Low - CVE-2025-1615 - A vulnerability classified as problematic was...
A vulnerability classified as problematic was found in FiberHome AN5506-01A ONU GPON RP2511. Affected by this vulnerability is an unknown functionality of the component NAT Submenu. The...
Medium - CVE-2025-1616 - A vulnerability, which was classified as...
A vulnerability, which was classified as critical, has been found in FiberHome AN5506-01A ONU GPON RP2511. Affected by this issue is some unknown functionality of the component Diagnosis. The...
Low - CVE-2025-1617 - A vulnerability, which was classified as...
A vulnerability, which was classified as problematic, was found in Netis WF2780 2.1.41925. This affects an unknown part of the component Wireless 2.4G Menu. The manipulation of the argument SSID...
Medium - CVE-2025-1618 - A vulnerability has been found in vTiger CRM...
A vulnerability has been found in vTiger CRM 6.4.0 and classified as problematic. This vulnerability affects unknown code of the file /modules/Mobile/index.php. The manipulation of the argument...
Low - CVE-2025-1629 - A vulnerability was found in Excitel Broadband...
A vulnerability was found in Excitel Broadband Private my Excitel App 3.13.0 on Android. It has been classified as problematic. Affected is an unknown function of the component One-Time Password...
NA - CVE-2024-12308 - The Logo Slider WordPress plugin before 4.6.0...
The Logo Slider WordPress plugin before 4.6.0 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could...
NA - CVE-2024-13605 - The Form Maker by 10Web WordPress plugin...
The Form Maker by 10Web WordPress plugin before 1.15.33 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site...
NA - CVE-2024-13822 - The Photo Contest | Competition | Video...
The Photo Contest | Competition | Video Contest WordPress plugin through 2.8.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site...
Medium - CVE-2025-0690 - The read command is used to read the keyboard...
The read command is used to read the keyboard input from the user, while reads it keeps the input length in a 32-bit integer value which is further used to reallocate the line buffer to accept the...