Remote Code Execution (RCE)

1-Click RCE Attack In Kerio Control UTM Allow Attackers Gain Firewall Root Access Remotely1-Click RCE Attack In Kerio Control UTM Allow Attackers Gain Firewall Root Access Remotely

1-Click RCE Attack In Kerio Control UTM Allow Attackers Gain Firewall Root Access Remotely

GFI Software's Kerio Control, a popular UTM solution, was found to be vulnerable to multiple HTTP Response Splitting vulnerabilities, which…

4 months ago
Hackers Cloning Websites, Exploiting RCE Flaws To Gain Access To Shopping PlatformsHackers Cloning Websites, Exploiting RCE Flaws To Gain Access To Shopping Platforms

Hackers Cloning Websites, Exploiting RCE Flaws To Gain Access To Shopping Platforms

Cybercriminals are leveraging AI-powered phishing attacks, website cloning tools, and RCE exploits to target e-commerce platforms during the holiday season,…

5 months ago
0-Click Outlook RCE Vulnerability Triggered When Email is Clicked – Technical Analysis0-Click Outlook RCE Vulnerability Triggered When Email is Clicked – Technical Analysis

0-Click Outlook RCE Vulnerability Triggered When Email is Clicked – Technical Analysis

NetSPI discovered that Microsoft Outlook is vulnerable to authenticated remote code execution (CVE-2024-21378) due to improper validation of synchronized form…

8 months ago
Critical Jenkins Vulnerabilities Expose Servers To RCE AttackCritical Jenkins Vulnerabilities Expose Servers To RCE Attack

Critical Jenkins Vulnerabilities Expose Servers To RCE Attack

Jenkins, an open source automation server, has been found to have two security issues, one of which is a critical…

9 months ago
PoC Exploit Released For D-LINK RCE Zero-Day VulnerabilityPoC Exploit Released For D-LINK RCE Zero-Day Vulnerability

PoC Exploit Released For D-LINK RCE Zero-Day Vulnerability

Two critical vulnerabilities have been discovered in D-Link DIR-X4860 routers which were associated with Authentication bypass due to HNAP port…

11 months ago