OpenAPI Permissive Input Validation

OpenAPI specification is an API description format for REST APIs. An OpenAPI file is written in YAML or JSON and describes all the API properties like the available endpoints with the related operatio ...

Continue Reading
CVE-2022-2227

Improper access control in the runner jobs API in GitLab CE/EE affecting all versions prior to 14.10.5, 15.0 prior to 15.0.4, and 15.1 prior to 15.1.1 allows a previous maintainer of a project with a ...

Continue Reading
CVE-2022-1999

An issue has been discovered in GitLab CE/EE affecting all versions from 8.13 prior to 14.10.5, 15.0 prior to 15.0.4, and 15.1 prior to 15.1.1. Under certain conditions, using the REST API an unprivil ...

Continue Reading
Extend your dependency information in the GitHub Dependency Graph with new GitHub Actions

Earlier this month, we [released an API]() that allowed you to upload dependency information directly to GitHub. Previously, GitHub built the dependency graph entirely from static scans of checked-in ...

Continue Reading
(RHSA-2022:5483) Moderate: Migration Toolkit for Containers (MTC) 1.7.2 security and bug fix update

The Migration Toolkit for Containers (MTC) enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the M ...

Continue Reading
How to Monitor Athena Usage to Understand Your Operations, and Control Security and Costs

## Introduction to our data lakes experience [Data lakes]() are great. They are flexible as they allow many object formats and multiple query engines. They are also cost effective - there is no need t ...

Continue Reading
Amazon Quietly Patches ‘High Severity’ Vulnerability in Android Photos App

[![Amazon](https://thehackernews.com/new-images/img/b/R29vZ2xl/AVvXsEjzQVlonJf_XqhWGctqBadliStgZ5BfPcXrV2M5NMVhbx55llKoFb7y5LJNOQAXGesOZEbTU_tWzesgNJVO3WxklVO0_XospeR23Hm7CFyt3ymBVCrAOj0K5Unwn5j32ppll ...

Continue Reading
Denial Of Service (DoS)

matrix_synapse is vulnerable to denial of service (DoS) attacks. An authenticated attacker is able to exhaust the available stack space for the `Synapse` process due to unbounded recursion, resulting ...

Continue Reading

Back to Main

Subscribe for the latest news: