9.1

CVSS3.1

CVE-2026-33186 - gRPC-Go has an authorization bypass via missing leading slash in :path

gRPC-Go is the Go language implementation of gRPC. Versions prior to 1.79.3 have an authorization bypass resulting from improper input validation of the HTTP/2 `:path` pseudo-header. The gRPC-Go server was too lenient in its routing logic, accepting requests where the `:path` omitted the mandatory โ€ฆ

๐Ÿ“… Published: March 20, 2026, 10:23 p.m. ๐Ÿ”„ Last Modified: March 20, 2026, 10:23 p.m.

6.5

CVSS3.1

CVE-2026-3864 - CSI Driver for NFS path traversal via subDir may delete unintended directories on the NFS server

A vulnerability was discovered in the Kubernetes CSI Driver for NFS where the subDir parameter in volume identifiers was insufficiently validated. Attackers with the ability to create PersistentVolumes referencing the NFS CSI driver could craft volume identifiers containing path traversal sequencesโ€ฆ

๐Ÿ“… Published: March 20, 2026, 10:21 p.m. ๐Ÿ”„ Last Modified: March 20, 2026, 10:21 p.m.

7.5

CVSS3.1

CVE-2026-33180 - HAPI FHIR HTTP authentication leak in redirects

HAPI FHIR is a complete implementation of the HL7 FHIR standard for healthcare interoperability in Java. Prior to version 6.9.0, when setting headers in HTTP requests, the internal HTTP client sends headers first to the host in the initial URL but also, if asked to follow redirects and a 30X HTTP rโ€ฆ

๐Ÿ“… Published: March 20, 2026, 10:19 p.m. ๐Ÿ”„ Last Modified: March 20, 2026, 10:19 p.m.

5.3

CVSS4.0

CVE-2026-4507 - Mindinventory MindSQL mindsql_core.py ask_db sql injection

A vulnerability was determined in Mindinventory MindSQL up to 0.2.1. The affected element is the function ask_db of the file mindsql/core/mindsql_core.py. Executing a manipulation can lead to sql injection. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilโ€ฆ

๐Ÿ“… Published: March 20, 2026, 10:02 p.m. ๐Ÿ”„ Last Modified: March 20, 2026, 10:02 p.m.

5.3

CVSS4.0

CVE-2026-4506 - Mindinventory MindSQL mindsql_core.py ask_db code injection

A vulnerability was found in Mindinventory MindSQL up to 0.2.1. Impacted is the function ask_db of the file mindsql/core/mindsql_core.py. Performing a manipulation results in code injection. The attack can be initiated remotely. The exploit has been made public and could be used. The vendor was conโ€ฆ

๐Ÿ“… Published: March 20, 2026, 10:02 p.m. ๐Ÿ”„ Last Modified: March 20, 2026, 10:02 p.m.

7.5

CVSS3.1

CVE-2026-23536 - Feast: unauthenticated arbitrary file read

A security issue was discovered in the Feast Feature Server's `/read-document` endpoint that allows an unauthenticated remote attacker to read any file accessible to the server process. By sending a specially crafted HTTP POST request, an attacker can bypass intended access restrictions to potentiaโ€ฆ

๐Ÿ“… Published: March 20, 2026, 9:58 p.m. ๐Ÿ”„ Last Modified: March 20, 2026, 9:58 p.m.

4.3

CVSS3.1

CVE-2026-33177 - Statamic is missing authorization check on taxonomy term creation via fieldtype

Statamic is a Laravel and Git powered content management system (CMS). Prior to versions 5.73.14 and 6.7.0, low-privileged Control Panel users could create taxonomy terms by submitting requests to the field action processing endpoint with attacker-controlled field definitions. This bypasses the autโ€ฆ

๐Ÿ“… Published: March 20, 2026, 9:41 p.m. ๐Ÿ”„ Last Modified: March 20, 2026, 10:16 p.m.

8.7

CVSS3.1

CVE-2026-33172 - Statamic has Stored XSS via SVG Sanitization Bypass

Statamic is a Laravel and Git powered content management system (CMS). Prior to versions 5.73.14 and 6.7.0, a stored XSS vulnerability in SVG asset reuploads allows authenticated users with asset upload permissions to bypass SVG sanitization and inject malicious JavaScript that executes when the asโ€ฆ

๐Ÿ“… Published: March 20, 2026, 9:40 p.m. ๐Ÿ”„ Last Modified: March 20, 2026, 10:16 p.m.

4.3

CVSS3.1

CVE-2026-33171 - Statamic has a path traversal in file dictionary fieldtype

Statamic is a Laravel and Git powered content management system (CMS). Prior to versions 5.73.14 and 6.7.0, authenticated Control Panel users could read arbitrary `.json`, `.yaml`, and `.csv` files from the server by manipulating the file dictionary's `filename` configuration parameter in the fieldโ€ฆ

๐Ÿ“… Published: March 20, 2026, 9:39 p.m. ๐Ÿ”„ Last Modified: March 20, 2026, 10:16 p.m.

8.6

CVSS3.1

CVE-2026-33166 - Allure Report has an Arbitrary File Read via Path Traversal in Attachment Processing (Allure 1, Allโ€ฆ

Allure 2 is the version 2.x branch of Allure Report, a multi-language test reporting tool. The Allure report generator prior to version 2.38.0 is vulnerable to an arbitrary file read via path traversal when processing test results. An attacker can craft a malicious result file (-result.json, -contaโ€ฆ

๐Ÿ“… Published: March 20, 2026, 9:38 p.m. ๐Ÿ”„ Last Modified: March 20, 2026, 10:16 p.m.
Total resulsts: 339064
Page 2 of 33,907
ยซ previous page ยป next page
Filters