A vulnerability was found in OpenCode OC Messaging and USSD Gateway 6.32.2. It has been rated as critical. Affected is an unknown function of the component Company Handler. Performing a manipulation results in improper access controls.
This vulnerability was named CVE-2025-70614. The attack may be initiated remotely. There is no available exploit.
漏洞描述这是SmarterMain的一个未授权RCE漏洞,出现RCE的位置为ConnectToHub API method,具体的漏洞描述如下图所示:环境搭建这里我直接用的docker搭建的环境,命令如下:然后是.net的反编译工具,我使用的是Rider以及dotPeet,这个就凭个人喜好下载了。漏洞代码分析因为.Net的路由大部分都在MailService.dll,所以可以直接看到这个dll中
A vulnerability was found in Frappe up to 14.100.0/15.99.x. It has been declared as critical. This impacts an unknown function. Such manipulation leads to sql injection.
This vulnerability is uniquely identified as CVE-2026-29081. The attack can be launched remotely. No exploit exists.
It is recommended to upgrade the affected component.
A vulnerability was found in Frappe up to 14.99.x/15.97.x. It has been classified as critical. This affects an unknown function. This manipulation causes improper access controls.
This vulnerability is handled as CVE-2026-29077. The attack can be initiated remotely. There is not any exploit available.
Upgrading the affected component is recommended.
A vulnerability was found in OliveTin up to 3000.11.0 and classified as critical. The impacted element is an unknown function. The manipulation results in improper access controls.
This vulnerability is known as CVE-2026-28790. It is possible to launch the attack remotely. No exploit is available.
It is suggested to upgrade the affected component.
A vulnerability has been found in fedora-python lxml_html_clean up to 0.4.3 and classified as problematic. The affected element is the function lxml_html_clean. The manipulation leads to escaping of output.
This vulnerability is traded as CVE-2026-28350. It is possible to initiate the attack remotely. There is no exploit available.
The affected component should be upgraded.
A vulnerability, which was classified as critical, was found in Talishar. Impacted is an unknown function of the component Chat Message Handler. Executing a manipulation of the argument authKey can lead to improper authentication.
This vulnerability appears as CVE-2026-28428. The attack may be performed from remote. There is no available exploit.
Applying a patch is advised to resolve this issue.
A vulnerability, which was classified as critical, has been found in Chartbrew up to 4.8.3. This issue affects some unknown processing of the file /project/:project_id/chart/:chart_id/filter of the component Chart Filter Endpoint. Performing a manipulation results in missing authentication.
This vulnerability is reported as CVE-2026-27603. The attack is possible to be carried out remotely. No exploit exists.
It is advisable to upgrade the affected component.
A vulnerability classified as critical was found in maximmasiutin TinyWeb up to 2.2. This vulnerability affects unknown code of the component HTTP Request Handler. Such manipulation leads to integer overflow.
This vulnerability is documented as CVE-2026-28497. The attack can be executed remotely. There is not any exploit available.
Upgrading the affected component is advised.
A vulnerability classified as problematic has been found in MarkUsProject Markus up to 2.9.3. This affects an unknown part. This manipulation causes highly compressed data.
This vulnerability is registered as CVE-2026-25962. Remote exploitation of the attack is possible. No exploit is available.
It is recommended to upgrade the affected component.
A vulnerability described as problematic has been identified in Acronis Cyber Protect Cloud Agent and Cyber Protect 17. Affected by this issue is some unknown functionality. The manipulation results in incorrect permission assignment.
This vulnerability is cataloged as CVE-2025-30413. The attack must be initiated from a local position. There is no exploit available.
Upgrading the affected component is recommended.
A vulnerability marked as critical has been reported in OpenClaw up to 2026.2.14. Affected by this vulnerability is an unknown functionality of the component web_fetch. The manipulation leads to allocation of resources.
This vulnerability is listed as CVE-2026-28394. The attack may be initiated remotely. There is no available exploit.
It is suggested to upgrade the affected component.
A vulnerability labeled as critical has been found in middleapi orpc up to 1.13.5. Affected is an unknown function. Executing a manipulation can lead to improperly controlled modification of object prototype attributes.
This vulnerability is tracked as CVE-2026-28794. The attack can be launched remotely. No exploit exists.
The affected component should be upgraded.
A vulnerability identified as critical has been detected in Talishar. This impacts an unknown function of the file ParseGamestate.php. Performing a manipulation of the argument gameName results in path traversal.
This vulnerability is identified as CVE-2026-28429. The attack can be initiated remotely. There is not any exploit available.
It is suggested to install a patch to address this issue.
A vulnerability categorized as critical has been discovered in IceWhaleTech ZimaOS 1.5.2-beta3. This affects an unknown function of the component Application Interface. Such manipulation of the argument path leads to file inclusion.
This vulnerability is referenced as CVE-2026-28442. It is possible to launch the attack remotely. No exploit is available.
A vulnerability was found in filebrowser up to 2.60.x. It has been rated as problematic. The impacted element is an unknown function of the file http/public.go of the component withHashFile Middleware. This manipulation causes information disclosure.
The identification of this vulnerability is CVE-2026-28492. It is possible to initiate the attack remotely. There is no exploit available.
Upgrading the affected component is advised.
A vulnerability was found in MarkUsProject Markus up to 2.9.0. It has been declared as problematic. The affected element is an unknown function of the file courses//assignments//submissions/html_content. The manipulation results in cross site scripting.
This vulnerability was named CVE-2026-28405. The attack may be performed from remote. There is no available exploit.
It is recommended to upgrade the affected component.