Top 5 Infrastructure as Code Security Challenges
Learn how to counteract the top five challenges of IaC and discover how these obstacles pose a threat to security...
Learn how to counteract the top five challenges of IaC and discover how these obstacles pose a threat to security...
Programme HackerOne LinkedIn LinkedIn Submitted by raajeevrathnam raajeevrathnam Report Add me email address Authentication bypass Full Report A considerable amount...
Programme HackerOne Shopify Shopify Submitted by inhibitor181 inhibitor181 Report shopApps query from the graphql at /users/api returns all existing created...
Programme HackerOne MTN Group MTN Group Submitted by shuvam321 shuvam321 Report POST BASED REFLECTED XSS IN dailydeals.mtn.co.za Full Report A...
Researchers spotted a massive campaign that scanned close to 1.6 million WordPress sites for vulnerable Kaswara Modern WPBakery Page Builder...
Microsoft researchers linked the Holy Ghost ransomware (H0lyGh0st) operation to North Korea-linked threat actors. The Microsoft Threat Intelligence Center (MSTIC)...
Dumpscan is a command-line tool designed to extract and dump secrets from kernel and Windows Minidump formats. Kernel-dump parsing is...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
NAME Siemens SIMATIC eaSie Core Package security bypass Platforms Affected:Siemens SIMATIC eaSie Core Package 21Risk Level:10Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION Siemens SIMATIC...
NAME Juniper Networks Junos Space Security Director Policy Enforcer weak security Platforms Affected:Juniper Networks Junos Space Security Director Policy EnforcerRisk...
NAME Google Chrome WebGPU code execution Platforms Affected:Google Chrome 99 Google Chrome 102.0Risk Level:8.3Exploitability:UnprovenConsequences:Gain Access DESCRIPTION Google Chrome could allow...
NAME LUX - TYPO3 Marketing Automation extension for TYPO3 SQL injection Platforms Affected:TYPO3 LUX Marketing Automation Extension for TYPO3Risk Level:8.2Exploitability:UnprovenConsequences:Data...
NAME Siemens SCALANCE X Switch Devices denial of service Platforms Affected:Siemens SCALANCE X200-4P IRT (6GK5200-4AH00- 2BA3) Siemens SCALANCE X200-4P IRT...
NAME Siemens SIMATIC CP Devices code execution Platforms Affected:Siemens SIMATIC CP 1242-7 V2 (6GK7242-7KX31- 0XE0) Siemens SIMATIC CP 1243-1 (6GK7243-1BX30-0XE0)...
NAME Node.js shared-dam-app module code execution Platforms Affected:Node.js shared-dam-appRisk Level:9.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION Node.js shared-dam-app module could allow a remote attacker...
NAME Siemens Opcenter Quality security bypass Platforms Affected:Siemens Opcenter Quality 13.1 Siemens Opcenter Quality 13.2Risk Level:9.6Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION Siemens Opcenter...
NAME Argo Project Argo CD security bypass Platforms Affected:Argo Project Argo CD 2.3.0 Argo Project Argo CD 2.3.5 Argo Project...
NAME Dahua DHI-ASI7213X-T1 security bypass Platforms Affected:Dahua Technology ASI7213X-T1 1.000.10Be006.0.R.201213Risk Level:8.1Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION Dahua DHI-ASI7213X-T1 could allow a remote attacker...