Aggregator
CVE-2024-9619 | WP SHAPES Plugin up to 1.0.0 on WordPress SVG File Upload cross site scripting
CVE-2024-11775 | Particle Background Plugin up to 1.0.2 on WordPress cross site scripting
CVE-2024-55196 | GoPhish 0.12.1 Mail Server Configuration insufficiently protected credentials
CVE-2024-12506 | NACC Plugin up to 4.1.0 on WordPress cross site scripting
CVE-2024-9503 | Maintenance & Coming Soon Redirect Animation Plugin Setting authorization
CVE-2024-11784 | Sell Tickets Online Plugin up to 3.0.2 on WordPress cross site scripting
CVE-2024-11297 | Page Restriction Plugin up to 1.3.6 on WordPress information disclosure
CVE-2020-6923 | HP Linux Imaging and Printing Software buffer overflow
CVE-2024-54150 | xmidt-org cjwt up to 2.2.x JSON Web Token alg signature verification
CVE-2024-56200 | nexryai altair prior 12.24Q4.1 Image Proxy resource consumption
CVE-2024-52897 | IBM MQ Appliance 9.3 CD/9.3 LTS/9.4 LTS information exposure
CVE-2021-22501 | OpenText Operations Bridge Manager up to 2020.10 xml external entity reference
CVE-2024-49336 | IBM Security Guardium 11.5 server-side request forgery
CVE-2024-52896 | IBM MQ Appliance 9.3 CD/9.3 LTS/9.4 CD/9.4 LTS information exposure
CVE-2024-51471 | IBM MQ Appliance 9.3 CD/9.3 LTS/9.4 LTS Trace out-of-bounds
Android malware found on Amazon Appstore disguised as health app
What Is Privilege Escalation? Types, Examples, and Prevention
Privilege escalation is a critical cybersecurity threat in which a user—usually a malicious actor—gains access to data beyond what their account permissions allow. Attackers can gain this access through human error, stolen credentials, or social engineering.
The post What Is Privilege Escalation? Types, Examples, and Prevention appeared first on Security Boulevard.
Detection as Code: Key Components, Tools, and More
As software development accelerates, the need to identify threats and respond in real time is greater than ever. Detection as Code (DaC) allows you to write, maintain, and automate your threat detection logic as if it were software code, making security a built-in part of the development pipeline.
The post Detection as Code: Key Components, Tools, and More appeared first on Security Boulevard.