Browse all 4 CVE security advisories affecting Ksenia Security S.p.A.. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Ksenia Security S.p.A. specializes in providing cybersecurity solutions and vulnerability assessment services for organizations. The company has four CVEs on record, historically associated with common vulnerability classes including remote code execution (RCE), cross-site scripting (XSS), and privilege escalation issues. These vulnerabilities have primarily affected their web applications and network security products. While no major public security incidents have been documented, the CVEs indicate potential weaknesses in their software that could allow unauthorized access or system compromise. Ksenia Security S.p.A. maintains a focus on identifying and mitigating these vulnerabilities to enhance their clients' security postures.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2025-15113 | Ksenia Security lares Home Automation 1.6 Remote Code Execution via MPFS Upload — laresCWE-256 | 8.4 | High | 2025-12-30 |
| CVE-2025-15114 | Ksenia Security lares Home Automation 1.6 PIN Exposure Vulnerability — laresCWE-403 | 9.8 | Critical | 2025-12-30 |
| CVE-2025-15112 | Ksenia Security lares Home Automation 1.6 URL Redirection Vulnerability — laresCWE-601 | 5.4 | Medium | 2025-12-30 |
| CVE-2025-15111 | Ksenia Security lares Home Automation 1.6 Default Credentials Vulnerability — laresCWE-259 | 9.8 | Critical | 2025-12-30 |
This page lists every published CVE security advisory associated with Ksenia Security S.p.A.. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.