all InfoSec news
Super FabriXss
March 14, 2023, midnight |
The Open Cloud Vulnerability & Security Issue Database www.cloudvulndb.org
could have allowed a malicious script to be reflected off a web application.
After a potential victim clicked on a crafted malicious URL, the attacker could
remotely toggle the ‘Cluster’ Event Type setting under the Events tab. This could
lead to unauthenticated remote code execution on a container hosted on a Service Fabric node.
application attacker azure azure service azure service fabric explorer cluster code code execution event events explorer fabrixss malicious remote code remote code execution script service service fabric sfx super super fabrixss tab unauthenticated under url victim vulnerability web web application xss
More from www.cloudvulndb.org / The Open Cloud Vulnerability & Security Issue Database
AWS Amplify IAM role publicly assumable exposure
1 month, 2 weeks ago |
www.cloudvulndb.org
AWS Glue database password leakage
1 month, 3 weeks ago |
www.cloudvulndb.org
Synapse Analytics privilege escalation via intelligent caching
2 months, 3 weeks ago |
www.cloudvulndb.org
Azure Site Recovery privilege escalation
3 months, 2 weeks ago |
www.cloudvulndb.org
Azure HDInsight privilege escalation and DoS vulnerabilities
3 months, 3 weeks ago |
www.cloudvulndb.org
Jobs in InfoSec / Cybersecurity
CyberSOC Technical Lead
@ Integrity360 | Sandyford, Dublin, Ireland
Cyber Security Strategy Consultant
@ Capco | New York City
Cyber Security Senior Consultant
@ Capco | Chicago, IL
Sr. Product Manager
@ MixMode | Remote, US
Corporate Intern - Information Security (Year Round)
@ Associated Bank | US WI Remote
Senior Offensive Security Engineer
@ CoStar Group | US-DC Washington, DC