CVE/vulnerability
Critical Veritas Vulnerability Allows Attackers to Execute Malicious Code
A critical vulnerability has been discovered in Veritas' Arctera InfoScale product, a solution widely used for disaster recovery and high availability scenarios.
The issue lies...
CVE/vulnerability
Apache Tomcat Flaw Could Allow RCE Attacks on Servers
Apache Tomcat, a widely used open-source web server software, has faced numerous security vulnerabilities in recent years.
Some critical issues put servers at risk of...
Cyber Security News
Critical Microsoft’s Time Travel Debugging Tool Vulnerability Let Attackers Mask Detection
Microsoft’s Time Travel Debugging (TTD) framework, a powerful tool for recording and replaying Windows program executions, has been found to harbor subtle yet significant...
cyber security
Researcher Hacks Embedded Devices to Uncover Firmware Secrets
In a recent exploration of embedded device hacking, a researcher demonstrated how to extract firmware from flash memory using the flashrom tool.
This process...
Android
Android Zygote Injection Flaw Lets Attackers Execute Code & Gain Elevated Privileges
A significant vulnerability in the Android operating system, identified as CVE-2024-31317, has been discovered, allowing attackers to exploit the Zygote process for system-wide code...
cyber security
New Linux Kernel Code Written in Rust Aims to Eliminate Memory Safety Bugs
The integration of Rust into the Linux kernel is a significant step forward in enhancing memory safety, a critical aspect of kernel development.
This...
CVE/vulnerability
Laravel Framework Flaw Allows Attackers to Execute Malicious JavaScript
A significant vulnerability has been identified in the Laravel framework, specifically affecting versions between 11.9.0 and 11.35.1.
The issue revolves around improper encoding of request...
CVE/vulnerability
Critical Vulnerabilities in Moxa Switches Enable Unauthorized Access
A critical vulnerability identified as CVE-2024-12297 has been discovered in Moxa's PT series of network switches, affecting multiple models across different product lines.
This security...