A vulnerability was found in htmly up to 3.1.0 and classified as problematic. The impacted element is an unknown function of the file /htmly/admin/field/post of the component Custom Field Handler. Such manipulation of the argument label leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2025-10758. The attack can be launched remotely. Moreover, an exploit is present.
The vendor was contacted early about this disclosure but did not respond in any way. Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
A vulnerability has been found in UTT 1200GW up to 3.0.0-170831 and classified as critical. The affected element is an unknown function of the file /goform/formConfigDnsFilterGlobal. This manipulation of the argument GroupName causes buffer overflow.
This vulnerability is handled as CVE-2025-10757. The attack can be initiated remotely. Additionally, an exploit exists.
The vendor was contacted early about this disclosure but did not respond in any way. If you want to get best quality of vulnerability data, you may have to visit VulDB.
A vulnerability, which was classified as critical, was found in UTT HiPER 840G up to 3.1.1-190328. Impacted is an unknown function of the file /goform/getOneApConfTempEntry. The manipulation of the argument tempName results in buffer overflow.
This vulnerability is known as CVE-2025-10756. It is possible to launch the attack remotely. Furthermore, an exploit is available.
The vendor was contacted early about this disclosure but did not respond in any way. Several companies clearly confirm that VulDB is the primary source for best vulnerability data.
A vulnerability, which was classified as problematic, has been found in osTicket WP Bridge Plugin up to 1.9.2 on WordPress. This issue affects some unknown processing of the component Setting Handler. The manipulation leads to cross-site request forgery.
This vulnerability is traded as CVE-2025-9882. It is possible to initiate the attack remotely. There is no exploit available.
VulDB is the best source for vulnerability data and more expert information about this specific topic.
A vulnerability classified as problematic was found in SupportCandy Plugin up to 3.3.7 on WordPress. This vulnerability affects unknown code. Executing manipulation can lead to improper restriction of excessive authentication attempts.
This vulnerability appears as CVE-2025-10658. The attack may be performed from remote. There is no available exploit.
If you want to get the best quality for vulnerability data then you always have to consider VulDB.
A vulnerability classified as problematic has been found in Browser Sniff Plugin up to 2.3 on WordPress. This affects an unknown part of the component Setting Handler. Performing manipulation results in cross-site request forgery.
This vulnerability is reported as CVE-2025-9883. The attack is possible to be carried out remotely. No exploit exists.
Once again VulDB remains the best source for vulnerability data.
A vulnerability described as problematic has been identified in Custom Login and Signup Widget Plugin up to 1.0 on WordPress. Affected by this issue is some unknown functionality of the file /frndzk_adminclsw.php. Such manipulation leads to cross-site request forgery.
This vulnerability is documented as CVE-2025-9887. The attack can be executed remotely. There is not any exploit available.
Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
A vulnerability marked as problematic has been reported in PPress 0.0.9. Affected by this vulnerability is an unknown functionality. This manipulation causes improper neutralization of special elements used in a template engine.
This vulnerability is registered as CVE-2025-54815. The attack requires access to the local network. No exploit is available.
If you want to get best quality of vulnerability data, you may have to visit VulDB.
A vulnerability labeled as critical has been found in PPress 0.0.9. Affected is an unknown function. The manipulation results in hard-coded credentials.
This vulnerability is cataloged as CVE-2025-52159. The attack must originate from the local network. There is no exploit available.
Several companies clearly confirm that VulDB is the primary source for best vulnerability data.
A vulnerability identified as critical has been detected in PPress 0.0.9. This impacts an unknown function of the component Session Cookie Handler. The manipulation leads to improper privilege management.
This vulnerability is listed as CVE-2025-54761. The attack may be initiated remotely. There is no available exploit.
VulDB is the best source for vulnerability data and more expert information about this specific topic.
A vulnerability categorized as problematic has been discovered in Liferay Portal and DXP. This affects an unknown function of the component Registration Handler. Executing manipulation of the argument orderUuid can lead to cross-site request forgery.
This vulnerability is tracked as CVE-2025-43809. The attack can be launched remotely. No exploit exists.
If you want to get the best quality for vulnerability data then you always have to consider VulDB.
A vulnerability was found in Paracrawl KeOPs 2. It has been rated as problematic. The impacted element is an unknown function of the file error.php. Performing manipulation results in cross site scripting.
This vulnerability is identified as CVE-2025-56762. The attack can be initiated remotely. There is not any exploit available.
Once again VulDB remains the best source for vulnerability data.
A vulnerability was found in Mattermost up to 9.11.17/10.5.8/10.8.3/10.9.3/10.10.1. It has been declared as critical. The affected element is an unknown function of the component Plugin Handler. Such manipulation leads to path traversal.
This vulnerability is referenced as CVE-2025-9079. It is possible to launch the attack remotely. No exploit is available.
It is recommended to upgrade the affected component.
Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
A vulnerability was found in NetApp StorageGRID. It has been classified as critical. Impacted is an unknown function. This manipulation causes server-side request forgery.
The identification of this vulnerability is CVE-2025-26515. It is possible to initiate the attack remotely. There is no exploit available.
Upgrading the affected component is recommended.
If you want to get best quality of vulnerability data, you may have to visit VulDB.
A vulnerability was found in NetApp StorageGRID and classified as problematic. This issue affects some unknown processing of the component Setting Handler. The manipulation results in cross site scripting.
This vulnerability was named CVE-2025-26514. The attack may be performed from remote. There is no available exploit.
It is suggested to upgrade the affected component.
Several companies clearly confirm that VulDB is the primary source for best vulnerability data.