Lucene search

K

WordPress Meta Data Filter & Taxonomies Filter Security Vulnerabilities

osv
osv

Malicious code in glovo-data-platform-declarative-airflow (PyPI)

-= Per source details. Do not edit below this...

7.1AI Score

2024-06-25 01:35 PM
osv
osv

Malicious code in glovo-data-platform-declarative (PyPI)

-= Per source details. Do not edit below this...

7.1AI Score

2024-06-25 01:35 PM
osv
osv

Malicious code in forenitz (PyPI)

-= Per source details. Do not edit below this...

7.1AI Score

2024-06-25 01:35 PM
osv
osv

Malicious code in forenity (PyPI)

-= Per source details. Do not edit below this...

7.1AI Score

2024-06-25 01:35 PM
osv
osv

Malicious code in forenith (PyPI)

-= Per source details. Do not edit below this...

7.1AI Score

2024-06-25 01:35 PM
osv
osv

Malicious code in forenitq (PyPI)

-= Per source details. Do not edit below this...

7.1AI Score

2024-06-25 01:35 PM
osv
osv

Malicious code in data-platform-observability-validation (PyPI)

-= Per source details. Do not edit below this...

7.1AI Score

2024-06-25 01:34 PM
osv
osv

Malicious code in data-platform-importer-brain (PyPI)

-= Per source details. Do not edit below this...

7.1AI Score

2024-06-25 01:34 PM
osv
osv

Malicious code in data-platform-observability-core (PyPI)

-= Per source details. Do not edit below this...

7.1AI Score

2024-06-25 01:34 PM
1
osv
osv

Malicious code in data-platform-dbt (PyPI)

-= Per source details. Do not edit below this...

7.1AI Score

2024-06-25 01:34 PM
osv
osv

Malicious code in data-platform-airflow-recipes (PyPI)

-= Per source details. Do not edit below this...

7.1AI Score

2024-06-25 01:34 PM
osv
osv

Malicious code in data-platform-airflow-operators (PyPI)

-= Per source details. Do not edit below this...

7.1AI Score

2024-06-25 01:34 PM
rapid7blog
rapid7blog

From Top Dogs to Unified Pack

Embracing a consolidated security ecosystem Authored by Ralph Wascow Cybersecurity is as unpredictable as it is rewarding. Each day often presents a new set of challenges and responsibilities, particularly as organizations accelerate digital transformation efforts. This means you and your cyber...

7.2AI Score

2024-06-25 01:30 PM
2
osv
osv

Malicious code in systemrobotassistant (npm)

-= Per source details. Do not edit below this...

7.1AI Score

2024-06-25 01:02 PM
1
osv
osv

Malicious code in sun-flare (npm)

-= Per source details. Do not edit below this...

7.1AI Score

2024-06-25 01:02 PM
osv
osv

Malicious code in skeletor-block-facetwp-filter (npm)

-= Per source details. Do not edit below this...

7.1AI Score

2024-06-25 01:00 PM
osv
osv

Malicious code in pattern.json (npm)

-= Per source details. Do not edit below this...

7.1AI Score

2024-06-25 12:55 PM
osv
osv

Malicious code in ng-filter-convert (npm)

-= Per source details. Do not edit below this...

7.1AI Score

2024-06-25 12:52 PM
osv
osv

Malicious code in mytardis-data-module (npm)

-= Per source details. Do not edit below this...

7.1AI Score

2024-06-25 12:51 PM
osv
osv

Malicious code in item-shop-data-client (npm)

-= Per source details. Do not edit below this...

7.1AI Score

2024-06-25 12:47 PM
ibm
ibm

Security Bulletin: IBM Jazz for Service Management is vulnerable due to Apache camel-core-3.2.0.jar ( CVE-2024-22371)

Summary IBM Jazz for Service Management is vulnerable due to Apache camel-core-3.2.0.jar. Exposure of sensitive data by crafting a malicious EventFactory and providing a custom ExchangeCreatedEvent that exposes sensitive data. Vulnerability Details ** CVEID: CVE-2024-22371 DESCRIPTION: **Apache...

2.9CVSS

6.5AI Score

0.0004EPSS

2024-06-25 12:46 PM
2
osv
osv

Malicious code in eslint-plugin-shein-soc-raw (npm)

-= Per source details. Do not edit below this...

7.1AI Score

2024-06-25 12:41 PM
osv
osv

Malicious code in cndpjs (npm)

-= Per source details. Do not edit below this...

7.1AI Score

2024-06-25 12:33 PM
osv
osv

Malicious code in cdnpjs (npm)

-= Per source details. Do not edit below this...

7.1AI Score

2024-06-25 12:32 PM
kitploit
kitploit

CloudBrute - Awesome Cloud Enumerator

A tool to find a company (target) infrastructure, files, and apps on the top cloud providers (Amazon, Google, Microsoft, DigitalOcean, Alibaba, Vultr, Linode). The outcome is useful for bug bounty hunters, red teamers, and penetration testers alike. The complete writeup is available. here...

7.2AI Score

2024-06-25 12:30 PM
7
osv
osv

Malicious code in basencrypt (npm)

-= Per source details. Do not edit below this...

7.1AI Score

2024-06-25 12:29 PM
osv
osv

Malicious code in basecrypt (npm)

-= Per source details. Do not edit below this...

7.1AI Score

2024-06-25 12:29 PM
osv
osv

Malicious code in apm-web-vitals (npm)

-= Per source details. Do not edit below this...

7.1AI Score

2024-06-25 12:28 PM
osv
osv

Malicious code in am-packages (npm)

-= Per source details. Do not edit below this...

7.1AI Score

2024-06-25 12:25 PM
osv
osv

Malicious code in sheinoutmobile (npm)

-= Per source details. Do not edit below this...

7.1AI Score

2024-06-25 12:22 PM
osv
osv

Malicious code in vue3-renderer (npm)

-= Per source details. Do not edit below this...

7.1AI Score

2024-06-25 12:19 PM
osv
osv

Malicious code in vue-renderer (npm)

-= Per source details. Do not edit below this...

7.1AI Score

2024-06-25 12:19 PM
osv
osv

Malicious code in types (npm)

-= Per source details. Do not edit below this...

7.1AI Score

2024-06-25 12:19 PM
osv
osv

Malicious code in shared (npm)

-= Per source details. Do not edit below this...

7.1AI Score

2024-06-25 12:19 PM
osv
osv

Malicious code in cli (npm)

-= Per source details. Do not edit below this...

7.1AI Score

2024-06-25 12:19 PM
osv
osv

Malicious code in builder (npm)

-= Per source details. Do not edit below this...

7.1AI Score

2024-06-25 12:19 PM
ics
ics

PTC Creo Elements/Direct License Server

View CSAF 1. EXECUTIVE SUMMARY CVSS v4 10.0 ATTENTION: Exploitable remotely/low attack complexity Vendor: PTC Equipment: Creo Elements/Direct License Server Vulnerability: Missing Authorization 2. RISK EVALUATION Successful exploitation of this vulnerability could allow unauthenticated remote...

10CVSS

8.1AI Score

0.0004EPSS

2024-06-25 12:00 PM
3
ics
ics

ABB Ability System 800xA

View CSAF 1. EXECUTIVE SUMMARY CVSS v4 6.9 ATTENTION: Low attack complexity Vendor: ABB Equipment: 800xA Base Vulnerabilities: Improper Input Validation 2. RISK EVALUATION Successful exploitation of these vulnerabilities could cause services to crash and restart. 3. TECHNICAL DETAILS 3.1...

5.7CVSS

7.1AI Score

0.0004EPSS

2024-06-25 12:00 PM
securelist
securelist

Cybersecurity in the SMB space — a growing threat

Small and medium-sized businesses (SMBs) are increasingly targeted by cybercriminals. Despite adopting digital technology for remote work, production, and sales, SMBs often lack robust cybersecurity measures. SMBs face significant cybersecurity challenges due to limited resources and expertise....

7.3AI Score

2024-06-25 10:00 AM
5
thn
thn

How to Cut Costs with a Browser Security Platform

Browser security is becoming increasingly popular, as organizations understand the need to protect at the point of risk - the browser. Network and endpoint solutions are limited in their ability to protect from web-borne threats like phishing websites or malicious browser extensions. They also do.....

