CVE-2021-22008

The vCenter Server contains an information disclosure vulnerability in VAPI (vCenter API) service. A malicious actor with network access to port 443 on vCenter Server may exploit this issue by sending ...

Continue Reading
CVE-2021-28495

In Arista's MOS (Metamako Operating System) software which is supported on the 7130 product line, under certain conditions, user authentication can be bypassed when API access is enabled via the JSON- ...

Continue Reading
Fpicker – A Frida-based Fuzzing Suite Supporting Various Modes (Including AFL++ In-Process Fuzzing)

[![](https://2.bp.blogspot.com/-2DFBtt0igd8/YR2RnxGfu_I/AAAAAAAArR4/u_iEJXOd1hwknuA-Bil4XIP3QN8pDPt2gCK4BGAYYCw/w400-h351/fpicker_1_fpicker_logo-766362.png)]() fpicker is a Frida-based fuzzing suite t ...

Continue Reading
CVE-2021-26605

An improper input validation vulnerability in the service of ezPDFReader allows attacker to execute arbitrary command. This issue occurred when the ezPDF launcher received and executed crafted input v ...

Continue Reading
CVE-2021-26605

An improper input validation vulnerability in the service of ezPDFReader allows attacker to execute arbitrary command. This issue occurred when the ezPDF launcher received and executed crafted input v ...

Continue Reading
CVE-2021-30179

Apache Dubbo prior to 2.6.9 and 2.7.9 by default supports generic calls to arbitrary methods exposed by provider interfaces. These invocations are handled by the GenericFilter which will find the serv ...

Continue Reading
Cisco RV340 set_snmp usmUserAuthKey Command Injection Remote Code Execution Vulnerability

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Cisco RV340 routers. Authentication is required to exploit this vulnerability. The specific ...

Continue Reading
(Pwn2Own) Cisco RV340 JSON RPC file-copy Command Injection Local Privilege Escalation Vulnerability

This vulnerability allows local attackers to escalate privileges on affected installations of Cisco RV340 routers. An attacker must first obtain the ability to execute low-privileged code on the targe ...

Continue Reading

Back to Main

Subscribe for the latest news: