A vulnerability was found in EFM ipTIME A8004T 14.18.2. It has been rated as critical. This vulnerability affects the function formWifiBasicSet of the file /goform/WifiBasicSet. The manipulation of the argument security_5g leads to stack-based buffer overflow.
This vulnerability is listed as CVE-2026-8234. The attack may be initiated remotely. In addition, an exploit is available.
The vendor was contacted early about this disclosure but did not respond in any way.
Braintrust warned customers to rotate API keys after hackers breached an AWS account, exposing secrets tied to cloud-based AI models. AI observability startup Braintrust warned customers to rotate API keys after attackers gained unauthorized access to one of the company’s AWS accounts, potentially exposing secrets used to connect to cloud-based AI models. The company said […]
A vulnerability was found in Hikvision HikCentral Professional up to 3.0.1. It has been declared as critical. This affects an unknown part. Executing a manipulation can lead to improper access controls.
This vulnerability is tracked as CVE-2026-1749. The attack can be launched remotely. No exploit exists.
A vulnerability was found in EZVIZ APP. It has been classified as problematic. Affected by this issue is some unknown functionality of the component Legacy API Interface. Performing a manipulation results in information disclosure.
This vulnerability is identified as CVE-2026-32683. The attack can be initiated remotely. There is not any exploit available.
Upgrading the affected component is recommended.
A vulnerability was found in Hikvision DS-3E1310P-SI, DS-3E1318P-SI and DS-3E1326P-SI and classified as critical. Affected by this vulnerability is an unknown functionality of the component Packets Handler. Such manipulation leads to improper input validation. This vulnerability only affects products that are no longer supported by the maintainer.
This vulnerability is referenced as CVE-2026-3828. It is possible to launch the attack remotely. No exploit is available.
A vulnerability has been found in Dotouch XproUPF 2.0.0-release-088aa7c4 and classified as critical. Affected is an unknown function of the component UPF. This manipulation causes improper access controls.
The identification of this vulnerability is CVE-2026-8233. The attack needs to be done within the local network. There is no exploit available.
The vendor was contacted early about this disclosure.
A vulnerability, which was classified as problematic, was found in Dotouch XproUPF 2.0.0-release-088aa7c4. This impacts the function vlib_worker_loop in the library /usr/xpro/upf/tools/libs/libvlib.so of the component UPF Process. The manipulation results in denial of service.
This vulnerability was named CVE-2026-8232. The attack needs to be approached within the local network. There is no available exploit.
The vendor was contacted early about this disclosure.
A vulnerability was found in Horde Groupware up to 5.1.0. It has been rated as critical. This impacts an unknown function in the library framework/util/lib/horde/variables.php of the component Util Library. The manipulation of the argument _formvars leads to code injection.
This vulnerability is documented as CVE-2014-1691. The attack can be initiated remotely. Additionally, an exploit exists.
Upgrading the affected component is advised.
A vulnerability described as problematic has been identified in Linux Foundation libvchan 4.2/4.3.0. This affects an unknown part of the component XenStore Ring Index Handler. The manipulation results in improper input validation.
This vulnerability is cataloged as CVE-2014-1896. The attack must be initiated from a local position. There is no exploit available.
Upgrading the affected component is recommended.
A vulnerability classified as problematic has been found in Xen Security 4.2. This vulnerability affects the function FLASK_AVC_CACHESTAT of the component Hypercall Handler. This manipulation causes numeric error.
This vulnerability is registered as CVE-2014-1895. The attack needs to be launched locally. No exploit is available.
To fix this issue, it is recommended to deploy a patch.
A vulnerability identified as problematic has been detected in Linux Foundation Xen. Impacted is an unknown function. The manipulation leads to numeric error.
This vulnerability is listed as CVE-2014-1891. The attack must be carried out locally. There is no available exploit.
Applying a patch is the recommended action to fix this issue.
A vulnerability labeled as problematic has been found in Linux Foundation Xen. The affected element is an unknown function of the component Memory Allocation Handler. The manipulation results in memory corruption.
This vulnerability is cataloged as CVE-2014-1892. The attack must be initiated from a local position. There is no exploit available.
It is best practice to apply a patch to resolve this issue.
A vulnerability marked as problematic has been reported in Linux Foundation Xen. The impacted element is the function FLASK_GETBOOL/FLASK_SETBOOL of the component Flask Hypercall. This manipulation causes numeric error.
This vulnerability is registered as CVE-2014-1893. The attack needs to be launched locally. No exploit is available.
It is recommended to apply a patch to fix this issue.