ZDI-22-525: (Pwn2Own) Netatalk get_finderinfo Out-Of-Bounds Read Information Disclosure Vulnerability
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Netatalk. Authentication is not required to exploit this vulnerability. Read More
ZDI-22-526: (Pwn2Own) Netatalk copyapplfile Stack-based Buffer Overflow Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Netatalk. Authentication is not required to exploit this vulnerability. Read More
ZDI-22-527: (Pwn2Own) Netatalk parse_entries Improper Handling of Exceptional Conditions Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Netatalk. Authentication is not required to exploit this vulnerability. Read More
ZDI-22-528: (Pwn2Own) Netatalk getdirparams Out-Of-Bounds Read Information Disclosure Vulnerability
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Netatalk. Authentication is not required to exploit this vulnerability. Read More
ZDI-22-529: (Pwn2Own) Netatalk setfilparams Stack-based Buffer Overflow Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Netatalk. Authentication is not required to exploit this vulnerability. Read More
ZDI-22-530: (Pwn2Own) Netatalk ad_addcomment Stack-based Buffer Overflow Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Netatalk. Authentication is not required to exploit this vulnerability. Read More
Windstream Enterprise launches managed SASE with Cato Networks
Windstream Enterprise, a managed communications service company, is launching a comprehensive, managed secure access service edge (SASE) solution in partnership with cloud-native SASE provider Cato...
USN-5343-1: Linux kernel vulnerabilities
Yiqi Sun and Kevin Wang discovered that the cgroups implementation in the Linux kernel did not properly restrict access to the cgroups v1 release_agent feature....
New Guidance to Secure Election Management System Machines
A new CIS Benchmark was created to offer added protection for election management system gateway machines. Read More
Background Check Company Sued Over Data Breach
Four parallel lawsuits filed against Creative Services Inc over alleged data security failings Read More