7.2

CVSS3.1

CVE-2024-12010 -

A post-authentication command injection vulnerability in the ”zyUtilMailSend” function of the Zyxel AX7501-B1 firmware version V5.17(ABPC.5.3)C0 and earlier could allow an authenticated attacker with administrator privileges to execute operating system (OS) commands on a vulnerable device.

📅 Published: March 11, 2025, 1:44 a.m. 🔄 Last Modified: Feb. 26, 2026, 7:09 p.m.

7.2

CVSS3.1

CVE-2024-12009 -

A post-authentication command injection vulnerability in the "ZyEE" function of the Zyxel EX5601-T1 firmware version V5.70(ACDZ.3.6)C0 and earlier could allow an authenticated attacker with administrator privileges to execute operating system (OS) commands on a vulnerable device.

📅 Published: March 11, 2025, 1:37 a.m. 🔄 Last Modified: Feb. 26, 2026, 7:09 p.m.

7.2

CVSS3.1

CVE-2024-11253 -

A post-authentication command injection vulnerability in the "DNSServer” parameter of the diagnostic function in the Zyxel VMG8825-T50K firmware version V5.50(ABOM.8.5)C0 and earlier could allow an authenticated attacker with administrator privileges to execute operating system (OS) commands on a v…

📅 Published: March 11, 2025, 1:29 a.m. 🔄 Last Modified: Feb. 26, 2026, 7:09 p.m.

6.5

CVSS3.1

CVE-2024-22340 - IBM Common Cryptographic Architecture information disclosure

IBM Common Cryptographic Architecture 7.0.0 through 7.5.51 could allow a remote attacker to obtain sensitive information during the creation of ECDSA signatures to perform a timing-based attack.

📅 Published: March 11, 2025, 12:50 a.m. 🔄 Last Modified: Sept. 1, 2025, 1:07 a.m.

3.7

CVSS3.1

CVE-2024-41760 - IBM Common Cryptographic Architecture information disclosure

IBM Common Cryptographic Architecture 7.0.0 through 7.5.51 could allow an attacker to obtain sensitive information due to a timing attack during certain RSA operations.

📅 Published: March 11, 2025, 12:49 a.m. 🔄 Last Modified: Sept. 1, 2025, 1:06 a.m.

6.5

CVSS3.1

CVE-2024-49823 - IBM Common Cryptographic Architecture denial of service

IBM Common Cryptographic Architecture 7.0.0 through 7.5.51 could allow an authenticated user to cause a denial of service in the Hardware Security Module (HSM) using a specially crafted sequence of valid requests.

📅 Published: March 11, 2025, 12:48 a.m. 🔄 Last Modified: Sept. 1, 2025, 1:07 a.m.

4.3

CVSS3.1

CVE-2025-27436 - Broken Access Control vulnerabilities in SAP S/4HANA (Manage Bank Statements)

The Manage Bank Statements in SAP S/4HANA does not perform required access control checks for an authenticated user to confirm whether a request to interact with a resource is legitimate, allowing the attacker to delete the attachment of a posted bank statement. This leads to a low impact on integr…

📅 Published: March 11, 2025, 12:39 a.m. 🔄 Last Modified: April 15, 2026, 12:35 a.m.

8.8

CVSS3.1

CVE-2025-27434 - Cross-Site Scripting (XSS) vulnerability in SAP Commerce (Swagger UI)

Due to insufficient input validation, SAP Commerce (Swagger UI) allows an unauthenticated attacker to inject the malicious code from remote sources, which can be leveraged by an attacker to execute a cross-site scripting (XSS) attack. This could lead to a high impact on the confidentiality, integri…

📅 Published: March 11, 2025, 12:39 a.m. 🔄 Last Modified: April 15, 2026, 12:35 a.m.

4.3

CVSS3.1

CVE-2025-27433 - Broken Access Control vulnerabilities in SAP S/4HANA (Manage Bank Statements)

The Manage Bank Statements in SAP S/4HANA allows authenticated attacker to bypass certain functionality restrictions of the application and upload files to a reversed bank statement. This vulnerability has a low impact on the application's integrity, with no effect on confidentiality and availabili…

📅 Published: March 11, 2025, 12:38 a.m. 🔄 Last Modified: April 15, 2026, 12:35 a.m.

2.4

CVSS3.1

CVE-2025-27432 - Missing Authorization check in SAP Electronic Invoicing for Brazil (eDocument Cockpit)

The eDocument Cockpit (Inbound NF-e) in SAP Electronic Invoicing for Brazil allows an authenticated attacker with certain privileges to gain unauthorized access to each transaction. By executing the specific ABAP method within the ABAP system, an unauthorized attacker could call each transaction an…

📅 Published: March 11, 2025, 12:38 a.m. 🔄 Last Modified: April 15, 2026, 12:35 a.m.
Total resulsts: 349182
Page 6395 of 34,919
« previous page » next page
Filters