7.5 | HIGH | CWE-121 | 0.0% p3 | 5.25 | A vulnerability has been identified in SICAM SIAPP SDK (All versions < V2.1.7). ...A vulnerability has been identified in SICAM SIAPP SDK (All versions < V2.1.7). The SICAM SIAPP SDK does not perform checks on input values potentially resulting in stack overflow. This could allow an attacker to perform code execution and denial of service. |
2026-03-10 | |
| CVE-2026-25569 | 7.5 | HIGH | CWE-787 | 0.0% p3 | 5.25 | A vulnerability has been identified in SICAM SIAPP SDK (All versions < V2.1.7). ...A vulnerability has been identified in SICAM SIAPP SDK (All versions < V2.1.7). An out-of-bounds write vulnerability exists in SICAM SIAPP SDK. This could allow an attacker to write data beyond the intended buffer, potentially leading to denial of service, or arbitrary code execution. |
2026-03-10 | |
| CVE-2026-25190 | 7.8 | HIGH | CWE-426 | 0.1% p19 | 5.46 | Untrusted search path in Windows GDI allows an unauthorized attacker to execute ...Untrusted search path in Windows GDI allows an unauthorized attacker to execute code locally. |
2026-03-10 | |
| CVE-2026-25189 | 7.8 | HIGH | CWE-416 | 0.1% p17 | 5.46 | Use after free in Windows DWM Core Library allows an authorized attacker to elev...Use after free in Windows DWM Core Library allows an authorized attacker to elevate privileges locally. |
2026-03-10 | |
| CVE-2026-25188 | 8.8 | HIGH | CWE-122 | 0.1% p28 | 6.16 | Heap-based buffer overflow in Windows Telephony Service allows an unauthorized a...Heap-based buffer overflow in Windows Telephony Service allows an unauthorized attacker to elevate privileges over an adjacent network. |
2026-03-10 | |
| CVE-2026-25187 | 7.8 | HIGH | CWE-59 | 0.1% p30 | 5.46 | Improper link resolution before file access ('link following') in Winlogon allow...Improper link resolution before file access ('link following') in Winlogon allows an authorized attacker to elevate privileges locally. |
2026-03-10 | |
| CVE-2026-25186 | 5.5 | MEDIUM | CWE-200 | 0.1% p15 | 3.85 | Exposure of sensitive information to an unauthorized actor in Windows Accessibil...Exposure of sensitive information to an unauthorized actor in Windows Accessibility Infrastructure (ATBroker.exe) allows an authorized attacker to disclose information locally. |
2026-03-10 | |
| CVE-2026-25185 | 5.3 | MEDIUM | CWE-200 | 0.1% p24 | 3.71 | Exposure of sensitive information to an unauthorized actor in Windows Shell Link...Exposure of sensitive information to an unauthorized actor in Windows Shell Link Processing allows an unauthorized attacker to perform spoofing over a network. |
2026-03-10 | |
| CVE-2026-25181 | 7.5 | HIGH | CWE-125 | 0.1% p26 | 5.25 | Out-of-bounds read in Windows GDI+ allows an unauthorized attacker to disclose i...Out-of-bounds read in Windows GDI+ allows an unauthorized attacker to disclose information over a network. |
2026-03-10 | |
| CVE-2026-25180 | 5.5 | MEDIUM | CWE-125 | 0.1% p15 | 3.85 | Out-of-bounds read in Microsoft Graphics Component allows an unauthorized attack...Out-of-bounds read in Microsoft Graphics Component allows an unauthorized attacker to disclose information locally. |
2026-03-10 | |
| CVE-2026-25179 | 7.0 | HIGH | CWE-1287 | 0.1% p18 | 4.90 | Improper validation of specified type of input in Windows Ancillary Function Dri...Improper validation of specified type of input in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally. |
2026-03-10 | |
| CVE-2026-25178 | 7.0 | HIGH | CWE-416 | 0.0% p11 | 4.90 | Use after free in Windows Ancillary Function Driver for WinSock allows an author...Use after free in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally. |
2026-03-10 | |
| CVE-2026-25177 | 8.8 | HIGH | CWE-641 | 0.1% p26 | 6.16 | Improper restriction of names for files and other resources in Active Directory ...Improper restriction of names for files and other resources in Active Directory Domain Services allows an authorized attacker to elevate privileges over a network. |
2026-03-10 | |
| CVE-2026-25176 | 7.8 | HIGH | CWE-284 | 0.1% p16 | 5.46 | Improper access control in Windows Ancillary Function Driver for WinSock allows ...Improper access control in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally. |
2026-03-10 | |
| CVE-2026-25175 | 7.8 | HIGH | CWE-125 | 0.1% p17 | 5.46 | Out-of-bounds read in Windows NTFS allows an authorized attacker to elevate priv...Out-of-bounds read in Windows NTFS allows an authorized attacker to elevate privileges locally. |
2026-03-10 | |
| CVE-2026-25174 | 7.8 | HIGH | CWE-125 | 0.1% p17 | 5.46 | Out-of-bounds read in Windows Extensible File Allocation allows an authorized at...Out-of-bounds read in Windows Extensible File Allocation allows an authorized attacker to elevate privileges locally. |
2026-03-10 | |
| CVE-2026-25173 | 8.0 | HIGH | CWE-122 | 0.1% p23 | 5.60 | Integer overflow or wraparound in Windows Routing and Remote Access Service (RRA...Integer overflow or wraparound in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to execute code over a network. |
2026-03-10 | |
| CVE-2026-25172 | 8.0 | HIGH | CWE-122 | 0.1% p23 | 5.60 | Integer overflow or wraparound in Windows Routing and Remote Access Service (RRA...Integer overflow or wraparound in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to execute code over a network. |
2026-03-10 | |
| CVE-2026-25171 | 7.0 | HIGH | CWE-416 | 0.0% p11 | 4.90 | Use after free in Windows Authentication Methods allows an authorized attacker t...Use after free in Windows Authentication Methods allows an authorized attacker to elevate privileges locally. |
2026-03-10 | |
| CVE-2026-25170 | 7.0 | HIGH | CWE-416 | 0.0% p11 | 4.90 | Use after free in Windows Hyper-V allows an authorized attacker to elevate privi...Use after free in Windows Hyper-V allows an authorized attacker to elevate privileges locally. |
2026-03-10 | |
| CVE-2026-25169 | 6.2 | MEDIUM | CWE-369 | 0.1% p18 | 4.34 | Divide by zero in Microsoft Graphics Component allows an unauthorized attacker t...Divide by zero in Microsoft Graphics Component allows an unauthorized attacker to deny service locally. |
2026-03-10 | |
| CVE-2026-25168 | 6.2 | MEDIUM | CWE-476 | 0.0% p14 | 4.34 | Null pointer dereference in Microsoft Graphics Component allows an unauthorized ...Null pointer dereference in Microsoft Graphics Component allows an unauthorized attacker to deny service locally. |
2026-03-10 | |
| CVE-2026-25167 | 7.4 | HIGH | CWE-416 | 0.0% p13 | 5.18 | Use after free in Microsoft Brokering File System allows an unauthorized attacke...Use after free in Microsoft Brokering File System allows an unauthorized attacker to elevate privileges locally. |
2026-03-10 | |
| CVE-2026-25166 | 7.8 | HIGH | CWE-502 | 0.5% p65 | 5.47 | Deserialization of untrusted data in Windows System Image Manager allows an auth...Deserialization of untrusted data in Windows System Image Manager allows an authorized attacker to execute code locally. |
2026-03-10 | |
| CVE-2026-25165 | 7.8 | HIGH | CWE-476 | 0.1% p17 | 5.46 | Null pointer dereference in Windows Performance Counters allows an authorized at...Null pointer dereference in Windows Performance Counters allows an authorized attacker to elevate privileges locally. |
2026-03-10 | |
| CVE-2026-24641 | 2.7 | LOW | CWE-476 | 0.2% p36 | 1.89 | A NULL Pointer Dereference vulnerability [CWE-476] vulnerability in Fortinet For...A NULL Pointer Dereference vulnerability [CWE-476] vulnerability in Fortinet FortiWeb 8.0.0 through 8.0.2, FortiWeb 7.6.0 through 7.6.6, FortiWeb 7.4 all versions, FortiWeb 7.2 all versions, FortiWeb 7.0 all versions may allow an authenticated attacker to crash the HTTP daemon via crafted HTTP requests. |
2026-03-10 | |
| CVE-2026-24640 | 6.6 | MEDIUM | CWE-121 | 0.0% p14 | 4.62 | A Stack-based Buffer Overflow vulnerability [CWE-121] vulnerability in Fortinet ...A Stack-based Buffer Overflow vulnerability [CWE-121] vulnerability in Fortinet FortiWeb 8.0.0 through 8.0.2, FortiWeb 7.6.0 through 7.6.6, FortiWeb 7.4 all versions, FortiWeb 7.2 all versions, FortiWeb 7.0.2 through 7.0.12 may allow a remote authenticated attacker who can bypass stack protection and ASLR to execute arbitrary code or commands via crafted HTTP requests. |
2026-03-10 | |
| CVE-2026-24297 | 6.5 | MEDIUM | CWE-362 | 0.0% p14 | 4.55 | Concurrent execution using shared resource with improper synchronization ('race ...Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Kerberos allows an unauthorized attacker to bypass a security feature over a network. |
2026-03-10 | |
| CVE-2026-24296 | 7.0 | HIGH | CWE-362 | 0.0% p10 | 4.90 | Concurrent execution using shared resource with improper synchronization ('race ...Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Device Association Service allows an authorized attacker to elevate privileges locally. |
2026-03-10 | |
| CVE-2026-24295 | 7.0 | HIGH | CWE-362 | 0.0% p10 | 4.90 | Concurrent execution using shared resource with improper synchronization ('race ...Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Device Association Service allows an authorized attacker to elevate privileges locally. |
2026-03-10 | |
| CVE-2026-24294 | 7.8 | HIGH | CWE-287 | 0.1% p23 | 5.46 | Improper authentication in Windows SMB Server allows an authorized attacker to e...Improper authentication in Windows SMB Server allows an authorized attacker to elevate privileges locally. |
2026-03-10 | |
| CVE-2026-24293 | 7.8 | HIGH | CWE-476 | 0.1% p17 | 5.46 | Null pointer dereference in Windows Ancillary Function Driver for WinSock allows...Null pointer dereference in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally. |
2026-03-10 | |
| CVE-2026-24292 | 7.8 | HIGH | CWE-416 | 0.1% p17 | 5.46 | Use after free in Connected Devices Platform Service (Cdpsvc) allows an authoriz...Use after free in Connected Devices Platform Service (Cdpsvc) allows an authorized attacker to elevate privileges locally. |
2026-03-10 | |
| CVE-2026-24291 | 7.8 | HIGH | CWE-732 | 0.1% p24 | 5.46 | Incorrect permission assignment for critical resource in Windows Accessibility I...Incorrect permission assignment for critical resource in Windows Accessibility Infrastructure (ATBroker.exe) allows an authorized attacker to elevate privileges locally. |
2026-03-10 | |
| CVE-2026-24290 | 7.8 | HIGH | CWE-284 | 0.1% p16 | 5.46 | Improper access control in Windows Projected File System allows an authorized at...Improper access control in Windows Projected File System allows an authorized attacker to elevate privileges locally. |
2026-03-10 | |
| CVE-2026-24289 | 7.8 | HIGH | CWE-416 | 0.1% p17 | 5.46 | Use after free in Windows Kernel allows an authorized attacker to elevate privil...Use after free in Windows Kernel allows an authorized attacker to elevate privileges locally. |
2026-03-10 | |
| CVE-2026-24288 | 6.8 | MEDIUM | CWE-122 | 0.1% p24 | 4.76 | Heap-based buffer overflow in Windows Mobile Broadband allows an unauthorized at...Heap-based buffer overflow in Windows Mobile Broadband allows an unauthorized attacker to execute code with a physical attack. |
2026-03-10 | |
| CVE-2026-24287 | 7.8 | HIGH | CWE-73 | 0.1% p24 | 5.46 | External control of file name or path in Windows Kernel allows an authorized att...External control of file name or path in Windows Kernel allows an authorized attacker to elevate privileges locally. |
2026-03-10 | |
| CVE-2026-24285 | 7.0 | HIGH | CWE-416 | 0.1% p17 | 4.90 | Use after free in Windows Win32K allows an authorized attacker to elevate privil...Use after free in Windows Win32K allows an authorized attacker to elevate privileges locally. |
2026-03-10 | |
| CVE-2026-24283 | 8.8 | HIGH | CWE-122 | 0.1% p17 | 6.16 | Heap-based buffer overflow in Windows File Server allows an authorized attacker ...Heap-based buffer overflow in Windows File Server allows an authorized attacker to elevate privileges locally. |
2026-03-10 | |
| CVE-2026-24282 | 5.5 | MEDIUM | CWE-125 | 0.0% p14 | 3.85 | Out-of-bounds read in Push Message Routing Service allows an authorized attacker...Out-of-bounds read in Push Message Routing Service allows an authorized attacker to disclose information locally. |
2026-03-10 | |
| CVE-2026-24018 | 7.8 | HIGH | CWE-61 | 0.0% p4 | 5.46 | A UNIX symbolic link (Symlink) following vulnerability in Fortinet FortiClientLi...A UNIX symbolic link (Symlink) following vulnerability in Fortinet FortiClientLinux 7.4.0 through 7.4.4, FortiClientLinux 7.2.2 through 7.2.12 may allow a local and unprivileged user to escalate their privileges to root. |
2026-03-10 | |
| CVE-2026-24017 | 8.1 | HIGH | CWE-799 | 0.1% p34 | 5.67 | An Improper Control of Interaction Frequency vulnerability [CWE-799] vulnerabili...An Improper Control of Interaction Frequency vulnerability [CWE-799] vulnerability in Fortinet FortiWeb 8.0.0 through 8.0.2, FortiWeb 7.6.0 through 7.6.5, FortiWeb 7.4.0 through 7.4.10, FortiWeb 7.2.0 through 7.2.11, FortiWeb 7.0.0 through 7.0.11 may allow a remote unauthenticated attacker to bypass the authentication rate-limit via crafted requests. The success of the attack depends on the attacker's resources and the password target complexity. |
2026-03-10 | |
| CVE-2026-23674 | 7.5 | HIGH | CWE-41 | 0.1% p34 | 5.25 | Improper resolution of path equivalence in Windows MapUrlToZone allows an unauth...Improper resolution of path equivalence in Windows MapUrlToZone allows an unauthorized attacker to bypass a security feature over a network. |
2026-03-10 | |
| CVE-2026-23673 | 7.8 | HIGH | CWE-125 | 0.1% p17 | 5.46 | Out-of-bounds read in Windows Resilient File System (ReFS) allows an authorized ...Out-of-bounds read in Windows Resilient File System (ReFS) allows an authorized attacker to elevate privileges locally. |
2026-03-10 | |
| CVE-2026-23672 | 7.8 | HIGH | CWE-125 | 0.1% p17 | 5.46 | Windows Universal Disk Format File System Driver (UDFS) Elevation of Privilege V...Windows Universal Disk Format File System Driver (UDFS) Elevation of Privilege Vulnerability |
2026-03-10 | |
| CVE-2026-23671 | 7.0 | HIGH | CWE-362 | 0.0% p10 | 4.90 | Concurrent execution using shared resource with improper synchronization ('race ...Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Bluetooth RFCOM Protocol Driver allows an authorized attacker to elevate privileges locally. |
2026-03-10 | |
| CVE-2026-23669 | 8.8 | HIGH | CWE-416 | 0.1% p25 | 6.16 | Use after free in RPC Runtime allows an authorized attacker to execute code over...Use after free in RPC Runtime allows an authorized attacker to execute code over a network. |
2026-03-10 | |
| CVE-2026-23668 | 7.0 | HIGH | CWE-362 | 0.0% p14 | 4.90 | Concurrent execution using shared resource with improper synchronization ('race ...Concurrent execution using shared resource with improper synchronization ('race condition') in Microsoft Graphics Component allows an authorized attacker to elevate privileges locally. |
2026-03-10 | |
| CVE-2026-23667 | 7.0 | HIGH | CWE-416 | 0.0% p11 | 4.90 | Use after free in Broadcast DVR allows an authorized attacker to elevate privile...Use after free in Broadcast DVR allows an authorized attacker to elevate privileges locally. |
2026-03-10 | |
| CVE-2026-23665 | 7.8 | HIGH | CWE-122 | 0.1% p17 | 5.46 | Heap-based buffer overflow in Azure Linux Virtual Machines allows an authorized ...Heap-based buffer overflow in Azure Linux Virtual Machines allows an authorized attacker to elevate privileges locally. |
2026-03-10 | |
| CVE-2026-23664 | 7.5 | HIGH | CWE-923 | 0.1% p28 | 5.25 | Improper restriction of communication channel to intended endpoints in Azure IoT...Improper restriction of communication channel to intended endpoints in Azure IoT Explorer allows an unauthorized attacker to disclose information over a network. |
2026-03-10 | |
| CVE-2026-23662 | 7.5 | HIGH | CWE-306 | 0.1% p18 | 5.25 | Missing authentication for critical function in Azure IoT Explorer allows an una...Missing authentication for critical function in Azure IoT Explorer allows an unauthorized attacker to disclose information over a network. |
2026-03-10 | |
| CVE-2026-23661 | 7.5 | HIGH | CWE-319 | 0.0% p13 | 5.25 | Cleartext transmission of sensitive information in Azure IoT Explorer allows an ...Cleartext transmission of sensitive information in Azure IoT Explorer allows an unauthorized attacker to disclose information over a network. |
2026-03-10 | |
| CVE-2026-23660 | 7.8 | HIGH | CWE-284 | 0.1% p16 | 5.46 | Improper access control in Azure Portal Windows Admin Center allows an authorize...Improper access control in Azure Portal Windows Admin Center allows an authorized attacker to elevate privileges locally. |
2026-03-10 | |
| CVE-2026-23656 | 5.9 | MEDIUM | CWE-345 | 0.0% p7 | 4.13 | Insufficient verification of data authenticity in Windows App Installer allows a...Insufficient verification of data authenticity in Windows App Installer allows an unauthorized attacker to perform spoofing over a network. |
2026-03-10 | |
| CVE-2026-23654 | 8.8 | HIGH | NVD-CWE-noinfo | 0.1% p21 | 6.16 | Dependency on vulnerable third-party component in GitHub Repo: zero-shot-scfound...Dependency on vulnerable third-party component in GitHub Repo: zero-shot-scfoundation allows an unauthorized attacker to execute code over a network. |
2026-03-10 | |
| CVE-2026-22629 | 3.7 | LOW | CWE-307 | 0.1% p17 | 2.59 | An improper restriction of excessive authentication attempts vulnerability in Fo...An improper restriction of excessive authentication attempts vulnerability in Fortinet FortiAnalyzer 7.6.0 through 7.6.4, FortiAnalyzer 7.4 all versions, FortiAnalyzer 7.2 all versions, FortiAnalyzer 7.0 all versions, FortiAnalyzer 6.4 all versions, FortiAnalyzer Cloud 7.6.0 through 7.6.4, FortiAnalyzer Cloud 7.4 all versions, FortiAnalyzer Cloud 7.2 all versions, FortiAnalyzer Cloud 7.0 all versions, FortiAnalyzer Cloud 6.4 all versions, FortiManager 7.6.0 through 7.6.4, FortiManager 7.4 all versions, FortiManager 7.2 all versions, FortiManager 7.0 all versions, FortiManager 6.4 all versions, FortiManager Cloud 7.6.0 through 7.6.4, FortiManager Cloud 7.4 all versions, FortiManager Cloud 7.2 all versions, FortiManager Cloud 7.0 all versions, FortiManager Cloud 6.4 all versions may allow an attacker to bypass bruteforce protections via exploitation of race conditions. The latter raises the complexity of practical exploitation. |
2026-03-10 | |
| CVE-2026-22628 | 5.3 | MEDIUM | CWE-284 | 0.0% p2 | 3.71 | An improper access control vulnerability in Fortinet FortiSwitchAXFixed 1.0.0 th...An improper access control vulnerability in Fortinet FortiSwitchAXFixed 1.0.0 through 1.0.1 may allow an authenticated admin to execute system commands via a specifically crafted SSH config file. |
2026-03-10 | |
| CVE-2026-22627 | 8.8 | HIGH | CWE-120 | 0.0% p9 | 6.16 | A buffer copy without checking size of input ('classic buffer overflow') vulnera...A buffer copy without checking size of input ('classic buffer overflow') vulnerability in Fortinet FortiSwitchAXFixed 1.0.0 through 1.0.1 may allow an unauthenticated attacker within the same adjacent network to execute unauthorized code or commands on the device via sending a crafted LLDP packet. |
2026-03-10 | |
| CVE-2026-22572 | 7.2 | HIGH | CWE-288 | 0.1% p26 | 5.04 | An authentication bypass using an alternate path or channel vulnerability in For...An authentication bypass using an alternate path or channel vulnerability in Fortinet FortiAnalyzer 7.6.0 through 7.6.3, FortiAnalyzer 7.4.0 through 7.4.7, FortiAnalyzer 7.2.2 through 7.2.11, FortiManager 7.6.0 through 7.6.3, FortiManager 7.4.0 through 7.4.7, FortiManager 7.2.2 through 7.2.11 may allow an attacker with knowledge of the admins password to bypass multifactor authentication checks via submitting multiple crafted requests. |
2026-03-10 | |
| CVE-2026-21791 | 3.3 | LOW | CWE-532 | 0.0% p3 | 2.31 | HCL Sametime for Android is impacted by a sensitive information disclosure. Hos...HCL Sametime for Android is impacted by a sensitive information disclosure. Hostnames information is written in application logs and certain URL |
2026-03-10 | |
| CVE-2026-21262 | 8.8 | HIGH | CWE-284 | 0.2% p35 | 6.16 | Improper access control in SQL Server allows an authorized attacker to elevate p...Improper access control in SQL Server allows an authorized attacker to elevate privileges over a network. |
2026-03-10 | |
| CVE-2026-20967 | 8.8 | HIGH | CWE-20 | 0.1% p30 | 6.16 | Improper input validation in System Center Operations Manager allows an authoriz...Improper input validation in System Center Operations Manager allows an authorized attacker to elevate privileges over a network. |
2026-03-10 | |
| CVE-2026-1286 | 7.0 | HIGH | CWE-502 | 0.3% p54 | 4.91 | CWE-502: Deserialization of untrusted data vulnerability exists that could lead ...CWE-502: Deserialization of untrusted data vulnerability exists that could lead to loss of confidentiality, integrity and potential remote code execution on workstation when an admin authenticated user opens a malicious project file. |
2026-03-10 | |
| CVE-2026-1261 | 7.2 | HIGH | CWE-79 | 0.1% p32 | 5.04 | The MetForm Pro plugin for WordPress is vulnerable to Stored Cross-Site Scriptin...The MetForm Pro plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Quiz feature in all versions up to, and including, 3.9.6 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-03-10 | |
| CVE-2025-70025 | 6.1 | MEDIUM | CWE-79 | 0.0% p9 | 4.27 | An issue pertaining to CWE-79: Improper Neutralization of Input During Web Page ...An issue pertaining to CWE-79: Improper Neutralization of Input During Web Page Generation was discovered in benkeen generatedata 4.0.14. |
2026-03-10 | |
| CVE-2025-69615 | 9.1 | CRITICAL | CWE-307 | 0.0% p3 | 6.37 | Incorrect Access Control via missing 2FA rate-limiting allowing unlimited brute-...Incorrect Access Control via missing 2FA rate-limiting allowing unlimited brute-force retries and full MFA bypass with no user interaction required. Affected Product: Deutsche Telekom AG Telekom Account Management Portal, versions before 2025-10-24, fixed 2025-11-03. |
2026-03-10 | |
| CVE-2025-69614 | 9.4 | CRITICAL | CWE-640 | 0.0% p5 | 6.58 | Incorrect Access Control via activation token reuse on the password-reset endpoi...Incorrect Access Control via activation token reuse on the password-reset endpoint allowing unauthorized password resets and full account takeover. Affected Product: Deutsche Telekom AG Telekom Account Management Portal, versions before 2025-10-27, fixed 2025-10-31. |
2026-03-10 | |
| CVE-2025-68648 | 7.2 | HIGH | CWE-134 | 0.1% p24 | 5.04 | A use of externally-controlled format string vulnerability in Fortinet FortiAnal...A use of externally-controlled format string vulnerability in Fortinet FortiAnalyzer 7.6.0 through 7.6.4, FortiAnalyzer 7.4.0 through 7.4.7, FortiAnalyzer 7.2 all versions, FortiAnalyzer 7.0 all versions, FortiAnalyzer Cloud 7.6.0 through 7.6.4, FortiAnalyzer Cloud 7.4.0 through 7.4.7, FortiAnalyzer Cloud 7.2 all versions, FortiAnalyzer Cloud 7.0 all versions, FortiManager 7.6.0 through 7.6.4, FortiManager 7.4.0 through 7.4.7, FortiManager 7.2 all versions, FortiManager 7.0 all versions, FortiManager Cloud 7.6.0 through 7.6.4, FortiManager Cloud 7.4.0 through 7.4.7, FortiManager Cloud 7.2 all versions, FortiManager Cloud 7.0 all versions may allow an attacker to escalate its privileges via specially crafted requests. |
2026-03-10 | |
| CVE-2025-68482 | 6.9 | MEDIUM | CWE-295 | 0.0% p4 | 4.83 | A improper certificate validation vulnerability in Fortinet FortiAnalyzer 7.6.0 ...A improper certificate validation vulnerability in Fortinet FortiAnalyzer 7.6.0 through 7.6.4, FortiAnalyzer 7.4.0 through 7.4.8, FortiAnalyzer 7.2 all versions, FortiAnalyzer 7.0 all versions, FortiAnalyzer 6.4 all versions, FortiManager 7.6.0 through 7.6.4, FortiManager 7.4.0 through 7.4.8, FortiManager 7.2 all versions, FortiManager 7.0 all versions, FortiManager 6.4 all versions may allow a remote unauthenticated attacker to view confidential information via a man in the middle [MiTM] attack. |
2026-03-10 | |
| CVE-2025-66178 | 7.2 | HIGH | CWE-78 | 0.0% p14 | 5.04 | A improper neutralization of special elements used in an os command ('os command...A improper neutralization of special elements used in an os command ('os command injection') vulnerability in Fortinet FortiWeb 8.0.0 through 8.0.1, FortiWeb 7.6.0 through 7.6.5, FortiWeb 7.4.0 through 7.4.11, FortiWeb 7.2.0 through 7.2.12, FortiWeb 7.0.0 through 7.0.12 may allow an authenticated attacked to execute arbitrary commands via a specialy crafted HTTP request. |
2026-03-10 | |
| CVE-2025-56422 | 9.8 | CRITICAL | CWE-502 | 0.2% p40 | 6.87 | A deserialization vulnerability in LimeSurvey before v6.15.0+250623 allows a rem...A deserialization vulnerability in LimeSurvey before v6.15.0+250623 allows a remote attacker to execute arbitrary code on the server. |
2026-03-10 | |
| CVE-2025-56421 | 7.5 | HIGH | CWE-89 | 0.0% p4 | 5.25 | SQL Injection vulnerability in LimeSurvey before v.6.15.4+250710 allows a remote...SQL Injection vulnerability in LimeSurvey before v.6.15.4+250710 allows a remote attacker to obtain sensitive information from the database. |
2026-03-10 | |
| CVE-2025-55717 | 4.0 | MEDIUM | CWE-312 | 0.0% p0 | 2.80 | A cleartext storage of sensitive information vulnerability [CWE-312] vulnerabili...A cleartext storage of sensitive information vulnerability [CWE-312] vulnerability in Fortinet FortiMail 7.6.0 through 7.6.2, FortiMail 7.4.0 through 7.4.4, FortiMail 7.2.0 through 7.2.7, FortiMail 7.0.0 through 7.0.8, FortiRecorder 7.2.0 through 7.2.3, FortiRecorder 7.0 all versions, FortiRecorder 6.4 all versions, FortiVoice 7.2.0, FortiVoice 7.0.0 through 7.0.6 may allow an authenticated malicious administrator to obtain user's secrets via CLI commands. Practical exploitability is limited by conditions out of the control of the attacker: An admin must log in to the targeted device. |
2026-03-10 | |
| CVE-2025-54820 | 8.1 | HIGH | CWE-121 | 0.1% p18 | 5.67 | A Stack-based Buffer Overflow vulnerability [CWE-121] vulnerability in Fortinet ...A Stack-based Buffer Overflow vulnerability [CWE-121] vulnerability in Fortinet FortiManager 7.4.0 through 7.4.2, FortiManager 7.2.0 through 7.2.10, FortiManager 6.4 all versions may allow a remote unauthenticated attacker to execute unauthorized commands via crafted requests, if the service is enabled. The success of the attack depends on the ability to bypass the stack protection mechanisms. |
2026-03-10 | |
| CVE-2025-54659 | 5.8 | MEDIUM | CWE-22 | 0.2% p36 | 4.06 | An Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'...An Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability [CWE-22] vulnerability in Fortinet FortiSOAR Agent Communication Bridge 1.1.0, FortiSOAR Agent Communication Bridge 1.0 all versions may allow an unauthenticated attacker to read files accessible to the fortisoar user on a system where the agent is deployed, via sending a crafted request to the agent port. |
2026-03-10 | |
| CVE-2025-53706 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none...Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2025. Notes: none. |
2026-03-10 | |
| CVE-2025-53608 | 4.8 | MEDIUM | CWE-79 | 0.0% p12 | 3.36 | An Improper Neutralization of Input During Web Page Generation ('Cross-site Scri...An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability [CWE-79] vulnerability in Fortinet FortiSandbox 5.0.0 through 5.0.2, FortiSandbox 4.4.0 through 4.4.7, FortiSandbox 4.2 all versions, FortiSandbox 4.0 all versions may allow an authenticated privileged attacker to execute code via crafted requests. |
2026-03-10 | |
| CVE-2025-49784 | 6.0 | MEDIUM | CWE-89 | 0.1% p16 | 4.20 | An improper neutralization of special elements used in an sql command ('sql inje...An improper neutralization of special elements used in an sql command ('sql injection') vulnerability in Fortinet FortiAnalyzer 7.6.0 through 7.6.4, FortiAnalyzer 7.4.0 through 7.4.7, FortiAnalyzer 7.2 all versions, FortiAnalyzer 7.0 all versions, FortiAnalyzer 6.4 all versions, FortiAnalyzer-BigData 7.6.0, FortiAnalyzer-BigData 7.4.0 through 7.4.4, FortiAnalyzer-BigData 7.2 all versions, FortiAnalyzer-BigData 7.0 all versions, FortiAnalyzer-BigData 6.4 all versions, FortiAnalyzer-BigData 6.2 all versions may allow an authenticated attacker to execute unauthorized code or commands via specifically crafted requests. |
2026-03-10 | |
| CVE-2025-48840 | 5.3 | MEDIUM | CWE-290 | 0.1% p26 | 3.71 | An authentication bypass by spoofing vulnerability in Fortinet FortiWeb 7.6.0 th...An authentication bypass by spoofing vulnerability in Fortinet FortiWeb 7.6.0 through 7.6.3, FortiWeb 7.4.0 through 7.4.8, FortiWeb 7.2 all versions, FortiWeb 7.0 all versions may allow a remote unauthenticated attacker to bypass hostname restrictions via a specially crafted request. |
2026-03-10 | |
| CVE-2025-48418 | 6.7 | MEDIUM | CWE-912 | 0.1% p28 | 4.69 | A hidden functionality vulnerability in Fortinet FortiAnalyzer 7.6.0 through 7.6...A hidden functionality vulnerability in Fortinet FortiAnalyzer 7.6.0 through 7.6.3, FortiAnalyzer 7.4.0 through 7.4.7, FortiAnalyzer 7.2.0 through 7.2.10, FortiAnalyzer 7.0.0 through 7.0.14, FortiAnalyzer 6.4 all versions, FortiAnalyzer Cloud 7.6.2, FortiAnalyzer Cloud 7.4.1 through 7.4.7, FortiAnalyzer Cloud 7.2.1 through 7.2.10, FortiAnalyzer Cloud 7.0.1 through 7.0.14, FortiAnalyzer Cloud 6.4 all versions, FortiManager 7.6.0 through 7.6.3, FortiManager 7.4.0 through 7.4.7, FortiManager 7.2.0 through 7.2.10, FortiManager 7.0.0 through 7.0.14, FortiManager 6.4 all versions, FortiManager Cloud 7.6.2 through 7.6.3, FortiManager Cloud 7.4.1 through 7.4.7, FortiManager Cloud 7.2.1 through 7.2.10, FortiManager Cloud 7.0.1 through 7.0.14, FortiManager Cloud 6.4 all versions may allow a remote authenticated read-only admin with CLI access to escalate their privilege via use of a hidden command. |
2026-03-10 | |
| CVE-2025-41712 | 6.5 | MEDIUM | CWE-732 | 0.0% p10 | 4.55 | An unauthenticated remote attacker who tricks a user to upload a manipulated HTM...An unauthenticated remote attacker who tricks a user to upload a manipulated HTML file can get access to sensitive information on the device. This is a result of incorrect permission assignment for the web server. |
2026-03-10 | |
| CVE-2025-41711 | 5.3 | MEDIUM | CWE-327 | 0.0% p4 | 3.71 | An unauthenticated remote attacker can use firmware images to extract password h...An unauthenticated remote attacker can use firmware images to extract password hashes and brute force plaintext passwords of accounts with limited access. |
2026-03-10 | |
| CVE-2025-41710 | 6.5 | MEDIUM | CWE-798 | 0.0% p12 | 4.55 | An unauthenticated remote attacker may use hardcodes credentials to get access t...An unauthenticated remote attacker may use hardcodes credentials to get access to the previously activated FTP Server with limited read and write privileges. |
2026-03-10 | |
| CVE-2025-41709 | 9.8 | CRITICAL | CWE-78 | 0.6% p68 | 6.88 | An unauthenticated remote attacker can perform a command injection via Modbus-TC...An unauthenticated remote attacker can perform a command injection via Modbus-TCP or Modbus-RTU to gain read and write access on the affected device. |
2026-03-10 | |
| CVE-2025-27769 | 2.4 | LOW | CWE-923 | 0.0% p5 | 1.68 | A vulnerability has been identified in Heliox Flex 180 kW EV Charging Station (A...A vulnerability has been identified in Heliox Flex 180 kW EV Charging Station (All versions < F4.11.1), Heliox Mobile DC 40 kW EV Charging Station (All versions < L4.10.1). Affected devices contain improper access control that could allow an attacker to reach unauthorized services via the charging cable. |
2026-03-10 | |
| CVE-2025-13957 | 7.5 | HIGH | CWE-798 | 0.5% p65 | 5.26 | CWE-798: Use of Hard-coded Credentials vulnerability exists that could cause inf...CWE-798: Use of Hard-coded Credentials vulnerability exists that could cause information disclosure and remote code execution when SOCKS Proxy is enabled, and administrator credentials and PostgreSQL database credentials are known. SOCKS Proxy is disabled by default. |
2026-03-10 | |
| CVE-2025-13902 | 5.1 | MEDIUM | CWE-79 | 0.1% p18 | 3.57 | CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site ...CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability exists that could cause condition where authenticated attackers can have a victim’s browser run arbitrary JavaScript when the victim hovers over a maliciously crafted element on a web server containing the injected payload. |
2026-03-10 | |
| CVE-2025-13901 | 6.9 | MEDIUM | CWE-404 | 0.1% p26 | 4.83 | CWE-404 Improper Resource Shutdown or Release vulnerability exists that could ca...CWE-404 Improper Resource Shutdown or Release vulnerability exists that could cause partial Denial of Service on Machine Expert protocol when an unauthenticated attacker sends malicious payload to occupy active communication channels. |
2026-03-10 | |
| CVE-2025-11739 | 8.5 | HIGH | CWE-502 | 0.1% p24 | 5.95 | CWE‑502: Deserialization of Untrusted Data vulnerability exists that could cause...CWE‑502: Deserialization of Untrusted Data vulnerability exists that could cause arbitrary code execution with administrative privileges when a locally authenticated attacker sends a crafted data stream, triggering unsafe deserialization. |
2026-03-10 | |
| CVE-2022-4977 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This can...Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage. |
2026-03-10 | |
| CVE-2026-3585 | 7.5 | HIGH | CWE-22 | 0.1% p22 | 5.25 | The The Events Calendar plugin for WordPress is vulnerable to Path Traversal in ...The The Events Calendar plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 6.15.17 via the 'ajax_create_import' function. This makes it possible for authenticated attackers, with Author-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information. |
2026-03-10 | |
| CVE-2026-30927 | 5.3 | MEDIUM | CWE-639 | 0.0% p3 | 3.71 | Admidio is an open-source user management solution. Prior to 5.0.6, in modules/e...Admidio is an open-source user management solution. Prior to 5.0.6, in modules/events/events_function.php, the event participation logic allows any user who can participate in an event to register OTHER users by manipulating the user_uuid GET parameter. The condition uses || (OR), meaning if possibleToParticipate() returns true (event is open for participation), ANY user - not just leaders - can specify a different user_uuid and register/cancel participation for that user. The code then operates on $user->getValue('usr_id') (the target user from user_uuid) rather than the current user. This vulnerability is fixed in 5.0.6. |
2026-03-10 | |
| CVE-2026-30925 | 8.2 | HIGH | CWE-1333 | 0.0% p5 | 5.74 | Parse Server is an open source backend that can be deployed to any infrastructur...Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.5.0-alpha.14 and 8.6.11, a malicious client can subscribe to a LiveQuery with a crafted $regex pattern that causes catastrophic backtracking, blocking the Node.js event loop. This makes the entire Parse Server unresponsive, affecting all clients. Any Parse Server deployment with LiveQuery enabled is affected. The attacker only needs the application ID and JavaScript key, both of which are public in client-side apps. This only affects LiveQuery subscription matching, which evaluates regex in JavaScript on the Node.js event loop. Normal REST and GraphQL queries are not affected because their regex is evaluated by the database engine. This vulnerability is fixed in 9.5.0-alpha.14 and 8.6.11. |
2026-03-10 | |
| CVE-2026-30921 | 9.9 | CRITICAL | CWE-749 | 0.0% p5 | 6.93 | OneUptime is a solution for monitoring and managing online services. Prior to 10...OneUptime is a solution for monitoring and managing online services. Prior to 10.0.20, OneUptime Synthetic Monitors allow low-privileged project users to submit custom Playwright code that is executed on the oneuptime-probe service. In the current implementation, this untrusted code is run inside Node's vm and is given live host Playwright objects such as browser and page. This creates a distinct server-side RCE primitive: the attacker does not need the classic this.constructor.constructor(...) sandbox escape. Instead, the attacker can directly use the injected Playwright browser object to reach browser.browserType().launch(...) and spawn an arbitrary executable on the probe host/container. This vulnerability is fixed in 10.0.20. |
2026-03-10 | |
| CVE-2026-30920 | 8.6 | HIGH | CWE-345 | 0.0% p0 | 6.02 | OneUptime is a solution for monitoring and managing online services. Prior to 10...OneUptime is a solution for monitoring and managing online services. Prior to 10.0.19, OneUptime's GitHub App callback trusts attacker-controlled state and installation_id values and updates Project.gitHubAppInstallationId with isRoot: true without validating that the caller is authorized for the target project. This allows an attacker to overwrite another project's GitHub App installation binding. Related GitHub endpoints also lack effective authorization, so a valid installation ID can be used to enumerate repositories and create CodeRepository records in an arbitrary project. This vulnerability is fixed in 10.0.19. |
2026-03-10 | |
| CVE-2026-30919 | 7.6 | HIGH | CWE-79 | 0.0% p13 | 5.32 | facileManager is a modular suite of web apps built with the sysadmin in mind. Pr...facileManager is a modular suite of web apps built with the sysadmin in mind. Prior to 6.0.4 , stored XSS (also known as persistent or second-order XSS) occurs when an application receives data from an untrusted source and includes that data in its subsequent HTTP responses in an unsafe manner. This vulnerability was found in the fmDNS module. This vulnerability is fixed in 6.0.4. |
2026-03-10 | |
| CVE-2026-30918 | 7.6 | HIGH | CWE-79 | 0.0% p13 | 5.32 | facileManager is a modular suite of web apps built with the sysadmin in mind. Pr...facileManager is a modular suite of web apps built with the sysadmin in mind. Prior to 6.0.4 , a reflected XSS occurs when an application receives data from an untrusted source and uses it in its HTTP responses in a way that could lead to vulnerabilities. It is possible to inject malicious JavaScript code into a URL by adding a script in a parameter. This vulnerability was found in the fmDNS module. The parameter that is vulnerable to an XSS attack is log_search_query. This vulnerability is fixed in 6.0.4. |
2026-03-10 | |
| CVE-2026-30917 | 8.8 | HIGH | CWE-79 | 0.1% p19 | 6.16 | Bucket is a MediaWiki extension to store and retrieve structured data on article...Bucket is a MediaWiki extension to store and retrieve structured data on articles. Prior to 2.1.1, a stored XSS can be inserted into any Bucket table field that has a PAGE type, which will execute whenever a user views that table's corresponding Bucket namespace page. This vulnerability is fixed in 2.1.1. |
2026-03-10 | |
| CVE-2026-30916 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: Further ...Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: Further investigation determined that the software behavior described did not falls within the project's threat model. See https://github.com/github/advisory-database/pull/7206 for more information. |
2026-03-10 | |
| CVE-2026-30913 | 4.6 | MEDIUM | CWE-79 | 0.0% p9 | 3.22 | Flarum is open-source forum software. When the flarum/nicknames extension is ena...Flarum is open-source forum software. When the flarum/nicknames extension is enabled, a registered user can set their nickname to a string that email clients interpret as a hyperlink. The nickname is inserted verbatim into plain-text notification emails, and recipients may be misled into visiting attacker-controlled domains. |
2026-03-10 | |
| CVE-2026-30887 | 9.9 | CRITICAL | CWE-94 | 0.1% p19 | 6.93 | OneUptime is a solution for monitoring and managing online services. Prior to 10...OneUptime is a solution for monitoring and managing online services. Prior to 10.0.18, OneUptime allows project members to run custom Playwright/JavaScript code via Synthetic Monitors to test websites. However, the system executes this untrusted user code inside the insecure Node.js vm module. By leveraging a standard prototype-chain escape (this.constructor.constructor), an attacker can bypass the sandbox, gain access to the underlying Node.js process object, and execute arbitrary system commands (RCE) on the oneuptime-probe container. Furthermore, because the probe holds database/cluster credentials in its environment variables, this directly leads to a complete cluster compromise. This vulnerability is fixed in 10.0.18. |
2026-03-10 | |
| CVE-2026-30885 | 5.5 | MEDIUM | CWE-306 | 0.1% p29 | 3.85 | WWBN AVideo is an open source video platform. Prior to 25.0, the /objects/playli...WWBN AVideo is an open source video platform. Prior to 25.0, the /objects/playlistsFromUser.json.php endpoint returns all playlists for any user without requiring authentication or authorization. An unauthenticated attacker can enumerate user IDs and retrieve playlist information including playlist names, video IDs, and playlist status for any user on the platform. This vulnerability is fixed in 25.0. |
2026-03-10 | |
| CVE-2026-30870 | 6.5 | MEDIUM | CWE-285 | 0.0% p10 | 4.55 | PowerSync Service is the server-side component of the PowerSync sync engine. In ...PowerSync Service is the server-side component of the PowerSync sync engine. In version 1.20.0, when using new sync streams with config.edition: 3, certain subquery filters were ignored when determining which data to sync to users. Depending on the sync stream configuration, this could result in authenticated users syncing data that should have been restricted. Only queries that gate synchronization using subqueries without partitioning the result set are affected. This vulnerability is fixed in 1.20.1. |
2026-03-10 | |
| CVE-2026-30869 | 9.3 | CRITICAL | CWE-22 | 0.5% p65 | 6.52 | SiYuan is a personal knowledge management system. Prior to 3.5.10, a path traver...SiYuan is a personal knowledge management system. Prior to 3.5.10, a path traversal vulnerability in the /export endpoint allows an attacker to read arbitrary files from the server filesystem. By exploiting double‑encoded traversal sequences, an attacker can access sensitive files such as conf/conf.json, which contains secrets including the API token, cookie signing key, and workspace access authentication code. Leaking these secrets may enable administrative access to the SiYuan kernel API, and in certain deployment scenarios could potentially be chained into remote code execution (RCE). This vulnerability is fixed in 3.5.10. |
2026-03-10 | |
| CVE-2026-30862 | 9.0 | CRITICAL | CWE-79 | 0.1% p16 | 6.30 | Appsmith is a platform to build admin panels, internal tools, and dashboards. Pr...Appsmith is a platform to build admin panels, internal tools, and dashboards. Prior to 1.96, a Critical Stored XSS vulnerability exists in the Table Widget (TableWidgetV2). The root cause is a lack of HTML sanitization in the React component rendering pipeline, allowing malicious attributes to be interpolated into the DOM. By leveraging the "Invite Users" feature, an attacker with a regular user account (user@gmail.com) can force a System Administrator to execute a high-privileged API call (/api/v1/admin/env), resulting in a Full Administrative Account Takeover. This vulnerability is fixed in 1.96. |
2026-03-10 | |
| CVE-2026-2364 | 7.3 | HIGH | CWE-367 | 0.0% p2 | 5.11 | If a legitimate user confirms a self-update prompt or initiate an installation o...If a legitimate user confirms a self-update prompt or initiate an installation of a CODESYS Development System, a low privileged local attacker can gain elevated rights due to a TOCTOU vulnerability in the CODESYS installer. |
2026-03-10 | |
| CVE-2026-28513 | 8.5 | HIGH | CWE-863 | 0.0% p2 | 5.95 | Pocket ID is an OIDC provider that allows users to authenticate with their passk...Pocket ID is an OIDC provider that allows users to authenticate with their passkeys to your services. Prior to 2.4.0, the OIDC token endpoint rejects an authorization code only when both the client ID is wrong and the code is expired. This allows cross-client code exchange and expired code reuse. This vulnerability is fixed in 2.4.0. |
2026-03-10 | |
| CVE-2026-28512 | 7.1 | HIGH | CWE-601 | 0.0% p2 | 4.97 | Pocket ID is an OIDC provider that allows users to authenticate with their passk...Pocket ID is an OIDC provider that allows users to authenticate with their passkeys to your services. From 2.0.0 to before 2.4.0, a flaw in callback URL validation allowed crafted redirect_uri values containing URL userinfo (@) to bypass legitimate callback pattern checks. If an attacker can trick a user into opening a malicious authorization link, the authorization code may be redirected to an attacker-controlled host. This vulnerability is fixed in 2.4.0. |
2026-03-10 | |
| CVE-2026-28281 | 7.1 | HIGH | CWE-352 | 0.0% p4 | 4.97 | InstantCMS is a free and open source content management system. Prior to 2.18.1,...InstantCMS is a free and open source content management system. Prior to 2.18.1, InstantCMS does not validate CSRF tokens, which allows attackers grant moderator privileges to users, execute scheduled tasks, move posts to trash, and accept friend requests on behalf of the user. This vulnerability is fixed in 2.18.1. |
2026-03-10 | |
| CVE-2026-28267 | 6.8 | MEDIUM | CWE-276 | 0.0% p3 | 4.76 | Multiple i-フィルター products are configured with improper file access permission se...Multiple i-フィルター products are configured with improper file access permission settings. Files may be created or overwritten in the system directory or backup directory by a non-administrative user. |
2026-03-10 | |
| CVE-2026-27689 | 7.7 | HIGH | CWE-606 | 0.1% p24 | 5.39 | Due to an uncontrolled resource consumption (Denial of Service) vulnerability, a...Due to an uncontrolled resource consumption (Denial of Service) vulnerability, an authenticated attacker with regular user privileges and network access can repeatedly invoke a remote-enabled function module with an excessively large loop-control parameter. This triggers prolonged loop execution that consumes excessive system resources, potentially rendering the system unavailable. Successful exploitation results in a denial-of-service condition that impacts availability, while confidentiality and integrity remain unaffected. |
2026-03-10 | |
| CVE-2026-27688 | 5.0 | MEDIUM | CWE-862 | 0.0% p9 | 3.50 | Due to a missing authorization check in SAP NetWeaver Application Server for ABA...Due to a missing authorization check in SAP NetWeaver Application Server for ABAP, an authenticated attacker with user privileges could read Database Analyzer Log Files via a specific RFC function module. The attacker with the necessary privileges to execute this function module could potentially escalate their privileges and read the sensitive data, resulting in a limited impact on the confidentiality of the information stored. However, the integrity and availability of the system are not affected. |
2026-03-10 | |
| CVE-2026-27687 | 5.8 | MEDIUM | CWE-862 | 0.0% p11 | 4.06 | Due to missing authorization check in SAP S/4HANA HCM Portugal and SAP ERP HCM P...Due to missing authorization check in SAP S/4HANA HCM Portugal and SAP ERP HCM Portugal, a user with high privileges could access sensitive data belonging to another company. This vulnerability has a high impact on confidentiality and does not affect integrity and availability. |
2026-03-10 | |
| CVE-2026-27686 | 5.9 | MEDIUM | CWE-862 | 0.0% p14 | 4.13 | Due to a Missing Authorization Check in SAP Business Warehouse (Service API), an...Due to a Missing Authorization Check in SAP Business Warehouse (Service API), an authenticated attacker could perform unauthorized actions via an affected RFC function module. Successful exploitation could enable unauthorized configuration and control changes, potentially disrupting request processing and causing denial of service. This results in low impact on integrity and high impact on availability, while confidentiality remains unaffected. |
2026-03-10 | |
| CVE-2026-27685 | 9.1 | CRITICAL | CWE-502 | 0.1% p19 | 6.37 | SAP NetWeaver Enterprise Portal Administration is vulnerable if a privileged use...SAP NetWeaver Enterprise Portal Administration is vulnerable if a privileged user uploads untrusted or malicious content that, upon deserialization, could result in a high impact on the confidentiality, integrity, and availability of the host system. |
2026-03-10 | |
| CVE-2026-27684 | 6.4 | MEDIUM | CWE-89 | 0.0% p12 | 4.48 | SAP NetWeaver Feedback Notifications Service contains a SQL injection vulnerabil...SAP NetWeaver Feedback Notifications Service contains a SQL injection vulnerability that allows an authenticated attacker to inject arbitrary SQL code through user-controlled input fields. The application concatenates these inputs directly into SQL queries without proper validation or escaping. As a result, an attacker can manipulate the WHERE clause logic and potentially gain unauthorized access to or modify database information. This vulnerability has no impact on integrity and low impact on the confidentiality and availability of the application. |
2026-03-10 | |
| CVE-2026-24317 | 5.0 | MEDIUM | CWE-427 | 0.0% p13 | 3.50 | SAP GUI for Windows allows DLL files to be loaded from arbitrary directories wit...SAP GUI for Windows allows DLL files to be loaded from arbitrary directories within the application. An unauthenticated attacker could exploit this vulnerability by persuading a victim to place a malicious DLL within one of these directories. The malicious command is executed in the victim user's context provided GuiXT is enabled. This vulnerability has a low impact on confidentiality, integrity, and availability. |
2026-03-10 | |
| CVE-2026-24316 | 6.4 | MEDIUM | CWE-918 | 0.0% p9 | 4.48 | SAP NetWeaver Application Server for ABAP provides an ABAP Report for testing pu...SAP NetWeaver Application Server for ABAP provides an ABAP Report for testing purposes, which allows to send HTTP requests to arbitrary internal or external endpoints. The report is therefore vulnerable to Server-Side Request Forgery (SSRF). Successful exploitation could lead to interaction with potentially sensitive internal endpoints, resulting in a low impact on data confidentiality and integrity. There is no impact on availability of the application. |
2026-03-10 | |
| CVE-2026-24313 | 5.0 | MEDIUM | CWE-862 | 0.0% p9 | 3.50 | SAP Solution Tools Plug-In (ST-PI) contains a function module that does not perf...SAP Solution Tools Plug-In (ST-PI) contains a function module that does not perform the necessary authorization checks for authenticated users, allowing system information to be disclosed. This vulnerability has a low impact on confidentiality and does not affect integrity or availability. |
2026-03-10 | |
| CVE-2026-24311 | 5.6 | MEDIUM | CWE-312 | 0.0% p0 | 3.92 | The SAP Customer Checkout application exhibits certain design characteristics th...The SAP Customer Checkout application exhibits certain design characteristics that involve locally storing operational data using reversible protection mechanisms. Access to this data, combined with user?initiated interaction, may allow modifications to occur without validation. Such changes could affect system behaviour during startup, resulting in a high impact on the application's confidentiality and integrity, with a low impact on availability. |
2026-03-10 | |
| CVE-2026-24310 | 3.5 | LOW | CWE-862 | 0.0% p9 | 2.45 | Due to missing authorization check in SAP NetWeaver Application Server for ABAP,...Due to missing authorization check in SAP NetWeaver Application Server for ABAP, an authenticated attacker could execute specific ABAP function module and read the sensitive information from database catalog of the ABAP system. This vulnerability has low impact on the application's confidentiality with no effect on the integrity and availability. |
2026-03-10 | |
| CVE-2026-24309 | 6.4 | MEDIUM | CWE-862 | 0.0% p13 | 4.48 | Due to missing authorization check in SAP NetWeaver Application Server for ABAP,...Due to missing authorization check in SAP NetWeaver Application Server for ABAP, an authenticated attacker could execute specific ABAP function module to read, modify or insert entries into the database configuration table of the ABAP system. This unauthorized content change could lead to reduced system performance or interruptions. The vulnerability has low impact on the application's integrity and availability, with no effect on confidentiality. |
2026-03-10 | |
| CVE-2026-1920 | 5.3 | MEDIUM | CWE-306 | 0.1% p20 | 3.71 | The Booking Calendar for Appointments and Service Businesses – Booktics plugin f...The Booking Calendar for Appointments and Service Businesses – Booktics plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'Extension_Controller::update_item_permissions_check' function in all versions up to, and including, 1.0.16. This makes it possible for unauthenticated attackers to install addon plugins. |
2026-03-10 | |
| CVE-2026-1919 | 5.3 | MEDIUM | CWE-306 | 0.0% p15 | 3.71 | The Booking Calendar for Appointments and Service Businesses – Booktics plugin f...The Booking Calendar for Appointments and Service Businesses – Booktics plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on multiple REST API endpoints in all versions up to, and including, 1.0.16. This makes it possible for unauthenticated attackers to query sensitive data. |
2026-03-10 | |
| CVE-2026-1508 | 4.3 | MEDIUM | CWE-352 | 0.0% p0 | 3.01 | The Court Reservation WordPress plugin before 1.10.9 does not have CSRF check i...The Court Reservation WordPress plugin before 1.10.9 does not have CSRF check in place when deleting events, which could allow attackers to make a logged in admin delete them via a CSRF attack |
2026-03-10 | |
| CVE-2026-0953 | 9.8 | CRITICAL | CWE-287 | 0.1% p25 | 6.86 | The Tutor LMS Pro plugin for WordPress is vulnerable to authentication bypass in...The Tutor LMS Pro plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 3.9.5 via the Social Login addon. This is due to the plugin failing to verify that the email provided in the authentication request matches the email from the validated OAuth token. This makes it possible for unauthenticated attackers to log in as any existing user, including administrators, by supplying a valid OAuth token from their own account along with the victim's email address. |
2026-03-10 | |
| CVE-2026-0489 | 6.1 | MEDIUM | CWE-79 | 0.0% p13 | 4.27 | Due to insufficient validation of user-controlled input in the URLs query parame...Due to insufficient validation of user-controlled input in the URLs query parameter. SAP Business One Job Service could allow an unauthenticated attacker to inject specially crafted input which upon user interaction could result in a DOM-based Cross-Site Scripting (XSS) vulnerability. This issue had a low impact on the confidentiality and integrity of the application with no impact on availability. |
2026-03-10 | |
| CVE-2025-36173 | 6.1 | MEDIUM | CWE-79 | 0.0% p8 | 4.27 | Affected Product(s)Version(s)InfoSphere Data Architect9.2.1Affected Product(s)Version(s)InfoSphere Data Architect9.2.1 |
2026-03-10 | |
| CVE-2025-36105 | 4.4 | MEDIUM | CWE-526 | 0.0% p2 | 3.08 | IBM Planning Analytics Advanced Certified Containers 3.1.0 through 3.1.4 could a...IBM Planning Analytics Advanced Certified Containers 3.1.0 through 3.1.4 could allow a local privileged user to obtain sensitive information from environment variables. |
2026-03-10 | |
| CVE-2025-2399 | 5.9 | MEDIUM | CWE-1285 | 0.1% p22 | 4.13 | Improper Validation of Specified Index, Position, or Offset in Input vulnerabili...Improper Validation of Specified Index, Position, or Offset in Input vulnerability in Mitsubishi Electric CNC M800V Series M800VW and M800VS, M80V Series M80V and M80VW, M800 Series M800W and M800S, M80 Series M80 and M80W, E80 Series E80, C80 Series C80, M700V Series M750VW, M720VW, 730VW, M720VS, M730VS, and M750VS, M70V Series M70V, E70 Series E70, and Software Tools NC Trainer2 and NC Trainer2 plus allows a remote attacker to cause an out-of-bounds read, resulting in a denial-of-service condition by sending specially crafted packets to TCP port 683. |
2026-03-10 | |
| CVE-2025-11158 | 9.1 | CRITICAL | CWE-862 | 0.0% p4 | 6.37 | Hitachi Vantara Pentaho Data Integration & Analytics versions before 10.2.0.6, i...Hitachi Vantara Pentaho Data Integration & Analytics versions before 10.2.0.6, including 9.3.x and 8.3.x, do not restrict Groovy scripts in new PRPT reports published by users, allowing insertion of arbitrary scripts and leading to a RCE. |
2026-03-10 | |
| CVE-2026-31802 | 8.2 | HIGH | CWE-22 | 0.0% p0 | 5.74 | node-tar is a full-featured Tar for Node.js. Prior to version 7.5.11, tar (npm) ...node-tar is a full-featured Tar for Node.js. Prior to version 7.5.11, tar (npm) can be tricked into creating a symlink that points outside the extraction directory by using a drive-relative symlink target such as C:../../../target.txt, which enables file overwrite outside cwd during normal tar.x() extraction. This vulnerability is fixed in 7.5.11. |
2026-03-10 | |
| CVE-2026-30937 | 6.8 | MEDIUM | CWE-122 | 0.0% p3 | 4.76 | ImageMagick is free and open-source software used for editing and manipulating d...ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, a 32-bit unsigned integer overflow in the XWD (X Windows) encoder can cause an undersized heap buffer allocation. When writing a extremely large image an out of bounds heap write can occur. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41. |
2026-03-10 | |
| CVE-2026-30936 | 5.5 | MEDIUM | CWE-122 | 0.0% p5 | 3.85 | ImageMagick is free and open-source software used for editing and manipulating d...ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, a crafted image could cause an out of bounds heap write inside the WaveletDenoiseImage method. When processing a crafted image with the -wavelet-denoise operation an out of bounds write can occur. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41. |
2026-03-10 | |
| CVE-2026-30935 | 4.4 | MEDIUM | CWE-125 | 0.0% p2 | 3.08 | ImageMagick is free and open-source software used for editing and manipulating d...ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16, BilateralBlurImage contains a heap buffer over-read caused by an incorrect conversion. When processing a crafted image with the -bilateral-blur operation an out of bounds read can occur. This vulnerability is fixed in 7.1.2-16. |
2026-03-10 | |
| CVE-2026-30931 | 6.8 | MEDIUM | CWE-122 | 0.0% p3 | 4.76 | ImageMagick is free and open-source software used for editing and manipulating d...ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16, a heap-based buffer overflow in the UHDR encoder can happen due to truncation of a value and it would allow an out of bounds write. This vulnerability is fixed in 7.1.2-16. |
2026-03-10 | |
| CVE-2026-30929 | 7.7 | HIGH | CWE-121 | 0.0% p3 | 5.39 | ImageMagick is free and open-source software used for editing and manipulating d...ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, MagnifyImage uses a fixed-size stack buffer. When using a specific image it is possible to overflow this buffer and corrupt the stack. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41. |
2026-03-10 | |
| CVE-2026-30926 | 7.1 | HIGH | CWE-284 | 0.0% p2 | 4.97 | SiYuan is a personal knowledge management system. Prior to 3.5.10, a privilege e...SiYuan is a personal knowledge management system. Prior to 3.5.10, a privilege escalation vulnerability exists in the publish service of SiYuan Note that allows low-privilege publish accounts (RoleReader) to modify notebook content via the /api/block/appendHeadingChildren API endpoint. The endpoint requires only the model.CheckAuth role, which accepts RoleReader sessions, but it does not enforce stricter checks, such as CheckAdminRole or CheckReadonly. This allows remote authenticated publish users with read-only privileges to append new blocks to existing documents, compromising the integrity of stored notes. |
2026-03-10 | |
| CVE-2026-30883 | 5.7 | MEDIUM | CWE-119 | 0.0% p0 | 3.99 | ImageMagick is free and open-source software used for editing and manipulating d...ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, an extremely large image profile could result in a heap overflow when encoding a PNG image. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41. |
2026-03-10 | |
| CVE-2026-28693 | 8.1 | HIGH | CWE-125 | 0.1% p20 | 5.67 | ImageMagick is free and open-source software used for editing and manipulating d...ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, an integer overflow in DIB coder can result in out of bounds read or write. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41. |
2026-03-10 | |
| CVE-2026-28692 | 4.8 | MEDIUM | CWE-125 | 0.0% p6 | 3.36 | ImageMagick is free and open-source software used for editing and manipulating d...ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, MAT decoder uses 32-bit arithmetic due to incorrect parenthesization resulting in a heap over-read. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41. |
2026-03-10 | |
| CVE-2026-28691 | 7.5 | HIGH | CWE-252 | 0.1% p18 | 5.25 | ImageMagick is free and open-source software used for editing and manipulating d...ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, an uninitialized pointer dereference vulnerability exists in the JBIG decoder due to a missing check. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41. |
2026-03-10 | |
| CVE-2026-28690 | 6.9 | MEDIUM | CWE-121 | 0.0% p2 | 4.83 | ImageMagick is free and open-source software used for editing and manipulating d...ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, a stack buffer overflow vulnerability exists in the MNG encoder. There is a bounds checks missing that could corrupting the stack with attacker-controlled data. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41. |
2026-03-10 | |
| CVE-2026-28689 | 6.3 | MEDIUM | CWE-59 | 0.0% p0 | 4.41 | ImageMagick is free and open-source software used for editing and manipulating d...ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, domain="path" authorization is checked before final file open/use. A symlink swap between check-time and use-time bypasses policy-denied read/write. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41. |
2026-03-10 | |
| CVE-2026-28688 | 4.0 | MEDIUM | CWE-416 | 0.0% p13 | 2.80 | ImageMagick is free and open-source software used for editing and manipulating d...ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, a heap-use-after-free vulnerability exists in the MSL encoder, where a cloned image is destroyed twice. The MSL coder does not support writing MSL so the write capability has been removed. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41. |
2026-03-10 | |
| CVE-2026-28687 | 5.3 | MEDIUM | CWE-416 | 0.1% p18 | 3.71 | ImageMagick is free and open-source software used for editing and manipulating d...ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, a heap use-after-free vulnerability in ImageMagick's MSL decoder allows an attacker to trigger access to freed memory by crafting an MSL file. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41. |
2026-03-10 | |
| CVE-2026-28686 | 6.8 | MEDIUM | CWE-122 | 0.0% p4 | 4.76 | ImageMagick is free and open-source software used for editing and manipulating d...ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, A heap-buffer-overflow vulnerability exists in the PCL encode due to an undersized output buffer allocation. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41. |
2026-03-10 | |
| CVE-2026-28494 | 7.1 | HIGH | CWE-121 | 0.0% p3 | 4.97 | ImageMagick is free and open-source software used for editing and manipulating d...ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, a stack buffer overflow exists in ImageMagick's morphology kernel parsing functions. User-controlled kernel strings exceeding a buffer are copied into fixed-size stack buffers via memcpy without bounds checking, resulting in stack corruption. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41. |
2026-03-10 | |
| CVE-2026-28493 | 6.5 | MEDIUM | CWE-190 | 0.1% p18 | 4.55 | ImageMagick is free and open-source software used for editing and manipulating d...ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16, an integer overflow vulnerability exists in the SIXEL decoer. The vulnerability allows an attacker to perform an out of bounds via a specially crafted image. This vulnerability is fixed in 7.1.2-16. |
2026-03-10 | |
| CVE-2026-28433 | 2.3 | LOW | CWE-639 | 0.0% p1 | 1.61 | Misskey is an open source, federated social media platform. All Misskey servers ...Misskey is an open source, federated social media platform. All Misskey servers running versions 10.93.0 and later, but prior to 2026.3.1, contain a vulnerability that allows importing other users' data due to lack of ownership validation. The impact of this vulnerability is estimated to be relatively low, as bad actors would require the ID corresponding to the target file for import. This vulnerability is fixed in 2026.3.1. |
2026-03-10 | |
| CVE-2026-28432 | 7.1 | HIGH | CWE-347 | 0.0% p4 | 4.97 | Misskey is an open source, federated social media platform. All Misskey servers ...Misskey is an open source, federated social media platform. All Misskey servers prior to 2026.3.1 contain a vulnerability that allows bypassing HTTP signature verification. Although this is a vulnerability related to federation, it affects all servers regardless of whether federation is enabled or disabled. This vulnerability is fixed in 2026.3.1. |
2026-03-10 | |
| CVE-2026-28431 | 9.2 | CRITICAL | CWE-285 | 0.0% p14 | 6.44 | Misskey is an open source, federated social media platform. All Misskey servers ...Misskey is an open source, federated social media platform. All Misskey servers running versions 8.45.0 and later, but prior to 2026.3.1, contain a vulnerability that allows bad actors access to data that they ordinarily wouldn't be able to access due to insufficient permission checks and proper input validation. This vulnerability occurs regardless of whether federation is enabled or not. This vulnerability could lead to a significant data breach. This vulnerability is fixed in 2026.3.1. |
2026-03-10 | |
| CVE-2026-26982 | 6.3 | MEDIUM | CWE-78 | 0.0% p11 | 4.41 | Ghostty is a cross-platform terminal emulator. Ghostty allows control characters...Ghostty is a cross-platform terminal emulator. Ghostty allows control characters such as 0x03 (Ctrl+C) in pasted and dropped text. These can be used to execute arbitrary commands in some shell environments. This attack requires an attacker to convince the user to copy and paste or drag and drop malicious text. The attack requires user interaction to be triggered, but the dangerous characters are invisible in most GUI environments so it isn't trivially detected, especially if the string contents are complex. Fixed in Ghostty v1.3.0. |
2026-03-10 | |
| CVE-2026-1776 | 6.0 | MEDIUM | CWE-22 | 0.1% p25 | 4.20 | Camaleon CMS versions 2.4.5.0 through 2.9.0, prior to commit f54a77e, contain a ...Camaleon CMS versions 2.4.5.0 through 2.9.0, prior to commit f54a77e, contain a path traversal vulnerability in the AWS S3 uploader implementation that allows authenticated users to read arbitrary files from the web server’s filesystem. The issue occurs in the download_private_file functionality when the application is configured to use the CamaleonCmsAwsUploader backend. Unlike the local uploader implementation, the AWS uploader does not validate file paths with valid_folder_path?, allowing directory traversal sequences to be supplied via the file parameter. As a result, any authenticated user, including low-privileged registered users, can access sensitive files such as /etc/passwd. This issue represents a bypass of the incomplete fix for CVE-2024-46987 and affects deployments using the AWS S3 storage backend. |
2026-03-10 | |
| CVE-2026-3288 | 8.8 | HIGH | CWE-20 | 0.1% p16 | 6.16 | A security issue was discovered in ingress-nginx where the `nginx.ingress.kubern...A security issue was discovered in ingress-nginx where the `nginx.ingress.kubernetes.io/rewrite-target` Ingress annotation can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.) |
2026-03-09 | |
| CVE-2026-31816 | 9.1 | CRITICAL | CWE-74 | 9.1% p92 | 6.64 | Budibase is a low code platform for creating internal tools, workflows, and admi...Budibase is a low code platform for creating internal tools, workflows, and admin panels. In 3.31.4 and earlier, the Budibase server's authorized() middleware that protects every server-side API endpoint can be completely bypassed by appending a webhook path pattern to the query string of any request. The isWebhookEndpoint() function uses an unanchored regex that tests against ctx.request.url, which in Koa includes the full URL with query parameters. When the regex matches, the authorized() middleware immediately calls return next(), skipping all authentication, authorization, role checks, and CSRF protection. This means a completely unauthenticated, remote attacker can access any server-side API endpoint by simply appending ?/webhooks/trigger (or any webhook pattern variant) to the URL. |
2026-03-09 | |
| CVE-2026-30240 | 9.6 | CRITICAL | CWE-22 | 0.0% p11 | 6.72 | Budibase is a low code platform for creating internal tools, workflows, and admi...Budibase is a low code platform for creating internal tools, workflows, and admin panels. In 3.31.5 and earlier, a path traversal vulnerability in the PWA (Progressive Web App) ZIP processing endpoint (POST /api/pwa/process-zip) allows an authenticated user with builder privileges to read arbitrary files from the server filesystem, including /proc/1/environ which contains all environment variables — JWT secrets, database credentials, encryption keys, and API tokens. The server reads attacker-specified files via unsanitized path.join() with user-controlled input from icons.json inside the uploaded ZIP, then uploads the file contents to the object store (MinIO/S3) where they can be retrieved through signed URLs. This results in complete platform compromise as all cryptographic secrets and service credentials are exfiltrated in a single request. |
2026-03-09 | |
| CVE-2026-25960 | 7.1 | HIGH | CWE-918 | 0.0% p6 | 4.97 | vLLM is an inference and serving engine for large language models (LLMs). The SS...vLLM is an inference and serving engine for large language models (LLMs). The SSRF protection fix for CVE-2026-24779 add in 0.15.1 can be bypassed in the load_from_url_async method due to inconsistent URL parsing behavior between the validation layer and the actual HTTP client. The SSRF fix uses urllib3.util.parse_url() to validate and extract the hostname from user-provided URLs. However, load_from_url_async uses aiohttp for making the actual HTTP requests, and aiohttp internally uses the yarl library for URL parsing. This vulnerability in 0.17.0. |
2026-03-09 | |
| CVE-2026-25737 | 8.9 | HIGH | CWE-602 | 0.1% p18 | 6.23 | Budibase is a low code platform for creating internal tools, workflows, and admi...Budibase is a low code platform for creating internal tools, workflows, and admin panels. In 3.24.0 and earlier, an arbitrary file upload vulnerability exists even though file extension restrictions are configured. The restriction is enforced only at the UI level. An attacker can bypass these restrictions and upload malicious files. |
2026-03-09 | |
| CVE-2026-25045 | 8.7 | HIGH | CWE-862 | 0.0% p13 | 6.09 | Budibase is a low code platform for creating internal tools, workflows, and admi...Budibase is a low code platform for creating internal tools, workflows, and admin panels. This issue is a combination of Vertical Privilege Escalation and IDOR (Insecure Direct Object Reference) due to missing server-side RBAC checks in the /api/global/users endpoints. A Creator-level user, who should have no permissions to manage users or organizational roles, can instead promote an App Viewer to Tenant Admin, demote a Tenant Admin to App Viewer, or modify the Owner’s account details and all orders (e.g., change name). This is because the API accepts these actions without validating the requesting role, a Creator can replay Owner-only requests using their own session tokens. This leads to full tenant compromise. |
2026-03-09 | |
| CVE-2025-70973 | 4.8 | MEDIUM | CWE-384 | 0.1% p17 | 3.36 | ScadaBR 1.12.4 is vulnerable to Session Fixation. The application assigns a JSES...ScadaBR 1.12.4 is vulnerable to Session Fixation. The application assigns a JSESSIONID session cookie to unauthenticated users and does not regenerate the session identifier after successful authentication. As a result, a session created prior to login becomes authenticated once the victim logs in, allowing an attacker who knows the session ID to hijack an authenticated session. |
2026-03-09 | |
| CVE-2025-70028 | 7.5 | HIGH | CWE-22 | 0.1% p20 | 5.25 | An issue pertaining to CWE-22: Improper Limitation of a Pathname to a Restricted...An issue pertaining to CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') was discovered in Sunbird-Ed SunbirdEd-portal v1.13.4. |
2026-03-09 | |
| CVE-2025-15603 | 6.3 | MEDIUM | CWE-310 | 0.0% p12 | 4.41 | A security vulnerability has been detected in open-webui up to 0.6.16. Affected ...A security vulnerability has been detected in open-webui up to 0.6.16. Affected is an unknown function of the file backend/start_windows.bat of the component JWT Key Handler. Such manipulation of the argument WEBUI_SECRET_KEY leads to insufficiently random values. It is possible to launch the attack remotely. The attack requires a high level of complexity. The exploitability is told to be difficult. The exploit has been disclosed publicly and may be used. |
2026-03-09 | |
| CVE-2026-25041 | 8.6 | HIGH | CWE-78 | 0.1% p18 | 6.02 | Budibase is a low code platform for creating internal tools, workflows, and admi...Budibase is a low code platform for creating internal tools, workflows, and admin panels. In 3.23.22 and earlier, the PostgreSQL integration constructs shell commands using user-controlled configuration values (database name, host, password, etc.) without proper sanitization. The password and other connection parameters are directly interpolated into a shell command. This affects packages/server/src/integrations/postgres.ts. |
2026-03-09 | |
| CVE-2026-0846 | 8.6 | HIGH | CWE-36 | 0.1% p29 | 6.02 | A vulnerability in the `filestring()` function of the `nltk.util` module in nltk...A vulnerability in the `filestring()` function of the `nltk.util` module in nltk version 3.9.2 allows arbitrary file read due to improper validation of input paths. The function directly opens files specified by user input without sanitization, enabling attackers to access sensitive system files by providing absolute paths or traversal paths. This vulnerability can be exploited locally or remotely, particularly in scenarios where the function is used in web APIs or other interfaces that accept user-supplied input. |
2026-03-09 | |
| CVE-2025-70031 | 8.8 | HIGH | CWE-352 | 0.0% p7 | 6.16 | An issue pertaining to CWE-352: Cross-Site Request Forgery was discovered in Sun...An issue pertaining to CWE-352: Cross-Site Request Forgery was discovered in Sunbird-Ed SunbirdEd-portal v1.13.4. |
2026-03-09 | |
| CVE-2025-70030 | 7.5 | HIGH | CWE-1333 | 0.1% p17 | 5.25 | An issue pertaining to CWE-1333: Inefficient Regular Expression Complexity (4.19...An issue pertaining to CWE-1333: Inefficient Regular Expression Complexity (4.19) was discovered in Sunbird-Ed SunbirdEd-portal v1.13.4. |
2026-03-09 | |
| CVE-2025-68402 | 8.2 | HIGH | CWE-287 | 0.1% p18 | 5.74 | FreshRSS is a free, self-hostable RSS aggregator. From 57e1a37 - 00f2f04, the le...FreshRSS is a free, self-hostable RSS aggregator. From 57e1a37 - 00f2f04, the lengths of the nonce was changed from 40 chars to 64. password_verify() is currently being called with a constructed string (SHA-256 nonce + part of a bcrypt hash) instead of the raw user password. Due to bcrypt’s 72-byte input truncation, this causes password verification to succeed even when the user enters an incorrect password. This vulnerability is fixed in 1.27.2-dev (476e57b). The issue was only present in the edge branch and never in a stable release. |
2026-03-09 | |
| CVE-2025-62166 | 7.5 | HIGH | CWE-284 | 0.2% p37 | 5.25 | FreshRSS is a free, self-hostable RSS aggregator. Prior 1.28.0, a bug in the aut...FreshRSS is a free, self-hostable RSS aggregator. Prior 1.28.0, a bug in the auth logic related to master authentication tokens, this restriction is bypassed. Usually only the default user's feed should be viewable if anonymous viewing is enabled, and feeds of other users should be private. This vulnerability is fixed in 1.28.0. |
2026-03-09 | |
| CVE-2026-3638 | 5.9 | MEDIUM | CWE-862 | 0.0% p9 | 4.13 | Improper access control in user and role restore API endpoints in Devolutions Se...Improper access control in user and role restore API endpoints in Devolutions Server 2025.3.11.0 and earlier allows a low-privileged authenticated user to restore deleted users and roles via crafted API requests. |
2026-03-09 | |
| CVE-2026-30140 | 7.5 | HIGH | CWE-284 | 0.1% p19 | 5.25 | An incorrect access control vulnerability exists in Tenda W15E V02.03.01.26_cn. ...An incorrect access control vulnerability exists in Tenda W15E V02.03.01.26_cn. An unauthenticated attacker can access the /cgi-bin/DownloadCfg/RouterCfm.jpg endpoint to download the configuration file containing plaintext administrator credentials, leading to sensitive information disclosure and potential remote administrative access. |
2026-03-09 | |
| CVE-2025-70032 | 6.1 | MEDIUM | CWE-601 | 0.0% p12 | 4.27 | An issue pertaining to CWE-601: URL Redirection to Untrusted Site was discovered...An issue pertaining to CWE-601: URL Redirection to Untrusted Site was discovered in Sunbird-Ed SunbirdEd-portal v1.13.4. |
2026-03-09 | |
| CVE-2026-29023 | 6.9 | MEDIUM | CWE-798 | 0.1% p16 | 4.83 | Keygraph Shannon contains a hard-coded API key in its router configuration that,...Keygraph Shannon contains a hard-coded API key in its router configuration that, when the router component is enabled and exposed, allows network attackers to authenticate using the publicly known static key. An attacker able to reach the router port can proxy requests through the Shannon instance using the victim’s configured upstream provider API credentials, resulting in unauthorized API usage and potential disclosure of proxied request and response data. This vulnerability's general exploitability has been mitigated with the introduction of commit 023cc95. |
2026-03-09 | |
| CVE-2025-70039 | 9.8 | CRITICAL | CWE-78 | 0.1% p20 | 6.86 | An issue pertaining to CWE-78: Improper Neutralization of Special Elements used ...An issue pertaining to CWE-78: Improper Neutralization of Special Elements used in an OS Command was discovered in linagora Twake v2023.Q1.1223. |
2026-03-09 | |
| CVE-2025-70038 | 8.8 | HIGH | CWE-79 | 0.1% p21 | 6.16 | An issue pertaining to CWE-79: Improper Neutralization of Input During Web Page ...An issue pertaining to CWE-79: Improper Neutralization of Input During Web Page Generation was discovered in linagora Twake v2023.Q1.1223. This allows attackers to execute arbitrary code. |
2026-03-09 | |
| CVE-2025-70034 | 7.5 | HIGH | CWE-1333 | 0.1% p16 | 5.25 | An issue pertaining to CWE-1333: Inefficient Regular Expression Complexity (4.19...An issue pertaining to CWE-1333: Inefficient Regular Expression Complexity (4.19) was discovered in mscdex ssh2 v1.17.0. |
2026-03-09 | |
| CVE-2025-70033 | 5.4 | MEDIUM | CWE-79 | 0.0% p2 | 3.78 | An issue pertaining to CWE-79: Improper Neutralization of Input During Web Page ...An issue pertaining to CWE-79: Improper Neutralization of Input During Web Page Generation was discovered in Sunbird-Ed SunbirdEd-portal v1.13.4. |
2026-03-09 | |
| CVE-2025-70037 | 6.1 | MEDIUM | CWE-601 | 0.0% p14 | 4.27 | An issue pertaining to CWE-601: URL Redirection to Untrusted Site was discovered...An issue pertaining to CWE-601: URL Redirection to Untrusted Site was discovered in linagora Twake v2023.Q1.1223. This allows attackers to obtain sensitive information and execute arbitrary code. |
2026-03-09 | |
| CVE-2026-3588 | 7.5 | HIGH | CWE-918 | 0.0% p11 | 5.25 | A server-side request forgery (SSRF) vulnerability in IKEA Dirigera v2.866.4 all...A server-side request forgery (SSRF) vulnerability in IKEA Dirigera v2.866.4 allows an attacker to exfiltrate private keys by sending a crafted request. |
2026-03-09 | |
| CVE-2026-25866 | 8.5 | HIGH | CWE-428 | 0.0% p3 | 5.95 | MobaXterm versions prior to 26.1 contain an uncontrolled search path element vul...MobaXterm versions prior to 26.1 contain an uncontrolled search path element vulnerability. The application calls WinExec to execute Notepad++ without a fully qualified executable path when opening remote files. An attacker can exploit the search path behavior by placing a malicious executable earlier in the search order, resulting in arbitrary code execution in the context of the affected user. |
2026-03-09 | |
| CVE-2025-70060 | 5.4 | MEDIUM | CWE-79 | 0.0% p13 | 3.78 | An issue pertaining to CWE-79: Improper Neutralization of Input During Web Page ...An issue pertaining to CWE-79: Improper Neutralization of Input During Web Page Generation was discovered in YMFE yapi v1.12.0. |
2026-03-09 | |
| CVE-2025-70050 | 6.5 | MEDIUM | CWE-312 | 0.0% p5 | 4.55 | An issue pertaining to CWE-312: Cleartext Storage of Sensitive Information was d...An issue pertaining to CWE-312: Cleartext Storage of Sensitive Information was discovered in lesspass lesspass v9.6.9 which allows attackers to obtain sensitive information. |
2026-03-09 | |
| CVE-2025-70048 | 7.5 | HIGH | CWE-319 | 0.0% p4 | 5.25 | An issue pertaining to CWE-319: Cleartext Transmission of Sensitive Information ...An issue pertaining to CWE-319: Cleartext Transmission of Sensitive Information was discovered in Nexusoft NexusInterface v3.2.0-beta.2. |
2026-03-09 | |
| CVE-2025-70047 | 7.5 | HIGH | CWE-400 | 0.1% p17 | 5.25 | An issue pertaining to CWE-400: Uncontrolled Resource Consumption was discovered...An issue pertaining to CWE-400: Uncontrolled Resource Consumption was discovered in Nexusoft NexusInterface v3.2.0-beta.2. |
2026-03-09 | |
| CVE-2025-70046 | 9.8 | CRITICAL | CWE-829 | 0.1% p18 | 6.86 | An issue pertaining to CWE-829: Inclusion of Functionality from Untrusted Contro...An issue pertaining to CWE-829: Inclusion of Functionality from Untrusted Control Sphere was discovered in Miazzy oa-front-service master. |
2026-03-09 | |
| CVE-2025-70042 | 9.8 | CRITICAL | CWE-918 | 0.1% p18 | 6.86 | An issue pertaining to CWE-918: Server-Side Request Forgery was discovered in os...An issue pertaining to CWE-918: Server-Side Request Forgery was discovered in oslabs-beta ThermaKube master. |
2026-03-09 | |
| CVE-2025-70040 | 5.3 | MEDIUM | CWE-532 | 0.0% p11 | 3.71 | An issue pertaining to CWE-532: Insertion of Sensitive Information into Log File...An issue pertaining to CWE-532: Insertion of Sensitive Information into Log File was discovered in LupinLin1 jimeng-web-mcp v2.1.2. This allows an attacker to obtain sensitive information. |
2026-03-09 | |
| CVE-2025-70250 | 7.5 | HIGH | CWE-121 | 0.1% p20 | 5.25 | Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime para...Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formdumpeasysetup. |
2026-03-09 | |
| CVE-2025-70243 | 7.5 | HIGH | CWE-121 | 0.1% p20 | 5.25 | Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime para...Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSetWAN_Wizard534. |
2026-03-09 | |
| CVE-2025-70238 | 7.5 | HIGH | CWE-121 | 0.1% p20 | 5.25 | Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime para...Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSetWAN_Wizard52. |
2026-03-09 | |
| CVE-2025-70059 | 7.5 | HIGH | CWE-400 | 0.1% p17 | 5.25 | An issue pertaining to CWE-400: Uncontrolled Resource Consumption was discovered...An issue pertaining to CWE-400: Uncontrolled Resource Consumption was discovered in YMFE yapi v1.12.0 and allows attackers to cause a denial of service. |
2026-03-09 | |
| CVE-2025-69648 | 6.2 | MEDIUM | CWE-835 | 0.0% p3 | 4.34 | GNU Binutils thru 2.45.1 readelf contains a denial-of-service vulnerability when...GNU Binutils thru 2.45.1 readelf contains a denial-of-service vulnerability when processing a crafted binary with malformed DWARF .debug_rnglists data. A logic flaw in the DWARF parsing path causes readelf to repeatedly print the same warning message without making forward progress, resulting in a non-terminating output loop that requires manual interruption. No evidence of memory corruption or code execution was observed. |
2026-03-09 | |
| CVE-2025-69647 | 6.2 | MEDIUM | CWE-835 | 0.0% p4 | 4.34 | GNU Binutils thru 2.45.1 readelf contains a denial-of-service vulnerability when...GNU Binutils thru 2.45.1 readelf contains a denial-of-service vulnerability when processing a crafted binary with malformed DWARF loclists data. A logic flaw in the DWARF parsing code can cause readelf to repeatedly print the same table output without making forward progress, resulting in an unbounded output loop that never terminates unless externally interrupted. A local attacker can trigger this behavior by supplying a malicious input file, causing excessive CPU and I/O usage and preventing readelf from completing its analysis. |
2026-03-09 | |
| CVE-2026-3089 | 5.3 | MEDIUM | CWE-22 | 0.0% p3 | 3.71 | Actual Sync Server allows authenticated users to upload files through POST /sync...Actual Sync Server allows authenticated users to upload files through POST /sync/upload-user-file. In versions prior to 26.3.0, improper validation of the user-controlled x-actual-file-id header means that traversal segments (../) can escape the intended directory and write files outside userFiles.This issue affects prior versions of Actual Sync Server 26.3.0. |
2026-03-09 | |
| CVE-2026-2919 | 4.3 | MEDIUM | CWE-451 | 0.0% p0 | 3.01 | Malicious scripts could display attacker-controlled web content under spoofed do...Malicious scripts could display attacker-controlled web content under spoofed domains in Focus for iOS by stalling a _self navigation to an invalid port and triggering an iframe redirect, causing the UI to display a trusted domain without user interaction. This vulnerability was fixed in Focus for iOS 148.2. |
2026-03-09 | |
| CVE-2026-3819 | 5.1 | MEDIUM | CWE-79 | 0.0% p1 | 3.57 | A vulnerability has been found in SourceCodester Resort Reservation System 1.0. ...A vulnerability has been found in SourceCodester Resort Reservation System 1.0. The affected element is an unknown function of the file /?page=manage_reservation of the component Reservation Management Module. Such manipulation of the argument ID leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. |
2026-03-09 | |
| CVE-2026-3818 | 6.9 | MEDIUM | CWE-74 | 0.0% p1 | 4.83 | A flaw has been found in Tiandy Easy7 CMS Windows 7.17.0. Impacted is an unknown...A flaw has been found in Tiandy Easy7 CMS Windows 7.17.0. Impacted is an unknown function of the file /Easy7/apps/WebService/GetDBData.jsp. This manipulation of the argument strTBName causes sql injection. The attack may be initiated remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-09 | |
| CVE-2026-3817 | 5.5 | MEDIUM | CWE-266 | 0.0% p1 | 3.85 | A vulnerability was detected in SourceCodester Patients Waiting Area Queue Manag...A vulnerability was detected in SourceCodester Patients Waiting Area Queue Management System 1.0. This issue affects some unknown processing of the file /patient-search.php. The manipulation results in improper authorization. The attack can be launched remotely. The exploit is now public and may be used. |
