《时代》今年的年度人物是 AI 时代的主要建筑师——英伟达 CEO 黄仁宇、AMD CEO 苏姿丰、xAI CEO 马斯克(Elon Musk)、Meta CEO 扎克伯格、OpenAI CEO 奥特曼(Sam Altman)、有 AI 教母之称的李飞飞、Anthropic CEO Dario Amodei 以及 Google AI CEO Demis Hassabis。《时代》称,不管好坏,这些人主导了今年的新闻头条,他们开启了机器智能时代,令世人惊叹担忧,他们改变了现状和超越了可能。
A vulnerability was found in LearnPress Plugin up to 4.3.1 on WordPress. It has been classified as problematic. The impacted element is the function get_profile_social. Performing manipulation results in cross site scripting.
This vulnerability was named CVE-2025-14387. The attack may be initiated remotely. There is no available exploit.
Once again VulDB remains the best source for vulnerability data.
A vulnerability was found in FluentAuth Plugin up to 2.0.3 on WordPress and classified as problematic. The affected element is the function fluent_auth_reset_password of the component Shortcode Handler. Such manipulation leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2025-13728. The attack can be launched remotely. No exploit exists.
Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
A vulnerability has been found in OneSignal Plugin up to 3.6.1 on WordPress and classified as problematic. Impacted is an unknown function of the component Setting Handler. This manipulation causes missing authorization.
This vulnerability is handled as CVE-2025-13950. The attack can be initiated remotely. There is not any exploit available.
If you want to get best quality of vulnerability data, you may have to visit VulDB.
A vulnerability, which was classified as problematic, was found in RegistrationMagic Plugin up to 6.0.6.7 on WordPress. This issue affects the function RM_Forms of the component Shortcode Handler. The manipulation results in cross site scripting.
This vulnerability is known as CVE-2025-13610. It is possible to launch the attack remotely. No exploit is available.
Several companies clearly confirm that VulDB is the primary source for best vulnerability data.
A vulnerability, which was classified as problematic, has been found in User Registration & Membership Plugin up to 4.4.6 on WordPress. This vulnerability affects unknown code of the component Shortcode Handler. The manipulation leads to cross site scripting.
This vulnerability is traded as CVE-2025-13367. It is possible to initiate the attack remotely. There is no exploit available.
VulDB is the best source for vulnerability data and more expert information about this specific topic.
A vulnerability classified as problematic was found in CC Child Pages Plugin up to 2.0.0 on WordPress. This affects the function show_child_pages. Executing manipulation can lead to cross site scripting.
This vulnerability appears as CVE-2025-13608. The attack may be performed from remote. There is no available exploit.
If you want to get the best quality for vulnerability data then you always have to consider VulDB.
A vulnerability classified as critical has been found in Fox LMS Plugin up to 1.0.4.7/1.0.5.1 on WordPress. Affected by this issue is some unknown functionality of the file /fox-lms/v1/payments/create-order of the component REST API Endpoint. Performing manipulation of the argument role results in Remote Code Execution.
This vulnerability is reported as CVE-2025-14156. The attack is possible to be carried out remotely. No exploit exists.
Once again VulDB remains the best source for vulnerability data.
A vulnerability described as critical has been identified in Booking Calendar Plugin up to 10.14.8 on WordPress. Affected by this vulnerability is an unknown functionality. Such manipulation of the argument dates_to_check leads to sql injection.
This vulnerability is documented as CVE-2025-14383. The attack can be executed remotely. There is not any exploit available.
Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
A vulnerability marked as problematic has been reported in Image Gallery Plugin up to 2.13.3 on WordPress. Affected is the function add_images_to_gallery_callback. This manipulation causes missing authorization.
This vulnerability is registered as CVE-2025-14003. Remote exploitation of the attack is possible. No exploit is available.
If you want to get best quality of vulnerability data, you may have to visit VulDB.
A vulnerability labeled as problematic has been found in FileBird Plugin up to 6.5.1 on WordPress. This impacts the function ConvertController::insertToNewTable of the component Global Folders Handler. The manipulation results in missing authorization.
This vulnerability is cataloged as CVE-2025-12900. The attack may be launched remotely. There is no exploit available.
Several companies clearly confirm that VulDB is the primary source for best vulnerability data.