Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CWE CATEGORY:ICS Operations (& Maintenance): Emerging Energy Technologies
Category ID:1382
Vulnerability Mapping:Prohibited
Status:Incomplete
DetailsContent HistoryObserved CVE ExamplesReports
15890Vulnerabilities found

CVE-2026-0574
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-5.3||MEDIUM
EPSS-0.04% / 12.66%
||
7 Day CHG-0.00%
Published-04 Jan, 2026 | 02:02
Updated-17 Feb, 2026 | 19:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
yeqifu warehouse Request UserController.java saveUserRole improper authorization

A weakness has been identified in yeqifu warehouse up to aaf29962ba407d22d991781de28796ee7b4670e4. This affects the function saveUserRole of the file warehouse\src\main\java\com\yeqifu\sys\controller\UserController.java of the component Request Handler. This manipulation causes improper authorization. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be used for attacks. This product adopts a rolling release strategy to maintain continuous delivery. Therefore, version details for affected or updated releases cannot be specified.

Action-Not Available
Vendor-yeqifuyeqifu
Product-warehousewarehouse
CWE ID-CWE-266
Incorrect Privilege Assignment
CWE ID-CWE-285
Improper Authorization
CVE-2025-15438
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-5.1||MEDIUM
EPSS-0.05% / 15.70%
||
7 Day CHG~0.00%
Published-02 Jan, 2026 | 14:32
Updated-05 Jan, 2026 | 21:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
PluXml Media Management medias.php __destruct deserialization

A vulnerability was determined in PluXml up to 5.8.22. Affected is the function FileCookieJar::__destruct of the file core/admin/medias.php of the component Media Management Module. Executing manipulation of the argument File can lead to deserialization. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized. The vendor was informed early about this issue and announced that "[w]e fix this issue in the next version 5.8.23". A patch for it is ready.

Action-Not Available
Vendor-n/a
Product-PluXml
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-502
Deserialization of Untrusted Data
CVE-2025-69412
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-3.4||LOW
EPSS-0.01% / 0.58%
||
7 Day CHG-0.02%
Published-31 Dec, 2025 | 23:20
Updated-02 Jan, 2026 | 16:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

KDE messagelib before 25.11.90 ignores SSL errors for threatMatches:find in the Google Safe Browsing Lookup API (aka phishing API), which might allow spoofing of threat data. NOTE: this Lookup API is not contacted in the messagelib default configuration.

Action-Not Available
Vendor-KDE
Product-messagelib
CWE ID-CWE-295
Improper Certificate Validation
CVE-2025-69288
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-9.1||CRITICAL
EPSS-0.77% / 73.10%
||
7 Day CHG~0.00%
Published-31 Dec, 2025 | 21:55
Updated-13 Jan, 2026 | 15:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Titra has Remote Code Execution in Admin Functionality

Titra is open source project time tracking software. Prior to version 0.99.49, Titra allows any authenticated Admin user to modify the timeEntryRule in the database. The value is then passed to a NodeVM value to execute as code. Without sanitization, it leads to a Remote Code Execution. Version 0.99.49 fixes the issue.

Action-Not Available
Vendor-kromitkromitgmbh
Product-titratitra
CWE ID-CWE-20
Improper Input Validation
CVE-2025-15375
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-5.3||MEDIUM
EPSS-0.05% / 15.43%
||
7 Day CHG~0.00%
Published-31 Dec, 2025 | 05:02
Updated-02 Jan, 2026 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
EyouCMS arcpagelist Ajax.php unserialize deserialization

A flaw has been found in EyouCMS up to 1.7.7. The impacted element is the function unserialize of the file application/api/controller/Ajax.php of the component arcpagelist Handler. Executing manipulation of the argument attstr can lead to deserialization. The attack can be launched remotely. The exploit has been published and may be used. The vendor is "[a]cknowledging the existence of the vulnerability, we have completed the fix and will release a new version, v1.7.8".

Action-Not Available
Vendor-eyoucmsn/a
Product-eyoucmsEyouCMS
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-502
Deserialization of Untrusted Data
CVE-2025-15258
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-5.1||MEDIUM
EPSS-0.03% / 9.74%
||
7 Day CHG~0.00%
Published-30 Dec, 2025 | 17:32
Updated-09 Jan, 2026 | 19:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Edimax BR-6208AC Web-based Configuration formALGSetup redirect

A weakness has been identified in Edimax BR-6208AC 1.02/1.03. Affected by this issue is the function formALGSetup of the file /goform/formALGSetup of the component Web-based Configuration Interface. This manipulation of the argument wlan-url causes open redirect. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited. Edimax confirms this issue: "The product mentioned, EDIMAX BR-6208AC V2, has reached its End of Life (EOL) status. It is no longer supported or maintained by Edimax, and it is no longer available for purchase in the market. Consequently, there will be no further firmware updates or patches for this device. We recommend users upgrade to newer models for better security." This vulnerability only affects products that are no longer supported by the maintainer.

Action-Not Available
Vendor-Edimax Technology Company Ltd.
Product-br-6208ac_v2br-6208ac_firmwareBR-6208AC
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2025-15246
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-5.3||MEDIUM
EPSS-0.05% / 15.19%
||
7 Day CHG~0.00%
Published-30 Dec, 2025 | 11:32
Updated-31 Dec, 2025 | 20:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
aizuda snail-job API FurySerializer.deserialize deserialization

A vulnerability was determined in aizuda snail-job up to 1.7.0 on macOS. Affected by this vulnerability is the function FurySerializer.deserialize of the component API. This manipulation of the argument argsStr causes deserialization. Remote exploitation of the attack is possible. The exploit has been publicly disclosed and may be utilized.

Action-Not Available
Vendor-aizuda
Product-snail-job
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-502
Deserialization of Untrusted Data
CVE-2025-15358
Assigner-Delta Electronics, Inc.
ShareView Details
Assigner-Delta Electronics, Inc.
CVSS Score-7.5||HIGH
EPSS-0.11% / 29.62%
||
7 Day CHG~0.00%
Published-30 Dec, 2025 | 09:04
Updated-06 Jan, 2026 | 21:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
DVP-12SE11T - Denial of Service Vulnerability

DVP-12SE11T - Denial of Service Vulnerability

Action-Not Available
Vendor-Delta Electronics, Inc.
Product-dvp-12se11tdvp-12se11t_firmwareDVP-12SE11T
CWE ID-CWE-20
Improper Input Validation
CVE-2025-15241
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-5.1||MEDIUM
EPSS-0.03% / 10.25%
||
7 Day CHG~0.00%
Published-30 Dec, 2025 | 09:02
Updated-31 Dec, 2025 | 20:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CloudPanel Community Edition HTTP Header users redirect

A security vulnerability has been detected in CloudPanel Community Edition up to 2.5.1. The affected element is an unknown function of the file /admin/users of the component HTTP Header Handler. Such manipulation of the argument Referer leads to open redirect. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used. Upgrading to version 2.5.2 is sufficient to fix this issue. Upgrading the affected component is recommended.

Action-Not Available
Vendor-CloudPanel
Product-Community Edition
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2025-15222
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-2.3||LOW
EPSS-0.05% / 16.13%
||
7 Day CHG~0.00%
Published-30 Dec, 2025 | 05:32
Updated-31 Dec, 2025 | 20:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Dromara Sa-Token SaSerializerTemplateForJdkUseBase64.java ObjectInputStream.readObject deserialization

A vulnerability has been found in Dromara Sa-Token up to 1.44.0. This issue affects the function ObjectInputStream.readObject of the file SaSerializerTemplateForJdkUseBase64.java. Such manipulation leads to deserialization. The attack can be executed remotely. This attack is characterized by high complexity. The exploitability is assessed as difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-Dromara
Product-Sa-Token
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-502
Deserialization of Untrusted Data
CVE-2025-69235
Assigner-Naver Corporation
ShareView Details
Assigner-Naver Corporation
CVSS Score-7.5||HIGH
EPSS-0.02% / 5.51%
||
7 Day CHG~0.00%
Published-30 Dec, 2025 | 01:22
Updated-13 Jan, 2026 | 21:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Whale browser before 4.35.351.12 allows an attacker to bypass the Same-Origin Policy in a sidebar environment.

Action-Not Available
Vendor-navercorpNAVER
Product-whaleNAVER Whale browser
CWE ID-CWE-346
Origin Validation Error
CVE-2025-15213
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-5.3||MEDIUM
EPSS-0.03% / 8.67%
||
7 Day CHG~0.00%
Published-30 Dec, 2025 | 01:02
Updated-07 Jan, 2026 | 14:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
code-projects Student File Management System File Download download.php improper authorization

A vulnerability has been found in code-projects Student File Management System 1.0. The affected element is an unknown function of the file /download.php of the component File Download Handler. The manipulation of the argument store_id leads to improper authorization. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used.

