Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Security Vulnerabilities328373
CVE-2025-10228
Assigner-TR-CERT (Computer Emergency Response Team of the Republic of Türkiye)
ShareView Details
Assigner-TR-CERT (Computer Emergency Response Team of the Republic of Türkiye)
CVSS Score-8.8||HIGH
EPSS-0.05% / 16.33%
||
7 Day CHG~0.00%
Published-14 Oct, 2025 | 09:20
Updated-14 Oct, 2025 | 19:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Session Hijacking in Rolantis Information Technologies' Agentis

Session Fixation vulnerability in Rolantis Information Technologies Agentis allows Session Hijacking.This issue affects Agentis: before 4.44.

Action-Not Available
Vendor-Rolantis Information Technologies
Product-Agentis
CWE ID-CWE-384
Session Fixation
CVE-2025-40812
Assigner-Siemens
ShareView Details
Assigner-Siemens
CVSS Score-7.3||HIGH
EPSS-0.02% / 4.50%
||
7 Day CHG~0.00%
Published-14 Oct, 2025 | 09:15
Updated-16 Oct, 2025 | 13:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in Solid Edge SE2024 (All versions < V224.0 Update 14), Solid Edge SE2025 (All versions < V225.0 Update 6). The affected applications contains an out of bounds read vulnerability while parsing specially crafted PRT files. This could allow an attacker to crash the application or execute code in the context of the current process.

Action-Not Available
Vendor-Siemens AG
Product-solid_edge_se2024solid_edge_se2025Solid Edge SE2025Solid Edge SE2024
CWE ID-CWE-125
Out-of-bounds Read
CVE-2025-40811
Assigner-Siemens
ShareView Details
Assigner-Siemens
CVSS Score-7.3||HIGH
EPSS-0.02% / 4.50%
||
7 Day CHG~0.00%
Published-14 Oct, 2025 | 09:15
Updated-16 Oct, 2025 | 13:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in Solid Edge SE2024 (All versions < V224.0 Update 14), Solid Edge SE2025 (All versions < V225.0 Update 6). The affected applications contains an out of bounds read vulnerability while parsing specially crafted PRT files. This could allow an attacker to crash the application or execute code in the context of the current process.

Action-Not Available
Vendor-Siemens AG
Product-solid_edge_se2024solid_edge_se2025Solid Edge SE2025Solid Edge SE2024
CWE ID-CWE-125
Out-of-bounds Read
CVE-2025-40810
Assigner-Siemens
ShareView Details
Assigner-Siemens
CVSS Score-7.3||HIGH
EPSS-0.03% / 6.42%
||
7 Day CHG~0.00%
Published-14 Oct, 2025 | 09:15
Updated-16 Oct, 2025 | 13:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in Solid Edge SE2024 (All versions < V224.0 Update 14), Solid Edge SE2025 (All versions < V225.0 Update 6). The affected applications contains an out of bounds write vulnerability while parsing specially crafted PRT files. This could allow an attacker to crash the application or execute code in the context of the current process.

Action-Not Available
Vendor-Siemens AG
Product-solid_edge_se2024solid_edge_se2025Solid Edge SE2025Solid Edge SE2024
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-40809
Assigner-Siemens
ShareView Details
Assigner-Siemens
CVSS Score-7.3||HIGH
EPSS-0.03% / 6.42%
||
7 Day CHG~0.00%
Published-14 Oct, 2025 | 09:15
Updated-16 Oct, 2025 | 14:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in Solid Edge SE2024 (All versions < V224.0 Update 14), Solid Edge SE2025 (All versions < V225.0 Update 6). The affected applications contains an out of bounds write vulnerability while parsing specially crafted PRT files. This could allow an attacker to crash the application or execute code in the context of the current process.

Action-Not Available
Vendor-Siemens AG
Product-solid_edge_se2024solid_edge_se2025Solid Edge SE2025Solid Edge SE2024
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-40774
Assigner-Siemens
ShareView Details
Assigner-Siemens
CVSS Score-6.7||MEDIUM
EPSS-0.02% / 3.96%
||
7 Day CHG~0.00%
Published-14 Oct, 2025 | 09:15
Updated-16 Oct, 2025 | 14:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in SiPass integrated (All versions < V3.0). Affected server applications store user passwords encrypted in its database. Decryption keys are accessible to users with administrative privileges, allowing them to recover passwords. Successful exploitation of this vulnerability allows an attacker to obtain and use valid user passwords. This can lead to unauthorized access to user accounts, data breaches, and potential system compromise.

Action-Not Available
Vendor-Siemens AG
Product-sipass_integratedSiPass integrated
CWE ID-CWE-257
Storing Passwords in a Recoverable Format
CVE-2025-40773
Assigner-Siemens
ShareView Details
Assigner-Siemens
CVSS Score-5.1||MEDIUM
EPSS-0.05% / 15.00%
||
7 Day CHG~0.00%
Published-14 Oct, 2025 | 09:15
Updated-16 Oct, 2025 | 15:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in SiPass integrated (All versions < V3.0). Affected server applications contains a broken access control vulnerability. The authorization mechanism lacks sufficient server-side checks, allowing an attacker to execute a specific API request. Successful exploitation allows an attacker to potentially manipulate data belonging to other users.

