7.7

CVSS3.1

CVE-2026-31941 - Server-Side Request Forgery (SSRF) in Chamilo LMS

Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, Chamilo LMS contains a Server-Side Request Forgery (SSRF) vulnerability in the Social Wall feature. The endpoint read_url_with_open_graph accepts a URL from the user via the social_wall_new_msg_main POST parameter and perโ€ฆ

๐Ÿ“… Published: April 10, 2026, 5:37 p.m. ๐Ÿ”„ Last Modified: April 10, 2026, 6:33 p.m.

7.5

CVSS3.1

CVE-2026-31940 - Session Fixation in Chamilo LMS

Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, in main/lp/aicc_hacp.php, user-controlled request parameters are directly used to set the PHP session ID before loading global bootstrap. This leads to session fixation. This vulnerability is fixed in 1.11.38 and 2.0.0-RCโ€ฆ

๐Ÿ“… Published: April 10, 2026, 5:35 p.m. ๐Ÿ”„ Last Modified: April 10, 2026, 6:16 p.m.

8.3

CVSS3.1

CVE-2026-31939 - Path Traversal (Arbitrary File Delete) in Chamilo LMS

Chamilo LMS is a learning management system. Prior to 1.11.38, there is a path traversal in main/exercise/savescores.php leading to arbitrary file feletion. User input from $_REQUEST['test'] is concatenated directly into filesystem path without canonicalization or traversal checks. This vulnerabiliโ€ฆ

๐Ÿ“… Published: April 10, 2026, 5:32 p.m. ๐Ÿ”„ Last Modified: April 10, 2026, 6:16 p.m.

0

CVSS3.1

CVE-2025-66447 - Chamilo LMS has validation-less redirect on login page

Chamilo LMS is a learning management system. From 1.11.0 to 2.0-beta.1, anyone can trigger a malicious redirect through the use of the redirect parameter to /login. This vulnerability is fixed in 2.0-beta.2.

๐Ÿ“… Published: April 10, 2026, 5:22 p.m. ๐Ÿ”„ Last Modified: April 10, 2026, 6:16 p.m.

8.5

CVSS3.1

CVE-2026-5483 - Odh-dashboard: odh dashboard kubernetes service account exposure

A flaw was found in odh-dashboard in Red Hat Openshift AI. This vulnerability in the `odh-dashboard` component of Red Hat OpenShift AI (RHOAI) allows for the disclosure of Kubernetes Service Account tokens through a NodeJS endpoint. This could enable an attacker to gain unauthorized access to Kuberโ€ฆ

๐Ÿ“… Published: April 10, 2026, 5:16 p.m. ๐Ÿ”„ Last Modified: April 10, 2026, 9:16 p.m.

8.2

CVSS3.1

CVE-2026-40163 - Saltcorn has an Unauthenticated Path Traversal in sync endpoints allows arbitrary file write and diโ€ฆ

Saltcorn is an extensible, open source, no-code database application builder. Prior to 1.4.5, 1.5.5, and 1.6.0-beta.4, the POST /sync/offline_changes endpoint allows an unauthenticated attacker to create arbitrary directories and write a changes.json file with attacker-controlled JSON content anywhโ€ฆ

๐Ÿ“… Published: April 10, 2026, 5:07 p.m. ๐Ÿ”„ Last Modified: April 10, 2026, 6:16 p.m.

7.1

CVSS3.1

CVE-2026-40162 - Bugsink affected by authenticated arbitrary file write in artifactbundle/assemble

Bugsink is a self-hosted error tracking tool. In 2.1.0, an authenticated file write vulnerability was identified in Bugsink 2.1.0 in the artifact bundle assembly flow. A user with a valid authentication token could cause the application to write attacker-controlled content to a filesystem location โ€ฆ

๐Ÿ“… Published: April 10, 2026, 5:02 p.m. ๐Ÿ”„ Last Modified: April 10, 2026, 6:30 p.m.

0.0

CVE-2026-22560 -

An open redirect vulnerability in Rocket.Chat versions prior to 8.4.0 allows users to be redirected to arbitrary URLs by manipulating parameters within a SAML endpoint.

๐Ÿ“… Published: April 10, 2026, 5 p.m. ๐Ÿ”„ Last Modified: April 10, 2026, 5:17 p.m.

7.1

CVSS4.0

CVE-2026-40160 - PraisonAIAgents has SSRF via unvalidated URL in `web_crawl` httpx fallback

PraisonAIAgents is a multi-agent teams system. Prior to 1.5.128, web_crawl's httpx fallback path passes user-supplied URLs directly to httpx.AsyncClient.get() with follow_redirects=True and no host validation. An LLM agent tricked into crawling an internal URL can reach cloud metadata endpoints (16โ€ฆ

๐Ÿ“… Published: April 10, 2026, 4:59 p.m. ๐Ÿ”„ Last Modified: April 10, 2026, 5:17 p.m.

5.5

CVSS3.1

CVE-2026-40159 - PraisonAI Exposes Sensitive Environment Variable via Untrusted MCP Subprocess Execution

PraisonAI is a multi-agent teams system. Prior to 4.5.128, PraisonAIโ€™s MCP (Model Context Protocol) integration allows spawning background servers via stdio using user-supplied command strings (e.g., MCP("npx -y @smithery/cli ...")). These commands are executed through Pythonโ€™s subprocess module. Bโ€ฆ

๐Ÿ“… Published: April 10, 2026, 4:57 p.m. ๐Ÿ”„ Last Modified: April 10, 2026, 5:17 p.m.
Total resulsts: 343932
Page 10 of 34,394
ยซ previous page ยป next page
Filters