2026-03-09 | |
| CVE-2026-3816 | 5.3 | MEDIUM | CWE-404 | 0.0% p7 | 3.71 | A security vulnerability has been detected in OWASP DefectDojo up to 2.55.4. Thi...A security vulnerability has been detected in OWASP DefectDojo up to 2.55.4. This vulnerability affects the function input_zip.read of the file parser.py of the component SonarQubeParser/MSDefenderParser. The manipulation leads to denial of service. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used. Upgrading to version 2.56.0 is able to resolve this issue. The identifier of the patch is e8f1e5131535b8fd80a7b1b3085d676295fdcd41. Upgrading the affected component is recommended. |
2026-03-09 | |
| CVE-2026-3815 | 7.4 | HIGH | CWE-119 | 0.1% p25 | 5.18 | A weakness has been identified in UTT HiPER 810G up to 1.7.7-1711. This affects ...A weakness has been identified in UTT HiPER 810G up to 1.7.7-1711. This affects the function strcpy of the file /goform/formApMail. Executing a manipulation can lead to buffer overflow. It is possible to launch the attack remotely. The exploit has been made available to the public and could be used for attacks. |
2026-03-09 | |
| CVE-2026-3814 | 7.4 | HIGH | CWE-119 | 0.1% p25 | 5.18 | A security flaw has been discovered in UTT HiPER 810G up to 1.7.7-1711. Affected...A security flaw has been discovered in UTT HiPER 810G up to 1.7.7-1711. Affected by this issue is the function strcpy of the file /goform/getOneApConfTempEntry. Performing a manipulation results in buffer overflow. It is possible to initiate the attack remotely. The exploit has been released to the public and may be used for attacks. |
2026-03-09 | |
| CVE-2026-3813 | 5.3 | MEDIUM | CWE-74 | 0.0% p13 | 3.71 | A vulnerability was identified in opencc JFlow up to 5badc00db382d7cb82dad231e6a...A vulnerability was identified in opencc JFlow up to 5badc00db382d7cb82dad231e6a866b18e0addfe. Affected by this vulnerability is the function Calculate of the file src/main/java/bp/wf/httphandler/WF_CCForm.java. Such manipulation leads to injection. The attack may be performed from remote. The exploit is publicly available and might be used. This product utilizes a rolling release system for continuous delivery, and as such, version information for affected or updated releases is not disclosed. The project was informed of the problem early through an issue report but has not responded yet. |
2026-03-09 | |
| CVE-2025-40639 | 8.7 | HIGH | CWE-89 | 0.0% p11 | 6.09 | A SQL injection vulnerability has been found in Eventobot. This vulnerability al...A SQL injection vulnerability has been found in Eventobot. This vulnerability allows an attacker to retrieve, create, update and delete databases through the 'promo_send' parameter in the '/assets/php/calculate_discount.php'. |
2026-03-09 | |
| CVE-2025-33022 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: The reporter agreed to not assign CVE IDRejected reason: The reporter agreed to not assign CVE ID |
2026-03-09 | |
| CVE-2026-3812 | 5.3 | MEDIUM | CWE-79 | 0.0% p10 | 3.71 | A vulnerability was determined in itsourcecode Payroll Management System 1.0. Af...A vulnerability was determined in itsourcecode Payroll Management System 1.0. Affected is an unknown function of the file /manage_employee_allowances.php. This manipulation of the argument ID causes cross site scripting. The attack is possible to be carried out remotely. The exploit has been publicly disclosed and may be utilized. |
2026-03-09 | |
| CVE-2026-3811 | 7.4 | HIGH | CWE-119 | 0.1% p25 | 5.18 | A vulnerability was found in Tenda FH1202 1.2.0.14(408). This impacts the functi...A vulnerability was found in Tenda FH1202 1.2.0.14(408). This impacts the function fromP2pListFilter of the file /goform/P2pListFilter. The manipulation of the argument page results in stack-based buffer overflow. The attack can be executed remotely. The exploit has been made public and could be used. |
2026-03-09 | |
| CVE-2025-69279 | 7.5 | HIGH | NVD-CWE-noinfo | 0.2% p44 | 5.26 | In nr modem, there is a possible system crash due to improper input validation. ...In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed. |
2026-03-09 | |
| CVE-2025-69278 | 7.5 | HIGH | NVD-CWE-noinfo | 0.2% p44 | 5.26 | In nr modem, there is a possible system crash due to improper input validation. ...In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed. |
2026-03-09 | |
| CVE-2025-61616 | 7.5 | HIGH | NVD-CWE-noinfo | 0.1% p25 | 5.25 | In nr modem, there is a possible system crash due to improper input validation. ...In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed. |
2026-03-09 | |
| CVE-2025-61615 | 7.5 | HIGH | NVD-CWE-noinfo | 0.1% p20 | 5.25 | In nr modem, there is a possible system crash due to improper input validation. ...In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed. |
2026-03-09 | |
| CVE-2025-61614 | 7.5 | HIGH | NVD-CWE-noinfo | 0.1% p20 | 5.25 | In nr modem, there is a possible system crash due to improper input validation. ...In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed. |
2026-03-09 | |
| CVE-2025-61613 | 7.5 | HIGH | NVD-CWE-noinfo | 0.1% p20 | 5.25 | In nr modem, there is a possible system crash due to improper input validation. ...In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed. |
2026-03-09 | |
| CVE-2025-61612 | 7.5 | HIGH | NVD-CWE-noinfo | 0.1% p20 | 5.25 | In nr modem, there is a possible system crash due to improper input validation. ...In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed. |
2026-03-09 | |
| CVE-2025-61611 | 7.5 | HIGH | NVD-CWE-noinfo | 0.1% p31 | 5.25 | In modem, there is a possible improper input validation. This could lead to remo...In modem, there is a possible improper input validation. This could lead to remote denial of service with no additional execution privileges needed.. |
2026-03-09 | |
| CVE-2025-41772 | 7.5 | HIGH | CWE-598 | 0.1% p17 | 5.25 | An unauthenticated remote attacker can obtain valid session tokens because they ...An unauthenticated remote attacker can obtain valid session tokens because they are exposed in plaintext within the URL parameters of the wwwupdate.cgi endpoint in UBR. |
2026-03-09 | |
| CVE-2025-41767 | 7.2 | HIGH | CWE-347 | 0.0% p10 | 5.04 | A high-privileged remote attacker can fully compromise the device by abusing an ...A high-privileged remote attacker can fully compromise the device by abusing an update signature bypass vulnerability in the wwwupdate.cgi method in the web interface of UBR. |
2026-03-09 | |
| CVE-2025-41766 | 8.8 | HIGH | CWE-787 | 0.0% p10 | 6.16 | A low-privileged remote attacker can trigger a stack-based buffer overflow via a...A low-privileged remote attacker can trigger a stack-based buffer overflow via a crafted HTTP POST request using the ubr-network method resulting in full device compromise. |
2026-03-09 | |
| CVE-2025-41765 | 9.1 | CRITICAL | CWE-862 | 0.0% p8 | 6.37 | Due to insufficient authorization enforcement, an unauthorized remote attacker c...Due to insufficient authorization enforcement, an unauthorized remote attacker can exploit the wwwupload.cgi endpoint to upload and apply arbitrary data. This includes, but is not limited to, contact images, HTTPS certificates, system backups for restoration, server peer configurations, and BACnet/SC server certificates and keys. |
2026-03-09 | |
| CVE-2025-41764 | 9.1 | CRITICAL | CWE-862 | 0.0% p13 | 6.37 | Due to insufficient authorization enforcement, an unauthorized remote attacker c...Due to insufficient authorization enforcement, an unauthorized remote attacker can exploit the wwwupdate.cgi endpoint to upload and apply arbitrary updates. |
2026-03-09 | |
| CVE-2025-41763 | 6.5 | MEDIUM | CWE-497 | 0.0% p2 | 4.55 | A low‑privileged remote attacker can directly interact with the wwwdnload.cgi en...A low‑privileged remote attacker can directly interact with the wwwdnload.cgi endpoint to download any resource available to administrators, including system backups and certificate request files. |
2026-03-09 | |
| CVE-2025-41762 | 6.2 | MEDIUM | CWE-328 | 0.0% p0 | 4.34 | An unauthenticated attacker can abuse the weak hash of the backup generated by t...An unauthenticated attacker can abuse the weak hash of the backup generated by the wwwdnload.cgi endpoint to gain unauthorized access to sensitive data, including password hashes and certificates. |
2026-03-09 | |
| CVE-2025-41761 | 7.8 | HIGH | CWE-88 | 0.0% p1 | 5.46 | A low‑privileged local attacker who gains access to the UBR service account (e.g...A low‑privileged local attacker who gains access to the UBR service account (e.g., via SSH) can escalate privileges to obtain full system access. This is due to the service account being permitted to execute certain binaries (e.g., tcpdump and ip) with sudo. |
2026-03-09 | |
| CVE-2025-41760 | 4.9 | MEDIUM | CWE-636 | 0.0% p3 | 3.43 | An administrator may attempt to block all traffic by configuring a pass filter w...An administrator may attempt to block all traffic by configuring a pass filter with an empty table. However, in UBR, an empty list does not enforce any restrictions and allows all network traffic to pass unfiltered. |
2026-03-09 | |
| CVE-2025-41759 | 4.9 | MEDIUM | CWE-636 | 0.0% p3 | 3.43 | An administrator may attempt to block all networks by specifying "\*" or "all" a...An administrator may attempt to block all networks by specifying "\*" or "all" as the network identifier. However, these values are not supported and do not trigger any validation error. Instead, they are silently interpreted as network 0 which results in no networks being blocked at all. |
2026-03-09 | |
| CVE-2025-41758 | 8.8 | HIGH | CWE-22 | 0.1% p22 | 6.16 | A low-privileged remote attacker can exploit an arbitrary file write vulnerabili...A low-privileged remote attacker can exploit an arbitrary file write vulnerability in the wwupload.cgi endpoint. Due to path traversal this can lead to overwriting arbitrary files on the device and achieving a full system compromise. |
2026-03-09 | |
| CVE-2025-41757 | 8.8 | HIGH | CWE-22 | 0.1% p25 | 6.16 | A low-privileged remote attacker can abuse the backup restore functionality of U...A low-privileged remote attacker can abuse the backup restore functionality of UBR (ubr-restore) which runs with elevated privileges and does not validate the contents of the backup archive to create or overwrite arbitrary files anywhere on the system. |
2026-03-09 | |
| CVE-2025-41756 | 8.1 | HIGH | CWE-1242 | 0.0% p11 | 5.67 | A low-privileged remote attacker can exploit the ubr-editfile method in wwwubr.c...A low-privileged remote attacker can exploit the ubr-editfile method in wwwubr.cgi, an undocumented and unused API endpoint to write arbitrary files on the system. |
2026-03-09 | |
| CVE-2025-41755 | 6.5 | MEDIUM | CWE-22 | 0.0% p4 | 4.55 | A low-privileged remote attacker can exploit the ubr-logread method in wwwubr.cg...A low-privileged remote attacker can exploit the ubr-logread method in wwwubr.cgi to read arbitrary files on the system. The endpoint accepts a parameter specifying the log file to open (e.g., /tmp/weblog{some_number}), but this parameter is not properly validated, allowing an attacker to modify it to reference any file and retrieve its contents. |
2026-03-09 | |
| CVE-2025-41754 | 6.5 | MEDIUM | CWE-1242 | 0.0% p4 | 4.55 | A low-privileged remote attacker can exploit the ubr-editfile method in wwwubr.c...A low-privileged remote attacker can exploit the ubr-editfile method in wwwubr.cgi, an undocumented and unused API endpoint to read arbitrary files on the system. |
2026-03-09 | |
| CVE-2026-3810 | 7.4 | HIGH | CWE-119 | 0.1% p25 | 5.18 | A vulnerability has been found in Tenda FH1202 1.2.0.14(408). This affects the f...A vulnerability has been found in Tenda FH1202 1.2.0.14(408). This affects the function fromDhcpListClient of the file /goform/DhcpListClient. The manipulation of the argument page leads to stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used. |
2026-03-09 | |
| CVE-2026-3809 | 7.4 | HIGH | CWE-119 | 0.1% p25 | 5.18 | A flaw has been found in Tenda FH1202 1.2.0.14(408). The impacted element is the...A flaw has been found in Tenda FH1202 1.2.0.14(408). The impacted element is the function fromNatStaticSetting of the file /goform/NatSaticSetting. Executing a manipulation of the argument page can lead to stack-based buffer overflow. The attack may be launched remotely. The exploit has been published and may be used. |
2026-03-09 | |
| CVE-2026-3808 | 7.4 | HIGH | CWE-119 | 0.1% p29 | 5.18 | A vulnerability was detected in Tenda FH1202 1.2.0.14(408). The affected element...A vulnerability was detected in Tenda FH1202 1.2.0.14(408). The affected element is the function formWebTypeLibrary of the file /goform/webtypelibrary. Performing a manipulation of the argument webSiteId results in stack-based buffer overflow. The attack may be initiated remotely. The exploit is now public and may be used. |
2026-03-09 | |
| CVE-2026-3823 | 9.3 | CRITICAL | CWE-121 | 0.1% p21 | 6.51 | EHG2408 series switch developed by Atop Technologies has a Stack-based Buffer Ov...EHG2408 series switch developed by Atop Technologies has a Stack-based Buffer Overflow vulnerability, allowing unauthenticated remote attackers to control the program's execution flow and execute arbitrary code. |
2026-03-09 | |
| CVE-2026-3807 | 7.4 | HIGH | CWE-119 | 0.1% p26 | 5.18 | A security vulnerability has been detected in Tenda FH1202 1.2.0.14(408). Impact...A security vulnerability has been detected in Tenda FH1202 1.2.0.14(408). Impacted is the function formWrlsafeset of the file /goform/AdvSetWrlsafeset. Such manipulation of the argument mit_ssid/mit_ssid_index leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed publicly and may be used. |
2026-03-09 | |
| CVE-2026-3806 | 5.3 | MEDIUM | CWE-74 | 0.0% p9 | 3.71 | A weakness has been identified in SourceCodester/janobe Resort Reservation Syste...A weakness has been identified in SourceCodester/janobe Resort Reservation System 1.0. This issue affects some unknown processing of the file /room_rates.php. This manipulation of the argument q causes sql injection. The attack can be initiated remotely. The exploit has been made available to the public and could be used for attacks. |
2026-03-09 | |
| CVE-2026-3804 | 7.4 | HIGH | CWE-119 | 0.1% p25 | 5.18 | A security flaw has been discovered in Tenda i3 1.0.0.6(2204). This vulnerabilit...A security flaw has been discovered in Tenda i3 1.0.0.6(2204). This vulnerability affects the function formWifiMacFilterSet of the file /goform/WifiMacFilterSet. The manipulation of the argument index results in stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been released to the public and may be used for attacks. |
2026-03-09 | |
| CVE-2026-3803 | 7.4 | HIGH | CWE-119 | 0.1% p25 | 5.18 | A vulnerability was identified in Tenda i3 1.0.0.6(2204). This affects the funct...A vulnerability was identified in Tenda i3 1.0.0.6(2204). This affects the function formWifiMacFilterGet of the file /goform/WifiMacFilterGet. The manipulation of the argument index leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit is publicly available and might be used. |
2026-03-09 | |
| CVE-2026-30896 | 8.4 | HIGH | CWE-427 | 0.0% p0 | 5.88 | The installer for Qsee Client versions 1.0.1 and prior insecurely load Dynamic L...The installer for Qsee Client versions 1.0.1 and prior insecurely load Dynamic Link Libraries (DLLs). When a user is directed to place some malicious DLL to the same directory and execute the affected installer, then arbitrary code may be executed with the administrative privilege. |
2026-03-09 | |
| CVE-2026-3802 | 7.4 | HIGH | CWE-119 | 0.1% p25 | 5.18 | A vulnerability was determined in Tenda i3 1.0.0.6(2204). Affected by this issue...A vulnerability was determined in Tenda i3 1.0.0.6(2204). Affected by this issue is the function formexeCommand of the file /goform/exeCommand. Executing a manipulation of the argument cmdinput can lead to stack-based buffer overflow. The attack may be performed from remote. The exploit has been publicly disclosed and may be utilized. |
2026-03-09 | |
| CVE-2026-3822 | 8.3 | HIGH | CWE-295 | 0.0% p0 | 5.81 | Taipower APP for Andorid developed by Taipower has an Improper Certificate Valid...Taipower APP for Andorid developed by Taipower has an Improper Certificate Validation vulnerability. When establishing an HTTPS connection with the server, the application fails to verify the server-side TLS/SSL certificate. This flaw allows an unauthenticated remote attackers to exploit the vulnerability to perform a Man-in-the-Middle (MITM) attack to read and tamper with network packets. |
2026-03-09 | |
| CVE-2026-3801 | 7.4 | HIGH | CWE-119 | 0.1% p26 | 5.18 | A vulnerability was found in Tenda i3 1.0.0.6(2204). Affected by this vulnerabil...A vulnerability was found in Tenda i3 1.0.0.6(2204). Affected by this vulnerability is the function formSetAutoPing of the file /goform/setAutoPing. Performing a manipulation of the argument ping1/ping2 results in stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been made public and could be used. |
2026-03-09 | |
| CVE-2026-3800 | 5.3 | MEDIUM | CWE-284 | 0.0% p12 | 3.71 | A vulnerability has been found in SourceCodester/janobe Resort Reservation Syste...A vulnerability has been found in SourceCodester/janobe Resort Reservation System 1.0. Affected is the function doInsert of the file /controller.php?action=add. Such manipulation of the argument image leads to unrestricted upload. The attack can be executed remotely. The exploit has been disclosed to the public and may be used. |
2026-03-09 | |
| CVE-2026-3799 | 7.4 | HIGH | CWE-119 | 0.1% p25 | 5.18 | A flaw has been found in Tenda i3 1.0.0.6(2204). This impacts the function formS...A flaw has been found in Tenda i3 1.0.0.6(2204). This impacts the function formSetCfm of the file /goform/setcfm. This manipulation of the argument funcpara1 causes stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been published and may be used. |
2026-03-09 | |
| CVE-2026-3798 | 5.1 | MEDIUM | CWE-74 | 0.3% p51 | 3.58 | A vulnerability was detected in Comfast CF-AC100 2.6.0.8. This affects the funct...A vulnerability was detected in Comfast CF-AC100 2.6.0.8. This affects the function sub_44AC14 of the file /cgi-bin/mbox-config?method=SET§ion=ping_config of the component Request Path Handler. The manipulation results in command injection. The attack may be launched remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-09 | |
| CVE-2026-3797 | 5.3 | MEDIUM | CWE-284 | 0.0% p2 | 3.71 | A security vulnerability has been detected in Tiandy Video Surveillance System 视...A security vulnerability has been detected in Tiandy Video Surveillance System 视频监控平台 7.17.0. The impacted element is the function uploadFile of the file /src/com/tiandy/easy7/core/rest/CLS_REST_File.java. The manipulation of the argument fileName leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-09 | |
| CVE-2026-3796 | 4.8 | MEDIUM | CWE-266 | 0.0% p0 | 3.36 | A weakness has been identified in Qi-ANXIN QAX Virus Removal up to 2025-10-22. T...A weakness has been identified in Qi-ANXIN QAX Virus Removal up to 2025-10-22. The affected element is the function ZwTerminateProcess in the library QKSecureIO_Imp.sys of the component Mini Filter Driver. Executing a manipulation can lead to improper access controls. The attack is restricted to local execution. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-09 | |
| CVE-2026-3795 | 5.3 | MEDIUM | CWE-22 | 0.0% p10 | 3.71 | A security flaw has been discovered in doramart DoraCMS 3.0.x. Impacted is the f...A security flaw has been discovered in doramart DoraCMS 3.0.x. Impacted is the function createFileBypath of the file /DoraCMS/server/app/router/api/v1.js. Performing a manipulation results in path traversal. The attack can be initiated remotely. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-09 | |
| CVE-2026-3794 | 6.9 | MEDIUM | CWE-287 | 0.1% p32 | 4.83 | A vulnerability was identified in doramart DoraCMS 3.0.x. This issue affects som...A vulnerability was identified in doramart DoraCMS 3.0.x. This issue affects some unknown processing of the file /api/v1/mail/send of the component Email API. Such manipulation leads to improper authentication. It is possible to launch the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-09 | |
| CVE-2026-3793 | 5.3 | MEDIUM | CWE-74 | 0.0% p1 | 3.71 | A vulnerability was determined in SourceCodester Sales and Inventory System 1.0....A vulnerability was determined in SourceCodester Sales and Inventory System 1.0. This vulnerability affects unknown code of the file sales_invoice1.php of the component GET Parameter Handler. This manipulation of the argument sellid causes sql injection. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized. |
2026-03-09 | |
| CVE-2026-3792 | 5.3 | MEDIUM | CWE-74 | 0.0% p9 | 3.71 | A vulnerability was found in SourceCodester Sales and Inventory System 1.0. This...A vulnerability was found in SourceCodester Sales and Inventory System 1.0. This affects an unknown part of the file purchase_invoice.php of the component GET Parameter Handler. The manipulation of the argument purchaseid results in sql injection. The attack may be performed from remote. The exploit has been made public and could be used. |
2026-03-09 | |
| CVE-2026-3791 | 5.3 | MEDIUM | CWE-74 | 0.0% p9 | 3.71 | A vulnerability has been found in SourceCodester Sales and Inventory System 1.0....A vulnerability has been found in SourceCodester Sales and Inventory System 1.0. Affected by this issue is some unknown functionality of the file dashboard.php of the component Search. The manipulation of the argument searchtxt leads to sql injection. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used. |
2026-03-09 | |
| CVE-2026-3790 | 5.3 | MEDIUM | CWE-74 | 0.0% p9 | 3.71 | A flaw has been found in SourceCodester Sales and Inventory System 1.0. Affected...A flaw has been found in SourceCodester Sales and Inventory System 1.0. Affected by this vulnerability is an unknown functionality of the file check_supplier_details.php of the component POST Parameter Handler. Executing a manipulation of the argument stock_name1 can lead to sql injection. The attack can be executed remotely. The exploit has been published and may be used. |
2026-03-09 | |
| CVE-2026-3789 | 5.3 | MEDIUM | CWE-918 | 0.1% p32 | 3.71 | A vulnerability was detected in Bytedesk up to 1.3.9. Affected is the function g...A vulnerability was detected in Bytedesk up to 1.3.9. Affected is the function getModels of the file source-code/src/main/java/com/bytedesk/ai/springai/providers/gitee/SpringAIGiteeRestService.java of the component SpringAIGiteeRestController. Performing a manipulation of the argument apiUrl results in server-side request forgery. Remote exploitation of the attack is possible. The exploit is now public and may be used. Upgrading to version 1.4.5.4 is able to address this issue. The patch is named 975e39e4dd527596987559f56c5f9f973f64eff7. Upgrading the affected component is advised. |
2026-03-09 | |
| CVE-2026-3788 | 5.3 | MEDIUM | CWE-918 | 0.1% p25 | 3.71 | A security vulnerability has been detected in Bytedesk up to 1.3.9. This impacts...A security vulnerability has been detected in Bytedesk up to 1.3.9. This impacts the function getModels of the file source-code/src/main/java/com/bytedesk/ai/springai/providers/openrouter/SpringAIOpenrouterRestService.java of the component SpringAIOpenrouterRestController. Such manipulation of the argument apiUrl leads to server-side request forgery. The attack may be launched remotely. The exploit has been disclosed publicly and may be used. Upgrading to version 1.4.5.4 will fix this issue. The name of the patch is 975e39e4dd527596987559f56c5f9f973f64eff7. It is recommended to upgrade the affected component. |
2026-03-09 | |
| CVE-2026-3787 | 7.3 | HIGH | CWE-426 | 0.0% p0 | 5.11 | A weakness has been identified in UltraVNC 1.6.4.0 on Windows. This affects an u...A weakness has been identified in UltraVNC 1.6.4.0 on Windows. This affects an unknown function in the library cryptbase.dll of the component Windows Service. This manipulation causes uncontrolled search path. The attack requires local access. A high degree of complexity is needed for the attack. The exploitability is reported as difficult. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-08 | |
| CVE-2026-3786 | 5.3 | MEDIUM | CWE-74 | 0.0% p8 | 3.71 | A security flaw has been discovered in EasyCMS up to 1.6. The impacted element i...A security flaw has been discovered in EasyCMS up to 1.6. The impacted element is an unknown function of the file /RbacuserAction.class.php of the component Request Parameter Handler. The manipulation of the argument _order results in sql injection. The attack can be launched remotely. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-08 | |
| CVE-2026-3785 | 5.3 | MEDIUM | CWE-74 | 0.0% p8 | 3.71 | A vulnerability was identified in EasyCMS up to 1.6. The affected element is an ...A vulnerability was identified in EasyCMS up to 1.6. The affected element is an unknown function of the file /RbacnodeAction.class.php of the component Request Parameter Handler. The manipulation of the argument _order leads to sql injection. The attack can be initiated remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-08 | |
| CVE-2026-3771 | 5.3 | MEDIUM | CWE-74 | 0.0% p9 | 3.71 | A vulnerability has been found in SourceCodester/janobe Resort Reservation Syste...A vulnerability has been found in SourceCodester/janobe Resort Reservation System 1.0. This vulnerability affects unknown code of the file /accomodation.php. Such manipulation of the argument q leads to sql injection. The attack may be performed from remote. The exploit has been disclosed to the public and may be used. |
2026-03-08 | |
| CVE-2026-3770 | 5.3 | MEDIUM | CWE-352 | 0.0% p10 | 3.71 | A flaw has been found in SourceCodester Computer Laboratory Management System 1....A flaw has been found in SourceCodester Computer Laboratory Management System 1.0. This affects an unknown part. This manipulation causes cross-site request forgery. The attack is possible to be carried out remotely. The exploit has been published and may be used. |
2026-03-08 | |
| CVE-2026-3769 | 7.4 | HIGH | CWE-119 | 0.1% p25 | 5.18 | A vulnerability was detected in Tenda F453 1.0.0.3. Affected by this issue is th...A vulnerability was detected in Tenda F453 1.0.0.3. Affected by this issue is the function WrlclientSet of the file /goform/WrlclientSet. The manipulation of the argument GO results in stack-based buffer overflow. The attack can be executed remotely. The exploit is now public and may be used. |
2026-03-08 | |
| CVE-2026-3768 | 7.4 | HIGH | CWE-119 | 0.1% p25 | 5.18 | A security vulnerability has been detected in Tenda F453 1.0.0.3. Affected by th...A security vulnerability has been detected in Tenda F453 1.0.0.3. Affected by this vulnerability is the function formWrlExtraSet of the file /goform/WrlExtraSet. The manipulation of the argument GO leads to stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used. |
2026-03-08 | |
| CVE-2026-3767 | 5.3 | MEDIUM | CWE-74 | 0.0% p9 | 3.71 | A weakness has been identified in itsourcecode sanitize or validate this input 1...A weakness has been identified in itsourcecode sanitize or validate this input 1.0. Affected is an unknown function of the file /admin/teacher-attendance.php. Executing a manipulation of the argument teacher_id can lead to sql injection. The attack may be launched remotely. The exploit has been made available to the public and could be used for attacks. |
2026-03-08 | |
| CVE-2026-3766 | 5.1 | MEDIUM | CWE-79 | 0.0% p10 | 3.57 | A security flaw has been discovered in SourceCodester Web-based Pharmacy Product...A security flaw has been discovered in SourceCodester Web-based Pharmacy Product Management System 1.0. This impacts an unknown function of the file edit-profile.php. Performing a manipulation of the argument fullname results in cross site scripting. The attack may be initiated remotely. The exploit has been released to the public and may be used for attacks. |
2026-03-08 | |
| CVE-2026-3765 | 6.9 | MEDIUM | CWE-74 | 0.0% p8 | 4.83 | A vulnerability was identified in itsourcecode University Management System 1.0....A vulnerability was identified in itsourcecode University Management System 1.0. This affects an unknown function of the file /att_single_view.php. Such manipulation of the argument dt leads to sql injection. The attack can be launched remotely. The exploit is publicly available and might be used. |
2026-03-08 | |
| CVE-2026-3764 | 6.9 | MEDIUM | CWE-266 | 0.0% p13 | 4.83 | A vulnerability was determined in SourceCodester Client Database Management Syst...A vulnerability was determined in SourceCodester Client Database Management System 1.0. The impacted element is an unknown function of the file /superadmin_user_update.php. This manipulation causes improper authorization. The attack can be initiated remotely. The exploit has been publicly disclosed and may be utilized. |
2026-03-08 | |
| CVE-2026-3763 | 5.3 | MEDIUM | CWE-79 | 0.0% p8 | 3.71 | A vulnerability was found in code-projects Simple Flight Ticket Booking System 1...A vulnerability was found in code-projects Simple Flight Ticket Booking System 1.0. The affected element is an unknown function of the file showhistory.php. The manipulation results in cross site scripting. It is possible to launch the attack remotely. The exploit has been made public and could be used. |
2026-03-08 | |
| CVE-2026-3762 | 6.9 | MEDIUM | CWE-266 | 0.0% p2 | 4.83 | A vulnerability has been found in SourceCodester Client Database Management Syst...A vulnerability has been found in SourceCodester Client Database Management System 1.0/3.1. Impacted is an unknown function of the file /superadmin_delete_manager.php of the component Endpoint. The manipulation of the argument manager_id leads to improper authorization. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. |
2026-03-08 | |
| CVE-2026-3761 | 5.3 | MEDIUM | CWE-266 | 0.0% p4 | 3.71 | A flaw has been found in SourceCodester Client Database Management System 1.0. T...A flaw has been found in SourceCodester Client Database Management System 1.0. This issue affects some unknown processing of the file /superadmin_user_delete.php of the component Endpoint. Executing a manipulation of the argument user_id can lead to improper authorization. The attack may be performed from remote. The exploit has been published and may be used. |
2026-03-08 | |
| CVE-2026-3760 | 6.9 | MEDIUM | CWE-74 | 0.0% p1 | 4.83 | A vulnerability was detected in itsourcecode University Management System 1.0. T...A vulnerability was detected in itsourcecode University Management System 1.0. This vulnerability affects unknown code of the file /view_result.php. Performing a manipulation of the argument seme results in sql injection. The attack is possible to be carried out remotely. The exploit is now public and may be used. |
2026-03-08 | |
| CVE-2026-3759 | 6.9 | MEDIUM | CWE-74 | 0.0% p9 | 4.83 | A security vulnerability has been detected in projectworlds Online Art Gallery S...A security vulnerability has been detected in projectworlds Online Art Gallery Shop 1.0. This affects an unknown part of the file /admin/adminHome.php. Such manipulation of the argument reach_nm leads to sql injection. The attack can be executed remotely. The exploit has been disclosed publicly and may be used. |
2026-03-08 | |
| CVE-2026-3758 | 6.9 | MEDIUM | CWE-74 | 0.0% p9 | 4.83 | A weakness has been identified in projectworlds Online Art Gallery Shop 1.0. Aff...A weakness has been identified in projectworlds Online Art Gallery Shop 1.0. Affected by this issue is some unknown functionality of the file /admin/adminHome.php. This manipulation of the argument Info causes sql injection. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be used for attacks. |
2026-03-08 | |
| CVE-2026-3757 | 6.9 | MEDIUM | CWE-74 | 0.0% p8 | 4.83 | A security flaw has been discovered in projectworlds Online Art Gallery Shop 1.0...A security flaw has been discovered in projectworlds Online Art Gallery Shop 1.0. Affected by this vulnerability is an unknown functionality of the file /?pass=1. The manipulation of the argument fnm results in sql injection. The attack may be launched remotely. The exploit has been released to the public and may be used for attacks. |
2026-03-08 | |
| CVE-2026-3756 | 5.3 | MEDIUM | CWE-74 | 0.0% p9 | 3.71 | A vulnerability was identified in SourceCodester Sales and Inventory System up t...A vulnerability was identified in SourceCodester Sales and Inventory System up to 1.0. Affected is an unknown function of the file /check_item_details.php. The manipulation of the argument stock_name1 leads to sql injection. The attack may be initiated remotely. The exploit is publicly available and might be used. |
2026-03-08 | |
| CVE-2026-3755 | 5.3 | MEDIUM | CWE-74 | 0.0% p9 | 3.71 | A vulnerability was determined in SourceCodester Sales and Inventory System 1.0....A vulnerability was determined in SourceCodester Sales and Inventory System 1.0. This impacts an unknown function of the file /check_customer_details.php of the component POST Handler. Executing a manipulation of the argument stock_name1 can lead to sql injection. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized. |
2026-03-08 | |
| CVE-2026-3754 | 5.3 | MEDIUM | CWE-74 | 0.0% p9 | 3.71 | A vulnerability was found in SourceCodester Sales and Inventory System 1.0. This...A vulnerability was found in SourceCodester Sales and Inventory System 1.0. This affects an unknown function of the file /add_stock.php. Performing a manipulation of the argument cost results in sql injection. The attack can be initiated remotely. The exploit has been made public and could be used. |
2026-03-08 | |
| CVE-2026-3753 | 5.3 | MEDIUM | CWE-74 | 0.0% p9 | 3.71 | A vulnerability has been found in SourceCodester Sales and Inventory System up t...A vulnerability has been found in SourceCodester Sales and Inventory System up to 1.0. The impacted element is an unknown function of the file /add_sales_print.php. Such manipulation of the argument sid leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. |
2026-03-08 | |
| CVE-2026-3752 | 5.1 | MEDIUM | CWE-74 | 0.0% p8 | 3.57 | A flaw has been found in SourceCodester Employee Task Management System up to 1....A flaw has been found in SourceCodester Employee Task Management System up to 1.0. The affected element is an unknown function of the file /daily-task-report.php of the component GET Parameter Handler. This manipulation of the argument Date causes sql injection. It is possible to initiate the attack remotely. The exploit has been published and may be used. |
2026-03-08 | |
| CVE-2026-3751 | 5.1 | MEDIUM | CWE-74 | 0.0% p8 | 3.57 | A vulnerability was detected in SourceCodester Employee Task Management System 1...A vulnerability was detected in SourceCodester Employee Task Management System 1.0. Impacted is an unknown function of the file /daily-attendance-report.php of the component GET Parameter Handler. The manipulation of the argument Date results in sql injection. The attack may be performed from remote. The exploit is now public and may be used. |
2026-03-08 | |
| CVE-2026-3750 | 5.1 | MEDIUM | CWE-918 | 0.0% p11 | 3.57 | A security vulnerability has been detected in ContiNew Admin up to 4.2.0. This i...A security vulnerability has been detected in ContiNew Admin up to 4.2.0. This issue affects the function URI.create of the file continew-system/src/main/java/top/continew/admin/system/factory/S3ClientFactory.java of the component Storage Management Module. The manipulation leads to server-side request forgery. The attack is possible to be carried out remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-08 | |
| CVE-2026-3749 | 5.3 | MEDIUM | CWE-284 | 0.1% p32 | 3.71 | A weakness has been identified in Bytedesk up to 1.3.9. This vulnerability affec...A weakness has been identified in Bytedesk up to 1.3.9. This vulnerability affects the function handleFileUpload of the file source-code/src/main/java/com/bytedesk/core/upload/UploadRestService.java of the component SVG File Handler. Executing a manipulation can lead to unrestricted upload. The attack can be executed remotely. The exploit has been made available to the public and could be used for attacks. Upgrading to version 1.4.5.1 is able to resolve this issue. This patch is called 975e39e4dd527596987559f56c5f9f973f64eff7. It is recommended to upgrade the affected component. |
2026-03-08 | |
| CVE-2026-3748 | 5.3 | MEDIUM | CWE-284 | 0.1% p30 | 3.71 | A security flaw has been discovered in Bytedesk up to 1.3.9. This affects the fu...A security flaw has been discovered in Bytedesk up to 1.3.9. This affects the function uploadFile of the file source-code/src/main/java/com/bytedesk/core/upload/UploadRestController.java of the component SVG File Handler. Performing a manipulation results in unrestricted upload. Remote exploitation of the attack is possible. The exploit has been released to the public and may be used for attacks. Upgrading to version 1.4.5.1 is able to mitigate this issue. The patch is named 975e39e4dd527596987559f56c5f9f973f64eff7. Upgrading the affected component is recommended. |
2026-03-08 | |
| CVE-2026-3747 | 6.9 | MEDIUM | CWE-74 | 0.0% p8 | 4.83 | A vulnerability was identified in itsourcecode University Management System 1.0....A vulnerability was identified in itsourcecode University Management System 1.0. Affected by this issue is some unknown functionality of the file /add_result.php. Such manipulation of the argument subject leads to sql injection. The attack may be launched remotely. The exploit is publicly available and might be used. |
2026-03-08 | |
| CVE-2026-3746 | 6.9 | MEDIUM | CWE-74 | 0.1% p19 | 4.83 | A vulnerability was determined in SourceCodester Simple Responsive Tourism Websi...A vulnerability was determined in SourceCodester Simple Responsive Tourism Website 1.0. Affected by this vulnerability is an unknown functionality of the file /tourism/classes/Login.php?f=login of the component Login. This manipulation of the argument Username causes sql injection. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized. |
2026-03-08 | |
| CVE-2026-3745 | 5.3 | MEDIUM | CWE-74 | 0.1% p17 | 3.71 | A vulnerability was found in code-projects Student Web Portal 1.0. Affected is a...A vulnerability was found in code-projects Student Web Portal 1.0. Affected is an unknown function of the file profile.php. The manipulation of the argument User results in sql injection. The attack can be launched remotely. The exploit has been made public and could be used. |
2026-03-08 | |
| CVE-2026-3744 | 6.9 | MEDIUM | CWE-74 | 0.1% p17 | 4.83 | A vulnerability has been found in code-projects Student Web Portal 1.0. This imp...A vulnerability has been found in code-projects Student Web Portal 1.0. This impacts the function valreg_passwdation of the file signup.php. The manipulation of the argument reg_passwd leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. |
2026-03-08 | |
| CVE-2026-3743 | 5.1 | MEDIUM | CWE-79 | 0.0% p8 | 3.57 | A flaw has been found in YiFang CMS 2.0.5. This affects the function update of t...A flaw has been found in YiFang CMS 2.0.5. This affects the function update of the file app/db/admin/D_singlePageGroup.php. Executing a manipulation of the argument Name can lead to cross site scripting. It is possible to launch the attack remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-08 | |
| CVE-2026-3742 | 5.1 | MEDIUM | CWE-79 | 0.0% p8 | 3.57 | A vulnerability was detected in YiFang CMS 2.0.5. The impacted element is the fu...A vulnerability was detected in YiFang CMS 2.0.5. The impacted element is the function update of the file app/db/admin/D_singlePage.php. Performing a manipulation of the argument Title results in cross site scripting. It is possible to initiate the attack remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-08 | |
| CVE-2026-3741 | 5.1 | MEDIUM | CWE-79 | 0.0% p8 | 3.57 | A security vulnerability has been detected in YiFang CMS 2.0.5. The affected ele...A security vulnerability has been detected in YiFang CMS 2.0.5. The affected element is the function update of the file app/db/admin/D_friendLink.php. Such manipulation of the argument linkName leads to cross site scripting. The attack may be performed from remote. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-08 | |
| CVE-2026-3740 | 6.9 | MEDIUM | CWE-74 | 0.0% p8 | 4.83 | A weakness has been identified in itsourcecode University Management System 1.0....A weakness has been identified in itsourcecode University Management System 1.0. Impacted is an unknown function of the file /admin_search_student.php. This manipulation of the argument admin_search_student causes sql injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be used for attacks. |
2026-03-08 | |
| CVE-2026-3739 | 5.3 | MEDIUM | CWE-287 | 0.1% p29 | 3.71 | A security flaw has been discovered in suitenumerique messages 0.2.0. This issue...A security flaw has been discovered in suitenumerique messages 0.2.0. This issue affects the function ThreadAccessSerializer of the file src/backend/core/api/serializers.py of the component ThreadAccess. The manipulation results in improper authentication. The attack can be executed remotely. The exploit has been released to the public and may be used for attacks. Upgrading to version 0.3.0 is capable of addressing this issue. The patch is identified as d7729f4b885449f6dee3faf8b5f2a05769fb3d6e. The affected component should be upgraded. |
2026-03-08 | |
| CVE-2026-3738 | 5.3 | MEDIUM | CWE-266 | 0.0% p12 | 3.71 | A vulnerability was identified in SourceCodester Pet Grooming Management Softwar...A vulnerability was identified in SourceCodester Pet Grooming Management Software 1.0. This vulnerability affects unknown code of the component Financial Report Page. The manipulation leads to improper authorization. Remote exploitation of the attack is possible. The exploit is publicly available and might be used. |
2026-03-08 | |
| CVE-2026-3737 | 5.3 | MEDIUM | CWE-266 | 0.0% p12 | 3.71 | A vulnerability was determined in SourceCodester Pet Grooming Management Softwar...A vulnerability was determined in SourceCodester Pet Grooming Management Software 1.0. This affects an unknown part of the file add_user.php of the component User Creation Handler. Executing a manipulation can lead to improper authorization. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized. |
2026-03-08 | |
| CVE-2026-3736 | 6.9 | MEDIUM | CWE-74 | 0.0% p11 | 4.83 | A vulnerability was found in code-projects Simple Flight Ticket Booking System 1...A vulnerability was found in code-projects Simple Flight Ticket Booking System 1.0. Affected by this issue is some unknown functionality of the file SearchResultRoundtrip.php. Performing a manipulation of the argument from results in sql injection. The attack may be initiated remotely. The exploit has been made public and could be used. |
2026-03-08 | |
| CVE-2026-3735 | 6.9 | MEDIUM | CWE-74 | 0.0% p11 | 4.83 | A vulnerability has been found in code-projects Simple Flight Ticket Booking Sys...A vulnerability has been found in code-projects Simple Flight Ticket Booking System 1.0. Affected by this vulnerability is an unknown functionality of the file SearchResultOneway.php. Such manipulation of the argument from leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. |
2026-03-08 | |
| CVE-2026-3734 | 6.9 | MEDIUM | CWE-266 | 0.0% p13 | 4.83 | A flaw has been found in SourceCodester Client Database Management System 1.0. A...A flaw has been found in SourceCodester Client Database Management System 1.0. Affected is an unknown function of the file /fetch_manager_details.php of the component Endpoint. This manipulation of the argument manager_id causes improper authorization. The attack can be initiated remotely. The exploit has been published and may be used. |
2026-03-08 | |
| CVE-2026-3733 | 5.3 | MEDIUM | CWE-918 | 0.1% p17 | 3.71 | A vulnerability was detected in xuxueli xxl-job up to 3.3.2. This impacts an unk...A vulnerability was detected in xuxueli xxl-job up to 3.3.2. This impacts an unknown function of the file source-code/src/main/java/com/xxl/job/admin/controller/JobInfoController.java. The manipulation results in server-side request forgery. It is possible to launch the attack remotely. The exploit is now public and may be used. The project maintainer closed the issue report with the following statement: "Access token security verification is required." (translated from Chinese) |
2026-03-08 | |
| CVE-2026-3732 | 7.4 | HIGH | CWE-119 | 0.1% p25 | 5.18 | A security vulnerability has been detected in Tenda F453 1.0.0.3. This affects t...A security vulnerability has been detected in Tenda F453 1.0.0.3. This affects the function strcpy of the file /goform/exeCommand. The manipulation of the argument cmdinput leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used. |
2026-03-08 | |
| CVE-2026-3731 | 6.9 | MEDIUM | CWE-119 | 0.1% p29 | 4.83 | A weakness has been identified in libssh up to 0.11.3. The impacted element is t...A weakness has been identified in libssh up to 0.11.3. The impacted element is the function sftp_extensions_get_name/sftp_extensions_get_data of the file src/sftp.c of the component SFTP Extension Name Handler. Executing a manipulation of the argument idx can lead to out-of-bounds read. The attack may be performed from remote. Upgrading to version 0.11.4 and 0.12.0 is sufficient to resolve this issue. This patch is called 855a0853ad3abd4a6cd85ce06fce6d8d4c7a0b60. You should upgrade the affected component. |
2026-03-08 | |
| CVE-2026-3730 | 6.9 | MEDIUM | CWE-74 | 0.0% p15 | 4.83 | A security flaw has been discovered in itsourcecode Free Hotel Reservation Syste...A security flaw has been discovered in itsourcecode Free Hotel Reservation System 1.0. The affected element is an unknown function of the file /hotel/admin/mod_amenities/index.php?view=edit. Performing a manipulation of the argument amen_id/rmtype_id results in sql injection. The attack is possible to be carried out remotely. The exploit has been released to the public and may be used for attacks. |
2026-03-08 | |
| CVE-2026-3729 | 7.4 | HIGH | CWE-119 | 0.1% p25 | 5.18 | A vulnerability was identified in Tenda F453 1.0.0.3/3.As. Impacted is the funct...A vulnerability was identified in Tenda F453 1.0.0.3/3.As. Impacted is the function fromPptpUserAdd of the file /goform/PPTPDClient. Such manipulation of the argument username/opttype leads to stack-based buffer overflow. The attack can be executed remotely. The exploit is publicly available and might be used. |
2026-03-08 | |
| CVE-2026-3728 | 7.4 | HIGH | CWE-119 | 0.0% p9 | 5.18 | A vulnerability was determined in Tenda F453 1.0.0.3/1.If. This issue affects th...A vulnerability was determined in Tenda F453 1.0.0.3/1.If. This issue affects the function fromSetCfm of the file /goform/setcfm. This manipulation of the argument funcname/funcpara1 causes stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been publicly disclosed and may be utilized. |
2026-03-08 | |
| CVE-2026-3727 | 7.4 | HIGH | CWE-119 | 0.0% p9 | 5.18 | A vulnerability was found in Tenda F453 1.0.0.3. This vulnerability affects the ...A vulnerability was found in Tenda F453 1.0.0.3. This vulnerability affects the function sub_3C6C0 of the file /goform/QuickIndex. The manipulation of the argument mit_linktype/PPPOEPassword results in stack-based buffer overflow. The attack may be launched remotely. The exploit has been made public and could be used. |
2026-03-08 | |
| CVE-2026-3726 | 7.4 | HIGH | CWE-119 | 0.1% p29 | 5.18 | A vulnerability has been found in Tenda F453 1.0.0.3. This affects the function ...A vulnerability has been found in Tenda F453 1.0.0.3. This affects the function fromwebExcptypemanFilter of the file /goform/webExcptypemanFilter. The manipulation of the argument page leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. |
2026-03-08 | |
| CVE-2026-3725 | 5.3 | MEDIUM | CWE-791 | 0.1% p15 | 3.71 | A flaw has been found in 1024-lab/lab1024 SmartAdmin up to 3.29. Affected by thi...A flaw has been found in 1024-lab/lab1024 SmartAdmin up to 3.29. Affected by this issue is the function freemarkerResolverContent of the file sa-base/src/main/java/net/lab1024/sa/base/module/support/mail/MailService.java of the component FreeMarker Template Handler. Executing a manipulation of the argument template_content can lead to improper neutralization of special elements used in a template engine. The attack can be launched remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-08 | |
| CVE-2026-3724 | 5.3 | MEDIUM | CWE-266 | 0.0% p12 | 3.71 | A weakness has been identified in SourceCodester Patients Waiting Area Queue Man...A weakness has been identified in SourceCodester Patients Waiting Area Queue Management System 1.0. This impacts an unknown function of the file /checkin.php. This manipulation of the argument patient_id causes improper authorization. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be used for attacks. |
2026-03-08 | |
| CVE-2026-3723 | 6.9 | MEDIUM | CWE-74 | 0.0% p14 | 4.83 | A security flaw has been discovered in code-projects Simple Flight Ticket Bookin...A security flaw has been discovered in code-projects Simple Flight Ticket Booking System 1.0. This affects an unknown function of the file /Admindelete.php. The manipulation of the argument flightno results in sql injection. The attack may be performed from remote. The exploit has been released to the public and may be used for attacks. |
2026-03-08 | |
| CVE-2026-3721 | 5.1 | MEDIUM | CWE-79 | 0.0% p1 | 3.57 | A weakness has been identified in 1024-lab/lab1024 SmartAdmin up to 3.29. The af...A weakness has been identified in 1024-lab/lab1024 SmartAdmin up to 3.29. The affected element is an unknown function of the file sa-base/src/main/java/net/lab1024/sa/base/module/support/helpdoc/domain/form/HelpDocAddForm.java of the component Help Documentation Module. This manipulation causes cross site scripting. The attack may be initiated remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-08 | |
| CVE-2026-3720 | 5.1 | MEDIUM | CWE-79 | 0.0% p10 | 3.57 | A security flaw has been discovered in 1024-lab/lab1024 SmartAdmin up to 3.29. I...A security flaw has been discovered in 1024-lab/lab1024 SmartAdmin up to 3.29. Impacted is an unknown function of the file smart-admin-web-javascript/src/views/business/oa/notice/components/notice-form-drawer.vue of the component Notice Module. The manipulation results in cross site scripting. The attack can be launched remotely. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-08 | |
| CVE-2026-3719 | 5.5 | MEDIUM | CWE-22 | 0.1% p23 | 3.85 | A vulnerability was identified in Tsinghua Unigroup Electronic Archives System 3...A vulnerability was identified in Tsinghua Unigroup Electronic Archives System 3.2.210802(62532). This issue affects some unknown processing of the file /System/Cms/downLoad. The manipulation of the argument path leads to path traversal. The attack can be initiated remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-08 | |
| CVE-2026-3716 | 4.8 | MEDIUM | CWE-79 | 0.0% p7 | 3.36 | A vulnerability was determined in Wavlink WL-WN579X3-C 231124. This vulnerabilit...A vulnerability was determined in Wavlink WL-WN579X3-C 231124. This vulnerability affects the function sub_401AD4 of the file /cgi-bin/adm.cgi. Executing a manipulation of the argument Hostname can lead to cross site scripting. It is possible to launch the attack remotely. The exploit has been publicly disclosed and may be utilized. Upgrading to version 20260226 is able to resolve this issue. The affected component should be upgraded. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product. |
2026-03-08 | |
| CVE-2026-3715 | 7.4 | HIGH | CWE-119 | 0.1% p25 | 5.18 | A vulnerability was found in Wavlink WL-WN579X3-C 231124. This affects the funct...A vulnerability was found in Wavlink WL-WN579X3-C 231124. This affects the function sub_40139C of the file /cgi-bin/firewall.cgi. Performing a manipulation of the argument del_flag results in stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been made public and could be used. Upgrading to version 20260226 is able to mitigate this issue. You should upgrade the affected component. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product. |
2026-03-08 | |
| CVE-2026-3714 | 5.1 | MEDIUM | CWE-791 | 0.1% p20 | 3.57 | A vulnerability has been found in OpenCart 4.0.2.3. Affected by this issue is th...A vulnerability has been found in OpenCart 4.0.2.3. Affected by this issue is the function Save of the file admin/controller/design/template.php of the component Incomplete Fix CVE-2024-36694. Such manipulation leads to improper neutralization of special elements used in a template engine. The attack may be performed from remote. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-08 | |
| CVE-2026-3713 | 4.8 | MEDIUM | CWE-119 | 0.0% p3 | 3.36 | A flaw has been found in pnggroup libpng up to 1.6.55. Affected by this vulnerab...A flaw has been found in pnggroup libpng up to 1.6.55. Affected by this vulnerability is the function do_pnm2png of the file contrib/pngminus/pnm2png.c of the component pnm2png. This manipulation of the argument width/height causes heap-based buffer overflow. The attack is restricted to local execution. The exploit has been published and may be used. The project was informed of the problem early through an issue report but has not responded yet. |
2026-03-08 | |
| CVE-2026-3711 | 5.1 | MEDIUM | CWE-74 | 0.0% p13 | 3.57 | A vulnerability was detected in code-projects Simple Flight Ticket Booking Syste...A vulnerability was detected in code-projects Simple Flight Ticket Booking System 1.0. Affected is an unknown function of the file /Adminupdate.php. The manipulation of the argument flightno/airplaneid/departure/dtime/arrival/atime/ec/ep/bc/bp results in sql injection. The attack can be executed remotely. The exploit is now public and may be used. |
2026-03-08 | |
| CVE-2026-3710 | 5.1 | MEDIUM | CWE-74 | 0.0% p13 | 3.57 | A security vulnerability has been detected in code-projects Simple Flight Ticket...A security vulnerability has been detected in code-projects Simple Flight Ticket Booking System 1.0. This impacts an unknown function of the file /Adminadd.php. The manipulation of the argument flightno/airplaneid/departure/dtime/arrival/atime/ec/ep/bc/bp leads to sql injection. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used. |
2026-03-08 | |
| CVE-2026-3709 | 6.9 | MEDIUM | CWE-74 | 0.0% p14 | 4.83 | A weakness has been identified in code-projects Simple Flight Ticket Booking Sys...A weakness has been identified in code-projects Simple Flight Ticket Booking System 1.0. This affects an unknown function of the file /register.php. Executing a manipulation of the argument Username can lead to sql injection. The attack may be launched remotely. The exploit has been made available to the public and could be used for attacks. |
2026-03-08 | |
| CVE-2026-3708 | 6.9 | MEDIUM | CWE-74 | 0.0% p12 | 4.83 | A security flaw has been discovered in code-projects Simple Flight Ticket Bookin...A security flaw has been discovered in code-projects Simple Flight Ticket Booking System 1.0. The impacted element is an unknown function of the file /login.php. Performing a manipulation of the argument Username results in sql injection. The attack may be initiated remotely. The exploit has been released to the public and may be used for attacks. |
2026-03-08 | |
| CVE-2026-3707 | 4.8 | MEDIUM | CWE-189 | 0.0% p3 | 3.36 | A vulnerability was identified in MrNanko webp4j up to 1.3.x. The affected eleme...A vulnerability was identified in MrNanko webp4j up to 1.3.x. The affected element is the function DecodeGifFromMemory of the file src/main/c/gif_decoder.c. Such manipulation of the argument canvas_height leads to integer overflow. Local access is required to approach this attack. The exploit is publicly available and might be used. The name of the patch is 89771b201c66d15d29e4cc016d8aae82b6a5fbe1. It is advisable to implement a patch to correct this issue. |
2026-03-08 | |
| CVE-2026-3706 | 1.7 | LOW | CWE-345 | 0.0% p1 | 1.19 | A vulnerability was determined in mkj Dropbear up to 2025.89. Impacted is the fu...A vulnerability was determined in mkj Dropbear up to 2025.89. Impacted is the function unpackneg of the file src/curve25519.c of the component S Range Check. This manipulation causes improper verification of cryptographic signature. The attack can be initiated remotely. The attack is considered to have high complexity. The exploitability is considered difficult. The actual existence of this vulnerability is currently in question. Patch name: fdec3c90a15447bd538641d85e5a3e3ac981011d. To fix this issue, it is recommended to deploy a patch. The project maintainer explains: "Signature Malleability is not exploitable in SSH protocol. (...) [A] PoC doesn't exist for SSH implementation, but rather it's against the internal API." |
2026-03-08 | |
| CVE-2026-3705 | 6.9 | MEDIUM | CWE-74 | 0.0% p14 | 4.83 | A vulnerability was found in code-projects Simple Flight Ticket Booking System 1...A vulnerability was found in code-projects Simple Flight Ticket Booking System 1.0. This issue affects some unknown processing of the file /Adminsearch.php. The manipulation of the argument flightno results in sql injection. It is possible to launch the attack remotely. The exploit has been made public and could be used. |
2026-03-08 | |
| CVE-2026-3703 | 8.9 | HIGH | CWE-119 | 0.2% p43 | 6.24 | A flaw has been found in Wavlink NU516U1 251208. This affects the function sub_4...A flaw has been found in Wavlink NU516U1 251208. This affects the function sub_401A10 of the file /cgi-bin/login.cgi. Executing a manipulation of the argument ipaddr can lead to out-of-bounds write. The attack may be performed from remote. The exploit has been published and may be used. Upgrading the affected component is recommended. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product. |
2026-03-08 | |
| CVE-2026-3702 | 5.3 | MEDIUM | CWE-79 | 0.0% p8 | 3.71 | A vulnerability was detected in SourceCodester Loan Management System 1.0. Affec...A vulnerability was detected in SourceCodester Loan Management System 1.0. Affected by this issue is some unknown functionality of the file /index.php. Performing a manipulation of the argument page results in cross site scripting. The attack is possible to be carried out remotely. The exploit is now public and may be used. |
2026-03-08 | |
| CVE-2026-3701 | 7.4 | HIGH | CWE-119 | 0.1% p25 | 5.18 | A security vulnerability has been detected in H3C Magic B1 up to 100R004. Affect...A security vulnerability has been detected in H3C Magic B1 up to 100R004. Affected by this vulnerability is the function Edit_BasicSSID_5G of the file /goform/aspForm. Such manipulation of the argument param leads to buffer overflow. The attack can be executed remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-08 | |
| CVE-2026-3704 | 5.1 | MEDIUM | CWE-74 | 0.2% p47 | 3.58 | A vulnerability has been found in Wavlink NU516U1 251208. This vulnerability aff...A vulnerability has been found in Wavlink NU516U1 251208. This vulnerability affects the function sub_405B2C of the file /cgi-bin/firewall.cgi of the component Incomplete Fix CVE-2025-10959. The manipulation leads to command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product. |
2026-03-08 | |
| CVE-2026-3700 | 7.4 | HIGH | CWE-119 | 0.1% p25 | 5.18 | A weakness has been identified in UTT HiPER 810G up to 1.7.7-171114. Affected is...A weakness has been identified in UTT HiPER 810G up to 1.7.7-171114. Affected is the function strcpy of the file /goform/formConfigDnsFilterGlobal. This manipulation causes buffer overflow. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be used for attacks. |
2026-03-08 | |
| CVE-2026-3699 | 7.4 | HIGH | CWE-119 | 0.1% p25 | 5.18 | A security flaw has been discovered in UTT HiPER 810G up to 1.7.7-171114. This i...A security flaw has been discovered in UTT HiPER 810G up to 1.7.7-171114. This impacts the function strcpy of the file /goform/formRemoteControl. The manipulation results in buffer overflow. The attack may be launched remotely. The exploit has been released to the public and may be used for attacks. |
2026-03-08 | |
| CVE-2026-3698 | 7.4 | HIGH | CWE-119 | 0.1% p25 | 5.18 | A vulnerability was identified in UTT HiPER 810G up to 1.7.7-171114. This affect...A vulnerability was identified in UTT HiPER 810G up to 1.7.7-171114. This affects the function strcpy of the file /goform/NTP. The manipulation leads to buffer overflow. The attack may be initiated remotely. The exploit is publicly available and might be used. |
2026-03-08 | |
| CVE-2026-3697 | 5.3 | MEDIUM | CWE-119 | 0.1% p16 | 3.71 | A vulnerability was determined in Planet ICG-2510 1.0_20250811. The impacted ele...A vulnerability was determined in Planet ICG-2510 1.0_20250811. The impacted element is the function sub_40C8E4 of the file /usr/sbin/httpd of the component Language Package Configuration Handler. Executing a manipulation of the argument Language can lead to stack-based buffer overflow. The attack can be launched remotely. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-08 | |
| CVE-2026-3696 | 6.9 | MEDIUM | CWE-77 | 1.9% p83 | 4.89 | A vulnerability was found in Totolink N300RH 6..1c.1353_B20190305. The affected ...A vulnerability was found in Totolink N300RH 6..1c.1353_B20190305. The affected element is the function setWiFiWpsConfig of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Performing a manipulation results in os command injection. The attack can be initiated remotely. The exploit has been made public and could be used. |
2026-03-08 | |
| CVE-2026-3695 | 6.9 | MEDIUM | CWE-22 | 0.0% p9 | 4.83 | A vulnerability has been found in SourceCodester Modern Image Gallery App 1.0. I...A vulnerability has been found in SourceCodester Modern Image Gallery App 1.0. Impacted is an unknown function of the file /delete.php. Such manipulation of the argument filename leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. |
2026-03-08 | |
| CVE-2026-3693 | 6.9 | MEDIUM | CWE-99 | 0.1% p22 | 4.83 | A flaw has been found in Shy2593666979 AgentChat up to 2.3.0. This issue affects...A flaw has been found in Shy2593666979 AgentChat up to 2.3.0. This issue affects the function get_user_info/update_user_info of the file /src/backend/agentchat/api/v1/user.py of the component User Endpoint. This manipulation of the argument user_id causes improper control of resource identifiers. It is possible to initiate the attack remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-08 | |
| CVE-2026-3683 | 5.3 | MEDIUM | CWE-918 | 0.0% p13 | 3.71 | A vulnerability was detected in bufanyun HotGo up to 2.0. This issue affects the...A vulnerability was detected in bufanyun HotGo up to 2.0. This issue affects the function ImageTransferStorage of the file /server/internal/logic/common/upload.go of the component Endpoint. The manipulation results in server-side request forgery. The attack may be launched remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-08 | |
| CVE-2026-3682 | 5.3 | MEDIUM | CWE-74 | 0.1% p16 | 3.71 | A security vulnerability has been detected in welovemedia FFmate up to 2.0.15. T...A security vulnerability has been detected in welovemedia FFmate up to 2.0.15. This vulnerability affects the function Execute of the file /internal/service/ffmpeg/ffmpeg.go. The manipulation leads to argument injection. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-08 | |
| CVE-2026-3681 | 5.3 | MEDIUM | CWE-918 | 0.0% p13 | 3.71 | A weakness has been identified in welovemedia FFmate up to 2.0.15. This affects ...A weakness has been identified in welovemedia FFmate up to 2.0.15. This affects the function fireWebhook of the file /internal/service/webhook/webhook.go. Executing a manipulation can lead to server-side request forgery. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-07 | |
| CVE-2026-3680 | 5.3 | MEDIUM | CWE-74 | 1.5% p81 | 3.76 | A security flaw has been discovered in RyuzakiShinji biome-mcp-server up to 1.0....A security flaw has been discovered in RyuzakiShinji biome-mcp-server up to 1.0.0. Affected by this issue is some unknown functionality of the file biome-mcp-server.ts. Performing a manipulation results in command injection. The attack can be initiated remotely. The exploit has been released to the public and may be used for attacks. The patch is named 335e1727147efeef011f1ff8b05dd751d8a660be. Applying a patch is the recommended action to fix this issue. |
2026-03-07 | |
| CVE-2026-3679 | 7.4 | HIGH | CWE-119 | 0.1% p25 | 5.18 | A vulnerability was identified in Tenda FH451 1.0.0.9. Affected by this vulnerab...A vulnerability was identified in Tenda FH451 1.0.0.9. Affected by this vulnerability is the function formQuickIndex of the file /goform/QuickIndex. Such manipulation of the argument mit_linktype/PPPOEPassword leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit is publicly available and might be used. |
2026-03-07 | |
| CVE-2026-3678 | 7.4 | HIGH | CWE-119 | 0.1% p25 | 5.18 | A vulnerability was determined in Tenda FH451 1.0.0.9. Affected is the function ...A vulnerability was determined in Tenda FH451 1.0.0.9. Affected is the function sub_3C434 of the file /goform/AdvSetWan. This manipulation of the argument wanmode/PPPOEPassword causes stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized. |
2026-03-07 | |
| CVE-2026-3677 | 7.4 | HIGH | CWE-119 | 0.1% p25 | 5.18 | A vulnerability was found in Tenda FH451 1.0.0.9. This impacts the function from...A vulnerability was found in Tenda FH451 1.0.0.9. This impacts the function fromSetCfm of the file /goform/setcfm. The manipulation of the argument funcname/funcpara1 results in stack-based buffer overflow. The attack may be performed from remote. The exploit has been made public and could be used. |
2026-03-07 | |
| CVE-2026-3675 | 4.8 | MEDIUM | CWE-266 | 0.0% p2 | 3.36 | A vulnerability was determined in Freedom Factory dGEN1 up to 20260221. Affected...A vulnerability was determined in Freedom Factory dGEN1 up to 20260221. Affected by this issue is the function FakeAppReceiver of the component org.ethosmobile.ethoslauncher. Executing a manipulation can lead to improper authorization. The attack needs to be launched locally. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-07 | |
| CVE-2026-3674 | 4.8 | MEDIUM | CWE-266 | 0.0% p2 | 3.36 | A vulnerability was found in Freedom Factory dGEN1 up to 20260221. Affected by t...A vulnerability was found in Freedom Factory dGEN1 up to 20260221. Affected by this vulnerability is the function FakeAppProvider of the component org.ethosmobile.ethoslauncher. Performing a manipulation results in improper authorization. The attack must be initiated from a local position. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-07 | |
| CVE-2026-3672 | 5.3 | MEDIUM | CWE-74 | 0.0% p9 | 3.71 | A vulnerability has been found in JeecgBoot up to 3.9.1. Affected is the functio...A vulnerability has been found in JeecgBoot up to 3.9.1. Affected is the function isExistSqlInjectKeyword of the file /jeecg-boot/sys/api/getDictItems. Such manipulation leads to sql injection. The attack may be performed from remote. The exploit has been disclosed to the public and may be used. |
2026-03-07 | |
| CVE-2026-3671 | 1.9 | LOW | CWE-266 | 0.0% p2 | 1.33 | A flaw has been found in Freedom Factory dGEN1 up to 20260221. Affected by this ...A flaw has been found in Freedom Factory dGEN1 up to 20260221. Affected by this vulnerability is the function TokenBalanceContentProvider of the component org.ethereumphone.walletmanager.testing123. Executing a manipulation can lead to improper authorization. The attack requires local access. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-07 | |
| CVE-2026-3670 | 4.8 | MEDIUM | CWE-266 | 0.0% p2 | 3.36 | A vulnerability was detected in Freedom Factory dGEN1 up to 20260221. Affected i...A vulnerability was detected in Freedom Factory dGEN1 up to 20260221. Affected is an unknown function of the component com.dgen.alarm. Performing a manipulation results in improper authorization. The attack requires a local approach. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-07 | |
| CVE-2026-3669 | 4.8 | MEDIUM | CWE-266 | 0.0% p2 | 3.36 | A security vulnerability has been detected in Freedom Factory dGEN1 up to 202602...A security vulnerability has been detected in Freedom Factory dGEN1 up to 20260221. This impacts the function AlarmService of the component com.dgen.alarm. Such manipulation leads to improper authorization. The attack needs to be performed locally. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-07 | |
| CVE-2026-2671 | 2.3 | LOW | CWE-310 | 0.0% p0 | 1.61 | A vulnerability was detected in Mendi Neurofeedback Headset V4. Affected by this...A vulnerability was detected in Mendi Neurofeedback Headset V4. Affected by this vulnerability is an unknown functionality of the component Bluetooth Low Energy Handler. Performing a manipulation results in cleartext transmission of sensitive information. The attack can only be performed from the local network. The attack's complexity is rated as high. The exploitation appears to be difficult. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-07 | |
| CVE-2026-30863 | 9.3 | CRITICAL | CWE-287 | 0.0% p7 | 6.51 | Parse Server is an open source backend that can be deployed to any infrastructur...Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.10 and 9.5.0-alpha.11, the Google, Apple, and Facebook authentication adapters use JWT verification to validate identity tokens. When the adapter's audience configuration option is not set (clientId for Google/Apple, appIds for Facebook), JWT verification silently skips audience claim validation. This allows an attacker to use a validly signed JWT issued for a different application to authenticate as any user on the target Parse Server. This issue has been patched in versions 8.6.10 and 9.5.0-alpha.11. |
2026-03-07 | |
| CVE-2026-30861 | 9.9 | CRITICAL | CWE-78 | 0.1% p21 | 6.93 | WeKnora is an LLM-powered framework designed for deep document understanding and...WeKnora is an LLM-powered framework designed for deep document understanding and semantic retrieval. From version 0.2.5 to before version 0.2.10, an unauthenticated remote code execution (RCE) vulnerability exists in the MCP stdio configuration validation. The application allows unrestricted user registration, meaning any attacker can create an account and exploit the command injection flaw. Despite implementing a whitelist for allowed commands (npx, uvx) and blacklists for dangerous arguments and environment variables, the validation can be bypassed using the -p flag with npx node. This allows any attacker to execute arbitrary commands with the application's privileges, leading to complete system compromise. This issue has been patched in version 0.2.10. |
2026-03-07 | |
| CVE-2026-30860 | 9.9 | CRITICAL | CWE-89 | 0.2% p43 | 6.94 | WeKnora is an LLM-powered framework designed for deep document understanding and...WeKnora is an LLM-powered framework designed for deep document understanding and semantic retrieval. Prior to version 0.2.12, a remote code execution (RCE) vulnerability exists in the application's database query functionality. The validation system fails to recursively inspect child nodes within PostgreSQL array expressions and row expressions, allowing attackers to bypass SQL injection protections. By smuggling dangerous PostgreSQL functions inside these expressions and chaining them with large object operations and library loading capabilities, an unauthenticated attacker can achieve arbitrary code execution on the database server with database user privileges. This issue has been patched in version 0.2.12. |
2026-03-07 | |
| CVE-2026-30859 | 5.3 | MEDIUM | CWE-284 | 0.0% p14 | 3.71 | WeKnora is an LLM-powered framework designed for deep document understanding and...WeKnora is an LLM-powered framework designed for deep document understanding and semantic retrieval. Prior to version 0.2.12, a broken access control vulnerability in the database query tool allows any authenticated tenant to read sensitive data belonging to other tenants, including API keys, model configurations, and private messages. The application fails to enforce tenant isolation on critical tables (models, messages, embeddings), enabling unauthorized cross-tenant data access with user-level authentication privileges. This issue has been patched in version 0.2.12. |
2026-03-07 | |
| CVE-2026-30858 | 6.5 | MEDIUM | CWE-918 | 0.1% p28 | 4.55 | WeKnora is an LLM-powered framework designed for deep document understanding and...WeKnora is an LLM-powered framework designed for deep document understanding and semantic retrieval. Prior to version 0.3.0, a DNS rebinding vulnerability in the web_fetch tool allows an unauthenticated attacker to bypass URL validation and access internal resources on the server, including private IP addresses (e.g., 127.0.0.1, 192.168.x.x). By crafting a malicious domain that resolves to a public IP during validation and subsequently resolves to a private IP during execution, an attacker can access sensitive local services and potentially exfiltrate data. This issue has been patched in version 0.3.0. |
2026-03-07 | |
| CVE-2026-30857 | 5.3 | MEDIUM | CWE-639 | 0.0% p11 | 3.71 | WeKnora is an LLM-powered framework designed for deep document understanding and...WeKnora is an LLM-powered framework designed for deep document understanding and semantic retrieval. Prior to version 0.3.0, a cross-tenant authorization bypass in the knowledge base copy endpoint allows any authenticated user to clone (duplicate) another tenant’s knowledge base into their own tenant by knowing/guessing the source knowledge base ID. This enables bulk data exfiltration (document/FAQ content) across tenants. This issue has been patched in version 0.3.0. |
2026-03-07 | |
| CVE-2026-30856 | 5.9 | MEDIUM | CWE-706 | 0.0% p5 | 4.13 | WeKnora is an LLM-powered framework designed for deep document understanding and...WeKnora is an LLM-powered framework designed for deep document understanding and semantic retrieval. Prior to version 0.3.0, a vulnerability involving tool name collision and indirect prompt injection allows a malicious remote MCP server to hijack tool execution. By exploiting an ambiguous naming convention in the MCP client (mcp_{service}_{tool}), an attacker can register a malicious tool that overwrites a legitimate one (e.g., tavily_extract). This enables the attacker to redirect LLM execution flow, exfiltrate system prompts, context, and potentially execute other tools with the user's privileges. This issue has been patched in version 0.3.0. |
2026-03-07 | |
| CVE-2026-30855 | 8.8 | HIGH | CWE-284 | 0.1% p35 | 6.16 | WeKnora is an LLM-powered framework designed for deep document understanding and...WeKnora is an LLM-powered framework designed for deep document understanding and semantic retrieval. Prior to version 0.3.2, an authorization bypass in tenant management endpoints of WeKnora application allows any authenticated user to read, modify, or delete any tenant by ID. Since account registration is open to the public, this vulnerability allows any unauthenticated attacker to register an account and subsequently exploit the system. This enables cross-tenant account takeover and destruction, making the impact critical. This issue has been patched in version 0.3.2. |
2026-03-07 | |
| CVE-2026-30854 | 6.9 | MEDIUM | CWE-863 | 0.0% p4 | 4.83 | Parse Server is an open source backend that can be deployed to any infrastructur...Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. From version 9.3.1-alpha.3 to before version 9.5.0-alpha.10, when graphQLPublicIntrospection is disabled, __type queries nested inside inline fragments (e.g. ... on Query { __type(name:"User") { name } }) bypass the introspection control, allowing unauthenticated users to perform type reconnaissance. __schema introspection is not affected. This issue has been patched in version 9.5.0-alpha.10. |
2026-03-07 | |
| CVE-2026-30852 | 5.5 | MEDIUM | CWE-74 | 0.0% p12 | 3.85 | Caddy is an extensible server platform that uses TLS by default. From version 2....Caddy is an extensible server platform that uses TLS by default. From version 2.7.5 to before version 2.11.2, the vars_regexp matcher in vars.go:337 double-expands user-controlled input through the Caddy replacer. When vars_regexp matches against a placeholder like {http.request.header.X-Input}, the header value gets resolved once (expected), then passed through repl.ReplaceAll() again (the bug). This means an attacker can put {env.DATABASE_URL} or {file./etc/passwd} in a request header and the server will evaluate it, leaking environment variables, file contents, and system info. This issue has been patched in version 2.11.2. |
2026-03-07 | |
| CVE-2026-30851 | 8.1 | HIGH | CWE-287 | 0.0% p5 | 5.67 | Caddy is an extensible server platform that uses TLS by default. From version 2....Caddy is an extensible server platform that uses TLS by default. From version 2.10.0 to before version 2.11.2, forward_auth copy_headers does not strip client-supplied headers, allowing identity injection and privilege escalation. This issue has been patched in version 2.11.2. |
2026-03-07 | |
| CVE-2026-30850 | 6.3 | MEDIUM | CWE-862 | 0.0% p5 | 4.41 | Parse Server is an open source backend that can be deployed to any infrastructur...Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.9 and 9.5.0-alpha.9, the file metadata endpoint (GET /files/:appId/metadata/:filename) does not enforce beforeFind / afterFind file triggers. When these triggers are used as access-control gates, the metadata endpoint bypasses them entirely, allowing unauthorized access to file metadata. This issue has been patched in versions 8.6.9 and 9.5.0-alpha.9. |
2026-03-07 | |
| CVE-2026-30848 | 6.3 | MEDIUM | CWE-22 | 0.0% p5 | 4.41 | Parse Server is an open source backend that can be deployed to any infrastructur...Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.8 and 9.5.0-alpha.8, the PagesRouter static file serving route is vulnerable to a path traversal attack that allows unauthenticated reading of files outside the configured pagesPath directory. The boundary check uses a string prefix comparison without enforcing a directory separator boundary. An attacker can use path traversal sequences to access files in sibling directories whose names share the same prefix as the pages directory (e.g. pages-secret starts with pages). This issue has been patched in versions 8.6.8 and 9.5.0-alpha.8. |
2026-03-07 | |
| CVE-2026-29196 | 8.7 | HIGH | CWE-863 | 0.0% p1 | 6.09 | Netmaker makes networks with WireGuard. Prior to version 1.5.0, a user assigned ...Netmaker makes networks with WireGuard. Prior to version 1.5.0, a user assigned the platform-user role can retrieve WireGuard private keys of all wireguard configs in a network by calling GET /api/extclients/{network} or GET /api/nodes/{network}. While the Netmaker UI restricts visibility, the API endpoints return full records, including private keys, without filtering based on the requesting user's ownership. This issue has been patched in version 1.5.0. |
2026-03-07 | |
| CVE-2026-29195 | 6.9 | MEDIUM | CWE-863 | 0.0% p2 | 4.83 | Netmaker makes networks with WireGuard. Prior to version 1.5.0, the user update ...Netmaker makes networks with WireGuard. Prior to version 1.5.0, the user update handler (PUT /api/users/{username}) lacks validation to prevent an admin-role user from assigning the super-admin role during account updates. While the code correctly blocks an admin from assigning the admin role to another user, it does not include an equivalent check for the super-admin role. This issue has been patched in version 1.5.0. |
2026-03-07 | |
| CVE-2026-3668 | 2.3 | LOW | CWE-266 | 0.0% p10 | 1.61 | A weakness has been identified in Freedom Factory dGEN1 up to 20260221. This aff...A weakness has been identified in Freedom Factory dGEN1 up to 20260221. This affects the function AndroidEthereum of the component org.ethosmobile.webpwaemul. This manipulation causes improper access controls. Remote exploitation of the attack is possible. The attack is considered to have high complexity. The exploitability is reported as difficult. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-07 | |
| CVE-2026-3667 | 4.8 | MEDIUM | CWE-266 | 0.0% p3 | 3.36 | A security flaw has been discovered in Freedom Factory dGEN1 up to 20260221. The...A security flaw has been discovered in Freedom Factory dGEN1 up to 20260221. The impacted element is the function FakeAppService of the component org.ethosmobile.ethoslauncher. The manipulation results in improper authorization. The attack must be initiated from a local position. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-07 | |
| CVE-2026-3665 | 4.8 | MEDIUM | CWE-404 | 0.0% p6 | 3.36 | A vulnerability was identified in xlnt-community xlnt up to 1.6.1. The affected ...A vulnerability was identified in xlnt-community xlnt up to 1.6.1. The affected element is the function xlnt::detail::xlsx_consumer::read_office_document of the file source/detail/serialization/xlsx_consumer.cpp of the component XLSX File Parser. The manipulation leads to null pointer dereference. The attack must be carried out locally. The exploit is publicly available and might be used. |
2026-03-07 | |
| CVE-2026-30838 | 5.1 | MEDIUM | CWE-79 | 0.0% p12 | 3.57 | league/commonmark is a PHP Markdown parser. Prior to version 2.8.1, the Disallow...league/commonmark is a PHP Markdown parser. Prior to version 2.8.1, the DisallowedRawHtml extension can be bypassed by inserting a newline, tab, or other ASCII whitespace character between a disallowed HTML tag name and the closing >. For example, <script\n> would pass through unfiltered and be rendered as a valid HTML tag by browsers. This is a cross-site scripting (XSS) vector for any application that relies on this extension to sanitize untrusted user input. All applications using the DisallowedRawHtml extension to process untrusted markdown are affected. Applications that use a dedicated HTML sanitizer (such as HTML Purifier) on the rendered output are not affected. This issue has been patched in version 2.8.1. |
2026-03-07 | |
| CVE-2026-30834 | 7.5 | HIGH | CWE-918 | 0.0% p2 | 5.25 | PinchTab is a standalone HTTP server that gives AI agents direct control over a ...PinchTab is a standalone HTTP server that gives AI agents direct control over a Chrome browser. Prior to version 0.7.7, a Server-Side Request Forgery (SSRF) vulnerability in the /download endpoint allows any user with API access to induce the PinchTab server to make requests to arbitrary URLs, including internal network services and local system files, and exfiltrate the full response content. This issue has been patched in version 0.7.7. |
2026-03-07 | |
| CVE-2026-30832 | 9.1 | CRITICAL | CWE-918 | 0.0% p5 | 6.37 | Soft Serve is a self-hostable Git server for the command line. From version 0.6....Soft Serve is a self-hostable Git server for the command line. From version 0.6.0 to before version 0.11.4, an authenticated SSH user can force the server to make HTTP requests to internal/private IP addresses by running repo import with a crafted --lfs-endpoint URL. The initial batch request is blind (the response from a metadata endpoint won't parse as valid LFS JSON), but an attacker hosting a fake LFS server can chain this into full read access to internal services by returning download URLs that point at internal targets. This issue has been patched in version 0.11.4. |
2026-03-07 | |
| CVE-2026-29787 | 5.3 | MEDIUM | CWE-200 | 0.0% p6 | 3.71 | mcp-memory-service is an open-source memory backend for multi-agent systems. Pri...mcp-memory-service is an open-source memory backend for multi-agent systems. Prior to version 10.21.0, the /api/health/detailed endpoint returns detailed system information including OS version, Python version, CPU count, memory totals, disk usage, and the full database filesystem path. When MCP_ALLOW_ANONYMOUS_ACCESS=true is set (required for the HTTP server to function without OAuth/API key), this endpoint is accessible without authentication. Combined with the default 0.0.0.0 binding, this exposes sensitive reconnaissance data to the entire network. This issue has been patched in version 10.21.0. |
2026-03-07 | |
| CVE-2026-29786 | 8.2 | HIGH | CWE-22 | 0.0% p0 | 5.74 | node-tar is a full-featured Tar for Node.js. Prior to version 7.5.10, tar can be...node-tar is a full-featured Tar for Node.js. Prior to version 7.5.10, tar can be tricked into creating a hardlink that points outside the extraction directory by using a drive-relative link target such as C:../target.txt, which enables file overwrite outside cwd during normal tar.x() extraction. This issue has been patched in version 7.5.10. |
2026-03-07 | |
| CVE-2026-29784 | 7.5 | HIGH | CWE-352 | 0.0% p5 | 5.25 | Ghost is a Node.js content management system. From version 5.101.6 to 6.19.2, in...Ghost is a Node.js content management system. From version 5.101.6 to 6.19.2, incomplete CSRF protections around /session/verify made it possible to use OTCs in login sessions different from the requesting session. In some scenarios this might have made it easier for phishers to take over a Ghost site. This issue has been patched in version 6.19.3. |
2026-03-07 | |
| CVE-2026-29781 | 5.3 | MEDIUM | CWE-476 | 0.0% p6 | 3.71 | Sliver is a command and control framework that uses a custom Wireguard netstack....Sliver is a command and control framework that uses a custom Wireguard netstack. In versions from 1.7.3 and prior, a vulnerability exists in the Sliver C2 server's Protobuf unmarshalling logic due to a systemic lack of nil-pointer validation. By extracting valid implant credentials and omitting nested fields in a signed message, an authenticated actor can trigger an unhandled runtime panic. Because the mTLS, WireGuard, and DNS transport layers lack the panic recovery middleware present in the HTTP transport, this results in a global process termination. While requiring post-authentication access (a captured implant), this flaw effectively acts as an infrastructure "kill-switch," instantly severing all active sessions across the entire fleet and requiring a manual server restart to restore operations. At time of publication, there are no publicly available patches. |
2026-03-07 | |
| CVE-2026-29780 | 5.5 | MEDIUM | CWE-22 | 0.0% p0 | 3.85 | eml_parser serves as a python module for parsing eml files and returning various...eml_parser serves as a python module for parsing eml files and returning various information found in the e-mail as well as computed information. Prior to version 2.0.1, the official example script examples/recursively_extract_attachments.py contains a path traversal vulnerability that allows arbitrary file write outside the intended output directory. Attachment filenames extracted from parsed emails are directly used to construct output file paths without any sanitization, allowing an attacker-controlled filename to escape the target directory. This issue has been patched in version 2.0.1. |
2026-03-07 | |
