A vulnerability marked as problematic has been reported in Facebook WhatsApp Desktop for Mac, WhatsApp Business for iOS and WhatsApp for iOS. Affected by this issue is some unknown functionality of the component Synchronization Message Handler. Performing manipulation results in incorrect authorization.
This vulnerability is reported as CVE-2025-55177. The attacker must have access to the local network to execute the attack. Moreover, an exploit is present.
It is suggested to upgrade the affected component.
A vulnerability labeled as critical has been found in SourceCodester Water Billing System 1.0. Affected by this vulnerability is an unknown functionality of the file /edit.php. Such manipulation of the argument ID leads to sql injection.
This vulnerability is documented as CVE-2025-9706. The attack can be executed remotely. Additionally, an exploit exists.
A vulnerability identified as critical has been detected in SourceCodester Water Billing System 1.0. Affected is an unknown function of the file /paybill.php. This manipulation of the argument ID causes sql injection.
This vulnerability is registered as CVE-2025-9705. Remote exploitation of the attack is possible. Furthermore, an exploit is available.
A vulnerability categorized as critical has been discovered in SourceCodester Water Billing System 1.0. This impacts an unknown function of the file /viewbill.php. The manipulation of the argument ID results in sql injection.
This vulnerability is cataloged as CVE-2025-9704. The attack may be launched remotely. Furthermore, there is an exploit available.
A vulnerability was found in SourceCodester Simple Cafe Billing System 1.0. It has been rated as critical. This affects an unknown function of the file /sales_report.php. The manipulation of the argument month leads to sql injection.
This vulnerability is listed as CVE-2025-9702. The attack may be initiated remotely. In addition, an exploit is available.
A vulnerability was found in SourceCodester Simple Cafe Billing System 1.0. It has been declared as critical. The impacted element is an unknown function of the file /receipt.php. Executing manipulation of the argument ID can lead to sql injection.
This vulnerability is tracked as CVE-2025-9701. The attack can be launched remotely. Moreover, an exploit is present.
A vulnerability was found in Opencast up to 17.6/18.0. It has been classified as problematic. The affected element is an unknown function of the component UI Config Module. Performing manipulation results in relative path traversal.
This vulnerability is identified as CVE-2025-55202. The attack can be initiated remotely. There is not any exploit available.
Upgrading the affected component is recommended.
A vulnerability was found in OpenText Self Service Password Reset up to 4.8 Patch 2 and classified as critical. Impacted is an unknown function. Such manipulation leads to improper validation of specified quantity in input.
This vulnerability is referenced as CVE-2025-5808. It is possible to launch the attack remotely. No exploit is available.
Applying a patch is advised to resolve this issue.