4.3
CVE-2025-13125 - IDOR in Im Park's DijiDemi
Authorization Bypass Through User-Controlled Key vulnerability in Im Park Information Technology, Electronics, Press, Publishing and Advertising, Education Ltd. Co. DijiDemi allows Exploitation of Trusted Identifiers.This issue affects DijiDemi: through 28.11.2025.
8.5
CVE-2025-13155 -
An improper permissions vulnerability was reported in Lenovo Baiying Client that could allow a local authenticated user to execute code with elevated privileges.
8.5
CVE-2025-13152 -
A potential DLL hijacking vulnerability was reported in Lenovo One Client during an internal security assessment that could allow a local authenticated user to execute code with elevated privileges.
8.5
CVE-2025-12046 -
A DLL hijacking vulnerability was reported in the Lenovo App Store and Lenovo Browser applications that could allow a local authenticated user to execute code with elevated privileges under certain conditions.
3.5
CVE-2025-13127 - XSS in TACAS Consulting's GoldenHorn
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in TAC Information Services Internal and External Trade Inc. GoldenHorn allows Cross-Site Scripting (XSS).This issue affects GoldenHorn: before 4.25.1121.1.
6.4
CVE-2025-14443 - Ose-openshift-apiserver: openshift api server: server-side request forgery (ssrf) vulnerability in β¦
A flaw was found in ose-openshift-apiserver. This vulnerability allows internal network enumeration, service discovery, limited information disclosure, and potential denial-of-service (DoS) through Server-Side Request Forgery (SSRF) due to missing IP address and network-range validation when procesβ¦
8.7
CVE-2025-8110 - File overwrite in file update API in Gogs
Improper Symbolic link handling in the PutContents API in Gogs allows Local Execution of Code.
6.5
CVE-2024-2105 - JBL: Improper validation of ICM field in connection requests
An unauthorised attacker within bluetooth range may use an improper validation during the BLE connection request to deadlock the affected devices.
8.8
CVE-2024-2104 - JBL: Improper BLE security configurations and lack of authentication on the device's GATT server
Due to improper BLE security configurations on the device's GATT server, an adjacent unauthenticated attacker can read and write device control commands through the mobile app service wich could render the device unusable.
9.8
CVE-2025-13184 - Unauthenticated Telnet enablement via cstecgi.cgi (auth bypass) leading to unauthenticated root logβ¦
Unauthenticated Telnet enablement via cstecgi.cgi (auth bypass) leading to unauthenticated root login with a blank password on factory/reset X5000R V9.1.0u.6369_B20230113 (arbitrary command execution). Earlier versions that share the same implementation, may also be affected.