[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"tw-security-advisories":3,"tw-header":95,"footer-default-tw":299,"all-advisories-lang-tw":441},{"name":4,"created_at":5,"published_at":6,"updated_at":7,"id":8,"uuid":9,"content":10,"slug":62,"full_slug":63,"sort_by_date":64,"position":65,"tag_list":66,"is_startpage":45,"parent_id":67,"meta_data":64,"group_id":68,"first_published_at":69,"release_id":64,"lang":70,"path":64,"alternates":71,"default_full_slug":72,"translated_slugs":73},"Security Advisories","2025-09-02T10:11:04.587Z","2025-12-01T09:54:30.432Z","2025-12-01T09:54:30.454Z",86500411800058,"6ce80674-3902-4e02-91ce-dcca086968bb",{"_uid":11,"body":12,"Keywords":28,"headline":4,"component":50,"meta_fields":51,"select_sub_menu":28},"480806f4-2352-4539-b86f-db31a9e2b75c",[13,47],{"_uid":14,"body":15,"label":28,"links":43,"bgColor":28,"headline":28,"markdown":28,"component":44,"leftAligned":45,"contentRight":46},"88b9f434-ecbc-4544-9c03-8cd1e4be9780",{"type":16,"content":17},"doc",[18,29,36],{"type":19,"content":20},"paragraph",[21],{"text":22,"type":23,"marks":24},"Keeping your AMRs secure is a continuous process which extends throughout the lifecycle of the robots. As your supplier, MiR responsibly informs you about known security concerns and recommended mitigative actions. ","text",[25],{"type":26,"attrs":27},"textStyle",{"color":28},"",{"type":19,"content":30},[31],{"text":32,"type":23,"marks":33},"On this page we publish advisories regarding known issues relating to Product Security. Please read them carefully to fully understand the possible risks and recommended mitigative actions. ",[34],{"type":26,"attrs":35},{"color":28},{"type":19,"content":37},[38],{"text":39,"type":23,"marks":40},"Mobile Industrial Robots A\u002FS expressly disclaims liability for any and all damages or injuries caused as a result of customer’s failure to operate the robot in strict compliance with the User Manuals, follow and implement the recommendations in the Security Advisories below.",[41],{"type":26,"attrs":42},{"color":28},[],"rich-text",true,[],{"_uid":48,"component":49},"cf215f59-440d-40d8-8f9b-5a730b2bb1fb","advisories-grid","page",[52],{"_uid":53,"title":4,"noIndex":54,"OG_image":55,"OG_title":4,"component":60,"description":61,"OG_description":61},"be99bb06-7088-4e84-b650-7e87107c5127",false,{"id":56,"alt":28,"name":28,"focus":28,"title":28,"source":28,"filename":57,"copyright":28,"fieldtype":58,"meta_data":59,"is_external_url":54},11224374,"https:\u002F\u002Fa.storyblok.com\u002Ff\u002F230581\u002F4096x2872\u002Fef55515ef3\u002Fmir600_mir1350_3.png","asset",{},"meta-fields","Keeping your AMRs secure is a continuous process which extends throughout the lifecycle of the robots. As your supplier, MiR responsibly informs you about known security concerns and recommended mitigative actions. ","security-advisories","tw\u002Fsecurity-advisories\u002F",null,-380,[],86500070820312,"aff7aaf0-9afb-4937-8a16-e4a0ffdcc5a1","2025-09-29T08:30:57.670Z","tw",[],"security-advisories\u002F",[74,76,78,80,82,84,86,88,90,91,93],{"path":72,"name":64,"lang":75,"published":45},"da",{"path":72,"name":64,"lang":77,"published":45},"de",{"path":72,"name":64,"lang":79,"published":45},"it",{"path":72,"name":64,"lang":81,"published":45},"fr",{"path":72,"name":64,"lang":83,"published":45},"es",{"path":72,"name":64,"lang":85,"published":45},"ko",{"path":72,"name":64,"lang":87,"published":45},"ja",{"path":72,"name":64,"lang":89,"published":45},"zh",{"path":72,"name":64,"lang":70,"published":45},{"path":72,"name":64,"lang":92,"published":45},"pl",{"path":72,"name":64,"lang":94,"published":45},"cs",{"name":96,"created_at":97,"published_at":98,"updated_at":99,"id":100,"uuid":101,"content":102,"slug":104,"full_slug":279,"sort_by_date":64,"position":280,"tag_list":281,"is_startpage":54,"parent_id":282,"meta_data":64,"group_id":283,"first_published_at":284,"release_id":64,"lang":70,"path":64,"alternates":285,"default_full_slug":286,"translated_slugs":287},"Header","2023-05-25T10:50:16.809Z","2026-04-22T08:53:28.515Z","2026-04-22T19:20:43.391Z",313480493,"bafd24a7-f2d3-44e9-854d-5a5e76a957b4",{"_uid":103,"component":104,"header_menu":105,"portalTitle":164,"dropdown_title":165,"header_cta_url":166,"header_cta_text":174,"header_dropdown":175,"header_utility_nav":229,"header_portal_switcher":242},"22e2fba0-faed-44f4-a77a-74073ce6c25a","header",[106,120,131,142,153],{"_uid":107,"link":108,"title":114,"component":119},"51622f66-37f1-4b03-9efc-770451007e96",{"id":109,"url":28,"linktype":110,"fieldtype":111,"cached_url":112,"prep":45,"story":113},"cc2f264a-e54d-4097-a11d-3e9b0af126e1","story","multilink","\u002Ftw\u002Fproducts\u002F",{"name":114,"id":115,"uuid":109,"slug":116,"url":117,"full_slug":118,"_stopResolving":45},"Products",325521696,"products","products\u002F","tw\u002Fproducts\u002F","menu-link",{"_uid":121,"link":122,"title":126,"component":119},"999386f5-ddb5-4a4c-9695-f16c5a263284",{"id":123,"url":28,"linktype":110,"fieldtype":111,"cached_url":124,"prep":45,"story":125},"fdcb7cad-fe5b-424e-a5b6-95e61a6e7e2c","\u002Ftw\u002Fyour-amr-journey\u002F",{"name":126,"id":127,"uuid":123,"slug":128,"url":129,"full_slug":130,"_stopResolving":45},"Your AMR Journey",356660014,"your-amr-journey","your-amr-journey\u002F","tw\u002Fyour-amr-journey\u002F",{"_uid":132,"link":133,"title":137,"component":119},"80432b01-ee11-4e0f-9fe9-b8aed52e318c",{"id":134,"url":28,"linktype":110,"fieldtype":111,"cached_url":135,"prep":45,"story":136},"8cbd5d80-2357-40d6-9270-4d58c47b9c2d","\u002Ftw\u002Fcases\u002F",{"name":137,"id":138,"uuid":134,"slug":139,"url":140,"full_slug":141,"_stopResolving":45},"Cases",326018479,"cases","cases\u002F","tw\u002Fcases\u002F",{"_uid":143,"link":144,"title":148,"component":119},"ac56471a-9262-4d22-a5f3-80699f28ee78",{"id":145,"url":28,"linktype":110,"fieldtype":111,"cached_url":146,"prep":45,"story":147},"17b3687b-5324-48ff-abfc-1b05af4c7aa5","\u002Ftw\u002Findustries\u002F",{"name":148,"id":149,"uuid":145,"slug":150,"url":151,"full_slug":152,"_stopResolving":45},"Industries",335936187,"industries","industries\u002F","tw\u002Findustries\u002F",{"_uid":154,"link":155,"title":159,"component":119},"ca78bf38-0026-4db8-8bf1-ff4727e36a85",{"id":156,"url":28,"linktype":110,"fieldtype":111,"cached_url":157,"prep":45,"story":158},"fac8ac6e-663a-4545-860c-b6762ea0d40b","\u002Ftw\u002Fabout\u002F",{"name":159,"id":160,"uuid":156,"slug":161,"url":162,"full_slug":163,"_stopResolving":45},"About",313472547,"about","about\u002F","tw\u002Fabout\u002F","Portals","Services & Support",{"id":167,"url":28,"linktype":110,"fieldtype":111,"cached_url":168,"prep":45,"story":169},"bbdad4c0-6b32-4d4b-92bc-ad7a54c3e40d","\u002Ftw\u002Fcustomer-portal",{"name":170,"id":171,"uuid":167,"slug":172,"url":172,"full_slug":173,"_stopResolving":45},"Customer Portal",603971559,"customer-portal","tw\u002Fcustomer-portal","Contact Sales",[176,186,196,207,217],{"_uid":177,"link":178,"title":182,"component":119},"bffc1954-55b8-4952-be47-cc3cd04e26c0",{"id":179,"url":28,"linktype":110,"fieldtype":111,"cached_url":180,"prep":45,"story":181},"50c9e4be-1d49-4ca0-aec0-c0f84d229407","\u002Ftw\u002Fmir-academy",{"name":182,"id":183,"uuid":179,"slug":184,"url":184,"full_slug":185,"_stopResolving":45},"MiR Academy",430299874,"mir-academy","tw\u002Fmir-academy",{"_uid":187,"link":188,"title":192,"component":119},"2a1188ce-e1b3-4634-aeff-a5337edcfcc4",{"id":189,"url":28,"linktype":110,"fieldtype":111,"cached_url":190,"prep":45,"story":191},"08dd7140-9581-47d7-9df1-7eb40e932e6e","\u002Ftw\u002Fcommunity",{"name":192,"id":193,"uuid":189,"slug":194,"url":194,"full_slug":195,"_stopResolving":45},"MiR Community",320145416,"community","tw\u002Fcommunity",{"_uid":197,"link":198,"title":202,"component":119},"6fde37b5-a220-440b-ad34-b0fb215c90a0",{"id":199,"url":28,"linktype":110,"fieldtype":111,"cached_url":200,"prep":45,"story":201},"c9d027cd-40a7-4345-9edd-6eceb0d65825","\u002Ftw\u002Fservice-support\u002Ffinance",{"name":202,"id":203,"uuid":199,"slug":204,"url":205,"full_slug":206,"_stopResolving":45},"MiR Finance",404955355,"finance","service-support\u002Ffinance","tw\u002Fservice-support\u002Ffinance",{"_uid":208,"link":209,"title":213,"component":119},"52185e6b-2937-424c-8493-ae513c5ee658",{"id":210,"url":28,"linktype":110,"fieldtype":111,"cached_url":211,"prep":45,"story":212},"5b534ff7-6a86-475e-a184-e742a32b433b","\u002Ftw\u002Fsupport-portal",{"name":213,"id":214,"uuid":210,"slug":215,"url":215,"full_slug":216,"_stopResolving":45},"MiR Support Portal",320145411,"support-portal","tw\u002Fsupport-portal",{"_uid":218,"link":219,"title":228,"component":119},"d1205786-5e27-466a-918a-b276af399001",{"id":220,"url":28,"linktype":110,"fieldtype":111,"cached_url":221,"prep":45,"story":222},"951f0837-0bd2-482e-9a17-d8b766fc7571","\u002Ftw\u002Fservice-support\u002Fmir-service-activation",{"name":223,"id":224,"uuid":220,"slug":225,"url":226,"full_slug":227,"_stopResolving":45},"MiR service activation",552990532,"mir-service-activation","service-support\u002Fmir-service-activation","tw\u002Fservice-support\u002Fmir-service-activation","MiR Service Options",[230],{"_uid":231,"link":232,"title":241,"component":119},"88f64423-7e89-4f3e-bf3b-33eb81593061",{"id":233,"url":28,"linktype":110,"fieldtype":111,"cached_url":234,"prep":45,"story":235},"801bddfe-f04a-4089-9418-909bc2f67312","\u002Ftw\u002Fcontacts\u002F",{"name":236,"id":237,"uuid":233,"slug":238,"url":239,"full_slug":240,"_stopResolving":45},"Contact",389644485,"contacts","contacts\u002F","tw\u002Fcontacts\u002F","Contact MiR",[243,253,262,270],{"_uid":244,"icon":245,"link":250,"name":251,"component":252},"e4bb7f1b-bff1-4b8e-b589-071a77ccd2fe",{"id":246,"alt":247,"name":28,"focus":28,"title":28,"source":28,"filename":248,"copyright":28,"fieldtype":58,"meta_data":249,"is_external_url":54},15422895,"MiR Main Website","https:\u002F\u002Fa.storyblok.com\u002Ff\u002F230581\u002F39x40\u002Ff8b20084af\u002Fportal-switcher-main.svg",{"alt":247,"title":28,"source":28,"copyright":28},"https:\u002F\u002Fmobile-industrial-robots.com\u002Ftw","Website","portal",{"_uid":254,"icon":255,"link":260,"name":261,"component":252},"9b78af37-4774-424d-b87e-4d3850b778a5",{"id":256,"alt":257,"name":28,"focus":28,"title":28,"source":28,"filename":258,"copyright":28,"fieldtype":58,"meta_data":259,"is_external_url":54},14298318,"how to guide","https:\u002F\u002Fa.storyblok.com\u002Ff\u002F230581\u002F30x30\u002F9687ef73ab\u002Ficon_featured-howto.svg",{},"https:\u002F\u002Fsupportportal.mobile-industrial-robots.com\u002F","Support Portal",{"_uid":263,"icon":264,"link":268,"name":269,"component":252},"a1dca106-baed-4db0-8bf2-b982f3c7d8b5",{"id":265,"alt":28,"name":28,"focus":28,"title":28,"source":28,"filename":266,"copyright":28,"fieldtype":58,"meta_data":267,"is_external_url":54},10103478,"https:\u002F\u002Fa.storyblok.com\u002Ff\u002F230581\u002F30x30\u002F3e6d1ac02e\u002Ficon_corevalues_nextlevel.svg",{},"https:\u002F\u002Facademy.mobile-industrial-robots.com\u002F","Academy",{"_uid":271,"icon":272,"link":277,"name":278,"component":252},"268b8de5-88f7-491f-bc7e-c683e4d9b80f",{"id":273,"alt":274,"name":28,"focus":28,"title":28,"source":28,"filename":275,"copyright":28,"fieldtype":58,"meta_data":276,"is_external_url":54},13785060,"World share icon","https:\u002F\u002Fa.storyblok.com\u002Ff\u002F230581\u002F30x30\u002F0e54bc9d4e\u002Ficon_community_worldshare.svg",{},"https:\u002F\u002Fcommunity.mobile-industrial-robots.com\u002Fs\u002F","Community","tw\u002Fnavigation\u002Fheader",10,[],313907702,"8aa22c46-7145-43a7-91ea-8c1bdcf87a77","2023-05-25T10:51:41.897Z",[],"navigation\u002Fheader",[288,289,290,291,292,293,294,295,296,297,298],{"path":286,"name":64,"lang":75,"published":64},{"path":286,"name":64,"lang":77,"published":64},{"path":286,"name":64,"lang":79,"published":64},{"path":286,"name":64,"lang":81,"published":64},{"path":286,"name":64,"lang":83,"published":64},{"path":286,"name":64,"lang":85,"published":64},{"path":286,"name":64,"lang":87,"published":64},{"path":286,"name":64,"lang":89,"published":64},{"path":286,"name":64,"lang":70,"published":64},{"path":286,"name":64,"lang":92,"published":64},{"path":286,"name":64,"lang":94,"published":64},{"footerSections":300,"socialMedia":366,"socialMediaChina":382,"privacyPolicy":386,"cookiePolicy":399,"changeRegion":-1,"languageSwitcher":411},[301,319,343],{"title":302,"links":303},"New to AMRs?",[304,308,312,316,318],{"url":305,"id":306,"title":307,"isHiring":54},"tw\u002Fyour-amr-journey\u002Fgetting-started","4e1f0a89-b28f-466c-9384-3918efc93161","Getting started",{"url":309,"id":310,"title":311,"isHiring":54},"tw\u002Fblog\u002Fagv-vs-amr-whats-the-difference","8da1999f-4111-493b-987e-2eefa6c30260","What is an AMR?",{"url":313,"id":314,"title":315,"isHiring":54},"tw\u002Fyour-amr-journey\u002Fsuccessful-deployment","be3b12bb-af44-42b3-ad92-f6dbb1816834","Successful deployment",{"url":118,"id":109,"title":317,"isHiring":54},"Solutions",{"url":141,"id":134,"title":137,"isHiring":54},{"title":320,"links":321},"Popular