NA - CVE-2025-27593 - The product can be used to distribute malicious...
The product can be used to distribute malicious code using SDD Device Drivers due to missing download verification checks, leading to code execution on target systems.
NA - CVE-2025-27594 - The device uses an unencrypted, proprietary...
The device uses an unencrypted, proprietary protocol for communication. Through this protocol, configuration data is transmitted and device authentication is performed. An attacker can thereby...
NA - CVE-2025-27595 - The device uses a weak hashing alghorithm to...
The device uses a weak hashing alghorithm to create the password hash. Hence, a matching password can be easily calculated by an attacker. This impacts the security and the integrity of the device.
Critical - CVE-2025-2000 - A maliciously crafted QPY file can potential...
A maliciously crafted QPY file can potential execute arbitrary-code embedded in the payload without privilege escalation when deserialising QPY formats < 13. A python process calling Qiskit 0.18.0...
NA - CVE-2025-2304 - A Privilege Escalation through a Mass...
A Privilege Escalation through a Mass Assignment exists in Camaleon CMS When a user wishes to change his password, the 'updated_ajax' method of the UsersController is called. The...
NA - CVE-2025-29776 - Azle is a WebAssembly runtime for TypeScript...
Azle is a WebAssembly runtime for TypeScript and JavaScript on ICP. Calling `setTimer` in Azle versions `0.27.0`, `0.28.0`, and `0.29.0` causes an immediate infinite loop of timers to be executed...