A vulnerability classified as critical was found in Yasr Screen Reader 0.6.9-5. This impacts an unknown function. Executing a manipulation of the argument -p can lead to path traversal.
This vulnerability appears as CVE-2016-20041. The attack requires local access. In addition, an exploit is available.
A vulnerability, which was classified as critical, has been found in NRSS RSS Reader 0.3.9. Affected is an unknown function. The manipulation of the argument -F leads to out-of-bounds write.
This vulnerability is traded as CVE-2016-20043. An attack has to be approached locally. Furthermore, there is an exploit available.
A vulnerability has been found in ticalc Texas Instrument Emulator 3.03 and classified as critical. Affected by this issue is some unknown functionality of the component Command-Line Interface. This manipulation of the argument ROM causes path traversal.
This vulnerability is handled as CVE-2016-20040. It is possible to launch the attack on the local host. Additionally, an exploit exists.
A vulnerability was found in trn Threaded USENET News Reader 3.6-23. It has been classified as critical. This vulnerability affects unknown code. Performing a manipulation results in out-of-bounds write.
This vulnerability was named CVE-2016-20042. The attack needs to be approached locally. In addition, an exploit is available.
A vulnerability was found in PInfo 0.6.9-5.1. It has been rated as critical. Impacted is an unknown function. The manipulation of the argument -m leads to out-of-bounds write.
This vulnerability is referenced as CVE-2016-20044. The attack can only be performed from a local environment. Furthermore, an exploit is available.
A vulnerability, which was classified as critical, was found in HNB Organizer 1.9.18-10. Affected by this vulnerability is an unknown functionality. The manipulation of the argument -rc results in out-of-bounds write.
This vulnerability is known as CVE-2016-20045. Attacking locally is a requirement. Furthermore, an exploit is available.
A vulnerability categorized as critical has been discovered in zFTP Client 20061220+dfsg3-4.1. The affected element is the function strcpy_chk. The manipulation of the argument Name results in out-of-bounds write.
This vulnerability is identified as CVE-2016-20046. The attack is only possible with local access. Additionally, an exploit exists.
A vulnerability described as critical has been identified in EKG Gadu 11.9~pre+r2855-3+b1. Affected is the function strlcpy. Executing a manipulation can lead to out-of-bounds write.
This vulnerability is registered as CVE-2016-20047. The attack needs to be launched locally. Furthermore, an exploit is available.
A vulnerability was found in iSelect 1.4. It has been rated as problematic. This affects an unknown part. Performing a manipulation results in memory corruption.
This vulnerability is identified as CVE-2016-20048. The attack is only possible with local access. Additionally, an exploit exists.
A vulnerability identified as critical has been detected in code-projects Simple Food Order System 1.0. This impacts an unknown function of the file /all-tickets.php of the component Parameter Handler. Performing a manipulation of the argument Status results in sql injection.
This vulnerability is identified as CVE-2026-5017. The attack can be initiated remotely. Additionally, an exploit exists.
A vulnerability labeled as critical has been found in code-projects Simple Food Order System 1.0. Affected is an unknown function of the file register-router.php of the component Parameter Handler. Executing a manipulation of the argument Name can lead to sql injection.
This vulnerability is tracked as CVE-2026-5018. The attack can be launched remotely. Moreover, an exploit is present.
Currently trending CVE - Hype Score: 1 - Vendor: The Apache Software Foundation
Versions Affected: Apache OpenMeetings from 2.1.0 before 8.0.0
Description: Default clustering instructions at https://openmeetings.apache.org/Clustering.html doesn't specify white/black lists for OpenJPA this leads to possible ...
Netskope's Sanjay Beri on Data Risk, Agent Visibility and Enabling AI Safely AI adoption has outrun enterprise security, leaving data exposed and controls nonexistent. Sanjay Beri, co-founder and CEO at Netskope, says the answer isn't restriction. It's visibility, context and a culture of enablement.
Car Hacking Village's Ghali on Automotive Security for AI-Driven Mobility Ecosystem As vehicles evolve into connected, software-defined systems, cybersecurity risks now extend beyond the car itself. Kamel Ghali, vice president at Car Hacking Village, explains why threat modeling, AI safety and ecosystemwide visibility are critical in modern automotive security.
Rain Capital's Lefort on Overcapitalization and Cybersecurity's Barbell Effect Cybersecurity funding hit all-time highs in 2025, rivaling the 2021 boom, said Sidra Ahmed Lefort, venture partner at Rain Capital. A "barbell effect" has taken hold, with capital concentrating at the earliest and latest stages while squeezing the Series cB and C middle.
Costanoa Ventures' John Cowgill on Moving From Static Analysis to Runtime Defense Artificial intelligence-generated code is arriving faster than security teams can review it, and the risks are moving from the line level to the system level, says John Cowgill, partner at Costanoa Ventures.