A vulnerability categorized as critical has been discovered in go-vikunja vikunja up to 2.2.0. Impacted is the function ReadOne of the component Attachments Handler. Such manipulation leads to authorization bypass.
This vulnerability is listed as CVE-2026-33678. The attack may be performed from remote. There is no available exploit.
It is advisable to upgrade the affected component.
A vulnerability identified as critical has been detected in go-vikunja vikunja up to 2.2.0. The affected element is the function DownloadImage of the file pkg/utils/avatar.go of the component Image Parser. Performing a manipulation results in server-side request forgery.
This vulnerability is cataloged as CVE-2026-33679. It is possible to initiate the attack remotely. There is no exploit available.
You should upgrade the affected component.
A vulnerability labeled as critical has been found in go-vikunja vikunja up to 2.2.1. The impacted element is the function LinkSharing.ReadAll. Executing a manipulation can lead to improper authorization.
This vulnerability is registered as CVE-2026-33680. It is possible to launch the attack remotely. No exploit is available.
The affected component should be upgraded.
A vulnerability marked as problematic has been reported in go-vikunja vikunja up to 2.2.0. This affects an unknown function of the file /api/v1/projects/. The manipulation leads to authorization bypass.
This vulnerability is documented as CVE-2026-33700. The attack can be initiated remotely. There is not any exploit available.
It is suggested to upgrade the affected component.
A vulnerability was found in LibVNC Server up to 0.9.15 and classified as critical. This issue affects the function HandleUltraZipBPP of the component VNC Handler. The manipulation results in out-of-bounds read.
This vulnerability was named CVE-2026-32853. The attack may be performed from remote. There is no available exploit.
A patch should be applied to remediate this issue.
A vulnerability was found in LibVNC Server up to 0.9.15. It has been classified as problematic. Impacted is the function httpProcessInput of the file httpd.c of the component HTTP Proxy Handler. This manipulation causes null pointer dereference.
The identification of this vulnerability is CVE-2026-32854. It is possible to initiate the attack remotely. There is no exploit available.
To fix this issue, it is recommended to deploy a patch.
A vulnerability was found in Craft CMS up to 5.9.12. It has been declared as problematic. The affected element is the function cleanseConfig. Such manipulation of the argument fieldLayouts leads to use of externally-controlled input to select classes or code.
This vulnerability is referenced as CVE-2026-33157. It is possible to launch the attack remotely. No exploit is available.
It is recommended to upgrade the affected component.
A vulnerability categorized as problematic has been discovered in Craft CMS up to 4.17.7/5.9.13. This affects an unknown function. Executing a manipulation can lead to authorization bypass.
This vulnerability is tracked as CVE-2026-33158. The attack can be launched remotely. No exploit exists.
It is advisable to upgrade the affected component.
A vulnerability described as critical has been identified in ParisNeo lollms-webui up to 8c5dcef63d847bb3d027ec74915d8fe4afd3014e. Affected by this issue is some unknown functionality of the component Web User Interface. Such manipulation leads to missing authentication.
This vulnerability is documented as CVE-2026-33340. The attack can be executed remotely. There is not any exploit available.
A vulnerability was found in LibTIFF up to 4.3.0. It has been rated as problematic. The affected element is the function TIFFFetchStripThing of the file tif_dirread.c of the component TIFF File Handler. This manipulation causes denial of service.
This vulnerability appears as CVE-2022-0561. The attack may be initiated remotely. There is no available exploit.
It is suggested to install a patch to address this issue.
A vulnerability, which was classified as critical, was found in vim up to 8.1. This vulnerability affects unknown code. Such manipulation leads to uninitialized pointer.
This vulnerability is documented as CVE-2022-0554. The attack can be executed remotely. There is not any exploit available.
You should upgrade the affected component.
A vulnerability identified as problematic has been detected in zephyrproject-rtos Zephyr. The impacted element is an unknown function of the component Slot 0 Handler. The manipulation leads to information disclosure.
This vulnerability is documented as CVE-2022-0553. The attack requires being on the local network. There is not any exploit available.
A vulnerability, which was classified as critical, has been found in Mozilla Firefox up to 96. This vulnerability affects unknown code. The manipulation leads to memory corruption.
This vulnerability is documented as CVE-2022-0511. The attack can be initiated remotely. There is not any exploit available.
It is advisable to upgrade the affected component.
A vulnerability described as critical has been identified in radare2.js up to 5.6.1. This affects an unknown function. Such manipulation leads to memory corruption.
This vulnerability is documented as CVE-2022-0523. The attack can be executed remotely. There is not any exploit available.
Upgrading the affected component is recommended.
A vulnerability marked as critical has been reported in Active Storage 5.2.0. This affects an unknown function. The manipulation of the argument image_processing leads to code injection.
This vulnerability is listed as CVE-2022-21831. The attack must be carried out from within the local network. There is no available exploit.
A vulnerability was found in Oracle Communications Diameter Signaling Router 8.6.0.0. It has been classified as critical. This impacts an unknown function of the component Platform. Performing a manipulation results in improper authentication.
This vulnerability is identified as CVE-2022-0492. The attack is only possible with local access. There is not any exploit available.
A vulnerability labeled as critical has been found in langflow-ai langflow up to 1.8.x. This impacts an unknown function of the file /api/v1/files/images/ of the component Image Handler. Executing a manipulation of the argument flow_id can lead to improper access controls.
This vulnerability appears as CVE-2026-33484. The attack may be performed from remote. There is no available exploit.
The affected component should be upgraded.
A vulnerability marked as critical has been reported in langflow-ai langflow up to 1.7.0. Affected is the function download_profile_picture of the file /profile_pictures/ of the component Parameter Handler. The manipulation of the argument file_name leads to path traversal.
This vulnerability is traded as CVE-2026-33497. It is possible to initiate the attack remotely. There is no exploit available.
It is suggested to upgrade the affected component.