A vulnerability classified as problematic was found in yangzongzhuan RuoYi up to 4.8.1. Affected by this vulnerability is an unknown functionality of the component Image Source Handler. The manipulation leads to improper restriction of rendered ui layers.
This vulnerability is known as CVE-2025-7903. The attack can be launched remotely. Furthermore, there is an exploit available.
A vulnerability classified as problematic has been found in yangzongzhuan RuoYi up to 4.8.1. Affected is the function addSave of the file com/ruoyi/web/controller/system/SysNoticeController.java. The manipulation leads to cross site scripting.
This vulnerability is traded as CVE-2025-7902. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
A vulnerability was found in yangzongzhuan RuoYi up to 4.8.1. It has been rated as problematic. This issue affects some unknown processing of the file /swagger-ui/index.html of the component Swagger UI. The manipulation of the argument configUrl leads to cross site scripting.
The identification of this vulnerability is CVE-2025-7901. The attack may be initiated remotely. There is no exploit available.
A vulnerability, which was classified as problematic, has been found in PHPGurukul Apartment Visitors Management System 1.0. This issue affects some unknown processing of the file /manage-newvisitors.php of the component HTTP POST Request Handler. The manipulation of the argument visname leads to cross site scripting.
The identification of this vulnerability is CVE-2025-7815. The attack may be initiated remotely. Furthermore, there is an exploit available.
Other parameters might be affected as well.
A vulnerability, which was classified as problematic, was found in PHPGurukul Apartment Visitors Management System 1.0. Affected is an unknown function of the file /visitor-detail.php of the component HTTP POST Request Handler. The manipulation of the argument visname leads to cross site scripting.
This vulnerability is traded as CVE-2025-7816. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as critical, has been found in WPLMS Learning Management System Plugin up to 1.8.4.1 on WordPress. Affected by this issue is the function wp_ajax_import_data. The manipulation leads to improper privilege management.
This vulnerability is handled as CVE-2015-10139. The attack may be launched remotely. There is no exploit available.
A vulnerability has been found in Work the Flow File Upload Plugin up to 2.5.2 on WordPress and classified as critical. This vulnerability affects unknown code of the component jQuery-File-Upload-9.5.0. The manipulation leads to unrestricted upload.
This vulnerability was named CVE-2015-10138. The attack can be initiated remotely. There is no exploit available.
A vulnerability was found in Linux Kernel up to 6.15.6/6.16-rc5. It has been declared as problematic. This vulnerability affects unknown code of the component KVM. The manipulation of the argument invvpid_error leads to privilege escalation.
This vulnerability was named CVE-2025-38351. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in bfabiszewski Libmobi up to 0.9. It has been declared as problematic. This vulnerability affects the function mobi_buffer_getpointer of the component Mobi File Handler. The manipulation leads to null pointer dereference.
This vulnerability was named CVE-2022-29788. The attack can only be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in bfabiszewski libmobi up to 0.10. This issue affects some unknown processing. The manipulation leads to buffer overflow.
The identification of this vulnerability is CVE-2022-1907. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in bfabiszewski libmobi up to 0.10. Affected is an unknown function. The manipulation leads to buffer overflow.
This vulnerability is traded as CVE-2022-1908. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.6.90/6.12.28/6.14.6/6.15-rc5. It has been rated as problematic. Affected by this issue is the function cfg80211_defrag_mle of the component wifi. The manipulation leads to out-of-bounds read.
This vulnerability is handled as CVE-2025-37973. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in ThemeREX Addons Plugin up to 2.35.1.1 on WordPress. It has been classified as problematic. Affected is the function trx_addons_get_svg_from_file. The manipulation of the argument svg leads to cross site scripting.
This vulnerability is traded as CVE-2025-6997. It is possible to launch the attack remotely. There is no exploit available.