Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools

CERT.PL

#4bb8329e-dd38-46c1-aafb-9bf32bcb93c6
PolicyEmail

Short Name

CERT-PL

Program Role

CNA

Top Level Root

MITRE Corporation

Security Advisories

View Advisories (Polish)
View Advisories (English)

Domain

cert.pl

Country

Poland

Scope

Vulnerabilities in software discovered by CERT.PL, and vulnerabilities reported to CERT.PL for coordinated disclosure, which are not in another CNA’s scope.
Reported CVEsVendorsProductsReports
175Vulnerabilities found

CVE-2025-8700
Assigner-CERT.PL
ShareView Details
Assigner-CERT.PL
CVSS Score-4.8||MEDIUM
EPSS-Not Assigned
Published-26 Aug, 2025 | 12:23
Updated-26 Aug, 2025 | 13:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Privilege Escalation via get-task-allow entitlement in Invoice Ninja

Invoice Ninja's configuration on macOS, specifically the presence of entitlement "com.apple.security.get-task-allow", allows local attackers with unprivileged access (e.g. via a malicious application) to attach a debugger, read or modify the process memory, inject code in the application's context despite being signed with Hardened Runtime and bypass Transparency, Consent, and Control (TCC). Acquired resource access is limited to previously granted permissions by the user. Access to other resources beyond granted permissions requires user interaction with a system prompt asking for permission. According to Apple documentation, when a non-root user runs an app with the debugging tool entitlement, the system presents an authorization dialog asking for a system administrator's credentials. Since there is no prompt when the target process has "get-task-allow" entitlement, the presence of this entitlement was decided to be treated as a vulnerability because it removes one step needed to perform an attack. This issue was fixed in version 5.0.175

Action-Not Available
Vendor-Invoice Ninja
Product-Invoice Ninja
CWE ID-CWE-497
Exposure of Sensitive System Information to an Unauthorized Control Sphere
CVE-2025-8597
Assigner-CERT.PL
ShareView Details
Assigner-CERT.PL
CVSS Score-4.8||MEDIUM
EPSS-Not Assigned
Published-26 Aug, 2025 | 12:23
Updated-26 Aug, 2025 | 13:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Privilege Escalation via get-task-allow entitlement in MacVim.app

MacVim's configuration on macOS, specifically the presence of entitlement "com.apple.security.get-task-allow", allows local attackers with unprivileged access (e.g. via a malicious application) to attach a debugger, read or modify the process memory, inject code in the application's context despite being signed with Hardened Runtime and bypass Transparency, Consent, and Control (TCC). Acquired resource access is limited to previously granted permissions by the user. Access to other resources beyond granted permissions requires user interaction with a system prompt asking for permission. According to Apple documentation, when a non-root user runs an app with the debugging tool entitlement, the system presents an authorization dialog asking for a system administrator's credentials. Since there is no prompt when the target process has "get-task-allow" entitlement, the presence of this entitlement was decided to be treated as a vulnerability because it removes one step needed to perform an attack. This issue was fixed in build r181.2

Action-Not Available
Vendor-MacVim
Product-MacVim
CWE ID-CWE-497
Exposure of Sensitive System Information to an Unauthorized Control Sphere
CVE-2025-9190
Assigner-CERT.PL
ShareView Details
Assigner-CERT.PL
CVSS Score-4.8||MEDIUM
EPSS-Not Assigned
Published-26 Aug, 2025 | 12:22
Updated-26 Aug, 2025 | 13:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
TCC Bypass via misconfigured Node fuses in Cursor

The configuration of Cursor on macOS, specifically the "RunAsNode" fuse enabled, allows a local attacker with unprivileged access to execute arbitrary code that inherits Cursor TCC (Transparency, Consent, and Control) permissions. Acquired resource access is limited to previously granted permissions by the user. Accessing other resources beyond previously granted TCC permissions will prompt the user for approval in the name of Cursor, potentially disguising attacker's malicious intent. This issue was detected in 15.4.1 version of Cursor. Project maintainers decided not to fix this issue, because a scenario including a local attacker falls outside their defined threat model.

Action-Not Available
Vendor-Cursor
Product-Cursor
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2025-53813
Assigner-CERT.PL
ShareView Details
Assigner-CERT.PL
CVSS Score-4.8||MEDIUM
EPSS-Not Assigned
Published-26 Aug, 2025 | 12:22
Updated-26 Aug, 2025 | 13:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
TCC Bypass via misconfigured Node fuses in Nozbe

The configuration of Nozbe on macOS, specifically the "RunAsNode" fuse enabled, allows a local attacker with unprivileged access to execute arbitrary code that inherits Nozbe TCC (Transparency, Consent, and Control) permissions.  Acquired resource access is limited to previously granted permissions by the user. Access to other resources beyond granted-permissions requires user interaction with a system prompt asking for permission. This issue was fixed in version 2025.11 of Nozbe.

