Aggregator
CVE-2026-33160 | Craft CMS up to 4.17.7/5.9.13 Endpoint authorization
1 hour 33 minutes ago
A vulnerability identified as problematic has been detected in Craft CMS up to 4.17.7/5.9.13. This impacts an unknown function of the component Endpoint. The manipulation leads to authorization bypass.
This vulnerability is listed as CVE-2026-33160. The attack may be initiated remotely. There is no available exploit.
You should upgrade the affected component.
vuldb.com
CVE-2026-33162 | Craft CMS up to 5.9.13 move-to-section improper authorization
1 hour 33 minutes ago
A vulnerability labeled as critical has been found in Craft CMS up to 5.9.13. Affected is an unknown function of the file /actions/entries/move-to-section. The manipulation results in improper authorization.
This vulnerability is cataloged as CVE-2026-33162. The attack may be launched remotely. There is no exploit available.
The affected component should be upgraded.
vuldb.com
CVE-2026-33159 | Craft CMS up to 4.17.7/5.9.13 missing authentication
1 hour 33 minutes ago
A vulnerability marked as critical has been reported in Craft CMS up to 4.17.7/5.9.13. Affected by this vulnerability is an unknown functionality. This manipulation causes missing authentication.
This vulnerability is registered as CVE-2026-33159. Remote exploitation of the attack is possible. No exploit is available.
It is suggested to upgrade the affected component.
vuldb.com
CVE-2026-33161 | Craft CMS up to 4.17.7/5.9.13 Endpoint information disclosure
1 hour 33 minutes ago
A vulnerability classified as problematic has been found in Craft CMS up to 4.17.7/5.9.13. This affects an unknown part of the component Endpoint. Performing a manipulation results in information disclosure.
This vulnerability is reported as CVE-2026-33161. The attack is possible to be carried out remotely. No exploit exists.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2026-33399 | ellite Wallos up to 4.6.x Notifications validate_webhook_url_for_ssrf server-side request forgery
1 hour 33 minutes ago
A vulnerability classified as critical was found in ellite Wallos up to 4.6.x. This vulnerability affects the function validate_webhook_url_for_ssrf of the component Notifications Handler. Executing a manipulation can lead to server-side request forgery.
This vulnerability appears as CVE-2026-33399. The attack may be performed from remote. There is no available exploit.
Upgrading the affected component is advised.
vuldb.com
CVE-2026-33407 | ellite Wallos up to 4.6.x Endpoint search.php HTTP_PROXY/HTTPS_PROXY server-side request forgery
1 hour 33 minutes ago
A vulnerability, which was classified as critical, has been found in ellite Wallos up to 4.6.x. This issue affects some unknown processing of the file endpoints/logos/search.php of the component Endpoint. The manipulation of the argument HTTP_PROXY/HTTPS_PROXY leads to server-side request forgery.
This vulnerability is traded as CVE-2026-33407. It is possible to initiate the attack remotely. There is no exploit available.
It is advisable to upgrade the affected component.
vuldb.com
CVE-2026-33401 | ellite Wallos up to 4.6.x AI Recommendations Endpoint AI Ollama host server-side request forgery
1 hour 33 minutes ago
A vulnerability, which was classified as critical, was found in ellite Wallos up to 4.6.x. Impacted is an unknown function of the component AI Recommendations Endpoint. The manipulation of the argument AI Ollama host results in server-side request forgery.
This vulnerability is known as CVE-2026-33401. It is possible to launch the attack remotely. No exploit is available.
You should upgrade the affected component.
vuldb.com
CVE-2026-33400 | ellite Wallos up to 4.6.x Statistics Page payment cross site scripting
1 hour 33 minutes ago
A vulnerability has been found in ellite Wallos up to 4.6.x and classified as problematic. The affected element is the function payment of the component Statistics Page. This manipulation causes cross site scripting.
This vulnerability is handled as CVE-2026-33400. The attack can be initiated remotely. There is not any exploit available.
The affected component should be upgraded.
vuldb.com
CVE-2026-1995 | IDrive Cloud Backup Client prior 7.0.0.63 on Windows id_service.exe privileges management (EUVD-2026-14949)
1 hour 33 minutes ago
A vulnerability marked as critical has been reported in IDrive Cloud Backup Client on Windows. The affected element is an unknown function of the file id_service.exe. The manipulation leads to improper privilege management.
This vulnerability is listed as CVE-2026-1995. The attack must be carried out locally. There is no available exploit.
It is suggested to upgrade the affected component.
vuldb.com
CVE-2026-23919 | Zabbix up to 6.0.40/7.0.18/7.2.12/7.4.2 wrong session (EUVD-2026-14950)
1 hour 33 minutes ago
A vulnerability described as problematic has been identified in Zabbix up to 6.0.40/7.0.18/7.2.12/7.4.2. The impacted element is an unknown function. The manipulation results in exposure of data element to wrong session.
