1. A vulnerability in the access management specialist project by Shenzhen Weitillage Industrial Co., Ltd allows remote attackers to obtain sensitive information.
2. A SQL Injection vulnerability in the WP Maps Display Google Maps Perfectly with Ease plugin for WordPress can be exploited by authenticated attackers with contributor-level access and above.
3. A SQL Injection vulnerability in the Quiz Maker plugin for WordPress can be exploited by authenticated attackers with contributor-level access and above.
4. A vulnerability in the GitLab CE/EE allows an attacker to trigger a pipeline as another user under certain circumstances.
5. A vulnerability in the GitLab EE allows an attacker to leak content of a private repository in a public project.
6. A vulnerability in the Arista Wireless Access Points allows authenticated, remote attackers to cause a privilege escalation via spawning a bash shell.
7. A vulnerability in the Dell PowerProtect DD allows an attacker to gain admin user privileges.
8. A vulnerability in the authentik application allows users without the correct authorization to get OAuth tokens for an application and access it.
9. A vulnerability in the HashiCorp's go-getter library can be coerced into executing Git update on an existing maliciously modified Git Configuration, potentially leading to arbitrary code execution.
10. A vulnerability in the HPE At allows an authenticated, remote attacker to execute arbitrary code on the vulnerable application's underlying operating system with the privileges of the vulnerable application.
cisa.gov
cisa.gov
Create attached notes ...
