Page 2 of 14383 results (0.012 seconds)

CVSS: 5.3EPSS: 0%CPEs: 2EXPL: 0

02 Apr 2026 — An unauthenticated remote attacker can access a configuration file containing database credentials. This can result in a some loss of confidentiality, but there is no endpoint exposed to use these credentials. • https://certvde.com/de/advisories/VDE-2026-030 • CWE-497: Exposure of Sensitive System Information to an Unauthorized Control Sphere •

CVSS: 8.4EPSS: 0%CPEs: 1EXPL: 0

01 Apr 2026 — Opening a crafted V7 file may lead to information disclosure from the affected product. • https://felib.fujielectric.co.jp/en/M10010/M20060/document_detail/5d9dd71d-9494-41a4-aa5c-8e6b8b21066b?region=en-glb • CWE-125: Out-of-bounds Read •

CVSS: 8.4EPSS: 0%CPEs: 1EXPL: 0

01 Apr 2026 — Opening a crafted V7 file may lead to information disclosure from the affected product. • https://felib.fujielectric.co.jp/en/M10010/M20060/document_detail/5d9dd71d-9494-41a4-aa5c-8e6b8b21066b?region=en-glb • CWE-125: Out-of-bounds Read •

CVSS: 8.4EPSS: 0%CPEs: 1EXPL: 0

01 Apr 2026 — Opening a crafted V7 file may lead to information disclosure from the affected product. • https://felib.fujielectric.co.jp/en/M10010/M20060/document_detail/5d9dd71d-9494-41a4-aa5c-8e6b8b21066b?region=en-glb • CWE-125: Out-of-bounds Read •

CVSS: 8.7EPSS: 0%CPEs: 1EXPL: 0

01 Apr 2026 — From version 3.4.0 to before version 3.4.8, sensitive information from heap memory may be leaked through the decoded pixel data (information disclosure). • https://github.com/AcademySoftwareFoundation/openexr/commit/5f6d0aaa9e43802917af7db90f181e88e083d3b8 • CWE-908: Use of Uninitialized Resource •

CVSS: 4.3EPSS: 0%CPEs: -EXPL: 0

01 Apr 2026 — Improper input validation in the gateway health check feature in Devolutions Server allows a low-privileged authenticated user to perform server-side request forgery (SSRF), potentially leading to information disclosure, via a crafted API request. This issue affects Server: from 2026.1.1 through 2026.1.11, from 2025.3.1 through 2025.3.17. • https://devolutions.net/security/advisories/DEVO-2026-0010 • CWE-918: Server-Side Request Forgery (SSRF) •

CVSS: 3.3EPSS: 0%CPEs: -EXPL: 0

01 Apr 2026 — This could potentially expose sensitive data if the memory location is re-used, leading to information disclosure. • https://access.redhat.com/security/cve/CVE-2026-35094 • CWE-825: Expired Pointer Dereference •

CVSS: 8.8EPSS: 0%CPEs: -EXPL: 0

01 Apr 2026 — A flaw was found in libinput. A local attacker who can place a specially crafted Lua bytecode file in certain system or user configuration directories can bypass security restrictions. This allows the attacker to run unauthorized code with the same permissions as the program using libinput, such as a graphical compositor. This could lead to the attacker monitoring keyboard input and sending that information to an external location. • https://access.redhat.com/security/cve/CVE-2026-35093 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 8.2EPSS: 0%CPEs: -EXPL: 0

01 Apr 2026 — A flaw was found in Corosync. A remote unauthenticated attacker can exploit a wrong return value vulnerability in the Corosync membership commit token sanity check by sending a specially crafted User Datagram Protocol (UDP) packet. This can lead to an out-of-bounds read, causing a denial of service (DoS) and potentially disclosing limited memory contents. This vulnerability affects Corosync when running in totemudp/totemudpu mode, which is the default configuration. • https://access.redhat.com/security/cve/CVE-2026-35091 • CWE-253: Incorrect Check of Function Return Value •

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 1

01 Apr 2026 — The Export All URLs WordPress plugin before 5.1 generates CSV filenames containing posts URLS (including private posts) in a predictable pattern using a random 6-digit number. These files are stored in the publicly accessible wp-content/uploads/ directory. As a result, any unauthenticated user can brute-force the filenames to gain access to sensitive data contained within the exported files. • https://wpscan.com/vulnerability/55d627c1-ad05-4cd1-ae7b-932d84c19313 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •