Thumbnail [200x250]

IDmission announces a 2FA upgrade path for access points

2020-08-04 00:00

IDmission announced its Identity Management System (IDMS) to reduce unauthorized access to large...

Thumbnail [200x250]

Leaky S3 buckets have gotten so common that they're being found by the thousands now, with lots of buried secrets

2020-08-03 23:47

When will this madness end? The massive amounts of exposed data on misconfigured AWS S3 storage...

Thumbnail [200x250]

Travelers Europe has enhanced its cyber insurance product

2020-08-03 23:30

Travelers Europe has enhanced its cyber insurance product, Travelers CyberRisk, to provide more...

Thumbnail [200x250]

Hexagon acquires TACTICAWARE for 3D security surveillance capabilities

2020-08-03 23:00

Hexagon AB, a global leader in sensor, software and autonomous solutions, announced the...

Thumbnail [200x250]

Cloudbeam enables private and secure connectivity to CSPs

2020-08-03 22:30

Fatbeam released Cloudbeam, which connects businesses to their Cloud Service Providers (CSPs)....

Thumbnail [200x250]

Robocall Legal Advocate Leaks Customer Data

2020-08-03 22:18

A California company that helps telemarketing firms avoid getting sued for violating a federal...

Thumbnail [200x250]

Days after Trump suggests pausing election over security, US House passes $500m for states to do just that

2020-08-03 20:51

Chances of it getting enacted in time for the election - slim to almost nil The US House of...

Vulnerabilities by Risk level (Last 12 months)

Risk level Last 12 months #
Critical 1085
High 2990
Medium 11020
Low 2089

Vulnerabilities by Vendor (Last 12 months)

Vendor Last 12 months #
Microsoft 808
Oracle 521
Google 963
Apple 339
IBM 425

Latest Vulnerabilities

  • 2020-08-03 21:15

    A GET-based XSS reflected vulnerability in Plesk Onyx 17.8.11 allows remote unauthenticated users to inject arbitrary JavaScript, HTML, or CSS via a GET parameter.

    Unknown - Unspecified
  • 2020-08-03 21:15

    A GET-based XSS reflected vulnerability in Plesk Obsidian 18.0.17 allows remote unauthenticated users to inject arbitrary JavaScript, HTML, or CSS via a GET parameter.

    Unknown - Unspecified
  • 2020-08-03 20:15

    Improper Access Control in Teltonika firmware TRB2_R_00.02.04.01 allows a low privileged user to perform unauthorized write operations.

    Unknown - Unspecified
  • 2020-08-03 20:15

    Improper Input Validation in Teltonika firmware TRB2_R_00.02.04.01 allows a remote, authenticated attacker to gain root privileges by uploading a malicious package file.

    Unknown - Unspecified
  • 2020-08-03 20:15

    Improper Input Validation in Teltonika firmware TRB2_R_00.02.04.01 allows a remote, authenticated attacker to gain root privileges by uploading a malicious backup archive.

    Unknown - Unspecified

Latest Critical Vulnerabilities