A vulnerability identified as critical has been detected in D-Link DIR-822 A_101. The impacted element is the function system of the file /udhcpcd/dhcpd.c of the component udhcpd DHCP Service. This manipulation of the argument Hostname causes command injection. This vulnerability only affects products that are no longer supported by the maintainer.
This vulnerability is handled as CVE-2026-7067. The attack can be initiated remotely. Additionally, an exploit exists.
A vulnerability categorized as critical has been discovered in choieastsea simple-openstack-mcp up to 767b2f4a8154cca344344b9725537a58399e6036. The affected element is the function exec_openstack of the file server.py. The manipulation results in os command injection.
This vulnerability is known as CVE-2026-7066. It is possible to launch the attack remotely. Furthermore, an exploit is available.
This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available.
The project was informed of the problem early through an issue report but has not responded yet.
A vulnerability was found in BidingCC BuildingAI up to 26.0.1. It has been rated as critical. Impacted is the function uploadRemoteFile of the file packages/core/src/modules/upload/services/file-storage.service.ts of the component Remote Upload API. The manipulation of the argument url leads to server-side request forgery.
This vulnerability is traded as CVE-2026-7065. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
The project was informed of the problem early through an issue report but has not responded yet.
A vulnerability was found in AgentDeskAI browser-tools-mcp up to 1.2.0. It has been declared as critical. This issue affects some unknown processing of the file browser-tools-server/browser-connector.ts. Executing a manipulation can lead to os command injection.
This vulnerability appears as CVE-2026-7064. The attack may be performed from remote. In addition, an exploit is available.
The project was informed of the problem early through an issue report but has not responded yet.
A vulnerability was found in code-projects Employee Management System 1.0. It has been classified as critical. This vulnerability affects unknown code of the file /370project/process/eprocess.php of the component Endpoint. Performing a manipulation of the argument pwd results in sql injection.
This vulnerability is reported as CVE-2026-7063. The attack is possible to be carried out remotely. Moreover, an exploit is present.
A vulnerability was found in Intina47 context-sync up to 2.0.0 and classified as critical. This affects an unknown part of the file src/git-integration.ts of the component Git Integration. Such manipulation leads to os command injection.
This vulnerability is documented as CVE-2026-7062. The attack can be executed remotely. Additionally, an exploit exists.
A vulnerability has been found in Toowiredd chatgpt-mcp-server up to 0.1.0 and classified as critical. Affected by this issue is some unknown functionality of the file src/services/docker.service.ts of the component MCP/HTTP. This manipulation causes os command injection.
This vulnerability is registered as CVE-2026-7061. Remote exploitation of the attack is possible. Furthermore, an exploit is available.
The project was informed of the problem early through an issue report but has not responded yet.
A vulnerability, which was classified as problematic, was found in Hickory Project Hickory DNS up to 0.25. Affected by this vulnerability is an unknown functionality of the component Cached Data Handler. The manipulation results in incorrectly-resolved name.
This vulnerability is cataloged as CVE-2026-42254. The attack may be launched remotely. There is no exploit available.
You should upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Technitium DnsServer up to 14.x. Affected is an unknown function of the component Cyclic Name Server Delegation. The manipulation leads to incorrect provision of specified functionality.
This vulnerability is listed as CVE-2026-42255. The attack may be initiated remotely. There is no available exploit.
It is advisable to upgrade the affected component.