CVE/vulnerability
PoC Exploit Released For D-LINK RCE Zero-Day Vulnerability
Two critical vulnerabilities have been discovered in D-Link DIR-X4860 routers which were associated with Authentication bypass due to HNAP port and remote code execution....
Cyber Crime
Hackers Attacking Foxit PDF Reader Users To steal Sensitive Data
Researchers identified a PDF exploit targeting Foxit Reader users that uses a design flaw that presents security warnings with a default "OK" option, potentially...
CVE/vulnerability
Linksys Router Flaw Let Attackers Perform Command Injection, PoC Released
Linksys routers were discovered with two vulnerabilities: CVE-2024-33788 and CVE-2024-33789.
These vulnerabilities were associated with Command Injection on Linksys routers.
The severity of these vulnerabilities...
CVE/vulnerability
Multiple MySQL2 Flaw Let Attackers Arbitrary Code Remotely
The widely used MySQL2 has been discovered to have three critical vulnerabilities: remote Code execution, Arbitrary code injection, and Prototype Pollution.
These vulnerabilities have been...
CVE/vulnerability
PoC Exploit Released For Critical Oracle VirtualBox Vulnerability
Oracle Virtualbox was identified and reported as having a critical vulnerability associated with Privilege Escalation and Arbitrary File Move/Delete.
This vulnerability was assigned with CVE-2024-21111,...
Cyber Security News
Alert! Zero-day Exploit For WhatsApp Advertised On Hacker Forums
A zero-day exploit targeting the popular messaging app WhatsApp has been advertised on underground hacker forums.
The exploit has raised serious concerns regarding the safety...
CVE/vulnerability
Fortra For Windows Vulnerability Let Attackers Escalate Privilege
Fortra's Robot Schedule Enterprise Agent permits a low-privileged user to elevate privileges to the local system level.
The problem arises from the agent's failure to...
cyber security
Hackers Using ScrubCrypt ‘AV Evasion Tool’ To Exploit Oracle WebLogic Servers
Hackers exploit Oracle WebLogic Servers, knowing that they are extensively used in enterprises.
Threat actors can use security vulnerabilities present in the WebLogic servers to...