Severity Medium Analysis Summary CVE-2011-1079 The bnep_sock_ioctl function in net/bluetooth/bnep/sock.c in the Linux kernel before 2.6.39 does not ensure that a certain device field ends with […]
Severity High Analysis Summary A type confusion vulnerability can occur when manipulating JavaScript objects due to issues in Array.pop. This can allow for an exploitable crash. […]
Severity Medium Analysis Summary A tampering vulnerability exists in Microsoft Windows when a man-in-the-middle attacker is able to successfully bypass the NTLM MIC (Message Integrity Check) […]
Severity Medium Analysis Summary 1) An integer overflow error related to the “tcp_shifted_skb()” function (net/ipv4/tcp_input.c) when handling TCP Selective Acknowledgement (SACK) segments with minimum TCP MSS […]
Severity High Analysis Summary A use-after-free error related to the Blink can be exploited to execute arbitrary code. The vulnerability is reported in versions prior to […]
Severity Medium Analysis Summary CVE-2017-15095 A deserialization flaw was discovered in the jackson-databind in versions before 2.8.10 and 2.9.1, which could allow an unauthenticated user to […]
Severity Medium Analysis Summary An error when handling objects in memory can be exploited to cause the server stop responding by initiating a series of calls […]
Severity High Analysis Summary CVE-2019-12550 An attacker with access to the hard-coded credentials may gain access to the operating system of the managed switch with root […]
Severity High Analysis Summary A vulnerability in the web-based UI (web UI) of Cisco IOS XE Software could allow an unauthenticated, remote attacker to conduct a […]