Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CWE CATEGORY:CERT C Secure Coding Standard (2008) Chapter 4 - Expressions (EXP)
Category ID:737
Vulnerability Mapping:Prohibited
Status:Obsolete
DetailsContent HistoryObserved CVE ExamplesReports
5107Vulnerabilities found

CVE-2026-3392
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-4.8||MEDIUM
EPSS-Not Assigned
Published-01 Mar, 2026 | 11:32
Updated-01 Mar, 2026 | 12:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
FascinatedBox lily lily_emitter.c eval_tree null pointer dereference

A weakness has been identified in FascinatedBox lily up to 2.3. The affected element is the function eval_tree of the file src/lily_emitter.c. This manipulation causes null pointer dereference. The attack is restricted to local execution. The exploit has been made available to the public and could be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.

Action-Not Available
Vendor-FascinatedBox
Product-lily
CWE ID-CWE-404
Improper Resource Shutdown or Release
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2026-3389
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-4.8||MEDIUM
EPSS-Not Assigned
Published-01 Mar, 2026 | 10:02
Updated-01 Mar, 2026 | 10:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Squirrel sqstdrex.cpp sqstd_rex_newnode null pointer dereference

A vulnerability was determined in Squirrel up to 3.2. This vulnerability affects the function sqstd_rex_newnode in the library sqstdlib/sqstdrex.cpp. Executing a manipulation can lead to null pointer dereference. The attack can only be executed locally. The exploit has been publicly disclosed and may be utilized. The project was informed of the problem early through an issue report but has not responded yet.

Action-Not Available
Vendor-n/a
Product-Squirrel
CWE ID-CWE-404
Improper Resource Shutdown or Release
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2026-3387
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-4.8||MEDIUM
EPSS-Not Assigned
Published-01 Mar, 2026 | 09:32
Updated-01 Mar, 2026 | 10:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
wren-lang wren wren_compiler.c getByteCountForArguments null pointer dereference

A vulnerability has been found in wren-lang wren up to 0.4.0. Affected by this issue is the function getByteCountForArguments of the file src/vm/wren_compiler.c. Such manipulation leads to null pointer dereference. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The project was informed of the problem early through an issue report but has not responded yet.

Action-Not Available
Vendor-wren-lang
Product-wren
CWE ID-CWE-404
Improper Resource Shutdown or Release
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2021-4456
Assigner-CPAN Security Group
ShareView Details
Assigner-CPAN Security Group
CVSS Score-6.5||MEDIUM
EPSS-0.05% / 15.98%
||
7 Day CHG~0.00%
Published-27 Feb, 2026 | 00:16
Updated-27 Feb, 2026 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Net::CIDR versions before 0.24 for Perl mishandle leading zeros in IP CIDR addresses, which may have unspecified impact

Net::CIDR versions before 0.24 for Perl mishandle leading zeros in IP CIDR addresses, which may have unspecified impact. The functions `addr2cidr` and `cidrlookup` may return leading zeros in a CIDR string, which may in turn be parsed as octal numbers by subsequent users. In some cases an attacker may be able to leverage this to bypass access controls based on IP addresses. The documentation advises validating untrusted CIDR strings with the `cidrvalidate` function. However, this mitigation is optional and not enforced by default. In practice, users may call `addr2cidr` or `cidrlookup` with untrusted input and without validation, incorrectly assuming that this is safe.

Action-Not Available
Vendor-MRSAM
Product-Net::CIDR
CWE ID-CWE-704
Incorrect Type Conversion or Cast
CVE-2026-27141
Assigner-Go Project
ShareView Details
Assigner-Go Project
CVSS Score-7.5||HIGH
EPSS-0.05% / 14.91%
||
7 Day CHG~0.00%
Published-26 Feb, 2026 | 18:50
Updated-27 Feb, 2026 | 20:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Sending certain HTTP/2 frames can cause a server to panic in golang.org/x/net

Due to missing nil check, sending 0x0a-0x0f HTTP/2 frames will cause a running server to panic

Action-Not Available
Vendor-golang.org/x/net
Product-golang.org/x/net/http2
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2026-22722
Assigner-VMware by Broadcom
ShareView Details
Assigner-VMware by Broadcom
CVSS Score-6.1||MEDIUM
EPSS-0.01% / 2.57%
||
7 Day CHG~0.00%
Published-26 Feb, 2026 | 18:35
Updated-27 Feb, 2026 | 17:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
VMware Workstation for Windows null pointer dereference may allow an authenticated user to trigger a crash

A malicious actor with authenticated user privileges on a Windows based Workstation host may be able to cause a null pointer dereference error. To Remediate CVE-2026-22722, apply the patches listed in the "Fixed version" column of the 'Response Matrix'

Action-Not Available
Vendor-VMware (Broadcom Inc.)
Product-Workstation
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2026-27809
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-6.8||MEDIUM
EPSS-0.04% / 11.96%
||
7 Day CHG~0.00%
Published-25 Feb, 2026 | 23:57
Updated-27 Feb, 2026 | 14:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
psd-tools: Compression module has unguarded zlib decompression, missing dimension validation, and hardening gaps

psd-tools is a Python package for working with Adobe Photoshop PSD files. Prior to version 1.12.2, when a PSD file contains malformed RLE-compressed image data (e.g. a literal run that extends past the expected row size), decode_rle() raises ValueError which propagated all the way to the user, crashing psd.composite() and psd-tools export. decompress() already had a fallback that replaces failed channels with black pixels when result is None, but it never triggered because the ValueError from decode_rle() was not caught. The fix in version 1.12.2 wraps the decode_rle() call in a try/except so the existing fallback handles the error gracefully.

