Jan. 25, 2024, 1:45 p.m. |

LinuxSecurity Advisories - Ubuntu linuxsecurity.com

Puma could be made to consume resources if it received specially crafted network traffic.

network network traffic puma resources traffic ubuntu vulnerability

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

SITEC- Systems Security Administrator- Camp HM Smith

@ Peraton | Camp H.M. Smith, HI, United States

Cyberspace Intelligence Analyst

@ Peraton | Fort Meade, MD, United States

General Manager, Cybersecurity, Google Public Sector

@ Google | Virginia, USA; United States

Cyber Security Advisor

@ H&M Group | Stockholm, Sweden

Engineering Team Manager – Security Controls

@ H&M Group | Stockholm, Sweden