Advisories archive

TL;DR Find out how a memory corruption vulnerability can lead to a pre-auth remote code execution on QNAP QTS's Surveillance
TL;DR Find out how a vulnerability in DD-WRT allows an unauthenticated attacker to overflow an internal buffer used by UPNP
TL;DR Find out how multiple vulnerabilities in VestaCP allow an authenticated attacker to elevate his access to root privileges. Vulnerability
TL;DR Find out how a vulnerability in GNU GRUB allows users on a Linux system to inject commands into the
TL;DR Find out how multiple vulnerabilities in Yealink DM (Device Management) allow an unauthenticated attacker to run arbitrary commands on
TL;DR Find out how multiple vulnerabilities in NetMotion Mobility Server allow an unauthenticated attacker to run arbitrary code on the
TL;DR Find out how a vulnerability in IBM AIX's snmpd service allows an unauthenticated attacker to trigger a stack overflow
TL;DR Find out how a vulnerability in Infinite WP's password reset mechanism allows an unauthenticated user to become authenticated and
TL;DR Vulnerability in Windows Installer allows local users to gain elevated SYSTEM privileges in Windows. Vulnerability Summary Windows Installer is
TL;DR Find out how a vulnerability in phpCollab allows an unauthenticated user to reach RCE abilities and run code as