<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"><channel><title>Yazoul Security - CVE Advisories</title><description>Daily critical and high-severity CVE advisories with remediation guidance from Yazoul Security. Stay informed about the latest security vulnerabilities.</description><link>https://www.yazoul.net/advisory/</link><language>en-us</language><copyright>Copyright 2026 Yazoul Security - https://www.yazoul.net/advisory</copyright><managingEditor>contact@yazoul.net (Yazoul Security)</managingEditor><webMaster>contact@yazoul.net (Yazoul Security)</webMaster><image><url>https://www.yazoul.net/advisory/icon-128.png</url><title>Yazoul Security - CVE Advisories</title><link>https://www.yazoul.net/advisory</link></image><atom:link href="https://www.yazoul.net/advisory/rss.xml" rel="self" type="application/rss+xml" xmlns:atom="http://www.w3.org/2005/Atom"/><item><title>CVE-2026-40317: Security Advisory: CVE-2026-40317</title><link>https://www.yazoul.net/advisory/cve/cve-2026-40317-novumos-local-privilege-escalation-to-kernel</link><guid isPermaLink="true">https://www.yazoul.net/advisory/cve/cve-2026-40317-novumos-local-privilege-escalation-to-kernel</guid><description>&lt;p&gt;&lt;strong&gt;CVE-2026-40317&lt;/strong&gt; - CRITICAL severity (CVSS 9.3)&lt;/p&gt;
&lt;p&gt;NovumOS is a custom 32-bit operating system written in Zig and x86 Assembly. In versions prior to 0.24, Syscall 12 (JumpToUser) accepts an arbitrary entry point address from user-space registers witho...&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Affected Products:&lt;/strong&gt; Multiple systems&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/advisory/cve/cve-2026-40317-novumos-local-privilege-escalation-to-kernel&quot;&gt;Read the full security advisory on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;This advisory is published by &lt;a href=&quot;https://www.yazoul.net/advisory&quot;&gt;Yazoul Security&lt;/a&gt; - Your trusted source for CVE intelligence and remediation guidance.&lt;/em&gt;&lt;/p&gt;</description><pubDate>Sat, 18 Apr 2026 00:00:00 GMT</pubDate><category>critical</category><category>CVE</category><category>Security</category><category>Vulnerability</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>CVE-2026-40324: Security Advisory: CVE-2026-40324</title><link>https://www.yazoul.net/advisory/cve/cve-2026-40324-hot-chocolate-graphql-server-crash-via-stack-overflow</link><guid isPermaLink="true">https://www.yazoul.net/advisory/cve/cve-2026-40324-hot-chocolate-graphql-server-crash-via-stack-overflow</guid><description>&lt;p&gt;&lt;strong&gt;CVE-2026-40324&lt;/strong&gt; - CRITICAL severity (CVSS 9.1)&lt;/p&gt;
&lt;p&gt;Hot Chocolate is an open-source GraphQL server. Prior to versions 12.22.7, 13.9.16, 14.3.1, and 15.1.14, Hot Chocolate&apos;s recursive descent parser `Utf8GraphQLParser` has no recursion depth limit. A cr...&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Affected Products:&lt;/strong&gt; Multiple systems&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/advisory/cve/cve-2026-40324-hot-chocolate-graphql-server-crash-via-stack-overflow&quot;&gt;Read the full security advisory on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;This advisory is published by &lt;a href=&quot;https://www.yazoul.net/advisory&quot;&gt;Yazoul Security&lt;/a&gt; - Your trusted source for CVE intelligence and remediation guidance.&lt;/em&gt;&lt;/p&gt;</description><pubDate>Sat, 18 Apr 2026 00:00:00 GMT</pubDate><category>critical</category><category>CVE</category><category>Security</category><category>Vulnerability</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>CVE-2026-40484: Security Advisory: CVE-2026-40484</title><link>https://www.yazoul.net/advisory/cve/cve-2026-40484-churchcrm-admin-can-upload-webshell-for-rce</link><guid isPermaLink="true">https://www.yazoul.net/advisory/cve/cve-2026-40484-churchcrm-admin-can-upload-webshell-for-rce</guid><description>&lt;p&gt;&lt;strong&gt;CVE-2026-40484&lt;/strong&gt; - CRITICAL severity (CVSS 9.1)&lt;/p&gt;
&lt;p&gt;ChurchCRM is an open-source church management system. In versions prior to 7.2.0, the database backup restore functionality extracts uploaded archive contents and copies files from the Images/ directo...&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Affected Products:&lt;/strong&gt; Multiple systems&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/advisory/cve/cve-2026-40484-churchcrm-admin-can-upload-webshell-for-rce&quot;&gt;Read the full security advisory on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;This advisory is published by &lt;a href=&quot;https://www.yazoul.net/advisory&quot;&gt;Yazoul Security&lt;/a&gt; - Your trusted source for CVE intelligence and remediation guidance.&lt;/em&gt;&lt;/p&gt;</description><pubDate>Sat, 18 Apr 2026 00:00:00 GMT</pubDate><category>critical</category><category>CVE</category><category>Security</category><category>Vulnerability</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>CVE-2026-40487: Security Advisory: CVE-2026-40487</title><link>https://www.yazoul.net/advisory/cve/cve-2026-40487-postiz-stored-xss-via-file-upload-poc</link><guid isPermaLink="true">https://www.yazoul.net/advisory/cve/cve-2026-40487-postiz-stored-xss-via-file-upload-poc</guid><description>&lt;p&gt;&lt;strong&gt;CVE-2026-40487&lt;/strong&gt; - HIGH severity (CVSS 8.9)&lt;/p&gt;
&lt;p&gt;Postiz is an AI social media scheduling tool. Prior to version 2.21.6, a file upload validation bypass allows any authenticated user to upload arbitrary HTML, SVG, or other executable file types to th...&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Affected Products:&lt;/strong&gt; Multiple systems&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/advisory/cve/cve-2026-40487-postiz-stored-xss-via-file-upload-poc&quot;&gt;Read the full security advisory on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;This advisory is published by &lt;a href=&quot;https://www.yazoul.net/advisory&quot;&gt;Yazoul Security&lt;/a&gt; - Your trusted source for CVE intelligence and remediation guidance.&lt;/em&gt;&lt;/p&gt;</description><pubDate>Sat, 18 Apr 2026 00:00:00 GMT</pubDate><category>high</category><category>CVE</category><category>Security</category><category>Vulnerability</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>CVE-2026-40572: Security Advisory: CVE-2026-40572</title><link>https://www.yazoul.net/advisory/cve/cve-2026-40572-novumos-local-privilege-escalation</link><guid isPermaLink="true">https://www.yazoul.net/advisory/cve/cve-2026-40572-novumos-local-privilege-escalation</guid><description>&lt;p&gt;&lt;strong&gt;CVE-2026-40572&lt;/strong&gt; - CRITICAL severity (CVSS 9)&lt;/p&gt;
&lt;p&gt;NovumOS is a custom 32-bit operating system written in Zig and x86 Assembly. In versions prior to 0.24, Syscall 15 (MemoryMapRange) allows Ring 3 user-mode processes to map arbitrary virtual address r...&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Affected Products:&lt;/strong&gt; Multiple systems&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/advisory/cve/cve-2026-40572-novumos-local-privilege-escalation&quot;&gt;Read the full security advisory on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;This advisory is published by &lt;a href=&quot;https://www.yazoul.net/advisory&quot;&gt;Yazoul Security&lt;/a&gt; - Your trusted source for CVE intelligence and remediation guidance.&lt;/em&gt;&lt;/p&gt;</description><pubDate>Sat, 18 Apr 2026 00:00:00 GMT</pubDate><category>critical</category><category>CVE</category><category>Security</category><category>Vulnerability</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>CVE-2026-37749: Security Advisory: CVE-2026-37749</title><link>https://www.yazoul.net/advisory/cve/cve-2026-37749-simple-attendance-system-unauth-sqli-bypass-poc</link><guid isPermaLink="true">https://www.yazoul.net/advisory/cve/cve-2026-37749-simple-attendance-system-unauth-sqli-bypass-poc</guid><description>&lt;p&gt;&lt;strong&gt;CVE-2026-37749&lt;/strong&gt; - CRITICAL severity (CVSS 9.8)&lt;/p&gt;
