简介基本知识Syzkaller 是 Google 的安全研究人员开发并维护的开源内核 Fuzz 工具,目前主要由 dvyukov 维护。它是使用 Go 语言编写的,也有少部分 C 代码,具有部署快速、使用简便的特点,同时还支持多种操作系统如:Linux、Android、Windows、openbsd、darwin 等系统。不过它支持最全面的还是 Linux 系统。众所周知内核是通过系统调用进行交互
A vulnerability, which was classified as critical, has been found in Auto Thumbnailer Plugin up to 1.0 on WordPress. This vulnerability affects the function uploadThumb. This manipulation causes unrestricted upload.
This vulnerability is tracked as CVE-2025-12154. The attack is possible to be carried out remotely. No exploit exists.
A vulnerability classified as problematic was found in WP-SOS-Donate Donation Sidebar Plugin up to 0.9.2 on WordPress. This affects an unknown part. The manipulation of the argument $_SERVER['PHP_SELF'] results in cross site scripting.
This vulnerability is identified as CVE-2025-13625. The attack can be executed remotely. There is not any exploit available.
A vulnerability classified as critical has been found in My Auctions Allegro Plugin up to 3.6.32 on WordPress. Affected by this issue is some unknown functionality. The manipulation of the argument auction_id leads to sql injection.
This vulnerability is referenced as CVE-2025-12850. Remote exploitation of the attack is possible. No exploit is available.
A vulnerability described as problematic has been identified in Payaza Plugin up to 0.3.8 on WordPress. Affected by this vulnerability is the function wp_ajax_nopriv_update_order_status of the component AJAX Endpoint. Executing manipulation can lead to missing authorization.
The identification of this vulnerability is CVE-2025-12355. The attack may be launched remotely. There is no exploit available.
A vulnerability marked as critical has been reported in Voidek Employee Portal Plugin up to 1.0.6 on WordPress. Affected is an unknown function. Performing manipulation results in missing authorization.
This vulnerability was named CVE-2025-12093. The attack may be initiated remotely. There is no available exploit.
A vulnerability labeled as problematic has been found in EPROLO Dropshipping Plugin up to 2.3.1 on WordPress. This impacts the function wp_ajax_eprolo_delete_tracking of the component AJAX Endpoint. Such manipulation leads to missing authorization.
This vulnerability is uniquely identified as CVE-2025-12133. The attack can be launched remotely. No exploit exists.
A vulnerability identified as problematic has been detected in Live CSS Preview Plugin up to 2.0.0 on WordPress. This affects the function wp_ajax_frontend_save of the component AJAX Endpoint. This manipulation causes missing authorization.
This vulnerability is handled as CVE-2025-12354. The attack can be initiated remotely. There is not any exploit available.
A vulnerability categorized as problematic has been discovered in Twitscription Plugin up to 0.1.1 on WordPress. The impacted element is an unknown function of the file admin.php. The manipulation of the argument PATH_INFO results in cross site scripting.
This vulnerability is known as CVE-2025-13623. It is possible to launch the attack remotely. No exploit is available.
A vulnerability was found in Takeads Plugin up to 1.0.13 on WordPress. It has been rated as problematic. The affected element is an unknown function of the component Setting Handler. The manipulation leads to missing authorization.
This vulnerability is traded as CVE-2025-12370. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability was found in Nouri.sh Newsletter Plugin up to 1.0.1.3 on WordPress. It has been declared as problematic. Impacted is an unknown function. Executing manipulation of the argument $_SERVER['PHP_SELF'] can lead to cross site scripting.
This vulnerability appears as CVE-2025-13515. The attack may be performed from remote. There is no available exploit.
A vulnerability was found in My Auctions Allegro Plugin up to 3.6.32 on WordPress and classified as critical. This vulnerability affects unknown code. Such manipulation of the argument controller leads to file inclusion.
This vulnerability is documented as CVE-2025-12851. The attack can be executed remotely. There is not any exploit available.