Moderate: fence-agents security and bug fix update

The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the ...

Continue Reading

CVSS3 - MEDIUM

RHEL 9 : fence-agents (RHSA-2023:2161)

The remote Redhat Enterprise Linux 9 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2023:2161 advisory. - OAuthLib is an implementation of the OAuth reque ...

Continue Reading

CVSS3 - MEDIUM

(RHSA-2023:2161) Moderate: fence-agents security and bug fix update

The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the ...

Continue Reading

CVSS3 - MEDIUM

Ubuntu 16.04 ESM : PHP vulnerability (USN-6053-1)

The remote Ubuntu 16.04 ESM host has packages installed that are affected by a vulnerability as referenced in the USN-6053-1 advisory. - In PHP 8.0.X before 8.0.28, 8.1.X before 8.1.16 and 8.2.X bef ...

Continue Reading

CVSS3 - MEDIUM

PHP vulnerability

## Releases * Ubuntu 16.04 ESM ## Packages * php7.0 - HTML-embedded scripting language interpreter It was discovered that PHP incorrectly handled certain invalid Blowfish password hashes. An inval ...

Continue Reading

CVSS3 - MEDIUM

(Pwn2Own) NETGEAR RAX30 SOAP Request SQL Injection Remote Code Execution Vulnerability

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR RAX30 routers. Authentication is not required to exploit this vulnerability. The spe ...

Continue Reading
(Pwn2Own) NETGEAR RAX30 GetInfo Missing Authentication Information Disclosure Vulnerability

This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of NETGEAR RAX30 routers. Authentication is not required to exploit this vulnerability. ...

Continue Reading
Why Shadow APIs are More Dangerous than You Think

[![](data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=)]() Shadow APIs are a growing risk for organizations of all sizes as they can ma ...

Continue Reading

Back to Main

Subscribe for the latest news: