The data loss prevention company emerges from stealth with an AI-powered platform to help organizations distinguish between legitimate and risky activity.
A vulnerability, which was classified as critical, has been found in IROAD Dash Cam X5 and Dash Cam X6 up to 20250308. Affected by this issue is some unknown functionality of the component API Endpoint. The manipulation leads to missing authentication.
This vulnerability is handled as CVE-2025-2344. The attack may be launched remotely. There is no exploit available.
It is recommended to apply restrictive firewalling.
The vendor was contacted early about this disclosure but did not respond in any way. Our investigation indicates that a second CVE-2025-30111 was assigned to this entry.
A vulnerability was found in ROADCAM X3 App on Android. It has been classified as problematic. This affects an unknown part. The manipulation leads to hard-coded credentials.
This vulnerability is uniquely identified as CVE-2025-30123. An attack has to be approached locally. There is no exploit available.
A vulnerability was found in ROADCAM X3 and classified as critical. Affected by this issue is some unknown functionality. The manipulation leads to use of default credentials.
This vulnerability is handled as CVE-2025-30122. The attack needs to be approached within the local network. There is no exploit available.
A vulnerability was found in IROAD Dash Cam X5 up to 20250203. It has been rated as problematic. This issue affects some unknown processing of the component SSID. The manipulation leads to use of default credentials.
The identification of this vulnerability is CVE-2025-2341. The attack needs to be initiated within the local network. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way. Our investigation indicates that a second CVE-2025-30106 was assigned to this entry.
A vulnerability, which was classified as very critical, was found in IROAD Dash Cam X5 and Dash Cam X6 up to 20250308. This affects an unknown part. The manipulation leads to improper authorization.
This vulnerability is uniquely identified as CVE-2025-2345. It is possible to initiate the attack remotely. There is no exploit available.
The vendor was contacted early about this disclosure but did not respond in any way. It looks like this entry got a duplicate CVE-2025-30107 assigned.
A vulnerability has been found in IROAD Dash Cam X5 and Dash Cam X6 up to 20250308 and classified as problematic. This vulnerability affects unknown code of the component Domain Handler. The manipulation of the argument Domain Name leads to origin validation error.
This vulnerability was named CVE-2025-2346. The attack can be initiated remotely. There is no exploit available.
It is recommended to apply restrictive firewalling.
During the analysis of our data team we suspected a duplicate CVE assignment as CVE-2025-30132.
Threat actors exploit a server-side request forgery (SSRF) flaw, tracked as CVE-2024-27564, in ChatGPT, to target US financial and government organizations. Cybersecurity firm Veriti reports that threat actors are exploiting a server-side request forgery (SSRF) vulnerability, tracked as CVE-2024-27564 (CVSS score of 6.5), in ChatGPT to target financial and government organizations in the US. The […]
A vulnerability classified as critical has been found in IROAD X5 Mobile App up to 5.2.5 on Android. Affected is an unknown function of the component API Endpoint. The manipulation leads to hard-coded credentials.
This vulnerability is traded as CVE-2025-2342. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
It is recommended to apply restrictive firewalling.
The vendor was contacted early about this disclosure but did not respond in any way. It looks like this entry got a duplicate CVE-2025-30109 assigned.
A vulnerability classified as critical was found in IROAD Dash Cam X5 and Dash Cam X6 up to 20250308. Affected by this vulnerability is an unknown functionality of the component Device Pairing. The manipulation leads to hard-coded credentials.
This vulnerability is known as CVE-2025-2343. Access to the local network is required for this attack to succeed. There is no exploit available.
The vendor was contacted early about this disclosure but did not respond in any way. During the analysis of our data team we suspected a duplicate CVE assignment as CVE-2025-30110.
A vulnerability has been found in Vestel EVC04 Configuration Interface up to 18.03.2025 and classified as critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to Sql injection.
This vulnerability is known as CVE-2024-8997. The attack can be launched remotely. There is no exploit available.