8341 Total CVEs
3167 AI Analyzed
136 CISA KEV
1637 Critical
All Vendors
Showing 5101-5150 of 8341 CVEs Page 103 of 167
CVE-2025-42953
8.1
SAP Multiple Products

SAP Netweaver System Configuration does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges

2025-07-10
CVE-2025-42951
Analyzed
8.8
SAP Multiple Products

Due to broken authorization, SAP Business One (SLD) allows an authenticated attacker to gain administrator privileges of a database by invoking the co...

2025-08-12
CVE-2025-42950
Analyzed
9.9
SAP Multiple Products

SAP Landscape Transformation (SLT) allows an attacker with user privileges to exploit a vulnerability in the function module exposed via RFC. This fla...

2025-08-12
CVE-2025-42944
10
SAP Multiple Products

Due to a deserialization vulnerability in SAP NetWeaver, an unauthenticated attacker could exploit the system through the RMI-P4 module by submitting...

2025-09-09
CVE-2025-42940
7.5
SAP Multiple Products

SAP CommonCryptoLib does not perform necessary boundary checks during pre-authentication parsing of manipulated ASN

2025-11-13
CVE-2025-42937
Analyzed
9.8
SAP Multiple Products

SAP Print Service (SAPSprint) performs insufficient validation of path information provided by users. An unauthenticated attacker could traverse to th...

2025-10-14
CVE-2025-42933
8.8
SAP Multiple Products

When a user logs in via SAP Business One native client, the SLD backend service fails to enforce proper encryption of certain APIs

2025-09-09
CVE-2025-42929
8.1
Unknown Multiple Products

Due to missing input validation, an attacker with high privilege access to ABAP reports could delete the content of arbitrary database tables, if the...

2025-09-09
CVE-2025-42928
Analyzed
9.1
SAP Multiple Products

Under certain conditions, a high privileged user could exploit a deserialization vulnerability in SAP jConnect to launch remote code execution. The sy...

2025-12-10
CVE-2025-42922
Analyzed
9.9
SAP Multiple Products

SAP NetWeaver AS Java allows an attacker authenticated as a non-administrative user to use a flaw in an available service to upload an arbitrary file....

2025-09-09
CVE-2025-42916
8.1
Unknown Multiple Products

Due to missing input validation, an attacker with high privilege access to ABAP reports could delete the content of arbitrary database tables, if the...

2025-09-09
CVE-2025-42910
Analyzed
9
SAP Multiple Products

Due to missing verification of file type or content, SAP Supplier Relationship Management allows an authenticated attacker to upload arbitrary files....

2025-10-14
CVE-2025-42880
Analyzed
9.9
SAP Multiple Products

Due to missing input sanitation, SAP Solution Manager allows an authenticated attacker to insert malicious code when calling a remote-enabled function...

2025-12-10
CVE-2025-42878
8.2
SAP Multiple Products

SAP Web Dispatcher and ICM may expose internal testing interfaces that are not intended for production

2025-12-10
CVE-2025-42877
7.5
SAP Multiple Products

SAP Web Dispatcher, Internet Communication Manager (ICM), and SAP Content Server allow an unauthenticated user to exploit logical errors that lead to...

2025-12-11
CVE-2025-42874
7.9
SAP Multiple Products

SAP NetWeaver remote service for Xcelsius allows an attacker with network access and high privileges to execute arbitrary code on the affected system...

2025-12-10
CVE-2025-4285
10
Unknown Multiple Products

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Rolantis Information Technologies Agentis allows...

2025-07-24
CVE-2025-4277
7.5
Unknown Multiple Products

Tcg2Smm has a vulnerability which can be used to write arbitrary memory inside SMRAM and execute arbitrary code at SMM level

2025-08-14
CVE-2025-4276
7.5
UsbCoreDxe Multiple Products

UsbCoreDxe has a vulnerability which can be used to write arbitrary memory inside SMRAM and execute arbitrary code at SMM level

2025-08-14
CVE-2025-4212
Analyzed
7.2
WordPress Multiple Products

The Checkout Files Upload for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via file uploads in all versions up to, an...

2025-11-19
CVE-2025-41744
9.1
Sprecher Automations Multiple Products

Sprecher Automations SPRECON-E series uses default cryptographic keys that allow an unprivileged remote attacker to access all encrypted communication...

2025-12-04
CVE-2025-41742
9.8
Sprecher Automations Multiple Products

Sprecher Automations SPRECON-E-C,  SPRECON-E-P, SPRECON-E-T3 is vulnerable to attack by an unauthorized remote attacker via default cryptographic keys...

2025-12-04
CVE-2025-41738
Analyzed
7.5
Unknown Multiple Products

An unauthenticated remote attacker may cause the visualisation server of the CODESYS Control runtime system to access a resource with a pointer of wro...

2025-12-02
CVE-2025-41737
Analyzed
7.5
HP Multiple Products

Due to webserver misconfiguration an unauthenticated remote attacker is able to read the source of php modules

2025-11-19
CVE-2025-41736
Analyzed
8.8
HP Multiple Products

A low privileged remote attacker can upload a new or overwrite an existing python script by using a path traversal of the target filename in php resul...

