Логотип exploitDog
bind:CVE-2025-55705
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-55705

Количество 3

Количество 3

nvd логотип

CVE-2025-55705

18 дней назад

This vulnerability occurs when the system permits multiple simultaneous connections to the backend using the same charging station ID. This can result in unauthorized access, data inconsistency, or potential manipulation of charging sessions. The lack of proper session management and expiration control allows attackers to exploit this weakness by reusing valid charging station IDs to establish multiple sessions concurrently.

CVSS3: 7.3
EPSS: Низкий
debian логотип

CVE-2025-55705

18 дней назад

This vulnerability occurs when the system permits multiple simultaneou ...

CVSS3: 7.3
EPSS: Низкий
github логотип

GHSA-857q-pww2-xgv7

17 дней назад

This vulnerability occurs when the system permits multiple simultaneous connections to the backend using the same charging station ID. This can result in unauthorized access, data inconsistency, or potential manipulation of charging sessions. The lack of proper session management and expiration control allows attackers to exploit this weakness by reusing valid charging station IDs to establish multiple sessions concurrently.

CVSS3: 7.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-55705

This vulnerability occurs when the system permits multiple simultaneous connections to the backend using the same charging station ID. This can result in unauthorized access, data inconsistency, or potential manipulation of charging sessions. The lack of proper session management and expiration control allows attackers to exploit this weakness by reusing valid charging station IDs to establish multiple sessions concurrently.

CVSS3: 7.3
0%
Низкий
18 дней назад
debian логотип
CVE-2025-55705

This vulnerability occurs when the system permits multiple simultaneou ...

CVSS3: 7.3
0%
Низкий
18 дней назад
github логотип
GHSA-857q-pww2-xgv7

This vulnerability occurs when the system permits multiple simultaneous connections to the backend using the same charging station ID. This can result in unauthorized access, data inconsistency, or potential manipulation of charging sessions. The lack of proper session management and expiration control allows attackers to exploit this weakness by reusing valid charging station IDs to establish multiple sessions concurrently.

CVSS3: 7.3
0%
Низкий
17 дней назад

Уязвимостей на страницу