A vulnerability was found in Samsung Devices. It has been declared as problematic. This vulnerability affects unknown code of the component Mdecservice. The manipulation leads to improper export of android application components.
This vulnerability was named CVE-2025-20952. Attacking locally is a requirement. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Plugin Upgrade Time Out Plugin up to 1.0 on WordPress and classified as problematic. Affected by this issue is some unknown functionality of the file WordPress/Plugin. The manipulation leads to cross-site request forgery.
This vulnerability is handled as CVE-2024-8243. The attack may be launched remotely. There is no exploit available.
A vulnerability has been found in TP-Link Tapo H200 V1 IoT Smart Hub up to 1.4.0 and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to cleartext storage of sensitive information.
This vulnerability is known as CVE-2025-3442. It is possible to launch the attack on the physical device. There is no exploit available.
A vulnerability, which was classified as critical, was found in Dell Client Platform BIOS up to 1.32.x/1.34.x/2.1.4/2.23.x. Affected is an unknown function. The manipulation leads to stack-based buffer overflow.
This vulnerability is traded as CVE-2025-29988. It is possible to launch the attack on the local host. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in WP MultiTasking Plugin up to 0.1.12 on WordPress. This issue affects some unknown processing of the component Setting Handler. The manipulation leads to cross-site request forgery.
The identification of this vulnerability is CVE-2024-6857. The attack may be initiated remotely. There is no exploit available.
A vulnerability classified as critical was found in HAProxy up to 3.1.6. This vulnerability affects the function sample_conv_regsub. The manipulation leads to heap-based buffer overflow.
This vulnerability was named CVE-2025-32464. The attack can be initiated remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability, which was classified as problematic, has been found in WP MultiTasking Plugin up to 0.1.12 on WordPress. Affected by this issue is some unknown functionality of the component Setting Handler. The manipulation leads to cross-site request forgery.
This vulnerability is handled as CVE-2024-6860. The attack may be launched remotely. There is no exploit available.
A vulnerability classified as problematic was found in dotCMS 22.02. This vulnerability affects unknown code of the component Maintenance Portlet. The manipulation leads to files or directories accessible.
This vulnerability was named CVE-2024-3164. The attack can be initiated remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.