A vulnerability was found in Kallyas Plugin up to 4.21.0 on WordPress. It has been declared as problematic. This vulnerability affects the function delete_font of the component Path Validation Handler. The manipulation leads to denial of service.
This vulnerability was named CVE-2025-6989. The attack can be initiated remotely. There is no exploit available.
A vulnerability was found in Educenter Plugin up to 1.6.2 on WordPress. It has been classified as problematic. This affects an unknown part. The manipulation leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2025-5529. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability was found in Kallyas Plugin up to 4.21.0 on WordPress and classified as critical. Affected by this issue is the function TH_LatestPosts4. The manipulation leads to file inclusion.
This vulnerability is handled as CVE-2025-6991. The attack may be launched remotely. There is no exploit available.
A vulnerability has been found in TecharoHQ anubis up to 1.21.2 and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to basic cross site scripting.
This vulnerability is known as CVE-2025-54414. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in tj-actions branch-names up to 8.x. Affected is an unknown function. The manipulation leads to command injection.
This vulnerability is traded as CVE-2025-54416. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in dbgate up to 6.4.3-beta.8/6.4.3-prem. This issue affects some unknown processing of the component Path Handler. The manipulation of the argument File leads to path traversal: '\..\filename'.
The identification of this vulnerability is CVE-2025-50184. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in Opencast up to 17.5. This vulnerability affects unknown code of the component XML File Parser. The manipulation leads to information disclosure.
This vulnerability was named CVE-2025-54380. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in astronomer dag-factory up to 0.23.0a8. This affects the function pull_request_target. The manipulation leads to os command injection.
This vulnerability is uniquely identified as CVE-2025-54415. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in haxtheweb haxcms up to 11.0.13. It has been rated as critical. Affected by this issue is some unknown functionality of the component API Endpoint. The manipulation leads to improper authorization.
This vulnerability is handled as CVE-2025-54378. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in skops-dev skops up to 0.11.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to insufficient type distinction.
This vulnerability is known as CVE-2025-54413. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in skops-dev skops up to 0.11.0. It has been classified as critical. Affected is an unknown function. The manipulation leads to insufficient type distinction.
This vulnerability is traded as CVE-2025-54412. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in freescout-help-desk freescout up to 1.8.185 and classified as problematic. This issue affects the function Helper::decrypt. The manipulation leads to deserialization.
The identification of this vulnerability is CVE-2025-54366. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in dbgate up to 6.6.0 and classified as problematic. This vulnerability affects unknown code of the file /runners/load-reader of the component Application Interface. The manipulation leads to path traversal: '\..\filename'.
This vulnerability was named CVE-2025-50185. The attack can be initiated remotely. There is no exploit available.
A vulnerability, which was classified as problematic, was found in xwiki-platform up to 16.10.5/17.2.x. This affects the function like. The manipulation leads to improper input validation.
This vulnerability is uniquely identified as CVE-2025-54385. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in IROAD FX2. Affected by this issue is some unknown functionality of the component RTSP Interface. The manipulation leads to information disclosure.
This vulnerability is handled as CVE-2025-30135. Access to the local network is required for this attack to succeed. There is no exploit available.
A vulnerability classified as problematic was found in grav 1.7.46/1.7.47/1.7.48. Affected by this vulnerability is an unknown functionality of the component img Element Handler. The manipulation of the argument onerror leads to cross site scripting.
This vulnerability is known as CVE-2025-46198. The attack can be launched remotely. There is no exploit available.
A vulnerability classified as problematic has been found in Linkify up to 4.3.1. Affected is an unknown function. The manipulation leads to cross site scripting.
This vulnerability is traded as CVE-2025-8101. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Salesforce Tableau Server on Windows/Linux. It has been rated as critical. This issue affects some unknown processing of the component EPS Server Module. The manipulation leads to server-side request forgery.
The identification of this vulnerability is CVE-2025-52455. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Salesforce Tableau Server on Windows/Linux. It has been declared as critical. This vulnerability affects unknown code of the component Amazon S3 Connector Module. The manipulation leads to server-side request forgery.
This vulnerability was named CVE-2025-52454. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.