GHSA-J6M3-GC37-6R6Q vulnerabilities
Vulnerabilities for packages: nri-apache, kaf, cni-plugins, kubernetes-csi-external-snapshotter, vault-k8s, fuse-overlayfs-snapshotter, gitness, nri-nginx, docker-credential-acr-env, fq, go-bindata, nri-memcached, thanos-operator, wait-for-port, trillian, prometheus-node-exporter,...
7.5AI Score
GHSA-49GW-VXVF-FC2G vulnerabilities
Vulnerabilities for packages: bank-vaults, boring-registry, helm-docs, buf, kubevela, configmap-reload, nri-prometheus, tkn, libnvidia-container, flux-notification-controller, gops, litefs, shfmt, php-fpm_exporter, nerdctl, lazygit, tempo, vexctl, nri-couchbase, kpt, docker, gobuster,...
7.5AI Score
CVE-2023-39326 vulnerabilities
Vulnerabilities for packages: influx, cass-operator, gobuster, cni-plugins, gke-gcloud-auth-plugin, goreleaser, scorecard, helm-push, protoc-gen-go-grpc, go-bindata, k3d, petname, kind, wait-for-port, kubernetes-dashboard-metrics-scraper, smarter-device-manager, render-template, configmap-reload,.....
5.3CVSS
7.2AI Score
0.001EPSS
GHSA-5F94-VHJQ-RPG8 vulnerabilities
Vulnerabilities for packages: influx, cass-operator, gobuster, cni-plugins, gke-gcloud-auth-plugin, goreleaser, scorecard, helm-push, protoc-gen-go-grpc, go-bindata, k3d, petname, kind, wait-for-port, kubernetes-dashboard-metrics-scraper, smarter-device-manager, render-template, configmap-reload,.....
7.5AI Score
GHSA-9F76-WG39-X86H vulnerabilities
Vulnerabilities for packages: influx, cass-operator, gobuster, cni-plugins, gke-gcloud-auth-plugin, goreleaser, scorecard, helm-push, protoc-gen-go-grpc, go-bindata, k3d, petname, kind, wait-for-port, kubernetes-dashboard-metrics-scraper, smarter-device-manager, render-template, configmap-reload,.....
7.5AI Score
GHSA-4374-P667-P6C8 vulnerabilities
Vulnerabilities for packages: bank-vaults, kaf, kubernetes-csi-external-snapshotter, vault-k8s, fuse-overlayfs-snapshotter, gitness, istio-pilot-agent, tekton-chains, thanos-operator, istio-pilot-discovery, trillian, karpenter, go, prometheus-node-exporter, kubevela,...
7.5AI Score
GHSA-45X7-PX36-X8W8 vulnerabilities
Vulnerabilities for packages: bank-vaults, kaf, vault-k8s, boring-registry, gitness, istio-pilot-agent, docker-credential-acr-env, fq, tekton-chains, istio-pilot-discovery, trillian, prometheus-node-exporter, buf, dockerize, cadvisor, go-licenses, tkn, kubescape, kubewatch, nsc, helm, aactl,...
7.5AI Score
GHSA-HQXW-F8MX-CPMW vulnerabilities
Vulnerabilities for packages: goreleaser, aactl, kubernetes-dashboard, kpt, bom,...
7.5AI Score
GHSA-2WRH-6PVC-2JM9 vulnerabilities
Vulnerabilities for packages: bank-vaults, kaf, kubernetes-csi-external-snapshotter, vault-k8s, fuse-overlayfs-snapshotter, gitness, thanos-operator, trillian, karpenter, prometheus-node-exporter, kubevela, kubernetes-csi-external-resizer, nri-prometheus, tkn, kubernetes-csi-livenessprobe,...
7.5AI Score
GHSA-M425-MQ94-257G vulnerabilities
Vulnerabilities for packages: coredns, keda, kubernetes-csi-external-attacher, goreleaser, scorecard, kubeflow-katib, terraform-provider-azurerm, tctl, kots, vault-csi-provider, k3d, flux-kustomize-controller, up, gitlab-pages, kubevela, oauth2-proxy, thanos, dex, prometheus, telegraf, dgraph,...
