Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CWE CATEGORY:Cross-Cutting Problems
Category ID:1208
Vulnerability Mapping:Prohibited
Status:Draft
DetailsContent HistoryObserved CVE ExamplesReports
51Vulnerabilities found

CVE-2025-8762
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-7||HIGH
EPSS-0.01% / 1.80%
||
7 Day CHG~0.00%
Published-13 Aug, 2025 | 06:14
Updated-13 Aug, 2025 | 17:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
INSTAR 2K+/4K UART improper physical access control

A vulnerability was found in INSTAR 2K+ and 4K 3.11.1 Build 1124. This issue affects some unknown processing of the component UART Interface. The manipulation leads to improper physical access control. It is possible to launch the attack on the physical device. The exploit has been disclosed to the public and may be used.

Action-Not Available
Vendor-INSTAR
Product-4K2K+
CWE ID-CWE-1263
Improper Physical Access Control
CWE ID-CWE-284
Improper Access Control
CVE-2025-52953
Assigner-Juniper Networks, Inc.
ShareView Details
Assigner-Juniper Networks, Inc.
CVSS Score-7.1||HIGH
EPSS-0.03% / 5.11%
||
7 Day CHG-0.01%
Published-11 Jul, 2025 | 15:04
Updated-15 Jul, 2025 | 13:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Junos OS and Junos OS Evolved: An unauthenticated adjacent attacker sending a valid BGP UPDATE packet forces a BGP session reset

An Expected Behavior Violation vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated adjacent attacker sending a valid BGP UPDATE packet to cause a BGP session reset, resulting in a Denial of Service (DoS).  Continuous receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. This issue affects iBGP and eBGP and both IPv4 and IPv6 are affected by this vulnerability. This issue affects Junos OS: * All versions before 21.2R3-S9, * from 21.4 before 21.4R3-S11, * from 22.2 before 22.2R3-S7, * from 22.4 before 22.4R3-S7, * from 23.2 before 23.2R2-S4, * from 23.4 before 23.4R2-S4, * from 24.2 before 24.2R2, * from 24.4 before 24.4R1-S3, 24.4R2 Junos OS Evolved: * All versions before 22.2R3-S7-EVO, * from 22.4-EVO before 22.4R3-S7-EVO, * from 23.2-EVO before 23.2R2-S4-EVO, * from 23.4-EVO before 23.4R2-S4-EVO, * from 24.2-EVO before 24.2R2-EVO, * from 24.4-EVO before 24.4R1-S3-EVO, 24.4R2-EVO.

Action-Not Available
Vendor-Juniper Networks, Inc.
Product-Junos OSJunos OS Evolved
CWE ID-CWE-440
Expected Behavior Violation
CVE-2025-6211
Assigner-Protect AI (formerly huntr.dev)
ShareView Details
Assigner-Protect AI (formerly huntr.dev)
CVSS Score-6.5||MEDIUM
EPSS-0.07% / 20.84%
||
7 Day CHG+0.02%
Published-10 Jul, 2025 | 13:04
Updated-30 Jul, 2025 | 20:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
MD5 Hash Collision in run-llama/llama_index

A vulnerability in the DocugamiReader class of the run-llama/llama_index repository, up to version 0.12.28, involves the use of MD5 hashing to generate IDs for document chunks. This approach leads to hash collisions when structurally distinct chunks contain identical text, resulting in one chunk overwriting another. This can cause loss of semantically or legally important document content, breakage of parent-child chunk hierarchies, and inaccurate or hallucinated responses in AI outputs. The issue is resolved in version 0.3.1.

Action-Not Available
Vendor-llamaindexrun-llama
Product-llamaindexrun-llama/llama_index
CWE ID-CWE-440
Expected Behavior Violation
CVE-2025-3044
Assigner-Protect AI (formerly huntr.dev)
ShareView Details
Assigner-Protect AI (formerly huntr.dev)
CVSS Score-5.3||MEDIUM
EPSS-0.05% / 14.74%
||
7 Day CHG~0.00%
Published-07 Jul, 2025 | 09:54
Updated-30 Jul, 2025 | 21:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
MD5 Hash Collision in run-llama/llama_index

A vulnerability in the ArxivReader class of the run-llama/llama_index repository, versions up to v0.12.22.post1, allows for MD5 hash collisions when generating filenames for downloaded papers. This can lead to data loss as papers with identical titles but different contents may overwrite each other, preventing some papers from being processed for AI model training. The issue is resolved in version 0.12.28.

Action-Not Available
Vendor-llamaindexrun-llama
Product-llamaindexrun-llama/llama_index
CWE ID-CWE-440
Expected Behavior Violation
CVE-2025-32800
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-7.2||HIGH
EPSS-0.08% / 25.50%
||
7 Day CHG~0.00%
Published-16 Jun, 2025 | 20:38
Updated-01 Aug, 2025 | 22:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Conda-build vulnerable to supply chain attack vector due to pyproject.toml referring to dependencies not present in PyPI

Conda-build contains commands and tools to build conda packages. Prior to version 25.3.0, the pyproject.toml lists conda-index as a Python dependency. This package is not published in PyPI. An attacker could claim this namespace and upload arbitrary (malicious) code to the package, and then exploit pip install commands by injecting the malicious dependency in the solve. This issue has been fixed in version 25.3.0. A workaround involves using --no-deps for pip install-ing the project from the repository.

Action-Not Available
Vendor-anacondaconda
Product-conda-buildconda-build
CWE ID-CWE-1357
Reliance on Insufficiently Trustworthy Component
CVE-2025-40555
Assigner-Siemens
ShareView Details
Assigner-Siemens
CVSS Score-5.3||MEDIUM
EPSS-0.02% / 4.30%
||
7 Day CHG~0.00%
Published-13 May, 2025 | 09:38
Updated-13 May, 2025 | 19:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in APOGEE PXC+TALON TC Series (BACnet) (All versions). Affected devices start sending unsolicited BACnet broadcast messages after processing a specific BACnet createObject request. This could allow an attacker residing in the same BACnet network to send a specially crafted message that results in a partial denial of service condition of the targeted device, and potentially reduce the availability of BACnet network. A power cycle is required to restore the device's normal operation.

Action-Not Available
Vendor-Siemens AG
Product-APOGEE PXC+TALON TC Series (BACnet)
CWE ID-CWE-440
Expected Behavior Violation
CVE-2025-46712
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-3.7||LOW
EPSS-0.04% / 9.73%
||
7 Day CHG~0.00%
Published-08 May, 2025 | 19:26
Updated-12 May, 2025 | 17:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Erlang/OTP SSH Has Strict KEX Violations

Erlang/OTP is a set of libraries for the Erlang programming language. In versions prior to OTP-27.3.4 (for OTP-27), OTP-26.2.5.12 (for OTP-26), and OTP-25.3.2.21 (for OTP-25), Erlang/OTP SSH fails to enforce strict KEX handshake hardening measures by allowing optional messages to be exchanged. This allows a Man-in-the-Middle attacker to inject these messages in a connection during the handshake. This issue has been patched in versions OTP-27.3.4 (for OTP-27), OTP-26.2.5.12 (for OTP-26), and OTP-25.3.2.21 (for OTP-25).

Action-Not Available
Vendor-erlang
Product-otp
CWE ID-CWE-440
Expected Behavior Violation
CVE-2023-26819
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-2.9||LOW
EPSS-0.05% / 15.81%
||
7 Day CHG~0.00%
Published-19 Apr, 2025 | 00:00
Updated-21 Apr, 2025 | 15:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

cJSON 1.7.15 might allow a denial of service via a crafted JSON document such as {"a": true, "b": [ null,9999999999999999999999999999999999999999999999912345678901234567]}.

Action-Not Available
Vendor-cJSON Project
Product-cJSON
CWE ID-CWE-440
Expected Behavior Violation
CVE-2025-32728
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-4.3||MEDIUM
EPSS-0.03% / 7.78%
||
7 Day CHG~0.00%
Published-10 Apr, 2025 | 00:00
Updated-22 May, 2025 | 16:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In sshd in OpenSSH before 10.0, the DisableForwarding directive does not adhere to the documentation stating that it disables X11 and agent forwarding.

