A vulnerability was found in WP Responsive Tabs Plugin up to 1.2.9 on WordPress. It has been declared as problematic. This vulnerability affects unknown code. The manipulation leads to cross site scripting.
This vulnerability was named CVE-2024-13387. The attack can be initiated remotely. There is no exploit available.
A vulnerability was found in Admin and Customer Messages After Order for WooCommerce Plugin up to 13.2 on WordPress. It has been classified as problematic. This affects an unknown part of the component File Upload. The manipulation leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2024-13355. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability was found in Passwords Manager Plugin up to 1.4.8 on WordPress and classified as problematic. Affected by this issue is some unknown functionality of the component Encryption Key Handler. The manipulation leads to missing authorization.
This vulnerability is handled as CVE-2024-12614. The attack may be launched remotely. There is no exploit available.
A vulnerability has been found in Passwords Manager Plugin up to 1.4.8 on WordPress and classified as critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to sql injection.
This vulnerability is known as CVE-2024-12615. The attack can be launched remotely. There is no exploit available.
A vulnerability, which was classified as critical, was found in Passwords Manager Plugin up to 1.4.8 on WordPress. Affected is an unknown function. The manipulation leads to sql injection.
This vulnerability is traded as CVE-2024-12613. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability, which was classified as critical, has been found in Multi Step Form Plugin up to 1.7.23 on WordPress. This issue affects some unknown processing of the component File Upload. The manipulation leads to missing authorization.
The identification of this vulnerability is CVE-2024-12427. The attack may be initiated remotely. There is no exploit available.
A vulnerability classified as critical was found in Kubernetes on Windows. This vulnerability affects unknown code of the file nodes/*/logs/query of the component Kubelet. The manipulation leads to command injection.
This vulnerability was named CVE-2024-9042. The attack needs to be initiated within the local network. There is no exploit available.
Ivanti has rolled out security updates to address several security flaws impacting Avalanche, Application Control Engine, and Endpoint Manager (EPM), including four critical bugs that could lead to information disclosure.
All the four critical security flaws, rated 9.8 out of 10.0 on the CVSS scale, are rooted in EPM, and concern instances of absolute path traversal that allow a remote
A vulnerability classified as critical has been found in DDSN Acora CMS 10.1.1. This affects an unknown part. The manipulation of the argument table leads to sql injection.
This vulnerability is uniquely identified as CVE-2025-22964. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability was found in termius up to 9.8.x. It has been rated as problematic. Affected by this issue is some unknown functionality of the component DYLD_INSERT_LIBRARIES. The manipulation leads to Local Privilege Escalation.
This vulnerability is handled as CVE-2024-55503. Local access is required to approach this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in parse-uri 1.0.9. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the component URL Handler. The manipulation leads to inefficient regular expression complexity.
This vulnerability is known as CVE-2024-36751. The attack can be launched remotely. There is no exploit available.
A vulnerability was found in Aginode GigaSwitch 5. It has been classified as problematic. Affected is an unknown function of the component SCP Command Handler. The manipulation leads to information disclosure.
This vulnerability is traded as CVE-2024-39967. The attack needs to be approached within the local network. There is no exploit available.
A vulnerability was found in Process Maker pm4core-docker 4.1.21-RC7 and classified as problematic. This issue affects some unknown processing. The manipulation of the argument Name leads to cross site scripting.
The identification of this vulnerability is CVE-2024-41453. The attack may be initiated remotely. There is no exploit available.
A vulnerability has been found in HI-SCAN 6040i Hitrax HX-03-19-I and classified as problematic. This vulnerability affects unknown code of the component AsDB Service. The manipulation leads to information disclosure.
This vulnerability was named CVE-2024-48125. Access to the local network is required for this attack. There is no exploit available.
A vulnerability, which was classified as critical, was found in HI-SCAN 6040i Hitrax HX-03-19-I. This affects an unknown part of the component USB Autorun. The manipulation leads to unrestricted upload.
This vulnerability is uniquely identified as CVE-2024-48123. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability, which was classified as critical, has been found in RE11S 1.11. Affected by this issue is the function formWlSiteSurvey. The manipulation of the argument selSSID leads to stack-based buffer overflow.
This vulnerability is handled as CVE-2025-22907. The attack needs to be done within the local network. There is no exploit available.
A vulnerability classified as critical was found in NetVision Information airPASS. Affected by this vulnerability is an unknown functionality. The manipulation leads to os command injection.
This vulnerability is known as CVE-2025-0457. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.