&lt;p&gt;A SQL injection vulnerability in CodeAstro Simple Attendance Management System v1.0 allows remote unauthenticated attackers to bypass authentication via the username parameter in index.php....&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Affected Products:&lt;/strong&gt; Multiple systems&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/advisory/cve/cve-2026-37749-simple-attendance-system-unauth-sqli-bypass-poc&quot;&gt;Read the full security advisory on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;This advisory is published by &lt;a href=&quot;https://www.yazoul.net/advisory&quot;&gt;Yazoul Security&lt;/a&gt; - Your trusted source for CVE intelligence and remediation guidance.&lt;/em&gt;&lt;/p&gt;</description><pubDate>Fri, 17 Apr 2026 00:00:00 GMT</pubDate><category>critical</category><category>CVE</category><category>Security</category><category>Vulnerability</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>CVE-2026-40262: Security Advisory: CVE-2026-40262</title><link>https://www.yazoul.net/advisory/cve/cve-2026-40262-note-mark-stored-xss-via-file-upload</link><guid isPermaLink="true">https://www.yazoul.net/advisory/cve/cve-2026-40262-note-mark-stored-xss-via-file-upload</guid><description>&lt;p&gt;&lt;strong&gt;CVE-2026-40262&lt;/strong&gt; - HIGH severity (CVSS 8.7)&lt;/p&gt;
&lt;p&gt;Note Mark is an open-source note-taking application. In versions 0.19.1 and prior, the asset delivery handler serves uploaded files inline and relies on magic-byte detection for content type, which do...&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Affected Products:&lt;/strong&gt; Multiple systems&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/advisory/cve/cve-2026-40262-note-mark-stored-xss-via-file-upload&quot;&gt;Read the full security advisory on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;This advisory is published by &lt;a href=&quot;https://www.yazoul.net/advisory&quot;&gt;Yazoul Security&lt;/a&gt; - Your trusted source for CVE intelligence and remediation guidance.&lt;/em&gt;&lt;/p&gt;</description><pubDate>Fri, 17 Apr 2026 00:00:00 GMT</pubDate><category>high</category><category>CVE</category><category>Security</category><category>Vulnerability</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>CVE-2026-40351: Security Advisory: CVE-2026-40351</title><link>https://www.yazoul.net/advisory/cve/cve-2026-40351-fastgpt-nosql-injection-grants-admin-login</link><guid isPermaLink="true">https://www.yazoul.net/advisory/cve/cve-2026-40351-fastgpt-nosql-injection-grants-admin-login</guid><description>&lt;p&gt;&lt;strong&gt;CVE-2026-40351&lt;/strong&gt; - CRITICAL severity (CVSS 9.8)&lt;/p&gt;
&lt;p&gt;FastGPT is an AI Agent building platform. In versions prior to 4.14.9.5, the password-based login endpoint uses TypeScript type assertion without runtime validation, allowing an unauthenticated attack...&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Affected Products:&lt;/strong&gt; Multiple systems&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/advisory/cve/cve-2026-40351-fastgpt-nosql-injection-grants-admin-login&quot;&gt;Read the full security advisory on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;This advisory is published by &lt;a href=&quot;https://www.yazoul.net/advisory&quot;&gt;Yazoul Security&lt;/a&gt; - Your trusted source for CVE intelligence and remediation guidance.&lt;/em&gt;&lt;/p&gt;</description><pubDate>Fri, 17 Apr 2026 00:00:00 GMT</pubDate><category>critical</category><category>CVE</category><category>Security</category><category>Vulnerability</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>CVE-2026-40352: Security Advisory: CVE-2026-40352</title><link>https://www.yazoul.net/advisory/cve/cve-2026-40352-fastgpt-nosql-injection-enables-account-takeover</link><guid isPermaLink="true">https://www.yazoul.net/advisory/cve/cve-2026-40352-fastgpt-nosql-injection-enables-account-takeover</guid><description>&lt;p&gt;&lt;strong&gt;CVE-2026-40352&lt;/strong&gt; - HIGH severity (CVSS 8.8)&lt;/p&gt;
&lt;p&gt;FastGPT is an AI Agent building platform. In versions prior to 4.14.9.5, the password change endpoint is vulnerable to NoSQL injection. An authenticated attacker can bypass the &quot;old password&quot; verifica...&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Affected Products:&lt;/strong&gt; Multiple systems&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/advisory/cve/cve-2026-40352-fastgpt-nosql-injection-enables-account-takeover&quot;&gt;Read the full security advisory on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;This advisory is published by &lt;a href=&quot;https://www.yazoul.net/advisory&quot;&gt;Yazoul Security&lt;/a&gt; - Your trusted source for CVE intelligence and remediation guidance.&lt;/em&gt;&lt;/p&gt;</description><pubDate>Fri, 17 Apr 2026 00:00:00 GMT</pubDate><category>high</category><category>CVE</category><category>Security</category><category>Vulnerability</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>CVE-2026-40477: Security Advisory: CVE-2026-40477</title><link>https://www.yazoul.net/advisory/cve/cve-2026-40477-thymeleaf-ssti-allows-server-side-code-execution</link><guid isPermaLink="true">https://www.yazoul.net/advisory/cve/cve-2026-40477-thymeleaf-ssti-allows-server-side-code-execution</guid><description>&lt;p&gt;&lt;strong&gt;CVE-2026-40477&lt;/strong&gt; - CRITICAL severity (CVSS 9)&lt;/p&gt;
&lt;p&gt;Thymeleaf is a server-side Java template engine for web and standalone environments. Versions 3.1.3.RELEASE and prior contain a security bypass vulnerability in the expression execution mechanisms. Al...&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Affected Products:&lt;/strong&gt; Multiple systems&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/advisory/cve/cve-2026-40477-thymeleaf-ssti-allows-server-side-code-execution&quot;&gt;Read the full security advisory on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;This advisory is published by &lt;a href=&quot;https://www.yazoul.net/advisory&quot;&gt;Yazoul Security&lt;/a&gt; - Your trusted source for CVE intelligence and remediation guidance.&lt;/em&gt;&lt;/p&gt;</description><pubDate>Fri, 17 Apr 2026 00:00:00 GMT</pubDate><category>critical</category><category>CVE</category><category>Security</category><category>Vulnerability</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>CVE-2026-40478: Security Advisory: CVE-2026-40478</title><link>https://www.yazoul.net/advisory/cve/cve-2026-40478-thymeleaf-server-side-template-injection-unauth</link><guid isPermaLink="true">https://www.yazoul.net/advisory/cve/cve-2026-40478-thymeleaf-server-side-template-injection-unauth</guid><description>&lt;p&gt;&lt;strong&gt;CVE-2026-40478&lt;/strong&gt; - CRITICAL severity (CVSS 9)&lt;/p&gt;
&lt;p&gt;Thymeleaf is a server-side Java template engine for web and standalone environments. Versions 3.1.3.RELEASE and prior contain a security bypass vulnerability in the the expression execution mechanisms...&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Affected Products:&lt;/strong&gt; Multiple systems&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/advisory/cve/cve-2026-40478-thymeleaf-server-side-template-injection-unauth&quot;&gt;Read the full security advisory on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;This advisory is published by &lt;a href=&quot;https://www.yazoul.net/advisory&quot;&gt;Yazoul Security&lt;/a&gt; - Your trusted source for CVE intelligence and remediation guidance.&lt;/em&gt;&lt;/p&gt;</description><pubDate>Fri, 17 Apr 2026 00:00:00 GMT</pubDate><category>critical</category><category>CVE</category><category>Security</category><category>Vulnerability</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>CVE-2026-4659: Security Advisory: CVE-2026-4659</title><link>https://www.yazoul.net/advisory/cve/cve-2026-4659-unlimited-elements-for-elementor-reads-arbitrary-files</link><guid isPermaLink="true">https://www.yazoul.net/advisory/cve/cve-2026-4659-unlimited-elements-for-elementor-reads-arbitrary-files</guid><description>&lt;p&gt;&lt;strong&gt;CVE-2026-4659&lt;/strong&gt; - HIGH severity (CVSS 7.5)&lt;/p&gt;
