Aggregator
Mobile device hardening: A forensic comparison of advanced protection programmes in IOS and Android
2 days 4 hours ago
SANS Digital Forensics and Incident Response
Home automation and IoT as a source of evidence: Forensic analysis of Home Assistant
2 days 4 hours ago
SANS Digital Forensics and Incident Response
Tool: The only ‘Kanvas’ you need when spreadsheets fail your IR case management
2 days 4 hours ago
SANS Digital Forensics and Incident Response
When the threat group doesn’t leave: Incident response under fire
2 days 4 hours ago
SANS Digital Forensics and Incident Response
Identity Risk Scoring Only Works If Attribution Is Defensible
2 days 4 hours ago
Identity risk scoring has become a critical input for fraud prevention, security operations, and trust decisions. Organizations increasingly rely on risk scores to decide when to step up authentication, block access, or flag activity for investigation. But despite widespread adoption, many identity risk programs struggle with the same problem: Risk scores are generated, but teams …
The post Identity Risk Scoring Only Works If Attribution Is Defensible appeared first on Security Boulevard.
Jason Wagner
CVE-2023-46301 | iTerm2 up to 3.4.19 unrestricted upload (EUVD-2023-50524)
2 days 4 hours ago
A vulnerability was found in iTerm2 up to 3.4.19. It has been classified as critical. The impacted element is an unknown function. Performing a manipulation results in unrestricted upload.
This vulnerability is cataloged as CVE-2023-46301. It is possible to initiate the attack remotely. There is no exploit available.
Upgrading the affected component is recommended.
vuldb.com
CVE-2023-46303 | calibre up to 6.18.x html_input.py link_to_local_path server-side request forgery (EUVD-2023-50525)
2 days 4 hours ago
A vulnerability labeled as problematic has been found in calibre up to 6.18.x. This issue affects the function link_to_local_path of the file ebooks/conversion/plugins/html_input.py. Executing a manipulation can lead to server-side request forgery.
This vulnerability appears as CVE-2023-46303. The attacker needs to be present on the local network. There is no available exploit.
The affected component should be upgraded.
vuldb.com
CVE-2023-46307 | etc-browser 87ae63d75260 Web Server server.js path traversal (EUVD-2023-50529)
2 days 4 hours ago
A vulnerability was found in etc-browser 87ae63d75260 and classified as critical. This issue affects some unknown processing of the file server.js of the component Web Server. Executing a manipulation can lead to relative path traversal.
This vulnerability is registered as CVE-2023-46307. It is possible to launch the attack remotely. No exploit is available.
vuldb.com
CVE-2023-46306 | NetModule Router Software prior 4.6.0.106/4.8.0.101 Web Administration Interface /admin/gnssAutoAlign.php cleanup device_id os command injection (EUVD-2023-50528)
2 days 4 hours ago
A vulnerability was found in NetModule Router Software and classified as critical. This impacts the function cleanup of the file /admin/gnssAutoAlign.php of the component Web Administration Interface. Executing a manipulation of the argument device_id can lead to os command injection.
This vulnerability is tracked as CVE-2023-46306. The attack is only possible within the local network. No exploit exists.
It is suggested to upgrade the affected component.
vuldb.com
CVE-2023-46315 | zanllp sd-webui-infinite-image-browsing Gradio Authentication /file path information disclosure (Issue 387 / 977815a)
2 days 4 hours ago
A vulnerability was found in zanllp sd-webui-infinite-image-browsing. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /file of the component Gradio Authentication. This manipulation of the argument path causes information disclosure.
This vulnerability is registered as CVE-2023-46315. Remote exploitation of the attack is possible. No exploit is available.
It is suggested to install a patch to address this issue.
vuldb.com
CVE-2023-46300 | iTerm2 up to 3.4.19 tmux escape output (EUVD-2023-50523)
2 days 4 hours ago
A vulnerability was found in iTerm2 up to 3.4.19 and classified as critical. The affected element is an unknown function of the component tmux. Such manipulation leads to escaping of output.
This vulnerability is listed as CVE-2023-46300. The attack may be performed from remote. There is no available exploit.
It is suggested to upgrade the affected component.
vuldb.com
CVE-2025-71119 | Linux Kernel up to 6.1.159/6.6.119/6.12.63/6.18.2/6.19-rc2 add_cpu denial of service (Nessus ID 298924 / WID-SEC-2026-0119)
2 days 4 hours ago
A vulnerability categorized as critical has been discovered in Linux Kernel up to 6.1.159/6.6.119/6.12.63/6.18.2/6.19-rc2. This affects the function add_cpu. Such manipulation leads to denial of service.
This vulnerability is referenced as CVE-2025-71119. The attack needs to be initiated within the local network. No exploit is available.
It is advisable to upgrade the affected component.
vuldb.com
CVE-2026-22976 | Linux Kernel up to 6.19-rc4 qdisc_get null pointer dereference (Nessus ID 298924 / WID-SEC-2026-0184)
2 days 4 hours ago
A vulnerability marked as critical has been reported in Linux Kernel up to 6.19-rc4. Affected is the function qdisc_get. The manipulation leads to null pointer dereference.
This vulnerability is listed as CVE-2026-22976. The attack must be carried out from within the local network. There is no available exploit.
It is suggested to upgrade the affected component.
vuldb.com
CVE-2025-71108 | Linux Kernel up to 6.1.159/6.6.119/6.12.63/6.18.2 usb num_connectors state issue (Nessus ID 298924 / WID-SEC-2026-0119)
2 days 4 hours ago
A vulnerability described as critical has been identified in Linux Kernel up to 6.1.159/6.6.119/6.12.63/6.18.2. This vulnerability affects unknown code of the component usb. Executing a manipulation of the argument num_connectors can lead to state issue.
This vulnerability is registered as CVE-2025-71108. The attack requires access to the local network. No exploit is available.
Upgrading the affected component is recommended.
vuldb.com
CVE-2025-71091 | Linux Kernel up to 6.1.159/6.6.119/6.12.63/6.18.3/6.19-rc3 team team_queue_override_port_prio_changed memory corruption (Nessus ID 298924)
2 days 4 hours ago
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.1.159/6.6.119/6.12.63/6.18.3/6.19-rc3. The affected element is the function team_queue_override_port_prio_changed of the component team. This manipulation causes memory corruption.
This vulnerability is handled as CVE-2025-71091. The attack can only be done within the local network. There is not any exploit available.
It is advisable to upgrade the affected component.
vuldb.com
CVE-2025-71087 | Linux Kernel up to 6.1.159/6.6.119/6.12.63/6.18.3/6.19-rc3 iavf iavf_config_rss_reg out-of-bounds (Nessus ID 298924)
2 days 4 hours ago
A vulnerability was found in Linux Kernel up to 6.1.159/6.6.119/6.12.63/6.18.3/6.19-rc3. It has been declared as critical. Affected by this vulnerability is the function iavf_config_rss_reg of the component iavf. The manipulation results in out-of-bounds read.
This vulnerability is identified as CVE-2025-71087. The attack can only be performed from the local network. There is not any exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2025-71098 | Linux Kernel up to 6.1.159/6.6.119/6.12.63/6.18.3/6.19-rc3 ip6gre_header allocation of resources (Nessus ID 298924)
2 days 4 hours ago
A vulnerability was found in Linux Kernel up to 6.1.159/6.6.119/6.12.63/6.18.3/6.19-rc3 and classified as critical. This affects the function ip6gre_header. Such manipulation leads to allocation of resources.
This vulnerability is traded as CVE-2025-71098. Access to the local network is required for this attack to succeed. There is no exploit available.
It is suggested to upgrade the affected component.
vuldb.com
CVE-2025-71093 | Linux Kernel up to 6.1.159/6.6.119/6.12.63/6.18.3/6.19-rc3 e1000_tbi_should_accept null pointer dereference (Nessus ID 298924)
2 days 4 hours ago
A vulnerability described as critical has been identified in Linux Kernel up to 6.1.159/6.6.119/6.12.63/6.18.3/6.19-rc3. Affected is the function e1000_tbi_should_accept. Executing a manipulation can lead to null pointer dereference.
This vulnerability is tracked as CVE-2025-71093. The attack is only possible within the local network. No exploit exists.
Upgrading the affected component is recommended.
vuldb.com
CVE-2025-71082 | Linux Kernel up to 6.1.159/6.6.119/6.12.63/6.18.3/6.19-rc3 btusb.c btusb_probe allocation of resources (Nessus ID 298924)
2 days 4 hours ago
A vulnerability has been found in Linux Kernel up to 6.1.159/6.6.119/6.12.63/6.18.3/6.19-rc3 and classified as critical. This affects the function btusb_probe of the file btusb.c. Performing a manipulation results in allocation of resources.
This vulnerability was named CVE-2025-71082. The attack needs to be approached within the local network. There is no available exploit.
The affected component should be upgraded.
vuldb.com