CVE-2023-6019 : RAY URL PARAMETER CPU_PROFILE OS COMMAND INJECTION
Description A command injection exists in Ray’s cpu_profile URL parameter allowing attackers to execute os commands on the system running
Description A command injection exists in Ray’s cpu_profile URL parameter allowing attackers to execute os commands on the system running
Description There is a buffer overflow vulnerability in the underlying AirWave client service that could lead to unauthenticated remote code
Description SAP Business One installation – version 10.0, does not perform proper authentication and authorization checks for SMB shared folder.
In a TCP (Transmission Control Protocol) connection, a three-way handshake is performed between the client and the server to establish
Description An OS command injection vulnerability has been reported to affect QuMagie. If exploited, the vulnerability could allow authenticated users
Prophaze Highlights the Digital Frontline in Israel-Hamas Conflict In recent times, the world has witnessed an alarming surge in Distributed
Description Microsoft Edge (Chromium-based) Information Disclosure Vulnerability. References https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36409 For More Information CVERecord
Description A local non-privileged user can make improper GPU memory processing operations to gain access to already freed memory. References
Tsunami is an open-source cybersecurity framework developed by Google. It enables security professionals to conduct large-scale, high-fidelity network security assessments,
Description Memory corruption in WLAN Firmware while parsing a NAN management frame carrying a S3 attribute. References https://www.qualcomm.com/company/product-security/bulletins/november-2023-bulletin For More
When it comes to maintaining your online presence and increasing website performance, you need a robust WAF (Web Application Firewall)
Description The brcm80211 component in the Linux kernel through 6.5.10 has a brcmf_cfg80211_detach use-after-free in the device unplugging (disconnect the
Description An OS command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability
Description GLPI is a free asset and IT management software package. Starting in version 10.0.7 and prior to version 10.0.10,
Description A use-after-free flaw was found in setup_async_work in the KSMBD implementation of the in-kernel samba server and CIFS in
Description All versions of Confluence Data Center and Server are affected by this unexploited vulnerability. There is no impact to
In the realm of cybersecurity, Domain Name System (DNS) amplification attacks have emerged as a significant concern for organizations worldwide.
The Character Generator (CharGEN) protocol was originally designed for testing and debugging purposes. It allows a client to request a
Description Prestashop opartlimitquantity 1.4.5 and before is vulnerable to SQL Injection. OpartlimitquantityAlertlimitModuleFrontController::displayAjaxPushAlertMessage()` has sensitive SQL calls that can be executed
Description A Buffer overflow vulnerability in DreamSecurity MagicLine4NX versions 1.0.0.1 to 1.0.0.26 allows an attacker to remotely execute code. References
Description Leave Management System Project v1.0 is vulnerable to multiple Authenticated SQL Injection vulnerabilities. The ‘setcasualleave’ parameter of the admin/setleaves.php
Description Under certain conditions, Nessus Network Monitor was found to not properly enforce input validation. This could allow an admin
Network Time Protocol (NTP) is a protocol used to synchronize the time across computer systems and networks. It ensures accurate
UDP (User Datagram Protocol) is a connectionless protocol that allows data transmission between devices on a network. It is often