A vulnerability, which was classified as critical, has been found in AI Power Plugin up to 1.8.96 on WordPress. Affected by this issue is the function wpaicg_export_ai_forms. The manipulation leads to code injection.
This vulnerability is handled as CVE-2025-0429. The attack may be launched remotely. There is no exploit available.
A vulnerability, which was classified as problematic, was found in Stackable Plugin up to 3.13.11 on WordPress. This affects an unknown part of the component Gutenberg Block Handler. The manipulation leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2024-12117. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability classified as critical was found in AI Power Plugin up to 1.8.96 on WordPress. Affected by this vulnerability is an unknown functionality of the component Shortcode Handler. The manipulation leads to missing authorization.
This vulnerability is known as CVE-2024-13361. The attack can be launched remotely. There is no exploit available.
A vulnerability classified as problematic has been found in Themify Builder Plugin up to 7.6.5 on WordPress. Affected is an unknown function. The manipulation leads to cross site scripting.
This vulnerability is traded as CVE-2024-13319. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability was found in AI Power Plugin up to 1.8.96 on WordPress. It has been rated as critical. This issue affects some unknown processing. The manipulation leads to server-side request forgery.
The identification of this vulnerability is CVE-2024-13360. The attack may be initiated remotely. There is no exploit available.
A vulnerability was found in XML for Google Merchant Center Plugin up to 3.0.11 on WordPress. It has been declared as problematic. This vulnerability affects unknown code. The manipulation leads to cross site scripting.
This vulnerability was named CVE-2024-13406. The attack can be initiated remotely. There is no exploit available.
A vulnerability was found in AI Power Plugin up to 1.8.96 on WordPress. It has been classified as critical. This affects the function wpaicg_export_prompts. The manipulation leads to code injection.
This vulnerability is uniquely identified as CVE-2025-0428. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability was found in Apache Ambari up to 2.7.8 and classified as problematic. Affected by this issue is the function DocumentBuilderFactory. The manipulation leads to xml external entity reference.
This vulnerability is handled as CVE-2025-23195. The attack can only be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Apache Ambari up to 2.7.8 and classified as critical. Affected by this vulnerability is an unknown functionality of the component Ambari Metrics/AMS Alerts. The manipulation leads to failure to sanitize special elements into a different plane (special element injection).
This vulnerability is known as CVE-2024-51941. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in pearProjectApi 2.8.10. Affected is an unknown function of the file project.php. The manipulation of the argument organizationCode leads to sql injection.
This vulnerability is traded as CVE-2023-27113. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability, which was classified as critical, has been found in Apache Ambari up to 2.7.8. This issue affects some unknown processing of the component Alert Definition. The manipulation of the argument filename leads to command injection.
The identification of this vulnerability is CVE-2025-23196. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in pearProjectApi 2.8.10. This vulnerability affects unknown code of the file project.php. The manipulation of the argument projectCode leads to sql injection.
This vulnerability was named CVE-2023-27112. The attack can be initiated remotely. There is no exploit available.
A vulnerability classified as problematic has been found in Northern.tech CFEngine Enterprise Mission Portal up to 3.21.5/3.24.0. This affects an unknown part. The manipulation leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2024-55958. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linksys E8450 1.2.00.360516. It has been rated as critical. Affected by this issue is some unknown functionality. The manipulation of the argument action leads to buffer overflow.
This vulnerability is handled as CVE-2024-57540. The attack may be launched remotely. There is no exploit available.
A vulnerability was found in Linksys E8450 1.2.00.360516. It has been declared as critical. Affected by this vulnerability is an unknown functionality. The manipulation of the argument userEmail leads to command injection.
This vulnerability is known as CVE-2024-57539. The attack can be launched remotely. There is no exploit available.
A vulnerability was found in Linksys E8450 1.2.00.360516. It has been classified as critical. Affected is an unknown function. The manipulation of the argument anonymous_protect_status leads to buffer overflow.
This vulnerability is traded as CVE-2024-57538. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability was found in Linksys E8450 1.2.00.360516 and classified as critical. This issue affects some unknown processing. The manipulation of the argument page leads to buffer overflow.
The identification of this vulnerability is CVE-2024-57537. The attack may be initiated remotely. There is no exploit available.
A vulnerability has been found in Linksys E8450 1.2.00.360516 and classified as critical. This vulnerability affects the function wizard_status. The manipulation leads to command injection.
This vulnerability was named CVE-2024-57536. The attack can be initiated remotely. There is no exploit available.
A vulnerability, which was classified as critical, was found in Linksys E8450 1.2.00.360516. This affects the function hidden_dhcp_num. The manipulation leads to buffer overflow.
This vulnerability is uniquely identified as CVE-2024-57545. It is possible to initiate the attack remotely. There is no exploit available.