8.5

CVSS4.0

CVE-2026-7791 - Privilege Escalation via Log Rotation in Amazon WorkSpaces

Improper privilege management in the log rotation mechanism of the Skylight Workspace Config Service in Amazon WorkSpaces for Windows before 2.6.2034.0 allows a local non-admin authenticated user to place arbitrary files into arbitrary locations bypassing file system permission protections, leading…

📅 Published: May 4, 2026, 10:07 p.m. 🔄 Last Modified: May 5, 2026, 2:13 p.m.

5.3

CVSS4.0

CVE-2026-7780 - Open5GS smf-registrations Endpoint udm-sm.c udm_state_operational denial of service

A weakness has been identified in Open5GS up to 2.7.7. Affected by this vulnerability is the function udm_state_operational of the file /src/udm/udm-sm.c of the component smf-registrations Endpoint. Executing a manipulation can lead to denial of service. The attack can be executed remotely. The exp…

📅 Published: May 4, 2026, 10 p.m. 🔄 Last Modified: May 4, 2026, 10 p.m.

7.5

CVSS3.1

CVE-2026-7776 - Boundary Workers Vulnerable to Denial of Service During TLS Handshake

Boundary Community Edition and Boundary Enterprise (“Boundary”) workers are vulnerable to a denial-of-service condition during node enrollment TLS handshakes. An attacker with network access to the worker authentication listener may open a connection and delay or withhold the client certificate dur…

📅 Published: May 4, 2026, 9:34 p.m. 🔄 Last Modified: May 6, 2026, 9:22 a.m.

5.3

CVSS4.0

CVE-2026-7779 - Open5GS authentication-subscription Endpoint nudr-handler.c udm_nudr_dr_handle_subscription_authent…

A security flaw has been discovered in Open5GS up to 2.7.7. Affected is the function udm_nudr_dr_handle_subscription_authentication of the file /src/udm/nudr-handler.c of the component authentication-subscription Endpoint. Performing a manipulation results in denial of service. Remote exploitation …

📅 Published: May 4, 2026, 8:30 p.m. 🔄 Last Modified: May 4, 2026, 8:30 p.m.

9

CVSS4.0

CVE-2026-42238 - Unauthenticated Remote Code Execution via Backup Restore in nginx-ui

Nginx UI is a web user interface for the Nginx web server. Prior to version 2.3.8, nginx-ui exposes a backup restore endpoint (POST /api/restore) that is completely unauthenticated during the first 10 minutes after process startup on any fresh installation. An unauthenticated remote attacker can up…

📅 Published: May 4, 2026, 8:13 p.m. 🔄 Last Modified: May 6, 2026, 2:45 p.m.

6.5

CVSS3.1

CVE-2026-42223 - nginx-ui: Settings API Exposes Protected Secrets

Nginx UI is a web user interface for the Nginx web server. Prior to version 2.3.8, the GetSettings API handler (api/settings/settings.go:24-65) serializes all settings structs to JSON and returns them to authenticated users. Many sensitive fields are tagged with protected:"true" - however, this tag…

📅 Published: May 4, 2026, 8:12 p.m. 🔄 Last Modified: May 6, 2026, 2:46 p.m.

8.1

CVSS3.1

CVE-2026-42222 - nginx-ui: Unauthenticated first-boot instance claim via POST /api/install allows remote bootstrap t…

Nginx UI is a web user interface for the Nginx web server. In version 2.3.5, an unauthenticated bootstrap takeover exists in nginx-ui during the initial installation window exposed by POST /api/install. At time of publication no public patches are available.

📅 Published: May 4, 2026, 8:11 p.m. 🔄 Last Modified: May 6, 2026, 1:58 p.m.

8.1

CVSS3.1

CVE-2026-42221 - nginx-ui: Unauthenticated First-Run Installer Allows Remote Initial Admin Claim

Nginx UI is a web user interface for the Nginx web server. From version 2.0.0 to before version 2.3.8, an unauthenticated network attacker can claim the initial administrator account on a fresh nginx-ui instance during the first-run setup window. The public /api/install endpoint is reachable withou…

📅 Published: May 4, 2026, 8:09 p.m. 🔄 Last Modified: May 6, 2026, 5:17 p.m.

6.5

CVSS3.1

CVE-2026-42220 - nginx-ui: Authenticated settings disclosure exposes node.secret and enables trusted-node authentica…

Nginx UI is a web user interface for the Nginx web server. Prior to version 2.3.8, an authenticated user can call GET /api/settings and retrieve sensitive configuration values, including node.secret. The same node.secret is accepted by AuthRequired() through the X-Node-Secret header (or node_secret…

📅 Published: May 4, 2026, 8:08 p.m. 🔄 Last Modified: May 6, 2026, 5:16 p.m.

7.5

CVSS3.1

CVE-2026-6321 - fast-uri vulnerable to path traversal via percent-encoded dot segments

fast-uri decoded percent-encoded path separators and dot segments before applying dot-segment removal in its normalize() and equal() functions. Encoded path data was treated like real slashes and parent-directory references, so distinct URIs could collapse onto the same normalized path. Application…

📅 Published: May 4, 2026, 7:31 p.m. 🔄 Last Modified: May 6, 2026, 9:22 a.m.
Total resulsts: 349182
Page 125 of 34,919
« previous page » next page
Filters