Vulnerability

Apache Traffic Server Flaw Allows Request Smuggling AttacksApache Traffic Server Flaw Allows Request Smuggling Attacks

Apache Traffic Server Flaw Allows Request Smuggling Attacks

A critical vulnerability has been discovered in Apache Traffic Server (ATS), an open-source caching proxy server. Identified as CVE-2024-53868, this flaw…

1 month ago
Cisco AnyConnect VPN Server Vulnerability Allows Attackers to Trigger DoSCisco AnyConnect VPN Server Vulnerability Allows Attackers to Trigger DoS

Cisco AnyConnect VPN Server Vulnerability Allows Attackers to Trigger DoS

Cisco has disclosed a significant vulnerability in its AnyConnect VPN Server for Meraki MX and Z Series devices, allowing authenticated attackers to…

1 month ago
SonicWall Firewall Vulnerability Enables Unauthorized AccessSonicWall Firewall Vulnerability Enables Unauthorized Access

SonicWall Firewall Vulnerability Enables Unauthorized Access

Researchers from Bishop Fox have successfully exploited CVE-2024-53704, an authentication bypass vulnerability that affects SonicWall firewalls. This critical flaw allows remote…

1 month ago
Cisco Smart Licensing Utility Flaws Allowed Attackers to Gain Admin AccessCisco Smart Licensing Utility Flaws Allowed Attackers to Gain Admin Access

Cisco Smart Licensing Utility Flaws Allowed Attackers to Gain Admin Access

Cisco has disclosed critical vulnerabilities in its Smart Licensing Utility software, identified as CVE-2024-20439 and CVE-2024-20440, which could allow unauthenticated,…

1 month ago
Google Cloud Platform Vulnerability Exposes Sensitive Data to AttackersGoogle Cloud Platform Vulnerability Exposes Sensitive Data to Attackers

Google Cloud Platform Vulnerability Exposes Sensitive Data to Attackers

A privilege escalation vulnerability in Google Cloud Platform (GCP), dubbed "ImageRunner," was recently discovered and fixed. The flaw, which Tenable…

1 month ago
20,000 WordPress Sites at Risk of File Upload & Deletion Exploits20,000 WordPress Sites at Risk of File Upload & Deletion Exploits

20,000 WordPress Sites at Risk of File Upload & Deletion Exploits

A critical security alert has been issued to WordPress site administrators following the discovery of two high-severity vulnerabilities in the…

1 month ago
Google Introduces End-to-End Encryption for Gmail Business UsersGoogle Introduces End-to-End Encryption for Gmail Business Users

Google Introduces End-to-End Encryption for Gmail Business Users

Google has unveiled end-to-end encryption (E2EE) capabilities for Gmail enterprise users, simplifying encrypted email communication for businesses of all sizes.…

1 month ago
CISA Alerts on Active Exploitation of Apache Tomcat VulnerabilityCISA Alerts on Active Exploitation of Apache Tomcat Vulnerability

CISA Alerts on Active Exploitation of Apache Tomcat Vulnerability

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a high-priority alert regarding the active exploitation of CVE-2025-24813, a critical…

1 month ago
Rockwell Automation Vulnerability Allows Attackers to Execute Arbitrary CommandsRockwell Automation Vulnerability Allows Attackers to Execute Arbitrary Commands

Rockwell Automation Vulnerability Allows Attackers to Execute Arbitrary Commands

Rockwell Automation has identified a critical flaw in its Verve Asset Manager software, exposing industrial systems to potential exploitation. The vulnerability, tracked…

1 month ago
Hewlett Packard RCE Vulnerability Allows Attackers to Bypass Authentication and Execute Remote CommandsHewlett Packard RCE Vulnerability Allows Attackers to Bypass Authentication and Execute Remote Commands

Hewlett Packard RCE Vulnerability Allows Attackers to Bypass Authentication and Execute Remote Commands

A critical unauthenticated remote code execution (RCE) vulnerability in HPE Insight Cluster Management Utility (CMU) v8.2 allows attackers to bypass…

1 month ago