Viewing 15 topics - 37,351 through 37,365 (of 37,450 total)
-
- Topic
- Voices
- Last Post
-
-
SecPod Cyber Bulletin 33rd Issue 1. Trellix Enterprise Security Manager Flaw A security flaw (CVE-2023-38545) in Trellix Enterprise Security Manager has been discovered, potentially exposing sensitive enterprise data. CVSS Score: 9.8 2. IBM Security Verify Vulnerabilities IBM’s Security Verify platform has been found with vario...1. Trellix Enterprise Security Manager Flaw A security flaw (CVE-2023-38545) in Trellix Enterprise Security Manager has been discovered, potentially exposing sensitive enterprise data. CVSS Score: 9.8 2. IBM Security Verify Vulnerabilities IBM’s Security Verify platform has been found with vario...
- 1
-
Easily Exploitable Hi, I need your help because, i not idea from Easily Exploitable and the porcent. The calculation at the moment is not very good vrs my higieneHi, I need your help because, i not idea from Easily Exploitable and the porcent. The calculation at the moment is not very good vrs my higiene
- 2
-
Integration with ticket systems Does the service have any integration with some ticket systems?Does the service have any integration with some ticket systems?
- 3
-
Mac Updates Having issues with Mac updates, OS and Adobe in general. Anyone else having issues? Adobe updates keep failing, Mac OS updates seem like they never update until I get on a computer and manually tell it to update or restart. Adobe just keep failing, I then have to manually open adobe go to Help, then...Having issues with Mac updates, OS and Adobe in general. Anyone else having issues? Adobe updates keep failing, Mac OS updates seem like they never update until I get on a computer and manually tell it to update or restart. Adobe just keep failing, I then have to manually open adobe go to Help, then...
- 2
-
Macbook HostName Best practice for Macbook hosts: Scenarios: If your MacBook hostname is represented as an IP number other than a name, please ensure that you have set the Hostname, local Host Name, and ComputerName correctly. You can use the below commands: You can run all three at a time Note: Here I have taken ...Best practice for Macbook hosts: Scenarios: If your MacBook hostname is represented as an IP number other than a name, please ensure that you have set the Hostname, local Host Name, and ComputerName correctly. You can use the below commands: You can run all three at a time Note: Here I have taken ...
- 2
-
Patch repository creation for ubuntu 18,20,22 LTS Ubuntu ClientSide #!/bin/sh log_file="/var/log/create_sources_list.log" ip_address="192.168.2.50" # Replace with your desired IP address protocol="https" # Replace with your desired protocol (http/https) # Create a backup of the existing sources.list mv /etc/apt/sources.list /etc/apt/sources.list...Ubuntu ClientSide #!/bin/sh log_file="/var/log/create_sources_list.log" ip_address="192.168.2.50" # Replace with your desired IP address protocol="https" # Replace with your desired protocol (http/https) # Create a backup of the existing sources.list mv /etc/apt/sources.list /etc/apt/sources.list...
- 1
-
Patch repository creation for RHEL 8 and 9 RHEL 8 and 9 ClientSide #!/bin/bash # Specify the values ip_address="192.168.2.50" protocol="https" rhel_version="8" # Generate the repository configuration dynamically repo_filename="/etc/yum.repos.d/rhel${rhel_version}.repo" cat <<EOL > "$repo_filename" [RepoBaseOS] name = rhel-${rhel_...RHEL 8 and 9 ClientSide #!/bin/bash # Specify the values ip_address="192.168.2.50" protocol="https" rhel_version="8" # Generate the repository configuration dynamically repo_filename="/etc/yum.repos.d/rhel${rhel_version}.repo" cat <<EOL > "$repo_filename" [RepoBaseOS] name = rhel-${rhel_...
- 1
-
SecPod Cyber Bulletin 32nd Issue 1. Windows Zero-Days and Firefox Issues The RomCom group has been exploiting zero-day vulnerabilities (CVE-2024-9680 and CVE-2024-49039) in Windows and Firefox, emphasizing the need for continuous monitoring and timely updates. CVSS Score: 9.8,8.8 2. Critical Flaw Detected in ProjectSend A criti...1. Windows Zero-Days and Firefox Issues The RomCom group has been exploiting zero-day vulnerabilities (CVE-2024-9680 and CVE-2024-49039) in Windows and Firefox, emphasizing the need for continuous monitoring and timely updates. CVSS Score: 9.8,8.8 2. Critical Flaw Detected in ProjectSend A criti...
