5.3

CVSS3.1

CVE-2026-25123 - Homarr affected by Unauthenticated SSRF / Port-Scan Primitive via widget.app.ping

Homarr is an open-source dashboard. Prior to 1.52.0, a public (unauthenticated) tRPC endpoint widget.app.ping accepts an arbitrary url and performs a server-side request to that URL. This allows an unauthenticated attacker to trigger outbound HTTP requests from the Homarr server, enabling SSRF behaโ€ฆ

๐Ÿ“… Published: Feb. 6, 2026, 9:19 p.m. ๐Ÿ”„ Last Modified: April 17, 2026, 10:30 p.m.

6.4

CVSS4.0

CVE-2026-25533 - Enclave has a sandbox escape via infinite recursion and error objects

Enclave is a secure JavaScript sandbox designed for safe AI agent code execution. Prior to 2.10.1, the existing layers of security in enclave-vm are insufficient: The AST sanitization can be bypassed with dynamic property accesses, the hardening of the error objects does not cover the peculiar behaโ€ฆ

๐Ÿ“… Published: Feb. 6, 2026, 9:16 p.m. ๐Ÿ”„ Last Modified: April 17, 2026, 10:30 p.m.

6.1

CVSS3.1

CVE-2026-25516 - NiceGUI's XSS vulnerability in ui.markdown() allows arbitrary JavaScript execution through unsanitiโ€ฆ

NiceGUI is a Python-based UI framework. The ui.markdown() component uses the markdown2 library to convert markdown content to HTML, which is then rendered via innerHTML. By default, markdown2 allows raw HTML to pass through unchanged. This means that if an application renders user-controlled contenโ€ฆ

๐Ÿ“… Published: Feb. 6, 2026, 9:12 p.m. ๐Ÿ”„ Last Modified: April 17, 2026, 10:30 p.m.

7.5

CVSS3.1

CVE-2026-25732 - NiceGUI's Path Traversal via Unsanitized FileUpload.name Enables Arbitrary File Write

NiceGUI is a Python-based UI framework. Prior to 3.7.0, NiceGUI's FileUpload.name property exposes client-supplied filename metadata without sanitization, enabling path traversal when developers use the pattern UPLOAD_DIR / file.name. Malicious filenames containing ../ sequences allow attackers to โ€ฆ

๐Ÿ“… Published: Feb. 6, 2026, 9:09 p.m. ๐Ÿ”„ Last Modified: April 17, 2026, 10:30 p.m.

9.8

CVSS3.1

CVE-2026-25544 - Payload has an SQL Injection in JSON/RichText Queries on PostgreSQL/SQLite Adapters

Payload is a free and open source headless content management system. Prior to 3.73.0, when querying JSON or richText fields, user input was directly embedded into SQL without escaping, enabling blind SQL injection attacks. An unauthenticated attacker could extract sensitive data (emails, password โ€ฆ

๐Ÿ“… Published: Feb. 6, 2026, 9:07 p.m. ๐Ÿ”„ Last Modified: April 17, 2026, 10:30 p.m.

5.4

CVSS3.1

CVE-2026-25574 - Payload Affected by Cross-Collection IDOR in payload-preferences Access Control (Multi-Auth Environโ€ฆ

Payload is a free and open source headless content management system. Prior to 3.74.0, a cross-collection Insecure Direct Object Reference (IDOR) vulnerability exists in the payload-preferences internal collection. In multi-auth collection environments using Postgres or SQLite with default serial/aโ€ฆ

๐Ÿ“… Published: Feb. 6, 2026, 9:04 p.m. ๐Ÿ”„ Last Modified: April 18, 2026, 1:30 p.m.

8.7

CVSS4.0

CVE-2026-2067 - UTT ่ฟ›ๅ– 520W formTimeGroupConfig strcpy buffer overflow

A security vulnerability has been detected in UTT ่ฟ›ๅ– 520W 1.7.7-180627. This vulnerability affects the function strcpy of the file /goform/formTimeGroupConfig. The manipulation of the argument year1 leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed publiโ€ฆ

๐Ÿ“… Published: Feb. 6, 2026, 9:02 p.m. ๐Ÿ”„ Last Modified: April 18, 2026, 6:30 p.m.

8.6

CVSS3.1

CVE-2026-25580 - Pydantic AI Affected by Server-Side Request Forgery (SSRF) in URL Download Handling

Pydantic AI is a Python agent framework for building applications and workflows with Generative AI. From 0.0.26 to before 1.56.0, aServer-Side Request Forgery (SSRF) vulnerability exists in Pydantic AI's URL download functionality. When applications accept message history from untrusted sources, atโ€ฆ

๐Ÿ“… Published: Feb. 6, 2026, 9:01 p.m. ๐Ÿ”„ Last Modified: April 17, 2026, 10:30 p.m.

5.4

CVSS3.1

CVE-2026-25581 - SCEditor affected by DOM XSS via emoticon URL/HTML injection

SCEditor is a lightweight WYSIWYG BBCode and XHTML editor. Prior to 3.2.1, if an attacker has the ability control configuration options passed to sceditor.create(), like emoticons, charset, etc. then it's possible for them to trigger an XSS attack due to lack of sanitisation of configuration optionโ€ฆ

๐Ÿ“… Published: Feb. 6, 2026, 8:58 p.m. ๐Ÿ”„ Last Modified: April 17, 2026, 10:30 p.m.

8.4

CVSS3.1

CVE-2026-25593 - OpenClaw Affected by Unauthenticated Local RCE via WebSocket config.apply

OpenClaw is a personal AI assistant. Prior to 2026.1.20, an unauthenticated local client could use the Gateway WebSocket API to write config via config.apply and set unsafe cliPath values that were later used for command discovery, enabling command injection as the gateway user. This vulnerability โ€ฆ

๐Ÿ“… Published: Feb. 6, 2026, 8:56 p.m. ๐Ÿ”„ Last Modified: April 17, 2026, 10:30 p.m.
Total resulsts: 345362
Page 1384 of 34,537
ยซ previous page ยป next page
Filters