A vulnerability was found in trueleaf ApiFlow 0.9.7. It has been classified as critical. The impacted element is the function validateUrlSecurity of the file packages/server/src/service/proxy/http_proxy.service.ts of the component URL Validation Handler. This manipulation causes server-side request forgery.
This vulnerability is registered as CVE-2026-4528. Remote exploitation of the attack is possible. Furthermore, an exploit is available.
A vulnerability was found in feast-dev feast and classified as problematic. The affected element is an unknown function of the component WebSocket Endpoint. The manipulation results in resource consumption.
This vulnerability is cataloged as CVE-2026-23538. The attack may be launched remotely. There is no exploit available.
A vulnerability has been found in feast-dev feast and classified as critical. Impacted is an unknown function of the file /save-document. The manipulation leads to path traversal.
This vulnerability is listed as CVE-2026-23537. The attack may be initiated remotely. There is no available exploit.
A vulnerability, which was classified as critical, was found in Apache Artemis and ActiveMQ Artemis on OpenWire. This issue affects some unknown processing of the component OpenWire Consumer Handler. Executing a manipulation can lead to permission issues.
This vulnerability is tracked as CVE-2026-32642. The attack can be launched remotely. No exploit exists.
You should upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in jetmonsters JetFormBuilder Plugin up to 3.5.6.2 on WordPress. This vulnerability affects the function Uploaded_File::set_from_array. Performing a manipulation results in absolute path traversal.
This vulnerability is identified as CVE-2026-4373. The attack can be initiated remotely. There is not any exploit available.
A vulnerability classified as critical was found in CTEK Chargeportal. This affects an unknown part. Such manipulation leads to insufficiently protected credentials.
This vulnerability is referenced as CVE-2026-28204. It is possible to launch the attack remotely. No exploit is available.
A vulnerability classified as critical has been found in IGL-Technologies eParking.fi. Affected by this issue is some unknown functionality. This manipulation causes insufficiently protected credentials.
The identification of this vulnerability is CVE-2026-31926. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability described as critical has been identified in OpenClaw up to 2026.2.20. Affected by this vulnerability is an unknown functionality of the component BlueBubbles Plugin. The manipulation results in missing authentication.
This vulnerability was named CVE-2026-32896. The attack may be performed from remote. There is no available exploit.
Upgrading the affected component is recommended.
A vulnerability marked as problematic has been reported in xhanch_studio Xhanch Plugin up to 1.1.2 on WordPress. Affected is the function xms_setting of the component Setting Handler. The manipulation of the argument favicon_url/ga_acc_id leads to cross-site request forgery.
This vulnerability is uniquely identified as CVE-2026-3332. The attack is possible to be carried out remotely. No exploit exists.
It is suggested to upgrade the affected component.
A vulnerability labeled as problematic has been found in iTracker360 Plugin up to 2.2.0 on WordPress. This impacts an unknown function of the component Setting Handler. Executing a manipulation can lead to cross site scripting.
This vulnerability is handled as CVE-2026-3572. The attack can be executed remotely. There is not any exploit available.
The affected component should be upgraded.
A vulnerability identified as problematic has been detected in squidowl halloy up to 2026.4. This affects an unknown function. Performing a manipulation results in incorrect permission assignment.
This vulnerability is known as CVE-2026-32810. Attacking locally is a requirement. No exploit is available.
It is suggested to install a patch to address this issue.
A vulnerability categorized as critical has been discovered in Discourse up to 2026.1.1/2026.2.0/2026.3.0-latest. The impacted element is an unknown function of the component Zendesk Plugin. Such manipulation leads to incorrect authorization.
This vulnerability is traded as CVE-2026-33291. The attack may be launched remotely. There is no exploit available.
It is advisable to upgrade the affected component.
A vulnerability was found in Discourse up to 2026.1.1/2026.2.0/2026.3.0-latest. It has been rated as problematic. The affected element is an unknown function of the component Content Security Policy Handler. This manipulation causes cross site scripting.
This vulnerability appears as CVE-2026-33411. The attack may be initiated remotely. There is no available exploit.
Upgrading the affected component is advised.
A vulnerability was found in barebox up to 2025.09.2/2026.03.0. It has been declared as critical. Impacted is an unknown function. The manipulation results in insufficient verification of data authenticity.
This vulnerability is reported as CVE-2026-33243. The attack requires a local approach. No exploit exists.
It is recommended to upgrade the affected component.
A vulnerability was found in avo-hq avo up to 3.30.2. It has been classified as problematic. This issue affects some unknown processing. The manipulation of the argument return_to leads to cross site scripting.
This vulnerability is documented as CVE-2026-33209. The attack can be initiated remotely. There is not any exploit available.
Upgrading the affected component is recommended.
A vulnerability was found in CTEK Chargeportal and classified as critical. This vulnerability affects unknown code. Executing a manipulation can lead to session expiration.
This vulnerability is registered as CVE-2026-27649. It is possible to launch the attack remotely. No exploit is available.
A vulnerability has been found in Automated Logic WebCTRL Premium Server up to 8.4 and classified as problematic. This affects an unknown part. Performing a manipulation results in multiple binds to the same port. This vulnerability only affects products that are no longer supported by the maintainer.
This vulnerability is cataloged as CVE-2026-25086. The attack must be initiated from a local position. There is no exploit available.
The affected component should be upgraded.
A vulnerability, which was classified as problematic, was found in Imagination Graphics DDK up to 23.2 RTM/25.1 RTM. Affected by this issue is some unknown functionality of the component Switch Statements. Such manipulation leads to use of out-of-range pointer offset.
This vulnerability is listed as CVE-2026-21732. The attack must be carried out from within the local network. There is no available exploit.
You should upgrade the affected component.