Severity High Analysis Summary CVE-2020-12022 An improper validation vulnerability exists that could allow an attacker to inject specially crafted input into memory where it can be […]
Severity High Analysis Summary CVE-2020-3298 The vulnerability is due to improper memory protection mechanisms while processing certain OSPF packets. An attacker could exploit this vulnerability by […]
Severity Medium Analysis Summary The CODESYS WebVisu and the CODESYS Remote TargetVisu are susceptible to a privilege escalation allowing access to visualization screens that are intended […]
Severity Medium Analysis Summary In the most recent skimmer campaign analyzed by researchers, attackers are leveraging favicons to distribute their skimmer. Favicons are image file displayed […]
Severity Medium Analysis Summary A potential info leak of kernel private memory to userspace was found in the kernel’s implementation of core dumping userspace processes. An […]
Severity High Analysis Summary The vulnerability is due to insufficient identity verification of the KDC when a successful authentication response is received. An attacker could exploit […]
Severity High Analysis Summary CVE-2020-3283 The vulnerability is due to a communication error between internal functions. An attacker could exploit this vulnerability by sending a crafted […]
Severity Medium Description SAP SE (NYSE: SAP) continuously reviews and optimizes its cybersecurity infrastructure. The company has identified that some of its cloud products do not […]
Severity Medium Analysis Summary Linux Kernel is vulnerable to a denial of service, caused by a pivot_root race condition in fs/namespace.c. By corrupting a mountpoint reference […]