|
2661
|
6.3 |
MEDIUM
Network
|
-
|
-
|
In OpenStack Cyborg before 16.0.1, the Accelerator Request (ARQ) API does not enforce project ownership at any layer. The project_id column in the database is never populated (NULL for every ARQ), da…
|
CWE-282
Improper Ownership Management
|
CVE-2026-40214
|
2026-05-9 01:16 |
2026-05-8 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
2662
|
7.4 |
HIGH
Network
|
-
|
-
|
OpenStack Cyborg before 16.0.1 uses rule:allow (check_str='@') as the default policy for multiple API endpoints. This unconditionally authorizes any request carrying a valid Keystone token regardless…
|
CWE-863
Incorrect Authorization
|
CVE-2026-40213
|
2026-05-9 01:16 |
2026-05-8 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
2663
|
7.3 |
HIGH
Network
|
-
|
-
|
This vulnerability, in the MAXHUB Pivot client application versions
prior to v1.36.2, may allow an attacker to obtain encrypted tenant email
addresses and related metadata from any tenant. Due to t…
|
CWE-327
Use of a Broken or Risky Cryptographic Algorithm
|
CVE-2026-6411
|
2026-05-9 01:08 |
2026-05-8 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
2664
|
8.8 |
HIGH
Network
|
-
|
-
|
OpenLearnX is an open-source, decentralized learning and assessment platform. Prior to version 2.0.3, a remote code execution (RCE) vulnerability was identified in the OpenLearnX code execution envir…
|
CWE-78 CWE-94 CWE-250 CWE-284 CWE-693
OS Command Code Injection Execution with Unnecessary Privileges Improper Access Control Protection Mechanism Failure
|
CVE-2026-41900
|
2026-05-9 01:08 |
2026-05-8 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
2665
|
8.7 |
HIGH
Network
|
-
|
-
|
zrok is software for sharing web services, files, and network resources. Prior to version 2.0.2, the zrok WebDAV drive backend (davServer.Dir) restricts path traversal through lexical normalization b…
|
CWE-22 CWE-61
Path Traversal UNIX Symbolic Link (Symlink) Following
|
CVE-2026-42275
|
2026-05-9 01:08 |
2026-05-8 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
2666
|
6.1 |
MEDIUM
Network
|
-
|
-
|
In Thruk Monitoring through 2.46.3, the login field of the login form is vulnerable to reflected XSS. This vulnerability can be exploited by unauthenticated remote attackers to target users of the mo…
|
CWE-79
Cross-site Scripting
|
CVE-2022-23961
|
2026-05-9 01:08 |
2026-05-8 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
2667
|
- |
|
-
|
-
|
yeti-platform yeti before 2.1.12 allows attackers to generate valid JWT tokens is the secret is not changed (by setting YETI_AUTH_SECRET_KEY to a value other than SECRET).
|
-
|
CVE-2024-46508
|
2026-05-9 01:08 |
2026-05-8 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
2668
|
- |
|
-
|
-
|
LINQPad before 5.52.01 Pro edition is vulnerable to Unsafe Deserialization in LINQPad.AutoRefManager::PopulateFromCache(), leading to code execution.
|
-
|
CVE-2024-53326
|
2026-05-9 01:08 |
2026-05-8 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
2669
|
- |
|
-
|
-
|
Certain GL.iNet devices with 4.x firmware allow authentication bypass (resulting in administrative control of the device) via a username that is both a valid SQL statement and a valid regular express…
|
-
|
CVE-2023-46453
|
2026-05-9 01:08 |
2026-05-8 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
2670
|
6.5 |
MEDIUM
Network
|
-
|
-
|
Copilot said: i18nextify is a JavaScript library that adds
i18nextify is a JavaScript library that adds website internationalization via a script tag, without source code changes. Versions prior to 3…
|
CWE-22 CWE-74
Path Traversal Injection
|
CVE-2026-41691
|
2026-05-9 01:05 |
2026-05-8 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|