7.5

CVSS3.1

CVE-2026-32597 - PyJWT accepts unknown `crit` header extensions (RFC 7515 §4.1.11 MUST violation)

PyJWT is a JSON Web Token implementation in Python. Prior to 2.12.0, PyJWT does not validate the crit (Critical) Header Parameter defined in RFC 7515 §4.1.11. When a JWS token contains a crit array listing extensions that PyJWT does not understand, the library accepts the token instead of rejecting…

📅 Published: March 12, 2026, 9:41 p.m. 🔄 Last Modified: May 5, 2026, 6:16 p.m.

5.3

CVSS3.1

CVE-2026-32322 - soroban-sdk: `Fr` scalar field equality comparison bypasses modular reduction

soroban-sdk is a Rust SDK for Soroban contracts. Prior to 22.0.11, 23.5.3, and 25.3.0, The Fr (scalar field) types for BN254 and BLS12-381 in soroban-sdk compared values using their raw U256 representation without first reducing modulo the field modulus r. This caused mathematically equal field ele…

📅 Published: March 12, 2026, 9:39 p.m. 🔄 Last Modified: March 23, 2026, 10 a.m.

6.5

CVSS3.1

CVE-2026-32320 - Ella Core: AMF DoS via malformed PathSwitchRequest with empty NR security capability bitstrings

Ella Core is a 5G core designed for private networks. Prior to 1.5.1, Ella Core panics when processing a PathSwitchRequest containing UE Security Capabilities with zero-length NR encryption or integrity protection algorithm bitstrings, resulting in a denial of service. An attacker able to send craf…

📅 Published: March 12, 2026, 9:34 p.m. 🔄 Last Modified: March 23, 2026, 10 a.m.

7.5

CVSS3.1

CVE-2026-32319 - Ella Core: Unauthenticated AMF DoS via malformed InitialUEMessage with undersized integrity-protect…

Ella Core is a 5G core designed for private networks. Prior to 1.5.1, Ella Core panics when processing a malformed integrity protected NGAP/NAS message with a length under 7 bytes. An attacker able to send crafted NAS messages to Ella Core can crash the process, causing service disruption for all c…

📅 Published: March 12, 2026, 9:33 p.m. 🔄 Last Modified: March 23, 2026, 10 a.m.

6.9

CVSS4.0

CVE-2026-32598 - OneUptime: Password Reset Token Logged at INFO Level

OneUptime is a solution for monitoring and managing online services. Prior to 10.0.24, the password reset flow logs the complete password reset URL — containing the plaintext reset token — at INFO log level, which is enabled by default in production. Anyone with access to application logs (log aggr…

📅 Published: March 12, 2026, 9:31 p.m. 🔄 Last Modified: March 23, 2026, 10 a.m.

7.6

CVSS3.1

CVE-2026-32308 - OneUptime: Stored XSS via Mermaid Diagram Rendering (securityLevel: "loose")

OneUptime is a solution for monitoring and managing online services. Prior to 10.0.23, the Markdown viewer component renders Mermaid diagrams with securityLevel: "loose" and injects the SVG output via innerHTML. This configuration explicitly allows interactive event bindings in Mermaid diagrams, en…

📅 Published: March 12, 2026, 9:29 p.m. 🔄 Last Modified: March 23, 2026, 10 a.m.

10

CVSS3.1

CVE-2026-32306 - OneUptime ClickHouse SQL Injection via Aggregate Query Parameters

OneUptime is a solution for monitoring and managing online services. Prior to 10.0.23, the telemetry aggregation API accepts user-controlled aggregationType, aggregateColumnName, and aggregationTimestampColumnName parameters and interpolates them directly into ClickHouse SQL queries via the .append…

📅 Published: March 12, 2026, 9:27 p.m. 🔄 Last Modified: March 23, 2026, 10 a.m.

9.8

CVSS3.1

CVE-2026-32304 - Locutus: RCE via unsanitized input in create_function()

Locutus brings stdlibs of other programming languages to JavaScript for educational purposes. Prior to 3.0.14, the create_function(args, code) function passes both parameters directly to the Function constructor without any sanitization, allowing arbitrary code execution. This is distinct from CVE-…

📅 Published: March 12, 2026, 9:24 p.m. 🔄 Last Modified: March 23, 2026, 10 a.m.

8.1

CVSS3.1

CVE-2026-32302 - OpenClaw: Untrusted web origins can obtain authenticated operator.admin access in trusted-proxy mode

OpenClaw is a personal AI assistant. Prior to 2026.3.11, browser-originated WebSocket connections could bypass origin validation when gateway.auth.mode was set to trusted-proxy and the request arrived with proxy headers. A page served from an untrusted origin could connect through a trusted reverse…

📅 Published: March 12, 2026, 9:22 p.m. 🔄 Last Modified: March 25, 2026, 11:50 a.m.

9.3

CVSS3.1

CVE-2026-32301 - Centrifugo: SSRF via unverified JWT claims interpolated into dynamic JWKS endpoint URL

Centrifugo is an open-source scalable real-time messaging server. Prior to 6.7.0, Centrifugo is vulnerable to Server-Side Request Forgery (SSRF) when configured with a dynamic JWKS endpoint URL using template variables (e.g. {{tenant}}). An unauthenticated attacker can craft a JWT with a malicious …

📅 Published: March 12, 2026, 9:19 p.m. 🔄 Last Modified: March 23, 2026, 10 a.m.
Total resulsts: 349182
Page 1146 of 34,919
« previous page » next page
Filters