A vulnerability, which was classified as problematic, has been found in WP-Reply Notify Plugin up to 1.1 on WordPress. Affected by this issue is some unknown functionality of the component Setting Handler. The manipulation leads to cross-site request forgery.
This vulnerability is handled as CVE-2023-7195. The attack may be launched remotely. There is no exploit available.
A vulnerability has been found in Ultimate Noindex Nofollow Tool Plugin up to 1.1.2 on WordPress and classified as problematic. This vulnerability affects unknown code of the component Setting Handler. The manipulation leads to cross-site request forgery.
This vulnerability was named CVE-2023-7196. The attack can be initiated remotely. There is no exploit available.
A vulnerability was found in aBitGone CommentSafe Plugin up to 1.0.0 on WordPress. It has been classified as problematic. Affected is an unknown function. The manipulation leads to cross-site request forgery.
This vulnerability is traded as CVE-2023-7174. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability was found in Marketing Twitter Bot Plugin up to 1.11 on WordPress. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Setting Handler. The manipulation leads to cross-site request forgery.
This vulnerability is handled as CVE-2023-7197. The attack may be launched remotely. There is no exploit available.
A vulnerability classified as problematic was found in Allow SVG Plugin up to 1.1 on WordPress. This vulnerability affects unknown code of the component SVG Handler. The manipulation leads to cross site scripting.
This vulnerability was named CVE-2023-6541. The attack can be initiated remotely. There is no exploit available.
A vulnerability, which was classified as problematic, has been found in coreActivity Plugin up to 1.8 on WordPress. This issue affects some unknown processing. The manipulation leads to cross site scripting.
The identification of this vulnerability is CVE-2024-0852. The attack may be initiated remotely. There is no exploit available.
A vulnerability, which was classified as critical, was found in LogDash Activity Log Plugin up to 1.1.3 on WordPress. Affected is an unknown function. The manipulation of the argument Username leads to sql injection.
This vulnerability is traded as CVE-2023-6030. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability classified as problematic was found in Zimbra Collaboration Suite up to 10.1. Affected by this vulnerability is an unknown functionality of the file /service/extension/graphql of the component Webmail. The manipulation leads to cross-site request forgery.
This vulnerability is known as CVE-2025-32354. The attack can be launched remotely. There is no exploit available.
A vulnerability was found in gorhill uBlock Origin up to 1.63.3b16. It has been classified as problematic. Affected is the function currentStateChanged of the file src/js/1p-filters.js of the component UI. The manipulation leads to inefficient regular expression complexity.
This vulnerability is traded as CVE-2025-4215. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in WolfNet IDX for Plugin up to 1.19.1 on WordPress and classified as problematic. This vulnerability affects unknown code of the component Setting Handler. The manipulation leads to cross site scripting.
This vulnerability was named CVE-2023-6783. The attack can be initiated remotely. There is no exploit available.
A vulnerability, which was classified as problematic, was found in Synacor Zimbra Collaboration Suite. Affected is an unknown function. The manipulation leads to cross site scripting.
This vulnerability is traded as CVE-2024-45516. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability was found in Microsoft Windows. It has been declared as critical. This vulnerability affects unknown code of the component Recovery Driver. The manipulation leads to link following.
This vulnerability was named CVE-2025-32721. Attacking locally is a requirement. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability, which was classified as problematic, was found in Microsoft Windows. Affected is an unknown function of the component Storage Management Provider. The manipulation leads to out-of-bounds read.
This vulnerability is traded as CVE-2025-33062. Local access is required to approach this attack. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Microsoft Windows. It has been classified as problematic. Affected is an unknown function of the component Shortcut Files. The manipulation leads to protection mechanism failure.
This vulnerability is traded as CVE-2025-47160. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Microsoft Windows Security App. It has been classified as problematic. Affected is an unknown function. The manipulation leads to file inclusion.
This vulnerability is traded as CVE-2025-47956. Local access is required to approach this attack. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Microsoft Windows and classified as critical. This issue affects some unknown processing of the component Remote Access Connection Manager. The manipulation leads to improper privilege management.
The identification of this vulnerability is CVE-2025-47955. An attack has to be approached locally. There is no exploit available.
It is recommended to apply a patch to fix this issue.