5.4

CVSS3.1

CVE-2026-32893 - Chamilo LMS has Reflected XSS via Unsanitized http_build_query() in Exercise Question List Paginati…

Chamilo LMS is a learning management system. Prior to 2.0.0-RC.3, a Reflected Cross-Site Scripting (XSS) vulnerability in the exercise question list admin panel allows an attacker to execute arbitrary JavaScript in an authenticated teacher's browser. The pagination code merges all $_GET parameters …

πŸ“… Published: April 10, 2026, 5:42 p.m. πŸ”„ Last Modified: April 10, 2026, 6:16 p.m.

7.7

CVSS3.1

CVE-2026-31941 - Server-Side Request Forgery (SSRF) in Chamilo LMS

Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, Chamilo LMS contains a Server-Side Request Forgery (SSRF) vulnerability in the Social Wall feature. The endpoint read_url_with_open_graph accepts a URL from the user via the social_wall_new_msg_main POST parameter and per…

πŸ“… Published: April 10, 2026, 5:37 p.m. πŸ”„ Last Modified: April 10, 2026, 6:33 p.m.

7.5

CVSS3.1

CVE-2026-31940 - Session Fixation in Chamilo LMS

Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, in main/lp/aicc_hacp.php, user-controlled request parameters are directly used to set the PHP session ID before loading global bootstrap. This leads to session fixation. This vulnerability is fixed in 1.11.38 and 2.0.0-RC…

πŸ“… Published: April 10, 2026, 5:35 p.m. πŸ”„ Last Modified: April 10, 2026, 6:16 p.m.

8.3

CVSS3.1

CVE-2026-31939 - Path Traversal (Arbitrary File Delete) in Chamilo LMS

Chamilo LMS is a learning management system. Prior to 1.11.38, there is a path traversal in main/exercise/savescores.php leading to arbitrary file feletion. User input from $_REQUEST['test'] is concatenated directly into filesystem path without canonicalization or traversal checks. This vulnerabili…

πŸ“… Published: April 10, 2026, 5:32 p.m. πŸ”„ Last Modified: April 10, 2026, 6:16 p.m.

0

CVSS3.1

CVE-2025-66447 - Chamilo LMS has validation-less redirect on login page

Chamilo LMS is a learning management system. From 1.11.0 to 2.0-beta.1, anyone can trigger a malicious redirect through the use of the redirect parameter to /login. This vulnerability is fixed in 2.0-beta.2.

πŸ“… Published: April 10, 2026, 5:22 p.m. πŸ”„ Last Modified: April 10, 2026, 6:16 p.m.

8.5

CVSS3.1

CVE-2026-5483 - Odh-dashboard: odh dashboard kubernetes service account exposure

A flaw was found in odh-dashboard in Red Hat Openshift AI. This vulnerability in the `odh-dashboard` component of Red Hat OpenShift AI (RHOAI) allows for the disclosure of Kubernetes Service Account tokens through a NodeJS endpoint. This could enable an attacker to gain unauthorized access to Kuber…

πŸ“… Published: April 10, 2026, 5:16 p.m. πŸ”„ Last Modified: April 10, 2026, 9:16 p.m.

8.2

CVSS3.1

CVE-2026-40163 - Saltcorn has an Unauthenticated Path Traversal in sync endpoints allows arbitrary file write and di…

Saltcorn is an extensible, open source, no-code database application builder. Prior to 1.4.5, 1.5.5, and 1.6.0-beta.4, the POST /sync/offline_changes endpoint allows an unauthenticated attacker to create arbitrary directories and write a changes.json file with attacker-controlled JSON content anywh…

πŸ“… Published: April 10, 2026, 5:07 p.m. πŸ”„ Last Modified: April 10, 2026, 6:16 p.m.

7.1

CVSS3.1

CVE-2026-40162 - Bugsink affected by authenticated arbitrary file write in artifactbundle/assemble

Bugsink is a self-hosted error tracking tool. In 2.1.0, an authenticated file write vulnerability was identified in Bugsink 2.1.0 in the artifact bundle assembly flow. A user with a valid authentication token could cause the application to write attacker-controlled content to a filesystem location …

πŸ“… Published: April 10, 2026, 5:02 p.m. πŸ”„ Last Modified: April 10, 2026, 6:30 p.m.

0.0

CVE-2026-22560 -

An open redirect vulnerability in Rocket.Chat versions prior to 8.4.0 allows users to be redirected to arbitrary URLs by manipulating parameters within a SAML endpoint.

πŸ“… Published: April 10, 2026, 5 p.m. πŸ”„ Last Modified: April 10, 2026, 5:17 p.m.

7.1

CVSS4.0

CVE-2026-40160 - PraisonAIAgents has SSRF via unvalidated URL in `web_crawl` httpx fallback

PraisonAIAgents is a multi-agent teams system. Prior to 1.5.128, web_crawl's httpx fallback path passes user-supplied URLs directly to httpx.AsyncClient.get() with follow_redirects=True and no host validation. An LLM agent tricked into crawling an internal URL can reach cloud metadata endpoints (16…

πŸ“… Published: April 10, 2026, 4:59 p.m. πŸ”„ Last Modified: April 10, 2026, 5:17 p.m.
Total resulsts: 343923
Page 9 of 34,393
Β« previous page Β» next page
Filters