Aggregator
Submit #734577: Yonyou KSOA v9.0 SQL Injection [Accepted]
CVE-2024-49866 | Linux Kernel up to 5.15.167/6.1.112/6.6.54/6.10.13/6.11.2 on CPU0 timerlat cpu_device_down state issue (Nessus ID 210938 / WID-SEC-2024-3251)
CVE-2024-49867 | Linux Kernel up to 6.11.2 btrfs close_ctree use after free (Nessus ID 210940 / WID-SEC-2024-3251)
CVE-2024-49868 | Linux Kernel up to 6.11.2 btrfs start_transaction null pointer dereference (Nessus ID 212967 / WID-SEC-2024-3251)
CVE-2024-49863 | Linux Kernel up to 6.11.2 scsi vhost_scsi_get_req null pointer dereference (Nessus ID 210882 / WID-SEC-2024-3251)
CVE-2024-49864 | Linux Kernel up to 6.6.54/6.10.13/6.11.2 rxrpc_open_socket race condition (Nessus ID 210940 / WID-SEC-2024-3251)
CVE-2024-49865 | Linux Kernel up to 6.11.2 vm xa_alloc use after free (09cf8901fc02/74231870cf49 / Nessus ID 216493)
CVE-2024-49862 | Linux Kernel up to 6.6.53/6.10.12/6.11.1 powercap get_rpi off-by-one (Nessus ID 216493 / WID-SEC-2024-3251)
CVE-2024-49860 | Linux Kernel up to 6.11.1 ACPI description_show return value (Nessus ID 210938 / WID-SEC-2024-3251)
CVE-2024-49861 | Linux Kernel up to 6.6.53/6.10.12/6.11.1 bpf check_func_arg uninitialized pointer (Nessus ID 214608 / WID-SEC-2024-3251)
CVE-2024-49859 | Linux Kernel up to 6.1.112/6.6.53/6.10.12/6.11.1 f2fs_ioc_set_pin_file privilege escalation (Nessus ID 213470 / WID-SEC-2024-3251)
CVE-2024-49858 | Linux Kernel up to 6.11.1 GetEventLog denial of service (Nessus ID 212854 / WID-SEC-2024-3251)
Global tensions are pushing cyber activity toward dangerous territory
Cybersecurity is inseparable from geopolitics. Ongoing conflicts, sanctions, trade wars, geoeconomic rivalry, and technological competition have pushed state competition into cyberspace. States use cyber operations to exert pressure on rivals, enabling disruption without resorting to conventional weapons. Infrastructure vulnerabilities in a geopolitical context 72% of IT leaders worry that nation-state cyber capabilities could tip into a full-scale cyberwar, and that critical infrastructure would be hit hardest. Although the cause was not a cyberattack, the large-scale … More →
The post Global tensions are pushing cyber activity toward dangerous territory appeared first on Help Net Security.
Rubrik introduces Security Cloud Sovereign for data sovereignty and regulatory compliance
Rubrik announced Rubrik Security Cloud Sovereign, an offering that gives global organizations control over their data to support national security and operational continuity. Rubrik Security Cloud Sovereign gives customers the ability to maintain control over where data resides and who has access to it as regulations change. “Our customers have been clear about what they need,” said Anneka Gupta, Chief Product Officer at Rubrik. “They want certainty that no foreign entity, whether government or vendor, … More →
The post Rubrik introduces Security Cloud Sovereign for data sovereignty and regulatory compliance appeared first on Help Net Security.
New Kerberos Relay Attack Uses DNS CNAME to Bypass Mitigations – PoC Released
A critical flaw in Windows Kerberos authentication that significantly expands the attack surface for credential relay attacks in Active Directory environments. By abusing how Windows clients handle DNS CNAME responses during Kerberos service ticket requests, attackers can coerce systems into requesting tickets for attacker-controlled services, bypassing traditional protections. The Attack Vector The vulnerability centers on […]
The post New Kerberos Relay Attack Uses DNS CNAME to Bypass Mitigations – PoC Released appeared first on Cyber Security News.
Нейросети на зарплате у цензуры. РКН потратит 2 миллиарда, чтобы ИИ научился блокировать VPN автоматически
CVE-2026-1176 | itsourcecode School Management System 1.0 /subject/index.php ID sql injection
Outsourcing IT Support: Benefits, Risks, and Smart Next Steps
Learn the benefits, risks, and smart next steps of outsourcing IT support to improve efficiency, reduce costs, and scale securely.
The post Outsourcing IT Support: Benefits, Risks, and Smart Next Steps appeared first on Security Boulevard.