Exploit for Insufficient Session Expiration in Eclipse Jetty

Eclipse Jetty Canonical Repository =============================...Read More ...

Continue Reading
Exploit for CVE-2022-2048

Eclipse Jetty Canonical Repository =============================...Read More ...

Continue Reading
Researchers Unmask Sandman APT’s Hidden Link to China-Based KEYPLUG Backdoor

Tactical and targeting overlaps have been discovered between the enigmatic advanced persistent threat (APT) called Sandman and a China-based threat cluster that's known to use a backdoor referred ...

Continue Reading
Uptime Kuma Authenticated remote code execution via TailscalePing

Summary The runTailscalePing method of the TailscalePing class injects the hostname parameter inside a shell command, leading to a command injection and the possibility to run arbitrary commands on th ...

Continue Reading
Rocky Linux 9 : firefox (RLSA-2023:0285)

The remote Rocky Linux 9 host has packages installed that are affected by multiple vulnerabilities as referenced in the RLSA-2023:0285 advisory. An out of date library (libusrsctp) contained vulnera ...

Continue Reading
CVE-2023-49805

Uptime Kuma is an easy-to-use self-hosted monitoring tool. Prior to version 1.23.9, the application uses WebSocket (with Socket.io), but it does not verify that the source of communication is valid. T ...

Continue Reading
Exploit for Uncontrolled Resource Consumption in Eclipse Jetty

Eclipse Jetty Canonical Repository =============================...Read More ...

Continue Reading
Uptime Kuma Authenticated remote code execution via TailscalePing

Summary The runTailscalePing method of the TailscalePing class injects the hostname parameter inside a shell command, leading to a command injection and the possibility to run arbitrary commands on th ...

Continue Reading

Back to Main

Subscribe for the latest news: