A vulnerability was found in OpenSSL up to 3.0.19/3.3.6/3.4.4/3.5.5/3.6.1. It has been declared as problematic. The affected element is the function RSA_public_encrypt of the component RSA KEM RSASVE Encapsulation. Executing a manipulation can lead to uninitialized pointer.
This vulnerability is registered as CVE-2026-31790. It is possible to launch the attack remotely. No exploit is available.
It is recommended to upgrade the affected component.
A vulnerability described as critical has been identified in OpenSSL up to 3.0.19/3.3.6/3.4.4/3.5.5/3.6.1. Affected by this issue is some unknown functionality of the component Hexadecimal Conversion Handler. Executing a manipulation can lead to heap-based buffer overflow.
This vulnerability is handled as CVE-2026-31789. The attack can be executed remotely. There is not any exploit available.
Upgrading the affected component is recommended.
A vulnerability identified as problematic has been detected in OpenSSL up to 3.6.1. This impacts an unknown function of the component Delta CRL Handler. This manipulation causes null pointer dereference.
This vulnerability appears as CVE-2026-28388. The attack may be initiated remotely. There is no available exploit.
You should upgrade the affected component.
A vulnerability labeled as problematic has been found in OpenSSL up to 3.6.1. Affected is the function CMS_decrypt of the component CMS EnvelopedData Message Handler. Such manipulation leads to null pointer dereference.
This vulnerability is traded as CVE-2026-28389. The attack may be launched remotely. There is no exploit available.
The affected component should be upgraded.
A vulnerability categorized as critical has been discovered in OpenSSL up to 3.6.1. This affects an unknown function of the component DANE Client Code. The manipulation results in use after free.
This vulnerability is reported as CVE-2026-28387. The attack can be launched remotely. No exploit exists.
It is advisable to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in ReviewX Plugin up to 1.6.13 on WordPress. This vulnerability affects unknown code of the component Usermeta Update Handler. This manipulation causes improper privilege management.
This vulnerability is tracked as CVE-2023-2833. The attack is possible to be carried out remotely. No exploit exists.
A vulnerability was found in vcita Contact Form and Calls to Action Plugin up to 2.6.4 on WordPress. It has been classified as problematic. This vulnerability affects unknown code. The manipulation leads to cross-site request forgery.
This vulnerability is referenced as CVE-2023-2303. Remote exploitation of the attack is possible. No exploit is available.
A vulnerability categorized as problematic has been discovered in vcita Event Registration Calendar Plugin up to 1.3.1/3.9.1 on WordPress. The affected element is an unknown function. Such manipulation leads to cross site scripting.
This vulnerability is listed as CVE-2023-2406. The attack may be performed from remote. There is no available exploit.
A vulnerability identified as problematic has been detected in vcita CRM and Lead Management Plugin up to 2.6.2 on WordPress. The impacted element is an unknown function. Performing a manipulation results in cross-site request forgery.
This vulnerability is cataloged as CVE-2023-2405. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability classified as problematic has been found in vcita Event Registration Calendar Plugin up to 1.3.1/3.9.1 on WordPress. Affected by this vulnerability is an unknown functionality. This manipulation causes cross-site request forgery.
This vulnerability appears as CVE-2023-2407. The attack may be initiated remotely. There is no available exploit.
A vulnerability was found in vcita Online Booking & Scheduling Calendar Plugin up to 4.2.10 on WordPress. It has been classified as problematic. The impacted element is the function vcita_logout_callback. Performing a manipulation results in cross-site request forgery.
This vulnerability is known as CVE-2023-2416. Remote exploitation of the attack is possible. No exploit is available.
A vulnerability has been found in WP User Switch Plugin up to 1.0.2 on WordPress and classified as critical. The affected element is an unknown function of the component Cookie Handler. Performing a manipulation results in improper authentication.
This vulnerability is cataloged as CVE-2023-2546. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability identified as critical has been detected in Delete All Comments Plugin up to 2.0 on WordPress. The impacted element is an unknown function of the file delete-all-comments.php. The manipulation leads to unrestricted upload.
This vulnerability is uniquely identified as CVE-2016-15033. The attack is possible to be carried out remotely. No exploit exists.
A vulnerability described as critical has been identified in User Submitted Posts Plugin up to 20190312 on WordPress. This affects the function usp_check_images. Executing a manipulation can lead to unrestricted upload.
The identification of this vulnerability is CVE-2019-25138. The attack may be launched remotely. There is no exploit available.
A vulnerability classified as critical has been found in Mesmerize Theme and Materialis Theme on WordPress. This vulnerability affects the function companion_disable_popup of the component Options Change Handler. The manipulation leads to missing authorization.
This vulnerability is referenced as CVE-2019-25142. Remote exploitation of the attack is possible. No exploit is available.