[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"da-security-advisories":3,"da-header":96,"footer-default-da":295,"all-advisories-lang-da":437},{"name":4,"created_at":5,"published_at":6,"updated_at":7,"id":8,"uuid":9,"content":10,"slug":63,"full_slug":64,"sort_by_date":65,"position":66,"tag_list":67,"is_startpage":45,"parent_id":68,"meta_data":65,"group_id":69,"first_published_at":70,"release_id":65,"lang":71,"path":65,"alternates":72,"default_full_slug":73,"translated_slugs":74},"Security Advisories","2025-09-02T10:11:04.587Z","2025-12-01T09:54:30.432Z","2025-12-01T09:54:30.454Z",86500411800058,"6ce80674-3902-4e02-91ce-dcca086968bb",{"_uid":11,"body":12,"Keywords":28,"headline":50,"component":51,"meta_fields":52,"select_sub_menu":28},"480806f4-2352-4539-b86f-db31a9e2b75c",[13,47],{"_uid":14,"body":15,"label":28,"links":43,"bgColor":28,"headline":28,"markdown":28,"component":44,"leftAligned":45,"contentRight":46},"88b9f434-ecbc-4544-9c03-8cd1e4be9780",{"type":16,"content":17},"doc",[18,29,36],{"type":19,"content":20},"paragraph",[21],{"text":22,"type":23,"marks":24},"At holde dine AMR'er sikre er en kontinuerlig proces, som strækker sig gennem robotternes livscyklus. Som din leverandør informerer MiR dig ansvarligt om kendte sikkerhedsproblemer og anbefalede afbødende handlinger.","text",[25],{"type":26,"attrs":27},"textStyle",{"color":28},"",{"type":19,"content":30},[31],{"text":32,"type":23,"marks":33},"På denne side offentliggør vi vejledninger vedrørende kendte problemer relateret til produktsikkerhed. Læs dem omhyggeligt for fuldt ud at forstå de mulige risici og anbefalede afværgeforanstaltninger.",[34],{"type":26,"attrs":35},{"color":28},{"type":19,"content":37},[38],{"text":39,"type":23,"marks":40},"Mobile Industrial Robots A\u002FS fraskriver sig udtrykkeligt ansvar for enhver og alle skader forårsaget som følge af kundens manglende betjening af robotten i nøje overensstemmelse med brugermanualerne, følg og implementer anbefalingerne i sikkerhedsrådgivningerne nedenfor.",[41],{"type":26,"attrs":42},{"color":28},[],"rich-text",true,[],{"_uid":48,"component":49},"cf215f59-440d-40d8-8f9b-5a730b2bb1fb","advisories-grid","Sikkerhedsrådgivning","page",[53],{"_uid":54,"title":50,"noIndex":55,"OG_image":56,"OG_title":50,"component":61,"description":62,"OG_description":62},"be99bb06-7088-4e84-b650-7e87107c5127",false,{"id":57,"alt":28,"name":28,"focus":28,"title":28,"source":28,"filename":58,"copyright":28,"fieldtype":59,"meta_data":60,"is_external_url":55},11224374,"https:\u002F\u002Fa.storyblok.com\u002Ff\u002F230581\u002F4096x2872\u002Fef55515ef3\u002Fmir600_mir1350_3.png","asset",{},"meta-fields","Keeping your AMRs secure is a continuous process which extends throughout the lifecycle of the robots. As your supplier, MiR responsibly informs you about known security concerns and recommended mitigative actions. ","security-advisories","da\u002Fsecurity-advisories\u002F",null,-380,[],86500070820312,"aff7aaf0-9afb-4937-8a16-e4a0ffdcc5a1","2025-09-29T08:30:57.670Z","da",[],"security-advisories\u002F",[75,76,78,80,82,84,86,88,90,92,94],{"path":73,"name":65,"lang":71,"published":45},{"path":73,"name":65,"lang":77,"published":45},"de",{"path":73,"name":65,"lang":79,"published":45},"it",{"path":73,"name":65,"lang":81,"published":45},"fr",{"path":73,"name":65,"lang":83,"published":45},"es",{"path":73,"name":65,"lang":85,"published":45},"ko",{"path":73,"name":65,"lang":87,"published":45},"ja",{"path":73,"name":65,"lang":89,"published":45},"zh",{"path":73,"name":65,"lang":91,"published":45},"tw",{"path":73,"name":65,"lang":93,"published":45},"pl",{"path":73,"name":65,"lang":95,"published":45},"cs",{"name":97,"created_at":98,"published_at":99,"updated_at":100,"id":101,"uuid":102,"content":103,"slug":105,"full_slug":275,"sort_by_date":65,"position":276,"tag_list":277,"is_startpage":55,"parent_id":278,"meta_data":65,"group_id":279,"first_published_at":280,"release_id":65,"lang":71,"path":65,"alternates":281,"default_full_slug":282,"translated_slugs":283},"Header","2023-05-25T10:50:16.809Z","2026-03-19T07:46:31.998Z","2026-04-02T16:49:48.234Z",313480493,"bafd24a7-f2d3-44e9-854d-5a5e76a957b4",{"_uid":104,"component":105,"header_menu":106,"portalTitle":181,"dropdown_title":182,"header_dropdown":183,"header_portal_switcher":238},"22e2fba0-faed-44f4-a77a-74073ce6c25a","header",[107,122,134,145,157,169],{"_uid":108,"link":109,"title":120,"component":121},"51622f66-37f1-4b03-9efc-770451007e96",{"id":110,"url":28,"linktype":111,"fieldtype":112,"cached_url":113,"prep":45,"story":114},"cc2f264a-e54d-4097-a11d-3e9b0af126e1","story","multilink","\u002Fda\u002Fproducts\u002F",{"name":115,"id":116,"uuid":110,"slug":117,"url":118,"full_slug":119,"_stopResolving":45},"Products",325521696,"products","products\u002F","da\u002Fprodukter\u002F","Produkter","menu-link",{"_uid":123,"link":124,"title":133,"component":121},"999386f5-ddb5-4a4c-9695-f16c5a263284",{"id":125,"url":28,"linktype":111,"fieldtype":112,"cached_url":126,"prep":45,"story":127},"fdcb7cad-fe5b-424e-a5b6-95e61a6e7e2c","\u002Fda\u002Fyour-amr-journey\u002F",{"name":128,"id":129,"uuid":125,"slug":130,"url":131,"full_slug":132,"_stopResolving":45},"Your AMR Journey",356660014,"your-amr-journey","your-amr-journey\u002F","da\u002Fdin-amr-rejse\u002F","Din AMR Rejse",{"_uid":135,"link":136,"title":140,"component":121},"80432b01-ee11-4e0f-9fe9-b8aed52e318c",{"id":137,"url":28,"linktype":111,"fieldtype":112,"cached_url":138,"prep":45,"story":139},"8cbd5d80-2357-40d6-9270-4d58c47b9c2d","\u002Fda\u002Fcases\u002F",{"name":140,"id":141,"uuid":137,"slug":142,"url":143,"full_slug":144,"_stopResolving":45},"Cases",326018479,"cases","cases\u002F","da\u002Fcases\u002F",{"_uid":146,"link":147,"title":156,"component":121},"ac56471a-9262-4d22-a5f3-80699f28ee78",{"id":148,"url":28,"linktype":111,"fieldtype":112,"cached_url":149,"prep":45,"story":150},"17b3687b-5324-48ff-abfc-1b05af4c7aa5","\u002Fda\u002Findustries\u002F",{"name":151,"id":152,"uuid":148,"slug":153,"url":154,"full_slug":155,"_stopResolving":45},"Industries",335936187,"industries","industries\u002F","da\u002Findustrier\u002F","Industrier",{"_uid":158,"link":159,"title":168,"component":121},"ca78bf38-0026-4db8-8bf1-ff4727e36a85",{"id":160,"url":28,"linktype":111,"fieldtype":112,"cached_url":161,"prep":45,"story":162},"fac8ac6e-663a-4545-860c-b6762ea0d40b","\u002Fda\u002Fabout\u002F",{"name":163,"id":164,"uuid":160,"slug":165,"url":166,"full_slug":167,"_stopResolving":45},"About",313472547,"about","about\u002F","da\u002Fom-mir\u002F","Om