&lt;p&gt;The Unlimited Elements for Elementor plugin for WordPress is vulnerable to Arbitrary File Read via the Repeater JSON/CSV URL parameter in versions up to, and including, 2.0.6. This is due to insuffici...&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Affected Products:&lt;/strong&gt; Multiple systems&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/advisory/cve/cve-2026-4659-unlimited-elements-for-elementor-reads-arbitrary-files&quot;&gt;Read the full security advisory on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;This advisory is published by &lt;a href=&quot;https://www.yazoul.net/advisory&quot;&gt;Yazoul Security&lt;/a&gt; - Your trusted source for CVE intelligence and remediation guidance.&lt;/em&gt;&lt;/p&gt;</description><pubDate>Fri, 17 Apr 2026 00:00:00 GMT</pubDate><category>high</category><category>CVE</category><category>Security</category><category>Vulnerability</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>CVE-2026-5807: Security Advisory: CVE-2026-5807</title><link>https://www.yazoul.net/advisory/cve/cve-2026-5807-vault-unauth-denial-of-service-blocks-admin</link><guid isPermaLink="true">https://www.yazoul.net/advisory/cve/cve-2026-5807-vault-unauth-denial-of-service-blocks-admin</guid><description>&lt;p&gt;&lt;strong&gt;CVE-2026-5807&lt;/strong&gt; - HIGH severity (CVSS 7.5)&lt;/p&gt;
&lt;p&gt;Vault is vulnerable to a denial-of-service condition where an unauthenticated attacker can repeatedly initiate or cancel root token generation or rekey operations, occupying the single in-progress ope...&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Affected Products:&lt;/strong&gt; Multiple systems&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/advisory/cve/cve-2026-5807-vault-unauth-denial-of-service-blocks-admin&quot;&gt;Read the full security advisory on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;This advisory is published by &lt;a href=&quot;https://www.yazoul.net/advisory&quot;&gt;Yazoul Security&lt;/a&gt; - Your trusted source for CVE intelligence and remediation guidance.&lt;/em&gt;&lt;/p&gt;</description><pubDate>Fri, 17 Apr 2026 00:00:00 GMT</pubDate><category>high</category><category>CVE</category><category>Security</category><category>Vulnerability</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>CVE-2026-31843: Security Advisory: CVE-2026-31843</title><link>https://www.yazoul.net/advisory/cve/cve-2026-31843-pay-uz-laravel-package-unauthenticated-rce</link><guid isPermaLink="true">https://www.yazoul.net/advisory/cve/cve-2026-31843-pay-uz-laravel-package-unauthenticated-rce</guid><description>&lt;p&gt;&lt;strong&gt;CVE-2026-31843&lt;/strong&gt; - CRITICAL severity (CVSS 9.8)&lt;/p&gt;
&lt;p&gt;The goodoneuz/pay-uz Laravel package (&lt;= 2.2.24) contains a critical vulnerability in the /payment/api/editable/update endpoint that allows unauthenticated attackers to overwrite existing PHP payment ...&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Affected Products:&lt;/strong&gt; Multiple systems&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/advisory/cve/cve-2026-31843-pay-uz-laravel-package-unauthenticated-rce&quot;&gt;Read the full security advisory on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;This advisory is published by &lt;a href=&quot;https://www.yazoul.net/advisory&quot;&gt;Yazoul Security&lt;/a&gt; - Your trusted source for CVE intelligence and remediation guidance.&lt;/em&gt;&lt;/p&gt;</description><pubDate>Thu, 16 Apr 2026 00:00:00 GMT</pubDate><category>critical</category><category>CVE</category><category>Security</category><category>Vulnerability</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>CVE-2026-37336: Security Advisory: CVE-2026-37336</title><link>https://www.yazoul.net/advisory/cve/cve-2026-37336-simple-music-cloud-sqli-leaks-database</link><guid isPermaLink="true">https://www.yazoul.net/advisory/cve/cve-2026-37336-simple-music-cloud-sqli-leaks-database</guid><description>&lt;p&gt;&lt;strong&gt;CVE-2026-37336&lt;/strong&gt; - HIGH severity (CVSS 7.3)&lt;/p&gt;
&lt;p&gt;SourceCodester Simple Music Cloud Community System v1.0 is vulnerable to SQL Injection in the file /music/view_music.php....&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Affected Products:&lt;/strong&gt; Multiple systems&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/advisory/cve/cve-2026-37336-simple-music-cloud-sqli-leaks-database&quot;&gt;Read the full security advisory on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;This advisory is published by &lt;a href=&quot;https://www.yazoul.net/advisory&quot;&gt;Yazoul Security&lt;/a&gt; - Your trusted source for CVE intelligence and remediation guidance.&lt;/em&gt;&lt;/p&gt;</description><pubDate>Thu, 16 Apr 2026 00:00:00 GMT</pubDate><category>high</category><category>CVE</category><category>Security</category><category>Vulnerability</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>CVE-2026-37337: Security Advisory: CVE-2026-37337</title><link>https://www.yazoul.net/advisory/cve/cve-2026-37337-simple-music-cloud-sql-injection-unauth</link><guid isPermaLink="true">https://www.yazoul.net/advisory/cve/cve-2026-37337-simple-music-cloud-sql-injection-unauth</guid><description>&lt;p&gt;&lt;strong&gt;CVE-2026-37337&lt;/strong&gt; - HIGH severity (CVSS 7.3)&lt;/p&gt;
&lt;p&gt;SourceCodester Simple Music Cloud Community System v1.0 is vulnerable to SQL Injection in the file /music/view_playlist.php....&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Affected Products:&lt;/strong&gt; Multiple systems&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/advisory/cve/cve-2026-37337-simple-music-cloud-sql-injection-unauth&quot;&gt;Read the full security advisory on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;This advisory is published by &lt;a href=&quot;https://www.yazoul.net/advisory&quot;&gt;Yazoul Security&lt;/a&gt; - Your trusted source for CVE intelligence and remediation guidance.&lt;/em&gt;&lt;/p&gt;</description><pubDate>Thu, 16 Apr 2026 00:00:00 GMT</pubDate><category>high</category><category>CVE</category><category>Security</category><category>Vulnerability</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>CVE-2026-37338: Security Advisory: CVE-2026-37338</title><link>https://www.yazoul.net/advisory/cve/cve-2026-37338-simple-music-cloud-sql-injection-unauthenticated</link><guid isPermaLink="true">https://www.yazoul.net/advisory/cve/cve-2026-37338-simple-music-cloud-sql-injection-unauthenticated</guid><description>&lt;p&gt;&lt;strong&gt;CVE-2026-37338&lt;/strong&gt; - CRITICAL severity (CVSS 9.4)&lt;/p&gt;
&lt;p&gt;SourceCodester Simple Music Cloud Community System v1.0 is vulnerable to SQL Injection in the file /music/view_user.php....&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Affected Products:&lt;/strong&gt; Multiple systems&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/advisory/cve/cve-2026-37338-simple-music-cloud-sql-injection-unauthenticated&quot;&gt;Read the full security advisory on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;This advisory is published by &lt;a href=&quot;https://www.yazoul.net/advisory&quot;&gt;Yazoul Security&lt;/a&gt; - Your trusted source for CVE intelligence and remediation guidance.&lt;/em&gt;&lt;/p&gt;</description><pubDate>Thu, 16 Apr 2026 00:00:00 GMT</pubDate><category>critical</category><category>CVE</category><category>Security</category><category>Vulnerability</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>CVE-2026-37347: Security Advisory: CVE-2026-37347</title><link>https://www.yazoul.net/advisory/cve/cve-2026-37347-payroll-management-system-sql-injection-unauth</link><guid isPermaLink="true">https://www.yazoul.net/advisory/cve/cve-2026-37347-payroll-management-system-sql-injection-unauth</guid><description>&lt;p&gt;&lt;strong&gt;CVE-2026-37347&lt;/strong&gt; - CRITICAL severity (CVSS 9.1)&lt;/p&gt;
&lt;p&gt;SourceCodester Payroll Management and Information System v1.0 is vulnerable to SQL Injection in the file /payroll/view_employee.php....&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Affected Products:&lt;/strong&gt; Multiple systems&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/advisory/cve/cve-2026-37347-payroll-management-system-sql-injection-unauth&quot;&gt;Read the full security advisory on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;This advisory is published by &lt;a href=&quot;https://www.yazoul.net/advisory&quot;&gt;Yazoul Security&lt;/a&gt; - Your trusted source for CVE intelligence and remediation guidance.&lt;/em&gt;&lt;/p&gt;</description><pubDate>Thu, 16 Apr 2026 00:00:00 GMT</pubDate><category>critical</category><category>CVE</category><category>Security</category><category>Vulnerability</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>CVE-2026-37345: Security Advisory: CVE-2026-37345</title><link>https://www.yazoul.net/advisory/cve/cve-2026-37345-vehicle-parking-system-sql-injection-unauthenticated</link><guid isPermaLink="true">https://www.yazoul.net/advisory/cve/cve-2026-37345-vehicle-parking-system-sql-injection-unauthenticated</guid><description>&lt;p&gt;&lt;strong&gt;CVE-2026-37345&lt;/strong&gt; - CRITICAL severity (CVSS 9.8)&lt;/p&gt;
