Vulnerability Summary for the Week of July 7, 2025

High Vulnerabilities

Primary
Vendor — Product
Description Published CVSS Score Source Info
Radiflow–iSAP Smart Collector The device has two web servers that expose unauthenticated REST APIs on the management network (TCP ports 8084 and 8086). Exploiting OS command injection through these APIs, an attacker can send arbitrary commands that are executed with administrative permissions by the underlying operating system. 2025-07-09 10 CVE-2025-3499
WAGO–Wago Device Sphere A remote unauthenticated attacker may use default certificates to generate JWT Tokens and gain full access to the tool and all connected devices. 2025-07-07 10 CVE-2025-41672
wftpserver–Wing FTP Server In Wing FTP Server before 7.4.4. the user and admin web interfaces mishandle ‘\0’ bytes, ultimately allowing injection of arbitrary Lua code into user session files. This can be used to execute arbitrary system commands with the privileges of the FTP service (root or SYSTEM by default). This is thus a remote code execution vulnerability that guarantees a total server compromise. This is also exploitable via anonymous FTP accounts. 2025-07-10 10 CVE-2025-47812
webbertakken–docusaurus-plugin-content-gists The Docusaurus gists plugin adds a page to your Docusaurus instance, displaying all public gists of a GitHub user. docusaurus-plugin-content-gists versions prior to 4.0.0 are vulnerable to exposing GitHub Personal Access Tokens in production build artifacts when passed through plugin configuration options.

[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.

This article has been indexed from Bulletins

Read the original article: