Avian JVM vm::arrayCopy() Multiple Integer Overflows
Posted by Pietro Oliva via Fulldisclosure on Aug 11Vulnerability title: Avian JVM vm::arrayCopy() Multiple Integer Overflows Author: Pietro Oliva CVE:...
Posted by Pietro Oliva via Fulldisclosure on Aug 11Vulnerability title: Avian JVM vm::arrayCopy() Multiple Integer Overflows Author: Pietro Oliva CVE:...
Posted by Egidio Romano on Aug 11SugarCRM < 10.1.0 (Reports Export) SQL Injection Vulnerability *• Software Link:*https://www.sugarcrm.com *• Affected Versions:*...
Cisco is warning businesses that use its wireless VPN and firewall routers to install updates immediately due to a critical...
A vulnerability found in the update service of the Cisco Webex Meetings Desktop App for Windows could allow an unprivileged local attacker...
Two high-severity flaws in the SHAREit Android app allow an attacker to bypass the file transfer application’s device authentication mechanism...
The remote execution flaw exists because some field types do not properly sanitize data from non-form sources and this can...
Linux Kernel is prone to an arbitrary code-execution vulnerability.An attacker can exploit this issue to execute arbitrary code in the...
I have recently found a vulnerability on my Netgear Managed Switch I use at home. Its an information disclosure vulnerability....
Attackers can bypass controls to distribute malware. eBay has refused to fix a major flaw in its online sales platform...
LG today released a security update for some of its latest smartphones to resolve a severe vulnerability found in the...
So it seems there is a Fitbit vulnerability involving the BlueTooth implementation that can be used to embed self replicating...
Days after a security flaw in Android's media playback system Stagefright was publicly revealed, threatening nearly a billion Android devices,...