Latest CVE Feed

Vulnerabilities published in the last 30 days. Filter by severity, exploit status, or attack vector.

Score
Vulnerability
Published
6.5 MEDIUM
CVE-2026-8344 — D-Link DIR-816 formDMZ.cgi sub_445E7C command injection

A weakness has been identified in D-Link DIR-816 1.10CNB05_R1B011D88210. Affected by this vulnerability is the function sub_445E7C of the file /goform/formDMZ.cgi. This manipulation causes command in…

Remote | Injection
May 11, 2026 May 11, 2026
May 11, 2026
May 11, 2026
0.0 NA
CVE-2026-7010 — HTTP::Tiny versions before 0.093 for Perl do not validate CRLF in HTTP request lines or c…

HTTP::Tiny versions before 0.093 for Perl do not validate CRLF in HTTP request lines or control field header values. The unvalidated inputs are the method and URI in the request line, the URL host t…

| Injection
May 11, 2026 May 11, 2026
May 11, 2026
May 11, 2026
5.8 MEDIUM
CVE-2026-44695 — Outline: Slack OAuth state can link a victim Outline account to an attacker Slack identity

Outline is a service that allows for collaborative documentation. Prior to 1.7.1, the Slack integration callback for GET /auth/slack.post accepts an unsigned, session-independent OAuth state value. A…

Remote | Authentication
May 11, 2026 May 11, 2026
May 11, 2026
May 11, 2026
8.7 HIGH
CVE-2026-43897 — Link Preview JS: vunerable to IPv6 and internal loopback attacks

Link Preview JS extracts web links information. Prior to 4.0.1, the library did not check for IPv6 loopback attacks. There was also a DNS attack, where an address could be resolved into an internal I…

link-preview-js | Remote | Server-Side Request Forgery
May 11, 2026 May 11, 2026
May 11, 2026
May 11, 2026
8.2 HIGH
CVE-2026-43893 — exiftool-vendored: Argument injection via newline characters in tag names

exiftool-vendored provides cross-platform Node.js access to ExifTool. Prior to 35.19.0, exiftool-vendored starts ExifTool in -stay_open True -@ - mode, where arguments are read from stdin one per lin…

Remote | Injection
May 11, 2026 May 11, 2026
May 11, 2026
May 11, 2026
7.7 HIGH
CVE-2026-43890 — Outline: IDOR in subscriptions.create allows cross-tenant subscription on private documen…

Outline is a service that allows for collaborative documentation. From 0.84.0 to 1.7.0, the subscriptions.create API endpoint in server/routes/api/subscriptions/subscriptions.ts exhibits a broken aut…

Remote | Authorization
May 11, 2026 May 11, 2026
May 11, 2026
May 11, 2026
6.5 MEDIUM
CVE-2026-43889 — Outline: Unauthorized Document Publication via Mixed collectionId+documentId Share

Outline is a service that allows for collaborative documentation. Prior to 1.7.0, the shares.create API accepts both collectionId and documentId simultaneously and, when published=false, only verifie…

Remote | Authorization
May 11, 2026 May 11, 2026
May 11, 2026
May 11, 2026
8.7 HIGH
CVE-2026-43888 — Outline: Zip Extraction Path Escape via PATH_MAX Truncation in Collection Import

Outline is a service that allows for collaborative documentation. Prior to 1.7.0, ZipHelper.extract computes the extraction path for each entry by passing a full filesystem path through trimFileAndEx…

Remote | Path Traversal
May 11, 2026 May 11, 2026
May 11, 2026
May 11, 2026
7.3 HIGH
CVE-2026-43887 — Outline: Stored XSS via Comment Mentions

Outline is a service that allows for collaborative documentation. From 0.84.0 to 1.6.1, the Outline comment section permits users to mention other users; however, the backend does not validate or san…

Remote | Cross-Site Scripting
May 11, 2026 May 11, 2026
May 11, 2026
May 11, 2026
8.2 HIGH
CVE-2026-43886 — Outline: OAuth Scope Validation Logic Error Allows Privilege Escalation to Wildcard API A…

Outline is a service that allows for collaborative documentation. From 0.84.0 to 1.6.1, a logic error in OAuthInterface.validateScope() uses Array.some() to validate requested OAuth scopes, causing t…

Remote | Authorization
May 11, 2026 May 11, 2026
May 11, 2026
May 11, 2026
7.7 HIGH
CVE-2026-43885 — WWBN AVideo: Exposure of Sensitive Information to an Unauthorized Actor and Missing Autho…

