6.5

CVSS3.1

CVE-2026-29647 - OpenXiangShan NEMU Cross-Context IMSIC State Leakage

In OpenXiangShan NEMU, insufficient Smstateen permission enforcement allows lower-privileged code to access IMSIC state via stopei/vstopei CSRs even when mstateen0.IMSIC is cleared, potentially enabling cross-context information leakage or disruption of interrupt handling.

📅 Published: April 20, 2026, midnight 🔄 Last Modified: April 22, 2026, 7:45 a.m.

0.0

CVE-2025-66954 -

A vulnerability exists in the Buffalo Link Station version 1.85-0.01 that allows unauthenticated or guest-level users to enumerate valid usernames and their associated privilege roles. The issue is triggered by modifying a parameter within requests sent to the /nasapi endpoint.

📅 Published: April 20, 2026, midnight 🔄 Last Modified: April 20, 2026, 4:27 p.m.

7.5

CVSS3.1

CVE-2026-29645 -

NEMU (OpenXiangShan/NEMU) before v2025.12.r2 contains an improper instruction-validation flaw in its RISC-V Vector (RVV) decoder. The decoder does not correctly validate the funct3 field when decoding vsetvli/vsetivli/vsetvl, allowing certain invalid OP-V instruction encodings to be misinterpreted …

📅 Published: April 20, 2026, midnight 🔄 Last Modified: April 22, 2026, 7:45 a.m.

9.8

CVSS3.1

CVE-2026-29646 - Privilege and Virtualization Isolation Breach in OpenXiangShan NEMU

In OpenXiangShan NEMU prior to 55295c4, when running with RVH (Hypervisor extension) enabled, a VS-mode guest write to the supervisor interrupt-enable CSR (sie) may be handled incorrectly and can influence machine-level interrupt enable state (mie). This breaks privilege/virtualization isolation an…

📅 Published: April 20, 2026, midnight 🔄 Last Modified: April 22, 2026, 8:15 a.m.

7.8

CVSS3.1

CVE-2026-29642 - Privilege Escalation via Status Register Tampering on XiangShan RISC‑V Processors

A local attacker who can execute privileged CSR operations (or can induce firmware to do so) performs carefully crafted reads/writes to menvcfg (e.g., csrrs in M-mode). On affected XiangShan versions (commit aecf601e803bfd2371667a3fb60bfcd83c333027, 2024-11-19), these menvcfg accesses can unexpecte…

📅 Published: April 20, 2026, midnight 🔄 Last Modified: April 22, 2026, 7:45 a.m.

5.3

CVSS3.1

CVE-2026-26399 - Stack‑Use‑After‑Return in Arduino_Core_STM32 Causes Memory Corruption

A stack-use-after-return issue exists in the Arduino_Core_STM32 library prior to version 1.7.0. The pwm_start() function allocates a TIM_HandleTypeDef structure on the stack and passes its address to HAL initialization routines, where it is stored in a global timer handle registry. After the functi…

📅 Published: April 20, 2026, midnight 🔄 Last Modified: April 22, 2026, 9:16 p.m.

9.9

CVSS3.1

CVE-2026-30269 - Doorman Improper Access Control Allows Privilege Escalation

Improper access control in Doorman v0.1.0 and v1.0.2 allows any authenticated user to update their own account role to a non-admin privileged role via /platform/user/{username}. The `role` field is accepted by the update model without a manage_users permission check for self-updates, enabling privi…

📅 Published: April 20, 2026, midnight 🔄 Last Modified: April 22, 2026, 3:45 a.m.

6.6

CVSS3.1

CVE-2026-31429 - net: skb: fix cross-cache free of KFENCE-allocated skb head

In the Linux kernel, the following vulnerability has been resolved: net: skb: fix cross-cache free of KFENCE-allocated skb head SKB_SMALL_HEAD_CACHE_SIZE is intentionally set to a non-power-of-2 value (e.g. 704 on x86_64) to avoid collisions with generic kmalloc bucket sizes. This ensures that sk…

📅 Published: April 20, 2026, midnight 🔄 Last Modified: April 23, 2026, 4:17 p.m.

5.3

CVSS4.0

CVE-2026-6586 - TransformerOptimus SuperAGI Budget Endpoint budget.py update_budget authorization

A vulnerability was identified in TransformerOptimus SuperAGI up to 0.0.14. Impacted is the function get_budget/update_budget of the file superagi/controllers/budget.py of the component Budget Endpoint. Such manipulation leads to authorization bypass. It is possible to launch the attack remotely. T…

📅 Published: April 19, 2026, 11:45 p.m. 🔄 Last Modified: April 19, 2026, 11:45 p.m.

5.3

CVSS4.0

CVE-2026-6585 - TransformerOptimus SuperAGI Organisation Update Endpoint organisation.py update_organisation author…

A vulnerability was determined in TransformerOptimus SuperAGI up to 0.0.14. This issue affects the function update_organisation of the file superagi/controllers/organisation.py of the component Organisation Update Endpoint. This manipulation of the argument organisation_id causes authorization bypa…

📅 Published: April 19, 2026, 11:30 p.m. 🔄 Last Modified: April 19, 2026, 11:30 p.m.
Total resulsts: 346179
Page 99 of 34,618
« previous page » next page
Filters