Ghost vulnerable to information disclosure of private API fields

### Impact Due to a lack of validation when filtering on the public API endpoints, it is possible to reveal private fields via a brute force attack. Ghost(Pro) has already been patched. We can find no ...

Continue Reading
Tauri Open Redirect Vulnerability Possibly Exposes IPC to External Sites

### Impact The Tauri IPC is usually strictly isolated from external websites but the isolation can be bypassed by redirecting an existing Tauri window to an external website. This is either possible b ...

Continue Reading
CVE-2023-25826

Due to insufficient validation of parameters passed to the legacy HTTP query API, it is possible to inject crafted OS commands into multiple parameters and execute malicious code on the OpenTSDB host ...

Continue Reading
CVE-2023-25827

Due to insufficient validation of parameters reflected in error messages by the legacy HTTP query API and the logging endpoint, it is possible to inject and execute malicious JavaScript within the bro ...

Continue Reading
Databricks Platform Cluster Isolation Bypass

Post ContentRead More ...

Continue Reading
Metlo – An Open-Source API Security Platform

[![](https://blogger.googleusercontent.com/img/a/AVvXsEhHgriLwfLMeOMhgbYKGuXEwLbtP0-JgexMV61j39foQDnJ4wtw4Yyty8Olm4KbjxJsYtlAFi27WPLp_11ZrN5eKGJ8pEagFuDe5FYq6dINQkAVi0lVgbh3ibawx5LI3r6PUltAfJcj64iDjX7 ...

Continue Reading
CVE-2023-28724

NGINX Management Suite default file permissions are set such that an authenticated attacker may be able to modify sensitive files on NGINX Instance Manager and NGINX API Connectivity Manager.   ...

Continue Reading

CVSS3 - HIGH

CVE-2023-28656

NGINX Management Suite may allow an authenticated attacker to gain access to configuration objects outside of their assigned environment.   Note: Software versions which have reached End of Tech ...

Continue Reading

CVSS3 - HIGH

Back to Main

Subscribe for the latest news: