A vulnerability classified as problematic was found in Red Hat Enterprise Linux 7/8/9. This impacts the function gcry_md_get_algo_dlen of the component Booth Server. Executing manipulation can lead to insufficient verification of data authenticity.
This vulnerability is tracked as CVE-2024-3049. The attack can be launched remotely. No exploit exists.
A vulnerability, which was classified as problematic, was found in Linux Kernel up to 6.5-rc4. Affected is the function nft_pipapo_remove of the file net/netfilter/nft_set_pipapo.c of the component Netfilter. Executing manipulation can lead to use after free.
This vulnerability is tracked as CVE-2023-4004. The attack is only possible within the local network. No exploit exists.
You should upgrade the affected component.
A vulnerability labeled as problematic has been found in MariaDB. Impacted is an unknown function of the component Transport Endpoint. Such manipulation leads to denial of service.
This vulnerability is listed as CVE-2023-5157. The attack must be carried out from within the local network. There is no available exploit.
A vulnerability classified as problematic was found in Red Hat Fast Datapath for RHEL and Enterprise Linux. Affected by this issue is the function instance_create of the component D-Bus. The manipulation results in cross site scripting.
This vulnerability was named CVE-2024-52336. The attack may be performed from remote. There is no available exploit.
A vulnerability classified as critical was found in Apple iOS and iPadOS. Affected by this vulnerability is an unknown functionality. Executing manipulation can lead to use after free.
This vulnerability is registered as CVE-2025-24252. The attack requires access to the local network. No exploit is available.
Upgrading the affected component is advised.
A vulnerability, which was classified as critical, has been found in Apple macOS. Affected by this issue is some unknown functionality. The manipulation leads to use after free.
This vulnerability is documented as CVE-2025-24252. The attack requires being on the local network. There is not any exploit available.
It is advisable to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Apple visionOS. This affects an unknown part. The manipulation results in use after free.
This vulnerability is reported as CVE-2025-24252. The attacker must have access to the local network to execute the attack. No exploit exists.
You should upgrade the affected component.
A vulnerability was found in Google Chrome. It has been rated as critical. Impacted is an unknown function of the component Storage. This manipulation causes use after free.
This vulnerability is tracked as CVE-2025-11460. The attack is possible to be carried out remotely. No exploit exists.
Upgrading the affected component is advised.
A vulnerability classified as critical has been found in Apple tvOS. Affected is an unknown function. Performing manipulation results in use after free.
This vulnerability is cataloged as CVE-2025-24252. The attack must originate from the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability described as critical has been identified in code-projects Responsive Hotel Site 1.0. This affects an unknown part of the file /admin/roomdel.php. Executing manipulation of the argument ID can lead to sql injection.
This vulnerability is registered as CVE-2025-12913. It is possible to launch the attack remotely. Furthermore, an exploit is available.
A vulnerability described as problematic has been identified in Insert Headers and Footers Code Plugin up to 1.1.6 on WordPress. The affected element is an unknown function. Executing manipulation can lead to cross site scripting.
This vulnerability is handled as CVE-2025-12112. The attack can be executed remotely. There is not any exploit available.
A vulnerability classified as problematic has been found in HTML Forms Plugin up to 1.5.5 on WordPress. The impacted element is an unknown function of the component Setting Handler. The manipulation leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2025-12125. The attack is possible to be carried out remotely. No exploit exists.
A vulnerability categorized as problematic has been discovered in Contact Form 7 AWeber Extension Plugin up to 0.1.42 on WordPress. This affects the function wp_ajax_aweber_logreset of the component AJAX Endpoint. The manipulation results in missing authorization.
This vulnerability is reported as CVE-2025-12167. The attack can be launched remotely. No exploit exists.
A vulnerability identified as critical has been detected in Download Manager Plugin up to 3.3.30 on WordPress. This vulnerability affects the function deleteExpired of the component Cron Trigger Handler. This manipulation causes use of hard-coded cryptographic key
.
This vulnerability appears as CVE-2025-12177. The attack may be initiated remotely. There is no available exploit.
A vulnerability was found in WPFunnels Plugin up to 3.6.2 on WordPress. It has been classified as critical. Affected is an unknown function of the component Setting Handler. Performing manipulation of the argument optin_allow_registration results in improper authorization.
This vulnerability is cataloged as CVE-2025-12353. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability marked as problematic has been reported in WP2Social Auto Publish Plugin up to 2.4.7 on WordPress. Impacted is an unknown function of the component PostMessage Handler. Performing manipulation results in cross site scripting.
This vulnerability is known as CVE-2025-12064. Remote exploitation of the attack is possible. No exploit is available.
A vulnerability has been found in Course Booking System Plugin up to 6.1.5 on WordPress and classified as problematic. Affected by this vulnerability is an unknown functionality of the file csv-export.php of the component Booking Data Export. Performing manipulation results in missing authorization.
This vulnerability is identified as CVE-2025-12042. The attack can be initiated remotely. There is not any exploit available.