8.2

CVSS3.1

CVE-2026-41309 - Open Source Social Network (OSSN) Vulnerable to Resource Exhaustion via Malicious Image Processing

Open Source Social Network (OSSN) is open-source social networking software developed in PHP. Versions prior to 9.0 are vulnerable to resource exhaustion. An attacker can upload a specially crafted image with extreme pixel dimensions (e.g., $10000 \times 10000$ pixels). While the compressed file si…

πŸ“… Published: April 24, 2026, 2:31 a.m. πŸ”„ Last Modified: April 24, 2026, 6:17 p.m.

6.1

CVSS3.1

CVE-2026-41305 - PostCSS has XSS via Unescaped </style> in its CSS Stringify Output

PostCSS takes a CSS file and provides an API to analyze and modify its rules by transforming the rules into an Abstract Syntax Tree. Versions prior to 8.5.10 do not escape `</style>` sequences when stringifying CSS ASTs. When user-submitted CSS is parsed and re-stringified for embedding in HTML `<s…

πŸ“… Published: April 24, 2026, 2:27 a.m. πŸ”„ Last Modified: April 24, 2026, 4:23 p.m.

4.2

CVSS3.1

CVE-2026-40254 - FreeRDP: contains_dotdot() off-by-one allows drive channel path traversal via terminal ..

FreeRDP is a free implementation of the Remote Desktop Protocol. Versions prior to 3.25.0 have an off-by-one in the path traversal filter in `channels/drive/client/drive_file.c`. The `contains_dotdot()` function catches `../` and `..\` mid-path but misses `..` when it's the last component with no t…

πŸ“… Published: April 24, 2026, 2:24 a.m. πŸ”„ Last Modified: April 24, 2026, 2:50 p.m.

8.7

CVSS3.1

CVE-2026-33317 - OP-TEE: PKCS#11 TA out-of-bounds read and memory disclosure

OP-TEE is a Trusted Execution Environment (TEE) designed as companion to a non-secure Linux kernel running on Arm; Cortex-A cores using the TrustZone technology. In versions 3.13.0 through 4.10.0, missing checks in `entry_get_attribute_value()` in `ta/pkcs11/src/object.c` can lead to out-of-bounds…

πŸ“… Published: April 24, 2026, 2:20 a.m. πŸ”„ Last Modified: April 24, 2026, 6:18 p.m.

8.8

CVSS3.1

CVE-2026-33318 - Actual has Privilege Escalation via 'change-password' Endpoint on OpenID-Migrated Servers

Actual is a local-first personal finance tool. Prior to version 26.4.0, any authenticated user (including `BASIC` role) can escalate to `ADMIN` on servers migrated from password authentication to OpenID Connect. Three weaknesses combine: `POST /account/change-password` has no authorization check, a…

πŸ“… Published: April 24, 2026, 2:13 a.m. πŸ”„ Last Modified: April 25, 2026, 1:44 a.m.

7.4

CVSS4.0

CVE-2026-33208 - Roxy-WI Vulnerable to Authenticated Remote Code Execution via OS Command Injection in find-in-confi…

Roxy-WI is a web interface for managing Haproxy, Nginx, Apache and Keepalived servers. Prior to version 8.2.6.4, the /config/ < service > /find-in-config endpoint in Roxy-WI fails to sanitize the user-supplied words parameter before embedding it into a shell command string that is subsequently exec…

πŸ“… Published: April 24, 2026, 2:10 a.m. πŸ”„ Last Modified: April 24, 2026, 4:28 p.m.

8.9

CVSS4.0

CVE-2026-33078 - Roxy-WI has SQL Injection in haproxy_section_save Endpoint via Unsanitized server_ip Parameter

Roxy-WI is a web interface for managing Haproxy, Nginx, Apache and Keepalived servers. Versions prior to 8.2.6.4 have a SQL injection vulnerability in the haproxy_section_save function in app/routes/config/routes.py. The server_ip parameter, sourced from the URL path, is passed unsanitized through …

πŸ“… Published: April 24, 2026, 2:05 a.m. πŸ”„ Last Modified: April 27, 2026, 3:10 p.m.

7.7

CVSS4.0

CVE-2026-33077 - Roxy-WI has an arbitrary file read vulnerability

Roxy-WI is a web interface for managing Haproxy, Nginx, Apache and Keepalived servers. Prior to version 8.2.6.4, the oldconfig parameter in the haproxy_section_save interface has an arbitrary file read vulnerability. Version 8.2.6.4 fixes the issue.

πŸ“… Published: April 24, 2026, 1:55 a.m. πŸ”„ Last Modified: April 25, 2026, 1:43 a.m.

8.9

CVSS4.0

CVE-2026-33076 - Roxy-WI vulnerable to path traversal and arbitrary file writing

Roxy-WI is a web interface for managing Haproxy, Nginx, Apache and Keepalived servers. Prior to version 8.2.6.4, the haproxy_section_save interface presents a vulnerability that could lead to remote code execution due to path traversal and writing into scheduled tasks. Version 8.2.6.4 fixes the iss…

πŸ“… Published: April 24, 2026, 1:52 a.m. πŸ”„ Last Modified: April 24, 2026, 6:18 p.m.

5.3

CVSS3.1

CVE-2026-32952 - go-ntlmssp NTLM challenges can panic on malformed payloads

go-ntlmssp is a Go package that provides NTLM/Negotiate authentication over HTTP. Prior to version 0.1.1, a malicious NTLM challenge message can causes an slice out of bounds panic, which can crash any Go process using `ntlmssp.Negotiator` as an HTTP transport. Version 0.1.1 patches the issue.

πŸ“… Published: April 24, 2026, 1:46 a.m. πŸ”„ Last Modified: April 24, 2026, 4:29 p.m.
Total resulsts: 349182
Page 290 of 34,919
Β« previous page Β» next page
Filters