A vulnerability classified as critical was found in PhialsBasement nmap-mcp-server up to bee6d23547d57ae02460022f7c78ac0893092e38. Affected by this issue is the function child_process.exec of the file src/index.ts of the component Nmap CLI Command Handler. The manipulation results in command injection.
This vulnerability was named CVE-2026-3484. The attack may be performed from remote. There is no available exploit.
This product utilizes a rolling release system for continuous delivery, and as such, version information for affected or updated releases is not disclosed. It is best practice to apply a patch to resolve this issue.
A vulnerability categorized as critical has been discovered in Google Cloud up to 0.x/25. This impacts an unknown function. Such manipulation leads to incorrect authorization.
This vulnerability is documented as CVE-2026-3136. The attack can be executed remotely. There is not any exploit available.
It is advisable to upgrade the affected component.
A vulnerability was found in Portwell Engineering Toolkits 4.8.2. It has been classified as critical. Affected by this issue is some unknown functionality of the component Driver. Performing a manipulation results in memory corruption.
This vulnerability is identified as CVE-2026-3437. The attack is only possible with local access. There is not any exploit available.
A vulnerability marked as problematic has been reported in IBM InfoSphere Information Server up to 11.7.1.6. This affects an unknown part. This manipulation causes xml external entity reference.
This vulnerability is registered as CVE-2026-1567. Remote exploitation of the attack is possible. No exploit is available.
It is suggested to upgrade the affected component.
A vulnerability was found in IBM MQ up to 9.4.4.1 CD. It has been rated as problematic. Affected by this issue is some unknown functionality. The manipulation leads to authentication bypass by primary weakness.
This vulnerability is referenced as CVE-2026-1713. The attack can only be performed from a local environment. No exploit is available.
Upgrading the affected component is advised.
A vulnerability labeled as problematic has been found in IBM Aspera faspio Gateway up to 11.7.1.6. This issue affects some unknown processing. Such manipulation leads to risky cryptographic algorithm.
This vulnerability is listed as CVE-2025-14480. The attack must be carried out locally. There is no available exploit.
The affected component should be upgraded.
A vulnerability was found in IBM DataStage on Cloud Pak for Data up to 5.3.0. It has been declared as critical. This affects an unknown function. Such manipulation leads to os command injection.
This vulnerability is referenced as CVE-2025-13688. It is possible to launch the attack remotely. No exploit is available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in D-Link DIR-513 1.10. This affects an unknown part of the file /goform/formSetQoS. Executing a manipulation of the argument curTime can lead to stack-based buffer overflow.
This vulnerability appears as CVE-2025-70234. The attack may be performed from remote. There is no available exploit.
A vulnerability was found in D-Link DIR-513 1.10 and classified as critical. This issue affects some unknown processing of the file /goform/formSetWAN_Wizard55. The manipulation of the argument curTime results in stack-based buffer overflow.
This vulnerability is known as CVE-2025-70239. It is possible to launch the attack remotely. No exploit is available.
A vulnerability has been found in D-Link DIR-513 1.10 and classified as critical. This vulnerability affects the function formSetWAN_Wizard51 of the file /goform/formSetWAN_Wizard51. The manipulation of the argument curTime leads to stack-based buffer overflow.
This vulnerability is traded as CVE-2025-70240. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability was found in SourceCodester Logistic Hub Parcels Management System 1.0. It has been classified as critical. This impacts an unknown function of the file /manage_carrier.php. This manipulation causes sql injection.
This vulnerability is tracked as CVE-2026-26892. The attack is possible to be carried out remotely. No exploit exists.
A vulnerability classified as critical has been found in Tenda AC15 15.03.05.18_multi. Affected by this vulnerability is an unknown functionality of the file /goform/formSetMacFilterCfg. The manipulation leads to buffer overflow.
This vulnerability is uniquely identified as CVE-2026-24103. The attack is possible to be carried out remotely. No exploit exists.
A vulnerability described as critical has been identified in renren-secuity up to 5.4.x. Affected is an unknown function of the file BaseServiceImpl.java. Executing a manipulation can lead to sql injection.
This vulnerability is handled as CVE-2025-70821. The attack can be executed remotely. There is not any exploit available.
Upgrading the affected component is recommended.
Currently trending CVE - Hype Score: 2 - An Insecure Direct Object Reference (IDOR) vulnerability exists in Serv-U, which when exploited, gives a malicious actor the ability to execute native code as a privileged account.
This issue requires administrative privileges to abuse. On Windows deployments, the risk is ...
Committee Democrats criticized the KIDS Act for including a weak knowledge standard that they said allows tech companies to escape accountability for online safety harms by claiming they are unaware kids are using their platforms and deserve protections.
A vulnerability was found in Mobility46. It has been classified as critical. This impacts an unknown function of the component WebSocket Endpoint. This manipulation causes missing authentication.
This vulnerability is registered as CVE-2026-27028. Remote exploitation of the attack is possible. No exploit is available.
A vulnerability was found in Mobility46. It has been declared as critical. This affects an unknown part. Executing a manipulation can lead to session expiration.
This vulnerability is registered as CVE-2026-27647. It is possible to launch the attack remotely. No exploit is available.
A vulnerability classified as problematic has been found in Dataease SQLBot up to 1.5.1. This impacts the function validateEmbedded of the file backend/apps/system/middleware/auth.py of the component JWT Token Handler. Performing a manipulation results in improper verification of cryptographic signature.
This vulnerability is identified as CVE-2025-15598. The attack can be initiated remotely. Additionally, an exploit exists.
A comment in the source code warns users about using this feature. The vendor was contacted early about this disclosure.