A vulnerability was found in ory hydra up to 26.1.x. It has been classified as critical. The impacted element is an unknown function of the component Admin API. This manipulation causes sql injection.
This vulnerability is handled as CVE-2026-33504. The attack can be initiated remotely. There is not any exploit available.
Upgrading the affected component is recommended.
A vulnerability was found in roadiz core-bundle-dev-app up to 2.3.41/2.5.43/2.6.27/2.7.8 and classified as critical. The affected element is an unknown function of the component Environment Variable Handler. The manipulation results in server-side request forgery.
This vulnerability is known as CVE-2026-33486. It is possible to launch the attack remotely. No exploit is available.
It is suggested to upgrade the affected component.
A vulnerability has been found in blakeblackshear frigate 0.17.0 and classified as problematic. Impacted is an unknown function of the file /api/config/raw of the component Configuration Handler. The manipulation leads to incorrect authorization.
This vulnerability is traded as CVE-2026-33469. It is possible to initiate the attack remotely. There is no exploit available.
To fix this issue, it is recommended to deploy a patch.
A vulnerability, which was classified as problematic, was found in sakaiproject sakai up to 23.4/25.1. This issue affects some unknown processing of the component Description Handler. Executing a manipulation can lead to cross site scripting.
This vulnerability appears as CVE-2026-33402. The attack may be performed from remote. There is no available exploit.
You should upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in Mattermost up to 10.11.11/11.2.3/11.3.1/11.4.0. This vulnerability affects unknown code. Performing a manipulation results in incorrect permission assignment.
This vulnerability is reported as CVE-2026-3113. The attack requires a local approach. No exploit exists.
It is advisable to upgrade the affected component.
A vulnerability classified as problematic was found in blakeblackshear frigate 0.17.0. This affects an unknown part of the file /api/timeline. Such manipulation leads to missing authorization.
This vulnerability is documented as CVE-2026-33470. The attack can be executed remotely. There is not any exploit available.
A vulnerability classified as problematic has been found in Mattermost Plugins up to 10.11.11/11.4.x. Affected by this issue is some unknown functionality of the component Webhook Request Handler. This manipulation causes improper check for unusual conditions.
This vulnerability is registered as CVE-2026-3109. Remote exploitation of the attack is possible. No exploit is available.
It is recommended to upgrade the affected component.
A vulnerability described as problematic has been identified in Mattermost Plugins up to 11.4.x. Affected by this vulnerability is an unknown functionality of the component Webhook Endpoint. The manipulation results in resource consumption.
This vulnerability is cataloged as CVE-2026-3116. The attack may be launched remotely. There is no exploit available.
Upgrading the affected component is recommended.
A vulnerability marked as problematic has been reported in EVerest everest-core 2025.9.0/2025.10.0/2025.12.0. Affected is the function std::map. The manipulation leads to race condition.
This vulnerability is listed as CVE-2026-26074. The attack may be initiated remotely. There is no available exploit.
It is suggested to upgrade the affected component.
A vulnerability labeled as critical has been found in Firecrawl up to 2.8.0. This impacts an unknown function of the component Playwright Scraping Service. Executing a manipulation can lead to server-side request forgery.
This vulnerability is tracked as CVE-2026-32857. The attack can be launched remotely. No exploit exists.
A vulnerability identified as critical has been detected in ory kratos up to 26.1.x. This affects an unknown function of the component ListCourierMessages Admin API. Performing a manipulation results in sql injection.
This vulnerability is identified as CVE-2026-33503. The attack can be initiated remotely. There is not any exploit available.
You should upgrade the affected component.
A vulnerability categorized as critical has been discovered in EVerest everest-core 2025.9.0/2025.10.0/2025.12.0. The impacted element is the function ISO15118_chargerImpl::handle_session_setup. Such manipulation leads to use after free.
This vulnerability is referenced as CVE-2026-27828. The attack can only be performed from a local environment. No exploit is available.
It is advisable to upgrade the affected component.
A vulnerability was found in OpenClaw up to 2026.3.23. It has been rated as critical. The affected element is the function isLikelyLocalPath of the component Path Validation Handler. This manipulation causes path traversal.
The identification of this vulnerability is CVE-2026-32846. It is possible to initiate the attack remotely. There is no exploit available.
It is suggested to install a patch to address this issue.
A vulnerability was found in ory oathkeeper up to 26.1.x. It has been declared as critical. Impacted is an unknown function of the component Path Normalization Handler. The manipulation results in relative path traversal.
This vulnerability was named CVE-2026-33494. The attack may be performed from remote. There is no available exploit.
It is recommended to upgrade the affected component.
A vulnerability was found in ory oathkeeper up to 26.1.x. It has been classified as critical. This issue affects the function oauth2_introspection. The manipulation leads to improper validation of unsafe equivalence in input.
This vulnerability is uniquely identified as CVE-2026-33496. The attack is possible to be carried out remotely. No exploit exists.
Upgrading the affected component is recommended.