FortiWeb – Path traversal in API handler

A relative path traversal vulnerability [CWE-23] in FortiWeb may allow an authenticated attacker to obtain unauthorized access to files and data via specifically crafted HTTP GET requests.Read More ...

Continue Reading
FortiWeb – Path traversal in API controller

A relative path traversal vulnerability [CWE-23] in the API of FortiWeb may allow an authenticated attacker to retrieve arbitrary files from the underlying filesystem via specially crafted web request ...

Continue Reading
Unauthorized Rest Api owned by Joomla(officially accepted)

# Description Joomla has provided the Rest API since version 4.0. These apis need to provide authentication information when accessing, but if public is added to the request parameters when accessing ...

Continue Reading
Thursday February 16 2023 Security Releases

# Thursday February 16 2023 Security Releases by Michael Dawson, 2023-02-16 # _(Update 16-February-2023)_ Security releases available Updates are now available for the v19.x, v18.x, v16.x, and v14.x N ...

Continue Reading
Splunk Enterprise 8.1 < 8.1.13, 8.2.0 < 8.2.10, 9.0.0 < 9.0.4 (SVD-2023-0208)

The version of Splunk installed on the remote host is prior to tested version. It is, therefore, affected by a vulnerability as referenced in the SVD-2023-0208 advisory. - In Splunk Enterprise versi ...

Continue Reading
Users with any cluster secret update access may update out-of-bounds cluster secrets

### Impact All Argo CD versions starting with v2.3.0-rc1 are vulnerable to an improper authorization bug which allows users who have the ability to update at least one cluster secret to update any clu ...

Continue Reading
CVE-2023-23947

A flaw was found in ArgoCD. An improper authorization bug may allow an attacker to update at least one cluster secret, enabling them to change any other cluster secret. The attacker must know the URL ...

Continue Reading
CVE-2022-21163

Improper access control in the Crypto API Toolkit for Intel(R) SGX before version 2.0 commit ID 91ee496 may allow an authenticated user to potentially enable escalation of privilege via local access.R ...

Continue Reading

Back to Main

Subscribe for the latest news: