6.9
CVE-2026-1020 - Gotac๏ฝPolice Statistics Database System - Absolute Path Traversal
Police Statistics Database System developed by Gotac has a Absolute Path Traversal vulnerability, allowing unauthenticated remote attackers to enumerate the system file directory.
9.3
CVE-2026-1019 - Gotac๏ฝPolice Statistics Database System - Missing Authentication
Police Statistics Database System developed by Gotac has a Missing Authentication vulnerability, allowing unauthenticated remote attackers to read, modify, and delete database contents by using a specific functionality.
8.7
CVE-2026-1018 - Gotac๏ฝPolice Statistics Database System - Arbitrary File Read
Police Statistics Database Systemย developed by Gotac has an Arbitrary File Read vulnerability, allowing Unauthenticated remote attacker to exploit Absolute Path Traversal to download arbitrary system files.
9.8
CVE-2025-62581 - DIAView - Authentication Bypass Vulnerability
Delta Electronics DIAView has multiple vulnerabilities.
9.8
CVE-2025-62582 - DIAView - Authentication Bypass Vulnerability
Delta Electronics DIAView has multiple vulnerabilities.
7.6
CVE-2025-64769 - AVEVA Process Optimization Cleartext Transmission of Sensitive Information
The Process Optimization application suite leverages connection channels/protocols that by-default are not encrypted and could become subject to hijacking or data leakage in certain man-in-the-middle or passive inspection scenarios.
8.5
CVE-2025-65117 - AVEVA Process Optimization Use of Potentially Dangerous Function
The vulnerability, if exploited, could allow an authenticated miscreant (Process Optimization Designer User) to embed OLE objects into graphics, and escalate their privileges to the identity of a victim user who subsequently interacts with the graphical elements.
8.6
CVE-2025-64729 - AVEVA Process Optimization Missing Authorization
The vulnerability, if exploited, could allow an authenticated miscreant (OS Standard User) to tamper with Process Optimization project files, embed code, and escalate their privileges to the identity of a victim user who subsequently interacts with the project files.
9.3
CVE-2025-65118 - AVEVA Process Optimization Uncontrolled Search Path Element
The vulnerability, if exploited, could allow an authenticated miscreant (OS Standard User) to trick Process Optimization services into loading arbitrary code and escalate privileges to OS System, potentially resulting in complete compromise of the Model Application Server.
9.3
CVE-2025-61943 - AVEVA Process Optimization SQL Injection
The vulnerability, if exploited, could allow an authenticated miscreant (Process Optimization Standard User) to tamper with queries in Captive Historian and achieve code execution under SQL Server administrative privileges, potentially resulting in complete compromise of the SQL Server.