This vulnerability is cataloged as CVE-2026-23919. The attack must originate from the local network. There is no exploit available.
vuldb.com
CVE-2026-33678 | go-vikunja up to 2.2.0 Attachments ReadOne authorization (GHSA-jfmm-mjcp-8wq2)
2 hours 1 minute ago
A vulnerability categorized as critical has been discovered in go-vikunja vikunja up to 2.2.0. Impacted is the function ReadOne of the component Attachments Handler. Such manipulation leads to authorization bypass.
This vulnerability is listed as CVE-2026-33678. The attack may be performed from remote. There is no available exploit.
It is advisable to upgrade the affected component.
vuldb.com
CVE-2026-33679 | go-vikunja up to 2.2.0 Image Parser pkg/utils/avatar.go DownloadImage server-side request forgery (GHSA-g9xj-752q-xh63)
2 hours 1 minute ago
A vulnerability identified as critical has been detected in go-vikunja vikunja up to 2.2.0. The affected element is the function DownloadImage of the file pkg/utils/avatar.go of the component Image Parser. Performing a manipulation results in server-side request forgery.
This vulnerability is cataloged as CVE-2026-33679. It is possible to initiate the attack remotely. There is no exploit available.
You should upgrade the affected component.
vuldb.com
CVE-2026-33680 | go-vikunja up to 2.2.1 LinkSharing.ReadAll improper authorization (GHSA-8hp8-9fhr-pfm9)
2 hours 1 minute ago
A vulnerability labeled as critical has been found in go-vikunja vikunja up to 2.2.1. The impacted element is the function LinkSharing.ReadAll. Executing a manipulation can lead to improper authorization.
This vulnerability is registered as CVE-2026-33680. It is possible to launch the attack remotely. No exploit is available.
The affected component should be upgraded.
vuldb.com
CVE-2026-33700 | go-vikunja up to 2.2.0 /api/v1/projects/ authorization (GHSA-f95f-77jx-fcjc)
2 hours 1 minute ago
A vulnerability marked as problematic has been reported in go-vikunja vikunja up to 2.2.0. This affects an unknown function of the file /api/v1/projects/. The manipulation leads to authorization bypass.
This vulnerability is documented as CVE-2026-33700. The attack can be initiated remotely. There is not any exploit available.
It is suggested to upgrade the affected component.
vuldb.com
CVE-2026-32853 | LibVNC Server up to 0.9.15 HandleUltraZipBPP out-of-bounds
2 hours 1 minute ago
A vulnerability was found in LibVNC Server up to 0.9.15 and classified as critical. This issue affects the function HandleUltraZipBPP of the component VNC Handler. The manipulation results in out-of-bounds read.
This vulnerability was named CVE-2026-32853. The attack may be performed from remote. There is no available exploit.
A patch should be applied to remediate this issue.
vuldb.com
CVE-2026-32854 | LibVNC Server up to 0.9.15 HTTP Proxy httpd.c httpProcessInput null pointer dereference
2 hours 1 minute ago
A vulnerability was found in LibVNC Server up to 0.9.15. It has been classified as problematic. Impacted is the function httpProcessInput of the file httpd.c of the component HTTP Proxy Handler. This manipulation causes null pointer dereference.
The identification of this vulnerability is CVE-2026-32854. It is possible to initiate the attack remotely. There is no exploit available.
To fix this issue, it is recommended to deploy a patch.
vuldb.com
CVE-2026-33157 | Craft CMS up to 5.9.12 cleanseConfig fieldLayouts externally-controlled input to select classes or code
2 hours 1 minute ago
A vulnerability was found in Craft CMS up to 5.9.12. It has been declared as problematic. The affected element is the function cleanseConfig. Such manipulation of the argument fieldLayouts leads to use of externally-controlled input to select classes or code.
This vulnerability is referenced as CVE-2026-33157. It is possible to launch the attack remotely. No exploit is available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2025-11571 | Silabs Simplicity Installer tool for Simplicity Studio v6 os command injection (EUVD-2025-208962)
2 hours 1 minute ago
A vulnerability was found in Silabs Simplicity Studio v5 and Simplicity Installer tool for Simplicity Studio v6. It has been rated as critical. The impacted element is an unknown function. Performing a manipulation results in os command injection.
This vulnerability is identified as CVE-2025-11571. The attack can be initiated remotely. There is not any exploit available.
vuldb.com
CVE-2026-33158 | Craft CMS up to 4.17.7/5.9.13 authorization
2 hours 1 minute ago
A vulnerability categorized as problematic has been discovered in Craft CMS up to 4.17.7/5.9.13. This affects an unknown function. Executing a manipulation can lead to authorization bypass.
This vulnerability is tracked as CVE-2026-33158. The attack can be launched remotely. No exploit exists.
It is advisable to upgrade the affected component.
vuldb.com