Total CVEs

125,674

Critical Severity

2,261

High Severity

7,825

Last 7 Days

1,174
Quick preset (or use dates below)
Clear Filters
๐Ÿ“… Showing Year: 2026 (January 1 - December 31, 2026) View All Years โ†’
Showing 81 - 100 of 22,079 CVEs
CVE-2018-25305 MEDIUM - 6.2

librsvg2-bin 2.40.13 contains a buffer overflow vulnerability that allows local attackers to cause a denial of service by processing malformed SVG files. Attackers can supply crafted SVG input to the rsvg conversion tool to trigger a segmentation fault in the cairo image compositor.

Vendor: xenial
Product: RSVG
Published: Apr 29, 2026
Source: NVD
CVE-2018-25304 HIGH - 8.4

Free Download Manager 2.0 Built 417 contains a local buffer overflow vulnerability in the URL import functionality that allows attackers to trigger a structured exception handler (SEH) chain exploitation. Attackers can craft a malicious URL file that, when imported through the File > Import > ...

Vendor: Filehippo
Product: Free Download Manager
Published: Apr 29, 2026
Source: NVD
CVE-2018-25303 HIGH - 8.4

Allok Video to DVD Burner 2.6.1217 contains a stack-based buffer overflow vulnerability in the License Name field that allows local attackers to execute arbitrary code by triggering a structured exception handler (SEH) overwrite. Attackers can craft a malicious input string with 780 bytes of junk da...

Vendor: Alloksoft
Product: Allok Video to DVD Burner
Published: Apr 29, 2026
Source: NVD
CVE-2018-25302 HIGH - 7.8

Allok AVI to DVD SVCD VCD Converter 4.0.1217 contains a structured exception handling (SEH) based buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying a malicious string in the License Name field. Attackers can craft a payload with junk data, NSEH bypass, ...

Vendor: Alloksoft
Product: Allok AVI to DVD SVCD VCD Converter
Published: Apr 29, 2026
Source: NVD
CVE-2018-25301 HIGH - 8.4

Easy MPEG to DVD Burner 1.7.11 contains a structured exception handling (SEH) local buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying a malicious username string. Attackers can craft a payload containing junk data, SEH chain pointers, and shellcode that...

Vendor: Easy MPEG
Product: Easy MPEG to DVD Burner
Published: Apr 29, 2026
Source: NVD
CVE-2018-25300 HIGH - 8.2

XATABoost CMS 1.0.0 contains a union-based SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the id parameter. Attackers can send GET requests to news.php with malicious id values to extract sensitive database information.

Vendor: xataboost
Product: XATABoost CMS
Published: Apr 29, 2026
Source: NVD
CVE-2018-25299 HIGH - 8.4

Prime95 29.4b8 contains a local buffer overflow vulnerability that allows attackers to execute arbitrary code by exploiting structured exception handling (SEH) mechanisms. Attackers can inject malicious payload through the optional proxy hostname field in the PrimeNet connection settings to trigger ...

Vendor: Mersenne
Product: Prime95
Published: Apr 29, 2026
Source: NVD
CVE-2018-25298 MEDIUM - 5.3

Merge PACS 7.0 contains a cross-site request forgery vulnerability that allows attackers to perform unauthorized actions by crafting malicious HTML forms targeting the merge-viewer endpoint. Attackers can submit POST requests to /servlet/actions/merge-viewer/summary with login credentials to hijack ...

Vendor: Merge
Product: Merge PACS
Published: Apr 29, 2026
Source: NVD
CVE-2026-7466 HIGH - 8.8

AgentFlow contains an arbitrary code execution vulnerability that allows attackers to execute local Python pipeline files by supplying a user-controlled pipeline_path parameter to the POST /api/runs and POST /api/runs/validate endpoints. Attackers can induce requests to the local AgentFlow API to lo...

Published: Apr 29, 2026
Source: NVD
CVE-2026-7439 MEDIUM - 4.4

AgentFlow's local web API accepts non-JSON content types on POST /api/runs and POST /api/runs/validate endpoints without enforcing application/json validation, allowing attackers to bypass trust-boundary enforcement on sensitive operations. Attackers can exploit this content-type validation wea...

