9.4

CVSS4.0

CVE-2026-28384 - Authenticated RCE via unsanitized compression_algorithm

An improper sanitization of the compression_algorithm parameter in Canonical LXD allows an authenticated, unprivileged user to execute commands as the LXD daemon on the LXD server via API calls to the image and backup endpoints. This issue affected LXD from 4.12 through 6.6 and was fixed in the sna…

📅 Published: March 12, 2026, 2:51 p.m. 🔄 Last Modified: March 13, 2026, 7:54 p.m.

6.3

CVSS4.0

CVE-2026-0809 - Weak KSeF token encoding in Streamsoft Prestiż

Use of a custom token encoding algorithm in Streamsoft Prestiż software allows the value of the KSeF (Krajowy System e-Faktur) token to be guessed after analyzing how tokens with know values are encoded. This issue was fixed in version 20.0.380.92.

📅 Published: March 12, 2026, 1:02 p.m. 🔄 Last Modified: March 13, 2026, 9:53 a.m.

8.6

CVSS4.0

CVE-2026-2514 - Possibility of unintended actions when viewing maliciously crafted network data in Progress Flowmon…

In Progress Flowmon ADS versions prior to 12.5.5 and 13.0.3, a vulnerability exists whereby an adversary with access to Flowmon monitoring ports may craft malicious network data that, when processed by Flowmon ADS and viewed by an authenticated user, could result in unintended actions being execute…

📅 Published: March 12, 2026, 1 p.m. 🔄 Last Modified: March 13, 2026, 9:53 a.m.

8.6

CVSS4.0

CVE-2026-2513 - Possibility of unintended actions when an administrator clicks a malicious link in the Progress Flo…

A vulnerability exists in Progress Flowmon ADS versions prior to 12.5.5 and 13.0.3, whereby an administrator who clicks a malicious link provided by an attacker may inadvertently trigger unintended actions within their authenticated web session.

📅 Published: March 12, 2026, 12:58 p.m. 🔄 Last Modified: March 13, 2026, 9:53 a.m.

6.1

CVSS3.1

CVE-2026-2987 - Simple Ajax Chat <= 20260217 - Unauthenticated Stored Cross-Site Scripting via 'c'

The Simple Ajax Chat plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'c' parameter in versions up to, and including, 20260217 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in…

📅 Published: March 12, 2026, 12:26 p.m. 🔄 Last Modified: March 13, 2026, 9:53 a.m.

4.8

CVSS4.0

CVE-2026-4040 - OpenClaw File Existence tools.exec.safeBins information exposure

A vulnerability was identified in OpenClaw up to 2026.2.17. This issue affects the function tools.exec.safeBins of the component File Existence Handler. The manipulation leads to information exposure through discrepancy. The attack needs to be performed locally. Upgrading to version 2026.2.19-beta.…

📅 Published: March 12, 2026, 12:02 p.m. 🔄 Last Modified: March 16, 2026, 6:06 p.m.

5.3

CVSS4.0

CVE-2026-4039 - OpenClaw Skill Env applySkillConfigenvOverrides code injection

A vulnerability was determined in OpenClaw 2026.2.19-2. This vulnerability affects the function applySkillConfigenvOverrides of the component Skill Env Handler. Executing a manipulation can lead to code injection. It is possible to launch the attack remotely. Upgrading to version 2026.2.21-beta.1 i…

📅 Published: March 12, 2026, 12:02 p.m. 🔄 Last Modified: March 16, 2026, 6:02 p.m.

7.8

CVSS3.1

CVE-2026-3989 - CVE-2026-3989

SGLangs `replay_request_dump.py` contains an insecure pickle.load() without validation and proper deserialization. An attacker can take advantage of this by providing a malicious .pkl file, which will execute the attackers code on the device running the script.

📅 Published: March 12, 2026, 11:37 a.m. 🔄 Last Modified: March 16, 2026, 7:16 p.m.

9.8

CVSS3.1

CVE-2026-3060 - CVE-2026-3060

SGLang' encoder parallel disaggregation system is vulnerable to unauthenticated remote code execution through the disaggregation module, which deserializes untrusted data using pickle.loads() without authentication.

📅 Published: March 12, 2026, 11:37 a.m. 🔄 Last Modified: March 17, 2026, 2:20 p.m.

9.8

CVSS3.1

CVE-2026-3059 - CVE-2026-3059

SGLang's multimodal generation module is vulnerable to unauthenticated remote code execution through the ZMQ broker, which deserializes untrusted data using pickle.loads() without authentication.

📅 Published: March 12, 2026, 11:37 a.m. 🔄 Last Modified: March 17, 2026, 2:19 p.m.
Total resulsts: 338444
Page 88 of 33,845
« previous page » next page
Filters