- 1
-
CVE-2024-45710 : SolarWinds Uncontrolled Path Element Escalation Vulnerability SolarWinds Platform is susceptible to an Uncontrolled Search Path Element Local Privilege Escalation vulnerability. This requires a low-privilege account and local access to the affected node machine. CVSS SCORE: 7.8 (HIGH)SolarWinds Platform is susceptible to an Uncontrolled Search Path Element Local Privilege Escalation vulnerability. This requires a low-privilege account and local access to the affected node machine. CVSS SCORE: 7.8 (HIGH)
- 1
-
CVE-2024-9486 : Kubernetes Image Builder Security Vulnerability Some Kubernetes Image Builder versions have a security vulnerability where default credentials remain active, potentially allowing root access in clusters using VM images from the Proxmox provider. CVSS SCORE : 9.8 (Critical)Some Kubernetes Image Builder versions have a security vulnerability where default credentials remain active, potentially allowing root access in clusters using VM images from the Proxmox provider. CVSS SCORE : 9.8 (Critical)
- 1
-
Patch repository creation for RHEL 7 RHEL_7 ClientSide #!/bin/bash # Specify the values ip_address="192.168.2.60" protocol="https" rhel_version="7" # Generate the repository configuration dynamically repo_filename="/etc/yum.repos.d/rhel${rhel_version}_custom.repo" cat <<EOL > "$repo_filename" [RepoMainrepo] name = rhel-${rh...RHEL_7 ClientSide #!/bin/bash # Specify the values ip_address="192.168.2.60" protocol="https" rhel_version="7" # Generate the repository configuration dynamically repo_filename="/etc/yum.repos.d/rhel${rhel_version}_custom.repo" cat <<EOL > "$repo_filename" [RepoMainrepo] name = rhel-${rh...
- 1
-
CVE-2024-52799 : Argo Workflow Charts Vulnerability Prior to Argo Workflows 0.44.0, the workflow-role granted excessive privileges, including pod/exec creation, enabling arbitrary code execution. This vulnerability was fixed in version 0.44.0, affecting Helm Chart users. CVSS SCORE: 8.3Prior to Argo Workflows 0.44.0, the workflow-role granted excessive privileges, including pod/exec creation, enabling arbitrary code execution. This vulnerability was fixed in version 0.44.0, affecting Helm Chart users. CVSS SCORE: 8.3
- 1
-
CVE-2024-53912 : Veritas Enterprise Vault Vulnerability A #vulnerability in Veritas Enterprise Vault (before 15.2), ZDI-CAN-24341, allows remote attackers to execute arbitrary code via deserialization of untrusted data on a .NET Remoting TCP port. CVSS SCORE: 9.8(CRITICAL)A #vulnerability in Veritas Enterprise Vault (before 15.2), ZDI-CAN-24341, allows remote attackers to execute arbitrary code via deserialization of untrusted data on a .NET Remoting TCP port. CVSS SCORE: 9.8(CRITICAL)
- 1
-
CVE-2024-53674 : HPE Insight Remote Support Vulnerability An XML external entity injection (XXE) vulnerability in HPE Insight Remote Support may allow remote users to disclose information in certain cases. CVSS SCORE: 7.3 (HIGH)An XML external entity injection (XXE) vulnerability in HPE Insight Remote Support may allow remote users to disclose information in certain cases. CVSS SCORE: 7.3 (HIGH)
- 1
-
CVE-2024-11789 : Fuji Electric Vulnerability The Fuji Electric Monitouch V-SFT V10 contains a stack-based buffer overflow #vulnerability (ZDI-CAN-24448) in the parsing of V10 files, allowing remote code execution. CVSS SCORE: 7.8 (HIGH)The Fuji Electric Monitouch V-SFT V10 contains a stack-based buffer overflow #vulnerability (ZDI-CAN-24448) in the parsing of V10 files, allowing remote code execution. CVSS SCORE: 7.8 (HIGH)
- 1
-