NGINX Management Suite may allow an authenticated attacker to gain access to configuration objects outside of their assigned environment.  Note: Software versions which have reached End of Tech ...
Continue ReadingMay 03, 2023
NGINX Management Suite may allow an authenticated attacker to gain access to configuration objects outside of their assigned environment.  Note: Software versions which have reached End of Tech ...
Continue ReadingMay 03, 2023
When UDP profile with idle timeout set to immediate or the value 0 is configured on a virtual server, undisclosed traffic can cause TMM to terminate. Note: Software versions which have reached End ...
Continue ReadingMay 03, 2023
When DNS is provisioned, an authenticated remote command execution vulnerability exists in DNS iQuery mesh. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated ...
Continue ReadingMay 03, 2023
Multiple reflected cross-site scripting (XSS) vulnerabilities exist in undisclosed pages of the BIG-IP Configuration utility which allow an attacker to run JavaScript in the context of the currently l ...
Continue ReadingMay 03, 2023
NGINX Management Suite default file permissions are set such that an authenticated attacker may be able to modify sensitive files on NGINX Instance Manager and NGINX API Connectivity Manager.  ...
Continue ReadingMay 03, 2023
NGINX Management Suite may allow an authenticated attacker to gain access to configuration objects outside of their assigned environment.  Note: Software versions which have reached End of Tech ...
Continue ReadingMay 03, 2023
Red Hat Advanced Cluster Management for Kubernetes 2.6.5 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site r ...
Continue ReadingMay 02, 2023
The remote Debian 10 host has a package installed that is affected by multiple vulnerabilities as referenced in the dla-3409 advisory. - A flaw was found in mod_auth_openidc before version 2.4.1. An ...
Continue ReadingMay 02, 2023
Last week, there were 152 vulnerabilities disclosed in 134 WordPress Plugins and 0 WordPress themes that have been added to the Wordfence Intelligence Vulnerability Database, and there were 41 Vulnera ...
Continue ReadingMay 01, 2023
graphql-java is vulnerable to Denial Of Services (DoS). An attacker can send a maliciously crafted GraphQL query that causes excessive stack consumption, which can lead to an application crash.Read Mo ...
Continue ReadingMay 01, 2023