CVE-2023-48188 : OPARTDEVIS MODULE UP TO 4.5.18/4.6.12 ON PRESTASHOP GETMODULETRANSLATION SQL INJECTION
Description SQL injection vulnerability in PrestaShop opartdevis v.4.5.18 thru v.4.6.12 allows a remote attacker to execute arbitrary code via a
Description SQL injection vulnerability in PrestaShop opartdevis v.4.5.18 thru v.4.6.12 allows a remote attacker to execute arbitrary code via a
Description A null pointer dereference flaw was found in the nft_inner.c functionality of netfilter in the Linux kernel. This issue
Memcache is a high-performance, distributed memory caching system used to improve website and application performance. It stores frequently accessed data
Description An issue was discovered in Network Optix NxCloud before 23.1.0.40440. It was possible to add a fake VMS server
Description Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 25.0.0 and prior to
Description A vulnerability in the web-based management allows an unauthenticated remote attacker to inject arbitrary system commands and gain full
Description A command injection exists in Ray’s cpu_profile URL parameter allowing attackers to execute os commands on the system running
Description There is a buffer overflow vulnerability in the underlying AirWave client service that could lead to unauthenticated remote code
Description SAP Business One installation – version 10.0, does not perform proper authentication and authorization checks for SMB shared folder.
In a TCP (Transmission Control Protocol) connection, a three-way handshake is performed between the client and the server to establish
Description An OS command injection vulnerability has been reported to affect QuMagie. If exploited, the vulnerability could allow authenticated users
Prophaze Highlights the Digital Frontline in Israel-Hamas Conflict In recent times, the world has witnessed an alarming surge in Distributed
Description Microsoft Edge (Chromium-based) Information Disclosure Vulnerability. References https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36409 For More Information CVERecord
Description A local non-privileged user can make improper GPU memory processing operations to gain access to already freed memory. References
Tsunami is an open-source cybersecurity framework developed by Google. It enables security professionals to conduct large-scale, high-fidelity network security assessments,
Description Memory corruption in WLAN Firmware while parsing a NAN management frame carrying a S3 attribute. References https://www.qualcomm.com/company/product-security/bulletins/november-2023-bulletin For More
When it comes to maintaining your online presence and increasing website performance, you need a robust WAF (Web Application Firewall)
Description The brcm80211 component in the Linux kernel through 6.5.10 has a brcmf_cfg80211_detach use-after-free in the device unplugging (disconnect the
Description An OS command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability
Description GLPI is a free asset and IT management software package. Starting in version 10.0.7 and prior to version 10.0.10,
Description A use-after-free flaw was found in setup_async_work in the KSMBD implementation of the in-kernel samba server and CIFS in
Description All versions of Confluence Data Center and Server are affected by this unexploited vulnerability. There is no impact to
In the realm of cybersecurity, Domain Name System (DNS) amplification attacks have emerged as a significant concern for organizations worldwide.
The Character Generator (CharGEN) protocol was originally designed for testing and debugging purposes. It allows a client to request a