• Search
  • Topics
  • Nodes
< back

#vulnerability

3 36 Toot LinkedIn
A chart of hourly posts over the last week (for big screens). A chart of hourly posts over the last week (for small screens).

1

From tenable.com

From Managing Vulnerabilities to Managing Exposure: The Critical Shift You Can’t Ignore

1 1

Vulnerability management remains core to reducing cyber risk — but as the attack surface grows, teams need a risk-driven strategy that looks beyond vulnerabilities to see the bigger picture. Discover how exposure management unifies data and prioritizes real exposures — keeping teams proactive...

#vulnerability #vulnerabilities

18h ago


1

From beyondmachines.net

Critical flaws in Mitel SIP phones allow command injection and unauthorized file upload

1 1

Mitel has patched multiple security vulnerabilities in its SIP phone product line, including a critical command injection flaw (CVE-2025-47188, CVSS 9.8) that allows unauthenticated attackers to execute arbitrary commands and potentially access sensitive system data. Mirai botnet already...

#infosec #advisory #cybersecurity #vulnerability

12h ago


1

From beyondmachines.net

Critical vulnerability in Cisco IOS XE Wireless Controller allows arbitrary file upload

1 1

Cisco has patched a critical vulnerability (CVE-2025-20188, CVSS 10.0) in its IOS XE Wireless Controller Software that exploits a hard-coded JSON Web Token in the Out-of-Band AP Image Download feature, allowing unauthenticated remote attackers to upload files, perform path traversal, and execute...

#infosec #advisory #cybersecurity #vulnerability

14h ago

Showing first 3 out of 3