Aggregator
CVE-2019-10652 | flatCore 1.4.7 Addons Feature acp/acp.php PHP File unrestricted upload (Issue 38 / EDB-52165)
CVE-2023-20112 | Cisco Access Point Association Request denial of service (cisco-sa-ap-assoc-dos-D2SunWK2 / EUVD-2023-24291)
CVE-2003-0190 | Nokia IPSO 3.x OpenSSH information disclosure (EDB-25 / Nessus ID 20650)
CVE-2025-26528 | Moodle up to 4.1.15/4.3.9/4.4.5/4.5.1 Question Type cross site scripting (Nessus ID 253544)
CVE-2021-35368 | OWASP ModSecurity Core Rule Set up to 3.1.1/3.2.0/3.3.1 Pathname protection mechanism (Nessus ID 253545)
CVE-2025-8732 | libxml2 up to 2.14.5 xmlcatalog xmlParseSGMLCatalog recursion (Issue 958 / EUVD-2025-24001)
CVE-2025-8735 | GNU cflow up to 1.8 Lexer c.c yylex null pointer dereference (EUVD-2025-24014 / Nessus ID 253546)
CVE-2019-11387 | OWASP ModSecurity Core Rule Set up to up to 3.1.0 REQUEST-942-APPLICATION-ATTACK-SQLI.conf incorrect regex (ID 1359 / Nessus ID 253548)
CVE-2025-8736 | GNU cflow up to 1.8 Lexer c.c yylex buffer overflow (EUVD-2025-24013 / Nessus ID 253549)
Adapting to New Age Cyber Threats with NHIs?
Are Traditional Security Measures Enough? The advent of intelligent non-human identities (NHIs) has shifted cybersecurity, posing new challenges for organizations to overcome. Are traditional security measures, designed to protect human identities, adequate for safeguarding the influx of machine identities? Cyber threats seek out the weakest links in our security chains, and these often lie in […]
The post Adapting to New Age Cyber Threats with NHIs? appeared first on Entro.
The post Adapting to New Age Cyber Threats with NHIs? appeared first on Security Boulevard.
Feeling Assured with Your Secrets Scanning Tools?
Are your secrets scanning tools instilling confidence? Securing Non-Human Identities: A Vital Component of Cybersecurity Are your secrets scanning tools providing the assurance you need? With data protection becomes an ever-increasing concern, organizations are leveraging machine identities, known as Non-Human Identities (NHIs), to bolster security efforts. These identities are created by merging a ‘Secret’, an […]
The post Feeling Assured with Your Secrets Scanning Tools? appeared first on Entro.
The post Feeling Assured with Your Secrets Scanning Tools? appeared first on Security Boulevard.
Staying Calm with Effective Secrets Rotation?
Why Is Secrets Rotation Essential for a Calm Security Strategy? What if we told you that your company’s data security could be significantly improved by adopting a simple practice? Known as secrets rotation, this strategy has proven to be an effective measure in maintaining the integrity of non-human identities (NHIs) and enhancing a holistic cybersecurity […]
The post Staying Calm with Effective Secrets Rotation? appeared first on Entro.
The post Staying Calm with Effective Secrets Rotation? appeared first on Security Boulevard.