VYPR

CVEs

334,863 total · page 100 of 6,698

  • CVE-2026-6534MedApr 30, 2026
    risk 0.36cvss 5.5epss 0.00

    USB HID protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service

  • CVE-2026-6533MedApr 30, 2026
    risk 0.36cvss 5.5epss 0.00

    Dissection engine LZ77 decompression crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service

  • CVE-2026-6532MedApr 30, 2026
    risk 0.36cvss 5.5epss 0.00

    Kismet protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service

  • CVE-2026-6531MedApr 30, 2026
    risk 0.36cvss 5.5epss 0.00

    SANE protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service

  • CVE-2026-6530MedApr 30, 2026
    risk 0.36cvss 5.5epss 0.00

    DCP-ETSI protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service

  • CVE-2026-6529MedApr 30, 2026
    risk 0.36cvss 5.5epss 0.00

    iLBC audio codec crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service

  • CVE-2026-6528MedApr 30, 2026
    risk 0.36cvss 5.5epss 0.00

    TLS protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 allows denial of service

  • CVE-2026-6527MedApr 30, 2026
    risk 0.36cvss 5.5epss 0.00

    ASN.1 PER protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service

  • CVE-2026-6526MedApr 30, 2026
    risk 0.36cvss 5.5epss 0.00

    RTSP protocol dissector crash in Wireshark 4.6.0 to 4.6.4

  • CVE-2026-6524MedApr 30, 2026
    risk 0.36cvss 5.5epss 0.00

    MySQL protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service

  • CVE-2026-6523MedApr 30, 2026
    risk 0.36cvss 5.5epss 0.00

    GNW protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service

  • CVE-2026-6522MedApr 30, 2026
    risk 0.36cvss 5.5epss 0.00

    RPKI-Router protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service

  • CVE-2026-6521MedApr 30, 2026
    risk 0.36cvss 5.5epss 0.00

    OpenFlow v5 protocol dissector infinite loops in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service

  • CVE-2026-6520MedApr 30, 2026
    risk 0.36cvss 5.5epss 0.00

    OpenFlow v6 protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service

  • CVE-2026-6519MedApr 30, 2026
    risk 0.36cvss 5.5epss 0.00

    MBIM protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service

  • CVE-2026-5657MedApr 30, 2026
    risk 0.36cvss 5.5epss 0.00

    iLBC codec crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service

  • CVE-2026-5655MedApr 30, 2026
    risk 0.36cvss 5.5epss 0.00

    SDP protocol dissector crash in Wireshark 4.6.0 to 4.6.4 allows denial of service

  • CVE-2026-5654MedApr 30, 2026
    risk 0.36cvss 5.5epss 0.00

    AMR-NB codec crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service

  • CVE-2026-5653MedApr 30, 2026
    risk 0.36cvss 5.5epss 0.00

    DCP-ETSI protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service

  • CVE-2026-5409MedApr 30, 2026
    risk 0.36cvss 5.5epss 0.00

    Monero protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service

  • CVE-2026-5408MedApr 30, 2026
    risk 0.36cvss 5.5epss 0.00

    BT-DHT protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service

  • CVE-2026-5407MedApr 30, 2026
    risk 0.36cvss 5.5epss 0.00

    SMB2 protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service

  • CVE-2026-5406MedApr 30, 2026
    risk 0.36cvss 5.5epss 0.00

    FC-SWILS protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service

  • CVE-2026-5402HigApr 30, 2026
    risk 0.57cvss 8.8epss 0.00

    TLS protocol dissector heap overflow in Wireshark 4.6.0 to 4.6.4 allows denial of service and possible code execution

  • CVE-2026-5401MedApr 30, 2026
    risk 0.36cvss 5.5epss 0.00

    AFP Spotlight protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service

  • CVE-2026-5299MedApr 30, 2026
    risk 0.36cvss 5.5epss 0.00

    ICMPv6 PvD protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service

  • CVE-2026-42798MedApr 30, 2026
    risk 0.26cvss 4.0epss 0.00

    Little CMS (lcms2) 2.16 through 2.18 before 2.19 has an integer overflow in ParseCube in cmscgats.c.

