A vulnerability was found in Apache OpenNLP up to 2.5.8/3.0.0-M2. It has been declared as problematic. This affects an unknown function of the component AbstractModelReader. The manipulation results in denial of service.
This vulnerability is identified as CVE-2026-42440. The attack can be executed remotely. There is not any exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Apache OpenNLP up to 2.5.8/3.0.0-M2. It has been classified as critical. The impacted element is the function ExtensionLoader of the component Model Manifest. The manipulation leads to privilege escalation.
This vulnerability is referenced as CVE-2026-42027. Remote exploitation of the attack is possible. No exploit is available.
Upgrading the affected component is recommended.
A vulnerability was found in Apache OpenNLP up to 2.5.8/3.0.0-M2 and classified as problematic. The affected element is the function DictionaryEntryPersistor of the component Dictionary Parser. Executing a manipulation can lead to xml external entity reference.
The identification of this vulnerability is CVE-2026-40682. The attack may be launched remotely. There is no exploit available.
It is suggested to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.18.21/6.19.11. It has been classified as critical. The impacted element is the function algif_aead of the component crypto. This manipulation causes incorrect resource transfer.
This vulnerability appears as CVE-2026-31431. The attack requires local access. In addition, an exploit is available. Due to its background and reception, this vulnerability has an historic impact.
Upgrading the affected component is recommended.
A vulnerability was found in OVN Open Virtual Network and classified as problematic. This impacts an unknown function of the component DHCPv6 Client ID Handler. The manipulation results in out-of-bounds read.
This vulnerability was named CVE-2026-5367. The attack needs to be approached within the local network. There is no available exploit.
It is suggested to upgrade the affected component.
A vulnerability was found in SonicWall SonicOS and classified as problematic. This impacts an unknown function of the component Management Interface. Such manipulation leads to weak authentication.
This vulnerability is uniquely identified as CVE-2026-0204. The attack can only be initiated within the local network. No exploit exists.
A vulnerability has been found in OVN Open Virtual Network and classified as problematic. This affects an unknown function of the component ICMP Error Response Generation. The manipulation leads to out-of-bounds read.
This vulnerability is uniquely identified as CVE-2026-5265. The attack is possible to be carried out remotely. No exploit exists.
The affected component should be upgraded.
A vulnerability categorized as critical has been discovered in libsndfile 1.2.2. Affected is an unknown function of the component WAV File Handler. Executing a manipulation can lead to buffer overflow.
This vulnerability is tracked as CVE-2026-37555. The attack can be launched remotely. No exploit exists.
It is advisable to implement a patch to correct this issue.
A vulnerability, which was classified as critical, was found in GNU wget2 up to 2.2.1. Impacted is an unknown function. The manipulation results in improper certificate validation.
This vulnerability is reported as CVE-2026-1858. The attack can be launched remotely. No exploit exists.
A vulnerability has been found in Oracle Linux 8/9/10 and classified as problematic. Impacted is the function Pbuild_file_symtab of the component ELF Handler. Performing a manipulation results in divide by zero.
This vulnerability was named CVE-2026-21996. The attack needs to be approached locally. There is no available exploit.
A vulnerability, which was classified as critical, was found in flipperdevices flipperzero-firmware ad2a80. This issue affects the function Main. Such manipulation leads to stack-based buffer overflow.
This vulnerability is uniquely identified as CVE-2026-30363. The attack can only be initiated within the local network. No exploit exists.
It is best practice to apply a patch to resolve this issue.
A vulnerability, which was classified as critical, has been found in Aver PTC320UV2 0.1.0000.65. This vulnerability affects unknown code of the component Web Management Interface. This manipulation causes command injection.
This vulnerability is handled as CVE-2026-26461. The attack can be initiated remotely. There is not any exploit available.
A vulnerability classified as problematic was found in Oracle Linux 8/9/10. This affects an unknown part of the component ELF Parser. The manipulation of the argument sh_link results in null pointer dereference.
This vulnerability is known as CVE-2026-35233. Attacking locally is a requirement. No exploit is available.
A vulnerability classified as critical has been found in PassMark PassMark BurnInTest, OSForensics and PerformanceTest. Affected by this issue is some unknown functionality in the library DirectIo64.sys of the component IOCTL Handler. The manipulation leads to improper input validation.
This vulnerability is traded as CVE-2025-52347. An attack has to be approached locally. There is no exploit available.
A vulnerability described as problematic has been identified in GSVoIP Web Panel 2.0.90. Affected by this vulnerability is an unknown functionality of the file /painel/gateways.php/error of the component URL Handler. Executing a manipulation of the argument msg can lead to cross site scripting.
This vulnerability appears as CVE-2025-69606. The attack may be performed from remote. There is no available exploit.
A vulnerability was found in AGL app-framework-binder up to 19.90.0. It has been rated as critical. This vulnerability affects the function on_supervision_call of the file src/afb-supervision.c. Performing a manipulation of the argument api/verb results in improper authorization.
This vulnerability is cataloged as CVE-2026-37525. The attack must be initiated from a local position. There is no exploit available.
A vulnerability categorized as critical has been discovered in AGL agl-service-can-low-level and but copies up to 17.1.12. This issue affects the function send_diagnostic_request of the file uds.c of the component Destination Handler. Executing a manipulation of the argument payload_length can lead to buffer overflow.
This vulnerability is registered as CVE-2026-37530. It is possible to launch the attack remotely. No exploit is available.
A vulnerability was found in AGL app-framework-binder up to 19.90.0. It has been rated as critical. The affected element is the function on_supervision_call of the file src/afb-supervision.c of the component API Call Handler. The manipulation leads to Local Privilege Escalation.
This vulnerability is listed as CVE-2026-37526. The attack must be carried out locally. There is no available exploit.
A vulnerability identified as critical has been detected in AGL agl-service-can-low-level. Impacted is the function send_diagnostic_request of the file uds.c of the component Destination Handler. The manipulation of the argument payload_length leads to buffer overflow.
This vulnerability is documented as CVE-2026-42485. The attack can be initiated remotely. There is not any exploit available.