Vulnerability Analysis

Linksys Router Flaw Let Attackers Perform Command Injection, PoC ReleasedLinksys Router Flaw Let Attackers Perform Command Injection, PoC Released

Linksys Router Flaw Let Attackers Perform Command Injection, PoC Released

Linksys routers were discovered with two vulnerabilities: CVE-2024-33788 and CVE-2024-33789. These vulnerabilities were associated with Command Injection on Linksys routers.…

11 months ago
Palo Alto ZeroDay Exploited in The Wild Following PoC ReleasePalo Alto ZeroDay Exploited in The Wild Following PoC Release

Palo Alto ZeroDay Exploited in The Wild Following PoC Release

Palo Alto Networks has disclosed a critical vulnerability within its PAN-OS operating system, identified as CVE-2024-3400. This zero-day flaw, found…

12 months ago
FGVulDet – New Vulnerability Detector to Analyze Source CodeFGVulDet – New Vulnerability Detector to Analyze Source Code

FGVulDet – New Vulnerability Detector to Analyze Source Code

Detecting source code vulnerabilities aims to protect software systems from attacks by identifying inherent vulnerabilities.  Prior studies often oversimplify the…

12 months ago
Pentagon Releases Cybersecurity Strategy To Strengthen Defense Industrial Base Pentagon Releases Cybersecurity Strategy To Strengthen Defense Industrial Base 

Pentagon Releases Cybersecurity Strategy To Strengthen Defense Industrial Base

The DoD DIB Cybersecurity Strategy is a three-year plan (FY24-27) to improve cybersecurity for defense contractors that aims to create…

1 year ago
BunnyLoader 3.0 Detected With Advanced Keylogging CapabilitiesBunnyLoader 3.0 Detected With Advanced Keylogging Capabilities

BunnyLoader 3.0 Detected With Advanced Keylogging Capabilities

BunnyLoader is a rapidly developing malware that can steal information, credentials, and cryptocurrencies while also delivering new malware to its victims.…

1 year ago
SSO Implementation Flaw In Cisco Broadworks Let Attackers Forge CredentialsSSO Implementation Flaw In Cisco Broadworks Let Attackers Forge Credentials

SSO Implementation Flaw In Cisco Broadworks Let Attackers Forge Credentials

A single sign-on (SSO) implementation flaw in the Cisco BroadWorks Application Delivery Platform and Cisco BroadWorks Xtended Services Platform might…

2 years ago
Multiple ArubaOS vulnerabilities Let Attackers Execute Arbitrary CodeMultiple ArubaOS vulnerabilities Let Attackers Execute Arbitrary Code

Multiple ArubaOS vulnerabilities Let Attackers Execute Arbitrary Code

Multiple vulnerabilities have been discovered in Aruba 9200 and 9000 Series Controllers and Gateways running ArubaOS. The vulnerabilities related to…

2 years ago
PHPFusion Flaw Allows Attackers to Read Critical System DataPHPFusion Flaw Allows Attackers to Read Critical System Data

PHPFusion Flaw Allows Attackers to Read Critical System Data

On Tuesday, Synopsys addressed High and medium vulnerabilities CVE-2023-2453, and CVE-2023-4480 discovered in PHPFusion by the researchers. PHPFusion is an…

2 years ago
Multiple IBM Sterling Secure Proxy Vulnerabilities Allow Remote Code ExecutionMultiple IBM Sterling Secure Proxy Vulnerabilities Allow Remote Code Execution

Multiple IBM Sterling Secure Proxy Vulnerabilities Allow Remote Code Execution

Multiple vulnerabilities have been found in IBM Sterling Secure Proxy, mostly related to Denial of Service and Information Disclosure. It…

2 years ago
NCSC Warns of Specific Vulnerabilities in AI Models Like ChatGPTNCSC Warns of Specific Vulnerabilities in AI Models Like ChatGPT

NCSC Warns of Specific Vulnerabilities in AI Models Like ChatGPT

A large language model (LLM) is a deep learning AI model or system that understands, generates, and predicts text-based content,…

2 years ago