A vulnerability classified as critical was found in Pachno 1.0.6. The impacted element is the function simplexml_load_string of the component XML Parser. The manipulation results in exposure of file descriptor to unintended control sphere ('file descriptor leak').
This vulnerability is known as CVE-2026-40042. It is possible to launch the attack remotely. No exploit is available.
A vulnerability classified as problematic has been found in Pachno 1.0.6. The affected element is the function runSwitchUser. The manipulation leads to authorization bypass.
This vulnerability is traded as CVE-2026-40043. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability described as critical has been identified in Python CPython up to 3.14.x. Impacted is the function lzma.LZMADecompressor/bz2.BZ2Decompressor/gzip.GzipFile of the component Decompression Call Handler. Executing a manipulation can lead to use after free.
This vulnerability appears as CVE-2026-6100. The attack may be performed from remote. There is no available exploit.
Upgrading the affected component is recommended.
A vulnerability marked as critical has been reported in steveukx git-js up to 3.31.x. This issue affects some unknown processing. Performing a manipulation results in os command injection.
This vulnerability is reported as CVE-2026-28291. The attack is possible to be carried out remotely. No exploit exists.
It is suggested to upgrade the affected component.
A vulnerability labeled as problematic has been found in nimiq core-rs-albatross up to 1.2.x. This vulnerability affects the function validators.num_validators. Such manipulation leads to out-of-bounds read.
This vulnerability is documented as CVE-2026-32605. The attack can be executed remotely. There is not any exploit available.
The affected component should be upgraded.
A vulnerability identified as problematic has been detected in Pyro 3.x. This affects an unknown part of the component Pickled Handler. This manipulation causes privilege escalation.
This vulnerability is registered as CVE-2026-31048. The attack requires access to the local network. No exploit is available.
A vulnerability categorized as critical has been discovered in ABB AC800M, Symphony Plus SD, Symphony Plus MR and S+ Operations. Affected by this issue is some unknown functionality of the component IEC 61850 Communication Stack. The manipulation results in improper validation of specified quantity in input.
This vulnerability is cataloged as CVE-2025-3756. The attack must originate from the local network. There is no exploit available.
A vulnerability was found in jqlang jq up to 1.8.1. It has been rated as critical. Affected by this vulnerability is the function jvp_string_append/jvp_string_copy_replace_bad. The manipulation leads to heap-based buffer overflow.
This vulnerability is listed as CVE-2026-32316. The attack may be initiated remotely. There is no available exploit.
To fix this issue, it is recommended to deploy a patch.
A vulnerability was found in Pachno 1.0.6. It has been declared as critical. Affected is an unknown function. Executing a manipulation can lead to deserialization.
This vulnerability is tracked as CVE-2026-40044. The attack can be launched remotely. No exploit exists.
Hackers accessed some Booking.com user data, including names, emails, phone numbers, and booking details. The issue is now contained. Booking.com warned that hackers may have accessed customer data linked to travel reservations. Exposed details could include names, email addresses, phone numbers, and information shared with accommodations. Booking.com is one of the world’s leading online travel agencies […]
OT asset owners are being asked by regulators to attest to their post-quantum cryptographic readiness without the appropriate tooling, resulting in paperwork dressed up to look like genuine security.
Joël Winteregg of Vyntra on How AI Is Industrializing Fraud at Unprecedented Scale Gen AI has created a "paradise" for fraudsters, said Joel Winteregg, CEO of Vyntra. Just as Interpol coordinates across borders to dismantle criminal networks, Winteregg said banks must operate as a unified intelligence network, because the fraud operations targeting them already do.