Minister of Health Ana ‘Akau’ola told parliament on Thursday that an unnamed ransomware gang attacked the National Health Information System, demanding millions in ransom to restore it.
A vulnerability was found in Red Hat OpenShift AI. It has been rated as critical. Affected by this issue is some unknown functionality of the component TrustyAI Explainability Toolkit. The manipulation leads to os command injection.
This vulnerability is handled as CVE-2025-6193. The attack may be launched remotely. There is no exploit available.
A vulnerability was found in Adnan Haque Virtual Moderator Plugin up to 1.4 on WordPress. It has been declared as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to cross-site request forgery.
This vulnerability is known as CVE-2025-52772. The attack can be launched remotely. There is no exploit available.
A vulnerability was found in Creative-Solutions Creative Contact Form Plugin up to 1.0.0 on WordPress. It has been classified as problematic. Affected is an unknown function. The manipulation leads to cross-site request forgery.
This vulnerability is traded as CVE-2025-52794. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability was found in Esselink Settings Plugin up to 2.94 on WordPress and classified as problematic. This issue affects some unknown processing. The manipulation leads to cross-site request forgery.
The identification of this vulnerability is CVE-2025-52793. The attack may be initiated remotely. There is no exploit available.
A vulnerability has been found in r-win WP-DownloadCounter Plugin up to 1.01 on WordPress and classified as problematic. This vulnerability affects unknown code. The manipulation leads to cross-site request forgery.
This vulnerability was named CVE-2025-52790. The attack can be initiated remotely. There is no exploit available.
A vulnerability, which was classified as problematic, was found in George Lewe Lewe ChordPress Plugin up to 3.9.7 on WordPress. This affects an unknown part. The manipulation leads to cross-site request forgery.
This vulnerability is uniquely identified as CVE-2025-52789. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability, which was classified as problematic, has been found in Beee TinyNav Plugin up to 1.4 on WordPress. Affected by this issue is some unknown functionality. The manipulation leads to cross-site request forgery.
This vulnerability is handled as CVE-2025-52781. The attack may be launched remotely. There is no exploit available.
A vulnerability classified as problematic was found in Spoki Plugin up to 2.16.0 on WordPress. Affected by this vulnerability is an unknown functionality. The manipulation leads to cross site scripting.
This vulnerability is known as CVE-2025-50026. The attack can be launched remotely. There is no exploit available.
A vulnerability classified as problematic has been found in Rameez Iqbal Real Estate Manager Plugin up to 7.3 on WordPress. Affected is an unknown function. The manipulation leads to cross-site request forgery.
This vulnerability is traded as CVE-2025-50044. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability was found in Mohammad Parsa Logo Manager for Samandehi Plugin up to 0.5 on WordPress. It has been declared as problematic. This vulnerability affects unknown code. The manipulation leads to cross-site request forgery.
This vulnerability was named CVE-2025-52780. The attack can be initiated remotely. There is no exploit available.
A vulnerability was found in vgstef WP User Stylesheet Switcher Plugin up to 2.2.0 on WordPress. It has been rated as problematic. This issue affects some unknown processing. The manipulation leads to cross-site request forgery.
The identification of this vulnerability is CVE-2025-52792. The attack may be initiated remotely. There is no exploit available.
A vulnerability was found in hideoguchi Bluff Post Plugin up to 1.1.1 on WordPress. It has been classified as problematic. This affects an unknown part. The manipulation leads to cross-site request forgery.
This vulnerability is uniquely identified as CVE-2025-52784. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability was found in WP Inventory Manager Plugin up to 2.3.4 on WordPress and classified as problematic. Affected by this issue is some unknown functionality. The manipulation leads to cross-site request forgery.
This vulnerability is handled as CVE-2025-49977. The attack may be launched remotely. There is no exploit available.
A vulnerability has been found in Rameez Iqbal Real Estate Manager Plugin up to 7.3 on WordPress and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to cross-site request forgery.
This vulnerability is known as CVE-2025-52825. The attack can be launched remotely. There is no exploit available.
Citizen Lab and Google uncovered a new, sophisticated cyberattack linked to Russian state actors that exploits App-Specific Passwords, bypassing Multi-Factor Authentication. Discover how to protect yourself from these evolving threats.
A vulnerability, which was classified as critical, was found in Ali Irani Auto Upload Images Plugin up to 3.3.2 on WordPress. Affected is an unknown function. The manipulation leads to server-side request forgery.
This vulnerability is traded as CVE-2025-49985. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability, which was classified as problematic, has been found in King Rayhan Scroll UP Plugin up to 2.0 on WordPress. This issue affects some unknown processing. The manipulation leads to cross site scripting.
The identification of this vulnerability is CVE-2025-52782. The attack may be initiated remotely. There is no exploit available.
A vulnerability classified as critical was found in Joe Hoyle WPThumb Plugin up to 0.10 on WordPress. This vulnerability affects unknown code. The manipulation leads to server-side request forgery.
This vulnerability was named CVE-2025-49983. The attack can be initiated remotely. There is no exploit available.