CVE-2018-3622
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any...
CVE-2018-3618
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any...
CVE-2018-3614
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any...
USN-5919-1: Linux kernel vulnerabilities
It was discovered that the Upper Level Protocol (ULP) subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain...
USN-5920-1: Linux kernel vulnerabilities
It was discovered that the Upper Level Protocol (ULP) subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain...
TPM 2.0 Library Vulnerabilities May Affect Billions of IoT Devices
The disclosed flaws occurred when handling malicious TPM 2.0 commands with encrypted parameters Read More
HPE to acquire Axis Security to deliver a unified SASE offering
Hewlett Packard Enterprise has agreed to buy cloud security services provider Axis Security, its third acquistion since January, to deliver a unified secure access service...
Nick Weaver on Regulating Cryptocurrency
Nicholas Weaver wrote an excellent paper on the problems of cryptocurrencies and the need to regulate the space—with all existing regulations. His conclusion: Regulators, especially...
USN-5918-1: Linux kernel (BlueField) vulnerabilities
It was discovered that the NFSD implementation in the Linux kernel did not properly handle some RPC messages, leading to a buffer overflow. A remote...
New Backdoor MQsTTang Attributed to Mustang Panda Group
Unlike the group’s usual tactics, MQsTTang only has a single stage and does not use obfuscation Read More