CVE Alert: CVE-2025-6700
Vulnerability Summary: CVE-2025-6700 A vulnerability classified as problematic was found in Xuxueli xxl-sso 1.1.0. This vulnerability affects unknown code of...
Vulnerability Summary: CVE-2025-6700 A vulnerability classified as problematic was found in Xuxueli xxl-sso 1.1.0. This vulnerability affects unknown code of...
Vulnerability Summary: CVE-2025-6702 A vulnerability, which was classified as problematic, was found in linlinjava litemall 1.8.0. Affected is an unknown...
Vulnerability Summary: CVE-2025-52904 File Browser provides a file managing interface within a specified directory and it can be used to...
Vulnerability Summary: CVE-2025-30131 An issue was discovered on IROAD Dashcam FX2 devices. An unauthenticated file upload endpoint can be leveraged...
Vulnerability Summary: CVE-2025-53013 Himmelblau is an interoperability suite for Microsoft Azure Entra ID and Intune. A vulnerability present in versions...
Vulnerability Summary: CVE-2024-52928 Arc before 1.26.1 on Windows has a bypass issue in the site settings that allows websites (with...
Vulnerability Summary: CVE-2025-49603 Northern.tech Mender Server before 3.7.11 and 4.x before 4.0.1 has Incorrect Access Control. Affected Endpoints: No affected...
Vulnerability Summary: CVE-2025-52555 Ceph is a distributed object, block, and file storage platform. In versions 17.2.7, 18.2.1 through 18.2.4, and...
Vulnerability Summary: CVE-2025-52903 File Browser provides a file managing interface within a specified directory and it can be used to...
Vulnerability Summary: CVE-2025-5731 A flaw was found in Infinispan CLI. A sensitive password, decoded from a Base64-encoded Kubernetes secret, is...
Vulnerability Summary: CVE-2025-49592 n8n is a workflow automation platform. Versions prior to 1.98.0 have an Open Redirect vulnerability in the...
Vulnerability Summary: CVE-2013-1424 Buffer overflow vulnerability in matplotlib.This issue affects matplotlib: before upstream commit ba4016014cb4fb4927e36ce8ea429fed47dcb787. Affected Endpoints: No affected endpoints...
Vulnerability Summary: CVE-2025-6733 A vulnerability was found in UTT HiPER 840G up to 3.1.1-190328. It has been declared as critical....
Vulnerability Summary: CVE-2025-6731 A vulnerability was found in yzcheng90 X-SpringBoot up to 5.0 and classified as critical. Affected by this...
Vulnerability Summary: CVE-2025-6732 A vulnerability was found in UTT HiPER 840G up to 3.1.1-190328. It has been classified as critical....
Vulnerability Summary: CVE-2025-3699 Missing Authentication for Critical Function vulnerability in Mitsubishi Electric Corporation G-50 Version 3.37 and prior, G-50-W Version...
Vulnerability Summary: CVE-2025-6734 A vulnerability was found in UTT HiPER 840G up to 3.1.1-190328. It has been rated as critical....
Vulnerability Summary: CVE-2025-45332 vkoskiv c-ray 1.1 contains a Null Pointer Dereference (NPD) vulnerability in the parse_mtllib function of its data...
Vulnerability Summary: CVE-2025-5829 Autel MaxiCharger AC Wallbox Commercial autocharge Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows physically...
Vulnerability Summary: CVE-2025-5830 Autel MaxiCharger AC Wallbox Commercial DLB_SlaveRegister Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent...
Vulnerability Summary: CVE-2025-5828 Autel MaxiCharger AC Wallbox Commercial wLength Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows physically present...
Vulnerability Summary: CVE-2025-5827 Autel MaxiCharger AC Wallbox Commercial ble_process_esp32_msg Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent...
Vulnerability Summary: CVE-2025-5824 Autel MaxiCharger AC Wallbox Commercial Origin Validation Error Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to...
Vulnerability Summary: CVE-2025-5825 Autel MaxiCharger AC Wallbox Commercial Firmware Downgrade Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to...