5.4

CVSS3.1

CVE-2026-41318 - AnythingLLM vulnerable to stored DOM XSS in chart caption renderer - LLM-driven prompt injection prโ€ฆ

AnythingLLM is an application that turns pieces of content into context that any LLM can use as references during chatting. Prior to version 1.12.1, AnythingLLM's in-chat markdown renderer has an unsafe custom rule for images that interpolates the markdown image's `alt` text into an HTML `alt="..."โ€ฆ

๐Ÿ“… Published: April 24, 2026, 2:57 a.m. ๐Ÿ”„ Last Modified: April 24, 2026, 6:17 p.m.

1.3

CVSS4.0

CVE-2026-41430 - Press vulnerable to reflected XSS on login redirection

Press, a Frappe custom app that runs Frappe Cloud, manages infrastructure, subscription, marketplace, and software-as-a-service (SaaS). Redirect parameter on login page is vulnerable to reflected XSS. The patch in commit 16d1b6ca2559f858a1de77bcb03fd7f1b81671c6 fixes the issue by restricting redireโ€ฆ

๐Ÿ“… Published: April 24, 2026, 2:42 a.m. ๐Ÿ”„ Last Modified: April 24, 2026, 6:17 p.m.

6.6

CVSS4.0

CVE-2026-41317 - Frappe Press has an unsafe HTTP method / CSRF-adjacent issue on API secret generation

Press, a Frappe custom app that runs Frappe Cloud, manages infrastructure, subscription, marketplace, and software-as-a-service (SaaS).`press.api.account.create_api_secret` is prone to CSRF-like exploits. This endpoint writes to database and it is also accessible via GET method. The patch in commitโ€ฆ

๐Ÿ“… Published: April 24, 2026, 2:40 a.m. ๐Ÿ”„ Last Modified: April 24, 2026, 2:40 a.m.

8.1

CVSS3.1

CVE-2026-41316 - ERB has an @_init deserialization guard bypass via def_module / def_method / def_class

ERB is a templating system for Ruby. Ruby 2.7.0 (before ERB 2.2.0 was published on rubygems.org) introduced an `@_init` instance variable guard in `ERB#result` and `ERB#run` to prevent code execution when an ERB object is reconstructed via `Marshal.load` (deserialization). However, three other publโ€ฆ

๐Ÿ“… Published: April 24, 2026, 2:35 a.m. ๐Ÿ”„ Last Modified: April 24, 2026, 2:50 p.m.

8.2

CVSS3.1

CVE-2026-41309 - Open Source Social Network (OSSN) Vulnerable to Resource Exhaustion via Malicious Image Processing

Open Source Social Network (OSSN) is open-source social networking software developed in PHP. Versions prior to 9.0 are vulnerable to resource exhaustion. An attacker can upload a specially crafted image with extreme pixel dimensions (e.g., $10000 \times 10000$ pixels). While the compressed file siโ€ฆ

๐Ÿ“… Published: April 24, 2026, 2:31 a.m. ๐Ÿ”„ Last Modified: April 24, 2026, 6:17 p.m.

6.1

CVSS3.1

CVE-2026-41305 - PostCSS has XSS via Unescaped </style> in its CSS Stringify Output

PostCSS takes a CSS file and provides an API to analyze and modify its rules by transforming the rules into an Abstract Syntax Tree. Versions prior to 8.5.10 do not escape `</style>` sequences when stringifying CSS ASTs. When user-submitted CSS is parsed and re-stringified for embedding in HTML `<sโ€ฆ

๐Ÿ“… Published: April 24, 2026, 2:27 a.m. ๐Ÿ”„ Last Modified: April 24, 2026, 4:23 p.m.

4.2

CVSS3.1

CVE-2026-40254 - FreeRDP: contains_dotdot() off-by-one allows drive channel path traversal via terminal ..

FreeRDP is a free implementation of the Remote Desktop Protocol. Versions prior to 3.25.0 have an off-by-one in the path traversal filter in `channels/drive/client/drive_file.c`. The `contains_dotdot()` function catches `../` and `..\` mid-path but misses `..` when it's the last component with no tโ€ฆ

๐Ÿ“… Published: April 24, 2026, 2:24 a.m. ๐Ÿ”„ Last Modified: April 24, 2026, 2:24 a.m.

8.7

CVSS3.1

CVE-2026-33317 - OP-TEE: PKCS#11 TA out-of-bounds read and memory disclosure

OP-TEE is a Trusted Execution Environment (TEE) designed as companion to a non-secure Linux kernel running on Arm; Cortex-A cores using the TrustZone technology. In versions 3.13.0 through 4.10.0, missing checks in `entry_get_attribute_value()` in `ta/pkcs11/src/object.c` can lead to out-of-boundsโ€ฆ

๐Ÿ“… Published: April 24, 2026, 2:20 a.m. ๐Ÿ”„ Last Modified: April 24, 2026, 6:18 p.m.

8.8

CVSS3.1

CVE-2026-33318 - Actual has Privilege Escalation via 'change-password' Endpoint on OpenID-Migrated Servers

Actual is a local-first personal finance tool. Prior to version 26.4.0, any authenticated user (including `BASIC` role) can escalate to `ADMIN` on servers migrated from password authentication to OpenID Connect. Three weaknesses combine: `POST /account/change-password` has no authorization check, aโ€ฆ

๐Ÿ“… Published: April 24, 2026, 2:13 a.m. ๐Ÿ”„ Last Modified: April 25, 2026, 1:44 a.m.

7.4

CVSS4.0

CVE-2026-33208 - Roxy-WI Vulnerable to Authenticated Remote Code Execution via OS Command Injection in find-in-confiโ€ฆ

Roxy-WI is a web interface for managing Haproxy, Nginx, Apache and Keepalived servers. Prior to version 8.2.6.4, the /config/ < service > /find-in-config endpoint in Roxy-WI fails to sanitize the user-supplied words parameter before embedding it into a shell command string that is subsequently execโ€ฆ

๐Ÿ“… Published: April 24, 2026, 2:10 a.m. ๐Ÿ”„ Last Modified: April 24, 2026, 4:28 p.m.
Total resulsts: 346533
Page 27 of 34,654
ยซ previous page ยป next page
Filters