Read More ...
Continue ReadingAugust 31, 2023
## Summary IBM Edge Application Manager 4.5.2 addresses the security vulnerabilities listed in the CVEs below. ## Vulnerability Details ** CVEID: **[CVE-2022-25883]() ** DESCRIPTION: **Node.js semver ...
Continue ReadingAugust 31, 2023
The Stripe Payment Plugin for WooCommerce plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 3.7.7. This is due to insufficient verification on the user bein ...
Continue ReadingAugust 31, 2023
The Migration Toolkit for Containers (MTC) enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the M ...
Continue ReadingAugust 31, 2023
![](https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2023/08/29134544/sl-random-code-bug-malware-red-blue-1200-990x400.jpg) * **IT threat evolution in Q2 2023** * [IT threat evolu ...
Continue ReadingAugust 30, 2023
The Forminator plugin for WordPress is vulnerable to arbitrary file uploads due to file type validation occurring after a file has been uploaded to the server in the upload_post_image() function in ve ...
Continue ReadingAugust 30, 2023
## Summary There are multiple vulnerabilities in components of IBM i Modernization Engine for Lifecycle Integration as described in the Vulnerability Details section. Google Guava and Apache James MIM ...
Continue ReadingAugust 30, 2023
## Summary Operations Dashboard is vulnerable to remote code execution, privilege escalation, and denial of service due to multiple Go vulnerabilities with details below (CVE-2023-29405, CVE-2023-2940 ...
Continue ReadingAugust 29, 2023
Sahoâs attendance devices ADM100 and ADM-100FP has insufficient filtering for special characters and file type within their file uploading function. A unauthenticate remote attacker authenticated ...
Continue ReadingAugust 28, 2023
SpotCam Co., Ltd. SpotCam FHD 2âs hidden Telnet function has a vulnerability of using hard-coded Telnet credentials. An remote unauthenticated attacker can exploit this vulnerability to access th ...
Continue ReadingAugust 28, 2023