[SECURITY] Fedora 36 Update: php-laminas-diactoros2-2.13.0-1.fc36

A PHP package containing implementations of the accepted PSR-7 HTTP message interfaces [1], as well as a "server" implementation similar to node's http.Server [2]. Documentation: https://docs.laminas ...

Continue Reading
Kubeaudit – Tool To Audit Your Kubernetes Clusters Against Common Security Controls

[![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9Cwk7G3nA3MnGy8P2nDMOsfIUoit1itbzgsnqfuFhTeXBvDndQX_141136JmtgDk05aZWV64uJTheKlEd0nDBybsbVBQ2VxG_dy2L-AGn3_NwnSF_ZEz1TEAmsMhveGvErAOszs ...

Continue Reading
Shescape prior to 1.5.8 vulnerable to insufficient escaping of line feeds for CMD

### Impact This impacts users that use Shescape (any API function) to escape arguments for **cmd.exe** on **Windows**. An attacker can omit all arguments following their input by including a line feed ...

Continue Reading
Partial Path Traversal in com.amazonaws:aws-java-sdk-s3

### Overview A partial-path traversal issue exists within the `downloadDirectory` method in the AWS S3 TransferManager component of the AWS SDK for Java v1. Applications using the SDK control the `des ...

Continue Reading
Hudson XML API susceptible to External Entity Injection Vunerability prior to v3.3.2

In versions prior to 3.3.2, Hudson exhibits a flaw in its XML API processing that can allow access to potentially sensitive information on the filesystem of the Hudson master server.Read More ...

Continue Reading
Whoogle Search cross-site scripting via string parameter

The package whoogle-search before 0.7.2 is vulnerable to Cross-site Scripting (XSS) via the query string parameter q. In the case where it does not contain the http string, it is used to build the err ...

Continue Reading
Metasploit Weekly Wrap-Up

## JBOSS EAP/AS - More Deserializations? Indeed! ![Metasploit Weekly Wrap-Up](https://blog.rapid7.com/content/images/2022/07/metasploit-ascii-1-2-1.png) Community contributor [Heyder Andrade]() added ...

Continue Reading
Privilege Escalation

github.com/argoproj/argo-cd is vulnerable to privilege escalation. Lack of enforcement of access restriction by application resource API allows an attacker to escalate the privileges to admin-level.Re ...

Continue Reading

Back to Main

Subscribe for the latest news: