CVE-2025-50350 |
Description: PHPGurukul Pre-School Enrollment System Project v1.0 is vulnerable to Directory Traversal in manage-classes.php.
EPSS Score: 0.08%
June 26th, 2025 (14 days ago)
|
CVE-2025-44141 |
Description: A Cross-Site Scripting (XSS) vulnerability exists in the node creation form of Backdrop CMS 1.30.
EPSS Score: 0.03%
June 26th, 2025 (14 days ago)
|
CVE-2025-36034 |
Description: IBM InfoSphere DataStage Flow Designer in IBM InfoSphere Information Server 11.7 discloses sensitive user information in API requests in clear text that could be intercepted using man in the middle techniques.
CVSS: MEDIUM (5.3) EPSS Score: 0.01% SSVC Exploitation: none
June 26th, 2025 (14 days ago)
|
CVE-2025-34049 |
Description: An OS command injection vulnerability exists in the OptiLink ONT1GEW GPON router firmware version V2.1.11_X101 Build 1127.190306 and earlier. The router’s web management interface fails to properly sanitize user input in the target_addr parameter of the formTracert and formPing administrative endpoints. An authenticated attacker can inject arbitrary operating system commands, which are executed with root privileges, leading to remote code execution. Successful exploitation enables full compromise of the device.
CVSS: CRITICAL (9.4) EPSS Score: 0.63%
June 26th, 2025 (14 days ago)
|
CVE-2025-34048 |
Description: A path traversal vulnerability exists in the web management interface of D-Link DSL-2730U, DSL-2750U, and DSL-2750E ADSL routers with firmware versions IN_1.02, SEA_1.04, and SEA_1.07. The vulnerability is due to insufficient input validation on the getpage parameter within the /cgi-bin/webproc CGI script. This flaw allows an unauthenticated remote attacker to perform path traversal attacks by supplying crafted requests, enabling arbitrary file read on the affected device.
CVSS: HIGH (8.7) EPSS Score: 0.26%
June 26th, 2025 (14 days ago)
|
CVE-2025-34046 |
Description: An unauthenticated file upload vulnerability exists in the Fanwei E-Office <= v9.4 web management interface. The vulnerability affects the /general/index/UploadFile.php endpoint, which improperly validates uploaded files when invoked with certain parameters (uploadType=eoffice_logo or uploadType=theme). An attacker can exploit this flaw by sending a crafted HTTP POST request to upload arbitrary files without requiring authentication. Successful exploitation could enable remote code execution on the affected server, leading to complete compromise of the web application and potentially the underlying system.
CVSS: CRITICAL (10.0) EPSS Score: 0.55%
June 26th, 2025 (14 days ago)
|
CVE-2025-34045 |
Description: A path traversal vulnerability exists in WeiPHP 5.0, an open source WeChat public account platform development framework by Shenzhen Yuanmengyun Technology Co., Ltd. The flaw occurs in the picUrl parameter of the /public/index.php/material/Material/_download_imgage endpoint, where insufficient input validation allows unauthenticated remote attackers to perform directory traversal via crafted POST requests. This enables arbitrary file read on the server, potentially exposing sensitive information such as configuration files and source code.
CVSS: HIGH (8.7) EPSS Score: 0.8%
June 26th, 2025 (14 days ago)
|
CVE-2025-34044 |
Description: A remote command injection vulnerability exists in the confirm.php interface of the WIFISKY 7-layer Flow Control Router via a specially-crafted HTTP GET request to the t parameter. Insufficient input validation allows unauthenticated attackers to execute arbitrary OS commands.
CVSS: CRITICAL (9.4) EPSS Score: 0.12%
June 26th, 2025 (14 days ago)
|
CVE-2025-34043 |
Description: A remote command injection vulnerability exists in Vacron Network Video Recorder (NVR) devices v1.4 due to improper input sanitization in the board.cgi script. The vulnerability allows unauthenticated attackers to pass arbitrary commands to the underlying operating system via crafted HTTP requests. These commands are executed with the privileges of the web server process, enabling remote code execution and potential full device compromise.
CVSS: CRITICAL (10.0) EPSS Score: 0.41%
June 26th, 2025 (14 days ago)
|
CVE-2025-34042 |
Description: An authenticated command injection vulnerability exists in the Beward N100 IP Camera firmware version M2.1.6.04C014 via the ServerName and TimeZone parameters in the servetest CGI page. An attacker with access to the web interface can inject arbitrary system commands into these parameters, which are unsafely embedded into backend system calls without proper input sanitization. Successful exploitation results in remote code execution with root privileges.
CVSS: CRITICAL (9.4) EPSS Score: 0.66%
June 26th, 2025 (14 days ago)
|