Omnient

Vulnerabilități

Newest CVEs

  • CVE-2023-52320

    Severity Not Scored Description Rejected reason: withdraw Read more at https://www.tenable.com/cve/CVE-2023-52320

  • CVE-2023-52321

    Severity Not Scored Description Rejected reason: withdraw Read more at https://www.tenable.com/cve/CVE-2023-52321

  • CVE-2025-2375

    Low Severity Description A vulnerability, which was classified as problematic, was found in PHPGurukul Human Metapneumovirus Testing Management System 1.0. Affected is an unknown function of the file /profile.php of the component Admin Profile Page. The manipulation of the argument email leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Read more at https://www.tenable.com/cve/CVE-2025-2375

  • CVE-2025-2376

    High Severity Description A vulnerability has been found in viames Pair Framework up to 1.9.11 and classified as critical. Affected by this vulnerability is the function getCookieContent of the file /src/UserRemember.php of the component PHP Object Handler. The manipulation of the argument cookieName leads to deserialization. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Read more at https://www.tenable.com/cve/CVE-2025-2376

  • CVE-2023-52316

    Severity Not Scored Description Rejected reason: withdraw Read more at https://www.tenable.com/cve/CVE-2023-52316

Updated CVEs

  • CVE-2025-2350
    on martie 16, 2025 at 10:15 pm

    Medium Severity Description A vulnerability was found in IROAD Dash Cam FX2 up to 20250308. It has been rated as critical. Affected by this issue is some unknown functionality of the file /action/upload_file. The manipulation leads to unrestricted upload. Access to the local network is required for this attack to succeed. The exploit has been disclosed to the public and may be used. Read more at https://www.tenable.com/cve/CVE-2025-2350

  • CVE-2025-2349
    on martie 16, 2025 at 10:15 pm

    Low Severity Description A vulnerability was found in IROAD Dash Cam FX2 up to 20250308. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /etc/passwd of the component Password Hash Handler. The manipulation leads to password hash with insufficient computational effort. Access to the local network is required for this attack. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. Read more at https://www.tenable.com/cve/CVE-2025-2349

  • CVE-2025-2347
    on martie 16, 2025 at 9:15 pm

    Medium Severity Description A vulnerability was found in IROAD Dash Cam FX2 up to 20250308 and classified as problematic. This issue affects some unknown processing of the component Device Registration. The manipulation of the argument Password with the input qwertyuiop leads to use of default password. The attack needs to be done within the local network. The exploit has been disclosed to the public and may be used. Read more at https://www.tenable.com/cve/CVE-2025-2347

  • CVE-2025-2348
    on martie 16, 2025 at 9:15 pm

    Medium Severity Description A vulnerability was found in IROAD Dash Cam FX2 up to 20250308. It has been classified as problematic. Affected is an unknown function of the file /mnt/extsd/event/ of the component HTTP/RTSP. The manipulation leads to information disclosure. The attack needs to be initiated within the local network. The exploit has been disclosed to the public and may be used. Read more at https://www.tenable.com/cve/CVE-2025-2348

  • CVE-2025-2346
    on martie 16, 2025 at 8:15 pm

    Medium Severity Description A vulnerability has been found in IROAD Dash Cam X5 and Dash Cam X6 up to 20250308 and classified as problematic. This vulnerability affects unknown code of the component Domain Handler. The manipulation of the argument Domain Name leads to origin validation error. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. Read more at https://www.tenable.com/cve/CVE-2025-2346

Contact Form