Action-Not Available
Vendor-Nozbe
Product-Nozbe
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2025-53811
Assigner-CERT.PL
ShareView Details
Assigner-CERT.PL
CVSS Score-4.8||MEDIUM
EPSS-Not Assigned
Published-26 Aug, 2025 | 12:22
Updated-26 Aug, 2025 | 14:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
TCC Bypass via misconfigured Node fuses in Mosh-Pro

The configuration of Mosh-Pro on macOS, specifically the "RunAsNode" fuse enabled, allows a local attacker with unprivileged access to execute arbitrary code that inherits Mosh-Pro TCC (Transparency, Consent, and Control) permissions.  Acquired resource access is limited to previously granted permissions by the user. Accessing other resources beyond previously granted TCC permissions will prompt the user for approval in the name of Mosh-Pro, potentially disguising attacker's malicious intent.  This issue was detected in 1.3.2 version of Mosh-Pro. Since authors did not respond to messages from CNA, patching status is unknown.

Action-Not Available
Vendor-Mosh-Pro
Product-Mosh-Pro
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2025-54175
Assigner-CERT.PL
ShareView Details
Assigner-CERT.PL
CVSS Score-4.6||MEDIUM
EPSS-0.07% / 21.87%
||
7 Day CHG~0.00%
Published-20 Aug, 2025 | 12:53
Updated-20 Aug, 2025 | 15:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Reflected Cross-Site Scripting in QuickCMS.EXT

QuickCMS.EXT is vulnerable to Reflected XSS in sFileName parameter in thumbnail viewer functionality.  An attacker can craft a malicious URL that results in arbitrary JavaScript execution in the victim's browser when opened. The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version 6.8 was tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.

Action-Not Available
Vendor-OpenSolution
Product-Quick.CMS.EXT
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-54174
Assigner-CERT.PL
ShareView Details
Assigner-CERT.PL
CVSS Score-5.1||MEDIUM
EPSS-0.02% / 3.20%
||
7 Day CHG~0.00%
Published-20 Aug, 2025 | 12:53
Updated-20 Aug, 2025 | 15:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cross-Site Request Forgery in QuickCMS

QuickCMS is vulnerable to Cross-Site Request Forgery in article creation functionality. Malicious attacker can craft special website, which when visited by the admin, will automatically send a POST request creating a malicious article with content defined by the attacker. The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version 6.8 was tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.

Action-Not Available
Vendor-OpenSolution
Product-Quick.CMS
CWE ID-CWE-352
Cross-Site Request Forgery (CSRF)
CVE-2025-54172
Assigner-CERT.PL
ShareView Details
Assigner-CERT.PL
CVSS Score-4.8||MEDIUM
EPSS-0.04% / 12.13%
||
7 Day CHG~0.00%
Published-20 Aug, 2025 | 12:52
Updated-20 Aug, 2025 | 15:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Stored Cross-Site Scripting in QuickCMS

QuickCMS is vulnerable to Stored XSS in sTitle parameter in page editor functionality. Malicious attacker with admin privileges can inject arbitrary HTML and JS into website, which will be rendered/executed when visiting edited page. Regular admin user is not able to inject any JS scripts into the page. The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version 6.8 was tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.

Action-Not Available
Vendor-OpenSolution
Product-Quick.CMS
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-7761
Assigner-CERT.PL
ShareView Details
Assigner-CERT.PL
CVSS Score-5.1||MEDIUM
EPSS-0.06% / 19.39%
||
7 Day CHG+0.01%
Published-14 Aug, 2025 | 10:01
Updated-14 Aug, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Reflected XSS in Lepszy BIP

Lepszy BIP is vulnerable to Reflected Cross-Site Scripting (XSS). Improper input validation in index.php form in one of the parameters allows arbitrary JavaScript to be executed on victim's browser when specially crafted URL is opened. The vendor was contacted early about this disclosure but did not respond in any way. Potentially all versions are vulnerable.

Action-Not Available
Vendor-Akcess-Net
Product-Lepszy BIP
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-8672
Assigner-CERT.PL
ShareView Details
Assigner-CERT.PL
CVSS Score-4.8||MEDIUM
EPSS-0.01% / 1.37%
||
7 Day CHG~0.00%
Published-11 Aug, 2025 | 12:21
Updated-22 Aug, 2025 | 15:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
TCC Bypass via Inherited Permissions in Bundled Interpreter in GIMP.app

MacOS version of GIMP bundles a Python interpreter that inherits the Transparency, Consent, and Control (TCC) permissions granted by the user to the main application bundle. An attacker with local user access can invoke this interpreter with arbitrary commands or scripts, leveraging the application's previously granted TCC permissions to access user's files in privacy-protected folders without triggering user prompts. Accessing other resources beyond previously granted TCC permissions will prompt the user for approval in the name of GIMP, potentially disguising attacker's malicious intent. This issue has been fixed in 3.1.4.2 version of GIMP.

Action-Not Available
Vendor-Apple Inc.GIMP
Product-macosgimpGIMP
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2025-8533
Assigner-CERT.PL
ShareView Details
Assigner-CERT.PL
CVSS Score-6.9||MEDIUM
EPSS-0.05% / 16.59%
||
7 Day CHG~0.00%
Published-07 Aug, 2025 | 09:59
Updated-07 Aug, 2025 | 21:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Incorrect Authorization of XPC Service in Fantastical.app

A vulnerability was identified in the XPC services of Fantastical. The services failed to implement proper client authorization checks in its listener:shouldAcceptNewConnection method, unconditionally accepting requests from any local process. As a result, any local, unprivileged process could connect to the XPC service and access its methods. This issue has been resolved in version 4.0.16.

Action-Not Available
Vendor-Flexibits
Product-Fantastical
CWE ID-CWE-863
Incorrect Authorization
CVE-2025-5922
Assigner-CERT.PL
ShareView Details
Assigner-CERT.PL
CVSS Score-4.8||MEDIUM
EPSS-0.01% / 0.29%
||
7 Day CHG~0.00%
Published-29 Jul, 2025 | 16:54
Updated-31 Jul, 2025 | 18:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Retrievable password hash protecting TSplus admin console

Access to TSplus Remote Access Admin Tool is restricted to administrators (unless "Disable UAC" option is enabled) and requires a PIN code. In versions below v18.40.6.17 the PIN's hash is stored in a system registry accessible to regular users, making it possible to perform a brute-force attack using rainbow tables, since the hash is not salted. LTS (Long-Term Support) versions also received patches in v17.2025.6.27 and v16.2025.6.27 releases.

Action-Not Available
Vendor-TSplus
Product-TSplus Remote Access
CWE ID-CWE-522
Insufficiently Protected Credentials
CWE ID-CWE-759
Use of a One-Way Hash without a Salt
CVE-2025-4049
Assigner-CERT.PL
ShareView Details
Assigner-CERT.PL
CVSS Score-8.6||HIGH
EPSS-0.02% / 3.46%
||
7 Day CHG~0.00%
Published-21 Jul, 2025 | 07:40
Updated-22 Jul, 2025 | 13:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Hardcoded SQLite password in FARA

Use of hard-coded, the same among all vulnerable installations SQLite credentials vulnerability in SIGNUM-NET FARA allows to read and manipulate local-stored database.This issue affects FARA: through 5.0.80.34.

Action-Not Available
Vendor-SIGNUM-NET
Product-FARA
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2025-5346
Assigner-CERT.PL
ShareView Details
Assigner-CERT.PL
CVSS Score-5.1||MEDIUM
EPSS-0.02% / 3.46%
||
7 Day CHG~0.00%
Published-17 Jul, 2025 | 12:45
Updated-17 Jul, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
File removal via path traversal in unsecured broadcast receiver in Bluebird barcode scanner application

Bluebird devices contain a pre-loaded barcode scanner application. This application exposes an unsecured broadcast receiver "kr.co.bluebird.android.bbsettings.BootReceiver". A local attacker can call the receiver to overwrite file containing ".json" keyword with default barcode config file. It is possible to overwrite file in any location due to lack of protection against path traversal in name of the file. This issue affects all versions before 1.3.3.

Action-Not Available
Vendor-Bluebird
Product-kr.co.bluebird.android.bbsettings
CWE ID-CWE-926
Improper Export of Android Application Components
CVE-2025-5344
Assigner-CERT.PL
ShareView Details
Assigner-CERT.PL
CVSS Score-8.5||HIGH
EPSS-0.02% / 3.46%
||
7 Day CHG~0.00%
Published-17 Jul, 2025 | 12:45
Updated-17 Jul, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Exposed AIDL service allowing for tampering of system secure settings in Bluebird kiosk application

Bluebird devices contain a pre-loaded kiosk application. This application exposes an unsecured service provider "com.bluebird.kiosk.launcher.IpartnerKioskRemoteService". A local attacker can bind to the AIDL-type service to modify device's global settings and wallpaper image. This issue affects all versions before 1.1.2.

Action-Not Available
Vendor-Bluebird
Product-com.bluebird.kiosk.launcher
CWE ID-CWE-926
Improper Export of Android Application Components
CVE-2025-5345
Assigner-CERT.PL
ShareView Details
Assigner-CERT.PL
CVSS Score-6.3||MEDIUM
EPSS-0.03% / 5.07%
||
7 Day CHG~0.00%
Published-17 Jul, 2025 | 12:45
Updated-17 Jul, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Exposed AIDL service allowing to read and delete files with system-level privileges in Bluebird filemanager application

Bluebird devices contain a pre-loaded file manager application. This application exposes an unsecured service provider "com.bluebird.system.koreanpost.IsdcardRemoteService". A local attacker can bind to the AIDL-type service to copy and delete arbitrary files from device's storage with system-level permissions. Version 1.4.4 is vulnerable, vendor reverted vulnerable versions to older version: 1.3.6

Action-Not Available
Vendor-Bluebird
Product-com.bluebird.filemanagers
CWE ID-CWE-926
Improper Export of Android Application Components
CVE-2025-3920
Assigner-CERT.PL
ShareView Details
Assigner-CERT.PL
CVSS Score-8.5||HIGH
EPSS-0.02% / 2.50%
||
7 Day CHG~0.00%
Published-07 Jul, 2025 | 08:21
Updated-08 Jul, 2025 | 16:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Hard-coded Password in SUR-FBD CMMS

A vulnerability was identified in SUR-FBD CMMS where hard-coded credentials were found within a compiled DLL file. These credentials correspond to a built-in administrative account of the software. An attacker with local access to the system or the application's installation directory could extract these credentials, potentially leading to a complete compromise of the application's administrative functions. This issue was fixed in version 2025.03.27 of the SUR-FBD CMMS software.