Action-Not Available
Vendor-Siemens AG
Product-sipass_integratedSiPass integrated
CWE ID-CWE-639
Authorization Bypass Through User-Controlled Key
CVE-2025-40772
Assigner-Siemens
ShareView Details
Assigner-Siemens
CVSS Score-7||HIGH
EPSS-0.06% / 20.10%
||
7 Day CHG~0.00%
Published-14 Oct, 2025 | 09:15
Updated-16 Oct, 2025 | 15:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in SiPass integrated (All versions < V3.0). Affected server applications are vulnerable to stored Cross-Site Scripting (XSS), allowing an attacker to inject malicious code that can be executed by other users when they visit the affected page. Successful exploitation allows an attacker to impersonate other users within the application and steal their session data. This could enable unauthorized access to accounts and potentially lead to privilege escalation.

Action-Not Available
Vendor-Siemens AG
Product-sipass_integratedSiPass integrated
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-40771
Assigner-Siemens
ShareView Details
Assigner-Siemens
CVSS Score-9.3||CRITICAL
EPSS-0.13% / 32.61%
||
7 Day CHG~0.00%
Published-14 Oct, 2025 | 09:15
Updated-14 Oct, 2025 | 19:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in SIMATIC CP 1542SP-1 (6GK7542-6UX00-0XE0) (All versions < V2.4.24), SIMATIC CP 1542SP-1 IRC (6GK7542-6VX00-0XE0) (All versions < V2.4.24), SIMATIC CP 1543SP-1 (6GK7543-6WX00-0XE0) (All versions < V2.4.24), SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL (6AG2542-6VX00-4XE0) (All versions < V2.4.24), SIPLUS ET 200SP CP 1543SP-1 ISEC (6AG1543-6WX00-7XE0) (All versions < V2.4.24), SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (6AG2543-6WX00-4XE0) (All versions < V2.4.24). Affected devices do not properly authenticate configuration connections. This could allow an unauthenticated remote attacker to access the configuration data.

Action-Not Available
Vendor-Siemens AG
Product-SIPLUS ET 200SP CP 1542SP-1 IRC TX RAILSIMATIC CP 1543SP-1SIMATIC CP 1542SP-1SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAILSIPLUS ET 200SP CP 1543SP-1 ISECSIMATIC CP 1542SP-1 IRC
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2025-40765
Assigner-Siemens
ShareView Details
Assigner-Siemens
CVSS Score-9.3||CRITICAL
EPSS-0.13% / 32.61%
||
7 Day CHG~0.00%
Published-14 Oct, 2025 | 09:15
Updated-21 Oct, 2025 | 14:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in TeleControl Server Basic V3.1 (All versions >= V3.1.2.2 < V3.1.2.3). The affected application contains an information disclosure vulnerability. This could allow an unauthenticated remote attacker to obtain password hashes of users and to login to and perform authenticated operations of the database service.

Action-Not Available
Vendor-Siemens AG
Product-telecontrol_server_basicTeleControl Server Basic V3.1
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2025-40755
Assigner-Siemens
ShareView Details
Assigner-Siemens
CVSS Score-8.7||HIGH
EPSS-0.04% / 13.00%
||
7 Day CHG~0.00%
Published-14 Oct, 2025 | 09:15
Updated-25 Nov, 2025 | 14:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in SINEC NMS (All versions < V4.0 SP1). Affected applications are vulnerable to SQL injection through getTotalAndFilterCounts endpoint. An authenticated low privileged attacker could exploit to insert data and achieve privilege escalation. (ZDI-CAN-26570)

Action-Not Available
Vendor-Siemens AG
Product-sinec_nmsSINEC NMS
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVE-2011-20002
Assigner-Siemens
ShareView Details
Assigner-Siemens
CVSS Score-8.3||HIGH
EPSS-0.06% / 18.37%
||
7 Day CHG~0.00%
Published-14 Oct, 2025 | 09:14
Updated-14 Oct, 2025 | 19:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in SIMATIC S7-1200 CPU V1 family (incl. SIPLUS variants) (All versions < V2.0.2), SIMATIC S7-1200 CPU V2 family (incl. SIPLUS variants) (All versions < V2.0.2). Affected controllers are vulnerable to capture-replay in the communication with the engineering software. This could allow an on-path attacker between the engineering software and the controller to execute any previously recorded commands at a later time (e.g. set the controller to STOP), regardless whether or not the controller had a password configured.

