GBH
GBH
22-Yrs-Old SQLite Bug Let Hackers Perform Code Execution & DOS Attack On Control Programs

22-Yrs-Old SQLite Bug Let Hackers Perform Code Execution & DOS Attack On Control Programs

0
Trail of Bits researcher Andreas Kellas recently disclosed a 22-Years-Old SQLite bug which has been tracked as "CVE-2022-35737." The SQLite database library has been...

Apache Commons “Text4Shell” Flaw Could Trigger Code Execution With Malicious Input

0
Many people are concerned about an RCE flaw in the Apache Commons Text library. They believe that this RCE flaw may turn out to...
BIND DNS Software

BIND DNS Software High-Severity Flaws Let Hackers Remotely Trigger the Attack

0
The ISC (Internet Systems Consortium) released a security patch this week in an attempt to address six vulnerabilities that could allow remote attackers to...
RCE Bug in ZOHO Products Let Hackers Execute Arbitrary Code Remotely

RCE Bug in ZOHO Products Let Hackers Execute Arbitrary Code Remotely

0
CISA's bug catalog has been updated with a new vulnerability related to Java deserialization, which has been exploited in the wild by malicious threat...
Critical Magento Vulnerability

Critical Magento Vulnerability Let Unauthenticated Attackers to Execute Code

0
Sansec Threat Research Team noticed a surge in Magento 2 template attacks. This critical template vulnerability in Magento 2 tracked as (CVE-2022-24086) is increasing...
15-Year-Old Python Bug Let Hacker Execute Code in 350k Python Projects

15-Year-Old Python Bug Let Hacker Execute Code in 350k Python Projects

0
The cybersecurity researchers at Trellix have recently identified a 15-year-old Python bug that has been found to potentially impact 350,000 open-source repositories. There is...
Netgear Router FunJSQ

Netgear Router Models With FunJSQ Let Attackers Execute Arbitrary Code

0
It has been discovered recently by the European security and compliance assessment company Onekey that arbitrary code may be injected into multiple Netgear router...
Critical Flaws in Airplanes WiFi Access Point Let Attackers Gain Root Access

Critical Flaws in Airplanes WiFi Access Point Let Attackers Gain Root Access

0
Two critical vulnerabilities have been found recently in the wireless LAN devices of Contec. These critical vulnerabilities were discovered by the cybersecurity analysts, Samy...
Hackers Exploit WebLogic Vulnerabilities

Hackers Exploit WebLogic Vulnerabilities to Deliver Cryptocurrency-Mining Malware

0
In order to deliver cryptocurrency mining malware, the threat actors are actively exploiting both old and newly discovered vulnerabilities in Oracle WebLogic Server. Recent research...
Lenovo BIOS Vulnerabilities

Lenovo Several High-Severity BIOS Vulnerabilities Impacts Hundreds of Devices

0
Recently, Lenovo’s new BIOS updates fixes the high-severity vulnerabilities impacting hundreds of devices in several models (Desktop, All in One, IdeaCentre, Legion, ThinkCentre, ThinkPad,...

Complete Free Website Security Check

Website

Recent Posts