CVE-2023-29863

Medical Systems Co. Medisys Weblab Products v19.4.03 was discovered to contain a SQL injection vulnerability via the tem:statement parameter in the WSDL files.Read More ...

Continue Reading
python-suds bug fix and enhancement update

An update is available for python-suds. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulner ...

Continue Reading
CVE-2023-22374: F5 BIG-IP Format String Vulnerability

![CVE-2023-22374: F5 BIG-IP Format String Vulnerability](https://blog.rapid7.com/content/images/2023/02/GettyImages-1352385622.jpg) While following up our [previous work on F5's BIG-IP devices](), Rap ...

Continue Reading

CVSS3 - HIGH

Spring WS Samples upgraded for Spring Boot 3.0!

With the recent [announcement of Spring Boot 3.0 going GA](), some of you may be interested in upgrading your Spring Web Services-based applications to take full advantage of this. The Spring WS team ...

Continue Reading
F5 BIG-IP iControl SOAP directory traversal vulnerability

F5 BIG-IP is an application delivery platform from F5 that integrates network traffic orchestration, load balancing, intelligent DNS, remote access policy management, etc. A directory traversal vulner ...

Continue Reading

CVSS3 - MEDIUM

CVSS2 - MEDIUM

Ricoh myPrint Hardcoded Credentials / Information Disclosure

Post ContentRead More ...

Continue Reading
Information Disclosure

jbossws is vulnerable to information disclosure. The request handler in JBossWS did not correctly verify the resource path when serving WSDL files for custom web service endpoints. This allowed remote ...

Continue Reading
Ricoh myPrint Hardcoded Credentials / Information Disclosure Vulnerability

Ricoh myPrint suffers from hardcoded application credential and information disclosure vulnerabilities. The myPrint windows client version 2.9.2.4 and myPrint android client version 2.2.7 are both aff ...

Continue Reading

Back to Main

Subscribe for the latest news: