A vulnerability has been found in mingyuefusu 明月复苏 tushuguanlixitong 图书管理系统 up to d4836f6b49cd0ac79a4021b15ce99ff7229d4694 and classified as critical. This vulnerability affects the function getBookList of the file /admin/bookList?page=1&limit=10. The manipulation of the argument condition leads to sql injection.
This vulnerability was named CVE-2025-2831. The attack can be initiated remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as problematic, was found in Appsmith up to 1.50. This affects an unknown part of the component Restart API. The manipulation leads to denial of service.
This vulnerability is uniquely identified as CVE-2024-55963. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in OPC Cardsystems Webapp Aufwertung 2.1.0. Affected by this issue is some unknown functionality. The manipulation leads to enforcement of behavioral workflow.
This vulnerability is handled as CVE-2025-30073. The attack needs to be initiated within the local network. There is no exploit available.
A vulnerability classified as critical was found in Appsmith up to 1.51. Affected by this vulnerability is an unknown functionality. The manipulation leads to privilege escalation.
This vulnerability is known as CVE-2024-55964. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in Telesquare TLR-2005KSH 1.1.4. Affected is an unknown function of the file admin.cgi. The manipulation of the argument setUserNamePassword leads to improper authorization.
This vulnerability is traded as CVE-2025-26010. The attack can only be initiated within the local network. There is no exploit available.
A vulnerability was found in Telesquare TLR-2005KSH 1.1.4. It has been rated as critical. This issue affects some unknown processing of the file admin.cgi. The manipulation of the argument setAutorest leads to stack-based buffer overflow.
The identification of this vulnerability is CVE-2025-26006. The attack can only be done within the local network. There is no exploit available.
A vulnerability was found in Telesquare TLR-2005KSH 1.1.4. It has been declared as critical. This vulnerability affects unknown code of the file admin.cgi. The manipulation of the argument setUsernamePassword leads to stack-based buffer overflow.
This vulnerability was named CVE-2025-26011. The attack needs to be approached within the local network. There is no exploit available.
A vulnerability was found in Telesquare TLR-2005KSH 1.1.4. It has been classified as critical. This affects an unknown part of the file admin.cgi. The manipulation of the argument setSyncTimeHost leads to stack-based buffer overflow.
This vulnerability is uniquely identified as CVE-2025-26008. Access to the local network is required for this attack to succeed. There is no exploit available.
A vulnerability was found in Telesquare TLR-2005KSH 1.1.4 and classified as critical. Affected by this issue is some unknown functionality of the file systemtil.cgi of the component Login Interface. The manipulation leads to stack-based buffer overflow.
This vulnerability is handled as CVE-2025-26007. Access to the local network is required for this attack. There is no exploit available.
A vulnerability has been found in Telesquare TLR-2005KSH 1.1.4 and classified as critical. Affected by this vulnerability is an unknown functionality of the file admin.cgi. The manipulation of the argument setNtp leads to stack-based buffer overflow.
This vulnerability is known as CVE-2025-26005. The attack needs to be initiated within the local network. There is no exploit available.
A vulnerability, which was classified as critical, was found in Telesquare TLR-2005KSH 1.1.4. Affected is an unknown function of the file admin.cgi. The manipulation of the argument setSyncTimeHost leads to stack-based buffer overflow.
This vulnerability is traded as CVE-2025-26002. The attack needs to be done within the local network. There is no exploit available.
A vulnerability, which was classified as critical, has been found in Telesquare TLR-2005KSH 1.1.4. This issue affects some unknown processing of the file admin.cgi. The manipulation of the argument setDdns leads to stack-based buffer overflow.
The identification of this vulnerability is CVE-2025-26004. The attack can only be initiated within the local network. There is no exploit available.
A vulnerability classified as critical was found in Telesquare TLR-2005KSH 1.1.4. This vulnerability affects unknown code of the file admin.cgi. The manipulation of the argument setAutorest leads to improper authorization.
This vulnerability was named CVE-2025-26003. The attack can only be done within the local network. There is no exploit available.
A vulnerability classified as problematic has been found in Telesquare TLR-2005KSH 1.1.4. This affects an unknown part of the file systemutilit.cgi. The manipulation leads to information disclosure.
This vulnerability is uniquely identified as CVE-2025-26009. The attack needs to be approached within the local network. There is no exploit available.
A vulnerability was found in Telesquare TLR-2005Ksh 1.1.4. It has been rated as critical. Affected by this issue is some unknown functionality of the file systemutil.cgi. The manipulation leads to stack-based buffer overflow.
This vulnerability is handled as CVE-2025-28361. The attack may be launched remotely. There is no exploit available.