Vulnerabilities

DATE CVE VULNERABILITY TITLE RISK
2025-01-20 CVE-2025-0585 The a+HRD from aEnrich Technology has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read, modify, and delete database contents.
network
low complexity
CWE-89
critical
9.8
2025-01-20 CVE-2025-0586 The a+HRD from aEnrich Technology has an Insecure Deserialization vulnerability, allowing remote attackers with database modification privileges and regular system privileges to perform arbitrary code execution.
network
low complexity
CWE-502
7.2
2025-01-20 CVE-2025-0578 A vulnerability was found in Facile Sistemas Cloud Apps up to 20250107.
network
low complexity
CWE-94
3.5
2025-01-20 CVE-2025-0583 The a+HRD from aEnrich Technology has a Reflected Cross-site Scripting vulnerability, allowing unauthenticated remote attackers to execute arbitrary JavaScript codes in user's browser through phishing attacks.
network
low complexity
CWE-79
6.1
2025-01-20 CVE-2025-0576 A vulnerability was found in Mobotix M15 4.3.4.83 and classified as problematic.
network
low complexity
CWE-94
4.3
2025-01-19 CVE-2025-0575 A vulnerability has been found in Union Bank of India Vyom 8.0.34 on Android and classified as problematic.
local
high complexity
CWE-693
3.9
2025-01-19 CVE-2024-38337 IBM Sterling Secure Proxy 6.0.0.0, 6.0.0.1, 6.0.0.2, 6.0.0.3, 6.1.0.0, and 6.2.0.0 could allow an unauthorized attacker to retrieve or alter sensitive information contents due to incorrect permission assignments.
network
low complexity
CWE-732
critical
9.1
2025-01-19 CVE-2024-41742 IBM TXSeries for Multiplatforms 10.1 is vulnerable to a denial of service, caused by improper enforcement of the timeout on individual read operations.
network
low complexity
CWE-770
7.5
2025-01-19 CVE-2024-41743 IBM TXSeries for Multiplatforms 10.1 could allow a remote attacker to cause a denial of service using persistent connections due to improper allocation of resources.
network
low complexity
CWE-770
7.5
2025-01-19 CVE-2024-41783 IBM Sterling Secure Proxy 6.0.0.0, 6.0.0.1, 6.0.0.2, 6.0.0.3, 6.1.0.0, and 6.2.0.0 could allow a privileged user to inject commands into the underlying operating system due to improper validation of a specified type of input.
network
low complexity
critical
9.1