Advisories

Für CVSS 2.0, 3.0 und 3.2
VDE-2021-001
Mai 14, 2025, 2:28 nachm.
A critical vulnerability has been discovered in the fdtCONTAINER component by M&M Software GmbH used by PACTware. While de-serializing PACTware 5 project files (loading PW5 files) the vulnerability can be …
VDE-2021-023
Mai 14, 2025, 2:28 nachm.
Multiple vulnerabilities have been discovered in the current firmware of the PHOENIX CONTACT FL SWITCH SMCS series switches.
VDE-2019-006
Mai 14, 2025, 2:28 nachm.
After login the source IP is used as the session identifier, so that users sharing the same source IP are able to gain full authenticated access to the WEB-UI. The …
VDE-2021-024
Mai 14, 2025, 2:28 nachm.
The vulnerability is a Time-of-Check-Time-of-Use (CWE-367) issue which allows an attacker with access to the firmware update file to overwrite it after it has been verified (but before installation is …
VDE-2018-001
Mai 14, 2025, 2:28 nachm.
The integrity of the mGuard firmware atomic update process cannot be guaranteed under all circumstances. The mGuard atomic update mechanism relies on internal checksums for the integrity verification of some …
VDE-2020-032
Mai 14, 2025, 2:28 nachm.
Multiple vulnerabilties were reported in WIBU-SYSTEMS Codemeter. WIBU-SYSTEMS Codemeter is installed by default during e!COCKPIT installation. All currently existing e!COCKPIT installation bundles contain vulnerable versions of WIBU-SYSTEMS Codemeter.
VDE-2025-029
Mai 14, 2025, 2:28 nachm.
A denial of service (DoS) attack targeting port 80 (http service) can overload the device (CWE-770). This behaviour has been observed when running network security scanners.
VDE-2020-047
Mai 14, 2025, 2:28 nachm.
Uncontrolled Resource Consumption can be exploited to cause the HMI to become unresponsive and not accurately update the display content (Denial of Service).