Browse all 10 CVE security advisories affecting IEEE. AI-powered Chinese analysis, POCs, and references for each vulnerability.
IEEE develops technical standards and publishes research across electrical engineering, computer science, and electronics. Historically, common vulnerabilities in IEEE-related systems include remote code execution, cross-site scripting, and privilege escalation, often stemming from web application misconfigurations and insufficient input validation. While no major security incidents have been widely documented, the organization maintains a moderate vulnerability profile with 10 CVEs on record. IEEE's security posture emphasizes standard compliance and protocol robustness, though legacy implementations may present exposure risks. The organization continues to address security challenges through regular updates and collaborative vulnerability disclosure programs.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2021-27862 | L2 network filtering bypass using stacked VLAN0 and LLC/SNAP headers with an invalid length during Ethernet to Wifi frame translation — 802.2CWE-130 | 4.7 | - | 2022-09-27 |
| CVE-2021-27861 | L2 network filtering bypass using stacked VLAN0 and LLC/SNAP headers with invalid lengths — 802.2CWE-130 | 4.7 | - | 2022-09-27 |
| CVE-2021-27853 | L2 network filtering can be bypassed using stacked VLAN0 and LLC/SNAP headers — 802.2CWE-290 | 4.7 | - | 2022-09-27 |
This page lists every published CVE security advisory associated with IEEE. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.