A vulnerability, which was classified as problematic, was found in MetaSlider Slider, Gallery, and Carousel Plugin up to 3.98.0 on WordPress. This affects an unknown part. The manipulation of the argument aria-label leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2025-5337. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Ultra Addons for Contact Form 7 Plugin up to 3.5.12 on WordPress. Affected by this issue is the function save_options. The manipulation leads to unrestricted upload.
This vulnerability is handled as CVE-2025-6220. The attack may be launched remotely. There is no exploit available.
A vulnerability was found in Jmol Plugin up to 6.1 on Moodle. It has been declared as critical. Affected by this vulnerability is the function file_get_contents of the file jsmol.php of the component Query Parameter Handler. The manipulation leads to path traversal.
This vulnerability is known as CVE-2025-34031. The attack can be launched remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as critical, was found in TransformerOptimus SuperAGI up to 0.0.14. Affected is the function download_attachment of the file SuperAGI/superagi/helper/read_email.py of the component EmailToolKit. The manipulation of the argument filename leads to path traversal.
This vulnerability is traded as CVE-2025-6280. Access to the local network is required for this attack to succeed. Furthermore, there is an exploit available.
A vulnerability has been found in FlipBook Plugin up to 1.16.15 on WordPress and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation of the argument style/mode leads to cross site scripting.
This vulnerability is known as CVE-2025-5289. The attack can be launched remotely. There is no exploit available.
A vulnerability classified as problematic was found in TableOn Plugin up to 1.0.4.1 on WordPress. This vulnerability affects the function tableon_popup_iframe_button of the component Shortcode Handler. The manipulation leads to cross site scripting.
This vulnerability was named CVE-2025-5143. The attack can be initiated remotely. There is no exploit available.
A vulnerability was found in Download Manager Plugin up to 3.3.18 on WordPress. It has been declared as problematic. Affected by this vulnerability is the function wpdm_user_dashboard of the component Shortcode Handler. The manipulation leads to cross site scripting.
This vulnerability is known as CVE-2025-4367. The attack can be launched remotely. There is no exploit available.
A vulnerability was found in ElementsKit Elementor Addons and Templates Plugin up to 3.5.2 on WordPress. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Image Comparison Widget. The manipulation leads to cross site scripting.
This vulnerability is handled as CVE-2025-4479. The attack may be launched remotely. There is no exploit available.
A vulnerability classified as problematic was found in Classic Addons WPBakery Page Builder Plugin up to 8.4.1 on WordPress. This vulnerability affects unknown code of the component Grid Builder. The manipulation leads to cross site scripting.
This vulnerability was named CVE-2025-4965. The attack can be initiated remotely. There is no exploit available.
A vulnerability was found in Opinion Stage Poll, Survey & Quiz Maker Plugin up to 19.9.0 on WordPress. It has been classified as critical. This affects an unknown part of the component Setting Handler. The manipulation leads to incorrect authorization.
This vulnerability is uniquely identified as CVE-2025-3880. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in VMware SALT and classified as critical. This vulnerability affects the function recv_file of the component Cache Directory Handler. The manipulation leads to path traversal.
This vulnerability was named CVE-2024-38824. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in Events Calendar Plugin up to 6.13.2 on WordPress. Affected by this vulnerability is an unknown functionality. The manipulation leads to cross site scripting.
This vulnerability is known as CVE-2025-5144. The attack can be launched remotely. There is no exploit available.
A vulnerability was found in modelcontextprotocol inspector up to 0.14.0. It has been classified as critical. Affected is an unknown function. The manipulation leads to missing authentication.
This vulnerability is traded as CVE-2025-49596. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Contact Us Page Plugin up to 3.7.4 on WordPress. It has been declared as problematic. This vulnerability affects unknown code. The manipulation of the argument style leads to cross site scripting.
This vulnerability was named CVE-2025-5123. The attack can be initiated remotely. There is no exploit available.
A vulnerability has been found in IndieBlocks Plugin up to 0.13.2 on WordPress and classified as problematic. This vulnerability affects unknown code. The manipulation of the argument kind leads to cross site scripting.
This vulnerability was named CVE-2025-5950. The attack can be initiated remotely. There is no exploit available.
A vulnerability, which was classified as critical, was found in Microsoft 365 Copilot. This affects an unknown part of the component AI Handler. The manipulation leads to command injection.
This vulnerability is uniquely identified as CVE-2025-32711. It is possible to initiate the attack remotely. There is no exploit available.
This product is a managed service. This means that users are not able to maintain vulnerability countermeasures themselves.