all InfoSec news
Super FabriXss
March 14, 2023, midnight |
The Open Cloud Vulnerability & Security Issue Database www.cloudvulndb.org
could have allowed a malicious script to be reflected off a web application.
After a potential victim clicked on a crafted malicious URL, the attacker could
remotely toggle the ‘Cluster’ Event Type setting under the Events tab. This could
lead to unauthenticated remote code execution on a container hosted on a Service Fabric node.
application attacker azure azure service azure service fabric explorer cluster code code execution event events explorer fabrixss malicious remote code remote code execution script service service fabric sfx super super fabrixss tab unauthenticated under url victim vulnerability web web application xss
More from www.cloudvulndb.org / The Open Cloud Vulnerability & Security Issue Database
GraphNinja
2 days, 10 hours ago |
www.cloudvulndb.org
AWS Amplify IAM role publicly assumable exposure
2 weeks, 2 days ago |
www.cloudvulndb.org
AWS Glue database password leakage
2 weeks, 6 days ago |
www.cloudvulndb.org
Azure Site Recovery privilege escalation
2 months, 2 weeks ago |
www.cloudvulndb.org
Azure HDInsight privilege escalation and DoS vulnerabilities
2 months, 3 weeks ago |
www.cloudvulndb.org
Azure Pipelines Agent poisoned pipeline execution
4 months, 1 week ago |
www.cloudvulndb.org
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Professional Services Resident Consultant / Senior Professional Services Resident Consultant - AMS
@ Zscaler | Bengaluru, India
Head of Security, Risk & Compliance
@ Gedeon Richter Pharma GmbH | Budapest, HU
Unarmed Professional Security Officer - County Hospital
@ Allied Universal | Los Angeles, CA, United States
Senior Software Engineer, Privacy Engineering
@ Block | Seattle, WA, United States
Senior Cyber Security Specialist
@ Avaloq | Bioggio, Switzerland