TechAni
Dark mode

Insights Lab

Live Signals

Threat surface, AI/ML signals.

Live

Threat Surface Pulse

Real-time snapshots from CISA KEV and other signals. Highlights exposed risk and trending CVEs.

  • Recent KEV additions
  • Exec-ready talking points
CVE-2023-47246Due 12/4/2023

SysAid

SysAid Server (on-premises version) contains a path traversal vulnerability that leads to code execution.

CVE-2023-36844Due 11/17/2023

Juniper

Juniper Junos OS on EX Series contains a PHP external variable modification vulnerability that allows an unauthenticated, network-based attacker to control certain, important environment variables. Using a crafted request an attacker is able to modify certain PHP environment variables, leading to partial loss of integrity, which may allow chaining to other vulnerabilities.

CVE-2023-36845Due 11/17/2023

Juniper

Juniper Junos OS on EX Series and SRX Series contains a PHP external variable modification vulnerability that allows an unauthenticated, network-based attacker to control an important environment variable. Using a crafted request, which sets the variable PHPRC, an attacker is able to modify the PHP execution environment allowing the injection und execution of code.

CVE-2023-36846Due 11/17/2023

Juniper

Juniper Junos OS on SRX Series contains a missing authentication for critical function vulnerability that allows an unauthenticated, network-based attacker to cause limited impact to the file system integrity. With a specific request to user.php that doesn't require authentication, an attacker is able to upload arbitrary files via J-Web, leading to a loss of integrity for a certain part of the file system, which may allow chaining to other vulnerabilities.

CVE-2023-36847Due 11/17/2023

Juniper

Juniper Junos OS on EX Series contains a missing authentication for critical function vulnerability that allows an unauthenticated, network-based attacker to cause limited impact to the file system integrity. With a specific request to installAppPackage.php that doesn't require authentication, an attacker is able to upload arbitrary files via J-Web, leading to a loss of integrity for a certain part of the file system, which may allow chaining to other vulnerabilities.

← PrevPage 91 / 297Next →
Live

AI/ML Signal Tracker

Tracks model releases, repos, and outages; summarizes impact for platform roadmaps.

  • Top moving repos
  • Signal strength
← PrevPage 1 / 9Next →