Adtran SR400ac ping Command Injection Remote Code Execution Vulnerability

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adtran SR400ac routers. Although authentication is required to exploit this vulnerability, the existin ...

Continue Reading
VMWare Aria Operations For Networks Remote Command Execution Exploit

VMWare Aria Operations for Networks (vRealize Network Insight) is vulnerable to command injection when accepting user input through the Apache Thrift RPC interface. This vulnerability allows a remote ...

Continue Reading

CVSS3 - CRITICAL

CVSS2 - HIGH

VMWare Aria Operations For Networks Remote Command Execution

Post ContentRead More ...

Continue Reading

CVSS3 - CRITICAL

CVSS2 - HIGH

VMWare Aria Operations for Networks (vRealize Network Insight) pre-authenticated RCE

VMWare Aria Operations for Networks (vRealize Network Insight) is vulnerable to command injection when accepting user input through the Apache Thrift RPC interface. This vulnerability allows a remote ...

Continue Reading
Denial Of Service (DoS)

github.com/cometbft/cometbft is vulnerable to Denial of Service (DoS) attacks. A deadlock is introduced when serializing the struct `PeerState` to JSON when the new method `MarshallJSON` is used. One ...

Continue Reading

CVSS3 - MEDIUM

CVSS2 - MEDIUM

Old Blackmoon Trojan, NEW Monetization Approach

![Old Blackmoon Trojan, NEW Monetization Approach](https://blog.rapid7.com/content/images/2023/07/GettyImages-1187008408--1-.jpg) Rapid7 is tracking a new, more sophisticated and staged campaign using ...

Continue Reading
CVE-2023-34450

CometBFT is a Byzantine Fault Tolerant (BFT) middleware that takes a state transition machine and replicates it on many machines. An internal modification made in versions 0.34.28 and 0.37.1 to the wa ...

Continue Reading
CometBFT PeerState JSON serialization deadlock

### Impact An internal modification to the way struct `PeerState` is serialized to JSON introduced a deadlock when new function MarshallJSON is called. This function can be called from two places: 1. ...

Continue Reading

Back to Main

Subscribe for the latest news: