A vulnerability labeled as problematic has been found in Langflow. Affected is an unknown function of the component v2 API. Such manipulation leads to path traversal.
This vulnerability is documented as CVE-2026-33309. The attack requires being on the local network. There is not any exploit available.
A vulnerability classified as critical has been found in Tabs Mail Carrier 2.5.1. Affected by this vulnerability is an unknown functionality of the component SMTP Service. The manipulation of the argument MAIL FROM leads to out-of-bounds write.
This vulnerability is referenced as CVE-2019-25646. Remote exploitation of the attack is possible. Furthermore, an exploit is available.
A vulnerability was found in langflow-ai langflow up to 1.8.x. It has been declared as problematic. The impacted element is an unknown function. The manipulation results in injection.
This vulnerability is reported as CVE-2026-33475. The attack can be launched remotely. No exploit exists.
It is recommended to upgrade the affected component.
A vulnerability identified as critical has been detected in langflow-ai langflow up to 1.8.1. Affected is an unknown function of the file /api/v2/files/ of the component Incomplete Fix CVE-2025-68478. Performing a manipulation results in path traversal.
This vulnerability is known as CVE-2026-33309. Remote exploitation of the attack is possible. No exploit is available.
You should upgrade the affected component.
The European Commission has allegedly been breached by ShinyHunters, with reported data dumps including content from mail servers. The European Commission has allegedly been breached by ShinyHunters, with reported data dumps including content from mail servers and internal communications systems. The cybercrime group added the Commission to its Tor data leak site, claiming the theft […]
Threat actors with ties to Iran successfully broke into the personal email account of Kash Patel, the director of the U.S. Federal Bureau of Investigation (FBI), and leaked a cache of photos and other documents to the internet.
Handala Hack Team, which carried out the breach, said on its website that Patel "will now find his name among the list of successfully hacked victims." In a statement
A vulnerability, which was classified as critical, was found in Apache Artemis and ActiveMQ Artemis on OpenWire. This issue affects some unknown processing of the component OpenWire Consumer Handler. Executing a manipulation can lead to permission issues.
This vulnerability is tracked as CVE-2026-32642. The attack can be launched remotely. No exploit exists.
You should upgrade the affected component.
A vulnerability classified as critical was found in KNIME Business Hub up to 1.15.1/1.16.2/1.17.3. This impacts an unknown function of the component Apache Artemis. Executing a manipulation can lead to missing authentication.
This vulnerability is tracked as CVE-2026-4649. The attack can be launched remotely. No exploit exists.
Upgrading the affected component is advised.
A vulnerability has been found in Phreesoft PhreeBooks ERP 5.2.3 and classified as problematic. Affected by this issue is some unknown functionality of the file bizuno/image/manager of the component Image Manager Component. This manipulation of the argument imgFile causes cross site scripting.
This vulnerability is registered as CVE-2019-25630. Remote exploitation of the attack is possible. Furthermore, an exploit is available.
A vulnerability identified as critical has been detected in Sourceforge phpFileManager 1.7.8. The impacted element is an unknown function of the file index.php of the component Parameter Handler. This manipulation of the argument action/fm_current_dir/filename causes missing authentication.
This vulnerability is handled as CVE-2019-25632. It is possible to launch the attack on the local host. Additionally, an exploit exists.
A vulnerability described as critical has been identified in Speedbit Download Accelerator Plus DAP up to 10.0.6.0. Affected is an unknown function of the component URL Handler. Executing a manipulation can lead to out-of-bounds write.
The identification of this vulnerability is CVE-2019-25628. The attack may be launched remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as critical, has been found in Flexhex River Past Cam Do 3.7.6. This affects an unknown part. This manipulation causes unrestricted upload.
This vulnerability is tracked as CVE-2019-25626. The attack is restricted to local execution. Moreover, an exploit is present.