links",[322,326,330,334,338,342],{"url":323,"id":324,"title":325,"isHiring":54},"tw\u002Fevents\u002F","c3b02b79-cfab-4c6b-a321-601fb8aaf1ee","Events & Webinars",{"url":327,"id":328,"title":329,"isHiring":54},"tw\u002Fblog\u002F","dcf58b56-6c67-453a-bc46-7e7ca29d6ad3","Blog & News Center",{"url":331,"id":332,"title":333,"isHiring":54},"tw\u002Febooks-and-whitepapers\u002F","d3d9853d-e6b1-430f-ac93-4ca41062816b","eBooks",{"url":335,"id":336,"title":337,"isHiring":54},"tw\u002Fproducts\u002Fservices\u002F","dbefe226-8948-4234-b3d7-11a39f15c293","MiR Service",{"url":339,"id":340,"title":341,"isHiring":54},"tw\u002Fsafety-security-updates\u002Fsafety-and-security-updates","7d9c7a07-ee9a-49c0-bebd-b7154ff9b6fd","Safety and Security updates",{"url":185,"id":179,"title":182,"isHiring":54},{"title":344,"links":345},"About MiR",[346,350,354,358,362],{"url":347,"id":348,"title":349,"isHiring":54},"tw\u002Fabout\u002Fmir-history","db8b5815-cd10-4a1e-8c4c-e44582042ff7","History",{"url":351,"id":352,"title":353,"isHiring":54},"tw\u002Fabout\u002Fcareer\u002F","ebd55cc3-b451-4d9f-8389-68d7e889494d","Careers",{"url":355,"id":356,"title":357,"isHiring":45},"tw\u002Fabout\u002Fcareer\u002Fopen-vacancies","cf30dbd5-2a28-4323-9506-6702d228c4d6","Open vacancies",{"url":359,"id":360,"title":361,"isHiring":54},"tw\u002Fabout\u002Fdata-notice","019744e9-c579-415c-8a15-8e47ce09debd","Data Notice",{"url":363,"id":364,"title":365,"isHiring":54},"tw\u002Fgeneral-terms-of-delivery\u002F","ddb7df97-6dcf-4e28-8c2e-40b20ab1256a","General Terms of Delivery",[367,370,373,376,379],{"title":368,"url":369},"linkedin","https:\u002F\u002Fwww.linkedin.com\u002Fcompany\u002Fmobile-industrial-robots-aps\u002F",{"title":371,"url":372},"facebook","https:\u002F\u002Fwww.facebook.com\u002FMiR.Robots",{"title":374,"url":375},"instagram","https:\u002F\u002Fwww.instagram.com\u002Fmobileindustrialrobots\u002F",{"title":377,"url":378},"twitter","https:\u002F\u002Ftwitter.com\u002FMobileIndRobots",{"title":380,"url":381},"youtube","https:\u002F\u002Fwww.youtube.com\u002Fchannel\u002FUC3MRxsNU6AW_hKdExtnGr1Q",[383],{"title":384,"url":385},"wechat","https:\u002F\u002Fmp.weixin.qq.com\u002Fs\u002FzlJVpVC40VBQJBAkUSh-0w",[387],{"url":388,"_uid":397,"title":392,"linkType":398,"component":398},{"id":389,"url":28,"linktype":110,"fieldtype":111,"cached_url":390,"prep":45,"story":391},"f89e458e-6860-4b96-b02e-c462d21ef0a1","\u002Ftw\u002Fabout\u002Fprivacy-policy\u002F",{"name":392,"id":393,"uuid":389,"slug":394,"url":395,"full_slug":396,"_stopResolving":45},"Privacy Policy",389640641,"privacy-policy","about\u002Fprivacy-policy\u002F","tw\u002Fabout\u002Fprivacy-policy\u002F","67e85086-82cb-485d-80ed-2abef92cc742","link",[400],{"url":401,"_uid":410,"title":405,"linkType":398,"component":398},{"id":402,"url":28,"linktype":110,"fieldtype":111,"cached_url":403,"prep":45,"story":404},"8181ff53-45dd-420c-b8f1-0de734d999ee","\u002Ftw\u002Fcookie-policy",{"name":405,"id":406,"uuid":402,"slug":407,"url":408,"full_slug":409,"_stopResolving":45},"Cookie Policy",356680705,"cookie-policy","about\u002Fcookie-policy","tw\u002Fabout\u002Fcookie-policy","aa639879-5d58-46b5-8c17-dcd35942475b",{"name":412,"created_at":413,"published_at":414,"updated_at":415,"id":416,"uuid":417,"content":418,"slug":412,"full_slug":422,"sort_by_date":64,"position":423,"tag_list":424,"is_startpage":54,"parent_id":282,"meta_data":64,"group_id":425,"first_published_at":426,"release_id":64,"lang":70,"path":64,"alternates":427,"default_full_slug":428,"translated_slugs":429},"language-switcher","2023-08-14T11:52:42.638Z","2024-03-26T11:26:07.197Z","2024-03-26T11:26:07.213Z",354358248,"f1d63013-0b69-4d61-a57f-08ffe45b982d",{"_uid":419,"headline":420,"component":412,"paragraph":421},"8a50d2d4-79a0-410b-9853-1dd743c4ede0","Choose your language","By choosing a different language content may also change on mobile-industrial-robots.com.","tw\u002Fnavigation\u002Flanguage-switcher",-90,[],"d9fdd0a0-3d33-4b90-a4cd-e32ffdbaec82","2023-10-27T08:29:51.543Z",[],"navigation\u002Flanguage-switcher",[430,431,432,433,434,435,436,437,438,439,440],{"path":428,"name":64,"lang":75,"published":64},{"path":428,"name":64,"lang":77,"published":64},{"path":428,"name":64,"lang":79,"published":64},{"path":428,"name":64,"lang":81,"published":64},{"path":428,"name":64,"lang":83,"published":64},{"path":428,"name":64,"lang":85,"published":64},{"path":428,"name":64,"lang":87,"published":64},{"path":428,"name":64,"lang":89,"published":64},{"path":428,"name":64,"lang":70,"published":64},{"path":428,"name":64,"lang":92,"published":64},{"path":428,"name":64,"lang":94,"published":64},[442,478,514,549,584,619,653,689,725,759,794,828,863,898,932,966,1000,1034],{"name":443,"created_at":444,"published_at":445,"updated_at":446,"id":447,"uuid":448,"content":449,"slug":458,"full_slug":459,"sort_by_date":64,"position":460,"tag_list":461,"is_startpage":54,"parent_id":67,"meta_data":64,"group_id":462,"first_published_at":463,"release_id":64,"lang":70,"path":64,"alternates":464,"default_full_slug":465,"translated_slugs":466},"CVE-2025-13819: Open redirect","2025-12-01T08:29:01.589Z","2025-12-01T09:44:27.940Z","2025-12-01T09:44:27.960Z",118325827983691,"05926065-cfbb-49bc-8a22-1beb073adc1f",{"Keywords":28,"headline":443,"meta_fields":450,"lastModified":457,"firstPublished":457},[451],{"_uid":452,"title":453,"noIndex":54,"OG_image":454,"OG_title":453,"component":60,"description":456,"canonicalUrl":28,"OG_description":456},"45ff4bde-a7ed-44e1-992b-21226b8d4f90","Open redirect",{"id":64,"alt":64,"name":28,"focus":64,"title":64,"source":64,"filename":28,"copyright":64,"fieldtype":58,"meta_data":455},{},"MiR robot and fleet software versions prior to version 3.7.0 are affected by an open redirect vulnerability. The web server accepts user-controlled input and uses it to redirect users to external sites without proper validation. This flaw enables crafting URLs that appear legitimate but redirect users to attacker-controlled sites, facilitating phishing and credential theft.","2025-12-01 