icon

We found results for “

cn1610_firmware

Vendor: sysklogd_project


Number of Vulnerabilities per Q

Vulnerability Severity Distribution per CVSS v3

  • Critical
    : NAN%
  • High
    : NAN%
  • Medium
    : NAN%
  • Low
    : NAN%
vulnerabilities

Top CWE

CWE ID Name Link Number of reported vulnerabilities
CWE-416 Use After Free http://cwe.mitre.org/data/definitions/416.html 3
CWE-400 Uncontrolled Resource Consumption ('Resource Exhaustion') http://cwe.mitre.org/data/definitions/400.html 2
CWE-327 Use of a Broken or Risky Cryptographic Algorithm http://cwe.mitre.org/data/definitions/327.html 2
CWE-362 Race Conditions http://cwe.mitre.org/data/definitions/362.html 2
2

Top CWE

CWE-416

Use After Free

http://cwe.mitre.org/data/definitions/416.html

Number of reported vulnerabilities: 3

CWE-400

Uncontrolled Resource Consumption ('Resource Exhaustion')

http://cwe.mitre.org/data/definitions/400.html

Number of reported vulnerabilities: 2

CWE-327

Use of a Broken or Risky Cryptographic Algorithm

http://cwe.mitre.org/data/definitions/327.html

Number of reported vulnerabilities: 2

CWE-362

Race Conditions

http://cwe.mitre.org/data/definitions/362.html

Number of reported vulnerabilities: 2

Number of reported vulnerabilities: 2

Open source vulnerability database index: /vulnerability-database/projects-listing/