A vulnerability was found in Ruby up to 2.7.4/3.0.2. It has been declared as critical. Affected is the function CGI.escape_html. Such manipulation leads to integer overflow.
This vulnerability is uniquely identified as CVE-2021-41816. The attack can be launched remotely. No exploit exists.
It is recommended to upgrade the affected component.
A vulnerability marked as critical has been reported in Apple macOS. This issue affects some unknown processing of the component Ruby. Performing a manipulation results in memory corruption.
This vulnerability is cataloged as CVE-2022-28739. It is possible to initiate the attack remotely. There is no exploit available.
It is suggested to upgrade the affected component.
A vulnerability was found in Ruby up to 2.6.9/2.7.5/3.0.3/3.1.1. It has been rated as critical. Affected is the function Kernel#Float/String#to_f of the component String-to-Float Conversion. This manipulation causes buffer overflow.
This vulnerability is tracked as CVE-2022-28739. The attack is only possible within the local network. No exploit exists.
Upgrading the affected component is advised.
A vulnerability, which was classified as very critical, was found in Oracle JD Edwards EnterpriseOne Tools. Affected by this issue is some unknown functionality of the component E1 Dev Platform Tech - Cloud Manager. Such manipulation leads to double free.
This vulnerability is traded as CVE-2022-28738. The attack may be launched remotely. There is no exploit available.
A vulnerability categorized as critical has been discovered in Ruby up to 3.0.3/3.1.1. Affected by this vulnerability is an unknown functionality of the component Regexp Compiler. Such manipulation leads to double free.
This vulnerability is listed as CVE-2022-28738. The attack may be performed from remote. There is no available exploit.
It is advisable to upgrade the affected component.
A vulnerability has been found in MISP up to 2.5.36 and classified as problematic. This affects an unknown part. The manipulation leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2026-8080. The attack is possible to be carried out remotely. No exploit exists.
The affected component should be upgraded.
A vulnerability was found in Ivanti Endpoint Manager Mobile 12.6.1.1/12.7.0.1/12.8.0.1. It has been rated as critical. This issue affects some unknown processing. Performing a manipulation results in improper certificate validation.
This vulnerability was named CVE-2026-7821. The attack may be initiated remotely. There is no available exploit.
Upgrading the affected component is advised.
A vulnerability was found in Ivanti Endpoint Manager Mobile 12.6.1.1/12.7.0.1/12.8.0.1. It has been declared as critical. This vulnerability affects unknown code. Such manipulation leads to improper input validation.
This vulnerability is uniquely identified as CVE-2026-6973. The attack can be launched remotely. Moreover, an exploit is present.
It is recommended to upgrade the affected component.
A vulnerability categorized as critical has been discovered in Ivanti Endpoint Manager Mobile. Impacted is an unknown function. Executing a manipulation can lead to improper certificate validation.
The identification of this vulnerability is CVE-2026-5787. The attack may be launched remotely. There is no exploit available.
It is advisable to upgrade the affected component.
A vulnerability labeled as critical has been found in Ivanti Endpoint Manager Mobile 12.6.1.1/12.7.0.1/12.8.0.1. The impacted element is an unknown function. The manipulation results in improper access controls.
This vulnerability is identified as CVE-2026-5788. The attack can be executed remotely. There is not any exploit available.
The affected component should be upgraded.
A vulnerability, which was classified as critical, has been found in CodeAstro Online Catering Ordering System 1.0. This affects an unknown function of the file /deleteorder.php. The manipulation of the argument ID leads to sql injection.
This vulnerability is uniquely identified as CVE-2026-8231. The attack is possible to be carried out remotely. Moreover, an exploit is present.
A vulnerability classified as critical was found in Wavlink NU516U1 240425. The impacted element is the function sys_login1 of the file /cgi-bin/login.cgi. Executing a manipulation of the argument ipaddr can lead to os command injection.
This vulnerability is handled as CVE-2026-8230. The attack can be executed remotely. Additionally, an exploit exists.
The vendor was contacted early about this disclosure.
A vulnerability classified as critical has been found in Wavlink NU516U1 240425. The affected element is the function WifiBasic of the file /cgi-bin/wireless.cgi. Performing a manipulation of the argument AuthMethod/EncrypType results in os command injection.
This vulnerability is known as CVE-2026-8229. Remote exploitation of the attack is possible. Furthermore, an exploit is available.
The vendor was contacted early about this disclosure.
A vulnerability described as critical has been identified in Wavlink NU516U1 240425. Impacted is the function advance of the file /cgi-bin/wireless.cgi. Such manipulation of the argument wlan_conf/Channel/skiplist/ieee_80211h leads to os command injection.
This vulnerability is traded as CVE-2026-8228. The attack may be launched remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure.
A vulnerability marked as critical has been reported in Wavlink NU516U1 240425. This issue affects the function wzdapMesh of the file /cgi-bin/adm.cgi. This manipulation causes os command injection.
This vulnerability appears as CVE-2026-8227. The attack may be initiated remotely. In addition, an exploit is available.
The vendor was contacted early about this disclosure.