8.8

CVSS3.1

CVE-2026-38529 - Authenticated Password Reset via Broken Object-Level Authorization in Webkul Krayin CRM

A Broken Object-Level Authorization (BOLA) in the /Settings/UserController.php endpoint of Webkul Krayin CRM v2.2.x allows authenticated attackers to arbitrarily reset user passwords and perform a full account takeover via supplying a crafted HTTP request.

πŸ“… Published: April 14, 2026, midnight πŸ”„ Last Modified: April 14, 2026, 6:17 p.m.

2.7

CVSS3.1

CVE-2026-37600 - SQL Injection in Admin Appointment View Details of Patient Appointment Scheduler System v1.0

SourceCodester Patient Appointment Scheduler System v1.0 is vulnerable to SQL Injection in the file /scheduler/admin/appointments/view_details.php.

πŸ“… Published: April 14, 2026, midnight πŸ”„ Last Modified: April 14, 2026, 4:31 p.m.

0.0

CVE-2026-30480 -

A Local File Inclusion (LFI) vulnerability in the NFSen module (nfsen.inc.php) of LibreNMS 22.11.0-23-gd091788f2 allows authenticated attackers to include arbitrary PHP files from the server filesystem via path traversal sequences in the nfsen parameter.

πŸ“… Published: April 14, 2026, midnight πŸ”„ Last Modified: April 14, 2026, 4:16 p.m.

8.1

CVSS3.1

CVE-2026-38532 -

A Broken Object-Level Authorization (BOLA) in the /Contact/Persons/PersonController.php endpoint of Webkul Krayin CRM v2.2.x allows authenticated attackers to arbitrarily read, modify, and permanently delete any contact owned by other users via supplying a crafted GET request.

πŸ“… Published: April 14, 2026, midnight πŸ”„ Last Modified: April 14, 2026, 6:17 p.m.

5.3

CVSS3.1

CVE-2026-34069 - nimiq-consensus panics via RequestMacroChain micro-block locator

nimiq/core-rs-albatross is a Rust implementation of the Nimiq Proof-of-Stake protocol based on the Albatross consensus algorithm. In versions 1.2.2 and below, an unauthenticated p2p peer can cause the RequestMacroChain message handler task to panic. Sending a RequestMacroChain message where the fir…

πŸ“… Published: April 13, 2026, 11:55 p.m. πŸ”„ Last Modified: April 14, 2026, 12:16 a.m.

2.9

CVSS4.0

CVE-2026-33948 - jq: Embedded-NUL Truncation in CLI JSON Input Path Causes Prefix-Only Validation of Malformed Input

jq is a command-line JSON processor. Commits before 6374ae0bcdfe33a18eb0ae6db28493b1f34a0a5b contain a vulnerability where CLI input parsing allows validation bypass via embedded NUL bytes. When reading JSON from files or stdin, jq uses strlen() to determine buffer length instead of the actual byte…

πŸ“… Published: April 13, 2026, 11:51 p.m. πŸ”„ Last Modified: April 14, 2026, 4:32 p.m.

7.5

CVSS3.1

CVE-2026-40164 - jq: Algorithmic complexity DoS via hardcoded MurmurHash3 seed

jq is a command-line JSON processor. Before commit 0c7d133c3c7e37c00b6d46b658a02244fdd3c784, jq used MurmurHash3 with a hardcoded, publicly visible seed (0x432A9843) for all JSON object hash table operations, which allowed an attacker to precompute key collisions offline. By supplying a crafted JSO…

πŸ“… Published: April 13, 2026, 11:40 p.m. πŸ”„ Last Modified: April 14, 2026, 7:27 p.m.

0.0

CVE-2026-5086 - Crypt::SecretBuffer versions before 0.019 for Perl is suseceptible to timing attacks

Crypt::SecretBuffer versions before 0.019 for Perl is suseceptible to timing attacks. For example, if Crypt::SecretBuffer was used to store and compare plaintext passwords, then discrepencies in timing could be used to guess the secret password.

πŸ“… Published: April 13, 2026, 10:54 p.m. πŸ”„ Last Modified: April 14, 2026, 1:34 a.m.

6.1

CVSS3.1

CVE-2026-6203 - User Registration & Membership <= 5.1.4 - Unauthenticated Open Redirect via 'redirect_to_on_logout'…

The User Registration & Membership plugin for WordPress is vulnerable to Open Redirect in versions up to and including 5.1.4. This is due to insufficient validation of user-supplied URLs passed via the 'redirect_to_on_logout' GET parameter before redirecting users. The `redirect_to_on_logout` GET p…

πŸ“… Published: April 13, 2026, 10:25 p.m. πŸ”„ Last Modified: April 14, 2026, 4:32 p.m.

6.9

CVSS4.0

CVE-2026-39979 - jq: Out-of-Bounds Read in jv_parse_sized() Error Formatting for Non-NUL-Terminated Counted Buffers

jq is a command-line JSON processor. In commits before 2f09060afab23fe9390cce7cb860b10416e1bf5f, the jv_parse_sized() API in libjq accepts a counted buffer with an explicit length parameter, but its error-handling path formats the input buffer using %s in jv_string_fmt(), which reads until a NUL te…

πŸ“… Published: April 13, 2026, 10:18 p.m. πŸ”„ Last Modified: April 14, 2026, 4:32 p.m.
Total resulsts: 344680
Page 48 of 34,468
Β« previous page Β» next page
Filters