Action-Not Available
Vendor-Source Code & ProjectsFabian Ros
Product-student_file_management_systemStudent File Management System
CWE ID-CWE-266
Incorrect Privilege Assignment
CWE ID-CWE-285
Improper Authorization
CVE-2025-15284
Assigner-7ffcee3d-2c14-4c3e-b844-86c6a321a158
ShareView Details
Assigner-7ffcee3d-2c14-4c3e-b844-86c6a321a158
CVSS Score-6.3||MEDIUM
EPSS-0.08% / 24.64%
||
7 Day CHG~0.00%
Published-29 Dec, 2025 | 22:56
Updated-10 Feb, 2026 | 20:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
arrayLimit bypass in bracket notation allows DoS via memory exhaustion

Improper Input Validation vulnerability in qs (parse modules) allows HTTP DoS.This issue affects qs: < 6.14.1. Summary The arrayLimit option in qs did not enforce limits for bracket notation (a[]=1&a[]=2), only for indexed notation (a[0]=1). This is a consistency bug; arrayLimit should apply uniformly across all array notations. Note: The default parameterLimit of 1000 effectively mitigates the DoS scenario originally described. With default options, bracket notation cannot produce arrays larger than parameterLimit regardless of arrayLimit, because each a[]=valueconsumes one parameter slot. The severity has been reduced accordingly. Details The arrayLimit option only checked limits for indexed notation (a[0]=1&a[1]=2) but did not enforce it for bracket notation (a[]=1&a[]=2). Vulnerable code (lib/parse.js:159-162): if (root === '[]' && options.parseArrays) { obj = utils.combine([], leaf); // No arrayLimit check } Working code (lib/parse.js:175): else if (index <= options.arrayLimit) { // Limit checked here obj = []; obj[index] = leaf; } The bracket notation handler at line 159 uses utils.combine([], leaf) without validating against options.arrayLimit, while indexed notation at line 175 checks index <= options.arrayLimit before creating arrays. PoC const qs = require('qs'); const result = qs.parse('a[]=1&a[]=2&a[]=3&a[]=4&a[]=5&a[]=6', { arrayLimit: 5 }); console.log(result.a.length); // Output: 6 (should be max 5) Note on parameterLimit interaction: The original advisory's "DoS demonstration" claimed a length of 10,000, but parameterLimit (default: 1000) caps parsing to 1,000 parameters. With default options, the actual output is 1,000, not 10,000. Impact Consistency bug in arrayLimit enforcement. With default parameterLimit, the practical DoS risk is negligible since parameterLimit already caps the total number of parsed parameters (and thus array elements from bracket notation). The risk increases only when parameterLimit is explicitly set to a very high value.

Action-Not Available
Vendor-
Product-
CWE ID-CWE-20
Improper Input Validation
CVE-2025-69205
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-6.3||MEDIUM
EPSS-0.03% / 9.67%
||
7 Day CHG~0.00%
Published-29 Dec, 2025 | 20:52
Updated-31 Dec, 2025 | 20:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
In µURU, a Specially Crafted Federation Name Allows Dialplan Injection

Micro Registration Utility (µURU) is a telephone self registration utility based on asterisk. In versions up to and including commit 88db9a953f38a3026bcd6816d51c7f3b93c55893, an attacker can crafts a special federation name and characters treated special by asterisk can be injected into the `Dial( )` application due to improper input validation. This allows an attacker to redirect calls on both of the federating instances. If the attack succeeds, the impact is very high. However, the requires that an admin accept the federation requests. As of time of publication, a known patched version of µURU is not available.

Action-Not Available
Vendor-olell
Product-uURU
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
CVE-2025-55060
Assigner-Israel National Cyber Directorate (INCD)
ShareView Details
Assigner-Israel National Cyber Directorate (INCD)
CVSS Score-6.1||MEDIUM
EPSS-0.03% / 9.04%
||
7 Day CHG~0.00%
Published-29 Dec, 2025 | 17:11
Updated-31 Dec, 2025 | 20:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Priority - CWE-601: URL Redirection to Untrusted Site ('Open Redirect')

CWE-601 URL Redirection to Untrusted Site ('Open Redirect')

Action-Not Available
Vendor-Priority
Product-Web
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2025-66864
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.04% / 12.86%
||
7 Day CHG~0.00%
Published-29 Dec, 2025 | 00:00
Updated-14 Jan, 2026 | 19:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in function d_print_comp_inner in file cp-demangle.c in BinUtils 2.26 allows attackers to cause a denial of service via crafted PE file.

Action-Not Available
Vendor-n/aGNU
Product-binutilsn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2025-66866
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.04% / 12.86%
||
7 Day CHG~0.00%
Published-29 Dec, 2025 | 00:00
Updated-14 Jan, 2026 | 19:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in function d_abi_tags in file cp-demangle.c in BinUtils 2.26 allows attackers to cause a denial of service via crafted PE file.

Action-Not Available
Vendor-n/aGNU
Product-binutilsn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2025-15126
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-2.3||LOW
EPSS-0.03% / 9.11%
||
7 Day CHG~0.00%
Published-28 Dec, 2025 | 07:32
Updated-30 Dec, 2025 | 19:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
JeecgBoot getPositionUserList improper authorization

A weakness has been identified in JeecgBoot up to 3.9.0. Affected by this vulnerability is the function getPositionUserList of the file /sys/position/getPositionUserList. This manipulation of the argument positionId causes improper authorization. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-jeecgn/a
Product-jeecg_bootJeecgBoot
CWE ID-CWE-266
Incorrect Privilege Assignment
CWE ID-CWE-285
Improper Authorization
CWE ID-CWE-863
Incorrect Authorization
CVE-2025-15125
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-2.3||LOW
EPSS-0.03% / 8.53%
||
7 Day CHG~0.00%
Published-28 Dec, 2025 | 07:02
Updated-30 Dec, 2025 | 19:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
JeecgBoot queryDepartPermission improper authorization

A security flaw has been discovered in JeecgBoot up to 3.9.0. Affected is the function queryDepartPermission of the file /sys/permission/queryDepartPermission. The manipulation of the argument departId results in improper authorization. The attack can be launched remotely. This attack is characterized by high complexity. The exploitability is told to be difficult. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-jeecgn/a
Product-jeecg_bootJeecgBoot
CWE ID-CWE-266
Incorrect Privilege Assignment
CWE ID-CWE-285
Improper Authorization
CWE ID-CWE-863
Incorrect Authorization
CVE-2025-15124
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-2.3||LOW
EPSS-0.03% / 8.53%
||
7 Day CHG~0.00%
Published-28 Dec, 2025 | 06:32
Updated-30 Dec, 2025 | 19:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
JeecgBoot list getParameterMap improper authorization

A vulnerability was identified in JeecgBoot up to 3.9.0. This impacts the function getParameterMap of the file /sys/sysDepartPermission/list. The manipulation of the argument departId leads to improper authorization. The attack can be initiated remotely. The attack's complexity is rated as high. The exploitability is said to be difficult. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-jeecgn/a
Product-jeecg_bootJeecgBoot
CWE ID-CWE-266
Incorrect Privilege Assignment
CWE ID-CWE-285
Improper Authorization
CWE ID-CWE-863
Incorrect Authorization
CVE-2025-15123
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-2.3||LOW
EPSS-0.03% / 8.53%
||
7 Day CHG~0.00%
Published-28 Dec, 2025 | 06:02
Updated-30 Dec, 2025 | 19:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
JeecgBoot datarule improper authorization

A vulnerability was determined in JeecgBoot up to 3.9.0. This affects an unknown function of the file /sys/sysDepartPermission/datarule/. Executing manipulation can lead to improper authorization. It is possible to launch the attack remotely. The attack requires a high level of complexity. The exploitability is reported as difficult. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-jeecgn/a
Product-jeecg_bootJeecgBoot
CWE ID-CWE-266
Incorrect Privilege Assignment
CWE ID-CWE-285
Improper Authorization
CWE ID-CWE-863
Incorrect Authorization
CVE-2025-15122
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-2.3||LOW
EPSS-0.03% / 8.53%
||
7 Day CHG~0.00%
Published-28 Dec, 2025 | 05:02
Updated-30 Dec, 2025 | 19:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
JeecgBoot datarule loadDatarule improper authorization

A vulnerability was found in JeecgBoot up to 3.9.0. The impacted element is the function loadDatarule of the file /sys/sysDepartRole/datarule/. Performing manipulation of the argument departId/roleId results in improper authorization. It is possible to initiate the attack remotely. The attack is considered to have high complexity. The exploitability is regarded as difficult. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-jeecgn/a
Product-jeecg_bootJeecgBoot
CWE ID-CWE-266
Incorrect Privilege Assignment
CWE ID-CWE-285
Improper Authorization
CWE ID-CWE-863
Incorrect Authorization
CVE-2025-15120
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-2.3||LOW
EPSS-0.03% / 8.53%
||
7 Day CHG~0.00%
Published-28 Dec, 2025 | 04:02
Updated-30 Dec, 2025 | 19:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
JeecgBoot getDeptRoleList improper authorization

A flaw has been found in JeecgBoot up to 3.9.0. Impacted is the function getDeptRoleList of the file /sys/sysDepartRole/getDeptRoleList. This manipulation of the argument departId causes improper authorization. The attack is possible to be carried out remotely. A high degree of complexity is needed for the attack. The exploitability is considered difficult. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-jeecgn/a
Product-jeecg_bootJeecgBoot
CWE ID-CWE-266
Incorrect Privilege Assignment
CWE ID-CWE-285
Improper Authorization
CWE ID-CWE-863
Incorrect Authorization
CVE-2025-15119
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-2.3||LOW
EPSS-0.03% / 8.53%
||
7 Day CHG~0.00%
Published-28 Dec, 2025 | 03:32
Updated-07 Jan, 2026 | 21:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
JeecgBoot list queryPageList improper authorization

A vulnerability was detected in JeecgBoot up to 3.9.0. This issue affects the function queryPageList of the file /sys/sysDepartRole/list. The manipulation of the argument deptId results in improper authorization. The attack can be executed remotely. A high complexity level is associated with this attack. The exploitability is assessed as difficult. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-jeecgn/a
Product-jeecg_bootJeecgBoot
CWE ID-CWE-266
Incorrect Privilege Assignment
CWE ID-CWE-285
Improper Authorization
CWE ID-CWE-863
Incorrect Authorization
CVE-2025-15118
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-5.3||MEDIUM
EPSS-0.04% / 12.06%
||
7 Day CHG~0.00%
Published-28 Dec, 2025 | 03:02
Updated-07 Jan, 2026 | 20:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
macrozheng mall Member Endpoint update improper authorization

A security vulnerability has been detected in macrozheng mall up to 1.0.3. This vulnerability affects unknown code of the file /member/address/update/ of the component Member Endpoint. The manipulation leads to improper authorization. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used.

