A critical vulnerability in the Ninja Forms File Uploads premium add-on for WordPress allows uploading arbitrary files without authentication, which can lead to remote code execution. [...]
A vulnerability classified as problematic has been found in Wikimedia ProofreadPage Extension up to 1.43.6/1.44.3/1.45.1 on MediaWiki. This vulnerability affects unknown code. This manipulation causes cross site scripting.
This vulnerability appears as CVE-2026-39838. The attack may be initiated remotely. There is no available exploit.
It is recommended to upgrade the affected component.
A vulnerability described as problematic has been identified in Wikimedia Cargo Extension up to 3.8.6 on Mediawiki. This affects an unknown part. The manipulation results in basic cross site scripting.
This vulnerability is reported as CVE-2026-39839. The attack can be launched remotely. No exploit exists.
Upgrading the affected component is recommended.
A vulnerability marked as critical has been reported in modelcontextprotocol java-sdk up to 0.x. Affected by this issue is some unknown functionality of the component Model Context Protocol. The manipulation leads to origin validation error.
This vulnerability is documented as CVE-2026-35568. The attack can be initiated remotely. There is not any exploit available.
It is suggested to upgrade the affected component.
A vulnerability labeled as critical has been found in danny-avila LibreChat up to 0.8.3. Affected by this vulnerability is the function writeFileSync. Executing a manipulation can lead to path traversal.
This vulnerability is registered as CVE-2026-34371. It is possible to launch the attack remotely. No exploit is available.
The affected component should be upgraded.
A vulnerability identified as problematic has been detected in redwoodjs sdk up to 1.0.5. Affected is the function serverAction of the component GET Request Handler. Performing a manipulation results in cross-site request forgery.
This vulnerability is cataloged as CVE-2026-39371. It is possible to initiate the attack remotely. There is no exploit available.
You should upgrade the affected component.
A vulnerability categorized as problematic has been discovered in Electron up to 39.8.4/40.8.4/41.0.x. This impacts the function clipboard.readImage. Such manipulation leads to null pointer dereference.
This vulnerability is listed as CVE-2026-34781. The attack must be carried out locally. There is no available exploit.
It is advisable to upgrade the affected component.
A vulnerability was found in randombit botan up to 3.11.0. It has been rated as problematic. This affects an unknown function. This manipulation causes enforcement of behavioral workflow.
This vulnerability is tracked as CVE-2026-34582. The attack is possible to be carried out remotely. No exploit exists.
Upgrading the affected component is advised.
A vulnerability was found in randombit botan up to 3.11.0. It has been declared as critical. The impacted element is the function Certificate_Store::certificate_known of the component Path Validation Handler. The manipulation results in improper certificate validation.
This vulnerability is identified as CVE-2026-34580. The attack can be executed remotely. There is not any exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Electron up to 39.8.4/40.8.4/41.0.x. It has been classified as problematic. The affected element is the function window.open. The manipulation leads to exposure of resource.
This vulnerability is referenced as CVE-2026-34765. Remote exploitation of the attack is possible. No exploit is available.
Upgrading the affected component is recommended.
A vulnerability was found in WWBN AVideo up to 26.0 and classified as critical. Impacted is an unknown function of the file objects/aVideoEncoderReceiveImage.json.php. Executing a manipulation can lead to path traversal.
The identification of this vulnerability is CVE-2026-39369. The attack may be launched remotely. There is no exploit available.
A vulnerability has been found in nextendweb Smart Slider 3 Plugin up to 3.5.1.33 on WordPress and classified as critical. This issue affects the function display_admin_ajax. Performing a manipulation results in missing authorization.
This vulnerability was named CVE-2026-4065. The attack may be initiated remotely. There is no available exploit.
A vulnerability, which was classified as critical, was found in WWBN AVideo up to 26.0. This vulnerability affects unknown code of the file objects/aVideoEncoder.json.php. Such manipulation of the argument downloadURL leads to server-side request forgery.
This vulnerability is uniquely identified as CVE-2026-39370. The attack can be launched remotely. No exploit exists.
A vulnerability, which was classified as critical, has been found in delmaredigital payload-puck up to 0.6.22. This affects the function createPuckPlugin of the component CRUD Endpoint. This manipulation causes missing authorization.
This vulnerability is handled as CVE-2026-39397. The attack can be initiated remotely. There is not any exploit available.
It is advisable to upgrade the affected component.
A vulnerability classified as problematic was found in Wikimedia Cargo Extension up to 3.8.6 on Mediawiki. Affected by this issue is some unknown functionality. The manipulation results in cross site scripting.
This vulnerability is known as CVE-2026-39840. It is possible to launch the attack remotely. No exploit is available.
Upgrading the affected component is advised.
A vulnerability classified as critical has been found in GenieACS 1.2.13. Affected by this vulnerability is an unknown functionality of the component NBI API Endpoint. The manipulation leads to improper authentication.
This vulnerability is traded as CVE-2025-56015. It is possible to initiate the attack remotely. There is no exploit available.