7.5AI Score
GHSA-QPPJ-FM5R-HXR3 vulnerabilities
Vulnerabilities for packages: kaf, fuse-overlayfs-snapshotter, gitness, kubevela, tomcat, nri-prometheus, kubescape, kubernetes-csi-livenessprobe, kubewatch, helm, flux-notification-controller, aactl, hey, spark-operator, frp, node-problem-detector, envoy-ratelimit, grpcurl, dotnet, skaffold,...
7.5AI Score
CVE-2024-24783 vulnerabilities
Vulnerabilities for packages: nri-apache, kaf, cni-plugins, kubernetes-csi-external-snapshotter, vault-k8s, fuse-overlayfs-snapshotter, gitness, nri-nginx, docker-credential-acr-env, fq, go-bindata, nri-memcached, thanos-operator, wait-for-port, trillian, prometheus-node-exporter,...
7.9AI Score
0.0004EPSS
GHSA-32CH-6X54-Q4H9 vulnerabilities
Vulnerabilities for packages: nri-apache, kaf, cni-plugins, kubernetes-csi-external-snapshotter, vault-k8s, fuse-overlayfs-snapshotter, gitness, nri-nginx, docker-credential-acr-env, fq, go-bindata, nri-memcached, thanos-operator, wait-for-port, trillian, prometheus-node-exporter,...
7.5AI Score
CVE-2024-24785 vulnerabilities
Vulnerabilities for packages: nri-apache, kaf, cni-plugins, kubernetes-csi-external-snapshotter, vault-k8s, fuse-overlayfs-snapshotter, gitness, nri-nginx, docker-credential-acr-env, fq, go-bindata, nri-memcached, thanos-operator, wait-for-port, trillian, prometheus-node-exporter,...
7.8AI Score
0.0004EPSS
CVE-2024-24788 vulnerabilities
Vulnerabilities for packages: bank-vaults, kaf, kubernetes-csi-external-snapshotter, vault-k8s, boring-registry, fuse-overlayfs-snapshotter, gitness, docker-credential-acr-env, go-bindata, k9s, tekton-chains, wait-for-port, trillian, karpenter, go, smarter-device-manager, dockerize,...
6.5AI Score
0.0004EPSS
GHSA-236W-P7WF-5PH8 vulnerabilities
Vulnerabilities for packages: bank-vaults, boring-registry, helm-docs, buf, kubevela, configmap-reload, nri-prometheus, tkn, libnvidia-container, flux-notification-controller, gops, litefs, shfmt, php-fpm_exporter, nerdctl, lazygit, tempo, vexctl, nri-couchbase, kpt, docker, gobuster,...
7.5AI Score
CVE-2023-45290 vulnerabilities
Vulnerabilities for packages: nri-apache, kaf, cni-plugins, kubernetes-csi-external-snapshotter, vault-k8s, fuse-overlayfs-snapshotter, gitness, nri-nginx, docker-credential-acr-env, fq, go-bindata, nri-memcached, thanos-operator, wait-for-port, trillian, prometheus-node-exporter,...
6AI Score
0.0004EPSS
GHSA-XR7R-F8XQ-VFVV vulnerabilities
Vulnerabilities for packages: trivy, k9s, kots, k3d, cadvisor, telegraf, datadog-agent, kubernetes, ingress-nginx-controller, kubescape, kaniko, runc, grype, skopeo, zot, nerdctl, nvidia-device-plugin, syft, skaffold, wolfictl, newrelic-infrastructure-agent, ctop, k3s, buildkitd, docker,...
7.5AI Score
Qualys Security Advisory regreSSHion: RCE in OpenSSH's server,...
9AI Score
9AI Score
The Boot Store theme for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘link’ parameter within the theme's Button shortcode in all versions up to, and including, 1.6.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers,...
6.4CVSS
5.8AI Score
EPSS
The Boot Store theme for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘link’ parameter within the theme's Button shortcode in all versions up to, and including, 1.6.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers,...
6.4CVSS
EPSS
The Boot Store theme for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘link’ parameter within the theme's Button shortcode in all versions up to, and including, 1.6.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers,...
