A vulnerability has been found in Shaarli up to 0.14.x and classified as problematic. This vulnerability affects unknown code. The manipulation leads to basic cross site scripting.
This vulnerability is uniquely identified as CVE-2025-55291. Local access is required to approach this attack. No exploit exists.
The affected component should be upgraded.
A vulnerability was found in HKritesh009 Grocery List Management Web App up to f491b681eb70d465f445c9a721415c965190f83b. It has been rated as critical. This affects an unknown part of the file /src/update.php. The manipulation of the argument ID leads to sql injection.
This vulnerability is traded as CVE-2025-9749. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available.
A vulnerability classified as critical was found in Campcodes Online Loan Management System 1.0. The affected element is an unknown function of the file /ajax.php?action=login. Executing manipulation of the argument Username can lead to sql injection.
This vulnerability is tracked as CVE-2025-9744. The attack can be launched remotely. Moreover, an exploit is present.
A vulnerability, which was classified as critical, has been found in D-Link DI-500WF 14.04.10A1T. The impacted element is an unknown function of the file /version_upgrade.asp of the component jhttpd. The manipulation of the argument path leads to os command injection.
This vulnerability is listed as CVE-2025-9745. The attack may be initiated remotely. In addition, an exploit is available.
A vulnerability, which was classified as problematic, was found in Campcodes Hospital Management System 1.0. This affects an unknown function of the file /admin/edit-doctor-specialization.php of the component Edit Doctor Specialization Page. The manipulation results in cross site scripting.
This vulnerability is cataloged as CVE-2025-9746. The attack may be launched remotely. Furthermore, there is an exploit available.
A vulnerability was found in Koillection up to 1.6.18 and classified as problematic. Affected is an unknown function of the file assets/controllers/csrf_protection_controller.js. Such manipulation leads to cross-site request forgery.
This vulnerability is documented as CVE-2025-9747. The attack can be executed remotely. Additionally, an exploit exists.
It is suggested to upgrade the affected component.
The vendor explains: "I ended up switching to a newer CSRF handling using stateless token."
A vulnerability was found in Tenda CH22 1.0.0.1. It has been declared as critical. Affected by this issue is the function fromIpsecitem of the file /goform/IPSECsave of the component httpd. Executing manipulation of the argument ipsecno can lead to stack-based buffer overflow.
This vulnerability appears as CVE-2025-9748. The attack may be performed from remote. There is no available exploit.