A vulnerability described as problematic has been identified in actualbudget actual up to 26.2.0. This affects an unknown function of the file /sync/ of the component Sync API Endpoint. Executing a manipulation can lead to missing authorization.
This vulnerability is handled as CVE-2026-27638. It is possible to launch the attack on the local host. There is not any exploit available.
Upgrading the affected component is recommended.
A vulnerability has been found in seerr-team seerr up to 3.0.x and classified as critical. This vulnerability affects unknown code of the file /api/v1/auth/jellyfin. The manipulation leads to authentication bypass using alternate channel.
This vulnerability is uniquely identified as CVE-2026-27707. The attack is possible to be carried out remotely. No exploit exists.
The affected component should be upgraded.
A vulnerability was found in seerr-team seerr up to 3.0.x. It has been classified as problematic. Impacted is an unknown function of the file /api/v1/user/. This manipulation causes authorization bypass.
The identification of this vulnerability is CVE-2026-27793. It is possible to initiate the attack remotely. There is no exploit available.
Upgrading the affected component is recommended.
A vulnerability labeled as critical has been found in seerr-team seerr up to 3.0.x. Affected is the function isOwnProfileOrAdmin of the component Application Starting. The manipulation results in missing authorization.
This vulnerability is cataloged as CVE-2026-27792. The attack may be launched remotely. There is no exploit available.
The affected component should be upgraded.
A vulnerability described as critical has been identified in Intermesh groupoffice up to 6.8.152/25.0.86/26.0.7. This impacts an unknown function of the file index.php?r=email/template/emailSelection of the component Endpoint. The manipulation of the argument advancedQueryData results in sql injection.
This vulnerability is reported as CVE-2026-27832. The attack can be launched remotely. No exploit exists.
Upgrading the affected component is recommended.
A vulnerability was found in Intermesh groupoffice up to 6.8.153/25.0.86/26.0.8 and classified as critical. This issue affects some unknown processing. The manipulation results in argument injection.
This vulnerability was named CVE-2026-27947. The attack may be performed from remote. There is no available exploit.
It is suggested to upgrade the affected component.
A vulnerability marked as problematic has been reported in kovidgoyal calibre up to 9.3.x. Affected by this vulnerability is an unknown functionality of the component Proxy Configuration Handler. This manipulation of the argument remote_addr/X-Forwarded-For causes improper restriction of excessive authentication attempts.
This vulnerability is registered as CVE-2026-27824. Remote exploitation of the attack is possible. No exploit is available.
It is suggested to upgrade the affected component.
A vulnerability was found in Hivex and classified as critical. Affected by this vulnerability is the function _get_children of the component Windows Registry File Handler. Executing a manipulation can lead to stack-based buffer overflow.
This vulnerability is handled as CVE-2021-3622. The attack can only be done within the local network. There is not any exploit available.
It is best practice to apply a patch to resolve this issue.
A vulnerability was found in ImageMagick up to 6.9.13-39/7.1.2-14. It has been classified as problematic. This vulnerability affects unknown code of the component MSL Interpreter. The manipulation leads to null pointer dereference.
This vulnerability is documented as CVE-2026-26983. The attack can be initiated remotely. There is not any exploit available.
Upgrading the affected component is recommended.
A vulnerability was found in ImageMagick up to 6.9.13-39/7.1.2-14. It has been rated as problematic. This affects an unknown function of the component Image Parser. Performing a manipulation results in divide by zero.
This vulnerability is reported as CVE-2026-25799. The attack is possible to be carried out remotely. No exploit exists.
Upgrading the affected component is advised.
A vulnerability was found in libvips up to 8.18.0 and classified as critical. This affects the function vips_foreign_load_csv_build of the file libvips/foreign/csvload.c. The manipulation results in heap-based buffer overflow.
This vulnerability is reported as CVE-2026-3147. The attack requires a local approach. Moreover, an exploit is present.
It is advisable to implement a patch to correct this issue.
A vulnerability marked as problematic has been reported in bytecodealliance wasmtime up to 24.0.5/36.0.5/40.0.3/41.0.3. This affects an unknown part. This manipulation causes resource consumption.
This vulnerability is handled as CVE-2026-27204. The attack can be initiated remotely. There is not any exploit available.
It is suggested to upgrade the affected component.
A vulnerability was found in GIMP. It has been classified as problematic. This affects an unknown part of the component PSD File Parser. This manipulation causes denial of service.
This vulnerability is handled as CVE-2026-2239. The attack can be initiated remotely. There is not any exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability identified as problematic has been detected in ImageMagick up to 6.9.13-39/7.1.2-14. This issue affects some unknown processing of the component Raw Image Format Handler. This manipulation causes out-of-bounds read.
This vulnerability is handled as CVE-2026-25576. The attack can be initiated remotely. There is not any exploit available.
You should upgrade the affected component.
A vulnerability has been found in caddyserver caddy up to 2.11.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /load of the component Admin API. This manipulation causes cross-site request forgery.
This vulnerability appears as CVE-2026-27589. The attack may be initiated remotely. There is no available exploit.
The affected component should be upgraded.
Currently trending CVE - Hype Score: 4 - Vulnerability in the Oracle Concurrent Processing product of Oracle E-Business Suite (component: BI Publisher Integration). Supported versions that are affected are 12.2.3-12.2.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to ...
A vulnerability identified as critical has been detected in henrygd beszel up to 0.18.3. Affected by this issue is the function PathEscape of the file /api/beszel/containers/logs of the component API Endpoint. This manipulation causes path traversal.
This vulnerability is tracked as CVE-2026-27734. The attack is possible to be carried out remotely. No exploit exists.
You should upgrade the affected component.
A vulnerability classified as problematic has been found in thorsten phpmyfaq up to 4.0.17. Affected is an unknown function of the file /api/webauthn/prepare of the component WebAuthn Prepare Endpoint. This manipulation causes missing authorization.
This vulnerability appears as CVE-2026-27836. The attack may be initiated remotely. There is no available exploit.
It is recommended to upgrade the affected component.
A vulnerability was found in Indico up to 3.3.10. It has been classified as critical. This affects an unknown function of the component API Endpoint. Performing a manipulation results in missing authentication.
This vulnerability was named CVE-2026-28352. The attack may be initiated remotely. There is no available exploit.
Upgrading the affected component is recommended.