9.8

CVSS3.1

CVE-2026-40493 - SAIL has heap buffer overflow in PSD decoder โ€” bpp mismatch in LAB 16-bit mode

SAIL is a cross-platform library for loading and saving images with support for animation, metadata, and ICC profiles. Prior to commit c930284445ea3ff94451ccd7a57c999eca3bc979, the PSD codec computes bytes-per-pixel (`bpp`) from raw header fields `channels * depth`, but the pixel buffer is allocateโ€ฆ

๐Ÿ“… Published: April 18, 2026, 1:41 a.m. ๐Ÿ”„ Last Modified: April 20, 2026, 6:55 p.m.

9.8

CVSS3.1

CVE-2026-40492 - SAIL has heap buffer overflow in XWD decoder โ€” bits_per_pixel vs pixmap_depth type confusion in bytโ€ฆ

SAIL is a cross-platform library for loading and saving images with support for animation, metadata, and ICC profiles. Prior to commit 36aa5c7ec8a2bb35f6fb867a1177a6f141156b02, the XWD codec resolves pixel format based on `pixmap_depth` but the byte-swap code uses `bits_per_pixel` independently. Whโ€ฆ

๐Ÿ“… Published: April 18, 2026, 1:39 a.m. ๐Ÿ”„ Last Modified: April 20, 2026, 6:55 p.m.

6.5

CVSS3.1

CVE-2026-40491 - gdown Affected by Arbitrary File Write via Path Traversal in gdown.extractall

gdown is a Google Drive public file/folder downloader. Versions prior to 5.2.2 are vulnerable to a Path Traversal attack within the extractall functionality. When extracting a maliciously crafted ZIP or TAR archive, the library fails to sanitize or validate the filenames of the archive members. Thiโ€ฆ

๐Ÿ“… Published: April 18, 2026, 1:36 a.m. ๐Ÿ”„ Last Modified: April 20, 2026, 7:03 p.m.

6.8

CVSS3.1

CVE-2026-40490 - AsyncHttpClient leaks authorization credentials to untrusted domains on cross-origin redirects

The AsyncHttpClient (AHC) library allows Java applications to easily execute HTTP requests and asynchronously process HTTP responses. When redirect following is enabled (followRedirect(true)), versions of AsyncHttpClient prior to 3.0.9 and 2.14.5 forward Authorization and Proxy-Authorization headerโ€ฆ

๐Ÿ“… Published: April 18, 2026, 1:31 a.m. ๐Ÿ”„ Last Modified: April 22, 2026, 3:45 a.m.

6.4

CVSS3.1

CVE-2026-1559 - Youzify <= 1.3.6 - Authenticated (Subscriber+) Stored Cross-Site Scripting via 'checkin_place_id' Pโ€ฆ

The Youzify plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'checkin_place_id' parameter in all versions up to, and including, 1.3.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Subscriber-level accessโ€ฆ

๐Ÿ“… Published: April 18, 2026, 1:26 a.m. ๐Ÿ”„ Last Modified: April 22, 2026, 8:22 p.m.

6.1

CVSS3.1

CVE-2026-1838 - Hostel <= 1.1.6 - Reflected Cross-Site Scripting via 'shortcode_id' Parameter

The Hostel plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'shortcode_id' parameter in all versions up to, and including, 1.1.6 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripโ€ฆ

๐Ÿ“… Published: April 18, 2026, 1:26 a.m. ๐Ÿ”„ Last Modified: April 22, 2026, 8:22 p.m.

8.6

CVSS4.0

CVE-2026-40489 - editorconfig-core-c has incomplete fix for CVE-2023-0341

editorconfig-core-c is an EditorConfig core library for use by plugins supporting EditorConfig parsing. Versions up to and including 0.12.10 have a stack-based buffer overflow in ec_glob() that allows an attacker to crash any application using libeditorconfig by providing a specially crafted direcโ€ฆ

๐Ÿ“… Published: April 18, 2026, 1:24 a.m. ๐Ÿ”„ Last Modified: April 20, 2026, 6:59 p.m.

8.9

CVSS3.1

CVE-2026-40487 - Postiz Has Unrestricted File Upload via MIME Type Spoofing that Leads to Stored XSS

Postiz is an AI social media scheduling tool. Prior to version 2.21.6, a file upload validation bypass allows any authenticated user to upload arbitrary HTML, SVG, or other executable file types to the server by spoofing the `Content-Type` header. The uploaded files are then served by nginx with a โ€ฆ

๐Ÿ“… Published: April 18, 2026, 1:19 a.m. ๐Ÿ”„ Last Modified: April 23, 2026, 3:27 p.m.

8.8

CVSS3.1

CVE-2026-35582 - Emissary has an OS Command Injection via Unvalidated IN_FILE_ENDING / OUT_FILE_ENDING in Executrix

Emissary is a P2P based data-driven workflow engine. In versions 8.42.0 and below, Executrix.getCommand() is vulnerable to OS command injection because it interpolates temporary file paths into a /bin/sh -c shell command string without any escaping or input validation. The IN_FILE_ENDING and OUT_Fโ€ฆ

๐Ÿ“… Published: April 18, 2026, 1:16 a.m. ๐Ÿ”„ Last Modified: April 24, 2026, 4:48 p.m.

7.5

CVSS3.1

CVE-2026-35465 - SecureDrop Client has path injection in read_gzip_header_filename()

SecureDrop Client is a desktop app for journalists to securely communicate with sources and handle submissions on the SecureDrop Workstation. In versions 0.17.4 and below, a compromised SecureDrop Server can achieve code execution on the Client's virtual machine (sd-app) by exploiting improper fileโ€ฆ

๐Ÿ“… Published: April 18, 2026, 12:41 a.m. ๐Ÿ”„ Last Modified: April 23, 2026, 6:31 p.m.
Total resulsts: 346532
Page 139 of 34,654
ยซ previous page ยป next page
Filters