A vulnerability was found in Tenda AC9 15.03.05.19. It has been rated as problematic. The impacted element is an unknown function of the file /etc_ro/shadow of the component Administrative Interface. This manipulation causes hard-coded credentials.
This vulnerability is handled as CVE-2025-9731. It is possible to launch the attack on the local host. Additionally, an exploit exists.
A vulnerability was found in itsourcecode Apartment Management System 1.0. It has been declared as critical. The affected element is an unknown function of the file /ajax/updateProfile.php. The manipulation of the argument user_id results in sql injection.
This vulnerability is known as CVE-2025-9730. It is possible to launch the attack remotely. Furthermore, an exploit is available.
A vulnerability was found in activePDF WebGrabber up to 3.8.2.0. It has been classified as critical. Impacted is the function GetStatus of the file APWebGrb.ocx. The manipulation leads to stack-based buffer overflow.
This vulnerability is traded as CVE-2008-20001. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability was found in Belkin Bulldog Plus UPS Monitoring Software up to 4.0.2 and classified as critical. This issue affects some unknown processing of the component Web Service. Executing manipulation can lead to stack-based buffer overflow. This vulnerability only affects products that are no longer supported by the maintainer.
This vulnerability appears as CVE-2009-20009. The attack may be performed from remote. There is no available exploit.
A vulnerability has been found in PHPGurukul Online Course Registration 3.1 and classified as critical. This vulnerability affects unknown code of the file /admin/student-registration.php. Performing manipulation of the argument studentname results in sql injection.
This vulnerability is reported as CVE-2025-9729. The attack is possible to be carried out remotely. Moreover, an exploit is present.
A vulnerability, which was classified as problematic, was found in givanz Vvveb 1.0.7.2. This affects an unknown part of the file app/template/user/login.tpl. Such manipulation of the argument Email/Password leads to cross site scripting.
This vulnerability is documented as CVE-2025-9728. The attack can be executed remotely. There is not any exploit available.
Applying a patch is advised to resolve this issue.
A vulnerability, which was classified as critical, has been found in D-Link DIR-816L 206b01. Affected by this issue is the function soapcgi_main of the file /soap.cgi. This manipulation of the argument service causes os command injection. This vulnerability only affects products that are no longer supported by the maintainer.
This vulnerability is registered as CVE-2025-9727. Remote exploitation of the attack is possible. Furthermore, an exploit is available.
A vulnerability classified as critical was found in Campcodes Farm Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /review.php. The manipulation of the argument pid results in sql injection.
This vulnerability is cataloged as CVE-2025-9726. The attack may be launched remotely. Furthermore, there is an exploit available.
A vulnerability classified as problematic has been found in Cudy LT500E up to 2.3.12. Affected is an unknown function of the file /squashfs-root/etc/shadow of the component Web Interface. The manipulation leads to use of hard-coded password.
This vulnerability is listed as CVE-2025-9725. The attack must be carried out locally. In addition, an exploit is available.
It is recommended to upgrade the affected component.
The vendor explains: "[T]he firmware does store a default password of 'admin'. This password has been deprecated since LT500E firmware version 2.3.13 and is no longer used. The LT500E does not have an administrator password set by default; a new password (at least 8 characters ) must be manually created upon first login the web management page."
A vulnerability described as problematic has been identified in Portabilis i-Educar up to 2.10. This impacts an unknown function of the file /intranet/educar_nivel_ensino_cad.php. Executing manipulation of the argument nm_nivel/descricao can lead to cross site scripting.
This vulnerability is tracked as CVE-2025-9724. The attack can be launched remotely. Moreover, an exploit is present.