A vulnerability was found in Rhymix 2.1.22. It has been rated as problematic. This issue affects the function procFileAdminEditImage of the file /file/file.admin.controller.php. The manipulation leads to denial of service.
The identification of this vulnerability is CVE-2025-45242. Access to the local network is required for this attack to succeed. There is no exploit available.
A vulnerability classified as critical was found in Netgear RAX5 1.0.2.26. This vulnerability affects the function vif_disable. The manipulation of the argument iface leads to command injection.
This vulnerability was named CVE-2024-57233. The attack can be initiated remotely. There is no exploit available.
A vulnerability, which was classified as critical, was found in Netgear RAX5 1.0.2.26. Affected is the function vif_enable. The manipulation of the argument iface leads to command injection.
This vulnerability is traded as CVE-2024-57235. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability, which was classified as critical, has been found in Netgear RAX5 1.0.2.26. This issue affects the function apcli_cancel_wps. The manipulation of the argument ifname leads to command injection.
The identification of this vulnerability is CVE-2024-57234. The attack may be initiated remotely. There is no exploit available.
A vulnerability classified as problematic has been found in DBSyncer 2.0.6. This affects an unknown part of the file /config/download of the component JSON File Parser. The manipulation leads to improper access controls.
This vulnerability is uniquely identified as CVE-2025-45237. The attack needs to be approached within the local network. There is no exploit available.
A vulnerability was found in payload DBSyncer 2.0.6 and classified as problematic. Affected by this issue is some unknown functionality of the component Edit Profile Feature. The manipulation of the argument Nickname leads to cross site scripting.
This vulnerability is handled as CVE-2025-45236. The attack may be launched remotely. There is no exploit available.
A vulnerability was found in Mayuri K Employee Management System up to 192.168.70.3 and classified as critical. Affected by this issue is some unknown functionality of the file /hr_soft/admin/Update_User.php. The manipulation of the argument ID leads to sql injection.
This vulnerability is handled as CVE-2025-1167. The attack may be launched remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as problematic, has been found in techjewel Fluent Support Plugin up to 1.8.5 on WordPress. Affected by this issue is some unknown functionality of the file /wp-content/uploads/fluent-support. The manipulation leads to information disclosure.
This vulnerability is handled as CVE-2024-13568. The attack may be launched remotely. There is no exploit available.
A vulnerability has been found in wpcalc Counter Box Plugin up to 2.0.6 on WordPress and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation of the argument content leads to cross site scripting.
This vulnerability is known as CVE-2024-13901. The attack can be launched remotely. There is no exploit available.
A vulnerability, which was classified as problematic, has been found in wordplus Better Messages Plugin up to 2.6.9 on WordPress. This issue affects some unknown processing of the file /wp-content/uploads/bp-better-messages of the component File Attachment Handler. The manipulation leads to information disclosure.
The identification of this vulnerability is CVE-2024-13611. The attack may be initiated remotely. There is no exploit available.
A vulnerability was found in wordplus Better Messages Plugin up to 2.7.4 on WordPress and classified as critical. Affected by this issue is some unknown functionality. The manipulation leads to server-side request forgery.
This vulnerability is handled as CVE-2024-13697. The attack may be launched remotely. There is no exploit available.
A vulnerability was found in zj1983 zz up to 2024-8 and classified as critical. Affected by this issue is the function getUserOrgForUserId of the file src/main/java/com/futvan/z/system/zorg/ZorgAction.java. The manipulation of the argument userID leads to sql injection.
This vulnerability is handled as CVE-2025-1821. The attack may be launched remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability classified as critical has been found in zj1983 zz up to 2024-8. Affected is an unknown function of the file /import_data_check. The manipulation of the argument url leads to server-side request forgery.
This vulnerability is traded as CVE-2025-1848. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability classified as critical was found in zj1983 zz up to 2024-8. Affected by this vulnerability is an unknown functionality of the file /import_data_todb. The manipulation of the argument url leads to server-side request forgery.
This vulnerability is known as CVE-2025-1849. The attack can be launched remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability was found in zj1983 zz up to 2024-8. It has been rated as critical. This issue affects some unknown processing. The manipulation leads to improper authorization.
The identification of this vulnerability is CVE-2025-1847. The attack may be initiated remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.