3.7

CVSS3.1

CVE-2026-26961 - Rack: Multipart Boundary Parsing Ambiguity allowing WAF Bypass

Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Multipart::Parser extracts the boundary parameter from multipart/form-data using a greedy regular expression. When a Content-Type header contains multiple boundary parameters, Rack selects the last one r…

πŸ“… Published: April 2, 2026, 4:42 p.m. πŸ”„ Last Modified: April 2, 2026, 5:16 p.m.

5.3

CVSS3.1

CVE-2026-34230 - Rack: Quadratic complexity in Rack::Utils.select_best_encoding via wildcard Accept-Encoding header

Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Utils.select_best_encoding processes Accept-Encoding values with quadratic time complexity when the header contains many wildcard (*) entries. Because this method is used by Rack::Deflater to choose a re…

πŸ“… Published: April 2, 2026, 4:41 p.m. πŸ”„ Last Modified: April 2, 2026, 5:16 p.m.

6.1

CVSS3.1

CVE-2026-34083 - signalk-server: OAuth Authorization Code Theft via Unvalidated Host Header in OIDC Flow

Signal K Server is a server application that runs on a central hub in a boat. Prior to version 2.24.0, SignalK Server contains a code-level vulnerability in its OIDC login and logout handlers where the unvalidated HTTP Host header is used to construct the OAuth2 redirect_uri. Because the redirectUr…

πŸ“… Published: April 2, 2026, 4:14 p.m. πŸ”„ Last Modified: April 2, 2026, 6:16 p.m.

6.9

CVSS4.0

CVE-2026-33951 - signalk-server: Unauthenticated Source Priorities Manipulation

Signal K Server is a server application that runs on a central hub in a boat. Prior to version 2.24.0-beta.1, the SignalK Server exposes an unauthenticated HTTP endpoint that allows remote attackers to modify navigation data source priorities. This endpoint, accessible via PUT /signalk/v1/api/sourc…

πŸ“… Published: April 2, 2026, 4:11 p.m. πŸ”„ Last Modified: April 2, 2026, 5:16 p.m.

9.4

CVSS3.1

CVE-2026-33950 - signalk-server: Privilege Escalation by Admin Role Injection via /enableSecurity

Signal K Server is a server application that runs on a central hub in a boat. Prior to version 2.24.0-beta.4, there is a privilege escalation vulnerability by Admin Role Injection via /enableSecurity. An unauthenticated attacker can gain full Administrator access to the SignalK server at any time, …

πŸ“… Published: April 2, 2026, 4:08 p.m. πŸ”„ Last Modified: April 2, 2026, 5:16 p.m.

7.5

CVSS3.1

CVE-2025-65114 - Apache Traffic Server: Malformed chunked message body allows request smuggling

Apache Traffic Server allows request smuggling if chunked messages are malformed.Β  This issue affects Apache Traffic Server: from 9.0.0 through 9.2.12, from 10.0.0 through 10.1.1. Users are recommended to upgrade to version 9.2.13 or 10.1.2, which fix the issue.

πŸ“… Published: April 2, 2026, 3:55 p.m. πŸ”„ Last Modified: April 2, 2026, 7:21 p.m.

7.5

CVSS3.1

CVE-2025-58136 - Apache Traffic Server: A simple legitimate POST request causes a crash

A bug in POST request handling causes a crash under a certain condition. This issue affects Apache Traffic Server: from 10.0.0 through 10.1.1, from 9.0.0 through 9.2.12. Users are recommended to upgrade to version 10.1.2 or 9.2.13, which fix the issue. A workaround for older versions is to setΒ p…

πŸ“… Published: April 2, 2026, 3:54 p.m. πŸ”„ Last Modified: April 2, 2026, 7:21 p.m.

8.7

CVSS4.0

CVE-2026-5350 - Trendnet TEW-657BRM setup.cgi update_pcdb stack-based overflow

A security flaw has been discovered in Trendnet TEW-657BRM 1.00.1. The impacted element is the function update_pcdb of the file /setup.cgi. The manipulation of the argument mac_pc_dba results in stack-based buffer overflow. The attack can be launched remotely. The exploit has been released to the p…

πŸ“… Published: April 2, 2026, 3:30 p.m. πŸ”„ Last Modified: April 2, 2026, 3:30 p.m.

8.7

CVSS4.0

CVE-2026-5349 - Trendnet TEW-657BRM setup.cgi add_apcdb stack-based overflow

A vulnerability was identified in Trendnet TEW-657BRM 1.00.1. The affected element is the function add_apcdb of the file /setup.cgi. The manipulation of the argument mac_pc_dba leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit is publicly available and might be…

πŸ“… Published: April 2, 2026, 3:15 p.m. πŸ”„ Last Modified: April 2, 2026, 3:15 p.m.

9.8

CVSS3.1

CVE-2026-33746 - Convoy: JWT Signature Verification Bypass Allows Authentication as Arbitrary Users

Convoy is a KVM server management panel for hosting businesses. From version 3.9.0-beta to before version 4.5.1, the JWTService::decode() method did not verify the cryptographic signature of JWT tokens. While the method configured a symmetric HMAC-SHA256 signer via lcobucci/jwt, it only validated t…

πŸ“… Published: April 2, 2026, 3:06 p.m. πŸ”„ Last Modified: April 2, 2026, 8:20 p.m.
Total resulsts: 341931
Page 9 of 34,194
Β« previous page Β» next page
Filters