A vulnerability labeled as critical has been found in Cisco Secure Firewall Threat Defense Software. The impacted element is an unknown function. Such manipulation leads to command injection.
This vulnerability is documented as CVE-2026-20016. The attack requires being on the local network. There is not any exploit available.
The affected component should be upgraded.
A vulnerability classified as critical has been found in Cisco Secure Firewall Threat Defense Software. Affected is an unknown function of the component OSPF Protocol Handler. The manipulation leads to denial of service.
This vulnerability is traded as CVE-2026-20020. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Cisco Secure Firewall Threat Defense Software and classified as problematic. The impacted element is an unknown function of the component CLI. The manipulation of the argument command results in execution with unnecessary privileges.
This vulnerability was named CVE-2026-20017. The attack needs to be approached locally. There is no available exploit.
It is suggested to upgrade the affected component.
A vulnerability described as critical has been identified in Dataease SQLBot up to 1.4.0. This affects an unknown function of the file backend/apps/system/api/assistant.py of the component API Endpoint. Such manipulation leads to improper access controls.
This vulnerability is referenced as CVE-2025-15597. It is possible to launch the attack remotely. Furthermore, an exploit is available.
Upgrading the affected component is recommended.
Multiple endpoints are affected. The vendor was contacted early about this disclosure.
A vulnerability was found in Nsasoft Nsauditor SpotAuditor SpotAuditor 5.3.1.0. It has been rated as critical. This impacts an unknown function of the component Registration Handler. Performing a manipulation of the argument Name results in stack-based buffer overflow.
This vulnerability is known as CVE-2019-25434. Attacking locally is a requirement. Furthermore, an exploit is available.
A vulnerability, which was classified as critical, has been found in Chia Blockchain 2.1.0. This issue affects the function _authenticate of the file rpc_server_base.py of the component RPC Credential Handler. The manipulation leads to improper authentication.
This vulnerability is uniquely identified as CVE-2026-3192. The attack is possible to be carried out remotely. Moreover, an exploit is present.
The vendor was informed early via email. A separate report via bugbounty was rejected with the reason "This is by design. The user is responsible for host security".
A vulnerability marked as problematic has been reported in FascinatedBox lily up to 2.3. This issue affects the function patch_line_end of the file src/lily_build_error.c of the component Error Reporting. The manipulation leads to out-of-bounds read.
This vulnerability is referenced as CVE-2026-3390. The attack can only be performed from a local environment. Furthermore, an exploit is available.
The project was informed of the problem early through an issue report but has not responded yet.
A vulnerability, which was classified as problematic, has been found in jarikomppa soloud up to 20200207. This affects the function SoLoud::Wav::loadwav of the file src/audiosource/wav/soloud_wav.cpp of the component WAV File Parser. Performing a manipulation results in memory corruption.
This vulnerability is cataloged as CVE-2026-3394. The attack must be initiated from a local position. Furthermore, there is an exploit available.
The project was informed of the problem early through an issue report but has not responded yet.
A vulnerability was found in wren-lang wren up to 0.4.0. It has been rated as problematic. Affected by this vulnerability is the function emitOp of the file src/vm/wren_compiler.c. This manipulation causes out-of-bounds read.
This vulnerability is handled as CVE-2026-3386. It is possible to launch the attack on the local host. Additionally, an exploit exists.
The project was informed of the problem early through an issue report but has not responded yet.
A vulnerability categorized as problematic has been discovered in wren-lang wren up to 0.4.0. Affected by this issue is the function getByteCountForArguments of the file src/vm/wren_compiler.c. Such manipulation leads to null pointer dereference.
This vulnerability is uniquely identified as CVE-2026-3387. Local access is required to approach this attack. Moreover, an exploit is present.
The project was informed of the problem early through an issue report but has not responded yet.
A vulnerability, which was classified as critical, was found in MaxSite CMS up to 109.1. This impacts the function eval of the file application/maxsite/admin/plugins/editor_markitup/preview-ajax.php of the component MarkItUp Preview AJAX Endpoint. Executing a manipulation can lead to code injection.
This vulnerability is registered as CVE-2026-3395. It is possible to launch the attack remotely. Furthermore, an exploit is available.
You should upgrade the affected component.
The code maintainer was informed beforehand about the issues. He reacted very fast and highly professional.