Lucene search

K

Pentaho Data Integration & Analytics Security Vulnerabilities

osv
osv

Malicious code in glovo-data-platform-importer-brain (PyPI)

-= Per source details. Do not edit below this...

7.1AI Score

2024-06-25 01:35 PM
1
osv
osv

Malicious code in glovo-data-platform-declarative-airflow (PyPI)

-= Per source details. Do not edit below this...

7.1AI Score

2024-06-25 01:35 PM
1
osv
osv

Malicious code in glovo-data-platform-declarative (PyPI)

-= Per source details. Do not edit below this...

7.1AI Score

2024-06-25 01:35 PM
osv
osv

Malicious code in forenitz (PyPI)

-= Per source details. Do not edit below this...

7.1AI Score

2024-06-25 01:35 PM
osv
osv

Malicious code in forenity (PyPI)

-= Per source details. Do not edit below this...

7.1AI Score

2024-06-25 01:35 PM
osv
osv

Malicious code in forenith (PyPI)

-= Per source details. Do not edit below this...

7.1AI Score

2024-06-25 01:35 PM
osv
osv

Malicious code in forenitq (PyPI)

-= Per source details. Do not edit below this...

7.1AI Score

2024-06-25 01:35 PM
osv
osv

Malicious code in data-platform-observability-validation (PyPI)

-= Per source details. Do not edit below this...

7.1AI Score

2024-06-25 01:34 PM
osv
osv

Malicious code in data-platform-observability-core (PyPI)

-= Per source details. Do not edit below this...

7.1AI Score

2024-06-25 01:34 PM
1
osv
osv

Malicious code in data-platform-importer-brain (PyPI)

-= Per source details. Do not edit below this...

7.1AI Score

2024-06-25 01:34 PM
osv
osv

Malicious code in data-platform-dbt (PyPI)

-= Per source details. Do not edit below this...

7.1AI Score

2024-06-25 01:34 PM
1
osv
osv

Malicious code in data-platform-airflow-recipes (PyPI)

-= Per source details. Do not edit below this...

7.1AI Score

2024-06-25 01:34 PM
1
osv
osv

Malicious code in data-platform-airflow-operators (PyPI)

-= Per source details. Do not edit below this...

7.1AI Score

2024-06-25 01:34 PM
rapid7blog
rapid7blog

From Top Dogs to Unified Pack

Embracing a consolidated security ecosystem Authored by Ralph Wascow Cybersecurity is as unpredictable as it is rewarding. Each day often presents a new set of challenges and responsibilities, particularly as organizations accelerate digital transformation efforts. This means you and your cyber...

7.2AI Score

2024-06-25 01:30 PM
2
osv
osv

Malicious code in systemrobotassistant (npm)

-= Per source details. Do not edit below this...

7.1AI Score

2024-06-25 01:02 PM
1
osv
osv

Malicious code in sw-google-analytics (npm)

-= Per source details. Do not edit below this...

7.1AI Score

2024-06-25 01:02 PM
osv
osv

Malicious code in sun-flare (npm)

-= Per source details. Do not edit below this...

7.1AI Score

2024-06-25 01:02 PM
osv
osv

Malicious code in pattern.json (npm)

-= Per source details. Do not edit below this...

7.1AI Score

2024-06-25 12:55 PM
osv
osv

Malicious code in mytardis-data-module (npm)

-= Per source details. Do not edit below this...

7.1AI Score

2024-06-25 12:51 PM
osv
osv

Malicious code in item-shop-data-client (npm)

-= Per source details. Do not edit below this...

7.1AI Score

2024-06-25 12:47 PM
ibm
ibm

Security Bulletin: IBM Jazz for Service Management is vulnerable due to Apache camel-core-3.2.0.jar ( CVE-2024-22371)

Summary IBM Jazz for Service Management is vulnerable due to Apache camel-core-3.2.0.jar. Exposure of sensitive data by crafting a malicious EventFactory and providing a custom ExchangeCreatedEvent that exposes sensitive data. Vulnerability Details ** CVEID: CVE-2024-22371 DESCRIPTION: **Apache...

2.9CVSS

6.5AI Score

0.0004EPSS

2024-06-25 12:46 PM
2
osv
osv

Malicious code in eslint-plugin-shein-soc-raw (npm)

-= Per source details. Do not edit below this...

