A vulnerability classified as critical was found in xygeni xygeni-action. Affected by this issue is some unknown functionality. Executing a manipulation can lead to embedded malicious code.
This vulnerability is registered as CVE-2026-31976. It is possible to launch the attack remotely. No exploit is available.
A vulnerability classified as critical has been found in unitycatalog Unity Catalog up to 0.4.0. Affected by this vulnerability is an unknown functionality of the file /api/1.0/unity-control/auth/tokens of the component Endpoint. Performing a manipulation results in authentication bypass by spoofing.
This vulnerability is cataloged as CVE-2026-27478. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability described as critical has been identified in opf openproject up to 17.1.x. Affected is an unknown function of the file /admin/settings/mail_notifications. Such manipulation leads to server-side request forgery.
This vulnerability is listed as CVE-2026-31974. The attack may be performed from remote. There is no available exploit.
Upgrading the affected component is recommended.
A vulnerability marked as critical has been reported in RIOT-OS RIOT up to 2026.01. This impacts the function well_known_core. This manipulation causes out-of-bounds write.
This vulnerability is tracked as CVE-2026-27703. The attack is possible to be carried out remotely. No exploit exists.
It is suggested to upgrade the affected component.
A vulnerability labeled as critical has been found in himmelblau-idm himmelblau up to 2.3.7/3.0.x. This affects an unknown function of the file /tmp/krb5cc_. The manipulation results in link following.
This vulnerability is identified as CVE-2026-31979. The attack is only possible with local access. There is not any exploit available.
The affected component should be upgraded.
A vulnerability identified as problematic has been detected in Emlog up to 2.6.6. The impacted element is the function LoginAuth::checkToken. The manipulation leads to cross-site request forgery.
This vulnerability is referenced as CVE-2026-31954. Remote exploitation of the attack is possible. No exploit is available.
A vulnerability categorized as critical has been discovered in Dell Alienware Command Center up to 6.12.24.0. The affected element is an unknown function. Executing a manipulation can lead to improper certificate validation.
The identification of this vulnerability is CVE-2026-24508. The attack can only be executed locally. There is no exploit available.
It is advisable to upgrade the affected component.
A vulnerability was found in Dell Alienware Command Center up to 6.12.24.0. It has been rated as critical. Impacted is an unknown function. Performing a manipulation results in improper privilege management.
This vulnerability was named CVE-2026-24510. The attack needs to be approached locally. There is no available exploit.
Upgrading the affected component is advised.
A vulnerability was found in Shopware up to 6.6.10.15/6.7.8.1. It has been declared as critical. This issue affects some unknown processing. Such manipulation leads to authentication bypass by spoofing.
This vulnerability is uniquely identified as CVE-2026-31889. The attack can be launched remotely. No exploit exists.
It is recommended to upgrade the affected component.
A vulnerability was found in anchore quill up to 0.7.0. It has been classified as problematic. This vulnerability affects unknown code. This manipulation causes allocation of resources.
This vulnerability is handled as CVE-2026-31961. It is possible to launch the attack on the local host. There is not any exploit available.
Upgrading the affected component is recommended.
A vulnerability was found in parse-community parse-server up to 8.6.33/9.0.0 9.6.0-alpha.7 and classified as problematic. This affects an unknown part of the component Email Verification Endpoint. The manipulation results in observable response discrepancy.
This vulnerability is known as CVE-2026-31901. It is possible to launch the attack remotely. No exploit is available.
It is suggested to upgrade the affected component.
A vulnerability has been found in LabRedesCefetRJ WeGIA up to 3.6.5 and classified as critical. Affected by this issue is some unknown functionality of the file remover_produto_ocultar.php. The manipulation leads to sql injection.
This vulnerability is traded as CVE-2026-31896. It is possible to initiate the attack remotely. There is no exploit available.
The affected component should be upgraded.
A vulnerability, which was classified as critical, was found in anchore quill up to 0.7.0. Affected by this vulnerability is an unknown functionality of the component API. Executing a manipulation can lead to server-side request forgery.
This vulnerability appears as CVE-2026-31959. The attacker needs to be present on the local network. There is no available exploit.
You should upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in tornadoweb tornado up to 6.5.4. Affected is an unknown function. Performing a manipulation results in resource consumption.
This vulnerability is reported as CVE-2026-31958. The attack is possible to be carried out remotely. No exploit exists.
It is advisable to upgrade the affected component.
A vulnerability classified as critical was found in psf black up to 26.2.x. This impacts an unknown function. Such manipulation leads to improper input validation.
This vulnerability is documented as CVE-2026-31900. The attack can be executed remotely. There is not any exploit available.
Upgrading the affected component is advised.
A vulnerability classified as critical has been found in LabRedesCefetRJ WeGIA up to 3.6.5. This affects an unknown function of the file html/matPat/restaurar_produto.php. This manipulation of the argument id_produto causes sql injection.
This vulnerability is registered as CVE-2026-31895. Remote exploitation of the attack is possible. No exploit is available.
It is recommended to upgrade the affected component.
A vulnerability described as critical has been identified in LabRedesCefetRJ WeGIA up to 3.6.5. The impacted element is the function loadBackupDB of the component SQL File Parser. The manipulation results in link following.
This vulnerability is cataloged as CVE-2026-31894. The attack may be launched remotely. There is no exploit available.
Upgrading the affected component is recommended.