Action-Not Available
Vendor-macrozhengmacrozheng
Product-mallmall
CWE ID-CWE-266
Incorrect Privilege Assignment
CWE ID-CWE-285
Improper Authorization
CVE-2025-15117
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-2.3||LOW
EPSS-0.05% / 16.20%
||
7 Day CHG~0.00%
Published-28 Dec, 2025 | 02:32
Updated-29 Dec, 2025 | 16:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Dromara Sa-Token SaJdkSerializer.java ObjectInputStream.readObject deserialization

A weakness has been identified in Dromara Sa-Token up to 1.44.0. This affects the function ObjectInputStream.readObject of the file SaJdkSerializer.java. Executing manipulation can lead to deserialization. The attack may be launched remotely. This attack is characterized by high complexity. It is indicated that the exploitability is difficult. The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-Dromara
Product-Sa-Token
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-502
Deserialization of Untrusted Data
CVE-2025-15106
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-5.3||MEDIUM
EPSS-0.15% / 35.93%
||
7 Day CHG~0.00%
Published-27 Dec, 2025 | 10:32
Updated-31 Dec, 2025 | 19:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
getmaxun Authentication Endpoint auth.ts router.get improper authorization

A weakness has been identified in getmaxun maxun up to 0.0.28. The affected element is the function router.get of the file server/src/routes/auth.ts of the component Authentication Endpoint. Executing manipulation can lead to improper authorization. The attack can be executed remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-maxungetmaxun
Product-maxunmaxun
CWE ID-CWE-266
Incorrect Privilege Assignment
CWE ID-CWE-285
Improper Authorization
CWE ID-CWE-639
Authorization Bypass Through User-Controlled Key
CVE-2025-8075
Assigner-Hanwha Vision Co., Ltd.
ShareView Details
Assigner-Hanwha Vision Co., Ltd.
CVSS Score-5.8||MEDIUM
EPSS-0.02% / 4.10%
||
7 Day CHG-0.03%
Published-26 Dec, 2025 | 04:31
Updated-07 Jan, 2026 | 18:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Input Validation

Cybersecurity Nozomi Networks Labs, a specialized security company focused on Industrial Control Systems (ICS) and OT/IoT security, has discovered that validation of incoming XML format request messages is inadequate. This vulnerability could allow an attacker to XSS on the user's browser. The manufacturer has released patch firmware for the flaw, please refer to the manufacturer's report for details and workarounds.

Action-Not Available
Vendor-hanwhavisionHanwha Vision Co., Ltd.
Product-xno-6120qnv-c8011r_firmwarexnd-8081rv_firmwarexnp-8250rxnv-6080rw_firmwarexnp-c9303rwxnd-8040r_firmwarepnm-9084rqz1_firmwaretnv-c8014rmxnd-9083rv_pnm-9000vq_firmwarexnf-8010rwpnm-9084qz_firmwarexnv-c9083rpnm-9084rqz_firmwareknp-2120hnqnv-c8083r_firmwareqne-c9013rlqnd-c8013r_firmwarexnd-8080rw_firmwarexnf-9010rspnm-7000vdxnp-6321_firmwarexnd-6081revpnm-9084qz1_firmwarexnf-9010rvknp-2550rhaqnp-6320h_firmwarexnv-c7083r_firmwarexno-6080rs_firmwarepnm-9081vqkno-2080rn_firmwareqnf-8010xnz-l6320axnv-6120pnm-9085rqzxnd-6085v_firmwareqnp-6250hxnf-8010rvmnbxnv-c9083r_firmwarexnp-6321h_firmwareqnp-6320r_firmwarexno-c8083rxnd-8080rxnv-6123r_firmwarexnd-9082rv_firmwareqnf-c9010qnp-6320_firmwarexnv-8080rsqnp-6230h_firmwarexno-6083rxnv-8080r_firmwarexnv-8081re_xnp-8300rw_firmwarexnf-9013rv_firmwarexnb-8002_firmwareqnv-c9083r_firmwarexnv-6083rzxnv-8080rsaxnd-l6080vxno-6123r_firmwarexnv-9082rxnv-6081_firmwarexnv-8083rzxnp-6120h_firmwarexnb-9003qnp-6320hxnz-6320apnm-7000vd_firmwarexnv-c6083rxnb-6000_firmwarexnd-8080rv_firmwarexnv-8020rxnb-9002_firmwarexnv-8083rx_xnp-c6403xnp-6371rhqnf-c9010_firmwarexnd-6081rev_firmwareknd-2020rnqnp-6250xnd-6085xnp-6250rhqnv-c6083rxnd-6083rvxnv-9083rzxnb-6005_firmwarexnv-8030r_firmwarexno-8040rxnd-8081revxnz-6320_firmwarexnv-6022rxnp-c6403rwqno-c9083rpnm-9084qz1xnd-l6080rvxnd-6081rfqne-c9013rl_firmwarexnd-l6080rxno-9082rzxnp-c9253r__firmwarexnv-6012xnv-8083rvx_firmwareknp-2320rh_firmwarexnv-6022rmknb-5000nxnp-6371rh_firmwarexnd-c9083rv_firmwarexnp-9300rw_firmwarexno-6120rs_firmwareqnp-6230xnv-c8083r_firmwarexnv-6120_firmwarexnp-c8303rwxnf-8010rpnm-9000vqxnv-6081r_firmwarexnf-9010rvmxnp-6341rh_firmwarexnd-9082rfxnp-9250_firmwarexnv-8083z_firmwarexnd-8081vzknp-2320rhxno-8020rknd-5020rnxno-c7083rkno-5020rn_firmwarexnd-8082rfxnp-6400rqnv-c8083rxnd-8080rvknp-2120hn_firmwarexnb-9002xnd-6081vz_firmwarepnm-9002vq_firmwareqno-c8013r_firmwarexnv-8081z_firmwarexnp-c8253_firmwarexnp-c6403r_pnm-9080vq_firmwarexnb-8003xnv-6083zxnv-8083rz_firmwarexnp-c6403_firmwarexnd-c6083rvxnd-6081vxnp-c9253_firmwarexnv-6012mxnd-6080rv_firmwarexnd-l6080va_firmwarexnv-8020rmnkno-5080rnxnf-9010rvm_firmwarexnv-c6083_firmwarexnv-l6080raxno-9082rz_firmwarexnp-c8253pnm-9085rqz_firmwarexnv-6123rxnp-c8253r__firmwarexnd-6011f_firmwarexnp-6341rhqnp-6230hxnd-6080xnp-c9303rw_firmwaretnv-c8011rw_firmwarexnd-8081rf_firmwarexnd-6081fzxnd-8081fz_firmwarekno-2120rn_firmwarexnd-6081rvxnv-6120rspnm-9320vqpxnv-6083z_firmwarexnd-6081rv_firmwarexnv-9083r_firmwarexnd-c9083rvtnv-c8011rwxnv-8081re__firmwarexnv-6012_firmwarexnv-6080_firmwarexnp-c9253r_xnv-6120rs_firmwarexnd-8030r_firmwarexnv-6011_firmwarexnd-6080v_firmwarexnp-6040h_firmwarexnv-c6083xnv-8040rxnv-8081r_firmwarexnv-6022rm_firmwarexnp-6250rh_firmwarekno-5080rn_firmwarexnd-9083rv__firmwarexnv-c7083rxnd-6085_firmwarexnd-c7083rvxnv-8083rvxpnm-9321vqp_firmwarexno-8020r_firmwarexnd-6010_firmwarexnp-c8303rw_firmwaretnv-c7013rcknd-2010_firmwarexnd-8020fxnd-8040rxnv-l6080a_firmwarexnd-6080rknb-2000_firmwarexnz-l6320_firmwarexnd-8081fzxnf-8010rvw_firmwareknp-2320rha_firmwarexnd-8083rv_knp-2550rha_firmwareqnp-6250h_firmwarexnd-8093rv_xno-8083rxnv-6081z_firmwarexnv-6081xnp-6400pnm-7002vd_firmwareqnp-6250_firmwarexnv-6120rqnv-c8011rxnd-8082rvxnd-l6020rxno-6083r_firmwarexno-6010r_firmwareknb-5000n_firmwareqnp-6230_firmwarexnb-6005xnv-8030rxnv-6085xnd-c6083rv_firmwarexno-8082rxnv-6085_firmwarexnv-6080rxnd-6085vknd-5020rn_firmwarexnd-6080r_firmwareknd-5080rn_firmwarexnv-c6083r_firmwarexnv-8082rxnd-8083rvx_firmwarexnv-9083rz_firmwarexnp-c8253r_qne-c8013rl_firmwarexnv-6120r_firmwareqnf-c9010vxnv-8080rsa_firmwarexnv-6010qnp-6250r_firmwarexnv-6020rxnv-9083rqnd-c8013rxnv-8083r_firmwarexnd-l6080r_firmwarexnv-6083rz_firmwarexno-6020rxnf-8010rvxnv-6081re_firmwarexnd-6020r_firmwarexnp-6040hxnp-9300rwxnv-c8083rxnd-8030rxnp-9250xnp-8250r_firmwarexnp-6320h_firmwarexnp-c7310r_xnd-8080rwxnv-6080rsa_firmwareknd-2010qnv-c6083r_firmwarexnv-6080rwxnv-l6080_firmwareqno-c8083r_firmwarexnp-c9253xnd-6081fz_firmwarexnv-6083rxnz-6320a_firmwarexnd-9082rvxno-8080rwxnb-6003_firmwarexnv-8093r_firmwarexno-8030rqnp-6320rtnv-c7013rc_firmwarexno-8030r_firmwarexnv-8020rmn_firmwarexnd-l6080v_firmwarexno-6123rqnv-c9011r_firmwarexnv-8083rx__firmwarexnd-6081rf_firmwarexnb-8003_firmwaretnb-6030xnd-8093rv__firmwarexnd-c8083rv_firmwareqnv-c8023rxno-8082r_firmwarexnp-6321hxnv-6081zxnd-8083rv__firmwarexnp-c9310r__firmwarexnp-c7310r__firmwarexnp-8250_firmwarexnd-l6080rva_firmwarexnd-l6020r_firmwarexnv-8080rxnd-l6080rvaxnp-6320hs_firmwarexnd-6080vxnf-8010rvmnb_firmwarexnb-6002xnd-k6080nxno-9083r_firmwarekno-2010rn_firmwarexnp-6400rwxnd-c8083rvxnd-8081rvxnp-c9310r_xnv-6081rexnv-l6080knd-5080rnxno-l6080rxnv-8020r_firmwarexnv-6080xnp-6320_firmwarexno-l6120rxno-c6083rxno-c8083r_firmwarexnv-8082r_firmwareqno-c6083rxnp-6120hxnv-6012m_firmwareqnd-c8023rqnv-c9083rxnd-6080rvxnd-6081fxno-8080r_firmwarexno-8040r_firmwarexnf-8010r_firmwarexnv-8081rqno-c8083rxno-8080rxno-6120rxnp-6321tnv-c8014rm_firmwarexnd-6011fqnv-c8013r_firmwarekno-5020rnqnv-c8012_firmwarexnv-6011xno-6080rxnv-6011w_firmwarexno-l6080ra_firmwarekno-2010rnxnp-6400_firmwarekno-2120rnpnm-9000vd_firmwarexnp-6550rh_firmwarexnd-8081vz_firmwarexnd-k6080n_firmwareqnv-c9011rxnp-6320hsxnd-6081vzqnd-c8023r_firmwarexnd-6010xnv-6083r_firmwareknp-2320rhaxnv-8081zxnp-6320htnb-6030_firmwarexno-6080rsxnb-8000_firmwarexno-6120_firmwarexnd-6081v_firmwareknd-2080rnxnd-6020rxnf-9010rs_firmwareqno-c8013rxno-9083rxnv-8020rmpxno-6120rsxnv-l6080ra_firmwaretnv-7010rcxnd-l6080vaxnv-6080rs_firmwaretnv-7010rc_firmwarexnb-6000qne-c8013rlqno-c8023rxnv-8080rwxno-c6083r_firmwarexnv-8080rw_firmwarexno-6080r_firmwarexnf-8010rvmxnp-c6403r__firmwarexnd-6080rwxnv-6080r_firmwarepnm-9084qzxnv-8040r_firmwarexnz-l6320a_firmwarepnm-9320vqp_firmwareknd-2020rn_firmwarexnv-6022r_firmwarexnp-6550rhqnv-c8023r_firmwarepnm-9081vq_firmwarexnv-8080rs_firmwarepnm-9084rqzxnv-8083zxno-6085rxnf-8010rvwxnp-6320rhxno-l6020r_firmwarexnd-8020rxno-c7083r_firmwarexnp-c6403rw_firmwarexnp-9250r_firmwarexno-6085r_firmwarexnz-l6320xnp-9250rxnv-6080rsaqnf-c9010v_firmwarexnd-c7083rv_firmwarepnm-9084rqz1xnp-6320rh_firmwarexnv-8020rmp_firmwarepnm-9085rqz1_firmwarekno-2080rnxnv-6011wxnv-9082r_firmwarexno-l6120r_firmwarexnd-8081rfxnz-6320knd-2080rn_firmwareqnp-6320xnb-6001xnd-6081f_firmwarexnv-6010_firmwarexnp-8250knb-2000xnd-8081rev_firmwarexnd-8082rf_firmwarexno-l6080r_firmwarexnv-l6080rxnd-8082rv_firmwarexnv-6013m_firmwarexno-c9083r_firmwareqnp-6250rxno-l6080raxno-c9083rxnb-6001_firmwarexnd-8020r_firmwarexnf-9013rvxnv-6020r_firmwarexnd-l6080rv_firmwareqno-c8023r_firmwarexnb-8002xnd-8020f_firmwarexnp-6320xnv-l6080r_firmwarexnv-8093rpnm-9002vqpnm-9322vqp_firmwarexnb-6002_firmwarexnb-9003_firmwaretnv-c8034rmxno-6020r_firmwareqnv-c8013rxnd-6083rv_firmwarepnm-9322vqpxnv-8083rxnd-6080_firmwarepnm-9321vqpxnp-6400rw_firmwarexno-l6020rxno-8083r_firmwarepnm-7002vdtnv-c8034rm_firmwarexnd-8080r_firmwarexnf-8010rv_firmwarexnf-8010rw_firmwarexno-6120r_firmwarepnm-9080vqxnv-6013mxnf-9010rv_firmwarexnd-6080rw_firmwarexnp-6400r_firmwarexnf-8010rvm_firmwarexnp-8300rwxnb-6003xnd-8083rvxxnv-6081rxnb-8000xnd-8020rw_firmwareqno-c6083r_firmwarexno-8080rw_firmwarexnd-8020rwxnv-l6080apnm-9085rqz1qno-c9083r_firmwarexnv-6080rsqnf-8010_firmwarepnm-9000vdxnd-9082rf_firmwareqnv-c8012xno-6010rQNV-C8012
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-52600
Assigner-Hanwha Vision Co., Ltd.
ShareView Details
Assigner-Hanwha Vision Co., Ltd.
CVSS Score-5.2||MEDIUM
EPSS-0.04% / 11.65%
||
7 Day CHG-0.07%
Published-26 Dec, 2025 | 04:20
Updated-07 Jan, 2026 | 18:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Input Validation

