CVE-2026-8136 - SourceCodester Pharmacy Sales and Inventory System index.php users cross site scripting
CVE ID :CVE-2026-8136
Published : May 8, 2026, 3:45 a.m. | 32 minutes ago
Description :A flaw has been found in SourceCodester Pharmacy Sales and Inventory System 1.0. This affects an unknown part of the file /index.php?page=users. Executing a manipulation of the argument Name can lead to cross site scripting. The attack may be launched remotely. The exploit has been published and may be used.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID :CVE-2026-8136
Published : May 8, 2026, 3:45 a.m. | 32 minutes ago
Description :A flaw has been found in SourceCodester Pharmacy Sales and Inventory System 1.0. This affects an unknown part of the file /index.php?page=users. Executing a manipulation of the argument Name can lead to cross site scripting. The attack may be launched remotely. The exploit has been published and may be used.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-42275 - zrok: WebDAV drive backend follows symlinks outside DriveRoot, enabling host filesystem read/write
CVE ID :CVE-2026-42275
Published : May 8, 2026, 3:45 a.m. | 31 minutes ago
Description :zrok is software for sharing web services, files, and network resources. Prior to version 2.0.2, the zrok WebDAV drive backend (davServer.Dir) restricts path traversal through lexical normalization but does not prevent symlink following. When a symbolic link inside the shared DriveRoot points to a location outside that root, remote WebDAV consumers can read files and—on shares without OS-level permission restrictions—write or overwrite files anywhere on the host filesystem accessible to the zrok process. This issue has been patched in version 2.0.2.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID :CVE-2026-42275
Published : May 8, 2026, 3:45 a.m. | 31 minutes ago
Description :zrok is software for sharing web services, files, and network resources. Prior to version 2.0.2, the zrok WebDAV drive backend (davServer.Dir) restricts path traversal through lexical normalization but does not prevent symlink following. When a symbolic link inside the shared DriveRoot points to a location outside that root, remote WebDAV consumers can read files and—on shares without OS-level permission restrictions—write or overwrite files anywhere on the host filesystem accessible to the zrok process. This issue has been patched in version 2.0.2.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2024-30167 - Atlona AT-OME-MS42 Remote Command Execution Vulnerability
CVE ID :CVE-2024-30167
Published : May 8, 2026, 6:16 a.m. | 2 hours, 4 minutes ago
Description :/cgi-bin/time.cgi in Atlona AT-OME-MS42 Matrix Switcher 1.1.2 allow remote authenticated users to execute arbitrary commands as root via a POST request that carries a serverName parameter.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID :CVE-2024-30167
Published : May 8, 2026, 6:16 a.m. | 2 hours, 4 minutes ago
Description :/cgi-bin/time.cgi in Atlona AT-OME-MS42 Matrix Switcher 1.1.2 allow remote authenticated users to execute arbitrary commands as root via a POST request that carries a serverName parameter.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2024-33288 - "PHP Prison Management System SQL Injection"
CVE ID :CVE-2024-33288
Published : May 8, 2026, 6:16 a.m. | 2 hours, 4 minutes ago
Description :Prison Management System Using PHP v1.0 was discovered to contain a SQL injection vulnerability via the username on the Admin login page.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID :CVE-2024-33288
Published : May 8, 2026, 6:16 a.m. | 2 hours, 4 minutes ago
Description :Prison Management System Using PHP v1.0 was discovered to contain a SQL injection vulnerability via the username on the Admin login page.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2024-33722 - SOPlanning SQL Injection
CVE ID :CVE-2024-33722
Published : May 8, 2026, 6:16 a.m. | 2 hours, 4 minutes ago
Description :SOPlanning 1.52.00 is vulnerable to SQL Injection by an authenticated user via projets.php with statut[].
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID :CVE-2024-33722
Published : May 8, 2026, 6:16 a.m. | 2 hours, 4 minutes ago
Description :SOPlanning 1.52.00 is vulnerable to SQL Injection by an authenticated user via projets.php with statut[].