Action-Not Available
Vendor-OpenBSDDebian GNU/Linux
Product-debian_linuxopensshOpenSSH
CWE ID-CWE-440
Expected Behavior Violation
CVE-2025-0508
Assigner-Protect AI (formerly huntr.dev)
ShareView Details
Assigner-Protect AI (formerly huntr.dev)
CVSS Score-5.9||MEDIUM
EPSS-0.03% / 7.58%
||
7 Day CHG~0.00%
Published-20 Mar, 2025 | 10:11
Updated-20 Mar, 2025 | 14:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
MD5 Hash Collision in SageMaker Workflow in aws/sagemaker-python-sdk

A vulnerability in the SageMaker Workflow component of aws/sagemaker-python-sdk allows for the possibility of MD5 hash collisions in all versions. This can lead to workflows being inadvertently replaced due to the reuse of results from different configurations that produce the same MD5 hash. This issue can cause integrity problems within the pipeline, potentially leading to erroneous processing outcomes.

Action-Not Available
Vendor-aws
Product-aws/sagemaker-python-sdk
CWE ID-CWE-440
Expected Behavior Violation
CVE-2024-56202
Assigner-Apache Software Foundation
ShareView Details
Assigner-Apache Software Foundation
CVSS Score-4.3||MEDIUM
EPSS-0.33% / 55.37%
||
7 Day CHG~0.00%
Published-06 Mar, 2025 | 11:09
Updated-29 Apr, 2025 | 16:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Apache Traffic Server: Expect header field can unreasonably retain resource

Expected Behavior Violation vulnerability in Apache Traffic Server. This issue affects Apache Traffic Server: from 9.0.0 through 9.2.8, from 10.0.0 through 10.0.3. Users are recommended to upgrade to versions 9.2.9 or 10.0.4 or newer, which fixes the issue.

Action-Not Available
Vendor-The Apache Software Foundation
Product-traffic_serverApache Traffic Server
CWE ID-CWE-440
Expected Behavior Violation
CVE-2025-27401
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-4.6||MEDIUM
EPSS-0.05% / 13.33%
||
7 Day CHG-0.00%
Published-04 Mar, 2025 | 16:58
Updated-22 Aug, 2025 | 16:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
In Tuleap, deleting a report can delete criteria filters in other reports

Tuleap is an Open Source Suite to improve management of software developments and collaboration. In a standard usages of Tuleap, the issue has a limited impact, it will mostly leave dangling data. However, a malicious user could create and delete reports multiple times to cycle through all the filters of all reports of the instance and delete them. The malicious user only needs to have access to one tracker. This would result in the loss of all criteria filters forcing users and tracker admins to re-create them. This vulnerability is fixed in Tuleap Community Edition 16.4.99.1740498975 and Tuleap Enterprise Edition 16.4-6 and 16.3-11.

Action-Not Available
Vendor-Enalean SAS
Product-tuleaptuleap
CWE ID-CWE-440
Expected Behavior Violation
CVE-2025-27094
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-5.4||MEDIUM
EPSS-0.20% / 41.74%
||
7 Day CHG~0.00%
Published-03 Mar, 2025 | 15:51
Updated-10 Jul, 2025 | 16:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Tuleap allows default values to be cleared from field configuration

Tuleap is an open-source suite designed to improve software development management and collaboration. A malicious user with access to a tracker could force-reset certain field configurations, leading to potential information loss. The display time attribute for the date field, the size attribute for the multiselectbox field, the default value, number of rows, and columns attributes for the text field, and the default value, size, and max characters attributes for the string field configurations are lost when added as criteria in a saved report. Additionally, in Tuleap Community Edition versions 16.4.99.1739806825 to 16.4.99.1739877910, this issue could be exploited to prevent access to tracker data by triggering a crash. This vulnerability has been fixed in Tuleap Community Edition 16.4.99.1739877910 and Tuleap Enterprise Edition 16.3-9 and 16.4-4.

Action-Not Available
Vendor-Enalean SAS
Product-tuleaptuleap
CWE ID-CWE-440
Expected Behavior Violation
CVE-2024-48973
Assigner-Baxter Healthcare
ShareView Details
Assigner-Baxter Healthcare
CVSS Score-9.3||CRITICAL
EPSS-0.03% / 8.20%
||
7 Day CHG~0.00%
Published-14 Nov, 2024 | 21:24
Updated-18 Nov, 2024 | 15:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Debug port on Life2000 Ventilator serial interface is enabled by default

The debug port on the ventilator's serial interface is enabled by default. This could allow an attacker to send and receive messages over the debug port (which are unencrypted; see 3.2.1) that result in unauthorized disclosure of information and/or have unintended impacts on device settings and performance.

Action-Not Available
Vendor-Baxter International, Inc.
Product-Life2000 Ventilation Systemlife2000_ventilator_firmware
CWE ID-CWE-1263
Improper Physical Access Control
CVE-2024-47762
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-5.8||MEDIUM
EPSS-0.12% / 32.14%
||
7 Day CHG-0.03%
Published-03 Oct, 2024 | 17:14
Updated-04 Oct, 2024 | 13:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Unexpected visibility of environment variable configurations in @backstage/plugin-app-backend

Backstage is an open framework for building developer portals. Configuration supplied through APP_CONFIG_* environment variables, for example APP_CONFIG_backend_listen_port=7007, where unexpectedly ignoring the visibility defined in configuration schema. This occurred even if the configuration schema specified that they should have backend or secret visibility. This was an intended feature of the APP_CONFIG_* way of supplying configuration, but now clearly goes against the expected behavior of the configuration system. This behavior leads to a risk of potentially exposing sensitive configuration details intended to remain private or restricted to backend processes. The issue has been resolved in version 0.3.75 of the @backstage/plugin-app-backend package. As a temporary measure, avoid supplying secrets using the APP_CONFIG_ configuration pattern. Consider alternative methods for setting secrets, such as the environment substitution available for Backstage configuration.

Action-Not Available
Vendor-backstagebackstage
Product-backstagebackstage
CWE ID-CWE-440
Expected Behavior Violation
CVE-2024-8690
Assigner-Palo Alto Networks, Inc.
ShareView Details
Assigner-Palo Alto Networks, Inc.
CVSS Score-5.6||MEDIUM
EPSS-0.03% / 8.43%
||
7 Day CHG~0.00%
Published-11 Sep, 2024 | 16:42
Updated-15 Oct, 2024 | 18:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cortex XDR Agent: Local Windows Administrator Can Disable the Agent

A problem with a detection mechanism in the Palo Alto Networks Cortex XDR agent on Windows devices enables a user with Windows administrator privileges to disable the agent. This issue may be leveraged by malware to disable the Cortex XDR agent and then to perform malicious activity.

Action-Not Available
Vendor-Palo Alto Networks, Inc.Microsoft Corporation
Product-cortex_xdr_agentwindowsCortex XDR Agent
CWE ID-CWE-440
Expected Behavior Violation
CVE-2024-7246
Assigner-Google LLC
ShareView Details
Assigner-Google LLC
CVSS Score-6.3||MEDIUM
EPSS-0.03% / 8.24%
||
7 Day CHG~0.00%
Published-06 Aug, 2024 | 10:14
Updated-22 Jul, 2025 | 19:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
HPACK table poisoning in gRPC C++, Python & Ruby

It's possible for a gRPC client communicating with a HTTP/2 proxy to poison the HPACK table between the proxy and the backend such that other clients see failed requests. It's also possible to use this vulnerability to leak other clients HTTP header keys, but not values. This occurs because the error status for a misencoded header is not cleared between header reads, resulting in subsequent (incrementally indexed) added headers in the first request being poisoned until cleared from the HPACK table. Please update to a fixed version of gRPC as soon as possible. This bug has been fixed in 1.58.3, 1.59.5, 1.60.2, 1.61.3, 1.62.3, 1.63.2, 1.64.3, 1.65.4.

