7.2

CVSS4.0

CVE-2026-1078 - An arbitrary file-write vulnerability in Pega Browser Extension (PBE) affects Pega Robotic Automati…

An arbitrary file-write vulnerability in Pega Browser Extension (PBE) affects Pega Robotic Automation version 22.1 or R25 users who are running automations that work with Google Chrome or Microsoft Edge. A bad actor could create a website that includes malicious code. The vulnerability could occur …

📅 Published: April 7, 2026, 3:04 p.m. 🔄 Last Modified: April 8, 2026, 9:27 p.m.

6.5

CVSS3.1

CVE-2026-35492 - Kedro-Datasets has a path traversal vulnerability in PartitionedDataset allows arbitrary file write

Kedro-Datasets is a Kendo plugin providing data connectors. Prior to 9.3.0, PartitionedDataset in kedro-datasets was vulnerable to path traversal. Partition IDs were concatenated directly with the dataset base path without validation. An attacker or malicious input containing .. components in a par…

📅 Published: April 7, 2026, 3:03 p.m. 🔄 Last Modified: April 16, 2026, 2:45 p.m.

6.1

CVSS3.1

CVE-2026-35491 - Pi-hole FTL: CLI API sessions can import Teleporter archives and modify configuration

FTLDNS (pihole-FTL) provides an interactive API and also generates statistics for Pi-hole's Web interface. From 6.0 to before 6.6, Pi-hole FTL supports a CLI password feature (webserver.api.cli_pw) that creates “CLI” API sessions intended to be read-only for configuration changes. While /api/config…

📅 Published: April 7, 2026, 3 p.m. 🔄 Last Modified: April 17, 2026, 7:47 p.m.

3.5

CVSS3.1

CVE-2026-33551 - openstack-keystone: OpenStack Keystone: Privilege escalation through EC2 credential creation

An issue was discovered in OpenStack Keystone 14 through 26 before 26.1.1, 27.0.0, 28.0.0, and 29.0.0. Restricted application credentials can create EC2 credentials. By using a restricted application credential to call the EC2 credential creation API, an authenticated user with only a reader role m…

📅 Published: April 7, 2026, 3 p.m. 🔄 Last Modified: April 14, 2026, 4:36 p.m.

9.8

CVSS3.1

CVE-2026-35490 - changedetection.io has an Authentication Bypass via Decorator Ordering

changedetection.io is a free open source web page change detection tool. Prior to 0.54.8, the @login_optionally_required decorator is placed before (outer to) @blueprint.route() instead of after it. In Flask, @route() must be the outermost decorator because it registers the function it receives. Wh…

📅 Published: April 7, 2026, 2:55 p.m. 🔄 Last Modified: April 15, 2026, 4:30 p.m.

7.3

CVSS3.1

CVE-2026-35489 - Tandoor Recipes — `amount`/`unit` bypass serializer in `food/{id}/shopping/`

Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. Prior to 2.6.4, the POST /api/food/{id}/shopping/ endpoint reads amount and unit directly from request.data and passes them without validation to ShoppingListEntry.objects.create(). Invalid amount v…

📅 Published: April 7, 2026, 2:53 p.m. 🔄 Last Modified: April 14, 2026, 8:13 p.m.

8.1

CVSS3.1

CVE-2026-35488 - Tandoor Recipes — CustomIsShared permits DELETE/PUT on RecipeBook by shared (read-only) users

Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. Prior to 2.6.4, RecipeBookViewSet and RecipeBookEntryViewSet use CustomIsShared as an alternative permission class, but CustomIsShared.has_object_permission() returns True for all HTTP methods — inc…

📅 Published: April 7, 2026, 2:51 p.m. 🔄 Last Modified: April 17, 2026, 7:46 p.m.

5.3

CVSS3.1

CVE-2026-35487 - text-generation-webui has a Path Traversal in load_prompt() — .txt file read without authentication

text-generation-webui is an open-source web interface for running Large Language Models. Prior to 4.3, an unauthenticated path traversal vulnerability in load_prompt() allows reading any .txt file on the server filesystem. The file content is returned verbatim in the API response. This vulnerabilit…

📅 Published: April 7, 2026, 2:50 p.m. 🔄 Last Modified: April 10, 2026, 9:41 a.m.

7.5

CVSS3.1

CVE-2026-35486 - text-generation-webui has a SSRF in superbooga/superboogav2 extensions — no URL validation

text-generation-webui is an open-source web interface for running Large Language Models. Prior to 4.3, he superbooga and superboogav2 RAG extensions fetch user-supplied URLs via requests.get() with zero validation — no scheme check, no IP filtering, no hostname allowlist. An attacker can access clo…

📅 Published: April 7, 2026, 2:49 p.m. 🔄 Last Modified: April 10, 2026, 9:41 a.m.

7.5

CVSS3.1

CVE-2026-35485 - text-generation-webui has a Path Traversal in load_grammar() — arbitrary file read without authenti…

text-generation-webui is an open-source web interface for running Large Language Models. Prior to 4.3, an unauthenticated path traversal vulnerability in load_grammar() allows reading any file on the server filesystem with no extension restriction. Gradio does not server-side validate dropdown valu…

📅 Published: April 7, 2026, 2:47 p.m. 🔄 Last Modified: April 28, 2026, 8:41 p.m.
Total resulsts: 349182
Page 635 of 34,919
« previous page » next page
Filters