[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"en-security-advisories":3,"en-header":95,"footer-default-en":265,"all-advisories-lang-en":402},{"name":4,"created_at":5,"published_at":6,"updated_at":7,"id":8,"uuid":9,"content":10,"slug":62,"full_slug":63,"sort_by_date":64,"position":65,"tag_list":66,"is_startpage":45,"parent_id":67,"meta_data":64,"group_id":68,"first_published_at":69,"release_id":64,"lang":70,"path":64,"alternates":71,"default_full_slug":63,"translated_slugs":72},"Security Advisories","2025-09-02T10:11:04.587Z","2025-12-01T09:54:30.432Z","2025-12-01T09:54:30.454Z",86500411800058,"6ce80674-3902-4e02-91ce-dcca086968bb",{"_uid":11,"body":12,"Keywords":28,"headline":4,"component":50,"meta_fields":51,"select_sub_menu":28},"480806f4-2352-4539-b86f-db31a9e2b75c",[13,47],{"_uid":14,"body":15,"label":28,"links":43,"bgColor":28,"headline":28,"markdown":28,"component":44,"leftAligned":45,"contentRight":46},"88b9f434-ecbc-4544-9c03-8cd1e4be9780",{"type":16,"content":17},"doc",[18,29,36],{"type":19,"content":20},"paragraph",[21],{"text":22,"type":23,"marks":24},"Keeping your AMRs secure is a continuous process which extends throughout the lifecycle of the robots. As your supplier, MiR responsibly informs you about known security concerns and recommended mitigative actions. ","text",[25],{"type":26,"attrs":27},"textStyle",{"color":28},"",{"type":19,"content":30},[31],{"text":32,"type":23,"marks":33},"On this page we publish advisories regarding known issues relating to Product Security. Please read them carefully to fully understand the possible risks and recommended mitigative actions. ",[34],{"type":26,"attrs":35},{"color":28},{"type":19,"content":37},[38],{"text":39,"type":23,"marks":40},"Mobile Industrial Robots A\u002FS expressly disclaims liability for any and all damages or injuries caused as a result of customer’s failure to operate the robot in strict compliance with the User Manuals, follow and implement the recommendations in the Security Advisories below.",[41],{"type":26,"attrs":42},{"color":28},[],"rich-text",true,[],{"_uid":48,"component":49},"cf215f59-440d-40d8-8f9b-5a730b2bb1fb","advisories-grid","page",[52],{"_uid":53,"title":4,"noIndex":54,"OG_image":55,"OG_title":4,"component":60,"description":61,"OG_description":61},"be99bb06-7088-4e84-b650-7e87107c5127",false,{"id":56,"alt":28,"name":28,"focus":28,"title":28,"source":28,"filename":57,"copyright":28,"fieldtype":58,"meta_data":59,"is_external_url":54},11224374,"https:\u002F\u002Fa.storyblok.com\u002Ff\u002F230581\u002F4096x2872\u002Fef55515ef3\u002Fmir600_mir1350_3.png","asset",{},"meta-fields","Keeping your AMRs secure is a continuous process which extends throughout the lifecycle of the robots. As your supplier, MiR responsibly informs you about known security concerns and recommended mitigative actions. ","security-advisories","security-advisories\u002F",null,-380,[],86500070820312,"aff7aaf0-9afb-4937-8a16-e4a0ffdcc5a1","2025-09-29T08:30:57.670Z","default",[],[73,75,77,79,81,83,85,87,89,91,93],{"path":63,"name":64,"lang":74,"published":45},"da",{"path":63,"name":64,"lang":76,"published":45},"de",{"path":63,"name":64,"lang":78,"published":45},"it",{"path":63,"name":64,"lang":80,"published":45},"fr",{"path":63,"name":64,"lang":82,"published":45},"es",{"path":63,"name":64,"lang":84,"published":45},"ko",{"path":63,"name":64,"lang":86,"published":45},"ja",{"path":63,"name":64,"lang":88,"published":45},"zh",{"path":63,"name":64,"lang":90,"published":45},"tw",{"path":63,"name":64,"lang":92,"published":45},"pl",{"path":63,"name":64,"lang":94,"published":45},"cs",{"name":96,"created_at":97,"published_at":98,"updated_at":99,"id":100,"uuid":101,"content":102,"slug":104,"full_slug":246,"sort_by_date":64,"position":247,"tag_list":248,"is_startpage":54,"parent_id":249,"meta_data":64,"group_id":250,"first_published_at":251,"release_id":64,"lang":70,"path":64,"alternates":252,"default_full_slug":246,"translated_slugs":253},"Header","2023-05-25T10:50:16.809Z","2026-03-19T07:46:31.998Z","2026-04-02T16:49:48.234Z",313480493,"bafd24a7-f2d3-44e9-854d-5a5e76a957b4",{"_uid":103,"component":104,"header_menu":105,"portalTitle":163,"dropdown_title":164,"header_dropdown":165,"header_portal_switcher":209},"22e2fba0-faed-44f4-a77a-74073ce6c25a","header",[106,118,127,136,145,154],{"_uid":107,"link":108,"title":114,"component":117},"51622f66-37f1-4b03-9efc-770451007e96",{"id":109,"url":28,"linktype":110,"fieldtype":111,"cached_url":112,"story":113},"cc2f264a-e54d-4097-a11d-3e9b0af126e1","story","multilink","products\u002F",{"name":114,"id":115,"uuid":109,"slug":116,"url":112,"full_slug":112,"_stopResolving":45},"Products",325521696,"products","menu-link",{"_uid":119,"link":120,"title":124,"component":117},"999386f5-ddb5-4a4c-9695-f16c5a263284",{"id":121,"url":28,"linktype":110,"fieldtype":111,"cached_url":122,"story":123},"fdcb7cad-fe5b-424e-a5b6-95e61a6e7e2c","your-amr-journey\u002F",{"name":124,"id":125,"uuid":121,"slug":126,"url":122,"full_slug":122,"_stopResolving":45},"Your AMR Journey",356660014,"your-amr-journey",{"_uid":128,"link":129,"title":133,"component":117},"80432b01-ee11-4e0f-9fe9-b8aed52e318c",{"id":130,"url":28,"linktype":110,"fieldtype":111,"cached_url":131,"story":132},"8cbd5d80-2357-40d6-9270-4d58c47b9c2d","cases\u002F",{"name":133,"id":134,"uuid":130,"slug":135,"url":131,"full_slug":131,"_stopResolving":45},"Cases",326018479,"cases",{"_uid":137,"link":138,"title":142,"component":117},"ac56471a-9262-4d22-a5f3-80699f28ee78",{"id":139,"url":28,"linktype":110,"fieldtype":111,"cached_url":140,"story":141},"17b3687b-5324-48ff-abfc-1b05af4c7aa5","industries\u002F",{"name":142,"id":143,"uuid":139,"slug":144,"url":140,"full_slug":140,"_stopResolving":45},"Industries",335936187,"industries",{"_uid":146,"link":147,"title":151,"component":117},"ca78bf38-0026-4db8-8bf1-ff4727e36a85",{"id":148,"url":28,"linktype":110,"fieldtype":111,"cached_url":149,"story":150},"fac8ac6e-663a-4545-860c-b6762ea0d40b","about\u002F",{"name":151,"id":152,"uuid":148,"slug":153,"url":149,"full_slug":149,"_stopResolving":45},"About",313472547,"about",{"_uid":155,"link":156,"title":160,"component":117},"b51c3a9d-4d66-491b-b115-dbb593310c3f",{"id":157,"url":28,"linktype":110,"fieldtype":111,"cached_url":158,"story":159},"801bddfe-f04a-4089-9418-909bc2f67312","contacts\u002F",{"name":160,"id":161,"uuid":157,"slug":162,"url":158,"full_slug":158,"_stopResolving":45},"Contact",389644485,"contacts","Portals","Services & Support",[166,174,182,191,199],{"_uid":167,"link":168,"title":172,"component":117},"bffc1954-55b8-4952-be47-cc3cd04e26c0",{"id":169,"url":28,"linktype":110,"fieldtype":111,"cached_url":170,"story":171},"50c9e4be-1d49-4ca0-aec0-c0f84d229407","mir-academy",{"name":172,"id":173,"uuid":169,"slug":170,"url":170,"full_slug":170,"_stopResolving":45},"MiR Academy",430299874,{"_uid":175,"link":176,"title":180,"component":117},"2a1188ce-e1b3-4634-aeff-a5337edcfcc4",{"id":177,"url":28,"linktype":110,"fieldtype":111,"cached_url":178,"story":179},"08dd7140-9581-47d7-9df1-7eb40e932e6e","community",{"name":180,"id":181,"uuid":177,"slug":178,"url":178,"full_slug":178,"_stopResolving":45},"MiR Community",320145416,{"_uid":183,"link":184,"title":188,"component":117},"6fde37b5-a220-440b-ad34-b0fb215c90a0",{"id":185,"url":28,"linktype":110,"fieldtype":111,"cached_url":186,"story":187},"c9d027cd-40a7-4345-9edd-6eceb0d65825","service-support\u002Ffinance",{"name":188,"id":189,"uuid":185,"slug":190,"url":186,"full_slug":186,"_stopResolving":45},"MiR Finance",404955355,"finance",{"_uid":192,"link":193,"title":197,"component":117},"52185e6b-2937-424c-8493-ae513c5ee658",{"id":194,"url":28,"linktype":110,"fieldtype":111,"cached_url":195,"story":196},"5b534ff7-6a86-475e-a184-e742a32b433b","support-portal",{"name":197,"id":198,"uuid":194,"slug":195,"url":195,"full_slug":195,"_stopResolving":45},"MiR Support Portal",320145411,{"_uid":200,"link":201,"title":208,"component":117},"d1205786-5e27-466a-918a-b276af399001",{"id":202,"url":28,"linktype":110,"fieldtype":111,"cached_url":203,"story":204},"951f0837-0bd2-482e-9a17-d8b766fc7571","service-support\u002Fmir-service-activation",{"name":205,"id":206,"uuid":202,"slug":207,"url":203,"full_slug":203,"_stopResolving":45},"MiR service activation",552990532,"mir-service-activation","MiR Service Options",[210,220,229,237],{"_uid":211,"icon":212,"link":217,"name":218,"component":219},"e4bb7f1b-bff1-4b8e-b589-071a77ccd2fe",{"id":213,"alt":214,"name":28,"focus":28,"title":28,"source":28,"filename":215,"copyright":28,"fieldtype":58,"meta_data":216,"is_external_url":54},15422895,"MiR Main Website","https:\u002F\u002Fa.storyblok.com\u002Ff\u002F230581\u002F39x40\u002Ff8b20084af\u002Fportal-switcher-main.svg",{"alt":214,"title":28,"source":28,"copyright":28},"https:\u002F\u002Fmobile-industrial-robots.com\u002F","Website","portal",{"_uid":221,"icon":222,"link":227,"name":228,"component":219},"9b78af37-4774-424d-b87e-4d3850b778a5",{"id":223,"alt":224,"name":28,"focus":28,"title":28,"source":28,"filename":225,"copyright":28,"fieldtype":58,"meta_data":226,"is_external_url":54},14298318,"how to guide","https:\u002F\u002Fa.storyblok.com\u002Ff\u002F230581\u002F30x30\u002F9687ef73ab\u002Ficon_featured-howto.svg",{},"https:\u002F\u002Fsupportportal.mobile-industrial-robots.com\u002F","Support Portal",{"_uid":230,"icon":231,"link":235,"name":236,"component":219},"a1dca106-baed-4db0-8bf2-b982f3c7d8b5",{"id":232,"alt":28,"name":28,"focus":28,"title":28,"source":28,"filename":233,"copyright":28,"fieldtype":58,"meta_data":234,"is_external_url":54},10103478,"https:\u002F\u002Fa.storyblok.com\u002Ff\u002F230581\u002F30x30\u002F3e6d1ac02e\u002Ficon_corevalues_nextlevel.svg",{},"https:\u002F\u002Facademy.mobile-industrial-robots.com\u002F","Academy",{"_uid":238,"icon":239,"link":244,"name":245,"component":219},"268b8de5-88f7-491f-bc7e-c683e4d9b80f",{"id":240,"alt":241,"name":28,"focus":28,"title":28,"source":28,"filename":242,"copyright":28,"fieldtype":58,"meta_data":243,"is_external_url":54},13785060,"World share icon","https:\u002F\u002Fa.storyblok.com\u002Ff\u002F230581\u002F30x30\u002F0e54bc9d4e\u002Ficon_community_worldshare.svg",{},"https:\u002F\u002Fcommunity.mobile-industrial-robots.com\u002Fs\u002F","Community","navigation\u002Fheader",10,[],313907702,"8aa22c46-7145-43a7-91ea-8c1bdcf87a77","2023-05-25T10:51:41.897Z",[],[254,255,256,257,258,259,260,261,262,263,264],{"path":246,"name":64,"lang":74,"published":64},{"path":246,"name":64,"lang":76,"published":64},{"path":246,"name":64,"lang":78,"published":64},{"path":246,"name":64,"lang":80,"published":64},{"path":246,"name":64,"lang":82,"published":64},{"path":246,"name":64,"lang":84,"published":64},{"path":246,"name":64,"lang":86,"published":64},{"path":246,"name":64,"lang":88,"published":64},{"path":246,"name":64,"lang":90,"published":64},{"path":246,"name":64,"lang":92,"published":64},{"path":246,"name":64,"lang":94,"published":64},{"footerSections":266,"socialMedia":332,"socialMediaChina":348,"privacyPolicy":352,"cookiePolicy":363,"changeRegion":-1,"languageSwitcher":373},[267,285,309],{"title":268,"links":269},"New to AMRs?",[270,274,278,282,284],{"url":271,"id":272,"title":273,"isHiring":54},"your-amr-journey\u002Fgetting-started","4e1f0a89-b28f-466c-9384-3918efc93161","Getting started",{"url":275,"id":276,"title":277,"isHiring":54},"blog\u002Fagv-vs-amr-whats-the-difference","8da1999f-4111-493b-987e-2eefa6c30260","What is an AMR?",{"url":279,"id":280,"title":281,"isHiring":54},"your-amr-journey\u002Fsuccessful-deployment","be3b12bb-af44-42b3-ad92-f6dbb1816834","Successful deployment",{"url":112,"id":109,"title":283,"isHiring":54},"Solutions",{"url":131,"id":130,"title":133,"isHiring":54},{"title":286,"links":287},"Popular links",[288,292,296,300,304,308],{"url":289,"id":290,"title":291,"isHiring":54},"events\u002F","c3b02b79-cfab-4c6b-a321-601fb8aaf1ee","Events & Webinars",{"url":293,"id":294,"title":295,"isHiring":54},"blog\u002F","dcf58b56-6c67-453a-bc46-7e7ca29d6ad3","Blog & News Center",{"url":297,"id":298,"title":299,"isHiring":54},"ebooks-and-whitepapers\u002F","d3d9853d-e6b1-430f-ac93-4ca41062816b","eBooks",{"url":301,"id":302,"title":303,"isHiring":54},"products\u002Fservices\u002F","dbefe226-8948-4234-b3d7-11a39f15c293","MiR Service",{"url":305,"id":306,"title":307,"isHiring":54},"safety-security-updates\u002Fsafety-and-security-updates","7d9c7a07-ee9a-49c0-bebd-b7154ff9b6fd","Safety and Security