Incorrect Control over DrayTek Vigor Router
Overview : On DrayTek Vigor2925 devices with firmware 3.8.4.3, Incorrect Access Control exists in loginset.htm, and can be used to
Overview : On DrayTek Vigor2925 devices with firmware 3.8.4.3, Incorrect Access Control exists in loginset.htm, and can be used to
Overview : FiberHome HG2201T 1.00.M5007_JS_201804 devices allows pre-authentication Directory Traversal for reading arbitrary files. Affected Product(s) : FiberHome HG2201T Vulnerability
Why would your Business need VAPT? It is very necessary to conduct a network security audit periodically to ensure the
Broken Object Level Authorization is a security vulnerability that allows an attacker to access and manipulate data or functionality that
Description wasmtime is a fast and secure runtime for WebAssembly. In affected versions wasmtime’s code generator, Cranelift, has a bug
What Is Remote Code Execution? Remote Code Execution or RCE, also known as arbitrary code execution is a network vulnerability
The OWASP Top 10 API security is a classification of the most common attacks on the web. The vulnerabilities exploited
Why would your Business need VAPT? It is very necessary to conduct a network security audit periodically to ensure the
[vc_row][vc_column][vc_column_text] Overview : In Rockwell Automation RSLinx Classic versions 4.1.00 and prior, an authenticated local attacker could modify a registry
Overview : In Apache HTTP Server 2.4.0 to 2.4.41, redirects configured with mod_rewrite that were intended to be self-referential might
[vc_row][vc_column][vc_column_text] Overview : Local Privilege Escalation can occur in PHOENIX CONTACT PORTICO SERVER through 3.0.7 when installed to run as
Overview : cPanel before 84.0.20 allows a demo account to achieve remote code execution via a cpsrvd rsync shell (SEC-544).
Overview : cPanel before 82.0.18 allows attackers to leverage virtual mail accounts in order to bypass account suspensions (SEC-508). Affected