9.3

CVSS4.0

CVE-2026-40329 - SQL Injection vulnerability via sortBy in beanFeed

Masa CMS is an open source content management system. In versions 7.5.2 and earlier, a SQL injection vulnerability exists in the beanFeed.cfc component within the getQuery function's processing of the sortBy parameter. The application fails to properly sanitize or parameterize this input before inc…

📅 Published: May 5, 2026, 7:44 p.m. 🔄 Last Modified: May 5, 2026, 10:30 p.m.

8.1

CVSS3.1

CVE-2026-44331 - SQL Injection via Reverse DNS Lookup in ProFTPD

In ProFTPD through 1.3.9a before 7666224, a SQL injection vulnerability in sqltab_fetch_clients_cb() in contrib/mod_wrap2_sql.c allows a remote attacker to inject arbitrary SQL commands via a crafted domain name that is accessed in a reverse DNS lookup. When "UseReverseDNS on" is enabled, the attac…

📅 Published: May 5, 2026, 7:41 p.m. 🔄 Last Modified: May 6, 2026, 3:25 p.m.

4.8

CVSS4.0

CVE-2026-35453 - PhpSpreadsheet XSS via number format text substitution in HTML Writer

PhpSpreadsheet is a library for reading and writing spreadsheet files. In versions 1.30.3 and earlier, 2.0.0 through 2.1.15, 2.2.0 through 2.4.4, 3.3.0 through 3.10.4, and 4.0.0 through 5.6.0, the HTML Writer skips htmlspecialchars() output escaping when a cell uses a custom number format containin…

📅 Published: May 5, 2026, 7:39 p.m. 🔄 Last Modified: May 6, 2026, 2:27 p.m.

7.6

CVSS4.0

CVE-2026-35397 - jupyter-server path traversal allows access to sibling directories sharing root_dir name prefix

Jupyter Server is the backend for Jupyter web applications. In versions 2.17.0 and earlier, a path traversal vulnerability in the REST API allows an authenticated user to escape the configured root_dir and access sibling directories whose names begin with the same prefix as the root_dir. For exampl…

📅 Published: May 5, 2026, 7:37 p.m. 🔄 Last Modified: May 6, 2026, 3:50 p.m.

5.4

CVSS4.0

CVE-2026-34596 - Sandboxie-Plus local privilege escalation via TOCTOU race condition in UpdUtil addon installation

Sandboxie-Plus is an open source sandbox-based isolation software for Windows. In versions 1.17.2 and earlier, a Time-of-Check-to-Time-of-Use (TOCTOU) race condition exists during addon installation. When a user installs an addon through the SandMan interface, UpdUtil.exe is spawned as SYSTEM by Sb…

📅 Published: May 5, 2026, 7:34 p.m. 🔄 Last Modified: May 7, 2026, 7:45 p.m.

2

CVSS4.0

CVE-2026-34527 - Sandboxie-Plus EditPassword hash entropy reduced from 160 bits to 80 bits due to incorrect nibble e…

Sandboxie-Plus is an open source sandbox-based isolation software for Windows. In versions 1.17.2 and earlier, SbieIniServer::HashPassword converts a SHA-1 digest to hexadecimal incorrectly. The high nibble of each byte is shifted right by 8 instead of 4, which always produces zero for an 8-bit val…

📅 Published: May 5, 2026, 7:33 p.m. 🔄 Last Modified: May 6, 2026, 12:23 p.m.

8.8

CVSS4.0

CVE-2026-34464 - Sandboxie-Plus NamedPipeServer OpenHandler stack overflow via unterminated server field

Sandboxie-Plus is an open source sandbox-based isolation software for Windows. In versions 1.17.2 and earlier, NamedPipeServer::OpenHandler copies the server field from NAMED_PIPE_OPEN_REQ into a fixed WCHAR pipename[160] stack buffer using wcscat without verifying null termination. The handler onl…

📅 Published: May 5, 2026, 7:31 p.m. 🔄 Last Modified: May 7, 2026, 7:46 p.m.

7.3

CVSS4.0

CVE-2026-34462 - Sandboxie-Plus ProcessServer boxname stack buffer overflows via unterminated wide string copy

Sandboxie-Plus is an open source sandbox-based isolation software for Windows. In versions 1.17.2 and earlier, several ProcessServer handlers (KillAllHandler, SuspendAllHandler, and RunSandboxedHandler) copy a WCHAR boxname[34] field from request structures into WCHAR[40] stack buffers using wcscpy…

📅 Published: May 5, 2026, 7:30 p.m. 🔄 Last Modified: May 7, 2026, 7:47 p.m.

7.3

CVSS4.0

CVE-2026-34461 - Sandboxie-Plus SbieIniServer RunSbieCtrl stack buffer overflow allows local privilege escalation

Sandboxie-Plus is an open source sandbox-based isolation software for Windows. In versions 1.17.2 and earlier, the SbieIniServer RunSbieCtrl handler contains a stack buffer overflow. The MSGID_SBIE_INI_RUN_SBIE_CTRL message is handled before normal sandbox and impersonation checks, and for non-sand…

📅 Published: May 5, 2026, 7:28 p.m. 🔄 Last Modified: May 7, 2026, 7:47 p.m.

8.8

CVSS4.0

CVE-2026-34459 - Sandboxie-Plus sandbox escape via uninitialized memory leak and stack overflow in GetRawInputDevice…

Sandboxie-Plus is an open source sandbox-based isolation software for Windows. In versions 1.17.2 and earlier, the SbieSvc proxy service's GetRawInputDeviceInfoSlave handler contains two vulnerabilities that can be chained for sandbox escape. First, when a sandboxed process sends an IPC request wit…

📅 Published: May 5, 2026, 7:27 p.m. 🔄 Last Modified: May 7, 2026, 7:48 p.m.
Total resulsts: 349182
Page 107 of 34,919
« previous page » next page
Filters