CWE-1327

Binding to an Unrestricted IP Address

5 CVEs Avg CVSS 7.4 MITRE
1
CRITICAL
1
HIGH
3
MEDIUM
0
LOW
0
POC
0
KEV

Monthly

CVE-2026-24015 CRITICAL PATCH Act Now

Vulnerability in Apache IoTDB from 1.0.0 before 1.3.7 and from 2.0.0 before 2.0.7. Critical severity issue in the IoT time-series database platform.

Apache Iotdb
NVD VulDB
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-28395 MEDIUM PATCH This Month

OpenClaw Chrome extension relay server versions prior to 2026.2.12 improperly bind to all network interfaces when wildcard cdpUrl values are configured, enabling remote attackers to discover service endpoints and port information. An attacker can exploit this exposure to conduct denial-of-service attacks and brute-force attempts against the relay token authentication mechanism without requiring local access.

Dns Openclaw Chrome
NVD GitHub
CVSS 3.1
6.5
EPSS
0.2%
CVE-2026-21528 MEDIUM This Month

Azure IoT Explorer binds to unrestricted IP addresses, enabling unauthenticated remote attackers to intercept and disclose sensitive information over the network. This vulnerability affects Azure IoT deployments where the Explorer tool is exposed without proper network segmentation. No patch is currently available, making network isolation the primary mitigation strategy.

Azure IoT Azure Iot Explorer
NVD
CVSS 3.1
6.5
EPSS
0.1%
CVE-2025-11538 MEDIUM PATCH This Month

A vulnerability exists in Keycloak's server distribution where enabling debug mode (--debug <port>) insecurely defaults to binding the Java Debug Wire Protocol (JDWP) port to all network interfaces. Rated medium severity (CVSS 6.8), this vulnerability is no authentication required. No vendor patch available.

RCE Java Redhat
NVD GitHub
CVSS 3.1
6.8
EPSS
0.0%
CVE-2025-55322 HIGH This Month

Binding to an unrestricted ip address in GitHub allows an unauthorized attacker to execute code over a network. Rated high severity (CVSS 7.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.

Authentication Bypass Omniparser
NVD
CVSS 3.1
7.3
EPSS
0.1%
CVE-2026-24015
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Vulnerability in Apache IoTDB from 1.0.0 before 1.3.7 and from 2.0.0 before 2.0.7. Critical severity issue in the IoT time-series database platform.

Apache Iotdb
NVD VulDB
CVE-2026-28395
EPSS 0% CVSS 6.5
MEDIUM PATCH This Month

OpenClaw Chrome extension relay server versions prior to 2026.2.12 improperly bind to all network interfaces when wildcard cdpUrl values are configured, enabling remote attackers to discover service endpoints and port information. An attacker can exploit this exposure to conduct denial-of-service attacks and brute-force attempts against the relay token authentication mechanism without requiring local access.

Dns Openclaw Chrome
NVD GitHub
CVE-2026-21528
EPSS 0% CVSS 6.5
MEDIUM This Month

Azure IoT Explorer binds to unrestricted IP addresses, enabling unauthenticated remote attackers to intercept and disclose sensitive information over the network. This vulnerability affects Azure IoT deployments where the Explorer tool is exposed without proper network segmentation. No patch is currently available, making network isolation the primary mitigation strategy.

Azure IoT Azure Iot Explorer
NVD
CVE-2025-11538
EPSS 0% CVSS 6.8
MEDIUM PATCH This Month

A vulnerability exists in Keycloak's server distribution where enabling debug mode (--debug <port>) insecurely defaults to binding the Java Debug Wire Protocol (JDWP) port to all network interfaces. Rated medium severity (CVSS 6.8), this vulnerability is no authentication required. No vendor patch available.

RCE Java Redhat
NVD GitHub
CVE-2025-55322
EPSS 0% CVSS 7.3
HIGH This Month

Binding to an unrestricted ip address in GitHub allows an unauthorized attacker to execute code over a network. Rated high severity (CVSS 7.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.

Authentication Bypass Omniparser
NVD

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy