Authorization Bypass Through User-Controlled Key vulnerability in "Rental Module" developed by third-party for Ideasoft's E-commerce Platform allows Authentication Abuse, Authentication Bypass.This i ...
Continue ReadingMay 20, 2023
Nmstate is a library with an accompanying command line tool that manages ho st networking settings in a declarative manner and aimed to satisfy enterprise needs to manage host networking through a nor ...
Continue ReadingMay 19, 2023
Last week, there were 139 vulnerabilities disclosed in 105 WordPress Plugins and 2 WordPress themes that have been added to the Wordfence Intelligence Vulnerability Database, and there were 47 Vulnera ...
Continue ReadingMay 18, 2023
## Summary A code execution vulnerability in Apache Kafka used byIBM InfoSphere Information Server was addressed. ## Vulnerability Details ** CVEID: **[CVE-2023-25194]() ** DESCRIPTION: **Apache Kafk ...
Continue ReadingMay 17, 2023
## Summary Multiple vulnerabilities in Apache Hadoop used by InfoSphere Information Server were addressed. ## Vulnerability Details ** CVEID: **[CVE-2022-26612]() ** DESCRIPTION: **Apache Hadoop for W ...
Continue ReadingMay 17, 2023
## Summary Multiple vulnerabilities in Kubernetes used by InfoSphere Information Server were addressed. ## Vulnerability Details ** CVEID: **[CVE-2022-3162]() ** DESCRIPTION: **Kubernetes kube-apiserv ...
Continue ReadingMay 17, 2023
AMQ Broker is a high-performance messaging implementation based on ActiveMQ Artemis. It uses an asynchronous journal for fast message persistence, and supports multiple languages, protocols, and platf ...
Continue ReadingMay 17, 2023
The remote CentOS Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the CESA-2023:2932 advisory. - A timing based side channel exists in the OpenSSL ...
Continue ReadingMay 17, 2023
Back to Main