Large network scans have been targeting Cisco ASA devices, prompting warnings from cybersecurity researchers that it could indicate an upcoming flaw in the products. [...]
A vulnerability, which was classified as problematic, was found in Ethyca Fides up to 2.69.0. This affects an unknown function of the component Admin UI. Executing manipulation can lead to session expiration.
This vulnerability is tracked as CVE-2025-57766. The attack can be launched remotely. No exploit exists.
You should upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in Ethyca Fides up to 2.69.0. The impacted element is an unknown function of the component OAuth Client Endpoint. Performing manipulation results in missing authorization.
This vulnerability is identified as CVE-2025-57817. The attack can be initiated remotely. There is not any exploit available.
It is advisable to upgrade the affected component.
A vulnerability classified as critical was found in xwiki-contrib application-blog up to 9.13. The affected element is an unknown function. Such manipulation of the argument Content leads to improper neutralization of directives in dynamically evaluated code.
This vulnerability is referenced as CVE-2025-58365. It is possible to launch the attack remotely. No exploit is available.
Upgrading the affected component is advised.
A vulnerability classified as problematic has been found in Ethyca Fides up to 2.69.0. Impacted is an unknown function of the component Webserver API. This manipulation causes improper control of interaction frequency.
The identification of this vulnerability is CVE-2025-57816. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability described as problematic has been identified in Ethyca Fides up to 2.69.0. This issue affects some unknown processing of the component Fides Admin UI Login Endpoint. The manipulation results in improper restriction of excessive authentication attempts.
This vulnerability was named CVE-2025-57815. The attack may be performed from remote. There is no available exploit.
Upgrading the affected component is recommended.
A vulnerability marked as problematic has been reported in Mikado Core Plugin up to 1.5.2 on WordPress. This vulnerability affects unknown code of the component Shortcode Handler. The manipulation leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2025-9058. The attack is possible to be carried out remotely. No exploit exists.
A vulnerability labeled as problematic has been found in Wilmer Core Plugin up to 2.4.5 on WordPress. This affects an unknown part of the component Shortcode Handler. Executing manipulation can lead to cross site scripting.
This vulnerability is handled as CVE-2025-9061. The attack can be executed remotely. There is not any exploit available.
A vulnerability identified as critical has been detected in AutomatorWP Plugin up to 5.3.7 on WordPress. Affected by this issue is some unknown functionality of the component Setting Handler. Performing manipulation results in missing authorization.
This vulnerability is known as CVE-2025-9542. Remote exploitation of the attack is possible. No exploit is available.
A vulnerability categorized as critical has been discovered in WP-Members Membership Plugin up to 3.5.4.2 on WordPress. Affected by this vulnerability is an unknown functionality of the component Shortcode Handler. Such manipulation leads to code injection.
This vulnerability is traded as CVE-2025-9489. The attack may be launched remotely. There is no exploit available.
A vulnerability was found in AutomatorWP Plugin up to 5.3.6 on WordPress. It has been rated as critical. Affected is the function automatorwp_ajax_import_automation_from_url. This manipulation causes missing authorization.
This vulnerability appears as CVE-2025-9539. The attack may be initiated remotely. There is no available exploit.
A vulnerability was found in Nonprofit Charity Theme up to 3.2.2 on WordPress. It has been declared as critical. This impacts the function alone_import_pack_restore_data. The manipulation results in missing authorization.
This vulnerability is reported as CVE-2025-10134. The attack can be launched remotely. No exploit exists.
A vulnerability was found in phpMyAdmin 4.9.0.1 and classified as problematic. Affected by this vulnerability is an unknown functionality of the component Setup Page. The manipulation results in cross-site request forgery.
This vulnerability was named CVE-2019-12922. The attack may be performed from remote. In addition, an exploit is available.
A vulnerability, which was classified as problematic, has been found in pfSense 2.4.4-p3. This issue affects some unknown processing of the file acme_accountkeys_edit.php. The manipulation of the argument Name/Description leads to cross site scripting (Stored).
This vulnerability is traded as CVE-2019-12347. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
A vulnerability was found in phpMyAdmin up to 4.8.x. It has been declared as problematic. Affected by this vulnerability is an unknown functionality. The manipulation results in cross-site request forgery.
This vulnerability is known as CVE-2019-12616. It is possible to launch the attack remotely. Furthermore, an exploit is available.
It is recommended to upgrade the affected component.
A vulnerability was found in phpipam 1.4. It has been rated as critical. This impacts an unknown function of the file app/admin/custom-fields/filter-result.php. Performing manipulation of the argument table as part of Parameter results in sql injection.
This vulnerability is reported as CVE-2019-16692. The attack is possible to be carried out remotely. Moreover, an exploit is present.
A vulnerability marked as problematic has been reported in pfSense 2.4.4-p3. This issue affects the function csrf_callback of the file diag_command.php. Performing manipulation of the argument txtCommand/txtRecallBuffer results in cross-site request forgery.
This vulnerability is reported as CVE-2019-16667. The attack is possible to be carried out remotely. Moreover, an exploit is present.