8.8

CVSS3.1

CVE-2026-35610 - PolarLearn has a Server Action Admin Bypass in Account Management Actions

PolarLearn is a free and open-source learning program. In 0-PRERELEASE-14 and earlier, setCustomPassword(userId, password) and deleteUser(userId) in the account-management module used an inverted admin check. Because of the inverted condition, authenticated non-admin users were allowed to execute …

πŸ“… Published: April 7, 2026, 4:56 p.m. πŸ”„ Last Modified: April 16, 2026, 6:04 p.m.

7.5

CVSS3.1

CVE-2026-39312 - Pre-Auth EAP-TLS DoS on SoftEther VPN Developer Edition

SoftEtherVPN is a an open-source cross-platform multi-protocol VPN Program. In 5.2.5188 and earlier, a pre-authentication denial-of-service vulnerability exists in SoftEther VPN Developer Edition 5.2.5188 (and likely earlier versions of Developer Edition). An unauthenticated remote attacker can cra…

πŸ“… Published: April 7, 2026, 4:52 p.m. πŸ”„ Last Modified: April 15, 2026, 4:30 p.m.

9.4

CVSS4.0

CVE-2026-23696 - Windmill < 1.603.3 File Ownership Handling SQLi RCE

Windmill CE and EE versions 1.276.0 through 1.603.2 contain an SQL injection vulnerability in the folder ownership management functionality that allows authenticated attackers to inject SQL through the owner parameter. An attacker can use the injection to read sensitive data such as the JWT signing…

πŸ“… Published: April 7, 2026, 4:50 p.m. πŸ”„ Last Modified: April 8, 2026, 9:27 p.m.

8.7

CVSS4.0

CVE-2026-22683 - Windmill < 1.615.0 Operator Role Missing Authorization Checks RCE

Windmill versions 1.56.0 through 1.614.0 contain a missing authorization vulnerability that allows users with the Operator role to perform prohibited entity creation and modification actions via the backend API. Although Operators are documented and priced as unable to create or modify entities, th…

πŸ“… Published: April 7, 2026, 4:50 p.m. πŸ”„ Last Modified: April 24, 2026, 4:49 p.m.

8.1

CVSS3.1

CVE-2026-39307 - PraisonAI has an Arbitrary File Write (Zip Slip) in Templates Extraction

PraisonAI is a multi-agent teams system. Prior to 1.5.113, The PraisonAI templates installation feature is vulnerable to a "Zip Slip" Arbitrary File Write attack. When downloading and extracting template archives from external sources (e.g., GitHub), the application uses Python's zipfile.extractall…

πŸ“… Published: April 7, 2026, 4:49 p.m. πŸ”„ Last Modified: April 16, 2026, 1:18 a.m.

7.1

CVSS3.1

CVE-2026-39308 - PraisonAI recipe registry publish path traversal allows out-of-root file write

PraisonAI is a multi-agent teams system. Prior to 1.5.113, PraisonAI's recipe registry publish endpoint writes uploaded recipe bundles to a filesystem path derived from the bundle's internal manifest.json before it verifies that the manifest name and version match the HTTP route. A malicious publis…

πŸ“… Published: April 7, 2026, 4:48 p.m. πŸ”„ Last Modified: April 16, 2026, 1:15 a.m.

7.3

CVSS3.1

CVE-2026-39306 - PraisonAI recipe registry pull path traversal writes files outside the chosen output directory

PraisonAI is a multi-agent teams system. Prior to 1.5.113, PraisonAI's recipe registry pull flow extracts attacker-controlled .praison tar archives with tar.extractall() and does not validate archive member paths before extraction. A malicious publisher can upload a recipe bundle that contains ../ …

πŸ“… Published: April 7, 2026, 4:48 p.m. πŸ”„ Last Modified: April 16, 2026, 1:23 a.m.

9

CVSS3.1

CVE-2026-39305 - Arbitrary File Write / Path Traversal in Action Orchestrator

PraisonAI is a multi-agent teams system. Prior to 1.5.113, the Action Orchestrator feature contains a Path Traversal vulnerability that allows an attacker (or compromised agent) to write to arbitrary files outside of the configured workspace directory. By supplying relative path segments (../) in t…

πŸ“… Published: April 7, 2026, 4:47 p.m. πŸ”„ Last Modified: April 16, 2026, 1:27 a.m.

9.2

CVSS4.0

CVE-2026-35615 - PraisonAI has a Path Traversal in FileTools

PraisonAI is a multi-agent teams system. Prior to 1.5.113, _validate_path() calls os.path.normpath() first, which collapses .. sequences, then checks for '..' in normalized. Since .. is already collapsed, the check always passes. This makes the check completely useless and allows trivial path trave…

πŸ“… Published: April 7, 2026, 4:46 p.m. πŸ”„ Last Modified: April 16, 2026, 1:34 a.m.

6.5

CVSS3.1

CVE-2026-32588 - Apache Cassandra: Authenticated DoS via ALTER ROLE Password Hashing

Authenticated DoS over CQL in Apache Cassandra 4.0, 4.1, 5.0 allows authenticated user to raise query latencies via repeated password changes. Users are recommended to upgrade to version 4.0.20, 4.1.11, 5.0.7, which fixes this issue.

πŸ“… Published: April 7, 2026, 4:42 p.m. πŸ”„ Last Modified: April 15, 2026, 3:45 p.m.
Total resulsts: 349182
Page 630 of 34,919
Β« previous page Β» next page
Filters