st.localhost:6221/cgi-mod/index.cgi?
auth_type=Local&et=1378382541&locale=en_US&password=05e76e9aff6e382822aeb21d3903bcde&realm=&role=&
user=guest&primary_tab=FIREWALL&secondary_tab=firewall_access_rules
Solution - Fix & Patch:
===
The vulnerability can be patched
veloper Team)
[Coordination: Eric ** ]
Security Risk:
==
The security risk of the persistent input validation web vulnerabilities is
estimated as medium.
Credits & Authors:
==
Vulnerability Laboratory [Research Team] - Ateeq Khan (at...@evolution-sec.com)
[www.vulnerab
Kunz Mejri
(b...@evolution-sec.com) [www.vulnerability-lab.com]
Disclaimer & Information:
=
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties,
either expressed or implied, including the warranties of m
ty is estimated
as medium(+)|(-)high.
Credits & Authors:
==
Vulnerability Laboratory [Research Team] - Benjamin Kunz Mejri
(b...@vulnerability-lab.com) [www.vulnerability-lab.com]
Disclaimer & Information:
=
The information provided in this advi
=
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties,
either expressed or implied, including the warranties of merchantability and
capability for a particular purpose. Vulnerability-
Lab or i
formation provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties,
either expressed or implied, including the warranties of merchantability and
capability for a particular purpose. Vulnerability-
Lab or its suppliers are not liabl
ability is estimated as
high(-).
1.2
The security risk of the arbitrary file upload web vulnerability is estimated
as high(+).
Credits & Authors:
==
Vulnerability Laboratory [Research Team] - Benjamin Kunz Mejri
(b...@evolution-sec.com) [www.vulnerability-lab.com
lnerability Laboratory [Research Team] - Benjamin Kunz Mejri
(b...@evolution-sec.com) [www.vulnerability-lab.com]
Disclaimer & Information:
=
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranti
-lab.com]
Disclaimer & Information:
=
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties,
either expressed or implied, including the warranties of merchantability and
capability for a particular
el
in the left-hand navigation, then select “Email Security” in the Software Type
drop down menu.
Security Risk:
==
The security risk of the persistent and non persistent post inject web
vulnerabilities are estimated as medium.
Credits & Authors:
==
Vulnerability Laborat
=
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties,
either expressed or implied, including the warranties of merchantability and
capability for a particular purpose. Vulnerability-
Lab or its suppliers are
its & Authors:
==
Vulnerability Laboratory [Research Team] - Benjamin Kunz Mejri
(b...@evolution-sec.com) [www.vulnerability-lab.com]
Disclaimer & Information:
=
The information provided in this advisory is provided as it is without any
warranty. V
Document Title:
===
FTP Drive + HTTP 1.0.4 iOS - Code Execution Vulnerability
References (Source):
http://www.vulnerability-lab.com/get_content.php?id=1231
Release Date:
=
2014-03-20
Vulnerability Laboratory ID (VL-ID):
ation provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties,
either expressed or implied, including the warranties of merchantability and
capability for a particular purpose. Vulnerability-
Lab or its suppliers are not liable in any case o
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties,
either expressed or implied, including the warranties of merchantability and
capability for a particular purpose. Vulnerability-
Lab or its suppliers are not l
lution-sec.com) [www.vulnerability-lab.com]
Disclaimer & Information:
=========
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties,
either expressed or implied, including the warranties of merchantability an
=======
Vulnerability Laboratory [Research Team] - Benjamin Kunz Mejri
(b...@evolution-sec.com) [www.vulnerability-lab.com]
Disclaimer & Information:
=====
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims
ity Laboratory [Research Team] - Benjamin Kunz Mejri
(b...@evolution-sec.com) [www.vulnerability-lab.com]
Disclaimer & Information:
=
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties,
eit
code
injects.
Security Risk:
==
The security risk of the persistent input validation web vulnerability is
estimated as medium(+).