&lt;p&gt;SourceCodester Vehicle Parking Area Management System v1.0 is vulnerable to SQL Injection in the file /parking/manage_park.php....&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Affected Products:&lt;/strong&gt; Multiple systems&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/advisory/cve/cve-2026-37345-vehicle-parking-system-sql-injection-unauthenticated&quot;&gt;Read the full security advisory on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;This advisory is published by &lt;a href=&quot;https://www.yazoul.net/advisory&quot;&gt;Yazoul Security&lt;/a&gt; - Your trusted source for CVE intelligence and remediation guidance.&lt;/em&gt;&lt;/p&gt;</description><pubDate>Thu, 16 Apr 2026 00:00:00 GMT</pubDate><category>critical</category><category>CVE</category><category>Security</category><category>Vulnerability</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>CVE-2026-40322: Security Advisory: CVE-2026-40322</title><link>https://www.yazoul.net/advisory/cve/cve-2026-40322-siyuan-stored-xss-leads-to-code-execution</link><guid isPermaLink="true">https://www.yazoul.net/advisory/cve/cve-2026-40322-siyuan-stored-xss-leads-to-code-execution</guid><description>&lt;p&gt;&lt;strong&gt;CVE-2026-40322&lt;/strong&gt; - CRITICAL severity (CVSS 9)&lt;/p&gt;
&lt;p&gt;SiYuan is an open-source personal knowledge management system. In versions 3.6.3 and below, Mermaid diagrams are rendered with securityLevel set to &quot;loose&quot;, and the resulting SVG is injected into the ...&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Affected Products:&lt;/strong&gt; Multiple systems&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/advisory/cve/cve-2026-40322-siyuan-stored-xss-leads-to-code-execution&quot;&gt;Read the full security advisory on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;This advisory is published by &lt;a href=&quot;https://www.yazoul.net/advisory&quot;&gt;Yazoul Security&lt;/a&gt; - Your trusted source for CVE intelligence and remediation guidance.&lt;/em&gt;&lt;/p&gt;</description><pubDate>Thu, 16 Apr 2026 00:00:00 GMT</pubDate><category>critical</category><category>CVE</category><category>Security</category><category>Vulnerability</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>CVE-2025-40899: Security Advisory: CVE-2025-40899</title><link>https://www.yazoul.net/advisory/cve/cve-2025-40899-assets-and-nodes-stored-xss-in-admin-panel</link><guid isPermaLink="true">https://www.yazoul.net/advisory/cve/cve-2025-40899-assets-and-nodes-stored-xss-in-admin-panel</guid><description>&lt;p&gt;&lt;strong&gt;CVE-2025-40899&lt;/strong&gt; - HIGH severity (CVSS 8.9)&lt;/p&gt;
&lt;p&gt;A Stored Cross-Site Scripting vulnerability was discovered in the Assets and Nodes functionality due to improper validation of an input parameter. An authenticated user with custom fields privileges c...&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Affected Products:&lt;/strong&gt; Multiple systems&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/advisory/cve/cve-2025-40899-assets-and-nodes-stored-xss-in-admin-panel&quot;&gt;Read the full security advisory on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;This advisory is published by &lt;a href=&quot;https://www.yazoul.net/advisory&quot;&gt;Yazoul Security&lt;/a&gt; - Your trusted source for CVE intelligence and remediation guidance.&lt;/em&gt;&lt;/p&gt;</description><pubDate>Wed, 15 Apr 2026 00:00:00 GMT</pubDate><category>high</category><category>CVE</category><category>Security</category><category>Vulnerability</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>CVE-2026-20147: Security Advisory: CVE-2026-20147</title><link>https://www.yazoul.net/advisory/cve/cve-2026-20147-cisco-ise-authenticated-command-execution</link><guid isPermaLink="true">https://www.yazoul.net/advisory/cve/cve-2026-20147-cisco-ise-authenticated-command-execution</guid><description>&lt;p&gt;&lt;strong&gt;CVE-2026-20147&lt;/strong&gt; - CRITICAL severity (CVSS 9.9)&lt;/p&gt;
&lt;p&gt;A vulnerability in Cisco ISE and Cisco ISE-PIC could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system of an affected device. To exploit this vul...&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Affected Products:&lt;/strong&gt; Multiple systems&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/advisory/cve/cve-2026-20147-cisco-ise-authenticated-command-execution&quot;&gt;Read the full security advisory on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;This advisory is published by &lt;a href=&quot;https://www.yazoul.net/advisory&quot;&gt;Yazoul Security&lt;/a&gt; - Your trusted source for CVE intelligence and remediation guidance.&lt;/em&gt;&lt;/p&gt;</description><pubDate>Wed, 15 Apr 2026 00:00:00 GMT</pubDate><category>critical</category><category>CVE</category><category>Security</category><category>Vulnerability</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>CVE-2026-20180: Security Advisory: CVE-2026-20180</title><link>https://www.yazoul.net/advisory/cve/cve-2026-20180-cisco-ise-authenticated-command-injection-to-root</link><guid isPermaLink="true">https://www.yazoul.net/advisory/cve/cve-2026-20180-cisco-ise-authenticated-command-injection-to-root</guid><description>&lt;p&gt;&lt;strong&gt;CVE-2026-20180&lt;/strong&gt; - CRITICAL severity (CVSS 9.9)&lt;/p&gt;
&lt;p&gt;A vulnerability in Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system of an affected device. To exploit...&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Affected Products:&lt;/strong&gt; Multiple systems&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/advisory/cve/cve-2026-20180-cisco-ise-authenticated-command-injection-to-root&quot;&gt;Read the full security advisory on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;This advisory is published by &lt;a href=&quot;https://www.yazoul.net/advisory&quot;&gt;Yazoul Security&lt;/a&gt; - Your trusted source for CVE intelligence and remediation guidance.&lt;/em&gt;&lt;/p&gt;</description><pubDate>Wed, 15 Apr 2026 00:00:00 GMT</pubDate><category>critical</category><category>CVE</category><category>Security</category><category>Vulnerability</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>CVE-2026-20184: Security Advisory: CVE-2026-20184</title><link>https://www.yazoul.net/advisory/cve/cve-2026-20184-webex-sso-impersonates-any-user-unauth</link><guid isPermaLink="true">https://www.yazoul.net/advisory/cve/cve-2026-20184-webex-sso-impersonates-any-user-unauth</guid><description>&lt;p&gt;&lt;strong&gt;CVE-2026-20184&lt;/strong&gt; - CRITICAL severity (CVSS 9.8)&lt;/p&gt;
&lt;p&gt;A vulnerability in the integration of single sign-on (SSO) with Control Hub in Cisco Webex Services could have allowed an unauthenticated, remote attacker to impersonate any user within the service. ...&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Affected Products:&lt;/strong&gt; Multiple systems&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/advisory/cve/cve-2026-20184-webex-sso-impersonates-any-user-unauth&quot;&gt;Read the full security advisory on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;This advisory is published by &lt;a href=&quot;https://www.yazoul.net/advisory&quot;&gt;Yazoul Security&lt;/a&gt; - Your trusted source for CVE intelligence and remediation guidance.&lt;/em&gt;&lt;/p&gt;</description><pubDate>Wed, 15 Apr 2026 00:00:00 GMT</pubDate><category>critical</category><category>CVE</category><category>Security</category><category>Vulnerability</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>CVE-2026-20186: Security Advisory: CVE-2026-20186</title><link>https://www.yazoul.net/advisory/cve/cve-2026-20186-cisco-ise-authenticated-command-injection</link><guid isPermaLink="true">https://www.yazoul.net/advisory/cve/cve-2026-20186-cisco-ise-authenticated-command-injection</guid><description>&lt;p&gt;&lt;strong&gt;CVE-2026-20186&lt;/strong&gt; - CRITICAL severity (CVSS 9.9)&lt;/p&gt;
