|
1561
|
- |
|
-
|
-
|
LINQPad before 5.52.01 Pro edition is vulnerable to Unsafe Deserialization in LINQPad.AutoRefManager::PopulateFromCache(), leading to code execution.
|
-
|
CVE-2024-53326
|
2026-05-9 01:08 |
2026-05-8 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
1562
|
- |
|
-
|
-
|
Certain GL.iNet devices with 4.x firmware allow authentication bypass (resulting in administrative control of the device) via a username that is both a valid SQL statement and a valid regular express…
|
-
|
CVE-2023-46453
|
2026-05-9 01:08 |
2026-05-8 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
1563
|
- |
|
-
|
-
|
An issue in fohrloop dash-uploader v.0.1.0 through v.0.7.0a2 allows a remote attacker to execute arbitrary code via the dash_uploader/httprequesthandler.py, dash_uploader/upload.py in the Upload func…
|
-
|
CVE-2026-38361
|
2026-05-9 01:08 |
2026-05-9 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
1564
|
6.5 |
MEDIUM
Network
|
-
|
-
|
Password Pusher is an open source application to communicate sensitive information over the web. Prior to versions 1.69.3 and 2.4.2, a security issue in OSS PasswordPusher allowed unauthenticated cre…
|
CWE-288
Authentication Bypass Using an Alternate Path or Channel
|
CVE-2026-41308
|
2026-05-9 01:08 |
2026-05-9 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
1565
|
- |
|
-
|
-
|
Langfuse is an open source large language model engineering platform. From version 3.68.0 to before version 3.167.0, there is a role-based-access control flaw in the LLM connection update flow. An a…
|
CWE-284
Improper Access Control
|
CVE-2026-41487
|
2026-05-9 01:08 |
2026-05-9 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
1566
|
6.1 |
MEDIUM
Network
|
-
|
-
|
In th30d4y/IP from version 1.0.1 to before version 2.0.1, a DOM-Based Cross-Site Scripting (XSS) vulnerability was identified in an IP Reputation Checker application. Unsanitized user input was direc…
|
CWE-79 CWE-80
Cross-site Scripting Basic XSS
|
CVE-2026-41575
|
2026-05-9 01:08 |
2026-05-9 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
1567
|
9.0 |
CRITICAL
Network
|
-
|
-
|
RELATE is a web-based courseware package. Prior to commit 2f68e16, there is a timing attack vulnerability in course/auth.py — check_sign_in_key(). This issue has been patched via commit 2f68e16.
|
CWE-208
Information Exposure Through Timing Discrepancy
|
CVE-2026-41588
|
2026-05-9 01:08 |
2026-05-9 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
1568
|
6.5 |
MEDIUM
Network
|
-
|
-
|
Copilot said: i18nextify is a JavaScript library that adds
i18nextify is a JavaScript library that adds website internationalization via a script tag, without source code changes. Versions prior to 3…
|
CWE-22 CWE-74
Path Traversal Injection
|
CVE-2026-41691
|
2026-05-9 01:05 |
2026-05-8 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
1569
|
4.7 |
MEDIUM
Network
|
-
|
-
|
i18nextify is a JavaScript library that adds website internationalization via a script tag, without source code changes. Versions prior to 4.0.8 substitute {{key}} interpolation tokens inside src and…
|
CWE-79 CWE-94
Cross-site Scripting Code Injection
|
CVE-2026-41692
|
2026-05-9 01:05 |
2026-05-8 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
1570
|
- |
|
-
|
-
|
SOPlanning 1.52.00 is vulnerable to Cross Site Scripting (XSS) via the groupe_id parameter to process/groupe_save.php.
|
-
|
CVE-2024-33724
|
2026-05-9 01:04 |
2026-05-8 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|