A vulnerability was found in Linux Kernel up to 6.18.8 and classified as critical. This impacts the function auxiliary_device_init of the file drm/xe/ of the component nvm. The manipulation results in double free.
This vulnerability is cataloged as CVE-2026-23162. The attack must originate from the local network. There is no exploit available.
It is suggested to upgrade the affected component.
A vulnerability labeled as problematic has been found in neo4j Enterprise Edition and Community Edition 4.4.48/5.26.20/5.26.21. This affects an unknown part of the component Query Log. The manipulation results in cross site scripting.
This vulnerability is identified as CVE-2026-1337. The attack can be executed remotely. Additionally, an exploit exists.
The affected component should be upgraded.
A vulnerability identified as problematic has been detected in neo4j Enterprise Edition and Community Edition up to 4.4.47/5.26.20/2026.01.2. Affected is an unknown function of the component Query Log. The manipulation leads to sensitive information in log files.
This vulnerability is referenced as CVE-2026-1622. The attack can only be performed from a local environment. No exploit is available.
You should upgrade the affected component.
A vulnerability categorized as problematic has been discovered in Best-wp-google-map Plugin up to 2.1 on WordPress. Affected by this issue is some unknown functionality of the component Shortcode Handler. Such manipulation of the argument latitude/longitudinal leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2026-1096. The attack can be launched remotely. No exploit exists.
A vulnerability was found in Payment Page Form for Stripe Plugin up to 1.4.6 on WordPress and classified as problematic. This vulnerability affects unknown code of the component Payment Page. Such manipulation of the argument pricing_plan_select_text_font_family leads to cross site scripting.
This vulnerability is documented as CVE-2026-0751. The attack can be executed remotely. There is not any exploit available.
A vulnerability labeled as problematic has been found in AMP Enhancer Plugin up to 1.0.49 on WordPress. Impacted is an unknown function of the component Setting Handler. Executing a manipulation can lead to cross site scripting.
This vulnerability is tracked as CVE-2026-2027. The attack can be launched remotely. No exploit exists.
A vulnerability classified as problematic was found in Magic Login Mail or QR Code Plugin up to 2.05 on WordPress. This impacts the function wp_mail of the component QR Code File Storage. Such manipulation leads to race condition.
This vulnerability is documented as CVE-2026-2144. The attack can be executed remotely. There is not any exploit available.
A vulnerability classified as problematic was found in Appointment Booking Calendar Plugin up to 1.0.2 on WordPress. This issue affects some unknown processing of the component REST API Endpoint. The manipulation results in missing authorization.
This vulnerability is cataloged as CVE-2026-1932. The attack may be launched remotely. There is no exploit available.
A vulnerability was found in MDirector Newsletter Plugin up to 4.5.8 on WordPress and classified as problematic. Affected by this vulnerability is the function mdirectorNewsletterSave of the component Setting Handler. The manipulation results in cross-site request forgery.
This vulnerability is reported as CVE-2025-14852. The attack can be launched remotely. No exploit exists.
A vulnerability labeled as problematic has been found in User Language Switch Plugin up to 1.6.10 on WordPress. The affected element is an unknown function. The manipulation of the argument tab_color_picker_language_switch results in cross site scripting.
This vulnerability was named CVE-2026-0735. The attack may be performed from remote. There is no available exploit.
A vulnerability was found in Link Hopper Plugin up to 2.5 on WordPress. It has been classified as problematic. This issue affects some unknown processing. Performing a manipulation of the argument hop_name results in cross site scripting.
This vulnerability is reported as CVE-2025-15483. The attack is possible to be carried out remotely. No exploit exists.
A vulnerability identified as critical has been detected in Starfish Review Generation & Marketing Plugin up to 3.1.19 on WordPress. This impacts the function srm_restore_options_defaults. The manipulation leads to improper authorization.
This vulnerability is listed as CVE-2025-15157. The attack may be initiated remotely. There is no available exploit.
A vulnerability was found in BFG Tools Plugin up to 1.0.7 on WordPress. It has been rated as critical. Affected is the function zip of the file /wp-content/plugins/. The manipulation of the argument first_file leads to path traversal.
This vulnerability is referenced as CVE-2025-13681. Remote exploitation of the attack is possible. No exploit is available.
A vulnerability categorized as problematic has been discovered in StickEasy Protected Contact Form Plugin up to 1.0.1/1.0.2 on WordPress. Affected by this vulnerability is an unknown functionality of the file wp-content/uploads/stickeasy-protected-contact-form/spcf-log.txt. The manipulation results in information disclosure.
This vulnerability is identified as CVE-2025-13973. The attack can be executed remotely. There is not any exploit available.
A vulnerability identified as problematic has been detected in Easy Form Builder Plugin up to 3.9.3 on WordPress. Affected by this issue is some unknown functionality. This manipulation causes missing authorization.
This vulnerability is tracked as CVE-2025-14067. The attack is possible to be carried out remotely. No exploit exists.
A vulnerability labeled as problematic has been found in WP Last Modified Info Plugin up to 1.9.5 on WordPress. This affects the function bulk_save. Such manipulation of the argument post_ids leads to improper control of resource identifiers.
This vulnerability is listed as CVE-2025-14608. The attack may be performed from remote. There is no available exploit.
A vulnerability identified as problematic has been detected in BlueSnap Payment Gateway for WooCommerce Plugin up to 3.3.0 on WordPress. This issue affects the function WC_Geolocation::get_ip_address of the component X-Forwarded-For Handler. Performing a manipulation results in missing authorization.
This vulnerability is identified as CVE-2026-0692. The attack can be initiated remotely. There is not any exploit available.
A vulnerability marked as problematic has been reported in personal-authors-category Plugin up to 0.3 on WordPress. The affected element is an unknown function. The manipulation leads to cross site scripting.
This vulnerability is listed as CVE-2026-1754. The attack may be initiated remotely. There is no available exploit.
A vulnerability classified as problematic has been found in Easy Voice Mail Plugin up to 1.2.5 on WordPress. This affects an unknown function. This manipulation of the argument Message causes cross site scripting.
This vulnerability is registered as CVE-2026-1164. Remote exploitation of the attack is possible. No exploit is available.