A vulnerability marked as problematic has been reported in gVectors wpForo Forum up to 2.4.15. The impacted element is an unknown function. This manipulation causes cross site scripting.
The identification of this vulnerability is CVE-2026-28561. It is possible to initiate the attack remotely. There is no exploit available.
It is suggested to upgrade the affected component.
A vulnerability labeled as problematic has been found in gVectors wpForo Forum up to 2.4.15. The affected element is an unknown function of the component Global RSS Feed Endpoint. The manipulation of the argument ID results in information disclosure.
This vulnerability was named CVE-2026-28559. The attack may be performed from remote. There is no available exploit.
The affected component should be upgraded.
A vulnerability identified as problematic has been detected in gVectors wpForo Forum up to 2.4.15. Impacted is the function json_encode. The manipulation leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2026-28560. The attack is possible to be carried out remotely. No exploit exists.
You should upgrade the affected component.
A vulnerability categorized as problematic has been discovered in gVectors wpForo Forum up to 2.4.15. This issue affects some unknown processing of the component SVG File Parser. Executing a manipulation can lead to cross site scripting.
This vulnerability is handled as CVE-2026-28558. The attack can be executed remotely. There is not any exploit available.
It is advisable to upgrade the affected component.
A vulnerability was found in gVectors wpForo Forum up to 2.4.15. It has been rated as critical. This vulnerability affects the function topic_move/topic_merge/topic_split. Performing a manipulation results in missing authorization.
This vulnerability is known as CVE-2026-28556. Remote exploitation of the attack is possible. No exploit is available.
Upgrading the affected component is advised.
A vulnerability was found in gVectors wpForo Forum up to 2.4.15. It has been declared as critical. This affects the function wpforo_close_ajax. Such manipulation leads to missing authorization.
This vulnerability is traded as CVE-2026-28555. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in gVectors wpForo Forum up to 2.4.15. It has been classified as critical. Affected by this issue is the function wpforo_approve_ajax of the component AJAX Handler. This manipulation causes missing authorization.
This vulnerability appears as CVE-2026-28554. The attack may be initiated remotely. There is no available exploit.
Upgrading the affected component is recommended.
A vulnerability was found in gVectors wpForo Forum up to 2.4.14 and classified as critical. Affected by this vulnerability is the function Topics::get_topics. The manipulation of the argument wpfob results in sql injection.
This vulnerability is reported as CVE-2026-28562. The attack can be launched remotely. No exploit exists.
It is suggested to upgrade the affected component.
A vulnerability has been found in gVectors wpForo Forum up to 2.4.15 and classified as critical. Affected is the function wpforo_synch_roles of the component AJAX Handler. The manipulation leads to missing authorization.
This vulnerability is documented as CVE-2026-28557. The attack can be initiated remotely. There is not any exploit available.
The affected component should be upgraded.
A vulnerability was found in Tuxera ntfs-3g. It has been rated as critical. Affected by this vulnerability is an unknown functionality of the component NTFS Inode Pathname Handler. The manipulation leads to heap-based buffer overflow.
This vulnerability is referenced as CVE-2021-35266. It is possible to launch the attack on the physical device. No exploit is available.
Upgrading the affected component is advised.
A vulnerability was found in Tuxera ntfs-3g. It has been declared as critical. This affects an unknown part of the component MFT Section Handler. The manipulation results in heap-based buffer overflow.
This vulnerability was named CVE-2021-33289. An attack on the physical device is feasible. There is no available exploit.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Tuxera ntfs-3g. This vulnerability affects the function ntfs_attr_pread_i of the component NTFS Attribute Handler. The manipulation leads to heap-based buffer overflow.
This vulnerability is documented as CVE-2021-33287. It is possible to launch the attack on the physical device. There is not any exploit available.
It is advisable to upgrade the affected component.
A vulnerability was found in Tuxera ntfs-3g. It has been classified as critical. Affected by this issue is some unknown functionality of the component Unicode String Handler. The manipulation leads to heap-based buffer overflow.
This vulnerability is uniquely identified as CVE-2021-33286. It is possible to launch the attack on the physical device. No exploit exists.
Upgrading the affected component is recommended.
A vulnerability was found in Tuxera ntfs-3g. It has been declared as critical. Affected is the function ntfs_get_attribute_value of the component NTFS Attribute Handler. Executing a manipulation can lead to heap-based buffer overflow.
The identification of this vulnerability is CVE-2021-33285. The physical device can be targeted for the attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Tuxera NTFS-3G up to 2021.8.22. Affected is the function fuse_lib_opendir. Such manipulation leads to memory corruption.
This vulnerability is traded as CVE-2022-30785. Access to the local network is required for this attack to succeed. There is no exploit available.
A vulnerability has been found in Tuxera NTFS-3G up to 2021.8.22 and classified as critical. Affected by this vulnerability is the function fuse_lib_readdir. Performing a manipulation results in integer underflow.
This vulnerability is known as CVE-2022-30787. Access to the local network is required for this attack. No exploit is available.