296,747
Total vulnerabilities in the database
The vulnerability allows a remote unauthenticated attacker to download a backup file, if one exists. That backup file might contain sensitive information like credentials and cryptographic material. A valid user has to create a backup after the last reboot for this attack to be successfull.
| Software | From | Fixed in |
|---|---|---|
| wago / pfc100_firmware | 16 | 22.x |
| wago / pfc200_firmware | 16 | 22.x |
| wago / touch_panel_600_advanced_firmware | 16 | 22.x |
| wago / touch_panel_600_standard_firmware | 16 | 22.x |
| wago / touch_panel_600_marine_firmware | 16 | 22.x |
| wago / cc100_firmware | 16 | 22.x |
| wago / edge_controller_firmware | 16 | 22.x |