Advisory can be found at our website. (https://cyberdanube.com/en/en-authenticated-command-injection-in-hirschmann-belden-bat-c2/). The vulnerability was discovered with the help of our emulation framework MEDUSA

Advisory can be found at our website. (https://cyberdanube.com/en/en-multiple-vulnerabilities-in-delta-electronics-dx-2100-l1-cn/). The vulnerability was discovered with the help of our emulation framework MEDUSA

Advisory can be found at our website. (https://cyberdanube.com/en/en-multiple-vulnerabilities-in-delta-electronics-dx-2100-l1-cn/). The vulnerability was discovered with the help of our emulation framework MEDUSA

Advisory can be found over at our website. (https://cyberdanube.com/en/en-authenticated-command-injection-in-delta-electronics-dvw-w02w2-e2/) The vulnerability was discovered with the help of our emulation framework MEDUSA.

Technical Details by Researcher is published here: https://www.redinent.com/blog/critical-vulnerability-hikvision-wireless-bridge/

College Website CMS had an SQL injection into the department id parameter. discovered by Ayed Alqahtani (lus33r)

This vulnerability involves a rather unconventional vector for XSS - the comment field of an SSH public key. Since patched in newer versions of LuCI, which ensure to not display public key comments verbatim in order to prevent injection of any markup, including <script> tags.

The critical vulnerability was discovered by RedRays R&D center in SAP NetWeaver AS JAVA in ME module https://redrays.io/3242933-cve-2022-39802-file-path-traversal-vulnerability-in-sap-manufacturing-execution/

Lenovo Commercial Vantage Tool Local Privilege Escalation:

Would this work for my hacked Google account so I can gain access