A vulnerability was found in Apache HTTP Server up to 2.4.66. It has been declared as critical. Affected by this vulnerability is an unknown functionality. The manipulation results in buffer over-read.
This vulnerability is cataloged as CVE-2026-34059. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability categorized as critical has been discovered in TRENDnet TEW-713RE up to 1.02. The affected element is the function sub_421494 of the file /goform/addRouting. Executing a manipulation of the argument dest can lead to command injection.
This vulnerability is registered as CVE-2026-5183. It is possible to launch the attack remotely. Furthermore, an exploit is available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability identified as critical has been detected in TRENDnet TEW-713RE up to 1.02. The impacted element is an unknown function of the file /goform/setSysAdm. The manipulation of the argument admuser leads to command injection.
This vulnerability is documented as CVE-2026-5184. The attack can be initiated remotely. Additionally, an exploit exists.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability was found in libp2p-gossipsub. It has been declared as problematic. This affects an unknown part. Such manipulation leads to denial of service.
This vulnerability is referenced as CVE-2026-34219. It is possible to launch the attack remotely. No exploit is available.
It is recommended to upgrade the affected component.
A vulnerability marked as problematic has been reported in Nothings stb up to 1.26. Impacted is the function stbtt_InitFont_internal in the library stb_truetype.h of the component TTF File Handler. Performing a manipulation results in out-of-bounds read.
This vulnerability is known as CVE-2026-5314. Remote exploitation of the attack is possible. Furthermore, an exploit is available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability classified as problematic was found in Nothings stb up to 1.22. This affects the function start_decoder of the file stb_vorbis.c. The manipulation results in out-of-bounds write.
This vulnerability was named CVE-2026-5317. The attack may be performed from remote. In addition, an exploit is available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability categorized as problematic has been discovered in NASA cFS up to 7.0.0. The impacted element is the function pickle.load of the component Pickle Module. Such manipulation leads to deserialization.
This vulnerability is documented as CVE-2026-5473. The attack needs to be performed locally. Additionally, an exploit exists.
The project was informed of the problem early through an issue report but has not responded yet.
A vulnerability identified as critical has been detected in NASA cFS up to 7.0.0. This affects the function CFE_MSG_GetSize of the file apps/to_lab/fsw/src/to_lab_passthru_encode.c of the component CCSDS Packet Header Handler. Performing a manipulation results in heap-based buffer overflow.
This vulnerability is reported as CVE-2026-5474. The attacker must have access to the local network to execute the attack. No exploit exists.
The project was informed of the problem early through an issue report but has not responded yet.
A vulnerability described as problematic has been identified in Nothings stb up to 1.26. The affected element is the function stbtt__buf_get8 in the library stb_truetype.h of the component TTF File Handler. Executing a manipulation can lead to out-of-bounds read.
This vulnerability is handled as CVE-2026-5315. The attack can be executed remotely. Additionally, an exploit exists.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability classified as problematic has been found in Nothings stb up to 1.22. The impacted element is the function setup_free of the file stb_vorbis.c. The manipulation leads to allocation of resources.
This vulnerability is uniquely identified as CVE-2026-5316. The attack is possible to be carried out remotely. Moreover, an exploit is present.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability was found in Lodash up to 4.17.x and classified as critical. Affected by this issue is the function Function of the component Parameter Handler. The manipulation of the argument options.imports results in code injection.
This vulnerability was named CVE-2026-4800. The attack may be performed from remote. There is no available exploit.
It is suggested to upgrade the affected component.
A vulnerability was found in gdk-pixbuf. It has been rated as critical. Affected by this issue is some unknown functionality of the component JPEG Image Loader. Performing a manipulation results in heap-based buffer overflow.
This vulnerability was named CVE-2026-5201. The attack may be initiated remotely. There is no available exploit.