Security
Headlines
HeadlinesLatestCVEs

Tag

#ssl

CVE-2023-28233: Windows Secure Channel Denial of Service Vulnerability

**Does this vulnerability affect all versions of TLS?** No. Only those devices running TLS 1.3 are affected. For more information on supported TLS implementations please visit: https://learn.microsoft.com/en-us/windows/win32/secauthn/protocols-in-tls-ssl--schannel-ssp-

Microsoft Security Response Center
#vulnerability#web#windows#microsoft#dos#auth#ssl#Windows Secure Channel#Security Vulnerability
Sielco PolyEco Digital FM Transmitter 2.0.6 'polyeco' Session Hijacking

The Cookie 'polyeco' is of an insufficient length and can be exploited by brute force, which may allow a remote attacker to obtain a valid session, bypass authentication and manipulate the transmitter. The session is also visible in an HTTP GET request and there is the lack of SSL in use, allowing MitM attacks.

CVE-2018-25084: Added html escaping to help with XSS. Added frame busting to help wit… · pingidentity/ssam@f64b10d

A vulnerability, which was classified as problematic, has been found in Ping Identity Self-Service Account Manager 1.1.2. Affected by this issue is some unknown functionality of the file src/main/java/com/unboundid/webapp/ssam/SSAMController.java. The manipulation leads to cross site scripting. The attack may be launched remotely. Upgrading to version 1.1.3 is able to address this issue. The name of the patch is f64b10d63bb19ca2228b0c2d561a1a6e5a3bf251. It is recommended to upgrade the affected component. VDB-225362 is the identifier assigned to this vulnerability.

Debian Security Advisory 5384-1

Debian Linux Security Advisory 5384-1 - Multiple security vulnerabilities have been discovered in OpenImageIO, a library for reading and writing images. Buffer overflows and out-of-bounds read and write programming errors may lead to a denial of service (application crash) or the execution of arbitrary code if a malformed image file is processed.

How and Why to Put Multicloud to Work

Complex multicloud environments present organizations with security challenges, but also opportunities for efficiency.

Red Hat Security Advisory 2023-1670-01

Red Hat Security Advisory 2023-1670-01 - The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.

Protecting your business with Wazuh: The open source security platform

Today, businesses face a variety of security challenges like cyber attacks, compliance requirements, and endpoint security administration. The threat landscape constantly evolves, and it can be overwhelming for businesses to keep up with the latest security trends. Security teams use processes and security solutions to curb these challenges. These solutions include firewalls, antiviruses, data

What is Cloud Mining and How Does it Work?

By Owais Sultan Cloud mining is a way for you to purchase mining power from a remote data centre. Cloud mining… This is a post from HackRead.com Read the original post: What is Cloud Mining and How Does it Work?

CVE-2023-30450: Comparing v23.1.1...v23.1.2 · redpanda-data/redpanda

rpk in Redpanda before 23.1.2 mishandles the redpanda.rpc_server_tls field, leading to (for example) situations in which there is a data type mismatch that cannot be automatically fixed by rpk, and instead a user must reconfigure (while a cluster is turned off) in order to have TLS on broker RPC ports. NOTE: the fix was also backported to the 22.2 and 22.3 branches.