A vulnerability identified as problematic has been detected in Craft CMS up to 4.17.7/5.9.13. This impacts an unknown function of the component Endpoint. The manipulation leads to authorization bypass.
This vulnerability is listed as CVE-2026-33160. The attack may be initiated remotely. There is no available exploit.
You should upgrade the affected component.
A vulnerability labeled as critical has been found in Craft CMS up to 5.9.13. Affected is an unknown function of the file /actions/entries/move-to-section. The manipulation results in improper authorization.
This vulnerability is cataloged as CVE-2026-33162. The attack may be launched remotely. There is no exploit available.
The affected component should be upgraded.
A vulnerability marked as critical has been reported in Craft CMS up to 4.17.7/5.9.13. Affected by this vulnerability is an unknown functionality. This manipulation causes missing authentication.
This vulnerability is registered as CVE-2026-33159. Remote exploitation of the attack is possible. No exploit is available.
It is suggested to upgrade the affected component.
A vulnerability classified as problematic has been found in Craft CMS up to 4.17.7/5.9.13. This affects an unknown part of the component Endpoint. Performing a manipulation results in information disclosure.
This vulnerability is reported as CVE-2026-33161. The attack is possible to be carried out remotely. No exploit exists.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in ellite Wallos up to 4.6.x. This vulnerability affects the function validate_webhook_url_for_ssrf of the component Notifications Handler. Executing a manipulation can lead to server-side request forgery.
This vulnerability appears as CVE-2026-33399. The attack may be performed from remote. There is no available exploit.
Upgrading the affected component is advised.
A vulnerability, which was classified as critical, has been found in ellite Wallos up to 4.6.x. This issue affects some unknown processing of the file endpoints/logos/search.php of the component Endpoint. The manipulation of the argument HTTP_PROXY/HTTPS_PROXY leads to server-side request forgery.
This vulnerability is traded as CVE-2026-33407. It is possible to initiate the attack remotely. There is no exploit available.
It is advisable to upgrade the affected component.
A vulnerability, which was classified as critical, was found in ellite Wallos up to 4.6.x. Impacted is an unknown function of the component AI Recommendations Endpoint. The manipulation of the argument AI Ollama host results in server-side request forgery.
This vulnerability is known as CVE-2026-33401. It is possible to launch the attack remotely. No exploit is available.
You should upgrade the affected component.
A vulnerability has been found in ellite Wallos up to 4.6.x and classified as problematic. The affected element is the function payment of the component Statistics Page. This manipulation causes cross site scripting.
This vulnerability is handled as CVE-2026-33400. The attack can be initiated remotely. There is not any exploit available.
The affected component should be upgraded.
A vulnerability marked as critical has been reported in IDrive Cloud Backup Client on Windows. The affected element is an unknown function of the file id_service.exe. The manipulation leads to improper privilege management.
This vulnerability is listed as CVE-2026-1995. The attack must be carried out locally. There is no available exploit.
It is suggested to upgrade the affected component.
A vulnerability described as problematic has been identified in Zabbix up to 6.0.40/7.0.18/7.2.12/7.4.2. The impacted element is an unknown function. The manipulation results in exposure of data element to wrong session.
This vulnerability is cataloged as CVE-2026-23919. The attack must originate from the local network. There is no exploit available.
A vulnerability categorized as critical has been discovered in go-vikunja vikunja up to 2.2.0. Impacted is the function ReadOne of the component Attachments Handler. Such manipulation leads to authorization bypass.
This vulnerability is listed as CVE-2026-33678. The attack may be performed from remote. There is no available exploit.
It is advisable to upgrade the affected component.
A vulnerability identified as critical has been detected in go-vikunja vikunja up to 2.2.0. The affected element is the function DownloadImage of the file pkg/utils/avatar.go of the component Image Parser. Performing a manipulation results in server-side request forgery.
This vulnerability is cataloged as CVE-2026-33679. It is possible to initiate the attack remotely. There is no exploit available.
You should upgrade the affected component.
A vulnerability labeled as critical has been found in go-vikunja vikunja up to 2.2.1. The impacted element is the function LinkSharing.ReadAll. Executing a manipulation can lead to improper authorization.
This vulnerability is registered as CVE-2026-33680. It is possible to launch the attack remotely. No exploit is available.
The affected component should be upgraded.
A vulnerability marked as problematic has been reported in go-vikunja vikunja up to 2.2.0. This affects an unknown function of the file /api/v1/projects/. The manipulation leads to authorization bypass.
This vulnerability is documented as CVE-2026-33700. The attack can be initiated remotely. There is not any exploit available.
It is suggested to upgrade the affected component.