6.4CVSS
EPSS
The Basil recipe theme for WordPress is vulnerable to Persistent Cross-Site Scripting (XSS) via the post_title parameter in versions up to, and including, 2.0.4 due to insufficient input sanitization and output escaping. This vulnerability allows authenticated attackers with contributor-level...
5.4CVSS
EPSS
The Basil recipe theme for WordPress is vulnerable to Persistent Cross-Site Scripting (XSS) via the post_title parameter in versions up to, and including, 2.0.4 due to insufficient input sanitization and output escaping. This vulnerability allows authenticated attackers with contributor-level...
5.4CVSS
5.2AI Score
EPSS
The Basil recipe theme for WordPress is vulnerable to Persistent Cross-Site Scripting (XSS) via the post_title parameter in versions up to, and including, 2.0.4 due to insufficient input sanitization and output escaping. This vulnerability allows authenticated attackers with contributor-level...
5.4CVSS
EPSS
Weblate vulnerable to improper sanitization of project backups
Impact Weblate didn't correctly validate filenames when restoring project backup. It may be possible to gain unauthorized access to files on the server using a crafted ZIP file. Patches This issue has been addressed in Weblate 5.6.2 via...
4.4CVSS
7AI Score
EPSS
Weblate vulnerable to improper sanitization of project backups
Impact Weblate didn't correctly validate filenames when restoring project backup. It may be possible to gain unauthorized access to files on the server using a crafted ZIP file. Patches This issue has been addressed in Weblate 5.6.2 via...
4.4CVSS
7.2AI Score
EPSS
Session Middleware Token Injection Vulnerability
A security vulnerability has been identified in the Fiber session middleware where a user can supply their own session_id value, leading to the creation of a session with that key. Impact The identified vulnerability is a session middleware issue in GoFiber versions 2 and above. This vulnerability....
10CVSS
6.7AI Score
EPSS
Session Middleware Token Injection Vulnerability
A security vulnerability has been identified in the Fiber session middleware where a user can supply their own session_id value, leading to the creation of a session with that key. Impact The identified vulnerability is a session middleware issue in GoFiber versions 2 and above. This vulnerability....
10CVSS
6.9AI Score
EPSS
New openssh packages are available for Slackware 15.0 and -current to fix a security issue. Here are the details from the Slackware 15.0 ChangeLog: patches/packages/openssh-9.8p1-i586-1_slack15.0.txz: Upgraded. This update fixes a security issue: Fix race condition resulting in potential...
8.1CVSS
8AI Score
EPSS
GeoServer's Server Status shows sensitive environmental variables and Java properties
GeoServer's Server Status page and REST API (at /geoserver/rest/about/status) lists all environment variables and Java properties to any GeoServer user with administrative rights as part of those modules' status message. These variables/properties can also contain sensitive information, such as...
4.5CVSS
6.9AI Score
EPSS
GeoServer's Server Status shows sensitive environmental variables and Java properties
GeoServer's Server Status page and REST API (at /geoserver/rest/about/status) lists all environment variables and Java properties to any GeoServer user with administrative rights as part of those modules' status message. These variables/properties can also contain sensitive information, such as...
4.5CVSS
6.9AI Score
EPSS
Upcoming Book on AI and Democracy
If you've been reading my blog, you've noticed that I have written a lot about AI and democracy, mostly with my co-author Nathan Sanders. I am pleased to announce that we're writing a book on the topic. This isn't a book about deep fakes, or misinformation. This is a book about what happens when...
7.3AI Score
In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.200 and 9.1.2308.207, a low-privileged user that does not hold the admin or power Splunk roles could craft a malicious payload through a View that could result in execution of...
5.4CVSS
5.4AI Score
EPSS
In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.200 and 9.1.2308.207, a low-privileged user that does not hold the admin or power Splunk roles could craft a malicious payload through a View that could result in execution of...
5.4CVSS
EPSS
CVE-2024-36992 Persistent Cross-site Scripting (XSS) in Dashboard Elements
In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.200 and 9.1.2308.207, a low-privileged user that does not hold the admin or power Splunk roles could craft a malicious payload through a View that could result in execution of...
