A vulnerability has been found in FS S3150-8T2F and classified as problematic. This vulnerability affects unknown code of the component Administration Interface. The manipulation of the argument Time Range Name leads to cross site scripting.
This vulnerability was named CVE-2025-25612. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in code-projects Online Class and Exam Scheduling System 1.0 and classified as problematic. This issue affects some unknown processing of the file /pages/department.php. The manipulation of the argument id/code/and leads to cross site scripting.
The identification of this vulnerability is CVE-2025-29431. The attack may be initiated remotely. There is no exploit available.
A vulnerability, which was classified as problematic, was found in GL-iNet Beryl AX GL-MT3000 4.7.0. Affected is an unknown function of the component Samba Share Handler. The manipulation leads to symlink following.
This vulnerability is traded as CVE-2025-25685. The attack needs to be done within the local network. There is no exploit available.
Cybersecurity researchers have flagged several popular Google Chrome extensions that have been found to transmit data in HTTP and hard-code secrets in their code, exposing users to privacy and security risks.
"Several widely used extensions [...] unintentionally transmit sensitive data over simple HTTP," Yuanjing Guo, a security researcher in the Symantec's Security Technology and Response
A vulnerability has been found in David Hansson Ruby on Rails up to 1.2.2 and classified as problematic. This vulnerability affects the function xml::simple). The manipulation leads to information disclosure.
This vulnerability was named CVE-2007-5379. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in David Hansson Ruby on Rails up to 1.2.2 and classified as critical. This issue affects some unknown processing. The manipulation leads to Remote Code Execution.
The identification of this vulnerability is CVE-2007-5380. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Rails 1.2.4. It has been declared as critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to race condition.
This vulnerability is known as CVE-2007-6077. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Sun Solaris 8.0/9.0/10.0 and classified as problematic. Affected by this issue is the function strfreectty of the component Special File System. The manipulation leads to improper input validation.
This vulnerability is handled as CVE-2007-4732. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in Apple Mac OS X 10.5.1. Affected by this vulnerability is an unknown functionality. The manipulation of the argument hreftrack leads to improper access controls.
This vulnerability is known as CVE-2007-5857. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in Microsoft SQL Server 2005. This vulnerability affects unknown code in the library sqldmo.dll of the component Enterprise Manager. The manipulation of the argument second leads to memory corruption.
This vulnerability was named CVE-2007-4814. The attack can be initiated remotely. Furthermore, there is an exploit available.
A vulnerability has been found in Qualiteam X-Cart up to 3.4.11 and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation of the argument mode leads to information disclosure.
This vulnerability is known as CVE-2004-0242. The attack can be launched remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in Devolutions Server up to 2025.1.10.0. Affected is an unknown function of the component Tor Network Blocking. The manipulation leads to improper access controls.
This vulnerability is traded as CVE-2025-3768. The attack can only be done within the local network. There is no exploit available.
A vulnerability was found in Atheos up to 6.0.3. It has been rated as critical. This issue affects the function escapeshellcmd of the file /components/codegit/traits/execute.php. The manipulation leads to os command injection.
The identification of this vulnerability is CVE-2025-49008. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in D-Link DIR-816 1.10CNB05. Affected is the function setipsec_config of the file /goform/setipsec_config. The manipulation of the argument localIP/remoteIP leads to os command injection. This vulnerability only affects products that are no longer supported by the maintainer.
This vulnerability is traded as CVE-2025-5620. It is possible to launch the attack remotely. Furthermore, there is an exploit available.