Action-Not Available
Vendor-Siemens AG
Product-SIMATIC S7-1200 CPU V2 family (incl. SIPLUS variants)SIMATIC S7-1200 CPU V1 family (incl. SIPLUS variants)
CWE ID-CWE-294
Authentication Bypass by Capture-replay
CVE-2011-20001
Assigner-Siemens
ShareView Details
Assigner-Siemens
CVSS Score-8.7||HIGH
EPSS-0.12% / 31.36%
||
7 Day CHG~0.00%
Published-14 Oct, 2025 | 09:14
Updated-14 Oct, 2025 | 19:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in SIMATIC S7-1200 CPU V1 family (incl. SIPLUS variants) (All versions < V2.0.3), SIMATIC S7-1200 CPU V2 family (incl. SIPLUS variants) (All versions < V2.0.3). The web server interface of affected devices improperly processes incoming malformed HTTP traffic at high rate. This could allow an unauthenticated remote attacker to force the device entering the stop/defect state, thus creating a denial of service condition.

Action-Not Available
Vendor-Siemens AG
Product-SIMATIC S7-1200 CPU V2 family (incl. SIPLUS variants)SIMATIC S7-1200 CPU V1 family (incl. SIPLUS variants)
CWE ID-CWE-20
Improper Input Validation
CVE-2025-20724
Assigner-MediaTek, Inc.
ShareView Details
Assigner-MediaTek, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.02% / 3.76%
||
7 Day CHG~0.00%
Published-14 Oct, 2025 | 09:12
Updated-16 Oct, 2025 | 13:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In wlan AP driver, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00418894; Issue ID: MSV-3475.

Action-Not Available
Vendor-OpenWrtMediaTek Inc.
Product-mt7615mt7622mt7916openwrtmt7986mt7981mt6890mt7915software_development_kitmt7663MT6890, MT7615, MT7622, MT7663, MT7915, MT7916, MT7981, MT7986
CWE ID-CWE-125
Out-of-bounds Read
CVE-2025-20717
Assigner-MediaTek, Inc.
ShareView Details
Assigner-MediaTek, Inc.
CVSS Score-7.8||HIGH
EPSS-0.01% / 2.28%
||
7 Day CHG~0.00%
Published-14 Oct, 2025 | 09:11
Updated-15 Oct, 2025 | 18:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: WCNCR00419946; Issue ID: MSV-3582.

Action-Not Available
Vendor-OpenWrtMediaTek Inc.
Product-mt7981mt7916software_development_kitmt7615mt7986mt7622mt6890mt7915openwrtmt7663MT6890, MT7615, MT7622, MT7663, MT7915, MT7916, MT7981, MT7986
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-20716
Assigner-MediaTek, Inc.
ShareView Details
Assigner-MediaTek, Inc.
CVSS Score-7.8||HIGH
EPSS-0.01% / 2.28%
||
7 Day CHG~0.00%
Published-14 Oct, 2025 | 09:11
Updated-15 Oct, 2025 | 18:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: WCNCR00421149; Issue ID: MSV-3728.

Action-Not Available
Vendor-OpenWrtMediaTek Inc.
Product-mt7981mt7916software_development_kitmt7615mt7986mt7622mt6890mt7915openwrtmt7663MT6890, MT7615, MT7622, MT7663, MT7915, MT7916, MT7981, MT7986
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-20715
Assigner-MediaTek, Inc.
ShareView Details
Assigner-MediaTek, Inc.
CVSS Score-7.8||HIGH
EPSS-0.01% / 2.28%
||
7 Day CHG~0.00%
Published-14 Oct, 2025 | 09:11
Updated-15 Oct, 2025 | 18:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: WCNCR00421152; Issue ID: MSV-3731.

Action-Not Available
Vendor-OpenWrtMediaTek Inc.
Product-mt7981mt7916software_development_kitmt7615mt7986mt7622mt6890mt7915openwrtmt7663MT6890, MT7615, MT7622, MT7663, MT7915, MT7916, MT7981, MT7986
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-20723
Assigner-MediaTek, Inc.
ShareView Details
Assigner-MediaTek, Inc.
CVSS Score-7.8||HIGH
EPSS-0.01% / 0.34%
||
7 Day CHG~0.00%
Published-14 Oct, 2025 | 09:11
Updated-15 Oct, 2025 | 18:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In gnss driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS09920033; Issue ID: MSV-3797.

Action-Not Available
Vendor-MediaTek Inc.Google LLC
Product-mt6989mt6991androidmt6835mt8791tmt8678mt6878mt6899mt8873mt8676mt6897mt8775mt8796mt6985mt6886MT6835, MT6878, MT6886, MT6897, MT6899, MT6985, MT6989, MT6991, MT8676, MT8678, MT8775, MT8791T, MT8796, MT8873
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-20722
Assigner-MediaTek, Inc.
ShareView Details
Assigner-MediaTek, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.01% / 0.39%
||
7 Day CHG~0.00%
Published-14 Oct, 2025 | 09:11
Updated-15 Oct, 2025 | 18:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In gnss driver, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS09920036; Issue ID: MSV-3798.

