6.1

CVSS3.1

CVE-2026-41305 - PostCSS has XSS via Unescaped </style> in its CSS Stringify Output

PostCSS takes a CSS file and provides an API to analyze and modify its rules by transforming the rules into an Abstract Syntax Tree. Versions prior to 8.5.10 do not escape `</style>` sequences when stringifying CSS ASTs. When user-submitted CSS is parsed and re-stringified for embedding in HTML `<s…

πŸ“… Published: April 24, 2026, 2:27 a.m. πŸ”„ Last Modified: April 24, 2026, 4:23 p.m.

4.2

CVSS3.1

CVE-2026-40254 - FreeRDP: contains_dotdot() off-by-one allows drive channel path traversal via terminal ..

FreeRDP is a free implementation of the Remote Desktop Protocol. Versions prior to 3.25.0 have an off-by-one in the path traversal filter in `channels/drive/client/drive_file.c`. The `contains_dotdot()` function catches `../` and `..\` mid-path but misses `..` when it's the last component with no t…

πŸ“… Published: April 24, 2026, 2:24 a.m. πŸ”„ Last Modified: April 24, 2026, 2:24 a.m.

8.7

CVSS3.1

CVE-2026-33317 - OP-TEE: PKCS#11 TA out-of-bounds read and memory disclosure

OP-TEE is a Trusted Execution Environment (TEE) designed as companion to a non-secure Linux kernel running on Arm; Cortex-A cores using the TrustZone technology. In versions 3.13.0 through 4.10.0, missing checks in `entry_get_attribute_value()` in `ta/pkcs11/src/object.c` can lead to out-of-bounds…

πŸ“… Published: April 24, 2026, 2:20 a.m. πŸ”„ Last Modified: April 24, 2026, 6:18 p.m.

8.8

CVSS3.1

CVE-2026-33318 - Actual has Privilege Escalation via 'change-password' Endpoint on OpenID-Migrated Servers

Actual is a local-first personal finance tool. Prior to version 26.4.0, any authenticated user (including `BASIC` role) can escalate to `ADMIN` on servers migrated from password authentication to OpenID Connect. Three weaknesses combine: `POST /account/change-password` has no authorization check, a…

πŸ“… Published: April 24, 2026, 2:13 a.m. πŸ”„ Last Modified: April 25, 2026, 1:44 a.m.

7.4

CVSS4.0

CVE-2026-33208 - Roxy-WI Vulnerable to Authenticated Remote Code Execution via OS Command Injection in find-in-confi…

Roxy-WI is a web interface for managing Haproxy, Nginx, Apache and Keepalived servers. Prior to version 8.2.6.4, the /config/ < service > /find-in-config endpoint in Roxy-WI fails to sanitize the user-supplied words parameter before embedding it into a shell command string that is subsequently exec…

πŸ“… Published: April 24, 2026, 2:10 a.m. πŸ”„ Last Modified: April 24, 2026, 4:28 p.m.

8.9

CVSS4.0

CVE-2026-33078 - Roxy-WI has SQL Injection in haproxy_section_save Endpoint via Unsanitized server_ip Parameter

Roxy-WI is a web interface for managing Haproxy, Nginx, Apache and Keepalived servers. Versions prior to 8.2.6.4 have a SQL injection vulnerability in the haproxy_section_save function in app/routes/config/routes.py. The server_ip parameter, sourced from the URL path, is passed unsanitized through …

πŸ“… Published: April 24, 2026, 2:05 a.m. πŸ”„ Last Modified: April 24, 2026, 2:05 a.m.

7.7

CVSS4.0

CVE-2026-33077 - Roxy-WI has an arbitrary file read vulnerability

Roxy-WI is a web interface for managing Haproxy, Nginx, Apache and Keepalived servers. Prior to version 8.2.6.4, the oldconfig parameter in the haproxy_section_save interface has an arbitrary file read vulnerability. Version 8.2.6.4 fixes the issue.

πŸ“… Published: April 24, 2026, 1:55 a.m. πŸ”„ Last Modified: April 25, 2026, 1:43 a.m.

8.9

CVSS4.0

CVE-2026-33076 - Roxy-WI vulnerable to path traversal and arbitrary file writing

Roxy-WI is a web interface for managing Haproxy, Nginx, Apache and Keepalived servers. Prior to version 8.2.6.4, the haproxy_section_save interface presents a vulnerability that could lead to remote code execution due to path traversal and writing into scheduled tasks. Version 8.2.6.4 fixes the iss…

πŸ“… Published: April 24, 2026, 1:52 a.m. πŸ”„ Last Modified: April 24, 2026, 6:18 p.m.

5.3

CVSS3.1

CVE-2026-32952 - go-ntlmssp NTLM challenges can panic on malformed payloads

go-ntlmssp is a Go package that provides NTLM/Negotiate authentication over HTTP. Prior to version 0.1.1, a malicious NTLM challenge message can causes an slice out of bounds panic, which can crash any Go process using `ntlmssp.Negotiator` as an HTTP transport. Version 0.1.1 patches the issue.

πŸ“… Published: April 24, 2026, 1:46 a.m. πŸ”„ Last Modified: April 24, 2026, 4:29 p.m.

7.1

CVSS4.0

CVE-2026-41325 - Kirby is vulnerable to authorization bypass during page, file and user creation via blueprint injec…

Kirby is an open-source content management system. Kirby's user permissions control which user role is allowed to perform specific actions to content models in the CMS. These permissions are defined for each role in the user blueprint (`site/blueprints/users/...`). It is also possible to customize …

πŸ“… Published: April 24, 2026, 12:38 a.m. πŸ”„ Last Modified: April 24, 2026, 12:38 a.m.
Total resulsts: 346528
Page 27 of 34,653
Β« previous page Β» next page
Filters