Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Security Vulnerabilities324344
CVE-2025-55749
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-8.7||HIGH
EPSS-1.03% / 76.82%
||
7 Day CHG-0.59%
Published-01 Dec, 2025 | 20:09
Updated-02 Dec, 2025 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
The XWiki Jetty package (XJetty) allows accessing any application file through URL

XWiki is an open-source wiki software platform. From 16.7.0 to 16.10.11, 17.4.4, or 17.7.0, in an instance which is using the XWiki Jetty package (XJetty), a context is exposed to statically access any file located in the webapp/ folder. It allows accessing files which might contains credentials. Fixed in 16.10.11, 17.4.4, and 17.7.0.

Action-Not Available
Vendor-XWiki SAS
Product-xwiki-platform
CWE ID-CWE-284
Improper Access Control
CVE-2025-12756
Assigner-Mattermost, Inc.
ShareView Details
Assigner-Mattermost, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.03% / 6.38%
||
7 Day CHG~0.00%
Published-01 Dec, 2025 | 19:51
Updated-05 Dec, 2025 | 15:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Insecure Direct Object Reference in Mattermost Boards Plugin Enables Unauthorised Comment Deletion

Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to validate user permissions when deleting comments in Boards, which allows an authenticated user with the editor role to delete comments created by other users.

Action-Not Available
Vendor-Mattermost, Inc.
Product-mattermost_serverMattermost
CWE ID-CWE-863
Incorrect Authorization
CVE-2025-11772
Assigner-Synaptics, Inc.
ShareView Details
Assigner-Synaptics, Inc.
CVSS Score-6.6||MEDIUM
EPSS-0.02% / 4.79%
||
7 Day CHG~0.00%
Published-01 Dec, 2025 | 18:55
Updated-02 Dec, 2025 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Co-Installer Privilege Escalation

A carefully crafted DLL, copied to C:\ProgramData\Synaptics folder, allows a local user to execute arbitrary code with elevated privileges during driver installation.

Action-Not Available
Vendor-Synaptics
Product-Synaptics Fingerprint Driver
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2025-34297
Assigner-VulnCheck
ShareView Details
Assigner-VulnCheck
CVSS Score-8.6||HIGH
EPSS-0.02% / 3.30%
||
7 Day CHG~0.00%
Published-01 Dec, 2025 | 18:18
Updated-02 Dec, 2025 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
KissFFT Integer Overflow Heap Buffer Overflow via kiss_fft_alloc

KissFFT versions prior to the fix commit 1b083165 contain an integer overflow in kiss_fft_alloc() in kiss_fft.c on platforms where size_t is 32-bit. The nfft parameter is not validated before being used in a size calculation (sizeof(kiss_fft_cpx) * (nfft - 1)), which can wrap to a small value when nfft is large. As a result, malloc() allocates an undersized buffer and the subsequent twiddle-factor initialization loop writes nfft elements, causing a heap buffer overflow. This vulnerability only affects 32-bit architectures.

Action-Not Available
Vendor-mborgerding/kissfft
Product-mborgerding/kissfft
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-13837
Assigner-Python Software Foundation
ShareView Details
Assigner-Python Software Foundation
CVSS Score-2.1||LOW
EPSS-0.02% / 4.04%
||
7 Day CHG~0.00%
Published-01 Dec, 2025 | 18:13
Updated-22 Dec, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Out-of-memory when loading Plist

When loading a plist file, the plistlib module reads data in size specified by the file itself, meaning a malicious file can cause OOM and DoS issues

Action-Not Available
Vendor-Python Software Foundation
Product-CPython
CVE-2025-13836
Assigner-Python Software Foundation
ShareView Details
Assigner-Python Software Foundation
CVSS Score-6.3||MEDIUM
EPSS-0.07% / 20.80%
||
7 Day CHG~0.00%
Published-01 Dec, 2025 | 18:02
Updated-22 Dec, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Excessive read buffering DoS in http.client

When reading an HTTP response from a server, if no read amount is specified, the default behavior will be to use Content-Length. This allows a malicious server to cause the client to read large amounts of data into memory, potentially causing OOM or other DoS.

Action-Not Available
Vendor-Python Software Foundation
Product-CPython
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2025-13653
Assigner-floragunn GmbH
ShareView Details
Assigner-floragunn GmbH
CVSS Score-4.3||MEDIUM
EPSS-0.03% / 6.71%
||
7 Day CHG~0.00%
Published-01 Dec, 2025 | 18:02
Updated-02 Dec, 2025 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Unauthorized access to documents in data streams with specially crafted requests

In Search Guard FLX versions from 3.1.0 up to 4.0.0 with enterprise modules being disabled, there exists an issue which allows authenticated users to use specially crafted requests to read documents from data streams without having the respective privileges.

Action-Not Available
Vendor-floragunn
Product-Search Guard FLX
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE ID-CWE-863
Incorrect Authorization
CVE-2025-13835
Assigner-Patchstack
ShareView Details
Assigner-Patchstack
CVSS Score-6.5||MEDIUM
EPSS-0.03% / 9.44%
||
7 Day CHG~0.00%
Published-01 Dec, 2025 | 17:57
Updated-02 Dec, 2025 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress Arconix Shortcodes plugin <= 2.1.19 - Cross Site Scripting (XSS) vulnerability

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Tyche Softwares Arconix Shortcodes allows Stored XSS.This issue affects Arconix Shortcodes: from n/a through 2.1.19.