00:00","cve-2025-13819-open-redirect","tw\u002Fsecurity-advisories\u002Fcve-2025-13819-open-redirect",-110,[],"1edcc0b9-91ba-41d5-920c-27a51d8d34bf","2025-12-01T09:38:38.843Z",[],"security-advisories\u002Fcve-2025-13819-open-redirect",[467,468,469,470,471,472,473,474,475,476,477],{"path":465,"name":64,"lang":75,"published":64},{"path":465,"name":64,"lang":77,"published":64},{"path":465,"name":64,"lang":79,"published":64},{"path":465,"name":64,"lang":81,"published":64},{"path":465,"name":64,"lang":83,"published":64},{"path":465,"name":64,"lang":85,"published":64},{"path":465,"name":64,"lang":87,"published":64},{"path":465,"name":64,"lang":89,"published":64},{"path":465,"name":64,"lang":70,"published":64},{"path":465,"name":64,"lang":92,"published":64},{"path":465,"name":64,"lang":94,"published":64},{"name":479,"created_at":480,"published_at":481,"updated_at":482,"id":483,"uuid":484,"content":485,"slug":495,"full_slug":496,"sort_by_date":64,"position":497,"tag_list":498,"is_startpage":54,"parent_id":67,"meta_data":64,"group_id":499,"first_published_at":481,"release_id":64,"lang":70,"path":64,"alternates":500,"default_full_slug":501,"translated_slugs":502},"CVE-2025-9229: Information Disclosure through verbose error pages","2025-09-02T11:34:58.033Z","2025-09-29T08:26:53.830Z","2025-09-29T08:26:53.855Z",86521028790762,"00ed0dcb-4750-4f4d-a346-441444c21c67",{"Keywords":28,"headline":486,"meta_fields":487,"lastModified":493,"firstPublished":494},"MSA-17: Information Disclosure",[488],{"_uid":489,"title":486,"noIndex":54,"OG_image":490,"OG_title":486,"component":60,"description":492,"canonicalUrl":28,"OG_description":492},"ed60ea18-67aa-4734-b1fb-22e738c89ae1",{"id":64,"alt":64,"name":28,"focus":64,"title":64,"source":64,"filename":28,"copyright":64,"fieldtype":58,"meta_data":491},{},"MiR software versions prior to version 3.0.0 are affected by an information disclosure vulnerability. An unauthenticated attacker is able to view error pages which include unnecessarily detailed error information, such as file paths and other data. Such unnecessarily verbose information could potentially ease future exploitation attempts by attackers.","2025-09-24 00:00","2024-03-26 00:00","information-disclosure","tw\u002Fsecurity-advisories\u002Finformation-disclosure",0,[],"0e33737d-4f4d-41e0-bd92-19810ffdfe7d",[],"security-advisories\u002Finformation-disclosure",[503,504,505,506,507,508,509,510,511,512,513],{"path":501,"name":64,"lang":75,"published":64},{"path":501,"name":64,"lang":77,"published":64},{"path":501,"name":64,"lang":79,"published":64},{"path":501,"name":64,"lang":81,"published":64},{"path":501,"name":64,"lang":83,"published":64},{"path":501,"name":64,"lang":85,"published":64},{"path":501,"name":64,"lang":87,"published":64},{"path":501,"name":64,"lang":89,"published":64},{"path":501,"name":64,"lang":70,"published":64},{"path":501,"name":64,"lang":92,"published":64},{"path":501,"name":64,"lang":94,"published":64},{"name":515,"created_at":516,"published_at":517,"updated_at":518,"id":519,"uuid":520,"content":521,"slug":530,"full_slug":531,"sort_by_date":64,"position":532,"tag_list":533,"is_startpage":54,"parent_id":67,"meta_data":64,"group_id":534,"first_published_at":517,"release_id":64,"lang":70,"path":64,"alternates":535,"default_full_slug":536,"translated_slugs":537},"CVE-2025-8749: Path traversal","2025-09-04T14:22:29.160Z","2025-09-29T08:26:52.528Z","2025-09-29T08:26:52.552Z",87269986996075,"075f373d-29a0-4910-bdc6-b338f6f5d226",{"Keywords":28,"headline":522,"meta_fields":523,"lastModified":493,"firstPublished":529},"MSA-13: Path Traversal Vulnerability",[524],{"_uid":452,"title":525,"noIndex":54,"OG_image":526,"OG_title":525,"component":60,"description":528,"canonicalUrl":28,"OG_description":528},"Path Traversal",{"id":64,"alt":64,"name":28,"focus":64,"title":64,"source":64,"filename":28,"copyright":64,"fieldtype":58,"meta_data":527},{},"MiR robot software versions prior to version 3.0.0 are affected by a path traversal vulnerability. Authenticated users could abuse a vulnerable API endpoint to extract files from the robot file system.","2024-03-19 00:00","path-traversal","tw\u002Fsecurity-advisories\u002Fpath-traversal",-100,[],"a8e212a8-0fe0-40b8-8e42-886e39f92801",[],"security-advisories\u002Fpath-traversal",[538,539,540,541,542,543,544,545,546,547,548],{"path":536,"name":64,"lang":75,"published":64},{"path":536,"name":64,"lang":77,"published":64},{"path":536,"name":64,"lang":79,"published":64},{"path":536,"name":64,"lang":81,"published":64},{"path":536,"name":64,"lang":83,"published":64},{"path":536,"name":64,"lang":85,"published":64},{"path":536,"name":64,"lang":87,"published":64},{"path":536,"name":64,"lang":89,"published":64},{"path":536,"name":64,"lang":70,"published":64},{"path":536,"name":64,"lang":92,"published":64},{"path":536,"name":64,"lang":94,"published":64},{"name":550,"created_at":551,"published_at":552,"updated_at":553,"id":554,"uuid":555,"content":556,"slug":565,"full_slug":566,"sort_by_date":64,"position":567,"tag_list":568,"is_startpage":54,"parent_id":67,"meta_data":64,"group_id":569,"first_published_at":552,"release_id":64,"lang":70,"path":64,"alternates":570,"default_full_slug":571,"translated_slugs":572},"CVE-2025-9225: Cross-site scripting","2025-09-04T14:13:22.814Z","2025-09-29T08:26:52.790Z","2025-09-29T08:26:52.818Z",87267749170629,"305fdaa0-1fd3-4633-ac20-7e5bcff08ecc",{"Keywords":28,"headline":557,"meta_fields":558,"lastModified":493,"firstPublished":529},"MSA-14: Cross-site scripting",[559],{"_uid":560,"title":561,"noIndex":54,"OG_image":562,"OG_title":561,"component":60,"description":564,"canonicalUrl":28,"OG_description":564},"8c0901e7-81b5-48b2-a39c-17b584fa5de5","Cross-site scripting",{"id":64,"alt":64,"name":28,"focus":64,"title":64,"source":64,"filename":28,"copyright":64,"fieldtype":58,"meta_data":563},{},"MiR software versions prior to version 3.0.0 are affected by a stored cross-site scripting (XSS) vulnerability. If triggered by a logged in user, it could allow execution of arbitrary JavaScript code on a victim browser.","cross-site-scripting","tw\u002Fsecurity-advisories\u002Fcross-site-scripting",-80,[],"54a6d3e1-fcb3-4039-a0fd-a76fa41417e3",[],"security-advisories\u002Fcross-site-scripting",[573,574,575,576,577,578,579,580,581,582,583],{"path":571,"name":64,"lang":75,"published":64},{"path":571,"name":64,"lang":77,"published":64},{"path":571,"name":64,"lang":79,"published":64},{"path":571,"name":64,"lang":81,"published":64},{"path":571,"name":64,"lang":83,"published":64},{"path":571,"name":64,"lang":85,"published":64},{"path":571,"name":64,"lang":87,"published":64},{"path":571,"name":64,"lang":89,"published":64},{"path":571,"name":64,"lang":70,"published":64},{"path":571,"name":64,"lang":92,"published":64},{"path":571,"name":64,"lang":94,"published":64},{"name":585,"created_at":586,"published_at":587,"updated_at":588,"id":589,"uuid":590,"content":591,"slug":600,"full_slug":601,"sort_by_date":64,"position":602,"tag_list":603,"is_startpage":54,"parent_id":67,"meta_data":64,"group_id":604,"first_published_at":587,"release_id":64,"lang":70,"path":64,"alternates":605,"default_full_slug":606,"translated_slugs":607},"CVE-2025-9228: Insufficient authorization when creating notes","2025-09-04T14:04:48.632Z","2025-09-29T08:26:53.053Z","2025-09-29T08:26:53.084Z",87265643080581,"e9c368d5-2954-45b7-a2ba-36970a0ee022",{"Keywords":28,"headline":592,"meta_fields":593,"lastModified":493,"firstPublished":529},"MSA-15: Insufficient authorization when creating notes",[594],{"_uid":595,"title":596,"noIndex":54,"OG_image":597,"OG_title":596,"component":60,"description":599,"canonicalUrl":28,"OG_description":599},"2bcd69f1-d60f-47c2-b86f-effae565b9dd","Insufficient authorization when creating notes",{"id":64,"alt":64,"name":28,"focus":64,"title":64,"source":64,"filename":28,"copyright":64,"fieldtype":58,"meta_data":598},{},"MiR software versions prior to version 3.0.0 have insufficient authorization controls when creating text notes, allowing low-privilege users to create notes which are intended only for administrative users.","insufficient-authorization-when-creating-notes","tw\u002Fsecurity-advisories\u002Finsufficient-authorization-when-creating-notes",-60,[],"1fb820e5-32ab-465c-ba6c-5445489bda8c",[],"security-advisories\u002Finsufficient-authorization-when-creating-notes",[608,609,610,611,612,613,614,615,616,617,618],{"path":606,"name":64,"lang":75,"published":64},{"path":606,"name":64,"lang":77,"published":64},{"path":606,"name":64,"lang":79,"published":64},{"path":606,"name":64,"lang":81,"published":64},{"path":606,"name":64,"lang":83,"published":64},{"path":606,"name":64,"lang":85,"published":64},{"path":606,"name":64,"lang":87,"published":64},{"path":606,"name":64,"lang":89,"published":64},{"path":606,"name":64,"lang":70,"published":64},{"path":606,"name":64,"lang":92,"published":64},{"path":606,"name":64,"lang":94,"published":64},{"name":620,"created_at":621,"published_at":622,"updated_at":623,"id":624,"uuid":625,"content":626,"slug":634,"full_slug":635,"sort_by_date":64,"position":636,"tag_list":637,"is_startpage":54,"parent_id":67,"meta_data":64,"group_id":638,"first_published_at":622,"release_id":64,"lang":70,"path":64,"alternates":639,"default_full_slug":640,"translated_slugs":641},"CVE-2025-8748: Command injection","2025-09-04T13:56:38.486Z","2025-09-29T08:26:53.305Z","2025-09-29T08:26:53.333Z",87263635449991,"f54092b8-4cf9-4f69-9ea1-f2da5d8499ef",{"Keywords":28,"headline":627,"meta_fields":628,"lastModified":493,"firstPublished":529},"MSA-16: Command injection",[629],{"_uid":630,"title":627,"noIndex":54,"OG_image":631,"OG_title":627,"component":60,"description":633,"canonicalUrl":28,"OG_description":633},"253d8802-7aca-4090-940c-1b8d575b88eb",{"id":64,"alt":64,"name":28,"focus":64,"title":64,"source":64,"filename":28,"copyright":64,"fieldtype":58,"meta_data":632},{},"MiR software versions prior to version 3.0.0 are affected by a command injection vulnerability. A malicious HTTP request crafted by an authenticated user could allow the execution of arbitrary commands on the underlying operating system.","command-injection","tw\u002Fsecurity-advisories\u002Fcommand-injection",-40,[],"17a5a2eb-5bc0-4cec-8050-2d12ba023824",[],"security-advisories\u002Fcommand-injection",[642,643,644,645,646,647,648,649,650,651,652],{"path":640,"name":64,"lang":75,"published":64},{"path":640,"name":64,"lang":77,"published":64},{"path":640,"name":64,"lang":79,"published":64},{"path":640,"name":64,"lang":81,"published":64},{"path":640,"name":64,"lang":83,"published":64},{"path":640,"name":64,"lang":85,"published":64},{"path":640,"name":64,"lang":87,"published":64},{"path":640,"name":64,"lang":89,"published":64},{"path":640,"name":64,"lang":70,"published":64},{"path":640,"name":64,"lang":92,"published":64},{"path":640,"name":64,"lang":94,"published":64},{"name":654,"created_at":655,"published_at":656,"updated_at":657,"id":658,"uuid":659,"content":660,"slug":670,"full_slug":671,"sort_by_date":64,"position":672,"tag_list":673,"is_startpage":54,"parent_id":67,"meta_data":64,"group_id":674,"first_published_at":656,"release_id":64,"lang":70,"path":64,"alternates":675,"default_full_slug":676,"translated_slugs":677},"CVE-2021-44228: Log4Shell ","2025-09-04T14:27:38.432Z","2025-09-29T08:26:52.277Z","2025-09-29T08:26:52.304Z",87271253787325,"d06f143a-da8a-4315-8c20-6860ddebfbeb",{"Keywords":28,"headline":661,"meta_fields":662,"lastModified":493,"firstPublished":669},"PSA-012: Log4shell",[663],{"_uid":664,"title":665,"noIndex":54,"OG_image":666,"OG_title":665,"component":60,"description":668,"canonicalUrl":28,"OG_description":668},"b1cd31ff-d148-4545-8df5-7e236bb5d6f9","Log4Shell (CVE-2021-44228)",{"id":64,"alt":64,"name":28,"focus":64,"title":64,"source":64,"filename":28,"copyright":64,"fieldtype":58,"meta_data":667},{},"We hereby inform that MiR products are not affected by the Apache Log4j vulnerability known as Log4Shell.","2021-12-21 00:00","log4shell","tw\u002Fsecurity-advisories\u002Flog4shell",-150,[],"4408cf8b-5b8e-4558-9c5f-349dea1b5afe",[],"security-advisories\u002Flog4shell",[678,679,680,681,682,683,684,685,686,687,688],{"path":676,"name":64,"lang":75,"published":64},{"path":676,"name":64,"lang":77,"published":64},{"path":676,"name":64,"lang":79,"published":64},{"path":676,"name":64,"lang":81,"published":64},{"path":676,"name":64,"lang":83,"published":64},{"path":676,"name":64,"lang":85,"published":64},{"path":676,"name":64,"lang":87,"published":64},{"path":676,"name":64,"lang":89,"published":64},{"path":676,"name":64,"lang":70,"published":64},{"path":676,"name":64,"lang":92,"published":64},{"path":676,"name":64,"lang":94,"published":64},{"name":690,"created_at":691,"published_at":692,"updated_at":693,"id":694,"uuid":695,"content":696,"slug":706,"full_slug":707,"sort_by_date":64,"position":708,"tag_list":709,"is_startpage":54,"parent_id":67,"meta_data":64,"group_id":710,"first_published_at":692,"release_id":64,"lang":70,"path":64,"alternates":711,"default_full_slug":712,"translated_slugs":713},"CVE-2017-7184, CVE-2017-18255: Local Attacker can Exploit Kernel Vulnerabilities","2025-09-04T15:42:08.655Z","2025-09-29T08:26:50.158Z","2025-09-29T08:26:50.188Z",87289563822831,"07647f34-e618-4ae7-b22d-40b140d33e88",{"Keywords":28,"headline":697,"meta_fields":698,"lastModified":493,"firstPublished":705},"PSA-001: Local Attacker can exploit kernel vulnerabilities",[699],{"_uid":700,"title":701,"noIndex":54,"OG_image":702,"OG_title":701,"component":60,"description":704,"canonicalUrl":28,"OG_description":704},"d90fae0d-877b-4891-8d4f-a7473735657a","CVE-2017-7184, CVE-2017-18255",{"id":64,"alt":64,"name":28,"focus":64,"title":64,"source":64,"filename":28,"copyright":64,"fieldtype":58,"meta_data":703},{},"This Product Security Advisory is based on a thorough investigation and all findings that were available at the time of publication. Should new information on the matter become available, it is possible that the initial assessment changes and the Advisory will be updated.