From the provided web page screenshot, the following key information about the vulnerability can be obtained: Key Information Vulnerability Type: Denial of Service (DoS) Affected Version: Latest version of , CVE ID: Discovery Date: January 19, 2020 Vulnerability Details Allowed Action: During decoding operations, attackers can trigger excessive memory allocation Trigger Condition: The length of the nonce array related to in the encoded data header depends on untrusted input Impact Scope: Any product based on encoded network communication using version , such as Apero CAS and other products Technical Details Affected Class: Affected Method: Affected Component: Additional Information: The login flow in relies on Tracking and Patching Confirmation and Fix: The vulnerability has been confirmed, and compatible patching solutions are under analysis; a fix is expected to be released soon Related Commit: New Release Version: has been released Participants Reporter: Primary Responsible: , Participants: ,