Action-Not Available
Vendor-Tyche Softwares
Product-Arconix Shortcodes
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-7007
Assigner-NortonLifeLock Inc.
ShareView Details
Assigner-NortonLifeLock Inc.
CVSS Score-7.5||HIGH
EPSS-0.01% / 1.64%
||
7 Day CHG~0.00%
Published-01 Dec, 2025 | 16:34
Updated-02 Dec, 2025 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Null pointer dereference in Avast Antivirus on macOS (16.0.0) or Linux (3.0.3)

NULL Pointer Dereference vulnerability in Avast Antivirus on MacOS, Avast Anitvirus on Linux when scanning a malformed Windows PE file causes the antivirus process to crash.This issue affects Antivirus: 16.0.0; Anitvirus: 3.0.3.

Action-Not Available
Vendor-Avast
Product-AnitvirusAntivirus
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2025-3500
Assigner-NortonLifeLock Inc.
ShareView Details
Assigner-NortonLifeLock Inc.
CVSS Score-9||CRITICAL
EPSS-0.03% / 6.28%
||
7 Day CHG~0.00%
Published-01 Dec, 2025 | 16:09
Updated-02 Dec, 2025 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Integer Overflow in Avast Antiviurs 25.1.981.6 on Windows may result in privilege escalation

Integer Overflow or Wraparound vulnerability in Avast Antivirus (25.1.981.6) on Windows allows Privilege Escalation.This issue affects Antivirus: from 25.1.981.6 before 25.3.

Action-Not Available
Vendor-Avast
Product-Antivirus
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-64775
Assigner-Apache Software Foundation
ShareView Details
Assigner-Apache Software Foundation
CVSS Score-7.5||HIGH
EPSS-0.12% / 32.11%
||
7 Day CHG~0.00%
Published-01 Dec, 2025 | 16:07
Updated-03 Dec, 2025 | 13:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Apache Struts: File leak in multipart request processing causes disk exhaustion (DoS)

Denial of Service vulnerability in Apache Struts, file leak in multipart request processing causes disk exhaustion. This issue affects Apache Struts: from 2.0.0 through 6.7.0, from 7.0.0 through 7.0.3. Users are recommended to upgrade to version 6.8.0 or 7.1.1, which fixes the issue.

Action-Not Available
Vendor-The Apache Software Foundation
Product-strutsApache Struts
CWE ID-CWE-459
Incomplete Cleanup
CVE-2025-8351
Assigner-NortonLifeLock Inc.
ShareView Details
Assigner-NortonLifeLock Inc.
CVSS Score-9||CRITICAL
EPSS-0.08% / 23.98%
||
7 Day CHG~0.00%
Published-01 Dec, 2025 | 15:51
Updated-02 Dec, 2025 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Scanning a malformed file in Avast Antivirus 8.3.70.94 on MacOS may result in remote code execution

Heap-based Buffer Overflow, Out-of-bounds Read vulnerability in Avast Antivirus on MacOS when scanning a malformed file may allow Local Execution of Code or Denial-of-Service of the anitvirus engine process.This issue affects Antivirus: from 8.3.70.94 before 8.3.70.98.

Action-Not Available
Vendor-Avast
Product-Antivirus
CWE ID-CWE-122
Heap-based Buffer Overflow
CWE ID-CWE-125
Out-of-bounds Read
CVE-2025-13829
Assigner-64c5ae8f-7972-4697-86a0-7ada793ac795
ShareView Details
Assigner-64c5ae8f-7972-4697-86a0-7ada793ac795
CVSS Score-8.6||HIGH
EPSS-0.04% / 13.24%
||
7 Day CHG~0.00%
Published-01 Dec, 2025 | 15:47
Updated-02 Dec, 2025 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect Authorization vulnerability in Data Illusion Zumbrunn NGSurvey allows any logged-in user to obtain the private information of any other user. Critical information retrieved: * APIKEY (1 year user Session) * RefreshToken (10 minutes user Session) * Password hashed with bcrypt * User IP * Email * Full Name

Action-Not Available
Vendor-Data Illusion Zumbrunn
Product-NGSurvey
CWE ID-CWE-863
Incorrect Authorization
CVE-2025-10101
Assigner-NortonLifeLock Inc.
ShareView Details
Assigner-NortonLifeLock Inc.
CVSS Score-8.1||HIGH
EPSS-0.02% / 4.00%
||
7 Day CHG~0.00%
Published-01 Dec, 2025 | 15:32
Updated-02 Dec, 2025 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Crafted Mach-O file may allow Remote Code Execution in Avast Antivirus 15.7 on MacOS

Heap-based Buffer Overflow, Out-of-bounds Write vulnerability in Avast Antivirus on MacOS of a crafted Mach-O file may allow Local Execution of Code or Denial of Service of antivirus protection. This issue affects Antivirus: from 15.7 before 3.9.2025.

