CISA: CISA Releases Five Industrial Control Systems Advisories
CISA Releases Five Industrial Control Systems Advisories CISA released five Industrial Control Systems (ICS) advisories on December 7, 2023. These...
CISA Releases Five Industrial Control Systems Advisories CISA released five Industrial Control Systems (ICS) advisories on December 7, 2023. These...
AcuAutomate is an unofficial Acunetix CLI tool that simplifies automated pentesting and bug hunting across extensive targets. It's a valuable...
A collection of security flaws in the firmware implementation of 5G mobile network modems from major chipset vendors such as...
The North Korean threat actor known as Kimsuky has been observed targeting research institutes in South Korea as part of...
Unauthorized websites distributing trojanized versions of cracked software have been found to infect Apple macOS users with a new Trojan-Proxy...
Ransomware attacks have become a significant and pervasive threat in the ever-evolving realm of cybersecurity. Among the various iterations of...
Ransomware attacks have become a significant and pervasive threat in the ever-evolving realm of cybersecurity. Among the various iterations of...
Unauthorized websites distributing trojanized versions of cracked software have been found to infect Apple macOS users with a new Trojan-Proxy...
A collection of security flaws in the firmware implementation of 5G mobile network modems from major chipset vendors such as...
The North Korean threat actor known as Kimsuky has been observed targeting research institutes in South Korea as part of...
The North Korean threat actor known as Kimsuky has been observed targeting research institutes in South Korea as part of...
A collection of security flaws in the firmware implementation of 5G mobile network modems from major chipset vendors such as...
Researchers from the Vrije Universiteit Amsterdam have disclosed a new side-channel attack called SLAM that could be exploited to leak...
Ransomware attacks have become a significant and pervasive threat in the ever-evolving realm of cybersecurity. Among the various iterations of...
NAME__________IBM Informix Dynamic Server buffer overflowPlatforms Affected:IBM Informix Dynamic Server 14.10 IBM Informix Dynamic Server 12.10Risk Level:6.2Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION__________IBM...
NAME__________IBM Informix Dynamic Server buffer overflowPlatforms Affected:IBM Informix Dynamic Server 14.10 IBM Informix Dynamic Server 12.10Risk Level:6.2Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION__________IBM...
NAME__________osCommerce SQL injectionPlatforms Affected:Risk Level:7.3Exploitability:UnprovenConsequences:Data Manipulation DESCRIPTION__________osCommerce is vulnerable to SQL injection. A remote attacker could send specially crafted SQL...
NAME__________Phoenix Technologies Phoenix SecureCore code executionPlatforms Affected:Phoenix Technologies Phoenix SecureCoreRisk Level:7.5Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Phoenix Technologies Phoenix SecureCore could allow a local...
NAME__________AMI AptioV code executionPlatforms Affected:AMI Aptio VRisk Level:7.5Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________AMI AptioV could allow a local authenticated attacker to execute arbitrary...
NAME__________AMI Aptio V code executionPlatforms Affected:AMI Aptio VRisk Level:7.5Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________AMI Aptio V could allow a local authenticated attacker to...
NAME__________ICONICS SCADA Suite code executionPlatforms Affected:Risk Level:6.6Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________ICONICS SCADA Suite could allow a remote authenticated attacker to execute arbitrary...
NAME__________webMethods security bypassPlatforms Affected:Software AG webMethods 10.11Risk Level:7.3Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION__________webMethods could allow a remote attacker to bypass security restrictions, caused...
NAME__________Microsoft Edge (Chromium-based) information disclosurePlatforms Affected:Microsoft Edge (Chromium-based)Risk Level:4.8Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Microsoft Edge (Chromium-based) could allow a remote attacker to obtain...
NAME__________Insyde InsydeH2O denial of servicePlatforms Affected:Insyde InsydeH2O 5.2 Insyde InsydeH2O 5.3 Insyde InsydeH2O 5.4 Insyde InsydeH2O 5.5 Insyde InsydeH2O 5.6Risk...