A vulnerability was found in Campcodes Supplier Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/add_unit.php. Such manipulation of the argument txtunitDetails leads to sql injection.
This vulnerability is uniquely identified as CVE-2025-14515. The attack can be launched remotely. Moreover, an exploit is present.
A vulnerability was found in Campcodes Supplier Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /admin/add_distributor.php. This manipulation of the argument txtDistributorAddress causes sql injection.
This vulnerability is handled as CVE-2025-14514. The attack can be initiated remotely. Additionally, an exploit exists.
A vulnerability was found in IceWarp and classified as critical. This impacts an unknown function of the component X-File-Operation Handler. The manipulation results in command injection.
This vulnerability is known as CVE-2025-14500. It is possible to launch the attack remotely. No exploit is available.
It is suggested to upgrade the affected component.
A vulnerability has been found in IceWarp and classified as problematic. This affects an unknown function of the component gmaps. The manipulation leads to cross site scripting.
This vulnerability is traded as CVE-2025-14499. It is possible to initiate the attack remotely. There is no exploit available.
The affected component should be upgraded.
A vulnerability, which was classified as problematic, was found in TradingView Desktop. The impacted element is an unknown function of the component Electron. Executing manipulation can lead to uncontrolled search path.
This vulnerability appears as CVE-2025-14498. The attack requires local access. There is no available exploit.
You should upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in xwiki xwiki-platform up to 16.10.9/17.4.1. The affected element is an unknown function of the component Confirmation Message Handler. Performing manipulation results in cross site scripting.
This vulnerability is reported as CVE-2025-66472. The attack is possible to be carried out remotely. No exploit exists.
It is advisable to upgrade the affected component.
A vulnerability classified as critical was found in Meatmeet App on Android. Impacted is an unknown function of the component Wi-Fi Network Handler. Such manipulation leads to improper authorization.
This vulnerability is documented as CVE-2025-65822. The attack can be executed directly on the physical device. There is not any exploit available.
A vulnerability classified as critical has been found in Meatmeet App on Android. This issue affects some unknown processing. This manipulation causes cleartext storage of sensitive information in memory.
This vulnerability is registered as CVE-2025-65832. It is feasible to perform the attack on the physical device. No exploit is available.
A vulnerability described as critical has been identified in Meatmeet App on Android. This vulnerability affects unknown code of the component Secure Boot Feature. The manipulation results in improper authentication.
This vulnerability is cataloged as CVE-2025-65829. An attack on the physical device is feasible. There is no exploit available.
A vulnerability marked as problematic has been reported in Chyrp 2.5.2. This affects an unknown part of the component Session Cookie Handler. The manipulation of the argument Title leads to cross site scripting.
This vulnerability is listed as CVE-2024-58285. The attack may be initiated remotely. In addition, an exploit is available.
A vulnerability labeled as problematic has been found in Meatmeet App on Android. Affected by this issue is some unknown functionality. Executing manipulation can lead to cleartext storage of sensitive information.
This vulnerability is tracked as CVE-2025-65825. The physical device can be targeted for the attack. No exploit exists.
A vulnerability identified as problematic has been detected in UBICOD Medivision Digital Signage 1.5.1. Affected by this vulnerability is an unknown functionality of the file /query/user/itSet. Performing manipulation results in cross-site request forgery.
This vulnerability is identified as CVE-2020-36901. The attack can be initiated remotely. Additionally, an exploit exists.
A vulnerability categorized as critical has been discovered in BrightSign Digital Signage Diagnostic Web Server up to 8.2.26. Affected is an unknown function of the component Speed Test Service. Such manipulation of the argument url leads to server-side request forgery.
This vulnerability is referenced as CVE-2020-36884. It is possible to launch the attack remotely. Furthermore, an exploit is available.
A vulnerability was found in FreePBX up to 16.0.95/17.0.9. It has been rated as critical. This impacts an unknown function. This manipulation of the argument app_password causes weak password requirements.
The identification of this vulnerability is CVE-2025-67513. It is possible to initiate the attack remotely. There is no exploit available.
Upgrading the affected component is advised.