
CVE-2023-40683 : IBM OPENPAGES WITH WATSON 8.3/9.0 IMPROPER AUTHORIZATION
Description IBM OpenPages with Watson 8.3 and 9.0 could allow remote attacker to bypass security restrictions, caused by insufficient authorization
Description IBM OpenPages with Watson 8.3 and 9.0 could allow remote attacker to bypass security restrictions, caused by insufficient authorization
Description Summary of Vulnerability A template injection vulnerability on older versions of Confluence Data Center and Server allows an unauthenticated
Generic Routing Encapsulation (GRE) is a tunneling protocol that encapsulates various network protocols within Internet Protocol (IP) packets. User Datagram
In recent months, a groundbreaking cyber threat has emerged, shaking the foundations of web security and challenging major cloud infrastructure
As we embark on the horizon of 2024, the cybersecurity landscape is teeming with challenges and opportunities. Recently, a globally
In a recent case, healthcare teams in Singapore struggled with prolonged online outages due to distributed denial of service (DDoS)
Description IBM AIX 7.2, 7.3, and VIOS 3.1 could allow a privileged local user to exploit a vulnerability in the
Simple Network Management Protocol (SNMP) is a widely used protocol for managing and monitoring network devices. It allows network administrators
Description This vulnerability, if exploited, allows an attacker to perform privileged RCE (Remote Code Execution) on machines with the Assets
Description Pre-auth RCE in Apache Ofbiz 18.12.09. It’s due to XML-RPC no longer maintained still present. This issue affects Apache
Description IBM InfoSphere Information Server 11.7 could allow a remote attacker to cause a denial of service due to improper
As the holiday season is upon us and the festivities begin to heat up, at the very least, it also
The Simple Service Discovery Protocol (SSDP) is a network protocol used by devices to discover and communicate with each other
Memcache is a high-performance, distributed memory caching system used to improve website and application performance. It stores frequently accessed data
Description Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 25.0.0 and prior to
In a TCP (Transmission Control Protocol) connection, a three-way handshake is performed between the client and the server to establish
Prophaze Highlights the Digital Frontline in Israel-Hamas Conflict In recent times, the world has witnessed an alarming surge in Distributed
Tsunami is an open-source cybersecurity framework developed by Google. It enables security professionals to conduct large-scale, high-fidelity network security assessments,
When it comes to maintaining your online presence and increasing website performance, you need a robust WAF (Web Application Firewall)
In the realm of cybersecurity, Domain Name System (DNS) amplification attacks have emerged as a significant concern for organizations worldwide.
The Character Generator (CharGEN) protocol was originally designed for testing and debugging purposes. It allows a client to request a
Description Leave Management System Project v1.0 is vulnerable to multiple Authenticated SQL Injection vulnerabilities. The ‘setcasualleave’ parameter of the admin/setleaves.php
Description Under certain conditions, Nessus Network Monitor was found to not properly enforce input validation. This could allow an admin
Network Time Protocol (NTP) is a protocol used to synchronize the time across computer systems and networks. It ensures accurate