5.3

CVSS4.0

CVE-2025-14848 - Advantech WebAccess/SCADA Absolute Path Traversal

Advantech WebAccess/SCADA is vulnerable to absolute directory traversal, which may allow an attacker to determine the existence of arbitrary files.

πŸ“… Published: Dec. 18, 2025, 8:34 p.m. πŸ”„ Last Modified: Dec. 31, 2025, 7:49 p.m.

5.3

CVSS4.0

CVE-2025-62002 - BullWall Ransomware Containment file count detection bypass

BullWall Ransomware Containment considers the number of files modified to trigger detection. An authenticated attacker could encrypt a single (possibly large) file without triggering detection if thresholds are configured to require multiple file changes. The number of files to trigger detection ca…

πŸ“… Published: Dec. 18, 2025, 8:33 p.m. πŸ”„ Last Modified: Jan. 15, 2026, 8:16 p.m.

8.7

CVSS4.0

CVE-2025-14849 - Advantech WebAccess/SCADA Unrestricted Upload of File with Dangerous Type

Advantech WebAccess/SCADAΒ  is vulnerable to unrestricted file upload, which may allow an attacker to remotely execute arbitrary code.

πŸ“… Published: Dec. 18, 2025, 8:32 p.m. πŸ”„ Last Modified: Dec. 31, 2025, 7:47 p.m.

8.7

CVSS4.0

CVE-2025-62001 - BullWall Ransomware Containment hard-coded folder exclusions

BullWall Ransomware Containment supports configurable file and directory exclusions such as '$RECYCLE.BIN' to balance monitoring scope and performance. Certain exclusion patterns could allow an authenticated attacker to rename directories in a way that avoids monitoring. Fixed in 4.6.1.14 and 5.0.0…

πŸ“… Published: Dec. 18, 2025, 8:32 p.m. πŸ”„ Last Modified: Jan. 15, 2026, 8:16 p.m.

6.9

CVSS4.0

CVE-2025-62000 - BullWall Ransomware Containment incomplete file inspection

BullWall Ransomware Containment may not always detect an encrypted file. This issue affects a specific file inspection method that evaluates file content based on header bytes. An authenticated attacker could encrypt files, preserving the first four bytes and preventing this particular method from …

πŸ“… Published: Dec. 18, 2025, 8:32 p.m. πŸ”„ Last Modified: Jan. 15, 2026, 7:50 p.m.

7.2

CVSS4.0

CVE-2025-14850 - Advantech WebAccess/SCADA Improper Limitation of a Pathname to a Restricted Directory

Advantech WebAccess/SCADAΒ is vulnerable to directory traversal, which may allow an attacker to delete arbitrary files.

πŸ“… Published: Dec. 18, 2025, 8:30 p.m. πŸ”„ Last Modified: Dec. 31, 2025, 7:44 p.m.

7.3

CVSS4.0

CVE-2025-13911 - Inductive Automation Ignition Execution with Unnecessary Privileges

The vulnerability affects Ignition SCADA applications where Python scripting is utilized for automation purposes. The vulnerability arises from the absence of proper security controls that restrict which Python libraries can be imported and executed within the scripting environment. The core is…

πŸ“… Published: Dec. 18, 2025, 8:24 p.m. πŸ”„ Last Modified: April 15, 2026, 12:35 a.m.

5.3

CVSS4.0

CVE-2025-14889 - Campcodes Advanced Voting Management System Password voters_edit.php improper authorization

A security flaw has been discovered in Campcodes Advanced Voting Management System 1.0. The impacted element is an unknown function of the file /admin/voters_edit.php of the component Password Handler. Performing a manipulation of the argument ID results in improper authorization. The attack is pos…

πŸ“… Published: Dec. 18, 2025, 8:02 p.m. πŸ”„ Last Modified: Feb. 24, 2026, 6:16 a.m.

8.4

CVSS4.0

CVE-2023-53940 - Codigo Markdown Editor 1.0.1 Electron Arbitrary Code Execution via Markdown File

Codigo Markdown Editor 1.0.1 contains a code execution vulnerability that allows attackers to run arbitrary system commands by crafting a malicious markdown file. Attackers can embed a video source with an onerror event that executes shell commands through Node.js child_process module when the file…

πŸ“… Published: Dec. 18, 2025, 7:57 p.m. πŸ”„ Last Modified: April 15, 2026, 12:35 a.m.

8.5

CVSS4.0

CVE-2023-53937 - Hubstaff 1.6.14 DLL Search Order Hijacking via wow64log Library

Hubstaff 1.6.14 contains a DLL search order hijacking vulnerability that allows attackers to replace a missing system32 wow64log.dll with a malicious library. Attackers can generate a custom DLL using Metasploit and place it in the system32 directory to obtain a reverse shell during application sta…

πŸ“… Published: Dec. 18, 2025, 7:57 p.m. πŸ”„ Last Modified: April 7, 2026, 2:07 p.m.
Total resulsts: 346107
Page 2199 of 34,611
Β« previous page Β» next page
Filters