Aggregator
CVE-2002-0147 | Microsoft IIS 4.0/5.0/5.1 ASP Data Transfer memory corruption (VU#669779 / Nessus ID 10935)
PoC Exploit Released for TP-Link Code Execution Vulnerability (CVE-2024-54887)
A serious code execution vulnerability in the TP-Link TL-WR940N router, identified as CVE-2024-54887, has become the focus of intense scrutiny following the release of a proof-of-concept (PoC) exploit. This vulnerability allows attackers to execute arbitrary code on the device remotely without authentication, posing significant risks to network security. The following article provides an overview of […]
The post PoC Exploit Released for TP-Link Code Execution Vulnerability (CVE-2024-54887) appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2010-3657 | Adobe Acrobat Reader up to 8.2.4 denial of service (RHSA-2010:0743 / Nessus ID 49172)
CVE-2010-3656 | Adobe Acrobat Reader up to 8.2.4 denial of service (RHSA-2010:0743 / Nessus ID 49172)
CVE-2010-3632 | Adobe Acrobat Reader up to 8.2.4 memory corruption (RHSA-2010:0743 / Nessus ID 49172)
CVE-2010-2931 | Topazsystems Sigplus Pro Activex Control 3.74 ActiveX Control LCDWriteString eighth memory corruption (EDB-14514 / Nessus ID 51894)
CVE-2010-2892 | LANDesk Management Gateway up to 4.0-1.48 gsb/drivers.php DRIVES input validation (EDB-15488 / ID 12446)
FreeBuf早报 | 中国与多国联合解救7万电诈受害者;德国驻美大使密电遭到泄露
CVE-2010-2937 | VideoLAN VLC Media Player up to 1.1.2 taglib.cpp ReadMetaFromId3v2 input validation (Nessus ID 48334 / ID 118383)
CVE-2010-2958 | phpMyAdmin up to 3.3.5.1 Error Message cross site scripting (Nessus ID 57433 / ID 12415)
CVE-2010-2991 | Citrix Online Plug-in 11.1 ActiveX Object code injection (Nessus ID 48275 / ID 118497)
CVE-2010-3055 | phpMyAdmin up to 2.11.10.0 setup.php access control (Nessus ID 48908 / ID 12489)
Staying Ahead: Key Cloud-Native Security Practices
Staying Ahead: Key Cloud-Native Security Practices
Can Effective Non-Human Identities and Secrets Management Bolster Your Cloud-Native Security Practices? The revolution in technology has seen a significant shift in business operations, with many organizations adopting cloud-native applications. These applications offer various benefits, including scalability, versatility, and cost-efficiency. However, they also open a Pandora’s box of security threats. In the sea of these […]
The post Staying Ahead: Key Cloud-Native Security Practices appeared first on Entro.
The post Staying Ahead: Key Cloud-Native Security Practices appeared first on Security Boulevard.
Getting Better: Advances in Secrets Rotation Tech
Getting Better: Advances in Secrets Rotation Tech
Why is Secrets Rotation Technology Crucial in the Data Security Landscape? The safety of sensitive information matters more than ever. With the proliferation of Non-Human Identities (NHIs) and a marked increase in cyber threats, the management of these identities is an integral part of the data management ecosystem. This is where Secrets Rotation technology shines, […]
The post Getting Better: Advances in Secrets Rotation Tech appeared first on Entro.
The post Getting Better: Advances in Secrets Rotation Tech appeared first on Security Boulevard.