A highly privileged user can exploit SUID-root program to escalate his privileges to root on a local Unix system.Read More ...
Continue ReadingJune 14, 2022
SAP Financial Consolidation - version 1010,?does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges.Read More ...
Continue ReadingJune 14, 2022
When a user opens manipulated AutoCAD (.dwg, TeighaTranslator.exe) files received from untrusted sources in SAP 3D Visual Enterprise Viewer, the application crashes and becomes temporarily unavailable ...
Continue ReadingJune 14, 2022
Nokia "G-2425G-A" Bharti Airtel Routers Hardware version "3FE48299DEAA" Software Version "3FE49362IJHK42" is vulnerable to Cross-Site Scripting (XSS) via the admin->Maintenance>Device Management ...
Continue ReadingJune 14, 2022
The code in UEK6 U3 was missing an appropiate file descriptor count to be missing. This resulted in a use count error that allowed a file descriptor to a socket to be closed and freed while it was sti ...
Continue ReadingJune 14, 2022
Jupyter Notebook is a web-based notebook environment for interactive computing. Prior to version 6.4.12, authenticated requests to the notebook server with `ContentsManager.allow_hidden = False` only ...
Continue ReadingJune 14, 2022
Product Show Room Site v1.0 is vulnerable to SQL Injection via /psrs/admin/?page=products/manage_product&id=.Read More ...
Continue ReadingJune 14, 2022
Product Show Room Site v1.0 is vulnerable to SQL Injection via /psrs/admin/fields/manage_field.php?id=.Read More ...
Continue ReadingJune 14, 2022
Back to Main