7.5

CVSS3.1

CVE-2026-33626 - LMDeploy Vulnerable to Server-Side Request Forgery (SSRF) via Vision-Language Image Loading

LMDeploy is a toolkit for compressing, deploying, and serving large language models. Versions prior to 0.12.3 have a Server-Side Request Forgery (SSRF) vulnerability in LMDeploy's vision-language module. The `load_image()` function in `lmdeploy/vl/utils.py` fetches arbitrary URLs without validating…

📅 Published: April 20, 2026, 8:29 p.m. 🔄 Last Modified: April 23, 2026, 1:39 p.m.

6.4

CVSS3.1

CVE-2026-4852 - Image Source Control Lite – Show Image Credits and Captions <= 3.9.1 - Authenticated (Author+) Stor…

The Image Source Control Lite – Show Image Credits and Captions plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'Image Source' attachment field in all versions up to, and including, 3.9.1 due to insufficient input sanitization and output escaping. This makes it possible fo…

📅 Published: April 20, 2026, 8:26 p.m. 🔄 Last Modified: April 22, 2026, 8:22 p.m.

7.7

CVSS4.0

CVE-2026-33432 - Roxy-WI has Pre-Authentication LDAP Injection that Leads to Authentication Bypass

Roxy-WI is a web interface for managing Haproxy, Nginx, Apache and Keepalived servers. In versions up to and including 8.2.8.2, when LDAP authentication is enabled, Roxy-WI constructs an LDAP search filter by directly concatenating the user-supplied login username into the filter string without esc…

📅 Published: April 20, 2026, 8:26 p.m. 🔄 Last Modified: April 24, 2026, 7:18 p.m.

5.7

CVSS4.0

CVE-2026-33431 - Roxy-WI Vulnerable to Authenticated Arbitrary File Read via Path Traversal in Config Version Viewer

Roxy-WI is a web interface for managing Haproxy, Nginx, Apache and Keepalived servers. Prior to version 8.2.6.4, the POST /config/<service>/show API endpoint accepts a configver parameter that is directly appended to a base directory path to construct a local file path, which is subsequently opened…

📅 Published: April 20, 2026, 8:24 p.m. 🔄 Last Modified: April 24, 2026, 7:19 p.m.

5.5

CVSS4.0

CVE-2026-34403 - Nginx-UI vulnerable to Cross-Site WebSocket Hijacking (CSWSH) via missing origin validation on all …

Nginx UI is a web user interface for the Nginx web server. Prior to version 2.3.5, all WebSocket endpoints in nginx-ui use a gorilla/websocket Upgrader with CheckOrigin unconditionally returning true, allowing Cross-Site WebSocket Hijacking (CSWSH). Combined with the fact that authentication tokens…

📅 Published: April 20, 2026, 8:16 p.m. 🔄 Last Modified: April 22, 2026, 5:35 p.m.

8.6

CVSS4.0

CVE-2026-33031 - Nginx-UI: Disabled users retain full API access through previously issued bearer tokens

Nginx UI is a web user interface for the Nginx web server. Prior to version 2.3.4, a user who was disabled by an administrator can use previously issued API tokens for up to the token lifetime. In practice, disabling a compromised account does not actually terminate that user’s access, so an attack…

📅 Published: April 20, 2026, 8:12 p.m. 🔄 Last Modified: April 22, 2026, 5:33 p.m.

10

CVSS3.1

CVE-2026-32613 - Spinnaker vulnerable to RCE via expression parsing due to unrestricted context handling

Spinnaker is an open source, multi-cloud continuous delivery platform. Echo like some other services, uses SPeL (Spring Expression Language) to process information - specifically around expected artifacts. In versions prior to 2026.1.0, 2026.0.1, 2025.4.2, and 2025.3.2, unlike orca, it was NOT rest…

📅 Published: April 20, 2026, 8:07 p.m. 🔄 Last Modified: April 23, 2026, 6:30 p.m.

10

CVSS3.1

CVE-2026-32604 - Spinnaker vulnerable to RCE when using gitrepo artifact types due to improper sanitization of user …

Spinnaker is an open source, multi-cloud continuous delivery platform. In versions prior to 2026.1.0, 2026.0.1, 2025.4.2, and 2025.3.2, a bad actor can execute arbitrary commands very simply on the clouddriver pods. This can expose credentials, remove files, or inject resources easily. Versions 202…

📅 Published: April 20, 2026, 8 p.m. 🔄 Last Modified: April 23, 2026, 6:30 p.m.

8.7

CVSS4.0

CVE-2026-6249 - Vvveb CMS 1.0.8 Remote Code Execution via Media Upload

Vvveb CMS 1.0.8 contains a remote code execution vulnerability in its media upload handler that allows authenticated attackers to execute arbitrary operating system commands by uploading a PHP webshell with a .phtml extension. Attackers can bypass the extension deny-list and upload malicious files …

📅 Published: April 20, 2026, 7:57 p.m. 🔄 Last Modified: April 22, 2026, 11:47 a.m.

9.3

CVSS4.0

CVE-2026-32311 - Command Injection and Docker container escape allows root on host machine

Flowsint is an open-source OSINT graph exploration tool designed for cybersecurity investigation, transparency, and verification. Flowsint allows a user to create investigations, which are used to manage sketches and analyses. Sketches have controllable graphs, which are comprised of nodes and rela…

📅 Published: April 20, 2026, 7:56 p.m. 🔄 Last Modified: April 23, 2026, 6:41 p.m.
Total resulsts: 346692
Page 135 of 34,670
« previous page » next page
Filters