A vulnerability classified as critical was found in ECOVACS Robot Lawn Mower and Robot Vacuum. This vulnerability affects unknown code of the component Firmware Update Handler. The manipulation leads to download of code without integrity check.
This vulnerability was named CVE-2024-52331. The attack can be initiated remotely. There is no exploit available.
A vulnerability classified as problematic has been found in ECOVACS Robot Lawn Mower and Robot Vacuum. This affects an unknown part of the component Home/Cloud Service. The manipulation leads to use of client-side authentication.
This vulnerability is uniquely identified as CVE-2024-52327. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in ECOVACS Robot Lawn Mower and Robot Vacuum. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /data. The manipulation leads to incorrect permission assignment.
This vulnerability is handled as CVE-2024-52328. It is possible to launch the attack on the local host. There is no exploit available.
A vulnerability was found in ECOVACS Robot Lawn Mower and Robot Vacuum. It has been declared as critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to hard-coded credentials.
This vulnerability is known as CVE-2024-11147. It is possible to launch the attack on the physical device. There is no exploit available.
A vulnerability was found in ECOVACS Robot Lawn Mower and Robot Vacuum. It has been classified as critical. Affected is an unknown function of the component BLE GATT Message Handler. The manipulation leads to use of hard-coded cryptographic key
.
This vulnerability is traded as CVE-2024-12078. Access to the local network is required for this attack. There is no exploit available.
CISA and the FBI warned today that attackers are still exploiting Ivanti Cloud Service Appliances (CSA) security flaws patched since September to breach vulnerable networks. [...]
A vulnerability was found in HMS Networks Ewon Flexy 202 and classified as problematic. This issue affects some unknown processing. The manipulation leads to cleartext transmission of sensitive information.
The identification of this vulnerability is CVE-2025-0432. The attack may be initiated remotely. There is no exploit available.
A vulnerability has been found in mySCADA myPRO Manager and myPRO Runtime and classified as very critical. This vulnerability affects unknown code of the component POST Request Handler. The manipulation leads to os command injection.
This vulnerability was named CVE-2025-20014. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as very critical, was found in mySCADA myPRO Manager and myPRO Runtime. This affects an unknown part of the component POST Request Handler. The manipulation leads to os command injection.
This vulnerability is uniquely identified as CVE-2025-20061. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in basteln3rk Save & Import Image from URL Plugin up to 0.7 on WordPress. Affected by this issue is some unknown functionality. The manipulation leads to cross site scripting.
This vulnerability is handled as CVE-2025-23960. The attack may be launched remotely. There is no exploit available.
A vulnerability classified as problematic was found in Links Problem Reporter Plugin up to 2.6.0 on WordPress. Affected by this vulnerability is an unknown functionality. The manipulation leads to cross site scripting.
This vulnerability is known as CVE-2025-23834. The attack can be launched remotely. There is no exploit available.
A vulnerability classified as problematic has been found in Qwerty23 Rocket Media Library Mime Type Plugin up to 2.1.0 on WordPress. Affected is an unknown function. The manipulation leads to cross-site request forgery.
This vulnerability is traded as CVE-2025-22768. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability was found in SuryaBhan Custom Coming Soon Plugin up to 2.2 on WordPress. It has been declared as problematic. This vulnerability affects unknown code. The manipulation leads to cross site scripting.
This vulnerability was named CVE-2025-23836. The attack can be initiated remotely. There is no exploit available.
A vulnerability was found in Legal+ Plugin up to 1.0 on WordPress. It has been rated as problematic. This issue affects some unknown processing. The manipulation leads to cross site scripting.
The identification of this vulnerability is CVE-2025-23835. The attack may be initiated remotely. There is no exploit available.
A vulnerability was found in sayocode SC Simple Zazzle Plugin up to 1.1.6 on WordPress and classified as problematic. Affected by this issue is some unknown functionality. The manipulation leads to cross site scripting.
This vulnerability is handled as CVE-2025-23733. The attack may be launched remotely. There is no exploit available.
A vulnerability has been found in AZ Content Finder Plugin up to 0.1 on WordPress and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to cross site scripting.
This vulnerability is known as CVE-2025-23727. The attack can be launched remotely. There is no exploit available.
A vulnerability, which was classified as problematic, was found in FLX Dashboard Groups Plugin up to 0.0.7 on WordPress. Affected is an unknown function. The manipulation leads to cross site scripting.
This vulnerability is traded as CVE-2025-23730. It is possible to launch the attack remotely. There is no exploit available.