WeGIA is an open source web manager with a focus on charitable institutions. Versions 3.4.12 and below contain an Open Redirect vulnerability, identified in the control.php endpoint, specifically in the nextPage parameter (metodo=listarUmnomeClasse=FuncionarioControle). This vulnerability allows attackers to redirect users to arbitrary external domains, enabling phishing campaigns, malicious payload distribution, or user credential theft. This issue is fixed in version 3.5.0.
CVE-2025-54088 is an open-redirect vulnerability in Secure
Access prior to version 14.10. Attackers with access to the console can
redirect victims to an arbitrary URL. The attack complexity is low, attack
requirements are present, no privileges are required, and users must actively
participate in the attack. Impact to confidentiality is low and there is no
impact to integrity or availability. There are high severity impacts to
confidentiality, integrity, availability in subsequent systems.
An insecure permission vulnerability exists in the Agasta Easytouch+ version 9.3.97 The device allows unauthorized mobile applications to connect via Bluetooth Low Energy (BLE) without authentication. Once an unauthorized connection is established, legitimate applications are unable to connect, causing a denial of service. The attack requires proximity to the device, making it exploitable from an adjacent network location.
The Flock Safety Pisco com.flocksafety.android.pisco application 6.21.11 for Android (installed on Falcon and Sparrow License Plate Readers and Bravo Edge AI Compute Devices) has a cleartext Auth0 client secret in its codebase. Because application binaries can be trivially decompiled or inspected, attackers can recover this OAuth secret without special privileges. This secret is intended to remain confidential and should never be embedded directly in client-side software.
Vasion Print (formerly PrinterLogic) Virtual Appliance Host and Application (VA/SaaS deployments) store a large number of sensitive credentials (database passwords, MySQL root password, SaaS keys, Portainer admin password, etc.) in cleartext files that are world-readable. Any local user - or any process that can read the host filesystem - can retrieve all of these secrets in plain text, leading to credential theft and full compromise of the appliance. The vendor does not consider this to be a security vulnerability as this product "follows a shared responsibility model, where administrators are expected to configure persistent storage encryption."
YOSHOP 2.0 suffers from an unauthenticated SQL injection in the goodsIds parameter of the /api/goods/listByIds endpoint. The getListByIds function concatenates user input into orderRaw('field(goods_id, ...)'), allowing attackers to: (a) enumerate or modify database data, including dumping admin password hashes; (b) write web-shell files or invoke xp_cmdshell, leading to remote code execution on servers configured with sufficient DB privileges.
htmly v3.0.8 is vulnerable to Cross Site Scripting (XSS) in the /author/:name endpoint of the affected application. The name parameter is not properly sanitized before being reflected in the HTML response, allowing attackers to inject arbitrary JavaScript payloads.
SourceCodester Pet Grooming Management Software 1.0 is vulnerable to Cross Site Scripting (XSS) via the Customer Name field under Customer Management Section.
PHP Education Manager v1.0 is vulnerable to Cross Site Scripting (XSS) stored Cross-Site Scripting (XSS) vulnerability in the topics management module (topics.php). Attackers can inject malicious JavaScript payloads into the Titlefield during topic creation or updates.
Cross-site scripting (XSS) vulnerability reflected in AndSoft's e-TMS v25.03. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending them a malicious URL.Ā The relationship between parameter and assigned identifier isĀ 'l, demo, demo2, TNTLOGIN, UO and SuppConn' parameters inĀ '/clt/LOGINFRM_VON.ASP'.
Cross-site scripting (XSS) vulnerability reflected in AndSoft's e-TMS v25.03. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending them a malicious URL.Ā The relationship between parameter and assigned identifier isĀ 'l, demo, demo2, TNTLOGIN, UO and SuppConn' parameters inĀ '/clt/LOGINFRM_TP.ASP'.
Cross-site scripting (XSS) vulnerability reflected in AndSoft's e-TMS v25.03. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending them a malicious URL.Ā The relationship between parameter and assigned identifier isĀ 'l, demo, demo2, TNTLOGIN, UO and SuppConn' parameters inĀ '/clt/LOGINFRM_SIL.ASP'.
Cross-site scripting (XSS) vulnerability reflected in AndSoft's e-TMS v25.03. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending them a malicious URL.Ā The relationship between parameter and assigned identifier isĀ 'l, demo, demo2, TNTLOGIN, UO and SuppConn' parameters inĀ '/clt/LOGINFRM_MRK.ASP'.
Cross-site scripting (XSS) vulnerability reflected in AndSoft's e-TMS v25.03. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending them a malicious URL.Ā The relationship between parameter and assigned identifier isĀ 'l, demo, demo2, TNTLOGIN, UO and SuppConn' parameters inĀ '/clt/LOGINFRM_MON.ASP'.
