5.3

CVSS4.0

CVE-2026-5355 - Trendnet TEW-657BRM setup.cgi vpn_drop os command injection

A vulnerability has been found in Trendnet TEW-657BRM 1.00.1. Affected by this issue is the function vpn_drop of the file /setup.cgi. The manipulation of the argument policy_name leads to os command injection. The attack is possible to be carried out remotely. The exploit has been disclosed to the …

πŸ“… Published: April 2, 2026, 4:45 p.m. πŸ”„ Last Modified: April 3, 2026, 4:10 p.m.

5.3

CVSS3.1

CVE-2026-34786 - Rack: Rack::Static header_rules bypass via URL-encoded paths

Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Static#applicable_rules evaluates several header_rules types against the raw URL-encoded PATH_INFO, while the underlying file-serving path is decoded before the file is served. As a result, a request for…

πŸ“… Published: April 2, 2026, 4:44 p.m. πŸ”„ Last Modified: April 7, 2026, 7:55 a.m.

3.6

CVSS3.1

CVE-2026-35386 - OpenSSH: OpenSSH: Arbitrary command execution via shell metacharacters in username

In OpenSSH before 10.3, command execution can occur via shell metacharacters in a username within a command line. This requires a scenario where the username on the command line is untrusted, and also requires a non-default configurations of % in ssh_config.

πŸ“… Published: April 2, 2026, 4:44 p.m. πŸ”„ Last Modified: April 7, 2026, 7:55 a.m.

7.5

CVSS3.1

CVE-2026-34785 - Rack: Local file inclusion in `Rack::Static` via URL Prefix Matching

Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Static determines whether a request should be served as a static file using a simple string prefix check. When configured with URL prefixes such as "/css", it matches any request path that begins with th…

πŸ“… Published: April 2, 2026, 4:44 p.m. πŸ”„ Last Modified: April 7, 2026, 7:55 a.m.

5.3

CVSS3.1

CVE-2026-34763 - Rack: Rack::Directory info disclosure and DoS via unescaped regex interpolation

Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Directory interpolates the configured root path directly into a regular expression when deriving the displayed directory path. If root contains regex metacharacters such as +, *, or ., the prefix strippi…

πŸ“… Published: April 2, 2026, 4:43 p.m. πŸ”„ Last Modified: April 7, 2026, 7:56 a.m.

4.8

CVSS3.1

CVE-2026-34831 - Rack: Content-Length mismatch in Rack::Files error responses

Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Files#fail sets the Content-Length response header using String#size instead of String#bytesize. When the response body contains multibyte UTF-8 characters, the declared Content-Length is smaller than th…

πŸ“… Published: April 2, 2026, 4:43 p.m. πŸ”„ Last Modified: April 3, 2026, 5:48 p.m.

3.7

CVSS3.1

CVE-2026-26961 - Rack: Multipart Boundary Parsing Ambiguity allowing WAF Bypass

Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Multipart::Parser extracts the boundary parameter from multipart/form-data using a greedy regular expression. When a Content-Type header contains multiple boundary parameters, Rack selects the last one r…

πŸ“… Published: April 2, 2026, 4:42 p.m. πŸ”„ Last Modified: April 7, 2026, 7:56 a.m.

5.3

CVSS3.1

CVE-2026-34230 - Rack: Quadratic complexity in Rack::Utils.select_best_encoding via wildcard Accept-Encoding header

Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Utils.select_best_encoding processes Accept-Encoding values with quadratic time complexity when the header contains many wildcard (*) entries. Because this method is used by Rack::Deflater to choose a re…

πŸ“… Published: April 2, 2026, 4:41 p.m. πŸ”„ Last Modified: April 7, 2026, 7:56 a.m.

7.5

CVSS3.1

CVE-2026-35385 - OpenSSH: OpenSSH: Privilege escalation via scp legacy protocol when not preserving file mode

In OpenSSH before 10.3, a file downloaded by scp may be installed setuid or setgid, an outcome contrary to some users' expectations, if the download is performed as root with -O (legacy scp protocol) and without -p (preserve mode).

πŸ“… Published: April 2, 2026, 4:30 p.m. πŸ”„ Last Modified: April 3, 2026, 4:10 p.m.

5.3

CVSS4.0

CVE-2026-5354 - Trendnet TEW-657BRM setup.cgi vpn_connect os command injection

A flaw has been found in Trendnet TEW-657BRM 1.00.1. Affected by this vulnerability is the function vpn_connect of the file /setup.cgi. Executing a manipulation of the argument policy_name can lead to os command injection. The attack can be executed remotely. The exploit has been published and may …

πŸ“… Published: April 2, 2026, 4:30 p.m. πŸ”„ Last Modified: April 3, 2026, 4:10 p.m.
Total resulsts: 343048
Page 118 of 34,305
Β« previous page Β» next page
Filters