A vulnerability was found in fleetdm fleet up to 4.80.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component Endpoint. Such manipulation leads to sql injection.
This vulnerability is traded as CVE-2026-26186. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability marked as problematic has been reported in expressjs multer up to 2.0.x. Impacted is an unknown function. Performing a manipulation results in incomplete cleanup.
This vulnerability is reported as CVE-2026-3304. The attack is possible to be carried out remotely. No exploit exists.
It is suggested to upgrade the affected component.
A vulnerability was found in expressjs multer up to 2.1.0. It has been declared as problematic. Impacted is an unknown function. Executing a manipulation can lead to uncontrolled recursion.
This vulnerability is registered as CVE-2026-3520. It is possible to launch the attack remotely. No exploit is available.
It is recommended to upgrade the affected component.
A vulnerability labeled as problematic has been found in expressjs multer up to 2.0.x. This issue affects some unknown processing. Such manipulation leads to missing release of resource.
This vulnerability is documented as CVE-2026-2359. The attack can be executed remotely. There is not any exploit available.
The affected component should be upgraded.
A vulnerability was found in Microsoft Edge. It has been rated as problematic. This vulnerability affects unknown code. This manipulation causes Remote Code Execution.
This vulnerability appears as CVE-2026-32187. The attack may be initiated remotely. There is no available exploit.
Upgrading the affected component is advised.
A vulnerability described as critical has been identified in Undertow. This affects an unknown function of the component Requests Handler. The manipulation results in http request smuggling.
This vulnerability was named CVE-2026-28368. The attack may be performed from remote. There is no available exploit.
A vulnerability identified as critical has been detected in Undertow. This affects an unknown function of the component HTTP Request Handler. The manipulation leads to http request smuggling.
This vulnerability is traded as CVE-2026-28369. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability was found in Undertow. It has been classified as critical. Affected by this issue is some unknown functionality of the component Web Request Handler. The manipulation leads to http request smuggling.
This vulnerability is documented as CVE-2026-28367. The attack can be initiated remotely. There is not any exploit available.
A vulnerability labeled as critical has been found in Material Icons up to 2.0.3 on Drupal. Impacted is an unknown function. The manipulation results in incorrect authorization.
This vulnerability is known as CVE-2026-3210. It is possible to launch the attack remotely. No exploit is available.
The affected component should be upgraded.
A vulnerability marked as problematic has been reported in UI Icons up to 1.0.0/1.1.0 on Drupal. The affected element is an unknown function. This manipulation causes cross site scripting.
This vulnerability is handled as CVE-2026-2349. The attack can be initiated remotely. There is not any exploit available.
It is suggested to upgrade the affected component.
A vulnerability classified as problematic was found in Quick Edit up to 1.0.4/2.0.0 on Drupal. This impacts an unknown function. Executing a manipulation can lead to cross site scripting.
The identification of this vulnerability is CVE-2026-2348. The attack may be launched remotely. There is no exploit available.
Upgrading the affected component is advised.
A vulnerability, which was classified as problematic, has been found in Theme Negotiation by Rules up to 1.2.0 on Drupal. Affected is an unknown function. The manipulation leads to cross-site request forgery.
This vulnerability is referenced as CVE-2026-3211. Remote exploitation of the attack is possible. No exploit is available.
It is advisable to upgrade the affected component.
A vulnerability categorized as problematic has been discovered in kiteworks Secure Data Forms up to 9.2.0. The affected element is an unknown function. The manipulation results in cross site scripting.
This vulnerability is reported as CVE-2026-24750. The attack can be launched remotely. No exploit exists.
It is advisable to upgrade the affected component.
A vulnerability classified as critical has been found in Cisco IOS XE. Affected by this vulnerability is an unknown functionality of the component Lobby Ambassador Web-based Management API. The manipulation leads to improper validation of syntactic correctness of input.
This vulnerability is uniquely identified as CVE-2026-20114. The attack is possible to be carried out remotely. No exploit exists.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in Cisco IOS XE. Affected by this issue is some unknown functionality of the component Meraki Dashboard. The manipulation results in cleartext transmission of sensitive information.
This vulnerability was named CVE-2026-20115. The attack may be performed from remote. There is no available exploit.
Upgrading the affected component is advised.
A vulnerability, which was classified as critical, has been found in Cisco IOS and IOS XE. This affects an unknown part of the component HTTP Server. This manipulation causes improper handling of syntactically invalid structure.
The identification of this vulnerability is CVE-2026-20125. It is possible to initiate the attack remotely. There is no exploit available.
It is advisable to upgrade the affected component.
A vulnerability categorized as critical has been discovered in textract up to 2.5.0. This impacts the function child_process.exec in the library lib/extractors/doc.js of the file child_process.exec. Such manipulation of the argument filepath leads to os command injection.
This vulnerability is documented as CVE-2026-26831. The attack requires being on the local network. There is not any exploit available.