A vulnerability has been found in itsourcecode Cafe Reservation System 1.0 and classified as critical. This impacts an unknown function of the file /curvus2/signup.php of the component Registration. Performing a manipulation of the argument Username results in sql injection.
This vulnerability is known as CVE-2026-4014. Remote exploitation of the attack is possible. Furthermore, an exploit is available.
A vulnerability, which was classified as critical, was found in SourceCodester Web-based Pharmacy Product Management System 1.0. This affects an unknown function of the file add_admin.php. Such manipulation leads to improper authorization.
This vulnerability is traded as CVE-2026-4013. The attack may be launched remotely. There is no exploit available.
A vulnerability, which was classified as problematic, has been found in rxi fe up to ed4cda96bd582cbb08520964ba627efb40f3dd91. The impacted element is the function read_ of the file src/fe.c. This manipulation with the input 1 causes out-of-bounds read.
This vulnerability appears as CVE-2026-4012. The attack requires local access. In addition, an exploit is available.
This product uses a rolling release model to deliver continuous updates. As a result, specific version information for affected or updated releases is not available.
The project was informed of the problem early through an issue report but has not responded yet.
A vulnerability classified as problematic was found in ThakeeNathees pocketlang up to cc73ca61b113d48ee130d837a7a8b145e41de5ce. The affected element is the function pkByteBufferAddString. The manipulation of the argument length with the input 4294967290 results in memory corruption.
This vulnerability is reported as CVE-2026-4010. The attack requires a local approach. Moreover, an exploit is present.
This product does not use versioning. This is why information about affected and unaffected releases are unavailable.
The project was informed of the problem early through an issue report but has not responded yet.
A vulnerability classified as problematic has been found in jarikomppa soloud up to 20200207. Impacted is the function drwav_read_pcm_frames_s16__msadpcm in the library src/audiosource/wav/dr_wav.h of the component WAV File Parser. The manipulation leads to out-of-bounds read.
This vulnerability is documented as CVE-2026-4009. The attack needs to be performed locally. Additionally, an exploit exists.
It is recommended to upgrade the affected component.
The project was informed of the problem early through an issue report but has not responded yet.
A vulnerability described as critical has been identified in Tenda W3 1.0.0.3(2204). This issue affects some unknown processing of the file /goform/wifiSSIDset of the component POST Parameter Handler. Executing a manipulation of the argument index/GO can lead to stack-based buffer overflow.
This vulnerability is registered as CVE-2026-4008. It is possible to launch the attack remotely. Furthermore, an exploit is available.
A vulnerability marked as critical has been reported in Tenda W3 1.0.0.3(2204). This vulnerability affects unknown code of the file /goform/wifiSSIDget of the component POST Parameter Handler. Performing a manipulation of the argument index results in stack-based buffer overflow.
This vulnerability is cataloged as CVE-2026-4007. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
BeatBanker Android malware spreads through fake Starlink apps on websites imitating Google Play Store, hijacking devices, stealing credentials, and mining crypto. A new Android malware called BeatBanker spreads through fake Starlink apps distributed on websites posing as the Google Play Store. Once installed, it hijacks devices, steals login credentials, tampers with cryptocurrency transactions, and secretly […]
A vulnerability labeled as problematic has been found in streetwriters notesnook up to 3.3.8. This affects the function tweetToEmbed. Such manipulation leads to cross site scripting.
This vulnerability is listed as CVE-2026-31876. The attack may be performed from remote. There is no available exploit.
The affected component should be upgraded.
A vulnerability identified as problematic has been detected in parse-community parse-server up to 8.6.29. Affected by this issue is some unknown functionality of the component XHTML File Parser. This manipulation causes HTML injection.
This vulnerability is tracked as CVE-2026-31868. The attack is possible to be carried out remotely. No exploit exists.
You should upgrade the affected component.