What Is Tsunami Google?
Tsunami is an open-source cybersecurity framework developed by Google. It enables security professionals to conduct large-scale, high-fidelity network security assessments,
Tsunami is an open-source cybersecurity framework developed by Google. It enables security professionals to conduct large-scale, high-fidelity network security assessments,
Description Memory corruption in WLAN Firmware while parsing a NAN management frame carrying a S3 attribute. References https://www.qualcomm.com/company/product-security/bulletins/november-2023-bulletin For More
When it comes to maintaining your online presence and increasing website performance, you need a robust WAF (Web Application Firewall)
Description The brcm80211 component in the Linux kernel through 6.5.10 has a brcmf_cfg80211_detach use-after-free in the device unplugging (disconnect the
Description An OS command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability
Description GLPI is a free asset and IT management software package. Starting in version 10.0.7 and prior to version 10.0.10,
Description A use-after-free flaw was found in setup_async_work in the KSMBD implementation of the in-kernel samba server and CIFS in
Description All versions of Confluence Data Center and Server are affected by this unexploited vulnerability. There is no impact to
In the realm of cybersecurity, Domain Name System (DNS) amplification attacks have emerged as a significant concern for organizations worldwide.
The Character Generator (CharGEN) protocol was originally designed for testing and debugging purposes. It allows a client to request a
Description Prestashop opartlimitquantity 1.4.5 and before is vulnerable to SQL Injection. OpartlimitquantityAlertlimitModuleFrontController::displayAjaxPushAlertMessage()` has sensitive SQL calls that can be executed
Description A Buffer overflow vulnerability in DreamSecurity MagicLine4NX versions 1.0.0.1 to 1.0.0.26 allows an attacker to remotely execute code. References
Description Leave Management System Project v1.0 is vulnerable to multiple Authenticated SQL Injection vulnerabilities. The ‘setcasualleave’ parameter of the admin/setleaves.php
Description Under certain conditions, Nessus Network Monitor was found to not properly enforce input validation. This could allow an admin
Network Time Protocol (NTP) is a protocol used to synchronize the time across computer systems and networks. It ensures accurate
UDP (User Datagram Protocol) is a connectionless protocol that allows data transmission between devices on a network. It is often
Description vCenter Server contains an out-of-bounds write vulnerability in the implementation of the DCERPC protocol. A malicious actor with network
JavaScript supply chain attacks involve the compromise of trusted JavaScript code libraries or components used in web applications. Attackers exploit
Description The affected product is vulnerable to an improper authentication vulnerability, which may allow an attacker to impersonate a legitimate
Description XXL-RPC is a high performance, distributed RPC framework. With it, a TCP server can be set up using the
Description Apache Commons BCEL has a number of APIs that would normally only allow changing specific class characteristics. However, due
Description Cisco is aware of active exploitation of a previously unknown vulnerability in the web UI feature of Cisco IOS
Description The Linux kernel before 6.5.4 has an es1 use-after-free in fs/ext4/extents_status.c, related to ext4_es_insert_extent. References https://lore.kernel.org/lkml/aa03f191-445c-0d2e-d6d7-0a3208d7df7a%40huawei.com/T/ https://www.spinics.net/lists/stable-commits/msg317086.html https://lkml.org/lkml/2023/8/13/477 https://github.com/torvalds/linux/commit/768d612f79822d30a1e7d132a4d4b05337ce42ec
Description Potential buffer overflow vulnerability in the Zephyr IEEE 802.15.4 nRF 15.4 driver. References https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-rf6q-rhhp-pqhf For More Information CVERecord