A vulnerability described as problematic has been identified in Apache Tomcat up to 8.5.82/8.5.100/9.0.116/10.1.53/11.0.20. Affected by this issue is some unknown functionality of the component JsonAccessLogValve. The manipulation results in escaping of output.
This vulnerability is identified as CVE-2026-34483. The attack can be executed remotely. There is not any exploit available.
Upgrading the affected component is recommended.
A vulnerability was found in wolfSSL up to 5.9.0 and classified as critical. The impacted element is the function DecodeObjectId of the file wolfcrypt/src/asn.c. The manipulation results in heap-based buffer overflow.
This vulnerability is reported as CVE-2026-5187. The attack can be launched remotely. No exploit exists.
A vulnerability was found in Apache ActiveMQ Client, ActiveMQ Broker and ActiveMQ up to 5.19.3/6.2.3 and classified as problematic. This affects an unknown part of the component TLS 1.3 KeyUpdate Handler. The manipulation results in denial of service.
This vulnerability is identified as CVE-2026-39304. The attack can be executed remotely. There is not any exploit available.
It is suggested to upgrade the affected component.
A vulnerability classified as problematic was found in wolfSSL up to 5.9.0. Affected by this issue is the function wc_PKCS7_DecodeAuthEnvelopedData of the component Authentication Tag Handler. Such manipulation of the argument mac leads to channel accessible by non-endpoint.
This vulnerability is referenced as CVE-2026-5500. It is possible to launch the attack remotely. No exploit is available.
Applying a patch is advised to resolve this issue.
A vulnerability marked as critical has been reported in Apache Tomcat up to 9.0.115/10.1.52/11.0.19. This affects an unknown function. Performing a manipulation results in improper input validation.
This vulnerability is identified as CVE-2026-32990. The attack can be initiated remotely. There is not any exploit available.
It is suggested to upgrade the affected component.
A vulnerability identified as critical has been detected in wolfSSL up to 5.9.0. Affected by this vulnerability is the function wc_AriaEncrypt. This manipulation causes reusing a nonce.
This vulnerability is registered as CVE-2026-5446. Remote exploitation of the attack is possible. No exploit is available.
You should upgrade the affected component.
A vulnerability marked as critical has been reported in wolfSSL up to 5.9.0. This affects an unknown part. Performing a manipulation results in heap-based buffer overflow.
This vulnerability is reported as CVE-2026-5447. The attack is possible to be carried out remotely. No exploit exists.
It is suggested to upgrade the affected component.
A vulnerability described as problematic has been identified in Payment Forms for Paystack Plugin up to 3.4.1 on WordPress. Affected by this vulnerability is an unknown functionality of the component Shortcode Handler. Executing a manipulation can lead to cross site scripting.
This vulnerability is tracked as CVE-2023-5665. The attack can be launched remotely. No exploit exists.
A vulnerability has been found in Royal Elementor Addons and Templates Plugin up to 1.3.87 on WordPress and classified as problematic. Impacted is the function wpr_update_form_action_meta. Performing a manipulation results in cross-site request forgery.
This vulnerability is reported as CVE-2024-0511. The attack is possible to be carried out remotely. No exploit exists.
A vulnerability was found in pluginsandsnippets Simple Page Access Restriction Plugin up to 1.0.21 on WordPress and classified as critical. Affected by this issue is some unknown functionality of the component REST API. Such manipulation leads to improper access controls.
This vulnerability is documented as CVE-2024-0965. The attack can be executed remotely. There is not any exploit available.
A vulnerability was found in wpdevelop WP Booking Calendar Plugin up to 9.9 on WordPress. It has been classified as critical. This affects an unknown part. Performing a manipulation of the argument calendar_request_params[dates_ddmmyy_csv]' results in sql injection.
This vulnerability is reported as CVE-2024-1207. The attack is possible to be carried out remotely. No exploit exists.
A vulnerability, which was classified as critical, has been found in Event Manager, Events Calendar, Events Tickets for WooCommerce Plugin up to 3.3.50 on WordPress. Affected is an unknown function of the component Events Export. This manipulation causes missing authorization.
The identification of this vulnerability is CVE-2024-1122. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability has been found in FreeDomain Backuply Plugin up to 1.2.5 on WordPress and classified as problematic. Affected by this issue is some unknown functionality. Performing a manipulation results in denial of service.
This vulnerability is identified as CVE-2024-0842. The attack can only be performed from the local network. There is not any exploit available.
A vulnerability was found in Internal Link Juicer Plugin up to 2.23.4 on WordPress. It has been classified as problematic. This vulnerability affects unknown code. The manipulation leads to cross site scripting.
This vulnerability is listed as CVE-2024-0657. The attack may be initiated remotely. There is no available exploit.
A vulnerability categorized as critical has been discovered in Awesome Support Plugin up to 6.1.7 on WordPress. This affects the function editor_html. The manipulation results in missing authorization.
This vulnerability was named CVE-2024-0596. The attack may be performed from remote. There is no available exploit.
A vulnerability identified as critical has been detected in Awesome Support Plugin up to 6.1.7 on WordPress. This impacts the function wpas_get_users. This manipulation causes missing authorization.
The identification of this vulnerability is CVE-2024-0595. It is possible to initiate the attack remotely. There is no exploit available.