The Gumstix Overo SBC on the VSKS board through 2022-08-09, as used on the Orlan-10 and other platforms, allows unrestricted remapping of the NOR flash memory containing the bitstream for the FPGA.Rea ...
Continue ReadingAugust 10, 2022
In ImageMagick, a crafted file could trigger an assertion failure when a call to WriteImages was made in MagickWand/operation.c, due to a NULL image list. This could potentially cause a denial of serv ...
Continue ReadingAugust 10, 2022
An attacker may be able to execute malicious actions due to the lack of device access protections and device permissions when using the web application. This could lead to uploading python files which ...
Continue ReadingAugust 10, 2022
XML external entity injection(XXE) is a vulnerability that allows an attacker to interfere with an application's processing of XML data. This attack occurs when XML input containing a reference to an ...
Continue ReadingAugust 10, 2022
A flaw was found in Red Hat Process Automation Manager 7 where an attacker can benefit from a brute force attack against Administration Console as the application does not limit the number of unsucces ...
Continue ReadingAugust 10, 2022
SAP BusinessObjects Business Intelligence Platform (Open Document) - versions 430, 430, allows an unauthenticated attacker to retrieve sensitive information plain text over the network. On successful ...
Continue ReadingAugust 10, 2022
Under certain conditions SAP Authenticator for Android allows an attacker to access information which would otherwise be restricted.Read More ...
Continue ReadingAugust 10, 2022
An authentication-bypass issue in the component https://MYDEVICEIP/cgi-bin-sdb/ExportSettings.sh of Mega System Technologies Inc MSNSwitch MNT.2408 allows unauthenticated attackers to arbitrarily confi ...
Continue ReadingAugust 10, 2022
Back to Main