CVE-2023-34990 : FORTINET FORTIWLM UP TO 8.5.4/8.6.5 WEB REQUEST PATH TRAVERSAL
Description A relative path traversal in Fortinet FortiWLM version 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4 allows attacker to execute
Description A relative path traversal in Fortinet FortiWLM version 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4 allows attacker to execute
Description IBM i 7.4 and 7.5 is vulnerable to an authenticated user gaining elevated privilege to a physical file. A
Description Dell Inventory Collector Client, versions prior to 12.7.0, contains an Improper Link Resolution Before File Access vulnerability. A low-privilege
Description IBM Security Guardium Key Lifecycle Manager 4.1, 4.1.1, 4.2.0, and 4.2.1 could allow a remote attacker to obtain sensitive
Description In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_event: Align BR/EDR JUST_WORKS paring with LE This
Description Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability during JSP compilation in Apache Tomcat permits an RCE on case insensitive file
Description Authentication Bypass vulnerability in Hitachi Ops Center Analyzer on Linux, 64 bit (Hitachi Ops Center Analyzer detail view component),
Description A critical vulnerability has been discovered in Privileged Remote Access (PRA) and Remote Support (RS) products which can allow
APIs are the glue that holds modern applications together. Facilitates smooth communication between systems. Helps ensure that business operations run
Federated Identity Management (FIM) is a system that allows digital identities to be shared across multiple jurisdictions, organizations, or security
User and Entity Behavior Analytics (UEBA) is a cybersecurity solution that uses advanced analytics to detect anomalies in the behavior
Quantum-Resistant Encryption refers to cryptographic algorithms designed to withstand the computational capabilities of quantum computers. This is different from classical
In today’s interconnected digital world, enterprise-level API security is critical for businesses of all sizes, particularly small to medium-sized businesses
Cyber Warfare is the use of digital attacks by one country or organization to damage or disrupt another country’s critical
Description A flaw was found in the X.org server. Due to improperly tracked allocation size in _XkbSetCompatMap, a local attacker
Description CyberPanel (aka Cyber Panel) before 2.3.5 allows Command Injection via completePath in the ProcessUtilities.outputExecutioner() sink. There is /filemanager/upload (aka
Description ServiceNow has addressed an input validation vulnerability that was identified in the Now Platform. This vulnerability could enable an
Description Waitress is a Web Server Gateway Interface server for Python 2 and 3. A remote client may send a
Description A CORS misconfiguration in parisneo/lollms-webui prior to version 10 allows attackers to steal sensitive information such as logs, browser
An AI-powered Security Operations Center (SOC) represents a revolutionary change in the way organizations manage cybersecurity. By combining artificial intelligence
Description pyLoad is a free and open-source Download Manager. The folder `/.pyload/scripts` has scripts which are run when certain actions
Description File Upload vulnerability in Best courier management system in php v.1.0 allows a remote attacker to execute arbitrary code
Description A vulnerability in the SSH subsystem of Cisco Adaptive Security Appliance (ASA) Software could allow an authenticated, remote attacker
Description A missing authentication for critical function in FortiManager 7.6.0, FortiManager 7.4.0 through 7.4.4, FortiManager 7.2.0 through 7.2.7, FortiManager 7.0.0