8.3

CVSS3.1

CVE-2026-35394 - Mobile Next has Arbitrary Android Intent Execution via mobile_open_url

Mobile Next is an MCP server for mobile development and automation. Prior to 0.0.50, the mobile_open_url tool in mobile-mcp passes user-supplied URLs directly to Android's intent system without any scheme validation, allowing execution of arbitrary Android intents, including USSD codes, phone calls…

📅 Published: April 6, 2026, 8:52 p.m. 🔄 Last Modified: April 6, 2026, 9:16 p.m.

9.8

CVSS3.0

CVE-2026-35393 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in goshs POST multip…

goshs is a SimpleHTTPServer written in Go. Prior to 2.0.0-beta.3, the POST multipart upload directory not sanitized. This vulnerability is fixed in 2.0.0-beta.3.

📅 Published: April 6, 2026, 8:50 p.m. 🔄 Last Modified: April 6, 2026, 9:16 p.m.

9.8

CVSS3.0

CVE-2026-35392 - goshs has an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in gosh…

goshs is a SimpleHTTPServer written in Go. Prior to 2.0.0-beta.3, PUT upload in httpserver/updown.go has no path sanitization. This vulnerability is fixed in 2.0.0-beta.3.

📅 Published: April 6, 2026, 8:48 p.m. 🔄 Last Modified: April 6, 2026, 9:16 p.m.

5

CVSS3.1

CVE-2026-34972 - OpenFGA's BatchCheck within-request deduplication produces incorrect authorization decisions via li…

OpenFGA is a high-performance and flexible authorization/permission engine built for developers and inspired by Google Zanzibar. From 1.8.0 to 1.13.1, under specific conditions, BatchCheck calls with multiple checks sent for the same object, relation, and user combination can result in improper pol…

📅 Published: April 6, 2026, 8:41 p.m. 🔄 Last Modified: April 6, 2026, 9:16 p.m.

5.1

CVSS4.0

CVE-2026-5683 - Tenda CX12L P2pListFilter fromP2pListFilter stack-based overflow

A vulnerability was found in Tenda CX12L 16.03.53.12. Affected by this vulnerability is the function fromP2pListFilter of the file /goform/P2pListFilter. Performing a manipulation of the argument page results in stack-based buffer overflow. The attack must originate from the local network. The expl…

📅 Published: April 6, 2026, 8:30 p.m. 🔄 Last Modified: April 7, 2026, 6:54 a.m.

8.7

CVSS4.0

CVE-2026-35391 - Bulwark Webmail getClientIP() trusted client-controlled X-Forwarded-For value, enabling rate limit …

Bulwark Webmail is a self-hosted webmail client for Stalwart Mail Server. Prior to 1.4.11, the getClientIP() function in lib/admin/session.ts trusted the first (leftmost) entry of the X-Forwarded-For header, which is fully controlled by the client. An attacker could forge their source IP address to…

📅 Published: April 6, 2026, 8:17 p.m. 🔄 Last Modified: April 6, 2026, 9:16 p.m.

5.3

CVSS4.0

CVE-2026-35390 - Content-Security-Policy was set to Report-Only mode, failing to block XSS attacks

Bulwark Webmail is a self-hosted webmail client for Stalwart Mail Server. Prior to 1.4.11, the reverse proxy (proxy.ts) set the Content-Security-Policy-Report-Only header instead of the enforcing Content-Security-Policy header. This means cross-site scripting (XSS) attacks were logged but not block…

📅 Published: April 6, 2026, 8:13 p.m. 🔄 Last Modified: April 6, 2026, 9:16 p.m.

8.7

CVSS4.0

CVE-2026-35389 - Bulwark Webmail S/MIME signature verification accepted self-signed certificates

Bulwark Webmail is a self-hosted webmail client for Stalwart Mail Server. Prior to 1.4.11, S/MIME signature verification did not validate the certificate trust chain (checkChain: false). Any email signed with a self-signed or untrusted certificate was displayed as having a valid signature. This vul…

📅 Published: April 6, 2026, 8:11 p.m. 🔄 Last Modified: April 6, 2026, 9:16 p.m.

8.7

CVSS4.0

CVE-2026-35213 - Regular Expression Denial of Service (ReDoS) in @hapi/content HTTP header parsing

@hapi/content provided HTTP Content-* headers parsing. All versions of @hapi/content through 6.0.0 are vulnerable to Regular Expression Denial of Service (ReDoS) via crafted HTTP header values. Three regular expressions used to parse Content-Type and Content-Disposition headers contain patterns sus…

📅 Published: April 6, 2026, 8:08 p.m. 🔄 Last Modified: April 6, 2026, 9:16 p.m.

5.3

CVSS4.0

CVE-2026-35208 - lichess.org has an Unsanitized Stream Title Injection on /streamer

lichess.org is the forever free, adless and open source chess server. Any approved streamer can inject arbitrary HTML into /streamer and the homepage “Live streams” widget by placing markup in their Twitch/YouTube stream title. CSP is present and blocks inline script execution, but the issue is sti…

📅 Published: April 6, 2026, 8:06 p.m. 🔄 Last Modified: April 6, 2026, 9:16 p.m.
Total resulsts: 342650
Page 7 of 34,265
« previous page » next page
Filters