Vulnerability Intelligence and Management by Cybersecurity Help s.r.o.



Use of Incorrect Byte Ordering

The product receives input from an upstream component, but it does not account for byte ordering (e.g. big-endian and little-endian) when processing the input, causing an incorrect number or value to be used.