A vulnerability was found in TablePress Plugin up to 3.0.4 on WordPress. It has been classified as problematic. Affected is an unknown function. The manipulation leads to cross site scripting.
This vulnerability is traded as CVE-2025-2685. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability, which was classified as very critical, was found in Silicon Labs Gecko OS 1.0.46. Affected is an unknown function of the component HTTP Request Handler. The manipulation leads to stack-based buffer overflow.
This vulnerability is traded as CVE-2025-2837. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability was found in KNIME Business Hub up to 1.10.3/1.11.3/1.12.3/1.13.2. It has been declared as critical. This vulnerability affects unknown code of the component Ingress-nginx. The manipulation leads to improper authentication.
This vulnerability was named CVE-2025-2787. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Splunk Enterprise and Cloud Platform. It has been rated as problematic. This issue affects some unknown processing of the file /app/search/search of the component Saved Search Handler. The manipulation of the argument s leads to information disclosure.
The identification of this vulnerability is CVE-2025-20232. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Splunk Enterprise and Cloud Platform. It has been classified as problematic. Affected is an unknown function of the component App Key Value Store. The manipulation leads to cross-site request forgery.
This vulnerability is traded as CVE-2025-20228. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Xiaomi Quick App Framework 1.30.2.1 and classified as problematic. Affected by this issue is some unknown functionality. The manipulation leads to origin validation error.
This vulnerability is handled as CVE-2024-45353. The attack may be launched remotely. There is no exploit available.