A threat actor tracked as Storm-2561 is distributing fake enterprise VPN clients from Ivanti, Cisco, and Fortinet to steal VPN credentials from unsuspecting users. [...]
A vulnerability classified as critical has been found in ABB AWIN GW100 and AWIN GW120 2.0-0/2.0-1. This affects an unknown part. Performing a manipulation results in authentication bypass by capture-replay.
This vulnerability is cataloged as CVE-2025-13777. The attack must originate from the local network. There is no exploit available.
A vulnerability was found in Google Chrome. It has been rated as critical. This affects an unknown function of the component WebML. The manipulation leads to heap-based buffer overflow.
This vulnerability is uniquely identified as CVE-2026-3913. The attack is possible to be carried out remotely. No exploit exists.
Upgrading the affected component is advised.
A vulnerability labeled as critical has been found in Google Chrome. Affected by this vulnerability is an unknown functionality of the component WebML. Such manipulation leads to integer underflow.
This vulnerability is referenced as CVE-2026-3914. It is possible to launch the attack remotely. No exploit is available.
The affected component should be upgraded.
A vulnerability classified as critical was found in Google Chrome. This issue affects some unknown processing of the component WebMCP. The manipulation results in use after free.
This vulnerability is cataloged as CVE-2026-3918. The attack may be launched remotely. There is no exploit available.
Upgrading the affected component is advised.
A vulnerability, which was classified as critical, was found in Google Chrome. The affected element is an unknown function of the component WebML. Such manipulation leads to heap-based buffer overflow.
This vulnerability is documented as CVE-2026-3915. The attack can be executed remotely. There is not any exploit available.
You should upgrade the affected component.
Forget stolen credentials and misconfigurations. Thanks to AI, the new top cause of compromises in the cloud is vulnerability exploits that beat patching cycles.
A vulnerability described as problematic has been identified in libarchive. Affected by this issue is the function archive_read_data of the component RAR5 Decompression Handler. Such manipulation leads to infinite loop.
This vulnerability is listed as CVE-2026-4111. The attack may be performed from remote. There is no available exploit.
A vulnerability marked as problematic has been reported in shufflehound Lemmony Plugin up to 1.7.1 on WordPress. Affected by this vulnerability is an unknown functionality. This manipulation causes cross-site request forgery.
This vulnerability is tracked as CVE-2026-32328. The attack is possible to be carried out remotely. No exploit exists.
It is suggested to upgrade the affected component.
A vulnerability labeled as problematic has been found in RealMag777 MDTF Plugin up to 1.3.5 on WordPress. Affected is an unknown function. The manipulation results in cross site scripting.
This vulnerability is identified as CVE-2026-32455. The attack can be executed remotely. There is not any exploit available.
A vulnerability identified as problematic has been detected in desertthemes Corpiva Plugin up to 1.0.96 on WordPress. This impacts an unknown function. The manipulation leads to cross-site request forgery.
This vulnerability is referenced as CVE-2026-32344. Remote exploitation of the attack is possible. No exploit is available.
A vulnerability categorized as problematic has been discovered in Ays Pro Quiz Maker Plugin up to 6.7.1.2 on WordPress. This affects an unknown function. Executing a manipulation can lead to cross-site request forgery.
The identification of this vulnerability is CVE-2026-32342. The attack may be launched remotely. There is no exploit available.
A vulnerability was found in ThemeFusion Avada Core Plugin up to 5.15.0 on WordPress. It has been rated as problematic. The impacted element is an unknown function. Performing a manipulation results in cross site scripting.
This vulnerability was named CVE-2026-32454. The attack may be initiated remotely. There is no available exploit.
Upgrading the affected component is advised.
A vulnerability was found in Liton Arefin Master Addons for Elementor Plugin up to 2.1.3 on WordPress. It has been declared as problematic. The affected element is an unknown function. Such manipulation leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2026-32462. The attack can be launched remotely. No exploit exists.
A vulnerability was found in Ruben Garcia GamiPress Plugin up to 7.6.6 on WordPress. It has been classified as problematic. Impacted is an unknown function. This manipulation causes cross-site request forgery.
This vulnerability is handled as CVE-2026-32420. The attack can be initiated remotely. There is not any exploit available.
A vulnerability was found in Janis Elsts Admin Menu Editor Plugin up to 1.14.1 on WordPress and classified as problematic. This issue affects some unknown processing. The manipulation results in cross-site request forgery.
This vulnerability is known as CVE-2026-32456. It is possible to launch the attack remotely. No exploit is available.
A vulnerability has been found in E2Pdf Plugin up to 1.28.15 on WordPress and classified as critical. This vulnerability affects unknown code. The manipulation leads to missing authorization.
This vulnerability is traded as CVE-2026-32442. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability, which was classified as problematic, was found in themifyme Themify Event Post Plugin up to 1.3.4 on WordPress. This affects an unknown part. Executing a manipulation can lead to cross site scripting.
This vulnerability appears as CVE-2026-32449. The attack may be performed from remote. There is no available exploit.
A vulnerability, which was classified as problematic, has been found in Noor Alam Magical Addons for Elementor Plugin up to 1.4.1 on WordPress. Affected by this issue is some unknown functionality. Performing a manipulation results in cross site scripting.
This vulnerability is reported as CVE-2026-32429. The attack is possible to be carried out remotely. No exploit exists.