TwinOaks Computing CoreDX DDS versions prior to 5.9.1 are...
High severity
Unreviewed
Published
May 6, 2022
to the GitHub Advisory Database
•
Updated Feb 1, 2023
Description
Published by the National Vulnerability Database
May 5, 2022
Published to the GitHub Advisory Database
May 6, 2022
Last updated
Feb 1, 2023
TwinOaks Computing CoreDX DDS versions prior to 5.9.1 are susceptible to exploitation when an attacker sends a specially crafted packet to flood target devices with unwanted traffic. This may result in a denial-of-service condition and information exposure.
References