3.9

CVSS3.1

CVE-2026-3632 - Libsoup: libsoup: http smuggling and server-side request forgery via malformed hostnames

A flaw was found in libsoup, a library used by applications to send network requests. This vulnerability occurs because libsoup does not properly validate hostnames, allowing special characters to be injected into HTTP headers. A remote attacker could exploit this to perform HTTP smuggling, where t…

πŸ“… Published: March 6, 2026, 5:05 a.m. πŸ”„ Last Modified: April 16, 2026, 3 a.m.

9.3

CVSS4.0

CVE-2026-28794 - oRPC: Prototype Pollution in `@orpc/client` via `StandardRPCJsonSerializer` Deserialization

oRPC is an tool that helps build APIs that are end-to-end type-safe and adhere to OpenAPI standards. Prior to version 1.13.6, a prototype pollution vulnerability exists in the RPC JSON deserializer of the @orpc/client package. The vulnerability allows unauthenticated, remote attackers to inject arb…

πŸ“… Published: March 6, 2026, 5:02 a.m. πŸ”„ Last Modified: April 16, 2026, 11:45 a.m.

5.3

CVSS3.1

CVE-2026-28428 - Talishar: Authentication Bypass via Empty authKey Parameter Allows Unauthenticated Game Actions

Talishar is a fan-made Flesh and Blood project. Prior to commit a9c218e, an authentication bypass vulnerability in Talishar's game endpoint validation logic allows any unauthenticated attacker to perform authenticated game actions β€” including sending chat messages and submitting game inputs β€” by su…

πŸ“… Published: March 6, 2026, 4:59 a.m. πŸ”„ Last Modified: April 20, 2026, 12:57 p.m.

7.5

CVSS3.1

CVE-2026-28429 - Talishar: Critical Path Traversal in gameName Parameter

Talishar is a fan-made Flesh and Blood project. Prior to commit 6be3871, a Path Traversal vulnerability was identified in the gameName parameter. While the application's primary entry points implement input validation, the ParseGamestate.php component can be accessed directly as a standalone script…

πŸ“… Published: March 6, 2026, 4:59 a.m. πŸ”„ Last Modified: April 20, 2026, 12:54 p.m.

8.2

CVSS3.1

CVE-2026-28787 - OneUptime has WebAuthn 2FA bypass: server accepts client-supplied challenge instead of server-store…

OneUptime is a solution for monitoring and managing online services. In version 10.0.11 and prior, the WebAuthn authentication implementation does not store the challenge on the server side. Instead, the challenge is returned to the client and accepted back from the client request body during verif…

πŸ“… Published: March 6, 2026, 4:55 a.m. πŸ”„ Last Modified: April 17, 2026, 12:30 p.m.

6.5

CVSS3.1

CVE-2026-28685 - Kimai: API invoice endpoint missing customer-level access control (IDOR)

Kimai is a web-based multi-user time-tracking application. Prior to version 2.51.0, "GET /api/invoices/{id}" only checks the role-based view_invoice permission but does not verify the requesting user has access to the invoice's customer. Any user with ROLE_TEAMLEAD (which grants view_invoice) can r…

πŸ“… Published: March 6, 2026, 4:49 a.m. πŸ”„ Last Modified: April 17, 2026, 12:30 p.m.

4.6

CVSS3.1

CVE-2026-29084 - Gokapi: CSRF in Login Endpoint

Gokapi is a self-hosted file sharing server with automatic expiration and encryption support. Prior to version 2.2.3, the login flow accepts credential-bearing requests without CSRF protection mechanisms tied to the browser session context. The handler parses form values directly and creates a sess…

πŸ“… Published: March 6, 2026, 4:45 a.m. πŸ”„ Last Modified: April 16, 2026, 11:45 a.m.

5.4

CVSS3.1

CVE-2026-29061 - Gokapi: Privilege escalation via incomplete API-key permission revocation on user rank demotion

Gokapi is a self-hosted file sharing server with automatic expiration and encryption support. Prior to version 2.2.3, a privilege escalation vulnerability in the user rank demotion logic allows a demoted user's existing API keys to retain ApiPermManageFileRequests and ApiPermManageLogs permissions,…

πŸ“… Published: March 6, 2026, 4:45 a.m. πŸ”„ Last Modified: April 16, 2026, 11:45 a.m.

5

CVSS3.1

CVE-2026-29060 - Gokapi: Privilege escalation with auth token

Gokapi is a self-hosted file sharing server with automatic expiration and encryption support. Prior to version 2.2.3, a registered user without privileges to create or modify file requests is able to create a short-lived API key that has the permission to do so. The user must be registered with Gok…

πŸ“… Published: March 6, 2026, 4:44 a.m. πŸ”„ Last Modified: April 16, 2026, 11:45 a.m.

8.7

CVSS3.1

CVE-2026-28683 - Gokapi: Stored XSS in SVG Hotlinks

Gokapi is a self-hosted file sharing server with automatic expiration and encryption support. Prior to version 2.2.3, if a malicious authenticated user uploads SVG and creates a hotlink for it, they can achieve stored XSS. This issue has been patched in version 2.2.3.

πŸ“… Published: March 6, 2026, 4:44 a.m. πŸ”„ Last Modified: April 16, 2026, 11:45 a.m.
Total resulsts: 349182
Page 1282 of 34,919
Β« previous page Β» next page
Filters