Log in to see all content. Some content is hidden to the public.
Can't find what you're looking for? Help us improve the search functionality by reporting the expected results.
1509 Results
High Vulnerabilities in Nvidia GPU Driver
Nvidia released security updates to address High vulnerabilities in the Nvidia GPU drivers. An attacker could exploit the most sever of these vulnerabilities to execute arbitrary code, access or tamper with data, escalate privileges, or cause a denial-of-service (DoS) condition.
Critical Vulnerability in PyTorch
Huntr reported a Critical vulnerability in PyTorch. An attacker could exploit this vulnerability to steal sensitive AI data.For a complete description of the vulnerabilities and affected systems go to PyTorch Distributed RPC Framework Remote Code Execution in pytorch/pytorch.IT Security
Vulnerability in PHP for Windows
PHP released a security update to address a vulnerability in PHP for Windows. An attacker could exploit this vulnerability to perform remote code execution (RCE).
Multiple High Vulnerabilities in Serv-U and the SolarWinds Platform
SolarWinds released security updates to address High vulnerabilities in Serv-U and the SolarWinds Platform.
Vulnerabilities in Android Devices
Google released its June Android update to address vulnerabilities in Android Devices.For a complete description of the vulnerabilities and affected systems go to Android Security Bulletin—June 2024.IT SecurityRead more about IT Security service offerings.
Critical Vulnerability with PoC and Other Vulnerability in Progress Telerik Report Servers
A security update was created to address a High PoC Available and other vulnerability affecting Progress Telerik Report Servers. A cyber threat actor could exploit these vulnerabilities to perform remote code execution (RCE).
High Vulnerability in Atlassian Confluence Server and Data Center
Atlassian has released security updates to address a High PoC Available vulnerability affecting Confluence Server and Data Center Instances. A cyber threat actor could exploit one of these vulnerabilities to perform remote code execution (RCE).
High Actively Exploited Vulnerability in Check Point Gateways
Check Point released security updates to address a High Actively Exploited Vulnerability in multiple Check Point products. Successful exploitation of this vulnerability could allow for credential access to local accounts due to an arbitrary file read vulnerability.
Actively Exploited Linux Kernel Vulnerability
CISA warned organizations of an actively exploited Linux Kernel Vulnerability. An attacker could exploit this vulnerability to escalate their privileges.For a complete description of the vulnerabilities and affected systems go to CVE-2024-1086.IT SecurityRead more about IT Security service offerings.
Steppingblocks
Description
Steppingblocks uses advanced data aggregation and processing techniques to gather career, academic, and demographic information from a vast array of publicly accessible sources.