Action-Not Available
Vendor-psd-tools
Product-psd-tools
CWE ID-CWE-190
Integer Overflow or Wraparound
CWE ID-CWE-409
Improper Handling of Highly Compressed Data (Data Amplification)
CWE ID-CWE-617
Reachable Assertion
CWE ID-CWE-704
Incorrect Type Conversion or Cast
CWE ID-CWE-755
Improper Handling of Exceptional Conditions
CWE ID-CWE-789
Memory Allocation with Excessive Size Value
CVE-2026-3202
Assigner-GitLab Inc.
ShareView Details
Assigner-GitLab Inc.
CVSS Score-4.7||MEDIUM
EPSS-0.02% / 3.24%
||
7 Day CHG~0.00%
Published-25 Feb, 2026 | 14:35
Updated-26 Feb, 2026 | 14:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
NULL Pointer Dereference in Wireshark

NTS-KE protocol dissector crash in Wireshark 4.6.0 to 4.6.3 allows denial of service

Action-Not Available
Vendor-Wireshark Foundation
Product-wiresharkWireshark
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2026-3146
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-4.8||MEDIUM
EPSS-0.01% / 1.31%
||
7 Day CHG~0.00%
Published-25 Feb, 2026 | 03:02
Updated-25 Feb, 2026 | 20:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
libvips matrixload.c vips_foreign_load_matrix_header null pointer dereference

A vulnerability has been found in libvips up to 8.18.0. The impacted element is the function vips_foreign_load_matrix_header of the file libvips/foreign/matrixload.c. The manipulation leads to null pointer dereference. The attack needs to be performed locally. The identifier of the patch is d4ce337c76bff1b278d7085c3c4f4725e3aa6ece. To fix this issue, it is recommended to deploy a patch.

Action-Not Available
Vendor-libvipsn/a
Product-libvipslibvips
CWE ID-CWE-404
Improper Resource Shutdown or Release
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2026-0401
Assigner-SonicWall, Inc.
ShareView Details
Assigner-SonicWall, Inc.
CVSS Score-4.9||MEDIUM
EPSS-0.16% / 36.64%
||
7 Day CHG~0.00%
Published-24 Feb, 2026 | 14:55
Updated-26 Feb, 2026 | 21:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A post-authentication NULL Pointer Dereference vulnerability in SonicOS allows a remote attacker to crash a firewall.

Action-Not Available
Vendor-SonicWall Inc.
Product-tz370tz480nssp_15700tz570tz270tz80nsa_4700tz470wnsa_2800nsa_3700tz670tz470nssp_13700nssp_10700nsa_5700nsa_2700nsv470tz570wnsa_4800tz680tz270wnsa_6700nsv870nsv270nsa_5800tz580tz280sonicostz570pnsa_3800tz380nssp_11700tz370wSonicOS
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2025-40541
Assigner-SolarWinds
ShareView Details
Assigner-SolarWinds
CVSS Score-9.1||CRITICAL
EPSS-0.02% / 4.22%
||
7 Day CHG~0.00%
Published-24 Feb, 2026 | 07:41
Updated-26 Feb, 2026 | 14:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SolarWinds Serv-U Insecure Direct Object Reference (IDOR) Remote Code Execution Vulnerability

An Insecure Direct Object Reference (IDOR) vulnerability exists in Serv-U, which when exploited, gives a malicious actor the ability to execute native code as a privileged account. This issue requires administrative privileges to abuse. On Windows deployments, the risk is scored as a medium because services frequently run under less-privileged service accounts by default.

Action-Not Available
Vendor-SolarWinds Worldwide, LLC.
Product-serv-uServ-U
CWE ID-CWE-704
Incorrect Type Conversion or Cast
CWE ID-CWE-639
Authorization Bypass Through User-Controlled Key
CVE-2025-40540
Assigner-SolarWinds
ShareView Details
Assigner-SolarWinds
CVSS Score-9.1||CRITICAL
EPSS-0.05% / 14.91%
||
7 Day CHG~0.00%
Published-24 Feb, 2026 | 07:41
Updated-26 Feb, 2026 | 14:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SolarWinds Serv-U Type Confusion Remote Code Execution Vulnerability

A type confusion vulnerability exists in Serv-U which when exploited, gives a malicious actor the ability to execute arbitrary native code as privileged account. This issue requires administrative privileges to abuse. On Windows deployments, the risk is scored as a medium because services frequently run under less-privileged service accounts by default.

Action-Not Available
Vendor-SolarWinds Worldwide, LLC.
Product-serv-uServ-U
CWE ID-CWE-704
Incorrect Type Conversion or Cast
CVE-2025-40539
Assigner-SolarWinds
ShareView Details
Assigner-SolarWinds
CVSS Score-9.1||CRITICAL
EPSS-0.05% / 14.91%
||
7 Day CHG~0.00%
Published-24 Feb, 2026 | 07:40
Updated-26 Feb, 2026 | 14:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SolarWinds Serv-U Type Confusion Remote Code Execution Vulnerability

A type confusion vulnerability exists in Serv-U which when exploited, gives a malicious actor the ability to execute arbitrary native code as privileged account. This issue requires administrative privileges to abuse. On Windows deployments, the risk is scored as a medium because services frequently run under less-privileged service accounts by default.

Action-Not Available
Vendor-SolarWinds Worldwide, LLC.
Product-serv-uServ-U
CWE ID-CWE-704
Incorrect Type Conversion or Cast
CVE-2025-11848
Assigner-Zyxel Corporation
ShareView Details
Assigner-Zyxel Corporation
CVSS Score-4.9||MEDIUM
EPSS-0.06% / 19.40%
||
7 Day CHG~0.00%
Published-24 Feb, 2026 | 02:14
Updated-25 Feb, 2026 | 17:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A null pointer dereference vulnerability in the Wake-on-LAN CGI program of the Zyxel VMG3625-T50B firmware version through 5.50(ABPM.9.6)C0 and the Zyxel WX3100-T0 firmware versions through 5.50(ABVL.4.8)C0 could allow an authenticated attacker with administrator privileges to trigger a denial-of-service (DoS) condition by sending a crafted HTTP request.