Action-Not Available
Vendor-grpcGoogle LLC
Product-grpcgRPC
CWE ID-CWE-440
Expected Behavior Violation
CVE-2024-6281
Assigner-Protect AI (formerly huntr.dev)
ShareView Details
Assigner-Protect AI (formerly huntr.dev)
CVSS Score-7.3||HIGH
EPSS-0.03% / 5.81%
||
7 Day CHG~0.00%
Published-20 Jul, 2024 | 03:19
Updated-01 Aug, 2024 | 21:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Path Traversal in parisneo/lollms

A path traversal vulnerability exists in the `apply_settings` function of parisneo/lollms versions prior to 9.5.1. The `sanitize_path` function does not adequately secure the `discussion_db_name` parameter, allowing attackers to manipulate the path and potentially write to important system folders.

Action-Not Available
Vendor-ParisNeo (LoLLMs)
Product-parisneo/lollmslollms
CWE ID-CWE-440
Expected Behavior Violation
CVE-2024-38806
Assigner-VMware by Broadcom
ShareView Details
Assigner-VMware by Broadcom
CVSS Score-3.9||LOW
EPSS-0.02% / 4.28%
||
7 Day CHG-0.00%
Published-18 Jul, 2024 | 18:41
Updated-02 Aug, 2024 | 04:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
UAA Failure to Remove Shadow User’s Access

Failure to properly synchronize user's permissions in UAA in Cloud Foundry Foundation v40.17.0 https://github.com/cloudfoundry/cf-deployment/releases/tag/v40.17.0 , potentially resulting in users retaining access rights they should not have. This can allow them to perform operations beyond their intended permissions.

Action-Not Available
Vendor-n/a
Product-UAA
CWE ID-CWE-440
Expected Behavior Violation
CVE-2024-36438
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-7.3||HIGH
EPSS-0.02% / 3.55%
||
7 Day CHG+0.01%
Published-15 Jul, 2024 | 00:00
Updated-02 Aug, 2024 | 03:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

eLinkSmart Hidden Smart Cabinet Lock 2024-05-22 has Incorrect Access Control and fails to perform an authorization check which can lead to card duplication and other attacks.

Action-Not Available
Vendor-n/aelinksmart
Product-n/asmart_cabinet_lock
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-285
Improper Authorization
CWE ID-CWE-1263
Improper Physical Access Control
CVE-2024-39512
Assigner-Juniper Networks, Inc.
ShareView Details
Assigner-Juniper Networks, Inc.
CVSS Score-7||HIGH
EPSS-0.15% / 36.04%
||
7 Day CHG~0.00%
Published-10 Jul, 2024 | 23:02
Updated-07 Feb, 2025 | 19:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Junos OS Evolved: User is not logged out when the console cable is disconnected

An Improper Physical Access Control vulnerability in the console port control of Juniper Networks Junos OS Evolved allows an attacker with physical access to the device to get access to a user account. When the console cable is disconnected, the logged in user is not logged out. This allows a malicious attacker with physical access to the console to resume a previous session and possibly gain administrative privileges. This issue affects Junos OS Evolved: * from 23.2R2-EVO before 23.2R2-S1-EVO,  * from 23.4R1-EVO before 23.4R2-EVO.

Action-Not Available
Vendor-Juniper Networks, Inc.
Product-junos_os_evolvedJunos OS Evolvedjunos_evolved
CWE ID-CWE-1263
Improper Physical Access Control
CVE-2024-26024
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-8.6||HIGH
EPSS-0.16% / 37.59%
||
7 Day CHG~0.00%
Published-28 May, 2024 | 16:34
Updated-01 Aug, 2024 | 23:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SUBNET Substation Server Reliance on Insufficiently Trustworthy Component

SUBNET Solutions Inc. has identified vulnerabilities in third-party components used in Substation Server.

Action-Not Available
Vendor-SUBNETsubnet
Product-Substation Serversubstation_server
CWE ID-CWE-1357
Reliance on Insufficiently Trustworthy Component
CVE-2024-28042
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-8.6||HIGH
EPSS-0.10% / 28.19%
||
7 Day CHG~0.00%
Published-15 May, 2024 | 16:44
Updated-02 Aug, 2024 | 00:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SUBNET PowerSYSTEM Center Reliance on Insufficiently Trustworthy Component

SUBNET Solutions Inc. has identified vulnerabilities in third-party components used in PowerSYSTEM Center.

Action-Not Available
Vendor-SUBNETsubnet
Product-PowerSYSTEM Centerpowersystem_center
CWE ID-CWE-1357
Reliance on Insufficiently Trustworthy Component
CVE-2022-32506
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-6.4||MEDIUM
EPSS-0.05% / 14.37%
||
7 Day CHG~0.00%
Published-09 May, 2024 | 19:47
Updated-13 Feb, 2025 | 15:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered on certain Nuki Home Solutions devices. An attacker with physical access to the circuit board could use the SWD debug features to control the execution of code on the processor and debug the firmware, as well as read or alter the content of the internal and external flash memory. This affects Nuki Smart Lock 3.0 before 3.3.5, Nuki Smart Lock 2.0 before 2.12.4, as well as Nuki Bridge v1 before 1.22.0 and v2 before 2.13.2.

Action-Not Available
Vendor-n/anuki
Product-n/abridge_firmwaresmart_locksmart_lock_firmwarebridge
CWE ID-CWE-1263
Improper Physical Access Control
CVE-2024-32971
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-9.1||CRITICAL
EPSS-0.16% / 37.01%
||
7 Day CHG~0.00%
Published-02 May, 2024 | 06:43
Updated-02 Aug, 2024 | 02:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Defect in query plan cache may cause incorrect operations to be executed in Apollo Router

Apollo Router is a configurable, graph router written in Rust to run a federated supergraph that uses Apollo Federation 2. The affected versions of Apollo Router contain a bug that in limited circumstances, could lead to unexpected operations being executed which can result in unintended data or effects. This only affects Router instances configured to use distributed query plan caching. The root cause of this defect is a bug in Apollo Router’s cache retrieval logic: When this defect is present and distributed query planning caching is enabled, asking the Router to execute an operation (whether it is a query, a mutation, or a subscription) may result in an unexpected variation of that operation being executed or the generation of unexpected errors. The issue stems from inadvertently executing a modified version of a previously executed operation, whose query plan is stored in the underlying cache (specifically, Redis). Depending on the type of the operation, the result may vary. For a query, results may be fetched that don’t match what was requested (e.g., rather than running `fetchUsers(type: ENTERPRISE)` the Router may run `fetchUsers(type: TRIAL)`. For a mutation, this may result in incorrect mutations being sent to underlying subgraph servers (e.g., rather than sending `deleteUser(id: 10)` to a subgraph, the Router may run `deleteUser(id: 12)`. Users who are using distributed query plan caching, are advised to either upgrade to version 1.45.1 or above or downgrade to version 1.43.2 of the Apollo Router. Apollo Router versions 1.44.0 or 1.45.0 are not recommended for use and have been withdrawn. Users unable to upgrade can disable distributed query plan caching to mitigate this issue.

Action-Not Available
Vendor-apollographqlapollographql
Product-routerapollo_router
CWE ID-CWE-440
Expected Behavior Violation
CWE ID-CWE-670
Always-Incorrect Control Flow Implementation
CVE-2024-28326
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-6.8||MEDIUM
EPSS-0.07% / 23.01%
||
7 Day CHG~0.00%
Published-26 Apr, 2024 | 00:00
Updated-16 Dec, 2024 | 23:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect Access Control in ASUS RT-N12+ B1 and RT-N12 D1 routers allows local attackers to obtain root terminal access via the the UART interface.

