7.3

CVSS4.0

CVE-2026-41172 - Squidex vulnerable to Server-Side Request Forgery (SSRF) via URL-based asset upload (/api/apps/{app…

Squidex is an open source headless content management system and content management hub. Prior to version 7.23.0, an SSRF vulnerability allows a user with asset upload permission to force the server to fetch arbitrary URLs, including localhost/private network targets, and persist the response as an…

📅 Published: April 22, 2026, 9:22 p.m. 🔄 Last Modified: April 24, 2026, 2:45 p.m.

7.3

CVSS4.0

CVE-2026-41171 - SSRF via Jint Scripting Engine HTTP Functions Due to Missing SSRF Protection on "Jint" HttpClient

Squidex is an open source headless content management system and content management hub. Versions prior to 7.23.0 have a Server-Side Request Forgery (SSRF) vulnerability due to missing SSRF protection on the `Jint` HTTP client used by scripting engine functions (`getJSON`, `request`, etc.). An auth…

📅 Published: April 22, 2026, 9:16 p.m. 🔄 Last Modified: April 24, 2026, 2:45 p.m.

7.2

CVSS4.0

CVE-2026-41170 - Squidex has SSRF via Backup Restore Endpoint — Admin-Controlled URL Download Allows Internal and Ex…

Squidex is an open source headless content management system and content management hub. Prior to version 7.23.0, the `RestoreController.PostRestoreJob` endpoint allows an administrator to supply an arbitrary URL for downloading backup archives. This URL is fetched using the "Backup" `HttpClient` w…

📅 Published: April 22, 2026, 9:13 p.m. 🔄 Last Modified: April 27, 2026, 8:15 p.m.

6.3

CVSS4.0

CVE-2026-41455 - WeKan < 8.35 SSRF via Webhook URL

WeKan before 8.35 contains a server-side request forgery vulnerability in webhook integration URL handling where the url schema field accepts any string without protocol restriction or destination validation. Attackers who can create or modify integrations can set webhook URLs to internal network a…

📅 Published: April 22, 2026, 9:09 p.m. 🔄 Last Modified: April 23, 2026, 4:27 p.m.

8.7

CVSS4.0

CVE-2026-41454 - WeKan < 8.35 Missing Authorization via Integration REST API

WeKan before 8.35 contains a missing authorization vulnerability in the Integration REST API endpoints that allows authenticated board members to perform administrative actions without proper privilege verification. Attackers can enumerate integrations including webhook URLs, create new integration…

📅 Published: April 22, 2026, 9:08 p.m. 🔄 Last Modified: April 23, 2026, 4:27 p.m.

4.8

CVSS4.0

CVE-2026-41314 - pypdf: Manipulated FlateDecode image dimensions can exhaust RAM

pypdf is a free and open-source pure-python PDF library. An attacker who uses a vulnerability present in versions prior to 6.10.2 can craft a PDF which leads to the RAM being exhausted. This requires accessing an image using `/FlateDecode` with large size values. This has been fixed in pypdf 6.10.2…

📅 Published: April 22, 2026, 9:08 p.m. 🔄 Last Modified: April 24, 2026, 2:50 p.m.

4.8

CVSS4.0

CVE-2026-41313 - pypdf: Possible long runtimes for wrong size values in incremental mode

pypdf is a free and open-source pure-python PDF library. An attacker who uses a vulnerability present in versions prior to 6.10.2 can craft a PDF which leads to long runtimes. This requires loading a PDF with a large trailer `/Size` value in incremental mode. This has been fixed in pypdf 6.10.2. As…

📅 Published: April 22, 2026, 9:04 p.m. 🔄 Last Modified: April 24, 2026, 2:50 p.m.

4.8

CVSS4.0

CVE-2026-41312 - pypdf: Manipulated FlateDecode predictor parameters can exhaust RAM

pypdf is a free and open-source pure-python PDF library. An attacker who uses a vulnerability present in versions prior to 6.10.2 can craft a PDF which leads to the RAM being exhausted. This requires accessing a stream compressed using `/FlateDecode` with a `/Predictor` unequal 1 and large predicto…

📅 Published: April 22, 2026, 9:02 p.m. 🔄 Last Modified: April 24, 2026, 2:50 p.m.

6.9

CVSS4.0

CVE-2026-41168 - pypdf has possible long runtimes for wrong size values in cross-reference and object streams

pypdf is a free and open-source pure-python PDF library. An attacker who uses a vulnerability present in versions prior to 6.10.1 can craft a PDF which leads to long runtimes. This requires cross-reference streams with wrong large `/Size` values or object streams with wrong large `/N` values. This …

📅 Published: April 22, 2026, 8:49 p.m. 🔄 Last Modified: April 24, 2026, 1:07 p.m.

9.1

CVSS3.1

CVE-2026-41167 - Jellystat has SQL Injection that leads to to Remote Code Execution

Jellystat is a free and open source Statistics App for Jellyfin. Prior to version 1.1.10, multiple API endpoints in Jellystat build SQL queries by interpolating unsanitized request-body fields directly into raw SQL strings. An authenticated user can inject arbitrary SQL via `POST /api/getUserDetail…

📅 Published: April 22, 2026, 8:39 p.m. 🔄 Last Modified: April 23, 2026, 3:37 p.m.
Total resulsts: 349182
Page 313 of 34,919
« previous page » next page
Filters