7.1
CVE-2026-1850 - An authorized user may disable the MongoDB server by issuing a certain type of complex query due toβ¦
Complex queries can cause excessive memory usage in MongoDB Query Planner resulting in an Out-Of-Memory Crash.
3.3
CVE-2026-0965 - libssh: libssh: Denial of Service via improper configuration file handling
No description is available for this CVE.
0.0
CVE-2026-0966 - libssh: Buffer underflow in ssh_get_hexa() on invalid input
No description is available for this CVE.
2.2
CVE-2026-0967 - libssh: libssh: Denial of Service via inefficient regular expression processing
No description is available for this CVE.
3.1
CVE-2026-0968 - libssh: libssh: Denial of Service due to malformed SFTP message
No description is available for this CVE.
5.0
CVE-2026-0964 - libssh: Improper sanitation of paths received from SCP servers
No description is available for this CVE.
5.3
CVE-2026-25609 - profile command may permit unauthorized configuration
Incorrect validation of the profile command may result in the determination that a request altering the 'filter' is read-only.
7.8
CVE-2026-21352 - DNG SDK | Out-of-bounds Write (CWE-787)
DNG SDK versions 1.7.1 2410 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
5.5
CVE-2026-21354 - DNG SDK | Integer Overflow or Wraparound (CWE-190)
DNG SDK versions 1.7.1 2410 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could lead to application denial-of-service. An attacker could exploit this vulnerability to cause the application to crash or become unresponsive. Exploitation of this issue requires user iβ¦
7.8
CVE-2026-21353 - DNG SDK | Integer Overflow or Wraparound (CWE-190)
DNG SDK versions 1.7.1 2410 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.