A vulnerability, which was classified as problematic, was found in Selleo Mentingo 2025.08.27. This issue affects some unknown processing of the file /api/course/enroll-course of the component Create New Course Basic Settings. Such manipulation of the argument Description leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2025-10388. The attack can be launched remotely. Moreover, an exploit is present.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability, which was classified as critical, has been found in codesiddhant Jasmin Ransomware up to 1.0.1. This vulnerability affects unknown code of the file /handshake.php. This manipulation of the argument machine_name/computer_user/os/date/time/ip/location/systemid/password causes sql injection.
This vulnerability is handled as CVE-2025-10387. The attack can be initiated remotely. Additionally, an exploit exists.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability was found in Google Android and classified as critical. This issue affects some unknown processing of the component Qualcomm. Executing manipulation can lead to data processing error.
This vulnerability is handled as CVE-2016-3856. It is possible to launch the attack on the local host. There is not any exploit available.
It is suggested to upgrade the affected component.
A vulnerability was found in GLPI up to 0.85.2. It has been classified as critical. This affects an unknown function of the file files/_tmp/ of the component File Upload. The manipulation leads to improper privilege management.
This vulnerability is documented as CVE-2015-7684. The attack can be initiated remotely. There is not any exploit available.
Upgrading the affected component is recommended.
A vulnerability was found in Google Android. It has been rated as problematic. This issue affects some unknown processing of the component Bootloader. This manipulation causes improper access controls.
This vulnerability is handled as CVE-2016-8467. It is possible to launch the attack on the local host. There is not any exploit available.
Upgrading the affected component is advised.
A vulnerability has been found in Google Android and classified as critical. Affected by this vulnerability is an unknown functionality of the component Bootloader. Performing manipulation results in improper access controls (Permanent).
This vulnerability is reported as CVE-2016-8467. The attack requires a local approach. No exploit exists.
The affected component should be upgraded.
A vulnerability, which was classified as problematic, has been found in Mattermost up to 10.5.8. This impacts an unknown function. This manipulation causes incorrect authorization.
This vulnerability appears as CVE-2025-49810. The attack may be initiated remotely. There is no available exploit.
It is advisable to upgrade the affected component.
A vulnerability marked as problematic has been reported in Mattermost up to 9.11.17/10.5.8. Impacted is an unknown function of the file /api/v4/teams/team-id/members/user-id/schemeRoles of the component API Endpoint. Performing manipulation results in incorrect authorization.
This vulnerability is cataloged as CVE-2025-53971. It is possible to initiate the attack remotely. There is no exploit available.
It is suggested to upgrade the affected component.
A vulnerability classified as problematic was found in Yida ECMS Consulting Enterprise Management System 1.0. This affects an unknown part of the file /login.do of the component POST Request Handler. The manipulation of the argument requestUrl results in cross site scripting.
This vulnerability is known as CVE-2025-10386. It is possible to launch the attack remotely. Furthermore, an exploit is available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability classified as critical was found in Oracle Business Process Management Suite 11.1.1.9.0/12.1.3.0.0/12.2.1.3.0. The affected element is an unknown function of the component OpenSSL. Such manipulation leads to risky cryptographic algorithm.
This vulnerability is uniquely identified as CVE-2018-1000180. The attack can be launched remotely. No exploit exists.
Upgrading the affected component is advised.
A vulnerability categorized as critical has been discovered in Bouncy Castle JCE Provider up to 1.55. This impacts an unknown function of the component ASN.1 Decoder. Such manipulation leads to improper verification of cryptographic signature.
This vulnerability is referenced as CVE-2016-1000338. It is possible to launch the attack remotely. No exploit is available.
It is advisable to upgrade the affected component.
A vulnerability was found in Bouncy Castle BC and BC-FJA. It has been declared as critical. The impacted element is an unknown function of the component RSA Key Pair Generator. The manipulation results in cryptographic issues.
This vulnerability is known as CVE-2018-1000180. It is possible to launch the attack remotely. No exploit is available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in Oracle Communications Converged Application Server up to 7.0.0.0. This affects an unknown part of the component Bouncy Castle. Executing manipulation can lead to risky cryptographic algorithm.
This vulnerability is tracked as CVE-2018-1000180. The attack can be launched remotely. No exploit exists.
Upgrading the affected component is advised.
A vulnerability has been found in Oracle Communications WebRTC Session Controller up to 7.1 and classified as critical. Impacted is an unknown function of the component Bouncy Castle Java Library. This manipulation causes risky cryptographic algorithm.
This vulnerability is registered as CVE-2018-1000180. Remote exploitation of the attack is possible. No exploit is available.
The affected component should be upgraded.