A vulnerability classified as problematic has been found in Craft CMS up to 4.17.7/5.9.13. This affects an unknown part of the component Endpoint. Performing a manipulation results in information disclosure.
This vulnerability is reported as CVE-2026-33161. The attack is possible to be carried out remotely. No exploit exists.
It is recommended to upgrade the affected component.
A vulnerability described as critical has been identified in ParisNeo lollms-webui up to 8c5dcef63d847bb3d027ec74915d8fe4afd3014e. Affected by this issue is some unknown functionality of the component Web User Interface. Such manipulation leads to missing authentication.
This vulnerability is documented as CVE-2026-33340. The attack can be executed remotely. There is not any exploit available.
A vulnerability marked as critical has been reported in Craft CMS up to 4.17.7/5.9.13. Affected by this vulnerability is an unknown functionality. This manipulation causes missing authentication.
This vulnerability is registered as CVE-2026-33159. Remote exploitation of the attack is possible. No exploit is available.
It is suggested to upgrade the affected component.
A vulnerability labeled as critical has been found in Craft CMS up to 5.9.13. Affected is an unknown function of the file /actions/entries/move-to-section. The manipulation results in improper authorization.
This vulnerability is cataloged as CVE-2026-33162. The attack may be launched remotely. There is no exploit available.
The affected component should be upgraded.
A vulnerability identified as problematic has been detected in Craft CMS up to 4.17.7/5.9.13. This impacts an unknown function of the component Endpoint. The manipulation leads to authorization bypass.
This vulnerability is listed as CVE-2026-33160. The attack may be initiated remotely. There is no available exploit.
You should upgrade the affected component.
A vulnerability categorized as problematic has been discovered in Craft CMS up to 4.17.7/5.9.13. This affects an unknown function. Executing a manipulation can lead to authorization bypass.
This vulnerability is tracked as CVE-2026-33158. The attack can be launched remotely. No exploit exists.
It is advisable to upgrade the affected component.
A vulnerability was found in Craft CMS up to 5.9.12. It has been declared as problematic. The affected element is the function cleanseConfig. Such manipulation of the argument fieldLayouts leads to use of externally-controlled input to select classes or code.
This vulnerability is referenced as CVE-2026-33157. It is possible to launch the attack remotely. No exploit is available.
It is recommended to upgrade the affected component.
A vulnerability was found in LibVNC Server up to 0.9.15. It has been classified as problematic. Impacted is the function httpProcessInput of the file httpd.c of the component HTTP Proxy Handler. This manipulation causes null pointer dereference.
The identification of this vulnerability is CVE-2026-32854. It is possible to initiate the attack remotely. There is no exploit available.
To fix this issue, it is recommended to deploy a patch.
A vulnerability was found in LibVNC Server up to 0.9.15 and classified as critical. This issue affects the function HandleUltraZipBPP of the component VNC Handler. The manipulation results in out-of-bounds read.
This vulnerability was named CVE-2026-32853. The attack may be performed from remote. There is no available exploit.
A patch should be applied to remediate this issue.
A vulnerability categorized as critical has been discovered in Linux Kernel up to 6.12.76/6.18.17/6.19.7/7.0-rc3. Impacted is the function aa_dfa_next of the component apparmor. The manipulation results in out-of-bounds read.
This vulnerability is identified as CVE-2026-23269. The attack can only be performed from the local network. There is not any exploit available.
It is advisable to upgrade the affected component.
A vulnerability classified as problematic was found in Dell Integrated Remote Access Controller up to 7.00.00.174/7.10.90.00. Affected by this vulnerability is an unknown functionality. The manipulation results in exposure of sensitive system information due to uncleared debug information.
This vulnerability is reported as CVE-2026-26948. The attack can be launched remotely. No exploit exists.
Upgrading the affected component is advised.
A vulnerability identified as problematic has been detected in nghttp2 up to 1.68.0. This impacts the function nghttp2_session_terminate_session of the component HTTP2 Handler. Performing a manipulation results in reachable assertion.
This vulnerability is identified as CVE-2026-27135. The attack can be initiated remotely. There is not any exploit available.
You should upgrade the affected component.
A vulnerability was found in aaPanel 7.57.0. It has been declared as problematic. This impacts an unknown function. Such manipulation leads to inefficient regular expression complexity.
This vulnerability is uniquely identified as CVE-2026-29856. The attack can be launched remotely. No exploit exists.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.12.76/6.18.17/6.19.7/7.0-rc2. The affected element is the function act_ct of the component sched. Performing a manipulation results in use after free.
This vulnerability is known as CVE-2026-23270. Access to the local network is required for this attack. No exploit is available.
It is advisable to upgrade the affected component.
A vulnerability described as critical has been identified in Linux Kernel up to 6.12.76/6.18.17/6.19.7/7.0-rc3. This impacts an unknown function of the component Apparmorfs Interface. Executing a manipulation can lead to permission issues.
This vulnerability is registered as CVE-2026-23268. The attack needs to be launched locally. No exploit is available.
Upgrading the affected component is recommended.
A vulnerability marked as critical has been reported in Linux Kernel up to 6.1.163/6.6.126/6.12.73/6.18.12/6.19.2. Impacted is the function f2fs_do_write_node_page. This manipulation causes denial of service.
This vulnerability is registered as CVE-2026-23267. The attack requires access to the local network. No exploit is available.
It is suggested to upgrade the affected component.
A vulnerability was found in Giflib 5.2.2. It has been declared as critical. The affected element is the function EGifGCBToExtension. The manipulation results in buffer overflow.
This vulnerability was named CVE-2026-26740. The attack may be performed from remote. In addition, an exploit is available.