Action-Not Available
Vendor-Avast
Product-Antivirus
CWE ID-CWE-122
Heap-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2024-48894
Assigner-Talos
ShareView Details
Assigner-Talos
CVSS Score-5.9||MEDIUM
EPSS-0.03% / 8.01%
||
7 Day CHG+0.01%
Published-01 Dec, 2025 | 15:25
Updated-05 Dec, 2025 | 21:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A cleartext transmission vulnerability exists in the WEBVIEW-M functionality of Socomec DIRIS Digiware M-70 1.6.9. A specially crafted HTTP request can lead to a disclosure of sensitive information. An attacker can sniff network traffic to trigger this vulnerability.

Action-Not Available
Vendor-socomecSocomec
Product-diris_m-70diris_m-70_firmwareDIRIS Digiware M-70
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2024-53684
Assigner-Talos
ShareView Details
Assigner-Talos
CVSS Score-7.5||HIGH
EPSS-0.05% / 14.77%
||
7 Day CHG+0.02%
Published-01 Dec, 2025 | 15:25
Updated-05 Dec, 2025 | 21:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A cross-site request forgery (csrf) vulnerability exists in the WEBVIEW-M functionality of Socomec DIRIS Digiware M-70 1.6.9. A specially crafted HTTP request can lead to unauthorized access. An attacker can stage a malicious webpage to trigger this vulnerability.

Action-Not Available
Vendor-socomecSocomec
Product-diris_m-70diris_m-70_firmwareDIRIS Digiware M-70
CWE ID-CWE-352
Cross-Site Request Forgery (CSRF)
CVE-2024-45370
Assigner-Talos
ShareView Details
Assigner-Talos
CVSS Score-7.3||HIGH
EPSS-0.03% / 6.25%
||
7 Day CHG~0.00%
Published-01 Dec, 2025 | 15:25
Updated-02 Dec, 2025 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An authentication bypass vulnerability exists in the User profile management functionality of Socomec Easy Config System 2.6.1.0. A specially crafted database record can lead to unauthorized access. An attacker can modify a local database to trigger this vulnerability.

Action-Not Available
Vendor-Socomec
Product-Easy Config System
CWE ID-CWE-302
Authentication Bypass by Assumed-Immutable Data
CVE-2024-49572
Assigner-Talos
ShareView Details
Assigner-Talos
CVSS Score-7.2||HIGH
EPSS-0.04% / 10.58%
||
7 Day CHG~0.00%
Published-01 Dec, 2025 | 15:25
Updated-05 Dec, 2025 | 21:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A denial of service vulnerability exists in the Modbus TCP functionality of Socomec DIRIS Digiware M-70 1.6.9. A specially crafted network packet can lead to denial of service and weaken credentials resulting in default documented credentials being applied to the device. An attacker can send an unauthenticated packet to trigger this vulnerability.

Action-Not Available
Vendor-socomecSocomec
Product-diris_m-70diris_m-70_firmwareDIRIS Digiware M-70
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2024-48882
Assigner-Talos
ShareView Details
Assigner-Talos
CVSS Score-8.6||HIGH
EPSS-0.05% / 16.92%
||
7 Day CHG~0.00%
Published-01 Dec, 2025 | 15:25
Updated-05 Dec, 2025 | 21:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A denial of service vulnerability exists in the Modbus TCP functionality of Socomec DIRIS Digiware M-70 1.6.9. A specially crafted network packet can lead to denial of service. An attacker can send an unauthenticated packet to trigger this vulnerability.

Action-Not Available
Vendor-socomecSocomec
Product-diris_m-70diris_m-70_firmwareDIRIS Digiware M-70
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2025-20085
Assigner-Talos
ShareView Details
Assigner-Talos
CVSS Score-7.2||HIGH
EPSS-0.04% / 10.58%
||
7 Day CHG~0.00%
Published-01 Dec, 2025 | 15:25
Updated-05 Dec, 2025 | 20:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A denial of service vulnerability exists in the Modbus RTU over TCP functionality of Socomec DIRIS Digiware M-70 1.6.9. A specially crafted network packet can lead to denial of service and weaken credentials resulting in default documented credentials being applied to the device. An attacker can send an unauthenticated packet to trigger this vulnerability.

Action-Not Available
Vendor-socomecSocomec
Product-diris_m-70diris_m-70_firmwareDIRIS Digiware M-70
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2025-23417
Assigner-Talos
ShareView Details
Assigner-Talos
CVSS Score-8.6||HIGH
EPSS-0.05% / 16.92%
||
7 Day CHG~0.00%
Published-01 Dec, 2025 | 15:25
Updated-05 Dec, 2025 | 20:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A denial of service vulnerability exists in the Modbus RTU over TCP functionality of Socomec DIRIS Digiware M-70 1.6.9. A specially crafted network packet can lead to denial of service. An attacker can send an unauthenticated packet to trigger this vulnerability.

Action-Not Available
Vendor-socomecSocomec
Product-diris_m-70diris_m-70_firmwareDIRIS Digiware M-70
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2025-26858
Assigner-Talos
ShareView Details
Assigner-Talos
CVSS Score-8.6||HIGH
EPSS-0.10% / 27.58%
||
7 Day CHG~0.00%
Published-01 Dec, 2025 | 15:25
Updated-05 Dec, 2025 | 20:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A buffer overflow vulnerability exists in the Modbus TCP functionality of Socomec DIRIS Digiware M-70 1.6.9. A specially crafted set of network packets can lead to denial of service. An attacker can send a sequence of unauthenticated packets to trigger this vulnerability.

