
CVE-2024-51466 : IBM COGNOS ANALYTICS UP TO 11.2.4 FP4/12.0.4 EL EXPRESSION LANGUAGE INJECTION
Description IBM Cognos Analytics 11.2.0 through 11.2.4 FP4 and 12.0.0 through 12.0.4 is vulnerable to an Expression Language (EL) Injection
Description IBM Cognos Analytics 11.2.0 through 11.2.4 FP4 and 12.0.0 through 12.0.4 is vulnerable to an Expression Language (EL) Injection
Description A weak credentials vulnerability potentially allows privileged system access via SSH to Sophos Firewall older than version 20.0 MR3
Description Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability during JSP compilation in Apache Tomcat permits an RCE on case insensitive file
APIs are the glue that holds modern applications together. Facilitates smooth communication between systems. Helps ensure that business operations run
Federated Identity Management (FIM) is a system that allows digital identities to be shared across multiple jurisdictions, organizations, or security
User and Entity Behavior Analytics (UEBA) is a cybersecurity solution that uses advanced analytics to detect anomalies in the behavior
Quantum-Resistant Encryption refers to cryptographic algorithms designed to withstand the computational capabilities of quantum computers. This is different from classical
In today’s interconnected digital world, enterprise-level API security is critical for businesses of all sizes, particularly small to medium-sized businesses
Cyber Warfare is the use of digital attacks by one country or organization to damage or disrupt another country’s critical
Description CyberPanel (aka Cyber Panel) before 2.3.5 allows Command Injection via completePath in the ProcessUtilities.outputExecutioner() sink. There is /filemanager/upload (aka
An AI-powered Security Operations Center (SOC) represents a revolutionary change in the way organizations manage cybersecurity. By combining artificial intelligence
Description pyLoad is a free and open-source Download Manager. The folder `/.pyload/scripts` has scripts which are run when certain actions
Description A vulnerability in the SSH subsystem of Cisco Adaptive Security Appliance (ASA) Software could allow an authenticated, remote attacker
Description In the Linux kernel, the following vulnerability has been resolved: mm/mremap: fix move_normal_pmd/retract_page_tables race In mremap(), move_page_tables() looks at
Description An issue was discovered in Zimbra Collaboration (ZCS) 10.1.x before 10.1.1, 10.0.x before 10.0.9, 9.0.0 before Patch 41, and
Cybersecurity Network Architecture (CSMA) is a flexible, deployable approach that decentralizes security controls. Move the security perimeter from a centralized
Description Wasmtime is an open source runtime for WebAssembly. Wasmtime’s implementation of WebAssembly tail calls combined with stack traces can
Description Discourse is an open source platform for community discussion. An attacker can make several XHR requests until the cache
Description Livewire is a full-stack framework for Laravel that allows for dynamic UI components without leaving PHP. In livewire/livewire `<
Generative AI, driven by advanced machine learning techniques, is revolutionizing industries by creating text, images, music, and virtual environments. These
In today’s ever-evolving cybersecurity landscape, organizations must be proactive in identifying and mitigating threats. One of the most effective ways
Description A vulnerability was found in code-projects Blood Bank Management System 1.0. It has been classified as critical. This affects
In today’s interconnected digital ecosystems, it is important to secure APIs to protect sensitive data and ensure integrity of communication
The deployment of 5G networks marks a transformational change in telecommunications, offering unprecedented speeds, reduced latency, and improved connectivity. These