Total
299816 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2025-5837 | 1 Phpgurukul | 1 Employee Record Management System | 2025-06-09 | 6.5 MEDIUM | 6.3 MEDIUM |
A vulnerability classified as critical has been found in PHPGurukul Employee Record Management System 1.3. Affected is an unknown function of the file /admin/allemployees.php. The manipulation of the argument delid leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | |||||
CVE-2025-5839 | 1 Tenda | 2 Ac9, Ac9 Firmware | 2025-06-09 | 9.0 HIGH | 8.8 HIGH |
A vulnerability, which was classified as critical, has been found in Tenda AC9 15.03.02.13. Affected by this issue is the function fromadvsetlanip of the file /goform/AdvSetLanip of the component POST Request Handler. The manipulation of the argument lanMask leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. | |||||
CVE-2025-20063 | 1 Openatom | 1 Openharmony | 2025-06-09 | N/A | 3.3 LOW |
in OpenHarmony v5.0.3 and prior versions allow a local attacker cause apps crash through type confusion. | |||||
CVE-2025-21082 | 1 Openatom | 1 Openharmony | 2025-06-09 | N/A | 3.3 LOW |
in OpenHarmony v5.0.3 and prior versions allow a local attacker cause apps crash through type confusion. | |||||
CVE-2025-23235 | 1 Openatom | 1 Openharmony | 2025-06-09 | N/A | 3.3 LOW |
in OpenHarmony v5.0.3 and prior versions allow a local attacker cause DOS through out-of-bounds read. | |||||
CVE-2025-24493 | 1 Openatom | 1 Openharmony | 2025-06-09 | N/A | 5.5 MEDIUM |
in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through race condition. | |||||
CVE-2025-25217 | 1 Openatom | 1 Openharmony | 2025-06-09 | N/A | 3.3 LOW |
in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through NULL pointer dereference. | |||||
CVE-2025-26691 | 1 Openatom | 1 Openharmony | 2025-06-09 | N/A | 5.5 MEDIUM |
in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through get permission. | |||||
CVE-2025-26693 | 1 Openatom | 1 Openharmony | 2025-06-09 | N/A | 3.3 LOW |
in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through get permission. | |||||
CVE-2025-27131 | 1 Openatom | 1 Openharmony | 2025-06-09 | N/A | 6.1 MEDIUM |
in OpenHarmony v5.0.3 and prior versions allow a local attacker cause DOSÂ through improper input. | |||||
CVE-2025-27242 | 1 Openatom | 1 Openharmony | 2025-06-09 | N/A | 3.3 LOW |
in OpenHarmony v5.0.3 and prior versions allow a local attacker cause DOS through improper input. | |||||
CVE-2025-27247 | 1 Openatom | 1 Openharmony | 2025-06-09 | N/A | 5.5 MEDIUM |
in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through get permission. | |||||
CVE-2025-27563 | 1 Openatom | 1 Openharmony | 2025-06-09 | N/A | 3.3 LOW |
in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through get permission. | |||||
CVE-2025-5847 | 1 Tenda | 2 Ac9, Ac9 Firmware | 2025-06-09 | 9.0 HIGH | 8.8 HIGH |
A vulnerability has been found in Tenda AC9 15.03.02.13 and classified as critical. Affected by this vulnerability is the function formSetSafeWanWebMan of the file /goform/SetRemoteWebCfg of the component HTTP POST Request Handler. The manipulation of the argument remoteIp leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. | |||||
CVE-2025-30871 | 1 Wptravelengine | 1 Wp Travel Engine | 2025-06-09 | N/A | 7.5 HIGH |
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in WP Travel Engine WP Travel Engine allows PHP Local File Inclusion. This issue affects WP Travel Engine: from n/a through 6.3.5. | |||||
CVE-2025-5848 | 1 Tenda | 2 Ac15, Ac15 Firmware | 2025-06-09 | 9.0 HIGH | 8.8 HIGH |
A vulnerability was found in Tenda AC15 15.03.05.19_multi and classified as critical. Affected by this issue is the function formSetPPTPUserList of the file /goform/setPptpUserList of the component HTTP POST Request Handler. The manipulation of the argument list leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. | |||||
CVE-2025-5849 | 1 Tenda | 2 Ac15, Ac15 Firmware | 2025-06-09 | 9.0 HIGH | 8.8 HIGH |
A vulnerability was found in Tenda AC15 15.03.05.19_multi. It has been classified as critical. This affects the function formSetSafeWanWebMan of the file /goform/SetRemoteWebCfg of the component HTTP POST Request Handler. The manipulation of the argument remoteIp leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. | |||||
CVE-2025-5850 | 1 Tenda | 2 Ac15, Ac15 Firmware | 2025-06-09 | 9.0 HIGH | 8.8 HIGH |
A vulnerability was found in Tenda AC15 15.03.05.19_multi. It has been declared as critical. This vulnerability affects the function formsetschedled of the file /goform/SetLEDCf of the component HTTP POST Request Handler. The manipulation of the argument Time leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. | |||||
CVE-2025-5851 | 1 Tenda | 2 Ac15, Ac15 Firmware | 2025-06-09 | 9.0 HIGH | 8.8 HIGH |
A vulnerability was found in Tenda AC15 15.03.05.19_multi. It has been rated as critical. This issue affects the function fromadvsetlanip of the file /goform/AdvSetLanip of the component HTTP POST Request Handler. The manipulation of the argument lanMask leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. | |||||
CVE-2025-5852 | 1 Tenda | 2 Ac6, Ac6 Firmware | 2025-06-09 | 9.0 HIGH | 8.8 HIGH |
A vulnerability classified as critical has been found in Tenda AC6 15.03.05.16. Affected is the function formSetPPTPUserList of the file /goform/setPptpUserList. The manipulation of the argument list leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. |