7.1AI Score

2024-06-25 12:41 PM
1
osv
osv

Malicious code in cndpjs (npm)

-= Per source details. Do not edit below this...

7.1AI Score

2024-06-25 12:33 PM
osv
osv

Malicious code in cdnpjs (npm)

-= Per source details. Do not edit below this...

7.1AI Score

2024-06-25 12:32 PM
kitploit
kitploit

CloudBrute - Awesome Cloud Enumerator

A tool to find a company (target) infrastructure, files, and apps on the top cloud providers (Amazon, Google, Microsoft, DigitalOcean, Alibaba, Vultr, Linode). The outcome is useful for bug bounty hunters, red teamers, and penetration testers alike. The complete writeup is available. here...

7.2AI Score

2024-06-25 12:30 PM
7
osv
osv

Malicious code in basencrypt (npm)

-= Per source details. Do not edit below this...

7.1AI Score

2024-06-25 12:29 PM
osv
osv

Malicious code in basecrypt (npm)

-= Per source details. Do not edit below this...

7.1AI Score

2024-06-25 12:29 PM
osv
osv

Malicious code in apollo-federation-integration-testsuite (npm)

-= Per source details. Do not edit below this...

7.1AI Score

2024-06-25 12:28 PM
osv
osv

Malicious code in apm-web-vitals (npm)

-= Per source details. Do not edit below this...

7.1AI Score

2024-06-25 12:28 PM
osv
osv

Malicious code in am-packages (npm)

-= Per source details. Do not edit below this...

7.1AI Score

2024-06-25 12:25 PM
osv
osv

Malicious code in analytics (npm)

-= Per source details. Do not edit below this...

7.1AI Score

2024-06-25 12:23 PM
osv
osv

Malicious code in sheinoutmobile (npm)

-= Per source details. Do not edit below this...

7.1AI Score

2024-06-25 12:22 PM
osv
osv

Malicious code in vue3-renderer (npm)

-= Per source details. Do not edit below this...

7.1AI Score

2024-06-25 12:19 PM
osv
osv

Malicious code in vue-renderer (npm)

-= Per source details. Do not edit below this...

7.1AI Score

2024-06-25 12:19 PM
osv
osv

Malicious code in types (npm)

-= Per source details. Do not edit below this...

7.1AI Score

2024-06-25 12:19 PM
osv
osv

Malicious code in shared (npm)

-= Per source details. Do not edit below this...

7.1AI Score

2024-06-25 12:19 PM
osv
osv

Malicious code in cli (npm)

-= Per source details. Do not edit below this...

7.1AI Score

2024-06-25 12:19 PM
osv
osv

Malicious code in builder (npm)

-= Per source details. Do not edit below this...

7.1AI Score

2024-06-25 12:19 PM
ics
ics

PTC Creo Elements/Direct License Server

View CSAF 1. EXECUTIVE SUMMARY CVSS v4 10.0 ATTENTION: Exploitable remotely/low attack complexity Vendor: PTC Equipment: Creo Elements/Direct License Server Vulnerability: Missing Authorization 2. RISK EVALUATION Successful exploitation of this vulnerability could allow unauthenticated remote...

10CVSS

8.1AI Score

0.0004EPSS

2024-06-25 12:00 PM
4
ics
ics

ABB Ability System 800xA

View CSAF 1. EXECUTIVE SUMMARY CVSS v4 6.9 ATTENTION: Low attack complexity Vendor: ABB Equipment: 800xA Base Vulnerabilities: Improper Input Validation 2. RISK EVALUATION Successful exploitation of these vulnerabilities could cause services to crash and restart. 3. TECHNICAL DETAILS 3.1...

5.7CVSS

7.1AI Score

0.0004EPSS

2024-06-25 12:00 PM
ibm
ibm

Security Bulletin: Apache James and Bouncy Castle vulnerabilities in Apache Solr and Logstash shipped with IBM Operations Analytics - Log Analysis (CVE-2023-33202,CVE-2024-21742,CVE-2024-29857,CVE-2024-30172,CVE-2024-34447)

Summary There are potential denial of service and bypass security restrictions vulnerabilities in Apache James Mime4J and Bouncy Castle Crypto Package, which are used by Apache Solr and Logstash in IBM Operations Analytics - Log Analysis Vulnerability Details ** CVEID: CVE-2024-34447 DESCRIPTION:.....

