Search Results
Showing results for Zerobot Attack
Zerobot is a Go-based botnet that spreads primarily through IoT and web application vulnerabilities. According to Fortinet research analysis the most recent distribution of Zerobot includes additio...
This indicates an attack attempt to exploit a Remote Code Execution Vulnerability in the WebAdmin of Sophos SG UTM.The vulnerability is due to insufficient sanitization when handling a malicious re...
This indicates an attack attempt to exploit a Command Injection vulnerability in FLIR AX8 Thermal Cameras.The vulnerability is due to insufficient sanitizing of user supplied inputs in the applicat...
This indicates an attack attempt to exploit a Command Injection vulnerability in FLIR AX8 Thermal Cameras.The vulnerability is due to insufficient sanitizing of user supplied inputs in the applicat...
This indicates an attack attempt to exploit a Remote Code Execution Vulnerability in the WebAdmin of Sophos SG UTM.The vulnerability is due to insufficient sanitization when handling a malicious re...
This indicates an attack attempt to exploit a Remote Code Execution Vulnerability in the WebAdmin of Sophos SG UTM.The vulnerability is due to insufficient sanitization when handling a malicious re...
Service update: Intrusion Prevention, Version: 22.459
It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was insufficient. An attacker could use a path traversal attack to map URLs to files outside the directories configured by ...
This indicates an attack attempt to exploit a Remote Code Execution Vulnerability in the WebAdmin of Sophos SG UTM.The vulnerability is due to insufficient sanitization when handling a malicious re...
This indicates an attack attempt to exploit a Command Execution vulnerability in multiple Grandstream devices.The vulnerability is caused by an error when the vulnerable software handles a maliciou...
This indicates an attack attempt to exploit a Command Injection Vulnerability in Zyxel firewalls.The vulnerability is due to insufficient sanitizing of user supplied inputs in the application. An u...
This indicates an attack attempt to exploit a Command Injection Vulnerability in Zyxel firewalls.The vulnerability is due to insufficient sanitizing of user supplied inputs in the application. An u...
This indicates an attack attempt to exploit a Remote Code Injection Vulnerability in Roxy-WI.The vulnerability is due to insufficient validation of user supplied input. A remote attacker can exploi...
This indicates an attack attempt to exploit a Remote Code Injection Vulnerability in Roxy-WI.The vulnerability is due to insufficient validation of user supplied input. A remote attacker can exploi...