A vulnerability has been found in TOTOLINK T6 4.1.5cu.748_B20211015 and classified as critical. Affected by this vulnerability is the function setTelnetCfg of the file /cgi-bin/cstecgi.cgi of the component Telnet Service. The manipulation of the argument telnet_enabled with the input 1 leads to missing authentication.
This vulnerability is known as CVE-2025-7862. The attack can be launched remotely. Furthermore, there is an exploit available.
It is recommended to apply restrictive firewalling.
A vulnerability, which was classified as critical, was found in code-projects Church Donation System 1.0. Affected is an unknown function of the file /members/search.php. The manipulation of the argument Username leads to sql injection.
This vulnerability is traded as CVE-2025-7861. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as critical, has been found in code-projects Church Donation System 1.0. This issue affects some unknown processing of the file /members/login_admin.php. The manipulation of the argument Username leads to sql injection.
The identification of this vulnerability is CVE-2025-7860. The attack may be initiated remotely. Furthermore, there is an exploit available.
A vulnerability classified as critical was found in code-projects Church Donation System 1.0. This vulnerability affects unknown code of the file /members/update_password_admin.php. The manipulation of the argument new_password leads to sql injection.
This vulnerability was named CVE-2025-7859. The attack can be initiated remotely. Furthermore, there is an exploit available.
A vulnerability classified as problematic has been found in PHPGurukul Apartment Visitors Management System 1.0. This affects an unknown part of the file /admin-profile.php of the component HTTP POST Request Handler. The manipulation of the argument adminname leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2025-7858. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
A vulnerability was found in PHPGurukul Apartment Visitors Management System 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file bwdates-passreports-details.php of the component HTTP POST Request Handler. The manipulation of the argument visname leads to cross site scripting.
This vulnerability is handled as CVE-2025-7857. The attack may be launched remotely. Furthermore, there is an exploit available.
A vulnerability was found in PHPGurukul Apartment Visitors Management System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file pass-details.php of the component HTTP POST Request Handler. The manipulation of the argument visname leads to cross site scripting.
This vulnerability is known as CVE-2025-7856. The attack can be launched remotely. Furthermore, there is an exploit available.
A vulnerability was found in ThemeREX Addons Plugin up to 2.35.1.1 on WordPress. It has been classified as problematic. Affected is the function trx_addons_get_svg_from_file. The manipulation of the argument svg leads to cross site scripting.
This vulnerability is traded as CVE-2025-6997. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability was found in GI-Media Library Plugin up to 2.x on WordPress and classified as critical. This issue affects some unknown processing. The manipulation of the argument fileid leads to path traversal.
The identification of this vulnerability is CVE-2015-10136. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Work the Flow File Upload Plugin up to 2.5.2 on WordPress and classified as critical. This vulnerability affects unknown code of the component jQuery-File-Upload-9.5.0. The manipulation leads to unrestricted upload.
This vulnerability was named CVE-2015-10138. The attack can be initiated remotely. There is no exploit available.