Action-Not Available
Vendor-rdkcentralOpenWrtMediaTek Inc.Google LLC
Product-mt6991mt6989androidmt8791tmt6878rdk-bmt8873mt8775mt8796mt6985mt6886mt6980dmt6835mt8678mt6899mt8676mt6897openwrtmt6990MT6835, MT6878, MT6886, MT6897, MT6899, MT6980D, MT6985, MT6989, MT6990, MT6991, MT8676, MT8678, MT8775, MT8791T, MT8796, MT8873
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-20714
Assigner-MediaTek, Inc.
ShareView Details
Assigner-MediaTek, Inc.
CVSS Score-7.8||HIGH
EPSS-0.01% / 2.28%
||
7 Day CHG~0.00%
Published-14 Oct, 2025 | 09:11
Updated-15 Oct, 2025 | 18:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: WCNCR00432659; Issue ID: MSV-3902.

Action-Not Available
Vendor-OpenWrtMediaTek Inc.
Product-mt7981mt7916software_development_kitmt7615mt7986mt7622mt6890mt7915openwrtmt7663MT6890, MT7615, MT7622, MT7663, MT7915, MT7916, MT7981, MT7986
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-20713
Assigner-MediaTek, Inc.
ShareView Details
Assigner-MediaTek, Inc.
CVSS Score-7.8||HIGH
EPSS-0.01% / 2.28%
||
7 Day CHG~0.00%
Published-14 Oct, 2025 | 09:11
Updated-15 Oct, 2025 | 03:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: WCNCR00432661; Issue ID: MSV-3904.

Action-Not Available
Vendor-MediaTek Inc.
Product-MT6890, MT7615, MT7622, MT7663, MT7915, MT7916, MT7981, MT7986
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2025-20721
Assigner-MediaTek, Inc.
ShareView Details
Assigner-MediaTek, Inc.
CVSS Score-7.8||HIGH
EPSS-0.01% / 0.34%
||
7 Day CHG~0.00%
Published-14 Oct, 2025 | 09:11
Updated-15 Oct, 2025 | 18:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In imgsensor, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10089545; Issue ID: MSV-4279.

Action-Not Available
Vendor-MediaTek Inc.Google LLC
Product-mt6989mt6991androidmt8395iot_yoctomt6899mt8196mt8792mt6897mt8195mt8390mt8370mt8793mt6985mt6886MT6886, MT6897, MT6899, MT6985, MT6989, MT6991, MT8195, MT8196, MT8370, MT8390, MT8395, MT8792, MT8793
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-20720
Assigner-MediaTek, Inc.
ShareView Details
Assigner-MediaTek, Inc.
CVSS Score-8.8||HIGH
EPSS-0.03% / 6.12%
||
7 Day CHG~0.00%
Published-14 Oct, 2025 | 09:11
Updated-15 Oct, 2025 | 18:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote (proximal/adjacent) escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00418954; Issue ID: MSV-3569.

Action-Not Available
Vendor-OpenWrtMediaTek Inc.
Product-mt7603mt7981mt7916software_development_kitmt7615mt7986mt7622mt6890mt7915openwrtMT6890, MT7603, MT7615, MT7622, MT7915, MT7916, MT7981, MT7986
CWE ID-CWE-122
Heap-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-20719
Assigner-MediaTek, Inc.
ShareView Details
Assigner-MediaTek, Inc.
CVSS Score-8.8||HIGH
EPSS-0.03% / 6.12%
||
7 Day CHG~0.00%
Published-14 Oct, 2025 | 09:11
Updated-15 Oct, 2025 | 18:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote (proximal/adjacent) escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00418955; Issue ID: MSV-3570.

Action-Not Available
Vendor-OpenWrtMediaTek Inc.
Product-mt7603mt7981mt7916software_development_kitmt7615mt7986mt7622mt6890mt7915openwrtMT6890, MT7603, MT7615, MT7622, MT7915, MT7916, MT7981, MT7986
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-20718
Assigner-MediaTek, Inc.
ShareView Details
Assigner-MediaTek, Inc.
CVSS Score-7.8||HIGH
EPSS-0.02% / 2.63%
||
7 Day CHG~0.00%
Published-14 Oct, 2025 | 09:11
Updated-15 Oct, 2025 | 18:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00419945; Issue ID: MSV-3581.

Action-Not Available
Vendor-OpenWrtMediaTek Inc.
Product-mt7981mt7916software_development_kitmt7615mt7986mt7622mt6890mt7915openwrtmt7663MT6890, MT7615, MT7622, MT7663, MT7915, MT7916, MT7981, MT7986
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-20709
Assigner-MediaTek, Inc.
ShareView Details
Assigner-MediaTek, Inc.
CVSS Score-8.8||HIGH
EPSS-0.03% / 6.12%
||
7 Day CHG~0.00%
Published-14 Oct, 2025 | 09:11
Updated-15 Oct, 2025 | 18:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote (proximal/adjacent) escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00415809; Issue ID: MSV-3405.

