Lucene search

K

Solstice Firmware Security Vulnerabilities

cve
cve

CVE-2017-12945

Insufficient validation of user-supplied input for the Solstice Pod before 2.8.4 networking configuration enables authenticated attackers to execute arbitrary commands as root.

8.8CVSS

8.9AI Score

0.055EPSS

2019-11-27 04:15 PM
49
cve
cve

CVE-2020-35587

In Solstice Pod before 3.0.3, the firmware can easily be decompiled/disassembled. The decompiled/disassembled files contain non-obfuscated code. NOTE: it is unclear whether lack of obfuscation is directly associated with a negative impact, or instead only facilitates an attack technique

7.5CVSS

7.5AI Score

0.001EPSS

2020-12-23 04:15 PM
48