A vulnerability classified as critical was found in JEXTN Classified 1.0.0 on Joomla. This vulnerability affects unknown code. The manipulation as part of Request leads to sql injection.
This vulnerability was named CVE-2018-6575. The attack can be initiated remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as critical, was found in Gb-plugins GB Gallery Slideshow 1.5. Affected is an unknown function of the file GBgallery.php. The manipulation of the argument selected_group leads to sql injection.
This vulnerability is traded as CVE-2014-8375. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
A vulnerability was found in jDownloads Extension up to 3.2.58 on Joomla and classified as problematic. This issue affects some unknown processing. The manipulation leads to cross site scripting.
The identification of this vulnerability is CVE-2018-10068. The attack may be initiated remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in bcoos 1.0.10. This vulnerability affects unknown code. The manipulation of the argument lid leads to sql injection.
This vulnerability was named CVE-2007-6275. The attack can be initiated remotely. Furthermore, there is an exploit available.
A vulnerability classified as problematic has been found in ThinkSAAS 3.7. Affected is an unknown function of the component Request Handler. The manipulation leads to denial of service.
This vulnerability is traded as CVE-2024-40455. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability classified as critical was found in Linksys E2500 2.0.00. Affected by this vulnerability is the function hnd_parentalctrl_unblock. The manipulation leads to privilege escalation.
This vulnerability is known as CVE-2024-40495. The attack needs to be initiated within the local network. There is no exploit available.
A vulnerability has been found in Kashipara Online Exam System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /admin/afeedback.php. The manipulation of the argument email leads to cross site scripting.
This vulnerability is known as CVE-2024-40478. The attack can be launched remotely. There is no exploit available.
A vulnerability classified as critical was found in Kashipara Online Exam System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/update.php of the component Administrator Dashboard. The manipulation leads to improper access controls.
This vulnerability is known as CVE-2024-40480. The attack can be launched remotely. There is no exploit available.
A vulnerability, which was classified as problematic, has been found in idcCMS 1.35. This issue affects some unknown processing of the file /admin/userGroup_deal.php?mudi=del. The manipulation leads to cross-site request forgery.
The identification of this vulnerability is CVE-2024-40039. The attack may be initiated remotely. There is no exploit available.
A vulnerability classified as critical has been found in Online Clinic Management System 1.0. This affects an unknown part of the file login.php. The manipulation of the argument User leads to sql injection.
This vulnerability is uniquely identified as CVE-2024-40393. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability was found in Samsung Wearable Processor and Modem Exynos up to 9825. It has been rated as critical. This issue affects some unknown processing. The manipulation leads to out-of-bounds write.
The identification of this vulnerability is CVE-2024-39890. The attack needs to be done within the local network. There is no exploit available.
A vulnerability was found in Simple Laboratory Management System 1.0. It has been rated as critical. Affected by this issue is the function delete_users of the file Useres.php. The manipulation leads to sql injection.
This vulnerability is handled as CVE-2024-40443. The attack may be launched remotely. There is no exploit available.
A vulnerability classified as problematic has been found in Wireshark. Affected is an unknown function of the file epan/dissectors/asn1/ros/packet-ros-template.c of the component ROS Dissector. The manipulation leads to null pointer dereference.
This vulnerability is traded as CVE-2017-9347. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in szluyu99 gin-vue-blog up to 61dd11ccd296e8642a318ada3ef7b3f7776d2410. It has been declared as critical. This vulnerability affects unknown code of the file gin-blog-server/internal/manager.go of the component PATCH Request Handler. The manipulation leads to improper authorization.
This vulnerability was named CVE-2025-6099. The attack can be initiated remotely. Furthermore, there is an exploit available.
This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available.
A vulnerability, which was classified as very critical, has been found in Aloaha Aloaha PDF Suite FREE. Affected by this issue is some unknown functionality. The manipulation leads to memory corruption.
This vulnerability is handled as CVE-2013-4978. The attack may be launched remotely. Furthermore, there is an exploit available.
A vulnerability was found in UTT 进取 750W up to 5.0. It has been classified as critical. This affects the function strcpy of the file /goform/setSysAdm of the component API. The manipulation of the argument passwd1 leads to buffer overflow.
This vulnerability is uniquely identified as CVE-2025-6098. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability was found in UTT 进取 750W up to 5.0 and classified as critical. Affected by this issue is the function formDefineManagement of the file /goform/setSysAdm of the component Administrator Password Handler. The manipulation of the argument passwd1 leads to unverified password change.
This vulnerability is handled as CVE-2025-6097. The attack may be launched remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.