A critical vulnerability in the Shim Linux bootloader enables attackers to execute code and take control of a target system before the kernel is loaded, bypassing existing security mechanisms. Shim is ...
Linux shim, a small piece of code that many major Linux distros use during the secure boot process, has a remote code execution vulnerability in it that gives attackers a way to take complete control ...
There is a gaping security hole in the open-source bootloader shim that allows attackers – to inject their code in a man-in-the-middle position –, for example. A complete compromise of the systems is ...
Microsoft’s vulnerability and mitigations team have discovered a bug in a program called Shim, which is used in Linux distributions that support secure boot. While the vulnerability, CVE-2023-40547, ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results