10
CVE-2025-24865 - mySCADA myPRO Manager Missing Authentication for Critical Function
The administrative web interface of mySCADA myPRO Manager can be accessed without authentication which could allow an unauthorized attacker to retrieve sensitive information and upload files without the associated password.
8.7
CVE-2025-24861 - Outback Power Mojave Inverter Command Injection
An attacker may inject commands via specially-crafted post requests.
8.7
CVE-2025-25281 - Outback Power Mojave Inverter Exposure of Sensitive Information to an Unauthorized Actor
An attacker may modify the URL to discover sensitive information about the target network.
8.7
CVE-2025-26473 - Outback Power Mojave Inverter Use of GET Request Method With Sensitive Query Strings
The Mojave Inverter uses the GET method for sensitive information.
9.3
CVE-2025-1283 - Dingtian DT-R0 Series Authentication Bypass Using an Alternate Path or Channel
The Dingtian DT-R0 Series is vulnerable to an exploit that allows attackers to bypass login requirements by directly navigating to the main page.
7.3
CVE-2024-11347 - Access of Resource Using Incompatible Type in Postscript interpreter
Integer Overflow or Wraparound vulnerability in Lexmark International CX, XC, CS, et. Al. (Postscript interpreter modules) allows Forced Integer Overflow.The vulnerability can be leveraged by an attacker to execute arbitrary code as an unprivileged user.
7.3
CVE-2024-11346 - Access of Resource Using Incompatible Type in Postscript interpreter
: Access of Resource Using Incompatible Type ('Type Confusion') vulnerability in Lexmark International CX, XC, CS, et. Al. (Postscript interpreter modules) allows Resource Injection.This issue affects CX, XC, CS, et. Al.: from 001.001:0 through 081.231, from *.*.P001 through *.*.P233, from *.*.P001โฆ
7.3
CVE-2024-11344 - Type confusion vulnerability in the Postscript interpreter in various Lexmark devices
A type confusion vulnerability has been identified in the Postscript interpreter in various Lexmark devices. The vulnerability can be leveraged by an attacker to execute arbitrary code.
9.1
CVE-2025-1127 - Combination Path Traversal and Concurrent Execution vulnerability exists within the embedded web seโฆ
The vulnerability can be leveraged by an attacker to execute arbitrary code as an unprivileged user and/or modify the contents of any data on the filesystem.
7.3
CVE-2024-11345 - Heap-based memory vulnerability in the Postscript interpreter in various Lexmark devices
A heap-based memory vulnerability has been identified in the Postscript interpreter in various Lexmark devices. The vulnerability can be leveraged by an attacker to execute arbitrary code.