| CVE-2026-29779 | 7.5 | HIGH | CWE-200 | 0.0% p12 | 5.25 | UptimeFlare is a serverless uptime monitoring & status page solution, powered by...UptimeFlare is a serverless uptime monitoring & status page solution, powered by Cloudflare Workers. Prior to commit 377a596, configuration file uptime.config.ts exports both pageConfig (safe for client use) and workerConfig (server-only, contains sensitive data) from the same module. Due to pages/incidents.tsx importing and using workerConfig directly inside client-side component code, the entire workerConfig object was included in the client-side JavaScript bundle served to all visitors. This issue has been patched via commit 377a596. |
2026-03-07 | |
| CVE-2026-29778 | 7.1 | HIGH | CWE-23 | 0.0% p4 | 4.97 | pyLoad is a free and open-source download manager written in Python. From versio...pyLoad is a free and open-source download manager written in Python. From version 0.5.0b3.dev13 to 0.5.0b3.dev96, the edit_package() function implements insufficient sanitization for the pack_folder parameter. The current protection relies on a single-pass string replacement of "../", which can be bypassed using crafted recursive traversal sequences. This issue has been patched in version 0.5.0b3.dev97. |
2026-03-07 | |
| CVE-2026-29771 | 8.7 | HIGH | CWE-404 | 0.0% p4 | 6.09 | Netmaker makes networks with WireGuard. Prior to version 1.2.0, the /api/server/...Netmaker makes networks with WireGuard. Prior to version 1.2.0, the /api/server/shutdown endpoint allows termination of the Netmaker server process via syscall.SIGINT. This allows any user to repeatedly shut down the server, causing cyclic denial of service with approximately 3-second restart intervals. This issue has been patched in version 1.2.0. |
2026-03-07 | |
| CVE-2026-29194 | 8.6 | HIGH | CWE-863 | 0.0% p8 | 6.02 | Netmaker makes networks with WireGuard. Prior to version 1.5.0, the Authorize mi...Netmaker makes networks with WireGuard. Prior to version 1.5.0, the Authorize middleware in Netmaker incorrectly validates host JWT tokens. When a route permits host authentication (hostAllowed=true), a valid host token bypasses all subsequent authorization checks without verifying that the host is authorized to access the specific requested resource. Any entity possessing knowledge of object identifiers (node IDs, host IDs) can craft a request with an arbitrary valid host token to access, modify, or delete resources belonging to other hosts. Affected endpoints include node info retrieval, host deletion, MQTT signal transmission, fallback host updates, and failover operations. This issue has been patched in version 1.5.0. |
2026-03-07 | |
| CVE-2026-29190 | 4.1 | MEDIUM | CWE-22 | 0.1% p27 | 2.87 | Karapace is an open-source implementation of Kafka REST and Schema Registry. Pri...Karapace is an open-source implementation of Kafka REST and Schema Registry. Prior to version 6.0.0, there is a Path Traversal vulnerability in the backup reader (backup/backends/v3/backend.py). If a malicious backup file is provided to Karapace, an attacker may exploit insufficient path validation to perform arbitrary file read on the system where Karapace is running. The issue affects deployments that use the backup/restore functionality and process backups from untrusted sources. The impact depends on the file system permissions of the Karapace process. This issue has been patched in version 6.0.0. |
2026-03-07 | |
| CVE-2026-29076 | 5.9 | MEDIUM | CWE-674 | 0.1% p17 | 4.13 | cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library...cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library. Prior to version 0.37.0, cpp-httplib uses std::regex (libstdc++) to parse RFC 5987 encoded filename* values in multipart Content-Disposition headers. The regex engine in libstdc++ implements backtracking via deep recursion, consuming one stack frame per input character. An attacker can send a single HTTP POST request with a crafted filename* parameter that causes uncontrolled stack growth, resulting in a stack overflow (SIGSEGV) that crashes the server process. This issue has been patched in version 0.37.0. |
2026-03-07 | |
| CVE-2026-28678 | 8.1 | HIGH | CWE-311 | 0.0% p8 | 5.67 | DSA Study Hub is an interactive educational web application. Prior to commit d52...DSA Study Hub is an interactive educational web application. Prior to commit d527fba, the user authentication system in server/routes/auth.js was found to be vulnerable to Insufficiently Protected Credentials. Authentication tokens (JWTs) were stored in HTTP cookies without cryptographic protection of the payload. This issue has been patched via commit d527fba. |
2026-03-07 | |
| CVE-2026-3664 | 4.8 | MEDIUM | CWE-119 | 0.0% p5 | 3.36 | A vulnerability was determined in xlnt-community xlnt up to 1.6.1. Impacted is t...A vulnerability was determined in xlnt-community xlnt up to 1.6.1. Impacted is the function xlnt::detail::compound_document::read_directory of the file source/detail/cryptography/compound_document.cpp of the component Encrypted XLSX File Parser. Executing a manipulation can lead to out-of-bounds read. The attack is restricted to local execution. The exploit has been publicly disclosed and may be utilized. This patch is called 147. Applying a patch is advised to resolve this issue. |
2026-03-07 | |
| CVE-2026-3663 | 4.8 | MEDIUM | CWE-119 | 0.0% p6 | 3.36 | A vulnerability was found in xlnt-community xlnt up to 1.6.1. This issue affects...A vulnerability was found in xlnt-community xlnt up to 1.6.1. This issue affects the function xlnt::detail::compound_document_istreambuf::xsgetn of the file source/detail/cryptography/compound_document.cpp of the component XLSX File Parser. Performing a manipulation results in out-of-bounds read. The attack is only possible with local access. The exploit has been made public and could be used. The patch is named 147. It is recommended to apply a patch to fix this issue. |
2026-03-07 | |
| CVE-2026-29193 | 8.2 | HIGH | CWE-287 | 0.0% p3 | 5.74 | ZITADEL is an open source identity management platform. From version 4.0.0 to 4....ZITADEL is an open source identity management platform. From version 4.0.0 to 4.12.0, a vulnerability in Zitadel's login V2 UI allowed users to bypass login behavior and security policies and self-register new accounts or sign in using password even if corresponding options were disabled in their organizaton. This issue has been patched in version 4.12.1. |
2026-03-07 | |
| CVE-2026-29192 | 7.7 | HIGH | CWE-79 | 0.0% p3 | 5.39 | ZITADEL is an open source identity management platform. From version 4.0.0 to 4....ZITADEL is an open source identity management platform. From version 4.0.0 to 4.11.1, a vulnerability in Zitadel's login V2 interface was discovered that allowed a possible account takeover via Default URI Redirect. This issue has been patched in version 4.12.0. |
2026-03-07 | |
| CVE-2026-29191 | 9.3 | CRITICAL | CWE-79 | 0.0% p3 | 6.51 | ZITADEL is an open source identity management platform. From version 4.0.0 to 4....ZITADEL is an open source identity management platform. From version 4.0.0 to 4.11.1, a vulnerability in Zitadel's login V2 interface was discovered that allowed a possible account takeover via XSS in /saml-post Endpoint. This issue has been patched in version 4.12.0. |
2026-03-07 | |
| CVE-2026-29186 | 7.7 | HIGH | CWE-74 | 0.0% p9 | 5.39 | Backstage is an open framework for building developer portals. Prior to version ...Backstage is an open framework for building developer portals. Prior to version 1.14.3, this is a configuration bypass vulnerability that enables arbitrary code execution. The @backstage/plugin-techdocs-node package uses an allowlist to filter dangerous MkDocs configuration keys during the documentation build process. A gap in this allowlist allows attackers to craft an mkdocs.yml that causes arbitrary Python code execution, completely bypassing TechDocs' security controls. This issue has been patched in version 1.14.3. |
2026-03-07 | |
| CVE-2026-29185 | 2.7 | LOW | CWE-22 | 0.0% p3 | 1.89 | Backstage is an open framework for building developer portals. Prior to version ...Backstage is an open framework for building developer portals. Prior to version 1.20.1, a vulnerability in the SCM URL parsing used by Backstage integrations allowed path traversal sequences in encoded form to be included in file paths. When these URLs were processed by integration functions that construct API URLs, the traversal segments could redirect requests to unintended SCM provider API endpoints using the configured server-side integration credentials. This issue has been patched in version 1.20.1. |
2026-03-07 | |
| CVE-2026-29184 | 2.0 | LOW | CWE-532 | 0.0% p0 | 1.40 | Backstage is an open framework for building developer portals. Prior to version ...Backstage is an open framework for building developer portals. Prior to version 3.1.4, a malicious scaffolder template can bypass the log redaction mechanism to exfiltrate secrets provided run through task event logs. This issue has been patched in version 3.1.4. |
2026-03-07 | |
| CVE-2026-29067 | 8.1 | HIGH | CWE-601 | 0.0% p2 | 5.67 | ZITADEL is an open source identity management platform. From version 4.0.0-rc.1 ...ZITADEL is an open source identity management platform. From version 4.0.0-rc.1 to 4.7.0, a potential vulnerability exists in ZITADEL's password reset mechanism in login V2. ZITADEL utilizes the Forwarded or X-Forwarded-Host header from incoming requests to construct the URL for the password reset confirmation link. This link, containing a secret code, is then emailed to the user. This issue has been patched in version 4.7.1. |
2026-03-07 | |
| CVE-2026-3662 | 5.1 | MEDIUM | CWE-74 | 0.2% p42 | 3.58 | A vulnerability has been found in Wavlink WL-NU516U1 240425. This vulnerability ...A vulnerability has been found in Wavlink WL-NU516U1 240425. This vulnerability affects the function usb_p910 of the file /cgi-bin/adm.cgi. Such manipulation of the argument Pr_mode leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure. |
2026-03-07 | |
| CVE-2026-3661 | 5.1 | MEDIUM | CWE-74 | 0.2% p42 | 3.58 | A flaw has been found in Wavlink WL-NU516U1 240425. This affects the function ot...A flaw has been found in Wavlink WL-NU516U1 240425. This affects the function ota_new_upgrade of the file /cgi-bin/adm.cgi. This manipulation of the argument model causes command injection. It is possible to initiate the attack remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure. |
2026-03-07 | |
| CVE-2026-2219 | 7.5 | HIGH | CWE-835 | 0.0% p6 | 5.25 | It was discovered that dpkg-deb (a component of dpkg, the Debian package managem...It was discovered that dpkg-deb (a component of dpkg, the Debian package management system) does not properly validate the end of the data stream when uncompressing a zstd-compressed .deb archive, which may result in denial of service (infinite loop spinning the CPU). |
2026-03-07 | |
| CVE-2026-24308 | 7.5 | HIGH | CWE-532 | 0.0% p6 | 5.25 | Improper handling of configuration values in ZKConfig in Apache ZooKeeper 3.8.5 ...Improper handling of configuration values in ZKConfig in Apache ZooKeeper 3.8.5 and 3.9.4 on all platforms allows an attacker to expose sensitive information stored in client configuration in the client's logfile. Configuration values are exposed at INFO level logging rendering potential production systems affected by the issue. Users are recommended to upgrade to version 3.8.6 or 3.9.5 which fixes this issue. |
2026-03-07 | |
| CVE-2026-24281 | 7.4 | HIGH | CWE-295 | 0.0% p8 | 5.18 | Hostname verification in Apache ZooKeeper ZKTrustManager falls back to reverse D...Hostname verification in Apache ZooKeeper ZKTrustManager falls back to reverse DNS (PTR) when IP SAN validation fails, allowing attackers who control or spoof PTR records to impersonate ZooKeeper servers or clients with a valid certificate for the PTR name. It's important to note that attacker must present a certificate which is trusted by ZKTrustManager which makes the attack vector harder to exploit. Users are recommended to upgrade to version 3.8.6 or 3.9.5, which fixes this issue by introducing a new configuration option to disable reverse DNS lookup in client and quorum protocols. |
2026-03-07 | |
| CVE-2026-2433 | 6.1 | MEDIUM | CWE-79 | 0.1% p19 | 4.27 | The RSS Aggregator – RSS Import, News Feeds, Feed to Post, and Autoblogging plug...The RSS Aggregator – RSS Import, News Feeds, Feed to Post, and Autoblogging plugin for WordPress is vulnerable to DOM-Based Cross-Site Scripting via postMessage in all versions up to, and including, 5.0.11. This is due to the plugin's admin-shell.js registering a global message event listener without origin validation (missing event.origin check) and directly passing user-controlled URLs to window.open() without URL scheme validation. This makes it possible for unauthenticated attackers to execute arbitrary JavaScript in the context of an authenticated administrator's session by tricking them into visiting a malicious website that sends crafted postMessage payloads to the plugin's admin page. |
2026-03-07 | |
| CVE-2026-2420 | 4.4 | MEDIUM | CWE-79 | 0.0% p11 | 3.08 | The LotekMedia Popup Form plugin for WordPress is vulnerable to Stored Cross-Sit...The LotekMedia Popup Form plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin settings in all versions up to, and including, 1.0.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Administrator-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the frontend of the site where the popup is displayed. |
2026-03-07 | |
| CVE-2026-1825 | 6.4 | MEDIUM | CWE-79 | 0.0% p10 | 4.48 | The Show YouTube video plugin for WordPress is vulnerable to Stored Cross-Site S...The Show YouTube video plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'syv' shortcode in all versions up to, and including, 1.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-03-07 | |
| CVE-2026-1824 | 6.4 | MEDIUM | CWE-79 | 0.0% p10 | 4.48 | The Infomaniak Connect for OpenID plugin for WordPress is vulnerable to Stored C...The Infomaniak Connect for OpenID plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'endpoint_login' parameter of the infomaniak_connect_generic_auth_url shortcode in all versions up to, and including, 1.0.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-03-07 | |
| CVE-2026-1823 | 6.4 | MEDIUM | CWE-79 | 0.0% p12 | 4.48 | The Consensus Embed plugin for WordPress is vulnerable to Stored Cross-Site Scri...The Consensus Embed plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's consensus shortcode in all versions up to, and including, 1.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-03-07 | |
| CVE-2026-1820 | 6.4 | MEDIUM | CWE-79 | 0.0% p10 | 4.48 | The Media Library Alt Text Editor plugin for WordPress is vulnerable to Stored C...The Media Library Alt Text Editor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'bvmalt_sc_div_update_alt_text' shortcode in all versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-03-07 | |
| CVE-2026-1805 | 6.4 | MEDIUM | CWE-79 | 0.0% p12 | 4.48 | The DA Media GigList plugin for WordPress is vulnerable to Stored Cross-Site Scr...The DA Media GigList plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's damedia_giglist shortcode in all versions up to, and including, 1.9.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-03-07 | |
| CVE-2026-1574 | 6.4 | MEDIUM | CWE-79 | 0.0% p10 | 4.48 | The MyQtip – easy qTip2 plugin for WordPress is vulnerable to Stored Cross-Site ...The MyQtip – easy qTip2 plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's `myqtip` shortcode in all versions up to, and including, 2.0.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-03-07 | |
| CVE-2026-1569 | 6.4 | MEDIUM | CWE-79 | 0.0% p10 | 4.48 | The Wueen plugin for WordPress is vulnerable to Stored Cross-Site Scripting via ...The Wueen plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's `wueen-blocket` shortcode in all versions up to, and including, 0.2.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-03-07 | |
| CVE-2026-1087 | 4.3 | MEDIUM | CWE-352 | 0.0% p2 | 3.01 | The Guardian News Feed plugin for WordPress is vulnerable to Cross-Site Request ...The Guardian News Feed plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.2. This is due to missing nonce validation on the settings update functionality. This makes it possible for unauthenticated attackers to modify the plugin's settings, including the Guardian API key, via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. |
2026-03-07 | |
| CVE-2026-1086 | 4.3 | MEDIUM | CWE-352 | 0.0% p2 | 3.01 | The Font Pairing Preview For Landing Pages plugin for WordPress is vulnerable to...The Font Pairing Preview For Landing Pages plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.3. This is due to missing nonce validation on the settings update functionality. This makes it possible for unauthenticated attackers to modify the plugin's font pairing settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. |
2026-03-07 | |
| CVE-2026-1085 | 4.3 | MEDIUM | CWE-352 | 0.0% p2 | 3.01 | The True Ranker plugin for WordPress is vulnerable to Cross-Site Request Forgery...The True Ranker plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.2.9. This is due to missing nonce validation on the seolocalrank-signout action. This makes it possible for unauthenticated attackers to disconnect the administrator's True Ranker account via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. |
2026-03-07 | |
| CVE-2026-1074 | 7.2 | HIGH | CWE-79 | 0.1% p30 | 5.04 | The WP App Bar plugin for WordPress is vulnerable to Stored Cross-Site Scripting...The WP App Bar plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'app-bar-features' parameter in all versions up to, and including, 1.5. This is due to insufficient input sanitization and output escaping combined with a missing authorization check in the `App_Bar_Settings` class constructor. This makes it possible for unauthenticated attackers to inject arbitrary web scripts into multiple plugin settings that will execute whenever a user accesses the admin settings page. |
2026-03-07 | |
| CVE-2026-1073 | 4.3 | MEDIUM | CWE-352 | 0.0% p2 | 3.01 | The Purchase Button For Affiliate Link plugin for WordPress is vulnerable to Cro...The Purchase Button For Affiliate Link plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.2. This is due to missing nonce validation on the settings page form handler in `inc/purchase-btn-options-page.php`. This makes it possible for unauthenticated attackers to modify plugin settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. |
2026-03-07 | |
| CVE-2026-1071 | 4.4 | MEDIUM | CWE-79 | 0.0% p8 | 3.08 | The Carta Online plugin for WordPress is vulnerable to Stored Cross-Site Scripti...The Carta Online plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 2.13.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. |
2026-03-07 | |
| CVE-2025-14675 | 7.2 | HIGH | CWE-22 | 1.0% p76 | 5.07 | The Meta Box plugin for WordPress is vulnerable to arbitrary file deletion due t...The Meta Box plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'ajax_delete_file' function in all versions up to, and including, 5.11.1. This makes it possible for authenticated attackers, with Contributor-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php). |
2026-03-07 | |
| CVE-2026-30842 | 4.3 | MEDIUM | CWE-862 | 0.0% p1 | 3.01 | Wallos is an open-source, self-hostable personal subscription tracker. Prior to ...Wallos is an open-source, self-hostable personal subscription tracker. Prior to version 4.6.2, Wallos allows an authenticated user to delete avatar files uploaded by other users. The avatar deletion endpoint does not verify that the requested avatar belongs to the current user. As a result, any authenticated user who knows or can discover another user's uploaded avatar filename can delete that file. This issue has been patched in version 4.6.2. |
2026-03-07 | |
| CVE-2026-30841 | 6.9 | MEDIUM | CWE-79 | 0.0% p9 | 4.83 | Wallos is an open-source, self-hostable personal subscription tracker. Prior to ...Wallos is an open-source, self-hostable personal subscription tracker. Prior to version 4.6.2, passwordreset.php outputs $_GET["token"] and $_GET["email"] directly into HTML input value attributes using <?= $token ?> and <?= $email ?> without calling htmlspecialchars(). This allows reflected XSS by breaking out of the attribute context. This issue has been patched in version 4.6.2. |
2026-03-07 | |
| CVE-2026-30840 | 8.8 | HIGH | CWE-295 | 0.1% p17 | 6.16 | Wallos is an open-source, self-hostable personal subscription tracker. Prior to ...Wallos is an open-source, self-hostable personal subscription tracker. Prior to version 4.6.2, there is a server-side request forgery vulnerability in notification testers. This issue has been patched in version 4.6.2. |
2026-03-07 | |
| CVE-2026-30839 | 5.3 | MEDIUM | CWE-918 | 0.0% p9 | 3.71 | Wallos is an open-source, self-hostable personal subscription tracker. Prior to ...Wallos is an open-source, self-hostable personal subscription tracker. Prior to version 4.6.2, testwebhooknotifications.php does not validate the target URL against private/reserved IP ranges, enabling full-read SSRF. The server response is returned to the caller. This issue has been patched in version 4.6.2. |
2026-03-07 | |
| CVE-2026-30830 | 2.1 | LOW | CWE-79 | 0.0% p1 | 1.47 | Defuddle cleans up HTML pages. Prior to version 0.9.0, the _findContentBySchemaT...Defuddle cleans up HTML pages. Prior to version 0.9.0, the _findContentBySchemaText method in src/defuddle.ts interpolates image src and alt attributes directly into an HTML string without escaping. An attacker can use a " in the alt attribute to break out of the attribute context and inject event handler. This issue has been patched in version 0.9.0. |
2026-03-07 | |
| CVE-2026-30829 | 5.3 | MEDIUM | CWE-200 | 0.0% p6 | 3.71 | Checkmate is an open-source, self-hosted tool designed to track and monitor serv...Checkmate is an open-source, self-hosted tool designed to track and monitor server hardware, uptime, response times, and incidents in real-time with beautiful visualizations. Prior to version 3.4.0, an unauthenticated information disclosure vulnerability exists in the GET /api/v1/status-page/:url endpoint. The endpoint does not enforce authentication or verify whether a status page is published before returning full status page details. As a result, unpublished status pages and their associated internal data are accessible to any unauthenticated user via direct API requests. This issue has been patched in version 3.4.0. |
2026-03-07 | |
| CVE-2026-30828 | 8.7 | HIGH | CWE-22 | 0.1% p19 | 6.09 | Wallos is an open-source, self-hostable personal subscription tracker. Prior to ...Wallos is an open-source, self-hostable personal subscription tracker. Prior to version 4.6.2, the url parameter can be used to retrieve local system files. This issue has been patched in version 4.6.2. |
2026-03-07 | |
| CVE-2026-30827 | 7.5 | HIGH | CWE-770 | 0.0% p5 | 5.25 | express-rate-limit is a basic rate-limiting middleware for Express. In versions ...express-rate-limit is a basic rate-limiting middleware for Express. In versions starting from 8.0.0 and prior to versions 8.0.2, 8.1.1, 8.2.2, and 8.3.0, the default keyGenerator in express-rate-limit applies IPv6 subnet masking (/56 by default) to all addresses that net.isIPv6() returns true for. This includes IPv4-mapped IPv6 addresses (::ffff:x.x.x.x), which Node.js returns as request.ip on dual-stack servers. Because the first 80 bits of all IPv4-mapped addresses are zero, a /56 (or any /32 to /80) subnet mask produces the same network key (::/56) for every IPv4 client. This collapses all IPv4 traffic into a single rate-limit bucket: one client exhausting the limit causes HTTP 429 for all other IPv4 clients. This issue has been patched in versions 8.0.2, 8.1.1, 8.2.2, and 8.3.0. |
2026-03-07 | |
| CVE-2026-30825 | 0.0 | NONE | CWE-639 | 0.0% p2 | 0.00 | hoppscotch is an open source API development ecosystem. Prior to version 2026.2....hoppscotch is an open source API development ecosystem. Prior to version 2026.2.1, the DELETE /v1/access-tokens/revoke endpoint allows any authenticated user to delete any other user's PAT by providing its ID, with no ownership verification. This issue has been patched in version 2026.2.1. |
2026-03-07 | |
| CVE-2026-30824 | 7.7 | HIGH | CWE-306 | 0.0% p11 | 5.39 | Flowise is a drag & drop user interface to build a customized large language mod...Flowise is a drag & drop user interface to build a customized large language model flow. Prior to version 3.0.13, the NVIDIA NIM router (/api/v1/nvidia-nim/*) is whitelisted in the global authentication middleware, allowing unauthenticated access to privileged container management and token generation endpoints. This issue has been patched in version 3.0.13. |
2026-03-07 | |
| CVE-2026-30823 | 8.8 | HIGH | CWE-639 | 0.0% p5 | 6.16 | Flowise is a drag & drop user interface to build a customized large language mod...Flowise is a drag & drop user interface to build a customized large language model flow. Prior to version 3.0.13, there is an IDOR vulnerability, leading to account takeover and enterprise feature bypass via SSO configuration. This issue has been patched in version 3.0.13. |
2026-03-07 | |
| CVE-2026-27797 | 5.3 | MEDIUM | CWE-918 | 0.1% p15 | 3.71 | Homarr is an open-source dashboard. Prior to version 1.54.0, an unauthenticated ...Homarr is an open-source dashboard. Prior to version 1.54.0, an unauthenticated Server-Side Request Forgery (SSRF) vulnerability allows a remote attacker to force the Homarr server to perform arbitrary outbound HTTP requests. This can be used as an internal network access primitive (e.g., reaching loopback/private ranges) from the Homarr host/container network context. This issue has been patched in version 1.54.0. |
2026-03-07 | |
| CVE-2026-27796 | 5.3 | MEDIUM | CWE-200 | 0.0% p13 | 3.71 | Homarr is an open-source dashboard. Prior to version 1.54.0, the integration.all...Homarr is an open-source dashboard. Prior to version 1.54.0, the integration.all tRPC endpoint in Homarr is exposed as a publicProcedure, allowing unauthenticated users to retrieve a complete list of configured integrations. This metadata includes sensitive information such as internal service URLs, integration names, and service types. This issue has been patched in version 1.54.0. |
2026-03-07 | |
| CVE-2025-8899 | 8.8 | HIGH | CWE-269 | 0.0% p14 | 6.16 | The Paid Videochat Turnkey Site – HTML5 PPV Live Webcams plugin for WordPress is...The Paid Videochat Turnkey Site – HTML5 PPV Live Webcams plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 7.3.20. This is due to videowhisper_register_form() function not restricting user roles that can be set during registration. This makes it possible for authenticated attackers, with Author-level access and above, to create posts/pages with the registration form and administrator set as the role and subsequently use that form to register an administrator account. This can also be exploited by contributors, but is far less likely to be successful because an administrator would need to approve the form with the administrator role for the attack to be successful. |
2026-03-07 | |
| CVE-2026-30822 | 7.7 | HIGH | CWE-915 | 0.2% p41 | 5.40 | Flowise is a drag & drop user interface to build a customized large language mod...Flowise is a drag & drop user interface to build a customized large language model flow. Prior to version 3.0.13, unauthenticated users can inject arbitrary values into internal database fields when creating leads. This issue has been patched in version 3.0.13. |
2026-03-07 | |
| CVE-2026-30821 | 8.2 | HIGH | CWE-434 | 0.1% p34 | 5.74 | Flowise is a drag & drop user interface to build a customized large language mod...Flowise is a drag & drop user interface to build a customized large language model flow. Prior to version 3.0.13, the /api/v1/attachments/:chatflowId/:chatId endpoint is listed in WHITELIST_URLS, allowing unauthenticated access to the file upload API. While the server validates uploads based on the MIME types defined in chatbotConfig.fullFileUpload.allowedUploadFileTypes, it implicitly trusts the client-provided Content-Type header (file.mimetype) without verifying the file's actual content (magic bytes) or extension (file.originalname). Consequently, an attacker can bypass this restriction by spoofing the Content-Type as a permitted type (e.g., application/pdf) while uploading malicious scripts or arbitrary files. Once uploaded via addArrayFilesToStorage, these files persist in backend storage (S3, GCS, or local disk). This vulnerability serves as a critical entry point that, when chained with other features like static hosting or file retrieval, can lead to Stored XSS, malicious file hosting, or Remote Code Execution (RCE). This issue has been patched in version 3.0.13. |
2026-03-07 | |
| CVE-2026-30820 | 8.7 | HIGH | CWE-863 | 0.1% p24 | 6.09 | Flowise is a drag & drop user interface to build a customized large language mod...Flowise is a drag & drop user interface to build a customized large language model flow. Prior to version 3.0.13, Flowise trusts any HTTP client that sets the header x-request-from: internal, allowing an authenticated tenant session to bypass all /api/v1/** authorization checks. With only a browser cookie, a low-privilege tenant can invoke internal administration endpoints (API key management, credential stores, custom function execution, etc.), effectively escalating privilege. This issue has been patched in version 3.0.13. |
2026-03-07 | |
| CVE-2026-30247 | 5.9 | MEDIUM | CWE-918 | 0.0% p3 | 4.13 | WeKnora is an LLM-powered framework designed for deep document understanding and...WeKnora is an LLM-powered framework designed for deep document understanding and semantic retrieval. Prior to version 0.2.12, the application's "Import document via URL" feature is vulnerable to Server-Side Request Forgery (SSRF) through HTTP redirects. While the backend implements comprehensive URL validation (blocking private IPs, loopback addresses, reserved hostnames, and cloud metadata endpoints), it fails to validate redirect targets. An attacker can bypass all protections by using a redirect chain, forcing the server to access internal services. Additionally, Docker-specific internal addresses like host.docker.internal are not blocked. This issue has been patched in version 0.2.12. |
2026-03-07 | |
| CVE-2026-3352 | 7.2 | HIGH | CWE-94 | 0.1% p19 | 5.04 | The Easy PHP Settings plugin for WordPress is vulnerable to PHP Code Injection i...The Easy PHP Settings plugin for WordPress is vulnerable to PHP Code Injection in all versions up to, and including, 1.0.4 via the `update_wp_memory_constants()` method. This is due to insufficient input validation on the `wp_memory_limit` and `wp_max_memory_limit` settings before writing them to `wp-config.php`. The `sanitize_text_field()` function used for sanitization does not filter single quotes, allowing an attacker to break out of the string context in a PHP `define()` statement. This makes it possible for authenticated attackers, with Administrator-level access and above, to inject and execute arbitrary PHP code on the server by modifying `wp-config.php`, which is loaded on every page request. |
2026-03-07 | |
| CVE-2026-2722 | 4.8 | MEDIUM | CWE-79 | 0.0% p6 | 3.36 | The Stock Ticker plugin for WordPress is vulnerable to Stored Cross-Site Scripti...The Stock Ticker plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 3.26.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. |
2026-03-07 | |
| CVE-2026-2721 | 4.8 | MEDIUM | CWE-79 | 0.0% p7 | 3.36 | The MailArchiver plugin for WordPress is vulnerable to Stored Cross-Site Scripti...The MailArchiver plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 4.4.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. |
2026-03-07 | |
| CVE-2026-2494 | 4.3 | MEDIUM | CWE-352 | 0.0% p2 | 3.01 | The ProfileGrid – User Profiles, Groups and Communities plugin for WordPress is ...The ProfileGrid – User Profiles, Groups and Communities plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 5.9.8.2. This is due to missing nonce validation on the membership request management page (approve and decline actions). This makes it possible for unauthenticated attackers to approve or deny group membership requests via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. |
2026-03-07 | |
| CVE-2026-2488 | 4.3 | MEDIUM | CWE-862 | 0.0% p12 | 3.01 | The ProfileGrid – User Profiles, Groups and Communities plugin for WordPress is ...The ProfileGrid – User Profiles, Groups and Communities plugin for WordPress is vulnerable to unauthorized message deletion due to a missing capability check on the pg_delete_msg() function in all versions up to, and including, 5.9.8.1. This is due to the function not verifying that the requesting user has permission to delete the targeted message. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary messages belonging to any user by sending a direct request with a valid message ID (mid parameter). |
2026-03-07 | |
| CVE-2026-2431 | 6.1 | MEDIUM | CWE-79 | 0.1% p26 | 4.27 | The CM Custom Reports plugin for WordPress is vulnerable to Reflected Cross-Site...The CM Custom Reports plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'date_from' and 'date_to' parameters in all versions up to, and including, 1.2.7 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. |
2026-03-07 | |
| CVE-2026-2429 | 4.9 | MEDIUM | CWE-89 | 0.0% p9 | 3.43 | The Community Events plugin for WordPress is vulnerable to SQL Injection via the...The Community Events plugin for WordPress is vulnerable to SQL Injection via the 'ce_venue_name' CSV field in the `on_save_changes_venues` function in all versions up to, and including, 1.5.8. This is due to insufficient escaping on the user-supplied CSV data and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database via a crafted CSV file upload. |
2026-03-07 | |
| CVE-2026-2020 | 7.5 | HIGH | CWE-502 | 0.1% p24 | 5.25 | The JS Archive List plugin for WordPress is vulnerable to PHP Object Injection i...The JS Archive List plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 6.1.7 via the 'included' shortcode attribute. This is due to the deserialization of untrusted input supplied via the 'included' parameter of the plugin's shortcode. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code. |
2026-03-07 | |
| CVE-2026-1902 | 6.4 | MEDIUM | CWE-79 | 0.0% p11 | 4.48 | The Hammas Calendar plugin for WordPress is vulnerable to Stored Cross-Site Scri...The Hammas Calendar plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'apix' parameter in the 'hp-calendar-manage-redirect' shortcode in all versions up to, and including, 1.5.11 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-03-07 | |
| CVE-2026-1650 | 5.3 | MEDIUM | CWE-862 | 0.1% p20 | 3.71 | The MDJM Event Management plugin for WordPress is vulnerable to unauthorized dat...The MDJM Event Management plugin for WordPress is vulnerable to unauthorized data modification due to a missing capability check on the 'custom_fields_controller' function in all versions up to, and including, 1.7.8.1. This makes it possible for unauthenticated attackers to delete arbitrary custom event fields via the 'delete_custom_field' and 'id' parameters. |
2026-03-07 | |
| CVE-2025-14353 | 7.5 | HIGH | CWE-89 | 0.1% p27 | 5.25 | The ZIP Code Based Content Protection plugin for WordPress is vulnerable to SQL ...The ZIP Code Based Content Protection plugin for WordPress is vulnerable to SQL Injection in all versions up to, and including, 1.0.2 via the 'zipcode' parameter. This is due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. |
2026-03-07 | |
| CVE-2026-25073 | 5.1 | MEDIUM | CWE-79 | 0.0% p1 | 3.57 | XikeStor SKS8310-8X Network Switch firmware versions 1.04.B07 and prior contain ...XikeStor SKS8310-8X Network Switch firmware versions 1.04.B07 and prior contain a stored cross-site scripting vulnerability that allows authenticated attackers to inject arbitrary script content through the System Name field. Attackers can inject malicious scripts that execute in a victim's browser when the stored value is viewed due to improper output encoding. |
2026-03-07 | |
| CVE-2026-25072 | 8.6 | HIGH | CWE-330 | 0.2% p41 | 6.03 | XikeStor SKS8310-8X Network Switch firmware versions 1.04.B07 and prior contain ...XikeStor SKS8310-8X Network Switch firmware versions 1.04.B07 and prior contain a predictable session identifier vulnerability in the /goform/SetLogin endpoint that allows remote attackers to hijack authenticated sessions. Attackers can predict session identifiers using insufficiently random cookie values and exploit exposed session parameters in URLs to gain unauthorized access to authenticated user sessions. |
2026-03-07 | |
| CVE-2026-25071 | 8.7 | HIGH | CWE-306 | 0.1% p24 | 6.09 | XikeStor SKS8310-8X Network Switch firmware versions 1.04.B07 and prior contain ...XikeStor SKS8310-8X Network Switch firmware versions 1.04.B07 and prior contain a missing authentication vulnerability in the /switch_config.src endpoint that allows unauthenticated remote attackers to download device configuration files. Attackers can access this endpoint without credentials to retrieve sensitive configuration information including VLAN settings and IP addressing details. |
2026-03-07 | |
| CVE-2026-25070 | 9.3 | CRITICAL | CWE-78 | 0.3% p51 | 6.52 | XikeStor SKS8310-8X Network Switch firmware versions 1.04.B07 and prior contain ...XikeStor SKS8310-8X Network Switch firmware versions 1.04.B07 and prior contain an OS command injection vulnerability in the /goform/PingTestSet endpoint that allows unauthenticated remote attackers to execute arbitrary operating system commands. Attackers can inject malicious commands through the destIp parameter to achieve remote code execution with root privileges on the network switch. |
2026-03-07 | |
| CVE-2026-2371 | 5.3 | MEDIUM | CWE-862 | 0.0% p2 | 3.71 | The Greenshift – animation and page builder blocks plugin for WordPress is vulne...The Greenshift – animation and page builder blocks plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 12.8.3. This is due to missing authorization and post status validation in the `gspb_el_reusable_load()` AJAX handler. The handler accepts an arbitrary `post_id` parameter and renders the content of any `wp_block` post without checking `current_user_can('read_post', $post_id)` or verifying the post status. Combined with the nonce being exposed to unauthenticated users on any public page using the `[wp_reusable_render]` shortcode with `ajax="1"`, this makes it possible for unauthenticated attackers to retrieve the rendered HTML content of private, draft, or password-protected reusable blocks. |
2026-03-07 | |
| CVE-2026-1981 | 4.3 | MEDIUM | CWE-862 | 0.0% p2 | 3.01 | The HUMN-1 AI Website Scanner & Human Certification by Winston AI plugin for Wor...The HUMN-1 AI Website Scanner & Human Certification by Winston AI plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the winston_disconnect() function in all versions up to, and including, 0.0.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to reset the plugin's API connection settings via the 'winston_disconnect' AJAX action. |
2026-03-07 | |
| CVE-2026-1644 | 4.3 | MEDIUM | CWE-352 | 0.0% p0 | 3.01 | The WP Frontend Profile plugin for WordPress is vulnerable to Cross-Site Request...The WP Frontend Profile plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.3.8. This is due to missing nonce validation on the 'update_action' function. This makes it possible for unauthenticated attackers to approve or reject user account registrations via a forged request granted they can trick an administrator into performing an action such as clicking on a link. |
2026-03-07 | |
| CVE-2026-3233 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering...Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. |
2026-03-06 | |
| CVE-2026-30244 | 7.5 | HIGH | CWE-200 | 0.0% p8 | 5.25 | Plane is an an open-source project management tool. Prior to version 1.2.2, unau...Plane is an an open-source project management tool. Prior to version 1.2.2, unauthenticated attackers can enumerate workspace members and extract sensitive information including email addresses, user roles, and internal identifiers. The vulnerability stems from Django REST Framework permission classes being incorrectly configured to allow anonymous access to protected endpoints. This issue has been patched in version 1.2.2. |
2026-03-06 | |
| CVE-2026-30242 | 8.5 | HIGH | CWE-918 | 0.0% p1 | 5.95 | Plane is an an open-source project management tool. Prior to version 1.2.3, the ...Plane is an an open-source project management tool. Prior to version 1.2.3, the webhook URL validation in plane/app/serializers/webhook.py only checks ip.is_loopback, allowing attackers with workspace ADMIN role to create webhooks pointing to private/internal network addresses (10.x.x.x, 172.16.x.x, 192.168.x.x, 169.254.169.254, etc.). When webhook events fire, the server makes requests to these internal addresses and stores the response — enabling SSRF with full response read-back. This issue has been patched in version 1.2.3. |
2026-03-06 | |
| CVE-2026-30241 | 2.7 | LOW | CWE-863 | 0.0% p4 | 1.89 | Mercurius is a GraphQL adapter for Fastify. Prior to version 16.8.0, Mercurius f...Mercurius is a GraphQL adapter for Fastify. Prior to version 16.8.0, Mercurius fails to enforce the configured queryDepth limit on GraphQL subscription queries received over WebSocket connections. The depth check is correctly applied to HTTP queries and mutations, but subscription queries are parsed and executed without invoking the depth validation. This allows a remote client to submit arbitrarily deeply nested subscription queries over WebSocket, bypassing the intended depth restriction. On schemas with recursive types, this can lead to denial of service through exponential data resolution on each subscription event. This issue has been patched in version 16.8.0. |
2026-03-06 | |
| CVE-2026-30238 | 5.1 | MEDIUM | CWE-79 | 0.0% p2 | 3.57 | Group-Office is an enterprise customer relationship management and groupware too...Group-Office is an enterprise customer relationship management and groupware tool. Prior to versions 6.8.155, 25.0.88, and 26.0.10, there is a reflected XSS vulnerability in GroupOffice on the external/index flow. The f parameter (Base64 JSON) is decoded and then injected into an inline JavaScript block without strict escaping, allowing </script><script>...</script> injection and arbitrary JavaScript execution in the victim's browser. This issue has been patched in versions 6.8.155, 25.0.88, and 26.0.10. |
2026-03-06 | |
| CVE-2026-30237 | 2.1 | LOW | CWE-79 | 0.0% p1 | 1.47 | Group-Office is an enterprise customer relationship management and groupware too...Group-Office is an enterprise customer relationship management and groupware tool. Prior to versions 6.8.155, 25.0.88, and 26.0.10, there is a reflected XSS vulnerability in the GroupOffice installer, endpoint install/license.php. The POST field license is rendered without escaping inside a <textarea>, allowing a </textarea><script>...</script> breakout.. This issue has been patched in versions 6.8.155, 25.0.88, and 26.0.10. |
2026-03-06 | |
| CVE-2026-27142 | 6.1 | MEDIUM | N/A | 0.0% p1 | 4.27 | Actions which insert URLs into the content attribute of HTML meta tags are not e...Actions which insert URLs into the content attribute of HTML meta tags are not escaped. This can allow XSS if the meta tag also has an http-equiv attribute with the value "refresh". A new GODEBUG setting has been added, htmlmetacontenturlescape, which can be used to disable escaping URLs in actions in the meta content attribute which follow "url=" by setting htmlmetacontenturlescape=0. |
2026-03-06 | |
| CVE-2026-27139 | 2.5 | LOW | N/A | 0.0% p0 | 1.75 | On Unix platforms, when listing the contents of a directory using File.ReadDir o...On Unix platforms, when listing the contents of a directory using File.ReadDir or File.Readdir the returned FileInfo could reference a file outside of the Root in which the File was opened. The impact of this escape is limited to reading metadata provided by lstat from arbitrary locations on the filesystem without permitting reading or writing files outside the root. |
2026-03-06 | |
| CVE-2026-27138 | 5.9 | MEDIUM | N/A | 0.0% p5 | 4.13 | Certificate verification can panic when a certificate in the chain has an empty ...Certificate verification can panic when a certificate in the chain has an empty DNS name and another certificate in the chain has excluded name constraints. This can crash programs that are either directly verifying X.509 certificate chains, or those that use TLS. |
2026-03-06 | |
| CVE-2026-27137 | 7.5 | HIGH | N/A | 0.0% p2 | 5.25 | When verifying a certificate chain which contains a certificate containing multi...When verifying a certificate chain which contains a certificate containing multiple email address constraints which share common local portions but different domain portions, these constraints will not be properly applied, and only the last constraint will be considered. |
2026-03-06 | |
| CVE-2026-25679 | 7.5 | HIGH | N/A | 0.0% p9 | 5.25 | url.Parse insufficiently validated the host/authority component and accepted som...url.Parse insufficiently validated the host/authority component and accepted some invalid URLs. |
2026-03-06 | |
| CVE-2026-30835 | 6.9 | MEDIUM | CWE-209 | 0.0% p2 | 4.83 | Parse Server is an open source backend that can be deployed to any infrastructur...Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.7 and 9.5.0-alpha.6, malformed $regex query parameter (e.g. [abc) causes the database to return a structured error object that is passed unsanitized through the API response. This leaks database internals such as error messages, error codes, code names, cluster timestamps, and topology details. The vulnerability is exploitable by any client that can send query requests, depending on the deployment's permission configuration. This issue has been patched in versions 8.6.7 and 9.5.0-alpha.6. |
2026-03-06 | |
| CVE-2026-30233 | 6.5 | MEDIUM | CWE-200 | 0.0% p4 | 4.55 | OliveTin gives access to predefined shell commands from a web interface. Prior t...OliveTin gives access to predefined shell commands from a web interface. Prior to version 3000.11.1, an authorization flaw in OliveTin allows authenticated users with view: false permission to enumerate action bindings and metadata via dashboard and API endpoints. Although execution (exec) may be correctly denied, the backend does not enforce IsAllowedView() when constructing dashboard and action binding responses. As a result, restricted users can retrieve action titles, IDs, icons, and argument metadata. This issue has been patched in version 3000.11.1. |
2026-03-06 | |
| CVE-2026-30231 | 6.0 | MEDIUM | CWE-639 | 0.0% p6 | 4.20 | Flare is a Next.js-based, self-hostable file sharing platform that integrates wi...Flare is a Next.js-based, self-hostable file sharing platform that integrates with screenshot tools. Prior to version 1.7.2, the raw and direct file routes only block unauthenticated users from accessing private files. Any authenticated, non‑owner user who knows the file URL can retrieve the content, which is inconsistent with stricter checks used by other endpoints. This issue has been patched in version 1.7.2. |
2026-03-06 | |
| CVE-2026-30230 | 8.2 | HIGH | CWE-639 | 0.0% p3 | 5.74 | Flare is a Next.js-based, self-hostable file sharing platform that integrates wi...Flare is a Next.js-based, self-hostable file sharing platform that integrates with screenshot tools. Prior to version 1.7.2, the thumbnail endpoint does not validate the password for password‑protected files. It checks ownership/admin for private files but skips password verification, allowing thumbnail access without the password. This issue has been patched in version 1.7.2. |
2026-03-06 | |
| CVE-2026-30229 | 8.5 | HIGH | CWE-863 | 0.0% p6 | 5.95 | Parse Server is an open source backend that can be deployed to any infrastructur...Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.6 and 9.5.0-alpha.4, the readOnlyMasterKey can call POST /loginAs to obtain a valid session token for any user. This allows a read-only credential to impersonate arbitrary users with full read and write access to their data. Any Parse Server deployment that uses readOnlyMasterKey is affected. This issue has been patched in versions 8.6.6 and 9.5.0-alpha.4. |
2026-03-06 | |
| CVE-2026-30228 | 6.9 | MEDIUM | CWE-863 | 0.0% p2 | 4.83 | Parse Server is an open source backend that can be deployed to any infrastructur...Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.5 and 9.5.0-alpha.3, the readOnlyMasterKey can be used to create and delete files via the Files API (POST /files/:filename, DELETE /files/:filename). This bypasses the read-only restriction which violates the access scope of the readOnlyMasterKey. Any Parse Server deployment that uses readOnlyMasterKey and exposes the Files API is affected. An attacker with access to the readOnlyMasterKey can upload arbitrary files or delete existing files. This issue has been patched in versions 8.6.5 and 9.5.0-alpha.3. |
2026-03-06 | |
| CVE-2026-30227 | 6.9 | MEDIUM | CWE-93 | 1.1% p78 | 4.86 | MimeKit is a C# library which may be used for the creation and parsing of messag...MimeKit is a C# library which may be used for the creation and parsing of messages using the Multipurpose Internet Mail Extension (MIME), as defined by numerous IETF specifications. Prior to version 4.15.1, a CRLF injection vulnerability in MimeKit allows an attacker to embed \r\n into the SMTP envelope address local-part (when the local-part is a quoted-string). This is non-compliant with RFC 5321 and can result in SMTP command injection (e.g., injecting additional RCPT TO / DATA / RSET commands) and/or mail header injection, depending on how the application uses MailKit/MimeKit to construct and send messages. The issue becomes exploitable when the attacker can influence a MailboxAddress (MAIL FROM / RCPT TO) value that is later serialized to an SMTP session. RFC 5321 explicitly defines the SMTP mailbox local-part grammar and does not permit CR (13) or LF (10) inside Quoted-string (qtextSMTP and quoted-pairSMTP ranges exclude control characters). SMTP commands are terminated by <CRLF>, making CRLF injection in command arguments particularly dangerous. This issue has been patched in version 4.15.1. |
2026-03-06 | |
| CVE-2026-30225 | 5.3 | MEDIUM | CWE-250 | 0.1% p23 | 3.71 | OliveTin gives access to predefined shell commands from a web interface. Prior t...OliveTin gives access to predefined shell commands from a web interface. Prior to version 3000.11.1, an authentication context confusion vulnerability in RestartAction allows a low‑privileged authenticated user to execute actions they are not permitted to run. RestartAction constructs a new internal connect.Request without preserving the original caller’s authentication headers or cookies. When this synthetic request is passed to StartAction, the authentication resolver falls back to the guest user. If the guest account has broader permissions than the authenticated caller, this results in privilege escalation and unauthorized command execution. This vulnerability allows a low‑privileged authenticated user to bypass ACL restrictions and execute arbitrary configured shell actions. This issue has been patched in version 3000.11.1. |
2026-03-06 | |
| CVE-2026-30224 | 5.4 | MEDIUM | CWE-384 | 0.0% p13 | 3.78 | OliveTin gives access to predefined shell commands from a web interface. Prior t...OliveTin gives access to predefined shell commands from a web interface. Prior to version 3000.11.1, OliveTin does not revoke server-side sessions when a user logs out. Although the browser cookie is cleared, the corresponding session remains valid in server storage until expiry (default ≈ 1 year). An attacker with a previously stolen or captured session cookie can continue authenticating after logout, resulting in a post-logout authentication bypass. This is a session management flaw that violates expected logout semantics. This issue has been patched in version 3000.11.1. |
2026-03-06 | |
| CVE-2026-30223 | 8.8 | HIGH | CWE-287 | 0.0% p10 | 6.16 | OliveTin gives access to predefined shell commands from a web interface. Prior t...OliveTin gives access to predefined shell commands from a web interface. Prior to version 3000.11.1, when JWT authentication is configured using either "authJwtPubKeyPath" (local RSA public key) or "authJwtHmacSecret" (HMAC secret), the configured audience value (authJwtAud) is not enforced during token parsing. As a result, validly signed JWT tokens with an incorrect aud claim are accepted for authentication. This allows authentication using tokens intended for a different audience/service. This issue has been patched in version 3000.11.1. |
2026-03-06 | |
| CVE-2026-29795 | 4.0 | MEDIUM | CWE-770 | 0.0% p8 | 2.80 | stellar-xdr is a library and CLI containing types and functionality for working ...stellar-xdr is a library and CLI containing types and functionality for working with Stellar XDR. Prior to version 25.0.1, StringM::from_str does not validate that the input length is within the declared maximum (MAX). Calling StringM::<N>::from_str(s) where s is longer than N bytes succeeds and returns an Ok value instead of Err(Error::LengthExceedsMax), producing a StringM that violates its length invariant. This affects any code that constructs StringM values from string input using FromStr (including str::parse), and relies on the type's maximum length constraint being enforced. An oversized StringM could propagate through serialization, validation, or other logic that assumes the invariant holds. This issue has been patched in version 25.0.1. |
2026-03-06 | |
| CVE-2026-29791 | 4.9 | MEDIUM | CWE-20 | 0.1% p22 | 3.43 | Agentgateway is an open source data plane for agentic AI connectivity within or ...Agentgateway is an open source data plane for agentic AI connectivity within or across any agent framework or environment. Prior to version 0.12.0, when converting MCP tools/call request to OpenAPI request, input path, query, and header values are not sanitized. This issue has been patched in version 0.12.0. |
2026-03-06 | |
| CVE-2026-29790 | 2.0 | LOW | CWE-22 | 0.1% p24 | 1.40 | dbt-common is the shared common utilities for dbt-core and adapter implementatio...dbt-common is the shared common utilities for dbt-core and adapter implementations use. Prior to versions 1.34.2 and 1.37.3, a path traversal vulnerability exists in dbt-common's safe_extract() function used when extracting tarball archives. The function uses os.path.commonprefix() to validate that extracted files remain within the intended destination directory. However, commonprefix() compares paths character-by-character rather than by path components, allowing a malicious tarball to write files to sibling directories with matching name prefixes. This issue has been patched in versions 1.34.2 and 1.37.3. |
2026-03-06 | |
| CVE-2026-29789 | 9.9 | CRITICAL | CWE-862 | 0.1% p18 | 6.93 | Vito is a self-hosted web application that helps manage servers and deploy PHP a...Vito is a self-hosted web application that helps manage servers and deploy PHP applications into production servers. Prior to version 3.20.3, a missing authorization check in workflow site-creation actions allows an authenticated attacker with workflow write access in one project to create/manage sites on servers belonging to other projects by supplying a foreign server_id. This issue has been patched in version 3.20.3. |
2026-03-06 | |
| CVE-2026-29788 | 8.4 | HIGH | CWE-283 | 0.0% p8 | 5.88 | TSPortal is the WikiTide Foundation’s in-house platform used by the Trust and Sa...TSPortal is the WikiTide Foundation’s in-house platform used by the Trust and Safety team to manage reports, investigations, appeals, and transparency work. Prior to version 30, conversion of empty strings to null allows disguising DPA reports as genuine self-deletion reports. This issue has been patched in version 30. |
2026-03-06 | |
| CVE-2026-29182 | 8.6 | HIGH | CWE-863 | 0.0% p6 | 6.02 | Parse Server is an open source backend that can be deployed to any infrastructur...Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.4 and 9.4.1-alpha.3, Parse Server's readOnlyMasterKey option allows access with master-level read privileges but is documented to deny all write operations. However, some endpoints incorrectly accept the readOnlyMasterKey for mutating operations. This allows a caller who only holds the readOnlyMasterKey to create, modify, and delete Cloud Hooks and to start Cloud Jobs, which can be used for data exfiltration. Any Parse Server deployment that uses the readOnlyMasterKey option is affected. Note than an attacker needs to know the readOnlyMasterKey to exploit this vulnerability. This issue has been patched in versions 8.6.4 and 9.4.1-alpha.3. |
2026-03-06 | |
| CVE-2026-30847 | 9.3 | CRITICAL | CWE-200 | 0.0% p10 | 6.51 | Wekan is an open source kanban tool built with Meteor. In versions 8.31.0 throug...Wekan is an open source kanban tool built with Meteor. In versions 8.31.0 through 8.33, the notificationUsers publication in Wekan publishes user documents with no field filtering, causing the ReactiveCache.getUsers() call to return all fields including highly sensitive data such as bcrypt password hashes, active session login tokens, email verification tokens, full email addresses, and any stored OAuth tokens. Unlike Meteor's default auto-publication which strips the services field for security, custom publications return whatever fields the cursor contains, meaning all subscribers receive the complete user documents. Any authenticated user who triggers this publication can harvest credentials and active session tokens for other users, enabling password cracking, session hijacking, and full account takeover. This issue has been fixed in version 8.34. |
2026-03-06 | |
| CVE-2026-30846 | 8.7 | HIGH | CWE-200 | 0.2% p36 | 6.09 | Wekan is an open source kanban tool built with Meteor. In versions 8.31.0 throug...Wekan is an open source kanban tool built with Meteor. In versions 8.31.0 through 8.33, the globalwebhooks publication exposes all global webhook integrations—including sensitive url and token fields—without performing any authentication check on the server side. Although the subscription is normally invoked from the admin settings page, the server-side publication has no access control, meaning any DDP client, including unauthenticated ones, can subscribe and receive the data. This allows an unauthenticated attacker to retrieve global webhook URLs and authentication tokens, potentially enabling unauthorized use of those webhooks and access to connected external services. This issue has been fixed in version 8.34. |
2026-03-06 | |
| CVE-2026-30845 | 6.9 | MEDIUM | CWE-200 | 0.1% p24 | 4.83 | Wekan is an open source kanban tool built with Meteor. In versions 8.31.0 throug...Wekan is an open source kanban tool built with Meteor. In versions 8.31.0 through 8.33, the board composite publication in Wekan publishes all integration data for a board without any field filtering, exposing sensitive fields including webhook URLs and authentication tokens to any subscriber. Since board publications are accessible to all board members regardless of their role (including read-only and comment-only users), and even to unauthenticated DDP clients for public boards, any user who can access a board can retrieve its webhook credentials. This token leak allows attackers to make unauthenticated requests to the exposed webhooks, potentially triggering unauthorized actions in connected external services. This issue has been fixed in version 8.34. |
2026-03-06 | |
| CVE-2026-30844 | 9.3 | CRITICAL | CWE-918 | 0.0% p10 | 6.51 | Wekan is an open source kanban tool built with Meteor. Versions 8.32 and 8.33 ar...Wekan is an open source kanban tool built with Meteor. Versions 8.32 and 8.33 are vulnerable to Server-Side Request Forgery (SSRF) via attachment URL loading. During board import in Wekan, attachment URLs from user-supplied JSON data are fetched directly by the server without any URL validation or filtering, affecting both the Wekan and Trello import flows. The parseActivities() and parseActions() methods extract user-controlled attachment URLs, which are then passed directly to Attachments.load() for download with no sanitization. This Server-Side Request Forgery (SSRF) vulnerability allows any authenticated user to make the server issue arbitrary HTTP requests, potentially accessing internal network services such as cloud instance metadata endpoints (exposing IAM credentials), internal databases, and admin panels that are otherwise unreachable from outside the network. This issue has been fixed in version 8.34. |
2026-03-06 | |
| CVE-2026-30843 | 9.3 | CRITICAL | CWE-639 | 0.0% p9 | 6.51 | Wekan is an open source kanban tool built with Meteor. Versions 8.32 and 8.33 ha...Wekan is an open source kanban tool built with Meteor. Versions 8.32 and 8.33 have a critical Insecure Direct Object Reference (IDOR) issue which could allow unauthorized users to modify custom fields across boards through its custom fields update endpoints, potentially leading to unauthorized data manipulation. The PUT /api/boards/:boardId/custom-fields/:customFieldId endpoint in Wekan validates that the authenticated user has access to the specified boardId, but the subsequent database update uses only the custom field's _id as a filter without confirming the field actually belongs to that board. This means an attacker who owns any board can modify custom fields on any other board by supplying a foreign custom field ID, and the same flaw exists in the POST, PUT, and DELETE endpoints for dropdown items under custom fields. The required custom field IDs can be obtained by exporting a board (which only needs read access), since the exported JSON includes the IDs of all board components. The authorization check is performed against the wrong resource, allowing cross-board custom field manipulation. This issue has been fixed in version 8.34. |
2026-03-06 | |
| CVE-2025-69654 | 7.5 | HIGH | CWE-400 | 0.1% p17 | 5.25 | A crafted JavaScript input executed with the QuickJS release 2025-09-13, fixed i...A crafted JavaScript input executed with the QuickJS release 2025-09-13, fixed in commit fcd33c1afa7b3028531f53cd1190a3877454f6b3 (2025-12-11),`qjs` interpreter using the `-m` option and a low memory limit can cause an out-of-memory condition followed by an assertion failure in JS_FreeRuntime (list_empty(&rt->gc_obj_list)) during runtime cleanup. Although the engine reports an OOM error, it subsequently aborts with SIGABRT because the GC object list is not fully released. This results in a denial of service. |
2026-03-06 | |
| CVE-2026-3653 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This can...Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage. |
2026-03-06 | |
| CVE-2026-29063 | 8.7 | HIGH | CWE-1321 | 0.1% p20 | 6.09 | Immutable.js provides many Persistent Immutable data structures. Prior to versio...Immutable.js provides many Persistent Immutable data structures. Prior to versions 3.8.3, 4.3.7, and 5.1.5, Prototype Pollution is possible in immutable via the mergeDeep(), mergeDeepWith(), merge(), Map.toJS(), and Map.toObject() APIs. This issue has been patched in versions 3.8.3, 4.3.7, and 5.1.5. |
2026-03-06 | |
| CVE-2025-69653 | 6.5 | MEDIUM | CWE-617 | 0.0% p12 | 4.55 | A crafted JavaScript input can trigger an internal assertion failure in QuickJS ...A crafted JavaScript input can trigger an internal assertion failure in QuickJS release 2025-09-13, fixed in commit 1dbba8a88eaa40d15a8a9b70bb1a0b8fb5b552e6 (2025-12-11), in file gc_decref_child in quickjs.c, when executed with the qjs interpreter using the -m option. This leads to an abort (SIGABRT) during garbage collection and causes a denial-of-service. |
2026-03-06 | |
| CVE-2025-69652 | 6.2 | MEDIUM | CWE-460 | 0.0% p3 | 4.34 | GNU Binutils thru 2.46 readelf contains a vulnerability that leads to an abort (...GNU Binutils thru 2.46 readelf contains a vulnerability that leads to an abort (SIGABRT) when processing a crafted ELF binary with malformed DWARF abbrev or debug information. Due to incomplete state cleanup in process_debug_info(), an invalid debug_info_p state may propagate into DWARF attribute parsing routines. When certain malformed attributes result in an unexpected data length of zero, byte_get_little_endian() triggers a fatal abort. No evidence of memory corruption or code execution was observed; the impact is limited to denial of service. |
2026-03-06 | |
| CVE-2025-69650 | 7.5 | HIGH | CWE-415 | 0.1% p29 | 5.25 | GNU Binutils thru 2.46 readelf contains a double free vulnerability when process...GNU Binutils thru 2.46 readelf contains a double free vulnerability when processing a crafted ELF binary with malformed relocation data. During GOT relocation handling, dump_relocations may return early without initializing the all_relocations array. As a result, process_got_section_contents() may pass an uninitialized r_symbol pointer to free(), leading to a double free and terminating the program with SIGABRT. No evidence of exploitable memory corruption or code execution was observed; the impact is limited to denial of service. NOTE: this is disputed by third parties because the observed behavior occurred only in pre-release code and did not affect any tagged version. |
2026-03-06 | |
| CVE-2025-69649 | 7.5 | HIGH | CWE-476 | 0.0% p9 | 5.25 | GNU Binutils thru 2.46 readelf contains a null pointer dereference vulnerability...GNU Binutils thru 2.46 readelf contains a null pointer dereference vulnerability when processing a crafted ELF binary with malformed header fields. During relocation processing, an invalid or null section pointer may be passed into display_relocations(), resulting in a segmentation fault (SIGSEGV) and abrupt termination. No evidence of memory corruption beyond the null pointer dereference, nor any possibility of code execution, was observed. |
2026-03-06 | |
| CVE-2026-30833 | 6.9 | MEDIUM | CWE-943 | 0.0% p6 | 4.83 | Rocket.Chat is an open-source, secure, fully customizable communications platfor...Rocket.Chat is an open-source, secure, fully customizable communications platform. Prior to versions 7.10.8, 7.11.5, 7.12.5, 7.13.4, 8.0.2, 8.1.1, and 8.2.0, a NoSQL injection vulnerability exists in Rocket.Chat's account service used in the ddp-streamer micro service that allows unauthenticated attackers to manipulate MongoDB queries during authentication. The vulnerability is located in the username-based login flow where user-supplied input is directly embedded into a MongoDB query selector without validation. An attacker can inject MongoDB operator expressions (e.g., { $regex: '.*' }) in place of a username string, causing the database query to match unintended user records. This issue has been patched in versions 7.10.8, 7.11.5, 7.12.5, 7.13.4, 8.0.2, 8.1.1, and 8.2.0. |
2026-03-06 | |
| CVE-2026-30831 | 8.0 | HIGH | CWE-287 | 0.1% p22 | 5.60 | Rocket.Chat is an open-source, secure, fully customizable communications platfor...Rocket.Chat is an open-source, secure, fully customizable communications platform. Prior to versions 7.10.8, 7.11.5, 7.12.5, 7.13.4, 8.0.2, 8.1.1, and 8.2.0, authentication vulnerabilities exist in Rocket.Chat's enterprise DDP Streamer service. The Account.login method exposed through the DDP Streamer does not enforce Two-Factor Authentication (2FA) or validate user account status (deactivated users can still login), despite these checks being mandatory in the standard Meteor login flow. This issue has been patched in versions 7.10.8, 7.11.5, 7.12.5, 7.13.4, 8.0.2, 8.1.1, and 8.2.0. |
2026-03-06 | |
| CVE-2026-29178 | 7.7 | HIGH | CWE-918 | 0.1% p18 | 5.39 | Lemmy, a link aggregator and forum for the fediverse, is vulnerable to server-si...Lemmy, a link aggregator and forum for the fediverse, is vulnerable to server-side request forgery via a dependency on activitypub_federation, a framework for ActivityPub federation in Rust. Prior to version 0.19.16, the GET /api/v4/image/{filename} endpoint is vulnerable to unauthenticated SSRF through parameter injection in the file_type query parameter. An attacker can inject arbitrary query parameters into the internal request to pict-rs, including the proxy parameter which causes pict-rs to fetch arbitrary URLs. This issue has been patched in version 0.19.16. |
2026-03-06 | |
| CVE-2026-29110 | 2.2 | LOW | CWE-209 | 0.0% p8 | 1.54 | Cryptomator encrypts data being stored on cloud infrastructure. Prior to version...Cryptomator encrypts data being stored on cloud infrastructure. Prior to version 1.19.0, in non-debug mode Cryptomator might leak cleartext paths into the log file. This can reveal meta information about the files stored inside a vault at a time, where the actual vault is closed. Not every cleartext path is logged. Only if a filesystem request fails for some reason (e.g. damaged encrypted file, not existing file), a log message is created. This issue has been patched in version 1.19.0. |
2026-03-06 | |
| CVE-2026-29091 | 8.1 | HIGH | CWE-95 | 0.4% p57 | 5.68 | Locutus brings stdlibs of other programming languages to JavaScript for educatio...Locutus brings stdlibs of other programming languages to JavaScript for educational purposes. Prior to version 3.0.0, a remote code execution (RCE) flaw was discovered in the locutus project, specifically within the call_user_func_array function implementation. The vulnerability allows an attacker to inject arbitrary JavaScript code into the application's runtime environment. This issue stems from an insecure implementation of the call_user_func_array function (and its wrapper call_user_func), which fails to properly validate all components of a callback array before passing them to eval(). This issue has been patched in version 3.0.0. |
2026-03-06 | |
| CVE-2026-29089 | 8.8 | HIGH | CWE-426 | 0.0% p5 | 6.16 | TimescaleDB is a time-series database for high-performance real-time analytics p...TimescaleDB is a time-series database for high-performance real-time analytics packaged as a Postgres extension. From version 2.23.0 to 2.25.1, PostgreSQL uses the search_path setting to locate unqualified database objects (tables, functions, operators). If the search_path includes user-writable schemas a malicious user can create functions in that schema that shadow builtin postgres functions and will be called instead of the postgres functions leading to arbitrary code execution during extension upgrade. This issue has been patched in version 2.25.2. |
2026-03-06 | |
| CVE-2026-29087 | 7.5 | HIGH | CWE-863 | 0.0% p4 | 5.25 | @hono/node-server allows running the Hono application on Node.js. Prior to versi...@hono/node-server allows running the Hono application on Node.js. Prior to version 1.19.10, when using @hono/node-server's static file serving together with route-based middleware protections (e.g. protecting /admin/*), inconsistent URL decoding can allow protected static resources to be accessed without authorization. In particular, paths containing encoded slashes (%2F) may be evaluated differently by routing/middleware matching versus static file path resolution, enabling a bypass where middleware does not run but the static file is still served. This issue has been patched in version 1.19.10. |
2026-03-06 | |
| CVE-2026-28514 | 9.3 | CRITICAL | CWE-287 | 0.0% p14 | 6.51 | Rocket.Chat is an open-source, secure, fully customizable communications platfor...Rocket.Chat is an open-source, secure, fully customizable communications platform. Prior to versions 7.8.6, 7.9.8, 7.10.7, 7.11.4, 7.12.4, 7.13.3, and 8.0.0, a critical authentication bypass vulnerability exists in Rocket.Chat's account service used in the ddp-streamer micro service that allows an attacker to log in to the service as any user with a password set, using any arbitrary password. The vulnerability stems from a missing await keyword when calling an asynchronous password validation function, causing a Promise object (which is always truthy) to be evaluated instead of the actual boolean validation result. This may lead to account takeover of any user whose username is known or guessable. This issue has been patched in versions 7.8.6, 7.9.8, 7.10.7, 7.11.4, 7.12.4, 7.13.3, and 8.0.0. |
2026-03-06 | |
| CVE-2025-69651 | 5.5 | MEDIUM | NVD-CWE-noinfo | 0.0% p0 | 3.85 | GNU Binutils thru 2.46 readelf contains a vulnerability that leads to an invalid...GNU Binutils thru 2.46 readelf contains a vulnerability that leads to an invalid pointer free when processing a crafted ELF binary with malformed relocation or symbol data. If dump_relocations returns early due to parsing errors, the internal all_relocations array may remain partially uninitialized. Later, process_got_section_contents() may attempt to free an invalid r_symbol pointer, triggering memory corruption checks in glibc and causing the program to terminate with SIGABRT. No evidence of further memory corruption or code execution was observed; the impact is limited to denial of service. NOTE: this is disputed by third parties because the observed behavior occurred only in pre-release code and did not affect any tagged version. |
2026-03-06 | |
| CVE-2025-69646 | 5.5 | MEDIUM | CWE-400 | 0.0% p0 | 3.85 | Binutils objdump contains a denial-of-service vulnerability when processing a cr...Binutils objdump contains a denial-of-service vulnerability when processing a crafted binary with malformed DWARF debug_rnglists data. A logic error in the handling of the debug_rnglists header can cause objdump to repeatedly print the same warning message and fail to terminate, resulting in an unbounded logging loop until the process is interrupted. The issue was observed in binutils 2.44. A local attacker can exploit this vulnerability by supplying a malicious input file, leading to excessive CPU and I/O usage and preventing completion of the objdump analysis. |
2026-03-06 | |
| CVE-2025-69645 | 5.5 | MEDIUM | CWE-400 | 0.0% p0 | 3.85 | Binutils objdump contains a denial-of-service vulnerability when processing a cr...Binutils objdump contains a denial-of-service vulnerability when processing a crafted binary with malformed DWARF debug information. A logic error in the handling of DWARF compilation units can result in an invalid offset_size value being used inside byte_get_little_endian, leading to an abort (SIGABRT). The issue was observed in binutils 2.44. A local attacker can trigger the crash by supplying a malicious input file. |
2026-03-06 | |
| CVE-2025-69644 | 5.0 | MEDIUM | CWE-400 | 0.0% p0 | 3.50 | An issue was discovered in Binutils before 2.46. The objdump contains a denial-o...An issue was discovered in Binutils before 2.46. The objdump contains a denial-of-service vulnerability when processing a crafted binary with malformed debug information. A logic flaw in the handling of DWARF location list headers can cause objdump to enter an unbounded loop and produce endless output until manually interrupted. This issue affects versions prior to the upstream fix and allows a local attacker to cause excessive resource consumption by supplying a malicious input file. |
2026-03-06 | |
| CVE-2026-29082 | 7.3 | HIGH | CWE-79 | 0.0% p13 | 5.11 | Kestra is an event-driven orchestration platform. In versions from 1.1.10 and pr...Kestra is an event-driven orchestration platform. In versions from 1.1.10 and prior, Kestra’s execution-file preview renders user-supplied Markdown (.md) with markdown-it instantiated as html:true and injects the resulting HTML with Vue’s v-html without sanitisation. At time of publication, there are no publicly available patches. |
2026-03-06 | |
| CVE-2026-29075 | 8.3 | HIGH | CWE-94 | 0.1% p32 | 5.81 | Mesa is an open-source Python library for agent-based modeling, simulating compl...Mesa is an open-source Python library for agent-based modeling, simulating complex systems and exploring emergent behaviors. In version 3.5.0 and prior, checking out of untrusted code in benchmarks.yml workflow may lead to code execution in privileged runner. This issue has been patched via commit c35b8cd. |
2026-03-06 | |
| CVE-2026-29064 | 8.2 | HIGH | CWE-22 | 0.0% p2 | 5.74 | Zarf is an Airgap Native Packager Manager for Kubernetes. From version 0.54.0 to...Zarf is an Airgap Native Packager Manager for Kubernetes. From version 0.54.0 to before version 0.73.1, a path traversal vulnerability in archive extraction allows a specifically crafted Zarf package to create symlinks pointing outside the destination directory, enabling arbitrary file read or write on the system processing the package. This issue has been patched in version 0.73.1. |
2026-03-06 | |
| CVE-2025-70363 | 7.5 | HIGH | CWE-284 | 0.1% p22 | 5.25 | Incorrect access control in the REST API of Ibexa & Ciril GROUP eZ Platform / Ci...Incorrect access control in the REST API of Ibexa & Ciril GROUP eZ Platform / Ciril Platform 2.x allows unauthenticated attackers to access sensitive data via enumerating object IDs. |
2026-03-06 | |
| CVE-2025-15602 | 8.7 | HIGH | CWE-915 | 0.0% p6 | 6.09 | Snipe-IT versions prior to 8.3.7 contain sensitive user attributes related to ac...Snipe-IT versions prior to 8.3.7 contain sensitive user attributes related to account privileges that are insufficiently protected against mass assignment. An authenticated, low-privileged user can craft a malicious API request to modify restricted fields of another user account, including the Super Admin account. By changing the email address of the Super Admin and triggering a password reset, an attacker can fully take over the Super Admin account, resulting in complete administrative control of the Snipe-IT instance. |
2026-03-06 | |
| CVE-2026-27777 | 6.9 | MEDIUM | CWE-522 | 0.1% p22 | 4.83 | Charging station authentication identifiers are publicly accessible via web-base...Charging station authentication identifiers are publicly accessible via web-based mapping platforms. |
2026-03-06 | |
| CVE-2026-27764 | 6.9 | MEDIUM | CWE-613 | 0.1% p15 | 4.83 | The WebSocket backend uses charging station identifiers to uniquely associate se...The WebSocket backend uses charging station identifiers to uniquely associate sessions but allows multiple endpoints to connect using the same session identifier. This implementation results in predictable session identifiers and enables session hijacking or shadowing, where the most recent connection displaces the legitimate charging station and receives backend commands intended for that station. This vulnerability may allow unauthorized users to authenticate as other users or enable a malicious actor to cause a denial-of-service condition by overwhelming the backend with valid session requests. |
2026-03-06 | |
| CVE-2026-27123 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: Reason: This candidate was issued in error.Rejected reason: Reason: This candidate was issued in error. |
2026-03-06 | |
| CVE-2026-27027 | 6.9 | MEDIUM | CWE-522 | 0.1% p20 | 4.83 | Charging station authentication identifiers are publicly accessible via web-base...Charging station authentication identifiers are publicly accessible via web-based mapping platforms. |
2026-03-06 | |
| CVE-2026-26288 | 9.3 | CRITICAL | CWE-306 | 0.2% p45 | 6.52 | WebSocket endpoints lack proper authentication mechanisms, enabling attackers to...WebSocket endpoints lack proper authentication mechanisms, enabling attackers to perform unauthorized station impersonation and manipulate data sent to the backend. An unauthenticated attacker can connect to the OCPP WebSocket endpoint using a known or discovered charging station identifier, then issue or receive OCPP commands as a legitimate charger. Given that no authentication is required, this can lead to privilege escalation, unauthorized control of charging infrastructure, and corruption of charging network data reported to the backend. |
2026-03-06 | |
| CVE-2026-26018 | 7.5 | HIGH | CWE-337 | 0.1% p17 | 5.25 | CoreDNS is a DNS server that chains plugins. Prior to version 1.14.2, a denial o...CoreDNS is a DNS server that chains plugins. Prior to version 1.14.2, a denial of service vulnerability exists in CoreDNS's loop detection plugin that allows an attacker to crash the DNS server by sending specially crafted DNS queries. The vulnerability stems from the use of a predictable pseudo-random number generator (PRNG) for generating a secret query name, combined with a fatal error handler that terminates the entire process. This issue has been patched in version 1.14.2. |
2026-03-06 | |
| CVE-2026-26017 | 7.7 | HIGH | CWE-367 | 0.1% p18 | 5.39 | CoreDNS is a DNS server that chains plugins. Prior to version 1.14.2, a logical ...CoreDNS is a DNS server that chains plugins. Prior to version 1.14.2, a logical vulnerability in CoreDNS allows DNS access controls to be bypassed due to the default execution order of plugins. Security plugins such as acl are evaluated before the rewrite plugin, resulting in a Time-of-Check Time-of-Use (TOCTOU) flaw. This issue has been patched in version 1.14.2. |
2026-03-06 | |
| CVE-2026-24696 | 8.7 | HIGH | CWE-307 | 0.1% p25 | 6.09 | The WebSocket Application Programming Interface lacks restrictions on the number...The WebSocket Application Programming Interface lacks restrictions on the number of authentication requests. This absence of rate limiting may allow an attacker to conduct denial-of-service attacks by suppressing or mis-routing legitimate charger telemetry, or conduct brute-force attacks to gain unauthorized access. |
2026-03-06 | |
| CVE-2026-20882 | 8.7 | HIGH | CWE-307 | 0.1% p26 | 6.09 | The WebSocket Application Programming Interface lacks restrictions on the number...The WebSocket Application Programming Interface lacks restrictions on the number of authentication requests. This absence of rate limiting may allow an attacker to conduct denial-of-service attacks by suppressing or mis-routing legitimate charger telemetry, or conduct brute-force attacks to gain unauthorized access. |
2026-03-06 | |
| CVE-2026-20748 | 6.9 | MEDIUM | CWE-613 | 0.1% p16 | 4.83 | The WebSocket backend uses charging station identifiers to uniquely associate se...The WebSocket backend uses charging station identifiers to uniquely associate sessions but allows multiple endpoints to connect using the same session identifier. This implementation results in predictable session identifiers and enables session hijacking or shadowing, where the most recent connection displaces the legitimate charging station and receives backend commands intended for that station. This vulnerability may allow unauthorized users to authenticate as other users or enable a malicious actor to cause a denial-of-service condition by overwhelming the backend with valid session requests. |
2026-03-06 | |
| CVE-2026-2754 | 7.5 | HIGH | CWE-306 | 0.0% p10 | 5.25 | Navtor NavBox exposes sensitive configuration and operational data due to missin...Navtor NavBox exposes sensitive configuration and operational data due to missing authentication on HTTP API endpoints. An unauthenticated remote attacker with network access to the device can execute HTTP GET requests to TCP port 8080 to retrieve internal network parameters including ECDIS & OT Information, device identifiers, and service status logs. |
2026-03-06 | |
| CVE-2026-2753 | 7.5 | HIGH | CWE-36 | 0.1% p26 | 5.25 | An Absolute Path Traversal vulnerability exists in Navtor NavBox. The applicatio...An Absolute Path Traversal vulnerability exists in Navtor NavBox. The application exposes an HTTP service that fails to properly sanitize user-supplied path input. Unauthenticated remote attackers can exploit this issue by submitting requests containing absolute filesystem paths. Successful exploitation allows the attacker to retrieve arbitrary files from the underlying filesystem, limited only by the privileges of the service process. This can lead to the exposure of sensitive configuration files and system information. |
2026-03-06 | |
| CVE-2026-2752 | 5.3 | MEDIUM | CWE-209 | 0.0% p12 | 3.71 | Navtor NavBox allows information disclosure via the /api/ais-data endpoint. A re...Navtor NavBox allows information disclosure via the /api/ais-data endpoint. A remote, unauthenticated attacker can send crafted requests to trigger an unhandled exception, causing the server to return verbose .NET stack traces. These error messages expose internal class names, method calls, and third-party library references (e.g., System.Data.SQLite), which may assist attackers in mapping the application's internal structure. |
2026-03-06 | |
| CVE-2026-26051 | 9.3 | CRITICAL | CWE-306 | 0.3% p53 | 6.52 | WebSocket endpoints lack proper authentication mechanisms, enabling attackers to...WebSocket endpoints lack proper authentication mechanisms, enabling attackers to perform unauthorized station impersonation and manipulate data sent to the backend. An unauthenticated attacker can connect to the OCPP WebSocket endpoint using a known or discovered charging station identifier, then issue or receive OCPP commands as a legitimate charger. Given that no authentication is required, this can lead to privilege escalation, unauthorized control of charging infrastructure, and corruption of charging network data reported to the backend. |
2026-03-06 | |
| CVE-2026-1799 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This can...Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate has been determined not to be a valid vulnerability. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage. |
2026-03-06 | |
| CVE-2022-4947 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-...Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2024-32111. Reason: This candidate is a reservation duplicate of CVE-2024-32111. Notes: All CVE users should reference CVE-2024-32111 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage. |
2026-03-06 | |
| CVE-2018-25200 | 6.9 | MEDIUM | CWE-352 | 0.1% p17 | 4.83 | OOP CMS BLOG 1.0 contains a cross-site request forgery vulnerability that allows...OOP CMS BLOG 1.0 contains a cross-site request forgery vulnerability that allows unauthenticated attackers to create administrative user accounts by crafting malicious POST requests. Attackers can submit forms to the addUser.php endpoint with parameters including userName, password, email, and role set to administrative privileges to gain unauthorized access. |
2026-03-06 | |
| CVE-2018-25199 | 8.8 | HIGH | CWE-89 | 0.2% p42 | 6.17 | OOP CMS BLOG 1.0 contains SQL injection vulnerabilities that allow unauthenticat...OOP CMS BLOG 1.0 contains SQL injection vulnerabilities that allow unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code through multiple parameters. Attackers can inject SQL commands via the search parameter in search.php, pageid parameter in page.php, and id parameter in posts.php to extract database information including table names, schema names, and database credentials. |
2026-03-06 | |
| CVE-2018-25198 | 6.9 | MEDIUM | CWE-787 | 0.0% p4 | 4.83 | eToolz 3.4.8.0 contains a denial of service vulnerability that allows local atta...eToolz 3.4.8.0 contains a denial of service vulnerability that allows local attackers to crash the application by supplying oversized input buffers. Attackers can create a payload file containing 255 bytes of data that triggers a buffer overflow condition when processed by the application. |
2026-03-06 | |
