8.6

CVSS4.0

CVE-2026-7851 - D-Link DI-8100 yyxz.asp sprintf stack-based overflow

A vulnerability was identified in D-Link DI-8100 16.07.26A1. This affects the function sprintf of the file yyxz.asp. The manipulation of the argument ID leads to stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit is publicly available and might be used.

๐Ÿ“… Published: May 5, 2026, 5:30 p.m. ๐Ÿ”„ Last Modified: May 6, 2026, 5:40 p.m.

7.7

CVSS4.0

CVE-2026-25589 - RedisBloom RESTORE invalid memory access may allow remote code execution

RedisBloom is a probabilistic data structures module for Redis. In all versions of RedisBloom before 2.8.20, the module does not properly validate serialized values processed through the Redis RESTORE command. An authenticated attacker with permission to execute RESTORE on a server with the RedisBlโ€ฆ

๐Ÿ“… Published: May 5, 2026, 4:50 p.m. ๐Ÿ”„ Last Modified: May 6, 2026, 9:21 a.m.

7.7

CVSS4.0

CVE-2026-25588 - RedisTimeSeries RESTORE invalid memory access may allow remote code execution

RedisTimeSeries is a time-series module for Redis. In all versions before 1.12.14 of RedisTimeSeries, the module does not properly validate serialized values processed through the Redis RESTORE command. An authenticated attacker with permission to execute RESTORE on a server with the RedisTimeSerieโ€ฆ

๐Ÿ“… Published: May 5, 2026, 4:48 p.m. ๐Ÿ”„ Last Modified: May 6, 2026, 9:21 a.m.

7.7

CVSS4.0

CVE-2026-25243 - redis-server RESTORE invalid memory access may allow remote code execution

Redis is an in-memory data structure store. In versions of redis-server up to 8.6.3, the RESTORE command does not properly validate serialized values. An authenticated attacker with permission to execute RESTORE can supply a crafted serialized payload that triggers invalid memory access and may leaโ€ฆ

๐Ÿ“… Published: May 5, 2026, 4:44 p.m. ๐Ÿ”„ Last Modified: May 5, 2026, 6:30 p.m.

6.1

CVSS4.0

CVE-2026-23631 - redis-server Lua use-after-free may allow remote code execution

Redis is an in-memory data structure store. In all versions of redis-server with Lua scripting, an authenticated attacker can exploit the master-replica synchronization mechanism to trigger a use-after-free on replicas where replica-read-only is disabled or can be disabled, which may lead to remoteโ€ฆ

๐Ÿ“… Published: May 5, 2026, 4:39 p.m. ๐Ÿ”„ Last Modified: May 5, 2026, 6:30 p.m.

7.7

CVSS4.0

CVE-2026-23479 - redis-server use-after-free in unblock client flow may allow remote code execution

Redis is an in-memory data structure store. In redis-server from 7.2.0 until 8.6.3, the unblock client flow does not handle an error return from `processCommandAndResetClient` when re-executing a blocked command. If a blocked client is evicted during this flow, an authenticated attacker can triggerโ€ฆ

๐Ÿ“… Published: May 5, 2026, 4:36 p.m. ๐Ÿ”„ Last Modified: May 5, 2026, 8 p.m.

2.1

CVSS4.0

CVE-2026-7847 - chatchat-space Langchain-Chatchat Uploaded File openai_routes.py _get_file_id random values

A vulnerability was found in chatchat-space Langchain-Chatchat up to 0.3.1.3. The affected element is the function _get_file_id of the file libs/chatchat-server/chatchat/server/api_server/openai_routes.py of the component Uploaded File Handler. Performing a manipulation results in insufficiently raโ€ฆ

๐Ÿ“… Published: May 5, 2026, 4:30 p.m. ๐Ÿ”„ Last Modified: May 5, 2026, 6:30 p.m.

2.1

CVSS4.0

CVE-2026-7846 - chatchat-space Langchain-Chatchat OpenAI-Compatible File Upload API openai_routes.py files toctou

A vulnerability has been found in chatchat-space Langchain-Chatchat up to 0.3.1.3. Impacted is the function files of the file libs/chatchat-server/chatchat/server/api_server/openai_routes.py of the component OpenAI-Compatible File Upload API. Such manipulation of the argument file.filename leads toโ€ฆ

๐Ÿ“… Published: May 5, 2026, 4 p.m. ๐Ÿ”„ Last Modified: May 5, 2026, 6:45 p.m.

2.1

CVSS4.0

CVE-2026-7845 - chatchat-space Langchain-Chatchat Vision Chat Paste Image dialogue.py PIL.Image.tobytes weak hash

A flaw has been found in chatchat-space Langchain-Chatchat up to 0.3.1.3. This issue affects the function PIL.Image.tobytes of the file libs/chatchat-server/chatchat/webui_pages/dialogue/dialogue.py of the component Vision Chat Paste Image Handler. This manipulation of the argument paste_image.imagโ€ฆ

๐Ÿ“… Published: May 5, 2026, 3:45 p.m. ๐Ÿ”„ Last Modified: May 5, 2026, 6 p.m.

5.9

CVSS3.1

CVE-2026-34956 - Openvswitch: open vswitch: denial of service via malformed ftp epasv command

A flaw was found in Open vSwitch. When Open vSwitch is configured with a conntrack flow using FTP helpers over the userspace datapath, a remote attacker can send a specially crafted FTP stream with an EPASV command exceeding 255 characters. This heap access error can lead to a crash, resulting in aโ€ฆ

๐Ÿ“… Published: May 5, 2026, 3:45 p.m. ๐Ÿ”„ Last Modified: May 6, 2026, 9:21 a.m.
Total resulsts: 348618
Page 54 of 34,862
ยซ previous page ยป next page
Filters