6.5

CVSS3.1

CVE-2026-40491 - gdown Affected by Arbitrary File Write via Path Traversal in gdown.extractall

gdown is a Google Drive public file/folder downloader. Versions prior to 5.2.2 are vulnerable to a Path Traversal attack within the extractall functionality. When extracting a maliciously crafted ZIP or TAR archive, the library fails to sanitize or validate the filenames of the archive members. Thiโ€ฆ

๐Ÿ“… Published: April 18, 2026, 1:36 a.m. ๐Ÿ”„ Last Modified: May 1, 2026, 6:24 p.m.

6.8

CVSS3.1

CVE-2026-40490 - AsyncHttpClient leaks authorization credentials to untrusted domains on cross-origin redirects

The AsyncHttpClient (AHC) library allows Java applications to easily execute HTTP requests and asynchronously process HTTP responses. When redirect following is enabled (followRedirect(true)), versions of AsyncHttpClient prior to 3.0.9 and 2.14.5 forward Authorization and Proxy-Authorization headerโ€ฆ

๐Ÿ“… Published: April 18, 2026, 1:31 a.m. ๐Ÿ”„ Last Modified: April 22, 2026, 3:45 a.m.

6.4

CVSS3.1

CVE-2026-1559 - Youzify <= 1.3.6 - Authenticated (Subscriber+) Stored Cross-Site Scripting via 'checkin_place_id' Pโ€ฆ

The Youzify plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'checkin_place_id' parameter in all versions up to, and including, 1.3.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Subscriber-level accessโ€ฆ

๐Ÿ“… Published: April 18, 2026, 1:26 a.m. ๐Ÿ”„ Last Modified: April 22, 2026, 8:22 p.m.

6.1

CVSS3.1

CVE-2026-1838 - Hostel <= 1.1.6 - Reflected Cross-Site Scripting via 'shortcode_id' Parameter

The Hostel plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'shortcode_id' parameter in all versions up to, and including, 1.1.6 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripโ€ฆ

๐Ÿ“… Published: April 18, 2026, 1:26 a.m. ๐Ÿ”„ Last Modified: April 22, 2026, 8:22 p.m.

8.6

CVSS4.0

CVE-2026-40489 - editorconfig-core-c has incomplete fix for CVE-2023-0341

editorconfig-core-c is an EditorConfig core library for use by plugins supporting EditorConfig parsing. Versions up to and including 0.12.10 have a stack-based buffer overflow in ec_glob() that allows an attacker to crash any application using libeditorconfig by providing a specially crafted direcโ€ฆ

๐Ÿ“… Published: April 18, 2026, 1:24 a.m. ๐Ÿ”„ Last Modified: April 20, 2026, 6:59 p.m.

8.9

CVSS3.1

CVE-2026-40487 - Postiz Has Unrestricted File Upload via MIME Type Spoofing that Leads to Stored XSS

Postiz is an AI social media scheduling tool. Prior to version 2.21.6, a file upload validation bypass allows any authenticated user to upload arbitrary HTML, SVG, or other executable file types to the server by spoofing the `Content-Type` header. The uploaded files are then served by nginx with a โ€ฆ

๐Ÿ“… Published: April 18, 2026, 1:19 a.m. ๐Ÿ”„ Last Modified: April 23, 2026, 3:27 p.m.

8.8

CVSS3.1

CVE-2026-35582 - Emissary has an OS Command Injection via Unvalidated IN_FILE_ENDING / OUT_FILE_ENDING in Executrix

Emissary is a P2P based data-driven workflow engine. In versions 8.42.0 and below, Executrix.getCommand() is vulnerable to OS command injection because it interpolates temporary file paths into a /bin/sh -c shell command string without any escaping or input validation. The IN_FILE_ENDING and OUT_Fโ€ฆ

๐Ÿ“… Published: April 18, 2026, 1:16 a.m. ๐Ÿ”„ Last Modified: April 24, 2026, 4:48 p.m.

7.5

CVSS3.1

CVE-2026-35465 - SecureDrop Client has path injection in read_gzip_header_filename()

SecureDrop Client is a desktop app for journalists to securely communicate with sources and handle submissions on the SecureDrop Workstation. In versions 0.17.4 and below, a compromised SecureDrop Server can achieve code execution on the Client's virtual machine (sd-app) by exploiting improper fileโ€ฆ

๐Ÿ“… Published: April 18, 2026, 12:41 a.m. ๐Ÿ”„ Last Modified: April 23, 2026, 6:31 p.m.

9

CVSS3.1

CVE-2026-40572 - NovumOS has Arbitrary Memory Mapping via Syscall 15 (MemoryMapRange)

NovumOS is a custom 32-bit operating system written in Zig and x86 Assembly. In versions prior to 0.24, Syscall 15 (MemoryMapRange) allows Ring 3 user-mode processes to map arbitrary virtual address ranges into their address space without validating against forbidden regions, including critical kerโ€ฆ

๐Ÿ“… Published: April 18, 2026, 12:16 a.m. ๐Ÿ”„ Last Modified: April 27, 2026, 2:13 p.m.

9.4

CVSS3.1

CVE-2026-40317 - NovumOS has Privilege Escalation in the Syscall Interface

NovumOS is a custom 32-bit operating system written in Zig and x86 Assembly. In versions prior to 0.24, Syscall 12 (JumpToUser) accepts an arbitrary entry point address from user-space registers without validation, allowing any Ring 3 user-mode process to jump to kernel addresses and execute arbitrโ€ฆ

๐Ÿ“… Published: April 18, 2026, 12:12 a.m. ๐Ÿ”„ Last Modified: April 27, 2026, 2:05 p.m.
Total resulsts: 349182
Page 402 of 34,919
ยซ previous page ยป next page
Filters