Parse Server command execution | CVE-2022-24760
NAME Parse Server command execution Platforms Affected:Parse Server Parse Server 4.10.6Risk Level:10Exploitability:UnprovenConsequences:Gain Access DESCRIPTION Parse Server could allow a remote...
NAME Parse Server command execution Platforms Affected:Parse Server Parse Server 4.10.6Risk Level:10Exploitability:UnprovenConsequences:Gain Access DESCRIPTION Parse Server could allow a remote...
NAME Google Chrome New Tab Page code execution Platforms Affected:Google Chrome 99Risk Level:8.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION Google Chrome could allow a...
NAME Jenkins Environment Dashboard Plugin cross-site scripting Platforms Affected:Jenkins Environment Dashboard Plugin 1.1.10Risk Level:8Exploitability:HighConsequences:Obtain Information DESCRIPTION Jenkins Environment Dashboard Plugin...
NAME Automatic Question Paper Generator System firstname lastname id username password security bypass Platforms Affected:Sourcecodester Automatic Question Paper Generator System...
NAME Jenkins List Git Branches Parameter Plugin cross-site scripting Platforms Affected:Jenkins List Git Branches Parameter Plugin 0.0.9Risk Level:8Exploitability:HighConsequences:Cross-Site Scripting DESCRIPTION...
NAME Google Chrome Safe Browsing code execution Platforms Affected:Google Chrome 99Risk Level:8.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION Google Chrome could allow a remote...
NAME Jenkins Dashboard View Plugin cross-site scripting Platforms Affected:Jenkins Dashboard View Plugin 2.18Risk Level:8Exploitability:HighConsequences:Cross-Site Scripting DESCRIPTION Jenkins Dashboard View Plugin...
NAME PONTON X/P Messenger file upload Platforms Affected:PONTON X/P Messenger 3.10.0 PONTON X/P Messenger 3.11.0 PONTON X/P Messenger 3.11.1 PONTON...
NAME Google Chrome Browser UI code execution Platforms Affected:Google Chrome 99Risk Level:8.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION Google Chrome could allow a remote...
In mere seconds, a hacker remotely accessed a computer belonging to a regional Russian Ministry of Health, taking advantage of...
Patching A complete listing of the contextual patching actions are described in the following sections. Assemble The main patching dialog...
continews NOTE: The information on this page is automated and scraped directly from the Conti .onion Dark Web Tor Blog...
OpenSSL addressed a high-severity denial-of-service (DoS) vulnerability, tracked as CVE-2022-0778, related to certificate parsing. OpenSSL released updates to address a high-severity...
Is your app server serving more stress than function? Explore this walkthrough for configuring and deploying a serverless API and...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards...
Aberebot, a known Android banking Trojan, has changed its name and returned loaded with new features. First spotted by @MalwareHunterTeam in early...
Several government websites in Israel—those using the .gov.il domain—were inaccessible after a distributed denial of service (DDoS) attack hit Israel’s...
Apple has released patches for macOS Monterey 12.3, iOS 15.4 and iPadOS 15.4. In these security updates, released on March...
As we wrote on March 3, 2022 Nvidia, was recently attacked by the LAPSUS$ ransomware group. The ensuing data leak...
Veeam addressed two critical vulnerabilities impacting the Backup & Replication product for virtual environments. Veeam has released security patches to...
German Federal Office for Information Security agency, also known as BSI, recommends consumers not to use Kaspersky anti-virus software. The...
Taiwanese vendor QNAP warns most of its NAS devices are impacted by high severity Linux vulnerability dubbed ‘Dirty Pipe.’ Taiwanese...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...