|
2011
|
5.0 |
MEDIUM
Network
|
sillytavern
|
sillytavern
|
SillyTavern is a locally installed user interface that allows users to interact with text generation large language models, image generation engines, and text-to-speech voice models. Prior to version…
|
CWE-918
Server-Side Request Forgery (SSRF)
|
CVE-2026-34526
|
2026-04-14 03:39 |
2026-04-3 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
2012
|
6.5 |
MEDIUM
Network
|
python-poetry
|
poetry
|
Poetry is a dependency manager for Python. From version 1.4.0 to before version 2.3.3, a crafted wheel can contain ../ paths that Poetry writes to disk without containment checks, allowing arbitrary …
|
CWE-22
Path Traversal
|
CVE-2026-34591
|
2026-04-14 03:38 |
2026-04-3 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
2013
|
6.8 |
MEDIUM
Physics
|
samsung
|
android
|
Improper check for exceptional conditions in Device Care prior to SMR Apr-2026 Release 1 allows physical attackers to bypass Knox Guard.
|
CWE-754
Improper Check for Unusual or Exceptional Conditions
|
CVE-2026-21007
|
2026-04-14 03:38 |
2026-04-13 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
2014
|
2.4 |
LOW
Physics
|
samsung
|
android
|
Improper access control in Samsung DeX prior to SMR Apr-2026 Release 1 allows physical attackers to access to hidden notification contents.
|
NVD-CWE-noinfo
|
CVE-2026-21006
|
2026-04-14 03:38 |
2026-04-13 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
2015
|
6.5 |
MEDIUM
Adjacent
|
samsung
|
android
|
Exposure of sensitive information in S Share prior to SMR Apr-2026 Release 1 allows adjacent attacker to access sensitive information.
|
NVD-CWE-noinfo
|
CVE-2026-21008
|
2026-04-14 03:38 |
2026-04-13 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
2016
|
7.5 |
HIGH
Network
|
ash-hq
|
ash_framework
|
Ash Framework is a declarative, extensible framework for building Elixir applications. Prior to version 3.22.0, Ash.Type.Module.cast_input/2 unconditionally creates a new Erlang atom via Module.conca…
|
CWE-400 CWE-770
Uncontrolled Resource Consumption Allocation of Resources Without Limits or Throttling
|
CVE-2026-34593
|
2026-04-14 03:37 |
2026-04-3 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
2017
|
5.3 |
MEDIUM
Network
|
sillytavern
|
sillytavern
|
SillyTavern is a locally installed user interface that allows users to interact with text generation large language models, image generation engines, and text-to-speech voice models. Prior to version…
|
CWE-22
Path Traversal
|
CVE-2026-34523
|
2026-04-14 03:35 |
2026-04-3 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
2018
|
8.1 |
HIGH
Network
|
sillytavern
|
sillytavern
|
SillyTavern is a locally installed user interface that allows users to interact with text generation large language models, image generation engines, and text-to-speech voice models. Prior to version…
|
CWE-22 CWE-73
Path Traversal External Control of File Name or Path
|
CVE-2026-34522
|
2026-04-14 03:34 |
2026-04-3 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
2019
|
9.8 |
CRITICAL
Network
|
microsoft
|
bing
|
Server-side request forgery (ssrf) in Microsoft Bing allows an unauthorized attacker to elevate privileges over a network.
|
CWE-918
Server-Side Request Forgery (SSRF)
|
CVE-2026-32186
|
2026-04-14 03:32 |
2026-04-4 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
2020
|
9.8 |
CRITICAL
Network
|
cloudreve
|
cloudreve
|
Cloudreve is a self-hosted file management and sharing system. Prior to version 4.13.0, the application uses the weak pseudo-random number generator math/rand seeded with time.Now().UnixNano() to gen…
|
CWE-338
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)
|
CVE-2026-25726
|
2026-04-14 03:31 |
2026-04-4 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|