7.5

CVSS3.1

CVE-2025-41724 - Sauter: Crash via Incomplete SOAP Request

An unauthenticated remote attacker can crash the wscserver by sending incomplete SOAP requests. The wscserver process will not be restarted by a watchdog and a device reboot is necessary to make it work again.

πŸ“… Published: Oct. 22, 2025, 7:03 a.m. πŸ”„ Last Modified: Oct. 23, 2025, 10:08 a.m.

9.8

CVSS3.1

CVE-2025-41723 - Sauter: Directory Traversal in importFile SOAP Method

The importFile SOAP method is vulnerable to a directory traversal attack. An unauthenticated remote attacker bypass the path restriction and upload files to arbitrary locations.

πŸ“… Published: Oct. 22, 2025, 7:01 a.m. πŸ”„ Last Modified: Oct. 23, 2025, 10:07 a.m.

7.5

CVSS3.1

CVE-2025-41722 - Sauter: Hard-coded Authentication Credentials

The wsc server uses a hard-coded certificate to check the authenticity of SOAP messages. An unauthenticated remote attacker can extract private keys from the Software of the affected devices.

πŸ“… Published: Oct. 22, 2025, 6:58 a.m. πŸ”„ Last Modified: Oct. 23, 2025, 10:07 a.m.

2.7

CVSS3.1

CVE-2025-41721 - Sauter: Command Injection

A high privileged remote attacker can influence the parameters passed to the openssl command due to improper neutralization of special elements when adding a password protected self-signed certificate.

πŸ“… Published: Oct. 22, 2025, 6:55 a.m. πŸ”„ Last Modified: Oct. 27, 2025, 10:12 p.m.

4.3

CVSS3.1

CVE-2025-41720 - Sauter: Arbitrary File Upload

A low privileged remote attacker can upload arbitrary data masked as a png file to the affected device using the webserver API because only the file extension is verified.

πŸ“… Published: Oct. 22, 2025, 6:52 a.m. πŸ”„ Last Modified: Oct. 23, 2025, 10:08 a.m.

8.8

CVSS3.1

CVE-2025-41719 - Sauter: Improper Validation of user-controlled data

A low privileged remote attacker can corrupt the webserver users storage on the device by setting a sequence of unsupported characters which leads to deletion of all previously configured users and the creation of the default Administrator with a known default password.

πŸ“… Published: Oct. 22, 2025, 6:48 a.m. πŸ”„ Last Modified: Oct. 23, 2025, 10:07 a.m.

4.3

CVSS3.1

CVE-2025-10570 - Flexible Refund and Return Order for WooCommerce <= 1.0.38 - Missing Authorization to Authenticated…

The Flexible Refund and Return Order for WooCommerce plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 1.0.38 via the save_refund_request() function. This makes it possible for authenticated attackers, with subscriber-level access and above, to submit…

πŸ“… Published: Oct. 22, 2025, 6:40 a.m. πŸ”„ Last Modified: April 8, 2026, 5:18 p.m.

4.4

CVSS3.1

CVE-2025-12033 - Simple Banner <= 3.0.10 - Authenticated (Admin+) Stored Cross-Site Scripting

The Simple Banner – Easily add multiple Banners/Bars/Notifications/Announcements to the top or bottom of your website plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'pro_version_activation_code' parameter in all versions up to, and including, 3.0.10 due to insufficient in…

πŸ“… Published: Oct. 22, 2025, 6:40 a.m. πŸ”„ Last Modified: April 8, 2026, 5:11 p.m.

4.3

CVSS3.1

CVE-2025-10588 - PixelYourSite <= 11.1.2 – Cross-Site Request Forgery to GDPR Options Modification

The PixelYourSite – Your smart PIXEL (TAG) & API Manager plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 11.1.2. This is due to missing or incorrect nonce validation on the adminEnableGdprAjax() function. This makes it possible for unauthentica…

πŸ“… Published: Oct. 22, 2025, 6:40 a.m. πŸ”„ Last Modified: April 8, 2026, 4:53 p.m.

6.5

CVSS3.1

CVE-2025-5983 - Meta Tag Manager < 3.3 - Contributor+ Open Redirect

The Meta Tag Manager WordPress plugin before 3.3 does not restrict which roles can create http-equiv refresh meta tags.

πŸ“… Published: Oct. 22, 2025, 6 a.m. πŸ”„ Last Modified: Oct. 23, 2025, 10:07 a.m.
Total resulsts: 343746
Page 2795 of 34,375
Β« previous page Β» next page
Filters