A vulnerability was found in rust-rpm-sequoia. It has been classified as problematic. Impacted is an unknown function of the component RPM File Signature Handler. This manipulation causes denial of service.
This vulnerability is handled as CVE-2026-2625. The attack can only be done within the local network. There is not any exploit available.
A vulnerability labeled as critical has been found in NASA cFS up to 7.0.0. This impacts the function CFE_SB_TransmitMsg of the file cfe_sb_priv.c of the component CCSDS Header Size Handler. Executing a manipulation can lead to memory corruption.
This vulnerability appears as CVE-2026-5475. The attacker needs to be present on the local network. There is no available exploit.
The project was informed of the problem early through an issue report but has not responded yet.
A vulnerability marked as critical has been reported in NASA cFS up to 7.0.0 on 32-bit. Affected is the function CFE_TBL_ValidateCodecLoadSize of the file cfe/modules/tbl/fsw/src/cfe_tbl_passthru_codec.c. The manipulation leads to integer overflow.
This vulnerability is traded as CVE-2026-5476. Access to the local network is required for this attack to succeed. There is no exploit available.
A fix is planned for the upcoming version milestone of the project.
A vulnerability classified as problematic has been found in nimiq core-rs-albatross up to 1.2.x. The impacted element is the function verify_macro_block_proposal of the component nimiq Proof-of-Stake Protocol Handler. Performing a manipulation results in insufficient verification of data authenticity.
This vulnerability was named CVE-2026-34061. The attack may be initiated remotely. There is no available exploit.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in nimiq core-rs-albatross up to 1.2.x. Affected is the function blockchain.history_store.history_index of the component nimiq Proof-of-Stake Protocol Handler. The manipulation results in unchecked return value.
This vulnerability is identified as CVE-2026-35468. The attack can be executed remotely. There is not any exploit available.
You should upgrade the affected component.
A vulnerability classified as critical was found in Tenda 4G03 Pro up to 1.0/1.1/04.03.01.53/192.168.0.1. Affected by this vulnerability is an unknown functionality of the file /bin/httpd. The manipulation results in improper access controls.
This vulnerability was named CVE-2026-5526. The attack may be performed from remote. In addition, an exploit is available.
Applying restrictive firewalling is recommended.
A vulnerability, which was classified as problematic, has been found in Tenda 4G03 Pro 1.0/1.0re/01.bin/04.03.01.53. Affected by this issue is some unknown functionality of the file /etc/www/pem/server.key of the component ECDSA P-256 Private Key Handler. This manipulation causes use of hard-coded cryptographic key
.
The identification of this vulnerability is CVE-2026-5527. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
It is advisable to implement restrictive firewalling.
A vulnerability identified as critical has been detected in FedML-AI FedML up to 0.8.9. This impacts an unknown function of the file FileUtils.java of the component MQTT Message Handler. Performing a manipulation of the argument dataSet results in path traversal.
This vulnerability is reported as CVE-2026-5535. The attack is possible to be carried out remotely. Moreover, an exploit is present.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability labeled as critical has been found in FedML-AI FedML up to 0.8.9. Affected is the function sendMessage of the file grpc_server.py of the component gRPC server. Executing a manipulation can lead to deserialization.
This vulnerability appears as CVE-2026-5536. The attack may be performed from remote. There is no available exploit.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability was found in Tenda AC10 16.03.10.10_multi_TDE01 and classified as critical. Affected is the function formAddMacfilterRule of the file /bin/httpd. Such manipulation leads to os command injection.
This vulnerability is referenced as CVE-2026-5547. It is possible to launch the attack remotely. No exploit is available.
Multiple endpoints might be affected.
A vulnerability was found in Tenda AC10 16.03.10.10_multi_TDE01. It has been classified as critical. Affected by this vulnerability is the function fromSysToolChangePwd of the file /bin/httpd. Performing a manipulation of the argument sys.userpass results in stack-based buffer overflow.
This vulnerability is identified as CVE-2026-5548. The attack can be initiated remotely. There is not any exploit available.
A vulnerability labeled as critical has been found in util-linux. This vulnerability affects unknown code of the component Hostname Canonicalization. Executing a manipulation can lead to improper access controls.
This vulnerability is tracked as CVE-2026-3184. The attack is only possible within the local network. No exploit exists.