MiR",{"_uid":170,"link":171,"title":180,"component":121},"b51c3a9d-4d66-491b-b115-dbb593310c3f",{"id":172,"url":28,"linktype":111,"fieldtype":112,"cached_url":173,"prep":45,"story":174},"801bddfe-f04a-4089-9418-909bc2f67312","\u002Fda\u002Fcontacts\u002F",{"name":175,"id":176,"uuid":172,"slug":177,"url":178,"full_slug":179,"_stopResolving":45},"Contact",389644485,"contacts","contacts\u002F","da\u002Fkontakt\u002F","Kontakt","Portals","Service & Support",[184,194,204,215,225],{"_uid":185,"link":186,"title":190,"component":121},"bffc1954-55b8-4952-be47-cc3cd04e26c0",{"id":187,"url":28,"linktype":111,"fieldtype":112,"cached_url":188,"prep":45,"story":189},"50c9e4be-1d49-4ca0-aec0-c0f84d229407","\u002Fda\u002Fmir-academy",{"name":190,"id":191,"uuid":187,"slug":192,"url":192,"translated_name":190,"full_slug":193,"_stopResolving":45},"MiR Academy",430299874,"mir-academy","da\u002Fmir-academy",{"_uid":195,"link":196,"title":200,"component":121},"2a1188ce-e1b3-4634-aeff-a5337edcfcc4",{"id":197,"url":28,"linktype":111,"fieldtype":112,"cached_url":198,"prep":45,"story":199},"08dd7140-9581-47d7-9df1-7eb40e932e6e","\u002Fda\u002Fcommunity",{"name":200,"id":201,"uuid":197,"slug":202,"url":202,"translated_name":200,"full_slug":203,"_stopResolving":45},"MiR Community",320145416,"community","da\u002Fmir-community",{"_uid":205,"link":206,"title":210,"component":121},"6fde37b5-a220-440b-ad34-b0fb215c90a0",{"id":207,"url":28,"linktype":111,"fieldtype":112,"cached_url":208,"prep":45,"story":209},"c9d027cd-40a7-4345-9edd-6eceb0d65825","\u002Fda\u002Fservice-support\u002Ffinance",{"name":210,"id":211,"uuid":207,"slug":212,"url":213,"translated_name":210,"full_slug":214,"_stopResolving":45},"MiR Finance",404955355,"finance","service-support\u002Ffinance","da\u002Fservice-support\u002Fmir-finance",{"_uid":216,"link":217,"title":221,"component":121},"52185e6b-2937-424c-8493-ae513c5ee658",{"id":218,"url":28,"linktype":111,"fieldtype":112,"cached_url":219,"prep":45,"story":220},"5b534ff7-6a86-475e-a184-e742a32b433b","\u002Fda\u002Fsupport-portal",{"name":221,"id":222,"uuid":218,"slug":223,"url":223,"translated_name":221,"full_slug":224,"_stopResolving":45},"MiR Support Portal",320145411,"support-portal","da\u002Fmir-support-portal",{"_uid":226,"link":227,"title":237,"component":121},"d1205786-5e27-466a-918a-b276af399001",{"id":228,"url":28,"linktype":111,"fieldtype":112,"cached_url":229,"prep":45,"story":230},"951f0837-0bd2-482e-9a17-d8b766fc7571","\u002Fda\u002Fservice-support\u002Fmir-service-activation",{"name":231,"id":232,"uuid":228,"slug":233,"url":234,"translated_name":235,"full_slug":236,"_stopResolving":45},"MiR service activation",552990532,"mir-service-activation","service-support\u002Fmir-service-activation","MiR service aktivering","da\u002Fservice-support\u002Fmir-service-aktivering","MiR Service Options",[239,249,258,266],{"_uid":240,"icon":241,"link":246,"name":247,"component":248},"e4bb7f1b-bff1-4b8e-b589-071a77ccd2fe",{"id":242,"alt":243,"name":28,"focus":28,"title":28,"source":28,"filename":244,"copyright":28,"fieldtype":59,"meta_data":245,"is_external_url":55},15422895,"MiR Main Website","https:\u002F\u002Fa.storyblok.com\u002Ff\u002F230581\u002F39x40\u002Ff8b20084af\u002Fportal-switcher-main.svg",{"alt":243,"title":28,"source":28,"copyright":28},"https:\u002F\u002Fmobile-industrial-robots.com\u002Fda","Website","portal",{"_uid":250,"icon":251,"link":256,"name":257,"component":248},"9b78af37-4774-424d-b87e-4d3850b778a5",{"id":252,"alt":253,"name":28,"focus":28,"title":28,"source":28,"filename":254,"copyright":28,"fieldtype":59,"meta_data":255,"is_external_url":55},14298318,"how to guide","https:\u002F\u002Fa.storyblok.com\u002Ff\u002F230581\u002F30x30\u002F9687ef73ab\u002Ficon_featured-howto.svg",{},"https:\u002F\u002Fsupportportal.mobile-industrial-robots.com\u002F","Support Portal",{"_uid":259,"icon":260,"link":264,"name":265,"component":248},"a1dca106-baed-4db0-8bf2-b982f3c7d8b5",{"id":261,"alt":28,"name":28,"focus":28,"title":28,"source":28,"filename":262,"copyright":28,"fieldtype":59,"meta_data":263,"is_external_url":55},10103478,"https:\u002F\u002Fa.storyblok.com\u002Ff\u002F230581\u002F30x30\u002F3e6d1ac02e\u002Ficon_corevalues_nextlevel.svg",{},"https:\u002F\u002Facademy.mobile-industrial-robots.com\u002F","Academy",{"_uid":267,"icon":268,"link":273,"name":274,"component":248},"268b8de5-88f7-491f-bc7e-c683e4d9b80f",{"id":269,"alt":270,"name":28,"focus":28,"title":28,"source":28,"filename":271,"copyright":28,"fieldtype":59,"meta_data":272,"is_external_url":55},13785060,"World share icon","https:\u002F\u002Fa.storyblok.com\u002Ff\u002F230581\u002F30x30\u002F0e54bc9d4e\u002Ficon_community_worldshare.svg",{},"https:\u002F\u002Fcommunity.mobile-industrial-robots.com\u002Fs\u002F","Community","da\u002Fnavigation\u002Fheader",10,[],313907702,"8aa22c46-7145-43a7-91ea-8c1bdcf87a77","2023-05-25T10:51:41.897Z",[],"navigation\u002Fheader",[284,285,286,287,288,289,290,291,292,293,294],{"path":282,"name":65,"lang":71,"published":65},{"path":282,"name":65,"lang":77,"published":65},{"path":282,"name":65,"lang":79,"published":65},{"path":282,"name":65,"lang":81,"published":65},{"path":282,"name":65,"lang":83,"published":65},{"path":282,"name":65,"lang":85,"published":65},{"path":282,"name":65,"lang":87,"published":65},{"path":282,"name":65,"lang":89,"published":65},{"path":282,"name":65,"lang":91,"published":65},{"path":282,"name":65,"lang":93,"published":65},{"path":282,"name":65,"lang":95,"published":65},{"footerSections":296,"socialMedia":360,"socialMediaChina":376,"privacyPolicy":380,"cookiePolicy":394,"changeRegion":-1,"languageSwitcher":407},[297,314,338],{"title":298,"links":299},"Lær om AMR'er",[300,304,308,312,313],{"url":301,"id":302,"title":303,"isHiring":55},"da\u002Fdin-amr-rejse\u002Fkom-i-gang","4e1f0a89-b28f-466c-9384-3918efc93161","Kom i gang",{"url":305,"id":306,"title":307,"isHiring":55},"da\u002Fblog\u002Fagv-vs-amr-hvad-er-forskellen","8da1999f-4111-493b-987e-2eefa6c30260","Hvad er en AMR?",{"url":309,"id":310,"title":311,"isHiring":55},"da\u002Fdin-amr-rejse\u002Fvellykket-implementering","be3b12bb-af44-42b3-ad92-f6dbb1816834","Vellykket implementering",{"url":119,"id":110,"title":120,"isHiring":55},{"url":144,"id":137,"title":140,"isHiring":55},{"title":315,"links":316},"Populære links",[317,321,325,329,333,337],{"url":318,"id":319,"title":320,"isHiring":55},"da\u002Fbegivenheder\u002F","c3b02b79-cfab-4c6b-a321-601fb8aaf1ee","Begivenheder",{"url":322,"id":323,"title":324,"isHiring":55},"da\u002Fblog\u002F","dcf58b56-6c67-453a-bc46-7e7ca29d6ad3","Blog & News Center",{"url":326,"id":327,"title":328,"isHiring":55},"da\u002Feboeger\u002F","d3d9853d-e6b1-430f-ac93-4ca41062816b","e-bøger",{"url":330,"id":331,"title":332,"isHiring":55},"da\u002Fprodukter\u002Fservices\u002F","dbefe226-8948-4234-b3d7-11a39f15c293","MiR Service",{"url":334,"id":335,"title":336,"isHiring":55},"da\u002Fsafety-security-updates\u002Fsafety-and-security-updates","7d9c7a07-ee9a-49c0-bebd-b7154ff9b6fd","Safety and Security updates",{"url":193,"id":187,"title":190,"isHiring":55},{"title":168,"links":339},[340,344,348,352,356],{"url":341,"id":342,"title":343,"isHiring":55},"da\u002Fom-mir\u002Fmir-historie","db8b5815-cd10-4a1e-8c4c-e44582042ff7","MiRs historie",{"url":345,"id":346,"title":347,"isHiring":55},"da\u002Fom-mir\u002Fkarriere\u002F","ebd55cc3-b451-4d9f-8389-68d7e889494d","Karriere",{"url":349,"id":350,"title":351,"isHiring":55},"da\u002Fom-mir\u002Fkarriere\u002Fledige-stillinger","cf30dbd5-2a28-4323-9506-6702d228c4d6","Ledige stillinger",{"url":353,"id":354,"title":355,"isHiring":55},"da\u002Fom-mir\u002Fdata-notice","019744e9-c579-415c-8a15-8e47ce09debd","Data Notice",{"url":357,"id":358,"title":359,"isHiring":55},"da\u002Fgeneral-terms-of-delivery\u002F","ddb7df97-6dcf-4e28-8c2e-40b20ab1256a","General Terms of Delivery",[361,364,367,370,373],{"title":362,"url":363},"linkedin","https:\u002F\u002Fwww.linkedin.com\u002Fcompany\u002Fmobile-industrial-robots-aps\u002F",{"title":365,"url":366},"facebook","https:\u002F\u002Fwww.facebook.com\u002FMiR.Robots",{"title":368,"url":369},"instagram","https:\u002F\u002Fwww.instagram.com\u002Fmobileindustrialrobots\u002F",{"title":371,"url":372},"twitter","https:\u002F\u002Ftwitter.com\u002FMobileIndRobots",{"title":374,"url":375},"youtube","https:\u002F\u002Fwww.youtube.com\u002Fchannel\u002FUC3MRxsNU6AW_hKdExtnGr1Q",[377],{"title":378,"url":379},"wechat","https:\u002F\u002Fmp.weixin.qq.com\u002Fs\u002FzlJVpVC40VBQJBAkUSh-0w",[381],{"url":382,"_uid":391,"title":392,"linkType":393,"component":393},{"id":383,"url":28,"linktype":111,"fieldtype":112,"cached_url":384,"prep":45,"story":385},"f89e458e-6860-4b96-b02e-c462d21ef0a1","\u002Fda\u002Fabout\u002Fprivacy-policy\u002F",{"name":386,"id":387,"uuid":383,"slug":388,"url":389,"full_slug":390,"_stopResolving":45},"Privacy Policy",389640641,"privacy-policy","about\u002Fprivacy-policy\u002F","da\u002Fom-mir\u002Fprivatlivspolitik\u002F","67e85086-82cb-485d-80ed-2abef92cc742","Privatlivspolitik","link",[395],{"url":396,"_uid":406,"title":404,"linkType":393,"component":393},{"id":397,"url":28,"linktype":111,"fieldtype":112,"cached_url":398,"prep":45,"story":399},"8181ff53-45dd-420c-b8f1-0de734d999ee","\u002Fda\u002Fcookie-policy",{"name":400,"id":401,"uuid":397,"slug":402,"url":403,"translated_name":404,"full_slug":405,"_stopResolving":45},"Cookie Policy",356680705,"cookie-policy","about\u002Fcookie-policy","Cookiepolitik","da\u002Fom-mir\u002Fcookie-politik","aa639879-5d58-46b5-8c17-dcd35942475b",{"name":408,"created_at":409,"published_at":410,"updated_at":411,"id":412,"uuid":413,"content":414,"slug":408,"full_slug":418,"sort_by_date":65,"position":419,"tag_list":420,"is_startpage":55,"parent_id":278,"meta_data":65,"group_id":421,"first_published_at":422,"release_id":65,"lang":71,"path":65,"alternates":423,"default_full_slug":424,"translated_slugs":425},"language-switcher","2023-08-14T11:52:42.638Z","2024-03-26T11:26:07.197Z","2024-03-26T11:26:07.213Z",354358248,"f1d63013-0b69-4d61-a57f-08ffe45b982d",{"_uid":415,"headline":416,"component":408,"paragraph":417},"8a50d2d4-79a0-410b-9853-1dd743c4ede0","Skift sprog","Ved at vælge et andet sprog kan indholdet også ændre sig på mobile-industrial-robots.com.","da\u002Fnavigation\u002Flanguage-switcher",-90,[],"d9fdd0a0-3d33-4b90-a4cd-e32ffdbaec82","2023-10-27T08:29:51.543Z",[],"navigation\u002Flanguage-switcher",[426,427,428,429,430,431,432,433,434,435,436],{"path":424,"name":65,"lang":71,"published":65},{"path":424,"name":65,"lang":77,"published":65},{"path":424,"name":65,"lang":79,"published":65},{"path":424,"name":65,"lang":81,"published":65},{"path":424,"name":65,"lang":83,"published":65},{"path":424,"name":65,"lang":85,"published":65},{"path":424,"name":65,"lang":87,"published":65},{"path":424,"name":65,"lang":89,"published":65},{"path":424,"name":65,"lang":91,"published":65},{"path":424,"name":65,"lang":93,"published":65},{"path":424,"name":65,"lang":95,"published":65},[438,474,510,545,580,615,649,685,721,755,790,824,859,894,928,962,996,1030],{"name":439,"created_at":440,"published_at":441,"updated_at":442,"id":443,"uuid":444,"content":445,"slug":454,"full_slug":455,"sort_by_date":65,"position":456,"tag_list":457,"is_startpage":55,"parent_id":68,"meta_data":65,"group_id":458,"first_published_at":459,"release_id":65,"lang":71,"path":65,"alternates":460,"default_full_slug":461,"translated_slugs":462},"CVE-2025-13819: Open redirect","2025-12-01T08:29:01.589Z","2025-12-01T09:44:27.940Z","2025-12-01T09:44:27.960Z",118325827983691,"05926065-cfbb-49bc-8a22-1beb073adc1f",{"Keywords":28,"headline":439,"meta_fields":446,"lastModified":453,"firstPublished":453},[447],{"_uid":448,"title":449,"noIndex":55,"OG_image":450,"OG_title":449,"component":61,"description":452,"canonicalUrl":28,"OG_description":452},"45ff4bde-a7ed-44e1-992b-21226b8d4f90","Open redirect",{"id":65,"alt":65,"name":28,"focus":65,"title":65,"source":65,"filename":28,"copyright":65,"fieldtype":59,"meta_data":451},{},"MiR robot and fleet software versions prior to version 3.7.0 are affected by an open redirect vulnerability. The web server accepts user-controlled input and uses it to redirect users to external sites without proper validation. This flaw enables crafting URLs that appear legitimate but redirect users to attacker-controlled sites, facilitating phishing and credential theft.","2025-12-01 00:00","cve-2025-13819-open-redirect","da\u002Fsecurity-advisories\u002Fcve-2025-13819-open-redirect",-110,[],"1edcc0b9-91ba-41d5-920c-27a51d8d34bf","2025-12-01T09:38:38.843Z",[],"security-advisories\u002Fcve-2025-13819-open-redirect",[463,464,465,466,467,468,469,470,471,472,473],{"path":461,"name":65,"lang":71,"published":65},{"path":461,"name":65,"lang":77,"published":65},{"path":461,"name":65,"lang":79,"published":65},{"path":461,"name":65,"lang":81,"published":65},{"path":461,"name":65,"lang":83,"published":65},{"path":461,"name":65,"lang":85,"published":65},{"path":461,"name":65,"lang":87,"published":65},{"path":461,"name":65,"lang":89,"published":65},{"path":461,"name":65,"lang":91,"published":65},{"path":461,"name":65,"lang":93,"published":65},{"path":461,"name":65,"lang":95,"published":65},{"name":475,"created_at":476,"published_at":477,"updated_at":478,"id":479,"uuid":480,"content":481,"slug":491,"full_slug":492,"sort_by_date":65,"position":493,"tag_list":494,"is_startpage":55,"parent_id":68,"meta_data":65,"group_id":495,"first_published_at":477,"release_id":65,"lang":71,"path":65,"alternates":496,"default_full_slug":497,"translated_slugs":498},"CVE-2025-9229: Information Disclosure through verbose error pages","2025-09-02T11:34:58.033Z","2025-09-29T08:26:53.830Z","2025-09-29T08:26:53.855Z",86521028790762,"00ed0dcb-4750-4f4d-a346-441444c21c67",{"Keywords":28,"headline":482,"meta_fields":483,"lastModified":489,"firstPublished":490},"MSA-17: Information Disclosure",[484],{"_uid":485,"title":482,"noIndex":55,"OG_image":486,"OG_title":482,"component":61,"description":488,"canonicalUrl":28,"OG_description":488},"ed60ea18-67aa-4734-b1fb-22e738c89ae1",{"id":65,"alt":65,"name":28,"focus":65,"title":65,"source":65,"filename":28,"copyright":65,"fieldtype":59,"meta_data":487},{},"MiR software versions prior to version 3.0.0 are affected by an information disclosure vulnerability. An unauthenticated attacker is able to view error pages which include unnecessarily detailed error information, such as file paths and other data. Such unnecessarily verbose information could potentially ease future exploitation attempts by attackers.","2025-09-24 00:00","2024-03-26 00:00","information-disclosure","da\u002Fsecurity-advisories\u002Finformation-disclosure",0,[],"0e33737d-4f4d-41e0-bd92-19810ffdfe7d",[],"security-advisories\u002Finformation-disclosure",[499,500,501,502,503,504,505,506,507,508,509],{"path":497,"name":65,"lang":71,"published":65},{"path":497,"name":65,"lang":77,"published":65},{"path":497,"name":65,"lang":79,"published":65},{"path":497,"name":65,"lang":81,"published":65},{"path":497,"name":65,"lang":83,"published":65},{"path":497,"name":65,"lang":85,"published":65},{"path":497,"name":65,"lang":87,"published":65},{"path":497,"name":65,"lang":89,"published":65},{"path":497,"name":65,"lang":91,"published":65},{"path":497,"name":65,"lang":93,"published":65},{"path":497,"name":65,"lang":95,"published":65},{"name":511,"created_at":512,"published_at":513,"updated_at":514,"id":515,"uuid":516,"content":517,"slug":526,"full_slug":527,"sort_by_date":65,"position":528,"tag_list":529,"is_startpage":55,"parent_id":68,"meta_data":65,"group_id":530,"first_published_at":513,"release_id":65,"lang":71,"path":65,"alternates":531,"default_full_slug":532,"translated_slugs":533},"CVE-2025-8749: Path traversal","2025-09-04T14:22:29.160Z","2025-09-29T08:26:52.528Z","2025-09-29T08:26:52.552Z",87269986996075,"075f373d-29a0-4910-bdc6-b338f6f5d226",{"Keywords":28,"headline":518,"meta_fields":519,"lastModified":489,"firstPublished":525},"MSA-13: Path Traversal Vulnerability",[520],{"_uid":448,"title":521,"noIndex":55,"OG_image":522,"OG_title":521,"component":61,"description":524,"canonicalUrl":28,"OG_description":524},"Path Traversal",{"id":65,"alt":65,"name":28,"focus":65,"title":65,"source":65,"filename":28,"copyright":65,"fieldtype":59,"meta_data":523},{},"MiR robot software versions prior to version 3.0.0 are affected by a path traversal vulnerability. Authenticated users could abuse a vulnerable API endpoint to extract files from the robot file system.","2024-03-19 00:00","path-traversal","da\u002Fsecurity-advisories\u002Fpath-traversal",-100,[],"a8e212a8-0fe0-40b8-8e42-886e39f92801",[],"security-advisories\u002Fpath-traversal",[534,535,536,537,538,539,540,541,542,543,544],{"path":532,"name":65,"lang":71,"published":65},{"path":532,"name":65,"lang":77,"published":65},{"path":532,"name":65,"lang":79,"published":65},{"path":532,"name":65,"lang":81,"published":65},{"path":532,"name":65,"lang":83,"published":65},{"path":532,"name":65,"lang":85,"published":65},{"path":532,"name":65,"lang":87,"published":65},{"path":532,"name":65,"lang":89,"published":65},{"path":532,"name":65,"lang":91,"published":65},{"path":532,"name":65,"lang":93,"published":65},{"path":532,"name":65,"lang":95,"published":65},{"name":546,"created_at":547,"published_at":548,"updated_at":549,"id":550,"uuid":551,"content":552,"slug":561,"full_slug":562,"sort_by_date":65,"position":563,"tag_list":564,"is_startpage":55,"parent_id":68,"meta_data":65,"group_id":565,"first_published_at":548,"release_id":65,"lang":71,"path":65,"alternates":566,"default_full_slug":567,"translated_slugs":568},"CVE-2025-9225: Cross-site scripting","2025-09-04T14:13:22.814Z","2025-09-29T08:26:52.790Z","2025-09-29T08:26:52.818Z",87267749170629,"305fdaa0-1fd3-4633-ac20-7e5bcff08ecc",{"Keywords":28,"headline":553,"meta_fields":554,"lastModified":489,"firstPublished":525},"MSA-14: Cross-site scripting",[555],{"_uid":556,"title":557,"noIndex":55,"OG_image":558,"OG_title":557,"component":61,"description":560,"canonicalUrl":28,"OG_description":560},"8c0901e7-81b5-48b2-a39c-17b584fa5de5","Cross-site scripting",{"id":65,"alt":65,"name":28,"focus":65,"title":65,"source":65,"filename":28,"copyright":65,"fieldtype":59,"meta_data":559},{},"MiR software versions prior to version 3.0.0 are affected by a stored cross-site scripting (XSS) vulnerability. If triggered by a logged in user, it could allow execution of arbitrary JavaScript code on a victim browser.","cross-site-scripting","da\u002Fsecurity-advisories\u002Fcross-site-scripting",-80,[],"54a6d3e1-fcb3-4039-a0fd-a76fa41417e3",[],"security-advisories\u002Fcross-site-scripting",[569,570,571,572,573,574,575,576,577,578,579],{"path":567,"name":65,"lang":71,"published":65},{"path":567,"name":65,"lang":77,"published":65},{"path":567,"name":65,"lang":79,"published":65},{"path":567,"name":65,"lang":81,"published":65},{"path":567,"name":65,"lang":83,"published":65},{"path":567,"name":65,"lang":85,"published":65},{"path":567,"name":65,"lang":87,"published":65},{"path":567,"name":65,"lang":89,"published":65},{"path":567,"name":65,"lang":91,"published":65},{"path":567,"name":65,"lang":93,"published":65},{"path":567,"name":65,"lang":95,"published":65},{"name":581,"created_at":582,"published_at":583,"updated_at":584,"id":585,"uuid":586,"content":587,"slug":596,"full_slug":597,"sort_by_date":65,"position":598,"tag_list":599,"is_startpage":55,"parent_id":68,"meta_data":65,"group_id":600,"first_published_at":583,"release_id":65,"lang":71,"path":65,"alternates":601,"default_full_slug":602,"translated_slugs":603},"CVE-2025-9228: