SGUDA U-Lock central lock control serviceâs lock management function has incorrect authorization. A remote attacker with general privilege can exploit this vulnerability to call privileged APIs t ...
Continue ReadingJune 02, 2023
ASUS RT-AC86U does not filter special characters for parameters in specific web URLs. A remote attacker with normal user privileges can exploit this vulnerability to perform command injection attack t ...
Continue ReadingJune 02, 2023
Furbo dog camera has insufficient filtering for special parameter of device log management function. An unauthenticated remote attacker in the Bluetooth network with normal user privileges can exploit ...
Continue ReadingJune 02, 2023
Wade Graphic Design FANTSY has a vulnerability of insufficient filtering for file type in its file update function. An authenticated remote attacker with general user privilege can exploit this vulner ...
Continue ReadingJune 02, 2023
Wade Graphic Design FANTSY has a vulnerability of insufficient authorization check. An unauthenticated remote user can exploit this vulnerability by modifying URL parameters to gain administrator priv ...
Continue ReadingJune 02, 2023
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Erikoglu Technology ErMon allows Command Line Execution through SQL Injection, Authentication Bypa ...
Continue ReadingJune 02, 2023
According to a Mar-2022 API survey by Gartner, 98% of organizations use or are planning to use internal APIs â up from 88% in 2019. And 90% of organizations use or are planning to use private API ...
Continue ReadingJune 01, 2023
Last week, there were 90 vulnerabilities disclosed in 77 WordPress Plugins and no WordPress themes that have been added to the Wordfence Intelligence Vulnerability Database, and there were 29 Vulnerab ...
Continue ReadingJune 01, 2023
Back to Main