8.7

CVSS3.1

CVE-2026-35408 - Directus is Missing Cross-Origin Opener Policy

Directus is a real-time API and App dashboard for managing SQL database content. Prior to 11.17.0, Directus's Single Sign-On (SSO) login pages lacked a Cross-Origin-Opener-Policy (COOP) HTTP response header. Without this header, a malicious cross-origin window that opens the Directus login page retโ€ฆ

๐Ÿ“… Published: April 6, 2026, 9:30 p.m. ๐Ÿ”„ Last Modified: April 7, 2026, 1:20 p.m.

8.7

CVSS4.0

CVE-2026-5685 - Tenda CX12L addressNat fromAddressNat stack-based overflow

A vulnerability was identified in Tenda CX12L 16.03.53.12. This affects the function fromAddressNat of the file /goform/addressNat. The manipulation of the argument page leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit is publicly available and might be used.

๐Ÿ“… Published: April 6, 2026, 9:30 p.m. ๐Ÿ”„ Last Modified: April 7, 2026, 6:53 a.m.

8.7

CVSS4.0

CVE-2026-5708 - Improper Control of User-Modifiable Attributes in RES CreateSession API

Unsanitized control of user-modifiable attributes in the session creation component in AWS Research and Engineering Studio (RES) prior to version 2026.03 could allow an authenticated remote user to escalate privileges, assume the virtual desktop host instance profile permissions, and interact with โ€ฆ

๐Ÿ“… Published: April 6, 2026, 9:28 p.m. ๐Ÿ”„ Last Modified: April 7, 2026, 6:53 a.m.

8.7

CVSS4.0

CVE-2026-5707 - Command Injection via Virtual Desktop Session Name in AWS Research and Engineering Studio (RES)

Unsanitized input in an OS command in the virtual desktop session name handling in AWS Research and Engineering Studio (RES)ย version 2025.03 through 2025.12.01ย might allow a remote authenticated actor to execute arbitrary commands as root on the virtual desktop host via a crafted session name. To โ€ฆ

๐Ÿ“… Published: April 6, 2026, 9:25 p.m. ๐Ÿ”„ Last Modified: April 7, 2026, 6:53 a.m.

4.7

CVSS3.1

CVE-2026-35404 - Open edX Platform has an Open Redirect in Survey Views via Unvalidated redirect_url Parameter

Open edX Platform enables the authoring and delivery of online learning at any scale. he view_survey endpoint accepts a redirect_url GET parameter that is passed directly to HttpResponseRedirect() without any URL validation. When a non-existent survey name is provided, the server issues an immediatโ€ฆ

๐Ÿ“… Published: April 6, 2026, 9:22 p.m. ๐Ÿ”„ Last Modified: April 7, 2026, 1:20 p.m.

5.1

CVSS4.0

CVE-2026-22675 - OCS Inventory NG Server Stored XSS via User-Agent

OCS Inventory NG Server version 2.12.3 and prior contain a stored cross-site scripting vulnerability that allows unauthenticated attackers to execute arbitrary JavaScript by submitting malicious User-Agent HTTP headers to the /ocsinventory endpoint. Attackers can register rogue agents or craft requโ€ฆ

๐Ÿ“… Published: April 6, 2026, 9:19 p.m. ๐Ÿ”„ Last Modified: April 7, 2026, 1:39 p.m.

5.1

CVSS4.0

CVE-2026-35475 - WeGIA - Open Redirect - backup redirection โ€” Unvalidated $_GET['redirect']

WeGIA is a Web manager for charitable institutions. Prior to 3.6.9, the redirect parameter is taken directly from $_GET with no URL validation or whitelist check, then used verbatim in a header("Location: ...") call. This vulnerability is fixed in 3.6.9.

๐Ÿ“… Published: April 6, 2026, 9:17 p.m. ๐Ÿ”„ Last Modified: April 7, 2026, 3:17 p.m.

8.6

CVSS4.0

CVE-2026-5684 - Tenda CX12L webExcptypemanFilter fromwebExcptypemanFilter stack-based overflow

A vulnerability was determined in Tenda CX12L 16.03.53.12. Affected by this issue is the function fromwebExcptypemanFilter of the file /goform/webExcptypemanFilter. Executing a manipulation of the argument page can lead to stack-based buffer overflow. The attack requires access to the local networkโ€ฆ

๐Ÿ“… Published: April 6, 2026, 9:15 p.m. ๐Ÿ”„ Last Modified: April 7, 2026, 6:53 a.m.

5.1

CVSS4.0

CVE-2026-35474 - WeGIA - Open Redirect - atualizacao redirection - Unvalidated $_GET['redirect']

WeGIA is a Web manager for charitable institutions. Prior to 3.6.9, open redirect has been found in WeGIA webapp. The redirect parameter is taken directly from $_GET with no URL validation or whitelist check, then used verbatim in a header("Location: ...") call. This vulnerability is fixed in 3.6.9.

๐Ÿ“… Published: April 6, 2026, 9:13 p.m. ๐Ÿ”„ Last Modified: April 7, 2026, 1:20 p.m.

5.1

CVSS4.0

CVE-2026-35473 - WeGIA - Open Redirect - IentradaControle - listarId() - Unvalidated $_GET['nextPage']

WeGIA is a Web manager for charitable institutions. Prior to 3.6.9, an Open Redirect vulnerability was identified in the /WeGIA/controle/control.php endpoint of the WeGIA application, specifically through the nextPage parameter when combined with metodo=listarId and nomeClasse=IentradaControle. Theโ€ฆ

๐Ÿ“… Published: April 6, 2026, 9:12 p.m. ๐Ÿ”„ Last Modified: April 7, 2026, 1:20 p.m.
Total resulsts: 343040
Page 44 of 34,304
ยซ previous page ยป next page
Filters