Aggregator
CVE-2023-42250 | Selesta Visual Access Manager up to 4.42.1 /common/autocomplete.php cross site scripting
1 year 3 months ago
A vulnerability, which was classified as problematic, has been found in Selesta Visual Access Manager up to 4.42.1. This issue affects some unknown processing of the file /common/autocomplete.php. The manipulation leads to cross site scripting.
The identification of this vulnerability is CVE-2023-42250. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2023-42245 | Selesta Visual Access Manager up to 4.42.1 s_scheduledfile.php cross site scripting
1 year 3 months ago
A vulnerability classified as problematic was found in Selesta Visual Access Manager up to 4.42.1. This vulnerability affects unknown code of the file monitor/s_scheduledfile.php. The manipulation leads to cross site scripting.
This vulnerability was named CVE-2023-42245. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2023-42249 | Selesta Visual Access Manager up to 4.42.1 vam/vam_visits.php cross site scripting
1 year 3 months ago
A vulnerability classified as problematic has been found in Selesta Visual Access Manager up to 4.42.1. This affects an unknown part of the file vam/vam_visits.php. The manipulation leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2023-42249. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2023-42247 | Selesta Visual Access Manager up to 4.42.1 s_monitor_map.php cross site scripting
1 year 3 months ago
A vulnerability was found in Selesta Visual Access Manager up to 4.42.1. It has been rated as problematic. Affected by this issue is some unknown functionality of the file monitor/s_monitor_map.php. The manipulation leads to cross site scripting.
This vulnerability is handled as CVE-2023-42247. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2023-42246 | Selesta Visual Access Manager up to 4.42.1 /vam/vam_ep.php cross site scripting
1 year 3 months ago
A vulnerability was found in Selesta Visual Access Manager up to 4.42.1. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /vam/vam_ep.php. The manipulation leads to cross site scripting.
This vulnerability is known as CVE-2023-42246. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2024-56138 | notaryproject notation-go up to 1.3.0-rc.1 improper check for certificate revocation
1 year 3 months ago
A vulnerability was found in notaryproject notation-go up to 1.3.0-rc.1. It has been classified as problematic. Affected is an unknown function. The manipulation leads to improper check for certificate revocation.
This vulnerability is traded as CVE-2024-56138. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2023-42242 | Selesta Visual Access Manager up to 4.42.1 GET Parameter /monitor/s_terminal.php sql injection
1 year 3 months ago
A vulnerability was found in Selesta Visual Access Manager up to 4.42.1 and classified as critical. This issue affects some unknown processing of the file /monitor/s_terminal.php of the component GET Parameter Handler. The manipulation leads to sql injection.
The identification of this vulnerability is CVE-2023-42242. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
U.S. CISA adds BeyondTrust PRA and RS and Qlik Sense flaws to its Known Exploited Vulnerabilities catalog
1 year 3 months ago
U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds BeyondTrust PRA and RS and Qlik Sense flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the following vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog: CVE-2024-12686 (CVSS score of 6.6) The flaw is an OS Command Injection Vulnerability in BeyondTrust […]
Pierluigi Paganini
CVE-2023-42243 | Selesta Visual Access Manager up to 4.42.1 /common/vam_Sql.php sql injection
1 year 3 months ago
A vulnerability has been found in Selesta Visual Access Manager up to 4.42.1 and classified as critical. This vulnerability affects unknown code of the file /common/vam_Sql.php. The manipulation leads to sql injection.
This vulnerability was named CVE-2023-42243. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2023-42244 | Selesta Visual Access Manager up to 4.42.1 POST Parameter /vam/vam_visits.php sql injection
1 year 3 months ago
A vulnerability, which was classified as critical, was found in Selesta Visual Access Manager up to 4.42.1. This affects an unknown part of the file /vam/vam_visits.php of the component POST Parameter Handler. The manipulation leads to sql injection.
This vulnerability is uniquely identified as CVE-2023-42244. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2024-51491 | notaryproject notation-go = 1.3.0-rc.1 /tmp improper check or handling of exceptional conditions
1 year 3 months ago
A vulnerability, which was classified as problematic, has been found in notaryproject notation-go = 1.3.0-rc.1. Affected by this issue is some unknown functionality of the file /tmp. The manipulation leads to improper check or handling of exceptional conditions.