Action-Not Available
Vendor-Zyxel Networks Corporation
Product-dx4510-b0_firmwareex5601-t1_firmwareex5510-b0ex5512-t0vmg4005-b50aax7501-b1_firmwaregm4100-b0_firmwareex7501-b0_firmwarepm5100-t1dx3300-t1_firmwareex3510-b1pm5100-t0_firmwarewx3401-b1_firmwarevmg3625-t50bpx3321-t1ex3501-t0_firmwareex7710-b0_firmwaredx4510-b0ee5301-00vmg4005-b60a_firmwareemg3525-t50b_firmwarepm3100-t0pm7300-t0_firmwareee3301-00pe3301-00dx5401-b1ex2210-t0_firmwaregm4100-b0px5301-t0ex5401-b1_firmwareemg3525-t50bex5510-b0_firmwarewx3100-t0dx5401-b1_firmwareex5601-t1ee3301-00_firmwarepm7300-t0pe5301-01ex2210-t0wx5610-b0_firmwarevmg8623-t50b_firmwarewx3401-b1wx5610-b0dx3301-t0ex3301-t0ex3510-b0pm7500-00_firmwareee5301-00_firmwareex7501-b0ex5401-b1wx5600-t0_firmwarepm5100-t1_firmwareee6510-10ex3510-b1_firmwareex3500-t0ex3600-t0px5301-t0_firmwareex3300-t1_firmwaredx4510-b1scr_50axedx3301-t0_firmwareex3500-t0_firmwarevmg3625-t50b_firmwarepm7500-00vmg4005-b50a_firmwarevmg8623-t50bex5601-t0_firmwarewe3300-00_firmwarescr_50axe_firmwareex3301-t0_firmwarevmg4005-b60adx3300-t0ee6510-10_firmwareex5601-t0dx3300-t1ex3510-b0_firmwareex7710-b0wx3100-t0_firmwareex3300-t0ex3300-t1we3300-00ex5512-t0_firmwarepm5100-t0wx5600-t0ex3300-t0_firmwareemg5523-t50b_firmwarepx3321-t1_firmwaredx4510-b1_firmwareex3501-t0pe5301-01_firmwareex3600-t0_firmwareax7501-b1dx3300-t0_firmwarepe3301-00_firmwareemg5523-t50bpm3100-t0_firmwareVMG3625-T50B firmwareWX3100-T0 firmware
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2025-11847
Assigner-Zyxel Corporation
ShareView Details
Assigner-Zyxel Corporation
CVSS Score-4.9||MEDIUM
EPSS-0.06% / 19.40%
||
7 Day CHG~0.00%
Published-24 Feb, 2026 | 02:09
Updated-25 Feb, 2026 | 18:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A null pointer dereference vulnerability in the IP settings CGI program of the Zyxel VMG3625-T50B firmware versions through 5.50(ABPM.9.6)C0 and the Zyxel WX3100-T0 firmware versions through 5.50(ABVL.4.8)C0 could allow an authenticated attacker with administrator privileges to trigger a denial-of-service (DoS) condition by sending a crafted HTTP request.

Action-Not Available
Vendor-Zyxel Networks Corporation
Product-dx4510-b0_firmwareex5601-t1_firmwareex5510-b0ex5512-t0vmg4005-b50aax7501-b1_firmwarenebula_fwa510_firmwaregm4100-b0_firmwareex7501-b0_firmwarepm5100-t1dx3300-t1_firmwareex3510-b1nebula_lte3301-pluspm5100-t0_firmwarewx3401-b1_firmwarevmg3625-t50bpx3321-t1ex3501-t0_firmwarenebula_fwa505_firmwareex7710-b0_firmwaredx4510-b0nebula_fwa505nebula_lte3301-plus_firmwareee5301-00vmg4005-b60a_firmwareemg3525-t50b_firmwarepm3100-t0pm7300-t0_firmwareee3301-00pe3301-00dx5401-b1ex2210-t0_firmwaregm4100-b0px5301-t0ex5401-b1_firmwareemg3525-t50bex5510-b0_firmwarewx3100-t0dx5401-b1_firmwareex5601-t1ee3301-00_firmwarepm7300-t0pe5301-01lte3301-plus_firmwareex2210-t0wx5610-b0_firmwarevmg8623-t50b_firmwarenebula_fwa710_firmwarewx3401-b1wx5610-b0dx3301-t0ex3301-t0ex3510-b0pm7500-00_firmwarenebula_fwa515_firmwareee5301-00_firmwareex7501-b0ex5401-b1wx5600-t0_firmwarepm5100-t1_firmwareee6510-10ex3510-b1_firmwareex3500-t0ex3600-t0px5301-t0_firmwareex3300-t1_firmwaredx4510-b1scr_50axedx3301-t0_firmwareex3500-t0_firmwarevmg3625-t50b_firmwarepm7500-00vmg4005-b50a_firmwarevmg8623-t50bex5601-t0_firmwarewe3300-00_firmwarenebula_fwa515scr_50axe_firmwareex3301-t0_firmwarenebula_fwa710dx3300-t0ee6510-10_firmwarevmg4005-b60aex5601-t0dx3300-t1ex3510-b0_firmwareex7710-b0wx3100-t0_firmwareex3300-t0ex3300-t1nebula_fwa510we3300-00ex5512-t0_firmwarepm5100-t0wx5600-t0ex3300-t0_firmwareemg5523-t50b_firmwarepx3321-t1_firmwaredx4510-b1_firmwareex3501-t0pe5301-01_firmwareex3600-t0_firmwareax7501-b1lte3301-plusdx3300-t0_firmwarepe3301-00_firmwareemg5523-t50bpm3100-t0_firmwareVMG3625-T50B firmwareWX3100-T0 firmware
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2026-26983
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.03% / 10.18%
||
7 Day CHG~0.00%
Published-24 Feb, 2026 | 02:01
Updated-28 Feb, 2026 | 02:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ImageMagick: Invalid MSL <map> can result in a use after free

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, the MSL interpreter crashes when processing a invalid `<map>` element that causes it to use an image after it has been freed. Versions 7.1.2-15 and 6.9.13-40 contain a patch.

