A vulnerability classified as critical was found in linlinjava litemall up to 1.8.0. This vulnerability affects the function create of the file litemall-admin-api/src/main/java/org/linlinjava/litemall/admin/web/AdminStorageController.java of the component Endpoint. The manipulation of the argument File leads to unrestricted upload.
This vulnerability was named CVE-2025-8965. The attack can be initiated remotely. Furthermore, there is an exploit available.
A vulnerability classified as critical has been found in code-projects Hostel Management System 1.0. This affects an unknown part of the file hostel_manage.exe of the component Login. The manipulation leads to improper authentication.
This vulnerability is uniquely identified as CVE-2025-8964. It is possible to launch the attack on the local host. Furthermore, there is an exploit available.
A vulnerability was found in jeecgboot JimuReport up to 2.1.1. It has been rated as critical. Affected by this issue is some unknown functionality of the file /drag/onlDragDataSource/testConnection of the component Data Large Screen Template. The manipulation leads to deserialization.
This vulnerability is handled as CVE-2025-8963. The attack may be launched remotely. There is no exploit available.
The vendor response to the GitHub issue report is: "Modified, next version updated".
A vulnerability was found in code-projects Hostel Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file hostel_manage.exe of the component Login Form. The manipulation of the argument uname leads to stack-based buffer overflow.
This vulnerability is known as CVE-2025-8962. Local access is required to approach this attack. Furthermore, there is an exploit available.
A vulnerability was found in Netis WF2880 2.1.40207. It has been classified as critical. Affected is the function FUN_0047151c of the file cgitest.cgi. The manipulation of the argument wds_set leads to buffer overflow.
This vulnerability is traded as CVE-2025-50614. The attack needs to be approached within the local network. There is no exploit available.