A vulnerability classified as critical has been found in Amazon AWS Firecracker up to 1.14.3/1.15.0 on x86-64. This impacts an unknown function of the component Virtio PCI Transport. The manipulation leads to out-of-bounds write.
This vulnerability is documented as CVE-2026-5747. The attack needs to be performed locally. There is not any exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in Gravity Forms Plugin up to 2.9.30 on WordPress. Affected by this vulnerability is the function get_value_entry_detail of the component Dashboard. This manipulation of the argument input_.4 causes cross site scripting.
This vulnerability appears as CVE-2026-4394. The attack may be initiated remotely. There is no available exploit.
It is advisable to upgrade the affected component.
A vulnerability described as critical has been identified in wpmudev Hustle Plugin up to 7.8.10.2 on WordPress. Impacted is the function hustle_module_converted. Such manipulation leads to missing authorization.
This vulnerability is documented as CVE-2026-2263. The attack can be executed remotely. There is not any exploit available.
Upgrading the affected component is recommended.
A vulnerability was found in Apache OpenMeetings up to 8.x and classified as problematic. Affected by this vulnerability is an unknown functionality of the component REST Login Endpoint. The manipulation of the argument username/password results in information disclosure.
This vulnerability was named CVE-2026-34020. The attack may be performed from remote. There is no available exploit.
It is suggested to upgrade the affected component.
A vulnerability has been found in Apache OpenMeetings up to 8.x and classified as problematic. Affected is an unknown function. The manipulation leads to use of a one-way hash with a predictable salt.
This vulnerability is uniquely identified as CVE-2026-33266. The attack is possible to be carried out remotely. No exploit exists.
The affected component should be upgraded.
A vulnerability, which was classified as problematic, was found in Apache OpenMeetings up to 8.x. This impacts an unknown function of the component FileWebService. Executing a manipulation can lead to improper handling of insufficient permissions or privileges.
This vulnerability is handled as CVE-2026-33005. The attack can be executed remotely. There is not any exploit available.
You should upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in Orthanc DICOM Server up to 1.12.10. This affects the function DecodeLookupTable of the file DicomImageDecoder.cpp of the component Image Parser. Performing a manipulation results in out-of-bounds read.
This vulnerability is known as CVE-2026-5445. Remote exploitation of the attack is possible. No exploit is available.
A vulnerability classified as critical was found in Orthanc DICOM Server up to 1.12.10. The impacted element is an unknown function of the component DICOM Image Parser. Such manipulation leads to integer overflow.
This vulnerability is traded as CVE-2026-5443. The attack may be launched remotely. There is no exploit available.
A vulnerability classified as critical has been found in Orthanc DICOM Server up to 1.12.10. The affected element is an unknown function of the component DICOM Image Parser. This manipulation causes integer overflow.
This vulnerability appears as CVE-2026-5442. The attack may be initiated remotely. There is no available exploit.
A vulnerability described as problematic has been identified in Orthanc DICOM Server up to 1.12.10. Impacted is the function DecodePsmctRle1 of the file DicomImageDecoder.cpp of the component Image Parser. The manipulation results in out-of-bounds read.
This vulnerability is reported as CVE-2026-5441. The attack can be launched remotely. No exploit exists.
A vulnerability marked as problematic has been reported in Orthanc DICOM Server up to 1.12.10. This issue affects some unknown processing of the component ZIP Archive Handler. The manipulation of the argument size leads to allocation of resources.
This vulnerability is documented as CVE-2026-5439. The attack can be initiated remotely. There is not any exploit available.
A vulnerability labeled as critical has been found in Orthanc DICOM Server up to 1.12.10. This vulnerability affects unknown code of the component PAM Image Parser. Executing a manipulation can lead to integer overflow.
This vulnerability is registered as CVE-2026-5444. It is possible to launch the attack remotely. No exploit is available.
A vulnerability identified as problematic has been detected in Orthanc DICOM Server up to 1.12.10. This affects an unknown part of the component HTTP Handler. Performing a manipulation of the argument Content-Length results in allocation of resources.
This vulnerability is cataloged as CVE-2026-5440. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability categorized as critical has been discovered in Jizhicms 2.5.4. Affected by this issue is some unknown functionality of the component User Evaluation/Message/Comment. Such manipulation leads to server-side request forgery.
This vulnerability is listed as CVE-2025-50228. The attack may be performed from remote. There is no available exploit.
A vulnerability was found in SonicWall SMA1000. It has been rated as critical. Affected by this vulnerability is an unknown functionality of the component Tunnel TOTP Authentication. This manipulation causes improper handling of unicode encoding.
This vulnerability is tracked as CVE-2026-4116. The attack is possible to be carried out remotely. No exploit exists.