Advisories archive

TL;DR Find out how a vulnerability in GNU GRUB allows users on a Linux system to inject commands into the
TL;DR Find out how multiple vulnerabilities in Yealink DM (Device Management) allow an unauthenticated attacker to run arbitrary commands on
TL;DR Find out how multiple vulnerabilities in NetMotion Mobility Server allow an unauthenticated attacker to run arbitrary code on the
TL;DR Find out how a vulnerability in IBM AIX's snmpd service allows an unauthenticated attacker to trigger a stack overflow
TL;DR Find out how a vulnerability in Infinite WP's password reset mechanism allows an unauthenticated user to become authenticated and
TL;DR Vulnerability in Windows Installer allows local users to gain elevated SYSTEM privileges in Windows. Vulnerability Summary Windows Installer is
TL;DR Find out how a vulnerability in phpCollab allows an unauthenticated user to reach RCE abilities and run code as
TL;DR Find out how a use after free vulnerability in PHP allows attackers that are able to run PHP code
TL;DR Find out how a chain of vulnerabilities in rConfig allows a remote unauthenticated user to gain 'apache' user access
TL;DR Find out how we exploited a behavior of Apache while using the limited rights of Aegir user to gain