Broadcom has issued security patches to address a high-severity security flaw in VMware Tools for Windows that could lead to an authentication bypass.
Tracked as CVE-2025-22230, the vulnerability is rated 7.8 on the ten-point Common Vulnerability Scoring System (CVSS).
"VMware Tools for Windows contains an authentication bypass vulnerability due to improper access control," Broadcom said in an
A vulnerability was found in wpweaver Weaver Xtreme Theme Support Plugin up to 6.4 on WordPress. It has been classified as problematic. Affected is an unknown function. The manipulation leads to cross site scripting.
This vulnerability is traded as CVE-2024-4939. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability, which was classified as problematic, has been found in GamiPress Plugin up to 1.1.4 on WordPress. This issue affects some unknown processing. The manipulation leads to cross site scripting.
The identification of this vulnerability is CVE-2024-5536. The attack may be initiated remotely. There is no exploit available.
A vulnerability, which was classified as problematic, was found in GP Premium Plugin up to 2.4.0 on WordPress. Affected is an unknown function. The manipulation leads to cross site scripting.
This vulnerability is traded as CVE-2024-3469. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability has been found in Download Manager Plugin up to 3.2.93 on WordPress and classified as problematic. Affected by this vulnerability is the function wpdm_modal_login_form of the component Shortcode Handler. The manipulation leads to cross site scripting.
This vulnerability is known as CVE-2024-4001. The attack can be launched remotely. There is no exploit available.
A vulnerability was found in WP Shortcodes Plugin up to 7.1.6 on WordPress and classified as problematic. Affected by this issue is the function su_lightbox of the component Shortcode Handler. The manipulation leads to cross site scripting.
This vulnerability is handled as CVE-2024-4821. The attack may be launched remotely. There is no exploit available.
A vulnerability was found in wpdevteam EmbedPress Plugin up to 4.0.1 on WordPress. It has been classified as problematic. This affects an unknown part. The manipulation leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2024-5571. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability, which was classified as problematic, was found in Ruby Pure Chat Plugin up to 2.22 on WordPress. This affects an unknown part. The manipulation leads to cross-site request forgery.
This vulnerability is uniquely identified as CVE-2024-35673. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability has been found in Fuji Electric Monitouch V-SFT and classified as very critical. This vulnerability affects unknown code of the component File Parser. The manipulation leads to type confusion.
This vulnerability was named CVE-2024-5597. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in phpMyFAQ up to 2.8.12. Affected by this issue is some unknown functionality of the component CAPTCHA Protection Mechanism. The manipulation as part of Request leads to 7pk security features.
This vulnerability is handled as CVE-2014-6050. The attack may be launched remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Clever Addons for Elementor Plugin up to 2.1.9 on WordPress. It has been rated as problematic. Affected by this issue is some unknown functionality of the component CAFE Widgets. The manipulation leads to cross site scripting.
This vulnerability is handled as CVE-2024-2350. The attack may be launched remotely. There is no exploit available.
A vulnerability classified as problematic has been found in Custom Dash Plugin up to 1.0.2 on WordPress. This affects an unknown part. The manipulation leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2024-4942. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability classified as problematic was found in Easy Social Like Box Plugin up to 4.0 on WordPress. This vulnerability affects unknown code of the component Shortcode Handler. The manipulation leads to cross site scripting.
This vulnerability was named CVE-2024-5224. The attack can be initiated remotely. There is no exploit available.
A vulnerability, which was classified as problematic, was found in EasyAzon Plugin up to 5.1.0 on WordPress. Affected is an unknown function. The manipulation of the argument easyazon-cloaking-locale leads to cross site scripting.
This vulnerability is traded as CVE-2023-6956. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability was found in Moneytizer Plugin up to 9.5.20 on WordPress and classified as problematic. Affected by this issue is some unknown functionality of the component AJAX Action Handler. The manipulation leads to cross-site request forgery.
This vulnerability is handled as CVE-2023-6968. The attack may be launched remotely. There is no exploit available.
A vulnerability was found in Testimonials Widget Plugin up to 4.0.4 on WordPress. It has been classified as problematic. This affects an unknown part of the component Shortcode Handler. The manipulation leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2024-4705. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability classified as problematic has been found in Simple Image Popup Shortcode Plugin up to 1.0 on WordPress. Affected is an unknown function of the component Shortcode Handler. The manipulation leads to cross site scripting.
This vulnerability is traded as CVE-2024-5342. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability was found in OpenBSD OpenSSH. It has been classified as very critical. Affected is an unknown function of the component PAM Module Handler. The manipulation leads to memory corruption.
This vulnerability is traded as CVE-2002-0640. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.