Credits & Authors:
==
Vulnerability Laboratory [Research Team] - Benjamin Kunz Mejri
(b...@evolution-sec.com) [www.vulnerabilit
Vulnerability Laboratory [Research Team] - Benjamin Kunz Mejri
(b...@evolution-sec.com) [www.vulnerability-lab.com]
Disclaimer & Information:
=
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims
in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties,
either expressed or implied, including the warranties of merchantability and
capability for a particular purpose. Vulnerability-
Lab or its suppliers are not liable in any case of damage, includi
Document Title:
===
iVault Private P&V 1.1 iOS - Path Traversal Vulnerability
References (Source):
http://www.vulnerability-lab.com/get_content.php?id=1253
Release Date:
=
2014-04-09
Vulnerability Laboratory ID (VL-ID):
.com) [www.vulnerability-lab.com]
Disclaimer & Information:
=
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties,
either expressed or implied, including the warranties of merchantability and
ed:0 }] };
extraBBCodes['c'] = tmpBBCode; sourceCodes['c'] = 'c';
language['c.title'] = "C/C++ Source code";
language['c.attribute1.promptText'] = "wcf.bbcode.c.promptText";
errorField = false
=
The security risk of the local file include web vulnerability in the mobile
application is estimated as high.
Credits & Authors:
==
Vulnerability Laboratory [Research Team] - Benjamin Kunz Mejri
(b...@evolution-sec.com) [www.vulnerability-lab.com]
Disclaimer & Informa
high.
Credits & Authors:
==
Vulnerability Laboratory [Research Team] - Benjamin Kunz Mejri
(b...@evolution-sec.com) [www.vulnerability-lab.com]
Disclaimer & Information:
=
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab
m) [www.vulnerability-lab.com]
Disclaimer & Information:
=
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties,
either expressed or implied, including the warranties of merchantability and
ca
===
Vulnerability Laboratory [Research Team] - Ateeq ur Rehman Khan
(at...@evolution-sec.com) (www.vulnerability-lab.com)
Disclaimer & Information:
=
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab
bility-lab.com]
Disclaimer & Information:
=
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties,
either expressed or implied, including the warranties of merchantability and
capability for a particular purpose. Vulnera
hars for files and foldernames and restrict the user input.
Encode and parse also the vulnerable name output value.
Security Risk:
==
The security risk of the local file include web vulnerability in the filename
value is estimated as high(-).
Credits & Authors:
==
Vulner
==
Vulnerability Laboratory [Research Team] - Benjamin Kunz Mejri
(b...@evolution-sec.com) [www.vulnerability-lab.com]
Disclaimer & Information:
=
The information provided in this advisory is provided as it is without any
warranty. Vulnerability La
- LariX4 (resea...@evolution-sec.com)
[www.vulnerability-lab.com]
Disclaimer & Information:
=
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties, either
expressed or implied, including the warranties
estimated as high.
Credits & Authors:
==
Vulnerability Laboratory [Research Team] - Benjamin Kunz Mejri
(b...@evolution-sec.com) [www.vulnerability-lab.com]
Disclaimer & Information:
=
The information provided in this advisory is provided as it is without any
warranty. Vul
tion provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties, either
expressed or implied, including the warranties of merchantability and
capability for a particular purpose. Vulnerability-Lab or its suppliers
are not liable in any case of
=
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties, either
expressed or implied, including the warranties of merchantability and
capability for a particular purpose. Vulnerability-Lab or its suppliers
are not
Disclaimer & Information:
=
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties, either
expressed or implied, including the warranties of merchantability and
capability for a particular purpose. Vulnerability-Lab or i
rity Risk:
==
The security risk of the mail encoding vulnerability in the registration module
is estimated as medium with a cvss of 3.9.
Credits & Authors:
==
Vulnerability Laboratory [Research Team] - Benjamin Kunz Mejri
(b...@evolution-sec.com) [www.vuln
tory [Research Team] - Benjamin Kunz Mejri
(b...@vulnerability-lab.com) [www.vulnerability-lab.com]
Disclaimer & Information:
=
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties, either
expressed or im
ty is estimated as medium.
Credits & Authors:
==
Vulnerability Laboratory [Research Team] - Ateeq ur Rehman Khan
(at...@evolution-sec.com) (www.vulnerability-lab.com)
Disclaimer & Information:
=
The information provided in this advisory is provided as it is
n
(at...@evolution-sec.com) [www.vulnerability-lab.com]
Disclaimer & Information:
=
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties, either
expressed or implied, including the warranties
include web vulnerability in the filename
value is estimated as high.
Credits & Authors:
==
Vulnerability Laboratory [Research Team] - Benjamin Kunz Mejri
(b...@evolution-sec.com) [www.vulnerability-lab.com]
Disclaimer & Information:
=====
The information pro
of the persistent exception-handling web vulnerability is
estimated as high(-).
