Severity High Analysis Summary “Russia and Iran are looking to conduct disruptive cyber-attacks on OT [operational technology] targets in the Middle East in a bid to […]
Severity High Analysis Summary The vulnerability is due to improper validation of API requests. An attacker could exploit this vulnerability by sending a crafted request to […]
Severity High Analysis summary SAP Gateway ACL The SAP Gateway allows non-SAP applications to communicate with SAP applications using the Open Data Protocol (OData). If SAP […]
Severity High Analysis Summary A recently disclosed vulnerability in Oracle WebLogic server that we reported earlier today is being actively exploited to install a new variant […]
Severity High Analysis Summary A deserialization vulnerability in Oracle WebLogic Server. This remote code execution vulnerability is remotely exploitable without authentication, i.e., may be exploited over […]
Severity Medium Analysis Summary Oracle WebLogic application contains a critical deserialization remote code execution vulnerability that affects all versions of the software, which can be triggered […]
Severity High Analysis Summary A number of vulnerabilities are reported in Google Chrome. 1) A use-after-free error related to PDFium can be exploited to corrupt memory. […]
Severity Medium Analysis Summary CVE-2019-6974In the Linux kernel before 4.20.8, kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandles reference counting because of a race condition, leading to a use-after-free. CVE-2019-7221The […]
Severity Medium Analysis Summary An open redirect vulnerability could allow a remote unauthenticated attacker to input a malicious link to redirect users to a malicious site […]