7AI Score

2024-06-25 09:42 AM
4
thn
thn

New Cyberthreat 'Boolka' Deploying BMANAGER Trojan via SQLi Attacks

A previously undocumented threat actor dubbed Boolka has been observed compromising websites with malicious scripts to deliver a modular trojan codenamed BMANAGER. "The threat actor behind this campaign has been carrying out opportunistic SQL injection attacks against websites in various countries....

7.8AI Score

2024-06-25 09:30 AM
8
ibm
ibm

Security Bulletin: IBM Event Streams is vulnerable to a denial of service attack due to the jose4j component ( CVE-2023-51775).

Summary IBM Event Streams is vulnerable to a a denial of service attack due to the jose4j component. The jose4j library is used in event streams for secure handling of JSON Web Tokens (JWTs), enabling encryption, decryption, and validation of tokens to ensure secure authentication and data...

6.8AI Score

0.0004EPSS

2024-06-25 09:09 AM
5
ibm
ibm

Security Bulletin: IBM Event Streams is vulnerable to a cross-site request forgery due to the Axios component (CVE-2023-45857).

Summary IBM Event Streams is vulnerable to XSS vulnerability due to Axios component . Axios is a promise-based HTTP library that lets developers make requests to either their own or a third-party server to fetch data. Vulnerability Details ** CVEID: CVE-2023-45857 DESCRIPTION: **Axios is...

6.5CVSS

5.3AI Score

0.001EPSS

2024-06-25 09:08 AM
7
ibm
ibm

Security Bulletin: IBM Event Streams is vulnerable to a denial of service attack due to Okio component ( CVE-2023-3635).

Summary IBM Event Streams is vulnerable to a denial of service attack due to Okio GzipSource component used in our strimzi-kafka-bridge. Okio is used in kafka to efficiently handle byte streams and improve data serialization/deserialization and network communication performance. Vulnerability...

7.5CVSS

6.5AI Score

0.001EPSS

2024-06-25 08:58 AM
3
cve
cve

CVE-2024-3249

The Zita Elementor Site Library plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the import_xml_data, xml_data_import, import_option_data, import_widgets, and import_customizer_settings functions in all versions up to, and including,...

4.3CVSS

6.6AI Score

0.001EPSS

2024-06-25 07:15 AM
18
nvd
nvd

CVE-2024-3249

The Zita Elementor Site Library plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the import_xml_data, xml_data_import, import_option_data, import_widgets, and import_customizer_settings functions in all versions up to, and including,...

4.3CVSS

0.001EPSS

2024-06-25 07:15 AM
1
cvelist
cvelist

CVE-2024-3249 Zita Elementor Site Library <= 1.6.2 - Missing Authorization to Page Creation and Options Modification

The Zita Elementor Site Library plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the import_xml_data, xml_data_import, import_option_data, import_widgets, and import_customizer_settings functions in all versions up to, and including,...

4.3CVSS

0.001EPSS

2024-06-25 06:57 AM
3
cve
cve

CVE-2024-6297

Several plugins for WordPress hosted on WordPress.org have been compromised and injected with malicious PHP scripts. A malicious threat actor compromised the source code of various plugins and injected code that exfiltrates database credentials and is used to create new, malicious, administrator...

10CVSS

9.7AI Score

0.001EPSS

2024-06-25 04:15 AM
35
nvd
nvd

CVE-2024-6297

Several plugins for WordPress hosted on WordPress.org have been compromised and injected with malicious PHP scripts. A malicious threat actor compromised the source code of various plugins and injected code that exfiltrates database credentials and is used to create new, malicious, administrator...

10CVSS

0.001EPSS

2024-06-25 04:15 AM
26
nvd
nvd

CVE-2024-37003

A maliciously crafted DWG and SLDPRT file, when parsed in opennurbs.dll and ODXSW_DLL.dll through Autodesk applications, can be used to cause a Stack-based Overflow. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of....

0.001EPSS

2024-06-25 04:15 AM
1
Total number of security vulnerabilities485773