A vulnerability was found in JSP Store Locator Plugin up to 1.0 on WordPress. It has been rated as critical. Affected by this issue is some unknown functionality. The manipulation leads to sql injection.
This vulnerability is handled as CVE-2024-11267. The attack may be launched remotely. There is no exploit available.
A vulnerability, which was classified as problematic, has been found in Custom Author Base Plugin up to 1.1.1 on WordPress. This issue affects some unknown processing of the component Setting Handler. The manipulation leads to cross-site request forgery.
The identification of this vulnerability is CVE-2024-8050. The attack may be initiated remotely. There is no exploit available.
A vulnerability was found in Smooth Gallery Replacement Plugin up to 1.0 on WordPress and classified as problematic. This issue affects some unknown processing of the component Setting Handler. The manipulation leads to cross-site request forgery.
The identification of this vulnerability is CVE-2024-8032. The attack may be initiated remotely. There is no exploit available.
A vulnerability was found in SeaCMS 13.3. It has been rated as critical. This issue affects some unknown processing of the file admin_comment_news.php. The manipulation leads to sql injection.
The identification of this vulnerability is CVE-2025-44073. The attack may be initiated remotely. There is no exploit available.
A vulnerability, which was classified as problematic, has been found in Znuny up to 7.1.3. Affected by this issue is some unknown functionality of the component SMIME Email Handler. The manipulation leads to sensitive information in log files.
This vulnerability is handled as CVE-2025-26842. The attack can only be done within the local network. There is no exploit available.
A vulnerability was found in Znuny up to 7.1.3. It has been classified as problematic. Affected is an unknown function. The manipulation leads to cookie without 'httponly' flag.
This vulnerability is traded as CVE-2025-26844. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability was found in GNU PSPP up to 2.0.1. It has been declared as critical. This vulnerability affects the function inflate_read of the file libpspp-core.a. The manipulation leads to heap-based buffer overflow.
This vulnerability was named CVE-2025-47814. Local access is required to approach this attack. There is no exploit available.
A vulnerability was found in GNU PSPP up to 2.0.1. It has been rated as critical. This issue affects the function inflate_read of the file libpspp-core.a. The manipulation leads to heap-based buffer overflow.
The identification of this vulnerability is CVE-2025-47815. Attacking locally is a requirement. There is no exploit available.
A vulnerability was found in Geocache Stat Bar Widget Plugin up to 0.911 on WordPress. It has been declared as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to cross site scripting.
This vulnerability is known as CVE-2024-11266. The attack can be launched remotely. There is no exploit available.
A vulnerability, which was classified as critical, has been found in AHAthat Plugin up to 1.6 on WordPress. This issue affects some unknown processing. The manipulation leads to sql injection.
The identification of this vulnerability is CVE-2024-11269. The attack may be initiated remotely. There is no exploit available.
A vulnerability, which was classified as critical, was found in Victure RX1800 1.0.0_r12_110933. This affects an unknown part. The manipulation leads to command injection.
This vulnerability is uniquely identified as CVE-2025-28203. The attack can only be done within the local network. There is no exploit available.
A vulnerability was found in Victure RX1800 1.0.0_r12_110933 and classified as critical. This issue affects some unknown processing of the component SSH/Telnet. The manipulation leads to improper access controls.
The identification of this vulnerability is CVE-2025-28202. The attack may be initiated remotely. There is no exploit available.
A vulnerability classified as critical was found in Victure RX1800 1.0.0_r12_110933. This vulnerability affects unknown code. The manipulation leads to code injection.
This vulnerability was named CVE-2025-28201. It is possible to launch the attack on the physical device. There is no exploit available.
A vulnerability, which was classified as critical, was found in Znuny up to 6.5.14/7.1.6. This affects an unknown part of the component AgentPreferences UpdateAJAX Subaction. The manipulation leads to permission issues.
This vulnerability is uniquely identified as CVE-2025-43926. The attack can only be initiated within the local network. There is no exploit available.
A vulnerability was found in MRCMS 3.1.2. It has been classified as problematic. Affected is an unknown function. The manipulation leads to cross-site request forgery.
This vulnerability is traded as CVE-2025-4327. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
Multiple endpoints might be affected.
A vulnerability was found in 74CMS up to 3.33.0. It has been rated as problematic. Affected by this issue is the function index of the file /index.php/index/download/index. The manipulation of the argument url leads to path traversal.
This vulnerability is handled as CVE-2025-4329. The attack may be launched remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as critical, was found in FoxCMS 2.0.6. Affected is an unknown function of the file DataBackup.php of the component Restore Handler. The manipulation leads to path traversal.
This vulnerability is traded as CVE-2025-45239. The attack needs to be done within the local network. There is no exploit available.