&lt;p&gt;A vulnerability in Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system of an affected device. To exploit...&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Affected Products:&lt;/strong&gt; Multiple systems&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/advisory/cve/cve-2026-20186-cisco-ise-authenticated-command-injection&quot;&gt;Read the full security advisory on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;This advisory is published by &lt;a href=&quot;https://www.yazoul.net/advisory&quot;&gt;Yazoul Security&lt;/a&gt; - Your trusted source for CVE intelligence and remediation guidance.&lt;/em&gt;&lt;/p&gt;</description><pubDate>Wed, 15 Apr 2026 00:00:00 GMT</pubDate><category>critical</category><category>CVE</category><category>Security</category><category>Vulnerability</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>CVE-2026-6296: Security Advisory: CVE-2026-6296</title><link>https://www.yazoul.net/advisory/cve/cve-2026-6296-chrome-sandbox-escape-via-heap-overflow</link><guid isPermaLink="true">https://www.yazoul.net/advisory/cve/cve-2026-6296-chrome-sandbox-escape-via-heap-overflow</guid><description>&lt;p&gt;&lt;strong&gt;CVE-2026-6296&lt;/strong&gt; - CRITICAL severity (CVSS 9.6)&lt;/p&gt;
&lt;p&gt;Heap buffer overflow in ANGLE in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)...&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Affected Products:&lt;/strong&gt; Multiple systems&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/advisory/cve/cve-2026-6296-chrome-sandbox-escape-via-heap-overflow&quot;&gt;Read the full security advisory on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;This advisory is published by &lt;a href=&quot;https://www.yazoul.net/advisory&quot;&gt;Yazoul Security&lt;/a&gt; - Your trusted source for CVE intelligence and remediation guidance.&lt;/em&gt;&lt;/p&gt;</description><pubDate>Wed, 15 Apr 2026 00:00:00 GMT</pubDate><category>critical</category><category>CVE</category><category>Security</category><category>Vulnerability</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>CVE-2026-6299: Security Advisory: CVE-2026-6299</title><link>https://www.yazoul.net/advisory/cve/cve-2026-6299-chrome-use-after-free-rce-via-prerender</link><guid isPermaLink="true">https://www.yazoul.net/advisory/cve/cve-2026-6299-chrome-use-after-free-rce-via-prerender</guid><description>&lt;p&gt;&lt;strong&gt;CVE-2026-6299&lt;/strong&gt; - HIGH severity (CVSS 8.8)&lt;/p&gt;
&lt;p&gt;Use after free in Prerender in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: Critical)...&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Affected Products:&lt;/strong&gt; Multiple systems&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/advisory/cve/cve-2026-6299-chrome-use-after-free-rce-via-prerender&quot;&gt;Read the full security advisory on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;This advisory is published by &lt;a href=&quot;https://www.yazoul.net/advisory&quot;&gt;Yazoul Security&lt;/a&gt; - Your trusted source for CVE intelligence and remediation guidance.&lt;/em&gt;&lt;/p&gt;</description><pubDate>Wed, 15 Apr 2026 00:00:00 GMT</pubDate><category>high</category><category>CVE</category><category>Security</category><category>Vulnerability</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>CVE-2026-6300: Security Advisory: CVE-2026-6300</title><link>https://www.yazoul.net/advisory/cve/cve-2026-6300-chrome-sandbox-escape-via-css-use-after-free</link><guid isPermaLink="true">https://www.yazoul.net/advisory/cve/cve-2026-6300-chrome-sandbox-escape-via-css-use-after-free</guid><description>&lt;p&gt;&lt;strong&gt;CVE-2026-6300&lt;/strong&gt; - HIGH severity (CVSS 8.8)&lt;/p&gt;
&lt;p&gt;Use after free in CSS in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)...&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Affected Products:&lt;/strong&gt; Multiple systems&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/advisory/cve/cve-2026-6300-chrome-sandbox-escape-via-css-use-after-free&quot;&gt;Read the full security advisory on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;This advisory is published by &lt;a href=&quot;https://www.yazoul.net/advisory&quot;&gt;Yazoul Security&lt;/a&gt; - Your trusted source for CVE intelligence and remediation guidance.&lt;/em&gt;&lt;/p&gt;</description><pubDate>Wed, 15 Apr 2026 00:00:00 GMT</pubDate><category>high</category><category>CVE</category><category>Security</category><category>Vulnerability</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>CVE-2026-6301: Security Advisory: CVE-2026-6301</title><link>https://www.yazoul.net/advisory/cve/cve-2026-6301-chrome-sandbox-escape-via-type-confusion</link><guid isPermaLink="true">https://www.yazoul.net/advisory/cve/cve-2026-6301-chrome-sandbox-escape-via-type-confusion</guid><description>&lt;p&gt;&lt;strong&gt;CVE-2026-6301&lt;/strong&gt; - HIGH severity (CVSS 8.8)&lt;/p&gt;
&lt;p&gt;Type Confusion in Turbofan in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)...&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Affected Products:&lt;/strong&gt; Multiple systems&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/advisory/cve/cve-2026-6301-chrome-sandbox-escape-via-type-confusion&quot;&gt;Read the full security advisory on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;This advisory is published by &lt;a href=&quot;https://www.yazoul.net/advisory&quot;&gt;Yazoul Security&lt;/a&gt; - Your trusted source for CVE intelligence and remediation guidance.&lt;/em&gt;&lt;/p&gt;</description><pubDate>Wed, 15 Apr 2026 00:00:00 GMT</pubDate><category>high</category><category>CVE</category><category>Security</category><category>Vulnerability</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>CVE-2026-6302: Security Advisory: CVE-2026-6302</title><link>https://www.yazoul.net/advisory/cve/cve-2026-6302-chrome-sandbox-escape-via-video-code-execution</link><guid isPermaLink="true">https://www.yazoul.net/advisory/cve/cve-2026-6302-chrome-sandbox-escape-via-video-code-execution</guid><description>&lt;p&gt;&lt;strong&gt;CVE-2026-6302&lt;/strong&gt; - HIGH severity (CVSS 8.8)&lt;/p&gt;
&lt;p&gt;Use after free in Video in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)...&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Affected Products:&lt;/strong&gt; Multiple systems&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/advisory/cve/cve-2026-6302-chrome-sandbox-escape-via-video-code-execution&quot;&gt;Read the full security advisory on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;This advisory is published by &lt;a href=&quot;https://www.yazoul.net/advisory&quot;&gt;Yazoul Security&lt;/a&gt; - Your trusted source for CVE intelligence and remediation guidance.&lt;/em&gt;&lt;/p&gt;</description><pubDate>Wed, 15 Apr 2026 00:00:00 GMT</pubDate><category>high</category><category>CVE</category><category>Security</category><category>Vulnerability</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>CVE-2025-63939: Security Advisory: CVE-2025-63939</title><link>https://www.yazoul.net/advisory/cve/cve-2025-63939-grocery-store-management-system-1-0-sql-injection</link><guid isPermaLink="true">https://www.yazoul.net/advisory/cve/cve-2025-63939-grocery-store-management-system-1-0-sql-injection</guid><description>&lt;p&gt;&lt;strong&gt;CVE-2025-63939&lt;/strong&gt; - CRITICAL severity (CVSS 9.8)&lt;/p&gt;
&lt;p&gt;Improper input handling in /Grocery/search_products_itname.php, in anirudhkannan Grocery Store Management System 1.0, allows SQL injection via the sitem_name POST parameter....&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Affected Products:&lt;/strong&gt; Multiple systems&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/advisory/cve/cve-2025-63939-grocery-store-management-system-1-0-sql-injection&quot;&gt;Read the full security advisory on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;This advisory is published by &lt;a href=&quot;https://www.yazoul.net/advisory&quot;&gt;Yazoul Security&lt;/a&gt; - Your trusted source for CVE intelligence and remediation guidance.&lt;/em&gt;&lt;/p&gt;</description><pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate><category>critical</category><category>CVE</category><category>Security</category><category>Vulnerability</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>CVE-2025-65135: Security Advisory: CVE-2025-65135</title><link>https://www.yazoul.net/advisory/cve/cve-2025-65135-school-management-system-1-0-unauthenticated-sql-injection</link><guid isPermaLink="true">https://www.yazoul.net/advisory/cve/cve-2025-65135-school-management-system-1-0-unauthenticated-sql-injection</guid><description>&lt;p&gt;&lt;strong&gt;CVE-2025-65135&lt;/strong&gt; - CRITICAL severity (CVSS 9.8)&lt;/p&gt;
