Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 5.5

    MEDIUM
    CVE-2021-34600

    Telenot CompasX versions prior to 32.0 use a weak seed for random number generation leading to predictable AES keys used in the NFC tags used for local authorization of users. This may lead to total loss of trustworthiness of the installation.... Read more

    Affected Products : compasx
    • EPSS Score: %0.12
    • Published: Jan. 20, 2022
    • Modified: Nov. 21, 2024
  • 7.4

    HIGH
    CVE-2021-34599

    Affected versions of CODESYS Git in Versions prior to V1.1.0.0 lack certificate validation in HTTPS handshakes. CODESYS Git does not implement certificate validation by default, so it does not verify that the server provides a valid and trusted HTTPS cert... Read more

    Affected Products : development_system git
    • EPSS Score: %0.09
    • Published: Dec. 01, 2021
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2021-34598

    In Phoenix Contact FL MGUARD 1102 and 1105 in Versions 1.4.0, 1.4.1 and 1.5.0 the remote logging functionality is impaired by the lack of memory release for data structures from syslog-ng when remote logging is active... Read more

    • EPSS Score: %0.27
    • Published: Nov. 10, 2021
    • Modified: Nov. 21, 2024
  • 7.8

    HIGH
    CVE-2021-34597

    Improper Input Validation vulnerability in PC Worx Automation Suite of Phoenix Contact up to version 1.88 could allow an attacker with a manipulated project file to unpack arbitrary files outside of the selected project directory.... Read more

    Affected Products : pc_worx pc_worx_express
    • EPSS Score: %0.16
    • Published: Nov. 04, 2021
    • Modified: Nov. 21, 2024
  • 8.5

    HIGH
    CVE-2021-34594

    TwinCAT OPC UA Server in TF6100 and TS6100 in product versions before 4.3.48.0 or with TcOpcUaServer versions below 3.2.0.194 are prone to a relative path traversal that allow administrators to create or delete any files on the system.... Read more

    • EPSS Score: %0.57
    • Published: Nov. 04, 2021
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2021-34592

    In Bender/ebee Charge Controllers in multiple versions are prone to Command injection via Web interface. An authenticated attacker could enter shell commands into some input fields.... Read more

    • EPSS Score: %2.11
    • Published: Apr. 27, 2022
    • Modified: Nov. 21, 2024
  • 7.8

    HIGH
    CVE-2021-34591

    In Bender/ebee Charge Controllers in multiple versions are prone to Local privilege Escalation. An authenticated attacker could get root access via the suid applications socat, ip udhcpc and ifplugd.... Read more

    • EPSS Score: %0.13
    • Published: Apr. 27, 2022
    • Modified: Nov. 21, 2024
  • 5.4

    MEDIUM
    CVE-2021-34590

    In Bender/ebee Charge Controllers in multiple versions are prone to Cross-site Scripting. An authenticated attacker could write HTML Code into configuration values. These values are not properly escaped when displayed.... Read more

    • EPSS Score: %0.68
    • Published: Apr. 27, 2022
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2021-34589

    In Bender/ebee Charge Controllers in multiple versions are prone to an RFID leak. The RFID of the last charge event can be read without authentication via the web interface.... Read more

    • EPSS Score: %0.30
    • Published: Apr. 27, 2022
    • Modified: Nov. 21, 2024
  • 8.6

    HIGH
    CVE-2021-34588

    In Bender/ebee Charge Controllers in multiple versions are prone to unprotected data export. Backup export is protected via a random key. The key is set at user login. It is empty after reboot .... Read more

    • EPSS Score: %0.26
    • Published: Apr. 27, 2022
    • Modified: Nov. 21, 2024
  • 5.3

    MEDIUM
    CVE-2021-34587

    In Bender/ebee Charge Controllers in multiple versions a long URL could lead to webserver crash. The URL is used as input of an sprintf to a stack variable.... Read more

    • EPSS Score: %0.29
    • Published: Apr. 27, 2022
    • Modified: Nov. 21, 2024
  • 4.8

    MEDIUM
    CVE-2021-34582

    In Phoenix Contact FL MGUARD 1102 and 1105 in Versions 1.4.0, 1.4.1 and 1.5.0 a user with high privileges can inject HTML code (XSS) through web-based management or the REST API with a manipulated certificate file.... Read more

    • EPSS Score: %0.09
    • Published: Nov. 10, 2021
    • Modified: Nov. 21, 2024
  • 7.8

    HIGH
    CVE-2021-34581

    Missing Release of Resource after Effective Lifetime vulnerability in OpenSSL implementation of WAGO 750-831/xxx-xxx, 750-880/xxx-xxx, 750-881, 750-889 in versions FW4 up to FW15 allows an unauthenticated attacker to cause DoS on the device.... Read more

    • EPSS Score: %1.58
    • Published: Aug. 31, 2021
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2021-34580

    In mymbCONNECT24, mbCONNECT24 <= 2.9.0 an unauthenticated user can enumerate valid backend users by checking what kind of response the server sends for crafted invalid login attempts.... Read more

    Affected Products : mbconnect24 mymbconnect24
    • EPSS Score: %0.27
    • Published: Oct. 27, 2021
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2021-34579

    In Phoenix Contact: FL MGUARD DM version 1.12.0 and 1.13.0 access to the Apache web server being installed as part of the FL MGUARD DM on Microsoft Windows does not require login credentials even if configured during installation.Attackers with network ac... Read more

    Affected Products : fl_mguard_dm
    • EPSS Score: %0.10
    • Published: Nov. 09, 2022
    • Modified: Nov. 21, 2024
  • 9.8

    CRITICAL
    CVE-2021-34578

    This vulnerability allows an attacker who has access to the WBM to read and write settings-parameters of the device by sending specifically constructed requests without authentication on multiple WAGO PLCs in firmware versions up to FW07.... Read more

    • EPSS Score: %0.34
    • Published: Aug. 31, 2021
    • Modified: Nov. 21, 2024
  • 6.5

    MEDIUM
    CVE-2021-34577

    In the Kaden PICOFLUX AiR water meter an adversary can read the values through wireless M-Bus mode 5 with a hardcoded shared key while being adjacent to the device.... Read more

    Affected Products : picoflux_air_firmware picoflux_air
    • EPSS Score: %0.05
    • Published: Nov. 09, 2022
    • Modified: Nov. 21, 2024
  • 4.3

    MEDIUM
    CVE-2021-34576

    In Kaden PICOFLUX Air in all known versions an information exposure through observable discrepancy exists. This may give sensitive information (water consumption without distinct values) to third parties.... Read more

    Affected Products : picoflux_air_firmware picoflux_air
    • EPSS Score: %0.17
    • Published: Sep. 16, 2021
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2021-34575

    In MB connect line mymbCONNECT24, mbCONNECT24 in versions <= 2.8.0 an unauthenticated user can enumerate valid users by checking what kind of response the server sends.... Read more

    Affected Products : mbconnect24 mymbconnect24
    • EPSS Score: %0.39
    • Published: Aug. 02, 2021
    • Modified: Nov. 21, 2024
  • 4.3

    MEDIUM
    CVE-2021-34574

    In MB connect line mymbCONNECT24, mbCONNECT24 and Helmholz myREX24 and myREX24.virtual in all versions through v2.11.2 an authenticated attacker can change the password of his account into a new password that violates the password policy by intercepting a... Read more

    • EPSS Score: %0.24
    • Published: Aug. 02, 2021
    • Modified: Nov. 21, 2024
Showing 20 of 291513 Results