All advisories grouped by year
2023
-
Security Feature Bypass In Zitadel — Race Condition
Zitadel was found to be vulnerable to a race condition, leading to the application processing numerous successful brute-force login attempts before triggering an account lockout. -
Zitadel one click silent account takeover — Multiple issues
The avatar upload functionality was found to be vulnerable to stored cross-site scripting via SVG's. -
Security Feature Bypass In ASP.NET and Visual Studio — Race Condition
The SignInManager in ASP.NET was found to be vulnerable to a Race Condition leading to thousands of successful brute-force login attempts before triggering an account lockout.View advisory: Security Feature Bypass In ASP.NET and Visual Studio
-
Kramer VIA GO² — Multiple issues
The Kramer VIA GO² is a "Compact & Secure 4K Wireless Presentation Device", which was found to have multiple high risk security issues. -
perfSONAR — Multiple issues
Multiple vulnerabilities were found in perfSONAR that could allow a malicious individual to scan the internal network and read arbitrary files on the server.
2022
-
Spectrum Spatial Analyst 20.1 — Multiple issues
Precisely Spectrum Spatial Analyst 2020.1.0 S44 was found to be vulnerable to Server-Side Request Forgery (SSRF) and a Path Traversal sequence vulnerability. -
Genero Enterprise — Multiple issues
A number of vulnerabilities were discovered in the suite of applications bundled as Genero Enterprise including RCE in the Genero Mobile for Android framework, and a lack of certificate validation across the suite. -
Wiris MathType — Path traversal vulnerability
The Wiris MathType library (v7.28.0 and lower) was discovered to contain a path traversal vulnerability in the resourceFile parameter. This vulnerability is exploited via a crafted request to the resource handler.
2021
-
Accellion kiteworks — Privilege escalation vulnerability
A malicious user could gain shell access to the Accellion kiteworks application, complete with root privileges. -
Ruby Dragonfly — Argument Injection vulnerability
An argument injection vulnerability in the Dragonfly gem before 1.4.0 for Ruby allows remote attackers to read and write to arbitrary files via a crafted URL when the verify_url option is disabled. -
Silverstripe — Cross Site Scripting (XSS) vulnerability
A Cross Site Scripting vulnerability in Silverstripe allows an attacker to inject an arbitrary payload in the CreateQueuedJobTask dev task via a specially crafted URL.
2020
-
VMWare vCloud API — Access Control vulnerability
Access control vulnerabilities were identified within the VMware vCloud Director API (prior to v9.5.0.5). An organisation administrator can create, remove or revert snapshot operations against vApps and VMS located in other organisation VDCs. -
Cisco CWS — SQL Injection vulnerability
A vulnerability in the web UI of Cisco Cloud Web Security (CWS) could allow an authenticated, remote attacker to execute arbitrary SQL queries. -
TelStrat Engage — Multiple issues
Multiple vulnerabilities where identified within the TelStrat Engage (v5.6.1) application, including unauthenticated access to cleartext passwords. -
RSA Archer — Multiple issues
RSA Archer contains multiple security vulnerabilities that could potentially be exploited by malicious users to compromise the affected system.
2019
-
SolarWinds SERV-U — CSRF vulnerability
A CSRF vulnerability was identified in SolarWinds' file upload functionality. -
Squiz Matrix CMS — Multiple issues
Multiple vulnerabilities were found in the Squiz Matrix CMS that could result in arbitrary file deletion, information disclosure, and remote code execution. -
ASP.NET Boilerplate — Input Validation vulnerability
An input validation issue was discovered in the ASP.NET Boilerplate that could lead to significant client-side security vulnerabilities. -
Teracue ENC-400 — Multiple issues
Multiple vulnerabilities were identified within Teracue ENC-400, including broken authentication and command injection.
2018
-
WatchGuard Access Points — Multiple issues
Several major vulnerabilities have been identified within WatchGuard Access Point devices that can be chained together to gain pre-authenticated remote code execution.