In Zephyr bluetooth mesh core stack, an out-of-bound write vulnerability can be triggered during provisioning.Read More ...
Continue ReadingJuly 26, 2022
In Zephyr bluetooth mesh core stack, an out-of-bound write vulnerability can be triggered during provisioning.Read More ...
Continue ReadingJuly 26, 2022
Affected versions of Atlassian Jira Service Management Server and Data Center allow authenticated remote attackers to access the content of internal network resources via a Server-Side Request Forgery ...
Continue ReadingJuly 26, 2022
untangle is a python library to convert XML data to python objects. untangle versions 1.2.0 and earlier improperly restricts XML external entity references. By exploiting this vulnerability, a remote ...
Continue ReadingJuly 26, 2022
Cross-Site Request Forgery (CSRF) vulnerability in webapi component in Synology Calendar before 2.3.4-0631 allows remote authenticated users to hijack the authentication of administrators via unspecif ...
Continue ReadingJuly 25, 2022
This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will b ...
Continue ReadingJuly 25, 2022
An access control issue in Wavlink WiFi-Repeater RPTA2-77W.M4300.01.GD.2017Sep19 allows attackers to arbitrarily configure device settings via accessing the page mb_wifibasic.shtml.Read More ...
Continue ReadingJuly 25, 2022
An access control issue in Wavlink WiFi-Repeater RPTA2-77W.M4300.01.GD.2017Sep19 allows attackers to obtain the key information of the device via accessing Tftpd32.ini.Read More ...
Continue ReadingJuly 25, 2022
Back to Main