A vulnerability classified as critical was found in Juniper Junos OS and Junos OS Evolved. Affected by this vulnerability is an unknown functionality of the component Routing Protocol Daemon. The manipulation leads to out-of-bounds read.
This vulnerability is known as CVE-2024-39516. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Microsoft Visual Studio Code. It has been rated as critical. This issue affects some unknown processing. The manipulation leads to uncontrolled search path.
The identification of this vulnerability is CVE-2025-26631. The attack needs to be approached locally. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Microsoft Access. It has been declared as critical. This vulnerability affects unknown code. The manipulation leads to use after free.
This vulnerability was named CVE-2025-26630. The attack can be initiated remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in wp01ru WP01 Plugin up to 2.6.2 on WordPress. It has been rated as problematic. This issue affects the function make_archive. The manipulation leads to missing authorization.
The identification of this vulnerability is CVE-2025-2267. The attack may be initiated remotely. There is no exploit available.
A vulnerability was found in jdsofttech School Management System Plugin up to 2.2.16 on WordPress. It has been declared as critical. This vulnerability affects unknown code. The manipulation of the argument cid leads to sql injection.
This vulnerability was named CVE-2025-1670. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in jdsofttech School Management System Plugin up to 2.2.16 on WordPress. It has been classified as critical. This affects the function wpsp_UpdateTeacher of the component Password Reset Handler. The manipulation leads to authorization bypass.
This vulnerability is uniquely identified as CVE-2025-1667. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in tj-actions changed-files up to 45.0.7 and classified as problematic. Affected by this issue is some unknown functionality. The manipulation leads to embedded malicious code.
This vulnerability is handled as CVE-2025-30066. The attack may be launched remotely. There is no exploit available.
A vulnerability has been found in codexpert WC Affiliate Plugin up to 2.5.3 on WordPress and classified as problematic. Affected by this vulnerability is the function export_all_data. The manipulation leads to missing authorization.
This vulnerability is known as CVE-2024-12336. The attack can be launched remotely. There is no exploit available.
A vulnerability, which was classified as critical, was found in stylemix Directory Listings WordPress plugin up to 2.1.7 on WordPress. Affected is an unknown function of the component Post Meta Data Handler. The manipulation leads to missing authorization.
This vulnerability is traded as CVE-2025-1657. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability classified as critical was found in jdsofttech School Management System Plugin up to 2.2.16 on WordPress. This vulnerability affects unknown code. The manipulation leads to sql injection.
This vulnerability was named CVE-2025-1669. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in jdsofttech School Management System Plugin up to 2.2.16 on WordPress. This issue affects the function wpsp_DeleteUser. The manipulation leads to missing authorization.
The identification of this vulnerability is CVE-2025-1668. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in ShineTheme Travel Booking WordPress Theme up to 3.1.8 on WordPress. This affects the function hotel_alone_load_more_post. The manipulation of the argument style leads to improper control of filename for include/require statement in php program ('php remote file inclusion').
This vulnerability is uniquely identified as CVE-2025-1771. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.