Action-Not Available
Vendor-OpenWrtMediaTek Inc.
Product-mt7981mt7916software_development_kitmt7986mt6890mt7915openwrtMT6890, MT7915, MT7916, MT7981, MT7986
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2025-20710
Assigner-MediaTek, Inc.
ShareView Details
Assigner-MediaTek, Inc.
CVSS Score-8.8||HIGH
EPSS-0.05% / 16.66%
||
7 Day CHG~0.00%
Published-14 Oct, 2025 | 09:11
Updated-15 Oct, 2025 | 03:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In wlan AP driver, there is a possible out of bounds write due to an integer overflow. This could lead to remote (proximal/adjacent) escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00418785; Issue ID: MSV-3515.

Action-Not Available
Vendor-MediaTek Inc.
Product-MT6890, MT7915, MT7916, MT7981, MT7986
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2025-20711
Assigner-MediaTek, Inc.
ShareView Details
Assigner-MediaTek, Inc.
CVSS Score-8.8||HIGH
EPSS-0.03% / 6.12%
||
7 Day CHG-0.02%
Published-14 Oct, 2025 | 09:11
Updated-13 Jan, 2026 | 06:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote (proximal/adjacent) escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00422399; Issue ID: MSV-3748.

Action-Not Available
Vendor-OpenWrtMediaTek Inc.
Product-mt7981mt7916mt7986software_development_kitopenwrtmt6890MT6890, MT7916, MT7981, MT7986
CWE ID-CWE-787
Out-of-bounds Write
CVE-2025-20712
Assigner-MediaTek, Inc.
ShareView Details
Assigner-MediaTek, Inc.
CVSS Score-8.8||HIGH
EPSS-0.03% / 6.12%
||
7 Day CHG~0.00%
Published-14 Oct, 2025 | 09:11
Updated-15 Oct, 2025 | 03:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote (proximal/adjacent) escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00422323; Issue ID: MSV-3810.

Action-Not Available
Vendor-MediaTek Inc.
Product-MT6990, MT7990, MT7991, MT7992, MT7993
CWE ID-CWE-122
Heap-based Buffer Overflow
CVE-2025-46581
Assigner-ZTE Corporation
ShareView Details
Assigner-ZTE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.26% / 49.61%
||
7 Day CHG~0.00%
Published-14 Oct, 2025 | 08:54
Updated-14 Oct, 2025 | 19:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ZTE ZXCDN product has a Struts RCE Vulnerability

ZTE's ZXCDN product is affected by a Struts remote code execution (RCE) vulnerability. An unauthenticated attacker can remotely execute commands with non-root privileges.

Action-Not Available
Vendor-ZTE Corporation
Product-ZXCDN
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2025-41699
Assigner-CERT@VDE
ShareView Details
Assigner-CERT@VDE
CVSS Score-8.8||HIGH
EPSS-0.39% / 59.22%
||
7 Day CHG~0.00%
Published-14 Oct, 2025 | 08:35
Updated-15 Oct, 2025 | 06:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Phoenix Contact: Security Advisory for CHARX SEC-3xxx charging controllers

An low privileged remote attacker with an account for the Web-based management can change the system configuration to perform a command injection as root, resulting in a total loss of confidentiality, availability and integrity due to improper control of generation of code ('Code Injection').

Action-Not Available
Vendor-Phoenix Contact GmbH & Co. KG
Product-CHARX SEC-3150CHARX SEC-3000CHARX SEC-3100CHARX SEC-3050
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2025-41718
Assigner-CERT@VDE
ShareView Details
Assigner-CERT@VDE
CVSS Score-7.5||HIGH
EPSS-0.02% / 5.98%
||
7 Day CHG~0.00%
Published-14 Oct, 2025 | 08:25
Updated-14 Oct, 2025 | 19:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Murrelektronik: Unprotected Transport of Credentials

A cleartext transmission of sensitive information vulnerability in the affected products allows an unauthorized remote attacker to gain login credentials and access the Web-UI.

Action-Not Available
Vendor-Murrelektronik
Product-Firmware Impact67 Pro 54630Firmware Impact67 Pro 54631Firmware Impact67 Pro 54632Firmware Impact67 Pro 54620
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2025-41707
Assigner-CERT@VDE
ShareView Details
Assigner-CERT@VDE
CVSS Score-5.3||MEDIUM
EPSS-0.11% / 29.67%
||
7 Day CHG~0.00%
Published-14 Oct, 2025 | 08:06
Updated-03 Nov, 2025 | 18:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Phoenix Contact: WebSocket Handler Denial of Service

The websocket handler is vulnerable to a denial of service condition. An unauthenticated remote attacker can send a crafted websocket message to trigger the issue without affecting the core functionality.

Action-Not Available
Vendor-Phoenix Contact GmbH & Co. KG
Product-QUINT4-UPS/24DC/24DC/20/EIPQUINT4-UPS/24DC/24DC/10/EIPQUINT4-UPS/24DC/24DC/5/EIPQUINT4-UPS/24DC/24DC/40/EIP
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2025-41706
Assigner-CERT@VDE
ShareView Details
Assigner-CERT@VDE
CVSS Score-5.3||MEDIUM
EPSS-0.11% / 29.67%
||
7 Day CHG~0.00%
Published-14 Oct, 2025 | 08:05
Updated-03 Nov, 2025 | 18:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Phoenix Contact: Webserver Denial of Service through Malformed Content-Length

The webserver is vulnerable to a denial of service condition. An unauthenticated remote attacker can craft a special GET request with an over-long content-length to trigger the issue without affecting the core functionality.

