A vulnerability described as critical has been identified in Meatmeet App on Android. This vulnerability affects unknown code of the component Secure Boot Feature. The manipulation results in improper authentication.
This vulnerability is cataloged as CVE-2025-65829. An attack on the physical device is feasible. There is no exploit available.
A vulnerability marked as problematic has been reported in Chyrp 2.5.2. This affects an unknown part of the component Session Cookie Handler. The manipulation of the argument Title leads to cross site scripting.
This vulnerability is listed as CVE-2024-58285. The attack may be initiated remotely. In addition, an exploit is available.
A vulnerability labeled as problematic has been found in Meatmeet App on Android. Affected by this issue is some unknown functionality. Executing manipulation can lead to cleartext storage of sensitive information.
This vulnerability is tracked as CVE-2025-65825. The physical device can be targeted for the attack. No exploit exists.
A vulnerability identified as problematic has been detected in UBICOD Medivision Digital Signage 1.5.1. Affected by this vulnerability is an unknown functionality of the file /query/user/itSet. Performing manipulation results in cross-site request forgery.
This vulnerability is identified as CVE-2020-36901. The attack can be initiated remotely. Additionally, an exploit exists.
A vulnerability categorized as critical has been discovered in BrightSign Digital Signage Diagnostic Web Server up to 8.2.26. Affected is an unknown function of the component Speed Test Service. Such manipulation of the argument url leads to server-side request forgery.
This vulnerability is referenced as CVE-2020-36884. It is possible to launch the attack remotely. Furthermore, an exploit is available.
A vulnerability was found in FreePBX up to 16.0.95/17.0.9. It has been rated as critical. This impacts an unknown function. This manipulation of the argument app_password causes weak password requirements.
The identification of this vulnerability is CVE-2025-67513. It is possible to initiate the attack remotely. There is no exploit available.
Upgrading the affected component is advised.
A vulnerability was found in Telepedia TableProgressTracking up to 1.2.0. It has been declared as problematic. This affects an unknown function of the component REST API. The manipulation results in cross-site request forgery.
This vulnerability was named CVE-2025-67646. The attack may be performed from remote. There is no available exploit.
It is recommended to upgrade the affected component.
A vulnerability was found in All-Dynamics Digital Signage System 2.0.2. It has been classified as problematic. The impacted element is an unknown function. The manipulation leads to cross-site request forgery.
This vulnerability is uniquely identified as CVE-2020-36900. The attack is possible to be carried out remotely. Moreover, an exploit is present.
A vulnerability was found in SpenetiX Fusion Digital Signage up to 8.2.26 and classified as problematic. The affected element is an unknown function. Executing manipulation can lead to cross-site request forgery.
This vulnerability is handled as CVE-2020-36886. The attack can be executed remotely. Additionally, an exploit exists.
A vulnerability has been found in Meatmeet App on Android and classified as critical. Impacted is an unknown function. Performing manipulation results in improper authorization.
This vulnerability is known as CVE-2025-65826. Access to the local network is required for this attack. No exploit is available.
A vulnerability, which was classified as critical, was found in Meatmeet App on Android. This issue affects some unknown processing. Such manipulation leads to hard-coded credentials.
This vulnerability is traded as CVE-2025-65823. The attack can be executed directly on the physical device. There is no exploit available.
A vulnerability, which was classified as problematic, has been found in Meatmeet on Android. This vulnerability affects unknown code of the component UART Download Mode. This manipulation causes information disclosure.
This vulnerability appears as CVE-2025-65821. The attacker needs to be present on the local network. There is no available exploit.
A vulnerability classified as problematic was found in Meatmeet App on Android. This affects an unknown part. The manipulation results in algorithm downgrade.
This vulnerability is reported as CVE-2025-65831. The attacker must have access to the local network to execute the attack. No exploit exists.
A vulnerability classified as problematic has been found in SpenetiX Fusion Digital Signage up to 3.4.8. Affected by this issue is some unknown functionality of the component Login Script. The manipulation leads to information exposure through discrepancy.
This vulnerability is documented as CVE-2020-36888. The attack can be initiated remotely. Additionally, an exploit exists.
A vulnerability described as problematic has been identified in Meatmeet on Android. Affected by this vulnerability is an unknown functionality of the component Bluetooth Low Energy. Executing manipulation can lead to denial of service.
This vulnerability is registered as CVE-2025-65828. The attack requires access to the local network. No exploit is available.
A vulnerability marked as problematic has been reported in Meatmeet App on Android. Affected is an unknown function of the component API. Performing manipulation results in cleartext transmission of sensitive information.
This vulnerability is cataloged as CVE-2025-65827. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability labeled as critical has been found in Meatmeet App up to 1.1.2.0 on Android. This impacts an unknown function. Such manipulation leads to improper access controls.
This vulnerability is listed as CVE-2025-65820. The attack must be carried out from within the local network. There is no available exploit.