Currently trending CVE - Hype Score: 12 - An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 15.8.5 and iPadOS 15.8.5, iOS 16.7.12 and iPadOS 16.7.12. Processing a malicious image file may result in memory corruption. Apple is aware of a report that this issue may have ...
A vulnerability labeled as critical has been found in NLTK up to 3.9.3. This affects an unknown part. Executing a manipulation can lead to path traversal.
This vulnerability is tracked as CVE-2026-33236. The attack can be launched remotely. No exploit exists.
It is best practice to apply a patch to resolve this issue.
A vulnerability was found in kelvinmo simplejwt up to 1.1.0. It has been classified as problematic. Affected by this vulnerability is the function JWE::decrypt. This manipulation causes resource consumption.
This vulnerability is handled as CVE-2026-33204. The attack can be initiated remotely. There is not any exploit available.
Upgrading the affected component is recommended.
A vulnerability was found in NLTK up to 3.9.3. It has been declared as critical. Affected by this issue is the function nltk.app.wordnet_app. Such manipulation leads to missing authentication.
This vulnerability is uniquely identified as CVE-2026-33231. The attack can be launched remotely. No exploit exists.
Applying a patch is advised to resolve this issue.
A vulnerability was found in Ruby json up to 2.19.1. It has been rated as critical. This affects the function allow_duplicate_key. Performing a manipulation results in format string.
This vulnerability was named CVE-2026-33210. The attack may be initiated remotely. There is no available exploit.
Upgrading the affected component is advised.
A vulnerability classified as problematic was found in SiYuan up to 3.6.1. Affected by this issue is some unknown functionality of the component Incoming Message Handler. The manipulation of the argument auth keepalive results in uncaught exception.
This vulnerability is cataloged as CVE-2026-33203. The attack may be launched remotely. There is no exploit available.
Upgrading the affected component is advised.
A vulnerability, which was classified as problematic, has been found in NLTK up to 3.9.3. This affects the function nltk.app.wordnet_app. This manipulation causes cross site scripting.
This vulnerability is registered as CVE-2026-33230. Remote exploitation of the attack is possible. No exploit is available.
It is recommended to apply a patch to fix this issue.
A vulnerability identified as critical has been detected in budibase up to 3.30.6. Affected is an unknown function of the file /api/queries/preview. Performing a manipulation results in server-side request forgery.
This vulnerability was named CVE-2026-33226. The attack may be initiated remotely. There is no available exploit.
It is recommended to apply a patch to fix this issue.
A vulnerability labeled as problematic has been found in Nhost up to 0.11.x. Affected by this vulnerability is an unknown functionality of the component Storage Service. Executing a manipulation can lead to insufficient verification of data authenticity.
The identification of this vulnerability is CVE-2026-33221. The attack may be launched remotely. There is no exploit available.
The affected component should be upgraded.
A vulnerability classified as critical was found in WebReflection flatted up to 3.4.1. Affected is the function parse of the component JSON Parser. The manipulation results in improperly controlled modification of object prototype attributes.
This vulnerability is identified as CVE-2026-33228. The attack can be executed remotely. There is not any exploit available.
Upgrading the affected component is advised.
A vulnerability was found in avo-hq avo up to 3.30.2. It has been classified as problematic. This issue affects some unknown processing. The manipulation of the argument return_to leads to cross site scripting.
This vulnerability is documented as CVE-2026-33209. The attack can be initiated remotely. There is not any exploit available.
Upgrading the affected component is recommended.
A vulnerability was found in barebox up to 2025.09.2/2026.03.0. It has been declared as critical. Impacted is an unknown function. The manipulation results in insufficient verification of data authenticity.
This vulnerability is reported as CVE-2026-33243. The attack requires a local approach. No exploit exists.
It is recommended to upgrade the affected component.