Action-Not Available
Vendor-n/aASUS (ASUSTeK Computer Inc.)
Product-n/art-n12\+_b1_firmware
CWE ID-CWE-1263
Improper Physical Access Control
CVE-2023-38290
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.03% / 6.76%
||
7 Day CHG~0.00%
Published-22 Apr, 2024 | 00:00
Updated-02 Aug, 2024 | 17:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Certain software builds for the BLU View 2 and Sharp Rouvo V Android devices contain a vulnerable pre-installed app with a package name of com.evenwell.fqc (versionCode='9020801', versionName='9.0208.01' ; versionCode='9020913', versionName='9.0209.13' ; versionCode='9021203', versionName='9.0212.03') that allows local third-party apps to execute arbitrary shell commands in its context (system user) due to inadequate access control. No permissions or special privileges are necessary to exploit the vulnerability in the com.evenwell.fqc app. No user interaction is required beyond installing and running a third-party app. The vulnerability allows local apps to access sensitive functionality that is generally restricted to pre-installed apps, such as programmatically performing the following actions: granting arbitrary permissions (which can be used to obtain sensitive user data), installing arbitrary apps, video recording the screen, wiping the device (removing the user's apps and data), injecting arbitrary input events, calling emergency phone numbers, disabling apps, accessing notifications, and much more. The software build fingerprints for each confirmed vulnerable device are as follows: BLU View 2 (BLU/B131DL/B130DL:11/RP1A.200720.011/1672046950:user/release-keys, BLU/B131DL/B130DL:11/RP1A.200720.011/1663816427:user/release-keys, BLU/B131DL/B130DL:11/RP1A.200720.011/1656476696:user/release-keys, BLU/B131DL/B130DL:11/RP1A.200720.011/1647856638:user/release-keys) and Sharp Rouvo V (SHARP/VZW_STTM21VAPP/STTM21VAPP:12/SP1A.210812.016/1KN0_0_460:user/release-keys and SHARP/VZW_STTM21VAPP/STTM21VAPP:12/SP1A.210812.016/1KN0_0_530:user/release-keys). This malicious app starts an exported activity named com.evenwell.fqc/.activity.ClickTest, crashes the com.evenwell.fqc app by sending an empty Intent (i.e., having not extras) to the com.evenwell.fqc/.FQCBroadcastReceiver receiver component, and then it sends command arbitrary shell commands to the com.evenwell.fqc/.FQCService service component which executes them with "system" privileges.

Action-Not Available
Vendor-n/abluviewsharp
Product-n/arouvo_vbluview
CWE ID-CWE-1263
Improper Physical Access Control
CVE-2024-3313
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-8.6||HIGH
EPSS-0.07% / 22.68%
||
7 Day CHG~0.00%
Published-09 Apr, 2024 | 22:40
Updated-01 Aug, 2024 | 20:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SUBNET PowerSYSTEM Server and Substation Server Reliance on Insufficiently Trustworthy Component

SUBNET Solutions Inc. has identified vulnerabilities in third-party components used in PowerSYSTEM Server 2021 and Substation Server 2021.

Action-Not Available
Vendor-SUBNET Solutionssubnet
Product-Substation Server 2021PowerSYSTEM Serversubstation_serverpowersystem_center
CWE ID-CWE-1357
Reliance on Insufficiently Trustworthy Component
CVE-2024-30246
Assigner-GitHub, Inc.
ShareView Details
Assigner-GitHub, Inc.
CVSS Score-7.6||HIGH
EPSS-0.07% / 21.02%
||
7 Day CHG~0.00%
Published-29 Mar, 2024 | 15:50
Updated-10 Jul, 2025 | 17:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Tuleap deleting or moving an artifact can delete values from unrelated artifacts

Tuleap is an Open Source Suite to improve management of software developments and collaboration. A malicious user could exploit this issue on purpose to delete information on the instance or possibly gain access to restricted artifacts. It is however not possible to control exactly which information is deleted. Information from theDate, File, Float, Int, List, OpenList, Text, and Permissions on artifact (this one can lead to the disclosure of restricted information) fields can be impacted. This vulnerability is fixed in Tuleap Community Edition version 15.7.99.6 and Tuleap Enterprise Edition 15.7-2, 15.6-5, 15.5-6, 15.4-8, 15.3-6, 15.2-5, 15.1-9, 15.0-9, and 14.12-6.

Action-Not Available
Vendor-Enalean SAS
Product-tuleaptuleap
CWE ID-CWE-440
Expected Behavior Violation
CWE ID-CWE-670
Always-Incorrect Control Flow Implementation
CVE-2022-34381
Assigner-Dell
ShareView Details
Assigner-Dell
CVSS Score-9.1||CRITICAL
EPSS-0.63% / 69.27%
||
7 Day CHG~0.00%
Published-02 Feb, 2024 | 15:30
Updated-03 Aug, 2024 | 09:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell BSAFE SSL-J version 7.0 and all versions prior to 6.5, and Dell BSAFE Crypto-J versions prior to 6.2.6.1 contain an unmaintained third-party component vulnerability. An unauthenticated remote attacker could potentially exploit this vulnerability, leading to the compromise of the impacted system. This is a Critical vulnerability and Dell recommends customers to upgrade at the earliest opportunity.

Action-Not Available
Vendor-Dell Inc.
Product-bsafe_ssl-jbsafe_crypto-jDell BSAFE SSL-JDell BSAFE Crypto-J
CWE ID-CWE-1329
Reliance on Component That is Not Updateable
CVE-2023-6129
Assigner-OpenSSL Software Foundation
ShareView Details
Assigner-OpenSSL Software Foundation
CVSS Score-6.5||MEDIUM
EPSS-1.54% / 80.61%
||
7 Day CHG-0.04%
Published-09 Jan, 2024 | 16:36
Updated-20 Jun, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
POLY1305 MAC implementation corrupts vector registers on PowerPC

Issue summary: The POLY1305 MAC (message authentication code) implementation contains a bug that might corrupt the internal state of applications running on PowerPC CPU based platforms if the CPU provides vector instructions. Impact summary: If an attacker can influence whether the POLY1305 MAC algorithm is used, the application state might be corrupted with various application dependent consequences. The POLY1305 MAC (message authentication code) implementation in OpenSSL for PowerPC CPUs restores the contents of vector registers in a different order than they are saved. Thus the contents of some of these vector registers are corrupted when returning to the caller. The vulnerable code is used only on newer PowerPC processors supporting the PowerISA 2.07 instructions. The consequences of this kind of internal application state corruption can be various - from no consequences, if the calling application does not depend on the contents of non-volatile XMM registers at all, to the worst consequences, where the attacker could get complete control of the application process. However unless the compiler uses the vector registers for storing pointers, the most likely consequence, if any, would be an incorrect result of some application dependent calculations or a crash leading to a denial of service. The POLY1305 MAC algorithm is most frequently used as part of the CHACHA20-POLY1305 AEAD (authenticated encryption with associated data) algorithm. The most common usage of this AEAD cipher is with TLS protocol versions 1.2 and 1.3. If this cipher is enabled on the server a malicious client can influence whether this AEAD cipher is used. This implies that TLS server applications using OpenSSL can be potentially impacted. However we are currently not aware of any concrete application that would be affected by this issue therefore we consider this a Low severity security issue.

Action-Not Available
Vendor-OpenSSL
Product-opensslOpenSSL
CWE ID-CWE-440
Expected Behavior Violation
CWE ID-CWE-787
Out-of-bounds Write
CVE-2022-48183
Assigner-Lenovo Group Ltd.
ShareView Details
Assigner-Lenovo Group Ltd.
CVSS Score-6.1||MEDIUM
EPSS-0.13% / 32.78%
||
7 Day CHG~0.00%
Published-09 Oct, 2023 | 20:56
Updated-19 Sep, 2024 | 13:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability was reported in ThinkPad T14s Gen 3 and X13 Gen3 that could cause the BIOS tamper detection mechanism to not trigger under specific circumstances which could allow unauthorized access.

