Kea configuration and API directives can be used to overwrite arbitrary files, subject to permissions granted to Kea. Many common configurations run Kea as root, leave the API entry points unsecured ...
Continue ReadingMay 28, 2025
SummaryThis advisory addresses a security vulnerability in Mautic where sensitive .envĀ configuration files may be directly accessible via a web browser. This exposure could lead to the disclosure of ...
Continue ReadingMay 28, 2025
creation_timestamp| type| source ---|---|--- 2025-05-28 13:47:08+00:00| seen|...Read More ...
Continue ReadingMay 28, 2025
SummaryThis advisory addresses a security vulnerability in Mautic where sensitive .envĀ configuration files may be directly accessible via a web browser. This exposure could lead to the disclosure of ...
Continue ReadingMay 28, 2025
Kea configuration and API directives can be used to overwrite arbitrary files, subject to permissions granted to Kea. Many common configurations run Kea as root, leave the API entry points unsecured ...
Continue ReadingMay 28, 2025
Kea configuration and API directives can be used to load a malicious hook library. Many common configurations run Kea as root, leave the API entry points unsecured by default, and/or place the contro ...
Continue ReadingMay 28, 2025
Kea configuration and API directives can be used to overwrite arbitrary files, subject to permissions granted to Kea. Many common configurations run Kea as root, leave the API entry points unsecured ...
Continue ReadingMay 28, 2025
creation_timestamp| type| source ---|---|--- 2025-05-28 13:56:02+00:00| seen| https://infosec.exchange/users/cR0w/statuses/114585800636728854 2025-05-28 15:27:28+00:00| seen|...Read More ...
Continue ReadingMay 28, 2025
Back to Main