| CVE-2018-25197 | 8.8 | HIGH | CWE-89 | 0.1% p30 | 6.16 | PlayJoom 0.10.1 contains an SQL injection vulnerability that allows unauthentica...PlayJoom 0.10.1 contains an SQL injection vulnerability that allows unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code through the catid parameter. Attackers can send GET requests to index.php with option=com_playjoom&view=genre&catid=[SQL] to extract sensitive database information including usernames, databases, and version details. |
2026-03-06 | |
| CVE-2018-25196 | 8.8 | HIGH | CWE-89 | 0.3% p53 | 6.17 | ServerZilla 1.0 contains an SQL injection vulnerability that allows unauthentica...ServerZilla 1.0 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the email parameter. Attackers can send POST requests to reset.php with malicious email values containing SQL operators to bypass authentication and extract sensitive database information. |
2026-03-06 | |
| CVE-2018-25194 | 8.8 | HIGH | CWE-22 | 0.2% p40 | 6.17 | Nominas 0.27 contains an SQL injection vulnerability that allows unauthenticated...Nominas 0.27 contains an SQL injection vulnerability that allows unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code through the username parameter. Attackers can send POST requests to the login/checklogin.php endpoint with crafted UNION-based SQL injection payloads to extract database information including usernames, database names, and version details. |
2026-03-06 | |
| CVE-2018-25193 | 8.7 | HIGH | CWE-1188 | 0.1% p34 | 6.09 | Mongoose Web Server 6.9 contains a denial of service vulnerability that allows r...Mongoose Web Server 6.9 contains a denial of service vulnerability that allows remote attackers to crash the service by establishing multiple socket connections. Attackers can repeatedly create connections to the default port and send malformed data to exhaust server resources and cause service unavailability. |
2026-03-06 | |
| CVE-2018-25192 | 8.8 | HIGH | CWE-89 | 0.3% p53 | 6.17 | GPS Tracking System 2.12 contains an SQL injection vulnerability that allows una...GPS Tracking System 2.12 contains an SQL injection vulnerability that allows unauthenticated attackers to bypass authentication by injecting SQL code through the username parameter. Attackers can submit crafted POST requests to the login.php endpoint with SQL injection payloads in the username field to gain unauthorized access without valid credentials. |
2026-03-06 | |
| CVE-2018-25191 | 7.1 | HIGH | CWE-89 | 0.0% p9 | 4.97 | Facturation System 1.0 contains an SQL injection vulnerability that allows authe...Facturation System 1.0 contains an SQL injection vulnerability that allows authenticated attackers to execute arbitrary SQL queries by injecting malicious code through the 'mod_id' parameter. Attackers can send POST requests to the editar_producto.php endpoint with crafted SQL payloads in the mod_id parameter to extract sensitive database information including usernames, database names, and version details. |
2026-03-06 | |
| CVE-2018-25190 | 6.9 | MEDIUM | CWE-352 | 0.0% p8 | 4.83 | Easyndexer 1.0 contains a cross-site request forgery vulnerability that allows u...Easyndexer 1.0 contains a cross-site request forgery vulnerability that allows unauthenticated attackers to create administrative accounts by submitting forged POST requests. Attackers can craft malicious web pages that submit POST requests to createuser.php with parameters including username, password, name, surname, and privileges set to 1 for administrator access. |
2026-03-06 | |
| CVE-2018-25189 | 8.8 | HIGH | CWE-89 | 0.1% p30 | 6.16 | Data Center Audit 2.6.2 contains an SQL injection vulnerability in the username ...Data Center Audit 2.6.2 contains an SQL injection vulnerability in the username parameter of dca_login.php that allows unauthenticated attackers to execute arbitrary SQL queries. Attackers can submit crafted SQL payloads through POST requests to extract sensitive database information including usernames, database names, and version details. |
2026-03-06 | |
| CVE-2018-25188 | 8.8 | HIGH | CWE-89 | 0.1% p31 | 6.16 | Webiness Inventory 2.3 contains an SQL injection vulnerability that allows unaut...Webiness Inventory 2.3 contains an SQL injection vulnerability that allows unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code through the order parameter. Attackers can send POST requests to the WsModelGrid.php endpoint with crafted SQL payloads to extract sensitive database information including usernames, databases, and version details. |
2026-03-06 | |
| CVE-2018-25187 | 8.8 | HIGH | CWE-89 | 0.1% p32 | 6.16 | Tina4 Stack 1.0.3 contains multiple vulnerabilities allowing unauthenticated att...Tina4 Stack 1.0.3 contains multiple vulnerabilities allowing unauthenticated attackers to access sensitive database files and execute SQL injection attacks. Attackers can directly request the kim.db database file to retrieve user credentials and password hashes, or inject SQL code through the menu endpoint to manipulate database queries. |
2026-03-06 | |
| CVE-2018-25186 | 6.9 | MEDIUM | CWE-352 | 0.0% p5 | 4.83 | Tina4 Stack 1.0.3 contains a cross-site request forgery vulnerability that allow...Tina4 Stack 1.0.3 contains a cross-site request forgery vulnerability that allows attackers to modify admin user credentials by submitting forged POST requests to the profile endpoint. Attackers can craft HTML forms targeting the /kim/profile endpoint with hidden fields containing malicious user data like passwords and email addresses to update administrator accounts without authentication. |
2026-03-06 | |
| CVE-2018-25184 | 6.9 | MEDIUM | CWE-22 | 0.1% p17 | 4.83 | Surreal ToDo 0.6.1.2 contains a local file inclusion vulnerability that allows u...Surreal ToDo 0.6.1.2 contains a local file inclusion vulnerability that allows unauthenticated attackers to read arbitrary files by manipulating the content parameter. Attackers can supply directory traversal sequences through the content parameter in index.php to access sensitive system files like configuration and initialization files. |
2026-03-06 | |
| CVE-2018-25182 | 8.8 | HIGH | CWE-89 | 0.1% p30 | 6.16 | Silurus Classifieds Script 2.0 contains an SQL injection vulnerability that allo...Silurus Classifieds Script 2.0 contains an SQL injection vulnerability that allows unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code through the ID parameter. Attackers can send GET requests to wcategory.php with crafted SQL payloads in the ID parameter to extract database table names and sensitive information from the database. |
2026-03-06 | |
| CVE-2018-25181 | 8.7 | HIGH | CWE-22 | 0.8% p74 | 6.11 | Musicco 2.0.0 contains a path traversal vulnerability that allows unauthenticate...Musicco 2.0.0 contains a path traversal vulnerability that allows unauthenticated attackers to download arbitrary directories by manipulating the parent parameter. Attackers can supply directory traversal sequences in the parent parameter of the getAlbum endpoint to access sensitive system directories and download them as ZIP files. |
2026-03-06 | |
| CVE-2018-25180 | 7.1 | HIGH | CWE-89 | 0.0% p9 | 4.97 | Maitra 1.7.2 contains an sql injection vulnerability that allows authenticated a...Maitra 1.7.2 contains an sql injection vulnerability that allows authenticated attackers to execute arbitrary SQL queries by injecting malicious code through the mailid parameter in outmail and inmail modules. Attackers can also download the SQLite database file directly from the application directory to extract sensitive mail tracking data and credentials. |
2026-03-06 | |
| CVE-2018-25179 | 8.8 | HIGH | CWE-89 | 0.1% p30 | 6.16 | Gumbo CMS 0.99 contains an SQL injection vulnerability that allows unauthenticat...Gumbo CMS 0.99 contains an SQL injection vulnerability that allows unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code through the language parameter. Attackers can send POST requests to the settings endpoint with crafted SQL payloads in the language parameter to extract sensitive database information including usernames, databases, and version details. |
2026-03-06 | |
| CVE-2018-25178 | 8.7 | HIGH | CWE-22 | 0.4% p59 | 6.10 | Easyndexer 1.0 contains an arbitrary file download vulnerability that allows una...Easyndexer 1.0 contains an arbitrary file download vulnerability that allows unauthenticated attackers to download sensitive files by manipulating the file parameter. Attackers can send POST requests to showtif.php with arbitrary file paths in the file parameter to retrieve system files like configuration and initialization files. |
2026-03-06 | |
| CVE-2018-25177 | 6.9 | MEDIUM | CWE-352 | 0.0% p8 | 4.83 | Data Center Audit 2.6.2 contains a cross-site request forgery vulnerability that...Data Center Audit 2.6.2 contains a cross-site request forgery vulnerability that allows attackers to reset administrator passwords without authentication by submitting crafted POST requests. Attackers can send requests to dca_resetpw.php with parameters updateuser, pass, pass2, and submit_reset to change the admin account password and gain administrative access. |
2026-03-06 | |
| CVE-2018-25176 | 8.8 | HIGH | CWE-352 | 0.1% p22 | 6.16 | Alive Parish 2.0.4 contains an SQL injection vulnerability that allows unauthent...Alive Parish 2.0.4 contains an SQL injection vulnerability that allows unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code through the key parameter in the search endpoint. Attackers can also upload arbitrary files via the person photo upload functionality to the images/uploaded directory for remote code execution. |
2026-03-06 | |
| CVE-2018-25175 | 8.8 | HIGH | CWE-89 | 0.1% p31 | 6.16 | Alienor Web Libre 2.0 contains an SQL injection vulnerability that allows unauth...Alienor Web Libre 2.0 contains an SQL injection vulnerability that allows unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code through the identifiant parameter. Attackers can submit crafted POST requests to index.php with SQL injection payloads in the identifiant field to extract sensitive database information including usernames, databases, and version details. |
2026-03-06 | |
| CVE-2018-25174 | 6.9 | MEDIUM | CWE-352 | 0.0% p8 | 4.83 | ABC ERP 0.6.4 contains a cross-site request forgery vulnerability that allows at...ABC ERP 0.6.4 contains a cross-site request forgery vulnerability that allows attackers to modify administrator credentials by submitting forged requests to _configurar_perfil.php. Attackers can craft malicious forms or links containing parameters like usuario, contrasena1, contrasena2, nombre, and email to change admin account settings without authentication. |
2026-03-06 | |
| CVE-2018-25173 | 8.8 | HIGH | CWE-89 | 0.1% p30 | 6.16 | Rmedia SMS 1.0 contains an SQL injection vulnerability that allows unauthenticat...Rmedia SMS 1.0 contains an SQL injection vulnerability that allows unauthenticated attackers to extract database information by injecting SQL code through the gid parameter. Attackers can send GET requests to editgrp.php with malicious gid values using EXTRACTVALUE and CONCAT functions to retrieve schema names and sensitive database data. |
2026-03-06 | |
| CVE-2018-25172 | 8.8 | HIGH | CWE-89 | 0.1% p30 | 6.16 | Pedidos 1.0 contains an SQL injection vulnerability that allows unauthenticated ...Pedidos 1.0 contains an SQL injection vulnerability that allows unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code through the 'q' parameter. Attackers can send GET requests to the ajax/load_proveedores.php endpoint with crafted SQL payloads to extract sensitive database information including schema names and table structures. |
2026-03-06 | |
| CVE-2018-25171 | 8.8 | HIGH | CWE-434 | 0.1% p24 | 6.16 | EdTv 2 contains an SQL injection vulnerability that allows unauthenticated attac...EdTv 2 contains an SQL injection vulnerability that allows unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code through the 'id' parameter. Attackers can send GET requests to the admin/edit_source endpoint with crafted SQL UNION statements to extract database information including schema names, user credentials, and version details. |
2026-03-06 | |
| CVE-2018-25170 | 8.8 | HIGH | CWE-352 | 0.0% p8 | 6.16 | DoceboLMS 1.2 contains an SQL injection vulnerability that allows unauthenticate...DoceboLMS 1.2 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the id, idC, and idU parameters. Attackers can send GET requests to the lesson.php endpoint with malicious SQL payloads to extract sensitive database information. |
2026-03-06 | |
| CVE-2018-25169 | 8.7 | HIGH | CWE-1188 | 0.2% p36 | 6.09 | AMPPS 2.7 contains a denial of service vulnerability that allows remote attacker...AMPPS 2.7 contains a denial of service vulnerability that allows remote attackers to crash the service by sending malformed data to the default HTTP port. Attackers can establish multiple socket connections and transmit invalid payloads to exhaust server resources and cause service unavailability. |
2026-03-06 | |
| CVE-2018-25168 | 5.3 | MEDIUM | CWE-434 | 0.1% p24 | 3.71 | Precurio Intranet Portal 2.0 contains a cross-site request forgery vulnerability...Precurio Intranet Portal 2.0 contains a cross-site request forgery vulnerability that allows unauthenticated attackers to create administrative user accounts by submitting crafted POST requests. Attackers can forge requests to the /public/admin/user/submitnew endpoint with user creation parameters to add new admin accounts without requiring CSRF tokens or user interaction. |
2026-03-06 | |
| CVE-2018-25167 | 8.8 | HIGH | CWE-89 | 0.1% p30 | 6.16 | Net-Billetterie 2.9 contains an SQL injection vulnerability in the login paramet...Net-Billetterie 2.9 contains an SQL injection vulnerability in the login parameter of login.inc.php that allows unauthenticated attackers to execute arbitrary SQL queries. Attackers can submit malicious SQL code through the login POST parameter to extract database information including usernames, passwords, and system credentials. |
2026-03-06 | |
| CVE-2018-25166 | 8.8 | HIGH | CWE-89 | 0.1% p30 | 6.16 | Meneame English Pligg 5.8 contains an SQL injection vulnerability that allows un...Meneame English Pligg 5.8 contains an SQL injection vulnerability that allows unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code through the search parameter. Attackers can send GET requests to index.php with crafted SQL payloads in the search parameter to extract sensitive database information including usernames, database names, and version details. |
2026-03-06 | |
| CVE-2018-25165 | 7.1 | HIGH | CWE-89 | 0.0% p9 | 4.97 | Galaxy Forces MMORPG 0.5.8 contains an SQL injection vulnerability that allows a...Galaxy Forces MMORPG 0.5.8 contains an SQL injection vulnerability that allows authenticated attackers to execute arbitrary SQL queries by injecting malicious code through the 'type' parameter. Attackers can send POST requests to ads.php with crafted SQL payloads in the type parameter to extract sensitive database information including usernames, databases, and version details. |
2026-03-06 | |
| CVE-2018-25164 | 8.7 | HIGH | CWE-552 | 0.1% p24 | 6.09 | EverSync 0.5 contains an arbitrary file download vulnerability that allows unaut...EverSync 0.5 contains an arbitrary file download vulnerability that allows unauthenticated attackers to access sensitive files by requesting them directly from the files directory. Attackers can send GET requests to the files directory to download database files like db.sq3 containing application data and credentials. |
2026-03-06 | |
| CVE-2018-25163 | 8.8 | HIGH | CWE-89 | 0.1% p30 | 6.16 | BitZoom 1.0 contains an SQL injection vulnerability that allows unauthenticated ...BitZoom 1.0 contains an SQL injection vulnerability that allows unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code through the rollno and username parameters in forgot.php and login.php. Attackers can submit crafted POST requests with SQL UNION statements to extract database schema information and table contents from the application database. |
2026-03-06 | |
| CVE-2018-25162 | 7.1 | HIGH | CWE-434 | 0.1% p27 | 4.97 | 2-Plan Team 1.0.4 contains an arbitrary file upload vulnerability that allows au...2-Plan Team 1.0.4 contains an arbitrary file upload vulnerability that allows authenticated attackers to upload executable PHP files by sending multipart form data to managefile.php. Attackers can upload PHP files through the userfile1 parameter with action=upload, which are stored in the files directory and executed by the web server for remote code execution. |
2026-03-06 | |
| CVE-2018-25161 | 8.8 | HIGH | CWE-89 | 0.1% p15 | 6.16 | Warranty Tracking System 11.06.3 contains an SQL injection vulnerability that al...Warranty Tracking System 11.06.3 contains an SQL injection vulnerability that allows attackers to execute arbitrary SQL queries by injecting malicious code through the txtCustomerCode, txtCustomerName, and txtPhone POST parameters in SearchCustomer.php. Attackers can submit crafted SQL statements using UNION SELECT to extract sensitive database information including usernames, database names, and version details. |
2026-03-06 | |
| CVE-2026-28106 | 4.7 | MEDIUM | CWE-601 | 0.0% p1 | 3.29 | URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Kings Plugi...URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Kings Plugins B2BKing Premium allows Phishing.This issue affects B2BKing Premium: from n/a before 5.4.20. |
2026-03-06 | |
| CVE-2026-28080 | 4.3 | MEDIUM | CWE-862 | 0.0% p9 | 3.01 | Missing Authorization vulnerability in Rank Math Rank Math SEO PRO allows Exploi...Missing Authorization vulnerability in Rank Math Rank Math SEO PRO allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Rank Math SEO PRO: from n/a through 3.0.95. |
2026-03-06 | |
| CVE-2024-35644 | 5.9 | MEDIUM | CWE-79 | 0.1% p29 | 4.13 | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site ...Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Pascal Birchler Preferred Languages allows DOM-Based XSS.This issue affects Preferred Languages: from n/a through 2.2.2. |
2026-03-06 | |
| CVE-2026-3589 | 7.5 | HIGH | CWE-352 | 0.0% p10 | 5.25 | The WooCommerce WordPress plugin from versions 5.4.0 to 10.5.2 does not properly...The WooCommerce WordPress plugin from versions 5.4.0 to 10.5.2 does not properly handle batch requests, which could allow unauthenticated users to make a logged in admin call non store/WC REST endpoints, and create arbitrary admin users via a CSRF attack for example. |
2026-03-06 | |
| CVE-2026-23925 | 5.1 | MEDIUM | CWE-863 | 0.0% p2 | 3.57 | An authenticated Zabbix user (User role) with template/host write permissions is...An authenticated Zabbix user (User role) with template/host write permissions is able to create objects via the configuration.import API. This can lead to confidentiality loss by creating unauthorized hosts. Note that the User role is normally not sufficient to create and edit templates/hosts even with write permissions. |
2026-03-06 | |
| CVE-2026-2830 | 6.1 | MEDIUM | CWE-94 | 0.1% p35 | 4.27 | The WP All Import – Drag & Drop Import for CSV, XML, Excel & Google Sheets plugi...The WP All Import – Drag & Drop Import for CSV, XML, Excel & Google Sheets plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘filepath’ parameter in all versions up to, and including, 4.0.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. |
2026-03-06 | |
| CVE-2026-2331 | 9.8 | CRITICAL | CWE-552 | 0.1% p17 | 6.86 | An attacker may perform unauthenticated read and write operations on sensitive f...An attacker may perform unauthenticated read and write operations on sensitive filesystem areas via the AppEngine Fileaccess over HTTP due to improper access restrictions. A critical filesystem directory was unintentionally exposed through the HTTP-based file access feature, allowing access without authentication. This includes device parameter files, enabling an attacker to read and modify application settings, including customer-defined passwords. Additionally, exposure of the custom application directory may allow execution of arbitrary Lua code within the sandboxed AppEngine environment. |
2026-03-06 | |
| CVE-2026-2330 | 9.4 | CRITICAL | CWE-552 | 0.1% p31 | 6.58 | An attacker may access restricted filesystem areas on the device via the CROWN R...An attacker may access restricted filesystem areas on the device via the CROWN REST interface due to incomplete whitelist enforcement. Certain directories intended for internal testing were not covered by the whitelist and are accessible without authentication. An unauthenticated attacker could place a manipulated parameter file that becomes active after a reboot, allowing modification of critical device settings, including network configuration and application parameters. |
2026-03-06 | |
| CVE-2026-29183 | 9.3 | CRITICAL | CWE-79 | 0.2% p38 | 6.52 | SiYuan is a personal knowledge management system. Prior to version 3.5.9, an una...SiYuan is a personal knowledge management system. Prior to version 3.5.9, an unauthenticated reflected XSS vulnerability exists in the dynamic icon API endpoint "GET /api/icon/getDynamicIcon" when type=8, attacker-controlled content is embedded into SVG output without escaping. Because the endpoint is unauthenticated and returns image/svg+xml, a crafted URL can inject executable SVG/HTML event handlers (for example onerror) and run JavaScript in the SiYuan web origin. This can be chained to perform authenticated API actions and exfiltrate sensitive data when a logged-in user opens the malicious link. This issue has been patched in version 3.5.9. |
2026-03-06 | |
| CVE-2026-29074 | 7.5 | HIGH | CWE-776 | 0.1% p18 | 5.25 | SVGO, short for SVG Optimizer, is a Node.js library and command-line application...SVGO, short for SVG Optimizer, is a Node.js library and command-line application for optimizing SVG files. From version 2.1.0 to before version 2.8.1, from version 3.0.0 to before version 3.3.3, and before version 4.0.1, SVGO accepts XML with custom entities, without guards against entity expansion or recursion. This can result in a small XML file (811 bytes) stalling the application and even crashing the Node.js process with JavaScript heap out of memory. This issue has been patched in versions 2.8.1, 3.3.3, and 4.0.1. |
2026-03-06 | |
| CVE-2026-29073 | 5.7 | MEDIUM | CWE-89 | 0.1% p18 | 3.99 | SiYuan is a personal knowledge management system. Prior to version 3.6.0, the /a...SiYuan is a personal knowledge management system. Prior to version 3.6.0, the /api/query/sql lets a user run sql directly, but it only checks basic auth, not admin rights, any logged-in user, even readers, can run any sql query on the database. This issue has been patched in version 3.6.0. |
2026-03-06 | |
| CVE-2026-29062 | 8.7 | HIGH | CWE-770 | 0.0% p5 | 6.09 | jackson-core contains core low-level incremental ("streaming") parser and genera...jackson-core contains core low-level incremental ("streaming") parser and generator abstractions used by Jackson Data Processor. From version 3.0.0 to before version 3.1.0, the UTF8DataInputJsonParser, which is used when parsing from a java.io.DataInput source, bypasses the maxNestingDepth constraint (default: 500) defined in StreamReadConstraints. A similar issue was found in ReaderBasedJsonParser. This allows a user to supply a JSON document with excessive nesting, which can cause a StackOverflowError when the structure is processed, leading to a Denial of Service (DoS). This issue has been patched in version 3.1.0. |
2026-03-06 | |
| CVE-2026-29059 | 6.9 | MEDIUM | CWE-22 | 0.0% p4 | 4.83 | Windmill is an open-source developer platform for internal code: APIs, backgroun...Windmill is an open-source developer platform for internal code: APIs, background jobs, workflows and UIs. Prior to version 1.603.3, an unauthenticated path traversal vulnerability exists in Windmill's get_log_file endpoint "(/api/w/{workspace}/jobs_u/get_log_file/{filename})". The filename parameter is concatenated into a file path without sanitization, allowing an attacker to read arbitrary files on the server using ../ sequences. This issue has been patched in version 1.603.3. |
2026-03-06 | |
| CVE-2026-29068 | 8.7 | HIGH | CWE-121 | 0.1% p19 | 6.09 | PJSIP is a free and open source multimedia communication library written in C. P...PJSIP is a free and open source multimedia communication library written in C. Prior to version 2.17, there is a stack buffer overflow vulnerability when pjmedia-codec parses an RTP payload contain more frames than the caller-provided frames can hold. This issue has been patched in version 2.17. |
2026-03-06 | |
| CVE-2026-29065 | 8.8 | HIGH | CWE-22 | 0.1% p22 | 6.16 | changedetection.io is a free open source web page change detection tool. Prior t...changedetection.io is a free open source web page change detection tool. Prior to version 0.54.4, a Zip Slip vulnerability in the backup restore functionality allows arbitrary file overwrite via path traversal in uploaded ZIP archives. This issue has been patched in version 0.54.4. |
2026-03-06 | |
| CVE-2026-29058 | 9.8 | CRITICAL | CWE-78 | 50.9% p97 | 8.39 | AVideo is a video-sharing Platform software. Prior to version 7.0, an unauthenti...AVideo is a video-sharing Platform software. Prior to version 7.0, an unauthenticated attacker can execute arbitrary OS commands on the server by injecting shell command substitution into the base64Url GET parameter. This can lead to full server compromise, data exfiltration (e.g., configuration secrets, internal keys, credentials), and service disruption. This issue has been patched in version 7.0. |
2026-03-06 | |
| CVE-2026-29049 | 4.3 | MEDIUM | CWE-400 | 0.0% p12 | 3.01 | melange allows users to build apk packages using declarative pipelines. In versi...melange allows users to build apk packages using declarative pipelines. In version 0.40.5 and prior, melange update-cache downloads URIs from build configs via io.Copy without any size limit or HTTP client timeout (pkg/renovate/cache/cache.go). An attacker-controlled URI in a melange config can cause unbounded disk writes, exhausting disk on the build runne. There is no known patch publicly available. |
2026-03-06 | |
| CVE-2026-29048 | 6.9 | MEDIUM | CWE-79 | 0.0% p10 | 4.83 | HumHub is an Open Source Enterprise Social Network. In version 1.18.0, a cross-s...HumHub is an Open Source Enterprise Social Network. In version 1.18.0, a cross-site scripting vulnerability was identified in the Button component of version 1.18.0. Due to inconsistent output encoding at several points within the software, malicious scripts could be injected and executed in the context of the user's browser. This issue has been patched in version 1.18.1. |
2026-03-06 | |
| CVE-2026-29042 | 8.9 | HIGH | CWE-75 | 0.7% p71 | 6.25 | Nuclio is a "Serverless" framework for Real-Time Events and Data Processing. Pri...Nuclio is a "Serverless" framework for Real-Time Events and Data Processing. Prior to version 1.15.20, the Nuclio Shell Runtime component contains a command injection vulnerability in how it processes user-supplied arguments. When a function is invoked via HTTP, the runtime reads the X-Nuclio-Arguments header and directly incorporates its value into shell commands without any validation or sanitization. This issue has been patched in version 1.15.20. |
2026-03-06 | |
| CVE-2026-29039 | 8.8 | HIGH | CWE-94 | 0.0% p2 | 6.16 | changedetection.io is a free open source web page change detection tool. Prior t...changedetection.io is a free open source web page change detection tool. Prior to version 0.54.4, the changedetection.io application allows users to specify XPath expressions as content filters via the include_filters field. These XPath expressions are processed using the elementpath library which implements XPath 3.0/3.1 specification. XPath 3.0 includes the unparsed-text() function which can read arbitrary files from the filesystem. The application does not validate or sanitize XPath expressions to block dangerous functions, allowing an attacker to read any file accessible to the application process. This issue has been patched in version 0.54.4. |
2026-03-06 | |
| CVE-2026-29038 | 6.1 | MEDIUM | CWE-79 | 0.0% p11 | 4.27 | changedetection.io is a free open source web page change detection tool. Prior t...changedetection.io is a free open source web page change detection tool. Prior to version 0.54.4, there is a reflected cross-site scripting (XSS) vulnerability identified in the /rss/tag/ endpoint of changedetection.io. The tag_uuid path parameter is reflected directly in the HTTP response body without HTML escaping. Since Flask returns text/html by default for plain string responses, the browser parses and executes injected JavaScript. This issue has been patched in version 0.54.4. |
2026-03-06 | |
| CVE-2026-28804 | 6.9 | MEDIUM | CWE-407 | 0.0% p15 | 4.83 | pypdf is a free and open-source pure-python PDF library. Prior to version 6.7.5,...pypdf is a free and open-source pure-python PDF library. Prior to version 6.7.5, an attacker who uses this vulnerability can craft a PDF which leads to long runtimes. This requires accessing a stream which uses the /ASCIIHexDecode filter. This issue has been patched in version 6.7.5. |
2026-03-06 | |
| CVE-2026-28802 | 7.7 | HIGH | CWE-347 | 0.0% p6 | 5.39 | Authlib is a Python library which builds OAuth and OpenID Connect servers. From ...Authlib is a Python library which builds OAuth and OpenID Connect servers. From version 1.6.5 to before version 1.6.7, previous tests involving passing a malicious JWT containing alg: none and an empty signature was passing the signature verification step without any changes to the application code when a failure was expected.. This issue has been patched in version 1.6.7. |
2026-03-06 | |
| CVE-2026-28801 | 6.6 | MEDIUM | CWE-94 | 0.0% p5 | 4.62 | Natro Macro is an open-source Bee Swarm Simulator macro written in AutoHotkey. P...Natro Macro is an open-source Bee Swarm Simulator macro written in AutoHotkey. Prior to version 1.1.0, any ahk code contained inside of a pattern or path file is executed by the macro. Since users commonly share path/pattern files, an attacker could share a file containing malicious code, which is then executed by the program. This code can operate in silence alongside the pattern, running in the background to do whatever the attacker pleases. This issue has been patched in version 1.1.0. |
2026-03-06 | |
| CVE-2026-28800 | 6.4 | MEDIUM | CWE-22 | 0.0% p10 | 4.48 | Natro Macro is an open-source Bee Swarm Simulator macro written in AutoHotkey. P...Natro Macro is an open-source Bee Swarm Simulator macro written in AutoHotkey. Prior to version 1.1.0, anyone with Discord Remote Control set up in a non-private channel gives access to any user with the permission to send message in said channel access to do anything on their computer. This includes keyboard and mouse inputs and full file access. This issue has been patched in version 1.1.0. |
2026-03-06 | |
| CVE-2026-28799 | 8.7 | HIGH | CWE-416 | 0.1% p18 | 6.09 | PJSIP is a free and open source multimedia communication library written in C. P...PJSIP is a free and open source multimedia communication library written in C. Prior to version 2.17, a heap use-after-free vulnerability exists in PJSIP's event subscription framework (evsub.c) that is triggered during presence unsubscription (SUBSCRIBE with Expires=0). This issue has been patched in version 2.17. |
2026-03-06 | |
| CVE-2026-28795 | 8.7 | HIGH | CWE-22 | 0.1% p24 | 6.09 | OpenChatBI is an intelligent chat-based BI tool powered by large language models...OpenChatBI is an intelligent chat-based BI tool powered by large language models, designed to help users query, analyze, and visualize data through natural language conversations. Prior to version 0.2.2, the save_report tool in openchatbi/tool/save_report.py suffers from a critical path traversal vulnerability due to insufficient input sanitization of the file_format parameter. This issue has been patched in version 0.2.2. |
2026-03-06 | |
| CVE-2026-28438 | 6.9 | MEDIUM | CWE-89 | 0.0% p13 | 4.83 | CocoIndex is a data transformation framework for AI. Prior to version 0.3.34, th...CocoIndex is a data transformation framework for AI. Prior to version 0.3.34, the Doris target connector didn't verify the configured table name before creating some SQL statements (ALTER TABLE). So, in the application code, if the table name is provided by an untrusted upstream, it expose vulnerability to SQL injection when target schema change. This issue has been patched in version 0.3.34. |
2026-03-06 | |
| CVE-2026-2446 | 9.8 | CRITICAL | CWE-862 | 0.1% p34 | 6.86 | The PowerPack for LearnDash WordPress plugin before 1.3.0 does not have authoriz...The PowerPack for LearnDash WordPress plugin before 1.3.0 does not have authorization and CRSF checks in an AJAX action, allowing unauthenticated users to update arbitrary WordPress options (such as default_role etc) and create arbitrary admin users |
2026-03-06 | |
| CVE-2026-1128 | 4.3 | MEDIUM | CWE-352 | 0.0% p4 | 3.01 | The WP eCommerce WordPress plugin through 3.15.1 does not have CSRF check in pla...The WP eCommerce WordPress plugin through 3.15.1 does not have CSRF check in place when deleting coupons, which could allow attackers to make a logged in admin remove them via a CSRF attack |
2026-03-06 | |
| CVE-2026-29084 | 4.6 | MEDIUM | CWE-352 | 0.0% p1 | 3.22 | Gokapi is a self-hosted file sharing server with automatic expiration and encryp...Gokapi is a self-hosted file sharing server with automatic expiration and encryption support. Prior to version 2.2.3, the login flow accepts credential-bearing requests without CSRF protection mechanisms tied to the browser session context. The handler parses form values directly and creates a session on successful credential validation. This issue has been patched in version 2.2.3. |
2026-03-06 | |
| CVE-2026-29061 | 5.4 | MEDIUM | CWE-284 | 0.0% p4 | 3.78 | Gokapi is a self-hosted file sharing server with automatic expiration and encryp...Gokapi is a self-hosted file sharing server with automatic expiration and encryption support. Prior to version 2.2.3, a privilege escalation vulnerability in the user rank demotion logic allows a demoted user's existing API keys to retain ApiPermManageFileRequests and ApiPermManageLogs permissions, enabling continued access to upload-request management and log viewing endpoints after the user has been stripped of all privileges. This issue has been patched in version 2.2.3. |
2026-03-06 | |
| CVE-2026-29060 | 5.0 | MEDIUM | CWE-284 | 0.0% p5 | 3.50 | Gokapi is a self-hosted file sharing server with automatic expiration and encryp...Gokapi is a self-hosted file sharing server with automatic expiration and encryption support. Prior to version 2.2.3, a registered user without privileges to create or modify file requests is able to create a short-lived API key that has the permission to do so. The user must be registered with Gokapi. If there are no users with access to the admin/upload menu, there is no impact. This issue has been patched in version 2.2.3. |
2026-03-06 | |
| CVE-2026-28794 | 9.3 | CRITICAL | CWE-1321 | 0.8% p74 | 6.53 | oRPC is an tool that helps build APIs that are end-to-end type-safe and adhere t...oRPC is an tool that helps build APIs that are end-to-end type-safe and adhere to OpenAPI standards. Prior to version 1.13.6, a prototype pollution vulnerability exists in the RPC JSON deserializer of the @orpc/client package. The vulnerability allows unauthenticated, remote attackers to inject arbitrary properties into the global Object.prototype. Because this pollution persists for the lifetime of the Node.js process and affects all objects, it can lead to severe security breaches, including authentication bypass, denial of service, and potentially Remote Code Execution. This issue has been patched in version 1.13.6. |
2026-03-06 | |
| CVE-2026-28787 | 8.2 | HIGH | CWE-287 | 0.0% p13 | 5.74 | OneUptime is a solution for monitoring and managing online services. In version ...OneUptime is a solution for monitoring and managing online services. In version 10.0.11 and prior, the WebAuthn authentication implementation does not store the challenge on the server side. Instead, the challenge is returned to the client and accepted back from the client request body during verification. This violates the WebAuthn specification (W3C Web Authentication Level 2, §13.4.3) and allows an attacker who has obtained a valid WebAuthn assertion (e.g., via XSS, MitM, or log exposure) to replay it indefinitely, completely bypassing the second-factor authentication. No known patches are available. |
2026-03-06 | |
| CVE-2026-28785 | 9.3 | CRITICAL | CWE-89 | 0.1% p22 | 6.51 | Ghostfolio is an open source wealth management software. Prior to version 2.244....Ghostfolio is an open source wealth management software. Prior to version 2.244.0, by bypassing symbol validation, an attacker can execute arbitrary SQL commands via the getHistorical() method, potentially allowing them to read, modify, or delete sensitive financial data for all users in the database. This issue has been patched in version 2.244.0. |
2026-03-06 | |
| CVE-2026-28685 | 6.5 | MEDIUM | CWE-285 | 0.0% p11 | 4.55 | Kimai is a web-based multi-user time-tracking application. Prior to version 2.51...Kimai is a web-based multi-user time-tracking application. Prior to version 2.51.0, "GET /api/invoices/{id}" only checks the role-based view_invoice permission but does not verify the requesting user has access to the invoice's customer. Any user with ROLE_TEAMLEAD (which grants view_invoice) can read all invoices in the system, including those belonging to customers assigned to other teams. This issue has been patched in version 2.51.0. |
2026-03-06 | |
| CVE-2026-28683 | 8.7 | HIGH | CWE-79 | 0.0% p6 | 6.09 | Gokapi is a self-hosted file sharing server with automatic expiration and encryp...Gokapi is a self-hosted file sharing server with automatic expiration and encryption support. Prior to version 2.2.3, if a malicious authenticated user uploads SVG and creates a hotlink for it, they can achieve stored XSS. This issue has been patched in version 2.2.3. |
2026-03-06 | |
| CVE-2026-28682 | 6.4 | MEDIUM | CWE-200 | 0.0% p5 | 4.48 | Gokapi is a self-hosted file sharing server with automatic expiration and encryp...Gokapi is a self-hosted file sharing server with automatic expiration and encryption support. Prior to version 2.2.3, the upload status SSE implementation on /uploadStatus publishes global upload state to any authenticated listener and includes file_id values that are not scoped to the requesting user. This issue has been patched in version 2.2.3. |
2026-03-06 | |
| CVE-2026-28681 | 8.1 | HIGH | CWE-601 | 0.1% p24 | 5.67 | Internet Routing Registry daemon version 4 is an IRR database server, processing...Internet Routing Registry daemon version 4 is an IRR database server, processing IRR objects in the RPSL format. From version 4.4.0 to before version 4.4.5 and from version 4.5.0 to before version 4.5.1, an attacker can manipulate the HTTP Host header on a password reset or account creation request. The confirmation link in the resulting email can then point to an attacker-controlled domain. Opening the link in the email is sufficient to pass the token to the attacker, who can then use it on the real IRRD instance to take over the account. A compromised account can then be used to modify RPSL objects maintained by the account's mntners and perform other account actions. If the user had two-factor authentication configured, which is required for users with override access, an attacker is not able to log in, even after successfully resetting the password. This issue has been patched in versions 4.4.5 and 4.5.1. |
2026-03-06 | |
| CVE-2026-28680 | 9.3 | CRITICAL | CWE-918 | 0.1% p16 | 6.51 | Ghostfolio is an open source wealth management software. Prior to version 2.245....Ghostfolio is an open source wealth management software. Prior to version 2.245.0, an attacker can exploit the manual asset import feature to perform a full-read SSRF, allowing them to exfiltrate sensitive cloud metadata (IMDS) or probe internal network services. This issue has been patched in version 2.245.0. |
2026-03-06 | |
| CVE-2026-28679 | 8.6 | HIGH | CWE-22 | 0.1% p19 | 6.02 | Home-Gallery.org is a self-hosted open-source web gallery to browse personal pho...Home-Gallery.org is a self-hosted open-source web gallery to browse personal photos and videos. Prior to version 1.21.0, when a user requests a download, the application does not verify whether the requested file is located within the media source directory, which can result in sensitive system files being downloadable as well. This issue has been patched in version 1.21.0. |
2026-03-06 | |
| CVE-2026-28677 | 8.2 | HIGH | CWE-918 | 0.1% p17 | 5.74 | OpenSift is an AI study tool that sifts through large datasets using semantic se...OpenSift is an AI study tool that sifts through large datasets using semantic search and generative AI. Prior to version 1.6.3-alpha, the URL ingest pipeline accepted user-controlled remote URLs with incomplete destination restrictions. Although private/local host checks existed, missing restrictions for credentialed URLs, non-standard ports, and cross-host redirects left SSRF-class abuse paths in non-localhost deployments. This issue has been patched in version 1.6.3-alpha. |
2026-03-06 | |
| CVE-2026-28676 | 8.8 | HIGH | CWE-22 | 0.1% p18 | 6.16 | OpenSift is an AI study tool that sifts through large datasets using semantic se...OpenSift is an AI study tool that sifts through large datasets using semantic search and generative AI. Prior to version 1.6.3-alpha, multiple storage helpers used path construction patterns that did not uniformly enforce base-directory containment. This created path-injection risk in file read/write/delete flows if malicious path-like values were introduced. This issue has been patched in version 1.6.3-alpha. |
2026-03-06 | |
| CVE-2026-28675 | 5.3 | MEDIUM | CWE-200 | 0.0% p11 | 3.71 | OpenSift is an AI study tool that sifts through large datasets using semantic se...OpenSift is an AI study tool that sifts through large datasets using semantic search and generative AI. Prior to version 1.6.3-alpha, some endpoints returned raw exception strings to clients. Additionally, login token material was exposed in UI/rendered responses and token rotation output. This issue has been patched in version 1.6.3-alpha. |
2026-03-06 | |
| CVE-2026-28509 | 6.3 | MEDIUM | CWE-79 | 0.0% p11 | 4.41 | LangBot is a global IM bot platform designed for LLMs. Prior to version 4.8.7, L...LangBot is a global IM bot platform designed for LLMs. Prior to version 4.8.7, LangBot’s web UI renders user-supplied raw HTML using rehypeRaw, which can lead to a cross-site scripting (XSS) vulnerability. This issue has been patched in version 4.8.7. |
2026-03-06 | |
| CVE-2026-28508 | 9.2 | CRITICAL | CWE-918 | 0.1% p34 | 6.44 | Idno is a social publishing platform. Prior to version 1.6.4, a logic error in t...Idno is a social publishing platform. Prior to version 1.6.4, a logic error in the API authentication flow causes the CSRF protection on the URL unfurl service endpoint to be trivially bypassed by any unauthenticated remote attacker. Combined with the absence of a login requirement on the endpoint itself, this allows an attacker to force the server to make arbitrary outbound HTTP requests to any host, including internal network addresses and cloud instance metadata services, and retrieve the response content. This issue has been patched in version 1.6.4. |
2026-03-06 | |
| CVE-2026-28507 | 8.6 | HIGH | CWE-78 | 0.5% p63 | 6.03 | Idno is a social publishing platform. Prior to version 1.6.4, there is a remote ...Idno is a social publishing platform. Prior to version 1.6.4, there is a remote code execution vulnerability via chained import file write and template path traversal. This issue has been patched in version 1.6.4. |
2026-03-06 | |
| CVE-2026-28429 | 7.5 | HIGH | CWE-22 | 0.5% p66 | 5.27 | Talishar is a fan-made Flesh and Blood project. Prior to commit 6be3871, a Path ...Talishar is a fan-made Flesh and Blood project. Prior to commit 6be3871, a Path Traversal vulnerability was identified in the gameName parameter. While the application's primary entry points implement input validation, the ParseGamestate.php component can be accessed directly as a standalone script. In this scenario, the absence of internal sanitization allows for directory traversal sequences (e.g., ../) to be processed, potentially leading to unauthorized file access. This issue has been patched in commit 6be3871. |
2026-03-06 | |
| CVE-2026-28428 | 5.3 | MEDIUM | CWE-287 | 0.2% p40 | 3.72 | Talishar is a fan-made Flesh and Blood project. Prior to commit a9c218e, an auth...Talishar is a fan-made Flesh and Blood project. Prior to commit a9c218e, an authentication bypass vulnerability in Talishar's game endpoint validation logic allows any unauthenticated attacker to perform authenticated game actions — including sending chat messages and submitting game inputs — by supplying an empty authKey parameter (authKey=). The server-side validation uses a loose comparison that accepts an empty string as a valid credential, while correctly rejecting non-empty but incorrect keys. This asymmetry means the authentication mechanism can be completely bypassed without knowing any valid token. This issue has been patched in commit a9c218e. |
2026-03-06 | |
| CVE-2026-27605 | 6.3 | MEDIUM | CWE-79 | 0.1% p23 | 4.41 | Chartbrew is an open-source web application that can connect directly to databas...Chartbrew is an open-source web application that can connect directly to databases and APIs and use the data to create charts. Prior to version 4.8.4, the application allows uploading files (project logos) without validating the file type or content. It trusts the extension provided by the user. These files are saved to the uploads/ directory and served statically. An attacker can upload an HTML file containing malicious JavaScript. Since authentication tokens are likely stored in localStorage (as they are returned in the API body), this XSS can lead to account takeover. This issue has been patched in version 4.8.4. |
2026-03-06 | |
| CVE-2026-27603 | 8.7 | HIGH | CWE-306 | 0.1% p21 | 6.09 | Chartbrew is an open-source web application that can connect directly to databas...Chartbrew is an open-source web application that can connect directly to databases and APIs and use the data to create charts. Prior to version 4.8.4, the chart filter endpoint POST /project/:project_id/chart/:chart_id/filter is missing both verifyToken and checkPermissions middleware, allowing unauthenticated users to access chart data from any team/project. This issue has been patched in version 4.8.4. |
2026-03-06 | |
| CVE-2026-27005 | 8.8 | HIGH | CWE-89 | 0.2% p38 | 6.17 | Chartbrew is an open-source web application that can connect directly to databas...Chartbrew is an open-source web application that can connect directly to databases and APIs and use the data to create charts. Prior to version 4.8.3, an unauthenticated attacker can inject arbitrary SQL into queries executed against databases connected to Chartbrew (MySQL, PostgreSQL). This allows reading, modifying, or deleting data in those databases depending on the database user's privileges. This issue has been patched in version 4.8.3. |
2026-03-06 | |
| CVE-2026-25888 | 8.8 | HIGH | CWE-94 | 0.4% p58 | 6.17 | Chartbrew is an open-source web application that can connect directly to databas...Chartbrew is an open-source web application that can connect directly to databases and APIs and use the data to create charts. Prior to version 4.8.1, there is a remote code execution vulnerability via a vulnerable API. This issue has been patched in version 4.8.1. |
2026-03-06 | |
| CVE-2026-25887 | 7.2 | HIGH | CWE-94 | 0.1% p33 | 5.04 | Chartbrew is an open-source web application that can connect directly to databas...Chartbrew is an open-source web application that can connect directly to databases and APIs and use the data to create charts. Prior to version 4.8.1, there is a remote code execution vulnerability via the MongoDB dataset Query. This issue has been patched in version 4.8.1. |
2026-03-06 | |
| CVE-2026-25877 | 6.5 | MEDIUM | CWE-284 | 0.0% p10 | 4.55 | Chartbrew is an open-source web application that can connect directly to databas...Chartbrew is an open-source web application that can connect directly to databases and APIs and use the data to create charts. Prior to version 4.8.1, the application performs authorization checks based solely on the project_id parameter when handling chart-related operations (update, delete, etc.). No authorization check is performed against the chart_id itself. This allows an authenticated user who has access to any project to manipulate or access charts belonging to other users/ project. This issue has been patched in version 4.8.1. |
2026-03-06 | |
| CVE-2026-29093 | 8.1 | HIGH | CWE-287 | 0.1% p24 | 5.67 | WWBN AVideo is an open source video platform. Prior to version 24.0, the officia...WWBN AVideo is an open source video platform. Prior to version 24.0, the official docker-compose.yml publishes the memcached service on host port 11211 (0.0.0.0:11211) with no authentication, while the Dockerfile configures PHP to store all user sessions in that memcached instance. An attacker who can reach port 11211 can read, modify, or flush session data — enabling session hijacking, admin impersonation, and mass session destruction without any application-level authentication. This issue has been patched in version 24.0. |
2026-03-06 | |
| CVE-2026-29046 | 9.2 | CRITICAL | CWE-20 | 0.2% p47 | 6.45 | TinyWeb is a web server (HTTP, HTTPS) written in Delphi for Win32. Prior to vers...TinyWeb is a web server (HTTP, HTTPS) written in Delphi for Win32. Prior to version 2.04, TinyWeb accepts request header values and later maps them into CGI environment variables (HTTP_*). The parser did not strictly reject dangerous control characters in header lines and header values, including CR, LF, and NUL, and did not consistently defend against encoded forms such as %0d, %0a, and %00. This can enable header value confusion across parser boundaries and may create unsafe data in the CGI execution context. This issue has been patched in version 2.04. |
2026-03-06 | |
| CVE-2026-29041 | 8.8 | HIGH | CWE-434 | 0.2% p36 | 6.16 | Chamilo is a learning management system. Prior to version 1.11.34, Chamilo LMS i...Chamilo is a learning management system. Prior to version 1.11.34, Chamilo LMS is affected by an authenticated remote code execution vulnerability caused by improper validation of uploaded files. The application relies solely on MIME-type verification when handling file uploads and does not adequately validate file extensions or enforce safe server-side storage restrictions. As a result, an authenticated low-privileged user can upload a crafted file containing executable code and subsequently execute arbitrary commands on the server. This issue has been patched in version 1.11.34. |
2026-03-06 | |
| CVE-2026-28502 | 9.3 | CRITICAL | CWE-434 | 0.3% p51 | 6.52 | WWBN AVideo is an open source video platform. Prior to version 24.0, an authenti...WWBN AVideo is an open source video platform. Prior to version 24.0, an authenticated Remote Code Execution (RCE) vulnerability was identified in AVideo related to the plugin upload/import functionality. The issue allowed an authenticated administrator to upload a specially crafted ZIP archive containing executable server-side files. Due to insufficient validation of extracted file contents, the archive was extracted directly into a web-accessible plugin directory, allowing arbitrary PHP code execution. This issue has been patched in version 24.0. |
2026-03-06 | |
| CVE-2026-28501 | 9.8 | CRITICAL | CWE-89 | 20.9% p95 | 7.49 | WWBN AVideo is an open source video platform. Prior to version 24.0, an unauthen...WWBN AVideo is an open source video platform. Prior to version 24.0, an unauthenticated SQL Injection vulnerability exists in AVideo within the objects/videos.json.php and objects/video.php components. The application fails to properly sanitize the catName parameter when it is supplied via a JSON-formatted POST request body. Because JSON input is parsed and merged into $_REQUEST after global security checks are executed, the payload bypasses the existing sanitization mechanisms. This issue has been patched in version 24.0. |
2026-03-06 | |
| CVE-2026-28497 | 9.3 | CRITICAL | CWE-190 | 0.2% p38 | 6.52 | TinyWeb is a web server (HTTP, HTTPS) written in Delphi for Win32. Prior to vers...TinyWeb is a web server (HTTP, HTTPS) written in Delphi for Win32. Prior to version 2.03, an integer overflow vulnerability in the string-to-integer conversion routine (_Val) allows an unauthenticated remote attacker to bypass Content-Length restrictions and perform HTTP Request Smuggling. This can lead to unauthorized access, security filter bypass, and potential cache poisoning. The impact is critical for servers using persistent connections (Keep-Alive). This issue has been patched in version 2.03. |
2026-03-06 | |
| CVE-2026-27807 | 4.9 | MEDIUM | CWE-776 | 0.1% p20 | 3.43 | MarkUs is a web application for the submission and grading of student assignment...MarkUs is a web application for the submission and grading of student assignments. Prior to version 2.9.4, MarkUs allows course instructors to upload YAML files to create/update various entities (e.g., assignment settings). These YAML files are parsed with aliases enabled. This issue has been patched in version 2.9.4. |
2026-03-06 | |
| CVE-2026-25962 | 6.5 | MEDIUM | CWE-409 | 0.1% p16 | 4.55 | MarkUs is a web application for the submission and grading of student assignment...MarkUs is a web application for the submission and grading of student assignments. Prior to version 2.9.4, MarkUs currently extracts zip files without any size or entry-count limits. For example, instructors can upload a zip file to provide an assignment configuration; students can upload a zip file for an assignment submission and indicate its contents should be extracted. This issue has been patched in version 2.9.4. |
2026-03-06 | |
| CVE-2025-59544 | 6.9 | MEDIUM | CWE-862 | 0.0% p11 | 4.83 | Chamilo is a learning management system. Prior to version 1.11.34, the functiona...Chamilo is a learning management system. Prior to version 1.11.34, the functionality for the user to update the category does not implement authorization checks for the "category_id" parameter which allows users to update the category of any user by replacing the "category_id" parameter. This issue has been patched in version 1.11.34. |
2026-03-06 | |
| CVE-2025-59543 | 9.0 | CRITICAL | CWE-79 | 0.1% p15 | 6.30 | Chamilo is a learning management system. Prior to version 1.11.34, there is a st...Chamilo is a learning management system. Prior to version 1.11.34, there is a stored cross-site scripting (XSS) vulnerability. By injecting malicious JavaScript into the course description field, an attacker with a low-privileged account (e.g., trainer) can execute arbitrary JavaScript code in the context of any other user viewing the course information page, including administrators. This allows an attacker to exfiltrate sensitive session cookies or tokens, resulting in account takeover (ATO) of higher-privileged users. This issue has been patched in version 1.11.34. |
2026-03-06 | |
| CVE-2025-59542 | 9.0 | CRITICAL | CWE-79 | 0.1% p15 | 6.30 | Chamilo is a learning management system. Prior to version 1.11.34, there is a st...Chamilo is a learning management system. Prior to version 1.11.34, there is a stored cross-site scripting (XSS) vulnerability. By injecting malicious JavaScript into the course learning path Settings field, an attacker with a low-privileged account (e.g., trainer) can execute arbitrary JavaScript code in the context of any other user viewing the course information page, including administrators. This allows an attacker to exfiltrate sensitive session cookies or tokens, resulting in account takeover (ATO) of higher-privileged users. This issue has been patched in version 1.11.34. |
2026-03-06 | |
| CVE-2025-59541 | 8.1 | HIGH | CWE-352 | 0.0% p4 | 5.67 | Chamilo is a learning management system. Prior to version 1.11.34, a Cross-Site ...Chamilo is a learning management system. Prior to version 1.11.34, a Cross-Site Request Forgery (CSRF) vulnerability allows an attacker to delete projects inside a course without the victim’s consent. The issue arises because sensitive actions such as project deletion do not implement anti-CSRF protections (tokens) and GET based requests. As a result, an authenticated user (Trainer) can be tricked into executing this unwanted action by simply visiting a malicious page. This issue has been patched in version 1.11.34. |
2026-03-06 | |
| CVE-2025-59540 | 6.4 | MEDIUM | CWE-79 | 0.0% p10 | 4.48 | Chamilo is a learning management system. Prior to version 1.11.34, a stored XSS ...Chamilo is a learning management system. Prior to version 1.11.34, a stored XSS vulnerability exists in Chamilo LMS that allows a staff account to execute arbitrary JavaScript in the browser of higher-privileged admin users. The issue arises because feedback input in the exercise history page is not properly encoded before rendering, allowing malicious scripts to persist in the database and execute on view. This issue has been patched in version 1.11.34. |
2026-03-06 | |
| CVE-2025-55289 | 8.8 | HIGH | CWE-79 | 0.1% p15 | 6.16 | Chamilo is a learning management system. Prior to version 1.11.34, there is a st...Chamilo is a learning management system. Prior to version 1.11.34, there is a stored XSS vulnerability in Chamilo LMS (Verison 1.11.32) allows an attacker to inject arbitrary JavaScript into the platform’s social network and internal messaging features. When viewed by an authenticated user (including administrators), the payload executes in their browser within the LMS context. This enables full account takeover via session hijacking, unauthorized actions with the victim’s privileges, exfiltration of sensitive data, and potential self-propagation to other users. This issue has been patched in version 1.11.34. |
2026-03-06 | |
| CVE-2026-3616 | 5.3 | MEDIUM | CWE-74 | 0.0% p12 | 3.71 | A vulnerability was detected in DefaultFuction Jeson Customer Relationship Manag...A vulnerability was detected in DefaultFuction Jeson Customer Relationship Management System 1.0.0. Impacted is an unknown function of the file /modules/customers/edit.php. Performing a manipulation of the argument ID results in sql injection. The attack may be initiated remotely. The exploit is now public and may be used. The patch is named f0e991870e9d33701cca3a1d0fd4eec135af01a6. It is suggested to install a patch to address this issue. |
2026-03-06 | |
| CVE-2026-3613 | 7.3 | HIGH | CWE-119 | 0.1% p28 | 5.11 | A vulnerability was identified in Wavlink WL-NU516U1 V240425. This vulnerability...A vulnerability was identified in Wavlink WL-NU516U1 V240425. This vulnerability affects the function sub_401A0C of the file /cgi-bin/login.cgi. Such manipulation of the argument ipaddr leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure. |
2026-03-06 | |
| CVE-2026-3612 | 7.3 | HIGH | CWE-74 | 0.4% p60 | 5.12 | A vulnerability was determined in Wavlink WL-NU516U1 V240425. This affects the f...A vulnerability was determined in Wavlink WL-NU516U1 V240425. This affects the function sub_405AF4 of the file /cgi-bin/adm.cgi of the component OTA Online Upgrade. This manipulation of the argument firmware_url causes command injection. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure. |
2026-03-06 | |
| CVE-2026-3610 | 5.3 | MEDIUM | CWE-79 | 0.0% p10 | 3.71 | A vulnerability was found in HSC Cybersecurity Mailinspector up to 5.3.2-3. Affe...A vulnerability was found in HSC Cybersecurity Mailinspector up to 5.3.2-3. Affected by this issue is some unknown functionality of the file /mailinspector/mliUserValidation.php of the component URL Handler. The manipulation of the argument error_description results in cross site scripting. The attack may be performed from remote. The exploit has been made public and could be used. Upgrading to version 5.4.0 can resolve this issue. You should upgrade the affected component. The vendor was contacted early and responded very professional: "We have already implemented the fix and made a hotfix available to affected customers, ensuring mitigation while the official release 5.4.0 has not yet been published. This allows customers to address the issue immediately, outside the regular release cycle." |
2026-03-06 | |
| CVE-2026-2589 | 5.3 | MEDIUM | CWE-200 | 0.0% p12 | 3.71 | The Greenshift – animation and page builder blocks plugin for WordPress is vulne...The Greenshift – animation and page builder blocks plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 12.8.3 via the automated Settings Backup stored in a publicly accessible file. This makes it possible for unauthenticated attackers to extract sensitive data including the configured OpenAI, Claude, Google Maps, Gemini, DeepSeek, and Cloudflare Turnstile API keys. |
2026-03-06 | |
| CVE-2026-28727 | 7.8 | HIGH | CWE-276 | 0.0% p2 | 5.46 | Local privilege escalation due to insecure Unix socket permissions. The followin...Local privilege escalation due to insecure Unix socket permissions. The following products are affected: Acronis Cyber Protect 17 (macOS) before build 41186, Acronis Cyber Protect Cloud Agent (macOS) before build 41124, Acronis True Image (macOS) before build 42902. |
2026-03-06 | |
| CVE-2026-28726 | 4.3 | MEDIUM | CWE-863 | 0.0% p10 | 3.01 | Sensitive information disclosure due to improper access control. The following p...Sensitive information disclosure due to improper access control. The following products are affected: Acronis Cyber Protect 17 (Linux, Windows) before build 41186. |
2026-03-06 | |
| CVE-2026-28725 | 5.5 | MEDIUM | CWE-732 | 0.0% p3 | 3.85 | Sensitive information disclosure due to improper configuration of a headless bro...Sensitive information disclosure due to improper configuration of a headless browser. The following products are affected: Acronis Cyber Protect 17 (Linux, Windows) before build 41186. |
2026-03-06 | |
| CVE-2026-28724 | 4.3 | MEDIUM | CWE-863 | 0.0% p10 | 3.01 | Unauthorized data access due to insufficient access control validation. The foll...Unauthorized data access due to insufficient access control validation. The following products are affected: Acronis Cyber Protect 17 (Linux, Windows) before build 41186. |
2026-03-06 | |
| CVE-2026-28723 | 4.3 | MEDIUM | CWE-863 | 0.0% p11 | 3.01 | Unauthorized report deletion due to insufficient access control. The following p...Unauthorized report deletion due to insufficient access control. The following products are affected: Acronis Cyber Protect 17 (Linux, Windows) before build 41186. |
2026-03-06 | |
| CVE-2026-28722 | 7.3 | HIGH | CWE-610 | 0.0% p3 | 5.11 | Local privilege escalation due to improper soft link handling. The following pro...Local privilege escalation due to improper soft link handling. The following products are affected: Acronis Cyber Protect 17 (Windows) before build 41186. |
2026-03-06 | |
| CVE-2026-28721 | 7.3 | HIGH | CWE-610 | 0.0% p3 | 5.11 | Local privilege escalation due to improper soft link handling. The following pro...Local privilege escalation due to improper soft link handling. The following products are affected: Acronis Cyber Protect 17 (Windows) before build 41186. |
2026-03-06 | |
| CVE-2026-28720 | 4.3 | MEDIUM | CWE-863 | 0.0% p11 | 3.01 | Unauthorized modification of settings due to insufficient authorization checks. ...Unauthorized modification of settings due to insufficient authorization checks. The following products are affected: Acronis Cyber Protect 17 (Linux, Windows) before build 41186. |
2026-03-06 | |
| CVE-2026-28719 | 4.3 | MEDIUM | CWE-863 | 0.0% p11 | 3.01 | Unauthorized resource manipulation due to improper authorization checks. The fol...Unauthorized resource manipulation due to improper authorization checks. The following products are affected: Acronis Cyber Protect 17 (Linux, Windows) before build 41186. |
2026-03-06 | |
| CVE-2026-28718 | 7.5 | HIGH | CWE-779 | 0.1% p28 | 5.25 | Denial of service due to insufficient input validation in authentication logging...Denial of service due to insufficient input validation in authentication logging. The following products are affected: Acronis Cyber Protect 17 (Linux, Windows) before build 41186. |
2026-03-06 | |
| CVE-2026-28717 | 5.0 | MEDIUM | CWE-276 | 0.0% p1 | 3.50 | Local privilege escalation due to improper directory permissions. The following ...Local privilege escalation due to improper directory permissions. The following products are affected: Acronis Cyber Protect 17 (Windows) before build 41186. |
2026-03-06 | |
| CVE-2026-28716 | 4.4 | MEDIUM | CWE-863 | 0.0% p3 | 3.08 | Information disclosure and manipulation due to improper authorization checks. Th...Information disclosure and manipulation due to improper authorization checks. The following products are affected: Acronis Cyber Protect 17 (Linux, Windows) before build 41186. |
2026-03-06 | |
| CVE-2026-28715 | 6.5 | MEDIUM | CWE-863 | 0.0% p11 | 4.55 | Sensitive information disclosure due to improper authorization checks. The follo...Sensitive information disclosure due to improper authorization checks. The following products are affected: Acronis Cyber Protect 17 (Linux, Windows) before build 41186. |
2026-03-06 | |
| CVE-2026-28714 | 4.8 | MEDIUM | CWE-522 | 0.0% p4 | 3.36 | Unnecessary transmission of sensitive cryptographic material. The following prod...Unnecessary transmission of sensitive cryptographic material. The following products are affected: Acronis Cyber Protect 17 (Linux, Windows) before build 41186. |
2026-03-06 | |
| CVE-2026-28713 | 7.1 | HIGH | CWE-1392 | 0.1% p15 | 4.97 | Default credentials set for local privileged user in Virtual Appliance. The foll...Default credentials set for local privileged user in Virtual Appliance. The following products are affected: Acronis Cyber Protect Cloud Agent (VMware) before build 36943, Acronis Cyber Protect 17 (VMware) before build 41186. |
2026-03-06 | |
| CVE-2026-28712 | 6.3 | MEDIUM | CWE-427 | 0.0% p4 | 4.41 | Local privilege escalation due to DLL hijacking vulnerability. The following pro...Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Protect 17 (Windows) before build 41186. |
2026-03-06 | |
| CVE-2026-28711 | 6.3 | MEDIUM | CWE-427 | 0.0% p4 | 4.41 | Local privilege escalation due to DLL hijacking vulnerability. The following pro...Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Protect 17 (Windows) before build 41186. |
2026-03-06 | |
| CVE-2026-28710 | 9.8 | CRITICAL | CWE-1390 | 0.1% p27 | 6.86 | Sensitive information disclosure and manipulation due to improper authentication...Sensitive information disclosure and manipulation due to improper authentication. The following products are affected: Acronis Cyber Protect 17 (Linux, Windows) before build 41186. |
2026-03-06 | |
| CVE-2026-28709 | 4.3 | MEDIUM | CWE-863 | 0.0% p10 | 3.01 | Unauthorized resource manipulation due to improper authorization checks. The fol...Unauthorized resource manipulation due to improper authorization checks. The following products are affected: Acronis Cyber Protect 17 (Linux, Windows) before build 41186. |
2026-03-06 | |
| CVE-2026-27778 | 8.7 | HIGH | CWE-307 | 0.1% p26 | 6.09 | The WebSocket Application Programming Interface lacks restrictions on the number...The WebSocket Application Programming Interface lacks restrictions on the number of authentication requests. This absence of rate limiting may allow an attacker to conduct denial-of-service attacks by suppressing or mis-routing legitimate charger telemetry, or conduct brute-force attacks to gain unauthorized access. |
2026-03-06 | |
| CVE-2026-27770 | 6.9 | MEDIUM | CWE-522 | 0.1% p22 | 4.83 | Charging station authentication identifiers are publicly accessible via web-base...Charging station authentication identifiers are publicly accessible via web-based mapping platforms. |
2026-03-06 | |
| CVE-2026-22552 | 9.3 | CRITICAL | CWE-306 | 0.2% p45 | 6.52 | WebSocket endpoints lack proper authentication mechanisms, enabling attackers to...WebSocket endpoints lack proper authentication mechanisms, enabling attackers to perform unauthorized station impersonation and manipulate data sent to the backend. An unauthenticated attacker can connect to the OCPP WebSocket endpoint using a known or discovered charging station identifier, then issue or receive OCPP commands as a legitimate charger. Given that no authentication is required, this can lead to privilege escalation, unauthorized control of charging infrastructure, and corruption of charging network data reported to the backend. |
2026-03-06 | |
| CVE-2025-30413 | 4.4 | MEDIUM | CWE-732 | 0.0% p3 | 3.08 | Credentials are not deleted from Acronis Agent after plan revocation. The follow...Credentials are not deleted from Acronis Agent after plan revocation. The following products are affected: Acronis Cyber Protect Cloud Agent (Linux, macOS, Windows) before build 40497, Acronis Cyber Protect 17 (Linux, macOS, Windows) before build 41186. |
2026-03-06 | |
| CVE-2025-11792 | 7.3 | HIGH | CWE-427 | 0.0% p3 | 5.11 | Local privilege escalation due to DLL hijacking vulnerability. The following pro...Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Protect Cloud Agent (Windows) before build 41124. |
2026-03-06 | |
| CVE-2025-11791 | 7.1 | HIGH | CWE-862 | 0.0% p2 | 4.97 | Sensitive information disclosure and manipulation due to insufficient authorizat...Sensitive information disclosure and manipulation due to insufficient authorization checks. The following products are affected: Acronis Cyber Protect 17 (Linux, macOS, Windows) before build 41186, Acronis Cyber Protect Cloud Agent (Linux, macOS, Windows) before build 41124. |
2026-03-06 | |
| CVE-2025-11790 | 4.4 | MEDIUM | CWE-732 | 0.0% p3 | 3.08 | Credentials are not deleted from Acronis Agent after plan revocation. The follow...Credentials are not deleted from Acronis Agent after plan revocation. The following products are affected: Acronis Cyber Protect Cloud Agent (Linux, macOS, Windows) before build 41124. |
2026-03-06 | |
| CVE-2026-26125 | 8.6 | HIGH | CWE-306 | 0.1% p27 | 6.02 | Payment Orchestrator Service Elevation of Privilege VulnerabilityPayment Orchestrator Service Elevation of Privilege Vulnerability |
2026-03-05 | |
| CVE-2026-26124 | 6.7 | MEDIUM | CWE-35 | 0.1% p29 | 4.69 | '.../...//' in Azure Compute Gallery allows an authorized attacker to elevate pr...'.../...//' in Azure Compute Gallery allows an authorized attacker to elevate privileges locally. |
2026-03-05 | |
| CVE-2026-26122 | 6.5 | MEDIUM | CWE-1188 | 0.5% p66 | 4.57 | Initialization of a resource with an insecure default in Azure Compute Gallery a...Initialization of a resource with an insecure default in Azure Compute Gallery allows an authorized attacker to disclose information over a network. |
2026-03-05 | |
| CVE-2026-23651 | 6.7 | MEDIUM | CWE-625 | 0.1% p21 | 4.69 | Permissive regular expression in Azure Compute Gallery allows an authorized atta...Permissive regular expression in Azure Compute Gallery allows an authorized attacker to elevate privileges locally. |
2026-03-05 | |
| CVE-2026-21536 | 9.8 | CRITICAL | CWE-434 | 0.4% p63 | 6.87 | Microsoft Devices Pricing Program Remote Code Execution VulnerabilityMicrosoft Devices Pricing Program Remote Code Execution Vulnerability |
2026-03-05 | |
| CVE-2026-3606 | 4.8 | MEDIUM | CWE-119 | 0.0% p6 | 3.36 | A vulnerability has been found in Ettercap 0.8.4-Garofalo. Affected by this vuln...A vulnerability has been found in Ettercap 0.8.4-Garofalo. Affected by this vulnerability is the function add_data_segment of the file src/ettercap/utils/etterfilter/ef_output.c of the component etterfilter. The manipulation leads to out-of-bounds read. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The project was informed of the problem early through an issue report but has not responded yet. |
2026-03-05 | |
| CVE-2026-2593 | 6.4 | MEDIUM | CWE-79 | 0.0% p11 | 4.48 | The Greenshift – animation and page builder blocks plugin for WordPress is vulne...The Greenshift – animation and page builder blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the `_gspb_post_css` post meta value and the `dynamicAttributes` block attribute in all versions up to, and including, 12.8.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-03-05 | |
| CVE-2026-29613 | 8.2 | HIGH | CWE-306 | 0.0% p13 | 5.74 | OpenClaw versions prior to 2026.2.12 contain a vulnerability in the BlueBubbles ...OpenClaw versions prior to 2026.2.12 contain a vulnerability in the BlueBubbles (optional plugin) webhook handler in which it authenticates requests based solely on loopback remoteAddress without validating forwarding headers, allowing bypass of configured webhook passwords. When the gateway operates behind a reverse proxy, unauthenticated remote attackers can inject arbitrary BlueBubbles message and reaction events by reaching the proxy endpoint. |
2026-03-05 | |
| CVE-2026-29612 | 6.8 | MEDIUM | CWE-770 | 0.1% p35 | 4.76 | OpenClaw versions prior to 2026.2.14 decode base64-backed media inputs into buff...OpenClaw versions prior to 2026.2.14 decode base64-backed media inputs into buffers before enforcing decoded-size budget limits, allowing attackers to trigger large memory allocations. Remote attackers can supply oversized base64 payloads to cause memory pressure and denial of service. |
2026-03-05 | |
| CVE-2026-29611 | 8.2 | HIGH | CWE-73 | 0.0% p12 | 5.74 | OpenClaw versions prior to 2026.2.14 contain a local file inclusion vulnerabilit...OpenClaw versions prior to 2026.2.14 contain a local file inclusion vulnerability in BlueBubbles extension (must be installed and enabled) media path handling that allows attackers to read arbitrary files from the local filesystem. The sendBlueBubblesMedia function fails to validate mediaPath parameters against an allowlist, enabling attackers to request sensitive files like /etc/passwd and exfiltrate them as media attachments. |
2026-03-05 | |
| CVE-2026-29610 | 7.7 | HIGH | CWE-427 | 0.1% p25 | 5.39 | OpenClaw versions prior to 2026.2.14 contain a command hijacking vulnerability t...OpenClaw versions prior to 2026.2.14 contain a command hijacking vulnerability that allows attackers to execute unintended binaries by manipulating PATH environment variables through node-host execution or project-local bootstrapping. Attackers with authenticated access to node-host execution surfaces or those running OpenClaw in attacker-controlled directories can place malicious executables in PATH to override allowlisted safe-bin commands and achieve arbitrary command execution. |
2026-03-05 | |
| CVE-2026-29609 | 8.7 | HIGH | CWE-770 | 0.2% p38 | 6.10 | OpenClaw versions prior to 2026.2.14 contain a denial of service vulnerability i...OpenClaw versions prior to 2026.2.14 contain a denial of service vulnerability in the fetchWithGuard function that allocates entire response payloads in memory before enforcing maxBytes limits. Remote attackers can trigger memory exhaustion by serving oversized responses without content-length headers to cause availability loss. |
2026-03-05 | |
| CVE-2026-29606 | 6.3 | MEDIUM | CWE-306 | 0.1% p16 | 4.41 | OpenClaw versions prior to 2026.2.14 contain a webhook signature-verification by...OpenClaw versions prior to 2026.2.14 contain a webhook signature-verification bypass in the voice-call extension that allows unauthenticated requests when the tunnel.allowNgrokFreeTierLoopbackBypass option is explicitly enabled. An external attacker can send forged requests to the publicly reachable webhook endpoint without a valid X-Twilio-Signature header, resulting in unauthorized webhook event handling and potential request flooding attacks. |
2026-03-05 | |
| CVE-2026-28486 | 6.8 | MEDIUM | CWE-22 | 0.0% p8 | 4.76 | OpenClaw versions 2026.1.16-2 prior to 2026.2.14 contain a path traversal vulner...OpenClaw versions 2026.1.16-2 prior to 2026.2.14 contain a path traversal vulnerability in archive extraction during installation commands that allows arbitrary file writes outside the intended directory. Attackers can craft malicious archives that, when extracted via skills install, hooks install, plugins install, or signal install commands, write files to arbitrary locations enabling persistence or code execution. |
2026-03-05 | |
| CVE-2026-28485 | 7.5 | HIGH | CWE-306 | 0.1% p30 | 5.25 | OpenClaw versions 2026.1.5 prior to 2026.2.12 fail to enforce mandatory authenti...OpenClaw versions 2026.1.5 prior to 2026.2.12 fail to enforce mandatory authentication on the /agent/act browser-control HTTP route, allowing unauthorized local callers to invoke privileged operations. Remote attackers on the local network or local processes can execute arbitrary browser-context actions and access sensitive in-session data by sending requests to unauthenticated endpoints. |
2026-03-05 | |
| CVE-2026-28484 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering...Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. |
2026-03-05 | |
| CVE-2026-28482 | 8.4 | HIGH | CWE-22 | 0.0% p7 | 5.88 | OpenClaw versions prior to 2026.2.12 construct transcript file paths using unsan...OpenClaw versions prior to 2026.2.12 construct transcript file paths using unsanitized sessionId parameters and sessionFile paths without enforcing directory containment. Authenticated attackers can exploit path traversal sequences like ../../etc/passwd in sessionId or sessionFile parameters to read or write arbitrary files outside the agent sessions directory. |
2026-03-05 | |
| CVE-2026-28481 | 5.9 | MEDIUM | CWE-201 | 0.0% p10 | 4.13 | OpenClaw versions 2026.1.30 and earlier, contain an information disclosure vulne...OpenClaw versions 2026.1.30 and earlier, contain an information disclosure vulnerability, patched in 2026.2.1, in the MS Teams attachment downloader (optional extension must be enabled) that leaks bearer tokens to allowlisted suffix domains. When retrying downloads after receiving 401 or 403 responses, the application sends Authorization bearer tokens to untrusted hosts matching the permissive suffix-based allowlist, enabling token theft. |
2026-03-05 | |
| CVE-2026-28480 | 6.9 | MEDIUM | CWE-290 | 0.0% p12 | 4.83 | OpenClaw versions prior to 2026.2.14 contain an authorization bypass vulnerabili...OpenClaw versions prior to 2026.2.14 contain an authorization bypass vulnerability where Telegram allowlist matching accepts mutable usernames instead of immutable numeric sender IDs. Attackers can spoof identity by obtaining recycled usernames to bypass allowlist restrictions and interact with bots as unauthorized senders. |
2026-03-05 | |
| CVE-2026-28479 | 8.7 | HIGH | CWE-327 | 0.0% p4 | 6.09 | OpenClaw versions prior to 2026.2.15 use SHA-1 to hash sandbox identifier cache ...OpenClaw versions prior to 2026.2.15 use SHA-1 to hash sandbox identifier cache keys for Docker and browser sandbox configurations, which is deprecated and vulnerable to collision attacks. An attacker can exploit SHA-1 collisions to cause cache poisoning, allowing one sandbox configuration to be misinterpreted as another and enabling unsafe sandbox state reuse. |
2026-03-05 | |
| CVE-2026-28478 | 8.7 | HIGH | CWE-770 | 0.1% p33 | 6.09 | OpenClaw versions prior to 2026.2.13 contain a denial of service vulnerability i...OpenClaw versions prior to 2026.2.13 contain a denial of service vulnerability in webhook handlers that buffer request bodies without strict byte or time limits. Remote unauthenticated attackers can send oversized JSON payloads or slow uploads to webhook endpoints causing memory pressure and availability degradation. |
2026-03-05 | |
| CVE-2026-28477 | 5.9 | MEDIUM | CWE-352 | 0.0% p4 | 4.13 | OpenClaw versions prior to 2026.2.14 contain an oauth state validation bypass vu...OpenClaw versions prior to 2026.2.14 contain an oauth state validation bypass vulnerability in the manual Chutes login flow that allows attackers to bypass CSRF protection. An attacker can convince a user to paste attacker-controlled OAuth callback data, enabling credential substitution and token persistence for unauthorized accounts. |
2026-03-05 | |
| CVE-2026-28476 | 6.3 | MEDIUM | CWE-918 | 0.1% p28 | 4.41 | OpenClaw versions prior to 2026.2.14 contain a server-side request forgery vulne...OpenClaw versions prior to 2026.2.14 contain a server-side request forgery vulnerability in the optional Tlon Urbit extension that accepts user-provided base URLs for authentication without proper validation. Attackers who can influence the configured Urbit URL can induce the gateway to make HTTP requests to arbitrary hosts including internal addresses. |
2026-03-05 | |
| CVE-2026-28475 | 6.3 | MEDIUM | CWE-208 | 0.1% p32 | 4.41 | OpenClaw versions prior to 2026.2.13 use non-constant-time string comparison for...OpenClaw versions prior to 2026.2.13 use non-constant-time string comparison for hook token validation, allowing attackers to infer tokens through timing measurements. Remote attackers with network access to the hooks endpoint can exploit timing side-channels across multiple requests to gradually recover the authentication token. |
2026-03-05 | |
| CVE-2026-28474 | 9.3 | CRITICAL | CWE-863 | 0.1% p20 | 6.51 | OpenClaw's Nextcloud Talk plugin versions prior to 2026.2.6 accept equality matc...OpenClaw's Nextcloud Talk plugin versions prior to 2026.2.6 accept equality matching on the mutable actor.name display name field for allowlist validation, allowing attackers to bypass DM and room allowlists. An attacker can change their Nextcloud display name to match an allowlisted user ID and gain unauthorized access to restricted conversations. |
2026-03-05 | |
| CVE-2026-28473 | 7.2 | HIGH | CWE-863 | 0.0% p14 | 5.04 | OpenClaw versions prior to 2026.2.2 contain an authorization bypass vulnerabilit...OpenClaw versions prior to 2026.2.2 contain an authorization bypass vulnerability where clients with operator.write scope can approve or deny exec approval requests by sending the /approve chat command. The /approve command path invokes exec.approval.resolve through an internal privileged gateway client, bypassing the operator.approvals permission check that protects direct RPC calls. |
2026-03-05 | |
| CVE-2026-28472 | 9.2 | CRITICAL | CWE-306 | 0.1% p18 | 6.44 | OpenClaw versions prior to 2026.2.2 contain a vulnerability in the gateway WebSo...OpenClaw versions prior to 2026.2.2 contain a vulnerability in the gateway WebSocket connect handshake in which it allows skipping device identity checks when auth.token is present but not validated. Attackers can connect to the gateway without providing device identity or pairing by exploiting the presence check instead of validation, potentially gaining operator access in vulnerable deployments. |
2026-03-05 | |
| CVE-2026-28471 | 6.3 | MEDIUM | CWE-287 | 0.0% p12 | 4.41 | OpenClaw version 2026.1.14-1 prior to 2026.2.2, with the Matrix plugin installed...OpenClaw version 2026.1.14-1 prior to 2026.2.2, with the Matrix plugin installed and enabled, contain a vulnerability in which DM allowlist matching could be bypassed by exact-matching against sender display names and localparts without homeserver validation. Remote Matrix users can impersonate allowed identities by using attacker-controlled display names or matching localparts from different homeservers to reach the routing and agent pipeline. |
2026-03-05 | |
| CVE-2026-28470 | 9.2 | CRITICAL | CWE-78 | 0.1% p27 | 6.44 | OpenClaw versions prior to 2026.2.2 contain an exec approvals (must be enabled) ...OpenClaw versions prior to 2026.2.2 contain an exec approvals (must be enabled) allowlist bypass vulnerability that allows attackers to execute arbitrary commands by injecting command substitution syntax. Attackers can bypass the allowlist protection by embedding unescaped $() or backticks inside double-quoted strings to execute unauthorized commands. |
2026-03-05 | |
| CVE-2026-28469 | 8.2 | HIGH | CWE-639 | 0.0% p12 | 5.74 | OpenClaw versions prior to 2026.2.14 contain a webhook routing vulnerability in ...OpenClaw versions prior to 2026.2.14 contain a webhook routing vulnerability in the Google Chat monitor component that allows cross-account policy context misrouting when multiple webhook targets share the same HTTP path. Attackers can exploit first-match request verification semantics to process inbound webhook events under incorrect account contexts, bypassing intended allowlists and session policies. |
2026-03-05 | |
| CVE-2026-28468 | 8.5 | HIGH | CWE-306 | 0.0% p7 | 5.95 | OpenClaw versions 2026.1.29-beta.1 prior to 2026.2.14 contain a vulnerability in...OpenClaw versions 2026.1.29-beta.1 prior to 2026.2.14 contain a vulnerability in the sandbox browser bridge server in which it accepts requests without requiring gateway authentication, allowing local attackers to access browser control endpoints. A local attacker can enumerate tabs, retrieve WebSocket URLs, execute JavaScript, and exfiltrate cookies and session data from authenticated browser contexts. |
2026-03-05 | |
| CVE-2026-28467 | 6.3 | MEDIUM | CWE-918 | 0.1% p17 | 4.41 | OpenClaw versions prior to 2026.2.2 contain a server-side request forgery vulner...OpenClaw versions prior to 2026.2.2 contain a server-side request forgery vulnerability in attachment and media URL hydration that allows remote attackers to fetch arbitrary HTTP(S) URLs. Attackers who can influence media URLs through model-controlled sendAttachment or auto-reply mechanisms can trigger SSRF to internal resources and exfiltrate fetched response bytes as outbound attachments. |
2026-03-05 | |
| CVE-2026-28466 | 9.4 | CRITICAL | CWE-863 | 0.1% p30 | 6.58 | OpenClaw versions prior to 2026.2.14 contain a vulnerability in the gateway in w...OpenClaw versions prior to 2026.2.14 contain a vulnerability in the gateway in which it fails to sanitize internal approval fields in node.invoke parameters, allowing authenticated clients to bypass exec approval gating for system.run commands. Attackers with valid gateway credentials can inject approval control fields to execute arbitrary commands on connected node hosts, potentially compromising developer workstations and CI runners. |
2026-03-05 | |
| CVE-2026-28465 | 8.2 | HIGH | CWE-290 | 0.2% p39 | 5.75 | OpenClaw's voice-call plugin versions before 2026.2.3 contain an improper authen...OpenClaw's voice-call plugin versions before 2026.2.3 contain an improper authentication vulnerability in webhook verification that allows remote attackers to bypass verification by supplying untrusted forwarded headers. Attackers can spoof webhook events by manipulating Forwarded or X-Forwarded-* headers in reverse-proxy configurations that implicitly trust these headers. |
2026-03-05 | |
| CVE-2026-28464 | 8.2 | HIGH | CWE-208 | 0.2% p41 | 5.75 | OpenClaw versions prior to 2026.2.12 use non-constant-time string comparison for...OpenClaw versions prior to 2026.2.12 use non-constant-time string comparison for hook token validation, allowing attackers to infer tokens through timing measurements. Remote attackers with network access to the hooks endpoint can exploit timing side-channels across multiple requests to gradually determine the authentication token. |
2026-03-05 | |
