Aggregator
CVE-2012-0151 | Microsoft Windows 7/Server 2003/Server 2008/Vista/XP Windows Authenticode Signature Verification WinVerifyTrust Signature input validation (MS12-024 / Nessus ID 58656)
CVE-2015-4852 | Oracle WebLogic Server 10.3.6.0/12.1.2.0/12.1.3.0/12.2.1.0 WLS Security com.bea.core.apache.commons.collections.jar command injection (Exploit 152268 / EDB-42806)
CVE-2016-7193 | Microsoft Office up to 2016 memory corruption (MS16-121 / Nessus ID 94016)
CVE-2016-8735 | Apache Tomcat up to 6.0.47/7.0.72/8.0.38/8.5.6/9.0.0.M11 JmxRemoteLifecycleListener access control (Nessus ID 900019 / ID 169430)
CVE-2017-0146 | Microsoft Windows up to XP SP3 SMB input validation (MS17-010 / EDB-41891)
CVE-2015-4852 | Oracle StorageTek Tape Analytics SW Tool up to 2.2.0 WebLogic Server command injection (EDB-42806 / Nessus ID 87432)
CVE-2016-8735 | Oracle Database Server 12.2.0.1 WLM access control (Nessus ID 900019 / ID 169430)
CVE-2010-0232 | Microsoft Windows up to XP SP3 NtVdmControl access control (MS10-015 / Nessus ID 44425)
CVE-2013-1347 | Microsoft Internet Explorer 8 'vtable' code injection (Advisory 2847140 / EDB-25294)
CVE-2013-6282 | Linux Kernel up to 3.5.4 on ARM v6k/v7 API Function get_user/put_user input validation (QCIR-2013-00010-1 / EDB-31574)
Secure by Design and Secure by Default: Why you need both for AppSec
The relationship between the two software security initiatives promoted by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) can be misunderstood. Sometimes Secure by Design and Secure by Default are even pitted against each other. The reality is, though, that they are complementary approaches to security.
The post Secure by Design and Secure by Default: Why you need both for AppSec appeared first on Security Boulevard.
RansomHub
DEF CON 32 – Hacker Vs. AI Perspectives From An Ex-Spy
Author/Presenter: Harriet Farlow
Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel.
The post DEF CON 32 – Hacker Vs. AI Perspectives From An Ex-Spy appeared first on Security Boulevard.
CVE-2025-0444 | Google Chrome up to 132.0.6834.159 Skia use after free (ID 390889 / Nessus ID 214952)
Cybercriminals Court Traitorous Insiders via Ransom Notes
CVE-2024-11004 | Ivanti Connect Secure/Policy Secure up to 22.7R2.0 cross site scripting (Nessus ID 211455)
Chinese 'Infrastructure Laundering' Abuses AWS, Microsoft Cloud
Cyberhaven: A Wake-Up Call for Consent Phishing Risks | Grip
Explore how the Cyberhaven attack exposes the dangers of 'consent phishing', a tactic that bypasses even robust security measures like MFA.
The post Cyberhaven: A Wake-Up Call for Consent Phishing Risks | Grip appeared first on Security Boulevard.