Show filters
2,455 Total Results
Displaying 31-40 of 2,455
Sort by:
Attacker Value
Unknown
CVE-2025-0815
Disclosure Date: February 13, 2025 (last updated February 13, 2025)
CWE-20: Improper Input Validation vulnerability exists that could cause Denial-of-Service of the
product when malicious ICMPV6 packets are sent to the device.
0
Attacker Value
Unknown
CVE-2025-0814
Disclosure Date: February 13, 2025 (last updated February 13, 2025)
CWE-20: Improper Input Validation vulnerability exists that could cause Denial-of-Service of the network
services running on the product when malicious IEC61850-MMS packets are sent to the device. The core
functionality of the breaker remains intact during the attack.
0
Attacker Value
Unknown
CVE-2025-0327
Disclosure Date: February 13, 2025 (last updated February 13, 2025)
CWE-269: Improper Privilege Management vulnerability exists for two services (of which one managing audit
trail data and the other acting as server managing client request) that could cause a loss of Confidentiality,
Integrity and Availability of engineering workstation when an attacker with standard privilege modifies the
executable path of the windows services. To be exploited, services need to be restarted.
0
Attacker Value
Unknown
CVE-2025-1070
Disclosure Date: February 13, 2025 (last updated February 13, 2025)
CWE-434: Unrestricted Upload of File with Dangerous Type vulnerability exists that could render the device
inoperable when a malicious file is downloaded.
0
Attacker Value
Unknown
CVE-2025-1060
Disclosure Date: February 13, 2025 (last updated February 13, 2025)
CWE-319: Cleartext Transmission of Sensitive Information vulnerability exists that could result in the exposure
of data when network traffic is being sniffed by an attacker.
0
Attacker Value
Unknown
CVE-2025-1059
Disclosure Date: February 13, 2025 (last updated February 13, 2025)
CWE-770: Allocation of Resources Without Limits or Throttling vulnerability exists that could
cause communications to stop when malicious packets are sent to the webserver of the device.
0
Attacker Value
Unknown
CVE-2025-1058
Disclosure Date: February 13, 2025 (last updated February 13, 2025)
CWE-494: Download of Code Without Integrity Check vulnerability exists that could render the device
inoperable when malicious firmware is downloaded.
0
Attacker Value
Unknown
CVE-2024-10083
Disclosure Date: February 13, 2025 (last updated February 13, 2025)
CWE-20: Improper Input Validation vulnerability exists that could cause denial of service of engineering
workstation when specific driver interface is invoked locally by an authenticated user with crafted input.
0
Attacker Value
Unknown
CVE-2025-1146
Disclosure Date: February 12, 2025 (last updated February 13, 2025)
CrowdStrike uses industry-standard TLS (transport layer security) to secure communications from the Falcon sensor to the CrowdStrike cloud. CrowdStrike has identified a validation logic error in the Falcon sensor for Linux, Falcon Kubernetes Admission Controller, and Falcon Container Sensor where our TLS connection routine to the CrowdStrike cloud can incorrectly process server certificate validation. This could allow an attacker with the ability to control network traffic to potentially conduct a man-in-the-middle (MiTM) attack. CrowdStrike identified this issue internally and released a security fix in all Falcon sensor for Linux, Falcon Kubernetes Admission Controller, and Falcon Container Sensor versions 7.06 and above.
CrowdStrike identified this issue through our longstanding, rigorous security review process, which has been continually strengthened with deeper source code analysis and ongoing program enhancements as part of our commitment to security resilience. CrowdStrike …
0
Attacker Value
Unknown
CVE-2024-13435
Disclosure Date: February 12, 2025 (last updated February 13, 2025)
The Ebook Downloader plugin for WordPress is vulnerable to SQL Injection via the 'download' parameter in all versions up to, and including, 1.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
0