Common Vulnerabilities and Exposures (CVE)

CVE-2026-28728

Apr 3, 2026 03:55:46 UTC

Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis True Image (Windows) before build 42902.

CVE-2026-35386

Apr 3, 2026 03:55:45 UTC

In OpenSSH before 10.3, command execution can occur via shell metacharacters in a username within a command line. This requires a scenario where the username on the command line is untrusted, and also requires a non-default configurations o...

CVE-2026-35385

Apr 3, 2026 03:55:44 UTC

In OpenSSH before 10.3, a file downloaded by scp may be installed setuid or setgid, an outcome contrary to some users' expectations, if the download is performed as root with -O (legacy scp protocol) and without -p (preserve mode).

CVE-2026-34797

Apr 3, 2026 03:55:42 UTC

Endian Firewall version 3.3.25 and prior allow authenticated users to execute arbitrary OS commands via the DATE parameter to /cgi-bin/logs_smtp.cgi. The DATE parameter value is used to construct a file path that is passed to a Perl open() ...

CVE-2026-34795

Apr 3, 2026 03:55:39 UTC

Endian Firewall version 3.3.25 and prior allow authenticated users to execute arbitrary OS commands via the DATE parameter to /cgi-bin/logs_log.cgi. The DATE parameter value is used to construct a file path that is passed to a Perl open() c...

CVE-2026-34794

Apr 3, 2026 03:55:38 UTC

Endian Firewall version 3.3.25 and prior allow authenticated users to execute arbitrary OS commands via the DATE parameter to /cgi-bin/logs_ids.cgi. The DATE parameter value is used to construct a file path that is passed to a Perl open() c...

CVE-2026-34793

Apr 3, 2026 03:55:36 UTC

Endian Firewall version 3.3.25 and prior allow authenticated users to execute arbitrary OS commands via the DATE parameter to /cgi-bin/logs_firewall.cgi. The DATE parameter value is used to construct a file path that is passed to a Perl ope...

CVE-2026-34792

Apr 3, 2026 03:55:35 UTC

Endian Firewall version 3.3.25 and prior allow authenticated users to execute arbitrary OS commands via the DATE parameter to /cgi-bin/logs_clamav.cgi. The DATE parameter value is used to construct a file path that is passed to a Perl open(...

CVE-2026-34791

Apr 3, 2026 03:55:34 UTC

Endian Firewall version 3.3.25 and prior allow authenticated users to execute arbitrary OS commands via the DATE parameter to /cgi-bin/logs_proxy.cgi. The DATE parameter value is used to construct a file path that is passed to a Perl open()...

CVE-2026-3987

Apr 3, 2026 03:55:30 UTC

A path traversal vulnerability in the Fireware OS Web UI on WatchGuard Firebox systems may allow a privileged authenticated remote attacker to execute arbitrary code in the context of an elevated system process.This issue affects Fireware O...

CVE-2026-2737

Apr 3, 2026 03:55:29 UTC

A vulnerability exists in Progress Flowmon versions prior to 12.5.8 and 13.0.6, whereby an administrator who clicks a malicious link provided by an attacker may inadvertently trigger unintended actions within their authenticated web session...

CVE-2026-3692

Apr 3, 2026 03:55:27 UTC

In Progress Flowmon versions prior to 12.5.8, a vulnerability exists whereby an authenticated low-privileged user may craft a request during the report generation process that results in unintended commands being executed on the server.

CVE-2026-2701

Apr 3, 2026 03:55:26 UTC

Authenticated user can upload a malicious file to the server and execute it, which leads to remote code execution.

CVE-2026-2699

Apr 3, 2026 03:55:24 UTC

Customer Managed ShareFile Storage Zones Controller (SZC) allows an unauthenticated attacker to access restricted configuration pages. This leads to changing system configuration and potential remote code execution.

CVE-2026-3502

Apr 3, 2026 03:55:23 UTC

TrueConf Client downloads application update code and applies it without performing verification. An attacker who is able to influence the update delivery path can substitute a tampered update payload. If the payload is executed or installe...