A vulnerability, which was classified as problematic, has been found in AI ChatBot Plugin up to 7.0.x on WordPress. Impacted is an unknown function of the component Setting Handler. Performing manipulation results in cross site scripting.
This vulnerability was named CVE-2025-9111. The attack may be initiated remotely. There is no available exploit.
It is advisable to upgrade the affected component.
A vulnerability classified as critical was found in Compress & Upload Plugin up to 1.0.4 on WordPress. This issue affects some unknown processing. Such manipulation leads to unrestricted upload.
This vulnerability is uniquely identified as CVE-2025-8889. The attack can be launched remotely. No exploit exists.
Upgrading the affected component is advised.
A vulnerability classified as problematic has been found in SAP Fiori App 700/800/900/UIS4HOP1 600. This vulnerability affects unknown code. This manipulation causes cross-site request forgery.
This vulnerability is handled as CVE-2025-42923. The attack can be initiated remotely. There is not any exploit available.
It is suggested to install a patch to address this issue.
A vulnerability described as problematic has been identified in SAP Supplier Relationship Management 701/702/713/714/SRM_SERVER 700. This affects an unknown part of the component Link Handler. The manipulation results in cross site scripting.
This vulnerability is known as CVE-2025-42920. It is possible to launch the attack remotely. No exploit is available.
Applying a patch is advised to resolve this issue.
A vulnerability marked as problematic has been reported in Liferay Portal and DXP. Affected by this issue is some unknown functionality of the component Style Book Theme Name Handler. The manipulation leads to cross site scripting.
This vulnerability is traded as CVE-2025-43774. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability labeled as problematic has been found in VolkovLabs business-links up to 2.3.x. Affected by this vulnerability is an unknown functionality. Executing manipulation can lead to cross site scripting.
This vulnerability appears as CVE-2025-58746. The attack may be performed from remote. There is no available exploit.
The affected component should be upgraded.
A vulnerability identified as critical has been detected in Liferay Portal and DXP. Affected is an unknown function. Performing manipulation results in server-side request forgery.
This vulnerability is reported as CVE-2025-43763. The attack is possible to be carried out remotely. No exploit exists.
A vulnerability categorized as critical has been discovered in modelcontextprotocol inspector up to 0.16.5. This impacts an unknown function. Such manipulation leads to improper neutralization of encoded uri schemes in a web page.
This vulnerability is documented as CVE-2025-58444. The attack can be executed remotely. There is not any exploit available.
It is advisable to upgrade the affected component.
A vulnerability was found in vitejs vite up to 5.4.19/6.3.5/7.0.6/7.1.4. It has been rated as critical. This affects an unknown function of the component Setting Handler. This manipulation causes path traversal.
This vulnerability is registered as CVE-2025-58751. Remote exploitation of the attack is possible. No exploit is available.
Upgrading the affected component is advised.
A vulnerability was found in SAP Fiori app 108/S4CORE 107. It has been declared as critical. The impacted element is an unknown function of the component Manage Payment Blocks. The manipulation results in missing authorization.
This vulnerability is cataloged as CVE-2025-42915. The attack may be launched remotely. There is no exploit available.
A patch should be applied to remediate this issue.
A vulnerability was found in Liferay Portal and DXP. It has been classified as problematic. The affected element is an unknown function. The manipulation leads to cross site scripting.
This vulnerability is listed as CVE-2025-43778. The attack may be initiated remotely. There is no available exploit.
Multiple npm packages have been compromised as part of a software supply chain attack after a maintainer's account was compromised in a phishing attack.
The attack targeted Josh Junon (aka Qix), who received an email message that mimicked npm ("support@npmjs[.]help"), urging them to update their update their two-factor authentication (2FA) credentials before September 10, 2025, by clicking on
A vulnerability was found in vitejs vite up to 5.4.19/6.3.5/7.0.6/7.1.4 and classified as problematic. Impacted is an unknown function. Executing manipulation can lead to relative path traversal.
This vulnerability is tracked as CVE-2025-58752. The attack can be launched remotely. No exploit exists.
It is suggested to upgrade the affected component.
A vulnerability has been found in SAP Landscape Transformation Replication Server up to DMIS 2011_1_620 and classified as problematic. This issue affects some unknown processing. Performing manipulation results in improper validation of specified type of input.
This vulnerability is identified as CVE-2025-42929. The attack can only be performed from the local network. There is not any exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability, which was classified as problematic, was found in Liferay Portal and DXP. This vulnerability affects unknown code of the component Response Body Handler. Such manipulation leads to information exposure through error message.
This vulnerability is referenced as CVE-2025-43777. It is possible to launch the attack remotely. No exploit is available.
A vulnerability, which was classified as problematic, has been found in SAP S4HANA 4CORE 102 up to 107. This affects an unknown part. This manipulation causes improper validation of specified type of input.
The identification of this vulnerability is CVE-2025-42916. The attack needs to be done within the local network. There is no exploit available.
Applying a patch is the recommended action to fix this issue.
A vulnerability classified as critical was found in MONAI up to 1.5.0. Affected by this issue is the function zip_file.extractall. The manipulation results in path traversal.
This vulnerability was named CVE-2025-58755. The attack may be performed from remote. There is no available exploit.
Upgrading the affected component is advised.