A vulnerability marked as critical has been reported in SourceCodester Sales and Inventory System 1.0. This vulnerability affects unknown code of the file sales_invoice1.php of the component GET Parameter Handler. This manipulation of the argument sellid causes sql injection.
The identification of this vulnerability is CVE-2026-3793. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
A vulnerability labeled as critical has been found in SourceCodester Sales and Inventory System 1.0. This affects an unknown part of the file purchase_invoice.php of the component GET Parameter Handler. The manipulation of the argument purchaseid results in sql injection.
This vulnerability was named CVE-2026-3792. The attack may be performed from remote. In addition, an exploit is available.
A vulnerability identified as critical has been detected in SourceCodester Sales and Inventory System 1.0. Affected by this issue is some unknown functionality of the file dashboard.php of the component Search. The manipulation of the argument searchtxt leads to sql injection.
This vulnerability is uniquely identified as CVE-2026-3791. The attack is possible to be carried out remotely. Moreover, an exploit is present.
A vulnerability categorized as critical has been discovered in SourceCodester Sales and Inventory System 1.0. Affected by this vulnerability is an unknown functionality of the file check_supplier_details.php of the component POST Parameter Handler. Executing a manipulation of the argument stock_name1 can lead to sql injection.
This vulnerability is handled as CVE-2026-3790. The attack can be executed remotely. Additionally, an exploit exists.
A vulnerability was found in Bytedesk up to 1.3.9. It has been rated as critical. Affected is the function getModels of the file source-code/src/main/java/com/bytedesk/ai/springai/providers/gitee/SpringAIGiteeRestService.java of the component SpringAIGiteeRestController. Performing a manipulation of the argument apiUrl results in server-side request forgery.
This vulnerability is known as CVE-2026-3789. Remote exploitation of the attack is possible. Furthermore, an exploit is available.
Upgrading the affected component is advised.
A vulnerability was found in Bytedesk up to 1.3.9. It has been declared as critical. This impacts the function getModels of the file source-code/src/main/java/com/bytedesk/ai/springai/providers/openrouter/SpringAIOpenrouterRestService.java of the component SpringAIOpenrouterRestController. Such manipulation of the argument apiUrl leads to server-side request forgery.
This vulnerability is traded as CVE-2026-3788. The attack may be launched remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in UltraVNC 1.6.4.0 on Windows. It has been classified as problematic. This affects an unknown function in the library cryptbase.dll of the component Windows Service. This manipulation causes uncontrolled search path.
This vulnerability appears as CVE-2026-3787. The attack requires local access. In addition, an exploit is available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability was found in EasyCMS up to 1.6 and classified as critical. The impacted element is an unknown function of the file /RbacuserAction.class.php of the component Request Parameter Handler. The manipulation of the argument _order results in sql injection.
This vulnerability is reported as CVE-2026-3786. The attack can be launched remotely. Moreover, an exploit is present.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability has been found in EasyCMS up to 1.6 and classified as critical. The affected element is an unknown function of the file /RbacnodeAction.class.php of the component Request Parameter Handler. The manipulation of the argument _order leads to sql injection.
This vulnerability is documented as CVE-2026-3785. The attack can be initiated remotely. Additionally, an exploit exists.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability described as problematic has been identified in Authlib up to 1.6.6. The affected element is an unknown function of the component JWT Handler. The manipulation results in improper verification of cryptographic signature.
This vulnerability is known as CVE-2026-28802. It is possible to launch the attack remotely. No exploit is available.
Upgrading the affected component is recommended.