Security
Headlines
HeadlinesLatestCVEs

Tag

#auth

Circontrol Raption Buffer Overflow / Command Injection

The server in Circontrol Raption versions through 5.11.2 has a pre-authentication stack-based buffer overflow that can be exploited to gain run-time control of the device as root. The pwrstudio web application of EV Charger (in the server in Circontrol Raption through 5.6.2) is vulnerable to OS command injection.

Packet Storm
#vulnerability#web#dos#intel#buffer_overflow#auth
FusionPBX Session Fixation

FusionPBX suffers from a session fixation vulnerability.

Dell Security Management Server Privilege Escalation

Dell Security Management Server versions prior to 11.9.0 suffer from a local privilege escalation vulnerability.

Purei CMS 1.0 SQL Injection

Purei CMS version 1.0 suffers from a remote SQL injection vulnerability.

LMS PHP 1.0 SQL Injection

LMS PHP version 1.0 suffers from a remote SQL injection vulnerability.

GoPlus Report: Blockchain Networks Using API Security Data to Mitigate Web3 Threats

By Uzair Amir Singapore, 28 March 2024 – GoPlus Labs, the leading Web3 security infrastructure provider, has unveiled a groundbreaking report… This is a post from HackRead.com Read the original post: GoPlus Report: Blockchain Networks Using API Security Data to Mitigate Web3 Threats

Trove of UK Student Records Exposed in School Software Server Leak

By Waqas Hundreds of thousands of UK student records exposed in software firm's server leak putting names, grades, and photos at risk - Learn more about the school software breach and how to protect your child's information. This is a post from HackRead.com Read the original post: Trove of UK Student Records Exposed in School Software Server Leak

Jeffrey Epstein's Island Visitors Exposed by Data Broker

A WIRED investigation uncovered coordinates collected by a controversial data broker that reveal sensitive information about visitors to an island once owned by Epstein, the notorious sex offender.

GHSA-r3hx-qfh5-r9m7: Elasticsearch Incorrect Authorization vulnerability

Incorrect Authorization issue exists in the API key based security model for Remote Cluster Security, which is currently in Beta, in Elasticsearch 8.10.0 and before 8.13.0. This allows a malicious user with a valid API key for a remote cluster configured to use the new Remote Cluster Security to read arbitrary documents from any index on the remote cluster, and only if they use the Elasticsearch custom transport protocol to issue requests with the target index ID, the shard ID and the document ID. None of Elasticsearch REST API endpoints are affected by this issue.