The Anti-Malware Security and Brute-Force Firewall plugin for WordPress, installed on over 100,000 sites, has a vulnerability that allows subscribers to read any file on the server, potentially exposing private information. [...]
A vulnerability labeled as problematic has been found in Rockwell Automation FactoryTalk Linx up to 6.49. The impacted element is an unknown function. Such manipulation of the argument process.env.NODE_ENV with the input development leads to incorrect user management.
This vulnerability is uniquely identified as CVE-2025-7972. Local access is required to approach this attack. No exploit exists.
The affected component should be upgraded.
A vulnerability, which was classified as problematic, was found in Mattermost Desktop App up to 5.13.0. This issue affects some unknown processing of the component URL Handler. The manipulation results in improper validation of specified type of input.
This vulnerability is cataloged as CVE-2025-58084. The attack may be launched remotely. There is no exploit available.
You should upgrade the affected component.
A vulnerability categorized as critical has been discovered in Rockwell Automation Comms. Affected by this issue is some unknown functionality. Executing manipulation can lead to missing authentication.
This vulnerability is tracked as CVE-2025-7328. The physical device can be targeted for the attack. No exploit exists.
A vulnerability, which was classified as problematic, was found in Tomofun Furbo 360 and Furbo Mini. This affects an unknown function of the component Bluetooth Low Energy. The manipulation results in cleartext transmission of sensitive information.
This vulnerability is known as CVE-2025-11640. Access to the local network is required for this attack. Furthermore, an exploit is available.
The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074. The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability was found in Tomofun Furbo 360 and Furbo Mini. It has been classified as problematic. Affected by this vulnerability is an unknown functionality of the file /squashfs-root/furbo_img of the component MQTT Client Certificate. Performing manipulation results in hard-coded credentials.
This vulnerability was named CVE-2025-11643. The attack may be initiated remotely. In addition, an exploit is available.
The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074. The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability was found in Tomofun Furbo 360 and Furbo Mini. It has been declared as problematic. Affected by this issue is some unknown functionality of the component UART Interface. Executing manipulation can lead to insecure storage of sensitive information.
The identification of this vulnerability is CVE-2025-11644. The physical device can be targeted for the attack. Furthermore, there is an exploit available.
The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074. The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability described as critical has been identified in HCL BigFix SaaS Remediate up to 8.1.13. This issue affects some unknown processing of the component SaaS Authentication Service. The manipulation results in sql injection.
This vulnerability is identified as CVE-2025-52618. The attack can be executed remotely. There is not any exploit available.
Upgrading the affected component is recommended.
A vulnerability labeled as problematic has been found in HCL BigFix SaaS Remediate up to 8.1.13. This affects an unknown part of the component SaaS Authentication Service. Executing manipulation can lead to origin validation error.
The identification of this vulnerability is CVE-2025-52621. The attack may be launched remotely. There is no exploit available.
The affected component should be upgraded.
A vulnerability classified as problematic was found in HCL BigFix SaaS Remediate up to 8.1.13. The affected element is an unknown function of the component SaaS Authentication Service. Such manipulation leads to cross site scripting.
This vulnerability is listed as CVE-2025-52620. The attack may be performed from remote. There is no available exploit.
Upgrading the affected component is advised.
A vulnerability, which was classified as critical, has been found in Dell Repository Manager 3.4.7/3.4.8. This impacts an unknown function. Performing manipulation results in improper handling of insufficient permissions or privileges.
This vulnerability was named CVE-2025-45376. The attack needs to be approached locally. There is no available exploit.
It is advisable to upgrade the affected component.
A vulnerability was found in code-projects Client Details System 1.0 and classified as critical. Impacted is an unknown function of the file /admin/update-profile.php. Such manipulation of the argument uid leads to sql injection.
This vulnerability is documented as CVE-2025-11605. The attack can be executed remotely. Additionally, an exploit exists.
A vulnerability, which was classified as problematic, has been found in Tomofun Furbo 360 and Furbo Mini. The impacted element is an unknown function of the file collect_logs.sh of the component Debug Log S3 Bucket Handler. The manipulation leads to insecure storage of sensitive information.
This vulnerability is traded as CVE-2025-11639. An attack has to be approached locally. Furthermore, there is an exploit available.
The firmware versions determined to be affected are Furbo 360 up to FB0035_FW_036 and Furbo Mini up to MC0020_FW_074. The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability classified as problematic was found in HCL Unica Centralized Offer Management up to 25.1. This impacts an unknown function. The manipulation results in improper check or handling of exceptional conditions.
This vulnerability is reported as CVE-2025-31998. The attack can be launched remotely. No exploit exists.
A vulnerability, which was classified as problematic, has been found in HCL Unica Centralized Offer Management up to 25.1. Affected is an unknown function. This manipulation causes authorization bypass.
This vulnerability appears as CVE-2025-31997. The attack may be initiated remotely. There is no available exploit.
A vulnerability has been found in HCL Unica Centralized Offer Management up to 25.1 and classified as critical. Affected by this issue is some unknown functionality. Performing manipulation results in server-side request forgery.
This vulnerability is known as CVE-2025-31993. Remote exploitation of the attack is possible. No exploit is available.