A vulnerability classified as problematic has been found in Cudy LT500E up to 2.3.12. Affected is an unknown function of the file /squashfs-root/etc/shadow of the component Web Interface. The manipulation leads to use of hard-coded password.
This vulnerability is listed as CVE-2025-9725. The attack must be carried out locally. In addition, an exploit is available.
It is recommended to upgrade the affected component.
The vendor explains: "[T]he firmware does store a default password of 'admin'. This password has been deprecated since LT500E firmware version 2.3.13 and is no longer used. The LT500E does not have an administrator password set by default; a new password (at least 8 characters ) must be manually created upon first login the web management page."
A vulnerability described as problematic has been identified in Portabilis i-Educar up to 2.10. This impacts an unknown function of the file /intranet/educar_nivel_ensino_cad.php. Executing manipulation of the argument nm_nivel/descricao can lead to cross site scripting.
This vulnerability is tracked as CVE-2025-9724. The attack can be launched remotely. Moreover, an exploit is present.
A vulnerability marked as problematic has been reported in Portabilis i-Educar up to 2.10. This affects an unknown function of the file /intranet/educar_tipo_regime_cad.php. Performing manipulation of the argument nm_tipo results in cross site scripting.
This vulnerability is identified as CVE-2025-9723. The attack can be initiated remotely. Additionally, an exploit exists.
A vulnerability labeled as problematic has been found in Portabilis i-Educar up to 2.10. The impacted element is an unknown function of the file /intranet/educar_tipo_ocorrencia_disciplinar_cad.php. Such manipulation of the argument nm_tipo/descricao leads to cross site scripting.
This vulnerability is referenced as CVE-2025-9722. It is possible to launch the attack remotely. Furthermore, an exploit is available.
A vulnerability identified as problematic has been detected in Portabilis i-Educar up to 2.10. The affected element is an unknown function of the file /module/FormulaMedia/edit. This manipulation of the argument nome/formulaMedia causes cross site scripting.
The identification of this vulnerability is CVE-2025-9721. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
A vulnerability categorized as problematic has been discovered in Portabilis i-Educar up to 2.10. Impacted is an unknown function of the file /module/TabelaArredondamento/edit of the component Cadastrar tabela de arredondamento Page. The manipulation of the argument Nome results in cross site scripting.
This vulnerability was named CVE-2025-9720. The attack may be performed from remote. In addition, an exploit is available.
A vulnerability was found in IBM watsonx Orchestrate Cartridge for Cloud Pak for Data up to 4.8.5/5.2.0. It has been rated as critical. This issue affects some unknown processing. The manipulation leads to sql injection.
This vulnerability is uniquely identified as CVE-2025-0165. The attack is possible to be carried out remotely. No exploit exists.
Upgrading the affected component is advised.
Currently trending CVE - Hype Score: 1 - Relative path traversal in Windows Kerberos allows an authorized attacker to elevate privileges over a network.
Currently trending CVE - Hype Score: 9 - Access of Resource Using Incompatible Type ('Type Confusion') vulnerability in Salesforce Tableau Server, Tableau Desktop on Windows, Linux (File Upload modules) allows Local Code Inclusion.This issue affects Tableau Server, Tableau Desktop: before 2025.1.3, before 2024.2.12, ...
A vulnerability, which was classified as problematic, was found in Apple watchOS up to 13.6/18.1. The affected element is an unknown function of the component File Handler. Executing manipulation can lead to denial of service.
This vulnerability is tracked as CVE-2024-54501. The attack can be launched remotely. No exploit exists.
You should upgrade the affected component.