Severity Medium Analysis Summary A manipulated PC Worx or Config+ project file could lead to arbitrary code execution due to insufficient input data validation. Impact Improper […]
Severity High Analysis Summary A directory traversal vulnerability may allow an attacker to bypass authentication and log on to an affected product’s management console as a […]
Severity High Analysis Summary Affected versions of Apex One could be exploited by an attacker utilizing a command injection vulnerability to extract files from an arbitrary […]
Severity High Analysis Summary Multiple vulnerabilities have been discovered in PHP, the most severe of which could allow for arbitrary code execution. PHP is a programming […]
Severity Medium Analysis Summary The Jakarta Multipart parser in Apache Struts 2 2.3.x before 2.3.32 and 2.5.x before 2.5.10.1 has incorrect exception handling and error-message generation […]
Severity Medium Analysis Summary The integrated web server of the affected devices could allow remote attackers to obtain web configuration data, which can be accessed without […]
Severity High Analysis Summary CVE-2019-13549 The authentication mechanism on affected systems does not provide a sufficient level of protection against unauthorized configuration changes. Primary operations, namely […]
Severity Medium Analysis Summary Google has released Chrome 78 to the Stable desktop channel, with new improvements, features, and 37 security fixes. Included in this release is the […]
Severity High Analysis Summary CVE-2018-6156 Incorrect derivation of a packet length in WebRTC caused heap corruption via a crafted video file. This resulted in a potentially […]