8.3

CVSS3.1

CVE-2026-31939 - Path Traversal (Arbitrary File Delete) in Chamilo LMS

Chamilo LMS is a learning management system. Prior to 1.11.38, there is a path traversal in main/exercise/savescores.php leading to arbitrary file feletion. User input from $_REQUEST['test'] is concatenated directly into filesystem path without canonicalization or traversal checks. This vulnerabili…

📅 Published: April 10, 2026, 5:32 p.m. 🔄 Last Modified: April 10, 2026, 6:16 p.m.

0

CVSS3.1

CVE-2025-66447 - Chamilo LMS has validation-less redirect on login page

Chamilo LMS is a learning management system. From 1.11.0 to 2.0-beta.1, anyone can trigger a malicious redirect through the use of the redirect parameter to /login. This vulnerability is fixed in 2.0-beta.2.

📅 Published: April 10, 2026, 5:22 p.m. 🔄 Last Modified: April 10, 2026, 6:16 p.m.

8.5

CVSS3.1

CVE-2026-5483 - Odh-dashboard: odh dashboard kubernetes service account exposure

A flaw was found in odh-dashboard in Red Hat Openshift AI. This vulnerability in the `odh-dashboard` component of Red Hat OpenShift AI (RHOAI) allows for the disclosure of Kubernetes Service Account tokens through a NodeJS endpoint. This could enable an attacker to gain unauthorized access to Kuber…

📅 Published: April 10, 2026, 5:16 p.m. 🔄 Last Modified: April 10, 2026, 9:16 p.m.

8.2

CVSS3.1

CVE-2026-40163 - Saltcorn has an Unauthenticated Path Traversal in sync endpoints allows arbitrary file write and di…

Saltcorn is an extensible, open source, no-code database application builder. Prior to 1.4.5, 1.5.5, and 1.6.0-beta.4, the POST /sync/offline_changes endpoint allows an unauthenticated attacker to create arbitrary directories and write a changes.json file with attacker-controlled JSON content anywh…

📅 Published: April 10, 2026, 5:07 p.m. 🔄 Last Modified: April 10, 2026, 6:16 p.m.

7.1

CVSS3.1

CVE-2026-40162 - Bugsink affected by authenticated arbitrary file write in artifactbundle/assemble

Bugsink is a self-hosted error tracking tool. In 2.1.0, an authenticated file write vulnerability was identified in Bugsink 2.1.0 in the artifact bundle assembly flow. A user with a valid authentication token could cause the application to write attacker-controlled content to a filesystem location …

📅 Published: April 10, 2026, 5:02 p.m. 🔄 Last Modified: April 10, 2026, 6:30 p.m.

0.0

CVE-2026-22560 -

An open redirect vulnerability in Rocket.Chat versions prior to 8.4.0 allows users to be redirected to arbitrary URLs by manipulating parameters within a SAML endpoint.

📅 Published: April 10, 2026, 5 p.m. 🔄 Last Modified: April 10, 2026, 5:17 p.m.

7.1

CVSS4.0

CVE-2026-40160 - PraisonAIAgents has SSRF via unvalidated URL in `web_crawl` httpx fallback

PraisonAIAgents is a multi-agent teams system. Prior to 1.5.128, web_crawl's httpx fallback path passes user-supplied URLs directly to httpx.AsyncClient.get() with follow_redirects=True and no host validation. An LLM agent tricked into crawling an internal URL can reach cloud metadata endpoints (16…

📅 Published: April 10, 2026, 4:59 p.m. 🔄 Last Modified: April 10, 2026, 5:17 p.m.

5.5

CVSS3.1

CVE-2026-40159 - PraisonAI Exposes Sensitive Environment Variable via Untrusted MCP Subprocess Execution

PraisonAI is a multi-agent teams system. Prior to 4.5.128, PraisonAI’s MCP (Model Context Protocol) integration allows spawning background servers via stdio using user-supplied command strings (e.g., MCP("npx -y @smithery/cli ...")). These commands are executed through Python’s subprocess module. B…

📅 Published: April 10, 2026, 4:57 p.m. 🔄 Last Modified: April 10, 2026, 5:17 p.m.

8.6

CVSS3.1

CVE-2026-40158 - PraisonAI has Improper Control of Generation of Code ('Code Injection') and Protection Mechanism Fa…

PraisonAI is a multi-agent teams system. Prior to 4.5.128, PraisonAI's AST-based Python sandbox can be bypassed using type.__getattribute__ trampoline, allowing arbitrary code execution when running untrusted agent code. The _execute_code_direct function in praisonaiagents/tools/python_tools.py use…

📅 Published: April 10, 2026, 4:49 p.m. 🔄 Last Modified: April 10, 2026, 6:31 p.m.

9.4

CVSS4.0

CVE-2026-40157 - PraisonAI affected by arbitrary file write via path traversal in `praisonai recipe unpack`

PraisonAI is a multi-agent teams system. Prior to 4.5.128, cmd_unpack in the recipe CLI extracts .praison tar archives using raw tar.extract() without validating archive member paths. A .praison bundle containing ../../ entries will write files outside the intended output directory. An attacker who…

📅 Published: April 10, 2026, 4:47 p.m. 🔄 Last Modified: April 10, 2026, 5:17 p.m.
Total resulsts: 343970
Page 14 of 34,397
« previous page » next page
Filters