(RHSA-2022:8855) Moderate: Red Hat OpenStack Platform 16.2.4 (openstack-neutron) security update

OpenStack Networking (neutron) is a virtual network service for OpenStack. Just as OpenStack Compute (nova) provides an API to dynamically request and configure virtual servers, OpenStack Networking p ...

Continue Reading
(RHSA-2022:8870) Moderate: Red Hat OpenStack Platform 16.1.9 (openstack-neutron) security update

OpenStack Networking (neutron) is a virtual network service for OpenStack. Just as OpenStack Compute (nova) provides an API to dynamically request and configure virtual servers, OpenStack Networking p ...

Continue Reading
(RHSA-2022:8874) Moderate: Red Hat OpenStack Platform 16.1.9 (openstack-barbican) security update

Barbican is a REST API designed for the secure storage, provisioning and management of secrets, including in OpenStack environments. Security Fix(es): * Barbican allows authenticated users to add/modi ...

Continue Reading

CVSS3 - HIGH

FBI’s Vetted Info Sharing Network ‘InfraGard’ Hacked

**InfraGard**, a program run by the **U.S. Federal Bureau of Investigation** (FBI) to build cyber and physical threat information sharing partnerships with the private sector, this week saw its databa ...

Continue Reading
Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’)

Alist v3.5.1 is vulnerable to Cross Site Scripting (XSS) via the bulletin board.Read More ...

Continue Reading
AList vulnerable to Improper Preservation of Permissions

Alist v3.4.0 is vulnerable to File Upload. A user with only file upload permission can upload any file to any folder (even a password protected one).Read More ...

Continue Reading
Virtuozzo Hybrid Infrastructure 5.3 Update 1 (5.3.1-38)

This update provides new features for security, monitoring, and the compute service, as well as bug fixes and improvements. **Vulnerability id:** VSTOR-60452 It is impossible to start a cluster update ...

Continue Reading
Veeam Backup & Replication Remote Code Execution Vulnerability

The Veeam Distribution Service in the Backup & Replication application allows unauthenticated users to access internal API functions. A remote attacker can send input to the internal API which ...

Continue Reading

CVSS3 - CRITICAL

CVSS2 - HIGH

Back to Main

Subscribe for the latest news: