Regulator Warns Breaches Can Cost Lives
ICO says handling of domestic abuse victims’ data must improve Read More
USN-6398-1: ReadyMedia vulnerabilities
It was discovered that ReadyMedia was vulnerable to DNS rebinding attacks. A remote attacker could possibly use this issue to trick the local DLNA server...
Attacks on European Financial Services Double in a Year
Region also experiences most DDoS events Read More
NCSC Launches Cyber Incident Exercise Scheme
UK security agency opens scheme to certify assured providers Read More
gdb-13.2-3.fc37
FEDORA-2023-8d0913f986 Packages in this update: gdb-13.2-3.fc37 Update description: Security fix for CVE-2022-48064, Backport upstream commit 8f2c64de86b which fixes RHBZ 2233961, Read More
ZDI-23-1468: (0Day) Exim NTLM Challenge Out-Of-Bounds Read Information Disclosure Vulnerability
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Exim. Authentication is not required to exploit this vulnerability. Read More
ZDI-23-1469: (0Day) Exim AUTH Out-Of-Bounds Write Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Exim. Authentication is not required to exploit this vulnerability. Read More
ZDI-23-1470: (0Day) Exim SMTP Challenge Stack-based Buffer Overflow Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Exim. Authentication is not required to exploit this vulnerability. Read More
ZDI-23-1471: (0Day) Exim Improper Neutralization of Special Elements Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Exim. Authentication is not required to exploit this vulnerability. Read More
ZDI-23-1472: (0Day) Exim libspf2 Integer Underflow Remote Code Execution Vulnerability
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Exim libspf2. Authentication is not required to exploit this vulnerability. Read More