A vulnerability was found in man-group dtale up to 3.21.x. It has been rated as problematic. This affects an unknown part. This manipulation causes cross site scripting.
This vulnerability is handled as CVE-2026-35052. The attack can be initiated remotely. There is not any exploit available.
Upgrading the affected component is advised.
A vulnerability was found in kedro-org kedro up to 1.2.x. It has been declared as critical. Affected by this issue is the function dictConfig. The manipulation of the argument KEDRO_LOGGING_CONFIG results in code injection.
This vulnerability is known as CVE-2026-35171. It is possible to launch the attack remotely. No exploit is available.
It is recommended to upgrade the affected component.
A vulnerability was found in oobabooga text-generation-webui up to 4.1.0. It has been classified as critical. Affected by this vulnerability is an unknown functionality of the file download-model.py of the component Setting Handler. The manipulation leads to path traversal.
This vulnerability is traded as CVE-2026-35050. It is possible to initiate the attack remotely. There is no exploit available.
Upgrading the affected component is recommended.
A vulnerability was found in BentoML up to 1.4.37 and classified as critical. Affected is the function generate_containerfile of the file src/bentoml/_internal/container/generate.py. Executing a manipulation can lead to improper neutralization of special elements used in a template engine.
This vulnerability appears as CVE-2026-35044. The attack may be performed from remote. There is no available exploit.
It is suggested to upgrade the affected component.
A vulnerability has been found in Ajax30 BraveCMS up to 2.0.5 and classified as critical. This impacts an unknown function of the file app/Http/Controllers/Dashboard/CkEditorController.php. Performing a manipulation results in unrestricted upload.
This vulnerability is reported as CVE-2026-35164. The attack is possible to be carried out remotely. No exploit exists.
The affected component should be upgraded.
A vulnerability, which was classified as critical, was found in devcode-it openstamanager up to 2.10.1. This affects an unknown function of the file confronta_righe.php of the component Customer Information Handler. Such manipulation of the argument righe leads to sql injection.
This vulnerability is documented as CVE-2026-35470. The attack can be executed remotely. There is not any exploit available.
You should upgrade the affected component.
A vulnerability, which was classified as critical, has been found in xenocrat chyrp-lite. The impacted element is an unknown function of the file config.json.php of the component Setting Handler. This manipulation causes path traversal.
This vulnerability is registered as CVE-2026-35174. Remote exploitation of the attack is possible. No exploit is available.
It is advisable to upgrade the affected component.
An Iran-nexus threat actor is suspected to be behind a password-spraying campaign targeting Microsoft 365 environments in Israel and the U.A.E. amid ongoing conflict in the Middle East.
The activity, assessed to be ongoing, was carried out in three distinct attack waves that took place on March 3, March 13, and March 23, 2026, per Check Point.
"The campaign is primarily
A vulnerability, which was classified as problematic, was found in Pierre Lebedel Kodex Posts Likes Plugin up to 2.5.0 on WordPress. This impacts an unknown function. The manipulation results in cross site scripting.
This vulnerability is known as CVE-2024-50464. It is possible to launch the attack remotely. No exploit is available.
A vulnerability categorized as problematic has been discovered in YITH WooCommerce Product Add-Ons Plugin up to 4.14.1 on WordPress. This issue affects some unknown processing. The manipulation results in cross site scripting.
This vulnerability is identified as CVE-2024-50448. The attack can be executed remotely. There is not any exploit available.
A vulnerability identified as problematic has been detected in FirelightWP Firelight Lightbox Plugin up to 2.3.3 on WordPress. Impacted is an unknown function. This manipulation causes cross site scripting.
This vulnerability is tracked as CVE-2024-50460. The attack is possible to be carried out remotely. No exploit exists.
A vulnerability labeled as problematic has been found in WPDeveloper EmbedPress Plugin up to 4.0.14 on WordPress. The affected element is an unknown function. Such manipulation leads to cross site scripting.
This vulnerability is listed as CVE-2024-50461. The attack may be performed from remote. There is no available exploit.
A vulnerability marked as problematic has been reported in Fla-shop Interactive World Map Plugin up to 3.4.4 on WordPress. The impacted element is an unknown function. Performing a manipulation results in cross site scripting.
This vulnerability is cataloged as CVE-2024-50462. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability described as problematic has been identified in Michael Robinson Raptor Editor Plugin up to 1.0.20 on WordPress. This affects an unknown function. Executing a manipulation can lead to cross site scripting.
This vulnerability is registered as CVE-2024-50468. It is possible to launch the attack remotely. No exploit is available.
A vulnerability classified as problematic has been found in Team Bright Vessel Textboxes Plugin up to 0.1.3.1 on WordPress. This impacts an unknown function. The manipulation leads to cross site scripting.
This vulnerability is documented as CVE-2024-50469. The attack can be initiated remotely. There is not any exploit available.
A vulnerability was found in WebXApp Scrollbar Plugin up to 1.3.0 on WordPress. It has been declared as problematic. Impacted is an unknown function. The manipulation results in cross site scripting.
This vulnerability was named CVE-2024-50467. The attack may be performed from remote. There is no available exploit.
A vulnerability was found in WPBlockArt Magazine Blocks Plugin up to 1.3.15 on WordPress. It has been rated as problematic. The affected element is an unknown function. This manipulation causes cross site scripting.
The identification of this vulnerability is CVE-2024-50429. It is possible to initiate the attack remotely. There is no exploit available.