A vulnerability was found in Qiyuesuo Eelectronic Signature Platform up to 4.34 and classified as critical. Affected by this issue is the function execute of the file /api/code/upload of the component Scheduled Task Handler. The manipulation of the argument File leads to unrestricted upload.
This vulnerability is handled as CVE-2025-8775. The attack may be launched remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability has been found in riscv-boom SonicBOOM up to 2.2.3 and classified as problematic. Affected by this vulnerability is an unknown functionality of the component L1 Data Cache Handler. The manipulation leads to observable timing discrepancy.
This vulnerability is known as CVE-2025-8774. Local access is required to approach this attack. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability, which was classified as critical, was found in Dinstar Monitoring Platform 甘肃省危险品库监控平台 1.0. Affected is an unknown function of the file /itc/$%7BappPath%7D/login_getPasswordErrorNum.action. The manipulation of the argument userBean.loginName leads to sql injection.
This vulnerability is traded as CVE-2025-8773. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability, which was classified as problematic, has been found in Vinades NukeViet up to 4.5.06. This issue affects some unknown processing of the file /admin/index.php?language=en&nv=upload of the component Module Handler. The manipulation leads to server-side request forgery.
The identification of this vulnerability is CVE-2025-8772. The attack may be initiated remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability classified as critical has been found in Photodex ProShow Producer 5.0.3256. This affects an unknown part of the component Plugin Load List File Handler. The manipulation leads to stack-based buffer overflow. This vulnerability only affects products that are no longer supported by the maintainer.
This vulnerability is uniquely identified as CVE-2012-10051. Attacking locally is a requirement. Furthermore, there is an exploit available.
A vulnerability was found in Easy Hosting Control Panel EHCP 20.04.1.b. It has been rated as problematic. Affected by this issue is some unknown functionality. The manipulation of the argument ftpusername leads to cross site scripting.
This vulnerability is handled as CVE-2025-50927. The attack may be launched remotely. There is no exploit available.
A vulnerability was found in Zenoss Core 3.x. It has been declared as critical. Affected by this vulnerability is the function Popen of the file ZenossInfo.py of the component showdaemonXMLConfig Endpoint. The manipulation of the argument daemon leads to path traversal. This vulnerability only affects products that are no longer supported by the maintainer.
This vulnerability is known as CVE-2012-10048. The attack can be launched remotely. Furthermore, there is an exploit available.
A vulnerability was found in ESVA-Project E-Mail Security Virtual Appliance 2057. It has been classified as critical. Affected is an unknown function of the file learn-msg.cgi of the component CGI Handler. The manipulation of the argument ID leads to os command injection. This vulnerability only affects products that are no longer supported by the maintainer.
This vulnerability is traded as CVE-2012-10046. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
A vulnerability was found in PMSoftware Simple Web Server 2.2 rc2 and classified as critical. This issue affects the function vsprintf. The manipulation leads to stack-based buffer overflow. This vulnerability only affects products that are no longer supported by the maintainer.
The identification of this vulnerability is CVE-2012-10053. The attack may be initiated remotely. Furthermore, there is an exploit available.
A vulnerability has been found in Mitel MiCollab up to 10.0 SP1 FP1 and classified as critical. This vulnerability affects unknown code of the component Suite Applications Services. The manipulation leads to sql injection.
This vulnerability was named CVE-2025-52914. The attack can be initiated remotely. There is no exploit available.
A vulnerability, which was classified as critical, was found in Mitel MiCollab up to 9.8 SP2. This affects an unknown part of the component NuPoint Unified Messaging. The manipulation leads to path traversal.
This vulnerability is uniquely identified as CVE-2025-52913. The attack needs to be done within the local network. There is no exploit available.
A vulnerability, which was classified as critical, has been found in ActFax Server 4.32. Affected by this issue is the function strcpy of the component Import Users from File. The manipulation leads to stack-based buffer overflow. This vulnerability only affects products that are no longer supported by the maintainer.
This vulnerability is handled as CVE-2012-10043. An attack has to be approached locally. Furthermore, there is an exploit available.
A vulnerability classified as critical was found in AjaXplorer up to 2.5. Affected by this vulnerability is an unknown functionality of the file checkInstall.php. The manipulation of the argument destServer leads to os command injection.
This vulnerability is known as CVE-2010-10013. The attack can be launched remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.