| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2025-30169 | Admin Authorized File Upload and Execute PHP | ABB | ASPECT-Enterprise | Medium | 6.7 | 2025-05-22 17:47:11 | Deep Dive |
| CVE-2025-30173 | Admin Authorized File Upload | ABB | ASPECT-Enterprise | Medium | 6.7 | 2025-05-22 17:45:40 | Deep Dive |
| CVE-2025-30172 | Admin Authorized Remote Code Execution | ABB | ASPECT-Enterprise | High | 8.0 | 2025-05-22 17:43:59 | Deep Dive |
| CVE-2025-30171 | Admin Authorized System File Deletion | ABB | ASPECT-Enterprise | Critical | 9.0 | 2025-05-22 17:41:19 | Deep Dive |
| CVE-2025-30170 | Admin Authorized Exposure of file path, file size or file existence | ABB | ASPECT-Enterprise | Medium | 5.5 | 2025-05-22 17:38:51 | Deep Dive |
| CVE-2025-2409 | Admin Authorized System File corruption | ABB | ASPECT-Enterprise | Critical | 9.1 | 2025-05-22 17:35:36 | Deep Dive |
| CVE-2025-2410 | Admin Authorized Port (iptables) manipulation (open/close/disable ports) | ABB | ASPECT-Enterprise | Critical | 9.1 | 2025-05-22 17:32:36 | Deep Dive |
| CVE-2024-9639 | Authenticated Remote Code Execution | ABB | ASPECT-Enterprise | High | 8.0 | 2025-05-22 17:27:59 | Deep Dive |
| CVE-2024-48850 | Authenticated Absolute Path Traversal | ABB | ASPECT-Enterprise | High | 7.2 | 2025-05-22 16:45:45 | Deep Dive |
| CVE-2024-48853 | Authenticated Escalation to guest to root | ABB | ASPECT-Enterprise | Critical | 9.0 | 2025-05-22 16:38:35 | Deep Dive |
| CVE-2025-5024 | Gnome-remote-desktop: uncontrolled resource consumption due to malformed rdp pdus | Red Hat | Red Hat Enterprise Linux 10 | High | 7.4 | 2025-05-22 14:51:01 | Deep Dive |
| CVE-2025-3945 | Improper Neutralization of Argument Delimiters in a Command (‘Argument Injection’) | Tridium | Niagara Framework | High | 7.2 | 2025-05-22 12:47:01 | Deep Dive |
| CVE-2025-3944 | Incorrect Permission Assignment for Critical Resource | Tridium | Niagara Framework | High | 7.2 | 2025-05-22 12:44:56 | Deep Dive |
| CVE-2025-3943 | Use of GET Request Method With sensitive Query Strings | Tridium | Niagara Framework | Medium | 4.1 | 2025-05-22 12:42:14 | Deep Dive |
| CVE-2025-3942 | Improper Output Neutralization for Logs | Tridium | Niagara Framework | Medium | 4.3 | 2025-05-22 12:40:13 | Deep Dive |
| CVE-2025-3941 | Improper Handling of Windows: DATA Alternate Data Stream | Tridium | Niagara Framework | Medium | 5.4 | 2025-05-22 12:38:16 | Deep Dive |
| CVE-2025-3940 | Improper Use of Validation Framework | Tridium | Niagara Framework | Medium | 5.3 | 2025-05-22 12:35:14 | Deep Dive |
| CVE-2025-3939 | Observable Response Discrepancy | Tridium | Niagara Framework | Medium | 5.3 | 2025-05-22 12:33:48 | Deep Dive |
| CVE-2025-3938 | Missing Cryptographic Step | Tridium | Niagara Framework | Medium | 6.8 | 2025-05-22 12:32:02 | Deep Dive |
| CVE-2025-3937 | Use of Password Hash with Insufficient Computational Effort | Tridium | Niagara Framework | High | 7.7 | 2025-05-22 12:23:42 | Deep Dive |