Aggregator
CVE-2021-30499 | libcaca export.c export_troff buffer overflow (Nessus ID 242883)
CVE-2021-24119 | ARM Mbed TLS 2.24.0 BASE64 PEM File Decoding information exposure (Nessus ID 240979)
CVE-2021-3426 | Python up to 3.8.8/3.9.2/3.10.0a6 pydoc information disclosure (Nessus ID 211991)
CVE-2021-3426 | Oracle Communications Cloud Native Core Binding Support Function information disclosure (Nessus ID 211991)
CVE-2021-3426 | Oracle Communications Cloud Native Core Network Function Cloud Native Environment Configuration information disclosure (Nessus ID 211991)
CVE-2021-32739 | Icinga up to 2.11.9/2.12.4 API access control (Nessus ID 211508)
CVE-2021-32743 | Icinga up to 2.11.9/2.12.4 API permission (Nessus ID 211508)
CVE-2021-36976 | libarchive up to 3.5.1 copy_string use after free (Nessus ID 210823)
CVE-2021-36084 | SELinux 3.2 CIL Compiler __cil_verify_classperms use after free (Nessus ID 209513)
CVE-2021-36085 | SELinux 3.2 CIL Compiler __cil_verify_classperms use after free (Nessus ID 209513)
CVE-2021-36086 | SELinux 3.2 cil_reset_classpermission use after free (Nessus ID 209513)
CVE-2021-36087 | SELinux 3.2 CIL Compiler ebitmap_match_any heap-based overflow (Nessus ID 209513)
Stytch Alternatives for Passwordless Authentication
Compare the best Stytch alternatives for passwordless authentication after the Twilio acquisition. Developer-first analysis of MojoAuth, SSOJet, Auth0, WorkOS, Supabase Auth and Clerk — features, pricing and integration insights.
The post Stytch Alternatives for Passwordless Authentication appeared first on Security Boulevard.
Stytch Alternatives for Passwordless Authentication
Cloud Triage: Luminaut Tool Maps Exposed AWS/GCP Assets for Rapid Security Investigation
Luminaut is a utility to scope cloud environment exposure for triage. The goal is to quickly identify exposed
The post Cloud Triage: Luminaut Tool Maps Exposed AWS/GCP Assets for Rapid Security Investigation appeared first on Penetration Testing Tools.
跟一位日本比亚迪车主聊了聊,才明白我们对「出海」有多天真
跟一位日本比亚迪车主聊了聊,才明白我们对「出海」有多天真
Invisible Hijack: New Agent Session Smuggling Attack Forces AI to Buy Stock Silently
Experts from Palo Alto Networks Unit 42 have described a new attack vector targeting multi-agent systems, known as
The post Invisible Hijack: New Agent Session Smuggling Attack Forces AI to Buy Stock Silently appeared first on Penetration Testing Tools.
Kernel in a Browser: Linux Ported to WebAssembly Runs Directly in Chrome
Developer Joel Severin has unveiled an experimental build of the Linux kernel ported to the WebAssembly format, enabling
The post Kernel in a Browser: Linux Ported to WebAssembly Runs Directly in Chrome appeared first on Penetration Testing Tools.