Security
Headlines
HeadlinesLatestCVEs

Tag

#intel

CVE-2020-4970: IBM Security Identity Governance and Intelligence information disclosure CVE-2020-4970 Vulnerability Report

IBM Security Identity Governance and Intelligence 5.2.4, 5.2.5, and 5.2.6 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. IBM X-Force ID: 192429.

CVE
#vulnerability#intel#perl#ibm
LiquidFiles 3.4.15 Cross Site Scripting

LiquidFiles version 3.4.15 suffers from a cross site scripting vulnerability.

PHPIPAM 1.4.4 Cross Site Request Forgery / Cross Site Scripting

PHPIPAM version 1.4.4 suffers from cross site request forgery and cross site scripting vulnerabilities.

Red Hat Security Advisory 2022-4642-01

Red Hat Security Advisory 2022-4642-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include null pointer and privilege escalation vulnerabilities.

Critical Vulnerability in Premium WordPress Themes Allows for Site Takeover

Privilege escalation flaw discovered in the Jupiter and JupiterX Core Plugin affects more than 90,000 sites.

CVE-2022-25617: Code Snippets

Reflected Cross-Site Scripting (XSS) vulnerability in Code Snippets plugin <= 2.14.3 at WordPress via &orderby vulnerable parameter.

Top Data-Driven Methods for Improving Your Investment Decisions

By Owais Sultan From location quotient geography formula to AI (Artificial Intelligence) investing, leveraging technology to generate higher returns is one… This is a post from HackRead.com Read the original post: Top Data-Driven Methods for Improving Your Investment Decisions

CVE-2022-22778: Advisory | TIBCO Software

The Web Server component of TIBCO Software Inc.'s TIBCO BusinessConnect Trading Community Management contains an easily exploitable vulnerability that allows an unauthenticated attacker with network access to execute Cross-Site Request Forgery (CSRF) on the affected system. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.'s TIBCO BusinessConnect Trading Community Management: versions 6.1.0 and below.

Microsoft Flags Attack Targeting SQL Servers With Novel Approach

Attackers appear to have found a way around PowerShell monitoring by using a default utility instead.

Jupiter / JupiterX Theme Privilege Escalation / LFI / DoS / Access Control Issues

Jupiter Theme versions 6.10.1 and below as well as JupiterX Core plugin versions 2.0.7 and below suffer from privilege escalation and post deletion vulnerabilities. JupiterX Theme versions 2.0.6 and below as well as JupiterX Core versions 2.0.6 and below suffer from plugin deactivation and setting modification flaws. JupiterX Theme versions 2.0.6 and below as well as Jupiter Theme versions 6.10.1 and below suffer from path traversal and local file inclusion vulnerabilities. Jupiter Theme versions 6.10.1 and below suffer from an arbitrary plugin deletion vulnerability. JupiterX Core plugin versions 2.0.6 and below suffer from information disclosure, modification, and denial of service vulnerabilities.