Page(s) : 1 2 3 4 5 6 7 8 [9] 10 11 12 13 14 15 16 17 18 19 ... | Result(s) : 115277 |
Alerts
DATE | NAME | CATEGORIES | DETAIL | |
---|---|---|---|---|
4.3 | 2025-07-08 | CVE-2025-27127 | cve | A vulnerability has been identified in TIA Project-Server (All versions < V2.1.1), TIA Project-Server V17 (All versions), Totally Integrated Automation Portal (TIA Portal) V17 (... |
6.5 | 2025-07-08 | CVE-2025-40593 | cve | A vulnerability has been identified in SIMATIC CN 4100 (All versions < V4.0). The affected application allows to control the device by storing arbitrary files in the SFTP folder... |
5.3 | 2025-07-08 | CVE-2025-40742 | cve | A vulnerability has been identified in SIPROTEC 5 6MD84 (CP300) (All versions), SIPROTEC 5 6MD85 (CP300) (All versions), SIPROTEC 5 6MD86 (CP300) (All versions), SIPROTEC 5 6MD8... |
5.3 | 2025-07-08 | CVE-2025-41222 | cve | A vulnerability has been identified in RUGGEDCOM i800 (All versions), RUGGEDCOM i801 (All versions), RUGGEDCOM i802 (All versions), RUGGEDCOM i803 (All versions), RUGGEDCOM M210... |
4.8 | 2025-07-08 | CVE-2025-41223 | cve | A vulnerability has been identified in RUGGEDCOM i800 (All versions), RUGGEDCOM i801 (All versions), RUGGEDCOM i802 (All versions), RUGGEDCOM i803 (All versions), RUGGEDCOM M210... |
5.3 | 2025-07-08 | CVE-2024-53009 | cve | Memory corruption while operating the mailbox in Automotive. |
6.6 | 2025-07-08 | CVE-2025-21426 | cve | Memory corruption while processing camera TPG write request. |
6.2 | 2025-07-08 | CVE-2025-21433 | cve | Transient DOS when importing a PKCS#8-encoded RSA private key with a zero-sized modulus. |
5.4 | 2025-07-08 | CVE-2025-5537 | cve | The Lightbox & Modal Popup WordPress Plugin – FooBox plugin for WordPress is vulnerable to Stored Cross-Site Scripting via image alternative texts in all versions up to, and inc... |
5.3 | 2025-07-08 | CVE-2025-5957 | cve | The Guest Support – Complete customer support ticket system for WordPress plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on th... |
5.3 | 2025-07-08 | CVE-2025-24002 | cve | An unauthenticated remote attacker can use MQTT messages to crash a service on charging stations complying with German Calibration Law, resulting in a temporary denial-of-servic... |
5.2 | 2025-07-08 | CVE-2025-24004 | cve | A physical attacker with access to the device display via USB-C can send a message to the device which triggers an unsecure copy to a buffer resulting in loss of integrity and a... |
6.5 | 2025-07-08 | CVE-2025-41665 | cve | An low privileged remote attacker can enforce the watchdog of the affected devices to reboot the PLC due to incorrect default permissions of a config file. |
6.1 | 2025-07-08 | CVE-2025-42956 | cve | SAP NetWeaver Application Server ABAP and ABAP Platform allows an unauthenticated attacker to create a malicious link which they can make publicly available. When an authenticat... |
5.4 | 2025-07-08 | CVE-2025-6743 | cve | The Woodmart theme for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'multiple_markers' attribute in all versions up to, and including, ... |
5.4 | 2025-07-08 | CVE-2025-7153 | cve | A vulnerability classified as problematic was found in CodeAstro Simple Hospital Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /d... |
4.1 | 2025-07-08 | CVE-2025-31326 | cve | SAP?BusinessObjects Business?Intelligence Platform (Web Intelligence) is vulnerable to HTML Injection, allowing an attacker with basic user privileges to inject malicious code i... |
4.3 | 2025-07-08 | CVE-2025-42960 | cve | SAP Business Warehouse and SAP BW/4HANA BEx Tools allow an authenticated attacker to gain higher access levels than intended by exploiting improper authorization checks. This co... |
4.9 | 2025-07-08 | CVE-2025-42961 | cve | Due to a missing authorization check in SAP NetWeaver Application server for ABAP, an authenticated user with high privileges could exploit the insufficient validation of user p... |
6.1 | 2025-07-08 | CVE-2025-42962 | cve | SAP Business Warehouse (Business Explorer Web) allows an attacker to create a malicious link. If an authenticated user clicks on this link, the injected script gets executed wit... |
Page(s) : 1 2 3 4 5 6 7 8 [9] 10 11 12 13 14 15 16 17 18 19 ... | Result(s) : 115277 |