Please refer to our EVerest Security Policy.
Security: EVerest/everest-core
Security
SECURITY.md
-
Null pointer dereference during DC_ChargeLoopRes document deserializationGHSA-ph4w-r9q8-vm9h published
Jan 20, 2026 by hikinggrassHigh -
Null session ID bypasses session ID verificationGHSA-w385-3jwp-x47x published
Jan 20, 2026 by hikinggrassModerate -
By default, the EV is responsible for closing the connection if the module encounters an error during request processingGHSA-wqh4-pj54-6xv9 published
Jan 20, 2026 by hikinggrassModerate -
Memory exhaustion in libocppGHSA-f8c2-44c3-7v55 published
Jan 20, 2026 by hikinggrassModerate -
Concatenation of strings literal and integersGHSA-px57-jx97-hrff published
Jan 20, 2026 by hikinggrassModerate -
Integer Overflow and Signed to Unsigned conversion lead to either stack buffer overflow or infinite loopGHSA-7qq4-q9r8-wc7w published
Jan 20, 2026 by hikinggrassHigh -
Inadequate session handling can lead to memory-related errors or exhaustion of the operating system’s file descriptors, resulting in a denial of serviceGHSA-4h8h-x5cp-g22r published
Jan 20, 2026 by hikinggrassHigh -
Inadequate exception handling leads to denial of serviceGHSA-g7mm-r6qp-96vh published
Jan 20, 2026 by hikinggrassModerate -
Use of assert functions potentially lead to denial of serviceGHSA-cxc5-rrj5-8pf3 published
Jan 20, 2026 by hikinggrassHigh -
Unlimited connections leads to DoS because of operating system resource exhaustionGHSA-mv3w-pp85-5h7c published
Jan 20, 2026 by hikinggrassHigh
Learn more about advisories related to EVerest/everest-core in the GitHub Advisory Database