5.5
CVE-2026-6870 - Access of Uninitialized Pointer in Wireshark
GSM RP protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
5.5
CVE-2026-6869 - Improperly Controlled Sequential Memory Allocation in Wireshark
WebSocket protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
5.5
CVE-2026-6867 - Improperly Controlled Sequential Memory Allocation in Wireshark
SMB2 protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
5.5
CVE-2026-6868 - Stack-based Buffer Overflow in Wireshark
HTTP protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
5.5
CVE-2026-7378 - Heap-based Buffer Overflow in Wireshark
Crash in sharkd 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
5.5
CVE-2026-7379 - Missing Release of Memory after Effective Lifetime in Wireshark
Memory leak in sharkd 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
5.5
CVE-2026-7375 - Loop with Unreachable Exit Condition ('Infinite Loop') in Wireshark
UDS protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
5.5
CVE-2026-7376 - NULL Pointer Dereference in Wireshark
Crash in sharkd 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
5.1
CVE-2025-13030 - Remote Code Execution via Unauthenticated Image Upload in django-mdeditor
All versions of the package django-mdeditor are vulnerable to Missing Authentication for Critical Function in the image upload endpoint. An attacker can upload malicious files and achieve arbitrary code execution since this endpoint lacks authentication protection and proper sanitisation of file naβ¦
8.7
CVE-2026-7470 - Tenda 4G300 SafeMacFilter sub_427C3C stack-based overflow
A flaw has been found in Tenda 4G300 US_4G300V1.0Mt_V1.01.42_CN_TDC01. Affected is the function sub_427C3C of the file /goform/SafeMacFilter. This manipulation of the argument page causes stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been published and β¦