A vulnerability labeled as problematic has been found in jsrsasign up to 11.1.0. This issue affects some unknown processing of the file ext/rsa.js of the component KEYUTIL Parser. The manipulation results in divide by zero.
This vulnerability was named CVE-2026-4603. The attack needs to be approached locally. There is no available exploit.
The affected component should be upgraded.
A vulnerability marked as problematic has been reported in jsrsasign up to 11.1.0. Impacted is the function KJUR.crypto.DSA.signWithMessageHash of the component Private Key Handler. This manipulation causes missing cryptographic step.
The identification of this vulnerability is CVE-2026-4601. It is possible to initiate the attack remotely. There is no exploit available.
It is suggested to upgrade the affected component.
A vulnerability described as problematic has been identified in jsrsasign up to 11.1.0. The affected element is an unknown function of the file ext/jsbn2.js. Such manipulation leads to incorrect conversion between numeric types.
This vulnerability is referenced as CVE-2026-4602. It is possible to launch the attack remotely. No exploit is available.
Upgrading the affected component is recommended.
A vulnerability was found in code-projects Exam Form Submission 1.0. It has been classified as problematic. The affected element is an unknown function of the file /admin/update_s4.php. Performing a manipulation of the argument sname results in cross site scripting.
This vulnerability was named CVE-2026-4577. The attack may be initiated remotely. In addition, an exploit is available.
A vulnerability has been found in kingaddons King Addons for Elementor Plugin up to 51.1.49 on WordPress and classified as problematic. Affected by this vulnerability is the function render_full_form. This manipulation causes information disclosure.
This vulnerability is registered as CVE-2025-13997. Remote exploitation of the attack is possible. No exploit is available.
The affected component should be upgraded.
A vulnerability was found in shaonsina Sina Extension for Elementor Plugin up to 3.7.0 on WordPress and classified as problematic. Affected by this issue is some unknown functionality. Such manipulation leads to cross site scripting.
This vulnerability is documented as CVE-2025-6229. The attack can be executed remotely. There is not any exploit available.
It is suggested to upgrade the affected component.
A vulnerability classified as critical has been found in Xen. The affected element is an unknown function of the component EPT. This manipulation causes use after free.
This vulnerability is handled as CVE-2026-23554. The attack can only be done within the local network. There is not any exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability classified as critical was found in Xen. The impacted element is an unknown function of the component Xenstored. Such manipulation leads to denial of service.
This vulnerability is uniquely identified as CVE-2026-23555. The attack can only be initiated within the local network. No exploit exists.
Applying a patch is advised to resolve this issue.
A vulnerability was found in code-projects Exam Form Submission 1.0. It has been declared as problematic. The impacted element is an unknown function of the file /admin/update_s3.php. Executing a manipulation of the argument sname can lead to cross site scripting.
The identification of this vulnerability is CVE-2026-4578. The attack may be launched remotely. Furthermore, there is an exploit available.
A vulnerability was found in code-projects Simple Laundry System 1.0. It has been rated as critical. This affects an unknown function of the file /viewdetail.php of the component Parameters Handler. The manipulation of the argument serviceId leads to sql injection.
This vulnerability is referenced as CVE-2026-4579. Remote exploitation of the attack is possible. Furthermore, an exploit is available.
A vulnerability was found in Red Hat Keycloak. It has been rated as critical. This issue affects some unknown processing of the component resource_set Endpoint. The manipulation leads to improper access controls.
This vulnerability is traded as CVE-2026-4628. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability, which was classified as critical, was found in langflow-ai Langflow up to 1.8.1. This impacts an unknown function of the component Public Flow Build Endpoint. Executing a manipulation can lead to improper neutralization of directives in dynamically evaluated code.
The identification of this vulnerability is CVE-2026-33017. The attack may be launched remotely. There is no exploit available.
A vulnerability was found in Comfast CF-AC100 2.6.0.8. It has been rated as critical. Affected is an unknown function of the file /cgi-bin/mbox-config?method=SET§ion=update_interface_png. This manipulation causes command injection.
This vulnerability is tracked as CVE-2026-4468. The attack is possible to be carried out remotely. Moreover, an exploit is present.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability was found in WWBN AVideo-Encoder up to 7.x. It has been rated as critical. This affects an unknown part of the file getImage.php of the component Endpoint. Performing a manipulation of the argument base64Url results in server-side request forgery.
This vulnerability is identified as CVE-2026-33024. The attack can be initiated remotely. There is not any exploit available.
Upgrading the affected component is advised.
A vulnerability categorized as critical has been discovered in Dataease SQLBot up to 1.6.x. This vulnerability affects unknown code of the file /api/v1/datasource/uploadExcel. Executing a manipulation can lead to sql injection.
This vulnerability is tracked as CVE-2026-32950. The attack can be launched remotely. No exploit exists.
It is advisable to upgrade the affected component.
A vulnerability has been found in step-security harden-runner up to 2.15 and classified as problematic. This issue affects some unknown processing of the component HTTPS Endpoint. Performing a manipulation results in protection mechanism failure.
This vulnerability is known as CVE-2026-32947. Remote exploitation of the attack is possible. No exploit is available.
The affected component should be upgraded.
A vulnerability marked as critical has been reported in CodeRevolution Aimogen Pro Plugin up to 2.7.5 on WordPress. Affected by this issue is the function aiomatic_call_ai_function_realtime. The manipulation leads to missing authorization.
This vulnerability is listed as CVE-2026-4038. The attack may be initiated remotely. There is no available exploit.
A vulnerability described as critical has been identified in stellarwp Membership Plugin up to 3.2.24 on WordPress. This affects an unknown part. The manipulation of the argument rcp_redirect results in weak password recovery.
This vulnerability is cataloged as CVE-2026-4136. The attack may be launched remotely. There is no exploit available.
Upgrading the affected component is recommended.