Skip to content

Joomfish System Plugin not enabled Home Early Warning System Issues
Libgraphite Multiple Security Vulnerabilities
Tuesday, 10 January 2017 12:39

Multiple vulnerabilities were reported in Libgraphite. An attacker may be able to execute arbitrary code in the context of the affected application or crash the application. No solution was available at the time of this entry.

Logitech M520 Y-R0012 Spoof Attack
Tuesday, 04 October 2016 17:00

Logitech Wireless Combo MK520 is prone to spoofing attacks, as the mouse data communication is unencrypted and unauthenticated. An attacker can analyze the unencrypted mouse data packets of the 2.4GHz radio communication sent by the mouse to the receiver (USB dongle) in order to learn the used protocol. By knowing the used mouse data protocol, it is possible to spoof mouse actions like mouse movements or mouse clicks by sending forged data packets. No solution was available at this time of entry.

AVer Information EH6108H+ hybrid DVR multiple vulnerabilities
Thursday, 15 September 2016 17:16

AVer Information EH6108H+ hybrid DVR, an IP security camera management system and streaming video recorder, version X9. and possibly earlier, reportedly contains multiple vulnerabilities, including undocumented privileged accounts, authentication bypass, and information exposure. No solution was available at this time of entry.

"HEIST" attack on SSL/TLS can grab potentially sensitive info
Tuesday, 13 September 2016 18:02

A new vulnerability known as "HTTP Encrypted Information can be Stolen Through TCP-Windows" (HEIST), has been unveiled that can attack the SSL/TLS and other secure channels purely in the browser to expose potentially sensitive info. It affects both the HTTPS protocol [CVE-2016-7152] and the HTTP/2 protocol [CVE-2016-7153], which means all major browsers using https api are vulnerable. No solution was available at the time of this entry.

MySQL General Query Logging Function allow privilege escalation
Tuesday, 13 September 2016 18:01

A vulnerability was reported in MySQL. A remote authenticated user with SELECT/FILE permissions can gain elevated privileges on the target system. No solution was available at the time of this entry.

<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>

Page 6 of 142
[YOUR IP: 59530] ...   [YOUR BROWSER: CCBot/2.0 (] ...