A vulnerability classified as critical was found in gVectors wpDiscuz up to 7.6.46. Impacted is the function wpdAddSubscription of the file class.WpdiscuzHelperAjax.php. The manipulation results in improper control of interaction frequency.
This vulnerability is cataloged as CVE-2026-22216. The attack may be launched remotely. There is no exploit available.
Upgrading the affected component is advised.
A vulnerability was found in gVectors wpDiscuz up to 7.6.46. It has been rated as problematic. Affected by this issue is the function WpdiscuzHelperUpload. This manipulation causes cross site scripting.
This vulnerability is handled as CVE-2026-22210. The attack can be initiated remotely. There is not any exploit available.
Upgrading the affected component is advised.
A vulnerability identified as problematic has been detected in gVectors wpDiscuz up to 7.6.46. This vulnerability affects the function getIP. Performing a manipulation of the argument HTTP_CLIENT_IP/HTTP_X_FORWARDED_FOR results in use of less trusted source.
This vulnerability was named CVE-2026-22201. The attack may be initiated remotely. There is no available exploit.
You should upgrade the affected component.
A vulnerability described as critical has been identified in gVectors wpDiscuz up to 7.6.46. The affected element is the function wpdGetNonce. The manipulation of the argument User-Agent results in authentication bypass by spoofing.
This vulnerability is identified as CVE-2026-22199. The attack can be executed remotely. There is not any exploit available.
Upgrading the affected component is recommended.
A vulnerability was found in gVectors wpDiscuz up to 7.6.46 and classified as problematic. Affected by this issue is the function urldecode of the component Cookie Handler. The manipulation of the argument comment_author_email results in injection.
This vulnerability is reported as CVE-2026-22204. The attack can be launched remotely. No exploit exists.
It is suggested to upgrade the affected component.
A vulnerability was found in gVectors wpDiscuz up to 7.6.46. It has been rated as problematic. This issue affects some unknown processing of the component Social Login Handler. Performing a manipulation results in information disclosure.
This vulnerability is known as CVE-2026-22203. Remote exploitation of the attack is possible. No exploit is available.
Upgrading the affected component is advised.
A vulnerability has been found in gVectors wpDiscuz up to 7.6.46 and classified as problematic. This vulnerability affects unknown code of the component HMAC Key Handler. This manipulation causes cross-site request forgery.
This vulnerability is registered as CVE-2026-22202. Remote exploitation of the attack is possible. No exploit is available.
The affected component should be upgraded.
A vulnerability was found in gVectors wpDiscuz up to 7.6.46 and classified as problematic. This issue affects the function getFollowsPage. Such manipulation leads to cross-site request forgery.
This vulnerability is documented as CVE-2026-22215. The attack can be executed remotely. There is not any exploit available.
It is suggested to upgrade the affected component.
A vulnerability described as problematic has been identified in Erlang OTP. Affected by this issue is some unknown functionality in the library lib/inets/src/http_server/httpd_request.erl of the component RFC 9112. Executing a manipulation of the argument Content-Length can lead to http request smuggling.
The identification of this vulnerability is CVE-2026-23941. The attack may be launched remotely. There is no exploit available.
Upgrading the affected component is recommended.
A vulnerability classified as problematic has been found in Erlang OTP. This affects an unknown part in the library lib/ssh/src/ssh_transport.erl. The manipulation leads to highly compressed data.
This vulnerability is referenced as CVE-2026-23943. Remote exploitation of the attack is possible. No exploit is available.
A vulnerability, which was classified as critical, was found in Erlang OTP. Impacted is an unknown function in the library lib/ssh/src/ssh_sftpd.erl of the component ssh_sftpd. Such manipulation leads to path traversal.
This vulnerability is listed as CVE-2026-23942. The attack may be performed from remote. There is no available exploit.
A vulnerability labeled as problematic has been found in IBM QRadar up to up to 7.5.0. Affected by this vulnerability is an unknown functionality. The manipulation results in improper validation of syntactic correctness of input.
This vulnerability was named CVE-2025-13995. The attack may be performed from remote. There is no available exploit.
The affected component should be upgraded.
A vulnerability was found in Red Hat KeyCloak. It has been rated as critical. Impacted is an unknown function. The manipulation leads to permission issues.
This vulnerability is uniquely identified as CVE-2026-3121. The attack can only be initiated within the local network. No exploit exists.