A vulnerability classified as critical was found in GStreamer. This impacts an unknown function of the component H.266 Codec Parser. Such manipulation leads to stack-based buffer overflow.
This vulnerability is uniquely identified as CVE-2026-3081. The attack can be launched remotely. No exploit exists.
It is best practice to apply a patch to resolve this issue.
A vulnerability, which was classified as critical, has been found in GStreamer. Affected is an unknown function of the component JPEG Parser. Performing a manipulation results in heap-based buffer overflow.
This vulnerability was named CVE-2026-3082. The attack may be initiated remotely. There is no available exploit.
It is recommended to apply a patch to fix this issue.
A vulnerability, which was classified as critical, was found in GStreamer. Affected by this vulnerability is an unknown functionality of the component rtpqdm2depay. Executing a manipulation can lead to out-of-bounds write.
The identification of this vulnerability is CVE-2026-3083. The attack may be launched remotely. There is no exploit available.
Applying a patch is advised to resolve this issue.
A vulnerability has been found in GStreamer 266 and classified as critical. Affected by this issue is some unknown functionality of the component H.266 Codec Parser. The manipulation leads to integer underflow.
This vulnerability is referenced as CVE-2026-3084. Remote exploitation of the attack is possible. No exploit is available.
It is suggested to install a patch to address this issue.
A vulnerability was found in GStreamer and classified as critical. This affects an unknown part of the component rtpqdm2depay. The manipulation results in heap-based buffer overflow.
This vulnerability is identified as CVE-2026-3085. The attack can be executed remotely. There is not any exploit available.
A patch should be applied to remediate this issue.
A vulnerability was found in GStreamer. It has been classified as critical. This vulnerability affects unknown code of the component H.266 Codec Parser. This manipulation causes out-of-bounds write.
This vulnerability is tracked as CVE-2026-3086. The attack is possible to be carried out remotely. No exploit exists.
To fix this issue, it is recommended to deploy a patch.
A vulnerability classified as problematic has been found in Wakyma Application Web. Affected by this issue is some unknown functionality of the file /centro/equipo/empleado of the component Endpoint. Performing a manipulation results in improper neutralization of special elements in data query logic.
This vulnerability is identified as CVE-2026-3021. The attack can be initiated remotely. There is not any exploit available.
A vulnerability classified as problematic was found in Wakyma Application Web. This affects an unknown part of the file /hospitalization/generate-hospitalization-summary of the component Endpoint. Executing a manipulation can lead to improper neutralization of special elements in data query logic.
This vulnerability is tracked as CVE-2026-3022. The attack can be launched remotely. No exploit exists.
A vulnerability, which was classified as problematic, has been found in Wakyma Application Web. This vulnerability affects unknown code of the file /pets/print-tags of the component Endpoint. The manipulation leads to improper neutralization of special elements in data query logic.
This vulnerability is listed as CVE-2026-3023. The attack may be initiated remotely. There is no available exploit.
A vulnerability, which was classified as problematic, was found in Wakyma Application Web. This issue affects some unknown processing of the file /configuracion/agenda/modelo-formulario-evento of the component Endpoint. The manipulation results in cross site scripting.
This vulnerability is cataloged as CVE-2026-3024. The attack may be launched remotely. There is no exploit available.
A vulnerability has been found in libexpat up to 2.7.4 and classified as problematic. This affects the function setContext. The manipulation leads to null pointer dereference.
This vulnerability is documented as CVE-2026-32778. The attack needs to be performed locally. There is not any exploit available.
The affected component should be upgraded.
No Arrests, But Virtual Servers, IP Addresses Seized and Residencies Searched U.S. authorities seized KimWolf - the attack infrastructure responsible for the largest distributed denial of service attack yet recorded in an international police operation that swept up servers underpinning four botnets.
Contec and Epsimed Monitors Containing 'Backdoors' Are at the Center of Order Texas Gov. Abbott has ordered agencies to review foreign-made connected medical devices - especially those from Chinese manufacturers - used in state-owned facilities for cybersecurity issues that could pose security and privacy risks to patients and healthcare infrastructure.