Severity Medium Analysis Summary CVE-2019-13554 The affected product has an unsecured Telnet protocol that may allow a user to create an authenticated session using generic default […]
Severity High Analysis Summary An attacker could send a malicious link to an authenticated operator, which may allow remote attackers to perform actions with the permissions […]
Severity Medium Analysis Summary A vulnerability in older versions of the Joomla content management system (CMS), a popular web-based application for building and managing websites. It’s […]
Severity Medium Analysis Summary CVE-2019-10969 An authenticated attacker may abuse the ping feature to execute unauthorized commands on the router, which could allow an attacker to […]
Severity High Analysis Summary CVE-2019-12679, CVE-2019-12680, CVE-2019-12681, CVE-2019-12682, CVE-2019-12683, CVE-2019-12684, CVE-2019-12685, CVE-2019-12686 These vulnerabilities exist due to improper input validation. An attacker could exploit these vulnerabilities […]
Severity High Analysis Summary The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending malicious commands to the web-based management […]
Severity High Analysis Summary Service paths in some Yokogawa applications are unquoted and contain spaces. This may allow a local attacker to execute malicious files by […]
Severity Medium Analysis Summary Exim is vulnerable to a heap-based buffer overflow, caused by improper bounds checking by the string_vformat function in string.c. By sending an […]
Severity Medium Analysis Summary The vulnerability is due to incomplete input and validation checking mechanisms for certain SPF messages that are sent to an affected device. […]