Tuesday, March 18, 2025

PoC

PoC Exploit Released for Linux Kernel Use-After-Free Vulnerability

A proof-of-concept (PoC) exploit has been released for a use-after-free vulnerability in the Linux kernel, identified as CVE-2024-36904.This vulnerability is located in the TCP subsystem of the Linux kernel...

PoC Released for SolarWinds Web Help Desk Vulnerability Exposing Passwords

A Proof-of-Concept (PoC) has been released for a significant vulnerability discovered in SolarWinds Web Help Desk, exposing encrypted passwords and other sensitive data.This vulnerability...

RSync Vulnerabilities Allow Hackers to Take Full Control of Servers – PoC Released

A series of critical security vulnerabilities in the widely-used Rsync file synchronization tool have been uncovered, exposing millions of servers to potential takeover by...

Parallels Desktop 0-Day Exploit Enables Root Privileges – PoC Released

A critical zero-day vulnerability in Parallels Desktop virtualization software has been publicly disclosed after seven months of unresolved reporting, enabling attackers to escalate privileges...

PoC Exploit Released for F5 BIG-IP Command Injection Vulnerability

Security researchers have disclosed critical details about CVE-2025-20029, a command injection vulnerability in F5’s BIG-IP Traffic Management Shell (TMSH) command-line interface.The flaw enables authenticated attackers...

PoC Exploit Released for QNAP QTS zero-day RCE Flaw

Researchers have shown a proof-of-concept (PoC) attack for a zero-day remote code execution (RCE) flaw in the QTS operating system from QNAP.Users of...

PoC Exploit Published for 0-day Vulnerability in Google Chrome

A proof-of-concept (PoC) exploit for a critical zero-day vulnerability (CVE-2024-4947) in Google Chrome has been made public.The potential for exploitation of this vulnerability,...

Indicator Of Attack(IoA’s) And Activities – SOC/SIEM – A Detailed Explanation

What is an Indicator of Attack (IOA)IoAs is some events that could reveal an active attack before indicators of compromise become visible.The use...

Android Ecosystem Contains Several Hidden Patch Gaps that Can be Exploited by Hackers

The Android operating system is one of the most widely used platforms with 2 billion active users at the same time it facing a...

Hackers Can Steal Password Hashes & Crash Windows systems Automatically with Microsoft Outlook and OLE

The researcher discovered a flaw that combined with Microsoft Outlook and OLE which leads to steal the Password hash and eventually crash the windows...

Critical Flaw in Popular BitTorrent Transmission Client Leads to an Attacker Perform Remote Hack into Your PC

A critical flaw discovered in BitTorrent Transmission client app that allows an attacker can remotely control the victims PC by using a method called...