Aggregator
CVE-2024-26775 | Linux Kernel up to 6.1.79/6.6.18/6.7.6 aoe set_capacity deadlock (Nessus ID 227916 / WID-SEC-2024-0773)
CVE-2024-26774 | Linux Kernel up to 5.15.149/6.1.79/6.6.18/6.7.6 ext4 mb_update_avg_fragment_size divide by zero (Nessus ID 210815 / WID-SEC-2024-0773)
CVE-2024-26771 | Linux Kernel up to 5.10.210/5.15.149/6.1.79/6.6.18/6.7.6 dmaengine devm_kasprintf null pointer dereference (WID-SEC-2024-0773)
CVE-2024-26772 | Linux Kernel up to 6.7.6 ext4_mb_find_by_goal memory corruption (Nessus ID 207689 / WID-SEC-2024-0773)
CVE-2007-1989 | DotClear 1.2.5 tool_url cross site scripting (EDB-29838 / XFDB-33616)
CVE-2007-2288 | Doruk100.net info.php file inclusion (EDB-29914 / XFDB-33923)
CVE-2007-6574 | Dokeos Open Source Learning And Knowledge Management Tool forum/viewthread.php cross site scripting (EDB-30925 / BID-26992)
CVE-2025-30406
CVE-2024-26770 | Linux Kernel up to 6.6.18/6.7.6 nvidia-shield devm_kasprintf null pointer dereference (83527a13740f/e71cc4a1e584/b6eda11c44dc / WID-SEC-2024-0773)
CVE-2024-26769 | Linux Kernel up to 5.15.149/6.1.79/6.6.18/6.7.6 nvmet-fc nvmet_wq deadlock (Nessus ID 207773 / WID-SEC-2024-0773)
CVE-2024-26768 | Linux Kernel up to 6.6.18/6.7.6 LoongArch stack-based overflow (88e189bd16e5/0f6810e39898/4551b30525cf / WID-SEC-2024-0773)
CVE-2024-26767 | Linux Kernel up to 6.6.18/6.7.6 display infinite loop (71783d1ff652/beea9ab9080c/0484e05d048b / Nessus ID 208720)
CVE-2024-26766 | Linux Kernel up to 6.7.6 hfi1 sdma.h off-by-one (Nessus ID 209075 / WID-SEC-2024-0773)
CVE-2024-26765 | Linux Kernel up to 6.1.79/6.6.18/6.7.6 LoongArch kernel/rcu/tree.c: init_fn stack-based overflow (WID-SEC-2024-0773)
CVE-2024-26764 | Linux Kernel up to 6.7.6 aio kiocb_set_cancel_fn privilege escalation (Nessus ID 239865 / WID-SEC-2024-0773)
CVE-2024-26763 | Linux Kernel up to 6.7.6 dm-crypt memory corruption (Nessus ID 210696 / WID-SEC-2024-0773)
Stay Proactive: Secure Your Cloud Identities
Does Your Cloud Security Truly Address Non-Human Identities? Every organization wishes for a robust cybersecurity strategy, but have you ever wondered if yours truly addresses non-human identities (NHIs)? This essential, often overlooked element in your security infrastructure plays a crucial role in protecting your data. With your organization navigates cloud security, you need to lay […]
The post Stay Proactive: Secure Your Cloud Identities appeared first on Entro.
The post Stay Proactive: Secure Your Cloud Identities appeared first on Security Boulevard.
Controlling NHIs: Strategy for Modern Security
Why is NHI Management so Crucial in Modern Security Strategies? Where the utilization of machine identities is becoming increasingly commonplace, it’s essential to ask: How prominent is NHI management in shaping modern security strategies? Directly addressing this question paves the way for understanding how Non-Human Identities (NHIs) and Secrets Security Management play a pivotal role. […]
The post Controlling NHIs: Strategy for Modern Security appeared first on Entro.
The post Controlling NHIs: Strategy for Modern Security appeared first on Security Boulevard.
Are Your Security Measures Capable Enough?
How Effective are Your Cybersecurity Measures? Is your organization taking the adequate security measures to protect itself from digital threats? With digital becomes increasingly sophisticated, so too does cybersecurity. For businesses operating in the cloud, Non-Human Identities (NHIs) and Secrets management is emerging as a potent tool for enhancing protection and minimizing risk. The Imperative […]
The post Are Your Security Measures Capable Enough? appeared first on Entro.
The post Are Your Security Measures Capable Enough? appeared first on Security Boulevard.