Action-Not Available
Vendor-Phoenix Contact GmbH & Co. KG
Product-QUINT4-UPS/24DC/24DC/20/EIPQUINT4-UPS/24DC/24DC/10/EIPQUINT4-UPS/24DC/24DC/5/EIPQUINT4-UPS/24DC/24DC/40/EIP
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2025-41705
Assigner-CERT@VDE
ShareView Details
Assigner-CERT@VDE
CVSS Score-6.8||MEDIUM
EPSS-0.04% / 10.51%
||
7 Day CHG~0.00%
Published-14 Oct, 2025 | 08:05
Updated-03 Nov, 2025 | 18:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Phoenix Contact: WebSocket Message Interception Leaks Webfrontend Credentials

An unauthenticated remote attacker (MITM) can intercept the websocket messages to gain access to the login credentials for the Webfrontend.

Action-Not Available
Vendor-Phoenix Contact GmbH & Co. KG
Product-QUINT4-UPS/24DC/24DC/20/EIPQUINT4-UPS/24DC/24DC/10/EIPQUINT4-UPS/24DC/24DC/5/EIPQUINT4-UPS/24DC/24DC/40/EIP
CWE ID-CWE-523
Unprotected Transport of Credentials
CVE-2025-41704
Assigner-CERT@VDE
ShareView Details
Assigner-CERT@VDE
CVSS Score-5.3||MEDIUM
EPSS-0.16% / 36.84%
||
7 Day CHG~0.00%
Published-14 Oct, 2025 | 08:05
Updated-03 Nov, 2025 | 18:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Phoenix Contact: Unauthenticated Modbus Service DoS via Crafted Function Code

An unauthanticated remote attacker can perform a DoS of the Modbus service by sending a specific function and sub-function code without affecting the core functionality.

Action-Not Available
Vendor-Phoenix Contact GmbH & Co. KG
Product-QUINT4-UPS/24DC/24DC/20/EIPQUINT4-UPS/24DC/24DC/10/EIPQUINT4-UPS/24DC/24DC/5/EIPQUINT4-UPS/24DC/24DC/40/EIP
CWE ID-CWE-770
Allocation of Resources Without Limits or Throttling
CVE-2025-41703
Assigner-CERT@VDE
ShareView Details
Assigner-CERT@VDE
CVSS Score-7.5||HIGH
EPSS-0.12% / 32.36%
||
7 Day CHG~0.00%
Published-14 Oct, 2025 | 08:05
Updated-03 Nov, 2025 | 18:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Phoenix Contact: UPS Shutdown via Unauthenticated Modbus Command

An unauthenticated remote attacker can cause a Denial of Service by turning off the output of the UPS via Modbus command.

Action-Not Available
Vendor-Phoenix Contact GmbH & Co. KG
Product-QUINT4-UPS/24DC/24DC/20/EIPQUINT4-UPS/24DC/24DC/10/EIPQUINT4-UPS/24DC/24DC/5/EIPQUINT4-UPS/24DC/24DC/40/EIP
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2025-55078
Assigner-Eclipse Foundation
ShareView Details
Assigner-Eclipse Foundation
CVSS Score-5.7||MEDIUM
EPSS-0.02% / 4.13%
||
7 Day CHG~0.00%
Published-14 Oct, 2025 | 07:28
Updated-21 Oct, 2025 | 19:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Incomplete validation of kernel object pointers in system calls

In Eclipse ThreadX before version 6.4.3, an attacker can cause a denial of service (crash) by providing a pointer to a reserved or unmapped memory region. Vulnerable system calls had a check of pointers, but that check wasn't verifying whether the pointer is outside the module memory region.

Action-Not Available
Vendor-Eclipse Foundation AISBL
Product-threadxThreadX
CWE ID-CWE-233
Improper Handling of Parameters
CVE-2025-11731
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-3.1||LOW
EPSS-0.05% / 15.25%
||
7 Day CHG~0.00%
Published-14 Oct, 2025 | 06:02
Updated-21 Nov, 2025 | 07:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Libxslt: type confusion in exsltfuncresultcompfunction of libxslt

A flaw was found in the exsltFuncResultComp() function of libxslt, which handles EXSLT <func:result> elements during stylesheet parsing. Due to improper type handling, the function may treat an XML document node as a regular XML element node, resulting in a type confusion. This can cause unexpected memory reads and potential crashes. While difficult to exploit, the flaw could lead to application instability or denial of service.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat Enterprise Linux 10Red Hat Enterprise Linux 9Red Hat OpenShift Container Platform 4Red Hat Enterprise Linux 7Red Hat Enterprise Linux 6Red Hat Enterprise Linux 8
CWE ID-CWE-843
Access of Resource Using Incompatible Type ('Type Confusion')
CVE-2025-8594
Assigner-WPScan
ShareView Details
Assigner-WPScan
CVSS Score-3.8||LOW
EPSS-0.03% / 9.83%
||
7 Day CHG~0.00%
Published-14 Oct, 2025 | 06:00
Updated-14 Oct, 2025 | 19:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Pz-LinkCard < 2.5.7 - Contributor+ SSRF

The Pz-LinkCard WordPress plugin before 2.5.7 does not validate a parameter before making a request to it, which could allow users with a role as low as Contributor to perform SSRF attack.

