#webstatus
Pages Web

Avec l'application Watchbot retrouver votre bot discord sur notre page web status

En un clin d'œil, il vous notifie lorsqu'une application est connectée ou déconnectée, vous garantissant ainsi une gestion optimale et une réactivité

Lien support:
discord.gg/watchbot

#webstatus #app
January 25, 2025 at 5:14 AM
RevPi Webstatus application is vulnerable to an authentication bypassAn unaut... An unauthorized ...

Origin | Interest | Match
CVE-2025-41646 | THREATINT
An unauthorized remote attacker can bypass the authentication of the affected software package by misusing an incorrect type conversion. This leads to full compromise of the device
cve.threatint.eu
June 6, 2025 at 3:24 PM
KUNBUS RevPi Webstatus View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.3 ATTENTION : Exploitable remotely/low attack complexity Vendor : KUNBUS Equipment : RevPi Webstatus Vulnerability : Incorrect Implem...

Origin | Interest | Match
KUNBUS RevPi Webstatus | CISA
www.cisa.gov
July 11, 2025 at 1:54 PM
CVE-2025-41646: Critical Authentication Bypass in RevPi Webstatus Threatens Industrial Systems
CVE-2025-41646: Critical Authentication Bypass in RevPi Webstatus Threatens Industrial Systems
A critical authentication bypass (CVE-2025-41646) affects KUNBUS RevPi Webstatus. Exploiting implicit type conversion allows attackers full access.
securityonline.info
June 10, 2025 at 3:45 AM
KUNBUS RevPi Webstatus
URL: www.cisa.gov/news-events/...
Classification: Critical, Solution: Official Fix, Exploit Maturity: Not Defined, CVSSv3.1: 9.8
KUNBUS RevPi Webstatus | CISA
www.cisa.gov
July 12, 2025 at 6:50 AM
VDE-2025-039 | CERT@VDE
Advisories
certvde.com
July 1, 2025 at 8:11 AM
You can now share your thoughts on vulnerability CVE-2025-41648 in Vulnerability-Lookup:
https://vulnerability.circl.lu/vuln/CVE-2025-41648

Pilz - IndustrialPI 4 with IndustrialPI webstatus

#vulnerabilitylookup #vulnerability #cybersecurity #bot
cvelistv5 - CVE-2025-41648
Vulnerability-Lookup - Fast vulnerability lookup correlation from different sources.
vulnerability.circl.lu
July 1, 2025 at 8:29 AM
RevPi Webstatus: Bypassing Authentication Like It’s 1999!

RevPi Webstatus vulnerable! Exploiters can bypass authentication. Update now to avoid unauthorized access and ensure your system's security.
thenimblenerd.com?p=1050077
RevPi Webstatus: Bypassing Authentication Like It’s 1999!
If your password is "TRUE," it might be time to panic. The RevPi Webstatus vulnerability, View CSAF, could let hackers waltz in without a proper invite. To avoid an unauthorized guest list, update to Version 2.4.6 and ensure your network isn't hosting an open house!
thenimblenerd.com
July 10, 2025 at 5:26 PM
Also vaguely ironic that when I go to WebStatus•dev to check the chart behind that single image, it won’t render unless I allow Google Tag Manager to track me.

webstatus.dev/stats?startD...

Useful error message, there.

Bug filed:
github.com/GoogleChrome...
June 13, 2025 at 8:48 PM