6.9

CVSS4.0

CVE-2026-27027 - Everon api.everon.io Insufficiently Protected Credentials

Charging station authentication identifiers are publicly accessible via web-based mapping platforms.

πŸ“… Published: March 6, 2026, 3:20 p.m. πŸ”„ Last Modified: April 16, 2026, 11:30 a.m.

6.9

CVSS4.0

CVE-2026-20748 - Everon api.everon.io Insufficient Session Expiration

The WebSocket backend uses charging station identifiers to uniquely associate sessions but allows multiple endpoints to connect using the same session identifier. This implementation results in predictable session identifiers and enables session hijacking or shadowing, where the most recent connect…

πŸ“… Published: March 6, 2026, 3:18 p.m. πŸ”„ Last Modified: April 18, 2026, 7:45 p.m.

8.7

CVSS4.0

CVE-2026-24696 - Everon api.everon.io Improper Restriction of Excessive Authentication Attempts

The WebSocket Application Programming Interface lacks restrictions on the number of authentication requests. This absence of rate limiting may allow an attacker to conduct denial-of-service attacks by suppressing or mis-routing legitimate charger telemetry, or conduct brute-force attacks to gain un…

πŸ“… Published: March 6, 2026, 3:16 p.m. πŸ”„ Last Modified: April 16, 2026, 11:30 a.m.

9.3

CVSS4.0

CVE-2026-26288 - Everon api.everon.io Missing Authentication for Critical Function

WebSocket endpoints lack proper authentication mechanisms, enabling attackers to perform unauthorized station impersonation and manipulate data sent to the backend. An unauthenticated attacker can connect to the OCPP WebSocket endpoint using a known or discovered charging station identifier, then i…

πŸ“… Published: March 6, 2026, 3:15 p.m. πŸ”„ Last Modified: April 16, 2026, 11:30 a.m.

6.9

CVSS4.0

CVE-2026-27777 - Mobiliti e-mobi.hu Insufficiently Protected Credentials

Charging station authentication identifiers are publicly accessible via web-based mapping platforms.

πŸ“… Published: March 6, 2026, 3:09 p.m. πŸ”„ Last Modified: April 16, 2026, 4:45 a.m.

6.9

CVSS4.0

CVE-2026-27764 - Mobiliti e-mobi.hu Insufficient Session Expiration

The WebSocket backend uses charging station identifiers to uniquely associate sessions but allows multiple endpoints to connect using the same session identifier. This implementation results in predictable session identifiers and enables session hijacking or shadowing, where the most recent connect…

πŸ“… Published: March 6, 2026, 3:07 p.m. πŸ”„ Last Modified: April 16, 2026, 11:30 a.m.

8.7

CVSS4.0

CVE-2026-20882 - Mobiliti e-mobi.hu Improper Restriction of Excessive Authentication Attempts

The WebSocket Application Programming Interface lacks restrictions on the number of authentication requests. This absence of rate limiting may allow an attacker to conduct denial-of-service attacks by suppressing or mis-routing legitimate charger telemetry, or conduct brute-force attacks to gain un…

πŸ“… Published: March 6, 2026, 3:05 p.m. πŸ”„ Last Modified: April 16, 2026, 11:30 a.m.

7.5

CVSS3.1

CVE-2026-2754 - Unauthenticated HTTP API Disclosure in Navtor NavBox

Navtor NavBox exposes sensitive configuration and operational data due to missing authentication on HTTP API endpoints. An unauthenticated remote attacker with network access to the device can execute HTTP GET requests to TCP port 8080 to retrieve internal network parameters including ECDIS & OT In…

πŸ“… Published: March 6, 2026, 3:05 p.m. πŸ”„ Last Modified: April 16, 2026, 11:30 a.m.

7.5

CVSS3.1

CVE-2026-2753 - Absolute Path Traversal Exposes Arbitrary Files in Navtor NavBox

An Absolute Path Traversal vulnerability exists in Navtor NavBox. The application exposes an HTTP service that fails to properly sanitize user-supplied path input. Unauthenticated remote attackers can exploit this issue by submitting requests containing absolute filesystem paths. Successful exploit…

πŸ“… Published: March 6, 2026, 3:04 p.m. πŸ”„ Last Modified: April 16, 2026, 11:30 a.m.

5.3

CVSS3.1

CVE-2026-2752 - Information Disclosure via Verbose .NET Stack Traces in NavBox /api/ais-data

Navtor NavBox allows information disclosure via the /api/ais-data endpoint. A remote, unauthenticated attacker can send crafted requests to trigger an unhandled exception, causing the server to return verbose .NET stack traces. These error messages expose internal class names, method calls, and thi…

πŸ“… Published: March 6, 2026, 3:04 p.m. πŸ”„ Last Modified: April 17, 2026, 12:30 p.m.
Total resulsts: 346585
Page 1015 of 34,659
Β« previous page Β» next page
Filters