3.3

CVSS3.1

CVE-2026-33529 - Zoraxy: Authenticated Path Traversal in Config Import leads to RCE

Zoraxy is a general purpose HTTP reverse proxy and forwarding tool. Prior to version 3.3.2, an authenticated path traversal vulnerability in the configuration import endpoint allows an authenticated user to write arbitrary files outside the config directory, which can lead to RCE by creating a plug…

📅 Published: March 26, 2026, 7:26 p.m. 🔄 Last Modified: March 27, 2026, 7:48 p.m.

6.5

CVSS3.1

CVE-2026-33528 - GoDoxy has a Path Traversal Vulnerability in its File API

GoDoxy is a reverse proxy and container orchestrator for self-hosters. Prior to version 0.27.5, the file content API endpoint at `/api/v1/file/content` is vulnerable to path traversal. The `filename` query parameter is passed directly to `path.Join(common.ConfigBasePath, filename)` where `ConfigBas…

📅 Published: March 26, 2026, 7:24 p.m. 🔄 Last Modified: March 27, 2026, 8:33 a.m.

0.5

CVSS4.0

CVE-2026-33525 - Authelia: Improper Neutralization of Input During Web Page Generation Leads to Potential Cross-site…

Authelia is an open-source authentication and authorization server providing two-factor authentication and single sign-on (SSO) for applications via a web portal. In version 4.39.15, an attacker may potentially be able to inject javascript into the Authelia login page if several conditions are met …

📅 Published: March 26, 2026, 7:22 p.m. 🔄 Last Modified: March 27, 2026, 8:33 a.m.

7.7

CVSS4.0

CVE-2023-7338 - Ruckus Unleashed Authenticated RCE in Gateway Mode

Ruckus Unleashed contains a remote code execution vulnerability in the web-based management interface that allows authenticated remote attackers to execute arbitrary code on the system when gateway mode is enabled. Attackers can exploit this vulnerability by sending specially crafted requests throu…

📅 Published: March 26, 2026, 7:20 p.m. 🔄 Last Modified: March 27, 2026, 9:55 p.m.

9.1

CVSS3.1

CVE-2026-33152 - Tandoor Recipes Vulnerable to Unrestricted Brute-Force via BasicAuthentication

Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. In versions prior to 2.6.0, Tandoor Recipes configures Django REST Framework with BasicAuthentication as one of the default authentication backends. The AllAuth rate limiting configuration (ACCOUNT_…

📅 Published: March 26, 2026, 7:07 p.m. 🔄 Last Modified: March 27, 2026, 8:33 a.m.

7.7

CVSS4.0

CVE-2026-33153 - Tandoor Recipes's Unauthenticated Debug Parameter Leaks Full Raw SQL Queries Including Schema, Tabl…

Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. In versions prior to 2.6.0, the Recipe API endpoint exposes a hidden `?debug=true` query parameter that returns the complete raw SQL query being executed, including all table names, column names, JO…

📅 Published: March 26, 2026, 7:06 p.m. 🔄 Last Modified: March 27, 2026, 8:33 a.m.

6.5

CVSS3.1

CVE-2026-33148 - URL Parameter Injection in FDC Food Search API Causes Server Crash and Exposes Internal API Key

Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. In versions prior to 2.6.0, the FDC (USDA FoodData Central) search endpoint constructs an upstream API URL by directly interpolating the user-supplied `query` parameter into the URL string without U…

📅 Published: March 26, 2026, 7:04 p.m. 🔄 Last Modified: March 27, 2026, 8:33 a.m.

5.3

CVSS3.1

CVE-2026-29055 - Tandoor Recipes: WebP and GIF Image Uploads Bypass EXIF/Metadata Stripping, Leaking GPS Coordinates…

Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. In versions prior to 2.6.0, the image processing pipeline in Tandoor Recipes explicitly skips EXIF metadata stripping, image rescaling, and size validation for WebP and GIF image formats. A develope…

📅 Published: March 26, 2026, 7:03 p.m. 🔄 Last Modified: March 27, 2026, 7:49 p.m.

5.9

CVSS3.1

CVE-2026-4923 - path-to-regexp vulnerable to Regular Expression Denial of Service via multiple wildcards

Impact: When using multiple wildcards, combined with at least one parameter, a regular expression can be generated that is vulnerable to ReDoS. This backtracking vulnerability requires the second wildcard to be somewhere other than the end of the path. Unsafe examples: /*foo-*bar-:baz /*a-:b-*c-…

📅 Published: March 26, 2026, 7:02 p.m. 🔄 Last Modified: March 27, 2026, 8:33 a.m.

8.7

CVSS4.0

CVE-2026-26213 - thingino-firmware api.cgi Unauthenticated Command Injection in Captive Portal

thingino-firmware versions up to the firmware-2026-03-16 release contains an unauthenticated os command injection vulnerability in the WiFi captive portal CGI script that allows remote attackers to execute arbitrary commands as root by injecting malicious code through unsanitized HTTP parameter nam…

📅 Published: March 26, 2026, 7 p.m. 🔄 Last Modified: March 27, 2026, 8:33 a.m.
Total resulsts: 341070
Page 43 of 34,107
« previous page » next page
Filters