A vulnerability has been found in PHPGurukul Online Course Registration 3.1 and classified as critical. This vulnerability affects unknown code of the file /admin/student-registration.php. Performing manipulation of the argument studentname results in sql injection.
This vulnerability is reported as CVE-2025-9729. The attack is possible to be carried out remotely. Moreover, an exploit is present.
A vulnerability, which was classified as problematic, was found in givanz Vvveb 1.0.7.2. This affects an unknown part of the file app/template/user/login.tpl. Such manipulation of the argument Email/Password leads to cross site scripting.
This vulnerability is documented as CVE-2025-9728. The attack can be executed remotely. There is not any exploit available.
Applying a patch is advised to resolve this issue.
A vulnerability, which was classified as critical, has been found in D-Link DIR-816L 206b01. Affected by this issue is the function soapcgi_main of the file /soap.cgi. This manipulation of the argument service causes os command injection. This vulnerability only affects products that are no longer supported by the maintainer.
This vulnerability is registered as CVE-2025-9727. Remote exploitation of the attack is possible. Furthermore, an exploit is available.
A vulnerability classified as critical was found in Campcodes Farm Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /review.php. The manipulation of the argument pid results in sql injection.
This vulnerability is cataloged as CVE-2025-9726. The attack may be launched remotely. Furthermore, there is an exploit available.
A vulnerability classified as problematic has been found in Cudy LT500E up to 2.3.12. Affected is an unknown function of the file /squashfs-root/etc/shadow of the component Web Interface. The manipulation leads to use of hard-coded password.
This vulnerability is listed as CVE-2025-9725. The attack must be carried out locally. In addition, an exploit is available.
It is recommended to upgrade the affected component.
The vendor explains: "[T]he firmware does store a default password of 'admin'. This password has been deprecated since LT500E firmware version 2.3.13 and is no longer used. The LT500E does not have an administrator password set by default; a new password (at least 8 characters ) must be manually created upon first login the web management page."
A vulnerability described as problematic has been identified in Portabilis i-Educar up to 2.10. This impacts an unknown function of the file /intranet/educar_nivel_ensino_cad.php. Executing manipulation of the argument nm_nivel/descricao can lead to cross site scripting.
This vulnerability is tracked as CVE-2025-9724. The attack can be launched remotely. Moreover, an exploit is present.
A vulnerability marked as problematic has been reported in Portabilis i-Educar up to 2.10. This affects an unknown function of the file /intranet/educar_tipo_regime_cad.php. Performing manipulation of the argument nm_tipo results in cross site scripting.
This vulnerability is identified as CVE-2025-9723. The attack can be initiated remotely. Additionally, an exploit exists.
A vulnerability labeled as problematic has been found in Portabilis i-Educar up to 2.10. The impacted element is an unknown function of the file /intranet/educar_tipo_ocorrencia_disciplinar_cad.php. Such manipulation of the argument nm_tipo/descricao leads to cross site scripting.
This vulnerability is referenced as CVE-2025-9722. It is possible to launch the attack remotely. Furthermore, an exploit is available.
A vulnerability identified as problematic has been detected in Portabilis i-Educar up to 2.10. The affected element is an unknown function of the file /module/FormulaMedia/edit. This manipulation of the argument nome/formulaMedia causes cross site scripting.
The identification of this vulnerability is CVE-2025-9721. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
A vulnerability categorized as problematic has been discovered in Portabilis i-Educar up to 2.10. Impacted is an unknown function of the file /module/TabelaArredondamento/edit of the component Cadastrar tabela de arredondamento Page. The manipulation of the argument Nome results in cross site scripting.
This vulnerability was named CVE-2025-9720. The attack may be performed from remote. In addition, an exploit is available.