Vulnerability

PoC Exploit Released for Critical Cacti Vulnerability Let Attackers Code RemotelyPoC Exploit Released for Critical Cacti Vulnerability Let Attackers Code Remotely

PoC Exploit Released for Critical Cacti Vulnerability Let Attackers Code Remotely

A critical vulnerability in the Cacti performance monitoring framework tracked as CVE-2025-22604, has been disclosed, with a proof-of-concept (PoC) exploit…

3 months ago
Fortinet Authentication Vulnerability Exploited to Gain Super-Admin AccessFortinet Authentication Vulnerability Exploited to Gain Super-Admin Access

Fortinet Authentication Vulnerability Exploited to Gain Super-Admin Access

A critical authentication vulnerability in Fortinet's FortiGate SSL VPN appliance tracked as CVE-2024-55591, has been weaponized in active attacks. Threat actors…

4 months ago
Critical Vulnerability in IBM Security Directory Enables Session Cookie TheftCritical Vulnerability in IBM Security Directory Enables Session Cookie Theft

Critical Vulnerability in IBM Security Directory Enables Session Cookie Theft

IBM has announced the resolution of several security vulnerabilities affecting its IBM Security Directory Integrator and IBM Security Verify Directory…

4 months ago
Critical Apache Solr Vulnerability Grants Write Access to Attackers on WindowsCritical Apache Solr Vulnerability Grants Write Access to Attackers on Windows

Critical Apache Solr Vulnerability Grants Write Access to Attackers on Windows

A new security vulnerability has been uncovered in Apache Solr, affecting versions 6.6 through 9.7.0. The issue, classified as a…

4 months ago
GitHub Vulnerability Exposes User Credentials via Malicious RepositoriesGitHub Vulnerability Exposes User Credentials via Malicious Repositories

GitHub Vulnerability Exposes User Credentials via Malicious Repositories

A cybersecurity researcher recently disclosed several critical vulnerabilities affecting Git-related projects, revealing how improper handling of credential protocols can lead…

4 months ago
Critical Isolation Vulnerability in Intel Trust Domain Extensions Exposes Sensitive DataCritical Isolation Vulnerability in Intel Trust Domain Extensions Exposes Sensitive Data

Critical Isolation Vulnerability in Intel Trust Domain Extensions Exposes Sensitive Data

Researchers from IIT Kharagpur and Intel Corporation have identified a significant security vulnerability in Intel Trust Domain Extensions (TDX), a…

4 months ago
Chrome Security Update – Patch for 3 High-Severity VulnerabilitiesChrome Security Update – Patch for 3 High-Severity Vulnerabilities

Chrome Security Update – Patch for 3 High-Severity Vulnerabilities

Google has released a critical update for the Chrome browser, addressing three high-severity security vulnerabilities. This patch, part of the…

4 months ago
LockBit Ransomware: 11-Day Timeline from Initial Compromise to DeploymentLockBit Ransomware: 11-Day Timeline from Initial Compromise to Deployment

LockBit Ransomware: 11-Day Timeline from Initial Compromise to Deployment

A well-coordinated cyber intrusion, spanning 11 days, culminated in the deployment of LockBit ransomware across a corporate environment. The attack,…

4 months ago
GitLab Security Update – Patch for Multiple VulnerabilitiesGitLab Security Update – Patch for Multiple Vulnerabilities

GitLab Security Update – Patch for Multiple Vulnerabilities

GitLab, the widely adopted DevOps platform, has announced the immediate release of versions 17.8.1, 17.7.3, and 17.6.4 for both its Community Edition…

4 months ago
Critical Vulnerability in Meta Llama Framework Let Remote Attackers Execute Arbitrary CodeCritical Vulnerability in Meta Llama Framework Let Remote Attackers Execute Arbitrary Code

Critical Vulnerability in Meta Llama Framework Let Remote Attackers Execute Arbitrary Code

The Oligo Research team has disclosed a critical vulnerability in Meta’s widely used Llama-stack framework. This vulnerability, tracked as CVE-2024-50050, allows…

4 months ago