Advisories

For CVSS 2.0, 3.0 and 3.2
VDE-2019-004
March 14, 2019, 8:52 AM
A collection of Bluetooth attack vectors were discovered and related vulnerabilities known as "BlueBorne" were disclosed. These vulnerabilities collectively endanger amongst others Windows, Linux and mobile operating systems like Android …
VDE-2018-009
Oct. 23, 2018, 12:00 PM
Critical vulnerabilities within several CPUs have been identified by security researchers. These hardware vulnerabilities allow programs to learn about the contents of a system's memory, using side-channel attacks. Potential attack …
VDE-2017-005
Oct. 23, 2018, 12:00 PM
Multiple security issues and vulnerabilities within the WPA2 standard have been identified and publicized by Mr. Mathy Vanhoef of KU Leuven. These vulnerabilities may allow the reinstallation of a pairwise …
VDE-2018-015
Sept. 21, 2018, 9:03 AM
Incorrect handling request with non-standard symbols allows remote attackers to initiate a complete lock up of the bus coupler. Authentication of the request is not required.
VDE-2018-012
Aug. 13, 2018, 1:55 PM
The processing program of the IEC 61131 program can be slowed down or stopped completely by creating a large amount of network traffic that needs to be handled by the …
VDE-2018-008
July 6, 2018, 3:37 PM
A remote code execution vulnerability in the Microsoft's Credential Security Support Provider protocol (CredSSP) was identified by security researchers. If exploited successfully, it is possible to relay user credentials for …
VDE-2018-005
May 16, 2018, 7:35 AM
Web interface CGI applications may copy the contents of the running configuration file to a commonly accessed file. Clever manipulation of a web login request can expose the contents of …