| CVE-2026-28463 | 8.6 | HIGH | CWE-78 | 0.0% p5 | 6.02 | OpenClaw versions prior to 2026.2.14 contain an arbitrary file read vulnerabilit...OpenClaw versions prior to 2026.2.14 contain an arbitrary file read vulnerability in the exec-approvals allowlist validation that checks pre-expansion argv tokens but executes using real shell expansion. Attackers with authorization or through prompt-injection attacks can exploit safe binaries like head, tail, or grep with glob patterns or environment variables to disclose files readable by the gateway or node process when host execution is enabled in allowlist mode. |
2026-03-05 | |
| CVE-2026-28462 | 8.7 | HIGH | CWE-22 | 0.1% p20 | 6.09 | OpenClaw versions prior to 2026.2.13 contain a vulnerability in the browser cont...OpenClaw versions prior to 2026.2.13 contain a vulnerability in the browser control API in which it accepts user-supplied output paths for trace and download files without consistently constraining writes to temporary directories. Attackers with API access can exploit path traversal in POST /trace/stop, POST /wait/download, and POST /download endpoints to write files outside intended temp roots. |
2026-03-05 | |
| CVE-2026-28459 | 7.1 | HIGH | CWE-73 | 0.1% p15 | 4.97 | OpenClaw versions prior to 2026.2.12 fail to validate the sessionFile path param...OpenClaw versions prior to 2026.2.12 fail to validate the sessionFile path parameter, allowing authenticated gateway clients to write transcript data to arbitrary locations on the host filesystem. Attackers can supply a sessionFile path outside the sessions directory to create files and append data repeatedly, potentially causing configuration corruption or denial of service. |
2026-03-05 | |
| CVE-2026-28458 | 7.4 | HIGH | CWE-306 | 0.1% p23 | 5.18 | OpenClaw version 2026.1.20 prior to 2026.2.1 contains a vulnerability in the Bro...OpenClaw version 2026.1.20 prior to 2026.2.1 contains a vulnerability in the Browser Relay (extension must be installed and enabled) /cdp WebSocket endpoint in which it does not require authentication tokens, allowing websites to connect via loopback and access sensitive data. Attackers can exploit this by connecting to ws://127.0.0.1:18792/cdp to steal session cookies and execute JavaScript in other browser tabs. |
2026-03-05 | |
| CVE-2026-28457 | 5.6 | MEDIUM | CWE-22 | 0.0% p8 | 3.92 | OpenClaw versions prior to 2026.2.14 contain a path traversal vulnerability in s...OpenClaw versions prior to 2026.2.14 contain a path traversal vulnerability in sandbox skill mirroring (must be enabled) that uses the skill frontmatter name parameter unsanitized when copying skills into the sandbox workspace. Attackers who provide a crafted skill package with traversal sequences like ../ or absolute paths in the name field can write files outside the sandbox workspace root directory. |
2026-03-05 | |
| CVE-2026-28456 | 8.6 | HIGH | CWE-427 | 0.1% p26 | 6.02 | OpenClaw versions 2026.1.5 prior to 2026.2.14 contain a vulnerability in the Gat...OpenClaw versions 2026.1.5 prior to 2026.2.14 contain a vulnerability in the Gateway in which it does not sufficiently constrain configured hook module paths before passing them to dynamic import(), allowing code execution. An attacker with gateway configuration modification access can load and execute unintended local modules in the Node.js process. |
2026-03-05 | |
| CVE-2026-28454 | 8.2 | HIGH | CWE-345 | 0.0% p11 | 5.74 | OpenClaw versions prior to 2026.2.2 fail to validate webhook secrets in Telegram...OpenClaw versions prior to 2026.2.2 fail to validate webhook secrets in Telegram webhook mode (must be enabled), allowing unauthenticated HTTP POST requests to the webhook endpoint that trust attacker-controlled JSON payloads. Remote attackers can forge Telegram updates by spoofing message.from.id and chat.id fields to bypass sender allowlists and execute privileged bot commands. |
2026-03-05 | |
| CVE-2026-28453 | 8.3 | HIGH | CWE-22 | 0.1% p25 | 5.81 | OpenClaw versions prior to 2026.2.14 fail to validate TAR archive entry paths du...OpenClaw versions prior to 2026.2.14 fail to validate TAR archive entry paths during extraction, allowing path traversal sequences to write files outside the intended directory. Attackers can craft malicious archives with traversal sequences like ../../ to write files outside extraction boundaries, potentially enabling configuration tampering and code execution. |
2026-03-05 | |
| CVE-2026-28452 | 6.7 | MEDIUM | CWE-770 | 0.2% p38 | 4.70 | OpenClaw versions prior to 2026.2.14 contain a denial of service vulnerability i...OpenClaw versions prior to 2026.2.14 contain a denial of service vulnerability in the extractArchive function within src/infra/archive.ts that allows attackers to consume excessive CPU, memory, and disk resources through high-expansion ZIP and TAR archives. Remote attackers can trigger resource exhaustion by providing maliciously crafted archive files during install or update operations, causing service degradation or system unavailability. |
2026-03-05 | |
| CVE-2026-28451 | 6.3 | MEDIUM | CWE-918 | 0.0% p12 | 4.41 | OpenClaw versions prior to 2026.2.14 contain server-side request forgery vulnera...OpenClaw versions prior to 2026.2.14 contain server-side request forgery vulnerabilities in the Feishu extension that allow attackers to fetch attacker-controlled remote URLs without SSRF protections via sendMediaFeishu function and markdown image processing. Attackers can influence tool calls through direct manipulation or prompt injection to trigger requests to internal services and re-upload responses as Feishu media. |
2026-03-05 | |
| CVE-2026-28450 | 8.3 | HIGH | CWE-306 | 0.1% p30 | 5.81 | OpenClaw versions prior to 2026.2.12 with the optional Nostr plugin enabled expo...OpenClaw versions prior to 2026.2.12 with the optional Nostr plugin enabled expose unauthenticated HTTP endpoints at /api/channels/nostr/:accountId/profile and /api/channels/nostr/:accountId/profile/import that allow reading and modifying Nostr profiles without gateway authentication. Remote attackers can exploit these endpoints to read sensitive profile data, modify Nostr profiles, persist malicious changes to gateway configuration, and publish signed Nostr events using the bot's private key when the gateway HTTP port is accessible beyond localhost. |
2026-03-05 | |
| CVE-2026-28448 | 6.3 | MEDIUM | CWE-285 | 0.1% p24 | 4.41 | OpenClaw versions 2026.1.29 prior to 2026.2.1 contain a vulnerability in the Twi...OpenClaw versions 2026.1.29 prior to 2026.2.1 contain a vulnerability in the Twitch plugin (must be installed and enabled) in which it fails to enforce the allowFrom allowlist when allowedRoles is unset or empty, allowing unauthorized Twitch users to trigger agent dispatch. Remote attackers can mention the bot in Twitch chat to bypass access control and invoke the agent pipeline, potentially causing unintended actions or resource exhaustion. |
2026-03-05 | |
| CVE-2026-28447 | 7.0 | HIGH | CWE-22 | 0.0% p8 | 4.90 | OpenClaw versions 2026.1.29-beta.1 prior to 2026.2.1 contain a path traversal vu...OpenClaw versions 2026.1.29-beta.1 prior to 2026.2.1 contain a path traversal vulnerability in plugin installation that allows malicious plugin package names to escape the extensions directory. Attackers can craft scoped package names containing path traversal sequences like .. to write files outside the intended installation directory when victims run the plugins install command. |
2026-03-05 | |
| CVE-2026-28446 | 9.2 | CRITICAL | NVD-CWE-noinfo | 1.0% p76 | 6.47 | OpenClaw versions prior to 2026.2.1 with the voice-call extension installed and ...OpenClaw versions prior to 2026.2.1 with the voice-call extension installed and enabled contain an authentication bypass vulnerability in inbound allowlist policy validation that accepts empty caller IDs and uses suffix-based matching instead of strict equality. Remote attackers can bypass inbound access controls by placing calls with missing caller IDs or numbers ending with allowlisted digits to reach the voice-call agent and execute tools. |
2026-03-05 | |
| CVE-2026-28395 | 6.3 | MEDIUM | CWE-1327 | 0.2% p41 | 4.42 | OpenClaw version 2026.1.14-1 prior to 2026.2.12 contain an improper network bind...OpenClaw version 2026.1.14-1 prior to 2026.2.12 contain an improper network binding vulnerability in the Chrome extension (must be installed and enabled) relay server that treats wildcard hosts as loopback addresses, allowing the relay HTTP/WS server to bind to all interfaces when a wildcard cdpUrl is configured. Remote attackers can access relay HTTP endpoints off-host to leak service presence and port information, or conduct denial-of-service and brute-force attacks against the relay token header. |
2026-03-05 | |
| CVE-2026-28394 | 6.9 | MEDIUM | CWE-770 | 0.2% p45 | 4.84 | OpenClaw versions prior to 2026.2.15 contain a denial of service vulnerability i...OpenClaw versions prior to 2026.2.15 contain a denial of service vulnerability in the web_fetch tool that allows attackers to crash the Gateway process through memory exhaustion by parsing oversized or deeply nested HTML responses. Remote attackers can social-engineer users into fetching malicious URLs with pathological HTML structures to exhaust server memory and cause service unavailability. |
2026-03-05 | |
| CVE-2026-28393 | 8.3 | HIGH | CWE-22 | 0.1% p28 | 5.81 | OpenClaw versions 2.0.0-beta3 prior to 2026.2.14 contain a path traversal vulner...OpenClaw versions 2.0.0-beta3 prior to 2026.2.14 contain a path traversal vulnerability in hook transform module loading that allows arbitrary JavaScript execution. The hooks.mappings[].transform.module parameter accepts absolute paths and traversal sequences, enabling attackers with configuration write access to load and execute malicious modules with gateway process privileges. |
2026-03-05 | |
| CVE-2026-28392 | 8.2 | HIGH | CWE-863 | 0.0% p13 | 5.74 | OpenClaw versions prior to 2026.2.14 contain a privilege escalation vulnerabilit...OpenClaw versions prior to 2026.2.14 contain a privilege escalation vulnerability in the Slack slash-command handler that incorrectly authorizes any direct message sender when dmPolicy is set to open (must be configured). Attackers can execute privileged slash commands via direct message to bypass allowlist and access-group restrictions. |
2026-03-05 | |
| CVE-2026-28391 | 9.2 | CRITICAL | CWE-78 | 0.1% p23 | 6.44 | OpenClaw versions prior to 2026.2.2 fail to properly validate Windows cmd.exe me...OpenClaw versions prior to 2026.2.2 fail to properly validate Windows cmd.exe metacharacters in allowlist-gated exec requests (non-default configuration), allowing attackers to bypass command approval restrictions. Remote attackers can craft command strings with shell metacharacters like & or %...% to execute unapproved commands beyond the allowlisted operations. |
2026-03-05 | |
| CVE-2026-29188 | 9.1 | CRITICAL | CWE-284 | 0.0% p6 | 6.37 | File Browser provides a file managing interface within a specified directory and...File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. Prior to version 2.61.1, a broken access control vulnerability in the TUS protocol DELETE endpoint allows authenticated users with only Create permission to delete arbitrary files and directories within their scope, bypassing the intended Delete permission restriction. Any multi-user deployment where administrators explicitly restrict file deletion for certain users is affected. This issue has been patched in version 2.61.1. |
2026-03-05 | |
| CVE-2026-29081 | 6.5 | MEDIUM | CWE-89 | 0.0% p12 | 4.55 | Frappe is a full-stack web application framework. Prior to versions 14.100.1 and...Frappe is a full-stack web application framework. Prior to versions 14.100.1 and 15.100.0, an endpoint was vulnerable to SQL injection through specially crafted requests, which would allow a malicious actor to extract sensitive information. This issue has been patched in versions 14.100.1 and 15.100.0. |
2026-03-05 | |
| CVE-2026-29077 | 7.1 | HIGH | CWE-284 | 0.1% p18 | 4.97 | Frappe is a full-stack web application framework. Prior to versions 15.98.0 and ...Frappe is a full-stack web application framework. Prior to versions 15.98.0 and 14.100.0, due to a lack of validation when sharing documents, a user could share a document with a permission that they themselves didn't have. This issue has been patched in versions 15.98.0 and 14.100.0. |
2026-03-05 | |
| CVE-2026-28492 | 7.1 | HIGH | CWE-200 | 0.0% p12 | 4.97 | File Browser provides a file managing interface within a specified directory and...File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. Prior to version 2.61.0, when a user creates a public share link for a directory, the withHashFile middleware in http/public.go uses filepath.Dir(link.Path) to compute the BasePathFs root. This sets the filesystem root to the parent directory instead of the shared directory itself, allowing anyone with the share link to browse and download files from all sibling directories. This issue has been patched in version 2.61.0. |
2026-03-05 | |
| CVE-2026-28443 | 6.9 | MEDIUM | CWE-89 | 0.0% p11 | 4.83 | OpenReplay is a self-hosted session replay suite. Prior to version 1.20.0, the P...OpenReplay is a self-hosted session replay suite. Prior to version 1.20.0, the POST /{projectId}/cards/search endpoint has a SQL injection in the sort.field parameter. This issue has been patched in version 1.20.0. |
2026-03-05 | |
| CVE-2026-28442 | 8.5 | HIGH | CWE-73 | 0.1% p18 | 5.95 | ZimaOS is a fork of CasaOS, an operating system for Zima devices and x86-64 syst...ZimaOS is a fork of CasaOS, an operating system for Zima devices and x86-64 systems with UEFI. In version 1.5.2-beta3, users are restricted from deleting internal system files or folders through the application interface. However, when interacting directly with the API, these restrictions can be bypassed. By altering the path parameter in the delete request, internal OS files and directories can be removed successfully. The backend processes these manipulated requests without validating whether the targeted path belongs to restricted system locations. This demonstrates improper input validation and broken access control on sensitive filesystem operations. No known public patch is available. |
2026-03-05 | |
| CVE-2026-28436 | 5.3 | MEDIUM | CWE-79 | 0.0% p13 | 3.71 | Frappe is a full-stack web application framework. Prior to versions 16.11.0 and ...Frappe is a full-stack web application framework. Prior to versions 16.11.0 and 15.102.0, an attacker can set a crafted image URL that results in XSS when the avatar is displayed, and it can be triggered for other users via website page comments. This issue has been patched in versions 16.11.0 and 15.102.0. |
2026-03-05 | |
| CVE-2026-28413 | 5.3 | MEDIUM | CWE-601 | 0.0% p1 | 3.71 | Products.isurlinportal is a replacement for isURLInPortal method in Plone. Prior...Products.isurlinportal is a replacement for isURLInPortal method in Plone. Prior to versions 2.1.0, 3.1.0, and 4.0.0, a url /login?came_from=////evil.example may redirect to an external website after login. This issue has been patched in versions 2.1.0, 3.1.0, and 4.0.0. |
2026-03-05 | |
| CVE-2026-28410 | 5.3 | MEDIUM | CWE-284 | 0.0% p11 | 3.71 | The Graph is an indexing protocol for querying networks like Ethereum, IPFS, Pol...The Graph is an indexing protocol for querying networks like Ethereum, IPFS, Polygon, and other blockchains. Prior to version 3.0.0, a flaw in the token vesting contracts allows users to access tokens that should still be locked according to their vesting schedule. This issue has been patched in version 3.0.0. |
2026-03-05 | |
| CVE-2026-28405 | 8.0 | HIGH | CWE-79 | 0.0% p11 | 5.60 | MarkUs is a web application for the submission and grading of student assignment...MarkUs is a web application for the submission and grading of student assignments. Prior to version 2.9.1, the courses/<:course_id>/assignments/<:assignment_id>/submissions/html_content route reads the contents of a student-submitted file and renders them without sanitization. This issue has been patched in version 2.9.1. |
2026-03-05 | |
| CVE-2026-22723 | 6.5 | MEDIUM | NVD-CWE-noinfo | 0.1% p17 | 4.55 | Inappropriate user token revocation due to a logic error in the token revocation...Inappropriate user token revocation due to a logic error in the token revocation endpoint implementation in Cloudfoundry UAA v77.30.0 to v78.7.0 and in Cloudfoundry Deployment v48.7.0 to v54.10.0. |
2026-03-05 | |
| CVE-2026-0848 | 10.0 | CRITICAL | CWE-20 | 0.5% p66 | 7.02 | NLTK versions <=3.9.2 are vulnerable to arbitrary code execution due to improper...NLTK versions <=3.9.2 are vulnerable to arbitrary code execution due to improper input validation in the StanfordSegmenter module. The module dynamically loads external Java .jar files without verification or sandboxing. An attacker can supply or replace the JAR file, enabling the execution of arbitrary Java bytecode at import time. This vulnerability can be exploited through methods such as model poisoning, MITM attacks, or dependency poisoning, leading to remote code execution. The issue arises from the direct execution of the JAR file via subprocess with unvalidated classpath input, allowing malicious classes to execute when loaded by the JVM. |
2026-03-05 | |
| CVE-2025-70995 | 8.8 | HIGH | CWE-94 | 0.4% p62 | 6.17 | An issue in Aranda Service Desk Web Edition (ASDK API 8.6) allows authenticated ...An issue in Aranda Service Desk Web Edition (ASDK API 8.6) allows authenticated attackers to achieve remote code execution due to improper validation of uploaded files. An authenticated user can upload a crafted web.config file by sending a crafted POST request to /ASDKAPI/api/v8.6/item/addfile, which is processed by the ASP.NET runtime. The uploaded configuration file alters the execution context of the upload directory, enabling compilation and execution of attacker-controlled code (e.g., generation of an .aspx webshell). This allows remote command execution on the server without user interaction beyond authentication, impacting both On-Premise and SaaS deployments. The vendor has fixed the issue in Aranda Service Desk V8 8.30.6. |
2026-03-05 | |
| CVE-2025-70949 | 7.5 | HIGH | CWE-208 | 0.0% p2 | 5.25 | An observable timing discrepancy in @perfood/couch-auth v0.26.0 allows attackers...An observable timing discrepancy in @perfood/couch-auth v0.26.0 allows attackers to access sensitive information via a timing side-channel. |
2026-03-05 | |
| CVE-2025-70948 | 9.3 | CRITICAL | CWE-644 | 0.0% p1 | 6.51 | A host header injection vulnerability in the mailer component of @perfood/couch-...A host header injection vulnerability in the mailer component of @perfood/couch-auth v0.26.0 allows attackers to obtain reset tokens and execute an account takeover via spoofing the HTTP Host header. |
2026-03-05 | |
| CVE-2025-70614 | 8.1 | HIGH | CWE-284 | 0.0% p10 | 5.67 | OpenCode Systems OC Messaging / USSD Gateway OC Release 6.32.2 contains a broken...OpenCode Systems OC Messaging / USSD Gateway OC Release 6.32.2 contains a broken access control vulnerability in the web-based control panel allowing authenticated low-privileged attackers to gain to access to arbitrary SMS messages via a crafted company or tenant identifier parameter. |
2026-03-05 | |
| CVE-2025-55208 | 9.0 | CRITICAL | CWE-79 | 0.1% p17 | 6.30 | Chamilo is a learning management system. Versions prior to 1.11.34 have a Stored...Chamilo is a learning management system. Versions prior to 1.11.34 have a Stored XSS through insecure file uploads in `Social Networks`. Through it, a low-privilege user can execute arbitrary code in the admin user inbox, allowing takeover of the admin account. Version 1.11.34 fixes the issue. |
2026-03-05 | |
| CVE-2026-28790 | 7.5 | HIGH | CWE-284 | 0.1% p24 | 5.25 | OliveTin gives access to predefined shell commands from a web interface. Prior t...OliveTin gives access to predefined shell commands from a web interface. Prior to version 3000.11.0, OliveTin allows an unauthenticated guest to terminate running actions through KillAction even when authRequireGuestsToLogin: true is enabled. Guests are correctly blocked from dashboard access, but can still call the KillAction RPC directly and successfully stop a running action. This is a broken access control issue that causes unauthorized denial of service against legitimate action executions. This issue has been patched in version 3000.11.0. |
2026-03-05 | |
| CVE-2026-28789 | 7.5 | HIGH | CWE-362 | 0.1% p34 | 5.25 | OliveTin gives access to predefined shell commands from a web interface. Prior t...OliveTin gives access to predefined shell commands from a web interface. Prior to version 3000.10.3, an unauthenticated denial-of-service vulnerability exists in OliveTin’s OAuth2 login flow. Concurrent requests to /oauth/login can trigger unsynchronized access to a shared registeredStates map, causing a Go runtime panic (fatal error: concurrent map writes) and process termination. This allows remote attackers to crash the service when OAuth2 is enabled. This issue has been patched in version 3000.10.3. |
2026-03-05 | |
| CVE-2026-28353 | 10.0 | CRITICAL | CWE-506 | 0.1% p19 | 7.00 | Trivy Vulnerability Scanner is a VS Code extension that helps find vulnerabiliti...Trivy Vulnerability Scanner is a VS Code extension that helps find vulnerabilities. In Trivy VSCode Extension version 1.8.12, which was distributed via OpenVSX marketplace was compromised and contained malicious code designed to leverage local AI coding agent to collect and exfiltrate sensitive information. Users using the affected artifact are advised to immediately remove it and rotate environment secrets. The malicious artifact has been removed from the marketplace. No other affected artifacts have been identified. |
2026-03-05 | |
| CVE-2026-28350 | 6.1 | MEDIUM | CWE-116 | 0.0% p1 | 4.27 | lxml_html_clean is a project for HTML cleaning functionalities copied from `lxml...lxml_html_clean is a project for HTML cleaning functionalities copied from `lxml.html.clean`. Prior to version 0.4.4, the <base> tag passes through the default Cleaner configuration. While page_structure=True removes html, head, and title tags, there is no specific handling for <base>, allowing an attacker to inject it and hijack relative links on the page. This issue has been patched in version 0.4.4. |
2026-03-05 | |
| CVE-2026-28348 | 6.1 | MEDIUM | CWE-116 | 0.0% p9 | 4.27 | lxml_html_clean is a project for HTML cleaning functionalities copied from `lxml...lxml_html_clean is a project for HTML cleaning functionalities copied from `lxml.html.clean`. Prior to version 0.4.4, the _has_sneaky_javascript() method strips backslashes before checking for dangerous CSS keywords. This causes CSS Unicode escape sequences to bypass the @import and expression() filters, allowing external CSS loading or XSS in older browsers. This issue has been patched in version 0.4.4. |
2026-03-05 | |
| CVE-2026-28343 | 6.4 | MEDIUM | CWE-79 | 0.0% p12 | 4.48 | CKEditor 5 is a modern JavaScript rich-text editor with an MVC architecture. Sta...CKEditor 5 is a modern JavaScript rich-text editor with an MVC architecture. Starting in version 29.0.0 and prior to version 47.6.0, a cross-site scripting (XSS) vulnerability has been discovered in the General HTML Support feature. This vulnerability could be triggered by inserting specially crafted markup, leading to unauthorized JavaScript code execution, if the editor instance used an unsafe General HTML Support configuration. This issue has been patched in version 47.6.0. |
2026-03-05 | |
| CVE-2026-28342 | 7.5 | HIGH | CWE-400 | 0.4% p62 | 5.26 | OliveTin gives access to predefined shell commands from a web interface. Prior t...OliveTin gives access to predefined shell commands from a web interface. Prior to version 3000.10.2, the PasswordHash API endpoint allows unauthenticated users to trigger excessive memory allocation by sending concurrent password hashing requests. By issuing multiple parallel requests, an attacker can exhaust available container memory, leading to service degradation or complete denial of service (DoS). The issue occurs because the endpoint performs computationally and memory-intensive hashing operations without request throttling, authentication requirements, or resource limits. This issue has been patched in version 3000.10.2. |
2026-03-05 | |
| CVE-2026-28277 | 6.8 | MEDIUM | CWE-502 | 0.0% p10 | 4.76 | LangGraph SQLite Checkpoint is an implementation of LangGraph CheckpointSaver th...LangGraph SQLite Checkpoint is an implementation of LangGraph CheckpointSaver that uses SQLite DB (both sync and async, via aiosqlite). In version 1.0.9 and prior, LangGraph checkpointers can load msgpack-encoded checkpoints that reconstruct Python objects during deserialization. If an attacker can modify checkpoint data in the backing store (for example, after a database compromise or other privileged write access to the persistence layer), they can potentially supply a crafted payload that triggers unsafe object reconstruction when the checkpoint is loaded. No known patch is public. |
2026-03-05 | |
| CVE-2026-28223 | 6.1 | MEDIUM | CWE-79 | 0.0% p11 | 4.27 | Wagtail is an open source content management system built on Django. Prior to ve...Wagtail is an open source content management system built on Django. Prior to versions 6.3.8, 7.0.6, 7.2.3, and 7.3.1, a stored cross-site scripting (XSS) vulnerability exists on confirmation messages within the wagtail.contrib.simple_translation module. A user with access to the Wagtail admin area may create a page with a specially-crafted title which, when another user performs the "Translate" action, causes arbitrary JavaScript code to run. This could lead to performing actions with that user's credentials. The vulnerability is not exploitable by an ordinary site visitor without access to the Wagtail admin. This issue has been patched in versions 6.3.8, 7.0.6, 7.2.3, and 7.3.1. |
2026-03-05 | |
| CVE-2026-28222 | 6.1 | MEDIUM | CWE-79 | 0.1% p26 | 4.27 | Wagtail is an open source content management system built on Django. Prior to ve...Wagtail is an open source content management system built on Django. Prior to versions 6.3.8, 7.0.6, 7.2.3, and 7.3.1, a stored cross-site scripting (XSS) vulnerability exists on rendering TableBlock blocks within a StreamField. A user with access to create or edit pages containing TableBlock StreamField blocks is able to set specially-crafted class attributes on the block which run arbitrary JavaScript code when the page is viewed. When viewed by a user with higher privileges, this could lead to performing actions with that user's credentials. The vulnerability is not exploitable by an ordinary site visitor without access to the Wagtail admin, and only affects sites using TableBlock. This issue has been patched in versions 6.3.8, 7.0.6, 7.2.3, and 7.3.1. |
2026-03-05 | |
| CVE-2025-29165 | 9.8 | CRITICAL | CWE-269 | 0.0% p5 | 6.86 | An issue in D-Link DIR-1253 MESH V1.6.1684 allows an attacker to escalate privil...An issue in D-Link DIR-1253 MESH V1.6.1684 allows an attacker to escalate privileges via the etc/shadow.sample component |
2026-03-05 | |
| CVE-2025-13350 | 7.1 | HIGH | CWE-416 | 0.0% p0 | 4.97 | Ubuntu Linux 6.8 GA retains the legacy AF_UNIX garbage collector but backports u...Ubuntu Linux 6.8 GA retains the legacy AF_UNIX garbage collector but backports upstream commit 8594d9b85c07 ("af_unix: Don’t call skb_get() for OOB skb"). When orphaned MSG_OOB sockets hit unix_gc(), the garbage collector still calls kfree_skb() as if OOB SKBs held two references; on Ubuntu Linux 6.8 (Noble Numbat) kernel tree, they have only the queue reference, so the buffer is freed while still reachable and subsequent queue walks dereference freed memory, yielding a reliable local privilege escalation (LPE) caused by a use-after-free (UAF). Ubuntu builds that have already taken the new GC stack from commit 4090fa373f0e, and mainline Linux kernels shipping that infrastructure are unaffected because they no longer execute the legacy collector path. This issue affects Ubuntu Linux from 6.8.0-56.58 before 6.8.0-84.84. |
2026-03-05 | |
| CVE-2024-43035 | 5.8 | MEDIUM | CWE-24 | 0.3% p56 | 4.07 | Fonoster 0.5.5 before 0.6.1 allows ../ directory traversal to read arbitrary fil...Fonoster 0.5.5 before 0.6.1 allows ../ directory traversal to read arbitrary files via the /sounds/:file or /tts/:file VoiceServer endpoint. This occurs in serveFiles in mods/voice/src/utils.ts. NOTE: serveFiles exists in 0.5.5 but not in the next release, 0.6.1. |
2026-03-05 | |
| CVE-2026-3459 | 8.1 | HIGH | CWE-434 | 0.2% p39 | 5.68 | The Drag and Drop Multiple File Upload - Contact Form 7 plugin for WordPress is ...The Drag and Drop Multiple File Upload - Contact Form 7 plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in the 'dnd_upload_cf7_upload' function in versions up to, and including, 1.3.7.3. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. This can be exploited if the form includes a multiple file upload field with ‘*’ as the accepted file type. |
2026-03-05 | |
| CVE-2026-3047 | 8.8 | HIGH | CWE-305 | 0.5% p66 | 6.18 | A flaw was found in org.keycloak.broker.saml. When a disabled Security Assertion...A flaw was found in org.keycloak.broker.saml. When a disabled Security Assertion Markup Language (SAML) client is configured as an Identity Provider (IdP)-initiated broker landing target, it can still complete the login process and establish a Single Sign-On (SSO) session. This allows a remote attacker to gain unauthorized access to other enabled clients without re-authentication, effectively bypassing security restrictions. |
2026-03-05 | |
| CVE-2026-3009 | 8.1 | HIGH | CWE-863 | 0.0% p8 | 5.67 | A security flaw in the IdentityBrokerService.performLogin endpoint of Keycloak a...A security flaw in the IdentityBrokerService.performLogin endpoint of Keycloak allows authentication to proceed using an Identity Provider (IdP) even after it has been disabled by an administrator. An attacker who knows the IdP alias can reuse a previously generated login request to bypass the administrative restriction. This undermines access control enforcement and may allow unauthorized authentication through a disabled external provider. |
2026-03-05 | |
| CVE-2026-29054 | 7.5 | HIGH | CWE-178 | 0.0% p2 | 5.25 | Traefik is an HTTP reverse proxy and load balancer. From version 2.11.9 to 2.11....Traefik is an HTTP reverse proxy and load balancer. From version 2.11.9 to 2.11.37 and from version 3.1.3 to 3.6.8, there is a potential vulnerability in Traefik managing the Connection header with X-Forwarded headers. When Traefik processes HTTP/1.1 requests, the protection put in place to prevent the removal of Traefik-managed X-Forwarded headers (such as X-Real-Ip, X-Forwarded-Host, X-Forwarded-Port, etc.) via the Connection header does not handle case sensitivity correctly. The Connection tokens are compared case-sensitively against the protected header names, but the actual header deletion operates case-insensitively. As a result, a remote unauthenticated client can use lowercase Connection tokens (e.g. Connection: x-real-ip) to bypass the protection and trigger the removal of Traefik-managed forwarded identity headers. This issue has been patched in versions 2.11.38 and 3.6.9. |
2026-03-05 | |
| CVE-2026-28287 | 8.6 | HIGH | CWE-78 | 0.1% p33 | 6.02 | FreePBX is an open source IP PBX. From versions 16.0.17.2 to before 16.0.20 and ...FreePBX is an open source IP PBX. From versions 16.0.17.2 to before 16.0.20 and from version 17.0.2.4 to before 17.0.5, multiple command injection vulnerabilities exist in the recordings module. This issue has been patched in versions 16.0.20 and 17.0.5. |
2026-03-05 | |
| CVE-2026-28284 | 8.6 | HIGH | CWE-89 | 0.0% p10 | 6.02 | FreePBX is an open source IP PBX. Prior to versions 16.0.10 and 17.0.5, the Free...FreePBX is an open source IP PBX. Prior to versions 16.0.10 and 17.0.5, the FreePBX logfiles module contains several authenticated SQL injection vulnerabilities. This issue has been patched in versions 16.0.10 and 17.0.5. |
2026-03-05 | |
| CVE-2026-28210 | 8.6 | HIGH | CWE-89 | 0.1% p19 | 6.02 | FreePBX is an open source IP PBX. Prior to versions 16.0.49 and 17.0.7, FreePBX ...FreePBX is an open source IP PBX. Prior to versions 16.0.49 and 17.0.7, FreePBX module cdr (Call Data Record) is vulnerable to SQL query injection. This issue has been patched in versions 16.0.49 and 17.0.7. |
2026-03-05 | |
| CVE-2026-28209 | 7.5 | HIGH | CWE-78 | 0.2% p35 | 5.25 | FreePBX is an open source IP PBX. From versions 16.0.17.2 to before 16.0.20 and ...FreePBX is an open source IP PBX. From versions 16.0.17.2 to before 16.0.20 and from version 17.0.2.4 to before 17.0.5, a command injection vulnerability exists in FreePBX when using the ElevenLabs Text-to-Speech (TTS) engine in the recordings module. This issue has been patched in versions 16.0.20 and 17.0.5. |
2026-03-05 | |
| CVE-2026-27944 | 9.8 | CRITICAL | CWE-306 | 3.6% p87 | 6.97 | Nginx UI is a web user interface for the Nginx web server. Prior to version 2.3....Nginx UI is a web user interface for the Nginx web server. Prior to version 2.3.3, the /api/backup endpoint is accessible without authentication and discloses the encryption keys required to decrypt the backup in the X-Backup-Security response header. This allows an unauthenticated attacker to download a full system backup containing sensitive data (user credentials, session tokens, SSL private keys, Nginx configurations) and decrypt it immediately. This issue has been patched in version 2.3.3. |
2026-03-05 | |
| CVE-2026-27723 | 4.3 | MEDIUM | CWE-284 | 0.0% p10 | 3.01 | OpenProject is an open-source, web-based project management software. Prior to v...OpenProject is an open-source, web-based project management software. Prior to versions 17.0.5 and 17.1.2, an attacker can create wiki pages belonging to unpermitted projects through an improperly authenticated request. This issue has been patched in versions 17.0.5 and 17.1.2. |
2026-03-05 | |
| CVE-2026-27023 | 5.0 | MEDIUM | CWE-918 | 0.0% p10 | 3.50 | Twenty is an open source CRM. Prior to version 1.18, the SSRF protection in Secu...Twenty is an open source CRM. Prior to version 1.18, the SSRF protection in SecureHttpClientService validated request URLs at the request level but did not validate redirect targets. An authenticated user who could control outbound request URLs (e.g., webhook endpoints, image URLs) could bypass private IP blocking by redirecting through an attacker-controlled server. This issue has been patched in version 1.18. |
2026-03-05 | |
| CVE-2026-26999 | 7.5 | HIGH | CWE-400 | 0.0% p4 | 5.25 | Traefik is an HTTP reverse proxy and load balancer. Prior to versions 2.11.38 an...Traefik is an HTTP reverse proxy and load balancer. Prior to versions 2.11.38 and 3.6.9, there is a potential vulnerability in Traefik managing TLS handshake on TCP routers. When Traefik processes a TLS connection on a TCP router, the read deadline used to bound protocol sniffing is cleared before the TLS handshake is completed. When a TLS handshake read error occurs, the code attempts a second handshake with different connection parameters, silently ignoring the initial error. A remote unauthenticated client can exploit this by sending an incomplete TLS record and stopping further data transmission, causing the TLS handshake to stall indefinitely and holding connections open. By opening many such stalled connections in parallel, an attacker can exhaust file descriptors and goroutines, degrading availability of all services on the affected entrypoint. This issue has been patched in versions 2.11.38 and 3.6.9. |
2026-03-05 | |
| CVE-2026-26998 | 4.4 | MEDIUM | CWE-770 | 0.0% p11 | 3.08 | Traefik is an HTTP reverse proxy and load balancer. Prior to versions 2.11.38 an...Traefik is an HTTP reverse proxy and load balancer. Prior to versions 2.11.38 and 3.6.9, there is a potential vulnerability in Traefik managing the ForwardAuth middleware responses. When Traefik is configured to use the ForwardAuth middleware, the response body from the authentication server is read entirely into memory without any size limit. There is no maxResponseBodySize configuration to restrict the amount of data read from the authentication server response. If the authentication server returns an unexpectedly large or unbounded response body, Traefik will allocate unlimited memory, potentially causing an out-of-memory (OOM) condition that crashes the process. This results in a denial of service for all routes served by the affected Traefik instance. This issue has been patched in versions 2.11.38 and 3.6.9. |
2026-03-05 | |
| CVE-2026-26418 | 7.5 | HIGH | CWE-284 | 0.1% p34 | 5.25 | Missing authentication and authorization in the web API of Tata Consultancy Serv...Missing authentication and authorization in the web API of Tata Consultancy Services Cognix Recon Client v3.0 allows remote attackers to access application functionality without restriction via the network. |
2026-03-05 | |
| CVE-2026-26417 | 8.1 | HIGH | CWE-284 | 0.0% p10 | 5.67 | A broken access control vulnerability in the password reset functionality of Tat...A broken access control vulnerability in the password reset functionality of Tata Consultancy Services Cognix Recon Client v3.0 allows authenticated users to reset passwords of arbitrary user accounts via crafted requests. |
2026-03-05 | |
| CVE-2026-26416 | 8.8 | HIGH | CWE-269 | 0.0% p13 | 6.16 | An authorization bypass vulnerability in Tata Consultancy Services Cognix Recon ...An authorization bypass vulnerability in Tata Consultancy Services Cognix Recon Client v3.0 allows authenticated users to escalate privileges across role boundaries via crafted requests. |
2026-03-05 | |
| CVE-2026-26276 | 7.3 | HIGH | CWE-79 | 0.0% p10 | 5.11 | Gogs is an open source self-hosted Git service. Prior to version 0.14.2, an atta...Gogs is an open source self-hosted Git service. Prior to version 0.14.2, an attacker can store an HTML/JavaScript payload in a repository’s Milestone name, and when another user selects that Milestone on the New Issue page (/issues/new), a DOM-Based XSS is triggered. This issue has been patched in version 0.14.2. |
2026-03-05 | |
| CVE-2026-26196 | 6.9 | MEDIUM | CWE-598 | 0.0% p13 | 4.83 | Gogs is an open source self-hosted Git service. Prior to version 0.14.2, gogs ap...Gogs is an open source self-hosted Git service. Prior to version 0.14.2, gogs api still accepts tokens in url params like token and access_token, which can leak through logs, browser history, and referrers. This issue has been patched in version 0.14.2. |
2026-03-05 | |
| CVE-2026-26195 | 6.9 | MEDIUM | CWE-79 | 0.0% p10 | 4.83 | Gogs is an open source self-hosted Git service. Prior to version 0.14.2, stored ...Gogs is an open source self-hosted Git service. Prior to version 0.14.2, stored xss is still possible through unsafe template rendering that mixes user input with safe plus permissive sanitizer handling of data urls. This issue has been patched in version 0.14.2. |
2026-03-05 | |
| CVE-2026-26194 | 8.8 | HIGH | CWE-88 | 0.0% p13 | 6.16 | Gogs is an open source self-hosted Git service. Prior to version 0.14.2, there's...Gogs is an open source self-hosted Git service. Prior to version 0.14.2, there's a security issue in gogs where deleting a release can fail if a user controlled tag name is passed to git without the right separator, this lets git options get injected and mess with the process. This issue has been patched in version 0.14.2. |
2026-03-05 | |
| CVE-2026-26022 | 8.7 | HIGH | CWE-79 | 0.0% p3 | 6.09 | Gogs is an open source self-hosted Git service. Prior to version 0.14.2, a store...Gogs is an open source self-hosted Git service. Prior to version 0.14.2, a stored cross-site scripting (XSS) vulnerability exists in the comment and issue description functionality. The application's HTML sanitizer explicitly allows data: URI schemes, enabling authenticated users to inject arbitrary JavaScript execution via malicious links. This issue has been patched in version 0.14.2. |
2026-03-05 | |
| CVE-2026-25921 | 9.3 | CRITICAL | CWE-345 | 0.0% p6 | 6.51 | Gogs is an open source self-hosted Git service. Prior to version 0.14.2, overwri...Gogs is an open source self-hosted Git service. Prior to version 0.14.2, overwritable LFS object across different repos leads to supply-chain attack, all LFS objects are vulnerable to be maliciously overwritten by malicious attackers. This issue has been patched in version 0.14.2. |
2026-03-05 | |
| CVE-2026-24457 | 9.1 | CRITICAL | CWE-22 | 0.3% p51 | 6.38 | An unsafe parsing of OpenMQ's configuration, allows a remote attacker to read ar...An unsafe parsing of OpenMQ's configuration, allows a remote attacker to read arbitrary files from a MQ Broker's server. A full exploitation could read unauthorized files of the OpenMQ’s host OS. In some scenarios RCE could be achieved. |
2026-03-05 | |
| CVE-2025-70616 | 7.8 | HIGH | CWE-121 | 0.0% p2 | 5.46 | A stack buffer overflow vulnerability exists in the Wincor Nixdorf wnBios64.sys ...A stack buffer overflow vulnerability exists in the Wincor Nixdorf wnBios64.sys kernel driver (version 1.2.0.0) in the IOCTL handler for code 0x80102058. The vulnerability is caused by missing bounds checking on the user-controlled Options parameter before copying data into a 40-byte stack buffer (Src[40]) using memmove. An attacker with local access can exploit this vulnerability by sending a crafted IOCTL request with Options > 40, causing a stack buffer overflow that may lead to kernel code execution, local privilege escalation, or denial of service (system crash). Additionally, the same IOCTL handler can leak kernel addresses and other sensitive stack data when reading beyond the buffer boundaries. |
2026-03-05 | |
| CVE-2025-70233 | 9.8 | CRITICAL | CWE-121 | 0.1% p26 | 6.86 | Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime para...Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSetEnableWizard. |
2026-03-05 | |
| CVE-2025-70232 | 9.8 | CRITICAL | CWE-121 | 0.1% p26 | 6.86 | Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime para...Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSetMACFilter. |
2026-03-05 | |
| CVE-2025-70231 | 9.8 | CRITICAL | CWE-22 | 0.1% p31 | 6.86 | D-Link DIR-513 version 1.10 contains a critical-level vulnerability. When proces...D-Link DIR-513 version 1.10 contains a critical-level vulnerability. When processing POST requests related to verification codes in /goform/formLogin, it enters /goform/getAuthCode but fails to filter the value of the FILECODE parameter, resulting in a path traversal vulnerability. |
2026-03-05 | |
| CVE-2025-70230 | 9.8 | CRITICAL | CWE-121 | 0.1% p26 | 6.86 | Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime para...Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSetDDNS. |
2026-03-05 | |
| CVE-2025-70229 | 9.8 | CRITICAL | CWE-121 | 0.1% p26 | 6.86 | Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime para...Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSchedule. |
2026-03-05 | |
| CVE-2025-45691 | 7.5 | HIGH | CWE-22 | 0.1% p16 | 5.25 | An Arbitrary File Read vulnerability exists in the ImageTextPromptValue class in...An Arbitrary File Read vulnerability exists in the ImageTextPromptValue class in Exploding Gradients RAGAS v0.2.3 to v0.2.14. The vulnerability stems from improper validation and sanitization of URLs supplied in the retrieved_contexts parameter when handling multimodal inputs. |
2026-03-05 | |
| CVE-2025-13476 | 9.8 | CRITICAL | CWE-327 | 0.0% p4 | 6.86 | Rakuten Viber Cloak mode in Android v25.7.2.0g and Windows v25.6.0.0–v25.8.1.0 u...Rakuten Viber Cloak mode in Android v25.7.2.0g and Windows v25.6.0.0–v25.8.1.0 uses a static and predictable TLS ClientHello fingerprint lacking extension diversity, allowing Deep Packet Inspection (DPI) systems to trivially identify and block proxy traffic, undermining censorship circumvention. (CWE-327) |
2026-03-05 | |
| CVE-2026-26377 | 5.4 | MEDIUM | CWE-79 | 0.1% p18 | 3.78 | Cross Site Scripting vulnerability in Koha 25.11 and before allows a remote atta...Cross Site Scripting vulnerability in Koha 25.11 and before allows a remote attacker to execute arbitrary code via the News function. |
2026-03-05 | |
| CVE-2026-25048 | 8.7 | HIGH | CWE-674 | 0.1% p17 | 6.09 | xgrammar is an open-source library for efficient, flexible, and portable structu...xgrammar is an open-source library for efficient, flexible, and portable structured generation. Prior to version 0.1.32, the multi-level nested syntax caused a segmentation fault (core dumped). This issue has been patched in version 0.1.32. |
2026-03-05 | |
| CVE-2025-64166 | 5.4 | MEDIUM | CWE-352 | 0.0% p0 | 3.78 | Mercurius is a GraphQL adapter for Fastify. Prior to version 16.4.0, a cross-sit...Mercurius is a GraphQL adapter for Fastify. Prior to version 16.4.0, a cross-site request forgery (CSRF) vulnerability was identified. The issue arises from incorrect parsing of the Content-Type header in requests. Specifically, requests with Content-Type values such as application/x-www-form-urlencoded, multipart/form-data, or text/plain could be misinterpreted as application/json. This misinterpretation bypasses the preflight checks performed by the fetch() API, potentially allowing unauthorized actions to be performed on behalf of an authenticated user. This issue has been patched in version 16.4.0. |
2026-03-05 | |
| CVE-2026-27750 | 7.8 | HIGH | CWE-367 | 0.0% p1 | 5.46 | Avira Internet Security contains a time-of-check time-of-use (TOCTOU) vulnerabil...Avira Internet Security contains a time-of-check time-of-use (TOCTOU) vulnerability in the Optimizer component. A privileged service running as SYSTEM identifies directories for cleanup during a scan phase and subsequently deletes them during a separate cleanup phase without revalidating the target path. A local attacker can replace a previously scanned directory with a junction or reparse point before deletion occurs, causing the privileged process to delete an unintended system location. This may result in deletion of protected files or directories and can lead to local privilege escalation, denial of service, or system integrity compromise depending on the affected target. |
2026-03-05 | |
| CVE-2026-27749 | 7.8 | HIGH | CWE-502 | 0.1% p20 | 5.46 | Avira Internet Security contains a deserialization of untrusted data vulnerabili...Avira Internet Security contains a deserialization of untrusted data vulnerability in the System Speedup component. The Avira.SystemSpeedup.RealTimeOptimizer.exe process, which runs with SYSTEM privileges, deserializes data from a file located in C:\\ProgramData using .NET BinaryFormatter without implementing input validation or deserialization safeguards. Because the file can be created or modified by a local user in default configurations, an attacker can supply a crafted serialized payload that is deserialized by the privileged process, resulting in arbitrary code execution as SYSTEM. |
2026-03-05 | |
| CVE-2026-27748 | 7.8 | HIGH | CWE-59 | 0.0% p6 | 5.46 | Avira Internet Security contains an improper link resolution vulnerability in th...Avira Internet Security contains an improper link resolution vulnerability in the Software Updater component. During the update process, a privileged service running as SYSTEM deletes a file under C:\\ProgramData without validating whether the path resolves through a symbolic link or reparse point. A local attacker can create a malicious link to redirect the delete operation to an arbitrary file, resulting in deletion of attacker-chosen files with SYSTEM privileges. This may lead to local privilege escalation, denial of service, or system integrity compromise depending on the targeted file and operating system configuration. |
2026-03-05 | |
| CVE-2025-69534 | 7.5 | HIGH | CWE-400 | 0.3% p50 | 5.26 | Python-Markdown version 3.8 contain a vulnerability where malformed HTML-like se...Python-Markdown version 3.8 contain a vulnerability where malformed HTML-like sequences can cause html.parser.HTMLParser to raise an unhandled AssertionError during Markdown parsing. Because Python-Markdown does not catch this exception, any application that processes attacker-controlled Markdown may crash. This enables remote, unauthenticated Denial of Service in web applications, documentation systems, CI/CD pipelines, and any service that renders untrusted Markdown. The issue was acknowledged by the vendor and fixed in version 3.8.1. This issue causes a remote Denial of Service in any application parsing untrusted Markdown, and can lead to Information Disclosure through uncaught exceptions. |
2026-03-05 | |
| CVE-2026-1720 | 8.8 | HIGH | CWE-862 | 0.0% p14 | 6.16 | The WowOptin: Next-Gen Popup Maker – Create Stunning Popups and Optins for Lead ...The WowOptin: Next-Gen Popup Maker – Create Stunning Popups and Optins for Lead Generation plugin for WordPress is vulnerable to unauthorized arbitrary plugin installation due to a missing capability check on the 'install_and_active_plugin' function in all versions up to, and including, 1.4.24. This makes it possible for authenticated attackers, with Subscriber-level access and above, to install and activate arbitrary plugins. |
2026-03-05 | |
| CVE-2026-2599 | 9.8 | CRITICAL | CWE-502 | 0.2% p42 | 6.87 | The Database for Contact Form 7, WPforms, Elementor forms plugin for WordPress i...The Database for Contact Form 7, WPforms, Elementor forms plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.4.7 via deserialization of untrusted input in the 'download_csv' function. This makes it possible for unauthenticated attackers to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present. |
2026-03-05 | |
| CVE-2026-3236 | 2.3 | LOW | CWE-863 | 0.0% p10 | 1.61 | In affected versions of Octopus Server it was possible to create a new API key f...In affected versions of Octopus Server it was possible to create a new API key from an existing access token resulting in the new API key having a lifetime exceeding the original API key used to mint the access token. |
2026-03-05 | |
| CVE-2026-21628 | 10.0 | CRITICAL | CWE-434 | 0.3% p48 | 7.01 | A improperly secured file management feature allows uploads of dangerous data ty...A improperly secured file management feature allows uploads of dangerous data types for unauthenticated users, leading to remote code execution. |
2026-03-05 | |
| CVE-2025-11143 | 3.7 | LOW | CWE-20 | 0.1% p27 | 2.59 | The Jetty URI parser has some key differences to other common parsers when evalu...The Jetty URI parser has some key differences to other common parsers when evaluating invalid or unusual URIs. Differential parsing of URIs in systems using multiple components may result in security by-pass. For example a component that enforces a black list may interpret the URIs differently from one that generates a response. At the very least, differential parsing may divulge implementation details. |
2026-03-05 | |
| CVE-2026-28551 | 4.7 | MEDIUM | CWE-362 | 0.0% p0 | 3.29 | Race condition vulnerability in the device security management module. Impact: S...Race condition vulnerability in the device security management module. Impact: Successful exploitation of this vulnerability may affect availability. |
2026-03-05 | |
| CVE-2026-28549 | 6.6 | MEDIUM | CWE-362 | 0.0% p0 | 4.62 | Race condition vulnerability in the permission management service. Impact: Succe...Race condition vulnerability in the permission management service. Impact: Successful exploitation of this vulnerability may affect availability. |
2026-03-05 | |
| CVE-2026-28548 | 7.1 | HIGH | CWE-269 | 0.0% p0 | 4.97 | Vulnerability of improper verification in the email application. Impact: Success...Vulnerability of improper verification in the email application. Impact: Successful exploitation of this vulnerability may affect service confidentiality. |
2026-03-05 | |
| CVE-2026-28547 | 6.8 | MEDIUM | CWE-824 | 0.0% p0 | 4.76 | Vulnerability of uninitialized pointer access in the scanning module. Impact: Su...Vulnerability of uninitialized pointer access in the scanning module. Impact: Successful exploitation of this vulnerability may affect availability. |
2026-03-05 | |
| CVE-2026-28546 | 5.9 | MEDIUM | CWE-122 | 0.0% p0 | 4.13 | Buffer overflow vulnerability in the scanning module. Impact: Successful exploit...Buffer overflow vulnerability in the scanning module. Impact: Successful exploitation of this vulnerability may affect availability. |
2026-03-05 | |
| CVE-2026-28542 | 7.3 | HIGH | CWE-755 | 0.0% p0 | 5.11 | Permission bypass vulnerability in the system service framework. Impact: Success...Permission bypass vulnerability in the system service framework. Impact: Successful exploitation of this vulnerability may affect availability. |
2026-03-05 | |
| CVE-2026-2893 | 6.5 | MEDIUM | CWE-89 | 0.0% p9 | 4.55 | The Page and Post Clone plugin for WordPress is vulnerable to SQL Injection via ...The Page and Post Clone plugin for WordPress is vulnerable to SQL Injection via the 'meta_key' parameter in the content_clone() function in all versions up to, and including, 6.3. This is due to insufficient escaping on the user-supplied meta_key value and insufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. The injection is second-order: the malicious payload is stored as a post meta key and executed when the post is cloned. |
2026-03-05 | |
| CVE-2026-28552 | 6.5 | MEDIUM | CWE-19 | 0.0% p7 | 4.55 | Out-of-bounds write vulnerability in the IMS module. Impact: Successful exploita...Out-of-bounds write vulnerability in the IMS module. Impact: Successful exploitation of this vulnerability may affect availability. |
2026-03-05 | |
| CVE-2026-28550 | 4.0 | MEDIUM | CWE-840 | 0.0% p0 | 2.80 | Race condition vulnerability in the security control module. Impact: Successful ...Race condition vulnerability in the security control module. Impact: Successful exploitation of this vulnerability may affect availability. |
2026-03-05 | |
| CVE-2026-28545 | 5.9 | MEDIUM | CWE-362 | 0.0% p0 | 4.13 | Race condition vulnerability in the printing module. Impact: Successful exploita...Race condition vulnerability in the printing module. Impact: Successful exploitation of this vulnerability may affect availability. |
2026-03-05 | |
| CVE-2026-28544 | 6.2 | MEDIUM | CWE-362 | 0.0% p0 | 4.34 | Race condition vulnerability in the printing module. Impact: Successful exploita...Race condition vulnerability in the printing module. Impact: Successful exploitation of this vulnerability may affect availability. |
2026-03-05 | |
| CVE-2026-28543 | 4.4 | MEDIUM | CWE-362 | 0.0% p0 | 3.08 | Race condition vulnerability in the maintenance and diagnostics module. Impact: ...Race condition vulnerability in the maintenance and diagnostics module. Impact: Successful exploitation of this vulnerability may affect availability. |
2026-03-05 | |
| CVE-2026-28541 | 4.0 | MEDIUM | CWE-264 | 0.0% p0 | 2.80 | Permission control vulnerability in the cellular_data module. Impact: Successful...Permission control vulnerability in the cellular_data module. Impact: Successful exploitation of this vulnerability may affect availability. |
2026-03-05 | |
| CVE-2026-28540 | 4.0 | MEDIUM | CWE-158 | 0.0% p0 | 2.80 | Out-of-bounds character read vulnerability in Bluetooth. Impact: Successful expl...Out-of-bounds character read vulnerability in Bluetooth. Impact: Successful exploitation of this vulnerability may affect service confidentiality. |
2026-03-05 | |
| CVE-2026-28539 | 6.2 | MEDIUM | CWE-19 | 0.0% p0 | 4.34 | Data processing vulnerability in the certificate management module. Impact: Succ...Data processing vulnerability in the certificate management module. Impact: Successful exploitation of this vulnerability may affect service confidentiality. |
2026-03-05 | |
| CVE-2026-28538 | 5.9 | MEDIUM | CWE-24 | 0.0% p0 | 4.13 | Path traversal vulnerability in the certificate management module. Impact: Succe...Path traversal vulnerability in the certificate management module. Impact: Successful exploitation of this vulnerability may affect availability. |
2026-03-05 | |
| CVE-2026-28537 | 5.1 | MEDIUM | CWE-415 | 0.0% p0 | 3.57 | Double free vulnerability in the window module. Impact: Successful exploitation ...Double free vulnerability in the window module. Impact: Successful exploitation of this vulnerability may affect availability. |
2026-03-05 | |
| CVE-2026-21786 | 3.3 | LOW | CWE-532 | 0.0% p3 | 2.31 | HCL Sametime for iOS is impacted by a sensitive information disclosure. Hostnam...HCL Sametime for iOS is impacted by a sensitive information disclosure. Hostnames information is written in application logs and certain URLs. |
2026-03-05 | |
| CVE-2026-1321 | 8.1 | HIGH | CWE-862 | 0.1% p32 | 5.67 | The Membership Plugin – Restrict Content plugin for WordPress is vulnerable to P...The Membership Plugin – Restrict Content plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 3.2.20. This is due to the `rcp_setup_registration_init()` function accepting any membership level ID via the `rcp_level` POST parameter without validating that the level is active or that payment is required. Combined with the `add_user_role()` method which assigns the WordPress role configured on the membership level without status checks, this makes it possible for unauthenticated attackers to register with any membership level, including inactive levels that grant privileged WordPress roles such as Administrator, or paid levels that charge a sign-up fee. The vulnerability was partially patched in version 3.2.18. |
2026-03-05 | |
| CVE-2025-66319 | 3.3 | LOW | CWE-264 | 0.0% p0 | 2.31 | Permission control vulnerability in the resource scheduling module. Impact: Succ...Permission control vulnerability in the resource scheduling module. Impact: Successful exploitation of this vulnerability may affect service integrity. |
2026-03-05 | |
| CVE-2026-2743 | 10.0 | CRITICAL | CWE-22 | 0.6% p68 | 7.02 | Arbitrary File Write via Path Traversal upload to Remote Code Execution in SeppM...Arbitrary File Write via Path Traversal upload to Remote Code Execution in SeppMail User Web Interface. The affected feature is the large file transfer (LFT). This issue affects SeppMail: 15.0.2.1 and before |
2026-03-05 | |
| CVE-2026-28536 | 9.6 | CRITICAL | CWE-305 | 0.0% p10 | 6.72 | Authentication bypass vulnerability in the device authentication module. Impact:...Authentication bypass vulnerability in the device authentication module. Impact: Successful exploitation of this vulnerability will affect integrity and confidentiality. |
2026-03-05 | |
| CVE-2026-25702 | 7.3 | HIGH | CWE-284 | 0.1% p17 | 5.11 | A Improper Access Control vulnerability in the kernel of SUSE SUSE Linux Enterpr...A Improper Access Control vulnerability in the kernel of SUSE SUSE Linux Enterprise Server 12 SP5 breaks nftables, causing firewall rules applied via nftables to not be effective.This issue affects SUSE Linux Enterprise Server: from 9e6d9d4601768c75fdb0bad3fbbe636e748939c2 before 9c294edb7085fb91650bc12233495a8974c5ff2d. |
2026-03-05 | |
| CVE-2026-1678 | 9.4 | CRITICAL | CWE-787 | 0.1% p18 | 6.58 | dns_unpack_name() caches the buffer tailroom once and reuses it while appending ...dns_unpack_name() caches the buffer tailroom once and reuses it while appending DNS labels. As the buffer grows, the cached size becomes incorrect, and the final null terminator can be written past the buffer. With assertions disabled (default), a malicious DNS response can trigger an out-of-bounds write when CONFIG_DNS_RESOLVER is enabled. |
2026-03-05 | |
| CVE-2026-3072 | 4.3 | MEDIUM | CWE-862 | 0.0% p9 | 3.01 | The Media Library Assistant plugin for WordPress is vulnerable to unauthorized m...The Media Library Assistant plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the mla_update_compat_fields_action() function in all versions up to, and including, 3.33. This makes it possible for authenticated attackers, with Subscriber-level access and above, to modify taxonomy terms on arbitrary attachments. |
2026-03-05 | |
| CVE-2026-30777 | 6.9 | MEDIUM | CWE-288 | 0.1% p25 | 4.83 | EC-CUBE provided by EC-CUBE CO.,LTD. contains a multi-factor authentication (MFA...EC-CUBE provided by EC-CUBE CO.,LTD. contains a multi-factor authentication (MFA) bypass vulnerability. An attacker who has obtained a valid administrator ID and password may be able to bypass two-factor authentication and gain unauthorized access to the administrative page. |
2026-03-05 | |
| CVE-2026-2418 | 9.1 | CRITICAL | N/A | 0.1% p28 | 6.37 | The Login with Salesforce WordPress plugin through 1.0.2 does not validate that ...The Login with Salesforce WordPress plugin through 1.0.2 does not validate that users are allowed to login through Salesforce, allowing unauthenticated users to be authenticated as any user (such as admin) by simply knowing the email |
2026-03-05 | |
| CVE-2026-29128 | 8.6 | HIGH | CWE-522 | 0.0% p10 | 6.02 | IDC SFX2100 Satellite Receiver firmware ships with multiple daemon configuration...IDC SFX2100 Satellite Receiver firmware ships with multiple daemon configuration files for routing components (e.g., zebra, bgpd, ospfd, and ripd) that are owned by root but world-readable. The configuration files (e.g., zebra.conf, bgpd.conf, ospfd.conf, ripd.conf) contain hardcoded or otherwise insecure plaintext passwords (including “enable”/privileged-mode credentials). A remote actor is able to abuse the reuse/hardcoded nature of these credentials to further access other systems in the network, gain a foothold on the satellite receiver or potentially locally privilege escalate. |
2026-03-05 | |
| CVE-2026-29053 | 7.6 | HIGH | CWE-74 | 0.1% p25 | 5.32 | Ghost is a Node.js content management system. From version 0.7.2 to 6.19.0, spec...Ghost is a Node.js content management system. From version 0.7.2 to 6.19.0, specifically crafted malicious themes can execute arbitrary code on the server running Ghost. This issue has been patched in version 6.19.1. |
2026-03-05 | |
| CVE-2026-29052 | 6.9 | MEDIUM | CWE-79 | 0.0% p12 | 4.83 | The Calendar module for HumHub enables users to create one-time or recurring eve...The Calendar module for HumHub enables users to create one-time or recurring events, manage attendee invitations, and efficiently track all scheduled activities. Prior to version 1.8.11, a Stored Cross-Site Scripting (XSS) vulnerability in the Event Types of the HumHub Calendar module impacts users viewing events created by an administrative account. This issue has been patched in version 1.8.11. |
2026-03-05 | |
| CVE-2026-28137 | 7.1 | HIGH | CWE-79 | 0.0% p11 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in QuanticaLabs MediCenter - Health Medical Clinic medicenter allows Reflected XSS.This issue affects MediCenter - Health Medical Clinic: from n/a through <= 14.9. |
2026-03-05 | |
| CVE-2026-28135 | 8.2 | HIGH | CWE-829 | 0.1% p17 | 5.74 | Inclusion of Functionality from Untrusted Control Sphere vulnerability in WP Roy...Inclusion of Functionality from Untrusted Control Sphere vulnerability in WP Royal Royal Elementor Addons royal-elementor-addons allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Royal Elementor Addons: from n/a through <= 1.7.1052. |
2026-03-05 | |
| CVE-2026-28134 | 8.5 | HIGH | CWE-94 | 0.1% p18 | 5.95 | Improper Control of Generation of Code ('Code Injection') vulnerability in Croco...Improper Control of Generation of Code ('Code Injection') vulnerability in Crocoblock JetEngine jet-engine allows Remote Code Inclusion.This issue affects JetEngine: from n/a through <= 3.7.2. |
2026-03-05 | |
| CVE-2026-28133 | 8.1 | HIGH | CWE-434 | 0.0% p11 | 5.67 | Unrestricted Upload of File with Dangerous Type vulnerability in WP Chill Filr f...Unrestricted Upload of File with Dangerous Type vulnerability in WP Chill Filr filr-protection allows Upload a Web Shell to a Web Server.This issue affects Filr: from n/a through <= 1.2.14. |
2026-03-05 | |
| CVE-2026-28130 | 7.1 | HIGH | CWE-79 | 0.0% p11 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in AndonDesign UDesign u-design allows Reflected XSS.This issue affects UDesign: from n/a through <= 4.14.0. |
2026-03-05 | |
| CVE-2026-28129 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Little Birdies little-birdies allows PHP Local File Inclusion.This issue affects Little Birdies: from n/a through <= 1.3.16. |
2026-03-05 | |
| CVE-2026-28128 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Verse verse allows PHP Local File Inclusion.This issue affects Verse: from n/a through <= 1.7.0. |
2026-03-05 | |
| CVE-2026-28127 | 7.1 | HIGH | CWE-79 | 0.0% p11 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in e-plugins Lawyer Directory lawyer-directory allows Reflected XSS.This issue affects Lawyer Directory: from n/a through <= 1.3.2. |
2026-03-05 | |
| CVE-2026-28126 | 7.1 | HIGH | CWE-79 | 0.0% p11 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in sizam RH Frontend Publishing Pro rh-frontend allows Reflected XSS.This issue affects RH Frontend Publishing Pro: from n/a through < 4.3.4. |
2026-03-05 | |
| CVE-2026-28125 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Midi midi allows PHP Local File Inclusion.This issue affects Midi: from n/a through <= 1.14. |
2026-03-05 | |
| CVE-2026-28124 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Notarius notarius allows PHP Local File Inclusion.This issue affects Notarius: from n/a through <= 1.9. |
2026-03-05 | |
| CVE-2026-28123 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Veil veil allows PHP Local File Inclusion.This issue affects Veil: from n/a through <= 1.9. |
2026-03-05 | |
| CVE-2026-28122 | 7.1 | HIGH | CWE-79 | 0.0% p11 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CridioStudio ListingPro listingpro-plugin allows Reflected XSS.This issue affects ListingPro: from n/a through <= 2.9.8. |
2026-03-05 | |
| CVE-2026-28121 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Anderson andersonclinic allows PHP Local File Inclusion.This issue affects Anderson: from n/a through <= 1.4.2. |
2026-03-05 | |
| CVE-2026-28120 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Dr.Patterson dr-patterson allows PHP Local File Inclusion.This issue affects Dr.Patterson: from n/a through <= 1.3.2. |
2026-03-05 | |
| CVE-2026-28119 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Nirvana nir-vana allows PHP Local File Inclusion.This issue affects Nirvana: from n/a through <= 2.6. |
2026-03-05 | |
| CVE-2026-28118 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Welldone welldone allows PHP Local File Inclusion.This issue affects Welldone: from n/a through <= 2.4. |
2026-03-05 | |
| CVE-2026-28117 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes smart SEO smartSEO allows PHP Local File Inclusion.This issue affects smart SEO: from n/a through <= 2.9. |
2026-03-05 | |
| CVE-2026-28115 | 9.3 | CRITICAL | CWE-89 | 0.0% p12 | 6.51 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti...Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in loopus WP Attractive Donations System - Easy Stripe & Paypal donations WP_AttractiveDonationsSystem allows Blind SQL Injection.This issue affects WP Attractive Donations System - Easy Stripe & Paypal donations: from n/a through <= 1.25. |
2026-03-05 | |
| CVE-2026-28114 | 9.1 | CRITICAL | CWE-434 | 0.1% p17 | 6.37 | Unrestricted Upload of File with Dangerous Type vulnerability in firassaidi WooC...Unrestricted Upload of File with Dangerous Type vulnerability in firassaidi WooCommerce License Manager fs-license-manager allows Upload a Web Shell to a Web Server.This issue affects WooCommerce License Manager: from n/a through <= 7.0.6. |
2026-03-05 | |
| CVE-2026-28113 | 7.1 | HIGH | CWE-79 | 0.0% p11 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in azzaroco Ultimate Learning Pro indeed-learning-pro allows Reflected XSS.This issue affects Ultimate Learning Pro: from n/a through <= 3.9.1. |
2026-03-05 | |
| CVE-2026-28112 | 7.1 | HIGH | CWE-79 | 0.0% p11 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in LambertGroup AllInOne - Banner Rotator all-in-one-bannerRotator allows Reflected XSS.This issue affects AllInOne - Banner Rotator: from n/a through <= 3.8. |
2026-03-05 | |
| CVE-2026-28110 | 7.1 | HIGH | CWE-79 | 0.0% p11 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in LambertGroup LambertGroup - AllInOne - Banner with Playlist all-in-one-bannerWithPlaylist allows Reflected XSS.This issue affects LambertGroup - AllInOne - Banner with Playlist: from n/a through <= 3.8. |
2026-03-05 | |
| CVE-2026-28109 | 7.1 | HIGH | CWE-79 | 0.0% p11 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in LambertGroup LambertGroup - AllInOne - Content Slider all-in-one-contentSlider allows Reflected XSS.This issue affects LambertGroup - AllInOne - Content Slider: from n/a through <= 3.8. |
2026-03-05 | |
| CVE-2026-28108 | 7.1 | HIGH | CWE-79 | 0.0% p11 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in LambertGroup LambertGroup - AllInOne - Banner with Thumbnails all-in-one-thumbnailsBanner allows Reflected XSS.This issue affects LambertGroup - AllInOne - Banner with Thumbnails: from n/a through <= 3.8. |
2026-03-05 | |
| CVE-2026-28107 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Muzicon muzicon allows PHP Local File Inclusion.This issue affects Muzicon: from n/a through <= 1.9.0. |
2026-03-05 | |
| CVE-2026-28105 | 9.8 | CRITICAL | CWE-502 | 0.1% p18 | 6.86 | Deserialization of Untrusted Data vulnerability in ThemeREX Good Energy goodener...Deserialization of Untrusted Data vulnerability in ThemeREX Good Energy goodenergy allows Object Injection.This issue affects Good Energy: from n/a through <= 1.7.7. |
2026-03-05 | |
| CVE-2026-28104 | 6.5 | MEDIUM | CWE-862 | 0.1% p16 | 4.55 | Missing Authorization vulnerability in Aryan Shirani Bid Abadi Site Suggest site...Missing Authorization vulnerability in Aryan Shirani Bid Abadi Site Suggest site-suggest allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Site Suggest: from n/a through <= 1.3.9. |
2026-03-05 | |
| CVE-2026-28103 | 7.1 | HIGH | CWE-79 | 0.0% p11 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in LambertGroup LBG Zoominoutslider lbg_zoominoutslider allows Reflected XSS.This issue affects LBG Zoominoutslider: from n/a through <= 5.4.5. |
2026-03-05 | |
| CVE-2026-28102 | 7.1 | HIGH | CWE-79 | 0.0% p11 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in LambertGroup UberSlider Classic uberSlider_classic allows Reflected XSS.This issue affects UberSlider Classic: from n/a through <= 2.5. |
2026-03-05 | |
| CVE-2026-28101 | 7.1 | HIGH | CWE-79 | 0.0% p11 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in LambertGroup UberSlider MouseInteraction uberSlider_mouseinteraction allows Reflected XSS.This issue affects UberSlider MouseInteraction: from n/a through <= 2.3. |
2026-03-05 | |
| CVE-2026-28100 | 7.1 | HIGH | CWE-79 | 0.0% p11 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in LambertGroup UberSlider PerpetuumMobile uberSlider_perpetuummobile allows Reflected XSS.This issue affects UberSlider PerpetuumMobile: from n/a through <= 2.3. |
2026-03-05 | |
| CVE-2026-28099 | 7.1 | HIGH | CWE-79 | 0.0% p11 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in LambertGroup UberSlider Ultra uberSlider_ultra allows Reflected XSS.This issue affects UberSlider Ultra: from n/a through <= 2.3. |
2026-03-05 | |
| CVE-2026-28098 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Save Life save-life allows PHP Local File Inclusion.This issue affects Save Life: from n/a through <= 1.2.13. |
2026-03-05 | |
| CVE-2026-28097 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Artrium artrium allows PHP Local File Inclusion.This issue affects Artrium: from n/a through <= 1.0.14. |
2026-03-05 | |
| CVE-2026-28096 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX WealthCo wealthco allows PHP Local File Inclusion.This issue affects WealthCo: from n/a through <= 2.18. |
2026-03-05 | |
| CVE-2026-28095 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Marcell marcell allows PHP Local File Inclusion.This issue affects Marcell: from n/a through <= 1.2.14. |
2026-03-05 | |
| CVE-2026-28094 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX RexCoin rexcoin allows PHP Local File Inclusion.This issue affects RexCoin: from n/a through <= 1.2.6. |
2026-03-05 | |
| CVE-2026-28093 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Ozisti ozisti allows PHP Local File Inclusion.This issue affects Ozisti: from n/a through <= 1.1.10. |
2026-03-05 | |
| CVE-2026-28092 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Sounder sounder allows PHP Local File Inclusion.This issue affects Sounder: from n/a through <= 1.3.11. |
2026-03-05 | |
| CVE-2026-28091 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Coleo coleo allows PHP Local File Inclusion.This issue affects Coleo: from n/a through <= 1.1.7. |
2026-03-05 | |
| CVE-2026-28090 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Gamezone gamezone allows PHP Local File Inclusion.This issue affects Gamezone: from n/a through <= 1.1.11. |
2026-03-05 | |
| CVE-2026-28089 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Daiquiri daiquiri allows PHP Local File Inclusion.This issue affects Daiquiri: from n/a through <= 1.2.4. |
2026-03-05 | |
| CVE-2026-28088 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Aqualots aqualots allows PHP Local File Inclusion.This issue affects Aqualots: from n/a through <= 1.1.6. |
2026-03-05 | |
| CVE-2026-28087 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Filmax filmax allows PHP Local File Inclusion.This issue affects Filmax: from n/a through <= 1.1.11. |
2026-03-05 | |
| CVE-2026-28086 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Run Gran run-gran allows PHP Local File Inclusion.This issue affects Run Gran: from n/a through <= 2.0. |
2026-03-05 | |
| CVE-2026-28085 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Mahogany mahogany allows PHP Local File Inclusion.This issue affects Mahogany: from n/a through <= 2.9. |
2026-03-05 | |
| CVE-2026-28084 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Bazinga bazinga allows PHP Local File Inclusion.This issue affects Bazinga: from n/a through <= 1.1.9. |
2026-03-05 | |
| CVE-2026-28081 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Windsor windsor allows PHP Local File Inclusion.This issue affects Windsor: from n/a through <= 2.5.0. |
2026-03-05 | |
| CVE-2026-28079 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Conquerors conquerors allows PHP Local File Inclusion.This issue affects Conquerors: from n/a through <= 1.2.13. |
2026-03-05 | |
| CVE-2026-28078 | 4.9 | MEDIUM | CWE-22 | 0.1% p17 | 3.43 | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') v...Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Stylemix uListing ulisting allows Path Traversal.This issue affects uListing: from n/a through <= 2.2.0. |
2026-03-05 | |
| CVE-2026-28077 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Vapester vapester allows PHP Local File Inclusion.This issue affects Vapester: from n/a through <= 1.1.10. |
2026-03-05 | |
| CVE-2026-28076 | 7.5 | HIGH | CWE-862 | 0.0% p13 | 5.25 | Missing Authorization vulnerability in Frenify Guff guff allows Exploiting Incor...Missing Authorization vulnerability in Frenify Guff guff allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Guff: from n/a through <= 1.0.1. |
2026-03-05 | |
| CVE-2026-28075 | 7.1 | HIGH | CWE-79 | 0.0% p11 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in p-themes Porto porto allows Reflected XSS.This issue affects Porto: from n/a through <= 7.6.2. |
2026-03-05 | |
| CVE-2026-28074 | 9.8 | CRITICAL | CWE-502 | 0.1% p18 | 6.86 | Deserialization of Untrusted Data vulnerability in ThemeREX Pizza House pizzahou...Deserialization of Untrusted Data vulnerability in ThemeREX Pizza House pizzahouse allows Object Injection.This issue affects Pizza House: from n/a through <= 1.4.0. |
2026-03-05 | |
| CVE-2026-28072 | 7.1 | HIGH | CWE-79 | 0.0% p11 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in PixFort pixfort Core pixfort-core allows Reflected XSS.This issue affects pixfort Core: from n/a through <= 3.2.22. |
2026-03-05 | |
| CVE-2026-28071 | 6.3 | MEDIUM | CWE-862 | 0.0% p13 | 4.41 | Missing Authorization vulnerability in PixFort pixfort Core pixfort-core allows ...Missing Authorization vulnerability in PixFort pixfort Core pixfort-core allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects pixfort Core: from n/a through <= 3.2.22. |
2026-03-05 | |
| CVE-2026-28069 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Le Truffe letruffe allows PHP Local File Inclusion.This issue affects Le Truffe: from n/a through <= 1.1.7. |
2026-03-05 | |
| CVE-2026-28068 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Rhythmo rhythmo allows PHP Local File Inclusion.This issue affects Rhythmo: from n/a through <= 1.3.4. |
2026-03-05 | |
| CVE-2026-28067 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Bassein bassein allows PHP Local File Inclusion.This issue affects Bassein: from n/a through <= 1.0.15. |
2026-03-05 | |
| CVE-2026-28066 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Legrand legrand allows PHP Local File Inclusion.This issue affects Legrand: from n/a through <= 2.17. |
2026-03-05 | |
| CVE-2026-28065 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Eject eject allows PHP Local File Inclusion.This issue affects Eject: from n/a through <= 2.17. |
2026-03-05 | |
| CVE-2026-28064 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Edge Decor edge-decor allows PHP Local File Inclusion.This issue affects Edge Decor: from n/a through <= 2.2. |
2026-03-05 | |
| CVE-2026-28063 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Asia Garden asia-garden allows PHP Local File Inclusion.This issue affects Asia Garden: from n/a through <= 1.3.1. |
2026-03-05 | |
| CVE-2026-28062 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Happy Baby happy-baby allows PHP Local File Inclusion.This issue affects Happy Baby: from n/a through <= 1.2.12. |
2026-03-05 | |
| CVE-2026-28061 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Tiger Claw tiger-claw allows PHP Local File Inclusion.This issue affects Tiger Claw: from n/a through <= 1.1.14. |
2026-03-05 | |
| CVE-2026-28060 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX S.King stephanie-king allows PHP Local File Inclusion.This issue affects S.King: from n/a through <= 1.5.3. |
2026-03-05 | |
| CVE-2026-28059 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Dermatology Clinic dermatology-clinic allows PHP Local File Inclusion.This issue affects Dermatology Clinic: from n/a through <= 1.4.3. |
2026-03-05 | |
| CVE-2026-28058 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Dixon dixon allows PHP Local File Inclusion.This issue affects Dixon: from n/a through <= 1.4.2.1. |
2026-03-05 | |
| CVE-2026-28057 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Mandala mandala allows PHP Local File Inclusion.This issue affects Mandala: from n/a through <= 2.8. |
2026-03-05 | |
| CVE-2026-28056 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX MCKinney's Politics mckinney-politics allows PHP Local File Inclusion.This issue affects MCKinney's Politics: from n/a through <= 1.2.8. |
2026-03-05 | |
| CVE-2026-28055 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX M.Williamson williamson allows PHP Local File Inclusion.This issue affects M.Williamson: from n/a through <= 1.2.11. |
2026-03-05 | |
| CVE-2026-28054 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Legal Stone legal-stone allows PHP Local File Inclusion.This issue affects Legal Stone: from n/a through <= 1.2.11. |
2026-03-05 | |
| CVE-2026-28053 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Miller christine-miller allows PHP Local File Inclusion.This issue affects Miller: from n/a through <= 1.3.3. |
2026-03-05 | |
| CVE-2026-28052 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Peter Mason petermason allows PHP Local File Inclusion.This issue affects Peter Mason: from n/a through <= 1.4.5. |
2026-03-05 | |
| CVE-2026-28051 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Yacht Rental yacht-rental allows PHP Local File Inclusion.This issue affects Yacht Rental: from n/a through <= 2.6. |
2026-03-05 | |
| CVE-2026-28050 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Beacon beacon allows PHP Local File Inclusion.This issue affects Beacon: from n/a through <= 2.24. |
2026-03-05 | |
| CVE-2026-28049 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Police Department police-department allows PHP Local File Inclusion.This issue affects Police Department: from n/a through <= 2.17. |
2026-03-05 | |
| CVE-2026-28048 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in magentech FlashMart flashmart allows PHP Local File Inclusion.This issue affects FlashMart: from n/a through <= 2.0.15. |
2026-03-05 | |
| CVE-2026-28047 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in magentech Victo victo allows PHP Local File Inclusion.This issue affects Victo: from n/a through <= 1.4.16. |
2026-03-05 | |
| CVE-2026-28046 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Law Office law-office allows PHP Local File Inclusion.This issue affects Law Office: from n/a through <= 3.3.0. |
2026-03-05 | |
| CVE-2026-28045 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX N7 | Golf Club Sports & Events n7-golf-club allows PHP Local File Inclusion.This issue affects N7 | Golf Club Sports & Events: from n/a through <= 2.16.0. |
2026-03-05 | |
| CVE-2026-28043 | 9.8 | CRITICAL | CWE-98 | 0.2% p37 | 6.86 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Healer - Doctor, Clinic & Medical WordPress Theme healer allows PHP Local File Inclusion.This issue affects Healer - Doctor, Clinic & Medical WordPress Theme: from n/a through <= 1.0.0. |
2026-03-05 | |
| CVE-2026-28042 | 7.1 | HIGH | CWE-79 | 0.0% p11 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Astoundify Listify listify allows Reflected XSS.This issue affects Listify: from n/a through <= 3.2.5. |
2026-03-05 | |
| CVE-2026-28041 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Grit grit allows PHP Local File Inclusion.This issue affects Grit: from n/a through <= 1.0.1. |
2026-03-05 | |
| CVE-2026-28039 | 7.5 | HIGH | CWE-98 | 0.1% p35 | 5.25 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in wpDataTables wpDataTables wpdatatables allows PHP Local File Inclusion.This issue affects wpDataTables: from n/a through <= 6.5.0.1. |
2026-03-05 | |
| CVE-2026-28038 | 6.5 | MEDIUM | CWE-862 | 0.0% p9 | 4.55 | Missing Authorization vulnerability in Brainstorm Force Ultimate Addons for WPBa...Missing Authorization vulnerability in Brainstorm Force Ultimate Addons for WPBakery Page Builder allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Ultimate Addons for WPBakery Page Builder: from n/a through 3.21.1. |
2026-03-05 | |
| CVE-2026-28037 | 7.1 | HIGH | CWE-79 | 0.0% p11 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ashanjay EventON eventon allows Reflected XSS.This issue affects EventON: from n/a through <= 4.9.12. |
2026-03-05 | |
| CVE-2026-28036 | 6.4 | MEDIUM | CWE-918 | 0.0% p9 | 4.48 | Server-Side Request Forgery (SSRF) vulnerability in SkatDesign Ratatouille ratat...Server-Side Request Forgery (SSRF) vulnerability in SkatDesign Ratatouille ratatouille allows Server Side Request Forgery.This issue affects Ratatouille: from n/a through <= 1.2.6. |
2026-03-05 | |
| CVE-2026-28035 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Printy printy allows PHP Local File Inclusion.This issue affects Printy: from n/a through <= 1.8. |
2026-03-05 | |
| CVE-2026-28034 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Progress progress allows PHP Local File Inclusion.This issue affects Progress: from n/a through <= 1.2. |
2026-03-05 | |
| CVE-2026-28033 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Edifice edifice allows PHP Local File Inclusion.This issue affects Edifice: from n/a through <= 1.8. |
2026-03-05 | |
| CVE-2026-28032 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Tuning tuning allows PHP Local File Inclusion.This issue affects Tuning: from n/a through <= 1.3. |
2026-03-05 | |
| CVE-2026-28031 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Invetex invetex allows PHP Local File Inclusion.This issue affects Invetex: from n/a through <= 2.18. |
2026-03-05 | |
| CVE-2026-28030 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Bonbon bonbon allows PHP Local File Inclusion.This issue affects Bonbon: from n/a through <= 1.6. |
2026-03-05 | |
| CVE-2026-28029 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX EmojiNation emojination allows PHP Local File Inclusion.This issue affects EmojiNation: from n/a through <= 1.0.12. |
2026-03-05 | |
| CVE-2026-28028 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX MoneyFlow moneyflow allows PHP Local File Inclusion.This issue affects MoneyFlow: from n/a through <= 1.0. |
2026-03-05 | |
| CVE-2026-28027 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Kayon kayon allows PHP Local File Inclusion.This issue affects Kayon: from n/a through <= 1.3. |
2026-03-05 | |
| CVE-2026-28026 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Motorix motorix allows PHP Local File Inclusion.This issue affects Motorix: from n/a through <= 1.6. |
2026-03-05 | |
| CVE-2026-28025 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Stargaze stargaze allows PHP Local File Inclusion.This issue affects Stargaze: from n/a through <= 1.5. |
2026-03-05 | |
| CVE-2026-28024 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Helion helion allows PHP Local File Inclusion.This issue affects Helion: from n/a through <= 1.1.12. |
2026-03-05 | |
| CVE-2026-28023 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Nuts nuts allows PHP Local File Inclusion.This issue affects Nuts: from n/a through <= 1.10. |
2026-03-05 | |
| CVE-2026-28022 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Foodie foodie allows PHP Local File Inclusion.This issue affects Foodie: from n/a through <= 1.14. |
2026-03-05 | |
| CVE-2026-28021 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Craftis craftis allows PHP Local File Inclusion.This issue affects Craftis: from n/a through <= 1.2.8. |
2026-03-05 | |
| CVE-2026-28020 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Chroma chroma allows PHP Local File Inclusion.This issue affects Chroma: from n/a through <= 1.11. |
2026-03-05 | |
| CVE-2026-28019 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Manoir manoir allows PHP Local File Inclusion.This issue affects Manoir: from n/a through <= 1.11. |
2026-03-05 | |
| CVE-2026-28018 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Global Logistics globallogistics allows PHP Local File Inclusion.This issue affects Global Logistics: from n/a through <= 3.20. |
2026-03-05 | |
| CVE-2026-28017 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Green Thumb greenthumb allows PHP Local File Inclusion.This issue affects Green Thumb: from n/a through <= 1.1.12. |
2026-03-05 | |
| CVE-2026-28016 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Luxury Wine luxury-wine allows PHP Local File Inclusion.This issue affects Luxury Wine: from n/a through <= 1.1.14. |
2026-03-05 | |
| CVE-2026-28015 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX ShiftCV shift-cv allows PHP Local File Inclusion.This issue affects ShiftCV: from n/a through <= 3.0.14. |
2026-03-05 | |
| CVE-2026-28014 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Translogic translogic allows PHP Local File Inclusion.This issue affects Translogic: from n/a through <= 1.2.11. |
2026-03-05 | |
