A vulnerability described as critical has been identified in SiYuan up to 3.5.3. The affected element is an unknown function of the file /api/file/globalCopyFiles. Such manipulation leads to path traversal.
This vulnerability is traded as CVE-2026-23851. The attack may be launched remotely. There is no exploit available.
Upgrading the affected component is recommended.
A vulnerability classified as very critical has been found in D-Link D-View 8 up to 2.0.1.107. Affected is an unknown function of the component API Endpoint. This manipulation of the argument user_id causes authorization bypass.
This vulnerability is tracked as CVE-2026-23754. The attack is possible to be carried out remotely. No exploit exists.
A vulnerability classified as problematic was found in D-Link D-View 8 up to 2.0.1.107. Affected by this vulnerability is an unknown functionality in the library version.dll. Such manipulation leads to uncontrolled search path.
This vulnerability is listed as CVE-2026-23755. The attack must be carried out locally. There is no available exploit.
A vulnerability identified as critical has been detected in vLLM up to 0.13.x. This issue affects the function auto_map of the component Hugging Face. Performing a manipulation results in code injection.
This vulnerability is known as CVE-2026-22807. Remote exploitation of the attack is possible. No exploit is available.
You should upgrade the affected component.
A vulnerability was found in kpdecker jsdiff up to 4.0.3/5.2.1/8.0.2. It has been rated as problematic. This vulnerability affects the function parsePatch of the component Patch Handler. Performing a manipulation results in resource consumption.
This vulnerability is cataloged as CVE-2026-24001. It is possible to initiate the attack remotely. There is no exploit available.
Upgrading the affected component is advised.
A vulnerability categorized as critical has been discovered in Revive Adserver up to 6.0.4. This affects an unknown function of the component Setting Handler. Executing a manipulation can lead to format string.
This vulnerability is tracked as CVE-2026-21640. The attack can be launched remotely. No exploit exists.
Applying a patch is advised to resolve this issue.
A vulnerability described as problematic has been identified in Revive Adserver up to 6.0.4. The impacted element is an unknown function of the file tracker-delete.php. The manipulation of the argument clientid results in authorization bypass.
This vulnerability is cataloged as CVE-2026-21641. The attack may be launched remotely. There is no exploit available.
Upgrading the affected component is recommended.
A vulnerability labeled as critical has been found in SiYuan up to 3.5.3. The impacted element is an unknown function of the file /api/attr/setBlockAttrs of the component Dynamic Icon Feature. Such manipulation leads to code injection.
This vulnerability is documented as CVE-2026-23852. The attack can be executed remotely. There is not any exploit available.
The affected component should be upgraded.
A vulnerability categorized as critical has been discovered in 10-Strike Bandwidth Monitor 3.9. This affects an unknown part. The manipulation results in buffer overflow.
This vulnerability is cataloged as CVE-2020-37043. The attack must be initiated from a local position. Furthermore, there is an exploit available.
A vulnerability was found in Filigran OpenCTI 3.3.1 on Linux. It has been declared as problematic. The affected element is an unknown function of the file /graphql of the component GET Handler. Such manipulation leads to cross site scripting.
This vulnerability is referenced as CVE-2020-37044. It is possible to launch the attack remotely. Furthermore, an exploit is available.
A vulnerability was found in Adikiss Sistem Informasi Pengumuman Kelulusan Online up to 1.0. It has been declared as problematic. This affects an unknown function of the file tambahuser.php. Such manipulation leads to cross-site request forgery.
This vulnerability is listed as CVE-2020-37046. The attack may be performed from remote. In addition, an exploit is available.
A vulnerability labeled as critical has been found in M.J.M Soft Quick Player 1.3. This issue affects some unknown processing of the component File Handler. Such manipulation leads to buffer overflow.
This vulnerability is documented as CVE-2020-37050. The attack can be executed remotely. Additionally, an exploit exists.
A vulnerability marked as critical has been reported in Ubiquiti AirControl up to 1.4.2. Impacted is an unknown function of the file /.seam. Performing a manipulation results in code injection.
This vulnerability is reported as CVE-2020-37052. The attack is possible to be carried out remotely. Moreover, an exploit is present.
A vulnerability categorized as critical has been discovered in WinFrigate Frigate Professional up to 3.36.0.9. This affects an unknown function of the component Command Line. Executing a manipulation can lead to buffer overflow.
This vulnerability is tracked as CVE-2020-37049. The attack is restricted to local execution. Moreover, an exploit is present.
A vulnerability categorized as critical has been discovered in Crystal Shard http-protection up to 0.2.0. Impacted is an unknown function of the component Header Handler. Such manipulation of the argument X-Forwarded-For/X-Client-IP/X-Real-IP leads to authentication bypass by spoofing.
This vulnerability is listed as CVE-2020-37056. The attack may be performed from remote. In addition, an exploit is available.