2

CVSS4.0

CVE-2025-2864 - Reflected Cross-Site Scripting (XSS) vulnerability in saTECH BCU

SaTECH BCU in its firmware version 2.1.3 allows an attacker to inject malicious code into the legitimate website owning the affected device, once the cookie is set. This attack only impacts the victim's browser (reflected XSS).

๐Ÿ“… Published: March 28, 2025, 1:23 p.m. ๐Ÿ”„ Last Modified: Oct. 10, 2025, 4:31 p.m.

5.7

CVSS4.0

CVE-2025-2863 - Cross-site request forgery (CSRF) vulnerability in saTECH BCU

Cross-site request forgery (CSRF) vulnerability in the web application of saTECH BCU firmware version 2.1.3, which could allow an unauthenticated local attacker to exploit active administrator sessions and perform malicious actions. The malicious actions that can be executed by the attacker depend โ€ฆ

๐Ÿ“… Published: March 28, 2025, 1:22 p.m. ๐Ÿ”„ Last Modified: Oct. 10, 2025, 4:38 p.m.

4.5

CVSS3.1

CVE-2025-0986 - IBM PowerVM Hypervisor data manipulation

IBM PowerVM Hypervisor FW1050.00 through FW1050.30 and FW1060.00 through FW1060.20 could allow a local user, under certain Linux processor combability mode configurations, to cause undetected data loss or errors when performing gzip compression using HW acceleration.

๐Ÿ“… Published: March 28, 2025, 1:21 p.m. ๐Ÿ”„ Last Modified: Sept. 1, 2025, 1 a.m.

6.9

CVSS4.0

CVE-2025-2862 - Weak Encoding for Password vulnerability in saTECH BCU

SaTECH BCU, in its firmware version 2.1.3, performs weak password encryption. This allows an attacker with access to the device's system or website to obtain the credentials, as the storage methods used are not strong enough in terms of encryption.

๐Ÿ“… Published: March 28, 2025, 1:15 p.m. ๐Ÿ”„ Last Modified: Oct. 15, 2025, 4:50 p.m.

6.9

CVSS4.0

CVE-2025-2861 - Cleartext Transmission of Sensitive Information vulnerability in saTECH BCU

SaTECH BCU in its firmware version 2.1.3 uses the HTTP protocol. The use of the HTTP protocol for web browsing has the problem that information is exchanged in unencrypted text. Since sensitive data such as credentials are exchanged, an attacker could obtain them and log in legitimately.

๐Ÿ“… Published: March 28, 2025, 1:11 p.m. ๐Ÿ”„ Last Modified: Oct. 10, 2025, 4:39 p.m.

6.9

CVSS4.0

CVE-2025-2860 - Exposure of Sensitive Information vulnerability in saTECH BCU

SaTECH BCU in its firmware version 2.1.3, allows an authenticated attacker to access information about the credentials that users have within the web (.xml file). In order to exploit this vulnerability, the attacker must know the path, regardless of the user's privileges on the website.

๐Ÿ“… Published: March 28, 2025, 1:10 p.m. ๐Ÿ”„ Last Modified: Oct. 10, 2025, 4:40 p.m.

6.9

CVSS4.0

CVE-2025-2859 - Improper Authentication vulnerability in saTECH BCU

An attacker with networkย access,ย could capture traffic and obtain user cookies, allowing the attacker to steal the active user session and make changes to the device via web, depending on the privileges obtained by the user.

๐Ÿ“… Published: March 28, 2025, 1:09 p.m. ๐Ÿ”„ Last Modified: Oct. 10, 2025, 4:40 p.m.

8.5

CVSS4.0

CVE-2025-2858 - Privilege escalation vulnerability in saTECH BCU

Privilege escalation vulnerability in the saTECH BCU firmware version 2.1.3. An attacker with access to the CLI of the device could make use of the nice command to bypass all restrictions and elevate privileges as a superuser.

๐Ÿ“… Published: March 28, 2025, 1:08 p.m. ๐Ÿ”„ Last Modified: Oct. 15, 2025, 4:52 p.m.

5.3

CVSS4.0

CVE-2025-2911 - Improper Restriction of Excessive Authentication Attempts vulnerability in MeetMe products

Unauthorised access to the call forwarding service system in MeetMe products in versions prior to 2024-09 allows an attacker to identify multiple users and perform brute force attacks via extensions.

๐Ÿ“… Published: March 28, 2025, 12:54 p.m. ๐Ÿ”„ Last Modified: April 15, 2026, 12:35 a.m.

8.2

CVSS4.0

CVE-2024-7407 - Weak password encoding in Streamsoft Prestiลผ

Use of a custom password encoding algorithmย in Streamsoft Prestiลผ software allows straightforward decoding of passwords using their encoded forms, which are stored in the application's database. One has to know the encoding algorithm, but it can be deduced by observing how password are transformed.โ€ฆ

๐Ÿ“… Published: March 28, 2025, 12:54 p.m. ๐Ÿ”„ Last Modified: April 15, 2026, 12:35 a.m.
Total resulsts: 347632
Page 5991 of 34,764
ยซ previous page ยป next page
Filters