A vulnerability marked as critical has been reported in enesgkky Pulpy up to 0.1.0 . This affects the function validateFsPath . This manipulation causes path traversal. The identification of this vuln…
cyberintel.kalymoon.com · 20682 articles · updated every 4 hours · grows forever
A vulnerability marked as critical has been reported in enesgkky Pulpy up to 0.1.0 . This affects the function validateFsPath . This manipulation causes path traversal. The identification of this vuln…
A vulnerability described as critical has been identified in efwGrp efw4.X up to 4.08.9 . This vulnerability affects the function elfinder_checkRisk . Such manipulation leads to incorrect authorizatio…
A vulnerability classified as critical has been found in dedoc scramble up to 0.13.21 . This issue affects some unknown processing. Performing a manipulation results in code injection. This vulnerabil…
A vulnerability classified as critical was found in wger-project wger up to 2.5 . Impacted is the function reset_user_password/gym_permissions_user_edit of the component Response Body Handler . Execut…
A vulnerability, which was classified as critical , has been found in efwGrp efw4.X up to 4.08.9 . The affected element is the function zipEntry.getName . The manipulation leads to command injection. …
A vulnerability, which was classified as critical , was found in HPE Aruba Networking Wireless Operating System up to 10.8.0.0 . The impacted element is an unknown function of the component PAPI Proto…
A vulnerability has been found in Subnet Solutions PowerSYSTEM Center 2020, PowerSYSTEM Center 2024 and PowerSYSTEM Center 2026 up to 5.28.x and classified as problematic . This affects an unknown fun…
A vulnerability was found in Deskflow up to 1.26.0.167 and classified as problematic . This impacts the function SecureSocket::secureAccept . Such manipulation leads to resource consumption. This vuln…
A vulnerability was found in codingjoe django-s3file up to 7.0.1 . It has been classified as critical . Affected is an unknown function of the component File Upload Handler . Performing a manipulation…
A vulnerability was found in efwGrp efw4.X up to 4.08.9 . It has been declared as problematic . Affected by this vulnerability is an unknown functionality of the component File Extension Handler . Exe…
A vulnerability was found in efwGrp efw4.X up to 4.08.9 . It has been rated as critical . Affected by this issue is the function elfinder_checkRisk . The manipulation leads to os command injection. Th…
A vulnerability categorized as problematic has been discovered in Subnet Solutions PowerSYSTEM Center 2020 up to 5.28.x . This affects an unknown part of the component REST API Endpoint . The manipula…
A vulnerability identified as problematic has been detected in Subnet Solutions PowerSYSTEM Center 2024 and PowerSYSTEM Center 2026 up to 6.1.x . This vulnerability affects unknown code. This manipula…
A vulnerability labeled as critical has been found in heymrun heym up to 0.0.20 . This issue affects the function upload_file of the component File Upload Endpoint . Such manipulation leads to path tr…
A vulnerability marked as critical has been reported in 0xJacky nginx-ui up to 2.3.4 . Impacted is an unknown function. Performing a manipulation results in server-side request forgery. This vulnerabi…
Today Microsoft is announcing a major step forward in AI-powered cyber defense: a new multi-model agentic scanning harness (codenamed MDASH). The post Defense at AI speed: Microsoft’s new multi-model …
Today&#;x26;#;39;s Microsoft patch Tuesday fixes 137 different vulnerabilities. In addition, the update addresses 137 Chromium-related issues affecting Microsoft Edge.
Artificial intelligence platforms may be just as susceptible to social engineering as human beings, but they are proving remarkably good at finding security vulnerabilities in human-made computer code…
Josephine Wolff on Why Healthcare Must Scrutinize Cyber and AI Coverage Healthcare organizations face growing pressure to reassess cyber insurance policies as cyberattacks disrupt patient care and AI …
Frame's AI Models Build Contextualized Security Lessons Automatically in Minutes Frame Security, founded by former Wiz product and sales leader Tal Shlomo, emerged from stealth with $50 million to bui…
Agency Grants Routers a 18-Month Reprieve From Obsolesce The U.S. Federal Communications Commission extended through Jan. 1, 2029, a waiver allowing foreign-made routers already approved for use in th…
Kernel Privilege Escalation Has One Linux Maintainer Contemplating a 'Kill Switch' Back-to-back kernel vulnerabilities in Linux has defenders scrambling to apply defenses in the age of quick turnaroun…
Container image security pipelines have spent the past several years pushing toward minimal footprints, hermetic builds, and continuous CVE remediation. The Fedora Project is now applying that same ap…
It's the first time in two years with no zero-days. But with 137 flaws to patch, including nine critical ones, admins still have plenty of work to do.