Vulnerability Analysis

Linksys Router Flaw Let Attackers Perform Command Injection, PoC Released

Linksys routers were discovered with two vulnerabilities: CVE-2024-33788 and CVE-2024-33789. These vulnerabilities were associated with Command Injection on Linksys routers.…

11 months ago

Palo Alto ZeroDay Exploited in The Wild Following PoC Release

Palo Alto Networks has disclosed a critical vulnerability within its PAN-OS operating system, identified as CVE-2024-3400. This zero-day flaw, found…

12 months ago

FGVulDet – New Vulnerability Detector to Analyze Source Code

Detecting source code vulnerabilities aims to protect software systems from attacks by identifying inherent vulnerabilities.  Prior studies often oversimplify the…

12 months ago

Pentagon Releases Cybersecurity Strategy To Strengthen Defense Industrial Base

The DoD DIB Cybersecurity Strategy is a three-year plan (FY24-27) to improve cybersecurity for defense contractors that aims to create…

1 year ago

BunnyLoader 3.0 Detected With Advanced Keylogging Capabilities

BunnyLoader is a rapidly developing malware that can steal information, credentials, and cryptocurrencies while also delivering new malware to its victims.…

1 year ago

SSO Implementation Flaw In Cisco Broadworks Let Attackers Forge Credentials

A single sign-on (SSO) implementation flaw in the Cisco BroadWorks Application Delivery Platform and Cisco BroadWorks Xtended Services Platform might…

2 years ago

Multiple ArubaOS vulnerabilities Let Attackers Execute Arbitrary Code

Multiple vulnerabilities have been discovered in Aruba 9200 and 9000 Series Controllers and Gateways running ArubaOS. The vulnerabilities related to…

2 years ago

PHPFusion Flaw Allows Attackers to Read Critical System Data

On Tuesday, Synopsys addressed High and medium vulnerabilities CVE-2023-2453, and CVE-2023-4480 discovered in PHPFusion by the researchers. PHPFusion is an…

2 years ago

Multiple IBM Sterling Secure Proxy Vulnerabilities Allow Remote Code Execution

Multiple vulnerabilities have been found in IBM Sterling Secure Proxy, mostly related to Denial of Service and Information Disclosure. It…

2 years ago

NCSC Warns of Specific Vulnerabilities in AI Models Like ChatGPT

A large language model (LLM) is a deep learning AI model or system that understands, generates, and predicts text-based content,…

2 years ago