&lt;p&gt;In manikandan580 School-management-system 1.0, a time-based blind SQL injection vulnerability exists in /studentms/admin/between-date-reprtsdetails.php through the fromdate POST parameter....&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Affected Products:&lt;/strong&gt; Multiple systems&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/advisory/cve/cve-2025-65135-school-management-system-1-0-unauthenticated-sql-injection&quot;&gt;Read the full security advisory on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;This advisory is published by &lt;a href=&quot;https://www.yazoul.net/advisory&quot;&gt;Yazoul Security&lt;/a&gt; - Your trusted source for CVE intelligence and remediation guidance.&lt;/em&gt;&lt;/p&gt;</description><pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate><category>critical</category><category>CVE</category><category>Security</category><category>Vulnerability</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>CVE-2026-27243: Security Advisory: CVE-2026-27243</title><link>https://www.yazoul.net/advisory/cve/cve-2026-27243-adobe-connect-reflected-xss-unauthenticated</link><guid isPermaLink="true">https://www.yazoul.net/advisory/cve/cve-2026-27243-adobe-connect-reflected-xss-unauthenticated</guid><description>&lt;p&gt;&lt;strong&gt;CVE-2026-27243&lt;/strong&gt; - CRITICAL severity (CVSS 9.3)&lt;/p&gt;
&lt;p&gt;Adobe Connect versions 2025.3, 12.10 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerab...&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Affected Products:&lt;/strong&gt; Multiple systems&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/advisory/cve/cve-2026-27243-adobe-connect-reflected-xss-unauthenticated&quot;&gt;Read the full security advisory on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;This advisory is published by &lt;a href=&quot;https://www.yazoul.net/advisory&quot;&gt;Yazoul Security&lt;/a&gt; - Your trusted source for CVE intelligence and remediation guidance.&lt;/em&gt;&lt;/p&gt;</description><pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate><category>critical</category><category>CVE</category><category>Security</category><category>Vulnerability</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>CVE-2026-27245: Security Advisory: CVE-2026-27245</title><link>https://www.yazoul.net/advisory/cve/cve-2026-27245-adobe-connect-reflected-xss-unauthenticated</link><guid isPermaLink="true">https://www.yazoul.net/advisory/cve/cve-2026-27245-adobe-connect-reflected-xss-unauthenticated</guid><description>&lt;p&gt;&lt;strong&gt;CVE-2026-27245&lt;/strong&gt; - CRITICAL severity (CVSS 9.3)&lt;/p&gt;
&lt;p&gt;Adobe Connect versions 2025.3, 12.10 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerab...&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Affected Products:&lt;/strong&gt; Multiple systems&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/advisory/cve/cve-2026-27245-adobe-connect-reflected-xss-unauthenticated&quot;&gt;Read the full security advisory on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;This advisory is published by &lt;a href=&quot;https://www.yazoul.net/advisory&quot;&gt;Yazoul Security&lt;/a&gt; - Your trusted source for CVE intelligence and remediation guidance.&lt;/em&gt;&lt;/p&gt;</description><pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate><category>critical</category><category>CVE</category><category>Security</category><category>Vulnerability</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>CVE-2026-27246: Security Advisory: CVE-2026-27246</title><link>https://www.yazoul.net/advisory/cve/cve-2026-27246-adobe-connect-dom-xss-patch-now</link><guid isPermaLink="true">https://www.yazoul.net/advisory/cve/cve-2026-27246-adobe-connect-dom-xss-patch-now</guid><description>&lt;p&gt;&lt;strong&gt;CVE-2026-27246&lt;/strong&gt; - CRITICAL severity (CVSS 9.3)&lt;/p&gt;
&lt;p&gt;Adobe Connect versions 2025.3, 12.10 and earlier are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability. An attacker could exploit this issue by manipulating the DOM environment to execu...&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Affected Products:&lt;/strong&gt; Multiple systems&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/advisory/cve/cve-2026-27246-adobe-connect-dom-xss-patch-now&quot;&gt;Read the full security advisory on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;This advisory is published by &lt;a href=&quot;https://www.yazoul.net/advisory&quot;&gt;Yazoul Security&lt;/a&gt; - Your trusted source for CVE intelligence and remediation guidance.&lt;/em&gt;&lt;/p&gt;</description><pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate><category>critical</category><category>CVE</category><category>Security</category><category>Vulnerability</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>CVE-2026-27681: Security Advisory: CVE-2026-27681</title><link>https://www.yazoul.net/advisory/cve/cve-2026-27681-sap-bpc-bw-sql-injection-unauth-data-access</link><guid isPermaLink="true">https://www.yazoul.net/advisory/cve/cve-2026-27681-sap-bpc-bw-sql-injection-unauth-data-access</guid><description>&lt;p&gt;&lt;strong&gt;CVE-2026-27681&lt;/strong&gt; - CRITICAL severity (CVSS 9.9)&lt;/p&gt;
&lt;p&gt;Due to insufficient authorization checks in SAP Business Planning and Consolidation and SAP Business Warehouse, an authenticated user can execute crafted SQL statements to read, modify, and delete dat...&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Affected Products:&lt;/strong&gt; Multiple systems&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/advisory/cve/cve-2026-27681-sap-bpc-bw-sql-injection-unauth-data-access&quot;&gt;Read the full security advisory on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;This advisory is published by &lt;a href=&quot;https://www.yazoul.net/advisory&quot;&gt;Yazoul Security&lt;/a&gt; - Your trusted source for CVE intelligence and remediation guidance.&lt;/em&gt;&lt;/p&gt;</description><pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate><category>critical</category><category>CVE</category><category>Security</category><category>Vulnerability</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>CVE-2026-32201: Security Advisory: CVE-2026-32201</title><link>https://www.yazoul.net/advisory/cve/cve-2026-32201-sharepoint-spoofing-exploited-in-the-wild</link><guid isPermaLink="true">https://www.yazoul.net/advisory/cve/cve-2026-32201-sharepoint-spoofing-exploited-in-the-wild</guid><description>&lt;p&gt;&lt;strong&gt;CVE-2026-32201&lt;/strong&gt; - MEDIUM severity (CVSS 6.5)&lt;/p&gt;
&lt;p&gt;Improper input validation in Microsoft Office SharePoint allows an unauthorized attacker to perform spoofing over a network....&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Affected Products:&lt;/strong&gt; Microsoft Sharepoint Server, Microsoft Sharepoint Server, Microsoft Sharepoint Server&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/advisory/cve/cve-2026-32201-sharepoint-spoofing-exploited-in-the-wild&quot;&gt;Read the full security advisory on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;This advisory is published by &lt;a href=&quot;https://www.yazoul.net/advisory&quot;&gt;Yazoul Security&lt;/a&gt; - Your trusted source for CVE intelligence and remediation guidance.&lt;/em&gt;&lt;/p&gt;</description><pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate><category>medium</category><category>CVE</category><category>Security</category><category>Vulnerability</category><category>Microsoft Sharepoint Server</category><category>Microsoft Sharepoint Server</category><category>Microsoft Sharepoint Server</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>CVE-2026-33824: Security Advisory: CVE-2026-33824</title><link>https://www.yazoul.net/advisory/cve/cve-2026-33824-windows-ike-extension-unauthenticated-rce</link><guid isPermaLink="true">https://www.yazoul.net/advisory/cve/cve-2026-33824-windows-ike-extension-unauthenticated-rce</guid><description>&lt;p&gt;&lt;strong&gt;CVE-2026-33824&lt;/strong&gt; - CRITICAL severity (CVSS 9.8)&lt;/p&gt;