updates",{"url":170,"id":169,"title":172,"isHiring":54},{"title":310,"links":311},"About MiR",[312,316,320,324,328],{"url":313,"id":314,"title":315,"isHiring":54},"about\u002Fmir-history","db8b5815-cd10-4a1e-8c4c-e44582042ff7","History",{"url":317,"id":318,"title":319,"isHiring":54},"about\u002Fcareer\u002F","ebd55cc3-b451-4d9f-8389-68d7e889494d","Careers",{"url":321,"id":322,"title":323,"isHiring":45},"about\u002Fcareer\u002Fopen-vacancies","cf30dbd5-2a28-4323-9506-6702d228c4d6","Open vacancies",{"url":325,"id":326,"title":327,"isHiring":54},"about\u002Fdata-notice","019744e9-c579-415c-8a15-8e47ce09debd","Data Notice",{"url":329,"id":330,"title":331,"isHiring":54},"general-terms-of-delivery\u002F","ddb7df97-6dcf-4e28-8c2e-40b20ab1256a","General Terms of Delivery",[333,336,339,342,345],{"title":334,"url":335},"linkedin","https:\u002F\u002Fwww.linkedin.com\u002Fcompany\u002Fmobile-industrial-robots-aps\u002F",{"title":337,"url":338},"facebook","https:\u002F\u002Fwww.facebook.com\u002FMiR.Robots",{"title":340,"url":341},"instagram","https:\u002F\u002Fwww.instagram.com\u002Fmobileindustrialrobots\u002F",{"title":343,"url":344},"twitter","https:\u002F\u002Ftwitter.com\u002FMobileIndRobots",{"title":346,"url":347},"youtube","https:\u002F\u002Fwww.youtube.com\u002Fchannel\u002FUC3MRxsNU6AW_hKdExtnGr1Q",[349],{"title":350,"url":351},"wechat","https:\u002F\u002Fmp.weixin.qq.com\u002Fs\u002FzlJVpVC40VBQJBAkUSh-0w",[353],{"url":354,"_uid":361,"title":358,"linkType":362,"component":362},{"id":355,"url":28,"linktype":110,"fieldtype":111,"cached_url":356,"story":357},"f89e458e-6860-4b96-b02e-c462d21ef0a1","about\u002Fprivacy-policy\u002F",{"name":358,"id":359,"uuid":355,"slug":360,"url":356,"full_slug":356,"_stopResolving":45},"Privacy Policy",389640641,"privacy-policy","67e85086-82cb-485d-80ed-2abef92cc742","link",[364],{"url":365,"_uid":372,"title":369,"linkType":362,"component":362},{"id":366,"url":28,"linktype":110,"fieldtype":111,"cached_url":367,"story":368},"8181ff53-45dd-420c-b8f1-0de734d999ee","cookie-policy",{"name":369,"id":370,"uuid":366,"slug":367,"url":371,"full_slug":371,"_stopResolving":45},"Cookie Policy",356680705,"about\u002Fcookie-policy","aa639879-5d58-46b5-8c17-dcd35942475b",{"name":374,"created_at":375,"published_at":376,"updated_at":377,"id":378,"uuid":379,"content":380,"slug":374,"full_slug":384,"sort_by_date":64,"position":385,"tag_list":386,"is_startpage":54,"parent_id":249,"meta_data":64,"group_id":387,"first_published_at":388,"release_id":64,"lang":70,"path":64,"alternates":389,"default_full_slug":384,"translated_slugs":390},"language-switcher","2023-08-14T11:52:42.638Z","2024-03-26T11:26:07.197Z","2024-03-26T11:26:07.213Z",354358248,"f1d63013-0b69-4d61-a57f-08ffe45b982d",{"_uid":381,"headline":382,"component":374,"paragraph":383},"8a50d2d4-79a0-410b-9853-1dd743c4ede0","Choose your language","By choosing a different language content may also change on mobile-industrial-robots.com.","navigation\u002Flanguage-switcher",-90,[],"d9fdd0a0-3d33-4b90-a4cd-e32ffdbaec82","2023-10-27T08:29:51.543Z",[],[391,392,393,394,395,396,397,398,399,400,401],{"path":384,"name":64,"lang":74,"published":64},{"path":384,"name":64,"lang":76,"published":64},{"path":384,"name":64,"lang":78,"published":64},{"path":384,"name":64,"lang":80,"published":64},{"path":384,"name":64,"lang":82,"published":64},{"path":384,"name":64,"lang":84,"published":64},{"path":384,"name":64,"lang":86,"published":64},{"path":384,"name":64,"lang":88,"published":64},{"path":384,"name":64,"lang":90,"published":64},{"path":384,"name":64,"lang":92,"published":64},{"path":384,"name":64,"lang":94,"published":64},[403,438,473,507,541,575,608,643,678,711,745,778,812,846,879,912,945,978],{"name":404,"created_at":405,"published_at":406,"updated_at":407,"id":408,"uuid":409,"content":410,"slug":419,"full_slug":420,"sort_by_date":64,"position":421,"tag_list":422,"is_startpage":54,"parent_id":67,"meta_data":64,"group_id":423,"first_published_at":424,"release_id":64,"lang":70,"path":64,"alternates":425,"default_full_slug":420,"translated_slugs":426},"CVE-2025-13819: Open redirect","2025-12-01T08:29:01.589Z","2025-12-01T09:44:27.940Z","2025-12-01T09:44:27.960Z",118325827983691,"05926065-cfbb-49bc-8a22-1beb073adc1f",{"Keywords":28,"headline":404,"meta_fields":411,"lastModified":418,"firstPublished":418},[412],{"_uid":413,"title":414,"noIndex":54,"OG_image":415,"OG_title":414,"component":60,"description":417,"canonicalUrl":28,"OG_description":417},"45ff4bde-a7ed-44e1-992b-21226b8d4f90","Open redirect",{"id":64,"alt":64,"name":28,"focus":64,"title":64,"source":64,"filename":28,"copyright":64,"fieldtype":58,"meta_data":416},{},"MiR robot and fleet software versions prior to version 3.7.0 are affected by an open redirect vulnerability. The web server accepts user-controlled input and uses it to redirect users to external sites without proper validation. This flaw enables crafting URLs that appear legitimate but redirect users to attacker-controlled sites, facilitating phishing and credential theft.","2025-12-01 00:00","cve-2025-13819-open-redirect","security-advisories\u002Fcve-2025-13819-open-redirect",-110,[],"1edcc0b9-91ba-41d5-920c-27a51d8d34bf","2025-12-01T09:38:38.843Z",[],[427,428,429,430,431,432,433,434,435,436,437],{"path":420,"name":64,"lang":74,"published":64},{"path":420,"name":64,"lang":76,"published":64},{"path":420,"name":64,"lang":78,"published":64},{"path":420,"name":64,"lang":80,"published":64},{"path":420,"name":64,"lang":82,"published":64},{"path":420,"name":64,"lang":84,"published":64},{"path":420,"name":64,"lang":86,"published":64},{"path":420,"name":64,"lang":88,"published":64},{"path":420,"name":64,"lang":90,"published":64},{"path":420,"name":64,"lang":92,"published":64},{"path":420,"name":64,"lang":94,"published":64},{"name":439,"created_at":440,"published_at":441,"updated_at":442,"id":443,"uuid":444,"content":445,"slug":455,"full_slug":456,"sort_by_date":64,"position":457,"tag_list":458,"is_startpage":54,"parent_id":67,"meta_data":64,"group_id":459,"first_published_at":441,"release_id":64,"lang":70,"path":64,"alternates":460,"default_full_slug":456,"translated_slugs":461},"CVE-2025-9229: Information Disclosure through verbose error