Aggregator
CVE-2024-42658 | Nepstech NTPL-XPON1GFEVN 1.0 information disclosure
CVE-2024-43250 | Bit Apps Bit Form Pro Plugin up to 2.6.4 on WordPress authorization
CVE-2024-43401 | xwiki-platform up to 15.9 privileges management (GHSA-f963-4cq8-2gw7)
CVE-2024-43400 | xwiki-platform up to 14.10.20/15.5.4/15.10.5 URL neutralization of directives (GHSA-wcg9-pgqv-xm5v)
CVE-2024-43248 | Bit Apps Bit Form Pro Plugin up to 2.6.4 on WordPress path traversal
CVE-2024-32928 | Google Nest Speakers libcurl certificate validation
CVE-2024-43232 | WP OnlineSupport Timeline and History Slider Plugin up to 2.3 on WordPress path traversal
CVE-2024-43256 | nouthemes Leopard Plugin up to 2.0.36 on WordPress authorization
Чем пахнет биткоин? ИИ-стартап раскрывает тайны цифровых ароматов
Ubuntu security advisory (AV24-464)
Researchers uncovered new infrastructure linked to the cybercrime group FIN7
Между законом и доступностью: Streameast обходит блокировки США
F5 security advisory (AV24-463)
Every Google Pixel Phone Has a Verizon App that Doubles As a Backdoor
Black Hat Fireside Chat: Why grasping the context of code is a recipe for keeping software secure
President Biden’s call for the mainstreaming of Software Bill of Materials (SBOMs) is a major step forward.
Related: Europe mandates resiliency
Requiring a formal inventory of all components, libraries and modules in all business applications can help lock down software … (more…)
The post Black Hat Fireside Chat: Why grasping the context of code is a recipe for keeping software secure first appeared on The Last Watchdog.
The post Black Hat Fireside Chat: Why grasping the context of code is a recipe for keeping software secure appeared first on Security Boulevard.
Северная Корея: от ракет до блокчейна — один большой стартап
Daniel Stori’s ‘The War For Port 80’
via the inimitable Daniel Stori at Turnoff.US!
The post Daniel Stori’s ‘The War For Port 80’ appeared first on Security Boulevard.
New Kubernetes Vulnerability Allows Attackers to Access Clusters Remotely
A critical vulnerability tracked as CVE-2024-7646, has been uncovered in the widely used ingress-nginx Kubernetes controller. The flaw allows attackers to bypass annotation validation, poses a significant risk to Kubernetes clusters, and demands immediate attention from security teams and cluster administrators. Security researcher André Storfjord Kristiansen (@dev-bio on GitHub) discovered the vulnerability in the way […]
The post New Kubernetes Vulnerability Allows Attackers to Access Clusters Remotely appeared first on Cyber Security News.