A vulnerability classified as problematic has been found in FFmpeg up to 6e26f57f672b05e7b8b052007a83aef99dc81ccb. This affects the function audio_element_obu of the file libavformat/iamf_parse.c of the component IAMF File Handler. The manipulation of the argument num_parameters leads to memory leak.
This vulnerability is uniquely identified as CVE-2025-1816. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Red Hat Ansible Automation Platform 2.5. It has been rated as problematic. Affected by this issue is some unknown functionality of the component aap-gateway. The manipulation leads to race condition.
This vulnerability is handled as CVE-2025-1801. The attack may be launched remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in teastudiopl WP Posts Carousel Plugin up to 1.3.7 on WordPress. It has been declared as problematic. Affected by this vulnerability is an unknown functionality. The manipulation of the argument auto_play_timeout leads to cross site scripting.
This vulnerability is known as CVE-2025-1491. The attack can be launched remotely. There is no exploit available.
A vulnerability was found in awordpresslife Album Gallery Plugin up to 1.6.3 on WordPress and classified as problematic. This issue affects some unknown processing. The manipulation leads to deserialization.
The identification of this vulnerability is CVE-2024-13833. The attack may be initiated remotely. There is no exploit available.
A vulnerability has been found in edge22 GenerateBlocks Plugin up to 1.9.1 on WordPress and classified as problematic. This vulnerability affects the function get_image_description. The manipulation leads to information disclosure.
This vulnerability was named CVE-2024-13546. The attack can be initiated remotely. There is no exploit available.
A vulnerability, which was classified as critical, was found in pbrong hrms up to 1.0.1. This affects the function HrmsDB of the file \resource\resource.go. The manipulation of the argument user_cookie leads to improper authorization.
This vulnerability is uniquely identified as CVE-2025-1815. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.