Advisories archive

Find out how the Chrome Ad-Heavy detection mechanism can be bypassed, bypassing the mechanism would allow ads that are breaching
Find out how the Chrome Ad-Heavy detection mechanism can be bypassed, bypassing the mechanism would allow ads that are breaching
Find out how a vulnerability in macOS Finder system allows remote attackers to trick users into running arbitrary commands.
Find out how a vulnerability in NETGEAR D7000 device allows remote unauthenticated users to reveal the 'admin' password used to
Find out how a vulnerability discovered in Samsung S10+/S9 kernel allows leaking of sensitive function address information.
Find out how an XSS in IP-Board can be leveraged into an remote code execution.
Find out how a CSWH hijacking vulnerability in aaPanel allows remote attackers to cause an authenticated user to execute arbitrary
Find out how a cross site scripting vulnerability in SmarterMail allows remote attackers to obtain the JWT token used to
Find out how a directory traversal vulnerability in Ivanti Avalanche allows remote unauthenticated user to access files that reside outside
Find out how a vulnerability in VoIPmonitor allows an unauthenticated attacker to execute arbitrary code.