Action-Not Available
Vendor-Unknown
Product-Pz-LinkCard
CWE ID-CWE-918
Server-Side Request Forgery (SSRF)
CVE-2025-10357
Assigner-WPScan
ShareView Details
Assigner-WPScan
CVSS Score-6.1||MEDIUM
EPSS-0.04% / 11.82%
||
7 Day CHG~0.00%
Published-14 Oct, 2025 | 06:00
Updated-14 Oct, 2025 | 19:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Simple SEO < 2.0.32 - Contributor+ Stored XSS

The Simple SEO WordPress plugin before 2.0.32 does not sanitise and escape some parameters when outputing them in the page, which could allow users with a role as low as contributor to perform Cross-Site Scripting attacks.

Action-Not Available
Vendor-Unknown
Product-Simple SEO
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2025-10732
Assigner-Wordfence
ShareView Details
Assigner-Wordfence
CVSS Score-4.3||MEDIUM
EPSS-0.04% / 11.83%
||
7 Day CHG~0.00%
Published-14 Oct, 2025 | 05:24
Updated-14 Oct, 2025 | 19:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SureForms – Drag and Drop Form Builder for WordPress <= 1.12.1 - Missing Authorization to Authenticated (Contributor+) Information Disclosure

The SureForms – Drag and Drop Form Builder for WordPress plugin for WordPress is vulnerable to Sensitive Information Disclosure in all versions up to, and including, 1.12.1. This is due to improper access control implementation on the '/wp-json/sureforms/v1/srfm-global-settings' REST API endpoint. This makes it possible for authenticated attackers, with contributor-level access and above, to retrieve sensitive information including API keys for Google reCAPTCHA, Cloudflare Turnstile, hCaptcha, admin email addresses, and security-related form settings.

Action-Not Available
Vendor-Brainstorm Force
Product-SureForms – Drag and Drop Contact Form Builder – Multi-step Forms, Conversational Forms and more
CWE ID-CWE-862
Missing Authorization
CVE-2025-59889
Assigner-Eaton
ShareView Details
Assigner-Eaton
CVSS Score-8.6||HIGH
EPSS-0.03% / 8.03%
||
7 Day CHG~0.00%
Published-14 Oct, 2025 | 05:11
Updated-04 Nov, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper authentication of library files in the Eaton IPP software installer could lead to arbitrary code execution of an attacker with the access to the software package.  This security issue has been fixed in the latest version of IPP which is available on the Eaton download center.

Action-Not Available
Vendor-Eaton
Product-Eaton IPP software
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2025-42939
Assigner-SAP SE
ShareView Details
Assigner-SAP SE
CVSS Score-4.3||MEDIUM
EPSS-0.04% / 11.71%
||
7 Day CHG~0.00%
Published-14 Oct, 2025 | 00:18
Updated-14 Oct, 2025 | 19:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Missing Authorization Check in SAP S/4HANA (Manage Processing Rules - For Bank Statements)

SAP S/4HANA (Manage Processing Rules - For Bank Statements) allows an authenticated attacker with basic privileges to delete conditions from any shared rule of any user by tampering the request parameter. Due to missing authorization check, the attacker can delete shared rule conditions that should be restricted, compromising the integrity of the application without affecting its confidentiality or availability.

Action-Not Available
Vendor-SAP SE
Product-SAP S/4HANA (Manage Processing Rules - For Bank Statements)
CWE ID-CWE-863
Incorrect Authorization
CVE-2025-42937
Assigner-SAP SE
ShareView Details
Assigner-SAP SE
CVSS Score-9.8||CRITICAL
EPSS-0.18% / 40.36%
||
7 Day CHG~0.00%
Published-14 Oct, 2025 | 00:18
Updated-21 Oct, 2025 | 03:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Directory Traversal vulnerability in SAP Print Service

SAP Print Service (SAPSprint) performs insufficient validation of path information provided by users. An unauthenticated attacker could traverse to the parent directory and over-write system files causing high impact on confidentiality integrity and availability of the application.

Action-Not Available
Vendor-SAP SE
Product-SAP Print Service
CWE ID-CWE-35
Path Traversal: '.../...//'
CVE-2025-42910
Assigner-SAP SE
ShareView Details
Assigner-SAP SE
CVSS Score-9||CRITICAL
EPSS-0.05% / 16.72%
||
7 Day CHG~0.00%
Published-14 Oct, 2025 | 00:18
Updated-21 Oct, 2025 | 03:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Unrestricted File Upload Vulnerability in SAP Supplier Relationship Management

Due to missing verification of file type or content, SAP Supplier Relationship Management allows an authenticated attacker to upload arbitrary files. These files could include executables which might be downloaded and executed by the user which could host malware. On successful exploitation an attacker could cause high impact on confidentiality, integrity and availability of the application.

