6.9

CVSS4.0

CVE-2025-55279 - Hard-coded Private Key Vulnerability in ZKTeco WL20

This vulnerability exists in ZKTeco WL20 due to hard-coded private key stored in plaintext within the device firmware. An attacker with physical access could exploit this vulnerability by extracting the firmware and analyzing the binary data to retrieve private key stored in the firmware of the tar…

📅 Published: Aug. 13, 2025, 11:23 a.m. 🔄 Last Modified: Aug. 13, 2025, 5:33 p.m.

6.8

CVSS4.0

CVE-2025-54465 - Hard-coded Credentials Vulnerability in ZKTeco WL20

This vulnerability exists in ZKTeco WL20 due to hard-coded MQTT credentials and endpoints stored in plaintext within the device firmware. An attacker with physical access could exploit this vulnerability by extracting the firmware and analyzing the binary data to retrieve the hard-coded MQTT creden…

📅 Published: Aug. 13, 2025, 11:17 a.m. 🔄 Last Modified: Aug. 13, 2025, 5:33 p.m.

7

CVSS4.0

CVE-2025-54464 - Cleartext Storage Vulnerability in ZKTeco WL20

This vulnerability exists in ZKTeco WL20 due to storage of admin and user credentials without encryption in the device firmware. An attacker with physical access could exploit this vulnerability by extracting the firmware and reverse engineer the binary data to access the unencrypted credentials st…

📅 Published: Aug. 13, 2025, 11:12 a.m. 🔄 Last Modified: Aug. 13, 2025, 5:33 p.m.

6.3

CVSS4.0

CVE-2025-8916 - Possible DOS in processing large name constraint structures in PKIXCertPathReveiwer

Allocation of Resources Without Limits or Throttling vulnerability in Legion of the Bouncy Castle Inc. Bouncy Castle for Java bcpkix, bcprov, bcpkix-fips on All (API modules) allows Excessive Allocation. This vulnerability is associated with program files https://github.Com/bcgit/bc-java/blob/main…

📅 Published: Aug. 13, 2025, 9:31 a.m. 🔄 Last Modified: Aug. 13, 2025, 5:33 p.m.

7.1

CVSS4.0

CVE-2025-8914 - WellChoose|Organization Portal System - SQL Injection

Organization Portal System developed by WellChoose has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read database contents.

📅 Published: Aug. 13, 2025, 9:18 a.m. 🔄 Last Modified: Aug. 13, 2025, 5:33 p.m.

9.3

CVSS4.0

CVE-2025-8913 - WellChoose|Organization Portal System - Local File Inclusion

Organization Portal System developed by WellChoose has a Local File Inclusion vulnerability, allowing unauthenticated remote attackers to execute arbitrary code on the server.

📅 Published: Aug. 13, 2025, 9:16 a.m. 🔄 Last Modified: Aug. 13, 2025, 5:33 p.m.

8.7

CVSS4.0

CVE-2025-8912 - WellChoose|Organization Portal System - Arbitrary File Reading through Path Traversal

Organization Portal System developed by WellChoose has an Arbitrary File Reading vulnerability, allowing unauthenticated remote attackers to exploit Absolute Path Traversal to download arbitrary system files.

📅 Published: Aug. 13, 2025, 9:13 a.m. 🔄 Last Modified: Aug. 13, 2025, 5:33 p.m.

5.3

CVSS4.0

CVE-2025-8911 - WellChoose|Organization Portal System - Reflected Cross-site Scripting

Organization Portal System developed by WellChoose has a Reflected Cross-site Scripting vulnerability, allowing unauthenticated remote attackers to execute arbitrary JavaScript codes in user's browser through phishing attacks.

📅 Published: Aug. 13, 2025, 9:09 a.m. 🔄 Last Modified: Aug. 13, 2025, 7:57 p.m.

5.3

CVSS4.0

CVE-2025-8910 - WellChoose|Organization Portal System - Reflected Cross-site Scripting

Organization Portal System developed by WellChoose has a Reflected Cross-site Scripting vulnerability, allowing unauthenticated remote attackers to execute arbitrary JavaScript codes in user's browser through phishing attacks.

📅 Published: Aug. 13, 2025, 9:06 a.m. 🔄 Last Modified: Aug. 13, 2025, 7:57 p.m.

7.1

CVSS4.0

CVE-2025-8909 - WellChoose|Organization Portal System - Arbitrary File Reading through Path Traversal

Organization Portal System developed by WellChoose has an Arbitrary File Reading vulnerability, allowing remote attackers with regular privileges to exploit Absolute Path Traversal to download arbitrary system files.

📅 Published: Aug. 13, 2025, 9:03 a.m. 🔄 Last Modified: Aug. 13, 2025, 7:57 p.m.
Total resulsts: 305767
Page 51 of 30,577
« previous page » next page
Filters