Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Vulnerability List
Found 33 results
CVE IDTitleVendorProductSeverityCVSS ScorePublished AtAI Analysis
CVE-2026-24663 Copeland XWEB and XWEB Pro OS Command Injection CopelandCopeland XWEB 300D PRO Critical 9.0 2026-02-27 00:36:49 Deep Dive
CVE-2026-21718 Copeland XWEB and XWEB Pro Use of a Broken or Risky Cryptographic Algorithm CopelandCopeland XWEB 300D PRO Critical 10.0 2026-02-27 00:34:56 Deep Dive
CVE-2026-25085 Copeland XWEB and XWEB Pro Unexpected Status Code or Return Value CopelandCopeland XWEB 300D PRO High 8.6 2026-02-27 00:33:07 Deep Dive
CVE-2025-52551 Proprietary protocol allows for unauthenticated file operations Copeland LPE2 Facility Management System--2025-09-02 11:30:15 Deep Dive
CVE-2025-52550 Firmware upgrade packages are unsigned Copeland LPE3 Supervisory Control--2025-09-02 11:26:35 Deep Dive
CVE-2025-52549 Predictable root linux password generation Copeland LPE3 Supervisory Control--2025-09-02 11:26:23 Deep Dive
CVE-2025-52548 Enabling SSH and Shellinabox on the vulnerable machine Copeland LPE3 Supervisory Control--2025-09-02 11:26:09 Deep Dive
CVE-2025-52547 DoS to the application services Copeland LPE3 Supervisory Control--2025-09-02 11:25:55 Deep Dive
CVE-2025-52546 Stored XSS by uploading a specially crafted floor plan file Copeland LPE3 Supervisory Control--2025-09-02 11:25:40 Deep Dive
CVE-2025-52545 Privilege escalation in the application services Copeland LPE3 Supervisory Control--2025-09-02 11:25:23 Deep Dive
CVE-2025-52544 Arbitrary read file from the filesystem Copeland LPE3 Supervisory Control--2025-09-02 11:25:01 Deep Dive
CVE-2025-52543 Login to the application services using only the password hash Copeland LPE3 Supervisory Control--2025-09-02 11:24:32 Deep Dive
CVE-2025-6519 Consistent predictable generation of the password for the default admin user "ONEDAY" to the application services Copeland LPE3 Supervisory Control--2025-09-02 11:24:00 Deep Dive