A vulnerability marked as problematic has been reported in Microsoft Azure Local Cluster. This issue affects some unknown processing. The manipulation leads to sensitive information in log files.
This vulnerability is listed as CVE-2025-25002. The attack must be carried out from within the local network. There is no available exploit.
To fix this issue, it is recommended to deploy a patch.
A vulnerability described as problematic has been identified in Microsoft Azure Local Cluster. Impacted is an unknown function. The manipulation results in insufficiently protected credentials.
This vulnerability is cataloged as CVE-2025-26628. The attack must be initiated from a local position. There is no exploit available.
It is advisable to implement a patch to correct this issue.
A vulnerability has been found in wpeverest User Registration Plugin up to 4.1.x on WordPress and classified as problematic. Impacted is an unknown function. The manipulation leads to cross site scripting.
This vulnerability is listed as CVE-2025-39400. The attack may be initiated remotely. There is no available exploit.
The affected component should be upgraded.
A vulnerability was found in Dell PowerFlex Manager VM up to 4.6.2.1. It has been declared as problematic. This vulnerability affects unknown code. The manipulation results in sensitive information in log files.
This vulnerability is identified as CVE-2025-36599. The attack can be executed remotely. There is not any exploit available.
It is recommended to upgrade the affected component.
A vulnerability categorized as problematic has been discovered in HP Linux Imaging and Printing Software. This issue affects some unknown processing of the component Digital Signature Algorithm Handler. Such manipulation leads to improper verification of cryptographic signature.
This vulnerability is listed as CVE-2025-43023. The attack may be performed from remote. There is no available exploit.
A vulnerability categorized as critical has been discovered in Calibre Web and Autocaliweb. Impacted is an unknown function. Executing a manipulation can lead to os command injection.
This vulnerability is tracked as CVE-2025-7404. The attack can be launched remotely. No exploit exists.
It is advisable to upgrade the affected component.
A vulnerability described as critical has been identified in Axis Camera Station Pro and Camera Station. Impacted is an unknown function. Executing a manipulation can lead to authentication bypass using alternate channel.
This vulnerability is registered as CVE-2025-30026. The attack requires access to the local network. No exploit is available.
A vulnerability marked as critical has been reported in Microsoft Azure Stack HCI OS. Impacted is an unknown function. This manipulation causes improper input validation.
The identification of this vulnerability is CVE-2025-27489. The attack can only be executed locally. There is no exploit available.
To fix this issue, it is recommended to deploy a patch.
A vulnerability categorized as problematic has been discovered in Ultimate 410 Gone Status Code Plugin up to 1.1.4 on WordPress. The impacted element is an unknown function. Such manipulation leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2024-3677. The attack can be launched remotely. No exploit exists.
A vulnerability marked as critical has been reported in Church Admin Plugin up to 5.0.28 on WordPress. Affected by this vulnerability is an unknown functionality. Performing a manipulation of the argument audio_url results in server-side request forgery.
This vulnerability was named CVE-2026-0682. The attack may be initiated remotely. There is no available exploit.
A vulnerability labeled as critical has been found in SteelSeries Nahimic 3 1.10.7. Affected is an unknown function. Such manipulation leads to path traversal.
This vulnerability is uniquely identified as CVE-2025-68921. The attack can only be initiated within the local network. No exploit exists.
A vulnerability identified as problematic has been detected in Filr Plugin up to 1.2.11 on WordPress. This impacts the function FILR_Uploader of the component HTML File Handler. This manipulation causes HTML injection.
This vulnerability is handled as CVE-2025-14632. The attack can be initiated remotely. There is not any exploit available.
A vulnerability categorized as critical has been discovered in Payment Button for PayPal Plugin up to 1.2.3.41 on WordPress. This affects the function wppaypalcheckout_ajax_process_order of the component AJAX Endpoint. The manipulation results in missing authorization.
This vulnerability is known as CVE-2025-14463. It is possible to launch the attack remotely. No exploit is available.
A vulnerability was found in RepairBuddy Plugin up to 4.1116 on WordPress. It has been rated as problematic. The impacted element is the function wc_upload_and_save_signature_handler. The manipulation leads to improper control of resource identifiers.
This vulnerability is traded as CVE-2026-0820. It is possible to initiate the attack remotely. There is no exploit available.
A data breach at Canada’s investment watchdog, Canadian Investment Regulatory Organization (CIRO), impacted about 750,000 people. The Canadian Investment Regulatory Organization (CIRO) is Canada’s national self-regulatory body overseeing investment dealers and marketplaces, protecting investors, enforcing compliance, and maintaining fair, efficient capital markets. CIRO announced that threat actors stole personal data of 750,000 people in an […]
A vulnerability was found in WP Hotel Booking Plugin up to 2.2.7 on WordPress. It has been declared as problematic. The affected element is the function hotel_booking_fetch_customer_info. Executing a manipulation of the argument email can lead to information disclosure.
This vulnerability appears as CVE-2025-14075. The attack may be performed from remote. There is no available exploit.
A vulnerability was found in Quick Contact Form Plugin up to 8.2.6 on WordPress. It has been classified as critical. Impacted is the function qcf_validate_form of the component AJAX Endpoint. Performing a manipulation of the argument from results in improper access controls.
This vulnerability is reported as CVE-2025-12718. The attack is possible to be carried out remotely. No exploit exists.