Credits & Authors:
==
Vulnerability Laboratory [Research Team] - Ateeq ur Rehman Khan
(at...@evolution-sec.com) [www.vulnerability-lab.com]
Disclaimer & Information:
=====
Document Title:
===
Yahoo! Bug Bounty #30 YM - Application-Side Mail Encoding (File Attachment)
Vulnerability
References (Source):
http://www.vulnerability-lab.com/get_content.php?id=1137
Release Date:
=
2014-07-08
Vulnerability Laboratory ID (VL-
sk of the application-side input validation web vulnerability is
estimated as medium.
Credits & Authors:
==
Vulnerability Laboratory [Research Team] - Benjamin Kunz Mejri
(b...@evolution-sec.com) [www.vulnerability-lab.com]
Disclaimer & Information:
=
..@evolution-sec.com] (@OhTheITGuy) [www.vulnerability-lab.com]
Disclaimer & Information:
=
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties, either
expressed or implied, including the warrantie
.vulnerability-lab.com)
Disclaimer & Information:
=
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties, either
expressed or implied, including the warranties of merchantability an
e: Advanced >Firmware Updates Page
http://www.barracuda.com/kb?id=50160013m4O
Security Risk:
==
The security risk of the persistent input validation web vulnerabilities and
estimated as medium(+).
Credits & Authors:
==
Vulnerability Laboratory [Research Tea
bility-lab.com]
Disclaimer & Information:
=
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties,
either expressed or implied, including the warranties of merchantability and
capability for
put validation web vulnerabilities in
connection with the input filter bypass are estimated as medium.
Credits & Authors:
==
Vulnerability Laboratory [Research Team] - Benjamin Kunz Mejri
(b...@evolution-sec.com) [www.vulnerability-lab.com]
Disclaimer & Information:
==
rity Risk:
==
The security risk of the client-side cross site scripting web vulnerability is
estimated as medium.
Credits & Authors:
==
Vulnerability Laboratory [Research Team] - Ateeq ur Rehman Khan
(at...@evolution-sec.com) [www.vulnerability-lab.com]
i
(b...@evolution-sec.com) [www.vulnerability-lab.com]
Disclaimer & Information:
=====
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties, either
expressed or implied, including the warranties o
Document Title:
===
Barracuda Networks Web Application Firewall v6.1.5 & LoadBalancer v4.2.2
#37 - Filter Bypass & Multiple Vulnerabilities
References (Source):
http://www.vulnerability-lab.com/get_content.php?id=1103
Barracuda Networks Security ID (BNSEC): BNSE
ulnerability is estimated
as critical.
Credits & Authors:
==
Vulnerability Laboratory [Research Team] - Benjamin Kunz Mejri
(b...@evolution-sec.com) [www.vulnerability-lab.com]
Disclaimer & Information:
=
The information provided in this advisory is provi
ed as high.
Credits & Authors:
==
Vulnerability Laboratory [Research Team] - Benjamin Kunz Mejri
(b...@evolution-sec.com) [www.vulnerability-lab.com]
Disclaimer & Information:
=====
The information provided in this advisory is provided as it is without
n is estimated as high.
Credits & Authors:
==
Vulnerability Laboratory [Research Team] - Benjamin Kunz Mejri
(b...@evolution-sec.com) [www.vulnerability-lab.com]
Disclaimer & Information:
=====
The information provided in this advisory is provided
Laboratory [Research Team] - Benjamin Kunz Mejri
(b...@evolution-sec.com) [www.vulnerability-lab.com]
Disclaimer & Information:
=====
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties, either
e
jri
(b...@evolution-sec.com) [ad...@vulnerability-lab.com]
[www.vulnerability-lab.com]
Disclaimer & Information:
=========
The information provided in this advisory is provided as it is without
any warranty. Vulnerability Lab disclaims all warranties, either
expressed or implied, including
stimated as high.
Credits & Authors:
==
Vulnerability Laboratory [Research Team] - Benjamin Kunz Mejri
(b...@evolution-sec.com) [www.vulnerability-lab.com]
Disclaimer & Information:
=
The information provided in this advisory is provided as it i
r & Information:
=
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties, either
expressed or implied, including the warranties of merchantability and
capability for a particular purpose. Vulnerabil
[LOCAL COMMAND INJECT VULNERABILITY!]">
06.08.14 12:27
Solution - Fix & Patch:
===
The vulnerabilities can be patched by a sec
ities are estimated as medium.
