Use of default credentials vulnerability in CONPROSYS HMI System (CHS) Ver.3.4.5 and earlier allows a remote unauthenticated attacker to alter user credentials information.Read More ...
Continue ReadingJanuary 20, 2023
Improper access control vulnerability in CONPROSYS HMI System (CHS) Ver.3.4.5 and earlier allows a remote unauthenticated attacker to bypass access restriction and obtain the server certificate includ ...
Continue ReadingJanuary 20, 2023
Use of password hash instead of password for authentication vulnerability in CONPROSYS HMI System (CHS) Ver.3.4.5 and earlier allows a remote authenticated attacker to obtain user credentials informat ...
Continue ReadingJanuary 20, 2023
**T-Mobile** today disclosed a data breach affecting tens of millions of customer accounts, its second major data exposure in as many years. In a filing with federal regulators, T-Mobile said an inves ...
Continue ReadingJanuary 20, 2023
A CISOâs job has never been more challenging. Engineering teams move fast, especially as organizations are accelerating their digital transformation efforts. The tech stack is exploding and varie ...
Continue ReadingJanuary 20, 2023
swift is vulnerable to XML External Entity (XXE) attacks. The vulnerability allows a remote authenticated attacker to access potentially sensitive data in S3 buckets by persuading the `S3 API` into re ...
Continue ReadingJanuary 20, 2023
github.com/kubeoperator/kubepi is vulnerable to Improper Access Control. A remote attacker is able to bypass the system's preset permission settings to access restricted API interfaces which leak sens ...
Continue ReadingJanuary 20, 2023
apache-superset is vulnerable to Cross-Site Request Forgery (CSRF). The vulnerability exists due to the use of the HTTP GET method for the legacy REST API endpoints in the `request_access` and `approv ...
Continue ReadingJanuary 20, 2023
Back to Main