Úvod
NIS2
Naša ponuka
Prečo my
Aktuality
Varovania
Kontakt
Prihlásiť sa
Registrácia
Aktuálne
bezpečnostné
varovania
20.6.2024
ZDI-24-870: (Pwn2Own) Silicon Labs Gecko OS http_download Stack-based Buffer Overflow Remote Code Execution Vulnerability
www.zerodayinitiative.com
20.6.2024
ZDI-24-871: (Pwn2Own) Silicon Labs Gecko OS HTTP Request Handling Stack-based Buffer Overflow Remote Code Execution Vulnerability
www.zerodayinitiative.com
20.6.2024
ZDI-24-872: (Pwn2Own) Silicon Labs Gecko OS DNS Response Processing Infinite Loop Denial-of-Service Vulnerability
www.zerodayinitiative.com
20.6.2024
ZDI-24-873: (Pwn2Own) Silicon Labs Gecko OS HTTP GET Request Handling Stack-based Buffer Overflow Remote Code Execution Vulnerability
www.zerodayinitiative.com
20.6.2024
ZDI-24-874: (Pwn2Own) Sony XAV-AX5500 Insufficient Firmware Update Validation Remote Code Execution Vulnerability
www.zerodayinitiative.com
20.6.2024
ZDI-24-875: (Pwn2Own) Sony XAV-AX5500 WMV/ASF Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability
www.zerodayinitiative.com
20.6.2024
ZDI-24-876: (Pwn2Own) Sony XAV-AX5500 USB Configuration Descriptor Buffer Overflow Remote Code Execution Vulnerability
www.zerodayinitiative.com
20.6.2024
ZDI-24-877: (Pwn2Own) Sony XAV-AX5500 CarPlay TLV Stack-based Buffer Overflow Remote Code Execution Vulnerability
www.zerodayinitiative.com
20.6.2024
ZDI-24-878: Sony XAV-AX5500 Insufficient Verification of Data Authenticity Remote Code Execution Vulnerability
www.zerodayinitiative.com
20.6.2024
ZDI-24-879: (Pwn2Own) Ubiquiti Networks EV Station changeUserPassword Missing Authentication Remote Code Execution Vulnerability
www.zerodayinitiative.com
20.6.2024
ZDI-24-880: (Pwn2Own) Ubiquiti Networks EV Station EVCLauncher Improper Certificate Validation Vulnerability
www.zerodayinitiative.com
20.6.2024
ZDI-24-881: (Pwn2Own) Ubiquiti Networks EV Station setDebugPortEnabled Exposed Dangerous Method Remote Code Execution Vulnerability
www.zerodayinitiative.com
19.6.2024
ZDI-24-816: Microsoft Windows Menu DC Bitmap Use-After-Free Local Privilege Escalation Vulnerability
www.zerodayinitiative.com
19.6.2024
ZDI-24-817: VIPRE Advanced Security PMAgent Link Following Local Privilege Escalation Vulnerability
www.zerodayinitiative.com
19.6.2024
ZDI-24-818: VIPRE Advanced Security PMAgent Uncontrolled Search Path Element Local Privilege Escalation Vulnerability
www.zerodayinitiative.com
19.6.2024
ZDI-24-819: VIPRE Advanced Security Incorrect Permission Assignment Local Privilege Escalation Vulnerability
www.zerodayinitiative.com
19.6.2024
ZDI-24-820: Windscribe Directory Traversal Local Privilege Escalation Vulnerability
www.zerodayinitiative.com
19.6.2024
ZDI-24-821: Linux Kernel TIPC Message Reassembly Use-After-Free Remote Code Execution Vulnerability
www.zerodayinitiative.com
17.6.2024
ZDI-24-779: PaperCut NG VendorKeys Hardcoded Credentials Authentication Bypass Vulnerability
www.zerodayinitiative.com
17.6.2024
ZDI-24-780: PaperCut NG upload Link Following Information Disclosure Vulnerability
www.zerodayinitiative.com
17.6.2024
ZDI-24-781: PaperCut NG generateNextFileName Directory Traversal Remote Code Execution Vulnerability
www.zerodayinitiative.com
17.6.2024
ZDI-24-782: PaperCut NG PrintDeployProxyController Incorrect Authorization Authentication Bypass Vulnerability
www.zerodayinitiative.com
17.6.2024
ZDI-24-783: PaperCut MF pc-upconnector-service Server-Side Request Forgery Information Disclosure Vulnerability
www.zerodayinitiative.com
17.6.2024
ZDI-24-784: PaperCut MF handleServiceException Cross-Site Scripting Authentication Bypass Vulnerability
www.zerodayinitiative.com
17.6.2024
