A vulnerability was found in Schneider Electric EVLink WallBox. It has been classified as problematic. This affects an unknown part. The manipulation of the argument configuration leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2025-5742. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Schneider Electric Modicon Controllers M241 and Modicon Controllers M251 and classified as problematic. Affected by this issue is some unknown functionality of the component Webserver. The manipulation leads to cross site scripting.
This vulnerability is handled as CVE-2025-3899. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
NHS in England Urging One Million People to Donate Blood to 'Secure' Supply The National Health System in England is still dealing with blood supply issues one year after a ransomware attack on a British pathology laboratory services provider disrupted patient care and testing services at several London-based hospitals and triggered a nationwide blood shortage.
Intrusion Involved ShadowPad Malware, Wielded in Attacks Tied to Chinese APT Groups Cybersecurity firm SentinelOne said suspected Chinese attackers, wielding ShadowPad backdoor malware, infiltrated a logistics firm that it used for supplying hardware to its employees, but that the intrusion doesn't appear to have resulted in any infiltration of its own, corporate network.
United Natural Foods Inc. Launches Investigation, Confirms IT Systems Breach A cyberattack on United Natural Foods, the largest U.S. health food distributor and a key Whole Foods supplier, has disrupted the company's fulfillment operations, prompting a notification to law enforcement and a forensic investigation as it works to restore affected systems.
A Mirai Offshoot Uses DVR Command Injection Bug to Spread, Hitting 50,000 Devices A Mirai botnet malware variant is targeting a command injection vulnerability in internet-connected digital video recorders used for CCTV surveillance, enabling attackers to take control of the devices and add them to a botnet. A security researcher first identified the vulnerability in April 2024.
A vulnerability has been found in upKeeper Solutions upKeeper Instant Privilege Access up to 1.3.x and classified as critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to improper privilege management.
This vulnerability is known as CVE-2025-4681. Local access is required to approach this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in upKeeper Solutions upKeeper Instant Privilege Access up to 1.3.x. Affected is an unknown function. The manipulation leads to improper access controls.
This vulnerability is traded as CVE-2025-4680. An attack has to be approached locally. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Schneider Electric EVLink WallBox. This issue affects some unknown processing of the component Configuration Handler. The manipulation leads to os command injection.
The identification of this vulnerability is CVE-2025-5743. The attack may be initiated remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability classified as critical has been found in Schneider Electric EVLink WallBox. This affects an unknown part. The manipulation leads to path traversal.
This vulnerability is uniquely identified as CVE-2025-5740. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Schneider Electric Modicon Controllers M241 and Modicon Controllers M251. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component Header Handler. The manipulation of the argument Content-Length leads to resource consumption.
This vulnerability is known as CVE-2025-3112. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Schneider Electric EVLink WallBox. It has been classified as critical. Affected is an unknown function. The manipulation leads to path traversal.
This vulnerability is traded as CVE-2025-5741. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.