Severity High Analysis Summary CVE-2020-9558 Adobe Bridge could allow a remote attacker to obtain sensitive information, caused by an out-of-bounds read. By persuading a victim to […]
Severity Medium Analysis Summary CVE-2020-6461 Google Chrome could allow a remote attacker to execute arbitrary code on the system, caused by a use-after-free in storage. By […]
Severity High Analysis Summary CVE-2020-9588 Adobe Magento Commerce and Open Source editions could allow a remote authenticated attacker to bypass security restrictions, caused by an observable […]
Severity High Analysis Summary F5 BIG-IQ Centralized Management could allow a remote attacker to bypass security restrictions, caused by improper authentication validation in the high availability […]
Severity Medium Analysis Summary F5 NGINX Controller is vulnerable to a man-in-the-middle attack, caused by using HTTP communication in the install.sh installer script to check and […]
Severity Medium Analysis Summary PHPGurukul Complaint Management System is vulnerable to cross-site scripting, caused by improper validation of user-supplied input by the resgistration.php script. A remote […]
Severity High Analysis Summary CVE-2018-4061 A specially crafted authenticated HTTP request can inject arbitrary commands, resulting in remote code execution. CVE-2018-4062 Activating SNMPD outside of the […]
Severity High Analysis Summary Server or client applications that call the SSL_check_chain() function during or after a TLS 1.3 handshake may crash due to a NULL […]
Severity High Analysis Summary An unprotected logging route may allow an attacker to write endless log statements into the database without space limits or authentication. This […]