7.8

CVSS3.0

CVE-2026-5496 - Labcenter Electronics Proteus PDSPRJ File Parsing Type Confusion Remote Code Execution Vulnerability

Labcenter Electronics Proteus PDSPRJ File Parsing Type Confusion Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Labcenter Electronics Proteus. User interaction is required to exploit this vulnerability in that t…

📅 Published: April 11, 2026, 12:13 a.m. 🔄 Last Modified: April 11, 2026, 12:13 a.m.

10

CVSS3.0

CVE-2026-4149 - Sonos Era 300 SMB Response Out-Of-Bounds Access Remote Code Execution Vulnerability

Sonos Era 300 SMB Response Out-Of-Bounds Access Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Sonos Era 300. Authentication is not required to exploit this vulnerability. The specific flaw exists within the ha…

📅 Published: April 11, 2026, 12:12 a.m. 🔄 Last Modified: April 11, 2026, 12:12 a.m.

0.0

CVE-2026-40199 - Net::CIDR::Lite versions before 0.23 for Perl mishandles IPv4 mapped IPv6 addresses, which may allo…

Net::CIDR::Lite versions before 0.23 for Perl mishandles IPv4 mapped IPv6 addresses, which may allow IP ACL bypass. _pack_ipv6() includes the sentinel byte from _pack_ipv4() when building the packed representation of IPv4 mapped addresses like ::ffff:192.168.1.1. This produces an 18 byte value ins…

📅 Published: April 10, 2026, 9:49 p.m. 🔄 Last Modified: April 10, 2026, 9:49 p.m.

0.0

CVE-2026-40198 - Net::CIDR::Lite versions before 0.23 for Perl does not validate IPv6 group count, which may allow I…

Net::CIDR::Lite versions before 0.23 for Perl does not validate IPv6 group count, which may allow IP ACL bypass. _pack_ipv6() does not check that uncompressed IPv6 addresses (without ::) have exactly 8 hex groups. Inputs like "abcd", "1:2:3", or "1:2:3:4:5:6:7" are accepted and produce packed valu…

📅 Published: April 10, 2026, 9:42 p.m. 🔄 Last Modified: April 10, 2026, 9:42 p.m.

4.3

CVSS3.1

CVE-2026-33118 - Microsoft Edge (Chromium-based) Spoofing Vulnerability

Microsoft Edge (Chromium-based) Spoofing Vulnerability

📅 Published: April 10, 2026, 9:20 p.m. 🔄 Last Modified: April 10, 2026, 10:16 p.m.

5.4

CVSS3.1

CVE-2026-33119 - Microsoft Edge (Chromium-based) for Android Spoofing Vulnerability

User interface (ui) misrepresentation of critical information in Microsoft Edge (Chromium-based) allows an unauthorized attacker to perform spoofing over a network.

📅 Published: April 10, 2026, 9:20 p.m. 🔄 Last Modified: April 10, 2026, 10:16 p.m.

6.3

CVSS4.0

CVE-2026-5724 - Missing Authentication on Streaming gRPC Replication Endpoint

The frontend gRPC server's streaming interceptor chain did not include the authorization interceptor. When a ClaimMapper and Authorizer are configured, unary RPCs enforce authentication and authorization, but the streaming AdminService/StreamWorkflowReplicationMessages endpoint accepted requests wi…

📅 Published: April 10, 2026, 9:06 p.m. 🔄 Last Modified: April 10, 2026, 9:06 p.m.

5.3

CVSS4.0

CVE-2026-40252 - Broken Access Control (IDOR) Leading to Cross-Tenant Application Access in FastGPT

FastGPT is an AI Agent building platform. Prior to 4.14.10.4, Broken Access Control vulnerability (IDOR/BOLA) allows any authenticated team to access and execute applications belonging to other teams by supplying a foreign appId. While the API correctly validates the team token, it does not verify …

📅 Published: April 10, 2026, 8:52 p.m. 🔄 Last Modified: April 10, 2026, 8:52 p.m.

7.2

CVSS3.1

CVE-2026-40242 - Arcane Unauthenticated SSRF with Conditional Response Reflection in Template Fetch Endpoint

Arcane is an interface for managing Docker containers, images, networks, and volumes. Prior to 1.17.3, the /api/templates/fetch endpoint accepts a caller-supplied url parameter and performs a server-side HTTP GET request to that URL without authentication and without URL scheme or host validation. …

📅 Published: April 10, 2026, 8:34 p.m. 🔄 Last Modified: April 10, 2026, 8:34 p.m.

3.7

CVSS3.1

CVE-2026-40194 - phpseclib has a variable-time HMAC comparison in SSH2::get_binary_packet() using != instead of hash…

phpseclib is a PHP secure communications library. Prior to 3.0.51, 2.0.53, and 1.0.28, phpseclib\Net\SSH2::get_binary_packet() uses PHP's != operator to compare a received SSH packet HMAC against the locally computed HMAC. != on equal-length binary strings in PHP uses memcmp(), which short-circuits…

📅 Published: April 10, 2026, 8:24 p.m. 🔄 Last Modified: April 10, 2026, 8:24 p.m.
Total resulsts: 343919
Page 4 of 34,392
« previous page » next page
Filters