Credits & Authors:
==
Vulnerability Laboratory [Research Team] - Benjamin Kunz Mejri
(b...@evolution-sec.com) [www.vulnerability-lab.com]
Disclaimer & Information:
=
The information provided in this advisory is provide
b.com]
Disclaimer & Information:
=====
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties, either
expressed or implied, including the warranties of merchantability and
capability for a particular pu
timated as medium.
Credits & Authors:
==
Mazen Gamal - http://www.vulnerability-lab.com/show.php?user=Mazen%20Gamal
Disclaimer & Information:
=
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warra
==
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties, either
expressed or implied, including the warranties of merchantability and
capability for a particular purpose. Vulnerability-Lab or its suppliers
are not
is estimated as high(-).
Credits & Authors:
==
Vulnerability Laboratory [Research Team] - Benjamin Kunz Mejri
(b...@evolution-sec.com) [www.vulnerability-lab.com]
Disclaimer & Information:
=
The information provided in this advisory is provided as it i
r & Information:
=
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties, either
expressed or implied, including the warranties of merchantability and
capability for a particular purpose. Vulnerabil
E
INCLUDE VULNERABILITY!]%3E.TXT]
Content-Type[application/download]
Date[Sat, 06 Sep 2014 00:13:00 GMT]
Reference(s): Links
http://localhost:9900/
http://localhost:9900/Download/
Solution - Fix & Patch:
===
The vulnerability can be pactehd by a secure parse and enc
laimer & Information:
=
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties, either
expressed or implied, including the warranties of merchantability and
capability for a particular purpose. Vulnerability-Lab o
e. Filter and restrict the filename input.
validate the output names in the main item list of the application index.
Security Risk:
==
1.1
The security risk of the local code execution web vulnerability is estimated as
critical.
1.2
The security risk of the local file include web vulne
==
Vulnerability Laboratory [Research Team] - Benjamin Kunz Mejri
(b...@evolution-sec.com) [www.vulnerability-lab.com]
Disclaimer & Information:
=
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all w
ame input fields in the myoracle application.
Encode stored data of user in the dbms when processing to send service
notifications by the mail info@oracle email to prevent persistent injection
attacks.
Security Risk:
==
The security risk of the persistent mail encoding web vulne
ed in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties, either
expressed or implied, including the warranties of merchantability and
capability for a particular purpose. Vulnerability-Lab or its suppliers
are not liable in any case of damage, including
y and developer team.
Security Risk:
==
The security risk of the both application-side input validation web
vulnerabilities is estimated as medium.
Credits & Authors:
==
Vulnerability Laboratory [Research Team] - Benjamin Kunz Mejri
(b...@evolution-sec.co
erability-lab.com]
Disclaimer & Information:
=
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties, either
expressed or implied, including the warranties of merchantability and
capability for a parti
s by the mail info@oracle email to prevent persistent injection
attacks.
Security Risk:
==
The security risk of the persistent mail encoding web vulnerability in the
myoracle account system web-server is estimated as medium.
Credits & Authors:
==
Vulnerability Laboratory
edin.com/profile/view?id=305567696)
Disclaimer & Information:
=
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties, either
expressed or implied, including the warranties of merchantability and
of 3.5.
Credits & Authors:
==
Vulnerability Laboratory [Research Team] - Benjamin Kunz Mejri
(b...@evolution-sec.com) [www.vulnerability-lab.com]
Disclaimer & Information:
=
The information provided in this advisory is provided as it is without any
wa
c.com) [www.vulnerability-lab.com]
Disclaimer & Information:
=
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties, either
expressed or implied, including the warranties of merchantability and
capability for
imated as medium.
Credits & Authors:
==
Vulnerability Laboratory [Research Team] - Benjamin Kunz Mejri
(b...@evolution-sec.com) [www.vulnerability-lab.com]
Disclaimer & Information:
=
The information provided in this advisory is provided as it is
==
Vulnerability Laboratory [Research Team] - Benjamin Kunz Mejri
(b...@evolution-sec.com) [www.vulnerability-lab.com]
Disclaimer & Information:
=
The information provided in this advisory is provided as it is without any
warranty. Vulnerability La
Document Title:
===
HTTP Commander AJS v3.1.9 - Client Side Exception Vulnerability
References (Source):
http://www.vulnerability-lab.com/get_content.php?id=1329
Release Date:
=
2014-10-02
Vulnerability Laboratory ID (VL-ID):
==
ity Laboratory [Research Team] - Benjamin Kunz Mejri
(b...@evolution-sec.com) [www.vulnerability-lab.com]
Disclaimer & Information:
=
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties, either
expressed or implied,
========
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties, either
expressed or implied, including the warranties of merchantability and
capability for a particular purpose. Vulnerability-Lab or its suppliers
are
issue.
