An unauthenticated, remote attacker could upload malicious logic to the devices based on ProConOS/ProConOS eCLR in order to gain full control over the device.Read More ...

Continue Reading

ASUS Control Center API has a broken access control vulnerability. An unauthenticated remote attacker can call privileged API functions to perform partial system operations or cause partial disrupt of ...

Continue Reading

ASUS Control Center is vulnerable to SQL injection. An authenticated remote attacker with general user privilege can inject SQL command to specific API parameters to acquire database schema or access ...

Continue Reading

Hardcoded credentials in the Ricoh myPrint application for Windows and 2.2.7 for Android give access to any externally disclosed myPrint WSDL API, as demonstrated by discovering API secrets of ...

Continue Reading

In CIMTechniques CIMScan 6.x through 6.2, the SOAP WSDL parser allows attackers to execute SQL code.Read More ...

Continue Reading
ruby:2.5 security update

ruby [2.5.9-109.0.1] - Rebuild with a dependency containing fix for Orabug: 33921593 [2.5.9-109] - Properly fix command injection vulnerability in Rdoc. Related: CVE-2021-31799 [2.5.9-108] - Fix comma ...

Continue Reading
Google Researchers Detail 5-Year-Old Apple Safari Vulnerability Exploited in the Wild

[![Apple Safari Vulnerability]( ...

Continue Reading

Vulnerability in the Oracle Cloud Infrastructure product of Oracle Cloud Services. Easily exploitable vulnerability allows high privileged attacker with network access to compromise Oracle Cloud Infra ...

Continue Reading

Back to Main

Subscribe for the latest news:
Generated by Feedzy