A vulnerability labeled as problematic has been found in Squirrel up to 3.2. This vulnerability affects the function sqstd_rex_newnode in the library sqstdlib/sqstdrex.cpp. Executing a manipulation can lead to null pointer dereference.
The identification of this vulnerability is CVE-2026-3389. The attack can only be executed locally. Furthermore, there is an exploit available.
The project was informed of the problem early through an issue report but has not responded yet.
A vulnerability identified as problematic has been detected in Squirrel up to 3.2. This affects the function SQCompiler::Factor/SQCompiler::UnaryOP of the file squirrel/sqcompiler.cpp. Performing a manipulation results in uncontrolled recursion.
This vulnerability was named CVE-2026-3388. The attack needs to be approached locally. In addition, an exploit is available.
The project was informed of the problem early through an issue report but has not responded yet.
A vulnerability categorized as problematic has been discovered in wren-lang wren up to 0.4.0. Affected by this issue is the function getByteCountForArguments of the file src/vm/wren_compiler.c. Such manipulation leads to null pointer dereference.
This vulnerability is uniquely identified as CVE-2026-3387. Local access is required to approach this attack. Moreover, an exploit is present.
The project was informed of the problem early through an issue report but has not responded yet.
A vulnerability was found in wren-lang wren up to 0.4.0. It has been rated as problematic. Affected by this vulnerability is the function emitOp of the file src/vm/wren_compiler.c. This manipulation causes out-of-bounds read.
This vulnerability is handled as CVE-2026-3386. It is possible to launch the attack on the local host. Additionally, an exploit exists.
The project was informed of the problem early through an issue report but has not responded yet.
A vulnerability was found in wren-lang wren up to 0.4.0. It has been declared as problematic. Affected is the function resolveLocal of the file src/vm/wren_compiler.c. The manipulation results in uncontrolled recursion.
This vulnerability is known as CVE-2026-3385. Attacking locally is a requirement. Furthermore, an exploit is available.
The project was informed of the problem early through an issue report but has not responded yet.
A vulnerability classified as critical was found in CPSD IT Services CryptoPro Secure Disk for BitLocker up to 7.6.5 /7.7.0. This affects an unknown part of the component Configuration File Handler. Executing a manipulation can lead to missing support for integrity check.
This vulnerability is handled as CVE-2025-10010. It is possible to launch the attack on the local host. There is not any exploit available.
Upgrading the affected component is advised.
A vulnerability, which was classified as critical, was found in bleon-ethical api-gateway-deploy 1.0.0. This issue affects some unknown processing. The manipulation results in os command injection.
This vulnerability was named CVE-2026-27208. The attack needs to be approached locally. There is no available exploit.
You should upgrade the affected component.
A vulnerability was found in WWBN AVideo up to 20.x and classified as problematic. The impacted element is an unknown function of the component Markdown Handler. Executing a manipulation can lead to cross site scripting.
This vulnerability is handled as CVE-2026-27568. The attack can be executed remotely. There is not any exploit available.
It is suggested to upgrade the affected component.
A vulnerability was found in FUXA up to 1.2.8. It has been classified as critical. This affects an unknown function of the file server/api/jwt-helper.js. The manipulation leads to improper authentication.
This vulnerability is uniquely identified as CVE-2025-69985. The attack is possible to be carried out remotely. No exploit exists.
A vulnerability was found in GCOM EPON 1GE C00R371V00B01. It has been declared as critical. This impacts an unknown function of the component Setting Handler. The manipulation results in improper access controls.
This vulnerability was named CVE-2025-63409. The attack may be performed from remote. There is no available exploit.
A vulnerability was found in Totolink X5000R 9.1.0cu.2415_B20250515. It has been rated as critical. Affected is an unknown function of the file /cgi-bin/cstecgi.cgi of the component Web Interface. This manipulation of the argument CONTENT_LENGTH causes memory corruption.
The identification of this vulnerability is CVE-2025-67445. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability, which was classified as critical, has been found in actualbudget actual up to 26.2.0. The impacted element is an unknown function. Performing a manipulation results in missing authentication.
This vulnerability is reported as CVE-2026-27584. The attack requires a local approach. No exploit exists.
It is advisable to upgrade the affected component.