Icinga

Icinga

public 1 min read
A critical vulnerability in Icinga 2 monitoring systems allows attackers to bypass certificate validation and obtain legitimate certificates for impersonating…
GIMP

GIMP

public 1 min read
Two critical security vulnerabilities were discovered in the popular GIMP image editing software. These vulnerabilities allow remote attackers to execute…