A vulnerability, which was classified as problematic, was found in Appsmith up to 1.50. This affects an unknown part of the component Restart API. The manipulation leads to denial of service.
This vulnerability is uniquely identified as CVE-2024-55963. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in OPC Cardsystems Webapp Aufwertung 2.1.0. Affected by this issue is some unknown functionality. The manipulation leads to enforcement of behavioral workflow.
This vulnerability is handled as CVE-2025-30073. The attack needs to be initiated within the local network. There is no exploit available.
A vulnerability classified as critical was found in Appsmith up to 1.51. Affected by this vulnerability is an unknown functionality. The manipulation leads to privilege escalation.
This vulnerability is known as CVE-2024-55964. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in Telesquare TLR-2005KSH 1.1.4. Affected is an unknown function of the file admin.cgi. The manipulation of the argument setUserNamePassword leads to improper authorization.
This vulnerability is traded as CVE-2025-26010. The attack can only be initiated within the local network. There is no exploit available.
A vulnerability was found in Telesquare TLR-2005KSH 1.1.4. It has been rated as critical. This issue affects some unknown processing of the file admin.cgi. The manipulation of the argument setAutorest leads to stack-based buffer overflow.
The identification of this vulnerability is CVE-2025-26006. The attack can only be done within the local network. There is no exploit available.
A vulnerability was found in Telesquare TLR-2005KSH 1.1.4. It has been declared as critical. This vulnerability affects unknown code of the file admin.cgi. The manipulation of the argument setUsernamePassword leads to stack-based buffer overflow.
This vulnerability was named CVE-2025-26011. The attack needs to be approached within the local network. There is no exploit available.
A vulnerability was found in Telesquare TLR-2005KSH 1.1.4. It has been classified as critical. This affects an unknown part of the file admin.cgi. The manipulation of the argument setSyncTimeHost leads to stack-based buffer overflow.
This vulnerability is uniquely identified as CVE-2025-26008. Access to the local network is required for this attack to succeed. There is no exploit available.
A vulnerability was found in Telesquare TLR-2005KSH 1.1.4 and classified as critical. Affected by this issue is some unknown functionality of the file systemtil.cgi of the component Login Interface. The manipulation leads to stack-based buffer overflow.
This vulnerability is handled as CVE-2025-26007. Access to the local network is required for this attack. There is no exploit available.
A vulnerability has been found in Telesquare TLR-2005KSH 1.1.4 and classified as critical. Affected by this vulnerability is an unknown functionality of the file admin.cgi. The manipulation of the argument setNtp leads to stack-based buffer overflow.
This vulnerability is known as CVE-2025-26005. The attack needs to be initiated within the local network. There is no exploit available.
A vulnerability, which was classified as critical, was found in Telesquare TLR-2005KSH 1.1.4. Affected is an unknown function of the file admin.cgi. The manipulation of the argument setSyncTimeHost leads to stack-based buffer overflow.
This vulnerability is traded as CVE-2025-26002. The attack needs to be done within the local network. There is no exploit available.
A vulnerability, which was classified as critical, has been found in Telesquare TLR-2005KSH 1.1.4. This issue affects some unknown processing of the file admin.cgi. The manipulation of the argument setDdns leads to stack-based buffer overflow.
The identification of this vulnerability is CVE-2025-26004. The attack can only be initiated within the local network. There is no exploit available.
A vulnerability classified as critical was found in Telesquare TLR-2005KSH 1.1.4. This vulnerability affects unknown code of the file admin.cgi. The manipulation of the argument setAutorest leads to improper authorization.
This vulnerability was named CVE-2025-26003. The attack can only be done within the local network. There is no exploit available.
A vulnerability classified as problematic has been found in Telesquare TLR-2005KSH 1.1.4. This affects an unknown part of the file systemutilit.cgi. The manipulation leads to information disclosure.
This vulnerability is uniquely identified as CVE-2025-26009. The attack needs to be approached within the local network. There is no exploit available.
A vulnerability was found in Telesquare TLR-2005Ksh 1.1.4. It has been rated as critical. Affected by this issue is some unknown functionality of the file systemutil.cgi. The manipulation leads to stack-based buffer overflow.
This vulnerability is handled as CVE-2025-28361. The attack may be launched remotely. There is no exploit available.
A vulnerability was found in Telesquare TLR-2005KSH 1.1.4. It has been declared as problematic. Affected by this vulnerability is an unknown functionality. The manipulation of the argument getUserNamePassword leads to information disclosure.
This vulnerability is known as CVE-2025-26001. Access to the local network is required for this attack. There is no exploit available.
A vulnerability, which was classified as critical, was found in Lansweeper up to 7.2.x. Affected is an unknown function. The manipulation leads to incorrect authorization.
This vulnerability is traded as CVE-2020-14011. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
Despite Oracle denying a breach of its Oracle Cloud federated SSO login servers and the theft of account data for 6 million people, BleepingComputer has confirmed with multiple companies that associated data samples shared by the threat actor are valid. [...]