Action-Not Available
Vendor-socomecSocomec
Product-diris_m-70diris_m-70_firmwareDIRIS Digiware M-70
CWE ID-CWE-20
Improper Input Validation
CVE-2025-54851
Assigner-Talos
ShareView Details
Assigner-Talos
CVSS Score-7.5||HIGH
EPSS-0.06% / 17.86%
||
7 Day CHG~0.00%
Published-01 Dec, 2025 | 15:25
Updated-05 Dec, 2025 | 20:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A denial of service vulnerability exists in the Modbus TCP and Modbus RTU over TCP functionality of Socomec DIRIS Digiware M-70 1.6.9. A specially crafted series of network requests can lead to a denial of service. An attacker can send a sequence of unauthenticated packets to trigger this vulnerability.An attacker can trigger this denial-of-service condition by sending a single Modbus TCP message to port 503 using the Write Single Register function code (6) to write the value 1 to register 4352. This action changes the Modbus address to 15. After this message is sent, the device will be in a denial-of-service state.

Action-Not Available
Vendor-socomecSocomec
Product-diris_m-70diris_m-70_firmwareDIRIS Digiware M-70
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2025-54850
Assigner-Talos
ShareView Details
Assigner-Talos
CVSS Score-7.5||HIGH
EPSS-0.06% / 17.86%
||
7 Day CHG~0.00%
Published-01 Dec, 2025 | 15:25
Updated-05 Dec, 2025 | 20:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A denial of service vulnerability exists in the Modbus TCP and Modbus RTU over TCP functionality of Socomec DIRIS Digiware M-70 1.6.9. A specially crafted series of network requests can lead to a denial of service. An attacker can send a sequence of unauthenticated packets to trigger this vulnerability.An attacker can trigger this denial-of-service condition by sending a sequence of Modbus RTU over TCP messages to port 503 using the Write Single Register function code (6). The attack sequence begins with a message to register 58112 with a value of 1000, indicating that a configuration change will follow. Next, a message is sent to register 29440 with a value corresponding to the new Modbus address to be configured. Finally, a message to register 57856 with a value of 161 commits the configuration change. After this configuration change, the device will be in a denial-of-service state.

Action-Not Available
Vendor-socomecSocomec
Product-diris_m-70diris_m-70_firmwareDIRIS Digiware M-70
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2025-54849
Assigner-Talos
ShareView Details
Assigner-Talos
CVSS Score-7.5||HIGH
EPSS-0.06% / 17.86%
||
7 Day CHG~0.00%
Published-01 Dec, 2025 | 15:25
Updated-08 Dec, 2025 | 19:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A denial of service vulnerability exists in the Modbus TCP and Modbus RTU over TCP functionality of Socomec DIRIS Digiware M-70 1.6.9. A specially crafted series of network requests can lead to a denial of service. An attacker can send a sequence of unauthenticated packets to trigger this vulnerability.An attacker can trigger this denial-of-service condition by sending a single Modbus TCP message to port 502 using the Write Single Register function code (6) to write the value 1 to register 4352. This action changes the Modbus address to 15. After this message is sent, the device will be in a denial-of-service state.

Action-Not Available
Vendor-socomecSocomec
Product-diris_digiware_m-70diris_digiware_m-70_firmwareDIRIS Digiware M-70
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2025-54848
Assigner-Talos
ShareView Details
Assigner-Talos
CVSS Score-7.5||HIGH
EPSS-0.06% / 17.86%
||
7 Day CHG~0.00%
Published-01 Dec, 2025 | 15:25
Updated-08 Dec, 2025 | 19:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A denial of service vulnerability exists in the Modbus TCP and Modbus RTU over TCP functionality of Socomec DIRIS Digiware M-70 1.6.9. A specially crafted series of network requests can lead to a denial of service. An attacker can send a sequence of unauthenticated packets to trigger this vulnerability.An attacker can trigger this denial-of-service condition by sending a sequence of Modbus TCP messages to port 502 using the Write Single Register function code (6). The attack sequence begins with a message to register 58112 with a value of 1000, indicating that a configuration change will follow. Next, a message is sent to register 29440 with a value corresponding to the new Modbus address to be configured. Finally, a message to register 57856 with a value of 161 commits the configuration change. After this configuration change, the device will be in a denial-of-service state.

Action-Not Available
Vendor-socomecSocomec
Product-diris_digiware_m-70diris_digiware_m-70_firmwareDIRIS Digiware M-70
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2025-55222
Assigner-Talos
ShareView Details
Assigner-Talos
CVSS Score-8.6||HIGH
EPSS-0.06% / 17.86%
||
7 Day CHG~0.00%
Published-01 Dec, 2025 | 15:25
Updated-05 Dec, 2025 | 20:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A denial of service vulnerability exists in the Modbus TCP and Modbus RTU over TCP USB Function functionality of Socomec DIRIS Digiware M-70 1.6.9. A specially crafted network packet can lead to a denial of service. An attacker can send an unauthenticated packet to trigger this vulnerability.This vulnerability is specific to the malicious message sent via Modbus RTU over TCP on port 503.

