The code in UEK6 U3 was missing an appropiate file descriptor count to be missing. This resulted in a use count error that allowed a file descriptor to a socket to be closed and freed while it was sti ...
Continue ReadingJune 14, 2022
[: Linux security bulletin publication dates are now included in sc ...
Continue ReadingJune 13, 2022
In Festo Controller CECC-X-M1 product family in multiple versions, the http-endpoint "cecc-x-web-viewer-request-off" POST request doesnât check for port syntax. This can result in unauthorized ex ...
Continue ReadingJune 13, 2022
In Festo Controller CECC-X-M1 product family in multiple versions, the http-endpoint "cecc-x-web-viewer-request-on" POST request doesnât check for port syntax. This can result in unauthorized exe ...
Continue ReadingJune 13, 2022
In Festo Controller CECC-X-M1 product family in multiple versions, the http-endpoint "cecc-x-refresh-request" POST request doesnât check for port syntax. This can result in unauthorized execution ...
Continue ReadingJune 13, 2022
The vulnerability is that IDToken verifier does not verify if token is properly signed. Signature verification makes sure that the token's payload comes from valid provider, not from someone else. An ...
Continue ReadingJune 13, 2022
Back to Main