Security
Headlines
HeadlinesLatestCVEs

Tag

#ssl

A Guide to Using VPNs on Your Smartphone 

By Waqas A VPN these days is a must as we know it. The recent growth of VPN use has… This is a post from HackRead.com Read the original post: A Guide to Using VPNs on Your Smartphone

HackRead
#web#ios#android#mac#apple#google#microsoft#ddos#git#wifi#ssl
CVE-2020-22984: Business Intelligence & Analytics Solutions

Cross-Site Scripting (XSS) vulnerability in MicroStrategy Web SDK 10.11 and earlier, allows remote unauthenticated attackers to execute arbitrary code via key parameter to the getGoogleExtraConfig task.

CVE-2020-22984: Business Intelligence & Analytics Solutions

Cross-Site Scripting (XSS) vulnerability in MicroStrategy Web SDK 10.11 and earlier, allows remote unauthenticated attackers to execute arbitrary code via key parameter to the getGoogleExtraConfig task.

CVE-2022-29363: phpok6.1 has a deserialization vulnerability, and can getshell by writing arbitrary files · Issue #12 · qinggan/phpok

Phpok v6.1 was discovered to contain a deserialization vulnerability via the update_f() function in login_control.php. This vulnerability allows attackers to getshell via writing arbitrary files.

CVE-2022-29363: phpok6.1 has a deserialization vulnerability, and can getshell by writing arbitrary files · Issue #12 · qinggan/phpok

Phpok v6.1 was discovered to contain a deserialization vulnerability via the update_f() function in login_control.php. This vulnerability allows attackers to getshell via writing arbitrary files.

F5 BIG-IP iControl Remote Code Execution

This Metasploit module exploits an authentication bypass vulnerability in the F5 BIG-IP iControl REST service to gain access to the admin account, which is capable of executing commands through the /mgmt/tm/util/bash endpoint. Successful exploitation results in remote code execution as the root user.

Red Hat Security Advisory 2022-2218-01

Red Hat Security Advisory 2022-2218-01 - Openshift Logging Bug Fix Release. Issues addressed include HTTP request smuggling, denial of service, and man-in-the-middle vulnerabilities.

Red Hat Security Advisory 2022-2197-01

Red Hat Security Advisory 2022-2197-01 - The rsync utility enables the users to copy and synchronize files locally or across a network. Synchronization with rsync is fast because rsync only sends the differences in files over the network instead of sending whole files. The rsync utility is also used as a mirroring tool.

Red Hat Security Advisory 2022-2214-01

Red Hat Security Advisory 2022-2214-01 - The zlib packages provide a general-purpose lossless data compression library that is used by many different programs.

Clearview AI banned from selling facial recognition data in the US

The facial recognition and surveillance company was sued for earning off the back of people's faceprints that were taken without consent. The post Clearview AI banned from selling facial recognition data in the US appeared first on Malwarebytes Labs.