Severity High Analysis Summary The vulnerability is due to incomplete validation and error checking for the file path when specific software is uploaded. An attacker could […]
Severity High Analysis Summary Two WordPress plugins, InfiniteWP Client and WP Time Capsule, suffer from the same critical authorization bypass bug that allows adversaries to access […]
Severity High Analysis Summary Description: Improper access control in driver for Intel(R) VTune(TM) Amplifier for Windows* before update 8 may allow an authenticated user to potentially […]
Severity High Analysis summary A spoofing vulnerability exists in the way Windows CryptoAPI (Crypt32.dll) validates Elliptic Curve Cryptography (ECC) certificates. An attacker could exploit the vulnerability […]
Severity High Analysis Summary This vulnerability could be exploited by an attacker with network access to the affected systems. An attacker could obtain sensitive information or […]
Severity High Analysis Summary Incorrect session validation could allow an attacker with a valid session, with low privileges, to perform firmware updates and other administrative operations […]
Severity Medium Analysis Summary CVE-2019-12713 The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of the affected software. An attacker […]
Severity High Analysis Summary Security researchers have disclosed serious flaws in hundreds of millions of cable modems that they say could be exploited without leaving a […]
Severity Medium Analysis Summary VMware Workspace ONE SDK could allow a remote attacker to obtain sensitive information, caused by improper certificate verification. By using man-in-the-middle techniques […]