A vulnerability classified as problematic was found in Network-weathermap .network Weathermap up to 0.97. This vulnerability affects unknown code of the file editor.php. The manipulation of the argument mapname leads to path traversal.
This vulnerability was named CVE-2013-3739. The attack can be initiated remotely. Furthermore, there is an exploit available.
A vulnerability was found in Edimax BR-6288ACL 1.30. It has been declared as problematic. This vulnerability affects unknown code of the file wireless5g_basic.asp. The manipulation of the argument SSID leads to cross site scripting.
This vulnerability was named CVE-2025-1612. The attack can be initiated remotely. There is no exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability was found in FiberHome AN5506-01A ONU GPON RP2511. It has been rated as problematic. This issue affects some unknown processing of the file /goform/URL_filterCfg of the component URL Filtering Submenu. The manipulation of the argument url_IP leads to cross site scripting.
The identification of this vulnerability is CVE-2025-1613. The attack may be initiated remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability classified as problematic has been found in FiberHome AN5506-01A ONU GPON RP2511. Affected is an unknown function of the file /goform/portForwardingCfg of the component Port Forwarding Submenu. The manipulation of the argument pf_Description leads to cross site scripting.
This vulnerability is traded as CVE-2025-1614. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability was found in wp-buy WP Popup Window Maker Plugin up to 2.0 on WordPress and classified as problematic. This issue affects some unknown processing of the component Popup Window Handler. The manipulation leads to cross-site request forgery.
The identification of this vulnerability is CVE-2024-52421. The attack may be initiated remotely. There is no exploit available.
A vulnerability was found in Hugging Face Transformers. It has been classified as critical. This affects an unknown part. The manipulation leads to deserialization.
This vulnerability is uniquely identified as CVE-2024-11394. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability was found in Hugging Face Transformers. It has been declared as critical. This vulnerability affects unknown code. The manipulation leads to deserialization.
This vulnerability was named CVE-2024-11393. The attack can be initiated remotely. There is no exploit available.
A vulnerability, which was classified as problematic, has been found in WooCommerce Product Table Lite Plugin up to 3.8.6 on WordPress. Affected by this issue is some unknown functionality of the component Shortcode Handler. The manipulation leads to cross site scripting.
This vulnerability is handled as CVE-2024-10899. The attack may be launched remotely. There is no exploit available.
A vulnerability, which was classified as problematic, was found in Husky Plugin up to 1.3.6.3 on WordPress. This affects an unknown part. The manipulation of the argument really_curr_tax leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2024-11400. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability has been found in Booster for WooCommerce Plugin up to 7.2.3 on WordPress and classified as problematic. This vulnerability affects unknown code. The manipulation leads to cross site scripting.
This vulnerability was named CVE-2024-9239. The attack can be initiated remotely. There is no exploit available.
A vulnerability was found in GD bbPress Attachments Plugin up to 4.7.2 on WordPress and classified as problematic. This issue affects some unknown processing. The manipulation leads to cross site scripting.
The identification of this vulnerability is CVE-2024-11278. The attack may be initiated remotely. There is no exploit available.
A vulnerability was found in 404 Solution Plugin up to 2.35.19 on WordPress. It has been classified as problematic. Affected is an unknown function. The manipulation leads to cross site scripting.
This vulnerability is traded as CVE-2024-11277. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability was found in Restaurant Menu Plugin up to 2.4.2 on WordPress. It has been declared as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to cross site scripting.
This vulnerability is known as CVE-2024-9653. The attack can be launched remotely. There is no exploit available.
A vulnerability was found in MailMunch MailChimp Forms Plugin up to 3.2.3 on WordPress. It has been rated as problematic. Affected by this issue is some unknown functionality. The manipulation leads to cross site scripting.
This vulnerability is handled as CVE-2024-8726. The attack may be launched remotely. There is no exploit available.
A vulnerability has been found in Anhui Xufan Information Technology EasyCVR up to 2.7.0 and classified as problematic. This vulnerability affects unknown code of the file /api/v1/getbaseconfig. The manipulation leads to information disclosure.
This vulnerability was named CVE-2025-1595. The attack can be initiated remotely. Furthermore, there is an exploit available.
It is recommended to apply restrictive firewalling.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability was found in SourceCodester Best Church Management Software 1.0 and classified as critical. This issue affects some unknown processing of the file /fpassword.php. The manipulation of the argument email leads to sql injection.
The identification of this vulnerability is CVE-2025-1596. The attack may be initiated remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.