K000140405: Multiple OpenJDK vulnerabilities

Security Advisory Description CVE-2024-21147 Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported ...

Continue Reading
Argo CD Unauthenticated Denial of Service (DoS) Vulnerability via /api/webhook Endpoint

Summary This report details a security vulnerability in Argo CD, where an unauthenticated attacker can send a specially crafted large JSON payload to the /api/webhook endpoint, causing excessive memor ...

Continue Reading
3 ways to get Remote Code Execution in Kafka UI

Kafka UI is a popular open source web application designed to manage and monitor Apache Kafka clusters. It is used mainly by developers and administrators to provide visual representation of the conne ...

Continue Reading
Exploit for Code Injection in Rockoa

信呼 v2.3.2 针对 CVE-2023-1773 的调试环境...Read More ...

Continue Reading
Argo CD Unauthenticated Denial of Service (DoS) Vulnerability via /api/webhook Endpoint

Summary This report details a security vulnerability in Argo CD, where an unauthenticated attacker can send a specially crafted large JSON payload to the /api/webhook endpoint, causing excessive memor ...

Continue Reading
CVE-2024-40634

Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. This report details a security vulnerability in Argo CD, where an unauthenticated attacker can send a specially crafted large ...

Continue Reading
Ankitects Anki Flask Invalid Path Reflected Cross-Site Scripting (XSS) vulnerability

Talos Vulnerability Report TALOS-2024-1995 Ankitects Anki Flask Invalid Path Reflected Cross-Site Scripting (XSS) vulnerability July 22, 2024 CVE Number CVE-2024-32484 SUMMARY An reflected XSS vulnera ...

Continue Reading
CVE-2024-40634 Argo CD Unauthenticated Denial of Service (DoS) Vulnerability via /api/webhook Endpoint

Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. This report details a security vulnerability in Argo CD, where an unauthenticated attacker can send a specially crafted large ...

Continue Reading

Back to Main

Subscribe for the latest news: