WordPress 5.3.x < 5.3.13 Multiple Vulnerabilities

According to its self-reported version number, the detected WordPress application is affected by multiple vulnerabilities : - A SQL injection vulnerability within the Link API. - A Cross-Site Script ...

Continue Reading
Ubuntu 20.04 LTS / 22.04 LTS : rust-regex vulnerability (USN-5610-1)

The remote Ubuntu 20.04 LTS / 22.04 LTS host has packages installed that are affected by a vulnerability as referenced in the USN-5610-1 advisory. - regex is an implementation of regular expressions ...

Continue Reading
CVE-2022-35947

GLPI stands for Gestionnaire Libre de Parc Informatique and is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. Affec ...

Continue Reading
CVE-2022-35946

GLPI stands for Gestionnaire Libre de Parc Informatique and is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. In af ...

Continue Reading
Security Bulletin: Spoofing vulnerability in IBM Business Automation Workflow (CVE-2019-4045)

## Summary A Spoofing vulnerability has been found in IBM Business Automation Workflow. ## Vulnerability Details **CVEID:** [CVE-2019-4045]() **DESCRIPTION:** IBM Business Automation Workflow and IBM ...

Continue Reading

CVSS3 - MEDIUM

CVSS2 - MEDIUM

Security Bulletin: Blind SQL injection vulnerability in IBM Business Automation Workflow and IBM Business Process Manager (CVE-2018-1674)

## Summary IBM Business Process Manager and IBM Business Automation Workflow are vulnerable to blind SQL injection due to insufficient validation of user-provided input in an API. ## Vulnerability Det ...

Continue Reading

CVSS3 - HIGH

CVSS2 - MEDIUM

Implementing a Zero Trust strategy after compromise recovery

## What changes after compromise recovery? After the final compromise recovery, steps have been completed and we are back in control. There has been a round of applause and many sighs of relief. Now ...

Continue Reading
Implementing a Zero Trust strategy after compromise recovery

## What changes after compromise recovery? After the final compromise recovery, steps have been completed and we are back in control. There has been a round of applause and many sighs of relief. Now ...

Continue Reading

Back to Main

Subscribe for the latest news: