‼ CVE-2023-3812 ‼
📖 Read
via "National Vulnerability Database".
An out-of-bounds memory access flaw was found in the Linux kernel’s TUN/TAP device driver functionality in how a user generates a malicious (too big) networking packet when napi frags is enabled. This flaw allows a local user to crash or potentially escalate their privileges on the system.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-3750 ‼
📖 Read
via "National Vulnerability Database".
A flaw was found in libvirt. The virStoragePoolObjListSearch function does not return a locked pool as expected, resulting in a race condition and denial of service when attempting to lock the same object from another thread. This issue could allow clients connecting to the read-only socket to crash the libvirt daemon.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-38200 ‼
📖 Read
via "National Vulnerability Database".
A flaw was found in Keylime. Due to their blocking nature, the Keylime registrar is subject to a remote denial of service against its SSL connections. This flaw allows an attacker to exhaust all available connections.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-3870 ‼
📖 Read
via "National Vulnerability Database".
** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-32248 ‼
📖 Read
via "National Vulnerability Database".
A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the handling of SMB2_TREE_CONNECT and SMB2_QUERY_INFO commands. The issue results from the lack of proper validation of a pointer prior to accessing it. An attacker can leverage this vulnerability to create a denial-of-service condition on the system.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-2860 ‼
📖 Read
via "National Vulnerability Database".
An out-of-bounds read vulnerability was found in the SR-IPv6 implementation in the Linux kernel. The flaw exists within the processing of seg6 attributes. The issue results from the improper validation of user-supplied data, which can result in a read past the end of an allocated buffer. This flaw allows a privileged local user to disclose sensitive information on affected installations of the Linux kernel.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-33951 ‼
📖 Read
via "National Vulnerability Database".
A race condition vulnerability was found in the vmwgfx driver in the Linux kernel. The flaw exists within the handling of GEM objects. The issue results from improper locking when performing operations on an object. This flaw allows a local privileged user to disclose information in the context of the kernel.📖 Read
via "National Vulnerability Database".
❤1
🦿 Hardware-bound passkeys are still ultimate in security: Yubico VP 🦿
📖 Read
via "Tech Republic".
Derek Hanson, Yubico’s VP of standards and alliances and an industry expert on passkeys, discusses why device-bound-to-shareable passkeys are critical.📖 Read
via "Tech Republic".
TechRepublic
Hardware-bound passkeys are still ultimate in security: Yubico VP
Derek Hanson, Yubico’s VP of standards and alliances and an industry expert on passkeys, discusses why device-bound-to-shareable passkeys are critical.
‼ CVE-2023-3321 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability exists by allowing low-privileged users to read and update the data in various directories used by the Zenon system. An attacker could exploit the vulnerability by using specially craftedprograms to exploit the vulnerabilities by allowing them to run on the zenon installed hosts.This issue affects ABB Abilityâ„¢ zenon: from 11 build through 11 build 106404.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-3324 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability exists by allowing low-privileged users to read and update the data in various directories used by the Zenon system. An attacker could exploit the vulnerability by using specially craftedprograms to exploit the vulnerabilities by allowing them to run on the zenon installed hosts.This issue affects ABB Abilityâ„¢ zenon: from 11 build through 11 build 106404.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-26077 ‼
📖 Read
via "National Vulnerability Database".
Atera Agent through 1.8.3.6 on Windows Creates a Temporary File in a Directory with Insecure Permissions.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-3323 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability exists by allowing low-privileged users to read and update the data in various directories used by the Zenon system. An attacker could exploit the vulnerability by using specially craftedprograms to exploit the vulnerabilities by allowing them to run on the zenon installed hosts.This issue affects ABB Abilityâ„¢ zenon: from 11 build through 11 build 106404.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-3322 ‼
📖 Read
via "National Vulnerability Database".
A vulnerability exists by allowing low-privileged users to read and update the data in various directories used by the Zenon system. An attacker could exploit the vulnerability by using specially craftedprograms to exploit the vulnerabilities by allowing them to run on the zenon installed hosts.This issue affects ABB Abilityâ„¢ zenon: from 11 build through 11 build 106404.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-34478 ‼
📖 Read
via "National Vulnerability Database".
Apache Shiro, before 1.12.0 or 2.0.0-alpha-3, may be susceptible to a path traversal attack that results in an authentication bypass when used together with APIs or other web frameworks that route requests based on non-normalized requests.Mitigation:Â Update to Apache Shiro 1.12.0+ or 2.0.0-alpha-3+📖 Read
via "National Vulnerability Database".
‼ CVE-2023-37613 ‼
📖 Read
via "National Vulnerability Database".
A cross-site scripting (XSS) vulnerability in Assembly Software Trialworks v11.4 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the asset src parameter.📖 Read
via "National Vulnerability Database".
🦿 How to Easily Block IP Addresses From Accessing a Desktop or Server 🦿
📖 Read
via "Tech Republic".
In this How to Make Tech Work tutorial, Jack Wallen shows how to add another layer of security to your Linux machines with just two files.📖 Read
via "Tech Republic".
TechRepublic
How to Easily Block IP Addresses From Accessing a Desktop or Server
In this How to Make Tech Work tutorial, Jack Wallen shows how to add another layer of security to your Linux machines with just two files.
🦿 Independent Ada Lovelace Institute Asks UK Government to Firm up AI Regulation Proposals 🦿
📖 Read
via "Tech Republic".
While the United Nations hashes out regulations, the UK’s ‘context-based’ approach is intended to spur innovation but may cause uncertainty in the industry.📖 Read
via "Tech Republic".
TechRepublic
Independent Ada Lovelace Institute Asks UK Government to Firm up AI Regulation Proposals
While the United Nations hashes out regulations, the UK’s ‘context-based’ approach is intended to spur innovation but may cause uncertainty in the industry.
🦿 How to Easily Block IP Addresses From Accessing a Desktop or Server 🦿
📖 Read
via "Tech Republic".
In this How to Make Tech Work tutorial, Jack Wallen shows how to add another layer of security to your Linux machines with just two files.📖 Read
via "Tech Republic".
TechRepublic
How to Block IP Addresses From Accessing a Desktop or Server in Linux
In this How to Make Tech Work tutorial, Jack Wallen shows how to add another layer of security to your Linux machines with just two files.
‼ CVE-2021-39421 ‼
📖 Read
via "National Vulnerability Database".
A cross-site scripting (XSS) vulnerability in SeedDMS v6.0.15 allows attackers to execute arbitrary web scripts or HTML via a crafted payload.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-20593 ‼
📖 Read
via "National Vulnerability Database".
An issue in “Zen 2â€� CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.📖 Read
via "National Vulnerability Database".
🦿 OpenAI, Google and More Agree to White House List of Eight AI Safety Assurances 🦿
📖 Read
via "Tech Republic".
Assurances include watermarking, reporting about capabilities and risks, investing in safeguards to prevent bias and more. 📖 Read
via "Tech Republic".
TechRepublic
IBM, Salesforce Pledge to White House List of Eight AI Safety Assurances
Assurances include watermarking, reporting about capabilities and risks and investing in safeguards to prevent bias.