A vulnerability marked as critical has been reported in Tautulli up to 2.15.x. This issue affects the function runGit of the file versioncheck.py. The manipulation leads to os command injection.
This vulnerability is uniquely identified as CVE-2025-58763. The attack is possible to be carried out remotely. No exploit exists.
It is suggested to upgrade the affected component.
A vulnerability was found in Tautulli up to 2.15.x. It has been rated as problematic. This vulnerability affects the function pms_image_proxy. Performing manipulation of the argument img results in file inclusion.
This vulnerability is reported as CVE-2025-58762. The attack is possible to be carried out remotely. No exploit exists.
Upgrading the affected component is advised.
A vulnerability categorized as critical has been discovered in NVIDIA NVDebug Tool. This affects an unknown function. Such manipulation leads to insufficiently protected credentials.
This vulnerability is listed as CVE-2025-23342. The attack must be carried out locally. There is no available exploit.
A vulnerability classified as critical has been found in NVIDIA NVDebug Tool. This affects an unknown part. This manipulation causes os command injection.
This vulnerability appears as CVE-2025-23344. The attack requires local access. There is no available exploit.
A vulnerability, which was classified as critical, has been found in NVIDIA NVDebug Tool. This issue affects some unknown processing. Performing manipulation results in path traversal.
This vulnerability is known as CVE-2025-23343. Access to the local network is required for this attack. No exploit is available.
A vulnerability described as problematic has been identified in Tautulli up to 2.15.x. This issue affects the function real_pms_image_proxy. Such manipulation of the argument img leads to path traversal: 'dir/../../filename'.
This vulnerability is documented as CVE-2025-58761. The attack can be executed remotely. There is not any exploit available.
Upgrading the affected component is recommended.
A vulnerability classified as critical was found in SourceCodester Food Ordering Management System 1.0. Impacted is an unknown function of the file /routers/ticket-message.php. Such manipulation of the argument ticket_id leads to sql injection.
This vulnerability is traded as CVE-2025-10400. The attack may be launched remotely. Furthermore, there is an exploit available.
A vulnerability identified as critical has been detected in SourceCodester Link Status Checker 1.0. This vulnerability affects unknown code of the file index.php. The manipulation of the argument proxy leads to server-side request forgery.
This vulnerability is listed as CVE-2025-10410. The attack may be initiated remotely. In addition, an exploit is available.
A vulnerability has been found in PHPGurukul Beauty Parlour Management System 1.1 and classified as critical. This affects an unknown function of the file /admin/view-enquiry.php. The manipulation of the argument viewid leads to sql injection.
This vulnerability is uniquely identified as CVE-2025-10403. The attack is possible to be carried out remotely. Moreover, an exploit is present.
A vulnerability, which was classified as critical, was found in PHPGurukul Beauty Parlour Management System 1.1. The impacted element is an unknown function of the file /admin/readenq.php. Executing manipulation of the argument delid can lead to sql injection.
This vulnerability is handled as CVE-2025-10402. The attack can be executed remotely. Additionally, an exploit exists.
A vulnerability was found in itsourcecode Baptism Information Management System 1.0 and classified as critical. This impacts an unknown function of the file /rptbaptismal.php. The manipulation of the argument ID results in sql injection.
This vulnerability was named CVE-2025-10404. The attack may be performed from remote. In addition, an exploit is available.
A vulnerability labeled as critical has been found in SourceCodester Pet Grooming Management Software 1.0. Affected by this issue is some unknown functionality of the file /admin/edit_role.php. Executing manipulation of the argument ID can lead to sql injection.
This vulnerability is registered as CVE-2025-10396. It is possible to launch the attack remotely. Furthermore, an exploit is available.
A vulnerability, which was classified as problematic, has been found in Portabilis i-Educar up to 2.10. Impacted is an unknown function of the file /intranet/educar_modulo_cad.php. This manipulation of the argument nm_tipo/descricao causes cross site scripting.
The identification of this vulnerability is CVE-2025-10372. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as problematic, was found in Portabilis i-Educar up to 2.10. The affected element is an unknown function of the file /intranet/educar_turma_tipo_cad.php. Such manipulation of the argument nm_tipo leads to cross site scripting.
This vulnerability is referenced as CVE-2025-10373. It is possible to launch the attack remotely. Furthermore, an exploit is available.
A vulnerability described as critical has been identified in IBM Security Verify Information Queue 10.0.5/10.0.6/10.0.7/10.0.8. This impacts an unknown function. Such manipulation leads to execution with unnecessary privileges.
This vulnerability is uniquely identified as CVE-2024-47120. The attack can only be initiated within the local network. No exploit exists.
Upgrading the affected component is recommended.