ZDI-24-785: PaperCut MF EmailRenderer Server-Side Template Injection Remote Code Execution Vulnerability
www.zerodayinitiative.com
17.6.2024
ZDI-24-786: PaperCut NG print.script.sandboxed Exposed Dangerous Function Remote Code Execution Vulnerability
www.zerodayinitiative.com
17.6.2024
ZDI-24-787: (0Day) Autodesk AutoCAD MODEL File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability
www.zerodayinitiative.com
17.6.2024
ZDI-24-788: (0Day) Autodesk AutoCAD 3DM File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability
www.zerodayinitiative.com
17.6.2024
ZDI-24-789: (0Day) Autodesk AutoCAD 3DM File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
www.zerodayinitiative.com
17.6.2024
ZDI-24-790: (0Day) Autodesk AutoCAD SLDPRT File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability
www.zerodayinitiative.com
17.6.2024
ZDI-24-791: (0Day) Autodesk AutoCAD 3DM File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability
www.zerodayinitiative.com
17.6.2024
ZDI-24-792: (0Day) Autodesk AutoCAD PRT File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
www.zerodayinitiative.com
17.6.2024
ZDI-24-793: (0Day) Autodesk AutoCAD 3DM File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
www.zerodayinitiative.com
17.6.2024
ZDI-24-794: (0Day) Autodesk AutoCAD STP File Parsing Uninitialized Variable Remote Code Execution Vulnerability
www.zerodayinitiative.com
17.6.2024
ZDI-24-795: (0Day) Autodesk AutoCAD MODEL File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability
www.zerodayinitiative.com
17.6.2024
ZDI-24-796: (0Day) Autodesk AutoCAD 3DM File Parsing Memory Corruption Remote Code Execution Vulnerability
www.zerodayinitiative.com
17.6.2024
ZDI-24-797: (0Day) Autodesk AutoCAD 3DM File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability
www.zerodayinitiative.com
17.6.2024
ZDI-24-798: (0Day) Autodesk AutoCAD IGES File Parsing Use-After-Free Remote Code Execution Vulnerability
www.zerodayinitiative.com
17.6.2024
ZDI-24-799: (0Day) Autodesk AutoCAD 3DM File Parsing Memory Corruption Remote Code Execution Vulnerability
www.zerodayinitiative.com
17.6.2024
ZDI-24-800: (0Day) Autodesk AutoCAD SLDASM File Parsing Memory Corruption Remote Code Execution Vulnerability
www.zerodayinitiative.com
17.6.2024
ZDI-24-801: Tenable Nessus Network Monitor Uncontrolled Search Path Element Local Privilege Escalation Vulnerability
www.zerodayinitiative.com
17.6.2024
ZDI-24-802: (0Day) Poly Plantronics Hub Link Following Local Privilege Escalation Vulnerability
www.zerodayinitiative.com
17.6.2024
ZDI-24-803: Parallels Desktop Updater Protection Mechanism Failure Software Downgrade Vulnerability
www.zerodayinitiative.com
17.6.2024
ZDI-24-804: Parallels Desktop Toolgate Heap-based Buffer Overflow Local Privilege Escalation Vulnerability
www.zerodayinitiative.com
17.6.2024
ZDI-24-805: (0Day) Actiontec WCB6200Q uh_tcp_recv_content Buffer Overflow Remote Code Execution Vulnerability
www.zerodayinitiative.com
17.6.2024
ZDI-24-806: (0Day) Actiontec WCB6200Q uh_tcp_recv_header Buffer Overflow Remote Code Execution Vulnerability
www.zerodayinitiative.com
17.6.2024
ZDI-24-807: (0Day) Actiontec WCB6200Q Multipart Boundary Stack-based Buffer Overflow Remote Code Execution Vulnerability
www.zerodayinitiative.com
17.6.2024
ZDI-24-809: (0Day) Actiontec WCB6200Q uh_get_postdata_withupload Stack-based Buffer Overflow Remote Code Execution Vulnerability
www.zerodayinitiative.com
17.6.2024
ZDI-24-808: (0Day) Actiontec WCB6200Q Cookie Format String Remote Code Execution Vulnerability
www.zerodayinitiative.com
17.6.2024
ZDI-24-810: Hewlett Packard Enterprise OneView startUpgradeCommon Command Injection Local Privilege Escalation Vulnerability
www.zerodayinitiative.com
Späť
Ďalej