pages","2025-09-02T11:34:58.033Z","2025-09-29T08:26:53.830Z","2025-09-29T08:26:53.855Z",86521028790762,"00ed0dcb-4750-4f4d-a346-441444c21c67",{"Keywords":28,"headline":446,"meta_fields":447,"lastModified":453,"firstPublished":454},"MSA-17: Information Disclosure",[448],{"_uid":449,"title":446,"noIndex":54,"OG_image":450,"OG_title":446,"component":60,"description":452,"canonicalUrl":28,"OG_description":452},"ed60ea18-67aa-4734-b1fb-22e738c89ae1",{"id":64,"alt":64,"name":28,"focus":64,"title":64,"source":64,"filename":28,"copyright":64,"fieldtype":58,"meta_data":451},{},"MiR software versions prior to version 3.0.0 are affected by an information disclosure vulnerability. An unauthenticated attacker is able to view error pages which include unnecessarily detailed error information, such as file paths and other data. Such unnecessarily verbose information could potentially ease future exploitation attempts by attackers.","2025-09-24 00:00","2024-03-26 00:00","information-disclosure","security-advisories\u002Finformation-disclosure",0,[],"0e33737d-4f4d-41e0-bd92-19810ffdfe7d",[],[462,463,464,465,466,467,468,469,470,471,472],{"path":456,"name":64,"lang":74,"published":64},{"path":456,"name":64,"lang":76,"published":64},{"path":456,"name":64,"lang":78,"published":64},{"path":456,"name":64,"lang":80,"published":64},{"path":456,"name":64,"lang":82,"published":64},{"path":456,"name":64,"lang":84,"published":64},{"path":456,"name":64,"lang":86,"published":64},{"path":456,"name":64,"lang":88,"published":64},{"path":456,"name":64,"lang":90,"published":64},{"path":456,"name":64,"lang":92,"published":64},{"path":456,"name":64,"lang":94,"published":64},{"name":474,"created_at":475,"published_at":476,"updated_at":477,"id":478,"uuid":479,"content":480,"slug":489,"full_slug":490,"sort_by_date":64,"position":491,"tag_list":492,"is_startpage":54,"parent_id":67,"meta_data":64,"group_id":493,"first_published_at":476,"release_id":64,"lang":70,"path":64,"alternates":494,"default_full_slug":490,"translated_slugs":495},"CVE-2025-8749: Path traversal","2025-09-04T14:22:29.160Z","2025-09-29T08:26:52.528Z","2025-09-29T08:26:52.552Z",87269986996075,"075f373d-29a0-4910-bdc6-b338f6f5d226",{"Keywords":28,"headline":481,"meta_fields":482,"lastModified":453,"firstPublished":488},"MSA-13: Path Traversal Vulnerability",[483],{"_uid":413,"title":484,"noIndex":54,"OG_image":485,"OG_title":484,"component":60,"description":487,"canonicalUrl":28,"OG_description":487},"Path Traversal",{"id":64,"alt":64,"name":28,"focus":64,"title":64,"source":64,"filename":28,"copyright":64,"fieldtype":58,"meta_data":486},{},"MiR robot software versions prior to version 3.0.0 are affected by a path traversal vulnerability. Authenticated users could abuse a vulnerable API endpoint to extract files from the robot file system.","2024-03-19 00:00","path-traversal","security-advisories\u002Fpath-traversal",-100,[],"a8e212a8-0fe0-40b8-8e42-886e39f92801",[],[496,497,498,499,500,501,502,503,504,505,506],{"path":490,"name":64,"lang":74,"published":64},{"path":490,"name":64,"lang":76,"published":64},{"path":490,"name":64,"lang":78,"published":64},{"path":490,"name":64,"lang":80,"published":64},{"path":490,"name":64,"lang":82,"published":64},{"path":490,"name":64,"lang":84,"published":64},{"path":490,"name":64,"lang":86,"published":64},{"path":490,"name":64,"lang":88,"published":64},{"path":490,"name":64,"lang":90,"published":64},{"path":490,"name":64,"lang":92,"published":64},{"path":490,"name":64,"lang":94,"published":64},{"name":508,"created_at":509,"published_at":510,"updated_at":511,"id":512,"uuid":513,"content":514,"slug":523,"full_slug":524,"sort_by_date":64,"position":525,"tag_list":526,"is_startpage":54,"parent_id":67,"meta_data":64,"group_id":527,"first_published_at":510,"release_id":64,"lang":70,"path":64,"alternates":528,"default_full_slug":524,"translated_slugs":529},"CVE-2025-9225: Cross-site scripting","2025-09-04T14:13:22.814Z","2025-09-29T08:26:52.790Z","2025-09-29T08:26:52.818Z",87267749170629,"305fdaa0-1fd3-4633-ac20-7e5bcff08ecc",{"Keywords":28,"headline":515,"meta_fields":516,"lastModified":453,"firstPublished":488},"MSA-14: Cross-site scripting",[517],{"_uid":518,"title":519,"noIndex":54,"OG_image":520,"OG_title":519,"component":60,"description":522,"canonicalUrl":28,"OG_description":522},"8c0901e7-81b5-48b2-a39c-17b584fa5de5","Cross-site scripting",{"id":64,"alt":64,"name":28,"focus":64,"title":64,"source":64,"filename":28,"copyright":64,"fieldtype":58,"meta_data":521},{},"MiR software versions prior to version 3.0.0 are affected by a stored cross-site scripting (XSS) vulnerability. If triggered by a logged in user, it could allow execution of arbitrary JavaScript code on a victim browser.","cross-site-scripting","security-advisories\u002Fcross-site-scripting",-80,[],"54a6d3e1-fcb3-4039-a0fd-a76fa41417e3",[],[530,531,532,533,534,535,536,537,538,539,540],{"path":524,"name":64,"lang":74,"published":64},{"path":524,"name":64,"lang":76,"published":64},{"path":524,"name":64,"lang":78,"published":64},{"path":524,"name":64,"lang":80,"published":64},{"path":524,"name":64,"lang":82,"published":64},{"path":524,"name":64,"lang":84,"published":64},{"path":524,"name":64,"lang":86,"published":64},{"path":524,"name":64,"lang":88,"published":64},{"path":524,"name":64,"lang":90,"published":64},{"path":524,"name":64,"lang":92,"published":64},{"path":524,"name":64,"lang":94,"published":64},{"name":542,"created_at":543,"published_at":544,"updated_at":545,"id":546,"uuid":547,"content":548,"slug":557,"full_slug":558,"sort_by_date":64,"position":559,"tag_list":560,"is_startpage":54,"parent_id":67,"meta_data":64,"group_id":561,"first_published_at":544,"release_id":64,"lang":70,"path":64,"alternates":562,"default_full_slug":558,"translated_slugs":563},"CVE-2025-9228: Insufficient authorization when creating notes","2025-09-04T14:04:48.632Z","2025-09-29T08:26:53.053Z","2025-09-29T08:26:53.084Z",87265643080581,"e9c368d5-2954-45b7-a2ba-36970a0ee022",{"Keywords":28,"headline":549,"meta_fields":550,"lastModified":453,"firstPublished":488},"MSA-15: Insufficient authorization when creating notes",[551],{"_uid":552,"title":553,"noIndex":54,"OG_image":554,"OG_title":553,"component":60,"description":556,"canonicalUrl":28,"OG_description":556},"2bcd69f1-d60f-47c2-b86f-effae565b9dd","Insufficient authorization when creating notes",{"id":64,"alt":64,"name":28,"focus":64,"title":64,"source":64,"filename":28,"copyright":64,"fieldtype":58,"meta_data":555},{},"MiR software versions prior to version 3.0.0 have insufficient authorization controls when creating text notes, allowing low-privilege users to create notes which are intended only for administrative users.","insufficient-authorization-when-creating-notes","security-advisories\u002Finsufficient-authorization-when-creating-notes",-60,[],"1fb820e5-32ab-465c-ba6c-5445489bda8c",[],[564,565,566,567,568,569,570,571,572,573,574],{"path":558,"name":64,"lang":74,"published":64},{"path":558,"name":64,"lang":76,"published":64},{"path":558,"name":64,"lang":78,"published":64},{"path":558,"name":64,"lang":80,"published":64},{"path":558,"name":64,"lang":82,"published":64},{"path":558,"name":64,"lang":84,"published":64},{"path":558,"name":64,"lang":86,"published":64},{"path":558,"name":64,"lang":88,"published":64},{"path":558,"name":64,"lang":90,"published":64},{"path":558,"name":64,"lang":92,"published":64},{"path":558,"name":64,"lang":94,"published":64},{"name":576,"created_at":577,"published_at":578,"updated_at":579,"id":580,"uuid":581,"content":582,"slug":590,"full_slug":591,"sort_by_date":64,"position":592,"tag_list":593,"is_startpage":54,"parent_id":67,"meta_data":64,"group_id":594,"first_published_at":578,"release_id":64,"lang":70,"path":64,"alternates":595,"default_full_slug":591,"translated_slugs":596},"CVE-2025-8748: Command injection","2025-09-04T13:56:38.486Z","2025-09-29T08:26:53.305Z","2025-09-29T08:26:53.333Z",87263635449991,"f54092b8-4cf9-4f69-9ea1-f2da5d8499ef",{"Keywords":28,"headline":583,"meta_fields":584,"lastModified":453,"firstPublished":488},"MSA-16: Command injection",[585],{"_uid":586,"title":583,"noIndex":54,"OG_image":587,"OG_title":583,"component":60,"description":589,"canonicalUrl":28,"OG_description":589},"253d8802-7aca-4090-940c-1b8d575b88eb",{"id":64,"alt":64,"name":28,"focus":64,"title":64,"source":64,"filename":28,"copyright":64,"fieldtype":58,"meta_data":588},{},"MiR software versions prior to version 3.0.0 are affected by a command injection vulnerability. A malicious HTTP request crafted by an authenticated user could allow the execution of arbitrary commands on the underlying operating system.","command-injection","security-advisories\u002Fcommand-injection",-40,[],"17a5a2eb-5bc0-4cec-8050-2d12ba023824",[],[597,598,599,600,601,602,603,604,605,606,607],{"path":591,"name":64,"lang":74,"published":64},{"path":591,"name":64,"lang":76,"published":64},{"path":591,"name":64,"lang":78,"published":64},{"path":591,"name":64,"lang":80,"published":64},{"path":591,"name":64,"lang":82,"published":64},{"path":591,"name":64,"lang":84,"published":64},{"path":591,"name":64,"lang":86,"published":64},{"path":591,"name":64,"lang":88,"published":64},{"path":591,"name":64,"lang":90,"published":64},{"path":591,"name":64,"lang":92,"published":64},{"path":591,"name":64,"lang":94,"published":64},{"name":609,"created_at":610,"published_at":611,"updated_at":612,"id":613,"uuid":614,"content":615,"slug":625,"full_slug":626,"sort_by_date":64,"position":627,"tag_list":628,"is_startpage":54,"parent_id":67,"meta_data":64,"group_id":629,"first_published_at":611,"release_id":64,"lang":70,"path":64,"alternates":630,"default_full_slug":626,"translated_slugs":631},"CVE-2021-44228: Log4Shell ","2025-09-04T14:27:38.432Z","2025-09-29T08:26:52.277Z","2025-09-29T08:26:52.304Z",87271253787325,"d06f143a-da8a-4315-8c20-6860ddebfbeb",{"Keywords":28,"headline":616,"meta_fields":617,"lastModified":453,"firstPublished":624},"PSA-012: Log4shell",[618],{"_uid":619,"title":620,"noIndex":54,"OG_image":621,"OG_title":620,"component":60,"description":623,"canonicalUrl":28,"OG_description":623},"b1cd31ff-d148-4545-8df5-7e236bb5d6f9","Log4Shell (CVE-2021-44228)",{"id":64,"alt":64,"name":28,"focus":64,"title":64,"source":64,"filename":28,"copyright":64,"fieldtype":58,"meta_data":622},{},"We hereby inform that MiR products are not affected by the Apache Log4j vulnerability known as Log4Shell.","2021-12-21 00:00","log4shell","security-advisories\u002Flog4shell",-150,[],"4408cf8b-5b8e-4558-9c5f-349dea1b5afe",[],[632,633,634,635,636,637,638,639,640,641,642],{"path":626,"name":64,"lang":74,"published":64},{"path":626,"name":64,"lang":76,"published":64},{"path":626,"name":64,"lang":78,"published":64},{"path":626,"name":64,"lang":80,"published":64},{"path":626,"name":64,"lang":82,"published":64},{"path":626,"name":64,"lang":84,"published":64},{"path":626,"name":64,"lang":86,"published":64},{"path":626,"name":64,"lang":88,"published":64},{"path":626,"name":64,"lang":90,"published":64},{"path":626,"name":64,"lang":92,"published":64},{"path":626,"name":64,"lang":94,"published":64},{"name":644,"created_at":645,"published_at":646,"updated_at":647,"id":648,"uuid":649,"content":650,"slug":660,"full_slug":661,"sort_by_date":64,"position":662,"tag_list":663,"is_startpage":54,"parent_id":67,"meta_data":64,"group_id":664,"first_published_at":646,"release_id":64,"lang":70,"path":64,"alternates":665,"default_full_slug":661,"translated_slugs":666},"CVE-2017-7184, CVE-2017-18255: Local Attacker can Exploit Kernel Vulnerabilities","2025-09-04T15:42:08.655Z","2025-09-29T08:26:50.158Z","2025-09-29T08:26:50.188Z",87289563822831,"07647f34-e618-4ae7-b22d-40b140d33e88",{"Keywords":28,"headline":651,"meta_fields":652,"lastModified":453,"firstPublished":659},"PSA-001: Local Attacker can exploit kernel vulnerabilities",[653],{"_uid":654,"title":655,"noIndex":54,"OG_image":656,"OG_title":655,"component":60,"description":658,"canonicalUrl":28,"OG_description":658},"d90fae0d-877b-4891-8d4f-a7473735657a","CVE-2017-7184, CVE-2017-18255",{"id":64,"alt":64,"name":28,"focus":64,"title":64,"source":64,"filename":28,"copyright":64,"fieldtype":58,"meta_data":657},{},"This Product Security Advisory is based on a thorough investigation and all findings that were available at the time of publication. Should new information on the matter become available, it is possible that the initial assessment changes and the Advisory will be updated.