A vulnerability identified as critical has been detected in Autonomy Logic OpenPLC Runtime. Affected by this vulnerability is an unknown functionality of the file /upload-program-action. The manipulation of the argument epoch_time leads to improper control of resource through lifetime.
This vulnerability is traded as CVE-2025-34226. It is possible to initiate the attack remotely. There is no exploit available.
Applying a patch is the recommended action to fix this issue.
A vulnerability, which was classified as critical, has been found in mmaitre314 picklescan up to 0.0.30. This issue affects some unknown processing. The manipulation leads to protection mechanism failure.
This vulnerability is uniquely identified as CVE-2025-10157. The attack is possible to be carried out remotely. No exploit exists.
A vulnerability categorized as critical has been discovered in Autodesk 3ds Max 2020/2021/2021.3.8/2022/2022.3.3. Impacted is an unknown function of the component RBG File Parser. Such manipulation leads to out-of-bounds write.
This vulnerability is uniquely identified as CVE-2025-6633. The attack can be launched remotely. No exploit exists.
It is advisable to upgrade the affected component.
A vulnerability labeled as problematic has been found in Ruijie NBR2000G, NBR1300G and NBR1000. The impacted element is an unknown function of the file /WEB_VMS/LEVEL15/. Such manipulation leads to information disclosure.
This vulnerability is listed as CVE-2025-34057. The attack may be performed from remote. There is no available exploit.
A vulnerability classified as critical was found in Mozilla Thunderbird up to 139. Affected by this issue is some unknown functionality. Such manipulation leads to memory corruption.
This vulnerability is traded as CVE-2025-6436. The attack may be launched remotely. There is no exploit available.
Upgrading the affected component is advised.
A vulnerability described as critical has been identified in Amazon JDBC Wrapper, Go Wrapper, NodeJS Wrapper, Python Wrapper and ODBC driver up to 2.6.4. The impacted element is an unknown function of the component Relational Database Service. Executing manipulation can lead to use of externally-controlled input to select classes or code.
This vulnerability is handled as CVE-2025-12967. The attack can be executed remotely. There is not any exploit available.
Upgrading the affected component is recommended.
A vulnerability marked as critical has been reported in filebrowser up to 2.45.0. Affected is an unknown function. This manipulation causes improper authorization.
This vulnerability is tracked as CVE-2025-64523. The attack is possible to be carried out remotely. No exploit exists.
It is suggested to upgrade the affected component.
A vulnerability classified as critical has been found in Red Hat Keycloak. Affected by this issue is some unknown functionality. This manipulation causes session expiration.
This vulnerability is handled as CVE-2025-12110. The attack can be initiated remotely. There is not any exploit available.
A vulnerability was found in Easy Social Share Buttons Plugin up to 10.7.0 on WordPress and classified as problematic. This affects an unknown function. Executing manipulation can lead to cross site scripting.
The identification of this vulnerability is CVE-2025-64198. The attack may be launched remotely. There is no exploit available.
It is suggested to upgrade the affected component.
A vulnerability was found in ThemeGoods Grand Conference Theme Custom Post Type Plugin up to 2.6.3 on WordPress. It has been declared as problematic. This issue affects some unknown processing. Executing manipulation can lead to cross site scripting.
This vulnerability is handled as CVE-2025-64224. The attack can be executed remotely. There is not any exploit available.
It is recommended to upgrade the affected component.
A vulnerability identified as problematic has been detected in icopydoc Import from YML Plugin up to 3.1.17 on WordPress. The impacted element is an unknown function. This manipulation causes cross site scripting.
The identification of this vulnerability is CVE-2025-64232. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability has been found in Edge-Themes Alloggio Plugin up to 1.8 on WordPress and classified as critical. Affected by this issue is some unknown functionality. This manipulation causes improper control of filename for include/require statement in php program ('php remote file inclusion').
This vulnerability appears as CVE-2025-64287. The attack may be initiated remotely. There is no available exploit.
A vulnerability identified as critical has been detected in Gallery Plugin up to 1.12.0 on WordPress. This vulnerability affects unknown code. Performing manipulation results in missing authorization.
This vulnerability was named CVE-2025-12377. The attack may be initiated remotely. There is no available exploit.
A vulnerability identified as problematic has been detected in PyTorch 2.5/2.7.1. Impacted is the function profiler.stop of the component PythonTracer. Performing manipulation results in denial of service.
This vulnerability is identified as CVE-2025-63396. The attack can be initiated remotely. There is not any exploit available.
A vulnerability has been found in IBM QRadar Security Information and Event Management up to 7.5.0 UP14 and classified as problematic. This affects an unknown part of the component Configuration File. The manipulation leads to password in configuration file.
This vulnerability is traded as CVE-2025-33119. It is possible to initiate the attack remotely. There is no exploit available.
The affected component should be upgraded.
A vulnerability was found in Microsoft Azure SDK for Java. It has been classified as critical. This affects an unknown part. The manipulation leads to protection mechanism failure.
This vulnerability is referenced as CVE-2020-16971. Remote exploitation of the attack is possible. No exploit is available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Convert WebP & AVIF Plugin up to 2.0.0 on WordPress. It has been rated as problematic. Affected by this issue is the function wp_ajax_wpqai_disconnect_quicq_afosto. This manipulation causes missing authorization.
This vulnerability is handled as CVE-2025-12015. The attack can be initiated remotely. There is not any exploit available.
A vulnerability labeled as problematic has been found in Angel Plugin up to 3.2.3 on WordPress. This issue affects some unknown processing of the component Media Upload Handler. Executing manipulation can lead to cross site scripting.
The identification of this vulnerability is CVE-2025-10295. The attack may be launched remotely. There is no exploit available.
A vulnerability described as critical has been identified in WP Headless CMS Framework Plugin up to 1.15 on WordPress. The affected element is an unknown function of the component Authorization Header Handler. The manipulation results in protection mechanism failure.
This vulnerability is identified as CVE-2025-11260. The attack can be executed remotely. There is not any exploit available.