icon

We found results for “

ac_8265_firmware

Vendor: ulterius


Number of Vulnerabilities per Q

Vulnerability Severity Distribution per CVSS v3

  • Critical
    : NAN%
  • High
    : NAN%
  • Medium
    : NAN%
  • Low
    : NAN%
vulnerabilities

Top CWE

CWE ID Name Link Number of reported vulnerabilities
CWE-20 Input Validation http://cwe.mitre.org/data/definitions/20.html 4
CWE-327 Use of a Broken or Risky Cryptographic Algorithm http://cwe.mitre.org/data/definitions/327.html 3
CWE-287 Authentication Issues http://cwe.mitre.org/data/definitions/287.html 2
1
CWE-787 Out-of-bounds Write http://cwe.mitre.org/data/definitions/787.html 1

Top CWE

CWE-20

Input Validation

http://cwe.mitre.org/data/definitions/20.html

Number of reported vulnerabilities: 4

CWE-327

Use of a Broken or Risky Cryptographic Algorithm

http://cwe.mitre.org/data/definitions/327.html

Number of reported vulnerabilities: 3

CWE-287

Authentication Issues

http://cwe.mitre.org/data/definitions/287.html

Number of reported vulnerabilities: 2

Number of reported vulnerabilities: 1

CWE-787

Out-of-bounds Write

http://cwe.mitre.org/data/definitions/787.html

Number of reported vulnerabilities: 1

Open source vulnerability database index: /vulnerability-database/projects-listing/