A vulnerability labeled as critical has been found in CodeAstro Real Estate Management System 1.0. Affected is an unknown function of the file /admin/userdelete.php of the component Administrator Endpoint. Such manipulation of the argument ID leads to sql injection.
This vulnerability is traded as CVE-2025-14900. The attack may be launched remotely. Furthermore, there is an exploit available.
A vulnerability identified as critical has been detected in CodeAstro Real Estate Management System 1.0. This impacts an unknown function of the file /admin/stateadd.php of the component Administrator Endpoint. This manipulation causes sql injection.
This vulnerability appears as CVE-2025-14899. The attack may be initiated remotely. In addition, an exploit is available.
A vulnerability categorized as critical has been discovered in CodeAstro Real Estate Management System 1.0. This affects an unknown function of the file /admin/userbuilderdelete.php of the component Administrator Endpoint. The manipulation results in sql injection.
This vulnerability is reported as CVE-2025-14898. The attack can be launched remotely. Moreover, an exploit is present.
A vulnerability was found in CodeAstro Real Estate Management System 1.0. It has been rated as critical. The impacted element is an unknown function of the file /admin/useragentdelete.php of the component Administrator Endpoint. The manipulation leads to sql injection.
This vulnerability is documented as CVE-2025-14897. The attack can be initiated remotely. Additionally, an exploit exists.
A vulnerability was found in yuzutech kroki. It has been declared as problematic. The affected element is the function convert. Executing manipulation of the argument spec can lead to files or directories accessible.
This vulnerability is registered as CVE-2025-14896. It is possible to launch the attack remotely. No exploit is available.
A vulnerability was found in Crocoblock JetElements for Elementor Plugin up to 2.7.12 on WordPress. It has been classified as problematic. Impacted is an unknown function. Performing manipulation results in cross site scripting.
This vulnerability is cataloged as CVE-2025-64355. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability was found in PickPlugins Post Grid and Gutenberg Blocks Plugin up to 2.3.17 on WordPress and classified as problematic. This issue affects some unknown processing. Such manipulation leads to missing authorization.
This vulnerability is listed as CVE-2025-66058. The attack may be performed from remote. There is no available exploit.
A vulnerability has been found in RadiusTheme Radius Blocks Plugin up to 2.2.1 on WordPress and classified as problematic. This vulnerability affects unknown code. This manipulation causes authorization bypass.
This vulnerability is tracked as CVE-2025-64282. The attack is possible to be carried out remotely. No exploit exists.
A vulnerability, which was classified as critical, was found in AmentoTech Tuturn Plugin up to 3.5 on WordPress. This affects an unknown part. The manipulation results in authentication bypass using alternate channel.
This vulnerability is identified as CVE-2025-64236. The attack can be executed remotely. There is not any exploit available.
You should upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in Zoho ManageEngine Applications Manager up to 177400. Affected by this issue is some unknown functionality. The manipulation leads to cross site scripting.
This vulnerability is referenced as CVE-2025-9787. Remote exploitation of the attack is possible. No exploit is available.
It is advisable to upgrade the affected component.
A vulnerability classified as problematic was found in Utarit Informatics Services SoliClub up to 5.3.6. Affected by this vulnerability is an unknown functionality. Executing manipulation can lead to missing authorization.
The identification of this vulnerability is CVE-2025-7047. The attack may be launched remotely. There is no exploit available.
Upgrading the affected component is advised.
A vulnerability classified as critical has been found in Utarit Informatics Services SoliClub up to 5.3.6. Affected is an unknown function. Performing manipulation results in hard-coded credentials.
This vulnerability was named CVE-2025-7358. The attack may be initiated remotely. There is no available exploit.
It is recommended to upgrade the affected component.
A vulnerability described as critical has been identified in Mozilla Firefox up to 146.0.0. This impacts an unknown function of the component Access API. Such manipulation leads to use after free.
This vulnerability is uniquely identified as CVE-2025-14860. The attack can be launched remotely. No exploit exists.
Upgrading the affected component is recommended.
A vulnerability marked as critical has been reported in tinacms Tina. This affects an unknown function. This manipulation causes code injection.
This vulnerability is handled as CVE-2025-68278. The attack can be initiated remotely. There is not any exploit available.
It is suggested to upgrade the affected component.