Cisa Urges Software Devs To Weed Out Sql Injection Vulnerabilities
CISA and the FBI urged executives of technology manufacturing companies to prompt formal reviews of their organizations' software and implement mitigations to...
CISA and the FBI urged executives of technology manufacturing companies to prompt formal reviews of their organizations' software and implement mitigations to...
A vulnerability was identified in F5 Products. A remote attacker could exploit this vulnerability to trigger denial of service condition on the targeted...
Cisco Releases Security Updates for IOS XR Software Cisco released security updates to address vulnerabilities in Cisco IOS XR software....
CISA Releases Fifteen Industrial Control Systems Advisories CISA released fifteen Industrial Control Systems (ICS) advisories on March 14, 2024. These...
Repository for Software Attestation and Artifacts Now Live Software producers who partner with the federal government can now upload their...
CISA and Partners Release Joint Fact Sheet for Leaders on PRC-sponsored Volt Typhoon Cyber Activity Today, CISA, the National Security...
CISA Releases One Industrial Control Systems Advisory CISA released one Industrial Control Systems (ICS) advisory on March 19, 2024. These...
CISA, FBI, and MS-ISAC Release Update to Joint Guidance on Distributed Denial-of-Service Techniques Today, CISA, the Federal Bureau of Investigation...
CISA and FBI Release Secure by Design Alert to Urge Manufacturers to Eliminate SQL Injection Vulnerabilities Today, CISA and the...
CISA Adds Three Known Exploited Vulnerabilities to Catalog CISA has added three new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based...
CISA Releases One Industrial Control Systems Advisory CISA released one Industrial Control Systems (ICS) advisory on March 21, 2024. These...
Ivanti Releases Security Updates for Neurons for ITSM and Standalone Sentry Ivanti has released security advisories to address vulnerabilities in...
CISA Adds Three Known Exploited Vulnerabilities to Catalog CISA has added three new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based...
CISA and FBI Release Secure by Design Alert to Urge Manufacturers to Eliminate SQL Injection Vulnerabilities Today, CISA and the...
NAME__________Umbraco Umbraco-CMS information disclosurePlatforms Affected:Umbraco Umbraco-CMS 10.8.4Risk Level:3.7Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Umbraco Umbraco-CMS could allow a remote attacker to obtain sensitive information,...
NAME__________Broadcom, Microsoft and MikroTik products denial of servicePlatforms Affected:Broadcom DSL/PON/Wifi routers Microsoft Windows Deployment Services (WDS) MikroTik TFTP serviceRisk Level:7.5Exploitability:UnprovenConsequences:Denial...
NAME__________Advantech WebAccess/SCADA SQL injectionPlatforms Affected:Advantech WebAccess/SCADA 9.1.5URisk Level:6.4Exploitability:HighConsequences:Data Manipulation DESCRIPTION__________Advantech WebAccess/SCADA is vulnerable to SQL injection. A remote authenticated attacker...
NAME__________jupyterhub oauthenticator security bypassPlatforms Affected:JupyterHub OAuthenticator 16.2.0Risk Level:7.5Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION__________jupyterhub oauthenticator could allow a attacker to bypass security restrictions, caused...
NAME__________Qiskit IBM Runtime code executionPlatforms Affected:Qiskit IBM Runtime 0.21.1Risk Level:5.3Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Qiskit IBM Runtime could allow a local authenticated attacker...
NAME__________Saleor Storefront information disclosurePlatforms Affected:Saleor Storefront b5ce60693d9015a12d3001ea4a067a4fb037c14dRisk Level:4.3Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Saleor Storefront could allow a remote attacker to obtain sensitive information,...
NAME__________moby information disclosurePlatforms Affected:moby moby 25.0.0 moby moby 26.0.0-rc1 moby moby 23.0.10Risk Level:5.9Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________moby could allow a remote attacker...
NAME__________isaacs node-tar denial of servicePlatforms Affected:isaacs node-tar 6.2.0Risk Level:6.5Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION__________isaacs node-tar is vulnerable to a denial of service,...
BianLian Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of...
A new large-scale StrelaStealer malware campaign has impacted over a hundred organizations across the United States and Europe, attempting to...