Aggregator
CVE-2024-55570 | Cubro EXA48200 Network Packet Broker 20231025055018 HTTP PUT Request /api/user/users access control (EUVD-2025-5579)
CVE-2025-27370 | OpenID Connect up to 1.0 errata set 2 private_key_jwt authorization (EUVD-2025-5571)
CVE-2025-27371 | OpenID Connect IETF OAuth 2.0 authorization (EUVD-2025-5567)
CVE-2025-27590 | Oxidized Web Project up to 0.14.x RANCID Migration Page path traversal (EUVD-2025-5558)
CVE-2025-26206 | StoreFront 1.0 index.html cross-site request forgery (EUVD-2025-5544)
CVE-2025-25967 | Acora CMS 10.1.1 cross-site request forgery (EUVD-2025-5547)
CVE-2025-25939 | Reprise License Manager 14.2 /goform/activate_process akey cross site scripting (EUVD-2025-5546)
CVE-2025-27219 | CGI Gem up to 0.3.6/0.4.1 on Ruby Cookie CGI::Cookie.parse allocation of resources (EUVD-2025-5556 / Nessus ID 232142)
CVE-2008-4212 | Apple Mac OS X 10.4.11 Access Restriction config (Nessus ID 34374 / ID 115983)
CVE-2008-4214 | Apple Mac OS X 10.4.11 access control (Nessus ID 34374 / ID 115983)
CVE-2008-3647 | Apple Mac OS X 10.4.11 psnormalizer memory corruption (Nessus ID 34374 / ID 115983)
CVE-2008-4211 | Apple Mac OS X up to 1.1.0 Office Viewer numeric error (Nessus ID 34374 / ID 115983)
CVE-2008-3646 | Apple Mac OS X 10.5.5 Configuration File race condition (HT3216 / Nessus ID 34374)
N0PSctf
Date: May 31, 2025, 8 a.m. — 01 June 2025, 20:00 UTC [add to calendar]
Format: Jeopardy
On-line
Offical URL: https://ctf.nops.re/
Rating weight: 24.34
Event organizers: NOPS
Finding Stability in Cloud-Native Security Solutions
How Critical is Stability in Cloud-Native Security? Stability is an essential aspect of a reliable cloud-native security strategy. Do you ever question, how can a company ensure stability? The answer lies with Non-Human Identities (NHIs) and Secrets Security Management. NHIs: The Unsung Heroes of Cloud Security Cloud-native security solutions rely heavily on machine identities, also […]
The post Finding Stability in Cloud-Native Security Solutions appeared first on Entro.
The post Finding Stability in Cloud-Native Security Solutions appeared first on Security Boulevard.
Securing IoT Devices in the Enterprise Challenges and Solutions
As enterprises embrace digital transformation, the proliferation of Internet of Things (IoT) devices—from smart sensors and cameras to industrial control systems—has revolutionized operations and data collection. However, this rapid adoption has created complex security challenges, exposing organizations to new and evolving cyber threats. The Expanding Attack Surface The integration of IoT devices into enterprise networks […]
The post Securing IoT Devices in the Enterprise Challenges and Solutions appeared first on Cyber Security News.