&lt;p&gt;Double free in Windows IKE Extension allows an unauthorized attacker to execute code over a network....&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Affected Products:&lt;/strong&gt; Multiple systems&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/advisory/cve/cve-2026-33824-windows-ike-extension-unauthenticated-rce&quot;&gt;Read the full security advisory on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;This advisory is published by &lt;a href=&quot;https://www.yazoul.net/advisory&quot;&gt;Yazoul Security&lt;/a&gt; - Your trusted source for CVE intelligence and remediation guidance.&lt;/em&gt;&lt;/p&gt;</description><pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate><category>critical</category><category>CVE</category><category>Security</category><category>Vulnerability</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>CVE-2026-34457: Security Advisory: CVE-2026-34457</title><link>https://www.yazoul.net/advisory/cve/cve-2026-34457-oauth2-proxy-authentication-bypass-unauth</link><guid isPermaLink="true">https://www.yazoul.net/advisory/cve/cve-2026-34457-oauth2-proxy-authentication-bypass-unauth</guid><description>&lt;p&gt;&lt;strong&gt;CVE-2026-34457&lt;/strong&gt; - CRITICAL severity (CVSS 9.1)&lt;/p&gt;
&lt;p&gt;OAuth2 Proxy is a reverse proxy that provides authentication using OAuth2 providers. Versions prior to 7.15.2 contain a configuration-dependent authentication bypass in deployments where OAuth2 Proxy ...&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Affected Products:&lt;/strong&gt; Multiple systems&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/advisory/cve/cve-2026-34457-oauth2-proxy-authentication-bypass-unauth&quot;&gt;Read the full security advisory on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;This advisory is published by &lt;a href=&quot;https://www.yazoul.net/advisory&quot;&gt;Yazoul Security&lt;/a&gt; - Your trusted source for CVE intelligence and remediation guidance.&lt;/em&gt;&lt;/p&gt;</description><pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate><category>critical</category><category>CVE</category><category>Security</category><category>Vulnerability</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>CVE-2026-39399: Security Advisory: CVE-2026-39399</title><link>https://www.yazoul.net/advisory/cve/cve-2026-39399-nuget-gallery-rce-via-crafted-nuspec-file</link><guid isPermaLink="true">https://www.yazoul.net/advisory/cve/cve-2026-39399-nuget-gallery-rce-via-crafted-nuspec-file</guid><description>&lt;p&gt;&lt;strong&gt;CVE-2026-39399&lt;/strong&gt; - CRITICAL severity (CVSS 9.6)&lt;/p&gt;
&lt;p&gt;NuGet Gallery is a package repository that powers nuget.org. A security vulnerability exists in the NuGetGallery backend job’s handling of .nuspec files within NuGet packages. An attacker can supply a...&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Affected Products:&lt;/strong&gt; Multiple systems&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/advisory/cve/cve-2026-39399-nuget-gallery-rce-via-crafted-nuspec-file&quot;&gt;Read the full security advisory on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;This advisory is published by &lt;a href=&quot;https://www.yazoul.net/advisory&quot;&gt;Yazoul Security&lt;/a&gt; - Your trusted source for CVE intelligence and remediation guidance.&lt;/em&gt;&lt;/p&gt;</description><pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate><category>critical</category><category>CVE</category><category>Security</category><category>Vulnerability</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>CVE-2026-39808: Security Advisory: CVE-2026-39808</title><link>https://www.yazoul.net/advisory/cve/cve-2026-39808-fortisandbox-unauthenticated-command-injection</link><guid isPermaLink="true">https://www.yazoul.net/advisory/cve/cve-2026-39808-fortisandbox-unauthenticated-command-injection</guid><description>&lt;p&gt;&lt;strong&gt;CVE-2026-39808&lt;/strong&gt; - CRITICAL severity (CVSS 9.8)&lt;/p&gt;
&lt;p&gt;A improper neutralization of special elements used in an os command (&apos;os command injection&apos;) vulnerability in Fortinet FortiSandbox 4.4.0 through 4.4.8 may allow attacker to execute unauthorized code ...&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Affected Products:&lt;/strong&gt; Multiple systems&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/advisory/cve/cve-2026-39808-fortisandbox-unauthenticated-command-injection&quot;&gt;Read the full security advisory on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;This advisory is published by &lt;a href=&quot;https://www.yazoul.net/advisory&quot;&gt;Yazoul Security&lt;/a&gt; - Your trusted source for CVE intelligence and remediation guidance.&lt;/em&gt;&lt;/p&gt;</description><pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate><category>critical</category><category>CVE</category><category>Security</category><category>Vulnerability</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>CVE-2026-39813: Security Advisory: CVE-2026-39813</title><link>https://www.yazoul.net/advisory/cve/cve-2026-39813-fortisandbox-path-traversal-grants-admin</link><guid isPermaLink="true">https://www.yazoul.net/advisory/cve/cve-2026-39813-fortisandbox-path-traversal-grants-admin</guid><description>&lt;p&gt;&lt;strong&gt;CVE-2026-39813&lt;/strong&gt; - CRITICAL severity (CVSS 9.8)&lt;/p&gt;
&lt;p&gt;A path traversal: &apos;../filedir&apos; vulnerability in Fortinet FortiSandbox 5.0.0 through 5.0.5, FortiSandbox 4.4.0 through 4.4.8 may allow attacker to escalation of privilege via &lt;insert attack vector here...&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Affected Products:&lt;/strong&gt; Multiple systems&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/advisory/cve/cve-2026-39813-fortisandbox-path-traversal-grants-admin&quot;&gt;Read the full security advisory on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;This advisory is published by &lt;a href=&quot;https://www.yazoul.net/advisory&quot;&gt;Yazoul Security&lt;/a&gt; - Your trusted source for CVE intelligence and remediation guidance.&lt;/em&gt;&lt;/p&gt;</description><pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate><category>critical</category><category>CVE</category><category>Security</category><category>Vulnerability</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>CVE-2026-40288: Security Advisory: CVE-2026-40288</title><link>https://www.yazoul.net/advisory/cve/cve-2026-40288-praisonai-workflow-engine-unauthenticated-rce</link><guid isPermaLink="true">https://www.yazoul.net/advisory/cve/cve-2026-40288-praisonai-workflow-engine-unauthenticated-rce</guid><description>&lt;p&gt;&lt;strong&gt;CVE-2026-40288&lt;/strong&gt; - CRITICAL severity (CVSS 9.8)&lt;/p&gt;
&lt;p&gt;PraisonAI is a multi-agent teams system. In versions below 4.5.139 of PraisonAI and 1.5.140 of praisonaiagents, the workflow engine is vulnerable to arbitrary command and code execution through untrus...&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Affected Products:&lt;/strong&gt; Multiple systems&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/advisory/cve/cve-2026-40288-praisonai-workflow-engine-unauthenticated-rce&quot;&gt;Read the full security advisory on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;This advisory is published by &lt;a href=&quot;https://www.yazoul.net/advisory&quot;&gt;Yazoul Security&lt;/a&gt; - Your trusted source for CVE intelligence and remediation guidance.&lt;/em&gt;&lt;/p&gt;</description><pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate><category>critical</category><category>CVE</category><category>Security</category><category>Vulnerability</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>CVE-2026-40313: Security Advisory: CVE-2026-40313</title><link>https://www.yazoul.net/advisory/cve/cve-2026-40313-praisonai-leaks-github-tokens-in-public-artifacts</link><guid isPermaLink="true">https://www.yazoul.net/advisory/cve/cve-2026-40313-praisonai-leaks-github-tokens-in-public-artifacts</guid><description>&lt;p&gt;&lt;strong&gt;CVE-2026-40313&lt;/strong&gt; - CRITICAL severity (CVSS 9.1)&lt;/p&gt;
&lt;p&gt;PraisonAI is a multi-agent teams system. In versions 4.5.139 and below, the GitHub Actions workflows are vulnerable to ArtiPACKED attack, a known credential leakage vector caused by using actions/chec...&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Affected Products:&lt;/strong&gt; Multiple systems&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/advisory/cve/cve-2026-40313-praisonai-leaks-github-tokens-in-public-artifacts&quot;&gt;Read the full security advisory on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;This advisory is published by &lt;a href=&quot;https://www.yazoul.net/advisory&quot;&gt;Yazoul Security&lt;/a&gt; - Your trusted source for CVE intelligence and remediation guidance.&lt;/em&gt;&lt;/p&gt;</description><pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate><category>critical</category><category>CVE</category><category>Security</category><category>Vulnerability</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>CVE-2026-40289: Security Advisory: CVE-2026-40289</title><link>https://www.yazoul.net/advisory/cve/cve-2026-40289-praisonai-unauthenticated-remote-session-hijacking</link><guid isPermaLink="true">https://www.yazoul.net/advisory/cve/cve-2026-40289-praisonai-unauthenticated-remote-session-hijacking</guid><description>&lt;p&gt;&lt;strong&gt;CVE-2026-40289&lt;/strong&gt; - CRITICAL severity (CVSS 9.1)&lt;/p&gt;