Action-Not Available
Vendor-SUR-FBD CMMS
Product-SUR-FBD CMMS
CWE ID-CWE-259
Use of Hard-coded Password
CVE-2025-5963
Assigner-CERT.PL
ShareView Details
Assigner-CERT.PL
CVSS Score-4.8||MEDIUM
EPSS-0.01% / 1.59%
||
7 Day CHG~0.00%
Published-20 Jun, 2025 | 10:01
Updated-23 Jun, 2025 | 20:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
TCC Bypass via Dylib Injection in Postbox

The Postbox's configuration on macOS, specifically the presence of entitlements: "com.apple.security.cs.allow-dyld-environment-variables" and "com.apple.security.cs.disable-library-validation" allows for Dynamic Library (Dylib) injection. A local attacker with unprivileged access can use environment variables like DYLD_INSERT_LIBRARIES to successfully inject code in application's context and bypass Transparency, Consent, and Control (TCC). Acquired resource access is limited to previously granted permissions by the user. Access to other resources beyond granted-permissions requires user interaction with a system prompt asking for permission. The original company behind Postbox is no longer operational, the software will no longer receive updates. The acquiring company (em Client) did not cooperate in vulnerability disclosure.

Action-Not Available
Vendor-Postbox
Product-Postbox
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2025-5255
Assigner-CERT.PL
ShareView Details
Assigner-CERT.PL
CVSS Score-4.8||MEDIUM
EPSS-0.01% / 1.26%
||
7 Day CHG~0.00%
Published-20 Jun, 2025 | 10:01
Updated-23 Jun, 2025 | 20:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
TCC Bypass via Dylib Injection in Phoenix Code

The Phoenix Code's configuration on macOS, specifically the presence of entitlements: "com.apple.security.cs.allow-dyld-environment-variables" and "com.apple.security.cs.disable-library-validation" allows for Dynamic Library (Dylib) injection. A local attacker with unprivileged access can use environment variables like DYLD_INSERT_LIBRARIES to successfully inject code in application's context and bypass Transparency, Consent, and Control (TCC). Acquired resource access is limited to previously granted permissions by the user. Access to other resources beyond granted-permissions requires user interaction with a system prompt asking for permission. This issue was fixed in commit 0c75fb57f89d0b7d9b180026bc2624b7dcf807da

Action-Not Available
Vendor-Core.ai
Product-Phoenix Code
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2025-4568
Assigner-CERT.PL
ShareView Details
Assigner-CERT.PL
CVSS Score-9.3||CRITICAL
EPSS-0.04% / 13.12%
||
7 Day CHG~0.00%
Published-05 Jun, 2025 | 10:03
Updated-05 Jun, 2025 | 20:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SQL Injection in 2ClickPortal

Improper neutralization of input provided by an unauthorized user into changes__reference_id parameter in URL allows for boolean-based Blind SQL Injection attacks.

Action-Not Available
Vendor-Trol InterMedia
Product-2ClickPortal
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVE-2024-13917
Assigner-CERT.PL
ShareView Details
Assigner-CERT.PL
CVSS Score-8.3||HIGH
EPSS-0.02% / 3.84%
||
7 Day CHG~0.00%
Published-30 May, 2025 | 15:17
Updated-10 Jun, 2025 | 10:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Intent Injection in Kruger&Matz AppLock application

An application "com.pri.applock", which is pre-loaded on Kruger&Matz smartphones, allows a user to encrypt any application using user-provided PIN code or by using biometric data. Exposed ”com.pri.applock.LockUI“ activity allows any other malicious application, with no granted Android system permissions, to inject an arbitrary intent with system-level privileges to a protected application. One must know the protecting PIN number (it might be revealed by exploiting CVE-2024-13916) or ask the user to provide it. Only version (version name: 13, version code: 33) was tested and confirmed to have this vulnerability. Application update was released in April 2025.

Action-Not Available
Vendor-Kruger&Matz
Product-com.pri.applock
CWE ID-CWE-926
Improper Export of Android Application Components
CVE-2024-13916
Assigner-CERT.PL
ShareView Details
Assigner-CERT.PL
CVSS Score-6.9||MEDIUM
EPSS-0.02% / 4.03%
||
7 Day CHG~0.00%
Published-30 May, 2025 | 15:16
Updated-10 Jun, 2025 | 10:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Exposure of Applications' Encryption PINs in Kruger&Matz AppLock

An application "com.pri.applock", which is pre-loaded on Kruger&Matz smartphones, allows a user to encrypt any application using user-provided PIN code or by using biometric data. Exposed ”com.android.providers.settings.fingerprint.PriFpShareProvider“ content provider's public method query() allows any other malicious application, without any granted Android system permissions, to exfiltrate the PIN code. Only version (version name: 13, version code: 33) was tested and confirmed to have this vulnerability. Application update was released in April 2025.

