Research shows a .NET proxy design flaw enables file writes and RCE through attacker-supplied WSDL in multiple products.
Researcher warns that many .NET applications might be vulnerable to arbitrary file writes because .NET’s HTTP client proxy ...
FreePBX patched 2025 flaws allowing SQL injection, file upload attacks, and an auth bypass only when webserver AUTHTYPE was ...
Hackers are exploiting a new, undocumented vulnerability in the implementation of the cryptographic algorithm present in ...
In the Barracuda Networks Inc. case, a single unauthenticated SOAP request was sufficient to force the application to import ...
More and more businesses now hire remote assistants. It's a smart move. You save money. You get good talent from anywhere. But there is a big problem - security ...
Attackers are actively exploiting a zero-day bug in Gogs, a popular self-hosted Git service, and the open source project ...
Researchers found that .env files inside cloned repositories could be used to change the Codex CLI home directory path and load a rogue configuration file leading to arbitrary command execution.
A new campaign dubbed 'GhostPoster' is hiding JavaScript code in the image logo of malicious Firefox extensions counting more ...
In early December 2025, the React core team disclosed two new vulnerabilities affecting React Server Components (RSC). These issues – Denial-of-Service and Source Code Exposure were found by security ...
Background In 2024, the UK National Institute of Health and Care Excellence (NICE) recommended TriageHF alerts as an option ...
Chinese threat group UAT-9686 has been exploiting the zero-day CVE-2025-20393 to hack Cisco security appliances.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results