A vulnerability was found in Tuxera ntfs-3g. It has been rated as critical. Affected by this vulnerability is an unknown functionality of the component NTFS Inode Pathname Handler. The manipulation leads to heap-based buffer overflow.
This vulnerability is referenced as CVE-2021-35266. It is possible to launch the attack on the physical device. No exploit is available.
Upgrading the affected component is advised.
A vulnerability was found in Tuxera ntfs-3g. It has been declared as critical. This affects an unknown part of the component MFT Section Handler. The manipulation results in heap-based buffer overflow.
This vulnerability was named CVE-2021-33289. An attack on the physical device is feasible. There is no available exploit.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Tuxera ntfs-3g. This vulnerability affects the function ntfs_attr_pread_i of the component NTFS Attribute Handler. The manipulation leads to heap-based buffer overflow.
This vulnerability is documented as CVE-2021-33287. It is possible to launch the attack on the physical device. There is not any exploit available.
It is advisable to upgrade the affected component.
A vulnerability was found in Tuxera ntfs-3g. It has been classified as critical. Affected by this issue is some unknown functionality of the component Unicode String Handler. The manipulation leads to heap-based buffer overflow.
This vulnerability is uniquely identified as CVE-2021-33286. It is possible to launch the attack on the physical device. No exploit exists.
Upgrading the affected component is recommended.
A vulnerability was found in Tuxera ntfs-3g. It has been declared as critical. Affected is the function ntfs_get_attribute_value of the component NTFS Attribute Handler. Executing a manipulation can lead to heap-based buffer overflow.
The identification of this vulnerability is CVE-2021-33285. The physical device can be targeted for the attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Tuxera NTFS-3G up to 2021.8.22. Affected is the function fuse_lib_opendir. Such manipulation leads to memory corruption.
This vulnerability is traded as CVE-2022-30785. Access to the local network is required for this attack to succeed. There is no exploit available.
A vulnerability has been found in Tuxera NTFS-3G up to 2021.8.22 and classified as critical. Affected by this vulnerability is the function fuse_lib_readdir. Performing a manipulation results in integer underflow.
This vulnerability is known as CVE-2022-30787. Access to the local network is required for this attack. No exploit is available.
A vulnerability was found in Tuxera NTFS-3G up to 2021.8.22. It has been classified as problematic. Affected is the function fuse_kern_mount of the component libfuse-lite. Performing a manipulation results in information disclosure.
This vulnerability was named CVE-2022-30783. The attack may be initiated remotely. There is no available exploit.
A vulnerability marked as critical has been reported in z-9527 admin 1.0/2.0. The affected element is the function checkName/register/login/getUser/getUsers of the file /server/controller/user.js. The manipulation leads to sql injection.
This vulnerability is documented as CVE-2026-3200. The attack can be initiated remotely. Additionally, an exploit exists.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability labeled as critical has been found in aces Loris up to 26.0.4/27.0.1. This impacts an unknown function of the component Media Module. Such manipulation leads to path traversal.
This vulnerability is referenced as CVE-2026-26984. It is possible to launch the attack remotely. No exploit is available.
The affected component should be upgraded.
A vulnerability, which was classified as critical, has been found in go-vikunja vikunja up to 1.x. This vulnerability affects the function restoreConfig of the file vikunja/pkg/modules/dump/restore.go of the component ZIP Handler. This manipulation causes path traversal.
This vulnerability is registered as CVE-2026-27819. Remote exploitation of the attack is possible. No exploit is available.
It is advisable to upgrade the affected component.
A vulnerability marked as critical has been reported in go-vikunja vikunja up to 1.x. Impacted is an unknown function. This manipulation causes weak password requirements.
The identification of this vulnerability is CVE-2026-27575. It is possible to initiate the attack remotely. There is no exploit available.
It is suggested to upgrade the affected component.
A vulnerability described as critical has been identified in aces Loris up to 26.0.4/27.0.1. The affected element is the function electrophysiogy_browser. Such manipulation leads to path traversal.
This vulnerability is referenced as CVE-2026-26985. It is possible to launch the attack remotely. No exploit is available.
Upgrading the affected component is recommended.
A vulnerability classified as problematic has been found in go-vikunja vikunja up to 1.x. The impacted element is an unknown function of the component Projects Module. Performing a manipulation results in cross site scripting.
This vulnerability is identified as CVE-2026-27116. The attack can be initiated remotely. There is not any exploit available.
It is recommended to upgrade the affected component.