  • CVE-2026-42511HigApr 30, 2026
    risk 0.53cvss 8.1epss 0.00

    The BOOTP file field is written to the lease file without escaping embedded double-quotes, allowing injection of arbitrary dhclient.conf directives. When the lease file is subsequently re-parsed by dhclient, e.g., after a system restart, an attacker-controlled field from the lease is passed to dhclient-script(8), which evaluates it. A rogue DHCP server may be able to execute arbirary code as root on a system running dhclient.

  • CVE-2026-41226MedApr 30, 2026
    risk 0.31cvss 4.7epss 0.00

    Open redirect vulnerability exists in Multiple laser printers and MFPs which implement Ricoh Web Image Monitor. When accessing a specially crafted URL, the user may be redirected to an arbitrary website. As a result, the user may become a victim of a phishing attack.

  • CVE-2024-39847HigApr 30, 2026
    risk 0.49cvss 7.5epss 0.00

    Unauthenticated attackers can exploit a weakness in the XML parser functionality of the SOAP endpoints in 4D server. This allows them to obtain read access to files on the application server and adjacent network shares, and perform HTTP GET requests to arbitrary services.

  • CVE-2026-7379MedApr 30, 2026
    risk 0.36cvss 5.5epss 0.00

    Memory leak in sharkd 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service

  • CVE-2026-7378MedApr 30, 2026
    risk 0.36cvss 5.5epss 0.00

    Crash in sharkd 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service

  • CVE-2026-7376MedApr 30, 2026
    risk 0.36cvss 5.5epss 0.00

    Crash in sharkd 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service

  • CVE-2026-7375MedApr 30, 2026
    risk 0.36cvss 5.5epss 0.00

    UDS protocol dissector infinite loop in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service

  • CVE-2026-6868MedApr 30, 2026
    risk 0.36cvss 5.5epss 0.00

    HTTP protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service

  • CVE-2025-13030HigApr 30, 2026
    risk 0.39cvss 7.1epss 0.00

    All versions of the package django-mdeditor are vulnerable to Missing Authentication for Critical Function in the image upload endpoint. An attacker can upload malicious files and achieve arbitrary code execution since this endpoint lacks authentication protection and proper sanitisation of file names.

  • CVE-2026-7470HigApr 30, 2026
    risk 0.57cvss 8.8epss 0.00

    A flaw has been found in Tenda 4G300 US_4G300V1.0Mt_V1.01.42_CN_TDC01. Affected is the function sub_427C3C of the file /goform/SafeMacFilter. This manipulation of the argument page causes stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been published and may be used.

  • CVE-2026-7469MedApr 30, 2026
    risk 0.41cvss 6.3epss 0.04

    A vulnerability was detected in Tenda 4G300 US_4G300V1.0Mt_V1.01.42_CN_TDC01. This impacts the function sub_425A28 of the file /goform/DelFil. The manipulation of the argument delflag results in command injection. The attack may be launched remotely. The exploit is now public and may be used.

  • CVE-2026-7468HigApr 30, 2026
    risk 0.47cvss 7.3epss 0.00

    A security vulnerability has been detected in 1024-lab smart-admin up to 3.30.0. This affects an unknown function of the file /smart-admin-api/druid/index.html of the component Demo Site. The manipulation leads to improper access controls. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report but has not responded yet.

  • CVE-2026-7447MedApr 30, 2026
    risk 0.41cvss 6.3epss 0.00

    A flaw has been found in SourceCodester Pet Grooming Management Software 1.0. This vulnerability affects unknown code of the file /admin/update_customer.php. This manipulation of the argument type/length/business parameter validity causes sql injection. The attack is possible to be carried out remotely. The exploit has been published and may be used.

  • CVE-2026-7446HigApr 30, 2026
    risk 0.41cvss 7.3epss 0.02

    A vulnerability was detected in VetCoders mcp-server-semgrep 1.0.0. This affects the function analyze_results/filter_results/export_results/compare_results/scan_directory/create_rule of the file src/index.ts of the component MCP Interface. The manipulation of the argument ID results in os command injection. The attack can be executed remotely. The exploit is now public and may be used. Upgrading to version 1.0.1 is able to mitigate this issue. The patch is identified as 141335da044e53c3f5b315e0386e01238405b771. It is advisable to upgrade the affected component.