\n","2021-05-27 00:00","cve-2017-7184-cve-2017-18255","security-advisories\u002Fcve-2017-7184-cve-2017-18255",-350,[],"dac73eee-3759-4ad9-8cea-a594d455287a",[],[667,668,669,670,671,672,673,674,675,676,677],{"path":661,"name":64,"lang":74,"published":64},{"path":661,"name":64,"lang":76,"published":64},{"path":661,"name":64,"lang":78,"published":64},{"path":661,"name":64,"lang":80,"published":64},{"path":661,"name":64,"lang":82,"published":64},{"path":661,"name":64,"lang":84,"published":64},{"path":661,"name":64,"lang":86,"published":64},{"path":661,"name":64,"lang":88,"published":64},{"path":661,"name":64,"lang":90,"published":64},{"path":661,"name":64,"lang":92,"published":64},{"path":661,"name":64,"lang":94,"published":64},{"name":679,"created_at":680,"published_at":681,"updated_at":682,"id":683,"uuid":684,"content":685,"slug":693,"full_slug":694,"sort_by_date":64,"position":695,"tag_list":696,"is_startpage":54,"parent_id":67,"meta_data":64,"group_id":697,"first_published_at":681,"release_id":64,"lang":70,"path":64,"alternates":698,"default_full_slug":694,"translated_slugs":699},"CVE-2020-10269: Default Passwords for Wireless Access Points","2025-09-04T15:36:44.924Z","2025-09-29T08:26:50.531Z","2025-09-29T08:26:50.563Z",87288237800873,"0240d937-d72f-4457-bfeb-dd7694f51cc7",{"Keywords":28,"headline":686,"meta_fields":687,"lastModified":453,"firstPublished":659},"PSA-002: Default Passwords for Wireless Access Points",[688],{"_uid":689,"title":690,"noIndex":54,"OG_image":691,"OG_title":690,"component":60,"description":658,"canonicalUrl":28,"OG_description":658},"8b5a9265-3b74-45a7-ab27-12d3a31f5ef4","CVE-2020-10269",{"id":64,"alt":64,"name":28,"focus":64,"title":64,"source":64,"filename":28,"copyright":64,"fieldtype":58,"meta_data":692},{},"cve-2020-10269","security-advisories\u002Fcve-2020-10269",-330,[],"d02707b3-5193-457b-b9bd-42c50d595cda",[],[700,701,702,703,704,705,706,707,708,709,710],{"path":694,"name":64,"lang":74,"published":64},{"path":694,"name":64,"lang":76,"published":64},{"path":694,"name":64,"lang":78,"published":64},{"path":694,"name":64,"lang":80,"published":64},{"path":694,"name":64,"lang":82,"published":64},{"path":694,"name":64,"lang":84,"published":64},{"path":694,"name":64,"lang":86,"published":64},{"path":694,"name":64,"lang":88,"published":64},{"path":694,"name":64,"lang":90,"published":64},{"path":694,"name":64,"lang":92,"published":64},{"path":694,"name":64,"lang":94,"published":64},{"name":712,"created_at":713,"published_at":714,"updated_at":715,"id":716,"uuid":717,"content":718,"slug":727,"full_slug":728,"sort_by_date":64,"position":729,"tag_list":730,"is_startpage":54,"parent_id":67,"meta_data":64,"group_id":731,"first_published_at":714,"release_id":64,"lang":70,"path":64,"alternates":732,"default_full_slug":728,"translated_slugs":733},"CVE-2020-10270: Predefined Credentials for the web Interface","2025-09-04T15:31:57.471Z","2025-09-29T08:26:50.535Z","2025-09-29T08:26:50.562Z",87287060407812,"a1fc16dd-3ada-4329-914d-7f47ab76c60c",{"Keywords":28,"headline":719,"meta_fields":720,"lastModified":453,"firstPublished":659},"PSA-003: Predefined Credentials for the web Interface",[721],{"_uid":722,"title":723,"noIndex":54,"OG_image":724,"OG_title":723,"component":60,"description":726,"canonicalUrl":28,"OG_description":726},"d963aa77-a9bc-4ccb-b3e8-117c45baed23","CVE-2020-10270",{"id":64,"alt":64,"name":28,"focus":64,"title":64,"source":64,"filename":28,"copyright":64,"fieldtype":58,"meta_data":725},{},"This Product Security Advisory is based on a thorough investigation and all findings that were available at the time of publication. Should new information on the matter become available, it is possible that the initial assessment changes and the Advisory will be updated","cve-2020-10270","security-advisories\u002Fcve-2020-10270",-310,[],"088b7eb4-e8f5-4115-997a-504449347f13",[],[734,735,736,737,738,739,740,741,742,743,744],{"path":728,"name":64,"lang":74,"published":64},{"path":728,"name":64,"lang":76,"published":64},{"path":728,"name":64,"lang":78,"published":64},{"path":728,"name":64,"lang":80,"published":64},{"path":728,"name":64,"lang":82,"published":64},{"path":728,"name":64,"lang":84,"published":64},{"path":728,"name":64,"lang":86,"published":64},{"path":728,"name":64,"lang":88,"published":64},{"path":728,"name":64,"lang":90,"published":64},{"path":728,"name":64,"lang":92,"published":64},{"path":728,"name":64,"lang":94,"published":64},{"name":746,"created_at":747,"published_at":748,"updated_at":749,"id":750,"uuid":751,"content":752,"slug":760,"full_slug":761,"sort_by_date":64,"position":762,"tag_list":763,"is_startpage":54,"parent_id":67,"meta_data":64,"group_id":764,"first_published_at":748,"release_id":64,"lang":70,"path":64,"alternates":765,"default_full_slug":761,"translated_slugs":766},"CVE-2020-10271, CVE-2020-10272: Interfaces Accessible without Authentication","2025-09-04T15:25:52.944Z","2025-09-29T08:26:50.610Z","2025-09-29T08:26:50.634Z",87285567297890,"bd6cd51a-53c3-4f5b-89ff-824d63a4d711",{"Keywords":28,"headline":753,"meta_fields":754,"lastModified":453,"firstPublished":659},"PSA-004: Interfaces Accessible without Authentication",[755],{"_uid":756,"title":757,"noIndex":54,"OG_image":758,"OG_title":757,"component":60,"description":658,"canonicalUrl":28,"OG_description":658},"3ffe6c41-44f1-477b-b146-03157b52d736","CVE-2020-10271, CVE-2020-10272",{"id":64,"alt":64,"name":28,"focus":64,"title":64,"source":64,"filename":28,"copyright":64,"fieldtype":58,"meta_data":759},{},"cve-2020-10271-cve-2020-10272","security-advisories\u002Fcve-2020-10271-cve-2020-10272",-290,[],"6f3f6966-5508-4226-835e-0ec4b9fbf0ee",[],[767,768,769,770,771,772,773,774,775,776,777],{"path":761,"name":64,"lang":74,"published":64},{"path":761,"name":64,"lang":76,"published":64},{"path":761,"name":64,"lang":78,"published":64},{"path":761,"name":64,"lang":80,"published":64},{"path":761,"name":64,"lang":82,"published":64},{"path":761,"name":64,"lang":84,"published":64},{"path":761,"name":64,"lang":86,"published":64},{"path":761,"name":64,"lang":88,"published":64},{"path":761,"name":64,"lang":90,"published":64},{"path":761,"name":64,"lang":92,"published":64},{"path":761,"name":64,"lang":94,"published":64},{"name":779,"created_at":780,"published_at":781,"updated_at":782,"id":783,"uuid":784,"content":785,"slug":794,"full_slug":795,"sort_by_date":64,"position":796,"tag_list":797,"is_startpage":54,"parent_id":67,"meta_data":64,"group_id":798,"first_published_at":781,"release_id":64,"lang":70,"path":64,"alternates":799,"default_full_slug":795,"translated_slugs":800},"CVE-2020-10273: