6.9

CVSS4.0

CVE-2026-20895 - EV2GO ev2go.io Insufficient Session Expiration

The WebSocket backend uses charging station identifiers to uniquely associate sessions but allows multiple endpoints to connect using the same session identifier. This implementation results in predictable session identifiers and enables session hijacking or shadowing, where the most recent con…

πŸ“… Published: Feb. 26, 2026, 11:48 p.m. πŸ”„ Last Modified: April 17, 2026, 2:15 p.m.

8.7

CVSS4.0

CVE-2026-25945 - EV2GO ev2go.io Improper Restriction of Excessive Authentication Attempts

The WebSocket Application Programming Interface lacks restrictions on the number of authentication requests. This absence of rate limiting may allow an attacker to conduct denial-of-service attacks by suppressing or mis-routing legitimate charger telemetry, or conduct brute-force attacks to gai…

πŸ“… Published: Feb. 26, 2026, 11:46 p.m. πŸ”„ Last Modified: April 17, 2026, 2:15 p.m.

9.3

CVSS4.0

CVE-2026-24731 - EV2GO ev2go.io Missing Authentication for Critical Function

WebSocket endpoints lack proper authentication mechanisms, enabling attackers to perform unauthorized station impersonation and manipulate data sent to the backend. An unauthenticated attacker can connect to the OCPP WebSocket endpoint using a known or discovered charging station identifier, th…

πŸ“… Published: Feb. 26, 2026, 11:43 p.m. πŸ”„ Last Modified: April 16, 2026, 4 p.m.

8.4

CVSS4.0

CVE-2026-1585 -

An unquoted Windows service executable path vulnerability in IJ Scan Utility for Windows versions 1.1.2 through 1.5.0 may allow a local attacker to execute a malicious file with the privileges of the affected service.

πŸ“… Published: Feb. 26, 2026, 11:39 p.m. πŸ”„ Last Modified: April 16, 2026, 4 p.m.

6.9

CVSS4.0

CVE-2026-20733 - CloudCharge cloudcharge.se Insufficiently Protected Credentials

Charging station authentication identifiers are publicly accessible via web-based mapping platforms.

πŸ“… Published: Feb. 26, 2026, 11:38 p.m. πŸ”„ Last Modified: April 16, 2026, 6:15 a.m.

6.9

CVSS4.0

CVE-2026-27652 - CloudCharge cloudcharge.se Insufficient Session Expiration

The WebSocket backend uses charging station identifiers to uniquely associate sessions but allows multiple endpoints to connect using the same session identifier. This implementation results in predictable session identifiers and enables session hijacking or shadowing, where the most recent con…

πŸ“… Published: Feb. 26, 2026, 11:36 p.m. πŸ”„ Last Modified: April 16, 2026, 6:15 a.m.

8.2

CVSS3.1

CVE-2025-40932 - Apache::SessionX versions through 2.01 for Perl create insecure session id

Apache::SessionX versions through 2.01 for Perl create insecure session id. Apache::SessionX generates session ids insecurely. The default session id generator in Apache::SessionX::Generate::MD5 returns a MD5 hash seeded with the built-in rand() function, the epoch time, and the PID. The PID will …

πŸ“… Published: Feb. 26, 2026, 11:33 p.m. πŸ”„ Last Modified: March 3, 2026, 7:36 p.m.

5.3

CVSS4.0

CVE-2026-3270 - psi-probe PSI Probe Whois Whois.java lookup server-side request forgery

A vulnerability has been found in psi-probe PSI Probe up to 5.3.0. This affects the function lookup of the file psi-probe-core/src/main/java/psiprobe/tools/Whois.java of the component Whois. The manipulation leads to server-side request forgery. The attack may be initiated remotely. The exploit has…

πŸ“… Published: Feb. 26, 2026, 11:32 p.m. πŸ”„ Last Modified: April 17, 2026, 2:15 p.m.

5.3

CVSS4.0

CVE-2026-3269 - psi-probe PSI Probe Session ExpireSessionsController.java handleRequestInternal denial of service

A flaw has been found in psi-probe PSI Probe up to 5.3.0. The impacted element is the function handleRequestInternal of the file psi-probe-core/src/main/java/psiprobe/controllers/sessions/ExpireSessionsController.java of the component Session Handler. Executing a manipulation can lead to denial of …

πŸ“… Published: Feb. 26, 2026, 11:32 p.m. πŸ”„ Last Modified: April 17, 2026, 2:15 p.m.

7.5

CVSS3.1

CVE-2026-2597 - Crypt::SysRandom::XS versions before 0.010 for Perl is vulnerable to a heap buffer overflow in the …

Crypt::SysRandom::XS versions before 0.010 for Perl is vulnerable to a heap buffer overflow in the XS function random_bytes(). The function does not validate that the length parameter is non-negative. If a negative value (e.g. -1) is supplied, the expression length + 1u causes an integer wraparoun…

πŸ“… Published: Feb. 26, 2026, 11:29 p.m. πŸ”„ Last Modified: April 18, 2026, 10:30 a.m.
Total resulsts: 349182
Page 1415 of 34,919
Β« previous page Β» next page
Filters