63334 results (0.250 seconds)

CVSS: 7.3EPSS: %CPEs: -EXPL: 0

03 Apr 2026 — An attacker may execute arbitrary code with SYSTEM privileges if a user is tricked or directed to place a crafted file into the vulnerable directory. • https://cwe.mitre.org/data/definitions/276.html • CWE-276: Incorrect Default Permissions •

CVSS: 8.5EPSS: %CPEs: 1EXPL: 0

02 Apr 2026 — HiSecOS web server versions 05.0.00 to 08.3.01 prior to 08.3.02 contains a privilege escalation vulnerability that allows authenticated users with operator or auditor roles to escalate privileges to the administrator role by sending specially crafted packets to the web server. Attackers can exploit this flaw to gain full administrative access to the affected device. • https://assets.belden.com/m/774e2db2b0100bc1/original/Belden-Security-Bulletin-BSECV-2023-06.pdf • CWE-269: Improper Privilege Management •

CVSS: 9.9EPSS: %CPEs: 3EXPL: 0

02 Apr 2026 — By injecting a serialized FileCookieJar object into a setting string, an authenticated attacker can achieve Arbitrary File Write, leading directly to Remote Code Execution (RCE) on the server. • https://github.com/Intermesh/groupoffice/releases/tag/v25.0.90 • CWE-502: Deserialization of Untrusted Data •

CVSS: 9.2EPSS: %CPEs: 1EXPL: 0

02 Apr 2026 — Prior to version 10.0.42, the Worker service's ManualAPI exposes workflow execution endpoints (GET /workflow/manual/run/:workflowId and POST /workflow/manual/run/:workflowId) without any authentication middleware. An attacker who can obtain or guess a workflow ID can trigger arbitrary workflow execution with attacker-controlled input data, enabling JavaScript code execution, notification abuse, and data manipulation. • https://github.com/OneUptime/oneuptime/releases/tag/10.0.42 • CWE-306: Missing Authentication for Critical Function •

CVSS: 8.7EPSS: %CPEs: 1EXPL: 0

02 Apr 2026 — The file is stored on the public disk and is directly accessible via URL, allowing server-side code execution. • https://github.com/HytaleModding/wiki/security/advisories/GHSA-2xqq-6778-h4j9 • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 8.2EPSS: %CPEs: 1EXPL: 0

02 Apr 2026 — In the web UI this allows script execution in another user's browser; in the Electron desktop app this can escalate to local code execution because Electron is configured with nodeIntegration: true and contextIsolation: false. • https://github.com/dbgate/dbgate/commit/a7d2ed11f3f3d4dfb5d2e4e5467dedafa5fa947e • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 7.1EPSS: %CPEs: 1EXPL: 0

02 Apr 2026 — ./ paths that Poetry writes to disk without containment checks, allowing arbitrary file write with the privileges of the Poetry process. ... (Normally, installing a malicious wheel is not sufficient for execution of malicious code. Malicious code will only be executed after installation if the malicious package is imported or invoked by the user.). • http://github.com/python-poetry/poetry/commit/ed59537ac3709cfbdbf95d957de801c13872991a • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 9.3EPSS: %CPEs: 1EXPL: 0

02 Apr 2026 — Agno versions prior to 2.3.24 contain an arbitrary code execution vulnerability in the model execution component that allows attackers to execute arbitrary Python code by manipulating the field_type parameter passed to eval(). Attackers can influence the field_type value in a FunctionCall to achieve remote code execution. • https://www.vulncheck.com/advisories/agno-field-type-eval-injection-arbitrary-code-execution • CWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') •

CVSS: 8.8EPSS: %CPEs: 1EXPL: 0

02 Apr 2026 — An authenticated attacker with access to the Aggiornamenti module can execute arbitrary SQL statements including CREATE, DROP, ALTER, INSERT, UPDATE, DELETE, SELECT INTO OUTFILE, and any other SQL command supported by the MySQL server. Foreign key checks are explicitly disabled before execution (SET FOREIGN_KEY_CHECKS=0), further reducing database integrity protections. • https://github.com/devcode-it/openstamanager/commit/43970676bcd6636ff8663652fd82579f737abb74 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 7.2EPSS: %CPEs: 1EXPL: 0

02 Apr 2026 — OpenSTAManager is an open source management software for technical assistance and invoicing. Prior to version 2.10.2, the oauth2.php file in OpenSTAManager is an unauthenticated endpoint ($skip_permissions = true). It loads a record from the zz_oauth2 table using the attacker-controlled GET parameter state, and during the OAuth2 configuration flow calls unserialize() on the access_token field without any class restriction. This issue has been patched in version 2.10.2. • https://github.com/devcode-it/openstamanager/commit/d2e38cbdf91a831cefc0da1548e02b297ae644cc • CWE-502: Deserialization of Untrusted Data •