A vulnerability, which was classified as problematic, has been found in WP-Reply Notify Plugin up to 1.1 on WordPress. Affected by this issue is some unknown functionality of the component Setting Handler. The manipulation leads to cross-site request forgery.
This vulnerability is handled as CVE-2023-7195. The attack may be launched remotely. There is no exploit available.
A vulnerability has been found in Ultimate Noindex Nofollow Tool Plugin up to 1.1.2 on WordPress and classified as problematic. This vulnerability affects unknown code of the component Setting Handler. The manipulation leads to cross-site request forgery.
This vulnerability was named CVE-2023-7196. The attack can be initiated remotely. There is no exploit available.
A vulnerability was found in aBitGone CommentSafe Plugin up to 1.0.0 on WordPress. It has been classified as problematic. Affected is an unknown function. The manipulation leads to cross-site request forgery.
This vulnerability is traded as CVE-2023-7174. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability was found in Marketing Twitter Bot Plugin up to 1.11 on WordPress. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Setting Handler. The manipulation leads to cross-site request forgery.
This vulnerability is handled as CVE-2023-7197. The attack may be launched remotely. There is no exploit available.
A vulnerability classified as problematic was found in Allow SVG Plugin up to 1.1 on WordPress. This vulnerability affects unknown code of the component SVG Handler. The manipulation leads to cross site scripting.
This vulnerability was named CVE-2023-6541. The attack can be initiated remotely. There is no exploit available.
A vulnerability, which was classified as problematic, has been found in coreActivity Plugin up to 1.8 on WordPress. This issue affects some unknown processing. The manipulation leads to cross site scripting.
The identification of this vulnerability is CVE-2024-0852. The attack may be initiated remotely. There is no exploit available.
A vulnerability, which was classified as critical, was found in LogDash Activity Log Plugin up to 1.1.3 on WordPress. Affected is an unknown function. The manipulation of the argument Username leads to sql injection.
This vulnerability is traded as CVE-2023-6030. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability classified as problematic was found in Zimbra Collaboration Suite up to 10.1. Affected by this vulnerability is an unknown functionality of the file /service/extension/graphql of the component Webmail. The manipulation leads to cross-site request forgery.
This vulnerability is known as CVE-2025-32354. The attack can be launched remotely. There is no exploit available.
A vulnerability was found in gorhill uBlock Origin up to 1.63.3b16. It has been classified as problematic. Affected is the function currentStateChanged of the file src/js/1p-filters.js of the component UI. The manipulation leads to inefficient regular expression complexity.
This vulnerability is traded as CVE-2025-4215. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in WolfNet IDX for Plugin up to 1.19.1 on WordPress and classified as problematic. This vulnerability affects unknown code of the component Setting Handler. The manipulation leads to cross site scripting.
This vulnerability was named CVE-2023-6783. The attack can be initiated remotely. There is no exploit available.
A vulnerability, which was classified as problematic, was found in Synacor Zimbra Collaboration Suite. Affected is an unknown function. The manipulation leads to cross site scripting.
This vulnerability is traded as CVE-2024-45516. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability was found in Microsoft Windows. It has been declared as critical. This vulnerability affects unknown code of the component Recovery Driver. The manipulation leads to link following.
This vulnerability was named CVE-2025-32721. Attacking locally is a requirement. There is no exploit available.
It is recommended to apply a patch to fix this issue.