Red Hat OpenShift Data Foundation is software-defined storage integrated with and optimized for the Red Hat OpenShift Container Platform. Red Hat OpenShift Data Foundation is a highly scalable, produc ...
Continue ReadingJuly 26, 2023
Red Hat OpenShift Data Foundation is software-defined storage integrated with and optimized for the Red Hat OpenShift Container Platform. Red Hat OpenShift Data Foundation is a highly scalable, produc ...
Continue ReadingJuly 26, 2023
Updates of ['linux', 'linux-secure', 'linux-aws', 'linux-rt'] packages of Photon OS have been released.Read More ...
Continue ReadingJuly 25, 2023
## Summary IBM Maximo Application Suite - Monitor Component uses Apache Kafka which is vulnerable to CVE-2022-34917 and CVE-2023-25194. ## Vulnerability Details ** CVEID: **[CVE-2022-34917]() ** DESCR ...
Continue ReadingJuly 24, 2023
## Summary Security Vulnerabilities in Node.js affects IBM Voice Gateway. The vulnerability has been addressed. ## Vulnerability Details ** CVEID: **[CVE-2023-30581]() ** DESCRIPTION: **Node.js could ...
Continue ReadingJuly 21, 2023
There is a Cross-site Scripting vulnerability in Esri Portal Sites in versions 10.8.1 â 11.1 that may allow a remote, authenticated attacker to create a crafted link which when clicked could p ...
Continue ReadingJuly 21, 2023
The Jupiter X Core plugin for WordPress is vulnerable to arbitrary file downloads in versions up to, and including, 2.5.0. This makes it possible for unauthenticated attackers to download the contents ...
Continue ReadingJuly 21, 2023
Galaxy Software Services Vitals ESP is vulnerable to using a hard-coded encryption key. An unauthenticated remote attacker can generate a valid token parameter and exploit this vulnerability to access ...
Continue ReadingJuly 21, 2023
### Overview A command injection vulnerability can be used in the Perimeter81 macOS application to run arbitrary commands with administrative privileges. ### Description At the time, the latest Perime ...
Continue ReadingJuly 20, 2023
Assembla Auth Plugin is vulnerable to Cross-Site Request Forgery (CSRF). The vulnerability exists due to lack of a state parameter in its OAuth flow which allows an attacker to trick a user into loggi ...
Continue ReadingJuly 20, 2023
_**Note**: We accidentally sent out an email for this report with last weeks subject line. Due to the subject line not being very different week to week for this report, we opted to just leave it as i ...
Continue ReadingJuly 20, 2023