7.7

CVSS4.0

CVE-2026-7466 - AgentFlow Arbitrary Python Pipeline Execution via pipeline_path

AgentFlow contains an arbitrary code execution vulnerability that allows attackers to execute local Python pipeline files by supplying a user-controlled pipeline_path parameter to the POST /api/runs and POST /api/runs/validate endpoints. Attackers can induce requests to the local AgentFlow API to lโ€ฆ

๐Ÿ“… Published: April 29, 2026, 6:44 p.m. ๐Ÿ”„ Last Modified: April 29, 2026, 6:44 p.m.

6

CVSS4.0

CVE-2026-7423 - Integer Underflow in ICMP Echo Reply Processing in FreeRTOS-Plus-TCP

Integer underflow in the ICMP and ICMPv6 echo reply handlers in FreeRTOS-Plus-TCP before V4.4.1 and V4.2.6 allows an adjacent network user to cause a denial of service (device crash) when outgoing ping support is enabled, because header sizes are subtracted from a packet length field without validaโ€ฆ

๐Ÿ“… Published: April 29, 2026, 6:36 p.m. ๐Ÿ”„ Last Modified: April 29, 2026, 6:50 p.m.

7.1

CVSS4.0

CVE-2026-7422 - MAC Address Validation Bypass in FreeRTOS-Plus-TCP IPv4 and IPv6 Packet Processing

Insufficient packet validation in FreeRTOS-Plus-TCP before V4.2.6 and V4.4.1 allows an adjacent network actor to bypass all checksum and minimum-size validation by spoofing the Ethernet source MAC address to match one of the device's own registered endpoints, because the loopback detection mechanisโ€ฆ

๐Ÿ“… Published: April 29, 2026, 6:35 p.m. ๐Ÿ”„ Last Modified: April 29, 2026, 6:46 p.m.

6.9

CVSS4.0

CVE-2026-7398 - florensiawidjaja BioinfoMCP Upload Endpoint app.py upload path traversal

A weakness has been identified in florensiawidjaja BioinfoMCP up to 7ada7918b9e515604d3c0ae264d3a9af10bf6e54. This vulnerability affects the function Upload of the file bioinfo_mcp_platform/app.py of the component Upload Endpoint. This manipulation of the argument Name causes path traversal. The atโ€ฆ

๐Ÿ“… Published: April 29, 2026, 6:30 p.m. ๐Ÿ”„ Last Modified: April 29, 2026, 6:30 p.m.

6.3

CVSS3.1

CVE-2026-27105 -

Dell/Alienware Purchased Apps, versions prior to 1.1.31.0, contain an Improper Link Resolution Before File Access ('Link Following') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Arbitrary File Write

๐Ÿ“… Published: April 29, 2026, 6:18 p.m. ๐Ÿ”„ Last Modified: April 29, 2026, 6:18 p.m.

4.8

CVSS4.0

CVE-2026-7439 - AgentFlow Local Web API Content-Type Validation Bypass

AgentFlow's local web API accepts non-JSON content types on POST /api/runs and POST /api/runs/validate endpoints without enforcing application/json validation, allowing attackers to bypass trust-boundary enforcement on sensitive operations. Attackers can exploit this content-type validation weaknesโ€ฆ

๐Ÿ“… Published: April 29, 2026, 6:06 p.m. ๐Ÿ”„ Last Modified: April 29, 2026, 6:06 p.m.

6.5

CVSS3.1

CVE-2026-41499 - Wazuh: Multiple Heap-based NULL WRITE Buffer Underflows in parse_uname_string()

Wazuh is a free and open source platform used for threat prevention, detection, and response. From version 4.0.0 to before version 4.14.4, multiple heap-based out-of-bounds WRITE vulnerabilities exist in parse_uname_string() (remoted_op.c). This function processes OS identification data from agentsโ€ฆ

๐Ÿ“… Published: April 29, 2026, 6:01 p.m. ๐Ÿ”„ Last Modified: April 29, 2026, 6:01 p.m.

4.8

CVSS4.0

CVE-2026-7397 - NousResearch hermes-agent file_tools.py _check_sensitive_path symlink

A security flaw has been discovered in NousResearch hermes-agent 0.8.0. This affects the function _check_sensitive_path of the file tools/file_tools.py. The manipulation results in symlink following. Attacking locally is a requirement. The exploit has been released to the public and may be used forโ€ฆ

๐Ÿ“… Published: April 29, 2026, 6 p.m. ๐Ÿ”„ Last Modified: April 29, 2026, 6 p.m.

9

CVSS3.1

CVE-2026-30893 - Wazuh cluster sync path traversal in decompress_files() enables arbitrary file write and code execuโ€ฆ

Wazuh is a free and open source platform used for threat prevention, detection, and response. From version 4.4.0 to before version 4.14.4, a path traversal vulnerability in Wazuh's cluster synchronization extraction routine allows an authenticated cluster peer to write arbitrary files outside the iโ€ฆ

๐Ÿ“… Published: April 29, 2026, 5:55 p.m. ๐Ÿ”„ Last Modified: April 29, 2026, 5:55 p.m.

6.5

CVSS3.1

CVE-2026-28221 - Wazuh: Pre-auth stack-based buffer overflow in wazuh-remoted print_hex_string() due to signed char โ€ฆ

Wazuh is a free and open source platform used for threat prevention, detection, and response. From version 4.8.0 to before version 4.14.4, a stack-based buffer overflow exists in print_hex_string() in wazuh-remoted. The bug is triggered when formatting attacker-controlled bytes using sprintf(dst_buโ€ฆ

๐Ÿ“… Published: April 29, 2026, 5:53 p.m. ๐Ÿ”„ Last Modified: April 29, 2026, 5:53 p.m.
Total resulsts: 347738
Page 58 of 34,774
ยซ previous page ยป next page
Filters