Action-Not Available
Vendor-ImageMagick Studio LLC
Product-imagemagickImageMagick
CWE ID-CWE-476
NULL Pointer Dereference
CWE ID-CWE-416
Use After Free
CVE-2025-11846
Assigner-Zyxel Corporation
ShareView Details
Assigner-Zyxel Corporation
CVSS Score-4.9||MEDIUM
EPSS-0.06% / 19.40%
||
7 Day CHG~0.00%
Published-24 Feb, 2026 | 01:37
Updated-25 Feb, 2026 | 18:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A null pointer dereference vulnerability in the account settings CGI program of the Zyxel VMG3625-T50B firmware versions through 5.50(ABPM.9.6)C0 and the Zyxel WX3100-T0 firmware versions through 5.50(ABVL.4.8)C0 could allow an authenticated attacker with administrator privileges to trigger a denial-of-service (DoS) condition by sending a crafted HTTP request.

Action-Not Available
Vendor-Zyxel Networks Corporation
Product-dx4510-b0_firmwareex5601-t1_firmwareex5510-b0ex5512-t0vmg4005-b50aax7501-b1_firmwarenebula_fwa510_firmwaregm4100-b0_firmwareex7501-b0_firmwarepm5100-t1dx3300-t1_firmwareex3510-b1nebula_lte3301-pluspm5100-t0_firmwarewx3401-b1_firmwarevmg3625-t50bpx3321-t1ex3501-t0_firmwarenebula_fwa505_firmwareex7710-b0_firmwaredx4510-b0nebula_fwa505nebula_lte3301-plus_firmwareee5301-00vmg4005-b60a_firmwareemg3525-t50b_firmwarepm3100-t0pm7300-t0_firmwareee3301-00pe3301-00dx5401-b1ex2210-t0_firmwaregm4100-b0px5301-t0ex5401-b1_firmwareemg3525-t50bex5510-b0_firmwarewx3100-t0dx5401-b1_firmwareex5601-t1ee3301-00_firmwarepm7300-t0pe5301-01lte3301-plus_firmwareex2210-t0wx5610-b0_firmwarevmg8623-t50b_firmwarenebula_fwa710_firmwarewx3401-b1wx5610-b0dx3301-t0ex3301-t0ex3510-b0pm7500-00_firmwarenebula_fwa515_firmwareee5301-00_firmwareex7501-b0ex5401-b1wx5600-t0_firmwarepm5100-t1_firmwareee6510-10ex3510-b1_firmwareex3500-t0ex3600-t0px5301-t0_firmwareex3300-t1_firmwaredx4510-b1scr_50axedx3301-t0_firmwareex3500-t0_firmwarevmg3625-t50b_firmwarepm7500-00vmg4005-b50a_firmwarevmg8623-t50bex5601-t0_firmwarewe3300-00_firmwarenebula_fwa515scr_50axe_firmwareex3301-t0_firmwarenebula_fwa710dx3300-t0ee6510-10_firmwarevmg4005-b60aex5601-t0dx3300-t1ex3510-b0_firmwareex7710-b0wx3100-t0_firmwareex3300-t0ex3300-t1nebula_fwa510we3300-00ex5512-t0_firmwarepm5100-t0wx5600-t0ex3300-t0_firmwareemg5523-t50b_firmwarepx3321-t1_firmwaredx4510-b1_firmwareex3501-t0pe5301-01_firmwareex3600-t0_firmwareax7501-b1lte3301-plusdx3300-t0_firmwarepe3301-00_firmwareemg5523-t50bpm3100-t0_firmwareVMG3625-T50B firmwareWX3100-T0 firmware
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2025-11845
Assigner-Zyxel Corporation
ShareView Details
Assigner-Zyxel Corporation
CVSS Score-4.9||MEDIUM
EPSS-0.07% / 20.75%
||
7 Day CHG~0.00%
Published-24 Feb, 2026 | 01:30
Updated-25 Feb, 2026 | 18:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A null pointer dereference vulnerability in the certificate downloader CGI program of the Zyxel VMG3625-T50B firmware versions through 5.50(ABPM.9.6)C0 and the Zyxel WX3100-T0 firmware versions through 5.50(ABVL.4.8)C0 could allow an authenticated attacker with administrator privileges to trigger a denial-of-service (DoS) condition by sending a crafted HTTP request.

Action-Not Available
Vendor-Zyxel Networks Corporation
Product-dx4510-b0_firmwareex5601-t1_firmwareex5510-b0ex5512-t0vmg4005-b50aax7501-b1_firmwarenebula_fwa510_firmwaregm4100-b0_firmwareex7501-b0_firmwarepm5100-t1dx3300-t1_firmwareex3510-b1nebula_lte3301-pluspm5100-t0_firmwarewx3401-b1_firmwarevmg3625-t50bpx3321-t1ex3501-t0_firmwarenebula_fwa505_firmwareex7710-b0_firmwaredx4510-b0nebula_fwa505nebula_lte3301-plus_firmwareee5301-00vmg4005-b60a_firmwareemg3525-t50b_firmwarepm3100-t0pm7300-t0_firmwareee3301-00pe3301-00dx5401-b1ex2210-t0_firmwaregm4100-b0px5301-t0ex5401-b1_firmwareemg3525-t50bex5510-b0_firmwarewx3100-t0dx5401-b1_firmwareex5601-t1ee3301-00_firmwarepm7300-t0pe5301-01lte3301-plus_firmwareex2210-t0wx5610-b0_firmwarevmg8623-t50b_firmwarenebula_fwa710_firmwarewx3401-b1wx5610-b0dx3301-t0ex3301-t0ex3510-b0pm7500-00_firmwarenebula_fwa515_firmwareee5301-00_firmwareex7501-b0ex5401-b1wx5600-t0_firmwarepm5100-t1_firmwareee6510-10ex3510-b1_firmwareex3500-t0ex3600-t0px5301-t0_firmwareex3300-t1_firmwaredx4510-b1scr_50axedx3301-t0_firmwareex3500-t0_firmwarevmg3625-t50b_firmwarepm7500-00vmg4005-b50a_firmwarevmg8623-t50bex5601-t0_firmwarewe3300-00_firmwarenebula_fwa515scr_50axe_firmwareex3301-t0_firmwarenebula_fwa710dx3300-t0ee6510-10_firmwarevmg4005-b60aex5601-t0dx3300-t1ex3510-b0_firmwareex7710-b0wx3100-t0_firmwareex3300-t0ex3300-t1nebula_fwa510we3300-00ex5512-t0_firmwarepm5100-t0wx5600-t0ex3300-t0_firmwareemg5523-t50b_firmwarepx3321-t1_firmwaredx4510-b1_firmwareex3501-t0pe5301-01_firmwareex3600-t0_firmwareax7501-b1lte3301-plusdx3300-t0_firmwarepe3301-00_firmwareemg5523-t50bpm3100-t0_firmwareVMG3625-T50B firmwareWX3100-T0 firmware
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2026-25798
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.11% / 28.79%
||
7 Day CHG~0.00%
Published-24 Feb, 2026 | 01:02
Updated-26 Feb, 2026 | 15:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ImageMagick has NULL Pointer Dereference in ClonePixelCacheRepository via crafted image