Action-Not Available
Vendor-Kruger&Matz
Product-com.pri.applock
CWE ID-CWE-497
Exposure of Sensitive System Information to an Unauthorized Control Sphere
CVE-2024-13915
Assigner-CERT.PL
ShareView Details
Assigner-CERT.PL
CVSS Score-6.9||MEDIUM
EPSS-0.02% / 3.68%
||
7 Day CHG~0.00%
Published-30 May, 2025 | 15:09
Updated-10 Jun, 2025 | 09:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Unrestricted Access to Exported Service in com.pri.factorytest

Android based smartphones from vendors such as Ulefone and Krüger&Matz contain "com.pri.factorytest" application preloaded onto devices during manufacturing process. The application "com.pri.factorytest" (version name: 1.0, version code: 1) exposes a ”com.pri.factorytest.emmc.FactoryResetService“ service allowing any application to perform a factory reset of the device.  Application update did not increment the APK version. Instead, it was bundled in OS builds released later than December 2024 (Ulefone) and April 2025 (Krüger&Matz).

Action-Not Available
Vendor-Krüger&MatzUlefone
Product-com.pri.factorytest
CWE ID-CWE-926
Improper Export of Android Application Components
CVE-2025-4081
Assigner-CERT.PL
ShareView Details
Assigner-CERT.PL
CVSS Score-4.8||MEDIUM
EPSS-0.02% / 2.24%
||
7 Day CHG~0.00%
Published-29 May, 2025 | 14:25
Updated-30 May, 2025 | 16:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
TCC Bypass via Dylib Substitution in DaVinci Resolve

Use of entitlement "com.apple.security.cs.disable-library-validation" and lack of launch and library load constraints allows to substitute a legitimate dylib with malicious one. A local attacker with unprivileged access can execute the application with altered dynamic library successfully bypassing Transparency, Consent, and Control (TCC). Acquired resource access is limited to previously granted permissions by the user. Access to other resources beyond granted-permissions requires user interaction with a system prompt asking for permission. This issue affects DaVinci Resolve on macOS in all versions. Last tested version: 19.1.3

Action-Not Available
Vendor-Blackmagic Design
Product-DaVinci Resolve
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2025-3864
Assigner-CERT.PL
ShareView Details
Assigner-CERT.PL
CVSS Score-2.3||LOW
EPSS-0.22% / 44.67%
||
7 Day CHG~0.00%
Published-28 May, 2025 | 11:19
Updated-28 May, 2025 | 15:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Connection pool exhaustion in hackney

Hackney fails to properly release HTTP connections to the pool after handling 307 Temporary Redirect responses. Remote attackers can exploit this to exhaust connection pools, causing denial of service in applications using the library. Fix for this issue has been included in 1.24.0 release.

Action-Not Available
Vendor-hackney
Product-hackney
CWE ID-CWE-772
Missing Release of Resource after Effective Lifetime
CVE-2025-4412
Assigner-CERT.PL
ShareView Details
Assigner-CERT.PL
CVSS Score-4.8||MEDIUM
EPSS-0.02% / 2.24%
||
7 Day CHG~0.00%
Published-27 May, 2025 | 10:09
Updated-06 Jun, 2025 | 07:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
TCC Bypass via Dylib Loading in Viscosity.app

On macOS systems, by utilizing a Launch Agent and loading the viscosity_openvpn process from the application bundle, it is possible to load a dynamic library with Viscosity's TCC (Transparency, Consent, and Control) identity. The acquired resource access is limited without entitlements such as access to the camera or microphone. Only user-granted permissions for file resources apply. Access to other resources beyond granted-permissions requires user interaction with a system prompt asking for permission. This issue was fixed in version 1.11.5 of Viscosity.

Action-Not Available
Vendor-SparkLabs
Product-Viscosity
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2025-4053
Assigner-CERT.PL
ShareView Details
Assigner-CERT.PL
CVSS Score-6.8||MEDIUM
EPSS-0.01% / 1.05%
||
7 Day CHG~0.00%
Published-26 May, 2025 | 10:03
Updated-28 May, 2025 | 15:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Unauthorized creation of master key in Mifare Classic Be-Tech cards

The data stored in Be-Tech Mifare Classic card is stored in cleartext. An attacker having access to a Be-Tech hotel guest Mifare Classic card can create a master key card that unlocks all the locks in the building. This issue affects all Be-Tech Mifare Classic card systems. To fix the vulnerability, it is necessary to replace the software, encoder, cards, and PCBs in the locks.

Action-Not Available
Vendor-Be-Tech
Product-Mifare Classic cards
CWE ID-CWE-312
Cleartext Storage of Sensitive Information
CVE-2025-3895
Assigner-CERT.PL
ShareView Details
Assigner-CERT.PL
CVSS Score-9.1||CRITICAL
EPSS-0.12% / 31.97%
||
7 Day CHG~0.00%
Published-23 May, 2025 | 10:20
Updated-23 May, 2025 | 15:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Low token entropy in MegaBIP

Token used for resetting passwords in MegaBIP software are generated using a small space of random values combined with a queryable value. It allows an unauthenticated attacker who know user login names to brute force these tokens and change account passwords (including these belonging to administrators).  Version 5.20 of MegaBIP fixes this issue.

Action-Not Available
Vendor-Jan Syski
Product-MegaBIP
CWE ID-CWE-334
Small Space of Random Values
CVE-2025-3894
Assigner-CERT.PL
ShareView Details
Assigner-CERT.PL
CVSS Score-4.8||MEDIUM
EPSS-0.06% / 19.12%
||
7 Day CHG~0.00%
Published-23 May, 2025 | 10:20
Updated-23 May, 2025 | 15:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Stored XSS in MegaBIP

Text editor embedded into MegaBIP software does not neutralize user input allowing Stored XSS attacks on other users. In order to use the editor high privileges are required.   Version 5.20 of MegaBIP fixes this issue.