Insufficient authorization when creating notes","2025-09-04T14:04:48.632Z","2025-09-29T08:26:53.053Z","2025-09-29T08:26:53.084Z",87265643080581,"e9c368d5-2954-45b7-a2ba-36970a0ee022",{"Keywords":28,"headline":588,"meta_fields":589,"lastModified":489,"firstPublished":525},"MSA-15: Insufficient authorization when creating notes",[590],{"_uid":591,"title":592,"noIndex":55,"OG_image":593,"OG_title":592,"component":61,"description":595,"canonicalUrl":28,"OG_description":595},"2bcd69f1-d60f-47c2-b86f-effae565b9dd","Insufficient authorization when creating notes",{"id":65,"alt":65,"name":28,"focus":65,"title":65,"source":65,"filename":28,"copyright":65,"fieldtype":59,"meta_data":594},{},"MiR software versions prior to version 3.0.0 have insufficient authorization controls when creating text notes, allowing low-privilege users to create notes which are intended only for administrative users.","insufficient-authorization-when-creating-notes","da\u002Fsecurity-advisories\u002Finsufficient-authorization-when-creating-notes",-60,[],"1fb820e5-32ab-465c-ba6c-5445489bda8c",[],"security-advisories\u002Finsufficient-authorization-when-creating-notes",[604,605,606,607,608,609,610,611,612,613,614],{"path":602,"name":65,"lang":71,"published":65},{"path":602,"name":65,"lang":77,"published":65},{"path":602,"name":65,"lang":79,"published":65},{"path":602,"name":65,"lang":81,"published":65},{"path":602,"name":65,"lang":83,"published":65},{"path":602,"name":65,"lang":85,"published":65},{"path":602,"name":65,"lang":87,"published":65},{"path":602,"name":65,"lang":89,"published":65},{"path":602,"name":65,"lang":91,"published":65},{"path":602,"name":65,"lang":93,"published":65},{"path":602,"name":65,"lang":95,"published":65},{"name":616,"created_at":617,"published_at":618,"updated_at":619,"id":620,"uuid":621,"content":622,"slug":630,"full_slug":631,"sort_by_date":65,"position":632,"tag_list":633,"is_startpage":55,"parent_id":68,"meta_data":65,"group_id":634,"first_published_at":618,"release_id":65,"lang":71,"path":65,"alternates":635,"default_full_slug":636,"translated_slugs":637},"CVE-2025-8748: Command injection","2025-09-04T13:56:38.486Z","2025-09-29T08:26:53.305Z","2025-09-29T08:26:53.333Z",87263635449991,"f54092b8-4cf9-4f69-9ea1-f2da5d8499ef",{"Keywords":28,"headline":623,"meta_fields":624,"lastModified":489,"firstPublished":525},"MSA-16: Command injection",[625],{"_uid":626,"title":623,"noIndex":55,"OG_image":627,"OG_title":623,"component":61,"description":629,"canonicalUrl":28,"OG_description":629},"253d8802-7aca-4090-940c-1b8d575b88eb",{"id":65,"alt":65,"name":28,"focus":65,"title":65,"source":65,"filename":28,"copyright":65,"fieldtype":59,"meta_data":628},{},"MiR software versions prior to version 3.0.0 are affected by a command injection vulnerability. A malicious HTTP request crafted by an authenticated user could allow the execution of arbitrary commands on the underlying operating system.","command-injection","da\u002Fsecurity-advisories\u002Fcommand-injection",-40,[],"17a5a2eb-5bc0-4cec-8050-2d12ba023824",[],"security-advisories\u002Fcommand-injection",[638,639,640,641,642,643,644,645,646,647,648],{"path":636,"name":65,"lang":71,"published":65},{"path":636,"name":65,"lang":77,"published":65},{"path":636,"name":65,"lang":79,"published":65},{"path":636,"name":65,"lang":81,"published":65},{"path":636,"name":65,"lang":83,"published":65},{"path":636,"name":65,"lang":85,"published":65},{"path":636,"name":65,"lang":87,"published":65},{"path":636,"name":65,"lang":89,"published":65},{"path":636,"name":65,"lang":91,"published":65},{"path":636,"name":65,"lang":93,"published":65},{"path":636,"name":65,"lang":95,"published":65},{"name":650,"created_at":651,"published_at":652,"updated_at":653,"id":654,"uuid":655,"content":656,"slug":666,"full_slug":667,"sort_by_date":65,"position":668,"tag_list":669,"is_startpage":55,"parent_id":68,"meta_data":65,"group_id":670,"first_published_at":652,"release_id":65,"lang":71,"path":65,"alternates":671,"default_full_slug":672,"translated_slugs":673},"CVE-2021-44228: Log4Shell ","2025-09-04T14:27:38.432Z","2025-09-29T08:26:52.277Z","2025-09-29T08:26:52.304Z",87271253787325,"d06f143a-da8a-4315-8c20-6860ddebfbeb",{"Keywords":28,"headline":657,"meta_fields":658,"lastModified":489,"firstPublished":665},"PSA-012: Log4shell",[659],{"_uid":660,"title":661,"noIndex":55,"OG_image":662,"OG_title":661,"component":61,"description":664,"canonicalUrl":28,"OG_description":664},"b1cd31ff-d148-4545-8df5-7e236bb5d6f9","Log4Shell (CVE-2021-44228)",{"id":65,"alt":65,"name":28,"focus":65,"title":65,"source":65,"filename":28,"copyright":65,"fieldtype":59,"meta_data":663},{},"We hereby inform that MiR products are not affected by the Apache Log4j vulnerability known as Log4Shell.","2021-12-21 00:00","log4shell","da\u002Fsecurity-advisories\u002Flog4shell",-150,[],"4408cf8b-5b8e-4558-9c5f-349dea1b5afe",[],"security-advisories\u002Flog4shell",[674,675,676,677,678,679,680,681,682,683,684],{"path":672,"name":65,"lang":71,"published":65},{"path":672,"name":65,"lang":77,"published":65},{"path":672,"name":65,"lang":79,"published":65},{"path":672,"name":65,"lang":81,"published":65},{"path":672,"name":65,"lang":83,"published":65},{"path":672,"name":65,"lang":85,"published":65},{"path":672,"name":65,"lang":87,"published":65},{"path":672,"name":65,"lang":89,"published":65},{"path":672,"name":65,"lang":91,"published":65},{"path":672,"name":65,"lang":93,"published":65},{"path":672,"name":65,"lang":95,"published":65},{"name":686,"created_at":687,"published_at":688,"updated_at":689,"id":690,"uuid":691,"content":692,"slug":702,"full_slug":703,"sort_by_date":65,"position":704,"tag_list":705,"is_startpage":55,"parent_id":68,"meta_data":65,"group_id":706,"first_published_at":688,"release_id":65,"lang":71,"path":65,"alternates":707,"default_full_slug":708,"translated_slugs":709},"CVE-2017-7184, CVE-2017-18255: Local Attacker can Exploit Kernel Vulnerabilities","2025-09-04T15:42:08.655Z","2025-09-29T08:26:50.158Z","2025-09-29T08:26:50.188Z",87289563822831,"07647f34-e618-4ae7-b22d-40b140d33e88",{"Keywords":28,"headline":693,"meta_fields":694,"lastModified":489,"firstPublished":701},"PSA-001: Local Attacker can exploit kernel vulnerabilities",[695],{"_uid":696,"title":697,"noIndex":55,"OG_image":698,"OG_title":697,"component":61,"description":700,"canonicalUrl":28,"OG_description":700},"d90fae0d-877b-4891-8d4f-a7473735657a","CVE-2017-7184, CVE-2017-18255",{"id":65,"alt":65,"name":28,"focus":65,"title":65,"source":65,"filename":28,"copyright":65,"fieldtype":59,"meta_data":699},{},"This Product Security Advisory is based on a thorough investigation and all findings that were available at the time of publication. Should new information on the matter become available, it is possible that the initial assessment changes and the Advisory will be updated.