WWBN AVideo is an open source video platform. In versions up to and including 29.0, an unauthenticated user can read APISecret from objects/plugins.json.php and use it to call protected API endpoints…

avideo | Remote | Authentication
May 11, 2026 May 11, 2026
May 11, 2026
May 11, 2026
7.7 HIGH
CVE-2026-43884 — WWBN AVideo: SSRF Protection Bypass via HTTP Redirect and DNS Rebinding in isSSRFSafeURL()

WWBN AVideo is an open source video platform. In versions up to and including 29.0, two endpoints (plugin/AI/receiveAsync.json.php and objects/EpgParser.php) in AVideo call isSSRFSafeURL() to validat…

avideo | Remote | Server-Side Request Forgery
May 11, 2026 May 11, 2026
May 11, 2026
May 11, 2026
4.2 MEDIUM
CVE-2026-43883 — WWBN AVideo: IDOR in PayPalYPT agreementCancel.json.php Allows Any Authenticated User to …

WWBN AVideo is an open source video platform. In versions up to and including 29.0, plugin/PayPalYPT/agreementCancel.json.php cancels a PayPal billing agreement using an attacker-supplied agreement p…

avideo | Remote | Authorization
May 11, 2026 May 11, 2026
May 11, 2026
May 11, 2026
4.3 MEDIUM
CVE-2026-43882 — WWBN AVideo: Unauthenticated CRLF/ICS Injection in Scheduler downloadICS.php Allows Calen…

WWBN AVideo is an open source video platform. In versions up to and including 29.0, the unauthenticated plugin/Scheduler/downloadICS.php endpoint passes attacker-controlled title, description, and jo…

avideo | Remote | Injection
May 11, 2026 May 11, 2026
May 11, 2026
May 11, 2026
5.3 MEDIUM
CVE-2026-43881 — WWBN AVideo: Unauthenticated User Enumeration in `objects/users.json.php` via `isCompany`…

WWBN AVideo is an open source video platform. In versions up to and including 29.0, objects/users.json.php exposes two unauthenticated paths that disclose the full set of registered user accounts. Th…

avideo | Remote | Information Disclosure
May 11, 2026 May 11, 2026
May 11, 2026
May 11, 2026
5.3 MEDIUM
CVE-2026-43880 — WWBN AVideo: Unauthenticated Arbitrary Email Sending via sendEmail.json.php Allows Phishi…

WWBN AVideo is an open source video platform. In versions up to and including 29.0, objects/sendEmail.json.php exposes two branches depending on whether contactForm=1 is submitted. When the parameter…

avideo | Remote | Authentication
May 11, 2026 May 11, 2026
May 11, 2026
May 11, 2026
5.4 MEDIUM
CVE-2026-43879 — WWBN AVideo: Blind SSRF in YPTWallet Donation Webhook via Missing isSSRFSafeURL() Check a…

WWBN AVideo is an open source video platform. In versions up to and including 29.0, an authenticated user can configure their own donation-notification webhook URL to point at internal/loopback/metad…

avideo | Remote | Server-Side Request Forgery
May 11, 2026 May 11, 2026
May 11, 2026
May 11, 2026
6.1 MEDIUM
CVE-2026-43878 — WWBN AVideo: Reflected XSS in plugin/Meet/iframe.php via Unescaped `user`/`pass` Paramete…

WWBN AVideo is an open source video platform. In versions up to and including 29.0, plugin/Meet/iframe.php echoes the attacker-controlled user and pass query parameters unescaped into a JavaScript do…

avideo | Remote | Cross-Site Scripting
May 11, 2026 May 11, 2026
May 11, 2026
May 11, 2026
5.4 MEDIUM
CVE-2026-43877 — WWBN AVideo: CSRF in userSavePhoto.php Allows Cross-Origin Overwrite of Any Logged-in Use…

WWBN AVideo is an open source video platform. In versions up to and including 29.0, objects/userSavePhoto.php is a legacy profile-photo endpoint that accepts a base64 POST parameter and writes the de…

avideo | Remote | Cross-Site Request Forgery
May 11, 2026 May 11, 2026
May 11, 2026
May 11, 2026
6.4 MEDIUM
CVE-2026-43876 — WWBN AVideo: HTML Injection in notifySubscribers.json.php Enables Platform-Branded Phishi…

WWBN AVideo is an open source video platform. In versions up to and including 29.0, objects/notifySubscribers.json.php takes the raw message POST parameter and passes it into sendSiteEmail(), which s…

avideo | Remote | Cross-Site Scripting
May 11, 2026 May 11, 2026
May 11, 2026
May 11, 2026
Showing 20 of 5787 Results