Aggregator
CVE-2026-4984 | botpress MediaUrlN missing encryption
6 days 8 hours ago
A vulnerability described as problematic has been identified in botpress. The impacted element is an unknown function. Executing a manipulation of the argument MediaUrlN can lead to missing encryption of sensitive data.
This vulnerability is tracked as CVE-2026-4984. The attack can be launched remotely. No exploit exists.
vuldb.com
CVE-2026-33750 | juliangruber brace-expansion up to 1.1.12/2.0.2/3.0.1/5.0.4 expand step resource consumption
6 days 8 hours ago
A vulnerability marked as problematic has been reported in juliangruber brace-expansion up to 1.1.12/2.0.2/3.0.1/5.0.4. The affected element is the function expand. Performing a manipulation of the argument step results in resource consumption.
This vulnerability is identified as CVE-2026-33750. The attack can be initiated remotely. There is not any exploit available.
It is suggested to upgrade the affected component.
vuldb.com
CVE-2026-27876 | Grafana Enterprise up to 11.6.13/12.1.9/12.2.7/12.3.5/12.4.1 Expressions Feature privilege escalation
6 days 8 hours ago
A vulnerability labeled as problematic has been found in Grafana Enterprise up to 11.6.13/12.1.9/12.2.7/12.3.5/12.4.1. Impacted is an unknown function of the component Expressions Feature. Such manipulation leads to privilege escalation.
This vulnerability is referenced as CVE-2026-27876. It is possible to launch the attack remotely. No exploit is available.
The affected component should be upgraded.
vuldb.com
CVE-2026-5022 | langflow-ai langflow Image /api/v1/files/images/ flow_id/file_name authorization
6 days 8 hours ago
A vulnerability identified as problematic has been detected in langflow-ai langflow. This issue affects some unknown processing of the file /api/v1/files/images/ of the component Image Handler. This manipulation of the argument flow_id/file_name causes missing authorization.
The identification of this vulnerability is CVE-2026-5022. It is possible to initiate the attack remotely. There is no exploit available.
vuldb.com
CVE-2026-33755 | Intermesh GroupOffice up to 6.8.157/25.0.91/26.0.16 Contact/query sql injection
6 days 8 hours ago
A vulnerability categorized as critical has been discovered in Intermesh GroupOffice up to 6.8.157/25.0.91/26.0.16. This vulnerability affects unknown code of the file Contact/query. The manipulation results in sql injection.
This vulnerability was named CVE-2026-33755. The attack may be performed from remote. There is no available exploit.
It is advisable to upgrade the affected component.
vuldb.com
CVE-2026-33433 | Traefik up to 2.11.41/3.6.10 authentication spoofing
6 days 8 hours ago
A vulnerability was found in Traefik up to 2.11.41/3.6.10. It has been rated as critical. This affects an unknown part. The manipulation leads to authentication bypass by spoofing.
This vulnerability is uniquely identified as CVE-2026-33433. The attack is possible to be carried out remotely. No exploit exists.
Upgrading the affected component is advised.
vuldb.com
CVE-2026-33757 | OpenBao up to 2.5.1 JWT/OIDC callback_mode session fixiation
6 days 8 hours ago
A vulnerability was found in OpenBao up to 2.5.1. It has been declared as critical. Affected by this issue is the function callback_mode of the component JWT/OIDC. Executing a manipulation can lead to session fixiation.
This vulnerability is handled as CVE-2026-33757. The attack can be executed remotely. There is not any exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2026-33284 | globaleaks globaleaks-whistleblowing-software up to 5.0.88 /api/support input validation
6 days 8 hours ago
A vulnerability was found in globaleaks globaleaks-whistleblowing-software up to 5.0.88. It has been classified as problematic. Affected by this vulnerability is an unknown functionality of the file /api/support. Performing a manipulation results in improper input validation.
This vulnerability is known as CVE-2026-33284. Remote exploitation of the attack is possible. No exploit is available.
Upgrading the affected component is recommended.
vuldb.com
CVE-2026-33766 | WWBN AVideo up to 26.0 HTTP Redirect isSSRFSafeURL server-side request forgery
6 days 8 hours ago
A vulnerability was found in WWBN AVideo up to 26.0 and classified as critical. Affected is the function isSSRFSafeURL of the component HTTP Redirect Handler. Such manipulation leads to server-side request forgery.
This vulnerability is traded as CVE-2026-33766. The attack may be launched remotely. There is no exploit available.
It is advisable to implement a patch to correct this issue.
vuldb.com
CVE-2026-33748 | moby buildkit up to 0.28.0 path traversal
6 days 8 hours ago
A vulnerability has been found in moby buildkit up to 0.28.0 and classified as critical. This impacts an unknown function. This manipulation causes path traversal.
