A vulnerability was found in Apache Airflow up to 3.1.3. It has been classified as problematic. Impacted is an unknown function of the component Template Handler. This manipulation causes information disclosure.
This vulnerability is tracked as CVE-2025-66388. The attack is possible to be carried out remotely. No exploit exists.
Upgrading the affected component is recommended.
A vulnerability was found in Apache Airflow up to 3.1.3 and classified as problematic. This issue affects some unknown processing of the component kwargs. The manipulation results in information disclosure.
This vulnerability is identified as CVE-2025-65995. The attack can be executed remotely. There is not any exploit available.
It is suggested to upgrade the affected component.
A vulnerability has been found in Bookit Plugin up to 2.5.0 on WordPress and classified as problematic. This vulnerability affects unknown code of the component REST Endpoint. The manipulation leads to missing authorization.
This vulnerability is referenced as CVE-2025-12841. Remote exploitation of the attack is possible. No exploit is available.
The affected component should be upgraded.
A vulnerability, which was classified as critical, was found in Siemens Simcenter Femap. This affects an unknown part of the component SLDPRT File Parser. Executing manipulation can lead to uninitialized resource.
The identification of this vulnerability is CVE-2025-40829. The attack may be launched remotely. There is no exploit available.
You should upgrade the affected component.
A vulnerability, which was classified as critical, has been found in WooMulti Plugin up to 1.7 on WordPress. Affected by this issue is some unknown functionality. Performing manipulation results in path traversal.
This vulnerability was named CVE-2025-12835. The attack may be initiated remotely. There is no available exploit.
A vulnerability categorized as critical has been discovered in Visitor Logic Lite Plugin up to 1.0.3 on WordPress. Affected by this vulnerability is the function lp_track of the component Cookie Handler. Executing manipulation of the argument lpblocks can lead to deserialization.
This vulnerability is handled as CVE-2025-14044. The attack can be executed remotely. There is not any exploit available.
A vulnerability was found in WatchTowerHQ Plugin up to 3.15.0 on WordPress. It has been classified as problematic. Affected by this vulnerability is the function handle_big_object_download_request. Performing manipulation of the argument wht_download_big_object_origin results in path traversal.
This vulnerability is reported as CVE-2025-13972. The attack is possible to be carried out remotely. No exploit exists.
A vulnerability was found in URL Media Uploader Plugin up to 1.0.1 on WordPress. It has been declared as critical. Affected by this issue is the function url_media_uploader_url_upload_ajax_handler of the component File Upload. Executing manipulation can lead to missing authorization.
This vulnerability appears as CVE-2025-14045. The attack may be performed from remote. There is no available exploit.
A vulnerability described as problematic has been identified in SimplyConvert Plugin up to 1.0 on WordPress. The impacted element is an unknown function. Executing manipulation of the argument simplyconvert_hash can lead to cross site scripting.
The identification of this vulnerability is CVE-2025-14048. The attack may be launched remotely. There is no exploit available.
A vulnerability has been found in Reviews Sorted Plugin up to 2.4.2 on WordPress and classified as problematic. Affected by this issue is some unknown functionality of the component Shortcode Handler. Performing manipulation of the argument space results in cross site scripting.
This vulnerability is cataloged as CVE-2025-13969. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability was found in DebateMaster Plugin up to 1.0.0 on WordPress and classified as problematic. This affects the function debate. Executing manipulation can lead to cross site scripting.
This vulnerability is registered as CVE-2025-14035. It is possible to launch the attack remotely. No exploit is available.
A vulnerability was found in TWW Protein Calculator Plugin up to 1.0.24 on WordPress. It has been rated as problematic. Impacted is an unknown function of the component Setting Handler. This manipulation of the argument Header causes cross site scripting.
This vulnerability appears as CVE-2025-13971. The attack may be initiated remotely. There is no available exploit.
A vulnerability identified as problematic has been detected in Animated Pixel Marquee Creator Plugin up to 1.0.0 on WordPress. The impacted element is an unknown function. Performing manipulation of the argument marquee results in cross-site request forgery.
This vulnerability is known as CVE-2025-14062. Remote exploitation of the attack is possible. No exploit is available.
A vulnerability marked as problematic has been reported in Purchase and Expense Manager Plugin up to 1.1.2 on WordPress. This impacts the function sup_pt_handle_deletion. The manipulation leads to cross-site request forgery.
This vulnerability is uniquely identified as CVE-2025-13987. The attack is possible to be carried out remotely. No exploit exists.
A vulnerability labeled as problematic has been found in Paypal Payment Shortcode Plugin up to 1.01 on WordPress. Affected by this vulnerability is the function paypal-shortcode of the component Shortcode Handler. The manipulation of the argument buttom_image results in cross site scripting.
This vulnerability is known as CVE-2025-13966. It is possible to launch the attack remotely. No exploit is available.