Security Risk:
==
The security risk of the persistent input validation vulnerabilities and filter
bypass method are estimated as medium. (CVSS 4.3)
Credits & Authors:
==
Vulnerability Laboratory [Research Team] - Benjamin Kunz Mejri
(b...@evolution
ium.
Credits & Authors:
==
Vulnerability Laboratory [Research Team] - Benjamin Kunz Mejri
(b...@evolution-sec.com) [www.vulnerability-lab.com]
Disclaimer & Information:
=
The information provided in this advisory is provided as it is without
njamin Kunz Mejri
(b...@vulnerability-lab.com)
Disclaimer & Information:
=
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties, either
expressed or implied, including the warranties of mercha
sory Information:
==
An independent vulnerability lab researcher discovered a persistent web
vulnerability in the official PayPal Inc Community web-application.
Vulnerability Disclosure Timeline:
==
2014-10-08: Public Disclosure (Vulnerabi
Vulnerability Laboratory [Research Team] - Benjamin Kunz Mejri
(b...@vulnerability-lab.com) [www.vulnerability-lab.com]
Disclaimer & Information:
=
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warra
warranty. Vulnerability Lab disclaims all warranties, either
expressed or implied, including the warranties of merchantability and
capability for a particular purpose. Vulnerability-Lab or its suppliers
are not liable in any case of damage, including direct, indirect, incidental,
consequential loss
tion-sec.com) [www.vulnerability-lab.com]
Disclaimer & Information:
=
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties, either
expressed or implied, including the warranties of merchantabil
.
Credits & Authors:
==
Vulnerability Laboratory [Research Team] - Ateeq ur Rehman Khan
(at...@evolution-sec.com) [www.vulnerability-lab.com]
Disclaimer & Information:
=
The information provided in this advisory is provided as it is without any
1.3
The security risk of the local command inject web vulnerability in the
devicename value is etimated as medium.
Credits & Authors:
==
Vulnerability Laboratory [Research Team] - Benjamin Kunz Mejri
(b...@evolution-sec.com) [www.vulnerability-lab.com]
Disclaimer & Information
ri
(b...@evolution-sec.com) [www.vulnerability-lab.com]
Disclaimer & Information:
=
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties, either
expressed or implied, including the warranties
lnerability-lab.com]
Disclaimer & Information:
=
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties, either
expressed or implied, including the warranties of merchantability and
capability for a par
enjamin Kunz Mejri
(b...@evolution-sec.com) [www.vulnerability-lab.com]
Disclaimer & Information:
=
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties, either
expressed or implied, including the war
input
values in the message body context
Filter and restrict context of send mails through the application and the
web-server of the sonicwall gms appliance.
The issue has already been patched by the dell security team in cooperation
with the vulnerability-lab during the year 2014.
Security
enjamin Kunz Mejri
(b...@evolution-sec.com) [www.vulnerability-lab.com]
Disclaimer & Information:
=
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties, either
expressed or implied, including the war
Credits & Authors:
==
Vulnerability Laboratory [Research Team] - Benjamin Kunz Mejri
(b...@evolution-sec.com) [www.vulnerability-lab.com]
Disclaimer & Information:
=
The information provided in this advisory is provided as it is without any
warranty.
redits & Authors:
==
Vulnerability Laboratory [Research Team] - Katharin S. L. (CH)
(resea...@vulnerability-lab.com) [www.vulnerability-lab.com]
Disclaimer & Information:
=
The information provided in this advisory is provided as it is without any
Risk:
==
The security risk of the local denial of service vulnerability thats
exploitable through the favorite message app is estimated as low.
Credits & Authors:
==
Vulnerability Laboratory [Research Team] - Benjamin Kunz Mejri
(b...@evolution-sec.com) [www.vuln
101 - 200 of 846 matches
Mail list logo