Multiple Vulnerabilities in Apple Products Could Allow for Arbitrary Code Execution
Multiple vulnerabilities have been discovered in Apple products, the most severe of which could allow for arbitrary code execution. Successful exploitation of the most severe...
USN-6553-1: Pydantic vulnerability
Nina Jensen discovered that Pydantic incorrectly handled user input in the date and datetime fields. An attacker could possibly use this issue to cause a...
Kelvin Security cybercrime gang suspect seized by Spanish police
A malicious hacking group, thought to have been operating since at least 2013, may have suffered a significant blow after the arrest of a suspected...
Widespread Security Flaws Blamed for Northern Ireland Police Data Breach
An independent review of the August 2023 PSNI data breach found major security failings in the police department’s IT systems Read More
USN-6552-1: Netatalk vulnerability
Florent Saudel and Arnaud Gatignol discovered that Netatalk incorrectly handled certain specially crafted Spotlight requests. A remote attacker could possibly use this issue to cause...
Ukraine’s Largest Phone Operator Hack Tied to War With Russia
Kyivstar announced its mobile network had temporarily been shut down due to a major cyber-attack on its systems Read More
USN-6549-2: Linux kernel (GKE) vulnerabilities
It was discovered that the USB subsystem in the Linux kernel contained a race condition while handling device descriptors in certain situations, leading to a...
USN-6534-2: Linux kernel vulnerabilities
It was discovered that the USB subsystem in the Linux kernel contained a race condition while handling device descriptors in certain situations, leading to a...
USN-6551-1: Ghostscript vulnerability
It was discovered that Ghostscript incorrectly handled writing TIFF files. A remote attacker could possibly use this issue to cause Ghostscript to crash, resulting in...
USN-6550-1: PostfixAdmin vulnerabilities
It was discovered that Smarty, that is integrated in the PostfixAdmin code, was not properly sanitizing user input when generating templates. An attacker could, through...