Security Advisories & Alerts


Linksys Smart Wi-Fi Vulnerabilities

Description: Cyber security researchers from IOActive said in an advisory that after reverse engineering, the router firmware they identified total of 10 security vulnerabilities, ranging from low-to-high risk issues, six of which can be exploited remotely by unauthenticated attackers. Impact: Because of these vulnerabilities, it allows unauthenticated attackers to create...

Read more


Drupal Security Issue SA-CONTRIB-2017-38

Description: The Drupal security team has discovered a critical vulnerability in a third-party module named References. Although this module is no longer maintained, it is currently used within over 120,000 installations. Impact:  The Drupal security team did not disclose the technical details about the vulnerability in order to avoid the...

Read more


Cisco ASA Software CVE-2017-6610 Denial of Service Vulnerability

Description: The vulnerability is due to insufficient validation of the IKEv1 XAUTH parameters passed during an IKEv1 negotiation. An attacker could exploit this vulnerability by sending crafted parameters. Only traffic directed to the affected system can be used to exploit this vulnerability. This vulnerability only affects systems configured in routed...

Read more


Cisco ASA Software CVE-2017-6609 Denial of Service Vulnerability

Description: The vulnerability is due to improper parsing of malformed IPsec packets. An attacker could exploit this vulnerability by sending malformed IPsec packets to the affected system. Only traffic directed to the affected system can be used to exploit this vulnerability. This vulnerability affects systems configured in routed firewall mode...

Read more


Cisco IOS and IOS XE Software Multiple Denial of Service Vulnerabilities

Description: These vulnerabilities are due to improper parsing of crafted EnergyWise packets destined to an affected device. An attacker could exploit these vulnerabilities by sending crafted EnergyWise packets to be processed by an affected device. An exploit could allow the attacker to cause a buffer overflow condition or a reload...

Read more


Page 1 of 512345