A vulnerability categorized as problematic has been discovered in Shenzhen Sixun Software Sixun Shanghui Group Business Management System 4.10.24.3. Affected by this issue is some unknown functionality of the file /ExportFiles/. The manipulation results in files or directories accessible.
This vulnerability is cataloged as CVE-2025-14697. The attack may be launched remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability was found in Shenzhen Sixun Software Sixun Shanghui Group Business Management System 4.10.24.3. It has been rated as critical. Affected by this vulnerability is an unknown functionality of the file /api/GylOperator/UpdatePasswordBatch. The manipulation leads to weak password recovery.
This vulnerability is listed as CVE-2025-14696. The attack may be initiated remotely. In addition, an exploit is available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability was found in SamuNatsu HaloBot up to 026b01d4a896d93eaaf9d5163a287dc9f267515b. It has been declared as critical. Affected is the function html_renderer of the file plugins/html_renderer/index.js of the component Inter-plugin API. Executing manipulation of the argument action can lead to dynamically-managed code resources. This vulnerability only affects products that are no longer supported by the maintainer.
This vulnerability is tracked as CVE-2025-14695. The attack can be launched remotely. Moreover, an exploit is present.
This product does not use versioning. This is why information about affected and unaffected releases are unavailable.
The vendor was contacted early about this disclosure but did not respond in any way.