Rancher permissions on 'namespaces' in any API group grants 'edit' permissions on namespaces in 'core' in...Read More ...
Continue ReadingJune 28, 2024
Nginx-UI vulnerable to arbitrary file write through the Import Certificate feature in...Read More ...
Continue ReadingJune 28, 2024
IBM MQ 9.0 LTS, 9.1 LTS, 9.2 LTS, 9.3 LTS and 9.3 CD, in certain configurations, is vulnerable to a denial of service attack caused by an error processing messages when an API Exit using MQBUFMH is us ...
Continue ReadingJune 28, 2024
BigBlueButton is an open-source virtual classroom designed to help teachers teach and learners learn. An attacker with a valid join link to a meeting can trick BigBlueButton into generating a signed j ...
Continue ReadingJune 28, 2024
BigBlueButton is an open-source virtual classroom designed to help teachers teach and learners learn. An attacker with a valid join link to a meeting can trick BigBlueButton into generating a signed j ...
Continue ReadingJune 28, 2024
NextChat is a cross-platform ChatGPT/Gemini UI. There is a Server-Side Request Forgery (SSRF) vulnerability due to a lack of validation of the endpoint GET parameter on the WebDav API endpoint. This S ...
Continue ReadingJune 28, 2024
An Authentication Bypass Using an Alternate Path or Channel vulnerability in Juniper Networks Session Smart Router or conductor running with a redundant peer allows a network based attacker to bypass ...
Continue ReadingJune 28, 2024
authentik is an open-source Identity Provider that emphasizes flexibility and versatility. Authentik API-Access-Token mechanism can be exploited to gain admin user privileges. A successful exploit of ...
Continue ReadingJune 28, 2024
Back to Main