|
1311
|
4.0 |
MEDIUM
Network
|
-
|
-
|
Hickory DNS hickory-recursor 0.1 through 0.25.2 allows cross-zone poisoning because cached data is not directly associated with a query that triggered a response.
|
CWE-706
Use of Incorrectly-Resolved Name or Reference
|
CVE-2026-42254
|
2026-04-28 03:57 |
2026-04-26 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
1312
|
7.0 |
HIGH
Local
|
-
|
-
|
Successful exploitation of the race condition vulnerability could allow
an attacker to trigger a kernel heap overflow, potentially leading to local privilege
escalation and granting system-level acce…
|
CWE-362
Race Condition
|
CVE-2026-3006
|
2026-04-28 03:57 |
2026-04-27 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
1313
|
- |
|
-
|
-
|
An improper ownership management vulnerability has been identified in Moxa’s Secure Router. Because of improper ownership management, a low-privileged authenticated user may access a configuration fi…
|
CWE-282
Improper Ownership Management
|
CVE-2026-3867
|
2026-04-28 03:57 |
2026-04-27 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
1314
|
- |
|
-
|
-
|
An improper handling of the length parameter inconsistency vulnerability has been identified in Moxa’s Secure Router. Because of improper validation of length parameters in the HTTPS management inter…
|
CWE-130
Improper Handling of Length Parameter Inconsistency
|
CVE-2026-3868
|
2026-04-28 03:57 |
2026-04-27 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
1315
|
6.6 |
MEDIUM
Local
|
-
|
-
|
Successful exploitation of the
string injection vulnerability could allow an attacker to obtain memory address
information or crash the application.
|
CWE-134
Use of Externally-Controlled Format String
|
CVE-2026-3008
|
2026-04-28 03:57 |
2026-04-27 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
1316
|
5.1 |
MEDIUM
Local
|
-
|
-
|
uriparser before 1.0.1 has numeric truncation in text range comparison, if an application accepts URIs with a length in gigabytes.
|
CWE-197
Numeric Truncation Error
|
CVE-2026-42371
|
2026-04-28 03:57 |
2026-04-27 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
1317
|
- |
|
-
|
-
|
OPPO Wallet APP contains a trusted domain validation flaw that allows attackers to bypass protected interface access restrictions, which may lead to account token hijacking and sensitive information …
|
CWE-346
Origin Validation Error
|
CVE-2026-22077
|
2026-04-28 03:57 |
2026-04-27 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
1318
|
- |
|
-
|
-
|
Authenticated user can bypass authorization in Ribblr - Crochet & Knitting iOS application
|
CWE-639
Authorization Bypass Through User-Controlled Key
|
CVE-2025-15626
|
2026-04-28 03:57 |
2026-04-27 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
1319
|
- |
|
-
|
-
|
Allocation of Resources Without Limits or Throttling vulnerability in elixir-plug plug_cowboy allows unauthenticated remote denial of service via atom table exhaustion.
Plug.Cowboy.Conn.conn/1 in li…
|
CWE-770
Allocation of Resources Without Limits or Throttling
|
CVE-2026-32688
|
2026-04-28 03:57 |
2026-04-27 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
1320
|
- |
|
-
|
-
|
Insecure preserved inherited permissions vulnerability in Cerberus FTP Server on Windows allows Privilege Escalation.This issue has been resolved in Cerberus FTP Server: 2026.1
|
CWE-278
Insecure Preserved Inherited Permissions
|
CVE-2026-6265
|
2026-04-28 03:57 |
2026-04-27 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|