CVE-2024-30242

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in IT Path Solutions Contact Form to Any API.This issue affects Contact Form to Any API: fr ...

Continue Reading
GHSA-FGQ5-Q76C-GX78 vulnerabilities

Vulnerabilities for packages: go-licenses, cluster-api-controller, k8sgpt, logstash-exporter, kubeadm-bootstrap-controller, filebeat, gitlab-runner, kubernetes-dns-node-cache, nri-cassandra, nri-f5, p ...

Continue Reading
GHSA-FGQ5-Q76C-GX78 vulnerabilities

Vulnerabilities for packages: go-licenses, cluster-api-controller, k8sgpt, logstash-exporter, kubeadm-bootstrap-controller, filebeat, gitlab-runner, kubernetes-dns-node-cache, nri-cassandra, nri-f5, p ...

Continue Reading
BIT-grafana-2024-1313

It is possible for a user in a different organization from the owner of a snapshot to bypass authorization and delete a snapshot by issuing a DELETE request to /api/snapshots/ using its view key. This ...

Continue Reading
BIT-grafana-2024-1313

It is possible for a user in a different organization from the owner of a snapshot to bypass authorization and delete a snapshot by issuing a DELETE request to /api/snapshots/ using its view key. This ...

Continue Reading
GHSA-3Q2C-PVP5-3CQP vulnerabilities

Vulnerabilities for packages: go-licenses, cluster-api-controller, k8sgpt, logstash-exporter, kubeadm-bootstrap-controller, filebeat, gitlab-runner, kubernetes-dns-node-cache, nri-cassandra, nri-f5, p ...

Continue Reading
GHSA-3Q2C-PVP5-3CQP vulnerabilities

Vulnerabilities for packages: go-licenses, cluster-api-controller, k8sgpt, logstash-exporter, kubeadm-bootstrap-controller, filebeat, gitlab-runner, kubernetes-dns-node-cache, nri-cassandra, nri-f5, p ...

Continue Reading
Exploit for Vulnerability in Microsoft

# 🇮🇱 **#BringThemHome #NeverAgainIsNow** 🇮🇱 **We demand the safe return of all citizens who have been taken hostage by the terrorist group Hamas. We will not rest until every hostage ...

Continue Reading

Back to Main

Subscribe for the latest news: