40,000+ CVEs Published In 2024, Marking A 38% Increase From 2023
The cybersecurity landscape witnessed unprecedented vulnerabilities during 2024, with a record-breaking 40,009 Common Vulnerabilities and Exposures (CVEs) published.
This marks a staggering 38% increase from the 28,818 CVEs reported in 2023, highlighting the rapidly evolving...
Redis Server Vulnerabilities Let Attackers Execute Remote Code
Two critical vulnerabilities have been identified in Redis, the widely used in-memory database, potentially exposing millions of systems to denial-of-service (DoS) attacks and remote code execution (RCE).
These flaws tracked as CVE-2024-51741 and CVE-2024-46981,...
PoC Exploit Released For OpenSSH Arbitrary Code Execution Vulnerability
A proof-of-concept (PoC) exploit for the critical OpenSSH vulnerability CVE-2024-6387, also known as "regreSSHion," has been released, raising alarms across the cybersecurity community.
The flaw, which affects millions of OpenSSH servers globally, allows unauthenticated,...
Session Smart Routers With Default Passwords Hacked By Mirai Malware
Juniper Networks has issued an urgent advisory following reports of Mirai malware infections targeting Session Smart Routers (SSRs) left with default passwords.
The campaign, first detected on December 11, exploited weak security practices to...
Siemens UMC Vulnerability Let Remote Attacker Execute Arbitrary Code
A critical security flaw has been discovered in Siemens' User Management Component (UMC), potentially exposing numerous industrial control systems to remote attacks.
The vulnerability, identified as CVE-2024-49775, allows unauthenticated, remote attackers to execute arbitrary...
Foxit PDF Editor Vulnerabilities Let Attackers Execute Remote Code
Foxit Software has released updates for its widely used Foxit PDF Reader and Foxit PDF Editor, addressing critical security vulnerabilities that could allow attackers to execute remote code.
The updates, version 2024.4 for both products,...
BeyondTrust Remote Access & Support Flaw Enables Command Injection Attacks
BeyondTrust has disclosed a severe security vulnerability in its Privileged Remote Access (PRA) and Remote Support (RS) products that could allow attackers to execute unauthorized system commands.
The vulnerability, tracked as CVE-2024-12356 with a...
Critical Chrome Vulnerabilities Let Attackers Execute Remote Code – Update Now
Google has released a significant update for its Chrome browser, addressing multiple high-severity vulnerabilities that could potentially allow unauthorized memory access and other exploits.
The Stable channel has been updated to version 131.0.6778.204/.205 for Windows...
Multiple GStreamer Vulnerabilities Impact Linux Distributions Using GNOME
A recent security investigation has uncovered a series of vulnerabilities in GStreamer, the open-source multimedia framework integral to GNOME-based Linux distributions.
According to reports, vulnerabilities, spanning critical issues such as out-of-bounds writes, stack-buffer overflows,...
New Apache Tomcat Vulnerabilities Let Attackers Execute Remote Code
Two critical vulnerabilities have been discovered in Apache Tomcat, the popular open-source web server, and servlet container, potentially allowing attackers to execute remote code and cause a denial of service.
The Apache Software Foundation has...