A vulnerability, which was classified as problematic , has been found in SAP UI5 up to SAP 1.108 . Affected by this vulnerability is an unknown functionality of the component Search UI . This manipula…
cyberintel.kalymoon.com · 21051 articles · updated every 4 hours · grows forever
A vulnerability, which was classified as problematic , has been found in SAP UI5 up to SAP 1.108 . Affected by this vulnerability is an unknown functionality of the component Search UI . This manipula…
A vulnerability, which was classified as critical , was found in SAP HANA Deployment Infrastructure deploy library 1.00 . Affected by this issue is some unknown functionality of the component SELECT S…
A vulnerability has been found in Chitora Soft Lhaz and Lhaz+ and classified as critical . This affects an unknown part of the component Archive File Handler . Performing a manipulation results in pat…
A vulnerability was found in EPG Kura Sushi Official App and classified as critical . This vulnerability affects unknown code of the component Push Notification Handler . Executing a manipulation can …
A vulnerability was found in SAP BusinessObjects Business Intelligence Platform 2025/2027/ENTERPRISE 430 . It has been classified as problematic . This issue affects some unknown processing. The manip…
A vulnerability was found in Zyxel WRE6505 v2 1.00(ABDV.3)C0 . It has been declared as problematic . Impacted is an unknown function of the component Web Management Interface . The manipulation result…
A vulnerability was found in Zyxel WRE6505 v2 1.00(ABDV.3)C0 . It has been rated as critical . The affected element is an unknown function of the component HTTP Handler . This manipulation causes os c…
A vulnerability categorized as critical has been discovered in Zyxel NWA1100-N 1.00(AACE.1)C0 . The impacted element is the function formWep/formWlAc/formPasswordSetup/formUpgradeCert/formDelcert of t…
A vulnerability identified as problematic has been detected in Zyxel WRE6505 v2 1.00(ABDV.3)C0 . This affects an unknown function of the component Backup Configuration File Handler . Performing a mani…
A vulnerability labeled as problematic has been found in Salesforce Module 1.0.0 on Backdrop. This impacts an unknown function. Executing a manipulation can lead to cross-site request forgery. This vu…
A vulnerability marked as critical has been reported in Axis Communications AB AXIS OS up to 12.9.31 . Affected is an unknown function of the component ACAP Handler . The manipulation leads to incorre…
A vulnerability described as problematic has been identified in Axis Communications AB AXIS OS up to 12.9.32 . Affected by this vulnerability is an unknown functionality of the component ACAP Configur…
A vulnerability classified as critical has been found in Axis Communications AB AXIS OS up to 12.10.3 . Affected by this issue is some unknown functionality of the component ACAP Configuration File Ha…
A vulnerability classified as problematic was found in Axis Communications AB AXIS OS up to 12.10.35 . This affects an unknown part of the component Configuration File Handler . Such manipulation lead…
A vulnerability, which was classified as critical , has been found in zephyrproject-rtos Zephyr up to 4.3 . This vulnerability affects unknown code of the component IPv4 Address Handler . Performing a…
A new tool, BitUnlocker, reveals a practical downgrade attack against Microsoft’s BitLocker encryption, allowing attackers with physical access to decrypt protected volumes on patched Windows 11 machi…
OpenAI has introduced Daybreak, a strategic initiative to change how modern software is built and defended against emerging threats. Moving away from traditional reactive patching, Daybreak focuses on…
A dangerous Android banking malware known as TrickMo has resurfaced with a powerful new variant, and this time it is more stealthy, more capable, and harder to stop than ever before. The threat is act…
In a chilling blow to mobile security, Google’s May 2026 Android Security Bulletin has unmasked a catastrophic zero-click vulnerability lurking within the core Android System. The CVE-2026-0073 flaw i…
A supply chain attack that started with a relatively obscure open-source scanner has now reached one of the most widely used application security tools in the industry. In May 2026, a malicious versio…
Linux server admins may get the ability to turn off a vulnerable function in the OS kernel until a patch for a zero-day vulnerability is ready, if a proposal from a kernel developer and maintainer is …
Wir haben die besten Lösungen in Sachen Customer Identity & Access Management für Sie zusammengestellt. Jackie Niam | shutterstock.com Customer Identity & Access Management (CIAM) bildet eine Unterkat…
Mit der Zunahme von Cyberbedrohungen steigt auch die Zahl der Compliance-Rahmenwerke. So können CISOs diese Herausforderung bewältigen. Foto: Dapitart – shutterstock.com Die Anforderungen von Cybersic…