A vulnerability was found in Canonical Juju up to 3.6.18. It has been classified as critical. This issue affects some unknown processing of the component Vault Secrets Back-End. Performing a manipulation results in improper authorization.
This vulnerability is identified as CVE-2026-32692. The attack can be initiated remotely. There is not any exploit available.
Upgrading the affected component is recommended.
A vulnerability was found in OpenText ZENworks Service Desk 25.2/25.3. It has been rated as problematic. The affected element is an unknown function. The manipulation leads to cross site scripting.
This vulnerability is listed as CVE-2026-3278. The attack may be initiated remotely. There is no available exploit.
A vulnerability was found in MuraCMS up to 10.1.10. It has been rated as problematic. This impacts an unknown function of the component Update Address. This manipulation causes cross-site request forgery.
This vulnerability is tracked as CVE-2025-55045. The attack is possible to be carried out remotely. No exploit exists.
A vulnerability categorized as problematic has been discovered in MuraCMS up to 10.1.10. Affected is an unknown function of the component Import Form. Such manipulation leads to cross-site request forgery.
This vulnerability is listed as CVE-2025-55040. The attack may be performed from remote. There is no available exploit.
A vulnerability identified as problematic has been detected in MuraCMS up to 10.1.10. Affected by this vulnerability is an unknown functionality of the component Trash Restore. Performing a manipulation of the argument parentid results in cross-site request forgery.
This vulnerability is cataloged as CVE-2025-55044. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability labeled as problematic has been found in MuraCMS up to 10.1.10. Affected by this issue is some unknown functionality of the component Trash System. Executing a manipulation can lead to cross-site request forgery.
This vulnerability is registered as CVE-2025-55046. It is possible to launch the attack remotely. No exploit is available.
A vulnerability marked as problematic has been reported in MuraCMS up to 10.1.10. This affects the function getUserManager of the file cUsers.cfc of the component User Management Handler. The manipulation of the argument groupId leads to cross-site request forgery.
This vulnerability is documented as CVE-2025-55041. The attack can be initiated remotely. There is not any exploit available.
A vulnerability described as problematic has been identified in MuraCMS up to 10.1.10. This vulnerability affects unknown code of the file csettings.cfc. The manipulation results in cross-site request forgery.
This vulnerability is reported as CVE-2025-55043. The attack can be launched remotely. No exploit exists.
A vulnerability was found in Linux Kernel up to 6.12.76/6.18.16/6.19.6/7.0-rc2. It has been declared as critical. This affects the function nvme_pr_read_keys. Such manipulation of the argument num_keys leads to allocation of resources.
This vulnerability is listed as CVE-2026-23244. The attack must be carried out from within the local network. There is no available exploit.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.19.5. It has been rated as critical. This vulnerability affects the function ntfs_load_attr_list of the component ntfs3. Performing a manipulation results in denial of service.
This vulnerability is cataloged as CVE-2025-71267. The attack must originate from the local network. There is no exploit available.
Upgrading the affected component is advised.
A vulnerability was found in Linux Kernel up to 6.19.5. It has been classified as critical. Affected by this issue is the function indx_find of the component ntfs3. This manipulation causes denial of service.
This vulnerability is tracked as CVE-2025-71266. The attack is only possible within the local network. No exploit exists.
Upgrading the affected component is recommended.
A vulnerability classified as problematic was found in Bpftpserver BulletProof FTP Server 2019.0.0.50. This impacts an unknown function of the component Setting Handler. Such manipulation of the argument DNS Address leads to assumed-immutable data is stored in writable memory.
This vulnerability is traded as CVE-2019-25588. An attack has to be approached locally. Furthermore, there is an exploit available.
A vulnerability identified as problematic has been detected in code-projects Simple Food Ordering System up to 1.0. Affected by this vulnerability is an unknown functionality of the file /food/sql/food.sql of the component Database Backup Handler. The manipulation leads to files or directories accessible.
This vulnerability is traded as CVE-2026-4532. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
It is recommended to change the configuration settings.
A vulnerability was found in SPIP up to 4.4.12. It has been rated as problematic. This affects an unknown part of the component Data Structure Handler. This manipulation causes function call with incorrect variable or reference as argument.
This vulnerability is tracked as CVE-2026-33549. The attack is possible to be carried out remotely. No exploit exists.
Upgrading the affected component is advised.
A vulnerability categorized as problematic has been discovered in Yoast SEO Plugin up to 27.1.1 on WordPress. This vulnerability affects unknown code of the component Block Attribute Handler. Such manipulation leads to cross site scripting.
This vulnerability is listed as CVE-2026-3427. The attack may be performed from remote. There is no available exploit.
A vulnerability, which was classified as problematic, was found in Alinto SOGo up to 5.12.4. Affected by this vulnerability is an unknown functionality. Executing a manipulation can lead to use of single-factor authentication.
This vulnerability is handled as CVE-2026-33550. The attack can be executed remotely. There is not any exploit available.
You should upgrade the affected component.