A vulnerability was found in kidaze CourseSelectionSystem up to 42cd892b40a18d50bd4ed1905fa89f939173a464. It has been rated as critical. The impacted element is an unknown function of the file /Profilers/SProfile/reg.php. Performing manipulation of the argument USN results in sql injection.
This vulnerability is cataloged as CVE-2025-14566. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
A vulnerability was found in kidaze CourseSelectionSystem up to 42cd892b40a18d50bd4ed1905fa89f939173a464. It has been declared as critical. The affected element is an unknown function of the file /Profilers/SProfile/login1.php. Such manipulation of the argument Username leads to sql injection.
This vulnerability is listed as CVE-2025-14565. The attack may be performed from remote. In addition, an exploit is available.
Elastic found a new Windows backdoor, NANOREMOTE, similar to FINALDRAFT/REF7707, using the Google Drive API for C2. Elastic Security Labs researchers uncovered NANOREMOTE, a new Windows backdoor that uses the Google Drive API for C2. Elastic says it shares code with the FINALDRAFT (Squidoor) implant, which uses Microsoft Graph API and is linked to threat […]
A vulnerability was found in Apache Airflow up to 3.1.3. It has been classified as problematic. Impacted is an unknown function of the component Template Handler. This manipulation causes information disclosure.
This vulnerability is tracked as CVE-2025-66388. The attack is possible to be carried out remotely. No exploit exists.
Upgrading the affected component is recommended.
A vulnerability was found in Apache Airflow up to 3.1.3 and classified as problematic. This issue affects some unknown processing of the component kwargs. The manipulation results in information disclosure.
This vulnerability is identified as CVE-2025-65995. The attack can be executed remotely. There is not any exploit available.
It is suggested to upgrade the affected component.
A vulnerability has been found in Bookit Plugin up to 2.5.0 on WordPress and classified as problematic. This vulnerability affects unknown code of the component REST Endpoint. The manipulation leads to missing authorization.
This vulnerability is referenced as CVE-2025-12841. Remote exploitation of the attack is possible. No exploit is available.
The affected component should be upgraded.
A vulnerability, which was classified as critical, was found in Siemens Simcenter Femap. This affects an unknown part of the component SLDPRT File Parser. Executing manipulation can lead to uninitialized resource.
The identification of this vulnerability is CVE-2025-40829. The attack may be launched remotely. There is no exploit available.
You should upgrade the affected component.
A vulnerability, which was classified as critical, has been found in WooMulti Plugin up to 1.7 on WordPress. Affected by this issue is some unknown functionality. Performing manipulation results in path traversal.
This vulnerability was named CVE-2025-12835. The attack may be initiated remotely. There is no available exploit.
A vulnerability categorized as critical has been discovered in Visitor Logic Lite Plugin up to 1.0.3 on WordPress. Affected by this vulnerability is the function lp_track of the component Cookie Handler. Executing manipulation of the argument lpblocks can lead to deserialization.
This vulnerability is handled as CVE-2025-14044. The attack can be executed remotely. There is not any exploit available.
A vulnerability was found in WatchTowerHQ Plugin up to 3.15.0 on WordPress. It has been classified as problematic. Affected by this vulnerability is the function handle_big_object_download_request. Performing manipulation of the argument wht_download_big_object_origin results in path traversal.
This vulnerability is reported as CVE-2025-13972. The attack is possible to be carried out remotely. No exploit exists.
A vulnerability was found in URL Media Uploader Plugin up to 1.0.1 on WordPress. It has been declared as critical. Affected by this issue is the function url_media_uploader_url_upload_ajax_handler of the component File Upload. Executing manipulation can lead to missing authorization.
This vulnerability appears as CVE-2025-14045. The attack may be performed from remote. There is no available exploit.
A vulnerability described as problematic has been identified in SimplyConvert Plugin up to 1.0 on WordPress. The impacted element is an unknown function. Executing manipulation of the argument simplyconvert_hash can lead to cross site scripting.
The identification of this vulnerability is CVE-2025-14048. The attack may be launched remotely. There is no exploit available.