Action-Not Available
Vendor-Linux Kernel Organization, IncLenovo Group LimitedMicrosoft Corporation
Product-linux_kernelthinkpad_t14s_gen_3_firmwarethinkpad_x13_gen_3_firmwarethinkpad_t14s_gen_3windowsthinkpad_x13_gen_3ThinkPad T14s X13 Gen3 BIOS - WindowsThinkPad T14s Gen 3 BIOS - LinuxThinkPad X13 Gen3 BIOS - WindowsThinkPad X13 Gen3 BIOS - Linux
CWE ID-CWE-1263
Improper Physical Access Control
CVE-2022-48182
Assigner-Lenovo Group Ltd.
ShareView Details
Assigner-Lenovo Group Ltd.
CVSS Score-6.1||MEDIUM
EPSS-0.13% / 32.78%
||
7 Day CHG~0.00%
Published-09 Oct, 2023 | 20:55
Updated-19 Sep, 2024 | 13:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability was reported in ThinkPad T14s Gen 3 and X13 Gen3 that could cause the BIOS tamper detection mechanism to not trigger under specific circumstances which could allow unauthorized access.

Action-Not Available
Vendor-Linux Kernel Organization, IncLenovo Group LimitedMicrosoft Corporation
Product-linux_kernelthinkpad_t14s_gen_3_firmwarethinkpad_x13_gen_3_firmwarethinkpad_t14s_gen_3windowsthinkpad_x13_gen_3ThinkPad T14s X13 Gen3 BIOS - WindowsThinkPad T14s Gen 3 BIOS - LinuxThinkPad X13 Gen3 BIOS - WindowsThinkPad X13 Gen3 BIOS - Linux
CWE ID-CWE-1263
Improper Physical Access Control
CVE-2022-3728
Assigner-Lenovo Group Ltd.
ShareView Details
Assigner-Lenovo Group Ltd.
CVSS Score-6.1||MEDIUM
EPSS-0.13% / 32.78%
||
7 Day CHG~0.00%
Published-09 Oct, 2023 | 20:48
Updated-19 Sep, 2024 | 13:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability was reported in ThinkPad T14s Gen 3 and X13 Gen3 that could cause the BIOS tamper detection mechanism to not trigger under specific circumstances which could allow unauthorized access.

Action-Not Available
Vendor-Lenovo Group Limited
Product-thinkpad_t14s_gen_3_firmwarethinkpad_x13_gen_3_firmwarethinkpad_x13_gen_3thinkpad_t14s_gen_3ThinkPad T14s Gen 3 BIOSThinkPad X13 Gen3 BIOS
CWE ID-CWE-1263
Improper Physical Access Control
CVE-2023-4807
Assigner-OpenSSL Software Foundation
ShareView Details
Assigner-OpenSSL Software Foundation
CVSS Score-7.8||HIGH
EPSS-0.66% / 70.31%
||
7 Day CHG-0.02%
Published-08 Sep, 2023 | 11:01
Updated-27 Aug, 2025 | 20:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
POLY1305 MAC implementation corrupts XMM registers on Windows

Issue summary: The POLY1305 MAC (message authentication code) implementation contains a bug that might corrupt the internal state of applications on the Windows 64 platform when running on newer X86_64 processors supporting the AVX512-IFMA instructions. Impact summary: If in an application that uses the OpenSSL library an attacker can influence whether the POLY1305 MAC algorithm is used, the application state might be corrupted with various application dependent consequences. The POLY1305 MAC (message authentication code) implementation in OpenSSL does not save the contents of non-volatile XMM registers on Windows 64 platform when calculating the MAC of data larger than 64 bytes. Before returning to the caller all the XMM registers are set to zero rather than restoring their previous content. The vulnerable code is used only on newer x86_64 processors supporting the AVX512-IFMA instructions. The consequences of this kind of internal application state corruption can be various - from no consequences, if the calling application does not depend on the contents of non-volatile XMM registers at all, to the worst consequences, where the attacker could get complete control of the application process. However given the contents of the registers are just zeroized so the attacker cannot put arbitrary values inside, the most likely consequence, if any, would be an incorrect result of some application dependent calculations or a crash leading to a denial of service. The POLY1305 MAC algorithm is most frequently used as part of the CHACHA20-POLY1305 AEAD (authenticated encryption with associated data) algorithm. The most common usage of this AEAD cipher is with TLS protocol versions 1.2 and 1.3 and a malicious client can influence whether this AEAD cipher is used by the server. This implies that server applications using OpenSSL can be potentially impacted. However we are currently not aware of any concrete application that would be affected by this issue therefore we consider this a Low severity security issue. As a workaround the AVX512-IFMA instructions support can be disabled at runtime by setting the environment variable OPENSSL_ia32cap: OPENSSL_ia32cap=:~0x200000 The FIPS provider is not affected by this issue.

Action-Not Available
Vendor-OpenSSL
Product-opensslOpenSSL
CWE ID-CWE-440
Expected Behavior Violation
CVE-2023-32731
Assigner-Google LLC
ShareView Details
Assigner-Google LLC
CVSS Score-7.4||HIGH
EPSS-0.07% / 21.81%
||
7 Day CHG~0.00%
Published-09 Jun, 2023 | 10:54
Updated-26 Sep, 2024 | 19:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Information leak in gRPC

When gRPC HTTP2 stack raised a header size exceeded error, it skipped parsing the rest of the HPACK frame. This caused any HPACK table mutations to also be skipped, resulting in a desynchronization of HPACK tables between sender and receiver. If leveraged, say, between a proxy and a backend, this could lead to requests from the proxy being interpreted as containing headers from different proxy clients - leading to an information leak that can be used for privilege escalation or data exfiltration. We recommend upgrading beyond the commit contained in  https://github.com/grpc/grpc/pull/33005 https://github.com/grpc/grpc/pull/33005

Action-Not Available
Vendor-grpcgrpcGoogle LLC
Product-grpcgRPCgrpc
CWE ID-CWE-440
Expected Behavior Violation
CVE-2023-32732
Assigner-Google LLC
ShareView Details
Assigner-Google LLC
CVSS Score-5.3||MEDIUM
EPSS-0.02% / 4.32%
||
7 Day CHG~0.00%
Published-09 Jun, 2023 | 10:48
Updated-13 Feb, 2025 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Denial-of-Service in gRPC

gRPC contains a vulnerability whereby a client can cause a termination of connection between a HTTP2 proxy and a gRPC server: a base64 encoding error for `-bin` suffixed headers will result in a disconnection by the gRPC server, but is typically allowed by HTTP2 proxies. We recommend upgrading beyond the commit in  https://github.com/grpc/grpc/pull/32309 https://www.google.com/url

Action-Not Available
Vendor-grpcgrpcFedora ProjectGoogle LLC
Product-fedoragrpcgRPCgrpc
CWE ID-CWE-440
Expected Behavior Violation
CVE-2023-2088
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.11% / 30.34%
||
7 Day CHG~0.00%
Published-12 May, 2023 | 00:00
Updated-24 Jan, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in OpenStack due to an inconsistency between Cinder and Nova. This issue can be triggered intentionally or by accident. A remote, authenticated attacker could exploit this vulnerability by detaching one of their volumes from Cinder. The highest impact is to confidentiality.

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-openstackOpenStack
CWE ID-CWE-440
Expected Behavior Violation
CVE-2022-3270
Assigner-CERT@VDE
ShareView Details
Assigner-CERT@VDE
CVSS Score-9.8||CRITICAL
EPSS-0.37% / 57.98%
||
7 Day CHG+0.07%
Published-01 Dec, 2022 | 10:27
Updated-24 Apr, 2025 | 20:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Incomplete Documentation of remote functions in FESTO products.

In multiple products by Festo a remote unauthenticated attacker could use functions of an undocumented protocol which could lead to a complete loss of confidentiality, integrity and availability.