Action-Not Available
Vendor-socomecSocomec
Product-diris_m-70diris_m-70_firmwareDIRIS Digiware M-70
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2025-55221
Assigner-Talos
ShareView Details
Assigner-Talos
CVSS Score-8.6||HIGH
EPSS-0.06% / 17.86%
||
7 Day CHG~0.00%
Published-01 Dec, 2025 | 15:25
Updated-05 Dec, 2025 | 20:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A denial of service vulnerability exists in the Modbus TCP and Modbus RTU over TCP USB Function functionality of Socomec DIRIS Digiware M-70 1.6.9. A specially crafted network packet can lead to a denial of service. An attacker can send an unauthenticated packet to trigger this vulnerability.This vulnerability is specific to the malicious message sent via Modbus TCP over port 502.

Action-Not Available
Vendor-socomecSocomec
Product-diris_m-70diris_m-70_firmwareDIRIS Digiware M-70
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2025-11699
Assigner-CERT/CC
ShareView Details
Assigner-CERT/CC
CVSS Score-7.1||HIGH
EPSS-0.03% / 7.43%
||
7 Day CHG-0.00%
Published-01 Dec, 2025 | 15:17
Updated-19 Dec, 2025 | 17:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CVE-2025-11699

nopCommerce v4.70 and prior, and version 4.80.3, does not invalidate session cookies after logout or session termination, allowing an attacker who has a a valid session cookie access to privileged endpoints (such as /admin) even after the legitimate user has logged out, enabling session hijacking. Any version above 4.70 that is not 4.80.3 fixes the vulnerability.

Action-Not Available
Vendor-nopcommercenopSolutions
Product-nopcommercenopCommerce
CWE ID-CWE-613
Insufficient Session Expiration
CVE-2025-13129
Assigner-TR-CERT (Computer Emergency Response Team of the Republic of Türkiye)
ShareView Details
Assigner-TR-CERT (Computer Emergency Response Team of the Republic of Türkiye)
CVSS Score-4.3||MEDIUM
EPSS-0.03% / 8.76%
||
7 Day CHG~0.00%
Published-01 Dec, 2025 | 14:32
Updated-02 Dec, 2025 | 10:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Business Logic Error in Seneka Software's Onaylarım

Improper Enforcement of Behavioral Workflow vulnerability in Seneka Software Hardware Information Technology Trade Contracting and Industry Ltd. Co. Onaylarım allows Functionality Misuse.This issue affects Onaylarım: from 25.09.26.01 through 18112025.

Action-Not Available
Vendor-Seneka Software Hardware Information Technology Trade Contracting and Industry Ltd. Co.
Product-Onaylarım
CWE ID-CWE-841
Improper Enforcement of Behavioral Workflow
CVE-2025-49643
Assigner-Zabbix
ShareView Details
Assigner-Zabbix
CVSS Score-6||MEDIUM
EPSS-0.02% / 5.96%
||
7 Day CHG~0.00%
Published-01 Dec, 2025 | 13:05
Updated-01 Dec, 2025 | 15:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Frontend DoS vulnerability due to asymmetric resource consumption

An authenticated Zabbix user (including Guest) is able to cause disproportionate CPU load on the webserver by sending specially crafted parameters to /imgstore.php, leading to potential denial of service.

Action-Not Available
Vendor-ZABBIX
Product-Zabbix
CWE ID-CWE-405
Asymmetric Resource Consumption (Amplification)
CVE-2025-49642
Assigner-Zabbix
ShareView Details
Assigner-Zabbix
CVSS Score-5.8||MEDIUM
EPSS-0.02% / 2.76%
||
7 Day CHG~0.00%
Published-01 Dec, 2025 | 13:03
Updated-01 Dec, 2025 | 15:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Agent builds for AIX vulnerable to library loading hijacking

Library loading on AIX Zabbix Agent builds can be hijacked by local users with write access to the /home/cecuser directory.

Action-Not Available
Vendor-ZABBIX
Product-Zabbix
CWE ID-CWE-426
Untrusted Search Path
CVE-2025-27232
Assigner-Zabbix
ShareView Details
Assigner-Zabbix
CVSS Score-6.8||MEDIUM
EPSS-0.02% / 5.32%
||
7 Day CHG~0.00%
Published-01 Dec, 2025 | 12:55
Updated-01 Dec, 2025 | 15:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Frontend arbitrary file read in oauth.authorize action

An authenticated Zabbix Super Admin can exploit the oauth.authorize action to read arbitrary files from the webserver leading to potential confidentiality loss.

