It is identified a format string vulnerability in ASUS RT-AX56U V2 & RT-AC86U. This vulnerability is caused by directly using input as a format string when calling syslog in logmessage_normal func ...
Continue ReadingJuly 21, 2023
It is identified a format string vulnerability in ASUS RT-AX56U V2 & RT-AC86U. This vulnerability is caused by lacking validation for a specific value when calling cm_processChangedConfigMsg in cc ...
Continue ReadingJuly 21, 2023
There is a Cross-site Scripting vulnerability in Esri Portal Sites in versions 10.8.1 â 11.1 that may allow a remote, authenticated attacker to create a crafted link which when clicked could p ...
Continue ReadingJuly 21, 2023
The Jupiter X Core plugin for WordPress is vulnerable to arbitrary file downloads in versions up to, and including, 2.5.0. This makes it possible for unauthenticated attackers to download the contents ...
Continue ReadingJuly 21, 2023
Galaxy Software Services Vitals ESP is vulnerable to using a hard-coded encryption key. An unauthenticated remote attacker can generate a valid token parameter and exploit this vulnerability to access ...
Continue ReadingJuly 21, 2023
### Overview A command injection vulnerability can be used in the Perimeter81 macOS application to run arbitrary commands with administrative privileges. ### Description At the time, the latest Perime ...
Continue ReadingJuly 20, 2023
Assembla Auth Plugin is vulnerable to Cross-Site Request Forgery (CSRF). The vulnerability exists due to lack of a state parameter in its OAuth flow which allows an attacker to trick a user into loggi ...
Continue ReadingJuly 20, 2023
Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container im ...
Continue ReadingJuly 20, 2023
Back to Main