4.3

CVSS3.1

CVE-2026-22605 - OpenProject is Vulnerable to Insecure Direct Object Reference in Meetings

OpenProject is an open-source, web-based project management software. OpenProject versions prior to version 16.6.3, allowed users with the View Meetings permission on any project, to access meeting details of meetings that belonged to projects, the user does not have access to. This issue has been …

📅 Published: Jan. 10, 2026, 1:07 a.m. 🔄 Last Modified: Jan. 12, 2026, 7:15 p.m.

6.9

CVSS4.0

CVE-2026-22604 - OpenProject is vulnerable to user enumeration via the change password function

OpenProject is an open-source, web-based project management software. For OpenProject versions from 11.2.1 to before 16.6.2, when sending a POST request to the /account/change_password endpoint with an arbitrary User ID as the password_change_user_id parameter, the resulting error page would show t…

📅 Published: Jan. 10, 2026, 1:07 a.m. 🔄 Last Modified: Jan. 12, 2026, 7:16 p.m.

6.9

CVSS4.0

CVE-2026-22603 - OpenProject has no protection against brute-force attacks in the Change Password function

OpenProject is an open-source, web-based project management software. Prior to version 16.6.2, OpenProject’s unauthenticated password-change endpoint (/account/change_password) was not protected by the same brute-force safeguards that apply to the normal login form. In affected versions, an attacke…

📅 Published: Jan. 10, 2026, 1:06 a.m. 🔄 Last Modified: Jan. 10, 2026, 1:06 a.m.

3.5

CVSS3.1

CVE-2026-22602 - OpenProject is Vulnerable to User Enumeration via User ID

OpenProject is an open-source, web-based project management software. Prior to version 16.6.2, a low‑privileged logged-in user can view the full names of other users. Since user IDs are assigned sequentially and predictably (e.g., 1 to 1000), an attacker can extract a complete list of all users’ fu…

📅 Published: Jan. 10, 2026, 1:06 a.m. 🔄 Last Modified: Jan. 10, 2026, 1:06 a.m.

8.6

CVSS4.0

CVE-2026-22601 - OpenProject is Vulnerable to Code Execution in E-Mail function

OpenProject is an open-source, web-based project management software. For OpenProject version 16.6.1 and below, a registered administrator can execute arbitrary command by configuring sendmail binary path and sending a test email. This issue has been patched in version 16.6.2.

📅 Published: Jan. 10, 2026, 1:06 a.m. 🔄 Last Modified: Jan. 12, 2026, 7:16 p.m.

9.1

CVSS3.1

CVE-2026-22600 - OpenProject is Vulnerable to Arbitrary File Read via ImageMagick SVG Coder

OpenProject is an open-source, web-based project management software. A Local File Read (LFR) vulnerability exists in the work package PDF export functionality of OpenProject prior to version 16.6.4. By uploading a specially crafted SVG file (disguised as a PNG) as a work package attachment, an att…

📅 Published: Jan. 10, 2026, 1:06 a.m. 🔄 Last Modified: Jan. 10, 2026, 1:06 a.m.

7.5

CVSS3.1

CVE-2026-22697 - CryptoLib Has Heap Buffer Overflow Vulnerability in KMC Base64 Decode Handling (KMC JSON base64ciph…

CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. Prior to version 1.4.3, CryptoLib’s KMC crypto service integration i…

📅 Published: Jan. 10, 2026, 12:31 a.m. 🔄 Last Modified: Jan. 10, 2026, 12:31 a.m.

5.7

CVSS4.0

CVE-2026-22027 - CryptoLib Vulnerable to Heap Buffer Overflow in MariaDB SA Hexstring Conversion

CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. Prior to version 1.4.3, the convert_hexstring_to_byte_array() functi…

📅 Published: Jan. 10, 2026, 12:24 a.m. 🔄 Last Modified: Jan. 12, 2026, 4:23 p.m.

8.2

CVSS4.0

CVE-2026-22026 - CryptoLib Unbounded Memory Allocation in KMC HTTP Response Handler Allows Resource Exhaustion

CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. Prior to version 1.4.3, the libcurl write_callback function in the K…

📅 Published: Jan. 10, 2026, 12:22 a.m. 🔄 Last Modified: Jan. 10, 2026, 12:22 a.m.

6.3

CVSS4.0

CVE-2026-22025 - CryptoLib Memory Leak on HTTP Error Response in KMC Client

CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. Prior to version 1.4.3, when the KMC server returns a non-200 HTTP s…

📅 Published: Jan. 10, 2026, 12:20 a.m. 🔄 Last Modified: Jan. 10, 2026, 12:20 a.m.
Total resulsts: 327160
Page 23 of 32,716
« previous page » next page
Filters