Action-Not Available
Vendor-ZABBIX
Product-Zabbix
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2025-12106
Assigner-OpenVPN Inc.
ShareView Details
Assigner-OpenVPN Inc.
CVSS Score-9.1||CRITICAL
EPSS-0.07% / 22.36%
||
7 Day CHG~0.00%
Published-01 Dec, 2025 | 12:43
Updated-01 Dec, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient argument validation in OpenVPN 2.7_alpha1 through 2.7_rc1 allows an attacker to trigger a heap buffer over-read when parsing IP addresses

Action-Not Available
Vendor-OpenVPN
Product-OpenVPN
CWE ID-CWE-126
Buffer Over-read
CVE-2025-13296
Assigner-TR-CERT (Computer Emergency Response Team of the Republic of Türkiye)
ShareView Details
Assigner-TR-CERT (Computer Emergency Response Team of the Republic of Türkiye)
CVSS Score-5.4||MEDIUM
EPSS-0.01% / 2.31%
||
7 Day CHG~0.00%
Published-01 Dec, 2025 | 11:51
Updated-01 Dec, 2025 | 15:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CSRF in Tekrom Technology's T-Soft E-Commerce

Cross-Site Request Forgery (CSRF) vulnerability in Tekrom Technology Inc. T-Soft E-Commerce allows Cross Site Request Forgery.This issue affects T-Soft E-Commerce: through 28112025.

Action-Not Available
Vendor-Tekrom Technology Inc.
Product-T-Soft E-Commerce
CWE ID-CWE-352
Cross-Site Request Forgery (CSRF)
CVE-2025-58408
Assigner-Imagination Technologies
ShareView Details
Assigner-Imagination Technologies
CVSS Score-5.9||MEDIUM
EPSS-0.02% / 3.08%
||
7 Day CHG~0.00%
Published-01 Dec, 2025 | 11:16
Updated-01 Dec, 2025 | 18:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
GPU DDK - KASAN Read UAF in the PVRSRVBridgeRGXSubmitTransfer2 due to improper error handling code

Software installed and run as a non-privileged user may conduct improper GPU system calls to trigger reads of stale data that can lead to kernel exceptions and write use-after-free. The Use After Free common weakness enumeration was chosen as the stale data can include handles to resources in which the reference counts can become unbalanced. This can lead to the premature destruction of a resource while in use.

Action-Not Available
Vendor-Imagination Technologies Limited
Product-Graphics DDK
CWE ID-CWE-416
Use After Free
CVE-2025-41070
Assigner-Spanish National Cybersecurity Institute, S.A. (INCIBE)
ShareView Details
Assigner-Spanish National Cybersecurity Institute, S.A. (INCIBE)
CVSS Score-4.8||MEDIUM
EPSS-0.05% / 16.46%
||
7 Day CHG~0.00%
Published-01 Dec, 2025 | 10:40
Updated-01 Dec, 2025 | 15:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Reflected Cross-site Scripting (XSS) in Sanoma's Clickedu

Reflected Cross-site Scripting (XSS) vulnerability in Sanoma's Clickedu. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending them a malicious URL in '/students/carpetes_varies.php'. This vulnerability can be exploited to steal sensitive user data, such as session cookies, or to perform actions on behalf of the user.

Action-Not Available
Vendor-Sanoma
Product-Clickedu
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-6349
Assigner-Arm Limited
ShareView Details
Assigner-Arm Limited
CVSS Score-5.1||MEDIUM
EPSS-0.02% / 2.60%
||
7 Day CHG~0.00%
Published-01 Dec, 2025 | 10:32
Updated-02 Dec, 2025 | 14:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Mali GPU Kernel Driver allows improper GPU memory processing operations

Use After Free vulnerability in Arm Ltd Valhall GPU Kernel Driver, Arm Ltd Arm 5th Gen GPU Architecture Kernel Driver allows a local non-privileged user process to perform improper GPU memory processing operations to gain access to already freed memory.This issue affects Valhall GPU Kernel Driver: from r53p0 through r54p1; Arm 5th Gen GPU Architecture Kernel Driver: from r53p0 through r54p1.

Action-Not Available
Vendor-Arm Limited
Product-5th_gen_gpu_architecture_kernel_drivervalhall_gpu_kernel_driverValhall GPU Kernel DriverArm 5th Gen GPU Architecture Kernel Driver
CWE ID-CWE-416
Use After Free
CVE-2025-8045
Assigner-Arm Limited
ShareView Details
Assigner-Arm Limited
CVSS Score-4||MEDIUM
EPSS-0.02% / 2.60%
||
7 Day CHG~0.00%
Published-01 Dec, 2025 | 10:32
Updated-02 Dec, 2025 | 14:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Mali GPU Kernel Driver allows improper GPU processing operations

Use After Free vulnerability in Arm Ltd Valhall GPU Kernel Driver, Arm Ltd Arm 5th Gen GPU Architecture Kernel Driver allows a local non-privileged user process to perform improper GPU processing operations to gain access to already freed memory.This issue affects Valhall GPU Kernel Driver: from r53p0 through r54p1; Arm 5th Gen GPU Architecture Kernel Driver: from r53p0 through r54p1.

Action-Not Available
Vendor-Arm Limited
Product-5th_gen_gpu_architecture_kernel_drivervalhall_gpu_kernel_driverValhall GPU Kernel DriverArm 5th Gen GPU Architecture Kernel Driver
CWE ID-CWE-416
Use After Free
CVE-2025-2879
Assigner-Arm Limited
ShareView Details
Assigner-Arm Limited
CVSS Score-5.1||MEDIUM
EPSS-0.02% / 2.60%
||
7 Day CHG~0.00%
Published-01 Dec, 2025 | 10:32
Updated-02 Dec, 2025 | 14:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Mali GPU Kernel Driver allows improper GPU processing operations

Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Arm Ltd Valhall GPU Kernel Driver, Arm Ltd Arm 5th Gen GPU Architecture Kernel Driver allows a local non-privileged user process to perform improper GPU processing operations to expose sensitive data.This issue affects Valhall GPU Kernel Driver: from r29p0 through r49p4, from r50p0 through r54p0; Arm 5th Gen GPU Architecture Kernel Driver: from r41p0 through r49p4, from r50p0 through r54p0.

