A vulnerability described as problematic has been identified in Red Hat Keycloak 26.5.1. This issue affects some unknown processing of the component Admin API. The manipulation results in authorization bypass.
This vulnerability is identified as CVE-2026-2366. The attack can be executed remotely. There is not any exploit available.
A vulnerability classified as critical was found in villatheme Sales Countdown Timer for WooCommerce and WordPress Plugin up to 1.1.8.1 on WordPress. Affected is an unknown function. The manipulation results in improper control of filename for include/require statement in php program ('php remote file inclusion').
This vulnerability is reported as CVE-2026-27052. The attack can be launched remotely. No exploit exists.
A vulnerability was found in modcluster mod_proxy_cluster. It has been declared as problematic. Affected is an unknown function of the component Response Body Handler. Executing a manipulation can lead to crlf injection.
This vulnerability is tracked as CVE-2026-3234. The attack can be launched remotely. No exploit exists.
A vulnerability classified as problematic was found in ThakeeNathees pocketlang up to cc73ca61b113d48ee130d837a7a8b145e41de5ce. The affected element is the function pkByteBufferAddString. The manipulation of the argument length with the input 4294967290 results in memory corruption.
This vulnerability is reported as CVE-2026-4010. The attack requires a local approach. Moreover, an exploit is present.
This product does not use versioning. This is why information about affected and unaffected releases are unavailable.
The project was informed of the problem early through an issue report but has not responded yet.
A vulnerability, which was classified as problematic, has been found in rxi fe up to ed4cda96bd582cbb08520964ba627efb40f3dd91. The impacted element is the function read_ of the file src/fe.c. This manipulation with the input 1 causes out-of-bounds read.
This vulnerability appears as CVE-2026-4012. The attack requires local access. In addition, an exploit is available.
This product uses a rolling release model to deliver continuous updates. As a result, specific version information for affected or updated releases is not available.
The project was informed of the problem early through an issue report but has not responded yet.
A vulnerability, which was classified as critical, was found in SourceCodester Web-based Pharmacy Product Management System 1.0. This affects an unknown function of the file add_admin.php. Such manipulation leads to improper authorization.
This vulnerability is traded as CVE-2026-4013. The attack may be launched remotely. There is no exploit available.
A vulnerability was found in GPAC 26.03-DEV and classified as critical. Affected is the function txtin_process_texml of the file src/filters/load_text.c of the component TeXML File Parser. Executing a manipulation can lead to stack-based buffer overflow.
This vulnerability is handled as CVE-2026-4015. It is possible to launch the attack on the local host. Additionally, an exploit exists.
Applying a patch is advised to resolve this issue.
A vulnerability was found in GPAC 26.03-DEV. It has been classified as critical. Affected by this vulnerability is the function svgin_process of the file src/filters/load_svg.c of the component SVG Parser. The manipulation leads to out-of-bounds write.
This vulnerability is uniquely identified as CVE-2026-4016. Local access is required to approach this attack. Moreover, an exploit is present.
It is suggested to install a patch to address this issue.
A vulnerability classified as critical has been found in SGLang up to 0.5.9. Affected is the function pickle.loads of the component ZMQ Broker. The manipulation leads to deserialization.
This vulnerability is uniquely identified as CVE-2026-3059. The attack is possible to be carried out remotely. No exploit exists.
A vulnerability classified as critical was found in SGLang up to 0.5.9. Affected by this vulnerability is the function pickle.loads of the component Disaggregation Module. The manipulation results in deserialization.
This vulnerability was named CVE-2026-3060. The attack may be performed from remote. There is no available exploit.
ClickFix campaigns are evolving, with attackers increasingly targeting macOS users and deploying more advanced infostealers, according to Sophos researchers. ClickFix is a growing social engineering technique that tricks users into manually executing malicious commands, bypassing traditional protections. Once mainly targeting Windows, it is now increasingly affecting macOS, with recent campaigns deploying infostealers like AMOS and […]
A vulnerability described as problematic has been identified in Campcodes Division Regional Athletic Meet Game Result Matrix System 2.1. This affects an unknown part of the file save-games.php. The manipulation of the argument game_name results in cross site scripting.
This vulnerability was named CVE-2026-3983. The attack may be performed from remote. In addition, an exploit is available.
A vulnerability classified as problematic has been found in Campcodes Division Regional Athletic Meet Game Result Matrix System 2.1. This vulnerability affects unknown code of the file save_up_athlete.php. This manipulation of the argument a_name causes cross site scripting.
The identification of this vulnerability is CVE-2026-3984. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
A vulnerability labeled as problematic has been found in CesiumGS CesiumJS up to 1.137.0. Affected by this issue is some unknown functionality of the file Apps/Sandcastle/standalone.html. The manipulation of the argument c results in cross site scripting.
This vulnerability is reported as CVE-2026-3990. The attack can be launched remotely. Moreover, an exploit is present.
The presence of this vulnerability remains uncertain at this time.
The vendor was contacted early about this disclosure but did not respond in any way. According to CVE-2023-48094, "the vendor's position is that Apps/Sandcastle/standalone.html is part of the CesiumGS/cesium GitHub repository, but is demo code that is not part of the CesiumJS JavaScript library product."
A vulnerability marked as critical has been reported in CodeGenieApp serverless-express up to 4.17.1. This affects an unknown part of the file utils/dynamodb.ts of the component Users Endpoint. This manipulation of the argument filter causes injection.
This vulnerability appears as CVE-2026-3992. The attack may be initiated remotely. In addition, an exploit is available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability described as problematic has been identified in itsourcecode Payroll Management System 1.0. This vulnerability affects unknown code of the file /manage_employee_deductions.php. Such manipulation of the argument ID leads to cross site scripting.
This vulnerability is traded as CVE-2026-3993. The attack may be launched remotely. Furthermore, there is an exploit available.