The Contour Service was not checking that users had permission to create an analysis for a given dataset. This could allow an attacker to clutter up Compass folders with extraneous analyses, that the ...
Continue ReadingJune 27, 2023
The MainWP Child plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 4.4.1.1 due to insufficient controls on the storage of back-up files. This makes ...
Continue ReadingJune 27, 2023
Weak Password Requirements in GitHub repository cloudexplorer-dev/cloudexplorer-lite prior to v...Read More ...
Continue ReadingJune 27, 2023
The Image Map Pro â Drag-and-drop Builder for Interactive Images â Lite plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to, and including, 1.0.0. This is due ...
Continue ReadingJune 27, 2023
The Image Map Pro â Drag-and-drop Builder for Interactive Images â Lite plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.0.0. This is due ...
Continue ReadingJune 27, 2023
Affected versions Trend Micro Apex Central (on-premise) are vulnerable to potential authenticated reflected cross-site scripting (XSS) attacks due to user input validation and sanitization issues. Pl ...
Continue ReadingJune 27, 2023
A Time-of-Check Time-Of-Use vulnerability in the Trend Micro Apex One and Apex One as a Service agent could allow a local attacker to escalate privileges on affected installations. Please note: a loca ...
Continue ReadingJune 27, 2023
Certain dashboard widgets on Trend Micro Apex Central (on-premise) are vulnerable to cross-site scripting (XSS) attacks that may allow an attacker to achieve remote code execution on affected servers. ...
Continue ReadingJune 27, 2023
Back to Main