A vulnerability was found in libssh and classified as problematic. The impacted element is an unknown function of the component SFTP Message Handler. Such manipulation of the argument SSH_FXP_NAME leads to null pointer dereference.
This vulnerability is referenced as CVE-2026-0968. It is possible to launch the attack remotely. No exploit is available.
A vulnerability marked as problematic has been reported in OWASP coreruleset up to 3.3.8/4.24.x. The impacted element is an unknown function of the component Whitespace Handler. Performing a manipulation results in improper handling of case sensitivity.
This vulnerability is identified as CVE-2026-33691. The attack can be initiated remotely. There is not any exploit available.
It is suggested to upgrade the affected component.
A vulnerability, which was classified as critical, was found in sagredo qmail up to 2026.04.06. Affected by this issue is the function tls_quit of the file qmail-remote.c. The manipulation results in os command injection.
This vulnerability is identified as CVE-2026-41113. The attack can be executed remotely. There is not any exploit available.
You should upgrade the affected component.
A vulnerability was found in Wavlink WL-WN579A3 220323. It has been classified as problematic. This affects the function sub_401F80 of the file /cgi-bin/login.cgi. This manipulation of the argument Hostname causes cross site scripting.
This vulnerability is registered as CVE-2026-6559. Remote exploitation of the attack is possible. No exploit is available.
Upgrading the affected component is recommended.
The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.
A vulnerability was found in H3C Magic B0 up to 100R002. It has been declared as critical. This vulnerability affects the function Edit_BasicSSID of the file /goform/aspForm. Such manipulation of the argument param leads to buffer overflow.
This vulnerability is documented as CVE-2026-6560. The attack can be executed remotely. Additionally, an exploit exists.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability was found in turn2honey EMC Plugin up to 4.4 on WordPress. It has been classified as problematic. Impacted is the function calendly. Performing a manipulation results in cross site scripting.
This vulnerability is cataloged as CVE-2026-0868. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability was found in EyouCMS up to 1.7.1. It has been rated as critical. This issue affects the function edit_adminlogo of the file application/admin/controller/Index.php. Performing a manipulation of the argument filename results in unrestricted upload.
This vulnerability is reported as CVE-2026-6561. The attack is possible to be carried out remotely. Moreover, an exploit is present.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability categorized as critical has been discovered in dameng100 muucmf 1.9.5.20260309. Impacted is the function getListByPage of the file /index/Search/index.html. Executing a manipulation of the argument keyword can lead to sql injection.
This vulnerability appears as CVE-2026-6562. The attack may be performed from remote. In addition, an exploit is available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability identified as critical has been detected in H3C Magic B1 up to 100R004. The affected element is the function SetAPWifiorLedInfoById of the file /goform/aspForm. The manipulation of the argument param leads to buffer overflow.
This vulnerability is traded as CVE-2026-6563. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability labeled as critical has been found in EMQ EMQX Enterprise up to 6.1.0. The impacted element is an unknown function of the component Session Handling. The manipulation results in improper authorization.
This vulnerability is known as CVE-2026-6564. It is possible to launch the attack remotely. Furthermore, an exploit is available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability marked as critical has been reported in kodcloud KodExplorer up to 4.52. This affects the function share.class.php::initShareOld of the file /app/controller/share.class.php of the component Public Share Handler. This manipulation of the argument path causes path traversal.
This vulnerability is handled as CVE-2026-6568. The attack can be initiated remotely. Additionally, an exploit exists.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability described as critical has been identified in kodcloud KodExplorer up to 4.52. This impacts the function fileGet of the file /app/controller/share.class.php of the component fileGet Endpoint. Such manipulation of the argument fileUrl leads to improper authentication.
This vulnerability is uniquely identified as CVE-2026-6569. The attack can be launched remotely. No exploit exists.
The vendor was contacted early about this disclosure but did not respond in any way.