6.9

CVSS4.0

CVE-2026-7398 - florensiawidjaja BioinfoMCP Upload Endpoint app.py upload path traversal

A weakness has been identified in florensiawidjaja BioinfoMCP up to 7ada7918b9e515604d3c0ae264d3a9af10bf6e54. This vulnerability affects the function Upload of the file bioinfo_mcp_platform/app.py of the component Upload Endpoint. This manipulation of the argument Name causes path traversal. The at…

πŸ“… Published: April 29, 2026, 6:30 p.m. πŸ”„ Last Modified: April 30, 2026, 1:04 p.m.

6.3

CVSS3.1

CVE-2026-27105 - Improper Link Resolution Before File Access Enables Arbitrary File Write

Dell/Alienware Purchased Apps, versions prior to 1.1.31.0, contain an Improper Link Resolution Before File Access ('Link Following') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Arbitrary File Write

πŸ“… Published: April 29, 2026, 6:18 p.m. πŸ”„ Last Modified: May 5, 2026, 12:37 p.m.

4.8

CVSS4.0

CVE-2026-7439 - AgentFlow Local Web API Content-Type Validation Bypass

AgentFlow's local web API accepts non-JSON content types on POST /api/runs and POST /api/runs/validate endpoints without enforcing application/json validation, allowing attackers to bypass trust-boundary enforcement on sensitive operations. Attackers can exploit this content-type validation weaknes…

πŸ“… Published: April 29, 2026, 6:06 p.m. πŸ”„ Last Modified: April 29, 2026, 6:06 p.m.

6.5

CVSS3.1

CVE-2026-41499 - Wazuh: Multiple Heap-based NULL WRITE Buffer Underflows in parse_uname_string()

Wazuh is a free and open source platform used for threat prevention, detection, and response. From version 4.0.0 to before version 4.14.4, multiple heap-based out-of-bounds WRITE vulnerabilities exist in parse_uname_string() (remoted_op.c). This function processes OS identification data from agents…

πŸ“… Published: April 29, 2026, 6:01 p.m. πŸ”„ Last Modified: May 1, 2026, 1:01 p.m.

4.8

CVSS4.0

CVE-2026-7397 - NousResearch hermes-agent file_tools.py _check_sensitive_path symlink

A security flaw has been discovered in NousResearch hermes-agent 0.8.0. This affects the function _check_sensitive_path of the file tools/file_tools.py. The manipulation results in symlink following. Attacking locally is a requirement. The exploit has been released to the public and may be used for…

πŸ“… Published: April 29, 2026, 6 p.m. πŸ”„ Last Modified: April 30, 2026, 12:47 p.m.

9

CVSS3.1

CVE-2026-30893 - Wazuh cluster sync path traversal in decompress_files() enables arbitrary file write and code execu…

Wazuh is a free and open source platform used for threat prevention, detection, and response. From version 4.4.0 to before version 4.14.4, a path traversal vulnerability in Wazuh's cluster synchronization extraction routine allows an authenticated cluster peer to write arbitrary files outside the i…

πŸ“… Published: April 29, 2026, 5:55 p.m. πŸ”„ Last Modified: April 30, 2026, 8:30 p.m.

6.5

CVSS3.1

CVE-2026-28221 - Wazuh: Pre-auth stack-based buffer overflow in wazuh-remoted print_hex_string() due to signed char …

Wazuh is a free and open source platform used for threat prevention, detection, and response. From version 4.8.0 to before version 4.14.4, a stack-based buffer overflow exists in print_hex_string() in wazuh-remoted. The bug is triggered when formatting attacker-controlled bytes using sprintf(dst_bu…

πŸ“… Published: April 29, 2026, 5:53 p.m. πŸ”„ Last Modified: April 30, 2026, 8:34 p.m.

6.5

CVSS3.1

CVE-2026-26206 - Wazuh: API brute-force protection bypass via race condition in login attempt tracking

Wazuh is a free and open source platform used for threat prevention, detection, and response. From version 4.0.0 to before version 4.14.4, Wazuh's server API brute-force protection for POST /security/user/authenticate can be bypassed by sending concurrent authentication requests. Although the confi…

πŸ“… Published: April 29, 2026, 5:49 p.m. πŸ”„ Last Modified: April 30, 2026, 8:38 p.m.

4.4

CVSS3.1

CVE-2026-26204 - Wazuh: Heap-based NULL WRITE Buffer Underflow in GetAlertData

Wazuh is a free and open source platform used for threat prevention, detection, and response. From version 1.0.0 to before version 4.14.4, a heap-based out-of-bounds WRITE occurs in GetAlertData, resulting in writing a NULL byte exactly 1 byte before the start of the buffer allocated by strdup. Due…

πŸ“… Published: April 29, 2026, 5:43 p.m. πŸ”„ Last Modified: April 30, 2026, 8:40 p.m.

10

CVSS4.0

CVE-2026-26015 - Unauthenticated RCE in DocsGPT MCP STDIO Configuration

DocsGPT is a GPT-powered chat for documentation. From version 0.15.0 to before version 0.16.0, an attacker accessing both the official DocsGPT website or any local and public deployment, can craft a malicious payload bypassing the "MCP test" behavior to achieve arbitrary remote code execution (RCE)…

πŸ“… Published: April 29, 2026, 5:37 p.m. πŸ”„ Last Modified: May 6, 2026, 8:16 p.m.
Total resulsts: 349182
Page 202 of 34,919
Β« previous page Β» next page
Filters