Aggregator
Lynx
3 months 2 weeks ago
cohenido
INC
3 months 2 weeks ago
cohenido
Medusa Blog
3 months 2 weeks ago
cohenido
CVE-2025-0315 | ollama up to 0.3.14 allocation of resources (Nessus ID 233434)
3 months 2 weeks ago
A vulnerability has been found in ollama up to 0.3.14 and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to allocation of resources.
This vulnerability is known as CVE-2025-0315. The attack can be launched remotely. There is no exploit available.
vuldb.com
CVE-2025-0317 | ollama up to 0.3.14 GGUF Model File ggufPadding divide by zero (Nessus ID 233434)
3 months 2 weeks ago
A vulnerability has been found in ollama up to 0.3.14 and classified as problematic. This vulnerability affects the function ggufPadding of the component GGUF Model File Handler. The manipulation leads to divide by zero.
This vulnerability was named CVE-2025-0317. The attack can be initiated remotely. There is no exploit available.
vuldb.com
CVE-2020-8565 | Kubernetes up to 1.17.12/1.18.9/1.19.2/1.20.0-alpha1 Token log file (Nessus ID 233448)
3 months 2 weeks ago
A vulnerability, which was classified as problematic, was found in Kubernetes up to 1.17.12/1.18.9/1.19.2/1.20.0-alpha1. This affects an unknown part of the component Token Handler. The manipulation leads to sensitive information in log files.
This vulnerability is uniquely identified as CVE-2020-8565. The attack needs to be approached locally. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2025-27933 | Mattermost up to 9.11.8/10.3.3/10.4.2 Channel Conversion authorization (Nessus ID 233453)
3 months 2 weeks ago
A vulnerability was found in Mattermost up to 9.11.8/10.3.3/10.4.2 and classified as critical. Affected by this issue is some unknown functionality of the component Channel Conversion Handler. The manipulation leads to incorrect authorization.
This vulnerability is handled as CVE-2025-27933. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2025-30179 | Mattermost up to 9.11.8/10.3.3/10.4.2 MFA authorization (Nessus ID 233450)
3 months 2 weeks ago
A vulnerability was found in Mattermost up to 9.11.8/10.3.3/10.4.2. It has been classified as problematic. This affects an unknown part of the component MFA. The manipulation leads to incorrect authorization.
This vulnerability is uniquely identified as CVE-2025-30179. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2025-27715 | Mattermost up to 9.11.8/10.4.x Permalink authorization (Nessus ID 233451)
3 months 2 weeks ago
A vulnerability was found in Mattermost up to 9.11.8/10.4.x. It has been declared as problematic. This vulnerability affects unknown code of the component Permalink Handler. The manipulation leads to incorrect authorization.
This vulnerability was named CVE-2025-27715. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2025-24920 | Mattermost up to 9.11.8/10.3.3/10.4.2/10.5.0 Archived Channel authorization (Nessus ID 233452)
3 months 2 weeks ago
A vulnerability was found in Mattermost up to 9.11.8/10.3.3/10.4.2/10.5.0. It has been rated as problematic. This issue affects some unknown processing of the component Archived Channel Handler. The manipulation leads to incorrect authorization.
The identification of this vulnerability is CVE-2025-24920. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2025-25274 | Mattermost up to 9.11.8/10.3.3/10.4.2 Archived Channel authorization (Nessus ID 233455)
3 months 2 weeks ago
A vulnerability classified as critical has been found in Mattermost up to 9.11.8/10.3.3/10.4.2. Affected is an unknown function of the component Archived Channel Handler. The manipulation leads to incorrect authorization.
This vulnerability is traded as CVE-2025-25274. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2025-25068 | Mattermost up to 9.11.8/10.3.3/10.4.2/10.5.0 Plugin Endpoint missing authentication (Nessus ID 233454)
3 months 2 weeks ago
A vulnerability classified as critical was found in Mattermost up to 9.11.8/10.3.3/10.4.2/10.5.0. Affected by this vulnerability is an unknown functionality of the component Plugin Endpoint. The manipulation leads to missing authentication.
