A vulnerability was found in imprintnext Riaxe Product Customizer Plugin up to 2.1.2 on WordPress. It has been rated as critical. This issue affects the function product_data of the file /wp-json/InkXEProductDesignerLite/add-item-to-cart of the component REST API Endpoint. This manipulation of the argument options causes sql injection.
The identification of this vulnerability is CVE-2026-3599. It is possible to initiate the attack remotely. There is no exploit available.
Upgrading the affected component is advised.
A vulnerability was found in onlineada Accessibility Suite by Ability Plugin up to 4.20 on WordPress. It has been declared as critical. This vulnerability affects unknown code. The manipulation of the argument scan_id results in sql injection.
This vulnerability was named CVE-2026-3773. The attack may be performed from remote. There is no available exploit.
A vulnerability was found in imprintnext Riaxe Product Customizer Plugin up to 2.1.2 on WordPress. It has been classified as critical. This affects the function ink_pd_add_option. The manipulation of the argument opt_value leads to missing authorization.
This vulnerability is uniquely identified as CVE-2026-3596. The attack is possible to be carried out remotely. No exploit exists.
Upgrading the affected component is recommended.
A vulnerability was found in imprintnext Riaxe Product Customizer Plugin up to 2.1.2 on WordPress and classified as critical. Affected by this issue is the function inkxe_delete_customer of the file /wp-json/InkXEProductDesignerLite/customer/delete_customer of the component REST API. Executing a manipulation can lead to missing authorization.
This vulnerability is handled as CVE-2026-3595. The attack can be executed remotely. There is not any exploit available.
It is suggested to upgrade the affected component.
A vulnerability has been found in jconti Payment Gateway for Redsys & WooCommerce Lite Plugin up to 7.0.0 on WordPress and classified as critical. Affected by this vulnerability is the function successful_request. Performing a manipulation results in improper verification of cryptographic signature.
This vulnerability is known as CVE-2026-5050. Remote exploitation of the attack is possible. No exploit is available.
A vulnerability, which was classified as problematic, was found in LINE Client up to 26.2.x on iOS. Affected is an unknown function of the component Web Handler. Such manipulation leads to denial of service.
This vulnerability is traded as CVE-2026-3861. The attack may be launched remotely. There is no exploit available.
You should upgrade the affected component.
A vulnerability was found in Arcserve UDP Console 10.3 and classified as critical. The affected element is an unknown function. The manipulation results in incorrectly specified destination in a communication channel.
This vulnerability was named CVE-2026-40118. The attack may be performed from remote. There is no available exploit.
A vulnerability, which was classified as problematic, was found in Openfind MailGates and MailAudit. The impacted element is an unknown function of the component System File Handler. The manipulation results in crlf injection.
This vulnerability is known as CVE-2026-6351. It is possible to launch the attack remotely. No exploit is available.
You should upgrade the affected component.
A vulnerability has been found in Eaton IPP Software up to 1.x and classified as problematic. Impacted is an unknown function of the component Web Interface. The manipulation leads to improper restriction of excessive authentication attempts.
This vulnerability is uniquely identified as CVE-2026-22616. The attack is possible to be carried out remotely. No exploit exists.
The affected component should be upgraded.
A vulnerability, which was classified as problematic, has been found in Eaton IPP Software up to 1.x. The affected element is an unknown function. The manipulation leads to improper input validation.
This vulnerability is traded as CVE-2026-22615. It is possible to initiate the attack remotely. There is no exploit available.
It is advisable to upgrade the affected component.
A vulnerability has been found in Wago Smart Designer up to 2.33.1 and classified as problematic. This affects an unknown function. This manipulation causes information exposure through discrepancy.
This vulnerability is handled as CVE-2023-5872. The attack can be initiated remotely. There is not any exploit available.
A vulnerability, which was classified as critical, has been found in iandunn Basic Google Maps Placemarks Plugin up to 1.10.7 on WordPress. This impacts an unknown function. This manipulation causes missing authorization.
This vulnerability appears as CVE-2026-3581. The attack may be initiated remotely. There is no available exploit.
A vulnerability, which was classified as critical, has been found in iandunn Basic Google Maps Placemarks Plugin up to 1.10.7 on WordPress. This impacts an unknown function. This manipulation causes missing authorization.
This vulnerability appears as CVE-2026-3581. The attack may be initiated remotely. There is no available exploit.