5.3

CVSS3.1

CVE-2026-41322 - @astrojs/node: Cache Poisoning due to incorrect error handling when if-match header is malformed

@astrojs/node allows Astro to deploy your SSR site to Node targets. Prior to 10.0.5, requesting a static js/css resources from _astro path with an incorrect/malformed if-match header returns a 500 error with a one year cache lifetime instead of 412 in some cases. This has the effect that all subseq…

📅 Published: April 24, 2026, 5:08 p.m. 🔄 Last Modified: April 25, 2026, 3:16 a.m.

2.2

CVSS3.1

CVE-2026-41321 - @astrojs/cloudflare: SSRF via redirect following in Cloudflare image-binding-transform endpoint

@astrojs/cloudflare is an SSR adapter for use with Cloudflare Workers targets. Prior to 13.1.10, the fetch() call for remote images in packages/integrations/cloudflare/src/utils/image-binding-transform.ts uses the default redirect: 'follow' behavior. This allows the Cloudflare Worker to follow HTTP…

📅 Published: April 24, 2026, 5:04 p.m. 🔄 Last Modified: April 28, 2026, 9:17 a.m.

6.1

CVSS3.1

CVE-2026-41067 - Astro: XSS via incomplete `</script>` sanitization in `define:vars` allows case-insensitive and whi…

Astro is a web framework. Prior to 6.1.6, the defineScriptVars function in Astro's server-side rendering pipeline uses a case-sensitive regex /<\/script>/g to sanitize values injected into inline <script> tags via the define:vars directive. HTML parsers close <script> elements case-insensitively an…

📅 Published: April 24, 2026, 4:57 p.m. 🔄 Last Modified: April 27, 2026, 7:45 p.m.

4.3

CVSS3.1

CVE-2026-41079 - OpenPrinting CUPS: Heap out-of-bounds read in SNMP supply-level polling leaks stack memory to authe…

OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. Prior to 2.4.17, a network-adjacent attacker can send a crafted SNMP response to the CUPS SNMP backend that causes an out-of-bounds read of up to 176 bytes past a stack buffer. The leaked memory is …

📅 Published: April 24, 2026, 4:54 p.m. 🔄 Last Modified: April 27, 2026, 1:40 p.m.

6.6

CVSS3.1

CVE-2026-41411 - Vim: Command injection via backtick expansion in tag filenames

Vim is an open source, command line text editor. Prior to 9.2.0357, A command injection vulnerability exists in Vim's tag file processing. When resolving a tag, the filename field from the tags file is passed through wildcard expansion to resolve environment variables and wildcards. If the filename…

📅 Published: April 24, 2026, 4:51 p.m. 🔄 Last Modified: April 28, 2026, 12:50 p.m.

8.8

CVSS3.1

CVE-2026-40897 - Math.js: Unsafe object property setter in mathjs

Math.js is an extensive math library for JavaScript and Node.js. From 13.1.1 to before 15.2.0, a vulnerability allowed executing arbitrary JavaScript via the expression parser of mathjs. You can be affected when you have an application where users can evaluate arbitrary expressions using the mathjs…

📅 Published: April 24, 2026, 4:48 p.m. 🔄 Last Modified: April 28, 2026, 9:17 a.m.

7.5

CVSS3.1

CVE-2026-41066 - lxml: Default configuration of iterparse() and ETCompatXMLParser() allows XXE to local files

lxml is a library for processing XML and HTML in the Python language. Prior to 6.1.0, using either of the two parsers in the default configuration (with resolve_entities=True) allows untrusted XML input to read local files. Setting the resolve_entities option explicitly to resolve_entities='interna…

📅 Published: April 24, 2026, 4:45 p.m. 🔄 Last Modified: April 27, 2026, 5:59 p.m.

8.7

CVSS4.0

CVE-2026-6912 - Privilege Escalation via Self-Writable Cognito Custom Attribute in AWS Ops Wheel

Improperly controlled modification of dynamically-determined object attributes in the Cognito User Pool configuration in AWS Ops Wheel before PR #165 allows remote authenticated users to escalate to deployment admin privileges and manage Cognito user accounts via a crafted UpdateUserAttributes API …

📅 Published: April 24, 2026, 4:11 p.m. 🔄 Last Modified: April 24, 2026, 5:56 p.m.

9.3

CVSS4.0

CVE-2026-6911 - Authentication Bypass via Missing JWT Signature Verification in AWS Ops Wheel

Missing JWT signature verification in AWS Ops Wheel allows unauthenticated attackers to forge JWT tokens and gain unintended administrative access to the application, including the ability to read, modify, and delete all application data across tenants and manage Cognito user accounts within the de…

📅 Published: April 24, 2026, 4:08 p.m. 🔄 Last Modified: April 24, 2026, 5:56 p.m.

9.3

CVSS4.0

CVE-2026-39920 - BridgeHead FileStore < 24A Apache Axis2 Default Credentials RCE

BridgeHead FileStore versions prior to 24A (released in early 2024) expose the Apache Axis2 administration module on network-accessible endpoints with default credentials that allows unauthenticated remote attackers to execute arbitrary OS commands. Attackers can authenticate to the admin console u…

📅 Published: April 24, 2026, 3:48 p.m. 🔄 Last Modified: April 27, 2026, 7:52 p.m.
Total resulsts: 347241
Page 79 of 34,725
« previous page » next page
Filters