NA - CVE-2025-34039 - A code injection vulnerability exists in Yonyou...
A code injection vulnerability exists in Yonyou UFIDA NC v6.5 and prior due to the exposure of the BeanShell testing servlet (bsh.servlet.BshServlet) without proper access controls. The servlet...
NA - CVE-2025-34040 - An arbitrary file upload vulnerability exists...
An arbitrary file upload vulnerability exists in the Zhiyuan OA platform 5.0, 5.1 - 5.6sp1, 6.0 - 6.1sp2, 7.0, 7.0sp1 - 7.1, 7.1sp1, and 8.0 - 8.0sp2 via the wpsAssistServlet interface. The...
NA - CVE-2025-34041 - An OS command injection vulnerability exists in...
An OS command injection vulnerability exists in the Chinese versions of Sangfor Endpoint Detection and Response (EDR) management platform versions 3.2.16, 3.2.17, and 3.2.19. The vulnerability...
Low - CVE-2025-6536 - A vulnerability has been found in Tarantool up...
A vulnerability has been found in Tarantool up to 3.3.1 and classified as problematic. Affected by this vulnerability is the function tm_to_datetime in the library src/lib/core/datetime.c. The...
Low - CVE-2025-6551 - A vulnerability was found in java-aodeng...
A vulnerability was found in java-aodeng Hope-Boot 1.0.0 and classified as problematic. This issue affects the function Login of the file /src/main/java/com/hope/controller/WebController.java. The...
NA - CVE-2025-48461 - Successful exploitation of the vulnerability...
Successful exploitation of the vulnerability could allow an unauthenticated attacker to conduct brute force guessing and account takeover as the session cookies are predictable, potentially...
NA - CVE-2025-48462 - Successful exploitation of the vulnerability...
Successful exploitation of the vulnerability could allow an attacker to consume all available session slots and block other users from logging in, thereby preventing legitimate users from gaining...
NA - CVE-2025-48463 - Successful exploitation of the vulnerability...
Successful exploitation of the vulnerability could allow an attacker to intercept data and conduct session hijacking on the exposed data as the vulnerable product uses unencrypted HTTP...
NA - CVE-2025-48466 - Successful exploitation of the vulnerability...
Successful exploitation of the vulnerability could allow an unauthenticated, remote attacker to send Modbus TCP packets to manipulate Digital Outputs, potentially allowing remote control of relay...
NA - CVE-2025-48467 - Successful exploitation of the vulnerability...
Successful exploitation of the vulnerability could allow an attacker to cause repeated reboots, potentially leading to remote denial-of-service and system unavailability.