Action-Not Available
Vendor-Jan Syski
Product-MegaBIP
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-3893
Assigner-CERT.PL
ShareView Details
Assigner-CERT.PL
CVSS Score-8.6||HIGH
EPSS-0.04% / 10.48%
||
7 Day CHG~0.00%
Published-23 May, 2025 | 10:20
Updated-23 May, 2025 | 15:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SQL Injection in MegaBIP

While editing pages managed by MegaBIP a user with high privileges is prompted to give a reasoning for performing this action. Input provided by the the user is not sanitized, leading to SQL Injection vulnerability.  Version 5.20 of MegaBIP fixes this issue.

Action-Not Available
Vendor-Jan Syski
Product-MegaBIP
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVE-2025-4379
Assigner-CERT.PL
ShareView Details
Assigner-CERT.PL
CVSS Score-5.1||MEDIUM
EPSS-0.07% / 20.86%
||
7 Day CHG~0.00%
Published-23 May, 2025 | 10:00
Updated-23 May, 2025 | 15:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Reflected XSS in DobryCMS

DobryCMS in versions 2.* and lower is vulnerable to Reflected Cross-Site Scripting (XSS). Improper input validation in szukaj parameter allows arbitrary JavaScript to be executed on victim's browser when specially crafted URL is opened. A hotfix for affected versions was released on 29.04.2025. It removes the vulnerability without incrementing the version.

Action-Not Available
Vendor-Studio Fabryka
Product-DobryCMS
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-4280
Assigner-CERT.PL
ShareView Details
Assigner-CERT.PL
CVSS Score-4.8||MEDIUM
EPSS-0.01% / 1.78%
||
7 Day CHG~0.00%
Published-22 May, 2025 | 09:59
Updated-23 May, 2025 | 15:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
TCC Bypass via Inherited Permissions in Bundled Interpreter in Poedit.app

MacOS version of Poedit bundles a Python interpreter that inherits the Transparency, Consent, and Control (TCC) permissions granted by the user to the main application bundle. An attacker with local user access can invoke this interpreter with arbitrary commands or scripts, leveraging the application's previously granted TCC permissions to access user's files in privacy-protected folders without triggering user prompts. Accessing other resources beyond previously granted TCC permissions will prompt the user for approval in the name of Poedit, potentially disguising attacker's malicious intent. This issue has been fixed in 3.6.3 version of Poedit.

Action-Not Available
Vendor-Poedit
Product-Poedit
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2025-1421
Assigner-CERT.PL
ShareView Details
Assigner-CERT.PL
CVSS Score-2.4||LOW
EPSS-0.04% / 12.03%
||
7 Day CHG~0.00%
Published-21 May, 2025 | 13:04
Updated-21 May, 2025 | 20:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Formula injection in a CSV file in Proget MDM

Data provided in a request performed to the server while activating a new device are put in a database. Other high privileged users might download this data as a CSV file and corrupt their PC by opening it in a tool such as Microsoft Excel. The attacker could gain remote access to the user's PC. This issue has been fixed in 2.17.5 version of Konsola Proget (server part of the MDM suite).

Action-Not Available
Vendor-Proget
Product-Proget
CWE ID-CWE-1236
Improper Neutralization of Formula Elements in a CSV File
CVE-2025-1420
Assigner-CERT.PL
ShareView Details
Assigner-CERT.PL
CVSS Score-2.4||LOW
EPSS-0.04% / 12.03%
||
7 Day CHG~0.00%
Published-21 May, 2025 | 13:04
Updated-21 May, 2025 | 20:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
XSS in Proget MDM

Input provided in a field containing "activationMessage" in Konsola Proget is not sanitized correctly, allowing a high-privileged user to perform a Stored Cross-Site Scripting attack. This issue has been fixed in 2.17.5 version of Konsola Proget (server part of the MDM suite).

Action-Not Available
Vendor-Proget
Product-Proget
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-1419
Assigner-CERT.PL
ShareView Details
Assigner-CERT.PL
CVSS Score-2.4||LOW
EPSS-0.04% / 12.03%
||
7 Day CHG~0.00%
Published-21 May, 2025 | 13:03
Updated-21 May, 2025 | 20:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
XSS in Proget MDM

Input provided in comment section of Konsola Proget is not sanitized correctly, allowing a high-privileged user to perform a Stored Cross-Site Scripting attack. This issue has been fixed in 2.17.5 version of Konsola Proget (server part of the MDM suite).

Action-Not Available
Vendor-Proget
Product-Proget
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-1418
Assigner-CERT.PL
ShareView Details
Assigner-CERT.PL
CVSS Score-5.1||MEDIUM
EPSS-0.04% / 9.79%
||
7 Day CHG~0.00%
Published-21 May, 2025 | 13:03
Updated-21 May, 2025 | 20:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Information disclosure in Proget MDM

A low-privileged user can access information about profiles created in Proget MDM (Mobile Device Management), which contain details about allowed/prohibited functions. The profiles do not reveal any sensitive information (including their usage in connected devices).    This issue has been fixed in 2.17.5 version of Konsola Proget (server part of the MDM suite).

