Cisco Firepower Threat Defense Software SSL/TLS URL Category and Snort 3 Detection Engine Bypass and Denial of Service Vulnerability
A vulnerability in the SSL file policy implementation of Cisco Firepower Threat Defense (FTD) Software that occurs when...
Cisco Firepower Threat Defense Software SSL and Snort 3 Detection Engine Bypass and Denial of Service Vulnerability
A vulnerability in the SSL/TLS certificate handling of Snort 3 Detection Engine integration with Cisco Firepower Threat Defense...
Cisco Firepower Threat Defense Software SMB Protocol Snort 3 Detection Engine Bypass and Denial of Service Vulnerability
A vulnerability in the interaction between the Server Message Block (SMB) protocol preprocessor and the Snort 3 detection...
Cisco Firepower Threat Defense Software ICMPv6 with Snort 2 Denial of Service Vulnerability
A vulnerability in ICMPv6 inspection when configured with the Snort 2 detection engine for Cisco Firepower Threat Defense...
Cisco Firepower Management Center Software Log API Denial of Service Vulnerability
A vulnerability in a logging API in Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote...
Cisco Firepower Management Center Software Cross-Site Scripting Vulnerabilities
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated,...
Cisco Firepower Management Center Software Command Injection Vulnerability
A vulnerability in the web services interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated,...
Cisco Firepower Management Center Software Command Injection Vulnerabilities
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated,...
Cisco Firepower Management Center Software Arbitrary File Download Vulnerability
A vulnerability in the file download feature of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote...
Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software SAML Assertion Hijack Vulnerability
A vulnerability in the implementation of Security Assertion Markup Language (SAML) 2.0 single sign-on (SSO) for remote access...
Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Remote Access VPN Denial of Service Vulnerability
A vulnerability in the remote access VPN feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower...
Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Remote Access SSL VPN Multiple Certificate Authentication Bypass Vulnerability
A vulnerability in the remote access SSL VPN feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco...
Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software ICMPv6 Message Processing Denial of Service Vulnerability
A vulnerability in ICMPv6 processing of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD)...
Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software AnyConnect SSL/TLS VPN Denial of Service Vulnerability
A vulnerability in the AnyConnect SSL VPN feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower...
Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software AnyConnect Access Control List Bypass Vulnerabilities
Multiple vulnerabilities in the per-user-override feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense...
New Jamf CEO John Strosahl on Apple in the enterprise, Jamf’s future
John Strosahl became Jamf CEO in September. He isn’t a new face and was one of the first employees...
New Jamf CEO John Strosahl on Apple in the enterprise, Jami’s future
John Strosahl became Jamf CEO in September. He isn’t a new face and was one of the first employees...
Box taps Google Cloud’s generative AI capabilities to extract metadata
Cloud content management company Box and Google Cloud have announced an expansion of their partnership in an effort...
Researchers Expose Prolific Puma’s Underground Link Shortening Service
A threat actor known as Prolific Puma has been maintaining a low profile and operating an underground link shortening service...
NIST Research Leader Presents at First EU ROADVIEW Webinar
On October 2, 2023, NIST Research Leader Ed Griffor presented at the inaugural EU ROADVIEW Webinar “An Introduction...