SecPod Community Forums Topics

Viewing 15 topics - 37,351 through 37,365 (of 37,450 total)
    • Topic
    • Voices
    • Posts
    • Last Post
    • SecPod Cyber Bulletin 33rd Issue 1. Trellix Enterprise Security Manager Flaw A security flaw (CVE-2023-38545) in Trellix Enterprise Security Manager has been discovered, potentially exposing sensitive enterprise data. CVSS Score: 9.8 2. IBM Security Verify Vulnerabilities IBM’s Security Verify platform has been found with vario...1. Trellix Enterprise Security Manager Flaw A security flaw (CVE-2023-38545) in Trellix Enterprise Security Manager has been discovered, potentially exposing sensitive enterprise data. CVSS Score: 9.8 2. IBM Security Verify Vulnerabilities IBM’s Security Verify platform has been found with vario...

      Started by: Bhuvan Srikanta in: Cyber Bulletin

    • 1
    • 1
    • Bhuvan Srikanta

    • Easily Exploitable Hi, I need your help because, i not idea from Easily Exploitable and the porcent. The calculation at the moment is not very good vrs my higieneHi, I need your help because, i not idea from Easily Exploitable and the porcent. The calculation at the moment is not very good vrs my higiene

      Started by: yoyi24 in: General Discussions

    • 2
    • 2
    • Community Manager

    • Mac Updates Having issues with Mac updates, OS and Adobe in general. Anyone else having issues? Adobe updates keep failing, Mac OS updates seem like they never update until I get on a computer and manually tell it to update or restart. Adobe just keep failing, I then have to manually open adobe go to Help, then...Having issues with Mac updates, OS and Adobe in general. Anyone else having issues? Adobe updates keep failing, Mac OS updates seem like they never update until I get on a computer and manually tell it to update or restart. Adobe just keep failing, I then have to manually open adobe go to Help, then...

      Started by: SixAxis in: Ask an Expert

    • 2
    • 2
    • Community Manager

    • Macbook HostName Best practice for Macbook hosts: Scenarios: If your MacBook hostname is represented as an IP number other than a name, please ensure that you have set the Hostname, local Host Name, and ComputerName correctly. You can use the below commands: You can run all three at a time Note: Here I have taken ...Best practice for Macbook hosts: Scenarios: If your MacBook hostname is represented as an IP number other than a name, please ensure that you have set the Hostname, local Host Name, and ComputerName correctly. You can use the below commands: You can run all three at a time Note: Here I have taken ...

      Started by: lingaraj in: Ask an Expert

    • 2
    • 2
    • Community Manager

    • Patch repository creation for ubuntu 18,20,22 LTS Ubuntu ClientSide #!/bin/sh log_file="/var/log/create_sources_list.log" ip_address="192.168.2.50" # Replace with your desired IP address protocol="https" # Replace with your desired protocol (http/https) # Create a backup of the existing sources.list mv /etc/apt/sources.list /etc/apt/sources.list...Ubuntu ClientSide #!/bin/sh log_file="/var/log/create_sources_list.log" ip_address="192.168.2.50" # Replace with your desired IP address protocol="https" # Replace with your desired protocol (http/https) # Create a backup of the existing sources.list mv /etc/apt/sources.list /etc/apt/sources.list...

      Started by: Community Manager in: SanerScript

    • 1
    • 2
    • Community Manager

    • Patch repository creation for RHEL 8 and 9 RHEL 8 and 9 ClientSide #!/bin/bash # Specify the values ip_address="192.168.2.50" protocol="https" rhel_version="8" # Generate the repository configuration dynamically repo_filename="/etc/yum.repos.d/rhel${rhel_version}.repo" cat <<EOL > "$repo_filename" [RepoBaseOS] name = rhel-${rhel_...RHEL 8 and 9 ClientSide #!/bin/bash # Specify the values ip_address="192.168.2.50" protocol="https" rhel_version="8" # Generate the repository configuration dynamically repo_filename="/etc/yum.repos.d/rhel${rhel_version}.repo" cat <<EOL > "$repo_filename" [RepoBaseOS] name = rhel-${rhel_...

      Started by: Community Manager in: SanerScript

    • 1
    • 3
    • Community Manager

    • SecPod Cyber Bulletin 32nd Issue 1. Windows Zero-Days and Firefox Issues The RomCom group has been exploiting zero-day vulnerabilities (CVE-2024-9680 and CVE-2024-49039) in Windows and Firefox, emphasizing the need for continuous monitoring and timely updates. CVSS Score: 9.8,8.8 2. Critical Flaw Detected in ProjectSend A criti...1. Windows Zero-Days and Firefox Issues The RomCom group has been exploiting zero-day vulnerabilities (CVE-2024-9680 and CVE-2024-49039) in Windows and Firefox, emphasizing the need for continuous monitoring and timely updates. CVSS Score: 9.8,8.8 2. Critical Flaw Detected in ProjectSend A criti...

      Started by: Bhuvan Srikanta in: Cyber Bulletin

    • 1
    • 1
    • Bhuvan Srikanta

    • Patch repository creation for RHEL 7 RHEL_7 ClientSide #!/bin/bash # Specify the values ip_address="192.168.2.60" protocol="https" rhel_version="7" # Generate the repository configuration dynamically repo_filename="/etc/yum.repos.d/rhel${rhel_version}_custom.repo" cat <<EOL > "$repo_filename" [RepoMainrepo] name = rhel-${rh...RHEL_7 ClientSide #!/bin/bash # Specify the values ip_address="192.168.2.60" protocol="https" rhel_version="7" # Generate the repository configuration dynamically repo_filename="/etc/yum.repos.d/rhel${rhel_version}_custom.repo" cat <<EOL > "$repo_filename" [RepoMainrepo] name = rhel-${rh...

      Started by: Community Manager in: SanerScript

    • 1
    • 2
    • Community Manager

    • CVE-2024-52799 : Argo Workflow Charts Vulnerability Prior to Argo Workflows 0.44.0, the workflow-role granted excessive privileges, including pod/exec creation, enabling arbitrary code execution. This vulnerability was fixed in version 0.44.0, affecting Helm Chart users. CVSS SCORE: 8.3Prior to Argo Workflows 0.44.0, the workflow-role granted excessive privileges, including pod/exec creation, enabling arbitrary code execution. This vulnerability was fixed in version 0.44.0, affecting Helm Chart users. CVSS SCORE: 8.3

      Started by: Bhuvan Srikanta in: Critical Vulnerability and Exploit Exchange

    • 1
    • 1
    • Bhuvan Srikanta

Viewing 15 topics - 37,351 through 37,365 (of 37,450 total)