Cross-site scripting (XSS) vulnerability reflected in AndSoft's e-TMS v25.03. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending them a malicious URL.Ā The relationship between parameter and assigned identifier isĀ 'l, demo, demo2, TNTLOGIN, UO and SuppConn' parameters inĀ '/clt/LOGINFRM_MOL.ASP'.
Cross-site scripting (XSS) vulnerability reflected in AndSoft's e-TMS v25.03. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending them a malicious URL.Ā The relationship between parameter and assigned identifier isĀ 'l, demo, demo2, TNTLOGIN, UO and SuppConn' parameters inĀ '/clt/LOGINFRM_MNG.ASP'.
Cross-site scripting (XSS) vulnerability reflected in AndSoft's e-TMS v25.03. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending them a malicious URL.Ā The relationship between parameter and assigned identifier isĀ 'l, demo, demo2, TNTLOGIN, UO and SuppConn' parameters inĀ '/clt/LOGINFRM_LVE.ASP'.
Cross-site scripting (XSS) vulnerability reflected in AndSoft's e-TMS v25.03. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending them a malicious URL.Ā The relationship between parameter and assigned identifier isĀ 'l, demo, demo2, TNTLOGIN, UO and SuppConn' parameters inĀ '/clt/LOGINFRM_LT.ASP'.
Cross-site scripting (XSS) vulnerability reflected in AndSoft's e-TMS v25.03. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending them a malicious URL.Ā The relationship between parameter and assigned identifier isĀ 'l, demo, demo2, TNTLOGIN, UO and SuppConn' parameters inĀ '/clt/LOGINFRM_LF.ASP'.
Cross-site scripting (XSS) vulnerability reflected in AndSoft's e-TMS v25.03. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending them a malicious URL.Ā The relationship between parameter and assigned identifier isĀ 'l, demo, demo2, TNTLOGIN, UO and SuppConn' parameters inĀ '/clt/LOGINFRM_FCC.ASP'.
Cross-site scripting (XSS) vulnerability reflected in AndSoft's e-TMS v25.03. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending them a malicious URL.Ā The relationship between parameter and assigned identifier isĀ 'l, demo, demo2, TNTLOGIN, UO and SuppConn' parameters inĀ '/clt/LOGINFRM_EK.ASP'.
Cross-site scripting (XSS) vulnerability reflected in AndSoft's e-TMS v25.03. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending them a malicious URL.Ā The relationship between parameter and assigned identifier isĀ 'l, demo, demo2, TNTLOGIN, UO and SuppConn' parameters inĀ '/clt/LOGINFRM_DLG.ASP'.
Cross-site scripting (XSS) vulnerability reflected in AndSoft's e-TMS v25.03. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending them a malicious URL.Ā The relationship between parameter and assigned identifier isĀ 'l, demo, demo2, TNTLOGIN, UO and SuppConn' parameters inĀ '/clt/LOGINFRM_DLG.ASP'.
Cross-site scripting (XSS) vulnerability reflected in AndSoft's e-TMS v25.03. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending them a malicious URL.Ā The relationship between parameter and assigned identifier isĀ 'l, demo, demo2, TNTLOGIN, UO and SuppConn' parameters inĀ '/clt/LOGINFRM_DHL.ASP'.
Cross-site scripting (XSS) vulnerability reflected in AndSoft's e-TMS v25.03. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending them a malicious URL.Ā The relationship between parameter and assigned identifier isĀ 'l, demo, demo2, TNTLOGIN, UO and SuppConn' parameters inĀ '/clt/LOGINFRM_DELCROIX.ASP'.
Cross-site scripting (XSS) vulnerability reflected in AndSoft's e-TMS v25.03. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending them a malicious URL.Ā The relationship between parameter and assigned identifier isĀ 'l, demo, demo2, TNTLOGIN, UO and SuppConn' parameters inĀ '/clt/LOGINFRM_CYLOG.ASP'.
Cross-site scripting (XSS) vulnerability reflected in AndSoft's e-TMS v25.03. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending them a malicious URL.Ā The relationship between parameter and assigned identifier isĀ 'l, demo, demo2, TNTLOGIN, UO and SuppConn' parameters inĀ '/clt/LOGINFRM_CATOLD.ASP'.
Cross-site scripting (XSS) vulnerability reflected in AndSoft's e-TMS v25.03. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending them a malicious URL.Ā The relationship between parameter and assigned identifier isĀ 'l, demo, demo2, TNTLOGIN, UO and SuppConn' parameters inĀ 'SuppConn in /clt/LOGINFRM_CON.ASP'.
Cross-site scripting (XSS) vulnerability reflected in AndSoft's e-TMS v25.03. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending them a malicious URL.Ā The relationship between parameter and assigned identifier isĀ 'l, demo, demo2, TNTLOGIN, UO and SuppConn' parameters inĀ '/clt/LOGINFRM_CAT.ASP'.
