A vulnerability, which was classified as problematic, was found in Analytify Plugin up to 5.2.3 on WordPress. Affected is an unknown function. The manipulation leads to cross-site request forgery.
This vulnerability is traded as CVE-2024-35689. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability was found in HCL Connections Docs up to 2.0.2. It has been classified as problematic. This affects an unknown part. The manipulation leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2023-45707. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability, which was classified as problematic, has been found in Fahad Mahmood WP Docs Plugin up to 2.1.3 on WordPress. This issue affects some unknown processing. The manipulation leads to cross site scripting.
The identification of this vulnerability is CVE-2024-35696. The attack may be initiated remotely. There is no exploit available.
A vulnerability was found in gVectors wpDiscuz Plugin up to 7.6.18 on WordPress. It has been declared as problematic. This vulnerability affects unknown code. The manipulation leads to cross site scripting.
This vulnerability was named CVE-2024-35681. The attack can be initiated remotely. There is no exploit available.
A vulnerability was found in Themeisle Otter Blocks PRO Plugin up to 2.6.11 on WordPress. It has been rated as problematic. This issue affects some unknown processing. The manipulation leads to information disclosure.
The identification of this vulnerability is CVE-2024-35682. The attack may be initiated remotely. There is no exploit available.
Astral Foods, South Africa’s largest poultry producer, lost over $1M due to a cyberattack disrupting deliveries and impacting operations. Astral Foods is a South African integrated poultry producer and one of the country’s largest food companies. It specializes in poultry production, animal feed, and related agricultural operations. The company supplies chicken products to retail, wholesale, […]
A vulnerability, which was classified as problematic, has been found in Red Hat Keycloak and Single Sign-On 7. Affected by this issue is some unknown functionality of the component JWT Token Handler. The manipulation leads to allocation of resources.
This vulnerability is handled as CVE-2025-2559. The attack may be launched remotely. There is no exploit available.