This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.
Category: Vulnerability Alerts
Apple Safari Remote Code Execution Vulnerability in Jav...
A severe remote code execution (RCE) vulnerability, tracked as CVE-2024-44308, has been actively exploited in the wild, compromisi...
Windows Server 2012 0-Day Vulnerability Allows Attacker...
A newly discovered zero-day vulnerability in Windows Server 2012 and Server 2012 R2 poses a significant security risk. This flaw, ...
New Windows 11 Integer Overflow Vulnerability Grants Pr...
A critical integer overflow vulnerability in Windows 11's ksthunk.sys driver allows local attackers to escalate privileges to SYST...
Critical Jenkins Vulnerabilities Expose Systems to DoS ...
A series of security flaws have been discovered in Jenkins, impacting both its core system and associated plugins. These vulnerabi...
Critical Vulnerabilities in Anti-Spam Plugin Expose Ove...
Two critical vulnerabilities in the CleanTalk Anti-Spam plugin for WordPress, used by over 200,000 sites, expose them to remote at...
Apple Fixes Actively Exploited Zero-Days Immediately
Although there is little information available about the vulnerabilities, the business did report that hackers have targeted Intel...
Apache Kafka Vulnerability Allows Attackers to Escalate...
A newly discovered vulnerability, CVE-2024-31141, in Apache Kafka Clients, could enable attackers to escalate their privileges, po...
Varonis Issues Warning After Major Vulnerability Found ...
Varonis has uncovered a high-risk vulnerability (CVE-2024-10979) in the PostgreSQL PL/Perl extension, which enables users to modif...
10,000 private repos were cloned in a massive Git confi...
A "massive" campaign that targets vulnerable Git setups to clone private repositories, steal cloud credentials from the source cod...
Apple's Enhanced Bug Bounty Program Offers Up to $1 Mil...
Apple is enhancing security by launching a bug bounty program that offers up to $1 million for identifying vulnerabilities in its ...
Windows 'Downdate' Attack Reverts Patched PCs to a Vuln...
Attackers can install bespoke rootkits on fully patched Windows 11 computers, which can defeat endpoint security measures, conceal...
Security Advisory: Vulnerabilities in Cisco ATA 190 Ser...
Recent vulnerabilities have been identified in the Cisco ATA 190 Series Analog Telephone Adapter, which could allow attackers to e...