Active Exploitation of ZK Framework CVE-2022-36537

![Active Exploitation of ZK Framework CVE-2022-36537](https://blog.rapid7.com/content/images/2023/03/GettyImages-1352385622.jpg) _Emergent threats evolve quickly, and as we learn more about this vulne ...

Continue Reading

CVSS3 - HIGH

HTML Injection in Keycloak Admin REST API

The `execute-actions-email` endpoint of the Keycloak Admin REST API allows a malicious actor to send emails containing phishing links to Keycloak users.Read More ...

Continue Reading
Lemur subject to insecure random generation

### Overview Lemur was using insecure random generation for its example configuration file, as well as for some utilities. ### Impact The potentially affected generated items include: | Configuration ...

Continue Reading
CVE-2023-25575

This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will b ...

Continue Reading
Why Attackers Target the Healthcare Industry

## Key Takeaways: * Personal health information (PHI) is an incredibly valuable category of personal data. When compromised and sold on the dark web, this data can be sold for thousands of dollars. ...

Continue Reading
Exploit for CVE-2023-23752

## CVE-2023-23752 Joomla 未授权访问漏洞 CVE-2023-23752 ## 漏洞描述 Joomla是...Read More ...

Continue Reading

CVSS3 - MEDIUM

CVE-2023-1065

This vulnerability in the Snyk Kubernetes Monitor can result in irrelevant data being posted to a Snyk Organization, which could in turn obfuscate other, relevant, security issues. It does not expose ...

Continue Reading
CVE-2023-0951

Improper access controls on some API endpoints in Devolutions Server 2022.3.12 and earlier could allow a standard privileged user to perform privileged actions.Read More ...

Continue Reading

Back to Main

Subscribe for the latest news: