Severity High Analysis Summary #1 Authentication Bypass Details: IDRM has an API endpoint at /albatross/saml/idpSelection that associates an ID provided by the attacker with a valid […]
Severity Medium Analysis Summary Xilinx 7-series and some 6-series FPGAs are discovered to be vulnerable to new Starbleed vulnerability. It’s a new security bug that impacts […]
Severity High Analysis Summary The vulnerability is due to insufficient CSRF protections for the web-based management interface on an affected device. An attacker could exploit this […]
Severity High Analysis Summary The vulnerability exists because the affected software fails to check the bounds of input data. An attacker could exploit this vulnerability by […]
Severity High Analysis Summary CVE-2020-3194 The vulnerability exists due to insufficient validation of certain elements with a Webex recording stored in either the Advanced Recording Format […]
Severity Medium Analysis Summary Google Chrome could allow a remote attacker to execute arbitrary code on the system, caused by a use-after-free in speech recognizer. By […]
Severity Medium Analysis Summary A denial of service vulnerability exists in Windows DNS when it fails to properly handle queries. An attacker who successfully exploited this […]
Severity Medium Analysis Summary CVE-2018-5390 Certain Linux kernel versions can be forced to make resource intensive calls for every incoming packet, which can lead to a […]
Severity Medium Analysis Summary CVE-2019-19300 A vulnerability exists in affected products that could allow remote attackers to affect the availability of the devices under certain conditions. […]