CISA: CISA and FBI Release Secure by Design Alert Urging Manufacturers to Eliminate Defects in SOHO Routers
CISA and FBI Release Secure by Design Alert Urging Manufacturers to Eliminate Defects in SOHO Routers Today, CISA and the...
CISA and FBI Release Secure by Design Alert Urging Manufacturers to Eliminate Defects in SOHO Routers Today, CISA and the...
Ivanti is alerting of two new high-severity flaws in its Connect Secure and Policy Secure products, one of which is...
A pair of recently disclosed zero-day flaws in Ivanti Connect Secure (ICS) virtual private network (VPN) devices have been exploited...
Cybersecurity researchers are calling attention to the "democratization" of the phishing ecosystem owing to the emergence of Telegram as an...
The SEC isn't giving SaaS a free pass. Applicable public companies, known as "registrants," are now subject to cyber incident...
A financially motivated threat actor known as UNC4990 is leveraging weaponized USB devices as an initial infection vector to target...
NAME__________Exclusive Addons for Elementor Plugin for WordPress cross-site scriptingPlatforms Affected:WordPress Exclusive Addons for Elementor Plugin for WordPress 2.6.8Risk Level:6.4Exploitability:HighConsequences:Cross-Site Scripting...
NAME__________Meks Smart Social Widget Plugin for WordPress cross-site scriptingPlatforms Affected: WordPress Meks Smart Social Widget plugin for WordPress 1.6.3Risk Level:4.4Exploitability:HighConsequences:Cross-Site...
NAME__________Backuply Plugin for WordPress directory traversalPlatforms Affected:WordPress Backuply Plugin for WordPress 1.2.3Risk Level:6.5Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Backuply Plugin for WordPress could allow...
NAME__________TOTOLINK N200RE buffer overflowPlatforms Affected:TOTOLINK N200RE 9.3.5u.6139_B20201216Risk Level:7.2Exploitability:Proof of ConceptConsequences:Gain Access DESCRIPTION__________TOTOLINK N200RE is vulnerable to a stack-based buffer overflow,...
NAME__________NODERP information disclosurePlatforms Affected:Shanxi Diankeyun Technology NODERP 6.0.2 Shanxi Diankeyun Technology NODERP 6.0.1Risk Level:5.3Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________NODERP could allow a remote...
NAME__________TOTOLINK N200RE buffer overflowPlatforms Affected:TOTOLINK N200RE 9.3.5u.6139_B20201216Risk Level:7.2Exploitability:Proof of ConceptConsequences:Gain Access DESCRIPTION__________TOTOLINK N200RE is vulnerable to a stack-based buffer overflow,...
NAME__________TOTOLINK N200RE buffer overflowPlatforms Affected:TOTOLINK N200RE 9.3.5u.6139_B20201216Risk Level:7.2Exploitability:Proof of ConceptConsequences:Gain Access DESCRIPTION__________TOTOLINK N200RE is vulnerable to a stack-based buffer overflow,...
NAME__________TOTOLINK N200RE buffer overflowPlatforms Affected:TOTOLINK N200RE 9.3.5u.6139_B20201216Risk Level:7.2Exploitability:Proof of ConceptConsequences:Gain Access DESCRIPTION__________TOTOLINK N200RE is vulnerable to a stack-based buffer overflow,...
NAME__________Tenda i6 buffer overflowPlatforms Affected:Tenda i6 1.0.0.9(3857)Risk Level:7.2Exploitability:Proof of ConceptConsequences:Gain Access DESCRIPTION__________Tenda i6 is vulnerable to a stack-based buffer overflow,...
NAME__________Tenda W6 buffer overflowPlatforms Affected:Tenda W6 1.0.0.9(4122)Risk Level:7.2Exploitability:Proof of ConceptConsequences:Gain Access DESCRIPTION__________Tenda W6 is vulnerable to a stack-based buffer overflow,...
NAME__________TOTOLINK N200RE buffer overflowPlatforms Affected:TOTOLINK N200RE 9.3.5u.6139_B20201216Risk Level:7.2Exploitability:Proof of ConceptConsequences:Gain Access DESCRIPTION__________TOTOLINK N200RE is vulnerable to a stack-based buffer overflow,...
NAME__________TOTOLINK N200RE buffer overflowPlatforms Affected:TOTOLINK N200RE 9.3.5u.6139_B20201216Risk Level:7.2Exploitability:Proof of ConceptConsequences:Gain Access DESCRIPTION__________TOTOLINK N200RE is vulnerable to a stack-based buffer overflow,...
NAME__________Mitsubishi Electric MELSEC WS Series Ethernet Interface Module security bypassPlatforms Affected:Mitsubishi Electric WS0-GETH00200Risk Level:5.9Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION__________Mitsubishi Electric MELSEC WS Series...
NAME__________TOTOLINK N200RE buffer overflowPlatforms Affected:TOTOLINK N200RE 9.3.5u.6139_B20201216Risk Level:7.2Exploitability:Proof of ConceptConsequences:Gain Access DESCRIPTION__________TOTOLINK N200RE is vulnerable to a stack-based buffer overflow,...
NAME__________SHARP Energy Management Controller with Cloud Service information disclosurePlatforms Affected:SHARP Energy Management Controller with Cloud Services B0.1.9.1Risk Level:4.7Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION__________SHARP...
NAME__________TOTOLINK N200RE buffer overflowPlatforms Affected:TOTOLINK N200RE 9.3.5u.6139_B20201216Risk Level:7.2Exploitability:Proof of ConceptConsequences:Gain Access DESCRIPTION__________TOTOLINK N200RE is vulnerable to a stack-based buffer overflow,...
NAME__________GNU C Library (known as glibc) privilege escalationPlatforms Affected:GNU glibc 2.37Risk Level:7.8Exploitability:UnprovenConsequences:Gain Privileges DESCRIPTION__________GNU C Library (known as glibc) could...
NAME__________Tenda i6 buffer overflowPlatforms Affected:Tenda i6 1.0.0.9(3857)Risk Level:7.2Exploitability:Proof of ConceptConsequences:Gain Access DESCRIPTION__________Tenda i6 is vulnerable to a stack-based buffer overflow,...