A vulnerability marked as problematic has been reported in PromtEngineer localGPT up to 4d41c7d1713b16b216d8e062e51a5dd88b20b054. This affects the function handle_index of the file rag_system/api_server.py of the component Web Interface. Performing a manipulation results in information disclosure.
This vulnerability is cataloged as CVE-2026-5003. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability labeled as critical has been found in PromtEngineer localGPT up to 4d41c7d1713b16b216d8e062e51a5dd88b20b054. The impacted element is the function _route_using_overviews of the file backend/server.py of the component LLM Prompt Handler. Such manipulation leads to injection.
This vulnerability is listed as CVE-2026-5002. The attack may be performed from remote. In addition, an exploit is available.
This product utilizes a rolling release system for continuous delivery, and as such, version information for affected or updated releases is not disclosed.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability identified as critical has been detected in PromtEngineer localGPT up to 4d41c7d1713b16b216d8e062e51a5dd88b20b054. The affected element is the function do_POST of the file backend/server.py. This manipulation causes unrestricted upload.
This vulnerability is tracked as CVE-2026-5001. The attack is possible to be carried out remotely. Moreover, an exploit is present.
This product adopts a rolling release strategy to maintain continuous delivery. Therefore, version details for affected or updated releases cannot be specified.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability categorized as critical has been discovered in PromtEngineer localGPT up to 4d41c7d1713b16b216d8e062e51a5dd88b20b054. Impacted is the function LocalGPTHandler of the file backend/server.py of the component API Endpoint. The manipulation of the argument BaseHTTPRequestHandler results in missing authentication.
This vulnerability is identified as CVE-2026-5000. The attack can be executed remotely. There is not any exploit available.
This product implements a rolling release for ongoing delivery, which means version information for affected or updated releases is unavailable.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability was found in z-9527 admin up to 72aaf2dd05cf4ec2e98f390668b41e128eec5ad2. It has been rated as critical. This issue affects the function uploadFile of the file /server/utils/upload.js of the component isImg Check. The manipulation of the argument fileType leads to path traversal.
This vulnerability is referenced as CVE-2026-4999. Remote exploitation of the attack is possible. Furthermore, an exploit is available.
This product follows a rolling release approach for continuous delivery, so version details for affected or updated releases are not provided.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability was found in Sinaptik AI PandasAI up to 3.0.0. It has been declared as critical. This vulnerability affects the function CodeExecutor.execute of the file pandasai/core/code_execution/code_executor.py of the component Chat Message Handler. Executing a manipulation can lead to code injection.
The identification of this vulnerability is CVE-2026-4998. The attack may be launched remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability was found in Sinaptik AI PandasAI up to 3.0.0. It has been classified as critical. This affects the function is_sql_query_safe of the file pandasai/helpers/sql_sanitizer.py. Performing a manipulation results in path traversal.
This vulnerability was named CVE-2026-4997. The attack may be initiated remotely. In addition, an exploit is available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability was found in Sinaptik AI PandasAI up to 0.1.4 and classified as critical. Affected by this issue is the function delete_question_and_answers/delete_docs/update_question_answer/update_docs/get_relevant_question_answers_by_id/get_relevant_docs_by_id of the file extensions/ee/vectorstores/lancedb/pandasai_lancedb/lancedb.py of the component pandasai-lancedb Extension. Such manipulation leads to sql injection.
This vulnerability is uniquely identified as CVE-2026-4996. The attack can be launched remotely. Moreover, an exploit is present.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability has been found in wandb OpenUI up to 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file frontend/public/annotator/index.html of the component Window Message Event Handler. This manipulation causes cross site scripting.
This vulnerability is handled as CVE-2026-4995. The attack can be initiated remotely. Additionally, an exploit exists.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability, which was classified as problematic, was found in wandb OpenUI up to 1.0/3.5-turb. Affected is the function generic_exception_handler of the file backend/openui/server.py of the component APIStatusError Handler. The manipulation of the argument key results in information exposure through error message.
This vulnerability is known as CVE-2026-4994. Access to the local network is required for this attack. Furthermore, an exploit is available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability, which was classified as critical, has been found in wandb OpenUI up to 0.0.0.0/1.0. This impacts an unknown function of the file backend/openui/config.py. The manipulation of the argument LITELLM_MASTER_KEY leads to hard-coded credentials.
This vulnerability is traded as CVE-2026-4993. An attack has to be approached locally. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability classified as problematic was found in wandb OpenUI up to 1.0. This affects the function create_share/get_share of the file backend/openui/server.py of the component HTMLAnnotator Component. Executing a manipulation of the argument ID can lead to HTML injection.
This vulnerability appears as CVE-2026-4992. The attack may be performed from remote. In addition, an exploit is available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability classified as problematic has been found in QDOCS Smart School Management System up to 7.2. The impacted element is an unknown function of the file /admin/enquiry of the component Admission Enquiry Module. Performing a manipulation of the argument Note results in cross site scripting.
This vulnerability is reported as CVE-2026-4991. The attack is possible to be carried out remotely. No exploit exists.
A vulnerability described as critical has been identified in chatwoot up to 4.11.1. The affected element is an unknown function of the file /app/login of the component Signup Endpoint. Such manipulation of the argument signupEnabled with the input true leads to improper authorization.
This vulnerability is documented as CVE-2026-4990. The attack can be executed remotely. Additionally, an exploit exists.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability marked as critical has been reported in pretix Venueless. Impacted is an unknown function of the component Chat Message Handler. This manipulation causes permission issues.
This vulnerability is registered as CVE-2026-4982. Remote exploitation of the attack is possible. No exploit is available.
It is suggested to upgrade the affected component.