8.7

CVSS4.0

CVE-2026-5707 - Command Injection via Virtual Desktop Session Name in AWS Research and Engineering Studio (RES)

Unsanitized input in an OS command in the virtual desktop session name handling in AWS Research and Engineering Studio (RES) version 2025.03 through 2025.12.01 might allow a remote authenticated actor to execute arbitrary commands as root on the virtual desktop host via a crafted session name. To …

📅 Published: April 6, 2026, 9:25 p.m. 🔄 Last Modified: April 10, 2026, 8:16 p.m.

4.7

CVSS3.1

CVE-2026-35404 - Open edX Platform has an Open Redirect in Survey Views via Unvalidated redirect_url Parameter

Open edX Platform enables the authoring and delivery of online learning at any scale. he view_survey endpoint accepts a redirect_url GET parameter that is passed directly to HttpResponseRedirect() without any URL validation. When a non-existent survey name is provided, the server issues an immediat…

📅 Published: April 6, 2026, 9:22 p.m. 🔄 Last Modified: April 7, 2026, 1:20 p.m.

5.1

CVSS4.0

CVE-2026-22675 - OCS Inventory NG Server Stored XSS via User-Agent

OCS Inventory NG Server version 2.12.3 and prior contain a stored cross-site scripting vulnerability that allows unauthenticated attackers to execute arbitrary JavaScript by submitting malicious User-Agent HTTP headers to the /ocsinventory endpoint. Attackers can register rogue agents or craft requ…

📅 Published: April 6, 2026, 9:19 p.m. 🔄 Last Modified: April 10, 2026, 9:41 a.m.

5.1

CVSS4.0

CVE-2026-35475 - WeGIA - Open Redirect - backup redirection — Unvalidated $_GET['redirect']

WeGIA is a Web manager for charitable institutions. Prior to 3.6.9, the redirect parameter is taken directly from $_GET with no URL validation or whitelist check, then used verbatim in a header("Location: ...") call. This vulnerability is fixed in 3.6.9.

📅 Published: April 6, 2026, 9:17 p.m. 🔄 Last Modified: April 10, 2026, 8:18 p.m.

8.6

CVSS4.0

CVE-2026-5684 - Tenda CX12L webExcptypemanFilter fromwebExcptypemanFilter stack-based overflow

A vulnerability was determined in Tenda CX12L 16.03.53.12. Affected by this issue is the function fromwebExcptypemanFilter of the file /goform/webExcptypemanFilter. Executing a manipulation of the argument page can lead to stack-based buffer overflow. The attack requires access to the local network…

📅 Published: April 6, 2026, 9:15 p.m. 🔄 Last Modified: April 7, 2026, 6:53 a.m.

5.1

CVSS4.0

CVE-2026-35474 - WeGIA - Open Redirect - atualizacao redirection - Unvalidated $_GET['redirect']

WeGIA is a Web manager for charitable institutions. Prior to 3.6.9, open redirect has been found in WeGIA webapp. The redirect parameter is taken directly from $_GET with no URL validation or whitelist check, then used verbatim in a header("Location: ...") call. This vulnerability is fixed in 3.6.9.

📅 Published: April 6, 2026, 9:13 p.m. 🔄 Last Modified: April 10, 2026, 8:24 p.m.

5.1

CVSS4.0

CVE-2026-35473 - WeGIA - Open Redirect - IentradaControle - listarId() - Unvalidated $_GET['nextPage']

WeGIA is a Web manager for charitable institutions. Prior to 3.6.9, an Open Redirect vulnerability was identified in the /WeGIA/controle/control.php endpoint of the WeGIA application, specifically through the nextPage parameter when combined with metodo=listarId and nomeClasse=IentradaControle. The…

📅 Published: April 6, 2026, 9:12 p.m. 🔄 Last Modified: April 10, 2026, 8:24 p.m.

8.5

CVSS4.0

CVE-2026-35399 - WeGIA has Stored XSS in backup file names

WeGIA is a Web manager for charitable institutions. Prior to 3.6.9, a stored XSS vulnerability allows an attacker to inject malicious scripts through a backup filename. This could lead to unauthorized execution of malicious code in the victim's browser, compromising session data or executing action…

📅 Published: April 6, 2026, 9:06 p.m. 🔄 Last Modified: April 10, 2026, 9:41 a.m.

5.1

CVSS4.0

CVE-2026-35472 - WeGIA - Open Redirect - EstoqueControle - listarTodos() - Unvalidated $_GET['nextPage']

WeGIA is a Web manager for charitable institutions. Prior to 3.6.9, an Open Redirect vulnerability was identified in the /WeGIA/controle/control.php endpoint of the WeGIA application, specifically through the nextPage parameter when combined with metodo=listarTodos and nomeClasse=EstoqueControle. T…

📅 Published: April 6, 2026, 9:05 p.m. 🔄 Last Modified: April 10, 2026, 9:41 a.m.

5.1

CVSS4.0

CVE-2026-35398 - WeGIA - Open Redirect - OrigemControle - listarTodos() & listarId_Nome() - Unvalidated $_GET['nextP…

WeGIA is a Web manager for charitable institutions. Prior to 3.6.9, an Open Redirect vulnerability was identified in the /WeGIA/controle/control.php endpoint of the WeGIA application, specifically through the nextPage parameter when combined with metodo=listarTodos & listarId_Nome and nomeClasse=Or…

📅 Published: April 6, 2026, 9:04 p.m. 🔄 Last Modified: April 10, 2026, 9:44 a.m.
Total resulsts: 343919
Page 132 of 34,392
« previous page » next page
Filters