Post ContentRead More ...
Continue ReadingFebruary 23, 2023
The remote Fedora 36 host has a package installed that is affected by multiple vulnerabilities as referenced in the FEDORA-2023-a5564c0a3f advisory. - A timing based side channel exists in the OpenS ...
Continue ReadingFebruary 22, 2023
The Microsoft Print 3D app installed on the remote Windows host may be affected by a remote code execution vulnerability. Note that Nessus has not tested for these issues but has instead relied only o ...
Continue ReadingFebruary 20, 2023
The Microsoft .NET Framework installation on the remote host is missing a security update. It is, therefore, affected by multiple vulnerabilities, as follows: - A denial of service (DoS) vulnerabili ...
Continue ReadingFebruary 18, 2023
## Summary Vulnerabilities in the IBM® Runtime Environment Java⢠Technology Edition affect IBM SAN Volume Controller, IBM Storwize V7000, V5000, V3700 and V3500, IBM Spectrum Virtualize Softwa ...
Continue ReadingFebruary 17, 2023
The version of the Microsoft 3D Builder app installed on the remote Windows host is prior to 20.0.3.0. It is, therefore, affected by multiple unspecified remote code execution vulnerabilities. Note th ...
Continue ReadingFebruary 16, 2023
In case you missed it, Wordfence has curated an industry leading vulnerability database with all known WordPress core, theme, and plugin vulnerabilities known as [Wordfence Intelligence Community Edit ...
Continue ReadingFebruary 16, 2023
None ## Summary This security update resolves a Microsoft SharePoint Server elevation of privilege vulnerability. To learn more about the vulnerability, see âââââââ[ ...
Continue ReadingFebruary 16, 2023
jeecg-boot-base-core is vulnerable to Privilege Escalation. The vulnerability exists due to the lack of permission checks in the library, which allows an attacker to gain escalated privilege and view ...
Continue ReadingFebruary 15, 2023
jeecg-boot-base-core is vulnerable to Privilege Escalation. The vulnerability exists due to the lack of permission checks in the library, which allows an attacker to gain escalated privileges and view ...
Continue ReadingFebruary 15, 2023