A vulnerability, which was classified as problematic, was found in IBM Cloud Pak System 2.3.5.0/2.3.3.7/2.3.3.7 iFix1. This affects an unknown part. The manipulation leads to basic cross site scripting.
This vulnerability is uniquely identified as CVE-2023-38007. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Anton Bond Additional Order Filters for WooCommerce Plugin up to 1.22 on WordPress and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to cross-site request forgery.
This vulnerability is known as CVE-2025-53271. The attack can be launched remotely. There is no exploit available.
A vulnerability, which was classified as problematic, has been found in TMRW-studio Katerio Plugin up to 1.5.1 on WordPress. Affected by this issue is some unknown functionality. The manipulation leads to path traversal: '.../...//'.
This vulnerability is handled as CVE-2025-52810. The attack may be launched remotely. There is no exploit available.
A vulnerability classified as critical has been found in Dell Unisphere for PowerMax vApp 9.2.4.x on PowerMax. This affects an unknown part. The manipulation leads to improper neutralization of directives in statically saved code ('static code injection').
This vulnerability is uniquely identified as CVE-2025-36595. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in VG WORT METIS Plugin up to 2.0.0 on WordPress. It has been declared as problematic. Affected by this vulnerability is the function gutenberg_save_post of the component Setting Handler. The manipulation leads to missing authorization.
This vulnerability is known as CVE-2025-5812. The attack can be launched remotely. There is no exploit available.
A vulnerability was found in Responsive Food and Drink Menu Plugin up to 2.3 on WordPress and classified as problematic. Affected by this issue is the function display_pdf_menus of the component Shortcode Handler. The manipulation leads to cross site scripting.
This vulnerability is handled as CVE-2025-6378. The attack may be launched remotely. There is no exploit available.
A vulnerability was found in Post Rating and Review Plugin up to 1.3.4 on WordPress and classified as problematic. This issue affects some unknown processing. The manipulation of the argument Class leads to cross site scripting.
The identification of this vulnerability is CVE-2025-6538. The attack may be initiated remotely. There is no exploit available.
Threat hunters have discovered a network of more than 1,000 compromised small office and home office (SOHO) devices that have been used to facilitate a prolonged cyber espionage infrastructure campaign for China-nexus hacking groups.
The Operational Relay Box (ORB) network has been codenamed LapDogs by SecurityScorecard's STRIKE team.
"The LapDogs network has a high concentration of victims
Starting June 9, 2025, Russian internet service providers (ISPs) have begun throttling access to websites and services protected by Cloudflare, an American internet giant. [...]
A vulnerability, which was classified as problematic, was found in WP VR Plugin up to 8.5.32 on WordPress. This affects an unknown part. The manipulation leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2025-6350. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability, which was classified as critical, has been found in BeeTeam368 Extensions Plugin up to 2.3.4 on WordPress. Affected by this issue is the function handle_remove_temp_file. The manipulation leads to path traversal.
This vulnerability is handled as CVE-2025-6381. The attack may be launched remotely. There is no exploit available.
A vulnerability classified as critical was found in BeeTeam368 Extensions Pro Plugin up to 2.3.4 on WordPress. Affected by this vulnerability is the function handle_live_fn. The manipulation leads to path traversal.
This vulnerability is known as CVE-2025-6379. The attack can be launched remotely. There is no exploit available.