Oracle has released an out-of-band security update to fix a critical unauthenticated remote code execution vulnerability in Identity Manager and Web Services Manager tracked as CVE-2026-21992. [...]
A vulnerability, which was classified as problematic, has been found in WP Photo Album Plus Plugin up to 8.0.9 on WordPress. Impacted is an unknown function. This manipulation causes cross site scripting.
This vulnerability appears as CVE-2021-25115. The attack may be initiated remotely. There is no available exploit.
It is advisable to upgrade the affected component.
A vulnerability labeled as problematic has been found in J.N. Breetvelt WP Photo Album Plus Plugin up to 8.5.02.005 on WordPress. The impacted element is an unknown function. Such manipulation leads to cross site scripting.
This vulnerability is referenced as CVE-2023-49813. It is possible to launch the attack remotely. No exploit is available.
A vulnerability was found in Red Hat Ansible Automation Platform 2 and classified as problematic. The affected element is an unknown function of the component Event-Driven Ansible. The manipulation results in debug messages revealing unnecessary information.
This vulnerability is identified as CVE-2025-2877. The attack can be executed remotely. There is not any exploit available.
A vulnerability was found in striae-org striae up to 2.x and classified as problematic. This impacts an unknown function. Such manipulation leads to improper validation of integrity check value.
This vulnerability is referenced as CVE-2026-31839. The attack can only be performed from a local environment. No exploit is available.
It is suggested to upgrade the affected component.
A vulnerability was found in Jellyfin. It has been rated as critical. Affected by this issue is some unknown functionality of the file code-quality.yml of the component GitHub Action Handler. The manipulation leads to improper privilege management.
This vulnerability is listed as CVE-2026-31852. The attack may be initiated remotely. There is no available exploit.
To fix this issue, it is recommended to deploy a patch.
A vulnerability, which was classified as critical, was found in Cursor up to 1.x. Affected is an unknown function. Such manipulation leads to os command injection.
This vulnerability is uniquely identified as CVE-2026-31854. The attack can be launched remotely. No exploit exists.
You should upgrade the affected component.
A vulnerability described as problematic has been identified in anyproto anytype-heart, anytype-cli and anytype-ts. Affected by this issue is some unknown functionality of the component Local gRPC Client API. Such manipulation leads to improper restriction of excessive authentication attempts.
This vulnerability is documented as CVE-2026-31863. The attack needs to be performed locally. There is not any exploit available.
Upgrading the affected component is recommended.
A vulnerability was found in Juniper Junos OS up to 22.4R3-S7/23.2R2-S4/23.4R2-S5/24.2R2-S1/24.4R1 on MX/SRX/EX. It has been classified as problematic. This vulnerability affects unknown code. The manipulation leads to null pointer dereference.
This vulnerability is referenced as CVE-2025-60007. The attack can only be performed from a local environment. No exploit is available.
Upgrading the affected component is recommended.
A vulnerability categorized as critical has been discovered in mackron dr_libs up to 0.14.4. This affects the function drwav__read_smpl_to_metadata_obj of the file dr_wav.h of the component WAV File Parser. The manipulation results in heap-based buffer overflow.
This vulnerability is identified as CVE-2026-29022. The attack can be executed remotely. There is not any exploit available.
It is advisable to implement a patch to correct this issue.
A vulnerability, which was classified as critical, has been found in Craft CMS up to 3.9.14/4.14.14/5.6.16. Affected by this vulnerability is an unknown functionality. The manipulation leads to code injection.
This vulnerability is documented as CVE-2025-32432. The attack can be initiated remotely. Additionally, an exploit exists.
It is advisable to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 6.1.3 and classified as critical. Affected by this issue is the function dvb_register_device. Performing a manipulation results in improper initialization.
This vulnerability is identified as CVE-2022-50499. The attack can only be performed from the local network. There is not any exploit available.
The affected component should be upgraded.
A vulnerability, which was classified as critical, was found in Linux Kernel up to 5.4.219/5.10.149/5.15.74/5.19.16/6.0.2. This affects the function nouveau_gem_prime_import_sg_table. Such manipulation leads to use after free.
This vulnerability is documented as CVE-2022-50454. The attack requires being on the local network. There is not any exploit available.
You should upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 5.10.152/5.15.76/6.0.6 and classified as critical. This issue affects the function load_elf_binary of the component binfmt_elf. This manipulation causes memory leak.
The identification of this vulnerability is CVE-2022-50466. The attack needs to be done within the local network. There is no exploit available.
The affected component should be upgraded.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.1.3. Affected is the function destroy. This manipulation causes use after free.
The identification of this vulnerability is CVE-2022-50496. The attack needs to be done within the local network. There is no exploit available.
It is advisable to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 5.10.162/5.15.86/6.0.17/6.1.3. It has been rated as critical. Impacted is the function ext4_unlink. Performing a manipulation results in deadlock.
This vulnerability is cataloged as CVE-2022-50436. The attack must originate from the local network. There is no exploit available.
Upgrading the affected component is advised.
A vulnerability identified as critical has been detected in Linux Kernel up to 6.1.1. The impacted element is the function cdev_device_add. This manipulation causes improper initialization.
This vulnerability is tracked as CVE-2022-50282. The attack is only possible within the local network. No exploit exists.
You should upgrade the affected component.