No Encryption on Artifacts","2025-09-04T15:20:32.154Z","2025-09-29T08:26:50.763Z","2025-09-29T08:26:50.791Z",87284253352545,"b14fc38b-2515-4f59-8ab0-c8ca3faf32ab",{"Keywords":28,"headline":786,"meta_fields":787,"lastModified":453,"firstPublished":659},"PSA-005: No Encryption on Artifacts",[788],{"_uid":789,"title":790,"noIndex":54,"OG_image":791,"OG_title":790,"component":60,"description":793,"canonicalUrl":28,"OG_description":793},"1b868317-3375-42db-9de6-525d6e5136b5","CVE-2020-10273",{"id":64,"alt":64,"name":28,"focus":64,"title":64,"source":64,"filename":28,"copyright":64,"fieldtype":58,"meta_data":792},{},"This Product Security Advisory is based on a thorough investigation and all findings that were available at the time of publication. Should new information on the matter become available, it is possible that the initial assessment changes and the Advisory will be updated.","cve-2020-10273","security-advisories\u002Fcve-2020-10273",-270,[],"68b5c944-a4b8-4099-9167-f0504c549502",[],[801,802,803,804,805,806,807,808,809,810,811],{"path":795,"name":64,"lang":74,"published":64},{"path":795,"name":64,"lang":76,"published":64},{"path":795,"name":64,"lang":78,"published":64},{"path":795,"name":64,"lang":80,"published":64},{"path":795,"name":64,"lang":82,"published":64},{"path":795,"name":64,"lang":84,"published":64},{"path":795,"name":64,"lang":86,"published":64},{"path":795,"name":64,"lang":88,"published":64},{"path":795,"name":64,"lang":90,"published":64},{"path":795,"name":64,"lang":92,"published":64},{"path":795,"name":64,"lang":94,"published":64},{"name":813,"created_at":814,"published_at":815,"updated_at":816,"id":817,"uuid":818,"content":819,"slug":828,"full_slug":829,"sort_by_date":64,"position":830,"tag_list":831,"is_startpage":54,"parent_id":67,"meta_data":64,"group_id":832,"first_published_at":815,"release_id":64,"lang":70,"path":64,"alternates":833,"default_full_slug":829,"translated_slugs":834},"CVE-2020-10274, CVE-2020-10275: API Vulnerable via default Web Credentials","2025-09-04T15:10:52.631Z","2025-09-29T08:26:51.028Z","2025-09-29T08:26:51.058Z",87281879618643,"70648d51-4aa9-4458-a569-34d61dd4385e",{"Keywords":28,"headline":820,"meta_fields":821,"lastModified":453,"firstPublished":659},"PSA-006: API Vulnerable via default Web Credentials",[822],{"_uid":823,"title":824,"noIndex":54,"OG_image":825,"OG_title":824,"component":60,"description":827,"canonicalUrl":28,"OG_description":827},"5d7ae8c9-9dfe-4395-93bd-5ada01c0bb48","CVE-2020-10274, CVE-2020-10275",{"id":64,"alt":64,"name":28,"focus":64,"title":64,"source":64,"filename":28,"copyright":64,"fieldtype":58,"meta_data":826},{},"MiR robots offer a REST-like API to interact with the robot in an automated way, for scenarios where\nmanual use of the web interface is not desired. This API requires authentication using a key derived\nfrom user credentials for the web interface.","cve-2020-10274-cve-2020-10275","security-advisories\u002Fcve-2020-10274-cve-2020-10275",-250,[],"0e119a1a-b240-43e6-a018-68af6e0fdab0",[],[835,836,837,838,839,840,841,842,843,844,845],{"path":829,"name":64,"lang":74,"published":64},{"path":829,"name":64,"lang":76,"published":64},{"path":829,"name":64,"lang":78,"published":64},{"path":829,"name":64,"lang":80,"published":64},{"path":829,"name":64,"lang":82,"published":64},{"path":829,"name":64,"lang":84,"published":64},{"path":829,"name":64,"lang":86,"published":64},{"path":829,"name":64,"lang":88,"published":64},{"path":829,"name":64,"lang":90,"published":64},{"path":829,"name":64,"lang":92,"published":64},{"path":829,"name":64,"lang":94,"published":64},{"name":847,"created_at":848,"published_at":849,"updated_at":850,"id":851,"uuid":852,"content":853,"slug":861,"full_slug":862,"sort_by_date":64,"position":863,"tag_list":864,"is_startpage":54,"parent_id":67,"meta_data":64,"group_id":865,"first_published_at":849,"release_id":64,"lang":70,"path":64,"alternates":866,"default_full_slug":862,"translated_slugs":867},"CVE-2020-10276: Default Passwords for safety PLC","2025-09-04T15:06:07.725Z","2025-09-29T08:26:51.269Z","2025-09-29T08:26:51.292Z",87280712652319,"1ab79a74-b6b8-418c-b215-a7ecfd064e25",{"Keywords":28,"headline":854,"meta_fields":855,"lastModified":453,"firstPublished":659},"PSA-007: Default Passwords for safety PLC",[856],{"_uid":857,"title":858,"noIndex":54,"OG_image":859,"OG_title":858,"component":60,"description":793,"canonicalUrl":28,"OG_description":793},"22171815-092c-4fe7-9b28-3b86d3773bbb","CVE-2020-10276",{"id":64,"alt":64,"name":28,"focus":64,"title":64,"source":64,"filename":28,"copyright":64,"fieldtype":58,"meta_data":860},{},"cve-2020-10276","security-advisories\u002Fcve-2020-10276",-230,[],"daf7ef0a-7acd-4848-8481-9d8dd9b01cf2",[],[868,869,870,871,872,873,874,875,876,877,878],{"path":862,"name":64,"lang":74,"published":64},{"path":862,"name":64,"lang":76,"published":64},{"path":862,"name":64,"lang":78,"published":64},{"path":862,"name":64,"lang":80,"published":64},{"path":862,"name":64,"lang":82,"published":64},{"path":862,"name":64,"lang":84,"published":64},{"path":862,"name":64,"lang":86,"published":64},{"path":862,"name":64,"lang":88,"published":64},{"path":862,"name":64,"lang":90,"published":64},{"path":862,"name":64,"lang":92,"published":64},{"path":862,"name":64,"lang":94,"published":64},{"name":880,"created_at":881,"published_at":882,"updated_at":883,"id":884,"uuid":885,"content":886,"slug":894,"full_slug":895,"sort_by_date":64,"position":896,"tag_list":897,"is_startpage":54,"parent_id":67,"meta_data":64,"group_id":898,"first_published_at":882,"release_id":64,"lang":70,"path":64,"alternates":899,"default_full_slug":895,"translated_slugs":900},"CVE-2020-10277: Boot from a connected USB drive.","2025-09-04T15:00:44.786Z","2025-09-29T08:26:51.533Z","2025-09-29T08:26:51.560Z",87279389887398,"6816b8b9-c123-4088-9e5e-976b8ff48b07",{"Keywords":28,"headline":887,"meta_fields":888,"lastModified":453,"firstPublished":659},"PSA-008: