CVE-2017-20180 (libzerocoin)
A vulnerability classified as critical has been found in Zerocoin libzerocoin. Affected is the function CoinSpend::CoinSpend of the file CoinSpend.cpp of the component Proof Handler....
What is firewall optimization?
Firewall optimization (also known as firewall analysis) is the process of analyzing and adjusting the configuration and policy set of a firewall to improve performance...
City of Oakland Faces Major Data Leak
Information was stolen during recent ransomware attack Read More
Tracking device technology: A double-edged sword for CISOs
The transportation industry has doubled down in the area of fleet tracking in recent years, which has come with great benefits and not a few...
UK Government Plans Skills Boost for Public Sector Fraud Fight
Focus will be on enhancing prevention and identification skills Read More
FTC Proposes $7.8m Fine for BetterHelp
Online counseling service shared health data Read More
CVE-2015-10093 (mark_user_as_spammer)
A vulnerability was found in Mark User as Spammer Plugin 1.0.0/1.0.1. It has been declared as problematic. Affected by this vulnerability is the function user_row_actions...
CVE-2015-10092 (qtranslate_slug)
A vulnerability was found in Qtranslate Slug Plugin up to 1.1.16. It has been classified as problematic. Affected is the function add_slug_meta_box of the file...
CVE-2015-10091
A vulnerability has been found in ByWater Solutions bywater-koha-xslt and classified as critical. This vulnerability affects the function StringSearch of the file admin/systempreferences.pl. The manipulation...
CVE-2015-10090
A vulnerability, which was classified as problematic, has been found in Landing Pages Plugin up to 1.8.7. Affected by this issue is some unknown functionality....