Advisories

For CVSS 2.0, 3.0 and 3.2
VDE-2022-019
June 2, 2022, 5:11 PM
For detailed information please refer to WIBU SYSTEMS original Advisories at https://wibu.com/support/security-advisories.html.
VDE-2022-021
May 22, 2025, 3:03 PM
Critical vulnerabilities have been discovered in the utilized Bluetooth component. For more information see: https://kb.cert.org/vuls/id/799380
VDE-2022-018
May 11, 2022, 4:20 PM
Multiple vulnerabilities have been discovered in the firmware and in libraries utilized of RAD-ISM-900-EN-BD devices: In addition to the above listed CVEs the following issues were identified: Vulnerabilities related to …
VDE-2022-016
May 2, 2022, 12:00 PM
A service function in the stated TRUMPF products is exposed without necessary authentication. Execution of this function may result in unauthorized access to, change of data or disruption of the …
VDE-2022-015
April 27, 2022, 2:00 PM
The Miele Benchmark Programming Tool on a Microsoft Windows operating system, selects a folder by default upon installation that is writable for all users (C:\\MIELE_SERVICE). After the installation of the …
VDE-2022-012
May 16, 2022, 4:15 PM
Critical vulnerabilities have been discovered in the utilized component Remote Desktop Client by Microsoft.For more information see: https://msrc.microsoft.com/update-guide/vulnerability/CVE- 2022-21990
VDE-2021-061
April 26, 2022, 12:00 PM
The software product PMC programming tool from Pilz is based on the software CODESYS Development System from CODESYS GmbH. This software is affected by several vulnerabilities, which an attacker can …
VDE-2021-054
April 26, 2022, 12:00 PM
Several Pilz products use Versions V2 and V3 of the CODESYS runtime system from CODESYS GmbH, which enables the execution of IEC 61131-3 PLC programs. These runtime environments contain several …