A vulnerability has been found in macrozheng mall up to 1.0.3 and classified as critical. This affects an unknown part. Performing a manipulation results in weak password recovery.
This vulnerability is reported as CVE-2026-25858. The attack is possible to be carried out remotely. No exploit exists.
A vulnerability, which was classified as critical, was found in Tenda G300-F up to 16.01.14.2. Affected by this issue is the function formSetWanDiag of the component Management Interface. Such manipulation leads to os command injection.
This vulnerability is documented as CVE-2026-25857. The attack can be executed remotely. There is not any exploit available.
A vulnerability, which was classified as critical, was found in yeqifu warehouse up to aaf29962ba407d22d991781de28796ee7b4670e4. This affects the function loadAllLoginfo/deleteLoginfo/batchDeleteLoginfo of the file dataset\repos\warehouse\src\main\java\com\yeqifu\sys\controller\LoginfoController.java of the component Log Info Handler. The manipulation results in improper authorization.
This vulnerability is reported as CVE-2026-2107. The attack can be launched remotely. Moreover, an exploit is present.
This product does not use versioning. This is why information about affected and unaffected releases are unavailable.
The project was informed of the problem early through an issue report but has not responded yet.
A vulnerability has been found in jsbroks COCO Annotator up to 0.11.1 and classified as problematic. This impacts an unknown function of the file /api/info/long_task of the component Endpoint. This manipulation causes denial of service.
This vulnerability appears as CVE-2026-2108. The attack may be initiated remotely. In addition, an exploit is available.
It is advisable to implement restrictive firewalling.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability was found in jsbroks COCO Annotator up to 0.11.1 and classified as problematic. Affected is an unknown function of the file /api/undo/ of the component Delete Category Handler. Such manipulation of the argument ID leads to improper authorization.
This vulnerability is traded as CVE-2026-2109. The attack may be launched remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability described as critical has been identified in Linux Kernel up to 6.6.121/6.12.67/6.18.7/6.19-rc6. Affected by this vulnerability is the function mcba_usb_read_bulk_callback. Such manipulation leads to memory leak.
This vulnerability is referenced as CVE-2026-23080. The attack needs to be initiated within the local network. No exploit is available.
Upgrading the affected component is recommended.
A vulnerability labeled as critical has been found in Linux Kernel up to 6.18.5/6.19-rc4. Affected by this issue is the function do_abort_log_replay of the component btrfs. Such manipulation leads to null pointer dereference.
This vulnerability is uniquely identified as CVE-2026-23043. The attack can only be initiated within the local network. No exploit exists.
The affected component should be upgraded.
A vulnerability was found in Rite CMS 3.0. It has been declared as problematic. This affects an unknown function of the component Administration Menu. Executing a manipulation can lead to cross site scripting.
This vulnerability is registered as CVE-2023-43878. It is possible to launch the attack remotely. No exploit is available.
A vulnerability classified as problematic has been found in Rite CMS 3.0. Impacted is an unknown function of the component Administration Menu. This manipulation causes cross site scripting.
This vulnerability is registered as CVE-2023-43877. Remote exploitation of the attack is possible. No exploit is available.
A vulnerability was found in Rite CMS 3.0. It has been rated as problematic. This impacts an unknown function of the component Administration Menu. The manipulation leads to cross site scripting.
This vulnerability is documented as CVE-2023-43879. The attack can be initiated remotely. There is not any exploit available.
A vulnerability has been found in CMS Made Simple 2.2.18 and classified as problematic. This affects an unknown part of the component File Upload Handler. The manipulation leads to cross site scripting.
This vulnerability is listed as CVE-2023-43872. The attack may be initiated remotely. There is no available exploit.
A vulnerability was found in e017 CMS 2.3.2 and classified as problematic. This vulnerability affects unknown code of the component Manage Menu. The manipulation of the argument Name results in cross site scripting.
This vulnerability is cataloged as CVE-2023-43873. The attack may be launched remotely. There is no exploit available.
A vulnerability, which was classified as problematic, has been found in e017 CMS 2.3.2. Affected by this vulnerability is an unknown functionality of the component Meta/Custom Tags Menu. Performing a manipulation of the argument Copyright/Author results in cross site scripting.
This vulnerability is identified as CVE-2023-43874. The attack can be initiated remotely. There is not any exploit available.
A vulnerability, which was classified as problematic, was found in WBCE 1.6.1. Affected by this issue is some unknown functionality of the component File Upload Handler. Executing a manipulation can lead to cross site scripting.
This vulnerability is tracked as CVE-2023-43871. The attack can be launched remotely. No exploit exists.
A vulnerability was found in D-Link DIR-619L B1 2.02. It has been declared as critical. Impacted is the function formSetWAN_Wizard56. Such manipulation leads to buffer overflow.
This vulnerability is documented as CVE-2023-43869. The attack requires being on the local network. There is not any exploit available.
A vulnerability classified as critical has been found in D-Link DIR-619L B1 2.02. Affected by this issue is the function formSetWanL2TP. Performing a manipulation results in buffer overflow.
This vulnerability was named CVE-2023-43867. The attack needs to be approached within the local network. There is no available exploit.
A vulnerability classified as critical was found in D-Link DIR-619L B1 2.02. This affects the function websGetVar. Executing a manipulation can lead to buffer overflow.
The identification of this vulnerability is CVE-2023-43868. The attack needs to be done within the local network. There is no exploit available.
A vulnerability described as critical has been identified in D-Link DIR-619L B1 2.02. Affected by this vulnerability is the function formSetWAN_Wizard7. Such manipulation leads to buffer overflow.
This vulnerability is uniquely identified as CVE-2023-43866. The attack can only be initiated within the local network. No exploit exists.