5.5CVSS

7.9AI Score

EPSS

2024-06-25 10:21 AM
6
ibm
ibm

Security Bulletin: ThreeTen Backport vulnerability has been identified in Apache Solr shipped with IBM Operations Analytics - Log Analysis (CVE-2024-23081,CVE-2024-23082)

Summary There is a potential denial of service vulnerability in ThreeTen Backport that is used by Apache Solr in IBM Operations Analytics - Log Analysis Vulnerability Details ** CVEID: CVE-2024-23082 DESCRIPTION: **ThreeTen Backport is vulnerable to a denial of service, caused by an integer...

7.7AI Score

0.0004EPSS

2024-06-25 10:08 AM
2
securelist
securelist

Cybersecurity in the SMB space — a growing threat

Small and medium-sized businesses (SMBs) are increasingly targeted by cybercriminals. Despite adopting digital technology for remote work, production, and sales, SMBs often lack robust cybersecurity measures. SMBs face significant cybersecurity challenges due to limited resources and expertise....

7.3AI Score

2024-06-25 10:00 AM
5
thn
thn

How to Cut Costs with a Browser Security Platform

Browser security is becoming increasingly popular, as organizations understand the need to protect at the point of risk - the browser. Network and endpoint solutions are limited in their ability to protect from web-borne threats like phishing websites or malicious browser extensions. They also do.....

7AI Score

2024-06-25 09:42 AM
5
thn
thn

New Cyberthreat 'Boolka' Deploying BMANAGER Trojan via SQLi Attacks

A previously undocumented threat actor dubbed Boolka has been observed compromising websites with malicious scripts to deliver a modular trojan codenamed BMANAGER. "The threat actor behind this campaign has been carrying out opportunistic SQL injection attacks against websites in various countries....

7.8AI Score

2024-06-25 09:30 AM
8
ibm
ibm

Security Bulletin: Apache Commons Configuration vulnerability has been identified in Apache Solr shipped with IBM Operations Analytics - Log Analysis (CVE-2024-29131,CVE-2024-29133)

Summary There is a potential out-of-bounds write vulnerability in Apache Commons Configuration that is used by Apache Solr in IBM Operations Analytics - Log Analysis Vulnerability Details ** CVEID: CVE-2024-29131 DESCRIPTION: **Apache Commons Configuration could allow a remote attacker to execute.....

8.4AI Score

0.0004EPSS

2024-06-25 09:10 AM
3
ibm
ibm

Security Bulletin: IBM Event Streams is vulnerable to a denial of service attack due to the jose4j component ( CVE-2023-51775).

Summary IBM Event Streams is vulnerable to a a denial of service attack due to the jose4j component. The jose4j library is used in event streams for secure handling of JSON Web Tokens (JWTs), enabling encryption, decryption, and validation of tokens to ensure secure authentication and data...

6.8AI Score

0.0004EPSS

2024-06-25 09:09 AM
5
ibm
ibm

Security Bulletin: IBM Event Streams is vulnerable to a cross-site request forgery due to the Axios component (CVE-2023-45857).

Summary IBM Event Streams is vulnerable to XSS vulnerability due to Axios component . Axios is a promise-based HTTP library that lets developers make requests to either their own or a third-party server to fetch data. Vulnerability Details ** CVEID: CVE-2023-45857 DESCRIPTION: **Axios is...

6.5CVSS

5.3AI Score

0.001EPSS

2024-06-25 09:08 AM
7
ibm
ibm

Security Bulletin: IBM Event Streams is vulnerable to a denial of service attack due to Okio component ( CVE-2023-3635).

Summary IBM Event Streams is vulnerable to a denial of service attack due to Okio GzipSource component used in our strimzi-kafka-bridge. Okio is used in kafka to efficiently handle byte streams and improve data serialization/deserialization and network communication performance. Vulnerability...

7.5CVSS

6.5AI Score

0.001EPSS

2024-06-25 08:58 AM
3
cve
cve

CVE-2024-3249

The Zita Elementor Site Library plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the import_xml_data, xml_data_import, import_option_data, import_widgets, and import_customizer_settings functions in all versions up to, and including,...

4.3CVSS

6.6AI Score

0.001EPSS

2024-06-25 07:15 AM
22
Total number of security vulnerabilities471155