2024-12-06 17:23:52
icscert
PUBLISHED
The affected product is vulnerable to an integer underflow. An unauthenticated attacker could send a malformed HTTP request, which could allow the attacker to crash the program.