A vulnerability categorized as problematic has been discovered in samclarke SCEditor up to 3.2.0. This affects the function sceditor.create of the component Configuration Handler. Such manipulation leads to cross site scripting.
This vulnerability is documented as CVE-2026-25581. The attack can be executed remotely. There is not any exploit available.
It is advisable to upgrade the affected component.
A vulnerability identified as critical has been detected in UTT 进取 520W 1.7.7-180627. This vulnerability affects the function strcpy of the file /goform/formTimeGroupConfig. The manipulation of the argument year1 leads to buffer overflow.
This vulnerability is listed as CVE-2026-2067. The attack may be initiated remotely. In addition, an exploit is available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability, which was classified as critical, was found in pydantic pydantic-ai up to 1.55.x. The impacted element is an unknown function. Such manipulation leads to server-side request forgery.
This vulnerability is referenced as CVE-2026-25580. It is possible to launch the attack remotely. No exploit is available.
You should upgrade the affected component.
A vulnerability has been found in payloadcms payload up to 3.73.x and classified as critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to authorization bypass.
This vulnerability is referenced as CVE-2026-25574. Remote exploitation of the attack is possible. No exploit is available.
The affected component should be upgraded.
A vulnerability was found in payloadcms payload up to 3.72.x and classified as critical. Affected by this issue is some unknown functionality. The manipulation results in sql injection.
This vulnerability is identified as CVE-2026-25544. The attack can be executed remotely. There is not any exploit available.
It is suggested to upgrade the affected component.
A vulnerability was found in Qdrant up to 1.15.x. It has been classified as problematic. Affected is an unknown function of the file /logger. The manipulation of the argument on_disk.log_file leads to file inclusion.
This vulnerability is listed as CVE-2026-25628. The attack may be initiated remotely. There is no available exploit.
Upgrading the affected component is recommended.
A vulnerability, which was classified as critical, has been found in zauberzeug NiceGUI up to 3.6.x. This impacts an unknown function. Performing a manipulation results in path traversal.
This vulnerability was named CVE-2026-25732. The attack may be initiated remotely. There is no available exploit.
It is advisable to upgrade the affected component.
A vulnerability classified as critical was found in TP-Link Archer BE230 1.2.4. The affected element is an unknown function of the component VPN Server Configuration Module. Executing a manipulation can lead to os command injection.
This vulnerability is handled as CVE-2026-22226. The attack can only be done within the local network. There is not any exploit available.
Upgrading the affected component is advised.
A vulnerability was found in TP-Link Archer BE230 1.2.4. It has been rated as critical. This affects an unknown part. The manipulation leads to os command injection.
This vulnerability is listed as CVE-2026-22222. The attack must be carried out from within the local network. There is no available exploit.
Upgrading the affected component is advised.
A vulnerability was found in TP-Link Archer BE230 1.2.4. It has been classified as critical. Affected by this vulnerability is an unknown functionality. Performing a manipulation results in os command injection.
This vulnerability is identified as CVE-2026-0631. The attack can only be performed from the local network. There is not any exploit available.
Upgrading the affected component is recommended.
A vulnerability was found in TP-Link Archer BE230 1.2.4. It has been declared as critical. Affected by this issue is some unknown functionality. Executing a manipulation can lead to os command injection.
This vulnerability is tracked as CVE-2026-22221. The attack is only possible within the local network. No exploit exists.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in TP-Link Archer BE230 1.2.4. The impacted element is an unknown function of the component Configuration Backup Handler. The manipulation leads to os command injection.
This vulnerability is uniquely identified as CVE-2026-22227. The attack can only be initiated within the local network. No exploit exists.
It is advisable to upgrade the affected component.
A vulnerability categorized as critical has been discovered in TP-Link Archer BE230 1.2.4. This vulnerability affects unknown code. The manipulation results in os command injection.
This vulnerability is cataloged as CVE-2026-22223. The attack must originate from the local network. There is no exploit available.
It is advisable to upgrade the affected component.