Action-Not Available
Vendor-Proget
Product-Proget
CWE ID-CWE-863
Incorrect Authorization
CVE-2025-1417
Assigner-CERT.PL
ShareView Details
Assigner-CERT.PL
CVSS Score-4.6||MEDIUM
EPSS-0.04% / 9.79%
||
7 Day CHG~0.00%
Published-21 May, 2025 | 13:03
Updated-21 May, 2025 | 20:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Information disclosure in Proget MDM

In Proget MDM, a low-privileged user can access information about changes contained in backups of all devices managed by the MDM (Mobile Device Management). This information include user ids, email addresses, first names, last names and device UUIDs. The last one can be used for exploitation of CVE-2025-1416. Successful exploitation requires UUID of a targeted backup, which cannot be brute forced.  This issue has been fixed in 2.17.5 version of Konsola Proget (server part of the MDM suite).

Action-Not Available
Vendor-Proget
Product-Proget
CWE ID-CWE-863
Incorrect Authorization
CVE-2025-1416
Assigner-CERT.PL
ShareView Details
Assigner-CERT.PL
CVSS Score-7||HIGH
EPSS-0.04% / 9.79%
||
7 Day CHG~0.00%
Published-21 May, 2025 | 13:03
Updated-21 May, 2025 | 20:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Password disclosure in Proget MDM

In Proget MDM, a low-privileged user can retrieve passwords for managed devices and subsequently use functionalities restricted by the MDM (Mobile Device Management). For it to happen, they must know the UUIDs of targetted devices, which might be obtained by exploiting CVE-2025-1415 or CVE-2025-1417. This issue has been fixed in 2.17.5 version of Konsola Proget (server part of the MDM suite).

Action-Not Available
Vendor-Proget
Product-Proget
CWE ID-CWE-863
Incorrect Authorization
CVE-2025-1415
Assigner-CERT.PL
ShareView Details
Assigner-CERT.PL
CVSS Score-5.1||MEDIUM
EPSS-0.04% / 9.79%
||
7 Day CHG~0.00%
Published-21 May, 2025 | 10:38
Updated-21 May, 2025 | 20:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Information disclosure in Proget MDM

A low-privileged user is able to obtain information about tasks executed on devices controlled by Proget MDM (Mobile Device Management), as well as details of the devices like their UUIDs needed for exploitation of CVE-2025-1416. In order to perform the attack, one has to know a task_id, but since it's a low integer and there is no limit of requests an attacker can perform to a vulnerable endpoint, the task_id might be simply brute forced. This issue has been fixed in 2.17.5 version of Konsola Proget (server part of the MDM suite).

Action-Not Available
Vendor-Proget
Product-Proget
CWE ID-CWE-863
Incorrect Authorization
CVE-2025-4430
Assigner-CERT.PL
ShareView Details
Assigner-CERT.PL
CVSS Score-8.6||HIGH
EPSS-0.07% / 21.44%
||
7 Day CHG~0.00%
Published-14 May, 2025 | 10:36
Updated-14 May, 2025 | 13:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Unauthorized file manipulation in EZD RP

Unauthorized access to "/api/Token/gettoken" endpoint in EZD RP allows file manipulation.This issue affects EZD RP in versions before 20.19 (published on 22nd August 2024).

Action-Not Available
Vendor-Naukowa i Akademicka Sieć Komputerowa - Państwowy Instytut Badawczy
Product-EZD RP
CWE ID-CWE-862
Missing Authorization
CVE-2025-3759
Assigner-CERT.PL
ShareView Details
Assigner-CERT.PL
CVSS Score-8.7||HIGH
EPSS-0.04% / 12.52%
||
7 Day CHG~0.00%
Published-08 May, 2025 | 10:05
Updated-08 May, 2025 | 14:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Missing Authentication for Changing Device Configuration in WF2220

Endpoint /cgi-bin-igd/netcore_set.cgi which is used for changing device configuration is accessible without authentication. This poses a significant security threat allowing for e.g: administrator account hijacking or AP password changing. The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-Netis Systems Co., Ltd.
Product-WF2220
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2025-3758
Assigner-CERT.PL
ShareView Details
Assigner-CERT.PL
CVSS Score-8.7||HIGH
EPSS-0.01% / 0.72%
||
7 Day CHG~0.00%
Published-08 May, 2025 | 10:05
Updated-08 May, 2025 | 14:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Exposure of Device Configuration without Authentication in WF2220

WF2220 exposes endpoint /cgi-bin-igd/netcore_get.cgi that returns configuration of the device to unauthorized users. Returned configuration includes cleartext password. The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-Netis Systems Co., Ltd.
Product-WF2220
CWE ID-CWE-306
Missing Authentication for Critical Function
CWE ID-CWE-311
Missing Encryption of Sensitive Data
CVE-2025-1983
Assigner-CERT.PL
ShareView Details
Assigner-CERT.PL
CVSS Score-5.1||MEDIUM
EPSS-0.08% / 25.55%
||
7 Day CHG~0.00%
Published-16 Apr, 2025 | 12:36
Updated-16 Apr, 2025 | 14:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Stored Cross-Site Scripting in Ready_

A cross-site scripting (XSS) vulnerability in Ready_'s File Explorer upload functionality allows injection of arbitrary JavaScript code in filename. Injected content is stored on server and is executed every time a user interacts with the uploaded file.

