A vulnerability has been found in MongoDB Server up to 7.0.28/8.0.17/8.2.3 and classified as problematic. Affected by this issue is some unknown functionality of the component Proxy Protocol Handler. This manipulation causes allocation of resources.
This vulnerability appears as CVE-2026-1848. The attack may be initiated remotely. There is no available exploit.
The affected component should be upgraded.
Microsoft has released Windows 11 KB5077181 and KB5075941 cumulative updates for versions 25H2/24H2 and 23H2 to fix security vulnerabilities, bugs, and add new features. [...]
A vulnerability, which was classified as problematic, has been found in HP OfficeJet Pro 8710 All-in-One Printer. Affected is an unknown function of the component TCP Connection Handler. The manipulation leads to improper check or handling of exceptional conditions.
This vulnerability is documented as CVE-2026-1996. The attack can be initiated remotely. There is not any exploit available.
It is advisable to upgrade the affected component.
A vulnerability classified as critical was found in TP-Link Tapo C260 v1. This impacts an unknown function. Executing a manipulation can lead to path traversal.
This vulnerability is registered as CVE-2026-0651. The physical device can be targeted for the attack. No exploit is available.
A vulnerability classified as critical has been found in TP-Link Tapo C260 v1. This affects an unknown function of the component POST Parameter Handler. Performing a manipulation results in os command injection.
This vulnerability is cataloged as CVE-2026-0652. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability described as critical has been identified in worklenz up to 2.1.6. The impacted element is an unknown function. Such manipulation leads to sql injection.
This vulnerability is listed as CVE-2026-25947. The attack may be performed from remote. There is no available exploit.
Upgrading the affected component is recommended.
A vulnerability marked as problematic has been reported in zed-industries zed up to 0.219.3. The affected element is an unknown function. This manipulation causes product ui does not warn user of unsafe actions.
This vulnerability is tracked as CVE-2026-25805. The attack is possible to be carried out remotely. No exploit exists.
It is suggested to upgrade the affected component.
A vulnerability labeled as critical has been found in TP-Link Tapo C260 v1. Impacted is an unknown function of the component Requests Handler. The manipulation results in improper access controls.
This vulnerability is identified as CVE-2026-0653. The attack can be executed remotely. There is not any exploit available.
A vulnerability identified as problematic has been detected in Frappe up to 14.99.13/15.93.x. This issue affects some unknown processing of the component Signup. The manipulation leads to cross site scripting.
This vulnerability is referenced as CVE-2026-25956. Remote exploitation of the attack is possible. No exploit is available.
You should upgrade the affected component.
A vulnerability has been found in Microsoft Azure IoT Explorer and classified as problematic. This impacts an unknown function. The manipulation leads to binding to an unrestricted ip address.
This vulnerability is traded as CVE-2026-21528. It is possible to initiate the attack remotely. There is no exploit available.
To fix this issue, it is recommended to deploy a patch.
A vulnerability, which was classified as problematic, was found in Microsoft Exchange Server. This affects an unknown function. Executing a manipulation can lead to clickjacking.
This vulnerability appears as CVE-2026-21527. The attack may be performed from remote. There is no available exploit.
A patch should be applied to remediate this issue.
A vulnerability categorized as problematic has been discovered in Microsoft Microsoft ACI Confidential Containers. This vulnerability affects unknown code. Executing a manipulation can lead to cleartext storage of sensitive information.
The identification of this vulnerability is CVE-2026-23655. The attack may be launched remotely. There is no exploit available.
Applying a patch is advised to resolve this issue.
A vulnerability classified as critical was found in Microsoft Visual Studio Code. The affected element is an unknown function. Such manipulation leads to time-of-check time-of-use.
This vulnerability is documented as CVE-2026-21523. The attack can be executed remotely. There is not any exploit available.
Applying a patch is advised to resolve this issue.
A vulnerability was found in Microsoft Defender for Endpoint for Linux. It has been rated as critical. This affects an unknown part. Performing a manipulation results in code injection.
This vulnerability was named CVE-2026-21537. The attack needs to be approached within the local network. There is no available exploit.
It is recommended to apply a patch to fix this issue.
A vulnerability classified as critical has been found in Microsoft ACI Confidential Containers. Impacted is an unknown function. This manipulation causes command injection.
This vulnerability is registered as CVE-2026-21522. The attack needs to be launched locally. No exploit is available.
It is recommended to apply a patch to fix this issue.