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2024-33724 - SOPlanning Cross Site Scripting (XSS)
CVE ID :CVE-2024-33724
Published : May 8, 2026, 6:16 a.m. | 2 hours, 4 minutes ago
Description :SOPlanning 1.52.00 is vulnerable to Cross Site Scripting (XSS) via the groupe_id parameter to process/groupe_save.php.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID :CVE-2024-33724
Published : May 8, 2026, 6:16 a.m. | 2 hours, 4 minutes ago
Description :SOPlanning 1.52.00 is vulnerable to Cross Site Scripting (XSS) via the groupe_id parameter to process/groupe_save.php.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2024-45257 - BYOB Command Injection Vulnerability
CVE ID :CVE-2024-45257
Published : May 8, 2026, 6:16 a.m. | 2 hours, 4 minutes ago
Description :A Command Injection issue in the payload build page in BYOB (Build Your Own Botnet) 2.0 allows attackers to execute arbitrary commands on the server via a crafted build parameter. This occurs in freeze in core/generators.py.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID :CVE-2024-45257
Published : May 8, 2026, 6:16 a.m. | 2 hours, 4 minutes ago
Description :A Command Injection issue in the payload build page in BYOB (Build Your Own Botnet) 2.0 allows attackers to execute arbitrary commands on the server via a crafted build parameter. This occurs in freeze in core/generators.py.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2024-46507 - Yeti-Platform SSTI Code Execution
CVE ID :CVE-2024-46507
Published : May 8, 2026, 6:16 a.m. | 2 hours, 4 minutes ago
Description :A SSTI (server side template injection) vulnerability in the custom template export function in yeti-platform yeti before 2.1.12 allows attackers to execute code on the application server.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID :CVE-2024-46507
Published : May 8, 2026, 6:16 a.m. | 2 hours, 4 minutes ago
Description :A SSTI (server side template injection) vulnerability in the custom template export function in yeti-platform yeti before 2.1.12 allows attackers to execute code on the application server.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2024-46508 - Yeti-Platform JWT Token Forgery Vulnerability
CVE ID :CVE-2024-46508
Published : May 8, 2026, 6:16 a.m. | 2 hours, 4 minutes ago
Description :yeti-platform yeti before 2.1.12 allows attackers to generate valid JWT tokens is the secret is not changed (by setting YETI_AUTH_SECRET_KEY to a value other than SECRET).
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID :CVE-2024-46508
Published : May 8, 2026, 6:16 a.m. | 2 hours, 4 minutes ago
Description :yeti-platform yeti before 2.1.12 allows attackers to generate valid JWT tokens is the secret is not changed (by setting YETI_AUTH_SECRET_KEY to a value other than SECRET).
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2024-51092 - LibreNMS OS Command Injection Vulnerability
CVE ID :CVE-2024-51092
Published : May 8, 2026, 6:16 a.m. | 2 hours, 4 minutes ago
Description :LibreNMS before 24.10.0 allows a remote attacker to execute arbitrary code via OS command injection involving AboutController.php's index(), SettingsController.php's update(), and PollDevice.php's initRrdDirectory().
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID :CVE-2024-51092
Published : May 8, 2026, 6:16 a.m. | 2 hours, 4 minutes ago
Description :LibreNMS before 24.10.0 allows a remote attacker to execute arbitrary code via OS command injection involving AboutController.php's index(), SettingsController.php's update(), and PollDevice.php's initRrdDirectory().
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2024-53326 - LINQPad Deserialization Remote Code Execution
CVE ID :CVE-2024-53326
Published : May 8, 2026, 6:16 a.m. | 2 hours, 4 minutes ago
Description :LINQPad before 5.52.01 Pro edition is vulnerable to Unsafe Deserialization in LINQPad.AutoRefManager::PopulateFromCache(), leading to code execution.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID :CVE-2024-53326
Published : May 8, 2026, 6:16 a.m. | 2 hours, 4 minutes ago
Description :LINQPad before 5.52.01 Pro edition is vulnerable to Unsafe Deserialization in LINQPad.AutoRefManager::PopulateFromCache(), leading to code execution.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-44927 - "Uriparser Integer Pointer Truncation Vulnerability"
CVE ID :CVE-2026-44927
Published : May 8, 2026, 7:13 a.m. | 1 hour, 7 minutes ago
Description :In uriparser before 1.0.2, there is pointer difference truncation to int in various places.
