Úvod
NIS2
Naša ponuka
Prečo my
Aktuality
Varovania
Kontakt
Prihlásiť sa
Registrácia
Aktuálne
bezpečnostné
varovania
24.6.2024
ZDI-24-882: VMware vCenter Server Appliance License Server Uncontrolled Memory Allocation Denial-of-Service Vulnerability
www.zerodayinitiative.com
21.6.2024
ZDI-24-898: ESET Smart Security Premium Link Following Local Privilege Escalation Vulnerability
www.zerodayinitiative.com
20.6.2024
ZDI-24-822: (Pwn2Own) HP Color LaserJet Pro MFP 4301fdw CFF Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability
www.zerodayinitiative.com
20.6.2024
ZDI-24-823: (Pwn2Own) QNAP TS-464 TURN Server create_session Server-Side Request Forgery Vulnerability
www.zerodayinitiative.com
20.6.2024
ZDI-24-824: (Pwn2Own) QNAP TS-464 Cloud Utility Command Injection Remote Code Execution Vulnerability
www.zerodayinitiative.com
20.6.2024
ZDI-24-825: (Pwn2Own) QNAP TS-464 Log Upload Command Injection Remote Code Execution Vulnerability
www.zerodayinitiative.com
20.6.2024
ZDI-24-826: (Pwn2Own) QNAP TS-464 Improper Validation Authentication Bypass Vulnerability
www.zerodayinitiative.com
20.6.2024
ZDI-24-827: (Pwn2Own) QNAP TS-464 username Command Injection Remote Code Execution Vulnerability
www.zerodayinitiative.com
20.6.2024
ZDI-24-828: (Pwn2Own) Samsung Galaxy S23 instantgame Improper Input Validation Remote Code Execution Vulnerability
www.zerodayinitiative.com
20.6.2024
ZDI-24-829: (Pwn2Own) Samsung Galaxy S23 McsWebViewActivity Permissive List of Allowed Inputs Remote Code Execution Vulnerability
www.zerodayinitiative.com
20.6.2024
ZDI-24-830: (Pwn2Own) Samsung Galaxy S23 Instant Plays Improper Input Validation Remote Code Execution Vulnerability
www.zerodayinitiative.com
20.6.2024
ZDI-24-831: (Pwn2Own) Samsung Galaxy S23 Galaxy Store Deeplink Permissive List of Allowed Inputs Remote Code Execution Vulnerability
www.zerodayinitiative.com
20.6.2024
ZDI-24-832: (Pwn2Own) Synology RT6600ax Improper Access Control Firewall Bypass Vulnerability
www.zerodayinitiative.com
20.6.2024
ZDI-24-833: (Pwn2Own) Synology BC500 synocam_param.cgi Stack-based Buffer Overflow Remote Code Execution Vulnerability
www.zerodayinitiative.com
20.6.2024
ZDI-24-834: (Pwn2Own) Synology BC500 Improper Compartmentalization Local Privilege Escalation Vulnerability
www.zerodayinitiative.com
20.6.2024
ZDI-24-835: (Pwn2Own) Synology BC500 Protection Mechanism Failure Software Downgrade Vulnerability
www.zerodayinitiative.com
20.6.2024
ZDI-24-836: (Pwn2Own) Synology BC500 update_ntp_config Command Injection Remote Code Execution Vulnerability
www.zerodayinitiative.com
20.6.2024
ZDI-24-837: (Pwn2Own) Wyze Cam v3 Realtek Wi-Fi Driver Heap-Based Buffer Overflow Remote Code Execution Vulnerability
www.zerodayinitiative.com
20.6.2024
ZDI-24-838: (Pwn2Own) Wyze Cam v3 Wi-Fi SSID OS Command Injection Remote Code Execution Vulnerability
www.zerodayinitiative.com
20.6.2024
ZDI-24-839: (Pwn2Own) Wyze Cam v3 Cloud Infrastructure Improper Authentication Remote Code Execution Vulnerability
www.zerodayinitiative.com
20.6.2024
ZDI-24-840: (Pwn2Own) Wyze Cam v3 TCP Traffic Handling Stack-Based Buffer Overflow Remote Code Execution Vulnerability
www.zerodayinitiative.com
20.6.2024
ZDI-24-841: (0Day) Zope CMFCore Uncontrolled Resource Consumption Denial-of-Service Vulnerability
www.zerodayinitiative.com
20.6.2024
ZDI-24-842: Linux Kernel ICMPv6 Router Advertisement Race Condition Remote Code Execution Vulnerability
www.zerodayinitiative.com
20.6.2024
ZDI-24-843: Linux Kernel USB/IP VHCI Driver Race Condition Privilege Escalation Vulnerability
www.zerodayinitiative.com
20.6.2024
ZDI-24-844: (Pwn2Own) Alpine Halo9 prh_l2_sar_data_ind Use-After-Free Remote Code Execution Vulnerability
www.zerodayinitiative.com
20.6.2024
ZDI-24-845: (Pwn2Own) Alpine Halo9 Improper Verification of Cryptographic Signature Vulnerability
www.zerodayinitiative.com