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, a NULL pointer dereference in ClonePixelCacheRepository allows a remote attacker to crash any application linked against ImageMagick by supplying a crafted image file, resulting in denial of service. Versions 7.1.2-15 and 6.9.13-40 contain a patch.

Action-Not Available
Vendor-ImageMagick Studio LLC
Product-imagemagickImageMagick
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2026-25795
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.04% / 12.78%
||
7 Day CHG~0.00%
Published-24 Feb, 2026 | 00:54
Updated-26 Feb, 2026 | 15:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ImageMagick has NULL pointer dereference in ReadSFWImage after DestroyImageInfo (sfw.c)

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, in `ReadSFWImage()` (`coders/sfw.c`), when temporary file creation fails, `read_info` is destroyed before its `filename` member is accessed, causing a NULL pointer dereference and crash. Versions 7.1.2-15 and 6.9.13-40 contain a patch.

Action-Not Available
Vendor-ImageMagick Studio LLC
Product-imagemagickImageMagick
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2026-26025
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-6.6||MEDIUM
EPSS-0.04% / 13.15%
||
7 Day CHG~0.00%
Published-24 Feb, 2026 | 00:15
Updated-26 Feb, 2026 | 14:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
free5GC SMF crash (nil pointer dereference) on PFCP SessionReportRequest when ReportType.USAR=1 and UsageReport omits mandatory URRID sub-IE 

free5GC SMF provides Session Management Function for free5GC, an open-source project for 5th generation (5G) mobile core networks. In versions up to and including 1.4.1, SMF panics and terminates when processing a malformed PFCP SessionReportRequest on the PFCP (UDP/8805) interface. No known upstream fix is available, but some workarounds are available. ACL/firewall the PFCP interface so only trusted UPF IPs can reach SMF (reduce spoofing/abuse surface); drop/inspect malformed PFCP SessionReportRequest messages at the network edge where feasible, and/or add recover() around PFCP handler dispatch to avoid whole-process termination (mitigation only).

Action-Not Available
Vendor-free5gcfree5gc
Product-smfsmf
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2026-26024
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-6.6||MEDIUM
EPSS-0.04% / 13.15%
||
7 Day CHG~0.00%
Published-24 Feb, 2026 | 00:12
Updated-26 Feb, 2026 | 14:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
free5GC SMF crash (nil pointer dereference) on PFCP SessionReportRequest when ReportType.USAR=1 and UsageReport omits mandatory URRID sub-IE 

free5GC SMF provides Session Management Function for free5GC, an open-source project for 5th generation (5G) mobile core networks. In versions up to and including 1.4.1, SMF panics and terminates when processing a malformed PFCP SessionReportRequest on the PFCP (UDP/8805) interface. No known upstream fix is available, but some workarounds are available. ACL/firewall the PFCP interface so only trusted UPF IPs can reach SMF (reduce spoofing/abuse surface); drop/inspect malformed PFCP SessionReportRequest messages at the network edge where feasible, and/or add recover() around PFCP handler dispatch to avoid whole-process termination (mitigation only).

Action-Not Available
Vendor-free5gcfree5gc
Product-smfsmf
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2026-25501
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-6.6||MEDIUM
EPSS-0.04% / 11.09%
||
7 Day CHG~0.00%
Published-24 Feb, 2026 | 00:10
Updated-26 Feb, 2026 | 14:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
free5GC SMF crash (nil pointer dereference) on PFCP SessionReportRequest when ReportType.DLDR is set but DownlinkDataReport IE is missing

free5GC SMF provides Session Management Function for free5GC, an open-source project for 5th generation (5G) mobile core networks. In versions up to and including 1.4.1, SMF panics due to nil pointer dereference and the SMF process terminates. This is triggered by a malformed PFCP SessionReportRequest on the SMF PFCP (UDP/8805) interface. No known upstream fix is available, but some workarounds are available. ACL/firewall the PFCP interface so only trusted UPF IPs can reach SMF (reduce spoofing/abuse surface); drop/inspect malformed PFCP SessionReportRequest messages at the network edge where feasible, and/or add recover() around PFCP handler dispatch to avoid whole-process termination (mitigation only).

Action-Not Available
Vendor-free5gcfree5gc
Product-smfsmf
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2025-69252
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-6.6||MEDIUM
EPSS-0.26% / 48.84%
||
7 Day CHG~0.00%
Published-23 Feb, 2026 | 23:56
Updated-25 Feb, 2026 | 16:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
free5GC has Null Pointer Dereference in UDM, Leading to Service Panic

free5gc UDM provides Unified Data Management (UDM) for free5GC, an open-source project for 5th generation (5G) mobile core networks. Versions up to and including 1.4.1 have a NULL Pointer Dereference vulnerability. Remote unauthenticated attackers can trigger a service panic (Denial of Service) by sending a crafted PUT request with an unexpected ueId, crashing the UDM service. All deployments of free5GC using the UDM component may be affected. free5gc/udm pull request 76 contains a fix for the issue. No direct workaround is available at the application level. Applying the official patch is recommended.