| CVE-2026-28013 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Kratz kratz allows PHP Local File Inclusion.This issue affects Kratz: from n/a through <= 1.0.12. |
2026-03-05 | |
| CVE-2026-28012 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Gridiron gridiron allows PHP Local File Inclusion.This issue affects Gridiron: from n/a through <= 1.0.14. |
2026-03-05 | |
| CVE-2026-28011 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Yottis yottis allows PHP Local File Inclusion.This issue affects Yottis: from n/a through <= 1.0.10. |
2026-03-05 | |
| CVE-2026-28010 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Scientia scientia allows PHP Local File Inclusion.This issue affects Scientia: from n/a through <= 1.2.4. |
2026-03-05 | |
| CVE-2026-28009 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX DroneX dronex allows PHP Local File Inclusion.This issue affects DroneX: from n/a through <= 1.1.12. |
2026-03-05 | |
| CVE-2026-28007 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Coinpress coinpress allows PHP Local File Inclusion.This issue affects Coinpress: from n/a through <= 1.0.14. |
2026-03-05 | |
| CVE-2026-28006 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Yungen yungen allows PHP Local File Inclusion.This issue affects Yungen: from n/a through <= 1.0.12. |
2026-03-05 | |
| CVE-2026-27998 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Vixus vixus allows PHP Local File Inclusion.This issue affects Vixus: from n/a through <= 1.0.16. |
2026-03-05 | |
| CVE-2026-27997 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Maxify maxify allows PHP Local File Inclusion.This issue affects Maxify: from n/a through <= 1.0.16. |
2026-03-05 | |
| CVE-2026-27996 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Lingvico lingvico allows PHP Local File Inclusion.This issue affects Lingvico: from n/a through <= 1.0.14. |
2026-03-05 | |
| CVE-2026-27995 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Justitia justitia allows PHP Local File Inclusion.This issue affects Justitia: from n/a through <= 1.1.0. |
2026-03-05 | |
| CVE-2026-27994 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Tediss tediss allows PHP Local File Inclusion.This issue affects Tediss: from n/a through <= 1.2.4. |
2026-03-05 | |
| CVE-2026-27993 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Aldo aldo allows PHP Local File Inclusion.This issue affects Aldo: from n/a through <= 1.0.10. |
2026-03-05 | |
| CVE-2026-27992 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Meals & Wheels meals-wheels allows PHP Local File Inclusion.This issue affects Meals & Wheels: from n/a through <= 1.1.12. |
2026-03-05 | |
| CVE-2026-27991 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Avventure avventure allows PHP Local File Inclusion.This issue affects Avventure: from n/a through <= 1.1.12. |
2026-03-05 | |
| CVE-2026-27990 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX ConFix confix allows PHP Local File Inclusion.This issue affects ConFix: from n/a through <= 1.013. |
2026-03-05 | |
| CVE-2026-27989 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Quanzo quanzo allows PHP Local File Inclusion.This issue affects Quanzo: from n/a through <= 1.0.10. |
2026-03-05 | |
| CVE-2026-27988 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Equadio equadio allows PHP Local File Inclusion.This issue affects Equadio: from n/a through <= 1.1.3. |
2026-03-05 | |
| CVE-2026-27987 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX The Qlean the-qlean allows PHP Local File Inclusion.This issue affects The Qlean: from n/a through <= 2.12. |
2026-03-05 | |
| CVE-2026-27986 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX OsTende ostende allows PHP Local File Inclusion.This issue affects OsTende: from n/a through <= 1.4.3. |
2026-03-05 | |
| CVE-2026-27985 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Humanum humanum allows PHP Local File Inclusion.This issue affects Humanum: from n/a through <= 1.1.4. |
2026-03-05 | |
| CVE-2026-27984 | 9.0 | CRITICAL | CWE-94 | 0.0% p14 | 6.30 | Improper Control of Generation of Code ('Code Injection') vulnerability in Marke...Improper Control of Generation of Code ('Code Injection') vulnerability in Marketing Fire Widget Options widget-options allows Code Injection.This issue affects Widget Options: from n/a through <= 4.1.3. |
2026-03-05 | |
| CVE-2026-27983 | 9.8 | CRITICAL | CWE-266 | 0.1% p18 | 6.86 | Incorrect Privilege Assignment vulnerability in designthemes LMS Elementor Pro l...Incorrect Privilege Assignment vulnerability in designthemes LMS Elementor Pro lms-elementor-pro allows Privilege Escalation.This issue affects LMS Elementor Pro: from n/a through <= 1.0.4. |
2026-03-05 | |
| CVE-2026-27982 | 5.1 | MEDIUM | CWE-601 | 0.0% p8 | 3.57 | An open redirect vulnerability exists in django-allauth versions prior to 65.14....An open redirect vulnerability exists in django-allauth versions prior to 65.14.1 when SAML IdP initiated SSO is enabled (it is disabled by default), which may allow an attacker to redirect users to an arbitrary external website via a crafted URL. |
2026-03-05 | |
| CVE-2026-27541 | 7.1 | HIGH | CWE-266 | 0.0% p15 | 4.97 | Incorrect Privilege Assignment vulnerability in Josh Kohlbach Wholesale Suite wo...Incorrect Privilege Assignment vulnerability in Josh Kohlbach Wholesale Suite woocommerce-wholesale-prices allows Privilege Escalation.This issue affects Wholesale Suite: from n/a through <= 2.2.6. |
2026-03-05 | |
| CVE-2026-27439 | 9.8 | CRITICAL | CWE-502 | 0.1% p18 | 6.86 | Deserialization of Untrusted Data vulnerability in ThemeREX Dentario dentario al...Deserialization of Untrusted Data vulnerability in ThemeREX Dentario dentario allows Object Injection.This issue affects Dentario: from n/a through <= 1.5. |
2026-03-05 | |
| CVE-2026-27438 | 9.8 | CRITICAL | CWE-502 | 0.1% p18 | 6.86 | Deserialization of Untrusted Data vulnerability in ThemeREX Kingler kingler allo...Deserialization of Untrusted Data vulnerability in ThemeREX Kingler kingler allows Object Injection.This issue affects Kingler: from n/a through <= 1.7. |
2026-03-05 | |
| CVE-2026-27437 | 9.8 | CRITICAL | CWE-502 | 0.1% p18 | 6.86 | Deserialization of Untrusted Data vulnerability in ThemeREX Tennis Club tennis-s...Deserialization of Untrusted Data vulnerability in ThemeREX Tennis Club tennis-sportclub allows Object Injection.This issue affects Tennis Club: from n/a through <= 1.2.3. |
2026-03-05 | |
| CVE-2026-27428 | 8.5 | HIGH | CWE-89 | 0.0% p11 | 5.95 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti...Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Eagle-Themes Eagle Booking eagle-booking allows SQL Injection.This issue affects Eagle Booking: from n/a through <= 1.3.4.3. |
2026-03-05 | |
| CVE-2026-27417 | 9.8 | CRITICAL | CWE-502 | 0.1% p18 | 6.86 | Deserialization of Untrusted Data vulnerability in SeventhQueen Sweet Date sweet...Deserialization of Untrusted Data vulnerability in SeventhQueen Sweet Date sweetdate allows Object Injection.This issue affects Sweet Date: from n/a through < 4.0.1. |
2026-03-05 | |
| CVE-2026-27411 | 5.3 | MEDIUM | CWE-804 | 0.0% p12 | 3.71 | Guessable CAPTCHA vulnerability in jp-secure SiteGuard WP Plugin siteguard allow...Guessable CAPTCHA vulnerability in jp-secure SiteGuard WP Plugin siteguard allows Functionality Bypass.This issue affects SiteGuard WP Plugin: from n/a through <= 1.7.9. |
2026-03-05 | |
| CVE-2026-27406 | 7.5 | HIGH | CWE-201 | 0.0% p3 | 5.25 | Insertion of Sensitive Information Into Sent Data vulnerability in Joe Dolson My...Insertion of Sensitive Information Into Sent Data vulnerability in Joe Dolson My Tickets my-tickets allows Retrieve Embedded Sensitive Data.This issue affects My Tickets: from n/a through <= 2.1.0. |
2026-03-05 | |
| CVE-2026-27396 | 7.3 | HIGH | CWE-862 | 0.1% p16 | 5.11 | Missing Authorization vulnerability in e-plugins Directory Pro directory-pro all...Missing Authorization vulnerability in e-plugins Directory Pro directory-pro allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Directory Pro: from n/a through <= 2.5.6. |
2026-03-05 | |
| CVE-2026-27390 | 8.8 | HIGH | CWE-288 | 0.0% p6 | 6.16 | Authentication Bypass Using an Alternate Path or Channel vulnerability in design...Authentication Bypass Using an Alternate Path or Channel vulnerability in designthemes WeDesignTech Ultimate Booking Addon wedesigntech-ultimate-booking-addon allows Authentication Abuse.This issue affects WeDesignTech Ultimate Booking Addon: from n/a through <= 1.0.1. |
2026-03-05 | |
| CVE-2026-27389 | 9.8 | CRITICAL | CWE-288 | 0.1% p22 | 6.86 | Authentication Bypass Using an Alternate Path or Channel vulnerability in design...Authentication Bypass Using an Alternate Path or Channel vulnerability in designthemes WeDesignTech Ultimate Booking Addon wedesigntech-ultimate-booking-addon allows Authentication Abuse.This issue affects WeDesignTech Ultimate Booking Addon: from n/a through <= 1.0.1. |
2026-03-05 | |
| CVE-2026-27388 | 7.5 | HIGH | CWE-862 | 0.0% p4 | 5.25 | Missing Authorization vulnerability in designthemes DesignThemes Booking Manager...Missing Authorization vulnerability in designthemes DesignThemes Booking Manager designthemes-booking-manager allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects DesignThemes Booking Manager: from n/a through <= 2.0. |
2026-03-05 | |
| CVE-2026-27386 | 7.5 | HIGH | CWE-862 | 0.0% p13 | 5.25 | Missing Authorization vulnerability in designthemes DesignThemes Directory Addon...Missing Authorization vulnerability in designthemes DesignThemes Directory Addon designthemes-directory-addon allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects DesignThemes Directory Addon: from n/a through <= 1.8. |
2026-03-05 | |
| CVE-2026-27385 | 7.1 | HIGH | CWE-79 | 0.0% p11 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in designthemes DesignThemes Portfolio designthemes-portfolio allows Reflected XSS.This issue affects DesignThemes Portfolio: from n/a through <= 1.3. |
2026-03-05 | |
| CVE-2026-27384 | 9.0 | CRITICAL | CWE-1284 | 0.1% p23 | 6.30 | Improper Validation of Specified Quantity in Input vulnerability in BoldGrid W3 ...Improper Validation of Specified Quantity in Input vulnerability in BoldGrid W3 Total Cache w3-total-cache allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects W3 Total Cache: from n/a through <= 2.9.1. |
2026-03-05 | |
| CVE-2026-27383 | 8.1 | HIGH | CWE-98 | 0.1% p16 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in RadiusTheme Metro metro allows PHP Local File Inclusion.This issue affects Metro: from n/a through <= 2.13. |
2026-03-05 | |
| CVE-2026-27382 | 7.1 | HIGH | CWE-79 | 0.0% p11 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in RadiusTheme Metro metro allows DOM-Based XSS.This issue affects Metro: from n/a through <= 2.13. |
2026-03-05 | |
| CVE-2026-27381 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in thembay Aora aora allows PHP Local File Inclusion.This issue affects Aora: from n/a through <= 1.3.15. |
2026-03-05 | |
| CVE-2026-27379 | 8.8 | HIGH | CWE-502 | 0.1% p19 | 6.16 | Deserialization of Untrusted Data vulnerability in NextScripts NextScripts socia...Deserialization of Untrusted Data vulnerability in NextScripts NextScripts social-networks-auto-poster-facebook-twitter-g allows Object Injection.This issue affects NextScripts: from n/a through <= 4.4.7. |
2026-03-05 | |
| CVE-2026-27376 | 7.1 | HIGH | CWE-79 | 0.0% p11 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in JanStudio Claue - Clean, Minimal Elementor WooCommerce Theme claue allows Reflected XSS.This issue affects Claue - Clean, Minimal Elementor WooCommerce Theme: from n/a through <= 2.2.7. |
2026-03-05 | |
| CVE-2026-27375 | 7.1 | HIGH | CWE-79 | 0.0% p11 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in JanStudio Gecko gecko allows Reflected XSS.This issue affects Gecko: from n/a through <= 1.9.8. |
2026-03-05 | |
| CVE-2026-27374 | 7.5 | HIGH | CWE-862 | 0.0% p13 | 5.25 | Missing Authorization vulnerability in vanquish WooCommerce Order Details woocom...Missing Authorization vulnerability in vanquish WooCommerce Order Details woocommerce-order-details allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WooCommerce Order Details: from n/a through <= 3.1. |
2026-03-05 | |
| CVE-2026-27373 | 8.5 | HIGH | CWE-89 | 0.0% p11 | 5.95 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti...Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Essekia Tablesome tablesome allows Blind SQL Injection.This issue affects Tablesome: from n/a through <= 1.2.3. |
2026-03-05 | |
| CVE-2026-27370 | 7.5 | HIGH | CWE-201 | 0.0% p13 | 5.25 | Insertion of Sensitive Information Into Sent Data vulnerability in Premio Chaty ...Insertion of Sensitive Information Into Sent Data vulnerability in Premio Chaty chaty allows Retrieve Embedded Sensitive Data.This issue affects Chaty: from n/a through <= 3.5.1. |
2026-03-05 | |
| CVE-2026-27369 | 8.1 | HIGH | CWE-502 | 0.1% p18 | 5.67 | Deserialization of Untrusted Data vulnerability in BoldThemes Celeste celeste al...Deserialization of Untrusted Data vulnerability in BoldThemes Celeste celeste allows Object Injection.This issue affects Celeste: from n/a through <= 1.3.6. |
2026-03-05 | |
| CVE-2026-27367 | 7.1 | HIGH | CWE-79 | 0.0% p11 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ThemeGoods Musico allows Reflected XSS.This issue affects Musico: from n/a before 3.4.5. |
2026-03-05 | |
| CVE-2026-27363 | 7.1 | HIGH | CWE-79 | 0.0% p11 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in kamleshyadav WP Bakery Autoresponder Addon vc-autoresponder-addon allows Stored XSS.This issue affects WP Bakery Autoresponder Addon: from n/a through <= 1.0.6. |
2026-03-05 | |
| CVE-2026-27362 | 6.5 | MEDIUM | CWE-862 | 0.0% p11 | 4.55 | Missing Authorization vulnerability in kamleshyadav WP Bakery Autoresponder Addo...Missing Authorization vulnerability in kamleshyadav WP Bakery Autoresponder Addon vc-autoresponder-addon allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Bakery Autoresponder Addon: from n/a through <= 1.0.6. |
2026-03-05 | |
| CVE-2026-27361 | 7.5 | HIGH | CWE-862 | 0.0% p13 | 5.25 | Missing Authorization vulnerability in WebCodingPlace Responsive Posts Carousel ...Missing Authorization vulnerability in WebCodingPlace Responsive Posts Carousel Pro responsive-posts-carousel-pro allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Responsive Posts Carousel Pro: from n/a through <= 15.1. |
2026-03-05 | |
| CVE-2026-27359 | 7.1 | HIGH | CWE-79 | 0.0% p11 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in fox-themes Awa Plugins awa-plugins allows Reflected XSS.This issue affects Awa Plugins: from n/a through <= 1.4.4. |
2026-03-05 | |
| CVE-2026-27358 | 7.1 | HIGH | CWE-79 | 0.0% p11 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ThemeGoods Architecturer allows Reflected XSS.This issue affects Architecturer: from n/a before 3.9.5. |
2026-03-05 | |
| CVE-2026-27354 | 6.5 | MEDIUM | CWE-79 | 0.0% p11 | 4.55 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WebCodingPlace WooCommerce Coming Soon Product with Countdown woo-coming-soon-product allows Stored XSS.This issue affects WooCommerce Coming Soon Product with Countdown: from n/a through <= 5.0. |
2026-03-05 | |
| CVE-2026-27353 | 7.1 | HIGH | CWE-79 | 0.0% p11 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ThemeGoods Grand News grandnews allows Reflected XSS.This issue affects Grand News: from n/a through <= 3.4.3. |
2026-03-05 | |
| CVE-2026-27352 | 7.1 | HIGH | CWE-79 | 0.0% p11 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ThemeGoods Starto allows Reflected XSS.This issue affects Starto: from n/a before 2.2.5. |
2026-03-05 | |
| CVE-2026-27348 | 7.1 | HIGH | CWE-79 | 0.0% p11 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ThemeGoods Photography allows DOM-Based XSS.This issue affects Photography: from n/a before 7.7.6. |
2026-03-05 | |
| CVE-2026-27344 | 5.3 | MEDIUM | CWE-862 | 0.0% p12 | 3.71 | Missing Authorization vulnerability in inseriswiss inseri core inseri-core allow...Missing Authorization vulnerability in inseriswiss inseri core inseri-core allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects inseri core: from n/a through <= 1.0.5. |
2026-03-05 | |
| CVE-2026-27342 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Mikado-Themes TopFit - Fitness and Gym WordPress Theme topfit allows PHP Local File Inclusion.This issue affects TopFit - Fitness and Gym WordPress Theme: from n/a through <= 1.9. |
2026-03-05 | |
| CVE-2026-27341 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Mikado-Themes TopScorer - Sports WordPress Theme topscorer allows PHP Local File Inclusion.This issue affects TopScorer - Sports WordPress Theme: from n/a through <= 1.2. |
2026-03-05 | |
| CVE-2026-27340 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Apollo | Night Club, DJ Event WordPress Theme apollo allows PHP Local File Inclusion.This issue affects Apollo | Night Club, DJ Event WordPress Theme: from n/a through <= 1.3.1. |
2026-03-05 | |
| CVE-2026-27339 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Buzz Stone | Magazine & Viral Blog WordPress Theme buzzstone allows PHP Local File Inclusion.This issue affects Buzz Stone | Magazine & Viral Blog WordPress Theme: from n/a through <= 1.0.2. |
2026-03-05 | |
| CVE-2026-27338 | 8.8 | HIGH | CWE-502 | 0.1% p19 | 6.16 | Deserialization of Untrusted Data vulnerability in AivahThemes Car Zone carzone ...Deserialization of Untrusted Data vulnerability in AivahThemes Car Zone carzone allows Object Injection.This issue affects Car Zone: from n/a through <= 3.7. |
2026-03-05 | |
| CVE-2026-27337 | 8.1 | HIGH | CWE-98 | 0.1% p16 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Chronicle - Lifestyle Magazine & Blog WordPress Theme chronicle allows PHP Local File Inclusion.This issue affects Chronicle - Lifestyle Magazine & Blog WordPress Theme: from n/a through <= 1.0. |
2026-03-05 | |
| CVE-2026-27336 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Consultor | Consulting, Accounting & Legal Counsel WordPress Theme consultor allows PHP Local File Inclusion.This issue affects Consultor | Consulting, Accounting & Legal Counsel WordPress Theme: from n/a through <= 1.2.4. |
2026-03-05 | |
| CVE-2026-27335 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Ekoterra - NonProfit, Green Energy & Ecology Theme ekoterra allows PHP Local File Inclusion.This issue affects Ekoterra - NonProfit, Green Energy & Ecology Theme: from n/a through <= 1.0.0. |
2026-03-05 | |
| CVE-2026-27334 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in dan_fisher Alchemists alchemists allows PHP Local File Inclusion.This issue affects Alchemists: from n/a through <= 4.6.0. |
2026-03-05 | |
| CVE-2026-27332 | 7.1 | HIGH | CWE-79 | 0.0% p11 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in skygroup Agrofood agrofood allows Reflected XSS.This issue affects Agrofood: from n/a through < 1.4.0. |
2026-03-05 | |
| CVE-2026-27326 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes AC Services | HVAC, Air Conditioning & Heating Company WordPress Theme window-ac-services allows PHP Local File Inclusion.This issue affects AC Services | HVAC, Air Conditioning & Heating Company WordPress Theme: from n/a through <= 1.2.5. |
2026-03-05 | |
| CVE-2026-27098 | 8.1 | HIGH | CWE-502 | 0.1% p18 | 5.67 | Deserialization of Untrusted Data vulnerability in axiomthemes Au Pair Agency - ...Deserialization of Untrusted Data vulnerability in axiomthemes Au Pair Agency - Babysitting & Nanny Theme au-pair-agency allows Object Injection.This issue affects Au Pair Agency - Babysitting & Nanny Theme: from n/a through <= 1.2.2. |
2026-03-05 | |
| CVE-2026-27097 | 8.1 | HIGH | CWE-98 | 0.1% p16 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes CasaMia | Property Rental Real Estate WordPress Theme casamia allows PHP Local File Inclusion.This issue affects CasaMia | Property Rental Real Estate WordPress Theme: from n/a through <= 1.1.2. |
2026-03-05 | |
| CVE-2026-24963 | 7.2 | HIGH | CWE-266 | 0.1% p16 | 5.04 | Incorrect Privilege Assignment vulnerability in ameliabooking Amelia ameliabooki...Incorrect Privilege Assignment vulnerability in ameliabooking Amelia ameliabooking allows Privilege Escalation.This issue affects Amelia: from n/a through <= 1.2.38. |
2026-03-05 | |
| CVE-2026-24960 | 9.9 | CRITICAL | CWE-434 | 0.1% p17 | 6.93 | Unrestricted Upload of File with Dangerous Type vulnerability in zozothemes Char...Unrestricted Upload of File with Dangerous Type vulnerability in zozothemes Charety charety allows Using Malicious Files.This issue affects Charety: from n/a through < 2.0.2. |
2026-03-05 | |
| CVE-2026-24385 | 7.5 | HIGH | CWE-502 | 0.1% p19 | 5.25 | Deserialization of Untrusted Data vulnerability in gerritvanaaken Podlove Web Pl...Deserialization of Untrusted Data vulnerability in gerritvanaaken Podlove Web Player podlove-web-player allows Object Injection.This issue affects Podlove Web Player: from n/a through <= 5.9.1. |
2026-03-05 | |
| CVE-2026-23802 | 9.1 | CRITICAL | CWE-434 | 0.1% p17 | 6.37 | Unrestricted Upload of File with Dangerous Type vulnerability in Jordy Meow AI E...Unrestricted Upload of File with Dangerous Type vulnerability in Jordy Meow AI Engine ai-engine allows Using Malicious Files.This issue affects AI Engine: from n/a through <= 3.3.2. |
2026-03-05 | |
| CVE-2026-23801 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in fuelthemes The Issue theissue allows PHP Local File Inclusion.This issue affects The Issue: from n/a through <= 1.6.11. |
2026-03-05 | |
| CVE-2026-23799 | 6.5 | MEDIUM | CWE-862 | 0.0% p9 | 4.55 | Missing Authorization vulnerability in Themeum Tutor LMS tutor allows Exploiting...Missing Authorization vulnerability in Themeum Tutor LMS tutor allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Tutor LMS: from n/a through <= 3.9.5. |
2026-03-05 | |
| CVE-2026-23798 | 8.8 | HIGH | CWE-502 | 0.1% p19 | 6.16 | Deserialization of Untrusted Data vulnerability in blubrry PowerPress Podcasting...Deserialization of Untrusted Data vulnerability in blubrry PowerPress Podcasting powerpress allows Object Injection.This issue affects PowerPress Podcasting: from n/a through <= 11.15.10. |
2026-03-05 | |
| CVE-2026-23767 | 9.8 | CRITICAL | CWE-306 | 0.1% p20 | 6.86 | ESC/POS, a printer control language designed by Seiko Epson Corporation, lacks m...ESC/POS, a printer control language designed by Seiko Epson Corporation, lacks mechanisms for user authentication and command authorization, does not provide controls to restrict sources or destinations of network communication, and transmits commands without encryption or integrity protection. |
2026-03-05 | |
| CVE-2026-23546 | 6.5 | MEDIUM | CWE-201 | 0.0% p11 | 4.55 | Insertion of Sensitive Information Into Sent Data vulnerability in RadiusTheme C...Insertion of Sensitive Information Into Sent Data vulnerability in RadiusTheme Classified Listing classified-listing allows Retrieve Embedded Sensitive Data.This issue affects Classified Listing: from n/a through <= 5.3.4. |
2026-03-05 | |
| CVE-2026-22501 | 9.8 | CRITICAL | CWE-502 | 0.1% p18 | 6.86 | Deserialization of Untrusted Data vulnerability in axiomthemes Mounthood mountho...Deserialization of Untrusted Data vulnerability in axiomthemes Mounthood mounthood allows Object Injection.This issue affects Mounthood: from n/a through <= 1.3.2. |
2026-03-05 | |
| CVE-2026-22497 | 9.8 | CRITICAL | CWE-502 | 0.1% p18 | 6.86 | Deserialization of Untrusted Data vulnerability in AncoraThemes Jardi jardi allo...Deserialization of Untrusted Data vulnerability in AncoraThemes Jardi jardi allows Object Injection.This issue affects Jardi: from n/a through <= 1.7.2. |
2026-03-05 | |
| CVE-2026-22479 | 7.5 | HIGH | CWE-862 | 0.0% p13 | 5.25 | Missing Authorization vulnerability in ThemeRuby Easy Post Submission easy-post-...Missing Authorization vulnerability in ThemeRuby Easy Post Submission easy-post-submission allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Easy Post Submission: from n/a through <= 2.4.0. |
2026-03-05 | |
| CVE-2026-22478 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Elated-Themes FindAll findall allows PHP Local File Inclusion.This issue affects FindAll: from n/a through <= 1.4. |
2026-03-05 | |
| CVE-2026-22477 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Felizia felizia allows PHP Local File Inclusion.This issue affects Felizia: from n/a through <= 1.3.4. |
2026-03-05 | |
| CVE-2026-22476 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Elated-Themes Etchy etchy allows PHP Local File Inclusion.This issue affects Etchy: from n/a through <= 1.0. |
2026-03-05 | |
| CVE-2026-22475 | 9.8 | CRITICAL | CWE-502 | 0.1% p18 | 6.86 | Deserialization of Untrusted Data vulnerability in axiomthemes Estate estate all...Deserialization of Untrusted Data vulnerability in axiomthemes Estate estate allows Object Injection.This issue affects Estate: from n/a through <= 1.3.4. |
2026-03-05 | |
| CVE-2026-22474 | 9.8 | CRITICAL | CWE-502 | 0.1% p18 | 6.86 | Deserialization of Untrusted Data vulnerability in ThemeREX Equestrian Centre eq...Deserialization of Untrusted Data vulnerability in ThemeREX Equestrian Centre equestrian-centre allows Object Injection.This issue affects Equestrian Centre: from n/a through <= 1.5. |
2026-03-05 | |
| CVE-2026-22473 | 8.8 | HIGH | CWE-502 | 0.1% p19 | 6.16 | Deserialization of Untrusted Data vulnerability in designthemes Dental Clinic de...Deserialization of Untrusted Data vulnerability in designthemes Dental Clinic dental allows Object Injection.This issue affects Dental Clinic: from n/a through <= 3.7. |
2026-03-05 | |
| CVE-2026-22471 | 8.6 | HIGH | CWE-502 | 0.1% p17 | 6.02 | Deserialization of Untrusted Data vulnerability in maximsecudeal Secudeal Paymen...Deserialization of Untrusted Data vulnerability in maximsecudeal Secudeal Payments for Ecommerce secudeal-payments-for-ecommerce allows Object Injection.This issue affects Secudeal Payments for Ecommerce: from n/a through <= 1.1. |
2026-03-05 | |
| CVE-2026-22467 | 7.1 | HIGH | CWE-79 | 0.0% p11 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in mwtemplates DeepDigital deepdigital allows Reflected XSS.This issue affects DeepDigital: from n/a through <= 1.0.2. |
2026-03-05 | |
| CVE-2026-22465 | 7.1 | HIGH | CWE-79 | 0.0% p11 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in SeventhQueen BuddyApp buddyapp allows Reflected XSS.This issue affects BuddyApp: from n/a through <= 1.9.2. |
2026-03-05 | |
| CVE-2026-22460 | 8.6 | HIGH | CWE-22 | 0.1% p21 | 6.02 | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') v...Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in wpWax FormGent formgent allows Path Traversal.This issue affects FormGent: from n/a through <= 1.5.6. |
2026-03-05 | |
| CVE-2026-22459 | 6.5 | MEDIUM | CWE-862 | 0.1% p17 | 4.55 | Missing Authorization vulnerability in Blend Media WordPress CTA easy-sticky-sid...Missing Authorization vulnerability in Blend Media WordPress CTA easy-sticky-sidebar allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WordPress CTA: from n/a through <= 2.1.2. |
2026-03-05 | |
| CVE-2026-22457 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Mikado-Themes Wanderland wanderland allows PHP Local File Inclusion.This issue affects Wanderland: from n/a through <= 1.5. |
2026-03-05 | |
| CVE-2026-22456 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Elated-Themes Askka askka allows PHP Local File Inclusion.This issue affects Askka: from n/a through <= 1.0. |
2026-03-05 | |
| CVE-2026-22455 | 7.1 | HIGH | CWE-79 | 0.0% p11 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in foreverpinetree Thebe thebe allows Reflected XSS.This issue affects Thebe: from n/a through <= 1.3.0. |
2026-03-05 | |
| CVE-2026-22454 | 9.8 | CRITICAL | CWE-502 | 0.1% p18 | 6.86 | Deserialization of Untrusted Data vulnerability in ThemeREX Solaris solaris allo...Deserialization of Untrusted Data vulnerability in ThemeREX Solaris solaris allows Object Injection.This issue affects Solaris: from n/a through <= 2.5. |
2026-03-05 | |
| CVE-2026-22453 | 9.8 | CRITICAL | CWE-502 | 0.1% p18 | 6.86 | Deserialization of Untrusted Data vulnerability in ThemeREX Pets Club petclub al...Deserialization of Untrusted Data vulnerability in ThemeREX Pets Club petclub allows Object Injection.This issue affects Pets Club: from n/a through <= 2.3. |
2026-03-05 | |
| CVE-2026-22452 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Hoverex hoverex allows PHP Local File Inclusion.This issue affects Hoverex: from n/a through <= 1.5.10. |
2026-03-05 | |
| CVE-2026-22451 | 9.8 | CRITICAL | CWE-502 | 0.1% p18 | 6.86 | Deserialization of Untrusted Data vulnerability in AncoraThemes Handyman handyma...Deserialization of Untrusted Data vulnerability in AncoraThemes Handyman handyman-services allows Object Injection.This issue affects Handyman: from n/a through <= 1.4.7. |
2026-03-05 | |
| CVE-2026-22449 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Select-Themes Don Peppe donpeppe allows PHP Local File Inclusion.This issue affects Don Peppe: from n/a through <= 1.3. |
2026-03-05 | |
| CVE-2026-22446 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Select-Themes Prowess prowess allows PHP Local File Inclusion.This issue affects Prowess: from n/a through <= 1.8.1. |
2026-03-05 | |
| CVE-2026-22443 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Alliance alliance allows PHP Local File Inclusion.This issue affects Alliance: from n/a through <= 3.1.1. |
2026-03-05 | |
| CVE-2026-22442 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in LaunchandSell Tribe tribe allows PHP Local File Inclusion.This issue affects Tribe: from n/a through <= 1.7.3. |
2026-03-05 | |
| CVE-2026-22441 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Elated-Themes Zentrum zentrum allows PHP Local File Inclusion.This issue affects Zentrum: from n/a through <= 1.0. |
2026-03-05 | |
| CVE-2026-22440 | 7.1 | HIGH | CWE-79 | 0.0% p11 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in foreverpinetree Thecs thecs allows Reflected XSS.This issue affects Thecs: from n/a through <= 1.4.7. |
2026-03-05 | |
| CVE-2026-22439 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Green Planet green-planet allows PHP Local File Inclusion.This issue affects Green Planet: from n/a through <= 1.1.14. |
2026-03-05 | |
| CVE-2026-22438 | 7.1 | HIGH | CWE-79 | 0.0% p11 | 4.97 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in foreverpinetree TheBi thebi allows Reflected XSS.This issue affects TheBi: from n/a through <= 1.0.5. |
2026-03-05 | |
| CVE-2026-22437 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Playa playa allows PHP Local File Inclusion.This issue affects Playa: from n/a through <= 1.3.9. |
2026-03-05 | |
| CVE-2026-22436 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Elated-Themes Helvig helvig allows PHP Local File Inclusion.This issue affects Helvig: from n/a through <= 1.0. |
2026-03-05 | |
| CVE-2026-22435 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes ElectroServ electroserv allows PHP Local File Inclusion.This issue affects ElectroServ: from n/a through <= 1.3.2. |
2026-03-05 | |
| CVE-2026-22434 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Crown Art crown-art allows PHP Local File Inclusion.This issue affects Crown Art: from n/a through <= 1.2.11. |
2026-03-05 | |
| CVE-2026-22433 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes CloudMe cloudme allows PHP Local File Inclusion.This issue affects CloudMe: from n/a through <= 1.2.2. |
2026-03-05 | |
| CVE-2026-22432 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Woopy woopy allows PHP Local File Inclusion.This issue affects Woopy: from n/a through <= 1.2. |
2026-03-05 | |
| CVE-2026-22431 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Wabi-Sabi wabi-sabi allows PHP Local File Inclusion.This issue affects Wabi-Sabi: from n/a through <= 1.2. |
2026-03-05 | |
| CVE-2026-22429 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Mikado-Themes Verdure verdure allows PHP Local File Inclusion.This issue affects Verdure: from n/a through <= 1.6. |
2026-03-05 | |
| CVE-2026-22428 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Tooth Fairy tooth-fairy allows PHP Local File Inclusion.This issue affects Tooth Fairy: from n/a through <= 1.16. |
2026-03-05 | |
| CVE-2026-22427 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Mikado-Themes GoTravel gotravel allows PHP Local File Inclusion.This issue affects GoTravel: from n/a through <= 2.1. |
2026-03-05 | |
| CVE-2026-22425 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Elated-Themes Sweet Jane sweetjane allows PHP Local File Inclusion.This issue affects Sweet Jane: from n/a through <= 1.2. |
2026-03-05 | |
| CVE-2026-22424 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Shaha shaha allows PHP Local File Inclusion.This issue affects Shaha: from n/a through <= 1.1.2. |
2026-03-05 | |
| CVE-2026-22423 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Select-Themes SetSail setsail allows PHP Local File Inclusion.This issue affects SetSail: from n/a through <= 1.8. |
2026-03-05 | |
| CVE-2026-22421 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Quantum quantum allows PHP Local File Inclusion.This issue affects Quantum: from n/a through <= 1.0. |
2026-03-05 | |
| CVE-2026-22420 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Horizon horizon allows PHP Local File Inclusion.This issue affects Horizon: from n/a through <= 1.1. |
2026-03-05 | |
| CVE-2026-22419 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Honor honor allows PHP Local File Inclusion.This issue affects Honor: from n/a through <= 2.3. |
2026-03-05 | |
| CVE-2026-22418 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Great Lotus great-lotus allows PHP Local File Inclusion.This issue affects Great Lotus: from n/a through <= 1.3.1. |
2026-03-05 | |
| CVE-2026-22417 | 8.1 | HIGH | CWE-502 | 0.1% p18 | 5.67 | Deserialization of Untrusted Data vulnerability in ThemeGoods Grand Wedding gran...Deserialization of Untrusted Data vulnerability in ThemeGoods Grand Wedding grandwedding allows Object Injection.This issue affects Grand Wedding: from n/a through <= 3.1.0. |
2026-03-05 | |
| CVE-2026-22416 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes FixTeam fixteam allows PHP Local File Inclusion.This issue affects FixTeam: from n/a through <= 1.5.0. |
2026-03-05 | |
| CVE-2026-22415 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes The Mounty the-mounty allows PHP Local File Inclusion.This issue affects The Mounty: from n/a through <= 1.1. |
2026-03-05 | |
| CVE-2026-22414 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Mikado-Themes Marra marra allows PHP Local File Inclusion.This issue affects Marra: from n/a through <= 1.2. |
2026-03-05 | |
| CVE-2026-22413 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Mikado-Themes Malgré malgre allows PHP Local File Inclusion.This issue affects Malgré: from n/a through <= 1.0.3. |
2026-03-05 | |
| CVE-2026-22412 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Mikado-Themes Eona eona allows PHP Local File Inclusion.This issue affects Eona: from n/a through <= 1.3. |
2026-03-05 | |
| CVE-2026-22410 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Mikado-Themes Dolcino dolcino allows PHP Local File Inclusion.This issue affects Dolcino: from n/a through <= 1.6. |
2026-03-05 | |
| CVE-2026-22408 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Mikado-Themes Justicia justicia allows PHP Local File Inclusion.This issue affects Justicia: from n/a through <= 1.2. |
2026-03-05 | |
| CVE-2026-22405 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Mikado-Themes Overton overton allows PHP Local File Inclusion.This issue affects Overton: from n/a through <= 1.3. |
2026-03-05 | |
| CVE-2026-22403 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Mikado-Themes Innovio innovio allows PHP Local File Inclusion.This issue affects Innovio: from n/a through <= 1.7. |
2026-03-05 | |
| CVE-2026-22399 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Mikado-Themes Holmes holmes allows PHP Local File Inclusion.This issue affects Holmes: from n/a through <= 1.7. |
2026-03-05 | |
| CVE-2026-22397 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Mikado-Themes Fleur fleur allows PHP Local File Inclusion.This issue affects Fleur: from n/a through <= 2.0. |
2026-03-05 | |
| CVE-2026-22395 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Mikado-Themes Fiorello fiorello allows PHP Local File Inclusion.This issue affects Fiorello: from n/a through <= 1.0. |
2026-03-05 | |
| CVE-2026-22394 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Mikado-Themes Evently evently allows PHP Local File Inclusion.This issue affects Evently: from n/a through <= 1.7. |
2026-03-05 | |
| CVE-2026-22392 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Mikado-Themes Cortex cortex allows PHP Local File Inclusion.This issue affects Cortex: from n/a through <= 1.5. |
2026-03-05 | |
| CVE-2026-22390 | 9.9 | CRITICAL | CWE-94 | 0.1% p18 | 6.93 | Improper Control of Generation of Code ('Code Injection') vulnerability in Build...Improper Control of Generation of Code ('Code Injection') vulnerability in Builderall Builderall Builder for WordPress builderall-cheetah-for-wp allows Code Injection.This issue affects Builderall Builder for WordPress: from n/a through <= 3.0.1. |
2026-03-05 | |
| CVE-2026-22389 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Mikado-Themes Cocco cocco allows PHP Local File Inclusion.This issue affects Cocco: from n/a through <= 1.5.1. |
2026-03-05 | |
| CVE-2026-22387 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Mikado-Themes Aviana aviana allows PHP Local File Inclusion.This issue affects Aviana: from n/a through <= 2.1. |
2026-03-05 | |
| CVE-2026-22385 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in don-themes Wolmart wolmart allows PHP Local File Inclusion.This issue affects Wolmart: from n/a through <= 1.9.6. |
2026-03-05 | |
| CVE-2025-69411 | 7.5 | HIGH | CWE-22 | 0.1% p19 | 5.25 | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') v...Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Robert Seyfriedsberger ionCube tester plus ioncube-tester-plus allows Path Traversal.This issue affects ionCube tester plus: from n/a through <= 1.3. |
2026-03-05 | |
| CVE-2025-69343 | 6.5 | MEDIUM | CWE-79 | 0.0% p11 | 4.55 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti...Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Jeroen Schmit Theater for WordPress theatre allows Stored XSS.This issue affects Theater for WordPress: from n/a through <= 0.19. |
2026-03-05 | |
| CVE-2025-69340 | 7.5 | HIGH | CWE-862 | 0.0% p13 | 5.25 | Missing Authorization vulnerability in BuddhaThemes WeDesignTech Ultimate Bookin...Missing Authorization vulnerability in BuddhaThemes WeDesignTech Ultimate Booking Addon wedesigntech-ultimate-booking-addon allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WeDesignTech Ultimate Booking Addon: from n/a through <= 1.0.3. |
2026-03-05 | |
| CVE-2025-69339 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in don-themes Molla molla allows PHP Local File Inclusion.This issue affects Molla: from n/a through <= 1.5.16. |
2026-03-05 | |
| CVE-2025-69338 | 9.3 | CRITICAL | CWE-89 | 0.0% p12 | 6.51 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti...Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in don-themes Riode Core riode-core allows Blind SQL Injection.This issue affects Riode Core: from n/a through <= 1.6.26. |
2026-03-05 | |
| CVE-2025-69090 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ovatheme Remons remons allows PHP Local File Inclusion.This issue affects Remons: from n/a through <= 1.3.4. |
2026-03-05 | |
| CVE-2025-68555 | 9.9 | CRITICAL | CWE-434 | 0.1% p17 | 6.93 | Unrestricted Upload of File with Dangerous Type vulnerability in zozothemes Nutr...Unrestricted Upload of File with Dangerous Type vulnerability in zozothemes Nutrie nutrie allows Upload a Web Shell to a Web Server.This issue affects Nutrie: from n/a through < 2.0.1. |
2026-03-05 | |
| CVE-2025-68554 | 9.9 | CRITICAL | CWE-434 | 0.1% p17 | 6.93 | Unrestricted Upload of File with Dangerous Type vulnerability in zozothemes Keen...Unrestricted Upload of File with Dangerous Type vulnerability in zozothemes Keenarch keenarch allows Using Malicious Files.This issue affects Keenarch: from n/a through < 2.0.1. |
2026-03-05 | |
| CVE-2025-68553 | 9.9 | CRITICAL | CWE-434 | 0.1% p17 | 6.93 | Unrestricted Upload of File with Dangerous Type vulnerability in zozothemes Lend...Unrestricted Upload of File with Dangerous Type vulnerability in zozothemes Lendiz lendiz allows Upload a Web Shell to a Web Server.This issue affects Lendiz: from n/a through < 2.0.1. |
2026-03-05 | |
| CVE-2025-68515 | 5.8 | MEDIUM | CWE-201 | 0.0% p11 | 4.06 | Insertion of Sensitive Information Into Sent Data vulnerability in Roland Murg W...Insertion of Sensitive Information Into Sent Data vulnerability in Roland Murg WP Booking System wp-booking-system allows Retrieve Embedded Sensitive Data.This issue affects WP Booking System: from n/a through <= 2.0.19.12. |
2026-03-05 | |
| CVE-2025-54001 | 9.8 | CRITICAL | CWE-502 | 0.1% p18 | 6.86 | Deserialization of Untrusted Data vulnerability in ThemeREX Classter classter al...Deserialization of Untrusted Data vulnerability in ThemeREX Classter classter allows Object Injection.This issue affects Classter: from n/a through <= 2.5. |
2026-03-05 | |
| CVE-2025-53335 | 8.1 | HIGH | CWE-98 | 0.2% p37 | 5.67 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP ...Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Berger berger allows PHP Local File Inclusion.This issue affects Berger: from n/a through <= 1.1.1. |
2026-03-05 | |
| CVE-2026-3523 | 4.9 | MEDIUM | CWE-89 | 0.1% p18 | 3.43 | The Apocalypse Meow plugin for WordPress is vulnerable to SQL Injection via the ...The Apocalypse Meow plugin for WordPress is vulnerable to SQL Injection via the 'type' parameter in all versions up to, and including, 22.1.0. This is due to a flawed logical operator in the type validation check on line 261 of ajax.php — the condition uses `&&` (AND) instead of `||` (OR), causing the `in_array()` validation to be short-circuited and never evaluated for any non-empty type value. Combined with `stripslashes_deep()` being called on line 101 which removes `wp_magic_quotes()` protection, attacker-controlled single quotes pass through unescaped into the SQL query on line 298. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. |
2026-03-05 | |
| CVE-2026-3034 | 6.4 | MEDIUM | CWE-79 | 0.0% p12 | 4.48 | The OoohBoi Steroids for Elementor plugin for WordPress is vulnerable to Stored ...The OoohBoi Steroids for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the _ob_spacerat_link, _ob_bbad_link, and _ob_teleporter_link URL parameters in all versions up to, and including, 2.1.24. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user clicks on the injected element. |
2026-03-05 | |
| CVE-2026-2365 | 7.2 | HIGH | CWE-79 | 0.3% p49 | 5.05 | The Fluent Forms Pro plugin for WordPress is vulnerable to Stored Cross-Site Scr...The Fluent Forms Pro plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the `fluentform_step_form_save_data` AJAX action in all versions up to, and including, 6.1.17. This is due to the draft form submission endpoint being publicly accessible without authentication or nonce verification, combined with insufficient input sanitization and output escaping of form field data. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever an administrator views a partial form entry. |
2026-03-05 | |
| CVE-2026-29127 | 9.2 | CRITICAL | CWE-269 | 0.0% p0 | 6.44 | The IDC SFX2100 Satellite Receiver sets overly permissive file system permission...The IDC SFX2100 Satellite Receiver sets overly permissive file system permissions on the monitor user's home directory. The directory is configured with permissions 0777, granting read, write, and execute access to all local users on the system, which may cause local privilege escalation depending on conditions of the system due to the presence of highly privileged processes and binaries residing within the affected directory. |
2026-03-05 | |
| CVE-2026-26034 | 8.5 | HIGH | CWE-276 | 0.0% p0 | 5.95 | UPS Multi-UPS Management Console (MUMC) version 01.06.0001 (A03) contains an Inc...UPS Multi-UPS Management Console (MUMC) version 01.06.0001 (A03) contains an Incorrect Default Permissions (CWE-276) vulnerability that allows an attacker to execute arbitrary code with SYSTEM privileges by causing the application to load a specially crafted DLL. |
2026-03-05 | |
| CVE-2026-26033 | 8.4 | HIGH | CWE-428 | 0.0% p0 | 5.88 | UPS Multi-UPS Management Console (MUMC) version 01.06.0001 (A03) contains an Unq...UPS Multi-UPS Management Console (MUMC) version 01.06.0001 (A03) contains an Unquoted Search Path or Element (CWE-428) vulnerability, which allows a user with write access to a directory on the system drive to execute arbitrary code with SYSTEM privileges. |
2026-03-05 | |
| CVE-2026-29126 | 8.5 | HIGH | CWE-732 | 0.0% p3 | 5.95 | Incorrect permission assignment (world-writable file) in /etc/udhcpc/default.scr...Incorrect permission assignment (world-writable file) in /etc/udhcpc/default.script in International Data Casting (IDC) SFX2100 Satellite Receiver allows a local unprivileged attacker to potentially execute arbitrary commands with root privileges (local privilege escalation and persistence) via modification of a root-owned, world-writable BusyBox udhcpc DHCP event script, which is executed when a DHCP lease is obtained, renewed, or lost. |
2026-03-05 | |
| CVE-2026-29125 | 7.1 | HIGH | CWE-732 | 0.0% p3 | 4.97 | IDC SFX2100 Satalite Recievers set the `/etc/resolv.conf` file to be world-writa...IDC SFX2100 Satalite Recievers set the `/etc/resolv.conf` file to be world-writable by any local user, allowing DNS resolver tampering that can redirect network communications, facilitate man-in-the-middle attacks, and cause denial of service. |
2026-03-05 | |
| CVE-2026-29124 | 8.6 | HIGH | CWE-269 | 0.0% p3 | 6.02 | Multiple SUID root-owned binaries are found in /home/monitor/terminal, /home/mon...Multiple SUID root-owned binaries are found in /home/monitor/terminal, /home/monitor/kore-terminal, /home/monitor/IDE-DPack/terminal-dpack, and /home/monitor/IDE-DPack/terminal-dpack2 in International Data Casting (IDC) SFX2100 Satellite Receiver, which may lead to local privlidge escalation from the `monitor` user to root |
2026-03-05 | |
| CVE-2026-29123 | 8.6 | HIGH | CWE-269 | 0.0% p2 | 6.02 | A SUID root-owned binary in /home/xd/terminal/XDTerminal in International Data C...A SUID root-owned binary in /home/xd/terminal/XDTerminal in International Data Casting (IDC) SFX2100 on Linux allows a local actor to potentially preform local privilege escalation depending on conditions of the system via execution of the affected SUID binary. This can be via PATH hijacking, symlink abuse or shared object hijacking. |
2026-03-05 | |
| CVE-2026-29122 | 8.3 | HIGH | CWE-269 | 0.0% p4 | 5.81 | International Data Casting (IDC) SFX2100 satellite receiver comes with the `/bin...International Data Casting (IDC) SFX2100 satellite receiver comes with the `/bin/date` utility installed with the setuid bit set. This configuration grants elevated privileges to any local user who can execute the binary. A local actor is able to use the GTFObins resource to preform privileged file reads as the root user on the local file system. This allows an actor to be able to read any root read-only files, such as the /etc/shadow file or other configuration/secrets carrier files. |
2026-03-05 | |
| CVE-2026-29121 | 8.3 | HIGH | CWE-269 | 0.0% p6 | 5.81 | International Data Casting (IDC) SFX2100 satellite receiver comes with the `/sbi...International Data Casting (IDC) SFX2100 satellite receiver comes with the `/sbin/ip` utility installed with the setuid bit set. This configuration grants elevated privileges to any local user who can execute the binary. A local actor is able to use the GTFObins resource to preform privileged file reads as the root user on the local file system and may potentially lead to other avenues for preforming privileged actions. |
2026-03-05 | |
| CVE-2026-22052 | 5.3 | MEDIUM | CWE-209 | 0.0% p10 | 3.71 | ONTAP versions 9.12.1 and higher with S3 NAS buckets are susceptible to an infor...ONTAP versions 9.12.1 and higher with S3 NAS buckets are susceptible to an information disclosure vulnerability. Successful exploit could allow an authenticated attacker to view a listing of the contents in a directory for which they lack permission. |
2026-03-05 | |
| CVE-2026-2297 | 5.7 | MEDIUM | CWE-668 | 0.0% p4 | 3.99 | The import hook in CPython that handles legacy *.pyc files (SourcelessFileLoader...The import hook in CPython that handles legacy *.pyc files (SourcelessFileLoader) is incorrectly handled in FileLoader (a base class) and so does not use io.open_code() to read the .pyc files. sys.audit handlers for this audit event therefore do not fire. |
2026-03-04 | |
| CVE-2026-29086 | 5.4 | MEDIUM | CWE-1113 | 0.0% p10 | 3.78 | Hono is a Web application framework that provides support for any JavaScript run...Hono is a Web application framework that provides support for any JavaScript runtime. Prior to version 4.12.4, the setCookie() utility did not validate semicolons (;), carriage returns (\r), or newline characters (\n) in the domain and path options when constructing the Set-Cookie header. Because cookie attributes are delimited by semicolons, this could allow injection of additional cookie attributes if untrusted input was passed into these fields. This issue has been patched in version 4.12.4. |
2026-03-04 | |
| CVE-2026-29085 | 6.5 | MEDIUM | CWE-74 | 0.1% p17 | 4.55 | Hono is a Web application framework that provides support for any JavaScript run...Hono is a Web application framework that provides support for any JavaScript runtime. Prior to version 4.12.4, when using streamSSE() in Streaming Helper, the event, id, and retry fields were not validated for carriage return (\r) or newline (\n) characters. Because the SSE protocol uses line breaks as field delimiters, this could allow injection of additional SSE fields within the same event frame if untrusted input was passed into these fields. This issue has been patched in version 4.12.4. |
2026-03-04 | |
| CVE-2026-29045 | 7.5 | HIGH | CWE-177 | 0.0% p14 | 5.25 | Hono is a Web application framework that provides support for any JavaScript run...Hono is a Web application framework that provides support for any JavaScript runtime. Prior to version 4.12.4, when using serveStatic together with route-based middleware protections (e.g. app.use('/admin/*', ...)), inconsistent URL decoding allowed protected static resources to be accessed without authorization. The router used decodeURI, while serveStatic used decodeURIComponent. This mismatch allowed paths containing encoded slashes (%2F) to bypass middleware protections while still resolving to the intended filesystem path. This issue has been patched in version 4.12.4. |
2026-03-04 | |
| CVE-2026-26002 | 6.3 | MEDIUM | CWE-74 | 0.1% p18 | 4.41 | Open OnDemand is an open-source high-performance computing portal. The Files app...Open OnDemand is an open-source high-performance computing portal. The Files application in OnDemand versions prior to 4.0.9 and 4.1.3 is susceptible to malicious input when navigating to a directory. This has been patched in versions 4.0.9 and 4.1.3. Versions below this remain susceptible. |
2026-03-04 | |
| CVE-2025-41257 | 4.8 | MEDIUM | CWE-20 | 0.0% p3 | 3.36 | Suprema’s BioStar 2 in version 2.9.11.6 allows users to set new password without...Suprema’s BioStar 2 in version 2.9.11.6 allows users to set new password without providing the current one. Exploiting this flaw combined with other vulnerabilities can lead to unauthorized account access and potential system compromise. |
2026-03-04 | |
| CVE-2026-29000 | 9.3 | CRITICAL | CWE-347 | 0.1% p17 | 6.51 | pac4j-jwt versions prior to 4.5.9, 5.7.9, and 6.3.3 contain an authentication by...pac4j-jwt versions prior to 4.5.9, 5.7.9, and 6.3.3 contain an authentication bypass vulnerability in JwtAuthenticator when processing encrypted JWTs that allows remote attackers to forge authentication tokens. Attackers who possess the server's RSA public key can create a JWE-wrapped PlainJWT with arbitrary subject and role claims, bypassing signature verification to authenticate as any user including administrators. |
2026-03-04 | |
| CVE-2026-27898 | 5.4 | MEDIUM | CWE-639 | 0.0% p9 | 3.78 | Vaultwarden is an unofficial Bitwarden compatible server written in Rust, former...Vaultwarden is an unofficial Bitwarden compatible server written in Rust, formerly known as bitwarden_rs. Prior to version 1.35.4, an authenticated regular user can specify another user’s cipher_id and call "PUT /api/ciphers/{id}/partial" Even though the standard retrieval API correctly denies access to that cipher, the partial update endpoint returns 200 OK and exposes cipherDetails (including name, notes, data, secureNote, etc.). This issue has been patched in version 1.35.4. |
2026-03-04 | |
| CVE-2026-27803 | 8.3 | HIGH | CWE-269 | 0.1% p16 | 5.81 | Vaultwarden is an unofficial Bitwarden compatible server written in Rust, former...Vaultwarden is an unofficial Bitwarden compatible server written in Rust, formerly known as bitwarden_rs. Prior to version 1.35.4, when a Manager has manage=false for a given collection, they can still perform several management operations as long as they have access to the collection. This issue has been patched in version 1.35.4. |
2026-03-04 | |
| CVE-2026-27802 | 8.3 | HIGH | CWE-269 | 0.1% p16 | 5.81 | Vaultwarden is an unofficial Bitwarden compatible server written in Rust, former...Vaultwarden is an unofficial Bitwarden compatible server written in Rust, formerly known as bitwarden_rs. Prior to version 1.35.4, there is a privilege escalation vulnerability via bulk permission update to unauthorized collections by Manager. This issue has been patched in version 1.35.4. |
2026-03-04 | |
| CVE-2026-27801 | 6.0 | MEDIUM | CWE-307 | 0.0% p10 | 4.20 | Vaultwarden is an unofficial Bitwarden compatible server written in Rust, former...Vaultwarden is an unofficial Bitwarden compatible server written in Rust, formerly known as bitwarden_rs. Vaultwarden versions 1.34.3 and prior are susceptible to a 2FA bypass when performing protected actions. An attacker who gains authenticated access to a user’s account can exploit this bypass to perform protected actions such as accessing the user’s API key or deleting the user’s vault and organisations the user is an admin/owner of . This issue has been patched in version 1.35.0. |
2026-03-04 | |
| CVE-2026-25750 | 8.5 | HIGH | CWE-74 | 0.0% p13 | 5.95 | Langchain Helm Charts are Helm charts for deploying Langchain applications on Ku...Langchain Helm Charts are Helm charts for deploying Langchain applications on Kubernetes. Prior to langchain-ai/helm version 0.12.71, a URL parameter injection vulnerability existed in LangSmith Studio that could allow unauthorized access to user accounts through stolen authentication tokens. The vulnerability affected both LangSmith Cloud and self-hosted deployments. Authenticated LangSmith users who clicked on a specially crafted malicious link would have their bearer token, user ID, and workspace ID transmitted to an attacker-controlled server. With this stolen token, an attacker could impersonate the victim and access any LangSmith resources or perform any actions the user was authorized to perform within their workspace. The attack required social engineering (phishing, malicious links in emails or chat applications) to convince users to click the crafted URL. The stolen tokens expired after 5 minutes, though repeated attacks against the same user were possible if they could be convinced to click malicious links multiple times. The fix in version 0.12.71 implements validation requiring user-defined allowed origins for the baseUrl parameter, preventing tokens from being sent to unauthorized servers. No known workarounds are available. Self-hosted customers must upgrade to the patched version. |
2026-03-04 | |
| CVE-2026-22040 | 5.3 | MEDIUM | CWE-416 | 0.1% p16 | 3.71 | NanoMQ MQTT Broker (NanoMQ) is an all-around Edge Messaging Platform. In version...NanoMQ MQTT Broker (NanoMQ) is an all-around Edge Messaging Platform. In version 0.24.6, by generating a combined traffic pattern of high-frequency publishes and rapid reconnect/kick-out using the same ClientID and massive subscribe/unsubscribe jitter, it is possible to reliably trigger heap memory corruption in the Broker process, causing it to exit immediately with SIGABRT due to free(): invalid pointer. As of time of publication, no known patched versions are available. |
2026-03-04 | |
| CVE-2025-70222 | 9.8 | CRITICAL | CWE-121 | 0.1% p32 | 6.86 | Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime para...Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formLogin,goform/getAuthCode. |
2026-03-04 | |
| CVE-2025-68467 | 3.4 | LOW | CWE-200 | 0.0% p4 | 2.38 | Dark Reader is an accessibility browser extension that makes web pages colors da...Dark Reader is an accessibility browser extension that makes web pages colors dark. The dynamic dark mode feature of the extension works by analyzing the colors of web pages found in CSS style sheet files. In order to analyze cross-origin style sheets (stored on websites different from the original web page), Dark Reader requests such files via a background worker, ensuring the request is performed with no credentials and that the content type of the response is a CSS file. Prior to Dark Reader 4.9.117, this style content was assigned to an HTML Style Element in order to parse and loop through style declarations, and also stored in page's Session Storage for performance gains. This could allow a website author to request a style sheet from a locally running web server, for example by having a link pointing to `http[:]//localhost[:]8080/style[.]css`. The brute force of the host name, port and file name would be unlikely due to performance impact, that would cause the browser tab to hang shortly, but it could be possible to request a style sheet if the full URL was known in advance. As per December 18, 2025 there is no known exploit of the issue. The problem has been fixed in version 4.9.117 on December 3, 2025. The style sheets are now parsed using modern Constructed Style Sheets API and the contents of cross-origin style sheets is no longer stored in page's Session Storage. Version 4.9.118 (December 8, 2025) restricts cross-origin requests to localhost aliases, IP addresses, hosts with ports and non-HTTPS resources. The absolute majority of users have received an update 4.1.117 or 4.9.118 automatically within a week. However users must ensure their automatic updates are not blocked and they are using the latest version of the extension by going to chrome://extensions or about:addons pages in browser settings. Users utilizing manual builds must upgrade to version 4.9.118 and above. Developers using `darkreader` NPM package for their own websites are likely not affected, but must ensure the function passed to `setFetchMethod()` for performing cross-origin requests works within the intended scope. Developers using custom forks of earlier versions of Dark Reader to build other extensions or integrating into their apps or browsers must ensure they perform cross-origin requests safely and the responses are not accessible outside of the app or extension. |
2026-03-04 | |
| CVE-2025-66024 | 8.6 | HIGH | CWE-79 | 0.0% p14 | 6.02 | The XWiki blog application allows users of the XWiki platform to create and mana...The XWiki blog application allows users of the XWiki platform to create and manage blog posts. Versions prior to 9.15.7 are vulnerable to Stored Cross-Site Scripting (XSS) via the Blog Post Title. The vulnerability arises because the post title is injected directly into the HTML <title> tag without proper escaping. An attacker with permissions to create or edit blog posts can inject malicious JavaScript into the title field. This script will execute in the browser of any user (including administrators) who views the blog post. This leads to potential session hijacking or privilege escalation. The vulnerability has been patched in the blog application version 9.15.7 by adding missing escaping. No known workarounds are available. |
2026-03-04 | |
| CVE-2025-70225 | 9.8 | CRITICAL | CWE-121 | 0.1% p32 | 6.86 | Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curtime para...Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curtime parameter to the goform/formEasySetupWWConfig component |
2026-03-04 | |
| CVE-2025-70221 | 9.8 | CRITICAL | CWE-121 | 0.1% p32 | 6.86 | Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime para...Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formLogin. |
2026-03-04 | |
| CVE-2025-46108 | 9.8 | CRITICAL | CWE-120 | 0.1% p32 | 6.86 | D-link Dir-513 A1FW110 is vulnerable to Buffer Overflow in the function formTcpi...D-link Dir-513 A1FW110 is vulnerable to Buffer Overflow in the function formTcpipSetup. |
2026-03-04 | |
| CVE-2026-3545 | 9.6 | CRITICAL | CWE-20 | 0.1% p32 | 6.72 | Insufficient data validation in Navigation in Google Chrome prior to 145.0.7632....Insufficient data validation in Navigation in Google Chrome prior to 145.0.7632.159 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High) |
2026-03-04 | |
| CVE-2026-3544 | 8.8 | HIGH | CWE-122 | 0.1% p26 | 6.16 | Heap buffer overflow in WebCodecs in Google Chrome prior to 145.0.7632.159 allow...Heap buffer overflow in WebCodecs in Google Chrome prior to 145.0.7632.159 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High) |
2026-03-04 | |
| CVE-2026-3543 | 8.8 | HIGH | CWE-284 | 0.1% p24 | 6.16 | Inappropriate implementation in V8 in Google Chrome prior to 145.0.7632.159 allo...Inappropriate implementation in V8 in Google Chrome prior to 145.0.7632.159 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High) |
2026-03-04 | |
| CVE-2026-3542 | 8.8 | HIGH | CWE-284 | 0.1% p23 | 6.16 | Inappropriate implementation in WebAssembly in Google Chrome prior to 145.0.7632...Inappropriate implementation in WebAssembly in Google Chrome prior to 145.0.7632.159 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High) |
2026-03-04 | |
| CVE-2026-3541 | 8.8 | HIGH | CWE-284 | 0.1% p24 | 6.16 | Inappropriate implementation in CSS in Google Chrome prior to 145.0.7632.159 all...Inappropriate implementation in CSS in Google Chrome prior to 145.0.7632.159 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High) |
2026-03-04 | |
| CVE-2026-3540 | 8.8 | HIGH | CWE-125 | 0.1% p23 | 6.16 | Inappropriate implementation in WebAudio in Google Chrome prior to 145.0.7632.15...Inappropriate implementation in WebAudio in Google Chrome prior to 145.0.7632.159 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High) |
2026-03-04 | |
| CVE-2026-3539 | 8.8 | HIGH | CWE-1091 | 0.0% p0 | 6.16 | Object lifecycle issue in DevTools in Google Chrome prior to 145.0.7632.159 allo...Object lifecycle issue in DevTools in Google Chrome prior to 145.0.7632.159 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension. (Chromium security severity: High) |
2026-03-04 | |
| CVE-2026-3538 | 8.8 | HIGH | CWE-472 | 0.1% p25 | 6.16 | Integer overflow in Skia in Google Chrome prior to 145.0.7632.159 allowed a remo...Integer overflow in Skia in Google Chrome prior to 145.0.7632.159 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. (Chromium security severity: Critical) |
2026-03-04 | |
| CVE-2026-3537 | 8.8 | HIGH | CWE-787 | 0.1% p25 | 6.16 | Object lifecycle issue in PowerVR in Google Chrome on Android prior to 145.0.763...Object lifecycle issue in PowerVR in Google Chrome on Android prior to 145.0.7632.159 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical) |
2026-03-04 | |
| CVE-2026-3536 | 8.8 | HIGH | CWE-472 | 0.1% p25 | 6.16 | Integer overflow in ANGLE in Google Chrome prior to 145.0.7632.159 allowed a rem...Integer overflow in ANGLE in Google Chrome prior to 145.0.7632.159 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. (Chromium security severity: Critical) |
2026-03-04 | |
| CVE-2026-28435 | 7.5 | HIGH | CWE-400 | 0.1% p23 | 5.25 | cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library...cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library. Prior to 0.35.0, cpp-httplib (httplib.h) does not enforce Server::set_payload_max_length() on the decompressed request body when using HandlerWithContentReader (streaming ContentReader) with Content-Encoding: gzip (or other supported encodings). A small compressed payload can expand beyond the configured payload limit and be processed by the application, enabling a payload size limit bypass and potential denial of service (CPU/memory exhaustion). This vulnerability is fixed in 0.35.0. |
2026-03-04 | |
| CVE-2026-28434 | 5.3 | MEDIUM | CWE-200 | 0.1% p27 | 3.71 | cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library...cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library. Prior to 0.35.0, when a request handler throws a C++ exception and the application has not registered a custom exception handler via set_exception_handler(), the library catches the exception and writes its message directly into the HTTP response as a header named EXCEPTION_WHAT. This header is sent to whoever made the request, with no authentication check and no special configuration required to trigger it. The behavior is on by default. A developer who does not know to opt in to set_exception_handler() will ship a server that leaks internal exception messages to any client. This vulnerability is fixed in 0.35.0. |
2026-03-04 | |
| CVE-2026-28427 | 5.9 | MEDIUM | CWE-22 | 0.1% p20 | 4.13 | OpenDeck is Linux software for your Elgato Stream Deck. Prior to 2.8.1, the serv...OpenDeck is Linux software for your Elgato Stream Deck. Prior to 2.8.1, the service listening on port 57118 serves static files for installed plugins but does not properly sanitize path components. By including ../ sequences in the request path, an attacker can traverse outside the intended directory and read any file OpenDeck can access. This vulnerability is fixed in 2.8.1. |
2026-03-04 | |
| CVE-2025-70219 | 9.8 | CRITICAL | CWE-121 | 0.1% p32 | 6.86 | Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the goform/formD...Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the goform/formDeviceReboot. |
2026-03-04 | |
| CVE-2026-0847 | 8.6 | HIGH | CWE-22 | 0.3% p54 | 6.03 | A vulnerability in NLTK versions up to and including 3.9.2 allows arbitrary file...A vulnerability in NLTK versions up to and including 3.9.2 allows arbitrary file read via path traversal in multiple CorpusReader classes, including WordListCorpusReader, TaggedCorpusReader, and BracketParseCorpusReader. These classes fail to properly sanitize or validate file paths, enabling attackers to traverse directories and access sensitive files on the server. This issue is particularly critical in scenarios where user-controlled file inputs are processed, such as in machine learning APIs, chatbots, or NLP pipelines. Exploitation of this vulnerability can lead to unauthorized access to sensitive files, including system files, SSH private keys, and API tokens, and may potentially escalate to remote code execution when combined with other vulnerabilities. |
2026-03-04 | |
| CVE-2025-70226 | 9.8 | CRITICAL | CWE-121 | 0.1% p32 | 6.86 | Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime para...Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formEasySetupWizard. |
2026-03-04 | |
| CVE-2025-70223 | 9.8 | CRITICAL | CWE-121 | 0.1% p32 | 6.86 | Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime para...Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formAdvNetwork. |
2026-03-04 | |
| CVE-2026-26949 | 5.5 | MEDIUM | CWE-863 | 0.0% p2 | 3.85 | Dell Device Management Agent (DDMA), versions prior to 26.02, contain an Incorre...Dell Device Management Agent (DDMA), versions prior to 26.02, contain an Incorrect Authorization vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of Privileges. |
2026-03-04 | |
| CVE-2025-70220 | 9.8 | CRITICAL | CWE-121 | 0.1% p32 | 6.86 | Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime para...Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formAutoDetecWAN_wizard4. |
2026-03-04 | |
| CVE-2025-70218 | 9.8 | CRITICAL | CWE-121 | 0.1% p32 | 6.86 | Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via POST to the gofo...Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via POST to the goform/formAdvFirewall component. |
2026-03-04 | |
| CVE-2019-25507 | 8.8 | HIGH | CWE-89 | 0.1% p30 | 6.16 | Ashop Shopping Cart Software contains an SQL injection vulnerability that allows...Ashop Shopping Cart Software contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the 'shop' parameter. Attackers can send GET requests to index.php with malicious 'shop' values using UNION-based SQL injection to extract sensitive database information. |
2026-03-04 | |
| CVE-2019-25506 | 8.8 | HIGH | CWE-89 | 0.3% p56 | 6.17 | FreeSMS 2.1.2 contains a boolean-based blind SQL injection vulnerability in the ...FreeSMS 2.1.2 contains a boolean-based blind SQL injection vulnerability in the password parameter that allows unauthenticated attackers to bypass authentication by injecting SQL code through the login endpoint. Attackers can exploit the vulnerable password parameter in requests to /pages/crc_handler.php?method=login to authenticate as any known user and subsequently modify their password via the profile update function. |
2026-03-04 | |
| CVE-2019-25505 | 7.1 | HIGH | CWE-89 | 0.0% p9 | 4.97 | Tradebox 5.4 contains an SQL injection vulnerability that allows authenticated a...Tradebox 5.4 contains an SQL injection vulnerability that allows authenticated attackers to manipulate database queries by injecting SQL code through the symbol parameter. Attackers can send POST requests to the monthly_deposit endpoint with malicious symbol values using boolean-based blind, time-based blind, error-based, or union-based SQL injection techniques to extract sensitive database information. |
2026-03-04 | |
| CVE-2019-25504 | 8.8 | HIGH | CWE-89 | 0.1% p30 | 6.16 | NCrypted Jobgator contains an SQL injection vulnerability that allows unauthenti...NCrypted Jobgator contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the experience parameter. Attackers can send POST requests to the agents Find-Jobs endpoint with malicious experience values to extract sensitive database information. |
2026-03-04 | |
| CVE-2019-25503 | 7.1 | HIGH | CWE-89 | 0.1% p25 | 4.97 | PHPads 2.0 contains an SQL injection vulnerability that allows unauthenticated a...PHPads 2.0 contains an SQL injection vulnerability that allows unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code through the bannerID parameter in click.php3. Attackers can submit crafted bannerID values using SQL comment syntax and functions like extractvalue to extract sensitive database information such as the current database name. |
2026-03-04 | |
| CVE-2019-25502 | 5.1 | MEDIUM | CWE-79 | 0.1% p22 | 3.57 | Simple Job Script contains a cross-site scripting vulnerability that allows unau...Simple Job Script contains a cross-site scripting vulnerability that allows unauthenticated attackers to inject malicious scripts by manipulating the job_type_value parameter in the jobs endpoint. Attackers can craft requests with SVG payload injection to execute arbitrary JavaScript in victim browsers and steal session cookies or perform unauthorized actions. |
2026-03-04 | |
| CVE-2019-25501 | 8.8 | HIGH | CWE-89 | 0.1% p29 | 6.16 | Simple Job Script contains an SQL injection vulnerability that allows attackers ...Simple Job Script contains an SQL injection vulnerability that allows attackers to manipulate database queries by injecting malicious SQL code through the app_id parameter. Attackers can send POST requests to delete_application_ajax.php with crafted payloads to extract sensitive data, bypass authentication, or modify database contents. |
2026-03-04 | |
| CVE-2019-25500 | 8.8 | HIGH | CWE-89 | 0.1% p25 | 6.16 | Simple Job Script contains an SQL injection vulnerability that allows unauthenti...Simple Job Script contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the employerid parameter. Attackers can send POST requests to the register-recruiters endpoint with time-based SQL injection payloads to extract sensitive data or modify database contents. |
2026-03-04 | |
| CVE-2019-25499 | 8.8 | HIGH | CWE-89 | 0.3% p55 | 6.17 | Simple Job Script contains an SQL injection vulnerability that allows unauthenti...Simple Job Script contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the job_id parameter. Attackers can send POST requests to get_job_applications_ajax.php with malicious job_id values to bypass authentication, extract sensitive data, or modify database contents. |
2026-03-04 | |
| CVE-2019-25498 | 8.8 | HIGH | CWE-89 | 0.2% p48 | 6.17 | Simple Job Script contains an SQL injection vulnerability that allows unauthenti...Simple Job Script contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the landing_location parameter. Attackers can send POST requests to the searched endpoint with malicious SQL payloads to bypass authentication and extract sensitive database information. |
2026-03-04 | |
| CVE-2026-3520 | 8.7 | HIGH | CWE-674 | 0.1% p19 | 6.09 | Multer is a node.js middleware for handling `multipart/form-data`. A vulnerabili...Multer is a node.js middleware for handling `multipart/form-data`. A vulnerability in Multer prior to version 2.1.1 allows an attacker to trigger a Denial of Service (DoS) by sending malformed requests, potentially causing stack overflow. Users should upgrade to version 2.1.1 to receive a patch. No known workarounds are available. |
2026-03-04 | |
| CVE-2026-29069 | 6.9 | MEDIUM | CWE-639 | 0.1% p16 | 4.83 | Craft is a content management system (CMS). Prior to 5.9.0-beta.2 and 4.17.0-bet...Craft is a content management system (CMS). Prior to 5.9.0-beta.2 and 4.17.0-beta.2, the actionSendActivationEmail() endpoint is accessible to unauthenticated users and does not require a permission check for pending users. An attacker with no prior access can trigger activation emails for any pending user account by knowing or guessing the user ID. If the attacker controls the target user’s email address, they can activate the account and gain access to the system. This vulnerability is fixed in 5.9.0-beta.2 and 4.17.0-beta.2. |
2026-03-04 | |
| CVE-2026-28784 | 8.6 | HIGH | CWE-1336 | 0.1% p17 | 6.02 | Craft is a content management system (CMS). Prior to 5.8.22 and 4.16.18, it is p...Craft is a content management system (CMS). Prior to 5.8.22 and 4.16.18, it is possible to craft a malicious payload using the Twig map filter in text fields that accept Twig input under Settings in the Craft control panel or using the System Messages utility, which could lead to a RCE. For this to work, you must have administrator access to the Craft Control Panel, and allowAdminChanges must be enabled for this to work, which is against our recommendations for any non-dev environment. Alternatively, you can have a non-administrator account with allowAdminChanges disabled, but you have access to the System Messages utility. Users should update to the patched versions (5.8.22 and 4.16.18) to mitigate the issue. |
2026-03-04 | |
| CVE-2026-28783 | 9.4 | CRITICAL | CWE-94 | 0.1% p26 | 6.58 | Craft is a content management system (CMS). Prior to 5.9.0-beta.1 and 4.17.0-bet...Craft is a content management system (CMS). Prior to 5.9.0-beta.1 and 4.17.0-beta.1, Craft CMS implements a blocklist to prevent potentially dangerous PHP functions from being called via Twig non-Closure arrow functions. In order to be able to successfully execute this attack, you need to either have allowAdminChanges enabled on production, or a compromised admin account, or an account with access to the System Messages utility. Several PHP functions are not included in the blocklist, which could allow malicious actors with the required permissions to execute various types of payloads, including RCEs, arbitrary file reads, SSRFs, and SSTIs. This vulnerability is fixed in 5.9.0-beta.1 and 4.17.0-beta.1. |
2026-03-04 | |
| CVE-2026-28782 | 5.3 | MEDIUM | CWE-639 | 0.0% p10 | 3.71 | Craft is a content management system (CMS). Prior to 5.9.0-beta.1 and 4.17.0-bet...Craft is a content management system (CMS). Prior to 5.9.0-beta.1 and 4.17.0-beta.1, the "Duplicate" entry action does not properly verify if the user has permission to perform this action on the specific target elements. Even with only "View Entries" permission (where the "Duplicate" action is restricted in the UI), a user can bypass this restriction by sending a direct request. Furthermore, this vulnerability allows duplicating other users' entries by specifying their Entry IDs. Since Entry IDs are incremental, an attacker can trivially brute-force these IDs to duplicate and access restricted content across the system. This vulnerability is fixed in 5.9.0-beta.1 and 4.17.0-beta.1. |
2026-03-04 | |
| CVE-2026-28781 | 7.1 | HIGH | CWE-639 | 0.0% p13 | 4.97 | Craft is a content management system (CMS). Prior to 4.17.0-beta.1 and 5.9.0-bet...Craft is a content management system (CMS). Prior to 4.17.0-beta.1 and 5.9.0-beta.1, the entry creation process allows for Mass Assignment of the authorId attribute. A user with "Create Entries" permission can inject the authorIds[] (or authorId) parameter into the POST request, which the backend processes without verifying if the current user is authorized to assign authorship to others. Normally, this field is not present in the request for users without the necessary permissions. By manually adding this parameter, an attacker can attribute the new entry to any user, including Admins. This effectively "spoofs" the authorship. This vulnerability is fixed in 4.17.0-beta.1 and 5.9.0-beta.1. |
2026-03-04 | |
| CVE-2026-28697 | 9.4 | CRITICAL | CWE-1336 | 0.2% p42 | 6.59 | Craft is a content management system (CMS). Prior to 4.17.0-beta.1 and 5.9.0-bet...Craft is a content management system (CMS). Prior to 4.17.0-beta.1 and 5.9.0-beta.1, an authenticated administrator can achieve Remote Code Execution (RCE) by injecting a Server-Side Template Injection (SSTI) payload into Twig template fields (e.g., Email Templates). By calling the craft.app.fs.write() method, an attacker can write a malicious PHP script to a web-accessible directory and subsequently access it via the browser to execute arbitrary system commands. This vulnerability is fixed in 4.17.0-beta.1 and 5.9.0-beta.1. |
2026-03-04 | |
| CVE-2026-28696 | 8.7 | HIGH | CWE-639 | 0.0% p6 | 6.09 | Craft is a content management system (CMS). Prior to 4.17.0-beta.1 and 5.9.0-bet...Craft is a content management system (CMS). Prior to 4.17.0-beta.1 and 5.9.0-beta.1, the GraphQL directive @parseRefs, intended to parse internal reference tags (e.g., {user:1:email}), can be abused by both authenticated users and unauthenticated guests (if a Public Schema is enabled) to access sensitive attributes of any element in the CMS. The implementation in Elements::parseRefs fails to perform authorization checks, allowing attackers to read data they are not authorized to view. This vulnerability is fixed in 4.17.0-beta.1 and 5.9.0-beta.1. |
2026-03-04 | |
| CVE-2026-28695 | 7.5 | HIGH | CWE-1336 | 0.1% p22 | 5.25 | Craft is a content management system (CMS). There is an authenticated admin RCE ...Craft is a content management system (CMS). There is an authenticated admin RCE in Craft CMS 5.8.21 via Server-Side Template Injection using the create() Twig function combined with a Symfony Process gadget chain. The create() Twig function exposes Craft::createObject(), which allows instantiation of arbitrary PHP classes with constructor arguments. Combined with the bundled symfony/process dependency, this enables RCE. This bypasses the fix implemented for CVE-2025-57811 (patched in 5.8.7). This vulnerability is fixed in 5.9.0-beta.1 and 4.17.0-beta.1. |
2026-03-04 | |
| CVE-2026-23812 | 4.3 | MEDIUM | CWE-300 | 0.0% p5 | 3.01 | A vulnerability has been identified where an attacker connecting to an access po...A vulnerability has been identified where an attacker connecting to an access point as a standard wired or wireless client can impersonate a gateway by leveraging an address-based spoofing technique. Successful exploitation enables the redirection of data streams, allowing for the interception or modification of traffic intended for the legitimate network gateway via a Machine-in-the-Middle (MitM) position. |
2026-03-04 | |
| CVE-2026-23811 | 4.3 | MEDIUM | CWE-300 | 0.0% p5 | 3.01 | A vulnerability in the client isolation mechanism may allow an attacker to bypas...A vulnerability in the client isolation mechanism may allow an attacker to bypass Layer 2 (L2) communication restrictions between clients and redirect traffic at Layer 3 (L3). In addition to bypassing policy enforcement, successful exploitation - when combined with a port-stealing attack - may enable a bi-directional Machine-in-the-Middle (MitM) attack. |
2026-03-04 | |
| CVE-2026-23810 | 4.3 | MEDIUM | CWE-300 | 0.0% p9 | 3.01 | A vulnerability in the packet processing logic may allow an authenticated attack...A vulnerability in the packet processing logic may allow an authenticated attacker to craft and transmit a malicious Wi-Fi frame that causes an Access Point (AP) to classify the frame as group-addressed traffic and re-encrypt it using the Group Temporal Key (GTK) associated with the victim's BSSID. Successful exploitation may enable GTK-independent traffic injection and, when combined with a port-stealing technique, allows an attacker to redirect intercepted traffic to facilitate machine-in-the-middle (MitM) attacks across BSSID boundaries. |
2026-03-04 | |
| CVE-2026-23809 | 5.4 | MEDIUM | CWE-400 | 0.0% p8 | 3.78 | A technique has been identified that adapts a known port-stealing method to Wi-F...A technique has been identified that adapts a known port-stealing method to Wi-Fi environments that use multiple BSSIDs. By leveraging the relationship between BSSIDs and their associated virtual ports, an attacker could potentially bypass inter-BSSID isolation controls. Successful exploitation may enable an attacker to redirect and intercept the victim's network traffic, potentially resulting in eavesdropping, session hijacking, or denial of service. |
2026-03-04 | |
| CVE-2026-23808 | 5.4 | MEDIUM | CWE-94 | 0.1% p22 | 3.78 | A vulnerability has been identified in a standardized wireless roaming protocol ...A vulnerability has been identified in a standardized wireless roaming protocol that could enable a malicious actor to install an attacker-controlled Group Temporal Key (GTK) on a client device. Successful exploitation of this vulnerability could allow a remote malicious actor to perform unauthorized frame injection, bypass client isolation, interfere with cross-client traffic, and compromise network segmentation, integrity, and confidentiality. |
2026-03-04 | |
| CVE-2026-23601 | 5.4 | MEDIUM | CWE-327 | 0.0% p0 | 3.78 | A vulnerability has been identified in the wireless encryption handling of Wi-Fi...A vulnerability has been identified in the wireless encryption handling of Wi-Fi transmissions. A malicious actor can generate shared-key authenticated transmissions containing targeted payloads while impersonating the identity of a primary BSSID.Successful exploitation allows for the delivery of tampered data to specific endpoints, bypassing standard cryptographic separation. |
2026-03-04 | |
| CVE-2026-22760 | 3.3 | LOW | CWE-754 | 0.0% p3 | 2.31 | Dell Device Management Agent (DDMA), versions prior to 26.02, contain an Imprope...Dell Device Management Agent (DDMA), versions prior to 26.02, contain an Improper Check for Unusual or Exceptional Conditions vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Denial of Service. |
2026-03-04 | |
| CVE-2025-69969 | 9.6 | CRITICAL | CWE-311 | 0.1% p17 | 6.72 | A lack of authentication and authorization mechanisms in the Bluetooth Low Energ...A lack of authentication and authorization mechanisms in the Bluetooth Low Energy (BLE) communication protocol of SRK Powertech Pvt Ltd Pebble Prism Ultra v2.9.2 allows attackers to reverse engineer the protocol and execute arbitrary commands on the device without establishing a connection. This is exploitable over Bluetooth Low Energy (BLE) proximity (Adjacent), requiring no physical contact with the device. Furthermore, the vulnerability is not limited to arbitrary commands but includes cleartext data interception and unauthenticated firmware hijacking via OTA services. |
2026-03-04 | |
| CVE-2025-66944 | 9.8 | CRITICAL | CWE-89 | 0.3% p53 | 6.87 | SQL Injection vulnerability in vran-dev databaseir v.1.0.7 and before allows a r...SQL Injection vulnerability in vran-dev databaseir v.1.0.7 and before allows a remote attacker to execute arbitrary code via the query parameter in the search API endpoint |
2026-03-04 | |
| CVE-2025-66678 | 9.8 | CRITICAL | NVD-CWE-noinfo | 0.1% p24 | 6.86 | An issue in the HwRwDrv.sys component of Nil Hardware Editor Hardware Read & Wri...An issue in the HwRwDrv.sys component of Nil Hardware Editor Hardware Read & Write Utility v1.25.11.26 and earlier allows attackers to execute arbitrary read and write operations via a crafted request. |
2026-03-04 | |
| CVE-2026-26673 | 7.5 | HIGH | CWE-400 | 0.2% p45 | 5.26 | An issue in DJI Mavic Mini, Spark, Mavic Air, Mini, Mini SE 0.1.00.0500 and belo...An issue in DJI Mavic Mini, Spark, Mavic Air, Mini, Mini SE 0.1.00.0500 and below allows a remote attacker to cause a denial of service via the DJI Enhanced-WiFi transmission subsystem |
2026-03-04 | |
| CVE-2026-26514 | 7.5 | HIGH | CWE-88 | 0.2% p41 | 5.26 | An Argument Injection vulnerability exists in bird-lg-go before commit 6187a4e. ...An Argument Injection vulnerability exists in bird-lg-go before commit 6187a4e. The traceroute module uses shlex.Split to parse user input without validation, allowing remote attackers to inject arbitrary flags (e.g., -w, -q) via the q parameter. This can be exploited to cause a Denial of Service (DoS) by exhausting system resources. |
2026-03-04 | |
| CVE-2026-26478 | 9.8 | CRITICAL | CWE-78 | 1.3% p80 | 6.90 | A shell command injection vulnerability in Mobvoi Tichome Mini smart speaker 012...A shell command injection vulnerability in Mobvoi Tichome Mini smart speaker 012-18853 and 027-58389 allows remote attackers to send a specially crafted UDP datagram and execute arbitrary shell code as the root account. |
2026-03-04 | |
| CVE-2026-22285 | 4.4 | MEDIUM | CWE-256 | 0.0% p4 | 3.08 | Dell Device Management Agent (DDMA), versions prior to 26.02, contain a Plaintex...Dell Device Management Agent (DDMA), versions prior to 26.02, contain a Plaintext Storage of Password vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Unauthorized Access. |
2026-03-04 | |
| CVE-2025-62879 | 6.8 | MEDIUM | CWE-532 | 0.0% p2 | 4.76 | A vulnerability has been identified within the Rancher Backup Operator, resultin...A vulnerability has been identified within the Rancher Backup Operator, resulting in the leakage of S3 tokens (both accessKey and secretKey) into the rancher-backup-operator pod's logs. |
2026-03-04 | |
