搜索结果
关于「iboot-pdu8a-2c10」的漏洞数据
AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
---|---|---|---|---|
AVD-2023-3259 | dataprobe iboot-pdu8sa-n20 firmware反序列化漏洞(CVE-2023-3259) | 2023-08-14 | ||
AVD-2023-3260 | dataprobe iboot-pdu8sa-n20 firmwareOS命令注入漏洞(CVE-2023-3260) | 2023-08-14 | ||
AVD-2023-3261 | glib2 安全漏洞 (CVE-2023-3261) | 2023-08-14 | ||
AVD-2023-3262 | dataprobe iboot-pdu8sa-n20 firmware使用硬编码的凭证漏洞(CVE-2023-3262) | 2023-08-14 | ||
AVD-2023-3263 | mingw32-glib2-debuginfo 安全漏洞 (CVE-2023-3263) | 2023-06-15 | ||
AVD-2023-3264 | mingw32-glib2-debuginfo 安全漏洞 (CVE-2023-3264) | 2023-06-15 | ||
AVD-2022-46658 | The affected product is vulnerable to a stack-based buffer overflow which could lead to a denial of service or remote code execution. | 2023-05-23 | ||
AVD-2022-46738 | The affected product exposes multiple sensitive data fields of the affected product. An attacker can use the SNMP command to get device mac address and login as admin. | 2023-05-23 | ||
AVD-2022-47311 | A proprietary protocol for iBoot devices is used for control and keepalive commands | 2023-05-23 | ||
AVD-2022-47320 | The iBoot device’s basic discovery protocol assists in initial device configuration | 2023-05-23 | ||
AVD-2022-4945 | The Dataprobe cloud 安全漏洞 | 2023-05-23 |