## Summary A vulnerability in Apache Tomcat affects the product's management GUI. The Command Line Interface is unaffected. ## Vulnerability Details **CVEID: **[CVE-2022-25762]() **DESCRIPTION: **Apac ...
Continue ReadingSeptember 30, 2022
Multiple API endpoints of Atlassian Bitbucket Server and Data Center contain a command injection vulnerability where an attacker with access to a public Bitbucket repository, or with read permissions ...
Continue ReadingSeptember 30, 2022
Zammad is a suite of ticket management software from Zammad Germany. version 5.2.1 of Zammad contains an access control error vulnerability, which stems from the existence of faulty access control in ...
Continue ReadingSeptember 30, 2022
TLS hostname verification cannot be enabled in the Pulsar Broker's Java Client, the Pulsar Broker's Java Admin Client, the Pulsar WebSocket Proxy's Java Client, and the Pulsar Proxy's Admin Client lea ...
Continue ReadingSeptember 29, 2022
Consul is vulnerable to authorization denial of service. Due to incorrectly validating JWT characters, an attacker can continually request TLS certificates and ACL tokens. This unnecessary information ...
Continue ReadingSeptember 29, 2022
TLS hostname verification cannot be enabled in the Pulsar Broker's Java Client, the Pulsar Broker's Java Admin Client, the Pulsar WebSocket Proxy's Java Client, and the Pulsar Proxy's Admin Client lea ...
Continue ReadingSeptember 29, 2022
Skip to main content Toolbar items Manage Administration menu Tools Extend Tools Content Extend Content Structure Configuration Extend Configuration Help Horizontal orientation dgloria Edit ICS Adviso ...
Continue ReadingSeptember 29, 2022
## Abstract A number of security vulnerabilities have been discovered in the Java Runtime Environment and the Cognos Business Intelligence components included in IBM SCC. ## Content **CVE ID: **[_CVE ...
Continue ReadingSeptember 29, 2022
Back to Main