Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools

#9c1820ae-fb77-4810-a8aa-ca46e7474d2f

Security Advisories

Reported CVEsVendorsProductsReports
2Vulnerabilities found

CVE-2025-10460
Assigner-Monash University - Cyber Security Incident Response Team
ShareView Details
Assigner-Monash University - Cyber Security Incident Response Team
CVSS Score-9.4||CRITICAL
EPSS-0.09% / 24.86%
||
7 Day CHG~0.00%
Published-17 Nov, 2025 | 02:48
Updated-18 Nov, 2025 | 14:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Unsanitized parameter input leading to SQL Injection vulnerability

A SQL Injection vulnerability on an endpoint in BEIMS Contractor Web, a legacy product that is no longer maintained or patched by the vendor, allows an unauthorised user to retrieve sensitive database contents via unsanitized parameter input. This vulnerability occurs due to improper input validation on /BEIMSWeb/contractor.asp endpoint and successful exploitation requires a contractor.asp endpoint open to the internet. This vulnerability allows attackers to execute arbitrary SQL commands, compromising the confidentiality, integrity and potentially the availability of the database.  Version 5.7.139  has been confirmed as vulnerable. Other versions have not been confirmed by the vendor and users should assume that all versions of BEIMS Contractor Web may be impacted until further guidance is provided by the vendor.

Action-Not Available
Vendor-BEIMS
Product-Contractor Web
CWE ID-CWE-20
Improper Input Validation
CVE-2025-0632
Assigner-9c1820ae-fb77-4810-a8aa-ca46e7474d2f
ShareView Details
Assigner-9c1820ae-fb77-4810-a8aa-ca46e7474d2f
CVSS Score-9.2||CRITICAL
EPSS-2.65% / 85.55%
||
7 Day CHG~0.00%
Published-21 Apr, 2025 | 05:27
Updated-28 Apr, 2025 | 03:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Local File Inclusion (LFI) leading to sensitive data exposure

Local File Inclusion (LFI) vulnerability in a Render function of Formulatrix Rock Maker Web (RMW) allows a remote attacker to obtain sensitive data via arbitrary code execution. A malicious actor could execute malicious scripts to automatically download configuration files in known locations to exfiltrate data including credentials, and with no rate limiting a malicious actor could enumerate the filesystem of the host machine and potentially lead to full host compromise. This issue affects Rock Maker Web: from 3.2.1.1 and later

Action-Not Available
Vendor-Formulatrix
Product-Rock Maker Web
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CWE ID-CWE-98
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion')