The Forminator plugin for WordPress is vulnerable to arbitrary file uploads due to file type validation occurring after a file has been uploaded to the server in the upload_post_image() function in ve ...
Continue ReadingAugust 30, 2023
## Summary There are multiple vulnerabilities in components of IBM i Modernization Engine for Lifecycle Integration as described in the Vulnerability Details section. Google Guava and Apache James MIM ...
Continue ReadingAugust 30, 2023
## Summary IBM Maximo Application Suite uses gRPC package which is vulnerable to CVE-2023-32731. ## Vulnerability Details ** CVEID: **[CVE-2023-32731]() ** DESCRIPTION: **gRPC could allow a remote att ...
Continue ReadingAugust 29, 2023
## Summary Operations Dashboard is vulnerable to remote code execution, privilege escalation, and denial of service due to multiple Go vulnerabilities with details below (CVE-2023-29405, CVE-2023-2940 ...
Continue ReadingAugust 29, 2023
Sahoâs attendance devices ADM100 and ADM-100FP have insufficient authentication. An unauthenticated remote attacker can exploit this vulnerability to bypass authentication to read system informat ...
Continue ReadingAugust 28, 2023
Sahoâs attendance devices ADM100 and ADM-100FP has insufficient filtering for special characters and file type within their file uploading function. A unauthenticate remote attacker authenticated ...
Continue ReadingAugust 28, 2023
Sahoâs attendance devices ADM100 and ADM-100FP have a vulnerability of missing authentication for critical functions. An unauthenticated remote attacker can execute system commands in partial web ...
Continue ReadingAugust 28, 2023
SpotCam Co., Ltd. SpotCam FHD 2âs hidden Telnet function has a vulnerability of using hard-coded Telnet credentials. An remote unauthenticated attacker can exploit this vulnerability to access th ...
Continue ReadingAugust 28, 2023
Back to Main