Aggregator
CVE-2022-50072 | Linux Kernel up to ea759ae0a9ae5acee677d722129710ac89cc59c1 NFSv4 use after free (Nessus ID 297384 / WID-SEC-2025-1350)
CVE-2026-0723 | GitLab Community Edition/Enterprise Edition up to 18.6.3/18.7.1/18.8.1 return value (Nessus ID 297397)
CVE-2025-67847 | Moodle up to 5.1.0 Restore Interface code injection (Nessus ID 297398)
CVE-2026-24480 | QGIS pull_request_target authorization (Nessus ID 297403)
CVE-2026-22260 | OISF Suricata up to 8.0.2 recursion (ID 8185 / Nessus ID 297401)
CVE-2026-1102 | GitLab Community Edition/Enterprise Edition up to 18.6.3/18.7.1/18.8.1 allocation of resources (Nessus ID 297399)
CVE-2025-13928 | GitLab Community Edition/Enterprise Edition up to 18.6.3/18.7.1/18.8.1 API Endpoint authorization (Nessus ID 297405)
CVE-2025-15523 | Inkscape up to 1.4.2 on macOS default permission (Nessus ID 297407)
AI-powered penetration testing: Definition, Tools and Process
AI-powered penetration testing is an advanced approach to security testing that uses artificial intelligence, machine learning, and autonomous agents to simulate real-world cyberattacks, identify vulnerabilities, and assess exploitability faster and more intelligently than traditional manual testing. According to Mariia Kozlovska et al. in their research “Artificial intelligence in penetration testing: leveraging AI for advanced vulnerability […]
The post AI-powered penetration testing: Definition, Tools and Process appeared first on Security Boulevard.
CVE-2023-41121 | Array OS prior 9.4.0.499 HTTP denial of service (EUVD-2023-45640)
CVE-2023-41120 | EnterpriseDB Postgres Advanced Server up to 11.21.31/12.16.19/13.12.15/14.8.x/15.3.x permission (EUVD-2023-45639)
CVE-2023-41119 | EnterpriseDB Postgres Advanced Server up to 11.21.31/12.16.19/13.12.15/14.8.x/15.3.x _dbms_aq_move_to_exception_queue privileges management (EUVD-2023-45638)
CVE-2023-41116 | EnterpriseDB Postgres Advanced Server up to 11.21.31/12.16.19/13.12.15/14.8.x/15.3.x permission (EUVD-2023-45635)
CVE-2023-41117 | EnterpriseDB Postgres Advanced Server up to 11.21.31/12.16.19/13.12.15/14.8.x/15.3.x uncontrolled search path (EUVD-2023-45636)
CVE-2023-41115 | EnterpriseDB Postgres Advanced Server up to 11.21.31/12.16.19/13.12.15/14.8.x/15.3.x permission (EUVD-2023-45634)
CVE-2023-41114 | EnterpriseDB Postgres Advanced Server up to 11.21.31/12.16.19/13.12.15/14.8.x/15.3.x get_url_as_text/get_url_as_bytea permission (EUVD-2023-45633)
IoT Penetration Testing: Definition, Process, Tools, and Benefits
IoT penetration testing is a security assessment of the complete IoT ecosystem, from backend systems and cloud services to mobile devices and hardware. It involves a multi-stage simulated attack on IoT devices and their supporting system to identify security risks before attackers can exploit them. Unpatched firmware is responsible for 60% of IoT security breaches, […]
The post IoT Penetration Testing: Definition, Process, Tools, and Benefits appeared first on Security Boulevard.
What makes least privilege essential in secure cloud operations
How Can Least Privilege Transform Secure Cloud Operations? Have you ever pondered the repercussions of over-privileged access in cloud environments? With the rapid adoption of cloud technologies, the concept of least privilege has emerged when a cornerstone for secure cloud operations. This principle, while seemingly simple, significantly influences various sectors, enhancing security and operational efficiency. […]
The post What makes least privilege essential in secure cloud operations appeared first on Entro.
The post What makes least privilege essential in secure cloud operations appeared first on Security Boulevard.
How impenetrable is secrets encryption in financial services
How Secure is Secrets Encryption in Financial Services? Have you ever wondered how financial services ensure the safety of critical information? The key lies in the sophisticated management of Non-Human Identities (NHIs) and the rigorous approach to secrets encryption. These elements are essential to safeguarding sensitive data from falling into the wrong hands. The Role […]
The post How impenetrable is secrets encryption in financial services appeared first on Entro.
The post How impenetrable is secrets encryption in financial services appeared first on Security Boulevard.