A vulnerability was found in Tenda FH451 up to 1.0.0.9 and classified as critical. Affected by this issue is the function fromAddressNat of the file /goform/addressNat of the component POST Request Handler. The manipulation of the argument page leads to stack-based buffer overflow.
This vulnerability is handled as CVE-2025-7434. The attack may be launched remotely. Furthermore, there is an exploit available.
A vulnerability was found in LiveHelperChat lhc-php-resque Extension up to ee1270b35625f552425e32a6a3061cd54b5085c4. It has been classified as problematic. This affects an unknown part of the file /site_admin/lhcphpresque/list/ of the component List Handler. The manipulation of the argument queue name leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2025-7435. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. It is recommended to apply a patch to fix this issue.
A vulnerability was found in Campcodes Online Recruitment Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /admin/ajax.php?action=delete_vacancy. The manipulation of the argument ID leads to sql injection.
This vulnerability was named CVE-2025-7436. The attack can be initiated remotely. Furthermore, there is an exploit available.
A vulnerability was found in Premium Age Verification Restriction Plugin up to 3.0.2 on WordPress. It has been rated as critical. This issue affects some unknown processing of the file remote_tunnel.php. The manipulation leads to path traversal.
The identification of this vulnerability is CVE-2025-7401. The attack may be initiated remotely. There is no exploit available.
A vulnerability, which was classified as critical, was found in GB Forms DB Plugin up to 1.0.2 on WordPress. This affects the function gbfdb_talk_to_front. The manipulation leads to code injection.
This vulnerability is uniquely identified as CVE-2025-5392. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability has been found in Contest Gallery Plugin up to 26.0.8 on WordPress and classified as problematic. This vulnerability affects unknown code. The manipulation leads to cross site scripting.
This vulnerability was named CVE-2025-6716. The attack can be initiated remotely. There is no exploit available.
A vulnerability was found in FooGallery Plugin up to 2.4.31 on WordPress and classified as problematic. This issue affects some unknown processing of the component HTML Attribute Handler. The manipulation leads to HTML injection.
The identification of this vulnerability is CVE-2025-6068. The attack may be initiated remotely. There is no exploit available.
A vulnerability was found in WPGYM Plugin up to 67.7.x on WordPress. It has been rated as critical. This issue affects the function MJ_gmgt_delete_class_limit_for_member/MJ_gmgt_get_yearly_income_expense/MJ_gmgt_get_monthly_income_expense/MJ_gmgt_add_class_limit/MJ_gmgt_view_meeting_detail/MJ_gmgt_create_meeting. The manipulation leads to sql injection.
The identification of this vulnerability is CVE-2025-7442. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in WoodMart Plugin up to 8.2.5 on WordPress. Affected is the function woodmart_get_posts_by_query of the component Password Protect Handler. The manipulation leads to improper authentication.
This vulnerability is traded as CVE-2025-6745. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability classified as problematic was found in WPC Smart Compare for WooCommerce Plugin up to 6.4.6 on WordPress. Affected by this vulnerability is the function shortcode_btn of the component Shortcode Handler. The manipulation leads to cross site scripting.
This vulnerability is known as CVE-2025-5530. The attack can be launched remotely. There is no exploit available.
A vulnerability, which was classified as problematic, has been found in aviplugins WP Register Profile With Shortcode Plugin up to 3.6.2 on WordPress. Affected by this issue is some unknown functionality of the component Shortcode Handler. The manipulation leads to information disclosure.
This vulnerability is handled as CVE-2025-4593. The attack may be launched remotely. There is no exploit available.
A vulnerability, which was classified as critical, was found in Broken Link Notifier Plugin up to 1.3.0 on WordPress. This affects an unknown part. The manipulation leads to csv injection.
This vulnerability is uniquely identified as CVE-2025-6838. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability has been found in Broken Link Notifier Plugin up to 1.3.0 on WordPress and classified as critical. This vulnerability affects the function ajax_blinks. The manipulation leads to server-side request forgery.
This vulnerability was named CVE-2025-6851. The attack can be initiated remotely. There is no exploit available.
A vulnerability was found in Tenda O3V2 1.0.0.12(3880). It has been rated as critical. This issue affects the function fromMacFilterModify of the file /goform/operateMacFilter of the component httpd. The manipulation of the argument mac leads to stack-based buffer overflow.
The identification of this vulnerability is CVE-2025-7421. The attack may be initiated remotely. Furthermore, there is an exploit available.
A vulnerability classified as critical has been found in Tenda O3V2 1.0.0.12(3880). Affected is the function setAutoReboot of the file /goform/setNetworkService of the component httpd. The manipulation of the argument week leads to stack-based buffer overflow.
This vulnerability is traded as CVE-2025-7422. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
A vulnerability classified as critical was found in Tenda O3V2 1.0.0.12(3880). Affected by this vulnerability is the function formWifiMacFilterSet of the file /goform/setWrlFilterList of the component httpd. The manipulation of the argument macList leads to stack-based buffer overflow.
This vulnerability is known as CVE-2025-7423. The attack can be launched remotely. Furthermore, there is an exploit available.