8.8

CVSS3.1

CVE-2025-41667 - Phoenix Contact: File access due to the replacement of a critical file used by the arp-preinit scri…

A low privileged remote attacker with file access can replace a critical file used by the arp-preinit script to get read, write and execute access to any file on the device.

πŸ“… Published: July 8, 2025, 7:03 a.m. πŸ”„ Last Modified: July 8, 2025, 4:18 p.m.

8.8

CVSS3.1

CVE-2025-41666 - Phoenix Contact: File access due to the replacement of a critical file used by the watchdog

A low privileged remote attacker with file access can replace a critical file used by the watchdog to get read, write and execute access to any file on the device after the watchdog has been initialized.

πŸ“… Published: July 8, 2025, 7:03 a.m. πŸ”„ Last Modified: July 8, 2025, 4:18 p.m.

6.5

CVSS3.1

CVE-2025-41665 - Phoenix Contact: DoS of the PLC due to incorrect default permissions possible

An low privileged remote attacker can enforce the watchdog of the affected devices to reboot the PLC due to incorrect default permissions of a config file.

πŸ“… Published: July 8, 2025, 7:03 a.m. πŸ”„ Last Modified: July 8, 2025, 4:18 p.m.

5.3

CVSS4.0

CVE-2025-7167 - code-projects Responsive Blog Site category.php sql injection

A vulnerability was found in code-projects Responsive Blog Site 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /category.php. The manipulation of the argument ID leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed …

πŸ“… Published: July 8, 2025, 7:02 a.m. πŸ”„ Last Modified: July 9, 2025, 1:48 p.m.

8.8

CVSS3.1

CVE-2025-25271 - OCPP Backend Configuration via Insecure Defaults

An unauthenticated adjacent attacker is able to configure a new OCPP backend, due to insecure defaults for the configuration interface.

πŸ“… Published: July 8, 2025, 7:01 a.m. πŸ”„ Last Modified: July 22, 2025, 7:50 a.m.

9.8

CVSS3.1

CVE-2025-25270 - Remote Code Execution via Unauthenticated Configuration Manipulation

An unauthenticated remote attacker can alter the device configuration in a way to get remote code execution as root with specific configurations.

πŸ“… Published: July 8, 2025, 7 a.m. πŸ”„ Last Modified: July 11, 2025, 2:37 p.m.

8.4

CVSS3.1

CVE-2025-25269 - Local Privilege Escalation via Unauthenticated Command Injection

An unauthenticated local attacker can inject a command that is subsequently executed as root, leading to a privilege escalation.

πŸ“… Published: July 8, 2025, 7 a.m. πŸ”„ Last Modified: July 11, 2025, 2:37 p.m.

8.8

CVSS3.1

CVE-2025-25268 - Unauthenticated Configuration Access via Exposed API Endpoint

An unauthenticated adjacent attacker can modify configuration by sending specific requests to an API-endpoint resulting in read and write access due to missing authentication.

πŸ“… Published: July 8, 2025, 7 a.m. πŸ”„ Last Modified: July 11, 2025, 2:37 p.m.

7.8

CVSS3.1

CVE-2025-24006 - Privilege Escalation via Insecure SSH Permissions

A low privileged local attacker can leverage insecure permissions via SSH on the affected devices to escalate privileges to root.

πŸ“… Published: July 8, 2025, 7 a.m. πŸ”„ Last Modified: July 11, 2025, 2:36 p.m.

7.8

CVSS3.1

CVE-2025-24005 - Local Privilege Escalation via Vulnerable SSH Script

A local attacker with a local user account can leverage a vulnerable script via SSH to escalate privileges to root due to improper input validation.

πŸ“… Published: July 8, 2025, 6:59 a.m. πŸ”„ Last Modified: July 11, 2025, 2:36 p.m.
Total resulsts: 344680
Page 4300 of 34,468
Β« previous page Β» next page
Filters