|
421
|
- |
|
-
|
-
|
PDF Export Module used in DHTMLX's products Gantt and Scheduler is vulnerable to Remote Code Execution due to lack of "data" parameter sanitization. An unauthenticated attacker can inject the malicio…
New
|
CWE-78
OS Command
|
CVE-2026-41553
|
2026-05-15 23:12 |
2026-05-15 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
422
|
7.5 |
HIGH
Network
|
adobe
|
c2pa c2pa-web
|
CAI Content Credentials versions 0.78.2, 0.7.0 and earlier are affected by an Uncontrolled Resource Consumption vulnerability that could lead to application denial-of-service. An attacker could explo…
New
|
CWE-400
Uncontrolled Resource Consumption
|
CVE-2026-34665
|
2026-05-15 23:12 |
2026-05-13 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
423
|
3.1 |
LOW
Network
|
-
|
-
|
Due to improper input handling under certain conditions, SAP NetWeaver Application Server ABAP allows an attacker to inject custom Cascading Style Sheets (CSS) data into a web page served by the appl…
New
|
CWE-276
Incorrect Default Permissions
|
CVE-2026-27680
|
2026-05-15 23:11 |
2026-05-15 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
424
|
- |
|
-
|
-
|
Timing limitations of the HRNG in RS9116 when power save mode is enabled results in predictable values
New
|
CWE-332
Insufficient Entropy in PRNG
|
CVE-2026-3290
|
2026-05-15 23:11 |
2026-05-15 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
425
|
5.9 |
MEDIUM
Network
|
-
|
-
|
Stack exhaustion vulnerability in the MongoDB PHP driver can cause application crashes when processing deeply nested BSON documents in unusual circumstances when the source of these BSON documents is…
New
|
CWE-674
Uncontrolled Recursion
|
CVE-2026-6811
|
2026-05-15 23:11 |
2026-05-15 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
426
|
- |
|
-
|
-
|
Rapid7 Metasploit Pro is vulnerable to a local privilege escalation attack that allows users to gain SYSTEM level control of a Windows host. Upon startup the metasploitPostgreSQL service the subseque…
New
|
CWE-284 CWE-427 CWE-829
Improper Access Control Uncontrolled Search Path Element Inclusion of Functionality from Untrusted Control Sphere
|
CVE-2026-7373
|
2026-05-15 23:11 |
2026-05-15 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
427
|
7.8 |
HIGH
Local
|
-
|
-
|
VMware Fusion contains a TOCTOU (Time-of-check Time-of-use) vulnerability that occurs during an operation performed by a SETUID binary. A malicious actor with local non-administrative user privileges…
New
|
CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
|
CVE-2026-41702
|
2026-05-15 23:11 |
2026-05-15 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
428
|
- |
|
-
|
-
|
Improper input validation in Delphix Continuous Data connectors allows an authenticated user to execute arbitrary operating system commands on the staging or target host.
New
|
CWE-78
OS Command
|
CVE-2026-8654
|
2026-05-15 23:11 |
2026-05-15 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
429
|
8.8 |
HIGH
Network
|
-
|
-
|
Crabbox prior to v0.12.0 contains an authentication bypass vulnerability that allows non-admin shared-token callers to impersonate other owners or organizations by spoofing identity headers. Attacker…
New
|
CWE-287
Improper Authentication
|
CVE-2026-8621
|
2026-05-15 23:11 |
2026-05-15 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
430
|
8.1 |
HIGH
Network
|
-
|
-
|
Crabbox prior to v0.12.0 contains a privilege escalation vulnerability that allows users with shared visibility-only access to obtain Code, WebVNC, and Egress agent tickets by sending POST requests t…
New
|
CWE-639
Authorization Bypass Through User-Controlled Key
|
CVE-2026-8629
|
2026-05-15 23:11 |
2026-05-15 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|