CVE-2023-35087 : ASUS RT-AX56U V2/RT-AC86U CM_PROCESSCHANGEDCONFIGMSG FORMAT STRING
Description It is identified a format string vulnerability in ASUS RT-AX56U V2 & RT-AC86U. This vulnerability is caused by lacking
Description It is identified a format string vulnerability in ASUS RT-AX56U V2 & RT-AC86U. This vulnerability is caused by lacking
Description Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’) vulnerability in HGiga iSherlock 4.5 (iSherlock-user
Broken Object Level Authorization is a security vulnerability that allows an attacker to access and manipulate data or functionality that
Account creation is an essential process in web application security, but it is also a target for automated attacks. One
A brute-force attack is a method of guessing a password or other authentication credential by trying multiple combinations until the
Protocol validation is a critical aspect of cybersecurity that involves verifying whether network protocols adhere to industry standards and specifications.
Input validation is the process of verifying the integrity of data that is received by an application or system. This
Audit logging is a critical component of cybersecurity that helps organizations monitor and record events that occur within their systems
Vulnerability scanning is the process of systematically scanning and identifying potential security vulnerabilities in a system or network. This involves
Token cracking is a type of OWASP-identified automated threat that involves an attacker attempting to guess or crack access tokens
Spamming is a prevalent OWASP-identified automated threat that is used by attackers to flood web applications with unwanted and unsolicited
Sniping is an OWASP-identified automated threat that is commonly used by attackers to exploit the weaknesses of web applications. This
Skewing is an OWASP identified automated threat that is commonly used by attackers to bypass security measures and gain unauthorized
Description It is identified a vulnerability of Unrestricted Upload of File with Dangerous Type in the file uploading function in
Scraping is a common OWASP-identified automated threat, used by attackers to automate the collection of data from websites. It involves
Footprinting is a type of OWASP-identified automated attack that involves gathering information about a target system or network to identify
Fingerprinting is a type of OWASP automated threat that is used to identify information about a target system or network.
Expediting attacks, also known as “rush attacks”, are a type of OWASP automated threat that targets a business’s system or
Description Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior
Denial of Service (DoS) attacks have become increasingly prevalent in recent years. A DoS attack is an attempt to disrupt
Description Emby Server is a user-installable home media server which stores and organizes a user’s media files of virtually any
Web applications have become an integral part of modern business operations. They enable companies to interact with their customers, employees,
An HTTP flood DDoS attack is a type of cyber attack that aims to overwhelm a web server with a
Description InstantPlay which included vulnerable script which could execute javascript in Galaxy Store prior to version 4.5.49.8 allows attackers to