| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2026-24663 | Copeland XWEB and XWEB Pro OS Command Injection | Copeland | Copeland XWEB 300D PRO | Critical | 9.0 | 2026-02-27 00:36:49 | Deep Dive |
| CVE-2026-21718 | Copeland XWEB and XWEB Pro Use of a Broken or Risky Cryptographic Algorithm | Copeland | Copeland XWEB 300D PRO | Critical | 10.0 | 2026-02-27 00:34:56 | Deep Dive |
| CVE-2026-25085 | Copeland XWEB and XWEB Pro Unexpected Status Code or Return Value | Copeland | Copeland XWEB 300D PRO | High | 8.6 | 2026-02-27 00:33:07 | Deep Dive |
| CVE-2025-52551 | Proprietary protocol allows for unauthenticated file operations | Copeland LP | E2 Facility Management System | - | - | 2025-09-02 11:30:15 | Deep Dive |
| CVE-2025-52550 | Firmware upgrade packages are unsigned | Copeland LP | E3 Supervisory Control | - | - | 2025-09-02 11:26:35 | Deep Dive |
| CVE-2025-52549 | Predictable root linux password generation | Copeland LP | E3 Supervisory Control | - | - | 2025-09-02 11:26:23 | Deep Dive |
| CVE-2025-52548 | Enabling SSH and Shellinabox on the vulnerable machine | Copeland LP | E3 Supervisory Control | - | - | 2025-09-02 11:26:09 | Deep Dive |
| CVE-2025-52547 | DoS to the application services | Copeland LP | E3 Supervisory Control | - | - | 2025-09-02 11:25:55 | Deep Dive |
| CVE-2025-52546 | Stored XSS by uploading a specially crafted floor plan file | Copeland LP | E3 Supervisory Control | - | - | 2025-09-02 11:25:40 | Deep Dive |
| CVE-2025-52545 | Privilege escalation in the application services | Copeland LP | E3 Supervisory Control | - | - | 2025-09-02 11:25:23 | Deep Dive |
| CVE-2025-52544 | Arbitrary read file from the filesystem | Copeland LP | E3 Supervisory Control | - | - | 2025-09-02 11:25:01 | Deep Dive |
| CVE-2025-52543 | Login to the application services using only the password hash | Copeland LP | E3 Supervisory Control | - | - | 2025-09-02 11:24:32 | Deep Dive |
| CVE-2025-6519 | Consistent predictable generation of the password for the default admin user "ONEDAY" to the application services | Copeland LP | E3 Supervisory Control | - | - | 2025-09-02 11:24:00 | Deep Dive |