-
Protecting Your Digital Assets: Mastering the Landscape of Information Security
Information security is an unwavering guardian of organizations’ most valuable asset—information. The information security landscape is multifaceted, encompassing many practices that shield sensitive data from the relentless onslaught of cyber…
-
Microsoft Windows JPEG Component Buffer Overflow
Affected systems This vulnerability affects the followingDefault Microsoft Windows operating systems: Microsoft Windows XP and Microsoft Windows XP Service Pack 1 Microsoft Windows XP 64-bit Edition Service Pack 1 Microsoft…
-
Vulnerability in Microsoft image processing component
Affected systems Applications that process JPEG images in Microsoft Windows, includingbut not limited to Internet Explorer Microsoft Office Microsoft Visual Studio Imagine it! Non-Microsoft applications Preview An attacker might be…
-
Vulnerabilities in MIT Kerberos 5
Affected systems MIT Kerberos 5 versions prior to krb5-1.3.5 Applications that use versions of the MIT Kerberos 5 libraries earlier than krb5-1.3.5 Applications containing code derived from MIT Kerberos 5…
-
Several vulnerabilities in Oracle products
Affected systems The following Oracle applications are affected: Oracle Database 10g version 1, release 10.1.0.2 Oracle9i Database Server version 2, versions 9.2.0.4 and 9.2.0.5 Oracle9i Database Server version 1, versions…
Search
Recent Posts
- CISA adds two known exploited vulnerabilities to its catalog
- Vulnerability in Dell RecoverPoint for Virtual Machines could allow arbitrary code execution
- Multiple vulnerabilities in Ivanti Endpoint Manager Mobile could allow remote code execution
- A vulnerability in the WatchGuard Fireware operating system could allow arbitrary code execution.










