Security
Headlines
HeadlinesLatestCVEs

Tag

#git

RHSA-2023:5587: Red Hat Security Advisory: virt:rhel security update

An update for the virt:rhel module is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-40284: A buffer overflow flaw was found in NTFS-3G. This issue occurs via a crafted metadata in an NTFS image that can cause code execution. A local attacker can exploit this issue i...

Red Hat Security Data
#vulnerability#ios#linux#red_hat#dos#git#java#perl#bios#buffer_overflow#auth#ssh#ruby#sap
OpenPLC WebServer 3 Denial Of Service

OpenPLC WebServer version 3 suffers from a denial of service vulnerability.

RHSA-2023:5591: Red Hat Security Advisory: linux-firmware security update

An update for linux-firmware is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-20593: A flaw was found in hw, in “Zen 2” CPUs. This issue may allow an attacker to access sensitive information under specific microarchitectural circumstances.

Minio 2022-07-29T19-40-48Z Path Traversal

Minio version 2022-07-29T19-40-48Z suffers from a path traversal vulnerability.

WordPress Masterstudy LMS 3.0.17 Account Creation

WordPress Masterstudy LMS plugin version 3.0.17 suffers from an unauthenticated instructor account creation vulnerability.

Google Makes Passkeys Default, Stepping Up Its Push to Kill Passwords

Google is making passkeys, the emerging passwordless login technology, the default option for users as it moves to make passwords “obsolete.”

How to Identify and Avoid Online Trading Scams

By Owais Sultan Here are simple yet vital steps to identify online trading scams and safeguard your investments from cyber criminals.… This is a post from HackRead.com Read the original post: How to Identify and Avoid Online Trading Scams

GHSA-wrp2-6v6j-hfmg: ConcreteCMS vulnerable to Stored Cross-site Scripting

Concrete CMS v9.2.1 is affected by Arbitrary File Upload vulnerability via the Thumbnail file upload, which allows Cross-Site Scripting (XSS).

CVE-2023-44763: GitHub - sromanhu/CVE-2023-44763_ConcreteCMS-Arbitrary-file-upload-Thumbnail: ConcreteCMS v.9.2.1 is affected by Arbitrary File Upload vulnerability that allows Cross-Site Scriting (XSS) Stored.

** DISPUTED ** Concrete CMS v9.2.1 is affected by an Arbitrary File Upload vulnerability via a Thumbnail file upload, which allows Cross-Site Scripting (XSS). NOTE: the vendor's position is that a customer is supposed to know that "pdf" should be excluded from the allowed file types, even though pdf is one of the allowed file types in the default configuration.