CVE-2024-27899 : SAP NETWEAVER AS JAVA USER MANAGEMENT ENGINE 7.50 USER ADMIN APPLICATION PASSWORD RECOVERY
Description Self-Registration and Modify your own profile in User Admin Application of NetWeaver AS Java does not enforce proper security
Description Self-Registration and Modify your own profile in User Admin Application of NetWeaver AS Java does not enforce proper security
Continuous Integration (CI) focuses on frequently merging code changes from multiple developers into a shared repository. It involves automatically building
Description A problem has been identified in the CloudStack additional VM configuration (extraconfig) feature which can be misused by anyone
Description In Flowmon versions prior to 11.1.14 and 12.3.5, an operating system command injection vulnerability has been identified. An unauthenticated
In recent years, the proliferation of APIs (Application Programming Interfaces) has revolutionized how software systems interact, enabling seamless data exchange
Description Memory corruption while redirecting log file to any file location with any file name. References https://docs.qualcomm.com/product/publicresources/securitybulletin/april-2024-bulletin.html For More Information
Description In the Linux kernel, the following vulnerability has been resolved: usb: misc: ljca: Fix double free in error handling
Malicious Bots are computer programs that automatically perform the specified tasks for which they are created to harm the system
Description In the Linux kernel, the following vulnerability has been resolved: netfilter: nftables: exthdr: fix 4-byte stack OOB write If
Description TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain an unauthenticated remote command execution (RCE) vulnerability via multiple parameters in the
Description Command Injection in the diagnostics interface of the Bosch Network Synchronizer allows unauthorized users full access to the device.
Basic Mitigation Measures Some of the simple measures you can implement to block at least a few bots and reduce
Description This vulnerability allows remote attackers to reset the password of anonymous users without authorization on the affected LG LED
Understanding Kubernetes WAF At its essence, the Kubernetes Web Application Firewall (WAF) is a security mechanism designed to block, monitor,
Description There is stack-based buffer overflow vulnerability in pc_change_act function in Linksys E1000 router firmware version v.2.1.03 and before, leading
CoAP is a lightweight application-layer protocol designed specifically for IoT devices with limited resources, such as sensors, actuators, and low-power
Description RaspberryMatic is an open-source operating system for HomeMatic internet-of-things devices. RaspberryMatic / OCCU prior to version 3.75.6.20240316 contains a
Description A vulnerability was found in Tenda AC18 15.03.05.05. It has been rated as critical. This issue affects the function
Navigating Cloud Security Challenges In today’s digital landscape, the migration to cloud environments has become a cornerstone of modern business
Description Apache Airflow, versions 2.8.0 through 2.8.2, has a vulnerability that allows an authenticated user with limited permissions to access
Description Intumit SmartRobot uses a fixed encryption key for authentication. Remote attackers can use this key to encrypt a string
Description DIR-822 Rev. B Firmware v2.02KRB09 and DIR-822-CA Rev. B Firmware v2.03WWb01 suffer from a LAN-Side Unauthenticated Remote Code Execution
Description Buffer overflow in identifier field of WSD probe request process of Small Office Multifunction Printers and Laser Printers(*) which
In today’s interconnected world, managing a large number of remote devices efficiently and securely is a significant challenge for organizations.