5.9

CVSS3.1

CVE-2026-40592 - FreeScout's cross-user undo reply allows mailbox peers to recall another agent's outbound reply

FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.214, the undo-send route `GET /conversation/undo-reply/{thread_id}` checks only whether the current user can view the parent conversation. It does not verify that the current user created the reply being undone. In aโ€ฆ

๐Ÿ“… Published: April 21, 2026, 4:57 p.m. ๐Ÿ”„ Last Modified: April 22, 2026, 9:10 p.m.

7.1

CVSS3.1

CVE-2026-40591 - FreeScout: Improper Authorization in Phone Conversation Creation Enables Cross-Mailbox Hidden Custoโ€ฆ

FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.214, the phone-conversation creation flow accepts attacker-controlled `customer_id`, `name`, `to_email`, and `phone` values and resolves the target customer in the backend without enforcing mailbox-scoped customer viโ€ฆ

๐Ÿ“… Published: April 21, 2026, 4:54 p.m. ๐Ÿ”„ Last Modified: April 22, 2026, 9:10 p.m.

4.3

CVSS3.1

CVE-2026-40590 - FreeScout's Customer AJAX Create Modifies Hidden Existing Customer

FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.214, the Change Customer modal exposes a โ€œCreate a new customerโ€ flow via POST /customers/ajax with action=create. Under limited visibility, the endpoint drops unique-email validation. If the supplied email already bโ€ฆ

๐Ÿ“… Published: April 21, 2026, 4:52 p.m. ๐Ÿ”„ Last Modified: April 22, 2026, 9:10 p.m.

7.6

CVSS3.1

CVE-2026-40589 - FreeScout has Customer Edit Cross-Mailbox Email Takeover

FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.214, a low-privileged agent can edit a visible customer and add an email address already owned by a hidden customer in another mailbox. The server discloses the hidden customerโ€™s name and profile URL in the success fโ€ฆ

๐Ÿ“… Published: April 21, 2026, 4:50 p.m. ๐Ÿ”„ Last Modified: April 22, 2026, 9:10 p.m.

9.8

CVSS3.1

CVE-2026-40050 - CrowdStrike LogScale Unauthenticated Path Traversal

CrowdStrike has released security updates to address a critical unauthenticated path traversal vulnerability (CVE-2026-40050) in LogScale. This vulnerability only requires mitigation by customers that host specific versions of LogScale and does not affect Next-Gen SIEM customers. The vulnerability โ€ฆ

๐Ÿ“… Published: April 21, 2026, 4:48 p.m. ๐Ÿ”„ Last Modified: April 22, 2026, 9:24 p.m.

5.7

CVSS4.0

CVE-2026-40570 - FreeScout's Missing Authorization in load_customer_info Allows Any Authenticated User to Access Fulโ€ฆ

FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.213, the `load_customer_info` action in `POST /conversation/ajax` returns complete customer profile data to any authenticated user without verifying mailbox access. An attacker only needs a valid email address to retโ€ฆ

๐Ÿ“… Published: April 21, 2026, 4:48 p.m. ๐Ÿ”„ Last Modified: April 22, 2026, 9:10 p.m.

9

CVSS3.1

CVE-2026-40569 - FreeScout's Mass Assignment in Mailbox Connection Settings Enables Silent Email Exfiltration

FreeScout is a free self-hosted help desk and shared mailbox. Versions prior to 1.8.213 have a mass assignment vulnerability in the mailbox connection settings endpoints of FreeScout (`connectionIncomingSave()` at `app/Http/Controllers/MailboxesController.php:468` and `connectionOutgoingSave()` at โ€ฆ

๐Ÿ“… Published: April 21, 2026, 4:46 p.m. ๐Ÿ”„ Last Modified: April 22, 2026, 9:10 p.m.

9.4

CVSS3.1

CVE-2026-40576 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in excel-mcp-server

excel-mcp-server is a Model Context Protocol server for Excel file manipulation. A path traversal vulnerability exists in excel-mcp-server versions up to and including 0.1.7. When running in SSE or Streamable-HTTP transport mode (the documented way to use this server remotely), an unauthenticated aโ€ฆ

๐Ÿ“… Published: April 21, 2026, 4:35 p.m. ๐Ÿ”„ Last Modified: April 22, 2026, 9:17 p.m.

9

CVSS3.1

CVE-2026-5652 - Authorization Bypass Through User-Controlled Key in Crafty Controller

An insecure direct object reference vulnerability in the Users API component of Crafty Controller allows a remote, authenticated attacker to perform user modification actions via improper API permissions validation.

๐Ÿ“… Published: April 21, 2026, 4:33 p.m. ๐Ÿ”„ Last Modified: April 21, 2026, 10:45 p.m.

6.8

CVSS3.1

CVE-2026-40574 - OAuth2 Proxy has an Authorization Bypass in Email Domain Validation via Malformed Multi-@ Email Claโ€ฆ

OAuth2 Proxy is a reverse proxy that provides authentication using OAuth2 providers. Prior to 7.15.2, an authorization bypass exists in OAuth2 Proxy as part of the email_domain enforcement option. An attacker may be able to authenticate with an email claim such as [email protected]@company.com and โ€ฆ

๐Ÿ“… Published: April 21, 2026, 4:32 p.m. ๐Ÿ”„ Last Modified: April 22, 2026, 9:24 p.m.
Total resulsts: 346288
Page 77 of 34,629
ยซ previous page ยป next page
Filters