Action-Not Available
Vendor-Arm Limited
Product-5th_gen_gpu_architecture_kernel_drivervalhall_gpu_kernel_driverValhall GPU Kernel DriverArm 5th Gen GPU Architecture Kernel Driver
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2025-59789
Assigner-Apache Software Foundation
ShareView Details
Assigner-Apache Software Foundation
CVSS Score-7.5||HIGH
EPSS-0.63% / 69.73%
||
7 Day CHG~0.00%
Published-01 Dec, 2025 | 10:22
Updated-02 Dec, 2025 | 14:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Apache bRPC: Stack Exhaustion via Unbounded Recursion in JSON Parser

Uncontrolled recursion in the json2pb component in Apache bRPC (version < 1.15.0) on all platforms allows remote attackers to make the server crash via sending deep recursive json data. Root Cause: The bRPC json2pb component uses rapidjson to parse json data from the network. The rapidjson parser uses a recursive parsing method by default. If the input json has a large depth of recursive structure, the parser function may run into stack overflow. Affected Scenarios: Use bRPC server with protobuf message to serve http+json requests from untrusted network. Or directly use JsonToProtoMessage to convert json from untrusted input. How to Fix: (Choose one of the following options)  1. Upgrade bRPC to version 1.15.0, which fixes this issue. 2. Apply this patch: https://github.com/apache/brpc/pull/3099 Note: No matter which option you choose, you should know that the fix introduces a recursion depth limit with default value 100. It affects these functions:  ProtoMessageToJson, ProtoMessageToProtoJson, JsonToProtoMessage, and ProtoJsonToProtoMessage. If your requests contain json or protobuf messages that have a depth exceeding the limit, the request will be failed after applying the fix. You can modify the gflag json2pb_max_recursion_depth to change the limit.

Action-Not Available
Vendor-The Apache Software Foundation
Product-brpcApache bRPC
CWE ID-CWE-674
Uncontrolled Recursion
CVE-2025-41700
Assigner-CERT@VDE
ShareView Details
Assigner-CERT@VDE
CVSS Score-7.8||HIGH
EPSS-0.02% / 5.39%
||
7 Day CHG~0.00%
Published-01 Dec, 2025 | 10:02
Updated-01 Dec, 2025 | 15:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CODESYS Development System - Deserialization of Untrusted Data

An unauthenticated attacker can trick a local user into executing arbitrary code by opening a deliberately manipulated CODESYS project file with a CODESYS development system. This arbitrary code is executed in the user context.

Action-Not Available
Vendor-CODESYS GmbH
Product-CODESYS Development System
CWE ID-CWE-502
Deserialization of Untrusted Data
CVE-2025-41738
Assigner-CERT@VDE
ShareView Details
Assigner-CERT@VDE
CVSS Score-7.5||HIGH
EPSS-0.11% / 29.85%
||
7 Day CHG~0.00%
Published-01 Dec, 2025 | 10:02
Updated-01 Dec, 2025 | 15:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CODESYS Control - Invalid type usage in visualization

An unauthenticated remote attacker may cause the visualisation server of the CODESYS Control runtime system to access a resource with a pointer of wrong type, potentially leading to a denial-of-service (DoS) condition.

Action-Not Available
Vendor-CODESYS GmbH
Product-CODESYS Control for Raspberry Pi SLCODESYS Runtime ToolkitCODESYS Control for Linux SLCODESYS Remote Target VisuCODESYS Control for emPC-A/iMX6 SLCODESYS HMI (SL)CODESYS Control for PFC100 SLCODESYS Control for Linux ARM SLCODESYS Control for BeagleBone SLCODESYS Control for WAGO Touch Panels 600 SLCODESYS Control RTE (SL)CODESYS Virtual Control SLCODESYS Control RTE (for Beckhoff CX) SLCODESYS Control for PLCnext SLCODESYS Control for IOT2000 SLCODESYS Control Win (SL)CODESYS Control for PFC200 SL
CWE ID-CWE-843
Access of Resource Using Incompatible Type ('Type Confusion')
CVE-2025-41739
Assigner-CERT@VDE
ShareView Details
Assigner-CERT@VDE
CVSS Score-5.9||MEDIUM
EPSS-0.11% / 29.58%
||
7 Day CHG~0.00%
Published-01 Dec, 2025 | 10:00
Updated-01 Dec, 2025 | 15:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CODESYS Control - Linux/QNX SysSocket flaw

An unauthenticated remote attacker, who beats a race condition, can exploit a flaw in the communication servers of the CODESYS Control runtime system on Linux and QNX to trigger an out-of-bounds read via crafted socket communication, potentially causing a denial of service.

