7.8

CVSS3.1

CVE-2026-30266 - Local Arbitrary Code Execution via Insecure Permissions in DeepCool DeepCreative

Insecure Permissions vulnerability in DeepCool DeepCreative v.1.2.12 and before allows a local attacker to execute arbitrary code via a crafted file

๐Ÿ“… Published: April 20, 2026, midnight ๐Ÿ”„ Last Modified: April 23, 2026, 1:40 p.m.

7.1

CVSS3.1

CVE-2026-29643 - Improper Exception Handling in XiangShan CSR Subsystem Allows Local Denial of Service

XiangShan (Open-source high-performance RISC-V processor) commit edb1dfaf7d290ae99724594507dc46c2c2125384 (2024-11-28) contains an improper exceptional-condition handling flaw in its CSR subsystem (NewCSR). On affected versions, certain sequences of CSR operations targeting non-existent/custom CSR โ€ฆ

๐Ÿ“… Published: April 20, 2026, midnight ๐Ÿ”„ Last Modified: April 22, 2026, 6 a.m.

9.8

CVSS3.1

CVE-2026-29649 -

NEMU contains an implementation flaw in its RISC-V Hypervisor CSR handling where henvcfg[7:4] (CBIE/CBCFE/CBZE-related fields) is incorrectly masked/updated based on menvcfg[7:4], so a machine-mode write to menvcfg can implicitly modify the hypervisor's environment configuration. This can lead to iโ€ฆ

๐Ÿ“… Published: April 20, 2026, midnight ๐Ÿ”„ Last Modified: April 22, 2026, 9 a.m.

6.5

CVSS3.1

CVE-2026-29647 - OpenXiangShan NEMU Cross-Context IMSIC State Leakage

In OpenXiangShan NEMU, insufficient Smstateen permission enforcement allows lower-privileged code to access IMSIC state via stopei/vstopei CSRs even when mstateen0.IMSIC is cleared, potentially enabling cross-context information leakage or disruption of interrupt handling.

๐Ÿ“… Published: April 20, 2026, midnight ๐Ÿ”„ Last Modified: April 22, 2026, 7:45 a.m.

0.0

CVE-2025-66954 -

A vulnerability exists in the Buffalo Link Station version 1.85-0.01 that allows unauthenticated or guest-level users to enumerate valid usernames and their associated privilege roles. The issue is triggered by modifying a parameter within requests sent to the /nasapi endpoint.

๐Ÿ“… Published: April 20, 2026, midnight ๐Ÿ”„ Last Modified: April 20, 2026, 4:27 p.m.

7.5

CVSS3.1

CVE-2026-29645 -

NEMU (OpenXiangShan/NEMU) before v2025.12.r2 contains an improper instruction-validation flaw in its RISC-V Vector (RVV) decoder. The decoder does not correctly validate the funct3 field when decoding vsetvli/vsetivli/vsetvl, allowing certain invalid OP-V instruction encodings to be misinterpreted โ€ฆ

๐Ÿ“… Published: April 20, 2026, midnight ๐Ÿ”„ Last Modified: April 22, 2026, 7:45 a.m.

9.8

CVSS3.1

CVE-2026-29646 - Privilege and Virtualization Isolation Breach in OpenXiangShan NEMU

In OpenXiangShan NEMU prior to 55295c4, when running with RVH (Hypervisor extension) enabled, a VS-mode guest write to the supervisor interrupt-enable CSR (sie) may be handled incorrectly and can influence machine-level interrupt enable state (mie). This breaks privilege/virtualization isolation anโ€ฆ

๐Ÿ“… Published: April 20, 2026, midnight ๐Ÿ”„ Last Modified: April 22, 2026, 8:15 a.m.

7.8

CVSS3.1

CVE-2026-29642 - Privilege Escalation via Status Register Tampering on XiangShan RISCโ€‘V Processors

A local attacker who can execute privileged CSR operations (or can induce firmware to do so) performs carefully crafted reads/writes to menvcfg (e.g., csrrs in M-mode). On affected XiangShan versions (commit aecf601e803bfd2371667a3fb60bfcd83c333027, 2024-11-19), these menvcfg accesses can unexpecteโ€ฆ

๐Ÿ“… Published: April 20, 2026, midnight ๐Ÿ”„ Last Modified: April 22, 2026, 7:45 a.m.

5.3

CVSS3.1

CVE-2026-26399 - Stackโ€‘Useโ€‘Afterโ€‘Return in Arduino_Core_STM32 Causes Memory Corruption

A stack-use-after-return issue exists in the Arduino_Core_STM32 library prior to version 1.7.0. The pwm_start() function allocates a TIM_HandleTypeDef structure on the stack and passes its address to HAL initialization routines, where it is stored in a global timer handle registry. After the functiโ€ฆ

๐Ÿ“… Published: April 20, 2026, midnight ๐Ÿ”„ Last Modified: April 22, 2026, 9:16 p.m.

9.9

CVSS3.1

CVE-2026-30269 - Doorman Improper Access Control Allows Privilege Escalation

Improper access control in Doorman v0.1.0 and v1.0.2 allows any authenticated user to update their own account role to a non-admin privileged role via /platform/user/{username}. The `role` field is accepted by the update model without a manage_users permission check for self-updates, enabling priviโ€ฆ

๐Ÿ“… Published: April 20, 2026, midnight ๐Ÿ”„ Last Modified: April 22, 2026, 3:45 a.m.
Total resulsts: 346442
Page 125 of 34,645
ยซ previous page ยป next page
Filters