Tag
#redis
By Waqas Known as 'P2PInfect,' the worm exploits a critical vulnerability to infiltrate Redis instances and assimilates them into a larger P2P network, enabling it to spread rapidly. This is a post from HackRead.com Read the original post: P2PInfect: Self-Replicating Worm Hits Redis Instances
A vulnerability classified as problematic has been found in Aures Komet up to 20230509. This affects an unknown part of the component Kiosk Mode. The manipulation leads to improper access controls. It is possible to launch the attack on the physical device. The exploit has been disclosed to the public and may be used. The identifier VDB-235053 was assigned to this vulnerability.
Cybersecurity researchers have uncovered a new cloud targeting, peer-to-peer (P2P) worm called P2PInfect that targets vulnerable Redis instances for follow-on exploitation. "P2PInfect exploits Redis servers running on both Linux and Windows Operating Systems making it more scalable and potent than other worms," Palo Alto Networks Unit 42 researchers William Gamazo and Nathaniel Quist said. "This
PaulPrinting CMS suffers from persistent cross site scripting vulnerabilities.
Aures Booking and POS Terminal suffers from a local privilege escalation vulnerability.
Webile version 1.0.1 suffers from multiple cross site scripting vulnerabilities.
Dooblou WiFi File Explorer version 1.13.3 suffers from multiple cross site scripting vulnerabilities.
PaulPrinting CMS suffers from a cross site scripting vulnerability.
Tiva Events Calender version 1.4 suffers from a persistent cross site scripting vulnerability.
Active Super Shop CMS version 2.5 suffers from an html injection vulnerability.