⚠️
脆弱性情報 2025-03-17
脆弱性リスト
複数のSungrow製品における複数の脆弱性
- ソース: JVN
-
詳細:
リンク
Schneider Electric製Uni-Telwayドライバにおける不適切な入力確認の脆弱性
- ソース: JVN
-
詳細:
リンク
Siemens製品に対するアップデート(2025年3月)
- ソース: JVN
-
詳細:
リンク
Apache Tomcat partial PUTにおけるリモートコード実行、情報漏えいや改ざんの脆弱性(CVE-2025-24813)
- ソース: JVN
-
詳細:
リンク
複数のHitachi Energy製品における複数の脆弱性
- ソース: JVN
-
詳細:
リンク
Keysight製Ixia Vision Product Familyにおける複数の脆弱性
- ソース: JVN
-
詳細:
リンク
複数のHitachi Energy製品における複数の脆弱性
- ソース: JVN
-
詳細:
リンク
Delta Electronics製CNCSoft-G2におけるヒープベースのバッファオーバーフローの脆弱性
- ソース: JVN
-
詳細:
リンク
GMOD製Apolloにおける複数の脆弱性
- ソース: JVN
-
詳細:
リンク
Edimax製IC-7100 IP CameraにおけるOSコマンドインジェクションの脆弱性
- ソース: JVN
-
詳細:
リンク
A vulnerability, which was classified as critical, has been found in tbeu matio 1.5.28. This issue affects the function Mat_VarPrint of the file src/mat.c. The manipulation leads to heap-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
- ソース: NVD
-
詳細:
リンク
A vulnerability, which was classified as critical, was found in tbeu matio 1.5.28. Affected is the function strdup_vprintf of the file src/io.c. The manipulation leads to heap-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
- ソース: NVD
-
詳細:
リンク
A vulnerability was found in otale Tale Blog 2.0.5. It has been classified as problematic. This affects an unknown part of the file /%61dmin/api/logs. The manipulation leads to improper authentication. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. This vulnerability only affects products that are no longer supported by the maintainer.
- ソース: NVD
-
詳細:
リンク
A vulnerability was found in otale Tale Blog 2.0.5. It has been declared as problematic. This vulnerability affects the function saveOptions of the file /options/save of the component Site Settings. The manipulation of the argument Site Title leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. This vulnerability only affects products that are no longer supported by the maintainer.
- ソース: NVD
-
詳細:
リンク
A vulnerability was found in IROAD Dash Cam X5 up to 20250203. It has been rated as problematic. This issue affects some unknown processing of the component SSID. The manipulation leads to use of default credentials. The attack needs to be initiated within the local network. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
- ソース: NVD
-
詳細:
リンク
A vulnerability classified as critical has been found in IROAD X5 Mobile App up to 5.2.5 on Android. Affected is an unknown function of the component API Endpoint. The manipulation leads to hard-coded credentials. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
- ソース: NVD
-
詳細:
リンク
A vulnerability classified as critical was found in IROAD Dash Cam X5 and Dash Cam X6 up to 20250308. Affected by this vulnerability is an unknown functionality of the component Device Pairing. The manipulation leads to hard-coded credentials. Access to the local network is required for this attack to succeed. The complexity of an attack is rather high. The exploitation appears to be difficult. The vendor was contacted early about this disclosure but did not respond in any way.
- ソース: NVD
-
詳細:
リンク
A vulnerability, which was classified as critical, has been found in IROAD Dash Cam X5 and Dash Cam X6 up to 20250308. Affected by this issue is some unknown functionality of the component API Endpoint. The manipulation leads to missing authentication. The attack may be launched remotely. The vendor was contacted early about this disclosure but did not respond in any way.
- ソース: NVD
-
詳細:
リンク
A vulnerability, which was classified as very critical, was found in IROAD Dash Cam X5 and Dash Cam X6 up to 20250308. This affects an unknown part. The manipulation leads to improper authorization. It is possible to initiate the attack remotely. The vendor was contacted early about this disclosure but did not respond in any way.
- ソース: NVD
-
詳細:
リンク
Discussion