A vulnerability, which was classified as critical, has been found in D-Link DIR-868L 110b03. This affects the function sub_1BF84 of the component SSDP Service. This manipulation of the argument ST causes os command injection. This vulnerability only affects products that are no longer supported by the maintainer.
The identification of this vulnerability is CVE-2026-3485. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
A vulnerability classified as critical was found in PhialsBasement nmap-mcp-server up to bee6d23547d57ae02460022f7c78ac0893092e38. Affected by this issue is the function child_process.exec of the file src/index.ts of the component Nmap CLI Command Handler. The manipulation results in command injection.
This vulnerability was named CVE-2026-3484. The attack may be performed from remote. There is no available exploit.
This product utilizes a rolling release system for continuous delivery, and as such, version information for affected or updated releases is not disclosed. It is best practice to apply a patch to resolve this issue.
The Global Coalition on Telecoms (GCOT) — comprising the United Kingdom, United States, Canada, Japan and Australia, with Sweden and Finland joining at the launch — unveiled voluntary security and resilience principles for the technology at the Mobile World Congress trade show in Barcelona.
A vulnerability classified as critical has been found in Tenda AC15 15.03.05.18_multi. Affected by this vulnerability is an unknown functionality of the file /goform/formSetMacFilterCfg. The manipulation leads to buffer overflow.
This vulnerability is uniquely identified as CVE-2026-24103. The attack is possible to be carried out remotely. No exploit exists.
A vulnerability described as critical has been identified in renren-secuity up to 5.4.x. Affected is an unknown function of the file BaseServiceImpl.java. Executing a manipulation can lead to sql injection.
This vulnerability is handled as CVE-2025-70821. The attack can be executed remotely. There is not any exploit available.
Upgrading the affected component is recommended.
A vulnerability marked as critical has been reported in Step-Video-T2V. This impacts the function get_data of the file /vae-api. Performing a manipulation results in deserialization.
This vulnerability is known as CVE-2025-57622. Remote exploitation of the attack is possible. No exploit is available.
A vulnerability labeled as critical has been found in iBoysoft NTFS 8.0.0 on macOS. This affects an unknown function of the component NSConnection Service. Such manipulation leads to incorrect permission assignment.
This vulnerability is traded as CVE-2026-2637. An attack has to be approached locally. There is no exploit available.
A vulnerability identified as problematic has been detected in Biosig libbiosig 3.9.2. The impacted element is an unknown function of the component ABF Parser. This manipulation causes out-of-bounds read.
This vulnerability appears as CVE-2025-64736. The attack may be initiated remotely. There is no available exploit.
A vulnerability categorized as critical has been discovered in Volcengine OpenViking up to 0.2.1. The affected element is an unknown function. The manipulation results in path traversal.
This vulnerability is reported as CVE-2026-28518. The attack can be launched remotely. No exploit exists.
Applying a patch is advised to resolve this issue.
A vulnerability was found in djangoproject Django up to 4.2.28/5.2.11/6.0.2. It has been rated as problematic. Impacted is an unknown function of the component File-System Backend. The manipulation leads to race condition.
This vulnerability is documented as CVE-2026-25674. The attack can be initiated remotely. There is not any exploit available.
Upgrading the affected component is advised.
A vulnerability was found in Biosig libbiosig 3.9.2. It has been declared as critical. This issue affects some unknown processing of the component Intan CLP Parser. Executing a manipulation can lead to heap-based buffer overflow.
This vulnerability is registered as CVE-2026-22891. It is possible to launch the attack remotely. No exploit is available.
A vulnerability was found in Biosig libbiosig 3.9.2. It has been classified as critical. This vulnerability affects unknown code of the component Nicolet WFT Parser. Performing a manipulation results in heap-based buffer overflow.
This vulnerability is cataloged as CVE-2026-20777. It is possible to initiate the attack remotely. There is no exploit available.