Severity: 2.9 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID :CVE-2026-44927
Published : May 8, 2026, 7:13 a.m. | 1 hour, 7 minutes ago
Description :In uriparser before 1.0.2, there is pointer difference truncation to int in various places.
Severity: 2.9 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-44928 - "Apache uriparser Uri Equality Validation Bypass Vulnerability"
CVE ID :CVE-2026-44928
Published : May 8, 2026, 7:15 a.m. | 1 hour, 4 minutes ago
Description :In uriparser before 1.0.2, the function family EqualsUri can misclassify two unequal URIs as equal.
Severity: 2.9 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID :CVE-2026-44928
Published : May 8, 2026, 7:15 a.m. | 1 hour, 4 minutes ago
Description :In uriparser before 1.0.2, the function family EqualsUri can misclassify two unequal URIs as equal.
Severity: 2.9 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2023-46453 - GL.iNet SQL Injection Regular Expression Authentication Bypass
CVE ID :CVE-2023-46453
Published : May 8, 2026, 7:16 a.m. | 1 hour, 3 minutes ago
Description :Certain GL.iNet devices with 4.x firmware allow authentication bypass (resulting in administrative control of the device) via a username that is both a valid SQL statement and a valid regular expression. For example, this affects version 4.3.7 on GL-MT3000 GL-AR300M GL-B1300 GL-AX1800 GL-AR750S GL-MT2500 GL-AXT1800 GL-X3000 and GL-SFT1200.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID :CVE-2023-46453
Published : May 8, 2026, 7:16 a.m. | 1 hour, 3 minutes ago
Description :Certain GL.iNet devices with 4.x firmware allow authentication bypass (resulting in administrative control of the device) via a username that is both a valid SQL statement and a valid regular expression. For example, this affects version 4.3.7 on GL-MT3000 GL-AR300M GL-B1300 GL-AX1800 GL-AR750S GL-MT2500 GL-AXT1800 GL-X3000 and GL-SFT1200.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-55449 - AstrBotDevs AstrBot Critical JWT Private Key Hardcoding Vulnerability
CVE ID :CVE-2025-55449
Published : May 8, 2026, 7:16 a.m. | 1 hour, 3 minutes ago
Description :AstrBotDevs AstrBot 3.5.15 has Advanced_System_for_Text_Response_and_Bot_Operations_Tool as the hardcoded private key used to sign a JWT.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID :CVE-2025-55449
Published : May 8, 2026, 7:16 a.m. | 1 hour, 3 minutes ago
Description :AstrBotDevs AstrBot 3.5.15 has Advanced_System_for_Text_Response_and_Bot_Operations_Tool as the hardcoded private key used to sign a JWT.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-67886 - Bitrix24 Remote Code Execution via Unrestricted File Upload
CVE ID :CVE-2025-67886
Published : May 8, 2026, 7:16 a.m. | 1 hour, 3 minutes ago
Description :Bitrix24 through 25.100.300 allows Remote Code Execution because an actor with SOURCE/WRITE permissions for the Translate Module can upload and execute code by sending a PHP file and a .htaccess file. NOTE: this is disputed by the Supplier because this is intended behavior for the high-privileged users who can upload new translated pages to the website.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID :CVE-2025-67886
Published : May 8, 2026, 7:16 a.m. | 1 hour, 3 minutes ago
Description :Bitrix24 through 25.100.300 allows Remote Code Execution because an actor with SOURCE/WRITE permissions for the Translate Module can upload and execute code by sending a PHP file and a .htaccess file. NOTE: this is disputed by the Supplier because this is intended behavior for the high-privileged users who can upload new translated pages to the website.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-67887 - Bitrix Remote Code Execution Vulnerability
CVE ID :CVE-2025-67887
Published : May 8, 2026, 7:16 a.m. | 1 hour, 3 minutes ago
Description :1C-Bitrix through 25.100.500 allows Remote Code Execution because an actor with SOURCE/WRITE permissions for the Translate Module can upload and execute code by sending a PHP file and a .htaccess file. NOTE: this is disputed by the Supplier because this is intended behavior for the high-privileged users who can upload new translated pages to the website.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID :CVE-2025-67887
Published : May 8, 2026, 7:16 a.m. | 1 hour, 3 minutes ago
