A vulnerability categorized as critical has been discovered in Apache Airflow Provider for Databricks up to 1.11.x. This impacts an unknown function. The manipulation results in improper certificate validation.
This vulnerability is cataloged as CVE-2026-32794. The attack may be launched remotely. There is no exploit available.
It is advisable to upgrade the affected component.
A vulnerability was found in FreeRDP up to 3.24.1. It has been classified as problematic. This impacts an unknown function. The manipulation leads to out-of-bounds read.
This vulnerability is referenced as CVE-2026-33985. Remote exploitation of the attack is possible. No exploit is available.
Upgrading the affected component is recommended.
A vulnerability was found in FreeRDP up to 3.24.1. It has been declared as critical. Affected is the function yuv_ensure_buffer of the file libfreerdp/codec/h264.c. The manipulation results in heap-based buffer overflow.
This vulnerability is identified as CVE-2026-33986. The attack can be executed remotely. There is not any exploit available.
It is recommended to upgrade the affected component.
A vulnerability categorized as critical has been discovered in FreeRDP up to 3.24.1. Affected by this issue is the function persistent_cache_read_entry_v3 of the file libfreerdp/cache/persistent.c. Such manipulation leads to heap-based buffer overflow.
This vulnerability is listed as CVE-2026-33987. The attack must be carried out locally. There is no available exploit.
It is advisable to upgrade the affected component.
A vulnerability classified as critical has been found in Tenda CH22 1.0.0.1/1.If. The impacted element is the function fromSetCfm of the file /goform/setcfm of the component Parameter Handler. The manipulation of the argument funcname leads to stack-based buffer overflow.
This vulnerability is referenced as CVE-2026-5154. Remote exploitation of the attack is possible. Furthermore, an exploit is available.
A vulnerability classified as critical was found in Tenda CH22 1.0.0.1. This affects the function fromAdvSetWan of the file /goform/AdvSetWan of the component Parameter Handler. The manipulation of the argument wanmode results in stack-based buffer overflow.
This vulnerability is identified as CVE-2026-5155. The attack can be executed remotely. Additionally, an exploit exists.
A vulnerability identified as problematic has been detected in FreeRDP up to 3.24.1. This affects the function kerberos_AcceptSecurityContext in the library winpr/libwinpr/sspi/Kerberos/kerberos.c. Performing a manipulation results in double free.
This vulnerability is cataloged as CVE-2026-33995. It is possible to initiate the attack remotely. There is no exploit available.
You should upgrade the affected component.
A vulnerability was found in fleetdm fleet up to 4.80.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component Endpoint. Such manipulation leads to sql injection.
This vulnerability is traded as CVE-2026-26186. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability marked as problematic has been reported in expressjs multer up to 2.0.x. Impacted is an unknown function. Performing a manipulation results in incomplete cleanup.
This vulnerability is reported as CVE-2026-3304. The attack is possible to be carried out remotely. No exploit exists.
It is suggested to upgrade the affected component.
A vulnerability was found in expressjs multer up to 2.1.0. It has been declared as problematic. Impacted is an unknown function. Executing a manipulation can lead to uncontrolled recursion.
This vulnerability is registered as CVE-2026-3520. It is possible to launch the attack remotely. No exploit is available.
It is recommended to upgrade the affected component.
A vulnerability labeled as problematic has been found in expressjs multer up to 2.0.x. This issue affects some unknown processing. Such manipulation leads to missing release of resource.
This vulnerability is documented as CVE-2026-2359. The attack can be executed remotely. There is not any exploit available.
The affected component should be upgraded.
A vulnerability was found in Microsoft Edge. It has been rated as problematic. This vulnerability affects unknown code. This manipulation causes Remote Code Execution.
This vulnerability appears as CVE-2026-32187. The attack may be initiated remotely. There is no available exploit.
Upgrading the affected component is advised.
A vulnerability described as critical has been identified in Undertow. This affects an unknown function of the component Requests Handler. The manipulation results in http request smuggling.
This vulnerability was named CVE-2026-28368. The attack may be performed from remote. There is no available exploit.
A vulnerability identified as critical has been detected in Undertow. This affects an unknown function of the component HTTP Request Handler. The manipulation leads to http request smuggling.
This vulnerability is traded as CVE-2026-28369. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability was found in Undertow. It has been classified as critical. Affected by this issue is some unknown functionality of the component Web Request Handler. The manipulation leads to http request smuggling.
This vulnerability is documented as CVE-2026-28367. The attack can be initiated remotely. There is not any exploit available.