This vulnerability is handled as CVE-2024-51491. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2023-42248 | Selesta Visual Access Manager up to 4.42.1 POST Parameter common/vam_Sql.php access control
1 year 3 months ago
A vulnerability classified as critical was found in Selesta Visual Access Manager up to 4.42.1. Affected by this vulnerability is an unknown functionality of the file common/vam_Sql.php of the component POST Parameter Handler. The manipulation leads to improper access controls.
This vulnerability is known as CVE-2023-42248. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2024-11128 | Bitdefender Virus Scanner up to 3.17 on macOS AppleMobileFileIntegrity BitdefenderVirusScanner privileges management
1 year 3 months ago
A vulnerability was found in Bitdefender Virus Scanner up to 3.17 on macOS. It has been rated as critical. This issue affects some unknown processing of the file BitdefenderVirusScanner of the component AppleMobileFileIntegrity. The manipulation leads to improper privilege management.
The identification of this vulnerability is CVE-2024-11128. The attack needs to be approached locally. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2023-42241 | Selesta Visual Access Manager up to 4.42.1 POST Parameter /vam/vam_anagraphic.php sql injection
1 year 3 months ago
A vulnerability classified as critical has been found in Selesta Visual Access Manager up to 4.42.1. Affected is an unknown function of the file /vam/vam_anagraphic.php of the component POST Parameter Handler. The manipulation leads to sql injection.
This vulnerability is traded as CVE-2023-42241. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
SDL 55/100问:如何计算安全评审的覆盖率?
1 year 3 months ago
在SDL建设的路上,各类检测覆盖率是最常见的指标。然而,这些指标出现的先后顺序,可能代表了SDL实施的成熟度。如安全评审是左移到需求或设计阶段的产物,这说明SDL估计做的还不错。
再来谈覆盖率,分母是所有项目,分子则是满足条件的项目,不过除了数量、也要关注质量:
1、公式的计算范围:应不断思考所有项目是否都纳入分母,分子的制定是否合理、是否需要进一步扩大范围;
2、减少评审主观性:尽可能将安全要求固化并持续优化,作为人人评审的依据,降低主观性和个体能力差异;
3、评审标准要全面:从合规、攻防到数据安全、隐私领域,结合实际业务场景制定有效、合理、清晰的标准。
更多软件安全内容,可以访问:
1、SDL100问:我与SDL的故事
SAST误报太高,如何解决?
SDL需要哪些人参与?
设计阶段应开展哪些安全活动?
如何选择开源组件安全扫描(SCA)工具?
SCA工具扫描出很多漏洞,如何处理?
SCA工具识别出高风险协议,如何处理?
应该如何选型代码安全扫描工具?
如何推进有问题的jar包更新?
SCA工具的误报率怎样?
如何说服业务完成checklist自检?
sdl会对项目变更代码做review吗?
怎么解决源代码两张皮导致安全失效?
开发安全培训是否有效?
安全组件如何在SDL中落地?
如何安全管理研发提交代码到GitHub进行开源?
安全组件(SDK)能够否覆盖Owasp Top 10?
SDL建设是难中难,该如何做?
如何定位及落地威胁建模?
关于安全测试标准化的讨论?
SDL是否适合互联网公司?
有什么SDL相关的评价体系?
如何引导业务方进行自助式安全扫描?
前端修复bug需要进行SAST扫描吗?
在DevOps中用到哪些自动化的安全工具?
SDL 54/100问:如何看待安全提测看板这一需求?
2、SDL创新实践系列
首发!“ 研发安全运营 ” 架构研究与实践
DevSecOps实施关键:研发安全团队
DevSecOps实施关键:研发安全流程
DevSecOps实施关键:研发安全规范
从安全视角,看研发安全
数字化转型下的研发安全痛点
SDL 55/100问:如何计算安全评审的覆盖率?
1 year 3 months ago
在SDL建设的路上,各类检测覆盖率是最常见的指标。然而,这些指标出现的先后顺序,可能代表了SDL实施的成熟度。如安全评审是左移到需求或设计阶段的产物,这说明SDL估计做的还不错。
再来谈覆盖率,分母是所有项目,分子则是满足条件的项目,不过除了数量、也要关注质量:
1、公式的计算范围:应不断思考所有项目是否都纳入分母,分子的制定是否合理、是否需要进一步扩大范围;
2、减少评审主观性:尽可能将安全要求固化并持续优化,作为人人评审的依据,降低主观性和个体能力差异;
3、评审标准要全面:从合规、攻防到数据安全、隐私领域,结合实际业务场景制定有效、合理、清晰的标准。
更多软件安全内容,可以访问:
1、SDL100问:我与SDL的故事
SAST误报太高,如何解决?
SDL需要哪些人参与?
设计阶段应开展哪些安全活动?
如何选择开源组件安全扫描(SCA)工具?
SCA工具扫描出很多漏洞,如何处理?
SCA工具识别出高风险协议,如何处理?
应该如何选型代码安全扫描工具?
如何推进有问题的jar包更新?
SCA工具的误报率怎样?
如何说服业务完成checklist自检?
sdl会对项目变更代码做review吗?
怎么解决源代码两张皮导致安全失效?
开发安全培训是否有效?
安全组件如何在SDL中落地?
如何安全管理研发提交代码到GitHub进行开源?
安全组件(SDK)能够否覆盖Owasp Top 10?
SDL建设是难中难,该如何做?
如何定位及落地威胁建模?
关于安全测试标准化的讨论?
SDL是否适合互联网公司?
有什么SDL相关的评价体系?
如何引导业务方进行自助式安全扫描?
前端修复bug需要进行SAST扫描吗?
在DevOps中用到哪些自动化的安全工具?
SDL 54/100问:如何看待安全提测看板这一需求?
2、SDL创新实践系列
首发!“ 研发安全运营 ” 架构研究与实践
DevSecOps实施关键:研发安全团队
DevSecOps实施关键:研发安全流程
DevSecOps实施关键:研发安全规范
从安全视角,看研发安全
数字化转型下的研发安全痛点
SDL 55/100问:如何计算安全评审的覆盖率?
1 year 3 months ago
在SDL建设的路上,各类检测覆盖率是最常见的指标。然而,这些指标出现的先后顺序,可能代表了SDL实施的成熟度。如安全评审是左移到需求或设计阶段的产物,这说明SDL估计做的还不错。
再来谈覆盖率,分母是所有项目,分子则是满足条件的项目,不过除了数量、也要关注质量:
1、公式的计算范围:应不断思考所有项目是否都纳入分母,分子的制定是否合理、是否需要进一步扩大范围;
2、减少评审主观性:尽可能将安全要求固化并持续优化,作为人人评审的依据,降低主观性和个体能力差异;
3、评审标准要全面:从合规、攻防到数据安全、隐私领域,结合实际业务场景制定有效、合理、清晰的标准。
更多软件安全内容,可以访问:
1、SDL100问:我与SDL的故事
SAST误报太高,如何解决?
SDL需要哪些人参与?
设计阶段应开展哪些安全活动?
如何选择开源组件安全扫描(SCA)工具?
SCA工具扫描出很多漏洞,如何处理?
SCA工具识别出高风险协议,如何处理?
应该如何选型代码安全扫描工具?
如何推进有问题的jar包更新?
SCA工具的误报率怎样?
如何说服业务完成checklist自检?
sdl会对项目变更代码做review吗?
怎么解决源代码两张皮导致安全失效?
开发安全培训是否有效?
安全组件如何在SDL中落地?
如何安全管理研发提交代码到GitHub进行开源?
安全组件(SDK)能够否覆盖Owasp Top 10?
SDL建设是难中难,该如何做?
如何定位及落地威胁建模?
关于安全测试标准化的讨论?
SDL是否适合互联网公司?
有什么SDL相关的评价体系?
如何引导业务方进行自助式安全扫描?
前端修复bug需要进行SAST扫描吗?
在DevOps中用到哪些自动化的安全工具?
SDL 54/100问:如何看待安全提测看板这一需求?
2、SDL创新实践系列
首发!“ 研发安全运营 ” 架构研究与实践
DevSecOps实施关键:研发安全团队
DevSecOps实施关键:研发安全流程
DevSecOps实施关键:研发安全规范
从安全视角,看研发安全
数字化转型下的研发安全痛点
SDL 55/100问:如何计算安全评审的覆盖率?
