Vulnerability

Windows Registry Privilege Escalation Vulnerability – PoC Released

Researchers have released a proof of concept (PoC) exploit for a critical privilege escalation vulnerability affecting Microsoft Windows. This vulnerability,…

3 months ago

ASUS Critical Vulnerabilities Let Attackers Execute Arbitrary Commands

In a recent security advisory, ASUS has alerted users to critical vulnerabilities affecting several of its router models.  These flaws,…

3 months ago

iTerm2 Emulator Vulnerability Let Attackers Access Sensitive User Data

 A critical vulnerability discovered in the popular macOS terminal emulator iTerm2 has raised concerns among cybersecurity experts and software users.…

3 months ago

Trend Micro Apex One Vulnerabilities Let Escalate Privilege

Trend Micro has addressed six high-severity vulnerabilities in its Apex One and Apex One as a Service product, which could allow attackers to escalate…

3 months ago

D-Link Warns of Botnets Exploiting End-of-Life Routers

D-Link warned users of several legacy router models about known vulnerabilities actively exploited by botnets. These devices, which have reached…

3 months ago

CISA Warns of Palo Alto Networks PAN-OS Vulnerability Exploited in Wild

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a high-priority alert on a critical vulnerability in Palo Alto…

3 months ago

TrueNAS CORE Vulnerability Let Attackers Execute Remote Code

Security researchers Daan Keuper, Thijs Alkemade, and Khaled Nassar from Computest Sector 7 disclosed a critical vulnerability in TrueNAS CORE,…

3 months ago

PoC Exploited Released for Oracle Weblogic Server Vulnerability

Security researchers have warned that a Proof-of-Concept (PoC) exploit has been publicly released for a critical vulnerability affecting Oracle WebLogic…

3 months ago

Microsoft Warns of Windows 11 24H2 Issue that Blocks Windows Security Updates

Microsoft has issued a warning about a significant issue impacting devices running Windows 11, version 24H2, that could block essential…

3 months ago

Four-Faith Industrial Routers Vulnerability Exploited in the Wild to Gain Remote Access

A significant post-authentication vulnerability affecting Four-Faith industrial routers has been actively exploited in the wild. Assigned as CVE-2024-12856, this flaw allows…

3 months ago