Get all file in resource of any user and Delete any file of any user via IDOR

# Description Easily GET information of all files uploaded by all users in Resources via API https://demo.usememos.com/api/resource/$id_resource (method GET) Easily DELETE of all files uploaded by all ...

Continue Reading
IDOR allows to see, update and delete other users shortcuts

# Description Even if the endpoint /api/shortcut allow to see the list of your own shortcuts, it is possible to access, modify and delete other users shortcut accessing directly through the IDs. # Pr ...

Continue Reading
My age+YubiKeys Password Management Solution

Password managers are in the news, and it's the holidays, so it's as good a time as ever to describe my password and secret management setup. It's very much not for everyone, but it's minimal, simple, ...

Continue Reading
CVE-2022-46172

authentik is an open-source Identity provider focused on flexibility and versatility. In versions prior to 2022.10.4, and 2022.11.4, any authenticated user can create an arbitrary number of accounts t ...

Continue Reading
CVE-2020-36635

A vulnerability was found in OpenMRS Appointment Scheduling Module up to 1.12.x. It has been classified as problematic. This affects the function validateFieldName of the file api/src/main/java/org/op ...

Continue Reading
CVE-2014-125026

This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will b ...

Continue Reading
EulerOS Virtualization 2.10.1 : libvirt (EulerOS-SA-2022-2899)

According to the versions of the libvirt package installed, the EulerOS Virtualization installation on the remote host is affected by the following vulnerabilities : - A use-after-free flaw was foun ...

Continue Reading
EulerOS Virtualization 2.10.0 : libvirt (EulerOS-SA-2022-2881)

According to the versions of the libvirt package installed, the EulerOS Virtualization installation on the remote host is affected by the following vulnerabilities : - A use-after-free flaw was foun ...

Continue Reading

Back to Main

Subscribe for the latest news: