A vulnerability was found in Biosig libbiosig 3.9.2. It has been classified as critical. This vulnerability affects unknown code of the component Nicolet WFT Parser. Performing a manipulation results in heap-based buffer overflow.
This vulnerability is cataloged as CVE-2026-20777. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability labeled as problematic has been found in Open Babel up to 3.1.1. This impacts the function OBAtom::GetExplicitValence of the file isrc/atom.cpp of the component CDXML File Handler. Such manipulation leads to null pointer dereference.
This vulnerability is uniquely identified as CVE-2026-3408. The attack can be launched remotely. Moreover, an exploit is present.
It is best practice to apply a patch to resolve this issue.
We speak to Director of ESET Threat Research Jean-Ian Boutin about where solutions that blend advanced technology with human expertise provide the most practical value for businesses
A vulnerability categorized as problematic has been discovered in Plone Products.ATContentTypes up to 3.0.5. This affects an unknown part. Such manipulation leads to open redirect.
This vulnerability is traded as CVE-2022-23599. The attack may be launched remotely. There is no exploit available.
It is advisable to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in Plone CMS 6.0.5. The impacted element is an unknown function of the component URL Handler. Such manipulation leads to cross site scripting.
This vulnerability is documented as CVE-2024-0669. The attack can be executed remotely. There is not any exploit available.
You should upgrade the affected component.
A vulnerability identified as problematic has been detected in Squirrel up to 3.2. This affects the function SQCompiler::Factor/SQCompiler::UnaryOP of the file squirrel/sqcompiler.cpp. Performing a manipulation results in uncontrolled recursion.
This vulnerability was named CVE-2026-3388. The attack needs to be approached locally. In addition, an exploit is available.
The project was informed of the problem early through an issue report but has not responded yet.
A vulnerability was found in tootallnate once up to 3.0.0. It has been rated as problematic. Affected is the function await/then. This manipulation causes incorrect control flow scoping.
This vulnerability appears as CVE-2026-3449. The attack requires local access. There is no available exploit.
Upgrading the affected component is advised.
A vulnerability has been found in axiomthemes Smart SEO Plugin up to 2.9 on WordPress and classified as critical. The affected element is an unknown function. This manipulation causes improper control of filename for include/require statement in php program ('php remote file inclusion').
This vulnerability is registered as CVE-2026-28117. Remote exploitation of the attack is possible. No exploit is available.
A vulnerability classified as critical was found in firassaidi WooCommerce License Manager Plugin up to 7.0.6 on WordPress. The affected element is an unknown function. The manipulation results in unrestricted upload.
This vulnerability is identified as CVE-2026-28114. The attack can be executed remotely. There is not any exploit available.
A vulnerability has been found in loopus WP Attractive Donations System Plugin up to 1.25 on WordPress and classified as critical. This impacts an unknown function. Performing a manipulation results in sql injection.
This vulnerability is cataloged as CVE-2026-28115. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability was found in ThemeREX Dr.Patterson Plugin up to 1.3.2 on WordPress and classified as critical. The impacted element is an unknown function. Such manipulation leads to improper control of filename for include/require statement in php program ('php remote file inclusion').
This vulnerability is documented as CVE-2026-28120. The attack can be executed remotely. There is not any exploit available.
A vulnerability was found in axiomthemes Nirvana Plugin up to 2.6 on WordPress. It has been rated as critical. Affected is an unknown function. The manipulation leads to improper control of filename for include/require statement in php program ('php remote file inclusion').
This vulnerability is traded as CVE-2026-28119. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability described as critical has been identified in axiomthemes Welldone Plugin up to 2.4 on WordPress. This issue affects some unknown processing. Executing a manipulation can lead to improper control of filename for include/require statement in php program ('php remote file inclusion').
The identification of this vulnerability is CVE-2026-28118. The attack may be launched remotely. There is no exploit available.