\n","2021-05-27 00:00","cve-2017-7184-cve-2017-18255","da\u002Fsecurity-advisories\u002Fcve-2017-7184-cve-2017-18255",-350,[],"dac73eee-3759-4ad9-8cea-a594d455287a",[],"security-advisories\u002Fcve-2017-7184-cve-2017-18255",[710,711,712,713,714,715,716,717,718,719,720],{"path":708,"name":65,"lang":71,"published":65},{"path":708,"name":65,"lang":77,"published":65},{"path":708,"name":65,"lang":79,"published":65},{"path":708,"name":65,"lang":81,"published":65},{"path":708,"name":65,"lang":83,"published":65},{"path":708,"name":65,"lang":85,"published":65},{"path":708,"name":65,"lang":87,"published":65},{"path":708,"name":65,"lang":89,"published":65},{"path":708,"name":65,"lang":91,"published":65},{"path":708,"name":65,"lang":93,"published":65},{"path":708,"name":65,"lang":95,"published":65},{"name":722,"created_at":723,"published_at":724,"updated_at":725,"id":726,"uuid":727,"content":728,"slug":736,"full_slug":737,"sort_by_date":65,"position":738,"tag_list":739,"is_startpage":55,"parent_id":68,"meta_data":65,"group_id":740,"first_published_at":724,"release_id":65,"lang":71,"path":65,"alternates":741,"default_full_slug":742,"translated_slugs":743},"CVE-2020-10269: Default Passwords for Wireless Access Points","2025-09-04T15:36:44.924Z","2025-09-29T08:26:50.531Z","2025-09-29T08:26:50.563Z",87288237800873,"0240d937-d72f-4457-bfeb-dd7694f51cc7",{"Keywords":28,"headline":729,"meta_fields":730,"lastModified":489,"firstPublished":701},"PSA-002: Default Passwords for Wireless Access Points",[731],{"_uid":732,"title":733,"noIndex":55,"OG_image":734,"OG_title":733,"component":61,"description":700,"canonicalUrl":28,"OG_description":700},"8b5a9265-3b74-45a7-ab27-12d3a31f5ef4","CVE-2020-10269",{"id":65,"alt":65,"name":28,"focus":65,"title":65,"source":65,"filename":28,"copyright":65,"fieldtype":59,"meta_data":735},{},"cve-2020-10269","da\u002Fsecurity-advisories\u002Fcve-2020-10269",-330,[],"d02707b3-5193-457b-b9bd-42c50d595cda",[],"security-advisories\u002Fcve-2020-10269",[744,745,746,747,748,749,750,751,752,753,754],{"path":742,"name":65,"lang":71,"published":65},{"path":742,"name":65,"lang":77,"published":65},{"path":742,"name":65,"lang":79,"published":65},{"path":742,"name":65,"lang":81,"published":65},{"path":742,"name":65,"lang":83,"published":65},{"path":742,"name":65,"lang":85,"published":65},{"path":742,"name":65,"lang":87,"published":65},{"path":742,"name":65,"lang":89,"published":65},{"path":742,"name":65,"lang":91,"published":65},{"path":742,"name":65,"lang":93,"published":65},{"path":742,"name":65,"lang":95,"published":65},{"name":756,"created_at":757,"published_at":758,"updated_at":759,"id":760,"uuid":761,"content":762,"slug":771,"full_slug":772,"sort_by_date":65,"position":773,"tag_list":774,"is_startpage":55,"parent_id":68,"meta_data":65,"group_id":775,"first_published_at":758,"release_id":65,"lang":71,"path":65,"alternates":776,"default_full_slug":777,"translated_slugs":778},"CVE-2020-10270: Predefined Credentials for the web Interface","2025-09-04T15:31:57.471Z","2025-09-29T08:26:50.535Z","2025-09-29T08:26:50.562Z",87287060407812,"a1fc16dd-3ada-4329-914d-7f47ab76c60c",{"Keywords":28,"headline":763,"meta_fields":764,"lastModified":489,"firstPublished":701},"PSA-003: Predefined Credentials for the web Interface",[765],{"_uid":766,"title":767,"noIndex":55,"OG_image":768,"OG_title":767,"component":61,"description":770,"canonicalUrl":28,"OG_description":770},"d963aa77-a9bc-4ccb-b3e8-117c45baed23","CVE-2020-10270",{"id":65,"alt":65,"name":28,"focus":65,"title":65,"source":65,"filename":28,"copyright":65,"fieldtype":59,"meta_data":769},{},"This Product Security Advisory is based on a thorough investigation and all findings that were available at the time of publication. Should new information on the matter become available, it is possible that the initial assessment changes and the Advisory will be updated","cve-2020-10270","da\u002Fsecurity-advisories\u002Fcve-2020-10270",-310,[],"088b7eb4-e8f5-4115-997a-504449347f13",[],"security-advisories\u002Fcve-2020-10270",[779,780,781,782,783,784,785,786,787,788,789],{"path":777,"name":65,"lang":71,"published":65},{"path":777,"name":65,"lang":77,"published":65},{"path":777,"name":65,"lang":79,"published":65},{"path":777,"name":65,"lang":81,"published":65},{"path":777,"name":65,"lang":83,"published":65},{"path":777,"name":65,"lang":85,"published":65},{"path":777,"name":65,"lang":87,"published":65},{"path":777,"name":65,"lang":89,"published":65},{"path":777,"name":65,"lang":91,"published":65},{"path":777,"name":65,"lang":93,"published":65},{"path":777,"name":65,"lang":95,"published":65},{"name":791,"created_at":792,"published_at":793,"updated_at":794,"id":795,"uuid":796,"content":797,"slug":805,"full_slug":806,"sort_by_date":65,"position":807,"tag_list":808,"is_startpage":55,"parent_id":68,"meta_data":65,"group_id":809,"first_published_at":793,"release_id":65,"lang":71,"path":65,"alternates":810,"default_full_slug":811,"translated_slugs":812},"CVE-2020-10271, CVE-2020-10272: Interfaces Accessible without Authentication","2025-09-04T15:25:52.944Z","2025-09-29T08:26:50.610Z","2025-09-29T08:26:50.634Z",87285567297890,"bd6cd51a-53c3-4f5b-89ff-824d63a4d711",{"Keywords":28,"headline":798,"meta_fields":799,"lastModified":489,"firstPublished":701},"PSA-004: Interfaces Accessible without Authentication",[800],{"_uid":801,"title":802,"noIndex":55,"OG_image":803,"OG_title":802,"component":61,"description":700,"canonicalUrl":28,"OG_description":700},"3ffe6c41-44f1-477b-b146-03157b52d736","CVE-2020-10271, CVE-2020-10272",{"id":65,"alt":65,"name":28,"focus":65,"title":65,"source":65,"filename":28,"copyright":65,"fieldtype":59,"meta_data":804},{},"cve-2020-10271-cve-2020-10272","da\u002Fsecurity-advisories\u002Fcve-2020-10271-cve-2020-10272",-290,[],"6f3f6966-5508-4226-835e-0ec4b9fbf0ee",[],"security-advisories\u002Fcve-2020-10271-cve-2020-10272",[813,814,815,816,817,818,819,820,821,822,823],{"path":811,"name":65,"lang":71,"published":65},{"path":811,"name":65,"lang":77,"published":65},{"path":811,"name":65,"lang":79,"published":65},{"path":811,"name":65,"lang":81,"published":65},{"path":811,"name":65,"lang":83,"published":65},{"path":811,"name":65,"lang":85,"published":65},{"path":811,"name":65,"lang":87,"published":65},{"path":811,"name":65,"lang":89,"published":65},{"path":811,"name":65,"lang":91,"published":65},{"path":811,"name":65,"lang":93,"published":65},{"path":811,"name":65,"lang":95,"published":65},{"name":825,"created_at":826,"published_at":827,"updated_at":828,"id":829,"uuid":830,"content":831,"slug":840,"full_slug":841,"sort_by_date":65,"position":842,"tag_list":843,"is_startpage":55,"parent_id":68,"meta_data":65,"group_id":844,"first_published_at":827,"release_id":65,"lang":71,"path":65,"alternates":845,"default_full_slug":846,"translated_slugs":847},"CVE-2020-10273: No Encryption on Artifacts","2025-09-04T15:20:32.154Z","2025-09-29T08:26:50.763Z","2025-09-29T08:26:50.791Z",87284253352545,"b14fc38b-2515-4f59-8ab0-c8ca3faf32ab",{"Keywords":28,"headline":832,"meta_fields":833,"lastModified":489,"firstPublished":701},"PSA-005: No Encryption on Artifacts",[834],{"_uid":835,"title":836,"noIndex":55,"OG_image":837,"OG_title":836,"component":61,"description":839,"canonicalUrl":28,"OG_description":839},"1b868317-3375-42db-9de6-525d6e5136b5","CVE-2020-10273",{"id":65,"alt":65,"name":28,"focus":65,"title":65,"source":65,"filename":28,"copyright":65,"fieldtype":59,"meta_data":838},{},"This Product Security Advisory is based on a thorough investigation and all findings that were available at the time of publication. Should new information on the matter become available, it is possible that the initial assessment changes and the Advisory will be updated.","cve-2020-10273","da\u002Fsecurity-advisories\u002Fcve-2020-10273",-270,[],"68b5c944-a4b8-4099-9167-f0504c549502",[],"security-advisories\u002Fcve-2020-10273",[848,849,850,851,852,853,854,855,856,857,858],{"path":846,"name":65,"lang":71,"published":65},{"path":846,"name":65,"lang":77,"published":65},{"path":846,"name":65,"lang":79,"published":65},{"path":846,"name":65,"lang":81,"published":65},{"path":846,"name":65,"lang":83,"published":65},{"path":846,"name":65,"lang":85,"published":65},{"path":846,"name":65,"lang":87,"published":65},{"path":846,"name":65,"lang":89,"published":65},{"path":846,"name":65,"lang":91,"published":65},{"path":846,"name":65,"lang":93,"published":65},{"path":846,"name":65,"lang":95,"published":65},{"name":860,"created_at":861,"published_at":862,"updated_at":863,"id":864,"uuid":865,"content":866,"slug":875,"full_slug":876,"sort_by_date":65,"position":877,"tag_list":878,"is_startpage":55,"parent_id":68,"meta_data":65,"group_id":879,"first_published_at":862,"release_id":65,"lang":71,"path":65,"alternates":880,"default_full_slug":881,"translated_slugs":882},"CVE-2020-10274, CVE-2020-10275: API Vulnerable via default Web Credentials","2025-09-04T15:10:52.631Z","2025-09-29T08:26:51.028Z","2025-09-29T08:26:51.058Z",87281879618643,"70648d51-4aa9-4458-a569-34d61dd4385e",{"Keywords":28,"headline":867,"meta_fields":868,"lastModified":489,"firstPublished":701},"PSA-006: API Vulnerable via default Web Credentials",[869],{"_uid":870,"title":871,"noIndex":55,"OG_image":872,"OG_title":871,"component":61,"description":874,"canonicalUrl":28,"OG_description":874},"5d7ae8c9-9dfe-4395-93bd-5ada01c0bb48","CVE-2020-10274, CVE-2020-10275",{"id":65,"alt":65,"name":28,"focus":65,"title":65,"source":65,"filename":28,"copyright":65,"fieldtype":59,"meta_data":873},{},"MiR robots offer a REST-like API to interact with the robot in an automated way, for scenarios where\nmanual use of the web interface is not desired. This API requires authentication using a key derived\nfrom user credentials for the web interface.","cve-2020-10274-cve-2020-10275","da\u002Fsecurity-advisories\u002Fcve-2020-10274-cve-2020-10275",-250,[],"0e119a1a-b240-43e6-a018-68af6e0fdab0",[],"security-advisories\u002Fcve-2020-10274-cve-2020-10275",[883,884,885,886,887,888,889,890,891,892,893],{"path":881,"name":65,"lang":71,"published":65},{"path":881,"name":65,"lang":77,"published":65},{"path":881,"name":65,"lang":79,"published":65},{"path":881,"name":65,"lang":81,"published":65},{"path":881,"name":65,"lang":83,"published":65},{"path":881,"name":65,"lang":85,"published":65},{"path":881,"name":65,"lang":87,"published":65},{"path":881,"name":65,"lang":89,"published":65},{"path":881,"name":65,"lang":91,"published":65},{"path":881,"name":65,"lang":93,"published":65},{"path":881,"name":65,"lang":95,"published":65},{"name":895,"created_at":896,"published_at":897,"updated_at":898,"id":899,"uuid":900,"content":901,"slug":909,"full_slug":910,"sort_by_date":65,"position":911,"tag_list":912,"is_startpage":55,"parent_id":68,"meta_data":65,"group_id":913,"first_published_at":897,"release_id":65,"lang":71,"path":65,"alternates":914,"default_full_slug":915,"translated_slugs":916},"CVE-2020-10276: Default Passwords for safety PLC","2025-09-04T15:06:07.725Z","2025-09-29T08:26:51.269Z","2025-09-29T08:26:51.292Z",87280712652319,"1ab79a74-b6b8-418c-b215-a7ecfd064e25",{"Keywords":28,"headline":902,"meta_fields":903,"lastModified":489,"firstPublished":701},"PSA-007: Default Passwords for safety PLC",[904],{"_uid":905,"title":906,"noIndex":55,"OG_image":907,"OG_title":906,"component":61,"description":839,"canonicalUrl":28,"OG_description":839},"22171815-092c-4fe7-9b28-3b86d3773bbb","CVE-2020-10276",{"id":65,"alt":65,"name":28,"focus":65,"title":65,"source":65,"filename":28,"copyright":65,"fieldtype":59,"meta_data":908},{},"cve-2020-10276","da\u002Fsecurity-advisories\u002Fcve-2020-10276",-230,[],"daf7ef0a-7acd-4848-8481-9d8dd9b01cf2",[],"security-advisories\u002Fcve-2020-10276",[917,918,919,920,921,922,923,924,925,926,927],{"path":915,"name":65,"lang":71,"published":65},{"path":915,"name":65,"lang":77,"published":65},{"path":915,"name":65,"lang":79,"published":65},{"path":915,"name":65,"lang":81,"published":65},{"path":915,"name":65,"lang":83,"published":65},{"path":915,"name":65,"lang":85,"published":65},{"path":915,"name":65,"lang":87,"published":65},{"path":915,"name":65,"lang":89,"published":65},{"path":915,"name":65,"lang":91,"published":65},{"path":915,"name":65,"lang":93,"published":65},{"path":915,"name":65,"lang":95,"published":65},{"name":929,"created_at":930,"published_at":931,"updated_at":932,"id":933,"uuid":934,"content":935,"slug":943,"full_slug":944,"sort_by_date":65,"position":945,"tag_list":946,"is_startpage":55,"parent_id":68,"meta_data":65,"group_id":947,"first_published_at":931,"release_id":65,"lang":71,"path":65,"alternates":948,"default_full_slug":949,"translated_slugs":950},"CVE-2020-10277: Boot from a connected USB