A vulnerability labeled as critical has been found in TOTOLINK X6000R 9.4.0cu.1360_B20241207/9.4.0cu.1498_B20250826. Affected by this issue is the function setLanCfg of the file /usr/sbin/shttpd. Executing a manipulation of the argument Hostname can lead to os command injection.
The identification of this vulnerability is CVE-2026-4611. The attack may be launched remotely. There is no exploit available.
A vulnerability marked as critical has been reported in itsourcecode Free Hotel Reservation System 1.0. This affects an unknown part of the file /hotel/admin/mod_users/index.php?view=edit&id=8 of the component Parameter Handler. The manipulation of the argument account_id leads to sql injection.
This vulnerability is referenced as CVE-2026-4612. Remote exploitation of the attack is possible. Furthermore, an exploit is available.
A vulnerability was found in systemd up to 257.10/258.4/259.1 and classified as critical. This vulnerability affects unknown code of the component API Call Handler. The manipulation results in improper privilege management.
This vulnerability was named CVE-2026-29111. The attack needs to be approached locally. There is no available exploit.
It is suggested to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in opensource-workshop connect-cms up to 1.41.0/2.41.0. The affected element is an unknown function. This manipulation causes code injection.
This vulnerability appears as CVE-2026-32276. The attack may be initiated remotely. There is no available exploit.
It is advisable to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in opensource-workshop connect-cms up to 1.41.0/2.41.0. The impacted element is an unknown function. Such manipulation leads to cross site scripting.
This vulnerability is traded as CVE-2026-32277. The attack may be launched remotely. There is no exploit available.
You should upgrade the affected component.
A vulnerability has been found in opensource-workshop connect-cms up to 1.41.0/2.41.0 and classified as critical. This affects an unknown function of the component Form Plugin. Performing a manipulation of the argument File results in unrestricted upload.
This vulnerability is known as CVE-2026-32278. Remote exploitation of the attack is possible. No exploit is available.
The affected component should be upgraded.
A vulnerability marked as critical has been reported in aquasecurity setup-trivy, trivy-action and trivy up to 0.2.5. Impacted is an unknown function. The manipulation leads to embedded malicious code.
This vulnerability is listed as CVE-2026-33634. The attack may be initiated remotely. In addition, an exploit is available.
It is suggested to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in OpenClaw up to 2026.3.6. This impacts an unknown function. Performing a manipulation results in incorrect authorization.
This vulnerability is reported as CVE-2026-27183. The attack requires a local approach. No exploit exists.
It is advisable to upgrade the affected component.
A vulnerability has been found in OpenClaw up to 2026.3.6 and classified as critical. Affected by this vulnerability is an unknown functionality of the component Header Validation Handler. The manipulation leads to insufficiently protected credentials.
This vulnerability is traded as CVE-2026-32913. It is possible to initiate the attack remotely. There is no exploit available.
The affected component should be upgraded.
A vulnerability categorized as problematic has been discovered in OpenClaw up to 2026.3.6. Impacted is an unknown function of the file /acp. Executing a manipulation can lead to incorrect authorization.
The identification of this vulnerability is CVE-2026-27646. The attack can only be executed locally. There is no exploit available.
It is advisable to upgrade the affected component.
A vulnerability marked as critical has been reported in opensource-workshop connect-cms up to 1.41.0/2.41.0. This affects an unknown function. This manipulation causes server-side request forgery.
This vulnerability is tracked as CVE-2026-32279. The attack is possible to be carried out remotely. No exploit exists.
It is suggested to upgrade the affected component.
A vulnerability described as critical has been identified in opensource-workshop connect-cms up to 1.41.0/2.41.0. This impacts an unknown function. Such manipulation leads to improper access controls.
This vulnerability is listed as CVE-2026-32299. The attack may be performed from remote. There is no available exploit.
Upgrading the affected component is recommended.
A vulnerability classified as critical has been found in opensource-workshop connect-cms up to 1.41.0/2.41.0. Affected is an unknown function of the component My Page. Performing a manipulation results in improper authorization.
This vulnerability is cataloged as CVE-2026-32300. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability marked as very critical has been reported in Citrix NetScaler ADC and NetScaler Gateway. The impacted element is an unknown function of the component SSL VPN/ICA Proxy/CVPN/RDP Proxy. The manipulation leads to race condition.
This vulnerability is documented as CVE-2026-4368. The attack can be initiated remotely. There is not any exploit available.
It is suggested to upgrade the affected component.
A vulnerability described as problematic has been identified in blinkospace blinko up to 1.8.3. This affects an unknown function of the component User Information Handler. The manipulation results in information disclosure.
This vulnerability is reported as CVE-2026-23486. The attack can be launched remotely. No exploit exists.
Upgrading the affected component is recommended.