A vulnerability described as critical has been identified in Kazaar 1.25.12. This issue affects some unknown processing. Such manipulation of the argument alg leads to privilege escalation.
This vulnerability is referenced as CVE-2025-59685. The attack needs to be initiated within the local network. No exploit is available.
A vulnerability classified as critical has been found in Kazaar 1.25.12. Impacted is an unknown function of the file /api/v1/org-id/orders/order-id/documents. Performing manipulation of the argument order-id results in improper authorization.
This vulnerability is identified as CVE-2025-59686. The attack can only be performed from the local network. There is not any exploit available.
A vulnerability identified as critical has been detected in WP Private Content Plus Plugin up to 3.6.2 on WordPress. Impacted is an unknown function of the component Setting Handler. Performing manipulation results in authorization bypass.
This vulnerability was named CVE-2025-10720. The attack may be initiated remotely. There is no available exploit.
A vulnerability was found in JDownloads Component up to 4.0.47 on Joomla. It has been classified as problematic. This vulnerability affects unknown code. This manipulation causes cross-site request forgery.
This vulnerability appears as CVE-2025-55758. The attack may be initiated remotely. There is no available exploit.
A vulnerability labeled as problematic has been found in Clear2Pay Bank Visibility Application 1.10.0.104. The impacted element is an unknown function. Such manipulation of the argument ID leads to cross site scripting.
This vulnerability is documented as CVE-2025-61080. The attack can be executed remotely. There is not any exploit available.
A vulnerability, which was classified as critical, has been found in HP ThinPro up to 8.1 SP7. This issue affects some unknown processing of the component System Management Application. Performing manipulation results in execution with unnecessary privileges.
This vulnerability is known as CVE-2025-43017. Attacking locally is a requirement. No exploit is available.
It is advisable to upgrade the affected component.
A vulnerability was found in Sun Solaris 2.3/2.4/2.5/2.5.1/2.6. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file rpc.nisd of the component NIS+. Executing manipulation can lead to memory corruption.
This vulnerability is handled as CVE-1999-0008. The attack can be executed remotely. There is not any exploit available.
It is recommended to upgrade the affected component.
A vulnerability categorized as critical has been discovered in Qualcomm Qpopper 2.4. This affects an unknown function of the component POP Server. Executing manipulation of the argument PASS can lead to memory corruption.
This vulnerability is handled as CVE-1999-0006. The attack can be executed remotely. Additionally, an exploit exists.
It is advisable to upgrade the affected component.
A vulnerability described as critical has been identified in Ipswitch WS_FTP Server 3.1.3. This affects an unknown function. Executing manipulation can lead to improper privilege management.
This vulnerability is tracked as CVE-1999-0017. The attack can be launched remotely. No exploit exists.
Upgrading the affected component is recommended.
A vulnerability was found in FTP Server. It has been rated as critical. Affected is an unknown function of the component Port Handler. This manipulation causes improper privilege management (Bounce).
This vulnerability is registered as CVE-1999-0017. Remote exploitation of the attack is possible. Furthermore, an exploit is available. This vulnerability is considered historic because of its background and reception.
It is advisable to implement restrictive firewalling.
A vulnerability was found in Sun Solaris 2.4/2.5/2.5.1. It has been declared as critical. This impacts an unknown function of the component Statd. The manipulation results in memory corruption.
This vulnerability is cataloged as CVE-1999-0018. The attack may be launched remotely. Furthermore, there is an exploit available. This vulnerability has historical importance owing to its background and reception.
It is recommended to upgrade the affected component.