A vulnerability categorized as problematic has been discovered in xlnt-community xlnt up to 1.6.1. Impacted is the function xlnt::detail::decode_base64 of the file source/detail/cryptography/base64.cpp of the component Encrypted XLSX File Parser. Executing a manipulation can lead to off-by-one.
This vulnerability appears as CVE-2026-2703. The attack requires local access. In addition, an exploit is available.
Applying a patch is advised to resolve this issue.
A vulnerability was found in Beetel 777VR1 up to 01.00.09. It has been rated as critical. This issue affects some unknown processing of the component WPA2 PSK. Performing a manipulation results in hard-coded credentials.
This vulnerability is reported as CVE-2026-2702. The attacker must have access to the local network to execute the attack. Moreover, an exploit is present.
The vendor was contacted early about this disclosure but did not respond in any way.
Read about the disconnect between CEO enthusiasm for AI and employee perception of its value, and learn how to build communication that moves adoption forward.
A vulnerability was found in code-projects Project Scholars Tracking System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /admin/save_user.php of the component Endpoint. Such manipulation of the argument firstname/lastname/username/password/user_id leads to sql injection.
This vulnerability is documented as CVE-2025-70152. The attack can be executed remotely. There is not any exploit available.
A vulnerability was found in code-projects Scholars Tracking System 1.0. It has been classified as critical. This affects an unknown part of the file update_profile_picture.php of the component Endpoint. This manipulation causes unrestricted upload.
This vulnerability is registered as CVE-2025-70151. Remote exploitation of the attack is possible. No exploit is available.
A vulnerability was found in XO Event Calendar Plugin up to 3.2.10 on WordPress and classified as problematic. Affected by this issue is the function xo_event_field of the component Shortcode Handler. The manipulation results in cross site scripting.
This vulnerability is cataloged as CVE-2026-0556. The attack may be launched remotely. There is no exploit available.
A vulnerability has been found in Groups Plugin up to 3.10.0 on WordPress and classified as problematic. Affected by this vulnerability is the function groups_group_info of the component Shortcode Handler. The manipulation leads to cross site scripting.
This vulnerability is listed as CVE-2026-0549. The attack may be initiated remotely. There is no available exploit.
A vulnerability, which was classified as problematic, was found in TalkJS Plugin up to 0.1.15 on WordPress. Affected is an unknown function of the component Setting Handler. Executing a manipulation of the argument welcomeMessage can lead to cross site scripting.
This vulnerability is tracked as CVE-2026-1055. The attack can be launched remotely. No exploit exists.
A vulnerability, which was classified as problematic, has been found in Easy Author Image Plugin up to 1.7 on WordPress. This impacts an unknown function of the component Profile Picture Handler. Performing a manipulation of the argument author_profile_picture_url results in cross site scripting.
This vulnerability is identified as CVE-2026-1373. The attack can be initiated remotely. There is not any exploit available.
A vulnerability classified as problematic was found in Shield Security Plugin up to 21.0.8 on WordPress. This affects the function isNonceVerifyRequired. Such manipulation leads to cross-site request forgery.
This vulnerability is referenced as CVE-2026-0722. It is possible to launch the attack remotely. No exploit is available.
A vulnerability classified as problematic has been found in TalkJS Plugin up to 0.1.15 on WordPress. The impacted element is an unknown function of the component Setting Handler. This manipulation of the argument welcomeMessage causes cross site scripting.
The identification of this vulnerability is CVE-2026-1055. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability described as problematic has been identified in DevVN Image Hotspot Plugin up to 1.2.9 on WordPress. The affected element is an unknown function. The manipulation of the argument hotspot_content results in cross site scripting.
This vulnerability was named CVE-2025-14445. The attack may be performed from remote. There is no available exploit.
A vulnerability marked as problematic has been reported in DevVN Image Hotspot Plugin up to 1.2.9 on WordPress. Impacted is the function hotspot_content of the component Custom Fields Handler. The manipulation leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2025-14445. The attack is possible to be carried out remotely. No exploit exists.
A vulnerability labeled as problematic has been found in Shield Security Plugin up to 21.0.8 on WordPress. This issue affects some unknown processing. Executing a manipulation of the argument Message can lead to cross site scripting.
This vulnerability is handled as CVE-2026-0561. The attack can be executed remotely. There is not any exploit available.
A vulnerability identified as problematic has been detected in WP Customer Reviews Plugin up to 3.7.5 on WordPress. This vulnerability affects unknown code. Performing a manipulation of the argument wpcr3_fname results in cross site scripting.
This vulnerability is known as CVE-2025-14452. Remote exploitation of the attack is possible. No exploit is available.