Security CERT Global
- TvRock vulnerable to cross-site request forgery
- TvRock vulnerable to denial-of-service (DoS)
- LXD: CVSS (Max): 5.9
- Linux Kernel (Live Patch 22 for SLE 15 SP4): CVSS (Max): 7.8
- shim: CVSS (Max): 8.4
- polkit: CVSS (Max): None
- Pillow: CVSS (Max): 7.3
- Percona XtraBackup: CVSS (Max): 7.8
- Linux Kernel (Live Patch 50 for SLE 12 SP5): CVSS (Max): 7.8
- apache-commons-configuration: CVSS (Max): 4.4
- glibc: CVSS (Max): 8.2
- Linux Kernel RT (Live Patch 1 for SLE 15 SP5): CVSS (Max): 7.8
- thunderbird: CVSS (Max): 7.5
- openjdk-11: CVSS (Max): 3.7
- apache-commons-configuration2: CVSS (Max): 4.4
- Pillow: CVSS (Max): 7.3
- Linux Kernel (Live Patch 1 for SLE 15 SP5): CVSS (Max): 7.8
- samba: CVSS (Max): 6.5
- Linux Kernel (Live Patch 51 for SLE 12 SP5): CVSS (Max): 7.8
- openjdk-17: CVSS (Max): 3.7
- openjdk-11: CVSS (Max): 3.7
- The Great Fuzzy Hashing Debate
- CERTFR-2024-AVI-0337 : Multiples vulnérabilités dans Mozilla Thunderbird (22 avril 2024)
- CERTFR-2024-ACT-018 : Bulletin d’actualité CERTFR-2024-ACT-018 (22 avril 2024)
- CERTFR-2024-AVI-0341 : Multiples vulnérabilités dans Synacor Zimbra Collaboration (22 avril 2024)
- CERTFR-2024-AVI-0339 : Vulnérabilité dans Microsoft Edge (22 avril 2024)
- CERTFR-2024-AVI-0336 : Multiples vulnérabilités dans les produits OwnCloud (22 avril 2024)
- CERTFR-2024-AVI-0335 : Vulnérabilité dans SolarWinds Platform (22 avril 2024)
- CERTFR-2024-AVI-0340 : [SCADA] Multiples vulnérabilités dans les produits Moxa (22 avril 2024)
- CERTFR-2024-AVI-0338 : [SCADA] Vulnérabilité dans Siemens RUGGEDCOM APE1808 (22 avril 2024)
- PhaaS-tjeneste lukket ned
- 0-dagssårbarhed i CrushFTP
- JVN: Armeria-samlにおけるSAMLメッセージ取り扱い不備
- JVN: LINE client for iOSにおけるサーバ証明書の検証不備の脆弱性
- JVN: TensorFlowベースのKerasモデルに含まれるLambdaレイヤにコードインジェクションが発生する問題
- JVN: Unitronics製VisionシリーズPLCにおける復元可能な形式でのパスワード保存の脆弱性
- JVN: オムロン製Sysmac Studio/CX-OneおよびCX-Programmerにおける複数の脆弱性
- Multiple vulnerabilities in OMRON Sysmac Studio/CX-One and CX-Programmer
- libdatetime-timezone-perl: CVSS (Max): None
- wireshark: CVSS (Max): 7.5
- Junos OS: CVSS (Max): 5.3
- wireshark: CVSS (Max): 7.5
- Linux kernel: CVSS (Max): 7.8
- Linux kernel: CVSS (Max): 7.8
- Mozilla Thunderbird: CVSS (Max): 7.5*
- nodejs12: CVSS (Max): 7.5
- tomcat9: CVSS (Max): 7.5
- chromium: CVSS (Max): 8.8*
- nodejs14: CVSS (Max): 7.5
- MozillaFirefox: CVSS (Max): 7.5*
Secure design principles: Guides for the design of Cyber Secure systems: Security design principles and virtualisation
Secure design principles:Guides for the design of Cyber Secure systems:Security design principles and virtualisationhttps://www.ncsc.gov.uk/collection/cyber-security-design-principles/examples/study-virtualisationicssecurity, infosec, cybersecurity, criticalinfrastructure, IndustrialControlSystems, virtualisation
Secure design principles: Guides for the design of Cyber Secure systems: Design principles and Operational Technology
Secure design principles:Guides for the design of Cyber Secure systems:Design principles and Operational Technologyhttps://www.ncsc.gov.uk/collection/cyber-security-design-principles/examples/study-operational-techicssecurity, infosec, cybersecurity, criticalinfrastructure, IndustrialControlSystems, OT
Cybersecurity Capability Maturity Model (C2M2) Program
Cybersecurity Capability Maturity Model (C2M2) Programhttps://www.energy.gov/ceser/activities/cybersecurity-critical-energy-infrastructure/energy-sector-cybersecurity-0 icssecurity, infosec, cybersecurity, criticalinfrastructure, IndustrialControlSystems
Strategic Efficiency Consortium Security Intelligence Data Platform: Work Flow + Content Map – Jan 2019
SEC Industrial Security Intelligence Data Platform Work Flow SEC Industrial Security Intelligence Data Platform Content Map Updated Jan 2019 Document: […]
SEC Industrial Security Intelligence Data Platform 2019 Document
Strategic Efficiency Consortium Platform Work Flow Content Map Updated for 2019. SEC Industrial Security Intelligence Data Platform 2019 Document Document: […]
Strategic Efficiency Consortium Security Intelligence Reading and References – SEC Report
Reading and References Competitive Intelligence – CI For Beginners Part 1: Insight Work “Intelligence is a set […]
SEC Threat Intelligence as a Critical Organizational Need – SEC Report
The critical need for an evidence based, automated, holistic approach of the threat landscape. These are challenging times […]
SEC Security Data Services – SEC Report
This service is specifically designed to deliver well defined deliverables into critical intelligence demands of our client. These […]