📦 Nexo Os
by Bosch
🔍 What is Nexo Os?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
This CVE describes a stack-based buffer overflow vulnerability in Bosch products that allows unauthenticated remote attackers to cause denial-of-service or potentially execute arbitrary code via speci...
This vulnerability in Bosch products allows unauthenticated remote attackers to cause denial-of-service or potentially execute arbitrary code via specially crafted network requests. Affected systems i...
This vulnerability in Bosch products allows unauthenticated remote attackers to cause denial-of-service or potentially execute arbitrary code by sending specially crafted network requests. It affects ...
This vulnerability in Bosch security systems allows attackers to access sensitive data or achieve remote code execution with root privileges. It affects authenticated users directly via HTTP requests ...
This vulnerability allows remote attackers to authenticate to SSH services with root privileges using a hidden hard-coded account. It affects Bosch Rexroth ctrlX CORE devices running vulnerable firmwa...
This SQL injection vulnerability in Bosch security systems allows authenticated attackers to manipulate the authentication database through crafted HTTP requests. Attackers can read password hashes to...
This vulnerability allows remote attackers to authenticate to affected Bosch web applications using hidden hard-coded accounts with high privileges. Any organization using vulnerable Bosch products wi...
This critical vulnerability allows remote attackers to upload arbitrary files anywhere on affected Bosch systems via crafted HTTP requests, leading to remote code execution with root privileges. It af...