A vulnerability was found in TP-LINK Archer C5 3.16.9/up to 3.16.8/up to V2_160201_US. It has been classified as problematic. This vulnerability affects unknown code. This manipulation of the argument Referer as part of HTTP Header causes missing release of resource.
This vulnerability appears as CVE-2020-9375. The attack may be initiated remotely. In addition, an exploit is available.
Upgrading the affected component is recommended.
A vulnerability, which was classified as problematic, was found in Mayan EDMS up to 4.10.1. The affected element is an unknown function of the file /authentication/. The manipulation results in cross site scripting.
This vulnerability was named CVE-2025-14691. The attack may be performed from remote. In addition, an exploit is available.
You should upgrade the affected component.
The vendor confirms that this is "[f]ixed in version 4.10.2". Furthermore, that "[b]ackports for older versions in process and will be out as soon as their respective CI pipelines complete."
A vulnerability has been found in emiago sipgo and classified as problematic. Affected by this vulnerability is the function NewResponseFromRequest. The manipulation leads to null pointer dereference.
This vulnerability is documented as CVE-2025-68274. The attack can be initiated remotely. There is not any exploit available.
The affected component should be upgraded.
A vulnerability, which was classified as problematic, has been found in Auth0 Auth0-PHP up to 8.17.x. This impacts an unknown function. This manipulation causes incorrect authorization.
This vulnerability appears as CVE-2025-68129. The attack may be initiated remotely. There is no available exploit.
It is advisable to upgrade the affected component.
A vulnerability was found in Aiven-Open myhoard up to 1.2.x. It has been classified as critical. Affected by this vulnerability is an unknown functionality of the file /dev/null. This manipulation causes transmission of private resources into a new sphere ('resource leak').
This vulnerability is tracked as CVE-2025-67745. The attack is possible to be carried out remotely. No exploit exists.
Upgrading the affected component is recommended.
A vulnerability, which was classified as problematic, was found in Moodle 3.10.3. Affected is an unknown function of the component Calendar Event Handler. Such manipulation of the argument subtitle track label leads to cross site scripting.
This vulnerability is documented as CVE-2021-47857. The attack can be executed remotely. Additionally, an exploit exists.
A vulnerability classified as critical was found in GNU wget. This vulnerability affects unknown code of the component Metalink Handler. Such manipulation leads to path traversal.
This vulnerability is referenced as CVE-2025-69194. The attack can only be performed from a local environment. No exploit is available.
A vulnerability classified as critical has been found in fastapi-users FastAPI up to 15.0.1. This impacts the function generate_state_token of the file /authorize. Performing a manipulation results in improper authorization.
This vulnerability is known as CVE-2025-68481. Remote exploitation of the attack is possible. No exploit is available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Mayan EDMS up to 4.10.1 and classified as problematic. The impacted element is an unknown function of the file /authentication/. This manipulation causes open redirect.
The identification of this vulnerability is CVE-2025-14692. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
The affected component should be upgraded.
The vendor confirms that this is "[f]ixed in version 4.10.2". Furthermore, that "[b]ackports for older versions in process and will be out as soon as their respective CI pipelines complete."
A vulnerability has been found in Forceu Gokapi up to 2.2.2 and classified as critical. Affected by this vulnerability is an unknown functionality of the component Auth Token Handler. This manipulation causes improper access controls.
This vulnerability is handled as CVE-2026-29060. The attack can be initiated remotely. There is not any exploit available.
The affected component should be upgraded.
A vulnerability, which was classified as problematic, was found in WP All Import Pro Plugin up to 4.0.0 on WordPress. Affected is an unknown function. The manipulation of the argument filepath results in cross site scripting.
This vulnerability is known as CVE-2026-2830. It is possible to launch the attack remotely. No exploit is available.
A vulnerability, which was classified as problematic, has been found in Wagtail up to 6.3.7/7.0.5/7.2.2/7.3.0. This impacts an unknown function of the component wagtail.contrib.simple_translation. The manipulation leads to cross site scripting.
This vulnerability is traded as CVE-2026-28223. It is possible to initiate the attack remotely. There is no exploit available.
It is advisable to upgrade the affected component.
A vulnerability classified as problematic was found in Wagtail up to 6.3.7/7.0.5/7.2.2/7.3.0. This affects an unknown function. Executing a manipulation can lead to cross site scripting.
This vulnerability appears as CVE-2026-28222. The attack may be performed from remote. There is no available exploit.
Upgrading the affected component is advised.
A vulnerability classified as problematic has been found in Gogs up to 0.14.1. The impacted element is an unknown function. Performing a manipulation results in cross site scripting.
This vulnerability is reported as CVE-2026-26022. The attack is possible to be carried out remotely. No exploit exists.
It is recommended to upgrade the affected component.
A vulnerability described as problematic has been identified in Gogs up to 0.14.1. The affected element is an unknown function. Such manipulation leads to cross site scripting.
This vulnerability is documented as CVE-2026-26276. The attack can be executed remotely. There is not any exploit available.
Upgrading the affected component is recommended.
A vulnerability marked as problematic has been reported in Gogs up to 0.14.1. Impacted is an unknown function. This manipulation causes cross site scripting.
This vulnerability is registered as CVE-2026-26195. Remote exploitation of the attack is possible. No exploit is available.
It is suggested to upgrade the affected component.
A vulnerability labeled as problematic has been found in Fonoster up to 0.6.0. This issue affects the function serveFiles of the file mods/voice/src/utils.ts. The manipulation results in path traversal: '../filedir'.
This vulnerability is cataloged as CVE-2024-43035. The attack may be launched remotely. There is no exploit available.
The affected component should be upgraded.
A vulnerability identified as very critical has been detected in Keycloak. This vulnerability affects unknown code of the component org.keycloak.broker.saml. The manipulation leads to authentication bypass by primary weakness.
This vulnerability is listed as CVE-2026-3047. The attack may be initiated remotely. There is no available exploit.
A vulnerability categorized as critical has been discovered in Wincor Nixdorf wnBios64.sys 1.2.0.0. This affects an unknown part of the component IOCTL Handler. Executing a manipulation can lead to stack-based buffer overflow.
This vulnerability is tracked as CVE-2025-70616. The attack is only possible within the local network. No exploit exists.