Action-Not Available
Vendor-CODESYS GmbH
Product-CODESYS Edge Gateway for LinuxCODESYS Control for Raspberry Pi SLCODESYS Runtime ToolkitCODESYS Control for Linux SLCODESYS Remote Target VisuCODESYS PLCHandlerCODESYS Control for emPC-A/iMX6 SLCODESYS Control for PFC100 SLCODESYS Control for Linux ARM SLCODESYS Control for BeagleBone SLCODESYS TargetVisu for Linux SLCODESYS Control for WAGO Touch Panels 600 SLCODESYS Virtual Control SLCODESYS Control for PLCnext SLCODESYS Control for IOT2000 SLCODESYS Control for PFC200 SL
CWE ID-CWE-125
Out-of-bounds Read
CVE-2025-13819
Assigner-1b7e193f-2525-49a1-b171-84af8827c9eb
ShareView Details
Assigner-1b7e193f-2525-49a1-b171-84af8827c9eb
CVSS Score-6.1||MEDIUM
EPSS-0.04% / 10.45%
||
7 Day CHG~0.00%
Published-01 Dec, 2025 | 09:41
Updated-01 Dec, 2025 | 15:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Open redirect in web server of MiR robots and MiR fleet

Open redirect in the web server component of MiR Robot and Fleet software allows a remote attacker to redirect users to arbitrary external websites via a crafted parameter, facilitating phishing or social engineering attacks.

Action-Not Available
Vendor-MiR
Product-FleetRobot
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2025-13816
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-5.3||MEDIUM
EPSS-0.11% / 30.29%
||
7 Day CHG~0.00%
Published-01 Dec, 2025 | 08:32
Updated-03 Dec, 2025 | 22:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
moxi159753 Mogu Blog v2 ZIP File unzipFile FileOperation.unzip path traversal

A security vulnerability has been detected in moxi159753 Mogu Blog v2 up to 5.2. The impacted element is the function FileOperation.unzip of the file /networkDisk/unzipFile of the component ZIP File Handler. Such manipulation of the argument fileUrl leads to path traversal. The attack may be launched remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-mogublog_projectmoxi159753
Product-mogublogMogu Blog v2
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2025-13815
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-5.3||MEDIUM
EPSS-0.04% / 11.71%
||
7 Day CHG~0.00%
Published-01 Dec, 2025 | 08:02
Updated-03 Dec, 2025 | 22:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
moxi159753 Mogu Blog v2 pictures unrestricted upload

A weakness has been identified in moxi159753 Mogu Blog v2 up to 5.2. The affected element is an unknown function of the file /file/pictures. This manipulation of the argument filedatas causes unrestricted upload. The attack may be initiated remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-mogublog_projectmoxi159753
Product-mogublogMogu Blog v2
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-434
Unrestricted Upload of File with Dangerous Type
CVE-2025-61610
Assigner-Unisoc (Shanghai) Technologies Co., Ltd.
ShareView Details
Assigner-Unisoc (Shanghai) Technologies Co., Ltd.
CVSS Score-7.5||HIGH
EPSS-0.15% / 36.62%
||
7 Day CHG~0.00%
Published-01 Dec, 2025 | 07:36
Updated-02 Dec, 2025 | 15:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed

Action-Not Available
Vendor-Unisoc (Shanghai) Technologies Co., Ltd.Google LLC
Product-t8300t8200t9100t8100androidT8100/T9100/T8200/T8300
CVE-2025-61609
Assigner-Unisoc (Shanghai) Technologies Co., Ltd.
ShareView Details
Assigner-Unisoc (Shanghai) Technologies Co., Ltd.
CVSS Score-7.5||HIGH
EPSS-0.15% / 36.62%
||
7 Day CHG~0.00%
Published-01 Dec, 2025 | 07:36
Updated-02 Dec, 2025 | 15:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed

Action-Not Available
Vendor-Unisoc (Shanghai) Technologies Co., Ltd.Google LLC
Product-t8300t8200t9100t8100androidT8100/T9100/T8200/T8300
CVE-2025-61608
Assigner-Unisoc (Shanghai) Technologies Co., Ltd.
ShareView Details
Assigner-Unisoc (Shanghai) Technologies Co., Ltd.
CVSS Score-7.5||HIGH
EPSS-0.15% / 36.62%
||
7 Day CHG~0.00%
Published-01 Dec, 2025 | 07:36
Updated-02 Dec, 2025 | 15:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed

Action-Not Available
Vendor-Unisoc (Shanghai) Technologies Co., Ltd.Google LLC
Product-t8300t8200t9100t8100androidT8100/T9100/T8200/T8300
CVE-2025-61607
Assigner-Unisoc (Shanghai) Technologies Co., Ltd.
ShareView Details
Assigner-Unisoc (Shanghai) Technologies Co., Ltd.
CVSS Score-7.5||HIGH
EPSS-0.15% / 36.62%
||
7 Day CHG~0.00%
Published-01 Dec, 2025 | 07:35
Updated-02 Dec, 2025 | 15:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed

Action-Not Available
Vendor-Unisoc (Shanghai) Technologies Co., Ltd.Google LLC
Product-t8300t8200t9100t8100androidT8100/T9100/T8200/T8300
  • Previous
  • 1
  • 2
  • ...
  • 90
  • 91
  • 92
  • ...
  • 6486
  • 6487
  • Next