Known Vulnerabilities for Access Point by Arista
Listed below are 1 of the newest known vulnerabilities associated with "Access Point" by "Arista".
These CVEs are retrieved based on exact matches on listed software, hardware, and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.
Data on known vulnerable versions is also displayed based on information from known CPEs
Known Vulnerabilities
| CVE | Shortened Description | Severity | Publish Date | Last Modified |
|---|---|---|---|---|
| CVE-2026-40317 json | NovumOS is a custom 32-bit operating system written in Zig and x86 Assembly. In versions prior to 0.24, Syscall 12 (JumpToUse... | Not Provided | 2026-04-18 | 2026-04-20 |
| CVE-2026-33748 json | BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. Prior ... | Not Provided | 2026-03-27 | 2026-03-27 |
| CVE-2026-33730 json | Open Source Point of Sale (opensourcepos) is a web based point of sale application written in PHP using CodeIgniter framework... | Not Provided | 2026-03-27 | 2026-03-27 |
| CVE-2026-32721 json | LuCI is the OpenWrt Configuration Interface. Versions prior to both 24.10.5 and 25.12.0, contain a stored XSS vulnerability i... | Not Provided | 2026-03-19 | 2026-03-25 |
| CVE-2026-31449 json | In the Linux kernel, the following vulnerability has been resolved: ext4: validate p_idx bounds in ext4_ext_correct_indexes ... | Not Provided | 2026-04-22 | 2026-04-22 |
| CVE-2026-31435 json | In the Linux kernel, the following vulnerability has been resolved: netfs: Fix read abandonment during retry Under certain ... | Not Provided | 2026-04-22 | 2026-04-22 |
| CVE-2026-28681 json | Internet Routing Registry daemon version 4 is an IRR database server, processing IRR objects in the RPSL format. From version... | Not Provided | 2026-03-06 | 2026-03-06 |
| CVE-2026-24467 json | OpenAEV is an open source platform allowing organizations to plan, schedule and conduct cyber adversary simulation campaign a... | Not Provided | 2026-04-20 | 2026-04-20 |
| CVE-2026-24465 json | Stack-based buffer overflow vulnerability exists in ELECOM wireless LAN access point devices. A crafted packet may lead to ar... | Not Provided | 2026-02-03 | 2026-02-03 |
| CVE-2026-23554 json | The Intel EPT paging code uses an optimization to defer flushing of any cached EPT state until the p2m lock is dropped, so th... | Not Provided | 2026-03-23 | 2026-03-23 |