Cross-site scripting (XSS) vulnerability reflected in AndSoft's e-TMS v25.03. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending them a malicious URL.Ā The relationship between parameter and assigned identifier isĀ 'l, demo, demo2, TNTLOGIN, UO and SuppConn' parameters inĀ '/clt/LOGINFRM_original.ASP'.
Cross-site scripting (XSS) vulnerability reflected in AndSoft's e-TMS v25.03. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending them a malicious URL.Ā The relationship between parameter and assigned identifier isĀ 'l, demo, demo2, TNTLOGIN, UO and SuppConn' parameters inĀ '/clt/LOGINFRM_BET.ASP'.
Cross-site scripting (XSS) vulnerability reflected in AndSoft's e-TMS v25.03. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending them a malicious URL.Ā The relationship between parameter and assigned identifier isĀ 'l, demo, demo2, TNTLOGIN, UO and SuppConn' parameters inĀ '/clt/LOGINFRM_LXA.ASP'.
Cross-site scripting (XSS) vulnerability reflected in AndSoft's e-TMS v25.03. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending them a malicious URL.Ā The relationship between parameter and assigned identifier isĀ 'l, demo, demo2, TNTLOGIN, UO and SuppConn' parameters inĀ '/clt/LOGINFRM_DJO.ASP'.
Cross-site scripting (XSS) vulnerability reflected in AndSoft's e-TMS v25.03. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending them a malicious URL.Ā The relationship between parameter and assigned identifier isĀ 'l, demo, demo2, TNTLOGIN, UO and SuppConn' parameters inĀ '/clt/LOGINFRM.ASP'.
Cross-site scripting (XSS) vulnerability reflected in AndSoft's e-TMS v25.03. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending them a malicious URL.Ā The relationship between parameter and assigned identifier is 'l' parameter in '/clt/TRACK_REQUEST.ASP'.
Cross-site scripting (XSS) vulnerability reflected in AndSoft's e-TMS v25.03. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending them a malicious URL.Ā The relationship between parameter and assigned identifier is 'l' and 'reset' parameters in '/clt/changepassword.asp'.
Cross-site scripting (XSS) vulnerability reflected in AndSoft's e-TMS v25.03. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending them a malicious URL.Ā The relationship between parameter and assigned identifier is 'l' parameter in '/clt/resetPassword.asp'.
Cross-site scripting (XSS) vulnerability reflected in AndSoft's e-TMS v25.03. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending them a malicious URL.Ā The relationship between parameter and assigned identifier isĀ 'm' parameter in '/lib/asp/alert.asp'.
FrostWire 6.14.0-build-326 for macOS contains permissive entitlements (allow-dyld-environment-variables, disable-library-validation) that allow unprivileged local attackers to inject code into the FrostWire process via the DYLD_INSERT_LIBRARIES environment variable. This allows escalated privileges to arbitrary TCC-approved directories.
ERPNEXT v15.67.0 was discovered to contain multiple SQL injection vulnerabilities in the /api/method/frappe.desk.reportview.get endpoint via the order_by and group_by parameters.
Frappe Framework v15.72.4 was discovered to contain a SQL injection vulnerability via the fieldname parameter in the frappe.client.get_value API endpoint and a crafted script to the fieldname parameter
A stored cross-site scripting (XSS) vulnerability in the blog post feature of ERPNEXT v15.67.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the content field.
AnĀ Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] in FortiOS 7.4.0 through 7.4.7, 7.2.0 through 7.2.11, 7.0.6 and above; and FortiProxy 7.6.0 through 7.6.2, 7.4.0 through 7.4.8, 7.2 all versions, 7.0.5 and aboveĀ may allow an authenticated attacker to elevate their privileges via triggering a malicious Webhook action in the Automation Stitch component.
Potentially sensitive information in jobs on KNIME Business Hub prior to 1.16.0 were visible to all members of the user's team. Starting with KNIME Business Hub 1.16.0 only metadata of jobs is shown to team members. Only the creator of a job can see all information including in- and output data (if present).
Use of Hard-coded Credentials, Authorization Bypass Through User-Controlled Key vulnerability in PosCube Hardware Software and Consulting Ltd. Co. Assist allows Excavation, Authentication Bypass.This issue affects Assist: through 10.02.2025.
Path Traversal in the log file retrieval function in Canonical LXD 5.0 LTS on Linux allows authenticated remote attackers to read arbitrary files on the host system via crafted log file names or symbolic links.
Stored Cross Site Scripting vulnerability in Ekushey CRM v5.0 by Creativeitem, due to lack of proper validation of user inputs via the "/ekushey/index.php/client/project_file/upload/xxxx", affecting to "description" parameter via POST. This vulnerability could allow a remote attacker to send a specially crafted query to an authenticated user and steal his/her cookie session details.