Security Vulnerabilities / CVE

Aus Wiki - Heidler Strichcode GmbH
Zur Navigation springen Zur Suche springen

On this page you will see an overview of all security related vulnerabilites / CVEs that occured either directly in our applications or through the use of third party libraries that are in use by our applications.


We also offer an admin newsletter (in German) where we will notifiy you new of critical securtiy vulnerabilities via email.
You can register for our admin newsletter here: https://heidler-strichcode.de/kontakt/
(The contact form for the newsletter is only visible if "Marketing" cookies are enabled.)

How do I update applications?

On our page Aktualisierung von Erweiterungsmodulen you will learn everything you need to know before and during the update of the application.
Please read this carefully.
If you have any questions or are unsure, you can always contact our support via: support@heidler-strichcode.de

Security classification

high = The vulnerability could be exploited. We urgently recommend to update the affected applications as soon as possible.
medium = The possiblity that this vulnerability can be exploited cannot be ruled out. The affected functionality is not directly used, however it may be in use by other third party components. We recommend to update the afftected applications as soon as it is convenient.
low = The vulnerability cannot be exploited. We still recommend to update the application at some point.

Overview of all security vulnerabilites / CVEs

ordered newest to oldest

Date Classification Details
2023-09-15 low CVE-2023-42503
2023-04-18 low CVE-2023-21930
2023-02-10 medium CVE-2022-40152
2023-02-02 low CVE-2023-21835 / CVE-2023-21843