A vulnerability classified as critical was found in Mura up to 10.1.13. Impacted is the function getQuery of the file beanFeed.cfc. Such manipulation of the argument sortDirection leads to sql injection.
This vulnerability is traded as CVE-2025-67829. The attack may be launched remotely. There is no exploit available.
Upgrading the affected component is advised.
A vulnerability classified as problematic has been found in saadiqbal Post SMTP Plugin up to 3.8.0 on WordPress. This issue affects some unknown processing. This manipulation of the argument event_type causes cross site scripting.
This vulnerability appears as CVE-2026-3090. The attack may be initiated remotely. There is no available exploit.
A vulnerability described as problematic has been identified in MuraCMS up to 10.1.10. This vulnerability affects unknown code of the file csettings.cfc. The manipulation results in cross-site request forgery.
This vulnerability is reported as CVE-2025-55043. The attack can be launched remotely. No exploit exists.
A vulnerability marked as problematic has been reported in MuraCMS up to 10.1.10. This affects the function getUserManager of the file cUsers.cfc of the component User Management Handler. The manipulation of the argument groupId leads to cross-site request forgery.
This vulnerability is documented as CVE-2025-55041. The attack can be initiated remotely. There is not any exploit available.
A vulnerability labeled as problematic has been found in MuraCMS up to 10.1.10. Affected by this issue is some unknown functionality of the component Trash System. Executing a manipulation can lead to cross-site request forgery.
This vulnerability is registered as CVE-2025-55046. It is possible to launch the attack remotely. No exploit is available.
A vulnerability identified as problematic has been detected in MuraCMS up to 10.1.10. Affected by this vulnerability is an unknown functionality of the component Trash Restore. Performing a manipulation of the argument parentid results in cross-site request forgery.
This vulnerability is cataloged as CVE-2025-55044. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability categorized as problematic has been discovered in MuraCMS up to 10.1.10. Affected is an unknown function of the component Import Form. Such manipulation leads to cross-site request forgery.
This vulnerability is listed as CVE-2025-55040. The attack may be performed from remote. There is no available exploit.
A vulnerability was found in MuraCMS up to 10.1.10. It has been rated as problematic. This impacts an unknown function of the component Update Address. This manipulation causes cross-site request forgery.
This vulnerability is tracked as CVE-2025-55045. The attack is possible to be carried out remotely. No exploit exists.
A vulnerability was found in LoadNinja Plugin up to 2.1 on Jenkins. It has been declared as problematic. This affects an unknown function of the component Job Configuration Form Handler. The manipulation results in information disclosure.
This vulnerability is identified as CVE-2026-33004. The attack can be executed remotely. There is not any exploit available.
A vulnerability was found in Arturia Software Center 2.12.0.3157 on macOS. It has been classified as critical. The impacted element is an unknown function of the component Privileged Helper. The manipulation leads to missing authentication.
This vulnerability is referenced as CVE-2026-24062. The attack can only be performed from a local environment. No exploit is available.
A vulnerability was found in LoadNinja Plugin up to 2.1 on Jenkins and classified as critical. The affected element is an unknown function of the component Controller File System Handler. Executing a manipulation can lead to permission issues.
The identification of this vulnerability is CVE-2026-33003. The attack needs to be done within the local network. There is no exploit available.
A vulnerability has been found in Jenkins up to 2.426.2/2.441/2.540.x and classified as problematic. Impacted is an unknown function of the component CLI WebSocket Endpoint. Performing a manipulation results in reliance on reverse dns resolution.
This vulnerability was named CVE-2026-33002. The attack may be initiated remotely. There is no available exploit.
The affected component should be upgraded.
A vulnerability, which was classified as problematic, was found in dartiss Code Embed Plugin up to 2.5.1 on WordPress. This issue affects the function sec_check_post_fields of the component AJAX Endpoint. Such manipulation leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2026-2512. The attack can be launched remotely. No exploit exists.
A vulnerability, which was classified as critical, has been found in Jenkins. This vulnerability affects unknown code of the component Archives Handler. This manipulation causes permission issues.
This vulnerability is handled as CVE-2026-33001. The attack can only be done within the local network. There is not any exploit available.
It is advisable to upgrade the affected component.
A vulnerability classified as critical was found in Arturia Software Center 2.12.0.3157 on macOS. This affects an unknown part. The manipulation results in incorrect default permissions.
This vulnerability is known as CVE-2026-24063. Access to the local network is required for this attack. No exploit is available.
A vulnerability classified as critical has been found in iqonicdesign KiviCare Plugin up to 4.1.2 on WordPress. Affected by this issue is the function patientSocialLogin of the component HTTP Response Header Handler. The manipulation leads to improper authentication.
This vulnerability is traded as CVE-2026-2991. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability described as critical has been identified in iqonicdesign KiviCare Plugin up to 4.1.2 on WordPress. Affected by this vulnerability is an unknown functionality of the file /wp-json/kivicare/v1/setup-wizard/clinic of the component REST API Endpoint. Executing a manipulation can lead to missing authorization.
This vulnerability appears as CVE-2026-2992. The attack may be performed from remote. There is no available exploit.
A vulnerability marked as problematic has been reported in saadiqbal Post SMTP Plugin up to 3.8.0 on WordPress. Affected is the function handle_office365_oauth_redirect of the component Configuration Options Handler. Performing a manipulation results in missing authorization.
This vulnerability is reported as CVE-2026-2559. The attack is possible to be carried out remotely. No exploit exists.