Vulnerability

Critical Vulnerabilities in IBM QRadar Allow Attackers to Execute Arbitrary Code Remotely

IBM recently disclosed critical vulnerabilities affecting its QRadar Suite Software and IBM Cloud Pak for Security. These vulnerabilities, if exploited,…

8 months ago

Hackers Exploited by GraphQL Vulnerabilities to Compromise Organizations

Cyberattacks have highlighted vulnerabilities in GraphQL APIs, leading to significant security breaches in various organizations. GraphQL, a query language for…

8 months ago

Zoom Fixes Critical Vulnerabilities Allowing Privilege Escalation

Zoom Video Communications has recently disclosed several critical vulnerabilities affecting its Workplace Apps, SDKs, and Rooms Clients. These vulnerabilities, identified…

8 months ago

PostgreSQL Vulnerability Allows Hackers To Execute Arbitrary SQL Functions

A critical vulnerability identified as CVE-2024-7348 has been discovered in PostgreSQL, enabling attackers to execute arbitrary SQL functions. This vulnerability…

8 months ago

MongoDB Vulnerabilities Let Attackers Escalate Privileges

MongoDB has disclosed a critical vulnerability that could allow attackers to escalate privileges on systems running certain versions of MongoDB.…

8 months ago

Critical Cisco Small Business IP Phone Flaws Exposes Users to Remote Attacks

Cisco has issued a security advisory warning users of its Small Business SPA300 and SPA500 Series IP Phones about multiple…

8 months ago

Chrome Security Update: Patch for Multiple Vulnerabilities

Google has announced a critical security update for its Chrome browser, addressing several vulnerabilities that malicious actors could exploit. The…

8 months ago

Mirai Botnet Attacking Apache OFBiz Directory Traversal Vulnerability

The notorious Mirai botnet has been observed exploiting a recently disclosed directory traversal vulnerability in Apache OFBiz. This Java-based framework,…

8 months ago

Leaked Wallpaper Vulnerability Exposes Windows Users to Privilege Escalation Attacks

A newly discovered vulnerability in Windows File Explorer has raised alarms within the cybersecurity community. Identified as CVE-2024-38100, this security…

8 months ago

Hackers Actively Exploiting WordPress Plugin Arbitrary File Upload Vulnerability

Hackers have been actively exploiting a critical vulnerability in the WordPress plugin 简数采集器 (Keydatas). The vulnerability, CVE-2024-6220, allows unauthenticated threat…

8 months ago