Severity Medium Analysis Summary CVE-2023-26024 IBM Planning Analytics on Cloud Pak for Data 4.0 could allow an attacker on a shared network to obtain sensitive information […]
Severity High Analysis Summary CVE-2023-45168 IBM AIX 7.2, 7.3, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the invscout command […]
Severity High Analysis Summary CVE-2023-44303 Dell RVTools could allow a local authenticated attacker to obtain sensitive information, caused by allowing access to stored encrypted passwords vulnerability. […]
Severity Medium Analysis Summary CVE-2023-49673 Jenkins NeuVector Vulnerability Scanner Plugin is vulnerable to cross-site request forgery, caused by improper validation of user-supplied input. By persuading an […]
Severity High Analysis Summary Analysis Summary CVE-2023-49655 CVSS:7.1 Jenkins MATLAB Plugin is vulnerable to cross-site request forgery, caused by improper validation of user-supplied input. By persuading […]
Severity Medium Analysis Summary CVE-2023-49620 Apache DolphinScheduler could allow a remote authenticated attacker to bypass security restrictions, caused by improper authorization validation. By sending a specially […]
Severity High Analysis Summary Shuckworm APT – aka Actinium, Armageddon, Primitive Bear, Gamaredon, and Trident Ursa – has been a Russia-backed advanced persistent threat (APT) since […]
Severity High Analysis Summary CVE-2023-49733 CVSS:7.5 Apache Cocoon could allow a remote attacker to obtain sensitive information, caused by improper handling of XML external entity (XXE) […]
Severity High Analysis Summary APT-17, also known as “Bitter APT” or “DeputyDog” is a state-sponsored cyber espionage group that is believed to operate out of China. […]