This vulnerability appears as CVE-2026-33748. The attack may be initiated remotely. There is no available exploit.
The affected component should be upgraded.
vuldb.com
CVE-2026-30637 | OTCMS up to 7.66 /admin/read.php AnnounContent server-side request forgery
6 days 8 hours ago
A vulnerability, which was classified as critical, was found in OTCMS up to 7.66. This affects the function AnnounContent of the file /admin/read.php. The manipulation results in server-side request forgery.
This vulnerability is reported as CVE-2026-30637. The attack can be launched remotely. No exploit exists.
vuldb.com
CVE-2026-33764 | WWBN AVideo up to 26.0 save.json.php ID authorization
6 days 8 hours ago
A vulnerability, which was classified as problematic, has been found in WWBN AVideo up to 26.0. The impacted element is an unknown function of the file save.json.php. The manipulation of the argument ID leads to authorization bypass.
This vulnerability is documented as CVE-2026-33764. The attack can be initiated remotely. There is not any exploit available.
It is suggested to install a patch to address this issue.
vuldb.com
CVE-2026-33761 | WWBN AVideo up to 26.0 Email Message list.json.php User::isAdmin authorization
6 days 8 hours ago
A vulnerability classified as problematic was found in WWBN AVideo up to 26.0. The affected element is the function User::isAdmin of the file list.json.php of the component Email Message Handler. Executing a manipulation can lead to missing authorization.
This vulnerability is registered as CVE-2026-33761. It is possible to launch the attack remotely. No exploit is available.
Applying a patch is advised to resolve this issue.
vuldb.com
CVE-2026-33763 | WWBN AVideo up to 26.0 API Endpoint get_api_video_password_is_correct passwordIsCorrect excessive authentication
6 days 8 hours ago
A vulnerability classified as problematic has been found in WWBN AVideo up to 26.0. Impacted is the function get_api_video_password_is_correct of the component API Endpoint. Performing a manipulation of the argument passwordIsCorrect results in improper restriction of excessive authentication attempts.
This vulnerability is cataloged as CVE-2026-33763. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
vuldb.com
CVE-2026-5010 | Sanoma Clickedu up to 5.0 URL /user.php cross site scripting
6 days 8 hours ago
A vulnerability described as problematic has been identified in Sanoma Clickedu up to 5.0. This issue affects some unknown processing of the file /user.php of the component URL Handler. Such manipulation leads to cross site scripting.
This vulnerability is listed as CVE-2026-5010. The attack may be performed from remote. There is no available exploit.
Upgrading the affected component is recommended.
vuldb.com
CVE-2026-33759 | WWBN AVideo up to 26.0 playlistsVideos.json.php playlists_id authorization
6 days 8 hours ago
A vulnerability marked as problematic has been reported in WWBN AVideo up to 26.0. This vulnerability affects unknown code of the file objects/playlistsVideos.json.php. This manipulation of the argument playlists_id causes missing authorization.
This vulnerability is tracked as CVE-2026-33759. The attack is possible to be carried out remotely. No exploit exists.
Applying a patch is the recommended action to fix this issue.
vuldb.com
CVE-2026-27880 | Grafana up to 12.1.9/12.2.7/12.3.5/12.4.1 OpenFeature denial of service
6 days 8 hours ago
A vulnerability labeled as problematic has been found in Grafana up to 12.1.9/12.2.7/12.3.5/12.4.1. This affects an unknown part of the component OpenFeature. The manipulation results in denial of service.
This vulnerability is identified as CVE-2026-27880. The attack can be executed remotely. There is not any exploit available.
The affected component should be upgraded.
vuldb.com
CVE-2026-33205 | kovidgoyal calibre up to 9.5.x background-image Endpoint server-side request forgery
6 days 8 hours ago
A vulnerability identified as critical has been detected in kovidgoyal calibre up to 9.5.x. Affected by this issue is some unknown functionality of the component background-image Endpoint. The manipulation leads to server-side request forgery.
This vulnerability is referenced as CVE-2026-33205. Remote exploitation of the attack is possible. No exploit is available.
You should upgrade the affected component.
vuldb.com
CVE-2024-11604 | OpenText IDM Driver and Extensions up to 1.0.1.0300/1.1.0.0000 on Windows SCIM Driver log file
6 days 8 hours ago
A vulnerability categorized as problematic has been discovered in OpenText IDM Driver and Extensions up to 1.0.1.0300/1.1.0.0000 on Windows. Affected by this vulnerability is an unknown functionality of the component SCIM Driver Module. Executing a manipulation can lead to sensitive information in log files.
The identification of this vulnerability is CVE-2024-11604. The attack can only be executed locally. There is no exploit available.
vuldb.com