Browse all 5 CVE security advisories affecting Dataprobe, Inc.. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Dataprobe, Inc. specializes in network power control and environmental monitoring solutions for data centers and critical infrastructure. Historically, their products have been susceptible to remote code execution, cross-site scripting, and privilege escalation vulnerabilities, often stemming from inadequate input validation and default configuration issues. The company has addressed several critical flaws in its web interfaces and device management systems, with five CVEs currently documented on record. While no major public security incidents have been widely reported, their exposed management interfaces and legacy firmware updates present persistent risks requiring vigilant patch management and network segmentation for deployed systems.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2022-46658 | CVE-2022-46658 — Dataprobe iBoot-PDU FW | 6.5 | Medium | 2023-05-22 |
| CVE-2022-46738 | CVE-2022-46738 — Dataprobe iBoot-PDU FW | 7.2 | High | 2023-05-22 |
| CVE-2022-47320 | CVE-2022-47320 — Dataprobe iBoot-PDU FW | 8.1 | High | 2023-05-22 |
| CVE-2022-47311 | CVE-2022-47311 — Dataprobe iBoot-PDU FW | 8.5 | High | 2023-05-22 |
| CVE-2022-4945 | CVE-2022-4945 — Dataprobe iBoot-PDU FW | 6.5 | Medium | 2023-05-22 |
This page lists every published CVE security advisory associated with Dataprobe, Inc.. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.