Aggregator
CVE-2025-26852 | DESCOR INFOCAD up to 3.5.1 sql injection
CVE-2024-57440 | D-Link DSL-3788 revA1 1.01R1B036_EU_EN COMM_MAKECustomMsg buffer overflow
CVE-2025-29215 | Tenda AX12 22.03.01.46 SetNetControlList sub_43fdcc stack-based overflow
CVE-2025-29149 | Tenda i12 1.0.0.10(3805) formSetAutoPing ping1 buffer overflow
CVE-2024-36904
CVE-2025-2538 | Esri Portal for ArcGIS 10.9.1/11.1/11.2/11.3/11.4 Password Recovery hard-coded credentials
CVE-2025-30334 | OpenBSD up to 7.5 Errata 014/7.6 Errata 005 wg buffer size
CVE-2025-29217 | Tenda W18E 16.01.0.11 HTTP POST Request /goform/setModules wifiSSID stack-based overflow
CVE-2025-29218 | Tenda W18E 16.01.0.11 HTTP POST Request /goform/setModules wifiPwd stack-based overflow
CVE-2025-29922 | kcp up to 0.26.2 improper authorization (GHSA-w2rr-38wv-8rrp)
CVE-2025-29980 | CentralSquare eTRAKiT.Net 3.2.1.77 sql injection
CVE-2025-30160 | redlib up to 0.35.x Decompression restore_preferences resource consumption (GHSA-g8vq-v3mg-7mrg)
CVE-2025-29923 | go-redis up to 9.5.4/9.6.2/9.7.2 input validation (GHSA-92cp-5422-2mw7)
CVE-2024-7598 | Kubernetes kube-apiserver 1.3.0 race condition (Issue 126587)
CVE-2025-29914 | corazawaf coraza up to 3.3.2 REQUEST_FILENAME name resolution (GHSA-q9f5-625g-xm39)
What challenges should I expect when adding NHIs to an IAM framework?
Are NHIs the missing piece in your IAM framework puzzle? Securing an Identity and Access Management (IAM) framework is an essential piece of the cybersecurity puzzle. But have you considered the role that Non-Human Identities (NHIs) play? If not, you could be leaving your organization vulnerable to breaches. Many companies focus solely on human identities […]
The post What challenges should I expect when adding NHIs to an IAM framework? appeared first on Entro.
The post What challenges should I expect when adding NHIs to an IAM framework? appeared first on Security Boulevard.
How do I manage access controls for NHIs within an IAM system?
Navigating Non-Human Identity Access Control in IAM Systems Is your organization struggling to manage Non-Human Identities (NHIs) within an IAM system effectively? NHIs are often overlooked, yet they play a vital role in maintaining system integrity and reducing cybersecurity threats. A robust Identity and Access Management (IAM) system is an essential component of a comprehensive […]
The post How do I manage access controls for NHIs within an IAM system? appeared first on Entro.
The post How do I manage access controls for NHIs within an IAM system? appeared first on Security Boulevard.