📦 Hyper Historian
by Iconics
🔍 What is Hyper Historian?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
This vulnerability allows remote unauthenticated attackers to bypass authentication in multiple Mitsubishi Electric and ICONICS industrial software products by sending specially crafted WebSocket pack...