8.8

CVSS4.0

CVE-2026-33511 - pyload-ng: Authentication Bypass via Host Header Injection in ClickNLoad

pyLoad is a free and open-source download manager written in Python. From version 0.4.20 to before version 0.5.0b3.dev97, the local_check decorator in pyLoad's ClickNLoad feature can be bypassed by any remote attacker through HTTP Host header spoofing. This allows unauthenticated remote users to ac…

📅 Published: March 24, 2026, 6:56 p.m. 🔄 Last Modified: March 27, 2026, 9:20 a.m.

7.5

CVSS3.1

CVE-2026-33509 - pyload-ng: SETTINGS Permission Users Can Achieve Remote Code Execution via Unrestricted Reconnect S…

pyLoad is a free and open-source download manager written in Python. From version 0.4.0 to before version 0.5.0b3.dev97, the set_config_value() API endpoint allows users with the non-admin SETTINGS permission to modify any configuration option without restriction. The reconnect.script config option…

📅 Published: March 24, 2026, 6:55 p.m. 🔄 Last Modified: March 27, 2026, 9:20 a.m.

6.5

CVSS3.1

CVE-2026-33314 - pyload-ng: Improper Authentication and Origin Validation Error

pyLoad is a free and open-source download manager written in Python. Prior to version 0.5.0b3.dev97, a Host Header Spoofing vulnerability in the @local_check decorator allows unauthenticated external attackers to bypass local-only restrictions. This grants access to the Click'N'Load API endpoints, …

📅 Published: March 24, 2026, 6:52 p.m. 🔄 Last Modified: March 27, 2026, 9:20 a.m.

6.7

CVSS4.0

CVE-2026-32948 - sbt: Source dependency feature (via crafted VCS URL) leads to arbitrary code execution on Windows

sbt is a build tool for Scala, Java, and others. From version 0.9.5 to before version 1.12.7, on Windows, sbt uses Process("cmd", "/c", ...) to run VCS commands (git, hg, svn). The URI fragment (branch, tag, revision) is user-controlled via the build definition and passed to these commands without …

📅 Published: March 24, 2026, 6:48 p.m. 🔄 Last Modified: March 27, 2026, 9:20 a.m.

8.6

CVSS4.0

CVE-2026-30932 - Froxlor is vulnerable to BIND zone file injection via unsanitized DNS record content in DomainZones…

Froxlor is open source server administration software. Prior to version 2.3.5, the DomainZones.add API endpoint (accessible to customers with DNS enabled) does not validate the content field for several DNS record types (LOC, RP, SSHFP, TLSA). An attacker can inject newlines and BIND zone file dire…

📅 Published: March 24, 2026, 6:46 p.m. 🔄 Last Modified: March 27, 2026, 9:20 a.m.

2.9

CVSS4.0

CVE-2026-33769 - Astro: Remote allowlist bypass via unanchored matchPathname wildcard

Astro is a web framework. From version 2.10.10 to before version 5.18.1, this issue concerns Astro's remotePatterns path enforcement for remote URLs used by server-side fetchers such as the image optimization endpoint. The path matching logic for /* wildcards is unanchored, so a pathname that conta…

📅 Published: March 24, 2026, 6:44 p.m. 🔄 Last Modified: March 27, 2026, 9:20 a.m.

6.5

CVSS3.1

CVE-2026-33768 - Astro: Unauthenticated Path Override via `x-astro-path` / `x_astro_path`

Astro is a web framework. Prior to version 10.0.2, the @astrojs/vercel serverless entrypoint reads the x-astro-path header and x_astro_path query parameter to rewrite the internal request path, with no authentication whatsoever. On deployments without Edge Middleware, this lets anyone bypass Vercel…

📅 Published: March 24, 2026, 6:40 p.m. 🔄 Last Modified: March 27, 2026, 9:20 a.m.

5.9

CVSS3.1

CVE-2026-29772 - Astro: Memory exhaustion DoS due to missing request body size limit in Server Islands

Astro is a web framework. Prior to version 10.0.0, Astro's Server Islands POST handler buffers and parses the full request body as JSON without enforcing a size limit. Because JSON.parse() allocates a V8 heap object for every element in the input, a crafted payload of many small JSON objects achiev…

📅 Published: March 24, 2026, 6:38 p.m. 🔄 Last Modified: March 26, 2026, 12:18 p.m.

7.1

CVSS4.0

CVE-2026-33627 - Parse Server: Auth data exposed via /users/me endpoint

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.61 and 9.6.0-alpha.55, an authenticated user calling GET /users/me receives unsanitized auth data, including sensitive credentials such as MFA TOTP secrets and recovery code…

📅 Published: March 24, 2026, 6:31 p.m. 🔄 Last Modified: March 26, 2026, 12:18 p.m.

6.1

CVSS4.0

CVE-2026-23924 - Agent 2 Docker plugin arbitrary file read via Docker API injection

Zabbix Agent 2 Docker plugin does not properly sanitize the 'docker.container_info' parameters when forwarding them to the Docker daemon. An attacker capable of invoking Agent 2 can read arbitrary files from running Docker containers by injecting them via the Docker archive API.

📅 Published: March 24, 2026, 6:30 p.m. 🔄 Last Modified: March 25, 2026, 9:27 p.m.
Total resulsts: 349182
Page 937 of 34,919
« previous page » next page
Filters