Summary A path traversal vulnerability via the plugin repository name allows an authenticated attacker to delete files on the server leading to unavailability and potentially data loss. Details Uptime ...
Continue ReadingMay 01, 2024
Summary Installation of a maliciously crafted plugin allows for remote code execution by an authenticated attacker. Details Uptime Kuma allows authenticated users to install plugins from an official l ...
Continue ReadingMay 01, 2024
The remote host is missing an update for...Read More ...
Continue ReadingMay 01, 2024
Unauthenticated remote code execution vulnerability in NextGen Healthcare Mirth Connect before version...Read More ...
Continue ReadingMay 01, 2024
librespeed/speedtest is an open source, self-hosted speed test for HTML5. In affected versions missing neutralization of the ISP information in a speedtest result leads to stored Cross-site scripting ...
Continue ReadingMay 01, 2024
The Geo Controller WordPress plugin before 8.6.5 unserializes user input via some of its AJAX actions and REST API routes, which could allow unauthenticated users to perform PHP Object Injection when ...
Continue ReadingMay 01, 2024
freeipa is vulnerable to Insertion Of Sensitive Information Into Log File. The vulnerability is due to a flaw in FreeIPA's batch processing API resulting in improper masking of sensitive informat ...
Continue ReadingMay 01, 2024
The Migration Toolkit for Containers (MTC) enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the M ...
Continue ReadingMay 01, 2024
Back to Main