Red Hat Security Advisory 2023-2801-01
Red Hat Security Advisory 2023-2801-01 – FRRouting is free software that manages TCP/IP based routing protocols. It supports BGP4, OSPFv2, OSPFv3, ISIS, RIP, RIPng, PIM,
Red Hat Security Advisory 2023-2736-01
Red Hat Security Advisory 2023-2736-01 – The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Ubuntu Security Notice USN-6074-2
Ubuntu Security Notice 6074-2 – USN-6074-1 fixed vulnerabilities in Firefox. The update introduced several minor regressions. This update fixes the problem. Multiple security issues were
Building cyber skills and roles from CyBOK foundations
NCSC Deputy Director for Cyber Growth Chris Ensor explains how we have used the Cyber Body of Knowledge to build the early foundations for professional
Screen SFT DAB 600/C Unauthenticated Information Disclosure
Screen SFT DAB 600/C is affected by an information disclosure vulnerability due to improper access control enforcement. An unauthenticated remote attacker can exploit this via
Screen SFT DAB 600/C Authentication Bypass / Reset Board Config
Screen SFT DAB 600/C suffers from a weak session management that can allow an attacker on the same network to bypass these controls by reusing
Ubuntu Security Notice USN-6060-3
Ubuntu Security Notice 6060-3 – USN-6060-1 fixed vulnerabilities in MySQL. The new upstream 8.0.33 version introduced a regression on the armhf architecture. This update fixes
Screen SFT DAB 600/C Authentication Bypass / Admin Password Change
Screen SFT DAB 600/C exploit that circumvents the control and requirement of the admin’s old password and directly changes the password. Exploit Files ≈ Packet Storm
Screen SFT DAB 600/C Authentication Bypass / Erase Account
Screen SFT DAB 600/C suffers from a weak session management that can allow an attacker on the same network to bypass these controls by reusing
Screen SFT DAB 600/C Authentication Bypass / Password Change
Screen SFT DAB 600/C suffers from a weak session management that can allow an attacker on the same network to bypass these controls by reusing