Latest CVE Feed
-
4.5
MEDIUMCVE-2024-58256
EnzoH has an OS command injection vulnerability. Successful exploitation of this vulnerability may lead to arbitrary command execution.... Read more
Affected Products :- Published: Aug. 08, 2025
- Modified: Aug. 08, 2025
- Vuln Type: Injection
-
6.3
MEDIUMCVE-2025-54958
Powered BLUE 870 versions 0.20130927 and prior contain an OS command injection vulnerability. If this vulnerability is exploited, arbitrary OS commands may be executed on the affected product.... Read more
Affected Products :- Published: Aug. 08, 2025
- Modified: Aug. 08, 2025
- Vuln Type: Injection
-
5.3
MEDIUMCVE-2025-54959
Powered BLUE Server versions 0.20130927 and prior contain a path traversal vulnerability. If this vulnerability is exploited, an arbitrary file in the affected product may be disclosed.... Read more
Affected Products :- Published: Aug. 08, 2025
- Modified: Aug. 08, 2025
- Vuln Type: Path Traversal
-
8.8
HIGHCVE-2025-8748
MiR software versions prior to version 3.0.0 are affected by a command injection vulnerability. A malicious HTTP request crafted by an authenticated user could allow the execution of arbitrary commands on the underlying operating system.... Read more
Affected Products :- Published: Aug. 08, 2025
- Modified: Aug. 08, 2025
- Vuln Type: Injection
-
6.5
MEDIUMCVE-2025-8749
Path Traversal vulnerability in API Endpoint in Mobile Industrial Robots (MiR) Software Versions prior to 3.0.0 on MiR Robots allows authenticated users to extract files from the robot file system via a crafted API request.... Read more
Affected Products :- Published: Aug. 08, 2025
- Modified: Aug. 08, 2025
- Vuln Type: Path Traversal
-
8.8
HIGHCVE-2020-9322
The /users endpoint in Statamic Core before 2.11.8 allows XSS to add an administrator user. This can be exploited via CSRF. Stored XSS can occur via a JavaScript payload in a username during account registration. Reflected XSS can occur via the /users PAT... Read more
Affected Products :- Published: Aug. 08, 2025
- Modified: Aug. 08, 2025
- Vuln Type: Cross-Site Scripting
-
7.5
HIGHCVE-2025-52586
The MOD3 command traffic between the monitoring application and the inverter is transmitted in plaintext without encryption or obfuscation. This vulnerability may allow an attacker with access to a local network to intercept, manipulate, replay, or for... Read more
Affected Products :- Published: Aug. 08, 2025
- Modified: Aug. 08, 2025
- Vuln Type: Cryptography
-
6.9
MEDIUMCVE-2025-47872
The public-facing product registration endpoint server responds differently depending on whether the S/N is valid and unregistered, valid but already registered, or does not exist in the database. Combined with the fact that serial numbers are sequenti... Read more
Affected Products :- Published: Aug. 08, 2025
- Modified: Aug. 08, 2025
- Vuln Type: Information Disclosure
-
8.8
HIGHCVE-2025-53520
The affected product allows firmware updates to be downloaded from EG4's website, transferred via USB dongles, or installed through EG4's Monitoring Center (remote, cloud-connected interface) or via a serial connection, and can install these files with... Read more
Affected Products :- Published: Aug. 08, 2025
- Modified: Aug. 08, 2025
- Vuln Type: Misconfiguration
-
9.8
CRITICALCVE-2025-8284
By default, the Packet Power Monitoring and Control Web Interface do not enforce authentication mechanisms. This vulnerability could allow unauthorized users to access and manipulate monitoring and control functions.... Read more
Affected Products :- Published: Aug. 08, 2025
- Modified: Aug. 08, 2025
- Vuln Type: Authentication
-
8.5
HIGHCVE-2025-8393
A TLS vulnerability exists in the phone application used to manage a connected device. The phone application accepts self-signed certificates when establishing TLS communication which may result in man-in-the-middle attacks on untrusted networks. Captu... Read more
