Drupal core's form API has a vulnerability where certain contributed or custom modules' forms may be vulnerable to improper input validation. This could allow an attacker to inject disallowed values o ...
Continue ReadingMay 25, 2023
## Whatâs hiding in the shadows? Itâs a well understood reality that unmanaged IT assets tend to be unmonitored IT assets, and that both introduce risk. Whether itâs a forgotten about ...
Continue ReadingMay 25, 2023
containerd is an open source container runtime. A bug was found in the containerd's CRI implementation where programs inside a container can cause the containerd daemon to consume memory without bound ...
Continue ReadingMay 25, 2023
The OCI Distribution Spec project defines an API protocol to facilitate and standardize the distribution of content. In the OCI Distribution Specification version 1.0.0 and prior, the Content-Type hea ...
Continue ReadingMay 25, 2023
containerd is an industry-standard container runtime and is available as a daemon for Linux and Windows. In containerd before versions 1.3.9 and 1.4.3, the containerd-shim API is improperly exposed to ...
Continue ReadingMay 25, 2023
A flaw was found in the way samba implemented an RPC endpoint emulating the Windows registry service API. An unprivileged attacker could use this flaw to create a new registry hive file anywhere they ...
Continue ReadingMay 25, 2023
In Python (CPython) 3.6 through 3.6.10, 3.7 through 3.7.6, and 3.8 through 3.8.1, an insecure dependency load upon launch on Windows 7 may result in an attacker's copy of api-ms-win-core-path-l1-1-0.d ...
Continue ReadingMay 25, 2023
A privilege escalation vulnerability exists in Node.js Read More ...
Continue ReadingMay 25, 2023
Back to Main