Chinese project maintainer appears to have closed the public issue without offering a patch. Nepxion Discovery Software, an open-source project that offers functionality for…
information disclosure
Over 15 Million Publicly Facing Services at Risk of Cyberattacks
A recent report by cybersecurity company Rezilion has revealed that over 15 million publicly facing services are susceptible to at least one of the…
CISA warns of active JasperReports exploitations
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has identified security vulnerabilities in the JasperReports product from TIBCO Software that is two years old…
Using Hackability to find a Chrome data leak
Gareth Heyes has been hacking browsers for over 15 years, and one of his goals was to find an SOP bypass or information leak…
The new Syslogk Linux rootkit employs magic packets to activate the backdoor
Syslogk, a new Linux rootkit malware that uses specially designed “magic packets” to awaken a dormant backdoor on the system, is being utilised in…
Multiple Vulnerabilities are discovered In Open Automation Software (OAS) Platform
Open Automation Software, a major ICS platform, has a number of security flaws, according to researchers (OAS). Exploiting these flaws could lead to the…
F5 Security Issues a New BIG-IP Remote Code Execution Vulnerability
F5, a cloud security and application delivery network (ADN) provider, released updates on Wednesday to fix 43 problems across its products. One issue is…
Android devices vulnerable to remote spying as flaws discovered in chipsets
Audio decoders of Qualcomm and Media Tek chips have been found to have three security vulnerabilities, and if the vulnerabilities are left unpatched, it…
LFI Vulnerability of Critical Importance was reported in Hashnode Blogging Platform
Hashnode, a developer-oriented blogging platform, has a previously undiscovered local file inclusion (LFI) vulnerability that might be exploited to gain access to sensitive data…
Linux System exploited by top vulnerability
Due to the fact that Linux-based systems are immediately accessible to the internet, attackers can simply target them to install malicious web shells and…