A vulnerability described as problematic has been identified in CM E-Mail Blacklist Plugin up to 1.6.2 on WordPress. Affected is an unknown function. Executing a manipulation of the argument black_email can lead to cross site scripting.
This vulnerability is handled as CVE-2026-0691. The attack can be executed remotely. There is not any exploit available.
A vulnerability marked as problematic has been reported in Team Section Block Plugin up to 2.0.0 on WordPress. This impacts an unknown function of the component Social Network Link Handler. Performing a manipulation results in cross site scripting.
This vulnerability is known as CVE-2026-0833. Remote exploitation of the attack is possible. No exploit is available.
A vulnerability labeled as critical has been found in Advanced Ads Plugin up to 2.0.15 on WordPress. This affects an unknown function. Such manipulation of the argument order leads to sql injection.
This vulnerability is traded as CVE-2025-12984. The attack may be launched remotely. There is no exploit available.
A vulnerability identified as critical has been detected in Spin Wheel Plugin up to 2.1.0 on WordPress. The impacted element is an unknown function. This manipulation of the argument prize_index causes client-side enforcement of server-side security.
This vulnerability appears as CVE-2026-0808. The attack may be initiated remotely. There is no available exploit.
A vulnerability categorized as problematic has been discovered in Demo Importer Plus Plugin up to 2.0.9/8.0 on WordPress. The affected element is an unknown function of the component SVG File Parser. The manipulation results in xml external entity reference.
This vulnerability is reported as CVE-2025-14478. The attack can be launched remotely. No exploit exists.
It is advisable to upgrade the affected component.
A vulnerability was found in Umbraco Forms up to 8.13.16. It has been rated as problematic. Impacted is an unknown function of the component WSDL Handler. The manipulation leads to inclusion of functionality from untrusted control sphere. This vulnerability only affects products that are no longer supported by the maintainer.
This vulnerability is documented as CVE-2025-68924. The attack can be initiated remotely. There is not any exploit available.
A vulnerability was found in Apple macOS up to 26.0. It has been declared as problematic. This issue affects some unknown processing of the component App. Executing a manipulation can lead to information disclosure.
This vulnerability is registered as CVE-2025-43508. The attack needs to be launched locally. No exploit is available.
It is recommended to upgrade the affected component.
A vulnerability was found in Apple Xcode up to 16.2. It has been classified as critical. This vulnerability affects unknown code of the component Privacy Preferences. Performing a manipulation results in permission issues.
This vulnerability is cataloged as CVE-2025-31186. The attack must be initiated from a local position. There is no exploit available.
Upgrading the affected component is recommended.
A vulnerability was found in Apple iOS and iPadOS up to 18.2 and classified as critical. This affects an unknown part. Such manipulation leads to permission issues.
This vulnerability is listed as CVE-2025-24090. The attack must be carried out locally. There is no available exploit.
It is suggested to upgrade the affected component.
In the event of a cyber incident or natural disaster, your organization will need a business continuity plan (BCP) to resume its most critical business operations quickly. Your BCP will identify the risks from various threats and the impact they would have on your organization.
A vulnerability has been found in Apple iOS and iPadOS up to 18.2 and classified as critical. Affected by this issue is some unknown functionality. This manipulation causes permission issues.
This vulnerability is tracked as CVE-2025-24089. The attack is restricted to local execution. No exploit exists.
The affected component should be upgraded.
A vulnerability, which was classified as critical, was found in Apple iOS and iPadOS up to 18.0. Affected by this vulnerability is an unknown functionality. The manipulation results in memory corruption.
This vulnerability is identified as CVE-2024-44238. The attack is only possible with local access. There is not any exploit available.
You should upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Apple macOS up to 15.0. Affected is an unknown function of the component App. The manipulation leads to permission issues.
This vulnerability is referenced as CVE-2024-44210. The attack can only be performed from a local environment. No exploit is available.
It is advisable to upgrade the affected component.