Aggregator
CVE-2021-47407 | Linux Kernel up to 5.10.70/5.14.9 KVM init_srcu_struct initialization (deb294941767/4664318f73e4/eb7511bf9182 / WID-SEC-2024-1197)
CVE-2021-47406 | Linux Kernel up to 5.10.70/5.14.9 ext4_ext_replay_set_iblocks infinite loop (a63474dbf692/27e10c5d31ff/1fd95c05d8f7 / WID-SEC-2024-1197)
CVE-2021-47403 | Linux Kernel up to 5.14.9 ipoctal memory leak (WID-SEC-2024-1197)
CVE-2021-47404 | Linux Kernel up to 5.14.9 HID betop_probe out-of-bounds write (Nessus ID 235794 / WID-SEC-2024-1197)
CVE-2021-47381 | Linux Kernel up to 5.14.9 ASoC hex_dump_to_buffer buffer overflow (a6bb576ead07/ac4dfccb9657 / WID-SEC-2024-1197)
CVE-2021-47377 | Linux Kernel up to 4.14.248/4.19.208/5.4.149/5.10.69/5.14.8 balloon denial of service (WID-SEC-2024-1197)
DragonForce
You must login to view this content
CVE-2012-4992 | FlashFXP 4.2 FlashFXP.exe memory corruption (EDB-18555 / Nessus ID 60111)
CVE-2012-5106 | FreeFloat FTP Server 1.0 memory corruption (EDB-22351 / XFDB-79810)
CVE-2012-2288 | EMC NetWorker 7.6.3/7.6.4/8.0 format string (EDB-22525 / ID 121194)
CVE-2012-0874 | Red Hat JBoss Enterprise up to 5.1.9 JMXInvokerHAServlet improper authentication (Bug#795645 / EDB-30211)
CVE-2012-5357 | EPiServer Ektron CMS up to 8.02 SP4 XSL Data ekajaxtransform.aspx XslCompiledTransform data processing (EDB-23155 / Nessus ID 63245)
CVE-2023-20081 | Cisco ASA/Firepower Threat Defense/IOS/IOS XE IPv6 DHCP Client denial of service (cisco-sa-asaftdios-dhcpv6-cli-Zf3zTv / EUVD-2023-24260)
System Shocks? EV Smart Charging Tech Poses Cyber-Risks
Scattered Spider Member Sentenced to a Decade in Prison
Qilin
You must login to view this content
Staying Proactive in Managing Cloud Permissions?
Is Your Organization Fully Leveraging the Benefits of Proactive Cloud Permissions Management? Organizations today increasingly acknowledge the significance of robust cybersecurity strategies in safeguarding their invaluable assets. One aspect of such strategies that is nonetheless often overlooked is the management of Non-Human Identities (NHIs) and their secrets. NHIs, which are essential machine identities in cybersecurity, […]
The post Staying Proactive in Managing Cloud Permissions? appeared first on Entro.
The post Staying Proactive in Managing Cloud Permissions? appeared first on Security Boulevard.
Pushing Innovation with Secure Machine Identities
Can We Truly Innovate Without Security? It’s an intriguing question, isn’t it? We’ve often seen technological leaps and bounds happening when there is a focus on innovation. Yet, without the underlying cradle of security, the innovative genius loses its strength. We delve into the strategic importance of secure machine identities, a crucial aspect that is […]
The post Pushing Innovation with Secure Machine Identities appeared first on Entro.
The post Pushing Innovation with Secure Machine Identities appeared first on Security Boulevard.