CVE Alert: CVE-2024-7598
Vulnerability Summary: CVE-2024-7598 A security issue was discovered in Kubernetes where a malicious or compromised pod could bypass network restrictions...
Vulnerability Summary: CVE-2024-7598 A security issue was discovered in Kubernetes where a malicious or compromised pod could bypass network restrictions...
Vulnerability Summary: CVE-2025-2549 A vulnerability has been found in D-Link DIR-618 and DIR-605L 2.02/3.02 and classified as problematic. Affected by...
Vulnerability Summary: CVE-2025-2553 A vulnerability was found in D-Link DIR-618 and DIR-605L 2.02/3.02. It has been rated as problematic. This...
Vulnerability Summary: CVE-2025-2552 A vulnerability was found in D-Link DIR-618 and DIR-605L 2.02/3.02. It has been declared as problematic. This...
Vulnerability Summary: CVE-2025-2551 A vulnerability was found in D-Link DIR-618 and DIR-605L 2.02/3.02. It has been classified as problematic. This...
Vulnerability Summary: CVE-2025-2480 Santesoft Sante DICOM Viewer Pro is vulnerable to an out-of-bounds write, which requires a user to open...
Vulnerability Summary: CVE-2025-29914 OWASP Coraza WAF is a golang modsecurity compatible web application firewall library. Prior to 3.3.3, if a...
Vulnerability Summary: CVE-2025-29923 go-redis is the official Redis client library for the Go programming language. Prior to 9.5.5, 9.6.3, and...
Vulnerability Summary: CVE-2025-29922 kcp is a Kubernetes-like control plane for form-factors and use-cases beyond Kubernetes and container workloads. Prior to...
Vulnerability Summary: CVE-2025-2555 A vulnerability classified as problematic has been found in Audi Universal Traffic Recorder App 2.0. Affected is...
Vulnerability Summary: CVE-2025-2556 A vulnerability classified as problematic was found in Audi UTR Dashcam 2.0. Affected by this vulnerability is...
Vulnerability Summary: CVE-2025-2557 A vulnerability, which was classified as critical, has been found in Audi UTR Dashcam 2.0. Affected by...
Vulnerability Summary: CVE-2025-26852 DESCOR INFOCAD 3.5.1 and before and fixed in v.3.5.2.0 allows SQL Injection. Affected Endpoints: No affected endpoints...
Vulnerability Summary: CVE-2025-29980 A SQL injection issue has been discovered in eTRAKiT.net release 3.2.1.77. Due to improper input validation, a...
Vulnerability Summary: CVE-2025-2538 A specific type of ArcGIS Enterprise deployment, is vulnerable to a Password Recovery Exploitation vulnerability in Portal,...
Vulnerability Summary: CVE-2025-30334 In OpenBSD 7.6 before errata 006 and OpenBSD 7.5 before errata 015, traffic sent over wg(4) could...
Vulnerability Summary: CVE-2025-26853 DESCOR INFOCAD 3.5.1 and before and fixed in v.3.5.2.0 has a broken authorization schema. Affected Endpoints: No...
In the realm of cyber security, the terms ethical hacking and penetration testing often arise, but what do they truly...
The UK National Cyber Security Centre (NCSC) has established a crucial migration deadline for organizations to adopt post-quantum cryptography (PQC)...
UK CNI security leaders demonstrate a strong sense of cyber maturity, revealing a notable contrast with the alarming breach statistics....
The Pennsylvania State Education Association (PSEA) breach has impacted over half a million individuals, highlighting significant data security concerns. More...
The FishMonger APT group, a notorious Chinese cyber-espionage unit, has been directly tied to I-SOON, a technology contractor under indictment....
In a significant crackdown on fraud, UK police have arrested 422 individuals, seizing millions in cash and assets as part...
Rooted devices pose a significant cybersecurity risk, being 250 times more vulnerable to compromise than standard devices, according to new...