Action-Not Available
Vendor-festoFesto SE
Product-ethernet\/ip_interface_cpx-ap-i-ep-m12_firmwareservo_cmmt-as-c2-3a-ep-s1compact_vision_system_sboc-m_firmwarebus_node_cpx-m-fb34_firmwareservo_cmmt-as-c2-11a-p3-ep-s1_firmwarecamera_system_chb-c-n_firmwareoperator_unit_cdpx-x-a-w-13servo_cmmt-as-c12-11a-p3-mp-s1_firmwaremotor_controller_cmmp-as-c5-3a-m0_firmwarebus_node_cpx-fb32servo_cmmt-as-c12-11a-p3-ec-s1_firmwarecontroller_cecc-x-m1-ys-l2motor_controller_cmmp-as-c10-11a-p3-m0servo_cmmt-as-c12-11a-p3-mp-s1operator_unit_cdpx-x-a-s-10_firmwareservo_cmmt-as-c3-11a-p3-mp-s1_firmwareplanar_surface_gantry_excm-40_firmwarebus_node_cteu-pnbus_node_cpx-m-fb44controller_cecc-x-m1-y-yjkp_firmwareplanar_surface_gantry_excm-30motor_controller_cmmp-as-c5-3a-m0bus_node_cteu-pn_firmwareservo_cmmt-as-c2-3a-mp-s1_firmwarebus_node_cpx-fb40bus_node_cpx-m-fb35control_block_cpx-cec-m1-v3_firmwarecompact_vision_system_sboc-q_firmwaremotor_controller_cmmo-st-c5-1-lkpmotor_controller_cmmp-as-c5-3a-m3_firmwarecontroller_cecc-x-m1-ys-l1_firmwarecompact_vision_system_sboi-m_firmwareservo_cmmt-as-c5-11a-p3-ec-s1servo_cmmt-as-c5-11a-p3-pn-s1_firmwarecompact_vision_system_sboi-c_firmwarecompact_vision_system_sboi-q_firmwareservo_cmmt-as-c3-11a-p3-ep-s1controller_cecc-d-ba_firmwarecontroller_cecc-sservo_drive_cmmt-st-c8-1c-pn-s0servo_cmmt-as-c7-11a-p3-ec-s1_firmwarecontroller_cecc-lk_firmwarebus_node_cpx-m-fb45_firmwarecompact_vision_system_sboi-ccontrol_block_cpx-fec-1-ieservo_cmmt-as-c4-3a-ep-s1_firmwareservo_cmmt-as-c3-11a-p3-ep-s1_firmwareservo_cmmt-as-c7-11a-p3-pn-s1servo_cmmt-as-c5-11a-p3-ec-s1_firmwareintegrated_drive_emca-ec-67-m-1te-epservo_cmmt-as-c2-11a-p3-ec-s1_firmwareservo_cmmt-as-c3-11a-p3-pn-s1_firmwarecontrol_block_cpx-fec-1-ie_firmwareservo_cmmt-as-c12-11a-p3-pn-s1bus_node_cpx-fb36gateway_cpx-iotcontrol_block_cpx-cec-s1-v3_firmwaremotor_controller_cmmo-st-c5-1-dion_firmwareoperator_unit_cdpx-x-a-w-4motor_controller_cmmp-as-c5-11a-p3-m3_firmwareservo_cmmt-as-c2-11a-p3-pn-s1_firmwarebus_node_cpx-fb39_firmwareservo_cmmt-as-c4-3a-mp-s1ethernet\/ip_interface_cpx-ap-i-pn-m12_firmwareoperator_unit_cdpx-x-a-w-4_firmwarebus_node_cpx-fb43_firmwarecompact_vision_system_sboc-mcontroller_cmxh-st2-c5-7-diop_firmwarebus_node_cpx-fb40_firmwarebus_node_cpx-m-fb34bus_node_cpx-m-fb44_firmwarecontroller_cecc-x-m1_firmwareethernet\/ip_interface_cpx-ap-i-ep-m12controller_cecc-dservo_drive_cmmt-st-c8-1c-ep-s0servo_cmmt-as-c2-3a-ec-s1motor_controller_cmmp-as-c15-11a-p3-m3controller_cecc-x-m1-mv-s1_firmwareservo_drive_cmmt-st-c8-1c-pn-s0_firmwaremotor_controller_cmmp-as-c5-11a-p3-m0servo_cmmt-as-c2-3a-pn-s1servo_cmmt-as-c7-11a-p3-ec-s1control_block_cpx-cmxx_firmwarececx-x-c1_modular_master_controllerbus_node_cteu-epbus_node_cteu-pn-ex1c_firmwarececx-x-m1_modular_controller_firmwarecontroller_cecc-lkgateway_cpx-iot_firmwareplanar_surface_gantry_excm-40vtem-s1-c_firmwarecompact_vision_system_sboc-c_firmwareservo_cmmt-as-c4-3a-pn-s1_firmwarecontroller_cecc-x-m1-y-yjkpcontrol_block_cpx-cecbus_node_cpx-fb43control_block_cpx-cec_firmwareservo_cmmt-as-c7-11a-p3-ep-s1_firmwaremotor_controller_cmmp-as-c10-11a-p3-m3_firmwarececx-x-m1_modular_controlleroperator_unit_cdpx-x-a-s-10controller_cecc-s_firmwareservo_cmmt-as-c4-3a-ep-s1operator_unit_cdpx-x-a-w-13_firmwareservo_cmmt-as-c7-11a-p3-mp-s1servo_cmmt-as-c2-11a-p3-mp-s1controller_cmxh-st2-c5-7-diopmotor_controller_cmmo-st-c5-1-dionservo_cmmt-as-c7-11a-p3-mp-s1_firmwarecontrol_block_cpx-cec-s1-v3bus_node_cpx-fb36_firmwarecontroller_cecc-x-m1-ys-l1servo_cmmt-as-c2-3a-mp-s1servo_cmmt-as-c5-11a-p3-ep-s1_firmwareservo_cmmt-as-c12-11a-p3-ec-s1operator_unit_cdpx-x-a-w-7_firmwaremotor_controller_cmmo-st-c5-1-lkp_firmwaremotor_controller_cmmp-as-c2-3a-m0servo_cmmt-as-c5-11a-p3-ep-s1servo_cmmt-as-c4-3a-pn-s1servo_cmmt-as-c2-11a-p3-mp-s1_firmwarecontrol_block_cpx-cec-m1_firmwareintegrated_drive_emca-ec-67_firmwarecontrol_block_cpx-cec-c1-v3controller_cecc-x-m1-mv_firmwaremotor_controller_cmmp-as-c5-3a-m3bus_module_cpx-e-ep_firmwaremotor_controller_cmmp-as-c10-11a-p3-m3servo_cmmt-as-c7-11a-p3-ep-s1control_block_cpx-cmxxservo_cmmt-as-c2-3a-ep-s1_firmwarebus_node_cteu-ep_firmwarecompact_vision_system_sboc-ccontroller_cecc-x-m1-ys-l2_firmwaremotor_controller_cmmp-as-c10-11a-p3-m0_firmwarevtem-s1-27servo_cmmt-as-c3-11a-p3-mp-s1servo_cmmt-as-c4-3a-ec-s1_firmwaremotor_controller_cmmp-as-c5-11a-p3-m0_firmwarebus_node_cpx-m-fb45camera_system_chb-c-ncontrol_block_cpx-cec-c1-v3_firmwareservo_cmmt-as-c3-11a-p3-ec-s1_firmwaremotor_controller_cmmp-as-c5-11a-p3-m3bus_node_cteu-pn-ex1ccontrol_block_cpx-cec-c1_firmwarecontroller_sbrd-qbus_node_cpx-fb32_firmwareservo_cmmt-as-c2-11a-p3-ec-s1control_block_cpx-cec-c1controller_cecc-x-m1-mv-s1servo_cmmt-as-c3-11a-p3-pn-s1cecx-x-c1_modular_master_controller_firmwarecontroller_cecc-x-m1bus_module_cpx-e-epbus_node_cpx-fb33_firmwaremotor_controller_cmmp-as-c2-3a-m3_firmwareservo_drive_cmmt-st-c8-1c-ep-s0_firmwareintegrated_drive_emca-ec-67servo_cmmt-as-c5-11a-p3-mp-s1_firmwarebus_node_cpx-fb37_firmwaremotor_controller_cmmo-st-c5-1-diop_firmwareservo_cmmt-as-c3-11a-p3-ec-s1vtem-s1-coperator_unit_cdpx-x-a-w-7compact_vision_system_sboc-qservo_cmmt-as-c12-11a-p3-pn-s1_firmwarecontroller_sbrd-q_firmwarecontrol_block_cpx-cec-m1-v3servo_cmmt-as-c4-3a-mp-s1_firmwareintegrated_drive_emca-ec-67-m-1te-ep_firmwareservo_cmmt-as-c5-11a-p3-pn-s1controller_cecc-x-m1-mvcompact_vision_system_sboi-qethernet\/ip_interface_cpx-ap-i-pn-m12motor_controller_cmmp-as-c2-3a-m3bus_node_cpx-fb37servo_cmmt-as-c2-3a-ec-s1_firmwarecontroller_cecc-d_firmwaremotor_controller_cmmo-st-c5-1-diopbus_node_cpx-fb39servo_cmmt-as-c2-11a-p3-ep-s1servo_cmmt-as-c12-11a-p3-ep-s1_firmwarebus_node_cpx-m-fb35_firmwaremotor_controller_cmmp-as-c2-3a-m0_firmwareservo_cmmt-as-c7-11a-p3-pn-s1_firmwarecompact_vision_system_sboi-mservo_cmmt-as-c5-11a-p3-mp-s1bus_node_cpx-fb33planar_surface_gantry_excm-30_firmwareservo_cmmt-as-c2-11a-p3-pn-s1motor_controller_cmmp-as-c15-11a-p3-m3_firmwareservo_cmmt-as-c12-11a-p3-ep-s1servo_cmmt-as-c2-3a-pn-s1_firmwarevtem-s1-27_firmwarecontroller_cecc-d-bacontrol_block_cpx-cec-m1servo_cmmt-as-c4-3a-ec-s1Bus node CPX-M-FB45Bus node CPX-M-FB44Control block CPX-CEC-S1-V3Servo drive CMMT-ST-C8-1C-EP-S0Integrated drive EMCA-EC-67-*Bus node CPX-FB32Controller CECC-SController CPX-E-CEC-*Control block CPX-CEC-M1Bus node CPX-FB33Camera system CHB-C-NBus node CTEU-PNBus node CTEU-PN-EX1CController CMXH-ST2-C5-7-DIOPEtherNet/IP interface CPX-AP-I-PN-M12Bus module CPX-E-PNMotor controller CMMO-ST-C5-1-LKPControl block CPX-FEC-1-IEControl block CPX-CMXXOperator unit CDPX-X-A-S-10Controller CECX-X-C1Operator unit CDPX-X-A-W-13Operator unit CDPX-X-A-W-4Motor controller CMMT-AS-*Control block CPX-CEC-C1-V3Bus node CPX-FB36Bus node CPX-M-FB34EtherNet/IP interface CPX-AP-I-EP-M12Operator unit CDPX-X-A-W-7Bus node CPX-FB43Compact Vision System SBO*-Q-*Control block CPX-CEC-M1-V3Controller CECC-LKController SBRD-QMotor controller CMMO-ST-C5-1-DIOPBus node CPX-M-FB35Controller CECC-D-BAController CECX-X-M1Motor controller CMMO-ST-C5-1-DIONGateway CPX-IOTVTEM-S1-*Controller CECC-DBus node CTEU-EPControl block CPX-CEC-C1Planar surface gantry EXCM-*Control block CPX-CECCompact Vision System SBO*-C-*Compact Vision System SBO*-M-*Bus module CPX-E-EPController CECC-X-*Servo drive CMMT-ST-C8-1C-PN-S0Motor controller CMMP-AS-*Bus node CPX-FB40Bus node CPX-FB37Bus node CPX-FB39
CWE ID-CWE-1059
Insufficient Technical Documentation
CVE-2022-3344
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.01% / 2.04%
||
7 Day CHG~0.00%
Published-24 Oct, 2022 | 00:00
Updated-07 May, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in the KVM's AMD nested virtualization (SVM). A malicious L1 guest could purposely fail to intercept the shutdown of a cooperative nested guest (L2), possibly leading to a page fault and kernel panic in the host (L0).

