A vulnerability labeled as problematic has been found in parse-community parse-server up to 8.6.57/9.6.0-alpha.51. Impacted is an unknown function. Executing a manipulation can lead to resource consumption.
This vulnerability is tracked as CVE-2026-33538. The attack can be launched remotely. No exploit exists.
The affected component should be upgraded.
A vulnerability classified as critical was found in withastro astro up to 10.0.1. The affected element is an unknown function of the component Query Parameter Handler. The manipulation of the argument x_astro_path results in unintended intermediary.
This vulnerability is reported as CVE-2026-33768. The attack can be launched remotely. No exploit exists.
Upgrading the affected component is advised.
A vulnerability, which was classified as critical, was found in Pharos Controls Mosaic Show Controller 2.15.3. This affects an unknown function. Such manipulation leads to missing authentication.
This vulnerability is traded as CVE-2026-2417. The attack may be launched remotely. There is no exploit available.
A vulnerability was found in ellite Wallos up to 4.7.1. It has been classified as problematic. Affected by this vulnerability is an unknown functionality of the component Password Reset Token Handler. The manipulation leads to session expiration.
This vulnerability is uniquely identified as CVE-2026-33417. The attack is possible to be carried out remotely. No exploit exists.
Upgrading the affected component is recommended.
A vulnerability was found in withastro astro up to 9.x. It has been classified as problematic. This vulnerability affects the function JSON.parse of the file /_server-islands/ of the component POST Handler. This manipulation causes allocation of resources.
This vulnerability is handled as CVE-2026-29772. The attack can be initiated remotely. There is not any exploit available.
Upgrading the affected component is recommended.
A vulnerability marked as problematic has been reported in withastro astro up to 5.18.0. This vulnerability affects unknown code of the component Image Optimization Endpoint. Performing a manipulation results in information disclosure.
This vulnerability is cataloged as CVE-2026-33769. It is possible to initiate the attack remotely. There is no exploit available.
It is suggested to upgrade the affected component.
A vulnerability has been found in Apple watchOS and classified as critical. Affected by this issue is some unknown functionality of the component Web Handler. The manipulation leads to memory corruption.
This vulnerability is uniquely identified as CVE-2025-31223. The attack is possible to be carried out remotely. No exploit exists.
The affected component should be upgraded.
A vulnerability, which was classified as critical, has been found in Apple iOS and iPadOS. Affected is an unknown function of the component Web Handler. Performing a manipulation results in memory corruption.
This vulnerability is known as CVE-2025-31223. Remote exploitation of the attack is possible. No exploit is available.
It is advisable to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Apple visionOS. Affected by this vulnerability is an unknown functionality of the component Web Handler. Executing a manipulation can lead to memory corruption.
This vulnerability is handled as CVE-2025-31223. The attack can be executed remotely. There is not any exploit available.
You should upgrade the affected component.
A vulnerability classified as critical was found in Apple macOS. This impacts an unknown function of the component Web Handler. Such manipulation leads to memory corruption.
This vulnerability is traded as CVE-2025-31223. The attack may be launched remotely. There is no exploit available.
Upgrading the affected component is advised.
A vulnerability categorized as problematic has been discovered in thephpleague commonmark up to 2.8.1. The affected element is an unknown function of the component PHP Markdown Parser. Executing a manipulation can lead to cross site scripting.
The identification of this vulnerability is CVE-2026-33347. The attack may be launched remotely. There is no exploit available.
It is advisable to upgrade the affected component.
A vulnerability described as critical has been identified in dagu-org dagu up to 2.3.0. Affected is the function generateFilepath of the component API Endpoint. Such manipulation leads to path traversal.
This vulnerability is listed as CVE-2026-33344. The attack may be performed from remote. There is no available exploit.
Upgrading the affected component is recommended.
A vulnerability marked as problematic has been reported in solidtime-io solidtime up to 0.11.5. This impacts the function index of the file /api/v1/organizations/{org}/projects/ of the component Project Detail Endpoint. This manipulation causes authorization bypass.
This vulnerability is tracked as CVE-2026-33345. The attack is possible to be carried out remotely. No exploit exists.
It is suggested to upgrade the affected component.
A vulnerability labeled as problematic has been found in zauberzeug nicegui up to 3.8.x. This affects the function app.add_media_file/app.add_media_files of the component Query Parameter Handler. The manipulation results in denial of service.
This vulnerability is identified as CVE-2026-33332. The attack can be executed remotely. There is not any exploit available.
The affected component should be upgraded.
A vulnerability identified as problematic has been detected in middleapi orpc up to 1.13.8. The impacted element is an unknown function of the component Generated API Documentation. The manipulation leads to cross site scripting.
This vulnerability is referenced as CVE-2026-33331. Remote exploitation of the attack is possible. No exploit is available.
You should upgrade the affected component.
A vulnerability categorized as problematic has been discovered in thephpleague commonmark up to 2.8.1. The affected element is an unknown function of the component PHP Markdown Parser. Executing a manipulation can lead to cross site scripting.
The identification of this vulnerability is CVE-2026-33347. The attack may be launched remotely. There is no exploit available.
It is advisable to upgrade the affected component.
A vulnerability was found in NaturalIntelligence fast-xml-parser up to 5.5.6. It has been rated as problematic. Impacted is an unknown function. Performing a manipulation results in improper validation of specified quantity in input.
This vulnerability was named CVE-2026-33349. The attack may be initiated remotely. There is no available exploit.
Upgrading the affected component is advised.
A vulnerability was found in Zabbix Agent 2 Docker Plugin up to 6.0.43/7.0.22/7.4.6. It has been declared as critical. This issue affects some unknown processing of the component Docker Archive API. Such manipulation of the argument docker.container_info leads to argument injection.
This vulnerability is uniquely identified as CVE-2026-23924. The attack can be launched remotely. No exploit exists.
A vulnerability was found in withastro astro up to 9.x. It has been classified as problematic. This vulnerability affects the function JSON.parse of the file /_server-islands/ of the component POST Handler. This manipulation causes allocation of resources.
This vulnerability is handled as CVE-2026-29772. The attack can be initiated remotely. There is not any exploit available.
Upgrading the affected component is recommended.