A vulnerability was found in Red Hat Satellite 6. It has been classified as critical. This issue affects some unknown processing of the component fog-kubevirt. Performing a manipulation results in improper certificate validation.
This vulnerability is reported as CVE-2026-1530. The attack is possible to be carried out remotely. No exploit exists.
A vulnerability was found in Red Hat Satellite 6. It has been declared as critical. Impacted is an unknown function of the component foreman_kubevirt. Executing a manipulation can lead to improper certificate validation.
This vulnerability appears as CVE-2026-1531. The attack may be performed from remote. There is no available exploit.
A vulnerability was found in QNAP QuNetSwitch 2.0.4.0415. It has been declared as critical. The impacted element is an unknown function. Such manipulation leads to os command injection.
This vulnerability is documented as CVE-2026-22902. The attack needs to be performed locally. There is not any exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in File Thingie 2.5.7. Affected by this issue is some unknown functionality of the component Upload File Handler. Executing a manipulation can lead to cross site scripting.
The identification of this vulnerability is CVE-2026-30579. The attack may be launched remotely. There is no exploit available.
A vulnerability was found in File Thinghie 2.5.7. It has been classified as problematic. This issue affects some unknown processing. This manipulation of the argument dir causes cross site scripting.
This vulnerability is tracked as CVE-2026-30578. The attack is possible to be carried out remotely. No exploit exists.
A vulnerability was found in wolfSSL up to 5.8.x and classified as critical. The impacted element is the function wolfSSL_CTX_add_extra_chain_cert/wolfSSL_CTX_add1_chain_cert/wolfSSL_add0_chain_cert of the component API. Such manipulation leads to heap-based buffer overflow.
This vulnerability is listed as CVE-2026-3229. The attack must be carried out locally. There is no available exploit.
It is suggested to upgrade the affected component.
A vulnerability classified as critical has been found in Tenda A18 Pro 02.03.02.28. This issue affects the function setSchedWifi of the file /goform/openSchedWifi. This manipulation causes stack-based buffer overflow.
This vulnerability is registered as CVE-2026-4490. Remote exploitation of the attack is possible. Furthermore, an exploit is available.
A vulnerability classified as critical was found in Tenda A18 Pro 02.03.02.28. Impacted is the function fromSetIpMacBind of the file /goform/SetIpMacBind. Such manipulation of the argument list leads to stack-based buffer overflow.
This vulnerability is documented as CVE-2026-4491. The attack can be executed remotely. Additionally, an exploit exists.
A vulnerability was found in DooTask 1.6.27. It has been rated as problematic. This affects an unknown function of the file /manage/project/. Performing a manipulation of the argument projectDesc results in cross site scripting.
This vulnerability is reported as CVE-2026-29828. The attack is possible to be carried out remotely. No exploit exists.
A vulnerability described as critical has been identified in logicminds rubyipmi up to 0.12.1. Affected by this vulnerability is an unknown functionality of the component BMC Username Handler. The manipulation results in os command injection.
This vulnerability is known as CVE-2026-0980. It is possible to launch the attack remotely. No exploit is available.
A vulnerability labeled as critical has been found in Apple iOS and iPadOS up to 18.7.6/26.1. This vulnerability affects unknown code of the component Activation Lock. Executing a manipulation can lead to path traversal.
The identification of this vulnerability is CVE-2025-43534. The physical device can be targeted for the attack. There is no exploit available.
The affected component should be upgraded.
A vulnerability marked as critical has been reported in Apple macOS up to 14.8.4/15.7.4/26.3. This issue affects some unknown processing of the component App. The manipulation leads to permission issues.
This vulnerability is referenced as CVE-2026-20607. The attack can only be performed from a local environment. No exploit is available.
It is suggested to upgrade the affected component.
A vulnerability described as critical has been identified in SourceCodester Sales and Inventory System 1.0. The affected element is an unknown function of the file update_purchase.php of the component HTTP GET Parameter Handler. Executing a manipulation of the argument sid can lead to sql injection.
This vulnerability appears as CVE-2026-4781. The attack may be performed from remote. In addition, an exploit is available.
A vulnerability, which was classified as problematic, has been found in Apple macOS up to 14.8.4/15.7.4/26.3. This affects an unknown function of the component Symlink Handler. Performing a manipulation results in information disclosure.
This vulnerability is cataloged as CVE-2026-20633. The attack must be initiated from a local position. There is no exploit available.
It is advisable to upgrade the affected component.
A vulnerability marked as critical has been reported in SourceCodester Sales and Inventory System 1.0. Impacted is an unknown function of the file update_out_standing.php of the component HTTP GET Parameter Handler. Performing a manipulation of the argument sid results in sql injection.
This vulnerability is reported as CVE-2026-4780. The attack is possible to be carried out remotely. Moreover, an exploit is present.
A vulnerability was found in nats-io nats-server up to 2.11.14/2.12.5. It has been declared as problematic. This impacts an unknown function of the component Websockets Client Service. Such manipulation leads to denial of service.
This vulnerability is listed as CVE-2026-33219. The attack may be performed from remote. There is no available exploit.
It is recommended to upgrade the affected component.
A vulnerability identified as problematic has been detected in nats-io nats-server up to 2.11.14/2.12.5. Affected by this issue is some unknown functionality of the component JetStream. The manipulation leads to authorization bypass.
This vulnerability is documented as CVE-2026-33222. The attack can be initiated remotely. There is not any exploit available.
You should upgrade the affected component.
A vulnerability was found in GIMP. It has been classified as problematic. Impacted is an unknown function of the component PCX File Loader. Performing a manipulation results in off-by-one.
This vulnerability is cataloged as CVE-2026-4887. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability categorized as critical has been discovered in nats-io nats-server up to 2.11.14/2.12.5. Affected by this vulnerability is an unknown functionality. Executing a manipulation can lead to incorrect authorization.
This vulnerability is registered as CVE-2026-33217. It is possible to launch the attack remotely. No exploit is available.
It is advisable to upgrade the affected component.