&lt;p&gt;PraisonAI is a multi-agent teams system. In versions below 4.5.139 of PraisonAI and 1.5.140 of praisonaiagents, the browser bridge (praisonai browser start) is vulnerable to unauthenticated remote ses...&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Affected Products:&lt;/strong&gt; Multiple systems&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/advisory/cve/cve-2026-40289-praisonai-unauthenticated-remote-session-hijacking&quot;&gt;Read the full security advisory on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;This advisory is published by &lt;a href=&quot;https://www.yazoul.net/advisory&quot;&gt;Yazoul Security&lt;/a&gt; - Your trusted source for CVE intelligence and remediation guidance.&lt;/em&gt;&lt;/p&gt;</description><pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate><category>critical</category><category>CVE</category><category>Security</category><category>Vulnerability</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>CVE-2026-22562: Security Advisory: CVE-2026-22562</title><link>https://www.yazoul.net/advisory/cve/cve-2026-22562-unifi-play-path-traversal-to-rce-patch-now</link><guid isPermaLink="true">https://www.yazoul.net/advisory/cve/cve-2026-22562-unifi-play-path-traversal-to-rce-patch-now</guid><description>&lt;p&gt;&lt;strong&gt;CVE-2026-22562&lt;/strong&gt; - CRITICAL severity (CVSS 9.8)&lt;/p&gt;
&lt;p&gt;A malicious actor with access to the UniFi Play network could exploit a Path Traversal vulnerability found in the device firmware to write files on the system that could be used for a remote code exec...&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Affected Products:&lt;/strong&gt; Multiple systems&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/advisory/cve/cve-2026-22562-unifi-play-path-traversal-to-rce-patch-now&quot;&gt;Read the full security advisory on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;This advisory is published by &lt;a href=&quot;https://www.yazoul.net/advisory&quot;&gt;Yazoul Security&lt;/a&gt; - Your trusted source for CVE intelligence and remediation guidance.&lt;/em&gt;&lt;/p&gt;</description><pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate><category>critical</category><category>CVE</category><category>Security</category><category>Vulnerability</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>CVE-2026-25208: Security Advisory: CVE-2026-25208</title><link>https://www.yazoul.net/advisory/cve/cve-2026-25208-samsung-escargot-buffer-overflow</link><guid isPermaLink="true">https://www.yazoul.net/advisory/cve/cve-2026-25208-samsung-escargot-buffer-overflow</guid><description>&lt;p&gt;&lt;strong&gt;CVE-2026-25208&lt;/strong&gt; - HIGH severity (CVSS 8.1)&lt;/p&gt;
&lt;p&gt;Integer overflow vulnerability in Samsung Open Source Escargot allows Overflow Buffers.This issue affects Escargot: 97e8115ab1110bc502b4b5e4a0c689a71520d335....&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Affected Products:&lt;/strong&gt; Multiple systems&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/advisory/cve/cve-2026-25208-samsung-escargot-buffer-overflow&quot;&gt;Read the full security advisory on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;This advisory is published by &lt;a href=&quot;https://www.yazoul.net/advisory&quot;&gt;Yazoul Security&lt;/a&gt; - Your trusted source for CVE intelligence and remediation guidance.&lt;/em&gt;&lt;/p&gt;</description><pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate><category>high</category><category>CVE</category><category>Security</category><category>Vulnerability</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>CVE-2026-28291: Security Advisory: CVE-2026-28291</title><link>https://www.yazoul.net/advisory/cve/cve-2026-28291-simple-git-arbitrary-command-execution</link><guid isPermaLink="true">https://www.yazoul.net/advisory/cve/cve-2026-28291-simple-git-arbitrary-command-execution</guid><description>&lt;p&gt;&lt;strong&gt;CVE-2026-28291&lt;/strong&gt; - HIGH severity (CVSS 8.1)&lt;/p&gt;
&lt;p&gt;simple-git enables running native Git commands from JavaScript. Versions up to and including 3.31.1 allow execution of arbitrary commands through Git option manipulation, bypassing safety checks meant...&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Affected Products:&lt;/strong&gt; Multiple systems&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/advisory/cve/cve-2026-28291-simple-git-arbitrary-command-execution&quot;&gt;Read the full security advisory on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;This advisory is published by &lt;a href=&quot;https://www.yazoul.net/advisory&quot;&gt;Yazoul Security&lt;/a&gt; - Your trusted source for CVE intelligence and remediation guidance.&lt;/em&gt;&lt;/p&gt;</description><pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate><category>high</category><category>CVE</category><category>Security</category><category>Vulnerability</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>CVE-2026-33858: Security Advisory: CVE-2026-33858</title><link>https://www.yazoul.net/advisory/cve/cve-2026-33858-airflow-webserver-code-execution-by-dag-authors</link><guid isPermaLink="true">https://www.yazoul.net/advisory/cve/cve-2026-33858-airflow-webserver-code-execution-by-dag-authors</guid><description>&lt;p&gt;&lt;strong&gt;CVE-2026-33858&lt;/strong&gt; - HIGH severity (CVSS 8.8)&lt;/p&gt;
&lt;p&gt;Dag Authors, who normally should not be able to execute code in the webserver context could craft XCom payload causing the webserver to execute arbitrary code. Since Dag Authors are already highly tru...&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Affected Products:&lt;/strong&gt; Multiple systems&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/advisory/cve/cve-2026-33858-airflow-webserver-code-execution-by-dag-authors&quot;&gt;Read the full security advisory on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;This advisory is published by &lt;a href=&quot;https://www.yazoul.net/advisory&quot;&gt;Yazoul Security&lt;/a&gt; - Your trusted source for CVE intelligence and remediation guidance.&lt;/em&gt;&lt;/p&gt;</description><pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate><category>high</category><category>CVE</category><category>Security</category><category>Vulnerability</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>CVE-2026-35337: Security Advisory: CVE-2026-35337</title><link>https://www.yazoul.net/advisory/cve/cve-2026-35337-storm-rce-via-kerberos-credential-deserialization</link><guid isPermaLink="true">https://www.yazoul.net/advisory/cve/cve-2026-35337-storm-rce-via-kerberos-credential-deserialization</guid><description>&lt;p&gt;&lt;strong&gt;CVE-2026-35337&lt;/strong&gt; - HIGH severity (CVSS 8.8)&lt;/p&gt;
&lt;p&gt;Deserialization of Untrusted Data vulnerability in Apache Storm.
Versions Affected: before 2.8.6.

Description: When processing topology credentials submitted via the Nimbus Thrift API, Storm deseri...&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Affected Products:&lt;/strong&gt; Multiple systems&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/advisory/cve/cve-2026-35337-storm-rce-via-kerberos-credential-deserialization&quot;&gt;Read the full security advisory on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;This advisory is published by &lt;a href=&quot;https://www.yazoul.net/advisory&quot;&gt;Yazoul Security&lt;/a&gt; - Your trusted source for CVE intelligence and remediation guidance.&lt;/em&gt;&lt;/p&gt;</description><pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate><category>high</category><category>CVE</category><category>Security</category><category>Vulnerability</category><author>Yazoul Security (contact@yazoul.net)</author></item></channel></rss>