A vulnerability was found in Media Library Assistant Plugin up to 3.33 on WordPress and classified as problematic. This issue affects the function mla_update_compat_fields_action of the component Attachment Taxonomy Handler. Executing a manipulation can lead to missing authorization.
The identification of this vulnerability is CVE-2026-3072. The attack may be launched remotely. There is no exploit available.
A vulnerability, which was classified as problematic, has been found in Cisco Secure Firewall Threat Defense Software up to 7.6.0. Affected by this issue is some unknown functionality of the component Snort 3 SSL Memory Management. This manipulation causes access of memory location after end of buffer.
This vulnerability is handled as CVE-2026-20052. The attack can be initiated remotely. There is not any exploit available.
It is advisable to upgrade the affected component.
A vulnerability classified as problematic was found in Cisco Secure Firewall Threat Defense Software. Affected by this vulnerability is an unknown functionality of the component SSL Decryption Policy. The manipulation results in denial of service.
This vulnerability is known as CVE-2026-20050. It is possible to launch the attack remotely. No exploit is available.
Upgrading the affected component is advised.
A vulnerability classified as critical has been found in Cisco Secure Firewall Threat Defense Software. Affected is an unknown function of the component OSPF Protocol Handler. The manipulation leads to denial of service.
This vulnerability is traded as CVE-2026-20020. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability labeled as critical has been found in Cisco Secure Firewall Threat Defense Software. The impacted element is an unknown function. Such manipulation leads to command injection.
This vulnerability is documented as CVE-2026-20016. The attack requires being on the local network. There is not any exploit available.
The affected component should be upgraded.
A vulnerability categorized as critical has been discovered in Cisco Cyber Vision, Secure Firewall Threat Defense Software and UTD SNORT IPS Engine Software. Impacted is an unknown function of the component Snort 3 Visual Basic for Applications. The manipulation results in heap-based buffer overflow.
This vulnerability is cataloged as CVE-2026-20053. The attack may be launched remotely. There is no exploit available.
It is advisable to upgrade the affected component.
A vulnerability was found in Apocalypse Meow Plugin up to 22.1.0 on WordPress. It has been rated as critical. This issue affects the function in_array of the file ajax.php. The manipulation of the argument Type leads to sql injection.
This vulnerability is listed as CVE-2026-3523. The attack may be initiated remotely. There is no available exploit.
A vulnerability was found in D-Link DIR-513 1.10. It has been declared as critical. This vulnerability affects unknown code of the file /goform/formAdvFirewall. Executing a manipulation can lead to stack-based buffer overflow.
This vulnerability is tracked as CVE-2025-70218. The attack can be launched remotely. No exploit exists.
A vulnerability was found in Cisco Webex Meetings. It has been classified as problematic. This affects an unknown part of the component Link Handler. Performing a manipulation results in cross site scripting.
This vulnerability is identified as CVE-2026-20149. The attack can be initiated remotely. There is not any exploit available.
Upgrading the affected component is recommended.
A vulnerability was found in Cisco Secure Firewall Threat Defense Software and classified as critical. Affected by this issue is some unknown functionality of the component Snort Deep Packet Inspection. Such manipulation leads to improper access controls.
This vulnerability is referenced as CVE-2026-20007. It is possible to launch the attack remotely. No exploit is available.
It is suggested to upgrade the affected component.
A vulnerability has been found in Cisco Secure Firewall Threat Defense Software and classified as problematic. Affected by this vulnerability is an unknown functionality of the component TLS Protocol Handler. This manipulation causes 7pk error.
The identification of this vulnerability is CVE-2026-20006. It is possible to initiate the attack remotely. There is no exploit available.
The affected component should be upgraded.
A vulnerability, which was classified as critical, was found in Cisco Secure Firewall Adaptive Security Appliance Software 9.20.4.14. Affected is an unknown function of the component Embryonic Connection Limit Handler. The manipulation results in missing release of resource.
This vulnerability was named CVE-2026-20082. The attack may be performed from remote. There is no available exploit.
You should upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Dell Device Management Agent up to 26.01. This impacts an unknown function. The manipulation leads to incorrect authorization.
This vulnerability is uniquely identified as CVE-2026-26949. Local access is required to approach this attack. No exploit exists.
It is advisable to upgrade the affected component.