9.6

CVSS3.1

CVE-2026-6920 -

Out of bounds read in GPU in Google Chrome on Android prior to 147.0.7727.117 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

πŸ“… Published: April 23, 2026, 4:12 p.m. πŸ”„ Last Modified: April 24, 2026, 4:39 p.m.

9.6

CVSS3.1

CVE-2026-6919 -

Use after free in DevTools in Google Chrome prior to 147.0.7727.117 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

πŸ“… Published: April 23, 2026, 4:12 p.m. πŸ”„ Last Modified: April 24, 2026, 4:39 p.m.

6.1

CVSS4.0

CVE-2026-5039 - Predictable Default Cryptographic Key Used for DES Encryption in TP-Link TL-WL841N

TP-Link TL-WR841N v13 uses DES-CBC encryption in the TDDPv2 debug protocol with a cryptographic key derived from default web management credentials, making the key predictable if device is left in default configuration. A network-adjacent attacker can exploit this weakness to gain unauthorized acce…

πŸ“… Published: April 23, 2026, 4:10 p.m. πŸ”„ Last Modified: April 23, 2026, 6:16 p.m.

9.9

CVSS3.1

CVE-2026-40472 - Hackage package metadata stored XSS vulnerability

In hackage-server, user-controlled metadata from .cabal files are rendered into HTML href attributes without proper sanitization, enabling stored Cross-Site Scripting (XSS) attacks.

πŸ“… Published: April 23, 2026, 3 p.m. πŸ”„ Last Modified: April 23, 2026, 4:22 p.m.

9.6

CVSS3.1

CVE-2026-40471 - Hackage CSRF vulnerability

hackage-server lacked Cross-Site Request Forgery (CSRF) protection across its endpoints. Scripts on foreign sites could trigger requests to hackage server, possibly abusing latent credentials to upload packages or perform other administrative actions. Some unauthenticated actions could also be abus…

πŸ“… Published: April 23, 2026, 2:56 p.m. πŸ”„ Last Modified: April 23, 2026, 4:22 p.m.

6

CVSS4.0

CVE-2026-41240 - DOMPurify: FORBID_TAGS bypassed by function-based ADD_TAGS predicate (asymmetry with FORBID_ATTR fi…

DOMPurify is a DOM-only cross-site scripting sanitizer for HTML, MathML, and SVG. Versions prior to 3.4.0 have an inconsistency between FORBID_TAGS and FORBID_ATTR handling when function-based ADD_TAGS is used. Commit c361baa added an early exit for FORBID_ATTR at line 1214. The same fix was not ap…

πŸ“… Published: April 23, 2026, 2:54 p.m. πŸ”„ Last Modified: April 23, 2026, 6:16 p.m.

9.9

CVSS3.1

CVE-2026-40470 - Hackage package and doc upload stored XSS vulnerability

A critical XSS vulnerability affected hackage-server and hackage.haskell.org. HTML and JavaScript files provided in source packages or via the documentation upload facility were served as-is on the main hackage.haskell.org domain. As a consequence, when a user with latent HTTP credentials browses…

πŸ“… Published: April 23, 2026, 2:53 p.m. πŸ”„ Last Modified: April 23, 2026, 4:22 p.m.

6.8

CVSS3.1

CVE-2026-41239 - DOMPurify has a SAFE_FOR_TEMPLATES bypass in RETURN_DOM mode

DOMPurify is a DOM-only cross-site scripting sanitizer for HTML, MathML, and SVG. Starting in version 1.0.10 and prior to version 3.4.0, `SAFE_FOR_TEMPLATES` strips `{{...}}` expressions from untrusted HTML. This works in string mode but not with `RETURN_DOM` or `RETURN_DOM_FRAGMENT`, allowing XSS …

πŸ“… Published: April 23, 2026, 2:47 p.m. πŸ”„ Last Modified: April 25, 2026, 1:21 a.m.

9.3

CVSS4.0

CVE-2026-23751 - Kofax Capture 6.0.0.0 Unauthenticated File Read/Write & SMB Coercion via .NET Remoting

Kofax Capture, now referred to as Tungsten Capture, version 6.0.0.0 (other versions may be affected) exposes a deprecated .NET Remoting HTTP channel on port 2424 via the Ascent Capture Service that is accessible without authentication and uses a default, publicly known endpoint identifier. An unaut…

πŸ“… Published: April 23, 2026, 2:46 p.m. πŸ”„ Last Modified: April 25, 2026, 1:20 a.m.

6.9

CVSS3.1

CVE-2026-41238 - DOMPurify: Prototype Pollution to XSS Bypass via CUSTOM_ELEMENT_HANDLING Fallback

DOMPurify is a DOM-only cross-site scripting sanitizer for HTML, MathML, and SVG. Versions 3.0.1 through 3.3.3 are vulnerable to a prototype pollution-based XSS bypass. When an application uses `DOMPurify.sanitize()` with the default configuration (no `CUSTOM_ELEMENT_HANDLING` option), a prior prot…

πŸ“… Published: April 23, 2026, 2:43 p.m. πŸ”„ Last Modified: April 23, 2026, 6:16 p.m.
Total resulsts: 346618
Page 48 of 34,662
Β« previous page Β» next page
Filters