uatech CVE Vulnerabilities & Metrics

Focus on uatech vulnerabilities and metrics.

Last updated: 10 Sep 2025, 22:25 UTC

About uatech Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with uatech. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total uatech CVEs: 8
Earliest CVE date: 25 Oct 2022, 21:15 UTC
Latest CVE date: 26 Aug 2025, 20:15 UTC

Latest CVE reference: CVE-2025-52353

Rolling Stats

30-day Count (Rolling): 1
365-day Count (Rolling): 1

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): 0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): 0.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical uatech CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 0.0

Max CVSS: 0

Critical CVEs (≥9): 0

CVSS Range vs. Count

Range Count
0.0-3.9 8
4.0-6.9 0
7.0-8.9 0
9.0-10.0 0

CVSS Distribution Chart

Top 5 Highest CVSS uatech CVEs

These are the five CVEs with the highest CVSS scores for uatech, sorted by severity first and recency.

All CVEs for uatech

CVE-2025-52353 uatech vulnerability CVSS: 0 26 Aug 2025, 20:15 UTC

An arbitrary code execution vulnerability in Badaso CMS 2.9.11. The Media Manager allows authenticated users to upload files containing embedded PHP code via the file-upload endpoint, bypassing content-type validation. When such a file is accessed via its URL, the server executes the PHP payload, enabling an attacker to run arbitrary system commands and achieve full compromise of the underlying host. This has been demonstrated by embedding a backdoor within a PDF and renaming it with a .php extension.

CVE-2023-38970 uatech vulnerability CVSS: 0 30 Aug 2023, 22:15 UTC

Cross Site Scripting vulnerabiltiy in Badaso v.0.0.1 thru v.2.9.7 allows a remote attacker to execute arbitrary code via a crafted payload to the Name of member parameter in the add new member function.

CVE-2023-38971 uatech vulnerability CVSS: 0 29 Aug 2023, 22:15 UTC

Cross Site Scripting vulnerabiltiy in Badaso v.0.0.1 thru v.2.9.7 allows a remote attacker to execute arbitrary code via a crafted payload to the rack number parameter in the add new rack function.

CVE-2023-38969 uatech vulnerability CVSS: 0 28 Aug 2023, 21:15 UTC

Cross Site Scripting vulnerabiltiy in Badaso v.2.9.7 allows a remote attacker to execute arbitrary code via a crafted payload to the title parameter in the new book and edit book function.

CVE-2023-38974 uatech vulnerability CVSS: 0 25 Aug 2023, 01:15 UTC

A stored cross-site scripting (XSS) vulnerability in the Edit Category function of Badaso v2.9.7 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Title parameter.

CVE-2023-38973 uatech vulnerability CVSS: 0 25 Aug 2023, 01:15 UTC

A stored cross-site scripting (XSS) vulnerability in the Add Tag function of Badaso v2.9.7 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Title parameter.

CVE-2022-41705 uatech vulnerability CVSS: 0 25 Nov 2022, 18:15 UTC

Badaso version 2.6.3 allows an unauthenticated remote attacker to execute arbitrary code remotely on the server. This is possible because the application does not properly validate the data uploaded by users.

CVE-2022-41711 uatech vulnerability CVSS: 0 25 Oct 2022, 21:15 UTC

Badaso version 2.6.0 allows an unauthenticated remote attacker to execute arbitrary code remotely on the server. This is possible because the application does not properly validate the data uploaded by users.