Skip to content

Home Early Warning System Issues
Issues
Western Digital My Cloud Authentication Bypass Vulnerability
Thursday, 20 September 2018 09:00

A vulnerability was reported in the Western Digital My Cloud. An unauthenticated attacker may be able to authenticate as an admin user without needing to provide a password, thereby gaining full control of the My Cloud device. No fix was available at the time of this entry.

 
Apple WebKit Rendering Engine Denial of Service Vulnerability
Tuesday, 18 September 2018 13:00

A vulnerability was reported in Apple's web rendering engine WebKit. Malicious web page with specially crafted CSS & HTML code can cause shut down and restart of the device. No solution was available at the time of this entry. Users are advised to be vigilant while visiting any web page including the code or clicking on links sent over their Facebook or WhatsApp account, or in an email.

 
URL Spoofing Vulnerability in Apple Safari and Microsoft Edge
Thursday, 13 September 2018 12:00

A vulnerability was reported in the Microsoft Edge web browser for Windows and Apple Safari for iOS. Both browsers allowed javascript to update the address bar while the page was still loading. Thus, attackers may be able to conduct phishing attacks through address bar spoofing. Microsoft Edge was patched last month with Microsoft monthly security updates, but Safari is still unpatched at the time of this entry.

 
Microsoft Windows Task Scheduler Local Privilege Escalation Vulnerability
Tuesday, 28 August 2018 12:00

A vulnerability was reported in Microsoft Windows task scheduler in the handling of ALPC. A local user may be able to gain SYSTEM privileges. No solution was available at the time of this entry.

 
A Vulnerability in OpenSSL Affects Multiple F5 Products
Tuesday, 24 July 2018 17:00

Multiple F5 products were affected by an OpenSSL vulnerability. A remote attacker may be able to cause a denial-of-service (DoS) attack. No upgrade was available at the time of this entry.To mitigate this vulnerability users should limit connections to SSL/TLS servers only on trusted networks. To protect vulnerable clients, users can configure the BIG-IP system to proxy outbound SSL connections.

 
<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>

Page 2 of 141
[YOUR IP : 34.204.52.4: 43064] ...   [YOUR BROWSER: CCBot/2.0 (https://commoncrawl.org/faq/)] ...