Description :1C-Bitrix through 25.100.500 allows Remote Code Execution because an actor with SOURCE/WRITE permissions for the Translate Module can upload and execute code by sending a PHP file and a .htaccess file. NOTE: this is disputed by the Supplier because this is intended behavior for the high-privileged users who can upload new translated pages to the website.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-67888 - Softaculous SitePad OS Command Injection Vulnerability
CVE ID :CVE-2025-67888
Published : May 8, 2026, 7:16 a.m. | 1 hour, 3 minutes ago
Description :An issue was discovered in Control Web Panel (CWP) before 0.9.8.1209. User input passed via the "key" GET parameter to /admin/index.php (when the "api" parameter is set) is not properly sanitized before being used to execute OS commands. This can be exploited by unauthenticated attackers to inject and execute arbitrary OS commands with the privileges of root on the web server. Softaculous or SitePad must be present.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID :CVE-2025-67888
Published : May 8, 2026, 7:16 a.m. | 1 hour, 3 minutes ago
Description :An issue was discovered in Control Web Panel (CWP) before 0.9.8.1209. User input passed via the "key" GET parameter to /admin/index.php (when the "api" parameter is set) is not properly sanitized before being used to execute OS commands. This can be exploited by unauthenticated attackers to inject and execute arbitrary OS commands with the privileges of root on the web server. Softaculous or SitePad must be present.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-69599 - RayVentory Scan Engine Path Environment Variable Privilege Escalation Vulnerability
CVE ID :CVE-2025-69599
Published : May 8, 2026, 7:16 a.m. | 1 hour, 3 minutes ago
Description :RayVentory Scan Engine through 12.6 Update 8 allows attackers to gain privileges if they control the value of the PATH environment variable. NOTE: this is disputed because ability of an attacker to control the environment is a site-specific misconfiguration.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID :CVE-2025-69599
Published : May 8, 2026, 7:16 a.m. | 1 hour, 3 minutes ago
Description :RayVentory Scan Engine through 12.6 Update 8 allows attackers to gain privileges if they control the value of the PATH environment variable. NOTE: this is disputed because ability of an attacker to control the environment is a site-specific misconfiguration.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-69690 - Netgate pfSense CE PHP Code Execution Vulnerability
CVE ID :CVE-2025-69690
Published : May 8, 2026, 7:16 a.m. | 1 hour, 3 minutes ago
Description :Netgate pfSense CE 2.7.2 allows code execution by using the module installer with a backup file with a serialized PHP object containing the post_reboot_commands property. NOTE: the Supplier disputes this because this installer is only available to admins and they are intentionally allowed to execute PHP code.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID :CVE-2025-69690
Published : May 8, 2026, 7:16 a.m. | 1 hour, 3 minutes ago
Description :Netgate pfSense CE 2.7.2 allows code execution by using the module installer with a backup file with a serialized PHP object containing the post_reboot_commands property. NOTE: the Supplier disputes this because this installer is only available to admins and they are intentionally allowed to execute PHP code.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-69691 - Netgate pfSense CE PHP Code Execution Vulnerability
CVE ID :CVE-2025-69691
Published : May 8, 2026, 7:16 a.m. | 1 hour, 3 minutes ago
Description :Netgate pfSense CE 2.8.0 allows code execution in the XMLRPC API via pfsense.exec_php. NOTE: the Supplier disputes this because the API call is only available to admins and they are intentionally allowed to execute PHP code.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID :CVE-2025-69691
Published : May 8, 2026, 7:16 a.m. | 1 hour, 3 minutes ago
Description :Netgate pfSense CE 2.8.0 allows code execution in the XMLRPC API via pfsense.exec_php. NOTE: the Supplier disputes this because the API call is only available to admins and they are intentionally allowed to execute PHP code.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...