Action-Not Available
Vendor-n/aLinux Kernel Organization, Inc
Product-linux_kernelLinux kernel
CWE ID-CWE-440
Expected Behavior Violation
CVE-2022-3281
Assigner-CERT@VDE
ShareView Details
Assigner-CERT@VDE
CVSS Score-7.5||HIGH
EPSS-0.09% / 26.83%
||
7 Day CHG~0.00%
Published-17 Oct, 2022 | 08:20
Updated-10 May, 2025 | 02:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WAGO: multiple products - Loss of MAC-Address-Filtering after reboot

WAGO Series PFC100/PFC200, Series Touch Panel 600, Compact Controller CC100 and Edge Controller in multiple versions are prone to a loss of MAC-Address-Filtering after reboot. This may allow an remote attacker to circumvent the reach the network that should be protected by the MAC address filter.

Action-Not Available
Vendor-wagoWAGO
Product-750-8212\/025-002750-8102\/025-000_firmware762-4303\/8000-002762-4304\/8000-002_firmware762-4301\/8000-002751-9301762-4301\/8000-002_firmware750-8213\/040-010_firmware750-8210_firmware762-4205\/8000-001762-4203\/8000-001_firmware762-5203\/8000-001762-5306\/8000-002_firmware750-8206_firmware750-8215_firmware750-8211\/040-000762-4203\/8000-001762-4101_firmware762-4204\/8000-001762-5305\/8000-002_firmware762-6303\/8000-002_firmware762-5304\/8000-002_firmware762-4103_firmware762-6302\/8000-002762-6204\/8000-001_firmware750-8213\/040-010750-8208\/025-001_firmware750-8207\/025-001751-9301_firmware750-8215750-8202\/000-012750-8212\/040-001_firmware762-4201\/8000-001_firmware762-4102750-8202\/000-022762-5204\/8000-001750-8216\/040-000_firmware750-8212\/040-000_firmware750-8212\/000-100_firmware762-5203\/8000-001_firmware750-8217_firmware762-6304\/8000-002750-8212\/025-000_firmware762-4304\/8000-002762-5205\/8000-001750-8213750-8214_firmware762-5205\/8000-001_firmware762-4101750-8202\/040-000762-5303\/8000-002_firmware750-8213_firmware750-8207_firmware762-4104750-8206\/025-001_firmware762-4302\/8000-002762-6303\/8000-002750-8206\/040-000762-5206\/8000-001_firmware750-8217\/625-000_firmware762-4104_firmware750-8100750-8202\/000-012_firmware750-8212750-8100_firmware762-5304\/8000-002750-8216\/025-001_firmware762-6203\/8000-001762-6202\/8000-001752-8303\/8000-002_firmware750-8207750-8217\/025-000_firmware762-4204\/8000-001_firmware762-5305\/8000-002762-4206\/8000-001_firmware750-8206750-8208_firmware750-8207\/025-000_firmware750-8102750-8207\/025-000762-6301\/8000-002_firmware750-8216\/025-000_firmware750-8216750-8101_firmware750-8212\/000-100750-8216\/025-001750-8210\/040-000_firmware762-5303\/8000-002750-8210\/025-000750-8206\/040-001750-8207\/025-001_firmware750-8216_firmware750-8101\/025-000_firmware750-8102_firmware750-8206\/025-000750-8212\/025-002_firmware762-4303\/8000-002_firmware750-8212_firmware762-4102_firmware750-8208762-6302\/8000-002_firmware750-8211\/040-000_firmware750-8217\/025-000750-8212\/025-001_firmware762-5206\/8000-001750-8212\/040-010_firmware750-8202\/000-011_firmware750-8208\/025-000_firmware750-8212\/040-001750-8211_firmware750-8206\/040-001_firmware762-4202\/8000-001_firmware750-8101\/025-000762-4302\/8000-002_firmware750-8208\/025-001762-4205\/8000-001_firmware762-6203\/8000-001_firmware762-5204\/8000-001_firmware750-8208\/025-000750-8212\/040-010750-8212\/040-000762-5306\/8000-002750-8217\/625-000750-8214750-8210\/040-000750-8217\/600-000_firmware762-6304\/8000-002_firmware750-8210\/025-000_firmware750-8206\/040-000_firmware750-8101\/000-010750-8101\/000-010_firmware762-6301\/8000-002750-8211762-6201\/8000-001_firmware750-8101750-8102\/025-000762-4202\/8000-001762-6201\/8000-001750-8212\/025-000762-6202\/8000-001_firmware762-4103750-8206\/025-000_firmware750-8212\/025-001750-8202\/000-022_firmware750-8216\/040-000752-8303\/8000-002750-8202\/000-011750-8217\/600-000762-4201\/8000-001750-8206\/025-001750-8216\/025-000762-4206\/8000-001750-8202\/040-000_firmware750-8217762-6204\/8000-001750-8210752-8303/8000-002 Edge Controller762-4xxx Series Touch Panel 600Compact Controller CC100762-5xxx Series Touch Panel 600750-82xx/xxx-xxx Series PFC100/PFC200750-8217/xxx-xxx Series PFC100/PFC200762-6xxx Series Touch Panel 600750-81xx/xxx-xxx Series PFC100/PFC200
CWE ID-CWE-440
Expected Behavior Violation
CVE-2021-41035
Assigner-Eclipse Foundation
ShareView Details
Assigner-Eclipse Foundation
CVSS Score-9.8||CRITICAL
EPSS-0.15% / 35.87%
||
7 Day CHG~0.00%
Published-25 Oct, 2021 | 15:05
Updated-04 Aug, 2024 | 02:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Eclipse Openj9 before version 0.29.0, the JVM does not throw IllegalAccessError for MethodHandles that invoke inaccessible interface methods.

