Category: Vulnerability Alerts

Apple Safari Remote Code Execution Vulnerability in Jav...

A severe remote code execution (RCE) vulnerability, tracked as CVE-2024-44308, has been actively exploited in the wild, compromisi...

Windows Server 2012 0-Day Vulnerability Allows Attacker...

A newly discovered zero-day vulnerability in Windows Server 2012 and Server 2012 R2 poses a significant security risk. This flaw, ...

New Windows 11 Integer Overflow Vulnerability Grants Pr...

A critical integer overflow vulnerability in Windows 11's ksthunk.sys driver allows local attackers to escalate privileges to SYST...

Critical Jenkins Vulnerabilities Expose Systems to DoS ...

A series of security flaws have been discovered in Jenkins, impacting both its core system and associated plugins. These vulnerabi...

Critical Vulnerabilities in Anti-Spam Plugin Expose Ove...

Two critical vulnerabilities in the CleanTalk Anti-Spam plugin for WordPress, used by over 200,000 sites, expose them to remote at...

Apple Fixes Actively Exploited Zero-Days Immediately

Although there is little information available about the vulnerabilities, the business did report that hackers have targeted Intel...

Apache Kafka Vulnerability Allows Attackers to Escalate...

A newly discovered vulnerability, CVE-2024-31141, in Apache Kafka Clients, could enable attackers to escalate their privileges, po...

Varonis Issues Warning After Major Vulnerability Found ...

Varonis has uncovered a high-risk vulnerability (CVE-2024-10979) in the PostgreSQL PL/Perl extension, which enables users to modif...

10,000 private repos were cloned in a massive Git confi...

A "massive" campaign that targets vulnerable Git setups to clone private repositories, steal cloud credentials from the source cod...

Apple's Enhanced Bug Bounty Program Offers Up to $1 Mil...

Apple is enhancing security by launching a bug bounty program that offers up to $1 million for identifying vulnerabilities in its ...

Windows 'Downdate' Attack Reverts Patched PCs to a Vuln...

Attackers can install bespoke rootkits on fully patched Windows 11 computers, which can defeat endpoint security measures, conceal...

Security Advisory: Vulnerabilities in Cisco ATA 190 Ser...

Recent vulnerabilities have been identified in the Cisco ATA 190 Series Analog Telephone Adapter, which could allow attackers to e...

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.