Boot from a connected USB drive.",[889],{"_uid":890,"title":891,"noIndex":54,"OG_image":892,"OG_title":891,"component":60,"description":658,"canonicalUrl":28,"OG_description":658},"4e486641-499f-413c-8247-2074f2bccd17","CVE-2020-10277",{"id":64,"alt":64,"name":28,"focus":64,"title":64,"source":64,"filename":28,"copyright":64,"fieldtype":58,"meta_data":893},{},"cve-2020-10277","security-advisories\u002Fcve-2020-10277",-210,[],"a8a870ed-cb42-4b04-898e-5ebb3e7f83cb",[],[901,902,903,904,905,906,907,908,909,910,911],{"path":895,"name":64,"lang":74,"published":64},{"path":895,"name":64,"lang":76,"published":64},{"path":895,"name":64,"lang":78,"published":64},{"path":895,"name":64,"lang":80,"published":64},{"path":895,"name":64,"lang":82,"published":64},{"path":895,"name":64,"lang":84,"published":64},{"path":895,"name":64,"lang":86,"published":64},{"path":895,"name":64,"lang":88,"published":64},{"path":895,"name":64,"lang":90,"published":64},{"path":895,"name":64,"lang":92,"published":64},{"path":895,"name":64,"lang":94,"published":64},{"name":913,"created_at":914,"published_at":915,"updated_at":916,"id":917,"uuid":918,"content":919,"slug":927,"full_slug":928,"sort_by_date":64,"position":929,"tag_list":930,"is_startpage":54,"parent_id":67,"meta_data":64,"group_id":931,"first_published_at":915,"release_id":64,"lang":70,"path":64,"alternates":932,"default_full_slug":928,"translated_slugs":933},"CVE-2020-10278: No Password Configured for the BIOS","2025-09-04T14:52:31.451Z","2025-09-29T08:26:51.773Z","2025-09-29T08:26:51.798Z",87277369192918,"4799ccc7-297d-465c-a35e-33eba8ad705e",{"Keywords":28,"headline":920,"meta_fields":921,"lastModified":453,"firstPublished":659},"PSA-009: No Password Configured for the BIOS",[922],{"_uid":923,"title":924,"noIndex":54,"OG_image":925,"OG_title":924,"component":60,"description":658,"canonicalUrl":28,"OG_description":658},"3db78651-b53e-4d38-accb-c0fe801b2d78","CVE-2020-10278",{"id":64,"alt":64,"name":28,"focus":64,"title":64,"source":64,"filename":28,"copyright":64,"fieldtype":58,"meta_data":926},{},"cve-2020-10278","security-advisories\u002Fcve-2020-10278",-190,[],"9b7e110e-33ea-48d1-8833-c22feebdc247",[],[934,935,936,937,938,939,940,941,942,943,944],{"path":928,"name":64,"lang":74,"published":64},{"path":928,"name":64,"lang":76,"published":64},{"path":928,"name":64,"lang":78,"published":64},{"path":928,"name":64,"lang":80,"published":64},{"path":928,"name":64,"lang":82,"published":64},{"path":928,"name":64,"lang":84,"published":64},{"path":928,"name":64,"lang":86,"published":64},{"path":928,"name":64,"lang":88,"published":64},{"path":928,"name":64,"lang":90,"published":64},{"path":928,"name":64,"lang":92,"published":64},{"path":928,"name":64,"lang":94,"published":64},{"name":946,"created_at":947,"published_at":948,"updated_at":949,"id":950,"uuid":951,"content":952,"slug":960,"full_slug":961,"sort_by_date":64,"position":962,"tag_list":963,"is_startpage":54,"parent_id":67,"meta_data":64,"group_id":964,"first_published_at":948,"release_id":64,"lang":70,"path":64,"alternates":965,"default_full_slug":961,"translated_slugs":966},"CVE-2020-10279: Insecure Defaults for Robots","2025-09-04T14:40:35.095Z","2025-09-29T08:26:52.022Z","2025-09-29T08:26:52.046Z",87274434997495,"0bc3351e-398a-4a02-9346-d37a84e47b37",{"Keywords":28,"headline":953,"meta_fields":954,"lastModified":453,"firstPublished":659},"PSA-010: Insecure Defaults for Robots",[955],{"_uid":956,"title":957,"noIndex":54,"OG_image":958,"OG_title":957,"component":60,"description":793,"canonicalUrl":28,"OG_description":793},"fdaf6bb0-ef8e-44d3-928a-6ab1ffacd4ed","CVE-2020-10279",{"id":64,"alt":64,"name":28,"focus":64,"title":64,"source":64,"filename":28,"copyright":64,"fieldtype":58,"meta_data":959},{},"cve-2020-10279","security-advisories\u002Fcve-2020-10279",-170,[],"877ccead-df31-49e3-a803-5bb1abad6086",[],[967,968,969,970,971,972,973,974,975,976,977],{"path":961,"name":64,"lang":74,"published":64},{"path":961,"name":64,"lang":76,"published":64},{"path":961,"name":64,"lang":78,"published":64},{"path":961,"name":64,"lang":80,"published":64},{"path":961,"name":64,"lang":82,"published":64},{"path":961,"name":64,"lang":84,"published":64},{"path":961,"name":64,"lang":86,"published":64},{"path":961,"name":64,"lang":88,"published":64},{"path":961,"name":64,"lang":90,"published":64},{"path":961,"name":64,"lang":92,"published":64},{"path":961,"name":64,"lang":94,"published":64},{"name":979,"created_at":980,"published_at":981,"updated_at":982,"id":983,"uuid":984,"content":985,"slug":993,"full_slug":994,"sort_by_date":64,"position":995,"tag_list":996,"is_startpage":54,"parent_id":67,"meta_data":64,"group_id":997,"first_published_at":981,"release_id":64,"lang":70,"path":64,"alternates":998,"default_full_slug":994,"translated_slugs":999},"CVE-2020-10280: DOS on Web Interface","2025-09-02T12:25:11.512Z","2025-09-29T08:26:53.592Z","2025-09-29T08:26:53.622Z",86533372000410,"d962353a-639e-4e3d-8ff8-70ee48213d4b",{"Keywords":28,"headline":986,"meta_fields":987,"lastModified":453,"firstPublished":659},"PSA-011: DOS on Web Interface",[988],{"_uid":989,"title":990,"noIndex":54,"OG_image":991,"OG_title":990,"component":60,"description":793,"canonicalUrl":28,"OG_description":793},"de0c5902-fa21-4a6a-bfc5-3f2a1b940a7a","CVE-2020-10280",{"id":64,"alt":64,"name":28,"focus":64,"title":64,"source":64,"filename":28,"copyright":64,"fieldtype":58,"meta_data":992},{},"cve-2020-10280","security-advisories\u002Fcve-2020-10280",-20,[],"ec6e901b-7bf3-49af-820f-1e0025cc907a",[],[1000,1001,1002,1003,1004,1005,1006,1007,1008,1009,1010],{"path":994,"name":64,"lang":74,"published":64},{"path":994,"name":64,"lang":76,"published":64},{"path":994,"name":64,"lang":78,"published":64},{"path":994,"name":64,"lang":80,"published":64},{"path":994,"name":64,"lang":82,"published":64},{"path":994,"name":64,"lang":84,"published":64},{"path":994,"name":64,"lang":86,"published":64},{"path":994,"name":64,"lang":88,"published":64},{"path":994,"name":64,"lang":90,"published":64},{"path":994,"name":64,"lang":92,"published":64},{"path":994,"name":64,"lang":94,"published":64}]