Vulnerability

10 Best Vulnerability Management Tools In 2025

Vulnerability Management Tools play a significant role in detecting, analyzing, and patching vulnerabilities in web and network-based applications. The most…

9 months ago

Redis Server Vulnerabilities Let Attackers Execute Remote Code

Two critical vulnerabilities have been identified in Redis, the widely used in-memory database, potentially exposing millions of systems to denial-of-service…

9 months ago

ART4SQLi – New SQLi Detection Method To Improve Pentesting Efficiency

A team of researchers has developed a novel approach called ART4SQLi that aims to enhance the efficiency of SQL injection…

9 months ago

AWS Repeats Same Critical RCE Vulnerability 3 Times in 4 Years

Amazon Web Services (AWS) has introduced the same remote code execution (RCE) vulnerability three times over the last four years…

9 months ago

7-Zip Zero-Day Exploit Allegedly Leaked Online

A critical 7-Zip zero-day exploit has been allegedly leaked by a hacker who is an individual operating under the alias…

9 months ago

CISA Added Palo Alto Networks PAN-OS Vulnerability to Its Known Vulnerability Database

In the ongoing battle against cyber threats, the Cybersecurity and Infrastructure Security Agency (CISA) has flagged a critical vulnerability in…

9 months ago

D-Link Web Management Interface Vulnerability Let Attackers Gain Device Access

A critical vulnerability (CVE-2024-13030) has been identified in the web management interface of the D-Link DIR-823G router with firmware version…

9 months ago

Apache MINA Vulnerability Let Attackers Execute Remote Code

A new critical vulnerability (CVE-2024-52046) has been discovered in Apache MINA, potentially allowing attackers to execute remote code by exploiting…

10 months ago

Dell SupportAssist Vulnerability Let Attackers Escalate Privileges

A newly disclosed high-impact vulnerability in Dell’s widely used SupportAssist software could allow attackers to escalate privileges on affected systems.…

10 months ago

IBM AIX Vulnerability Let Attackers Trigger DoS Condition

IBM has reported vulnerabilities in its AIX operating system that could allow attackers to cause a Denial of Service (DoS)…

10 months ago