Tuesday, October 29, 2024
Tag:

Vulnerabilities

HPE Aruba Networking Product Vulnerabilities Allow File Overwrite

The vulnerabilities, CVE-2023-38401 and CVE-2023-38402, affect the HPE Aruba Networking Virtual Intranet Access (VIA) client for the Microsoft Windows operating system. If the exploit...

CISA Advisory of Top 42 Frequently Exploited Flaws of 2022

The Cybersecurity and Infrastructure Security Agency (CISA) has published a report which was co-authored by the NSA, FBI, and the FYEY (Five Eyes) from...

RouterSploit – Exploitation Framework for Embedded devices

The RouterSploit Framework is an open-source exploitation framework devoted to embedded devices. It includes various modules that aid penetration testing operations:exploits – modules that...

Spotify Hack – Over 300k Accounts Hacked in Credential Stuffing Attack

Spotify is a Swedish-based audio streaming and media services provider, with over 299 million active monthly users in 2020.Noam Rotem and Ran Locar, vpnMentor’s research team...

OkCupid Vulnerabilities Let Hackers to Steal the Personal and Sensitive Data of Users

OkCupid is one of the most popular dating apps that has more than 50 million registered users and used in 110 countries. The app...

TikTok Vulnerability Let Hackers to Hijack any Video Content

A security vulnerability with TikTok allows attackers to inject any videos in the User feeds, the bug affects verified users also. Attackers may exploit...

5 Critical Zero-day Vulnerabilities Affected Tens of Millions of Cisco Switches, Routers, IP Phones and Cameras

Researchers discovered 5 critical zero-day vulnerabilities (dubbed CDPwn)  in Cisco Discovery Protocol that are used in multiple Cisco products such as Routers, Switches, IP...

Chrome 78 Released: Added DNS-Over-HTTPS, Dark Mode and Fixed 37 Security Vulnerabilities

Google released Chrome 78 with the various new feature, improvements such as dark mode and fixes for 37 security vulnerabilities that affected the earlier...