5

CVSS3.1

CVE-2026-27900 - Terraform Provider Debug Logs Vulnerable to Sensitive Information Exposure

The Terraform Provider for Linode versions prior to v3.9.0 logged sensitive information including some passwords, StackScript content, and object storage data in debug logs without redaction. Provider debug logging is not enabled by default. This issue is exposed when debug/provider logs are explic…

📅 Published: Feb. 26, 2026, 12:53 a.m. 🔄 Last Modified: April 17, 2026, 2:45 p.m.

4.9

CVSS3.1

CVE-2026-22728 - sealed-secrets /v1/rotate can widen sealing scope to cluster-wide via attacker-controlled template …

Bitnami Sealed Secrets is vulnerable to a scope-widening attack during the secret rotation (/v1/rotate) flow. The rotation handler derives the sealing scope for the newly encrypted output from untrusted spec.template.metadata.annotations present in the input SealedSecret. By submitting a victim Sea…

📅 Published: Feb. 26, 2026, 12:50 a.m. 🔄 Last Modified: April 17, 2026, 2:45 p.m.

8.8

CVSS3.1

CVE-2026-27899 - WireGuard Portal Vulnerable to Privilege Escalation to Admin via User Self-Update

WireGuard Portal (or wg-portal) is a web-based configuration portal for WireGuard server management. Prior to version 2.1.3, any authenticated non-admin user can become a full administrator by sending a single PUT request to their own user profile endpoint with `"IsAdmin": true` in the JSON body. A…

📅 Published: Feb. 26, 2026, 12:50 a.m. 🔄 Last Modified: April 18, 2026, 10:30 a.m.

7

CVSS4.0

CVE-2026-27896 - MCP Go SDK Vulnerable to Improper Handling of Case Sensitivity

The Go MCP SDK used Go's standard encoding/json.Unmarshal for JSON-RPC and MCP protocol message parsing in versions prior to 1.3.1. Go's standard library performs case-insensitive matching of JSON keys to struct field tags — a field tagged json:"method" would also match "Method", "METHOD", etc. Thi…

📅 Published: Feb. 26, 2026, 12:47 a.m. 🔄 Last Modified: April 17, 2026, 2:45 p.m.

8.9

CVSS4.0

CVE-2026-27830 - c3p0 vulnerable to Remote Code Execution via unsafe deserialization of userOverridesAsString proper…

c3p0, a JDBC Connection pooling library, is vulnerable to attack via maliciously crafted Java-serialized objects and `javax.naming.Reference` instances. Several c3p0 `ConnectionPoolDataSource` implementations have a property called `userOverridesAsString` which conceptually represents a `Map<String…

📅 Published: Feb. 26, 2026, 12:45 a.m. 🔄 Last Modified: April 17, 2026, 2:45 p.m.

6.6

CVSS4.0

CVE-2026-27888 - pypdf: Manipulated FlateDecode XFA streams can exhaust RAM

pypdf is a free and open-source pure-python PDF library. Prior to 6.7.3, an attacker who uses this vulnerability can craft a PDF which leads to the RAM being exhausted. This requires accessing the `xfa` property of a reader or writer and the corresponding stream being compressed using `/FlateDecode…

📅 Published: Feb. 26, 2026, 12:42 a.m. 🔄 Last Modified: April 18, 2026, 5:45 p.m.

5.3

CVSS3.1

CVE-2026-27884 - NetExec vulnerable to arbitrary file write via path traversal in spider_plus module

NetExec is a network execution tool. Prior to version 1.5.1, the module spider_plus improperly creates the output file and folder path when saving files from SMB shares. It does not take into account that it is possible for Linux SMB shares to have path traversal characters such as `../` in them. A…

📅 Published: Feb. 26, 2026, 12:39 a.m. 🔄 Last Modified: April 15, 2026, 12:35 a.m.

6.5

CVSS3.1

CVE-2026-27829 - Astro is vulnerable to SSRF due to missing allowlist enforcement in remote image inferSize

Astro is a web framework. In versions 9.0.0 through 9.5.3, a bug in Astro's image pipeline allows bypassing `image.domains` / `image.remotePatterns` restrictions, enabling the server to fetch content from unauthorized remote hosts. Astro provides an `inferSize` option that fetches remote images at …

📅 Published: Feb. 26, 2026, 12:36 a.m. 🔄 Last Modified: April 17, 2026, 2:45 p.m.

8.2

CVSS4.0

CVE-2026-27946 - ZITADEL Users Can Self-Verify Email/Phone via UpdateHumanUser API

ZITADEL is an open source identity management platform. Prior to versions 4.11.1 and 3.4.7, a vulnerability in Zitadel's self-management capability allowed users to mark their email and phone as verified without going through an actual verification process. The patch in versions 4.11.1 and 3.4.7 re…

📅 Published: Feb. 26, 2026, 12:34 a.m. 🔄 Last Modified: April 17, 2026, 2:45 p.m.

2.1

CVSS4.0

CVE-2026-27945 - ZITADEL has potential SSRF via Actions

ZITADEL is an open source identity management platform. Zitadel Action V2 (introduced as early preview in 2.59.0, beta in 3.0.0 and GA in 4.0.0) is a webhook based approach to allow developers act on API request to Zitadel and customize flows such the issue of a token. Zitadel's Action target URLs …

📅 Published: Feb. 26, 2026, 12:29 a.m. 🔄 Last Modified: April 18, 2026, 7:45 p.m.
Total resulsts: 347269
Page 1239 of 34,727
« previous page » next page
Filters