CVE-2022-36924 : ZOOM ROOMS PRIOR 5.12.6 ON WINDOWS INSTALLER UNCONTROLLED SEARCH PATH
Description The Zoom Rooms Installer for Windows prior to 5.12.6 contains a local privilege escalation vulnerability. A local low-privileged user
Description The Zoom Rooms Installer for Windows prior to 5.12.6 contains a local privilege escalation vulnerability. A local low-privileged user
Description A vulnerability has been found in Backdoor.Win32.RemServ.d and classified as critical. This vulnerability affects unknown code of the component
Description Oracle Solaris version 10 1/13, when using the Common Desktop Environment (CDE), is vulnerable to a privilege escalation vulnerability.
Description A vulnerability was found in Fortinet FortiOS and FortiProxy. It has been classified as very critical. This affects an
Description Panini Everest Engine 2.0.4 allows unprivileged users to create a file named Everest.exe in the %PROGRAMDATA%\Panini folder. This leads
Description A vulnerable component of Orion Platform was vulnerable to SQL Injection, an authenticated attacker could leverage this for privilege
Description VMware Tools (12.0.0, 11.x.y and 10.x.y) contains a local privilege escalation vulnerability. A malicious actor with local non-administrative access
Description This vulnerability allows local user to delete arbitrary file in the system and bypassing security protection which can be
Description Dell PowerProtect Cyber Recovery, versions prior to 19.11, contain a privilege escalation vulnerability on virtual appliance deployments. A lower-privileged
Description Comodo Antivirus 12.2.2.8012 has a quarantine flaw that allows privilege escalation. To escalate privilege, a low-privileged attacker can use
A vulnerability was found in Gradle up to 7.1 on Unix. It has been declared as critical. Affected by this
In the GetPaid WordPress plugin before 2.3.4, users with the contributor role and above can create a new Payment Form,
The Smart Slider 3 Free and pro WordPress plugins before 3.5.0.9 did not sanitise the Project Name before outputting it
Runtime Security in Kubernetes deployment might be policed based on a pod-by-pod. A pod is a group of containers that
Kubernetes Container Security in Deployment Phase Kubernetes infrastructure ought to be designed firmly before workloads being deployed. From a security
Overview : Kubernetes helps the enterprises to automate their application deployment for the business benefits. Now-a-days Kubernetes security can be
Why would your Business need VAPT? It is very necessary to conduct a network security audit periodically to ensure the
CVE-2019-20901 Proof of Concept : The login.jsp resource in Jira before version 8.5.2, and from version 8.6.0 before version
[vc_row][vc_column][vc_column_text] Overview : In Argo versions prior to v1.5.0-rc1, it was possible for authenticated Argo users to submit API calls
Overview : In Apache HTTP Server 2.4.0 to 2.4.41, redirects configured with mod_rewrite that were intended to be self-referential might
[vc_row][vc_column][vc_column_text] Overview : LogicalDoc before 8.3.3 allows SQL Injection. LogicalDoc populates the list of available documents by querying the database.
Overview : An issue was discovered in chat.php in LiveZilla Live Chat 8.0.1.3 (Helpdesk). A blind JavaScript injection lies in
Overview : Multiple SQL injection vulnerabilities in D-Link DSR Routers Affected Product(s) : D-Link DSR-150 (Firmware < v1.08B44) D-Link DSR-150N
Overview : Cisco Aironet Access Points Unauthorized Access Vulnerability CWE-284 / CVE-2019-15260 A vulnerability in Cisco Aironet Access Points (APs) Software could