CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

Description: Web App Scanning Plugin ID 114619 with Info Severity Synopsis GitLab Public Snippets Detected Description This is an informational notice that the scanner was able to detect public snippets on the target GitLab instance. Solution Ensure that the public permissions applied on the detected snippets are expected. Read more at https://www.tenable.com/plugins/was/114619
Source: Tenable Plugins
March 11th, 2025 (4 months ago)
Description: Web App Scanning Plugin ID 114620 with Medium Severity Synopsis RustDesk Console Detected Description RustDesk is a mote access and control software that enables management of computers and other devices. RustDesk server Pro embeds a web console allowing users to browse devices and perform configuration modification on the application. By leveraging this, a remote and unauthenticated attacker could use some techniques, such as a Brute-Force or Dictionary Attack, in order to gain access to administrative functionality.Note that this detection is included in the Remote Access Tools category. Solution Restrict access to administrative functionality using, for example, a .htaccess file and limiting access to known IP Addresses. Read more at https://www.tenable.com/plugins/was/114620
Source: Tenable Plugins
March 11th, 2025 (4 months ago)
Description: Web App Scanning Plugin ID 114621 with Info Severity Synopsis Docker Public Registry Detected Description This is an informational notice that the scanner was able to detect a public Docker registry instance. Solution Ensure that the public permissions applied on the detected registry are expected. Read more at https://www.tenable.com/plugins/was/114621
Source: Tenable Plugins
March 11th, 2025 (4 months ago)
Description: Web App Scanning Plugin ID 114622 with Info Severity Synopsis LiteLLM Detected Description This is an informational plugin to inform the user that the scanner has detected a publicly accessible LiteLLM instance on the target application. LiteLLM is a LLM Gateway to provide model access in the OpenAI format. This detection is included in the AI and LLM category. Solution If the application is not expected to be public, restrict access using a .htaccess file, limiting access to known IP Addresses. Read more at https://www.tenable.com/plugins/was/114622
Source: Tenable Plugins
March 11th, 2025 (4 months ago)
Description: Web App Scanning Plugin ID 114623 with High Severity Synopsis LiteLLM < 1.48.18 Server-Side Request Forgery Description According to its self-reported version, the instance of LiteLLM running on the remote web server is prior to 1.48.18. It is, therefore, affected by a Server-Side Request Forgery vulnerability in the chat completion.Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number. Solution Upgrade to LiteLLM version 1.48.18 or later. Read more at https://www.tenable.com/plugins/was/114623
Source: Tenable Plugins
March 11th, 2025 (4 months ago)
Description: Web App Scanning Plugin ID 114624 with Critical Severity Synopsis RustDesk Console Default Credentials Description RustDesk is a mote access and control software that enables management of computers and other devices. RustDesk server Pro embeds a web console allowing users to browse devices and perform configuration modification on the application. A remote and unauthenticated attacker can use the default `admin/test1234` credentials in order to gain access to administrative functionality.Note that this detection is included in the Remote Access Tools category. Solution The application should not be configured with accounts using default or predictable credentials. A complex password policy should be defined and enforced on every account available in the application to prevent attackers from guessing it and have unauthorized access to the application. Read more at https://www.tenable.com/plugins/was/114624
Source: Tenable Plugins
March 11th, 2025 (4 months ago)
Description: Web App Scanning Plugin ID 114625 with Critical Severity Synopsis LiteLLM Default Credentials Description LiteLLM applies an authentication system with credentials that could have been suggested from the documentation. If these credentials are not modified, an attacker could access LiteLLM's interface and perform arbitrary actions. This detection is included in the AI and LLM category. Solution The application should not be configured with accounts using default or predictable credentials. A complex password policy should be defined and enforced on every account available in the application to prevent attackers from guessing it and have unauthorized access to the application. Read more at https://www.tenable.com/plugins/was/114625
Source: Tenable Plugins
March 11th, 2025 (4 months ago)
Description: Web App Scanning Plugin ID 114626 with Medium Severity Synopsis RustDesk API Admin Detected Description RustDesk is a remote access and control software that enables management of computers and other devices. RustDesk API Admin is a RESTful API allowing automation and integration of RustDesk functionality into other systems. By levegaring this service, a remote and unauthenticated attacker could use some techniques, such as a Brute-Force or Dictionary Attack, in order to gain access to administrative functionality.Note that this detection is included in the Remote Access Tools category. Solution Restrict access to administrative functionality using, for example, a .htaccess file and limiting access to known IP Addresses. Read more at https://www.tenable.com/plugins/was/114626
Source: Tenable Plugins
March 11th, 2025 (4 months ago)
Description: Web App Scanning Plugin ID 114627 with Medium Severity Synopsis RustDesk API Admin Registration Enabled Description RustDesk is a remote access and control software that enables management of computers and other devices. RustDesk API Admin is a RESTful API allowing automation and integration of RustDesk functionality into other systems. The registration is enabled on the target API Admin interface, allowing a remote and unauthenticated attacker to self-register on the target instance and gain privileges on the vulnerable system.Note that this detection is included in the Remote Access Tools category. Solution Disable self-registration on the target API admin interface. Read more at https://www.tenable.com/plugins/was/114627
Source: Tenable Plugins
March 11th, 2025 (4 months ago)
Description: Web App Scanning Plugin ID 114628 with Info Severity Synopsis VNC Viewer for Java Detected Description This is an informational notice that the scanner was able to detect a VNC Viewer for Java applet on the target server.Note that this detection is included in the Remote Access Tools category. Solution Read more at https://www.tenable.com/plugins/was/114628
Source: Tenable Plugins
March 11th, 2025 (4 months ago)