Action-Not Available
Vendor-free5gcfree5gc
Product-udmudm
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2025-61143
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.01% / 1.30%
||
7 Day CHG~0.00%
Published-23 Feb, 2026 | 00:00
Updated-25 Feb, 2026 | 14:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

libtiff up to v4.7.1 was discovered to contain a NULL pointer dereference via the component libtiff/tif_open.c.

Action-Not Available
Vendor-n/aLibTIFF
Product-libtiffn/a
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2026-2903
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-4.8||MEDIUM
EPSS-0.01% / 2.60%
||
7 Day CHG~0.00%
Published-22 Feb, 2026 | 00:32
Updated-26 Feb, 2026 | 16:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
skvadrik re2c ast.cc check_and_merge_special_rules null pointer dereference

A flaw has been found in skvadrik re2c up to 4.4. Impacted is the function check_and_merge_special_rules of the file src/parse/ast.cc. This manipulation causes null pointer dereference. The attack can only be executed locally. The exploit has been published and may be used. Patch name: febeb977936f9519a25d9fbd10ff8256358cdb97. It is suggested to install a patch to address this issue.

Action-Not Available
Vendor-skvadrik
Product-re2c
CWE ID-CWE-404
Improper Resource Shutdown or Release
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2025-10256
Assigner-Fedora Project
ShareView Details
Assigner-Fedora Project
CVSS Score-5.3||MEDIUM
EPSS-0.03% / 6.92%
||
7 Day CHG-0.01%
Published-18 Feb, 2026 | 20:26
Updated-26 Feb, 2026 | 22:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Ffmpeg: null pointer dereference in firequalizer filter (libavfilter/af_firequalizer.c)

A NULL pointer dereference vulnerability exists in FFmpeg’s Firequalizer filter (libavfilter/af_firequalizer.c) due to a missing check on the return value of av_malloc_array() in the config_input() function. An attacker could exploit this by tricking a victim into processing a crafted media file with the Firequalizer filter enabled, causing the application to dereference a NULL pointer and crash, leading to denial of service.

Action-Not Available
Vendor-FFmpeg
Product-ffmpeg
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2026-2507
Assigner-F5, Inc.
ShareView Details
Assigner-F5, Inc.
CVSS Score-8.7||HIGH
EPSS-0.11% / 30.23%
||
7 Day CHG+0.03%
Published-18 Feb, 2026 | 15:55
Updated-18 Feb, 2026 | 17:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
BIG-IP TMM Vulnerability

When BIG-IP AFM or BIG-IP DDoS is provisioned, undisclosed traffic can cause TMM to terminate.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

Action-Not Available
Vendor-F5, Inc.
Product-BIG-IP
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2026-2642
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-4.8||MEDIUM
EPSS-0.01% / 0.31%
||
7 Day CHG~0.00%
Published-18 Feb, 2026 | 06:32
Updated-23 Feb, 2026 | 10:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ggreer the_silver_searcher search.c search_stream null pointer dereference

A security vulnerability has been detected in ggreer the_silver_searcher up to 2.2.0. The impacted element is the function search_stream of the file src/search.c. The manipulation leads to null pointer dereference. Local access is required to approach this attack. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report but has not responded yet.

Action-Not Available
Vendor-ggreer
Product-the_silver_searcher
CWE ID-CWE-404
Improper Resource Shutdown or Release
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2025-70954
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.03% / 7.23%
||
7 Day CHG~0.00%
Published-13 Feb, 2026 | 00:00
Updated-18 Feb, 2026 | 17:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Null Pointer Dereference vulnerability exists in the TON Virtual Machine (TVM) within the TON Blockchain before v2025.06. The issue is located in the execution logic of the INMSGPARAM instruction, where the program fails to validate if a specific pointer is null before accessing it. By sending a malicious transaction or smart contract, an attacker can trigger this null pointer dereference, causing the validator node process to crash (segmentation fault). This results in a Denial of Service (DoS) affecting the availability of the entire blockchain network.

Action-Not Available
Vendor-n/a
Product-n/a
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2025-30266
Assigner-QNAP Systems, Inc.
ShareView Details
Assigner-QNAP Systems, Inc.
CVSS Score-0.6||LOW
EPSS-0.12% / 30.68%
||
7 Day CHG~0.00%
Published-11 Feb, 2026 | 12:20
Updated-11 Feb, 2026 | 21:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Qsync Central

A NULL pointer dereference vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack. We have already fixed the vulnerability in the following version: Qsync Central 5.0.0.4 ( 2026/01/20 ) and later

Action-Not Available
Vendor-QNAP Systems, Inc.
Product-qsync_centralQsync Central
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2025-47205
Assigner-QNAP Systems, Inc.
ShareView Details
Assigner-QNAP Systems, Inc.
CVSS Score-5.1||MEDIUM
EPSS-0.13% / 32.20%
||
7 Day CHG-0.06%
Published-11 Feb, 2026 | 12:19
Updated-27 Feb, 2026 | 12:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
QTS, QuTS hero

A NULL pointer dereference vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack. We have already fixed the vulnerability in the following versions: QTS 5.2.8.3332 build 20251128 and later QuTS hero h5.2.8.3321 build 20251117 and later

Action-Not Available
Vendor-QNAP Systems, Inc.
Product-qtsquts_heroQTSQuTS hero
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2025-47209
Assigner-QNAP Systems, Inc.
ShareView Details
Assigner-QNAP Systems, Inc.
CVSS Score-1.3||LOW
EPSS-0.12% / 30.68%
||
7 Day CHG~0.00%
Published-11 Feb, 2026 | 12:19
Updated-11 Feb, 2026 | 21:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Qsync Central

A NULL pointer dereference vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack. We have already fixed the vulnerability in the following version: Qsync Central 5.0.0.4 ( 2026/01/20 ) and later

Action-Not Available
Vendor-QNAP Systems, Inc.
Product-qsync_centralQsync Central
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2025-48722
Assigner-QNAP Systems, Inc.
ShareView Details
Assigner-QNAP Systems, Inc.
CVSS Score-1.3||LOW
EPSS-0.12% / 30.68%
||
7 Day CHG~0.00%
Published-11 Feb, 2026 | 12:19
Updated-11 Feb, 2026 | 21:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Qsync Central

