Redis Server Vulnerabilities Let Attackers Execute Remote Code
Two critical vulnerabilities have been identified in Redis, the widely used in-memory database, potentially exposing millions of systems to denial-of-service (DoS) attacks and remote code execution (RCE).
These flaws tracked as CVE-2024-51741 and CVE-2024-46981,...
Dell Power Manager Vulnerability Let Attackers Execute Malicious Code
A critical security vulnerability has been discovered in Dell Power Manager (DPM), a widely used application for managing power settings on Dell systems.
The flaw, identified as CVE-2024-49600, allows attackers with low privileges and...
Critical Chrome Vulnerabilities Let Attackers Execute Remote Code – Update Now
Google has released a significant update for its Chrome browser, addressing multiple high-severity vulnerabilities that could potentially allow unauthorized memory access and other exploits.
The Stable channel has been updated to version 131.0.6778.204/.205 for Windows...
BeyondTrust Remote Access & Support Flaw Enables Command Injection Attacks
BeyondTrust has disclosed a severe security vulnerability in its Privileged Remote Access (PRA) and Remote Support (RS) products that could allow attackers to execute unauthorized system commands.
The vulnerability, tracked as CVE-2024-12356 with a...
SAP NetWeaver Vulnerabilities Let Attackers Upload Malicious PDF Files
SAP has issued a crucial security update addressing multiple high-severity vulnerabilities in its NetWeaver Application Server for Java, specifically within the Adobe Document Services component.
The patch, released on December 10, 2024, as part...
WhatsApp View Once Vulnerability Let Attackers Bypass The Privacy Feature
Meta’s WhatsApp recently faced scrutiny after a significant vulnerability in its "View Once" feature was discovered, allowing attackers to bypass its privacy protections.
This feature, designed to let users send media that can only...
PoC Exploit Released For OpenSSH Arbitrary Code Execution Vulnerability
A proof-of-concept (PoC) exploit for the critical OpenSSH vulnerability CVE-2024-6387, also known as "regreSSHion," has been released, raising alarms across the cybersecurity community.
The flaw, which affects millions of OpenSSH servers globally, allows unauthenticated,...
Isreali NSO Group’s Pegasus Spyware Detected in New Mobile Devices
Cybersecurity researchers from iVerify have revealed widespread new infections of the Pegasus spyware, developed by NSO Group (dubbed "Rainbow Ronin"), showing that spyware targets not only activists and journalists but also professionals and civilians.
The...
New Apache Tomcat Vulnerabilities Let Attackers Execute Remote Code
Two critical vulnerabilities have been discovered in Apache Tomcat, the popular open-source web server, and servlet container, potentially allowing attackers to execute remote code and cause a denial of service.
The Apache Software Foundation has...
Siemens UMC Vulnerability Let Remote Attacker Execute Arbitrary Code
A critical security flaw has been discovered in Siemens' User Management Component (UMC), potentially exposing numerous industrial control systems to remote attacks.
The vulnerability, identified as CVE-2024-49775, allows unauthenticated, remote attackers to execute arbitrary...