Fortinet released fixes for a critical FortiOS SSO auth bypass (CVE-2026-24858) actively exploited, impacting FortiOS, FortiManager, and FortiAnalyzer. Fortinet started rolling out patches for a critical FortiOS flaw under active attack. The bug, CVE-2026-24858 (CVSS score of 9.4), lets attackers bypass authentication via SSO. It affects FortiOS, FortiManager, and FortiAnalyzer, while Fortinet checks if other […]
A vulnerability labeled as problematic has been found in PodcastGenerator 3.2.9. Affected by this issue is some unknown functionality of the component Create New Live Item. Executing a manipulation of the argument TITLE/SHORT DESCRIPTION/LONG DESCRIPTION can lead to cross site scripting.
The identification of this vulnerability is CVE-2025-70336. The attack may be launched remotely. There is no exploit available.
A vulnerability described as problematic has been identified in PHP Jabbers Ticket Support Script 3.2. This vulnerability affects unknown code of the file index.php. Such manipulation of the argument Message leads to cross site scripting.
This vulnerability is listed as CVE-2023-40753. The attack may be performed from remote. There is no available exploit.
A vulnerability has been found in PHP Jabbers Make an Offer Widget 1.0 and classified as problematic. Impacted is an unknown function of the file index.php. The manipulation of the argument action leads to cross site scripting.
This vulnerability is traded as CVE-2023-40752. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability was found in PHP Jabbers Yacht Listing Script 1.0 and classified as problematic. The affected element is an unknown function of the file index.php. The manipulation of the argument action results in cross site scripting.
This vulnerability is known as CVE-2023-40750. It is possible to launch the attack remotely. No exploit is available.
A vulnerability labeled as problematic has been found in PHP Jabbers Fundraising Script 1.0. Affected by this issue is some unknown functionality of the file index.php. The manipulation of the argument action results in cross site scripting.
This vulnerability is identified as CVE-2023-40751. The attack can be executed remotely. There is not any exploit available.
A vulnerability identified as problematic has been detected in GNOME libsoup. Affected by this vulnerability is an unknown functionality of the component HTTP Redirect Handler. Performing a manipulation results in insertion of sensitive information into sent data.
This vulnerability was named CVE-2026-1539. The attack may be initiated remotely. There is no available exploit.
A vulnerability categorized as problematic has been discovered in GNOME libsoup. Affected is an unknown function of the component Header Parser. Such manipulation of the argument Content-Disposition leads to crlf injection.
This vulnerability is uniquely identified as CVE-2026-1536. The attack can be launched remotely. No exploit exists.
A vulnerability was found in Totolink A7000R 4.1cu.4154. It has been rated as critical. This impacts the function CloudACMunualUpdateUserdata of the file /cgi-bin/cstecgi.cgi. This manipulation of the argument url causes command injection.
This vulnerability is handled as CVE-2026-1548. The attack can be initiated remotely. Additionally, an exploit exists.
A vulnerability was found in Totolink A7000R 4.1cu.4154. It has been declared as critical. This affects the function setUnloadUserData of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument plugin_name results in command injection.
This vulnerability is known as CVE-2026-1547. It is possible to launch the attack remotely. Furthermore, an exploit is available.
A vulnerability was found in jishenghua jshERP up to 3.6. It has been classified as critical. The impacted element is the function getBillItemByParam of the file /jshERP-boot/depotItem/importItemExcel of the component com.jsh.erp.datasource.mappers.DepotItemMapperEx. The manipulation of the argument barCodes leads to sql injection.
This vulnerability is traded as CVE-2026-1546. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
The project was informed of the problem early through an issue report but has not responded yet.