A NULL pointer dereference vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack. We have already fixed the vulnerability in the following version: Qsync Central 5.0.0.4 ( 2026/01/20 ) and later

Action-Not Available
Vendor-QNAP Systems, Inc.
Product-qsync_centralQsync Central
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2025-53598
Assigner-QNAP Systems, Inc.
ShareView Details
Assigner-QNAP Systems, Inc.
CVSS Score-0.6||LOW
EPSS-0.04% / 11.07%
||
7 Day CHG~0.00%
Published-11 Feb, 2026 | 12:18
Updated-12 Feb, 2026 | 13:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Qsync Central

A NULL pointer dereference vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack. We have already fixed the vulnerability in the following version: Qsync Central 5.0.0.4 ( 2026/01/20 ) and later

Action-Not Available
Vendor-QNAP Systems, Inc.
Product-qsync_centralQsync Central
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2025-54146
Assigner-QNAP Systems, Inc.
ShareView Details
Assigner-QNAP Systems, Inc.
CVSS Score-1.3||LOW
EPSS-0.04% / 11.07%
||
7 Day CHG~0.00%
Published-11 Feb, 2026 | 12:18
Updated-12 Feb, 2026 | 13:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Qsync Central

A NULL pointer dereference vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack. We have already fixed the vulnerability in the following version: Qsync Central 5.0.0.4 ( 2026/01/20 ) and later

Action-Not Available
Vendor-QNAP Systems, Inc.
Product-qsync_centralQsync Central
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2025-54147
Assigner-QNAP Systems, Inc.
ShareView Details
Assigner-QNAP Systems, Inc.
CVSS Score-1.3||LOW
EPSS-0.04% / 11.07%
||
7 Day CHG~0.00%
Published-11 Feb, 2026 | 12:18
Updated-12 Feb, 2026 | 13:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Qsync Central

A NULL pointer dereference vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack. We have already fixed the vulnerability in the following version: Qsync Central 5.0.0.4 ( 2026/01/20 ) and later

Action-Not Available
Vendor-QNAP Systems, Inc.
Product-qsync_centralQsync Central
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2025-54148
Assigner-QNAP Systems, Inc.
ShareView Details
Assigner-QNAP Systems, Inc.
CVSS Score-1.3||LOW
EPSS-0.04% / 11.07%
||
7 Day CHG~0.00%
Published-11 Feb, 2026 | 12:18
Updated-12 Feb, 2026 | 13:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Qsync Central

A NULL pointer dereference vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack. We have already fixed the vulnerability in the following version: Qsync Central 5.0.0.4 ( 2026/01/20 ) and later

Action-Not Available
Vendor-QNAP Systems, Inc.
Product-qsync_centralQsync Central
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2025-54163
Assigner-QNAP Systems, Inc.
ShareView Details
Assigner-QNAP Systems, Inc.
CVSS Score-1.2||LOW
EPSS-0.13% / 32.20%
||
7 Day CHG~0.00%
Published-11 Feb, 2026 | 12:17
Updated-12 Feb, 2026 | 19:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
File Station 5

A NULL pointer dereference vulnerability has been reported to affect File Station 5. If a remote attacker gains an administrator account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack. We have already fixed the vulnerability in the following version: File Station 5 5.5.6.5166 and later

Action-Not Available
Vendor-QNAP Systems, Inc.
Product-file_stationFile Station 5
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2025-58472
Assigner-QNAP Systems, Inc.
ShareView Details
Assigner-QNAP Systems, Inc.
CVSS Score-1.2||LOW
EPSS-0.04% / 11.88%
||
7 Day CHG~0.00%
Published-11 Feb, 2026 | 12:16
Updated-12 Feb, 2026 | 14:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Qsync Central

A NULL pointer dereference vulnerability has been reported to affect Qsync Central. If a remote attacker gains an administrator account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack. We have already fixed the vulnerability in the following version: Qsync Central 5.0.0.4 ( 2026/01/20 ) and later

Action-Not Available
Vendor-QNAP Systems, Inc.
Product-qsync_centralQsync Central
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2025-59386
Assigner-QNAP Systems, Inc.
ShareView Details
Assigner-QNAP Systems, Inc.
CVSS Score-1.2||LOW
EPSS-0.13% / 32.20%
||
7 Day CHG~0.00%
Published-11 Feb, 2026 | 12:16
Updated-27 Feb, 2026 | 14:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
QuTS hero

A NULL pointer dereference vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack. We have already fixed the vulnerability in the following version: QuTS hero h5.3.2.3354 build 20251225 and later

Action-Not Available
Vendor-QNAP Systems, Inc.
Product-quts_heroQuTS hero
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2025-66274
Assigner-QNAP Systems, Inc.
ShareView Details
Assigner-QNAP Systems, Inc.
CVSS Score-1.2||LOW
EPSS-0.13% / 32.20%
||
7 Day CHG~0.00%
Published-11 Feb, 2026 | 12:15
Updated-12 Feb, 2026 | 17:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
QuTS hero

A NULL pointer dereference vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack. We have already fixed the vulnerability in the following version: QuTS hero h5.3.2.3354 build 20251225 and later

Action-Not Available
Vendor-QNAP Systems, Inc.
Product-quts_heroQuTS hero
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2026-25613
Assigner-MongoDB, Inc.
ShareView Details
Assigner-MongoDB, Inc.
CVSS Score-7.1||HIGH
EPSS-0.05% / 14.33%
||
7 Day CHG~0.00%
Published-10 Feb, 2026 | 18:54
Updated-25 Feb, 2026 | 16:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
An unsafe cast in the MongoDB query planner can result in a segmentation fault.

An authorized user may disable the MongoDB server by issuing a query against a collection that contains an invalid compound wildcard index.