| CVE-2025-59787 | 5.3 | MEDIUM | CWE-703 | 0.1% p16 | 3.71 | 2N Access Commander application version 3.4.2 and prior returns HTTP 500 Interna...2N Access Commander application version 3.4.2 and prior returns HTTP 500 Internal Server Error responses when receiving malformed or manipulated requests, indicating improper handling of invalid input and potential security or availability impacts. |
2026-03-04 | |
| CVE-2025-59786 | 6.0 | MEDIUM | CWE-613 | 0.1% p19 | 4.20 | 2N Access Commander version 3.4.2 and prior improperly invalidates session token...2N Access Commander version 3.4.2 and prior improperly invalidates session tokens, allowing multiple session cookies to remain active after logout in web application. |
2026-03-04 | |
| CVE-2025-70342 | 6.6 | MEDIUM | CWE-732 | 0.0% p0 | 4.62 | erase-install prior to v40.4 commit 2c31239 writes swiftDialog credential output...erase-install prior to v40.4 commit 2c31239 writes swiftDialog credential output to a hardcoded path /var/tmp/dialog.json. This allows an unauthenticated attacker to intercept admin credentials entered during reinstall/erase operations via creating a named pipe. |
2026-03-04 | |
| CVE-2025-70341 | 7.8 | HIGH | CWE-94 | 0.0% p1 | 5.46 | Insecure permissions in App-Auto-Patch v3.4.2 create a race condition which allo...Insecure permissions in App-Auto-Patch v3.4.2 create a race condition which allows attackers to write arbitrary files. |
2026-03-04 | |
| CVE-2026-3103 | 5.3 | MEDIUM | CWE-863 | 0.1% p17 | 3.71 | A logic error in the remove_password() function in Checkmk GmbH's Checkmk versio...A logic error in the remove_password() function in Checkmk GmbH's Checkmk versions <2.4.0p23, <2.3.0p43, and 2.2.0 (EOL) allows a low-privileged user to cause data loss. |
2026-03-04 | |
| CVE-2026-25907 | 5.3 | MEDIUM | CWE-645 | 0.1% p20 | 3.71 | Dell PowerScale OneFS, version 9.13.0.0, contains an overly restrictive account ...Dell PowerScale OneFS, version 9.13.0.0, contains an overly restrictive account lockout mechanism vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to denial of service. |
2026-03-04 | |
| CVE-2026-22270 | 6.7 | MEDIUM | CWE-427 | 0.0% p3 | 4.69 | Dell PowerScale OneFS, versions prior to 9.10.1.6 and versions 9.11.0.0 through ...Dell PowerScale OneFS, versions prior to 9.10.1.6 and versions 9.11.0.0 through 9.12.0.1, contains an uncontrolled search path element vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to denial of service, elevation of privileges, and information disclosure. |
2026-03-04 | |
| CVE-2026-21426 | 6.7 | MEDIUM | CWE-250 | 0.0% p4 | 4.69 | Dell PowerScale OneFS, versions prior to 9.10.1.6 and versions 9.11.0.0 through ...Dell PowerScale OneFS, versions prior to 9.10.1.6 and versions 9.11.0.0 through 9.12.0.1, contains an execution with unnecessary privileges vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to denial of service, elevation of privileges, and information disclosure. |
2026-03-04 | |
| CVE-2026-21425 | 6.7 | MEDIUM | CWE-266 | 0.0% p2 | 4.69 | Dell PowerScale OneFS, versions prior to 9.10.1.6 and versions 9.11.0.0 through ...Dell PowerScale OneFS, versions prior to 9.10.1.6 and versions 9.11.0.0 through 9.12.0.1, contains an incorrect privilege assignment vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges. |
2026-03-04 | |
| CVE-2026-21424 | 6.7 | MEDIUM | CWE-250 | 0.0% p5 | 4.69 | Dell PowerScale OneFS, versions prior to 9.10.1.6 and versions 9.11.0.0 through ...Dell PowerScale OneFS, versions prior to 9.10.1.6 and versions 9.11.0.0 through 9.12.0.1, contains an execution with unnecessary privileges vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges. |
2026-03-04 | |
| CVE-2026-21423 | 6.7 | MEDIUM | CWE-276 | 0.0% p2 | 4.69 | Dell PowerScale OneFS, versions prior to 9.10.1.6 and versions 9.11.0.0 through ...Dell PowerScale OneFS, versions prior to 9.10.1.6 and versions 9.11.0.0 through 9.12.0.1, contains an incorrect default permissions vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to code execution, denial of service, elevation of privileges, and information disclosure. |
2026-03-04 | |
| CVE-2026-21422 | 3.4 | LOW | CWE-15 | 0.0% p4 | 2.38 | Dell PowerScale OneFS, versions 9.10.0.0 through 9.10.1.5 and versions 9.11.0.0 ...Dell PowerScale OneFS, versions 9.10.0.0 through 9.10.1.5 and versions 9.11.0.0 through 9.12.0.1, contains an external control of system or configuration setting vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to protection mechanism bypass. |
2026-03-04 | |
| CVE-2026-21421 | 6.7 | MEDIUM | CWE-250 | 0.0% p5 | 4.69 | Dell PowerScale OneFS, versions prior to 9.10.1.6 and versions 9.11.0.0 through ...Dell PowerScale OneFS, versions prior to 9.10.1.6 and versions 9.11.0.0 through 9.12.0.1, contains an execution with unnecessary privileges vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to elevation of privileges. |
2026-03-04 | |
| CVE-2026-3058 | 4.3 | MEDIUM | CWE-200 | 0.0% p2 | 3.01 | The Seraphinite Accelerator plugin for WordPress is vulnerable to Sensitive Info...The Seraphinite Accelerator plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.28.14 via the `seraph_accel_api` AJAX action with `fn=GetData`. This is due to the `OnAdminApi_GetData()` function not performing any capability checks. This makes it possible for authenticated attackers, with Subscriber-level access and above, to retrieve sensitive operational data including cache status, scheduled task information, and external database state. |
2026-03-04 | |
| CVE-2026-3056 | 4.3 | MEDIUM | CWE-862 | 0.0% p1 | 3.01 | The Seraphinite Accelerator plugin for WordPress is vulnerable to unauthorized m...The Seraphinite Accelerator plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the `seraph_accel_api` AJAX action with `fn=LogClear` in all versions up to, and including, 2.28.14. This makes it possible for authenticated attackers, with Subscriber-level access and above, to clear the plugin's debug/operational logs. |
2026-03-04 | |
| CVE-2026-2355 | 6.4 | MEDIUM | CWE-79 | 0.0% p3 | 4.48 | The My Calendar – Accessible Event Manager plugin for WordPress is vulnerable to...The My Calendar – Accessible Event Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the `template` attribute of the `[my_calendar_upcoming]` shortcode in all versions up to, and including, 3.7.3. This is due to the use of `stripcslashes()` on user-supplied shortcode attribute values in the `mc_draw_template()` function, which decodes C-style hex escape sequences (e.g., `\x3c` to `<`) at render time, bypassing WordPress's `wp_kses_post()` content sanitization that runs at save time. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-03-04 | |
| CVE-2026-1674 | 6.5 | MEDIUM | CWE-862 | 0.0% p1 | 4.55 | The Gutena Forms – Contact Form, Survey Form, Feedback Form, Booking Form, and C...The Gutena Forms – Contact Form, Survey Form, Feedback Form, Booking Form, and Custom Form Builder plugin for WordPress is vulnerable to unauthorized modification of data due to missing authorization within the save_gutena_forms_schema() function in all versions up to, and including, 1.6.0. This makes it possible for authenticated attackers, with Contributor-level access and above, to update option values to a structured array value on the WordPress site. This can be leveraged to update an option that would create an error on the site and deny service to legitimate users or be used to set some values, that would, for example enable site user registration when it is explicitly disabled. |
2026-03-04 | |
| CVE-2026-3439 | 4.9 | MEDIUM | CWE-121 | 0.1% p34 | 3.43 | A post-authentication Stack-based Buffer Overflow vulnerability in SonicOS certi...A post-authentication Stack-based Buffer Overflow vulnerability in SonicOS certificate handling allows a remote attacker to crash a firewall. |
2026-03-04 | |
| CVE-2026-1706 | 6.1 | MEDIUM | CWE-79 | 0.1% p33 | 4.27 | The All-in-One Video Gallery plugin for WordPress is vulnerable to Reflected Cro...The All-in-One Video Gallery plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'vi' parameter in all versions up to, and including, 4.7.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. |
2026-03-04 | |
| CVE-2023-7337 | 7.5 | HIGH | CWE-89 | 29.1% p96 | 6.12 | The JS Help Desk – AI-Powered Support & Ticketing System plugin for WordPress is...The JS Help Desk – AI-Powered Support & Ticketing System plugin for WordPress is vulnerable to SQL Injection via the 'js-support-ticket-token-tkstatus' cookie in version 2.8.2 due to an incomplete fix for CVE-2023-50839 where a second sink was left with insufficient escaping on the user supplied values and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. |
2026-03-04 | |
| CVE-2026-3094 | 7.8 | HIGH | CWE-787 | 0.0% p4 | 5.46 | Delta Electronics CNCSoft-G2 lacks proper validation of the user-supplied file. ...Delta Electronics CNCSoft-G2 lacks proper validation of the user-supplied file. If a user opens a malicious file, an attacker can leverage this vulnerability to execute code in the context of the current process. |
2026-03-04 | |
| CVE-2026-2748 | 7.8 | HIGH | CWE-295 | 0.0% p6 | 5.46 | SEPPmail Secure Email Gateway before version 15.0.1 improperly validates S/MIME ...SEPPmail Secure Email Gateway before version 15.0.1 improperly validates S/MIME certificates issued for email addresses containing whitespaces, allowing signature spoofing. |
2026-03-04 | |
| CVE-2026-2747 | 6.9 | MEDIUM | CWE-200 | 0.0% p14 | 4.83 | SEPPmail Secure Email Gateway before version 15.0.1 decrypts inline PGP messages...SEPPmail Secure Email Gateway before version 15.0.1 decrypts inline PGP messages without isolating them from surrounding unencrypted content, allowing exposure of sensitive information to an unauthorized actor. |
2026-03-04 | |
| CVE-2026-2746 | 6.9 | MEDIUM | CWE-347 | 0.0% p4 | 4.83 | SEPPmail Secure Email Gateway before version 15.0.1 does not properly communicat...SEPPmail Secure Email Gateway before version 15.0.1 does not properly communicate PGP signature verification results, leaving users unable to detect forged emails. |
2026-03-04 | |
| CVE-2026-27445 | 6.9 | MEDIUM | CWE-347 | 0.0% p6 | 4.83 | SEPPmail Secure Email Gateway before version 15.0.1 does not properly verify tha...SEPPmail Secure Email Gateway before version 15.0.1 does not properly verify that a PGP signature was generated by the expected key, allowing signature spoofing. |
2026-03-04 | |
| CVE-2026-27444 | 7.8 | HIGH | CWE-436 | 0.0% p13 | 5.46 | SEPPmail Secure Email Gateway before version 15.0.1 incorrectly interprets email...SEPPmail Secure Email Gateway before version 15.0.1 incorrectly interprets email addresses in the email headers, causing an interpretation conflict with other mail infrastructure that allows an attacker to fake the source of the email or decrypt it. |
2026-03-04 | |
| CVE-2026-27443 | 8.2 | HIGH | CWE-20 | 0.1% p28 | 5.74 | SEPPmail Secure Email Gateway before version 15.0.1 does not properly sanitize t...SEPPmail Secure Email Gateway before version 15.0.1 does not properly sanitize the headers from S/MIME protected MIME entities, allowing an attacker to control trusted headers. |
2026-03-04 | |
| CVE-2026-27442 | 9.3 | CRITICAL | CWE-22 | 0.0% p4 | 6.51 | The GINA web interface in SEPPmail Secure Email Gateway before version 15.0.1 do...The GINA web interface in SEPPmail Secure Email Gateway before version 15.0.1 does not properly check attachment filenames in GINA-encrypted emails, allowing an attacker to access files on the gateway. |
2026-03-04 | |
| CVE-2026-27441 | 9.5 | CRITICAL | CWE-78 | 0.1% p20 | 6.65 | SEPPmail Secure Email Gateway before version 15.0.1 insufficiently neutralizes t...SEPPmail Secure Email Gateway before version 15.0.1 insufficiently neutralizes the PDF encryption password, allowing OS command execution. |
2026-03-04 | |
| CVE-2026-1236 | 6.4 | MEDIUM | CWE-79 | 0.0% p11 | 4.48 | The Envira Gallery for WordPress plugin for WordPress is vulnerable to Stored Cr...The Envira Gallery for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'justified_gallery_theme' parameter in all versions up to, and including, 1.12.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-03-04 | |
| CVE-2026-29120 | 9.2 | CRITICAL | CWE-798 | 0.0% p2 | 6.44 | The /root/anaconda-ks.cfg installation configuration file in International Datac...The /root/anaconda-ks.cfg installation configuration file in International Datacasting Corporation (IDC) SFX Series(SFX2100) SuperFlex Satellite Receiver insecurely stores the hardcoded root password hash. The password itself is highly insecure and susceptible to offline dictionary attacks using the rockyou.txt wordlist. Because direct root SSH login is disabled, an attacker must first obtain low-privileged access to the system (e.g., via other vulnerabilities) to be able to log in as the root user. The password is hardcoded and so allows for an actor with local access on effected versions to escalate to root |
2026-03-04 | |
| CVE-2026-29119 | 8.8 | HIGH | CWE-798 | 0.4% p61 | 6.17 | International Datacasting Corporation (IDC) SFX Series SuperFlex(SFX2100) Satell...International Datacasting Corporation (IDC) SFX Series SuperFlex(SFX2100) SatelliteReceiver contains hardcoded and insecure credentials for the `admin` account. A remote unauthenticated attacker can use these undocumented credentials to access the satellite system directly via the Telnet service, leading to potential system compromise. |
2026-03-04 | |
| CVE-2026-28778 | 7.9 | HIGH | CWE-798 | 0.6% p68 | 5.55 | International Datacasting Corporation (IDC) SFX Series SuperFlex Satellite Recei...International Datacasting Corporation (IDC) SFX Series SuperFlex Satellite Receiver contains undocumented, hardcoded/insecure credentials for the `xd` user account. A remote unauthenticated attacker can log in via FTP using these credentials. Because the `xd` user has write permissions to their home directory where root-executed binaries and symlinks (such as those invoked by `xdstartstop`) are stored, the attacker can overwrite these files or manipulate symlinks to achieve arbitrary code execution as the root user. |
2026-03-04 | |
| CVE-2026-28776 | 7.8 | HIGH | CWE-798 | 0.4% p61 | 5.47 | International Datacasting Corporation (IDC) SFX Series SuperFlex SatelliteReceiv...International Datacasting Corporation (IDC) SFX Series SuperFlex SatelliteReceiver contains hardcoded credentials for the `monitor` account. A remote unauthenticated attacker can use these trivial, undocumented credentials to access the system via SSH. While initially dropped into a restricted shell, the attacker can trivially break out to achieve standard shell functionality. |
2026-03-04 | |
| CVE-2026-28775 | 10.0 | CRITICAL | CWE-1188 | 0.9% p75 | 7.03 | An unauthenticated Remote Code Execution (RCE) vulnerability exists in the SNMP ...An unauthenticated Remote Code Execution (RCE) vulnerability exists in the SNMP service of International Datacasting Corporation (IDC) SFX Series SuperFlex SatelliteReceiver. The deployment insecurely provisions the `private` SNMP community string with read/write access by default. Because the SNMP agent runs as root, an unauthenticated remote attacker can utilize `NET-SNMP-EXTEND-MIB` directives, abusing the fact that the system runs a vulnerable version of net-snmp pre 5.8, to execute arbitrary operating system commands with root privileges. |
2026-03-04 | |
| CVE-2026-28774 | 9.3 | CRITICAL | CWE-78 | 0.2% p41 | 6.52 | An OS Command Injection vulnerability exists in the web-based Traceroute diagnos...An OS Command Injection vulnerability exists in the web-based Traceroute diagnostic utility of International Datacasting Corporation (IDC) SFX Series SuperFlex SatelliteReceiver Web Management Interface version 101. An authenticated attacker can inject arbitrary shell metacharacters (such as the pipe `|` operator) into the flags parameter, leading to the execution of arbitrary operating system commands with root privileges. |
2026-03-04 | |
| CVE-2026-28773 | 9.3 | CRITICAL | CWE-78 | 0.7% p70 | 6.53 | The web-based Ping diagnostic utility (/IDC_Ping/main.cgi) in International Data...The web-based Ping diagnostic utility (/IDC_Ping/main.cgi) in International Datacasting Corporation (IDC) SFX Series SuperFlex Satellite Receiver Web Management Interface version 101 is vulnerable to OS Command Injection. The application insecurely parses the `IPaddr` parameter. An authenticated attacker can bypass server-side semicolon exclusion checks by using alternate shell metacharacters (such as the pipe `|` operator) to append and execute arbitrary shell commands with root privileges. |
2026-03-04 | |
| CVE-2026-28772 | 5.1 | MEDIUM | CWE-79 | 0.1% p17 | 3.57 | A Reflected Cross-Site Scripting (XSS) vulnerability in the /IDC_Logging/index.c...A Reflected Cross-Site Scripting (XSS) vulnerability in the /IDC_Logging/index.cgi endpoint of International Datacasting Corporation (IDC) SFX Series SuperFlex SatelliteReceiver Web Management Interface version 101 allows a remote attacker to execute arbitrary web scripts or HTML. The vulnerability is triggered by sending a crafted payload through the `submitType` parameter, which is reflected directly into the DOM without proper escaping. |
2026-03-04 | |
| CVE-2026-28771 | 5.1 | MEDIUM | CWE-79 | 0.1% p17 | 3.57 | A Reflected Cross-Site Scripting (XSS) vulnerability exists in the /index.cgi en...A Reflected Cross-Site Scripting (XSS) vulnerability exists in the /index.cgi endpoint of International Datacasting Corporation (IDC) SFX Series SuperFlex Satellite Receiver Web Management Interface version 101. The application fails to adequately sanitize user-supplied input provided via the `cat` parameter before reflecting it in the HTTP response, allowing a remote attacker to execute arbitrary HTML or JavaScript in the victim's browser context. |
2026-03-04 | |
| CVE-2026-2732 | 5.4 | MEDIUM | CWE-862 | 0.0% p15 | 3.78 | The Enable Media Replace plugin for WordPress is vulnerable to unauthorized modi...The Enable Media Replace plugin for WordPress is vulnerable to unauthorized modification of data due to an improper capability check on the 'RemoveBackGroundViewController::load' function in all versions up to, and including, 4.1.7. This makes it possible for authenticated attackers, with Author-level access and above, to replace any attachment with a removed background attachment. |
2026-03-04 | |
| CVE-2026-2363 | 6.5 | MEDIUM | CWE-89 | 0.0% p9 | 4.55 | The WP-Members Membership Plugin plugin for WordPress is vulnerable to SQL Injec...The WP-Members Membership Plugin plugin for WordPress is vulnerable to SQL Injection via the 'order_by' attribute of the [wpmem_user_membership_posts] shortcode in all versions up to, and including, 3.5.5.1. This is due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. |
2026-03-04 | |
| CVE-2026-28770 | 5.3 | MEDIUM | CWE-91 | 0.1% p18 | 3.71 | Improper neutralization of special elements in the /IDC_Logging/checkifdone.cgi ...Improper neutralization of special elements in the /IDC_Logging/checkifdone.cgi script in International Datacasting Corporation (IDC) SFX Series SuperFlex Satellite Receiver Web management Interface version 101 allows for XML Injection. The application reflects un-sanitized user input from the `file` parameter directly into a CDATA block, allowing an authenticated attacker to break out of the tags and inject arbitrary XML elements. An actor is confirmed to be able to turn this into an reflected XSS but further abuse such as XXE may be possible |
2026-03-04 | |
| CVE-2026-28769 | 5.3 | MEDIUM | CWE-22 | 0.5% p64 | 3.72 | A path traversal vulnerability exists in the /IDC_Logging/checkifdone.cgi script...A path traversal vulnerability exists in the /IDC_Logging/checkifdone.cgi script in International Datacasting Corporation (IDC) SFX Series SuperFlex Satellite Receiver Web management portal version 101. An authenticated attacker can manipulate the `file` parameter to traverse directories and enumerate arbitrary files on the underlying filesystem. Due to the insecure perl file path handling function in use, a authenticated actor is able to preform directory traversal, with the backup endpoint confirming a file exists by indicating that a backup operation was successful or when using the path of a non existent file, the returned status is failed. |
2026-03-04 | |
| CVE-2026-2025 | 7.5 | HIGH | CWE-200 | 34.0% p96 | 6.27 | The Mail Mint WordPress plugin before 1.19.5 does not have authorization in one...The Mail Mint WordPress plugin before 1.19.5 does not have authorization in one of its REST API endpoint, allowing unauthenticated users to call it and retrieve the email addresses of users on the blog |
2026-03-04 | |
| CVE-2026-3242 | 4.8 | MEDIUM | CWE-79 | 0.0% p7 | 3.36 | In Concrete CMS below version 9.4.8, a rogue administrator can add stored XSS vi...In Concrete CMS below version 9.4.8, a rogue administrator can add stored XSS via the Switch Language block. The Concrete CMS security team gave this vulnerability a CVSS v.4.0 score of 4.8 with vector CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N. Thanks M3dium for reporting. |
2026-03-04 | |
| CVE-2026-3241 | 4.8 | MEDIUM | CWE-79 | 0.0% p7 | 3.36 | In Concrete CMS below version 9.4.8, a stored cross-site scripting (XSS) vulnera...In Concrete CMS below version 9.4.8, a stored cross-site scripting (XSS) vulnerability exists in the "Legacy Form" block. An authenticated user with permissions to create or edit forms (e.g., a rogue administrator) can inject a persistent JavaScript payload into the options of a multiple-choice question (Checkbox List, Radio Buttons, or Select Box). This payload is then executed in the browser of any user who views the page containing the form. The Concrete CMS security team gave this vulnerability a CVSS v.4.0 score of 4.8 with vector CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N. Thanks M3dium for reporting. |
2026-03-04 | |
| CVE-2026-3240 | 4.8 | MEDIUM | CWE-79 | 0.0% p7 | 3.36 | In Concrete CMS below version 9.4.8, a user with permission to edit a page with ...In Concrete CMS below version 9.4.8, a user with permission to edit a page with element Legacy form can perform a stored XSS attack towards high-privilege accounts via the Question field. The Concrete CMS security team gave this vulnerability a CVSS v.4.0 score of 4.8 with vector CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N Thanks minhnn42, namdi and quanlna2 from VCSLab-Viettel Cyber Security for reporting. |
2026-03-04 | |
| CVE-2026-2994 | 2.3 | LOW | CWE-352 | 0.0% p9 | 1.61 | Concrete CMS below version 9.4.8 is subject to CSRF by a Rogue Administrator usi...Concrete CMS below version 9.4.8 is subject to CSRF by a Rogue Administrator using the Anti-Spam Allowlist Group Configuration via group_id parameter which can leads to a security bypass since changes are saved prior to checking the CSRF token. The Concrete CMS security team gave this vulnerability a CVSS v.4.0 score of 2.3 with vector CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N. Thanks z3rco for reporting |
2026-03-04 | |
| CVE-2026-3452 | 8.9 | HIGH | CWE-502 | 0.8% p73 | 6.25 | Concrete CMS below version 9.4.8 is vulnerable to Remote Code Execution by store...Concrete CMS below version 9.4.8 is vulnerable to Remote Code Execution by stored PHP object injection into the Express Entry List block via the columns parameter. An authenticated administrator can store attacker-controlled serialized data in block configuration fields that are later passed to unserialize() without class restrictions or integrity checks. The Concrete CMS security team gave this vulnerability a CVSS v.4.0 score of 8.9 with vector CVSS:4.0/AV:N/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H. Thanks YJK ( @YJK0805 https://hackerone.com/yjk0805 ) of ZUSO ART https://zuso.ai/ for reporting. |
2026-03-04 | |
| CVE-2026-3244 | 4.8 | MEDIUM | CWE-79 | 0.0% p7 | 3.36 | In Concrete CMS below version 9.4.8, A stored cross-site scripting (XSS) vulnera...In Concrete CMS below version 9.4.8, A stored cross-site scripting (XSS) vulnerability exists in the search block where page names and content are rendered without proper HTML encoding in search results. This allows authenticated, rogue administrators to inject malicious JavaScript through page names that executes when users search for and view those pages in search results. The Concrete CMS security team gave this vulnerability a CVSS v.4.0 score of 4.8 with vector CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N. Thanks zolpak for reporting |
2026-03-04 | |
| CVE-2026-2292 | 4.4 | MEDIUM | CWE-79 | 0.0% p8 | 3.08 | The Morkva UA Shipping plugin for WordPress is vulnerable to Stored Cross-Site S...The Morkva UA Shipping plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.7.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. |
2026-03-04 | |
| CVE-2026-2289 | 4.4 | MEDIUM | CWE-79 | 0.0% p10 | 3.08 | The Taskbuilder plugin for WordPress is vulnerable to Stored Cross-Site Scriptin...The Taskbuilder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 5.0.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. |
2026-03-04 | |
| CVE-2026-1980 | 5.3 | MEDIUM | CWE-200 | 0.1% p16 | 3.71 | The WPBookit plugin for WordPress is vulnerable to unauthorized data disclosure ...The WPBookit plugin for WordPress is vulnerable to unauthorized data disclosure due to a missing authorization check on the 'get_customer_list' route in all versions up to, and including, 1.0.8. This makes it possible for unauthenticated attackers to retrieve sensitive customer information including names, emails, phone numbers, dates of birth, and gender. |
2026-03-04 | |
| CVE-2026-1945 | 7.2 | HIGH | CWE-79 | 0.1% p31 | 5.04 | The WPBookit plugin for WordPress is vulnerable to Stored Cross-Site Scripting v...The WPBookit plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'wpb_user_name' and 'wpb_user_email' parameters in all versions up to, and including, 1.0.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-03-04 | |
| CVE-2026-1651 | 6.5 | MEDIUM | CWE-89 | 0.0% p11 | 4.55 | The Email Subscribers by Icegram Express plugin for WordPress is vulnerable to S...The Email Subscribers by Icegram Express plugin for WordPress is vulnerable to SQL Injection via the 'workflow_ids' parameter in all versions up to, and including, 5.9.16 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. |
2026-03-04 | |
| CVE-2026-1273 | 7.2 | HIGH | CWE-918 | 0.0% p14 | 5.04 | The Post Grid Gutenberg Blocks for News, Magazines, Blog Websites – PostX plugin...The Post Grid Gutenberg Blocks for News, Magazines, Blog Websites – PostX plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 5.0.8 via the `/ultp/v3/starter_dummy_post/` and `/ultp/v3/starter_import_content/` REST API endpoints. This makes it possible for authenticated attackers, with Administrator-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services. |
2026-03-04 | |
| CVE-2026-3076 | 0.0 | NONE | N/A | — | 0.00 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-...Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2026-2363. Reason: This candidate is a reservation duplicate of CVE-2026-2363. Notes: All CVE users should reference CVE-2026-2363 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage. |
2026-03-03 | |
| CVE-2026-28289 | 10.0 | CRITICAL | CWE-434 | 22.3% p95 | 7.67 | FreeScout is a free help desk and shared inbox built with PHP's Laravel framewor...FreeScout is a free help desk and shared inbox built with PHP's Laravel framework. A patch bypass vulnerability for CVE-2026-27636 in FreeScout 1.8.206 and earlier allows any authenticated user with file upload permissions to achieve Remote Code Execution (RCE) on the server by uploading a malicious .htaccess file using a zero-width space character prefix to bypass the security check. The vulnerability exists in the sanitizeUploadedFileName() function in app/Http/Helper.php. The function contains a Time-of-Check to Time-of-Use (TOCTOU) flaw where the dot-prefix check occurs before sanitization removes invisible characters. This vulnerability is fixed in 1.8.207. |
2026-03-03 | |
| CVE-2026-27981 | 7.4 | HIGH | CWE-307 | 0.1% p17 | 5.18 | HomeBox is a home inventory and organization system. Prior to 0.24.0, the authen...HomeBox is a home inventory and organization system. Prior to 0.24.0, the authentication rate limiter (authRateLimiter) tracks failed attempts per client IP. It determines the client IP by reading, 1. X-Real-IP header, 2. First entry of X-Forwarded-For header, and 3. r.RemoteAddr (TCP connection address). These headers were read unconditionally. An attacker connecting directly to Homebox could forge any value in X-Real-IP, effectively getting a fresh rate limit identity per request. There is a TrustProxy option in the configuration (Options.TrustProxy, default false), but this option was never read by any middleware or rate limiter code. Additionally, chi's middleware.RealIP was applied unconditionally in main.go, overwriting r.RemoteAddr with the forged header value before it reaches any handler. This vulnerability is fixed in 0.24.0. |
2026-03-03 | |
| CVE-2026-27971 | 9.2 | CRITICAL | CWE-502 | 30.0% p96 | 7.34 | Qwik is a performance focused javascript framework. qwik <=1.19.0 is vulnerable ...Qwik is a performance focused javascript framework. qwik <=1.19.0 is vulnerable to RCE due to an unsafe deserialization vulnerability in the server$ RPC mechanism that allows any unauthenticated user to execute arbitrary code on the server with a single HTTP request. Affects any deployment where require() is available at runtime. This vulnerability is fixed in 1.19.1. |
2026-03-03 | |
| CVE-2026-27932 | 7.5 | HIGH | CWE-770 | 0.2% p36 | 5.25 | joserfc is a Python library that provides an implementation of several JSON Obje...joserfc is a Python library that provides an implementation of several JSON Object Signing and Encryption (JOSE) standards. In 1.6.2 and earlier, a resource exhaustion vulnerability in joserfc allows an unauthenticated attacker to cause a Denial of Service (DoS) via CPU exhaustion. When the library decrypts a JSON Web Encryption (JWE) token using Password-Based Encryption (PBES2) algorithms, it reads the p2c (PBES2 Count) parameter directly from the token's protected header. This parameter defines the number of iterations for the PBKDF2 key derivation function. Because joserfc does not validate or bound this value, an attacker can specify an extremely large iteration count (e.g., 2^31 - 1), forcing the server to expend massive CPU resources processing a single token. This vulnerability exists at the JWA layer and impacts all high-level JWE and JWT decryption interfaces if PBES2 algorithms are allowed by the application's policy. |
2026-03-03 | |
| CVE-2026-27905 | 8.6 | HIGH | CWE-59 | 0.0% p0 | 6.02 | BentoML is a Python library for building online serving systems optimized for AI...BentoML is a Python library for building online serving systems optimized for AI apps and model inference. Prior to 1.4.36, the safe_extract_tarfile() function validates that each tar member's path is within the destination directory, but for symlink members it only validates the symlink's own path, not the symlink's target. An attacker can create a malicious bento/model tar file containing a symlink pointing outside the extraction directory, followed by a regular file that writes through the symlink, achieving arbitrary file write on the host filesystem. This vulnerability is fixed in 1.4.36. |
2026-03-03 | |
| CVE-2026-27622 | 8.4 | HIGH | CWE-787 | 0.0% p5 | 5.88 | OpenEXR provides the specification and reference implementation of the EXR file ...OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. In CompositeDeepScanLine::readPixels, per-pixel totals are accumulated in vector<unsigned int> total_sizes for attacker-controlled large counts across many parts, total_sizes[ptr] wraps modulo 2^32. overall_sample_count is then derived from wrapped totals and used in samples[channel].resize(overall_sample_count). Decode pointer setup/consumption proceeds with true sample counts, and write operations in core unpack (generic_unpack_deep_pointers) overrun the undersized composite sample buffer. This vulnerability is fixed in v3.2.6, v3.3.8, and v3.4.6. |
2026-03-03 | |
| CVE-2026-27601 | 8.2 | HIGH | CWE-770 | 0.0% p5 | 5.74 | Underscore.js is a utility-belt library for JavaScript. Prior to 1.13.8, the _.f...Underscore.js is a utility-belt library for JavaScript. Prior to 1.13.8, the _.flatten and _.isEqual functions use recursion without a depth limit. Under very specific conditions, detailed below, an attacker could exploit this in a Denial of Service (DoS) attack by triggering a stack overflow. Untrusted input must be used to create a recursive datastructure, for example using JSON.parse, with no enforced depth limit. The datastructure thus created must be passed to _.flatten or _.isEqual. In the case of _.flatten, the vulnerability can only be exploited if it is possible for a remote client to prepare a datastructure that consists of arrays at all levels AND if no finite depth limit is passed as the second argument to _.flatten. In the case of _.isEqual, the vulnerability can only be exploited if there exists a code path in which two distinct datastructures that were submitted by the same remote client are compared using _.isEqual. For example, if a client submits data that are stored in a database, and the same client can later submit another datastructure that is then compared to the data that were saved in the database previously, OR if a client submits a single request, but its data are parsed twice, creating two non-identical but equivalent datastructures that are then compared. Exceptions originating from the call to _.flatten or _.isEqual, as a result of a stack overflow, are not being caught. This vulnerability is fixed in 1.13.8. |
2026-03-03 | |
| CVE-2026-27600 | 5.0 | MEDIUM | CWE-918 | 0.0% p9 | 3.50 | HomeBox is a home inventory and organization system. Prior to 0.24.0-rc.1, the n...HomeBox is a home inventory and organization system. Prior to 0.24.0-rc.1, the notifier functionality allows authenticated users to specify arbitrary URLs to which the application sends HTTP POST requests. No validation or restriction is applied to the supplied host, IP address, or port. Although the application does not return the response body from the target service, its UI behavior differs depending on the network state of the destination. This creates a behavioral side-channel that enables internal service enumeration. This vulnerability is fixed in 0.24.0-rc.1. |
2026-03-03 | |
| CVE-2026-26279 | 9.1 | CRITICAL | CWE-78 | 0.9% p75 | 6.40 | Froxlor is open source server administration software. Prior to 2.3.4, a typo in...Froxlor is open source server administration software. Prior to 2.3.4, a typo in Froxlor's input validation code (== instead of =) completely disables email format checking for all settings fields declared as email type. This allows an authenticated admin to store arbitrary strings in the panel.adminmail setting. This value is later concatenated into a shell command executed as root by a cron job, where the pipe character | is explicitly whitelisted. The result is full root-level Remote Code Execution. This vulnerability is fixed in 2.3.4. |
2026-03-03 | |
| CVE-2026-26272 | 4.6 | MEDIUM | CWE-79 | 0.0% p10 | 3.22 | HomeBox is a home inventory and organization system. Prior to 0.24.0-rc.1, a sto...HomeBox is a home inventory and organization system. Prior to 0.24.0-rc.1, a stored cross-site scripting (XSS) vulnerability exists in the item attachment upload functionality. The application does not properly validate or restrict uploaded file types, allowing an authenticated user to upload malicious HTML or SVG files containing executable JavaScript (also, potentially other formats that render scripts). Uploaded attachments are accessible via direct links. When a user accesses such a file in their browser, the embedded JavaScript executes in the context of the application's origin. This vulnerability is fixed in 0.24.0-rc.1. |
2026-03-03 | |
| CVE-2026-26266 | 9.3 | CRITICAL | CWE-79 | 0.0% p13 | 6.51 | AliasVault is a privacy-first password manager with built-in email aliasing. A s...AliasVault is a privacy-first password manager with built-in email aliasing. A stored cross-site scripting (XSS) vulnerability was identified in the email rendering feature of AliasVault Web Client versions 0.25.3 and lower. When viewing received emails on an alias, the HTML content is rendered in an iframe using srcdoc, which does not provide origin isolation. An attacker can send a crafted email containing malicious JavaScript to any AliasVault email alias. When the victim views the email in the web client, the script executes in the same origin as the application. No sanitization or sandboxing was applied to email HTML content before rendering. This vulnerability is fixed in 0.26.0.[ |
2026-03-03 | |
| CVE-2026-25590 | 4.5 | MEDIUM | CWE-79 | 0.0% p10 | 3.15 | The GLPI Inventory Plugin handles network discovery, inventory, software deploym...The GLPI Inventory Plugin handles network discovery, inventory, software deployment, and data collection for GLPI agents. Prior to 1.6.6, there is a reflected XSS vulnerability in task jobs. This vulnerability is fixed in 1.6.6. |
2026-03-03 | |
| CVE-2026-3487 | 5.1 | MEDIUM | CWE-74 | 0.0% p2 | 3.57 | A vulnerability was found in itsourcecode College Management System 1.0. This is...A vulnerability was found in itsourcecode College Management System 1.0. This issue affects some unknown processing of the file /admin/class-result.php. Performing a manipulation of the argument course_code results in sql injection. The attack can be initiated remotely. The exploit has been made public and could be used. |
2026-03-03 | |
| CVE-2026-3224 | 9.8 | CRITICAL | CWE-287 | 0.1% p18 | 6.86 | Authentication bypass in the Microsoft Entra ID (Azure AD) authentication mode i...Authentication bypass in the Microsoft Entra ID (Azure AD) authentication mode in Devolutions Server 2025.3.15.0 and earlier allows an unauthenticated user to authenticate as an arbitrary Entra ID user via a forged JSON Web Token (JWT). |
2026-03-03 | |
| CVE-2026-3130 | 9.8 | CRITICAL | CWE-841 | 0.0% p6 | 6.86 | Improper Enforcement of Behavioral Controls in Devolutions Server 2025.3.15 and ...Improper Enforcement of Behavioral Controls in Devolutions Server 2025.3.15 and earlier allows an authenticated attacker with the delete permission to delete a PAM account that is currently checked out by selecting it alongside at least one non-checked-out account and performing a bulk deletion. |
2026-03-03 | |
| CVE-2026-27012 | 9.8 | CRITICAL | CWE-306 | 0.0% p10 | 6.86 | OpenSTAManager is an open source management software for technical assistance an...OpenSTAManager is an open source management software for technical assistance and invoicing. In 2.9.8 and earlier, a privilege escalation and authentication bypass vulnerability in OpenSTAManager allows any attacker to arbitrarily change a user's group (idgruppo) by directly calling modules/utenti/actions.php. This can promote an existing account (e.g. agent) into the Amministratori group as well as demote any user including existing administrators. |
2026-03-03 | |
| CVE-2026-25146 | 9.6 | CRITICAL | CWE-200 | 0.1% p17 | 6.72 | OpenEMR is a free and open source electronic health records and medical practice...OpenEMR is a free and open source electronic health records and medical practice management application. From 5.0.2 to before 8.0.0, there are (at least) two paths where the gateway_api_key secret value is rendered to the client in plaintext. These secret keys being leaked could result in arbitrary money movement or broad account takeover of payment gateway APIs. This vulnerability is fixed in 8.0.0. |
2026-03-03 | |
| CVE-2026-24898 | 10.0 | CRITICAL | CWE-287 | 0.3% p55 | 7.01 | OpenEMR is a free and open source electronic health records and medical practice...OpenEMR is a free and open source electronic health records and medical practice management application. Prior to 8.0.0, an unauthenticated token disclosure vulnerability in the MedEx callback endpoint allows any unauthenticated visitor to obtain the practice's MedEx API tokens, leading to complete third-party service compromise, PHI exfiltration, unauthorized actions on the MedEx platform, and HIPAA violations. The vulnerability exists because the endpoint bypasses authentication ($ignoreAuth = true) and performs a MedEx login whenever $_POST['callback_key'] is provided, returning the full JSON response including sensitive API tokens. This vulnerability is fixed in 8.0.0. |
2026-03-03 | |
| CVE-2026-24848 | 8.7 | HIGH | CWE-22 | 0.3% p49 | 6.10 | OpenEMR is a free and open source electronic health records and medical practice...OpenEMR is a free and open source electronic health records and medical practice management application. In 7.0.4 and earlier, the disposeDocument() method in EtherFaxActions.php allows authenticated users to write arbitrary content to arbitrary locations on the server filesystem. This vulnerability can be exploited to achieve Remote Code Execution (RCE) by uploading malicious PHP web shells. |
2026-03-03 | |
| CVE-2026-24415 | 5.1 | MEDIUM | CWE-79 | 0.1% p16 | 3.57 | OpenSTAManager is an open source management software for technical assistance an...OpenSTAManager is an open source management software for technical assistance and invoicing. OpenSTAManager v2.9.8 and earlier contains Reflected XSS vulnerabilities in invoice/order/contract modification modals. The application fails to properly sanitize user-supplied input from the righe GET parameter before reflecting it in HTML output.The $_GET['righe'] parameter is directly echoed into the HTML value attribute without any sanitization using htmlspecialchars() or equivalent functions. This allows an attacker to break out of the attribute context and inject arbitrary HTML/JavaScript. |
2026-03-03 | |
| CVE-2026-21866 | 5.1 | MEDIUM | CWE-79 | 0.0% p9 | 3.57 | Dify is an open-source LLM app development platform. Prior to 1.11.2, Dify is vu...Dify is an open-source LLM app development platform. Prior to 1.11.2, Dify is vulnerable to a stored XSS issue when rendering Mermaid diagrams within chats. This occurs because Dify’s default Mermaid configuration uses securityLevel: loose, which allows potentially unsafe content to execute. This vulnerability is fixed in 1.11.2. |
2026-03-03 | |
| CVE-2026-1775 | 8.8 | HIGH | CWE-306 | 0.0% p7 | 6.16 | The Labkotec LID-3300IP has an existing vulnerability in the ice detector softwa...The Labkotec LID-3300IP has an existing vulnerability in the ice detector software that enables an unauthenticated attacker to alter device parameters and run operational commands when specially crafted packets are sent to the device. |
2026-03-03 | |
| CVE-2026-3486 | 5.1 | MEDIUM | CWE-74 | 0.0% p1 | 3.57 | A vulnerability has been found in itsourcecode College Management System 1.0. Th...A vulnerability has been found in itsourcecode College Management System 1.0. This vulnerability affects unknown code of the file /admin/student-fee.php. Such manipulation of the argument roll_no leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. |
2026-03-03 | |
| CVE-2026-3485 | 8.9 | HIGH | CWE-77 | 0.5% p64 | 6.24 | A flaw has been found in D-Link DIR-868L 110b03. This affects the function sub_1...A flaw has been found in D-Link DIR-868L 110b03. This affects the function sub_1BF84 of the component SSDP Service. This manipulation of the argument ST causes os command injection. It is possible to initiate the attack remotely. The exploit has been published and may be used. This vulnerability only affects products that are no longer supported by the maintainer. |
2026-03-03 | |
| CVE-2026-25906 | 7.3 | HIGH | CWE-59 | 0.0% p0 | 5.11 | Dell Optimizer, versions prior to 6.3.1, contain an Improper Link Resolution Bef...Dell Optimizer, versions prior to 6.3.1, contain an Improper Link Resolution Before File Access ('Link Following') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of Privileges. |
2026-03-03 | |
| CVE-2026-24502 | 8.8 | HIGH | CWE-427 | 0.0% p0 | 6.16 | Dell Command | Intel vPro Out of Band, versions prior to 4.7.0, contain an Uncon...Dell Command | Intel vPro Out of Band, versions prior to 4.7.0, contain an Uncontrolled Search Path Element vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges. |
2026-03-03 | |
| CVE-2026-1713 | 5.0 | MEDIUM | CWE-305 | 0.0% p1 | 3.50 | IBM MQ 9.1.0.0 through 9.1.0.33 LTS, 9.2.0.0 through 9.2.0.40 LTS, 9.3.0.0 throu...IBM MQ 9.1.0.0 through 9.1.0.33 LTS, 9.2.0.0 through 9.2.0.40 LTS, 9.3.0.0 through 9.3.0.36 LTS, 9.30.0 through 9.3.5.1 CD, 9.4.0.0 through 9.4.0.17 LTS, and 9.4.0.0 through 9.4.4.1 CD |
2026-03-03 | |
| CVE-2026-1567 | 7.1 | HIGH | CWE-611 | 0.0% p10 | 4.97 | IBM InfoSphere Information Server 11.7.0.0 through 11.7.1.6 An XML External Enti...IBM InfoSphere Information Server 11.7.0.0 through 11.7.1.6 An XML External Entity (XXE) vulnerability in IBM InfoSphere Information Server could allow attackers to retrieve sensitive information from the server. |
2026-03-03 | |
| CVE-2025-70240 | 9.8 | CRITICAL | CWE-787 | 0.1% p26 | 6.86 | Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime para...Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSetWAN_Wizard51. |
2026-03-03 | |
| CVE-2025-70239 | 9.8 | CRITICAL | CWE-787 | 0.1% p26 | 6.86 | Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime para...Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSetWAN_Wizard55. |
2026-03-03 | |
| CVE-2025-70234 | 9.8 | CRITICAL | CWE-787 | 0.1% p26 | 6.86 | Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime para...Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSetQoS. |
2026-03-03 | |
| CVE-2025-14480 | 5.1 | MEDIUM | CWE-327 | 0.0% p0 | 3.57 | IBM Aspera faspio Gateway 1.3.6 uses weaker than expected cryptographic algorith...IBM Aspera faspio Gateway 1.3.6 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information |
2026-03-03 | |
| CVE-2025-14456 | 5.9 | MEDIUM | CWE-327 | 0.0% p4 | 4.13 | IBM MQ Appliance 9.4 CD through 9.4.4.0 to 9.4.4.1IBM MQ Appliance 9.4 CD through 9.4.4.0 to 9.4.4.1 |
2026-03-03 | |
| CVE-2025-13688 | 6.3 | MEDIUM | CWE-78 | 0.0% p14 | 4.41 | IBM DataStage on Cloud Pak for Data 5.1.2 through 5.3.0 could allow an authentic...IBM DataStage on Cloud Pak for Data 5.1.2 through 5.3.0 could allow an authenticated user to execute arbitrary commands with normal user privileges on the system due to improper validation of user supplied input through the wrapped command component. |
2026-03-03 | |
| CVE-2025-13687 | 6.3 | MEDIUM | CWE-78 | 0.0% p14 | 4.41 | IBM DataStage on Cloud Pak for Data 5.1.2 through 5.3.0 could allow an authentic...IBM DataStage on Cloud Pak for Data 5.1.2 through 5.3.0 could allow an authenticated user to execute arbitrary commands with normal user privileges on the system due to improper validation of user supplied input through the user-defined function component. |
2026-03-03 | |
| CVE-2025-13686 | 6.3 | MEDIUM | CWE-78 | 0.0% p14 | 4.41 | IBM DataStage on Cloud Pak for Data 5.1.2 through 5.3.0 could allow an authentic...IBM DataStage on Cloud Pak for Data 5.1.2 through 5.3.0 could allow an authenticated user to execute arbitrary commands with normal user privileges on the system due to improper validation of user supplied input through the job subroutine component. |
2026-03-03 | |
| CVE-2026-3494 | 5.3 | MEDIUM | CWE-778 | 0.0% p2 | 3.71 | In MariaDB server version through 11.8.5, when server audit plugin is enabled wi...In MariaDB server version through 11.8.5, when server audit plugin is enabled with server_audit_events variable configured with QUERY_DCL, QUERY_DDL, or QUERY_DML filtering, if an authenticated database user invokes a SQL statement prefixed with double-hyphen (—) or hash (#) style comments, the statement is not logged. |
2026-03-03 | |
| CVE-2026-3484 | 5.3 | MEDIUM | CWE-74 | 0.4% p62 | 3.72 | A vulnerability was detected in PhialsBasement nmap-mcp-server up to bee6d23547d...A vulnerability was detected in PhialsBasement nmap-mcp-server up to bee6d23547d57ae02460022f7c78ac0893092e38. Affected by this issue is the function child_process.exec of the file src/index.ts of the component Nmap CLI Command Handler. The manipulation results in command injection. The attack may be performed from remote. This product utilizes a rolling release system for continuous delivery, and as such, version information for affected or updated releases is not disclosed. The patch is identified as 30a6b9e1c7fa6146f51e28d6ab83a2568d9a3488. It is best practice to apply a patch to resolve this issue. |
2026-03-03 | |
| CVE-2026-2606 | 6.5 | MEDIUM | CWE-22 | 0.1% p18 | 4.55 | IBM webMethods API Gateway (on-prem) 10.11 through 10.11_Fix3210.15 to 10.15_Fix...IBM webMethods API Gateway (on-prem) 10.11 through 10.11_Fix3210.15 to 10.15_Fix2711.1 to 11.1_Fix7 IBM webMethods API Management (on-prem) fails to properly validate user-supplied input passed to the url parameter on the /createapi endpoint. An attacker can modify this parameter to use a file:// URI schema instead of the expected https:// schema, enabling unauthorized arbitrary file read access on the underlying server file system. |
2026-03-03 | |
| CVE-2026-29022 | 6.8 | MEDIUM | CWE-122 | 0.1% p15 | 4.76 | dr_libs dr_wav.h version 0.14.4 and earlier (fixed in commit 8a7258c) contain a ...dr_libs dr_wav.h version 0.14.4 and earlier (fixed in commit 8a7258c) contain a heap buffer overflow vulnerability in the drwav__read_smpl_to_metadata_obj() function of dr_wav.h that allows memory corruption via crafted WAV files. Attackers can exploit a mismatch between sampleLoopCount validation in pass 1 and unconditional processing in pass 2 to overflow heap allocations with 36 bytes of attacker-controlled data through any drwav_init_*_with_metadata() call on untrusted input. |
2026-03-03 | |
| CVE-2026-26892 | 7.2 | HIGH | CWE-89 | 0.0% p10 | 5.04 | Sourcecodester Logistic Hub Parcel's Management System v1.0 is vulnerable to SQL...Sourcecodester Logistic Hub Parcel's Management System v1.0 is vulnerable to SQL Injection in /manage_carrier.php. |
2026-03-03 | |
| CVE-2026-26891 | 2.7 | LOW | CWE-89 | 0.0% p1 | 1.89 | Sourcecodester Logistic Hub Parcel's Management System v1.0 is vulnerable to SQL...Sourcecodester Logistic Hub Parcel's Management System v1.0 is vulnerable to SQL Injection in /manage_parcel_type.php. |
2026-03-03 | |
| CVE-2026-26889 | 2.7 | LOW | CWE-89 | 0.0% p9 | 1.89 | Sourcecodester Pharmacy Point of Sale System v1.0 is vulnerable to SQL Injection...Sourcecodester Pharmacy Point of Sale System v1.0 is vulnerable to SQL Injection in /pharmacy/manage_category.php. |
2026-03-03 | |
| CVE-2026-26888 | 2.7 | LOW | CWE-89 | 0.0% p9 | 1.89 | Sourcecodester Pharmacy Point of Sale System v1.0 is vulnerable to SQL Injection...Sourcecodester Pharmacy Point of Sale System v1.0 is vulnerable to SQL Injection in /pharmacy/manage_stock.php. |
2026-03-03 | |
| CVE-2026-26887 | 2.7 | LOW | CWE-89 | 0.0% p9 | 1.89 | Sourcecodester Pharmacy Point of Sale System v1.0 is vulnerable to SQL Injection...Sourcecodester Pharmacy Point of Sale System v1.0 is vulnerable to SQL Injection in /pharmacy/manage_supplier.php. |
2026-03-03 | |
| CVE-2026-1265 | 4.3 | MEDIUM | CWE-532 | 0.0% p9 | 3.01 | IBM InfoSphere Information Server 11.7.0.0 through 11.7.1.6 is vulnerable to wri...IBM InfoSphere Information Server 11.7.0.0 through 11.7.1.6 is vulnerable to writing of sensitive Information in a log file. |
2026-03-03 | |
| CVE-2026-0869 | 8.3 | HIGH | CWE-305 | 0.1% p21 | 5.81 | Authentication bypass in Brocade ASCG 3.4.0 Could allow an unauthorized user to ...Authentication bypass in Brocade ASCG 3.4.0 Could allow an unauthorized user to perform ASCG operations related to Brocade Support Link(BSL) and streaming configuration. and could even disable the ASCG application or disable use of BSL data collection on Brocade switches within the fabric. |
2026-03-03 | |
| CVE-2025-70241 | 9.8 | CRITICAL | CWE-787 | 0.1% p26 | 6.86 | Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime para...Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSetWANType_Wizard5. |
2026-03-03 | |
| CVE-2025-70237 | 9.8 | CRITICAL | CWE-787 | 0.1% p26 | 6.86 | Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime para...Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSetPortTr. |
2026-03-03 | |
| CVE-2025-70236 | 9.8 | CRITICAL | CWE-787 | 0.0% p9 | 6.86 | Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime para...Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSetDomainFilter. |
2026-03-03 | |
| CVE-2025-66945 | 9.1 | CRITICAL | CWE-787 | 0.2% p41 | 6.38 | A path traversal vulnerability exists in the ZIP extraction API of Zdir Pro 4.x....A path traversal vulnerability exists in the ZIP extraction API of Zdir Pro 4.x. When a crafted ZIP archive is processed by the backend at /api/extract, files may be written outside the intended directory, leading to arbitrary file overwrite and potentially remote code execution |
2026-03-03 | |
| CVE-2025-36364 | 6.2 | MEDIUM | CWE-525 | 0.0% p2 | 4.34 | IBM DevOps Plan 3.0.0 through 3.0.5 allows web page cache to be stored locally w...IBM DevOps Plan 3.0.0 through 3.0.5 allows web page cache to be stored locally which can be read by another user on the system. |
2026-03-03 | |
| CVE-2025-36363 | 5.9 | MEDIUM | CWE-307 | 0.1% p17 | 4.13 | IBM DevOps Plan 3.0.0 through 3.0.5 uses an inadequate account lockout setting t...IBM DevOps Plan 3.0.0 through 3.0.5 uses an inadequate account lockout setting that could allow a remote attacker to brute force account credentials. |
2026-03-03 | |
| CVE-2025-14923 | 4.7 | MEDIUM | CWE-321 | 0.0% p8 | 3.29 | IBM WebSphere Application Server - Liberty 17.0.0.3 through 26.0.0.2 IBM WebSphe...IBM WebSphere Application Server - Liberty 17.0.0.3 through 26.0.0.2 IBM WebSphere Application Server Liberty could provide weaker than expected security when using the Security Utility when administering security settings. |
2026-03-03 | |
| CVE-2025-14604 | 6.6 | MEDIUM | CWE-732 | 0.0% p1 | 4.62 | IBM Storage Scale IBM S through rage Scale 5.2.3.0 - 5.2.3.5, and IBM S through ...IBM Storage Scale IBM S through rage Scale 5.2.3.0 - 5.2.3.5, and IBM S through rage Scale 6.0.0.0 - 6.0.0.1 could allow a local user to unintentionally trigger additional permissions for resources in a way that allows that resource to be executed by unintended actors. |
2026-03-03 | |
| CVE-2025-13734 | 5.4 | MEDIUM | CWE-862 | 0.0% p6 | 3.78 | IBM Engineering Requirements Management DOORS Next 7.1, and 7.2 could allow an a...IBM Engineering Requirements Management DOORS Next 7.1, and 7.2 could allow an authenticated user to view and edit data beyond their authorized access permissions. |
2026-03-03 | |
| CVE-2025-13616 | 6.5 | MEDIUM | CWE-497 | 0.0% p11 | 4.55 | IBM DataStage on Cloud Pak for Data 5.1.2 through 5.3.0 returns sensitive inform...IBM DataStage on Cloud Pak for Data 5.1.2 through 5.3.0 returns sensitive information in an HTTP response that could be used in further attacks against the system. |
2026-03-03 | |
| CVE-2025-13490 | 5.9 | MEDIUM | CWE-319 | 0.0% p4 | 4.13 | IBM App Connect Operator versions CD 11.3.0 through 11.6.0 and 12.1.0 through 12...IBM App Connect Operator versions CD 11.3.0 through 11.6.0 and 12.1.0 through 12.20.0, LTS versions 12.0.0 through 12.0.20, and IBM App Connect Enterprise Certified Containers Operands versions CD 12.0.11.2‑r1 through 12.0.12.5‑r1 and 13.0.1.0‑r1 through 13.0.6.1‑r1, and LTS versions 12.0.12‑r1 through 12.0.12‑r20, contain a vulnerability in which the IBM App Connect Enterprise Certified Container transmits data in clear text, potentially allowing an attacker to intercept and obtain sensitive information through man‑in‑the‑middle techniques. |
2026-03-03 | |
| CVE-2024-55027 | 7.5 | HIGH | CWE-312 | 0.0% p4 | 5.25 | Weintek cMT-3072XH2 easyweb v2.1.53, OS v20231011 was discovered to stroe creden...Weintek cMT-3072XH2 easyweb v2.1.53, OS v20231011 was discovered to stroe credentials in plaintext in the component uac_temp.db. |
2026-03-03 | |
| CVE-2024-55026 | 9.8 | CRITICAL | CWE-256 | 0.1% p25 | 6.86 | An issue in the reset_pj.cgi endpoint of Weintek cMT-3072XH2 easyweb v2.1.53, OS...An issue in the reset_pj.cgi endpoint of Weintek cMT-3072XH2 easyweb v2.1.53, OS v20231011 allows unauthorized attackers to execute arbitrary commands via supplying a crafted GET request. |
2026-03-03 | |
| CVE-2024-55025 | 6.5 | MEDIUM | CWE-284 | 0.1% p17 | 4.55 | Incorrect access control in the VNC component of Weintek cMT-3072XH2 easyweb v2....Incorrect access control in the VNC component of Weintek cMT-3072XH2 easyweb v2.1.53, OS v20231011 allows unauthorized attackers to access the HMI system. |
2026-03-03 | |
| CVE-2024-55024 | 9.8 | CRITICAL | CWE-693 | 0.1% p27 | 6.86 | An authentication bypass vulnerability in the authorization mechanism of Weintek...An authentication bypass vulnerability in the authorization mechanism of Weintek cMT-3072XH2 easyweb v2.1.53, OS v20231011 allows unauthorized attackers to perform Administrative actions using service accounts. |
2026-03-03 | |
| CVE-2024-55023 | 5.3 | MEDIUM | CWE-798 | 0.0% p6 | 3.71 | Weintek cMT-3072XH2 easyweb v2.1.53, OS v20231011 was discovered to contain a ha...Weintek cMT-3072XH2 easyweb v2.1.53, OS v20231011 was discovered to contain a hardcoded encryption key which could allow attackers to access sensitive information. |
2026-03-03 | |
| CVE-2024-55022 | 8.8 | HIGH | CWE-94 | 0.3% p53 | 6.17 | Weintek cMT-3072XH2 easyweb v2.1.53, OS v20231011 was discovered to contain an a...Weintek cMT-3072XH2 easyweb v2.1.53, OS v20231011 was discovered to contain an authenticated command injection vulnerability via the HMI Name parameter. |
2026-03-03 | |
| CVE-2024-55021 | 7.5 | HIGH | CWE-798 | 0.0% p14 | 5.25 | Weintek cMT-3072XH2 easyweb v2.1.53, OS v20231011 was discovered to contain a ha...Weintek cMT-3072XH2 easyweb v2.1.53, OS v20231011 was discovered to contain a hardcoded password in the FTP protocol. |
2026-03-03 | |
| CVE-2024-55020 | 9.8 | CRITICAL | CWE-20 | 0.3% p52 | 6.87 | A command injection vulnerability in the DHCP activation feature of Weintek cMT-...A command injection vulnerability in the DHCP activation feature of Weintek cMT-3072XH2 easyweb Web Version v2.1.53, OS v20231011 allows attackers to execute arbitrary commands with root privileges. |
2026-03-03 | |
| CVE-2024-55019 | 7.5 | HIGH | CWE-284 | 0.0% p13 | 5.25 | Incorrect access control in the component download_wb.cgi of Weintek cMT-3072XH2...Incorrect access control in the component download_wb.cgi of Weintek cMT-3072XH2 easyweb Web Version v2.1.53, OS v20231011 allows unauthenticated attack to download arbitrary files. |
2026-03-03 | |
| CVE-2026-3437 | 9.3 | CRITICAL | CWE-119 | 0.0% p4 | 6.51 | An Improper Restriction of Operations within the Bounds of a Memory Buffer vulne...An Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Portwell Engineering Toolkits version 4.8.2 could allow a local authenticated attacker to read and write to arbitrary memory via the Portwell Engineering Toolkits driver. Successful exploitation of this vulnerability could result in escalation of privileges or cause a denial-of-service condition. |
2026-03-03 | |
| CVE-2026-26890 | 2.7 | LOW | CWE-89 | 0.0% p9 | 1.89 | Sourcecodester Pharmacy Point of Sale System v1.0 is vulnerable to SQL Injection...Sourcecodester Pharmacy Point of Sale System v1.0 is vulnerable to SQL Injection in /pharmacy/manage_product.php. |
2026-03-03 | |
| CVE-2026-0540 | 5.3 | MEDIUM | CWE-79 | 0.0% p1 | 3.71 | DOMPurify 3.1.3 through 3.3.1 and 2.5.3 through 2.5.8, fixed in commit 2726c74, ...DOMPurify 3.1.3 through 3.3.1 and 2.5.3 through 2.5.8, fixed in commit 2726c74, contain a cross-site scripting vulnerability that allows attackers to bypass attribute sanitization by exploiting five missing rawtext elements (noscript, xmp, noembed, noframes, iframe) in the SAFE_FOR_XML regex. Attackers can include payloads like </noscript><img src=x onerror=alert(1)> in attribute values to execute JavaScript when sanitized output is placed inside these unprotected rawtext contexts. |
2026-03-03 | |
| CVE-2025-69765 | 7.5 | HIGH | CWE-121 | 0.4% p61 | 5.26 | Tenda AX3 firmware v16.03.12.11 contains a stack overflow in formGetIptv functio...Tenda AX3 firmware v16.03.12.11 contains a stack overflow in formGetIptv function and the list parameter, which can cause memory corruption and enable remote code execution. |
2026-03-03 | |
| CVE-2025-67840 | 7.2 | HIGH | CWE-78 | 0.2% p36 | 5.04 | Multiple authenticated OS command injection vulnerabilities exist in the Cohesit...Multiple authenticated OS command injection vulnerabilities exist in the Cohesity (formerly Stone Ram) TranZman 4.0 Build 14614 through TZM_1757588060_SEP2025_FULL.depot web application API endpoints (including Scheduler and Actions pages). The appliance directly concatenates user-controlled parameters into system commands without sufficient sanitisation, allowing an authenticated admin user to inject and execute arbitrary OS commands with root privileges. An attacker can intercept legitimate requests (e.g. during job creation or execution) using a proxy and modify parameters to include shell metacharacters, achieving remote code execution on the appliance. This completely bypasses the intended CLISH restricted shell confinement and results in full system compromise. The vulnerabilities persist in Release 4.0 Build 14614 including the latest patch (as of the time of testing) TZM_1757588060_SEP2025_FULL.depot. |
2026-03-03 | |
| CVE-2025-63912 | 7.5 | HIGH | CWE-327 | 0.0% p2 | 5.25 | Cohesity TranZman Migration Appliance Release 4.0 Build 14614 was discovered to ...Cohesity TranZman Migration Appliance Release 4.0 Build 14614 was discovered to use a weak cryptography algorithm for data encryption, allowing attackers to trivially reverse the encyption and expose credentials. |
2026-03-03 | |
| CVE-2025-63911 | 7.2 | HIGH | CWE-78 | 0.7% p72 | 5.06 | Cohesity TranZman Migration Appliance Release 4.0 Build 14614 was discovered to ...Cohesity TranZman Migration Appliance Release 4.0 Build 14614 was discovered to contain an authenticated command injection vulnerability. |
2026-03-03 | |
| CVE-2025-63910 | 7.2 | HIGH | CWE-345 | 0.0% p14 | 5.04 | An authenticated arbitrary file upload vulnerability in Cohesity TranZman Migrat...An authenticated arbitrary file upload vulnerability in Cohesity TranZman Migration Appliance Release 4.0 Build 14614 allows attackers with Administrator privileges to execute arbitrary code via uploading a crafted patch file. |
2026-03-03 | |
| CVE-2025-63909 | 7.2 | HIGH | CWE-269 | 0.0% p9 | 5.04 | Incorrect access control in the component /opt/SRLtzm/bin/TapeDumper of Cohesity...Incorrect access control in the component /opt/SRLtzm/bin/TapeDumper of Cohesity TranZman Migration Appliance Release 4.0 Build 14614 allows attackers to escalate privileges to root and read and write arbitrary files. |
2026-03-03 | |
| CVE-2025-15599 | 5.1 | MEDIUM | CWE-79 | 0.0% p9 | 3.57 | DOMPurify 3.1.3 through 3.2.6 and 2.5.3 through 2.5.8 contain a cross-site scrip...DOMPurify 3.1.3 through 3.2.6 and 2.5.3 through 2.5.8 contain a cross-site scripting vulnerability that allows attackers to bypass attribute sanitization by exploiting missing textarea rawtext element validation in the SAFE_FOR_XML regex. Attackers can include closing rawtext tags like </textarea> in attribute values to break out of rawtext contexts and execute JavaScript when sanitized output is placed inside rawtext elements. The 3.x branch was fixed in 3.2.7; the 2.x branch was never patched. |
2026-03-03 | |
| CVE-2023-31044 | 2.0 | LOW | CWE-94 | 0.0% p14 | 1.40 | An issue was discovered in Nokia Impact before Mobile 23_FP1. In Impact DM 19.11...An issue was discovered in Nokia Impact before Mobile 23_FP1. In Impact DM 19.11 onwards, a remote authenticated user, using the Add Campaign functionality, can inject a malicious payload within the Campaign Name. This data can be exported to a CSV file. Attackers can populate data fields that may attempt data exfiltration or other malicious activity when automatically executed by the spreadsheet software. |
2026-03-03 | |
| CVE-2021-35486 | 8.1 | HIGH | CWE-352 | 0.0% p6 | 5.67 | A Cross-Site Request Forgery (CSRF) vulnerability in Nokia IMPACT through 19.11....A Cross-Site Request Forgery (CSRF) vulnerability in Nokia IMPACT through 19.11.2.10-20210118042150283 allows a remote attacker to import and overwrite the entire application configuration. Specifically, in /ui/rest-proxy/entity/import, neither the X-CSRF-NONCE HTTP header nor the CSRF-NONCE cookie is validated. |
2026-03-03 | |
| CVE-2021-35485 | 8.0 | HIGH | CWE-434 | 0.1% p19 | 5.60 | The Applications component of Nokia IMPACT version through 19.11.2.10-2021011804...The Applications component of Nokia IMPACT version through 19.11.2.10-20210118042150283 allows an authenticated user to arbitrarily upload server-side executable files via the /ui/rest-proxy/application fileupload parameter. This can occur during the adding of a new application, or during the editing of an existing one. |
2026-03-03 | |
| CVE-2021-35484 | 8.2 | HIGH | CWE-89 | 0.0% p9 | 5.74 | Nokia IMPACT through 19.11.2.10-20210118042150283 allows an authenticated user t...Nokia IMPACT through 19.11.2.10-20210118042150283 allows an authenticated user to perform a Time-based Boolean Blind SQL Injection attack on the endpoint /ui/rest-proxy/campaign/statistic (for the View Campaign page) via the sortColumn HTTP GET parameter. This allows an attacker to access sensitive data from the database and obtain access to the database user, database name, and database version information. |
2026-03-03 | |
| CVE-2021-35483 | 4.1 | MEDIUM | CWE-79 | 0.0% p8 | 2.87 | The Applications component of Nokia IMPACT version through 19.11.2.10-2021011804...The Applications component of Nokia IMPACT version through 19.11.2.10-20210118042150283 allows an authenticated user to arbitrarily upload JavaScript files via the /ui/rest-proxy/application fileupload parameter. This can occur during the adding of a new application, or during the editing of an existing one. If an authenticated user visits the web page where the file is published, the JavaScript code is executed. |
2026-03-03 | |
| CVE-2026-26886 | 2.7 | LOW | CWE-89 | 0.0% p9 | 1.89 | Sourcecodester Online Men's Salon Management System v1.0 is vulnerable to SQL In...Sourcecodester Online Men's Salon Management System v1.0 is vulnerable to SQL Injection in /admin/services/manage_service.php. |
2026-03-03 | |
| CVE-2026-26885 | 2.7 | LOW | CWE-89 | 0.0% p9 | 1.89 | Sourcecodester Online Men's Salon Management System v1.0 is vulnerable to SQL In...Sourcecodester Online Men's Salon Management System v1.0 is vulnerable to SQL Injection in /classes/Master.php?f=delete_service. |
2026-03-03 | |
| CVE-2026-26884 | 2.7 | LOW | CWE-89 | 0.0% p9 | 1.89 | Sourcecodester Online Men's Salon Management System v1.0 is vulnerable to SQL In...Sourcecodester Online Men's Salon Management System v1.0 is vulnerable to SQL Injection in /msms/admin/appointments/view_appointment.php. |
2026-03-03 | |
| CVE-2026-26883 | 2.7 | LOW | CWE-89 | 0.0% p9 | 1.89 | Sourcecodester Online Men's Salon Management System v1.0 is vulnerable to SQL In...Sourcecodester Online Men's Salon Management System v1.0 is vulnerable to SQL Injection in /msms/classes/Master.php?f=delete_appointment. |
2026-03-03 | |
| CVE-2025-62817 | 7.5 | HIGH | CWE-476 | 0.1% p26 | 5.25 | An issue was discovered in Samsung Mobile Processor Exynos 1280, 2200, 1380, 148...An issue was discovered in Samsung Mobile Processor Exynos 1280, 2200, 1380, 1480, 2400, 1580, and 2500. A NULL pointer dereference of session->ncp_hdr_buf in __pilot_parsing_ncp() causes a denial of service. |
2026-03-03 | |
| CVE-2025-62816 | 5.5 | MEDIUM | CWE-20 | 0.0% p5 | 3.85 | An issue was discovered in Samsung Mobile Processor Exynos 1280, 2200, 1380, 148...An issue was discovered in Samsung Mobile Processor Exynos 1280, 2200, 1380, 1480, 2400, 1580, and 2500. Unvalidated VS4L_VERTEXIOC_BOOTUP input leads to a denial of service. |
2026-03-03 | |
| CVE-2025-66680 | 7.1 | HIGH | CWE-59 | 0.0% p10 | 4.97 | An issue in the WiseDelfile64.sys component of WiseCleaner Wise Force Deleter 7....An issue in the WiseDelfile64.sys component of WiseCleaner Wise Force Deleter 7.3.2 and earlier allows attackers to delete arbitrary files via a crafted request. |
2026-03-03 | |
| CVE-2025-66363 | 7.5 | HIGH | CWE-665 | 0.1% p19 | 5.25 | An issue was discovered in LBS in Samsung Mobile Processor Exynos 2200. There wa...An issue was discovered in LBS in Samsung Mobile Processor Exynos 2200. There was no check for memory initialization within DL NAS Transport messages. |
2026-03-03 | |
| CVE-2025-62815 | 5.5 | MEDIUM | CWE-476 | 0.0% p4 | 3.85 | An issue was discovered in Samsung Mobile Processor Exynos 1380, 1480, 2400, 158...An issue was discovered in Samsung Mobile Processor Exynos 1380, 1480, 2400, 1580, and 2500. A NULL pointer dereference of npu_proto_drv.ast.thread_ref in set_cpu_affinity() causes a denial of service. |
2026-03-03 | |
| CVE-2025-62814 | 7.5 | HIGH | CWE-476 | 0.1% p19 | 5.25 | An issue was discovered in Samsung Mobile Processor Exynos 1280, 2200, 1380, 148...An issue was discovered in Samsung Mobile Processor Exynos 1280, 2200, 1380, 1480, and 2400. A NULL pointer dereference of ft_handle in load_fw_utc_vector() causes a denial of service. |
2026-03-03 | |
| CVE-2026-3465 | 2.3 | LOW | CWE-404 | 0.1% p16 | 1.61 | A vulnerability was determined in Tuya App and SDK 24.07.11 on Android. Affected...A vulnerability was determined in Tuya App and SDK 24.07.11 on Android. Affected by this vulnerability is an unknown functionality of the component JSON Data Point Handler. This manipulation of the argument cruise_time causes denial of service. Remote exploitation of the attack is possible. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been publicly disclosed and may be utilized. There is ongoing doubt regarding the real existence of this vulnerability. The vendor disagrees with the conclusion of the finding: "The described vulnerability fails to prove its feasibility or exploitability by attackers. The issue essentially does not constitute a security vulnerability, aligning more closely with abnormal product functionality." These considerations are properly reflected within the CVSS vector. |
2026-03-03 | |
| CVE-2026-28518 | 8.4 | HIGH | CWE-22 | 0.0% p0 | 5.88 | OpenViking versions 0.2.1 and prior, fixed in commit 46b3e76, contain a path tra...OpenViking versions 0.2.1 and prior, fixed in commit 46b3e76, contain a path traversal vulnerability in the .ovpack import handling that allows attackers to write files outside the intended import directory. Attackers can craft malicious ZIP archives with traversal sequences, absolute paths, or drive prefixes in member names to overwrite or create arbitrary files with the importing process privileges. |
2026-03-03 | |
| CVE-2026-24103 | 9.8 | CRITICAL | CWE-120 | 0.1% p23 | 6.86 | A buffer overflow vulnerability was discovered in goform/formSetMacFilterCfg in ...A buffer overflow vulnerability was discovered in goform/formSetMacFilterCfg in Tenda AC15V1.0 V15.03.05.18_multi. |
2026-03-03 | |
| CVE-2026-22891 | 9.8 | CRITICAL | CWE-122 | 0.2% p39 | 6.87 | A heap-based buffer overflow vulnerability exists in the Intan CLP parsing funct...A heap-based buffer overflow vulnerability exists in the Intan CLP parsing functionality of The Biosig Project libbiosig 3.9.2 and Master Branch (db9a9a63). A specially crafted Intan CLP file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability. |
2026-03-03 | |
| CVE-2026-20777 | 8.1 | HIGH | CWE-122 | 0.2% p39 | 5.68 | A heap-based buffer overflow vulnerability exists in the Nicolet WFT parsing fun...A heap-based buffer overflow vulnerability exists in the Nicolet WFT parsing functionality of The Biosig Project libbiosig 3.9.2 and Master Branch (db9a9a63). A specially crafted .wft file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability. |
2026-03-03 | |
| CVE-2025-70821 | 9.8 | CRITICAL | CWE-89 | 0.0% p13 | 6.86 | renren-secuity before v5.5.0 is vulnerable to SQL Injection in the BaseServiceIm...renren-secuity before v5.5.0 is vulnerable to SQL Injection in the BaseServiceImpl.java component |
2026-03-03 | |
| CVE-2025-64736 | 6.1 | MEDIUM | CWE-125 | 0.0% p8 | 4.27 | An out-of-bounds read vulnerability exists in the ABF parsing functionality of T...An out-of-bounds read vulnerability exists in the ABF parsing functionality of The Biosig Project libbiosig 3.9.2 and Master Branch (5462afb0). A specially crafted .abf file can lead to an information leak. An attacker can provide a malicious file to trigger this vulnerability. |
2026-03-03 | |
| CVE-2025-57622 | 9.8 | CRITICAL | CWE-502 | 0.5% p64 | 6.87 | An issue in Step-Video-T2V allows a remote attacker to execute arbitrary code vi...An issue in Step-Video-T2V allows a remote attacker to execute arbitrary code via the /vae-api , /caption-api , feature = pickle.loads(request.get_data()) component |
2026-03-03 | |
| CVE-2025-52365 | 7.8 | HIGH | CWE-77 | 0.2% p35 | 5.46 | A command injection vulnerability in the szc script of the ccurtsinger/stabilize...A command injection vulnerability in the szc script of the ccurtsinger/stabilizer repository allows remote attackers to execute arbitrary system commands via unsanitized user input passed to os.system(). The vulnerability arises from improper input handling where command-line arguments are directly concatenated into shell commands without validation |
2026-03-03 | |
| CVE-2026-3344 | 6.9 | MEDIUM | CWE-440 | 0.0% p11 | 4.83 | A vulnerability in WatchGuard Fireware OS may allow an attacker to bypass the Fi...A vulnerability in WatchGuard Fireware OS may allow an attacker to bypass the Fireware OS filesystem integrity check and maintain limited persistence via a maliciously-crafted firmware update package.This issue affects Fireware OS 12.0 up to and including 12.11.7, 12.5.9 up to and including 12.5.16, and 2025.1 up to and including 2026.1.1. |
2026-03-03 | |
| CVE-2026-3351 | 2.1 | LOW | CWE-862 | 0.0% p6 | 1.47 | Improper authorization in the API endpoint GET /1.0/certificates in Canonical LX...Improper authorization in the API endpoint GET /1.0/certificates in Canonical LXD 6.6 on Linux allows an authenticated, restricted user to enumerate all certificate fingerprints trusted by the lxd server. |
2026-03-03 | |
| CVE-2026-3463 | 4.8 | MEDIUM | CWE-119 | 0.0% p6 | 3.36 | A weakness has been identified in xlnt-community xlnt up to 1.6.1. Impacted is t...A weakness has been identified in xlnt-community xlnt up to 1.6.1. Impacted is the function xlnt::detail::binary_writer::append of the file source/detail/binary.hpp of the component Compound Document Parser. This manipulation causes heap-based buffer overflow. The attack can only be executed locally. The exploit has been made available to the public and could be used for attacks. Patch name: 147. It is suggested to install a patch to address this issue. |
2026-03-03 | |
| CVE-2026-2568 | 7.2 | HIGH | CWE-79 | 0.1% p34 | 5.04 | The WP Zendesk for Contact Form 7, WPForms, Elementor, Formidable and Ninja Form...The WP Zendesk for Contact Form 7, WPForms, Elementor, Formidable and Ninja Forms plugin for WordPress is vulnerable to Stored Cross-Site Scripting via form submission data in all versions up to, and including, 1.1.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-03-03 | |
| CVE-2025-15598 | 6.3 | MEDIUM | CWE-345 | 0.0% p6 | 4.41 | A vulnerability was found in Dataease SQLBot up to 1.5.1. This impacts the funct...A vulnerability was found in Dataease SQLBot up to 1.5.1. This impacts the function validateEmbedded of the file backend/apps/system/middleware/auth.py of the component JWT Token Handler. Performing a manipulation results in improper verification of cryptographic signature. The attack can be initiated remotely. The attack is considered to have high complexity. The exploitability is said to be difficult. The exploit has been made public and could be used. A comment in the source code warns users about using this feature. The vendor was contacted early about this disclosure. |
2026-03-03 | |
| CVE-2026-1876 | 8.7 | HIGH | CWE-404 | 0.2% p42 | 6.10 | Improper Resource Shutdown or Release vulnerability in Mitsubishi Electric Corpo...Improper Resource Shutdown or Release vulnerability in Mitsubishi Electric Corporation MELSEC iQ-F Series FX5-ENET/IP Ethernet Module FX5-ENET/IP all versions allows a remote attacker to cause a denial-of-service (DoS) condition on the products by continuously sending UDP packets to the products. A system reset of the product is required for recovery. |
2026-03-03 | |
| CVE-2026-1875 | 8.7 | HIGH | CWE-404 | 0.2% p42 | 6.10 | Improper Resource Shutdown or Release vulnerability in Mitsubishi Electric Corpo...Improper Resource Shutdown or Release vulnerability in Mitsubishi Electric Corporation MELSEC iQ-F Series FX5-EIP EtherNet/IP Module FX5-EIP all versions allows a remote attacker to cause a denial-of-service (DoS) condition on the products by continuously sending UDP packets to the products. A system reset of the product is required for recovery. |
2026-03-03 | |
| CVE-2026-1874 | 8.7 | HIGH | CWE-670 | 0.2% p42 | 6.10 | Always-Incorrect Control Flow Implementation vulnerability in Mitsubishi Electri...Always-Incorrect Control Flow Implementation vulnerability in Mitsubishi Electric Corporation MELSEC iQ-F Series FX5-ENET/IP Ethernet Module FX5-ENET/IP versions 1.106 and prior and Mitsubishi Electric Corporation MELSEC iQ-F Series FX5-EIP EtherNet/IP Module FX5-EIP all versions allows a remote attacker to cause a denial-of-service (DoS) condition on the products by continuously sending UDP packets to the products. A system reset of the product is required for recovery. |
2026-03-03 | |
| CVE-2025-15595 | 5.7 | MEDIUM | CWE-1390 | 0.0% p2 | 3.99 | Privilege escalation via dll hijacking in Inno Setup 6.2.1 and ealier versions.Privilege escalation via dll hijacking in Inno Setup 6.2.1 and ealier versions. |
2026-03-03 | |
| CVE-2025-12345 | 7.4 | HIGH | CWE-119 | 0.1% p34 | 5.18 | A security vulnerability has been detected in LLM-Claw 0.1.0/0.1.1/0.1.1a/0.1.1a...A security vulnerability has been detected in LLM-Claw 0.1.0/0.1.1/0.1.1a/0.1.1a-p1. The affected element is the function agent_deploy_init of the file /agents/deploy/initiate.c of the component Agent Deployment. Such manipulation leads to buffer overflow. It is possible to launch the attack remotely. A patch should be applied to remediate this issue. |
2026-03-03 | |
| CVE-2026-3455 | 5.1 | MEDIUM | CWE-79 | 0.0% p15 | 3.57 | Versions of the package mailparser before 3.9.3 are vulnerable to Cross-site Scr...Versions of the package mailparser before 3.9.3 are vulnerable to Cross-site Scripting (XSS) via the textToHtml() function due to the improper sanitisation of URLs in the email content. An attacker can execute arbitrary scripts in victim browsers by adding extra quote " to the URL with embedded malicious JavaScript code. |
2026-03-03 | |
| CVE-2026-3449 | 4.8 | MEDIUM | CWE-705 | 0.0% p3 | 3.36 | Versions of the package @tootallnate/once before 3.0.1 are vulnerable to Incorre...Versions of the package @tootallnate/once before 3.0.1 are vulnerable to Incorrect Control Flow Scoping in promise resolving when AbortSignal option is used. The Promise remains in a permanently pending state after the signal is aborted, causing any await or .then() usage to hang indefinitely. This can cause a control-flow leak that can lead to stalled requests, blocked workers, or degraded application availability. |
2026-03-03 | |
| CVE-2026-1492 | 9.8 | CRITICAL | CWE-269 | 39.0% p97 | 8.03 | The User Registration & Membership – Custom Registration Form Builder, Custom Lo...The User Registration & Membership – Custom Registration Form Builder, Custom Login Form, User Profile, Content Restriction & Membership Plugin plugin for WordPress is vulnerable to improper privilege management in all versions up to, and including, 5.1.2. This is due to the plugin accepting a user-supplied role during membership registration without properly enforcing a server-side allowlist. This makes it possible for unauthenticated attackers to create administrator accounts by supplying a role value during membership registration. |
2026-03-03 | |
| CVE-2026-2628 | 9.8 | CRITICAL | CWE-288 | 0.4% p62 | 6.87 | The All-in-One Microsoft 365 & Entra ID / Azure AD SSO Login plugin for WordPres...The All-in-One Microsoft 365 & Entra ID / Azure AD SSO Login plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 2.2.5. This makes it possible for unauthenticated attackers to bypass authentication and log in as other users, including administrators. |
2026-03-03 | |
| CVE-2026-2448 | 8.8 | HIGH | CWE-22 | 0.2% p36 | 6.16 | The Page Builder by SiteOrigin plugin for WordPress is vulnerable to Local File ...The Page Builder by SiteOrigin plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.33.5 via the locate_template() function. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included. |
2026-03-03 | |
| CVE-2026-2269 | 7.2 | HIGH | CWE-434 | 0.3% p53 | 5.05 | The Uncanny Automator – Easy Automation, Integration, Webhooks & Workflow Builde...The Uncanny Automator – Easy Automation, Integration, Webhooks & Workflow Builder Plugin plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 7.0.0.3 via the download_url() function. This makes it possible for authenticated attackers, with Administrator-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services. Additionally, the plugin stores the contents of the remote files on the server, which can be leveraged to upload arbitrary files on the affected site's server which may make remote code execution possible. |
2026-03-03 | |
| CVE-2026-1487 | 6.5 | MEDIUM | CWE-89 | 0.0% p10 | 4.55 | The LatePoint – Calendar Booking Plugin for Appointments and Events plugin for W...The LatePoint – Calendar Booking Plugin for Appointments and Events plugin for WordPress is vulnerable to SQL Injection via the JSON Import in all versions up to, and including, 5.2.7 due to insufficient validation on the user-supplied JSON data. This makes it possible for authenticated attackers, with Administrator-level access and above, to execute arbitrary SQL queries on the database that can be used to extract information via time-based techniques, drop tables, or modify data. |
2026-03-03 | |
| CVE-2026-0754 | 8.2 | HIGH | CWE-321 | 0.0% p1 | 5.74 | An embedded test key and certificate could be extracted from a Poly Voice device...An embedded test key and certificate could be extracted from a Poly Voice device using specialized reverse engineering tools. This extracted certificate could be accepted by a SIP service provider if the service provider does not perform proper validation of the device certificate. |
2026-03-03 | |
| CVE-2026-1566 | 8.8 | HIGH | CWE-269 | 0.1% p15 | 6.16 | The LatePoint – Calendar Booking Plugin for Appointments and Events plugin for W...The LatePoint – Calendar Booking Plugin for Appointments and Events plugin for WordPress is vulnerable to privilege escalation via password reset in all versions up to, and including, 5.2.7. This is due to the plugin allowing users with a LatePoint Agent role, who are creating new customers to set the 'wordpress_user_id' field. This makes it possible for authenticated attackers, with Agent-level access and above, to gain elevated privileges by linking a customer to the arbitrary user ID, including administrators, and then resetting the password. |
2026-03-03 | |
| CVE-2026-2583 | 6.4 | MEDIUM | CWE-79 | 0.0% p10 | 4.48 | The Blocksy theme for WordPress is vulnerable to Stored Cross-Site Scripting via...The Blocksy theme for WordPress is vulnerable to Stored Cross-Site Scripting via the `blocksy_meta` metadata fields in all versions up to, and including, 2.1.30 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
2026-03-02 | |
| CVE-2026-2256 | 6.5 | MEDIUM | CWE-77 | 2.3% p84 | 4.62 | A command injection vulnerability in ModelScope's ms-agent versions v1.6.0rc1 an...A command injection vulnerability in ModelScope's ms-agent versions v1.6.0rc1 and earlier exists, allowing an attacker to execute arbitrary operating system commands through crafted prompt-derived input. |
2026-03-02 | |
| CVE-2026-27631 | 2.7 | LOW | CWE-248 | 0.0% p10 | 1.89 | Exiv2 is a C++ library and a command-line utility to read, write, delete and mod...Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and ICC image metadata. Prior to version 0.28.8, an uncaught exception was found in Exiv2. The vulnerability is in the preview component, which is only triggered when running Exiv2 with an extra command line argument, like -pp. Due to an integer overflow, the code attempts to create a huge std::vector, which causes Exiv2 to crash with an uncaught exception. This issue has been patched in version 0.28.8. |
2026-03-02 | |
| CVE-2026-27596 | 2.7 | LOW | CWE-125 | 0.1% p18 | 1.89 | Exiv2 is a C++ library and a command-line utility to read, write, delete and mod...Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and ICC image metadata. Prior to version 0.28.8, an out-of-bounds read was found in Exiv2. The vulnerability is in the preview component, which is only triggered when running Exiv2 with an extra command line argument, like -pp. The out-of-bounds read is at a 4GB offset, which usually causes Exiv2 to crash. This issue has been patched in version 0.28.8. |
2026-03-02 | |
| CVE-2026-26713 | 9.8 | CRITICAL | CWE-89 | 0.0% p14 | 6.86 | code-projects Simple Food Order System v1.0 is vulnerable to SQL Injection in /f...code-projects Simple Food Order System v1.0 is vulnerable to SQL Injection in /food/routers/cancel-order.php. |
2026-03-02 | |
| CVE-2026-26712 | 9.8 | CRITICAL | CWE-89 | 0.0% p14 | 6.86 | code-projects Simple Food Order System v1.0 is vulnerable to SQL Injection in /f...code-projects Simple Food Order System v1.0 is vulnerable to SQL Injection in /food/view-ticket-admin.php. |
2026-03-02 | |
| CVE-2026-25884 | 2.7 | LOW | CWE-125 | 0.1% p17 | 1.89 | Exiv2 is a C++ library and a command-line utility to read, write, delete and mod...Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and ICC image metadata. Prior to version 0.28.8, an out-of-bounds read was found. The vulnerability is in the CRW image parser. This issue has been patched in version 0.28.8. |
2026-03-02 | |
| CVE-2026-25477 | 6.9 | MEDIUM | CWE-601 | 0.0% p8 | 4.83 | AFFiNE is an open-source, all-in-one workspace and an operating system. Prior to...AFFiNE is an open-source, all-in-one workspace and an operating system. Prior to version 0.26.0, there is an Open Redirect vulnerability located at the /redirect-proxy endpoint. The flaw exists in the domain validation logic, where an improperly anchored Regular Expression allows an attacker to bypass the whitelist by using malicious domains that end with a trusted string. This issue has been patched in version 0.26.0. |
2026-03-02 | |
| CVE-2026-21882 | 8.4 | HIGH | CWE-250 | 0.0% p4 | 5.88 | theshit is a command-line utility that automatically detects and fixes common mi...theshit is a command-line utility that automatically detects and fixes common mistakes in shell commands. Prior to version 0.2.0, improper privilege dropping allows local privilege escalation via command re-execution. This issue has been patched in version 0.2.0. |
2026-03-02 | |
| CVE-2026-26711 | 9.8 | CRITICAL | CWE-89 | 0.0% p14 | 6.86 | code-projects Simple Food Order System v1.0 is vulnerable to SQL Injection in /f...code-projects Simple Food Order System v1.0 is vulnerable to SQL Injection in /food/view-ticket.php. |