Action-Not Available
Vendor-SAP SE
Product-SAP Supplier Relationship Management
CWE ID-CWE-434
Unrestricted Upload of File with Dangerous Type
CVE-2025-42909
Assigner-SAP SE
ShareView Details
Assigner-SAP SE
CVSS Score-3||LOW
EPSS-0.03% / 9.83%
||
7 Day CHG~0.00%
Published-14 Oct, 2025 | 00:18
Updated-14 Oct, 2025 | 19:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Security Misconfiguration vulnerability in SAP Cloud Appliance Library Appliances

SAP Cloud Appliance Library Appliances allows an attacker with high privileges to leverage an insecure S/4HANA default profile setting in an existing SAP CAL appliances to gain access to other appliances. This has low impact on confidentiality of the application, integrity and availability is not impacted.

Action-Not Available
Vendor-SAP SE
Product-SAP Cloud Appliance Library Appliances
CWE ID-CWE-1004
Sensitive Cookie Without 'HttpOnly' Flag
CVE-2025-42908
Assigner-SAP SE
ShareView Details
Assigner-SAP SE
CVSS Score-5.4||MEDIUM
EPSS-0.02% / 4.36%
||
7 Day CHG~0.00%
Published-14 Oct, 2025 | 00:18
Updated-14 Oct, 2025 | 19:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cross-Site Request Forgery (CSRF) vulnerability in SAP NetWeaver Application Server for ABAP

Due to a Cross-Site Request Forgery (CSRF) vulnerability in SAP NetWeaver Application Server for ABAP, an authenticated attacker could initiate transactions directly via the session manager, bypassing the first transaction screen and the associated authorization check. This vulnerability could allow the attacker to perform actions and execute transactions that would normally require specific permissions, compromising the integrity and confidentiality of the system by enabling unauthorized access to restricted functionality. There is no impact to availability from this vulnerability.

Action-Not Available
Vendor-SAP SE
Product-SAP NetWeaver Application Server for ABAP
CWE ID-CWE-352
Cross-Site Request Forgery (CSRF)
CVE-2025-42906
Assigner-SAP SE
ShareView Details
Assigner-SAP SE
CVSS Score-5.3||MEDIUM
EPSS-0.06% / 18.96%
||
7 Day CHG~0.00%
Published-14 Oct, 2025 | 00:17
Updated-14 Oct, 2025 | 19:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Directory Traversal vulnerability in SAP Commerce Cloud

SAP Commerce Cloud contains a path traversal vulnerability that may allow users to access web applications such as the Administration Console from addresses where the Administration Console is not explicitly deployed. This could potentially bypass configured access restrictions, resulting in a low impact on confidentiality, with no impact on the integrity or availability of the application.

Action-Not Available
Vendor-SAP SE
Product-SAP Commerce Cloud
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2025-42903
Assigner-SAP SE
ShareView Details
Assigner-SAP SE
CVSS Score-4.3||MEDIUM
EPSS-0.03% / 7.28%
||
7 Day CHG~0.00%
Published-14 Oct, 2025 | 00:17
Updated-14 Oct, 2025 | 19:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
User Enumeration and Sensitive Data Exposure via RFC Function in SAP Financial Service Claims Management

A vulnerability in SAP Financial Service Claims Management RFC function ICL_USER_GET_NAME_AND_ADDRESS allows user enumeration and potential disclosure of personal data through response discrepancies, causing low impact on confidentiality with no impact on integrity or availability.

Action-Not Available
Vendor-SAP SE
Product-SAP Financial Service Claims Management
CWE ID-CWE-204
Observable Response Discrepancy
CVE-2025-42902
Assigner-SAP SE
ShareView Details
Assigner-SAP SE
CVSS Score-5.3||MEDIUM
EPSS-0.06% / 19.75%
||
7 Day CHG~0.00%
Published-14 Oct, 2025 | 00:17
Updated-14 Oct, 2025 | 19:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Memory Corruption vulnerability in SAP Netweaver AS ABAP and ABAP Platform

Due to the memory corruption vulnerability in SAP NetWeaver AS ABAP and ABAP Platform, an unauthenticated attacker can send a corrupted SAP Logon Ticket or SAP Assertion Ticket to the SAP application server. This leads to a dereference of NULL which makes the work process crash. As a result, it has a low impact on the availability but no impact on the confidentiality and integrity.

Action-Not Available
Vendor-SAP SE
Product-SAP Netweaver AS ABAP and ABAP Platform
CWE ID-CWE-476
NULL Pointer Dereference
  • Previous
  • 1
  • 2
  • ...
  • 270
  • 271
  • 272
  • ...
  • 6567
  • 6568
  • Next