Affected Products :- Published: Aug. 08, 2025
- Modified: Aug. 08, 2025
- Vuln Type: Misconfiguration
-
4.8
MEDIUMCVE-2025-8732
A vulnerability was found in libxml2 up to 2.14.5. It has been declared as problematic. This vulnerability affects the function xmlParseSGMLCatalog of the component xmlcatalog. The manipulation leads to uncontrolled recursion. Attacking locally is a requi... Read more
Affected Products : libxml2- Published: Aug. 08, 2025
- Modified: Aug. 08, 2025
- Vuln Type: Denial of Service
-
9.8
CRITICALCVE-2025-5095
Burk Technology ARC Solo's password change mechanism can be utilized without proper authentication procedures, allowing an attacker to take over the device. A password change request can be sent directly to the device's HTTP endpoint without providing ... Read more
Affected Products :- Published: Aug. 08, 2025
- Modified: Aug. 08, 2025
- Vuln Type: Authentication
-
8.7
HIGHCVE-2012-10042
Sflog! CMS 1.0 contains an authenticated arbitrary file upload vulnerability in the blog management interface. The application ships with default credentials (admin:secret) and allows authenticated users to upload files via manage.php. The upload mechanis... Read more
Affected Products :- Published: Aug. 08, 2025
- Modified: Aug. 08, 2025
- Vuln Type: Authentication
-
9.3
CRITICALCVE-2012-10043
A stack-based buffer overflow vulnerability exists in ActFax Server version 4.32, specifically in the "Import Users from File" functionality of the client interface. The application fails to properly validate the length of tab-delimited fields in .exp fil... Read more
Affected Products :- Published: Aug. 08, 2025
- Modified: Aug. 08, 2025
- Vuln Type: Memory Corruption
-
9.3
CRITICALCVE-2012-10045
XODA version 0.4.5 contains an unauthenticated file upload vulnerability that allows remote attackers to execute arbitrary PHP code on the server. The flaw resides in the upload functionality, which fails to properly validate or restrict uploaded file typ... Read more
Affected Products :- Published: Aug. 08, 2025
- Modified: Aug. 08, 2025
- Vuln Type: Authentication
-
8.7
HIGHCVE-2012-10048
Zenoss Core 3.x contains a command injection vulnerability in the showDaemonXMLConfig endpoint. The daemon parameter is passed directly to a Popen() call in ZenossInfo.py without proper sanitation, allowing authenticated users to execute arbitrary command... Read more
Affected Products : zenoss_core- Published: Aug. 08, 2025
- Modified: Aug. 08, 2025
- Vuln Type: Injection
-
9.3
CRITICALCVE-2012-10049
WebPageTest version 2.6 and earlier contains an arbitrary file upload vulnerability in the resultimage.php script. The application fails to validate or sanitize user-supplied input before saving uploaded files to a publicly accessible directory. This flaw... Read more
Affected Products :- Published: Aug. 08, 2025
- Modified: Aug. 08, 2025
- Vuln Type: Authentication
-
8.4
HIGHCVE-2012-10051
Photodex ProShow Producer version 5.0.3256 contains a stack-based buffer overflow vulnerability in the handling of plugin load list files. When a specially crafted load file is placed in the installation directory, the application fails to properly valida... Read more
Affected Products :- Published: Aug. 08, 2025
- Modified: Aug. 08, 2025
- Vuln Type: Memory Corruption
-
9.3
CRITICALCVE-2012-10053
Simple Web Server 2.2 rc2 contains a stack-based buffer overflow vulnerability in its handling of the Connection HTTP header. When a remote attacker sends an overly long string in this header, the server uses vsprintf() without proper bounds checking, lea... Read more
Affected Products :- Published: Aug. 08, 2025
- Modified: Aug. 08, 2025
- Vuln Type: Memory Corruption