CISA Partners with ASD’s ACSC, CCCS, NCSC-UK, and Other International and US Organizations to Release Guidance on Edge Devices

CISA—in partnership with international and U.S. organizations—released guidance to help organizations protect their network edge devices and appliances, such as firewalls, routers, virtual private networks (VPN) gateways, Internet of Things…

Comments Off on CISA Partners with ASD’s ACSC, CCCS, NCSC-UK, and Other International and US Organizations to Release Guidance on Edge Devices

Vulnerability Summary for the Week of January 27, 2025

High Vulnerabilities PrimaryVendor -- Product Description Published CVSS Score Source Info 0xPolygonZero--plonky2  Plonky2 is a SNARK implementation based on techniques from PLONK and FRI. Lookup tables, whose length is not…

Comments Off on Vulnerability Summary for the Week of January 27, 2025

Vulnerability Summary for the Week of January 20, 2025

High Vulnerabilities PrimaryVendor -- Product Description Published CVSS Score Source Info aEnrich Technology--a+HRD  The a+HRD from aEnrich Technology has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary…

Comments Off on Vulnerability Summary for the Week of January 20, 2025

Threat Actors Chained Vulnerabilities in Ivanti Cloud Service Applications

Note: The CVEs in this advisory are unrelated to vulnerabilities (CVE-2025-0282 and CVE-2025-0283) in Ivanti’s Connect Secure, Policy Secure and ZTA Gateways. For more information on mitigating CVE -2025-0282 and CVE-2025-0283,…

Comments Off on Threat Actors Chained Vulnerabilities in Ivanti Cloud Service Applications

Vulnerability Summary for the Week of January 13, 2025

High Vulnerabilities PrimaryVendor -- Product Description Published CVSS Score Source Info 1000 Projects--Campaign Management System Platform for Women  A vulnerability was found in 1000 Projects Campaign Management System Platform for…

Comments Off on Vulnerability Summary for the Week of January 13, 2025

CISA and US and International Partners Publish Guidance on Priority Considerations in Product Selection for OT Owners and Operators

Today, CISA—along with U.S. and international partners—released joint guidance Secure by Demand: Priority Considerations for Operational Technology Owners and Operators when Selecting Digital Products. As part of CISA’s Secure by Demand…

Comments Off on CISA and US and International Partners Publish Guidance on Priority Considerations in Product Selection for OT Owners and Operators

Vulnerability Summary for the Week of January 6, 2025

High Vulnerabilities PrimaryVendor -- Product Description Published CVSS Score Source Info 5centsCDN--5centsCDN  Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in 5centsCDN 5centsCDN allows Reflected XSS.This issue…

Comments Off on Vulnerability Summary for the Week of January 6, 2025