2025-11-19
CVE-2025-41735
8.8
Unknown Multiple Products

A low privileged remote attacker can upload any file to an arbitrary location due to missing file check resulting in remote code execution

2025-11-19
CVE-2025-41734
Analyzed
9.8
HP Multiple Products

An unauthenticated remote attacker can execute arbitrary php files and gain full access of the affected devices.

2025-11-19
CVE-2025-41733
Analyzed
9.8
Unknown Multiple Products

The commissioning wizard on the affected devices does not validate if the device is already initialized. An unauthenticated remote attacker can constr...

2025-11-19
CVE-2025-41732
8.8
Unknown Multiple Products

An unauthenticated remote attacker can abuse unsafe sscanf calls within the check_cookie() function to write arbitrary data into fixed-size stack buff...

2025-12-11
CVE-2025-41731
7.4
Unknown Multiple Products

A vulnerability was identified in the password generation algorithm when accessing the debug-interface

2025-11-11
CVE-2025-41730
8.8
Unknown Multiple Products

An unauthenticated remote attacker can abuse unsafe sscanf calls within the check_account() function to write arbitrary data into fixed-size stack buf...

2025-12-11
CVE-2025-41729
Analyzed
7.5
Unknown Multiple Products

An unauthenticated remote attacker can send a specially crafted Modbus read command to the device which leads to a denial of service

2025-11-25
CVE-2025-41727
7.8
Device Multiple Products

A local low privileged attacker can bypass the authentication of the Device Manager user interface, allowing them to perform privileged operations and...

2026-01-28
CVE-2025-41726
8.8
Device Multiple Products

A low privileged remote attacker can execute arbitrary code by sending specially crafted calls to the web service of the Device Manager or locally via...

2026-01-28
CVE-2025-41724
7.5
Unknown Multiple Products

An unauthenticated remote attacker can crash the wscserver by sending incomplete SOAP requests

2025-10-22
CVE-2025-41723
Analyzed
9.8
Intel Multiple Products

The importFile SOAP method is vulnerable to a directory traversal attack. An unauthenticated remote attacker bypass the path restriction and upload fi...

2025-10-22
CVE-2025-41722
7.5
Unknown Multiple Products

The wsc server uses a hard-coded certificate to check the authenticity of SOAP messages

2025-10-22
CVE-2025-41719
8.8
Unknown Multiple Products

A low privileged remote attacker can corrupt the webserver users storage on the device by setting a sequence of unsupported characters which leads to...

2025-10-22
CVE-2025-41717
Analyzed
8.8
Unknown Multiple Products

An unauthenticated remote attacker can trick a high privileged user into uploading a malicious payload via the config-upload endpoint, leading to code...

2026-01-13
CVE-2025-41715
Analyzed
9.8
Intel Multiple Products

The database for the web application is exposed without authentication, allowing an unauthenticated remote attacker to gain unauthorized access and po...

2025-09-24
CVE-2025-41714
8.8
Unknown Multiple Products

The upload endpoint insufficiently validates the 'Upload-Key' request header

2025-09-10
CVE-2025-41708
7.4
Unknown Multiple Products

Due to an unsecure default configuration HTTP is used instead of HTTPS for the web interface

2025-09-08
CVE-2025-41702
Analyzed
9.8
Unknown Multiple Products

The JWT secret key is embedded in the egOS WebGUI backend and is readable to the default user. An unauthenticated remote attacker can generate valid H...

2025-08-26
CVE-2025-41701
7.8
Unknown Multiple Products

An unauthenticated attacker can trick a local user into executing arbitrary commands by opening a deliberately manipulated project file with an affect...

2025-09-09
CVE-2025-41700
7.8
Unknown Multiple Products

An unauthenticated attacker can trick a local user into executing arbitrary code by opening a deliberately manipulated CODESYS project file with a COD...

2025-12-02
CVE-2025-41699
8.8
Unknown Multiple Products

An low privileged remote attacker with an account for the Web-based management can change the system configuration to perform a command injection as r...

2025-10-14
CVE-2025-41698
7.8
Unknown Multiple Products

A low privileged local attacker can interact with the affected service although user-interaction should not be allowed

2025-08-05
CVE-2025-41691
Analyzed
7.5
Unknown Multiple Products

An unauthenticated remote attacker may trigger a NULL pointer dereference in the affected CODESYS Control runtime systems by sending specially crafted...

2025-08-05
CVE-2025-41690
7.4
Unknown Multiple Products

A low-privileged attacker in bluetooth range may be able to access the password of a higher-privilege user (Maintenance) by viewing the device’s event...

2025-09-02
CVE-2025-41688
Analyzed
7.2
Unknown Multiple Products

A high privileged remote attacker can execute arbitrary OS commands using an undocumented method allowing to escape the implemented LUA sandbox

2025-07-31