Published: Apr 29, 2026
Source: NVD
CVE-2026-7424 HIGH - 8.1

Integer underflow in the DHCPv6 sub-option parser in FreeRTOS-Plus-TCP before V4.4.1 and V4.2.6 allows an adjacent network actor to corrupt the device's IPv6 address assignment, DNS configuration, and lease times, and to cause a denial of service (permanent IP task freeze requiring hardware res...

Published: Apr 29, 2026
Source: NVD
CVE-2026-7423 MEDIUM - 5.3

Integer underflow in the ICMP and ICMPv6 echo reply handlers in FreeRTOS-Plus-TCP before V4.4.1 and V4.2.6 allows an adjacent network user to cause a denial of service (device crash) when outgoing ping support is enabled, because header sizes are subtracted from a packet length field without validat...

Published: Apr 29, 2026
Source: NVD
CVE-2026-7422 MEDIUM - 6.5

Insufficient packet validation in FreeRTOS-Plus-TCP before V4.2.6 and V4.4.1 allows an adjacent network actor to bypass all checksum and minimum-size validation by spoofing the Ethernet source MAC address to match one of the device's own registered endpoints, because the loopback detection mech...

Published: Apr 29, 2026
Source: NVD
CVE-2026-7398 HIGH - 7.3

A weakness has been identified in florensiawidjaja BioinfoMCP up to 7ada7918b9e515604d3c0ae264d3a9af10bf6e54. This vulnerability affects the function Upload of the file bioinfo_mcp_platform/app.py of the component Upload Endpoint. This manipulation of the argument Name causes path traversal. The att...

Published: Apr 29, 2026
Source: NVD
CVE-2026-7397 MEDIUM - 4.4

A security flaw has been discovered in NousResearch hermes-agent 0.8.0. This affects the function _check_sensitive_path of the file tools/file_tools.py. The manipulation results in symlink following. Attacking locally is a requirement. The exploit has been released to the public and may be used for ...

Published: Apr 29, 2026
Source: NVD
CVE-2026-41499 MEDIUM - 6.5

Wazuh is a free and open source platform used for threat prevention, detection, and response. From version 4.0.0 to before version 4.14.4, multiple heap-based out-of-bounds WRITE vulnerabilities exist in parse_uname_string() (remoted_op.c). This function processes OS identification data from agents ...

Vendor: wazuh
Product: wazuh
Published: Apr 29, 2026
Source: NVD
CVE-2026-30893 CRITICAL - 9.0

Wazuh is a free and open source platform used for threat prevention, detection, and response. From version 4.4.0 to before version 4.14.4, a path traversal vulnerability in Wazuh's cluster synchronization extraction routine allows an authenticated cluster peer to write arbitrary files outside t...

Vendor: wazuh
Product: wazuh
Published: Apr 29, 2026
Source: NVD
CVE-2026-28221 MEDIUM - 6.5

Wazuh is a free and open source platform used for threat prevention, detection, and response. From version 4.8.0 to before version 4.14.4, a stack-based buffer overflow exists in print_hex_string() in wazuh-remoted. The bug is triggered when formatting attacker-controlled bytes using sprintf(dst_buf...

Vendor: wazuh
Product: wazuh
Published: Apr 29, 2026
Source: NVD
CVE-2026-27105 MEDIUM - 6.3

Dell/Alienware Purchased Apps, versions prior to 1.1.31.0, contain an Improper Link Resolution Before File Access ('Link Following') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Arbitrary File Write

Vendor: Dell
Product: Dell/Alienware Purchased Apps
Published: Apr 29, 2026
Source: NVD
CVE-2026-26206 MEDIUM - 6.5

Wazuh is a free and open source platform used for threat prevention, detection, and response. From version 4.0.0 to before version 4.14.4, Wazuh's server API brute-force protection for POST /security/user/authenticate can be bypassed by sending concurrent authentication requests. Although the c...

Vendor: wazuh
Product: wazuh
Published: Apr 29, 2026
Source: NVD