A vulnerability was found in phpseclib up to 1.0.26/2.0.51/3.0.49. It has been classified as problematic. Affected by this vulnerability is an unknown functionality. This manipulation causes observable timing discrepancy.
The identification of this vulnerability is CVE-2026-32935. It is possible to initiate the attack remotely. There is no exploit available.
Upgrading the affected component is recommended.
A vulnerability identified as problematic has been detected in NaturalIntelligence fast-xml-parser up to 5.5.5. Affected is the function replaceEntitiesValue. Performing a manipulation results in xml entity expansion.
This vulnerability is identified as CVE-2026-33036. The attack can be initiated remotely. There is not any exploit available.
You should upgrade the affected component.
A vulnerability classified as critical has been found in alexcrichton tar-rs up to 0.4.44. This impacts an unknown function. Performing a manipulation results in type confusion.
This vulnerability is reported as CVE-2026-33055. The attack is possible to be carried out remotely. No exploit exists.
It is recommended to upgrade the affected component.
A vulnerability labeled as critical has been found in strukturag libde265 up to 1.0.16. This vulnerability affects the function ctb_info.log2unitSize of the component Image Parser. Such manipulation of the argument PicWidthInCtbsY/PicHeightInCtbsY leads to out-of-bounds write.
This vulnerability is traded as CVE-2026-33165. The attack may be launched remotely. There is no exploit available.
The affected component should be upgraded.
A vulnerability described as critical has been identified in strukturag libde265 up to 1.0.16. Impacted is the function pic_parameter_set::set_derived_values. Executing a manipulation can lead to heap-based buffer overflow.
This vulnerability is handled as CVE-2026-33164. The attack can be executed remotely. There is not any exploit available.
Upgrading the affected component is recommended.
A vulnerability classified as critical was found in libfuse up to 3.18.1. The impacted element is the function fuse_uring_start of the component FUSE File Parser. The manipulation results in use after free.
This vulnerability was named CVE-2026-33150. The attack needs to be approached locally. There is no available exploit.
Upgrading the affected component is advised.
A vulnerability classified as critical was found in pydicom up to 3.0.1. This impacts an unknown function of the component DICOM File Parser. Executing a manipulation can lead to path traversal.
This vulnerability appears as CVE-2026-32711. The attack may be performed from remote. There is no available exploit.
Upgrading the affected component is advised.
A vulnerability classified as critical was found in Microsoft Windows. Impacted is an unknown function of the component Kernel. Executing a manipulation can lead to race condition.
This vulnerability is handled as CVE-2025-62215. It is possible to launch the attack on the local host. Additionally, an exploit exists.
It is advisable to implement a patch to correct this issue.
A vulnerability was found in VMware Spring AI up to 1.0.3/1.1.2. It has been rated as problematic. Affected by this vulnerability is an unknown functionality of the component AbstractFilterExpressionConverter. This manipulation causes injection.
This vulnerability is registered as CVE-2026-22729. Remote exploitation of the attack is possible. No exploit is available.
Upgrading the affected component is advised.
A vulnerability categorized as critical has been discovered in VMware Spring AI up to 1.0.3/1.1.2. Affected by this issue is some unknown functionality of the component MariaDBFilterExpressionConverter. Such manipulation leads to sql injection.
This vulnerability is documented as CVE-2026-22730. The attack can be executed remotely. There is not any exploit available.
It is advisable to upgrade the affected component.