Exploit for Cross-site Scripting in Redhat Keycloak

Badges ## License [MIT](https://choosealicense.com/licenses/mit/) ## Installation 1. Install Python3 and pip [Instructions Here](https://www.python.org/downloads/) (If you can&# ...

Continue Reading
Solid Central < 3.0.1 – Stored Cross-Site Scripting via packages

Description The plugin is vulnerable to Stored Cross-Site Scripting via via malicious package names in all versions up to and including 3.0.0 due to insufficient output escaping. This makes it possibl ...

Continue Reading
@clerk/nextjs auth() and getAuth() methods vulnerable to insecure direct object reference (IDOR)

Impact Unauthorized access or privilege escalation due to a logic flaw in auth() in the App Router or getAuth() in the Pages Router. Affected Versions All applications that that use @clerk/nextjs vers ...

Continue Reading
@clerk/nextjs auth() and getAuth() methods vulnerable to insecure direct object reference (IDOR)

Impact Unauthorized access or privilege escalation due to a logic flaw in auth() in the App Router or getAuth() in the Pages Router. Affected Versions All applications that that use @clerk/nextjs vers ...

Continue Reading
Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’)

Nginx-UI is an online statistics for Server Indicators​​ Monitor CPU usage, memory usage, load average, and disk usage in real-time. This issue may lead to information disclosure. By using Default ...

Continue Reading
Improper Neutralization of Special Elements used in a Command (‘Command Injection’)

Nginx-UI is a web interface to manage Nginx configurations. It is vulnerable to arbitrary command execution by abusing the configuration settings. The Home &gt; Preference page exposes a list of s ...

Continue Reading
Improper Neutralization of Special Elements used in a Command (‘Command Injection’)

Nginx-ui is online statistics for Server Indicators​​ Monitor CPU usage, memory usage, load average, and disk usage in real-time. The Home &gt; Preference page exposes a small list of nginx se ...

Continue Reading
Joomla! vulnerability is being actively exploited

The Cybersecurity and Infrastructure Security Agency (CISA) has added a vulnerability for the Joomla! Content Management System (CMS) to its Known Exploited Vulnerabilities Catalog, based on evidence ...

Continue Reading

Back to Main

Subscribe for the latest news: