7.1

CVSS4.0

CVE-2026-7422 - MAC Address Validation Bypass in FreeRTOS-Plus-TCP IPv4 and IPv6 Packet Processing

Insufficient packet validation in FreeRTOS-Plus-TCP before V4.2.6 and V4.4.1 allows an adjacent network actor to bypass all checksum and minimum-size validation by spoofing the Ethernet source MAC address to match one of the device's own registered endpoints, because the loopback detection mechanisโ€ฆ

๐Ÿ“… Published: April 29, 2026, 6:35 p.m. ๐Ÿ”„ Last Modified: May 4, 2026, 1:43 p.m.

6.9

CVSS4.0

CVE-2026-7398 - florensiawidjaja BioinfoMCP Upload Endpoint app.py upload path traversal

A weakness has been identified in florensiawidjaja BioinfoMCP up to 7ada7918b9e515604d3c0ae264d3a9af10bf6e54. This vulnerability affects the function Upload of the file bioinfo_mcp_platform/app.py of the component Upload Endpoint. This manipulation of the argument Name causes path traversal. The atโ€ฆ

๐Ÿ“… Published: April 29, 2026, 6:30 p.m. ๐Ÿ”„ Last Modified: April 30, 2026, 1:04 p.m.

6.3

CVSS3.1

CVE-2026-27105 - Improper Link Resolution Before File Access Enables Arbitrary File Write

Dell/Alienware Purchased Apps, versions prior to 1.1.31.0, contain an Improper Link Resolution Before File Access ('Link Following') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Arbitrary File Write

๐Ÿ“… Published: April 29, 2026, 6:18 p.m. ๐Ÿ”„ Last Modified: May 5, 2026, 12:37 p.m.

4.8

CVSS4.0

CVE-2026-7439 - AgentFlow Local Web API Content-Type Validation Bypass

AgentFlow's local web API accepts non-JSON content types on POST /api/runs and POST /api/runs/validate endpoints without enforcing application/json validation, allowing attackers to bypass trust-boundary enforcement on sensitive operations. Attackers can exploit this content-type validation weaknesโ€ฆ

๐Ÿ“… Published: April 29, 2026, 6:06 p.m. ๐Ÿ”„ Last Modified: April 29, 2026, 6:06 p.m.

6.5

CVSS3.1

CVE-2026-41499 - Wazuh: Multiple Heap-based NULL WRITE Buffer Underflows in parse_uname_string()

Wazuh is a free and open source platform used for threat prevention, detection, and response. From version 4.0.0 to before version 4.14.4, multiple heap-based out-of-bounds WRITE vulnerabilities exist in parse_uname_string() (remoted_op.c). This function processes OS identification data from agentsโ€ฆ

๐Ÿ“… Published: April 29, 2026, 6:01 p.m. ๐Ÿ”„ Last Modified: May 1, 2026, 1:01 p.m.

4.8

CVSS4.0

CVE-2026-7397 - NousResearch hermes-agent file_tools.py _check_sensitive_path symlink

A security flaw has been discovered in NousResearch hermes-agent 0.8.0. This affects the function _check_sensitive_path of the file tools/file_tools.py. The manipulation results in symlink following. Attacking locally is a requirement. The exploit has been released to the public and may be used forโ€ฆ

๐Ÿ“… Published: April 29, 2026, 6 p.m. ๐Ÿ”„ Last Modified: April 30, 2026, 12:47 p.m.

9

CVSS3.1

CVE-2026-30893 - Wazuh cluster sync path traversal in decompress_files() enables arbitrary file write and code execuโ€ฆ

Wazuh is a free and open source platform used for threat prevention, detection, and response. From version 4.4.0 to before version 4.14.4, a path traversal vulnerability in Wazuh's cluster synchronization extraction routine allows an authenticated cluster peer to write arbitrary files outside the iโ€ฆ

๐Ÿ“… Published: April 29, 2026, 5:55 p.m. ๐Ÿ”„ Last Modified: April 30, 2026, 8:30 p.m.

6.5

CVSS3.1

CVE-2026-28221 - Wazuh: Pre-auth stack-based buffer overflow in wazuh-remoted print_hex_string() due to signed char โ€ฆ

Wazuh is a free and open source platform used for threat prevention, detection, and response. From version 4.8.0 to before version 4.14.4, a stack-based buffer overflow exists in print_hex_string() in wazuh-remoted. The bug is triggered when formatting attacker-controlled bytes using sprintf(dst_buโ€ฆ

๐Ÿ“… Published: April 29, 2026, 5:53 p.m. ๐Ÿ”„ Last Modified: April 30, 2026, 8:34 p.m.

6.5

CVSS3.1

CVE-2026-26206 - Wazuh: API brute-force protection bypass via race condition in login attempt tracking

Wazuh is a free and open source platform used for threat prevention, detection, and response. From version 4.0.0 to before version 4.14.4, Wazuh's server API brute-force protection for POST /security/user/authenticate can be bypassed by sending concurrent authentication requests. Although the confiโ€ฆ

๐Ÿ“… Published: April 29, 2026, 5:49 p.m. ๐Ÿ”„ Last Modified: April 30, 2026, 8:38 p.m.

4.4

CVSS3.1

CVE-2026-26204 - Wazuh: Heap-based NULL WRITE Buffer Underflow in GetAlertData

Wazuh is a free and open source platform used for threat prevention, detection, and response. From version 1.0.0 to before version 4.14.4, a heap-based out-of-bounds WRITE occurs in GetAlertData, resulting in writing a NULL byte exactly 1 byte before the start of the buffer allocated by strdup. Dueโ€ฆ

๐Ÿ“… Published: April 29, 2026, 5:43 p.m. ๐Ÿ”„ Last Modified: April 30, 2026, 8:40 p.m.
Total resulsts: 348419
Page 126 of 34,842
ยซ previous page ยป next page
Filters