Aggregator
CVE-2023-44487 | Oracle Communications Network Analytics Data Director 23.2.0.0.2/23.3.0.0.0 Install/Upgrade denial of service (Nessus ID 211529)
CVE-2023-44487 | Oracle Communications Network Analytics Data Director 23.2.0.0.2/23.3.0.0.0 Third Party denial of service (Nessus ID 211529)
CVE-2023-44487 | Oracle Coherence 12.2.1.4.0/14.1.1.0.0 Third Party denial of service (Nessus ID 211529)
CVE-2023-44487 | Oracle Coherence 12.2.1.4.0/14.1.1.0.0 Third Party denial of service (Nessus ID 211529)
信息安全漏洞周报(2024年第47期)
CNNVD关于Apache OFBiz安全漏洞的通报
CNNVD关于Palo Alto Networks PAN-OS 安全漏洞的通报
Exabeam and Wiz join forces to improve cloud security
Exabeam coolaborates with with Wiz to provide organizations with improved threat detection, investigation, and response (TDIR) capabilities, ensuring a more secure and resilient cloud environment. With its open architecture the Exabeam New-Scale Security Operations Platform supports a best-of-breed ecosystem that includes hundreds of product integrations to accelerate time-to-value and strengthen on-premises and cloud security. “As organizations embrace cloud environments, the surge in cyberattacks is unprecedented, and visibility alone is not enough. Exabeam and Wiz are … More →
The post Exabeam and Wiz join forces to improve cloud security appeared first on Help Net Security.
Trend Micro Deep Security Vulnerable to Command Injection Attacks
Trend Micro has released a critical update addressing a remote code execution (RCE) vulnerability (CVE-2024-51503) in its Trend Micro Deep Security 20 Agent. This vulnerability, identified as a manual scan command injection flaw, allows attackers to execute arbitrary code on affected machines, potentially leading to privilege escalation across the domain. This vulnerability affects the manual […]
The post Trend Micro Deep Security Vulnerable to Command Injection Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2023-44487 | Oracle Communications Cloud Native Core Unified Data Repository Signaling denial of service (Nessus ID 211529)
CVE-2023-44487 | Oracle Communications Network Analytics Data Director 23.2.0.0.2/23.3.0.0.0 General denial of service (Nessus ID 211529)
CVE-2023-44487 | Oracle Communications Cloud Native Core Unified Data Repository Signaling denial of service (Nessus ID 211529)
CVE-2024-26636 | Linux Kernel up to 6.7.2 net/core/skbuff.c llc_ui_sendmsg denial of service (Nessus ID 211624)
CVE-2023-52612 | Linux Kernel up to 6.7.1 crypto buffer overflow (Nessus ID 211624)
CVE-2024-44942 | Linux Kernel up to 6.6.46/6.10.5 fs/f2fs/inline.c f2fs_bug_on information disclosure (ae00e6536a2d/26c07775fb5d/fc01008c92f4 / Nessus ID 211624)
CVE-2023-52578 | Linux Kernel up to 6.5.5 bridge DEV_STATS_INC information disclosure (Nessus ID 211624)
CVE-2022-48938 | Linux Kernel up to 5.10.102/5.15.25/5.16.11 CDC-NCM buffer overflow (Nessus ID 211624)
Arkose Device ID detects suspicious activity patterns
Arkose Labs launched Arkose Device ID, a device identification solution that raises the bar in fraud detection by combining precise device tracking with session-based risk signals and anti-spoofing technology. Arkose Device ID is designed to address the growing sophistication of cyber threats, which are impacting businesses globally with increasing frequency and intensity. In a new research report, Arkose Labs found that more than 70% of enterprises cite identity-based attacks—including fake account creation and account takeovers … More →
The post Arkose Device ID detects suspicious activity patterns appeared first on Help Net Security.