This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DIR-1935 1.03 routers. Although authentication is required to exploit this vulnerabil ...
Continue Reading29 марта, 2023
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Netatalk. Authentication is not required to exploit this vulnerability. The specific flaw exists withi ...
Continue Reading29 марта, 2023
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of TP-Link TL-WR940N 6_211111 3.20.1(US) routers. Authentication is not required to exploit this ...
Continue Reading29 марта, 2023
This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of TP-Link TL-WR940N 6_211111 3.20.1(US) routers. Authentication is not required to exp ...
Continue Reading29 марта, 2023
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader 12.0.1.12430. User interaction is required to exploit this vulnerability in that the ...
Continue Reading29 марта, 2023
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader 12.0.1.12430. User interaction is required to exploit this vulnerability in that the ...
Continue Reading29 марта, 2023
Kiwi TCMS is an open source test management system for both manual and automated testing. Kiwi TCMS accepts SVG files uploaded by users which could potentially contain JavaScript code. If SVG images a ...
Continue Reading29 марта, 2023
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in wpdevart Gallery â Image and Video Gallery with Thumbnails plugin Read More ...
Continue Reading29 марта, 2023
Back to Main