Action-Not Available
Vendor-MongoDB, Inc.
Product-mongodbMongoDB Server
CWE ID-CWE-704
Incorrect Type Conversion or Cast
CVE-2026-21338
Assigner-Adobe Systems Incorporated
ShareView Details
Assigner-Adobe Systems Incorporated
CVSS Score-5.5||MEDIUM
EPSS-0.02% / 4.79%
||
7 Day CHG~0.00%
Published-10 Feb, 2026 | 18:08
Updated-11 Feb, 2026 | 17:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Substance3D - Designer | NULL Pointer Dereference (CWE-476)

Substance3D - Designer versions 15.1.0 and earlier are affected by a NULL Pointer Dereference vulnerability that could lead to application denial-of-service. An attacker could exploit this vulnerability to crash the application, causing disruption to services. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Action-Not Available
Vendor-Adobe Inc.
Product-substance_3d_designerSubstance3D - Designer
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2026-21336
Assigner-Adobe Systems Incorporated
ShareView Details
Assigner-Adobe Systems Incorporated
CVSS Score-5.5||MEDIUM
EPSS-0.02% / 4.79%
||
7 Day CHG~0.00%
Published-10 Feb, 2026 | 18:08
Updated-11 Feb, 2026 | 17:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Substance3D - Designer | NULL Pointer Dereference (CWE-476)

Substance3D - Designer versions 15.1.0 and earlier are affected by a NULL Pointer Dereference vulnerability that could lead to application denial-of-service. An attacker could exploit this vulnerability to crash the application, causing disruption to services. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Action-Not Available
Vendor-Adobe Inc.
Product-substance_3d_designerSubstance3D - Designer
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2026-21350
Assigner-Adobe Systems Incorporated
ShareView Details
Assigner-Adobe Systems Incorporated
CVSS Score-5.5||MEDIUM
EPSS-0.02% / 4.79%
||
7 Day CHG~0.00%
Published-10 Feb, 2026 | 17:52
Updated-11 Feb, 2026 | 17:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
After Effects | NULL Pointer Dereference (CWE-476)

After Effects versions 25.6 and earlier are affected by a NULL Pointer Dereference vulnerability that could lead to application denial-of-service. An attacker could exploit this vulnerability to crash the application, causing disruption to services. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Action-Not Available
Vendor-Adobe Inc.Microsoft CorporationApple Inc.
Product-macosafter_effectswindowsAfter Effects
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2026-21243
Assigner-Microsoft Corporation
ShareView Details
Assigner-Microsoft Corporation
CVSS Score-7.5||HIGH
EPSS-0.05% / 15.77%
||
7 Day CHG~0.00%
Published-10 Feb, 2026 | 17:51
Updated-27 Feb, 2026 | 20:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability

Null pointer dereference in Windows LDAP - Lightweight Directory Access Protocol allows an unauthorized attacker to deny service over a network.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_server_2022windows_server_2025windows_server_2022_23h2windows_server_2019Windows Server 2019 (Server Core installation)Windows Server 2019Windows Server 2022Windows Server 2022, 23H2 Edition (Server Core installation)Windows Server 2025Windows Server 2025 (Server Core installation)
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2026-21525
Assigner-Microsoft Corporation
ShareView Details
Assigner-Microsoft Corporation
CVSS Score-6.2||MEDIUM
EPSS-2.60% / 85.35%
||
7 Day CHG+0.43%
Published-10 Feb, 2026 | 17:51
Updated-27 Feb, 2026 | 20:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2026-03-03||Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Windows Remote Access Connection Manager Denial of Service Vulnerability

Null pointer dereference in Windows Remote Access Connection Manager allows an unauthorized attacker to deny service locally.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_21h2windows_server_2016windows_10_22h2windows_server_2012windows_11_24h2windows_11_23h2windows_10_1809windows_server_2022windows_server_2025windows_11_25h2windows_server_2022_23h2windows_10_1607windows_server_2019Windows Server 2019 (Server Core installation)Windows 11 Version 25H2Windows 10 Version 21H2Windows 10 Version 22H2Windows 11 Version 23H2Windows Server 2012Windows Server 2022, 23H2 Edition (Server Core installation)Windows Server 2012 R2Windows Server 2025 (Server Core installation)Windows Server 2012 R2 (Server Core installation)Windows 11 version 22H3Windows 11 version 26H1Windows Server 2019Windows 10 Version 1607Windows Server 2022Windows 11 Version 26H1Windows Server 2012 (Server Core installation)Windows Server 2025Windows Server 2016 (Server Core installation)Windows 11 Version 24H2Windows Server 2016Windows 10 Version 1809Windows
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2025-20080
Assigner-Intel Corporation
ShareView Details
Assigner-Intel Corporation
CVSS Score-8.2||HIGH
EPSS-0.07% / 21.77%
||
7 Day CHG~0.00%
Published-10 Feb, 2026 | 16:25
Updated-11 Feb, 2026 | 15:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Null pointer dereference in the firmware for some Intel(R) AMT and Intel(R) Standard Manageability within Ring 0: Kernel may allow a denial of service. Network adversary with an unauthenticated user combined with a high complexity attack may enable denial of service. This result may potentially occur via network access when attack requirements are present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (none), integrity (none) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.

Action-Not Available
Vendor-n/a
Product-Intel(R) AMT and Intel(R) Standard Manageability
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2025-15571
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-4.8||MEDIUM
EPSS-0.02% / 4.83%
||
7 Day CHG+0.01%
Published-10 Feb, 2026 | 14:32
Updated-27 Feb, 2026 | 16:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ckolivas lrzip stream.c ucompthread null pointer dereference

A security vulnerability has been detected in ckolivas lrzip up to 0.651. This vulnerability affects the function ucompthread of the file stream.c. Such manipulation leads to null pointer dereference. The attack can only be performed from a local environment. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report but has not responded yet.

Action-Not Available
Vendor-ckolivasckolivas
Product-lrziplrzip
CWE ID-CWE-404
Improper Resource Shutdown or Release
CWE ID-CWE-476
NULL Pointer Dereference
  • Previous
  • 1
  • 2
  • 3
  • ...
  • 102
  • 103
  • Next