8.7

CVSS4.0

CVE-2026-35391 - Bulwark Webmail getClientIP() trusted client-controlled X-Forwarded-For value, enabling rate limit โ€ฆ

Bulwark Webmail is a self-hosted webmail client for Stalwart Mail Server. Prior to 1.4.11, the getClientIP() function in lib/admin/session.ts trusted the first (leftmost) entry of the X-Forwarded-For header, which is fully controlled by the client. An attacker could forge their source IP address toโ€ฆ

๐Ÿ“… Published: April 6, 2026, 8:17 p.m. ๐Ÿ”„ Last Modified: April 10, 2026, 9:45 a.m.

5.3

CVSS4.0

CVE-2026-35390 - Content-Security-Policy was set to Report-Only mode, failing to block XSS attacks

Bulwark Webmail is a self-hosted webmail client for Stalwart Mail Server. Prior to 1.4.11, the reverse proxy (proxy.ts) set the Content-Security-Policy-Report-Only header instead of the enforcing Content-Security-Policy header. This means cross-site scripting (XSS) attacks were logged but not blockโ€ฆ

๐Ÿ“… Published: April 6, 2026, 8:13 p.m. ๐Ÿ”„ Last Modified: April 9, 2026, 8:49 p.m.

8.7

CVSS4.0

CVE-2026-35389 - Bulwark Webmail S/MIME signature verification accepted self-signed certificates

Bulwark Webmail is a self-hosted webmail client for Stalwart Mail Server. Prior to 1.4.11, S/MIME signature verification did not validate the certificate trust chain (checkChain: false). Any email signed with a self-signed or untrusted certificate was displayed as having a valid signature. This vulโ€ฆ

๐Ÿ“… Published: April 6, 2026, 8:11 p.m. ๐Ÿ”„ Last Modified: April 10, 2026, 9:45 a.m.

8.7

CVSS4.0

CVE-2026-35213 - Regular Expression Denial of Service (ReDoS) in @hapi/content HTTP header parsing

@hapi/content provided HTTP Content-* headers parsing. All versions of @hapi/content through 6.0.0 are vulnerable to Regular Expression Denial of Service (ReDoS) via crafted HTTP header values. Three regular expressions used to parse Content-Type and Content-Disposition headers contain patterns susโ€ฆ

๐Ÿ“… Published: April 6, 2026, 8:08 p.m. ๐Ÿ”„ Last Modified: April 16, 2026, 4:26 a.m.

5.3

CVSS4.0

CVE-2026-35208 - lichess.org has an Unsanitized Stream Title Injection on /streamer

lichess.org is the forever free, adless and open source chess server. Any approved streamer can inject arbitrary HTML into /streamer and the homepage โ€œLive streamsโ€ widget by placing markup in their Twitch/YouTube stream title. CSP is present and blocks inline script execution, but the issue is stiโ€ฆ

๐Ÿ“… Published: April 6, 2026, 8:06 p.m. ๐Ÿ”„ Last Modified: April 16, 2026, 4:23 a.m.

7.5

CVSS3.1

CVE-2026-35203 - ZLMediaKit VP9 RTP Parser Out-of-Bounds Read

ZLMediaKit is a streaming media service framework. the VP9 RTP payload parser in ext-codec/VP9Rtp.cpp reads multiple fields from the RTP payload based on flag bits in the first byte, without verifying that sufficient data exists in the buffer. A crafted VP9 RTP packet with a 1-byte payload (0xFF, aโ€ฆ

๐Ÿ“… Published: April 6, 2026, 7:54 p.m. ๐Ÿ”„ Last Modified: April 16, 2026, 4:21 a.m.

5.9

CVSS3.1

CVE-2026-35201 - Discount has an Out-of-bounds Read in rdiscount

Discount is an implementation of John Gruber's Markdown markup language in C. From 1.3.1.1 to before 2.2.7.4, a signed length truncation bug causes an out-of-bounds read in the default Markdown parse path. Inputs larger than INT_MAX are truncated to a signed int before entering the native parser, aโ€ฆ

๐Ÿ“… Published: April 6, 2026, 7:49 p.m. ๐Ÿ”„ Last Modified: April 16, 2026, 4:20 a.m.

2.1

CVSS4.0

CVE-2026-35200 - Parse Server has a file upload Content-Type override via extension mismatch

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 8.6.73 and 9.7.1-alpha.4, a file can be uploaded with a filename extension that passes the file extension allowlist (e.g., .txt) but with a Content-Type header that differs from the exteโ€ฆ

๐Ÿ“… Published: April 6, 2026, 7:47 p.m. ๐Ÿ”„ Last Modified: April 8, 2026, 7:50 p.m.

6.3

CVSS4.0

CVE-2026-5682 - Meesho Online Shopping App com.meesho.supply endpoint risky encryption

A vulnerability has been found in Meesho Online Shopping App up to 27.3 on Android. Affected is an unknown function of the file /api/endpoint of the component com.meesho.supply. Such manipulation leads to risky cryptographic algorithm. The attack may be performed from remote. The attack requires a โ€ฆ

๐Ÿ“… Published: April 6, 2026, 7:45 p.m. ๐Ÿ”„ Last Modified: April 7, 2026, 1:37 p.m.

6.1

CVSS3.1

CVE-2026-35199 - SymCrypt SymCryptXmssSign function - Heap overflow via 64->32-bit leaf-count truncation

SymCrypt is the core cryptographic function library currently used by Windows. From 103.5.0 to before 103.11.0, The SymCryptXmssSign function passes a 64-bit leaf count value to a helper function that accepts a 32-bit parameter. For XMSS^MT parameter sets with total tree height >= 32 (which includeโ€ฆ

๐Ÿ“… Published: April 6, 2026, 7:44 p.m. ๐Ÿ”„ Last Modified: April 16, 2026, 4:16 a.m.
Total resulsts: 345359
Page 277 of 34,536
ยซ previous page ยป next page
Filters