A vulnerability was found in rickxy Hospital Management System up to 88a4290d957dc5bdde8a56e5ad451ad14f7f90f4 and classified as critical. Affected is an unknown function of the file /backend/admin/his_admin_account.php. The manipulation of the argument ad_dpic results in unrestricted upload.
This vulnerability is identified as CVE-2026-6602. The attack can be executed remotely. Additionally, an exploit exists.
This product implements a rolling release for ongoing delivery, which means version information for affected or updated releases is unavailable.
A vulnerability has been found in Lagom WHMCS Template up to 2.4.2 and classified as problematic. This impacts an unknown function of the component Datatables. The manipulation leads to resource consumption.
This vulnerability is referenced as CVE-2026-6601. Remote exploitation of the attack is possible. Furthermore, an exploit is available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability, which was classified as problematic, was found in langflow-ai langflow up to 1.8.3. This affects an unknown function of the file src/frontend/src/modals/IOModal/components/chatView/chatMessage/components/edit-message.tsx of the component Frontend React Component Rendering. Executing a manipulation can lead to cross site scripting.
The identification of this vulnerability is CVE-2026-6600. The attack may be launched remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability, which was classified as critical, has been found in langflow-ai langflow up to 1.8.3. The impacted element is the function get_client_ip/install_mcp_config of the file src/backend/base/langflow/api/v1/mcp_projects.py of the component Model Context Protocol Configuration API. Performing a manipulation of the argument X-Forwarded-For results in injection.
This vulnerability was named CVE-2026-6599. The attack may be initiated remotely. In addition, an exploit is available.
It is suggested to use restrictive firewalling.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability classified as problematic was found in langflow-ai langflow up to 1.8.3. The affected element is the function create_project/encrypt_auth_settings of the file src/backend/base/Langflow/api/v1/projects.py of the component Project Creation Endpoint. Such manipulation of the argument auth_settings leads to cleartext storage in a file or on disk.
This vulnerability is uniquely identified as CVE-2026-6598. The attack can be launched remotely. Moreover, an exploit is present.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability classified as problematic has been found in langflow-ai langflow up to 1.8.3. Impacted is the function remove_api_keys/has_api_terms of the file src/backend/base/langflow/api/utils/core.py of the component Flow Using API. This manipulation causes unprotected storage of credentials.
This vulnerability is handled as CVE-2026-6597. The attack can be initiated remotely. Additionally, an exploit exists.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability described as critical has been identified in langflow-ai langflow up to 1.1.0. This issue affects the function create_upload_file of the file src/backend/base/Langflow/api/v1/endpoints.py of the component API Endpoint. The manipulation results in unrestricted upload.
This vulnerability is known as CVE-2026-6596. It is possible to launch the attack remotely. Furthermore, an exploit is available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability was found in BSDI Gauntlet 5.0. It has been declared as critical. This affects an unknown function of the component Firewalling Handler. Executing a manipulation can lead to improper privilege management.
This vulnerability is tracked as CVE-1999-1047. The attack can be launched remotely. No exploit exists.
It is recommended to upgrade the affected component.
A vulnerability was found in Check Point Firewall-1 4.0. It has been rated as critical. This impacts an unknown function of the component LDAP Attribute Handler. The manipulation leads to improper privilege management.
This vulnerability is listed as CVE-1999-0895. The attack may be initiated remotely. There is no available exploit.
Upgrading the affected component is advised.
A vulnerability categorized as critical has been discovered in Microsoft Java Virtual Machine. Affected is an unknown function of the component Sandbox. The manipulation results in configuration.
This vulnerability is cataloged as CVE-1999-0766. The attack may be launched remotely. There is no exploit available.
It is advisable to upgrade the affected component.
A vulnerability labeled as critical has been found in Microsoft Virtual Machine 2000/3000. Affected by this issue is some unknown functionality of the component Java Sandbox. Such manipulation leads to improper privilege management.
This vulnerability is documented as CVE-2000-0327. The attack can be executed remotely. There is not any exploit available.
A patch should be applied to remediate this issue.