  • CVE-2026-7445MedApr 30, 2026
    risk 0.41cvss 6.3epss 0.00

    A security vulnerability has been detected in ZachHandley ZMCPTools up to 0.2.2. Affected by this issue is some unknown functionality of the file src/managers/ResourceManager.ts of the component MCP Log Resource Handler. The manipulation of the argument dirname leads to path traversal. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report but has not responded yet.

  • CVE-2026-7443HigApr 29, 2026
    risk 0.48cvss 7.3epss 0.02

    A weakness has been identified in BurtTheCoder mcp-dnstwist up to 1.0.4. Affected by this vulnerability is the function fuzz_domain of the file src/index.ts of the component MCP Interface. Executing a manipulation of the argument Request can lead to os command injection. The attack may be launched remotely. The exploit has been made available to the public and could be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.

  • CVE-2026-7420HigApr 29, 2026
    risk 0.57cvss 8.8epss 0.00

    A security flaw has been discovered in UTT HiPER 1250GW up to 3.2.7-210907-180535. Impacted is the function strcpy of the file route/goform/ConfigAdvideo. The manipulation of the argument Profile results in buffer overflow. The attack can be executed remotely. The exploit has been released to the public and may be used for attacks.

  • CVE-2026-7419HigApr 29, 2026
    risk 0.57cvss 8.8epss 0.00

    A vulnerability was identified in UTT HiPER 1250GW up to 3.2.7-210907-180535. This issue affects the function strcpy of the file route/goform/formTaskEdit_ap. The manipulation of the argument Profile leads to buffer overflow. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.

  • CVE-2026-7381CriApr 29, 2026
    risk 0.59cvss 9.1epss 0.00

    Plack::Middleware::XSendfile versions through 1.0053 for Perl can allow client-controlled path rewriting. Plack::Middleware::XSendfile allows the variation setting (sendfile type) to be set by the client via the X-Sendfile-Type header, if it is not considered in the middleware constructor or the Plack environment. A malicious client can set the X-Sendfile-Type header to "X-Accel-Redirect" to services running behind nginx reverse proxies, and then set the X-Accel-Mapping to map the path to an arbitrary file on the server. Since 1.0053, Plack::Middleware::XSendfile is deprecated and will be removed from future releases of Plack. This is similar to CVE-2025-61780 for Rack::Sendfile, although Plack::Middleware::XSendfile has some mitigations that disallow regular expressions to be used in the mapping, and only apply the mapping for the "X-Accel-Redirect" type.

  • CVE-2026-6221Apr 29, 2026
    risk 0.00cvss epss

    Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

  • CVE-2026-7418HigApr 29, 2026
    risk 0.57cvss 8.8epss 0.00

    A vulnerability was determined in UTT HiPER 1250GW up to 3.2.7-210907-180535. This vulnerability affects the function strcpy of the file route/goform/NTP. Executing a manipulation of the argument Profile can lead to buffer overflow. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized.

  • CVE-2026-7417HigApr 29, 2026
    risk 0.47cvss 7.3epss 0.00

    A vulnerability was found in Algovate xhs-mcp 0.8.11. This affects the function xhs_publish_content of the file src/server/mcp.server.ts of the component MCP Interface. Performing a manipulation of the argument media_paths results in server-side request forgery. The attack may be initiated remotely. The exploit has been made public and could be used. The project was informed of the problem early through an issue report but has not responded yet.

  • CVE-2026-7416HigApr 29, 2026
    risk 0.47cvss 7.3epss 0.00

    A vulnerability was found in PolarVista xcode-mcp-server 1.0.0. This issue affects the function build_project/run_tests of the file src/index.ts of the component MCP Interface. The manipulation of the argument Request results in os command injection. The attack may be launched remotely. The exploit has been made public and could be used. The project was informed of the problem early through an issue report but has not responded yet.