drive.","2025-09-04T15:00:44.786Z","2025-09-29T08:26:51.533Z","2025-09-29T08:26:51.560Z",87279389887398,"6816b8b9-c123-4088-9e5e-976b8ff48b07",{"Keywords":28,"headline":936,"meta_fields":937,"lastModified":489,"firstPublished":701},"PSA-008: Boot from a connected USB drive.",[938],{"_uid":939,"title":940,"noIndex":55,"OG_image":941,"OG_title":940,"component":61,"description":700,"canonicalUrl":28,"OG_description":700},"4e486641-499f-413c-8247-2074f2bccd17","CVE-2020-10277",{"id":65,"alt":65,"name":28,"focus":65,"title":65,"source":65,"filename":28,"copyright":65,"fieldtype":59,"meta_data":942},{},"cve-2020-10277","da\u002Fsecurity-advisories\u002Fcve-2020-10277",-210,[],"a8a870ed-cb42-4b04-898e-5ebb3e7f83cb",[],"security-advisories\u002Fcve-2020-10277",[951,952,953,954,955,956,957,958,959,960,961],{"path":949,"name":65,"lang":71,"published":65},{"path":949,"name":65,"lang":77,"published":65},{"path":949,"name":65,"lang":79,"published":65},{"path":949,"name":65,"lang":81,"published":65},{"path":949,"name":65,"lang":83,"published":65},{"path":949,"name":65,"lang":85,"published":65},{"path":949,"name":65,"lang":87,"published":65},{"path":949,"name":65,"lang":89,"published":65},{"path":949,"name":65,"lang":91,"published":65},{"path":949,"name":65,"lang":93,"published":65},{"path":949,"name":65,"lang":95,"published":65},{"name":963,"created_at":964,"published_at":965,"updated_at":966,"id":967,"uuid":968,"content":969,"slug":977,"full_slug":978,"sort_by_date":65,"position":979,"tag_list":980,"is_startpage":55,"parent_id":68,"meta_data":65,"group_id":981,"first_published_at":965,"release_id":65,"lang":71,"path":65,"alternates":982,"default_full_slug":983,"translated_slugs":984},"CVE-2020-10278: No Password Configured for the BIOS","2025-09-04T14:52:31.451Z","2025-09-29T08:26:51.773Z","2025-09-29T08:26:51.798Z",87277369192918,"4799ccc7-297d-465c-a35e-33eba8ad705e",{"Keywords":28,"headline":970,"meta_fields":971,"lastModified":489,"firstPublished":701},"PSA-009: No Password Configured for the BIOS",[972],{"_uid":973,"title":974,"noIndex":55,"OG_image":975,"OG_title":974,"component":61,"description":700,"canonicalUrl":28,"OG_description":700},"3db78651-b53e-4d38-accb-c0fe801b2d78","CVE-2020-10278",{"id":65,"alt":65,"name":28,"focus":65,"title":65,"source":65,"filename":28,"copyright":65,"fieldtype":59,"meta_data":976},{},"cve-2020-10278","da\u002Fsecurity-advisories\u002Fcve-2020-10278",-190,[],"9b7e110e-33ea-48d1-8833-c22feebdc247",[],"security-advisories\u002Fcve-2020-10278",[985,986,987,988,989,990,991,992,993,994,995],{"path":983,"name":65,"lang":71,"published":65},{"path":983,"name":65,"lang":77,"published":65},{"path":983,"name":65,"lang":79,"published":65},{"path":983,"name":65,"lang":81,"published":65},{"path":983,"name":65,"lang":83,"published":65},{"path":983,"name":65,"lang":85,"published":65},{"path":983,"name":65,"lang":87,"published":65},{"path":983,"name":65,"lang":89,"published":65},{"path":983,"name":65,"lang":91,"published":65},{"path":983,"name":65,"lang":93,"published":65},{"path":983,"name":65,"lang":95,"published":65},{"name":997,"created_at":998,"published_at":999,"updated_at":1000,"id":1001,"uuid":1002,"content":1003,"slug":1011,"full_slug":1012,"sort_by_date":65,"position":1013,"tag_list":1014,"is_startpage":55,"parent_id":68,"meta_data":65,"group_id":1015,"first_published_at":999,"release_id":65,"lang":71,"path":65,"alternates":1016,"default_full_slug":1017,"translated_slugs":1018},"CVE-2020-10279: Insecure Defaults for Robots","2025-09-04T14:40:35.095Z","2025-09-29T08:26:52.022Z","2025-09-29T08:26:52.046Z",87274434997495,"0bc3351e-398a-4a02-9346-d37a84e47b37",{"Keywords":28,"headline":1004,"meta_fields":1005,"lastModified":489,"firstPublished":701},"PSA-010: Insecure Defaults for Robots",[1006],{"_uid":1007,"title":1008,"noIndex":55,"OG_image":1009,"OG_title":1008,"component":61,"description":839,"canonicalUrl":28,"OG_description":839},"fdaf6bb0-ef8e-44d3-928a-6ab1ffacd4ed","CVE-2020-10279",{"id":65,"alt":65,"name":28,"focus":65,"title":65,"source":65,"filename":28,"copyright":65,"fieldtype":59,"meta_data":1010},{},"cve-2020-10279","da\u002Fsecurity-advisories\u002Fcve-2020-10279",-170,[],"877ccead-df31-49e3-a803-5bb1abad6086",[],"security-advisories\u002Fcve-2020-10279",[1019,1020,1021,1022,1023,1024,1025,1026,1027,1028,1029],{"path":1017,"name":65,"lang":71,"published":65},{"path":1017,"name":65,"lang":77,"published":65},{"path":1017,"name":65,"lang":79,"published":65},{"path":1017,"name":65,"lang":81,"published":65},{"path":1017,"name":65,"lang":83,"published":65},{"path":1017,"name":65,"lang":85,"published":65},{"path":1017,"name":65,"lang":87,"published":65},{"path":1017,"name":65,"lang":89,"published":65},{"path":1017,"name":65,"lang":91,"published":65},{"path":1017,"name":65,"lang":93,"published":65},{"path":1017,"name":65,"lang":95,"published":65},{"name":1031,"created_at":1032,"published_at":1033,"updated_at":1034,"id":1035,"uuid":1036,"content":1037,"slug":1045,"full_slug":1046,"sort_by_date":65,"position":1047,"tag_list":1048,"is_startpage":55,"parent_id":68,"meta_data":65,"group_id":1049,"first_published_at":1033,"release_id":65,"lang":71,"path":65,"alternates":1050,"default_full_slug":1051,"translated_slugs":1052},"CVE-2020-10280: DOS on Web Interface","2025-09-02T12:25:11.512Z","2025-09-29T08:26:53.592Z","2025-09-29T08:26:53.622Z",86533372000410,"d962353a-639e-4e3d-8ff8-70ee48213d4b",{"Keywords":28,"headline":1038,"meta_fields":1039,"lastModified":489,"firstPublished":701},"PSA-011: DOS on Web Interface",[1040],{"_uid":1041,"title":1042,"noIndex":55,"OG_image":1043,"OG_title":1042,"component":61,"description":839,"canonicalUrl":28,"OG_description":839},"de0c5902-fa21-4a6a-bfc5-3f2a1b940a7a","CVE-2020-10280",{"id":65,"alt":65,"name":28,"focus":65,"title":65,"source":65,"filename":28,"copyright":65,"fieldtype":59,"meta_data":1044},{},"cve-2020-10280","da\u002Fsecurity-advisories\u002Fcve-2020-10280",-20,[],"ec6e901b-7bf3-49af-820f-1e0025cc907a",[],"security-advisories\u002Fcve-2020-10280",[1053,1054,1055,1056,1057,1058,1059,1060,1061,1062,1063],{"path":1051,"name":65,"lang":71,"published":65},{"path":1051,"name":65,"lang":77,"published":65},{"path":1051,"name":65,"lang":79,"published":65},{"path":1051,"name":65,"lang":81,"published":65},{"path":1051,"name":65,"lang":83,"published":65},{"path":1051,"name":65,"lang":85,"published":65},{"path":1051,"name":65,"lang":87,"published":65},{"path":1051,"name":65,"lang":89,"published":65},{"path":1051,"name":65,"lang":91,"published":65},{"path":1051,"name":65,"lang":93,"published":65},{"path":1051,"name":65,"lang":95,"published":65}]