Advisories archive

TL;DR Find out how multiple vulnerabilities in Hongdian H8922 allow an attacker to run arbitrary commands on the device with
TL;DR Find out how a vulnerability in OverlayFS allows local users under Ubuntu to gain root privileges. Vulnerability Summary An
TL;DR Find out how a memory corruption vulnerability can lead to a pre-auth remote code execution on QNAP QTS's Surveillance
TL;DR Find out how a vulnerability in DD-WRT allows an unauthenticated attacker to overflow an internal buffer used by UPNP
TL;DR Find out how multiple vulnerabilities in VestaCP allow an authenticated attacker to elevate his access to root privileges. Vulnerability
TL;DR Find out how a vulnerability in GNU GRUB allows users on a Linux system to inject commands into the
TL;DR Find out how multiple vulnerabilities in Yealink DM (Device Management) allow an unauthenticated attacker to run arbitrary commands on
TL;DR Find out how multiple vulnerabilities in NetMotion Mobility Server allow an unauthenticated attacker to run arbitrary code on the
TL;DR Find out how a vulnerability in IBM AIX's snmpd service allows an unauthenticated attacker to trigger a stack overflow
TL;DR Find out how a vulnerability in Infinite WP's password reset mechanism allows an unauthenticated user to become authenticated and