\n","2021-05-27 00:00","cve-2017-7184-cve-2017-18255","tw\u002Fsecurity-advisories\u002Fcve-2017-7184-cve-2017-18255",-350,[],"dac73eee-3759-4ad9-8cea-a594d455287a",[],"security-advisories\u002Fcve-2017-7184-cve-2017-18255",[714,715,716,717,718,719,720,721,722,723,724],{"path":712,"name":64,"lang":75,"published":64},{"path":712,"name":64,"lang":77,"published":64},{"path":712,"name":64,"lang":79,"published":64},{"path":712,"name":64,"lang":81,"published":64},{"path":712,"name":64,"lang":83,"published":64},{"path":712,"name":64,"lang":85,"published":64},{"path":712,"name":64,"lang":87,"published":64},{"path":712,"name":64,"lang":89,"published":64},{"path":712,"name":64,"lang":70,"published":64},{"path":712,"name":64,"lang":92,"published":64},{"path":712,"name":64,"lang":94,"published":64},{"name":726,"created_at":727,"published_at":728,"updated_at":729,"id":730,"uuid":731,"content":732,"slug":740,"full_slug":741,"sort_by_date":64,"position":742,"tag_list":743,"is_startpage":54,"parent_id":67,"meta_data":64,"group_id":744,"first_published_at":728,"release_id":64,"lang":70,"path":64,"alternates":745,"default_full_slug":746,"translated_slugs":747},"CVE-2020-10269: Default Passwords for Wireless Access Points","2025-09-04T15:36:44.924Z","2025-09-29T08:26:50.531Z","2025-09-29T08:26:50.563Z",87288237800873,"0240d937-d72f-4457-bfeb-dd7694f51cc7",{"Keywords":28,"headline":733,"meta_fields":734,"lastModified":493,"firstPublished":705},"PSA-002: Default Passwords for Wireless Access Points",[735],{"_uid":736,"title":737,"noIndex":54,"OG_image":738,"OG_title":737,"component":60,"description":704,"canonicalUrl":28,"OG_description":704},"8b5a9265-3b74-45a7-ab27-12d3a31f5ef4","CVE-2020-10269",{"id":64,"alt":64,"name":28,"focus":64,"title":64,"source":64,"filename":28,"copyright":64,"fieldtype":58,"meta_data":739},{},"cve-2020-10269","tw\u002Fsecurity-advisories\u002Fcve-2020-10269",-330,[],"d02707b3-5193-457b-b9bd-42c50d595cda",[],"security-advisories\u002Fcve-2020-10269",[748,749,750,751,752,753,754,755,756,757,758],{"path":746,"name":64,"lang":75,"published":64},{"path":746,"name":64,"lang":77,"published":64},{"path":746,"name":64,"lang":79,"published":64},{"path":746,"name":64,"lang":81,"published":64},{"path":746,"name":64,"lang":83,"published":64},{"path":746,"name":64,"lang":85,"published":64},{"path":746,"name":64,"lang":87,"published":64},{"path":746,"name":64,"lang":89,"published":64},{"path":746,"name":64,"lang":70,"published":64},{"path":746,"name":64,"lang":92,"published":64},{"path":746,"name":64,"lang":94,"published":64},{"name":760,"created_at":761,"published_at":762,"updated_at":763,"id":764,"uuid":765,"content":766,"slug":775,"full_slug":776,"sort_by_date":64,"position":777,"tag_list":778,"is_startpage":54,"parent_id":67,"meta_data":64,"group_id":779,"first_published_at":762,"release_id":64,"lang":70,"path":64,"alternates":780,"default_full_slug":781,"translated_slugs":782},"CVE-2020-10270: Predefined Credentials for the web Interface","2025-09-04T15:31:57.471Z","2025-09-29T08:26:50.535Z","2025-09-29T08:26:50.562Z",87287060407812,"a1fc16dd-3ada-4329-914d-7f47ab76c60c",{"Keywords":28,"headline":767,"meta_fields":768,"lastModified":493,"firstPublished":705},"PSA-003: Predefined Credentials for the web Interface",[769],{"_uid":770,"title":771,"noIndex":54,"OG_image":772,"OG_title":771,"component":60,"description":774,"canonicalUrl":28,"OG_description":774},"d963aa77-a9bc-4ccb-b3e8-117c45baed23","CVE-2020-10270",{"id":64,"alt":64,"name":28,"focus":64,"title":64,"source":64,"filename":28,"copyright":64,"fieldtype":58,"meta_data":773},{},"This Product Security Advisory is based on a thorough investigation and all findings that were available at the time of publication. Should new information on the matter become available, it is possible that the initial assessment changes and the Advisory will be updated","cve-2020-10270","tw\u002Fsecurity-advisories\u002Fcve-2020-10270",-310,[],"088b7eb4-e8f5-4115-997a-504449347f13",[],"security-advisories\u002Fcve-2020-10270",[783,784,785,786,787,788,789,790,791,792,793],{"path":781,"name":64,"lang":75,"published":64},{"path":781,"name":64,"lang":77,"published":64},{"path":781,"name":64,"lang":79,"published":64},{"path":781,"name":64,"lang":81,"published":64},{"path":781,"name":64,"lang":83,"published":64},{"path":781,"name":64,"lang":85,"published":64},{"path":781,"name":64,"lang":87,"published":64},{"path":781,"name":64,"lang":89,"published":64},{"path":781,"name":64,"lang":70,"published":64},{"path":781,"name":64,"lang":92,"published":64},{"path":781,"name":64,"lang":94,"published":64},{"name":795,"created_at":796,"published_at":797,"updated_at":798,"id":799,"uuid":800,"content":801,"slug":809,"full_slug":810,"sort_by_date":64,"position":811,"tag_list":812,"is_startpage":54,"parent_id":67,"meta_data":64,"group_id":813,"first_published_at":797,"release_id":64,"lang":70,"path":64,"alternates":814,"default_full_slug":815,"translated_slugs":816},"CVE-2020-10271, CVE-2020-10272: Interfaces Accessible without Authentication","2025-09-04T15:25:52.944Z","2025-09-29T08:26:50.610Z","2025-09-29T08:26:50.634Z",87285567297890,"bd6cd51a-53c3-4f5b-89ff-824d63a4d711",{"Keywords":28,"headline":802,"meta_fields":803,"lastModified":493,"firstPublished":705},"PSA-004: Interfaces Accessible without Authentication",[804],{"_uid":805,"title":806,"noIndex":54,"OG_image":807,"OG_title":806,"component":60,"description":704,"canonicalUrl":28,"OG_description":704},"3ffe6c41-44f1-477b-b146-03157b52d736","CVE-2020-10271, CVE-2020-10272",{"id":64,"alt":64,"name":28,"focus":64,"title":64,"source":64,"filename":28,"copyright":64,"fieldtype":58,"meta_data":808},{},"cve-2020-10271-cve-2020-10272","tw\u002Fsecurity-advisories\u002Fcve-2020-10271-cve-2020-10272",-290,[],"6f3f6966-5508-4226-835e-0ec4b9fbf0ee",[],"security-advisories\u002Fcve-2020-10271-cve-2020-10272",[817,818,819,820,821,822,823,824,825,826,827],{"path":815,"name":64,"lang":75,"published":64},{"path":815,"name":64,"lang":77,"published":64},{"path":815,"name":64,"lang":79,"published":64},{"path":815,"name":64,"lang":81,"published":64},{"path":815,"name":64,"lang":83,"published":64},{"path":815,"name":64,"lang":85,"published":64},{"path":815,"name":64,"lang":87,"published":64},{"path":815,"name":64,"lang":89,"published":64},{"path":815,"name":64,"lang":70,"published":64},{"path":815,"name":64,"lang":92,"published":64},{"path":815,"name":64,"lang":94,"published":64},{"name":829,"created_at":830,"published_at":831,"updated_at":832,"id":833,"uuid":834,"content":835,"slug":844,"full_slug":845,"sort_by_date":64,"position":846,"tag_list":847,"is_startpage":54,"parent_id":67,"meta_data":64,"group_id":848,"first_published_at":831,"release_id":64,"lang":70,"path":64,"alternates":849,"default_full_slug":850,"translated_slugs":851},"CVE-2020-10273: No Encryption on Artifacts","2025-09-04T15:20:32.154Z","2025-09-29T08:26:50.763Z","2025-09-29T08:26:50.791Z",87284253352545,"b14fc38b-2515-4f59-8ab0-c8ca3faf32ab",{"Keywords":28,"headline":836,"meta_fields":837,"lastModified":493,"firstPublished":705},"PSA-005: No Encryption on Artifacts",[838],{"_uid":839,"title":840,"noIndex":54,"OG_image":841,"OG_title":840,"component":60,"description":843,"canonicalUrl":28,"OG_description":843},"1b868317-3375-42db-9de6-525d6e5136b5","CVE-2020-10273",{"id":64,"alt":64,"name":28,"focus":64,"title":64,"source":64,"filename":28,"copyright":64,"fieldtype":58,"meta_data":842},{},"This Product Security Advisory is based on a thorough investigation and all findings that were available at the time of publication. Should new information on the matter become available, it is possible that the initial assessment changes and the Advisory will be updated.","cve-2020-10273","tw\u002Fsecurity-advisories\u002Fcve-2020-10273",-270,[],"68b5c944-a4b8-4099-9167-f0504c549502",[],"security-advisories\u002Fcve-2020-10273",[852,853,854,855,856,857,858,859,860,861,862],{"path":850,"name":64,"lang":75,"published":64},{"path":850,"name":64,"lang":77,"published":64},{"path":850,"name":64,"lang":79,"published":64},{"path":850,"name":64,"lang":81,"published":64},{"path":850,"name":64,"lang":83,"published":64},{"path":850,"name":64,"lang":85,"published":64},{"path":850,"name":64,"lang":87,"published":64},{"path":850,"name":64,"lang":89,"published":64},{"path":850,"name":64,"lang":70,"published":64},{"path":850,"name":64,"lang":92,"published":64},{"path":850,"name":64,"lang":94,"published":64},{"name":864,"created_at":865,"published_at":866,"updated_at":867,"id":868,"uuid":869,"content":870,"slug":879,"full_slug":880,"sort_by_date":64,"position":881,"tag_list":882,"is_startpage":54,"parent_id":67,"meta_data":64,"group_id":883,"first_published_at":866,"release_id":64,"lang":70,"path":64,"alternates":884,"default_full_slug":885,"translated_slugs":886},"CVE-2020-10274, CVE-2020-10275: API Vulnerable via default Web Credentials","2025-09-04T15:10:52.631Z","2025-09-29T08:26:51.028Z","2025-09-29T08:26:51.058Z",87281879618643,"70648d51-4aa9-4458-a569-34d61dd4385e",{"Keywords":28,"headline":871,"meta_fields":872,"lastModified":493,"firstPublished":705},"PSA-006: API Vulnerable via default Web Credentials",[873],{"_uid":874,"title":875,"noIndex":54,"OG_image":876,"OG_title":875,"component":60,"description":878,"canonicalUrl":28,"OG_description":878},"5d7ae8c9-9dfe-4395-93bd-5ada01c0bb48","CVE-2020-10274, CVE-2020-10275",{"id":64,"alt":64,"name":28,"focus":64,"title":64,"source":64,"filename":28,"copyright":64,"fieldtype":58,"meta_data":877},{},"MiR robots offer a REST-like API to interact with the robot in an automated way, for scenarios where\nmanual use of the web interface is not desired. This API requires authentication using a key derived\nfrom user credentials for the web interface.","cve-2020-10274-cve-2020-10275","tw\u002Fsecurity-advisories\u002Fcve-2020-10274-cve-2020-10275",-250,[],"0e119a1a-b240-43e6-a018-68af6e0fdab0",[],"security-advisories\u002Fcve-2020-10274-cve-2020-10275",[887,888,889,890,891,892,893,894,895,896,897],{"path":885,"name":64,"lang":75,"published":64},{"path":885,"name":64,"lang":77,"published":64},{"path":885,"name":64,"lang":79,"published":64},{"path":885,"name":64,"lang":81,"published":64},{"path":885,"name":64,"lang":83,"published":64},{"path":885,"name":64,"lang":85,"published":64},{"path":885,"name":64,"lang":87,"published":64},{"path":885,"name":64,"lang":89,"published":64},{"path":885,"name":64,"lang":70,"published":64},{"path":885,"name":64,"lang":92,"published":64},{"path":885,"name":64,"lang":94,"published":64},{"name":899,"created_at":900,"published_at":901,"updated_at":902,"id":903,"uuid":904,"content":905,"slug":913,"full_slug":914,"sort_by_date":64,"position":915,"tag_list":916,"is_startpage":54,"parent_id":67,"meta_data":64,"group_id":917,"first_published_at":901,"release_id":64,"lang":70,"path":64,"alternates":918,"default_full_slug":919,"translated_slugs":920},"CVE-2020-10276: Default Passwords for safety PLC","2025-09-04T15:06:07.725Z","2025-09-29T08:26:51.269Z","2025-09-29T08:26:51.292Z",87280712652319,"1ab79a74-b6b8-418c-b215-a7ecfd064e25",{"Keywords":28,"headline":906,"meta_fields":907,"lastModified":493,"firstPublished":705},"PSA-007: Default Passwords for safety PLC",[908],{"_uid":909,"title":910,"noIndex":54,"OG_image":911,"OG_title":910,"component":60,"description":843,"canonicalUrl":28,"OG_description":843},"22171815-092c-4fe7-9b28-3b86d3773bbb","CVE-2020-10276",{"id":64,"alt":64,"name":28,"focus":64,"title":64,"source":64,"filename":28,"copyright":64,"fieldtype":58,"meta_data":912},{},"cve-2020-10276","tw\u002Fsecurity-advisories\u002Fcve-2020-10276",-230,[],"daf7ef0a-7acd-4848-8481-9d8dd9b01cf2",[],"security-advisories\u002Fcve-2020-10276",[921,922,923,924,925,926,927,928,929,930,931],{"path":919,"name":64,"lang":75,"published":64},{"path":919,"name":64,"lang":77,"published":64},{"path":919,"name":64,"lang":79,"published":64},{"path":919,"name":64,"lang":81,"published":64},{"path":919,"name":64,"lang":83,"published":64},{"path":919,"name":64,"lang":85,"published":64},{"path":919,"name":64,"lang":87,"published":64},{"path":919,"name":64,"lang":89,"published":64},{"path":919,"name":64,"lang":70,"published":64},{"path":919,"name":64,"lang":92,"published":64},{"path":919,"name":64,"lang":94,"published":64},{"name":933,"created_at":934,"published_at":935,"updated_at":936,"id":937,"uuid":938,"content":939,"slug":947,"full_slug":948,"sort_by_date":64,"position":949,"tag_list":950,"is_startpage":54,"parent_id":67,"meta_data":64,"group_id":951,"first_published_at":935,"release_id":64,"lang":70,"path":64,"alternates":952,"default_full_slug":953,"translated_slugs":954},"CVE-2020-10277: Boot from a connected USB drive.","2025-09-04T15:00:44.786Z","2025-09-29T08:26:51.533Z","2025-09-29T08:26:51.560Z",87279389887398,"6816b8b9-c123-4088-9e5e-976b8ff48b07",{"Keywords":28,"headline":940,"meta_fields":941,"lastModified":493,"firstPublished":705},"PSA-008: Boot from a connected USB drive.",[942],{"_uid":943,"title":944,"noIndex":54,"OG_image":945,"OG_title":944,"component":60,"description":704,"canonicalUrl":28,"OG_description":704},"4e486641-499f-413c-8247-2074f2bccd17","CVE-2020-10277",{"id":64,"alt":64,"name":28,"focus":64,"title":64,"source":64,"filename":28,"copyright":64,"fieldtype":58,"meta_data":946},{},"cve-2020-10277","tw\u002Fsecurity-advisories\u002Fcve-2020-10277",-210,[],"a8a870ed-cb42-4b04-898e-5ebb3e7f83cb",[],"security-advisories\u002Fcve-2020-10277",[955,956,957,958,959,960,961,962,963,964,965],{"path":953,"name":64,"lang":75,"published":64},{"path":953,"name":64,"lang":77,"published":64},{"path":953,"name":64,"lang":79,"published":64},{"path":953,"name":64,"lang":81,"published":64},{"path":953,"name":64,"lang":83,"published":64},{"path":953,"name":64,"lang":85,"published":64},{"path":953,"name":64,"lang":87,"published":64},{"path":953,"name":64,"lang":89,"published":64},{"path":953,"name":64,"lang":70,"published":64},{"path":953,"name":64,"lang":92,"published":64},{"path":953,"name":64,"lang":94,"published":64},{"name":967,"created_at":968,"published_at":969,"updated_at":970,"id":971,"uuid":972,"content":973,"slug":981,"full_slug":982,"sort_by_date":64,"position":983,"tag_list":984,"is_startpage":54,"parent_id":67,"meta_data":64,"group_id":985,"first_published_at":969,"release_id":64,"lang":70,"path":64,"alternates":986,"default_full_slug":987,"translated_slugs":988},"CVE-2020-10278: No Password Configured for the BIOS","2025-09-04T14:52:31.451Z","2025-09-29T08:26:51.773Z","2025-09-29T08:26:51.798Z",87277369192918,"4799ccc7-297d-465c-a35e-33eba8ad705e",{"Keywords":28,"headline":974,"meta_fields":975,"lastModified":493,"firstPublished":705},"PSA-009: No Password Configured for the BIOS",[976],{"_uid":977,"title":978,"noIndex":54,"OG_image":979,"OG_title":978,"component":60,"description":704,"canonicalUrl":28,"OG_description":704},"3db78651-b53e-4d38-accb-c0fe801b2d78","CVE-2020-10278",{"id":64,"alt":64,"name":28,"focus":64,"title":64,"source":64,"filename":28,"copyright":64,"fieldtype":58,"meta_data":980},{},"cve-2020-10278","tw\u002Fsecurity-advisories\u002Fcve-2020-10278",-190,[],"9b7e110e-33ea-48d1-8833-c22feebdc247",[],"security-advisories\u002Fcve-2020-10278",[989,990,991,992,993,994,995,996,997,998,999],{"path":987,"name":64,"lang":75,"published":64},{"path":987,"name":64,"lang":77,"published":64},{"path":987,"name":64,"lang":79,"published":64},{"path":987,"name":64,"lang":81,"published":64},{"path":987,"name":64,"lang":83,"published":64},{"path":987,"name":64,"lang":85,"published":64},{"path":987,"name":64,"lang":87,"published":64},{"path":987,"name":64,"lang":89,"published":64},{"path":987,"name":64,"lang":70,"published":64},{"path":987,"name":64,"lang":92,"published":64},{"path":987,"name":64,"lang":94,"published":64},{"name":1001,"created_at":1002,"published_at":1003,"updated_at":1004,"id":1005,"uuid":1006,"content":1007,"slug":1015,"full_slug":1016,"sort_by_date":64,"position":1017,"tag_list":1018,"is_startpage":54,"parent_id":67,"meta_data":64,"group_id":1019,"first_published_at":1003,"release_id":64,"lang":70,"path":64,"alternates":1020,"default_full_slug":1021,"translated_slugs":1022},"CVE-2020-10279: Insecure Defaults for Robots","2025-09-04T14:40:35.095Z","2025-09-29T08:26:52.022Z","2025-09-29T08:26:52.046Z",87274434997495,"0bc3351e-398a-4a02-9346-d37a84e47b37",{"Keywords":28,"headline":1008,"meta_fields":1009,"lastModified":493,"firstPublished":705},"PSA-010: Insecure Defaults for Robots",[1010],{"_uid":1011,"title":1012,"noIndex":54,"OG_image":1013,"OG_title":1012,"component":60,"description":843,"canonicalUrl":28,"OG_description":843},"fdaf6bb0-ef8e-44d3-928a-6ab1ffacd4ed","CVE-2020-10279",{"id":64,"alt":64,"name":28,"focus":64,"title":64,"source":64,"filename":28,"copyright":64,"fieldtype":58,"meta_data":1014},{},"cve-2020-10279","tw\u002Fsecurity-advisories\u002Fcve-2020-10279",-170,[],"877ccead-df31-49e3-a803-5bb1abad6086",[],"security-advisories\u002Fcve-2020-10279",[1023,1024,1025,1026,1027,1028,1029,1030,1031,1032,1033],{"path":1021,"name":64,"lang":75,"published":64},{"path":1021,"name":64,"lang":77,"published":64},{"path":1021,"name":64,"lang":79,"published":64},{"path":1021,"name":64,"lang":81,"published":64},{"path":1021,"name":64,"lang":83,"published":64},{"path":1021,"name":64,"lang":85,"published":64},{"path":1021,"name":64,"lang":87,"published":64},{"path":1021,"name":64,"lang":89,"published":64},{"path":1021,"name":64,"lang":70,"published":64},{"path":1021,"name":64,"lang":92,"published":64},{"path":1021,"name":64,"lang":94,"published":64},{"name":1035,"created_at":1036,"published_at":1037,"updated_at":1038,"id":1039,"uuid":1040,"content":1041,"slug":1049,"full_slug":1050,"sort_by_date":64,"position":1051,"tag_list":1052,"is_startpage":54,"parent_id":67,"meta_data":64,"group_id":1053,"first_published_at":1037,"release_id":64,"lang":70,"path":64,"alternates":1054,"default_full_slug":1055,"translated_slugs":1056},"CVE-2020-10280: DOS on Web Interface","2025-09-02T12:25:11.512Z","2025-09-29T08:26:53.592Z","2025-09-29T08:26:53.622Z",86533372000410,"d962353a-639e-4e3d-8ff8-70ee48213d4b",{"Keywords":28,"headline":1042,"meta_fields":1043,"lastModified":493,"firstPublished":705},"PSA-011: DOS on Web Interface",[1044],{"_uid":1045,"title":1046,"noIndex":54,"OG_image":1047,"OG_title":1046,"component":60,"description":843,"canonicalUrl":28,"OG_description":843},"de0c5902-fa21-4a6a-bfc5-3f2a1b940a7a","CVE-2020-10280",{"id":64,"alt":64,"name":28,"focus":64,"title":64,"source":64,"filename":28,"copyright":64,"fieldtype":58,"meta_data":1048},{},"cve-2020-10280","tw\u002Fsecurity-advisories\u002Fcve-2020-10280",-20,[],"ec6e901b-7bf3-49af-820f-1e0025cc907a",[],"security-advisories\u002Fcve-2020-10280",[1057,1058,1059,1060,1061,1062,1063,1064,1065,1066,1067],{"path":1055,"name":64,"lang":75,"published":64},{"path":1055,"name":64,"lang":77,"published":64},{"path":1055,"name":64,"lang":79,"published":64},{"path":1055,"name":64,"lang":81,"published":64},{"path":1055,"name":64,"lang":83,"published":64},{"path":1055,"name":64,"lang":85,"published":64},{"path":1055,"name":64,"lang":87,"published":64},{"path":1055,"name":64,"lang":89,"published":64},{"path":1055,"name":64,"lang":70,"published":64},{"path":1055,"name":64,"lang":92,"published":64},{"path":1055,"name":64,"lang":94,"published":64}]