Aggregator
CVE-2023-45679 | stb_vorbis OGG Vorbis File start_decoder double free (GHSL-2023-145 / Nessus ID 213982)
CVE-2024-10394 | OpenAFS PAG up to 1.6.24/1.8.12.2/1.9.1 integer overflow (Nessus ID 213984)
CVE-2024-10396 | OpenAFS up to 1.6.24/1.8.12.2/1.9.1 improper validation of syntactic correctness of input (Nessus ID 213984)
CVE-2024-10397 | OpenAFS up to 1.6.24/1.8.12.2/1.9.1 out-of-bounds write (Nessus ID 213984)
CVE-2021-30184 | GNU Chess 6.2.7 PGN frontend/cmd.cc cmd_pgnload/cmd_pgnreplay buffer overflow (Nessus ID 213994)
CVE-2010-1951 | 60cycle CMS 2.5.2 news.php DOCUMENT_ROOT path traversal (EDB-12249 / XFDB-57873)
A Threat Actor Claims to be Selling Data of Insurgentes University
Битва за Арктику: скрытые мотивы США в борьбе за остров
Cyberattackers Hide Infostealers in YouTube Comments, Google Search Results
Миллиард миллиардных: ученые остановят мгновение, чтобы запечатлеть движение электронов
Network Configuration and Change Management Best Practices
Managing network configurations and changes is a critical component of modern IT operations, ensuring organizations maintain security, operational efficiency, and business continuity. In today’s fast-paced and complex technology environments, even...
The post Network Configuration and Change Management Best Practices appeared first on Security Boulevard.
DEFACER KAMPUNG Targeted the Website of HARDZON
CVE-2024-12211 | Pegasystems Pega Infinity up to 24.2.0 Profile cross site scripting
CVE-2024-6352 | Silabs SiSDK up to 2024.6.2 APS Layer buffer overflow
CVE-2024-54999 | MonicaHQ 4.1.2 General Information Module last_name injection
CVE-2024-57488 | Code-Projects Online Car Rental System 1.0 /admin/edit-vehicle.php vehicalorcview cross site scripting
CVE-2024-46919 | Samsung 850/980/990/1080/1280/2100/9820/9825 loadOutputBuffers out-of-bounds write
CVE-2024-57487 | Code-Projects Online Car Rental System 1.0 File Extension unrestricted upload
CISA Released A Free Guide to Enhance OT Product Security
To address rising cyber threats targeting critical infrastructure, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released a new step-by-step guide designed to help organizations select and deploy secure operational technology (OT) products. The guide, titled “Secure by Demand: Priority Considerations for OT Owners and Operators when Selecting Digital Products,” highlights key security features […]
The post CISA Released A Free Guide to Enhance OT Product Security appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.