Action-Not Available
Vendor-Symfonia
Product-Ready_
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-1982
Assigner-CERT.PL
ShareView Details
Assigner-CERT.PL
CVSS Score-7.1||HIGH
EPSS-0.08% / 23.42%
||
7 Day CHG~0.00%
Published-16 Apr, 2025 | 12:36
Updated-16 Apr, 2025 | 14:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Local File Inclusion in Ready_

Local File Inclusion vulnerability in Ready's attachment upload panel allows low privileged user to provide link to a local file using the file:// protocol thus allowing the attacker to read content of the file. This vulnerability can be use to read content of system files.

Action-Not Available
Vendor-Symfonia
Product-Ready_
CWE ID-CWE-552
Files or Directories Accessible to External Parties
CVE-2025-1981
Assigner-CERT.PL
ShareView Details
Assigner-CERT.PL
CVSS Score-9.4||CRITICAL
EPSS-0.06% / 16.95%
||
7 Day CHG~0.00%
Published-16 Apr, 2025 | 12:36
Updated-16 Apr, 2025 | 14:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SQL Injection in Ready_

Improper neutralization of input provided by a low-privileged user into a file search functionality in Ready_'s Invoices module allows for SQL Injection attacks.

Action-Not Available
Vendor-Symfonia
Product-Ready_
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVE-2025-1980
Assigner-CERT.PL
ShareView Details
Assigner-CERT.PL
CVSS Score-7.1||HIGH
EPSS-0.51% / 65.54%
||
7 Day CHG~0.00%
Published-16 Apr, 2025 | 12:35
Updated-16 Apr, 2025 | 14:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Remote Code Execution via Unrestricted File Upload in Ready_

The Ready_ application's Profile section allows users to upload files of any type and extension without restriction. If the server is misconfigured, as it was by default when installed at the turn of 2021 and 2022, it can result in Remote Code Execution. Refer to the Required Configuration for Exposure section for more information.

Action-Not Available
Vendor-Symfonia
Product-Ready_
CWE ID-CWE-434
Unrestricted Upload of File with Dangerous Type
CVE-2024-49709
Assigner-CERT.PL
ShareView Details
Assigner-CERT.PL
CVSS Score-2.3||LOW
EPSS-0.08% / 24.11%
||
7 Day CHG~0.00%
Published-14 Apr, 2025 | 12:06
Updated-15 Apr, 2025 | 18:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
XSS in iKSORIS

Internet Starter, one of SoftCOM iKSORIS system modules, allows for setting an arbitrary session cookie value. An attacker with an access to user's browser might set such a cookie, wait until the user logs in and then use the same cookie to take over the account. Moreover, the system does not destroy the old sessions when creating new ones, what expands the time frame in which an attack might be performed.  This vulnerability has been patched in version 79.0

Action-Not Available
Vendor-SoftCOM
Product-iKSORIS
CWE ID-CWE-384
Session Fixation
CVE-2024-49708
Assigner-CERT.PL
ShareView Details
Assigner-CERT.PL
CVSS Score-5.1||MEDIUM
EPSS-0.09% / 26.67%
||
7 Day CHG~0.00%
Published-14 Apr, 2025 | 12:06
Updated-15 Apr, 2025 | 18:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
XSS in iKSORIS

Internet Starter, one of SoftCOM iKSORIS system modules, is vulnerable to Stored XSS (Cross-site Scripting) attacks. An attacker might trick a user into filling a form designed for setting delivery address with a malicious script, what causes the script to run in user's context.  This vulnerability has been patched in version 79.0

Action-Not Available
Vendor-SoftCOM
Product-iKSORIS
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-49707
Assigner-CERT.PL
ShareView Details
Assigner-CERT.PL
CVSS Score-5.1||MEDIUM
EPSS-0.09% / 26.67%
||
7 Day CHG~0.00%
Published-14 Apr, 2025 | 12:06
Updated-15 Apr, 2025 | 18:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
XSS in iKSORIS

Internet Starter, one of SoftCOM iKSORIS system modules, is vulnerable to Reflected XSS (Cross-site Scripting) attacks. An attacker might trick a user into filling a form designed for resetting user's password with a malicious script, what causes the script to run in user's context.  This vulnerability has been patched in version 79.0

Action-Not Available
Vendor-SoftCOM
Product-iKSORIS
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2024-49706
Assigner-CERT.PL
ShareView Details
Assigner-CERT.PL
CVSS Score-5.1||MEDIUM
EPSS-0.05% / 15.54%
||
7 Day CHG~0.00%
Published-14 Apr, 2025 | 12:05
Updated-15 Apr, 2025 | 18:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
XSS in iKSORIS

Internet Starter, one of SoftCOM iKSORIS system modules, is vulnerable to Open Redirect attacks by including base64 encoded URLs in the target parameter sent in a POST request to one of the endpoints. This vulnerability has been patched in version 79.0

Action-Not Available
Vendor-SoftCOM
Product-iKSORIS
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
  • Previous
  • 1
  • 2
  • 3
  • 4
  • Next