Skip to the content
October 29, 2024
Cyber Security NewsCyber Security NewsCyber Security News
News, Advisories and much more
  • Home
  • Academy
  • Advisories
  • News
1

Law Enforcement Deanonymizes Tor Users

October 29, 2024
2

Five Eyes Agencies Launch Startup Security Initiative

October 29, 2024
3

ICO: 55% of UK Adults Have Had Data Lost or Stolen

October 29, 2024
4

Evasive Panda’s CloudScout Toolset Targets Taiwan

October 28, 2024
5

New Type of Job Scam Targets Financially Vulnerable Populations

October 28, 2024
6

Criminals Are Blowing up ATMs in Germany

October 28, 2024
7

Russian Malware Campaign Targets Ukrainian Recruits Via Telegram

October 28, 2024
8

Researchers Discover Over 70 Zero-Day Bugs at Pwn2Own Ireland

October 28, 2024
9

AI-Powered BEC Scams Zero in on Manufacturers

October 28, 2024
Cyber Security News
Category:
Category: Advisories
  • Home
  • Pin Posts
  • Advisories
  • Page 90

Category: Advisories

Multiple Vulnerabilities in SolarWinds Web Help Desk Could Allow for Remote Code Execution
Advisories

Multiple Vulnerabilities in SolarWinds Web Help Desk Could Allow for Remote Code Execution

Multiple vulnerabilities have been discovered in SolarWinds Web Help Desk (WHD), the most severe of which could allow for remote code execution. Web Help Desk...

August 24, 2024
Read More
USN-6974-2: Linux kernel (Oracle) vulnerabilities
Advisories

USN-6974-2: Linux kernel (Oracle) vulnerabilities

Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the...

August 23, 2024
Read More
USN-6972-3: Linux kernel (Azure) vulnerabilities
Advisories

USN-6972-3: Linux kernel (Azure) vulnerabilities

Yuxuan Hu discovered that the Bluetooth RFCOMM protocol driver in the Linux Kernel contained a race condition, leading to a NULL pointer dereference. An attacker...

August 23, 2024
Read More
USN-6973-2: Linux kernel (Azure) vulnerabilities
Advisories

USN-6973-2: Linux kernel (Azure) vulnerabilities

It was discovered that a race condition existed in the Bluetooth subsystem in the Linux kernel, leading to a null pointer dereference vulnerability. A privileged...

August 23, 2024
Read More
Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution
Advisories

Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution

Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. Successful exploitation of the most severe...

August 23, 2024
Read More
ZDI-24-1178: Qualcomm Wi-Fi SON LDB Service Improper Input Validation Remote Code Execution Vulnerability
Advisories

ZDI-24-1178: Qualcomm Wi-Fi SON LDB Service Improper Input Validation Remote Code Execution Vulnerability

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of multiple Qualcomm chipsets. Authentication is not required to exploit this vulnerability. The...

August 23, 2024
Read More
ZDI-24-1177: Amazon AWS my-cute-s3-bucket Uncontrolled Search Path Element Remote Code Execution Vulnerability
Advisories

ZDI-24-1177: Amazon AWS my-cute-s3-bucket Uncontrolled Search Path Element Remote Code Execution Vulnerability

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Amazon AWS. Authentication is not required to exploit this vulnerability. The ZDI...

August 23, 2024
Read More
ZDI-24-1176: Amazon AWS aws-glue-with-s2s-vpn Uncontrolled Search Path Element Remote Code Execution Vulnerability
Advisories

ZDI-24-1176: Amazon AWS aws-glue-with-s2s-vpn Uncontrolled Search Path Element Remote Code Execution Vulnerability

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Amazon AWS. Authentication is not required to exploit this vulnerability. The ZDI...

August 23, 2024
Read More
ZDI-24-1181: Axis Communications Autodesk Plugin Exposure of Sensitive Information Authentication Bypass Vulnerability
Advisories

ZDI-24-1181: Axis Communications Autodesk Plugin Exposure of Sensitive Information Authentication Bypass Vulnerability

This vulnerability allows remote attackers to bypass authentication on affected services of Axis Communications Autodesk Plugin. Authentication is not required to exploit this vulnerability. The...

August 23, 2024
Read More
ZDI-24-1180: Apple macOS AMDRadeonX6000MTLDriver KTX Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
Advisories

ZDI-24-1180: Apple macOS AMDRadeonX6000MTLDriver KTX Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Apple macOS. Interaction with the Metal framework is required to exploit this...

August 23, 2024
Read More

Posts navigation

Previous 1 … 89 90 91 … 1,605 Next
  • Home
  • Academy
  • Advisories
  • News
To the Top ↑ Up ↑