2026-03-02 | |
| CVE-2026-26710 | 9.8 | CRITICAL | CWE-89 | 0.0% p14 | 6.86 | code-projects Simple Food Order System v1.0 is vulnerable to SQL Injection in /f...code-projects Simple Food Order System v1.0 is vulnerable to SQL Injection in /food/routers/edit-orders.php. |
2026-03-02 | |
| CVE-2026-26709 | 9.8 | CRITICAL | CWE-89 | 0.0% p14 | 6.86 | code-projects Simple Gym Management System v1.0 is vulnerable to SQL Injection i...code-projects Simple Gym Management System v1.0 is vulnerable to SQL Injection in /gym/trainer_search.php. |
2026-03-02 | |
| CVE-2026-21853 | 8.8 | HIGH | CWE-94 | 0.2% p40 | 6.17 | AFFiNE is an open-source, all-in-one workspace and an operating system. Prior to...AFFiNE is an open-source, all-in-one workspace and an operating system. Prior to version 0.25.4, there is a one-click remote code execution vulnerability. This vulnerability can be exploited by embedding a specially crafted affine: URL on a website. An attacker can trigger the vulnerability in two common scenarios: 1/ A victim visits a malicious website controlled by the attacker and the website redirect to the URL automatically, or 2/ A victim clicks on a crafted link embedded on a legitimate website (e.g., in user-generated content). In both cases, the browser invokes AFFiNE custom URL handler, which launches the AFFiNE app and processes the crafted URL. This results in arbitrary code execution on the victim’s machine, without further interaction. This issue has been patched in version 0.25.4. |
2026-03-02 | |
| CVE-2026-0047 | 8.4 | HIGH | CWE-280 | 0.0% p0 | 5.88 | In dumpBitmapsProto of ActivityManagerService.java, there is a possible way for ...In dumpBitmapsProto of ActivityManagerService.java, there is a possible way for an app to access private information due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. |
2026-03-02 | |
| CVE-2026-0038 | 8.4 | HIGH | NVD-CWE-noinfo | 0.0% p1 | 5.88 | In multiple functions of mem_protect.c, there is a possible way to execute arbit...In multiple functions of mem_protect.c, there is a possible way to execute arbitrary code due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. |
2026-03-02 | |
| CVE-2026-0037 | 8.4 | HIGH | CWE-787 | 0.0% p0 | 5.88 | In multiple functions of ffa.c, there is a possible memory corruption due to a l...In multiple functions of ffa.c, there is a possible memory corruption due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. |
2026-03-02 | |
| CVE-2026-0035 | 8.4 | HIGH | CWE-125 | 0.0% p0 | 5.88 | In createRequest of MediaProvider.java, there is a possible way for an app to ga...In createRequest of MediaProvider.java, there is a possible way for an app to gain read/write access to non-existing files due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. |
2026-03-02 | |
| CVE-2026-0034 | 8.4 | HIGH | CWE-20 | 0.0% p0 | 5.88 | In setPackageOrComponentEnabled of ManagedServices.java, there is a possible not...In setPackageOrComponentEnabled of ManagedServices.java, there is a possible notification policy desync due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. |
2026-03-02 | |
| CVE-2026-0032 | 7.8 | HIGH | CWE-787 | 0.0% p0 | 5.46 | In multiple functions of mem_protect.c, there is a possible out-of-bounds write ...In multiple functions of mem_protect.c, there is a possible out-of-bounds write due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. |
2026-03-02 | |
| CVE-2026-0031 | 8.4 | HIGH | CWE-190 | 0.0% p0 | 5.88 | In multiple functions of mem_protect.c, there is a possible out of bounds write ...In multiple functions of mem_protect.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. |
2026-03-02 | |
| CVE-2026-0030 | 8.4 | HIGH | CWE-787 | 0.0% p0 | 5.88 | In __host_check_page_state_range of mem_protect.c, there is a possible out of bo...In __host_check_page_state_range of mem_protect.c, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. |
2026-03-02 | |
| CVE-2026-0029 | 8.4 | HIGH | CWE-269 | 0.0% p0 | 5.88 | In __pkvm_init_vm of pkvm.c, there is a possible memory corruption due to a logi...In __pkvm_init_vm of pkvm.c, there is a possible memory corruption due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. |
2026-03-02 | |
| CVE-2026-0028 | 8.4 | HIGH | CWE-190 | 0.0% p0 | 5.88 | In __pkvm_host_share_guest of mem_protect.c, there is a possible out of bounds w...In __pkvm_host_share_guest of mem_protect.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. |
2026-03-02 | |
| CVE-2026-0027 | 6.7 | MEDIUM | CWE-416 | 0.0% p0 | 4.69 | In smmu_detach_dev of arm-smmu-v3.c, there is a possible out of bounds write due...In smmu_detach_dev of arm-smmu-v3.c, there is a possible out of bounds write due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. |
2026-03-02 | |
| CVE-2026-0026 | 7.8 | HIGH | NVD-CWE-noinfo | 0.0% p0 | 5.46 | In removePermission of PermissionManagerServiceImpl.java, there is a possible wa...In removePermission of PermissionManagerServiceImpl.java, there is a possible way to override any system permission due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. |
2026-03-02 | |
| CVE-2026-0025 | 8.4 | HIGH | CWE-200 | 0.0% p0 | 5.88 | In hasImage of Notification.java, there is a possible way to reveal information ...In hasImage of Notification.java, there is a possible way to reveal information across users due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. |
2026-03-02 | |
| CVE-2026-0024 | 4.0 | MEDIUM | CWE-862 | 0.0% p0 | 2.80 | In isRedactionNeededForOpenViaContentResolver of MediaProvider.java, there is a ...In isRedactionNeededForOpenViaContentResolver of MediaProvider.java, there is a possible way to reveal the location of media due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. |
2026-03-02 | |
| CVE-2026-0023 | 7.8 | HIGH | CWE-269 | 0.0% p0 | 5.46 | In createSessionInternal of PackageInstallerService.java, there is a possible wa...In createSessionInternal of PackageInstallerService.java, there is a possible way for an app to update its ownership due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. |
2026-03-02 | |
| CVE-2026-0021 | 8.4 | HIGH | CWE-441 | 0.0% p0 | 5.88 | In hasInteractAcrossUsersFullPermission of AppInfoBase.java, there is a possible...In hasInteractAcrossUsersFullPermission of AppInfoBase.java, there is a possible cross-user permission bypass due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. |
2026-03-02 | |
| CVE-2026-0020 | 8.4 | HIGH | CWE-639 | 0.0% p0 | 5.88 | In parsePermissionGroup of ParsedPermissionUtils.java, there is a possible way t...In parsePermissionGroup of ParsedPermissionUtils.java, there is a possible way to bypass a consent dialog to obtain permissions due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. |
2026-03-02 | |
| CVE-2026-0017 | 7.7 | HIGH | CWE-285 | 0.0% p0 | 5.39 | In onChange of BiometricService.java, there is a possible way to enable fingerpr...In onChange of BiometricService.java, there is a possible way to enable fingerprint unlock due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. |
2026-03-02 | |
| CVE-2026-0015 | 6.2 | MEDIUM | CWE-20 | 0.0% p0 | 4.34 | In multiple locations of AppOpsService.java, there is a possible persistent deni...In multiple locations of AppOpsService.java, there is a possible persistent denial of service due to improper input validation. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. |
2026-03-02 | |
| CVE-2026-0014 | 6.2 | MEDIUM | CWE-20 | 0.0% p0 | 4.34 | In isPackageNullOrSystem of AppOpsService.java, there is a possible persistent d...In isPackageNullOrSystem of AppOpsService.java, there is a possible persistent denial of service due to improper input validation. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. |
2026-03-02 | |
| CVE-2026-0013 | 8.4 | HIGH | CWE-441 | 0.0% p0 | 5.88 | In setupLayout of PickActivity.java, there is a possible way to start any activi...In setupLayout of PickActivity.java, there is a possible way to start any activity as a DocumentsUI app due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. |
2026-03-02 | |
| CVE-2026-0012 | 6.2 | MEDIUM | NVD-CWE-noinfo | 0.0% p0 | 4.34 | In setHideSensitive of ExpandableNotificationRow.java, there is a possible conta...In setHideSensitive of ExpandableNotificationRow.java, there is a possible contact name leak due due to a logic error in the code. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. |
2026-03-02 | |
| CVE-2026-0011 | 8.4 | HIGH | CWE-693 | 0.0% p0 | 5.88 | In enableSystemPackageLPw of Settings.java, there is a possible way to prevent l...In enableSystemPackageLPw of Settings.java, there is a possible way to prevent location access from working due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. |
2026-03-02 | |
| CVE-2026-0010 | 8.4 | HIGH | CWE-787 | 0.0% p0 | 5.88 | In onTransact of IDrmManagerService.cpp, there is a possible out of bounds write...In onTransact of IDrmManagerService.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. |
2026-03-02 | |
| CVE-2026-0008 | 8.4 | HIGH | CWE-441 | 0.0% p0 | 5.88 | In multiple locations, there is a possible privilege escalation due to a confus...In multiple locations, there is a possible privilege escalation due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. |
2026-03-02 | |
| CVE-2026-0007 | 8.6 | HIGH | CWE-1021 | 0.0% p0 | 6.02 | In writeToParcel of WindowInfo.cpp, there is a possible way to trick a user into...In writeToParcel of WindowInfo.cpp, there is a possible way to trick a user into accepting a permission due to a tapjacking/overlay attack. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. |
2026-03-02 | |
| CVE-2026-0006 | 9.8 | CRITICAL | CWE-122 | 0.0% p14 | 6.86 | In multiple locations, there is a possible out of bounds read and write due to a...In multiple locations, there is a possible out of bounds read and write due to a heap buffer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. |
2026-03-02 | |
| CVE-2026-0005 | 6.2 | MEDIUM | NVD-CWE-noinfo | 0.0% p0 | 4.34 | In onServiceDisconnected of KeyguardServiceDelegate.java, there is a possible pa...In onServiceDisconnected of KeyguardServiceDelegate.java, there is a possible partial bypass of app pinning allowing limited interaction with other apps without knowing the LSKF due to a missing permission check. This could lead to local information disclosure where the extent of interaction and impact is app-dependent with no additional execution privileges needed. User interaction is not needed for exploitation. |
2026-03-02 | |
| CVE-2025-48654 | 7.8 | HIGH | NVD-CWE-noinfo | 0.0% p0 | 5.46 | In onStart of CompanionDeviceManagerService.java, there is a possible confused d...In onStart of CompanionDeviceManagerService.java, there is a possible confused deputy due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. |
2026-03-02 | |
| CVE-2025-48653 | 7.8 | HIGH | NVD-CWE-noinfo | 0.0% p0 | 5.46 | In loadDataAndPostValue of multiple files, there is a possible way to obscure pe...In loadDataAndPostValue of multiple files, there is a possible way to obscure permission usage due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. |
2026-03-02 | |
| CVE-2025-48650 | 8.4 | HIGH | CWE-89 | 0.0% p0 | 5.88 | In multiple locations, there is a possible information disclosure due to SQL inj...In multiple locations, there is a possible information disclosure due to SQL injection. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. |
2026-03-02 | |
| CVE-2025-48646 | 7.8 | HIGH | CWE-441 | 0.0% p0 | 5.46 | In executeRequest of ActivityStarter.java, there is a possible launch anywhere d...In executeRequest of ActivityStarter.java, there is a possible launch anywhere due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. |
2026-03-02 | |
| CVE-2025-48645 | 7.8 | HIGH | NVD-CWE-noinfo | 0.0% p0 | 5.46 | In loadDescription of DeviceAdminInfo.java, there is a possible persistent packa...In loadDescription of DeviceAdminInfo.java, there is a possible persistent package due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. |
2026-03-02 | |
| CVE-2025-48644 | 5.5 | MEDIUM | NVD-CWE-noinfo | 0.0% p0 | 3.85 | In multiple locations, there is a possible persistent denial of service due to i...In multiple locations, there is a possible persistent denial of service due to improper input validation. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. |
2026-03-02 | |
| CVE-2025-48642 | 5.5 | MEDIUM | NVD-CWE-noinfo | 0.0% p0 | 3.85 | In jump_to_payload of payload.rs, there is a possible information disclosure due...In jump_to_payload of payload.rs, there is a possible information disclosure due to a logic error in the code. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. |
2026-03-02 | |
| CVE-2025-48641 | 7.0 | HIGH | CWE-362 | 0.0% p0 | 4.90 | In multiple functions of Nfc.h, there is a possible use after free due to a race...In multiple functions of Nfc.h, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. |
2026-03-02 | |
| CVE-2025-48636 | 8.4 | HIGH | CWE-22 | 0.0% p1 | 5.88 | In openFile of BugreportContentProvider.java, there is a possible way to read an...In openFile of BugreportContentProvider.java, there is a possible way to read and write unauthorized files due to a path traversal error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. |
2026-03-02 | |
| CVE-2025-48635 | 7.7 | HIGH | CWE-200 | 0.0% p0 | 5.39 | In multiple functions of TaskFragmentOrganizerController.java, there is a possib...In multiple functions of TaskFragmentOrganizerController.java, there is a possible activity token leak due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. |
2026-03-02 | |
| CVE-2025-48634 | 7.3 | HIGH | CWE-862 | 0.0% p0 | 5.11 | In relayoutWindow of WindowManagerService.java, there is a possible tapjack atta...In relayoutWindow of WindowManagerService.java, there is a possible tapjack attack due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. |
2026-03-02 | |
| CVE-2025-48630 | 7.4 | HIGH | CWE-208 | 0.0% p0 | 5.18 | In drawLayersInternal of SkiaRenderEngine.cpp, there is a possible way to access...In drawLayersInternal of SkiaRenderEngine.cpp, there is a possible way to access the GPU cache due to side channel information disclosure. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. |
2026-03-02 | |
| CVE-2025-48619 | 8.4 | HIGH | CWE-284 | 0.0% p0 | 5.88 | In multiple functions of ContentProvider.java, there is a possible way for an ap...In multiple functions of ContentProvider.java, there is a possible way for an app with read-only access to truncate files due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. |
2026-03-02 | |
| CVE-2025-48613 | 7.8 | HIGH | CWE-269 | 0.0% p0 | 5.46 | In VBMeta, there is a possible way to modify and resign VBMeta using a test key,...In VBMeta, there is a possible way to modify and resign VBMeta using a test key, assuming the original image was previously signed with the same key. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. |
2026-03-02 | |
| CVE-2025-48609 | 9.1 | CRITICAL | CWE-400 | 0.0% p3 | 6.37 | In multiple functions of MmsProvider.java, there is a possible way to arbitraril...In multiple functions of MmsProvider.java, there is a possible way to arbitrarily delete files which affect telephony, SMS, and MMS functionalities due to a path traversal error. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. |
2026-03-02 | |
| CVE-2025-48605 | 8.4 | HIGH | CWE-693 | 0.0% p0 | 5.88 | In multiple functions of KeyguardViewMediator.java, there is a possible lockscre...In multiple functions of KeyguardViewMediator.java, there is a possible lockscreen bypass due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. |
2026-03-02 | |
| CVE-2025-48602 | 8.4 | HIGH | CWE-693 | 0.0% p0 | 5.88 | In exitKeyguardAndFinishSurfaceBehindRemoteAnimation of KeyguardViewMediator.jav...In exitKeyguardAndFinishSurfaceBehindRemoteAnimation of KeyguardViewMediator.java, there is a possible lockscreen bypass due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. |
2026-03-02 | |
| CVE-2025-48587 | 6.2 | MEDIUM | CWE-20 | 0.0% p0 | 4.34 | In multiple functions of ProfilingService.java, there is a possible persistent d...In multiple functions of ProfilingService.java, there is a possible persistent denial of service due to improper input validation. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. |
2026-03-02 | |
| CVE-2025-48585 | 6.2 | MEDIUM | CWE-20 | 0.0% p0 | 4.34 | In multiple functions of ProfilingService.java, there is a possible persistent d...In multiple functions of ProfilingService.java, there is a possible persistent denial of service due to improper input validation. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. |
2026-03-02 | |
| CVE-2025-48582 | 8.4 | HIGH | CWE-59 | 0.0% p0 | 5.88 | In multiple locations, there is a possible way to delete media without the MANAG...In multiple locations, there is a possible way to delete media without the MANAGE_EXTERNAL_STORAGE permission due to an intent redirect. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. |
2026-03-02 | |
| CVE-2025-48579 | 8.4 | HIGH | CWE-441 | 0.0% p0 | 5.88 | In multiple functions of MediaProvider.java, there is a possible external storag...In multiple functions of MediaProvider.java, there is a possible external storage write permission bypass due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. |
2026-03-02 | |
| CVE-2025-48578 | 7.8 | HIGH | CWE-862 | 0.0% p0 | 5.46 | In multiple functions of MediaProvider.java, there is a possible way to bypass t...In multiple functions of MediaProvider.java, there is a possible way to bypass the WRITE_EXTERNAL_STORAGE permission due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. |
2026-03-02 | |
| CVE-2025-48577 | 7.4 | HIGH | CWE-362 | 0.0% p0 | 5.18 | In multiple functions of KeyguardViewMediator.java, there is a possible lockscre...In multiple functions of KeyguardViewMediator.java, there is a possible lockscreen bypass due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. |
2026-03-02 | |
| CVE-2025-48574 | 8.4 | HIGH | CWE-862 | 0.0% p0 | 5.88 | In validateAddingWindowLw of DisplayPolicy.java, there is a possible way for an ...In validateAddingWindowLw of DisplayPolicy.java, there is a possible way for an app to intercept drag-and-drop events due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. |
2026-03-02 | |
| CVE-2025-48568 | 7.4 | HIGH | CWE-362 | 0.0% p0 | 5.18 | In multiple locations, there is a possible lockscreen bypass due to a race condi...In multiple locations, there is a possible lockscreen bypass due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. |
2026-03-02 | |
| CVE-2025-48567 | 7.8 | HIGH | CWE-22 | 0.0% p0 | 5.46 | In multiple locations, there is a possible bypass of a file path filter designed...In multiple locations, there is a possible bypass of a file path filter designed to prevent access to sensitive directories due to incorrect unicode normalization. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. |
2026-03-02 | |
| CVE-2025-32313 | 8.4 | HIGH | CWE-787 | 0.0% p0 | 5.88 | In UsageEvents of UsageEvents.java, there is a possible out of bounds write due ...In UsageEvents of UsageEvents.java, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. |
2026-03-02 | |
| CVE-2024-43766 | 6.5 | MEDIUM | CWE-319 | 0.0% p11 | 4.55 | In multiple functions of btm_ble_sec.cc, there is a possible unencrypted communi...In multiple functions of btm_ble_sec.cc, there is a possible unencrypted communication due to Invalid error handling. This could lead to remote (proximal/adjacent) information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. |
2026-03-02 | |
| CVE-2024-31328 | 8.8 | HIGH | CWE-693 | 0.1% p25 | 6.16 | In broadcastIntentLockedTraced of BroadcastController.java, there is a possible ...In broadcastIntentLockedTraced of BroadcastController.java, there is a possible way to launch arbitrary activities from the background on the paired companion phone due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. |
2026-03-02 | |
| CVE-2026-3180 | 7.5 | HIGH | CWE-89 | 0.1% p30 | 5.25 | The Contest Gallery – Upload & Vote Photos, Media, Sell with PayPal & Stripe plu...The Contest Gallery – Upload & Vote Photos, Media, Sell with PayPal & Stripe plugin for WordPress is vulnerable to blind SQL Injection via the ‘cgLostPasswordEmail’ and the ’cgl_mail’ parameter in all versions up to, and including, 28.1.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. The vulnerability's ’cgLostPasswordEmail’ parameter was patched in version 28.1.4, and the ’cgl_mail’ parameter was patched in version 28.1.5. |
2026-03-02 | |
| CVE-2026-3132 | 8.8 | HIGH | CWE-94 | 0.3% p52 | 6.17 | The Master Addons for Elementor Premium plugin for WordPress is vulnerable to Re...The Master Addons for Elementor Premium plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 2.1.3 via the 'JLTMA_Widget_Admin::render_preview'. This is due to missing capability check. This makes it possible for authenticated attackers, with Subscriber-level access and above, to execute code on the server. |
2026-03-02 | |
| CVE-2026-26707 | 9.8 | CRITICAL | CWE-89 | 0.0% p14 | 6.86 | sourcecodester Pharmacy Point of Sale System v1.0 is vulnerable to SQL Injection...sourcecodester Pharmacy Point of Sale System v1.0 is vulnerable to SQL Injection in /pharmacy/view_supplier.php. |
2026-03-02 | |
| CVE-2026-26706 | 9.8 | CRITICAL | CWE-89 | 0.0% p14 | 6.86 | sourcecodester Pharmacy Point of Sale System v1.0 is vulnerable to SQL Injection...sourcecodester Pharmacy Point of Sale System v1.0 is vulnerable to SQL Injection in /pharmacy/view_receipt.php. |
2026-03-02 | |
| CVE-2026-26705 | 9.8 | CRITICAL | CWE-89 | 0.0% p14 | 6.86 | sourcecodester Pharmacy Point of Sale System v1.0 is vulnerable to SQL Injection...sourcecodester Pharmacy Point of Sale System v1.0 is vulnerable to SQL Injection in /pharmacy/view_product.php. |
2026-03-02 | |
| CVE-2026-26704 | 9.8 | CRITICAL | CWE-89 | 0.0% p14 | 6.86 | sourcecodester Pharmacy Point of Sale System v1.0 is vulnerable to SQL Injection...sourcecodester Pharmacy Point of Sale System v1.0 is vulnerable to SQL Injection in /pharmacy/view_category.php. |
2026-03-02 | |
| CVE-2026-0655 | 6.9 | MEDIUM | CWE-22 | 0.0% p11 | 4.83 | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') v...Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in TP-Link Deco BE25 v1.0 (web modules) allows authenticated adjacent attacker to read arbitrary files or cause denial of service. This issue affects Deco BE25 v1.0: through 1.1.1 Build 20250822. |
2026-03-02 | |
| CVE-2026-28401 | 5.3 | MEDIUM | CWE-79 | 0.0% p10 | 3.71 | NocoDB is software for building databases as spreadsheets. Prior to version 0.30...NocoDB is software for building databases as spreadsheets. Prior to version 0.301.3, rich text cell content rendered via v-html without sanitization enables stored XSS. This issue has been patched in version 0.301.3. |
2026-03-02 | |
| CVE-2026-28399 | 6.2 | MEDIUM | CWE-89 | 0.1% p19 | 4.34 | NocoDB is software for building databases as spreadsheets. Prior to version 0.30...NocoDB is software for building databases as spreadsheets. Prior to version 0.301.3, an authenticated user with Creator role can inject arbitrary SQL via the DATEADD formula's unit parameter. This issue has been patched in version 0.301.3. |
2026-03-02 | |
| CVE-2026-28398 | 5.3 | MEDIUM | CWE-79 | 0.0% p10 | 3.71 | NocoDB is software for building databases as spreadsheets. Prior to version 0.30...NocoDB is software for building databases as spreadsheets. Prior to version 0.301.3, user-controlled content in comments and rich text cells was rendered via v-html without sanitization, enabling stored XSS. This issue has been patched in version 0.301.3. |
2026-03-02 | |
| CVE-2026-28397 | 5.3 | MEDIUM | CWE-79 | 0.0% p10 | 3.71 | NocoDB is software for building databases as spreadsheets. Prior to version 0.30...NocoDB is software for building databases as spreadsheets. Prior to version 0.301.3, comments rendered via v-html without sanitization enable stored XSS. This issue has been patched in version 0.301.3. |
2026-03-02 | |
| CVE-2026-28396 | 4.9 | MEDIUM | CWE-613 | 0.0% p10 | 3.43 | NocoDB is software for building databases as spreadsheets. Prior to version 0.30...NocoDB is software for building databases as spreadsheets. Prior to version 0.301.3, the password reset flow did not revoke existing refresh tokens, allowing an attacker with a previously stolen refresh token to continue minting valid JWTs after the victim resets their password. This issue has been patched in version 0.301.3. |
2026-03-02 | |
| CVE-2026-28361 | 4.9 | MEDIUM | CWE-639 | 0.0% p14 | 3.43 | NocoDB is software for building databases as spreadsheets. Prior to version 0.30...NocoDB is software for building databases as spreadsheets. Prior to version 0.301.3, the MCP token service did not validate token ownership, allowing a Creator within the same base to read, regenerate, or delete another user's MCP tokens if the token ID was known. This issue has been patched in version 0.301.3. |
2026-03-02 | |
| CVE-2026-28360 | 2.7 | LOW | CWE-256 | 0.0% p12 | 1.89 | NocoDB is software for building databases as spreadsheets. Prior to version 0.30...NocoDB is software for building databases as spreadsheets. Prior to version 0.301.3, shared view passwords were stored in plaintext in the database and compared using direct string equality. This issue has been patched in version 0.301.3. |
2026-03-02 | |
| CVE-2026-28359 | 5.3 | MEDIUM | CWE-79 | 0.0% p10 | 3.71 | NocoDB is software for building databases as spreadsheets. Prior to version 0.30...NocoDB is software for building databases as spreadsheets. Prior to version 0.301.3, an authenticated user with Editor role can inject arbitrary HTML into Rich Text cells by bypassing the TipTap editor and sending raw HTML via the API. This issue has been patched in version 0.301.3. |
2026-03-02 | |
| CVE-2026-28358 | 2.7 | LOW | CWE-204 | 0.9% p75 | 1.92 | NocoDB is software for building databases as spreadsheets. Prior to version 0.30...NocoDB is software for building databases as spreadsheets. Prior to version 0.301.3, the password forgot endpoint returned different responses for registered and unregistered emails, allowing user enumeration. This issue has been patched in version 0.301.3. |
2026-03-02 | |
| CVE-2026-28357 | 5.3 | MEDIUM | CWE-79 | 0.0% p10 | 3.71 | NocoDB is software for building databases as spreadsheets. Prior to version 0.30...NocoDB is software for building databases as spreadsheets. Prior to version 0.301.3, a stored XSS vulnerability exists in the Formula virtual cell. Formula results containing URI::() patterns are rendered via v-html without sanitization, allowing injected HTML to execute. This issue has been patched in version 0.301.3. |
2026-03-02 | |
| CVE-2026-28286 | 8.5 | HIGH | CWE-73 | 0.1% p23 | 5.95 | ZimaOS is a fork of CasaOS, an operating system for Zima devices and x86-64 syst...ZimaOS is a fork of CasaOS, an operating system for Zima devices and x86-64 systems with UEFI. In version 1.5.2-beta3, the application enforces restrictions in the frontend/UI to prevent users from creating files or folders in internal OS paths. However, when interacting directly with the API, the restrictions are bypass-able. By sending a crafted request targeting paths like /etc, /usr, or other sensitive system directories, the API successfully creates files or directories in locations where normal users should have no write access. This indicates that the API does not properly validate the target path, allowing unauthorized operations on critical system directories. No known patch is publicly available. |
2026-03-02 | |
| CVE-2026-26708 | 9.8 | CRITICAL | CWE-89 | 0.0% p14 | 6.86 | sourcecodester Pharmacy Point of Sale System v1.0 is vulnerable to SQL Injection...sourcecodester Pharmacy Point of Sale System v1.0 is vulnerable to SQL Injection in /pharmacy/manage_user.php. |
2026-03-02 | |
| CVE-2026-26700 | 9.8 | CRITICAL | CWE-89 | 0.0% p14 | 6.86 | sourcecodester Personnel Property Equipment System v1.0 is vulnerable to SQL Inj...sourcecodester Personnel Property Equipment System v1.0 is vulnerable to SQL Injection in /ppes/admin/edit_employee.php. |
2026-03-02 | |
| CVE-2026-24105 | 9.8 | CRITICAL | CWE-94 | 1.9% p83 | 6.92 | An issue was discovered in goform/formsetUsbUnload in Tenda AC15V1.0 V15.03.05.1...An issue was discovered in goform/formsetUsbUnload in Tenda AC15V1.0 V15.03.05.18_multi. The value of `v1` was not checked, potentially leading to a command injection vulnerability if injected into doSystemCmd. |
2026-03-02 | |
| CVE-2026-23865 | 5.3 | MEDIUM | CWE-125 | 0.0% p2 | 3.71 | An integer overflow in the tt_var_load_item_variation_store function of the Free...An integer overflow in the tt_var_load_item_variation_store function of the Freetype library in versions 2.13.2 and 2.13.3 may allow for an out of bounds read operation when parsing HVAR/VVAR/MVAR tables in OpenType variable fonts. This issue is fixed in version 2.14.2. |
2026-03-02 | |
| CVE-2026-21385 | 7.8 | HIGH | CWE-190 | ✓ | 0.2% p46 | 5.47 | Memory corruption while using alignments for memory allocation.Memory corruption while using alignments for memory allocation. |
2026-03-02 |
| CVE-2025-70252 | 7.5 | HIGH | CWE-121 | 0.1% p22 | 5.25 | An issue was discovered in /goform/WifiWpsStart in Tenda AC6V2.0 V15.03.06.23_mu...An issue was discovered in /goform/WifiWpsStart in Tenda AC6V2.0 V15.03.06.23_multi. The index and mode are controllable. If the conditions are met to sprintf, they will be spliced into tmp. It is worth noting that there is no size check,which leads to a stack overflow vulnerability. |
2026-03-02 | |
| CVE-2025-64427 | 7.1 | HIGH | CWE-200 | 0.0% p12 | 4.97 | ZimaOS is a fork of CasaOS, an operating system for Zima devices and x86-64 syst...ZimaOS is a fork of CasaOS, an operating system for Zima devices and x86-64 systems with UEFI. In version 1.5.0 and prior, due to insufficient validation or restriction of target URLs, an authenticated local user can craft requests that target internal IP addresses (e.g., 127.0.0.1, localhost, or private network ranges). This allows the attacker to interact with internal HTTP/HTTPS services that are not intended to be exposed externally or to local users. No known patch is publicly available. |
2026-03-02 | |
| CVE-2025-59603 | 7.8 | HIGH | CWE-787 | 0.0% p2 | 5.46 | Memory Corruption when processing invalid user address with nonstandard buffer a...Memory Corruption when processing invalid user address with nonstandard buffer address. |
2026-03-02 | |
| CVE-2025-59600 | 7.8 | HIGH | CWE-126 | 0.0% p2 | 5.46 | Memory Corruption when adding user-supplied data without checking available buff...Memory Corruption when adding user-supplied data without checking available buffer space. |
2026-03-02 | |
| CVE-2025-47386 | 7.8 | HIGH | CWE-416 | 0.0% p2 | 5.46 | Memory Corruption while invoking IOCTL calls when concurrent access to shared bu...Memory Corruption while invoking IOCTL calls when concurrent access to shared buffer occurs. |
2026-03-02 | |
| CVE-2025-47385 | 7.8 | HIGH | CWE-1262 | 0.0% p1 | 5.46 | Memory Corruption when accessing trusted execution environment without proper pr...Memory Corruption when accessing trusted execution environment without proper privilege check. |
2026-03-02 | |
| CVE-2025-47384 | 6.5 | MEDIUM | CWE-617 | 0.0% p9 | 4.55 | Transient DOS when MAC configures config id greater than supported maximum value...Transient DOS when MAC configures config id greater than supported maximum value. |
2026-03-02 | |
| CVE-2025-47383 | 7.2 | HIGH | CWE-325 | 0.0% p4 | 5.04 | Weak configuration may lead to cryptographic issue when a VoWiFi call is trigger...Weak configuration may lead to cryptographic issue when a VoWiFi call is triggered from UE. |
2026-03-02 | |
| CVE-2025-47381 | 7.8 | HIGH | CWE-416 | 0.0% p2 | 5.46 | Memory Corruption while processing IOCTL calls when concurrent access to shared ...Memory Corruption while processing IOCTL calls when concurrent access to shared buffer occurs. |
2026-03-02 | |
| CVE-2025-47379 | 7.8 | HIGH | CWE-416 | 0.0% p2 | 5.46 | Memory Corruption when concurrent access to shared buffer occurs due to improper...Memory Corruption when concurrent access to shared buffer occurs due to improper synchronization between assignment and deallocation of buffer resources. |
2026-03-02 | |
| CVE-2025-47378 | 7.1 | HIGH | CWE-497 | 0.0% p1 | 4.97 | Cryptographic Issue when a shared VM reference allows HLOS to boot loader and ac...Cryptographic Issue when a shared VM reference allows HLOS to boot loader and access cert chain. |
2026-03-02 | |
| CVE-2025-47377 | 7.8 | HIGH | CWE-416 | 0.0% p2 | 5.46 | Memory Corruption when accessing a buffer after it has been freed while processi...Memory Corruption when accessing a buffer after it has been freed while processing IOCTL calls. |
2026-03-02 | |
| CVE-2025-47376 | 7.8 | HIGH | CWE-416 | 0.0% p2 | 5.46 | Memory Corruption when concurrent access to shared buffer occurs during IOCTL ca...Memory Corruption when concurrent access to shared buffer occurs during IOCTL calls. |
2026-03-02 | |
| CVE-2025-47375 | 7.8 | HIGH | CWE-416 | 0.0% p2 | 5.46 | Memory corruption while handling different IOCTL calls from the user-space simul...Memory corruption while handling different IOCTL calls from the user-space simultaneously. |
2026-03-02 | |
| CVE-2025-47373 | 7.8 | HIGH | CWE-787 | 0.0% p2 | 5.46 | Memory Corruption when accessing buffers with invalid length during TA invocatio...Memory Corruption when accessing buffers with invalid length during TA invocation. |
2026-03-02 | |
| CVE-2025-47371 | 6.5 | MEDIUM | CWE-617 | 0.0% p9 | 4.55 | Transient DOS when an LTE RLC packet with invalid TB is received by UE.Transient DOS when an LTE RLC packet with invalid TB is received by UE. |
2026-03-02 | |
| CVE-2026-28412 | 6.5 | MEDIUM | CWE-400 | 0.1% p16 | 4.55 | Textream is a free macOS teleprompter app. Prior to version 1.5.1, the `Director...Textream is a free macOS teleprompter app. Prior to version 1.5.1, the `DirectorServer` WebSocket server imposes no limit on concurrent connections. Combined with a broadcast timer that sends state to all connected clients every 100 ms, an attacker can exhaust CPU and memory by flooding the server with connections, causing the Textream application to freeze and crash during a live session. Version 1.5.1 fixes the issue. |
2026-03-02 | |
| CVE-2026-28403 | 7.6 | HIGH | CWE-346 | 0.0% p6 | 5.32 | Textream is a free macOS teleprompter app. Prior to version 1.5.1, the `Director...Textream is a free macOS teleprompter app. Prior to version 1.5.1, the `DirectorServer` WebSocket server (`ws://127.0.0.1:<httpPort+1>`) accepts connections from any origin without validating the HTTP `Origin` header during the WebSocket handshake. A malicious web page visited in the same browser session can silently connect to the local WebSocket server and send arbitrary `DirectorCommand` payloads, allowing full remote control of the teleprompter content. Version 1.5.1 fixes the issue. |
2026-03-02 | |
| CVE-2026-26720 | 9.8 | CRITICAL | CWE-94 | 0.5% p66 | 6.88 | An issue in Twenty CRM v1.15.0 and before allows a remote attacker to execute ar...An issue in Twenty CRM v1.15.0 and before allows a remote attacker to execute arbitrary code via the local.driver.ts module. |
2026-03-02 | |
| CVE-2026-26701 | 9.8 | CRITICAL | CWE-89 | 0.0% p14 | 6.86 | sourcecodester Personnel Property Equipment System v1.0 is vulnerable to SQL Inj...sourcecodester Personnel Property Equipment System v1.0 is vulnerable to SQL Injection in /ppes/admin/edit_tecnical_user.php. |
2026-03-02 | |
| CVE-2026-26699 | 7.2 | HIGH | CWE-94 | 0.1% p32 | 5.04 | sourcecodester Personnel Property Equipment System v1.0 is vulnerable to arbitra...sourcecodester Personnel Property Equipment System v1.0 is vulnerable to arbitrary code execution in ip/ppes/admin/admin_change_picture.php. |
2026-03-02 | |
| CVE-2026-24112 | 9.8 | CRITICAL | CWE-120 | 0.1% p23 | 6.86 | An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Attackers may exploit t...An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Attackers may exploit the vulnerability by specifying the value of `userInfo`. When `userInfo` is passed into the `addWewifiWhiteUser` function and processed by `sscanf` without size validation, it could lead to a buffer overflow vulnerability. |
2026-03-02 | |
| CVE-2026-24110 | 9.8 | CRITICAL | CWE-120 | 0.1% p23 | 6.86 | An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Attackers may send over...An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Attackers may send overly long `addDhcpRules` data. When these rules enter the `addDhcpRule` function and are processed by `ret = sscanf(pRule, " %d\t%[^\t]\t%[^\n\r\t]", &dhcpsIndex, dhcpsIP, dhcpsMac);`, the lack of size validation for the rules could lead to buffer overflows in `dhcpsIndex`, `dhcpsIP`, and `dhcpsMac`. |
2026-03-02 | |
| CVE-2026-24101 | 9.8 | CRITICAL | CWE-78 | 1.3% p79 | 6.90 | An issue was discovered in goform/formSetIptv in Tenda AC15V1.0 V15.03.05.18_mul...An issue was discovered in goform/formSetIptv in Tenda AC15V1.0 V15.03.05.18_multi. When the condition is met, `s1_1` will be passed into sub_B0488, concatenated into `doSystemCmd`. The value of s1_1 is not validated, potentially leading to a command injection vulnerability. |
2026-03-02 | |
| CVE-2025-66880 | 6.1 | MEDIUM | CWE-79 | 0.1% p20 | 4.27 | Cross Site Scripting vulnerability in Wethink Technology Inc 720yun pano-sdk 0.5...Cross Site Scripting vulnerability in Wethink Technology Inc 720yun pano-sdk 0.5.877 allows a remote attacker to execute arbitrary code via the LoginComp (Module 2093) and SignupComp (Module 2094) modules. |
2026-03-02 | |
| CVE-2025-52998 | 7.0 | HIGH | CWE-502 | 0.2% p44 | 4.91 | Chamilo is a learning management system. Prior to version 1.11.30, in the applic...Chamilo is a learning management system. Prior to version 1.11.30, in the application, deserialization of data is performed, the data can be spoofed. An attacker can create objects of arbitrary classes, as well as fully control their properties, and thus modify the logic of the web application's operation. This issue has been patched in version 1.11.30. |
2026-03-02 | |
| CVE-2025-52564 | 6.9 | MEDIUM | CWE-80 | 0.0% p11 | 4.83 | Chamilo is a learning management system. Prior to version 1.11.30, the open para...Chamilo is a learning management system. Prior to version 1.11.30, the open parameter of help.php fails to properly sanitize user input. This allows an attacker to inject arbitrary HTML, such as underlined text, via a crafted URL. This issue has been patched in version 1.11.30. |
2026-03-02 | |
| CVE-2025-52563 | 5.1 | MEDIUM | CWE-79 | 0.0% p10 | 3.57 | Chamilo is a learning management system. Prior to version 1.11.30, there is a re...Chamilo is a learning management system. Prior to version 1.11.30, there is a reflected cross-site scripting (XSS) vulnerability due to insufficient sanitization of the page parameter in the session/add_users_to_session.php endpoint. This issue has been patched in version 1.11.30. |
2026-03-02 | |
| CVE-2025-52476 | 5.1 | MEDIUM | CWE-79 | 0.0% p10 | 3.57 | Chamilo is a learning management system. Prior to version 1.11.30, there is a re...Chamilo is a learning management system. Prior to version 1.11.30, there is a reflected cross-site scripting (XSS) vulnerability due to improper sanitization of the keyword_active parameter in admin/user_list.php. This issue has been patched in version 1.11.30. |
2026-03-02 | |
| CVE-2025-52475 | 5.1 | MEDIUM | CWE-79 | 0.0% p10 | 3.57 | Chamilo is a learning management system. Prior to version 1.11.30, there is a re...Chamilo is a learning management system. Prior to version 1.11.30, there is a reflected cross-site scripting (XSS) vulnerability in the admin/user_list.php endpoint. The keyword_inactive parameter is not properly sanitized, allowing attackers to inject malicious JavaScript through a crafted URL. This issue has been patched in version 1.11.30. |
2026-03-02 | |
| CVE-2025-52470 | 4.8 | MEDIUM | CWE-79 | 0.1% p15 | 3.36 | Chamilo is a learning management system. Prior to version 1.11.30, a stored cros...Chamilo is a learning management system. Prior to version 1.11.30, a stored cross-site scripting (XSS) vulnerability exists in the session_category_add.php script. The vulnerability is caused by improper sanitization of the Category Name field, allowing privileged users to inject persistent JavaScript payloads. The injected script is later executed when accessing add_many_sessions_to_category.php, potentially compromising administrative sessions. This issue has been patched in version 1.11.30. |
2026-03-02 | |
| CVE-2025-52469 | 7.1 | HIGH | CWE-841 | 0.0% p10 | 4.97 | Chamilo is a learning management system. Prior to version 1.11.30, a logic vulne...Chamilo is a learning management system. Prior to version 1.11.30, a logic vulnerability in the friend request workflow of Chamilo’s social network module allows an authenticated user to forcibly add any user as a friend by directly calling the AJAX endpoint. The attacker can bypass the normal flow of sending and accepting friend requests, and even add non-existent users. This breaks access control and social interaction logic, with potential privacy implications. This issue has been patched in version 1.11.30. |
2026-03-02 | |
| CVE-2025-52468 | 8.8 | HIGH | CWE-79 | 0.1% p17 | 6.16 | Chamilo is a learning management system. Prior to version 1.11.30, an input vali...Chamilo is a learning management system. Prior to version 1.11.30, an input validation vulnerability exists when importing user data from CSV files. This flaw occurs due to insufficient sanitization of user data, specifically in the "Last Name", "First Name", and "Username" fields. It allows attackers to inject a stored cross-site scripting (XSS) payload that is triggered when the user profile is viewed, potentially leading to malicious script execution in the context of the authenticated use. This issue has been patched in version 1.11.30. |
2026-03-02 | |
| CVE-2025-50199 | 7.7 | HIGH | CWE-918 | 0.1% p25 | 5.39 | Chamilo is a learning management system. Prior to version 1.11.30, there is a bl...Chamilo is a learning management system. Prior to version 1.11.30, there is a blind SSRF vulnerability in /index.php via the POST openid_url parameter. This issue has been patched in version 1.11.30. |
2026-03-02 | |
| CVE-2025-50198 | 8.8 | HIGH | CWE-502 | 0.1% p29 | 6.16 | Chamilo is a learning management system. Prior to version 1.11.30, Chamilo is vu...Chamilo is a learning management system. Prior to version 1.11.30, Chamilo is vulnerable to deserialization of untrusted data in /plugin/vchamilo/views/import.php via POST configuration_file; POST course_path; POST home_path parameters. This issue has been patched in version 1.11.30. |
2026-03-02 | |
| CVE-2025-50197 | 7.1 | HIGH | CWE-78 | 0.7% p72 | 4.99 | Chamilo is a learning management system. Prior to version 1.11.30, there is an O...Chamilo is a learning management system. Prior to version 1.11.30, there is an OS Command Injection vulnerability in /main/admin/sub_language_ajax.inc.php via the POST new_language parameter. This issue has been patched in version 1.11.30. |
2026-03-02 | |
| CVE-2025-50196 | 7.1 | HIGH | CWE-78 | 0.6% p68 | 4.99 | Chamilo is a learning management system. Prior to version 1.11.30, there is an O...Chamilo is a learning management system. Prior to version 1.11.30, there is an OS Command Injection vulnerability in /plugin/vchamilo/views/editinstance.php via the POST main_database parameter. This issue has been patched in version 1.11.30. |
2026-03-02 | |
| CVE-2025-50195 | 7.1 | HIGH | CWE-78 | 0.7% p72 | 4.99 | Chamilo is a learning management system. Prior to version 1.11.30, there is an O...Chamilo is a learning management system. Prior to version 1.11.30, there is an OS Command Injection vulnerability in /plugin/vchamilo/views/manage.controller.php. This issue has been patched in version 1.11.30. |
2026-03-02 | |
| CVE-2025-50194 | 7.1 | HIGH | CWE-78 | 0.7% p72 | 4.99 | Chamilo is a learning management system. Prior to version 1.11.30, there is an O...Chamilo is a learning management system. Prior to version 1.11.30, there is an OS Command Injection vulnerability in /main/cron/lang/check_parse_lang.php. This issue has been patched in version 1.11.30. |
2026-03-02 | |
| CVE-2025-50193 | 7.1 | HIGH | CWE-78 | 0.7% p72 | 4.99 | Chamilo is a learning management system. Prior to version 1.11.30, there is an O...Chamilo is a learning management system. Prior to version 1.11.30, there is an OS command Injection vulnerability in /plugin/vchamilo/views/import.php with the POST to_main_database parameter. This issue has been patched in version 1.11.30. |
2026-03-02 | |
| CVE-2026-26703 | 9.8 | CRITICAL | CWE-89 | 0.0% p14 | 6.86 | sourcecodester Personnel Property Equipment System v1.0 is vulnerable to SQL Inj...sourcecodester Personnel Property Equipment System v1.0 is vulnerable to SQL Injection in /ppes/admin/advance_search.php. |
2026-03-02 | |
| CVE-2026-26702 | 9.8 | CRITICAL | CWE-89 | 0.0% p14 | 6.86 | sourcecodester Personnel Property Equipment System v1.0 is vulnerable to SQL Inj...sourcecodester Personnel Property Equipment System v1.0 is vulnerable to SQL Injection in /ppes/admin/myitem_reuse.php. |
2026-03-02 | |
| CVE-2026-26696 | 9.8 | CRITICAL | CWE-89 | 0.0% p14 | 6.86 | code-projects Simple Student Alumni System v1.0 is vulnerable to SQL Injection i...code-projects Simple Student Alumni System v1.0 is vulnerable to SQL Injection in /TracerStudy/recordteacher_edit.php. |
2026-03-02 | |
| CVE-2026-26695 | 9.8 | CRITICAL | CWE-89 | 0.0% p14 | 6.86 | code-projects Simple Student Alumni System v1.0 is vulnerable to SQL Injection i...code-projects Simple Student Alumni System v1.0 is vulnerable to SQL Injection in /TracerStudy/recordstudent_edit.php. |
2026-03-02 | |
| CVE-2026-26694 | 9.8 | CRITICAL | CWE-89 | 0.0% p14 | 6.86 | code-projects Simple Student Alumni System v1.0 is vulnerale to SQL Injection in...code-projects Simple Student Alumni System v1.0 is vulnerale to SQL Injection in /TracerStudy/modal_view.php. |
2026-03-02 | |
| CVE-2026-24115 | 9.8 | CRITICAL | CWE-120 | 0.1% p23 | 6.86 | An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Failure to validate the...An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Failure to validate the sizes of `gstup` and `gstdwn` before concatenating them into `gstruleQos` may lead to buffer overflow. |
2026-03-02 | |
| CVE-2026-24114 | 9.8 | CRITICAL | CWE-120 | 0.1% p23 | 6.86 | An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Failure to validate `pP...An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Failure to validate `pPortMapIndex` may lead to buffer overflows when using `strcpy`. |
2026-03-02 | |
| CVE-2026-24113 | 9.8 | CRITICAL | CWE-120 | 0.1% p23 | 6.86 | An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Attackers may exploit t...An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Attackers may exploit the vulnerability by controlling the value of `nptr`. When this value is passed into the `getMibPrefix` function and concatenated using `sprintf` without proper size validation, it could lead to a buffer overflow vulnerability. |
2026-03-02 | |
| CVE-2026-24111 | 9.8 | CRITICAL | CWE-120 | 0.1% p23 | 6.86 | An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Attackers may exploit t...An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Attackers may exploit the vulnerability by specifying the value of `userInfo`. When `userInfo` is passed into the `addAuthUser` function and processed by `sscanf` without size validation, it could lead to buffer overflow. |
2026-03-02 | |
| CVE-2026-24109 | 9.8 | CRITICAL | CWE-120 | 0.1% p23 | 6.86 | An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Attackers may exploit t...An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Attackers may exploit the vulnerability by controlling the value of `picName`. When this value is used in `sprintf` without validating variable sizes, it could lead to a buffer overflow vulnerability. |
2026-03-02 | |
| CVE-2026-24108 | 9.8 | CRITICAL | CWE-120 | 0.1% p23 | 6.86 | An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Attackers may exploit t...An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Attackers may exploit the vulnerability by controlling the value of `nptr`. When this value is passed into the `getMibPrefix` function and concatenated using `sprintf` without proper size validation, it could lead to a buffer overflow vulnerability. |
2026-03-02 | |
| CVE-2026-24107 | 9.8 | CRITICAL | CWE-94 | 1.3% p79 | 6.90 | An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Failure to validate the...An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Failure to validate the value of `usbPartitionName`, which is directly used in `doSystemCmd`, may lead to critical command injection vulnerabilities. |
2026-03-02 | |
| CVE-2026-0995 | 3.6 | LOW | CWE-362 | 0.0% p3 | 2.52 | An issue has been identified in Arm C1-Pro before r1p2-50eac0, where, under cert...An issue has been identified in Arm C1-Pro before r1p2-50eac0, where, under certain conditions, a TLBI+DSB might fail to ensure the completion of memory accesses related to SME. |
2026-03-02 | |
| CVE-2025-65465 | 6.1 | MEDIUM | CWE-79 | 0.0% p5 | 4.27 | A reflected Cross-Site Scripting (XSS) vulnerability in the RaiseError function ...A reflected Cross-Site Scripting (XSS) vulnerability in the RaiseError function of Skrol29 TbsZip version 2.17 and earlier allows remote attackers to execute arbitrary web script or HTML via a crafted payload in a filename parameter (e.g., to the FileRead function). This occurs because the error message is not properly sanitized before being output to the user. This vulnerability is fixed in version 2.18. |
2026-03-02 | |
| CVE-2025-58107 | 7.5 | HIGH | CWE-319 | 0.0% p4 | 5.25 | In Microsoft Exchange through 2019, Exchange ActiveSync (EAS) configurations on ...In Microsoft Exchange through 2019, Exchange ActiveSync (EAS) configurations on on-premises servers may transmit sensitive data from Samsung mobile devices in cleartext, including the user's name, e-mail address, device ID, bearer token, and base64-encoded password. |
2026-03-02 | |
| CVE-2025-52482 | 8.3 | HIGH | CWE-79 | 0.1% p23 | 5.81 | Chamilo is a learning management system. Prior to version 1.11.30, a Stored XSS ...Chamilo is a learning management system. Prior to version 1.11.30, a Stored XSS vulnerability exists in the glossary function, enabling all users with the Teachers role to inject JavaScript malicious code against the administrator. This issue has been patched in version 1.11.30. |
2026-03-02 | |
| CVE-2025-50192 | 8.8 | HIGH | CWE-89 | 0.0% p13 | 6.16 | Chamilo is a learning management system. Prior to version 1.11.30, there is a ti...Chamilo is a learning management system. Prior to version 1.11.30, there is a time-based SQL Injection in found in /main/webservices/registration.soap.php. This issue has been patched in version 1.11.30. |
2026-03-02 | |
| CVE-2025-50191 | 7.0 | HIGH | CWE-89 | 0.1% p15 | 4.90 | Chamilo is a learning management system. Prior to version 1.11.30, there is an e...Chamilo is a learning management system. Prior to version 1.11.30, there is an error-based SQL Injection via POST userFile with the /main/exercise/hotpotatoes.php script. This issue has been patched in version 1.11.30. |
2026-03-02 | |
| CVE-2025-50190 | 8.8 | HIGH | CWE-89 | 0.0% p13 | 6.16 | Chamilo is a learning management system. Prior to version 1.11.30, there is an e...Chamilo is a learning management system. Prior to version 1.11.30, there is an error-based SQL Injection via the GET openid.assoc_handle parameter with the /index.php script. This issue has been patched in version 1.11.30. |
2026-03-02 | |
| CVE-2025-50189 | 7.2 | HIGH | CWE-89 | 0.1% p21 | 5.04 | Chamilo is a learning management system. Prior to version 1.11.30, the applicati...Chamilo is a learning management system. Prior to version 1.11.30, the application performs insufficient validation of data coming from the user from the POST resource[document][SQL_INJECTION_HERE] and POST login parameters found in /main/coursecopy/copy_course_session_selected.php, which allows an attacker to perform an attack aimed at modifying the database query logic by injecting an arbitrary SQL statements. This issue has been patched in version 1.11.30. |
2026-03-02 | |
| CVE-2025-50188 | 7.0 | HIGH | CWE-89 | 0.1% p28 | 4.90 | Chamilo is a learning management system. Prior to version 1.11.30, the applicati...Chamilo is a learning management system. Prior to version 1.11.30, the application performs insufficient validation of data coming from the user from the GET value parameter with the following scripts: /plugin/vchamilo/views/syncparams.php and /plugin/vchamilo/ajax/service.php, which allows an attacker to perform an attack aimed at modifying the database query logic by injecting an arbitrary SQL statements. This issue has been patched in version 1.11.30. |
2026-03-02 | |
| CVE-2025-50187 | 9.8 | CRITICAL | CWE-95 | 0.6% p69 | 6.88 | Chamilo is a learning management system. Prior to version 1.11.28, parameter fro...Chamilo is a learning management system. Prior to version 1.11.28, parameter from SOAP request is evaluated without filtering which leads to Remote Code Execution. This issue has been patched in version 1.11.28. |
2026-03-02 | |
| CVE-2025-50186 | 4.8 | MEDIUM | CWE-79 | 0.1% p18 | 3.36 | Chamilo is a learning management system. Prior to version 1.11.30, a stored cros...Chamilo is a learning management system. Prior to version 1.11.30, a stored cross-site scripting (XSS) vulnerability exists due to insufficient sanitization of CSV filenames. An attacker can upload a maliciously named CSV file (e.g., <img src=q onerror=prompt(8)>.csv) that leads to JavaScript execution when viewed by administrators or users with access to import logs or file views. This issue has been patched in version 1.11.30. |
2026-03-02 | |
| CVE-2024-50337 | 5.3 | MEDIUM | CWE-918 | 0.1% p24 | 3.71 | Chamilo is a learning management system. Prior to version 1.11.28, the OpenId fu...Chamilo is a learning management system. Prior to version 1.11.28, the OpenId function allows anyone to send requests to any URL on server's behalf, which results in unauthenticated blind SSRF. This issue has been patched in version 1.11.28. |
2026-03-02 | |
| CVE-2024-47886 | 8.7 | HIGH | CWE-502 | 1.2% p78 | 6.12 | Chamilo is a learning management system. Chamillo is affected by a post-authenti...Chamilo is a learning management system. Chamillo is affected by a post-authentication phar unserialize which leads to a remote code execution (RCE) within versions 1.11.12 to 1.11.26. By abusing multiple supported features from the virtualization plugin vchamilo, the vulnerability allows an administrator to execute arbitrary code on the server. This issue has been patched in version 1.11.26. |
2026-03-02 | |
| CVE-2026-26698 | 4.9 | MEDIUM | CWE-89 | 0.0% p10 | 3.43 | code-projects Simple Student Alumni System v1.0 is vulnerable to SQL Injection i...code-projects Simple Student Alumni System v1.0 is vulnerable to SQL Injection in /TracerStudy/modal_edit.php. |
2026-03-02 | |
| CVE-2026-26697 | 4.9 | MEDIUM | CWE-89 | 0.0% p10 | 3.43 | code-projects Simple Student Alumni System v1.0 is vulnerable to SQL Injection i...code-projects Simple Student Alumni System v1.0 is vulnerable to SQL Injection in /TracerStudy/recordteacher_view.php?teacherID=. |
2026-03-02 | |
| CVE-2026-1628 | 4.6 | MEDIUM | CWE-829 | 0.0% p9 | 3.22 | Mattermost Desktop App versions <=5.13.3 fail to attach listeners restricting na...Mattermost Desktop App versions <=5.13.3 fail to attach listeners restricting navigation to external sites within the Mattermost app which allows a malicious server to expose preload script functionality to untrusted servers via having a user open an external link in their Mattermost server. Mattermost Advisory ID: MMSA-2026-00596 |
2026-03-02 | |
| CVE-2026-3432 | 9.3 | CRITICAL | CWE-862 | 0.1% p33 | 6.51 | On SimStudio version below to 0.5.74, the `/api/auth/oauth/token` endpoint conta...On SimStudio version below to 0.5.74, the `/api/auth/oauth/token` endpoint contains a code path that bypasses all authorization checks when provided with `credentialAccountUserId` and `providerId` parameters. An unauthenticated attacker can retrieve OAuth access tokens for any user by supplying their user ID and a provider name, effectively stealing credentials to third-party services. |
2026-03-02 | |
| CVE-2026-3431 | 9.8 | CRITICAL | CWE-862 | 0.1% p22 | 6.86 | On SimStudio version below to 0.5.74, the MongoDB tool endpoints accept arbitrar...On SimStudio version below to 0.5.74, the MongoDB tool endpoints accept arbitrary connection parameters from the caller without authentication or host restrictions. An attacker can leverage these endpoints to connect to any reachable MongoDB instance and perform unauthorized operations including reading, modifying, and deleting data. |
2026-03-02 | |
| CVE-2025-58406 | 5.3 | MEDIUM | CWE-693 | 0.0% p13 | 3.71 | The CGM CLININET application respond without essential security HTTP headers, ex...The CGM CLININET application respond without essential security HTTP headers, exposing users to client‑side attacks such as clickjacking, MIME sniffing, unsafe caching, weak cross‑origin isolation, and missing transport security controls. |
2026-03-02 | |
| CVE-2025-58405 | 5.3 | MEDIUM | CWE-1021 | 0.0% p8 | 3.71 | The CGM CLININET application does not implement any mechanisms that prevent clic...The CGM CLININET application does not implement any mechanisms that prevent clickjacking attacks, neither HTTP security headers nor HTML-based frame‑busting protections were detected. As a result, an attacker can embed the application inside a maliciously crafted IFRAME and trick users into performing unintended actions, including potentially bypassing CSRF/XSRF defenses. |
2026-03-02 | |
| CVE-2025-58402 | 7.1 | HIGH | CWE-639 | 0.0% p12 | 4.97 | The CGM CLININET application uses direct, sequential object identifiers "Message...The CGM CLININET application uses direct, sequential object identifiers "MessageID" without proper authorization checks. By modifying the parameter in the GET request, an attacker can access messages and attachments belonging to other users. |
2026-03-02 | |
| CVE-2025-30062 | 6.9 | MEDIUM | CWE-89 | 0.0% p14 | 4.83 | In the "CheckUnitCodeAndKey.pl" service, the "validateOrgUnit" function is vulne...In the "CheckUnitCodeAndKey.pl" service, the "validateOrgUnit" function is vulnerable to SQL injection. |
2026-03-02 | |
| CVE-2025-30044 | 9.4 | CRITICAL | CWE-78 | 0.0% p10 | 6.58 | In the endpoints "/cgi-bin/CliniNET.prd/utils/usrlogstat_simple.pl", "/cgi-bin/C...In the endpoints "/cgi-bin/CliniNET.prd/utils/usrlogstat_simple.pl", "/cgi-bin/CliniNET.prd/utils/usrlogstat.pl", "/cgi-bin/CliniNET.prd/utils/userlogstat2.pl", and "/cgi-bin/CliniNET.prd/utils/dblogstat.pl", the parameters are not sufficiently normalized, which enables code injection. |
2026-03-02 | |
| CVE-2025-30042 | 9.0 | CRITICAL | CWE-603 | 0.0% p4 | 6.30 | The CGM CLININET system provides smart card authentication; however, authenticat...The CGM CLININET system provides smart card authentication; however, authentication is conducted locally on the client device, and, in reality, only the certificate number is used for access verification. As a result, possession of the certificate number alone is sufficient for authentication, regardless of the actual presence of the smart card or ownership of the private key. |
2026-03-02 | |
| CVE-2025-30035 | 9.0 | CRITICAL | CWE-306 | 0.0% p13 | 6.30 | The vulnerability enables an attacker to fully bypass authentication in CGM CLIN...The vulnerability enables an attacker to fully bypass authentication in CGM CLININET and gain access to any active user account by supplying only the username, without requiring a password or any other credentials. Obtaining a session ID is sufficient for session takeover and grants access to the system with the privileges of the targeted user. |
2026-03-02 | |
| CVE-2025-10350 | 8.8 | HIGH | CWE-89 | 0.0% p14 | 6.16 | SQL Injection vulnerability in "imageserver" module when processing C-FIND queri...SQL Injection vulnerability in "imageserver" module when processing C-FIND queries in CGM NETRAAD software allows attacker connected to PACS gaining access to database, including data processed by GCM CLININET software.This issue affects CGM NETRAAD with imageserver module in versions before 7.9.0. |
2026-03-02 | |
| CVE-2026-2584 | 9.3 | CRITICAL | CWE-89 | 0.3% p54 | 6.52 | A critical SQL Injection (SQLi) vulnerability has been identified in the authent...A critical SQL Injection (SQLi) vulnerability has been identified in the authentication module of the system. An unauthenticated, remote attacker (AV:N/PR:N) can exploit this flaw by sending specially crafted SQL queries through the login interface. Due to low attack complexity (AC:L) and the absence of specific requirements (AT:N), the vulnerability allows for a total compromise of the system's configuration data (VC:H/VI:H). While the availability of the service remains unaffected (VA:N), the breach may lead to a limited exposure of sensitive information regarding subsequent or interconnected systems (SC:L). |
2026-03-02 | |
| CVE-2026-20445 | 4.4 | MEDIUM | CWE-367 | 0.0% p5 | 3.08 | In MDDP, there is a possible system crash due to a race condition. This could le...In MDDP, there is a possible system crash due to a race condition. This could lead to local denial of service if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10289875; Issue ID: MSV-5184. |
2026-03-02 | |
| CVE-2026-20444 | 6.7 | MEDIUM | CWE-787 | 0.0% p0 | 4.69 | In display, there is a possible memory corruption due to a missing bounds check....In display, there is a possible memory corruption due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10436995; Issue ID: MSV-5721. |
2026-03-02 | |
| CVE-2026-20443 | 6.7 | MEDIUM | CWE-416 | 0.0% p0 | 4.69 | In display, there is a possible memory corruption due to use after free. This co...In display, there is a possible memory corruption due to use after free. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10436998; Issue ID: MSV-5722. |
2026-03-02 | |
| CVE-2026-20442 | 4.4 | MEDIUM | CWE-416 | 0.0% p0 | 3.08 | In display, there is a possible system crash due to use after free. This could l...In display, there is a possible system crash due to use after free. This could lead to local denial of service if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10436998; Issue ID: MSV-5723. |
2026-03-02 | |
| CVE-2026-20441 | 6.7 | MEDIUM | CWE-787 | 0.0% p0 | 4.69 | In MAE, there is a possible out of bounds write due to a missing bounds check. T...In MAE, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10432500; Issue ID: MSV-5803. |
2026-03-02 | |
| CVE-2026-20440 | 6.7 | MEDIUM | CWE-1285 | 0.0% p0 | 4.69 | In MAE, there is a possible out of bounds write due to a missing bounds check. T...In MAE, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10431968; Issue ID: MSV-5824. |
2026-03-02 | |
| CVE-2026-20439 | 4.4 | MEDIUM | CWE-416 | 0.0% p0 | 3.08 | In imgsys, there is a possible system crash due to use after free. This could le...In imgsys, there is a possible system crash due to use after free. This could lead to local denial of service if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10431955; Issue ID: MSV-5826. |
2026-03-02 | |
| CVE-2026-20438 | 6.4 | MEDIUM | CWE-367 | 0.0% p0 | 4.48 | In MAE, there is a possible out of bounds write due to a race condition. This co...In MAE, there is a possible out of bounds write due to a race condition. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10431920; Issue ID: MSV-5835. |
2026-03-02 | |
| CVE-2026-20437 | 4.4 | MEDIUM | CWE-416 | 0.0% p0 | 3.08 | In MAE, there is a possible system crash due to use after free. This could lead ...In MAE, there is a possible system crash due to use after free. This could lead to local denial of service if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10431940; Issue ID: MSV-5843. |
2026-03-02 | |
| CVE-2026-20436 | 6.7 | MEDIUM | CWE-120 | 0.0% p4 | 4.69 | In wlan STA driver, there is a possible escalation of privilege due to a missing...In wlan STA driver, there is a possible escalation of privilege due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: WCNCR00473802; Issue ID: MSV-5970. |
2026-03-02 | |
| CVE-2026-20435 | 4.6 | MEDIUM | CWE-522 | 0.0% p1 | 3.22 | In preloader, there is a possible read of device unique identifiers due to a log...In preloader, there is a possible read of device unique identifiers due to a logic error. This could lead to local information disclosure, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS10607099; Issue ID: MSV-6118. |
2026-03-02 | |
| CVE-2026-20434 | 7.5 | HIGH | CWE-787 | 0.1% p21 | 5.25 | In Modem, there is a possible out of bounds write due to a missing bounds check....In Modem, there is a possible out of bounds write due to a missing bounds check. This could lead to remote escalation of privilege, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: MOLY00782946; Issue ID: MSV-4135. |
2026-03-02 | |
| CVE-2026-20430 | 8.8 | HIGH | CWE-787 | 0.0% p6 | 6.16 | In wlan AP FW, there is a possible out of bounds write due to an incorrect bound...In wlan AP FW, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote (proximal/adjacent) escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00467553; Issue ID: MSV-5151. |
2026-03-02 | |
| CVE-2026-20429 | 4.4 | MEDIUM | CWE-125 | 0.0% p0 | 3.08 | In display, there is a possible out of bounds read due to a missing bounds check...In display, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10320471; Issue ID: MSV-5535. |
2026-03-02 | |
| CVE-2026-20428 | 6.7 | MEDIUM | CWE-787 | 0.0% p0 | 4.69 | In display, there is a possible out of bounds write due to a missing bounds chec...In display, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10320471; Issue ID: MSV-5536. |
2026-03-02 | |
| CVE-2026-20427 | 6.7 | MEDIUM | CWE-787 | 0.0% p0 | 4.69 | In display, there is a possible escalation of privilege due to a missing bounds ...In display, there is a possible escalation of privilege due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10320471; Issue ID: MSV-5537. |
2026-03-02 | |
| CVE-2026-20426 | 6.7 | MEDIUM | CWE-787 | 0.0% p0 | 4.69 | In display, there is a possible out of bounds write due to a missing bounds chec...In display, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10320471; Issue ID: MSV-5538. |
2026-03-02 | |
| CVE-2026-20425 | 6.7 | MEDIUM | CWE-787 | 0.0% p0 | 4.69 | In display, there is a possible out of bounds write due to a missing bounds chec...In display, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10320471; Issue ID: MSV-5539. |
2026-03-02 | |
| CVE-2026-20424 | 4.4 | MEDIUM | CWE-125 | 0.0% p0 | 3.08 | In display, there is a possible out of bounds read due to a missing bounds check...In display, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10320471; Issue ID: MSV-5540. |
2026-03-02 | |
| CVE-2026-20423 | 7.8 | HIGH | CWE-749 | 0.0% p2 | 5.46 | In wlan STA driver, there is a possible out of bounds write due to a missing bou...In wlan STA driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00465314; Issue ID: MSV-4956. |
2026-03-02 | |
| CVE-2026-20416 | 7.2 | HIGH | CWE-787 | 0.0% p6 | 5.04 | In pcie, there is a possible out of bounds write due to a missing bounds check. ...In pcie, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10315038 / ALPS10340155; Issue ID: MSV-5155. |
2026-03-02 | |
| CVE-2026-3422 | 9.3 | CRITICAL | CWE-502 | 0.6% p68 | 6.53 | U-Office Force developed by e-Excellence has a Insecure Deserialization vulnerab...U-Office Force developed by e-Excellence has a Insecure Deserialization vulnerability, allowing unauthenticated remote attackers to execute arbitrary code on the server by sending maliciously crafted serialized content. |
2026-03-02 | |
| CVE-2026-3413 | 6.9 | MEDIUM | CWE-74 | 0.0% p13 | 4.83 | A flaw has been found in itsourcecode University Management System 1.0. This vul...A flaw has been found in itsourcecode University Management System 1.0. This vulnerability affects unknown code of the file /admin_single_student.php. This manipulation of the argument ID causes sql injection. The attack is possible to be carried out remotely. The exploit has been published and may be used. |
2026-03-02 | |
| CVE-2026-3000 | 9.3 | CRITICAL | CWE-494 | 0.2% p39 | 6.52 | IDExpert Windows Logon Agent developed by Changing has a Remote Code Execution v...IDExpert Windows Logon Agent developed by Changing has a Remote Code Execution vulnerability, allowing unauthenticated remote attackers to force the system to download arbitrary DLL files from a remote source and execute them. |
2026-03-02 | |
| CVE-2026-2999 | 9.3 | CRITICAL | CWE-494 | 0.2% p39 | 6.52 | IDExpert Windows Logon Agent developed by Changing has a Remote Code Execution v...IDExpert Windows Logon Agent developed by Changing has a Remote Code Execution vulnerability, allowing unauthenticated remote attackers to force the system to download arbitrary executable files from a remote source and execute them. |
2026-03-02 | |
| CVE-2025-15597 | 5.3 | MEDIUM | CWE-266 | 0.1% p18 | 3.71 | A vulnerability has been found in Dataease SQLBot up to 1.4.0. This affects an u...A vulnerability has been found in Dataease SQLBot up to 1.4.0. This affects an unknown function of the file backend/apps/system/api/assistant.py of the component API Endpoint. Such manipulation leads to improper access controls. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.5.0 mitigates this issue. The name of the patch is d640ac31d1ce64ce90e06cf7081163915c9fc28c. Upgrading the affected component is recommended. Multiple endpoints are affected. The vendor was contacted early about this disclosure. |
2026-03-02 | |
| CVE-2026-3412 | 5.3 | MEDIUM | CWE-79 | 0.0% p14 | 3.71 | A vulnerability was detected in itsourcecode University Management System 1.0. T...A vulnerability was detected in itsourcecode University Management System 1.0. This affects an unknown part of the file /att_single_view.php. The manipulation of the argument dt results in cross site scripting. The attack can be executed remotely. The exploit is now public and may be used. |
2026-03-02 | |
| CVE-2026-3411 | 6.9 | MEDIUM | CWE-74 | 0.0% p13 | 4.83 | A security vulnerability has been detected in itsourcecode University Management...A security vulnerability has been detected in itsourcecode University Management System 1.0. Affected by this issue is some unknown functionality of the file /admin_single_student_update.php. The manipulation of the argument ID leads to sql injection. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used. |
2026-03-02 | |
| CVE-2026-3410 | 6.9 | MEDIUM | CWE-74 | 0.0% p13 | 4.83 | A weakness has been identified in itsourcecode Society Management System 1.0. Af...A weakness has been identified in itsourcecode Society Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/check_studid.php. Executing a manipulation of the argument student_id can lead to sql injection. The attack may be launched remotely. The exploit has been made available to the public and could be used for attacks. |
2026-03-02 | |
| CVE-2026-3409 | 6.9 | MEDIUM | CWE-74 | 0.1% p19 | 4.83 | A security flaw has been discovered in eosphoros-ai db-gpt 0.7.5. Affected is th...A security flaw has been discovered in eosphoros-ai db-gpt 0.7.5. Affected is the function importlib.machinery.SourceFileLoader.exec_module of the file /api/v1/serve/awel/flow/import of the component Flow Import Endpoint. Performing a manipulation as part of File results in code injection. The attack may be initiated remotely. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-02 | |
| CVE-2026-3408 | 5.3 | MEDIUM | CWE-404 | 0.1% p26 | 3.71 | A vulnerability was identified in Open Babel up to 3.1.1. This impacts the funct...A vulnerability was identified in Open Babel up to 3.1.1. This impacts the function OBAtom::GetExplicitValence of the file isrc/atom.cpp of the component CDXML File Handler. Such manipulation leads to null pointer dereference. The attack can be launched remotely. The exploit is publicly available and might be used. The name of the patch is e23a224b8fd9d7c2a7cde9ef4ec6afb4c05aa08a. It is best practice to apply a patch to resolve this issue. |
2026-03-02 | |
| CVE-2026-3407 | 4.8 | MEDIUM | CWE-119 | 0.0% p3 | 3.36 | A vulnerability was determined in YosysHQ yosys up to 0.62. This affects the fun...A vulnerability was determined in YosysHQ yosys up to 0.62. This affects the function Yosys::RTLIL::Const::set of the file kernel/rtlil.h of the component BLIF File Parser. This manipulation causes heap-based buffer overflow. It is possible to launch the attack on the local host. The exploit has been publicly disclosed and may be utilized. Applying a patch is the recommended action to fix this issue. It appears that the issue is not reproducible all the time. |
2026-03-02 | |
| CVE-2026-3406 | 6.9 | MEDIUM | CWE-74 | 0.0% p10 | 4.83 | A vulnerability was found in projectworlds Online Art Gallery Shop 1.0. The impa...A vulnerability was found in projectworlds Online Art Gallery Shop 1.0. The impacted element is an unknown function of the file /admin/registration.php of the component Registration Handler. The manipulation of the argument fname results in sql injection. It is possible to launch the attack remotely. The exploit has been made public and could be used. |
2026-03-02 | |
| CVE-2026-3405 | 2.3 | LOW | CWE-22 | 0.2% p35 | 1.61 | A vulnerability has been found in thinkgem JeeSite up to 5.15.1. The affected el...A vulnerability has been found in thinkgem JeeSite up to 5.15.1. The affected element is an unknown function of the component Connection Handler. The manipulation leads to path traversal. It is possible to initiate the attack remotely. The attack is considered to have high complexity. The exploitability is described as difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-02 | |
| CVE-2026-3404 | 2.3 | LOW | CWE-610 | 0.0% p11 | 1.61 | A flaw has been found in thinkgem JeeSite up to 5.15.1. Impacted is an unknown f...A flaw has been found in thinkgem JeeSite up to 5.15.1. Impacted is an unknown function of the file /com/jeesite/common/shiro/cas/CasOutHandler.java of the component Endpoint. Executing a manipulation can lead to xml external entity reference. The attack may be performed from remote. Attacks of this nature are highly complex. The exploitability is considered difficult. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
2026-03-02 | |
| CVE-2026-3403 | 4.8 | MEDIUM | CWE-79 | 0.0% p11 | 3.36 | A vulnerability was detected in PHPGurukul Student Record Management System 1.0....A vulnerability was detected in PHPGurukul Student Record Management System 1.0. This issue affects some unknown processing of the file /edit-subject.php. Performing a manipulation of the argument Subject 1 results in cross site scripting. The attack is possible to be carried out remotely. The exploit is now public and may be used. |
2026-03-02 | |
| CVE-2026-3402 | 4.8 | MEDIUM | CWE-79 | 0.0% p11 | 3.36 | A security vulnerability has been detected in PHPGurukul Student Record Manageme...A security vulnerability has been detected in PHPGurukul Student Record Management System up to 1.0. This vulnerability affects unknown code of the file /edit-course.php. Such manipulation of the argument Course Short Name leads to cross site scripting. The attack can be executed remotely. The exploit has been disclosed publicly and may be used. |
2026-03-02 | |
| CVE-2026-3401 | 2.3 | LOW | CWE-613 | 0.1% p24 | 1.61 | A weakness has been identified in SourceCodester Web-based Pharmacy Product Mana...A weakness has been identified in SourceCodester Web-based Pharmacy Product Management System 1.0. This affects an unknown part. This manipulation causes session expiration. Remote exploitation of the attack is possible. The complexity of an attack is rather high. It is indicated that the exploitability is difficult. The exploit has been made available to the public and could be used for attacks. |
2026-03-02 | |
| CVE-2026-3400 | 7.4 | HIGH | CWE-119 | 0.1% p33 | 5.18 | A security flaw has been discovered in Tenda AC15 up to 15.13.07.13. Affected by...A security flaw has been discovered in Tenda AC15 up to 15.13.07.13. Affected by this issue is some unknown functionality of the file /goform/TextEditingConversion. The manipulation of the argument wpapsk_crypto2_4g results in stack-based buffer overflow. The attack may be launched remotely. The exploit has been released to the public and may be used for attacks. |
2026-03-02 | |
| CVE-2026-3399 | 7.4 | HIGH | CWE-119 | 0.1% p25 | 5.18 | A vulnerability was identified in Tenda F453 1.0.0.3. Affected by this vulnerabi...A vulnerability was identified in Tenda F453 1.0.0.3. Affected by this vulnerability is the function fromGstDhcpSetSer of the file /goform/GstDhcpSetSer of the component httpd. The manipulation of the argument dips leads to buffer overflow. The attack may be initiated remotely. The exploit is publicly available and might be used. |
2026-03-01 | |
| CVE-2026-3398 | 7.4 | HIGH | CWE-119 | 0.1% p25 | 5.18 | A vulnerability was determined in Tenda F453 1.0.0.3. Affected is the function f...A vulnerability was determined in Tenda F453 1.0.0.3. Affected is the function fromAdvSetWan of the file /goform/AdvSetWan of the component httpd. Executing a manipulation of the argument wanmode/PPPOEPassword can lead to buffer overflow. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized. |
2026-03-01 | |
| CVE-2026-3395 | 6.9 | MEDIUM | CWE-74 | 0.1% p16 | 4.83 | A flaw has been found in MaxSite CMS up to 109.1. This impacts the function eval...A flaw has been found in MaxSite CMS up to 109.1. This impacts the function eval of the file application/maxsite/admin/plugins/editor_markitup/preview-ajax.php of the component MarkItUp Preview AJAX Endpoint. Executing a manipulation can lead to code injection. It is possible to launch the attack remotely. The exploit has been published and may be used. Upgrading to version 109.2 will fix this issue. This patch is called 08937a3c5d672a242d68f53e9fccf8a748820ef3. You should upgrade the affected component. The code maintainer was informed beforehand about the issues. He reacted very fast and highly professional. |
2026-03-01 | |
| CVE-2026-3394 | 4.8 | MEDIUM | CWE-119 | 0.0% p7 | 3.36 | A vulnerability was detected in jarikomppa soloud up to 20200207. This affects t...A vulnerability was detected in jarikomppa soloud up to 20200207. This affects the function SoLoud::Wav::loadwav of the file src/audiosource/wav/soloud_wav.cpp of the component WAV File Parser. Performing a manipulation results in memory corruption. The attack must be initiated from a local position. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet. |
2026-03-01 | |
| CVE-2026-3393 | 4.8 | MEDIUM | CWE-119 | 0.0% p6 | 3.36 | A security vulnerability has been detected in jarikomppa soloud up to 20200207. ...A security vulnerability has been detected in jarikomppa soloud up to 20200207. The impacted element is the function SoLoud::Wav::loadflac of the file src/audiosource/wav/soloud_wav.cpp of the component Audio File Handler. Such manipulation leads to heap-based buffer overflow. The attack must be carried out locally. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report but has not responded yet. |
2026-03-01 | |
| CVE-2026-3392 | 4.8 | MEDIUM | CWE-404 | 0.0% p5 | 3.36 | A weakness has been identified in FascinatedBox lily up to 2.3. The affected ele...A weakness has been identified in FascinatedBox lily up to 2.3. The affected element is the function eval_tree of the file src/lily_emitter.c. This manipulation causes null pointer dereference. The attack is restricted to local execution. The exploit has been made available to the public and could be used for attacks. The project was informed of the problem early through an issue report but has not responded yet. |
2026-03-01 | |
| CVE-2026-3391 | 4.8 | MEDIUM | CWE-119 | 0.0% p1 | 3.36 | A security flaw has been discovered in FascinatedBox lily up to 2.3. Impacted is...A security flaw has been discovered in FascinatedBox lily up to 2.3. Impacted is the function clear_storages of the file src/lily_emitter.c. The manipulation results in out-of-bounds read. The attack is only possible with local access. The exploit has been released to the public and may be used for attacks. The project was informed of the problem early through an issue report but has not responded yet. |
2026-03-01 | |
| CVE-2026-3390 | 4.8 | MEDIUM | CWE-119 | 0.0% p6 | 3.36 | A vulnerability was identified in FascinatedBox lily up to 2.3. This issue affec...A vulnerability was identified in FascinatedBox lily up to 2.3. This issue affects the function patch_line_end of the file src/lily_build_error.c of the component Error Reporting. The manipulation leads to out-of-bounds read. The attack can only be performed from a local environment. The exploit is publicly available and might be used. The project was informed of the problem early through an issue report but has not responded yet. |
2026-03-01 | |
| CVE-2026-3389 | 4.8 | MEDIUM | CWE-404 | 0.0% p7 | 3.36 | A vulnerability was determined in Squirrel up to 3.2. This vulnerability affects...A vulnerability was determined in Squirrel up to 3.2. This vulnerability affects the function sqstd_rex_newnode in the library sqstdlib/sqstdrex.cpp. Executing a manipulation can lead to null pointer dereference. The attack can only be executed locally. The exploit has been publicly disclosed and may be utilized. The project was informed of the problem early through an issue report but has not responded yet. |
2026-03-01 | |
| CVE-2026-3388 | 4.8 | MEDIUM | CWE-404 | 0.0% p7 | 3.36 | A vulnerability was found in Squirrel up to 3.2. This affects the function SQCom...A vulnerability was found in Squirrel up to 3.2. This affects the function SQCompiler::Factor/SQCompiler::UnaryOP of the file squirrel/sqcompiler.cpp. Performing a manipulation results in uncontrolled recursion. The attack needs to be approached locally. The exploit has been made public and could be used. The project was informed of the problem early through an issue report but has not responded yet. |
2026-03-01 | |
| CVE-2026-3387 | 4.8 | MEDIUM | CWE-404 | 0.0% p6 | 3.36 | A vulnerability has been found in wren-lang wren up to 0.4.0. Affected by this i...A vulnerability has been found in wren-lang wren up to 0.4.0. Affected by this issue is the function getByteCountForArguments of the file src/vm/wren_compiler.c. Such manipulation leads to null pointer dereference. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The project was informed of the problem early through an issue report but has not responded yet. |
2026-03-01 | |
| CVE-2026-3386 | 4.8 | MEDIUM | CWE-119 | 0.0% p6 | 3.36 | A flaw has been found in wren-lang wren up to 0.4.0. Affected by this vulnerabil...A flaw has been found in wren-lang wren up to 0.4.0. Affected by this vulnerability is the function emitOp of the file src/vm/wren_compiler.c. This manipulation causes out-of-bounds read. It is possible to launch the attack on the local host. The exploit has been published and may be used. The project was informed of the problem early through an issue report but has not responded yet. |
2026-03-01 | |
| CVE-2026-3385 | 4.8 | MEDIUM | CWE-404 | 0.0% p6 | 3.36 | A vulnerability was detected in wren-lang wren up to 0.4.0. Affected is the func...A vulnerability was detected in wren-lang wren up to 0.4.0. Affected is the function resolveLocal of the file src/vm/wren_compiler.c. The manipulation results in uncontrolled recursion. Attacking locally is a requirement. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet. |
2026-03-01 | |
| CVE-2026-3384 | 4.8 | MEDIUM | CWE-404 | 0.0% p2 | 3.36 | A security vulnerability has been detected in ChaiScript up to 6.1.0. This impac...A security vulnerability has been detected in ChaiScript up to 6.1.0. This impacts the function chaiscript::eval::AST_Node_Impl::eval/chaiscript::eval::Function_Push_Pop of the file include/chaiscript/language/chaiscript_eval.hpp. The manipulation leads to uncontrolled recursion. An attack has to be approached locally. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report but has not responded yet. |
2026-03-01 | |
| CVE-2026-3383 | 4.8 | MEDIUM | CWE-369 | 0.0% p0 | 3.36 | A weakness has been identified in ChaiScript up to 6.1.0. This affects the funct...A weakness has been identified in ChaiScript up to 6.1.0. This affects the function chaiscript::Boxed_Number::go of the file include/chaiscript/dispatchkit/boxed_number.hpp. Executing a manipulation can lead to divide by zero. The attack requires local access. The exploit has been made available to the public and could be used for attacks. The project was informed of the problem early through an issue report but has not responded yet. |
2026-03-01 | |
| CVE-2026-3382 | 4.8 | MEDIUM | CWE-119 | 0.0% p3 | 3.36 | A security flaw has been discovered in ChaiScript up to 6.1.0. The impacted elem...A security flaw has been discovered in ChaiScript up to 6.1.0. The impacted element is the function chaiscript::Boxed_Number::get_as of the file include/chaiscript/dispatchkit/boxed_number.hpp. Performing a manipulation results in memory corruption. The attack requires a local approach. The exploit has been released to the public and may be used for attacks. The project was informed of the problem early through an issue report but has not responded yet. |
2026-03-01 | |
| CVE-2026-3380 | 7.4 | HIGH | CWE-119 | 0.1% p25 | 5.18 | A vulnerability was found in Tenda F453 1.0.0.3. This issue affects the function...A vulnerability was found in Tenda F453 1.0.0.3. This issue affects the function frmL7ImForm of the file /goform/L7Im. The manipulation of the argument page results in buffer overflow. The attack may be launched remotely. The exploit has been made public and could be used. |
2026-03-01 | |
| CVE-2026-3379 | 7.4 | HIGH | CWE-119 | 0.1% p25 | 5.18 | A vulnerability has been found in Tenda F453 1.0.0.3. This vulnerability affects...A vulnerability has been found in Tenda F453 1.0.0.3. This vulnerability affects the function fromSetIpBind of the file /goform/SetIpBind. The manipulation of the argument page leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. |
2026-03-01 | |
| CVE-2026-3378 | 7.4 | HIGH | CWE-119 | 0.1% p25 | 5.18 | A flaw has been found in Tenda F453 1.0.0.3. This affects the function fromqosse...A flaw has been found in Tenda F453 1.0.0.3. This affects the function fromqossetting of the file /goform/qossetting. Executing a manipulation of the argument qos can lead to buffer overflow. The attack can be launched remotely. The exploit has been published and may be used. |
2026-03-01 | |
| CVE-2026-3377 | 7.4 | HIGH | CWE-119 | 0.1% p25 | 5.18 | A vulnerability was detected in Tenda F453 1.0.0.3. Affected by this issue is th...A vulnerability was detected in Tenda F453 1.0.0.3. Affected by this issue is the function fromSafeUrlFilter of the file /goform/SafeUrlFilter. Performing a manipulation of the argument page results in buffer overflow. The attack can be initiated remotely. The exploit is now public and may be used. |
2026-03-01 |