7.8

CVSS3.1

CVE-2026-27750 - Avira Internet Security Optimizer TOCTOU

Avira Internet Security contains a time-of-check time-of-use (TOCTOU) vulnerability in the Optimizer component. A privileged service running as SYSTEM identifies directories for cleanup during a scan phase and subsequently deletes them during a separate cleanup phase without revalidating the target…

📅 Published: March 5, 2026, 2:15 p.m. 🔄 Last Modified: April 16, 2026, 12:30 p.m.

8.7

CVSS4.0

CVE-2026-3598 - RustDesk Server Generates Config Strings Using Reversible Encoding (Base64 + Reverse) Instead of En…

Use of a Broken or Risky Cryptographic Algorithm vulnerability in rustdesk-server-pro RustDesk Server Pro rustdesk-server-pro on Windows, MacOS, Linux (Config string generation, web console export modules) allows Retrieve Embedded Sensitive Data. This vulnerability is associated with program routin…

📅 Published: March 5, 2026, 2:14 p.m. 🔄 Last Modified: April 17, 2026, 1 p.m.

8.8

CVSS3.1

CVE-2026-1720 - WowOptin: Next-Gen Popup Maker – Create Stunning Popups and Optins for Lead Generation <= 1.4.24 - …

The WowOptin: Next-Gen Popup Maker – Create Stunning Popups and Optins for Lead Generation plugin for WordPress is vulnerable to unauthorized arbitrary plugin installation due to a missing capability check on the 'install_and_active_plugin' function in all versions up to, and including, 1.4.24. Thi…

📅 Published: March 5, 2026, 1:24 p.m. 🔄 Last Modified: April 22, 2026, 9:27 p.m.

7.7

CVSS3.1

CVE-2026-2092 - Keycloak-services: keycloak: unauthorized access via improper validation of encrypted saml assertio…

A flaw was found in Keycloak. Keycloak's Security Assertion Markup Language (SAML) broker endpoint does not properly validate encrypted assertions when the overall SAML response is not signed. An attacker with a valid signed SAML assertion can exploit this by crafting a malicious SAML response. Thi…

📅 Published: March 5, 2026, 12:34 p.m. 🔄 Last Modified: April 16, 2026, 2:45 a.m.

9.8

CVSS3.1

CVE-2026-2599 - Database for Contact Form 7, WPforms, Elementor forms <= 1.4.7 - Unauthenticated PHP Object Injecti…

The Database for Contact Form 7, WPforms, Elementor forms plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.4.7 via deserialization of untrusted input in the 'download_csv' function. This makes it possible for unauthenticated attackers to inject a PH…

📅 Published: March 5, 2026, 12:26 p.m. 🔄 Last Modified: April 22, 2026, 9:27 p.m.

8.8

CVSS3.1

CVE-2026-3047 - Org.keycloak.broker.saml: keycloak saml broker: authentication bypass due to disabled saml client c…

A flaw was found in org.keycloak.broker.saml. When a disabled Security Assertion Markup Language (SAML) client is configured as an Identity Provider (IdP)-initiated broker landing target, it can still complete the login process and establish a Single Sign-On (SSO) session. This allows a remote atta…

📅 Published: March 5, 2026, 11:24 a.m. 🔄 Last Modified: April 16, 2026, 12:30 p.m.

8.1

CVSS3.1

CVE-2026-2603 - Keycloak: keycloak: unauthorized authentication via disabled saml identity provider

A flaw was found in Keycloak. A remote attacker could bypass security controls by sending a valid SAML response from an external Identity Provider (IdP) to the Keycloak SAML endpoint for IdP-initiated broker logins. This allows the attacker to complete broker logins even when the SAML Identity Prov…

📅 Published: March 5, 2026, 11:23 a.m. 🔄 Last Modified: April 16, 2026, 2:45 a.m.

8.1

CVSS3.1

CVE-2026-3009 - Org.keycloak/keycloak-services: improper enforcement of disabled identity provider in identitybroke…

A security flaw in the IdentityBrokerService.performLogin endpoint of Keycloak allows authentication to proceed using an Identity Provider (IdP) even after it has been disabled by an administrator. An attacker who knows the IdP alias can reuse a previously generated login request to bypass the admi…

📅 Published: March 5, 2026, 11:23 a.m. 🔄 Last Modified: April 16, 2026, 12:30 p.m.

2.3

CVSS4.0

CVE-2026-3236 - API Key Lifetime Abuse via Access Token in Octopus Server

In affected versions of Octopus Server it was possible to create a new API key from an existing access token resulting in the new API key having a lifetime exceeding the original API key used to mint the access token.

📅 Published: March 5, 2026, 10:37 a.m. 🔄 Last Modified: April 16, 2026, 12:30 p.m.

7.5

CVSS3.1

CVE-2026-1605 - org.eclipse.jetty/jetty-server: Eclipse Jetty: Denial of Service due to unreleased JDK Inflater fro…

In Eclipse Jetty, versions 12.0.0-12.0.31 and 12.1.0-12.0.5, class GzipHandler exposes a vulnerability when a compressed HTTP request, with Content-Encoding: gzip, is processed and the corresponding response is not compressed. This happens because the JDK Inflater is allocated for decompressing t…

📅 Published: March 5, 2026, 9:39 a.m. 🔄 Last Modified: April 17, 2026, 1 p.m.
Total resulsts: 349182
Page 1302 of 34,919
« previous page » next page
Filters