A vulnerability, which was classified as critical, has been found in Wishlist Member Plugin up to 3.30.1 on WordPress. This issue affects the function export_settings of the component REST API. The manipulation leads to improper privilege management.
This vulnerability is listed as CVE-2026-6895. The attack may be initiated remotely. There is no available exploit.
A vulnerability classified as critical was found in Wishlist Member Plugin up to 3.30.1 on WordPress. This vulnerability affects the function WishListMember3_Hooks::generate_api_key of the component REST API. Executing a manipulation can lead to improper privilege management.
This vulnerability is tracked as CVE-2026-6898. The attack can be launched remotely. No exploit exists.
A vulnerability classified as critical has been found in Wishlist Member Plugin up to 3.30.1 on WordPress. This affects the function Team_Accounts of the component REST API. Performing a manipulation results in improper privilege management.
This vulnerability is identified as CVE-2026-6897. The attack can be initiated remotely. There is not any exploit available.
A vulnerability described as critical has been identified in Wishlist Member Plugin up to 3.30.1 on WordPress. Affected by this issue is the function ajax_get_screen of the component Administrative API. Such manipulation leads to improper privilege management.
This vulnerability is referenced as CVE-2026-6419. It is possible to launch the attack remotely. No exploit is available.
A vulnerability marked as critical has been reported in Microsoft SharePoint Enterprise Server. Affected by this vulnerability is an unknown functionality. This manipulation causes deserialization.
The identification of this vulnerability is CVE-2026-45659. It is possible to initiate the attack remotely. There is no exploit available.
It is suggested to upgrade the affected component.
A vulnerability labeled as problematic has been found in nukeviet CMS up to 4.5.7. Affected is an unknown function of the component Contact Module. The manipulation results in cross site scripting.
This vulnerability was named CVE-2026-41147. The attack may be performed from remote. There is no available exploit.
The affected component should be upgraded.
A vulnerability identified as critical has been detected in Microsoft Azure Resource Manager. This impacts an unknown function. The manipulation leads to improper authentication.
This vulnerability is uniquely identified as CVE-2026-47280. The attack is possible to be carried out remotely. No exploit exists.
This product is a managed service. It is not possible for users to maintain vulnerability countermeasures themselves.
A vulnerability categorized as critical has been discovered in Microsoft 365 Copilot. This affects an unknown function. Executing a manipulation can lead to command injection.
This vulnerability is handled as CVE-2026-42827. The attack can be executed remotely. There is not any exploit available.
This product is available as a managed service. Users are not able to maintain vulnerability countermeasures themselves.
A vulnerability was found in mermaid-js mermaid up to 10.9.5/11.14.x. It has been rated as critical. The impacted element is an unknown function of the component Setting Handler. Performing a manipulation results in code injection.
This vulnerability is known as CVE-2026-41149. Remote exploitation of the attack is possible. No exploit is available.
Upgrading the affected component is advised.
A vulnerability was found in bestpractical rt up to 5.0.9/6.0.2. It has been declared as critical. The affected element is an unknown function of the component LDAP/AD. Such manipulation leads to improper authentication.
This vulnerability is traded as CVE-2026-41076. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Microsoft Entra. It has been classified as very critical. Impacted is an unknown function. This manipulation causes origin validation error.
This vulnerability appears as CVE-2026-42901. The attack may be initiated remotely. There is no available exploit.
This product is a managed service, which means users themselves cannot handle vulnerability countermeasures.
A vulnerability was found in Microsoft Planetary Computer Pro and classified as very critical. This issue affects some unknown processing. The manipulation results in deserialization.
This vulnerability is reported as CVE-2026-41104. The attack can be launched remotely. No exploit exists.
This product is a managed service, so users do not have direct control over vulnerability countermeasures.
A vulnerability has been found in Microsoft Power Pages and classified as critical. This vulnerability affects unknown code. The manipulation leads to command injection.
This vulnerability is documented as CVE-2026-23652. The attack can be initiated remotely. There is not any exploit available.
This product is a managed service, indicating that users are not permitted to maintain vulnerability countermeasures themselves.
A vulnerability, which was classified as critical, was found in Microsoft Azure Orbital Spatio. This affects an unknown part. Executing a manipulation can lead to unrestricted upload.
This vulnerability is registered as CVE-2026-40412. It is possible to launch the attack remotely. No exploit is available.
This product is provided as a managed service, meaning users do not have the ability to maintain vulnerability countermeasures themselves.
A vulnerability, which was classified as very critical, has been found in Microsoft Azure Virtual Network Gateway. Affected by this issue is some unknown functionality. Performing a manipulation results in improper input validation.
This vulnerability is cataloged as CVE-2026-40411. It is possible to initiate the attack remotely. There is no exploit available.
This product operates as a managed service, which prevents users from maintaining vulnerability countermeasures themselves.
A vulnerability classified as very critical was found in Microsoft Azure Privileged Identity Management. Affected by this vulnerability is an unknown functionality. Such manipulation leads to authorization bypass.
This vulnerability is listed as CVE-2026-35430. The attack may be performed from remote. There is no available exploit.
This product is a managed service, so users are unable to manage vulnerability countermeasures on their own.
A vulnerability classified as critical has been found in Microsoft Global Secure Access. Affected is an unknown function. This manipulation causes improper privilege management.
This vulnerability is tracked as CVE-2026-23663. The attack is possible to be carried out remotely. No exploit exists.
This product is a managed service. This means that users cannot maintain vulnerability countermeasures themselves.