A vulnerability has been found in DeepDiff and classified as problematic. This affects the function _RestrictedUnpickler. The manipulation leads to resource consumption.
This vulnerability is listed as CVE-2026-33155. The attack may be initiated remotely. In addition, an exploit is available.
A vulnerability described as problematic has been identified in dynaconf up to 3.2.12 on Python. This affects an unknown part of the component Configuration Handler. Such manipulation leads to improper neutralization of special elements used in a template engine.
This vulnerability is uniquely identified as CVE-2026-33154. The attack can be launched remotely. No exploit exists.
Upgrading the affected component is recommended.
A vulnerability marked as critical has been reported in allure-framework allure2 up to 2.37.x. This issue affects some unknown processing. Performing a manipulation results in path traversal.
This vulnerability is known as CVE-2026-33166. Remote exploitation of the attack is possible. No exploit is available.
It is suggested to upgrade the affected component.
A vulnerability has been found in Statamic CMS up to 5.73.13/6.6.x and classified as critical. This affects an unknown part of the component Configuration Parameter Handler. The manipulation leads to path traversal.
This vulnerability is referenced as CVE-2026-33171. Remote exploitation of the attack is possible. No exploit is available.
The affected component should be upgraded.
A vulnerability identified as critical has been detected in Red Hat OpenShift AI. This affects an unknown part of the file /read-document of the component Feast Feature Server. This manipulation causes path traversal.
This vulnerability appears as CVE-2026-23536. The attack may be initiated remotely. There is no available exploit.
A vulnerability marked as problematic has been reported in BrowserCompany of New York ArcSearch up to 1.12.6 on Android. The impacted element is an unknown function of the component Web Handler. The manipulation leads to improper restriction of rendered ui layers.
This vulnerability is traded as CVE-2026-2378. It is possible to initiate the attack remotely. There is no exploit available.
It is suggested to upgrade the affected component.
A vulnerability was found in NickeManarin ScreenToGif up to 2.42.1. It has been declared as problematic. Affected is an unknown function in the library version.dll. Executing a manipulation can lead to untrusted search path.
This vulnerability is registered as CVE-2026-33156. The attack needs to be launched locally. No exploit is available.
A vulnerability labeled as critical has been found in strukturag libde265 up to 1.0.16. This vulnerability affects the function ctb_info.log2unitSize of the component Image Parser. Such manipulation of the argument PicWidthInCtbsY/PicHeightInCtbsY leads to out-of-bounds write.
This vulnerability is traded as CVE-2026-33165. The attack may be launched remotely. There is no exploit available.
The affected component should be upgraded.
A vulnerability described as critical has been identified in strukturag libde265 up to 1.0.16. Impacted is the function pic_parameter_set::set_derived_values. Executing a manipulation can lead to heap-based buffer overflow.
This vulnerability is handled as CVE-2026-33164. The attack can be executed remotely. There is not any exploit available.
Upgrading the affected component is recommended.
A vulnerability classified as problematic was found in Effect-TS effect up to 3.19.x. Affected is the function RpcServer.toWebHandler/HttpApp.toWebHandlerRuntime of the component API Call Handler. Such manipulation leads to race condition.
This vulnerability is uniquely identified as CVE-2026-32887. The attack can be launched remotely. No exploit exists.
Upgrading the affected component is advised.
A vulnerability was found in libfuse up to 3.18.1. It has been classified as problematic. Affected by this issue is the function incorrectly of the file /dev/fuse. The manipulation leads to null pointer dereference.
This vulnerability is listed as CVE-2026-33179. The attack must be carried out locally. There is no available exploit.
Upgrading the affected component is recommended.
A vulnerability, which was classified as problematic, has been found in code-projects Online Food Ordering System 1.0. This affects an unknown part of the file /dbfood/localhost.sql. This manipulation causes files or directories accessible.
This vulnerability is handled as CVE-2026-4900. The attack can be initiated remotely. Additionally, an exploit exists.
It is advisable to modify the configuration settings.
A vulnerability described as critical has been identified in Tenda AC5 15.03.06.47. This affects the function fromAddressNat of the file /goform/addressNat of the component POST Request Handler. The manipulation of the argument page results in stack-based buffer overflow.
This vulnerability is reported as CVE-2026-4902. The attack can be launched remotely. Moreover, an exploit is present.
A vulnerability classified as critical has been found in Tenda AC5 15.03.06.47. This vulnerability affects the function formQuickIndex of the file /goform/QuickIndex of the component POST Request Handler. This manipulation of the argument PPPOEPassword causes stack-based buffer overflow.
This vulnerability appears as CVE-2026-4903. The attack may be initiated remotely. In addition, an exploit is available.
A vulnerability classified as critical was found in Tenda AC5 15.03.06.47. This issue affects the function formSetCfm of the file /goform/setcfm of the component POST Request Handler. Such manipulation of the argument funcpara1 leads to stack-based buffer overflow.
This vulnerability is traded as CVE-2026-4904. The attack may be launched remotely. Furthermore, there is an exploit available.