0.0

CVE-2025-71302 - drm/panthor: fix for dma-fence safe access rules

In the Linux kernel, the following vulnerability has been resolved: drm/panthor: fix for dma-fence safe access rules Commit 506aa8b02a8d6 ("dma-fence: Add safe access helpers and document the rules") details the dma-fence safe access rules. The most common culprit is that drm_sched_fence_get_timeโ€ฆ

๐Ÿ“… Published: May 8, 2026, 1:26 p.m. ๐Ÿ”„ Last Modified: May 8, 2026, 1:26 p.m.

8.4

CVSS3.1

CVE-2026-44334 - PraisonAI: Unauthenticated RCE via `tool_override.py`

PraisonAI is a multi-agent teams system. From version 4.5.139 to before version 4.6.32, CVE-2026-40287's fix gated tools.py auto-import behind PRAISONAI_ALLOW_LOCAL_TOOLS=true in two files (tool_resolver.py, api/call.py). A third import sink in praisonai/templates/tool_override.py was missed and reโ€ฆ

๐Ÿ“… Published: May 8, 2026, 1:25 p.m. ๐Ÿ”„ Last Modified: May 8, 2026, 1:25 p.m.

9.8

CVSS3.1

CVE-2026-41497 - Incomplete fix for CVE-2026-34935: Command Injection in MervinPraison/PraisonAI

PraisonAI is a multi-agent teams system. Prior to version 4.6.9, the fix for PraisonAI's MCP command handling does not add a command allowlist or argument validation to parse_mcp_command(), allowing arbitrary executables like bash, python, or /bin/sh with inline code execution flags to pass throughโ€ฆ

๐Ÿ“… Published: May 8, 2026, 1:23 p.m. ๐Ÿ”„ Last Modified: May 8, 2026, 3:53 p.m.

8.1

CVSS3.1

CVE-2026-41496 - PraisonAI: SQL Injection via unvalidated `table_prefix` in 9 conversation store backends (incompletโ€ฆ

PraisonAI is a multi-agent teams system. Prior to praisonai version 4.6.9 and praisonaiagents version 1.6.9, the fix for CVE-2026-40315 added input validation to SQLiteConversationStore only. Nine sibling backends โ€” MySQL, PostgreSQL, async SQLite/MySQL/PostgreSQL, Turso, SingleStore, Supabase, Surโ€ฆ

๐Ÿ“… Published: May 8, 2026, 1:19 p.m. ๐Ÿ”„ Last Modified: May 8, 2026, 1:19 p.m.

9.2

CVSS4.0

CVE-2026-44126 - Insecure deserialization

SEPPmail Secure Email Gateway before version 15.0.4 insecurely deserializes untrusted data, which can be reached from the new GINA UI and may allow unauthenticated remote attackers to execute code via a crafted serialized object.

๐Ÿ“… Published: May 8, 2026, 1:15 p.m. ๐Ÿ”„ Last Modified: May 8, 2026, 2:16 p.m.

0.0

CVE-2025-71301 - drm/tests: shmem: Hold reservation lock around vmap/vunmap

In the Linux kernel, the following vulnerability has been resolved: drm/tests: shmem: Hold reservation lock around vmap/vunmap Acquire and release the GEM object's reservation lock around vmap and vunmap operations. The tests use vmap_locked, which led to errors such as show below. [ 122.292030โ€ฆ

๐Ÿ“… Published: May 8, 2026, 1:15 p.m. ๐Ÿ”„ Last Modified: May 8, 2026, 3:45 p.m.

0.0

CVE-2025-71300 - Revert "arm64: zynqmp: Add an OP-TEE node to the device tree"

In the Linux kernel, the following vulnerability has been resolved: Revert "arm64: zynqmp: Add an OP-TEE node to the device tree" This reverts commit 06d22ed6b6635b17551f386b50bb5aaff9b75fbe. OP-TEE logic in U-Boot automatically injects a reserved-memory node along with optee firmware node to keโ€ฆ

๐Ÿ“… Published: May 8, 2026, 1:15 p.m. ๐Ÿ”„ Last Modified: May 8, 2026, 1:15 p.m.

9.3

CVSS4.0

CVE-2026-44125 - Missing Authorization in GINAv2

SEPPmail Secure Email Gateway before version 15.0.4 fails to enforce authorization checks for multiple endpoints in the new GINA UI, allowing unauthenticated remote attackers to access functionality that should require a valid session.

๐Ÿ“… Published: May 8, 2026, 1:15 p.m. ๐Ÿ”„ Last Modified: May 8, 2026, 1:15 p.m.

8.3

CVSS4.0

CVE-2026-44129 - Server-side template injection

SEPPmail Secure Email Gateway before version 15.0.4 contains a server-side template injection vulnerability in the new GINA UI because an endpointย accepts attacker-controlled template, allowing remote attackers to execute arbitrary template expressions and potentially achieve remote code execution โ€ฆ

๐Ÿ“… Published: May 8, 2026, 1:14 p.m. ๐Ÿ”„ Last Modified: May 8, 2026, 1:14 p.m.

6.9

CVSS4.0

CVE-2026-41493 - yard: Possible arbitrary path traversal and file access via yard server

YARD is a Ruby Documentation tool. Prior to version 0.9.42, a path traversal vulnerability was discovered in YARD when using yard server to serve documentation. This bug would allow unsanitized HTTP requests to access arbitrary files on the machine of a yard server host under certain conditions. Thโ€ฆ

๐Ÿ“… Published: May 8, 2026, 1:13 p.m. ๐Ÿ”„ Last Modified: May 8, 2026, 1:13 p.m.
Total resulsts: 349182
Page 21 of 34,919
ยซ previous page ยป next page
Filters