|
901
|
- |
|
-
|
-
|
Incorrect Default Permissions in pcvisit service binary on Windows allows a low-privileged local attacker to escalate their privileges by overwriting the service binary with arbitrary contents. This …
New
|
CWE-276
Incorrect Default Permissions
|
CVE-2026-0539
|
2026-04-23 06:23 |
2026-04-22 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
902
|
6.5 |
MEDIUM
Network
|
-
|
-
|
Insufficient validation of Chrome extension identifiers in Raindrop.io Bookmark Manager Web App 5.6.76.0 allows attackers to obtain sensitive user data via a crafted request.
New
|
CWE-20 CWE-284
Improper Input Validation Improper Access Control
|
CVE-2026-31192
|
2026-04-23 06:23 |
2026-04-22 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
903
|
5.3 |
MEDIUM
Network
|
-
|
-
|
An attacker can create a large number of concurrent DoQ or DoH3 connections, causing unlimited memory allocation in DNSdist and leading to a denial of service. DOQ and DoH3 are disabled by default.
New
|
CWE-770
Allocation of Resources Without Limits or Throttling
|
CVE-2026-33254
|
2026-04-23 06:23 |
2026-04-22 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
904
|
6.5 |
MEDIUM
Network
|
-
|
-
|
An operator allowed to use the REST API can cause the Authoritative server to produce invalid HTTPS or SVCB record data, which can in turn cause LMDB database corruption, if using the LMDB backend.
New
|
CWE-190
Integer Overflow or Wraparound
|
CVE-2026-33611
|
2026-04-23 06:23 |
2026-04-22 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
905
|
- |
|
-
|
-
|
Inadequate access control in the registration process in Fullstep V5, which could allow unauthenticated users to obtain a valid JWT token with which to interact with authenticated API resources. Succ…
New
|
CWE-306
Missing Authentication for Critical Function
|
CVE-2026-5749
|
2026-04-23 06:23 |
2026-04-22 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
906
|
- |
|
-
|
-
|
An insecure direct object reference (IDOR) vulnerability in the Fullstep V5 registration process allows authenticated users to access data belonging to other registered users through various vulnerab…
New
|
CWE-639
Authorization Bypass Through User-Controlled Key
|
CVE-2026-5750
|
2026-04-23 06:23 |
2026-04-22 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
907
|
6.5 |
MEDIUM
Network
|
-
|
-
|
A vulnerability in the web application allows unauthorized users to access and manipulate sensitive data across different tenants by exploiting insecure direct object references. This could lead to u…
New
|
-
|
CVE-2026-6355
|
2026-04-23 06:23 |
2026-04-22 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
908
|
9.6 |
CRITICAL
Network
|
-
|
-
|
A vulnerability in the web application allows standard users to escalate their privileges to those of a super administrator through parameter manipulation, enabling them to access and modify sensitiv…
New
|
CWE-1220
Insufficient Granularity of Access Control
|
CVE-2026-6356
|
2026-04-23 06:23 |
2026-04-22 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
909
|
8.8 |
HIGH
Network
|
-
|
-
|
A flaw was found in InstructLab. The `linux_train.py` script hardcodes `trust_remote_code=True` when loading models from HuggingFace. This allows a remote attacker to achieve arbitrary Python code ex…
New
|
CWE-829
Inclusion of Functionality from Untrusted Control Sphere
|
CVE-2026-6859
|
2026-04-23 06:23 |
2026-04-22 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
910
|
6.1 |
MEDIUM
Local
|
-
|
-
|
A flaw was found in GNU Emacs. This vulnerability, a memory corruption issue, occurs when Emacs processes specially crafted SVG (Scalable Vector Graphics) CSS (Cascading Style Sheets) data. A local u…
New
|
CWE-193
Off-by-one Error
|
CVE-2026-6861
|
2026-04-23 06:23 |
2026-04-22 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|