This vulnerability is known as CVE-2025-25068. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2025-22228 | Vmware Spring Security up to 6.4.3 Long Password BCryptPasswordEncoder.matches improper authentication (Nessus ID 233464)
3 months 2 weeks ago
A vulnerability was found in Vmware Spring Security up to 6.4.3. It has been rated as critical. This issue affects the function BCryptPasswordEncoder.matches of the component Long Password Handler. The manipulation leads to improper authentication.
The identification of this vulnerability is CVE-2025-22228. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
Nir Zuk: Google's Multi-Cloud Security Strategy Won't Work
3 months 2 weeks ago
Palo Alto Networks CTO Nir Zuk predicts Google's security push through its $32 billion buy of Wiz won't succeed, as customers are reluctant to buy multi-cloud tools from cloud vendors. Zuk details how adversaries use LLMs at scale and how Palo Alto is unifying SOC tools under its Cortex platform.
How Enterprises Can Mitigate the Quiet Threat of Shadow AI
3 months 2 weeks ago
C-Suite Strategies for AI Risk Management, Data Protection
Shadow artificial intelligence has shifted from being an outlier to a workplace staple, bringing risks of data breaches, regulatory violations and expanded attack surface on corporate networks. Shadow AI doesn't just introduce unapproved software: it consumes corporate data to function.
Shadow artificial intelligence has shifted from being an outlier to a workplace staple, bringing risks of data breaches, regulatory violations and expanded attack surface on corporate networks. Shadow AI doesn't just introduce unapproved software: it consumes corporate data to function.
Revenue Cycle Management Firm Hack Affects Patients, Clients
3 months 2 weeks ago
Incident Spotted in March 2024 Is Yet Another Attack Against Medical Billing Firms
A Nebraska-based firm that provides revenue cycle management and billing services to healthcare firms is notifying tens of thousands of people and an undisclosed number of companies that their personal, health and financial information was compromised in a March 2024 hack.
A Nebraska-based firm that provides revenue cycle management and billing services to healthcare firms is notifying tens of thousands of people and an undisclosed number of companies that their personal, health and financial information was compromised in a March 2024 hack.
ISMG Editors: Ransomware's Stealth vs. Spectacle Tactics
3 months 2 weeks ago
Also: Rapid7's Boardroom Shake-Up, China's Tactical Cyber Shift
In this week's update, ISMG editors unpacked stealth vs. spectacle in ransomware attacks, Rapid7's boardroom shake-up led by activist investors and China's shift from cyberespionage to infrastructure sabotage - driving key shifts in global cybersecurity strategy and resilience.
In this week's update, ISMG editors unpacked stealth vs. spectacle in ransomware attacks, Rapid7's boardroom shake-up led by activist investors and China's shift from cyberespionage to infrastructure sabotage - driving key shifts in global cybersecurity strategy and resilience.
Speed vs. Security: the Digi Bank Dilemma
3 months 2 weeks ago
Jason Costain on Ways Traditional and Digital Banks Could Learn from Each Other
Digital-only banks promise speed and sleek digital experiences but are not the best places to handle scam victims. Without branches to visit, victims find themselves stuck in a loop of chatbots, said Jason Costain, former head of fraud analytics and threat management at NatWest Group.
Digital-only banks promise speed and sleek digital experiences but are not the best places to handle scam victims. Without branches to visit, victims find themselves stuck in a loop of chatbots, said Jason Costain, former head of fraud analytics and threat management at NatWest Group.
Nir Zuk: Google's Multi-Cloud Security Strategy Won't Work
3 months 2 weeks ago
Palo Alto Networks CTO Nir Zuk predicts Google's security push through its $32 billion buy of Wiz won't succeed, as customers are reluctant to buy multi-cloud tools from cloud vendors. Zuk details how adversaries use LLMs at scale and how Palo Alto is unifying SOC tools under its Cortex platform.