A vulnerability marked as problematic has been reported in Chamilo LMS up to 1.11.35. This impacts an unknown function. Performing a manipulation of the argument keyword results in cross site scripting.
This vulnerability is reported as CVE-2026-30882. The attack is possible to be carried out remotely. No exploit exists.
It is suggested to upgrade the affected component.
A vulnerability labeled as critical has been found in Craft CMS up to 4.17.4/5.9.10. This affects the function replaceFile. Such manipulation of the argument targetFilename leads to path traversal.
This vulnerability is documented as CVE-2026-32262. The attack can be executed remotely. There is not any exploit available.
The affected component should be upgraded.
A vulnerability identified as critical has been detected in Craft CMS up to 4.17.5/5.9.11. The impacted element is an unknown function. This manipulation causes incorrect authorization.
This vulnerability is registered as CVE-2026-32267. Remote exploitation of the attack is possible. No exploit is available.
You should upgrade the affected component.
A vulnerability categorized as problematic has been discovered in Craft CMS up to 4.17.4/5.9.10. The affected element is an unknown function. The manipulation results in use of externally-controlled input to select classes or code.
This vulnerability is cataloged as CVE-2026-32264. The attack may be launched remotely. There is no exploit available.
It is advisable to upgrade the affected component.
A vulnerability was found in Chamilo LMS up to 1.11.35. It has been rated as critical. Impacted is the function Database::escape_string of the component AJAX Endpoint. The manipulation leads to sql injection.
This vulnerability is listed as CVE-2026-30881. The attack may be initiated remotely. There is no available exploit.
Upgrading the affected component is advised.
A vulnerability was found in Chamilo LMS up to 1.11.35. It has been declared as problematic. This issue affects some unknown processing. Executing a manipulation can lead to observable response discrepancy.
This vulnerability is tracked as CVE-2026-30876. The attack can be launched remotely. No exploit exists.
It is recommended to upgrade the affected component.
A vulnerability was found in Buffalo TeraStation NAS TS5400R up to 4.02-0.06. It has been classified as problematic. This vulnerability affects unknown code. Performing a manipulation results in incorrect permission assignment. This vulnerability only affects products that are no longer supported by the maintainer.
This vulnerability is identified as CVE-2026-29516. The attack can be initiated remotely. There is not any exploit available.
A vulnerability was found in Chamilo LMS up to 1.11.33 and classified as critical. This affects an unknown part of the component Legacy Password Reset Handler. Such manipulation of the argument custom_dates leads to sql injection.
This vulnerability is referenced as CVE-2026-28430. It is possible to launch the attack remotely. No exploit is available.
It is suggested to upgrade the affected component.
A vulnerability has been found in p2r3 Bareiron 8e4d40 and classified as problematic. Affected by this issue is some unknown functionality. This manipulation causes denial of service.
The identification of this vulnerability is CVE-2025-69808. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability, which was classified as problematic, was found in Index-Education Pronote. Affected by this vulnerability is the function composeUrlImgPhotoIndividu of the file index.js. The manipulation results in missing authorization.
This vulnerability was named CVE-2025-69727. The attack may be performed from remote. There is no available exploit.
You should upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in Webhooks Plugin up to 3.1.x on Craftcms. Affected is the function renderString of the component That Call Handler. The manipulation leads to improper neutralization of special elements used in a template engine.
This vulnerability is uniquely identified as CVE-2026-32261. The attack is possible to be carried out remotely. No exploit exists.
It is advisable to upgrade the affected component.
A vulnerability classified as critical was found in p2r3 Bareiron 8e4d40. This impacts an unknown function. Executing a manipulation can lead to improper authentication.
This vulnerability is handled as CVE-2025-69809. The attack can be executed remotely. There is not any exploit available.
A vulnerability classified as problematic has been found in jlowin fastmcp up to 2.14.1. This affects an unknown function. Performing a manipulation of the argument resource results in incorrect authorization.
This vulnerability is known as CVE-2025-69196. Remote exploitation of the attack is possible. No exploit is available.
It is recommended to upgrade the affected component.
A vulnerability described as problematic has been identified in Craft CMS up to 5.9.10. The impacted element is the function Craft::configure of the file src/controllers/EntryTypesController.php of the component setting Handler. Such manipulation of the argument Settings leads to use of externally-controlled input to select classes or code.
This vulnerability is traded as CVE-2026-32263. The attack may be launched remotely. There is no exploit available.
Upgrading the affected component is recommended.
A vulnerability marked as problematic has been reported in FFmpeg up to 7.x/8.0.0/8.0. The affected element is an unknown function of the file libavcodec/rv60dec.c of the component RV60 Video Decoder. This manipulation causes out-of-bounds read.
This vulnerability appears as CVE-2025-69693. The attack may be initiated remotely. There is no available exploit.
It is suggested to upgrade the affected component.
A vulnerability labeled as critical has been found in Chamilo LMS up to 1.11.35. Impacted is an unknown function of the file h5p.json of the component H5P Import Feature. The manipulation results in code injection.
This vulnerability is reported as CVE-2026-30875. The attack can be launched remotely. No exploit exists.
The affected component should be upgraded.
The GlassWorm malware campaign is being used to fuel an ongoing attack that leverages the stolen GitHub tokens to inject malware into hundreds of Python repositories.
"The attack targets Python projects — including Django apps, ML research code, Streamlit dashboards, and PyPI packages — by appending obfuscated code to files like setup.py, main.py, and app.py," StepSecurity said. "Anyone who runs
Last week's cyberattack on medical technology giant Stryker was limited to its internal Microsoft environment and remotely wiped tens of thousands of employee devices. [...]