Aggregator
CVE-2025-23296 | NVIDIA Isaac-GR00T N1 Python code injection
CVE-2017-3248 | Oracle WebLogic Server 10.3.6.0/12.1.3.0/12.2.1.0/12.2.1.1 Core Components Remote Code Execution (EDB-44998 / Nessus ID 96610)
CVE-2021-35393 | Realtek Jungle SDK up to 3.4.14B WiFi Simple Config Server stack-based overflow
CVE-2021-35392 | Realtek Jungle SDK up to 3.4.14B WiFi Simple Config Server heap-based overflow
CVE-2023-34298 | Ivanti Pulse Secure Client SetupService path traversal
CVE-2023-51551 | Foxit PDF Reader AcroForm Signature use after free (ZDI-23-1873)
CVE-2023-51549 | Foxit PDF Reader AcroForm Doc Object use after free (ZDI-23-1863)
CVE-2023-51550 | Foxit PDF Reader combobox out-of-bounds (ZDI-23-1864)
CVE-2024-20344 | Cisco Unified Computing System 6400/6500 Intersight Managed Mode resource consumption (cisco-sa-ucsfi-imm-syn-p6kZTDQC)
CVE-2024-20354 | Cisco Aironet Access Point cleanup (cisco-sa-airo-ap-dos-PPPtcVW)
CVE-2024-31047 | Academy Software Foundation OpenEXR up to 3.2.3 exrmultipart.cpp convert denial of service (Issue 1680 / Nessus ID 242802)
CVE-2023-42124 | Avast Premium Security sandbox (ZDI-23-1475)
CVE-2023-32157 | Tesla Model 3 4.23/2020.4.10/2022.16.0.3/2022.28/2023.12 bsa_server heap-based overflow
CVE-2003-0466 | BSD Libc up to 10.2.6 realpath off-by-one (VU#743092 / EDB-22976)
Rethinking Embedded IoT Security: Why Traditional IT Protections Fall Short
In an era where billions of connected devices form the nervous system of critical infrastructure, embedded IoT systems have become prime targets for cybercriminals, particularly given their enormous collective attack surface. IoT Analytics projects that the number of connected IoT devices will reach 18.8 billion by the end of 2024, up from approximately 16.6 billion..
The post Rethinking Embedded IoT Security: Why Traditional IT Protections Fall Short appeared first on Security Boulevard.
От 70% до 13%: Google улучшил защиту ядра Linux, но она всё ещё замедляет систему
Futurum Signal: Real-Time Market Intelligence for Cyber Defenders
In cybersecurity, speed is survival. When adversaries are moving at machine speed—launching AI-powered attacks, exploiting zero-days within hours of disclosure, and shifting tactics on the fly—you can’t afford to be making decisions based on a report that’s three months old. And yet, that’s exactly what much of the security industry has been doing for decades—relying..
The post Futurum Signal: Real-Time Market Intelligence for Cyber Defenders appeared first on Security Boulevard.