cyber security
Azure API Management Vulnerability Let Attackers Escalate Privileges
A vulnerability in Azure API Management (APIM) has been identified. It allows attackers to escalate privileges and access sensitive information.This issue arises from a...
cyber security
Spring Framework Vulnerability Let Attackers obtain Any Files from the System
A newly discovered vulnerability in the Spring Framework has been identified, potentially allowing attackers to access any file on the system.This vulnerability tracked...
cyber security
CISA Urges Agencies to Upgrade or Remove End-of-Life Ivanti Appliance
The Cybersecurity and Infrastructure Security Agency (CISA) has called upon federal agencies and organizations to take immediate action concerning a critical vulnerability affecting Ivanti...
ChatGPT
Hacker Tricks ChatGPT to Get Details for Making Homemade Bombs
A hacker known as Amadon has reportedly managed to bypass the safety protocols of ChatGPT, a popular AI chatbot developed by OpenAI, to generate...
cyber security
Citrix Workspace App Vulnerable to Privilege Escalation Attacks
Citrix released a security bulletin (CTX691485) detailing two critical vulnerabilities in the Citrix Workspace app for Windows.These vulnerabilities, identified as CVE-2024-7889 and CVE-2024-7890,...
cyber security
Hackers Exploiting Apache OFBiz RCE Vulnerability in the Wild
A critical vulnerability in the Apache OFBiz framework has been actively exploited by hackers.The flaw designated CVE-2024-45195, allows for unauthenticated remote code execution...
cyber security
Docker Desktop Vulnerabilities Let Attackers Execute Remote Code
Docker has addressed critical vulnerabilities in Docker Desktop that could allow attackers to execute remote code.These vulnerabilities, identified as CVE-2024-8695 and CVE-2024-8696, highlight...
cyber security
Critical Vulnerabilities in JPEG 2000 Library Let Attackers Execute Remote Code
Exploiting memory corruption vulnerabilities in server-side software often requires knowledge of the binary and environment, which limits the attack surface, especially for unknown binaries...