In LemonLDAP::NG (aka lemonldap-ng) before 2.0.7, the default Apache HTTP Server configuration does not properly restrict access to SOAP/REST endpoints (when some LemonLDAP::NG setup options are used) ...
Continue ReadingJune 07, 2023
In LemonLDAP::NG (aka lemonldap-ng) before 2.0.7, the default Apache HTTP Server configuration does not properly restrict access to SOAP/REST endpoints (when some LemonLDAP::NG setup options are used) ...
Continue ReadingJune 07, 2023
Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages ...
Continue ReadingJune 07, 2023
## Summary Multiple Security Vulnerabilities in the IBM Security Directory Suite have been addressed by code updates and updating the relevant components. ## Vulnerability Details ** CVEID: **[CVE-202 ...
Continue ReadingJune 06, 2023
A highly-available key value store for shared configuration Security Fix(es): * Information discosure via debug function (CVE-2021-28235) * Key name can be accessed via LeaseTimeToLive API (CVE-2023-3 ...
Continue ReadingJune 05, 2023
Hitron Technologies CODA-5310 Telnet function with the default account and password, and there is no warning or prompt to ask users to change the default password and account. An unauthenticated remot ...
Continue ReadingJune 02, 2023
It is identified a vulnerability of insufficient authentication in the system configuration interface of Hitron Technologies CODA-5310. An unauthorized remote attacker can exploit this vulnerability t ...
Continue ReadingJune 02, 2023
ELITE TECHNOLOGY CORP. Web Fax has a vulnerability of SQL Injection. An unauthenticated remote attacker can inject SQL commands into the input field of the login page to perform arbitrary system comma ...
Continue ReadingJune 02, 2023
Wade Graphic Design FANTSY has a vulnerability of insufficient authorization check. An unauthenticated remote user can exploit this vulnerability by modifying URL parameters to gain administrator priv ...
Continue ReadingJune 02, 2023
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Erikoglu Technology ErMon allows Command Line Execution through SQL Injection, Authentication Bypa ...
Continue ReadingJune 02, 2023
According to a Mar-2022 API survey by Gartner, 98% of organizations use or are planning to use internal APIs â up from 88% in 2019. And 90% of organizations use or are planning to use private API ...
Continue ReadingJune 01, 2023