6.3

CVSS4.0

CVE-2026-33347 - league/commonmark has an embed extension allowed_domains bypass

league/commonmark is a PHP Markdown parser. From version 2.3.0 to before version 2.8.2, the DomainFilteringAdapter in the Embed extension is vulnerable to an allowlist bypass due to a missing hostname boundary assertion in the domain-matching regex. An attacker-controlled domain like youtube.com.ev…

📅 Published: March 24, 2026, 7:26 p.m. 🔄 Last Modified: April 9, 2026, 8:29 a.m.

8.1

CVSS3.1

CVE-2026-33344 - Dagu has an incomplete fix for CVE-2026-27598: path traversal via %2F-encoded slashes in locateDAG

Dagu is a workflow engine with a built-in Web user interface. From version 2.0.0 to before version 2.3.1, the fix for CVE-2026-27598 added ValidateDAGName to CreateNewDAG and rewrote generateFilePath to use filepath.Base. This patched the CREATE path. The remaining API endpoints - GET, DELETE, RENA…

📅 Published: March 24, 2026, 7:23 p.m. 🔄 Last Modified: March 27, 2026, 9:20 a.m.

6.9

CVSS4.0

CVE-2026-33332 - NiceGUI's unvalidated chunk size parameter in media routes can cause memory exhaustion

NiceGUI is a Python-based UI framework. Prior to version 3.9.0, NiceGUI's app.add_media_file() and app.add_media_files() media routes accept a user-controlled query parameter that influences how files are read during streaming. The parameter is passed to the range-response implementation without va…

📅 Published: March 24, 2026, 7:20 p.m. 🔄 Last Modified: March 27, 2026, 9:20 a.m.

8.2

CVSS3.1

CVE-2026-33331 - oRPC: Stored XSS in OpenAPI Reference Plugin via unescaped JSON.stringify

oRPC is an tool that helps build APIs that are end-to-end type-safe and adhere to OpenAPI standards. Prior to version 1.13.9, a stored cross-site scripting (XSS) vulnerability exists in the OpenAPI documentation generation of orpc. If an attacker can control any field within the OpenAPI specificati…

📅 Published: March 24, 2026, 7:18 p.m. 🔄 Last Modified: March 27, 2026, 9:20 a.m.

7.1

CVSS3.1

CVE-2026-33330 - FileRise ONLYOFFICE integration allows read-only users to overwrite files via forged save callback

FileRise is a self-hosted web file manager / WebDAV server. Prior to version 3.10.0, a broken access control issue in FileRise's ONLYOFFICE integration allows an authenticated user with read-only access to obtain a signed save callbackUrl for a file and then directly forge the ONLYOFFICE save callb…

📅 Published: March 24, 2026, 7:15 p.m. 🔄 Last Modified: March 27, 2026, 9:20 a.m.

8.1

CVSS3.1

CVE-2026-33329 - FileRise: Path Traversal in `resumableIdentifier` Leading to Arbitrary File Write, Recursive Direct…

FileRise is a self-hosted web file manager / WebDAV server. From version 1.0.1 to before version 3.10.0, the resumableIdentifier parameter in the Resumable.js chunked upload handler (UploadModel::handleUpload()) is concatenated directly into filesystem paths without any sanitization. An authenticat…

📅 Published: March 24, 2026, 7:14 p.m. 🔄 Last Modified: March 27, 2026, 9:20 a.m.

4.3

CVSS3.1

CVE-2026-33326 - @keystone-6/core: `isFilterable` bypass via `cursor` parameter in findMany

Keystone is a content management system for Node.js. Prior to version 6.5.2, {field}.isFilterable access control can be bypassed in findMany queries by passing a cursor. This can be used to confirm the existence of records by protected field values. The fix for CVE-2025-46720 (field-level isFiltera…

📅 Published: March 24, 2026, 7:08 p.m. 🔄 Last Modified: May 4, 2026, 3:26 p.m.

8.8

CVSS3.1

CVE-2026-22559 - Improper Input Validation Allows Unauthenticated Access via Malicious Link in UniFi Network Server

An Improper Input Validation vulnerability in UniFi Network Server may allow unauthorized access to an account if the account owner is socially engineered into clicking a malicious link. Affected Products: UniFi Network Server (Version 10.1.85 and earlier) Mitigation: Update UniFi Netw…

📅 Published: March 24, 2026, 7:05 p.m. 🔄 Last Modified: March 25, 2026, 8:57 p.m.

9.1

CVSS4.0

CVE-2026-33419 - MinIO: LDAP login brute-force via user enumeration and missing rate limit

MinIO is a high-performance object storage system. Prior to RELEASE.2026-03-17T21-25-16Z, MinIO AIStor's STS (Security Token Service) AssumeRoleWithLDAPIdentity endpoint is vulnerable to LDAP credential brute-forcing due to two combined weaknesses: (1) distinguishable error responses that enable us…

📅 Published: March 24, 2026, 7:05 p.m. 🔄 Last Modified: April 9, 2026, 8:29 a.m.

9.2

CVSS4.0

CVE-2026-33322 - MinIO: JWT Algorithm Confusion in OIDC Authentication

MinIO is a high-performance object storage system. From RELEASE.2022-11-08T05-27-07Z to before RELEASE.2026-03-17T21-25-16Z, a JWT algorithm confusion vulnerability in MinIO's OpenID Connect authentication allows an attacker who knows the OIDC ClientSecret to forge arbitrary identity tokens and obt…

📅 Published: March 24, 2026, 7:05 p.m. 🔄 Last Modified: April 9, 2026, 8:29 a.m.
Total resulsts: 349182
Page 936 of 34,919
« previous page » next page
Filters