7.8

CVSS3.1

CVE-2025-27689 -

Dell iDRAC Tools, version(s) prior to 11.3.0.0, contain(s) an Improper Access Control vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges.

๐Ÿ“… Published: June 12, 2025, 8:36 p.m. ๐Ÿ”„ Last Modified: Feb. 26, 2026, 5:50 p.m.

8.8

CVSS4.0

CVE-2025-5485 - SinoTrack GPS Receiver Weak Authentication

User names used to access the web management interface are limited to the device identifier, which is a numerical identifier no more than 10 digits. A malicious actor can enumerate potential targets by incrementing or decrementing from known identifiers or through enumerating random digit sequeโ€ฆ

๐Ÿ“… Published: June 12, 2025, 8:05 p.m. ๐Ÿ”„ Last Modified: April 15, 2026, 12:35 a.m.

8.8

CVSS3.1

CVE-2025-2843 - Observability-operator: observability operator privilege escalation

A flaw was found in the Observability Operator. The Operator creates a ServiceAccount with *ClusterRole* upon deployment of the *Namespace-Scoped* Custom Resource MonitorStack. This issue allows an adversarial Kubernetes Account with only namespaced-level roles, for example, a tenant controlling a โ€ฆ

๐Ÿ“… Published: June 12, 2025, 8:04 p.m. ๐Ÿ”„ Last Modified: April 15, 2026, 12:35 a.m.

7.6

CVSS4.0

CVE-2025-5484 - SinoTrack GPS Receiver Weak Authentication

A username and password are required to authenticate to the central SinoTrack device management interface. The username for all devices is an identifier printed on the receiver. The default password is well-known and common to all devices. Modification of the default password is not enforced duโ€ฆ

๐Ÿ“… Published: June 12, 2025, 8:03 p.m. ๐Ÿ”„ Last Modified: April 15, 2026, 12:35 a.m.

7.1

CVSS4.0

CVE-2025-36539 - AVEVA PI Data Archive Uncaught Exception

AVEVA PI Data Archive products are vulnerable to an uncaught exception that, if exploited, could allow an authenticated user to shut down certain necessary PI Data Archive subsystems, resulting in a denial of service.

๐Ÿ“… Published: June 12, 2025, 7:56 p.m. ๐Ÿ”„ Last Modified: April 15, 2026, 12:35 a.m.

7.1

CVSS4.0

CVE-2025-44019 - AVEVA PI Data Archive Uncaught Exception

AVEVA PI Data Archive products are vulnerable to an uncaught exception that, if exploited, could allow an authenticated user to shut down certain necessary PI Data Archive subsystems, resulting in a denial of service. Depending on the timing of the crash, data present in snapshots/write cache mโ€ฆ

๐Ÿ“… Published: June 12, 2025, 7:51 p.m. ๐Ÿ”„ Last Modified: April 15, 2026, 12:35 a.m.

4.5

CVSS4.0

CVE-2025-2745 - AVEVA PI Web API Cross-site Scripting

A cross-site scripting vulnerability exists in AVEVAย PI Web API version 2023 SP1 and prior that, if exploited, could allow an authenticated attacker (with privileges to create/update annotations or upload media files) to persist arbitrary JavaScript code that will be executed by users who were โ€ฆ

๐Ÿ“… Published: June 12, 2025, 7:42 p.m. ๐Ÿ”„ Last Modified: April 15, 2026, 12:35 a.m.

6.7

CVSS4.0

CVE-2025-4418 - AVEVA PI Connector for CygNet Improper Validation of Integrity Check Value

An improper validation of integrity check value vulnerability exists in AVEVAย PI Connector for CygNet Versions 1.6.14 and prior that, if exploited, could allow a miscreant with elevated privileges to modify PI Connector for CygNet local data files (cache and buffers) in a way that causes the cโ€ฆ

๐Ÿ“… Published: June 12, 2025, 7:37 p.m. ๐Ÿ”„ Last Modified: April 15, 2026, 12:35 a.m.

6.9

CVSS4.0

CVE-2025-4417 - AVEVA PI Connector for CygNet Cross-site Scripting

A cross-site scripting vulnerability exists in AVEVAย PI Connector for CygNet Versions 1.6.14 and prior that, if exploited, could allow an administrator miscreant with local access to the connector admin portal to persist arbitrary JavaScript code that will be executed by other users who visit โ€ฆ

๐Ÿ“… Published: June 12, 2025, 7:32 p.m. ๐Ÿ”„ Last Modified: April 15, 2026, 12:35 a.m.

7.7

CVSS4.0

CVE-2025-6031 - Insecure device pairing in end of life Amazon Cloud Cam

Amazon Cloud Cam is a home security camera that was deprecated on December 2, 2022, is end of life, and is no longer actively supported. When a user powers on the Amazon Cloud Cam, the device attempts to connect to a remote service infrastructure that has been deprecated due to end-of-life statusโ€ฆ

๐Ÿ“… Published: June 12, 2025, 7:29 p.m. ๐Ÿ”„ Last Modified: April 15, 2026, 12:35 a.m.
Total resulsts: 347814
Page 4904 of 34,782
ยซ previous page ยป next page
Filters