CVE-2025-30056
The RunCommand function accepts any parameter, which is then passed for execution in the shell. This allows an attacker to execute arbitrary code on the system. More information : https://cert.pl/en/posts/2025/08/CVE-2025-2313/
The RunCommand function accepts any parameter, which is then passed for execution in the shell. This allows an attacker to execute arbitrary code on the system. More information : https://cert.pl/en/posts/2025/08/CVE-2025-2313/
The “system” function receives untrusted input from the user. If the “EnableJSCaching” option is enabled, it is possible to execute arbitrary code provided as the “Module” parameter. More information : https://cert.pl/en/posts/2025/08/CVE-2025-2313/
The “serverConfig” endpoint, which returns the module configuration including credentials, is accessible without authentication. More information : https://cert.pl/en/posts/2025/08/CVE-2025-2313/
The paths “/cgi-bin/CliniNET.prd/utils/userlogstat.pl”, “/cgi-bin/CliniNET.prd/utils/usrlogstat.pl”, and “/cgi-bin/CliniNET.prd/utils/dblogstat.pl” expose data containing session IDs. More information : https://cert.pl/en/posts/2025/08/CVE-2025-2313/
The vulnerability allows unauthenticated users to download a file containing session ID data by directly accessing the “/cgi-bin/CliniNET.prd/utils/userlogxls.pl” endpoint. More information : https://cert.pl/en/posts/2025/08/CVE-2025-2313/
Unauthenticated access to the “/cgi-bin/CliniNET.prd/GetActiveSessions.pl” endpoint allows takeover of any user session logged into the system, including users with admin privileges. More information : https://cert.pl/en/posts/2025/08/CVE-2025-2313/
The vulnerability consists of a session ID leak when saving a file downloaded from CGM CLININET. The identifier is exposed through a built-in Windows security feature that stores additional metadata in an NTFS alternate...
The system exposes several endpoints, typically including “/int/” in their path, that should be restricted to internal services, but are instead publicly accessible without authentication to any host able to reach the application server...
Stored XSS vulnerability exists in the “Oddział” (Ward) module, in the death diagnosis description field, and allows the execution of arbitrary JavaScript code. This can lead to session hijacking of other users and potentially...
In the Print.pl service, the “uhcPrintServerPrint” function allows execution of arbitrary code via the “CopyCounter” parameter. More information : https://cert.pl/en/posts/2025/08/CVE-2025-2313/
A vulnerability has been found in macrozheng mall up to 1.0.3. This impacts an unknown function of the component Registration. Such manipulation leads to weak password requirements. The attack can be executed remotely. Attacks...
A flaw has been found in editso fuso up to 1.0.4-beta.7. This affects the function PenetrateRsaAndAesHandshake of the file src/net/penetrate/handshake/mod.rs. This manipulation of the argument priv_key causes inadequate encryption strength. Remote exploitation of the...
A vulnerability was identified in itsourcecode Apartment Management System 1.0. This vulnerability affects unknown code of the file /visitor/addvisitor.php. Such manipulation of the argument ID leads to sql injection. It is possible to launch...
Multiple i-フィルター products contain an issue with incorrect default permissions. If this vulnerability is exploited, a local authenticated attacker may replace a service executable on the system where the product is running, potentially allowing...