5.1

CVSS4.0

CVE-2026-22675 - OCS Inventory NG Server Stored XSS via User-Agent

OCS Inventory NG Server version 2.12.3 and prior contain a stored cross-site scripting vulnerability that allows unauthenticated attackers to execute arbitrary JavaScript by submitting malicious User-Agent HTTP headers to the /ocsinventory endpoint. Attackers can register rogue agents or craft requโ€ฆ

๐Ÿ“… Published: April 6, 2026, 9:19 p.m. ๐Ÿ”„ Last Modified: April 10, 2026, 9:41 a.m.

5.1

CVSS4.0

CVE-2026-35475 - WeGIA - Open Redirect - backup redirection โ€” Unvalidated $_GET['redirect']

WeGIA is a Web manager for charitable institutions. Prior to 3.6.9, the redirect parameter is taken directly from $_GET with no URL validation or whitelist check, then used verbatim in a header("Location: ...") call. This vulnerability is fixed in 3.6.9.

๐Ÿ“… Published: April 6, 2026, 9:17 p.m. ๐Ÿ”„ Last Modified: April 10, 2026, 8:18 p.m.

8.6

CVSS4.0

CVE-2026-5684 - Tenda CX12L webExcptypemanFilter fromwebExcptypemanFilter stack-based overflow

A vulnerability was determined in Tenda CX12L 16.03.53.12. Affected by this issue is the function fromwebExcptypemanFilter of the file /goform/webExcptypemanFilter. Executing a manipulation of the argument page can lead to stack-based buffer overflow. The attack requires access to the local networkโ€ฆ

๐Ÿ“… Published: April 6, 2026, 9:15 p.m. ๐Ÿ”„ Last Modified: April 7, 2026, 6:53 a.m.

5.1

CVSS4.0

CVE-2026-35474 - WeGIA - Open Redirect - atualizacao redirection - Unvalidated $_GET['redirect']

WeGIA is a Web manager for charitable institutions. Prior to 3.6.9, open redirect has been found in WeGIA webapp. The redirect parameter is taken directly from $_GET with no URL validation or whitelist check, then used verbatim in a header("Location: ...") call. This vulnerability is fixed in 3.6.9.

๐Ÿ“… Published: April 6, 2026, 9:13 p.m. ๐Ÿ”„ Last Modified: April 10, 2026, 8:24 p.m.

5.1

CVSS4.0

CVE-2026-35473 - WeGIA - Open Redirect - IentradaControle - listarId() - Unvalidated $_GET['nextPage']

WeGIA is a Web manager for charitable institutions. Prior to 3.6.9, an Open Redirect vulnerability was identified in the /WeGIA/controle/control.php endpoint of the WeGIA application, specifically through the nextPage parameter when combined with metodo=listarId and nomeClasse=IentradaControle. Theโ€ฆ

๐Ÿ“… Published: April 6, 2026, 9:12 p.m. ๐Ÿ”„ Last Modified: April 10, 2026, 8:24 p.m.

8.5

CVSS4.0

CVE-2026-35399 - WeGIA has Stored XSS in backup file names

WeGIA is a Web manager for charitable institutions. Prior to 3.6.9, a stored XSS vulnerability allows an attacker to inject malicious scripts through a backup filename. This could lead to unauthorized execution of malicious code in the victim's browser, compromising session data or executing actionโ€ฆ

๐Ÿ“… Published: April 6, 2026, 9:06 p.m. ๐Ÿ”„ Last Modified: April 10, 2026, 9:41 a.m.

5.1

CVSS4.0

CVE-2026-35472 - WeGIA - Open Redirect - EstoqueControle - listarTodos() - Unvalidated $_GET['nextPage']

WeGIA is a Web manager for charitable institutions. Prior to 3.6.9, an Open Redirect vulnerability was identified in the /WeGIA/controle/control.php endpoint of the WeGIA application, specifically through the nextPage parameter when combined with metodo=listarTodos and nomeClasse=EstoqueControle. Tโ€ฆ

๐Ÿ“… Published: April 6, 2026, 9:05 p.m. ๐Ÿ”„ Last Modified: April 10, 2026, 9:41 a.m.

5.1

CVSS4.0

CVE-2026-35398 - WeGIA - Open Redirect - OrigemControle - listarTodos() & listarId_Nome() - Unvalidated $_GET['nextPโ€ฆ

WeGIA is a Web manager for charitable institutions. Prior to 3.6.9, an Open Redirect vulnerability was identified in the /WeGIA/controle/control.php endpoint of the WeGIA application, specifically through the nextPage parameter when combined with metodo=listarTodos & listarId_Nome and nomeClasse=Orโ€ฆ

๐Ÿ“… Published: April 6, 2026, 9:04 p.m. ๐Ÿ”„ Last Modified: April 10, 2026, 9:44 a.m.

5.1

CVSS4.0

CVE-2026-35396 - WeGIA - Open Redirect - IsaidaControle - listarId() - Unvalidated $_GET['nextPage']

WeGIA is a Web manager for charitable institutions. Prior to 3.6.9, an Open Redirect vulnerability was identified in the /WeGIA/controle/control.php endpoint of the WeGIA application, specifically through the nextPage parameter when combined with metodo=listarId and nomeClasse=IsaidaControle. The aโ€ฆ

๐Ÿ“… Published: April 6, 2026, 9:02 p.m. ๐Ÿ”„ Last Modified: April 10, 2026, 9:44 a.m.

8.8

CVSS3.1

CVE-2026-35395 - WeGIA has a SQL Injection in DespachoDAO.php via id_memorando parameter

WeGIA is a Web manager for charitable institutions. Prior to 3.6.9, WeGIA (Web gerenciador para instituiรงรตes assistenciais) contains a SQL injection vulnerability in dao/memorando/DespachoDAO.php. The id_memorando parameter is extracted from $_REQUEST without validation and directly interpolated inโ€ฆ

๐Ÿ“… Published: April 6, 2026, 9:01 p.m. ๐Ÿ”„ Last Modified: April 10, 2026, 9:45 a.m.
Total resulsts: 343887
Page 129 of 34,389
ยซ previous page ยป next page
Filters