1 year 3 months ago
在SDL建设的路上,各类检测覆盖率是最常见的指标。然而,这些指标出现的先后顺序,可能代表了SDL实施的成熟度。如安全评审是左移到需求或设计阶段的产物,这说明SDL估计做的还不错。
再来谈覆盖率,分母是所有项目,分子则是满足条件的项目,不过除了数量、也要关注质量:
1、公式的计算范围:应不断思考所有项目是否都纳入分母,分子的制定是否合理、是否需要进一步扩大范围;
2、减少评审主观性:尽可能将安全要求固化并持续优化,作为人人评审的依据,降低主观性和个体能力差异;
3、评审标准要全面:从合规、攻防到数据安全、隐私领域,结合实际业务场景制定有效、合理、清晰的标准。
更多软件安全内容,可以访问:
1、SDL100问:我与SDL的故事
SAST误报太高,如何解决?
SDL需要哪些人参与?
设计阶段应开展哪些安全活动?
如何选择开源组件安全扫描(SCA)工具?
SCA工具扫描出很多漏洞,如何处理?
SCA工具识别出高风险协议,如何处理?
应该如何选型代码安全扫描工具?
如何推进有问题的jar包更新?
SCA工具的误报率怎样?
如何说服业务完成checklist自检?
sdl会对项目变更代码做review吗?
怎么解决源代码两张皮导致安全失效?
开发安全培训是否有效?
安全组件如何在SDL中落地?
如何安全管理研发提交代码到GitHub进行开源?
安全组件(SDK)能够否覆盖Owasp Top 10?
SDL建设是难中难,该如何做?
如何定位及落地威胁建模?
关于安全测试标准化的讨论?
SDL是否适合互联网公司?
有什么SDL相关的评价体系?
如何引导业务方进行自助式安全扫描?
前端修复bug需要进行SAST扫描吗?
在DevOps中用到哪些自动化的安全工具?
SDL 54/100问:如何看待安全提测看板这一需求?
2、SDL创新实践系列
首发!“ 研发安全运营 ” 架构研究与实践
DevSecOps实施关键:研发安全团队
DevSecOps实施关键:研发安全流程
DevSecOps实施关键:研发安全规范
从安全视角,看研发安全
数字化转型下的研发安全痛点
SDL 55/100问:如何计算安全评审的覆盖率?
1 year 3 months ago
在SDL建设的路上,各类检测覆盖率是最常见的指标。然而,这些指标出现的先后顺序,可能代表了SDL实施的成熟度。如安全评审是左移到需求或设计阶段的产物,这说明SDL估计做的还不错。
再来谈覆盖率,分母是所有项目,分子则是满足条件的项目,不过除了数量、也要关注质量:
1、公式的计算范围:应不断思考所有项目是否都纳入分母,分子的制定是否合理、是否需要进一步扩大范围;
2、减少评审主观性:尽可能将安全要求固化并持续优化,作为人人评审的依据,降低主观性和个体能力差异;
3、评审标准要全面:从合规、攻防到数据安全、隐私领域,结合实际业务场景制定有效、合理、清晰的标准。
更多软件安全内容,可以访问:
1、SDL100问:我与SDL的故事
SAST误报太高,如何解决?
SDL需要哪些人参与?
设计阶段应开展哪些安全活动?
如何选择开源组件安全扫描(SCA)工具?
SCA工具扫描出很多漏洞,如何处理?
SCA工具识别出高风险协议,如何处理?
应该如何选型代码安全扫描工具?
如何推进有问题的jar包更新?
SCA工具的误报率怎样?
如何说服业务完成checklist自检?
sdl会对项目变更代码做review吗?
怎么解决源代码两张皮导致安全失效?
开发安全培训是否有效?
安全组件如何在SDL中落地?
如何安全管理研发提交代码到GitHub进行开源?
安全组件(SDK)能够否覆盖Owasp Top 10?
SDL建设是难中难,该如何做?
如何定位及落地威胁建模?
关于安全测试标准化的讨论?
SDL是否适合互联网公司?
有什么SDL相关的评价体系?
如何引导业务方进行自助式安全扫描?
前端修复bug需要进行SAST扫描吗?
在DevOps中用到哪些自动化的安全工具?
SDL 54/100问:如何看待安全提测看板这一需求?
2、SDL创新实践系列
首发!“ 研发安全运营 ” 架构研究与实践
DevSecOps实施关键:研发安全团队
DevSecOps实施关键:研发安全流程
DevSecOps实施关键:研发安全规范
从安全视角,看研发安全
数字化转型下的研发安全痛点