Thursday, March 28, 2024
Home Search

vulnerability - search results

If you're not happy with the results, please do another search

D-Link Wi-Fi Range Extender Vulnerability Let Attackers Inject Remote Code

0
A command injection vulnerability has been discovered in the D-Link DAP-X1860 range extender, allowing threat actors to execute remote code on affected devices. The...

MacOS “DirtyNIB” Vulnerability: Let Attackers Execute Malicious Code

0
A new zero-day vulnerability has been discovered in Apple’s macOS systems, which allows threat actors to execute code on behalf of a legitimate Apple...

Maintainers of a Popular Open Source Tool Warns of Critical Curl Vulnerability

0
Two new vulnerabilities have been discovered in the widely used Curl tool. These two vulnerabilities are identified as CVE-2023-38545 and CVE-2023-38546. One of these...
Deep Learning Libraries

Looney Tunables: Linux Vulnerability Lets Attackers Gain Root Privileges

0
A buffer overflow issue has been disclosed in the GNU C Library's dynamic loader ld.so, which might allow local attackers to acquire root privileges...

Zip Slip Vulnerability Let Attacker Import Malicious Code and Execute Arbitrary Code

0
A critical Zip Slip vulnerability was discovered in the open-source data cleaning and transformation tool â€˜OpenRefine’, which allowed attackers to import malicious code and execute arbitrary...

Progress Software Warns of Critical Vulnerability in WS_FTP Server

0
Multiple vulnerabilities have been discovered in Progress’s WS_FTP, which include .NET deserialization, directory traversal, reflected cross-site scripting (XSS), SQL injection, stored cross-site scripting, cross-site...

ZYXEL Buffer Overflow vulnerability Let Attacker Launch DoS Attack

0
ZYXEL has been discovered with a Buffer Overflow vulnerability on their ZYXEL-PMG2005-T20B device, which can result in a denial-of-service condition. This condition exists due...
Nagios Monitoring Tool Vulnerabilities

Google Chrome use-after-free Vulnerability Leads to Remote Attack

0
Google Chrome has been recently discovered to be a Use-after-free vulnerability that threat actors can exploit to attack users. This vulnerability exists in the...

Trend Micro Zero-day Vulnerability Let Attackers Run Arbitrary Code

0
If you use Trend Micro Apex One, you should know that the third-party Antivirus uninstaller feature may have a security hole. This flaw could...

Windows11 Themes vulnerability Let Attackers Execute Arbitrary Code

0
An Arbitrary code execution vulnerability has been found in Windows 11. This vulnerability is a result of several factors, such as a Time-of-Check Time-of-Use...

Managed WAF protection

Website

Recent Articles