Action-Not Available
Vendor-Eclipse Foundation AISBL
Product-openj9Eclipse OMR
CWE ID-CWE-440
Expected Behavior Violation
CWE ID-CWE-250
Execution with Unnecessary Privileges
CVE-2021-38398
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-6.5||MEDIUM
EPSS-0.09% / 26.21%
||
7 Day CHG~0.00%
Published-04 Oct, 2021 | 17:35
Updated-16 Sep, 2024 | 17:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Reliance on Component that is not Updateable for Boston Scientific Zoom Latitude

The affected device uses off-the-shelf software components that contain unpatched vulnerabilities. A malicious attacker with physical access to the affected device could exploit these vulnerabilities.

Action-Not Available
Vendor-bostonscientificBoston Scientific
Product-zoom_latitude_programming_system_model_3120zoom_latitude_programming_system_model_3120_firmwarezoom_latitude_pogrammer\/recorder\/monitor_3120zoom_latitude_pogrammer\/recorder\/monitor_3120_firmwareZOOM LATITUDE
CWE ID-CWE-1329
Reliance on Component That is Not Updateable
CVE-2020-10768
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.03% / 7.43%
||
7 Day CHG~0.00%
Published-15 Sep, 2020 | 23:13
Updated-04 Aug, 2024 | 11:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being 'force disabled' when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.

Action-Not Available
Vendor-Linux KernelLinux Kernel Organization, Inc
Product-linux_kernelkernel
CWE ID-CWE-440
Expected Behavior Violation
CVE-2020-10767
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.05% / 16.49%
||
7 Day CHG~0.00%
Published-15 Sep, 2020 | 22:14
Updated-04 Aug, 2024 | 11:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in the Linux kernel before 5.8-rc1 in the implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality.

Action-Not Available
Vendor-Linux KernelLinux Kernel Organization, Inc
Product-linux_kernelkernel
CWE ID-CWE-440
Expected Behavior Violation
CVE-2020-10766
Assigner-Red Hat, Inc.
ShareView Details
Assigner-Red Hat, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.10% / 28.84%
||
7 Day CHG~0.00%
Published-15 Sep, 2020 | 22:10
Updated-04 Aug, 2024 | 11:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality.

Action-Not Available
Vendor-Linux KernelLinux Kernel Organization, Inc
Product-linux_kernelkernel
CWE ID-CWE-440
Expected Behavior Violation
CVE-2019-5108
Assigner-Talos
ShareView Details
Assigner-Talos
CVSS Score-7.4||HIGH
EPSS-0.57% / 67.59%
||
7 Day CHG~0.00%
Published-23 Dec, 2019 | 18:55
Updated-04 Aug, 2024 | 19:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An exploitable denial-of-service vulnerability exists in the Linux kernel prior to mainline 5.3. An attacker could exploit this vulnerability by triggering AP to send IAPP location updates for stations before the required authentication process has completed. This could lead to different denial-of-service scenarios, either by causing CAM table attacks, or by leading to traffic flapping if faking already existing clients in other nearby APs of the same wireless infrastructure. An attacker can forge Authentication and Association Request packets to trigger this vulnerability.

Action-Not Available
Vendor-n/aCanonical Ltd.Linux Kernel Organization, IncNetApp, Inc.Debian GNU/LinuxOracle Corporation
Product-ubuntu_linuxa700s_firmwaresd-wan_edgecloud_backupa400_firmwareactive_iq_unified_managerh610s_firmware8300_firmwaresolidfiresteelstore_cloud_integrated_storageh610s8300debian_linux8700linux_kernela400hci_management_nodee-series_santricity_os_controllera700s8700_firmwaredata_availability_servicesLinux kernel
CWE ID-CWE-440
Expected Behavior Violation
CWE ID-CWE-287
Improper Authentication
CVE-2019-5062
Assigner-Talos
ShareView Details
Assigner-Talos
CVSS Score-7.4||HIGH
EPSS-0.09% / 27.11%
||
7 Day CHG~0.00%
Published-12 Dec, 2019 | 21:36
Updated-04 Aug, 2024 | 19:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An exploitable denial-of-service vulnerability exists in the 802.11w security state handling for hostapd 2.6 connected clients with valid 802.11w sessions. By simulating an incomplete new association, an attacker can trigger a deauthentication against stations using 802.11w, resulting in a denial of service.

Action-Not Available
Vendor-w1.fin/a
Product-hostapdW1.f1
CWE ID-CWE-440
Expected Behavior Violation
CWE ID-CWE-346
Origin Validation Error
CVE-2019-5061
Assigner-Talos
ShareView Details
Assigner-Talos
CVSS Score-7.4||HIGH
EPSS-0.30% / 53.00%
||
7 Day CHG~0.00%
Published-12 Dec, 2019 | 21:36
Updated-04 Aug, 2024 | 19:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An exploitable denial-of-service vulnerability exists in the hostapd 2.6, where an attacker could trigger AP to send IAPP location updates for stations, before the required authentication process has completed. This could lead to different denial of service scenarios, either by causing CAM table attacks, or by leading to traffic flapping if faking already existing clients in other nearby Aps of the same wireless infrastructure. An attacker can forge Authentication and Association Request packets to trigger this vulnerability.

Action-Not Available
Vendor-w1.fin/a
Product-hostapdW1.f1
CWE ID-CWE-440
Expected Behavior Violation
CWE ID-CWE-287
Improper Authentication
CVE-2018-12550
Assigner-Eclipse Foundation
ShareView Details
Assigner-Eclipse Foundation
CVSS Score-8.1||HIGH
EPSS-0.45% / 62.80%
||
7 Day CHG~0.00%
Published-27 Mar, 2019 | 17:26
Updated-05 Aug, 2024 | 08:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

When Eclipse Mosquitto version 1.0 to 1.5.5 (inclusive) is configured to use an ACL file, and that ACL file is empty, or contains only comments or blank lines, then Mosquitto will treat this as though no ACL file has been defined and use a default allow policy. The new behaviour is to have an empty ACL file mean that all access is denied, which is not a useful configuration but is not unexpected.

Action-Not Available
Vendor-Eclipse Foundation AISBL
Product-mosquittoEclipse Mosquitto
CWE ID-CWE-440
Expected Behavior Violation
  • Previous
  • 1
  • 2
  • Next