A vulnerability classified as problematic was found in Sonos Era 300. This issue affects some unknown processing of the component SMB Response Handler. Such manipulation leads to out-of-bounds read.
This vulnerability is traded as CVE-2026-4149. The attack may be launched remotely. There is no exploit available.
Upgrading the affected component is advised.
A vulnerability labeled as critical has been found in GIMP. This impacts an unknown function of the component PSD File Parser. Such manipulation leads to integer overflow.
This vulnerability is listed as CVE-2026-4150. The attack may be performed from remote. There is no available exploit.
It is best practice to apply a patch to resolve this issue.
A vulnerability, which was classified as problematic, has been found in ChargePoint Home Flex. Impacted is an unknown function. Performing a manipulation results in information disclosure.
This vulnerability is known as CVE-2026-4155. Remote exploitation of the attack is possible. No exploit is available.
It is advisable to upgrade the affected component.
A vulnerability, which was classified as critical, was found in ChargePoint Home Flex. The affected element is the function getpreq of the component OCPP Handler. Executing a manipulation can lead to stack-based buffer overflow.
This vulnerability is handled as CVE-2026-4156. The attack can only be done within the local network. There is not any exploit available.
You should upgrade the affected component.
A vulnerability described as critical has been identified in GIMP. Affected by this vulnerability is an unknown functionality of the component PSP File Parser. Executing a manipulation can lead to heap-based buffer overflow.
This vulnerability is registered as CVE-2026-4153. It is possible to launch the attack remotely. No exploit is available.
Applying a patch is advised to resolve this issue.
A vulnerability, which was classified as problematic, has been found in NoMachine. The affected element is an unknown function. Performing a manipulation results in Local Privilege Escalation.
This vulnerability is reported as CVE-2026-5054. The attack requires a local approach. No exploit exists.
It is advisable to upgrade the affected component.
A vulnerability was found in aws-mcp-server and classified as critical. Affected by this vulnerability is an unknown functionality. The manipulation results in command injection.
This vulnerability was named CVE-2026-5058. The attack may be performed from remote. There is no available exploit.
A vulnerability was found in aws-mcp-server. It has been classified as critical. Affected by this issue is some unknown functionality of the component CLI Command Handler. This manipulation causes command injection.
The identification of this vulnerability is CVE-2026-5059. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability, which was classified as problematic, was found in NoMachine. The impacted element is an unknown function. Executing a manipulation can lead to uncontrolled search path.
This vulnerability appears as CVE-2026-5055. The attack requires local access. There is no available exploit.
You should upgrade the affected component.
A vulnerability marked as critical has been reported in chrisbadgett LifterLMS Plugin up to 9.2.1 on WordPress. Impacted is the function edit_post. Performing a manipulation of the argument order results in sql injection.
This vulnerability is known as CVE-2026-5207. Remote exploitation of the attack is possible. No exploit is available.
A vulnerability was found in Labcenter Proteus. It has been declared as critical. This impacts an unknown function of the component PDSPRJ File Parser. Executing a manipulation can lead to out-of-bounds write.
This vulnerability is handled as CVE-2026-5494. The attack can be executed remotely. There is not any exploit available.
A vulnerability was found in Labcenter Proteus. It has been rated as critical. Affected is an unknown function of the component PDSPRJ File Parser. The manipulation leads to out-of-bounds write.
This vulnerability is uniquely identified as CVE-2026-5493. The attack is possible to be carried out remotely. No exploit exists.
A vulnerability was found in Optimole Plugin up to 4.2.2 on WordPress. It has been rated as problematic. Affected by this issue is the function sanitize_text_field of the file /wp-json/optimole/v1/optimizations of the component REST Endpoint. The manipulation leads to cross site scripting.
This vulnerability is documented as CVE-2026-5217. The attack can be initiated remotely. There is not any exploit available.
A vulnerability described as critical has been identified in FoundationAgents MetaGPT up to 0.8.1. This impacts the function decode_image of the file metagpt/utils/common.py. The manipulation of the argument img_url_or_b64 results in server-side request forgery.
This vulnerability is known as CVE-2026-6111. It is possible to launch the attack remotely. Furthermore, an exploit is available.
The project was informed of the problem early through an issue report but has not responded yet.
A vulnerability marked as critical has been reported in FoundationAgents MetaGPT up to 0.8.1. This affects the function generate_thoughts of the file metagpt/strategy/tot.py of the component Tree-of-Thought Solver. The manipulation leads to code injection.
This vulnerability is traded as CVE-2026-6110. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
The project was informed of the problem early through an issue report but has not responded yet.
A vulnerability labeled as problematic has been found in FoundationAgents MetaGPT up to 0.8.1. The impacted element is the function evaluateCode of the file metagpt/environment/minecraft/mineflayer/index.js of the component Mineflayer HTTP API. Executing a manipulation can lead to cross-site request forgery.
This vulnerability appears as CVE-2026-6109. The attack may be performed from remote. In addition, an exploit is available.
The project was informed of the problem early through an issue report but has not responded yet.