CVE-2023-2269 : LINUX KERNEL 6.2.0 IOCTL.C DM_GET_INACTIVE_TABLE DEADLOCK
Description A denial of service problem was found, due to a possible recursive locking scenario, resulting in a deadlock in
Description A denial of service problem was found, due to a possible recursive locking scenario, resulting in a deadlock in
What is Serialization? Serialization is the process of turning an item into a format that can be transmitted over a
Description Improper error message handling in Zyxel ZyWALL/USG series firmware versions 4.60 through 4.73, VPN series firmware versions 4.60 through
What Is Security Misconfiguration? What Is Security Misconfiguration? Security misconfiguration refers to the failure to properly configure and maintain the
Description Gipsy is a multi-purpose discord bot which aim to be as modular and user-friendly as possible. In versions prior
Description VMware Aria Operations for Logs contains a deserialization vulnerability. An unauthenticated, malicious actor with network access to VMware Aria
Description The Flexi Classic and Flexi Soft Gateways SICK UE410-EN3 FLEXI ETHERNET GATEW., SICK UE410-EN1 FLEXI ETHERNET GATEW., SICK UE410-EN3S04
Have you ever wondered how important XML is? And how insecure it can be if XML is parsed in an
Description A CWE-129: Improper validation of an array index vulnerability exists where a specially crafted Ethernet request could result in
Automated threats identified by the OWASP organization are malicious activities performed by automated tools. Account aggregation is one such automated
Description vm2 is a sandbox that can run untrusted code with whitelisted Node’s built-in modules. There exists a vulnerability in
Description Authentication Bypass by Alternate Name vulnerability in DTS Electronics Redline Router firmware allows Authentication Bypass.This issue affects Redline Router:
Description memory corruption in modem due to improper check while calculating size of serialized CoAP message. References https://www.qualcomm.com/company/product-security/bulletins/april-2023-bulletin For More
Description An issue found in D-Link DSL-3782 v.1.03 allows remote authenticated users to execute arbitrary code as root via the
Using vulnerable and outdated components is the sixth category in OWASP Top 10 web application security risks and one of
Description Due to missing authentication and input sanitization of code the EventLogServiceCollector of SAP Diagnostics Agent – version 720, allows
All about Cross-site Scripting Cross-site scripting (XSS) is a type of web vulnerability that allows attackers to inject malicious scripts
Description IBM TRIRIGA 4.0 is vulnerable to an XML external entity injection (XXE) attack when processing XML data. A remote
Description Dell Power Manager, versions 3.10 and prior, contains an Improper Access Control vulnerability. A low-privileged attacker could potentially exploit
Description Yellobrik PEC-1864 implements authentication checks via javascript in the frontend interface. When the device can be accessed over the
Description A vulnerability in the web-based management interface of Cisco Secure Network Analytics could allow an authenticated, remote attacker to
What is meant by Broken Access Control? Broken access control is the first category in OWASP Top 10 web application
Description The listed versions of Nexx Smart Home devices could allow any user to register an already registered alarm or
Description Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’) vulnerability in Akbim Computer Panon allows SQL