8.1

CVSS3.1

CVE-2026-38532 - Webkul Krayin CRM v2.2.x BOLA Enables Authenticated Users to Read, Modify, or Delete Other Users' C…

A Broken Object-Level Authorization (BOLA) in the /Contact/Persons/PersonController.php endpoint of Webkul Krayin CRM v2.2.x allows authenticated attackers to arbitrarily read, modify, and permanently delete any contact owned by other users via supplying a crafted GET request.

πŸ“… Published: April 14, 2026, midnight πŸ”„ Last Modified: April 17, 2026, 3:38 p.m.

8.1

CVSS3.1

CVE-2026-38530 - Broken Object‑Level Authorization in Webkul Krayin CRM Exposes Lead Data

A Broken Object-Level Authorization (BOLA) in the /Controllers/Lead/LeadController.php endpoint of Webkul Krayin CRM v2.2.x allows authenticated attackers to arbitrarily read, modify, and permanently delete any lead owned by other users via supplying a crafted GET request.

πŸ“… Published: April 14, 2026, midnight πŸ”„ Last Modified: April 17, 2026, 3:38 p.m.

2.7

CVSS3.1

CVE-2026-37594 -

SourceCodester Online Employees Work From Home Attendance System v1.0 is vulnerable to SQL Injection in the file /wfh_attendance/admin/view_employee.php.

πŸ“… Published: April 14, 2026, midnight πŸ”„ Last Modified: April 17, 2026, 3:32 p.m.

9.8

CVSS3.1

CVE-2025-65133 -

A SQL injection vulnerability exists in the School Management System (version 1.0) by manikandan580. An unauthenticated or authenticated remote attacker can supply a crafted HTTP request to the affected endpoint to manipulate SQL query logic and extract sensitive database information.

πŸ“… Published: April 14, 2026, midnight πŸ”„ Last Modified: April 17, 2026, 3:33 p.m.

4.6

CVSS3.1

CVE-2025-69893 - Side-Channel Vulnerability in BIP-39 Mnemonic Processing on Trezor Wallets Enables Mnemonic Exposure

A side-channel vulnerability exists in the implementation of BIP-39 mnemonic processing, as observed in Trezor One v1.13.0 to v1.14.0, Trezor T v1.13.0 to v1.14.0, and Trezor Safe v1.13.0 to v1.14.0 hardware wallets. This originates from the BIP-39 standard guidelines, which induce non-constant tim…

πŸ“… Published: April 14, 2026, midnight πŸ”„ Last Modified: April 18, 2026, 9:30 a.m.

8.8

CVSS3.1

CVE-2026-38529 - Broken Object-Level Authorization Allows Authenticated Password Reset and Account Takeover

A Broken Object-Level Authorization (BOLA) in the /Settings/UserController.php endpoint of Webkul Krayin CRM v2.2.x allows authenticated attackers to arbitrarily reset user passwords and perform a full account takeover via supplying a crafted HTTP request.

πŸ“… Published: April 14, 2026, midnight πŸ”„ Last Modified: April 17, 2026, 3:38 p.m.

8.7

CVSS4.0

CVE-2026-35469 - SpdyStream: DOS on CRI

spdystream is a Go library for multiplexing streams over SPDY connections. In versions 0.5.0 and below, the SPDY/3 frame parser does not validate attacker-controlled counts and lengths before allocating memory. Three allocation paths are affected: the SETTINGS frame entry count, the header count in…

πŸ“… Published: April 13, 2026, 11:59 p.m. πŸ”„ Last Modified: April 17, 2026, 3:38 p.m.

5.3

CVSS3.1

CVE-2026-34069 - nimiq-consensus panics via RequestMacroChain micro-block locator

nimiq/core-rs-albatross is a Rust implementation of the Nimiq Proof-of-Stake protocol based on the Albatross consensus algorithm. In versions 1.2.2 and below, an unauthenticated p2p peer can cause the RequestMacroChain message handler task to panic. Sending a RequestMacroChain message where the fir…

πŸ“… Published: April 13, 2026, 11:55 p.m. πŸ”„ Last Modified: April 17, 2026, 3:26 p.m.

2.9

CVSS4.0

CVE-2026-33948 - jq: Embedded-NUL Truncation in CLI JSON Input Path Causes Prefix-Only Validation of Malformed Input

jq is a command-line JSON processor. Commits before 6374ae0bcdfe33a18eb0ae6db28493b1f34a0a5b contain a vulnerability where CLI input parsing allows validation bypass via embedded NUL bytes. When reading JSON from files or stdin, jq uses strlen() to determine buffer length instead of the actual byte…

πŸ“… Published: April 13, 2026, 11:51 p.m. πŸ”„ Last Modified: April 21, 2026, 11:48 p.m.

7.5

CVSS3.1

CVE-2026-40164 - jq: Algorithmic complexity DoS via hardcoded MurmurHash3 seed

jq is a command-line JSON processor. Before commit 0c7d133c3c7e37c00b6d46b658a02244fdd3c784, jq used MurmurHash3 with a hardcoded, publicly visible seed (0x432A9843) for all JSON object hash table operations, which allowed an attacker to precompute key collisions offline. By supplying a crafted JSO…

πŸ“… Published: April 13, 2026, 11:40 p.m. πŸ”„ Last Modified: April 17, 2026, 3:26 p.m.
Total resulsts: 346094
Page 186 of 34,610
Β« previous page Β» next page
Filters