Tag
#vulnerability
TrojanSpy.Win64.EMOTET.A malware suffers from a code execution vulnerability.
Plantronics Hub version 3.25.1 suffers from an arbitrary file read vulnerability.
Backdoor.Win32.AsyncRat malware suffers from a code execution vulnerability.
Apache mod_proxy_cluster suffers from a cross site scripting vulnerability.
Red Hat Security Advisory 2024-2833-03 - An update to the images for Red Hat Integration - Service Registry is now available from the Red Hat Container Catalog. The purpose of this text-only errata is to inform you about the security issues fixed in this release. Issues addressed include denial of service and memory leak vulnerabilities.
Chryp version 2.5.2 suffers from a persistent cross site scripting vulnerability.
Leafpub version 1.1.9 suffers from a persistent cross site scripting vulnerability.
Prison Management System Using PHP suffers from a remote SQL injection vulnerability that allows for authentication bypass.
By Deeba Ahmed Hackers are hiding malicious messages in everyday internet traffic! Learn how DNS tunneling works and how to protect yourself from this sneaky cyberattack. Stop hackers from scanning your network and tracking your clicks. This is a post from HackRead.com Read the original post: DNS Tunneling Used for Stealthy Scans and Email Tracking
Google on Monday shipped emergency fixes to address a new zero-day flaw in the Chrome web browser that has come under active exploitation in the wild. The high-severity vulnerability, tracked as CVE-2024-4761, is an out-of-bounds write bug impacting the V8 JavaScript and WebAssembly engine. It was reported anonymously on May 9, 2024. Out-of-bounds write bugs could be typically