(RHSA-2023:3892) Important: Red Hat Single Sign-On 7.6.4 security update

Red Hat Single Sign-On 7.6 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications. This rel ...

Continue Reading

CVSS3 - HIGH

CVSS2 - MEDIUM

(RHSA-2023:4030) Critical: grafana security update

Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB. Security Fix(es): * grafana: account takeover possible when using Azure AD OAuth (CVE ...

Continue Reading
Wordfence Intelligence Weekly WordPress Vulnerability Report (July 3, 2023 to July 9, 2023)

Last week, there were 61 vulnerabilities disclosed in 54 WordPress Plugins and 1 WordPress themes that have been added to the Wordfence Intelligence Vulnerability Database, and there were 28 Vulnerabi ...

Continue Reading

CVSS3 - CRITICAL

CVSS2 - MEDIUM

Debian DLA-3494-1 : ruby-doorkeeper – LTS security update

The remote Debian 10 host has a package installed that is affected by a vulnerability as referenced in the dla-3494 advisory. - Doorkeeper is an OAuth 2 provider for Ruby on Rails / Grape. Prior to ...

Continue Reading
RHEL 9 : grafana (RHSA-2023:4030)

The remote Redhat Enterprise Linux 9 host has a package installed that is affected by a vulnerability as referenced in the RHSA-2023:4030 advisory. - Grafana is validating Azure AD accounts based on ...

Continue Reading
AlmaLinux 9 : grafana (ALSA-2023:4030)

The remote AlmaLinux 9 host has a package installed that is affected by a vulnerability as referenced in the ALSA-2023:4030 advisory. - Grafana is validating Azure AD accounts based on the email cla ...

Continue Reading
Jenkins Assembla Auth Plugin vulnerable to cross-site request forgery

Jenkins Assembla Auth Plugin 1.14 and earlier does not implement a state parameter in its OAuth flow, a unique and non-guessable value associated with each authentication request. This vulnerability a ...

Continue Reading
Jenkins Assembla Auth Plugin vulnerable to cross-site request forgery

Jenkins Assembla Auth Plugin 1.14 and earlier does not implement a state parameter in its OAuth flow, a unique and non-guessable value associated with each authentication request. This vulnerability a ...

Continue Reading

Back to Main

Subscribe for the latest news: