U.S. Charges Two Sudanese Brothers for Record 35,000 DDoS Attacks
Federal prosecutors in the U.S. have charged two Sudanese brothers with running a distributed denial-of-service (DDoS) botnet for hire that...
Federal prosecutors in the U.S. have charged two Sudanese brothers with running a distributed denial-of-service (DDoS) botnet for hire that...
Updated Risk, Description, Source and Related Links.CVE-2024-30088 is being exploited in the wild. This is a Windows Kernel Time-of-check Time-of-use (TOCTOU)...
Vulnerability Summary: CVE-2024-20458 A vulnerability in the web-based management interface of Cisco ATA 190 Series Analog Telephone Adapter firmware could...
Vulnerability Summary: CVE-2024-20463 A vulnerability in the web-based management interface of Cisco ATA 190 Series Analog Telephone Adapter firmware could...
Vulnerability Summary: CVE-2024-20421 A vulnerability in the web-based management interface of Cisco ATA 190 Series Analog Telephone Adapter firmware could...
Vulnerability Summary: CVE-2024-20459 A vulnerability in the web-based management interface of Cisco ATA 190 Multiplatform Series Analog Telephone Adapter firmware...
Vulnerability Summary: CVE-2024-20512 A vulnerability in the web-based management interface of Cisco Unified Contact Center Management Portal (Unified CCMP) could...
Vulnerability Summary: CVE-2024-20461 A vulnerability in the CLI of Cisco ATA 190 Series Analog Telephone Adapter firmware could allow an authenticated,...
Vulnerability Summary: CVE-2024-38814 An authenticated SQL injection vulnerability in VMware HCX was privately reported to VMware. A malicious authenticated user...
Vulnerability Summary: CVE-2024-20462 A vulnerability in the web-based management interface of Cisco ATA 190 Series Multiplatform Analog Telephone Adapter firmware...
Vulnerability Summary: CVE-2024-45072 IBM WebSphere Application Server 8.5 and 9.0 is vulnerable to an XML External Entity Injection (XXE) attack...
Vulnerability Summary: CVE-2024-45071 IBM WebSphere Application Server 8.5 and 9.0 is vulnerable to stored cross-site scripting. This vulnerability allows a...
Power-PWN is a sophisticated offensive security toolset designed to test and identify vulnerabilities in Microsoft 365 environments. It supports red...
A critical security flaw has been disclosed in the Kubernetes Image Builder that, if successfully exploited, could be abused to...
Multiple vulnerabilities were identified in F5 Products. A remote attacker could exploit some of these vulnerabilities to trigger denial of...
Vulnerability Summary: CVE-2024-46605 A cross-site scripting (XSS) vulnerability in the component /admin.php?page=album of Piwigo v14.5.0 allows attackers to execute arbitrary...
Vulnerability Summary: CVE-2024-45795 Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to...
Vulnerability Summary: CVE-2024-47187 Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to...
Vulnerability Summary: CVE-2024-45796 Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to...
Vulnerability Summary: CVE-2024-47188 Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to...
Vulnerability Summary: CVE-2024-45797 LibHTP is a security-aware parser for the HTTP protocol and the related bits and pieces. Prior to...
Vulnerability Summary: CVE-2024-47836 Admidio is an open-source user management solution. Prior to version 4.3.12, an unsafe deserialization vulnerability allows any...
Vulnerability Summary: CVE-2024-47522 Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to...
Vulnerability Summary: CVE-2024-7994 A maliciously crafted RFA file, when parsed through Autodesk Revit, can force a Stack-Based Buffer Overflow. A...