22-Yrs-Old SQLite Bug Let Hackers Perform Code Execution & DOS Attack On Control Programs
Trail of Bits researcher Andreas Kellas recently disclosed a 22-Years-Old SQLite bug which has been tracked as "CVE-2022-35737." The SQLite database library has been...
Apache Commons “Text4Shell” Flaw Could Trigger Code Execution With Malicious Input
Many people are concerned about an RCE flaw in the Apache Commons Text library. They believe that this RCE flaw may turn out to...
BIND DNS Software High-Severity Flaws Let Hackers Remotely Trigger the Attack
The ISC (Internet Systems Consortium) released a security patch this week in an attempt to address six vulnerabilities that could allow remote attackers to...
RCE Bug in ZOHO Products Let Hackers Execute Arbitrary Code Remotely
CISA's bug catalog has been updated with a new vulnerability related to Java deserialization, which has been exploited in the wild by malicious threat...
Critical Magento Vulnerability Let Unauthenticated Attackers to Execute Code
Sansec Threat Research Team noticed a surge in Magento 2 template attacks. This critical template vulnerability in Magento 2 tracked as (CVE-2022-24086) is increasing...
15-Year-Old Python Bug Let Hacker Execute Code in 350k Python Projects
The cybersecurity researchers at Trellix have recently identified a 15-year-old Python bug that has been found to potentially impact 350,000 open-source repositories. There is...
Netgear Router Models With FunJSQ Let Attackers Execute Arbitrary Code
It has been discovered recently by the European security and compliance assessment company Onekey that arbitrary code may be injected into multiple Netgear router...
Critical Flaws in Airplanes WiFi Access Point Let Attackers Gain Root Access
Two critical vulnerabilities have been found recently in the wireless LAN devices of Contec. These critical vulnerabilities were discovered by the cybersecurity analysts, Samy...
Hackers Exploit WebLogic Vulnerabilities to Deliver Cryptocurrency-Mining Malware
In order to deliver cryptocurrency mining malware, the threat actors are actively exploiting both old and newly discovered vulnerabilities in Oracle WebLogic Server.
Recent research...
Lenovo Several High-Severity BIOS Vulnerabilities Impacts Hundreds of Devices
Recently, Lenovo’s new BIOS updates fixes the high-severity vulnerabilities impacting hundreds of devices in several models (Desktop, All in One, IdeaCentre, Legion, ThinkCentre, ThinkPad,...