Attackers are exploiting a critical Fortinet FortiClient EMS flaw (CVE-2026-21643) that allows remote code execution via SQL injection. A critical Fortinet FortiClient EMS vulnerability, tracked as CVE-2026-21643 (CVSS score of 9.1), is now being actively exploited. Defused researchers warn that threat actors are exploiting the vulnerability in Fortinet’s FortiClient EMS platform. “Fortinet Forticlient EMS CVE-2026-21643 […]
A vulnerability was found in ArthurFiorette steam-trader 2.1.1. It has been classified as problematic. The impacted element is an unknown function of the file /users of the component API Endpoint. This manipulation causes information disclosure.
This vulnerability appears as CVE-2026-5128. The attack may be initiated remotely. There is no available exploit.
A vulnerability was found in ESET Protect and classified as problematic. The affected element is an unknown function. The manipulation results in observable response discrepancy.
This vulnerability is reported as CVE-2025-3716. The attacker must have access to the local network to execute the attack. No exploit exists.
It is suggested to upgrade the affected component.