20.6.2024
ZDI-24-846: (Pwn2Own) Alpine Halo9 UPDM_wemCmdCreatSHA256Hash Command Injection Remote Code Execution Vulnerability
www.zerodayinitiative.com
20.6.2024
ZDI-24-847: (Pwn2Own) Alpine Halo9 Missing Authentication Information Disclosure Vulnerability
www.zerodayinitiative.com
20.6.2024
ZDI-24-848: (Pwn2Own) Alpine Halo9 DecodeUTF7 Stack-based Buffer Overflow Remote Code Execution Vulnerability
www.zerodayinitiative.com
20.6.2024
ZDI-24-849: (Pwn2Own) Alpine Halo9 UPDM_wemCmdUpdFSpeDecomp Command Injection Remote Code Execution Vulnerability
www.zerodayinitiative.com
20.6.2024
ZDI-24-850: (Pwn2Own) Alpine Halo9 Stack-based Buffer Overflow Remote Code Execution Vulnerability
www.zerodayinitiative.com
20.6.2024
ZDI-24-851: (Pwn2Own) Autel MaxiCharger AC Elite Business C50 BLE AppChargingControl Stack-based Buffer Overflow Remote Code Execution Vulnerability
www.zerodayinitiative.com
20.6.2024
ZDI-24-852: (Pwn2Own) Autel MaxiCharger AC Elite Business C50 BLE Hardcoded Credentials Authentication Bypass Vulnerability
www.zerodayinitiative.com
20.6.2024
ZDI-24-853: (Pwn2Own) Autel MaxiCharger AC Elite Business C50 WebSocket Base64 Decoding Stack-based Buffer Overflow Remote Code Execution Vulnerability
www.zerodayinitiative.com
20.6.2024
ZDI-24-854: (Pwn2Own) Autel MaxiCharger AC Elite Business C50 DLB_HostHeartBeat Stack-based Buffer Overflow Remote Code Execution Vulnerability
www.zerodayinitiative.com
20.6.2024
ZDI-24-855: (Pwn2Own) Phoenix Contact CHARX SEC-3100 OCPP Protocol Improper Log Output Neutralization Remote Code Execution Vulnerability
www.zerodayinitiative.com
20.6.2024
ZDI-24-856: (Pwn2Own) Phoenix Contact CHARX SEC-3100 Config Manager Improper Input Validation Remote Code Execution Vulnerability
www.zerodayinitiative.com
20.6.2024
ZDI-24-857: (Pwn2Own) Phoenix Contact CHARX SEC-3100 Improper Access Control Firewall Bypass Vulnerability
www.zerodayinitiative.com
20.6.2024
ZDI-24-858: (Pwn2Own) Phoenix Contact CHARX SEC-3100 OCPP Protocol Missing Encryption Authentication Bypass Vulnerability
www.zerodayinitiative.com
20.6.2024
ZDI-24-859: (Pwn2Own) Phoenix Contact CHARX SEC-3100 MTQQ Protocol JSON Parsing Type Confusion Information Disclosure Vulnerability
www.zerodayinitiative.com
20.6.2024
ZDI-24-860: (Pwn2Own) Phoenix Contact CHARX SEC-3100 HomePlug Protocol Out-Of-Bounds Read Information Disclosure Vulnerability
www.zerodayinitiative.com
20.6.2024
ZDI-24-861: (Pwn2Own) Phoenix Contact CHARX SEC-3100 ClientSession Use-After-Free Remote Code Execution Vulnerability
www.zerodayinitiative.com
20.6.2024
ZDI-24-862: (Pwn2Own) Phoenix Contact CHARX SEC-3100 MQTT Protocol JSON Parsing Buffer Overflow Remote Code Execution Vulnerability
www.zerodayinitiative.com
20.6.2024
ZDI-24-863: (Pwn2Own) Phoenix Contact CHARX SEC-3100 plctool Improper Privilege Management Local Privilege Escalation Vulnerability
www.zerodayinitiative.com
20.6.2024
ZDI-24-864: (Pwn2Own) Phoenix Contact CHARX SEC-3100 OCPP Protocol UpdateFirmware Command Injection Remote Code Execution Vulnerability
www.zerodayinitiative.com
20.6.2024
ZDI-24-865: Phoenix Contact CHARX SEC-3100 charx_pack_logs Improper Input Validation Local Privilege Escalation Vulnerability
www.zerodayinitiative.com
20.6.2024
ZDI-24-866: (Pwn2Own) Phoenix Contact CHARX SEC-3100 CANopenDevice Null Pointer Dereference Denial-of-Service Vulnerability
www.zerodayinitiative.com
20.6.2024
ZDI-24-867: (Pwn2Own) Phoenix Contact CHARX SEC-3100 CharxUpdateAgent Unrestricted File Upload Remote Code Execution Vulnerability
www.zerodayinitiative.com
20.6.2024
ZDI-24-868: (Pwn2Own) Silicon Labs Gecko OS Debug Interface Stack-based Buffer Overflow Remote Code Execution Vulnerability
www.zerodayinitiative.com
20.6.2024
ZDI-24-869: (Pwn2Own) Silicon Labs Gecko OS Debug Interface Format String Information Disclosure Vulnerability
www.zerodayinitiative.com
Späť
Ďalej