A vulnerability was found in Apache Artemis and ActiveMQ Artemis. It has been declared as critical. Impacted is an unknown function of the component Core Downstream Federation. The manipulation results in improper authentication.
This vulnerability is identified as CVE-2026-27446. The attack can be executed remotely. There is not any exploit available.
It is recommended to upgrade the affected component.
A vulnerability categorized as critical has been discovered in Enable Media Replace Plugin up to 4.1.7 on WordPress. The impacted element is the function RemoveBackGroundViewController::load. Such manipulation leads to improper authorization.
This vulnerability is listed as CVE-2026-2732. The attack may be performed from remote. There is no available exploit.
A vulnerability identified as critical has been detected in WP-Members Membership Plugin up to 3.5.5.1 on WordPress. This affects an unknown function of the component Shortcode Handler. Performing a manipulation of the argument order_by results in sql injection.
This vulnerability is cataloged as CVE-2026-2363. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability classified as problematic has been found in Concrete CMS up to 9.4.7. Affected is an unknown function of the component Switch Language Block Handler. This manipulation causes cross site scripting.
This vulnerability is registered as CVE-2026-3242. Remote exploitation of the attack is possible. No exploit is available.
It is recommended to upgrade the affected component.
A vulnerability categorized as problematic has been discovered in Concrete CMS up to 9.4.7. This affects an unknown function. Executing a manipulation can lead to cross site scripting.
The identification of this vulnerability is CVE-2026-3241. The attack may be launched remotely. There is no exploit available.
It is advisable to upgrade the affected component.
A vulnerability identified as problematic has been detected in Gutena Forms Plugin up to 1.6.0 on WordPress. Affected by this issue is the function save_gutena_forms_schema. This manipulation causes missing authorization.
The identification of this vulnerability is CVE-2026-1674. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability labeled as problematic has been found in Seraphinite Solutions Seraphinite Accelerator Plugin up to 2.28.14 on WordPress. This affects the function OnAdminApi_GetData of the component Scheduled Task Handler. Such manipulation leads to information disclosure.
This vulnerability is referenced as CVE-2026-3058. It is possible to launch the attack remotely. No exploit is available.
A vulnerability marked as problematic has been reported in Envira Gallery Plugin up to 1.12.3 on WordPress. This vulnerability affects unknown code of the component REST API. Performing a manipulation of the argument justified_gallery_theme results in cross site scripting.
This vulnerability is identified as CVE-2026-1236. The attack can be initiated remotely. There is not any exploit available.
A vulnerability described as problematic has been identified in Seraphinite Solutions Seraphinite Accelerator Plugin up to 2.28.14 on WordPress. This issue affects the function seraph_accel_api of the component Log Handler. Executing a manipulation can lead to missing authorization.
This vulnerability is tracked as CVE-2026-3056. The attack can be launched remotely. No exploit exists.
A vulnerability classified as problematic has been found in All-in-One Video Gallery Plugin up to 4.7.1 on WordPress. Impacted is an unknown function. The manipulation of the argument vi leads to cross site scripting.
This vulnerability is listed as CVE-2026-1706. The attack may be initiated remotely. There is no available exploit.
A vulnerability classified as problematic was found in My Calendar Plugin up to 3.7.3 on WordPress. The affected element is an unknown function of the component Shortcode Handler. The manipulation of the argument template results in cross site scripting.
This vulnerability is cataloged as CVE-2026-2355. The attack may be launched remotely. There is no exploit available.
A vulnerability, which was classified as problematic, was found in Mail Mint Plugin up to 1.19.4 on WordPress. This affects an unknown function of the component REST API Endpoint. Such manipulation leads to information disclosure.
This vulnerability is documented as CVE-2026-2025. The attack can be executed remotely. There is not any exploit available.
You should upgrade the affected component.
A vulnerability was found in SonicWall SonicOS. It has been rated as critical. Impacted is an unknown function. Performing a manipulation results in stack-based buffer overflow.
This vulnerability is known as CVE-2026-3439. Remote exploitation of the attack is possible. No exploit is available.
Currently trending CVE - Hype Score: 1 - A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.5, Ivanti Policy Secure before version 22.7R1.2, and Ivanti Neurons for ZTA gateways before version 22.7R2.3 allows a remote unauthenticated attacker to achieve remote code execution.
A vulnerability categorized as problematic has been discovered in WPBookit Plugin up to 1.0.8 on WordPress. This vulnerability affects the function get_customer_list of the component Customer Information Handler. Executing a manipulation can lead to missing authorization.
This vulnerability appears as CVE-2026-1980. The attack may be performed from remote. There is no available exploit.
A vulnerability identified as critical has been detected in Icegram Express Email Subscribers Plugin up to 5.9.16 on WordPress. This issue affects some unknown processing. The manipulation of the argument workflow_ids leads to sql injection.
This vulnerability is traded as CVE-2026-1651. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability labeled as problematic has been found in WPBookit Plugin up to 1.0.8 on WordPress. Impacted is an unknown function. The manipulation of the argument wpb_user_name/wpb_user_email results in cross site scripting.
This vulnerability is known as CVE-2026-1945. It is possible to launch the attack remotely. No exploit is available.
A vulnerability marked as problematic has been reported in Taskbuilder Plugin up to 5.0.3 on WordPress. The affected element is an unknown function of the component Setting Handler. This manipulation of the argument Block Emails causes cross site scripting.
This vulnerability is handled as CVE-2026-2289. The attack can be initiated remotely. There is not any exploit available.
A vulnerability described as critical has been identified in PostX Plugin up to 5.0.8 on WordPress. The impacted element is the function starter_dummy_post of the file /ultp/v3/starter_dummy_post/ of the component REST API Endpoint. Such manipulation leads to server-side request forgery.
This vulnerability is uniquely identified as CVE-2026-1273. The attack can be launched remotely. No exploit exists.