Post ContentRead More ...
Continue ReadingMarch 27, 2023
An high privileged attacker may pass crafted arguments to the validate function of csaf-validator-lib of a locally installed Secvisogram in versions Read More ...
Continue ReadingMarch 27, 2023
The validate JSON endpoint of the Secvisogram csaf-validator-service in versions Read More ...
Continue ReadingMarch 27, 2023
Softnext Technologies Corp.ââ¬â¢s SPAM SQR has a vulnerability of Code Injection within its specific function. An authenticated remote attacker with administrator privilege can exploit this ...
Continue ReadingMarch 27, 2023
RIFARTEK IOT Wall has a vulnerability of incorrect authorization. An authenticated remote attacker with general user privilege is allowed to perform specific privileged function to access and modify a ...
Continue ReadingMarch 27, 2023
HGiga MailSherlock mail query function has vulnerability of insufficient validation for user input. An authenticated remote attacker with administrator privilege can exploit this vulnerability to inje ...
Continue ReadingMarch 27, 2023
Juiker app stores debug logs which contains sensitive information to mobile external storage. An unauthenticated physical attacker can access these files to acquire partial user information such as pe ...
Continue ReadingMarch 27, 2023
Back to Main