A vulnerability has been found in ci4-cms-erp ci4ms 0.28.5.0 and classified as problematic. Affected is an unknown function. The manipulation leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2026-34558. The attack is possible to be carried out remotely. No exploit exists.
The affected component should be upgraded.
A vulnerability, which was classified as problematic, was found in ci4-cms-erp ci4ms 0.28.5.0. This impacts an unknown function of the component Permission Management Page. Executing a manipulation can lead to cross site scripting.
This vulnerability is handled as CVE-2026-34557. The attack can be executed remotely. There is not any exploit available.
You should upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in ci4-cms-erp ci4ms 0.28.5.0. This affects an unknown function of the component Mail Protocol. Performing a manipulation results in cross site scripting.
This vulnerability is known as CVE-2026-27599. Remote exploitation of the attack is possible. No exploit is available.
It is advisable to upgrade the affected component.
A vulnerability classified as critical was found in Kyverno 1.16.0. The impacted element is an unknown function. Such manipulation leads to server-side request forgery.
This vulnerability is traded as CVE-2026-4789. The attack may be launched remotely. There is no exploit available.
A vulnerability classified as critical has been found in randombit botan up to 3.10.x. The affected element is an unknown function of the component X.509 Certificate Handler. This manipulation causes improper certificate validation.
This vulnerability appears as CVE-2026-32884. The attack may be initiated remotely. There is no available exploit.
It is recommended to upgrade the affected component.
A vulnerability described as critical has been identified in randombit botan up to 3.10.x. Impacted is an unknown function. The manipulation results in out-of-bounds read.
This vulnerability is reported as CVE-2026-32877. The attack can be launched remotely. No exploit exists.
Upgrading the affected component is recommended.
A vulnerability marked as problematic has been reported in 0xJacky nginx-ui up to 2.3.3. This issue affects some unknown processing. The manipulation leads to cleartext storage of sensitive information.
This vulnerability is documented as CVE-2026-33026. The attack can be initiated remotely. There is not any exploit available.
It is suggested to upgrade the affected component.
A vulnerability labeled as problematic has been found in Node.js up to 20.20.1/22.22.1/24.14.0/25.8.1. This vulnerability affects the function FileHandle.chmod/FileHandle.chown of the component Promises API. Executing a manipulation can lead to uncontrolled file descriptor consumption.
This vulnerability is registered as CVE-2026-21716. The attack needs to be launched locally. No exploit is available.
Applying a patch is advised to resolve this issue.
A vulnerability identified as problematic has been detected in FreeRDP up to 3.24.1. This affects the function kerberos_AcceptSecurityContext in the library winpr/libwinpr/sspi/Kerberos/kerberos.c. Performing a manipulation results in double free.
This vulnerability is cataloged as CVE-2026-33995. It is possible to initiate the attack remotely. There is no exploit available.
You should upgrade the affected component.
A vulnerability categorized as critical has been discovered in FreeRDP up to 3.24.1. Affected by this issue is the function persistent_cache_read_entry_v3 of the file libfreerdp/cache/persistent.c. Such manipulation leads to heap-based buffer overflow.
This vulnerability is listed as CVE-2026-33987. The attack must be carried out locally. There is no available exploit.
It is advisable to upgrade the affected component.
A vulnerability was found in FreeRDP up to 3.24.1. It has been rated as critical. Affected by this vulnerability is the function winpr_aligned_offset_recalloc. This manipulation causes out-of-bounds read.
This vulnerability is tracked as CVE-2026-33982. The attack is restricted to local execution. No exploit exists.
Upgrading the affected component is advised.
A vulnerability was found in FreeRDP up to 3.24.1. It has been declared as critical. Affected is the function yuv_ensure_buffer of the file libfreerdp/codec/h264.c. The manipulation results in heap-based buffer overflow.
This vulnerability is identified as CVE-2026-33986. The attack can be executed remotely. There is not any exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in FreeRDP up to 3.24.1. It has been classified as problematic. This impacts an unknown function. The manipulation leads to out-of-bounds read.
This vulnerability is referenced as CVE-2026-33985. Remote exploitation of the attack is possible. No exploit is available.
Upgrading the affected component is recommended.
A vulnerability was found in FreeRDP up to 3.24.1 and classified as critical. This affects the function resize_vbar_entry of the file libfreerdp/codec/clear.c. Executing a manipulation can lead to heap-based buffer overflow.
The identification of this vulnerability is CVE-2026-33984. The attack may be launched remotely. There is no exploit available.
It is suggested to upgrade the affected component.
A vulnerability has been found in FreeRDP up to 3.24.1 and classified as problematic. The impacted element is an unknown function. Performing a manipulation results in reachable assertion.
This vulnerability was named CVE-2026-33977. The attack may be initiated remotely. There is no available exploit.
The affected component should be upgraded.
A vulnerability, which was classified as problematic, was found in FreeRDP up to 3.24.1. The affected element is the function rts_read_auth_verifier_no_checks. Such manipulation of the argument auth_length leads to reachable assertion.
This vulnerability is uniquely identified as CVE-2026-33952. The attack can be launched remotely. No exploit exists.
You should upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in randombit botan up to 3.10.x. Impacted is an unknown function of the component X509 Path Validation Handler. This manipulation causes improper verification of cryptographic signature.
This vulnerability is handled as CVE-2026-32883. The attack can be initiated remotely. There is not any exploit available.
It is advisable to upgrade the affected component.
A vulnerability classified as critical was found in HAI Build Code Generator. This issue affects some unknown processing. The manipulation results in injection.
This vulnerability is known as CVE-2026-30308. It is possible to launch the attack remotely. No exploit is available.