A vulnerability was found in ThemeREX Addons Plugin up to 2.35.1.1 on WordPress. It has been classified as problematic. Affected is the function trx_addons_get_svg_from_file. The manipulation of the argument svg leads to cross site scripting.
This vulnerability is traded as CVE-2025-6997. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability was found in GI-Media Library Plugin up to 2.x on WordPress and classified as critical. This issue affects some unknown processing. The manipulation of the argument fileid leads to path traversal.
The identification of this vulnerability is CVE-2015-10136. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Work the Flow File Upload Plugin up to 2.5.2 on WordPress and classified as critical. This vulnerability affects unknown code of the component jQuery-File-Upload-9.5.0. The manipulation leads to unrestricted upload.
This vulnerability was named CVE-2015-10138. The attack can be initiated remotely. There is no exploit available.
A vulnerability, which was classified as critical, was found in Website Contact Form with File Upload Plugin up to 1.3.4 on WordPress. This affects the function upload_file. The manipulation leads to unrestricted upload.
This vulnerability is uniquely identified as CVE-2015-10137. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability, which was classified as critical, has been found in WPLMS Learning Management System Plugin up to 1.8.4.1 on WordPress. Affected by this issue is the function wp_ajax_import_data. The manipulation leads to improper privilege management.
This vulnerability is handled as CVE-2015-10139. The attack may be launched remotely. There is no exploit available.
A vulnerability classified as critical was found in WPshop 2 on WordPress. Affected by this vulnerability is the function ajaxUpload. The manipulation leads to unrestricted upload.
This vulnerability is known as CVE-2015-10135. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in Simple Backup Plugin up to 2.7.10 on WordPress. Affected is the function download_backup_file. The manipulation leads to path traversal.
This vulnerability is traded as CVE-2015-10134. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability was found in Subscribe to Comments Plugin up to 2.1.2 on WordPress. It has been rated as problematic. This issue affects some unknown processing. The manipulation leads to file inclusion.
The identification of this vulnerability is CVE-2015-10133. The attack may be initiated remotely. There is no exploit available.
House, Senate Versions of 2026 NDAA Offer Competing Approaches to Cyber Washington is wagering that future conflicts will unfold as much in cyberspace as on the battlefield, with House and Senate lawmakers unveiling dueling drafts of a nearly $900 billion defense bill that spotlights needs for cybersecurity and artificial intelligence technology.
Cybercrime Group Bian Lian Claimed Responsibility for Attack Last Year A Texas-based firm that conducts workplace drug and alcohol testing for private employers and for compliance with state and federal agencies, including the Department of Transportation, disclosed to regulators that a July 2024 hacking incident affected nearly 750,000 people.
Hackers Using Amadey Bot to Drops Payloads From Fake GitHub Accounts Threat actors are using public GitHub repositories to host and distribute malware through the Amadey botnet in an ongoing campaign linked to a broader malware-as-a-service operation, Cisco Talos said in a report published Thursday.
New Working Group Launched After 2 Failed Attempts to Resolve AI Training Impasse The U.K. government on Wednesday began its latest round of talks between creative owners and the artificial intelligence sector to work out a potential deal on the use of copyrighted content to train AI models. The discussions follow two previous failed attempts.
A vulnerability was found in FoxyPress Plugin up to 0.4.2.1 on WordPress. It has been declared as critical. This vulnerability affects unknown code of the file uploadify.php. The manipulation leads to unrestricted upload.
This vulnerability was named CVE-2012-10020. The attack can be initiated remotely. There is no exploit available.
A vulnerability was found in Front-End Editor Plugin up to 2.2 on WordPress. It has been classified as critical. This affects an unknown part of the file upload.php. The manipulation leads to unrestricted upload.
This vulnerability is uniquely identified as CVE-2012-10019. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.