• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

missing

  1. itsMe

    DNStake: check missing hosted DNS zones

    DNSTake: A fast tool to check missing hosted DNS zones that can lead to subdomain takeover. What is a DNS takeover? DNS takeover vulnerabilities occur when a subdomain (subdomain.example.com) or domain has its authoritative nameserver set to a provider (e.g. AWS Route 53, Akamai, Microsoft...
  2. 1

    Exploits ABB HMI Missing Signature Verification

    ABB HMI fails to perform any signature validation checking during two different transmission methods for upgrade. View the full article
  3. 1

    Exploits ZyXEL P-660HN-T1 V2 Missing Authentication / Password Disclosure

    The ZyXEL P-660HN-T1 V2 rpWLANRedirect.asp page is missing authentication and discloses an administrator password. View the full article
  4. 1

    Exploits Siemens LOGO! 8 Missing Authentication

    Due to storing passwords in a recoverable format on Siemens LOGO! 8 PLCs, an attacker can gain access to configured passwords as cleartext. View the full article
  5. 1

    Exploits Anviz M3 RFID Missing Access Controls

    Security issues have been found in the Anviz M3 RFID Access Control device when working in standalone mode connected to a TCP/IP network that could lead to access control bypass and private information leakage and alteration. View the full article
  6. 1

    Exploits Linux Missing Lockdown

    Linux suffers from a missing locking between ELF coredump code and userfaultfd VMA modification. View the full article
  7. 1

    Exploits Linux Siemens R3964 Line Discipline Missing Lock

    The Siemens R3964 line discipline code in drivers/tty/n_r3964.c has a few races around its ioctl handler; for example, the handler for R3964_ENABLE_SIGNALS just allocates and deletes elements in a linked list with zero locking. This code is reachable by an unprivileged user if the line...
  8. 1

    Exploits Teracue ENC-400 Command Injection / Missing Authentication

    Teracue ENC-400 suffers from hard-coded credential, missing authentication, and command injection vulnerabilities. View the full article
  9. 1

    Exploits Teltonika RUT9XX Missing Access Control To UART Root Terminal

    Teltonika RUT9XX routers with firmware before 00.04.233 provide a root terminal on a serial interface without proper access control. This allows attackers with physical access to execute arbitrary commands with root privileges. View the full article
Back
Top