8.7

CVSS4.0

CVE-2026-33064 - free5GC UDM DataChangeNotification Procedure Panic Due to Nil Pointer Dereference

Free5GC is an open-source Linux Foundation project for 5th generation (5G) mobile core networks. Versions prior to 1.4.2 are vulnerable to procedure panic caused by Nil Pointer Dereference in the /sdm-subscriptions endpoint. A remote attacker can cause the UDM service to panic and crash by sending โ€ฆ

๐Ÿ“… Published: March 20, 2026, 8 a.m. ๐Ÿ”„ Last Modified: March 25, 2026, 2:30 p.m.

8.7

CVSS4.0

CVE-2026-33191 - free5GC UDM vulnerable to null byte injection in URL path parameters causing 500 Internal Server Erโ€ฆ

Free5GC is an open-source Linux Foundation project for 5th generation (5G) mobile core networks. Versions prior to 1.4.2 are vulnerable to null byte injection in URL path parameters. A remote attacker can inject null bytes (URL-encoded as %00) into the supi path parameter of the UDM's Nudm_Subscribโ€ฆ

๐Ÿ“… Published: March 20, 2026, 7:54 a.m. ๐Ÿ”„ Last Modified: March 25, 2026, 2:30 p.m.

6.5

CVSS3.1

CVE-2026-33022 - Tekton Pipelines: Controller can panic when setting long resolver names in TaskRun/PipelineRun

Tekton Pipelines project provides k8s-style resources for declaring CI/CD-style pipelines. Versions 0.60.0 through 1.0.0, 1.1.0 through 1.3.2, 1.4.0 through 1.6.0, 1.7.0 through 1.9.0, 1.10.0, and 1.10.1 have a denial-of-service vulnerability in that allows any user who can create a TaskRun or Pipeโ€ฆ

๐Ÿ“… Published: March 20, 2026, 7:48 a.m. ๐Ÿ”„ Last Modified: March 25, 2026, 2:30 p.m.

5.8

CVSS3.1

CVE-2026-33061 - Jexactyl has Stored DOM Cross-Site Scripting (XSS) via unescaped JSON in Blade template

Jexactyl is a customisable game management panel and billing system. Commits after 025e8dbb0daaa04054276bda814d922cf4af58da and before e28edb204e80efab628d1241198ea4f079779cfd inject server-side objects into client-side JavaScript through resources/views/templates/wrapper.blade.php. Using unescapedโ€ฆ

๐Ÿ“… Published: March 20, 2026, 7:34 a.m. ๐Ÿ”„ Last Modified: April 15, 2026, 4:45 p.m.

5.3

CVSS3.1

CVE-2026-33060 - CKAN MCP Server: SSRF via base_url allows access to internal networks

CKAN MCP Server is a tool for querying CKAN open data portals. Versions prior to 0.4.85 provide tools including ckan_package_search and sparql_query that accept a base_url parameter, making HTTP requests to arbitrary endpoints without restriction. A CKAN portal client has no legitimate reason to coโ€ฆ

๐Ÿ“… Published: March 20, 2026, 7:21 a.m. ๐Ÿ”„ Last Modified: April 17, 2026, 9:06 p.m.

9.8

CVSS3.1

CVE-2026-33057 - Mesop Affected by Unauthenticated Remote Code Execution via Test Suite Route /exec-py

Mesop is a Python-based UI framework that allows users to build web applications. In versions 1.2.2 and below, an explicit web endpoint inside the ai/ testing module infrastructure directly ingests untrusted Python code strings unconditionally without authentication measures, yielding standard Unreโ€ฆ

๐Ÿ“… Published: March 20, 2026, 7:16 a.m. ๐Ÿ”„ Last Modified: March 25, 2026, 2:30 p.m.

5.1

CVSS4.0

CVE-2026-33056 - tar-rs: unpack_in can chmod arbitrary directories by following symlinks

tar-rs is a tar archive reading/writing library for Rust. In versions 0.4.44 and below, when unpacking a tar archive, the tar crate's unpack_dir function uses fs::metadata() to check whether a path that already exists is a directory. Because fs::metadata() follows symbolic links, a crafted tarball โ€ฆ

๐Ÿ“… Published: March 20, 2026, 7:11 a.m. ๐Ÿ”„ Last Modified: March 25, 2026, 2:30 p.m.

5.1

CVSS4.0

CVE-2026-33055 - tar-rs incorrectly ignores PAX size headers if header size is nonzero

tar-rs is a tar archive reading/writing library for Rust. Versions 0.4.44 and below have conditional logic that skips the PAX size header in cases where the base header size is nonzero. As part of CVE-2025-62518, the astral-tokio-tar project was changed to correctly honor PAX size headers in the caโ€ฆ

๐Ÿ“… Published: March 20, 2026, 7:06 a.m. ๐Ÿ”„ Last Modified: March 25, 2026, 2:30 p.m.

9.2

CVSS4.0

CVE-2026-4478 - Yi Technology YI Home Camera HTTP Firmware Update ipc signature verification

A vulnerability was identified in Yi Technology YI Home Camera 2 2.1.1_20171024151200. This impacts an unknown function of the file home/web/ipc of the component HTTP Firmware Update Handler. The manipulation leads to improper verification of cryptographic signature. The attack is possible to be caโ€ฆ

๐Ÿ“… Published: March 20, 2026, 7:02 a.m. ๐Ÿ”„ Last Modified: April 22, 2026, 9:32 p.m.

2.3

CVSS4.0

CVE-2026-4477 - Yi Technology YI Home Camera WPA/WPS hard-coded key

A vulnerability was determined in Yi Technology YI Home Camera 2 2.1.1_20171024151200. This affects an unknown function of the component WPA/WPS. Executing a manipulation can lead to use of hard-coded cryptographic key . The attack can only be done within the local network. This attack is characteโ€ฆ

๐Ÿ“… Published: March 20, 2026, 7:02 a.m. ๐Ÿ”„ Last Modified: April 22, 2026, 9:32 p.m.
Total resulsts: 349182
Page 1021 of 34,919
ยซ previous page ยป next page
Filters