5.4CVSS
EPSS
CVE-2024-36994 Persistent Cross-site Scripting (XSS) in Dashboard Elements
In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10 and Splunk Cloud Platform versions below 9.1.2312.200 and 9.1.2308.207, a low-privileged user that does not hold the admin or power Splunk roles could craft a malicious payload through a View and Splunk Web Bulletin Messages that could...
5.4CVSS
EPSS
WordPress Security Research: A Beginner’s Series
Learn How To Find WordPress Vulnerabilities Step-by-Step Welcome to the inaugural post of our WordPress Security Research Beginner's Series! With the success of the Wordfence Bug Bounty Program, we wanted to provide emerging vulnerability researchers, and experienced Bug Bounty Hunters, with a...
7.7AI Score
Critical Flaws in CocoaPods Expose iOS and macOS Apps to Supply Chain Attacks
A trio of security flaws has been uncovered in the CocoaPods dependency manager for Swift and Objective-C Cocoa projects that could be exploited to stage software supply chain attacks, putting downstream customers at severe risks. The vulnerabilities allow "any malicious actor to claim ownership...
8AI Score
EPSS
WordPress Security Research Series: WordPress Request Architecture and Hooks
Welcome to Part 1 of the WordPress Security Research Beginner Series! If you haven’t had a chance, please review the series introduction blog post for more details on the goal of this series and what to expect. Before diving into the security features of WordPress, it's critical to understand the.....
7.1AI Score
The Australian Federal Police (AFP) have charged a man for setting up fake free WiFi access points in order to steal personal data from people. The crime was discovered when an airline reported a suspicious WiFi network identified by its employees during a domestic flight. When the alleged...
7AI Score
GeoServer is an open source server that allows users to share and edit geospatial data. Starting in version 2.10.0 and prior to versions 2.24.4 and 2.25.1, GeoServer's Server Status page and REST API lists all environment variables and Java properties to any GeoServer user with administrative...
4.5CVSS
EPSS
GeoServer is an open source server that allows users to share and edit geospatial data. Starting in version 2.10.0 and prior to versions 2.24.4 and 2.25.1, GeoServer's Server Status page and REST API lists all environment variables and Java properties to any GeoServer user with administrative...
4.5CVSS
5AI Score
EPSS
This week on the Lock and Code podcast… More than 20 years ago, a law that the United States would eventually use to justify the warrantless collection of Americans' phone call records actually started out as a warning sign against an entirely different target: Libraries. Not two months after...
7.1AI Score
Summary IBM® SDK, Java™ Technology Edition is shipped as a supporting program of IBM OpenPages. Information about a security vulnerability affecting IBM SDK, Java Technology Edition has been published in multiple security bulletins. These products have addressed the applicable CVE(s). For a...
7AI Score
CVE-2024-34696 GeoServer's Server Status shows sensitive environmental variables and Java properties
GeoServer is an open source server that allows users to share and edit geospatial data. Starting in version 2.10.0 and prior to versions 2.24.4 and 2.25.1, GeoServer's Server Status page and REST API lists all environment variables and Java properties to any GeoServer user with administrative...
4.5CVSS
EPSS
CapraRAT Spyware Disguised as Popular Apps Threatens Android Users
The threat actor known as Transparent Tribe has continued to unleash malware-laced Android apps as part of a social engineering campaign to target individuals of interest. "These APKs continue the group's trend of embedding spyware into curated video browsing applications, with a new expansion...
7.4AI Score
Indian Software Firm's Products Hacked to Spread Data-Stealing Malware
Installers for three different software products developed by an Indian company named Conceptworld have been trojanized to distribute information-stealing malware. The installers correspond to Notezilla, RecentX, and Copywhiz, according to cybersecurity firm Rapid7, which discovered the supply...
7AI Score
Model Extraction from Neural Networks
A new paper, "Polynomial Time Cryptanalytic Extraction of Neural Network Models," by Adi Shamir and others, uses ideas from differential cryptanalysis to extract the weights inside a neural network using specific queries and their results. This is much more theoretical than practical, but it's a...
7.2AI Score