8.3

CVSS3.1

CVE-2026-34725 - dbgate-web: Stored XSS in applicationIcon leads to potential RCE in Electron due to unsafe rendererโ€ฆ

DbGate is cross-platform database manager. From version 7.0.0 to before version 7.1.5, a stored XSS vulnerability exists in DbGate because attacker-controlled SVG icon strings are rendered as raw HTML without sanitization. In the web UI this allows script execution in another user's browser; in theโ€ฆ

๐Ÿ“… Published: April 2, 2026, 6:02 p.m. ๐Ÿ”„ Last Modified: April 16, 2026, 2:45 p.m.

6.9

CVSS4.0

CVE-2026-5414 - Newgen OmniDocs WebApiRequestRedirection resource injection

A security flaw has been discovered in Newgen OmniDocs up to 12.0.00. Affected by this issue is some unknown functionality of the file /omnidocs/WebApiRequestRedirection. The manipulation of the argument DocumentId results in improper control of resource identifiers. The attack may be performed froโ€ฆ

๐Ÿ“… Published: April 2, 2026, 6 p.m. ๐Ÿ”„ Last Modified: April 24, 2026, 6:13 p.m.

9.9

CVSS3.1

CVE-2026-34717 - OpenProject: SQL Injection in Cost Reporting =n Operator via parse_number_string

OpenProject is an open-source, web-based project management software. Prior to version 17.2.3, the =n operator in modules/reporting/lib/report/operator.rb:177 embeds user input directly into SQL WHERE clauses without parameterization. This issue has been patched in version 17.2.3.

๐Ÿ“… Published: April 2, 2026, 5:59 p.m. ๐Ÿ”„ Last Modified: April 21, 2026, 1:03 a.m.

5.3

CVSS3.1

CVE-2026-34715 - ewe Has Improper Neutralization of CRLF Sequences in HTTP Headers (HTTP Request/Response Splitting)

ewe is a Gleam web server. Prior to version 3.0.6, the encode_headers function in src/ewe/internal/encoder.gleam directly interpolates response header keys and values into raw HTTP bytes without validating or stripping CRLF (\r\n) sequences. An application that passes user-controlled data into respโ€ฆ

๐Ÿ“… Published: April 2, 2026, 5:57 p.m. ๐Ÿ”„ Last Modified: April 13, 2026, 2:28 p.m.

5.9

CVSS3.1

CVE-2026-34610 - leancrypto: Integer truncation in X.509 name parser enables certificate identity impersonation

The leancrypto library is a cryptographic library that exclusively contains only PQC-resistant cryptographic algorithms. Prior to version 1.7.1, lc_x509_extract_name_segment() casts size_t vlen to uint8_t when storing the Common Name (CN) length. An attacker who crafts a certificate with CN = victiโ€ฆ

๐Ÿ“… Published: April 2, 2026, 5:54 p.m. ๐Ÿ”„ Last Modified: April 24, 2026, 1:01 p.m.

4.9

CVSS3.1

CVE-2026-34608 - nanomq: Heap-Buffer-Overflow in webhook_inproc.c via cJSON_Parse OOB Read

NanoMQ MQTT Broker (NanoMQ) is an all-around Edge Messaging Platform. Prior to version 0.24.10, in NanoMQ's webhook_inproc.c, the hook_work_cb() function processes nng messages by parsing the message body with cJSON_Parse(body). The body is obtained from nng_msg_body(msg), which is a binary buffer โ€ฆ

๐Ÿ“… Published: April 2, 2026, 5:52 p.m. ๐Ÿ”„ Last Modified: April 15, 2026, 4:30 p.m.

6.9

CVSS4.0

CVE-2026-34606 - Stored XSS in Frappe LMS

Frappe Learning Management System (LMS) is a learning system that helps users structure their content. From version 2.27.0 to before version 2.48.0, Frappe LMS was vulnerable to stored XSS. This issue has been patched in version 2.48.0.

๐Ÿ“… Published: April 2, 2026, 5:50 p.m. ๐Ÿ”„ Last Modified: April 8, 2026, 7:55 p.m.

7.5

CVSS3.1

CVE-2026-34601 - xmldom: XML injection via unsafe CDATA serialization allows attacker-controlled markup insertion

xmldom is a pure JavaScript W3C standard-based (XML DOM Level 2 Core) `DOMParser` and `XMLSerializer` module. In xmldom versions 0.6.0 and prior and @xmldom/xmldom prior to versions 0.8.12 and 0.9.9, xmldom/xmldom allows attacker-controlled strings containing the CDATA terminator ]]> to be insertedโ€ฆ

๐Ÿ“… Published: April 2, 2026, 5:47 p.m. ๐Ÿ”„ Last Modified: April 16, 2026, 2:57 p.m.

6.3

CVSS4.0

CVE-2026-5413 - Newgen OmniDocs GetWebApiConfiguration information disclosure

A vulnerability was identified in Newgen OmniDocs up to 12.0.00. Affected by this vulnerability is an unknown functionality of the file /omnidocs/GetWebApiConfiguration. The manipulation of the argument connectionDetails leads to information disclosure. The attack is possible to be carried out remoโ€ฆ

๐Ÿ“… Published: April 2, 2026, 5:45 p.m. ๐Ÿ”„ Last Modified: April 24, 2026, 6:13 p.m.

8.2

CVSS4.0

CVE-2026-34593 - Ash Framework: Ash.Type.Module.cast_input/2 atom exhaustion via unchecked Module.concat allows BEAMโ€ฆ

Ash Framework is a declarative, extensible framework for building Elixir applications. Prior to version 3.22.0, Ash.Type.Module.cast_input/2 unconditionally creates a new Erlang atom via Module.concat([value]) for any user-supplied binary string that starts with "Elixir.", before verifying whether โ€ฆ

๐Ÿ“… Published: April 2, 2026, 5:42 p.m. ๐Ÿ”„ Last Modified: April 14, 2026, 4:41 p.m.
Total resulsts: 349182
Page 723 of 34,919
ยซ previous page ยป next page
Filters