Overview
- MailEnable
- MailEnable
Description
Statistics
- 1 Post
- 1 Interaction
Fediverse
MailEnable
https://www.cve.org/CVERecord?id=CVE-2025-34396
https://www.cve.org/CVERecord?id=CVE-2025-34397
https://www.cve.org/CVERecord?id=CVE-2025-34398
https://www.cve.org/CVERecord?id=CVE-2025-34399
https://www.cve.org/CVERecord?id=CVE-2025-34400
https://www.cve.org/CVERecord?id=CVE-2025-34401
https://www.cve.org/CVERecord?id=CVE-2025-34402
https://www.cve.org/CVERecord?id=CVE-2025-34403
https://www.cve.org/CVERecord?id=CVE-2025-34404
https://www.cve.org/CVERecord?id=CVE-2025-34406
https://www.cve.org/CVERecord?id=CVE-2025-34407
Overview
- MailEnable
- MailEnable
Description
Statistics
- 1 Post
- 1 Interaction
Fediverse
MailEnable
https://www.cve.org/CVERecord?id=CVE-2025-34396
https://www.cve.org/CVERecord?id=CVE-2025-34397
https://www.cve.org/CVERecord?id=CVE-2025-34398
https://www.cve.org/CVERecord?id=CVE-2025-34399
https://www.cve.org/CVERecord?id=CVE-2025-34400
https://www.cve.org/CVERecord?id=CVE-2025-34401
https://www.cve.org/CVERecord?id=CVE-2025-34402
https://www.cve.org/CVERecord?id=CVE-2025-34403
https://www.cve.org/CVERecord?id=CVE-2025-34404
https://www.cve.org/CVERecord?id=CVE-2025-34406
https://www.cve.org/CVERecord?id=CVE-2025-34407
Overview
- MailEnable
- MailEnable
Description
Statistics
- 1 Post
- 1 Interaction
Fediverse
MailEnable
https://www.cve.org/CVERecord?id=CVE-2025-34396
https://www.cve.org/CVERecord?id=CVE-2025-34397
https://www.cve.org/CVERecord?id=CVE-2025-34398
https://www.cve.org/CVERecord?id=CVE-2025-34399
https://www.cve.org/CVERecord?id=CVE-2025-34400
https://www.cve.org/CVERecord?id=CVE-2025-34401
https://www.cve.org/CVERecord?id=CVE-2025-34402
https://www.cve.org/CVERecord?id=CVE-2025-34403
https://www.cve.org/CVERecord?id=CVE-2025-34404
https://www.cve.org/CVERecord?id=CVE-2025-34406
https://www.cve.org/CVERecord?id=CVE-2025-34407
Overview
- MailEnable
- MailEnable
Description
Statistics
- 1 Post
- 1 Interaction
Fediverse
MailEnable
https://www.cve.org/CVERecord?id=CVE-2025-34396
https://www.cve.org/CVERecord?id=CVE-2025-34397
https://www.cve.org/CVERecord?id=CVE-2025-34398
https://www.cve.org/CVERecord?id=CVE-2025-34399
https://www.cve.org/CVERecord?id=CVE-2025-34400
https://www.cve.org/CVERecord?id=CVE-2025-34401
https://www.cve.org/CVERecord?id=CVE-2025-34402
https://www.cve.org/CVERecord?id=CVE-2025-34403
https://www.cve.org/CVERecord?id=CVE-2025-34404
https://www.cve.org/CVERecord?id=CVE-2025-34406
https://www.cve.org/CVERecord?id=CVE-2025-34407
Overview
- MailEnable
- MailEnable
Description
Statistics
- 1 Post
- 1 Interaction
Fediverse
MailEnable
https://www.cve.org/CVERecord?id=CVE-2025-34396
https://www.cve.org/CVERecord?id=CVE-2025-34397
https://www.cve.org/CVERecord?id=CVE-2025-34398
https://www.cve.org/CVERecord?id=CVE-2025-34399
https://www.cve.org/CVERecord?id=CVE-2025-34400
https://www.cve.org/CVERecord?id=CVE-2025-34401
https://www.cve.org/CVERecord?id=CVE-2025-34402
https://www.cve.org/CVERecord?id=CVE-2025-34403
https://www.cve.org/CVERecord?id=CVE-2025-34404
https://www.cve.org/CVERecord?id=CVE-2025-34406
https://www.cve.org/CVERecord?id=CVE-2025-34407
Overview
- MailEnable
- MailEnable
Description
Statistics
- 1 Post
- 1 Interaction
Fediverse
MailEnable
https://www.cve.org/CVERecord?id=CVE-2025-34396
https://www.cve.org/CVERecord?id=CVE-2025-34397
https://www.cve.org/CVERecord?id=CVE-2025-34398
https://www.cve.org/CVERecord?id=CVE-2025-34399
https://www.cve.org/CVERecord?id=CVE-2025-34400
https://www.cve.org/CVERecord?id=CVE-2025-34401
https://www.cve.org/CVERecord?id=CVE-2025-34402
https://www.cve.org/CVERecord?id=CVE-2025-34403
https://www.cve.org/CVERecord?id=CVE-2025-34404
https://www.cve.org/CVERecord?id=CVE-2025-34406
https://www.cve.org/CVERecord?id=CVE-2025-34407
Overview
- Phoenix Contact
- FL SWITCH 2005
Description
Statistics
- 1 Post
Fediverse
#OT #Advisory VDE-2025-071
Phoenix Contact: Multiple Vulnerabilities in FL SWITCH 2xxx Firmware
Multiple vulnerabilities have been identified in the FL SWITCH 2xxx firmware prior to version 3.50. Two of these (CVE-2025-41692 and CVE-2025-41696) enable an attacker to access the device's file system. Two other vulnerabilities (CVE-2025-41693 and CVE-2025-41694) are related to Denial of Service (DoS) attacks, which partly limit the device's functionality. Another vulnerability (CVE-2025-41697) allows an unauthenticated physical attacker to access a login shell via an undocumented UART port. Furthermore, there are multiple vulnerabilities relating to reflected cross-site scripting in the web-based management of the device. All vulnerabilities have been resolved in firmware version 3.50.
#CVE CVE-2025-41752, CVE-2025-41751, CVE-2025-41750, CVE-2025-41749, CVE-2025-41748, CVE-2025-41747, CVE-2025-41746, CVE-2025-41745, CVE-2025-41695, CVE-2025-41697, CVE-2025-41692, CVE-2025-41694, CVE-2025-41696, CVE-2025-41693
https://certvde.com/en/advisories/vde-2025-071/
#CSAF https://phoenixcontact.csaf-tp.certvde.com/.well-known/csaf/white/2025/vde-2025-071.json
Overview
- Phoenix Contact
- FL SWITCH 2005
Description
Statistics
- 1 Post
Fediverse
#OT #Advisory VDE-2025-071
Phoenix Contact: Multiple Vulnerabilities in FL SWITCH 2xxx Firmware
Multiple vulnerabilities have been identified in the FL SWITCH 2xxx firmware prior to version 3.50. Two of these (CVE-2025-41692 and CVE-2025-41696) enable an attacker to access the device's file system. Two other vulnerabilities (CVE-2025-41693 and CVE-2025-41694) are related to Denial of Service (DoS) attacks, which partly limit the device's functionality. Another vulnerability (CVE-2025-41697) allows an unauthenticated physical attacker to access a login shell via an undocumented UART port. Furthermore, there are multiple vulnerabilities relating to reflected cross-site scripting in the web-based management of the device. All vulnerabilities have been resolved in firmware version 3.50.
#CVE CVE-2025-41752, CVE-2025-41751, CVE-2025-41750, CVE-2025-41749, CVE-2025-41748, CVE-2025-41747, CVE-2025-41746, CVE-2025-41745, CVE-2025-41695, CVE-2025-41697, CVE-2025-41692, CVE-2025-41694, CVE-2025-41696, CVE-2025-41693
https://certvde.com/en/advisories/vde-2025-071/
#CSAF https://phoenixcontact.csaf-tp.certvde.com/.well-known/csaf/white/2025/vde-2025-071.json
Overview
- Phoenix Contact
- FL SWITCH 2005
Description
Statistics
- 1 Post
Fediverse
#OT #Advisory VDE-2025-071
Phoenix Contact: Multiple Vulnerabilities in FL SWITCH 2xxx Firmware
Multiple vulnerabilities have been identified in the FL SWITCH 2xxx firmware prior to version 3.50. Two of these (CVE-2025-41692 and CVE-2025-41696) enable an attacker to access the device's file system. Two other vulnerabilities (CVE-2025-41693 and CVE-2025-41694) are related to Denial of Service (DoS) attacks, which partly limit the device's functionality. Another vulnerability (CVE-2025-41697) allows an unauthenticated physical attacker to access a login shell via an undocumented UART port. Furthermore, there are multiple vulnerabilities relating to reflected cross-site scripting in the web-based management of the device. All vulnerabilities have been resolved in firmware version 3.50.
#CVE CVE-2025-41752, CVE-2025-41751, CVE-2025-41750, CVE-2025-41749, CVE-2025-41748, CVE-2025-41747, CVE-2025-41746, CVE-2025-41745, CVE-2025-41695, CVE-2025-41697, CVE-2025-41692, CVE-2025-41694, CVE-2025-41696, CVE-2025-41693
https://certvde.com/en/advisories/vde-2025-071/
#CSAF https://phoenixcontact.csaf-tp.certvde.com/.well-known/csaf/white/2025/vde-2025-071.json
Overview
- Phoenix Contact
- FL SWITCH 2005
Description
Statistics
- 1 Post
Fediverse
#OT #Advisory VDE-2025-071
Phoenix Contact: Multiple Vulnerabilities in FL SWITCH 2xxx Firmware
Multiple vulnerabilities have been identified in the FL SWITCH 2xxx firmware prior to version 3.50. Two of these (CVE-2025-41692 and CVE-2025-41696) enable an attacker to access the device's file system. Two other vulnerabilities (CVE-2025-41693 and CVE-2025-41694) are related to Denial of Service (DoS) attacks, which partly limit the device's functionality. Another vulnerability (CVE-2025-41697) allows an unauthenticated physical attacker to access a login shell via an undocumented UART port. Furthermore, there are multiple vulnerabilities relating to reflected cross-site scripting in the web-based management of the device. All vulnerabilities have been resolved in firmware version 3.50.
#CVE CVE-2025-41752, CVE-2025-41751, CVE-2025-41750, CVE-2025-41749, CVE-2025-41748, CVE-2025-41747, CVE-2025-41746, CVE-2025-41745, CVE-2025-41695, CVE-2025-41697, CVE-2025-41692, CVE-2025-41694, CVE-2025-41696, CVE-2025-41693
https://certvde.com/en/advisories/vde-2025-071/
#CSAF https://phoenixcontact.csaf-tp.certvde.com/.well-known/csaf/white/2025/vde-2025-071.json