A vulnerability, which was classified as critical, has been found in RyuzakiShinji biome-mcp-server up to 1.0.0. Affected by this issue is some unknown functionality of the file biome-mcp-server.ts. Performing a manipulation results in command injection.
This vulnerability is identified as CVE-2026-3680. The attack can be initiated remotely. Additionally, an exploit exists.
Applying a patch is the recommended action to fix this issue.
A vulnerability classified as critical was found in Tenda FH451 1.0.0.9. Affected by this vulnerability is the function formQuickIndex of the file /goform/QuickIndex. Such manipulation of the argument mit_linktype/PPPOEPassword leads to stack-based buffer overflow.
This vulnerability is referenced as CVE-2026-3679. It is possible to launch the attack remotely. Furthermore, an exploit is available.
A vulnerability classified as critical has been found in Tenda FH451 1.0.0.9. Affected is the function sub_3C434 of the file /goform/AdvSetWan. This manipulation of the argument wanmode/PPPOEPassword causes stack-based buffer overflow.
The identification of this vulnerability is CVE-2026-3678. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
A vulnerability described as critical has been identified in Tenda FH451 1.0.0.9. This impacts the function fromSetCfm of the file /goform/setcfm. The manipulation of the argument funcname/funcpara1 results in stack-based buffer overflow.
This vulnerability was named CVE-2026-3677. The attack may be performed from remote. In addition, an exploit is available.
A vulnerability marked as problematic has been reported in jstedfast MimeKit up to 4.15.0. This affects an unknown function. The manipulation leads to crlf injection.
This vulnerability is uniquely identified as CVE-2026-30227. The attack is possible to be carried out remotely. No exploit exists.
It is suggested to upgrade the affected component.
A vulnerability labeled as critical has been found in OliveTin up to 3000.11.0. The impacted element is an unknown function. Executing a manipulation can lead to improper authentication.
This vulnerability is handled as CVE-2026-30223. The attack can be executed remotely. There is not any exploit available.
The affected component should be upgraded.
A vulnerability identified as problematic has been detected in FlintSH Flare up to 1.7.1. The affected element is an unknown function. Performing a manipulation results in authorization bypass.
This vulnerability is known as CVE-2026-30231. Remote exploitation of the attack is possible. No exploit is available.
You should upgrade the affected component.
A vulnerability categorized as problematic has been discovered in FlintSH Flare up to 1.7.1. Impacted is an unknown function of the component Thumbnail Endpoint. Such manipulation leads to authorization bypass.
This vulnerability is traded as CVE-2026-30230. The attack may be launched remotely. There is no exploit available.
It is advisable to upgrade the affected component.
A vulnerability was found in OliveTin up to 3000.11.0. It has been rated as critical. This issue affects some unknown processing. This manipulation causes session fixiation.
This vulnerability appears as CVE-2026-30224. The attack may be initiated remotely. There is no available exploit.
Upgrading the affected component is advised.
A vulnerability was found in OliveTin up to 3000.11.0. It has been declared as problematic. This vulnerability affects the function IsAllowedView of the component API Endpoint. The manipulation results in information disclosure.
This vulnerability is reported as CVE-2026-30233. The attack can be launched remotely. No exploit exists.
It is recommended to upgrade the affected component.
A vulnerability was found in OliveTin up to 3000.11.0. It has been classified as problematic. This affects an unknown part. The manipulation leads to unintended intermediary.
This vulnerability is documented as CVE-2026-30225. The attack can be initiated remotely. There is not any exploit available.
Upgrading the affected component is recommended.
A vulnerability was found in Freedom Factory dGEN1 up to 20260221 and classified as critical. Affected by this issue is the function FakeAppReceiver of the component org.ethosmobile.ethoslauncher. Executing a manipulation can lead to improper authorization.
This vulnerability is registered as CVE-2026-3675. The attack needs to be launched locally. Furthermore, an exploit is available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability has been found in Freedom Factory dGEN1 up to 20260221 and classified as critical. Affected by this vulnerability is the function FakeAppProvider of the component org.ethosmobile.ethoslauncher. Performing a manipulation results in improper authorization.
This vulnerability is cataloged as CVE-2026-3674. The attack must be initiated from a local position. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.