The Donation Forms by Charitable plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 1.7.0.12 due to insufficient restriction on the 'update_core_user' functio ...
Continue ReadingAugust 23, 2023
Ever since Yahoo! finance decommissioned their historical data API, many programs that relied on it to stop working. yfinance aims to solve this problem by offering a reliable, threaded, and Pythonic ...
Continue ReadingAugust 23, 2023
Tekton Pipelines project provides k8s-style resources for declaring CI/CD-style pipelines. Starting in version 0.35.0, pipelines do not validate child UIDs, which means that a user that has access to ...
Continue ReadingAugust 21, 2023
## Summary IBM Watson Machine Learning Accelerator 1.2.x is vulnerable to several vulnerabilities coming from dependent compoents. These are addressed. ## Vulnerability Details ** CVEID: **[CVE-2023-2 ...
Continue ReadingAugust 18, 2023
Although [X.509]() certificates have been here for a while, they have become more popular for client authentication in zero-trust networks in recent years. Mutual TLS, or authentication based on X.509 ...
Continue ReadingAugust 18, 2023
[]() Microsoft on Thursday disclosed that it found a new versi ...
Continue ReadingAugust 18, 2023
Although [X.509]() certificates have been here for a while, they have become more popular for client authentication in zero-trust networks in recent years. Mutual TLS, or authentication based on X.509 ...
Continue ReadingAugust 18, 2023
Back to Main