Cybersecurity Nozomi Networks Labs, a specialized security company focused on Industrial Control Systems (ICS) and OT/IoT security, has discovered a vulnerability in camera video analytics that Improper input validation. This vulnerability could allow an attacker to execute specific commands on the user's host PC.The manufacturer has released patch firmware for the flaw, please refer to the manufacturer's report for details and workarounds.

Action-Not Available
Vendor-hanwhavisionHanwha Vision Co., Ltd.
Product-xno-6120xnp-8250rqnv-c8011r_firmwarexnd-8081rv_firmwarexnv-6080rw_firmwarexnp-c9303rwxnd-8040r_firmwarepnm-9084rqz1_firmwarexnd-9083rv_tnv-c8014rmpnm-9000vq_firmwarexnf-8010rwpnm-9084qz_firmwarexnv-c9083rpnm-9084rqz_firmwareknp-2120hnqnv-c8083r_firmwareqne-c9013rlqnd-c8013r_firmwarepnm-7000vdxnf-9010rsxnd-6081revxnd-8080rw_firmwarexnp-6321_firmwarepnm-9084qz1_firmwarexnf-9010rvknp-2550rhaxnv-c7083r_firmwarexno-6080rs_firmwareqnp-6320h_firmwarepnm-9081vqkno-2080rn_firmwareqnf-8010xnz-l6320axnv-6120pnm-9085rqzxnd-6085v_firmwareqnp-6250hxnf-8010rvmnbxnv-c9083r_firmwarexnp-6321h_firmwareqnp-6320r_firmwarexno-c8083rxnd-8080rxnv-6123r_firmwarexnd-9082rv_firmwareqnf-c9010xnv-8080rsqnp-6320_firmwareqnp-6230h_firmwarexno-6083rxnv-8081re_xnv-8080r_firmwarexnp-8300rw_firmwarexnf-9013rv_firmwarexnb-8002_firmwarexnv-6083rzqnv-c9083r_firmwarexnv-8080rsaxnd-l6080vxno-6123r_firmwarexnv-9082rxnv-6081_firmwarexnv-8083rzxnp-6120h_firmwarexnb-9003qnp-6320hxnz-6320apnm-7000vd_firmwarexnv-c6083rxnb-6000_firmwarexnd-8080rv_firmwarexnv-8020rxnb-9002_firmwarexnv-8083rx_xnp-c6403xnp-6371rhqnf-c9010_firmwarexnd-6081rev_firmwareknd-2020rnqnp-6250xnd-6085xnp-6250rhqnv-c6083rxnd-6083rvxnv-9083rzxnb-6005_firmwarexnv-8030r_firmwarexno-8040rxnd-8081revxnz-6320_firmwarexnv-6022rxnp-c6403rwqno-c9083rpnm-9084qz1xnd-l6080rvxnd-6081rfqne-c9013rl_firmwarexnd-l6080rxno-9082rzxnp-c9253r__firmwarexnv-6012xnv-8083rvx_firmwarexnv-6022rmknp-2320rh_firmwareknb-5000nxnp-6371rh_firmwarexnd-c9083rv_firmwarexnp-9300rw_firmwarexno-6120rs_firmwareqnp-6230xnv-c8083r_firmwarexnv-6120_firmwarexnp-c8303rwxnf-8010rpnm-9000vqxnv-6081r_firmwarexnf-9010rvmxnp-6341rh_firmwarexnd-9082rfxnp-9250_firmwarexnv-8083z_firmwarexnd-8081vzknp-2320rhxno-8020rknd-5020rnxno-c7083rkno-5020rn_firmwarexnd-8082rfxnp-6400rqnv-c8083rxnd-8080rvknp-2120hn_firmwarexnb-9002xnd-6081vz_firmwarepnm-9002vq_firmwareqno-c8013r_firmwarexnv-8081z_firmwarexnp-c8253_firmwarexnp-c6403r_pnm-9080vq_firmwarexnb-8003xnv-6083zxnv-8083rz_firmwarexnp-c6403_firmwarexnd-c6083rvxnp-c9253_firmwarexnd-6081vxnv-6012mxnd-6080rv_firmwarexnv-8020rmnxnd-l6080va_firmwarekno-5080rnxnf-9010rvm_firmwarexnv-c6083_firmwarexnp-c8253xno-9082rz_firmwarexnv-l6080rapnm-9085rqz_firmwarexnv-6123rxnp-c8253r__firmwarexnd-6011f_firmwarexnp-6341rhqnp-6230hxnd-6080xnp-c9303rw_firmwaretnv-c8011rw_firmwarexnd-8081rf_firmwarexnd-6081fzxnd-8081fz_firmwarekno-2120rn_firmwarexnd-6081rvxnv-6120rspnm-9320vqpxnv-6083z_firmwarexnd-6081rv_firmwarexnv-9083r_firmwarexnd-c9083rvtnv-c8011rwxnv-8081re__firmwarexnv-6012_firmwarexnv-6080_firmwarexnp-c9253r_xnv-6120rs_firmwarexnd-8030r_firmwarexnv-6011_firmwarexnd-6080v_firmwarexnp-6040h_firmwarexnv-c6083xnv-8040rxnv-6022rm_firmwarexnv-8081r_firmwarexnp-6250rh_firmwarekno-5080rn_firmwarexnd-9083rv__firmwarexnv-c7083rxnd-6085_firmwarexnd-c7083rvxnv-8083rvxpnm-9321vqp_firmwarexno-8020r_firmwarexnd-6010_firmwarexnp-c8303rw_firmwaretnv-c7013rcknd-2010_firmwarexnd-8020fxnd-8040rxnv-l6080a_firmwarexnd-6080rknb-2000_firmwarexnz-l6320_firmwarexnd-8081fzxnf-8010rvw_firmwareknp-2320rha_firmwarexnd-8083rv_knp-2550rha_firmwarexnd-8093rv_qnp-6250h_firmwarexno-8083rxnv-6081z_firmwarexnv-6081xnp-6400pnm-7002vd_firmwareqnp-6250_firmwarexnv-6120rqnv-c8011rxnd-8082rvxnd-l6020rxno-6083r_firmwarexno-6010r_firmwareknb-5000n_firmwareqnp-6230_firmwarexnb-6005xnv-8030rxnv-6085xnd-c6083rv_firmwarexno-8082rxnv-6085_firmwarexnv-6080rxnd-6085vknd-5020rn_firmwarexnd-6080r_firmwareknd-5080rn_firmwarexnv-c6083r_firmwarexnv-8082rxnd-8083rvx_firmwarexnv-9083rz_firmwarexnp-c8253r_qne-c8013rl_firmwarexnv-6120r_firmwareqnf-c9010vxnv-8080rsa_firmwarexnv-6010qnp-6250r_firmwarexnv-6020rxnv-9083rqnd-c8013rxnv-8083r_firmwarexnd-l6080r_firmwarexnv-6083rz_firmwarexno-6020rxnf-8010rvxnv-6081re_firmwarexnd-6020r_firmwarexnp-6040hxnp-9300rwxnv-c8083rxnp-9250xnd-8030rxnp-8250r_firmwarexnp-6320h_firmwarexnp-c7310r_xnv-6080rsa_firmwarexnd-8080rwknd-2010qnv-c6083r_firmwarexnv-6080rwxnv-l6080_firmwareqno-c8083r_firmwarexnp-c9253xnd-6081fz_firmwarexnv-6083rxnz-6320a_firmwarexnd-9082rvxno-8080rwxnb-6003_firmwarexnv-8093r_firmwarexno-8030rqnp-6320rtnv-c7013rc_firmwarexno-8030r_firmwarexnv-8020rmn_firmwarexnd-l6080v_firmwarexno-6123rqnv-c9011r_firmwarexnv-8083rx__firmwarexnd-6081rf_firmwarexnb-8003_firmwaretnb-6030xnd-8093rv__firmwarexnd-c8083rv_firmwareqnv-c8023rxno-8082r_firmwarexnp-6321hxnv-6081zxnd-8083rv__firmwarexnp-c9310r__firmwarexnp-c7310r__firmwarexnp-8250_firmwarexnd-l6080rva_firmwarexnd-l6020r_firmwarexnv-8080rxnd-l6080rvaxnp-6320hs_firmwarexnd-6080vxnf-8010rvmnb_firmwarexnb-6002xnd-k6080nxno-9083r_firmwarexnp-6400rwkno-2010rn_firmwarexnd-c8083rvxnd-8081rvxnp-c9310r_xnv-6081rexnv-l6080knd-5080rnxno-l6080rxnv-8020r_firmwarexnv-6080xnp-6320_firmwarexno-l6120rxno-c6083rxno-c8083r_firmwarexnv-8082r_firmwareqno-c6083rxnv-6012m_firmwarexnp-6120hqnd-c8023rqnv-c9083rxnd-6080rvxnd-6081fxno-8080r_firmwarexno-8040r_firmwarexnf-8010r_firmwarexnv-8081rqno-c8083rxno-8080rxno-6120rxnp-6321tnv-c8014rm_firmwarexnd-6011fqnv-c8013r_firmwarekno-5020rnqnv-c8012_firmwarexno-6080rxnv-6011xnv-6011w_firmwarexno-l6080ra_firmwarekno-2010rnxnp-6400_firmwarekno-2120rnpnm-9000vd_firmwarexnp-6550rh_firmwarexnd-8081vz_firmwarexnd-k6080n_firmwareqnv-c9011rxnp-6320hsxnd-6081vzqnd-c8023r_firmwarexnd-6010xnv-6083r_firmwareknp-2320rhaxnv-8081ztnb-6030_firmwarexnp-6320hxno-6080rsxnb-8000_firmwarexno-6120_firmwarexnd-6020rknd-2080rnxnd-6081v_firmwarexnf-9010rs_firmwareqno-c8013rxno-9083rxnv-8020rmpxno-6120rsxnv-l6080ra_firmwaretnv-7010rcxnd-l6080vaxnv-6080rs_firmwaretnv-7010rc_firmwarexnb-6000qne-c8013rlqno-c8023rxnv-8080rwxno-c6083r_firmwarexnv-8080rw_firmwarexno-6080r_firmwarexnf-8010rvmxnp-c6403r__firmwarexnd-6080rwxnv-6080r_firmwarepnm-9084qzxnv-8040r_firmwarexnz-l6320a_firmwarepnm-9320vqp_firmwareknd-2020rn_firmwarexnv-6022r_firmwarexnp-6550rhqnv-c8023r_firmwarepnm-9081vq_firmwarepnm-9084rqzxnv-8080rs_firmwarexnv-8083zxno-6085rxnf-8010rvwxnp-6320rhxno-l6020r_firmwarexnd-8020rxno-c7083r_firmwarexnp-c6403rw_firmwarexnp-9250r_firmwarexno-6085r_firmwarexnp-9250rxnz-l6320xnv-6080rsaqnf-c9010v_firmwarexnd-c7083rv_firmwarepnm-9084rqz1xnp-6320rh_firmwarexnv-8020rmp_firmwarepnm-9085rqz1_firmwarekno-2080rnxnv-6011wxnv-9082r_firmwarexno-l6120r_firmwarexnd-8081rfxnz-6320knd-2080rn_firmwareqnp-6320xnb-6001xnd-6081f_firmwarexnv-6010_firmwarexnp-8250knb-2000xnd-8081rev_firmwarexnd-8082rf_firmwarexno-l6080r_firmwarexnv-l6080rxnd-8082rv_firmwarexnv-6013m_firmwarexno-c9083r_firmwareqnp-6250rxno-l6080raxno-c9083rxnb-6001_firmwarexnv-6020r_firmwarexnf-9013rvxnd-8020r_firmwarexnd-l6080rv_firmwareqno-c8023r_firmwarexnb-8002xnd-8020f_firmwarexnp-6320xnv-l6080r_firmwarexnv-8093rpnm-9002vqxnb-6002_firmwarepnm-9322vqp_firmwarexnb-9003_firmwaretnv-c8034rmxno-6020r_firmwareqnv-c8013rxnd-6083rv_firmwarexnv-8083rpnm-9322vqpxnd-6080_firmwarepnm-9321vqpxnp-6400rw_firmwarexno-l6020rxno-8083r_firmwarepnm-7002vdtnv-c8034rm_firmwarexnd-8080r_firmwarexnf-8010rv_firmwarexnf-8010rw_firmwarexno-6120r_firmwarepnm-9080vqxnv-6013mxnf-9010rv_firmwarexnd-6080rw_firmwarexnp-6400r_firmwarexnp-8300rwxnf-8010rvm_firmwarexnb-6003xnd-8083rvxxnv-6081rxnb-8000xnd-8020rw_firmwareqno-c6083r_firmwarexno-8080rw_firmwarexnd-8020rwxnv-l6080apnm-9085rqz1qno-c9083r_firmwarexnv-6080rsqnf-8010_firmwarepnm-9000vdxnd-9082rf_firmwareqnv-c8012xno-6010rQNV-C8012
CWE ID-CWE-20
Improper Input Validation
CVE-2025-52598
Assigner-Hanwha Vision Co., Ltd.
ShareView Details
Assigner-Hanwha Vision Co., Ltd.
CVSS Score-6.3||MEDIUM
EPSS-0.01% / 1.90%
||
7 Day CHG-0.02%
Published-26 Dec, 2025 | 04:07
Updated-16 Jan, 2026 | 17:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Insufficient certificate validation

Cybersecurity Nozomi Networks Labs, a specialized security company focused on Industrial Control Systems (ICS) and OT/IoT security, has found a flaw that camera's client service does not perform certificate validation. The manufacturer has released patch firmware for the flaw, please refer to the manufacturer's report for details and workarounds.

Action-Not Available
Vendor-hanwhavisionHanwha Vision Co., Ltd.
Product-pnm-9080vqxnv-8030rxnv-c6083_firmwarepnm-9321vqp_firmwarepnm-9084qzkno-5080rn_firmwarexnd-8081rfxnv-6083z_firmwarexnv-6080rspnm-9084qz1_firmwarexnd-6020r_firmwarepnm-9085rqz1_firmwarexnd-8083rvxxno-9082rzxnd-8080rv_firmwarexnd-6081f_firmwareknb-5000nxnd-8081vzxnv-8083rz_firmwarexnv-6120rxnd-9083rv_firmwareqnp-6250r_firmwaretnb-6030xnb-6002xno-9082rz_firmwarexnd-8080r_firmwarexnf-8010rvxnf-8010rvm_firmwarexnv-c8083rxnz-6320_firmwarexnv-6120rsxnv-8080rsxnd-6081v_firmwarexnd-8093rv_firmwarexnd-8030rxnv-l6080_firmwarexnv-l6080aqnv-c8011rxnz-l6320_firmwareqnf-c9010vxnd-8081rv_firmwareknp-2320rh_firmwarexno-6080rxnp-6341rh_firmwarexnd-8080rwxno-6080rs_firmwarexnp-6371rh_firmwarexnp-8250rxnd-l6080rvxnv-6022rm_firmwarexnd-6010tnv-c7013rc_firmwareqno-c8023r_firmwarexnp-6371rhxnp-6040h_firmwarexnp-c7310rxnd-6080rxno-6080r_firmwarexnd-8081rf_firmwarexnd-8081fzxnv-8080rxnv-8030r_firmwarexnd-8020fpnm-9000vqxnf-8010rvmxnv-8081z_firmwarexno-l6120r_firmwarexnd-8040r_firmwarexnd-8080rvxnp-6320hsxnv-8083rpnm-9322vqpxnv-8080rwxnf-9010rvm_firmwareqnp-6250_firmwarexnv-l6080raxnv-8081zqnv-c8012xnv-6013m_firmwarexnd-8020f_firmwarexnd-6081revxnp-6550rh_firmwarexnd-c6083rv_firmwarexnd-6080rv_firmwarexnv-6081rxno-c6083r_firmwarepnm-9000vd_firmwarexnd-c6083rvxno-8080rw_firmwarexnd-6085_firmwarexnd-6081vqnv-c8011r_firmwaretnb-6030_firmwarexnp-6320rh_firmwarepnm-9000vdxnv-6012_firmwarexnd-6081fz_firmwarexnp-9300rw_firmwarexnf-9010rvxnf-8010rxnd-6080v_firmwarexnf-8010rvmnb_firmwarexnv-6083ztnv-c8011rw_firmwareqnp-6320_firmwarexnv-6120rs_firmwarexno-8030rxnp-6400xnp-6321hxnb-6000xnd-8083rv_firmwarexnd-l6080rvaxnz-6320xnd-9082rfqnv-c8023rxno-l6120rxnd-6011f_firmwarexnd-k6080n_firmwarexnd-6080vxnd-6081rev_firmwarexno-c9083rpnm-9000vq_firmwarexnv-9083r_firmwarexnp-9250_firmwarexnv-6013mxnd-6020rxnv-8020rmn_firmwarexnv-6010_firmwarexnp-c8253rqnf-c9010_firmwarexnv-8083r_firmwarexnv-9083rzxnv-8080rw_firmwarepnm-9084rqz_firmwarepnm-7000vd_firmwarepnm-9084rqz1xnd-8020r_firmwarexnv-8081rekno-2120rnxnv-8083zpnm-9002vq_firmwarexnp-8300rwxnv-6080rxnv-l6080a_firmwarepnm-7002vd_firmwarepnm-9084qz1pnm-7000vdxno-6123rxnd-9083rvxnd-8082rfxnd-6081fzpnm-9084rqzxnp-c6403rxnv-l6080rxnb-6003_firmwareqnp-6320rxnp-9300rwxnp-6040hqnv-c6083rxno-8030r_firmwarexnd-6083rv_firmwarepnm-9080vq_firmwareqnv-c8083r_firmwareqnp-6320r_firmwarexno-6120r_firmwarexnd-8030r_firmwarexnv-6010xnp-6321xnv-c9083rxno-6083rtnv-c8034rm_firmwarexnp-6320rhqnv-c9011r_firmwareknd-2020rnxnb-8003_firmwareqno-c6083r_firmwarexnv-c7083r_firmwarexnd-6080knp-2550rha_firmwarepnm-9320vqpxno-8020rknp-2550rhaxnv-6085_firmwarexnv-6080rs_firmwarexnv-6080rwxno-6120rsxnv-6080rsa_firmwarexnd-c9083rv_firmwarexnp-c6403rwxnb-8002knd-5020rn_firmwarexnv-8083rvx_firmwarexnd-6081rvxno-c8083r_firmwarexnd-6080rwxnv-8080rsaxnv-9082r_firmwarexnp-6400rw_firmwarexno-6120_firmwarexno-l6080raxno-l6080rpnm-9085rqz1xnv-6080rw_firmwarexnv-8020rxno-6010rpnm-9002vqxnp-c8253r_firmwarexno-c7083rxnv-8020rmpxno-9083r_firmwarexnv-8081rknd-2080rn_firmwareknp-2120hnqnv-c8083rpnm-9320vqp_firmwarexno-8080r_firmwarexno-6123r_firmwaretnv-7010rc_firmwarexnf-8010rwxnv-6123r_firmwarexnd-8082rv_firmwareknd-5080rn_firmwarexnb-6003xnd-c8083rvxnv-l6080r_firmwarexno-c7083r_firmwareknp-2320rha_firmwarexnp-6550rhxnv-8082rxno-c9083r_firmwareqnp-6320h_firmwarexnf-9010rsxnp-6400rxnp-6320hxnd-8082rf_firmwarexnv-l6080xnp-c9253pnm-9322vqp_firmwaretnv-c7013rcxnd-8083rvxnd-9082rv_firmwarexnd-6081rf_firmwarexnv-6081xnv-8083rx_firmwarexnd-l6080vaxnp-8250r_firmwarexnd-l6080rv_firmwarexno-8083r_firmwarexnf-9013rv_firmwarexnd-6081rfxnv-6085xnz-6320a_firmwarexnb-9002_firmwarexnb-8003xnd-8040rxnf-8010rv_firmwarexnp-8300rw_firmwareqno-c8083rknd-2010_firmwareqnv-c6083r_firmwarekno-5020rn_firmwarexnp-6400r_firmwarexnd-6081vzqnd-c8013rxnv-6011xnd-c7083rv_firmwareqnp-6230qnf-8010_firmwarexnp-c8303rw_firmwarekno-2080rn_firmwarepnm-9321vqpxno-8082rxnv-8083rxqne-c9013rl_firmwarexnd-l6020rxnd-c9083rvqnp-6320hxnv-6022rxnv-8080rs_firmwareknb-2000_firmwarexnp-6320hs_firmwareqno-c8013rxnd-8093rvqnv-c8023r_firmwarexno-6080rspnm-9084rqz1_firmwarexnp-c6403_firmwarexnv-6120r_firmwareqnd-c8023rxnp-6120hxnd-c7083rvxnd-k6080nxnp-c9303rwxnv-6081z_firmwareknd-2020rn_firmwarexnd-6085xnb-8000xnb-9003_firmwarexnp-c9303rw_firmwarexnp-c8303rwknd-2080rnxnv-c8083r_firmwareknb-5000n_firmwarexnp-6321_firmwareqnp-6250rxnd-c8083rv_firmwarexnv-6081_firmwarexnp-6250rhxnb-6001qnf-8010knp-2320rhaxno-6120rs_firmwarexnv-8081r_firmwarexno-c8083rxno-6020r_firmwarexnp-6320xno-6010r_firmwareqno-c8023rxnv-c7083rxno-6020rxno-8040rxnb-8000_firmwarexnp-8250xnd-8082rvxnv-8081re_firmwarexnf-8010rvw_firmwarexnb-6002_firmwarexnv-c6083rqnv-c8013rxnd-9082rvxnz-6320axnv-6012m_firmwarexnd-6085v_firmwarexnv-6083rz_firmwarexno-6085r_firmwarexnd-6011fxno-8080rxno-c6083rkno-2080rnxno-l6020r_firmwarexno-l6080r_firmwarexnv-6120xnd-6083rvxnf-8010r_firmwarexnf-8010rvwxnb-9002xnz-l6320axnz-l6320a_firmwarepnm-9085rqz_firmwarexnd-8081vz_firmwarexnp-9250rknb-2000tnv-c8014rmxnv-6022r_firmwareqno-c8013r_firmwaretnv-c8011rwxnf-8010rvmnbxnf-9013rvxnp-c9253_firmwareqnp-6250hxnp-6320h_firmwaretnv-c8034rmxnv-6083rxnv-6120_firmwarexnb-9003xnd-6081rv_firmwarexnd-8020rw_firmwareqnv-c9083r_firmwarexnv-6081zxnd-6080rw_firmwarekno-5020rnxnv-6123rtnv-c8014rm_firmwarexnv-6011wxnb-6005_firmwarexnz-l6320xnp-c8253xnd-6080r_firmwareknd-5080rnqnd-c8013r_firmwareqnd-c8023r_firmwarexnv-c9083r_firmwarexnd-6010_firmwarexno-6085rxnv-6083r_firmwarexnv-8083rvxqnp-6230hxnv-c6083qnp-6250xnv-9083rz_firmwarexnv-6081r_firmwarexnv-6011_firmwarekno-2010rnxnv-8082r_firmwareknp-2120hn_firmwarexnb-6001_firmwarexnv-l6080ra_firmwarexno-6083r_firmwarexnp-6120h_firmwarexnd-8020rxnd-8081rvxnd-8081fz_firmwarexnv-6020r_firmwarexno-8082r_firmwarexnp-c8253_firmwarexnd-l6080rva_firmwareqno-c6083rxnd-8020rwqnp-6250h_firmwarexnp-9250qnv-c8013r_firmwarekno-5080rnxnp-c9253rxno-9083rqne-c8013rl_firmwarexnd-6080rvxnv-8083rzknd-5020rnpnm-7002vdxnp-6400rwxno-8020r_firmwarexnv-8093r_firmwarexnv-8020r_firmwarexnf-9010rvmqne-c9013rlxnp-c9310rxnd-l6080rxnp-c6403r_firmwarexnv-6080xnd-8081rev_firmwareqnp-6320xnp-c9253r_firmwareqnv-c8012_firmwarexno-8083rxnd-l6080vxnv-8020rmnxnf-8010rw_firmwarexnp-6320_firmwarexnv-8093rxnv-6080_firmwarexnv-6011w_firmwarexnv-8040r_firmwarexnv-6080rsaxno-l6020rxno-8080rwxnv-6022rmxnd-l6080v_firmwareqnf-c9010v_firmwarepnm-9084qz_firmwareqnv-c9083rxnv-6020rxno-l6080ra_firmwarexnp-6341rhxnv-8080r_firmwarexnv-8080rsa_firmwarepnm-9081vqxnp-c6403rw_firmwarexnp-c7310r_firmwarexnd-8083rvx_firmwarexnp-6400_firmwareqne-c8013rlxno-8040r_firmwarexnd-8081revxnb-6000_firmwarexnb-6005xnv-c6083r_firmwarekno-2120rn_firmwarexnd-8080rxnd-l6020r_firmwarexnp-9250r_firmwareknp-2320rhxnv-8020rmp_firmwarexnd-6081vz_firmwarexnv-8040rxnp-6250rh_firmwareqno-c9083r_firmwaretnv-7010rcxnv-6012xnd-8080rw_firmwarexnv-9083rknd-2010qnf-c9010xnf-9010rv_firmwarexnd-l6080va_firmwarexnv-8083z_firmwarexnv-6080r_firmwarexnp-c6403qnp-6230_firmwarexnd-9082rf_firmwarexnv-9082rpnm-9081vq_firmwarexnp-8250_firmwarexnb-8002_firmwareqno-c9083rqnv-c9011rxnv-6083rzxnp-c9310r_firmwareqno-c8083r_firmwarexnd-6080_firmwareqnp-6230h_firmwarexnf-9010rs_firmwarexnd-6081fxnv-6081rexno-6120xnv-6012mxno-6120rxnp-6321h_firmwarexnd-l6080r_firmwarexnd-6085vxnv-6081re_firmwarepnm-9085rqzkno-2010rn_firmwareQNV-C8012
CWE ID-CWE-295
Improper Certificate Validation
CVE-2025-15087
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-5.3||MEDIUM
EPSS-0.04% / 12.06%
||
7 Day CHG~0.00%
Published-25 Dec, 2025 | 21:02
Updated-31 Dec, 2025 | 20:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
youlaitech youlai-mall OrderController.java submitOrderPayment improper authorization

A security vulnerability has been detected in youlaitech youlai-mall 1.0.0/2.0.0. Affected is the function submitOrderPayment of the file mall-oms/oms-boot/src/main/java/com/youlai/mall/oms/controller/app/OrderController.java. Such manipulation of the argument orderSn leads to improper authorization. The attack may be launched remotely. The exploit has been disclosed publicly and may be used. The real existence of this vulnerability is still doubted at the moment. The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-youlaiyoulaitech
Product-youlai-mallyoulai-mall
CWE ID-CWE-266
Incorrect Privilege Assignment
CWE ID-CWE-285
Improper Authorization
CVE-2025-15085
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-5.3||MEDIUM
EPSS-0.03% / 9.68%
||
7 Day CHG~0.00%
Published-25 Dec, 2025 | 19:32
Updated-31 Dec, 2025 | 20:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
youlaitech youlai-mall Balance MemberController.java deductBalance improper authorization

A security flaw has been discovered in youlaitech youlai-mall 1.0.0/2.0.0. This affects the function deductBalance of the file mall-ums/ums-boot/src/main/java/com/youlai/mall/ums/controller/app/MemberController.java of the component Balance Handler. The manipulation results in improper authorization. The attack can be launched remotely. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-youlaiyoulaitech
Product-youlai-mallyoulai-mall
CWE ID-CWE-266
Incorrect Privilege Assignment
CWE ID-CWE-285
Improper Authorization
CWE ID-CWE-863
Incorrect Authorization
CVE-2025-8769
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-9.3||CRITICAL
EPSS-1.66% / 81.76%
||
7 Day CHG~0.00%
Published-24 Dec, 2025 | 20:14
Updated-29 Dec, 2025 | 15:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
MegaSys Computer Technologies Telenium Online Web Application Improper Input Validation

Telenium Online Web Application is vulnerable due to a Perl script that is called to load the login page. Due to improper input validation, an attacker can inject arbitrary Perl code through a crafted HTTP request, leading to remote code execution on the server.

Action-Not Available
Vendor-MegaSys Computer Technologies
Product-Telenium Online Web Application
CWE ID-CWE-20
Improper Input Validation
CVE-2025-68602
Assigner-Patchstack
ShareView Details
Assigner-Patchstack
CVSS Score-6.1||MEDIUM
EPSS-0.03% / 9.04%
||
7 Day CHG~0.00%
Published-24 Dec, 2025 | 13:10
Updated-20 Jan, 2026 | 15:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress Accept Donations with PayPal plugin <= 1.5.1 - Open Redirection vulnerability

URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Scott Paterson Accept Donations with PayPal easy-paypal-donation allows Phishing.This issue affects Accept Donations with PayPal: from n/a through <= 1.5.1.

Action-Not Available
Vendor-Scott Paterson
Product-Accept Donations with PayPal
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2025-68509
Assigner-Patchstack
ShareView Details
Assigner-Patchstack
CVSS Score-6.1||MEDIUM
EPSS-0.37% / 58.12%
||
7 Day CHG~0.00%
Published-24 Dec, 2025 | 12:31
Updated-20 Jan, 2026 | 15:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress User Submitted Posts plugin <= 20251121 - Open Redirection vulnerability

URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Jeff Starr User Submitted Posts user-submitted-posts allows Phishing.This issue affects User Submitted Posts: from n/a through <= 20251121.

Action-Not Available
Vendor-Jeff Starr
Product-User Submitted Posts
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2025-60935
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.09% / 25.17%
||
7 Day CHG~0.00%
Published-24 Dec, 2025 | 00:00
Updated-15 Jan, 2026 | 02:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An open redirect vulnerability in the login endpoint of Blitz Panel v1.17.0 allows attackers to redirect users to malicious domains via a crafted URL. This issue affects the next_url parameter in the login endpoint and could lead to phishing or token theft after successful authentication.

Action-Not Available
Vendor-returnfin/a
Product-blitzn/a
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2025-68667
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-9.9||CRITICAL
EPSS-0.08% / 24.65%
||
7 Day CHG-0.17%
Published-23 Dec, 2025 | 22:45
Updated-29 Dec, 2025 | 15:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Conduit-derived homeservers are affected by a Confused Deputy and Improper Input Validation issue

Conduit is a chat server powered by Matrix. A vulnerability that affects a number of Conduit-derived homeservers allows a remote, unauthenticated attacker to force the target server to cryptographically sign arbitrary membership events. Affected products include Conduit prior to version 0.10.10, continuwuity prior to version 0.5.0, Grapevine prior to commit `9a50c244`, and tuwunel prior to version 1.4.8. The flaw exists because the server fails to validate the origin of a signing request, provided the event's state_key is a valid user ID belonging to the target server. Attackers can forge "leave" events for any user on the target server. This forcibly removes users (including admins and bots) from rooms. This allows denial of service and/or the removal of technical protections for a room (including policy servers, if all users on the policy server are removed). Attackers can forge "invite" events from a victim user to themselves, provided they have an account on a server where there is an account that has the power level to send invites. This allows the attacker to join private or invite-only rooms accessible by the victim, exposing confidential conversation history and room state. Attackers can forge "ban" events from a victim user to any user below the victim user's power level, provided the victim has the power level to issue bans AND the target of the ban resides on the same server as the victim. This allows the attacker to ban anyone in a room who is on the same server as the vulnerable one, however cannot exploit this to ban users on other servers or the victim themself. Conduit fixes the issue in version 0.10.10. continuwuity fixes the issue in commits `7fa4fa98` and `b2bead67`, released in 0.5.0. tuwunel fixes the issue in commit `dc9314de1f8a6e040c5aa331fe52efbe62e6a2c3`, released in 1.4.8. Grapevine fixes the issue in commit `9a50c2448abba6e2b7d79c64243bb438b351616c`. As a workaround, block access to the `PUT /_matrix/federation/v2/invite/{roomId}/{eventId}` endpoint using your reverse proxy.

Action-Not Available
Vendor-continuwuity
Product-continuwuity
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-441
Unintended Proxy or Intermediary ('Confused Deputy')
CVE-2025-59886
Assigner-Eaton
ShareView Details
Assigner-Eaton
CVSS Score-8.8||HIGH
EPSS-0.09% / 25.12%
||
7 Day CHG+0.01%
Published-23 Dec, 2025 | 11:31
Updated-18 Feb, 2026 | 14:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation at one of the endpoints of Eaton xComfort ECI's web interface, could lead into an attacker with network access to the device executing privileged user commands. As cybersecurity standards continue to evolve and to meet our requirements today, Eaton has decided to discontinue the product. Upon retirement or end of support, there will be no new security updates, non-security updates, or paid assisted support options, or online technical content updates.

Action-Not Available
Vendor-eatonEaton
Product-xcomfort_ethernet_communication_interfaceEaton xComfort ECI
CWE ID-CWE-20
Improper Input Validation
CVE-2025-61740
Assigner-Johnson Controls
ShareView Details
Assigner-Johnson Controls
CVSS Score-7.2||HIGH
EPSS-0.01% / 2.71%
||
7 Day CHG~0.00%
Published-22 Dec, 2025 | 14:32
Updated-23 Dec, 2025 | 14:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Johnson Controls IQ Panels2, 2+, IQHub, IQPanel 4, PowerG Origin Validation Error

Authentication issue that does not verify the source of a packet which could allow an attacker to create a denial-of-service condition or modify the configuration of the device.

Action-Not Available
Vendor-Johnson Controls
Product-IQ Panels2, 2+, IQHub, IQPanel 4, PowerG
CWE ID-CWE-346
Origin Validation Error
CVE-2025-59301
Assigner-Delta Electronics, Inc.
ShareView Details
Assigner-Delta Electronics, Inc.
CVSS Score-4||MEDIUM
EPSS-0.07% / 21.19%
||
7 Day CHG~0.00%
Published-22 Dec, 2025 | 02:56
Updated-08 Jan, 2026 | 13:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Modbus/TCP Dos Vulnerability in DVP15MC11T

Delta Electronics DVP15MC11T lacks proper validation of the modbus/tcp packets and can lead to denial of service.

Action-Not Available
Vendor-Delta Electronics, Inc.
Product-dvp15mc11t_firmwaredvp15mc11tDVP15MC11T
CWE ID-CWE-20
Improper Input Validation
CVE-2025-68481
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-5.9||MEDIUM
EPSS-0.03% / 6.73%
||
7 Day CHG~0.00%
Published-19 Dec, 2025 | 20:14
Updated-23 Dec, 2025 | 14:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
FastAPI Users Vulnerable to 1-click Account Takeover in Apps Using FastAPI SSO

FastAPI Users allows users to quickly add a registration and authentication system to their FastAPI project. Prior to version 15.0.2, the OAuth login state tokens are completely stateless and carry no per-request entropy or any data that could link them to the session that initiated the OAuth flow. `generate_state_token()` is always called with an empty `state_data` dict, so the resulting JWT only contains the fixed audience claim plus an expiration timestamp. On callback, the library merely checks that the JWT verifies under `state_secret` and is unexpired; there is no attempt to match the state value to the browser that initiated the OAuth request, no correlation cookie, and no server-side cache. Any attacker can hit `/authorize`, capture the server-generated state, finish the upstream OAuth flow with their own provider account, and then trick a victim into loading `.../callback?code=<attacker_code>&state=<attacker_state>`. Because the state JWT is valid for any client for \~1 hour, the victim’s browser will complete the flow. This leads to login CSRF. Depending on the app’s logic, the login CSRF can lead to an account takeover of the victim account or to the victim user getting logged in to the attacker's account. Version 15.0.2 contains a patch for the issue.

Action-Not Available
Vendor-fastapi-users
Product-fastapi-users
CWE ID-CWE-285
Improper Authorization
CWE ID-CWE-352
Cross-Site Request Forgery (CSRF)
CVE-2025-1885
Assigner-TR-CERT (Computer Emergency Response Team of the Republic of Türkiye)
ShareView Details
Assigner-TR-CERT (Computer Emergency Response Team of the Republic of Türkiye)
CVSS Score-5.4||MEDIUM
EPSS-0.03% / 10.46%
||
7 Day CHG~0.00%
Published-19 Dec, 2025 | 11:47
Updated-12 Jan, 2026 | 17:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Open Redirect in Restajet's Online Food Delivery System

URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Restajet Information Technologies Inc. Online Food Delivery System allows Phishing, Forceful Browsing.This issue affects Online Food Delivery System: through 19122025.

Action-Not Available
Vendor-restajetRestajet Information Technologies Inc.
Product-online_food_delivery_systemOnline Food Delivery System
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2025-14546
Assigner-Snyk
ShareView Details
Assigner-Snyk
CVSS Score-6.9||MEDIUM
EPSS-0.12% / 31.54%
||
7 Day CHG~0.00%
Published-19 Dec, 2025 | 05:00
Updated-19 Dec, 2025 | 18:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Versions of the package fastapi-sso before 0.19.0 are vulnerable to Cross-site Request Forgery (CSRF) due to the improper validation of the OAuth state parameter during the authentication callback. While the get_login_url method allows for state generation, it does not persist the state or bind it to the user's session. Consequently, the verify_and_process method accepts the state received in the query parameters without verifying it against a trusted local value. This allows a remote attacker to trick a victim into visiting a malicious callback URL, which can result in the attacker's account being linked to the victim's internal account.

Action-Not Available
Vendor-n/a
Product-fastapi-sso
CWE ID-CWE-285
Improper Authorization
CVE-2025-68398
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-9.1||CRITICAL
EPSS-0.28% / 50.78%
||
7 Day CHG~0.00%
Published-18 Dec, 2025 | 23:00
Updated-06 Feb, 2026 | 20:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Weblate has git config file overwrite vulnerability that leads to remote code execution

Weblate is a web based localization tool. In versions prior to 5.15.1, it was possible to overwrite Git configuration remotely and override some of its behavior. Version 5.15.1 fixes the issue.

Action-Not Available
Vendor-weblateWeblateOrg
Product-weblateweblate
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CWE ID-CWE-434
Unrestricted Upload of File with Dangerous Type
CVE-2025-65041
Assigner-Microsoft Corporation
ShareView Details
Assigner-Microsoft Corporation
CVSS Score-10||CRITICAL
EPSS-0.06% / 19.21%
||
7 Day CHG-0.04%
Published-18 Dec, 2025 | 22:02
Updated-20 Feb, 2026 | 15:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Microsoft Partner Center Elevation of Privilege Vulnerability

Improper authorization in Microsoft Partner Center allows an unauthorized attacker to elevate privileges over a network.

Action-Not Available
Vendor-Microsoft Corporation
Product-partner_centerMicrosoft Partner Center
CWE ID-CWE-285
Improper Authorization
CVE-2025-68161
Assigner-Apache Software Foundation
ShareView Details
Assigner-Apache Software Foundation
CVSS Score-6.3||MEDIUM
EPSS-0.28% / 50.67%
||
7 Day CHG~0.00%
Published-18 Dec, 2025 | 20:47
Updated-20 Jan, 2026 | 01:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Apache Log4j Core: Missing TLS hostname verification in Socket appender

The Socket Appender in Apache Log4j Core versions 2.0-beta9 through 2.25.2 does not perform TLS hostname verification of the peer certificate, even when the verifyHostName https://logging.apache.org/log4j/2.x/manual/appenders/network.html#SslConfiguration-attr-verifyHostName configuration attribute or the log4j2.sslVerifyHostName https://logging.apache.org/log4j/2.x/manual/systemproperties.html#log4j2.sslVerifyHostName system property is set to true. This issue may allow a man-in-the-middle attacker to intercept or redirect log traffic under the following conditions: * The attacker is able to intercept or redirect network traffic between the client and the log receiver. * The attacker can present a server certificate issued by a certification authority trusted by the Socket Appender’s configured trust store (or by the default Java trust store if no custom trust store is configured). Users are advised to upgrade to Apache Log4j Core version 2.25.3, which addresses this issue. As an alternative mitigation, the Socket Appender may be configured to use a private or restricted trust root to limit the set of trusted certificates.

Action-Not Available
Vendor-The Apache Software Foundation
Product-log4jApache Log4j Core
CWE ID-CWE-295
Improper Certificate Validation
CWE ID-CWE-297
Improper Validation of Certificate with Host Mismatch
CVE-2025-14889
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-5.3||MEDIUM
EPSS-0.04% / 12.48%
||
7 Day CHG~0.00%
Published-18 Dec, 2025 | 20:02
Updated-24 Dec, 2025 | 14:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Campcodes Advanced Voting Management System Password voters_edit.php improper authorization

A security flaw has been discovered in Campcodes Advanced Voting Management System 1.0. The impacted element is an unknown function of the file /admin/voters_edit.php of the component Password Handler. Performing manipulation of the argument ID results in improper authorization. The attack is possible to be carried out remotely. The exploit has been released to the public and may be exploited.

Action-Not Available
Vendor-CampCodes
Product-advanced_voting_management_systemAdvanced Voting Management System
CWE ID-CWE-266
Incorrect Privilege Assignment
CWE ID-CWE-285
Improper Authorization
CVE-2025-63388
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-9.1||CRITICAL
EPSS-0.01% / 0.52%
||
7 Day CHG-0.01%
Published-18 Dec, 2025 | 00:00
Updated-28 Jan, 2026 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Cross-Origin Resource Sharing (CORS) misconfiguration vulnerability exists in Dify v1.9.1 in the /console/api/system-features endpoint. The endpoint implements an overly permissive CORS policy that reflects arbitrary Origin headers and sets Access-Control-Allow-Credentials: true, allowing any external domain to make authenticated cross-origin requests. NOTE: the Supplier disputes this, providing the rationale of "sending requests with credentials does not provide any additional access compared to unauthenticated requests."

Action-Not Available
Vendor-langgeniusn/a
Product-difyn/a
CWE ID-CWE-346
Origin Validation Error
CVE-2025-63386
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-9.1||CRITICAL
EPSS-0.01% / 0.57%
||
7 Day CHG-0.01%
Published-18 Dec, 2025 | 00:00
Updated-11 Feb, 2026 | 15:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Cross-Origin Resource Sharing (CORS) misconfiguration vulnerability exists in Dify v1.9.1 in the /console/api/setup endpoint. The endpoint implements an insecure CORS policy that reflects any Origin header and enables Access-Control-Allow-Credentials: true, permitting arbitrary external domains to make authenticated requests. NOTE: the Supplier disputes this because the endpoint configuration is intentional to support bootstrap.

Action-Not Available
Vendor-langgeniusn/a
Product-difyn/a
CWE ID-CWE-346
Origin Validation Error
CVE-2025-65561
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.07% / 20.86%
||
7 Day CHG~0.00%
Published-18 Dec, 2025 | 00:00
Updated-07 Jan, 2026 | 21:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in function LocalNode.Sess in free5GC 4.1.0 allowing attackers to cause a denial of service or other unspecified impacts via crafted header Local SEID to the PFCP Session Modification Request.

Action-Not Available
Vendor-free5gcn/a
Product-free5gcn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2025-67163
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.08% / 23.47%
||
7 Day CHG~0.00%
Published-18 Dec, 2025 | 00:00
Updated-31 Dec, 2025 | 19:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A stored cross-site scripting (XSS) vulnerability in Simple Machines Forum v2.1.6 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the Forum Name parameter.

Action-Not Available
Vendor-simplemachinesn/a
Product-simple_machines_forumn/a
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CWE ID-CWE-83
Improper Neutralization of Script in Attributes in a Web Page
  • Previous
  • 1
  • 2
  • ...
  • 6
  • 7
  • 8
  • ...
  • 317
  • 318
  • Next